200 likes | 365 Views
Securing Gateways Identifying/Defending E-Mail Attacks. A. Padgett Peterson, P.E., CISSP Corporate Information Protection Lockheed Martin Corporation Orlando, Florida Las Vegas, 26 July, 2000. The Problem. In recent months the most serious problems have been from the “Mass Mailer” viruses
E N D
Securing GatewaysIdentifying/Defending E-Mail Attacks A. Padgett Peterson, P.E., CISSP Corporate Information Protection Lockheed Martin Corporation Orlando, Florida Las Vegas, 26 July, 2000
The Problem • In recent months the most serious problems have been from the “Mass Mailer” viruses • May take many forms • Word Documents: Melissa • Excel spreadsheets: Papa • VBS files: Loveletter • Script files: KAK • All have common roots • Are other vectors but less common appbh00
What makes MassMailers easy appbh00
Mass Mailers • From a corporate/agency standpoint, the really disruptive mechanism are those which broadcast using global address lists (GAL) • potential for thousands of messages • 50,000 Melissa seen • 200,000 LoveLetter appbh00
Mass Mailers • Thusfar .EXE files are constrained to local access • e.g. PrettyPark uses .WAB - has no access to GAL • All attacks using GAL are VB based (VBA/VBS/ActiveX) appbh00
Mass Mailing http://msdn.microsoft.com/library/devprods/vs6/vc++/vccore/_core_mapi.2c_.enabling_your_program_for_mail.3a_.overview.htm appbh00
Looking Sdrawkcab • Early 1998 - vendor told that inclusion of CreateObject in VBS was not a good idea • Ignored as usual • Russian New Year attack demonstrated capability of embedded scripting • Patch issued for RNY WORD/EXCEL. Required 32 Mb download. Ignored PowerPoint. appbh00
Looking Sdrawkcab - Dec 1997 • Outlook added HTML capability • discovering exactly which HTML was like pulling teeth appbh00
Whazzat ? Image is on remote site <DIV><STRONG><FONT color=#000000>Experiment #17, HTML generation test</FONT></STRONG></DIV> <DIV><FONT color=#000000><EM><U>This is a test of HTML response capability</U></EM></FONT></DIV> <UL> <LI><FONT color=#ff0000 face="">If you see more than this message</FONT></LI> <LI><FONT color=#003f00 face="" size=2>text please let me know </FONT></LI></UL><p><a href="mailto:padgett@xxxxx">Padgett</a></p> <center><img src ="http://www.(outside ISP)/padgett/judge.jpg"></center> </BODY></HTML> appbh00
July 00 - Surprise http://www.microsoft.com/technet/security/bulletin/fq00-049.asp The Office HTML Script vulnerability, allows malicious script code on a web page to reference an Excel 2000 or PowerPoint file in such a way as to cause a remotely hosted file to be saved to a visiting user's hard drive. appbh00
Since Then • W97M/Alina.A@MM • W97M/Antisocial.E@MM • W97M/Bench.E@mm • W97M/Buffer.A@MM • W97M/MadCow@MM, WM97/Melissa-D@MM (over 50 Melissas now) • W97M/Cobra.F@MM • W97M/Evolution.E@MM • W97M/Jany.B@MM • W97M/Lucia.A@MM • W97M/Nail.B@MM • W97M/Ping.B@MM • W97M/Prilissa.A@MM • etc, etc, etc appbh00
What is the common factor ? • ALL use CreateObject • Are other possible constructs • GetObject (must preexist) • CreateTextObject (using executable ASCII) • GetTextObject • and one more we’ll mention later • but not many appbh00
Gateway Factor • “Block all Scripting” • something about a baby and a bath ? • “Block all executables” • care to be a bit more specific: ??_ AD? ASP BAS BAT BIN CDR CHM CMD COM CPL CRT CSC DEV DL? DO? EXE GMS GZ? HLP HT? IM? INI INS ISP JS? MD? MPP MPT MS? OBD OBT OCX OLE OV? PCD POT PP? RTF SCR SCT SHS SMM SYSVB? VS? VXD WBK WPD WS? XL? XML XTP appbh00
More Appropriate • Allow only permitted extensions • Block anything with fab four • This re-establishes sandbox • but allows “safe” scripting & VBS appbh00
At Desktop • Vendor has 8 Mb patch (2 Mb 2000) • Affects many elements • http://support.microsoft.com/support/kb/articles/Q262/6/18.asp • Does seem to work well with today’s problems, but what about tomorrow ? • Executable written to TEMP directory prior to screen popup • exploit already being discussed appbh00
At Desktop • Best answer probably Integrity Manager/Behavior blocker • no updates required unless new mechanism discovered • doesn’t happen very often • If network application tries to write to disk, or execute local file, ask first. • Mail, Browser, FTP, ... appbh00
That other construct • CLSID • essentially a call to an internal element • generally one marked “safe for scripting” • and shouldn’t be • may allow creation/writes without “CreateObject” • method used by BubbleBoy/KAK • shouldn’t be in a script anyway appbh00
Conclusions • Gateways • filters need to be developed that are both specific and granular • need to be able to apply/reconfigure immediately • (vendors often lag by several hours) • library of special filters needs to be developed • commitment from gateway for immediate action • specific line of authority to direct filters • consided “approved” attachments rather than bad appbh00
Conclusions II • Gateways • can use multiple products - is a good idea re: scanners • choose defensible points and ones that can be reconfigured quickly. • Desktop • Integrity Management/Behavior Blockers may be more appropriate • slow updates • very large numbers appbh00
Thank you Questions ? A. Padgett Peterson, P.E., CISSP padgett.peterson@lmco.com appbh00