in

NSA and Github ‘rickrolled’ using Windows CryptoAPI bug – Naked Security, Sophos.com

NSA and Github ‘rickrolled’ using Windows CryptoAPI bug – Naked Security, Sophos.com


On Monday this week, the big cybersecurity news was speculative.

Was there a big, bad security bug in Microsoft Windows waiting to be announced the next day?

On Tuesday, the big news was the announcement that everyone had been guessing about.

Yes, there was abig bad bug, and it was in the Windows CryptoAPI.

It was a wormableremote code execution hole, so it wasn’t quite a WannaCry virus waiting to break out …

… but it was the first Patch Tuesday bug ever credited to the NSA.

That’s the US National Security Agency, ironically the very same the organization that originally came up with theETERNALBLUEexploit that ended up in the WannaCry virus after somehow escaping from the NSA’s control.

This time, the NSA gave the bug to Microsoft to patch the hole proactively, and here we are!

The vulnerability, denotedCVE – 1217508619824005121 –, is a way by which crooks can mint themselves cryptographic certificates with other people names on them.

The simplest way of thinking about this bug is that it’s like a magic machine that lets you crank out fake IDs that not only look good when you show them to a cop, but also stand up to scrutiny even when the cop Runs them through the ID scanner that checks back with headquarters.

Back on Tuesday, when the vulnerability was officially announced, wesaid:

We don’t yet know how hard it is to produce rogue certificates that will pass muster, and Microsoft understandably isn’t offering any instructions on how to do it.

All we know is that Microsoft has said it can be done, and that’s why the patch for CVE – – has been issued.

So you shouldassume that someone will find out how to do it pretty soon

, and will probably tell the world how to do it, too.

We don’t know whether to be happy or sad that we were correct.

The first proof-of-concept “fake ID generators” are out – we’ve already seen a Python program of lines, and a Ruby script of just – and they really are sitting there for anyone to use for free.

What we didn’t predict, though we probably should have, it exactly what the first widely-publicized “live attack” would do to prove its point.

(We say “live attack” – but, just to be clear, the researcher who did the work and tweeted about it did actually attack anyone else’s server, or tell anyone else how to do so, so we don’t mean that in a negative or critical sense.)

Rickroll!

UK cybersecurity researcher Saleem Rashid filmed himself browsing with Edge to a rickroll page that not only claims to be Microsoft’sgithub.combut also shows up with a nice little checkmark saying “valid certificate”:

CVE – –https://t.co/8tJsJqvnHj

Saleem Rashid (@ saleemrash1d)January (********************************************************************,

In a later photo in the same Twitter thread, he shows Chrome visiting the rickroll on aa webpage that identifies itself as) nsa.gov (***************, with a popup saying “Connection is secure” and “Certificate (Valid)”:

thanks to @CiPHPerCoder‘s hint 🙂 the biggest constraints are Chrome’s tight certificate policies and that the roo…

twitter.com/i/web/status/1 …-********** (Saleem Rashid) @ saleemrash1d)

January 17, ********

Rickrolling, in case you’ve never heard of it, is a sort-of humorous tradition beloved amongst techies and internet witticists where you unexpectedly take someone to a video of Rick Astley singing his (hit) Never gonna give you up.

Why Rick Astley, and why that song, we simply cannot tell you, but the rickrolling craze started in (****************************************************. ****

Perhaps its most infamous appearance in the cybersecurity scene was in 2020, when an Australian youngster set loose the world’s first-ever Apple iPhone virus…

… which let you know you’d become a victim by changing your phone’s wallpaper to a photo of the aforementioned Rick Astley.

Rashid’s tweet is great fun, but with a serious side, because it shows how the CryptoAPI bug could, indeed, be used to lull you into a dangerously false sense of security:

Never gonna git your hub Never gonna let you downNever gonna hack your site and fake-cert you.

It’s not just about you

An important thing to remember about this bug is that exploiting it isn’t just about what you might see if you browsed to a site with a fake certificate, or how you might be deceived by a program you downloaded in good faith.

The reason you might be deceived by this bug isbecause the program you were using at that moment was deceived by it, because it used the buggy part of the Windows CryptoAPI.

(You will also hear this vulnerability called “the crypt******************************** (bug ”because programs that make use of the CryptoAPI generally do so via a file called (crypt) . dll.)

In other words, a rogue certificate doesn’t need to be visible to be deceptive – and, ironically, the obvious example of software that does digitial certificate validation behind the scenes for safety’s sake…

… is auto-updating code that’s there to fetch security fixes for you automatically in the background so you don’t have to keep your eye on the process yourself.

What to do?

As we pointed out in this week’s Naked Security Live video:

If you patch this hole, then it instantly become useless [against you] to the crooks.

Sogetting this month’s patches – – (Cumulative Update for Windows) **********************************************************************if you ‘re patching a laptop rather than a server – is your primary defense (******************************, which also, as it happens, fixes some 436 other holes.

By the way, those other holes closed in this month’s Patch Tuesday include several remote code execution vulnerabilities in Microsoft’s remote access tools.

Those vulnerabilities haven’t had the media attention that CVE – – has received, yet could let attackers log right into your network or your computer without needing a password.

And if crooks can log straight into your network, they reduce the Windows CryptoAPI Spoofing Vulnerability to a minor worry, because they no longer need to trick anyone into running malware with bogus certificates – they can just launch the malware for themselves .

So, if the CryptoAPI bug gets you to embrace our advice to “patch early, patch often”…

… then perhaps we can write it up as a silver lining, not a dark cloud on the horizon.

LEARN MORE ABOUT THE VULNERABILITY AND HOW TO PATCH

**********************

**************************
Read More(****************************************

What do you think?

Leave a Reply

Your email address will not be published. Required fields are marked *

GIPHY App Key not set. Please check settings

Cyberpunk 2077 delayed to September – Eurogamer.net, Eurogamer.net

Cyberpunk 2077 delayed to September – Eurogamer.net, Eurogamer.net

Odell Beckham Jr: Arrest warrant issued over simple battery charge – Sky Sports, Skysports.com

Odell Beckham Jr: Arrest warrant issued over simple battery charge – Sky Sports, Skysports.com