Tuesday 19 March 2013

gaming platforms as attack vector


Little more than a year ago I wrote about the possibility to attack gaming platform to compromise large audience of gamers in stealthy way, the access to millions of machines represent a dream for every attackers and I hypnotized its repercussion in cyber warfare domains. Gaming platform are usually complex systems equipped with the latest technology and the idea to exploit them as possible attack vectors cultivated by many governments.
Researchers at ReVuln, Luigi Auriemma and Donato Ferrante, presented at Black Hat Europe 2013 in Amsterdam how to convert local bugs and features in remotely exploitable security vulnerabilities by using the popular EA Origin 3 platform as an attack vector against remote systems.

EA Origin is one of the biggest gaming related digital delivery platforms with more than 40 million the access it to purchase games for any kind of platform, from mobile to PC.

Before describe the discovery of the two Italian experts let's give analyze how games run under Origin platform, game execution articulated in the following steps that allows the DRM protection
  • S1. The game invokes Origin by providing possible command line arguments to the Origin process.
  • S2. The game process dies.
  • S3. The Origin process spawns the actual game by providing the same command line arguments provided in S1.
hack

As shown in the picture Origin process communicates with games via a specific formatted URI, origin://, Origin also allows games upon launch to use custom command line arguments, CommandParams, specified as URI parameter.

The Paper states:

"The Origin platform allows malicious users to exploit local vulnerabilities or features, by abusing the Origin URI handling mechanism. In other words, an attacker can craft a malicious internet link to execute malicious code remotely on victim's system, which has Origin installed."

ReVuln Team demonstrated attack scheme using the game Crysis 3 recently released and proving several ways to trigger execution of remote code, the results are surprising, an attacker could execute malicious code to hit remote victim systems abusing the Origin platform.

One of the methods exploits a feature in the NVidia Benchmark framework in CryEngine's game engine using a specially craft Origin link, the attacker in this case only need Origin game ID of the victim for the attack.
hack
A proof of concept is available on Vimeo Revuln Channel:
The researchers demonstrated that it is possible to conduct same attack also in the case attackers haven't any knowledge of the specific games installed on the remote system itself, the paper describes the technique named "No-look exploitation link" with following statements

"An attacker can brute-force the Game ID field in the URI in order to find a vulnerable game installed on the victim's system. The idea is pretty straightforward, once an attacker finds a set of vulnerable games sharing the same vulnerable game engine, an attacker can define the following link:"

hack
hack
Auriemma Ferrante and not merely describe the way exploit vulnerabilities but provide also suggestions to mitigate the threat such as disabling the origin:// URI globally or the origin:// handler in the users' browsers which supports such feature.

Let me suggest to give a look to the presentation proposed by ReVuln, I found many points of interest such as the reference to a 0-day vulnerability market specific for gaming platforms. The demand for this kind of 0-days increased, on the market is possible acquire both server-side and client-side exploit and also rent services such as DDoS attacks against clients or servers.

It easy to predict that in the future we will assist to an increase of this type of attacks with unpredictable consequences, while the technological component in our lives is becoming increasingly significant, in parallel increases our attack surface.
Read More...

Sunday 17 March 2013

Microsoft flaw allows USB loaded with payload to bypass security controls


During March Patch Tuesday of 2013, Microsoft released seven new security bulletins, with four rated as critical, and others as Important. Most interesting one was MS13-027which is rated as "important" because the attack requires physical access to the vulnerable machine.

Microsoft flaw allows USB loaded with payload to bypass security controlsThis flaw allows anyone with a USB thumb drive loaded with the payload to bypass security controls and access a vulnerable system even if AutoRun is disabled, and the screen is locked. Flaw exposes your Windows PCs to major risk. If you remember Stuxnet, worm was injected to Iran's nuclear program system using USB thumb drive.
Windows typically discovers USB devices when they are inserted or when they change power sources (if they switch from plugged-in power to being powered off of the USB connection itself).

To exploit the vulnerability an attacker could add a maliciously formatted USB device to the system. When the Windows USB device drivers enumerate the device, parsing a specially crafted descriptor, the attacker could cause the system to execute malicious code in the context of the Windows kernel.

Because the vulnerability is triggered during device enumeration, no user intervention is required. In fact, the vulnerability can be triggered when the workstation is locked or when no user is logged in, making this an un-authenticated elevation of privilege for an attacker with casual physical access to the machine.

Microsoft admits the flaw could "open additional avenues of exploitation that do not require direct physical access to the system," once the USB-based exploit is successful.

The vulnerabilities addressed by Microsoft do not include those exploited by security researchers at the recent Pwn2Own hacking competition at the CanSecWest Conference in Vancouver.
Read More...