This week’s blog will address two
items: one is a data breach and the second is an exploit. The data breach happened
at Daytona State College in Daytona Beach, Florida. There is a twist to this
story though. While investigating the first data breach investigators found a
second data breach had occurred. There is no knowledge yet of how many people
were affected by the data breach. The information taken was employee W-2 forms,
students’ social security numbers, names, dates of birth, driver’s license
number and how much the student makes (Abel, 2017). It is too early to find out
how the breach occurred, but they believe it was because of a third-party
vendor. The college did send out letters giving the affected students one year
of identity protection if they want it.
Again, a data breach has occurred because
of a third-party vendor. It is important companies do their due diligent and audit
their third-party vendors. JP Morgan and Chase has a great information / cyber
security group and they were breached because of a third-party vendor. Just
because a vendor says it’s secure does not mean it is true. Trust, but verify.
It would be good for a company to put in the contract they sign, if they get
breached because of the third-party vendor they can be held liable.
The second item is about Microsoft’s
zero-day exploit called DoubleAgent. DoubleAgent is a code injection
vulnerability and it allows an attacker to maliciously take over anti-virus
programs and other software via the Microsoft Windows Application Verifier
debugging tool (Barth, 2017). The exploit was discovered by Cybellum, which is
a company that specialized in zero-day attacks. This exploit can only be used
is the system has been affected. If the system is affected by the DoubleAgent
exploit it will remain on the system even after a reboot. This vulnerability
affects Microsoft Windows versions XP thru 10. Anti-virus vendors have started
issuing patches to fix issues with their software related to the Microsoft
Windows Application Verifier debugging tool exploit. Per Sophos their
anti-virus is protected from the DoubleAgent exploit because it is using
Intercept X and the Intercept X it will protect any application on the system
against DoubleAgent (Brenner, 2017). Intercept X is an endpoint protection
technology that used behavior based screening to detect malicious behavior (Greene,
2015). Here is a video showing what the DoubleAgent
attacking Avira Anti-virus.
This exploit affects all version of
Windows because Microsoft allows backwards capability. The exploit also affects other applications
installed on the operating system. Anti-virus was chosen because it can be used
against the operating systems, such as turning the anti-virus into ransomware. The Microsoft Application
Verifier is old and at this point cannot be patched. Vendors are urged to
switch to Protected Processes, which is the new “Application Verifier”.
Microsoft on their new operating system after Windows 10 needs to stop
backwards capability and write fresh code for Windows 11. The Xbox one can’t
play the first-generation Xbox games unless they are purchased from the live
store. Microsoft did this because it would be too much work to add backwards
capability to the Xbox. If Microsoft stop backwards capability this would stop
these old exploits and vulnerabilities from working on new systems. Until that
happens most Windows operating systems will be affected by the same
vulnerability because they can run old software.
References
Abel,
R. (2017, March 28). Two Daytona State College breaches affect students and
staff. Retrieved March 31, 2017, from https://www.scmagazine.com/daytona-state-college-hit-with-double-breach-affecting-staff-and-students/article/646957/
Barth,
B. (2017, March 24). Microsoft tool exploit DoubleAgent can turn antivirus
software into your worst enemy. Retrieved March 31, 2017, from https://www.scmagazine.com/microsoft-tool-exploit-doubleagent-can-turn-antivirus-software-into-your-worst-enemy/article/646173/
Brenner,
B. (2017, March 27). DoubleAgent 'vulnerability' – just how bad is it?
Retrieved March 31, 2017, from https://nakedsecurity.sophos.com/2017/03/27/doubleagent-vulnerability-just-how-bad-is-it/
Greene,
T. (2016, September 15). Sophos rolls out Intercept X for endpoint protection.
Retrieved March 31, 2017, from http://www.networkworld.com/article/3120322/security/sophos-rolls-out-intercept-x-for-endpoint-protection.html