id
int64
1
14.4k
text
stringlengths
3
5.01k
entities
list
relations
list
Comments
list
1,014
A well-stocked seller told us that every account he sold belonged to an active student at the respective university.
[]
[]
[]
1,015
He claimed that once the account was sold, only the one buyer and the legitimate user would have access.
[]
[]
[]
1,016
He recommended not changing the account password to avoid detection by the legitimate user.
[]
[]
[]
1,017
Another seller offered to provide real identity information for a stolen account so the buyer could change the corresponding password and security questions.
[]
[]
[]
1,018
This type of account access was the most expensive and least flexible in terms of customization (i.e., username, institution, etc.).
[]
[]
[]
1,019
Additionally, it should be noted that there is value beyond the EDU account itself for password and security question information, in the event they are shared across other online accounts for the legitimate user.
[]
[]
[]
1,020
Other sellers were also able to offer customizable email accounts from a specific domain/institution.
[]
[]
[]
1,021
Figure 5: A seller advertising a customizable “xxx.edu” email account.
[]
[]
[]
1,022
In the above advertisement, the seller describes the ability to choose an account under a subdomain (academia, student, me, email, or contact) of the requested domain.
[]
[]
[]
1,023
The price for this custom account was only ¥27 RMB ($4.40 USD); for an extra ¥13 RMB ($2.12 USD), the buyer can request a custom username at any subdomain for the given institution.
[]
[]
[]
1,024
To further assess this threat, we purchased a customized, new account from a seller on Taobao.
[ { "id": 46515, "label": "SOFTWARE", "start_offset": 88, "end_offset": 94 } ]
[]
[]
1,025
Four hours later, we received confirmation that the custom email address "[email protected]" was active.
[ { "id": 3215, "label": "TIME", "start_offset": 0, "end_offset": 16 }, { "id": 46516, "label": "EMAIL", "start_offset": 74, "end_offset": 96 } ]
[]
[]
1,026
Navigating to CNRI’s webmail page, we were then able to successfully access and send an email from that account.
[ { "id": 46517, "label": "identity", "start_offset": 14, "end_offset": 18 } ]
[]
[]
1,027
Figure 6: Sending an email through a newly bought customized EDU account.
[]
[]
[]
1,028
Another noteworthy trend we observed was that some sellers provided email addresses with customizable usernames at "californiacolleges.edu".
[ { "id": 46518, "label": "DOMAIN", "start_offset": 117, "end_offset": 139 } ]
[]
[]
1,029
In fact, anyone can do the same by visiting the California Colleges Create an Account page.
[ { "id": 44918, "label": "identity", "start_offset": 48, "end_offset": 67 } ]
[]
[]
1,030
Accounts made through this site "can be used to apply [for] related memberships of Amazon Prime, Microsoft Developer, Adobe and Apple by some secret ways," one seller said.
[ { "id": 46519, "label": "identity", "start_offset": 83, "end_offset": 95 }, { "id": 46522, "label": "identity", "start_offset": 128, "end_offset": 133 }, { "id": 46520, "label": "identity", "start_offset": 97, "end_offset": 106 }, { "id": 46521, "label": "identity", "start_offset": 118, "end_offset": 123 } ]
[]
[]
1,031
Figure 7: Using a newly created California Colleges account.
[ { "id": 46523, "label": "identity", "start_offset": 33, "end_offset": 52 } ]
[]
[]
1,032
As with most criminal enterprises, not all sellers on Taobao use their real identity, presenting a challenge in tracking down the individuals behind this activity.
[ { "id": 46524, "label": "SOFTWARE", "start_offset": 54, "end_offset": 60 } ]
[]
[]
1,033
In order to sell anything on Taobao, a seller must at least create a valid Alipay account (similar to PayPal) linked to a valid Chinese citizen ID number (similar to a U.S. Social Security number), and then associate it with a valid Chinese bank account under the same citizen ID.
[ { "id": 46526, "label": "SOFTWARE", "start_offset": 75, "end_offset": 81 }, { "id": 46525, "label": "SOFTWARE", "start_offset": 29, "end_offset": 35 }, { "id": 46527, "label": "SOFTWARE", "start_offset": 102, "end_offset": 108 } ]
[]
[]
1,034
However, identity theft is a global concern and the Chinese citizen ID is no exception, allowing for potential sellers to simply purchase a usable identity online.
[ { "id": 46528, "label": "attack-pattern", "start_offset": 8, "end_offset": 23 } ]
[]
[]
1,035
Based on our investigation, we believe that stolen accounts for these universities are actively selling on Taobao.
[ { "id": 44920, "label": "SOFTWARE", "start_offset": 108, "end_offset": 114 }, { "id": 44921, "label": "attack-pattern", "start_offset": 45, "end_offset": 60 } ]
[ { "id": 195, "from_id": 44921, "to_id": 44920, "type": "related-to" } ]
[]
1,036
On August 27, we reported our findings to Taobao.
[ { "id": 46529, "label": "TIME", "start_offset": 3, "end_offset": 12 }, { "id": 46530, "label": "SOFTWARE", "start_offset": 42, "end_offset": 48 } ]
[]
[]
1,037
Their response was that they were addressing this issue and have already removed a number of these items, with the remainder requiring further investigation.
[]
[]
[]
1,038
However, this malicious seller activity may also reveal a larger scale problem within university systems.
[]
[]
[]
1,039
Through the types of accounts advertised on Taobao, an attacker can steal a student or staff account, assume their identity, and gain unauthorized access to standard university resources.
[ { "id": 46531, "label": "SOFTWARE", "start_offset": 43, "end_offset": 50 } ]
[]
[]
1,040
More sophisticated and nefarious uses include leveraging accounts in social engineering/phishing attacks or exploiting access to high-value university systems (e.g., personnel, financial, research) to steal information.
[ { "id": 46533, "label": "attack-pattern", "start_offset": 88, "end_offset": 104 }, { "id": 46534, "label": "attack-pattern", "start_offset": 69, "end_offset": 87 }, { "id": 46535, "label": "attack-pattern", "start_offset": 108, "end_offset": 125 }, { "id": 46536, "label": "attack-pattern", "start_offset": 201, "end_offset": 218 } ]
[]
[]
1,041
Fortunately, a number of the institutions impacted by this activity have already implemented two-factor authentication for high-value resources, reducing the risk of the latter.
[]
[]
[]
1,042
Yet, we believe the residual risk and exposure call for further action.
[]
[]
[]
1,043
The following are our suggestions for discovering and mitigating risks associated with this activity: Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[]
[]
[]
1,044
Please mark, I'm not a robot!
[]
[]
[]
1,045
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
1,046
This post is also available in: 日本語 (Japanese) Today, Palo Alto Networks Unit 42 researchers are announcing details on a new high- severity vulnerability affecting the Google Android platform.
[ { "id": 46537, "label": "identity", "start_offset": 60, "end_offset": 98 }, { "id": 46538, "label": "SOFTWARE", "start_offset": 174, "end_offset": 197 } ]
[]
[]
1,047
Patches for this vulnerability are available as part of the September 2017 Android Security Bulletin.
[ { "id": 44922, "label": "TIME", "start_offset": 60, "end_offset": 74 }, { "id": 44923, "label": "SOFTWARE", "start_offset": 75, "end_offset": 83 } ]
[]
[]
1,048
This new vulnerability does NOT affect Android 8.0 Oreo, the latest version; but it does affect all prior versions of Android.
[ { "id": 46539, "label": "SOFTWARE", "start_offset": 39, "end_offset": 55 }, { "id": 46540, "label": "SOFTWARE", "start_offset": 118, "end_offset": 124 } ]
[]
[]
1,049
There is some malware that exploits some vectors outlined in this article, but Palo Alto Networks Unit 42 is not aware of any active attacks against this particular vulnerability at this time.
[ { "id": 46541, "label": "identity", "start_offset": 79, "end_offset": 105 } ]
[]
[]
1,050
Since Android 8.0 is a relatively recent release, this means that nearly all Android users should take action today and apply updates that are available to address this vulnerability.
[ { "id": 44924, "label": "SOFTWARE", "start_offset": 6, "end_offset": 17 }, { "id": 44925, "label": "SOFTWARE", "start_offset": 77, "end_offset": 84 } ]
[]
[]
1,051
What our researchers have found is a vulnerability that can be used to more easily enable an “overlay attack,” a type of attack that is already known on the Android platform.
[ { "id": 46543, "label": "SOFTWARE", "start_offset": 158, "end_offset": 165 } ]
[]
[]
1,052
This type of attack is most likely to be used to get malicious software on the user’s Android device.
[ { "id": 46544, "label": "SOFTWARE", "start_offset": 86, "end_offset": 93 } ]
[]
[]
1,053
This type of attack can also be used to give malicious software total control over the device.
[]
[]
[]
1,054
In a worst-case attack scenario, this vulnerability could be used to render the phone unusable (i.e., a “brick”) or to install any kind of malware including (but not limited to) ransomware or information stealers.
[]
[]
[]
1,055
In simplest terms, this vulnerability could be used to take control of devices, lock devices and steal information after it is attacked.
[ { "id": 46545, "label": "attack-pattern", "start_offset": 55, "end_offset": 78 }, { "id": 46547, "label": "attack-pattern", "start_offset": 80, "end_offset": 92 }, { "id": 46546, "label": "attack-pattern", "start_offset": 97, "end_offset": 114 } ]
[]
[]
1,056
An “overlay attack” is an attack where an attacker’s app draws a window over (or “overlays”) other windows and apps running on the device.
[ { "id": 44926, "label": "attack-pattern", "start_offset": 4, "end_offset": 18 } ]
[]
[]
1,057
When done successfully, this can enable an attacker to convince the user he or she is clicking one window when, in fact, he or she is actually clicking another window.
[]
[]
[]
1,058
In Figure 1, you can see an example where an attacker is making it appear that the user is clicking to install a patch when in fact the user is clicking to grant the Porn Droid malware full administrator permissions on the device.
[ { "id": 46548, "label": "malware", "start_offset": 166, "end_offset": 176 } ]
[]
[]
1,059
Figure 1: Bogus patch installer overlying malware requesting administrative permissions
[]
[]
[]
1,060
You can see how this attack can be used convince users to unwittingly install malware on the device.
[]
[]
[]
1,061
This can also be used to grant the malware full administrative privileges on the device.
[]
[]
[]
1,062
An overlay attack can also be used to create a denial-of-service condition on the device by raising windows on the device that don’t go away.
[ { "id": 44927, "label": "attack-pattern", "start_offset": 48, "end_offset": 65 } ]
[]
[]
1,063
This is precisely the type of approach attackers use with ransomware attacks on mobile devices.
[]
[]
[]
1,064
Of course, an overlay attack can be used to accomplish all three of these in a single attack: Overlay attacks aren’t new; they’ve been discussed before.
[]
[]
[]
1,065
But until now, based on the latest research in the IEEE Security & Privacy paper, everyone has believed that malicious apps attempting to carry out overlay attacks must overcome two significant hurdles to be successful: These are significant mitigating factors and so overlay attacks haven’t been reckoned a serious threat.
[ { "id": 46549, "label": "identity", "start_offset": 51, "end_offset": 55 }, { "id": 44929, "label": "attack-pattern", "start_offset": 269, "end_offset": 284 }, { "id": 44930, "label": "attack-pattern", "start_offset": 148, "end_offset": 163 } ]
[]
[]
1,066
However, our new Unit 42 research shows that there is a way to carry out overlay attacks where these mitigating factors don’t apply.
[ { "id": 46550, "label": "identity", "start_offset": 18, "end_offset": 25 } ]
[]
[]
1,067
If a malicious app were to utilize this new vulnerability, our researchers have found it could carry out an overlay attack simply by being installed on the device.
[ { "id": 46551, "label": "attack-pattern", "start_offset": 108, "end_offset": 122 } ]
[]
[]
1,068
In particular, this means that malicious apps from websites and app stores other than Google Play can carry out overlay attacks.
[ { "id": 46552, "label": "SOFTWARE", "start_offset": 86, "end_offset": 98 } ]
[]
[]
1,069
It’s important to note that apps from websites and app stores other than Google Play form a significant source of Android malware worldwide.
[ { "id": 46553, "label": "SOFTWARE", "start_offset": 114, "end_offset": 121 }, { "id": 46554, "label": "SOFTWARE", "start_offset": 73, "end_offset": 84 } ]
[]
[]
1,070
The particular vulnerability in question affects an Android feature known as “Toast.” “Toast” is a type of notification window that “pops” (like toast) on the screen.
[ { "id": 46555, "label": "SOFTWARE", "start_offset": 53, "end_offset": 60 } ]
[]
[]
1,071
“Toast” is typically used to display messages and notifications over other apps.
[]
[]
[]
1,072
Unlike other window types in Android, Toast doesn’t require the same permissions, and so the mitigating factors that applied to previous overlay attacks don’t apply here.
[ { "id": 46556, "label": "SOFTWARE", "start_offset": 30, "end_offset": 37 } ]
[]
[]
1,073
Additionally, our researchers have outlined how it’s possible to create a Toast window that overlays the entire screen, so it’s possible to use Toast to create the functional equivalent of regular app windows.
[]
[]
[]
1,074
In light of this latest research, the risk of overlay attacks takes on a greater significance.
[]
[]
[]
1,075
Fortunately, the latest version of Android is immune from these attacks “out of the box.”
[ { "id": 46557, "label": "SOFTWARE", "start_offset": 35, "end_offset": 42 } ]
[]
[]
1,076
However, most people who run Android run versions that are vulnerable.
[ { "id": 46559, "label": "SOFTWARE", "start_offset": 29, "end_offset": 36 } ]
[]
[]
1,077
This means that it’s critical for all Android users on versions before 8.0 to get updates for their devices.
[ { "id": 46560, "label": "SOFTWARE", "start_offset": 38, "end_offset": 45 } ]
[]
[]
1,078
You can get information on patch and update availability from your mobile carrier or handset maker.
[]
[]
[]
1,079
Of course, one of the best protections against malicious apps is to get your Android apps only from Google Play, as the Android Security Team aggressively screens against malicious apps and keeps them out of the store in the first place.
[ { "id": 46562, "label": "SOFTWARE", "start_offset": 101, "end_offset": 112 }, { "id": 46561, "label": "SOFTWARE", "start_offset": 78, "end_offset": 85 }, { "id": 46563, "label": "identity", "start_offset": 121, "end_offset": 142 } ]
[]
[]
1,080
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot!
[]
[]
[]
1,081
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
1,082
Mutex analysis is an often overlooked and useful tool for malware author fingerprinting, family classification, and even discovery.
[]
[]
[]
1,083
Far from the hypothesized "huge amount of variability" in mutex names, likely hypothesized due to the seemingly random appearance of them, practical mutex usage is embarrassingly consistent.
[]
[]
[]
1,084
In fact, over 15% of all collected worms share a single mutex [2gvwnqjz].
[]
[]
[]
1,085
This blog was sourced from the data generated by the WildFire Analytics cloud, which processes thousands of samples a day and provides insights into various characteristics and behaviors of malware worldwide.
[ { "id": 46564, "label": "SOFTWARE", "start_offset": 54, "end_offset": 78 } ]
[]
[]
1,086
But before we get into the details, here is a quick overview of mutexes and why they exist in the first place.
[]
[]
[]
1,087
The mutex is the fundamental tool for managing shared resources between multiple threads (or processes).
[]
[]
[]
1,088
If you think of the threads as a whole bunch of people in a meeting, all trying to talk at once, a mutex is the baton that gets passed from one person to the next so that there’s only one person talking at a time.
[]
[]
[]
1,089
The important thing to understand is what the mutex is really protecting.
[]
[]
[]
1,090
In the above example, the resource being protected isn’t the right to speak, as many might think, but rather the ability to listen.
[]
[]
[]
1,091
Here’s a more technical example.
[]
[]
[]
1,092
Lets say you want to update an Internet Explorer (IE) cookie file, adding a unique identifier for use later.
[ { "id": 44932, "label": "SOFTWARE", "start_offset": 31, "end_offset": 53 } ]
[]
[]
1,093
Naively, what you need to do is read the cookie file in, add your data to what you’ve read, and write the file back to disk.
[]
[]
[]
1,094
But what if IE is running and also updating that file?
[ { "id": 46565, "label": "SOFTWARE", "start_offset": 12, "end_offset": 14 } ]
[]
[]
1,095
The worst case, for you, is that both you and IE read the file at the same time but you write your edits first.
[ { "id": 46566, "label": "SOFTWARE", "start_offset": 46, "end_offset": 48 } ]
[]
[]
1,096
This is because IE will completely destroy your edits when it writes its new version of the file over yours.
[ { "id": 46567, "label": "SOFTWARE", "start_offset": 16, "end_offset": 18 } ]
[]
[]
1,097
The solution to this problem is to use a mutex to protect the integrity of the cookie file.
[]
[]
[]
1,098
A process that has the mutex knows that while it holds that mutex no other process will be accessing the cookie file.
[]
[]
[]
1,099
It can then read, tweak, and write the file without fear of any clobbering by other processes.
[]
[]
[]
1,100
Since each shared resource can only have a single mutex effectively protecting it, leveraging that mutex is indication that a program will be using said resource.
[]
[]
[]
1,101
In the cookie file example above, just referencing the mutex protecting that file indicates, with extremely high probability, that functionality to change the file exists somewhere in the program.
[]
[]
[]
1,102
Any given mutex, and protected functionality, can then be thought of as an independent library of sorts.
[]
[]
[]
1,103
Note that while the technical implementation may not expose said functionality as a normal library, such exposure is not necessary for the types of analysis performed here.
[]
[]
[]
1,104
That library’s usage can be analyzed in terms of who uses it.
[]
[]
[]
1,105
Simply put: malware writers leverage malware specific libraries and groups of like actors will reuse these core libraries when able. The needle in a haystack problem forever plagues malware research: it’s extremely difficult to find reliable information with malware writers constantly working to undermine or eliminate that information.
[]
[]
[]
1,106
But, in the case of mutex analysis, the useful information pretty well slapped us in the face.
[]
[]
[]
1,107
As can be clearly seen, mutex 2gvwnqjz1 is strongly associated with malware.
[]
[]
[]
1,108
In fact, we have only seen it in malware.
[]
[]
[]
1,109
As is equally obvious, not all mutexes offer such dramatic insight.
[]
[]
[]
1,110
There are many common mutexes shared across both benign software and malware.
[]
[]
[]
1,111
What’s more, they don’t all share millions of uses across both sides of the fence.
[]
[]
[]
1,112
In cases such as these the common approach is to use sets of the data, in this case sets of mutexes, to create fingerprints of each sample and then leverage those fingerprints to extract higher confidence classification decisions.
[]
[]
[]
1,113
While this avenue of research is being pursued, it suffers from all the traditional challenges of big data research.
[]
[]
[]