Bidvert-advert

Stay Update - ICT Security

Enter your email address:

We hate spam as much as you do and we will never sell, barter, or rent your email address to any unauthorized third party.

Most Frequently Used Software


CURL / XPertMailer / AutoBlogger / (Parser - PHP Simple HTML DOM)



lunedì 27 febbraio 2012

CrowdStrike to make RSA 2012 debut with Android attack via Webkit

A new firm said it plans to make a dramatic debut at RSA Conference 2012 by demonstrating an attack against Google Android smartphones wherein cybercriminals can gain access to critical processes and take complete control of the victim's device.

The company continues to be in stealth mode, but we're serious about attribution of cyberattacks from nation-state adversaries as our core mission.

Dmitri Alperovitch, co-founder, CrowdStrike

CrowdStrike said it is going to demonstrate the flaw during a session at RSA. The firm told Reuters that the attack uses a malicious email message. If the recipient clicks at the link the attack targets a vulnerability within the Android browser.  

The firm is being led by George Kurtz, the previous CEO of Foundstone and CTO of McAfee in addition to Dmitri Alperovitch who was vp of threat research at McAfee. Alperovitch is famous for leading a team that uncovered Operation Aurora in 2009 and Operation Shady RAT, the invention of a command-and-control server containing data that Alperovitch said exposed lapses in cybersecurity at greater than 72 organizations, including government agencies from a large choice of alternative countries.

Alperovitch said CrowdStrike would address targeted attacks using a brand new defensive technology which could expose them before companies are infiltrated.  The firm is shedding little light on its new product, but said that it utilizes “big-data” technologies.

“The company remains in stealth mode, but we're eager about attribution of cyberattacks from nation-state adversaries as our core mission and feature received $26 million Series A round investment from Warburg Pincus,” he told SearchSecurity.com in an email message.

Alperovitch will lead the company's RSA session “Hacking Exposed: Mobile RAT Edition.” The session is claimed to show how attackers can target smartphones and take control of the device to steal sensitive information or covertly use the device's microphone and camera. 

Alperovitch told Reuters that the attack against Android handsets works on devices running Android 2.2, known as Froyo. He said a second version is being developed that may be used against phones running Android 2.3. The attack targets an unpatched Webkit vulnerability, a common browser framework used in a variety of platforms including Research in Motion's BlackBerry and Apple iOS devices.

Webkit vulnerabilities have been a typical hacking technique to gain control of smartphones, said Aaron Portnoy, the leader of HP TippingPoint's security research team. Portnoy oversee's the Pwn2Own contest at the CanSecWest security conference in which over the last several years hackers took advantage of Webkit flaws to gain access to handsets.

Portnoy said Webkit errors are common and expose a serious patching problem in smartphones. Due to the wide style of Android handsets and operation system versions, Google is slow to roll out Webkit updates. RIM and Apple are also slow and might take months to issue a safety update patching Webkit, he said.

“Vulnerabilities fixed in Webkit today may be used against the iPhone or BlackBerry for months, since it takes decades to distribute updates in the course of the carriers to the devices,” Portnoy said.

View all of our RSA 2012 Conference coverage. 


Dig Deeper
  • Those who read this also read...


Nessun commento:

Posta un commento

Comments links could be nofollow free