Kicking off the next session at #enigma2021 is @maddiestone with "THE STATE OF 0-DAY IN-THE-WILD EXPLOITATION"

usenix.org/conference/eni…
What do you think of when I say 0-day? Only the most elite hackers and most elite targets, that they're super hard and expensive to develop.

I started looking back over what we're really seeing in the wild, looking at all of these bugs together to look at the bugs and gaps.
It became clear that we are not requiring the most elite skills to exploit 0-days. But there are mitigations that can make it much harder.
What is a 0-day: an exploit targeting a vulnerability that the defender doesn't know about (yet).
My work is on 0-days in the wild to make it easier to defend against these and why I'm writing a year in review.
24 0-days exploits detected in the wild

6/24 (25%) are variants of previously-disclosed vulnerabilities. Only a few lines changed in some places.

3/24 were exploiting vulnerabilities which were incompletely patched.

[Oh no.]
Lesson: Across the industry, we're making it way too easy to exploit incompletely-fixed vulns
Example: Internet Explorer Jscript

Just look at that chain of reports leading to more and more CVEs because patches didn't actually... patch.
The same attacker exploited *all* of these, according to Google's Threat Analysis Group. To trigger them, usually only 1-2 lines of code needed to be changed.

It's a use-after-free vuln [please see the talk for a more detailed explanation]
And now more trivial variants!
It's not hard. Once you understand a single one of those bugs, you can just tweak and have more zero-days.

This case study in Chrome is a little different, showing incomplete patching.
At the time this Chrome bug was fixed, it wasn't known that it was a vulnerability; that came several months later when we found it being exploited in the wild.

This shows that we need to *always* patch completely, not just when we know it's a security issues.
Chrome patched, then patched better, which introduced a new issue, which then had to get patched quickly again.
This vulnerability is because the "integer" type can also be +infinity and -infinity which can cause issues where subms end up as NaN (not a number).

So first they patched it... partly.
So we have to think through what is the root cause vulnerability and make sure there are not other ways to trigger the same thing.
Arbitrary pointer dereference in Windows splwow64

This one is where something was patched, but there was still a trivial variant exploitable... and then again.
Sending a message type 0x75 will allow the attacker to control all the parameters, so can be used to read and write by the attacker. Using different messages type could still be used after patch. Then they patched by using offsets, but that didn't fix it.
We have a problem! We're not making exploiting 0-days hard enough. You don't need elite skills -- you can keep re-using vulns!

We need correct and comprehensive patches. Patch *all* the instances in the codebase, not just the one.
What do we do as researchers:
* analyze patches
* variant analysis
* offer to work with vendors on patches
* incentivize vendors for complete patches
What do we do as vendors?
* Complete and comprehensive patches
* Work with researchers to give feedback on patches before release
* fix classes not just bugs
* build mitigations into products
What do we do as users?
* hold vendors accountable
* call them!
We need correct and comprehensive patches for all 0-day vulnerabilities.

Want more? Check out these references [@maddiestone would you mind linking these here?]

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Lea Kissner

Lea Kissner Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @LeaKissner

3 Feb
Next up at #enigma2021, Alex Gaynor from @LazyFishBarrel (satirical security company) will be talking about "QUANTIFYING MEMORY UNSAFETY AND REACTIONS TO IT"

usenix.org/conference/eni…
Look for places where there are a lot of security issues being handled one-off rather than fixing the underlying issue Image
We tried to fix credential phishing mostly by telling people to be smarter, rather than fixing the root cause: people being able to use phished credential.

2-factor auth just ... fixes the problem. ImageImage
Read 15 tweets
3 Feb
It's time to talk about @zoom_us security over @zoom_us at #enigma2021 by Merry Ember Mou with the talk "BUILDING E2EE AND USER IDENTITY"

usenix.org/conference/eni…
Zoom's launched end-to-end encryption 5 months after the white paper was published
* prevents eavesdroppers between users who are speaking to each other
* protection against compromised servers Image
[ here's the E2EE whitepaper from Zoom]

github.com/zoom/zoom-e2e-…
Read 20 tweets
3 Feb
@carmelatroncoso is speaking about "CONTACT TRACING APPS: ENGINEERING PRIVACY IN QUICKSAND" at #enigma2021

usenix.org/conference/eni…
Engineering contact-tracing apps has been a marathon

Why make them?
* manual contact-tracing became totally overwhelmed with covid cases
* can we supplement with technology? Image
Constraints: security and privacy
* protect from misuse: surveillance, target marginalized individuals, etc.
* purpose limitation by default
* hide user's identity, location, behaviour
* preserve system integrity
Read 18 tweets
3 Feb
In more pandemic talks at #enigma2021, Mark Funk is here to talk about "DESIGNING VERIFIABLE HEALTH SOLUTIONS FOR GLOBAL PANDEMIC"

usenix.org/conference/eni…
This is about work done with a nonprofit to try to find a way to prevent infected people from entering a location in a privacy-preserving way.

(Stopped this work when it became clear that this was being built for a world which wouldn't exist any time soon.) Image
Right now, we ask people to self-diagnose, which requires on diagnosis and truthfulness

There are stronger mechanisms like PCR tests Image
Read 25 tweets
3 Feb
Last day of #enigma2021 and we're kicking off with @cooperq from @EFF talking about "DETECTING FAKE 4G LTE BASE STATIONS IN REAL TIME"

usenix.org/conference/eni…
Focus on tech which targets at-risk people (e.g. activists, rights defenders, sex workers) Image
What is a cell site simulator?

*transmitter or receiver which intercepts metadata from cell phones, often by pretending to be a legit cell tower Image
Read 21 tweets
2 Feb
Last talk at #enigma2021 today is @iMeluny speaking about "DA DA: WHAT SHARK CONSERVATION TEACHES US ABOUT EMOTIONALITY AND EFFECTIVE COMMUNICATION STRATEGIES FOR SECURITY AND PRIVACY"

usenix.org/conference/eni…
I dreamt of being a shark scientist and worked my ass off to get a scholarship to one of the top programs. My career took a loop, but to this day I find lessons from sharks for security and privacy.
Lessons:
Incidents are emotional
* Risks will never be zero
* Public is ill-informed and fear is common
* science-based policy is not the norn Image
Read 20 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!