Deep Tech: The Eye for the Bug [Back Door Bug]

2020-08-15 11:31 0
图片3.jpg

Risk management headache? Discerning eyes help you identify loopholes.

Backdoors are persistent and covert, bypassing authentication and encryption.

Execute code transfer file, injection program to attack.

Vulnerability patches are often upgraded, suspicious files are not received.

Real-time attention to new developments, quick to check the eye.

Back door

A backdoor is a way to bypass authentication or system encryption to gain access to a system. Sometimes developers build back doors into their programs, intentionally or not, for whatever reason, but if those back doors are discovered by others, it becomes a security risk that hackers can easily use as a vulnerability. Attackers, on the other hand, inject backdoors into vulnerable servers to execute attacks and upload malicious files, paving the way for further attacks.

Backdoor exploit security incident

On December 4, 2018, the Internet police brigade of a public security branch received a report. A company found that its internal computer had been executed dangerous orders, suspected to have been remotely controlled to grab computer data such as account passwords and a large number of sensitive information was sent back. The local Internet police immediately put the case on file for investigation. Through tracing analysis, the identification result was that the backdoor file had the function of controlling the computer, and the suspect had downloaded and run the script remotely through the backdoor to collect users' personal information. From January 4 to 5, 2019, the police arrested seven suspects, including Ma, Yang, Tan and Zhou.

In 2016, 80 webcams made by SONY were found to have "secret backdoors" that, once cracked, could be used by malware such as Mirai to take control of the device and launch a massive DDoS attack. The vulnerable cameras are all IP cameras from the Sony Professional Ipela Engine series. Stefan Viehbock of SEC Consult, an Austrian information security firm, discovered the backdoor in October and published a study. SONY officials have released firmware updates to fix the backdoor and thanked the SEC Consult.

The dangers of backdoor vulnerabilities

■ Attackers can use backdoors to execute code or upload files on infected servers

■ Steal data from internal databases or run encrypted malware by executing code or uploading files

...

Take CVE-2017-7923 vulnerability exploitation as an example

■ Vulnerability background

Since 2014, the IP camera products of a video surveillance manufacturer were revealed to have a backdoor. When the attacker constructed a request containing the field "auth=YWRtaW46MTEK", it would be identified as a special user by the background. The attacker may take advantage of the vulnerability to enhance the authority, obtain or modify the device information. The back door was found as early as March 5, 2017, March 14, 2017, the manufacturer official issued a security warning, May 5, 2017, the vulnerability was CVE included (CVE-2017-7923), (CVE-2017-7921), September 12, 2017 online published details of the vulnerability.

■ Use mode

The user name information for the response can be viewed by accessing the backdoor URL of the response.

图片4.jpg

■ Utilization process

1. Search in the search engine according to the relevant information, and download the corresponding utilization script.

图片5.jpg

2. Switch to the corresponding directory and run the corresponding code based on the device found on the Internet to obtain the user name and password of the camera.

图片6.jpg

Dipu Technology Solutions

1. Use the "Insight Security Detection Platform" of Deep Technology to detect whether there are backdoor vulnerabilities in the live network environment.

图片7.jpg

2. Use the "security risk control platform" of Deep Technology for continuous monitoring and closed-loop management of backdoor vulnerabilities.

图片8.jpg

3. The "security threat perception Big Data platform" of Deep Technology can be used for continuous monitoring of backdoor attacks.

图片9.jpg

4. Using DPtech IPS2000, WAF3000 security protection equipment can effectively protect the use of the back door attack.

图片10.jpg

Countermeasures for backdoor vulnerabilities

■ Periodically check vulnerabilities

■ Update patches issued by vendors

■ Use the virtual patch function of security protection devices such as IPS/WAF to manually repair the faults

■ Real-time monitoring of uploaded code for malicious content

Source: Corporate press release
Press release Overseas media release advertorials Release advertorials release press conference Release press release overseas media release media release platform media release release press release Invite media to invite overseas press release Overseas press release
Related news