Friday, April 6, 2012

Mac OSX Flashback Confusion and Hype

We, like most in the security community, have been following the latest developments with the Mac OS X Flashback Trojan and it's exploitation of the recently patched Java vulnerability (CVE-2012-0507).  This story has a lot of interesting twists and turns:
  1. The Flashback Trojan is a relatively new Trojan family, appearing on the scene late last summer/early September 2011.  Since it's inception, there have been numerous variants - moving from being a pure social engineering play (appearing to be a fake Flash update) to leveraging exploits.  The rapid evolution of this family has made it a little confusing to stay on top of. There were reports of Twitter being used for C&C updates as part of an early March variant. However, it is unclear if this communication avenue was ever actually used by the botherder.
  2. The latest variants of the Trojan, namely variant I and variant K, both exploit Java vulnerabilities- CVE-2011-3544 (Flashbak.I) and CVE-2012-0507 (Flashback.K). Oracle patched this latest vulnerability back in mid-February. Their CVSS risk matrix for this vulnerability can be seen below:
     
  3. Apple initially released a patch for the vulnerability April 3rd, six weeks after Oracle and then quietly announced on April 5th an update to the patch due to a few issues: 
  4. Then there is the question of what the Trojan does/is doing. It has the capability to modify web pages (web-injects) viewed in Safari, based on a configuration file received from the C&C.  However, it is not clear exactly what the web-injects will be used for. Similar functionality exists in many other bots, such as Zeus and is typically used to include additional form fields on banking sites to gather additional information such as SSN, debit card number, pin, etc.
  5. Finally, there is the question of how widespread the infections are.  Dr. Web has reported 550K infections.  Which would certainly rank this among the largest botnets. Some have claimed the numbers to be over-hyped or mis-counted.  However, Kaspersky recently published a blog confirming the and even upping the number to 600K+ after sink-holing a C&C.
From the perspective of Zscaler's Enterprise customers - we are indeed seeing Flashback infections, many of which include older variants of the Trojan. One C&C from an older variant for example that we are seeing, which has not been reported in the other stories is:

ASDFUH982HDODJC.COM

HTTP GET requests to this and other related C&Cs is done with a base64 encoded User-Agent (UA) that includes the CPU, hardware UUID, OS version, and other system/infection details - so each victim has a unique UA when connecting to the C&C.  The latest variant does not appear to use this same UA encoding.

Most/all of the malicious ".rr.nu" sites on 95.215.63.38 that hosted malware associated with the attack, are now down (resolve to 127.0.0.1).  Below is a screenshot of code from one website hosting the Java applet which exploited CVE-2012-0507:



The site meta-refreshes to a blank page if JavaScript is disabled or NoScript is detected and uses a cookie to mark whether or not to embed the malicious Java applet.

Doing domain/hosting analysis, other domains are believed to be related in the campaign not listed in the Dr. Web or F-Secure reports include:
  • bodyrocks.rr.nu
  • femalebodyinspector.rr.nu
  • johncartermovie2012.com
We are seeing a number of the related websites on 67.208.74.71 (InfoRelay Online Systems).  There are a large number of interesting looking/suspicious domains that are or have have resolved here, including numerous ".rr.nu" sites.

While this has been an interesting and in some ways confusing (due to mis-information and hype) campaign to follow, we are not currently seeing an enormous number of infections. This may however be due to our enterprise customer base which tends to have a lesser Mac install base or better patch management processes. That being said though, another interesting bit of information comes from looking at Alexa data showing the list the top ".rr.nu" sites here (screenshot below):

All of the top sites are related to this campaign, for example:
ustreambesttv.rr.nu
femalebodyinspector.rr.nu
gangstasparadise.rr.nu
ustreamtvonline.rr.nu
mystreamvideo.rr.nu
youtubevideos.rr.nu
ironmanvideo.rr.nu

We'll close out with statistics on the browser plugins that we are seeing among our enterprise customer base. These stats were collected by querying the browser DOM during customer-logins, which allows us to identify browser plugins/extensions.  We are currently seeing only about 6% of Enterprise systems with an out dated version of Java.  Percentages of out-dated versions of Acrobat for example are much, much higher.


1 comment:

Sam Bowne said...

I am seeing a 12% infection rate from this survey:


http://www.surveymonkey.com/s/RBG5VVW


Results are here:
https://www.surveymonkey.com/sr.aspx?sm=IbjyaIW1W5E0X6_2fCKHqlQoL9_2fgn1HNeGCdADTIwVhwY_3d

If there are many variants, with different C&C servers, the 550,000 number is just a small portion of the infected group.