Jump to content
Aerosol

Facebook security chap finds 10 Superfish sub-species

Recommended Posts

Posted

fish_dead983457938475.jpg?x=648&y=429&crop=1

Facebook security researcher Matt Richard says The Social NetworkTM has found at least ten more outfits using the library that gave the Superfish bloat/ad/malware its nasty certificate-evading powers.

Richard, a “threats researcher” on Facebook's security team, writes that in 2012 Facebook “... started a project with researchers from Carnegie Mellon University to measure how prevalent SSL MITM.”

That effort, he says, found “certain deep packet inspection (DPI) devices were using the same private key across devices, which can be exploited by an attacker with the capacity to extract the key from any single device.”

“Superfish is similar in that it uses the same private key across all clients, but it's more dangerous because its root certificate is installed on significantly more clients than those behind the vulnerable DPI devices.”

The post goes on to say that the fake certificates Superfish issued for Facebook “used weak 1024-bit RSA keys and were directly signed by the universal root certificate with no intermediate certificates in the chain.”

The researcher also says the Facebook's probe into Superfish has revealed another ten outfits using the same Kommodia library that gives the Lenovo-spawn its cert-jacking powers. The operators listed in the post are:

  • CartCrunch Israel LTD
  • WiredTools LTD
  • Say Media Group LTD
  • Over the Rainbow Tech
  • System Alerts
  • ArcadeGiant
  • Objectify Media Inc
  • Catalytix Web Services
  • OptimizerMonitor

“We can’t say for certain what the intentions of these applications are, but none appear to explain why they intercept SSL traffic or what they do with data,” Richard writes, also suggesting that “the Komodia library is easy to detect” for the following reasons:

“In our research, we found that the software that installs the root CA contains a number of easily searchable attributes that enabled us to match up the certificates we see in the wild with the actual software. These functions, which are Windows PE exports, include 'CertInstallAll', 'GetCertPEMDLL', 'InstallFirefoxDirectory', 'SetCertDLL', and 'SetLogFunctionDLL.' Most of these libraries are designed to work on Windows 8 and will not install on older operating systems.”

Source

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...