Inside the James Webb Attack Image
2022-10-6 20:16:37 Author: www.forcepoint.com(查看原文) 阅读量:21 收藏

Not too long ago, Securonix Threat Labs revealed an attack involving an image taken by the James Webb telescope. The attack uses macros in a Word document to download the image, which contains a hidden malware executable.

PRODUCT

Zero Trust CDR

The only solution that is certain to stop all file-based malware.

The downloaded file isn’t a simple image. It is, in fact, a jpeg image packed with more data that is ignored by any applications that display the file. This is where the malware is hidden.

Appending data to an image is a well-known way of hiding malware. In this case, the executable data is Base64 encoded and surrounded by markers indicating it is a certificate. This allows the attack to use the standard “certTool” utility to unpack the Base64 data – an example of “living off the land.”

James Webb malware image layers

But what is strange about this file is there are two more copies of the James Webb picture following the “certificate.” It is not clear why this is the case. One possibility is that any defences that make sure it is a valid jpeg by checking the start and end would be fooled by this. But why have a third? All it seems to do is make the file bigger.

By comparison, Forcepoint’s Zero Trust Content Disarm & Reconstruction (CDR) is not fooled by this trick. CDR extracts the pixels from the first copy of the image in the file and ignores the rest of the data. Then it creates a new jpeg containing those pixels. So, no matter how the data is appended to the image, it always gets left behind.

Although there is a lot of discussion around hiding malware by appending it to images, recent attacks have taken a more sophisticated approach. They include the malware inside the image by either storing it as metadata or encoding it in the colour values of the pixels – a technique called steganography. It is interesting that the attack has taken the simple approach of appending data, yet still managed to defeat protection-based defences.

Even if this attack had taken more steps to hide the malware, Zero Trust CDR would still have stopped it getting through. Zero Trust CDR transforms and constrains image metadata and resamples the pixels to remove any hidden information.

Learn more about how Zero Trust CDR can strengthen your organisations cyber environment.

Ellie Moore - Security Researcher

Ellie Moore

Ellie is a cybersecurity researcher working in the field of Content Disarm and Reconstruction, while taking a degree in Cyber Security at University of Gloucestershire. She is currently working on the introduction of the second generation High Speed Verifier and the automated testing of CDR...

Read more articles by Ellie Moore

Forcepoint is the leading user and data protection cybersecurity company, entrusted to safeguard organizations while driving digital transformation and growth. Our solutions adapt in real-time to how people interact with data, providing secure access while enabling employees to create value.


文章来源: https://www.forcepoint.com/blog/x-labs/inside-james-webb-attack-image
如有侵权请联系:admin#unsafe.sh