Memory scraping malware goes after encrypted private information

What's "pervasive memory scraping" and why is it considered by SANS Institute security researchers to be among the most dangerous attack techniques likely to be used in coming the coming year?

Top 10 Web hacking Techniques of 2010 Revealed

Simply put, pervasive memory scraping is used by attackers who have gained administrative privileges to successfully get hold of personally identifiable information (PII) and other sensitive data held encrypted in a file system, according to Ed Skoudis, senior security consultant at InGuardians who is also an instructor at SANS events. Evidence of this attack is coming up again and again in data-breach cases, he said.

"Data is encrypted in a file system where it's stored," said Skoudis, who joined with Johannes Ullrich, chief research officer at SANS Technology Institute, to speak at the RSA Conference last week on dangerous attack techniques that appear to be on the rise. Though stored encrypted, the data has to be processed by some application and "if you're processing that data it will be processed in that system unencrypted," Skoudis pointed out.

Although data encryption is widely regarded as good protection for sensitive data — and may be required under regulations — attackers are probing the chinks in encryption's armor to steal it. That's done by taking advantage of the fact that to be processed, data has to be unencrypted, and attackers "go into memory and grab the crypto key" and start "fetching the PII itself from memory." One interesting aspect about this attack is that "the bad guys want to maintain the end-to-end encryption, too."

Pervasive memory scraping is not wholly new — the annual Verizon Data Breach report, for example, two years ago identified what it called a "RAM scraper" attack as something first spotted in the retail and hospitality sectors. The Verizon report described the RAM scaper as a "relatively new form of malware designed to capture data from volatile memory within a system" in order to circumvent encryption controls and "capture data in memory where it must be decrypted to be read and processed." The Verizon report at that time suggested, "The best defense is to keep remote attacks from owning the system."

One of the tools that attackers can use for pervasive memory scraping is the Metasploit Meterpreter, a software module that works with the open-source Metasploit framework. Researcher Colin Ames is credited with having done pioneering work in showing how it's possible to hunt for crypto keys, Skoudis said.

Although data-loss prevention (DLP) products and freeware can help in detecting accidental leakage of sensitive data, they may not be enough of a defense against pervasive memory scraping attacks where "the bad guys are encrypting the data and DLP can't see it," Skoudis said.

Other types of dangerous attacks expected to be on the rise were also identified. These included attack scenarios related to enterprise migration from IPv4 to IPv6. Here, attackers try to stealthily move about via IPv6 networks that enterprises may not even know are turned on in newer versions of products, while their older firewalls or intrusion-prevention systems may not be looking for IPv6 at all.

"IPads and iPhones are devices already running IPv6," said Ullrich. "There are no great tools right now to actually monitor it." IPv6 can constitute a "shadow network" that many IDS and IPS are not yet ready to observe, he added. His advice: "If you don't need it, turn off IPv6 on your router, on your host, everywhere."

In another prediction, the infamous Stuxnet malware launched against industrial control systems in Iran is also likely to be the source of inspiration in the coming year for similar attacks. Calling it "Trickle-down Stuxnet," Skoudis predicted the Stuxnet method that used a stolen signing certificate and sophisticated Windows-based exploits will inspire others to attempt something similar. In addition, Skoudis also pointed out that social networking in general, where users post a plethora of information that attackers may have access to, presents a highly attractive attack platform for the future.

Read more about wide area network in Network World's Wide Area Network section.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags data protectionanti-malwareSANS Institute

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Ellen Messmer

Network World
Show Comments

Cool Tech

Toys for Boys

Skywatcher Dobsonian 8″ Collapsible Telescope

Learn more >

Family Friendly

Whodunnit™ Duo-Scope MFL-007 Microscope Kit

Learn more >

Stocking Stuffer

Logitech Ultimate Ears Wonderboom 2 Bluetooth Speaker

Learn more >

Christmas Gift Guide

Click for more ›

Brand Post

Scan at 1 Photo per second!

Quickly organise your entire photographic history. Automatically color correct and restore poor condition and even faded photos. And, most importantly easily share your memories with friends and family using your favourite social media applications such as Instagram, Twitter, and more.

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Tom Sellers

MSI P65

This smart laptop was enjoyable to use and great to work on – creating content was super simple.

Lolita Wang

MSI GT76

It really doesn’t get more “gaming laptop” than this.

Jack Jeffries

MSI GS75

As the Maserati or BMW of laptops, it would fit perfectly in the hands of a professional needing firepower under the hood, sophistication and class on the surface, and gaming prowess (sports mode if you will) in between.

Taylor Carr

MSI PS63

The MSI PS63 is an amazing laptop and I would definitely consider buying one in the future.

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Aysha Strobbe

Microsoft Office 365/HP Spectre x360

Microsoft Office continues to make a student’s life that little bit easier by offering reliable, easy to use, time-saving functionality, while continuing to develop new features that further enhance what is already a formidable collection of applications

Featured Content

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?