Handler on Duty: Jesse La Grew
Threat Level: green
Podcast Detail
SANS Stormcast Wednesday, April 23rd: More xorsearch Updates; DKIM Replay Attack; SSL.com Vulnerability Fixed
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9420.mp3
My Next Class
Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 5th - May 10th 2025 |
Network Monitoring and Threat Detection In-Depth | Baltimore | Jun 2nd - Jun 7th 2025 |
xorsearch.py: Ad Hoc YARA Rules
Adhoc YARA rules allow for easy searches using command line arguments without having to write complete YARA rules for simple use cases like string and regex searches
https://isc.sans.edu/diary/xorsearch.py%3A%20%22Ad%20Hoc%20YARA%20Rules%22/31856
Google Spoofed via DKIM Replay Attack
DKIM replay attacks are a known issue where the attacker re-uses a prior DKIM signature. This will work as long as the headers signed by the signature are unchanged. Recently, this attack has been successful against Google.
https://easydmarc.com/blog/google-spoofed-via-dkim-replay-attack-a-technical-breakdown/
SSL.com E-Mail Validation Bug
SSL.com did not properly verify which domain a particular email address is authorized to receive certificates for. This could have been exploited against webmail providers.
https://bugzilla.mozilla.org/show_bug.cgi?id=1961406
Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 5th - May 10th 2025 |
Network Monitoring and Threat Detection In-Depth | Baltimore | Jun 2nd - Jun 7th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 14th - Jul 19th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Las Vegas | Sep 22nd - Sep 27th 2025 |
Podcast Transcript
Hello and welcome to the Wednesday, April 23rd, 2025 edition of the SANS Internet Storm Center's Stormcast. My name is Johannes Ullrich and today I'm recording from Jacksonville, Florida. And we got yet another diary by Didier about an improvement to XOR search. So the last improvement was the ability to use YARA rule, which of course also allows regular expressions. Now in this diary, Didier talks about how to use what he calls ad hoc YARA rules. Usual YARA rules are written in a file and they span multiple lines. But there are things that you often want to do in these YARA rules, like simple things, like look for a regular expression, look for a string. So what these ad hoc YARA rules are, these are YARA rules in command line arguments that are essentially sort of abbreviations. So instead of spelling out the entire YARA rule, you just tell it, I would like to use a regular expression. Here's the regular expression. I would like to use a static string and the like. And that'll make it easier to use these YARA rules. In particular, if you're sort of just searching around, it's not necessarily some YARA rules that you would like to, for example, maintain as a standard configuration file. And then some security news from a couple days ago that I haven't had a chance to cover yet. And it involves DKIM, the email anti-spam standard. So DKIM adds a cryptographic signature header. However, that cryptographic signature only covers select headers. Typically, the from, the subject, maybe the to header. This is what's abused here in this particular attack. The email being sent here claims to be a subpoena from law enforcement. But the email itself claims to be sent on behalf of Google. So what attackers are doing here, they're taking a legitimate security email from Google. And then they are adding the signature from this email, including some of the headers that are verified by that particular signature to their email. So to their email body. And this kind of replay of digital signatures, of course, is a common problem in cryptography in general. Usually, you add something like maybe a timestamp or a serial number or something like this. But in DKIM, this doesn't really work. Like the attacker could also just spoof the timestamp of the email, just sort of, you know, backdate it essentially. In my opinion, probably the best somewhat technical solution here is to vary the subject field. So not just make it security alert, but security alert for and then maybe the name of the recipient or something like this. In order to make it a little bit more difficult to spoof and easier for the victim to figure out what exactly is going on here. Interesting attack and definitely something to be aware of. That DKIM is really not meant to ultimately authenticate the email. It's really more meant as a spam fighting tool. And with that, its scope is somewhat limited. And it's not a replacement for S-MIME, PGP or some of the other signature methods that actually verify the entire email, including the body of the message. For all the details about this particular attack, see the great blog post by EasyDMark. They recreated the attack, including how the email was sent, how the headers were copied and all of those details. So pretty good work here. And sadly, certificate authorities continue to have a hard time figuring out who is in control of a particular domain and who should be allowed to request certificates for this domain. Azel.com uses a method that at first sounds relatively straightforward to implement and should be as secure as other methods. And that's where you just add a special record to a particular domain's zone that allows the set of authority to look up an email address authoritative for that particular domain. The problem is that due to some interesting, I should say, logic error at SSL.com, the server authority that had this problem, you were now not only considered responsible for the domain that you added the DNS record to, which is the original intent, but you were also able to request certificates for a domain that your email address was using. So if you authenticated an email address at a webmail provider, like, let's say, gmail.com, well, you were also able to request certificates for this particular webmail provider. This is certainly a big issue in particular since, of course, webmail providers themselves are sort of a target of these machine-in-the -middle attacks that would be enabled by these fake certificates. Apparently, SEL .com has gone over its logs and found something like 11 instances where certificates were issued using the faulty logic. Not clear if they were all malicious or just innocently in the sense that maybe someone used an email address at their own domain or another domain that they owned and then obtained a certificate for those domains. Well, and that's it for today. At least that's all I've got time for. Should I have covered a story that you thought may have been more interesting what I covered or more relevant? Well, let me know. And any feedback, as always, is welcome. Thanks and talk to you again tomorrow. Bye.