StrongPity APT Covets Secrets of Crypto Users

Discussion in 'malware problems & news' started by ronjor, Oct 10, 2016.

  1. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    163,883
    Location:
    Texas
  2. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Solution:

    Always run apps inside a sandbox while being monitored by HIPS, to see how they behave. :D
     
  3. Palancar

    Palancar Registered Member

    Joined:
    Oct 26, 2011
    Posts:
    2,402
    This attack relies 100% on someone downloading programs and not verifying the signatures; e.g. sha512 sums! We post about the importance of doing this to avoid MITM type hijacks. Apparently due to their success with distribution many users are still not protecting themselves in this way.
     
  4. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    Yes I agree, checksums can prevent this. Sometimes developer doesn't provide them so you have to find them for yourself. Also getting binary from developer's site and checksum from some other site could be more safe - in case when developer's site is breached. Does anybody know of a site where checksums for popular software can be found?
     
  5. guest

    guest Guest

    ...or digital signatures. Some people simply execute the file even if there is a big yellow UAC prompt (digital signature is broken)
     
  6. Palancar

    Palancar Registered Member

    Joined:
    Oct 26, 2011
    Posts:
    2,402
    I am not sure I would use such a site. Then you are extending "trust" to a third party. My .02

    In addition to security, a major plus to signature verification is that it also demonstrates file integrity. If I pull a 1 Gig file through the pipe I want to know its good to go before I deploy it in my system. This has nothing to do with security. How many times has someone fought with their OS only to find out they are using a software package that came through the pipe with errors. Happens all the time, especially on Windows. Using Linux I generally find the common stuff in the repositories so digital signatures are automatically confirmed during upgrades, installs, etc..... For those outside (special needs stuff) I find the good authors are proud to certify their files with signatures. It shows they care and are performing due diligence for me.
     
  7. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    I don't believe this has been posted elsewhere. It appears that the CCleaner ver. right after the 5.33 server update fiasco might be also compromised along with other software.

    StrongPity2 spyware replaces FinFisher in MitM campaign – ISP involved?
    https://www.welivesecurity.com/2017/12/08/strongpity-like-spyware-replaces-finfisher/https://www.welivesecurity.com/2017/12/08/strongpity-like-spyware-replaces-finfisher/
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.