Two interns at Matasano Security exposed security flaws in some of the most widely used remote administration tools,...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
which can supposedly be used to defend against the attackers. Can you explain the RAT security flaws that were discovered and how they can be used for defense purposes?
Ask the Expert
Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous.)
Remote administration tools (RATs), the common name for the broad category of software tools hackers develop and use for malicious purposes, are a potential weak link in enterprise security, regardless of whether any particular tool was designed for legitimate use or for use in an attack. The fact that some of the most widely used malicious RATs had security flaws is not a surprise, given the immaturity of the software development practices used by most attackers. Some RATs, like BackOrifice and Dameware, were created using more secure software development practices, and the quality of the tools typically reflect that, but for the most part, RATs are not developed using these more sophisticated practices.
The RAT security vulnerabilities discovered by the Matasano interns included SQL injection, unauthorized reading of arbitrary files, vulnerabilities in included third-party files and man-in-the-middle attacks. These attacks could allow an attacker to gain access to the system by exploiting a vulnerability in the RAT, allowing access to a potential new attacker.
Exploiting these vulnerabilities for defensive purposes on internal hosts owned by your enterprise and where your enterprise is responsible for the system is one potential option to remediate the system and defeat an attacker. However, to be clear, many would consider such a tactic to be "hacking back," and such aggressive methods of offensive security are at best highly controversial, and at worst illegal if performed against a system your enterprise doesn't own. A much better option is to use established support tools to remediate a system where one of the vulnerable RATs was installed without authorization. In such cases, the system would most likely be compromised, so you might still need to reimage the system after backing up its data.
Dig Deeper on Security Testing and Ethical Hacking
Related Q&A from Nick Lewis
The new Trochilus RAT can avoid detection in cyberespionage attacks. Expert Nick Lewis explains how it works, and if enterprises need to adapt their ...continue reading
The Asacub Trojan has new banking malware features. Expert Nick Lewis explains how it made this transition and what enterprises should be watching ...continue reading
BlackEnergy malware may have been part of the attacks on Ukrainian utility and media companies. Expert Nick Lewis explains how this malware works and...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.