Cyber

Hacking tool

by Mark Rowe

A powerful hacking tool can be created for as little as £15, and a few hours of work by someone with basic programming knowledge, according to an IT security firm, Kaspersky Lab.

The research started with a real story: in another investigation that the firm participated in, an insider (the employee of a cleaning company) used a USB-stick to infect a workstation inside a targeted organisation with malware. Upon hearing the story, Kaspersky Lab became curious about what else could be used by insiders to compromise a targeted network? And, would it be possible to compromise a network without any malware at all?

They took a Raspberry-Pi microcomputer, configured it as an Ethernet adapter, made some configuration changes in the OS running on the microcomputer, and installed a few publicly available tools for packet sniffing, data collection and processing. Finally, the researchers set up a server to collect intercepted data. After that, the device was connected to the targeted machine and started to automatically feed the server with stolen credential data.

The reason why this happened was that the OS on the attacked computer identified the connected Raspberry-Pi device as a wired LAN adapter, and automatically assigned it a higher priority than other available network connections and – more importantly – gave it access to data exchange in the network. The experimental network was a simulation of a segment of a real corporate network. As a result, researchers were able to collect authentication data sent by the attacked PC and its applications, as they tried to authenticate domain and remote servers. In addition, researchers were also able to collect this data from other computers in the network segment.

As the specifics of the attack allowed for intercepted data to be sent through the network in real time, the longer the device was connected to the PC, the more data it was able to collect and transfer to a remote server. After just half an hour of the experiment researchers were able to collect nearly 30 password hashes, transferred through the attacked network, so it is easy to imagine how much data could be collected in just one day. In the worst-case scenario, the domain administrator’s authentication data could also be intercepted should they log into their account while the device is plugged-in into one of the PCs inside the domain.

The potential attack surface for this method of data interception is big: the experiment was successfully reproduced on both locked and unlocked computers running on Windows and Mac OS. However, researchers were not able to reproduce the attack on Linux based devices.

Sergey Lurye, co-author of the research at Kaspersky Lab said: “There are two major things that we are worried about as a result of this experiment: firstly – the fact that we didn’t really have to develop the software – we used tools freely available on the Internet. Secondly – we are worried about how easy it was to prepare the proof of concept for our hacking device. This means that potentially anyone, who is familiar with the Internet and has basic programming skills, could reproduce this experiment. And it is easy to predict what could happen if this was done with malicious intent. The latter is the main reason why we decided to draw public attention to this problem. Users and corporate administrators should be prepared for this type of attack.”

Read more about the experiment and measures to take to protect corporations and home users from attacks of this type on Securelist.com.

Related News

  • Cyber

    NFT domain names

    by Mark Rowe

    Mark Franks, Head of User Interface and Experience at names.co.uk, considers NFT domain names. The fanfare surrounding non-fungible tokens (NFTs) emerged after…

  • Cyber

    Trends since the pandemic

    by Mark Rowe

    To say the last few years have been turbulent is somewhat of an understatement. From remote working to increased cyberthreats, businesses have…

  • Cyber

    Invisible, targeted attacks

    by Mark Rowe

    An IT security product company warns that “invisible” targeted cyber attacks are using only legitimate software. They are penetration-testing and administration tools…

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing