Matt Suiche ca3c94575f Add Stranger Danger, Blackbox DPAPI
Rename folder
Add README
2017-04-29 16:53:05 +04:00

1.6 KiB
Исходник Ответственный История

Supply Chainsaw: Practical software supply chain attacks for everyone

I recently presented Supply Chainsaw: Practical software supply chain attacks for everyone at the OPCDE technical security conference in Dubai.

In between pictures of Sharknadoes and memes were an array of software supply chain attacks:

  • We proved most programming language package managers have major security weaknesses
    • Typo or wrong command attacks compromise those who make mistakes installing packages
    • Anonymous automatic registration and publishing make attacks easy
    • Weak authentication, no 2-factor, sometimes none at all
    • Developers of popular open-source packages and their powerful credentials are exposed to many different attacks through the development process and permanent credential caching
  • Operating system package managers are manual-review and harder to poison
  • But nearly every OS is acquired insecurely and unlikely to be verified by the user, from Linux to Mac OS, to Windows
  • MITM attacks proven practical against proxy/VPN/Tor users - over 5,000 potential opportunities to poison executable downloads in my test
  • We became OS and package mirrors to prove
    • Anyone could infect packages and OSs delivered via mirror
    • Can be quick, cheap, anonymous, with worldwide effect
    • Packages often are not verified against anything external
    • We were never denied anything we asked for
    • We are running honest mirrors, but we have no guarantee others are trustworthy or have not been compromised
  • Between hundreds and millions of users can be compromised using these techniques
  • Supply chain attacks are happening in the wild now