Search This Blog

Powered by Blogger.

Blog Archive

Labels

About Me

Showing posts with label cryptographic keys. Show all posts

Hackers Exploit Exposed Security Keys to Inject Code into Websites

 



Cybercriminals are exploiting leaked cryptographic keys to manipulate authentication systems, decode protected data, and install harmful software on vulnerable web servers. These attacks can give hackers unauthorized control over websites and would allow them to maintain access for long periods.  


How Hackers Use Publicly Available Keys

Microsoft's cybersecurity experts have recently detected a new wave of Internet threats in which attacking groups use exposed ASP.NET machine keys to break into web applications. These keys are sometimes kept private, but they were nonetheless discovered in public code repositories so that hackers could easily gain access to and misuse them.  

Once the criminal possess this key, he would be able to manipulate ViewState, a methodology in ASP.NET Web Forms considered to store and manipulate user data between page interactions. If ViewState data with malicious content is injected by the attacker, the web server would then validate it and process it, allowing the hacker to execute harmful commands on that system.  

Microsoft, on its part, is tracking that more than 3,000 machine keys have been publicly leaked, putting numerous web applications at risk of code injection attacks.  


The Godzilla Malware Threat

In December 2024, evidence was found that an unidentified hacker group installed the military-grade malware Godzilla in a compromised machine with long-term access and control through an exposed ASP.NET machine key:  

Once this malware makes its way into the compromised system, the hackers can:  

- Run unauthorized commands on the web server.  

- Install additional malware to expand their control.  

- Maintain access even if initial security gaps are patched.  

Microsoft states these attacks are particularly concerning since leaked keys are available to the public, thus allowing many attackers to take advantage of this vulnerability.  


Why Publicly Exposed Machine Keys Are Dangerous

Previously, attackers sold stolen cryptographic keys in underground markets, but Microsoft now finds this case to be many freely exposed keys on public sites. It sure enhances the risks of exploitation.  

The threats include:  

- Developers could unwittingly copy exposed keys into genuinely existing projects, thereby rendering their applications exploitable.  

- Attackers could set up a script to carry out attacks against the known keys, which would allow for widespread exploitation.  

- One compromised key can cause a breach in multiple applications.  


Recommendations From Microsoft Security

To defend against these attacks, Microsoft thus recommends that organizations carry out the following:  

- Never use publicly available machine keys; generate application-specific keys at all times.  

- To limit the risks of long-term exposure, regular updates and rotations to cryptographic keys should be put into practice.  

- Check for exposed keys using Microsoft security tools and revoke any that are found.  

- Securely upgrade ASP.NET applications to the most recent version, preferably ASP.NET 4.8, which will have the strongest security protections.  

- Strengthening Windows Servers from persistent malwares through enabling security modules like Antimalware Scan Interface (AMSI) and attack surface reduction rules.  


What to Do If a System Has Been Compromised

If an organization feels its servers are under attack, it is insufficient to merely replace machine keys to avert any subsequent attacks. Microsoft suggests:  

1. To pay for a complete security investigation in order to search for backdoors and unauthorized users.  

2. Clear all malicious scripts and files from the system.  

3. Rebuild the server if necessary, to clear any other prospects of threats.  

Organizations using ASP.NET applications in web farms should replace remaining machine keys with automatically generated values that are securely stored in the system registry.  

Over 3,000 exposed cryptographic keys entail a major concern for cybersecurity since attacking groups can easily compromise web applications. Such a breach also becomes dreadful because it allows hackers to stay undetected in the system for long-spanning periods of time.  

Thus, in a bid to stay safe, businesses and developers ought to avoid using public keys, update their security settings regularly and harden defenses against malware. Every step above can assist the organizations in keeping unauthorized people out thus securing their web applications against exploitation.




WhatsApp Announces Passkey Support for its Users


The modern digital landscape is witnessing an upsurge in cybercrime activities, and users can no longer rely on strong passwords to protect themselves. 

Thankfully, even on the best low-cost Android phones, biometric authentication is becoming mainstream and easily accessible. This has led to the adoption of passkeys for user authentication by a number of well-known social networking platforms and password manager apps. WhatsApp is the newest application to offer passkey support for all of its users after a month of beta testing. 

Passkeys replace conventional passwords with a unique cryptographic key pair, such that only the users can log in. Only after a successful biometric authentication, the key is made accessible to the respective users, negating the requirement for two-factor authentication techniques like OTP distribution through SMS and email. Passkeys shield users from the risks associated with password reuse and phishing attacks. Google disclosed the new technology supports more rapid user authentication after revealing support for passkey storage in its password manager.  

WhatsApp’s effort in adopting passkey technology came to light in early August. Also, beta testing on the same commenced in late September. 

Now, around a month later, WhatsApp announced support for passkeys was coming in the stable channel on X (formerly Twitter). The feature makes the login process significantly more secure by taking the place of the one-time password (OTP) sent via SMS. The app enables users to authenticate themselves using screen lock options, including their on-device fingerprint, face unlock, PIN, or swipe pattern. In the meantime, Google Password Manager automatically stores the cryptographic key. 

The login system, with no password requirement, turns out to be quite time-efficient for users when they are setting up WhatsApp on a new phone. Commendable enough, WhatsApp is also explaining to online users how passkeys work, in order to secure their accounts.  

Moreover, it is important for users to see the difference between passkeys for logging into WhatsApp and in-app features like WhatsApp chat lock, which still requires biometric authentication. Importantly, passkeys and passwords for traditional user authentication will both be available on WhatsApp.

However, WhatsApp has not yet clarified whether the feature will be made immediately accessible everywhere. Nonetheless, Passkey support, like every other major WhatsApp feature, is anticipated to be implemented gradually in the stable channel. But it is still great to see WhatsApp reiterate its dedication to user security and privacy with features like this.  

Unlocking the Future: Passkeys, the Next Frontier in Online Security

 

If you're someone who juggles numerous passwords in your daily life, you're not alone. Despite the assistance of password managers, the increasing complexity of passwords has become a growing burden for most individuals.

Gone are the days of using easily guessable passwords like "p455w0rd123." Nowadays, every online account demands passwords that are both intricate and distinctive. Vigilance is essential, as any compromise of your passwords can have serious consequences.

Thankfully, a more efficient solution exists: Passkeys.

Passkeys represent an authentication method for websites and applications, first popularized by Apple in June 2022. While Apple introduced support for passkeys in iOS and MacOS, it's not exclusive to the company. This technology is a standard endorsed by major players such as Google, Apple, Microsoft, the World Wide Web Consortium, and the FIDO Alliance.

In practical terms, passkeys are cryptographic keys. Each passkey comprises a public key registered with the online service or app, and a private key stored on a device like a smartphone or computer. Although this may seem complex, passkeys are designed for user-friendliness. To log in with a passkey, you simply use your face, fingerprint, or a PIN, much like unlocking your smartphone. No passwords are involved, which means nothing to memorize or inadvertently disclose to potential hackers.

Passkeys also address the hassle of synchronizing passwords across your devices. Consider a scenario where you typically log into your Google account via a smartphone but wish to use a laptop. This is easily achievable, even if the passkey isn't synchronized with the laptop. As long as the smartphone is within Bluetooth range of the laptop and the user grants approval, the login proceeds without a hitch. What's even more impressive is that the passkey isn't transmitted between the two devices. Instead, after confirming the login, the user has the chance to create a passkey directly on the laptop.

Now, you might wonder if logging in with your fingerprint or face poses a security risk. The answer is no. No biometric data is transmitted to the website or app you're accessing. Instead, this information solely serves to unlock the passkey on your device. It never leaves the device.

To employ passkeys, you'll need:

- A system running at least Windows 10, MacOS Ventura, or ChromeOS 109
- A smartphone or tablet with at least iOS 16, iPadOS 16, or Android 9
- Optionally, a hardware security key with FIDO2 protocol support

Furthermore, the computer or mobile device you use must have a compatible browser like Chrome 109 or later, Safari 16 or later, or Edge 109 or later.

Major tech companies like Apple, Google, and Microsoft offer specific guidance on how to use passkeys on their respective platforms.

For a list of websites supporting passkeys, you can visit passkeys.io. Notable names like Adobe, Google, PayPal, TikTok, Nintendo, and GitHub are among those that have adopted this technology.

If you're not quite ready to fully embrace passkeys, you can experiment with them on passkeys.io's demo. It will walk you through the process of setting up a passkey and using it for logging into a site.

While passkeys represent a significant advancement, it's important to note that passwords aren't going away anytime soon. Passkeys, much like hardware security keys, provide an additional layer of security for accounts and online services that support the feature. Passwords and password managers will remain essential tools for the foreseeable future.