Malicious Updates - CompTIA Security+ SY0-701 - 2.3

Professor Messer
8 Nov 202305:44

Summary

TLDRThis script emphasizes the importance of keeping operating systems and applications updated to prevent security vulnerabilities. It advises best practices for updates, such as having backups and ensuring trusted sources. However, it also highlights the risk of malicious code in updates, using the SolarWinds Orion incident as an example of how attackers can exploit trusted update processes to distribute malware, even with digital signatures, to major organizations.

Takeaways

  • đŸ›Ąïž Always keep your operating systems and applications updated to avoid vulnerabilities from older code.
  • 🔍 Be cautious of potential malicious software in applications and updates, as attackers could embed their code within them.
  • đŸ’Ÿ Maintain a backup before making any system changes to revert back in case of update failure.
  • 🔒 Ensure updates come from trusted sources to prevent the installation of malicious updates.
  • 🔄 Updates are similar to installing new applications, so verify the legitimacy of update prompts, especially if they appear unexpectedly.
  • 🌐 Check the source of downloaded update files and understand the implications of performing the update.
  • 🔑 Prefer downloading updates directly from the application developer's site for higher trust in the update's legitimacy.
  • ✅ Many operating systems require digital signatures for application installation, providing a level of trust in the update's authenticity.
  • 🔄 Some applications have built-in update processes with security checks and digital signatures, enhancing trust in the update.
  • 🚹 The SolarWinds Orion incident in 2020 demonstrates that even trusted update processes can be compromised, showing the importance of vigilance.
  • 🔒 Despite digital signatures and internal processes, there's no 100% guarantee of an update's legitimacy, emphasizing the need for continuous security practices.

Q & A

  • Why is it important to keep operating systems and applications updated?

    -Keeping operating systems and applications updated is crucial to avoid vulnerabilities and security problems associated with older code. Updates often include patches for known security issues, helping to protect against potential threats.

  • What concerns arise when installing applications or updates?

    -There is a concern that applications or updates might contain malicious software. Attackers could potentially embed their malicious code within the update, which can compromise the system if installed.

  • What are some best practices associated with the update process?

    -Best practices include having a backup before making any changes, ensuring the update sources are trusted, and verifying the legitimacy of update messages, especially if they appear unexpectedly during web browsing.

  • Why is it recommended to have a backup before updating a system?

    -A backup ensures that if something goes wrong during the update process, you can revert to the previous configuration, minimizing downtime and potential data loss.

  • How can you determine if the source of an update is trusted?

    -You can determine a trusted source by checking if the software update is coming from a commonly used source or one that is officially associated with the application in question.

  • What does the message from the Chrome browser about updating signify?

    -The message indicates that the user is using an older version of the browser and prompts them to update for smooth and secure operation. It suggests that the download will begin automatically or provides a link to start the update.

  • How can you assess the legitimacy of an update message that appears during web browsing?

    -Assess the legitimacy by considering the context in which the message appears. If it appears unexpectedly while browsing, it may not be legitimate and should be checked further before proceeding.

  • What precautions should be taken when downloading updates from third-party websites?

    -Ensure that the source is trusted by verifying it is a site that commonly hosts such patches. Be aware of the potential risks and understand the implications of performing the update.

  • What role do digital signatures play in the update process?

    -Digital signatures, provided by the application developer and validated by the operating system, serve as a verification method to ensure that the update is legitimate and has not been tampered with.

  • How does an application's built-in update process contribute to security?

    -A built-in update process usually includes security checks and digital signatures, which help verify the authenticity of the update, reducing the risk of installing malicious software.

  • What was the SolarWinds Orion incident, and what lessons can be learned from it?

    -The SolarWinds Orion incident in December 2020 involved attackers gaining access to the development system and embedding malicious code into legitimate updates, which were then distributed to users. The lesson is that even trusted processes can be compromised, emphasizing the need for continuous vigilance and security practices.

Outlines

00:00

đŸ›Ąïž Importance of System Updates and Security Precautions

This paragraph emphasizes the necessity of keeping operating systems and applications updated to protect against vulnerabilities. It also addresses concerns about the potential for malicious software within applications and updates. Best practices for updates include having a backup before making system changes, ensuring updates come from trusted sources, and verifying digital signatures from the application developer. The paragraph provides an example of a legitimate update message from the Chrome browser and advises caution with update prompts from third-party websites. It also discusses the importance of downloading updates directly from the developer's site and the security checks built into some applications' update processes. However, it highlights the SolarWinds Orion incident in December 2020, where a digitally signed update contained malware, demonstrating that even trusted update processes can be compromised.

05:01

đŸ’„ The Consequences of Compromised Updates: The SolarWinds Attack

The second paragraph delves into the aftermath of the SolarWinds Orion attack, where attackers gained unauthorized access to the development system and embedded malicious code into legitimate updates. This resulted in the attackers gaining access to hundreds of large governmental agencies and companies, effectively giving them control over the systems running the Orion software. The attackers then leveraged this access to infiltrate other unsecured systems within the affected organizations. Although such attacks are rare, they underscore the potential for adversaries to exploit trusted processes to distribute malware on a massive scale.

Mindmap

Keywords

💡Operating Systems

Operating systems are the backbone of a computer, managing its resources and providing the interface between the user and the hardware. In the video's context, keeping operating systems up to date is crucial for security, as updates often patch vulnerabilities that could be exploited by malicious actors. The script emphasizes the importance of timely updates to avoid security problems associated with outdated software.

💡Patching

Patching refers to the process of applying updates to software to fix bugs, improve security, or add functionality. The script mentions that all applications should be patched, which means that any discovered vulnerabilities in the software are addressed by applying these updates to maintain system integrity and security.

💡Vulnerabilities

A vulnerability is a weakness in a system that can be exploited by an attacker to cause harm. The video script discusses the importance of avoiding vulnerabilities by keeping code up to date, as older code may contain known weaknesses that have since been addressed in newer versions.

💡Malicious Software

Malicious software, often shortened to 'malware,' is any software intentionally designed to cause harm to a computer system or its users. The script warns about the potential for malware to be embedded within applications or updates, highlighting the need for caution when installing new software or updates.

💡Updates

In the context of the video, updates are new versions of software that include improvements and security patches. The script discusses the process of updating systems and the potential risks involved, such as the possibility of an attacker embedding malicious code within an update.

💡Backup

A backup is a copy of data stored separately from the original to protect against data loss. The script advises having a backup before making any system changes, ensuring that if an update process goes wrong, the system can be restored to its previous state without data loss.

💡Trusted Sources

Trusted sources are entities that are known to be reliable and secure, especially when providing software or updates. The video script stresses the importance of ensuring that updates come from trusted sources to minimize the risk of installing malicious software.

💡Digital Signatures

A digital signature is a cryptographic mechanism used to verify the authenticity of a digital message or document. In the script, digital signatures are mentioned as a way to confirm that an update is legitimate, as they are put in place by the application developer and validated by the operating system during the update process.

💡Application Developer

An application developer is an individual or company that creates software applications. The script discusses the importance of downloading updates directly from the application developer's site to ensure that the updates are legitimate and have not been tampered with.

💡SolarWinds

SolarWinds is a company that was compromised in a significant security incident in 2020, as mentioned in the script. Attackers gained access to their development system and embedded malicious code into the Orion software updates, which were then distributed to users. This example illustrates the potential risks associated with even trusted update processes.

💡Legitimacy

Legitimacy in the context of the video refers to the authenticity and trustworthiness of an update or software. The script discusses various methods to verify the legitimacy of updates, such as checking digital signatures and ensuring they come from the official application developer, to avoid installing malicious software.

Highlights

The importance of keeping operating systems and applications updated to avoid vulnerabilities.

Concerns about malicious software being embedded in applications and updates.

The necessity of having a backup before making any system changes.

Ensuring updates come from trusted sources to maintain security.

The role of backups in solving problems during the update process.

Example of a legitimate update message from the Chrome browser.

Questioning the legitimacy of update prompts from third-party websites.

The need to verify the source of downloaded update files.

The significance of digital signatures in validating the legitimacy of updates.

Built-in update processes in applications and their security checks.

The SolarWinds Orion incident where a legitimate update contained malicious software.

How attackers gained access to the SolarWinds development system to insert malicious code.

The impact of the SolarWinds attack on large governmental agencies and companies.

The rarity of supply chain attacks like the SolarWinds incident.

The potential for attackers to use trusted processes to distribute malicious code automatically.

The limitations of built-in update processes and digital signatures in ensuring update legitimacy.

The importance of vigilance even when updates appear to come from legitimate sources.

Transcripts

play00:01

You often hear myself and many other security professionals

play00:05

tell you to always keep your operating systems up to date,

play00:08

make sure all of your applications have been patched,

play00:11

and any time a new set of updates comes through,

play00:13

you should make sure that you patch your system

play00:15

as soon as possible.

play00:16

This will make sure that you're able to avoid

play00:19

any type of vulnerabilities or security problems associated

play00:22

with this older code.

play00:24

But of course, when you're installing an application

play00:26

to a device, there's always a concern

play00:28

that the application itself might have malicious software

play00:31

inside of it.

play00:32

And the same thing applies to these updates.

play00:35

We're effectively installing a new application

play00:38

each time we install these updates,

play00:39

and it may be possible for an attacker

play00:42

to find some way to get their malicious code embedded

play00:45

within the update itself.

play00:47

And although we're telling you to update your system as

play00:49

quickly as possible when you find one of these security

play00:52

patches, there are a number of best practices

play00:55

that are associated with this update process.

play00:58

First, before you make any changes to any system,

play01:01

you should have a backup.

play01:02

This ensures that if something does go wrong during the update

play01:05

process, you can revert back to the previous configuration,

play01:09

and you'll be back up and running again.

play01:10

You should also make sure that the sources that you're using

play01:14

for this update are trusted.

play01:16

This means the software that you're

play01:17

using during this update is coming from a source

play01:19

that you commonly would use or one that is commonly associated

play01:23

with this update process.

play01:25

And it's always worth mentioning again

play01:27

that your backup can solve a lot of problems for you

play01:30

if something does go wrong during the update process.

play01:34

Here's an example of a message that you might commonly

play01:36

see when an application needs to be updated.

play01:38

This is for the Chrome browser, and it says, "You

play01:41

are using an older version.

play01:42

Update now to keep your Chrome browser running

play01:44

smoothly and securely.

play01:46

Your download will begin automatically.

play01:48

If not, click here" where it says Update Chrome.

play01:50

If this is a message that appears when you first

play01:53

start your browser before you visited any other websites,

play01:56

then there is a reasonable amount of trust

play01:58

you can associate with this update message.

play02:01

But what if this is a message that

play02:02

appears once you visit one of the links that's

play02:04

provided from a Google search?

play02:06

There might be a question as to whether this particular update

play02:10

is legitimate.

play02:11

And it may be something you want to perform

play02:13

a bit of extra checks before clicking that Update Chrome

play02:16

button.

play02:17

We're very often installing these updates

play02:19

from a file that has been downloaded

play02:21

from a third-party website.

play02:23

So we need to look at where we're

play02:25

downloading this file from.

play02:26

And we need to understand more about what might happen

play02:29

if we perform this update.

play02:30

We should make sure that the source

play02:32

is one that is indeed trusted, that we're

play02:34

going to a site that commonly hosts these types of patches.

play02:38

If we're getting some random pop-up message

play02:40

during our normal web-browsing session that tells us

play02:43

that we need to click here to update,

play02:45

this might not be a legitimate update message.

play02:48

And if you want to have a relatively high amount of trust

play02:51

regarding this particular patch, you

play02:53

should download the update directly

play02:55

from the application developer site.

play02:57

And many operating systems will only

play02:59

install applications if they've been digitally signed.

play03:02

That means that we'll get a message during the update

play03:04

process that tells us that this application is from Microsoft,

play03:09

or Adobe, or Google, and we can see the digital signature

play03:12

associated with that update.

play03:14

Because the digital signature is put there by the application

play03:17

developer and our operating system validates

play03:20

that digital signature, we can have a high level of trust

play03:23

that this particular update is legitimate.

play03:26

Sometimes, an application will have its own update process

play03:29

built into the app itself.

play03:31

This usually does have security checks and digital signatures

play03:34

built into this process.

play03:36

And although you might not see the digital signature,

play03:38

the update process of the application

play03:40

is automatically performing that verification.

play03:43

This process has a high amount of trust

play03:45

because it's the application itself

play03:48

that is performing the update.

play03:49

You don't have to download any files yourself.

play03:52

And the update is being verified as coming from the manufacturer

play03:56

of the software.

play03:57

However, this process is not a 100% guarantee

play04:01

that the code that you're updating is indeed legitimate.

play04:05

In December of 2020, the company SolarWinds

play04:07

reported that their application Orion was performing updates

play04:12

for users, but the update itself contained malicious software.

play04:16

These updates followed the internal update process

play04:19

for the Orion application.

play04:20

The update itself was digitally signed by the company.

play04:23

And to anyone who's ever performed an update,

play04:26

this looked like a normal update from a legitimate application

play04:29

developer.

play04:30

Unfortunately, months earlier, attackers

play04:33

had gained access to the development system

play04:35

in SolarWinds itself and put their own code

play04:39

into the SolarWinds software.

play04:41

Their malicious code was rolled up

play04:43

into the normal updates that were

play04:45

provided by other application developers within the company.

play04:48

And the entire package was digitally signed

play04:51

and automatically distributed to their users.

play04:53

This Orion software is high-end management software,

play04:57

and some of the largest organizations in the world

play05:00

were running this software.

play05:02

This allowed attackers to gain access

play05:04

to hundreds of large governmental agencies

play05:07

and companies, and it allowed them to effectively

play05:09

have full rein to the entire system that was

play05:13

running this Orion software.

play05:14

And from there, they were able to jump from the Orion system

play05:17

to other unsecured systems within those organizations.

play05:21

This type of attack is relatively rare,

play05:24

but it does show that an attacker could use a trusted

play05:27

process to be able to automatically distribute

play05:29

their malicious code to hundreds or thousands of systems

play05:33

automatically.

Rate This
★
★
★
★
★

5.0 / 5 (0 votes)

Étiquettes Connexes
Security Best PracticesOS UpdatesApplication PatchesMalware PreventionTrusted SourcesBackup StrategyDigital SignaturesSolarWinds AttackUpdate VerificationCybersecurity Awareness
Besoin d'un résumé en anglais ?