Malware funnels smartcard PINs to remote servers

Powered by SC Magazine
 

USB authentication targeted.

A researcher has developed malware capable of remotely stealing two factor PINs generated by USB smartcards.

The malware was unique in that it used a driver to access the USB port and ship PINs stolen using a keylogger to a remote command and control server.

Author and penetration tester Paul Rascagneres (RootBSD) said the malware would work on most USB smartcards. 

"I did not test the proof of concept on all providers, but as the malware shares the USB device in raw, we do not target any specific smartcard," Rascagneres said.

"Normally it will work on every smartcard or usb device."

The use of a driver to swipe smartcard tokens was unique, Rascagneres said, because existing malware had used the Windows application programming interface to steal PINs.

"The driver is used to make the USB available over IP and to connect to a remote machine," he said.

Attackers could deliver the malware through classic vectors including malicious email attachments or exploit kits.

Users could mitigate the threat and others like it by using a hardware keypad or by monitoring latency.

Rascagneres will present a proof of concept instance of the malware at the Malcon event this month.

Copyright © SC Magazine, Australia


Malware funnels smartcard PINs to remote servers
 
 
 
Top Stories
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
The CISO’s dilemma: Do you trust your partner’s partner?
[Blog post] How far down the chain do you check?
 
Microsoft confirms Australian Azure launch
Available from next week.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 307

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 115

Vote