最近对iTunes软件更新程序的网络安全攻击的关键评估

Mohammad Aljaidi, A. Alsarhan, G. Samara, Y. Al-Khassawneh, Y. Al-Gumaei, Hamzeh Aljawawdeh, Abdullah AlQammaz
{"title":"最近对iTunes软件更新程序的网络安全攻击的关键评估","authors":"Mohammad Aljaidi, A. Alsarhan, G. Samara, Y. Al-Khassawneh, Y. Al-Gumaei, Hamzeh Aljawawdeh, Abdullah AlQammaz","doi":"10.1109/EICEEAI56378.2022.10050464","DOIUrl":null,"url":null,"abstract":"A rising number of businesses are embracing the Industry 4.0 paradigm by connecting their industrial systems and implementing a variety of cutting-edge technologies (such as cloud computing, smart devices, and data mining analytical), which in turn make Operations become more productive and efficient. However, this development and improvement on these businesses has been accompanied by the emergence of different types of cybersecurity difficulties and attacks. In this paper, a critical assessment for the recent iTunes software updater attack will be investigated and analyzed. A security vulnerability was discovered in iTunes software updater has been exploited to run ransomware on the targeted environment. Attacks could have taken advantage of an unquoted file path in the assigned system service that handled iTunes software update, which instead of running the targeted updater executable, it would have executed ransomware instead on the target computer. The ransomware sat undetected due to it be not containing a file extension and therefore was not scanned by antivirus software. Its malicious behavior was also not detected by antivirus software due to the iTunes updater being signed and trusted, so antiviruses thought the ransomware was trusted as well. Potential victims who had iTunes previously installed on their device was also vulnerable due to the updater being left behind when iTunes is uninstalled. This created a bigger number of potential victims that could have been exploited. While this exploit was not taken advantage of, this exploit existed and still exists in other applications because of developer error and lack of testing for this exploit.","PeriodicalId":426838,"journal":{"name":"2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Critical Evaluation of A Recent Cybersecurity Attack on iTunes Software Updater\",\"authors\":\"Mohammad Aljaidi, A. Alsarhan, G. Samara, Y. Al-Khassawneh, Y. Al-Gumaei, Hamzeh Aljawawdeh, Abdullah AlQammaz\",\"doi\":\"10.1109/EICEEAI56378.2022.10050464\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A rising number of businesses are embracing the Industry 4.0 paradigm by connecting their industrial systems and implementing a variety of cutting-edge technologies (such as cloud computing, smart devices, and data mining analytical), which in turn make Operations become more productive and efficient. However, this development and improvement on these businesses has been accompanied by the emergence of different types of cybersecurity difficulties and attacks. In this paper, a critical assessment for the recent iTunes software updater attack will be investigated and analyzed. A security vulnerability was discovered in iTunes software updater has been exploited to run ransomware on the targeted environment. Attacks could have taken advantage of an unquoted file path in the assigned system service that handled iTunes software update, which instead of running the targeted updater executable, it would have executed ransomware instead on the target computer. The ransomware sat undetected due to it be not containing a file extension and therefore was not scanned by antivirus software. Its malicious behavior was also not detected by antivirus software due to the iTunes updater being signed and trusted, so antiviruses thought the ransomware was trusted as well. Potential victims who had iTunes previously installed on their device was also vulnerable due to the updater being left behind when iTunes is uninstalled. This created a bigger number of potential victims that could have been exploited. While this exploit was not taken advantage of, this exploit existed and still exists in other applications because of developer error and lack of testing for this exploit.\",\"PeriodicalId\":426838,\"journal\":{\"name\":\"2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI)\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EICEEAI56378.2022.10050464\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EICEEAI56378.2022.10050464","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

越来越多的企业通过连接其工业系统和实施各种尖端技术(如云计算、智能设备和数据挖掘分析)来拥抱工业4.0范式,这反过来又使运营变得更加高效和高效。然而,在这些业务的发展和完善的同时,也出现了不同类型的网络安全难题和攻击。在本文中,对最近的iTunes软件更新程序攻击的关键评估将进行调查和分析。在iTunes软件更新程序中发现了一个安全漏洞,该漏洞已被利用在目标环境中运行勒索软件。攻击可以利用分配的处理iTunes软件更新的系统服务中未引用的文件路径,而不是运行目标更新程序的可执行文件,它将在目标计算机上执行勒索软件。该勒索软件未被检测到,因为它不包含文件扩展名,因此没有被防病毒软件扫描。它的恶意行为也没有被杀毒软件检测到,因为iTunes更新程序是签名和可信的,所以杀毒软件也认为勒索软件是可信的。之前在设备上安装过iTunes的潜在受害者也很容易受到攻击,因为当iTunes被卸载时,更新程序会被留下。这就造成了更多可能被利用的潜在受害者。虽然这个漏洞没有被利用,但由于开发人员的错误和缺乏对这个漏洞的测试,这个漏洞已经存在,并且仍然存在于其他应用程序中。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Critical Evaluation of A Recent Cybersecurity Attack on iTunes Software Updater
A rising number of businesses are embracing the Industry 4.0 paradigm by connecting their industrial systems and implementing a variety of cutting-edge technologies (such as cloud computing, smart devices, and data mining analytical), which in turn make Operations become more productive and efficient. However, this development and improvement on these businesses has been accompanied by the emergence of different types of cybersecurity difficulties and attacks. In this paper, a critical assessment for the recent iTunes software updater attack will be investigated and analyzed. A security vulnerability was discovered in iTunes software updater has been exploited to run ransomware on the targeted environment. Attacks could have taken advantage of an unquoted file path in the assigned system service that handled iTunes software update, which instead of running the targeted updater executable, it would have executed ransomware instead on the target computer. The ransomware sat undetected due to it be not containing a file extension and therefore was not scanned by antivirus software. Its malicious behavior was also not detected by antivirus software due to the iTunes updater being signed and trusted, so antiviruses thought the ransomware was trusted as well. Potential victims who had iTunes previously installed on their device was also vulnerable due to the updater being left behind when iTunes is uninstalled. This created a bigger number of potential victims that could have been exploited. While this exploit was not taken advantage of, this exploit existed and still exists in other applications because of developer error and lack of testing for this exploit.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信