2008: The year of the browser for Web insecurity

SAN FRANCISCO — Web browsers offered soft and interesting targets for hackers in 2008, who took advantage of them to attack the increasingly rich Web experience, said security expert Jeremiah Grossman.

“It seems like the browser is really under attack,” said Grossman, who gave a talk Tuesday on the top Web hacks of 2008 at the RSA Security conference being held here this week. “The hackers have taken the client side and are really gong after that.”

Why is the browser so attractive? “Browsers are not secure things,” he said. “There are many reasons for this, the least of which is the user.”

The primary reason is that gaining market share is the highest priority of the vendors, who will sacrifice security to get new, rich and functional products onto users’ desktops as quickly as possible. “They try to get the best product they can,” Grossman said, but that often means that security is bolted on as an afterthought.

Grossman, the founder and chief technical officer of White Hat Security, has made a point of collecting the new attack techniques that have been documented in recent years and ranking them according to which ones are most likely to be giving us grief in the coming year, based on his own assessment and the opinions of others in the security community.

“It’s the difference between what is possible and what is probable,” he said.

Last year’s crop was down marginally from 2007, just 70 new Web attacks documented in 2008 compared with 80 the year before. However,  that still amounts to about 1.5 new attacks a weeks, and a lot of the attacks were more complicated this year.

“The winner this year was head-and-shoulders above the rest,” in the consensus of the experts he consulted, Grossman said. It was an attack named GIFAR: One-half GIF image file and one-half JAR (Java Archive) file. It is a tool that can be used to get around restrictions in Web applications on the uploading of Java class files by disguising it as a valid image.

GIFARs got a lot of attention during last year’s Black Hat Briefings in August. By including the JAR in a GIF, a Web site that allows images to be uploaded, will allow it to be posted as a valid image file. When downloaded to the browser, it will be rendered as a valid image, but it also will be treated as a valid JAR file for using a Java Applet by the Java Virtual Machine.

Sun released a patch for GIFAR in December, and an exploit has not yet appeared in the wild, Grossman said.

“We don’t know of a malicious use yet,” he said. But that does not necessarily mean that it is not out there. “It’s going to be difficult to see if there is.”

In addition to the usual browser targets such as HTML and Java Script, Flash, ActiveX and other third-party tools are being targeted, Grossman said. The problems with insecure browsers are well known, and the third-party companies such as Google that use browser functionality in their business models will have to take a stand to improve security.

“They have to exercise their leverage with browser manufacturers,” he said. “It’s not their software and they can’t control it,” but they are the ones who ask the manufacturers for functionality for their users.

About the Author

William Jackson is a Maryland-based freelance writer.

inside gcn

  • federal blockchain

    How blockchain can transform the public sector

Reader Comments

Wed, Apr 22, 2009 Leposa, Dezső Szekszárd, Hungary

to mr. Grossman: Is it possible or probable, I'm a hacker?

Wed, Apr 22, 2009 Eirik Iverson Virginia

Browsers are very insecure. Fundamentally, they lack a robust internal authorization system to isolate one slice of web content in the browser from another slice of web content. That means data theft and sometimes even session hijacking. I recommend that end-users employ two or more web browsers. More below: http://www.securitynowblog.com/endpoint_security/dual-web-browsers-can-avoid-information-disclosures The other problem with web browsers is that they frequently lose containment of their web content, resulting in drive-by downloads and other attacks. For this, computers require another security application such as AppGuard, DefenseWall, or GesWall (all different vendors) because the signature-based technology of our tried and true anti-virus/spyware just can't do the job any more.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group