Smartcard Malware

Nov 20, 2012 | comments

Smartcard Malware Can Share a Smartcard Over The Internet

indiatriks.blogspot.com

                                       S8UK3FT4BKJW

Security researchers have developed proof-of-concept malware that allows attackers to obtain remote access to smart card readers attached to compromised Windows PCs.A team of researchers has created a proof-of-concept piece of malware that can give attackers control of USB smart card readers attached to an infected Windows computer over the Internet.

In the case of USB smart card readers, the attacker can use the middleware software provided by the smart card manufacturer to perform operations with the victim's card as if it was attached to his own computer, said Paul Rascagneres, an IT security consultant at Luxembourg-based security auditing and consulting firm Itrust Consulting, on Thursday. Rascagneres is also the founder and leader of a malware analysis and engineering project called malware.lu, whose team designed this USB sharing malware.

Smart cards are used for a variety of purposes, but most commonly for authentication and signing documents digitally. Some banks provide their customers with smart cards and readers for secure authentication with their online banking systems. Some companies use smart cards to remotely authenticate employees on their corporate networks. Also, some countries have introduced electronic identity cards that can be used by citizens to authenticate and perform various operations on government websites.

Rascagneres and the malware.lu team tested their malware prototype with the national electronic identity card (eID) used in Belgium and some smart cards used by Belgian banks. The Belgian eID allows citizens to file their taxes online, sign digital documents, make complaints to the police and more.

However, in theory the malware's USB device sharing functionality should work with any type of smart card and USB smart card reader, the researcher said.

In most cases, smart cards are used together with PINs or passwords. The malware prototype designed by the malware.lu team has a keylogger component to steal those credentials when the users input them through their keyboards.
 However, if the smart card reader includes a physical keypad for entering the PIN, then this type of attack won't work, Rascagneres said.

The drivers created by the researchers are not digitally signed with a valid certificate so they can't be installed on versions of Windows that require installed drivers to be signed, like 64-bit versions of Windows 7. However, a real attacker could sign the drivers with stolen certificates before distributing such malware.

In addition, malware like TDL4 is known to be able to disable the driver signing policy on 64-bit versions of Windows 7 by using a boot-stage rootkit -- bootkit -- component that runs before the operating system is loaded.
The attack is almost completely transparent to the user, since it won't prevent them from using their smart card as usual,The only giveaway might be the blinking activity led on the smart card reader when the card is accessed by the attacker.
Share this article :

Post a Comment

I'm certainly not an expert, but I'll try my hardest to explain what I do know and research what I don't know. Be sure to check back again , after moderation i do make every effort to reply to your comments .

 
Support : INDIATRIKS
Copyright © 2011. INDIATRIKS - All Rights Reserved
Template Edited By Indiatriks
Proudly Powered By Blogger