Note-11

Note-11 - CSE 467/598 Data and Information Security Prof....

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
CSE 467/598 Data and Information Security Prof. Gail-Joon Ahn IMPORTANT DATES ! Project: ! Phase I: 11:59PM, February 22, 2011 ! Exam #1 (Midterm): Mar 8, 2011 ! Spring Break: Mar 15 & 17, 2011 (no class) ! Class Presentation : April19, 21, 26, and 28, 2011 (paper report due) ! Exam #2 (Final): May 10, 2011 (12:00PM – 2:00 PM) 2
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Cyber Gazette ! hijacking online banking sessions A new type of financial malware has the ability to hijack customers’ online banking sessions in real time using their session ID tokens. OddJob keeps sessions open after customers think they have "logged off", enabling criminals to extract money and commit fraud unnoticed. This is a completely new piece of malware that pushes the hacking envelope through the evolution of existing attack methodologies. It shows how hacker ingenuity can side-step many commercial IT security applications traditionally used to defend users' digital - and online monetary - assets. OddJob's most obvious characteristic is that it is designed to intercept user communications through the browser. It uses this ability to steal/inject information and terminate user sessions inside Internet Explorer and Firefox. OddJob’s configuration data shows that it is capable of performing different actions on targeted Web sites, depending on its configuration. The code is capable of logging GET and POST requests, grabbing full pages, terminating connections and injecting data into Web pages . All logged requests/grabbed pages are sent to the C&C server in real time, allowing fraudsters to perform session hijacks, also in real time, but hidden from the legitimate user of the online bank account. The most important difference from conventional hacking is that the fraudsters do not need to log into the online banking computers - they simply ride on the existing and authenticated session , much as a child might slip in unnoticed through a turnstile at a sports event, train station, etc. 3 MANDATORY ACCESS CONTROL (MAC) based on slides for "Computer Security: Art and Science" 4
Background image of page 2
5 ! On many computer systems, a hierarchical relationship exists between the security sensitivities of its entities !
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 16

Note-11 - CSE 467/598 Data and Information Security Prof....

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online