Week in review: Open-source Cybersecurity tools

Wi-Fi 7’s mission-critical role in enterprise, industrial networking, BLUFFS: A New Threat in Bluetooth Security, Bandook: The Resurgent Malware Targeting Windows.

Good evening, tech enthusiasts and cyber sentinels! Tonight's newsletter is like a cybersecurity thriller, packed with twists and turns in the digital realm. We're starting with a dive into the disruptive world of Wi-Fi 7, where Tiago Rodrigues maps out its transformative impact on our digital lives. Then, brace yourselves for a tale of deception and vulnerability in the Bluetooth landscape, with the BLUFFS attack exposing cracks in our trusted devices. Finally, we uncover the shadowy resurgence of Bandook, a malware that's back in action and targeting Windows machines with a vengeance. So, buckle up as we explore these digital frontiers where innovation meets invasion!

Week in review: Open-source Cybersecurity tools

BLUFFS: A New Threat in Bluetooth Security

Recent research has uncovered a series of novel attacks, collectively named BLUFFS, that threaten Bluetooth Classic's security. These attacks, affecting versions 4.2 through 5.4 of the Bluetooth Core Specification, compromise the forward and future secrecy guarantees, leading to adversary-in-the-middle (AitM) scenarios.

Vulnerabilities in Bluetooth Classic

Identified as CVE-2023-24023 with a CVSS score of 6.8, BLUFFS enables device impersonation and machine-in-the-middle attacks by compromising a single session key. EURECOM researcher Daniele Antonioli reveals that the attacks exploit flaws in Bluetooth's session key derivation mechanism, allowing the derivation of the same key across sessions.

The Attack Mechanism

BLUFFS weaponizes four architectural vulnerabilities in the Bluetooth session establishment process, including two new flaws, to derive a weak session key. This enables an AitM attacker to impersonate a paired device and negotiate connections using legacy encryption, thus forcing the use of the same encryption key for every session.

SIG's Recommendations and Mitigation

The Bluetooth Special Interest Group (SIG) advises Bluetooth implementations to reject service-level connections with low key strengths and recommends operating devices in "Secure Connections Only Mode" to ensure key strength. This follows the disclosure of a similar Bluetooth impersonation attack on Apple macOS systems by ThreatLocker.

Bandook: The Resurgent Malware Targeting Windows

Fortinet’s FortiGuard Labs experts have unearthed a new threat to Windows devices: a revised version of the Bandook malware. First identified in 2007, Bandook was known for providing remote access to infected endpoints.

Bandook's New Tactics

The latest iteration of Bandook is being spread through phishing emails containing malicious PDF files. These PDFs include links to a password-protected .7z archive. Once the victim extracts the malware, it injects its payload into the legitimate Windows binary msinfo32.exe, often used for diagnosing computer issues.

Registry Manipulation and Persistence

Bandook modifies the Windows Registry to maintain persistence and connects to a command-and-control (C2) server for further instructions. The usual commands include a stage-two payload, giving attackers full access to the victim's system.

Bandook's Capabilities and Evolution

The malware's functionalities span file manipulation, information stealing, and controlling the victim's computer. Bandook, which means "gun" in Hindi, has been sporadically appearing over the years. In 2020, researchers found numerous digitally signed variants of this malware, targeting a wide variety of sectors and locations, suggesting it's part of a broader offensive cyber infrastructure used globally by governments and threat actors.