How security professionals are being attacked: A study of malicious CVE proof of concept exploits in GitHub

10/15/2022
by   Soufian El Yadmani, et al.
0

Proof-of-concept (PoC) of exploits for known vulnerabilities are widely shared in the security community. They help security analysts to learn from each other and they facilitate security assessments and red teaming tasks. In the recent years, PoCs have been widely distributed, e.g., via dedicated websites and platforms, and also via public code repositories like GitHub. However, public code repositories do not provide any guarantees that any given PoC comes from a trustworthy source, or even that it simply does exactly what it is supposed to do. In this work we investigate PoCs shared on GitHub for known vulnerabilities discovered in 2017-2021. We discovered that not all PoCs are trustworthy. Some proof-of-concepts are fake (i.e., they do not actually offer PoC functionality), or even malicious: e.g., they attempt to exfiltrate data from the system they are being run on, or they try to install malware on this system. To address this issue, we have proposed an approach to detect if a PoC is malicious. Our approach relies on detecting the symptoms we have observed in the collected dataset, for example, calls to malicious IP addresses, encoded malicious code, or included Trojanized binaries. With this approach, we have discovered 4893 malicious repository out of 47313 repositories that have been downloaded and checked (i.e., 10.3 of malicious intent). This figure shows a worrying prevalence of dangerous malicious PoCs among the exploit code distributed on GitHub.

READ FULL TEXT

page 3

page 4

page 11

research
03/04/2020

Revisiting Security Vulnerabilities in Commercial Password Managers

In this work we analyse five popular commercial password managers for se...
research
10/03/2019

An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples

Software developers share programming solutions in Q A sites like Stac...
research
12/01/2020

Game Theoretic Malware Detection

Large software platforms (e.g., mobile app stores, social media, email s...
research
08/17/2023

RatGPT: Turning online LLMs into Proxies for Malware Attacks

The evolution of Generative AI and the capabilities of the newly release...
research
04/16/2017

A Security Monitoring Framework For Virtualization Based HEP Infrastructures

High Energy Physics (HEP) distributed computing infrastructures require ...
research
03/08/2022

Analyzing the Security of the Business Collaboration Platform App Model

Business Collaboration Platforms like Microsoft Teams and Slack enable t...
research
02/05/2021

Over 100 Bugs in a Row: Security Analysis of the Top-Rated Joomla Extensions

Nearly every second website is using a Content Management System (CMS) s...

Please sign up or login with your details

Forgot password? Click here to reset