{"id":5755,"date":"2016-07-14T21:35:39","date_gmt":"2016-07-14T21:35:39","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=5755"},"modified":"2020-02-26T11:10:06","modified_gmt":"2020-02-26T16:10:06","slug":"anti-mitm-patent","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/anti-mitm-patent\/5755\/","title":{"rendered":"Isn&#8217;t anyone in the middle?"},"content":{"rendered":"<p>We are pleased to introduce a major reinforcement in our arsenal of security technologies: Kaspersky Lab has patented technology enabling our software to detect man-in-the-middle (MitM) attacks, beloved of authors of financial malware. It is our hope that the technology will greatly reduce the profitability of such scams.<\/p>\n<p>We began development several years ago, after mobile banking had gained real popularity. Once people were increasingly using online payment applications, cybercriminals followed, becoming more adept at stealing money electronically. One of the most common techniques still regularly used in banking malware involves compromising the communication channel \u2014 the MitM attack.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Isn\u2019t anyone in the middle? #MITM #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FP8ei&amp;text=Isn%26%238217%3Bt+anyone+in+the+middle%3F+%23MITM+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>During an MitM attack, an attacker essentially intercepts the information-exchange channel between the bank and the client, substituting the data the client receives. That is, the mobile application is not communicating with the bank as the user assumes, but rather it sends information to an outside system. At the same time, cybercriminals handle communications with the bank (with obvious results). The specific scenarios enabling such attacks are numerous, as are the technologies that fraudsters use. Some examples are DNS spoofing (poisoning the DNS server\u2019s cache), replacing security certificates, public wireless networks parasitizing, and intercepting the traffic on the device side by means of malware with elevated system privileges, but there are more.<\/p>\n<p>We decided to create technology that would let banks identify a MitM attack \u2014 regardless of which techniques attackers used. In other words, our task was to come up with a method that would enable client\u2019s device to make sure that it is indeed the bank\u2019s information system on the other side of the connection. Kaspersky Lab\u2019s method rechecks data sent to the financial application to ensure it really came from the bank.<\/p>\n<p>Let\u2019s see how it works in a typical attack, say through an open Wi-Fi network in a caf\u00e9. A user tries to access a bank account using the bank\u2019s official application, but the caf\u00e9 network is under the control of cybercriminals. When the user opens with the banking application, the compromised network prevents the app from establishing an https connection, thus forcing the user to use a browser instead. The browser tries to establish an unprotected http connection with the bank\u2019s site, but somewhere in the caf\u00e9\u2019s router, the http request is redirected to a malicious server, where a fake copy of the required site is deployed. When the user enters his or her username and password, the crooks capture the credentials.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>We decided to create technology that would let banks identify a #MitM attack, no matter\u00a0techniques attackers used. #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FP8ei&amp;text=We+decided+to+create+technology+that+would+let+banks+identify+a+%23MitM+attack%2C+no+matter%C2%A0techniques+attackers+used.+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>A key aspect of this attack is that, when trying to imitate the banking site\u2019s behavior, the server sends a response to the request. Despite all attempts to copy a legitimate response, the fake response simply can\u2019t be identical. And that is where our technology intervenes: It allows the resending of the received response and compares that with the data the user should have received from the real bank.<\/p>\n<p>This technology has the potential to do more than just reveal the fact of a MitM attack; it can also detect the point at which attackers interposed their instructions in the communication channel. In a perfect world that might help you find the criminals.<\/p>\n<p>The anti-MitM technology is already in Kaspersky Lab\u2019s products, including <a href=\"https:\/\/www.kaspersky.com\/advert\/enterprise-security\/fraud-prevention?redef=1&amp;THRU&amp;reseller=gl_kbusinesspost_pro_ona_smm__onl_b2b_kbusiness_lnk_______\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Fraud Prevention<\/a>, which, among other things, protects online banking processes on Android and iOS systems.<\/p>\n<p>Want to read the patent? You\u2019ll find it on the <a href=\"http:\/\/pdfpiw.uspto.gov\/.piw?docid=09386031\" target=\"_blank\" rel=\"noopener nofollow\">USPTO website<\/a>. Do not let the name \u201cSystem and Method for Detection of Targeted Attacks\u201d fool you: The term <em>targeted attacks<\/em> typically applies to attacks aimed at a particular organization, but MitM is tailored for a specific task, and so we call it a \u201ctargeted attack,\u201d too.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Lab has patented technology enabling our software to detect man-in-the-middle (MitM) attacks, beloved of authors of financial malware. <\/p>\n","protected":false},"author":424,"featured_media":15350,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[111,1519,2444,192],"class_list":{"0":"post-5755","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-attacks","10":"tag-mitm","11":"tag-patent","12":"tag-protection"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/anti-mitm-patent\/5755\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/anti-mitm-patent\/3905\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/anti-mitm-patent\/12160\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/anti-mitm-patent\/5755\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/anti-mitm-patent\/5755\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/attacks\/","name":"attacks"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5755","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/424"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=5755"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5755\/revisions"}],"predecessor-version":[{"id":33716,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5755\/revisions\/33716"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15350"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=5755"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=5755"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=5755"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}