ÇØÄ¿Áî´º½º / ÇØÄ¿´ëÇÐ

Donation bitcoin(±âºÎ¿ë ºñÆ®ÄÚÀÎ ÁÖ¼Ò)

¡¡
1Pq3K39XM5xx4CifGKgppXeavtWNNHH7K4
¡¡
±âºÎÇϽŠºñÆ®ÄÚÀÎÀº "º¸¾È Ãë¾à °èÃþ"À» À§ÇØ »ç¿ëµÇ°í ÀÖ½À´Ï´Ù.
¡¡
¡¡

Donation bitcoin(±âºÎ¿ë ºñÆ®ÄÚÀÎ ÁÖ¼Ò)

¡¡
1Pq3K39XM5xx4CifGKgppXeavtWNNHH7K4
¡¡
±âºÎÇϽŠºñÆ®ÄÚÀÎÀº "º¸¾È Ãë¾à °èÃþ"À» À§ÇØ »ç¿ëµÇ°í ÀÖ½À´Ï´Ù.
¡¡

°øÁö

¡¡

1. MS ¿§Áö ºê¶ó¿ìÀú¿¡¼­ÀÇ °æ°íâÀº 'À©µµ¿ì µðÆæ´õ'¸¦ ²ô½Ã¸é µË´Ï´Ù.

             'À©µµ¿ì µðÆæ´õ ²ô±â'

2. Å©·Ò ºê¶ó¿ìÀú·Î Á¢¼Ó½Ã ³ª¿À´Â ¾Ç¼ºÄÚµå °æ°íâÀº ±¸±Û Å©·ÒÀÇ ¿¡·¯, Áï ¿ÀŽ(ŽÁö ¿À·ù)À̹ǷΠ¹«½ÃÇÏ½Ã¸é µË´Ï´Ù.

3. ÀÌ »çÀÌÆ®´Â ¾ÈÀüÇÏ¸ç ±ú²ýÇÏ´Ù´Â °ÍÀ» ¾Ë·Á µå¸³´Ï´Ù.

4. ¹«°íÇÑ »çÀÌÆ®µé¿¡ ´ëÇÑ °ø·æ ±â¾÷ ºê¶ó¿ìÀúµéÀÇ ¹«Â÷º°ÀûÀÎ 'ŽÁö ¿À·ù ȾÆ÷'°¡ »ç¿ëÀÚµéÀÇ Á¤º¸ °øÀ¯ÀÇ ÀÚÀ¯¸¦ ħÇØÇÏ°í ÀÖ½À´Ï´Ù. ÀÌ¿¡ ´ëÀÀÇÏ¿© ÀÌ ±â¾÷µéÀ» »ó´ë·Î ¼Ò¼ÛÀ» ÁغñÇÏ°í ÀÖ½À´Ï´Ù.

¡¡





  ÇØÄ¿¸ô  
No, 3895
±¸ºÐ: Á¤º¸
Á¾·ù: ±âŸ
ÆÄÀÏÇüÅÂ: Á¤º¸
¶óÀ̼¾½º: Á¤º¸
Áö¿øOS: Á¤º¸
Å©·¢¿©ºÎ: Á¤º¸
2019/9/29(ÀÏ)
Á¶È¸: 1102
DLL Side-Loading ±â¹ýÀ̶õ?  

DLL Side-Loading ±â¹ýÀ̶õ, ¾ÈƼ¹ÙÀÌ·¯½º S/W¿¡ ÀÇÇØ Å½ÁöµÇ´Â °ÍÀ» ȸÇÇÇϱâ À§ÇÏ¿©, ¾Ç¼ºÄÚµå(malware)¸¦ ÀüÆÄÇÏ´Â °ø°ÝÀÚµéÀÌ »ç¿ëÇÏ´Â ±â¹ý ÁßÀÇ ÇϳªÀÎ µ¥, Windows OSÀÇ DLL loading ¸ÞÄ«´ÏÁòÀ» ¾Ç¿ëÇÑ ±â¹ýÀÔ´Ï´Ù. DLL Hijacking, DLL Preloading, DLL Planting ±â¹ýÀ¸·Îµµ ºÒ¸°´Ù°í ÇÕ´Ï´Ù.

Windows ApplicationÀº ½ÇÇàÇÏ´Â µµÁß¿¡, ÇÊ¿äÇÑ libraryÀ» loadÇÏ¿© callÇÏ´Â ±â¹ýÀ» »ç¿ëÇÕ´Ï´Ù. ÇÊ¿äÇÑ ½ÃÁ¡¿¡ µ¿ÀûÀ¸·Î loadÇÑ´Ù°í Çؼ­ Dynamic Linking Library ¶ó°í ºÎ¸£¸ç DLL·Î Ç¥½ÃÇÕ´Ï´Ù. ApplicationÀÌ »ç¿ëÇÏ´Â DLL À̸§Àº Application ³»ºÎ¿¡ ±â·ÏÀÌ µÇ¾î ÀÖÁö¸¸, DLLÀÇ À§Ä¡´Â Application ³»ºÎ¿¡ ÁöÁ¤ µÇ¾î ÀÖÀ» ¼öµµ ÀÖ°í ¾øÀ» ¼öµµ ÀÖ½À´Ï´Ù. ¸¸¾à DLL À§Ä¡°¡ ÁöÁ¤µÇ¾î ÀÖÁö ¾Ê´Ù¸é, Windows´Â OS ³»ºÎ¿¡¼­ ¹Ì¸® Á¤ÀÇÇÑ ¼ø¼­´ë·Î DLLÀ» ã°Ô µË´Ï´Ù.

Âü°í·Î, Windows OS ¿¡¼­ DLLÀ» SearchÇÏ´Â ¼ø¼­´Â ¾Æ·¡¿Í °°½À´Ï´Ù.

1) ApplicationÀÌ load µÈ Directory

2) ÇöÀç Directory

3) ½Ã½ºÅÛ Directory

4) 16ºñÆ® ½Ã½ºÅÛ Directory

5) Windows Directory

6) PATH ȯ°æ º¯¼ö¿¡ ³ª¿­µÈ Directory

ÀÌ·¯ÇÑ DLL Search ¸ÞÄ¿´ÏÁòÀ» ¾Ç¿ëÇÏ¿©, ƯÁ¤ ApplicationÀÌ »ç¿ëÇÏ´Â DLL ´ë½Å, ¾Ç¼ºÄڵ尡 µé¾î ÀÖ´Â DLLÀ», OS°¡ ¸ÕÀú Search ÇÏ¿© loading µÇµµ·Ï ÇÏ¿©, ¾Ç¼ºÄڵ尡 ½ÇÇàµÇ¾îÁöµµ·Ï ÇÏ´Â °ÍÀÔ´Ï´Ù. ¹°·Ð ÀÌ ¶§ ¾Ç¼ºÄڵ尡 µé¾î ÀÖ´Â DLLÀÇ À̸§Àº Á¤»óÀûÀÎ DLL À̸§°ú µ¿ÀÏÇÏ°Ô rename ÇØ µÎ¾î¾ß ÇÕ´Ï´Ù.

DLL Side-Loading ±â¹ýÀ» »ç¿ëÇÏ´Â ÀýÂ÷¸¦, °ø°ÝÀÚÀÇ ÀÔÀå¿¡¼­ ±â¼úÇØ º¸¾Ò½À´Ï´Ù.

1) ¸ÕÀú DLL¿¡ ´ëÇÑ full path°¡ hard-coding µÇ¾î ÀÖÁö ¾ÊÀº ApplicationÀ» ¼±ÅÃÇÕ´Ï´Ù. DLL Side-Loading¸¦ »ç¿ëÇÏ´Â ÁÖ ¸ñÀûÀÌ, ¾ÈƼ¹ÙÀÌ·¯½º S/W¿¡ ÀÇÇÑ Å½Áö¸¦ ÇÇÇϱâ À§ÇÑ °ÍÀ̹ǷÎ, ¾ÈƼ¹ÙÀÌ·¯½º S/W¿¡ ÀÇÇØ White-listµÇ¾î ÀÖ´Â Application Áß¿¡¼­ ¼±ÅÃÇØ¾ß ÇÕ´Ï´Ù. À¯¸í Vendor¿¡¼­ »ç¿ëÇÏ°í ÀÖ´Â ApplicationÀº ´ë°³ White-list·Î µî·ÏµÇ¾î ÀÖ½À´Ï´Ù.

2) ApplicationÀ» ¼±ÅÃÇÏ¿´À¸¸é, ÇØ´ç Application¿¡¼­ »ç¿ëÇÏ°í ÀÖ´Â DLLÀ» Çϳª ¼±ÅÃÇÏ¿©, DLL¿¡ Á¤ÀǵǾî ÀÖ´Â functionµéÀ» °¡Áø °¡Â¥ DLLÀ» Çϳª ¸¸µì´Ï´Ù. ¹°·Ð °¡Â¥ DLL¿¡´Â ¾Ç¼ºÄڵ嵵 Æ÷ÇÔ½ÃÄÑ µÎ°í DLLÀÌ loadµÉ ¶§, ¾Ç¼ºÄڵ尡 ½ÇÇàµÇµµ·Ï ÇÕ´Ï´Ù.

3) ApplicationÀ» ´Ù¸¥ À̸§À¸·Î º¯°æÇÑ ´ÙÀ½¿¡, °¡Â¥ DLL°ú ÇÔ²² »ç¿ëÀÚÀÇ Æ¯Á¤ Directory¿¡ ´Ù¿î·Îµå ½Ãŵ´Ï´Ù.

4) »ç¿ëÀÚ·Î ÇÏ¿©±Ý, ƯÁ¤ Directory¿¡ ÀÖ´Â, ´Ù¸¥ À̸§À¸·Î º¯°æ µÇ¾î ÀÖ´Â ApplicationÀ» ½ÇÇàÇϵµ·Ï À¯µµÇÕ´Ï´Ù.

5) ÇØ´ç ApplicationÀÌ ½ÇÇàµÇ¸é¼­, °°Àº Directory¿¡ ÀÖ´Â DLLÀÌ ¸ÕÀú ¼±ÅõǾî Load µË´Ï´Ù. ÀÌ DLLÀº ¾Ç¼ºÄڵ带 °¡Áö°í ÀÖ´Â DLL À̸ç, Load µÇ¸é¼­ ¾Ç¼ºÄڵ尡 ½ÇÇàµÇ¾îÁöµµ·Ï µÇ¾îÀÖ½À´Ï´Ù.  ÇÏÁö¸¸ ¾ÈƼ¹ÙÀÌ·¯½º S/W´Â White-list¿¡ ¼ÓÇØ ÀÖ´Â ApplicationÀÌ ½ÇÇàµÇ´Â °ÍÀ¸·Î ¾Ë°í Àֱ⠶§¹®¿¡(¾ÈƼ¹ÙÀÌ·¯½º S/W´Â Application À̸§À» °¡Áö°í ºñ±³ÇÏÁö ¾Ê°í, Çؽ¬°ª Áï Signature°ªÀ» °¡Áö°í ºñ±³ÇÕ´Ï´Ù), ¾Ç¼ºÄڵ尡 ½ÇÇàµÇ´Â °ÍÀ» ŽÁöÇÏÁö ¸øÇÕ´Ï´Ù.

DLL Side-Loading ±â¹ýÀº ÁÖ·Î APT ±×·ì¿¡¼­ »ç¿ëÇÑ´Ù°í ÇÕ´Ï´Ù. Âü°í·Î, ±¹°¡°¡ Áö¿øÇÏ´Â ÇØÅ· ´ÜüµéÀº ´ëºÎºÐ APT ±×·ìÀ¸·Î ºÐ·ùÇÏ°í ÀÖ½À´Ï´Ù.

ÃÖ±Ù¿¡(2019.7.25) ±â»ç·Î º¸µµµÈ, SectorF01 ¶ó ºÒ¸®´Â ÇØÅ· GroupÀÌ Cyber Espionage Campaign(»çÀ̹ö øº¸ È°µ¿)À» ¼öÇàÇϸ鼭, DLL Side-Loading ±â¹ýÀ» »ç¿ëÇÏ¿´´Ù°í ÇÕ´Ï´Ù.

Âü°í·Î, SectorF01 GroupÀÌ »ç¿ëÇÑ Application À̸§°ú, TargetÀ¸·Î ÇÑ ³ª¶ó´Â ¾Æ·¡¿Í °°´Ù°í ÇÕ´Ï´Ù.

Microsoft Office Word (WINWORD.EXE)

Windows Search (SearchIndexer.exe)

Windows Search (SearchProtocolHost.exe)

Google Update (GoogleUpdate.exe)

Adobe AcroTranscoder (AcroTranscoder.exe)

Adobe Flash Player Control Panel Applet (FlashPlayerApp.exe)

Adobe Acrobat 3D Utility (A3DUtility.exe)

WeChat (WeChat.exe)

Coc Coc Browser Update (CocCocUpdate.exe)

360äÌîï浏览Ðï (360 Secure Browser) (360se.exe)

60软Ëìηʫ (360 Software Manager) (SoftManager.exe)

Neuber Software Typograf font manager (FontSets.exe)

McAfee VirusScan On-Demand Scan (mcods.exe)

McAfee Oem Module (mcoemcpy.exe)

Symantec Network Access Control (rastlsc.exe)

Kaspersky Anti-Virus Installation assistant host (avpia.exe)

Kaspersky Light Plugin Extension Registrar (plugins-setup.exe)

Avast Antivirus remediation (wsc_proxy.exe)

Vietnam, China, Cambodia, Laos,Thailand, Myanmar, Phillipines, Malaysia, Indonesia, Singapore, Japan, South Korea



                   
¹øÈ£±¸ºÐÁ¦ ¸ñÀ帣
3898 ¼Ò½º    ¸»·¹ÀÌ½Ã¾Æ ÇØÄ¿ÀÇ DIOS 1 SQLi 
3897 Á¤º¸    ¿ÀǼҽº SQLi µµ±¸ 10¼± - 2018 ÀÎÁ§ÅÍ 
3896 Á¤º¸    sql ÀÎÁ§¼Ç ¹æ¾î µµ±¸ 3°¡Áö Injection 
3895 Á¤º¸    DLL Side-Loading ±â¹ýÀ̶õ? ±âŸ  
3894 À¯Æ¿    ºñÆ®ÄÚÀÎ Stealr Stealer 
3893 À¯Æ¿    SAS Å©·¢ ¹öÀü RAT 
3892 À¯Æ¿    0day Exploit collection - 14°³ Exploits 
3891 Á¤º¸    °­·ÂÇÑ À©µµ °ø°Ýµµ±¸ ºí·çŵ ¼ºÇà °ø°ÝÅø 
3890 ¿ø¼­    Mastering C++ Programming 
3889 Á¤º¸    Top 10 '¹ö±× ¹Ù¿îƼ' µµ±¸ Bug bounty 
3888 Á¤º¸    ÇØÅ· °ü·Ã Á¤º¸ Á¦°ø »çÀÌÆ® ¸ðÀ½ À¥ÇØÅ· 

 
óÀ½ ÀÌÀü ´ÙÀ½       ¸ñ·Ï