Address Space Layout Randomization (ASLR) scrambling memory positions of program elements in Windows Sophisticated attackers could soon adopt an innovative technique for bypassing one of the most effective mechanisms for preventing a Windows security breach, researchers say. [10 commandments of Windows security]The protective technique is called the Address Space Layout Randomization (ASLR). ASLR scrambles the memory positions of key elements of a program, such as the base of the executable and the positions of the stack, heap and libraries. This makes it difficult for an attacker to guess where these elements reside in order to exploit them. Current trends in malware show attackers moving toward an ASLR bypass technique that takes advantage of common programming errors that lead to memory corruption, which is when the contents of a memory location are unintentionally modified. Nearly 10 percent of application crashes on Windows systems are due to memory corruption. If the corruption exists, then the attacker’s malware tries to guess where an application’s library is in memory, researchers with security vendor FireEye said Wednesday. “One way they can do that is by reading memory that they’re not suppose to,” Dan Caselden, senior malware researcher for FireEye, said. “Somewhere in memory they’ll be a pointer to a library. If they can read that pointer then they can figure out where that library is.” To find the pointer, the attacker corrupts a JavaScript Array Object, so address data spills out into memory. The attacker uses the information to find the library needed to compromise the application. “The corruption vulnerability is the same that they use to get code control or code execution,” Caselden said. In general, any vulnerability that allows an attacker to force an element in memory to expose data outside of its parameter can be exploited through this technique. Such vulnerabilities could exist in Internet Explorer, Microsoft Office or many other applications. The most successful hackers would be those who find an unknown vulnerability and are sophisticated enough to mount such a complicated attack. “We believe that in the future we will see more and more zero-day exploits using similar or more advanced techniques; we may need new mitigations in our OSs (operating systems) and security products to defeat them,” Xiaobo Chen, senior security researcher for FireEye, said in the company’s blog. [Researchers demo exploits that bypass Windows 8 secure boot]The most likely attackers would be those who are paid handsomely to steal sensitive documents from large organizations, defense contractors and government agencies. “It’s definitely an advanced technique,” Caselden said. “Most likely you would see it used in an APT (advanced persistent threat) or by a nation state.” Related content news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe