Music – and malware – while you work

A blog from Trusteer’s Dana Tamir points out that media players – so regularly used by people while they work yet often overlooked by security professionals  – are also becoming a prime target for sneaking malware into systems

  • 10 years ago Posted in

OK, hands up all those who like listening to music while they are working? The majority of people seem to like it, and rather than the old ways of everyone listening to a collective radio broadcast or some somnolent musak, a set of headphone and a PC with a media player serves extremely well these days.

But a recent blog by Dana Tamir, director of enterprise security at the IBM-owned security specialist, Trusteer, shows that this apparently harmless – and even productive – pastime is actually fraught with security dangers.

The company’s researches have demonstrated that vulnerable media players are constantly targeted by hackers, and that many security professionals maybe missing this important loophole because media players are most commonly used by individuals, on their own PC and usually in their own time.

But with the growth of BYOD, and the cross-pollination of work and play on and between laptop systems, means that the humble and apparently harmless media player is fast becoming a major route in to hacking and infiltrating corporate networks. Microsoft PCs come with a integral media player, and there are many variants that can be downloaded from the web.

As Tamir pointed out in the blog: “because these applications are not controlled, and users are not in a rush to patch these applications, most installations are vulnerable to exploits.”

She points out that, according to the US National Vulnerabilities Database (NVD), over 1,200 vulnerabilities have been discovered in media players since 2000. Most of them have been found in the most popular programs, with Apple’s Quicktime and  iTunes leading the way, both with over 250 vulnerabilities identified.

The major reason for media players to have become a target is that they are designed to work with files delivered remotely, such as streaming music and video. “By developing weaponized media content, i.e. an audio or video file that contains an exploit that takes advantage of a media player vulnerability, an attacker can effectively deliver malware to the user’s machine,” Tamir wrote in the blog.

“All that is left for the attacker is to send the weaponized file to the target user, or convince a target user to view the content from a compromised website using phishing and social engineering schemes. Typical examples include “promotional videos”, links to “free” song downloads and more.”

And most important of all, she points out that this is no theoretical threat. Exploits have been seen in the wild that target both known and unknown zero-day vulnerabilities in media players. And while many vulnerabilities have patches available, the level of their deployment is still poor , so known vulnerabilities are open to exploitation.

So this is another application area that security professionals need to add to their checklists. As well as recommending a Trusteer product, as might be expected, Tamir also restates the important, if obvious, security best practice: always apply security patches to vulnerable applications as soon as they become available.

But she also recommends investing in technologies that can block both known and unknown vulnerabilities, such as Trusteer Apex.

New state-of-the-art data centre features Vultr’s first AMD GPU supercompute cluster.
Only a quarter (25%) think their approach to the cloud is carefully considered and successful.
Moving to AWS Cloud will enable The Co-operative Bank to adopt cutting edge IT Infrastructure.
The global airline group will upgrade the value of its data and get its AI & generative AI ready...
Barracuda Networks’s award-winning Email Protection and Cloud Backup security solutions will be...
Leading company in renewables to leverage HPE’s unique turnkey AI infrastructure solution to...
The four-year project extension focuses on cloud transformation and enhanced operational efficiency...
Businesses in the UK are risking slower development as they fail to fully embrace technologies that...