Skip to content

Latest commit

 

History

History
52 lines (43 loc) · 2.39 KB

README.md

File metadata and controls

52 lines (43 loc) · 2.39 KB

IoCs & Detection

This page contains an overview of any detection and mitigation software regarding the SpookySSL vulnerability. On this page NCSC-NL will maintain a list of all known rules to detect SpookySSL presence or (suspected) exploitation. Furthermore, any references will contain specific information regarding detection and mitigation.

NCSC-NL has not verified the rules and software listed below and therefore cannot guarantee the validity of said rules. However, NCSC-NL strives to provide rules and detection and mitigation software from reliable sources.

Suricata Rules

Rule from Fox-IT Security Research Team:

alert tls any any -> any any (msg:"FOX-SRT - Exploit - Possible SpookySSL Certificate Observed (CVE-2022-3602)"; \
    flow:established; \
    content:"|2b 06 01 05 05 07 08 09|"; fast_pattern; \
    content:"|06 03 55 1d 1e|"; content:"xn--"; \
    content:!"|81|"; distance:-6; within:1; byte_test:2,>=,500,-6,relative; \
    classtype:attempted-user; threshold:type limit,track by_src,count 1,seconds 3600; \
    reference:url,www.openssl.org/news/secadv/20221101.txt; \
    reference:url,https://github.com/fox-it/spookyssl-pcaps; \
    metadata:ids suricata; \
    metadata:created_at 2022-11-02; sid:21004268; rev:3;)

Example PCAPs

PCAP Description
spookyssl-windowscrash.pcap Created using the Windows Crash PoC from DataDog
spookyssl-malicious_client.pcap Created using the malicious_client PoC from DataDog
spookyssl-malicious_server.pcap Created using the malicious_server PoC from DataDog
not-spookyssl-certificate.pcap Legitimate punycode certificate (not malicous)

For further context, see https://github.com/fox-it/spookyssl-pcaps