Most active commenters
  • (5)
  • firesteelrain(3)
  • wongarsu(3)

←back to thread

Cyber Scarecrow

(www.cyberscarecrow.com)
606 points toby_tw | 55 comments | | HN request time: 0.918s | source | bottom
Show context
scosman ◴[] No.40715334[source]
Fun concept.

If the creators read this, I suggest some ways of building trust. There’s no “about us”, no GitHub link, etc. It’s a random webpage that wants my personal details, and sends me a “exe”. The overlap of people who understand what this tool does, and people who would run that “exe” is pretty small.

replies(7): >>40715364 #>>40715425 #>>40715446 #>>40715473 #>>40716059 #>>40716538 #>>40723731 #
1. CyberScarecrow ◴[] No.40715473[source]
Author of cyber scarecrow here. Thank you for your feedback, and you are 100% right. We also dont have a code signing certificate yet either, they are expensive for windows. Smartscreen also triggers when you install it. Id be weary of installing it myself as well, especially considering it runs as admin, to be able to create the fake indicators.

I have just added a bit of info about us on the website. I'm not sure what else we can do really. Its a trust thing, same with any software and AV vendors.

replies(18): >>40715568 #>>40715665 #>>40715733 #>>40716043 #>>40716134 #>>40716229 #>>40716260 #>>40716317 #>>40716684 #>>40716889 #>>40719030 #>>40719198 #>>40719439 #>>40720186 #>>40720416 #>>40720493 #>>40723898 #>>40727328 #
2. Z7YCx5ieof4Std ◴[] No.40715568[source]
Is it possible to fake being from Russia. I heard some malware won't install on computers from Russia or with the Russian language as primary language
replies(5): >>40715581 #>>40715770 #>>40715873 #>>40716728 #>>40718388 #
3. CyberScarecrow ◴[] No.40715581[source]
Great idea. Looking at installing an additional keyboard or language with out it being anoying to the user is next on the feature list.
replies(1): >>40715771 #
4. kiney ◴[] No.40715665[source]
Not very convincing tbh. Theres's no source code and no real name or company on the website...
5. efilife ◴[] No.40715733[source]
It ceases to be a trust thing once you open source the code
replies(1): >>40719834 #
6. n2d4 ◴[] No.40715770[source]
This can have the opposite effect too: https://arstechnica.com/information-technology/2022/03/sabot...
7. llama_drama ◴[] No.40715771{3}[source]
This might be not a good idea. There are some reports of malware (npm packages, iirc) specifically targeting russian computers since the invasion
8. kozak ◴[] No.40715873[source]
And be targeted by cyberwarfare from the first-world side.
9. ◴[] No.40716043[source]
10. beeboobaa3 ◴[] No.40716134[source]
github link? if it's not open source it's dead on arrival
11. AnthonyMouse ◴[] No.40716260[source]
> We also dont have a code signing certificate yet either, they are expensive for windows.

When someone is offering you a certificate and the only thing you have to do in order to get it is pay them a significant amount of money, that's a major red flag that it's either a scam or you're being extorted. Or both. In any case you should not pay them and neither should anyone else.

replies(3): >>40716777 #>>40717182 #>>40717330 #
12. yamakadi ◴[] No.40716317[source]
I’m sure it’s closed source for the eventual plans to monetize it, but what’s the real difference to something like https://github.com/NavyTitanium/Fake-Sandbox-Artifacts and why can’t you at least name yourselves?

Not many software promises to fend off attackers, asks for an email address before download, and creates a bunch of processes using a closed source dll the existence of which can easily be checked.

Then again, not many malware targeting consumers at random check for security software. You are more likely to see a malware stop working if you fake the amount of ram and cpu and your network driver vendor than if you have CrowdStrike, etc. running.

replies(1): >>40722597 #
13. twixfel ◴[] No.40716684[source]
There are things that you can do that make you seem trustworthy, and you've done none of them.
14. DougN7 ◴[] No.40716728[source]
Or has the Russian keyboard installed, even if not used IIRC.
15. DougN7 ◴[] No.40716777[source]
Besides paying money you also go through a (pretty simplistic) audit. It’s about the only way we have to know who published some code, which is important. If you can come up with a better way you should implement it and we’ll all follow.

As a side note, I’ve been trying to figure out how to get an EV code signing cert that isn’t tied to me (want to make a tool Microsoft won’t like and don’t want retaliation to hurt my business) but I haven’t come up with a way to do it - which is a good thing I suppose.

replies(1): >>40718312 #
16. hyperific ◴[] No.40716889[source]
Something that would have built trust with me that I didn't find on the site was any mention of success rate. Surely CyberScarecrow has been tested against known malware to see if the process successfully thwarts an attack.
17. firesteelrain ◴[] No.40717182[source]
There's a reason it costs money and it's because the CAs have to undergo costly audits. Microsoft publishes a list of trusted CAs:

https://ccadb.my.salesforce-sites.com/microsoft/IncludedCACe...

replies(1): >>40717737 #
18. hluska ◴[] No.40717330[source]
There’s an audit to go through where you (sort of) prove who you are. The system isn’t great, but if you can come up with something better there’s a lot of space to make software more secure for people.
19. a1o ◴[] No.40717737{3}[source]
This looks like a random website and not a Microsoft website. How could I trust such list?
replies(1): >>40717888 #
20. firesteelrain ◴[] No.40717888{4}[source]
Because it came from this site: https://learn.microsoft.com/en-us/security/trusted-root/part...

I used Google to search for "list of microsoft trusted CA".

replies(1): >>40720899 #
21. hunter2_ ◴[] No.40718312{3}[source]
Can you have someone else go through the process of getting it, like a Craigslist rando to whom you pay cash?
replies(1): >>40719796 #
22. whaleofatw2022 ◴[] No.40718388[source]
Russia has serious penalties for hacking their citizens.

Not for hacking non citizens

23. px43 ◴[] No.40719030[source]
Obviously this should be an open source tool that people can build for themselves. If you want to sell premium services or upgrades for it later, you need to have an open/free tier as well.

Also are you aware of the (very awesome) EDR evasion toolkit called scarecrow? Naming stuff is hard, I get that, but this collision is a bit much IMO.

https://github.com/Tylous/ScareCrow

24. bryant ◴[] No.40719198[source]
It's a neat concept, although I imagine this'll be a cat and mouse endeavor that escalates very quickly. So, a suggestion - apply to the Open Technology Fund's Rapid Response Fund. I'd probably request the following in your position:

* code signing certificate funding

* consulting/assessment to harden the application or concept itself as well as to make it more robust (they'll probably route through Cure53)

* consulting/engineering to solve for the "malware detects this executable and decides that the other indicators can be ignored" problem, or consulting more generally on how to do this in a way that's more resilient.

If you wanted to fund this in some way without necessarily doing the typical founder slog, might make sense to 501c3 in the US and then get funded by or license this to security tooling manufacturers so that it can be embedded into security tools, or to research the model with funding from across the security industry so that the allergic reaction by malware groups to security tooling can be exploited more systemically.

I imagine the final state of this effort might be that security companies could be willing to license decoy versions of their toolkits to everyone that are bitwise identical to actual running versions but then activate production functionality with the right key.

replies(2): >>40720087 #>>40720128 #
25. rft ◴[] No.40719439[source]
Concerning code signing: Azure has a somewhat new offering that allows you to sign code for Windows (SmartScreen compatible) without having an EV cert. It is called "Trusted Signing" [1], non-marketing docs [2]. The major gotcha is that currently you need to have a company or similar entity 3 years or older to get public trust. I tried it with a company younger than 3 years and was denied. You might have a company that fits that criteria or you might get lucky.

The major upside is the pricing: currently "free" [3] during testing, later about 10 USD/month. As there doesn't seem to be a revocation mechanism based on some docs I read, signed binaries might be valid even after a canceled subscription.

[1] https://azure.microsoft.com/en-us/products/trusted-signing

[2] https://learn.microsoft.com/en-us/azure/trusted-signing/quic...

[3] You need a CC and they will likely charge you at some point. Also I had to use some kind of business Azure/MS 365 account which costs about 5 USD/month. Not sure about the exact lingo, not an Azure/MS expert. The docs in [2] was enough for me to get through the process.

replies(1): >>40722021 #
26. wongarsu ◴[] No.40719796{4}[source]
If said Craigslist rando likes getting police visits and potentially being criminally liable for helping you commit a felony ...

All code signing promises to give you the name of a real person or company that signed the binary. From there it's the end user's responsibility to decide if they trust that entity.

In practice the threat of the justice system makes any signed executable unlikely to be malicious. But that doesn't mean you have to uncritically trust a binary signed by Joe Hobo

replies(1): >>40722040 #
27. wongarsu ◴[] No.40719834[source]
In a world where everybody builds from source or downloads from a trusted build service
replies(1): >>40720042 #
28. shadowgovt ◴[] No.40720042{3}[source]
... and trusts their entire toolchain hasn't been compromised.
29. sangnoir ◴[] No.40720087[source]
> consulting/engineering to solve for the "malware detects this executable and decides that the other indicators can be ignored" problem, or consulting more generally on how to do this in a way that's more resilient.

This would be a boon for security folk who analyze/reverse malware: they can add/simulate this tool in their VMs to ensure the malware being analyzed doesn't deactivate itself!

30. CodeWriter23 ◴[] No.40720128[source]
> decoy versions of their toolkits to everyone that are bitwise identical to actual running versions but then activate production functionality with the right key

I kinda think this functionality could be subverted into a kill switch for legit-licensed installs simply by altering the key.

replies(1): >>40720633 #
31. housebear ◴[] No.40720186[source]
Where is that additional info? It just says you're a group of security researchers, but there are no names, no verifiable credentials, nothing. You haven't really added any info that would contribute to any real trust.
replies(1): >>40725002 #
32. notreallyauser ◴[] No.40720416[source]
You're collecting personal info and claiming to be in the UK: identifying the data controller would be a start, both for building trust and complying with GDPR.
33. peter_l_downs ◴[] No.40720493[source]
One more thing you could do is put the real name of any human being with any track record of professionalism, anywhere on the website. Currently you're:

- commenting under a pseudonymous profile

- asking for emails by saying "please email me. contact at cyberscarecrow.com"

- describing yourself in your FAQ entry for "Who are you?" by writing "We are cyber security researchers, living in the UK. We built cyber scarecrow to run on our own computers and decided to share it for others to use it too."

I frequently use pseudonymous profiles for various things but they are NOT a good way to establish trust.

34. eganist ◴[] No.40720633{3}[source]
I mean, the existing licensing mechanisms can be similarly abused.
35. firesteelrain ◴[] No.40720899{5}[source]
Looks like people have no experience with CA audits or security controls
36. Tepix ◴[] No.40722021[source]
So $10+$5 per month versus $195 per year?

That's not a big discount.

replies(3): >>40722757 #>>40723282 #>>40723917 #
37. newzisforsukas ◴[] No.40722040{5}[source]
> In practice the threat of the justice system makes any signed executable unlikely to be malicious.

What threats are those? Where are all the people going to jail for falsely signed software? The stuxnet authors seem to be in the wind.

replies(1): >>40722161 #
38. wongarsu ◴[] No.40722161{6}[source]
The threat is that if you sign malware with your name you will be quickly connected with said malware. If you don't live in a country that turns a blind eye to cyber crime that is a quick ticket to jail.

Of course people stealing other people's signing keys is an issue. But EV code signing certificates are pretty well protected (requiring either a hardware dongle or 2FA). It's not impossible for a highly sophisticated attacker, but it's a pretty high bar.

39. mistercheph ◴[] No.40722597[source]
I am pretty sure this is just malware being upvoted with sockpuppet accounts, I'm surprised it hasn't been flagged.
replies(2): >>40723667 #>>40723707 #
40. jagged-chisel ◴[] No.40722757{3}[source]
64% is indeed a hefty discount
replies(2): >>40723247 #>>40723300 #
41. jonplackett ◴[] No.40723247{4}[source]
I have no idea of the costs but I am confused where that percentage came from. It doesn’t match anything not the parent comment.
replies(1): >>40723490 #
42. roblabla ◴[] No.40723282{3}[source]
Where'd you get $195/yr? EV certs are usually around $400/yr last I checked. In that sense, $10+$5/mo is a _huge_ discount.
43. ◴[] No.40723300{4}[source]
44. jrflowers ◴[] No.40723490{5}[source]
What percentage of 195 is 70?
replies(1): >>40725139 #
45. patcon ◴[] No.40723667{3}[source]
agreed
46. flexagoon ◴[] No.40723707{3}[source]
Are you talking about this GitHub script or the Scarecrow app?
replies(1): >>40723951 #
47. bzmrgonz ◴[] No.40723898[source]
How are you planning on preventing bad actors to identify scarecrow itself? You gonna randomize the name/processes etc?? Like anti-malware software do to install in stealth-mode??
replies(1): >>40723939 #
48. bzmrgonz ◴[] No.40723917{3}[source]
Don't you know.. microsoft doesn't believe in discounts. The evil-empire runs a taxing system envied by the IRS itself. Entire industries have gone up in arms complaining that M$ cloud price structure doesn't allow for third party margins and still they hold strong to their price structure.
49. ◴[] No.40723939[source]
50. maronato ◴[] No.40723951{4}[source]
The closed source one that asks for your email and has very little information about its developers.
51. archon810 ◴[] No.40725002[source]
Exactly. This continues to tell us absolutely nothing.

"Who are you?

We are cyber security researchers, living in the UK. We built cyber scarecrow to run on our own computers and decided to share it for others to use it too."

52. evanelias ◴[] No.40725139{6}[source]
$70 isn't correct though. The cost was originally described upthread as ($10 per month) + ($5 per month), not ($10 per year) + ($5 per month).

That said, EV certs jumped in price over the past couple years. The total cost ends up being higher than the list price -- vendors tack on a non-trivial extra fee for the USB hardware token and shipping. All-inclusive I paid like $450 a year ago, and that was after getting a small repeat-customer discount.

So yes, Azure's service is substantially cheaper than an EV cert. And it also has the flexibility of being a monthly plan, rather than an annual commitment.

replies(2): >>40725304 #>>40725317 #
53. ◴[] No.40725304{7}[source]
54. ◴[] No.40725317{7}[source]
55. IncognitoEntity ◴[] No.40727328[source]
I'd suggest putting down the actual authors. If you're UK based there should really be no issue in putting down each of the people involved and what their background in the industry is. Otherwise this just looks like a v1 to get people interested and v2 could include malware. Tbh it'd be quite a clever ploy if it is malware. Trust isn't built blindly, most smaller software creators always have their details known. I'd suggest if you want it to pick up traction, you have a full "about us" page.