In the wake of the current global outages caused by a faulty software update, cybercriminals will be targeting software updates/patches evermore

Spotting and preventing frame injections

Check Point Software has proffered the following tips to developers for mitigating frame injection risks effectively.

  1. Understand the risk
    The first step in spotting and preventing frame injections is understanding the technique. As mentioned, frame injections manipulate ordinary websites by adding malicious frames, often invisible to the average user. These frames can host phishing sites, misleading information, or malware downloads. Administrators should be vigilant and ensure that their web applications are not being abused to exploit visitors.
  2. Conduct regular code reviews
    Performing regular code reviews is an effective strategy for detecting potential vulnerabilities. It involves systematically reviewing all web applications’ source code to identify where frame injection could occur. For example, keep an eye out for areas in the code where user input is incorporated directly into web page content.
  3. Use security tools
    Leveraging security tools like Intrusion Detection Systems (IDS), vulnerability scanners, and web application firewalls can spot and alert teams to potential frame injection points in the code. Security tools are invaluable, but remember, they are not a like-for-like replacement for a thorough code review, and should be used in conjunction with the latter.
  4. Implement secure coding practices
    One secure coding practice is input validation: ensuring all user data is checked for appropriateness before use. Avoid using user input directly in web pages without proper sanitization. Also, consider enforcing “least privilege” principles, where each part of an application has only the permissions it needs to function.
  5. Escape user inputs
    Escaping user inputs guarantees that characters with a special meaning in HTML and JavaScript are neutralized, such that they display as normal text and cannot be used to alter the page’s structure. Special characters such as <, >, “, ‘, and & should be replaced with their respective HTML entities. This prevents a malicious user from injecting HTML or script code into the web pages.
  6. Use a Content Security Policy (CSP)
    This security standard helps prevent frame injection attacks by allowing developers to define which content sources are trusted, thus limiting the ability of an attacker to inject malicious content. Implement a robust CSP into web applications to significantly reduce the risk of frame injection attacks.
  7. Regularly update and patch
    Applying regular updates and patches can protect against known vulnerabilities that hackers may exploit for frame injection. Just make sure that the lessons learned from the CrowdStrike outage are applied to pre-test updates thoroughly before they are rolled out (and never on a weekend)!

Stay tuned to this CybersecAsia section for future tips on staying safe from other multi-vector cyberattack techniques that could target software patches/updates to create global cyber incidents…