Rafay Baloch

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
Rafay Baloch
Photograph
Rafay Baloch at Tech Valley, in 2019
Born (1993-02-05) 5 February 1993 (age 26)
NationalityPakistan
Websitewww.rafaybaloch.com

Rafay Baloch (Urdu: رافع بلوچ‎, born 5 February 1993) is a Pakistani ethical hacker and security researcher known for his discovery of vulnerabilities on the Android operating system. He has been conducting security research for over 7 years. He has been featured and known by both national and international media and publications[1][2] like Forbes,[3] BBC,[4] The Wall Street Journal,[5] and The Express Tribune.[1] He was listed as one of "The 15 Most Successful Ethical Hackers WorldWide"[6] and "Top 25 Threat Seekers"[7] by SCmagazine.

Personal life[edit]

Rafay Baloch attended Bahria University's Islamabad campus, from which he obtained a bachelor's degree. Baloch is currently placed in Hall of Fame of Bahria University.[8]

Career[edit]

Baloch began his hacking career while he was still doing his bachelor's. He then wrote a book called "Ethical Hacking Penetration Testing Guide". He is the first Pakistani security researcher to be acknowledged by Google, Facebook, PayPal, Apple, Microsoft[9] and many other international organizations. He has also written several papers on information security, namely "HTML5 Modern Day Attack Vectors", "Web Application Firewall Bypass", and "Bypassing Browser Security Policies For Fun And Profit".[10]

Rafay Baloch is currently working as a Cyber Security Advisor at Pakistan Telecommunication Authority.

Bug bounty programs[edit]

Baloch has been active into bug bounty programs and has reported several critical vulnerabilities[11] in several open source web applications as well as in bug bounty programs. Baloch found critical vulnerabilities in PayPal in 2012: he hacked into PayPal servers by exploiting a remote code execution vulnerability. He was rewarded $10,000 and a job offer to work for them as a Security Researcher that he refused as he was still doing his bachelor's at that time.[12]

Browser security research[edit]

Baloch has actively reported several critical vulnerabilities in browsers. He started by finding Same Origin Policy (SOP) bypass in Android Stock browser which was initially rejected by Google;[13] however, this was later verified by Google after researchers from Rapid7 verified it.[14] This was coined as CVE 2014-6041. Baloch followed by reporting several other SOP bypasses.[15] Researchers at Trend Micro found this bug to be more widespread.[16] It was later reported that hackers had been actively using Baloch's SOP bypass exploits for hacking into Facebook accounts.[17] The SOP bypass bug was elevated by Rapid7 researcher Joe Vennix for conducting a remote code execution.[18][19] Baloch also found several vulnerabilities affecting Webview which allowed an attacker to read local files as well as steal cookies from the user device.[20]

Apple Safari address bar spoofing controversy[edit]

In 2018, Baloch unveiled a crack in both Safari and Microsoft's Edge browser that paved the way for the URL of a safe website to be shown in the address bar while users were actually being taken to a different, and possibly malicious, website.[21] Rafay Baloch identified the security issue and informed Apple and Microsoft in early June. Microsoft fixed the issue within two months but Apple didn’t respond to Baloch's report despite of the deadline given of 90 days grace period so he made the details public as per international rule.[22] Rafay Baloch wrote in his article that an address bar can be used to easily breach someone’s privacy without them noticing it.[23] The reason this is possible is because an address bar is the only reliable indicator for security in new browsers, as it displays the site’s URL and other details related to the webpage one is on.[24][25][26]

Google no-patch policy discovery[edit]

In 2014, after Rafay Baloch and Joe Vennix reported Google about a bug that could allow hackers to dodge the Android Open Source Platform (AOSP) browser’s Same-Origin Policy (SOP), [27] they discovered that Google had already terminated its support for WebView on Android devices running Android 4.3 or older versions, while putting the onus on OEMs and the open source security community to provide patches to users at the same time. Whereas Google’s official stance on WebView for older pre-Android 4.4 devices was as follows: “If the affected version [of WebView] is before 4.4, we generally do not develop the patches ourselves, but welcome patches with the report for consideration. Other than notifying OEMs, we will not be able to take action on any report that is affecting versions before 4.4 that are not accompanied with a patch.” [28] Unfortunately, older versions of Andriod having unpatched WebWiew bugs were mainly due to their poor upgraded path in combination of working through different mobile phone manufacturers who did not use Google's patching priorities, leaving users exposed. [28][29]

Google then released WebView as a stand-alone application that could be updated separately from the Android version of a device. Simply put, the re-architecting of the WebView would benefit the latest versions of Andriods, Lollipop 5.0, and Marshmallow 6.0. [28]  But this option remains unavailable to anyone on an older version of the operating system; very few people actually use Lollipop, less than 0.1 percent of all Android device owners. [22][30]

On Google’s no-patch policy, Baloch shared his views with Zimperium, stating that “Google’s decision to not patch critical security bugs (pre-KitKat) anymore would certainly impact the vast majority of users. Security firms are already seeing attacks in the wild where users are abusing Same Origin Policy (SOP) bypass bug to target Facebook users.” [31][32]

The Metasploit Framework, owned by Rapid7, contained 11 such WebView exploits that were need to be patched, most of which were courteous contributions from Rafay Baloch and Joe Vennix. [33][34]

References[edit]

  1. ^ a b "The unsung achiever: Pakistani tops lists of ethical hackers of 2014 - The Express Tribune". The Express Tribune. 2015-01-03. Retrieved 2018-05-06.
  2. ^ "Rafay Baloch Recognized as One of the Top Ethical Hackers of 2014". propakistani.pk. Retrieved 2018-05-06.
  3. ^ Fox-Brewster, Thomas. "Widespread Android Vulnerability 'A Privacy Disaster', Claim Researchers". Forbes. Retrieved 2018-05-06.
  4. ^ "Android security shift exposes users". BBC News. 2015. Retrieved 2018-05-06.
  5. ^ Yadron, Danny (2015-01-12). "Google Isn't Fixing Some Old Android Bugs". WSJ. Retrieved 2018-05-06.
  6. ^ "The 15 most successful ethical hackers worldwide". SC Media UK. 2016-04-06. Retrieved 2018-06-04.
  7. ^ Top 25 Threat seekers
  8. ^ International Recognition of BU Students
  9. ^ "Microsoft Security".
  10. ^ "Black Hat Asia 2016". www.blackhat.com. Retrieved 2018-05-06.
  11. ^ "Files from Rafay Baloch".
  12. ^ "Working a desk job: Young techie bags a million rupees using IT skills". The Express Tribune. 2012-12-30. Retrieved 2018-05-06.
  13. ^ "Google Under Fire For Quietly Killing Critical Android Security Updates For Nearly One Billion". Retrieved 2015-01-12.
  14. ^ "Major Android Bug is a Privacy Disaster (CVE-2014-6041)".
  15. ^ "Another bug exposed by Pakistani researcher".
  16. ^ "Same Origin Policy Bypass Vulnerability Has Wider Reach Than Thought - Trendmicro". Trendmicro. 2014-09-29.
  17. ^ "Facebook Users Targeted By Android Same Origin Policy Exploit - Trendmicro". Trendmicro. 2014-10-26.
  18. ^ "Google Play Store X-Frame-Options (XFO) Gaps Enable Android Remote Code Execution (RCE)". 2015-02-10.
  19. ^ "(XFO) Gaps Enable Android Remote Code Execution (RCE)".
  20. ^ "Bypassing-Browser-Security-Policies-For-Fun-And-Profit".
  21. ^ "Security flaw left Safari and Edge users vulnerable to fake websites". Engadget. Retrieved 2019-01-01.
  22. ^ a b Fox-Brewster, Thomas. "Google Under Fire For Quietly Killing Critical Android Security Updates For Nearly One Billion". Forbes. Retrieved 2019-01-01.
  23. ^ "Apple Safari & Microsoft Edge Browser Address Bar Spoofing - Writeup". Miscellaneous Ramblings of A Ethical Hacker. Retrieved 2019-01-01.
  24. ^ Sameer, Sarmad. "Pakistani Researcher Discovers Address Bar Spoofing Vulnerability in Safari and Microsoft Edge". Retrieved 2019-01-01.
  25. ^ "Apple's Safari and Microsoft's Edge browsers contain spoofing bug". SC Media. 2018-09-12. Retrieved 2019-01-01.
  26. ^ tweet_btn(), Shaun Nichols in San Francisco 11 Sep 2018 at 05:01. "Safari, Edge fans: Is that really the website you think you're visiting? URL spoof bug blabbed". www.theregister.co.uk. Retrieved 2019-01-01.
  27. ^ "Reboot 25: Threat seekers". SC Media. 2014-12-08. Retrieved 2019-08-19.
  28. ^ a b c Allen, Grant (2015-12-18). Beginning Android. Apress. ISBN 9781430246879.
  29. ^ "Google Passes on Older Android Patches; 930 Million Devices Vulnerable". threatpost.com. Retrieved 2019-01-01.
  30. ^ "Google Passes on Older Android Patches; 930 Million Devices Vulnerable". threatpost.com. Retrieved 2019-08-19.
  31. ^ "No Patch to Same Origin Policy Bypass in Old Android Devices". Zimperium Mobile Security Blog. 2015-01-15. Retrieved 2019-08-19.
  32. ^ "No Patch to Same Origin Policy Bypass in Old Android Devices". Zimperium Mobile Security Blog. 2015-01-15. Retrieved 2019-01-01.
  33. ^ "Android security shift exposes users". 2015-01-13. Retrieved 2019-08-19.
  34. ^ "Online security: Pakistani helps Google avoid privacy disaster". The Express Tribune. 2014-09-20. Retrieved 2019-01-01.