Commit ac93bf19 authored by Daniel Thompson-Yvetot's avatar Daniel Thompson-Yvetot
Browse files

Update my notes

parent 87e4302c
Loading
Loading
Loading
Loading
+108 −0
Original line number Diff line number Diff line
@@ -50,6 +50,114 @@ List of participants included in the meeting report annex.
- None

### 2.2 Risk Mapping
https://emb3d.mitre.org/assets/EMB3D_Paper_09-23-24.pdf

| Threat Maturity  | Threat Evidence |
| - | - |
Observed Adversarial Technique | ATT&CK technique or documented report
Known Exploitable Weakness | Documentation of known weakness exploitation, such as a CWE associated with a KEV catalog entry
Proof of Concept | Reference to research paper/report
Theoretic | Reference to research paper/report

Threat if plugins aren’t properly configured or secured.

Browser plugin issue is that t have to inject some javascript. On modern platforms like iOS and Android, the OS mediates (use system methods if available)


## Threat Actors
They don't create risks themselves, they help us think about the risks themselves.

Malicious website, attacking the pwm at scale. Net-fishing: verify with all means possible, that the site is authentic, and not masquerading? Is this a bonus feature?

Curious Spouse: See a list of sites I have passwords stored for? Spy on my personal life?

Evil maid: Lock when device sleeps

Vendor of the PWM itself (malicious insider / disgruntled employee): Best practices, code reviews, etc. - Placing a backdoor / exfiltration method? 

Supply Chain Threat Actors: Network based functionality that loops back to the developer? Best practices, code reviews, etc. embedding of 3rd party code 

User Enterprise (insider threat): Protect multiple vaults (needs a manager of the vault)

Curious neighbor: Mask all password data *************

Password managers should convey contemporary understanding of password security when creating a password. (Use password generation, not user input). BSI, NCSC -> passphrase is different. (minimum entropy??)

For consumers: Checking the passwords across the whole database. Reuse is an antipattern, but enterprise should be having their own policy.

Guidance:: What about mandated backdoor? (State Actors?) Out of scope. Either the system is lawful, or it isn't. 

What about known breaches?
Guidance: From a user-perspective don't tell them their password is weak, because it can lead to fatigue.

Bar thief: User is using their phones in a bar - they unlock phone with pins, thieves see this, the phones are stolen, and then this is detected by the OS. (iOS had it first, now Android has it) Snatch Detection

Password manager cannot be considered in isolation, such as in the case where you are using a PWM in a device where you have a keylogger, this is a scenario where the threat on the device impacts the "healthy functionality of the password manager".

PWM is lost if the device is lost. The OS should improve its boundaries (shared memory, copybuffer etc.) -- it is out of our remit. 

Getting access to the DB itself / intercepting the DB in the cloud. Encrypt at rest -> base level mitigation.

Malware is installed: Protecting against an attacker on the device attacker?

BIG BLANKET STATEMENT SOMEWHERE:
If the device is "owned" by a threat actor, there is nothing that a PWM can do to save itself. This is the worst possible case, from which there is no real recovery and nothing that the PWM standard can offer. That said, up until the point of "no return / full compromise", take classical opportunities.

If the risk level is VERY high (i.e. Critical Infrastructure) - consider using a high protection approach (usability / convenience on a gradient toward "perfect" security )

GUIDANCE:: NICE FEATURES 
Go to a website and change your password? Maybe the insider threat is just a tragic?

Breach detection?

Mitigation: Autolocking

Generic Scenarios. 

- Someone or something has access to your device and DOES NOT know your credentials.
- Someone or something has access to your device and DOES know your credentials.
- [PHISHING] Someone or something has your credentials, but not access to your device.

- Biometrics

Start with the Passwords themselves - what value do they have when they are used. A primary purpose of a PWM is to enforce access to a password. A breached password is "in the wild" and has no access control that can be applied to it.

The threats to the access of the manager, not necessarily the post-factum security of their interface. 

Boundary of the interface is internal to the PWM - it needs to be protected (based perhpas on product types):
- Copy/Paste Buffer is not in our remit
Browser-based: Boundary is more likely to be in scope.

Always use the highest security method on the OS / Device;
For example on Android there is CredentialManager (there is also a legacy method) Stop using them if there is something better that is available. 



HERE ARE A FEW I HAVE BEEN THINKING ABOUT

| Threat Maturity | Threat Evidence |
| - | - |
| **Actively Exploited** | |
| Credential dumping from memory | Memory dumps targeting password manager processes |
| Malicious browser extensions stealing autofill data | Multiple documented cases (e.g., 2020 Chrome extension attacks) |
| Keylogging during master password entry | Banking trojans like TrickBot targeting password managers |
| Clipboard hijacking | Cryptocurrency malware replacing copied passwords |
| **Proof of Concept Available** | |
| Side-channel attacks on password manager vaults | Academic research on timing attacks against KeePass |
| Exploiting autofill vulnerabilities | Demonstrated CSS injection attacks on browser-based managers |
| Password manager impersonation/typosquatting | Fake password manager apps on app stores |
| Vault file exfiltration | Scripts targeting local vault files (KeePass, Bitwarden) |
| **Theoretical/Emerging** | |
| AI-assisted password pattern prediction | Research on ML models predicting master passwords from leaked databases |
| Quantum computing threats to encryption | Future threat to current cryptographic implementations |
| Supply chain attacks on password manager updates | Similar to SolarWinds but targeting password manager vendors |
| Biometric bypass techniques | Emerging research on fooling biometric authentication systems |
| Cloud sync vulnerabilities | Potential attacks on cloud storage synchronization |
| Social engineering for master password reset | Targeted phishing for account recovery processes |




- 

### 2.3 Security Profiles