June 9, 2015 By Douglas Bonderud 3 min read

It was only a matter of time. Now, CSO Online reports that a flaw in the game development platform Unity — specifically the Unity Web Player — could allow malicious actors to bypass its cross-domain policy and access everything from email accounts to social media profiles without the need to authenticate login details. While this is worrisome for the 600 million potential victims worldwide, the plug-in problem points to a bigger issue: Third-party tools, libraries and components often have too much access and too little security. With malware creators wising up to the sheer number of vulnerabilities present in both new and legacy software developments, players and companies alike need a new game plan for staying safe.

United We Fall?

As noted by CSO, the Unity engine is used by a host of developers to create Web-friendly 3-D content that displays across mobile devices, desktops, gaming platforms and Internet browsers such as Internet Explorer, Firefox, Chrome, Safari and Opera. To access any Unity-based Web apps, users must install the Unity Web Player, which contains a cross-domain policy designed to prevent access to any resources from other domains.

However, Finnish security researcher Jouko Pynnönen found a hole in the plug-in that allows a malicious app to change the rules and access outside sites. Pynnönen built a proof-of-concept app on the Unity platform and then demonstrated that he could access users’ Gmail accounts as if they were already logged in and active. Such an exploit requires users to download and install the malicious app, but the consequences are far-reaching. Pynnönen believed Unity didn’t take the problem seriously until he released the vulnerability and now claims an “improved security response” is being developed.

Tip of the Iceberg

The Unity flaw offers an excellent proof of concept for one of the most worrisome problems facing companies today: the use of third-party or open-source software in mission-critical applications. Consider the case of VPN service Hola, which developed a browser plug-in to bypass region locks on Web-based content. Not only has the company come under fire for using the networks of those who use its free product as exit points for paid subscribers, according to another article from CSO Online, but this “poorly secured botnet” comes with several exploitable flaws that malicious actors could use to gain code execution or even escalate privileges on a victim’s computer.

Another case in point is CMS giant WordPress, which powers almost 25 percent of the top 10 million websites across the globe. According to Infosecurity Magazine, over 100,000 WordPress sites were compromised thanks to a plug-in vulnerability, with Google blacklisting more than 11,000 domains. In fact, recent research from the IBM Managed Security Services (MSS) Threat Research Group found that 20 percent of the 50 most popular plug-ins for WordPress were vulnerable.

The problem? Sheer diversity of development. In effect, there’s no guarantee that any of these software developers have expertise in IT security or have taken the proper steps to test their creations before setting them loose on the market. What’s more, WordPress runs on open-source PHP code, giving malicious actors a massive attack surface if they decide to go after the CMS.

Building on Plug-In Security

Ultimately, companies need a new strategy when it comes to third-party security. Just because a plug-in is popular or comes attached to a big-name software tool is no guarantee of safety or rigorous testing. Instead, businesses need to develop robust testing plans that cover plug-ins, libraries and all third-party components to help limit the chance of unpleasant surprises such as unauthorized logins or code execution. In many cases, companies don’t have the manpower for this new security tactic in-house. Leveraging a trusted partner to provide cloud-based security testing is one way to bridge the gap without breaking the bank.

The new Unity flaw puts players at risk, but that’s just a start. Companies across the globe face the specter of “game over” flaws in some of the most popular plug-ins available. Bottom line? It’s time for a new game plan.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today