Internet Vulnerabilities & Criminal Activities Malware 3.2 9/26/2011.

Post on 25-Dec-2015

214 views 0 download

Transcript of Internet Vulnerabilities & Criminal Activities Malware 3.2 9/26/2011.

Internet Vulnerabilities & Criminal Activities

Malware3.2

9/26/2011

Malware

Malicious software designed to gain access to information and/or resources without the knowledge or consent of the

end user

Malware History

1981 - First Apple II virus in the wild1983 - Fred Cohen coins term “virus”1986 - First PC virus1988 - Morris Internet worm1990 - First Polymorphic virus1991 - Virus Construction Set1994 - Good Times virus hoax1995 - First Macro Virus1998 - Back Oriface tool released

Malware History cont.

1999 - Melissa virus / worm 1999 - Tribal Flood Network - DDOS tool 2001 - Code Red worm 2001 - Nimda worm 2003 - Slammer worm 2004 - So Big & Sasser worms 2007 - Storm worm / Zeus botnet tool 2008 - Conficker worm 2010 – Stuxnet – weaponized malware

Malware Trends

Increasing complexity & sophistication

Acceleration of the rate of release of

innovative tools & techniques

Movement from viruses to worms to

kernel-level exploitations

Malware can be:

“Proof of concept”Created to prove it can be doneNot found outside of laboratory

environmentIf code available, can be used by

others“In the Wild.”

Found on computers in everyday use

Traditional Categories of Malware

VirusWormMalicious Mobile CodeBackdoorTrojan HorseRootkitCombination Malware – Malware

“Cocktail”

Virus

Infects a host fileSelf replicatesRequires human interaction to

replicateExamples:

MichelangeloMelissa

Worm

Spreads across a networkDoes not require human

interaction to spreadSelf-replicatingExamples:

Morris WormCode RedSlammer

Malicious Mobile Code

Lightweight program downloaded from a remote source and executed locally

Minimal human interactionWritten in Javascript, VBScript,

ActiveX, or JavaExample:

Cross Site Scripting

Backdoor

Bypasses normal security controlsGives attacker access to user’s

systemExample:

NetcatBack OrifaceSub 7

Trojan Horse

Program that disguises its hidden malicious purpose

Appears to be harmless game or screensaver

Used for spyware & backdoorsNot self-replicating

Rootkit

Replaces or modifies programs thts are part of the operating system

Two LevelsUser-levelKernel-level

ExamplesUniversal RootkitKernel Intrusion System

Combination Malware

Uses a combination of various techniques to increase effectiveness

Examples:LionBugbear.BStuxnet

Malware Distribution Attachments

E-mail and Instant Messaging Piggybacking

Malware added to legitimate program Adware, spyware EULA - End User License Agreement

Internet Worms Exploit security vulnerability Used to install backdoors

Web Browser Exploit Malware added to legitimate web site

Cross-site scripting & SQL Injection Visitors to web site may be infected Drive by malware

Malware Distribution cont.

HackingToo labor intensive for large crime

operationsMay be used to compromise DNS server

Affiliate Marketing Web site owner paid 8¢ to 50 ¢ per

machine to install malware on a visitor’s computer

Mobile DevicesTransfer via bluetooth

Malware Activity

Adware

Spyware

Hijacker

Toolbars

Dialers

Rogue Security Software

Bots

Adware

Displays ads on infected machineAds format can be:

Pop-upsPop-underEmbedded in programsOn top web site ads

More annoying than dangerous

SpywareSend information about infected

computer to someone, somewhereWeb sites surfedTerms searched forInformation from web formsFiles downloadedSearch hard drive for files installedE-mail address bookBrowser historyLogon names, passwords, credit card numbersAny other personal information

Hijacker

Takes control of web browserHome pageSearch enginesSearch bar Redirect sitesPrevent some sites from loading

IE vulnerable

Toolbars

Plug-ins to IEGoogleYahoo

Attempt to emulate legitimate toolbars

Installed via underhanded meansAdware or Spyware

Acts a keystroke logger

Dialers

Alters modem connections and ISDN-Cards

Once installed, will dial 1-900 numbers or other premium rate numbers

Run up end-users phone bill & provide revenue for criminal enterprise

Targets MS Windows

Rogue Security Software

Usually delivered via a trojan horseUses social engineering techniques to

get user to installFake warnings that computer is infectedFake video of machine crashing

Disables anti-virus and anti-spyware programs

Alters computer system so the rogue software cannot be removed

Bots

Allows attacker remote access to a computer

When end-user is online, computer contacts Command & Control (C&C) site

Bot will then perform what ever commands received from the C&C

Some things botnets are used forDistributed Denial of Service (DDoS) attacksSpamHosting contraband such as child pornOther illegal fraud schemes

Weaponized Malware

Attacks SCADA systemSupervisory Control And Data Acquisition

Causes physical damage SCADA systems control

DamsElectrical gridNuclear power plants

Cyber War - The Aurora Projecthttp://www.youtube.com/watch?

v=rTkXgqK1l9A

More Malware Terminology

Downloader Single line of codePayload from malwareInstructs infect computer to download

malware from attacker’s serverDrop

Clandestine computer or service (E-mail)Collects information sent to it from infected

machinesBlind Drop - well hidden, designed to run

attended

More Malware Terminology cont.

ExploitCode used to take advantage of a

vulnerability in software code or configurationForm-grabber

A program that steal information submitted by a user to a web site

PackerTool used to scramble and compress an .exe

fileHides malicious nature of codeMakes analysis of program more difficult

More Malware Terminology cont.

RedirectHTTP feature Used to forward someone from one web

page to anotherDone invisibly with malware

Variant Malware produced from the same code baseDifferent enough to require new signature

for detection by anti-virus software

Malware Sources

Malware Can be programmed from scratch

Less likely to be detected by anti-malware programs

Can be purchasedMalware tools

Haxdoor, Torpig, Metafisher, Web AttackerTools offered with other services

Access to botnet, drop sitesTools derived from small stable base of

existing code

Frauds Involving Malware

Advertising schemesPay-per-viewPay-per-click (“Click Fraud”)Pay-per-install

Banking fraud Identity theftSpamDenial-of-service attacks

DoS extortion

Advertising Schemes

Pay-per-viewSell advertising space on controlled

web sitesCommand botnet to “view” as many

ads as possibleMay have ads download in the

backgroundFraudulent commissions generated

Advertising Schemes cont.

Pay-per-click (“”Click Fraud”)Similar to Pay-per-view fraudBots simulate clicks on adsBetween 5% and 35% of all ad commissions

may be fraudulentPay-per-install

Commission paid every times advertisers software is installed

When installed, notification sent to advertiserInfected machines will be instructed to install

advertisers software

Banking Fraud

Banks are a prime target of malwareMalware can allows attacker to empty

victim’s bank accountExample (September 2009)

Rewrite online bank statements on the flyCovers up theft of fundsTrojan horseAlters HTML code before browser displays

Makes use of “Money Mules”

Identity Theft

Phishing & key logging

Recent increase in malware

associated with identity theft

Information sent to drop site

Spam

Bots used to send spamAlso show dramatic riseBots are available for rent for

spam purposesSpam sent can also contain

malware

Denial of Service Attacks

Botnet commanded to make requests of a web site

Web site may crash due to heavy traffic

Legitimate traffic blockedThreat of DoS attack can be used

for extortionBots for rent for DoS attacks

Problems for Law Enforcement

AnonymityJurisdiction

Attackers know how difficult international law enforcement is

Exploit the situationTarget victims in one country from another countryHave C&C site and drop site located in a third

countryUse multiple proxies to access C&C site and drop siteMoney gain quickly funneled through online bank

accounts and international money transfers

Other Issues

Monetary ThresholdMust reach a limit before prosecutor will take

caseMay be hard to prove exact amount of money

involvedCyber crimes may be considered a non-priority

Virtual world emboldens individualsLess fear of getting caughtRealization of difficulties in investigating crimesEasy money