45
MALICIOUS APPLICATIONS

INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

MALICIOUS APPLICATIONS

Page 2: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Objective What malware are

How do they infect hosts

How do they hide

How do they propagate

How to detect them

Worms

22/09/2015 www.infosecawareness.in 2

Page 3: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

What is a Malware ? Malware in short known for malicious software. It is a software designed to gain access to a

computer system without the owner's informed consent. Includes computer viruses, worms, Trojan

horses, rootkits, spyware and Adware

Designed to find and steal confidential information stored on your computer

22/09/2015 www.infosecawareness.in 3

Page 4: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

What it is good for ? Steal personal information Delete files Click fraud Steal software serial numbers Use your computer as relay

22/09/2015 www.infosecawareness.in 4

Page 5: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

The Malware Categories Virus

Backdoor

Trojan horse

Rootkit

Scareware

Adware

Worm

22/09/2015 www.infosecawareness.in 5

Page 6: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

What is a Virus ?

Program that can infect other programs by modifying them to include a, possibly evolved, version of itself

22/09/2015 www.infosecawareness.in 6

Page 7: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Some Virus Type Polymorphic : Uses a polymorphic engine to

mutate while keeping the original algorithm intact (packer)

Metamorphic : Change after each infection

22/09/2015 www.infosecawareness.in 7

Page 8: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

What is a Trojan

• Describes the class of malware that appears to perform a desirable function but in fact performs • Undisclosed malicious functions that allow

unauthorized access to the victim computer

22/09/2015 www.infosecawareness.in 8

Page 9: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

What is rootkit A root kit is a component that uses stealth to

maintain a persistent and undetectable presence on the machine

22/09/2015 www.infosecawareness.in 9

Page 10: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

What is a Worm • A computer worm is a self-replicating computer

program. • It uses a network to send copies of itself to

other nodes and do so without any user intervention.

22/09/2015 www.infosecawareness.in 10

Page 11: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

History 1981 First reported virus : Elk Cloner (Apple 2)

1983 Virus get defined

1986 First PC virus MS DOS

1988 First worm : Morris worm

1990 First polymorphic virus

1998 First Java virus

1998 Back orifice

1999 Melissa virus

1999 Zombie concept

1999 Knark rootkit

2000 love bug

2001 Code Red Worm

2001 Kernel Intrusion System

2001 Nimda worm

2003 SQL Slammer worm

Melissa spread by email and share Knark rootkit made by creed demonstrate the first ideas love bug vb script that abused a weakness in outlook Kernel intrusion by optyx gui and efficent hidding mechanims

22/09/2015 www.infosecawareness.in 11

Page 12: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Malware Repartition

22/09/2015 www.infosecawareness.in 12

Page 13: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Infection methods

22/09/2015 www.infosecawareness.in 13

Page 14: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Outline What malware are How do they infect hosts How do they propagate How to detect them Worms

22/09/2015 www.infosecawareness.in 14

Page 15: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

What to Infect Executable Interpreted file Kernel Service MBR Hypervisor

22/09/2015 www.infosecawareness.in 15

Page 16: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Overwriting Malware

Targeted Executable

Malware Malware

22/09/2015 www.infosecawareness.in 16

Page 17: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Prepending Malware

Targeted Executable

Malware

Infected host

Executable Malware

22/09/2015 www.infosecawareness.in 17

Page 18: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Adding Malware

Targeted Executable

Malware

Infected host

Executable Malware

22/09/2015 www.infosecawareness.in 18

Page 19: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Cavity Malware

Targeted Executable

Infected host

Executable

Malware Malware

22/09/2015 www.infosecawareness.in 19

Page 20: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Multi-Cavity malware

Targeted Executable Malware

Malware

Malware

Malware

22/09/2015 www.infosecawareness.in 20

Page 21: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Auto Start Folder auto-start : C:\Documents and Settings\[user_name]\Start Menu\Programs\Startup

Win.ini : run=[backdoor]" or "load=[backdoor]". System.ini : shell=”myexplorer.exe” Wininit Config.sys

22/09/2015 www.infosecawareness.in 21

Page 22: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Auto Start Cont. Assign know extension (.doc) to the malware Add a Registry key such as HKCU\SOFTWARE\Microsoft\Windows

\CurrentVersion\Run

Add a task in the task scheduler Run as service

22/09/2015 www.infosecawareness.in 22

Page 23: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Macro virus Use the builtin script engine Example of call back used (word)

AutoExec() AutoClose() AutoOpen() AutoNew()

22/09/2015 www.infosecawareness.in 23

Page 24: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Document based malware MS Office Open Office Acrobat

22/09/2015 www.infosecawareness.in 24

Page 25: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

MBR/Bootkit Bootkits can be used to avoid all protections of an

OS, because OS consider that the system was in trusted stated at the moment the OS boot loader took control.

22/09/2015 www.infosecawareness.in 25

Page 26: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

BIOS MBR VBS NT

Boot Sector

BOOTMGR.EXE WINLOAD.EXE

Windows 7 kernel HAL.DLL

22/09/2015 www.infosecawareness.in 26

Page 27: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Vboot Work on every Windows (vista,7) 3ko Bypass checks by letting them run and then do

inflight patching Communicate via ping command

22/09/2015 www.infosecawareness.in 27

Page 28: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

How do they propagate

22/09/2015 www.infosecawareness.in 28

Page 29: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Shared Folder

22/09/2015 www.infosecawareness.in 29

Page 30: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Email Propagation

from pandalab blog 22/09/2015 www.infosecawareness.in 30

Page 31: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Valentine Day ...

Waledac malicious domain from pandalab blog

22/09/2015 www.infosecawareness.in 31

Page 32: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Email again

Symantec 2009 22/09/2015 www.infosecawareness.in 32

Page 33: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Fake Codec

QuickTime™ and aGIF decompressor

are needed to see this picture.

22/09/2015 www.infosecawareness.in 33

Page 34: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Fake Antivirus

from pandalab blog 22/09/2015 www.infosecawareness.in 34

Page 35: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Hijack You Browser

from pandalab blog 22/09/2015 www.infosecawareness.in 35

Page 36: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Fake page !

from pandalab blog 22/09/2015 www.infosecawareness.in 36

Page 37: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

P2P Files

Popular query 35.5% are

malwares (Kalafut 2006)

22/09/2015 www.infosecawareness.in 37

Page 38: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Adware

22/09/2015 www.infosecawareness.in 38

Page 39: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Browser Toolbar ...

22/09/2015 www.infosecawareness.in 39

Page 40: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Toolbar again

22/09/2015 www.infosecawareness.in 40

Page 41: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Ransomware

Trj/SMSlock.A Russian

Ransomware

To unlock you need to send an SMS with the text4121800286to the number3649Enter the resulting code: Any attempt to reinstall the system may lead to loss of important information and computer damage

from pandalab blog 22/09/2015 www.infosecawareness.in 41

Page 42: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Detection

22/09/2015 www.infosecawareness.in 42

Page 43: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

Anti-virus Analyze system behavior Analyze binary to decide if it a virus Type :

Scanner Real time monitor

22/09/2015 www.infosecawareness.in 43

Page 44: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

44

Worm A worm is self-replicating software designed to spread through the network Typically, exploit security flaws in widely used services Can cause enormous damage Launch DDOS attacks, install bot networks Access sensitive information Cause confusion by corrupting the sensitive information

Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained and may spread autonomously

22/09/2015 www.infosecawareness.in 44

Page 45: INFORMATION SECURITY AWARENESS · Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained

45

Cost of worm attacks Morris worm Infected approximately 6,000 machines 10% of computers connected to the Internet

cost ~ $10 million in downtime and cleanup Code Red worm Direct descendant of Morris’ worm Infected more than 500,000 servers Programmed to go into infinite sleep mode July 28

Caused ~ $2.6 Billion in damages, Love Bug worm: $8.75 billion

Statistics: Computer Economics Inc., Carlsbad, California

22/09/2015 www.infosecawareness.in 45