53
Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 200 Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Embed Size (px)

Citation preview

Page 1: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Spyware and Trojan HorsesComputer Security Seminar Series [SS1]

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 2: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Your computer could be watching your every move!

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 3: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Introduction

Page 4: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Seminar Overview

• Introduction to Spyware / Trojan Horses

• Spyware – Examples, Mechanics, Effects, Solutions

• Tracking Cookies – Mechanics, Effects, Solutions

• Trojan Horses – Mechanics, Effects, More Examples

• Solutions to the problems posed

• Human Factors – Human interaction with Spyware

• “System X” – Having suitable avoidance mechanisms

• Conclusions – Including our proposals for solutions

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 5: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Definitions

A general term for a program that surreptitiously monitors your actions. While they are sometimes sinister, like a remote

control program used by a hacker, software companies have been known to use Spyware to gather data about customers.

The practice is generally frowned upon. – Google definition

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

An apparently useful and innocent program containing additional

hidden code which allows the unauthorized collection,

exploitation, falsification, or destruction of data. – Google definition

SPYWARE

TROJAN

HORSE

Page 6: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Symptoms

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

• Targeted Pop-ups

• Slow Connection

• Targeted E-Mail (Spam)

• Unauthorized Access

• Spam Relaying

• System Crash

• Program Customisation

SPYWARESPYWARE / TROJANSPYWARETROJAN HORSETROJAN HORSESPYWARE / TROJANSPYWARE

Page 7: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Summary of Effects

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

• Collection of data from your computer without consent

• Execution of code without consent

• Assignment of a unique code to identify you

• Collection of data pertaining to your habitual use

• Installation on your computer without your consent

• Inability to remove the software

• Performing other undesirable tasks without consent

Page 8: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Similarities / Differences

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Spyware Trojan HorsesCommercially Motivated Malicious

Internet connection required Any network connection required

Initiates remote connection Receives incoming connection

Purpose: To monitor activity Purpose: To control activity

Collects data and displays pop-ups Unauthorized access and control

Legal Illegal

Not Detectable with Virus Checker Detectable with Virus Checker

Age: Relatively New (< 5 Years) Age: Relatively Old ( > 20 Years)

Memory Resident Processes

Surreptitiously installed without user’s consent or understanding

Creates a security vulnerability

Page 9: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Spyware

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 10: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Software Examples

• GAIN / Gator

• Gator E-Wallet

• Cydoor

• BonziBuddy

• MySearch Toolbar

• DownloadWare

• BrowserAid

• Dogpile Toolbar

Page 11: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Advantages

• Precision Marketing– Relevant pop-ups are better than all of them!

– You may get some useful adverts!

• Useful Software– DivX Pro, IMesh, KaZaA, Winamp Pro

– (Experienced) people understand what they are installing.

• Enhanced Website Interaction– Targeted banner adverts

– Website customisationUser Perspective - I

Page 12: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Disadvantages

• Browsing profiles created for users without consent

– Used for target marketing and statistical analysis

• Unable to remove Spyware programs or disable them

• Increased number of misleading / inappropriate pop-ups

• Invasion of user privacy (hidden from user)

• Often badly written programs corrupt user system

• Automatically provides unwanted “helpful” tools

• “20 million+ people have Spyware on their machines.”Source - Dec ’02 GartnerG2 Report User

Perspective - II

Page 13: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Example Pop-up

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Misleading Pop-up

User Perspective - III

Page 14: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Network Overview

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Technical Analysis - I

• Push

•Advertising

•Pull

•Tracking

•Personal data

Page 15: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Client-Side Operation

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Technical Analysis - II

Page 16: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Server-Side Operation

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Technical Analysis - III

• Server-side operation is relatively unknown. However, if we were to develop such a system, it would contain…

Page 17: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Spyware Defence

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Technical Initiatives...

• Spyware Removal Programs

• Pop-up Blockers

• Firewall Technology

• Disable ActiveX Controls

– Not Sandboxed

• E-Mail Filters

• Download Patches

User Initiatives…

• Issue Awareness

• Use Legitimate S/W Sources

• Improved Technical Ability

• Choice of Browser

• Choice of OS

• Legal action taken against

breaches of privacy

– Oct ’02 Doubleclick

Page 18: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

GAIN Case Study

• Installed IMesh, which includes Gator Installation

• We accessed multiple internet sites

• We simultaneously analyzed network traffic (using IRIS)

• We found the packets of data being sent to GAIN

• Packets were encrypted and we could not decrypt them

• See Example ->

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 19: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 20: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Spyware Removers

Ad-aware (by Lavasoft)

– Reverse Engineer Spyware

– Scans Memory, Registry and Hard Drive for…

• Data Mining components

• Aggressive advertising components

• Tracking components

– Updates from Lavasoft

– Plug-ins available

• Extra file information

• Disable Windows Messenger Service

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 21: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Vulnerable Systems

• Those with an internet connection!

• Microsoft Windows 9x/Me/NT/2000/XP

• Does not affect Open Source OSs

• Non - fire-walled systems

• Internet Explorer, executes ActiveX plug-ins

• Other browsers not affected

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 22: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Tracking Cookies

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 23: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Cookies

• A Cookie is a small text file sent to the user from a website.

– Contains Website visited

– Provides client-side personalisation

– Supports easy Login

• Cookies are controlled by…

– Website’s Application Server

– Client-side Java Script

• The website is effectively able to ‘remember’ the user and their

activity on previous visits.

• Spyware companies working with websites are able to use this

relatively innocent technology to deliver targeted REAL TIME

marketing, based on cookies and profiles.

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 24: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Case Study - DoubleClick

• Most regular web users will have a “doubleclick.net” cookie.

• Affiliated sites request the DoubleClick cookie on the users

computer.

• The site then sends…

– Who you are

– All other information in your cookie file

• In return for…

– All available marketing information on you - collected from other

affiliated sites which the you have hit.

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 25: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Case Study – DoubleClick

• Site targets banner adverts, e-mails and pop-ups to the

user.

• If the user visits an affiliated site without a DoubleClick

cookie, then one is sent to the user.

• The whole process is ‘opaque’ to the user and occurs

without their consent.

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 26: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Tracking Cookie Implementation

• Protocol designed to only allow the domain who created a

cookie to access it.

• IE has a number of security holes…

– Up to IE 5, domain names specified incorrectly.

– Up to IE 6, able to fool IE into believing it is in another

domain.

• Patches and IE 6 solved a number of problems

• Since then, tracking cookies are still proving a large problem,

there are still a number of holes still open.

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 27: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Tracking Cookie Implementation

Spyware Web

Server

Client Browser

Random Web

Server

Spyware Database

Spyware Cookie

Cookies

Spyware <IMG>

Web page

1. Request Page

2. Return Page

3. Request Image

Return Cookie

4. Return Image

Return Updated Cookie

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 28: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Tracking Cookie Defence

• Replace tracking cookies with write protected zero

length files of the same name.

• DoubleClick offer an opt-out cookie, which can be

obtained from their website.

• Disable cookies

– Makes many websites unusable

• Delete cookies after session

• Spyware remover (Ad-aware)

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 29: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Trojan Horses

Page 30: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Installation

• Secretly installed when an infected executable is run

– Much like a virus

– Executables typically come from P2P networks or unscrupulous websites

• ActiveX controls on websites

– ActiveX allows automatic installation of software from websites

– User probably does not know what they are running

– Misleading descriptions often given

– Not sandboxed!

– Digital signatures used, signing not necessary

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 31: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Installation

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

• Certificate Authority

• Misleading Certificate

Description

• Who is trusted?

Page 32: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Effects

• Allows remote access

– To spy

– To disrupt

– To relay a malicious connection, so as to disguise the

attacker’s location (spam, hacking)

– To access resources (i.e. bandwidth, files)

– To launch a DDoS attack

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 33: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Operation

• Listen for connections

• Memory resident

• Start at boot-up

• Disguise presence

• Rootkits integrate with kernel

• Password Protected

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 34: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Example: Back Orifice

• Back Orifice

– Produced by the “Cult of the Dead Cow”

– Win95/98 is vulnerable

– Toast of DefCon 6

– Similar operation to NetBus

– Name similar to MS Product of the time

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 35: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

BO: Protocol

• Modular authentication

• Modular encryption

– AES and CAST-256 modules available

• UDP or TCP

• Variable port

– Avoids most firewalls

• IP Notification via. ICQ

– Dynamic IP addressing not a problem

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 36: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

BO: Protocol Example (1)

Attacker

VictimICQ SERVER

CONNECTION

TROJAN

IP ADDRESS AND PORT

IP ADDRESS AND PORT

INFECTION OCCURS

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 37: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

BO: Protocol Example (2)

Attacker

CONNECTION

COMMAND

COMMAND EXECUTED

REQUEST FOR INFORMATION

INFORMATION

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Victim

Page 38: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

BO: Protocol Example (3)

Attacker

CLEANUP COMMAND

EVIDENCE DESTROYED

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Victim

Page 39: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Trojan Horse Examples

• M$ Rootkit

– Integrates with the NT kernel

– Very dangerous

– Virtually undetectable once installed

– Hides from administrator as well as user

– Private TCP/IP stack (LAN only)

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 40: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Trojan Horse Examples

• iSpyNOW

– Commercial

– Web-based client

• Assassin Trojan

– Custom builds may be purchased

– These are not found by virus scanners

– Firewall circumvention technology

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 41: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Trojan Horse Examples

• Hardware

– Key loggers

– More advanced?

• Magic Lantern

– FBI developed

– Legal grey area (until recently!)

– Split virus checking world

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 42: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Demonstration

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 43: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Vulnerable Systems

DANGEROUS

Number of trojans in common use…

RELATIVELY SAFE Lin

ux/

Unix

Win

9

x

MacO

S Win

NT

MacO

S

X

WinNT refers to Windows NT 4, 2000, XP and Server 2003. Win9x refers to Windows 95, 95SE, 98 and ME.Source: McAfee Security

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 44: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Vulnerable Systems

DANGEROUS

Ease of compromise…

RELATIVELY SAFE W

in

9x

Linux/

Unix

Win

NT

MacO

S

MacO

S

X

WinNT refers to Windows NT 4, 2000, XP and Server 2003. Win9x refers to Windows 95, 95SE, 98 and ME.Source: McAfee Security

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 45: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Conclusions

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 46: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Security Implications

• Divulge personal data

• Backdoors into system

• System corruption

• Disruption / Irritation

• Aids identity theft

• Easy virus distribution

• Increased spam

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

• Mass data collection

• Consequences unknown

• Web becomes unusable

• Web cons outweigh pros

• Cost of preventions

• More development work

• More IP addresses (IPv6)

Short Term Long Term

Page 47: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Solutions

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

• Firewall

• Virus Checker

• Spyware Remover

• Frequent OS updates

• Frequent back-up

• Learning problems

• Add Spyware to Anti-Virus

• Automatic maintenance

• Legislation

• Education on problems

• Biometric access

• Semantic web (and search)

Short Term Long Term

Page 48: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Firewalls

• 3 Types…– Packet Filtering – Examines attributes of packet.

– Application Layer – Hides the network by impersonating the

server (proxy).

– Stateful Inspection – Examines both the state and context of the

packets.

• Regardless of type; must be configured to work properly.

• Access rules must be defined and entered into firewall.

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Network / Standalone

Page 49: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Web Server Firewall

http - tcp 80

telnet - tcp 23

ftp - tcp 21

http - tcp 80

Allow only http - tcp 80

Firewalls

Internet

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Network / Standalone

PC Firewall

202.52.222.10: 80

192.168.0.10 : 1025

Only allows reply packets for requests made outBlocks other unregistered traffic

202.52.222.10: 80

192.168.0.10 : 1025

Internet

Packet Filtering

Stateful Inspection

Page 50: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Intrusion Detection Systems

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Network

PC

Server

Server

IDSFirewallSwitch

• Intrusion Detection – A Commercial Network Solution

• An “Intelligent Firewall” – monitors accesses for suspicious activity

• Neural Networks trained by Backpropagation on Usage Data

• Could detect Trojan Horse attack, but not designed for Spyware

• Place IDS before the firewall to get maximum detection

• In a switched network, place IDS on a mirrored port (gets all traffic)

• Ensure all network traffic passes the IDS host

Internet

Page 51: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

“System X”

• Composed of…

– Open Source OS

– Mozilla / Opera / Lynx (!) Browser (Not IE)

– Stateful Inspection Firewall

– Anti-Virus Software

– Careful and educated user

– Secure permissions system

– Regularly updated (possibly automatically)

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Network / Standalone

Page 52: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Questions…

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk

Page 53: Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Bibliography / Links• [1] "Spyware" - Google Definition Tool – http://www.google.com

• [2] "Trojan Horse" - Google Definition Tool – http://www.google.com

• [3] Zeinalipour-Yazti, D. “Exploiting the Security Weaknesses of the Gnutella Protocol”, University of California. 

• [4] Joshi, R. “Network Security Applications”, Merchantile Communications, CANIT Conference 2003.

• [5] CERT Advisory CA-1999-02 http://www.cert.org/advisories/CA-1999-02.html

• [6] Spyware Guide – http://www.spyware-guide.com

• [7] Trojan Horses - http://www.mpsmits.com/highlights/trojan_horses.shtml

• [8] Trojan Horse - Back Orifice - http://www.nwinternet.com/~pchelp/bo/bo.html

• [9] NetBus - http://www.nwinternet.com/~pchelp/nb/netbus.htm

• [10] BBC News - http://news.bbc.co.uk/1/hi/technology/3153229.stm

• [11] Wired News – “Judge takes bite out of Gator” www.wired.com/news/politics/0,1283,53875,00.html

• [12] Tracking Cookies – Demonstration at http://www.irt.org/instant/chapter10/tracker/index4.htm

• [13] BonziBuddy - http://www.bonzi.com/bonzibuddy/bonzibuddyfreehom.asp

• [14] Unwanted Links (Spyware) – http://www.unwantedlinks.com

• [15] Ad-aware - http://www.ada-ware.com/

Spyware and Trojan Horses – Computer Security Seminar 12th February 2004

Andrew Brown, Tim Cocks and Kumutha Swampillai http://birmingham.f9.co.uk