16
Trends and threats: Malware development A closer look at the changes in development of malicious software, and possible damage impact and damage limitation. Snorre Fagerland Senior Virus Analyst, Norman ASA

Trends and threats: Malware development A closer look at the changes in development of malicious software, and possible damage impact and damage limitation

Embed Size (px)

Citation preview

Page 1: Trends and threats: Malware development A closer look at the changes in development of malicious software, and possible damage impact and damage limitation

Trends and threats: Malware development

A closer look at the changes in development of malicious software, and possible damage impact and damage limitation.

Snorre Fagerland

Senior Virus Analyst, Norman ASA

Page 2: Trends and threats: Malware development A closer look at the changes in development of malicious software, and possible damage impact and damage limitation

Malware on the way out

• DOS viruses. Forget them. 50000 viruses or so, not a threat anymore.

• Boot viruses. Still see them every once in a while, but not many new ones – only the odd infected diskette from way back when.

• Macro viruses. After dominating the picture from 1995 to ca. 2000, macro viruses are now on the decline.

Page 3: Trends and threats: Malware development A closer look at the changes in development of malicious software, and possible damage impact and damage limitation

Malware still going strong

Page 4: Trends and threats: Malware development A closer look at the changes in development of malicious software, and possible damage impact and damage limitation

Email worms

These will be with us for the foreseeable future.

They are often combined with local area network infection methods, which means that they can be a real problem to get out of a corporate network.

They may come in large series of variants.

They are rapid to very rapid spreaders. Even with good emergency response mechanisms, a significant amount of people may be infected in the early stages of an epidemic.

Page 5: Trends and threats: Malware development A closer look at the changes in development of malicious software, and possible damage impact and damage limitation

File infecting viruses

File infectors are still around to a large extent. In addition, many classic email and P2P worms also double as file infecting viruses.

File infectors may be hard to clean perfectly.

Page 6: Trends and threats: Malware development A closer look at the changes in development of malicious software, and possible damage impact and damage limitation

Trojans that give unauthorized access

Example : Subseven shown below.

Page 7: Trends and threats: Malware development A closer look at the changes in development of malicious software, and possible damage impact and damage limitation

Malware on the way up

Page 8: Trends and threats: Malware development A closer look at the changes in development of malicious software, and possible damage impact and damage limitation

Peer 2 peer worms

File sharing networks like Kazaa, Morpheus, Limewire, Grokster etc now thoroughly infested.

Supova.HSpybot.1_2 & Pinfi.ALoxar.CSupova.E

Supova.A

Supova.I

Page 9: Trends and threats: Malware development A closer look at the changes in development of malicious software, and possible damage impact and damage limitation

Multi-component malware

From UNIX/Linux environment we have seen that malware often comes as packages of many files. This trend has now moved to Windows.

Problem: Harder to analyse the interaction between many files; easier to change to avoid detection, easier to get false alarms, harder to clean properly.

Page 10: Trends and threats: Malware development A closer look at the changes in development of malicious software, and possible damage impact and damage limitation

Exploits (bugs that undermine security)

Malware will seek to use exploits; they ease spreading and give better access to resources.

The most well known are f.ex. those that enable attachments to auto-execute in some instances:

Content-Type: audio/x-wav;

name=”readme.exe"

..or the DCOM RPC exploit used for W32/Blaster.

Note: It is as always important to keep software updated.

Page 11: Trends and threats: Malware development A closer look at the changes in development of malicious software, and possible damage impact and damage limitation

Damage impact of modern malware

- Damage to software and data (often security software)- Reduction of system and network performance; instability- Misuse of system (storage of pornography, pirated software, music and films), or participation in spam or DDOS schemes.- Loss of system control (deletion of admin shares and accounts)- Unauthorized access to sensitive data

Page 12: Trends and threats: Malware development A closer look at the changes in development of malicious software, and possible damage impact and damage limitation

Damage impact of modern malware, cont’d

Secondary impact: - financial losses connected with investments in security systems and possible cleanup operations.

- Loss of goodwill and business because of downtime, or public security breaches.

Page 13: Trends and threats: Malware development A closer look at the changes in development of malicious software, and possible damage impact and damage limitation

Damage limitation : before infection

There is always a tradeoff between functionality and security. Be as secure as you can without severely limiting your ability to work.

Do not allow frivolous use of administrator accounts. No one needs to be constantly logged on as admin.

Have a plan in case of infection, and people in charge of executing it.

Page 14: Trends and threats: Malware development A closer look at the changes in development of malicious software, and possible damage impact and damage limitation

Damage limitation, cont’d

Use firewalls.

Make sure all clients are updated. Do not allow people to ”turn off the AV software.

Disallow rogue protocols (i.e. P2P software).

Keep control with shares.

Back up often.

Use attachment limitations on the mail servers, if possible.

Page 15: Trends and threats: Malware development A closer look at the changes in development of malicious software, and possible damage impact and damage limitation

Damage limitation : after infection

DONT PANIC! Have centrally placed people lead cleanup operation, you may want to have AV consultants there as well.

Get all available information on the malware.

Small networks : pull infected machines off net, clean manually aided by AV software.

Page 16: Trends and threats: Malware development A closer look at the changes in development of malicious software, and possible damage impact and damage limitation

Damage limitation, cont’d

Larger networks : important to find the machines that are spreading the infection. Use network traffic analyzers and auditing tools to find these machines and take them off the network; if possible isolate infected section of the net.

If suspicion of information security breach, back up data and reinstall compromised systems with new passwords etc. This may also need to be done in the case of file infectors, where the infected files may not be possible to clean perfectly.