25

Windows Malware: Detection And Removal TechBytes Tim Ramsey

  • View
    218

  • Download
    1

Embed Size (px)

Citation preview

Windows Malware: Detection And Removal

TechBytes

Tim Ramsey

Computer Security!

• What is “malware”?

• How does malware get on my PC?

• How do I get rid of malware?

• Resources

What Is “Malware”?

• “Malicious Software”

• Includes:– Viruses, worms, Trojan horses– Spyware– Remote-control software– “Botnets”– Rootkits

• The lines are getting blurry

Viruses, Worms, Trojan Horses

• Viruses: modify executables and documents; we humans do the rest

• Worms: self-replicating programs

• Trojan Horses: still fooling us after all these years

Spyware

• Installed with or without your knowledge and consent– Do you read the entire EULA?– I do (except the French part)

• Tracks URLs visited, information entered into forms

• Can even monitor secure (https://) pages

Spyware, Cont.

• Keyboard loggers: capture passwords, PINs, account numbers

• Organized crime loves this stuff

Remote–Control Software

• Windows Remote Assistance

• VNC, Radmin

• Netbus, BackOrifice

Botnets

• “The single greatest threat facing humanity”

• Quickly becoming a top problem on campus

• Hordes of infected “drone” hosts

• Used for spam relay, DDOS, scanning, infection

Botnets, Cont.

• Spreading via IM, email, compromise

• Installs remote-control software

• Connects to central server to announce presence and await commands

• Allows “Botmaster” to control 100, 1000, 10000+ infected hosts with simple commands

• Continually evolving

Botnets, Cont. 2

• Network connections are initiated by the drone hosts

• Uses common protocols: HTTP, IRC, FTP• Starting to see stealth techniques

employed to hide infection (rootkits), communications (SSL, steganography)

• Tremendous incentives for Botmasters to grow, maintain, defend their horde

• You don’t want this on your computer

How Does Malware Get On My PC?

• Compromise– Security vulnerabilities– Browser vulnerabilities– Open file shares

• Social Engineering– People click on the darndest things– Packaged with other software

How Do I Get Rid Of Malware?

• Best: Don’t get infected– Antivirus– OS and application patches– Enable Windows Firewall– Healthy paranoia

• Don’t run files that friends or strangers send to you!

• Don’t install random software from the Web

• Um, yeah. I still got infected. What now?

Malware Removal

• Safest: “R/R”

• Reformat / Reinstall are necessary if the infection contains a remote control component– No telling what has been installed, changed– SIRT policy– A botnet infection means R/R is mandatory

• Otherwise, try to identify the infection

Identifying The Infection

• Anti-Virus software scan

• Anti-Spyware scan– Spybot Search & Destroy– Microsoft Windows AntiSpyware (Beta)– AdAware

• Other, more specialized, tools

Removing The Infection

• Are you sure you wouldn’t rather R/R?

• If you’ve identified the infection, look for a removal tool– Symantec, McAfee, other AV vendors– Google search (but be careful)

• When in doubt, reformat and reinstall

A Note About Reformat / Reinstall

• Back up your data first• Practically every OS is vulnerable to

network compromise during installation– Unplug the computer from the network– Install OS, service packs, patches from CD– Enable Windows Firewall– Install SAV from CD– Set administrator password– Then plug back in

Rootkits: Making Life Harder

• Pre-packaged software to hide malware• Freely obtainable (rootkit.org)• There are even commercial packages!• Insert hooks into system, kernel• Trap program calls to list directory

contents, running processes, registry entries

• Filter out what the bad guys don’t want you to see

Detecting Rootkits

• Look for the hooks

• Look for known file names, processes

• Look for what’s being hidden

• Difficult to do, getting more difficult

• Tools exist to do this, but most don’t detect everything

• Hot topic of research for both sides

Removing Rootkits

• Are you sure you wouldn’t rather R/R?

• Removal tools exist for most rootkits

• Deep magic, requiring wizardry and time

Resources

• K-State provided antivirus software– http://antivirus.ksu.edu/nav/

• Spybot Search & Destroy– http://www.safer-networking.org/ 

• Microsoft Windows Antispyware (Beta)– http://www.microsoft.com/athome

/security/spyware/software/

Resources, Cont.

• Rootkit Detection– http://www.f-secure.com/blacklight/– http://www.sysinternals.com/ntw2k/freeware/r

ootkitreveal.shtml

• K-State configuration for XP Firewall– http://knowledgebase.itac.ksu.edu/art.asp?id=

274

• SANS Top 20– http://www.sans.org/top20/

Questions?

Thanks For Coming!

(I hope today wasn’t too taxing)

This Slide Intentionally Left Blank