Cyber Security Fundamentals - Cahpter 4
Cyber Security Fundamentals - Cahpter 4
CYBERSECURITY FUNDAMENTALS
Unit 4: Malicious Software
1
Malware
Include a set of publishing mechanisms and payload modules that even novices can deploy,
which creates a significant problem for those defending systems against
Zeus
Blackhole
Sakura
Phoenix
Attack Sources
Organizations
Politically that sell their National
Organized
motivated Criminals services to governmen
crime
attackers companies t agencies
and nations
This has significantly changed the resources available and motivation behind
the rise of malware and has led to development of a large underground
economy involving the sale of attack kits, access to compromised hosts, and
to stolen information
Viruses
(Propagation / Infected Contents)
Piece of software that infects programs
Encrypted virus
Boot sector infector
A portion of the virus creates a random
Infects a master boot record (MBR) encryption key and encrypts the remainder
or boot record of the virus
File infector Stealth virus (sneaking)
Infects files that the operating system A form of virus explicitly designed to hide
or shell considers to be executable itself from detection by anti-virus software
Macro virus Polymorphic virus
Infects files with macro or scripting
A virus that mutates with every infection
code
Metamorphic virus
Multipartite virus
A virus that rewrites itself completely at
Infects files in multiple ways
each iteration and may change behavior as
well as appearance
Worms
(Propagation / Vulnerability Exploit)
Can :
Spread through Shared Media (USB drives, CD, DVD data disks)
First known worm implementation was done in Xerox Palo Alto Labs in the
early 1980s
It was not malicious , searching for idle systems to use to run a
computationally intensive task
Worm Replication
• Worm e-mails a copy of itself to other systems
E-mail or instant
• Often, sends itself as an attachment via an instant
messenger facility message service
Transport Ultrafast
vehicles spreading
Worm Technology
Metamorphic Multi-exploit
Polymorphic Multiplatform
Newer Worms Technology
Multiplatform: not limited to Windows: UNIX; macro, scripting etc.
New code generated on the fly using functionally equivalent instructions & encryption techniques.
have a collection of behavior patterns that are unleashed at different stages of propagation
they are ideal distributed DoS bots, rootkits, spam e-mail generators, and spyware.
exploit an unknown vulnerability that is only discovered by the general network community when
the worm is launched.
CLICKJACKING
Also known as a
user-interface (UI) redress/reform attack
Using a similar technique, keystrokes can also be hijacked
A user can be led to believe they are typing in the password to their email or bank
account, but are instead typing into an invisible frame controlled by the attacker
E.g. you may think you're viewing the bank's display after entering your ID and
password, but what you actually see is a replica of the same screen laid on top of
the bank's real information.
Clickjacking
This can happen by SPAM e-mail, or some Trojan horse program or scripting code.
Unsolicited bulk
e-mail Program or utility containing harmful
hidden code
most of spam e-mail content is just advertising, trying to convince the recipient
to purchase some product online but includes malware in some cases
The e-mail may have an attached document, which, if opened, may exploit a
software vulnerability to install malware on the user’s system
Or, Trojan horse program or scripting code
Finally the spam may be used in a phishing attack, typically directing the user
e.g., a Trojan horse version of a process listing program that does not display
certain processes that are malicious
Spamming
Sniffing traffic
Keylogging
Keylogger
Spyware
• Subverts the compromised machine to allow monitoring of a wide range of
activity on the system
• Monitoring history and content of browsing activity
• Redirecting certain Web page requests to fake sites
• Dynamically modifying data exchanged between the browser and certain Web
sites of interest
Phishing
(Payload / Information Theft)
Exploits social engineering to Spear-phishing
leverage the user’s trust E-mail is crafted to specifically for its
recipient,
Include a URL in a spam e-mail that links to a fake
Web site that connects the login page of a banking, Eg. Send email by there own name such
gaming, or similar site as Dear Mr Ahmmad, NOT Dear Sir
Secret entry point into a program allowing the attacker to gain access and
bypass the security access procedures
Memory
Persistent User mode
based
Virtual
External
Kernel mode machine
mode
based
Malware Countermeasure Approaches
Ideal solution to the threat of malware is prevention
Four main elements of prevention:
Policy
Awareness
Vulnerability reduction
Threat reduction
If prevention fails, can be used to support the following threat mitigation options:
Detection
Identification
Removal
Worm Countermeasures
techniques.
Generic Decryption (GD)
The most difficult design issue with a GD scanner is to determine how long
to run each interpretation
SUMMARY
Countermeasures
EXTRA WORK – NOT INCLUDE INTO EXAM
Malware Terminology
Malware Terminology
Morris Worm
One of the Earliest significant worm infection
Code Red July 2001 exploited Microsoft IIS bug Probes/examines random IP addresses
consumes significant Internet capacity when active
Code Red II August 2001 also targeted Microsoft IIS installs a backdoor for access
Nimda September 2001 had Worm, Virus and Mobile code characteristics spread using e-mail, Windows
shares, Web servers, Web clients, backdoors
SQL Slammer Early 2003 exploited a buffer overflow vulnerability in SQL server compact and spread
rapidly
Sobig.F Late 2003 exploited open proxy servers to turn infected machines into spam engines
Warezov 2006 creates executables in system directories sends itself as an e-mail attachment
can disable security related products
New code generated on the fly using functionally equivalent instructions & encryption techniques.
have a collection of behavior patterns that are unleashed at different stages of propagation
they are ideal distributed DoS bots, rootkits, spam e-mail generators, and spyware.
exploit an unknown vulnerability that is only discovered by the general network community when
the worm is launched.
Drive-by-downloads
2. Triggering phase
Virus is activated to perform the function Can be caused by a variety of system
for which it was intended events
3. Propagation phase
Virus places a copy of itself Each infected program will
into other programs or into May not be identical to the now contain a clone of the
certain system areas on the propagating version virus which will itself enter a
disk propagation phase
4. Execution phase
Use the access mechanisms found to transfer a copy of itself to the remote
system, and cause the copy to be run.
The worm may also attempt to determine whether a system has previously been
infected before copying itself to the system.
Target Discovery
Scanning (or fingerprinting)
Propagation phase for a network, worm searches for other systems to infect
Scanning strategies that a worm can use:
1. Random
o Each compromised host probes random addresses in the IP address space using a
different seed
o This produces a high volume of Internet traffic which may cause generalized
disruption even before the actual attack is launched
2. Hit-list
o The attacker first compiles a long list of potential vulnerable machines
o Once the list is compiled the attacker begins infecting machines on the list
o Each infected machine is provided with a portion of the list to scan
o This results in a very short scanning period which may make it difficult to detect
that infection is taking place
Target Discovery
3. Topological
3. This method uses information contained on an infected victim machine to find
more hosts
4. Local subnet
o If a host can be infected behind a firewall, then it looks for targets in its own local
network
o The host uses the subnet address structure to find other hosts that would
otherwise be protected by the firewall
System Corruption (Payload)
Ransomware
• Encrypts the user’s data and demands payment in order to access the key
needed to recover the information
• PC Cyborg Trojan (1989)
• Gpcode Trojan (2006)
• WannaCry (May 2017)
https://www.kaspersky.com/resource-center/threats/hardware-failure
https://www.kaspersky.com/about/press-releases/2002_free-defense-against-the-internet-worm-klez
https://www.us-cert.gov/Ransomware
https://www.trendmicro.com/vinfo/us/security/news/ransomware
Remote Control Facility
Distinguishes a bot from a worm
Worm propagates itself and activates itself
Bots join a specific channel on this server and treat incoming messages as
commands
More recent botnets use covert communication channels via protocols such as
HTTP
Distributed control mechanisms use peer-to-peer protocols to avoid a single
point of failure
Host-based Behavior-blocking Software
Integrates with the operating system of a host computer and monitors program
behavior in real time for malicious action
Blocks potentially malicious actions before they have a chance to affect the system
Blocks software in real time so it has an advantage over anti-virus detection
techniques such as fingerprinting or heuristics
Limitations
• Because malicious code must run on the target
machine before all its behaviors can be identified, it
can cause harm before it has been detected and
blocked