SIS Malware
SIS Malware
informacijskog
sustava
mr.sc. Dražen Pranić
Agenda
• Uvod
• Vrste malicioznog softvera
Wannacry
• Svibanj 2017.
• Više od 230.000 zaraženih računala u jednom danu
• “WannaCry je bio prekretnica. Svjedočili smo prvom globalnom,
multivektorskom napadu koji se temeljio na državno
potpomognutim alatima.”
• Ovaj napad prouzročio je povećanje broja napada
zlonamjernim ransomware sadržajem te su mnogi napadi
kasnije koristili iste ranjivosti koje su se koristile u ovom
napadu.
WannaCry
• Znate li možda čemu su služili ovi URLovi?
• http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
• http://ifferfsodp9ifjaposdfjhgosurijfaewrwergwea.com
WannaCry akteri
• Worm komponenta
• Širenje putem SMB protokola (Koristi Eternal Blue ranjivost)
• Krađa kredencijala (Mimikatz funkcionalnost) WMI
• Destroyer ne ransomware
Chinese Hackers Were Using NSA Hacking
Tool a Year Before it was Leaked by
Shadow Brokers
• Research from Symantec shows that a Chinese hacking group
were using NSA hacking tools a year before Shadow Brokers
leaked the cache of tools to the Internet.
• The Chinese hackers appear to have captured and reverse-
engineered the tools, illustrating a lesson of cyberwarfare:
hacking an adversary gives them access to the cyber tools
used.
• Created by the NSA, intercepted by China, later stolen and
leaked by another mysterious hacker group known as the
Shadow Brokers, and ultimately used by North Korea and
Russia in two of the most damaging and costly cyberattacks in
history.
• https://www.wired.com/story/nsa-zero-day-symantec-buckeye-c
hina/
Fokus stavljen na krajnjeg korisnika,
vanjske partnere i vanjsku infrastrukuturu
• Drive-by Compromise
• Adversaries may gain access to a system through a user visiting a website over the normal course
of browsing. With this technique, the user's web browser is typically targeted for exploitation
• Watering hole (pojilište) napadi, Malicious Ads…
• Exploit Public-Facing Application
• Adversaries may attempt to take advantage of a weakness in an Internet-facing computer or
program using software, data, or commands in order to cause unintended or unanticipated
behavior.
• External Remote Services
• Adversaries may leverage external-facing remote services to initially access and/or persist within a
network.
• Hardware Additions
• Adversaries may introduce computer accessories, networking hardware, or other computing
devices into a system or network that can be used as a vector to gain access.
• Phishing
• Adversaries may send phishing messages to gain access to victim systems. All forms of phishing
are electronically delivered social engineering
• Valid Accounts
• Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial
Access, Persistence, Privilege Escalation, or Defense Evasion.
• Replication Through Removable Media
• Supply Chain Compromise / Trusted Relationship
RSA slučaj
• RSA – tvrtka koji se bavi sigurnosnim rješenjima i
između ostalog proizvodi autentikacijski softver
• 2011. godine hakeri su upali u RSA i kompromitirali
Secureid tokene te upali u Lockhed Martin
• Način upada zaražena HR proračunska tablica u e-
mail poruci od „pouzdanog izvora”
Vrste malicioznih programa
• Definicije prihvaćene od AV industrije
• Vrsta malicioznog programa ovisi o dvije karakteristike
• metoda širenja i/ili
• aktivnosti na inficiranom računalu
• Četiri glavne vrste malicioznih programa
• Virusi
• Crvi
• Trojanski konji
• Potencijalno neželjene aplikacije (engl. PUA)
• Spyware, ransomware, fileless malware
Virusi
• Najstarija vrsta malicioznih programa
• Virus se “priljepljuje” na legitiman program i izvršuje
prilikom pokretanja
Izvorni Inficirani
program program
Virusi
• Prema načinu inficiranja :
• Virusi koji inficiraju datoteke (eng. file infectors)
• Batch datoteke i shell skripte
• Boot sector virusi
• Inficiraju sektor na mediju koji se prvi čita
• Macro virusi
• Koriste macro jezik aplikacije
• Microsoft Office (Word, Excel)
• Glavna karakteristike:
• Šire se putem računalnih mreža
• NE inficiraju druge datoteke
• Kako se crvi šire putem mreže:
• Iskorištavaju protokole za udaljeno
spajanje/administraciju (npr. RDP, SSH)
• Iskorištavaju slabosti u lozinkama (npr. Stuxnet koristio
defaultne zaporke za Siemens PLC, pogađaju lozinke)
• Iskorištavaju sigurnosne ranjivosti u mrežnim servisima
(npr. SQL Slammer, Blaster, Code Red, Nimda,…)
• Iskorištavaju sigurnosne ranjivosti u aplikacijama
Trojanski konji
• Glavna karakteristika:
• Nisu se u stanju sami širiti
• Ne inficiraju druge datoteke
• Potreban drugi maliciozni program za samu instalaciju
• Napadaču omogućavaju kontrolu preko Interneta
• Danas najčešći maliciozni programi
• Kradu osjetljive informacije ili koriste lokalne resurse
• Omogućuju potpunu kontrolu računala od strane napadača
Trojanski konj - klijent
• Povratna veza (reverse connection) – standardni portovi
(80, 443)
Dridex
Dridex
Dridex
• Upload files
• Download files
• Execute files
• Monitor network traffic
• Browser screenshot taking
• Add the compromised computer to a botnet
• Communicate with other peer nodes through the peer-to-peer (P2P)
protocol to retrieve configuration details
• Download and execute additional modules
• Download and execute additional files
• Inject itself into browser processes for Internet Explorer, Chrome, and
Firefox in order to monitor communications and steal information.
Potencijalno neželjene aplikacije
• Primjer Stuxneta
• Worm dio – odgovoran za širenje malvera
• Izvršni dio – izvođenje malvera
• Rotkit dio – skrivanje malvera
Fileless malware persistence
• https://www.comparitech.com/blog/information-security/fileless-
malware-attacks/
• When you turn off a computer, all active processes shut
down. Processes that are services of the operating system
are started up again when you turn the computer on.
• Fileless malware writes its script into the Registry of
Windows. This is a function of the operating system that
launches programs either at system startup or on a
schedule. The code that runs the fileless malware is actually a
script. A script is a plain text list of commands, rather than a
compiled executable file.
• Short lists of instructions don’t have to be stored in a file.
However, longer and more complicated scripts do get stored for
relaunch at system start up. In these case, although the
program is classified as “fileless,” there is actually a file
involved.
Fileless Malware
• https://attackevals.mitre-engenuity.org/enterprise/wizard-spider-
sandworm/
Zaključak