Malicious Software
Malicious Software
Malicious Software
(Malware)
Types of Software
Useful and Malware
• As a matter of fact, the European Union Agency for Network and Information
Security’s annual threat report lists malware as the top cyber threat for 2016 and
2017.
• Key findings of the report states that the Ransomware continues to dominate the
Windows malware scene, with an evolution from 55% in January 2017 to 75% in
July 2017.
Types of Malware
Backdoor (trapdoor)
Adware Auto-rooter Any mechanism that
Advertising that is integrated A malicious hacker tool bypasses a normal security
into software; it can result in check; it may allow
pop-up ads or redirection of a
used to break in to new
machines remotely unauthorized access to
browser to a commercial site
functionality
Dropper
Downloader A malware installer that carries
Exploit A program that installs malicious software to be
other items on a machine executed on the compromised
Code specific to a single machine;
vulnerability or set of that is under attack;
Droppers don’t cause harm
vulnerabilities Usually a downloader is directly but deliver a malware
sent in an email message payload onto a target machine
without detection
Types of Malware
Polymorphic dropper
Also called a polymorphic Flooder
packer, a software exploit tool A tool used to attack Keyloggers
that bundles several types of networked computer
malware into a single A software tool that
systems with a large volume
package, such as an email captures keystrokes on a
attachment, and can force its of traffic to carry out a
compromised system
“signature” to mutate over denial-of-service (DoS)
time, making it difficult to attack
detect and remove
Spyware
Spammer programs
Software that collects information
Programs used to send large volumes
from a computer and transmits it to
of unwanted email
another system
Trojan horse
Virus
A computer program that appears to have
a useful function but also has a hidden and Malware that, when executed, tries to
potentially malicious function that evades replicate itself into other executable
security mechanisms, sometimes by code; when it succeeds, the code is
exploiting legitimate authorizations of a infected; when the infected code is
system entity that invokes the Trojan horse executed, the virus also executes
program
Types of Malware
Worm
Web drive-by A computer program that runs
An attack that infects a user system independently and propagates a
when the user visits a web page complete working version of itself
onto other hosts on a network
Zombie, bot
A program that is activated on an
infected machine to launch attacks on
other machines
Classification of Malware
Virus accomplish this by temporarily moving itself away from the infected file and copying itself to another drive and
replacing itself with a clean file.
The stealth virus can also avoid detection by concealing the size of the file it has infected.
Attack Kits
• Initially the development and deployment of malware required considerable
technical skill by software authors
o The development of virus-creation toolkits in the early 1990s and then more general attack kits in the 2000s greatly
assisted in the development and deployment of malware
• Toolkits are often known as “crimeware”
o Include a variety of propagation mechanisms and payload modules that even novices can deploy
o Variants that can be generated by attackers using these toolkits creates a significant problem for those defending
systems against them
• Widely used toolkits include:
o Zeus
o Blackhole
o Sakura
o Phoenix
Attack Sources
• Another significant malware development is the change from attackers
being individuals often motivated to demonstrate their technical
competence to their peers to more organized and dangerous attack sources
such as:
Organizations
Politically that sell their National
Organized
motivated Criminals services to government
crime
attackers companies agencies
and nations
• Differ from other types of attack by their careful target selection and stealthy
intrusion efforts over extended periods
Persistent
• Determined application of the attacks over an extended period against the chosen
target in order to maximize the chance of success
• A variety of attacks may be progressively applied until the target is compromised
Threats
• Threats to the selected targets as a result of the organized, capable, and well-funded
attackers intent to compromise the specifically chosen targets
• The active involvement of people in the process greatly raises the threat level from
that due to automated attacks tools, and also the likelihood of successful attacks
APT Attacks
• Aim:
o Varies from theft of intellectual property or security and infrastructure related data to the
physical disruption of infrastructure
• Techniques used:
o Social engineering
o Spear-phishing email
o Drive-by-downloads from selected compromised websites likely to be visited by
personnel in the target organization
• Intent:
o To infect the target with sophisticated malware with multiple propagation mechanisms
and payloads
o Once they have gained initial access to systems in the target organization a further range
of attack tools are used to maintain and extend their access
Viruses
• Piece of software that infects programs
o Modifies them to include a copy of the virus
o Replicates and goes on to infect other content
o Easily spread through network environments
Infection mechanism
Trigger
Payload
Triggering phase
Virus is activated to perform the function for
Can be caused by a variety of system events
which it was intended
Propagation phase
Virus places a copy of itself into Each infected program will now
May not be identical to the
other programs or into certain contain a clone of the virus which
propagating version
system areas on the disk will itself enter a propagation phase
Execution phase
• Spreads through shared media (USB drives, CD, DVD data disks)
• E-mail worms spread in macro or script code included in attachments and instant
messenger file transfers
• First known implementation was done in Xerox Palo Alto Labs in the early 1980s
Worm Replication
Remote file access or • Worm uses a remote file access or transfer service to copy itself
transfer capability from one system to the other
Metamorphic Multi-exploit
Worm
Technology
Ultrafast
Polymorphic
spreading
Mobile Code Malware
• Programs that can be shipped unchanged to a variety of platforms
• Transmitted from a remote system to a local system and then
executed on the local system
• Often acts as a mechanism for a virus, worm, or Trojan horse
• Takes advantage of vulnerabilities to perform its own exploits
• Popular vehicles for mobile code include Java applets, ActiveX,
JavaScript and VBScript
Mobile Phone Worms
• First discovery was Cabir worm in 2004
• Then Lasco and CommWarrior in 2005
• Communicate through Bluetooth wireless connections or MMS
• Target is the smartphone
• Can completely disable the phone, delete data on the phone, or force
the device to send costly messages
• CommWarrior replicates by means of Bluetooth to other phones,
sends itself as an MMS file to contacts and as an auto reply to
incoming text messages
WannaCry - Ransomware Cryptoworm
Once installed on
infected systems, it also
encrypted files, Tactics such as threatening
demanding a ransom to publish sensitive
payment to recover them. personal information, or to
Recovery of this permanently destroy the
information was generally encryption key after a
only possible if the short period of time, are
organization had good sometimes used to
backups and an increase the pressure on
appropriate incident the victim to pay up
response and disaster
recovery plan
Drive-By-Downloads
• Phishing
• Spear Phishing
• Vishing (voice phishing)
• Baiting (The difference between them is that baiting primarily exploits human curiosity, whereas
phishing attacks rely largely on trust, fear, and a sense of urgency.)
• Pretexting (threat actors typically ask victims for certain information, stating that it is
needed to confirm the victim's identity.)
Ransomware
• Encrypts the user’s data and
demands payment in order to
access the key needed to recover
the information
• PC Cyborg Trojan (1989)
• Gpcode Trojan (2006
Payload :
System Corruption
• Real-world damage
• Causes damage to physical equipment
o Chernobyl virus rewrites BIOS code
• Stuxnet worm
o Targets specific industrial control system software
• There are concerns about using sophisticated targeted malware for
industrial sabotage
• Logic bomb
• Code embedded in the malware that is set to “explode” when certain
conditions are met
Payload :
2. Service Theft
Attack Agents - Bots
• Unlike worm which propagates itself and activates itself, a Bot is initially
controlled from some central facility
• Uses:
• Distributed denial-of-service (DDoS) attacks
• Spamming
• Sniffing traffic
• Keylogging : captures keystrokes on the infected machine, an attacker can
retrieve sensitive information.
Keylogger
• Captures keystrokes to allow attacker to monitor sensitive information
• Typically uses some form of filtering mechanism that only returns information
close to keywords (“login”, “password”)
Spyware
• Subverts the compromised machine to allow monitoring of a wide range of
activity on the system
• Monitoring history and content of browsing activity
• Redirecting certain Web page requests to fake sites
• Dynamically modifying data exchanged between the browser and certain Web
sites of interest
Payload : Information Theft
Phishing
• Exploits social engineering to leverage
the user’s trust by masquerading as
communication from a trusted source • Spear-phishing
• Recipients are carefully
• Include a URL in a spam e-mail researched by the attacker
that links to a fake Web site that
• E-mail is crafted to
mimics the login page of a specifically suit its
banking, gaming, or similar site
recipient, often quoting a
• Suggests that urgent action is range of information
required by the user to to
authenticate their account convince them of its
authenticity
• Attacker exploits the account
using the captured credentials
Payload :
4. Stealthing
Backdoor, Rootkit
Backdoor
• Also known as a trapdoor
• Secret entry point into a program allowing the attacker to gain access and bypass
the security access procedures
• Maintenance hook is a backdoor used by Programmers to debug and test
programs
Rootkit
• Set of hidden programs installed on a system to maintain covert access to that
system
• Gives administrator (or root) privileges to attacker
• Can add or change programs and files, monitor processes, send and
receive network traffic, and get backdoor access on demand
Malware Countermeasure Approaches
Limitations
• Because malicious code must run on the target
machine before all its behaviors can be identified, it
can cause harm before it has been detected and
blocked
Perimeter Scanning Approaches
• Anti-virus software typically
included in e-mail and Web
proxy services running on an Ingress Egress
organization’s firewall and
IDS
monitors monitors
• May also be included in the Located at the
traffic analysis component of Located at the egress point of
border between the
an IDS enterprise network
individual LANs as
well as at the border
and the Internet between the
• May include intrusion enterprise network
prevention measures, and the Internet
blocking the flow of any
suspicious traffic One technique is to
Monitors outgoing
look for incoming
traffic for signs of
• Approach is limited to
traffic to unused
local IP addresses scanning or other
suspicious behavior
scanning malware
o Scanning critical host components such as startup files and boot records
o Watching real-time activities on hosts to check for suspicious activity
o Monitoring the behavior of common applications
o Scanning files for known malware
o Identifying common types of malware as well as attacker tools
o Disinfecting files, (removing malware from within a file), and quarantining files, (files
containing malware are stored in isolation for future disinfection or examination)
Summary
• Types of malicious software • Payload
o System corruption
(malware)
o Attack agent
• Advanced persistent threat • Zombie
• Propagation • Bots
o Infected content
o Information theft
• viruses • Keyloggers
o Vulnerability exploit • Phishing
• worms • Spyware
o Social engineering o Stealthing
• spam • Countermeasures
• e-mail
• Trojans