CH06-Malicious Software
CH06-Malicious Software
Security
NET363
Office: YIC—AS-083
Cisco IP-phone: 41297
Email: [email protected]
Course Delivery and Lecture Schedule
Topics to be Covered
List of Topics Weeks Contact
Hours
1. Introduction to Computer and Information Security 1 3
6. User Authentication 1 3
Malware
Organizations
Politically that sell their National
Organized
motivated Criminals services to governmen
crime
attackers companies t agencies
and nations
This has significantly changed the resources available and motivation behind the rise
of malware and has led to development of a large underground economy involving
the sale of attack kits, access to compromised hosts, and to stolen information
Advanced Persistent Threats (APTs)
Persistent
APT • Determined application of the attacks over an extended
period against the chosen target in order to maximize the
Characteristics chance of success
• A variety of attacks may be progressively applied until the
target is compromised
Threats
• Threats to the selected targets as a result of the organized,
capable, and well-funded attackers intent to compromise
the specifically chosen targets
• The active involvement of people in the process greatly
raises the threat level from that due to automated attacks
tools, and also the likelihood of successful attacks
APT Attacks
• Social engineering
Techniques • Spear-phishing email
• Drive-by-downloads from selected compromised websites likely
used: to be visited by personnel in the target organization
Triggering phase
• Virus is activated to perform the function for which it
was intended
Virus • Can be caused by a variety of system events
Execution phase
• Function is performed
• May be harmless or damaging
Virus Structure
Virus Classifications
Classification by target Classification by concealment strategy
• Spreads through shared media (USB drives, CD, DVD data disks)
• First known implementation was done in Xerox Palo Alto Labs in the early
1980s
Worm Replication
Worm e-mails a copy of itself to other
Electronic mail or instant systems
SQL Slammer Early 2003 exploited a buffer overflow vulnerability in SQL server
compact and spread rapidly
Sobig.F Late 2003 exploited open proxy servers to turn infected machines into spam engines
Metamorphic Multi-exploit
Worm
Technology
Ultrafast
Polymorphic
spreading
Mobile Code
Transmitted from a
Programs that can be
remote system to a
shipped unchanged
local system and then
to a variety of
executed on the local
platforms
system
Popular vehicles
include Java applets,
ActiveX, JavaScript
and VBScript
Mobile Phone Worms
EXPLOITS BROWSER IN MOST CASES DOES NOT SPREADS WHEN USERS VISIT
VULNERABILITIES TO ACTIVELY PROPAGATE THE MALICIOUS WEB PAGE
DOWNLOAD AND INSTALLS
MALWARE ON THE SYSTEM
WHEN THE USER VIEWS A WEB
PAGE CONTROLLED BY THE
ATTACKER
Clickjacking
• Vulnerability used by an attacker to
collect an infected user’s clicks
• The attacker can force the user to do a
variety of things from adjusting the
• Also known as a user-interface user’s computer setters to unwittingly
(UI) redress attack sending the user to Web sites that
might have malicious code
• Using a similar technique,
keystrokes can also be hijacked • By taking advantage of Adobe Flash or
• A user can be led to believe they are typing JavaScript an attacker could even place
in the password to their email or bank a button under or over a legitimate
account, but are instead typing into an button making it difficult for users to
invisible frame controlled by the attacker detect
• A typical attack uses multiple
transparent or opaque layers to trick a
user into clicking on a button or link on
another page when they were
intending to click on the top level page
• The attacker is hijacking clicks meant
for one page and routing them to
another page
Social Engineering
• “Tricking” users to assist in the compromise of their own systems
Mobile phone
Spam Trojan horse
Trojans
Ransomware
• Encrypts the user’s data and
demands payment in order to access
the key needed to recover the
information
• PC Cyborg Trojan (1989)
• Gpcode Trojan (2006
Payload
System Corruption
• Real-world damage
• Causes damage to physical equipment
• Chernobyl virus rewrites BIOS code
• Stuxnet worm
• Targets specific industrial control system software
• There are concerns about using sophisticated targeted
malware for industrial sabotage
• Logic bomb
• Code embedded in the malware that is set to
“explode” when certain conditions are met
Payload – Attack Agents
Bots
• Takes over another Internet attached computer and uses that computer to launch or manage
attacks
• Botnet - collection of bots capable of acting in a coordinated manner
• Uses:
• Distributed denial-of-service (DDoS) attacks
• Spamming
• Sniffing traffic
• Keylogging
• Spreading new malware
• Installing advertisement add-ons and browser helper objects (BHOs)
• Attacking IRC chat networks
• Manipulating online polls/games
Remote Control Facility
Keylogger Spyware
• Captures keystrokes to • Subverts the compromised
allow attacker to monitor machine to allow monitoring
sensitive information of a wide range of activity
• Typically uses some form of on the system
filtering mechanism that • Monitoring history and
only returns information content of browsing
close to keywords (“login”, activity
“password”) • Redirecting certain Web
page requests to fake sites
• Dynamically modifying
data exchanged between
the browser and certain
Web sites of interest
Payload – Information Theft
Phishing
Exploits social engineering to Spear-phishing
leverage the user’s trust by • Recipients are carefully
masquerading as communication researched by the attacker
from a trusted source • E-mail is crafted to
specifically suit its recipient,
• Include a URL in a spam e-mail often quoting a range of
that links to a fake Web site information to convince
that mimics the login page of a them of it authenticity
banking, gaming, or similar site
• Suggests that urgent action is
required by the user to
authenticate their account
• Attacker exploits the account
using the captured credentials
Worm Countermeasures
Considerable overlap in techniques for dealing with viruses and worms
Limitations