malware by ms. allwood

27
MALWARE

Upload: stavia

Post on 22-Jan-2018

135 views

Category:

Software


2 download

TRANSCRIPT

Page 1: Malware by Ms. Allwood

MALWARE

Page 2: Malware by Ms. Allwood

OBJECTIVES

What malware are Types of malware

How do they infect hosts

How do they hide

How to detect them

Page 3: Malware by Ms. Allwood

WHAT IS A MALWARE ?

A Malware is a set of instructions that run on your computer and

make your system do something that an attacker wants it to do.

Page 4: Malware by Ms. Allwood

WHAT IT IS GOOD FOR ?

Steal personal information Steal valuable data Destroy data Denial of Service Use your computer as relay

Page 5: Malware by Ms. Allwood

VIRUSES A malicious piece of code that spreads itself from file to file

A virus needs a host file

Requires user interaction Like opening a file

Different types of viruses Program viruses Boot viruses Macro viruses

Infected File

Virus as payload

Page 6: Malware by Ms. Allwood

WORMS A malicious piece of code that spreads itself from computer to

computer by exploiting vulnerabilities A worm needs no host file Spreads without user interaction

Can spread via e-mail attachments LAN or Internet

2nd generation of worms automatically search for vulnerable computers and infect them Whole Internet can be infected in less than 20 minutes

Page 7: Malware by Ms. Allwood

TROJANS “Trojan Horse”

Programs with hiddenmalicious functionalities

Appear to be screensavers, games, or other“useful” programs “There’s an app for that!”

IPhone and Android apps

Page 8: Malware by Ms. Allwood

LOGICAL BOMBS Malicious code programmed to be activated on a specific date,

time or circumstances

Action could be everything from formatting hard drive to display a silly message on the user’s screen

Often combined with a virus/worm (e.g, Chernobyl virus)

Page 9: Malware by Ms. Allwood

BLENDED THREATS Advanced malicious software that combines the characteristics of

viruses, worms, trojans and malicious scripts are sometimescalled “Blended Threats” It’s hard to know where to draw the line

Exploits one or many vulnerabilities inprograms or operating system

*Mick Douglas, PaulDotCom Podcast https://twitter.com/#!/haxorthematrix/statuses/2421087772

Page 10: Malware by Ms. Allwood

VIRUSES

4 phases: Dormant phase: It is idle, waiting for some event Triggering phase: activated to perform some intended

actions Propagation phase: Copy itself into other programs Execution phase: execute the payload

Page 11: Malware by Ms. Allwood

MACRO VIRUSES Macro: an executable program embedded in a

document to automate repetitive tasks. (save keystrokes)

Application-dependent, e.g., MS office Cross the O.S. platform Why virus writers like macro viruses?

Easy to learn Easy to write Popularity of MS office

Page 12: Malware by Ms. Allwood

HOW MACRO VIRUS WORKS

Every word document is based on a template When an existing or new document is opened,

the template setting are applied first A global template: NORMAL.DOT

Page 13: Malware by Ms. Allwood

WORM

Worm: self-replicating over networks, but not infecting program and files

Example: Morris worm, blaster worm

Page 14: Malware by Ms. Allwood

THE STRUCTURE OF WORMS Target locator (find the target)

Email address collector IP/port scanner

Warhead Break into remote machines

Propagation Automatically sending emails Automatically attack remote hosts

Remote control and update Download updates from a web server Join a IRC channel

Lifecycle management Commit suicide Avoid repeatedly infecting the same host

Payload

Page 15: Malware by Ms. Allwood

STATE OF WORM TECHNOLOGY

Multiplatform: Windows, unix, mac, … Multiexploit: web server, browser, email,… Ultrafast spreading: host/port scanning Polymorphic: Each copy has new code generated by

equivalent instructions and encryption techniques. Metamorphic: different behavior patterns Transport vehicles: for the payloads (spread attacking

tools and zombies) Zero-day exploit: self-updated

Page 16: Malware by Ms. Allwood

DISCUSSION

Is it a good idea to spread worms with system patches?

Page 17: Malware by Ms. Allwood

TROJAN

A program with hidden side-effects that are not specified in the program documentation and are not intended by the user executing the program

Page 18: Malware by Ms. Allwood

WHAT A TROJAN CAN DO Remote administration trojans: attackers

get the complete control of a PC Backdoor: steal data and files Distributed attacks: zombie network Password stealers: capture stored

passwords Audio, video capturing: control devices Keyloggers: capture inputting passwords Adware: popup advertisements Logic bomb: only executed when a specific

trigger condition is met

Page 19: Malware by Ms. Allwood

FAMILIAR WITH YOUR PC

Startup programs/services

Frequently used IP ports20/21 FTP23 Telnet25 SMTP80 WWW

Netstat

Page 20: Malware by Ms. Allwood

MALWARE PAYLOADS No payload Payload without damage

Only display some information Payload with little impact

Modify documents (wazzu virus) Payload with heavy impact

Remove files, format storageEncrypting data (blackmail)Destroy hardware (W95.CIH): rewrite flash

bios DDoS attacks Steal data for profit

Page 21: Malware by Ms. Allwood

MALWARE NAMING

CARO (computer antivirus researchers organization)

CARO naming convention (1991) <family_name>.<group_name>.<Infective_length

>.<variant>.<modifier> e.g., cascade.1701.A.

Platform prefix win32.nimda.A@mm

Page 22: Malware by Ms. Allwood

MALWARE DEFENSES (1)

Detection: once the infection has occurred, determine that it has occurred and locate the virus

Identification: once detection has been achieved, identify the specific virus that has infected a program

Removal: once the specific virus has been identified, remove the virus from the infected program and restore it to its original state

Page 23: Malware by Ms. Allwood

MALWARE DEFENSES (2)

The first generation scannerVirus signature (bit pattern)Maintains a record of the length of programs

The second generation scannerLooks for fragments of code (neglect

unnecessary code)Checksum of files (integrity checking)

Virus-specific detection algorithmDeciphering (W95.Mad, xor encrypting)Filtering

Page 24: Malware by Ms. Allwood

MALWARE DEFENSES (3)

The third generation scanner Identify a virus by its actions

The fourth generation scanner Include a variety of anti-virus techniques

Collection method Using honeypots

Page 25: Malware by Ms. Allwood

MALWARE IN MOBILE PHONES Mobile phones are computers with great connectivity

Internet WLAN Bluetooth Regular phone network (SMS, MMS) RFID

Page 26: Malware by Ms. Allwood

IN THE FUTURE…

New spreading methods: e.g., RFID

Infected!

Infected!

Infected!

Page 27: Malware by Ms. Allwood

QUESTIONS?