Malware at a glance or: Facing the latest threats
Transcription
Malware at a glance or: Facing the latest threats
Malware at a glance or: Facing the latest threats Raimund Genes CTO Anti-Malware Once upon a time… • Profile: – – – – Male Between 14 and 34 years of age Computer addicted No permanent girlfriend Jeffrey Lee Parson MSBlaster Sven Jaschan Sasser No commercial interest!!! David L. Smith Melissa Onel de Guzman ILOVEYOU 2 The most famous quote for malware writers nowadays The secret of life is honesty and fair dealing If you can fake that, you‘ve got it made Groucho Marx 3 Cybercrime – not only a word But reality! • • • • • • Jeanson James Ancheta from California 20 year old Was arrested 4th of November 2005 in Los Angeles Created a botnet with 400000 computers under his control Botnet was for rental to spread Spam or to start DDOS Access to BotNet was granted for 3000 USD in average, over 30 transaction have been made = 90000 USD • $107,000 in advertising affiliate proceeds by downloading adware to the infected computers • 60000 USD in cash, pimped up BMW and high end computer environment 4 Ancheta will be in jail for 57 month, he even infected a US Marine Naval Air Warfare, China Lake, CA 5 A typical Bot Herder: 0x80" (pronounced X-eighty) Background: High school dropout. Attitude: "most of these people I infect are so stupid they really ain't got no business being on the Internet in the first place.“ Working hours: approx. 2 minutes/day to manage Botnet. - Monthly earnings: $ 6800 on average. Daily Activities: Chatting with people while his bots make him money. - Recently paid $800 for an hour alone in a VIP room with several dancers. Job Description: Controls 13,000+ computers in more than 20 countries. – Infected Bot PCs download Adware then search for new victim PCs. - Adware displays constant ads and mines data about the victim's online browsing habits. - Malicious Bots collect data incl. password, e-mail address, SS#, credit and banking data, a.s.o - Gets paid by companies like TopConverting.com, GammaCash.com, Loudcash, or 180Solutions. Source: Washington Post: Invasion of the Computer Snatchers 6 Cybercrime – not only a word But reality! • Jay R. Echouafni • Entrepreneur • CEO Orbit Communications • ... and BotNet-Renter Jay Echouafni rented Botnets to switch off webpages through DDOS-attacks 7 50.000 USD, or we shut down your page! 8 Eight Years for Extorting Millions The strategy was simple. A bookmaker that was accepting online stakes in time of some big sports competitions received an e-mail, notifying the site was under attack and urging to pay $40,000. The email was followed by a trial attack and then by another e-mail demanding to transfer money via Western Union to accounts in Riga, Latvia. The accused attacked nine British and Irish bookmakers and casinos from the Ivan Maksakov (Wrote Bots) fall of 2003 till the spring of 2004, casing Alexander Petrov (Controlled DDoS attacks) direct damage of over £2 million. The Denis Stepanov (Some initial arrangements) amount reached £40 million once the costs incurred for buying protection equipment were taken into account. 9 So what is a Botnet? • Botnet: A large number of compromised computers (zombies) controlled by an unauthorized entity for (usually) malicious purposes. • Zombie: A computer that has been covertly taken over by an unauthorized entity. 10 How big is the problem? • Botnets: The #1 emerging Internet threat • Estimated 7% of all computers on the internet are zombies (75-100 million machines) – Responsible for over 80% of all spam – Generate click fraud in excess of $1 billion annually – Phishing to commit identity theft – DDOS attacks for extortion or retribution of 8-22Gbps – Malware distribution such as key loggers – Propagation of the species - 200k bots/month growth 11 How do you spread bots/malware? With clever Social Engineering – Spreading is only one Double-Click away 12 Country specific targeted attacks! 13 Phishing • Phishing • • • • Uses Social Engineering Pursues users to give away confidential data Mail from a “trusted source” Call for action: “your account will be closed”, “update your data” • Link to a web page, which looks like the “real one” • Access data will be transferred to third parties Goes to a site in Romania 14 Phishing BKA President Dr. Joerg Ziercke: Success-Quote of Phishing attacks in germany: <> 5% ConsumerReports (USA): Phishing attacks on US citizens have generated 630 M USD in 2005 15 Pharming • “automated” Phishing • DNS Cache Poisoning • DNS Server Hacks • “real” adresses will be redirected to wrong adresses • No Phishing Mails needed – automated attacks with malware 16 Spyware 17 Ransomware – Troj_Ransom.A 18 Web – The latest method to spread malware! Study: Browsers Are Chief Virus Carrier SEPTEMBER 13, 2006 | If you work in security for one of those "cool" companies that lets employees use the corporate network to surf the Web on their own time, you might want to think about becoming a killjoy. According to a study of 200 companies published earlier today by IDC Denmark, Web surfing has surpassed email as the most prevalent method of spreading worms and viruses. (See IDC: Private Internet Use Insecure.) "There is a common misconception that emails constitute the biggest security threat from the Internet," says Per Andersen, managing director at IDC Denmark. "But the survey shows that up to 30 percent of companies with 500 or more staff have been infected as a result of Internet surfing, while only 20 to 25 percent of the same companies experienced viruses and worms from emails." 19 What are we really facing? The amazing case of Gromozon (aka Troj_LINKOPTIMI) •In May 2006 italian users started to report strange behaviour in Windows – crashes at boot up, unusual popups from heuristic AV, but files couldn‘t be cleaned, odd files on the harddisks. Then users start to report infections of rootkits, discovered by some rootkit scanners. 20 Gromozon It starts with a webpage... The webpage contains an obfuscated JavaScript. This encrypted JavaScript actually calls another webpage! This webpage then runs a complex PHP script, checking 21 which browser is used Gromozon The PHP script starts different infection routines, depending on the browser. It checks for Internet Explorer (version checking as well), Firefox and Opera. Using browser specific vulnerabilities it tries to autoload the file www.google.com. If this is not working it asks the user – then Firefox users are save (default settings)... But not the MS IE community... 22 Gromozon The file www.google.com is a downloader. It is using a server side polymorphism, changing it‘s shape all the time. It connects to a remote server and drops installers, installing an adware program, a rootkit and a Windows service. The Windows service links to a file which is encrypted by the infected system, utilizing the Windows Encrypting File System (EFS). The welknown adware LinkOptimizer is hidden to the user (and to AV software) by the rootkit. The rootkit even prevents Anti-Rootkit tools like F-Secure Blacklight from running. 23 OK Gromozon is the mother of all malware, but an exception, or? Automatic Analysis of a Stration variant 24 Travel Policies are dangerous… Say you are a new hire for any company. Your boss asks you to develop a well-researched and well-documented company policy on, say for example, company employee travels. Most often than not, you will have to start of with a Google search. And that is exactly what you do. Open Google and type in "travelpolicy". This will be the result: Oct 7, 2006 25 Travel Policies are dangerous… You don't choose the first hit simply because you see it's a .GOV site and information found in .GOV sites may seem too lengthy for your objectives. You just need a simple do-it-yourself tutorial in how to create and implement a travel policy guide for your business - which is exactly the description for the second hit encircled in the above image. So you click on the URL. And then the site opens... Seems like the site is pretty much taking more time in downloading images and content. So you wait... And wait... And when you observe that it's been taking forever for the site to complete, you close the window and move on to other sites that can offer the information that you need. End of story? Not quite. 26 Travel Policies are dangerous… As you waited for the site to completely show up, something was already happening in the background that goes unobserved... The site, www.travelpolicy.com, has an IFRAME at the very top which leads you to the 81.95.146.98/index.html. The index.html file actually has a script that exploits the MS Internet Explorer (MDAC) Remote Code Execution Exploitdescribed in MS06-014. The original exploit code is also modified in an attempt to bypass AV scanners that detect the original code. It sure is nasty! An executable file, win.exe, is downloaded to your system and executed. This file is actually a backdoor with rootkit features, and is a variant of the notorious family of backdoor rootkits known as Haxdoor! 27 Travel Policies are dangerous… not anymore Now it‘s an innocent page again. So was the site hacked? Was it done on purpose? Oct 14, 2006 28 Get Rich quick… the hacker’s dream Zero day attacks on sale! 29 Get Rich quick… the hacker’s dream Webattacker Toolkit order page Dear friends! We are glad to offer you multicomponental exploit WebAttacker IE0604, provided to exploit vulnerabilities in popular Internetbrowsers like Internet Explorer and Mozilla Firefox. Utilizing the vulnerabilities you can install any executable program on local disks of people visiting your sites. Purpose(Assignment) of Webattacker: the latent loading of an EXEprogram from the remote Web-Source with the automatic start of this program on a local disk of the visitor. 30 Threat Summary • The internet is now really in a golden age - of criminal invention! •Phishing, Pharming, Spyware, Spam - all linked to making money! And due to the fact that even Spam is banned in some countries now (Can Spam Act, Anti Spyware act in California) it is getting more and important for these criminals to hide their traces. •The bad guys are hiring amateurs and professional programmers who could write BOTS to hijack computers. These so called Zombie computers are then uses for all kind of criminal activities - from sending spam, starting phishing attacks up to Distributed Denial of Service attack (DDOS), we have seen everything.. 31 Another famous quote Willy Sutton, a famous bank robber in the 40th (robbed banks in Miami, New York and New Orleans) was asked why he robbed banks „Because that‘s where the money is“ 32 A modern Willy Sutton Hacking raid on Sumitomo bank thwarted Thieves may have used keylogging to try to steal $424M MARCH 17, 2005 (TECHWORLD.COM) - Security experts are praising Sumitomo Mitsui Banking Corp. for admitting that it was the target of a failed $424 million hacking attempt. The U.K.'s National High Tech Crime Unit (NHTCU) has issued a warning to large banks to guard against keylogging, the method adopted by the would-be thieves in an attack on the Japanese bank's London systems. The intruders tried to transfer money out of the bank via 10 accounts around the world. Yeron Bolondi, 32, was seized by Israeli police yesterday after an alleged attempt to transfer some of the cash into his business account. He was reportedly charged with money laundering and deception. In a statement, Israeli police said there had been an attempt to transfer $26.7 million into the account "by deception in a sophisticated manner." 33 Big Numbers.... •Identity thieves are expected to steal more than 1 trillion in 2006! •The FBI claims, that financial loss from spyware and other computer related crimes have cost U.S. businesses $62 Billion in 2005 •Cybercriminals are making more money then the „illegal drug trading industry“ according to the U.S. treasury •Each day, $24 billion in bank deposits are at risk each day in the United States 34 The threats will not disappear! That‘s why Trend Micro is adressing the root problem! Here! 35 Root Problem: Spam and Phishing Trend Micro‘s hall of shame – Network Reputation Services 36 I hope that Microsoft is wrong this time... 37