Recent Malicious Email Attack Trend Micro Updates Harvard Townsend SIRT IT Security Roundtable

advertisement
Recent Malicious Email Attack
Trend Micro Updates
SIRT IT Security Roundtable
Harvard Townsend
Chief Information Security Officer
harv@ksu.edu
August 14, 2009
Agenda

Recent malicious email attachments






What happened?
Why was it so effective?
How can we defend against these attacks?
Trend Micro OfficeScan 10
Trend Micro Security for Macs
Q&A
2
What happened?






Monday, July 13, 12:59pm – received first report (from
Penn State) that a K-State computer was sending
spam with a malicious attachment
Many more reports soon followed from around the
world implicating many K-State IP addresses
Many K-Staters started reporting receipt of the
malicious emails too
4:22pm - started blocking infected computers;
continued detecting/blocking infected computers for
three more days
113 infected computers blocked, others detected by
sysadmins and rebuilt w/o getting blocked
5:45pm – posted info/warning to IT security threats blog
3
What happened?

Four different emails with the following subjects:





Three (somewhat) different attachments:




Shipping update for your Amazon.com order 254-78546325-658742
You have received A Hallmark E-Card!
Jessica would like to be your friend on hi5!
Your friend invited you to twitter!
Shipping documents.zip
Postcard.zip
Invitation card.zip
At least three different malicious executables in the zip files (note the
numerous spaces in the file name before the “.exe” extension):



“attachment.pdf
“attachment.htm
“attachment.chm
.exe”
.exe”
.exe”
4
What happened?




New variant of malware so Trend Micro
OfficeScan did not detect it.
10:45pm - I tried to submit samples to Trend
Micro. Thought it worked, but found out in
the morning it didn’t.
11:52pm – warning email sent to profacstaff
and classified mailing lists
July 14, 8:00am – virustotal.com reports 29
of 41 AV products identify the malware (not
Trend Micro)
www.virustotal.com/analisis/...
5
What happened?







July 14, 9:00am – finally get samples uploaded to Trend
Micro
11:40am – Trend reports malware identified as
WORM_AGENTO.BY, “bandage” pattern file available
2:00pm – bandage pattern file pushed out to OfficeScan
clients
Production pattern file released later that evening which
detects the malware
397 instances detected/deleted by TMOS since July 13
IT Tuesday article posted about it
itnews.itac.k-state.edu/2009/07/malicious...
July 29 and August 7 - similar attacks with new variants of
the malware; submitted samples to Trend faster with about a
2 hour turnaround for pattern file that detects the malware
6
Malware Characteristics




Harvested email addresses in address books
and sent the same malicious emails to
everyone – aka “mass mailing worm”; that’s
why so many people at K-State received so
many copies
Modified registry to run every time the
computer boots
Copied itself to mounted file systems,
including USB flash drives
Copied itself to common P2P file sharing
folders, masquerading as enticing software
downloads
7
Malware Characteristics

Sample P2P folders used:






%ProgramFiles%\ICQ\Shared Folder
%ProgramFiles%\Grokster\My Grokster
%ProgramFiles%\EMule\Incoming
%ProgramFiles%\Morpheus\My Shared Folder
%ProgramFiles%\LimeWire\Shared
Sample enticing software downloads:











Ad-aware 2009.exe
Adobe Photoshop CS4 crack.exe
Avast 4.8 Professional.exe
Kaspersky Internet Security 2009 keygen.exe
LimeWire Pro v4.18.3.exe
Microsoft Office 2007 Home and Student keygen.exe
Norton Anti-Virus 2009 Enterprise Crack.exe
Total Commander7 license+keygen.exe
Windows 2008 Enterprise Server VMWare Virtual Machine.exe
Perfect keylogger family edition with crack.exe
… and about 25 more
8
Why was it so effective?

Used familiar services











Amazon.com
Hallmark eCard greeting
Twitter
Sensual enticement (“Jessica would like to be your friend on hi5!”)
Somewhat believable replicas of legitimate emails
Sent it to lots of people (bound to hit someone who just ordered
something from amazon.com, or is having a birthday)
Effectively masked the name of the .exe file in the .zip attachment
by padding the name with lots of spaces
New variant that spread quickly so initial infections missed by
antivirus protection
I was too slow submitting samples to Trend (better the second and
third time around)
Malware/attachment filtering in Zimbra did not stop it
Been a long time since attack came by email attachment so people
caught off-guard
9
What can we do?

Users need to learn to recognize scams




Hallmark, amazon.com, etc. do not send
info in attachments
Don’t open attachment unless you are
expecting it and have verified with sender
Think before you click
Be paranoid!
10
Malicious
Hallmark
E-Card
11
Legitimate
Hallmark
E-Card
12
Malicious
Amazon
Shipping
Notice
13
Legitimate
Amazon
Shipping
Notice
14
Malicious
Twitter
Invitation
15
What can we do?

Better malware filtering in e-mail



Need to work more closely with
Zimbra/Yahoo
Submit malware samples sooner
(we’re doing that now)
Trend Micro OfficeScan 10…
16
Trend Micro OfficeScan 10



Major upgrade from current version 8 (where did version 9
go?!)
Ripe with marketing hype (“Cloud-Client Architecture”,
“Smart Protection Network”, “Global Threat Intelligence”)
But it appears to provide real value:







Faster deployment of pattern file updates
Smaller client footprint
Windows 7 support (not officially supported in OfficeScan 8)
More options for re-scheduling missed scheduled scans
Better Active Directory integration
Better control of removable devices like USB drives
Protection of the OfficeScan program itself (prevents malware
from altering OfficeScan files, processes and registry entries)
17
Trend Micro OfficeScan 10

“In-the-cloud” scanning (“SmartScan”) vs.
conventional scanning





Client uses pattern info stored on local or global
servers rather than having to store everything on
every client computer
Updates pattern files hourly instead of daily
Smaller pattern files on the client, less network
bandwidth used to deploy pattern files
Some heuristic-based detection
Can still do conventional scanning for systems
with limited Internet access
18
Trend Micro OfficeScan 10

Better options for dealing with missed scheduled scan





Postpone a schedule scan before it begins
Stop and Resume a current active schedule scan
Resume a missed schedule scan
Automatically skip schedule scan when Laptop Battery is
below certain %
Automatically stop schedule scan when it lasts over a
certain amount of period.
19
Trend Micro OfficeScan 10

Device Access Control


Sysadmins can control use of removable drives
Examples: Removable Thumb Drives, Firewire Hard Drives,
PC-Cards, Media Players.
20
Trend Micro OfficeScan 10

The Trend Micro Unauthorized Change
Prevention Service replaces the OfficeScan
watchdog as the principal means of preventing
OfficeScan services from being stopped, and
settings from being changed




To prevent OSCE applications being injected with
malware and impact business operation
Feature provides the ability to protect OfficeScan
files / file types within folders from being modified
Protect OfficeScan system processes to prevent
unauthorized shut-down
Protect OfficeScan system registries from
unauthorized modification
21
Trend Micro OfficeScan 10

TMOS 10 concerns






Is a major upgrade so needs to thorough testing
Uncertainty about use of SmartScan vs. conventional
scan
Significant CPU utilization every hour on Local Scan
Server when it downloads and processes new pattern
files
Standalone Scan Server requires VMware™ ESXi Server 3.5
Update 2. VMware ESX™ Server 3.5 or 3.0, or VMware Server 2.0
1,000 client limit if run Local Scan Server and
OfficeScan server on same server (compared to 5,0008,000 clients for latter) – called “Integrated Scan
Server”
No tool yet to export/import config form TMOS 8 server
to TMOS 10 environment, but they’re working on it. 22
Trend Micro OfficeScan 10

TMOS 10 plans





Is available now, been out for a while (service
pack 1 in beta)
Needs more testing – campus sysadmins
encouraged to test
Central TMOS 10 server for testing sometime...
SIRT will plan coordinated rollout for campus
(can be pushed from the server)
No timeline at this point, but advantages warrant
a somewhat aggressive schedule, as does
release of Windows 7 in late October
23
Trend Micro Security for Macs




K-State’s license for Symantec AV for
Macs expires October 27, 2009
No budget for renewal or replacement
TM Security for Macs (TMSM) new
product from Trend Micro, included in
our campus site license
Barring a show-stopper problem, we
will switch to TMSM this fall
24
Trend Micro Security for Macs

Features/Advantages:








No additional cost
Managed product (can push pattern file updates,
manage configuration, centralized reporting, etc.)
Managed as plug-in to current Windows OfficeScan
servers, so have common mgmt platform
Supports MacOS 10.4 and 10.5 on Intel and
PowerPC processors
Includes Web Reputation Services to help prevent
users from visiting known malicious web sites
Covered by current Silver Premium Support
contract
Single vendor for all AV product
25
No additional cost
Trend Micro Security for Macs

Timeline:


Version 1.5 in beta test now
Being tested pretty extensively at K-State




Fixed known issues we had with v1.0
Production release available to K-State after
August 25
Switch by October 27, or semester break for
imaged labs (SAV will continue to work)
New Macs should install Symantec now
but plan to switch
26
What’s on your mind?
27
Download