Malicious Software A Technical B Breakdown Josh Mc cCune Network Secu urity Analyst mccunej@ksu.edu Overrview • • • • • Types of Malware How does it get there? ? How do we find it? How do we analyze it? ? How do we contain it? Malware Definitions D • Spyware S o o o Gathers information for advertisement a purposes Sometimes called adwarre Created by businesses th hat want to know their customers' browsing hab customers bits Malware Definitions D • Viruses / Worms Self-replicating applications o Created by malicious programmers for a varietty of nefarious purposes o Malware Definitions D • Remote Access Trojans o o Server app plications that operate covertly Created byy malicious programmers to give them a means to get back in to a system oncce compromised Malware Definitions D • Rootkits Hard to detect Created by programmerss with advanced knowledg ge of system internals o Known to run for years unnoticed o o Attack Vectors V • Email & attachments • Deception (Social Engin neering) • Web Pages • Malicious Scripts • Counterfeit Websites • Browser vulnerabilities (drive e-by exploits) • • • • Scareware Worms Instant Messaging P2P File Sharing Netwo orks Common Malw ware Activities • S Spam • Denial of Service Attacks s • Information I f ti Stealing St li • Account Numbers • Credentials • Keyloggers • • • • Network scanning Infect Peers Illegal P2P file distributio on Pop-up advertisements Useful Ana alysis Tools • Virustotal • http://virusustotal.com • Sandbox Applications • • • • Anubis - http://anubis.iseclab.org/ Joebox - http://joebox.org/ CWSandbox - http://cwsandb box.org/ ThreatExpert – http://threatexpert.com/ • Deobfuscators • Wepawet – http://wepawet.ise eclab.org/ JJavascript i tD bfuscation ti Example E l Deobfu Infection Symptoms S • • • • • • Slow system performa ance Home page hijacking Excessive pop-up pop up adss Crashes Some websites don't don t work w (Antivirus sites) Unexplained hard driv ve activity Containment • Remove the system from f m the network • If the system contains se ensitive data, STOP! o Call C ll your IInformation f ti S Security it Offi Officer • Back-up critical data to external e storage • Reformat R f t Hard H dD Drive i • Reinstall Operating Syste em Malware Demonstration