Internet Vulnerabilities & Criminal Activities Malware 3.2 9/26/2011 Malware Malicious software designed to gain access to information and/or resources without the knowledge or consent of the end user Malware History 1981 1983 1986 1988 1990 1991 1994 1995 1998 - First Apple II virus in the wild - Fred Cohen coins term “virus” - First PC virus - Morris Internet worm - First Polymorphic virus - Virus Construction Set - Good Times virus hoax - First Macro Virus - Back Oriface tool released Malware History cont. 1999 - Melissa virus / worm 1999 - Tribal Flood Network - DDOS tool 2001 - Code Red worm 2001 - Nimda worm 2003 - Slammer worm 2004 - So Big & Sasser worms 2007 - Storm worm / Zeus botnet tool 2008 - Conficker worm 2010 – Stuxnet – weaponized malware Malware Trends Increasing complexity & sophistication Acceleration of the rate of release of innovative tools & techniques Movement from viruses to worms to kernel-level exploitations Malware can be: “Proof of concept” Created to prove it can be done Not found outside of laboratory environment If code available, can be used by others “In the Wild.” Found on computers in everyday use Traditional Categories of Malware Virus Worm Malicious Mobile Code Backdoor Trojan Horse Rootkit Combination Malware – Malware “Cocktail” Virus Infects a host file Self replicates Requires human interaction to replicate Examples: Michelangelo Melissa Worm Spreads across a network Does not require human interaction to spread Self-replicating Examples: Morris Worm Code Red Slammer Malicious Mobile Code Lightweight program downloaded from a remote source and executed locally Minimal human interaction Written in Javascript, VBScript, ActiveX, or Java Example: Cross Site Scripting Backdoor Bypasses normal security controls Gives attacker access to user’s system Example: Netcat Back Oriface Sub 7 Trojan Horse Program that disguises its hidden malicious purpose Appears to be harmless game or screensaver Used for spyware & backdoors Not self-replicating Rootkit Replaces or modifies programs thts are part of the operating system Two Levels User-level Kernel-level Examples Universal Rootkit Kernel Intrusion System Combination Malware Uses a combination of various techniques to increase effectiveness Examples: Lion Bugbear.B Stuxnet Malware Distribution Attachments E-mail and Instant Messaging Piggybacking Malware added to legitimate program Adware, spyware EULA - End User License Agreement Internet Worms Exploit security vulnerability Used to install backdoors Web Browser Exploit Malware added to legitimate web site Cross-site scripting & SQL Injection Visitors to web site may be infected Drive by malware Malware Distribution cont. Hacking Too labor intensive for large crime operations May be used to compromise DNS server Affiliate Marketing Web site owner paid 8¢ to 50 ¢ per machine to install malware on a visitor’s computer Mobile Devices Transfer via bluetooth Malware Activity Adware Spyware Hijacker Toolbars Dialers Rogue Security Software Bots Adware Displays ads on infected machine Ads format can be: Pop-ups Pop-under Embedded in programs On top web site ads More annoying than dangerous Spyware Send information about infected computer to someone, somewhere Web sites surfed Terms searched for Information from web forms Files downloaded Search hard drive for files installed E-mail address book Browser history Logon names, passwords, credit card numbers Any other personal information Hijacker Takes control of web browser Home page Search engines Search bar Redirect sites Prevent some sites from loading IE vulnerable Toolbars Plug-ins to IE Google Yahoo Attempt to emulate legitimate toolbars Installed via underhanded means Adware or Spyware Acts a keystroke logger Dialers Alters modem connections and ISDN- Cards Once installed, will dial 1-900 numbers or other premium rate numbers Run up end-users phone bill & provide revenue for criminal enterprise Targets MS Windows Rogue Security Software Usually delivered via a trojan horse Uses social engineering techniques to get user to install Fake warnings that computer is infected Fake video of machine crashing Disables anti-virus and anti-spyware programs Alters computer system so the rogue software cannot be removed Bots Allows attacker remote access to a computer When end-user is online, computer contacts Command & Control (C&C) site Bot will then perform what ever commands received from the C&C Some things botnets are used for Distributed Denial of Service (DDoS) attacks Spam Hosting contraband such as child porn Other illegal fraud schemes Weaponized Malware Attacks SCADA system Supervisory Control And Data Acquisition Causes physical damage SCADA systems control Dams Electrical grid Nuclear power plants Cyber War - The Aurora Project http://www.youtube.com/watch?v=rTkXgqK1l9A More Malware Terminology Downloader Single line of code Payload from malware Instructs infect computer to download malware from attacker’s server Drop Clandestine computer or service (E-mail) Collects information sent to it from infected machines Blind Drop - well hidden, designed to run attended More Malware Terminology cont. Exploit Code used to take advantage of a vulnerability in software code or configuration Form-grabber A program that steal information submitted by a user to a web site Packer Tool used to scramble and compress an .exe file Hides malicious nature of code Makes analysis of program more difficult More Malware Terminology cont. Redirect HTTP feature Used to forward someone from one web page to another Done invisibly with malware Variant Malware produced from the same code base Different enough to require new signature for detection by anti-virus software Malware Sources Malware Can be programmed from scratch Less likely to be detected by anti-malware programs Can be purchased Malware tools Haxdoor, Torpig, Metafisher, Web Attacker Tools offered with other services Access to botnet, drop sites Tools derived from small stable base of existing code Frauds Involving Malware Advertising schemes Pay-per-view Pay-per-click (“Click Fraud”) Pay-per-install Banking fraud Identity theft Spam Denial-of-service attacks DoS extortion Advertising Schemes Pay-per-view Sell advertising space on controlled web sites Command botnet to “view” as many ads as possible May have ads download in the background Fraudulent commissions generated Advertising Schemes cont. Pay-per-click (“”Click Fraud”) Similar to Pay-per-view fraud Bots simulate clicks on ads Between 5% and 35% of all ad commissions may be fraudulent Pay-per-install Commission paid every times advertisers software is installed When installed, notification sent to advertiser Infected machines will be instructed to install advertisers software Banking Fraud Banks are a prime target of malware Malware can allows attacker to empty victim’s bank account Example (September 2009) Rewrite online bank statements on the fly Covers up theft of funds Trojan horse Alters HTML code before browser displays Makes use of “Money Mules” Identity Theft Phishing & key logging Recent increase in malware associated with identity theft Information sent to drop site Spam Bots used to send spam Also show dramatic rise Bots are available for rent for spam purposes Spam sent can also contain malware Denial of Service Attacks Botnet commanded to make requests of a web site Web site may crash due to heavy traffic Legitimate traffic blocked Threat of DoS attack can be used for extortion Bots for rent for DoS attacks Problems for Law Enforcement Anonymity Jurisdiction Attackers know how difficult international law enforcement is Exploit the situation Target victims in one country from another country Have C&C site and drop site located in a third country Use multiple proxies to access C&C site and drop site Money gain quickly funneled through online bank accounts and international money transfers Other Issues Monetary Threshold Must reach a limit before prosecutor will take case May be hard to prove exact amount of money involved Cyber crimes may be considered a non-priority Virtual world emboldens individuals Less fear of getting caught Realization of difficulties in investigating crimes Easy money