Windows Malware: Detection And Removal TechBytes Tim Ramsey Computer Security! • • • • What is “malware”? How does malware get on my PC? How do I get rid of malware? Resources What Is “Malware”? • “Malicious Software” • Includes: – Viruses, worms, Trojan horses – Spyware – Remote-control software – “Botnets” – Rootkits • The lines are getting blurry Viruses, Worms, Trojan Horses • Viruses: modify executables and documents; we humans do the rest • Worms: self-replicating programs • Trojan Horses: still fooling us after all these years Spyware • Installed with or without your knowledge and consent – Do you read the entire EULA? – I do (except the French part) • Tracks URLs visited, information entered into forms • Can even monitor secure (https://) pages Spyware, Cont. • Keyboard loggers: capture passwords, PINs, account numbers • Organized crime loves this stuff Remote–Control Software • Windows Remote Assistance • VNC, Radmin • Netbus, BackOrifice Botnets • “The single greatest threat facing humanity” • Quickly becoming a top problem on campus • Hordes of infected “drone” hosts • Used for spam relay, DDOS, scanning, infection Botnets, Cont. • Spreading via IM, email, compromise • Installs remote-control software • Connects to central server to announce presence and await commands • Allows “Botmaster” to control 100, 1000, 10000+ infected hosts with simple commands • Continually evolving Botnets, Cont. 2 • Network connections are initiated by the drone hosts • Uses common protocols: HTTP, IRC, FTP • Starting to see stealth techniques employed to hide infection (rootkits), communications (SSL, steganography) • Tremendous incentives for Botmasters to grow, maintain, defend their horde • You don’t want this on your computer How Does Malware Get On My PC? • Compromise – Security vulnerabilities – Browser vulnerabilities – Open file shares • Social Engineering – People click on the darndest things – Packaged with other software How Do I Get Rid Of Malware? • Best: Don’t get infected – Antivirus – OS and application patches – Enable Windows Firewall – Healthy paranoia • Don’t run files that friends or strangers send to you! • Don’t install random software from the Web • Um, yeah. I still got infected. What now? Malware Removal • Safest: “R/R” • Reformat / Reinstall are necessary if the infection contains a remote control component – No telling what has been installed, changed – SIRT policy – A botnet infection means R/R is mandatory • Otherwise, try to identify the infection Identifying The Infection • Anti-Virus software scan • Anti-Spyware scan – Spybot Search & Destroy – Microsoft Windows AntiSpyware (Beta) – AdAware • Other, more specialized, tools Removing The Infection • Are you sure you wouldn’t rather R/R? • If you’ve identified the infection, look for a removal tool – Symantec, McAfee, other AV vendors – Google search (but be careful) • When in doubt, reformat and reinstall A Note About Reformat / Reinstall • Back up your data first • Practically every OS is vulnerable to network compromise during installation – Unplug the computer from the network – Install OS, service packs, patches from CD – Enable Windows Firewall – Install SAV from CD – Set administrator password – Then plug back in Rootkits: Making Life Harder • • • • • Pre-packaged software to hide malware Freely obtainable (rootkit.org) There are even commercial packages! Insert hooks into system, kernel Trap program calls to list directory contents, running processes, registry entries • Filter out what the bad guys don’t want you to see Detecting Rootkits • • • • • Look for the hooks Look for known file names, processes Look for what’s being hidden Difficult to do, getting more difficult Tools exist to do this, but most don’t detect everything • Hot topic of research for both sides Removing Rootkits • Are you sure you wouldn’t rather R/R? • Removal tools exist for most rootkits • Deep magic, requiring wizardry and time Resources • K-State provided antivirus software – http://antivirus.ksu.edu/nav/ • Spybot Search & Destroy – http://www.safer-networking.org/ • Microsoft Windows Antispyware (Beta) – http://www.microsoft.com/athome/security/spy ware/software/ Resources, Cont. • Rootkit Detection – http://www.f-secure.com/blacklight/ – http://www.sysinternals.com/ntw2k/freeware/r ootkitreveal.shtml • K-State configuration for XP Firewall – http://knowledgebase.itac.ksu.edu/art.asp?id= 274 • SANS Top 20 – http://www.sans.org/top20/ Questions? Thanks For Coming! (I hope today wasn’t too taxing) This Slide Intentionally Left Blank