Several clients like Inboxer

advertisement
Jim Crowley
C3 – Crowley Computer Consulting
1
Apologies
 This is long haired, geeky stuff.
 This is long and boring.
 This is version 1.
 The analogies between safe sex and safe computing
cannot be ignored.
 It is getting very difficult to protect older systems.
 Too slow and not enough memory for security programs.
 No new patches older than Windows 2000.
 This is meant to scare the *#$^ out of you.
2
The Internet brings the world to
your computer!
3
Various services run over the
Internet
 World Wide Web
 The Internet was
 Email
designed for
enhancement.
 It was not designed for
this level of complexity.
 Instant Messaging
 Peer to Peer sharing
 Voice over IP phones
 Gaming
 Gopher
 Audio streaming
 Video streaming
 IE. The easiest way to
prevent spam is to
authenticate the sender.
Email has no method to
do this.
4
Services have multiple methods of
encoding and delivery
 IE. World Wide Web
 HTML
 XML
 Java
 JavaScript
 Flash
 Perl
 ColdFusion
 VBScript`
 .Net
 ActiveX
 SHTML
 And more!!!
5
Services have multiple methods of
encoding and delivery
 IE. Instant Messaging
 AOL
 Google
 ICQ
 Microsoft
 Yahoo
 And more!!!
6
You invite these services in…
Email
World
Wide Web
Peer to
Peer
Sharing
Instant
Messaging Audio
streaming
Gopher
Gaming
Voice over
IP phones
Video
streaming
7
The good old days…
 …it was hard and relatively expensive to “get online.”
 …it was slow.
 Do you remember 300Bps and 1200Bps modems?
 …the web didn’t exist!
 Do you remember CompuServe and Prodigy and AOL?
 …it was geeky!
 Users were hobbyists and it was all very 60s.
 Exploits were confined to bugging your buddy and
showing off!
8
Now..
 Everyone is online!
 Over 50% of users in the
USA are on broadband.
 Exploits are
 Dirty rotten @#*!!!
 Money making schemes
and ripping off grandma
 Organized crime
9
Common attacks
Virus
Worms
Trojan horse
Spyware
Spam
Phishing
10
Did you know…
 All of these types of attacks are man-made and
intentional.
 There is no “natural” or “random” virus.
 All of these ride the Internet services you invite in!
 Different companies and organizations
 Will group attacks differently.
 Will name attacks differently.
11
Malware
 Software designed to infiltrate or damage a computer
system without the owner's informed consent.
 Originally harmless pranks or political messages, now
have evolved into profit makers.
 Include viruses, worms and Trojan horses.
12
Malware: Virus
 a program or piece of code that is loaded onto your
computer (without your knowledge and against your
wishes), that (generally) replicates itself and
(generally) delivers a payload.
 1972
13
Virus
 In the days of yore…
 Who: typical author is young, smart and male
 Why: looking to fight the status quo, promote anarchy,
make noise or simply show off to their peers. There is no
financial gain to writing viruses.
 Now…
 Who: professional coders or programmers using “kits”
 Why: financial gain by email delivery payments, renting
of botnets, extortion…
 Often supported by mafia and black marketers.
14
Virus structure
 Replication: viruses must propagate themselves
 Payload: the malicious activity a virus performs when
triggered.
 Payload trigger: the date or counter or circumstances
present when a virus payload goes off.
15
Payload examples
 Nothing - just being annoying
 Displaying messages
 Launching DDoS attack
 Erasing files randomly, by type or usage
 Formatting hard drive
 Overwrite mainboard BIOS
 Sending email
 Expose private information
16
Trigger examples
 Date
 Internet access
 # emails sent
17
Boot sector virus
 infects the first sector of a hard drive or disk. The first
sector contains the MBR or master boot record.
18
File infector virus
 attaches itself to a file on the computer and is executed
when that application is opened.
19
Multipartite
 combines properties of boot sector and file infector
viruses.
20
Macro virus
 virus written using script or macro languages such as
Microsoft Office’s VBA, executes when a document
containing the virus is opened.
21
Memory resident
• virus that sits continuously in memory to do its work,
often making it more difficult to clean. Most viruses
now are memory resident.
22
Stealth virus
• a virus that actively hides from anti-virus programs by
altering it’s state or hiding copies of itself or replacing
needed files.
23
Polymorphic virus
• a virus that alters its signature or footprint, to avoid
detection.
24
Metamorphic virus
 A virus that rewrites its code each time a new
executable is created.
 Usually very large.
25
Malware: Worm
 A self-replicating computer program that uses
networks to copy itself to other computers without
user intervention.
 They often lack a payload of their own but drop in
backdoor programs.
 1978
26
Malware: Trojan
 A destructive program that masquerades as a benign
application, it requires a user to execute it.
• A variety of payloads are possible, but often they are
used to install backdoor programs.
• Generally, trojans do not replicate.
• 1983
27
Spyware
 Application installed, usually without the user’s
knowledge, intercepting or taking partial control for
the author’s personal gain
 Estimates as high as 90% of Internet connected
computers are infected with spyware.
 Unlike a virus does not self-replicate.
28
Spyware: symptoms
 Sluggish PC performance
 An increase in pop-up ads
 Mysterious new toolbars you can’t delete
 Unexplained changes to homepage settings
 Puzzling search results
 Frequent computer crashes
29
Spyware: a loaded system
30
Spyware: rogue help
 Antivirus Gold Family
 Adware Delete
 SpyAxe
 Antivirus Gold
 SpywareStrike
 PS Guard Family
 Security Iguard
 Winhound
 PSGuard
 SpywareNO!
 SpyDemmolisher
 SpySheriff
 SpyTrooper
 SpywareNO!
 Raze Spyware
 RegFreeze
 WinAntiSpyware 2005
 WorldAntiSpy
31
Spyware: rogue help
 This morning…
32
Spyware: Adware
 Any software package which automatically plays,
displays or downloads advertising material to a
computer
 Not necessarily “spyware” depending on your
definitions
 Many “free” applications install adware, creating a
source of income.
 Is it spyware?

http://www.symantec.com/enterprise/security_response/thre
atexplorer/risks/index.jsp
33
Spyware: Adware
34
Spyware: Backdoors
 Backdoor = Remote Access
 A method of bypassing normal authentication or
securing remote access while remaining hidden from
casual inspection.
 May be an installed program (IE. Back Orifice) or a
modification to an existing application (IE. Windows’
Remote Desktop).
35
Spyware: Browser hijacker
 Alters your home page and may redirect other
requested pages, often away from helpful sites.
 Generally add advertising, porn, bookmarks or payper-surf web sites.
36
Spyware: Dialers
 Program that uses a computer’s modem to dial out to a
toll number or Internet site
 900 numbers
 Phone system flood attack
 Can rack up huge phone bills! Often running to
international numbers in the Caribbean.
37
Spyware: Downloaders
 Application designed to download and possibly install
another application. Sometimes, they may receive
instructions from a web site or another trigger.
 Also a typical form of Trojans.
38
Spyware: Rootkits
 A type of Trojan that gives an attacker access to the
lowest level of the computer, the root level.
 Removing rootkits can be very difficult to impossible.
 Microsoft’s recommendation to remove rootkits from
Windows Xp was to reformat the hard drive and start
over! Sometimes this is the only option.
 Have been used for “legitimate” purposes,
 Sony used for digital rights management licensing on
music CDs, system was shown to have security holes,
possibly giving up root access to an attacker.
39
Spyware: Scrapers
 Extracting data from
output to the screen or
printer rather than from
files or databases that
may be secure.
 Legitimate and
illegitimate applications.
 Temp files are often a
great source of
information!
40
Spyware: Tracking cookies
 A small amount of data
sent back to the requesting
website by your browser.
They may be temporary or
persistent, first or third
party.
 Cookies are not bad and
make browsing life better!
 Third party cookies are
used to track surfing habits
and you may want to
disable them.
weather.com TRUE
/
FALSE
1218399413 LocID
13669
41
Keylogger
 A software application or hardware device that
captures a user’s keystrokes for legitimate or
illegitimate use.
 Bad keyloggers will store information for later retrieval
or spit the captured information to an email address or
web page for later analysis.
42
Social Engineering
 Tricking a user into giving or giving access to sensitive
information in order to bypass protection.
43
Social Engineering: pretexting
 Creating a scenario to persuade a target to release
information done over the phone.
 Often use commonly available information like social
security numbers or family names to gain access to
further information.
44
Social engineering: phishing
 Creating a scenario to persuade a target to release
information done via email.
 Often use commonly available information like social
security numbers or family names to gain access to
further information.
45
Social engineering: more
 Road apple: using an infected floppy, CD or USB
memory key in a location where someone is bound to
find and check it through simple curiosity.
 Quid pro quo: targeting corporate employees as “tech
support” until some actually has a problem and “allows
them to help.”
46
True or false?
47
True or false?
48
True or false?
49
True or false?
50
Spam
 Junk email.
 An email message can contain any of the threats
mentioned, not to mention the time wasted
downloading and filtering through the messages.
 You do not have to open an attachment to activate a
threat.
 Webmail eliminates few threats.
51
Spam
 Threats that activate via
merely opening the
email are not disabled by
using the email preview!
52
Now your services have
hitchhikers! And they bring friends!
Email
World
Wide Web
Instant
Messaging
Gaming
Peer to
Peer
Sharing
53
54
Don’t use the Internet
 Are you really that isolationist?
 Other user profiles on your computer?
 Other computers connected to the Internet
 Other devices…
 Xbox, Playstation, Wii
 Media Center Extenders
 DVRs
55
Other connections
 Wireless local networks
 Bluetooth personal
networks
 Removable storage
 Other connected devices
 Printers
 Digital cameras
 Video cameras
 Floppy
 CDs
 DVDs
 USB memory key
 Flash memory
56
The first bug causing a computer
error was found by Grace Hopper's
team in 1945 using Harvard
University's Mark II computer.
57
And the stakes get higher…
 Imagine the home of the
future
 Broadband Internet
connection shared by…






Computers
Television / DVR
Phone
Security / heating /
cooling
Kitchen appliances
Cell phone
 Imagine hacker exploits
 Defrost your freezer
 Turn off the heat
 Trip / disable security
 Record “Boy Meets
World” instead of
“Desparate Housewives”
and “24”!
58
What’s a guy or gal to do?
59
Protection: firewall
 A software or hardware which permits or denies data
into and possibly out of a computer network
depending on levels of trust and authentication.
 Emerged in 1988.
60
Protection: firewall
 Levels of protection
 Network address translation: internal devices carry
separate addresses from Internet connection, firewall
translates, masking internal devices.
 Packet filters: very basic inspection of individual packets
of inbound traffic for correct ports for basic services.
 Stateful filters: compare packets of traffic and rules can
change criteria of what is allowed.
 Application layer: deep packet inspection determines
whether traffic is appropriate for a specific port.
61
Protection: hardware firewall
 Recommend a router
with stateful packet
inspection
 Jim’s picks
 Linksys
 Sonicwall
62
Protection: software firewall
 A good program will
know configure major
applications correctly,
but it is easy to answer a
firewall incorrectly.
 Software firewalls often
disrupt internal
networks
 Jim’s “sorta” pick
 ZoneAlarm
63
Protection: virus
 Most mature category of protection. Detection rate should
be near perfect!
 How do anti-virus programs work?




File fingerprinting
Active scanning
Heuristics
Unusual hard drive activities
 Protection can be run at the
 Internet service provider
 Router
 Server (if applicable)
 Workstation – recommended
64
Protection: virus
 Must be updated!
 Jim’s picks
 Norton Antivirus
(home)
 Symantec Antivirus
Corporate Edition or
Small Business Edition
(offices)
 AVG for older systems
65
Protection: spyware
 Fairly new application, running two anti-spyware
applications is often recommended, but only one
should be doing “active scanning.”
 Detection rates are not nearly as accurate as virus
detection.
 Anti-virus applications are now capable of replacing
active scanning spyware applications.
 Spyware and virus scanners can fight, causing system
freeze ups and instability.
66
Protection: spyware
 Jim’s picks
 Webroot SpySweeper
 Spyware Doctor
 Spybot *
 Adaware *
• Not active scanner
67
Protection: spam
 Spam filtering occurs by recognizing common email
addresses and domains for sending spam and by
recognizing keywords in email and moves it
automatically to a “junk” folder.
 Can be done at email server or workstation.
 Success rates are very individual!
68
Protection: spam
 Avoid spam – once your email address is a spam target,
there is no eliminating it
 Avoid posting address on web pages.
 Use throw-away email addresses (IE. Yahoo, Hotmail,
Google) when working unknown or very public sites (IE.
Ebay, MySpace…)
 You have to look through your Junk email occasionally
to find mis-labeled email!
 The more “public” your email address, the less you can
filter without false positives.
69
Protection: spam
 Jim’s thoughts
 Outlook 2007 not bad
 Andrew likes new Thunderbird
 Several clients like Inboxer
 Several clients like Norton
AntiSpam
 Several clients like their ISP’s
filtering but user must check
junk on web site
 Dial up: ISP filtering
70
Protection: Operating System
updates
 Most updates are
security patches not
functionality
enhancements!
 I do not recommend
using driver updates
through Windows
Updates!
 Get them only through
Windows Updates!
71
Protection: Application updates
 Browsers, email applications, instant messaging
applications, etc. all need security patches!
72
Protection: Application updates
Application
Source of updates
AOL IM
www.aim.com
Internet Explorer
Windows Updates
Microsoft Messenger
Windows Updates
Mozilla Firefox
www.mozilla.com (Help)
Opera
www.opera.com (?)
Outlook Express
Windows Updates
Thunderbird email
www.mozilla.com (Help)
Windows Mail (Vista)
Windows Updates
Yahoo IM
www.yahoo.com
73
Vulnerability: Internet
Firewall
World Wide
Web
Windows
updates
Application
updates
74
Vulnerability: WWW
Virus protection
World Wide
Web
Spyware protection
75
Vulnerability: Email
Virus protection
Email
Spam protection
76
Vulnerability: Instant messaging
Virus protection
IM
Turn off file
sharing
Close buddy
list to known
77
Vulnerability: Gaming
Virus protection
Gaming
Turn off file
sharing
Close buddy
list to known
78
Vulnerability: Streaming
Virus protection
Audio and
Video
Streaming
79
Vulnerability: P2P
Peer to Peer
80
Layers: onions, ogres & protection
Broadband
Dial up
Hardware firewall
Necessary
n/a
Software firewall
Maybe
Maybe
Virus protection
Necessary
Necessary
Spyware protection
Necessary
Necessary
Spam filtering
Recommended
Recommended
Operating system patches Necessary
Necessary
Browser/email/IM/…
patches
Necessary
Necessary
81
Protection purchasing
Best of breed applications
Security suite
 Best possible protection
 Probably play together better
 Probably less bloat
 Better pricing
 Common interface
82
Protection purchasing: suites
 Jim’s picks
 Norton Internet Security
 Norton 360
 PC Magazine Editor’s
Choice
 Norton 360
 ZoneAlarm Internet
Security Suite 7
 PC World
 Norton Internet Security
 McAfee Internet Security
Suite
83
Selecting protection
Do
Don’t
 Read reviews from
 Use advertising or blogs as
professional, neutral sources
 Make sure you can
understand your
subscription’s status
 Realize you generally get what
you pay for
 Realize that bundled apps are
often 30 or 90 day trials and
often not installed
your main source of
information
 Use reviews from nontechnical sources
 Run two software firewalls,
two anti-virus or two active
anti-spyware apps
84
Protection: Educate your users
 Do not open attachments from anyone you don’t know.
 Suspicious attachments from any known email address




may be threats that spoof senders.
Security measures are for their benefit, don’t subvert them.
Don’t run ActiveX or Java from untrusted or unknown
websites.
Never click on suspicious ads or popups. Always click the
Windows Close X when you can.
Any connection can bring in threats…
 Home computers logging in for remote work.
 Office laptops connected in public Wi-Fi hotspots.
 Removable storage.
85
Protection: Educate your users
 It is much easier to protect yourself than to get clean
after an infection.
 Internet Explorer is the only web browser that uses
Microsoft’s ActiveX tools. ActiveX is a security
nightmare. Avoid the problem, use a different browser.
 Jim’s pick: Mozilla Firefox
86
Protection: Educate your users
 Fake Windows Updates
87
88
Procedure at C3
 Interview client. Possibly start system as is to see
symptoms.
 Remove hard drive and connect to C3 testing systems.
 Prevents threats from going active
 Improves accuracy of scans for stealth, polymorphic and
rootkits
 Virus scan (Symantec Antivirus Corporate Edition)
 Spyware scan (Webroot Spysweeper)
 Hard drive test (Scandisk or Norton Disk Doctor)
89
Procedure at C3
 Clean temp files
 Windows\Temp
 Windows\Temporary Internet Files
 User\Temp
 User\Temporary Internet Files
 Possibly other locations
 Research infections
 Return hard drive to client’s system
90
Procedure at C3
 Probable: Safe mode startup and disable Windows
System Restore
 Manual cleaning as needed while “disconnected”
 All Windows Updates
 Probable: installation of appropriate security package
 All Updates
 Full system scan
91
Procedure at C3
 Total time: 2 to 8 hours
 Total technician time: 1 to 4 hours
92
What can you do?
 Know that Windows cannot diagnose most problems.
 Know that repairing Windows requires a clean
computer.
 Know when to say “Uncle!” based on your skill level.
 Know when to say “Uncle!” if a computer cannot be
recovered and must be wiped.
 Backup, Backup, Backup.
93
94
Non-operating Windows
 Boot from the
appropriate Windows
CD and attempt a repair
installation
 Must match system
 Version
 Home vs. Professional
 Upgrade vs. Retail vs.
OEM
 Danger
 Infections may corrupt
system further.
 You may get “running”
until the threat kicks in
again and repeats its
damage.
 Pros
 Desperation – you’re
doing something
95
Non-starting Windows
 Safe mode
 Press F8 (or hold Ctrl)
prior to Windows splash
screen
 Scan
 Manual updates?
 Virus scanner
 Spyware scanner
 Document, research,
follow necessary
instructions
 Limit startups
 Most threats are inactive in
safe mode.
 You may be able to
download scanner updates
manually on another
computer and install them.
 Warning: more threats
successfully hide
themselves in safe mode.
96
Safe mode
 F8 during startup
 Most drivers and
network not running
 Often, you must log on
as administrator
97
Manual virus definition update
 Highly dependent on
application
manufacturer
 Expired subscription
may not allow use of
manual update
98
Limit startups





Start
Run
Msconfig
Services and Startup tabs
Turn off anything that
you don’t recognize,
especially “random”
names. Google names.
 Restart
99
Operating Windows
 Backup
 Document!
 Virus scan
 Update installed app
 Online scanner
 Install new app
 Spyware scan or 2
 Update installed app
 Online scanner
 Install new app
 Research infections
 Manual attack and tools
 Follow instructions!
 Take your time!
 All Windows Updates
 Install appropriate
security
 All updates
 Scan
 Scan your backup
100
Update virus scanner
 Particular to application
 Many threats will
attempt to subvert
connection
 Subscription must be
active.
101
Online scanners (virus & spyware)
 Symantec
www.symantec.com/home_hom
eoffice/security_response/index.
jsp
 Webroot SpySweeper
www.webroot.com/shoppingcar
t/tryme.php?bjpc=64021&vcode
=DT02A
 Trend Micro
housecall.trendmicro.com/
102
I want a real antivirus – now!
 Many vendors have demo downloads. IE. Symantec
offers a 15 day Norton Antivirus trial that can be
activated later by purchasing a license or package
 Delete – don’t quarantine.
 When macro viruses were the rage, this was a method to
recover infected documents.
103
My antivirus isn’t playing!
 Try updating.
 Attempt a repair installation.
 If you bought your security online, via download – copy
it to CD for semi-permanent archival!
 Realize all security applications “get old.”
 Uninstall and reinstall.
 Need RAM?
104
Research infections
 Symantec Threat
Explorer
www.symantec.com/ho
me_homeoffice/security
_response/threatexplore
r/index.jsp
 Google www.google.com
 Scumware
http://scumware.com/
105
Disable System Restore
 Right+click My
Computer
 Properties
 System Restore tab
 Check “Turn off System
Restore”
 OK
106
Registry Editor
 Start
 Run
 Regedit
 OK
 Procedure
 Backup!
 Navigate
 Nuking the bad guys
107
Removal tools
 CWShredder www.cwshredder.net
 Major Geeks www.majorgeeks.com/downloads16.html
108
System cleaning
 Eliminate temporary
files
 Start
 All Programs
 Accessories
 System Tools
 Disk Cleanup
109
System cleaning
 Defragment your hard
drive
 Start
 All Programs
 Accessories
 System Tools
 Disk Defragmenter
110
System cleanup
 Internet Explorer
automatically clearing
cache
 Internet Explorer
 Tools
 Internet Options…
 Advanced tab
 Security section
 Check “Empty Temporary
Internet Files when
browser is closed”
111
Know when…
 You’re…
 Last backup was made
 System and application CDs are
 Over your head
 Wasting your time
 Your…
 Windows is toast
112
Worthwhile freebies
 Virus scanners
 AVG – www.grisoft.com
 Avast - www.avast.com
 Spyware scanners
 Spybot Search and Destroy www.safernetworking.org/en/index.html
 Discovery tools
 Hijack This www.merijn.org
113
Web privacy
114
Web privacy
 Google is not the problem. Google is just one way to
find this kind of data.
 Blocking this data on Google will not block other
search engines.
 All of this is in the phone book and then I can go to
any mapping application.
115
Email Hijack
From: xxxxx xxxxxxxxx xxxxxx@xxxxxxx.xxx
Sent: Monday, June 11, 2007 10:45 AM
To: James D. Crowley
Subject: SPAM
Good Morning Jim:
I wanted to report a SPAM issue to you. This morning xxxxx received an email to her xxxxxx account. The
email was sent by her from an outside account. It was an email that she sent to someone 6 months
ago. Also on the email were individuals CCd who should not have received that email. Basically what
is occurring is someone is accessing her email account and is sending its herself and others mail that
should not be going out. Is it possible that some type of hacker is doing this? She is also receiving
SPAM from xxxxxxx’s email account and xxxxxx’x account. I am receiving SPAM from myself, and
cannot block it because its from my account. The frequency of this is increasing. What can we be
doing to prevent the SPAM and can someone access confidential information that is being sent via
email and send it to people in our contact list?
Xxxxx xxxxx
Administrative Assistant
Xxxxxxxxx Coordinator
Xxxxxxxx xxxxxxx xxxxx xxxxxxxx, Inc.
116
Email Hijack
 Not hijacked – spoofed!
 Realize there are four primary locations that your
email can be hijaaked or spoofed like Anita’s was.
 Your computer or server
 Your email server
 The recipient’s email host
 The recipient’s computer or server
117
Email Spoofing application









It peruses my email and randomly grabs xyz’s message
Makes a copy
Probably alters the message somewhat
Attaches the virus or whatever its “payload” is
Reuses all original email addresses in the To, CC and
BCC
Maybe adds some more addresses
Maybe randomly generates more email addresses
And starts sending itself out
XYZ may get a copy of her message back…
118
Urban myths
119
Resources: Independent antivirus
testing
 www.av-test.org
 www.icsalab.com
 www.virusbtn.com
120
Resources: Reviews
 www.pcmag.com
 http://www.pcmag.com/category2/0,1874,4829,00.asp
 www.pcworld.com
 http://www.pcworld.com/tc/spyware/
121
Resources: Other sources
 www.geeksonwheels.com
 www.pcmag.com/encyclopedia/
 www.snopes.com
 www.sunbelt-software.com
 http://www.netvalley.com/archives/mirrors/robert_cai
lliau_speech.htm
 www.webroot.com
 www.wikipedia.org
122
Download