Unix malwares. Myth or reality?



Similar documents
Backing Up Your System With rsnapshot

Worms, Trojan Horses and Root Kits

Nixu SNS Security White Paper May 2007 Version 1.2

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

Security Event Management. February 7, 2007 (Revision 5)

Trend Micro Incorporated Research Paper Adding Android and Mac OS X Malware to the APT Toolbox

BitDefender Client Security Workstation Security and Management

Features. The Samhain HIDS. Overview of available features. Rainer Wichmann

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Shellshock. Oz Elisyan & Maxim Zavodchik

Installation Guide. Copyright (c) 2015 The OpenNMS Group, Inc. OpenNMS SNAPSHOT Last updated :19:20 EDT

Open Computers & Softwares Inventory New Generation

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Evolving Threat Landscape

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com

Nessus Agents. October 2015

IBM WebSphere Application Server Version 7.0

Best Practices for Deploying and Managing Linux with Red Hat Network

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

How To Fix A Snare Server On A Linux Server On An Ubuntu (Amd64) (Amd86) (For Ubuntu) (Orchestra) (Uniden) (Powerpoint) (Networking

Bacula The Network Backup Tool for *BSD, Linux, Mac, Unix and Windows

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Week Overview. Installing Linux Linux on your Desktop Virtualization Basic Linux system administration

Snare System Version Release Notes

FAQS. You can schedule a WebEx session ahead or start it instantly in your choice of ways:

Threat Modelling for Web Application Deployment. Ivan Ristic (Thinking Stone)

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems

Executable Integrity Verification

ZABBIX. An Enterprise-Class Open Source Distributed Monitoring Solution. Takanori Suzuki MIRACLE LINUX CORPORATION October 22, 2009

Penetration Testing Report Client: Business Solutions June 15 th 2015

Penetration Testing Using The Kill Chain Methodology

Staying Persistent in Software Defined Networks

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Unifying Authorization Models

Evaluation of Penetration Testing Software. Research

INUVIKA OVD INSTALLING INUVIKA OVD ON UBUNTU (TRUSTY TAHR)

Top Ten Cyber Threats

Analysis of advanced issues in mobile security in android operating system

CS197U: A Hands on Introduction to Unix

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

WEB ATTACKS AND COUNTERMEASURES

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

The Increasing Threat of Malware for Android Devices. 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them

CYBERTRON NETWORK SOLUTIONS

Bacula The Network Backup Solution

3DHOP Local Setup. Lezione 14 Maggio 2015

Avast for linux technical documentation

Ansible. Configuration management tool and ad hoc solution. Marcel Nijenhof

Oracle Audit Vault and Database Firewall. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

ANTI-VIRUS POLICY OCIO TABLE OF CONTENTS

SPICE EduGuide EG0015 Security of Administrative Accounts

Advanced Persistent Threats

Exploiting Fundamental Weaknesses in Command and Control (C&C) Panels

FREQUENTLY ASKED QUESTIONS

Michael Seltzer COMP 116: Security Final Paper. Client Side Encryption in the Web Browser Mentor: Ming Chow

24x7 Scheduler Multi-platform Edition 5.2

The WebJob Framework: A Generic, Extensible, and Scalable Endpoint Security Solution

ULTEO OPEN VIRTUAL DESKTOP UBUNTU (PRECISE PANGOLIN) SUPPORT

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

How To Install Storegrid Server On Linux On A Microsoft Ubuntu 7.5 (Amd64) Or Ubuntu (Amd86) (Amd77) (Orchestra) (For Ubuntu) (Permanent) (Powerpoint

WHITE PAPER. AirGap. The Technology That Makes Isla a Powerful Web Malware Isolation System

CEH Version8 Course Outline

How to build secure Apache Tomcat deployments with RPM.

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Codes of Connection for Devices Connected to Newcastle University ICT Network

avast! for linux technical documentation

Shellshock Security Patch for X86

Unit 10 : An Introduction to Linux OS

Webapps Vulnerability Report

insync Installation Guide

Using Network Attached Storage with Linux. by Andy Pepperdine

Using Virtual Machines

Comodo Hacker Guardian

Log Analysis using OSSEC

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Using Your PGP Tool to Update Your Address Settings for Encrypted Messaging

DMZ Gateways: Secret Weapons for Data Security

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

Emerging Security Technological Threats

Introduction: 1. Daily 360 Website Scanning for Malware

Mac OS X. Staff members using NEIU issued laptops and computers on Active Directory can access NEIU resources that are available on the wired network.

Bacula. The leading Opensource Backup Solution

Using Dedicated Servers from the game

Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE

Firewalls and Software Updates

How to Install and Run Tibia on Linux Using Wine without Windows Contents

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Cloud Backup Express

Transcription:

Unix malwares Myth or reality?

Agenda 1. A bit of history on Unix malwares 2. Why should anyone want to target Unix platforms and users? 3. A proof of concept malware framework 4. Back to the future 2

A bit of history Who was targeted? Why? Not users but servers: Morris worm, Lion, Ramen Unix servers had more bandwidth and resources, were easier to find and attack Nevertheless, users have been threatened: BitchX, trojaned fragroute/dsniff/irssi and a few months ago infected gnome screensavers packages Breaking news : unreal ircd had its code backdoored on November 2009, it was only discovered in June 2010 ;) 3

Why? Unix users are more likely to be suspicious, aren't they? There are very few desktops running Linux, BSD, Solaris (did you just say Mac OS X?) But... Who reads source code today? Did you recently have a look at any tarball and/or package installation scripts or do you treat packaging systems as black boxes? 4

Why? Most unix home users are geeks who have a premium Internet connection and sometimes powerfull boxes. User are (too?) confident: Why would a free software dveloper put some kind of backdoor in his code? Unix users tend to connect to other boxes using SSH: Using keys and/or capturing passwords, succesfull spread is easier. 5

A proof of concept framework Infection vector chosen: packaging systems Packages installation requires root privileges (aptitude/yum/pkgadd/make/whatever) Different ways of doing things: volatile or persistent No security checks done, user is only warned when installing non-pgp signed packages MD5 and/or SHA checksums mismatch doesn't prevent package installation 6

A proof of concept framework Malicious actions Modifying installed packages files Overwrite files from not installed yet packages Trigger malicious code on install/uninstall Let the fun begin! :) 7

A proof of concept framework How to choose the package to infect? Check for software popularity : Freshmeat.net has such graphs Check popcon.debian.org Opensuse has a similar project : popcorn Check for dependency apt-cache dotty apache2 dot -T png display debtree rpmgraph 8

The classical tarball Most projects use the autoconf/automake toolchain. Malware can be embedded in the configure script or even Makefile. The configure script is run with standard user privileges make install is not :-) Remember the fragroute/dsniff/irssi trojaned tarballs 9

Debian packages Many many ways: Targets: preinst and postinst scripts But also prerm and postrm :-) update-rc.d to deploy malicious init scripts The pre* and post* scripts are kept inside /var/lib/dpkg/info: Need to cover tracks to prevent the admin from discovering things 10

Debian packages Packages are signed using GPG APT tools warn users about packages downloaded from untrusted repositories WARNING: untrusted versions of the following packages will be installed! Untrusted packages could compromise your system's security. You should only proceed with the installation if you are certain that this is what you want to do. untrusted_package_name Do you want to ignore this warning and proceed anyway? To continue, enter "Yes"; to abort, enter "No": Hopefully there's a way to 'circumvent' this protection :D Google used the trick in its chrome debian package 11

Debian packages Google's trick: Postinst script silently installs a new trusted GPG key # Install the repository signing key (see also: # http://www.google.com/linuxrepositories/aboutkey.html) install_key() { APT_KEY="`which apt-key 2> /dev/null`" if [ -x "$APT_KEY" ]; then "$APT_KEY" add - >/dev/null 2>&1 <<KEYDATA -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1.4.2.2 (GNU/Linux) mqgibexwb0yrbadqva2nlpyxxgjnkbup0lnpoexrugmvi3xmixjeufugncp4rj/a Install Chrome, get a free trusted key you haven't heard about! $ sudo apt-key list mqgibexwb0yrbadqva2npub 1024D/7FAC5991 2007-03-08 uid Google, Inc. Linux Package Signing Key <linux-packages-keymaster@google.com> sub 2048g/C07CB649 2007-03-08 12

RPM packages Malware friendly Targets: pre, post, preun and postun But also %verifyscript : use rpm verification command to trigger infection What!? %triggerin an %triggerun: especially useful to prevent HIDS from detecting a malware 13

BSD Softwares are divived into two categories: Base system: the only way to add malware is to compromise an official source repository Ports: there are mostly official mirrors :( hopefully, one can still provide precompiled packages ;) 14

Mac OS X Three different Unix packaging techniques: Fink: debian based Darwin ports: BSD-like Pkgsrc: netbsd-like 15

Solaris, HP-UX, AIX Solaris: packaging system is close to the one used in BSD systems HP-UX: AIX: less and less used, but SWA seems vulnerable lpp: has preinst, postinst and postun style scripts RPM packages can be installed, even if it is considered as third party 16

A PoC framework The malware injection lightweight framework (MILF) aims at Injecting malicious shellscripts into packages Adding GPG key for unofficials repositories Circumventing host based IDS in the near future ;) 17

A PoC framework MILF currently infects the following packaging systems: Debian format RedHat Package Management (WIP) Classical tarballs HIDS evasion should be done through: The use of encoded scripts The flaws of softwares such as SSI/rpmshield/whatever 18

A PoC framework A short demo! 19

Back to the future What if packaging systems coders have had security in mind from the beginning? Is there a need for antimalware on Unix? NEED MOAR PWN2OWN :))) 20

Questions? 21