Malware: Malicious Code



Similar documents
Computer Security DD2395

Malware. Björn Victor 1 Feb [Based on Stallings&Brown]

Malicious Software. Ola Flygt Växjö University, Sweden Viruses and Related Threats

CS549: Cryptography and Network Security

Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software

Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis

CSE331: Introduction to Networks and Security. Lecture 15 Fall 2006

(General purpose) Program security. What does it mean for a pgm to be secure? Depends whom you ask. Takes a long time to break its security controls.

E-BUSINESS THREATS AND SOLUTIONS

Computer Security Maintenance Information and Self-Check Activities

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Network Incident Report

Viruses, Worms, and Trojan Horses

What Do You Mean My Cloud Data Isn t Secure?

Viruses, Trojan Horses, and Worms

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Tutorial on Smartphone Security

Worms, Trojan Horses and Root Kits

Technical White Paper: Running Applications Under CrossOver: An Analysis of Security Risks

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them

CS 356 Lecture 9 Malicious Code. Spring 2013

ACS-3921/ Computer Security And Privacy. Lecture Note 5 October 7 th 2015 Chapter 5 Database and Cloud Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

IQware's Approach to Software and IT security Issues

(Self-Study) Identify How to Protect Your Network Against Viruses

Computer Viruses: How to Avoid Infection

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

CS574 Computer Security. San Diego State University Spring 2008 Lecture #7

ANTIVIRUS BEST PRACTICES

EECS 588: Computer and Network Security. Introduction

ESET SMART SECURITY 9

Using Windows Update for Windows XP

Using Windows Update for Windows Me

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

Threats and Vulnerabilities. Ed Crowley

EECS 588: Computer and Network Security. Introduction January 14, 2014

Certified Cyber Security Analyst VS-1160

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Sapphire/Slammer Worm. Code Red v2. Sapphire/Slammer Worm. Sapphire/Slammer Worm. Sapphire/Slammer Worm. Why Was Slammer So Fast?

MALWARE THREATS AND TRENDS. Chris Blow, Director Dustin Hutchison, Director

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

ANTI-VIRUS POLICY OCIO TABLE OF CONTENTS

Contents Introduction xxvi Chapter 1: Understanding the Threats: Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers

1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders.

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Executable Integrity Verification

Operating Systems Principles

Desktop and Laptop Security Policy

CSE331: Introduction to Networks and Security. Lecture 14 Fall 2006

ESET SMART SECURITY 6

Computer Networks & Computer Security

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

Boston University Security Awareness. What you need to know to keep information safe and secure

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

The Microsoft JPEG Vulnerability and the Six New Content Security Requirements

BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can

ESET NOD32 ANTIVIRUS 9

CHECK POINT Mobile Security Revolutionized. [Restricted] ONLY for designated groups and individuals

Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices

ESET NOD32 ANTIVIRUS 8

COB 302 Management Information System (Lesson 8)

Hackers: Detection and Prevention

FOR MAC. Quick Start Guide. Click here to download the most recent version of this document

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

E Commerce and Internet Security

CYBERTRON NETWORK SOLUTIONS

WEB ATTACKS AND COUNTERMEASURES

What you can do prevent virus infections on your computer

Threat Events: Software Attacks (cont.)

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

CHAPTER 10: COMPUTER SECURITY AND RISKS

How Spyware and Anti-Spyware Work

Chapter 8 Types of Utility Programs and Operating Systems. Discovering Computers Your Interactive Guide to the Digital World

FORBIDDEN - Ethical Hacking Workshop Duration

McAfee Internet Security Suite Quick-Start Guide

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Build Your Own Security Lab

How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01

Top Ten Cyber Threats

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

Transcription:

Malware: Malicious Code UIC 594/Kent Law: Computer and Network Privacy and Security: Ethical, Legal, and Technical Considerations 2007, 2008 Robert H. Sloan

Malicious code: Viruses Most famous type of malicious code Malware Program that seeks out a particular program (most often part of MS Office) and embeds a copy of itself inside the program Infected program is called host; when host runs virus program attempts to duplicate itself and do other things without

Malicious Software Satan vs. Murphy In 2008, very likely to arrive via network, but does its work on one (your!) computer Does and does not violate access control: It s got your permissions! What happens when you install new program?

Taxonomy Malicious code, malware, rogue program: Virus: Can replicate itself (typically via copied program and/or data) and pass on malicious code to other non-malicious programs by modifying them Trojan horse: Contains unexpected additional usually malicious effects

Taxonomy continued Logic bomb: Malware that starts doing its thing only when some condition is met Time bomb: Condition is a time Trapdoor or backdoor: built-in surreptitious extra way to access. (E.g., extra unlisted super-user account with name maintenance & password 99999999.)

Viruses spreading across computers Requires host to get to uninfected computer. Either user sends it (e.g., Word document via email or memory stick) or it has infected program use, e.g., Microsoft Outlook. Today majority worms and/or involve MS Office, Outlook, and/or Internet Explorer

Life cycle 1. Infection mechanism/vector 2. Trigger 3. Payload Do whatever it does besides spreading

Infection mechanisms today Email (92% of attacks) Peer-to-peer file sharing (14% of attacks) Remote exploitation of system/software vulnerability (13% of attacks)

Virus: Basic idea Simplest case are some instructions (lines of computer code) that insert themselves at the beginning of a program. User runs that program; doesn t even know virus code is running; control flows on to intended program. Some program Virus code Some program

Virus theory is interesting but not terribly relevant Written up by Cohen in mid 1980s, though viruses existed earlier involves self-modifying code can prove that there exists virus that will defeat any particular anti-virus software

Document (macro) viruses # 1 form mid and late 1990s, still popular today Instructions in formatted document, especially MS Word Macro shortcut hotkey programmed in, e.g., Basic Cross platform (but payload usually is not)

Virus prevention Run good anti-virus software that is regularly automatically updated. Or use Mac OS X or Linux. Very few viruses in the wild for Linux; still none for Mac OS X (though first worm).

Worms Like a virus in terms of having replication mechanism and payload, etc. Distinct because it s stand-alone; no host Most famous was 1988 Robert Morris Internet Worm shut down Internet for the day. Intended only to spread!

There is an OS X worm in the wild Leap.A; discovered February 2006 Targets OS X version 10.4 and spreads via Apple s IM program ichat Known # of sites infected worldwide, as of Feb. 2007, according to Symantec: 1 2

Hot new thing: XSS Newest member of virus/worm family is cross-site scripting (XSS) virus/worm. Uses XSS scripting vulnerabilities to propagate Roughly, web site uses user-provided data to generate a page (e.g., Google search result page) without checking that the user-provided data was okay. Most notable attacks were on MySpace and

Famous Malware: Morris Worm Nov. 3, 1988, I got a day off from grad school. Robert T. Morris, Jr., then Cornell CS Grad Student, created and released Internet Worm Convicted in 1990 of violating 1986 Computer Fraud and Abuse Act, fined $10,000, 400 h0urs of community service,

Morris Worm Exploited 3 long known, well known flaws in Berkeley Unix v. 4 systems: 1. Passwords: people pick bad passwords (coffee, aaa) and encrypted password file world readable 2. Bug in UNIX finger 3. Trapdoor in UNIX sendmail No harmful payload, but resource exhaustion

Worm s effects Shut down roughly 6,000 hosts on the 1988 Internet, typically for 1 day; some longer Robert T. Morris Sr. never became head of the NSA. Internet academic community woke up to the danger; CERT formed.

Example 2: Code Red First modern worm, July 2001 Exploited (known) security hole (buffer overflow) in Microsoft Internet Information Server on servers: HELLO! Welcome to http://www.worm.com! Hacked by Chinese!

Code Red (continued) Came in various versions to avoid fixed signature that anti-virus software could detect; more than a worm, installed back doors, etc. First version spread 1st 19 days of month, launched DDoS attack on www.whitehouse.gov next 9 days of month, took vacation 28th-1st.

Recent well-known worms SQL Slammer (2003) Microsoft SQL server Mydoom (2004), mass-mailing email worm Warezov family

Virus + Worm prevention If on Windows, run good anti-virus software On any OS, apply security patches on a very regular basis. Don t have ridiculously weak passwords. Many worms Morris-onward have bruteforce password crackers.

Trojan (horses) Software that user runs on purpose that also does something malicious These days often an IM software, media player, or add on to one of those two

Rootkits Recall top administrative user on Unix systems = root (or superuser ), so root access = total administrator access. Rootkit = set of programs installed on a system to maintain root access to it Typically changes the system to hide its own existence

Hiding oneself When user issues command that would show rootkit s presence, e.g., listing files or processes, rootkit intercepts call and returns edited results to user E.g., file listing not listing rootkit file Normally also has parts to reestablish itself if discovered and removed.

Rootkit installation 1. Get initial access (password cracking, malware, esp. trojan, system vulnerability) 2. Attacker uploads rootkit to user machine (plus optional extra virus, etc.) 3. Attacker runs rootkit s installation script 4. Rootkit replaces files, system commands, binaries, etc., to hide its presence 5. Rootkit payload activities

Rootkit revealers Idea: Program that displays files the usual way, and that examines disk directly and displays that way, and compares. Computer security expert Mark Russinovich developed one, which he ran on his own system. Surprised to find he had a rootkit on it.

Sony XCP Rootkit was installed when he had played a music CD. Sony XCP (extended copy protection)! Rootkit that prevents user from copying CD while allowing it to be played Installed its own music player that is allowed to play the CD.

Sony DRM debacle Problem with music CDs is music is in easily readable format. Sony tried 2 different essentially malware DRM approaches; one, XCD, was a rootkit. Need to stop user from getting raw music as soon as CD is put in PC. Helpful Windows feature: autorun

Installation: Windows Autorun Windows runs program called autorun.exe on CD insertion. (Suggest you disable it.) No user nor, with music CD, expectation. This one installed rootkit program that stopped music from being accessed by anything but itself, a music player. (So no ipod, etc.)

Story gets worse Program hid itself by hiding all program names starting $sys$ Thus making user vulnerable to any malware with name beginning $sys$. Sony XCD phoned home to Sony with info each time CD was inserted Spyware! Uninstaller (of both programs) opened new

Sony XCD Analysis At least 500,000 installs; maybe 100s of millions. Felten & Halderman analysis: DRM has similar design specs to malware: get user to install something that gives him no benefit, and get him to leave it installed.

Additional Defense to malware Limiting what can be on your network! This is one very big why University/ Company/Etc don t want unauthorized wireless access points, machines, etc., on their networks.

Threat of monoculture Many (all?) famous massively successful were aided by lack of software genetic diversity. E.g., Morris Worm in 1988, machines on Internet were all running Unix Code Red: Significant fraction of all servers in 2001 were running Windows.