MIRAGE MALWARE SIDDARTHA ELETI CLEMSON UNIVERSITY.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Lecturer: Fadwa Tlaelan
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Investigating Malicious Software Steve Romig The Ohio State University April 2002.
Unit 18 Data Security 1.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
 ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.
 Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with.
Nasca Internet Networking and Security viruses.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
MIRAGE CPSC 620 Project By Neeraj Jain Hiranmayi Pai.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
IT 210 The Internet & World Wide Web introduction.
DroidKungFu and AnserverBot
Lecture 14. Lecture’s outline Privacy The sender and the receiver expect confidentiality. The transmitted message must make sense only to the intended.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Viruses.
Unit 2 - Hardware Computer Security.
APT29 HAMMERTOSS Jayakrishnan M.
Viruses & Destructive Programs
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
MyDoom By: Philippe Bissohong. Background ► MyDoom  Novarg, Mimail.R and Shimgapi ► Computer worm, unlike a virus it attacks a network.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
Types of Electronic Infection

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Topic 5: Basic Security.
Malicious Software.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
The Internet What is the Internet? The Internet is a lot of computers over the whole world connected together so that they can share information. It.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Goals Be able to identify the parts of a URL Determine the safeness of a link Know the best places to find the info you need Know how to deal with toolbars.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Heat-seeking Honeypots: Design and Experience John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy and Martin Abadi WWW 2011 Presented by Elias P.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
Cyber security. Malicious Code Social Engineering Detect and prevent.
How To Remove Flooders?-Get Help Website:
CYBER SECURITY...
Secure Software Confidentiality Integrity Data Security Authentication
Computer Security.
Encryption and Hacking
Faculty of Science IT Department By Raz Dara MA.
Computer Security By: Muhammed Anwar.
Wireless Spoofing Attacks on Mobile Devices
Presentation transcript:

MIRAGE MALWARE SIDDARTHA ELETI CLEMSON UNIVERSITY

CONTENTS: 1. WHAT IS MALWARE 2. WHAT IS MIRAGE 3. HOW DOES MIRAGE WORK 4. CONCLUSION

WHAT IS MALWARE? Malware is a malicious program that is meant to disrupt computer operations, gather sensitive information, or gain access to private computer systems. Malware could be code or scripts or active content etc. Over the past few decades many malwares like STUXNET, Nimda, myDoom etc. have affected organizations, personal computers etc. and this year among many others its “MIRAGE”.

WHAT IS MIRAGE? Mirage is a malware that has appeared under the radar since April Dell SecureWorks has been tracking a cyber espionage campaign that uses a remote access Trojan (RAT) named Mirage (also known as MirageFox.

HOW DOES MIRAGE WORK?

SPEAR-PISHING Mirage was intended to attack individuals at big oil and energy companies. So it uses a technique called Spear-Pishing. Spear-Pishing is a process of acquiring sensitive information from specific individuals or an organization by masquerading as a trustworthy entity. In this scenario, the attackers gather personal information about the targets to increase their probability of success.

INSTALLATION The spearpishing s contains an attachment that includes malicious payload which installs a copy of Mirage on the computer The attachments are stand-alone executable files that open an embedded PDF and execute the Mirage Trojan in the background Mirage installs itself into “c:\Windows” or the Users Home directory It also creates a backboor which waits for instructions from the attacker Mirage creates registry keys on every boot so that the system remains infected

COMMUNICATION Mirage phones home to its c2 servers using standard HTTP Post request over the ports 80, 443 and It can also use SSL for added security. Iniitial phone-home request contains detailed system information of the infected system. – Example : Once the c2 server gets this it responds with HTTP response code “200 ok”.

After a successful connection, infected system still sends regular check-in updates with its mac address in it. All of its communications with its command and control servers are disguised to appear like the URL traffic pattern associated with Google searches. VARIANT 2: Another variant of Mirage uses HTTP Get requests for communication. In this variant instead of ‘Mirage’ in the beginning of the message it uses “It is the end of the world and I feel Fine", from the REM song "It's the end of the world."

VICTIMS The picture below shows the sources of infected hosts. After deep analysis researchers have found one infected host, an executive-level finance manager of the Philippine-based oil company.

ATTACKERS SecureWorks have identified that the attackers were operating out of china. Used dynamic DNS domains for callbacks to c2 servers. The hosting companies in US were running Htran. In 2011 analysis the software author was identified as member of Chinese hacker group HUC, the Honker Union of China. Despite efforts during analysis of home phone activity researches four unique second-level domains were identified of which two shares a common Id.

INTENTIONS The intention behind the attacks are still not known but they have hit many energy and oil companies world wide. Its unclear about what kind of data they were trying to steal from the specific targets yet.

CONCLUSION Mirage was a light weight simple malware which proved to be effective because it was able to reach mid and senior-level executives. This malware represents only a small piece of an ongoing worldwide campaign. This proves that for a successful campaign only a small quantity of infected systems are required.

CITED SITES mirage-campaign/ mirage-campaign/ drops-mirage-on-energy-firms/ drops-mirage-on-energy-firms/ breach-ghostnet-attacks/article/259991/ breach-ghostnet-attacks/article/259991/

Thank you