Jeffrey Bernardino Nikko Tamaña Stealth by Legitimacy: Malware’s Use of Legitimate Services 2012 年 5 月 2 日.

Slides:



Advertisements
Similar presentations
By Hiranmayi Pai Neeraj Jain
Advertisements

Secure SharePoint mobile connectivity
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Trojan Horse Program Presented by : Lori Agrawal.
Computer Viruses.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
1 Pertemuan 6 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Introduction to Microsoft Office Web Apps with Jim Mollé Learn iT! Computer Software Training.
© N. Ganesan, Ph.D., All rights reserved. Active Directory Nanda Ganesan, Ph.D.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Microsoft October 2004 Security Bulletins Briefing for Senior IT Managers updated October 20, 2004 Marcus H. Sachs, P.E. The SANS Institute October 12,
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
eScan Total Security Suite with Cloud Security
Portal and AQAS-Philadelphia University 21-22/6/2011 AVCI Platform in PU Dr. Abdel-Rahman Al-Qawasmi Philadelphia University Director of Computer Center.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
13Computer Intrusions Dr. John P. Abraham Professor UTPA.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 7: Using Windows Servers to Share Information.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Intro to Google Apps B3: Working in Google Drive.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Enforcing Concurrent Logon Policies with UserLock.
14 Publishing a Web Site Section 14.1 Identify the technical needs of a Web server Evaluate Web hosts Compare and contrast internal and external Web hosting.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
CIM6400 CTNW (04/05) 1 CIM6400 CTNW Lesson 6 – More on Windows 2000.
Honeypot and Intrusion Detection System
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Client – Server Application Can you create a client server application: The server will be running as a service: does not have a GUI The server will run.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
Smart Protection Network Kelvin Liu AVP, Core Tech Development.
Compatibility and Interoperability Requirements
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
Advanced Persistent Threats (APT) Sasha Browning.
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
Security Vulnerabilities in A Virtual Environment
Web Browsing *TAKE NOTES*. Millions of people browse the Web every day for research, shopping, job duties and entertainment. Installing a web browser.
Understand Malware LESSON Security Fundamentals.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Chapter 1 Real World Incidents Spring Incident Response & Computer Forensics.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Week-2 (Lecture-1) An electronic message sent from one computer to another. contains account i.e. How does.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
For more information on Rouge, visit:
Discovering Computers 2012: Chapter 8
3.6 Fundamentals of cyber security
Backdoor Attacks.
Configuring Windows Firewall with Advanced Security
Unit 27: Network Operating Systems
SPRING DRAGON APT - A CASE STUDY OF TARGETED ATTACKS IN APAC COUNTRIES
Chap 10 Malicious Software.
Configuring Internet-related services
Faculty of Science IT Department By Raz Dara MA.
Chap 10 Malicious Software.
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Jeffrey Bernardino Nikko Tamaña Stealth by Legitimacy: Malware’s Use of Legitimate Services 2012 年 5 月 2 日

Malware take advantage of…. Social media Vulnerabilities Advertisements Search engine results Fake antivirus/applications Legitimate services

Why cybercriminals use legitimate services? Malware utilizing legitimate services are definitely not unheard of. Running their malicious activities through legitimate channels can be an effective way to mask communication against network and file tracking techniques employed by most anti-malware products today. The sheer volume of users of popular legitimate services decrease the chance of malware activity discovery, as it will take time for IT departments to develop rules that will track malicious activity on legitimate channels.

Malware using legitimate services TSPY_SPCSEND –malware that grabs MS Word and Excel files from users’ infected systems and then uploads them to the file hosting site sendspace.com. Sendspace is a file hosting website that offers file hosting to enable users to “send, receive, track and share your big files.” Cybercriminals used Sendspace for rounding up and uploading stolen data. –It is a “grab and go” Trojan that searches the local drive of an affected system for MS Word and Excel files. The collected documents are then archived and password-protected using a random-generated password in the user’s temporary folder

Malware using legitimate services BKDR_MAKADOC –Uses Microsoft Word documents that can either be downloaded directly from the Internet or dropped by other malware. –This backdoor remotely executes these commands: terminate itself, download and execute files, change IP, and open command line. –It continues by stealing information from the target, such as domain name, GUID, host name, user name, Windows version, and more. –It then uses legitimate site, as its proxy server to communicate with its C&Cs, thus avoiding detection.

BKDR_VERNOT.A Routine Arrival

BKDR_VERNOT.A Arrival It may arrive on a system as a file dropped by other malware It may arrive as a file downloaded unknowingly by users when visiting malicious sites.

BKDR_VERNOT.A Routine ArrivalInstallation

BKDR_VERNOT.A Installation First, it drops its DLL component “%User Temp%\NETUT2.dll”

BKDR_VERNOT.A Installation It opens the registry key to be modified “HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows”

BKDR_VERNOT.A Installation Then it modifies the following registry entry to ensure it automatic execution at every system startup:

BKDR_VERNOT.A Installation In Registry Editor

BKDR_VERNOT.A Routine ArrivalInstallation DLL Injection

BKDR_VERNOT.A DLL Injection It first searches for EXPLORER.EXE in running processes

BKDR_VERNOT.A DLL Injection If found, it opens EXPLORER.EXE It then writes the DLL component to EXPLORER.EXE’s memory space

BKDR_VERNOT.A DLL Injection Harvests the LoadLibraryW API

BKDR_VERNOT.A DLL Injection Creates remote thread in EXPLORER.EXE by executing LoadLibraryW with the DLL component as its parameter Virtual Address where DLL component is injected

BKDR_VERNOT.A Routine ArrivalInstallation DLL Injection Connect to Evernote (C&C)

BKDR_VERNOT.A Routines Backdoor Routine –After logging in, it can perform the following: Create notes –Inform the cybercriminal of successful installation Access notes –Get backdoor commands Modify notes –Drop-off of stolen information

BKDR_VERNOT.A Routines VERNOT malwares are capable of performing the following backdoor commands: –Download files –Execute files –Rename files –Unzip archive files

BKDR_VERNOT.A Routines VERNOT malwares are capable of stealing information such as: –Affected machine’s Registered Owner –Affected machine’s Registered Organization –Affected machine's OS information –Affected machine's Time Zone –Affected machine's User Name –Affected machine's Computer Name

BKDR_VERNOT.A Notes Evernote variant was not able to login successfully (Evernote Hacking Incident, March 2013) It did not exhibit interaction between the cybercriminal through the C&C servers during analysis

Comparing BKDR_VERNOT.A and BKDR_VERNOT.B ArrivalInstallation DLL Injection Connect to Evernote (C&C) Connect to Livedoor Blog (C&C)

What is Livedoor? Internet service provider Runs a web portal and other businesses Headquarters in Tokyo, Japan One of its services includes blogging site

BKDR_VERNOT.B Overview Network Activity

BKDR_VERNOT.B Overview Livedoor blog account

BKDR_VERNOT.B Overview For every backdoor command BKDR_VERNOT.B does, it reports back to the blog draft by editing it and adding the following strings: –file create failed- If file download fails –download file succeed – If file download succeeds –Run failed- If file execution fails –Run succeed – If file execution succeeds –Exe file not found – If file to be executed is not found –Unzip failed – If extracting archive file fails –Unzip succeed – If extracting archive file succeeds –Unzip file not found – If archive file is not found –rename file failed – If renaming file fails –rename file succeed – If renaming file succeeds –src file not found – If file to be renamed is not found

BKDR_VERNOT.B Overview Livedoor blog account

BKDR_VERNOT.B Notes It did not exhibit interaction between the cybercriminal through the C&C servers during analysis

Solutions Trend Micro Detection BKDR_VERNOT.A (Evernote) –CPR »03/15/2013 –OPR »03/16/2013 BKDR_VERNOT.B (Livedoor) –CPR »04/10/2013 –OPR »04/11/2013

Solutions Proactive Sourcing Clean up –Supported by Genericlean –Version 1.Restart in Safe Mode 2.Delete the dropper and %User Temp%\NETUT.dll 3.Delete the added registry entry for automatic execution

Solutions Collaboration with concerned sites –Evernote Collaborated with the CTO of Evernote

Solutions Collaboration with concerned sites –According to Dave Engbert 4 more accounts are used similarly Same connection requests Some are registered as early as February 2013 Limited activities

Solutions Evernote implemented extra layers of security after the incident –Two-step Verification (Optional) –Authorized Applications –Access History Future

Solutions Access History Feature

Conclusion Relying on legitimate services to guard against threats may not provide ample security for users. With the consumerization of IT, enterprises in particular are vulnerable to data loss through compromised legitimate services brought by its employees for use in the office. The more employees bring their own apps or services in the corporate network without ample policy, the more risks there are to corporate data. This incident shows that cybercriminals treat legitimate services as assets with potential for malware use, which is something that many consumer and enterprise users may not be ready for. Should IT departments or individuals fail to look over these channels; chances of compromising sensitive information will remain high.

Questions?