Web-Based Malware Menace Spreading Fast Garry Bennett Marcelo Berger Kelley Gambera Elsa Madrigal David Pessis Chuck Roth Fred Salchli Presented By:

Slides:



Advertisements
Similar presentations
WEB DESIGN TABLES, PAGE LAYOUT AND FORMS. Page Layout Page Layout is an important part of web design Why do you think your page layout is important?
Advertisements

Supplied on \web site. on January 10 th, 2008 Customer Security Management Reducing Internet fraud June 1 st, 2008 eSAC Walk Thru © Copyright Prevx Limited.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Cyber X-Force-SMS alert system for threats.
Web Based Attacks SymantecDefense Fantastic Four Casey Ford Mike Lombardo Ragnar Olson Maninder Singh.
It’s always better live. MSDN Events Securing Web Applications Part 1 of 2 Understanding Threats and Attacks.
Phishing – Read Behind The Lines Veljko Pejović
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Lecture 16 Page 1 CS 236 Online Cross-Site Scripting XSS Many sites allow users to upload information –Blogs, photo sharing, Facebook, etc. –Which gets.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Norman SecureSurf Protect your users when surfing the Internet.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
11 The Ghost In The Browser Analysis of Web-based Malware Reporter: 林佳宜 Advisor: Chun-Ying Huang /3/29.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
The Ghost In The Browser Analysis of Web-based Malware Niels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang and Nagendra Modadugu Google, Inc. The.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Cosc 4765 Server side Web security. Web security issues From Cenzic Vulnerability report
Prevent Cross-Site Scripting (XSS) attack
WEB SECURITY WEEK 3 Computer Security Group University of Texas at Dallas.
CSCI 6962: Server-side Design and Programming Secure Web Programming.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
1-Vulnerabilities 2-Hackers 3-Categories of attacks 4-What a malicious hacker do? 5-Security mechanisms 6-HTTP Web Servers 7-Web applications attacks.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
November 13, 2008 Ohio Information Security Forum Attack Surface of Web Applications James Walden Northern Kentucky University
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
1 Internet Browsing Vulnerabilities and Security ECE4112 Final Lab Ye Yan Frank Park Scott Kim Neil Joshi.
Fostering worldwide interoperabilityGeneva, July 2009 How to counter web-based attacks on the Internet in Korea Heung Youl YOUM Chairman of Korea.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
Web Application Security ECE ECE Internetwork Security What is a Web Application? An application generally comprised of a collection of scripts.
Security Scanners Mark Shtern. Popular attack targets Web – Web platform – Web application Windows OS Mac OS Linux OS Smartphone.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Interception and Analysis Framework for Win32 Scripts (not for public release) Tim Hollebeek, Ph.D.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Web Attacks— Offense… The Whole Story Yuri & The Cheeseheads Mark Glubisz, Jason Kemble, Yuri Serdyuk, Kandyce Giordano.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
October 3, 2008IMI Security Symposium Application Security through a Hacker’s Eyes James Walden Northern Kentucky University
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Web Applications Testing By Jamie Rougvie Supported by.
Module 2 – User Safety Privacy Attacks on end users Browser vulnerabilities.
Web Security Lesson Summary ●Overview of Web and security vulnerabilities ●Cross Site Scripting ●Cross Site Request Forgery ●SQL Injection.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
©2008 Gotham Digital Science SQL Injection Worms for Fun & Profit Justin Clarke, Andrew Carey Nairn.
Week 7 - Wednesday.  Web security – user side.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Powerpoint presentation on Drive-by download attack -By Yogita Goyal.
Computer Security Keeping you and your computer safe in the digital world.
SlideSet #20: Input Validation and Cross-site Scripting Attacks (XSS) SY306 Web and Databases for Cyber Operations.
Web Security (cont.) 1. Referral issues r HTTP referer (originally referrer) – HTTP header that designates calling resource  Page on which a link is.
Botnets A collection of compromised machines
World Wide Web policy.
Botnets A collection of compromised machines
Database Driven Websites
HOW DO I KEEP MY COMPUTER SAFE?
Lecture 2 - SQL Injection
Exploring DOM-Based Cross Site Attacks
Presentation transcript:

Web-Based Malware Menace Spreading Fast Garry Bennett Marcelo Berger Kelley Gambera Elsa Madrigal David Pessis Chuck Roth Fred Salchli Presented By:

Malware Behavior is Changing  Malware no longer exclusive to malicious sites  Malware making its way to end user machine with no user interaction required  Malware establishing presence on end user machine  There has been explosive growth in new malicious code signatures Table 1. New malicious code signatures Source: Symantec Corporation

Interesting Trends  Malware are targeting mainstream sites  In 2008, Economist.com and MLB.com were both hit  Malware authors used DoubleClicks ad-serving software  Unsuspecting users clicked on what looked to be legitimate ads, but were actually clicking on a Trojan which installed itself on the user’s hard drive to collect personal information  Malware authors are now looking for a bigger audience  Mainstream sites provide this base  Users who go to these sites are less likely to be concerned about being the victim of malware attack  This is an increasing problem since the notion of being safe if one visits good sites no longer holds true  Web servers have evolved into complex code  No longer a static page  Third-party hosted material  Network layer communication and exposed weakness

Attack Techniques  SQL injection  Malicious advertisements  Search engine result redirection  Attacks on backend virtual hosting companies  Vulnerabilities in Web server or forum hosting software  Cross-site scripting (XSS) attacks

Attacks Not Mentioned in Paper  Sniffing & Interception (HTTP vs. HTTPS)  DNS Server Vulnerability Exploits  Allow malicious sites to be served  Authenticity Attacks

More Popular Attack Techniques: SQL Injection  Large, high-traffic sites have databases running in background  Read/write user interaction  Security must extend to databases and data  How it works:  Identifies input form vulnerabilities  Hacker inserts additional SQL instructions  Hacker can then navigate database and add mal content  Hidden links  E.g. Trojan.Asprox

7 SQL Injection : Attack at Duo! Longstanding Client Client merged with another company that had an existing e-commerce application We hesitantly agreed to integrate and host the e- commerce application Code review and testing indicated security problems  Client pushed back on risk assessment and claimed e- commerce site would be retired in very near future Two years later... 7

8 SQL Injection  First Order Attack  Attacker gains access to the database and can perform DML and/or DDL commands  Second Order Attack  Attacker inserts data into the database  Our attacker did both  Client called to report strange links appearing within the product pages of their site 8

9 SQL Injection: Raw IIS Log :59:39 W3SVC WEB14A POST /productcart/pc/viewCat_P.asp CAST(0x C C C C F F F F C E006E D C E006E D F006D F A C F006C D006E E D E E E D E E D F E D F E D F E D F E C F F E F004D C F F E F C C F D E B B B D B B B D003D D F006E C005B B B D B C D A002F002F E E F006D002F E006A E003C002F E E F004D C F F E F C E C004F C F F C004C004F C F F AS HTTP/1.0 Mozilla/3.0+(compatible;+Indy+Library) www.clientname.com 9

10 SQL Injection: 1st Order Attack POST /productcart/pc/viewCat_P.asp idCategory=57; “ varchar(255) DECLARE Table_Cursor CURSOR FOR select a.name,b.name from sysobjects a,syscolumns b where a.id=b.id and a.xtype='u' and (b.xtype=99 or b.xtype=35 or b.xtype=231 or b.xtype=167)” AS 10

11 SQL Injection: 2nd Order Attack OPEN Table_Cursor FETCH NEXT FROM Table_Cursor INTO BEGIN exec('update set '' ''') FETCH NEXT FROM Table_Cursor INTO END CLOSE Table_Cursor DEALLOCATE Table_Cursor 11

12 SQL Injection: Remediation  We immediately shut down the application  We built a scrubber which scanned database tables for signature and removed malicious calls  E commerce site was disintegrated from main site  Unhappy client; Unhappy service provider 12

 Malware delivered via what appears to be real ad  Issues:  Not all advertisers validate the ads hosted on legitimate sites  The nature of advertising/online publishing mechanisms dynamic and automated, thus difficult to trace  Authored using JavaScript  Functions can be easily misused to silently redirect user to malicious page regardless if hosting site remains clean  Ads are hard to detect because they quickly rotate  Rotate based on search parameters and/or end-user geography  Web site and ad publishers are unaware that ads contain malware More Popular Attack Techniques: Malicious Ads

 How Malicious ads work:  Pop up over a web site and redirect user to web page filled with malicious software  Entices user to click a link, which results in loading of malicious web site  Auto-redirects often utilize Flash technology whereas click-throughs use JavaScript or ActiveX to create pop up with clickable options  More Popular Attack Techniques: Malicious Ads 25s05.asp Additional Source: Smart Computing, “How to Get Rid of Malicious Ads,” May 2008

More Popular Attack Techniques: Search Engine Result Redirection  Poisoned keywords related to popular searches  Metatags in web pages used to perform search engine optimization  Example: Easter verse, Easter verse poems, Easter greeting card verses  Re-directs to Malware Sites  Malware is downloaded  Misleading Apps are downloaded: anti-virus, windows updates, etc.  Detection Avoidance:  Referrer checking: avoid researchers who could be investigating the referral to the site  Modify HTTP Headers to avoid caching of pages  No-store, No-cache Source:

More Popular Attack Techniques: Backend Virtual Hosting Companies  Virtual Hosting Companies provide Web server hosting services to other companies or individuals  Attacking Virtual Hosts providers hackers with avenue to infect multiple sites associated with hosts  GoDaddy.com DDoS Attack: Hackers knocked down number of cliet Web sites for several hours in 2007  Techniques for compromising legitimate client Web sites:  Exploit applications on host to inject malicious code (HTML – iframes), and host then injects same code into client sites  DNS Spoofing attack using virtual Host name

How Malware Authors Reach Users  Get on to the user’s computer automatically  DNS cache poisoning  Drive by download  Software vulnerabilities  Web attack toolkits  Cat and mouse game  Obfuscation  Dynamically changing URLs and malware  Clickjacking  Get on to the user’s computer with help from the user  Fake codec  Malicious P2P files  Mal ads  Fake scanner web page  Blogs

Drive By Download  User just browses site and executable content is auto-downloaded onto user computer without their knowledge  True Four Years Ago… Browsers are more defensive today  Degrees of insecurity according to corporate policies  Some apps only supported by older browser versions  No user interaction required  “Good” web sites are targeted by attackers to establish user trust  Issue:  OS and browser may have latest patches but multimedia plug-ins and doc viewers are out of date and vulnerable  Attack method:  Hidden IFrame causes user browser to silently pull mal content  Mal authors are then able to pull OS, browser, etc. vulnerabilities and eventually pull personal information Entire attack is invisible to user

Other Automatic Attack Methods  Software vulnerabilities  “Bugs” or flaws in applications  Attacker can compromise system on which software is installed  Web attack toolkits  Off-the-shelf software written to probe user’s computer and automatically exploit security holes  Obfuscation  Encryption of malcode, typically in JavaScript  Dynamically changing URLs and malware  Malicious domains which appear to be real ones associated with search engine statistics  Clickjacking  Attacker puts invisible layer on Web page and user unknowingly clicks “fake” buttons, links to malware

Older Detection Techniques No Longer Work  Older, signature-based antivirus-only detection techniques are far less effective  Multimedia, reader, browser, and third-party software vulnerabilities are hard to detect using traditional virus signatures  Traditional antivirus software only knows how to search in files, not network  Attacks are invisible  New methods for detection are necessary  Security is heavily dependent on user’s habits  i.e. needs to keep up with patches, security updates, etc.  Security lockdown is practiced by website owners who have high stakes in secure web transactions

User-Assisted Attack Methods  Social engineering  People are tricked into performing actions  Examples:  Fake codec  Software that can decode a binary file and reconstitute a version of the original audio or video  “Tempting” content gives malware authors the ability to get users to install new codec to reach desired content  Screenshot shows fake codec to install video, but instead it’s malware  Trojan is installed and infects user’s computer  Malicious P2P files  Files using celebrity names or popular brand names

User-Assisted Attack Methods (cont’d)  Examples:  Malicious ads  One of the most blatant techniques  Direct advertisement of malware to unsuspecting users (in contrast to using actual product/company names)  E.g. Fake copy of a newly-released game  Fake scanner web page  Leverage JavaScript capabilities of a browser  Content appears to be legitimate OS alert notification  A “scare tactic” approach to get users to execute malware  Blogs  Bogus links which point to malware

Symantec Top Web Threats 2008  Drive-by downloads  Obfuscation  Targeting browser plug-ins instead of just browser  Misleading apps  SQL injection in mainstream sites  Unique and targeted malware  ‘Polymorphing’ Tools

New Threats for 2009 and Beyond  Bogus services  Legal, financial, car transport  “Mule” recruitment sites  Spam  Professional-looking sites  Social networking vulnerabilities with Web 2.0**  Hacked accounts  Cross-Site Scripting (XSS)  Cross Site Request Forgery (CSRF)  Phishing  Information Leakage  Injection flaws (Javascript, XML, Xpath, JSON)  Information integrity (i.e. wrong entries on wikipedia)  Insufficient anti-automation  vulnerable to brute force and CSRF attacks  High-visibility news events  Quick distribution of malware  Replacement of attachments with hyperlinks Twitter CSRF Attack **Source: Top Web 2.0 Security Threats, Secure Enterprise 2.0 Forum

Methods of Defense  Techniques for Counter-Acting Web-based Attacks  User-awareness (don’t click on anything funny)  Don’t download apps you don’t trust  Keep your OS updated  Use anti-phishing, malware, spam software No single silver bullet… Just a bunch of silver bb’s…

26 Garry’s Slides

SQL Injection Example // a good user's name $name = "timmy"; $query = "SELECT * FROM customers WHERE username = '$name'"; echo "Normal: ". $query. " "; // user input that uses SQL Injection $name_bad = "' OR 1'"; // our MySQL query builder, however, not a very safe one $query_bad = "SELECT * FROM customers WHERE username = '$name_bad'";

SQL Injection Example - Cont. // display what the new query will look like, with injection echo "Injection: ". $query_bad; Normal: SELECT * FROM customers WHERE username = 'timmy‘ Injection: SELECT * FROM customers WHERE username = '' OR 1''

 Legitimate sites that have been hacked to redirect to various rogue anti-malware “scan” sites  The malicious redirect only occurs when a user arrives at the site via search engine results  Visiting the sites directly (i.e. via a bookmark or manually entering the address) results in no redirect  Site owners’ visiting their site directly won’t see any evidence of the redirect  Since many sites receive a majority of their traffic from search engines, that large majority of users will keep getting redirected to the malicious site More Popular Attack Techniques: Search Engine Results Redirection

More Popular Attack Techniques: Search Engine Result Redirection Example The root cause of many of these hacks is a maliciously modified.htaccess file commonly used on Apache web servers RewriteEngine On RewriteCond %{HTTP_REFERER}.*google.*$ [NC,OR] RewriteCond %{HTTP_REFERER}.*yahoo.*$ [NC,OR] RewriteCond %{HTTP_REFERER}.*msn.*$ [NC,OR] RewriteCond %{HTTP_REFERER}.*ask.*$ [NC,OR] RewriteCond %{HTTP_REFERER}.*aol.*$ [NC,OR] RewriteCond %{HTTP_REFERER}.*altavista.*$ [NC,OR] RewriteCond %{HTTP_REFERER}.*netscape.*$ [NC]... RewriteRule.* [R=301,L] In some cases it ’ s replaced completely, in other cases the bad rules are added to the existing contents.

More Popular Attack Techniques: Malicious Ads Example