Copyright Microsoft Corp. 2006 Dhiresh Salian Regional Information Security Manager Microsoft Corporation. Rootkit’s and protection against them.

Slides:



Advertisements
Similar presentations
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
1 Computer and Internet Security JCCAA Presentation 03/14/2009 Yu-Min (Phillip) Hsieh Sr. System Administrator Information Technology Rice University.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Rootkit Definition A rootkit is a collection of tools (programs) that enable administrator-level access to a computer or computer network. Typically, a.
ROOTKIT VIRUS by Himanshu Mishra Points to be covered Introduction History Uses Classification Installation and Cloaking Detection Removal.
Students: Jacek Czeszewski and Marcos Verdini Rosa Professor: José Manuel Magalhães Cruz.
3 Section C: Installing Software and Upgrades  Web Apps  Mobile Apps  Local Applications  Portable Software  Software Upgrades and Updates  Uninstalling.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
From AV to Internetized Security Solution 马杰 Jeffrey Beijing Rising Tech. Co., Ltd. --- The Analysis Report of Malware Technology in China in 2005.
Windows Security and Rootkits Mike Willard January 2007.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
ROOT KITS. Overview History What is a rootkit? Rootkit capabilities Rootkits on windows OS Rootkit demo Detection methodologies Good tools for detection.
 Meaning of spyware Spyware is a program that can be installed on computers, and which collects small pieces of information about users without their.
COMPUTER TERMS PART 2. NETWORK When you have two or more computers connected to each other, you have a network. The purpose of a network is to enable.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Chapter Nine Maintaining a Computer Part III: Malware.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
How to maintain your computer
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Viruses.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Rootkits. EC-Council The Problem  Microsoft Corp. security researchers are warning about a new generation of powerful system-monitoring programs, or.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Lecture 2 Title: Computer Software By: Mr Hashem Alaidaros MIS 101.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Mathieu Castets October 17th,  What is a rootkit?  History  Uses  Types  Detection  Removal  References 2/11.
CAP6135: Malware and Software Vulnerability Analysis Rootkits Cliff Zou Spring 2012.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Rootkits What are they? What do they do? Where do they come from?
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Computer security By Isabelle Cooper.
Malicious Software.
Computer Skills and Applications Computer Security.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Understand Malware LESSON Security Fundamentals.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Securing Tomorrow’s World Microsoft Security Roadmap Ed Gibson & Steve Lamb Microsoft Ltd.
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Computer Security Keeping you and your computer safe in the digital world.
Botnets A collection of compromised machines
Instructor Materials Chapter 7 Network Security
Microsoft’s Security Strategy
Rootkit A rootkit is a set of tools which take the ability to access a computer or computer network at administrator level. Generally, hackers install.
Botnets A collection of compromised machines
Computer Applications Unit B
Implementing Client Security on Windows 2000 and Windows XP Level 150
Test 3 review FTP & Cybersecurity
Presentation transcript:

Copyright Microsoft Corp Dhiresh Salian Regional Information Security Manager Microsoft Corporation. Rootkit’s and protection against them.

Copyright Microsoft Corp Agenda Internet Security Threat Report* Understanding The Landscape Rootkits – Defined Root Problem Types of rootkits Defending against rootkits Rootkits in limelight Microsoft Ghostbuster – Strider Recap * Symantec Internet security threat report Vol VIII

Copyright Microsoft Corp Internet Security Threat Report Key Findings Attackers motivated by financial gains Traditional Perimeter defenses not enough Web applications and Web browsers increasingly targeted BOT networks again on the rise BOT network activity increased 143% over the last reporting period DOS attacks grew 680% to an average of 927 attacks per day 59% of all vulnerabilities reported to Symantec were web application vulnerabilities Web browser most vulnerable – Mozilla Family (25)

Copyright Microsoft Corp Internet Security Threat Report Changing Trends 10,866 new virus and worm variants. Reps 48% increase over the previous reporting period Number of new virus and worm is slowing Variants of them are growing Changing Threat landscape : Motivated by financial gain BOT networks for rent GPcoder Trojan

Copyright Microsoft Corp Internet Security Threat Report Changing Trends Mobile Malicious Code: Advent of first MMS worms Commwarrior Skulls Trojan – affects Symbian Additional Security Risks Phishing messages: Volume grew from 2.9 million a day to 5.7 Million a day 1 out of every 125 messages a phishing attack General trend way from Hacking for fame to hacking for fortune Identity theft ring was able to net over $2M in one instance (FBI)

Copyright Microsoft Corp Internet Security Threat Report Additional Security Risks Average percentage of that is spam is 61%. Spammers use BOT’s to try and obscure their actual location Adware and Spyware Shotathome agent accounted for 19% of adware reported Webenhancer: Most reported spyware, accounting for 29% Concern over their installation, end user licensing agreement (EULA), updation and removal

Copyright Microsoft Corp Understanding The Landscape National Interest Personal Gain Personal Fame Curiosity Script-Kiddy Hobbyist Hacker Expert Specialist Vandal Thief Spy Trespasser Tools created by experts now used by less skilled attackers and criminals Fastestgrowingsegment Author

Copyright Microsoft Corp Rootkits - Defined Rootkit Definition.(as per Symantec) “Rootkit A rootkit is a component that uses stealth to maintain a persistent and undetectable presence on the machine. Actions performed by a rootkit, such as installation and any form of code execution, are done without end user consent or knowledge. Rootkits do not infect machines by themselves like viruses or worms, but rather, seek to provide an undetectable environment for malicious code to execute. Attackers will typically leverage vulnerabilities in the target machine, or use social engineering techniques, to manually install rootkits. Or, in some cases, rootkits can be installed automatically upon execution of a virus or worm or simply even by browsing to a malicious website. Once installed, an attacker can perform virtually any function on the system to include remote access, eavesdropping, as well as hide processes, files, registry keys and communication channels. “

Copyright Microsoft Corp Root Problem Common in UNIX platforms, Rootkits on Windows OS recent phenomenon. Trojanize Key system files. In Windows: Different approach Registers with OS and intercepts program requests made to standard Windows APIs Since it intercepts system calls and filters results – anti malware tools are not effective.

Copyright Microsoft Corp Root Problem In Unix: Replaces standard Unix system files like ps Some rootkits more sophisticated: Adds its own code to every process currently running on a computer. Some rootkits use polymorphic wrapper that constantly changes the appearance of the spyware file. Very difficult to detect by anti spyware/malware programs How does Rootkit infect anyone: Same way as other malware—a malicious Web site or someone may copy them directly onto your computer or through trojan means.

Copyright Microsoft Corp Types of Rootkits File or User Level Rootkits Basic Type of Rootkits – Operate at application level Intercepts standard User mode API’s Can affect user with lower privilege Legitimate program replaced with Trojaned version. Common files usually trozanized are – login, ls, ps, find, who, netstat Targets files usually used by administrators Kernel Level rootkits More advanced and difficult to detect Operate at kernel level. Lives in kernel mode as device driver Require administrator level access. Do not modify system files – Integrity checkers will not be able to detect. Attacker can intercept system calls Operates at lower levels within the Windows architecture

Copyright Microsoft Corp Types of Rootkits (cont’d) Kernel mode data structure manipulation Instead of attacking API’s it attacks data structure It requires admin privileges It can causes crashes and hence can be detected More advanced variations possible: Example: FU Process Hijacking Hide a legitimate process Code sits inside legitimate process Doesn’t survive reboot Extremely hard to detect Code Red used this stealth technique.

Copyright Microsoft Corp Windows Architecture Service Control Manager Task Manager NTDLL.DLL Security Reference Monitor Processes & Threads Config Manager(registry) (Kernel mode callable interfaces) I/O Mgr User Mode System ProcessesServicesApplications LSASSExplorer Winlogon User applications Session Manager Services.exe Kernel Mode Device & File Sys Drivers Kernel Hardware Abstraction Layer NTDLL.DLL – User mode rootkit hooks Kernel – Kernel mode rootkit hooks

Copyright Microsoft Corp Defending against Rootkits. All stealth mechanisms used by rootkits do have holes Cloaking not possible when OS is offline Induces system anomalies Leaves some API’s unfiltered Simple way of detecting rootkits – comparing offline and online win diff results. Most Effective defense: Nail it before it gets installed. Up-to-date Security Practices Good Practices Virus Protection Rootkit Detection Tools: Standard part of security toolkit.

Copyright Microsoft Corp Defending against Rootkits File or User-level Rootkits Using kernel mode API and comparing this with user mode API results Creating Message Digest Using tools like Tripwire Other programs – Chkrootkit (Unix, Linux), Data Sentinel (Windows), Kernel-level Rootkits Proper Defense mechanisms LPA: Least Privilege access Difference in offline – online scans Other Tools: Microsoft’s antispyware, RootkitRevealer from Sysinternals; BlackLight from F-Secure

Copyright Microsoft Corp Malware/Spyware/Rootkit Tools Sigcheck ( MSConfig.exe Autorun ( Process Explorer ( Rootkit Revealer (

Copyright Microsoft Corp Rootkits in Limelight ContextPlus, Inc., makers of the Apropos and PeopleOnPage adware programs. Apropos, a spyware program, collects users' browsing habits and system information and reports back to the ContextPlus servers Data used to serve targeted pop-up advertisements while the user is surfing the Web Sophisticated kernel-mode rootkit that allows the program to hide files, directories, registry keys and processes FU rootkit extremely widespread in 2005 FU only hides processes, elevate process privileges, fake out the Windows Event Viewer. FU among the top-five pieces of malware deleted by Microsoft’s free Windows malicious software removal tool.

Copyright Microsoft Corp Rootkits in Limelight Hack Defender A user mode rootkit Author – “Holy Father” Hides many things Files, Processes, Services, Registry values,Ports Is able to hook into logon API to capture passwords You can pay developers money ($100-$900) for a custom version of software to avoid detectors

Copyright Microsoft Corp Rootkits in Limelight Customized hack defender

Copyright Microsoft Corp Rootkits in Limelight Symantec Corp : admitted using a rootkit- type feature in Norton SystemWorks Hides directory from Windows APIs: To stop customers from accidentally deleting files Norton Systemwork’s Norton Protected Recycle Bin with a director called NProtect is hidden from Windows APIs. Since it is, files in the NProtect directory might not be scanned during virus scans Norton recommends SystemWorks users update the product immediately to ensure greater protection

Copyright Microsoft Corp Rootkits in Limelight Sony BMG’s DRM rootkit Rootkit like cloaking techniques used in First 4 Internet DRM software Sony ships on its CDs Extended Copy Protection (XCP) is a CD/DVD copy protection technology created by First 4 Internet Ltd Software is designed to prevent protected CDs being played with anything other than an included Media Player DRM software will hide files, processes and registry keys DRM service named as Plug and Play Device Manager The DRM software hides it information by modifying the execution path of several Native API functions Comes with no uninstall feature EULA does not mention about this cloaking or that it comes with uninstall feature Need to open a support call to uninstall the rootkit – possibility of crashing the computer

Copyright Microsoft Corp Demo :Malware detection tools

Copyright Microsoft Corp Rootkits in Limelight Detecting Sony DRM rootkit

Copyright Microsoft Corp Microsoft Ghostbuster - Strider Clever prototype developed by Microsoft. It detects arbitrary persistent and stealthy software, such as rootkits, Trojans, and software keyloggers How does it work? Checker runs stopping all services, flushing caches and does checksum Now machine boots with the CD and does the same checksum again. How to fool Ghostbuster? Detect that such a checking program is running and either not lie to it or change the output as it's written to disk Integrate into the BIOS rather than the OS Give up on either being persistent or stealthy.

Copyright Microsoft Corp Microsoft Ghostbuster - Strider Effective against keyloggers – add key strokes to the fist scan. Will increase the size of keyloogers log and will be detected by clean scan To detect non stealth malware- compare the file output with a know good list. Compute a cryptographic hash of every file on infected disk and match it against the Strider Known-* Database Step #3 WinDiff Files Hidden By RootKit “dir /s /a” Clean Scan Clean Boot From WinPE CD Step #2 Infected Drive “dir /s /a” Infected Scan Infected Boot Step #1

Copyright Microsoft Corp Microsoft Ghostbuster - Strider Characteristics of Ghostbuster Scan Deterministically, efficiently, and effectively detect today’s file-hiding software; It will help computer users gain back trustworthy file- query operations and force malware programs to give up file hiding and therefore always expose themselves to Gatekeeper ASEP scan and anti-virus-style known- bad signature-based scans Does not require known-bad signatures hence no signature updates Assumes that any data gathered through any apps or OS components running inside an infected OS cannot be trusted.

Copyright Microsoft Corp Recap Rootkit - Definition Rootkit Defense Defense in Depth Multilayered approach Secure your perimeter and protect your internal clients Patch Updates Security Awareness No_execute hardware support Usage of DEP Firewalled internal zones and desktops Usage of antispyware and antivirus software Messaging Hygiene (Frontbridge and Sybari Antigen) LPA: Running as non-admin

Copyright Microsoft Corp Recap Rootkit Defense Antispyware Kit: Microsoft Antispyware, Rootkit Revealer, RK detect, F Secure Blacklight, Chkrootkit Other tools for malware detection and investigation – sigcheck, autorun and Process explorer If Infected – Format and reinstall 

Copyright Microsoft Corp Resources Microsoft Anti Spyware - e/software/default.mspx e/software/default.mspx e/software/default.mspx Malicious Software removal tool - e/default.mspx e/default.mspx e/default.mspx Sysinternals –

Copyright Microsoft Corp © 2006 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.