2010.11.22 資安新聞簡報 報告者:劉旭哲、曾家雄. Spam down, but malware up 報告者:劉旭哲.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
Thank you to IT Training at Indiana University Computer Malware.
Alex Crowell, Rutgers University Computer Science and Mathematics Advisor: Prof. Danfeng Yao, Computer Science Department.
Managing the Security and Privacy Risks of Social Media Don Knox, CPP, CITRMS Global Security and Risk Analysis Manager Caterpillar (309)
Supplied on \web site. on January 10 th, 2008 Customer Security Management Reducing Internet fraud June 1 st, 2008 eSAC Walk Thru © Copyright Prevx Limited.
By Hiranmayi Pai Neeraj Jain
7 Effective Habits when using the Internet Philip O’Kane 1.
Investigating Malicious Software Steve Romig The Ohio State University April 2002.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Security for Internet Every Day Use Standard Security Practices and New Threats.
Social Media Networking Sites Charlotte Jenkins Designing the Social Web
Dan Boneh CS155 Computer Security Looking for undergrad research? Come see me!
 What is a botnet?  How are botnets created?  How are they controlled?  How are bots acquired?  What type of attacks are they responsible for? 
 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail.
Threats To A Computer Network
The Most Dangerous Places on The Web (according to PC World)
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Norman SecureSurf Protect your users when surfing the Internet.
Presentation by Kathleen Stoeckle All Your iFRAMEs Point to Us 17th USENIX Security Symposium (Security'08), San Jose, CA, 2008 Google Technical Report.
Security for Seniors SeniorNet Help Desk
Information Assurance and Security Malware By: Andrew Mitura.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Authors: Gianluca Stringhini Christopher Kruegel Giovanni Vigna University of California, Santa Barbara Presenter: Justin Rhodes.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Niels Provos and Panayiotis Mavrommatis Google Google Inc. Moheeb Abu Rajab and Fabian Monrose Johns Hopkins University 17 th USENIX Security Symposium.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Chapter 6 The World Wide Web. Web Pages Each page is an interactive multimedia publication It can include: text, graphics, music and videos Pages are.
Jonell Baltazar, A Trend Micro Research Paper (Retrieved May 2010).
COMP 2903 A27 – Why Spyware Poses Multiple Threats to Security Danny Silver JSOCS, Acadia University.
Click to edit Master title style Click to edit Master text styles Second level Third level Fourth level Fifth level June 10 th, 2009Event details (title,
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
Fostering worldwide interoperabilityGeneva, July 2009 How to counter web-based attacks on the Internet in Korea Heung Youl YOUM Chairman of Korea.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Web Attacks— Offense… The Whole Story Yuri & The Cheeseheads Mark Glubisz, Jason Kemble, Yuri Serdyuk, Kandyce Giordano.
資安新聞簡報 報告者:曾家雄、劉旭哲、莊承恩. NEW MALWARE MUROFET FOLLOWING CONFICKER'S LEAD October 15, 2010 Dennis Fisher.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Studying Spamming Botnets Using Botlab 台灣科技大學資工所 楊馨豪 2009/10/201 Machine Learning And Bioinformatics Laboratory.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Sid Stamm, Zulfikar Ramzan and Markus Jokobsson Erkang Xu.
What is Spam? d min.
The Koobface Botnet and the Rise of Social Malware Kurt Thomas David M. Nicol
A Social Approach to Security: Using Social Networks to Help Detect Malicious Web Content Michael Robertson, Yin Pan, and Bo Yuan Department of Networking,
0wning the koobface botnet. intro web 2.0 botnet spreads through social networks –facebook –myspace –twitter, etc.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
The hidden part of TDSS Sergey (k1k) Golovanov, Malware Expert Global Research and Analysis Team Kaspersky Lab.
Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.
BUILD SECURE PRODUCTS AND SERVICES
Social Media Attacks.
Hotspot Shield Protect Your Online Identity
ADVANCED PERSISTENT THREATS (APTs) - Simulation
Staying safe on the internet
Computer Security.
Wireless Spoofing Attacks on Mobile Devices

Presentation transcript:

資安新聞簡報 報告者:劉旭哲、曾家雄

Spam down, but malware up 報告者:劉旭哲

 Nov 17  McAfee Threats Report: Third Quarter 2010  Spam is declined, but malware is increasing.

 Spam is still high  It continued its overall decline from January, both globally and nationally.  But identity theft, phishing attacks, and malicious links remain as serious as ever.  eg: US

 Malware continues to be the biggest threat.  This year they have identified more than 14 million unique pieces of malware.  Over one million more malware than at the same time last year.  Increase has slowed, but the growth continues.

 A mix of many established standards.  Mainly in the form of password-stealing Trojans, AutoRun malware, and fake AV software.  For example : Zeus, Koobface

 Cybercriminals are becoming more smart  Attacks are becoming increasingly more severe  Focus on mobile devices and social-networking sites. Conclusion

 83.html?tag=mncol;title 83.html?tag=mncol;title  010_threats_report_en.pdf 010_threats_report_en.pdf reference

Delivery Status Notification

Koobface: Inside a Crimeware Network November 12, 2010 By NART VILLENEUVE

 From April to November 2010 the Information Warfare Monitor investigated the operations and monetization strategies of the Koobface botnet A New Botnet

 Koobface maintains a system that uses social networking platforms to send malicious links such as:  Bebo, Facebook, Friendster, Fubar,  Hi5, MySpace, Netlog, Tagged, Twitter......etc.  Koobface also leverages connections to other malware groups associated with Bredolab, Gumblar, Meredrop, and Piptea Koobface

 The Koobface operators also employ counter- measures against security efforts to counter their operations  The “banlist” of Internet protocol  Koobface operators carefully monitor whether any of their URLs have been flagged as malicious one by Facebook, or Google Koobface

 Koobface spreads by using credentials on compromised computers to login to the victim’s account  It sends messages that contain links to malware to friends that are linked to the account Propagation

 The malicious link is often concealed using the URL shortening service  It redirects victim to a malicious Web page that encourages the user to run the accompanying executable  These malicious pages purport to be YouTube pages that require a new codec or an Adobe Flash upgrade in order to view the video Propagation

 Koobface maintains an infrastructure that integrates command and control capabilities  Zombie proxies obscure the location of C&C Infrastructure

 Koobface’s main command and control server is hosted on (Coreix, GB)  It maintains a database that contains information on the infrastructure of the Koobface botnet  The compromised hosts that have been turned into relays  And used by the operators to proxy requests Command and Control

 Koobface maintains a number of fraudulent accounts with third party services  Koobface also appears to use compromised computers to host landing pages Command and Control

 The Koobface malware has a modular structure that allows the botnet operators to install additional components on compromised computers based on specific criteria  The compromised computer connects to one of Koobface’s relay Web servers, which act as proxies of C&C Command and Control

 The malware on the compromised host requests URLs that contain parameters  fbgen  ldgen  ppgen  CAPTCHA Command and Control

 This file determines the contents of the message and the Koobface URL to send to the Facebook friends associated with Facebook accounts found on the compromised computer fbgen

 This file determines what further binaries the compromised host will download from the command and control server  IP address in a range ldgen

 These URLs point to rogue security software affiliates on Google searches for keywords such as  Antivirus  best+spyware+remover  adware+spyware+removal  It triggers the search hijacker when the user clicks on any of the links returned by Google ppgen

 Koobface uses random samplings of real Facebook profile information stolen from compromised accounts to create fictitious accounts  The popup window suggests that the computer will shutdown if the CAPTCHA is not solved CAPTCHA

 The operators of the Koobface botnet have a system in place to monitor the operations of the botnet and to ensure that the system continues to maintain the infrastructure that is required to operate it Monitoring & Countermeasures

 Koobface carefully monitors its links through the Google Safe Browsing API and checks if any of their URLs have been flagged as malicious by bit.ly or Facebook Monitoring & Countermeasures

 Koobface keeps count of successful installations and traffic generated by the botnet Monitoring Installations

 When an Internet user visits a Koobface landing page and installs the malware, the malware connects through a relay server to C&C and sends the  Compromised user’s IP address  Geographic location  Unique identifier  Koobface user identifier  Malware identifier  This allows Koobface to keep track of malware installations Monitoring Installations

 koobface-and-partnerka/ koobface-and-partnerka/  koobface.pdf koobface.pdf Reference