The Ghost In The Browser Analysis of Web-based Malware Niels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang and Nagendra Modadugu Google, Inc. The.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

What is code injection? Code injection is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by.
Thank you to IT Training at Indiana University Computer Malware.
Alex Crowell, Rutgers University Computer Science and Mathematics Advisor: Prof. Danfeng Yao, Computer Science Department.
By Hiranmayi Pai Neeraj Jain
Mitigating Malware Collin Jackson CS142 – Winter 2009.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
AVG 8.5 Product Line Welcome to a safe world …. | Page 2 Contents  Components Overview  Product Line Overview  AVG 8.0 Boxes.
A Crawler-based Study of Spyware on the Web Author: Alexander Moshchuk, Tanya Bragin, Steven D.Gribble, Henry M.Levy Presented At: NDSS, 2006 Prepared.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Web Based Attacks SymantecDefense Fantastic Four Casey Ford Mike Lombardo Ragnar Olson Maninder Singh.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
LittleOrange Internet Security an Endpoint Security Appliance.
Maintaining and Updating Windows Server 2008
Presented by Mina Haratiannezhadi 1.  publishing, editing and modifying content  maintenance  central interface  manage workflows 2.
Trend Micro Deployment Kelvin Hwang IT Services University of Windsor.
Norman SecureSurf Protect your users when surfing the Internet.
Chapter Nine Maintaining a Computer Part III: Malware.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Basic Computer Security Sankardas Roy Department of Computing and Information Sciences Kansas State University.
Presentation by Kathleen Stoeckle All Your iFRAMEs Point to Us 17th USENIX Security Symposium (Security'08), San Jose, CA, 2008 Google Technical Report.
11 The Ghost In The Browser Analysis of Web-based Malware Reporter: 林佳宜 Advisor: Chun-Ying Huang /3/29.
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Niels Provos and Panayiotis Mavrommatis Google Google Inc. Moheeb Abu Rajab and Fabian Monrose Johns Hopkins University 17 th USENIX Security Symposium.
Protecting Yourself On-line Carol Taylor Skye Hagen Assistant Professor Asst Director Computer Science Office of Information EWU Technology, EWU 1QSI Conference.
Build a Free Website1 Build A Website For Free 2 ND Edition By Mark Bell.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Staying Safe Online Keep your Information Secure.
A Crawler-based Study of Spyware in the Web Alex Moshchuk, Tanya Bragin, Steve Gribble, Hank Levy.
All Your iFRAMEs Point to Us Niels provos,Panayiotis mavrommatis - Google Inc Moheeb Abu Rajab, Fabian Monrose - Johns Hopkins University Google Technical.
A Crawler-based Study of Spyware on the Web A.Moshchuk, T.Bragin, D.Gribble, M.Levy NDSS, 2006 * Presented by Justin Miller on 3/6/07.
A Crawler-based Study of Spyware on the Web Authors: Alexander Moshchuk, Tanya Bragin, Steven D.Gribble, and Henry M. Levy University of Washington 13.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Proof-Of-Concept: Signature Based Malware Detection for Websites and Domain Administrators - Anant Kochhar.
1 Internet Browsing Vulnerabilities and Security ECE4112 Final Lab Ye Yan Frank Park Scott Kim Neil Joshi.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Web Attacks— Offense… The Whole Story Yuri & The Cheeseheads Mark Glubisz, Jason Kemble, Yuri Serdyuk, Kandyce Giordano.
All Your iFRAMEs Point to Us Cheng Wei. Acknowledgement This presentation is extended and modified from The presentation by Bruno Virlet All Your iFRAMEs.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
Safe browsing - is an ad-blocker extension enough? AIMILIOS TSOUVELEKAKIS IT-DI-CSO IT LIGHTNING TALK – 12/
Malicious Software.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Niels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang and Nagendra Modadugu – Google First Workshop on Hot Topics in Understanding Botnets (HotBots.
Internet safety By Suman Nazir
Shasta Console Operations February 2010 Tony Caleb.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 Figure 9-3: Webserver and E-Commerce Security Browser Attacks  Take over a client via the browser Interesting information on the client Can use browser.
SpyProxy SpyProxy Execution-based Detection of MaliciousWeb Content Execution-based Detection of MaliciousWeb Content Hongjin, Lee.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
Maintaining and Updating Windows Server 2008 Lesson 8.
Powerpoint presentation on Drive-by download attack -By Yogita Goyal.
Heat-seeking Honeypots: Design and Experience John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy and Martin Abadi WWW 2011 Presented by Elias P.
Computer Security Keeping you and your computer safe in the digital world.
Botnets A collection of compromised machines
Managing Windows Security
Botnets A collection of compromised machines
Risk of the Internet At Home
Chap 10 Malicious Software.
HOW DO I KEEP MY COMPUTER SAFE?
Chap 10 Malicious Software.
Presentation transcript:

The Ghost In The Browser Analysis of Web-based Malware Niels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang and Nagendra Modadugu Google, Inc. The first conference on First Workshop on Hot Topics in Understanding Botnets (2007) Mike Hsiao, Experiments are done in March 2006.

Outline Introduction Detecting Dangerous Web Pages Content Control Exploitation Mechanisms Trends and Statistics Conclusion 2

Introduction Internet services are increasingly becoming an essential part of our everyday life. Contrary to the small set of applications running in the tightly managed and frequently updated commercial servers, a personal computer contains a large number of applications that are usually neither managed nor updated. – a single visit to a compromised web site is sufficient for an attacker to detect and exploit a browser vulnerability. 3

Introduction (cont’d) A successful exploit results in the automatic installation of a malware binary, also called drive-by download. – then gain remote control over the compromised computer system Unlike traditional botnets that use push-based infection to increase their population, web-based malware infection follows a pull-based model. – web proxies and NAT-devices pose no barrier to infection Google have started an effort to identify all web pages on the Internet that could potentially be malicious. – Google applies simple heuristics to the crawled pages repository to determine which pages attempt to exploit web browsers. 4

Introduction (cont’d) Our goal is to observe the malware behavior when visiting malicious URLs and discover if malware binaries are being downloaded as a result of visiting a URL. – Browsers in VM! (After analyzing) We identify four different aspects of content control responsible for enabling browser exploitation – advertising – thirdparty widgets – user contributed content – web server security 5

Detecting Dangerous Web Pages Definition of malicious – A web page is deemed malicious, if it causes the automatic installation of software without the user’s knowledge or consent. They’d like to identify the mechanisms used to introduce the software into the system via the browser. 6

Detecting Dangerous Web Pages Three phases – identification of candidate URLs – in-depth verification of URLs – aggregation of malicious URLs into site level ratings (score) 7 We record all HTTP fetches as well as state changes to the virtual machine such as a new processes being started, registry and file system changes.

The discovery rate of bad URLs 8 The VM gets about 300,000 suspicious URLs daily. About 10,000 to 30,000 are malicious.

4.1 Content Control: Webserver Security Compromise web server and change content directly – many vulnerabilities in web applications, apache itself, – stolen passwords – templating system 9 Powered by Invision Power Board (U) v1.3.1 Final © 2003 IPS, Inc.

4.2 User Contributed Content This is often in the form of blogs, profiles, comments, or reviews. If the inserted HTML contains an exploit, all visitors of the posts or profile pages are exposed to the attack. Example: XSS. 10

4.3 Advertising By definition means ceding control of content to another party – advertising companies that provide small pieces of Javascript to web masters for insertion on their web pages Web masters have to trust advertisers Sub-syndication allows delegation of advertising space – That is, the web master needs to trust the ads provided, not by the first advertiser Trust is not transitive! 11

12

4.4 Third-Party Widgets A third-party widget is an embedded link to an external JavaScript or iframe that a web master uses to provide additional functionality to users. Example – While examining our historical data, we detected a web page that started linking to a free statistics counter in June 2002 and was operating fine until sometime in 2006, when the nature of the counter changed and instead of cataloging the number of visitors, it started to exploit every user visiting pages linked to the counter. 13

5 Exploitation Mechanisms To install malware on a user’s computer, an adversary first needs to gain control over a user’s system. – Example: worm (but less successful -> NAT & FW) Scripting support, for example, via Javascript, Visual Basic or Flash, allows a web page to collect detailed information about the browser’s computing environment. 14

5.1 Exploiting Software To install malware automatically when a user visits a web page, an adversary can choose to exploit flaws in either the browser or automatically launched external programs and extensions. – i.e., drive-by-download Example (of Microsoft’s Data Access Components) – The exploit is delivered to a user’s browser via an iframe on a compromised web page. – The iframe contains Javascript to instantiate an ActiveX object that is not normally safe for scripting. – The Javascript makes an XMLHTTP request to retrieve an executable. – Adodb.stream is used to write the executable to disk. – A Shell.Application is used to launch the newly written executable. 15

5.1 Exploiting Software (cont’d) Instead of blindly trying to exploit them, we have found Javascript that systematically catalogs the computing environment. – checks if the user runs Internet Explorer or Firefox – determines the version of the JVM and which patches have been applied to the operating system 16

5.2 Tricking the User Example – A common example are sites that display thumbnails to adult videos. – Clicking on a thumbnail causes a page resembling the Windows Media Player plug-in to load. The page asks the user to download and run a special “codec”. – This “codec” is really a malware binary. By pretending that its execution grants access to pornographic material, the adversary tricks the user into accomplishing what would otherwise require an exploitable vulnerability. 17

Trends and Statistics 6.1 Exploit Code Obfuscation To make reverse engineering and detection by popular anti-virus and web analysis tools harder, … Example – MySpace ( 18

6.2 Malware Classification To classify the different types of malware, we use a majority voting scheme based on the characterization provided by popular anti-virus software. – Trojan: software that contains or installs a malicious program with a harmful impact on a user’s computer. – Adware: software that automatically displays advertising material to the user resulting in an unpleasant user experience. – Unknown/Obfuscated: A binary that has been obfuscated so that we could not determine its functionality. 19

20

21

6.4 Distribution of Binaries Across Domains To maximize the exposure of users to malware, adversaries try to get as many sites as possible linking to a malware distribution page. – single host -> bottleneck and a single point of failure. – In one case, at least 412 different top-level domains were used to host a file called open-for- instant-access-now.exe flagged as adware by some virus scanners. 22

6.5 Malware Evolution As many anti-virus engines rely on creating signatures from malware samples, adversaries can prevent detection by changing binaries more frequently than anti-virus engines are updated with new signatures. 23

Discussion increase of web-based exploitation over time installed malware allows for remote control observed botnet like structures: – pull-based: frequently checking for new commands – observed user agents such as: DDoSBotLoader – binary updates can be interpreted as command & control 24

Conclusion Web-based malware is a real problem – millions of potentially infected users Automatic detection of malicious web pages to secure web search results – Identified four areas of content control – Observed botnet-like structures 25