Mr. Mark Welton.  The five game changing viruses  Security best practices that deal with the problems.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
By Hiranmayi Pai Neeraj Jain
How Stuxnet Spreads: A Study of Infection Paths in Best Practice Systems Joel Langill Chief Security Officer Eric Byres Chief Technology Officer Andrew.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
System Security Scanning and Discovery Chapter 14.
Exploits Dalia Solomon. Categories Trojan Horse Attacks Trojan Horse Attacks Smurf Attack Smurf Attack Port Scan Port Scan Buffer Overflow Buffer Overflow.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
 Population: N=100,000  Scan rate  = 4000/sec, Initially infected: I 0 =10  Monitored IP space 2 20, Monitoring interval:  = 1 second Infected hosts.
Chapter 7 HARDENING SERVERS.
CS Nathan Digangi.  Secret, undocumented routine embedded within a useful program  Execution of the program results in execution of secret code.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Computer Security Fundamentals by Chuck Easttom Chapter 5 Malware.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
How to Own the Internet in your spare time Ashish Gupta Network Security April 2004.
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
 Discovered in June/July 2010  Targeted Siemens software and equipment running Microsoft Windows  First malware for SCADA systems to spy and subvert.
Advanced Persistent Threats CS461/ECE422 Spring 2012.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Protecting Your Computer & Your Information
A sophisticated Malware Arpit Singh CPSC 420
Chapter 7: Using Windows Servers to Share Information.
Unit 2 - Hardware Computer Security.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
By: Sharad Sharma, Somya Verma, and Taranjit Pabla.
Jonathan Baulch  A worm that spreads via USB drives  Exploits a previously unknown vulnerability in Windows  Trojan backdoor that looks for a specific.
W HAT DOES EXPLOIT MEAN ? A ND THE S ASSER WORM Seminar on Software Engineering, Short Presentation Christian Gruber.
Lecture 14 Page 1 CS 236 Online Worms Programs that seek to move from system to system –Making use of various vulnerabilities Other performs other malicious.
Spyware, Viruses and Malware What the fuss is all about.
Honeypot and Intrusion Detection System
Active Worms CSE 4471: Information Security 1. Active Worm vs. Virus Active Worm –A program that propagates itself over a network, reproducing itself.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
1 Operating Systems Security. 2 Where Malware hides ? Autoexec.bat or autoexec.nt can start malware before windows start Config.sys, config.nt Autorun.inf.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
MyDoom By: Philippe Bissohong. Background ► MyDoom  Novarg, Mimail.R and Shimgapi ► Computer worm, unlike a virus it attacks a network.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
Malicious Software.
MyDoom ☉ Ian Axelrod ☉ Chris Mungol ☉ Antonio Silva ☉ Joshua Sole ☉ Somnath Banerjee Group 5 CS4235/8803.
Stuxnet.
Understand Malware LESSON Security Fundamentals.
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
Lecture 14 Page 1 CS 236 Online Worms Programs that seek to move from system to system –Making use of various vulnerabilities Other performs other malicious.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
NEXT GENERATION ATTACKS & EXPLOIT MITIGATIONS TECHNIQUES ID No: 1071 Name: Karthik GK ID: College: Sathyabama university.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
By Thomas Pantone Cosc 380.  A virus is a type of malware that self replicates after being executed and inserts itself into other programs, data files,
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Chapter 40 Internet Security.
Botnets A collection of compromised machines
Chapter 7: Using Windows Servers
Botnets A collection of compromised machines
Information Security Session October 24, 2005
A Distributed DoS in Action
Presentation transcript:

Mr. Mark Welton

 The five game changing viruses  Security best practices that deal with the problems

 Nimda  Bagel and Netsky  Storm  Slammer  Stuxnet

 “self replicating virus that does not alter files but resides in active memory and duplicates  itself and sometimes drains system resources”  Released on September 18, 2001  5 main forms of infection ◦ ◦ Open network shares ◦ Via browsing of compromised web sites ◦ Exploitation of various Microsoft IIS 4.0/5.0 directory traversal vulnerabilities ◦ Back doors left behind by the “Code Red II” and “sadmind/IIS” worms

 On IIS used two vulnerabilities ◦ Extended Unicode Directory Traversal Vulnerability ◦ Escaped Character Decoding Command Execution Vulnerability  Once infected the IIS server would then scan for other hosts with the same two vulnerabilities  It would also use TFTP to transfer files from one infected host to the new host ◦ Files included an admin.dll file and many copies of.eml and.nws files in multiple location of the server

 Would a message with a random subject and attach a file named readme.exe  Opening the attachment infected the machine  Could use the preview pane in older versions Microsoft Outlook and Outlook Express to execute the file without the user clicking on the attachment  Would then out an infected to all addresses in the user’s address book  It would sent the out every 10 days to the user’s address book

 It would look through an infected web server for.htm,.html, or.asp files  Nimda would add a java script to each of these files pointing to a readme.eml file on the server  An Automatic Execution of Embedded MIME Types Vulnerability in IE would execute the file

 Once a host machine was infected it scanned the local network to find shared folders  Once the network share was found the worm would look for.doc.eml or.exe files that could be written  It would attach a file called riched20.dll if the file did not exist in the directory  When the user ran one of the infected files it would download and execute the worm infecting the machine  It would also create a guest account with administrator privileges and create open shares on the infected system  It would then send the account and password for this account to the attackers

 Would replace mmc.exe on a server  Would infect all executable files on both local and network drives replicating the.eml and.nws files along with the riched20.dll  The worm would act as a remote thread to Explorer.exe  Would change the registry key to open network shares for all drives (C$->Z$)

 Filter attached files with extensions like.exe.com.dll  Educate users not to open attachments they did not expect  Harden and patch web servers  Patch and/or upgrade desktop software  Firewall unused ports  Use IPS to detect and stop unneeded communication

 First strain sighted on January 18, 2004  Second strain sighted February 17, 2004  Mass-mailing worm (would not @microsoft  Would open backdoors TCP ports 6777 and 8866  Second strain had its own SMTP engine to mass-mail itself  Created a botnet used to send spam

 In December 29, 2009 the botnet was responsible for 10.30% of the worldwide spam volume, surging to 14% on New Year’s Day  As of April 2010 botnet estimated sending roughly 5.7 billion spam messages a day

 Similar to Bagle worm  Written by an 18 year old from Germany  Insults authors of Bagle in code  One strain targeted Bagle and MyDoom infected machines infect the machine, remove Bagle and MyDoom and patch the vulnerability they used  “Botnet Wars”

 Filter attached files with extensions like.exe.com.dll.vbs  Educate users not to open attachments they did not expect  Harden and patch web servers  Patch and/or upgrade desktop software  Firewall unused ports  Use IPS to detect and stop unneeded communication

 First detected in January 2007  Worm spread through spam  would link to an infection-hosting web site  Used social engineering in s to get users to click on link  By September 2007 it was estimated that as many as 1 million compromised systems made up the Storm Botnet  Used known Microsoft vulnerability to infect the machine

 Back-end servers that control the spread of the botnet and Storm worm automatically re- encode their distributed infection software twice an hour, for new transmissions, making it difficult for anti-virus vendors to stop the virus and infection spread  Additionally, the location of the remote servers which control the botnet are hidden behind a constantly changing DNS technique called ‘fast flux’, making it difficult to find and stop virus hosting sites and mail serversDNSfast flux

 Command and Control of the botnet used peer-to-peer techniques make no central command and control point that can be shutdown  Botnet also encrypted traffic  Has more computing power then the top 500 supercomputers combined  It is estimated it is only using 10% to 20% of the total capacity of the botnet

 Launched a series of EXE file in stages creating the following services in the botnet ◦ Backdoor/downloader ◦ SMTP relay ◦ address stealer ◦ virus spreader ◦ DDoS attack tool ◦ updated copy of Storm worm dropper  Would use fast flux DNS to hide the bot in the network  Also kernel rootkit the machine and used modified eDonkey comminications

 Educate users not to open links they did not expect  Patch and/or upgrade desktop software  Firewall unused ports  Use IPS to detect and stop unneeded communication

 Started on January 25, 2003 at 05:30 UTC  Infected 75,000 machines in ten minutes  Used buffer overflow in SQL server and Microsoft Desktop Engine database products  Patch was release six months earlier  Was a single packet exploit  Infection was in memory only  Would scan for more hosts to infect

 Patch and/or upgrade desktop software  Patch servers  Firewall unused ports  Use IPS to detect and stop unneeded communication

◦ Stuxnet – industrial sabotage -> Iranian uranium enrichment program ◦ Ghostnet – stole diplomatic communications -> embassies, Dhali Llama ◦ Aurora – stole source code and other intellectual property -> Google ◦ Night Dragon – industrial and commercial intelligence -> large oil companies

 Targets Siemens S7/WinCC products, compromises S7 PLC's to sabotage physical process  Exploited Windows zero-day vulnerabilities  Spreads via: ◦ USB/Removable Media ◦ 3 Network Techniques ◦ S7 Project Files ◦ WinCC Database Connections  Drivers digitally signed with legitimate (stolen) RealTek and JMicron certificates  Installs cleanly on W2K through Win7/2008R2  Conventional OS rootkit, detects and avoids major anti-virus products  Advanced reverse-engineering protections

 discovered until June 2010  Infection came for a USB flash drive  Used 4 vulnerability 2 of which where day zero  Used 7 different infection methods  Existed at least a year before discovery

 Initial infection of worm thought to be from an offsite contractor transferring a file  Or it may have been a Siemens engineer  Or it may have been a flash drive handed out at a conference  …

 Self-replicates through removable drives exploiting a vulnerability allowing auto-execution ◦ Microsoft Windows Shortcut ‘LNK/PIF’ Files Automatic File Execution Vulnerability  Spreads in a LAN through a vulnerability in the Windows Print Spooler ◦ Microsoft Windows Print Spooler Service Remote Code Execution Vulnerability  Spreads through SMB by exploiting the Microsoft Windows Server Service RPC Handling Remote Code Execution Vulnerability  Copies and executes itself on remote computers through network shares  Copies and executes itself on remote computers running a WinCC database server  Copies itself into Step 7 projects in such a way that it automatically executes when the Step 7 project is loaded  Updates itself through a peer-to-peer mechanism within a LAN  Exploits a total of four unpatched Microsoft vulnerabilities, two of which are previously mentioned vulnerabilities for self-replication and the other two are escalation of privilege vulnerabilities that have yet to be disclosed  Contacts a command and control server that allows the hacker to download and execute code, including updated versions  Contains a Windows rootkit that hide its binaries  Attempts to bypass security products  Fingerprints a specific industrial control system and modifies code on the Siemens PLCs to potentially sabotage the system  Hides modified code on PLCs, essentially a rootkit for PLCs

Infected Removable Media: 1. Exploits vulnerability in Windows Shell handling of.lnk files (0-day) 2. Used older vulnerability in autorun.inf to propagate Local Area Network Communications: 3. Copies itself to accessible network shares, including administrative shares 4. Copies itself to printer servers (0-day) 5. Uses “Conficker” vulnerability in RPC Infected Siemens Project Files: 6. Installs in WinCC SQL Server database via known credentials 7. Copies into STEP7 Project files

 OI OI