Spyware Steven Gribble Department of Computer Science and Engineering University of Washington.

Slides:



Advertisements
Similar presentations
Grass Valley Learning Center Surf the Net Safely Roger Thornburn.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
SPYWARE Presented by The State Security Office November 17, 2004.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
A Crawler-based Study of Spyware on the Web Author: Alexander Moshchuk, Tanya Bragin, Steven D.Gribble, Henry M.Levy Presented At: NDSS, 2006 Prepared.
Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.
Spyware! THE BAD, THE WORSE, AND THE Ugly … ARE ALL INDICATIONS THAT SPYWARE MAY BE TAKING OVER YOUR COMPUTER!
Automated Web Patrol with Strider Honey Monkeys Y.Wang, D.Beck, S.Chen, S.King, X.Jiang, R.Roussev, C.Verbowski Microsoft Research, Redmond Justin Miller.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
How to Protect Your PC Grayware Adware, Malware, Spyware.
 Meaning of spyware Spyware is a program that can be installed on computers, and which collects small pieces of information about users without their.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Chapter Nine Maintaining a Computer Part III: Malware.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Adware Spyware Anti-Virus Presented by: Forrest Fosheim Network Coordinator Southwest Telecommunications Coop.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Presentation by Kathleen Stoeckle All Your iFRAMEs Point to Us 17th USENIX Security Symposium (Security'08), San Jose, CA, 2008 Google Technical Report.
11 The Ghost In The Browser Analysis of Web-based Malware Reporter: 林佳宜 Advisor: Chun-Ying Huang /3/29.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
32-1 Internet Safety/Security Issues Trojan/Virus precautions When you run an executable program from an untrusted source you’re opening yourself.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Niels Provos and Panayiotis Mavrommatis Google Google Inc. Moheeb Abu Rajab and Fabian Monrose Johns Hopkins University 17 th USENIX Security Symposium.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Electronic Security. WELCOME -About us What we're going to talk to you about: Why Systems are Attacked Malware Firewall Security Computer System Safety.
A Crawler-based Study of Spyware in the Web Alex Moshchuk, Tanya Bragin, Steve Gribble, Hank Levy.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
COMP 2903 A27 – Why Spyware Poses Multiple Threats to Security Danny Silver JSOCS, Acadia University.
A Crawler-based Study of Spyware on the Web A.Moshchuk, T.Bragin, D.Gribble, M.Levy NDSS, 2006 * Presented by Justin Miller on 3/6/07.
1 Protect Against Spywares – SpywareBlaster. 2 Content Introduction – - What is Spyware? - Danger - Sign of Trouble Solution Cleaning -- Spybot Protection.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
A Crawler-based Study of Spyware on the Web Authors: Alexander Moshchuk, Tanya Bragin, Steven D.Gribble, and Henry M. Levy University of Washington 13.
Lecture 16 Page 1 CS 236 Online SQL Injection Attacks Many web servers have backing databases –Much of their information stored in a database Web pages.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Spybot-S&D Course: Fall 2004 Presented By: Ataul Bari Instructor: Dr. A. K. Aggarwal.
1 Malware/Spyware Group 26 Jay Kim and Jimmy Patel.
A CRAWLER BASED STUDY OF SPYWARE ON THE WEB Vijay Savanth The University of Auckland Computer Science Department A. Moshchuk, T.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
By: Gloria Watkins.  Use antivirus software and keep it up-to-date. You should check for new definition updates daily. Most antivirus software can.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
Computer Hope Copyright © Cannady ACOS. All rights reserved. (R1: July 2011)
Business Technology Applications What is Malware.
Understand Malware LESSON Security Fundamentals.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Powerpoint presentation on Drive-by download attack -By Yogita Goyal.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Botnets A collection of compromised machines
Managing Windows Security
Botnets A collection of compromised machines
Presentation transcript:

Spyware Steven Gribble Department of Computer Science and Engineering University of Washington

kingsofchaos.com A benign web site for an online game A benign web site for an online game — earns revenue from ad networks by showing banners — but, it relinquishes control of the ad content

kingsofchaos.com A benign web site for an online game A benign web site for an online game — earns revenue from ad networks by showing banners — but, it relinquishes control of the ad content banner ad from adworldnetwork.com (a legitimate ad network) inline javascript loads HTML from ad provider

Incident kingsofchaos.com was given this “ad content” kingsofchaos.com was given this “ad content” document.write(‘ \u003c\u0062\u006f\u0064\u0079\u0020\u006f\u006e\u0055\u006f\u0077 \u0050\u006f\u0070\u0075\u0070\u0028\u0029\u003b\u0073\u0068\u006 f\u0077\u0048\u0069 …etc. This “ad” ultimately: — — bombarded the user with pop-up ads — — hijacked the user’s homepage — — exploited an IE vulnerability to install spyware

What’s going on? The advertiser was an ex- -spammer His goal: — — force users to see ads from his servers — draw revenue from ad “affiliate programs”  Apparently earned several millions of dollars Why did he use spyware? Why did he use spyware? — control PC and show ads even when not on the Web

Take-away lessons Your PC has value to third parties Your PC has value to third parties — spyware tries to steal this value from you  adware: eyeballs and demographic information  spyware: sensitive data, PC resources Web content should never be trusted Web content should never be trusted — even if its direct provider is Consumer software and OSs are weak Consumer software and OSs are weak — browsers are bug-ridden — OSs do not protect users from malicious software  yet, this is increasingly the world we live in

Outline Background Background Measurement study Measurement study Discussion on spyware mitigation Discussion on spyware mitigation

Outline Background Background — definitions — trends — defenses Measurement study Measurement study Discussion on spyware mitigation Discussion on spyware mitigation

What is spyware? Incredibly difficult to define “spyware” precisely Incredibly difficult to define “spyware” precisely — no clean line between good and bad behavior Spyware is a software parasite that: Spyware is a software parasite that: — collects information of value and relays it to a third party — hijacks functions or resources of PC — installs surreptitiously, without consent of user — resists detection and de-installation Spyware provides value to others, but not to you Spyware provides value to others, but not to you

How one becomes infected Spyware piggybacked on executables Spyware piggybacked on executables — model for profiting from free software — e.g., Kazaa installed 2-7 adware programs Drive-by downloads Drive-by downloads — Web site attempts to install software through browser — may involve exploiting browser vulnerabilities Trojan downloaders / “tricklers” Trojan downloaders / “tricklers” — spyware that fetches additional spyware — snowball effect

Types of spyware Class# signatures Class# signatures Cookies and web bugs47 Cookies and web bugs47 Browser hijackers272 Browser hijackers272 Adware210 Adware210 Keyloggers75 Keyloggers75 Dialers201 Dialers201 Backdoors / trojans / tricklers279 From the “Spybot S&D” database, Feb

Spyware trends Most Internet PCs have, or have had, it Most Internet PCs have, or have had, it — 80% of Internet-connected PCs are infected — [AOL/NCSA online safety study, Oct. 2004] Much of the Web has it Much of the Web has it — 1 in 8 executables on Web piggyback spyware — 0.1% of random Web pages try “drive-by” installs — [UW study, Oct. 2005] Convergence of threats Convergence of threats — worms, viruses, spyware, botnets are fusing — e.g., many spyware programs now install spam relays

Industrial responses Anti-spyware tools Anti-spyware tools — predominantly signature based — e.g., AdAware, Spybot S&D, Microsoft AntiSpyware Blacklisted URLs in firewalls, NIDS Blacklisted URLs in firewalls, NIDS — e.g., UW tipping point machine Sandboxes for isolating untrusted content Sandboxes for isolating untrusted content — e.g., GreenBorder

Legislative responses Federal “SPY ACT” Federal “SPY ACT” — Oct. 6: passed in House, received in Senate — lists prohibited software functions  e.g., “Modifying settings related to use of the computer or to the computer's access to or use of the Internet by altering (A) the Web page that appears when the owner or authorized user launches an Internet browser or similar program used to access and navigate the Internet, (B) …” — requires user consent to “information collection programs”  required functions for such programs, e.g., easy to disable — list of exclusions  law enforcement, ISPs, diagnostic and security software/services, good samaritan protection, manufacturers and retailers providing third party branded software — has big teeth  up to $3,000,000 penalty per violated provision

Outline Background Background Measurement study Measurement study — “A Crawler-based Study of Spyware in the Web”  Alex Moshchuk, Tanya Bragin, Steven D. Gribble, and Henry M. Levy. To appear, NDSS Discussion on spyware mitigation Discussion on spyware mitigation

Measurement study Understand the problem before defending against it Understand the problem before defending against it Many unanswered questions Many unanswered questions — What’s the spyware density on the web? — Where do people get spyware? — How many spyware variants are out there? — What kinds of threats does spyware pose? Answers give insight into what defenses may work Answers give insight into what defenses may work

Approach Large-scale measurement of spyware on the Web Large-scale measurement of spyware on the Web — crawl “interesting” portions of the web — download content — determine if content is malicious Two parts Two parts — Executable study  Find executables with known spyware — Drive-by download study  Find web pages that attempt drive-by download attacks

Analyzing Executables Web crawler collects a pool of executables Web crawler collects a pool of executables For each: For each: — clone a clean virtual machine  10-node VM cluster, 4 VMs per node — scripted install of executable — run analysis to see what changed  currently, we use an anti-spyware tool (Ad-Aware) Average analysis time – 90 sec. per executable Average analysis time – 90 sec. per executable

Analyzing Drive-by Downloads Evaluate the safety of browsing the web Evaluate the safety of browsing the web Automatic “virtual browsing” Automatic “virtual browsing” — render pages in a real browser inside clean VM  unpatched Internet Explorer on unpatched Windows XP — define triggers for suspicious browsing activity  process creation  files written outside browser temp. folders  suspicious registry modifications — run anti-spyware check only when trigger fires (c.f. Honeymonkey work, concurrent with ours) (c.f. Honeymonkey work, concurrent with ours)

Executable Study Results Crawled 32 million pages in 10,000 Web domains Crawled 32 million pages in 10,000 Web domains Downloaded 26,000 unique executables Downloaded 26,000 unique executables Found spyware in 13.5% of them Found spyware in 13.5% of them — most installed only one spyware program  6% installed three or more spyware variants — 142 unique spyware threats

Infection of Executables Visit a site and download a program Visit a site and download a program What’s the chance that you got spyware? What’s the chance that you got spyware?

Spyware popularity Spyware popularity is (surprise, surprise) Zipfian Spyware popularity is (surprise, surprise) Zipfian A small # of spyware variants are found frequently A small # of spyware variants are found frequently — top 28 variants account for 90% of infected execs. — WhenU, eZula, 180Solutions at top of list A small # of sites have large # of infected execs. A small # of sites have large # of infected execs.

Drive-by Download Results 5.5% of pages we examined carried drive-by downloads 5.5% of pages we examined carried drive-by downloads — 1.4% exploited browser vulnerabilities

Types of spyware Executables Drive-by Downloads Keylogger0.05%0% Dialer1.2%0.2% Trojan Downloader 12%50% Browser hijacker 62%84% Adware88%75% Five oft-discussed spyware functions Five oft-discussed spyware functions — What’s the chance a spyware program contains each function?

Summary There is plenty of spyware on the web There is plenty of spyware on the web — 1 in 8 programs is infected with spyware Spyware targets specific popular content Spyware targets specific popular content — 0.1% of random web pages try drive-by downloads — 5% of “celebrity” web pages try drive-by downloads Most spyware is just annoying (adware) Most spyware is just annoying (adware) — but a significant fraction poses a big risk Few spyware variants are encountered in practice Few spyware variants are encountered in practice

Outline Background Background Measurement study Measurement study Discussion on spyware mitigation Discussion on spyware mitigation — the “opinion” part of this talk

My view on the problem Spyware separable into two “classes” of problem Spyware separable into two “classes” of problem Shucksters out for a quick buck Shucksters out for a quick buck — taking advantage of current blurry legal status of spyware — tweak and distribute off-the-shelf adware  rarely engineer new code  goals: “throw it far and wide, make it stick” — responsible for most of what’s out there Determined criminals Determined criminals — phishers/pharmers looking for credit card numbers — keyloggers for personal/corporate espionage — may be willing to engineer boutique spyware software

How to stop the shucksters Legislation helps take away incentive Legislation helps take away incentive — makes it clear what is illegal — legit companies will clean up their act Anti-spyware tools deal well with remainder Anti-spyware tools deal well with remainder — you’re really paying for the top ~50 signatures — new threats emerge from time to time  need engineers to keep rules fresh  seems no different than antivirus signature problem

The criminals We’re not well prepared for this threat We’re not well prepared for this threat — regular users have poor model of safe vs. risky  and savvy users don’t have good tools for coping — OSs built as single trust domain; if compromised, lose  no firewall between Internet-facing code and your stuff Maybe we just need “street smart” mechanisms Maybe we just need “street smart” mechanisms — help users avoid sketchy parts of the Web  Blacklists? Reputation-based schemes? — help users keep valuables locked up  Lampson’s “red vs. green” VMs, GreenBorder

Advanced techniques Rejigger OS so harder for users to add new code Rejigger OS so harder for users to add new code + less likely to get unwanted code — makes it hard to add legitimate apps — doesn’t help with scripts / bytecode Semantic analysis (look for spyware-like behavior) Semantic analysis (look for spyware-like behavior) + fewer signatures needed, higher leverage in arms race — too many ways to do the same thing in today’s systems — prone to false positives

Questions?