malware and the modern threat landscape

20
Paul Royal Paul Royal College of Computing College of Computing Georgia Institute of Georgia Institute of Technology Technology

Upload: sopoline-knowles

Post on 30-Dec-2015

38 views

Category:

Documents


0 download

DESCRIPTION

Malware and the Modern Threat Landscape. Paul Royal College of Computing Georgia Institute of Technology. Agenda. Overview Platform, Installation, Activities Propagation Studies Evolution Traditional Defense-in-Depth Obfuscation, Server-side Polymorphism Analysis Takedown. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Malware and the Modern Threat Landscape

Paul RoyalPaul RoyalCollege of ComputingCollege of ComputingGeorgia Institute of TechnologyGeorgia Institute of Technology

Page 2: Malware and the Modern Threat Landscape

• Overview- Platform, Installation, Activities

- Propagation Studies

• Evolution- Traditional Defense-in-Depth

- Obfuscation, Server-side Polymorphism

• Analysis

• Takedown

AgendaAgenda

Page 3: Malware and the Modern Threat Landscape

• Platform- Predominantly Microsoft Windows- Emergent threats beginning to target Mac OS X

and mobile devices • Propagation

- Social engineering• Standard (emails with ecards), innovative (torrents

offering key generators slipstreamed with malware), or novel (Kraken’s use of MSN Messenger)

- Rapid, short-term exploitation of critical vulnerabilities

• Conficker/Downadup’s use of MS08-067 allowed it to grow to 500,000 hosts in a single week

Malware OverviewMalware Overview

Page 4: Malware and the Modern Threat Landscape

• Installation- Thread injection into a benign/trusted process

• Can be part of the unpacking process (code is deobfuscated into a newly allocated section)

• Internet Explorer is a common target for malware that need to get out using an (authenticated) web proxy

• Activities- Information theft, spam, DDoS

- RogueAV software sales• Affiliate programs offer commissions as high as 90%

• Using botnets as installation medium can earn individuals $100,000/week

Overview Cont’dOverview Cont’d

Page 5: Malware and the Modern Threat Landscape

• Malicious software is the centerpiece of current threats on the Internet- Botnets (spamming, DDOS, etc.)

- Information Theft

- Surveillance and Espionage

• Used by Criminals- Criminal Infrastructure

- Domain of Organized Crime

• Used by Nations- Cyber Warfare

Functional DefinitionFunctional Definition

Page 6: Malware and the Modern Threat Landscape

• Visiting “Safe” Websites- Reading USAToday.com results in malware on your computer

• What happened?- USAToday.com ad network compromised- Visitors served malicious javascript bundled with ad for Roxio Creator 2009- Automatically directed users to Rogue AV website through malicious traffic

distribution system• Neither clicking nor hovering over ad required to activate code

Propagation StrategiesPropagation Strategies

Page 7: Malware and the Modern Threat Landscape

• Case Study: Alexa Top-ranked Domains- System created to examine Alexa top 25,000 domains

each day

- Browser inside virtual machine (VM) forced to visit domain

- Network actions following visit used to determine whether drive-by download occurred

• February 2012- 58 of Alexa top 25,000 domains resulted in drive-by

downloads

- 10.5M users served malicious content

- 1.6M likely compromised

Propagation StrategiesPropagation Strategies

Page 8: Malware and the Modern Threat Landscape

• “Feature-minded” Software Vendors- Executive receives email with PDF attachment

• Email’s subject, recipient’s ethnicity compels him to view attachment - PDF contains embedded, malicious Flash movie which exploits Acrobat Reader’s flash

interpreter, compromises the system and phones home to controller

- Soon after, compromised, legitimate websites found hosting drive-by attacks that use the same flaw to exploit Flash Player

- Vulnerability traced back to bug reported to Adobe eight months prior

Propagation Strategies Cont’dPropagation Strategies Cont’d

Page 9: Malware and the Modern Threat Landscape

• “Uninformed” Users- Waledac’s email campaigns

• Use of geo-location, temporally relevant events (e.g., bomb blast in <your city>, July 4th fireworks videos) to make attacks more compelling

Propagation Strategies Cont’dPropagation Strategies Cont’d

Page 10: Malware and the Modern Threat Landscape

• Network-Level Protection- Firewall

• Evaded by C&C protocol congruency

- IPS/IDS• Evaded by custom encodings

• Host-Level Protection- User Access Control

• Analogous to “informed consent”

- AntiVirus• Uses complex, heuristics-based detection along with

signature matching

Traditional Defense-in-DepthTraditional Defense-in-Depth

Page 11: Malware and the Modern Threat Landscape

• Often referred to as “packing”- A technique whereby parts or all of an executable file are

compressed, encrypted, or transformed in some fashion

- Code that reverses the pre-runtime transformation is included in the executable

Malware ObfuscationMalware Obfuscation

Push EBPMOV EBP, ESPSUB ESP, 8CALL 00401170…

Program A

Encrypt/Compress/Transform

ObfuscationTool

<Deobs Code>

Program A’

Machine CodeTransformed Machine Code

(Appears as Data)

Page 12: Malware and the Modern Threat Landscape

• Novel obfuscations easily evade AV• Example: Project ZeroPack

- Proof-of-Concept obfuscation tool• Makes malware appear benign to AV tools

- Developed for DefCon 16’s Race to Zero contest

Obfuscation Impact on AntiVirusObfuscation Impact on AntiVirus

ZeroPackZeroPack

Page 13: Malware and the Modern Threat Landscape

• Server-side Polymorphism- Attacks the heart of the traditional host-based

AV model by automating mutations

• When done professionally: Waledac

Scalable, Effective Malware DistributionScalable, Effective Malware Distribution

Collected on 12/30/2008

Collected on 2/25/2009

Page 14: Malware and the Modern Threat Landscape

• Stuxnet- Nation-state created malware- Multiple zero day arbitrary code execution exploits

• Private network, removable media propagation

- Multiple zero day privilege escalation exploits• Rootkit components with stolen code-signing certificates from Realtek

and Jmicron

• Botnet ‘T’ (now known as Shady RAT)- Used for data exfiltration- No packing obfuscations

• AV detections still < 50%

- Centralized C&C• Hosted on four-year-old legitimate, compromised realty website• Commands via HTTP comments

Malware ComplexityMalware Complexity

Page 15: Malware and the Modern Threat Landscape

• There is a pronounced need to understand malicious software behavior

• Malware analysis is the basis for understanding the intentions of malicious programs- Threat Discovery and Analysis

- Compromise Detection

- Forensics and Asset Remediation

• Malware authors incentivized to make analysis challenging- Direct financial motivation

Malware AnalysisMalware Analysis

Page 16: Malware and the Modern Threat Landscape

• Analysis tool/environment detection is a standard malware feature

Analyzer Detection PrevalenceAnalyzer Detection Prevalence

Page 17: Malware and the Modern Threat Landscape

• Case Study: Mariposa- Large, data-stealing botnet

- Used to steal credit card, banking information

• Compromises in half of Fortune 1000- Before takedown, over 1M members

Malware Network Takedowns Cont’dMalware Network Takedowns Cont’d

Page 18: Malware and the Modern Threat Landscape

• Takedown Timeline- Spring 2009: Mariposa discovery

- Fall 2009: International Mariposa Working Group (MWG) formed

• Defence Intelligence, GTISC, Panda Antivirus, FBI, Guardia Civil (Spanish LEO)

- December 2009: All C&C domains shutdown and sinkholed within hours of the first

• Operators panic; log into domain management services from home systems

• Warrants issued to operators’ ISP

- January 2010: Operators arrested• 800,000 financial credentials found on one operator’s home systems

Mariposa Cont’dMariposa Cont’d

Page 19: Malware and the Modern Threat Landscape

• Today’s malware author/operator is more motivated and resourceful than ever before

• The increasing complexity of systems and software prohibits compartmentalization to a single person or group

• Understanding modern malicious software can promote the creation of malware resistant systems

Closing ThoughtsClosing Thoughts

Page 20: Malware and the Modern Threat Landscape

Questions?