25
Ransomware phenomenon Extortion scheme Archetype of modern malware Conclusion Comparative analysis of various ransomware virii Alexandre Gazet Sogeti-ESEC R&D EICAR conference 2008 Comparative analysis of various ransomware virii 1/23

Comparative analysis of various ransomware virii€¦ · Cryptovirology : Extortion-based security threats and countermeasures “In this paper we present the idea of Cryptovirology,

  • Upload
    others

  • View
    10

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Comparative analysis of various ransomware virii€¦ · Cryptovirology : Extortion-based security threats and countermeasures “In this paper we present the idea of Cryptovirology,

Ransomware phenomenonExtortion scheme

Archetype of modern malwareConclusion

Comparative analysis of various ransomware virii

Alexandre Gazet

Sogeti-ESEC R&D

EICAR conference 2008

Comparative analysis of various ransomware virii 1/23

Page 2: Comparative analysis of various ransomware virii€¦ · Cryptovirology : Extortion-based security threats and countermeasures “In this paper we present the idea of Cryptovirology,

Ransomware phenomenonExtortion scheme

Archetype of modern malwareConclusion

1 Ransomware phenomenon

2 Extortion scheme

3 Archetype of modern malware

4 Conclusion

Comparative analysis of various ransomware virii 1/23

Page 3: Comparative analysis of various ransomware virii€¦ · Cryptovirology : Extortion-based security threats and countermeasures “In this paper we present the idea of Cryptovirology,

Ransomware phenomenonExtortion scheme

Archetype of modern malwareConclusion

A buzz wordThe bad guy is talking to youSomething new ?The study

Plan

1 Ransomware phenomenon

2 Extortion scheme

3 Archetype of modern malware

4 Conclusion

Comparative analysis of various ransomware virii 2/23

Page 4: Comparative analysis of various ransomware virii€¦ · Cryptovirology : Extortion-based security threats and countermeasures “In this paper we present the idea of Cryptovirology,

Ransomware phenomenonExtortion scheme

Archetype of modern malwareConclusion

A buzz wordThe bad guy is talking to youSomething new ?The study

Ransomware ?

The word appears in 2005 ;

Ransom malware ;

Points out a category of malware :

Try to blackmail their victims ;

Most of them encrypt files ;

Gpcode, Archiveus, MayArchive,

Cryzip.

Often make use of relatively finesocial engineering to spread.

Comparative analysis of various ransomware virii 3/23

Page 5: Comparative analysis of various ransomware virii€¦ · Cryptovirology : Extortion-based security threats and countermeasures “In this paper we present the idea of Cryptovirology,

Ransomware phenomenonExtortion scheme

Archetype of modern malwareConclusion

A buzz wordThe bad guy is talking to youSomething new ?The study

Knock knock jokes

Gpcode.ai - Glamorous team

Hello, your files are encrypted with RSA-4096 algorithm(http ://en.wikipedia.org/wiki/RSA). You will need at least few years todecrypt these files without our software. All your private information forlast 3 months were collected and sent to us.

Krotten.u (Translated from Russian.)

If you want to restore the normal operation of your computer withoutlosing information VJ ! And ekonomiv money, I have to [email protected] code refill Kyivstar 25 UAH. In reply within twelve hoursyou will receive your e-mail files to delete the program

Email is the only communication channel usedby ransomwares’ authors.

Comparative analysis of various ransomware virii 4/23

Page 6: Comparative analysis of various ransomware virii€¦ · Cryptovirology : Extortion-based security threats and countermeasures “In this paper we present the idea of Cryptovirology,

Ransomware phenomenonExtortion scheme

Archetype of modern malwareConclusion

A buzz wordThe bad guy is talking to youSomething new ?The study

Are you scared ?

BBC News, 31 May 2006“Helen Barrow feared shewould lose coursework forher degree.”

“[...]Criminals encryptsfiles with complex pass-words,”

“[...]she would have to buydrugs from online phar-macy to find out her pass-word.”

A kind of theatrical communication.

Comparative analysis of various ransomware virii 5/23

Page 7: Comparative analysis of various ransomware virii€¦ · Cryptovirology : Extortion-based security threats and countermeasures “In this paper we present the idea of Cryptovirology,

Ransomware phenomenonExtortion scheme

Archetype of modern malwareConclusion

A buzz wordThe bad guy is talking to youSomething new ?The study

Something new ?

Almost 20 years ago...

AIDS Trojan - 1989

20.000 infected floppy disk ;

Logic bomb : payload executed after 90 reboots ;

Encrypt filenames and extensions, not contents ;

Monoalphabetic substitution algorithm ;

Any advances in 20 years ?

Comparative analysis of various ransomware virii 6/23

Page 8: Comparative analysis of various ransomware virii€¦ · Cryptovirology : Extortion-based security threats and countermeasures “In this paper we present the idea of Cryptovirology,

Ransomware phenomenonExtortion scheme

Archetype of modern malwareConclusion

A buzz wordThe bad guy is talking to youSomething new ?The study

Something new ?

Adam Young, Moti Yung, 1996 inCryptovirology : Extortion-based security threats and countermeasures

“In this paper we present the idea of Cryptovirology, [. . . ]showing that it can also be used offensively. By offensive wemean that it can be used to mount extortion based attacks thatcause loss of access to information, loss of confidentiality, andinformation leakage”

A ransomware is nothing more than an offensive cryptovirus.

Comparative analysis of various ransomware virii 7/23

Page 9: Comparative analysis of various ransomware virii€¦ · Cryptovirology : Extortion-based security threats and countermeasures “In this paper we present the idea of Cryptovirology,

Ransomware phenomenonExtortion scheme

Archetype of modern malwareConclusion

A buzz wordThe bad guy is talking to youSomething new ?The study

The study

Technical review of this last ransomwares wave ;

Analysis of strategy ;

14 samples have been studied and reverse-engineered :

8 from Gpcode family ;

2 from FileCode family ;

4 from Krotten family.

Few hardened binaries :

Few samples compressed with UPX ;

One packed with AsProtect ;

One custom, but basic, packer.

Various languages of programmation, mainly high-level.

How do they try to extort money from their victims ?

Comparative analysis of various ransomware virii 8/23

Page 10: Comparative analysis of various ransomware virii€¦ · Cryptovirology : Extortion-based security threats and countermeasures “In this paper we present the idea of Cryptovirology,

Ransomware phenomenonExtortion scheme

Archetype of modern malwareConclusion

ArchitecturePrivate-key encryptionPublic-key encryptionConclusion

Plan

1 Ransomware phenomenon

2 Extortion scheme

3 Archetype of modern malware

4 Conclusion

Comparative analysis of various ransomware virii 9/23

Page 11: Comparative analysis of various ransomware virii€¦ · Cryptovirology : Extortion-based security threats and countermeasures “In this paper we present the idea of Cryptovirology,

Ransomware phenomenonExtortion scheme

Archetype of modern malwareConclusion

ArchitecturePrivate-key encryptionPublic-key encryptionConclusion

Behaviour overview

S e e k t a r g e t E x t o r t i o n :L o s s o f a c c e s st o i n f o r m a t i o n D i s p l a y r a n s o mm e s s a g e1 Target : most of time victim’s documents ;

2 Extortion : based on encryption with one exception ;

3 Ransom : txt files or MessageBox.

Comparative analysis of various ransomware virii 10/23

Page 12: Comparative analysis of various ransomware virii€¦ · Cryptovirology : Extortion-based security threats and countermeasures “In this paper we present the idea of Cryptovirology,

Ransomware phenomenonExtortion scheme

Archetype of modern malwareConclusion

ArchitecturePrivate-key encryptionPublic-key encryptionConclusion

Extortion scheme

A good mass extortion scheme ?

Malicious binary is compromised and should not contain any secret ;

Author should be the only one able to reverse infection ;

Freeing one victim should not help other victims to get rid ofinfection.

Use of cryptography could successfully fillall these requirements.

Comparative analysis of various ransomware virii 11/23

Page 13: Comparative analysis of various ransomware virii€¦ · Cryptovirology : Extortion-based security threats and countermeasures “In this paper we present the idea of Cryptovirology,

Ransomware phenomenonExtortion scheme

Archetype of modern malwareConclusion

ArchitecturePrivate-key encryptionPublic-key encryptionConclusion

Private-key encryption

ADD encryption

byte cipheredn = byte messagen + byte keyn

keystream : linear congruential pseudorandom generator :

kn+1 = a ∗ kn + b mod m

XOR encryption

Get two parts from a file : A and B, equal in size ;

XOR part A with part B.

Blowfish, external library : ECCrypt ;

RC4-like using session key . . . stored on victim’s hard drive.

Malware’s capture ruins extortion scheme.

Comparative analysis of various ransomware virii 12/23

Page 14: Comparative analysis of various ransomware virii€¦ · Cryptovirology : Extortion-based security threats and countermeasures “In this paper we present the idea of Cryptovirology,

Ransomware phenomenonExtortion scheme

Archetype of modern malwareConclusion

ArchitecturePrivate-key encryptionPublic-key encryptionConclusion

Public-key encryption

RSA algorithm encryptionUsed by Gpcode versions from ac to ag ;

Jan 2006 ⇒ Jun 2006 ;

Basic implementation.

All versions have been broken.

Comparative analysis of various ransomware virii 13/23

Page 15: Comparative analysis of various ransomware virii€¦ · Cryptovirology : Extortion-based security threats and countermeasures “In this paper we present the idea of Cryptovirology,

Ransomware phenomenonExtortion scheme

Archetype of modern malwareConclusion

ArchitecturePrivate-key encryptionPublic-key encryptionConclusion

Conclusion

Ransomware as mass extortion mean ?

Malware’s capture leads to break extortion scheme ⇒ design isdeficient.

Use of public key cryptography (RSA) : decryption key is the samefor all victims ⇒ design is deficient.

Hybrid crypto systems, with the concept of session key, seem to beunknown or ignored.

They are not technically designed for mass extortion.

Comparative analysis of various ransomware virii 14/23

Page 16: Comparative analysis of various ransomware virii€¦ · Cryptovirology : Extortion-based security threats and countermeasures “In this paper we present the idea of Cryptovirology,

Ransomware phenomenonExtortion scheme

Archetype of modern malwareConclusion

From amateurism...To profesionnal malware

Plan

1 Ransomware phenomenon

2 Extortion scheme

3 Archetype of modern malware

4 Conclusion

Comparative analysis of various ransomware virii 15/23

Page 17: Comparative analysis of various ransomware virii€¦ · Cryptovirology : Extortion-based security threats and countermeasures “In this paper we present the idea of Cryptovirology,

Ransomware phenomenonExtortion scheme

Archetype of modern malwareConclusion

From amateurism...To profesionnal malware

From amateurism...

Most ransomware have presented disappointing quality standards ;

Comparative analysis of various ransomware virii 16/23

Page 18: Comparative analysis of various ransomware virii€¦ · Cryptovirology : Extortion-based security threats and countermeasures “In this paper we present the idea of Cryptovirology,

Ransomware phenomenonExtortion scheme

Archetype of modern malwareConclusion

From amateurism...To profesionnal malware

From amateurism...

Most ransomware have presented disappointing quality standards ;

Extortion scheme is not reliable ;

Code and cryptography use are both basics.

But. . .

Virus.Win32.Gpcode.ai

Appeared on 17 Jul 2007 ;

Sometimes referenced as ntos.exe ;

Quite not the same quality ;

Much more advanced than classical ransomwares.

Comparative analysis of various ransomware virii 17/23

Page 19: Comparative analysis of various ransomware virii€¦ · Cryptovirology : Extortion-based security threats and countermeasures “In this paper we present the idea of Cryptovirology,

Ransomware phenomenonExtortion scheme

Archetype of modern malwareConclusion

From amateurism...To profesionnal malware

From amateurism...

Most ransomware have presented disappointing quality standards ;

Extortion scheme is not reliable ;

Code and cryptography use are both basics.

But. . .

Virus.Win32.Gpcode.ai

Appeared on 17 Jul 2007 ;

Sometimes referenced as ntos.exe ;

Quite not the same quality ;

Much more advanced than classical ransomwares.

Comparative analysis of various ransomware virii 17/23

Page 20: Comparative analysis of various ransomware virii€¦ · Cryptovirology : Extortion-based security threats and countermeasures “In this paper we present the idea of Cryptovirology,

Ransomware phenomenonExtortion scheme

Archetype of modern malwareConclusion

From amateurism...To profesionnal malware

To profesionnal malware

Code is quite clean, effective.

Multithreading & thread injection ;

Named pipe communication ;

Steal data from HTTP traffic, using API hooking ;

Ability to upload data to a remote server ;

Ability to download malicious files ;

Encrypt files (RC4-like) and ask for a ransom.

Thoughtful design.

Comparative analysis of various ransomware virii 18/23

Page 21: Comparative analysis of various ransomware virii€¦ · Cryptovirology : Extortion-based security threats and countermeasures “In this paper we present the idea of Cryptovirology,

Ransomware phenomenonExtortion scheme

Archetype of modern malwareConclusion

From amateurism...To profesionnal malware

Synch mechanism

Comparative analysis of various ransomware virii 19/23

Page 22: Comparative analysis of various ransomware virii€¦ · Cryptovirology : Extortion-based security threats and countermeasures “In this paper we present the idea of Cryptovirology,

Ransomware phenomenonExtortion scheme

Archetype of modern malwareConclusion

From amateurism...To profesionnal malware

Malware on the shelf

Lighting from an analysis from Viruslist1 :

Gpcode.ai makes use of some code on the shelf ;

Linked up with the Zunker botnet managed by Zupacha+ZeuS

bundle ;

Kit to build botnet available for 3000$ ;

Site is hosted by the famous company RBN (Russian BusinessNetwork).

Ransom business is now part of amore hierarchized criminal activity.

1www.viruslist.com/en/analysis?pubid=204791973Comparative analysis of various ransomware virii 20/23

Page 23: Comparative analysis of various ransomware virii€¦ · Cryptovirology : Extortion-based security threats and countermeasures “In this paper we present the idea of Cryptovirology,

Ransomware phenomenonExtortion scheme

Archetype of modern malwareConclusion

Plan

1 Ransomware phenomenon

2 Extortion scheme

3 Archetype of modern malware

4 Conclusion

Comparative analysis of various ransomware virii 21/23

Page 24: Comparative analysis of various ransomware virii€¦ · Cryptovirology : Extortion-based security threats and countermeasures “In this paper we present the idea of Cryptovirology,

Ransomware phenomenonExtortion scheme

Archetype of modern malwareConclusion

Conclusion

What we’ve learned about ransomware ?

They are basic cryptovirus ;

Turn out to be a perfect illustration of virus’ criminals shift ;

Whatever the mean, money is the Grail.

The phenomenon has to be monitored ;

Mass extortion is probably doomed to failure ;

Operate on a too large scale would draw to much light ;

To much sensational communication should be avoided.

Comparative analysis of various ransomware virii 22/23

Page 25: Comparative analysis of various ransomware virii€¦ · Cryptovirology : Extortion-based security threats and countermeasures “In this paper we present the idea of Cryptovirology,

Ransomware phenomenonExtortion scheme

Archetype of modern malwareConclusion

Conclusion

Thanks for your attention.

Your questions ?

Comparative analysis of various ransomware virii 23/23