20
Paul Royal Paul Royal College of Computing College of Computing Georgia Institute of Georgia Institute of Technology Technology

Malware and the Modern Threat Landscape

Embed Size (px)

DESCRIPTION

Malware and the Modern Threat Landscape. Paul Royal College of Computing Georgia Institute of Technology. Agenda. Overview Platform, Installation, Activities Propagation Studies Evolution Traditional Defense-in-Depth Obfuscation, Server-side Polymorphism Analysis Takedown. - PowerPoint PPT Presentation

Citation preview

Page 1: Malware and the Modern Threat Landscape

Paul RoyalPaul RoyalCollege of ComputingCollege of ComputingGeorgia Institute of TechnologyGeorgia Institute of Technology

Page 2: Malware and the Modern Threat Landscape

• Overview- Platform, Installation, Activities

- Propagation Studies

• Evolution- Traditional Defense-in-Depth

- Obfuscation, Server-side Polymorphism

• Analysis

• Takedown

AgendaAgenda

Page 3: Malware and the Modern Threat Landscape

• Platform- Predominantly Microsoft Windows- Emergent threats beginning to target Mac OS X

and mobile devices • Propagation

- Social engineering• Standard (emails with ecards), innovative (torrents

offering key generators slipstreamed with malware), or novel (Kraken’s use of MSN Messenger)

- Rapid, short-term exploitation of critical vulnerabilities

• Conficker/Downadup’s use of MS08-067 allowed it to grow to 500,000 hosts in a single week

Malware OverviewMalware Overview

Page 4: Malware and the Modern Threat Landscape

• Installation- Thread injection into a benign/trusted process

• Can be part of the unpacking process (code is deobfuscated into a newly allocated section)

• Internet Explorer is a common target for malware that need to get out using an (authenticated) web proxy

• Activities- Information theft, spam, DDoS

- RogueAV software sales• Affiliate programs offer commissions as high as 90%

• Using botnets as installation medium can earn individuals $100,000/week

Overview Cont’dOverview Cont’d

Page 5: Malware and the Modern Threat Landscape

• Malicious software is the centerpiece of current threats on the Internet- Botnets (spamming, DDOS, etc.)

- Information Theft

- Surveillance and Espionage

• Used by Criminals- Criminal Infrastructure

- Domain of Organized Crime

• Used by Nations- Cyber Warfare

Functional DefinitionFunctional Definition

Page 6: Malware and the Modern Threat Landscape

• Visiting “Safe” Websites- Reading USAToday.com results in malware on your computer

• What happened?- USAToday.com ad network compromised- Visitors served malicious javascript bundled with ad for Roxio Creator 2009- Automatically directed users to Rogue AV website through malicious traffic

distribution system• Neither clicking nor hovering over ad required to activate code

Propagation StrategiesPropagation Strategies

Page 7: Malware and the Modern Threat Landscape

• Case Study: Alexa Top-ranked Domains- System created to examine Alexa top 25,000 domains

each day

- Browser inside virtual machine (VM) forced to visit domain

- Network actions following visit used to determine whether drive-by download occurred

• February 2012- 58 of Alexa top 25,000 domains resulted in drive-by

downloads

- 10.5M users served malicious content

- 1.6M likely compromised

Propagation StrategiesPropagation Strategies

Page 8: Malware and the Modern Threat Landscape

• “Feature-minded” Software Vendors- Executive receives email with PDF attachment

• Email’s subject, recipient’s ethnicity compels him to view attachment - PDF contains embedded, malicious Flash movie which exploits Acrobat Reader’s flash

interpreter, compromises the system and phones home to controller

- Soon after, compromised, legitimate websites found hosting drive-by attacks that use the same flaw to exploit Flash Player

- Vulnerability traced back to bug reported to Adobe eight months prior

Propagation Strategies Cont’dPropagation Strategies Cont’d

Page 9: Malware and the Modern Threat Landscape

• “Uninformed” Users- Waledac’s email campaigns

• Use of geo-location, temporally relevant events (e.g., bomb blast in <your city>, July 4th fireworks videos) to make attacks more compelling

Propagation Strategies Cont’dPropagation Strategies Cont’d

Page 10: Malware and the Modern Threat Landscape

• Network-Level Protection- Firewall

• Evaded by C&C protocol congruency

- IPS/IDS• Evaded by custom encodings

• Host-Level Protection- User Access Control

• Analogous to “informed consent”

- AntiVirus• Uses complex, heuristics-based detection along with

signature matching

Traditional Defense-in-DepthTraditional Defense-in-Depth

Page 11: Malware and the Modern Threat Landscape

• Often referred to as “packing”- A technique whereby parts or all of an executable file are

compressed, encrypted, or transformed in some fashion

- Code that reverses the pre-runtime transformation is included in the executable

Malware ObfuscationMalware Obfuscation

Push EBPMOV EBP, ESPSUB ESP, 8CALL 00401170…

Program A

Encrypt/Compress/Transform

ObfuscationTool

<Deobs Code>

Program A’

Machine CodeTransformed Machine Code

(Appears as Data)

Page 12: Malware and the Modern Threat Landscape

• Novel obfuscations easily evade AV• Example: Project ZeroPack

- Proof-of-Concept obfuscation tool• Makes malware appear benign to AV tools

- Developed for DefCon 16’s Race to Zero contest

Obfuscation Impact on AntiVirusObfuscation Impact on AntiVirus

ZeroPackZeroPack

Page 13: Malware and the Modern Threat Landscape

• Server-side Polymorphism- Attacks the heart of the traditional host-based

AV model by automating mutations

• When done professionally: Waledac

Scalable, Effective Malware DistributionScalable, Effective Malware Distribution

Collected on 12/30/2008

Collected on 2/25/2009

Page 14: Malware and the Modern Threat Landscape

• Stuxnet- Nation-state created malware- Multiple zero day arbitrary code execution exploits

• Private network, removable media propagation

- Multiple zero day privilege escalation exploits• Rootkit components with stolen code-signing certificates from Realtek

and Jmicron

• Botnet ‘T’ (now known as Shady RAT)- Used for data exfiltration- No packing obfuscations

• AV detections still < 50%

- Centralized C&C• Hosted on four-year-old legitimate, compromised realty website• Commands via HTTP comments

Malware ComplexityMalware Complexity

Page 15: Malware and the Modern Threat Landscape

• There is a pronounced need to understand malicious software behavior

• Malware analysis is the basis for understanding the intentions of malicious programs- Threat Discovery and Analysis

- Compromise Detection

- Forensics and Asset Remediation

• Malware authors incentivized to make analysis challenging- Direct financial motivation

Malware AnalysisMalware Analysis

Page 16: Malware and the Modern Threat Landscape

• Analysis tool/environment detection is a standard malware feature

Analyzer Detection PrevalenceAnalyzer Detection Prevalence

Page 17: Malware and the Modern Threat Landscape

• Case Study: Mariposa- Large, data-stealing botnet

- Used to steal credit card, banking information

• Compromises in half of Fortune 1000- Before takedown, over 1M members

Malware Network Takedowns Cont’dMalware Network Takedowns Cont’d

Page 18: Malware and the Modern Threat Landscape

• Takedown Timeline- Spring 2009: Mariposa discovery

- Fall 2009: International Mariposa Working Group (MWG) formed

• Defence Intelligence, GTISC, Panda Antivirus, FBI, Guardia Civil (Spanish LEO)

- December 2009: All C&C domains shutdown and sinkholed within hours of the first

• Operators panic; log into domain management services from home systems

• Warrants issued to operators’ ISP

- January 2010: Operators arrested• 800,000 financial credentials found on one operator’s home systems

Mariposa Cont’dMariposa Cont’d

Page 19: Malware and the Modern Threat Landscape

• Today’s malware author/operator is more motivated and resourceful than ever before

• The increasing complexity of systems and software prohibits compartmentalization to a single person or group

• Understanding modern malicious software can promote the creation of malware resistant systems

Closing ThoughtsClosing Thoughts

Page 20: Malware and the Modern Threat Landscape

Questions?