12
Malware Report Q2 2012 Copyright © 2012 Kindsight, Inc.. All rights reserved.

Malware Report - Donutsdocshare01.docshare.tips/files/10060/100603047.pdf · 2016-12-19 · Kindsight Security Labs Malware Report – Q2 2012 2 Q2 2012 Home Malware Statistics Home

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Malware Report - Donutsdocshare01.docshare.tips/files/10060/100603047.pdf · 2016-12-19 · Kindsight Security Labs Malware Report – Q2 2012 2 Q2 2012 Home Malware Statistics Home

Malware ReportQ2 2012

Copyright © 2012 Kindsight, Inc.. All rights reserved.

Page 2: Malware Report - Donutsdocshare01.docshare.tips/files/10060/100603047.pdf · 2016-12-19 · Kindsight Security Labs Malware Report – Q2 2012 2 Q2 2012 Home Malware Statistics Home

Kindsight Security Labs Malware Report – Q2 2012 ii

Kindsight Security Labs Malware Report – Q2 2012

Contents

INTRODUCTION 1

Q2 2012 HIGHLIGHTS 1

Q2 2012 HOME MALWARE STATISTICS 2

Home Network Infection Rates 2

Infection Methods 2

Top 20 Home Network Infections 3

Top High Level Threats 3

Top 20 Internet Threats 4

NEW DEVELOPMENTS IN Q2 5

Mac “Flashback” at Number One for 4 Weeks 5

Zeroaccess Modifies C&C Protocol 5

Ad-click Fraud Burns Bandwidth 6

Flame is the Latest Espionage Bot 7

DNSChanger is Still Making News 7

Q2 2012 MOBILE MALWARE STATISTICS 8

Mobile Device Infection Rates 8

Top Android Malware 8

“Find and Call” Infects iPhones and Androids 8

CONCLUSION 9

ABOUT KINDSIGHT SECURITY LABS 10

Page 3: Malware Report - Donutsdocshare01.docshare.tips/files/10060/100603047.pdf · 2016-12-19 · Kindsight Security Labs Malware Report – Q2 2012 2 Q2 2012 Home Malware Statistics Home

Kindsight Security Labs Malware Report – Q2 2012 1

Introduction

The Kindsight Security Labs Q2 2012 Malware Report shows general trends for malware infections in home networks

or infections in mobile devices and computers connected through mobile adapters. The numbers in this report are

aggregated across the networks where Kindsight solutions are deployed.

Infection Rate = 14%7.7%

OVER PREVIOUSQUARTER

Q2 2012 Highlights

• 14% of home networks were infected with malware in Q2/2012, that’s up from 13% in the previous quarter.

• The Mac Flashback infection led the top 20 lists for four weeks in a row, infecting 10% of home networks with Mac computers during the month of April.

• The p2p ZeroAccess Botnet changed its C&C protocol and grew to over 1.2 million super nodes resulting in ad-click fraud that can consume the equivalent bandwidth of downloading as many as 45 full length movies per month per subscriber.

• 0.7% of all devices on mobile networks were infected. The infected devices include Android phones and laptops connected to the mobile network so this infection rate is significant since the total device count includes a large number of feature phones that are not targets for malware.

• In Q2 there was a three-fold increase in the number of Android malware samples.

300%OVER PREVIOUS

QUARTERAndroid

Malware Samples

Page 4: Malware Report - Donutsdocshare01.docshare.tips/files/10060/100603047.pdf · 2016-12-19 · Kindsight Security Labs Malware Report – Q2 2012 2 Q2 2012 Home Malware Statistics Home

Kindsight Security Labs Malware Report – Q2 2012 2

Q2 2012 Home Malware Statistics

Home Network Infection Rates

In fixed broadband deployments we found that in Q2/2012 an average of 14% of residential households show

evidence of malware infection. In Q1, 13% of residential households showed evidence of infection. 9% of

households were infected by high threat level malware such as a botnet, rootkit or a banking Trojan. 6% of

households were infected with a moderate threat level malware such as spyware, browser hijackers or adware. Some

households had multiple infections. The number of high level infections is a 50% increase from Q1/2012 when only

6% of households were infected with a high-level threat.

Infection Methods

The main infection method continues to be e-mail messages luring victims to web sites running a variety of exploit

kits. The victim would typically receive an e-mail message from a business or the government informing them of an

issue with their account. This would contain a reasonable looking link a web site. The web site would actually host

an exploit kit such as Blackhole. This would probe their system and attempt to infect it. Once infected the attacker

would generally install a rootkit botnet such as Alureon or ZeroAccess which is then used to coordinate additional

malware activity. In some cases they will directly download fake anti-virus software, a Spambot or a banking Trojan

like Zeus or SpyEye. Often the e-mail will simply contain a zip file containing an executable malware file.

MalwareHome Networks Infected with

14% 6%9%

Threat LevelDivision of Infections by

Moderate High

Infected

HIGH LEVEL THREATS

50%OVER PREVIOUS

QUARTER

Page 5: Malware Report - Donutsdocshare01.docshare.tips/files/10060/100603047.pdf · 2016-12-19 · Kindsight Security Labs Malware Report – Q2 2012 2 Q2 2012 Home Malware Statistics Home

Kindsight Security Labs Malware Report – Q2 2012 3

Position Name

1 MAC.Bot.Flashback.K/I

2 Win32.Botnet.ZeroAccess

3 Win32.Trojan.NineBall/Gumblar

4 Win32.Backdoor.TDSS

5 Win32.Downloader.Agent.TK

6 Win32.BankingTrojan.Zeus

7 Win32.Trojan.Alureon/TDL

8 DNS.Trojan.DNSchanger

9 Win32.HackTool.Binder

10 Win32.Downloader.Cred.B

11 Win32.Trojan.Agent.Gen

12 Win32.Virus.Sality.AT

13 Win32.Downloader.Ponmocup.A

14 Win32.Trojan.Medfos.A

15 Win32.Backdoor.InstallCore.D

16 Win32.Exploit.JS_Blacole

17 Win32.Backdoor.Cycbot.B

18 Win32.Trojan.Proxyier.qk

19 Generic.Spambot

20 Win32.BankingTrojan.SpyEye

Top High Level Threats

The table shows the top 20 high threat level malware that leads to identity theft, cybercrime or other online attacks.

We’ll look at the significant ones in more detail below under New Developments.

Position Name Threat Level

1 Hijacker.MyWebSearchToolbar Moderate

2 Spyware.SCN-ToolBar Moderate

3 Hijacker.StartPage.KS Moderate

4 Adware.GameVance Moderate

5 Mac.Bot.Flashback.K/I High

6 Adware.MarketScore Moderate

7 Trojan.NineBall/Gumblar High

8 Trojan.Backdoor.TDSS High

9 Botnet.ZeroAccess High

10 Downloader.Agent.TK High

11 Spyware.SBU-Hotbar Moderate

12 BankingTrojan.Zeus High

13 Trojan.Alureon/TDL High

14 Trojan.DNSChanger High

15 Hacktool.Binder High

16 Downloader.Cred.B High

17 Trojan.Agent.Gen High

18 Virus.Sality.AT High

19 Downloader.Ponmocup.A High

20 Trojan.Medfos.A High

Top 20 Home Network Infections

The chart below shows the top home network infections detected in Kindsight deployments. The results are

aggregated and the order is based on the number of infections detected over the 3-month period of this report.

Page 6: Malware Report - Donutsdocshare01.docshare.tips/files/10060/100603047.pdf · 2016-12-19 · Kindsight Security Labs Malware Report – Q2 2012 2 Q2 2012 Home Malware Statistics Home

Kindsight Security Labs Malware Report – Q2 2012 4

Top 20 Internet Threats

The chart below shows the top 20 most prolific malware found on the Internet. The sort order is based on the number

of distinct samples we have captured from the wild. Finding a large number of samples indicates that the malware

distribution is extensive and that the malware author is making a serious attempt to evade detection by anti-virus products.

Adware:Win32/Hotbar

Rogue:Win32/Winwebsec

Worm:Win32/Allaple.A

Virus:Win32/Sality.AT

Worm:Win32/Mydoom.O@mm

PWS:Win32/Lolyda.BF

Trojan:Win32/Rimecud.A

Worm:Win32/Rebhip.A

TrojanDownloader:Win32/Beebone.BQ

TrojanDownloader:Win32/Beebone.BR

VirTool:Win32/VBInject.UG

Trojan:Win32/Otran

Backdoor:Win32/Zegost.L

Worm:Win32/Vobfus.EG

Worm:Win32/Vobfus.gen!R

TrojanDropper:Win32/Sirefef.B

PWS:Win32/OnLineGames.IZ

Worm:Win32/Mydoom.L@mm

VirTool:Win32/VBInject.WX

Backdoor:Win32/Cycbot.G

PROLIFIC MALWARE

0.00

%

0.50

%

1.00

%

1.50

%

2.00

%

2.50

%

Adware:Win32/HotbarRogue:Win32/Winwebsec

Worm:Win32/Allaple.A Virus:Win32/Sality.AT

Worm:Win32/Mydoom.O@mm PWS:Win32/Lolyda.BF

Trojan:Win32/Rimecud.A Worm:Win32/Rebhip.A

TrojanDownloader:Win32/Beebone.BQ TrojanDownloader:Win32/Beebone.BR

VirTool:Win32/VBInject.UG Trojan:Win32/Otran

Backdoor:Win32/Zegost.L Worm:Win32/Vobfus.EG

Worm:Win32/Vobfus.gen!R TrojanDropper:Win32/Sirefef.B

PWS:Win32/OnLineGames.IZ Worm:Win32/Mydoom.L@mm

VirTool:Win32/VBInject.WX Backdoor:Win32/Cycbot.G

Page 7: Malware Report - Donutsdocshare01.docshare.tips/files/10060/100603047.pdf · 2016-12-19 · Kindsight Security Labs Malware Report – Q2 2012 2 Q2 2012 Home Malware Statistics Home

Kindsight Security Labs Malware Report – Q2 2012 5

New Developments in Q2 Mac “Flashback” at number one for 4 weeks

For the first time ever, malware targeting the Macintosh platform was in the number one position on the Kindsight

Security Labs home network infections list. Our detection statistics for the month of April show that 1.1% of homes

were infected with this malware. Based on a Mac market share this translates into about 10% of homes with Mac

computers being infected with this malware during the month of April. Security researchers at Symantec have

discovered that in addition to stealing passwords, Flashback is also being use for ad-click fraud.

The graph below shows the infections observed in network traffic throughout Q2. The percentage represents the

number of home networks that have Macs that were infected on that date.

Home NetworksInternet1 million+ peers 3321 infected users

Internet

The chart shows that the infection rate is on the decline, but still significant.

ZeroAccess Modifies C&C Protocol

We have been investigating the appearance of a new variation of the ZeroAccess/Sirefef bot. In February, we

published a detailed analysis of the network behavior of this bot and the encrypted p2p protocol that it uses to

communicate with its peers. The main purpose of this botnet is to distribute malware responsible for ad-click fraud,

which we explain in more detail below.

Over the last week of June on one network, we observed 3321 infected computers actively communicating with over

1.2 million Internet peers. This is almost a 2.5x increase in the number of infected computers and an over 50%

increase in the number of Internet peers when compared to the last week of Q1.

14 A

pril

6.00%

4.00%

2.00%

5.00%

3.00%

1.00%

0

21 A

pril

28 A

pril

5 M

ay

12 M

ay

19 M

ay

26 M

ay

2 Ju

ne

9 Ju

ne

16 Ju

ne

23 Ju

ne

30 Ju

ne

FLASHBACK INFECTIONSFLASHBACK INFECTIONS

Page 8: Malware Report - Donutsdocshare01.docshare.tips/files/10060/100603047.pdf · 2016-12-19 · Kindsight Security Labs Malware Report – Q2 2012 2 Q2 2012 Home Malware Statistics Home

Kindsight Security Labs Malware Report – Q2 2012 6

As can be seen in the bar chart below, the infected peers are widely distributed throughout the Internet with almost

18% in India and 10% in the United States.

The underlying structure and function of the bot remain the same, but the command and control (C&C) protocol

also changed in Q2 to a combination of TCP and UDP. The botnet continues to be very prolific with this new variety

infecting about 0.8% of the home networks observed by Kindsight. A detailed description of the new C&C protocol

can be found in “New C&C Protocol for ZeroAccess/Sirefef” Malware Analysis Report.

Ad-click Fraud Burns Bandwidth

The traffic generated by the ad-click fraud can burn through your bandwidth cap. We have been following a number

of bots such as ZeroAccess whose primary function is ad-click fraud. These bots receive instructions from a controller

directing them to click on ads on specific web sites. The web site owner gets paid by the advertiser on a per click

basis usually through the intermediary of an ad network. The advertisers and ad network operator have a number of

safeguards in place to protect against click fraud.

The bot tries to circumvent these by simulating normal human browsing behavior. This involves using a relatively low

click rate and responding to redirects, cookies and scripting as would a regular browser. Despite this low profile, the bot

operates 24 hour a day, seven days a week, so the bandwidth utilization for all that browsing adds up over time.

India

United States

Kazakhstan

Iran, Islamic Republic of

Brazil

Argentina

Italy

Chile

Venezuela

Algeria

Romania

Russian Federation

Japan

Ukraine

Morocco

Colombia

Spain

Turkey

Sweden

Indonesia

ZERO ACCESS SUPERNODES BY COUNTRY

12.0

0%

14.0

0%

16.0

0%

18.0

0%

2.00

%

4.00

%

6.00

%

8.00

%

10.0

0%

0.00

%

India United States

Kazakhstan Iran, Islamic Republic of

Brazil Argentina

Italy Chile

Venezuela Algeria

Romania Russian Federation

Japan Ukraine Morocco

Colombia Spain Turkey

SwedenIndonesia

Page 9: Malware Report - Donutsdocshare01.docshare.tips/files/10060/100603047.pdf · 2016-12-19 · Kindsight Security Labs Malware Report – Q2 2012 2 Q2 2012 Home Malware Statistics Home

Kindsight Security Labs Malware Report – Q2 2012 7

In one example we observed in the lab, a single bot consumed 0.1 Mbits/second when averaged out. For the infected

consumer, this adds up to 32GBytes per month which it is the equivalent of downloading 45 full length movies. For the

service provider, the impact on their network depends on the number of infected subscribers. The observed infection rate

for this bot was about 0.8% of the user population. This means that at any instant this bot alone is consuming 800 Mbits/

sec of bandwidth for every 1M users on the network.

Service Provider with 1M users

= 800 Mbits/sec

1 Infected Subscriber= 32GB of downloads

x45

Service Provider with 1M users

= 800 Mbits/sec

1 Infected Subscriber= 32GB of downloads

x45

Flame is the latest espionage bot

In May 2012 a new espionage bot was discovered by the Iranian National CERT. Detailed analysis was made

available from CrySyS Labs who refer to it as SkyWiper and Kaspersky who refer to it as Flame. Both drew parallels

with the previous Stuxnet and Duqu malware. Flame is a large complex bot written in the Lua scripting language and

can spread via USB sticks or via file-sharing on a LAN. Kaspersky estimated in May that about 1000 computers in

the Middle East were infected, mostly in Iran. This appears to be a highly targeted attack, focused on espionage and

we have not seen any evidence of this infection in any Kindsight deployments.

DNSChanger is still making news

The FBI took down the DNSChanger domain name servers in November 2011, but despite that it continues to make the

news. During Q2 2012, malware related to DNSChanger was consistently on our top 20 infection list. This is because

infected computers remain infected even after the takedown. These computers will effectively lose Internet access if they

are not fixed before the interim DNS service is decommissioned.

The FBI and major security vendors have been working with service providers to get the infections resolved before the

interim DNS servers were decommissioned on July 9th. These efforts have been partially successful and over the first

half of the year the number of computers using the rogue DNS servers has been significantly reduced. However about

10% of the infected computers remain unfixed. In some cases, service providers have continued to route the traffic for

infected computers so that the subscriber does not lose Internet connectivity and has more time to fix the problem. By

working together, the industry did a good job of minimizing the number of affected homes.

Page 10: Malware Report - Donutsdocshare01.docshare.tips/files/10060/100603047.pdf · 2016-12-19 · Kindsight Security Labs Malware Report – Q2 2012 2 Q2 2012 Home Malware Statistics Home

Kindsight Security Labs Malware Report – Q2 2012 8

Q2 2012 Mobile Malware Statistics

Mobile Device Infection Rates

In mobile networks we found that 0.7% of devices were infected. The infected devices include Android phones and

laptops tethered to a phone or connected directly through a mobile hub/USB stick. The infection rate is low because

the total device count includes a large number of feature phones that are not malware targets. We also saw a three-

fold growth in the number of Android malware samples.

Top Android Malware

The table below shows the top Android malware detected in the networks where the Kindsight Mobile Security

solution is deployed. The following table shows the top 10 Android infections of Q2.

For the most part these are all “trojanized” apps that steal information about the phone or send SMS messages, but the

list also includes a banking Trojan that intercepts access tokens for banking web sites and two spyware applications that

are used to spy on family members or associates. The top 2 infections are the same as in the Q1 report and are covered

in more detail there.

Throughout Q2 Kindsight Security Labs continued to collect Android malware. Our sample library grew three-fold in

that period.

“Find and Call” infects iPhones and Androids

After years with a solid security record, Apple was being hit a couple of times in Q2 2012. First Flashback infected the

Mac and now it appears that an iPhone app called “Find and Call” uploads the users contact list to a remote server. The

server then sends e-mail and text-message spam to the victim’s contacts. The messages are in Russian and encourage

the recipient to download the app. The app has been removed from the Apple Store. There is also an Android version of

the app.

Position Name

1 Trojan.GGTracker

2 Trojan.Pjapps3.A

3 Spyware.MobileSpy

4 Trojan.DroidDream

5 Adware.SndApp.B

6 BankingTrojan.FakeToken

7 Trojan.Dogowar

8 Spyware.FlexiSpy

9 Trojan.Geimini.A

10 Trojan.DroidKungFu

300%OVER PREVIOUS

QUARTERAndroid

Malware Samples

Page 11: Malware Report - Donutsdocshare01.docshare.tips/files/10060/100603047.pdf · 2016-12-19 · Kindsight Security Labs Malware Report – Q2 2012 2 Q2 2012 Home Malware Statistics Home

Kindsight Security Labs Malware Report – Q2 2012 9

Conclusion

In this report, we saw an increase in the number of home networks infected as compared to Q1/2012. We also saw

a 0.7% infection rate for all devices on mobile networks but more concerning was the 3x increase in the number of

Android malware samples.

While it has not received the publicity of Flame, malware like the ZeroAccess botnet should be of more concern

to consumers as it continues to grow to over 1 million super nodes. It tries to remain unobserved, uses P2P

communications that changes to spread which makes it difficult to detect, and most importantly can generate enough

ad-click traffic where it impacts bandwidth caps and costs the consumer money.

This past quarter also confirmed that Apple is not immune to malware. For the first time ever, malware targeting

the Macintosh platform, Flashback, was in the number one position on the Kindsight Security Labs home network

infections list. And, an iPhone app called “Find and Call” uploads the users contact list to a remote server and then

sends e-mail and text-message spam to the victim’s contacts.

So while the increases in malware in this report are a concern, it is the types of malware that is driving this growth that

is the thing to watch as we move into Q3.

Page 12: Malware Report - Donutsdocshare01.docshare.tips/files/10060/100603047.pdf · 2016-12-19 · Kindsight Security Labs Malware Report – Q2 2012 2 Q2 2012 Home Malware Statistics Home

Kindsight, Inc755 Ravendale Drive, Mountain View, CA 94043 U.S.A 555 Legget Drive, Tower B, Suite 132, Ottawa, ON K2K 2X3 Canada

T: [email protected]

Copyright © 2012 Kindsight, Inc. Kindsight is a registerd trademark of Kindsight, Inc. All rights reserved.

About Kindsight Security Labs

Kindsight Security Labs focuses on the behavior of malware

communications to develop network signatures that detect current

threats with low false positives. This approach enables the detection

of malware in the service provider network and the signatures

developed form the foundation of Kindsight Security Analytics and

Kindsight Security Services.

To accurately detect that a user is infected, our signature set looks for network behavior that provides unequivocal

evidence of infection coming from the user’s computer. This includes:

• Malware command and control (C&C) communications

• Backdoor connections

• Attempts to infect others (e.g. exploits)

• Excessive e-mail

• Denial of Service (DoS) and hacking activity

There are four main activities that support our signature development and verification process.

1. Monitor information sources from major security vendors and maintain a database of currently active threats.

2. Collect malware samples (>10,000/day), classify and correlate them against the threat database.

3. Execute samples matching the top threats in a sandbox environment and compare against our current

signature set.

4. Conduct a detailed analysis of the malware’s behavior and build new signatures if a sample fails to trigger

a signature

As an active member of the security community, Kindsight Security Labs also shares this research by publishing a list

of actual threats detected and the top emerging threats on the Internet and this report.