Brief History Of

Total Page:16

File Type:pdf, Size:1020Kb

Brief History Of A BRIEF HISTORY OF MALWARE AWESOMENESS (ahem… Gaming) Today, the digital Once upon a time, the world isn’t so digital world was all fun harmless. Experts and games. Tiny men estimate that the wearing red jumped over barrels to global cost of cybercrime exceeds save princesses from inexplicably $445 billion annually. Yeah, with a B. huge and unattractive gorillas. Colorful And it’s more than a little annoying to centipedes hurtled through a mushroom discover your Steam account with 248 forest only to get part of their midsections indie games got jacked because your erased by a little ship that can only move antivirus wasn’t up to date. back and forth. These were innocent times. COME ON A TRIP WITH ME DOWN MEMORY LANE Today, the worlds of malware and gaming have become sadly intertwined as cyberthugs have realized that stealing games is not only fun, but it’s also lucrative. Trolls don’t just steal your accounts to sell your level 65 cleric on eBay anymore – now they want to add you to their botnet, trade your selfies on TOR, encrypt all your save files, and steal your Bitcoins. ARE YOU PROTECTED? Space Invaders released – parents 1978 everywhere begin crusade against video game violence Pac-Man goes on sale in July (Ms. 1980 Pac-Man has to wait until 1982—typical) The word “virus” is first used to Donkey Kong, Galaga, and Centipede describe a computer program 1981 1981 released (Dig Dug, Q*bert, in 1982) A Russian mathematician creates Malware was just silly until the 1984 Tetris, and Americans love it, despite Trojan “Gotcha” is created to kill 1985 themselves system files The first self-encrypting polymorphic Game Boy released – changes the lives viruses created 1989 1989 of young people everywhere. Suddenly riding in the car and inhaling dad’s smoke doesn’t suck so much anymore Wolfenstein 3D released – adolescents 1992 across the world are heard shouting “Achtung!” in distorted tones “Concept,” the first virus to spread through Microsoft Word, is created 1995 Sony Online Entertainment’s Everquest 1999 leads 100,000s of players to join Y2K scared everyone to death even guilds to level up and play online though it wasn’t a virus, but 2000 together ILOVEYOU was: it infected at least fifty million computers and caused at least $6 billion in damages Valve releases Steam to the general 2003 confusion of the entire world. Today, Botnets come to prominence and we look back and wish we had invested begin DDOSing servers for the lulz 2004 Psychonauts released – no one notices The first smartphone 2005 (but millions and millions noticed World viruses are released 2005 of Warcraft, released a few months through MMS messages – earlier) stupid people everywhere get pwned Malware gets belligerent: Dubbed the year of the sequel by me, the Stuxnet worm 2010 2010 many franchises got sequels. Don’t engages in cyber warfare believe me? Super Mario Galaxy 2, Mass Effect 2, StarCraft 2, Rock Band CryptoLocker makes some 3. Must I go on? killer dough, stealing an 2013 estimated $30 million in 100 days (how do I get that job?) TeslaCrypt, a new riff on Everyone is still trying to figure out encrypting ransomware, 2015 2015 how to deal with the new generation targets gamers’ save files of consoles being released. Meanwhile, and system files, stealing PC gamers are laughing as Lizard all the monies from your Squad and Anonymous completely wallet, and it doesn’t even wreck console gamers’ lives give your files back 100% MALWARE GROWTH is anticipated through2016 by mid 2014 there were 96 MILLION malware variants or... 14,650/HR 2013 82 MILLION malware variants 2010 18 MILLION malware variants 2007 6 MILLION malware variants GET PROTECTED FIGHT BACK 2005 < 1 MILLION malware variants PIXELS © 2015 CTMG. Other IP TM & © 2015 of applicable property owners. All Rights Reserved..
Recommended publications
  • Ransom Where?
    Ransom where? Holding data hostage with ransomware May 2019 Author With the evolution of digitization and increased interconnectivity, the cyberthreat landscape has transformed from merely a security and privacy concern to a danger much more insidious by nature — ransomware. Ransomware is a type of malware that is designed to encrypt, Imani Barnes Analyst 646.572.3930 destroy or shut down networks in exchange [email protected] for a paid ransom. Through the deployment of ransomware, cybercriminals are no longer just seeking to steal credit card information and other sensitive personally identifiable information (PII). Instead, they have upped their games to manipulate organizations into paying large sums of money in exchange for the safe release of their data and control of their systems. While there are some business sectors in which the presence of this cyberexposure is overt, cybercriminals are broadening their scopes of potential victims to include targets of opportunity1 across a multitude of industries. This paper will provide insight into how ransomware evolved as a cyberextortion instrument, identify notorious strains and explain how companies can protect themselves. 1 WIRED. “Meet LockerGoga, the Ransomware Crippling Industrial Firms” March 25, 2019; https://www.wired.com/story/lockergoga-ransomware-crippling-industrial-firms/. 2 Ransom where? | May 2019 A brief history of ransomware The first signs of ransomware appeared in 1989 in the healthcare industry. An attacker used infected floppy disks to encrypt computer files, claiming that the user was in “breach of a licensing agreement,”2 and demanded $189 for a decryption key. While the attempt to extort was unsuccessful, this attack became commonly known as PC Cyborg and set the archetype in motion for future attacks.
    [Show full text]
  • Crypto Ransomware Analysis and Detection Using
    CRYPTO RANSOMWARE ANALYSIS AND DETECTION USING PROCESS MONITOR by ASHWINI BALKRUSHNA KARDILE Presented to the Faculty of the Graduate School of The University of Texas at Arlington in Partial Fulfillment of the Requirements for the Degree of MASTER OF SCIENCE IN COMPUTER SCIENCE THE UNIVERSITY OF TEXAS AT ARLINGTON December 2017 Copyright © by Ashwini Balkrushna Kardile 2017 All Rights Reserved ii Acknowledgements I would like to thank Dr. Ming for his timely guidance and motivation. His insights for this research were valuable. I would also like to thank my committee members Dr. David Levine and Dr. David Kung for taking out time from their schedule and attending my dissertation. I am grateful to John Podolanko; it would not have been possible without his help and support. Thank you, John, for helping me and foster my confidence. I would like to thank my colleagues for supporting me directly or indirectly. Last but not the least; I would like to thank my parents, my family and my friends for encouraging me and supporting me throughout my research. November 16, 2017 iii Abstract CRYPTO RANSOMWARE ANALYSIS AND DETECTION USING PROCESS MONITOR Ashwini Balkrushna Kardile, MS The University of Texas at Arlington, 2017 Supervising Professor: Jiang Ming Ransomware is a faster growing threat that encrypts user’s files and locks the computer and holds the key required to decrypt the files for ransom. Over the past few years, the impact of ransomware has increased exponentially. There have been several reported high profile ransomware attacks, such as CryptoLocker, CryptoWall, WannaCry, Petya and Bad Rabbit which have collectively cost individuals and companies well over a billion dollars according to FBI.
    [Show full text]
  • Attacking from Inside
    WIPER MALWARE: ATTACKING FROM INSIDE Why some attackers are choosing to get in, delete files, and get out, rather than try to reap financial benefit from their malware. AUTHORED BY VITOR VENTURA WITH CONTRIBUTIONS FROM MARTIN LEE EXECUTIVE SUMMARY from system impact. Some wipers will destroy systems, but not necessarily the data. On the In a digital era when everything and everyone other hand, there are wipers that will destroy is connected, malicious actors have the perfect data, but will not affect the systems. One cannot space to perform their activities. During the past determine which kind has the biggest impact, few years, organizations have suffered several because those impacts are specific to each kinds of attacks that arrived in many shapes organization and the specific context in which and forms. But none have been more impactful the attack occurs. However, an attacker with the than wiper attacks. Attackers who deploy wiper capability to perform one could perform the other. malware have a singular purpose of destroying or disrupting systems and/or data. The defense against these attacks often falls back to the basics. By having certain Unlike malware that holds data for ransom protections in place — a tested cyber security (ransomware), when a malicious actor decides incident response plan, a risk-based patch to use a wiper in their activities, there is no management program, a tested and cyber direct financial motivation. For businesses, this security-aware business continuity plan, often is the worst kind of attack, since there is and network and user segmentation on top no expectation of data recovery.
    [Show full text]
  • FSRM : Protéger Son Serveur De Fichiers Des Ransomwares Jeudi 20 Avril 2017 16:33
    FSRM : Protéger son serveur de fichiers des ransomwares jeudi 20 avril 2017 16:33 • I. Présentation • II. Installation du gestionnaire de ressources du serveur de fichiers • III. Configurer le SMTP pour recevoir les notifications • IV. Création d’un groupe d’extensions de fichiers • V. Créer un modèle de filtre de fichiers • VI. Créer un filtre de fichiers • VII. Test de la configuration • VIII. Pour aller plus loin I. Présentation Les données qu’elles soient personnelles ou professionnelles ont une valeur certaine, et ça il y a des personnes malintentionnées qu’ils l’ont bien compris et qui veulent en tirer profit avec des malwares, ou plus particulièrement avec les ransomwares qui sont la grande tendance depuis quelque temps. Pour rappel, un ransomware, en français rançongiciel, est un logiciel qui va chiffrer vos données et vous demander de l’argent pour pouvoir récupérer les données, sous peine de les perdre. Pour se protéger face à cette menace, que l’on peut représenter par Cryptolocker ou plus récemment Locky, il y a différentes couches de sécurité à mettre en place. Tout d’abord, ça passe par une protection au niveau des e-mails avec un filtre anti-spam, du filtrage web pour éviter que les utilisateurs aillent sur des sites où ils n’ont rien à faire, ou encore protéger votre serveur de fichiers, c’est d’ailleurs ce dernier point qui nous intéresse. Dans le cadre de ce tutoriel, il sera question de protéger un serveur de fichiers sous Windows Server 2012 R2 ou sur Windows Server 2008 R2, pour cela on s’appuie sur le File Server Resource Manager (FSRM) , en français « Gestionnaire de ressources du serveur de fichiers ».
    [Show full text]
  • Analysis of the Teslacrypt Family and How to Protect Against Future
    Sophia Wang COMP 116 Final Project Analysis of the TeslaCrypt Family and How to Protect Against Future Ransomware/Cyber Attacks Abstract Ransomware accounts for a large majority of the malicious attacks in the cyber security world, with a company hit with a ransomware attack once every 40 seconds. There was a 300% increase in ransomware attacks from 2015 to 2016 — and it’s only going up from there. One family of Trojan-style ransomware technology that introduced itself in early 2015 is TeslaCrypt. TeslaCrypt affected Windows users from the US, Germany, Spain, Italy, France, and the United Kingdom, targeting mostly gamers. This form of ransomware would encrypt the victim’s files using a highly complicated encryption key and demand $250 to $1,000 for ransom. The creators of TeslaCrypt eventually released the master decryption key in May of 2016, so in the end the victims were able to recover their files and systems. This paper will explore the process by which the TeslaCrypt ransomware infected a system, the steps that were taken to ameliorate this issue, and what steps should be taken to avoid an incident like this in the future. Introduction Ransomware is a special form of malware that can infect a system through either encrypting and denying users access to their files, or restricting access and locking users out of their systems. Once the ransomware has the target’s files and/or system on lock, it demands a ransom be paid, usually through some form of cryptocurrency. In February of 2015, a new family of file-encrypting Trojan-style ransomware technology was introduced — TeslaCrypt.
    [Show full text]
  • A Systematic Empirical Analysis of Unwanted Software Abuse, Prevalence, Distribution, and Economics
    UNIVERSIDAD POLITECNICA´ DE MADRID ESCUELA TECNICA´ SUPERIOR DE INGENIEROS INFORMATICOS´ A Systematic Empirical Analysis of Unwanted Software Abuse, Prevalence, Distribution, and Economics PH.D THESIS Platon Pantelis Kotzias Copyright c 2019 by Platon Pantelis Kotzias iv DEPARTAMENTAMENTO DE LENGUAJES Y SISTEMAS INFORMATICOS´ E INGENIERIA DE SOFTWARE ESCUELA TECNICA´ SUPERIOR DE INGENIEROS INFORMATICOS´ A Systematic Empirical Analysis of Unwanted Software Abuse, Prevalence, Distribution, and Economics SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF: Doctor of Philosophy in Software, Systems and Computing Author: Platon Pantelis Kotzias Advisor: Dr. Juan Caballero April 2019 Chair/Presidente: Marc Dasier, Professor and Department Head, EURECOM, France Secretary/Secretario: Dario Fiore, Assistant Research Professor, IMDEA Software Institute, Spain Member/Vocal: Narseo Vallina-Rodriguez, Assistant Research Professor, IMDEA Networks Institute, Spain Member/Vocal: Juan Tapiador, Associate Professor, Universidad Carlos III, Spain Member/Vocal: Igor Santos, Associate Research Professor, Universidad de Deusto, Spain Abstract of the Dissertation Potentially unwanted programs (PUP) are a category of undesirable software that, while not outright malicious, can pose significant risks to users’ security and privacy. There exist indications that PUP prominence has quickly increased over the last years, but the prevalence of PUP on both consumer and enterprise hosts remains unknown. Moreover, many important aspects of PUP such as distribution vectors, code signing abuse, and economics also remain unknown. In this thesis, we empirically and sys- tematically analyze in both breadth and depth PUP abuse, prevalence, distribution, and economics. We make the following four contributions. First, we perform a systematic study on the abuse of Windows Authenticode code signing by PUP and malware.
    [Show full text]
  • Ransomware Behavior Attack Construction Via Graph Theory Approach
    (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 11, No. 2, 2020 Ransomware Behavior Attack Construction via Graph Theory Approach Muhammad Safwan Rosli1, Raihana Syahirah Abdullah2* Warusia Yassin3, Faizal M.A4, Wan Nur Fatihah Wan Mohd Zaki5 Centre of Advanced Computing Technology, Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka, Hang Tuah Jaya, 76100 Durian Tunggal, Melaka, Malaysia1, 2, 3, 4, 5 Abstract—Ransomware has becoming a current trend of amount of resources such as RAM, machine storage which are cyberattack where its reputation among malware that cause a time consuming [3]. So, to mitigate the concern issues, massive amount recovery in terms of cost and time for researchers need to come with different approaches and ransomware victims. Previous studies and solutions have showed solutions to defend against current and future threats and also that when it comes to malware detection, malware behavior need to understand the behavior of the malware attacks and their to be prioritized and analyzed in order to recognize malware interactions with victim‟s machine [4]. attack pattern. Although the current state-of-art solutions and frameworks used dynamic analysis approach such as machine The main problem remain persists yet and it still needs to learning that provide more impact rather than static approach, keep on update where the researchers need to understand the but there is not any approachable way in representing the malware behavior whether it is in network traffic or file analysis especially a detection that relies on malware behavior. activity system in the form of statistical and dynamic. This Therefore, this paper proposed a graph theory approach which is research also stressed out the problem in visualizing malware analysis of the ransomware behavior that can be visualized into behavior since the data can be represented in an easy way to be graph-based pattern.
    [Show full text]
  • Newmind-Ransomware-Ebook.Pdf
    Contents What Is Ransomware? ............................................................................................................................. 3 Who Is It Affecting? ................................................................................................................................. 4 Common Forms Of Ransomware .......................................................................................................... 5 Protect Yourself With These Tips: ........................................................................................................ 9 How To Handle An Infection: ................................................................................................................ 11 Your Next Step ........................................................................................................................................ 12 There’s a malware threat online, maybe lurking in your inbox or spam folder, called Ransomware. It’s been around for a while, but recent months have seen it gaining traction, under different names you may have heard, such as Cryptolocker, Cryptowall, and TeslaCrypt. What is Ransomware? One of the ways that Ransomware makes its way to end users is through a well-crafted email with an attachment. The attachment is malicious and when you click to download it, the ransomware encrypts (locks) certain types of files (.docx, .pdf, .jpg, etc) stored on local and mounted network drives, such as a server shared drive at the office. It then displays a message which offers to decrypt
    [Show full text]
  • Best Practices to Protect Against Ransomware, Phishing & Email Fraud
    WHITE PAPER Best Practices for Protecting Against Phishing, Ransomware and Email Fraud An Osterman Research White Paper Published April 2018 SPON Osterman Research, Inc. P.O. Box 1058 • Black Diamond • Washington • 98010-1058 • USA +1 206 683 5683 • [email protected] www.ostermanresearch.com • @mosterman Executive Summary • Various types of security threats are increasing in number and severity at a rapid pace, most notably cryptojacking malware that is focused on mining coins for the roughly 1,400 cryptocurrencies currently in use. • Organizations have been victimized by a wide range of threats and exploits, most notably phishing attacks that have penetrated corporate defenses, targeted email attacks launched from compromised accounts, and sensitive or confidential information accidentally leaked through email. • Threats are becoming more sophisticated as well-financed cybercriminal gangs develop improved variants of malware and social engineering attacks. The result is that the perceived effectiveness of current security solutions is not improving – or is actually getting worse – for many organizations. • Decision makers are most concerned about endpoints getting infected with malware through email or web browsing, user credentials being stolen through email-based phishing, and senior executives’ credentials being stolen through email-based spearphishing. • Four of the five leading concerns expressed by decision makers focus on email as the primary threat vector for cybercriminal activity, and nearly one-half of attacks are focused on account takeovers. Many organizations • Most decision makers have little confidence that their security infrastructure can adequately address infections on mobile devices, are not CEO Fraud/BEC, and preventing users personal devices from introducing malware into the corporate network.
    [Show full text]
  • Society's Genome.Indb
    Society’s Genome Genetic Diversity’s Role in Digital Preservation By Nathan Thompson with Bob Cone and John Kranz Copyright © 2016 by Spectra Logic Corporation All rights reserved. No part of this book may be reproduced in any form or by any electronic or mechanical means, including storage and retrieval systems—except in the case of brief quotations embodied in critical articles or reviews—without permission in writing from Spectra Logic Corporation. All product names, logos, and brands mentioned in this book are the property of their respective owners. Neither the authors nor publisher claim any right of ownership to such names, logos, and brands. Cover design by Kristen Coats Back cover image: Detail of “Ptolemy World Map,” from Ptolemy’s the Geography, redrawn by Francesco di Antonio del Chierco (15th century). Housed in the British Library, London. Image retrieved from https:// commons.wikimedia.org/wiki/File:PtolemyWorldMap.jpg. Published by Spectra Logic Corporation 6285 Lookout Road Boulder, Colorado 80301-3580 Tel.: 1.800.833.1132 Fax: 1.303.939.8844 www.spectralogic.com ISBN: 978-0-9975644-0-2 Second Printing Printed and bound in the United States of America 10 9 8 7 6 5 4 3 2 1 This book is printed on acid-free paper. “We are survival machines—robot vehicles blindly programmed to preserve the selfish molecules known as genes. This is a truth that still fills me with astonishment.” —Richard Dawkins, The Selfish Gene Chapter 6 Wolves at the Door Just a few years after the 9/11 attacks, the digital world began showing signs of sudden, profound change.
    [Show full text]
  • Malware Trends
    NCCIC National Cybersecurity and Communications Integration Center Malware Trends Industrial Control Systems Emergency Response Team (ICS-CERT) Advanced Analytical Laboratory (AAL) October 2016 This product is provided subject only to the Notification Section as indicated here:http://www.us-cert.gov/privacy/ SUMMARY This white paper will explore the changes in malware throughout the past several years, with a focus on what the security industry is most likely to see today, how asset owners can harden existing networks against these attacks, and the expected direction of developments and targets in the com- ing years. ii CONTENTS SUMMARY .................................................................................................................................................ii ACRONYMS .............................................................................................................................................. iv 1.INTRODUCTION .................................................................................................................................... 1 1.1 State of the Battlefield ..................................................................................................................... 1 2.ATTACKER TACTIC CHANGES ........................................................................................................... 2 2.1 Malware as a Service ...................................................................................................................... 2 2.2 Destructive Malware ......................................................................................................................
    [Show full text]
  • Module 2 Roleplaying Games
    Module 3 Media Perspectives through Computer Games Staffan Björk Module 3 Learning Objectives ■ Describe digital and electronic games using academic game terms ■ Analyze how games are defined by technological affordances and constraints ■ Make use of and combine theoretical concepts of time, space, genre, aesthetics, fiction and gender Focuses for Module 3 ■ Computer Games ■ Affect on gameplay and experience due to the medium used to mediate the game ■ Noticeable things not focused upon ■ Boundaries of games ■ Other uses of games and gameplay ■ Experimental game genres First: schedule change ■ Lecture moved from Monday to Friday ■ Since literature is presented in it Literature ■ Arsenault, Dominic and Audrey Larochelle. From Euclidian Space to Albertian Gaze: Traditions of Visual Representation in Games Beyond the Surface. Proceedings of DiGRA 2013: DeFragging Game Studies. 2014. http://www.digra.org/digital- library/publications/from-euclidean-space-to-albertian-gaze-traditions-of-visual- representation-in-games-beyond-the-surface/ ■ Gazzard, Alison. Unlocking the Gameworld: The Rewards of Space and Time in Videogames. Game Studies, Volume 11 Issue 1 2011. http://gamestudies.org/1101/articles/gazzard_alison ■ Linderoth, J. (2012). The Effort of Being in a Fictional World: Upkeyings and Laminated Frames in MMORPGs. Symbolic Interaction, 35(4), 474-492. ■ MacCallum-Stewart, Esther. “Take That, Bitches!” Refiguring Lara Croft in Feminist Game Narratives. Game Studies, Volume 14 Issue 2 2014. http://gamestudies.org/1402/articles/maccallumstewart ■ Nitsche, M. (2008). Combining Interaction and Narrative, chapter 5 in Video Game Spaces : Image, Play, and Structure in 3D Worlds, MIT Press, 2008. ProQuest Ebook Central. https://chalmers.instructure.com/files/738674 ■ Vella, Daniel. Modelling the Semiotic Structure of Game Characters.
    [Show full text]