CONTENTS in THIS ISSUE Fighting Malware and Spam

CONTENTS in THIS ISSUE Fighting Malware and Spam

JULY 2008 Fighting malware and spam CONTENTS IN THIS ISSUE 2 COMMENT MEMORY GAME A commitment to quality and reliability Eric Filiol describes a set of computer memory weaknesses that could enable the theft of sensitive data via malware attacks. 3 NEWS page 6 IT heavyweights combine forces to fi ght cyber crime SNAKES AND LADDERS Liar, liar The object-oriented programming language Python can be used for many kinds of software Fast fl ux trojan author in court development – potentially including malware development. Aleksander Czarnowski believes in 3 VIRUS PREVALENCE TABLE being prepared and provides a brief overview of how to reverse engineer a Python module. page 10 4 VIRUS ANALYSIS THE WAITING GAME The road less truvelled: W32/Truvel This month John Hawes got his hands on a beta version of FEATURES the long-awaited VIPRE from 6 New memory persistence threats anti-spyware expert Sunbelt Software and found it to be 10 Reversing Python modules well worth the wait. 13 Advertising database poisoning page 16 16 PRODUCT REVIEW Sunbelt Software VIPRE Antivirus + Antispyware This month: anti-spam news and events, and 20 END NOTES & NEWS Paul Baccas questions whether spear phishing is on the rise. ISSN 1749-7027 COMMENT ‘The purpose of the VB100 is Tests that pit products against the WildList have never claimed to prove that a given product can detect all to provide a regular measure of known malware (which would be impossible to prove) the competence, reliability and and they do not attempt to rank products against one another on the basis of detecting more or fewer of the credibility of software vendors in samples listed. The purpose of the VB100 and similar the security fi eld.’ certifi cation schemes is to provide a regular measure of John Hawes, Virus Bulletin the competence, reliability and credibility of software vendors in the security fi eld – something which has become more important than ever in recent years with A COMMITMENT TO QUALITY the growing tide of suspect software claiming to detect AND RELIABILITY and remove malware. The VB100 certifi cation system has come under fi re in Products are expected to be able to pass VB’s tests, and to recent weeks, with much of the criticism focused on pass regularly. With the level of co-operation and sample the WildList and its suitability as a basis for testing. sharing going on across the industry, nothing on the list It became quite clear from the stories that were should be new to vendors, and with the comparatively tiny published that there are several common misconceptions resources of the VB test lab in relation to the extensive surrounding both the intended purpose of the VB100 research labs that AV vendors have at their disposal, no certifi cation, and in particular the WildList. amount of replication of complex viruses carried out by VB should be beyond the capabilities of a commercial One of the central criticisms levelled at the WildList malware lab. is that it does not include every piece of malware. To do so, of course, would be an immeasurably huge task Passing, or even failing a single VB100 test means beyond even the vast resources of large globe-straddling little in isolation – it is all about maintaining a steady corporations. It would also be quite beside the point of record of passes over time, to demonstrate a long-term both the WildList and the certifi cation schemes that rely commitment to quality and reliability. on its steady and regular output. Of course, beyond these issues, there are far more There have been numerous other criticisms of the complex and diffi cult problems facing testers. An WildList, most of which focus on the range of malware ever-growing arsenal of weapons is being implemented types covered by the list and the activeness of its in a diverse range of fashions as products adapt to reporting sources. These are issues into which the team combat the evolving threat. Testing these new weapons behind the WildList are investing considerable effort to – and just as importantly interpreting and presenting the address. But even once the full range of improvements results in a manner comprehensible to the end-user – is are fully on stream, the WildList will never pretend a hard but vital task, and one that VB, like all testing to cover the gamut of malicious software; rather it is bodies, is facing up to. We are hard at work developing intended to provide a limited, but unquestionable subset a range of improvements and additions to the data we of the malware problem, containing items which are provide to our readers, and are currently hiring extra guaranteed to be affecting a signifi cant proportion of hands to cope with the requirements of testing a wider real-world users and represented by a set of rigorously range of criteria and maintaining a broader and more validated master samples. up-to-the-minute sample collection. For any such plan to work requires the input and co-operation of experts from across the industry, pooling Editor: Helen Martin both wisdom and resources for the greater good. Groups such as AMTSO provide great hope for the future, and a Technical Consultant: John Hawes number of the presentations at this year’s VB conference Technical Editor: Morton Swimmer will focus on the subject of testing. As we strive to provide Consulting Editors: useful and trustworthy data on the protection offered by Nick FitzGerald, Independent consultant, NZ a growing range of solutions to the security problem, Ian Whalley, IBM Research, USA we rely on the support of those whose performance we Richard Ford, Florida Institute of Technology, USA measure, as they rely on independent tests to keep them informed of their successes and failings. As always, we gladly welcome new ideas and constructive criticism. 2 JULY 2008 VIRUS BULLETIN www.virusbtn.com NEWS IT HEAVYWEIGHTS COMBINE FORCES TO FIGHT CYBER CRIME Prevalence Table – May 2008 A new security industry consortium was formed last month to provide a forum for IT vendor companies to work together in Malware Type % order to address multi-vendor security threats. The Industry NetSky Worm 25.20% Consortium for Advancement of Security on the Internet Agent Trojan 15.68% (ICASI) is a collaboration between Cisco, International Business Machines, Intel, Juniper Networks and Microsoft, Rays/Traxg/Wukill Worm 10.12% and is organised around four central principles: reducing Mytob Worm 9.38% security threat impact and improving customer security; OnlineGames Trojan 8.03% improving the effi ciency and effectiveness of multi-vendor Cutwail/Pandex/Pushdo Trojan 7.01% threat resolution and security response practices; creating a unique trusted environment for the sharing of information Virut Virus 4.34% between vendors; and leveraging the expertise of IT Bifrose/Pakes Trojan 3.99% companies from across the world to innovate security Mydoom Worm 3.46% response excellence. The organization plans to share its fi rst Bagle Worm 2.69% accomplishments in late 2008. Zafi Worm 1.89% Zlob/Tibs Trojan 1.40% LIAR, LIAR Grew Worm 1.02% CEO of Trend Micro Eva Chen surprised many last month Sality Virus 0.84% when she stated in an interview with ZDNet that the entire anti-virus industry has been lying to its customers for the Mywife/Nyxem Worm 0.65% past 20 years. Stration/Warezov Worm 0.39% Trend has recently announced that it is heading in a Nuwar/Peacomm/Zhelatin Trojan 0.37% new direction (into the cloud) with its malware analysis Bugbear Worm 0.34% – reasoning that, now that faster Internet connections are Lineage/Magania Trojan 0.29% available worldwide, it is faster to throw an unknown Small Trojan 0.29% sample into the cloud to perform a suspected malware check than to initiate and execute a sandbox heuristic environment Alman Worm 0.27% on the desktop. Feebs Worm 0.22% Klez Worm 0.21% FAST FLUX TROJAN AUTHOR IN COURT MyLife Worm 0.18% A 19-year-old is due to plead guilty in a US court to one Chir Worm 0.14% count of computer assisted fraud after having admitted to Parite Worm 0.14% creating the Nugache trojan and using it to create one of the Grum Worm 0.13% fi rst fast fl ux botnets. The trojan spread through AOL instant Bagz Worm 0.13% messenger and, once clicked on, added the victim machine to a zombie network that used a peer-to-peer mechanism to Nimda Worm 0.12% communicate rather than relying on a single command and FunLove Worm 0.12% control channel. Womble Worm 0.11% According to a plea bargain agreement Jason Michael Vote Worm 0.08% Milmont ran a botnet using the trojan which, at its peak, Delf Trojan 0.07% consisted of between 5,000 and 15,000 computers. He used [1] the botnet to obtain victims’ credit card details and steal Others 0.71% thousands of dollars by making online purchases using the Total 100.00% stolen credentials. The botnet was also used to launch DDoS attacks against an online business. [1]Readers are reminded that a complete listing is posted at http://www.virusbtn.com/Prevalence/. Milmont faces up to fi ve years in prison, a $250,000 fi ne and almost $74,000 restitution. JULY 2008 3 VIRUS BULLETIN www.virusbtn.com VIRUS ANALYSIS THE ROAD LESS TRUVELLED: the Process Environment Block, but there is no branch instruction to take action if the fl ag is set – perhaps it was W32/TRUVEL removed while debugging, and the virus author forgot to Peter Ferrie restore it. In the second variant of the virus the sequence has Microsoft, USA been removed completely.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    22 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us