Malicious Software Trojan Horse

Malicious Software Trojan Horse

4/18/16 Outline • Malicious logic ■ Trojan horses ■ Computer viruses CSCI 454/554 Computer and Network ■ Worms Security ■ Rabbits and bacteria ■ Logic bombs Topic 8.5 Malicious Logic ■ Trapdoor ■ DDoS • Defenses against malicious logic 1 2 Malicious Software Trojan Horse ■ program with hidden side-effects ■ which is usually superficially attractive ■ eg game, s/w upgrade etc ■ when run performs some additional tasks ■ allows attacker to indirectly gain access they do not have directly ■ often used to propagate a virus/worm or install a backdoor ■ or simply to destroy data An Introductory Trojan Horse Example Trojan Horses • Assume the following UNIX script is named ls and • A Trojan horse is a program with an overt (documented or is placed in a directory. known) effect and a covert (undocumented or unexpected) effect. • Assume “.” is in the path environment. • What happens if the user tries to ls this Principal A ACL directory? executes A:r cp /bin/sh /tmp/.xxsh read File F chmod o+s+w+x /tmp/.xxsh Program Goodies A:w rm ./ls ls $* Trojan Horse B:r A malicious logic is a set of intrusions that cause a site’s File G A:w security policy to be violated. write 5 6 1 4/18/16 Computer Viruses Types of Viruses • A computer virus is a program that inserts itself ! boot sector infector virus into one or more files and then performs some ! Executable infectors virus (possibly null) action. ! memory-resident virus ■ both propagates itself & carries a payload ! TSR virus ■ carries code to make copies of itself ! ■ as well as code to perform some covert task Stealth virus • Two phases ! polymorphic/metamorphic virus ■ Insertion phase ! macro virus ■ The virus inserts itself into a file (or files) ! email virus ■ Execution phase ■ The virus executes 7 Boot Sector Infector Virus Boot Sector Infector Virus (Cont’d) ■ The boot sector is the part of a disk used to bootstrap the system. Infecting disks ■ Code in a boot sector is executed when the system “sees” the disk for the first time. Boot sector Brian Virus 1. Move the disk interrupt vector 13H to 6DH Virus 2. Set 13H to invoke Brian virus 3. Load the original boot sector 1. Copy the old boot sector to alternative place; 2. Insert itself into the boot sector. 9 10 Executable Infector Viruses Terminate and Stay Resident (TSR) Virus ■ Triggered if an infected program is executed • Stays active in memory after the application (or ■ Infect executables bootstrapping) has terminated. ■ COM and EXE Brian Virus 1. Move the disk interrupt vector 13H to 6DH Header Executable code and data 2. Set 13H to invoke Brian virus 3. Load the original boot sector Header Virus Executable code and data New disks will be infected as long as the virus is in memory. 11 12 2 4/18/16 Macro Virus Email Virus ■ spread using email with attachment containing a • Macro virus infects documents (data files), not executable files macro virus ■ e.g Melissa ■ Viruses composed of instructions that are interpreted, rather than executed. ■ triggered when user opens attachment ■ macro code embedded in word processing file ■ or worse even when mail viewed by using scripting features in mail agent ■ Examples ■ ■ Word viruses usually targeted at Microsoft Outlook mail agent ■ Email viruses & Word/Excel documents ■ MS Office suite is the most popular target. 13 More Viruses Worms • Stealth viruses • A computer worm is a program that copies ■ Conceal the infection of files itself from one computer to another. ■ Make itself difficult to detect • Different from viruses • Polymorphic viruses ■ Viruses depend on other programs ■ Encrypt itself with a random key ■ Worms are usually standalone applications ■ Avoid detection by anti-virus programs, which search for patterns of viruses. ■ Viruses usually trick people into propagating them • Metamorphic viruses ■ Worms can hack into vulnerable systems and ■ Change its form each time it inserts itself into another program. spread without depending on others 15 16 Worm (Cont’d) Worm Operation ! typically spreads over a network ■ Four major phases: " cf Morris Internet Worm in 1988 ■ dormant ! using users distributed privileges or by ■ propagation exploiting system vulnerabilities ■ search for other systems to spread ! widely used by hackers to create zombie ■ establish connection to target remote PC's, subsequently used for further system attacks, esp DoS ■ replicate self onto remote system ! major issue is lack of security of connected systems, esp PC's ■ triggering ■ execution 17 3 4/18/16 Worm Attacks The Sapphire/Slammer Worm ■ Code Red ■ exploited buffer overflow in MS IIS to penetrate & spread • Facts about Sapphire/Slammer ■ probes random IPs for systems running IIS nd ■ ■ 2 wave infected 360000 servers in 14 hours Happened slightly before 5:30 UTC on ■ Code Red 2 Saturday, January 25, 2003. ■ had backdoor installed to allow remote control ■ The fastest worm in history. ■ Nimda ■ MS Outlook, IE, IIS ■ Doubled in size every 8.5 seconds at the ■ search strategy: island hopping beginning ■ 50% same first two octets ■ 25% same first octet ■ Infected more than 90% of vulnerable hosts ■ 25% completely random IP within 10 minutes ■ Sapphire Worm (Slammer, January 2003) (UDP-based) ■ two orders magnitude faster than the Code Red worm ■ Buffer overflow in MS SQL Server 20 Spread of Sapphire Worm Sapphire/Slammer Worm (Cont’d) • How does it find vulnerable computers? ■ Random scanning ■ Select IP addresses at random to infect • How does it get into vulnerable computers? ■ Exploit a buffer overflow vulnerability in MS SQL Server or MSDE 2000 ■ Vulnerability discovered in July 2002 • Why was it so fast? ■ Small: 376 bytes; a 404 byte UDP packet ■ Based on UDP 22 Sapphire/Slammer Worm (Cont’d) Mobile Phone Worms • What’s its real impact (so far)? ! First discovery was Cabir worm in 2004 " Then Lasco and CommWarrior in 2005 ■ Sapphire does not have a malicious payload ! Communicate through Bluetooth wireless ■ The Internet was saturated. connections or MMS ■ Too many hosts are infected and are trying to infect randomly selected hosts. ! Target is the smartphone " can completely disable the phone, delete data on the phone, or force the device to send costly messages " CommWarrior replicates by means of Bluetooth to other phones, sends itself as an MMS file to contacts and as an auto reply to incoming text messages 23 4 4/18/16 Logic Bombs Trapdoors • A logic bomb is a program that performs an ■ secret entry point into a program action that violates the security policy when ■ allows those who know access bypassing usual some external event occurs. security procedures ■ one of oldest types of malicious software ■ have been commonly used by developers ■ code embedded in legitimate program ■ a threat when left in production programs ■ activated when specified conditions met allowing exploited by attackers ■ eg presence/absence of some file ■ very hard to block in O/S ■ particular date/time ■ requires good s/w development & update ■ particular user ■ when triggered typically damage system ■ modify/delete files/disks 25 DDoS Attacks Zombie (bot) Attacker/Client Attacker/Client ■ program which secretly takes over another networked computer Handler Handler Handler Handler Handler ■ then uses it to indirectly launch attacks ■ often used to launch distributed denial of Zombie Zombie Zombie Zombie Zombie Zombie service (DDoS) attacks Zombie Zombie Zombie Zombie ■ exploits known flaws in network systems Victim Bot Remote Control Facility Source Address Spoofing ■ distinguishes a bot from a worm # use forged source addresses ■ worm propagates itself and activates itself # usually via the raw socket interface on ■ bot is initially controlled from some central facility operating systems ■ typical means of implementing the remote # makes attacking systems harder to identify control facility is on an IRC server ■ bots join a specific channel on this server and treat incoming messages as commands # Reflection attack: attacker generates large ■ more recent botnets use covert communication volumes of packets that have the victim channels via protocols such as HTTP system as the destination address ■ distributed control mechanisms use peer-to-peer protocols to avoid a single point of failure 5 4/18/16 Reflection Attacks # attacker sends packets to a known service TCP SYN on the intermediary with a spoofed source Spoofing address of the actual victim system Attack # when intermediary responds, the response is sent to the target # “reflects” the attack off the intermediary (reflector) Reflection Attacks Rabbits and Bacteria • A bacterium or a rabbit is a program that absorbs all of some class of resource. • Example ■ Exhaust disk space ■ Exhaust inode tables 34 Defenses against Malicious Logic Defense (Cont’d) • Type enforcement by human users • Limiting the users’ access domain ■ A program being written is considered data ■ Idea: limit the objects that can be accessed by a malicious logic that assumes the user’s privilege. ■ A program must be changed into executable by a certifying authority before it’s executed. • Methods ■ Control information flow distances ■ Ex. Information cannot flow more than n times ■ Reduce the rights ■ Sandboxing ■ Implicitly restrict process rights ■ Ex. Insert special instructions that cause traps whenever an instruction violates the security policy. 36 35 6 4/18/16 Defense (Cont’d) Defense (Cont’d) • Inhibit users from sharing programs in • Proof-carrying code different domains ■ Carry proof with the code ■ An extreme: isolated domains ■ It can be verified (to a certain extent) that the

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us