COIS/FRSC 2750H Computer Crime and Forensics Fall 2011 Malware: Viruses, Worms Etc
COIS/FRSC 2750H Computer Crime and Forensics Fall 2011 Malware: Viruses, Worms Etc
COIS/FRSC 2750H Computer Crime and Forensics Fall 2011 Malware: Viruses, Worms Etc
L6
Reference Material
Primary sources of information contained in these slides are: Taylor, R.W. et al, Digital Crime and Digital Terrorism (2006) Jones, R., Internet Forensics (2006) Volonino, L. et al, Computer Forensics: Principles and Practices (2007) Wang, W., Steal This Computer Book 4.0: What they wont tell you about the internet (2006)
L6
L6
Viral Infections
Used to spread through use floppy disks or BBS Now theyre primarily spread through Internet via Email Email attachments Downloadable files Web pages Newsgroups Peer to peer transfers Instant messaging And so on
L6
Cost
Survey of government, private industry and universities showed that 85% had a virus/worm problem in the last year Average virus outbreak took approximately 20 person days to recover and cost the company $10,000 (median) and $100,000 (average) Types of damage include Triggering disruptive events Bogging down email and network servers Deleting or modifying files Accessing and sharing private information System degradation Compromised security Damage to software and hardware
L6
L6
Malware
Well take a quick look at Viruses Worms Trojan Horses Adware and Spyware Blended Threats
L6
Viruses
Overused term that has lost some of its original meaning Often used now as a synonym for malware Including viruses, worms, trojans etc. By definition a virus exists only to replicate itself Much like biological virus Need other files or resources to run and replicate themselves Harm often caused by bodys (computer's) reaction to virus, not by virus itself Four primary environments File virus Boot virus Macro virus Network virus
L6
File Virus
Use operating system (like Windows) to propagate Can infect any type of executable file Overwrite file with own code Easy to detect system stops working 3 main types of these Parasite Latch onto file (before, after or in middle of executable) and leave it operational Companion Clone target file so that virus runs rather than the .exe Link virus Modify fields of file system so that operating system runs virus rather than intended file
L6
Boot Virus
Attacks the boot sector of system, master boot record or change the system pointer to an active boot sector After power on and hardware tests, system loader routine reads first sector of boot record and passes control to the virus Rather than operating system starting, the virus runs
L6
10
Macro Virus
Takes advantage of macro language built into programs like MS Office Transfer themselves from one file to another and from one computer to another via file attachments or shared files When file is opened program calls infected macro and virus is run Can take control when user clicks on say File/Open, or File/Save or even when the user presses a certain key on the keyboard If using MS Word, can save itself as part of NORMAL.DOT file Then every .doc file is infected
L6
11
Network Virus
Make use of network protocols Can transfer its code to a remote workstation or network Can run own code or push users to run code on remote machines Generally a companion type of virus Do not alter existing files Infiltrate computer memory from network Calculate and record network addresses of other computers Send copies of themselves to other computers
L6
12
L6
13
L6
14
Infection Methods
Direct Infection Simplest method Every time user opens infected file or runs infected program virus spreads These are easy to detect Fast Infection Virus infects every file accessed by infected program If the infected program is your virus checker, itll infect every file in your system when you run a scan Slow Infection Virus only infects newly created files or files modified by a legitimate program Harder to detect Files are only accessed by legitimate programs like windows explorer
L6
15
Sparse Infection Spreads slowly and unpredictably RAM resident Infection Buries itself in RAM and any program or file opened is infected Spread by boot sector viruses
L6
16
17
Retaliators Attack anti-virus programs Either Modify anti-virus program so that it cant detect the virus Infect the anti-virus program itself Can be a race to see which finds the other first
L6
18
Worms
Piece of software that copies itself somewhere else Term taken from book Shockwave Rider (in book a tapeworm is a self-replicating piece of code Stand alone program It does not attach itself to or modify other files Unlike a virus Makes copies of itself from one drive to another or copies itself using email or another transport mechanism Can move very quickly Code Red Worm in 2001 infected over 250,000 machines in 9 hours
L6
19
Worms cont
Some worms may have built in DoS attacks, Web Site defacements, or some other surprise Just their propagation is in effect a DoS attack because of their drain on resources Scan traffic May crash routers Overload networks Tie up computer processing capability
L6
20
L6
21
IRC channels or instant messaging services IRC networks are groups of chatrooms Worm sends an enticing message to everyone in chat room If downloaded, the worm spreads Internet worms Scans other computers for open ports Or like the Santy worm they use a search engine Searched for people using the PHP Bulletin Board Dont waste time trying to infect computers that wont help it spread (like computers running Mac OS X) Malicious web pages Use ActiveX controls to pass worm onto visitors to web site Only effective on computers running Windows and using IE Firefox and Opera dont allow ActiveX to run
L6
22
Trojan Horse
An unauthorized program contained within a legitimate program that performs functions unknown to user Usually wait for a trigger event to occur date, message etc. Can Open back doors to system Allow someone to take control of computer Destroy files Send emails Display messages
L6
23
L6
24
L6
25
L6
26
L6
27
Keyloggers Capture key strokes and email them to attacker periodically Some have on or off line option Destructive Destroy and delete files Can work like a logic bomb becomes active when certain conditions are met DoS or Mail Bomb Trojan Infect as many machines as possible and then have all machines bombard target with non-filterable emails Proxy/Wingate Trojan Turn victims computer into a zombie Can be used by attacker or whole world for illegal activities Software Detection Killers Attacks anti-virus/firewall programs Then attacker has free access to machine L6
28
L6
29
L6
30
L6
31
L6
32
Blended Threats
Combine viruses, worms, Trojan Horses and other malicious code Effective because most security products cannot prevent the attack Just advise user after the fact Sometimes better to shut down network if theres an imminent threat and wait for patches and detection routines
L6
33
L6
34
Virus Hoaxes
Can be as costly or more costly than real viruses Time wasted trying to detect or remove virus e.g. Teddy Bear Hoax http://www.hoax-slayer.com/teddy-bear-virus-hoax.html Virus hoaxes: Contain a warning message about a virus Usually from an individual or company, but not cited source Warn not to read or download virus preaches salvation by deletion Describe the virus as having horrific powers Usually many words in caps and exclamation marks Urge the reader to forward the email Seek credibility by citing a credible source Claim the source says the virus is bad or has them worried Use baseless technical jargon
L6
35