Presentation is loading. Please wait.

Presentation is loading. Please wait.

Open Malicious Source Symantec Security Response Kaoru Hayashi.

Similar presentations


Presentation on theme: "Open Malicious Source Symantec Security Response Kaoru Hayashi."— Presentation transcript:

1 Open Malicious Source Symantec Security Response Kaoru Hayashi

2 Agenda  What is Open Malicious Source  Characteristics  Protection  Conclusion

3 What is Open Malicious Source  Open Source qualities –Free redistribution –Ready access to source code –Modifiable by anyone –Designed for evolution  For malicious purposes

4 For example…  Beagle, Mydoom, Netsky and Sasser –Not open malicious source –Created by an author, closed group, or individuals who can obtain source code  Gaobot, Randex and Spybot –Open malicious source –Source codes are distributed widely –Updated / released by many

5 Is this topic new?  NO, but …  Programs developed from open malicious source are on the rise  Impact is intensifying

6 Number of Submissions: Worms

7 Number of Submissions: Worms from open malicious source

8 Number of new variants: Worms

9 Number of new variants: Worms from open malicious source

10 Characteristics  Easy to create  Purpose-oriented  Difficult to recognize

11 Characteristics: Easy to create  Easy to obtain from the Internet –Whole project files –New codes, samples,or tools –Free compiler  No special knowledge, tool, or code required  A wide range of people are creating their own bot

12 Characteristics: Easy to create Easy to obtain

13 Characteristics: Easy to create Sample: Spybot

14

15 Case: Spybot W32.Spybot.A  Discovered on 2003/04/16  Backdoor –Based on backdoor “Sdbot” –Supports 22 commands including:  Key logging  Killing processes  Stealing cached password  DoS attacks  Worm –Copies itself to C$, ADMIN$, and IPC$ shares –Dictionary attack (17 keywords)  123456, admin, root, server…. –Schedules a job to run Worm Backdoor

16 Case: Spybot W32.Spybot.DNC  Discovered on 2004/09/13 as the 3071 st variant  Backdoor –Supports over 90 commands including:  Upload / Download / Execute files  Run as HTTP server / SOCKS4 proxy  Steal 42 Game CD-KEYs  Access CMD.exe  Sniff packets  Access Web Camera Worm Backdoor Additional Code

17 Case: Spybot W32.Spybot.DNC  Worm –Dictionary attack  139 keywords per password –Uses other worms or Trojans  Beagle, Mydoom, Optix, Sub7, NetDevil Worm Additional Code Backdoor Additional Code

18 Case: Spybot W32.Spybot.DNC  Vulnerability Attack –MS01-059 (UPnP) –MS02-061 (SQL) –MS03-007 (WebDAV) –MS03-026 (DCOM RPC) –MS03-049 (Workstation) –MS04-011 (LSASS)  Packed with Runtime Packer Worm Additional Code Backdoor Additional Code Vulnerability Attack Polymorphic / Packer

19 Case: Randex and Gaobot Worm W32.Randex (discovered on 2003/06/04) Worm Backdoor W32.Gaobot (discovered on 2002/10/22) Worm Backdoor Vulnerability Attack Polymorphic / Packer Over 1600 variants Worm Backdoor Vulnerability Attack Polymorphic / Packer Over 1600 variants

20 Case: Randex, Gaobot and Spybot  Now they look very similar –Backdoor layer usually based on “Sdbot” –Same codes / concepts implemented in each layer –Further similar worms / backdoors exist: i.e., Kwbot, IRCBot Worm Backdoor Vulnerability Attack Polymorphic / Packer Worm Backdoor Vulnerability Attack Polymorphic / Packer Worm Backdoor Vulnerability Attack Polymorphic / Packer

21 Characteristics: Easy to create By a lot of people May: Gaobot author arrested in Germany May: Randex author arrested in Canada June, July, August: New variants created

22 Characteristics: Purpose  Not only for fun –Propagation –Proof of concept  For profit –Information theft –System control –DDoS zombies –Financial gain

23 Characteristics: Purpose  W32.Netsky.P@mm –Propagation  Mass mailing  P2P or share networks –Payload  Removes Beagle, Mydoom, Deadhat, and Welchia worms  W32.Gaobot.BIA –Propagation  Dictionary attack  Vulnerability attack –Payload  Logs keystrokes  Sniffs packets  Steals CD-KEYs  Steals cached password  Obtains system / network information  Gains full system control  SOCKS proxy  DDoS attack  and more….

24 Characteristics: Difficult to recognize  Slow and limited propagation –Differs from mass mailers, Blaster, and Code Red –Little public interest  Automatic copy / execution on remote computers - By using a scheduler or by exploiting vulnerabilities  Many new variants released over a short time period –Over 600 variants a month  New variants are target-specific –You may be the only infected one, worldwide.

25 How to stop  Stopping the development of new threats is almost impossible –Source codes are distributed widely –Authors are located around the globe –New codes, samples, and tools are released every day

26 How to protect  Anti-virus tools –Definitions, Heuristics, Behavior blocking ….  Firewall  IDS  Patch management  Password management  Security policy  Learning, Studying, Educating … Nothing new, nothing special. But we know maintaining all is not easy.

27 Conclusion  Malicious source is distributed widely  A lot of people are creating their own bot  Sharing source code results in more powerful threats  Main purpose is profit  No magic trick to secure protection

28 Thank You! Kaoru Hayashi kaoru_hayashi@Symantec.com


Download ppt "Open Malicious Source Symantec Security Response Kaoru Hayashi."

Similar presentations


Ads by Google