Copyright (c) Lenny Zeltser. 2000.1 The Evolution of Malicious Agents Lenny Zeltser (www.zeltser.com) SANS Institute Presented July 2000.

Slides:



Advertisements
Similar presentations
By Hiranmayi Pai Neeraj Jain
Advertisements

Winter CMPE 155 Week 7. Winter Assignment 6: Firewalls What is a firewall? –Security at the network level. Wide-area network access makes.
System Security Scanning and Discovery Chapter 14.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Lesson 19: Configuring Windows Firewall
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Using Windows Firewall and Windows Defender
Linux Networking and Security Chapter 11 Network Security Fundamentals.
Chapter 6: Packet Filtering
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Survey “Intrusion Detection: Systems and Models” “A Stateful Intrusion Detection System for World-Wide Web Servers”
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Fundamentals of The Internet Learning outcomes After this session, you should be able to: Identify the threat of intruders in systems and networks and.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
FORESEC Academy FORESEC Academy Security Essentials (III)
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Types of Electronic Infection
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Recent Internet Viruses & Worms By Doppalapudi Raghu.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Module 7: Advanced Application and Web Filtering.
Lesson 11: Configuring and Maintaining Network Security
Viruses a piece of self-replicating code attached to some other code – cf biological virus both propagates itself & carries a payload – carries code to.
Malicious Software.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
A Case Study on Computer Worms Balaji Badam. Computer worms A self-propagating program on a network Types of Worms  Target Discovery  Carrier  Activation.
DoS/DDoS attack and defense
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Understand Malware LESSON Security Fundamentals.
Role Of Network IDS in Network Perimeter Defense.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Chapter 40 Internet Security.
Botnets A collection of compromised machines
Viruses and Other Malicious Content
Botnets A collection of compromised machines
Chap 10 Malicious Software.
A Distributed DoS in Action
Chap 10 Malicious Software.
Operating System Concepts
Crisis and Aftermath Morris worm.
Presentation transcript:

Copyright (c) Lenny Zeltser The Evolution of Malicious Agents Lenny Zeltser ( SANS Institute Presented July 2000

Copyright (c) Lenny Zeltser Overview

Copyright (c) Lenny Zeltser Definition of Malicious Agents Computer program Operates on behalf of potential intruder Aids in attacking systems Viruses, worms, trojanized software

Copyright (c) Lenny Zeltser Goals of the Course Trace evolution of malicious agents Examine anatomy of advanced malicious agents based on key features of existing ones Develop an approach to assessing threats posed by malicious agents

Copyright (c) Lenny Zeltser Course Outline Rapidly spreading agents Spying agents Remotely controlled agents Coordinated attack agents Advanced malicious agents

Copyright (c) Lenny Zeltser Rapidly Spreading Agents

Copyright (c) Lenny Zeltser General Attributes Morris Worm and Melissa Virus Able to rapidly spread across the network Viruses infect other programs by explicitly copying themselves Worms self-propagate without the need for a host program

Copyright (c) Lenny Zeltser Key Features and Limitations Effectively infiltrate organizations despite many firewalls Effective replication mechanisms Limited control over propagation rates and target selection criteria

Copyright (c) Lenny Zeltser The Morris Worm Self-contained, self-propagating worm Overwhelmed the Internet in November of 1988 within hours of release Exploited known host access loopholes to replicate A program that “lived” on the Internet?

Copyright (c) Lenny Zeltser Propagation Techniques Non-standard command in sendmail Buffer overflow bug in fingerd Remote administration trust relationships of rexec and rsh Guessable user passwords Recursively infiltrated systems to replicate itself and reproduce further

Copyright (c) Lenny Zeltser Relevance to Advanced Agents Aggressive infiltration methods of the Morris Worm are still very effective For rapid propagation, program the agent to exploit common vulnerabilities

Copyright (c) Lenny Zeltser The Melissa Virus Microsoft Word-based macro virus Overwhelmed many Internet systems after the first weekend of release ed itself to address book entries Propagated primarily via

Copyright (c) Lenny Zeltser Propagation Techniques Arrived as an attachment Message recipient had to open infected attachment to activate payload ed itself to entries in Microsoft Outlook MAPI address books Recipients lowered guard when came from friends and colleagues

Copyright (c) Lenny Zeltser Relevance to Advanced Agents Penetrated firewalls via inbound Virus signatures could not be developed and applied in time For effective infiltration, program the agent to arrive via open inbound channels

Copyright (c) Lenny Zeltser Advanced Attributes Summary Propagate via open channels such as Web browsing or Once inside, replicate aggressively by exploiting known vulnerabilities Need to control replication rates, possibly by staying in touch with attacker

Copyright (c) Lenny Zeltser Spying Agents

Copyright (c) Lenny Zeltser General Attributes Caligula, Marker, and Groov viruses Transmit sensitive information from within organizations Infiltrate via open channels Use outbound connections for communications

Copyright (c) Lenny Zeltser Key Features and Limitations Can be used as reconnaissance probes Effective mechanism for communicating with authors despite many firewalls Currently agent’s behavior is limited to what was pre-programmed

Copyright (c) Lenny Zeltser The Caligula Virus Also known as W97M/Caligula Microsoft Word-based macro virus Discovered around January 1999 Transmitted PGP secret keyring file to author

Copyright (c) Lenny Zeltser Espionage Tactics Used built-in ftp.exe command to transmit information to author Used outbound sessions for communications Bypassed many firewalls because connections were initiated from inside

Copyright (c) Lenny Zeltser The Marker Virus Also known as W97M/Marker Discovered around April 1999 Recorded date and time of infection, plus victim’s personal information Most likely developed by the CodeBreakers group

Copyright (c) Lenny Zeltser Espionage Tactics Implementation characteristics similar to Caligula Realization of “bright future for espionage enabled viruses” Allowed to study relationships between people at target organization Helpful for precisely targeting attacks

Copyright (c) Lenny Zeltser The Groov Virus Also known as W97M/Groov.a Discovered around May 1998 Uploaded victim’s network configuration to external site Attempted to overwhelm a vendor’s site with network configuration reports

Copyright (c) Lenny Zeltser Espionage Tactics Used built-in ipconfig.exe command to get network information Used built-in ftp.exe for outbound transfer Helpful to get insider’s view of the network Can be correlated with external scans

Copyright (c) Lenny Zeltser Relevance to Advanced Agents Use outbound traffic for communications Obtain personal and relationship information for precise targeting Obtain network information to help reconnaissance efforts

Copyright (c) Lenny Zeltser Advanced Attributes Summary Propagate via open channels or aggressive vulnerability exploitation Use outbound channels for communication Gather insider’s perspective of infrastructure Need to remotely control agent’s behavior

Copyright (c) Lenny Zeltser Remotely Controlled Agents

Copyright (c) Lenny Zeltser General Attributes Back Orifice and NetBus trojans Provide full control over victim’s host Comprised of client and server modules Server modules “infect” victim hosts Client modules send remote commands Infiltrate via open channels

Copyright (c) Lenny Zeltser Key Features and Limitations Server modules are very stealthy Level of control is thorough and expandable Client and server modules must be reunited before controlling Typically controlled via inbound traffic with respect to server modules

Copyright (c) Lenny Zeltser Back Orifice Original version released August 1998, updated July 1999 Created by Cult of the Dead Cow Much functionality similar to standard remote administration tools Classification often depends on intended use

Copyright (c) Lenny Zeltser Native Capabilities Keystroke, video, audio capture File share management File and registry access Cached password retrieval Port redirection Process control Many other capabilities

Copyright (c) Lenny Zeltser Enhancement Capabilities Provides plug-in API support Communication channel encryption Server component location announcement via outbound IRC Many other capabilities

Copyright (c) Lenny Zeltser NetBus Original version released March 1998 to “have some fun with his/her friends” New version February 1999 marketed as “remote administration and spy tool” New version required physical access to install stealthy server component, but unofficial restriction-free versions exist

Copyright (c) Lenny Zeltser Remote Control Capabilities Functionality similar to Back Orifice Also supports plug-ins, but not as popular among developers as Back Orifice Primitively controls multiple server components from single client module, but not in parallel

Copyright (c) Lenny Zeltser Relevance to Advanced Agents Operate agents in stealthy mode to minimize chances of discovery Offer extensive remote controlling functionality Support enhancements to native features via plug-ins

Copyright (c) Lenny Zeltser Advanced Attributes Summary Propagate via open channels or aggressive vulnerability exploitation Use outbound channels for communication Gather insider’s perspective of infrastructure

Copyright (c) Lenny Zeltser Advanced Attributes Summary Provide stealthy and extensible remote- control functionality Need to control multiple agents from a single point

Copyright (c) Lenny Zeltser Coordinated Attack Agents

Copyright (c) Lenny Zeltser General Attributes Trinoo and Tribe Flood Network Disrupt normal system functions via network floods Attacker can control several clients, each controlling multiple attack servers Networks scanned for vulnerabilities and attack agents are planted

Copyright (c) Lenny Zeltser Key Features and Limitations Client as well as server modules run on compromised machines Attacker further removed from target Agents typically beyond administrative control of single entity Single purpose, designed specifically for denial-of-service attacks

Copyright (c) Lenny Zeltser Trinoo Discovered on compromised Solaris systems in August 1999 Initial testing dates back to June 1999 First Windows version February 2000 Attacks via UDP packet flood

Copyright (c) Lenny Zeltser Coordination Mechanisms Attacker connects to client module (“master”) via telnet to specific port Warning issued if another connection attempt during ongoing session Password-based access control for communication between all nodes

Copyright (c) Lenny Zeltser Coordination Mechanisms Master relays commands to server modules (“daemons”) via proprietary text-based protocol over UDP For example, “do” command to master relayed as “aaa” command to daemons Attack terminated via timeout or “mdie” command to master (“die” to daemons)

Copyright (c) Lenny Zeltser Relevance to Advanced Agents Control of multiple agents in coordinated manner All traffic is inbound with respect to destination of particular communication Master to daemons channels can be disrupted by blocking high-numbered UDP ports

Copyright (c) Lenny Zeltser Tribe Flood Network Discovered around October 1999 Similar to Trinoo in purpose and architecture Attacks via ICMP, UDP, and Smurf-style floods, offers back door to agent’s host Client to server module communication via ICMP “echo reply” packets

Copyright (c) Lenny Zeltser Coordination Mechanisms Normally ICMP “echo reply” generated to “echo request” by ping command Use ICMP packet identifier field to specify commands Firewalls may accept ICMP “echo reply” Some network monitoring tools do not process ICMP traffic properly

Copyright (c) Lenny Zeltser Relevance to Advanced Agents Control of multiple agents in coordinated manner Exploit protocols by violating specifications Follow specifications, but use protocols in unexpected ways This forms the basis of many attacks

Copyright (c) Lenny Zeltser Advanced Attributes Summary Propagate via open channels or aggressive vulnerability exploitation Use outbound channels for communication Gather insider’s perspective of infrastructure

Copyright (c) Lenny Zeltser Advanced Attributes Summary Provide stealthy and extensible remote controlling functionality Control multiple agents in coordinated manner Employ covert techniques for communication These attributes can be used to assess threat level of a particular agent

Copyright (c) Lenny Zeltser Advanced Malicious Agents

Copyright (c) Lenny Zeltser General Attributes RingZero Trojan, Samhain Worm Combine key features of other agents Offers attacker tight control over agent’s actions Difficult to defend against without proper infrastructure and resources

Copyright (c) Lenny Zeltser The RingZero Trojan Activity reports around September 1999 Sightings in August 1999 of messages with a “really class program” Several variants of trojanized program attachments Agent scanned for Web proxy servers Attributes rarely seen in single agent

Copyright (c) Lenny Zeltser Observed Behavior Detailed analysis October 1999 Scanned for Web proxy servers via connection attempts to known ports Proxy servers typically access Web resources on user’s behalf Used the discovered server to report server’s existence to external site

Copyright (c) Lenny Zeltser Observed Behavior Retrieved encoded/encrypted file from two external sites Send mass mailing to ICQ users from spoofed address Encouraged recipients to visit the “Biggest Proxy List” on external site

Copyright (c) Lenny Zeltser Relevance to Advanced Agents Propagated via open channels Outbound traffic for communications View from internal network Stealthy remote control capabilities Operated in distributed manner

Copyright (c) Lenny Zeltser Room for improvement Analysis based on single data file Not especially malicious, though some reports of password stealing variants No specific firewall bypassing attributes No aggressive vulnerability exploitation Louder than needs to be

Copyright (c) Lenny Zeltser The Samhain Worm Written winter , announced on Bugtraq May 2000, never released Research prototype of a “deadly harmful Internet worm” Defined alternative set of characteristics desired of advanced agents

Copyright (c) Lenny Zeltser Desired Characteristics Portability for target OS independence Invisibility for stealth operation Autonomy for automatic spread via built-in exploit database Polymorphism to avoid detection

Copyright (c) Lenny Zeltser Desired Characteristics Learning for obtaining new techniques via central communication channel Integrity to prevent modification or destruction Awareness of mission objective to perform specific tasks and cease activity

Copyright (c) Lenny Zeltser Key Implementation Details Uses “wormnet” to get programs and updates for target platform Supports controlled broadcasting of requests to wormnet members Family tree passed from parent to child, used to control broadcasts via maximum number of wormnet hops

Copyright (c) Lenny Zeltser Key Implementation Details Uses polymorphic engine and encryption to avoid constant strings Intercepts system calls when root, as well as other techniques to hide Uses exploits unknown at the time, sorted by scope and effectiveness Victims chosen via active connection monitoring and qualifying attributes

Copyright (c) Lenny Zeltser Relevance to Advanced Agents Detailed design and implementation details, plus code fragments provided Gradual attack approach suggests to propagate “harmlessly,” then update Designed specifically to maximize potential harm and difficulty of eradication

Copyright (c) Lenny Zeltser Threat of Malicious Agents

Copyright (c) Lenny Zeltser Advanced Agents Advanced agents are especially dangerous because of features combined into a single package Stealth operation, firewall traversal, and coordination are particularly powerful Feature sets and experimental nature of agents suggests active development

Copyright (c) Lenny Zeltser Assessing the Threat Defense techniques depend on priorities and technologies of the organization Use a structured framework to assess threat of particular agents Analyze extent of “advanced” attributes, assign weight, react appropriately

Copyright (c) Lenny Zeltser Malicious Agents Attributes Matrix summarizes key attributes of agents in terms of presented framework The Samhain Worm not included because of slightly different feature set Refer to earlier slides for discussion of items in the matrix Use for future reference

Aggressive self- propagation Propagation despite firewalls Aggressive attack when no firewalls Aggressive attack despite firewalls Revealing confidential information Remotely controlled when no firewalls Remotely controlled despite firewalls Acting in coordinated distributed fashion Morris Worm Melissa Virus Marker Virus Caligula Virus Groov Virus Back Orifice NetBusTrinooTFNRingZero YesNo Possibly Yes Partly Yes Partly (DoS) No Partly (DoS) Yes Possibly NoPartly (DoS) No Partly (DoS) No Partly (DoS) Possibly No Yes No Yes No Yes No Yes No Yes

Copyright (c) Lenny Zeltser The End See for electronic copies of this material