Web Based Attacks SymantecDefense Fantastic Four Casey Ford Mike Lombardo Ragnar Olson Maninder Singh.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
By Hiranmayi Pai Neeraj Jain
SPYWARE Presented by The State Security Office November 17, 2004.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Threats To A Computer Network
Security+ Guide to Network Security Fundamentals, Third Edition
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
How You Can Protect Yourself from Cyber-Attacks Ian G. Harris Department of Computer Science University of California Irvine Irvine, CA USA
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
Chapter Nine Maintaining a Computer Part III: Malware.
Internet safety By Lydia Snowden.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
11 The Ghost In The Browser Analysis of Web-based Malware Reporter: 林佳宜 Advisor: Chun-Ying Huang /3/29.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
By, Anish Shanmugasundaram Yashwanth Sainath Jammi.
The Ghost In The Browser Analysis of Web-based Malware Niels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang and Nagendra Modadugu Google, Inc. The.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
CSCI 6962: Server-side Design and Programming Secure Web Programming.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
What is a Computer Worm? A computer worm is a self- replicating program very similar to a virus. A virus attaches itself and becomes part of another executable.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Proof-Of-Concept: Signature Based Malware Detection for Websites and Domain Administrators - Anant Kochhar.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
Web Application Security ECE ECE Internetwork Security What is a Web Application? An application generally comprised of a collection of scripts.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
All Your iFRAMEs Point to Us Cheng Wei. Acknowledgement This presentation is extended and modified from The presentation by Bruno Virlet All Your iFRAMEs.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Auditing Web Security. Objectives Understand the complexity of Web infrastructure and current trends of Web threat Understand the complexity of Web infrastructure.
What is Spam? d min.
 Keeps data and equipment functioning  Lack of security can expose confidential information and reduce network resources  Can degrade.
Malicious Software.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Powerpoint presentation on Drive-by download attack -By Yogita Goyal.
Computer Security Keeping you and your computer safe in the digital world.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Botnets A collection of compromised machines
Various Types of Malware
Botnets A collection of compromised machines
Risk of the Internet At Home
Chap 10 Malicious Software.
Computer Security.
Chap 10 Malicious Software.
Presentation transcript:

Web Based Attacks SymantecDefense Fantastic Four Casey Ford Mike Lombardo Ragnar Olson Maninder Singh

Agenda Introduction: Anatomy of Web Attacks Introduction: Anatomy of Web Attacks How do websites get infected? How do websites get infected? Getting onto a user’s computer (automatically) Getting onto a user’s computer (automatically) Getting onto a user’s computer (with a little help from the user) Getting onto a user’s computer (with a little help from the user) What happens on the computer? What happens on the computer? What you can do to protect yourself What you can do to protect yourself Conclusion Conclusion Questions Questions

Anatomy of Web Attacks (How websites get attacked)

Anatomy of Web Attacks 1. Attacker breaks into a legitimate website and posts malware Malware is no longer exclusive to malicious Web sites. Today it is common place for legitimate mainstream Web sites to act as parasitic hosts that serve up malware to their unsuspecting visitors. 2. Attacking end-user machines. Malware on a Web site makes its way down on to a user’s machine when that user visits the host Web site. “Drive-by-download” – happens automatically with no user interaction required Additional techniques which do require some input from the user, but in practice are equally, if not more so, effective. 3. Leveraging end user machines for malicious activity. The most malicious activities begin once new malware has established a presence on a user’s machine.

Anatomy of Web Attacks Source: Web Based Attacks, Symantec 2009

How Do Websites Get Infected? It used to be malware was only on illicit sites such as adult material and pirated software It used to be malware was only on illicit sites such as adult material and pirated software –Targeted users looking with short-term needs Today legitimate and mainstream websites are targets Today legitimate and mainstream websites are targets –Complexity of websites - combination of many different Web content sources, dynamically constructed using many different scripting technologies, plug-in components, and databases Web advertisements Web advertisements –Usually third party –A webpage can have content coming from different domains

Chicago Tribune Home Page

How are legitimate Web sites compromised? 1. SQL Injection Attacks –Finding flaws in Web sites that have databases running behind them. –A poorly validated input field in a Web input form may allow an attacker to insert additional SQL instructions which may then be passed directly into the backend database –Trojan.Asprox and IFRAME Tag 2. Malicious Advertisements –Many Web sites today display advertisements hosted by third- party advertising sites –Volume of ads published automatically makes detection difficult –Random appearances further compounds the detection 3. Search Engine Result Redirection 4. Attacks on the backend virtual hosting companies 5. Vulnerabilities in the Web server or forum hosting software 6. Cross-site scripting (XSS) attacks

GETTING ONTO A USER’S COMPUTER (AUTOMATICALLY)

Source: Web Based Attacks, Symantec 2009

Automatic Attack Exposure Techniques used to deliver malware from Websites to a users computer. Techniques used to deliver malware from Websites to a users computer. Exposure Exposure –Browsing a website –No user interaction is required –Executable content is automatically downloaded

Typical Sequence of Events Attacker compromises a good website Attacker compromises a good website Visit website Visit website Redirected to a bad website Redirected to a bad website Corrupt code is downloaded Corrupt code is downloaded Installed on the computer Installed on the computer Corrupt software takes control Corrupt software takes control

Attack Toolkits Profiling the victim Profiling the victim –Based on the Specific Operating System –Browser Type Timing the attack Timing the attack –Attack only once every hour Geographical variances Geographical variances –Regional attacks on users Selective use of vulnerabilities Selective use of vulnerabilities –Based on the protection of the users Random attacks Random attacks –No pattern, no reason, unpredictable

“Click Jacking” The click of link executes the attacker’s code The click of link executes the attacker’s code Often leading the person to a malicious website. Often leading the person to a malicious website.

Frequency of Attacks Thousands of times every day Thousands of times every day In 2008 In 2008 –18 million infection attempts –Continues to increase

GETTING ONTO A USER’S COMPUTER (WITH A LITTLE HELP FROM THE USER)

Social Engineering Source: Web Based Attacks, Symantec 2009 People are tricked into performing actions they would not otherwise want to perform

Types of Social Engineering Attacks Fake Codec Fake Codec Malicious Peer-to-Peer (P2P) Files Malicious Peer-to-Peer (P2P) Files Malicious Advertisements Malicious Advertisements Fake Scanner Web Page Fake Scanner Web Page Blog Spam Blog Spam Other Attack Vectors Other Attack Vectors

Fake Codec User is prompted to install a missing codec User is prompted to install a missing codec Codec is actually malware code Codec is actually malware code –Usually a trojan horse

Malicious Peer-to-Peer (P2P) Files Malware authors bind content into popular applications Malware authors bind content into popular applications –Files named after celebrities, popular bands –Uploaded to popular P2P sites where they are downloaded by unsuspecting users Openly available how-to materials on the internet Openly available how-to materials on the internet –Details how to build and distribute malware –Pay-Per-Install malware (Guide) Guide

Malicious Advertisements Malware authors advertise their fake codecs to unsuspecting users Malware authors advertise their fake codecs to unsuspecting users –Use legitimate advertising channels –Sponsored links pointed to pages masked as legitimate downloads for official versions of software Advertising providers have taken notice, but this is difficult to mitigate owing to volume Advertising providers have taken notice, but this is difficult to mitigate owing to volume

Fake Scanner Web Page Create a web site or product that misrepresents the truth Create a web site or product that misrepresents the truth –JavaScript pop-ups notifying of false need to install operating system updates Source: Web Based Attacks, Symantec 2009 –Tools that claim to scan for and remove adult images, etc.

Blog Spam Alluring links posted on blogs Alluring links posted on blogs –Links embedded in blog comments –Direct users to sites that leverage social engineering tricks or browser exploits to spread malware

Other Attack Vectors Spam Spam – s contain links directing people to drive by download, fake scanner/codec, and malware sites Pirated software sites Pirated software sites –Pirated versions of software are bundled with or comprised solely of trojan horses

WHAT HAPPENS TO YOUR COMPUTER?

What happens to your computer? Leading Malware: Misleading Applications Leading Malware: Misleading Applications –Also referred to as rogueware, scareware Intentionally misrepresent security issues Intentionally misrepresent security issues Social engineering to entice product purchase Social engineering to entice product purchase Malware activities: Malware activities: –Prevent users from navigating to legitimate antivirus vendors –Prevents itself from being uninstalled –Pops up warnings that the system is infected and that the software needs to be purchased in order to clean system

Top 10 Misleading Software Thousands of individuals defrauded Thousands of individuals defrauded 23 M attempts in last 6 months of M attempts in last 6 months of % => $11M revenue 1% => $11M revenue Polymorphing tools Polymorphing tools –Repackages itself –Hard to detect Source: Web Based Attacks, Symantec 2009

Misleading Software Example Source: Web Based Attacks, Symantec 2009

Other Malware Activities Stealing personal information Stealing personal information –Keyloggers capture username, passwords for various sites capture username, passwords for various sites –Banking, Shopping, Gaming and accounts Capture credit card numbers Capture credit card numbers Botnet proliferation Botnet proliferation –Remote control to coordinate large scale attacks

WHAT CAN YOU DO TO PROTECT YOURSELF?

Software Protection Update and Patch Software Update and Patch Software –Get latest OS, Browser, Application patches –Browswer Plug-in updates often forgotten Endpoint Protection Software Endpoint Protection Software –Heuristic File Protection –Intrusion prevention system – prevent drive by –Behavioral monitoring Update Protection Software Subscription Update Protection Software Subscription –70000 virus variants possible in a week

Behavioral Protection Be Suspicious Be Suspicious –Avoid things that seem too good to be true –Use safe search functionality in browsers Adopt Strong Password Policy Adopt Strong Password Policy –Use mixture of letters, number, and symbols –Change passwords frequently –Use unique passwords for different sites Prevention is the key Prevention is the key –Reduce or Eliminate the Vulnerability –Adaptive experienced based techniques –Be proactive in protecting systems –Cheaper to prevent than the repair infected systems

FINAL THOUGHTS

Conclusion IT Managers and end users must be Vigilant IT Managers and end users must be Vigilant Signature based protection software alone are not enough to protect systems Signature based protection software alone are not enough to protect systems Protection strategy must be evolving to react to new threats and vulnerabilities Protection strategy must be evolving to react to new threats and vulnerabilities

Questions?