All Your iFRAMEs Point to Us Niels provos,Panayiotis mavrommatis - Google Inc Moheeb Abu Rajab, Fabian Monrose - Johns Hopkins University Google Technical.

Slides:



Advertisements
Similar presentations
What is code injection? Code injection is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Alex Crowell, Rutgers University Computer Science and Mathematics Advisor: Prof. Danfeng Yao, Computer Science Department.
By Hiranmayi Pai Neeraj Jain
WebGoat & WebScarab “What is computer security for $1000 Alex?”
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Threats To A Computer Network
Server-Side vs. Client-Side Scripting Languages
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Automated Web Patrol with Strider HoneyMonkeys Present by Zhichun Li.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Web Programming Language Dr. Ken Cosh Week 1 (Introduction)
Norman SecureSurf Protect your users when surfing the Internet.
Presentation by Kathleen Stoeckle All Your iFRAMEs Point to Us 17th USENIX Security Symposium (Security'08), San Jose, CA, 2008 Google Technical Report.
11 The Ghost In The Browser Analysis of Web-based Malware Reporter: 林佳宜 Advisor: Chun-Ying Huang /3/29.
INTRODUCTION TO WEB DATABASE PROGRAMMING
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
M. Taimoor Khan * Java Server Pages (JSP) is a server-side programming technology that enables the creation of dynamic,
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 4 Web technologies: HTTP, CGI, PHP,Java applets)
By, Anish Shanmugasundaram Yashwanth Sainath Jammi.
The Ghost In The Browser Analysis of Web-based Malware Niels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang and Nagendra Modadugu Google, Inc. The.
WEB SECURITY WEEK 3 Computer Security Group University of Texas at Dallas.
Hacker Zombie Computer Reflectors Target.
Niels Provos and Panayiotis Mavrommatis Google Google Inc. Moheeb Abu Rajab and Fabian Monrose Johns Hopkins University 17 th USENIX Security Symposium.
Server-side Scripting Powering the webs favourite services.
14 Publishing a Web Site Section 14.1 Identify the technical needs of a Web server Evaluate Web hosts Compare and contrast internal and external Web hosting.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
1-Vulnerabilities 2-Hackers 3-Categories of attacks 4-What a malicious hacker do? 5-Security mechanisms 6-HTTP Web Servers 7-Web applications attacks.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
HOW WEB SERVER WORKS? By- PUSHPENDU MONDAL RAJAT CHAUHAN RAHUL YADAV RANJIT MEENA RAHUL TYAGI.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Proof-Of-Concept: Signature Based Malware Detection for Websites and Domain Administrators - Anant Kochhar.
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
1 Internet Browsing Vulnerabilities and Security ECE4112 Final Lab Ye Yan Frank Park Scott Kim Neil Joshi.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Universiti Utara Malaysia Chapter 3 Introduction to ASP.NET 3.5.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
1 Welcome to CSC 301 Web Programming Charles Frank.
All Your iFRAMEs Point to Us Cheng Wei. Acknowledgement This presentation is extended and modified from The presentation by Bruno Virlet All Your iFRAMEs.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Sid Stamm, Zulfikar Ramzan and Markus Jokobsson Erkang Xu.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
Search Engine using Web Mining COMS E Web Enhanced Information Mgmt Prof. Gail Kaiser Presented By: Rupal Shah (UNI: rrs2146)
8 Chapter Eight Server-side Scripts. 8 Chapter Objectives Create dynamic Web pages that retrieve and display database data using Active Server Pages Process.
Web Browsing *TAKE NOTES*. Millions of people browse the Web every day for research, shopping, job duties and entertainment. Installing a web browser.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Powerpoint presentation on Drive-by download attack -By Yogita Goyal.
Heat-seeking Honeypots: Design and Experience John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy and Martin Abadi WWW 2011 Presented by Elias P.
Computer Security Keeping you and your computer safe in the digital world.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
1 Chapter 1 INTRODUCTION TO WEB. 2 Objectives In this chapter, you will: Become familiar with the architecture of the World Wide Web Learn about communication.
Chapter 7: Identifying Advanced Attacks
WWW and HTTP King Fahd University of Petroleum & Minerals
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Chap 10 Malicious Software.
Network Security: DNS Spoofing, SQL Injection, ARP Poisoning
Lecture 2 - SQL Injection
Chap 10 Malicious Software.
Exploring DOM-Based Cross Site Attacks
Web Application Development Using PHP
Presentation transcript:

All Your iFRAMEs Point to Us Niels provos,Panayiotis mavrommatis - Google Inc Moheeb Abu Rajab, Fabian Monrose - Johns Hopkins University Google Technical Report 2008 Presented by Vignesh Saravanaperumal

Outline Terminologies Infrastructure and methodology Prevalence of Drive by Download Malware Injection Properties of the Malware Distribution Infrastructure Post Infection Impact Statistics Conclusion Drawbacks

Terminologies IFRAMEs: The tag allows you to create an "internal" frame inside a document. The internal frame can contain any HTML document, and clicking a link inside the causes the target document to be loaded inside the internal frame as well.

Terminologies awglogin

Terminologies Drive by download: I.Silently installs Malware when web page is loaded II.Sites owners are unaware that they are participating in an attack III.Installed malware causes the system to I.Crash II.Steal personal Information's III.Join Botnet Landing Pages: The URLs that initiate drive-by downloads when users visit them Distribution sites: In many cases, the malicious payload is not hosted on the landing site, but instead loaded via an IFRAME or a SCRIPT from a remote site The Remote site that hosts malicious payloads ( malware)

Example 1.The attacker compromises a legitimate web server and inserts a script in a web application. 2. The victim visits the web site that is compromised 3. The web server sends along with the requested page the script the attacker injected 4.A redirection starts from one web server to the other that actually play the part of hop points. 5. After following a number n of redirections the victim reaches the central exploit server. 6.The server sends the exploit script. 7.The attacker gains control over the victim’s system, after exploiting the vulnerability that was targeted. 8. The exploit instructs the browser to visit the malware distribution site. This is, actually, when the drive-by download starts. 9. Malware executables are downloaded. 10. The victim’s computer automatically installs and executes the malicious code

Infrastructure and Methodology

Pre-processing Phase: Mapreduce framework processes billions of pages in parallel and look for features like out of place” IFRAMEs, obfuscated JavaScript, or IFRAMEs and apply machine learning algorithm to extract malicious WebPages. They also take into account the reports given by the users

Infrastructure and Methodology Verification phase: This phase aims to verify whether the extracted (Suspicious) URL from the pre-processing phase is malicious or not. These URL are retrieved once again and run on a virtual machines for 2 minutes and the system behavior is monitored. The final set of malicious URLs are decided by combining the observations from the system’s state changes and anti-virus scanners results on the incoming HTTP responses

Infrastructure and Methodology How to Construct a Malware Distribution Networks? A malware delivery tree consists of the landing site, as the leaf node, and all nodes (i.e., web sites) that the browser visits until it contacts the malware distribution site (the root of the tree).

Infrastructure and Methodology How to Construct a Malware Distribution Networks? Inspecting the Referer header from the recorded successive HTTP requests the browser makes after visiting the landing page. Interpret the HTML and JavaScript content of the pages fetched by the browser and extract all the URLs from the fetched pages. Find the parent page.

Prevalence of Drive by Download Geographic locality:

Prevalence of Drive by Download Browsing Habits of the End user:

Malware Injection There are different methods to inject malware Web Server Security User Contributed Content Advertising Third Party Widgets

Malware Injection Web Server Security The software running on the web server that leads to the malware distribution sites seems to be unpatched and outdated. Malicious content can be inserted as an entry in databases using SQL injection techniques or by taking advantage of vulnerabilities in scripting applications like PHP, ASP, Perl, Python.

Malware Injection User Contributed Content Many web sites contains forums, blogs, bulletin boards that allow users to contribute their own content in the form of comments reviews etc The lack of input validation and checking allows every user to enter arbitrary HTML anywhere in the page user input is requested Attackers can insert code including “iframe” or “script” tags and expose every user seeing the post to the exploit script containing malicious code.

Malware Injection Advertising Advertising is usually achieved by large advertising companies that provide a fixed piece of code to be inserted in web pages This piece of code is not directly controlled by the administrator of the web site that displays the advertisement, which means that the company should be trusted for not providing malicious content Adversaries find this as an attractive way to insert malicious content to popular web sites that display advertisements without making any effort to compromise the web server and search for vulnerabilities

Malware Injection Advertising 2% of the landing sites were delivering malware via advertisements. Ad-delivered through drive-by down-loads appears in short- lived spikes.

Malware Injection Third Party Widgets Third-party widgets are scripts provided by third parties that are commonly used to provide extra functionality to a web site Most of them are accessed through a link contained in an external JavaScript or iframe The link leads to the web site that hosts the widget What can go wrong in this case is that there is a possibility that adversary changes the code of the widget without the knowledge of the web master and serves malicious content

Properties of the Malware Distribution Infrastructure Size of the Malware Distribution Networks IP Space locality Overlapping landing sites Distribution of Malware Binaries Across Domains Relationships Among Different Malware Distribution Networks

Properties of the Malware Distribution Infrastructure Size of the Malware Distribution Networks: There are 3 types of Malware Distribution Network a)Landing site = Distribution Site b)One Landing site and a Distribution Site. c)Many Landing Site and a Distribution Site. userwww.mal.com userSchool.com Worm.com user Ab.com Cdef.com Virus.com

Properties of the Malware Distribution Infrastructure Size of the Malware Distribution Networks:

Properties of the Malware Distribution Infrastructure IP Space Locality: About 70% of the malware distribution sites have IP addresses within 58.* * and 209.* * network ranges. Overlapping landing sites: Let I be a malware Distribution Network 1 Let Xi be the number of landing pages belonging to I Let J be a malware Distribution Network 2 Let Xj be the number of landing pages belonging to J Observations were made in which landing pages with multiple IFRAMEs linking to different malware distribution sites were found.

Properties of the Malware Distribution Infrastructure The distribution of malware across domains: 42% of the distribution sites delivered a single malware binary(single Malware). 3% of the servers were hosting more than 100 binaries A observation was made in which it was seen that there was a number of cases in which same hash was hosted on multiple distribution servers.

Properties of the Malware Distribution Infrastructure Malware hosting infrastructure 9, 430 malware distribution sites were detected 90% of the sites was hosted on a single IP address 10% of the IP address hosted more than one Malware Distribution sites

Post Infection Impact They had given an overview of the collective changes that happen to the system after visiting a malicious URL

Post Infection Impact 1.REGISTRY CHANGES: Whenever a malicious program is installed on a computer, it modifies some of the registry keys in order to gain some privileges on the system. These malicious modified and deleted registry entries can affect the computer’s operations and its performance and can, therefore, cause serious damage BHO indicates that the malware installed a Browser Helper Object that can access privileged state in the browser Preferences means that the browser homepage, default search engine or name server where changed by the malware; Security indicates that malware changed firewall settings or even disabled automatic software updates Startup indicates that the malware is trying to persist across reboots. Process Monitor is a monitoring tool that shows real-time file system, registry and process/thread activity

Post Infection Impact 2.RUNNING PROCESSES AND FILE ACTIVITY: The automatic execution of binaries increases at once the number of running processes. In some cases it is increased in such a length that the system’s processor cannot handle the overhead and “crashes” A common strategy malware follow is the replacement of critical files of the operating system, like Dynamic Link Library files (.dll files) Malicious files masquerade as the original files aiming to inject themselves in running processes and change or manipulate their behavior and consequently the behavior of the linked programs. HDF is a hard disk firewall that prevents malware infection. When activated it blocks unwanted software from storing to the computer

Post Infection Impact 3. NETWORK TRAFFIC: An increased network activity is the result of visiting a malicious web page One of the common tactic for malware to scan for other vulnerable systems in the LAN of the infected host and start sending numerous TCP and UDP packets in order to listen to open ports Wireshark is a network protocol analyzer that enables live capture of network traffic and offline analysis

Post Infection Impact Anti-virus Detection rate: They did not trust the antivirus available in the market

Post Infection Impact April 2007June 2007 Malware binaries Google Methodology Antivirus search engine Undetected Malware binaries Antivirus Search Engine Resulting binaries were considered false positive

Tools used for Malware Injection Mpack: It is a which is used to hide iFRAMEs in compromised sites that redirect the user who visits it to the attacker’s malicious web site El Fiesta: This tool is used for targeting exclusively Adobe PDF formats Neosploit: With functionality similar to the Mpack, it is said to be responsible for injecting malicious code to more than legitimate web sites

Real time Example When you visit this url a malware called Downloader gets downloaded and its function is to connect to the Internet and download other malicious files like Trojan horses or adware. Result: An Internet Explorer window gets opened and displays a Bank of China web page with URL _ html

Statistics 1.3% of incoming search queries to Google Search engine returned atleast one url labeled as malicious in the result page 67% of the malware distribution servers and 64% of the websites that link to them are located in china

Conclusion 66 million url were analyzed in 10 month period Malware Distribution Technique was discussed in detail Relationship among several malware distribution networks Internet is still unsafe for layman Antivirus (even the latest versions) are not dependable

Drawbacks and comments Classification of Malware was missing in anti-virus search results How is the false positive calculated (Threshold Value)? The lifetime of the Malware Distribution Network is not calculated? Does Google contact the owner of the potentially affected host and let them know the findings? Can Google remove such sites from search results that will stop visitors to visit such sites?

Example Click Jacking and Iframe: