Presentation is loading. Please wait.

Presentation is loading. Please wait.

Bypassing malware detection mechanisms in online banking Jakub Kałużny Mateusz Olejarka CONFidence, 25.05.2015.

Similar presentations


Presentation on theme: "Bypassing malware detection mechanisms in online banking Jakub Kałużny Mateusz Olejarka CONFidence, 25.05.2015."— Presentation transcript:

1 Bypassing malware detection mechanisms in online banking Jakub Kałużny Mateusz Olejarka CONFidence, 25.05.2015

2 Pentesters @ SecuRing Ex-developers Experience with: E-banking and mobile banking systems Multi-factor and voice recognition authentication Malware post mortem Who are we? @j_kaluzny@molejarka

3 Intro Why this topic? How it’s done? Will it blend? Attack vectors Recommendation Q&A* Agenda

4 INTRO

5 AVs are not reliable Users are lazy Market gap for new solutions A lot of money Why this topic ?

6 Interaction with browser Web injects Other? What it does Steals credentials Changes transaction data Automates attacks How malware works? zeus spyeye carberp citadel zitmo vbclip banatrix carbanak eblaster bugat torpig hiloti gozi

7 Aim: Detect malware presence What is online malware detection ? BACKEND WEB SERVER BROWSER USER MALWARE HTTP TRANSACTIONS signatures fingerprint User/browser behaviour fraud detection system Action: drop or mark as compromised (JS)

8 Malware detection methods: HTTP response signature Browser fingerprint User/browser behavior Server-side behavioral methods Fraud detection system What are the limits ? marketing magic auditability

9 We do not represent any vendor We want to show architecture failures implementation errors We want to talk about what can be done What is the purpose of this report?

10 ATTACK VECTORS

11 Our approach BACKEND WEB SERVER BROWSER USER MALWARE HTTP TRANSACTIONS feed analyze JS analyze traffic analyze response

12 HTTP traffic First idea clean machine action system infected machine action

13 HTTP traffic + JS analysis Going through… clean machine action system infected machine action + js analysis: Different paths Different subdomains Different data format (e.g. base64) Encryption (e.g. rsa)

14 Almost there… clean machine action system infected machine action

15 If it bleeds, we can kill it clean machine action system infected machine action BYPASSED!

16 Architecture problem user action system anti malware magic red light green light Words of wisdom: adverse inference

17 Malware spotted! user action system anti malware magic red light Who sends the alert ? login: user1 time: … behaviour: suspicious login: user2?

18 First things first user action system anti malware magic red light JavaScript slowing your page ? BYPASSED!

19 Security by obscurity malware detection JavaScript eval Simple obfuscation – base64, hex rsa encryption signatures reasoning engine Web Service rsa public key

20 Signatures server-side browserserver website A please HTML + JS malware detection Fragments of website A Hey, your website A is webinjected ! regexp for website A

21 Signatures client-side browserserver website A please HTML + JS malware detection Hash of web injects signatures content web injects signatures Leaks your malware signatures The output is your weakness

22 CONCLUSIONS

23 Buy an anti-malware box? Ask for technical details Request live demo Better call your crew Trust, but verify Conclusions - banks

24 Online malware detection is a good path, behavioral systems are a future of ITsec But they are still based on the old HTTP + HTML + JS stack Think about architecture and implementation Conclusions – vendors

25 We can analyze and dissect your solution as well, or help you establish one. Interested? -> malware@securing.pl or antimalware@securing.pl What’s next?

26 Q&A*  And now a discussion :)

27 Thank You ! jakub.kaluzny@securing.pl mateusz.olejarka@securing.pl


Download ppt "Bypassing malware detection mechanisms in online banking Jakub Kałużny Mateusz Olejarka CONFidence, 25.05.2015."

Similar presentations


Ads by Google