40
Network Security - ISA 656 Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007

Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Network Security - ISA 656

Viruses, Trojan Horses, and Worms

Angelos Stavrou

September 11, 2007

Page 2: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Worms vs Viruses

Worms

Worms vs VirusesWorms in ScienceFiction

Viruses

Worms

Classic Worms

Modern Worms

Worm SpreadPatterns

Detection andPrevention

2 / 40

■ What are they?

■ How do they spread?

■ What can be done about them?

Page 3: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Worms in Science Fiction

Worms

Worms vs VirusesWorms in ScienceFiction

Viruses

Worms

Classic Worms

Modern Worms

Worm SpreadPatterns

Detection andPrevention

3 / 40

“Let me put it another way. You have a computerwith an auto-dial phone link. You put the VIRUSprogram into it and it starts dialing phonenumbers at random until it connects to anothercomputer with an auto-dial. The VIRUS programthen injects itself into the new computer. Orrather, it reprograms the new computer with aVIRUS program of its own and erases itself fromthe first computer. The second machine thenbegins to dial phone numbers at random until itconnects with a third machine. . . .

When Harlie Was One, David Gerrold, 1972

Page 4: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Viruses

Worms

Worms vs VirusesWorms in ScienceFiction

Viruses

Worms

Classic Worms

Modern Worms

Worm SpreadPatterns

Detection andPrevention

4 / 40

■ “Infected” program (or floppy)

■ When program is executed, it performs itsnormal function

■ It also infects some other programs

■ It may carry an extra “payload” that performsother functions

Page 5: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Worms

Worms

Worms vs VirusesWorms in ScienceFiction

Viruses

Worms

Classic Worms

Modern Worms

Worm SpreadPatterns

Detection andPrevention

5 / 40

■ Similar to viruses, but they spread between

machines

■ Some are fully automatic; some require manualintervention to spread

■ Some exploit bugs; others use socialengineering

■ Name from John Brunner’s The Shockwave

Rider, 1975

Page 6: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Early Worms

Worms

Classic Worms

Early Worms

Christmas CardVirus

What Users Saw

What Happened

Essential Elements

The Damage

The Internet Worm

Characteristics

Attack Vectors

Sendmail Back Door

Buffer OverflowBuffer OverflowsShouldn’t Happen!

Password Guessing

Pre-AuthenticatedLogin

Spread Patterns

Hiding

Essential Elements

Modern Worms

Worm SpreadPatterns

Detection andPrevention

6 / 40

■ IBM Christmas Card “Virus”, December 1987

■ Morris Internet Worm, November 1988

■ Most worms since then have emulated one orboth of those

Page 7: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Christmas Card Virus

Worms

Classic Worms

Early Worms

Christmas CardVirus

What Users Saw

What Happened

Essential Elements

The Damage

The Internet Worm

Characteristics

Attack Vectors

Sendmail Back Door

Buffer OverflowBuffer OverflowsShouldn’t Happen!

Password Guessing

Pre-AuthenticatedLogin

Spread Patterns

Hiding

Essential Elements

Modern Worms

Worm SpreadPatterns

Detection andPrevention

7 / 40

■ Infected EARN, BITNET, and IBM’s VNET

■ (Old, pre-TCP/IP network for IBMmainframes)

■ Spread by social engineering

Page 8: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

What Users Saw

Worms

Classic Worms

Early Worms

Christmas CardVirus

What Users Saw

What Happened

Essential Elements

The Damage

The Internet Worm

Characteristics

Attack Vectors

Sendmail Back Door

Buffer OverflowBuffer OverflowsShouldn’t Happen!

Password Guessing

Pre-AuthenticatedLogin

Spread Patterns

Hiding

Essential Elements

Modern Worms

Worm SpreadPatterns

Detection andPrevention

8 / 40

X

X X

X X X

X X X X

X X X X X

X X X X X X

X X X X X X X

X

X

X

A very happy Christmas and my best wishes for the

next year. Let this run and enjoy yourself.

Browsing this file is no fun at all.

Just type Christmas.

Page 9: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

What Happened

Worms

Classic Worms

Early Worms

Christmas CardVirus

What Users Saw

What Happened

Essential Elements

The Damage

The Internet Worm

Characteristics

Attack Vectors

Sendmail Back Door

Buffer OverflowBuffer OverflowsShouldn’t Happen!

Password Guessing

Pre-AuthenticatedLogin

Spread Patterns

Hiding

Essential Elements

Modern Worms

Worm SpreadPatterns

Detection andPrevention

9 / 40

■ A file transfer mechanism (not quite email,though it could have been) delivered a shortscript to users

■ It was written in REXX, a shell script-likelanguage for IBM’s VM/CMS system

■ The script displayed the Christmas card; it alsolooked through the (equivalent of) the user’semail alias file and the file transfer log

■ It transmitted a copy of itself to anyusernames it found

■ People trusted it, because it was coming froma regular correspondent. . .

Page 10: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Essential Elements

Worms

Classic Worms

Early Worms

Christmas CardVirus

What Users Saw

What Happened

Essential Elements

The Damage

The Internet Worm

Characteristics

Attack Vectors

Sendmail Back Door

Buffer OverflowBuffer OverflowsShouldn’t Happen!

Password Guessing

Pre-AuthenticatedLogin

Spread Patterns

Hiding

Essential Elements

Modern Worms

Worm SpreadPatterns

Detection andPrevention

10 / 40

■ Self-replicating executable

■ Apparently from a trusted source

■ Request that the recipient execute the program

■ Using the email alias file to find new victims

■ These characterize most current email worms

Page 11: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

The Damage

Worms

Classic Worms

Early Worms

Christmas CardVirus

What Users Saw

What Happened

Essential Elements

The Damage

The Internet Worm

Characteristics

Attack Vectors

Sendmail Back Door

Buffer OverflowBuffer OverflowsShouldn’t Happen!

Password Guessing

Pre-AuthenticatedLogin

Spread Patterns

Hiding

Essential Elements

Modern Worms

Worm SpreadPatterns

Detection andPrevention

11 / 40

■ The worm itself wasn’t malicious

■ However, it had exponential growth patterns

■ It clogged servers, communication paths, spooldirectories, etc.

■ In other words, it was an unintentional denialof service attack

Page 12: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

The Internet Worm

Worms

Classic Worms

Early Worms

Christmas CardVirus

What Users Saw

What Happened

Essential Elements

The Damage

The Internet Worm

Characteristics

Attack Vectors

Sendmail Back Door

Buffer OverflowBuffer OverflowsShouldn’t Happen!

Password Guessing

Pre-AuthenticatedLogin

Spread Patterns

Hiding

Essential Elements

Modern Worms

Worm SpreadPatterns

Detection andPrevention

12 / 40

■ Got much more mainstream publicity

■ Estimated to have taken out 6000 hosts —10% of the Internet

■ Arguably, the first time the Internet made theevening news

Page 13: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Characteristics

Worms

Classic Worms

Early Worms

Christmas CardVirus

What Users Saw

What Happened

Essential Elements

The Damage

The Internet Worm

Characteristics

Attack Vectors

Sendmail Back Door

Buffer OverflowBuffer OverflowsShouldn’t Happen!

Password Guessing

Pre-AuthenticatedLogin

Spread Patterns

Hiding

Essential Elements

Modern Worms

Worm SpreadPatterns

Detection andPrevention

13 / 40

■ Much more sophisticated

■ Exploited buggy code — spread without

human intervention

■ Exploited trust patterns among computers

■ Multiple attack vectors

■ Multiple architectures (Vax and Sun 3)

■ Intended to demonstrate the insecurity of theInternet. . .

Page 14: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Attack Vectors

Worms

Classic Worms

Early Worms

Christmas CardVirus

What Users Saw

What Happened

Essential Elements

The Damage

The Internet Worm

Characteristics

Attack Vectors

Sendmail Back Door

Buffer OverflowBuffer OverflowsShouldn’t Happen!

Password Guessing

Pre-AuthenticatedLogin

Spread Patterns

Hiding

Essential Elements

Modern Worms

Worm SpreadPatterns

Detection andPrevention

14 / 40

■ Back door in sendmail

■ Buffer overflow in fingerd

■ Password-guessing

■ Pre-authenticated login via rsh

Page 15: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Sendmail Back Door

Worms

Classic Worms

Early Worms

Christmas CardVirus

What Users Saw

What Happened

Essential Elements

The Damage

The Internet Worm

Characteristics

Attack Vectors

Sendmail Back Door

Buffer OverflowBuffer OverflowsShouldn’t Happen!

Password Guessing

Pre-AuthenticatedLogin

Spread Patterns

Hiding

Essential Elements

Modern Worms

Worm SpreadPatterns

Detection andPrevention

15 / 40

■ The author of sendmail wanted continuedaccess to the production version installed atBerkeley

■ The system administrator wouldn’t permit this

■ He put a deliberate back door into sendmail,to give himself continued access

■ Production systems shipped with this optionenabled. . .

Page 16: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Buffer Overflow

Worms

Classic Worms

Early Worms

Christmas CardVirus

What Users Saw

What Happened

Essential Elements

The Damage

The Internet Worm

Characteristics

Attack Vectors

Sendmail Back Door

Buffer OverflowBuffer OverflowsShouldn’t Happen!

Password Guessing

Pre-AuthenticatedLogin

Spread Patterns

Hiding

Essential Elements

Modern Worms

Worm SpreadPatterns

Detection andPrevention

16 / 40

■ The finger daemon call gets(), anow-deprecated library routine

■ Unlike fgets(), there was no buffer lengthparameter

■ By sending a long-enough string over thenetwork as input, the attacking program1. Injected some assembler-language code,

and

2. Overwrote the return address in the stackframe so that gets() branched to thatcode instead of back to the caller

Page 17: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Buffer Overflows Shouldn’t Happen!

Worms

Classic Worms

Early Worms

Christmas CardVirus

What Users Saw

What Happened

Essential Elements

The Damage

The Internet Worm

Characteristics

Attack Vectors

Sendmail Back Door

Buffer OverflowBuffer OverflowsShouldn’t Happen!

Password Guessing

Pre-AuthenticatedLogin

Spread Patterns

Hiding

Essential Elements

Modern Worms

Worm SpreadPatterns

Detection andPrevention

17 / 40

“The first principle was security: . . . Aconsequence of this principle is that everyoccurrence of every subscript of every subscriptedvariable was on every occasion checked at runtime against both the upper and the lowerdeclared bounds of the array. . . . I note with fearand horror that even in 1980, language designersand users have not learned this lesson. In anyrespectable branch of engineering, failure toobserve such elementary precautions would havelong been against the law.”

Turing Award Lecture, C.A.R. Hoare

Page 18: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Password Guessing

Worms

Classic Worms

Early Worms

Christmas CardVirus

What Users Saw

What Happened

Essential Elements

The Damage

The Internet Worm

Characteristics

Attack Vectors

Sendmail Back Door

Buffer OverflowBuffer OverflowsShouldn’t Happen!

Password Guessing

Pre-AuthenticatedLogin

Spread Patterns

Hiding

Essential Elements

Modern Worms

Worm SpreadPatterns

Detection andPrevention

18 / 40

■ It looked up a list of usernames in thepassword file

■ It used easy transformations of the login nameand the user’s name, plus a dictionary ofcommon passwords

■ Ironic note: the author of the worm, Robert T.Morris, drew upon a technique first describedby his father, Robert H. Morris. . .

Page 19: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Pre-Authenticated Login

Worms

Classic Worms

Early Worms

Christmas CardVirus

What Users Saw

What Happened

Essential Elements

The Damage

The Internet Worm

Characteristics

Attack Vectors

Sendmail Back Door

Buffer OverflowBuffer OverflowsShouldn’t Happen!

Password Guessing

Pre-AuthenticatedLogin

Spread Patterns

Hiding

Essential Elements

Modern Worms

Worm SpreadPatterns

Detection andPrevention

19 / 40

■ Exploit trust patterns: /etc/hosts.equivand per-user .rhosts files list trustedmachines

■ If machine A trusts machine B (if only for aparticular user), machine B usually trustsmachine A

■ This provided two things: an infection pathand a list of other machines to attack

Page 20: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Spread Patterns

Worms

Classic Worms

Early Worms

Christmas CardVirus

What Users Saw

What Happened

Essential Elements

The Damage

The Internet Worm

Characteristics

Attack Vectors

Sendmail Back Door

Buffer OverflowBuffer OverflowsShouldn’t Happen!

Password Guessing

Pre-AuthenticatedLogin

Spread Patterns

Hiding

Essential Elements

Modern Worms

Worm SpreadPatterns

Detection andPrevention

20 / 40

■ It looked at a variety of sources to find othermachines to attack:◆ rsh/rlogin trust sources

◆ Machines listed in .forward files

■ Routers (in 1988, most routers weregeneral-purpose computers)

■ Randomly-generated addresses on neighboringnets

Page 21: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Hiding

Worms

Classic Worms

Early Worms

Christmas CardVirus

What Users Saw

What Happened

Essential Elements

The Damage

The Internet Worm

Characteristics

Attack Vectors

Sendmail Back Door

Buffer OverflowBuffer OverflowsShouldn’t Happen!

Password Guessing

Pre-AuthenticatedLogin

Spread Patterns

Hiding

Essential Elements

Modern Worms

Worm SpreadPatterns

Detection andPrevention

21 / 40

■ The worm used a variety of techniques to hide

■ It was named sh

■ It forked frequently, to change processID

■ It unlinked its own executable

■ Text strings were (lightly) encrypted

Page 22: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Essential Elements

Worms

Classic Worms

Early Worms

Christmas CardVirus

What Users Saw

What Happened

Essential Elements

The Damage

The Internet Worm

Characteristics

Attack Vectors

Sendmail Back Door

Buffer OverflowBuffer OverflowsShouldn’t Happen!

Password Guessing

Pre-AuthenticatedLogin

Spread Patterns

Hiding

Essential Elements

Modern Worms

Worm SpreadPatterns

Detection andPrevention

22 / 40

■ Self-spreading, via buggy code

■ Self-spreading, via trust patterns

■ Combination of directed and random targetsfor next attack

■ Stealth characteristics

Page 23: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Modern Worms

Worms

Classic Worms

Modern Worms

Modern Worms

Stealthiness

Trust PatternsSpreading ViaBuggy Code

The Slammer Worm

The Welchi Worm

Was it a Good Idea?

Worm Effects

Sobig.F

Worm SpreadPatterns

Detection andPrevention

23 / 40

■ Most resemble either the Christmas card wormor the Internet worm

■ Today’s email worms try to trick the user withtempting Subject: lines — nude pictures,software “updates”, etc.

■ A notable one: “Osama bin Laden Captured”,with an attached “video”

■ Some pose as anti-virus software updates. . .

■ Can get through many firewalls

Page 24: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Stealthiness

Worms

Classic Worms

Modern Worms

Modern Worms

Stealthiness

Trust PatternsSpreading ViaBuggy Code

The Slammer Worm

The Welchi Worm

Was it a Good Idea?

Worm Effects

Sobig.F

Worm SpreadPatterns

Detection andPrevention

24 / 40

■ Deceptive filenames for the attachments

■ Add a phony extension before the real one:kournikova.jpg.exe

■ Hide in a .zip file

■ Hide in an encrypted .zip file, with thepassword in the body of the email

■ Many strategies for hiding on hosts, includingstrange filenames, tinkering with the registry,etc.

Page 25: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Trust Patterns

Worms

Classic Worms

Modern Worms

Modern Worms

Stealthiness

Trust PatternsSpreading ViaBuggy Code

The Slammer Worm

The Welchi Worm

Was it a Good Idea?

Worm Effects

Sobig.F

Worm SpreadPatterns

Detection andPrevention

25 / 40

■ Preferentially attack within the same network— may be on the inside of a firewall

■ Exploit shared disks

■ Mass-mailing worms rely on apparenttrustworthy source

Page 26: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Spreading Via Buggy Code

Worms

Classic Worms

Modern Worms

Modern Worms

Stealthiness

Trust PatternsSpreading ViaBuggy Code

The Slammer Worm

The Welchi Worm

Was it a Good Idea?

Worm Effects

Sobig.F

Worm SpreadPatterns

Detection andPrevention

26 / 40

■ Exploit many different (Windows) bugs

■ Can spread much more quickly

■ Slammer spread about as far is it could in just15 minutes, and clogged much of the Internet

Page 27: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

The Slammer Worm

Worms

Classic Worms

Modern Worms

Modern Worms

Stealthiness

Trust PatternsSpreading ViaBuggy Code

The Slammer Worm

The Welchi Worm

Was it a Good Idea?

Worm Effects

Sobig.F

Worm SpreadPatterns

Detection andPrevention

27 / 40

■ Exploited a bug in Microsoft’s SQL server

■ Used UDP, not TCP — a single 376-bytepacket to UDP port 1434 could infect amachine!

■ Use of UDP instead of TCP let it spread muchfaster — one packet, from a forged sourceaddress, instead of a three-way handshake,payload transmission, and a three-packetclose() sequence

■ No direct damage, but it clogged network linksvery quickly

Page 28: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

The Welchi Worm

Worms

Classic Worms

Modern Worms

Modern Worms

Stealthiness

Trust PatternsSpreading ViaBuggy Code

The Slammer Worm

The Welchi Worm

Was it a Good Idea?

Worm Effects

Sobig.F

Worm SpreadPatterns

Detection andPrevention

28 / 40

■ Attempted to do good

■ Used the same Microsoft RPC bug as theNachi worm

■ Removes certain other worm infections

■ Installs Microsoft’s fix for the hole

■ Deletes itself after January 1, 2004

Page 29: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Was it a Good Idea?

Worms

Classic Worms

Modern Worms

Modern Worms

Stealthiness

Trust PatternsSpreading ViaBuggy Code

The Slammer Worm

The Welchi Worm

Was it a Good Idea?

Worm Effects

Sobig.F

Worm SpreadPatterns

Detection andPrevention

29 / 40

■ No — unauthorized

■ No — not well-tested

■ No — generates a lot of network traffic, morethan the worm it was trying to cure

Page 30: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Worm Effects

Worms

Classic Worms

Modern Worms

Modern Worms

Stealthiness

Trust PatternsSpreading ViaBuggy Code

The Slammer Worm

The Welchi Worm

Was it a Good Idea?

Worm Effects

Sobig.F

Worm SpreadPatterns

Detection andPrevention

30 / 40

■ Seriously clogged networks

■ Slammer affected some ATM and air trafficcontrol networks

■ CSX Railroad’s signaling network was affected

Page 31: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Sobig.F

Worms

Classic Worms

Modern Worms

Modern Worms

Stealthiness

Trust PatternsSpreading ViaBuggy Code

The Slammer Worm

The Welchi Worm

Was it a Good Idea?

Worm Effects

Sobig.F

Worm SpreadPatterns

Detection andPrevention

31 / 40

■ Part of a family of worms

■ High-quality code

■ Primary purpose: spamming

■ Turned infected machines into spambots

■ Marked the turning point in worm design —now, it’s done for profit instead of fun

Page 32: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Spread Patterns

Worms

Classic Worms

Modern Worms

Worm SpreadPatterns

Spread Patterns

Exponential Growth

There’s a Ceiling

Warhol Worms

Scanning Patterns

Detection andPrevention

32 / 40

■ Worms tend to exhibit exponential growth

patterns

■ They start slow, but get very big quite quickly

■ Equation: y = ekt, where t is time

■ If k is small, it spreads more slowly — but itstill grows

Page 33: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Exponential Growth

Worms

Classic Worms

Modern Worms

Worm SpreadPatterns

Spread Patterns

Exponential Growth

There’s a Ceiling

Warhol Worms

Scanning Patterns

Detection andPrevention

33 / 40

6 7 8 9 10

0

20000

40000

60000

80000

100000

120000

140000

160000 y=e^(1.2*x) (1-10,1001)

y=e^(x) (1-10,1001)

y=e^(0.8*x) (1-10,1001)

Page 34: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

There’s a Ceiling

Worms

Classic Worms

Modern Worms

Worm SpreadPatterns

Spread Patterns

Exponential Growth

There’s a Ceiling

Warhol Worms

Scanning Patterns

Detection andPrevention

34 / 40

■ Worms run out of vul-nerable hosts

■ Doesn’t matter much ifa machine is infectedtwice (and worms oftenprevent that)

■ Actual graph is a logistic

curve: y = a1+me−t/τ

1+ne−t/τ

Page 35: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Warhol Worms

Worms

Classic Worms

Modern Worms

Worm SpreadPatterns

Spread Patterns

Exponential Growth

There’s a Ceiling

Warhol Worms

Scanning Patterns

Detection andPrevention

35 / 40

■ “In the future everyone will be famous for 15

minutes” —Andy Warhol, 1960s

■ As we’ve seen, it’s possible for a worm tospread very quickly

■ (Note that this paper was published beforeSlammer hit)

■ Suppose it had a malicious payload.

■ It could do tremendous damage before anyhuman had a chance to react

Page 36: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Scanning Patterns

Worms

Classic Worms

Modern Worms

Worm SpreadPatterns

Spread Patterns

Exponential Growth

There’s a Ceiling

Warhol Worms

Scanning Patterns

Detection andPrevention

36 / 40

■ Older worms used clumsy random scans

■ New ones use different probabilities for localversus remote networks

■ Often have built-in lists of useful IP addressranges

■ Some have exclusion lists for known honeynets

Page 37: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Detecting Worms

Worms

Classic Worms

Modern Worms

Worm SpreadPatterns

Detection andPrevention

Detecting Worms

Encrypted andPolymorphic Worms

Defenses

More Science Fiction

37 / 40

■ How are worms detected?

■ Initially, by honeypots and by people sendingsamples of suspicious code to anti-viruscomapanies

■ A/V companies build worm signatures

■ Signatures are byte patterns that match thatfile

■ Every new worm or worm variant needs its ownsignature, which is why anti-virus scannersneed weekly updates

Page 38: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Encrypted and Polymorphic Worms

Worms

Classic Worms

Modern Worms

Worm SpreadPatterns

Detection andPrevention

Detecting Worms

Encrypted andPolymorphic Worms

Defenses

More Science Fiction

38 / 40

■ Some worms generate variants of themselves

■ Others encrypt much of themselves

■ Anti-virus programs look for complex patternsand/or decryption code

Page 39: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

Defenses

Worms

Classic Worms

Modern Worms

Worm SpreadPatterns

Detection andPrevention

Detecting Worms

Encrypted andPolymorphic Worms

Defenses

More Science Fiction

39 / 40

■ Application firewalls can do anti-wormscanning

■ Good packet filters can deflect many buggycode attacks

■ But — some worms spread from web serversto web browsers, which then go on to attackother web servers

Page 40: Network Security - ISA 656 Viruses, Trojan Horses, and Wormsastavrou/courses/isa_656_F07/... · Viruses, Trojan Horses, and Worms Angelos Stavrou September 11, 2007. Worms vs Viruses

More Science Fiction

Worms

Classic Worms

Modern Worms

Worm SpreadPatterns

Detection andPrevention

Detecting Worms

Encrypted andPolymorphic Worms

Defenses

More Science Fiction

40 / 40

“It’s fun to think about, but it was hell to get outof the system. The guy who wrote it had a fewlittle extra goodies tacked onto it – well, I won’tgo into any detail. I’ll just tell you that he alsowrote a second program, only this one would costyou – it was called VACCINE.

When Harlie Was One, David Gerrold, 1972