45
So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen [email protected] Network Security Analyst, Washington University in St. Louis http://nso.wustl.edu/presentations/ Copyright Brian Allen 2009. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen [email protected] Network Security Analyst,

Embed Size (px)

Citation preview

Page 1: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,

So Your Computer is Infected,Now What?

STC/STS Tech Training3:00-4:00, Tuesday, August 18, 2009

Brian Allen [email protected]

Network Security Analyst,Washington University in St. Louis

http://nso.wustl.edu/presentations/

Copyright Brian Allen 2009. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying

is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Page 2: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,

NSS

NSO

Business School

Law School

Arts & Sciences

Medical School

Engineering School

Internets

Decentralized Campus NetworkNSS = Network Services and SupportNSO = Network Security Office

Library

Social Work

Art & Architecture

IS&T

Page 3: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,

Tools

• SecCheck• Symantec Endpoint AV• Ultimate Boot CD for Windows• Knoppix Boot CD• TrendMicro Online Scan• Sysinternal Tools• SpyBot Search and Destroy-Advanced Mode• Clean It By Hand

Page 4: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 5: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 6: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 7: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 8: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 9: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,

We Interrupt This NSO Presentation For An Important

Security Announcement

Page 10: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 11: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 12: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,

Knoppix

• Self contained and complete OS• Will boot even if no hard drive• Linux (command line) with a nice gui• Knoppix has been around since 2000• Popular in the security community• There are other Linux Live CDs• ClamAV or F-Prot are free AV options

Page 13: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 14: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 15: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 16: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,

Sysinternals Tools I like

• Process Explorer• Autoruns• Process Monitor• PSTools• TCPView• RootkitRevealer

Page 17: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 18: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 19: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,

Art of Cleaning It By Hand

• Favorite malware hideouts:c:\windows\system32, c:\windows\system, c:\windows\system32\drivers

• Find create and modify timestamps• Start from that date look for more badness• Look at the binary file attributes • Rename or move each file as you go• Purge every Temp directory• Reboot, repeat

Page 20: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,

Current Threats

• Torpig, • Mebroot - Sinowal• Conficker worm• Cutwail• Rustock• Grum virus• BlackEnergy - HTTP-based botnet used

primarily for DDoS attacks

Page 21: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,

Security Websites

• ThreatExpert Sandbox• Virus Total• Sunbelt CWSandbox• Anubis Sandbox• Norman Sandbox

Page 22: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 23: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 24: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 25: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 26: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 27: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 28: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 29: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 30: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 31: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 32: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,

Norman Email• message.htm-MALWARE : INFECTED with W32/Malware (Signature: MyDoom)

• [ DetectionInfo ]• * Filename: C:\analyzer\scan\message.htm-MALWARE.• * Signature name: MyDoom.L@mm.• * Executable type: Application.• • [ Changes to filesystem ]• * Creates file C:\WINDOWS\TEMP\zincite.log.• • [ Changes to registry ]• * Accesses Registry key "HKLM\Software\Microsoft\Daemon".• • [ Network services ]• * Looks for an Internet connection.• • [ Process/window information ]• * Creates process "services.exe"".• * Will automatically restart after boot (I'll be back...).

Page 33: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,

Case Study

• Dear user,

We have received reports that your account has been used to send a large amount of spam messages during the last week. We suspect that your computer had been infected by a recent virus and now contains a hidden proxy server.

Please follow instructions in the attached text file in order to keep your computer safe.

Best wishes, The WUSTL.EDU team.

Page 34: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 35: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,

NO! DON’T CLICK ON IT!

Page 36: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,

So Your Computer Is Infected, Now What?

Page 37: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 38: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 39: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 40: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 41: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 42: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 43: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,
Page 44: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,

Clean vs Rebuild? Pros/Cons

• Discussion

Page 45: So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen ballen@wustl.edu Network Security Analyst,

Books

• Cryptonomicon – fiction• Cuckoo's egg - nonfiction• Safaribooksonline.com – free for wustl.edu