Upload
arpit982
View
175
Download
1
Embed Size (px)
Citation preview
MALWARE & ANTI-MALWARE
BY: ARPIT MITTAL
CONTENTSMALWAREPURPOSE OF MALWARESTYPES OF MALWAREVIRUSES, WORMS, TROJANSHOW MALWARE SPREADS
What is Malware? Program or code
• Made up of two words “Malicious” + “Software”.
• 'Malware' is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including • viruses, worms, trojan
horses, spyware, adware etc.
The purpose of Malware
• To subject the user to advertising
The purpose of Malware
• To launch DDoS on another service
The purpose of Malware
• To spread spam.• To commit fraud, such
as identity theft • For kicks (vandalism),
and to spreadFUD (fear, uncertainty, doubt)
• . . . and perhaps other reasons
Types of Malware
But we will be discussing….
MALWARE
WORMSVIRUSES
TROJAN HORSES
What exactly is a Virus? Virus propagates by infecting other
programs• It attaches itself to other
programs or file.• But to propagate a human has to
run an infected program.• A term mistakenly applied to
trojans and worms.• Self-propagating viruses are often
called worms
• Many propagation methods• Insert a copy into every
executable (.COM, .EXE)• Insert a copy into boot sectors of
disks• Infect common OS routines, stay
in memory
First Virus: Creeper
Written in 1971 Infected DEC PDP-10 machines running TENEX OS Jumped from machine to machine over
ARPANET copied its state over, tried to delete old
copy Payload: displayed a message “I’m the creeper, catch me if you can!” Later, Reaper was written to hunt down
Creeper
Types of Viruses Parasitic Virus - attaches itself to executable files as part of their code. Runs whenever the host program runs. Memory-resident Virus - Lodges in main memory as part of the residual operating system.Boot Sector Virus - infects the boot sector of a disk, and spreads when the operating system boots up (original DOS viruses).Stealth Virus - explicitly designed to hide from Virus Scanning programs.Polymorphic - Virus - mutates with every new host to prevent signature detection.
Virus Phases
Dormant - waits for a trigger to start replicatingPropagation - copies itself into other programs of the same type on a computer. Spreads when the user shares a file with another computer. Usually searches a file for it’s own signature before infecting.Triggering - starts delivering payload. Sometimes triggered on a certain date, or after a certain time after infection.Execution - payload function is done. Perhaps it put a funny message on the screen, or wiped the hard disk clean. It may become start the first phase over again.
Okay, So Then What’s a Worm?
Similar to a virus, but propagates itself without human interaction.
Six Components of Worms
1) Reconnaissance2) Specific Attacks3) Command Interface4) Communication Mechanisms5) Intelligence Capabilities6) Unused and Non-attack
Capabilities
Reconnaissance
• Target identification• Active methods
• scanning• Passive methods
• OS fingerprinting• traffic analysis
Specific Attacks
• Exploits• buffer overflows, cgi-bin, etc.• Trojan horse injections
• Limited in targets• Two components
• local, remote
Command Interface
• Interface to compromised system• administrative shell• network client
• Accepts instructions• person• other worm node
communications
Information transfer Protocols Stealth concerns
Intelligence Database
Knowledge of other nodes
Concrete vs. abstract
Complete vs. incomplete
Worm Propagation
Back-Chaining PropagationThe Cheese worm is an example of this type of
propagation where the attacking computer initiates a file transfer to the victim computer. After initiation, the attacking computer can then send files and any payload over to the victim without intervention. Then the victim becomes the attacking computer in the next cycle with a new victim. This method of propagation is more reliable then central source because central source data can be cut off.
Worm Propagation
Central Source Propagation This type of propagation involves a central
location where after a computer is infected it locates a source where it can get code to copy into the compromised computer then after it infects the current computer it finds the next computer and then everything starts over again. And example of the this kind of worm is the 1i0n worm.
Worm Propagation
Autonomous Propagation Autonomous worms attack the victim computer and insert the attack instructions directly into the processing space of the victim computer which results in the next attack cycle to initiate without any additional file transfer. Code Red is an example of this type of worm. The original Morris worm of 1988 was of this nature as well.
Yeah, but what’s a Trojan?
A small program that is designed to appear desirable but is in fact maliciousMust be run by the userDo not replicate themselvesUsed to take over a computer, or steal/delete dataGood Trojans will not:alert the user alter the way their computer works
TROJANS Trojan Horses can install backdoors, perform malicious scanning,
monitor system logins and other malicious activities. Majority of modern trojan horses are backdoor utilities
Sub Seven Netbus Back Orifice
Feature set usually includes remote control, desktop viewing, http/ftp server, file sharing, password collecting, port redirection
Some of these trojan horses can be used as legitimate remote administration tools
Other trojans are mostly programs that steal/delete data or can drop viruses
HOW MALWARE SPREADS…
Just by visiting seemingly harmless website. DRIVE BY DOWNLOAD.
By mails, attachments, links.By physical media.Software vulnerabilities or bugs.
Anti-MALWARE
ANTI-MALWARESoftwares developed to combat all types of Malwares.Are they different from Anti-Viruses?
Viruses were extremely “popular” in the ‘90s, which is when the term “Antivirus” became common.
but today viruses are the minority when it comes to malware.
So, nearly all anti-virus provides security from most of the malwares.
So the difference… ANTI-VIRUS usually deals with the
older, more established threats, such as Trojans, viruses, and worms
protects users from lingering, predictable-yet-still-dangerous malware.
best at crushing malware you might contract from a traditional source, like a USB or an email attachment
ANTI-MALWARE typically focuses on newer
stuff, such as polymorphic malware and malware delivered by zero-day exploits
protects users from the latest, currently in the wild, and even more dangerous threats.
updates its rules faster than antivirus, meaning that it's the best protection against new malware you might encounter while surfing the net
Effective Anti-Malware Strategy
Core ProductResearch TeamUpdate infrastructure
Anti-Malware EngineScanning
• Monitor and examines various locations on computer like hard disk, registry.
• If change has been made to a critical component, it could be sign of infection
Detection• Matching with the definition list.• Classifying as appropriate type such as virus,
spyware or Trojans. Removal
Common challenges…RootKits
• Program that can hide files, registry entries, network traffic, or other information.
• Kernel mode rootkit could tamper with operating system at lowest level.
Blended Threats• Combined characteristics of viruses, worms and
spyware. Performance
• Maintaining high level performance on machine is critical.
Classification• Understand the nature of threat.• Wide variety of nature and context make it difficult to
manage.
Two Approaches of Scanning
1.Specific Scanning• signature detection• the application scans files to look for known viruses
matching definitions in a “dictionary”.• after recognizing the malicious software the antivirus
software can take one of the following actions:1. attempt to repair the file by removing the virus itself from
the file.2. quarantine the file.3. or delete the file completely.
Generic Scanning
Generic scanning is also referred to as the suspicious behavior approach.
Used when new malware appear. In this method the software does not look for a specific
signature but instead monitors the behavior of all applications.
if anything questionable is found by the software the application is quarantined and a warning is broadcasted to the user about what the program may be trying to do.
Generic Scanning
if the software is found to be a virus the user can send it to a virus vendor
researchers examine it, determine its signature, name and catalogue it and release antivirus software to stop its spread.
Two Other Approaches Heuristic analysis
another form of generic scanning The sandbox method
Heuristic Analysis
software tries to emulate the beginning of the code of each new executable that the system invokes before transferring control to that executable.
if the program attempts to use self-modifying code or appears to be a virus, it’s assumed the virus has infected the executable.
there are many false positives in this approach.
Sandboxing
in this approach an antivirus program will take suspicious code and run it in a “virtual machine” to see the purpose of the code and exactly how the code works.
after the program is terminated the software analyzes the sandbox for any changes, which might indicate a virus.