SlideShare a Scribd company logo
Digital Immunity The Myths and Reality Cornell University 27 June 2002 Christine M. Orshesky, CISSP, CQA
Topics for Discussion Malware Threats and Techniques Impact and Effects Incident Management Preparation Detection and Containment Eradication and Recovery Reporting and Analysis Demonstration Summary
What is Malware? Any piece of hardware, software or firmware that is intentionally included or introduced into a computer system for unauthorized purposes usually without the knowledge or consent of the use Includes Viruses Trojan horse programs Worms Hoaxes Logic bombs Joke programs
Virus – Defined “… a program which makes a copy of itself in such a way as to ‘infect’ parts of the operating system and/or application programs.” - Survivor’s Guide to Computer Viruses, Virus Bulletin, 1993. Replicates file to file system to system disk to disk Typically requires a “host” Must be executed May cause a symptom or damage (payload)
Virus Infection Process Ensures virus executes before  original executable Pre-pend Append PE Infector Overwrite
Types of Viruses Boot sector Infects boot record on diskette or hard drive Only spreads if booted from infected diskette File infector Infects program files or portable executables Macro  Infects operating environment Scripts Similar to batch files Multi-partite Combinations of any of the types above
Virus - Example W97M.Marker Infects Word documents Records a log of the infection including user name, mailing address, and date/time of the  infection Attempts to send the log file to an outside organization via the Internet
Worm - Defined Self-contained Does not require a host Replicates from system to system Infects systems not files Typically “network-aware”
Worm - Example ExploreZip Sends email with infected attachment Infects local system –  set file size to 0 Attempts to infect mapped systems Attempts to set file size to 0  on mapped systems Attempts to infect remote systems  with shared resources
Trojan horse – Defined Deliberately do something unexpected Steal passwords Delete files Open backdoors Connect to external sites Do not replicate
Trojan horse - Examples NetBus and BackOrifice Remote Administration Tools (RAT) Usually sent inside a game, such as  “checkers” or “whack a mole” Allows a remote user to have control Subseven Arrives as masqueraded file  (with double extension) Uses IRC to notify others of infection Grants access to system and can be  used to launch DDoS
Joke Program – Defined A type of Trojan horse Does not replicate Not intended to be malicious
Joke Program – Example Wobbler Causes victim’s screen display to “shake” as if experiencing an earthquake Only stopped by hitting <ESC> key No data loss as direct result
Hoax – Defined Does not self-replicate  Messages only – false warnings Spread rapidly  Cause no direct damage
Hoax - Example VIRUS WARNING !!!!!! If you receive an email titled &quot;WIN A HOLIDAY&quot; DO NOT open it. It will erase everything on your hard drive.  Forward this letter out to as many people as you can. This is a new, very malicious virus and not many people know about it. This information was announced yesterday morning from Microsoft; please share it with everyone that might access the Internet. Once again, pass this along to EVERYONE in our address book so that this may be stopped. And so it goes on...
Logic Bomb – Defined Does not replicate Portion of code that only activates based upon a pre-determined or programmed trigger Typically cause some form of damage
Logic Bomb – Example Software programmer creates module to only execute when she is no longer displayed in payroll Module is set to modify pay rates for management employees
Internet Threats JAVA Interpreted executable content Interpreted at client computer Sandbox model Behavior can be restricted ActiveX Native executable content No special restrictions Can do anything that users can do Hostile applets Limited by accountability System must be both a web server and browser for these to replicate
Exposures Diskettes and other storage media Shared files on servers Web sites Bulletin boards and downloaded files Electronic mail messages and attachments Newsgroups Internet/network connections
Propagation Requirements “ Three basic things allow viruses to spread: sharing, programming, and changes. All we have to do is eliminate those three things and we will be perfectly free of viruses.”  - Fred Cohen  Short Course on Computer Viruses,  2 nd  Edition
Propagation Requirements Ability to receive information or programs  Ability to store and process at minimal levels  Ability to communicate with other  computers Ability to accept information communicated from others as programming commands with access to a minimum level of resources
Propagation Malware can infect Program files Files that contain executable portions, such as macros Diskettes and other storage media Email message attachments HTML based email messages Malware cannot infect Hardware (though it can be malicious) Text based files or messages Write-protected storage media
How Fast Do They Spread? Source:  ICSA/TruSecure 22 minutes 2001 E-mail enabled script  NIMDA 5 hours 2000 E-mail enabled script LoveLetter 4 days 1999 E-mail enabled word macro Melissa 4 months 1995 Word Macro Concept 3 years 1990 Boot Sector Form Time to #1 Year Type  Malware
Concealment Techniques Spoofing/Stealth Trapping calls to system and providing false replies Encryption Using some key to encrypt code Polymorphism Cause virus to have a new look each time it is executed Encryption is one form of polymorphism if encryption key is different each time Mutation engine  Social Engineering
Impact and Effects Nuisance Spoofing Denial of Service Overwriting and Data diddling Destruction Psychological “ Netspionage” Siphoning data Exposing vulnerabilities
Impact and Effects (concluded) Compromise or Loss of Data Loss of Productivity Denial of Service Data Manipulation Loss of Credibility Loss of Revenue Embarrassment
Incident Management Model Preparation Know threats, vulnerabilities, risks Implement controls Document written incident response procedures Identify Response Team Test procedures
Response Team Members System and Network Admins Email Network Firewalls IDS Security Staff Management Legal Counsel Public Relations
Incident Management Model (continued) Detection Detect and identify incident (diagnosis) Products and tools can be beneficial Determine source and scope  Containment Limit spread of incident  Downstream liability
Tools Scanners Integrity checkers Heuristics Sandboxes Content Filters Firewalls Intrusion Detection Routers
Techniques Block addresses Inbox/Outbox  Message Headers
Sample Message Header From: stranger  <stranger@yahoo.com>   To:  bluminx @hotmail.com   Subject: Worm Klez.E immunity  Date: Thu, 13 Jun 2002 09:39:56 -0400  MIME-Version: 1.0  Received: from [63.117.44.150] by hotmail.com (3.2) with ESMTP id MHotMailBED1EBAB002B400431923F752C9606970; Thu, 13 Jun 2002 06:39:59 -0700  Received: from Zkprhj [216.54.110.216] by mail.atel.net  (SMTPD32-6.06) id A08E53F007E; Thu, 13 Jun 2002 09:39:26 -0400  From  [email_address]  Thu, 13 Jun 2002 06:41:03 -0700  Message-Id: <200206130939556.SM02700@Zkprhj>
Incident Management Model (continued) Eradication Remove source of incident Remove residual effects Recovery Restore system from back-up Institute business continuity or disaster recovery plans if necessary
Incident Management Model (concluded) Reporting and Analysis Record metrics and lessons learned Post-mortem analysis Trend analysis Process improvement
Demonstration Virus Creation Source Code Review Mitigation
Summary Malware comes from people you do know Malware will continue to evolve There is no 100% solution or panacea Mitigation and Management requires more than technology
Some Information Resources Anti-virus vendors NIPC and other CERTS http://www.nipc.gov  http://www.cert.org  http://www.fedcirc.gov http://www.sans.org Virus Bulletin http://www.virusbtn.com The Wildlist Organization http://www.wildlist.org Virus Hoax Web Site http://www.vmyths.com European Institute for Computer Anti-Virus Research (EICAR) http://www.eicar.org Anti-Virus Information Exchange Network (AVIEN) http://www.avien.net
Additional Resources “ The Generic Virus Writer” and other papers by Sarah Gordon http://www.badguys.org/   Short Course on Computer Viruses,  2 nd  Edition  by Fred Cohen  “ Free Macro Protection Techniques” by  Chengi Jimmy Kuo, Network Associates http://download.nai.com/products/media/vil/pdf/free_AV_tips_techniques.pdf Computer Viruses Demystified http://www.sophos.com/sophos/docs/eng/refguide/viru_ben.pdf Viruses Revealed  by Robert Slade, David Harley, et al.
End of Presentation Questions?

More Related Content

PPTX
Microsoft Fabric Introduction
James Serra
 
PPTX
Modern Workplace with Microsoft 365
Ravikumar Sathyamurthy
 
PPTX
Power BI Overview, Deployment and Governance
James Serra
 
PDF
Understanding big data and data analytics big data
Seta Wicaksana
 
PDF
Microsoft Office 365 for Medium and Small Business - Presented by Atidan
David J Rosenthal
 
PPTX
OneDrive for Business Best Practices
Chris Woodill
 
PDF
Introduction to Microsoft 365 Business
Robert Crane
 
PPTX
Delivering Data Democratization in the Cloud with Snowflake
Kent Graziano
 
Microsoft Fabric Introduction
James Serra
 
Modern Workplace with Microsoft 365
Ravikumar Sathyamurthy
 
Power BI Overview, Deployment and Governance
James Serra
 
Understanding big data and data analytics big data
Seta Wicaksana
 
Microsoft Office 365 for Medium and Small Business - Presented by Atidan
David J Rosenthal
 
OneDrive for Business Best Practices
Chris Woodill
 
Introduction to Microsoft 365 Business
Robert Crane
 
Delivering Data Democratization in the Cloud with Snowflake
Kent Graziano
 

What's hot (20)

PPTX
Introduction to Power BI and Data Visualization
Swapnil Jadhav
 
PPTX
Mendix Accelerates the Software Lifecycle
Mendix
 
PPTX
Intro for Power BI
Martin X
 
PDF
Power BI Report Server Enterprise Architecture, Tools to Publish reports and ...
Vishal Pawar
 
DOCX
Save and Share Files in the Cloud with OneDrive for Business - Customize Guide
David J Rosenthal
 
PPTX
Google Cloud Platform
Francesco Marchitelli
 
PPTX
AWS Lake Formation Deep Dive
Cobus Bernard
 
PPTX
DAX and Power BI Training - 004 Power Query
Will Harvey
 
PPTX
Office 365 - Your Modern Workplace
Tarek El Jammal
 
PPTX
Introduction to Microsoft Power BI
Exilesoft
 
PPTX
Microsoft Office 365 Presentation
BlueChipICT
 
PDF
Introduction to Microsoft 365
Robert Crane
 
PDF
Azure Machine Learning
Mostafa
 
PDF
A Secure Journey to Cloud with Microsoft 365
David J Rosenthal
 
PDF
IBM Cloud pak for data brochure
Simon Harrison ACMA CGMA
 
PPTX
Building Data Pipelines on AWS
rudolf eremyan
 
PDF
[Machine Learning 15minutes! #61] Azure OpenAI Service
Naoki (Neo) SATO
 
PPTX
Azure Migration .pptx
sonalibiswas22
 
PPTX
Power Automate
Fausto Capellan Jr
 
PDF
Azure App Modernization
Phi Huynh
 
Introduction to Power BI and Data Visualization
Swapnil Jadhav
 
Mendix Accelerates the Software Lifecycle
Mendix
 
Intro for Power BI
Martin X
 
Power BI Report Server Enterprise Architecture, Tools to Publish reports and ...
Vishal Pawar
 
Save and Share Files in the Cloud with OneDrive for Business - Customize Guide
David J Rosenthal
 
Google Cloud Platform
Francesco Marchitelli
 
AWS Lake Formation Deep Dive
Cobus Bernard
 
DAX and Power BI Training - 004 Power Query
Will Harvey
 
Office 365 - Your Modern Workplace
Tarek El Jammal
 
Introduction to Microsoft Power BI
Exilesoft
 
Microsoft Office 365 Presentation
BlueChipICT
 
Introduction to Microsoft 365
Robert Crane
 
Azure Machine Learning
Mostafa
 
A Secure Journey to Cloud with Microsoft 365
David J Rosenthal
 
IBM Cloud pak for data brochure
Simon Harrison ACMA CGMA
 
Building Data Pipelines on AWS
rudolf eremyan
 
[Machine Learning 15minutes! #61] Azure OpenAI Service
Naoki (Neo) SATO
 
Azure Migration .pptx
sonalibiswas22
 
Power Automate
Fausto Capellan Jr
 
Azure App Modernization
Phi Huynh
 
Ad

Viewers also liked (20)

PPT
Malware, Trojans and Slurpware
Varun Arora
 
PPTX
Security
chian417
 
PPTX
Trojan virus & backdoors
Shrey Vyas
 
PPSX
Unit 2
Jigarthacker
 
PPT
Data security in data communication
Mohd Arif
 
PPTX
Security in Data Communication and Networking
Zahidul Hossain
 
PPTX
Trojans and backdoors
Gaurav Dalvi
 
PPT
1 security goals
drewz lin
 
PPTX
Anti virus
Muhammad Sohaib Afzaal
 
PPTX
File Transfer Protocol
Vinh Nguyen
 
PDF
Congestion Control in Networks
rapatil
 
PPT
Types of attacks and threads
srivijaymanickam
 
PPTX
What is Next-Generation Antivirus?
Ryan G. Murphy
 
PPT
Tcp Congestion Avoidance
Ram Dutt Shukla
 
PPTX
Telnet
Maricelamerry
 
PPT
TelNet
Rahul kRISHNAN
 
PPT
Congestion Control
Ram Dutt Shukla
 
PPTX
Protocolo SMTP (Simple Mail Transfer Protocol)
Luis Alfredo Sanchez
 
PDF
Ftp (file transfer protocol)
Raghu nath
 
PDF
Congestion control
Abhay Pai
 
Malware, Trojans and Slurpware
Varun Arora
 
Security
chian417
 
Trojan virus & backdoors
Shrey Vyas
 
Unit 2
Jigarthacker
 
Data security in data communication
Mohd Arif
 
Security in Data Communication and Networking
Zahidul Hossain
 
Trojans and backdoors
Gaurav Dalvi
 
1 security goals
drewz lin
 
File Transfer Protocol
Vinh Nguyen
 
Congestion Control in Networks
rapatil
 
Types of attacks and threads
srivijaymanickam
 
What is Next-Generation Antivirus?
Ryan G. Murphy
 
Tcp Congestion Avoidance
Ram Dutt Shukla
 
Congestion Control
Ram Dutt Shukla
 
Protocolo SMTP (Simple Mail Transfer Protocol)
Luis Alfredo Sanchez
 
Ftp (file transfer protocol)
Raghu nath
 
Congestion control
Abhay Pai
 
Ad

Similar to Digital Immunity -The Myths and Reality (20)

PPT
virus
Vinod siragaon
 
PPT
Data loss causes and its threats
Remo Software
 
PPTX
Information security and privacy
Joy Chakraborty
 
PPTX
Information security and privacy
Joy Chakraborty
 
PPTX
Module_09_Malware_Presentation_for_IT500.pptx
spiessrobbin
 
PPT
Ne Course Part One
backdoor
 
PPT
Intruders and Viruses in Network Security NS9
koolkampus
 
PDF
Week3-CyberSecurity 8th Semester important.pdf
MArshad35
 
PPT
Promote Education Internet Security
Zoaib Mirza
 
PPTX
9.0 security (2)
Frank Victory
 
DOCX
Computer viruses by joy chakraborty
Joy Chakraborty
 
PPT
Virus presentation
Abhinav Bansal
 
PPTX
Mitppt
Aarti Prakash
 
PPTX
Virus and Worms
GrittyCC
 
PPT
Itc lec 15 Computer security risks
AnzaDar3
 
PPTX
Computer viruses
SimiAttri
 
PPT
Cyber-Security.ppt
SeniorGaming
 
DOC
Computer Virus
Amirah Husna
 
PPT
Cyber-Security-.ppt
karthikvcyber
 
PPT
Iss lecture 9
Ali Habeeb
 
Data loss causes and its threats
Remo Software
 
Information security and privacy
Joy Chakraborty
 
Information security and privacy
Joy Chakraborty
 
Module_09_Malware_Presentation_for_IT500.pptx
spiessrobbin
 
Ne Course Part One
backdoor
 
Intruders and Viruses in Network Security NS9
koolkampus
 
Week3-CyberSecurity 8th Semester important.pdf
MArshad35
 
Promote Education Internet Security
Zoaib Mirza
 
9.0 security (2)
Frank Victory
 
Computer viruses by joy chakraborty
Joy Chakraborty
 
Virus presentation
Abhinav Bansal
 
Virus and Worms
GrittyCC
 
Itc lec 15 Computer security risks
AnzaDar3
 
Computer viruses
SimiAttri
 
Cyber-Security.ppt
SeniorGaming
 
Computer Virus
Amirah Husna
 
Cyber-Security-.ppt
karthikvcyber
 
Iss lecture 9
Ali Habeeb
 

More from amiable_indian (20)

PDF
Phishing As Tragedy of the Commons
amiable_indian
 
PDF
Cisco IOS Attack & Defense - The State of the Art
amiable_indian
 
PDF
Secrets of Top Pentesters
amiable_indian
 
PPS
Workshop on Wireless Security
amiable_indian
 
PDF
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
amiable_indian
 
PPS
Workshop on BackTrack live CD
amiable_indian
 
PPS
Reverse Engineering for exploit writers
amiable_indian
 
PPS
State of Cyber Law in India
amiable_indian
 
PPS
AntiSpam - Understanding the good, the bad and the ugly
amiable_indian
 
PPS
Reverse Engineering v/s Secure Coding
amiable_indian
 
PPS
Network Vulnerability Assessments: Lessons Learned
amiable_indian
 
PPS
Economic offenses through Credit Card Frauds Dissected
amiable_indian
 
PPS
Immune IT: Moving from Security to Immunity
amiable_indian
 
PPS
Reverse Engineering for exploit writers
amiable_indian
 
PPS
Hacking Client Side Insecurities
amiable_indian
 
PDF
Web Exploit Finder Presentation
amiable_indian
 
PPT
Network Security Data Visualization
amiable_indian
 
PPT
Enhancing Computer Security via End-to-End Communication Visualization
amiable_indian
 
PDF
Top Network Vulnerabilities Over Time
amiable_indian
 
PDF
What are the Business Security Metrics?
amiable_indian
 
Phishing As Tragedy of the Commons
amiable_indian
 
Cisco IOS Attack & Defense - The State of the Art
amiable_indian
 
Secrets of Top Pentesters
amiable_indian
 
Workshop on Wireless Security
amiable_indian
 
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
amiable_indian
 
Workshop on BackTrack live CD
amiable_indian
 
Reverse Engineering for exploit writers
amiable_indian
 
State of Cyber Law in India
amiable_indian
 
AntiSpam - Understanding the good, the bad and the ugly
amiable_indian
 
Reverse Engineering v/s Secure Coding
amiable_indian
 
Network Vulnerability Assessments: Lessons Learned
amiable_indian
 
Economic offenses through Credit Card Frauds Dissected
amiable_indian
 
Immune IT: Moving from Security to Immunity
amiable_indian
 
Reverse Engineering for exploit writers
amiable_indian
 
Hacking Client Side Insecurities
amiable_indian
 
Web Exploit Finder Presentation
amiable_indian
 
Network Security Data Visualization
amiable_indian
 
Enhancing Computer Security via End-to-End Communication Visualization
amiable_indian
 
Top Network Vulnerabilities Over Time
amiable_indian
 
What are the Business Security Metrics?
amiable_indian
 

Recently uploaded (20)

PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
Doc9.....................................
SofiaCollazos
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
Software Development Methodologies in 2025
KodekX
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Doc9.....................................
SofiaCollazos
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 

Digital Immunity -The Myths and Reality

  • 1. Digital Immunity The Myths and Reality Cornell University 27 June 2002 Christine M. Orshesky, CISSP, CQA
  • 2. Topics for Discussion Malware Threats and Techniques Impact and Effects Incident Management Preparation Detection and Containment Eradication and Recovery Reporting and Analysis Demonstration Summary
  • 3. What is Malware? Any piece of hardware, software or firmware that is intentionally included or introduced into a computer system for unauthorized purposes usually without the knowledge or consent of the use Includes Viruses Trojan horse programs Worms Hoaxes Logic bombs Joke programs
  • 4. Virus – Defined “… a program which makes a copy of itself in such a way as to ‘infect’ parts of the operating system and/or application programs.” - Survivor’s Guide to Computer Viruses, Virus Bulletin, 1993. Replicates file to file system to system disk to disk Typically requires a “host” Must be executed May cause a symptom or damage (payload)
  • 5. Virus Infection Process Ensures virus executes before original executable Pre-pend Append PE Infector Overwrite
  • 6. Types of Viruses Boot sector Infects boot record on diskette or hard drive Only spreads if booted from infected diskette File infector Infects program files or portable executables Macro Infects operating environment Scripts Similar to batch files Multi-partite Combinations of any of the types above
  • 7. Virus - Example W97M.Marker Infects Word documents Records a log of the infection including user name, mailing address, and date/time of the infection Attempts to send the log file to an outside organization via the Internet
  • 8. Worm - Defined Self-contained Does not require a host Replicates from system to system Infects systems not files Typically “network-aware”
  • 9. Worm - Example ExploreZip Sends email with infected attachment Infects local system – set file size to 0 Attempts to infect mapped systems Attempts to set file size to 0 on mapped systems Attempts to infect remote systems with shared resources
  • 10. Trojan horse – Defined Deliberately do something unexpected Steal passwords Delete files Open backdoors Connect to external sites Do not replicate
  • 11. Trojan horse - Examples NetBus and BackOrifice Remote Administration Tools (RAT) Usually sent inside a game, such as “checkers” or “whack a mole” Allows a remote user to have control Subseven Arrives as masqueraded file (with double extension) Uses IRC to notify others of infection Grants access to system and can be used to launch DDoS
  • 12. Joke Program – Defined A type of Trojan horse Does not replicate Not intended to be malicious
  • 13. Joke Program – Example Wobbler Causes victim’s screen display to “shake” as if experiencing an earthquake Only stopped by hitting <ESC> key No data loss as direct result
  • 14. Hoax – Defined Does not self-replicate Messages only – false warnings Spread rapidly Cause no direct damage
  • 15. Hoax - Example VIRUS WARNING !!!!!! If you receive an email titled &quot;WIN A HOLIDAY&quot; DO NOT open it. It will erase everything on your hard drive. Forward this letter out to as many people as you can. This is a new, very malicious virus and not many people know about it. This information was announced yesterday morning from Microsoft; please share it with everyone that might access the Internet. Once again, pass this along to EVERYONE in our address book so that this may be stopped. And so it goes on...
  • 16. Logic Bomb – Defined Does not replicate Portion of code that only activates based upon a pre-determined or programmed trigger Typically cause some form of damage
  • 17. Logic Bomb – Example Software programmer creates module to only execute when she is no longer displayed in payroll Module is set to modify pay rates for management employees
  • 18. Internet Threats JAVA Interpreted executable content Interpreted at client computer Sandbox model Behavior can be restricted ActiveX Native executable content No special restrictions Can do anything that users can do Hostile applets Limited by accountability System must be both a web server and browser for these to replicate
  • 19. Exposures Diskettes and other storage media Shared files on servers Web sites Bulletin boards and downloaded files Electronic mail messages and attachments Newsgroups Internet/network connections
  • 20. Propagation Requirements “ Three basic things allow viruses to spread: sharing, programming, and changes. All we have to do is eliminate those three things and we will be perfectly free of viruses.” - Fred Cohen Short Course on Computer Viruses, 2 nd Edition
  • 21. Propagation Requirements Ability to receive information or programs Ability to store and process at minimal levels Ability to communicate with other computers Ability to accept information communicated from others as programming commands with access to a minimum level of resources
  • 22. Propagation Malware can infect Program files Files that contain executable portions, such as macros Diskettes and other storage media Email message attachments HTML based email messages Malware cannot infect Hardware (though it can be malicious) Text based files or messages Write-protected storage media
  • 23. How Fast Do They Spread? Source: ICSA/TruSecure 22 minutes 2001 E-mail enabled script NIMDA 5 hours 2000 E-mail enabled script LoveLetter 4 days 1999 E-mail enabled word macro Melissa 4 months 1995 Word Macro Concept 3 years 1990 Boot Sector Form Time to #1 Year Type Malware
  • 24. Concealment Techniques Spoofing/Stealth Trapping calls to system and providing false replies Encryption Using some key to encrypt code Polymorphism Cause virus to have a new look each time it is executed Encryption is one form of polymorphism if encryption key is different each time Mutation engine Social Engineering
  • 25. Impact and Effects Nuisance Spoofing Denial of Service Overwriting and Data diddling Destruction Psychological “ Netspionage” Siphoning data Exposing vulnerabilities
  • 26. Impact and Effects (concluded) Compromise or Loss of Data Loss of Productivity Denial of Service Data Manipulation Loss of Credibility Loss of Revenue Embarrassment
  • 27. Incident Management Model Preparation Know threats, vulnerabilities, risks Implement controls Document written incident response procedures Identify Response Team Test procedures
  • 28. Response Team Members System and Network Admins Email Network Firewalls IDS Security Staff Management Legal Counsel Public Relations
  • 29. Incident Management Model (continued) Detection Detect and identify incident (diagnosis) Products and tools can be beneficial Determine source and scope Containment Limit spread of incident Downstream liability
  • 30. Tools Scanners Integrity checkers Heuristics Sandboxes Content Filters Firewalls Intrusion Detection Routers
  • 31. Techniques Block addresses Inbox/Outbox Message Headers
  • 32. Sample Message Header From: stranger <[email protected]> To: bluminx @hotmail.com Subject: Worm Klez.E immunity Date: Thu, 13 Jun 2002 09:39:56 -0400 MIME-Version: 1.0 Received: from [63.117.44.150] by hotmail.com (3.2) with ESMTP id MHotMailBED1EBAB002B400431923F752C9606970; Thu, 13 Jun 2002 06:39:59 -0700 Received: from Zkprhj [216.54.110.216] by mail.atel.net  (SMTPD32-6.06) id A08E53F007E; Thu, 13 Jun 2002 09:39:26 -0400 From [email_address] Thu, 13 Jun 2002 06:41:03 -0700 Message-Id: <200206130939556.SM02700@Zkprhj>
  • 33. Incident Management Model (continued) Eradication Remove source of incident Remove residual effects Recovery Restore system from back-up Institute business continuity or disaster recovery plans if necessary
  • 34. Incident Management Model (concluded) Reporting and Analysis Record metrics and lessons learned Post-mortem analysis Trend analysis Process improvement
  • 35. Demonstration Virus Creation Source Code Review Mitigation
  • 36. Summary Malware comes from people you do know Malware will continue to evolve There is no 100% solution or panacea Mitigation and Management requires more than technology
  • 37. Some Information Resources Anti-virus vendors NIPC and other CERTS http://www.nipc.gov http://www.cert.org http://www.fedcirc.gov http://www.sans.org Virus Bulletin http://www.virusbtn.com The Wildlist Organization http://www.wildlist.org Virus Hoax Web Site http://www.vmyths.com European Institute for Computer Anti-Virus Research (EICAR) http://www.eicar.org Anti-Virus Information Exchange Network (AVIEN) http://www.avien.net
  • 38. Additional Resources “ The Generic Virus Writer” and other papers by Sarah Gordon http://www.badguys.org/ Short Course on Computer Viruses, 2 nd Edition by Fred Cohen “ Free Macro Protection Techniques” by Chengi Jimmy Kuo, Network Associates http://download.nai.com/products/media/vil/pdf/free_AV_tips_techniques.pdf Computer Viruses Demystified http://www.sophos.com/sophos/docs/eng/refguide/viru_ben.pdf Viruses Revealed by Robert Slade, David Harley, et al.
  • 39. End of Presentation Questions?