Title: Trends and threats: Malware development
1Trends and threats Malware development
- A closer look at the changes in development of
malicious software, and possible damage impact
and damage limitation. - Snorre Fagerland
- Senior Virus Analyst, Norman ASA
2Malware on the way out
- DOS viruses. Forget them. 50000 viruses or so,
not a threat anymore. - Boot viruses. Still see them every once in a
while, but not many new ones only the odd
infected diskette from way back when. - Macro viruses. After dominating the picture from
1995 to ca. 2000, macro viruses are now on the
decline.
3Malware still going strong
4Email worms
These will be with us for the foreseeable
future. They are often combined with local area
network infection methods, which means that they
can be a real problem to get out of a corporate
network. They may come in large series of
variants. They are rapid to very rapid
spreaders. Even with good emergency response
mechanisms, a significant amount of people may be
infected in the early stages of an epidemic.
5File infecting viruses
File infectors are still around to a large
extent. In addition, many classic email and P2P
worms also double as file infecting
viruses. File infectors may be hard to clean
perfectly.
6Trojans that give unauthorized access
Example Subseven shown below.
7Malware on the way up
8Peer 2 peer worms
File sharing networks like Kazaa, Morpheus,
Limewire, Grokster etc now thoroughly infested.
Supova.H
Spybot.1_2 Pinfi.A
Loxar.C
Supova.E
Supova.A
Supova.I
9Multi-component malware
From UNIX/Linux environment we have seen that
malware often comes as packages of many files.
This trend has now moved to Windows. Problem
Harder to analyse the interaction between many
files easier to change to avoid detection,
easier to get false alarms, harder to clean
properly.
10Exploits (bugs that undermine security)
Malware will seek to use exploits they ease
spreading and give better access to resources.
The most well known are f.ex. those that enable
attachments to auto-execute in some
instances Content-Type audio/x-wav
namereadme.exe" ..or the DCOM RPC exploit used
for W32/Blaster. Note It is as always important
to keep software updated.
11Damage impact of modern malware
- Damage to software and data (often security
software) - Reduction of system and network performance
instability - Misuse of system (storage of pornography,
pirated software, music and films), or
participation in spam or DDOS schemes. - Loss of system control (deletion of admin shares
and accounts) - Unauthorized access to sensitive data
12Damage impact of modern malware, contd
- Secondary impact
- financial losses connected with investments in
security systems and possible cleanup operations.
- Loss of goodwill and business because of
downtime, or public security breaches.
13Damage limitation before infection
- There is always a tradeoff between functionality
and security. Be as secure as you can without
severely limiting your ability to work. - Do not allow frivolous use of administrator
accounts. No one needs to be constantly logged on
as admin. - Have a plan in case of infection, and people in
charge of executing it.
14Damage limitation, contd
Use firewalls. Make sure all clients are updated.
Do not allow people to turn off the AV software.
Disallow rogue protocols (i.e. P2P
software). Keep control with shares. Back up
often. Use attachment limitations on the mail
servers, if possible.
15Damage limitation after infection
- DONT PANIC! Have centrally placed people lead
cleanup operation, you may want to have AV
consultants there as well. - Get all available information on the malware.
- Small networks pull infected machines off net,
clean manually aided by AV software.
16Damage limitation, contd
Larger networks important to find the machines
that are spreading the infection. Use network
traffic analyzers and auditing tools to find
these machines and take them off the network if
possible isolate infected section of the net. If
suspicion of information security breach, back up
data and reinstall compromised systems with new
passwords etc. This may also need to be done in
the case of file infectors, where the infected
files may not be possible to clean perfectly.