Title: Spyware and Trojan Horses
1Spyware and Trojan Horses
2Your computer could be watching your every move!
3Introduction
4Overview
- Introduction to Spyware / Trojan Horses
- Spyware Examples, Mechanics, Effects, Solutions
- Tracking Cookies Mechanics, Effects, Solutions
- Trojan Horses Mechanics, Effects, More Examples
- Solutions to the problems posed
- Human Factors Human interaction with Spyware
- Conclusions Including our proposals for
solutions
5Definitions
- A general term for a program that monitors your
actions. While they are sometimes malicious, like
a remote control program used by a hacker,
software companies have been known to use Spyware
to gather data about customers.
SPYWARE
Definition from BlackICE Internet Security
Systems - http//blackice.iss.net/glossary.php
TROJAN HORSE
An apparently useful and innocent program
containing additional hidden code which allows
the unauthorized collection, exploitation,
falsification, or destruction of data.
Definition from Texas State Library and
Archives Commission - http//www.tsl.state.tx.us/l
d/pubs/compsecurity/glossary.html
6Symptoms
- Targeted Pop-ups
- Slow Connection
- Targeted E-Mail (Spam)
- Unauthorized Access
- Spam
- System Crash
- Program Customisation
SPYWARE
SPYWARE / TROJAN
SPYWARE
TROJAN HORSE
TROJAN HORSE
SPYWARE / TROJAN
SPYWARE
7Summary of Effects
- Collection of data from your computer without
consent - Execution of code without consent
- Assignment of a unique code to identify you
- Collection of data pertaining to your habitual
use - Installation on your computer without your
consent - Inability to remove the software
- Performing other undesirable tasks without
consent
8Similarities / Differences
Source Table derived and produced by Andrew
Brown, Tim Cocks and Kumutha Swampillai, February
2004.
9Spyware
Image Source The Gator Corporation
http//www.gator.com
10Software Examples
- GAIN / Gator
- Gator E-Wallet
- Cydoor
- BonziBuddy
- MySearch Toolbar
- DownloadWare
- BrowserAid
- Dogpile Toolbar
Image Sources GAIN Logo The Gator Corporation
http//www.gator.com BonziBuddy Logo
Bonzi.com - http//images.bonzi.com/images/gorill
atalk.gif DownloadWare Logo DownloadWare -
http//www.downloadware.net
11Advantages
- Precision Marketing
- Relevant pop-ups are better than all of them!
- You may get some useful adverts!
- Useful Software
- DivX Pro, IMesh, Winamp Pro
- (Experienced) people understand what they are
installing. - Enhanced Website Interaction
- Targeted banner adverts
- Website customisation
User Perspective - I
12Disadvantages
- Browsing profiles created for users without
consent - Used for target marketing and statistical
analysis - Unable to remove Spyware programs or disable them
- Increased number of misleading / inappropriate
pop-ups - Invasion of user privacy (hidden from user)
- Often badly written programs corrupt user system
- Automatically provides unwanted helpful tools
- 20 million people have Spyware on their
machines. - Source - Dec 02 GartnerG2 Report
User Perspective - II
13Example Pop-up
Misleading Pop-up
User Perspective - III
Image Source Browser Cleanser Directed pop-up
from http//www.browsercleanser.com/
14Client-Side Operation
Technical Analysis - II
Image Source Image derived and produced by
Andrew Brown, Tim Cocks and Kumutha Swampillai,
February 2004.
15GAIN Case Study
- Installed IMesh, which includes Gator
Installation - We accessed multiple internet sites
- We simultaneously analyzed network traffic (using
IRIS) - We found the packets of data being sent to GAIN
- Packets were encrypted and we could not decrypt
them - See Example -
16Spyware Removers
- Ad-aware (by Lavasoft)
- Reverse Engineer Spyware
- Scans Memory, Registry and Hard Drive for
- Data Mining components
- Aggressive advertising components
- Tracking components
- Updates from Lavasoft
- Plug-ins available
- Extra file information
- Disable Windows Messenger Service
Image Source Screenshot of Ad-aware 6.0.
LavaSoft. See http//www.lavasoft.com
17Vulnerable Systems
- Those with an internet connection!
- Microsoft Windows 9x/Me/NT/2000/XP
- Non - fire-walled systems
- Internet Explorer
- Other browsers not affected
18Tracking Cookies
19Cookies
- A Cookie is a small text file sent to the user
from a website. - Contains Website visited
- Provides client-side personalisation
- Supports easy Login
- Cookies are controlled by
- Websites Application Server
- Client-side Java Script
- The website is effectively able to remember the
user and their activity on previous visits. - Spyware companies working with websites are able
to use this relatively innocent technology to
deliver targeted REAL TIME marketing, based on
cookies and profiles.
20Case Study - DoubleClick
- Most regular web users will have a
doubleclick.net cookie. - Affiliated sites request the DoubleClick cookie
on the users computer. - The site then sends
- Who you are
- All other information in your cookie file
- In return for
- All available marketing information on you -
collected from other affiliated sites which the
you have hit.
21Case Study DoubleClick
- Site targets banner adverts, e-mails and pop-ups
to the user. - If the user visits an affiliated site without a
DoubleClick cookie, then one is sent to the user. - The whole process is opaque to the user and
occurs without their consent.
22Trojan Horses
23Installation
- Secretly installed when an infected executable is
run - Much like a virus
- Executables typically come from P2P networks or
unscrupulous websites - ActiveX controls on websites
- ActiveX allows automatic installation of software
from websites - User probably does not know what they are running
- Misleading descriptions often given
- Not sandboxed!
- Digital signatures used, signing not necessary
24Installation
- Certificate Authority
- Misleading Certificate Description
- Who is trusted?
Image Source Screenshot of Microsoft Internet
Explorer 6 security warning, prior to the
installation of an ActiveX Control from Roings.
25Effects
- Allows remote access
- To spy
- To disrupt
- To relay a malicious connection, so as to
disguise the attackers location (spam, hacking) - To access resources (i.e. bandwidth, files)
- To launch a DDoS attack
26Operation
- Listen for connections
- Memory resident
- Start at boot-up
- Disguise presence
- Rootkits integrate with kernel
- Password Protected
27Trojan Horse Examples
- M Rootkit
- Integrates with the NT kernel
- Very dangerous
- Virtually undetectable once installed
- Hides from administrator as well as user
- Private TCP/IP stack (LAN only)
28Trojan Horse Examples
- iSpyNOW
- Commercial
- Web-based client
- Assassin Trojan
- Custom builds may be purchased
- These are not found by virus scanners
- Firewall circumvention technology
29Trojan Horse Examples
- Hardware
- Key loggers
- More advanced?
- Magic Lantern
- FBI developed
- Legal grey area (until recently!)
- Split virus checking world
30Demonstration
31Vulnerable Systems
- Number of trojans in common use
DANGEROUS
RELATIVELY SAFE
MacOS
WinNT
Win 9x
MacOS X
Linux/Unix
WinNT refers to Windows NT 4, 2000, XP and Server
2003. Win9x refers to Windows 95, 95SE, 98 and
ME.Information Source McAfee Security -
http//us.mcafee.com/
Image Source Image derived and produced by
Andrew Brown, Tim Cocks and Kumutha Swampillai,
February 2004.
32Vulnerable Systems
DANGEROUS
RELATIVELY SAFE
Win 9x
WinNT
MacOS
MacOS X
Linux/Unix
WinNT refers to Windows NT 4, 2000, XP and Server
2003. Win9x refers to Windows 95, 95SE, 98 and
ME.Information Source McAfee Security -
http//us.mcafee.com/
Image Source Image derived and produced by
Andrew Brown, Tim Cocks and Kumutha Swampillai,
February 2004.
33Conclusions
34Security Implications
- Divulge personal data
- Backdoors into system
- System corruption
- Disruption / Irritation
- Aids identity theft
- Easy virus distribution
- Increased spam
Short Term
Long Term
- Mass data collection
- Consequences unknown
- Web becomes unusable
- Web cons outweigh pros
- Cost of preventions
- More development work
35Solutions
- Firewall
- Virus Checker
- Spyware Remover
- Frequent OS updates
- Frequent back-up
- Learning problems
Short Term
Long Term
- Add Spyware to Anti-Virus
- Automatic maintenance
- Legislation
- Education on problems
36Questions
Image Source Penny Arcade - http//www.penny-arc
ade.com/view.php3?date2002-07-19resl
37Bibliography / Links
- 1 "Spyware" Definition - BlackICE Internet
Security Systems - http//blackice.iss.net/glossar
y.php - 2 "Trojan Horse" Definition
- Texas State Library and Archives Commission -
http//www.tsl.state.tx.us/ld/pubs/compsecurity/gl
ossary.html - 3 Zeinalipour-Yazti, D. Exploiting the
Security Weaknesses of the Gnutella Protocol,
University of California. - 4 Joshi, R. Network Security Applications,
Merchantile Communications, CANIT Conference
2003. - 5 CERT Advisory CA-1999-02 http//www.cert.org/
advisories/CA-1999-02.html - 6 Spyware Guide http//www.spyware-guide.com
- 7 Trojan Horses - http//www.mpsmits.com/highlig
hts/trojan_horses.shtml - 8 Trojan Horse - Back Orifice -
http//www.nwinternet.com/pchelp/bo/bo.html - 9 NetBus - http//www.nwinternet.com/pchelp/nb/
netbus.htm - 10 BBC News - http//news.bbc.co.uk/1/hi/technol
ogy/3153229.stm - 11 Wired News Judge takes bite out of Gator
www.wired.com/news/politics/0,1283,53875,00.html - 12 Tracking Cookies Demonstration at
http//www.irt.org/instant/chapter10/tracker/index
4.htm - 13 BonziBuddy - http//www.bonzi.com/bonzibuddy/
bonzibuddyfreehom.asp - 14 Unwanted Links (Spyware)
http//www.unwantedlinks.com - 15 Andersen, R. "Security Engineering", First
Edition, J. Wiley and Sons, 2001. - 16 Scacchi, W. Privacy and Other Social
Issues, Addison-Wesley, 2003. - http//www.ics.uci.edu/wscacchi/Tech-EC/Security
Privacy/Privacy.ppt