to a persistent threat
play

to a Persistent Threat Jagadeesh Chandraiah DeepSec 2011 Agenda - PowerPoint PPT Presentation

Fake Antivirus- Journey from Trojan to a Persistent Threat Jagadeesh Chandraiah DeepSec 2011 Agenda FakeAV Trends Infection Vectors Packer Evolution How do they work ? DeepSec 2011 Introduction Fake AntiVirus (FakeAV) is a


  1. Fake Antivirus- Journey from Trojan to a Persistent Threat Jagadeesh Chandraiah DeepSec 2011

  2. Agenda • FakeAV Trends • Infection Vectors • Packer Evolution • How do they work ? DeepSec 2011

  3. Introduction Fake AntiVirus (FakeAV) is a malware which displays fake warnings to the users to trick them to buy illegitimate software . DeepSec 2011

  4. Introduction DeepSec 2011

  5. FakeAV Trends Analyse the major events over the last three and half years. DeepSec 2011

  6. FakeAV Trends • Dramatic Rise of FakeAV in 2009 • Black Hat SEO was heavily used. • Popular websites were used to serve FakeAV. • ex: New York Times news paper Website in 2009. • Government Embassy website Attacks . • Social Networking Sites were used (Facebook and Twitter). DeepSec 2011

  7. FakeAV Trends 2010 continued to see the spike in FakeAV detections. • More Spam redirects to FakeAV. • More unpatched PDF and Java Vulnerabilities were used to deliver FakeAV. • Black Hat SEO on hot topics, still remained the popular infection method. DeepSec 2011

  8. FakeAV Trends Significant events in 2011. • Mac users were infected with Mac Defender in big scale around May 2011. DeepSec 2011

  9. Sharp Decline Significant events in 2011. • Sharp Decline in FakeAV detections, due to law enforcement actions in Aug 2011. DeepSec 2011

  10. Sharp Decline ● ChronoPay’s server were compromised and details were reported online. ● Several FakeAV programs had credit card processing issues. DeepSec 2011

  11. FakeAV is down, but still active Sophos Top Five FakeAV Detection rate between Mar-Oct 2011. DeepSec 2011

  12. FakeAV is down, but still active FakeAV infection between 1 st Quarter of 2010 and 2 nd Quarter of 2011, according to Microsoft Security Intelligence Report. DeepSec 2011

  13. Infection Methods We will analyse popular Infection methods and how they work. DeepSec 2011

  14. Black Hat SEO Poisoning search engine optimization. • Illegitimate way of increasing search engine ranking. DeepSec 2011

  15. Black Hat SEO Pictorial Representation of Black Hat SEO attack DeepSec 2011

  16. Black Hat SEO • Step1: Identify and compromise legitimate websites. • Step2: Upload multifunctional PHP script to the compromised website. • Step3: Feed crawlers with specially stuffed webpage with keywords. • Step4: Redirect users coming through search engine to FakeAV website. DeepSec 2011

  17. Malvertising Serving FakeAV through Advertising networks. DeepSec 2011

  18. Malvertising JavaScript used in New York Times newspaper website. DeepSec 2011

  19. Cold Calling Fake tech support centre’s are used to scam users. DeepSec 2011

  20. Spam Campaigns FakeAV served through email attachments and drive by download links. DeepSec 2011

  21. Spam Campaigns DeepSec 2011

  22. Fake Codecs Users are social engineered to download FakeAV as Codecs. DeepSec 2011

  23. Exploit Kit Use Blackhole Exploit kit as an example to see how exploit kit works. DeepSec 2011

  24. Exploit Kit Black Hole Exploit Kit panel showing Infections by country and vulnerabilities.

  25. Exploit kit Blacklisting mechanism used by Black Hole. DeepSec 2011

  26. Exploit Kit Infection mechanism using Exploit kit. DeepSec 2011

  27. Exploit Kit Obfuscated Black Hole Exploit Script DeepSec 2011

  28. Exploit Kit Decrypted Exploit script checking version and creating Iframe element. DeepSec 2011

  29. Packer Evolution • Anti Emulation API • Process Environment Block • Thread Information Block • Kuser Shared Data DeepSec 2011

  30. Packer Evolution FakeAV without packed layer DeepSec 2011

  31. Anti Emulation • Emulator is a piece of Software used to simulate the behaviour of a system. • Windows X86 emulator is used to simulate the behaviour of X86 processor. • Malware authors use tricks to break emulation. DeepSec 2011

  32. Anti Emulation API DeepSec 2011

  33. Anti Emulation API DeepSec 2011

  34. FS:30 Process Environment Block DeepSec 2011

  35. FS:18 Thread Information Block DeepSec 2011

  36. KUSER_SHARED_DATA ● Usually mapped at 0x7FFE0000 ● Checking the presence of value at 0x7FFE0004 (TickCountMultiplier). ● Values at this structure are also known to be used in obfuscated calls and decryption strings. DeepSec 2011

  37. How is this Done ? Understand Packing using a Polymorphic Cryptor. DeepSec 2011

  38. Packer Evolution Cryptors available in underground forums. Click icon to add table DeepSec 2011

  39. Packer Evolution Crum Polymorphic Cryptor DeepSec 2011

  40. Packer Evolution. Crum Polymorphic Cryptor with different icons. DeepSec 2011

  41. Packer Evolution Testing Crum Polymorphic Cryptor DeepSec 2011

  42. Packer Evolution Testing Crum Polymorphic Cryptor DeepSec 2011

  43. Packer Evolution Anti Emulation stuff inserted by Crum Polymorphic Cryptor DeepSec 2011

  44. What Drives FakeAV ? DeepSec 2011

  45. What Drives FakeAV ? DeepSec 2011

  46. What Drives FakeAV ? DeepSec 2011

  47. What Drives FakeAV ? • FakeAV developers use affiliate networks to distribute and advertise FakeAV. • Affiliates in turn recruit meta affiliates to distribute FakeAV links and binaries. • Money is paid in Pay per Install scheme, for driving traffic to FakeAV Landing Pages and FakeAV purchases. • University of California research study reveals that FakeAV business earned more than 130 million dollars. DeepSec 2011

  48. AV vs FakeAV DeepSec 2011

  49. Conclusion • FakeAV is still one of the big threats actively infecting users. • Better understanding of operations used. • Able to study the different tricks used by FakeAV code. • Use this knowledge to better protect users from FakeAV Infection . DeepSec 2011

  50. Acknowledgements DeepSec 2011

  51. DeepSec 2011

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend