Chapter 6

¡Supera tus tareas y exámenes ahora con Quizwiz!

File Infector

Infects files that the operating system or shell consider to be executable.

Monitored Behaviors

- Attempts to open, view, delete, and/or modify files - Attempts to format disk drives and other unrecoverable disk operations - Modifications to the logic of executable files or macros - Modification of critical system settings, such as start-up settings - Scripting of e-mail and instant messaging clients to send executable content - Initiation of network communications.

Virus Target Categories

- Boot Sector Infector - File Infector - Macro Virus - Multipartitie Virus

Trojan Horse Models

- Continuing to perform the function of the original program and additionally performing a separate malicious activity. - Continuing to perform the function of the original program but modifying the function to perform malicious activity or to disguise other malicious activity - Performing a malicious function that completely replaces the function of the original program

Mobile Code Methods

- Cross-Site Scripting - Interactive/Dynamic Web sites - E-mail attachments - Downloads from untrusted sites or of untrusted software

Bot Uses (HONE05)

- DDoS Attacks - Spamming - Sniffing Traffic - Keylogging - Spreading New Malware - Installing Advertisement Add-ons and BHOs - Attacking IRC Chat Networks - Manipulating Online Polls/Games

System Corruption Payloads

- Data destruction - Encryption of data for ransoming - Displaying unwanted messages or content - Real-world damage to a system These are attacks on the infected system's integrity (Or availability, for the ransomware)

Threat Mitigation Options

- Detection - Identification - Removal

Virus Phases

- Dormant phase - Propagation phase - Triggering phase - Execution phase

Virus Concealment Categories

- Encrypted Virus - Stealth Virus - Polymorphic Virus - Metamorphic Virus

Generations of Anti-Virus Software (STEP93)

- First generation: simple scanners - Second generation: heuristic scanners - Third generation: activity traps - Fourth generation: full-featured protection

Requirements for Malware Countermeasures

- Generality - Timeliness - Resiliency - Minimal DoS Costs - Transparency - Global and Local Coverage

Malware Categories

- How it spreads or propagates to reach the desired targets - The actions or payloads it performs once a target is reached

Virus Parts

- Infection Mechanism - Trigger - Payload

Propagation Mechanisms

- Infection of existing executable or interpreted content by viruses that is subsequently spread to other systems - Exploit of software vulnerabilities either locally or over a network by worms or drive-by downloads to allow the malware to replicate - Social engineering attacks that convince users to bypass security mechanisms to install Trojans, or to respond to phishing attacks.

Types of Perimeter Monitoring

- Ingress Monitors - Egress Monitors

Popular Mobile Code Vehicles

- Java apples - ActiveX - JavaScript - VBScript

Rootkit Techniques to Alter System Calls

- Modify System Call Table - Modify System Call Table Targets - Redirect System Call Table

Advanced Worm Features

- Multiplatform - Multi-Exploit - Ultrafast Spreading - Polymorphic - Metamorphic - Transport Vehicles - Zero-day Exploit

Rootkit Characteristics

- Persistent - Memory Based - User Mode - Kernel Mode - Virtual Machine Based - External Mode

Main Elements of Prevention

- Policy - Awareness - Vulnerability Mitigation - Threat Mitigation

Worm Network Scanning Strategies

- Random - Hit-List - Topological - Local Subnet

Worm Propagation Phase Functions

- Search for appropriate access mechanisms to other systems to infect by examining host tables, address books, buddy lists, trusted peers, and other similar repositories of remote system access details. Or by scanning possible target host addresses; or by searching for suitable removable media devices to use. - Use the access mechanisms found to transfer a copy of itself to the remote system, and cause the copy to be run.

Malware Detection Locations

- The infected system, via an "anti-virus" program - Perimeter security mechanisms in a firewall and IDS - Distributed mechanisms gathering data from both host-based and perimeter sensors -- Potentially over a large number of networks and organizations

Virus Categories

- The type of target the virus tries to infect - The method the virus uses to conceal itself from detection

Boot Sector Infector

Infects a master boot record or boot record and spreads when a system is booted from the disk containing the virus

Distributed Intelligence Gathering Approaches

1. Gathers data from a large number of both host-based and perimeter sensors 2. Relays this intelligence to a central analysis system able to correlate and analyze the data 3. The central system can then return updated signatures and behavior patterns to enable all of the coordinated systems to respond and defend against malware attacks

Fast-Flux DNS

A DNS technique used by botnets to hide phishing and malware delivery sites behind an ever-changing network of compromised hosts acting as proxies

Trojan Horse

A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes it

Worm

A computer program that can run independently and propagate a complete working version of itself onto other hosts on a network, usually by exploiting software vulnerabilities in the target system. - Actively seeks out more machines to infect

Watering Hole Attack

A form of drive-by-download attack in which the attacker: - Researches their intended victims to identify websites they are likely to visit - Scans these sites to identify which are vulnerable - Compromises one or more of the sites and waits for the target(s) to arrive -- Code may even be written so ONLY the specified targets are hit by the trap

Stealth Virus

A form of virus explicitly designed to hide itself from detection by anti-virus software. Thus, the entire virus, not just a payload is hidden. - May use code mutation, compression, or rootkit techniques to achieve this.

Polymorphic Virus

A form of virus that creates copies during replication that are functionally equivalent but have distinctly different bit patterns, in order to defeat programs that scan for viruses. In this case, the "signature" of the virus will vary with each copy. - To achieve this variation, the virus may randomly insert superfluous instructions or interchange the order of independent instructions. - A more effective approach is to use encryption. The strategy of the encryption virus is followed.

Encrypted Virus

A form of virus that uses encryption to obscure it's content. A portion of the virus creates a random encryption key and encrypts the remainder of the virus. The key is stored with the virus. - When an infected program is invoked, the virus uses the stored random key to decrypt the virus. - When the virus replicates, a different random key is selected. - Because the bulk of the virus is encrypted with a different key for each instance, there is no constant bit pattern to observe.

Botnet

A logical computer network of zombies under the control of an attacker. - Attacks the integrity and availability of the infected system

Reconnaisance Payload

A malware payload intended to obtain certain types of desired information and return them to the attacker

Virus Signature Scanner (GD)

A module that scans the target code looking for known malware signatures.

Malicious Software (Malware) [SOUP13]

A program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim's data, applications, or operating system or otherwise annoying or disrupting the victim - Threat to: -- Application programs -- Utility programs -- Kernel programs

CPU Emulator (GD)

A software-based virtual computer. Instructions in an executable file are interpreted by the emulator rather than executed on the underlying processor. - The emulator includes software versions of all registers and other processor hardware, so that the underlying processor is unaffected by programs

Phishing

A spam e-mail may direct a user to a fake Web site controlled by the attacker, or to complete some enclosed form and return to an e-mail accessible to the attacker, which is used to gather a range of private, personal, information on the user. - This is normally included in some message suggesting that urgent action is required by the user - Given sufficient details, the attacker can then "assume" the user's identity for the purpose of obtaining credit, or sensitive access to other resources.

Malvertising

A technique used to place malware on websites without actually compromising them - The attacker pays for advertisements that are highly likely to be placed on their intended target websites, and which incorporate malware in them. Using these malicious ads, attackers can infect visitors to sites displaying them. Again, the malware code may be dynamically generated to either reduce the chance of detection, or to only infect specific systems.

Macro Virus

A type of virus that uses macro or scripting code, typically embedded in a document, and triggered when the document is viewed or edited, to run and replicate itself into other such documents. - The evolution of the original machine executable code viruses

Syscall Number

A unique number assigned to each system call in a Linux system The kernel maintains a system call table with one entry per system call routine; each entry contains a pointer to the corresponding routine

Virus Permissions

A virus that attaches to an executable program can do anything that the program is permitted to do. It executes secretly when the host program is run. - Once the virus code is executing, it can perform any function, such as erasing files and programs, that is allowed by the privileges of the current user.

Clickjacking (User-Interface Redress Attack)

A vulnerability used by an attacker to collect an infected user's clicks, so they can force them to do things like adjust computer settings or go to a malicious website. - Through Adobe Flash or JavaScript, an attacker could even place a button under or over a legitimate button, making it difficult for users to detect. - A typical attack uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the top level page. - There are also keylogging versions of this

E-Mail or Instant Messenger Facility (Worm)

A worm e-mails a copy of itself to other systems, or sends itself as an attachment via an instant message service, so that its code is run when the e-mail or attachment is received or viewed.

File Sharing (Worm)

A worm either creates a copy of itself or infects other suitable files as a virus on removable media such as a USB drive; it then executes when the drive is connected to another system using the autorun mechanism by exploiting some software vulnerability, or when a user opens the infected file on the target system.

Remote Execution Capability (Worm)

A worm executes a copy of itself on another system, either by using an explicit remote execution facility or by exploiting a program flaw in a network service to subvert its operations

Remote Login Capability (Worm)

A worm logs onto a remote system as a user and then uses commands to copy itself from one system to the other, where it then executes

Remote File Access/Transfer Capability (Worm)

A worm uses a remote file access or transfer service to another system to copy itself from one system to the other, where users on that system may then execute it.

Persistent (Rootkit)

Activates each time the system boots. The rootkit must store code in a persistent storage site, such as the registry or file system, and configure a method by which the code executes without user intervention. - This means it is easier to detect, as the copy in persistent storage can potentially be scanned.

Adware

Advertising that is integrated into software. It can result in pop-up ads or redirection of a browser to a commercial site.

Drive-By-Download

An attack using code in a compromised Web site that exploits a browser vulnerability to attack a client system when the site is viewed - Usually doesn't actively propagate like a worm, instead waiting for a target to come to it

Backdoor (Trapdoor)

Any mechanism that bypasses a normal security check; it may allow unauthorized access to functionality in a program, or onto a compromised system

Metamorphic Virus

As with a polymorphic virus, a metamorphic virus mutates with every infection. The difference is that a metamorphic virus rewrites itself completely at each iteration, using multiple transformation techniques, increasing the difficulty of detection. - May change behavior as well as appearance.

Resistant to Traditional File Access Control (Macro Virus)

Because macro viruses infect user documents rather than system programs, traditional file system access controls are of limited use in preventing their spread, since users are expected to modify them.

Transport Vehicles (Worm)

Because worms can rapidly compromise a large number of systems, they are ideal for spreading a wide variety of malicious payloads, such as distributed denial-of-service bots, rootkits, spam e-mail generators, and spyware

Attacking IRC Chat Networks (Bots)

Botnets are also used for attacks against Internet Relay Chat (IRC) networks. Popular among attackers is especially the so called clone attack: In this kind of attack, the controller orders each bot to connect a large number of clones to the victim IRC network. - The victim is flooded by service requests from thousands of bots or thousands of channel joins by these cloned bots. In this way, the victim IRC network is brought down, similar to a DDoS attack.

Spreading New Malware (Bots)

Botnets are used to spread new bots. This is very easy since all bots implement mechanisms to download and execute a file via HTTP or FTP. A botnet with 10,000 hosts that acts as the start base for a worm or mail virus allows very fast spreading and thus causes more harm

Installing Advertisement Add-ons and BHOs (Bots)

Botnets can be used to gain financial advantages. This works by setting up a fake Web site with some advertisements: The operator of this Web site negotiates a deal with some hosting companies that pay for clicks on ads. With the help of a botnet, these clicks can be "automated" so that instantly a few thousand bots click on the pop-ups. - This process can be further enhanced if the bot hijacks the start-page of a compromised machine so that the "clicks" are executed each time the victim uses the browser.

Sniffing Traffic (Bots)

Bots can use a packet sniffer to watch for interesting cleartext data passing by a compromised machine. The sniffers are mostly used to retrieve sensitive information like usernames and passwords

Kernel Mode (Rootkit)

Can intercept calls to native APIs in kernel mode. The rootkit can also hide the presence of a malware process by removing it from the kernel's list of active processes.

Keyloggers

Captures keystrokes on a compromised system

Logic Bomb

Code inserted into malware by an intruder. It lies dormant until a predefined condition is met; the code then triggers an unauthorized act. - A key component for data corruption

Exploits

Code specific to a single vulnerability or set of vulnerabilities.

Downloaders

Code that installs other items on a machine that is under attack. It is normally included in the malware code first inserted on to a compromised system to then import a larger malware package

Emulation Control Module (GD)

Controls the execution of the target code and periodically interrupts interpretation to use the Virus Signature Scanner

Advanced Persistent Threats (APTs)

Cybercrime directed at business and political targets, using a wide variety of intrusion technologies and malware, applied persistently and effectively to specific targets over an extended period, often attributed to state-sponsored organizations.

Persistent (APT)

Determined application of the attacks over an extended period against the chosen target in order to maximize the chance of success. A variety of attacks may be progressively, and often stealthily, applied until the target is compromised.

Random Scanning

Each compromised host probes random addresses in the IP address space, using a different seed. This technique produces a high volume of Internet traffic, which may cause generalized disruption even before the actual attack is launched.

Multipartitie Virus

Infects files in multiple ways. Typically, the multipartite virus is capable of infecting multiple types of files, so that virus eradication must deal with all of the possible sites of infection

Generic Decryption (GD)

Enables the antivirus program to easily detect even the most complex polymorphic viruses and other malware, while maintaining fast scanning speeds Contains the following elements: - CPU Emulator - Virus Signature Scanner - Emulation Control Module

Ultrafast Spreading (Worm)

Exploit various techniques to optimize the rate of spread of a worm to maximize its likelihood of locating as many vulnerable machines as possible in a short time period.

Memory Based (Rootkit)

Has no persistent code and therefore cannot survive a reboot. However, because it is only in memory, it can be harder to detect.

Local Subnet Scanning

If a host can be infected behind a firewall, that host then looks for targets in its own local network. The host uses the subnet address structure to find other hosts that would otherwise be protected by the firewall

Keylogging (bots)

If the compromised machine uses encrypted communication channels (e.g. HTTPS or POP3S), then just sniffing the network packets on the victim's computer is useless - By using a keylogger, which captures keystrokes on the infected machine, an attacker can retrieve sensitive information.

Metamorphic (Worm)

In addition to changing their appearance, metamorphic worms have a repertoire of behavior patterns that are unleashed at different stages of propagation.

Keylogger Defense

In response to the use of keyloggers, some banking and other sites switched to using a graphical applet to enter critical information, such as passwords. - Since these do not use text entered via the keyboard, traditional keyloggers do not capture this information

Worm Propagation Phases

In the initial phase, the number of hosts increases exponentially, but slowly. In the middle phase infecting hosts waste some time attacking already infected hosts, which reduces the rate of infection - Infection becomes linear instead of exponential, but is rapid In the final phase most vulnerable computers have been infected and the worm is slowly seeking out those remaining hosts that are difficult to identify

Host-Based Behavior-Blocking Software

Integrates with the operating system of a host computer and monitors program behavior in real time for malicious action - Blocks potentially malicious actions before they have a chance to affect the system - Blocks software in real time so it has an advantage over anti-virus detection techniques such as fingerprinting or heuristics

User Mode (Rootkit)

Intercepts calls to APIs and modifies returned results. For example, when an application performs a directory listing, the return results do not include entries identifying the files associated with the rootkit.

Ingress Monitors

Located at the border between the enterprise network and the Internet - Can be part of the _________ filtering software of a border router or external firewall or a separate passive monitor - Can use anomaly, signature and heuristic approaches to detect malware - Software can be housed in a honeypot

Easily Spread (Macro Virus)

Macro viruses are easily spread, as the documents they exploit are shared in normal use. A very common method is by electronic mail.

Infect Documents, Not Code (Macro Virus)

Macro viruses infect documents, not executable portions of code. Most of the information introduced onto a computer system is in the form of documents rather than programs. - More potential targets

Auto-Rooter

Malicious hacker tools used to break into new machines remotely.

Virus

Malware that, when executed, tries to replicate itself into other executable machine or script code; when it succeeds, the code is said to be infected. When the infected code is executed, the virus also executes (First) - Viruses can spread over the network if they code they're embedded in is sent elsewhere - Named by Fred Cohen, who wrote a book on the subject

Keylogger

Malware which captures keystrokes on the infected machine to allow an attacker to monitor sensitive information. - Keyloggers typically implement some form of filtering mechanism that only returns information close to desired keywords (e.g., "login" or "password" or "paypal.com").

Platform Independence (Macro Virus)

Many macro viruses infect active content in commonly used applications, such as macros in Microsoft Word documents or other Microsoft Office documents, or scripting code in Adobe PDF documents. Any hardware platform and operating system that supports these applications can be infected.

Third Generation Anti-Virus

Memory-resident programs that identify malware by its actions rather than its structure in an infected program. - Have the advantage that it is not necessary to develop signatures and heuristics for a wide array of malware. - Rather, it is necessary only to identify the small set of actions that indicate malicious activity

Multi-Exploit (Worm)

New worms penetrate systems in a variety of ways, using exploits against Web servers, browsers, e-mail, file sharing, and other network-based applications; or via shared media.

Multiplatform (Worm)

Newer worms are not limited to Windows machines but can attack a variety of platforms, especially the popular varieties of UNIX; or exploit macro or scripting languages supported in popular document types.

Identification (Threat Mitigation)

Once detection has been achieved, identify the specific malware that has infected the system

Detection (Threat Mitigation)

Once the infection has occurred, determine that it has occurred and locate the malware.

Removal (Threat Mitigation)

Once the specific malware has been identified, remove all traces of malware virus from all infected systems so that it cannot spread further

Manipulating Online Polls/Games

Online polls/games are getting more and more attention and it is rather easy to manipulate them with botnets. Since every bot has a distinct IP address, every vote will have the same credibility as a vote cast by a real person. - Online games can be manipulated in a similar way

Fourth Generation Anti-Virus

Packages consisting of a variety of anti-virus techniques used in conjunction. - These include: -- Scanning -- Activity trap components -- Access control capability, which limits the ability of malware to penetrate a system and then limits the ability of a malware to update files in order to propagate

Information Theft Payloads

Payloads where the malware gathers data stored on the infected system for use by the attacker - Frequently the targeted data are login credentials - Certain documents or system configuration details may sought as well

Ideal Solution to Malware

Prevention: Do not allow malware to get into the system in the first place, or block the ability of it to modify the system

Zombie, bot

Program activated on an infected machine that is activated to launch attacks on other machines

First Generation Anti-Virus

Requires a malware signature to identify the malware. The signature may contain "wildcards" but matches essentially the same structure and bit pattern in all copies of the malware. - Such signature-specific scanners are limited to the detection of known malware. Another type of first-generation scanner maintains a record of the length of programs and looks for changes in length as a result of virus infection.

Rootkit Countermeasures

Requires a variety of network- and computer-level security tools. Both network-based and host-based IDSs can look for the code signatures of known rootkit attacks in incoming traffic. Host-based anti-virus software can also be used to recognize the known signatures. - Can also look for behaviors in case the rootkit uses a novel signature - Can also perform file integrity checks

Egress Monitors

Same as an Ingress monitor, but can also be located at the ________ point of individual LANs on the enterprise network as well as at the border between the enterprise network and the Internet - Designed to catch the source of a malware attack by monitoring out-going traffic for signs of scanning or other suspicious behavior

Second Generation Anti-Virus

Scanner uses heuristic rules to search for probable malware instances. One class of such scanners looks for fragments of code that are often associated with malware. Another _________-generation approach is integrity checking. A checksum can be appended to each program. If malware alters or replaces some program without changing the checksum, then an integrity check will catch this change. - To counter malware that is sophisticated enough to change the checksum when it alters a program, an encrypted hash function can be used. The encryption key is stored separately from the program so that the malware cannot generate a new hash code and encrypt that. -- If a protected list of programs in trusted locations is kept, this approach can also detect attempts to replace or install rogue code or programs in these locations.

Backdoor/Trapdoor

Secret entry point into a program that allows someone who is aware of it to gain access without going through the usual security access procedures. - Can be used to legitimately debug and test programs (In this case it's called a Maintenance Hook) - Can also be used as a network service, to listen on some non-standard port the attacker can issue commands to the infected system through

Rootkit

Set of hacker tools used after the attacker has broken into a computer system and gained root-level access - Helps maintain this access, while hiding evidence of the attacker - Alters the host's standard functionality in a malicious and stealthy way

Attack Kit

Set of tools for generating new malware automatically using a variety of supplied propagation and payload mechanisms.

Mobile Code

Software (e.g., script, macro, etc) that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics.

Spyware

Software that collects information from a computer and transmits it to another system by monitoring keystrokes, screen data, and/or network traffic; or by scanning files on the system for sensitive information. - Sometimes may dynamically modify data exchanged between the browser and certain websites of interest

Ransomware

Software that encrypts programs and data until a ransom is paid to decrypt it and remove the malware.

Payload Examples

System corruption, bots, phishing, spyware, theft of services or information (Keylogging, etc.) and rootkits

Global and Local Coverage

The approach should be able to deal with attack sources both from outside and inside the enterprise network

Resiliency

The approach should be resistant to evasion techniques employed by attackers to hide the presence of their malware

Timeliness

The approach should respond quickly so as to limit the number of infected programs or systems and the consequent activity

Minimal DoS Costs

The approach should result in minimal reduction in capacity or service due to the actions of the countermeasure software, and should not significantly disrupt normal operation

Generality

The approach taken should be able to handle a wide variety of attacks.

Hit-List Scanning

The attacker first compiles a long list of potential vulnerable machines. - This can be a slow process done over a long period to avoid detection that an attack is underway. Once the list is compiled, the attacker begins infecting machines on the list. - Each infected machine is provided with a portion of the list to scan. This strategy results in a very short scanning period, which may make it difficult to detect that infection is taking place.

Modify System Call Table (Rootkit)

The attacker modifies selected syscall addresses stored in the system call table. This enables the rootkit to direct a system call away from the legitimate routine to the rootkit's replacement.

Modify System Call Table Targets

The attacker overwrites selected legitimate system call routines with malicious code. The system call table is not changed

Redirect System Call Table

The attacker redirects references to the entire system call table to a new table in a new kernel memory location

Worm Introduction

The concept of a computer worm was introduced in John Brunner's 1975 SF novel The Shockwave Rider. The first known worm implementation was done in Xerox Palo Alto Labs in the early 1980s. It was nonmalicious, searching for idle systems to use to run a computationally intensive task.

Transparency

The countermeasure software and devices should not require modification to existing (legacy) OSs, application software, and hardware

Trigger (Virus)

The event or condition that determines when the payload is activated or delivered - Sometimes known as a logic bomb.

Worm Target Discovery (Scanning/Fingerprinting)

The first function in the propagation phase for a network worm is for it to search for other systems to infect

Host-Based Scanners

The first location where anti-virus software is used is on each end system. This gives the software the maximum access to information on not only the behavior of the malware as it interacts with the targeted system, but also the smallest overall view of malware activity. - Can be regarded as a form of host-based intrusion detection system

Execution Phase

The function is performed. The function may be harmless, such as a message on the screen, or damaging, such as the destruction of programs and data files.

Behavior Blocker Limitation

The malicious code must run on the target machine before all its behaviors can be identified, thus it can cause harm before it has been detected and blocked

External Mode (Rootkit)

The malware is located outside the normal operation mode of the targeted system, in BIOS or system management mode, where it can directly access hardware.

Infection Mechanism (Virus)

The means by which a virus spreads or propagates, enabling it to replicate. - Also referred to as the infection vector.

Mutation Engine

The portion of a polymorphic virus that is responsible for generating keys and performing encryption/decryption - It is altered with each use.

Propagate

The spreading of malware - Used by viruses, worms and Trojans

Triggering Phase

The virus is activated to perform the function for which it was intended. As with the dormant phase, the triggering phase can be caused by a variety of system events, including a count of the number of times that this copy of the virus has made copies of itself.

Dormant Phase

The virus is idle. The virus will eventually be activated by some event, such as a date, the presence of another program or file, or the capacity of the disk exceeding some limit. Not all viruses have this stage

Propagation Phase

The virus places a copy of itself into other programs or into certain system areas on the disk. - The copy may not be identical to the propagating version; viruses often morph to evade detection. - Each infected program will now contain a clone of the virus, which will itself enter a propagation phase.

Mobile Phone Worms

These worms communicate through Bluetooth wireless connections or via the multimedia messaging service (MMS). - The target is the smartphone, which is a mobile phone that permits users to install software applications from sources other than the cellular network operator

Spear-Phishing

This again is an e-mail claiming to be from a trusted source. However, the recipients are carefully researched by the attacker, and each e-mail is carefully crafted to suit its recipient specifically, often quoting a range of information to convince them of its authenticity.

Perimeter Scanning Limitation

This approach is limited to scanning the malware content, as it does not have access to any behavior observed when it runs on an infected system

Topological Scanning

This method uses information contained on an infected victim machine to find more hosts to scan.

VM Based (Rootkit)

This type of rootkit installs a lightweight virtual machine monitor, and then runs the operating system in a virtual machine above it. The rootkit can then transparently intercept and modify states and events occurring in the virtualized system

Threats (APT)

Threats to the selected targets as a result of the organized, capable, and well-funded attackers intent to compromise the specifically chosen targets. The active involvement of people in the process greatly raises the threat level from that due to automated attack tools, and also the likelihood of successful attack.

Zero-Day Exploit (Worm)

To achieve maximum surprise and distribution, a worm should exploit an unknown vulnerability that is only discovered by the general network community when the worm is launched

Polymorphic

To evade detection, skip past filters, and foil real-time analysis, worms adopt virus polymorphic techniques. Each copy of the worm has new code generated on the fly using functionally equivalent instructions and encryption techniques.

Worm Replication

To replicate itself, a worm uses some means to access remote systems. - E-Mail or Instant Messenger Facility - File Sharing - Remote Execution Capability - Remote File Access/Transfer Capability - Remote Login Capability

Spyware Detection and Removal

Tools that specialize in the detection and removal of spyware, and provide more robust capabilities. Thus they complement, and should be used along with, more general anti-virus products

Social Engineering

Tricking users to assist in the compromise of their own systems or personal information

Mobile Phone Trojans

Trojans that target smart phones and are typically distributed using app marketplaces

Worm Phases

Typically follows the same four phases as a virus

Perimeter Scanning Approaches

Typically included in e-mail and Web proxy services running on these systems. It may also be included in the traffic analysis component of an IDS. - This gives the anti-virus software access to malware in transit over a network connection to any of the organization's systems, providing a larger scale view of malware activity. This software may also include intrusion prevention measures, blocking the flow of any suspicious traffic, thus preventing it reaching and compromising some target system, either inside or outside the organization.

Spam

Unsolicited bulk e-mail - Some estimates suggest it accounts for 90% of all e-mail - Types -- Advertisements -- Scams -- Malware -- Phishing

Advanced (APT)

Use by the attackers of a wide variety of intrusion technologies and malware, including the development of custom malware if required. The individual components may not necessarily be technically advanced, but are carefully selected to suit the chosen target.

Flooders (DoS client)

Used to generate a large volume of data to attack networked computer systems, by carrying out some form of denial-of-service (DoS) attack.

Spammer Programs

Used to send large volumes of unwanted e-mail.

Blended Attack

Uses multiple methods of infection or propagation, to maximize the speed of contagion and the severity of the attack. - Some malware even support an update mechanism that allows it to change the range of propagation and payload mechanisms utilized once it is deployed.

Goal of APTs

Varies from theft of intellectual property or security and infrastructure related data to the physical disruption of infrastructure

Crimeware

Virus-creation toolkits built to help create and tweak malware. They include a variety of propagation mechanisms and payload modules that even novices can combine, select, and deploy. They can also easily be customized with the latest discovered vulnerabilities

Remote Control Facility

What distinguishes a bot from a worm - Worms propagate and activate independently - Bots are control by some form of command-and-control (C&C) server network

Payload (Virus)

What the virus does, besides spreading. The payload may involve damage or may involve benign but noticeable activity.

Attack Agent Payloads

Where the payload subverts the infected system for use by the attacker

Spamming (Bots)

With the help of a botnet and thousands of bots, an attacker is able to send massive amounts of spam.

Classic Epidemic MOdel

[dI(t) / dt] = Beta*I(t) * S(t) I(t) = number of individuals infected as of time t S(t) = number of susceptible individuals (susceptible to infection but not yet infected) at time t Beta = infection rate N = size of the population, N = I(t) + S(t)

Stealth Payloads

techniques used by malware to hide its presence on the infected system, and to provide covert access to that system. - This type of payload also attacks the integrity of the infected system.


Conjuntos de estudio relacionados

Anatomy and Physiology study set

View Set

ATI - Rectum and Genitourinary Tract

View Set

General Engine Diagnosis (Tests.com)

View Set

Mental and Emotional Health - Mental, Emotional, and Stress-Related problems - Anxiety, Depression, and Suicide

View Set