20101018 資安新聞簡報 報告者:曾家雄、劉旭哲、莊承恩. NEW MALWARE MUROFET...

26
20101018 資資資資資資 資資資 資資資資 資資資資 資資資 :、、

Transcript of 20101018 資安新聞簡報 報告者:曾家雄、劉旭哲、莊承恩. NEW MALWARE MUROFET...

Page 1: 20101018 資安新聞簡報 報告者:曾家雄、劉旭哲、莊承恩. NEW MALWARE MUROFET FOLLOWING CONFICKER'S LEAD October 15, 2010 Dennis Fisher.

20101018 資安新聞簡報報告者:曾家雄、劉旭哲、莊承恩

Page 2: 20101018 資安新聞簡報 報告者:曾家雄、劉旭哲、莊承恩. NEW MALWARE MUROFET FOLLOWING CONFICKER'S LEAD October 15, 2010 Dennis Fisher.

NEW MALWARE MUROFET FOLLOWING CONFICKER'S LEADOctober 15, 2010

Dennis Fisher

Page 3: 20101018 資安新聞簡報 報告者:曾家雄、劉旭哲、莊承恩. NEW MALWARE MUROFET FOLLOWING CONFICKER'S LEAD October 15, 2010 Dennis Fisher.

Conficker• A computer worm targeting the Microsoft Windows

operating system • Be detected in November 2008• Co-opt machines and link them into a virtual computer

that can be commanded remotely

Page 4: 20101018 資安新聞簡報 報告者:曾家雄、劉旭哲、莊承恩. NEW MALWARE MUROFET FOLLOWING CONFICKER'S LEAD October 15, 2010 Dennis Fisher.

Conficker Variant• Five variants of the Conficker worm are known and have

been dubbed Conficker A, B, C, D and E

Page 5: 20101018 資安新聞簡報 報告者:曾家雄、劉旭哲、莊承恩. NEW MALWARE MUROFET FOLLOWING CONFICKER'S LEAD October 15, 2010 Dennis Fisher.

Conficker Variant

Page 6: 20101018 資安新聞簡報 報告者:曾家雄、劉旭哲、莊承恩. NEW MALWARE MUROFET FOLLOWING CONFICKER'S LEAD October 15, 2010 Dennis Fisher.

Conficker Variant

Page 7: 20101018 資安新聞簡報 報告者:曾家雄、劉旭哲、莊承恩. NEW MALWARE MUROFET FOLLOWING CONFICKER'S LEAD October 15, 2010 Dennis Fisher.

Payload Propagation• Variant A

• Generates a list of 250 domain names every day across five TLDs• The domain names are generated from a pseudo-random number

generator seeded with the current date

Page 8: 20101018 資安新聞簡報 報告者:曾家雄、劉旭哲、莊承恩. NEW MALWARE MUROFET FOLLOWING CONFICKER'S LEAD October 15, 2010 Dennis Fisher.

Payload Propagation• Variant B increases the number of TLDs to eight, and

produce domain names disjoint from those of the variant A• Variant D generates daily a pool of 50000 domains across

110 TLDs, from which it randomly chooses 500 to attempt for that day

• The generated domain names were also shortened from 8-11 to 4-9 characters to make them more difficult to detect with heuristics

Page 9: 20101018 資安新聞簡報 報告者:曾家雄、劉旭哲、莊承恩. NEW MALWARE MUROFET FOLLOWING CONFICKER'S LEAD October 15, 2010 Dennis Fisher.

Murofet• The main similarity between Conficker and Murofet is that

both pieces of malware use a pre-determined algorithm to generate seemingly random domain

• It generates pseudo-random domain names based on the year, month, day, and minute of execution

• Upon executing, Murofet starts a thread that attempts to download malware updates

Page 10: 20101018 資安新聞簡報 報告者:曾家雄、劉旭哲、莊承恩. NEW MALWARE MUROFET FOLLOWING CONFICKER'S LEAD October 15, 2010 Dennis Fisher.

Pseudo-Random Domain Algorithm• It generates two DWORD values

• The first is composed of the month, day, and low byte of the year of the date of execution, plus 0x30 (48)

• The second DWORD value is based on the minute of execution, multiplied by 0x11 (17)

Page 11: 20101018 資安新聞簡報 報告者:曾家雄、劉旭哲、莊承恩. NEW MALWARE MUROFET FOLLOWING CONFICKER'S LEAD October 15, 2010 Dennis Fisher.

Pseudo-Random Domain Algorithm

Page 12: 20101018 資安新聞簡報 報告者:曾家雄、劉旭哲、莊承恩. NEW MALWARE MUROFET FOLLOWING CONFICKER'S LEAD October 15, 2010 Dennis Fisher.

Pseudo-Random Domain Algorithm

Day Month Year

+ 0x30

First Dword

Minute

* 0x11

Second Dword

First Dword Second Dword

64 bits => 共 16個 nibles

Page 14: 20101018 資安新聞簡報 報告者:曾家雄、劉旭哲、莊承恩. NEW MALWARE MUROFET FOLLOWING CONFICKER'S LEAD October 15, 2010 Dennis Fisher.

MICROSOFT WANTS TO CORDON OFF BOTNET-INFECTED COMPUTERS報告者:劉旭哲

Page 15: 20101018 資安新聞簡報 報告者:曾家雄、劉旭哲、莊承恩. NEW MALWARE MUROFET FOLLOWING CONFICKER'S LEAD October 15, 2010 Dennis Fisher.

• Botnets = Zombie Network• DDoS• Spread spam

• "collective action" to combat cyberthreats -- particularly botnets.

Page 16: 20101018 資安新聞簡報 報告者:曾家雄、劉旭哲、莊承恩. NEW MALWARE MUROFET FOLLOWING CONFICKER'S LEAD October 15, 2010 Dennis Fisher.

1. individual defense• firewalls, antivirus, and automatic updates

2. collective defense• Computer Emergency Response Teams (CERTs)

3. active defense

4. Offense

Page 17: 20101018 資安新聞簡報 報告者:曾家雄、劉旭哲、莊承恩. NEW MALWARE MUROFET FOLLOWING CONFICKER'S LEAD October 15, 2010 Dennis Fisher.

• new users, devices, and application.

• Zeus botnet that captured users' banking sign-on information.

• New thinking and expanded approaches need to be applied to combat cyber threats

Page 18: 20101018 資安新聞簡報 報告者:曾家雄、劉旭哲、莊承恩. NEW MALWARE MUROFET FOLLOWING CONFICKER'S LEAD October 15, 2010 Dennis Fisher.

• " If you were the person whose computer was infected, wouldn't you want to know? “

• Public Health Model• Computer = Human

Page 19: 20101018 資安新聞簡報 報告者:曾家雄、劉旭哲、莊承恩. NEW MALWARE MUROFET FOLLOWING CONFICKER'S LEAD October 15, 2010 Dennis Fisher.

Public Health Model• Two complementary approaches:

① bolstering efforts to identify infected devices

② promoting efforts to better demonstrate device health

• Identify infected devices• Restrict infected devices• at least one access provider is now attempting this approach:

Comcast

Page 20: 20101018 資安新聞簡報 報告者:曾家雄、劉旭哲、莊承恩. NEW MALWARE MUROFET FOLLOWING CONFICKER'S LEAD October 15, 2010 Dennis Fisher.

Comcast• Constant Guard• Damballa, a botnet research firm• Use toolbar• The first ISP to provide this type of in-browser notification

Page 21: 20101018 資安新聞簡報 報告者:曾家雄、劉旭哲、莊承恩. NEW MALWARE MUROFET FOLLOWING CONFICKER'S LEAD October 15, 2010 Dennis Fisher.

• Demonstrate device health:① a mechanism to produce a health certificate

② trust

③ access providers request health certificates and take appropriate action

④ create supporting policies and rules

Page 22: 20101018 資安新聞簡報 報告者:曾家雄、劉旭哲、莊承恩. NEW MALWARE MUROFET FOLLOWING CONFICKER'S LEAD October 15, 2010 Dennis Fisher.

Defect• If there are some emergency services, infected computers

may still be permitted

• For example, cell phone.

Page 23: 20101018 資安新聞簡報 報告者:曾家雄、劉旭哲、莊承恩. NEW MALWARE MUROFET FOLLOWING CONFICKER'S LEAD October 15, 2010 Dennis Fisher.

• At least two advantages:① Before online banking activities

② More effective remediation• ISP could know specific device

Page 24: 20101018 資安新聞簡報 報告者:曾家雄、劉旭哲、莊承恩. NEW MALWARE MUROFET FOLLOWING CONFICKER'S LEAD October 15, 2010 Dennis Fisher.

Conclusion• Not perfect• Balance security and privacy• Building a socially acceptable and financially sustainable

model• Collective action

Page 26: 20101018 資安新聞簡報 報告者:曾家雄、劉旭哲、莊承恩. NEW MALWARE MUROFET FOLLOWING CONFICKER'S LEAD October 15, 2010 Dennis Fisher.

WEBGOAT莊承恩