What is malware?
Program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity or availability of the victims data, applications or operating system or otherwise annoying or disrupting the victim
Motivation to write Malware
Fame, Fighting authority, Pen-testing, Financial gain (Sell data, sell attack kits), Cyber-war, Corporate espionage
What is a Trojan horse?
Program with overt purpose (known to user) and a covert purpose (unknown to user).
What are covert purposes of trojan?
Keylogger, System backdoor, DDOS engine, Web clicker
What is the Thompson compiler hack?
Using a modified compiler to compile a trojan and publishing the original source code with the modified executable. Proves that open source code does not solve the trust issue
What is a virus?
A software fragment that attaches itself to some existing executable. The virus can replicate itself and pass on malicious code to other non-malicious executable by modifying them
How do trojans spread?
Usually the user installs them e.g.: Hacker tools, Website widgets that make your website prettier, Thumbnails of adult videos
How do viruses propagate?
By users exchanging infected executables or files e.g. by E-Mail, file-sharing or USB Sticks
What are the parts of a virus?
Whats the typical lifetime phases of a virus?
Virus classification by source
Virus classification by concealment
How are viruses detected?
What are obfuscation and anti-debugging techniques?
-Obfuscation: Insert garbage opcodes and change control structure. Different signature on each instance makes it difficult to detect
-Anti-Debugging: Detect virtual machines and debuggers. Terminate process
What is a worm?
A program which actively seeks to infect other machines by exploiting software vulnerabilities
How do worms typically spread?
What are the lifetime phases of a worm?
Same as virus:
1. Dormant phase: Sleep
2. Propagation phase: Search for appropriate access mechanisms to other systems to infect (Host tables, removable media, buddy lists)
3. Triggering phase: Worm is activated (e.g. by Timer)
4. Execution phase: Malicious payload is executed
What are the target identification strategies of a worm?
What is ransomware? How does it work? Takedown example?
-Ransomware: A program which encrypts user data and demands money for decryption key:
-How it works: E.g. spread via worm. Encrypt all files using AES key and encrypt key with RSA keypair and send private key to C&C server. When money is transferred, send the key for decryption
-Takedown: WannaCry: Primes to generate RSA were still in memory. Thus private key could be computed
Malware classification by payload
-Non-Destructive: E.g. displaying funny messages, flashing an
image on the screen
-Destructive: Corrupt files, delete files, damage software,… with no reason other then to harm the victim
-Commercial or criminal intent: Stealing information such as
credentials, corporate plans, personal data, gain remote
control of the victim’s machine to distribute spam or conduct
distributed denial of service attacks
Examples for System corruption, Information theft, Stealthing, Bots
-System corruption: Data Destruction, Ransomware, Physical-World Damage, Logic Bomb
-Information theft: Keyloggers and spyware, Phishing and identity theft, Espionage and data exfiltration
-Stealthing: Backdoors and rootkits
-Bots: DDOS