1 / 15

MIRAGE MALWARE

CLEMSON UNIVERSITY. MIRAGE MALWARE . SIDDARTHA ELETI. Contents: 1. What is Malware 2. What is MIRAGE 3. How Does Mirage work 4. conclusion. Malware is a malicious program that is meant to disrupt computer operations,  gather sensitive information, or gain access to private computer systems.

elton
Download Presentation

MIRAGE MALWARE

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CLEMSON UNIVERSITY MIRAGE MALWARE SIDDARTHA ELETI

  2. Contents:1. What is Malware2. What is MIRAGE3. How Does Mirage work4. conclusion

  3. Malware is a malicious program that is meant to disrupt computer operations,  gather sensitive information, or gain access to private computer systems. • Malware could be code or scripts or active content etc. • Over the past few decades many malwares like STUXNET, Nimda, myDoom etc. have affected organizations, personal computers etc. and this year among many others its “MIRAGE” . What is MALWARE?

  4. Mirage is a malware that has appeared under the radar since April 2012. • Dell SecureWorks has been tracking a cyber espionage campaign that uses a remote access Trojan (RAT) named Mirage (also known as MirageFox. What is MIRAGE?

  5. How does Mirage Work?

  6. Mirage was intended to attack individuals at big oil and energy companies. • So it uses a technique called Spear-Pishing. • Spear-Pishing is a process of acquiring sensitive information from specific individuals or an organization by masquerading as a trustworthy entity. • In this scenario, the attackers gather personal information about the targets to increase their probability of success. Spear-Pishing

  7. The spearpishing emails contains an attachment that includes malicious payload which installs a copy of Mirage on the computer • The attachments are stand-alone executable files that open an embedded PDF and execute the Mirage Trojan in the background • Mirage installs itself into “c:\Windows” or the Users Home directory • It also creates a backboor which waits for instructions from the attacker • Mirage creates registry keys on every boot so that the system remains infected installation

  8. Mirage phones home to its c2 servers using standard HTTP Post request over the ports 80, 443 and 8080. • It can also use SSL for added security. • Iniitial phone-home request contains detailed system information of the infected system. • Example : • Once the c2 server gets this it responds with HTTP response code “200 ok”. Communication

  9. After a successful connection, infected system still sends regular check-in updates with its mac address in it. • All of its communications with its command and control servers are disguised to appear like the URL traffic pattern associated with Google searches. VARIANT 2: • Another variant of Mirage uses HTTP Get requests for communication. • In this variant instead of ‘Mirage’ in the beginning of the message it uses “It is the end of the world and I feel Fine", from the REM song "It's the end of the world."

  10. The picture below shows the sources of infected hosts. • After deep analysis researchers have found one infected host,an executive-level finance manager of the Philippine-based oil company. victims

  11. SecureWorks have identified that the attackers were operating out of china. • Used dynamic DNS domains for callbacks to c2 servers. • The hosting companies in US were running Htran. In 2011 analysis the software author was identified as member of Chinese hacker group HUC, the Honker Union of China. • Despite efforts during analysis of home phone activity researches four unique second-level domains were identified of which two shares a common email Id. Attackers

  12. The intention behind the attacks are still not known but they have hit many energy and oil companies world wide. • Its unclear about what kind of data they were trying to steal from the specific targets yet. Intentions

  13. Mirage was a light weight simple malware which proved to be effective because it was able to reach mid and senior-level executives. • This malware represents only a small piece of an ongoing worldwide campaign. • This proves that for a successful campaign only a small quantity of infected systems are required. conclusion

  14. http://www.secureworks.com/cyber-threat-intelligence/threats/the-mirage-campaign/http://www.secureworks.com/cyber-threat-intelligence/threats/the-mirage-campaign/ • http://news.cnet.com/8301-1009_3-57517388-83/cyberspying-effort-drops-mirage-on-energy-firms/ • http://www.scmagazine.com/new-espionage-campaign-tied-to-rsa-breach-ghostnet-attacks/article/259991/ • http://en.wikipedia.org/wiki/Malware Cited sites

  15. Thank you

More Related