270 likes | 303 Views
Learn about the latest cyber security threats, including malware attacks, social engineering tactics, DoS attacks, and more. Explore techniques in digital forensics analysis and anti-forensic measures to safeguard your data and devices effectively.
E N D
Malcode Taxonomy K. Salah
The Ten Most Common Critical Cyber Security Threats • Malware attack with Social Engineering Tactics • SPAM • DoS and DDoS attack • Phishing and Pharming (identity theft) • Botnets • IM and P2P attack • Mobile and Wireless attack (Wi-Fi and Bluetooth) • Rootkits • Web Application Hacking • Hacking with Google K. Salah
Most Advanced Critical Cyber Security Threats • Zero Day Attack • Web 2.0 Attack • VoIP Attack • Web Services Attack • USB Attack K. Salah
Attack on the Critical Infrastructure • Government Operations • Telecommunications • Electrical Energy • Gas & Oil Storage and Delivery • Water Supply Systems • Banking & Finance • Transportation K. Salah
Virus, Spam and Spyware Relationship Spam Antispam Worm Phish/ Adware Antivirus Antispyware Virus Spyware Zombie/ Trojan K. Salah
Digital Forensics Analysis • Incident Notification • Understand Nature of Incident • Interview • Obtain Authorization • Verify Scope • Team Assembly • Document work area • Document Incident Equipment • Move Equipment • Prepare two images • Preserve/ Protect First Image • Use second Image for restoration and Examination • Data Extraction and Analysis • Watch Assumptions – Date /time • Review Log / Interview • Analysis • Prepare findings • Lesson Learned K. Salah
Anti-forensic techniques • Anti-forensic techniques try to frustrate forensic investigators and their techniques • Overwriting Data and Metadata • Secure Data Deletion • Overwriting Metadata • Preventing Data Creation • Cryptography, Steganography, and other Data Hiding Approaches • Encrypted Data • Encrypted Network Protocols • Program Packers • Steganography • Generic Data Hiding • Examples • Timestomp • Changes the dates of computer files (4 timestamps of NTFS). Encase shows blanks. • Slacker • Store files in the slack of disk blocks K. Salah
Virus Techniques • TSR • Virus can hide in memory even if program has stopped or been detected • Stealth Viruses • Execute original code • Size of file stays the same after infection • Hide in memory within a system process • Virus infects OS so that if a user examines the infected file, it appears normal • Encrypted/Polymorphic Viruses • To hide virus signatures encrypt the code • Have the code mutate to prevent signatures scanning K. Salah
Polymorphic Viruses K. Salah
Virus Cleaning • Remove virus from file • Requires skills in software reverse engineering • Identify beginning/end of payload and restore to original K. Salah
How hard is it to write a virus? • Simple Google search for “virus construction toolkit” • www.pestpatrol.com • Tons of others • Conclusion: Not hard K. Salah
Attaching code K. Salah
Integrate itself K. Salah
Completely replace K. Salah
Boot Sector Virus K. Salah
How viruses work • Attach • Append to program, e-mail • Executes with program • Surrounds program • Executes before and after program • Erases its tracks • Integrates or replaces program code • Gain control • Virus replaces target • Reside • In boot sector • Memory • Application program • Libraries K. Salah
Cont’d • Detection • Virus signatures • Storage patterns • Execution patterns • Transmission patterns • Prevention • Don’t share executables • Use commercial software from reliable sources • Test new software on isolated computers • Open only safe attachments • Keep recoverable system image in safe place • Backup executable system file copies • Use virus detectors • Update virus detectors often K. Salah
Virus Effects and Causes K. Salah
Virus vs. Worm • Both are Malicious Code • Virus does harm • Worm consumes resources K. Salah
Exploitation of Flaws: Targeted Malicious Code • Trapdoors • Undocumented entry point in code • Program stubs during testing • Intentionally or unintentionally left • Forgotten • Left for testing or maintenance • Left for covert access • Salami attack • Merges inconsequential pieces to get big results • A salami attack is a series of minor data-security attacks that together results in a larger attack. • For example, a fraud activity in a bank where an employee steals a small amount of funds from several accounts, can be considered a salami attack, i.e. deliberate diversion of fractional cents • Too difficult to audit K. Salah
Exploitation of Flaws: Targeted Malicious Code (cont’d.) • Covert Channels • An example of human/student covert channel • Programs that leak information • Trojan horse • Discovery • Analyze system resources for patterns • Flow analysis from a program’s syntax (automated) • Difficult to close • Not much documented • Potential damage is extreme K. Salah
File lock covert channel K. Salah
Race Conditions • In wu-ftpd v2.4 • Allows root access • Signal handling • SIGPIPE • EUID=user changes to EUID=root to logout the user and access privileged operations and files • It takes some time to do this • SIGURG • Logging out is broken/stopped and prompt is gotten back with EIUD=root K. Salah