170 likes | 378 Views
The wonderful world of worm traps. Gabor Szappanos gszappanos@virusbuster.hu. Why we need worm traps?. Shorten reaction time (eliminate user factor). Get new variants (repacked, recompiled). Get a sample for disinfection (if known). Know what is spreading. Instantly.
E N D
The wonderful world of worm traps Gabor Szappanos gszappanos@virusbuster.hu
Why we need worm traps? Shorten reaction time (eliminate user factor) Get new variants (repacked, recompiled) Get a sample for disinfection (if known) Know what is spreading
Instantly Sample is captured in a trap Virus lab alerted Shorten reaction time Malware starts spreading/seeding Hours/days Users notice something unusual Hours/days Submit the sample to a virus lab Hours Sample proves to be malicious Database update released
Port listeners No (or low) interaction traps Capture TCP/UDP port traffic + Very easy to implement - Truncated samples on broken connections
Mydoom port listener Using the backdoor and keeping it (same group) (Mydoom.E, .F, Doomjuice.A, .B) Using the backdoor and removing it (Nachi.H, Doomhunter) Using the backdoor (Vesser, Agobot variants) Not using the backdoor, but seeded via the backdoor (downloader Agent, Apher, Rscrt; Spybots) Not using the backdoor, but removing it (Netsky variants)
E-mail traps Seeded addresses Attachment filtering Attachment filtering + spam filter Attachment filtering + RPD that support file sharing
SMB traps Captures worms spreading via open networks shares Create open shares and/or shares with weak username/password combinations Implementation on every OS that support file sharing
SMB traps + Easy to implement on non-vulnerable platforms Easy maintenance - Damaged samples Reinfection loops Depends on ISP settings
Location matters • Identical traps on different ISPs show very different results • Different filtering rules • Local spreading preference for most worms
Native traps Default install without patches Carefully designed (DMZ) Security measures to stop spreading
Native traps + Shows exactly what is affecting user population Get downloaded and dropped components properly - Need to be careful in design not to get infective Collects malware specific to the installed OS / patch state
Protocol emulators Emulate common vulnerabilities Parse shell codes Implemented on different platforms Windows: WormRadar, HBPot, Multipot Linux: MWCollect, Nepenthes
Protocol emulators In a selected 37 hour period 6699 attempts, of them 3057 successful, 73 different malware samples. It takes about 1.3 minutes for an average user to get infected. + Safe to use - no danger of getting infective Emulates many OS version at once - Needs to be updated for new vulnerabilities/shell codes Captures may be truncated
URL traps • Monitor known download sites • Keep track of the new variants • Source: • URLs obtained from malware analysis • URLs extracted from mass-distributed e-mails
Other places to monitor IRC channels P2P networks Usenet Self-spreading malware Seeding Botnet commands