290 likes | 374 Views
Instant Situational Awareness: Finding Malware like a HoneyBadger. John ‘JB’ Bisaillon, CISSP Digital Scepter Corporation. About the Presenter. John ‘JB’ Bisaillon, CISSP Sales Engineer for Digital Scepter Previously: Sr. Information Assurance Engineer for DoD contractor
E N D
Instant Situational Awareness: Finding Malware like a HoneyBadger John ‘JB’ Bisaillon, CISSP Digital Scepter Corporation
About the Presenter • John ‘JB’ Bisaillon, CISSP • Sales Engineer for Digital Scepter • Previously: • Sr. Information Assurance Engineer for DoD contractor • Nationwide technical trainer of penetration testing and ‘ethical hacking’ courses
About Digital Scepter • Boutique Security-Focused Systems Integrator and Value-Added Reseller • http://digitalscepter.com
What is a HoneyBadger? • “The world’s most fearless creature” according to the Guinness Book of World Records • Going up against a nest of bees or a king cobra: “I don’t care” attitude
Agenda • The Need for Instant Situational Awareness • Malware capabilities and uses • Malware behavior • Evidence of malware infection • Introducing a new tool that can find evidence of malware on your network in 15 seconds And plenty of demos…
Reality…Nothing is 100% foolproof • Prevention will ultimately fail • Zero day malware • Misconfiguration/design • Human error/social engineering • Therefore must continously monitor and detect security breaches ‘Unsinkable’ Titanic
You Need Instant Situational Awareness • What apps/processes/services are running? • What network connections ? • Who is logged on? • What config changes have just occurred? • Ideally you want this information from all the machines in your network, and fast!
Malware is Constantly Evolving • Good guys can’t keep up with new threats in terms of signatures… • You need to understand how malware behaves and use this info to detect security breaches • What if you could easily write ‘sensors’ that look for malware behavior on all your machines in just a few seconds ? That would give you situational awareness (stay tuned!)
Malware Distribution Methods • E-Mail Attachments & Links • Web downloads for Freeware Software • Browser and E-mail Software Bugs (‘drive-by downloads’) • Physical Access/ Storage Media (CDs, USB drives) • Peer to Peer File Sharing • Network Shares • IM / IRC Chat Rooms • Usenet Newsgroups
Malware Capabilities • Remote Access / Backdoors • Password stealing & sending • Keyloggers • Surveillance • Destruction of data • Denial Of Service • Spamming • Security software detection and termination
Evasive Network Communications • SSL encryption • Port hopping • Tunneling • Anonymizers/circumventors • Proxies • Encoding and obfuscation
Ultimate Purposes of Malware • Industrial espionage / Intellectual property theft • Nation-state cyber warfare • Monetary gain • Hacktivism • Just for Fun? - not so important nowadays
Finding Malware • You first need to know what it does in order to look for evidence of it. • But how do you know what a piece of malware does? • You could execute it yourself in a sandboxed environment and monitor: • New network connections • New processes • Registry changes • File system changes • Etc…
Sample Zero-Day Malware Analysis • Wildfire feature found on Palo Alto Networks firewalls
Common Behaviors We Can Look For • AutoStart methods • New listening ports • Weakened OS security • Weakened web browser security • New executable or dll files in Windows System directory • New services
AutoStart Methods Modifications to any of these can cause malware to keep running after reboots: • System files (autoexec.bat, system.ini, win.ini, etc) • Registry Keys • Startup folder
Process Monitoring Software • Listing running processes and associated DLLs and attributes can help identify malicious software. • One should become familiar with standard Windows processes so that suspicious processes can be easily identified. • Beware that malware will often rename processes with the same name that existing Windows processes uses! Process Monitoring Software: • Process Viewer • Process Monitor • Process Explorer • Task Manager
Port Monitoring Software • To quickly reveal what active connections are established, as well as any listening ports, use the built-in netstat command • When a suspicious port is found, use one of the following tools to map the open port to a running executable and process name or id: • Port Explorer • Fport • TCPview Beast trojan running on port 6666
Advanced Trojans: Process Injection • Some trojans like Back Orifice and Beast inject their DLL process into some other running process • The result is that the trojan is harder to detect as their process doesn’t show up in Task Manager • Countermeasures: • Use a hidden process viewer like Inzider • Prevent injection using Process Guard
BackDoor: SubSeven SubSeven is a backdoor program that enables hackers to gain full access to Windows systems through a network connection. The attacker can delete and modify files, kill running processes, start new processes, capture keystrokes, and even image the remote system’s desktop.
Advanced Trojans: Beast • Beast is a powerful trojan incorporating DLL injection • It has built-in anti-virus killing features • The client, server, and server editor are contained in one file
Search for Evidence Everywhere, Instantly • What if you could search for evidence not on a single machine, but for thousands of machines at the same time? And get the results back in just seconds?
Time for Live Demos • Running VMs that are already infected…