Malware and Social Engineering Attacks
Malware Attacks
- Malware is malicious software that enters a computer system without the owner's knowledge or consent.
- It utilizes a threat vector to deliver a malicious "payload".
- Malware is a general term referring to a wide variety of damaging or annoying software.
Classification by Primary Trait:
- Circulation: How malware spreads rapidly to other systems.
- Viruses
- Worms
- Infection: How it embeds itself into a system.
- Trojans
- Ransomware
- Crypto-malware
- Concealment: How it avoids detection.
- Rootkits
- Payload capabilities: What actions the malware performs.
Circulation
Viruses
Malicious computer code that reproduces itself on the same computer.
Types of Viruses:
- Program virus: infects an executable program file.
- Macro virus: written in a script known as a macro and infects a common data file.
Virus infection method:
- Appender infection: virus appends itself to end of a file, easily detected by virus scanners.
- Armored virus: Goes to great lengths to avoid detection
- Swiss cheese infection: viruses inject themselves into executable code, making the code "scrambled" to be more difficult to detect.
- Split infection: virus splits into several parts, placing parts at random positions in host program
- Mutation:
- Oligomorphic virus: Changes its internal code to one of a set of predefined mutations whenever executed.
- Polymorphic virus: Completely changes from its original form when executed.
- Metamorphic virus: Can rewrite its own code and appear different each time it is executed.
Viruses Perform two actions:
- Unloads a payload to perform a malicious action
- Reproduces itself by inserting its code into another file on the same computer
Examples of Virus actions:
- Cause a computer to repeatedly crash
- Erase files from or reformat hard drive
- Turn off computer’s security settings
Viruses cannot automatically spread to another computer; it relies on user action to spread
Viruses are attached to files and are spread by transferring infected files.
Worms
- Malicious program that uses a computer network to replicate.
- Sends copies of itself to other network devices.
- Worms may:
- Consume resources
- Leave behind a payload to harm infected systems
- Examples of worm actions:
- Deleting computer files
- Allowing remote control of a computer by an attacker
- Difference between Virus and Worm:
- Virus:
- Inserts malicious code into a program or data file
- User transfers infected files to other devices to spread
- Infects a file
- Needs to have user action for it to spread
- Worm:
- Exploits a vulnerability in an application or operating system
- Uses a network to travel from one computer to another
- Does not infect a file
- Does not need to have user action for it to spread
- Virus:
Infection
Trojans
- An executable program that does something other than advertised.
- Contain hidden code that launches an attack
- Sometimes made to appear as a data file
- Example: User downloads “free calendar program” and the program scans system for credit card numbers and passwords and transmits that information to attacker through network.
- Remote Access Trojan (RAT): Gives the threat actor unauthorized remote access to the victim’s computer by using specially configured communication protocols.
Ransomware
- Prevents a user’s device from properly operating until a fee is paid.
- Highly profitable.
- Some ransomware displays a fictitious warning that a software license has expired or there is a problem and users must purchase additional software online to fix the problem
Crypto-malware
- A more malicious form of ransomware where threat actors encrypt all files on the device so that none of them can be opened.
- Once infected with crypto-malware:
- The software connects to the threat actor’s command and control (C&C) server to receive instructions or updated data.
- A locking key is generated for the encrypted files, and that key is encrypted with another key that has been downloaded from the C&C.
- Second key is sent to the victims once they pay the ransom
Concealment
Rootkits
- Software tools used by an attacker to hide actions or presence of other types of malicious software
- Hides or removes traces of log-in records, log entries
- May alter or replace operating system files with modified versions that are specifically designed to ignore malicious activity
- Users can no longer trust their computer that contains a rootkit because the rootkit is in charge and hides what is occurring on the computer.
Payload Capabilities
- The destructive power of malware can be found in its payload capabilities.
- Primary payload capabilities are to:
- Collect data
- Delete data
- Modify system security settings
- Launch attacks
Collect Data
- Different types of malware are designed to collect important data from the user’s computer and make it available at the attacker
- This type of malware includes:
- Spyware
- Adware
Spyware
- Software that gathers information without user consent
- Uses the computer’s resources for the purposes of collecting and distributing personal or sensitive information
- Keylogger: captures and stores each keystroke that a user types on the computer’s keyboard
- Attacker searches the captured text for any useful information such as passwords, credit card numbers, or personal information.
- Can be a small hardware device or a software program.
- Hardware keylogger: inserted between the computer keyboard connection and usb port
- Software keyloggers: programs installed on the computer that silently capture information
- Advantage is that they do not require physical access to the user’s computer
- Often installed as a Trojan or virus, can send captured information back to the attacker via Internet.
Adware
- Program that delivers advertising content in manner unexpected and unwanted by the user
- Typically displays advertising banners and pop-up ads
- May open new browser windows randomly
- Users disapprove of adware because:
- Adware can display objectionable content
- Frequent popup ads can interfere with a user’s productivity
- Popup ads can slow a computer or even cause crashes and the loss of data
- Unwanted advertisements can be a nuisance
Delete Data
- Payload of other types of malware deletes data on the computer
- Logic bomb: computer code that lies dormant until it is triggered by a specific logical event
- Difficult to detect before it is triggered
- Often embedded in large computer programs that are not routinely scanned
Modify System Security
- Backdoor: gives access to a computer, program, or service that circumvents normal security to give program access
- When installed on a computer, they allow the attacker to return at a later time and bypass security settings
Launch Attacks:
- Bot/zombie: An infected computer that is under the remote control of an attacker
- Groups of zombie computers are gathered into a logical computer network called a botnet under the control of the attacker (bot herder)
- Infected zombie computers wait for instructions through a command and control (C&C) structure from bot herders
- A common C&C mechanism used today is HTTP, which is more difficult to detect and block
- Types of attacks:
- Spamming: Botnets are widely recognized as the primary source of spam email. A botnet consisting of thousands of bots enables an attacker to send massive amounts of spam.
- Spreading malware: Botnets can be used to spread malware and create new bots and botnets. Bots can download and execute a file sent by the attacker.
- Manipulating online polls: Because each bot has a unique Internet Protocol (IP) address, each “vote” by a bot will have the same credibility as a vote cast by a real person.
- Denying services: Botnets can flood a web server with thousands of requests and overwhelm it to the point that it cannot respond to legitimate requests.
Social Engineering Attacks
- Social engineering: a means of gathering information for an attack by relying on the weaknesses of individuals.
- Social engineering attacks can involve psychological approaches as well as physical procedures
Psychological Approaches
- Psychological approaches goal: to persuade the victim to provide information or take action
- Attackers use a variety of techniques to gain trust without moving quickly:
- Provide a reason
- Project confidence
- Use evasion and diversion
- Make them laugh
- Psychological approaches often involve:
- Impersonation, phishing, spam, hoaxes, and watering hole attacks
Impersonation
- Attacker pretends to be someone else:
- Help desk support technician
- Repairperson
- IT support
- Manager
- Trusted third party
- Fellow employee
- Attacker will often impersonate a person with authority because victims generally resist saying “no” to anyone in power
Phishing
- Sending an email claiming to be from legitimate source
- Tries to trick user into giving private information
- The emails and fake websites are difficult to distinguish from those that are legitimate
- Variations on phishing attacks:
- Spear phishing: targets specific users
- Whaling: targets the “big fish”
- Vishing: instead of using email, uses a telephone call instead
- About 97% of all attacks start with phishing
Spam
- Unsolicited e-mail
- Primary vehicles for distribution of malware
- Sending spam is a lucrative business because it costs spammers very little to send millions of spam messages
- Filters look for specific words and block the email
- Image spam: uses graphical images of text in order to circumvent text-based filters
- Often contains nonsense text so it appears legitimate
Hoaxes
- A false warning, usually claiming to come from the IT department
- Attackers try to get victims to change configuration settings on their computers that would allow the attacker to compromise the system
- Attackers may also provide a telephone number for the victim to call for help, which will put them in direct contact with the attacker
Watering Hole Attack
- A malicious attack that is directed toward a small group of specific individuals who visit the same website
- Example: Major executives working for a manufacturing company may visit a common website, such as a parts supplier to the manufacturer
Physical Procedures
- Two of the most common physical procedures are:
- Dumpster diving
- Tailgating
Dumpster Diving
- Digging through trash to find information that can be useful in an attack
- An electronic variation of dumpster diving is to use Google’s search engine to look for documents and data posted online, called Google dorking
- Items retrieved and Why Useful:
- Calendars: A calendar can reveal which employees are out of town at a particular time
- Inexpensive computer hardware, such as USB flash drives or portal hard drives: Often improperly disposed of and might contain valuable information
- Memos: Seemingly unimportant memos can often provide small bits of useful information for an attacker who is building an impersonation
- Organizational charts: These identify individuals within the organization who are in positions of authority
- Phone directories: Can provide the names and telephone numbers of individuals in the organization to target or impersonate
- Policy manuals: These may reveal the true level of security within the organization
- System manuals: Can tell an attacker the type of computer system that is being used so that other research can be conducted to pinpoint vulnerabilities
Tailgating
- Following behind an authorized individual through an access door
- An employee could conspire with an unauthorized person to allow him to walk in with him (piggybacking)
- Watching an authorized user enter a security code on a keypad is known as shoulder surfing