malwares in cyber space threat landscape emerging trends
play

Malwares in Cyber Space Threat landscape, Emerging trends, - PowerPoint PPT Presentation

Malwares in Cyber Space Threat landscape, Emerging trends, Solutions and Challenges Atul Kabra, Solutions Architect CyberSpace The good, the bad and the ugly Internet is an unsafe neighborhood right in your office space


  1. Malwares in Cyber Space – Threat landscape, Emerging trends, Solutions and Challenges Atul Kabra, Solutions Architect

  2. CyberSpace – The good, the bad and the ugly • Internet is an unsafe neighborhood – right in your office space – your living room, cell phones – And god knows where all • Plenty of bad guys out there to steal your data, money, identity and anything else they can by infecting your devices • Some bad guys have turned ugly and they don’t care about your money anymore. don’t care about your money anymore. – They are out to spread cyber destruction/warfare • Lucky for you – There are some “good” guys out there too, working to keep you safe

  3. Zero-Day attacks – Rise of the ‘Malwares’ • Quarter-On-Quarter growth in Malware Samples – We now have more than 80 million samples. • Population of Bangalore ~ 8 million

  4. Malware growth • Growth in ‘New’ Malware

  5. Security Measures by OS vendors • Widen the adoption of ‘digital signatures’ – ‘Digital Signature/Certificate’ is a means of establishing ‘trust’ • ‘trust’ = “You are who you claim to be you are” • Windows is by and large the biggest target of PC based malwares • Microsoft’s response to tighten security in the OS – Enforce digital signature • Mandatory on all 64 bit platforms. 32 bit is excluded for legacy reasons • Mandatory on all 64 bit platforms. 32 bit is excluded for legacy reasons – Enhanced security in Windows 8 • UEFI boot – Ensures a secure boot through digital signatures • Early Launch of Anti Malware (ELAM) – Allows Anti-Malware driver to get launched ahead of any other kernel driver. – AM driver can allow/deny load of subsequent kernel modules based on their digital signature

  6. Now and interesting new trend – Digitally Signed Malwares

  7. Digitally signed malwares • How the ‘heck’ do the malwares get signed? – Doesn’t the digital signing process involve a trusted root? – What exactly is a ‘digital signature’? • A primer on digital signature might help – Technology built on asymmetric cryptography • Public + private key • Signed document contains – hash (md5) » Encrypted using private key » Encrypted using private key – Public Key of the signer • Decrypted at run time using public key – Verify the entity. • Malwares get signed using – Stolen certificates (Social Engineering) – Algorithmic Weaknesses (MD5) – Package a genuinely signed binary • Misuse it

  8. Example – Stolen certificates • Have you heard of ‘StuxNet’?? – Arguably the most sensational virus attack of the recent times • Seems like right from a Hollywood Sci-Fi Movie • Indication of change in motivation for malware authors (or their sponsors) • Here is what ‘Wikipedia’ has to say • Stealing Certificates happens all the time – Recent breach at security firm ‘bit9’ (https://blog.bit9.com/2013/02/08/bit9-and-our-customers- security/)

  9. Example – Algorithm Weaknesses • Flame – Also known as SkyWiper – Designed for cyber espionage, it could record audio, capture key strokes, screen shots and even skype traffic – Another malware discovered in Middle eastern geographies (largely Iran) • Main module of flame – A signed rootkit driver – The signature exploited a weakness (collision) in MD5 algorithm Image Src: http://www.wired.com • Inserted specially computed blocks in a file to produce two files with different contents and matching MD5 hashes – Used this weakness to generate dummy keys that matched the certificate of Microsoft Terminal Services – Roughly speaking, to generate this collision it would take about $20K of computing power on Amazon EC2

  10. Example – Mis(ab)using commercial drivers • Shamoon – Also known as Disttrack – Another Targeted attack • Energy companies in Mid-East – Corrupts files, MBR, and destroys the data so that it can't be recovered – Does it with the help of a signed driver called ‘drdisk.sys’ – Drdisk.sys is a commercially available, legitimately signed driver by ElDos Corp (http://eldos.com/rawdisk/)

  11. End Notes – Future of security and challenges ahead • Malwares are getting increasingly smarter • Challenges the Industry faces – With access to digital signatures, – Risk of high false positives they have broken a strong fort of – Difficult to run in a virtual security environment that uses offloaded • Traditional black-listing based detection engines solutions alone may not be sufficient anymore • Performance penalties – Especially for zero-day attacks – Newer attacks – ROP (Return • Need for futuristic solutions • Need for futuristic solutions Oriented Programming) – Heuristic/behavior based detection – WhiteListing can be too – Sandboxing based solutions restrictive for end users – Hardware assisted solutions • W Or X memory pages – DEP (Data Execution Prevention) • Hypervisor based security – SecVisor/MicroVisor – White Listing based solutions

  12. THANK YOU

Recommend


More recommend