Team 7 (Botnets and Malware)

16
(Botnets and Malware) The Zbot attack Group 7: Andrew Mishoe David Colvin Hubert Liu George Chen John Marshall Buck Scharfnorth

Transcript of Team 7 (Botnets and Malware)

Page 1: Team 7 (Botnets and Malware)

(Botnets and Malware)The Zbot attack

Group 7:Andrew Mishoe

David ColvinHubert Liu

George ChenJohn Marshall

Buck Scharfnorth

Page 2: Team 7 (Botnets and Malware)

What Happened?Type of Attack

Botnet - refers to group of compromised computers able to be controlled by masterTargeted malware attack (Zeus Trojan)Zeus crimeware toolkitAbility to evade anti-virus softwareBanking/Financial institutes, small companies attacked

Toolkit CapabilityCustomized malware creationWebsite PhishingCommand and Control capabilityWeb Injection Scripts (monitoring tools)Kill OS Script (delays victim from realizing attack)Screenshots, Logging Keystrokes, Running Proxy Server, Hosting Phishing Websites, Spamming Campaign

Page 3: Team 7 (Botnets and Malware)

What Happened?Installs on machine and disables security softwareEmbeds configuration file from toolkitRetrieves data and uploads to remote URL

Page 4: Team 7 (Botnets and Malware)

What was the impact?

Spread - First became widespread in March 2009- In May 2009, a botnet operator spontaneously decided to render inoperable 100000 PC's - Named America's most pervasive computer Botnet virus by Network World magazine in July 2009- In October 2009, Facebook phishing e-mails were measured being sent out at over 500 per second.- In November 2009, 9 million e-mails were sent out over a two day period targetting Verizon customers.- Infiltrated Amazon's Cloud Computing network in December 2009.

Page 5: Team 7 (Botnets and Malware)

What was the impact?

Spread (cont.) - 3.6 Million Infections, measured July 2009- Accounted for 44% of all financial malware infections in September - Still very active today

Page 6: Team 7 (Botnets and Malware)

Why did this attack succeed?

Social Engineering (Human Ignorance)Infiltrated computers through phishing emails

FacebookMicrosoft UpdatesConflickr RemovalCDC VacinationsUPSDelta AirlinesSystem Administrator emails

Used authentic looking domain namesupdata-1.com, admin-data.com, 1-db.com, 1ssl-network.com, upd-central.comcentral-updates.com, admin-systems.com, db-1.net, cert1.net, admin-db.net

Easy deployment, used by a vast number of criminal organizations

Page 7: Team 7 (Botnets and Malware)
Page 8: Team 7 (Botnets and Malware)
Page 9: Team 7 (Botnets and Malware)

Malware Tacticts 

Infects Computer in multiple waysPhishingMalicious scripts in webpages

RootkitHides files and folders from viewInjects code into system processesHard to detect by security software

Disable securityCloses firewall and other security applications

Fast-Flux DNS

Page 10: Team 7 (Botnets and Malware)

What happened in the aftermath?

ZBot Server in Cayman Islands shutdown in June 2009Stored FTP login information for over 68,000 websitesMajor companies including

Amazon Bank of America BBCCiscoMcAfeemonster.comSymantec

Two suspects questioned by Manchester officials in November

Page 11: Team 7 (Botnets and Malware)

Attacks continue...Amazon disconnected the infected channel in its EC2 Cloud shortly after the discovery in DecemberNewer variants more difficult to detect

Virustotal.com reports only 6 out of 41 anti-virus programs detected the virus as of September 2009

Over 200 new ZBot servers have come online already this year, and there are over 1,000 currently active serversNew phishing e-mail starting to appear just this past week, probably from Russia

Page 12: Team 7 (Botnets and Malware)

What was done to make systems less vulnerable to this kind of threat?Common

Educate users about spam and TrojansListen to system warningsFrequent anti-virus updatesKeep windows and other software up to date

Home UsersKeep up to date on the threats that existDon't open email from unknown sendersDon't open files or click on links unless you are sureDon't open firewall ports unless you know about the application

Page 13: Team 7 (Botnets and Malware)

What was done to make systems less vulnerable to this kind of threat?Corporate users

Use signatures to verify the authenticity of sendersKeep users out of the administrator accountsDo risky/sensitive work on virtual machinesTighter Firewall Protection and traffic filtersWeb filtering to help guard against malicious controller domainsInternal Distribution of updatesThreat detection devices embedded in the network

Page 14: Team 7 (Botnets and Malware)

What chapter in the book will be helpful in understanding this event?

Chapter 3 - Program SecurityViruses and Other Malicious Code (3.3)Targeted Malicious Code (3.4)

Chapter 7 - Security in Networks Threats in Networks (7.2)

Page 15: Team 7 (Botnets and Malware)

Questions?

Page 16: Team 7 (Botnets and Malware)

Sourceshttp://community.ca.com/blogs/securityadvisor/archive/2009/12/10/zbot-reports-a-quot-possible-fraudulent-visa-card-transaction-quot.aspx

http://blog.trendmicro.com/zbot-targets-facebook-again/

http://www.symantec.com/connect/blogs/zeus-king-underground-crimeware-toolkits

http://community.trendmicro.com/t5/Web-Threat-Spotlight/Facebook-Phishing-Page-Leads-to-Exploits-and-ZBOT/ba-p/2237 http://www.securecomputing.net.au/News/149039,malicious-server-used-to-propagate-zbot-shut-down.aspx http://www.securecomputing.net.au/News/148759,ftp-login-credentials-at-major-corporations-breached.aspx http://news.bbc.co.uk/2/hi/uk_news/england/manchester/8366504.stm http://www.spamfighter.com/News-12877-New-Study-Finds-Computer-Virus-Zeus-Bot-in-Internet-Postcards.htm http://www.darkreading.com/security/antivirus/showArticle.jhtml?articleID=220000718

http://blog.fortinet.com/august-2009-threatscape-zbot-detected-in-record-levels-fresh-vulnerabilities-consistently-attacked/

http://www.scmagazineus.com/new-verizon-wireless-themed-zeus-campaign-hits/article/157848/