Showing posts with label malware. Show all posts
Showing posts with label malware. Show all posts

Ten emerging malware trends for 2007

The bad guys have cranked up their malware-generating machine in the past couple of years, honing their methods to create powerful malicious code. And, the small trickles of advanced malware that we have seen in recent months are indicative of a tumultuous future. Here are 10 trends to keep an eye on from the malware front:


10) Spyware protected by rootkits
Spyware authors primarily make money when their software injects advertisements into a user's surfing experience, sends spam from a user's machine or performs keystroke logging to snag account numbers from a victim. The longer spyware is installed on a system, the more money an attacker can make. Enter rootkits, which alter operating system software so an attacker can hide code while maintaining control of the system. Today's sophisticated rootkits can hide attackers' files, processes and network usage from unsuspecting users and system administrators. This powerful combination, which sticks spyware to the victim machine using rootkit techniques, makes detecting and eradicating malware very difficult indeed. To fend off such attacks, keep antivirus and antispyware tools up-to-date, and utilize free rootkit-detection tools, like Microsoft's Rootkit Revealer, F-Secure Corp's Blacklight, Sophos' Anti-Rootkit, McAfee Inc.'s Rootkit Detective and Trend Micro Inc.'s RootKitBuster.

9) Totally smashing trust with evil certs
When a browser is installed, it contains certain digital certificates of certificate authority companies that your browser vendor believes are trustworthy. These companies can generate certificates for other organizations, such as banks, ecommerce companies and software vendors. Unfortunately, some savvy hackers have started to install alternative, evil certificates into the browsers of infected machines, meaning even after a victim discovers and removes an attacker's spyware, a phony certificate would tell the previously infected machine's browser to trust malicious Web sites, making reinfection easier. To mitigate this threat, I recommend periodically checking the trusted certificate authorities that are configured in your browser, and verify that those companies can be trusted. Internet Explorer users can check these certs by going to Tools then Internet Options then Content then Certificates. Once in the Certificate tab look under Intermediate Certificate Authorities then Trusted Root Certification Authorities then Trusted Publishers.

8) Editing network configurations and disabling antimalware tools in multiple ways
For years, some malware samples have attempted to foil antivirus and antispyware updates by altering a local hosts file to point the domain names of the various antimalware vendors to 127.0.0.1. That way, when the antimalware tool tries to receive its update, it resolves the vendor's domain name to localhost, where, unfortunately, there isn't a server waiting to deliver signature updates. Look for hackers to bring this technique to new levels this year. While altering a host file is pretty blatant, attackers have started using more subtle tactics, like attempting to change personal firewall settings to block access to antimalware sites or running scripts that turn off various antivirus and antispyware tools. Hackers are deploying malware that renders the antimalware tool blind, a tactic that's harder for users to spot. To defend against such attacks, pay attention to the update status of your antivirus tool; verify that it can download new signatures. It is also wise to periodically check your antivirus tool. I recommend using the EIcertificate authorityR's free antivirus test file. If an antimalware tool cannot detect EIcertificate authorityR, in all likelihood, it has been disabled.

7) Self-updating malware and metamorphic code
In an effort to stay ahead of antimalware signature updates and to deploy new functionality to extend the capabilities of their botnets, attackers are increasingly deploying self-updating malware. Such tools poll attacker-controlled Web sites for the latest updates, which bad guys can effortlessly install on hundreds of thousands of machines in just minutes. In effect, the attackers are implementing distributed software distribution, not unlike their own private Windows Server Update Services (WSUS). To stay ahead of this trend, update antivirus and antispyware tools once a day, and use tools like Microsoft Sysinternals' TCPView to look for unusual connection activity going to or from the system.

6) Peer-to-peer botnets
Historically, botnets have been controlled using Internet Relay Chat (IRC). Each bot logs into the same IRC channel as its creator. The attacker issues commands, which all of the bots read and then perform. But, there's a problem with this for the bad guys – there is a single point of failure. If investigators shut down the IRC server or remove the channel, the botnet cannot accept commands, preventing the attacker from communicating with his minions of infected machines. To avoid this, attackers are starting to use peer-to-peer (P2P) protocols to direct botnets without a central point of control. Some cutting-edge criminals are also looking for ways to control botnets using the Waste and Skype protocols used for Internet-based phone calls. These two techniques indicate the attackers are, in effect, creating highly distributed systems and are devising clever mechanisms for managing their distributed empires. To prevent this information security threat, use a tool like TCPView or the netstat command to look for unusual communications streams going to or from the system.

5). Script-based worms for Web 2.0 site
Recently, we've seen attackers exploiting Web services, which often allow one user to post information that thousands of other users can read. These so-called "Web 2.0" services include MySpace, Facebook, Gmail and countless others. Some are vulnerable to cross-site scripting attacks, in which malicious hackers post a script to their page in the service, and trick users into viewing the page via a browser. Once the victim reads the page, his or her browser runs the attacker's script. This script then uses the victim's account to add the script to the victim's own profile. If anyone else were to read this victim's profile, their account will become infected. The contagion then spreads, account to account, using victim's browser as the vehicle to run scripts from other users' profiles. To help defend against Web 2.0 attacks log out of any accounts and browsers when not in use.

4) Client-side exploits
As Microsoft has worked to eliminate server-side exploits, attackers are increasingly hunting for exploitable vulnerabilities in client-side software, including browsers, file viewers and music applications. In 2006, we saw several zero-day attacks in software like Internet Explorer, Microsoft Word, Microsoft PowerPoint and others. After creating an evil file that exploits the given client software, attackers then spew it out in spam or load it onto Web sites around the world, exploiting users who read the email attachment or simply surf to the wrong site. Look for many, many more of these in the future. To defend against them, diligently patch computers and ensure that antimalware software is current; if an enterprise system is vulnerable, detecting and removing malicious code is easier. Finally, consider using host-based intrusion prevention systems (HIPS), such as McAfee's Entercept and Cisco Systems Inc.'s Security Agent. HIPSes can defend against many attacks that haven't been seen by preventing the actions exploitable applications may take.

3) Privilege escalation attacks
With the release of Windows Vista, Microsoft has worked hard to create an operating system that more carefully divides user privileges. With Vista, it should be easier to deploy users in roles that let them get work done, without granting them local administrator privileges. This is certainly a good advance if the Microsoft promises are accurate. Too many organizations today let users surf the Web and read email from admin-based accounts. But if Windows Vista succeeds and eases the deployment of users without admin rights, attackers will most certainly need to develop new techniques. They'll still be able to break in with a client-side exploit, but, because clients have limited privileges, they won't have complete control of victims' machines. Therefore, look for attackers to focus heavily on finding local privilege-escalation attacks that will jack up their non-admin accounts to local system privileges, the most powerful local rights on a Windows machine you can have. To defend against what may be an avalanche of these exploits in 2007, keep Windows patched and deploy antivirus and antispyware tools.

2) Really big botnets (RBBs)
It almost seems quaint to think of the botnets of a decade ago, with one to three hundred systems under control of one malicious hacker. Today, such numbers represent a baby botnet. Hackers have extended their empires so that botnets of 60,000 infected machines are run of the mill. Look for bigger botnets in the future, with several examples tipping the scale over a million systems. With economies of scope at that magnitude, the attackers wield immense computing power. They can direct a flood and knock systems off of the network, crack crypto keys and passwords at rates that used to only be available to highly funded government agencies. To deal with this trend, those responsible for the security of an organization's network should have the emergency number for their ISPs, so if there is a massive attack against an organization, key personnel are notified.

1) Move to non-computer platforms
The vast majority of malware to date has affected PCs. But as more and more processing power is added to non-computer platforms, more generalized operating systems will be able to store sensitive data. In 2007, watch for attacks against cell phones, PDAs and (dare I say it?) even the iPod. As such devices proliferate and are connected to the Internet wirelessly, a whole new malicious code vector will surface. While there aren't a lot of defenses available now, antivirus vendors will realize the need for such tools in this new environment and release products specialized for this realm.

About the author:
Ed Skoudis is a founder and senior security consultant with Intelguardians, a Washington, DC-based information security consulting firm. His expertise includes hacker attacks and defenses, the information security industry and computer privacy issues. In addition to Counter Hack Reloaded, Ed is also the author of Malware: Fighting Malicious Code. He was also awarded 2004, 2005 and 2006 Microsoft MVP awards for Windows Server Security, and is an alumnus of the Honeynet Project. As an expert on SearchSecurity.com, Ed answers your questions relating to information security threats.

from: here

中国互联网协会正式公布“恶意软件”八大定义

Chinese internet association finally did something to the flooding malware.

新华网北京11月23日电(记者赵晓辉)中国互联网协会日前正式公布恶意软件的定义,为下一步研究解决对策提供依据。

根据定义,恶意软件是指在未明确提示用户或未经用户许可的情况下,在用户计算机或其他终端上安装运行,侵害用户合法权益的软件,但不包含中国法律法规规定的计算机病毒。

中国互联网协会认为,具有下列特征之一的软件可以被认为是恶意软件:

--强制安装:指未明确提示用户或未经用户许可,在用户计算机或其他终端上安装软件的行为。

--难以卸载:指未提供通用的卸载方式,或在不受其他软件影响、人为破坏的情况下,卸载后仍然有活动程序的行为。

--浏览器劫持:指未经用户许可,修改用户浏览器或其他相关设置,迫使用户访问特定网站或导致用户无法正常上网的行为。

--广告弹出:指未明确提示用户或未经用户许可,利用安装在用户计算机或其他终端上的软件弹出广告的行为。

--恶意收集用户信息:指未明确提示用户或未经用户许可,恶意收集用户信息的行为。

--恶意卸载:指未明确提示用户、未经用户许可,或误导、欺骗用户卸载其他软件的行为。

--恶意捆绑:指在软件中捆绑已被认定为恶意软件的行为。

--其他侵害用户软件安装、使用和卸载知情权、选择权的恶意行为。

中国互联网协会表示,定义恶意软件的目的是通过行业自律的方式约束互联网企业的行为,维护互联网用户合法权益,维护良好网络环境。

据介绍,制定恶意软件的界定标准之后,中国将设立恶意软件举报热线,并审议、确定和发布恶意软件“黑名单”。同时,组织互联网服务提供商签署抵制恶意软件的自律公约,不制作、不传播已经界定的恶意软件。

中国网民数已经达到1.23亿。信息产业部预计,到今年底,中国网民数量有望超过美国居全球首位。

【延伸阅读】

中国首次判决“流氓软件”侵权案 原告败诉

  新华网北京11月17日电(记者李京华)北京市朝阳区人民法院17日判决一起“流氓软件”侵权案,此案是中国有关“流氓软件”侵权案的首次判决。

原告董海萍针对“雅虎助手”软件而向北京阿里巴巴信息技术有限公司、国风因特软件(北京)有限公司提起的诉讼,因证据不足被朝阳法院一审驳回而败诉。>>>点击详细

记者调查

"流氓软件"背后的灰色产业链

记者和一名销售月饼的网友以在网络上做月饼广告的名义来到位于北京市东三环的一家网络广告公司进行暗访。一名姓方的广告员接待了我们,开始向我们推荐他们公司效果最好的网络弹窗广告。

据这名广告员介绍,目前国内像他们这种依靠 “流氓软件”出售广告弹窗的网络广告公司、工作室至少有几百家,而这些网络广告公司正是“流氓软件”产业链连接上游广告主和下游共享软件作者的关键环节, 他们一般用“装机量”来形容自己的广告实力,也就是广告程序侵入电脑的数量,一些大公司的装机量超过2000万台,小的也能做到100万台左右,按照一天 弹出百万次广告计算,每月收入几十万元很正常,年收入过千万元也不足为奇。据这位广告员透露,他们公司已经研制成功的一种新的广告程序即将投入使用,这种 程序可以在用户阅读的文章里嵌入图片或视频广告。

高手建议

慎删流氓软件

我们有时在正常使用电脑,突然杀毒软件报警,某个插件里发现 了病毒,而且这个病毒还无法被杀毒软件自动删除,也无法通过添加删除程序卸载,只能暂时通过杀毒软件进行隔离处理。遇到这种情况,专家并不建议采取直接删 除的方式。如果病毒不在C盘,也许还可以采取删除的手段,但是由于不是通过添加删除程序实现的卸载,所以恶意插件极有可能无法删除干净,未删除部分将极有 可能常驻在电脑里,永远占用宝贵的系统资源。不仅如此,有些恶意插件不删除干净,再次开机后,它会通过网络自动下载被删除部分,并重新安装。

而对于恶意插件存在C盘里的情况,专业人士建议用户不要轻易下手硬性删除。

对于上述问题,高手建议,用户可以根据杀毒软件报告的问题插件或病毒的名称,到搜索引擎里去查找一下它的克星是谁,哪个专杀工具或另外哪个杀毒软件可以专门来处理这个问题。有时候,直接把你现行使用的杀毒软件升级到最新版本,或许也能迅速解决问题。

 温馨提示

学会建立良好的安全习惯

1.建立良好的安全习惯,不打开可疑邮件和可疑网站;

2.很多病毒利用漏洞传播,一定要及时给系统打补丁;

3.安装软件时要仔细查阅许可协议,并仔细查看安装过程中的每一个步骤,防止被安装上广告软件;

4.安装专业的防毒软件升级到最新版本,并打开实时监控程序;

5.安装带有“木马墙”功能的个人防火墙软件,防止密码丢失。

各方评论

相关小常识


来自:新华网

robtex