Top Banner
20101018 資資資資資資 資資資 資資資資 資資資資 資資資 :、、
26

20101018 資安新聞簡報

Feb 23, 2016

Download

Documents

ChEng_

20101018 資安新聞簡報. 報告者:曾家雄、劉旭哲、莊承恩. New Malware Murofet Following Conficker's Lead. October 15, 2010 Dennis Fisher. Conficker. A computer worm targeting the Microsoft Windows operating system Be detected in November 2008 - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 20101018  資安新聞簡報

20101018 資安新聞簡報報告者:曾家雄、劉旭哲、莊承恩

Page 2: 20101018  資安新聞簡報

NEW MALWARE MUROFET FOLLOWING CONFICKER'S LEADOctober 15, 2010Dennis Fisher

Page 3: 20101018  資安新聞簡報

Conficker• A computer worm targeting the Microsoft Windows

operating system • Be detected in November 2008• Co-opt machines and link them into a virtual computer

that can be commanded remotely

Page 4: 20101018  資安新聞簡報

Conficker Variant• Five variants of the Conficker worm are known and have

been dubbed Conficker A, B, C, D and E

Page 5: 20101018  資安新聞簡報

Conficker Variant

Page 6: 20101018  資安新聞簡報

Conficker Variant

Page 7: 20101018  資安新聞簡報

Payload Propagation• Variant A

• Generates a list of 250 domain names every day across five TLDs• The domain names are generated from a pseudo-random number

generator seeded with the current date

Page 8: 20101018  資安新聞簡報

Payload Propagation• Variant B increases the number of TLDs to eight, and

produce domain names disjoint from those of the variant A• Variant D generates daily a pool of 50000 domains across

110 TLDs, from which it randomly chooses 500 to attempt for that day

• The generated domain names were also shortened from 8-11 to 4-9 characters to make them more difficult to detect with heuristics

Page 9: 20101018  資安新聞簡報

Murofet• The main similarity between Conficker and Murofet is that

both pieces of malware use a pre-determined algorithm to generate seemingly random domain

• It generates pseudo-random domain names based on the year, month, day, and minute of execution

• Upon executing, Murofet starts a thread that attempts to download malware updates

Page 10: 20101018  資安新聞簡報

Pseudo-Random Domain Algorithm• It generates two DWORD values

• The first is composed of the month, day, and low byte of the year of the date of execution, plus 0x30 (48)

• The second DWORD value is based on the minute of execution, multiplied by 0x11 (17)

Page 11: 20101018  資安新聞簡報

Pseudo-Random Domain Algorithm

Page 12: 20101018  資安新聞簡報

Pseudo-Random Domain Algorithm

Day Month Year

+ 0x30

First Dword

Minute

* 0x11

Second Dword

First Dword Second Dword

64 bits => 共 16個 nibles

Page 14: 20101018  資安新聞簡報

MICROSOFT WANTS TO CORDON OFF BOTNET-INFECTED COMPUTERS報告者:劉旭哲

Page 15: 20101018  資安新聞簡報

• Botnets = Zombie Network• DDoS• Spread spam

• "collective action" to combat cyberthreats -- particularly botnets.

Page 16: 20101018  資安新聞簡報

1. individual defense• firewalls, antivirus, and automatic updates

2. collective defense• Computer Emergency Response Teams (CERTs)

3. active defense4. Offense

Page 17: 20101018  資安新聞簡報

• new users, devices, and application.

• Zeus botnet that captured users' banking sign-on information.

• New thinking and expanded approaches need to be applied to combat cyber threats

Page 18: 20101018  資安新聞簡報

• " If you were the person whose computer was infected, wouldn't you want to know? “

• Public Health Model• Computer = Human

Page 19: 20101018  資安新聞簡報

Public Health Model• Two complementary approaches:

① bolstering efforts to identify infected devices② promoting efforts to better demonstrate device health

• Identify infected devices• Restrict infected devices• at least one access provider is now attempting this approach:

Comcast

Page 20: 20101018  資安新聞簡報

Comcast• Constant Guard• Damballa, a botnet research firm• Use toolbar• The first ISP to provide this type of in-browser notification

Page 21: 20101018  資安新聞簡報

• Demonstrate device health:① a mechanism to produce a health certificate② trust③ access providers request health certificates and take

appropriate action④ create supporting policies and rules

Page 22: 20101018  資安新聞簡報

Defect• If there are some emergency services, infected computers

may still be permitted

• For example, cell phone.

Page 23: 20101018  資安新聞簡報

• At least two advantages:① Before online banking activities② More effective remediation• ISP could know specific device

Page 24: 20101018  資安新聞簡報

Conclusion• Not perfect• Balance security and privacy• Building a socially acceptable and financially sustainable

model• Collective action

Page 26: 20101018  資安新聞簡報

WEBGOAT莊承恩