Top Banner
The malware business David Emm, Kaspersky Lab
30

David Emm, Kaspersky Lab

Sep 12, 2021

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: David Emm, Kaspersky Lab

The malware business

David Emm, Kaspersky Lab

Page 2: David Emm, Kaspersky Lab

From cyber vandalism to cyber crime

• Malware is profit‐driven• ID theft & fraud• ID theft & fraud

• Extortion

• Unsolicited advertising

• Theft of virtual propertyp p y

• Relies on computer up‐time‘O ’ h i i ’ hi• ‘Own’ the victim’s machine

• Capture the data

Page 3: David Emm, Kaspersky Lab

The nature of the malware business

• It’s organised• i e crime that is organised• i.e. crime that is organised

• Rather than ‘organised crime’

• Economic interdependence

• Competition• Competition

• No centralised control by a ‘Dr No’ character• It mirrors the legitimate economy

Page 4: David Emm, Kaspersky Lab

The scale of the problem

1,400,000 KL records

1,000,000

1,200,000

600,000

800,000

200,000

400,000

0

200,000

98 99 00 01 02 03 04 05 06 07 08

Source:  Kaspersky Lab

Page 5: David Emm, Kaspersky Lab

The scale of the problem

• It’s global• The Internet transcends geo political borders• The Internet transcends geo‐political borders

• So do the cyber criminals

• Unfortunately law enforcement doesn’t!

• So cyber criminals can ‘hide between the cracks’y

Page 6: David Emm, Kaspersky Lab

‘Operation Bot Roast’

Page 7: David Emm, Kaspersky Lab

Storm Worm

Page 8: David Emm, Kaspersky Lab

Shadow botnet 

Page 9: David Emm, Kaspersky Lab

Division of labour

• China

L ti A i• Latin America

• Russia

• & there’s specialisationG i l i Chi• Gaming malware in China

• Banking Trojans in Latin America

• Botnets in Russia

Page 10: David Emm, Kaspersky Lab

The nature of the threat

• Trojans, Trojans and more Trojans

Source:  Kaspersky Lab

Page 11: David Emm, Kaspersky Lab

The nature of the threat

• Decline in global epidemics25

20

25

s

10

15

pide

mic

s

5

10

Ep

0

Quarters2002 2003 2004 2005 2006 2007 2008

Source:  Kaspersky Lab

Page 12: David Emm, Kaspersky Lab

The nature of the threat

• Cyber criminals:

U l k ll l tt k• Use low‐key small‐scale attacks• Less visible to AV ‘early warning radar’

• Less visible to law enforcement agencies

• Easier to manage compromised computersEasier to manage compromised computers

• Sabotage security defences

• & compete to ‘own’ victims

Page 13: David Emm, Kaspersky Lab

The malware eco$ystem

C b i i lCyber criminals Victims

Police ITTP industry

Page 14: David Emm, Kaspersky Lab

The malware eco$ystem

Gang bosses

ers’

Engineering

ess

‘ow

ne

nDeployment

Management ole

proc

e

iddl

emen‘Cyber crime aaS’

Police

Victims

ITTP

Management

Data hijackingW

ho Mi

Liquidising assets

Page 15: David Emm, Kaspersky Lab

Cyber criminals & their business

• Data theft• Bank account login credentialsBank account login credentials

• Online game login credentials & virtual property

• E‐mail addressesE mail addresses

• Personal data [e.g. credit card numbers]

• Other data [e g IM accounts software licences]• Other data [e.g. IM accounts, software licences]

• Misuse of computer resourcesB t t• Botnets

• Client‐server injection

SMS d l h ll i i• SMS and telephone calls to premium services

Page 16: David Emm, Kaspersky Lab

Malware engineering

• Development• Modern compilers [e.g. C++] and AssemblerModern compilers [e.g. C++] and Assembler

• To build executable files

• Scripts macro & other softwareScripts, macro & other software

• Simple & complex applications

• Automatic code generation tools• Automatic code generation tools

• Self‐defenceC i & ti• Compression & encryption

• Obfuscation

S l h• Stealth

• In‐process injection

Page 17: David Emm, Kaspersky Lab

Deployment & injection

• Deployment• E‐mail attachmentsE mail attachments

• Links

• Auto‐run wormsAuto run worms

• Direct attacks [insiders, removable media]

• Trojan‐Droppers & Trojan‐Downloaders• Trojan‐Droppers & Trojan‐Downloaders

• InjectionCli k d t• Click‐and‐execute

• Software vulnerabilities

Page 18: David Emm, Kaspersky Lab

Managing compromised computers

• Direct• Hacker connects to infected machineHacker connects to infected machine

• Through a proxy or chain of proxies

• Indirect• Indirect• Hacker uploads data to a server

S d i t ti t IRC• Sends instructions to IRC

• Initiates P2P data transfer

I f t d hi t t th• Infected machine connects to the server

• Listens to IRC

C ll P2P ‘b h ’ f i i• Calls P2P ‘brothers’ for instructions

Page 19: David Emm, Kaspersky Lab

Data hijacking

• Stored data• Parsing files on disk & extracting dataParsing files on disk & extracting data

• Extracting data from known files

• Reading data from the registryReading data from the registry

• Real‐time dataK l i• Keylogging

• Browsing history

hi hi• Phishing

• Extortion• Trojan‐Ransom programs

Page 20: David Emm, Kaspersky Lab

Victims

• Individuals• Stolen personal dataStolen personal data

• System overload

• Internet capacityInternet capacity

• BusinessesSt l• Stolen money

• Information leakage

DD S• DDoS

• Reputation

• Government & military• Information leakage

Page 21: David Emm, Kaspersky Lab

Hackers hacking hackers

Page 22: David Emm, Kaspersky Lab

No honour among thieves

• Hackers hacking hackers• Web site hosting PHP shellsWeb site hosting PHP shells

• For breaking into vulnerable web sites

• They contain obfuscated scriptThey contain obfuscated script

• To capture URLs of vulnerable sites

• Phishers phishing phishers• Phishers phishing phishers• Phishing kits

With i t th t l d th th t d d t• With scripts that also send them the captured data

Page 23: David Emm, Kaspersky Lab

Liquidising assets

• Converting virtual assets into real money

• Direct theft• Direct theft• Cash from victim account into cyber criminal’s account

• Unsophisticated• Unsophisticated

• Easy to investigate

U f l• Use of money mules• Human proxies

• Sale of stolen assets• Credit cards, stolen e‐mail addresses, etc.

Page 24: David Emm, Kaspersky Lab

Wanted:  money mules

Page 25: David Emm, Kaspersky Lab

Cyber Crime as a Service

• Malware development• Trojans & development kitsTrojans & development kits

• Obfuscation tools

• ExploitsExploits

• BotnetsE il• E‐mail spam

• Proxy networks

O h f• Other features• Market in stolen data

• Bullet‐proof hosting

• Cyber crime community forums

Page 26: David Emm, Kaspersky Lab

Cyber Crime as a Service

Page 27: David Emm, Kaspersky Lab

Cyber Crime as a Service

Page 28: David Emm, Kaspersky Lab

Politically motivated attacks

• Estonia• May 2007May 2007

• Astrakhan & Krasnodar• Summer 2007• Summer 2007

• Marshall Islands• June 2008

• Georgia• August 2008

Page 29: David Emm, Kaspersky Lab

Addressing the problem

• Crime isn’t going away• Nor is cyber crimeNor is cyber crime

• Mitigating the risksSecurity technologies– Security technologies

– Law enforcement

Th h f t– The human factor

Page 30: David Emm, Kaspersky Lab

Th k !Thank you !

[email protected]