+ All Categories
Home > Documents > David Emm, Kaspersky Lab

David Emm, Kaspersky Lab

Date post: 12-Sep-2021
Category:
Upload: others
View: 5 times
Download: 0 times
Share this document with a friend
30
The malware business David Emm, Kaspersky Lab
Transcript
Page 1: David Emm, Kaspersky Lab

The malware business

David Emm, Kaspersky Lab

Page 2: David Emm, Kaspersky Lab

From cyber vandalism to cyber crime

• Malware is profit‐driven• ID theft & fraud• ID theft & fraud

• Extortion

• Unsolicited advertising

• Theft of virtual propertyp p y

• Relies on computer up‐time‘O ’ h i i ’ hi• ‘Own’ the victim’s machine

• Capture the data

Page 3: David Emm, Kaspersky Lab

The nature of the malware business

• It’s organised• i e crime that is organised• i.e. crime that is organised

• Rather than ‘organised crime’

• Economic interdependence

• Competition• Competition

• No centralised control by a ‘Dr No’ character• It mirrors the legitimate economy

Page 4: David Emm, Kaspersky Lab

The scale of the problem

1,400,000 KL records

1,000,000

1,200,000

600,000

800,000

200,000

400,000

0

200,000

98 99 00 01 02 03 04 05 06 07 08

Source:  Kaspersky Lab

Page 5: David Emm, Kaspersky Lab

The scale of the problem

• It’s global• The Internet transcends geo political borders• The Internet transcends geo‐political borders

• So do the cyber criminals

• Unfortunately law enforcement doesn’t!

• So cyber criminals can ‘hide between the cracks’y

Page 6: David Emm, Kaspersky Lab

‘Operation Bot Roast’

Page 7: David Emm, Kaspersky Lab

Storm Worm

Page 8: David Emm, Kaspersky Lab

Shadow botnet 

Page 9: David Emm, Kaspersky Lab

Division of labour

• China

L ti A i• Latin America

• Russia

• & there’s specialisationG i l i Chi• Gaming malware in China

• Banking Trojans in Latin America

• Botnets in Russia

Page 10: David Emm, Kaspersky Lab

The nature of the threat

• Trojans, Trojans and more Trojans

Source:  Kaspersky Lab

Page 11: David Emm, Kaspersky Lab

The nature of the threat

• Decline in global epidemics25

20

25

s

10

15

pide

mic

s

5

10

Ep

0

Quarters2002 2003 2004 2005 2006 2007 2008

Source:  Kaspersky Lab

Page 12: David Emm, Kaspersky Lab

The nature of the threat

• Cyber criminals:

U l k ll l tt k• Use low‐key small‐scale attacks• Less visible to AV ‘early warning radar’

• Less visible to law enforcement agencies

• Easier to manage compromised computersEasier to manage compromised computers

• Sabotage security defences

• & compete to ‘own’ victims

Page 13: David Emm, Kaspersky Lab

The malware eco$ystem

C b i i lCyber criminals Victims

Police ITTP industry

Page 14: David Emm, Kaspersky Lab

The malware eco$ystem

Gang bosses

ers’

Engineering

ess

‘ow

ne

nDeployment

Management ole

proc

e

iddl

emen‘Cyber crime aaS’

Police

Victims

ITTP

Management

Data hijackingW

ho Mi

Liquidising assets

Page 15: David Emm, Kaspersky Lab

Cyber criminals & their business

• Data theft• Bank account login credentialsBank account login credentials

• Online game login credentials & virtual property

• E‐mail addressesE mail addresses

• Personal data [e.g. credit card numbers]

• Other data [e g IM accounts software licences]• Other data [e.g. IM accounts, software licences]

• Misuse of computer resourcesB t t• Botnets

• Client‐server injection

SMS d l h ll i i• SMS and telephone calls to premium services

Page 16: David Emm, Kaspersky Lab

Malware engineering

• Development• Modern compilers [e.g. C++] and AssemblerModern compilers [e.g. C++] and Assembler

• To build executable files

• Scripts macro & other softwareScripts, macro & other software

• Simple & complex applications

• Automatic code generation tools• Automatic code generation tools

• Self‐defenceC i & ti• Compression & encryption

• Obfuscation

S l h• Stealth

• In‐process injection

Page 17: David Emm, Kaspersky Lab

Deployment & injection

• Deployment• E‐mail attachmentsE mail attachments

• Links

• Auto‐run wormsAuto run worms

• Direct attacks [insiders, removable media]

• Trojan‐Droppers & Trojan‐Downloaders• Trojan‐Droppers & Trojan‐Downloaders

• InjectionCli k d t• Click‐and‐execute

• Software vulnerabilities

Page 18: David Emm, Kaspersky Lab

Managing compromised computers

• Direct• Hacker connects to infected machineHacker connects to infected machine

• Through a proxy or chain of proxies

• Indirect• Indirect• Hacker uploads data to a server

S d i t ti t IRC• Sends instructions to IRC

• Initiates P2P data transfer

I f t d hi t t th• Infected machine connects to the server

• Listens to IRC

C ll P2P ‘b h ’ f i i• Calls P2P ‘brothers’ for instructions

Page 19: David Emm, Kaspersky Lab

Data hijacking

• Stored data• Parsing files on disk & extracting dataParsing files on disk & extracting data

• Extracting data from known files

• Reading data from the registryReading data from the registry

• Real‐time dataK l i• Keylogging

• Browsing history

hi hi• Phishing

• Extortion• Trojan‐Ransom programs

Page 20: David Emm, Kaspersky Lab

Victims

• Individuals• Stolen personal dataStolen personal data

• System overload

• Internet capacityInternet capacity

• BusinessesSt l• Stolen money

• Information leakage

DD S• DDoS

• Reputation

• Government & military• Information leakage

Page 21: David Emm, Kaspersky Lab

Hackers hacking hackers

Page 22: David Emm, Kaspersky Lab

No honour among thieves

• Hackers hacking hackers• Web site hosting PHP shellsWeb site hosting PHP shells

• For breaking into vulnerable web sites

• They contain obfuscated scriptThey contain obfuscated script

• To capture URLs of vulnerable sites

• Phishers phishing phishers• Phishers phishing phishers• Phishing kits

With i t th t l d th th t d d t• With scripts that also send them the captured data

Page 23: David Emm, Kaspersky Lab

Liquidising assets

• Converting virtual assets into real money

• Direct theft• Direct theft• Cash from victim account into cyber criminal’s account

• Unsophisticated• Unsophisticated

• Easy to investigate

U f l• Use of money mules• Human proxies

• Sale of stolen assets• Credit cards, stolen e‐mail addresses, etc.

Page 24: David Emm, Kaspersky Lab

Wanted:  money mules

Page 25: David Emm, Kaspersky Lab

Cyber Crime as a Service

• Malware development• Trojans & development kitsTrojans & development kits

• Obfuscation tools

• ExploitsExploits

• BotnetsE il• E‐mail spam

• Proxy networks

O h f• Other features• Market in stolen data

• Bullet‐proof hosting

• Cyber crime community forums

Page 26: David Emm, Kaspersky Lab

Cyber Crime as a Service

Page 27: David Emm, Kaspersky Lab

Cyber Crime as a Service

Page 28: David Emm, Kaspersky Lab

Politically motivated attacks

• Estonia• May 2007May 2007

• Astrakhan & Krasnodar• Summer 2007• Summer 2007

• Marshall Islands• June 2008

• Georgia• August 2008

Page 29: David Emm, Kaspersky Lab

Addressing the problem

• Crime isn’t going away• Nor is cyber crimeNor is cyber crime

• Mitigating the risksSecurity technologies– Security technologies

– Law enforcement

Th h f t– The human factor

Page 30: David Emm, Kaspersky Lab

Th k !Thank you !

[email protected]


Recommended