+ All Categories
Home > Documents > FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV...

FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV...

Date post: 23-Jul-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
51
Fake Antivirus- Journey from Trojan to a Persistent Threat DeepSec 2011 Jagadeesh Chandraiah
Transcript
Page 1: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Fake Antivirus- Journey from Trojan

to a Persistent Threat

DeepSec 2011 Jagadeesh Chandraiah

Page 2: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

DeepSec 2011

Agenda

• FakeAV Trends

• Infection Vectors

• Packer Evolution

• How do they work ?

Page 3: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

DeepSec 2011

Introduction Fake AntiVirus (FakeAV) is a malware which displays fake warnings to the users to trick them to buy illegitimate software.

Page 4: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

DeepSec 2011

Introduction

Page 5: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

FakeAV Trends

DeepSec 2011

Analyse the major events over the last three and half years.

Page 6: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

DeepSec 2011

• Dramatic Rise of FakeAV in 2009

• Black Hat SEO was heavily used.

• Popular websites were used to serve FakeAV. • ex: New York Times news paper Website in 2009.

• Government Embassy website Attacks.

• Social Networking Sites were used (Facebook and Twitter).

FakeAV Trends

Page 7: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

DeepSec 2011

• More Spam redirects to FakeAV.

• More unpatched PDF and Java Vulnerabilities were used to deliver FakeAV.

• Black Hat SEO on hot topics, still remained the popular infection method.

FakeAV Trends 2010 continued to see the spike in FakeAV detections.

Page 8: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

DeepSec 2011

• Mac users were infected with Mac Defender in big scale around May

2011.

FakeAV Trends Significant events in 2011.

Page 9: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

DeepSec 2011

• Sharp Decline in FakeAV detections, due to law enforcement actions in

Aug 2011.

Sharp Decline Significant events in 2011.

Page 10: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Sharp Decline

DeepSec 2011

● ChronoPay’s server were compromised and details were reported online.

● Several FakeAV programs had credit card processing issues.

Page 11: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

FakeAV is down, but still active

DeepSec 2011

Sophos Top Five FakeAV Detection rate between Mar-Oct 2011.

Page 12: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

FakeAV is down, but still active

DeepSec 2011

FakeAV infection between 1st Quarter of 2010 and 2nd Quarter of 2011, according to Microsoft Security Intelligence Report.

Page 13: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Infection Methods

DeepSec 2011

We will analyse popular Infection methods and how they work.

Page 14: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Black Hat SEO

DeepSec 2011

Poisoning search engine optimization.

• Illegitimate way of increasing search engine ranking.

Page 15: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Black Hat SEO Pictorial Representation of Black Hat SEO attack

DeepSec 2011

Page 16: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Black Hat SEO

DeepSec 2011

• Step1: Identify and compromise legitimate websites. • Step2: Upload multifunctional PHP script to the compromised website.

• Step3: Feed crawlers with specially stuffed webpage with keywords.

• Step4: Redirect users coming through search engine to FakeAV website.

Page 17: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Malvertising

DeepSec 2011

Serving FakeAV through Advertising networks.

Page 18: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Malvertising JavaScript used in New York Times newspaper website.

DeepSec 2011

Page 19: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Cold Calling

DeepSec 2011

Fake tech support centre’s are used to scam users.

Page 20: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Spam Campaigns

DeepSec 2011

FakeAV served through email attachments and drive by download links.

Page 21: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

DeepSec 2011

Spam Campaigns

Page 22: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

DeepSec 2011

Fake Codecs Users are social engineered to download FakeAV as Codecs.

Page 23: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Exploit Kit

DeepSec 2011

Use Blackhole Exploit kit as an example to see how exploit kit works.

Page 24: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Exploit Kit Black Hole Exploit Kit panel showing Infections by country and vulnerabilities.

Page 25: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Exploit kit Blacklisting mechanism used by Black Hole.

DeepSec 2011

Page 26: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Exploit Kit Infection mechanism using Exploit kit.

DeepSec 2011

Page 27: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Exploit Kit Obfuscated Black Hole Exploit Script

DeepSec 2011

Page 28: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Decrypted Exploit script checking version and creating Iframe element.

DeepSec 2011

Exploit Kit

Page 29: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Packer Evolution

DeepSec 2011

• Anti Emulation API

• Process Environment Block

• Thread Information Block

• Kuser Shared Data

Page 30: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

FakeAV without packed layer

DeepSec 2011

Packer Evolution

Page 31: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Anti Emulation

DeepSec 2011

• Emulator is a piece of Software used to simulate the behaviour of a system.

• Windows X86 emulator is used to simulate the behaviour of X86 processor.

• Malware authors use tricks to break emulation.

Page 32: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Anti Emulation API

DeepSec 2011

Page 33: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Anti Emulation API

DeepSec 2011

Page 34: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

FS:30

DeepSec 2011

Process Environment Block

Page 35: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

FS:18

DeepSec 2011

Thread Information Block

Page 36: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

KUSER_SHARED_DATA

● Usually mapped at 0x7FFE0000

● Checking the presence of value at 0x7FFE0004 (TickCountMultiplier).

● Values at this structure are also known to be used in obfuscated calls and decryption strings.

DeepSec 2011

Page 37: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Understand Packing using a Polymorphic Cryptor.

DeepSec 2011

How is this Done ?

Page 38: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Click icon to add table

Packer Evolution Cryptors available in underground forums.

DeepSec 2011

Page 39: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Packer Evolution Crum Polymorphic Cryptor

DeepSec 2011

Page 40: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Packer Evolution. Crum Polymorphic Cryptor with different icons.

DeepSec 2011

Page 41: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Packer Evolution

DeepSec 2011

Testing Crum Polymorphic Cryptor

Page 42: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Packer Evolution

DeepSec 2011

Testing Crum Polymorphic Cryptor

Page 43: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Packer Evolution

DeepSec 2011

Anti Emulation stuff inserted by Crum Polymorphic Cryptor

Page 44: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

What Drives FakeAV ?

DeepSec 2011

Page 45: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

What Drives FakeAV ?

DeepSec 2011

Page 46: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

What Drives FakeAV ?

DeepSec 2011

Page 47: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

What Drives FakeAV ?

DeepSec 2011

• FakeAV developers use affiliate networks to distribute and advertise FakeAV.

• Affiliates in turn recruit meta affiliates to distribute FakeAV links and binaries.

• Money is paid in Pay per Install scheme, for driving traffic to FakeAV Landing Pages and FakeAV purchases.

• University of California research study reveals that FakeAV business earned more than 130 million dollars.

Page 48: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

AV vs FakeAV

DeepSec 2011

Page 49: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Conclusion

DeepSec 2011

• FakeAV is still one of the big threats actively infecting users.

• Better understanding of operations used.

• Able to study the different tricks used by FakeAV code. • Use this knowledge to better protect users from FakeAV Infection.

Page 50: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

Acknowledgements

DeepSec 2011

Page 51: FakeAV: Journey From Trojan to a Persistent Threat · Malvertising DeepSec 2011 Serving FakeAV through Advertising networks. Malvertising JavaScript used in New York Times newspaper

DeepSec 2011


Recommended