Targeted Trojan Attacks Causing Concern 77
Bill Andad writes to point out a surprise trend emerging from the Virus Bulletin Conference 2006 in Montreal this week. From the article on Daniweb: "It is the smallest of Trojan attacks that are causing the biggest headache in the world of corporate security right now. By targeting individuals within individual companies with individually constructed infected messages, the new-age industrial spy is slipping under the security radar." News.com has more in-depth coverage.
The biggest danger are working business models (Score:5, Interesting)
We've seen a change of purpose in virus/trojan creation over the last years, from being a cracker or script kiddy ego thing to being the base of obviously lucrative spam distribution via cracked machines. The malware market has become more sophisticated, e.g. today malware usually will not crash a machine or cause any noticeable problems for the user, because the prime target is to use the machine as long as possible. So malware behavior is driven by business needs.
Now any option to make money will attract someone, in the case of illegal business often organized crime, which operates very much like any other business, just without regulation and taxes. And one thing business usually does is looking for options to grow and extend into other markets.
The spam distribution business seems just fine right now, and with more people getting online there is still some growth potential, but filters and trained users will limit that market. So if you switch from targeting the masses to individuals and specific companies you gain two things:
So once again, this is not mainly a technical problem: As long as someone finds a way to make money with it, it will not go away, but only get worse. Your best option might be to make sure that your business model allows your data to simply be open, so stealing will not work. If you develop open source software, your source can not be stolen or destroyed. But make sure you have backups of your consulting customers list on separate media.
Re: (Score:3, Informative)
http://www.bit9.com/ [bit9.com]
lets you lock down PCs and stops anything new/unknown (from a network-wide perspective) from running without taking away admin rights.
so if someone gets snuck an evil email attachment, it would be identified by the software as new to the network and blocked at the kernel level before the OS executes it.
Re: (Score:2)
e.g. IE7 will soon be released via Windows Update.
Re: (Score:2)
on the server, you can mark certain updaters, users, directories and/or publishers as trusted, and all files that come from these trusted origins are locally approved on each desktop (while the rest of the system remains locked down.)
this way you don't have to maintain any enormous whitelists or blacklists or anything and you only have to look at what's new/unknown (the graylist.)
-fren
Re: (Score:2)
So, how do you differentiate between:
1) Joe Corporte Peon receives mail with an attachment that is an evil ms-word document with rogue macros that cause stack overflows and make ms-word process do bad things
2) Joe Corporte Peon receives mail with an attachment that is an angelic ms-word document from a customer w
Re: (Score:3, Interesting)
Re: (Score:2)
Industrial Espionage, not spam slaves (Score:2)
I believe the article is talking about targetted industrial espionage, not spam slaves. Unless a target had control over a multi-gigabit backbone link, I can't see a spammer going to the effort of targetting specific machines, clusters, or users. In those cases there are admins monitoring traffic load and the spam would cause a surge in outoing SMTP/POP3 traffic and rapidly get traced. Companies with big pipes tend to have the infrastructure in place to monitor and maintain the hardware behind those pip
Re: (Score:2)
Social engineering's easy - if you work for a large company then think how easy it would be for a random individual to get a logon ID and password for the systems you run...
Any trojans cause concern (Score:3, Informative)
Re: (Score:2)
I've never understood how people who claim to be "competent" get viruses, trojans, and other malware. I expect it from idiots who click on every free offer or flashy banner, but it's pretty funny to hear "competent" users say they got infected. What the hell do you people do?
Re: (Score:2)
Chances are its another machine on his network spreading exploits around the place.
Re: (Score:2)
Re: (Score:3, Insightful)
Almost certainly another machine on your network is spreading the infection. You did something about it because you are on the lookout for these problems. I suggest you use your position to bypass the IT people. Go straight to the top and get the boss to knock some heads together in the IT department. This problem is more serious than the immediate issue on your PC.
Re: (Score:1)
Sounds like a great way to go about it, especially in a company where you just started. How about filing an incident report with IT, waiting for a while and THEN reporting it to your boss if it hasn't been fixed?
About time? (Score:3, Informative)
Ask a legitimate question and get a response. You're now whitelisted. Send them a document related to your question that happens to carry your trojan. You can now, at least, impersonate them on the network/read their mail/send mail on their behalf.
It's a crappy way to develop a bot net but it's a good way to get very specific espionage capabilites.
Why hasn't this been exposed in the past, I'm sure it's been going on for quite some time.
Re: (Score:1)
Get Ubuntu (Score:1)
Ubuntu, the ancient african for "couldn't install debian, but didn't want those damn trojans"
Re:Get Ubuntu (Score:5, Insightful)
Thank you for the plug, comrade (Score:2)
Too many of my Window-Monkies call in sick. (rooted by competetors - damn users clicking "ok").
Once I have a Linux Mail-Bot, I can lock it down and know it is mine!
Don't worry, we run our all processes "nice"!
Re:Get Ubuntu (Score:5, Insightful)
Bull:
If you wanted to make the point that there are just as many attack vectors in Ubuntu as elsewhere, go ahead. But the mere presence of an avenue of attack doesn't magically make it easy. Implying that Ubuntu is not inherently harder to compromise than Windows is prima facie wrong.
Re: (Score:3, Interesting)
*All Ubuntu .deb packages available by default come from known sources. Adding untrusted repositories requires root privileges and visual warnings.
* Installing software through apt-get (or synaptic or any of the other automated software installers) requires admin privileges.
Why do people think "requires admin privileges" is any sort of significant barrier on unmanaged, typically single-user systems ?
[...] is going to have a very hard time affecting the integrity of the system, let alone hiding from the
Because it is. (Score:2)
Because it is. And I'm posting this from my home machine running Edgy.
I think you missed the definition.
The code is not "in full view". It is hidden. That way, the user will run the code s/he THINKS is contained in that package, but the real code is something else.
Re: (Score:2)
Because it is.
No, it's not:
* Firstly, because the ignorant end user can trivially raise any program's privileges to root
* Secondly, because 99% of the things most malicious code wants to do, don't require root privileges in the first place
The code is not "in full view". It is hidden. That way, the user will run the code s/he THINKS is contained in that package, but the real code is something else.
Er, yes, my whole point. If you want to use to install your malware, you just dress it up in something t
Here, I'll demonstrate. (Score:2)
The same "logic" can apply to an email telling the "ignorant end user" to buy a hammer and smash the hard drive.
The problem is getting them to do that.
That is the problem. The problem you have not addressed. The problem you have not addressed is how to get the "ignorant end user" to do
Re: (Score:2)
The same "logic" can apply to an email telling the "ignorant end user" to buy a hammer and smash the hard drive.
No, it can't, because the vast, vast majority of users understand that doing that would be A Bad Thing.
The sheer volume of software that relies on the "download and run it" capability just to exist, handily demonstrates the same does not apply there.
That is the problem. The problem you have not addressed. The problem you have not addressed is how to get the "ignorant end user" to do that.
Tha
Re: (Score:2)
Requiring admin privs is nothing but a speed bump until and unless the average end user is trained to not provide them willy-nilly. No O
Re: (Score:2)
Re: (Score:2)
The point is that a trojan needs root to install itself, as well as to remain undetected.
Not nearly as troubling as a straw-
Re: (Score:2)
Re: (Score:2)
Not at all. That's perfectly easy to admit, but completely irrelevant. The point is that all software, by default, comes from trusted sources in Ubuntu. All of it. That is not the case with Windows.
Re: (Score:2)
What are you talking about? (Score:3, Interesting)
What the fuck?
No, with "su", you're running as root until you type "exit". There is no time limit or command limit on "su".
What? How? Go ahead. Infect my computer. It's running Edgy so I'm sure there are lots of holes still in it.
Go ahead. Do it.
Oh, you can
Re: (Score:2)
That cleared up, let me explain the sudo vs su thing. If you were do only ever use su, and use it sensibly, I wouldn't have much hope of getting root from a trojan. There are a couple of ways I could.. but they're pretty obvious and you'd most likely spot them. For example, when yo
Re: (Score:2)
Not necessarily. Simply fork() and then exec() the shell in the *parent* process. That way, the shell will have the same PID and parent as if it was launched directly. (The malicious process will then initially be a child of the new shell, but forking again and then calling _exit() from the parent process of that fork will soon fix
Re: (Score:1)
Re: (Score:2)
I think you misunderstand how the signatures work. If a mirror replaced a legit package with a trojaned one, they would either have to have it unsigned, or have it signed with a key that isn't one of the ubuntu relea
Re: (Score:1)
In Linux, email attachments aren't nearly as much of a problem. My understanding is that, with most Linux email programs, clicking an email attachment does not result in something running without asking the user first. Furthermore, the .exe attachments and active-X stuff won't run even if the user does give permission. I recently received a message with a .exe attachment and had no idea how make Windows-only stuff like that run or open. If something did somehow run the program most likely would not be r
Re: (Score:2)
Re: (Score:1)
One of the articles said the typical attachment is "a Microsoft Office file that exploits a yet-to-be-patched vulnerability." A Linux user who receives a Microsoft Word file would open it with something like Open Office Writer, AbiWord, KOffice or TextMaker. In rare cases he or she might use some version of Microsoft Word that is running under the Codeweaver's Crossover Office [codeweavers.com] version of Wine. I wonder how the use of an alternative office application running under the alternative operating system would a
Re: (Score:1)
Re: (Score:3, Funny)
And I always thought ubuntu was the ancient african word for "Wanted Linux, but refuse to RTFM in order to install Gentoo."
Headline & summary avoid the culprit: WINDOWS (Score:3)
Re:The lax windows and win32 app security model... (Score:4, Insightful)
Re: (Score:3, Insightful)
Because it isn't easy.
If this were an itch I was prepared to scratch, I would look into creating a static image of a virtual-machine that could be used just for running questionable stuff. Then I would look at putting hooks into programs like thunderbird that would make it automagically invoke the VM for attachments.
Beyond the integration into regularly used applicat
Re: (Score:2)
Re: (Score:2)
Unlike with Linux, where all applications fail to install as normal users? Oh sure, you can (usually) compile from source and install to ~/bin, but then you can get Windows apps (such as Eclipse) that you just unzip and drop into whatever folder you choose.
I am not aware of any system-wide installation service (eg rpm, deb, msi, etc) that doesn't require admin privs.
Are application developers largely concerned
Re:Headline & summary avoid the culprit: WINDO (Score:2)
I don't like to see people hurt by using Windows, and also don't like to see people hurt by overconfidence.
Re:Headline & summary avoid the culprit: WINDO (Score:2)
And, last I checked, GNU/Linux distros didn't very much protect against social engineering and trojans.
The new face of corporatre crime (Score:2, Insightful)
Not all that surprising (Score:4, Insightful)
Re: (Score:2, Informative)
Re: (Score:2, Informative)
http://www.microsoft.com/technet/security/prodtec
The cost of researching a victim seems high ... (Score:4, Interesting)
Wait for it... (Score:5, Interesting)
That sound you will hear is a thousand Microsoft tech-support reps all crying out at once.
Re: (Score:1)
Recent Trojans - Very good social Engineering (Score:5, Interesting)
The social engineering portion was an emailed message, aimed to several high-level executives and other senior techincal staff by name. Messages were sent to us in perfectly gramatical non-stilted English. The plain text message was "personalized" (no skill there, but it did add to the overall credibility.) The messages came in with a reasonable subject line: "Request for Interview re: Recent Security Incidents".
The actual email stated something to the effect that the sender was a journalist looking for comment on a newly published article in a trade magazine alledging a security breach at our institution. The "sender" invited the recipient to contact him (by telephone) to comment on the story for a follow-up. He ended the message by including the URL (but not a clickable link) to the original article making the allegations.
Well, that did it. A number of users, wishing to read the allegations cut and paste the URL. As you might guess, the site itself had been hi-jacked, so the broswer was quickly re-directed to another site, explotited the most recent unpatched IE vulnerability and infected the user's PC with a key logger. The only reason this got caught quickly was that in some cases the user's IE session crashed, giving a hint that something might have happened. THe other giveaway was tha in addition to the key logger, something else got loaded with more obvious side-effects.
Of course, in retrospect it was pretty obvious, and in telling the story, it seems like S.E., but I had to admit it would have fooled me if I had been the first to recieve the message. (Probably would not have been infected due to my use of low privilidges, but I would have followed the URL). It passed the sniff test: Standard American English, a reference (and URL) to a trade magazine specific to my industry and field (Banking & IT), it included a phone number (of course a fake), and was in the exact tone you would expect from a legit journalist --- nothing loud or sensational, just a message that an allegation has been raised, would you care to respond.
My lesson: a little more empathy for the non-professionals who get bitten by other social engineering attacks. Yes, they SHOULD know better, but if I (in all modesty) could be fooled, what chance does my unsophisticated, trusting Granny have?
Re: (Score:2, Insightful)
Wow, those are some decent execs. Ours would just try the URL 3
blame the end users .. (Score:2)
Why don't you advise the high-level executives to use a browser that don't install malware just by typing in a URL. The same goes for your Granny.
Recent Trojans - Very good social Engineering (Score:5, Interesting)
Re: (Score:2)
It would fool me too, I guess, until I got to the part where the compromised site told me to type "su" followed by my root password, and then told me to install a key-logger after that.
In your situation, the user's error wasn't just that they got SEed. Their main problem is that they were running a web browser that has a
LULZ (Score:3, Informative)
oh, indeed. The main reason your anti-virus software is pointless.
If a piece of malicious software is well known enough for your anti-virus company to know about it, then a patch for the issue will be out very soon. Anti-virus software will only protect you from script kiddies and not someone that actually would have a good reason to steal your data. i.e your competition.
They did it to Valve (Score:4, Interesting)
Learing trojan detectors (Score:2)
virus companies talk up scare .. (Score:2)
step 1. stop running as admin (Score:2)
Lots of corps do this even with Win2k/XP.
Tailored SPAM (Score:1)
One simple rule - no executable attachments (Score:1)
When I first started fighting viruses and spam for my clients, the very first thing we did was block executable files at the mail server. This was in 1997 and required nothing more than a simple
Nowadays, of course, we have much more full-featured software like MailScanner to handle this. This isn't really rocket science, folks. 99+%