Google's Research on Malware Distribution 83
GSGKT writes "Google's Anti-Malware Team has made available some of their research data on malware distribution mechanisms while the research paper[PDF] is under peer review. Among their conclusions are that the majority of malware distribution sites are hosted in China, and that 1.3% of Google searches return at least one link to a malicious site. The lead author, Niels Provos, wrote, 'It has been over a year and a half since we started to identify web pages that infect vulnerable hosts via drive-by downloads, i.e. web pages that attempt to exploit their visitors by installing and running malware automatically. During that time we have investigated billions of URLs and found more than three million unique URLs on over 180,000 web sites automatically installing malware. During the course of our research, we have investigated not only the prevalence of drive-by downloads but also how users are being exposed to malware and how it is being distributed.'"
Thank you for an threadjack this easy. (Score:2)
What, then, about a browser that can identify a drive-by, by pre-parsing the content behind the links it shows. Heuristics would do that Real Well, too; I can think of a zillion methods t
Re: (Score:1)
What, then, about a browser that can identify a drive-by, by pre-parsing the content behind the links it shows. Heuristics would do that Real Well, too; I can think of a zillion methods to do Just That off the top of my head. "If it ends up writing to disk, don't." How hard is THAT?
<snip>
Harder than you'd think. I'm sorry to have to point this out, but security is not easy, no matter how much we'd like to think it is.
Re: (Score:2)
Odd number presentation (Score:1, Interesting)
Read it again (Score:5, Insightful)
Three million out of billions is not bad, assuming randomness (only, say 1 in 1000 chance of using a bad URL), but it is a lot worse than 180k out of billions.
However not all URLs are used equally. Bad URLs linked to some popular pron site, for instance, will get hit a lot more than Joe Sixpack's facebook site.
Re: (Score:2, Insightful)
Re: (Score:1)
And what platform does the malware run on? (Score:1)
Re:And what platform does the malware run on? (Score:5, Interesting)
I found it quite interesting that the methodology of the research doesn't even bother to check sites with Mac OS X or Linux operating systems. But on the server side, Apache websites running outdated versions of PHP were singled out for comment.
In all there were twice as many compromised IIS servers as Apache, but fully 50% of all compromised Apache servers were running some version of PHP.
It was also interesting to note that computer-related websites ranked second only to social networking sites as most likely to be compromised with redirections to malware sites. Seems we might want to tone down our holier-than-thou rhetoric. 8^)
Re: (Score:3, Informative)
Re: (Score:2, Insightful)
Re: (Score:1, Offtopic)
It's at most 'funny'. Clearly the gp meant one of the various 'Microsoft' operating systems as a platform, so the parent deliberately misunderstood it...
I don't get 'insightful' anywhere in that.
Now then... (Score:3, Funny)
Google itself? (Score:3, Interesting)
Re: (Score:1)
It's certainly crapware, but I'm not real sure it is malware, and there is some sort of useful difference there(I guess, crapware is software that behaves reasonably and is installed with no consideration towards
Re: (Score:3, Interesting)
Re:Google itself? (Score:4, Insightful)
Re: (Score:2)
They why don't they do it? It's easy to add a long descriptive paragraph in the control panel's ad/remove list. Case closed.
I don't agree that "redirector" more or less on its own is an apt description however, because the ultimate purpose is to show ads to web surfers, and redirection is a generic mechanism.
Any apt description should have to inclu
Re: (Score:3, Interesting)
Further, the argument about the name seems frivolous. Expecting a non-technical user to even realize that their error pages
Maybe Goole should delist a few sites. (Score:5, Interesting)
Re:They already show a warning. (Score:1, Informative)
Re: (Score:2)
They have an initiative already with StopBadware [stopbadware.org], there's a quick article [lifehacker.com] here.
Re: (Score:2)
I think this is kind of interesting. Who hosts sites *in China* that are meant for viewers outside of China? I guess there might be some sites, but not many, I think.
Also, very few Chinese people use Google, so if Google started taking out 'offending' sites from it's search results then very few people would be affected.
In fact, it seems to me that only good can come if they do so. Very few people use Google to find sites hosted in Ch
Re: (Score:2)
The China sites doubtless includes lots of rootkitted servers, and an active market in rootkitting people's computers and selling their time for spamming and other illegal activities.
Re: (Score:2)
Their Chinese search web site already returns different results to their US one.
I guess my point is that they can still list infected sites in the results on their Chinese search engine, but remove them from everyone else's, and by doing so they'd not affect too many people in a negative way but have a more significant impact in a positive way.
This still supposes that:
1) the sites in question are hosted in China for a Chinese audience,
2) visitors from outside China are there by accident because the sites
Re: (Score:2)
3) The sites in question are hosted in China, by Chinese crackers and fraudsters, to defraud anyone with money or computer resources tricked into visiting the site, no matter where it is hosted.
Thi
Re: (Score:1)
Re: (Score:2)
This shows you have no idea whatever.
Almost every single example of the products/services/scams being served sends the money via a US based credit card company to a US based criminal. By far the majority of procuts or serveces promoted by these methods are not even available to anyone outside America. In simple terms: both supply and demand are American. China, and other countries are only invo
Re: (Score:2)
I agree that the American prosecution efforts are pitiful, and would help reduce the problem massively. But have you ever tried to track a spammer or fraudster overseas to their hosting website and get anything done about it? The US ISP's are at least somewhat responsive to outright fraud accusations with proof provided.
And unfortunately, the
Re: (Score:3, Interesting)
I remember years ago that hosts used to have a "no porn" in there service agreements, for fear that their IP block might get blacklisted, Now we often run into the same thing due to virtual hosting, blocking one IP address might knock a 100 websites off the internet. Of course with China some of it may be the government trying t
*Lots* of Chinese websites are for foreign viewers (Score:2)
But there's a huge business of websites in China that are used by spammers, phishers, and other parasites, because the Internet means that you can connect to anywhere in the world for the cost of a few hundred milliseconds, and China not only as a large technically skilled population, a lot of infrastructure, and an imbalance in bandwidth usage
Re: (Score:2)
Nothing of *value* then. Certainly nothing that would stop me wanting to have their results filtered from my google search results.
I guess I was talking about sites that had legitamate content but which had been poisoned by various malware or whatever.
Re:Maybe Goole should delist a few sites. (Score:4, Insightful)
Re: (Score:2)
Actually they do add a warning for infected sites (Score:5, Informative)
I just wonder how it is that hightstats.net can still be in existence when it contains known malicious stuff that hackers are inserting into unwary websites?!
Re:Actually they do add a warning for infected sit (Score:2)
Re: (Score:1)
What do you mean I am blocked, why....oooh! ok i'll fix it up for you, and then you unblock me...thanks google, you saved the day.
zero script policy for serious web use (Score:3, Interesting)
I have to observe a cast iron policy in my work. It means that quite a few sites on the internet are unavailable, but since they are mostly entertainment based it isn't a serious loss. No Javascript, no ActiveX, no Macromedia Flash. My activities are limited to viewing HTML and PDFs, even animated GIFs are blocked. In many years we have had no malware incidents (that I know of). Sometimes it's absolutely necessary to view a site containing potentially insecure content, so there is a "dirty machine" which is not allowed to connect to anything else and is wiped and reinstalled weekly.
The problem is that even serious academic and scientific sites (that should know better) are starting to add Flash plugins and heavy scripting, so it's getting hard for conscientious users to maintain security even where they want to. Insecure technology is being forced upon us by the site developers.
It would be nice if Google could display whether a site needs JavaScript, Flash or whatever and be able to search for HTML only content. The difficult way is to use Google Cache in text only mode of course.
Re: (Score:2, Funny)
You work at heaven.com?
Cool!
I want to work there too
On the other hand, I use NoScript, and it can be annoying sometimes...
I like your idea of Google displaying the technologies used on the pages they list
Re: (Score:2)
It's got nothing to do with active code. It's to do with browsers being large, complex applications. Breaking large parts of the web by stopping scripting reduces the surface area for attack but does not eliminate it. There have been too many image decoder or URL exploits for anybody to believe that.
Modern virus scanners have an observed 80% miss rate.
Re:Search engine ranking (Score:5, Insightful)
Be careful what you ask for (Score:2, Interesting)
I wonder if Google has ever considered a moderation system, allowing logged-in Google users to rank the results of their searches on a random and infrequent basis. It would be easy enough to have the "click here to open" link change to a "click here to open, and open survey in new tab/window" if the user said they were willing to moderate search results.
If a page got a bad
Re: (Score:3, Interesting)
Re: (Score:2)
How is this a good idea? Sure, having headings suggests that the author may have gone to some trouble to structure the page, but it's no real indicator of quality. A script can easily crank out reasonable-looking headings. Same goes for HTML/XHTML compliance.
Punishing JavaScript will punish everyone using Ruby on Rails, Wordpress, or anything else that does AJAX stuff. Sure, JavaScript can be used to do bad things, but a lot of UI enhancement and "Web 2.0" stuff depends on it.
RSS feed? Only relevan
Re: (Score:2)
Re:Search engine ranking (Score:4, Informative)
Also, what's your problem with JavaScript? If you ever used the Google front page (instead of your browser's quick search function or
Re: (Score:2)
The GoogleBot doesn't execute JavaScript. Google listing any content from a given site means it does, to a certain point, degrade gracefully.
I browse with Javascript off. I've noticed many pages (indexed from Google) which have Javascript-requirements for navigation. Usually, it's a menu bar which doesn't degrade (something I can't understand, as it's got to be easy to do.)
Also, what's your problem with JavaScript? If you ever used the Google front page (instead of your browser's quick search function or /search?q=your+query), you probably didn't mind not having to click into that textbox, now did you? JavaScript can cause some problems, but implemented sensibly (by the browser devs) it is no security threat and used responsibly (by web devs) has great benefits.
With Javascript, you can do a lot of neat things, sure (though I almost always use my browser's box to search Google, so I never see the home page.) It's mostly a security thing. Your assertion that sensibly-implemented Javascript is no security threat hasn't really been
Re: (Score:2)
As strange as this may sound, IE7's JavaScript implementation does not seem to have any known security flaws. Firefox, Safari and Opera seem to all be plagued by recent problems.
Anyways, JavaScript may not be the biggest of the web's security problems. Cross-site-scripting can be accomplished almost as easy with pure html (e.g. instead of redirecting victi
Re: (Score:2)
JavaScript (no) = Reward website
JavaScript OnLoad = Double punish website
This seems pretty silly - just because a website uses javascript doesn't mean it *requires* it. Well designed web sites work just fine without JS but if you have it then they give you an enhanced experience.
HTML/XHTML compliance = Reward website
HTML/XHTML not compliance = Punish website
Sadly Google doesn't properly support XHTML, so if you are punished anyway for using XHTML (why?!)
RSS feed = Reward we
Re: (Score:2)
Malware is MS's fault really (Score:1, Insightful)
Really, as much as I am not a MS basher, malware is almost entirely Microsoft's fault. If they had paid attention back in the day to security, we wouldn't have the steaming swamp of malware we have now.
The only serious way to fight malware is to reduce the potential infection hosts.
fighting this is just like fighting any sort of sickness or plague. If you have enough immunized hosts, they the issue won't
Re: (Score:2)
Re: (Score:2)
Please, get a grip. Mi
Dismal antivirus performance (Score:1)
Google Malware team. (Score:3, Interesting)
Anonymous peer review? (Score:1)
Aha, I see the problem here (Score:1)
Nice plug for Google: (Score:3, Interesting)
Did you catch the above line in their article?
Key points to take from the paper (Score:5, Informative)
The next worst offender is the US with 1/6.
About 3.5M websites attempt to send you to exploits from 180K distribution sites.
63% of the 180K malicious sites are IIS, 33% are Apache, and a handful are other.
80% of malware from not in ads (e.g. iframes) was within 4 redirects of the malware distributor.
80% of malware from ads was more than 4 redirects from the distributor.
3/4 of distribution sites and 1/2 of landing sites are in 2 blocks occupying 6.5% of IP4.
Among drive-by downloads, 1/2 alter your startup, 1/3 attack your security, 1/4 corrupt your preferences, and 7% install BHOs.
87% of outbound connections the malware initiates are HTTP, 8.3% are IRC.
The three AV engines tested against malware retrieved by the study had detection rates of about 35, 50, and 70%.
The part I find scariest is the 3.5M malware fronts. I mean, there are only about 70M active hosts on the entire Internet - that's 5 percent! Since I think that trying to make programmers these days write secure code is a lost cause, we should focus on breaking up the software monoculture. This kind of shit really starts to lose it's efficacy if only 1/4 or 1/5 attempts even attack the right browser...
Re: (Score:1)
The part I find scariest is the 3.5M malware fronts.
Recheck the paper. There were 3.5M bad urls, which through a series of redirects, pointed to only 9340 malware distribution sites (see Table 1, page 8) hosted on systems in only 500 autonomous systems. This is a solvable problem: 500 hosting companies (or their customers) are the source of it all.
Quick summary (Score:2)
IE, Outlook, and most other web/email clients take you to them happily.
And Google funds the whole ecosystem with their ads.
Maybe Google should look in a mirror once in a while. Becasue in the mirror it doesnt say "do no evil" it says "be a greedy profit hungry corporation or get sued by the shareholders and goto jail"
This can be fixed, but impacts ad revenue model (Score:4, Informative)
The paper points out that most of the attacks involve redirection of some portion of page content. That's a useful piece of information, because, other than for advertising purposes, redirection of IFRAME items and images is quite rare. A useful blocking strategy would be to block all redirects below the top level page. Many ads will disappear; no great loss.
Checking for hostile full web pages is already being done. McAfee SiteAdvisor was the first to do that, then Google copied them. Our "bottom feeder filter", SiteTruth [sitetruth.com], does some of that too, although it throws out far more sites than McAfee or Google do, just by insisting that some identifiable business stand behind any page that looks commercial.
Google's revenue model depends, to some extent, on those "bottom feeder" sites: all those anonymous "landing pages", "directory pages", "made for AdWords pages", and similar junk. Those things bring in substantial AdWords revenue, although they don't usually generate much in the way of sales for advertisers. Throwing them out of the "Google Content Network" would cut Google's ad income. This is where "don't be evil" collides with Google's profitability.
This looks like a solveable problem, but the solution will come from the security companies, not the search companies. The search companies can't afford to fix it.
The choke point: distribution sites (Score:2, Interesting)
In the 10 months of data the researchers used, Google found 9,340 distribution sites. The other 180,000 sites simply redirect you to the the distribution site, which is where you download the malware.
It gets better - those 9340 distribution sites are under the aegis of only 500 autonomous systems. [wikipedia.org] Which means Google could send their list to those 500 AS's - and each would have (on average) around 20 malware sites to clean up. After this, Google could keep notifying AS's of the distribution sites found (le
Bulletin Boards (Score:1)
MD5? (Score:1)
M
outdated (Score:1)
1,3%? (Score:1)
Re: (Score:2)
http://www.google.com/search?as_q=&hl=en&num=10&btnG=Google+Search&as_epq=spybot&as_oq=&as_eq=&lr=&cr=&as_ft=i&as_filetype=&as_qdr=all&as_nlo=&as_nhi=&as_occt=any&as_dt=i&as_sitesearch=&as_rights=&safe=images [google.com]
Google should but red warning besides results (Score:1)