Malware Authors Learn Market Segmentation From the Best 49
Earthquake Retrofit writes "The Register has a rather funny story about the Zeus botnet: 'The latest version of the Zeus do-it-yourself crimeware kit goes to great lengths to thwart would-be pirates by introducing a hardware-based product activation scheme similar to what's found in Microsoft Windows. ... They've also pushed out multiple flavors of the package that vary in price depending on the capabilities it offers. Just as Windows users can choose between the lower-priced Windows 7 Starter or the more costly Windows 7 Business, bot masters have multiple options for Zeus.'"
hmm (Score:5, Funny)
but will these malware authors be able to cause as much harm to your computer as windows does?
Re: (Score:2)
does it run on linux?
Re: (Score:2)
Maybe they are from the same company. (Score:2, Insightful)
Vulnerabilities make money for Microsoft: "This time, our OS is secure. Really. Buy a copy." People go out and buy a new computer because they don't know how to fix the one they have: Corrupted PC's Find New Home in the Dumpster [nytimes.com].
Re: (Score:3, Informative)
From that article you linked:
SAN FRANCISCO, July 15 - Add personal computers to the list of throwaways in the disposable society.
On a recent Sunday morning when Lew Tucker's Dell desktop computer was overrun by spyware and adware - stealth software that delivers intrusive advertising messages and even gathers data from the user's machine - he did not simply get rid of the offending programs. He threw out the whole computer.
Mr. Tucker, an Internet industry executive who holds a Ph.D. in computer science, decided that rather than take the time to remove the offending software, he would spend $400 on a new machine.
Mr. Tucker is a dumbass. There are plenty of people who could have completely cleared out that computer for under $100 in man hours.
Re: (Score:2)
If not, you would think we would at least have sold it on craigslist, which is easy and quick if you sell below market value.
Re: (Score:3, Insightful)
Re: (Score:2)
I have advocated it in the past as well, but only when the piece of hardware is:
a) Really old
b) In terrible shape
c) Made by a terrible manufacturer
I greatly dislike the whole philosophy of replacing stuff unnecessarily. I was raised as one of those people who tries to fix something before going out and buying a new one.
Then again, I suppose spending money frivolously goes hand-in-hand with being an executive.
Re: (Score:2)
Re: (Score:2)
Two things are of value monetarily. Time and Materials. Anyone would choose the cheaper route when making a decision to fix or replace.
I completely agree. And my original point of him being an idiot stands. Worst case scenario of "salt the earth and reformat" takes a grand total of 2, 2 1/2 hours. Unless he lives out in the burbs where you'll spend $50-150/hour for a tech, it still would have been far, far cheaper than buying even a netbook.
Re: (Score:1)
And funny enough, reinstalling windows would have taken only 30 minutes of his time...
had he the windows cd that came with the computer. This is why I hate the computer world, no one tries to push this enough, M$ loves to hear that you bought a new computer, and new license for windows...
as well, now there is even more power available to the botnet writers since you will visit that same site that got you infected in the first place. More power...more emails!
You may be a victim of botnet counterfeiting (Score:2, Funny)
Your copy of Zeus has not been validated.
Re: (Score:2)
Re: (Score:3, Insightful)
I think they have a more actually effective method though........ malware activates if determined to be unlicensed and being used "illegaly", turns into a trojan working on behalf of the the maker.
Re: (Score:1)
Uh, you mean this is less dangerous than activating XP?
all hands on deck! (Score:2, Insightful)
Just as Windows users can choose between the lower-priced Windows 7 Starter or....
Actually, I don't think you get that choice. (at least, not in most first-world countires) I was under the impression that windows 7 starter edition would only be available to "developing" countries. (and maybe on netbooks as well, though I fail to see how that would be even remotely necessary. My Eee 1000he runs 7 professional just fine.)
Also, I give it a week or less before some cracking group releases a pirated version. Then they'll start putting more and more oppressive DRM into their malware kits!
Malw
Re: (Score:2)
Windows 7 Starter will be available in all countries. The reason for offering it on netbooks is that full Windows 7 is expensive (much more expensive for netbooks than XP was) and would push up the price quite a bit...
Version 1.4 (Score:5, Interesting)
I'm a little surprised Zeus is only adding dynamic executables with version 1.4. This malware kit has been around a while and software has been doing this kind of thing since the very beginning. Maybe it tells us that a lot of Zeus' victims lack any kind of working AV? Or maybe it tells us that with things like Security Essentials being free and popular they're more worried about AV as a threat to their business?
I will say that a binary that changes its self every execution becomes very hard to detect unless your software really understands how a program is running from a mechanical standpoint. Even then you could still embed a dynamically encrypted package into another process's address space and decrypt it there.
Ultimately however it still comes down to the simple fact that there is one layer of defence on modern PCs and once that is bypassed you might have well reinstall your OS.
Re: (Score:3, Insightful)
a lot of Zeus' victims lack any kind of working AV?
Have you seen a typical home Windows machine connected to the Internet?
You should get out more.
If the machine actually has AV, it's probably 6 months out of date at a minimum.
I could rant about Windows in general being the most insecure out of the box, but I'm no longer motivated to rant about legacy software anymore. Y'all get what ya get.
--
BMO
Re:Version 1.4 (Score:5, Informative)
Plenty of virus scanners can pick up on dynamic executables (also called polymorphic). One problem you run in to is that you have to pass the scanner before you get to execute, so that means that even if your thing can really scramble itself upon execution, if they have info on the versions that are being distributed online, those can be blocked and you don't get a chance to change. However as a practical matter, your code is still there no matter what, has to be to run, and the advanced scanner can pick up on that. They also can perk up and look harder when you do uncommon things like self-modify and so on.
What it really comes down to though is that these kind of programs are going after low hanging fruit. The botnet authors aren't trying to bypass every defense, they just want to get a big net of infected PCs and there are plenty of choices with crap defense. Besides, the ones without defenses are ones more likely to not clean up the infection. If someone goes through the trouble to secure their system, they may also watch it and will notice problems if you infect it. That doesn't do you much good if they just clean it up after a couple hours. You want a system you can hang on to.
Re: (Score:2)
In the old days of viruses made for fun rather than profit, a proper polymorphic virus didn't have a constant string longer than a single byte. Instead of changing encryption key, they randomized the entire algorithm -- down to partial opcodes. With this, there is no way to gather signatures of any number of versions, since there simply are none. Another trick is to decrypt just the code that's about to run, clearing it afterwards -- so a memory dump won't help the slightest.
That trivially defeats both w
Re:Version 1.4 (Score:4, Informative)
Engines these days are more advanced than just signature matching. They do that too, since it works well against most threats, but they have more advanced tricks to detect viruses despite obfuscation attempts. They are fairly advanced these days.
Also remember you have a far more complex system to contend with. On DOS you had direct access to any and everything. Not the case in Windows or any other modern OS. You have to interface with the OS's calls and you have to deal with thing like processor enforced privilege levels and so on. You can't write your code in any way you like or the OS will simply refuse to execute it and throw an error.
Finally, I think you may be a bit confused. In x86 (and x64) assembly at least, there's no such thing as a partial op-code. Each instruction is one or more bytes and the CPU doesn't just skip over invalid data as some did (like some 6502 variants). So you can't change any bit in an op-code or you'll change what that op-code is and thus what it does. For example 74 is JZ, jump to the address (specified afterward) if the zero flag is set. 75 is JNZ, jump to the address if the zero flag is NOT set. Change one bit, changes the whole meaning of the instruction. You can't fiddle with parts and have a different op-code that does the same thing.
Re:Version 1.4 (Score:4, Insightful)
All the following sequences do an unconditional jump:
Note that any difference in length can be made up with either preceding (effective) NOPs (there are many possibilities there, too) or with following junk (it's an unconditional jump; anything directly following isn't executed anyway). Also note that the destination address can be varied if the destination starts with some (effective) NOPs, or if you have jump instructions to that address at other positions.
And all that is just what I could immediately think of. I'm sure someone who spends considerable time on designing such stuff would find many more ways to vary the code.
Re: (Score:2)
? I'm no assembler expert, but I think PUSH alters the stack pointer, RET uses the frame pointer to find the return address and that has been unaltered...
Re: (Score:2)
I'm no assembler expert, but I think PUSH alters the stack pointer, RET uses the frame pointer to find the return address and that has been unaltered...
There's no such thing as a frame pointer at the hardware level on x86, as far as I'm aware. PUSH, POP, CALL and RET all use the stack pointer.
Re: (Score:1)
I'm no assembler expert, but I think PUSH alters the stack pointer, RET uses the frame pointer to find the return address and that has been unaltered...
There's no such thing as a frame pointer at the hardware level on x86, as far as I'm aware. PUSH, POP, CALL and RET all use the stack pointer.
By convention, BP is used as the frame pointer on x86. But it isn't directly done by the CPU, but has to be explicitly set up by the function prolog/epilog (basically copying the stack pointer to BP and back) and often is omitted by functions not using local variables. RET indeed reads the address through the stack pointer; the only special thing about BP is that addressing through it by default uses the stack segment register (this doesn't matter for the usual flat memory model used today, but it mattered
Re: (Score:2)
let me illustrate this with an example - I think this is how anti-disassembler techniques work
1 jumps to by
Re: (Score:2)
Re: (Score:2, Insightful)
To emphasize your point, this is an era when malware creators write their code in Visual Basic because it's just too hard to learn C++. We oughtn't expect incredible feats of brilliance from them.
Re: (Score:2)
so that means that even if your thing can really scramble itself upon execution, if they have info on the versions that are being distributed online, those can be blocked
Until the infected machines start distributing their already-scrambled executables to others?
Re: (Score:2)
Re: (Score:2, Funny)
Which version of Zeus should I buy... (Score:3, Funny)
Zeus Smoky Bacon Edition or Zeus Kenny Loggins edition? Bacon is delicious, but I also love that Footloose song... [codinghorror.com]
Re: (Score:3, Funny)
Whatever you do don't buy Zeus starter edition, it only allows you to infect 3 machines at the same time...
Bot Master (Score:1)
Re: (Score:1)
You could probably track down the code to some obsolete system and install it on your own computer.
www.t10t.net (Score:1, Informative)
Very cool I admire this
Thank you all
Hardware-based? (Score:3, Insightful)
hardware-based product activation scheme similar to what's found in Microsoft Windows
Windows Product Activation is not what is usually termed "hardware based". It may take a signature of your hardware to look for unacceptable changes to that hardware, but that's about it. A hardware-based scheme usually involves a dongle or other physical device that is required for the software to execute.