SlideShare a Scribd company logo
1 of 25
Scareware From Ireland



                  Mark Hillick

   IrissCert Incident Handler




        http://www.iriss.ie
       mark.hillick@iriss.ie


   Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   1
What is Scareware?




   Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   2
Irish Scareware Exploit

 Browse to Irish website & collect your fake anti-
  virus




               Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   3
Dialog-box fun…..




   Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   4
Dialog-box fun cont…..




   Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   5
System Scan




   Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   6
Trojan Log file




    Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   7
Money, please!




   Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   8
Are you sure?




   Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   9
Are you mad????




   Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   10
BSOD




  Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   11
Effect on the end-user….




   Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   12
Exploit

 Exploited Sites hosted on one server
   Microsoft FTPd & IIS 6.0


 Two most popular web site attacks –

   Gumblar
     PHP Sites


   Asprox
     SQL Injection

                  Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   13
Pass the Parcel

 http://compromisedsite.ie

   http://jobstopfil.biz

      http://poppka.net

       http://sujetline.ru

       http://grownclubfest.ru


 PDF & SWF files served back


                      Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   14
Obfuscation

 Engaged SANS ISC Malware Team

   Heavily obfuscated javascript

   Used techniques not seen before




               Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   15
Complex Design….




   Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   16
Tools Used
 Tamper Data, Live HTTP Headers – Firefox

 Burp Suite

 Tcpdump, Wireshark & Netwitness

 Dig/nslookup



                 Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   17
Incident Handling - Containment




Source: http://www.tazworld.co.uk/gallery/pictures/www.tazworld.co.uk_taz_035.gif
© Warner Bros. Entertainment Inc.

                              Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   18
Incident Handling - Eradication




Source -> http://www.alexross.com/CJ011.jpg © Warner Bros. Entertainment Inc

                               Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   19
Incident Handling - Recovery




   Dilbert ©2009, United Feature Syndicate, Inc.

   Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   20
Incident Handling - Lessons Learned

 Patch web-server & application
   Input validation


 Close unnecessary open ports (e.g. FTP)

 Password Policy

 Regular back-ups

 Web-app security testing
                Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   21
Securing the Desktop

 End-User Defence



 Rescue CDs
   Google -> “rescue site:raymond.cc”



 Free Tools
   http://zeltser.com/fighting-malicious-software/


                 Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   22
Next Steps & Extra Info

 Sans GCIH Gold Paper
    −   Scareware & its evolution
    −   Incident Handling Process


   Full Incident Report
    −   http://www.iriss.ie – in shared documents
    −   http://www.hillick.net/things/scareware.doc




                   Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   23
References

 Sunbelt Blog

 Dancho Danchev Blog

 SANS ISC (Thanks to @bojanz)

 VRT-Sourcefire Blog

 Symantec White Papers

 Sans Forensics Blog

                 Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   24
That's it.....




                           Hat Tip for image - Jesse M. Heines - http://teaching.cs.uml.edu/~heines/images/
                   questions.gif




     Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS                       25

More Related Content

What's hot

Building & Hacking Modern iOS Apps
Building & Hacking Modern iOS AppsBuilding & Hacking Modern iOS Apps
Building & Hacking Modern iOS AppsSecuRing
 
The view of auditor on cybercrime
The view of auditor on cybercrimeThe view of auditor on cybercrime
The view of auditor on cybercrimeMarc Vael
 
Stranger Danger (NodeSummit, 2016)
Stranger Danger (NodeSummit, 2016)Stranger Danger (NodeSummit, 2016)
Stranger Danger (NodeSummit, 2016)Guy Podjarny
 
Lviv MD Day 2015 Анастасія Войтова "Data transfer security for mobile apps: w...
Lviv MD Day 2015 Анастасія Войтова "Data transfer security for mobile apps: w...Lviv MD Day 2015 Анастасія Войтова "Data transfer security for mobile apps: w...
Lviv MD Day 2015 Анастасія Войтова "Data transfer security for mobile apps: w...Lviv Startup Club
 
Testing iOS apps without jailbreak in 2018
Testing iOS apps without jailbreak in 2018Testing iOS apps without jailbreak in 2018
Testing iOS apps without jailbreak in 2018SecuRing
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windowsF-Secure Corporation
 
SIPNOC 2014 - Is It Time For TLS for SIP?
SIPNOC 2014 - Is It Time For TLS for SIP?SIPNOC 2014 - Is It Time For TLS for SIP?
SIPNOC 2014 - Is It Time For TLS for SIP?Dan York
 
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08Michael Boman
 
D3SF17 -Keynote - Staying Ahead of the Curve
D3SF17 -Keynote - Staying Ahead of the CurveD3SF17 -Keynote - Staying Ahead of the Curve
D3SF17 -Keynote - Staying Ahead of the CurveImperva Incapsula
 
How to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’tsHow to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’tsNowSecure
 
Continuous Security
Continuous SecurityContinuous Security
Continuous SecurityAdam Baldwin
 
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?Open Source and The Global Disruption Of Telecom: What Choices Will We Make?
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?Dan York
 

What's hot (12)

Building & Hacking Modern iOS Apps
Building & Hacking Modern iOS AppsBuilding & Hacking Modern iOS Apps
Building & Hacking Modern iOS Apps
 
The view of auditor on cybercrime
The view of auditor on cybercrimeThe view of auditor on cybercrime
The view of auditor on cybercrime
 
Stranger Danger (NodeSummit, 2016)
Stranger Danger (NodeSummit, 2016)Stranger Danger (NodeSummit, 2016)
Stranger Danger (NodeSummit, 2016)
 
Lviv MD Day 2015 Анастасія Войтова "Data transfer security for mobile apps: w...
Lviv MD Day 2015 Анастасія Войтова "Data transfer security for mobile apps: w...Lviv MD Day 2015 Анастасія Войтова "Data transfer security for mobile apps: w...
Lviv MD Day 2015 Анастасія Войтова "Data transfer security for mobile apps: w...
 
Testing iOS apps without jailbreak in 2018
Testing iOS apps without jailbreak in 2018Testing iOS apps without jailbreak in 2018
Testing iOS apps without jailbreak in 2018
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windows
 
SIPNOC 2014 - Is It Time For TLS for SIP?
SIPNOC 2014 - Is It Time For TLS for SIP?SIPNOC 2014 - Is It Time For TLS for SIP?
SIPNOC 2014 - Is It Time For TLS for SIP?
 
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
 
D3SF17 -Keynote - Staying Ahead of the Curve
D3SF17 -Keynote - Staying Ahead of the CurveD3SF17 -Keynote - Staying Ahead of the Curve
D3SF17 -Keynote - Staying Ahead of the Curve
 
How to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’tsHow to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’ts
 
Continuous Security
Continuous SecurityContinuous Security
Continuous Security
 
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?Open Source and The Global Disruption Of Telecom: What Choices Will We Make?
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?
 

Viewers also liked

Viewers also liked (17)

Ugur400
Ugur400Ugur400
Ugur400
 
Scareware y ramsomware . valdez avila , ramirez camacho , vazquez martinez
Scareware y ramsomware . valdez avila , ramirez camacho , vazquez martinezScareware y ramsomware . valdez avila , ramirez camacho , vazquez martinez
Scareware y ramsomware . valdez avila , ramirez camacho , vazquez martinez
 
Access Point
Access PointAccess Point
Access Point
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
New Cisco Access Points
New Cisco Access PointsNew Cisco Access Points
New Cisco Access Points
 
Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
History of Laptops ppt
History of Laptops pptHistory of Laptops ppt
History of Laptops ppt
 
Laptop Evolution
Laptop EvolutionLaptop Evolution
Laptop Evolution
 
Spyware
SpywareSpyware
Spyware
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Modem presentation
Modem presentationModem presentation
Modem presentation
 
spyware
spywarespyware
spyware
 
Laptops of 2018 ppt
Laptops of 2018 pptLaptops of 2018 ppt
Laptops of 2018 ppt
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless TechnologiesPresentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
 

Similar to Scareware - Irisscon 2009

Lec21 security
Lec21 securityLec21 security
Lec21 securityimran6994
 
Presentation cisco iron port product family
Presentation   cisco iron port product familyPresentation   cisco iron port product family
Presentation cisco iron port product familyxKinAnx
 
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...Cisco Canada
 
How to perform an Infrastructure Security Gap Analysis
How to perform an Infrastructure Security Gap AnalysisHow to perform an Infrastructure Security Gap Analysis
How to perform an Infrastructure Security Gap AnalysisCarlo Dapino
 
Internet security: a landscape of unintended consequences
Internet security: a landscape of unintended consequencesInternet security: a landscape of unintended consequences
Internet security: a landscape of unintended consequencesSarah Allen
 
Linux Foundation Live Webinar: Applying Governance to CI/CD
Linux Foundation Live Webinar: Applying Governance to CI/CDLinux Foundation Live Webinar: Applying Governance to CI/CD
Linux Foundation Live Webinar: Applying Governance to CI/CDTiffany Jachja
 
Docker app armor_usecase
Docker app armor_usecaseDocker app armor_usecase
Docker app armor_usecaseKazuki Omo
 
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecSegurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecCSA Argentina
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor FiorimTI Safe
 
The security phoenix - from the ashes of DEV-OPS Appsec California 2020
The security phoenix - from the ashes of DEV-OPS Appsec California 2020The security phoenix - from the ashes of DEV-OPS Appsec California 2020
The security phoenix - from the ashes of DEV-OPS Appsec California 2020NSC42 Ltd
 
Basic Internet Security (for Association of Bridal Consultants - Italy)
Basic Internet Security (for Association of Bridal Consultants - Italy)Basic Internet Security (for Association of Bridal Consultants - Italy)
Basic Internet Security (for Association of Bridal Consultants - Italy)Marco Marcellini
 
Rapidly developing IoT (Internet of Things) applications - Part 2: Arduino, B...
Rapidly developing IoT (Internet of Things) applications - Part 2: Arduino, B...Rapidly developing IoT (Internet of Things) applications - Part 2: Arduino, B...
Rapidly developing IoT (Internet of Things) applications - Part 2: Arduino, B...Raul Chong
 
lec21-security.ppt
lec21-security.pptlec21-security.ppt
lec21-security.pptarrenfill
 
my lecture 21.network security.2023.ppt
my lecture 21.network security.2023.pptmy lecture 21.network security.2023.ppt
my lecture 21.network security.2023.ppthalosidiq1
 
lec21-security.ppt
lec21-security.pptlec21-security.ppt
lec21-security.ppttahaniali27
 
lec21-security.ppt
lec21-security.pptlec21-security.ppt
lec21-security.pptramana899986
 
INTERNET SECURITY.ppt
INTERNET SECURITY.pptINTERNET SECURITY.ppt
INTERNET SECURITY.pptAVUDAI1
 

Similar to Scareware - Irisscon 2009 (20)

Lec21 security
Lec21 securityLec21 security
Lec21 security
 
Presentation cisco iron port product family
Presentation   cisco iron port product familyPresentation   cisco iron port product family
Presentation cisco iron port product family
 
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...
 
How to perform an Infrastructure Security Gap Analysis
How to perform an Infrastructure Security Gap AnalysisHow to perform an Infrastructure Security Gap Analysis
How to perform an Infrastructure Security Gap Analysis
 
Internet security: a landscape of unintended consequences
Internet security: a landscape of unintended consequencesInternet security: a landscape of unintended consequences
Internet security: a landscape of unintended consequences
 
Linux Foundation Live Webinar: Applying Governance to CI/CD
Linux Foundation Live Webinar: Applying Governance to CI/CDLinux Foundation Live Webinar: Applying Governance to CI/CD
Linux Foundation Live Webinar: Applying Governance to CI/CD
 
Docker app armor_usecase
Docker app armor_usecaseDocker app armor_usecase
Docker app armor_usecase
 
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecSegurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantec
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
 
The security phoenix - from the ashes of DEV-OPS Appsec California 2020
The security phoenix - from the ashes of DEV-OPS Appsec California 2020The security phoenix - from the ashes of DEV-OPS Appsec California 2020
The security phoenix - from the ashes of DEV-OPS Appsec California 2020
 
SIEM evolution
SIEM evolutionSIEM evolution
SIEM evolution
 
Basic Internet Security (for Association of Bridal Consultants - Italy)
Basic Internet Security (for Association of Bridal Consultants - Italy)Basic Internet Security (for Association of Bridal Consultants - Italy)
Basic Internet Security (for Association of Bridal Consultants - Italy)
 
Rapidly developing IoT (Internet of Things) applications - Part 2: Arduino, B...
Rapidly developing IoT (Internet of Things) applications - Part 2: Arduino, B...Rapidly developing IoT (Internet of Things) applications - Part 2: Arduino, B...
Rapidly developing IoT (Internet of Things) applications - Part 2: Arduino, B...
 
lec21-security.ppt
lec21-security.pptlec21-security.ppt
lec21-security.ppt
 
network.ppt
network.pptnetwork.ppt
network.ppt
 
my lecture 21.network security.2023.ppt
my lecture 21.network security.2023.pptmy lecture 21.network security.2023.ppt
my lecture 21.network security.2023.ppt
 
lec21-security.ppt
lec21-security.pptlec21-security.ppt
lec21-security.ppt
 
Network Security
Network SecurityNetwork Security
Network Security
 
lec21-security.ppt
lec21-security.pptlec21-security.ppt
lec21-security.ppt
 
INTERNET SECURITY.ppt
INTERNET SECURITY.pptINTERNET SECURITY.ppt
INTERNET SECURITY.ppt
 

More from Mark Hillick

Peeling back your Network Layers with Security Onion
Peeling back your Network Layers with Security OnionPeeling back your Network Layers with Security Onion
Peeling back your Network Layers with Security OnionMark Hillick
 
Introduction to MongoDB
Introduction to MongoDBIntroduction to MongoDB
Introduction to MongoDBMark Hillick
 
PHP Loves MongoDB - Dublin MUG (by Hannes)
PHP Loves MongoDB - Dublin MUG (by Hannes)PHP Loves MongoDB - Dublin MUG (by Hannes)
PHP Loves MongoDB - Dublin MUG (by Hannes)Mark Hillick
 
Integrated Cache on Netscaler
Integrated Cache on NetscalerIntegrated Cache on Netscaler
Integrated Cache on NetscalerMark Hillick
 
Scareware Traversing the World via Ireland
Scareware Traversing the World via IrelandScareware Traversing the World via Ireland
Scareware Traversing the World via IrelandMark Hillick
 
Implementing a WAF
Implementing a WAFImplementing a WAF
Implementing a WAFMark Hillick
 
CTF: Bringing back more than sexy!
CTF: Bringing back more than sexy!CTF: Bringing back more than sexy!
CTF: Bringing back more than sexy!Mark Hillick
 
MongoDB - Who, What & Where!
MongoDB - Who, What & Where!MongoDB - Who, What & Where!
MongoDB - Who, What & Where!Mark Hillick
 

More from Mark Hillick (9)

Peeling back your Network Layers with Security Onion
Peeling back your Network Layers with Security OnionPeeling back your Network Layers with Security Onion
Peeling back your Network Layers with Security Onion
 
Introduction to MongoDB
Introduction to MongoDBIntroduction to MongoDB
Introduction to MongoDB
 
PHP Loves MongoDB - Dublin MUG (by Hannes)
PHP Loves MongoDB - Dublin MUG (by Hannes)PHP Loves MongoDB - Dublin MUG (by Hannes)
PHP Loves MongoDB - Dublin MUG (by Hannes)
 
HackEire 2009
HackEire 2009HackEire 2009
HackEire 2009
 
Integrated Cache on Netscaler
Integrated Cache on NetscalerIntegrated Cache on Netscaler
Integrated Cache on Netscaler
 
Scareware Traversing the World via Ireland
Scareware Traversing the World via IrelandScareware Traversing the World via Ireland
Scareware Traversing the World via Ireland
 
Implementing a WAF
Implementing a WAFImplementing a WAF
Implementing a WAF
 
CTF: Bringing back more than sexy!
CTF: Bringing back more than sexy!CTF: Bringing back more than sexy!
CTF: Bringing back more than sexy!
 
MongoDB - Who, What & Where!
MongoDB - Who, What & Where!MongoDB - Who, What & Where!
MongoDB - Who, What & Where!
 

Recently uploaded

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Scareware - Irisscon 2009

  • 1. Scareware From Ireland Mark Hillick IrissCert Incident Handler http://www.iriss.ie mark.hillick@iriss.ie Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 1
  • 2. What is Scareware? Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 2
  • 3. Irish Scareware Exploit  Browse to Irish website & collect your fake anti- virus Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 3
  • 4. Dialog-box fun….. Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 4
  • 5. Dialog-box fun cont….. Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 5
  • 6. System Scan Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 6
  • 7. Trojan Log file Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 7
  • 8. Money, please! Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 8
  • 9. Are you sure? Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 9
  • 10. Are you mad???? Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 10
  • 11. BSOD Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 11
  • 12. Effect on the end-user…. Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 12
  • 13. Exploit  Exploited Sites hosted on one server  Microsoft FTPd & IIS 6.0  Two most popular web site attacks –  Gumblar PHP Sites  Asprox SQL Injection Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 13
  • 14. Pass the Parcel  http://compromisedsite.ie  http://jobstopfil.biz http://poppka.net  http://sujetline.ru  http://grownclubfest.ru  PDF & SWF files served back Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 14
  • 15. Obfuscation  Engaged SANS ISC Malware Team  Heavily obfuscated javascript  Used techniques not seen before Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 15
  • 16. Complex Design…. Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 16
  • 17. Tools Used  Tamper Data, Live HTTP Headers – Firefox  Burp Suite  Tcpdump, Wireshark & Netwitness  Dig/nslookup Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 17
  • 18. Incident Handling - Containment Source: http://www.tazworld.co.uk/gallery/pictures/www.tazworld.co.uk_taz_035.gif © Warner Bros. Entertainment Inc. Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 18
  • 19. Incident Handling - Eradication Source -> http://www.alexross.com/CJ011.jpg © Warner Bros. Entertainment Inc Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 19
  • 20. Incident Handling - Recovery Dilbert ©2009, United Feature Syndicate, Inc. Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 20
  • 21. Incident Handling - Lessons Learned  Patch web-server & application  Input validation  Close unnecessary open ports (e.g. FTP)  Password Policy  Regular back-ups  Web-app security testing Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 21
  • 22. Securing the Desktop  End-User Defence  Rescue CDs  Google -> “rescue site:raymond.cc”  Free Tools  http://zeltser.com/fighting-malicious-software/ Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 22
  • 23. Next Steps & Extra Info  Sans GCIH Gold Paper − Scareware & its evolution − Incident Handling Process  Full Incident Report − http://www.iriss.ie – in shared documents − http://www.hillick.net/things/scareware.doc Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 23
  • 24. References  Sunbelt Blog  Dancho Danchev Blog  SANS ISC (Thanks to @bojanz)  VRT-Sourcefire Blog  Symantec White Papers  Sans Forensics Blog Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 24
  • 25. That's it..... Hat Tip for image - Jesse M. Heines - http://teaching.cs.uml.edu/~heines/images/ questions.gif Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 25

Editor's Notes

  1. Going to define scareware – Software scares end-user into thinking computer has an infection; 43 million fake anti-virus download attempts (June-July 09) – Symantec white paper Explain why criminals use Scareware and their motives. This is to give theaudience a reason to care about what you are talking about. Describe what happened to end-user computer Describe the infrastructure behind the scareware Describe the Exploit Describe how IRISS handled the incident Give some recommendations and resources for desktop controls Give References Answer questions throughout
  2. IRISS notified by a member. Confirmed it ourselves through testing and further through links with URL/IP/AV vendor and SANS ISC
  3. Dialog Box windows popping up everywhere to scare the end-user NB. – I was able to install AVG during it and sys Internals Tools.
  4. Dialog Box windows popping up everywhere to scare the end-user
  5. Looks very like leading anti-virus/anti-malware desktop solutions
  6. Log file – adding some reality, professionalism 
  7. Does that not look the Verisign logo??? At this point, it’s “Game Over”.
  8. Are you sure? Seriously?
  9. At the last minute, I decide I was uncomfortable with paying the cash. It warns me – emphasises that I will be continuing UNPROTECTED. http://sunbeltblog.blogspot.com/2009/07/new-rogue-tactic-blue-screen-of.html - According to anti-spyware firm Sunbelt Software, this ‘Blue Screen of Death’ trick is a new trick from July 2009
  10. The return of the infamous BSOD……this surely has to panic end-users 
  11. For the average end-user, this is the only conceivable output.
  12. We have no concrete facts around how the site was exploited, however, there were quite a few issues with servers from this web farm and they were running IIS6 on Windows. Most of the current attacks (confirmed with SANS ISC) are either performed with Gumblar or Asprox. Although the server was running IIS 6.0 the malware did not exploit IIS per se but rather used weak web appsecurity. Tie in with Eoin's talk later and also highlight where the problems lie. http://en.wikipedia.org/wiki/Gumblar Further information -
  13. This is what happened when the user accessed the site – multiple redirects to external sites that all host malware. Therefore, the Irish sites are termed as intermediaries for sites that serve malware. McAfee SiteAdvisor, TrustSource – no good PDF & SWF - do not exploit the latest 0-day but some older vulnerabilities (namely the Collab one and util.printf) Difficult to get sites closed down – complexity (slide 14 will expand on this further) Also highlight that the redirects can happen to any site? E.g. New York Times etc.
  14. Comment on the links we have with Sans ISC. Comment on the advanced skills that the ‘bad guys’ have!!
  15. Exploited sites in Ireland – Irish websites Redirects - Domains hosted in Russia - Russian name & registrar Grownclubfest.ru Poppka.net https://www.onlinepurchasesolution.com https://www.securebillingsoftware.com webst.ru – hosting company Still working on closing sites – still serving malware Servers physically located in China – Netcraft Payment URLs hosted in Canada, registered
  16. Summary of the tools that were used
  17. Contact Hosting Company/Owner Possible temporary take-down Make IRISS members away of malware code Encourage company to disclose to customers (hhhhmmm, keep in?) Inform SANS, AV, IP reputation sites & URL filtering vendors Attempt takedown of malware-serving sites
  18. Recommended steps - Take site offline momentarily while the code is being removed. Only restore service to the site when it has been cleaned or a back-up has been restored. Remove malware code or restore latest clean back-up
  19. Scan application and restore service if clean Ask external URL/AV vendors to rescan site Inform customers if necessary that site is back up
  20. Not sure what to do here – should I be recommending what to do on a web application? Explain how to reduce the risk of this type of attack impacting your server. Contact Hosting Company/Owner Possible temporary take-down Make IRISS members away of malware code Inform SANS, AV & URL filtering vendors Attempt takedown of malware-serving sites
  21. Defence in Depth Desktop – AV, Anti-Spyware, Anti-Malware, Registry Cleaners Personal Firewall Browser – security add-on
  22. Add-ons – NoScript, Google Safe Browsing, AVG Toolbar, WOT, AdBlock Plus, Flashblock, ShowIP, Clear Private Data This scareware only ran on Windows Free Tools - http://zeltser.com/fighting-malicious-software/lookup-malicious-websites.html, http://zeltser.com/fighting-malicious-software/malicious-ip-blocklists.html, http://zeltser.com/reverse-malware/automated-malware-analysis.html
  23. http://sunbeltblog.blogspot.com/2009/07/new-rogue-tactic-blue-screen-of.html Google search http://ddanchev.blogspot.com/ for ‘scareware’ or ‘virus’ http://isc.sans.org/ (Thanks to @bojanz) http://vrt-sourcefire.blogspot.com/2009/11/paranoia-and-rise-of-fake-antivirus.html http://eval.symantec.com/mktginfo/enterprise/white_papers/b-symc_report_on_rogue_security_software_WP_20016952.en-us.pdf http://blogs.sans.org/computer-forensics/2009/11/07/lists-for-investigating-malware-incidents/