Transcript malware_02

Chapter 2
Definitions and Timeline
Categorizing Malware
 No
agreed upon definitions
o Even for “virus” and “worm”
 Consider
categories based on…
o Self-replicating
o Population growth
o Parasitic
 Then
we name the different types
o As defined by Aycock
Self-replicating Malware
 Self-replicating
malware
 Actively attempts to propagate by
creating new copies
 May also propagate passively
o But this isn't self-replication
 Called
these “worms” (in CS 265)
Population Growth
 Population
growth
 Describes change in the number of
instances
 Malware that doesn't self-replicate
will have a zero population growth
o But malware with a zero population
growth may self-replicate
Parasitic
 Parasitic
malware
 Requires some other executable code
 "Executable” taken very broadly
o Boot block code on a disk
o Binary code in applications
o Application scripting languages
o Source code that may require
compilation before executing, etc.
Types of Malware
 Logic
Bomb
 Trojan
 Back Door
 Virus
 Worm
 Rabbit
 Spyware/Adware
 Other
Logic Bomb
 Self-replicating:
no
 Population growth: 0
 Parasitic: possibly
 Consists of 2 parts
o Payload --- action to be performed
o Trigger --- event to execute payload
 Donald
Gene Burleson case (CS 265)
Trojan Horse
 Self-replicating:
no
 Population growth: 0
 Parasitic: yes
 Name comes from ancient world
o Pretends to be innocent, but it’s not
 Example:
fake login prompt that
steals passwords
Back Door
 Self-replicating:
no
 Population growth: 0
 Parasitic: possibly
 Bypasses normal security checks
o So enables unauthorized access
 Example:
or RAT
Remote Administration Tool,
Virus
 Self-replicating:
yes
 Population growth: positive
 Parasitic: yes
 When executed, tries to replicate
itself into other executable code
o So, it relies in some way on other code
 Does
not propagate via a network
 Nice
virus history given by Aycock
Worm
 Self-replicating:
yes
 Population growth: positive
 Parasitic: no
 Like a virus, except…
o Spreads over network
o Worm is standalone, does not rely on
other code
 Good
history in Aycock’s book
Rabbit
 Self-replicating:
yes
 Population growth: 0
 Parasitic: no
 Two kinds of rabbits
o One uses up system resources
o One uses up network resources (special
case of a worm)
Spyware
 Self-replicating:
no
 Population growth: 0
 Parasitic: no
 Collects info and sends it to someone
o Username/password, bank info, credit
card info, software license info, etc.
 First
mention is about 1995
 May arrive via “drive-by download”
Adware
 Self-replicating:
no
 Population growth: 0
 Parasitic: no
 Similar to spyware but focused on
marketing
Hybrids, Droppers, etc.
 Hybrid
is combination of different
types of malware
o Worm that is a rabbit, trojan that acts
like a virus, etc., etc.
 Dropper
is malware that deposits
other malware
o For example, a worm might leave behind
a back door…
Zombies
 Compromised
machines that can be
used by an attacker
o Spam
o Denial of service (DoS)
o Distributed denial of service (DDoS)
 Today,
usually part of a botnet
Naming
 No
agreed on naming convention
 Virus writer might suggest a name
o “Your PC is now stoned!”
 Different
vendors might use
different names
 Different variants might get
different names, etc.
Naming
 Factors
related to naming
o Malware type
o Family name
o Variant
o Modifiers (e.g., “mm” for “mass mailer”)
 But
many different names applied to
same virus (or family)
o See book for examples
Authorship
 Author
and distributor may differ
 Is malware author a “hacker” or
“cracker”?
o It depends on your definitions…
 So,
Aycock does not use terms like
hacker or cracker
o Instead, uses boring terms like malware
author, malware writer, virus writer, etc.
Malware Writers
 Botnet
hacker caught in Slovenia (2010)
 Japanese Virus Writer Arrested for
the Second Time (2010)
o "I wanted to see how much my computer
programming skills had improved since the
last time I was arrested."
 Teen
Arrested in Blaster Case (2003)
 No 'sorry' from Love Bug author (2005)
Timeline