your av solution is ineffective (2) - virus bulletin · signatures – by the numbers • evidence...

46
Why Your AV Solution is Ineffective i d il b h Against Todays Emailborne Threats Greg Leah Malware Analyst S t H t dS i (f l M Lb) 1 Symantec HostedServices (formerly MessageLabs) Your AV Solution is Ineffective…

Upload: others

Post on 08-Oct-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Why Your AV Solution is Ineffective i d ’ il b hAgainst Today’s Email‐borne Threats

Greg LeahMalware AnalystS t H t d S i (f l M L b )

1

Symantec Hosted Services (formerly MessageLabs)

Your AV Solution is Ineffective…

Page 2: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

MotivationMotivation

• Many recent high profile attacks on into major software companies public sector institutions and internationalcompanies, public sector institutions and international organizations

– Aurora attack on Google and 32 other companies last yearAurora attack on Google and 32 other companies last year 

– All cases: malicious email was sent to victim

Your AV Solution is Ineffective… 2

Page 3: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

IntroductionIntroduction

• Email‐borne threats fall into two general categories:

– Mass‐email attacks

– Targeted attacks

• Traditional AV increasingly ineffective

• Heuristic engine is necessary

3Your AV Solution is Ineffective…

Page 4: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Skeptic™Skeptic

• MessageLabs Heuristic Anti‐Virus engine

• Deployed as part of our Software‐as‐a‐Service (SaaS) solution across all of our mail towers

• Used to scan customer emails for malicious content

4Your AV Solution is Ineffective…

Page 5: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Bredolab (Trojan Sasfis)Bredolab (Trojan.Sasfis)

Your AV Solution is Ineffective… 5

Page 6: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Bredolab/Trojan SasfisBredolab/Trojan.Sasfis

• Most prolific family of mass‐mailed threats

• Mass email attacks with executable attachment

• Social engineering lures:

– Facebook password reset

– Western Union or UPS invoice

– ‘You have received an E‐Card!’

6Your AV Solution is Ineffective…

Page 7: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Typical Bredolab EmailTypical Bredolab Email

Your AV Solution is Ineffective… 7

Page 8: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Some Bredolab DetailsSome Bredolab Details

• Spammed out in very large numbers

– Cutwail botnet

• Many different payloads

• 13.3% of all Malware stopped by Skeptic 

– between June 2009 and June 2010 (excluding Phish and links)

• Typically low AV detection (< 10 on VT)

Your AV Solution is Ineffective… 8

Page 9: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Your AV Solution is Ineffective… 9

Page 10: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Bredolab EffectivenessBredolab Effectiveness

• Good social engineering tactics

– Use of Word or Excel icons

– Spoof prolific companies• Facebook, UPS, Fedex

• Heavy use of server‐side polymorphism (SSP) to evade signature‐based AVsignature based AV

• High volume

10Your AV Solution is Ineffective…

Page 11: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Signature‐ vs Heuristic‐Based DetectionSignature vs. Heuristic Based Detection

Your AV Solution is Ineffective… 11

Page 12: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Signature‐based AVSignature‐based AV

• Create a “signature” for a piece of Malware

• String(s) of bytes

• Checksum(s)

• Very specific

12Your AV Solution is Ineffective…

Page 13: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Signatures – by the numbersSignatures – by the numbers

• Evidence of increased use of SSP

• In 2008, Symantec created 1,691,323 new malicious code signatures

• In 2009, 2,895,802 new signatures were created

– 71% increase! 

• 139% increase from 2007 to 2008

• Not sustainable!

• Solution: heuristic‐based approach

13Your AV Solution is Ineffective…

Page 14: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Signatures released per year rapidly increasingSignatures released per year rapidly increasing

In 2009In 2009

7,934Signatures per day

In 2000

5Signatures per day

Total: 5,724,106

Your AV Solution is Ineffective… 14

Page 15: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Signature development processSignature development process

Your AV Solution is Ineffective… 15

Page 16: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Signatures ‐ shortcomingsSignatures ‐ shortcomings

• Reactionary

• 1‐1 correlation

• Time consuming

– Sample ‐> analysis ‐> sig ‐> deploy• takes around an hour in the absolute best case

– Data on this later

16Your AV Solution is Ineffective…

Page 17: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Heuristic‐based approachHeuristic‐based approach

• Generic detection

• Features known to exist in Malware

• Decision based on extracted features

• Weighted

• Cloud basedCloud based

– no reactive signature deployment delays

17Your AV Solution is Ineffective…

Page 18: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Heuristic examplesHeuristic examples

• Writable .rdata section (read‐only data)

– rarely will happen in clean files or – strong heuristic

• Calls IsDebuggerPresent()

– happens all the time in clean files – weak heuristic

18Your AV Solution is Ineffective…

Page 19: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Server‐side PolymorphismServer side Polymorphism

Your AV Solution is Ineffective… 19

Page 20: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

[Viruses that] can mutate its decryptor to 

a high number of different instances

Peter Szor

Your AV Solution is Ineffective… 20

Page 21: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Polymorphic VirusesPolymorphic Viruses

• Big problem for AV

– Many different variants

– Functionally equivalent

– Signatures required for each variant

• Solution: emulation

– Emulate past decryptor stub

– Sig the static virus body

21Your AV Solution is Ineffective…

Page 22: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Server‐side polymorphism (SSP)Server‐side polymorphism (SSP)

• Custom encryption routine

– Decrypt at runtime

• Generated by a polymorphic engine

• Hundreds or perhaps thousands of unique variants

• Random junk instructions

– API calls

– Arithmetic

– EP

22Your AV Solution is Ineffective…

Page 23: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Use in mass‐email attacksUse in mass‐email attacks

• Attackers generate a number of unique binaries

• Change the binary being spammed throughout the attack

• Problem for any vendor without proactive protection in place

23Your AV Solution is Ineffective…

Page 24: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Bredolab Case StudyBredolab Case Study

Your AV Solution is Ineffective… 24

Page 25: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Bredolab Case Study – 30 March 2010Bredolab Case Study – 30 March 2010

• Standard Bredolab run:

– Subject: variation of ‘UPS Delivery Problem NR 18800’

– Attachment: similarly named ‘UPS_invoice_1845.exe’

– relatively small (only 56 observed copies)

• Started at 19:08:33 GMT (time 0)

• Last observed sample at 19:36:31

– total of 27 min 59s

25Your AV Solution is Ineffective…

Page 26: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Case Study ‐ AV Detection & Response TimeCase Study  ‐ AV Detection & Response Time

• At time 0, AV detection was 0

• Average response time? 

– 661 minutes (11 hours and 1 minute) !!!

• Remember that the attack only lasted 28 mins…

• This is the average response time

• INEFFECTIVE

26Your AV Solution is Ineffective…

Page 27: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Aurora and Targeted Attacks (Spear‐Phishing)Aurora and Targeted Attacks (Spear Phishing)

Your AV Solution is Ineffective… 27

Page 28: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

[Google was the victim of] a highly 

sophisticated and targeted attack’ on its 

t i f t t 12 Jcorporate infrastructure on 12 January 

2010David Drummond, Senior Vice President of Corporate 

l d Chi f L lDevelopment and Chief Legal Officer, Google

Your AV Solution is Ineffective… 28

Page 29: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Aurora/HydraqAurora/Hydraq

• Up to 34 different companies compromised in same period using similar techniquesusing similar techniques

– Email links to malicious web pages

Flaws in Adobe Acrobat Reader– Flaws in Adobe Acrobat Reader

• Google hackers are back? 

CVE 2010 2883– CVE‐2010‐2883 

29Your AV Solution is Ineffective…

Page 30: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

102 breaches of the Pentagon’s agencies, 

partners and contractors in a two‐year 

i d di A t 2009period ending August 2009 

Steve Shirley, Director, US Department of Defense Cyber C i CCrime Center

Your AV Solution is Ineffective… 30

Page 31: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Other High Profile Targeted Attacks ‐ PentagonOther High Profile Targeted Attacks ‐ Pentagon

• Targeted emails with malicious attachments

• Vulnerabilities in unpatched software

Your AV Solution is Ineffective… 31

Page 32: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Other High Profile Targeted Attacks ‐ GhostnetOther High Profile Targeted Attacks ‐ Ghostnet

• Cyber espionage ring discovered by mostly Canadian researchers fromCanadian researchers from UofT

• Infected at least 1,295Infected at least 1,295 computers in 103 countries

– Close to 30% could be considered high‐value diplomatic, political, economic and military targets

• Dalai Lama & other Tibetan targets

Your AV Solution is Ineffective… 32

Page 33: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Targeted Attacks ‐MotivationTargeted Attacks ‐Motivation

• Aurora/Hydraq

– Access Gmail accounts

– Pilfer source code, defense technology and other intellectual property

• In general:

– Exfiltration of sensitive information

Your AV Solution is Ineffective… 33

Page 34: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Targeted Attack ‐ IllustrationTargeted Attack ‐ Illustration

34Your AV Solution is Ineffective…

Page 35: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Effectiveness of Targeted AttacksEffectiveness of Targeted Attacks

• ‘Innocent’ file formats

– .doc, .xls, .ppt, .pdf

• Passive reconnaissance

– Public websites

– Social networks

• Sophisticated social engineering

– “Invoice” email to Accounting department

– Newsworthy events

• Sent in very low numbers to ‘fly in under the radar’

35Your AV Solution is Ineffective…

Page 36: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Targeted Email ExampleTargeted Email Example

36Your AV Solution is Ineffective…

Page 37: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Low Volume, Highly Damaging

Average Targeted Attacks per day

• Of around 500,000 malicious emails blocked per , pday, typically <100 targeted attacks per day

• 60% of recipients are of a high/medium seniority

W t h t P bli S t 34% f ll tt k• Watch out Public Sector....  34% of all attacks

Your AV Solution is Ineffective… 37

Page 38: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Targeted Attack Case Study – 24 March 2010Targeted Attack Case Study – 24 March 2010

• Targeted attack blocked attempting to exploit CVE‐2010‐0188 (libTiff)(libTiff)

• Single copy sent to an individual in a major international organizationorganization 

– Co‐ordinates governments from around the world

• Trojanized a clean PDF from a World Cup travel site• Trojanized a clean PDF from a World Cup travel site

38Your AV Solution is Ineffective…

Page 39: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Case Study ‐ AV Detection & Response TimeCase Study  ‐ AV Detection & Response Time

• AV detection was 0

• One week later, AV detection at 33%

– Sample sharing, blogged

• Average response time? 

– 3631 minutes (two and a half days) !!!

• Only takes into account the 33% of vendors that were actually detecting the threat

• INEFFECTIVE

39Your AV Solution is Ineffective…

Page 40: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

0day Example of Heuristic Effectiveness:CVE‐2009‐4324 (Doc media newPlayer)CVE‐2009‐4324 (Doc.media.newPlayer)

• Announced 14 December 2009

• Patched 12 January 2010

• First known attack using this vulnerability was blocked on MessageLabs’ infrastructure on 20 November 2009

– LONG before the attack was made public

• Blocked  based on shellcode and presence of encrypted executables 

40Your AV Solution is Ineffective…

Page 41: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Imsolk B “Here you have”

• Many business users likely saw something like this in their 

Imsolk.B Here you have

y y ginboxes on 09 Sept

Your AV Solution is Ineffective… 41

Page 42: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Heuristic effectiveness vs Imsolk BHeuristic effectiveness vs. Imsolk.B

• All copies of the Imsolk.B mass mailer worm were stopped

• Heuristic in place since May 2008

• While a few AV solutions stopped the worm at zero‐hour the –up to 31 hours later

Your AV Solution is Ineffective… 42

Page 43: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Window of vulnerability: Imsolk B “Here you have” wormImsolk.B “Here you have” worm

Your AV Solution is Ineffective… 43

Page 44: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

ConclusionConclusion

• Heuristics > Signatures

44Your AV Solution is Ineffective…

Page 45: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Thank you!y

Greg Leahl h@ l [email protected]‐774‐0275

Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

Thi d t i id d f i f ti l l d i t i t d d d ti i All ti l ti t th i f ti i thi d t ith i li dThis document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

Your AV Solution is Ineffective… 45

Page 46: your AV solution is ineffective (2) - Virus Bulletin · Signatures – by the numbers • Evidence of increased use of SSP •In 2008, Symantec created 1,691,323 new malicious code

Bredolab VariantsBredolab Variants

46Your AV Solution is Ineffective…