windows 7 impact upon rogue

23
Windows 7 impact upon rogue Windows 7 impact upon rogue security software Josh Norris, Threat Discovery Analyst • [email protected] Ken Dunham, Director of Global Response • Proprietary and Confidential Information – Copyright© 2010 – All Rights Reserved [email protected]

Upload: others

Post on 12-Sep-2021

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Windows 7 impact upon rogue

Windows 7 impact upon rogueWindows 7 impact upon rogue security softwareJosh Norris, Threat Discovery Analyst • [email protected] Dunham, Director of Global Response • 

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved

[email protected]

Page 2: Windows 7 impact upon rogue

Overview

• Windows 7 Impact Upon Rogue AV?Windows 7 Impact Upon Rogue AV?

• Key Security Features Examined– User Account Control (UAC)

– Windows Defender

• Win7 Tests of Rogue AV & Malcode

• Legacy Code and Adapted Codes for Win7

• Key Takeaways of Anecdotal ResearchKey Takeaways of Anecdotal Research

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 2

Page 3: Windows 7 impact upon rogue

The Transition

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 3

Page 4: Windows 7 impact upon rogue

Key Security Featuresy y

• Notification area settings Control PanelNotification area settings Control Panel

• Windows Defender 

• User Account Control (UAC) 

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 4

Page 5: Windows 7 impact upon rogue

Notification Area Control Panel• Allows modification of taskbar icon and 

tifi ti b h inotification behavior

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 5

Page 6: Windows 7 impact upon rogue

Windows Defender• The included spyware monitoring package for Wi d Vi t d Wi d 7Windows Vista and Windows 7

• Can be disabled or limited by the end user• Moderately successful at catching malicious code

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 6

Page 7: Windows 7 impact upon rogue

User Account Control (UAC)( )

• Introduced with Windows VistaIntroduced with Windows Vista

• Effective, yet perceived as an annoyance

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 7

Page 8: Windows 7 impact upon rogue

More Control

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 8

Page 9: Windows 7 impact upon rogue

The Purpose of UACp

• NOT a security boundary but rather aNOT a security boundary but rather a convenience.

• An attempt to take advantage of the fact that most Malcode requires admin rights to q gfunction properly. 

• Prevents modification of key directories and• Prevents modification of key directories and registry hives.

• Prevents full compromise, not necessarily full functionality. 

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved

y

9

Page 10: Windows 7 impact upon rogue

Testing Malcode in Windows 7g

• Codes tested in a Windows 7 environment fallCodes tested in a Windows 7 environment fall into two main categories: 

Rogue AV– Rogue AV

– Trojans

• Tested with UAC at “Always Notify”, Windows Defender on and updated, and no traditionalDefender on and updated, and no traditional AV.

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 10

Page 11: Windows 7 impact upon rogue

Rogue AVg

• Designed to intimidateg

• Chosen for testing because of:l– Popularity

– Potential impact of Windows 7 security features

• Typical attack vector involves online exploitationexploitation

• The con artist of the malcode world

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 11

Page 12: Windows 7 impact upon rogue

$59.95 to ease your pain…$ y p

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 12

Page 13: Windows 7 impact upon rogue

Success by Accidenty

• Rogue AV does not typically need extensiveRogue AV does not typically need extensive control or rights

• Many are unintentionally successful…

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 13

Page 14: Windows 7 impact upon rogue

…Many are noty

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 14

Page 15: Windows 7 impact upon rogue

Trojansj

• Often a secondary payloadOften a secondary payload

• Extremely varied, but usually designed to control and/or glean data • Via: Keylogging, DDoS, form injection, webcam y gg g, , j ,control, and more

• Not more malicious than Rogue AV but• Not more malicious than Rogue AV but typically more harmful and difficult to remove

• Typically need admin access

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 15

Page 16: Windows 7 impact upon rogue

Antivirus 2010 ‐ Faked a "Blue Screen of Death" and restart, but was detected by Windows Defender following the fake restartwas detected by Windows Defender following the fake restart

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 16

Page 17: Windows 7 impact upon rogue

ByteDefender – Generated a UAC prompt and then, even when allowed to run with full admin rights failed to install altogetherallowed to run with full admin rights, failed to install altogether.

FAILFAILFAILFAIL

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 17

Page 18: Windows 7 impact upon rogue

Rogue Test Resultsg

Rogue Anti‐virusogue t usMalcode Result of Installation AttemptsAKM Antivirus 2010 Success: Installed with full functionalityyAntivirus Pro Failed: Triggered UAC prompt.Antivirus 2010 Partial: Ran initial scare tactics; failed to install.;Antivirus 7 Failed: Triggered UAC and installation failed.ByteDefender Failed: Triggered UAC and installation failed.y ggDigital Protection Partial: Ran initial scare tactics; failed to install.Rapid Antivirus Partial: Ran initial scare tactics; failed to install.Security Tool Success: Installed with full functionalityWinPC Antivirus Failed: Triggered Windows Defender

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 18

Page 19: Windows 7 impact upon rogue

Zeus – The gold standard of banking Trojans in the underground– Thwarted initially….Thwarted initially….

…but then adapted

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 19

Page 20: Windows 7 impact upon rogue

Trojan Test Resultsj

Other MalcodeOt e a codeCode ResultBebloh  Failed: Unable to inject into csrss.exe.j

Gumblar  Failed: Unable to access system32 ‐ UAC protectedMebroot  Failed: Unable to access MBR

Poison Ivy  Failed: Assumed kernel32.dll to be first DLL in listTDL3  Failed: Unable to access system32 ‐ UAC protectedy pSpy‐Net  Success: Installed with full functionality.SpyEye Success: Installed with full functionality.Zeus  Success: Installed with full functionality. Adapted

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 20

Page 21: Windows 7 impact upon rogue

Interest in the Undergroundg

• Common questions Easily answeredCommon questions, Easily answered

• Actors adapt: Following the money

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 21

Page 22: Windows 7 impact upon rogue

Key Takeawaysy y

• Rogue AV: From accidental success to trendsetterRogue AV: From accidental success to trendsetter

• Kernel level access difficult to obtain

• Zeus: A microcosm of the Malcode community

• UAC is a big step in the right directiong p g

• Additional defenses are recommendedD t E ti P ti (DEP)– Data Execution Prevention (DEP)

– Network level filtering

– Patching

– Traditional AV

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 22

Page 23: Windows 7 impact upon rogue

Questions?

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 23