Malware Types #
Understand what differentiates them
Ransomware - Take over computer and demand ransom #
- Crypto - Encrypts files and holds those hostage until payment made
- Threaten to report the user un return for money.
- Delivery Methods - Often via phising, Remote Desktop Protocal, etc..
- Indicators Of Compromise (IoCs)
- Command & Control (C&C) traffic to known malicious IP addresses.
- Use of legitmate tools in abnormal ways to retain control of compromised system.
- Lateral movement processes that seek to attack/gain info about other systems in same trust boundary.
- Encryption of files
- Data exfiltration behaviors
- Notices to end user of the encryptoion process with demands for ransom
- Defense - Effective backup system in another location
Trojans - Software often disguised as legitimate software, require user action #
- Rely on unexpected victims to run them
- Sometimes further content is downloaded to extend the malicious code
- Connects to a control server and then waits for instructions, allows for local instructions and such
- Example: Triada Trojan which was a enhanced version of Whatsapp
- RAT: Remote Access Trojans - give attackers with remote access to systems
- Indicators Of Compromise (IoCs)
- Signatures for specifc applications and downloadable files
- Command and control system hostnames and IP addresses
- Folders or files created on target devices
- Frequently connecting to changing remote unknown hosts
- Defense
- Awareness training
- Control software that (can) be installed
- Verify hashes
- Anti-malware
- Endpoint detection and Response (EDR)
Worms - Spread themselves #
- Spread via vulnerable services, email attachments, network file share, IoT, phones, …
- They self install
- Example: Stuxnet
- Indicators Of Compromise (IoCs)
- Known malicious files
- Download of additional components from remote systems
- Command and control contact to remote systems
- Malicious behaviors using system commadns for injection and other activies
- Hands-on-keyboard attacker activity
- Defense
- Pre infection
- Network-level controls
- Fire-walls
- Network segmentation
- Post infection
- antimalware
- EDR
- Reset hardware
- Pre infection
Spyware - designed to obtain information about individual/organization/system #
- Track installed software, browsing behavior, web camers, … and report back to central server.
- Stalkerware -> for monitor partners in relationship
- It looks like many other malicious code, so the key is the “INTENT” of it’s usage.
- Defense
- Antimalware
- User awareness
- Control software that (can) be installed
- Indicators Of Compromise (IoCs)
- Remove-access and remote-control-related indicators
- Known software file fingerprints
- Malicious processes, often disguised as system processes
- Injection attack against browsers
Bloatware - Preinstalled applications (that you don’t want), just unwanted #
- Usually not intentionally malicious
- May call home with information about your system and expose a vulnerbability to be exploited
- Defense
- Uninstall
- Clean OS image
- No IoCs
Viruses - self-copy and self-replicate, but don’t spread via vulnerable services and networks (unlike worms) #
- Require user action to spread, only runs when infected file is run
- Usually have a trigger that decides when a virus will execute and a payload (what it will do)
- Fileless virus - Shell code that runs command line and script to run malicious code and it will redo that after reboot, while booted, lives in memory often.
- Defense
- Network controls
- Intrusion Prevention Systems (IPS)
- Indicators Of Compromise (IoCs)
- See threat feeds
- User awareness
- Antimalware
- Best: Wipe it, and restart from clean image or safe backip
Keyloggers - Captures keystrokes from keyboard (and mouse, credit swipes, and any other input) #
- Goal is for the attack to analyze these inputs
- Exists as Sofware and hardware
- Defenses
- Usere Awareness
- antimalware
- Patching and updates
- Indicators Of Compromise (IoCs)
- File hashes and signatures
- Extrafiltration activity to command and control systems
- Process banes
- Known reference URLS
Logic Bombs - Functions or code placed inside other programs that will activate when set conditions #
- Either by insider or by OSS supply chain hack
- Once it triggers, payload executes, so activites/actions happen then.
- No IoC as it’s in the code
- Doesn’t care to replicate
- Defenses
- Code reviews & Integrity checks
- File integrity
Rootkits - specificly designed for attackers to get a backdoor to the root of a system #
Many have capabilities to hide , they use various layers to make them “not appear to be there”.
Persistent, stealth access is the goal
Defenses
- Clean rebuilt or trustworthy backup
- Good security practices, patching, …
- Secure Boot
- Remove the HDD and connect to other system without booting from that HDD, now no code will trigger.
Indicators Of Compromise (IoCs)
- Files hashes and signatures
- Command and control domains, IP addrewss and systems
- Behavior based identification like creation of services, executables, configuration changes, file access and command invocation
- Opening ports or creation of reverse proxy tunnels
Notes
Different vendors might name the same malware different which makes it difficult
Remote access is usually via a backdoor, rootkit