SlideShare ist ein Scribd-Unternehmen logo
1 von 40
Downloaden Sie, um offline zu lesen
Threat
  Report
  H2 2012




Protecting the irreplaceable | www.f-secure.com
F-Secure Labs
At the F-Secure Response Labs in Helsinki, Finland,
and Kuala Lumpur, Malaysia, security experts work
     around the clock to ensure our customers are
          protected from the latest online threats.

    At any given moment, F-Secure Response Labs
 staff is on top of the worldwide security situation,
ensuring that sudden virus and malware outbreaks        Protection around the clock
             are dealt with promptly and effectively.
                                                        Response Labs’ work is assisted by a host of
                                                        automatic systems that track worldwide threat
                                                        occurences in real time, collecting and analyzing
                                                        hundreds of thousands of data samples per day.
                                                        Criminals who make use of virus and malware to
                                                        profit from these attacks are constantly at work
                                                        on new threats. This situation demands around
                                                        the clock vigilance on our part to ensure that our
                                                        customers are protected.
foreword

Today, the most common way of getting hit by malware is by browsing the
Web. It hasn’t always been this way. Years ago, floppy disks were the main
malware vector. Then sharing of executable files. Then e-mail attachments.
But for the past five years, the Web has been the main source of malware.

The Web is the problem largely because of Exploit Kits. Kits such as
BlackHole, Cool Exploit, Eleanore, Incognito, Yes or Crimepack automate
the process of infecting computers via exploits.

There is no exploit without a vulnerability. Ultimately, vulnerabilities are
just bugs, that is, programming errors. We have bugs because programs
are written by human beings, and human beings make mistakes. Software
bugs have been a problem for as longs as we have had programmable
computers—and they are not going to disappear.

Bugs were not very critical until access to the Internet became widespread.
Before, you could have been working on a word processor and opening a                                Mikko HyppÖnen
corrupted document file, and as a result, your word processor would have crashed.             Chief Research Officer
Even if annoying, such a crash would not have been too big of a deal. You might have
lost any unsaved work in open documents, but that would have been it.

However, things changed as soon as the Internet entered the picture. Suddenly, bugs
that used to be just a nuisance could be used to take over your computer.

Yet, even the most serious vulnerabilities are worthless for the attacker, if they get
patched. Therefore, the most valuable exploits are targeting vulnerabilities that are
not known to the vendor behind the exploited product. This means that the vendor
cannot fix the bug and issue a security patch to close the hole.

              Software bugs have been a problem for as longs as we have had
              programmable computers—and they are not going to disappear.

If a security patch is available and the vulnerability starts to get exploited by the
attackers five days after the patch came out, the users have had five days to react. If
there is no patch available, the users have no time at all to secure themselves; literally,
zero days. This is where the term ‘Zero Day Vulnerability’ comes from: users are
vulnerable, even if they have applied all possible patches.

One of the key security mechanisms continues to be patching. Make sure all your
systems are always fully up-to-date. This drastically reduces the risk of getting
infected. But for Zero Day vulnerabilities, there are no patches available. However,
antivirus products can help against even them.

We’re in a constant race against the attackers. And this race isn’t going to be over any
time soon.




FOREWORD                                                                                                               3
Executive Summary
executive summary
Three things visibly stand out in this past half year: botnets (with special reference to
ZeroAcess), exploits (particularly against the Java development platform) and banking trojans
(Zeus).

ZeroAccess was easily the most prevalent botnet we saw in 2012, with infections most visible in
France, United States and Sweden. It is also one of the most actively developed and perhaps
the most profitable botnet of last year. In this report, we go through the distribution methods
and payment schemes of ZeroAccess’s ‘affiliate program’, as well as its two main profit-
generating activities: click fraud and BitCoin mining. Aside from ZeroAccess, other notable
botnets of 2012 are Zeus, Carberp, Dorkbot and SpamSoldier (a mobile botnet).

Java was the main target for most of the exploit-based attacks we saw during the past half
year. This is aptly demonstrated in the statistics for the top 10 most prevalent detections
recorded by our cloud lookup systems, in which the combined total of detections for the Java-
specific CVE-2012-4681 and CVE-2012-5076 vulnerabilities and the Majava generic detections,
which also identify samples that exploit Java-related vulnerabilities, account for one third of
the samples identified during this period. Exploit kits plays a big role in this prevalence. In
addition, exploits against other programs such as the PDF document reader (CVE-2010-0188)
or Windows TrueType font (CVE-2011-3402) made notable impacts in H2 2012, as detailed
further in this report.

With regards to banking-trojans, a botnet known as Zeus—which is also the name for the
malware used to infect the user’s machines—is the main story for 2012. Analysis of the
geography for Zeus’s infection distribution highlights the United States, Italy and Germany as
the most affected countries. In addition to its banking-trojan capabilities, the Zeus malware
also functions as a backdoor, allowing it to be directly controlled from the botnet’s command
and control (C&C) servers. An examination of the different sets of backdoor commands used
by Zeus derivatives (known as Citadel and Ice IX) gives more detail of what other malicious
actions this malware can perform.

In terms of online security, we look at the more ambiguous side of the ever-growing popularity
of website hosting, and how its increasingly affordable and user-friendly nature also makes it
well suited to supporting malware hosting and malvertising.

We also take a look at multi-platform attacks, in which a coordinated attack campaign is
launched against multiple platforms (both desktop and mobile), often with multiple malware.

And finally on the mobile scene, the Android and Symbian platforms continue to be the main
focus of threats, accounting for 79% and 19%, respectively, of all new mobile malware variants
identified in 2012.




executive summary                                                                                 4
Contents
This Threat Report highlights trends and new developments seen in the malware threat landscape by analysts
in F-Secure Labs during the second half of 2012. Also included are case studies covering selected noteworthy,
highly-prevalent threats from this period.




              contributing            foreword3
                  AUTHORS
              Broderick Aquilino
                                      Executive Summary                                                   4
                Karmina Aquino        Contents5
              Christine Bejerasco
              Edilberto Cajucom       Incidents Calendar                                                  6
                     Su Gim Goh
                                      In Review                                                           7
                      Alia Hilyati
                 Timo Hirvonen        Of Note                                                            10
               Mikko Hypponen                 the password                                                11
                Sarah Jamaludin
                                              COrporate espionage                                        12
                  Jarno Niemela
                Mikko Suominen        Case Studies                                                       14
                   Chin Yick Low
                                              BotS15
                    Sean Sullivan
                                              ZeRoAccess17
                    Marko Thure
                  Juha Ylipekkala             Zeus21
                                              Exploits25
                                              Web28
                                              Multi-Platform attacks                                     32
                                              Mobile35
                                      Sources38




contents                                                                                                   5
Incidents Calendar
H2 2012 incidents calendar (July-December)*

 jul                 Aug                SEPT                   OCT                  NOV                  DEC


       FBI support for                           Out-of-band Patch Friday                 Syrian Internet,mobile
       DNSChanger ended                                                                   connections cut off
                                                 Imuler.B backdoor found on OS X
          Multi-platform Intel/OS X
          backdoor found                         Malware signed                               Berlin poice warned of
                                                 with Adobe certificate                       Android banking trojans
          Commercial multi-platform
          surveillance tools found
                                                     Samsung TouchWiz exploit                     Cool Exploit kit
              Iran-targeted malware                  reported                                     rivalling Blackhole
              reported
                                                                                                      New Mac Revir threat
                   Indian government email                                                            found
                   accounts hacked
                                                                                                      New Linux rootkit found



  Gauss threat targeted                                                            Dexter malware hit point
  the London Olympics                        Huawei controversy in US Congress               of sales (POS)

                                                   ITU Telecom World ‘12 raised        Australian hospital’s
   Blackhole updated faster                     Internet/government concerns            records ransomed
         than flaws patched

        Java update closed 3                                                         Mac threat found on Dalai
              vulnerabilities                                                             Lama-related webite


  Matt Honan ‘hack’ highlighted                                                           One rogue ad hits Finnish
       flaws in accounts systems                                                                       web traffic

                                                                                                 Eurograbber attack on
                                                                                              European banks reported
                                                                                               Samsung Exynos exploit
                                                                                                            reported
   Online
   In the news
   PC threats
   Mobile threats
   Hacktivism  espionage                                                                                 Sources: See page 38.




incidents calendar                                                                                                           6
In Review
changes in the threat landscape
Unlike the first half of 2012, the second half of the year saw no major malware outbreaks
on any platform. Instead, a handful of incidents took place during this time period, most of
which were notable as indications of how inventive the attackers have been in finding ways
to compromise a user’s machine, data or money. These incidents included the hack into the
Wired Matt Honan’s Gmail and Apple accounts, which exposed loopholes in those account
systems; the Adobe-certified malware episode, in which attackers went to the extent of
stealing Adobe’s digital certificate in order to sign malware used in targeted attacks; and the
Eurograbber attack, in which a variant of the Zeus crimeware was reportedly used to steal
money from various corporations and banks in Europe.

An interesting development in 2012 has been the increasing public awareness of cyber-security
and the various implications of being vulnerable to attack over a borderless Internet. News
reports of alleged online or malware-based attacks against Iranian facilities drew attention
to state-sponsored cyber-attacks. A conference gathering the various telecommunications
entities to discuss basic infrastructure issues raised concerns about Internet governance, and
the role of governments in it. The past year also saw US politicians, not generally considered
the most tech-savvy of users, raise concerns over perceived reliance on IT solutions for
sensitive government systems being provided by foreign corporations seen as potentially
unreliable. Though it is probably a positive development that more people are becoming
exposed to topics that have long been considered irrelevant or academic, only time will tell
what will result from the increased awareness.

Rather than a single major event, perhaps the most noteworthy aspect of H2 2012 is the way
that the various trends we saw emerging in the first two quarters of the year have continued to
grow apace—that is, the growth of botnets, the ‘standardization’ of vulnerability exploitation
and the increasing ‘establishment’ of exploit kits.

When it comes to botnets, the news has been mixed at best. The last few years have seen
concerted efforts by players from different fields—telecommunications, information security
and even government organizations—to take down or at least hamper the activities of various
botnets, which have compromised millions of user’s computers and been used to perform
such activities as monetary fraud and online hacking. These combined efforts resulted in
totally shuttering, or at least seriously hampering, major botnets such as Rustock, Zeus and
DNSChanger.

Unfortunately, despite these commendable efforts, the botnets have been regularly
resurrecting, often with new strategies or mechanisms for garnering profit. In addition,
the operators running these botnets have been aggressively marketing their ‘products’ to
other hackers and malware distributors. Their efforts include offering affiliate programs with
attractive ‘pay-per-installation’ rates and ‘rent-a-botnet’ schemes that allow attackers to use
the combined power of the infected hosts to perform attacks or other nefarious activities.
These sophisticated business tactics have garnered significant returns. In some cases, such as
ZeroAccess, the reborn botnets have grown to count millions of infected hosts. See the cases
studies Bots (pg. 15), ZeroAccess (pg. 17) and Zeus (pg. 21) for more information on botnets.

Another change we saw last year was the increasing use of vulnerability exploitation, often
in tandem with established social engineering tactics. Unlike previous years, when most of
the infections we saw involved trojans, 2012 was definitely the year of the exploit, as exploit-




In review                                                                                          7
Top 10 detections in H2 2012,
                                                         top countries*

         ZeroAccess      27%                                   FR                us          se dk                     others

              Majava      26%                               US          fr             fi         se                   others

         Downadup                      11%                         br                 fr my it                         others

          BlackHole                      9%                       fr             fi     se        nl                   others

     CVE-2012-4681                          6%               us             se              fr     de                  others

     CVE-2011-3402                          6%                fr                 se          nl        fi              others

     CVE-2010-0188                           6%              fr              se             fi         nl              others

     CVE-2012-5076                             3%                 fi             us          fr         se             others

        PDF Exploits                           3%            fi         fr             se         de                   others

             Sinowal                           3%                      nl                         se         fi        others
                                                                                                                                      %
                                                        0                   25                    50              75            100


*Based on statistics from F-Secure’s cloud lookup systems from July to December 2012.



                                                  related detections accounted for approximately 28% of all detections F-Secure’s cloud
                                                  lookup systems saw in H2 2012. In addition, malware designed to exploit vulnerabilities
                                                  related to the Java development platform made up about 68% of all exploit-related
                                                  detections recorded by our systems in the second half of last year.

                                                  If we look at the list of Top 10 Detections (above) seen by our cloud lookup systems in
                                                  H2 2012 in more detail, two detections which specifically identify samples exploiting
                                                  the Java-specific CVE-2012-4681 and CVE-2012-5076 vulnerabilities alone account for
                                                  9% of the malware identified by the top 10 detections. In addition, the Majava generic
                                                  detections, which identify samples that exploit known vulnerabilities, including the
                                                  Java-specific CVE-2012-0507 and CVE-2012-1723 vulnerabilities, account for another
                                                  26% of the top 10 detections, as well as having the dubious honor of being the second
                                                  most common detection overall reported by our backend systems. The sheer volume
                                                  of Java-related detections indicate both the widespread popularity of that platform
                                                  and its susceptibility to the malicious inventiveness of malware authors.

                                                  Interestingly enough, when considering exploit attacks in general, though we saw
                                                  attacks exploiting numerous vulnerabilities in multiple platforms and programs in
                                                  2012, the vast majority of the cases were related to only four vulnerabilities—CVE-
                                                  2011-3402 and CVE-2010-0188, which are Windows-related vulnerabiltiies, and the
                                                  previously mentioned Java vulnerabilities, CVE-2012-4681 and CVE-2012-5076. All of
                                                  these vulnerabilities, incidentally, have already had security patches released by their
                                                  relevant vendors.




in review                                                                                                                                 8
This skewed preference in attack targeting can be directly attributed to the popular usage of
exploit kits such as Blackhole and Cool Exploit, which have incorporated the exploits for these
vulnerabilities, in some cases faster than the vendors were able to patch them. It’s perhaps not
too surprising then that BlackHole-related detections account for 9% of all samples detected
by the top 10 detections of H2 2012. For more information on these exploits, see the Exploits
case study on page 25.

And as a closing note, a quick look at our detection statistics for Mac indicates that even
though Windows machines continues to be the main target for attacks, the Mac platform
is increasingly coming in for a share of unwanted attention. Apart from the major Flashback
outbreak in early 2012, we saw a slow but steady increase in malware on the Mac platform,
as we detected 121 new, unique variants in all of 2012, the majority of them backdoors. By
contrast, in 2011, we recorded only 59 new unique variants discovered on that platform.




                              85 +4+4+7+z
                     Mac Malware by type, Jan - Dec 2012




                                              Total=
                                            121 variants*




                        Backdoor, 85%                         Others 4%
                                                       Rogue, 4%
                                              Trojan, 7%


           *The total is counted based on unique variants detected from Jan to Dec
           2012, rather than total file count. Riskware and repackaged installers are not
           counted; multi-component malware are only counted once.




in review                                                                                          9
Of Note




the Password          11
COrporate espionage   12
Password
the password                                                                                     dead man walking

Computer passwords are something like fifty years old. And                  Determine which accounts that are your critical points of
until a little over twenty years ago, they were very often a shared         failure, and make sure they are all well defended. Two factor
resource where multiple people used the same password (or                   authentication is good, but even that is not a bulletproof
set of passwords) for access to computer systems. The use of                solution. It is important to use every option available.
individual passwords was actually something of an innovation
at the time.                                                                For example, Google’s Gmail allows users to create their own
                                                                            security question for password resets. There is absolutely no
Then came the World Wide Web, and with it, the ever growing                 reason why this question needs to be based on reality. It can
need for more and more account passwords. As time has                       just as easily be another “password”. One which is written
passed and our online lives have grown, it is now not at all                down and stored safely at home, where only you have access
uncommon for people to have dozens of passwords to keep                     to it.
track of. And what’s worse is that all of those passwords should
be “strong” passwords and people shouldn’t reuse them                       And if you are a parent of teenage children… you really should
between accounts. It’s too much!                                            have “the talk” with them about their use of passwords. The
                                                                            habits they form now will have a big impact on their future
The second half of 2012 provided more than enough evidence                  online lives.
to demonstrate the problem of passwords. Hacks, breaches,
database dumps—these are terms that average individuals                     Hopefully, one day soon, a true successor will rise to take the
(not just techies) are now familiar with. With today’s processing           password’s place and we will all be able to let the password
power, passwords that are strong enough to withstand brute                  die a dignified death. Unfortunately, we are more likely to
force attacks are too difficult for the human brain to remember.            experience fits and starts towards a new solution. Prepare
                                                                            yourself now, 2013 isn’t going to be kind for those who are
Even if the passwords are strong, our systems of authenticating             unprepared.
account resets are flawed. A strong password is useless if social
engineering tactics can be used to reset those passwords.

The password is dead and we all know it. But unfortunately,
its successor has yet to turn up. So what’s to be done in the
meantime? Triage.

•	   Use a password manager such as KeePass or Password                     Recommended Reading
     Safe
•	   Kill old accounts that you no longer use                                  •	 Hacked: passwords have failed and it’s time
•	   Untangle cross-linked accounts                                               for something new[1]
•	   Consider using a “secret” email address for account                           Matt Honan discusses the account hack that disrupted his
     maintenance                                                                   digital life and its implications for online security
•	   Be careful about what you share on social media. If
     you share, don’t rely on personal information for your
                                                                               •	 Google declares war on the password[2]
     account password resets
                                                                                   Find out more about Google’s experiment with device-based
•	   Use two-factor authentication options if available
                                                                                   account authentication




SOURCES
[1] Wired; Matt Honan; Hacked: passwords have failed and it’s time for something new; published 17Jan 2013;
http://www.wired.co.uk/magazine/archive/2013/01/features/hacked?page=all
[2] Wired; Robert McMillan; Google declares war on the password; published 18 Jan 2013;
http://www.wired.com/wiredenterprise/2013/01/google-password/


Password                                                                                                                                11
COrporate of the ‘watering hole’ attack
             rise
                  espionage




                                                                                                                                               Espionage
     In Q4 2012, we watched the nature of corporate espionage            Numerous examples of corporate espionage attacks have
     attacks change. Before, almost all recorded corporate               been reported in the F-Secure Weblog over the years, many of
     espionage cases were based on using specially crafted               them involving poisoned e-mail file attachments sent directly
     documents containing exploits and a malware payload. Now,           to the targeted organizations.
     spies have started to leverage vulnerabilities in web browsers
     and browser plugins to achieve their aims in so-called         These attacks contrast sharply with the most recent case of a
     ‘watering hole’ attacks.                                       watering hole attack—the 21st December 2012 compromise of
                                                                    the Council of Foreign Relations (CFR) website[1]. In this attack,
   ‘Watering hole’ attacks are called such because instead of       the website was injected with a previously unknown exploit
   compromising a random website and infecting anyone who           that affected versions 6, 7 and 8 of the Internet Explorer (IE)
   happens to visit the site, the attackers are more discriminating web browser. Compromising the website itself was not the
                                                                                         attacker’s final objective; it was merely
“Cross-referencing this list [of known attack domains] used as which naturally include members
                                                                                         visitors,
                                                                                                   a conduit to infect the website’s

against the Alexa.com’s list of 1 million most common of the CSR itself. And considering that CSR
domains showed that 99.6% of these potential CC sites counts among its members both current
                                                                                         and former US political elite and the
were outside of Alexa’s top domains.”                                                    founders of multinational companies, the
                                                                                         list of potential targets is very interesting.
   in both the users being targeted and the site used as the
   infection vector. The attackers specifically attack a site       The rise of web-based attacks in corporate espionage raises
   which is commonly used by employees of the actual target         two points: first, this trend means that any corporation with
   organization. When these employees visit the compromised         an online presence that serves such potentially ‘interesting‘
   site, their browser or computer is then attacked, typically by   targets may be at risk of unwittingly serving as an attack
   exploiting a vulnerability that allows trojans or backdoors to   conduit, and secondly; obviously, such organizations must
   be installed on the machine. From that point on, the installed   now find a way to mitigate such a risk, in order to protect
   malware becomes the gateway for attackers to reach their real    themselves and their clients.
   target: the internal network and/or communications of the
   compromised employee’s companies.



                                                                                              Figure 1: Screenshots of an e-mail and
                                                                                        malicious file attachment used in a targeted attack




     Corporate espionage                                                                                                                  12
How a ‘watering hole’ attack works




                                                                                                                                               Espionage
                                                                                  Targeted
                                                                                 Organization




                                                     www




                                  Exploit kit         www


                                                                                    Compromised
                     Attacker              Attacker gains access to                   computer
                                           compromised computer



For companies with online resources that may be vulnerable                 A second, very effective method of ruining the spy’s day is to
to ‘watering hole’ attacks, it is very important to invest in web          use DNS whitelisting in the company‘s DNS server so that only
and server security. Performing regular audits to verify that              specific, approved public sites can be accessed on the user’s
your web server is serving only what it should is also highly              machine. This precaution directly interferes with the spy’s
recommended.                                                               ability to communicate with its installed trojan(s), as well as
                                                                           helping to prevent information stolen from the machine being
Defending against watering hole attacks does not require                   sent out to the attacker’s command and control (CC) server.
anything new that should not already be in place to protect
against more mundane web attacks which target zero day                     Done right, this method also has the advantage of not
vulnerabilities, thereby circumventing detection-based                     interfering with the way most users work or browse the
security coverage. A corporate security suite with behavioral              Internet. At F-Secure, we maintain a list of known attack
based detection should of course be a part of the protection               domains potentially associated with corporate espionage.
solution, as it can still provide a measure of protection by               Cross-referencing this list against Alexa.com’s list of 1 million
actively looking for and red-flagging suspicious behavior,                 most common domains showed that 99.6% of these potential
rather than static reliance on known features to identify a                CC sites were outside of Alexa’s top domains.
malicious file.
                                                                           So if your organization is in possession of information that
But when we consider dealing with advanced and persistent                  might be interesting to other companies, we recommend
attackers, one layer of protection is not enough. At a                     a custom DNS whitelisting solution that is relaxed enough
minimum, corporate users should use Microsoft’s free Exploit               to allow your users to work, but still strict enough to block
Mitigation Toolkit (EMET) to harden their system’s memory                  unknown domains. And while attackers can use CC channels
handling for client applications such as web browsers, web                 that are trickier to block, such as Twitter or Facebook, this
browser plugins and document readers.                                      simple precaution does make it more difficult for attackers to
                                                                           operate.




SOURCE
[1] The Washington Free Beacon; Chinese Hackers Suspected in Cyber Attack on Council on Foreign Relations; published 27 Dec. 2012;
http://freebeacon.com/chinese-hackers-suspected-in-cyberattack-on-council-on-foreign-relations/


Corporate espionage                                                                                                                      13
Case Studies




BotS15
ZeRoAccess17
Zeus21
Exploits25
Web28
Multi-Platform attacks       32
Mobile35
BotS                                                                        The world of bots in 2012

In the last few years, concerted efforts by various parties to take down or hamstring the operation of botnets, which were costing
millions of users control of their machines, their data and/or their money. In 2012 however, we saw the resurrection of many of
these botnets, often in a more aggressive form and with new malicious products, updated ‘packaging’ or marketing and distribution
strategies and more efficient money-making mechanisms.



ZeroAccess




                                                                                                                                                      Bots
Of all the botnets we saw this year, definitely the fastest
growing one was ZeroAccess, which racked up millions of
infections globally in 2012, with up to 140,000 unique IPs in the
US and Europe, as seen on the infection map at right [27].

The actual malware that turns a users’s computers into a
bot is typically served by malicious sites which the user is
tricked into visiting The malicious site contains an exploit kit,
usually Blackhole, which targets vulnerabilities on the user’s
machine while they’re visiting the site. Once the machine is
compromised, the kit drops the malware, which then turns the
computer into a ZeroAccess bot.

The bot then retrieves a new list of advertisements from                  Figure 1: Google Earth map of ZeroAccess infections in the US [1].
                                                                     Red markers indicate an infected unique IP address or cluster of IP addresses.
ZeroAccess’s command and control (CC) server every day.
The ZeroAccess botnet reportedly clicks 140 million ads a day.
As this is essentially click fraud, it has been estimated that the      900 ZeuS CC servers around the world. This number may
botnet is costing up to USD 900,000 of daily revenue loss to            not be truly reflective of the botnet’s size, as the latest version
legitimate online advertisers. Click fraud has been on the rise         of Zeus includes a peer to peers protocol that maintains
as the online advertisement vendors realistically have no way           communication within the botnet itself, allowing a bot to fetch
to differentiate between a legitimate click and a fraudulent            configuration files and update from other infected hosts in the
one.                                                                    botnet. This feature was dubbed “Gameover” and removes the
                                                                        need for a centralized CC infrastructure, making it harder for
Another revenue source for ZeroAccess is its ability to mine for        security researchers to track the botnet.
Bitcoin, a virtual currency that is managed in a peer-to-peer
(P2P) infrastructure. Bitcoin miners harness the computational          Apart from the introduction of the Gameover feature, the main
power from the bots to perform complex calculations to find             change with Zeus has been tweaks done to make the malware
a missing block to verify Bitcoin transactions, and that would          more user-friendly, in effect making it an attractive resource
reward them in more Bitcoin currency that is agreed within              even for wannabe attackers with low technical capabilities.
the same peer to peer network, and these can be converted               With its fancy control and administration panel, well
to cash. More than half of the botnet is dedicated to mining            documented manual and a builder, Zeus allows both amateur
Bitcoin for profit. Further details of ZeroAccess’s profit-             and expert attackers to craft, design and build executables to
generating activities can be found in the case study on page 17.        infect the victim computers in a very short amount of time.

                                                                        Citadel, the third derivative of Zeus, sets itself apart by
Zeus                                                                    enabling a more rapid deployment of new features and
Moving on, Zeus (and its rival cum partner, SpyEye) are                 customization through an enhanced user interface, again with
perhaps still the most talked about banking-trojans in 2012.            the aim of helping novice hackers get in the game of deploying
Zeus has been referred to as “the God of Do-it-Yourself                 their crimeware. This “dynamic config” functionality allows
botnets”. Despite various takedown efforts, as of the end of            botmasters to create web injections on the fly, a vital ability
December 2012, The ZeuS Tracker project has seen almost                 in today’s online crime landscape as bots are also taken down




Bots                                                                                                                                       15
quickly. The most important feature for Citadel however is the               The Carberp-infected mobile app is distributed on the Android
availability of a “Customer Relationship Management” system                  platform, with most of the targeted users being customers of
through the use of a social network platform to support                      European and Russian banks. As online banking continues
reporting and fixing bugs. This kit is definitely professional               to rise in many countries, making such online transactions
grade, and we expect to see a continuous rise in infections by               attractive targets to cybercriminals, banking-related botnets
Citadel in the near future.                                                  such as Carberp are expected to continue growing in 2013.


Carberp                                                                      DorkBot
Following the success of the Zeus and Spyeye, Carberp is most                Then there is DorkBot, which was discovered spreading
notable for making a comeback with a tweaked product and                     through Skype in October 2012. The malware steals user
‘marketing’ approach. First appearing in 2011 a regular data-                account and passwords from FaceBook, Twitter, Netflix and




                                                                                                                                                  Bots
stealing banking malware, Carberp’s spread was temporarily                   various Instant Messaging (IM) channels. From an infected
hampered by a takedown effort from Russian agencies in early                 social networking account, DorkBot sent out images to the
2012. Unfortunately, in December this botnet was discovered                  users’ contacts list asking the contacts if the attached image
to have resurrected with a new ability to infect a computer’s                was their profile pic. Falling for this cliched social engineering
boot record, a component that launches even before the main                  tactic resulted in an executable installing a backdoor and the
operating system (OS) starts, making any malware in the boot                 DorkBot worm on the user’s machine, which was then enrolled
record harder to detect and remove.                                          in a botnet.

Carberp’s authors or operators also changed the way the                      Unlike previously mentioned botnets, DorkBot makes its
malware was distributed in order to attract more usage from                  profit through ransom—literally by locking down the victim’s
other malware distributors. Carberp was previously only                      computer, allegedly for the presence of ‘illegal content’ such
available as a standalone malware through private underground                as pornography or pirated music. It then demands a ‘fine’
marketplaces. Since its resurrection, Carberp has pursued a                  of $200 to be paid within 48 hours, failing which the victims
new “malware-as-a-service” model that allows users to lease                  would be ‘reported to a government enforcement agency’
use of the botnet itself for prices ranging from USD 2000 to                 for further prosecution. DorkBot is also capable of making
up to USD 10,000 a month. In addition, the buyer is offered a                more money out of its infected hosts by using their combined
choice of botnet configurations. The priciest format includes                power to perpetrate click fraud, which incidentally creates an
the bootkit functionality, which has boosted its market price                attractive revenue source for the authors.
to about USD 40,000. Though the prices may seem steep,
this rental scheme appears to be particularly attractive to less
tech-savvy users who simply want a means to an end - that is,                Mobile botnets
to install more trojans on more victim machines.
                                                                             And finally, though it is still at an embryonic stage in
                                                                             comparison, we are also seeing botnets operating on the
Carberp has also spread to the mobile platform in the form
                                                                             mobile platform, specifically Android. These mobile botnets
of man in the mobile attacks. For a Carberp-in-the-mobile
                                                                             do exactly what botnets did when they first appeared on
(CitMo) attack to work, the user must have both a mobile
                                                                             computers - that is, generate spam.
app and a computer infected with the desktop version of
the Carberp malware. Once the mobile app is installed, it is
                                                                             The SpamSoldier malware sends SMS messages to a hundred
able to intercept SMS messages containing mTAN’s (mobile
                                                                             Android devices (in the US) at a time. The sender has no
Transaction Authorization Numbers), which are sent by
                                                                             idea of this activity, as the sent SMS messages are deleted
banks as an authentication measure used to validate online
                                                                             immediately once sent, making the sky high phone bills that
transactions performed by the user. The intercepted mTAN
                                                                             result an unpleasant surprise. These spam messages may also
is then forwarded to a remote server, from which it is later
                                                                             contain social engineering content, including links that lead to
retrieved and used by the Carberp trojan installed on the same
                                                                             other malware, therefore compounding the malicious effect
user’s computer in order to gain access to the user’s banking
                                                                             of these spambots.
account.




SOURCE
[1] F-Secure Weblog; Sean Sullivan; The United States of ZeroAccess; published 20 Sept. 2012;
http://www.f-secure.com/weblog/archives/00002430.html


Bots                                                                                                                                        16
ZeRoAccess botnet malware in the wild
   The most profitable

ZeroAccess is one of today’s most notable botnets. It was first discovered by researchers back in 2010, when it drew a lot of attention
for its capability for terminating all processes related to security tools, including those belonging to anti-virus products. When too
many researchers focused on this self-protection capability however, ZeroAccess’ author decided to drop the feature and focus
more on improving its custom peer-to-peer (P2P) network protocol, which is unique to ZeroAccess. After the change[1] , ZeroAccess
became easier to spot by anti-virus products, yet it continued to spread like wildfire around the world due to the improved P2P
technique[2]. This success can be largely attributed to its affiliate program.



Affiliate program: ZeroAccess success story
Affiliate programs are a well-known marketing strategy and               The variety of distribution schemes and methods used by the
are widely used by many e-commerce websites[3]. Essentially,             numerous affiliates have contributed to the volume of trojan-
a business owner with an e-commerce site to promote                      dropper variants detected by antivirus products every day.
commissions other site owners to help drive customers to                 All driven by the same motive which is to collect attractive




                                                                                                                                                  ZeroAccess
it (and hopefully eventually make a purchase). The website               revenue share from the gang.
owners are then compensated for providing these customer
leads.




                                   Figure 1: A botnet operator seeking partners in an underground forum


Adopting this concept, ZeroAccess’s author or operator(s)                Methods used by ZeroAccess distributors
has managed to distribute the program to a large number of
machines with the help of its enlisted partners.
                                                                                               Distribution methods
The ZeroAccess gang advertises the malware installer in                   Downloader trojan         Dropping a downloader trojan onto a
Russian underground forums, actively looking for distributor                                        machine, which proceeds to download
partners. Their objective is to seek other cybercriminals who                                       and install the botnet
are more capable in distributing the malware and do so more               Exploit kit               Using an exploit kit (e.g., Blackhole) in a
efficiently.                                                                                        drive-by-download attack
                                                                          Fake media file or        Hosting infected files in P2P file sharing
The malware distributors generally consist of experienced                 keygen or crack           services using enticing names, such as
affiliates, each of them employing their own methods of                                             ‘microsoft.office.2010.vl.editi.keygen.
distributing the Zeroaccess installers, in order to fulfill the                                     exe’
recruiter’s requirements.                                                 P2P file sharing service Abusing a P2P file sharing website to
                                                                                                   host the ZeroAccess installer
The most popular distribution methods we’ve seen involve                  Spam email                Sending spam emails containing an
exploit kits, spam e-mails, trojans-downloaders, and seeding                                        attachment or a link that could enable
fake media files on P2P file-sharing services and on video                                          further exploitation
sites, though the specific details in each case depend on the
distributor handling the operations.




ZeroAccess                                                                                                                                   17
ZeroAccess botnet affiliate program structure
                  ZeroAccess botnet
                      operator


                                                                                                                     $$$




                                                                                                    Bitcoin mining
                                                                                      Click fraud
   underground forum




                       Distributor A
                                                    Exploit kits
                       Distributor B
                                                                                                                           Victims




                                                                                                                                          ZeroAccess
                       Distributor C               Spam emails


                                                   Downloader
                                                     trojan


                                                   P2P network
                       Distributor n




The partners are compensated based on a Pay-Per-Install                Given the rate of pay, it is no surprise that ZeroAccess is
(PPI) service scheme[4] and the rate differs depending on the          widespread in the US alone[5]. After the US, the commission
geographical location of the machine on which the malware              rate sorted from highest to lowest are Australia, Canada, Great
was successfully installed. A successful installation in the           Britain, and others. Some distributors even post screenshots
United States will net the highest payout, with the gang willing       of the payment they’ve received in underground forums to
to pay USD 500 per 1,000 installations in that location.               show the reliability of their recruiter.

                                                                       The ZeroAccess gang can afford to pay such high incentives to
                                                                       its recruits because the army of bots created by the affiliate’s
                                                                       efforts is able to generate even more revenue in return.

                                                                       Once the malware is successfully installed on the victim
                                                                       machines, ZeroAccess will begin downloading and installing
                                                                       additional malware onto the machines, which will generate
                                                                       profit for the botnet operators through click fraud and Bitcoin
                                                                       mining operations.
                       Figure 2: Proof of payments made by recruiter
                                                                       Botnet operators prefer the click fraud payload because since
                                                                       2006 [6], it has been a proven way to generate income from the
                                                                       pay-per-click (PPC) or the cost-per-click advertising.




ZeroAccess                                                                                                                           18
Zeroaccess infections, top countries
Bitcoin mining has too many constraints. For instance, the
success of generating a bitcoin depends on the difficulty level
                                                                                     by percentage (%)
of the target specified in the Bitcoin network and might even
require some luck[7]. Furthermore, the victim’s machine needs                              35%




                                                                              3538+8654
to run on a decent CPU power, preferably with GPU or FPGA                                  US
hardware, in a reasonable amount of time[8]. Even with a large
number of botnets, the difficulty factors in solving Bitcoin
blocks hinder Bitcoin mining operation from performing as
well as click fraud which only requires the victims to have an
internet connection and a web browser.                                                                                              38%
                                                                                5% Italy                                            Others
Despite the difficulties in Bitcoin mining, the fact that the                5% Romania
ZeroAccess botnet was modified to drop its problematic
self-protection feature and introduce the Bitcoin mining                        5% Canada
operations indicates that ZeroAccess’s operators are very
                                                                                        6% India
ambitious to keep the botnet growing and are not afraid of                                           8% Japan
taking risks.
                                                                                      *Based on statistics gathered from national
                                                                                              ASN-registered networks.




                                                                                                                                                  ZeroAccess
Conclusion
Given ZeroAccess’s current success as a huge, fully functional
profit-generating ‘machine’, it’s unlikely that we’ll see it going         zeroaccess’s profit-generating activities,
away anytime soon. The ZeroAccess malware - which poses the                           by percentage (%)




                                                                                           1783
most direct threat to the users - will continue to exist as a hidden
danger on malicious or boobytrapped websites. The affiliate
program that encourages the spread of malware will continue                                                            17%
to attract more cybercriminals due to the botnet operators’                                                            Bitcoin mining
established reputation for reliably paying its affiliates and
adjusting commission rates to maintain their attractiveness.
And finally, the criminal organizations behind the botnet have
demonstrated that they’re willing to experiment and modify
their ‘product’ in order to increase their ability to make money.
As such, we expect the ZeroAccess botnet to grow and evolve,
with new features or feature updates being introduced in the
near future.                                                                                 83%
                                                                                     Click fraud




Sources
[1] F-Secure Weblog; Threat Research; ZeroAccess’s Way of Self-Deletion; published 13 June 2012;
http://www.f-secure.com/weblog/archives/00002385.html
[2] F-Secure Weblog; Sean Sullivan; ZeroAccess: We’re Gonna Need a Bigger Planet; published 17 September 2012;
http://www.f-secure.com/weblog/archives/00002428.html
[3] Wikipedia; Affiliate Marketing;
http://en.wikipedia.org/wiki/Affiliate_marketing
[4] Wikipedia; Compensation Methods;
http://en.wikipedia.org/wiki/Compensation_methods#Pay-per-install_.28PPI.29
[5] F-Secure Weblog; Sean Sullivan; The United States of ZeroAccess, published 20 September 2012;
http://www.f-secure.com/weblog/archives/00002430.html
[6] MSNBC; Associated Press; Google settles advertising suit for $90 million; published 8 March 2006;
http://www.msnbc.msn.com/id/11734026/#.ULiDyN2sHvA
[7] Bitcoin Wiki; Target;
http://en.bitcoin.it/wiki/Target
[8] Wikipedia; Bitcoin;
http://en.wikipedia.org/wiki/Bitcoin


ZeroAccess                                                                                                                                   19
ZEROACCESS INFECTIONS In the USA, Japan, and europe*




                                                                                               ZeroAccess
                                                           Europe
               USA                                                                japan




*Red markers indicate an infected unique IP address or cluster of IP addresses.


ZeroAccess                                                                                20
Zeus
                                                             robbing banks in modern times

Zeus makes up a significant portion of banking trojans; it compromises millions of computers around the world and causes millions
of dollars in loss to its victims. In a typical operation, Zeus modifies a targeted webpage to collect valuable information. For example,
adding a part that requests potential victims to enter additional login details or personal information when they visited the webpage.
The information is later used to access the victims’ online account and to perform unauthorized transactions.


P2P Zeus geography
Of all derivatives and variants, the peer-to-peer (P2P) version                  Web-Injection Targets by country
is particularly special because it is private and forms only one
large botnet. Other derivatives usually consist of numerous
yet smaller botnets, each run by someone who has purchased
                                                                                    88
a version of Zeus. From late August to mid-November 2012,
we monitored the P2P bots and tracked the websites that
they had targeted to compromise with web injections. The
targeted sites were defined by a configuration data that the
                                                                                                                                                      47
bots received from other infected machines, and is stored in
encrypted form to the Windows registry.
                                                                                          23
                                                                                                   18       15
The configuration data revealed that a total of 644 unique                                                                 14         11    10
URLs were targeted for web-injections during the monitoring




                                                                                                                                                                                Zeus
period, with a special focus on sites based in North America.
Not all of these URLs included the domain names. Sometimes,
                                                                                    USA
                                                                                          Canada

                                                                                                   Italy
                                                                                                            Poland

                                                                                                                       Saudi Arabia
                                                                                                                                      UAE

                                                                                                                                            Germany
                                                                                                                                                      Rest of the world
only the path is used for identifying a targeted website. And
many domains had several different URLs leading to them,
using different paths. After excluding URLs with missing
domain names and duplicate domains, a total of 243 unique
domains were left. In summary, the targeted websites can be
categorized into the following types:

•	   Personal online banking                                            When it comes to the number of machines infected with P2P
•	   Corporate online banking (mainly for North American                Zeus, the US leads the pack followed by Italy. This number
     small businesses)                                                  was based on 5395 random samples analyzed between July to
•	   Investment and online trading sites                                November. After the US and Italy, no other countries in the
•	   Credit card services                                               subsequent positions really stand out from the pack as the
•	   Extremely popular global websites (e.g. Amazon, eBay,              difference in the number of infection varies only slightly.
     Facebook, etc.)

Geographically, North America is the primary focal point of               Top-10 countries with the most P2P Zeus
P2P Zeus botnet where it targeted 88 US-based websites and                              infections
23 Canadian-based websites. Several European countries were
also hot targets for web-injection. In the configuration data,
entries involving Italian websites were actively added, removed          country                           unique ips                             % of all ips
or changed; throughout the changes, Italy still remains as one           USA                                     1809                                         33.53%
of the favorite targeted countries. Poland started to creep into         Italy                                   439                                             8.14%
one of the top spots when 15 Polish sites were added to the              Germany                                     205                                        3.80%
targeted list in September and October when there were none              Georgia                                     203                                         3.76%
listed in August. A real surprise from the findings is the number        Mexico                                      179                                         3.32%
of targeted Middle Eastern banks as compared to the number
                                                                         Canada                                      168                                           3.11%
of infections in the same area.




zeus                                                                                                                                                                       21
country                  unique ips           % of all ips         Different derivatives (i.e. Citadel, Ice IX, and P2P) that popped
                                                                    up after the original Zeus 2 source code was leaked online have
 India                         167                 3.10%
                                                                    received drastically different commands since then. These
 Brazil                        143                 2.65%            commands provide a good indication of the development
 Romania                       133                 2.47%            pace of each derivative. Citadel leads with 20 new commands
 Taiwan                        110                 2.04%            while Ice IX only received one, making it the closest version to
                                                                    the leaked version 2.0.8.9. For Citadel and Ice IX, the earliest
                                                                    date listed on each respective table was also the date when we
Every month, the US and Italy were consistently positioned at       ran into the first sample of the derivative. For the P2P variant
the top in terms of infection numbers. When Polish sites started    however, we received the first sample on 3rd September 2011
to become targets, the number of infection in Poland more           but only saw the first changes to the backdoor commands six
than doubled but this number only accounted for two percent         months later.
of the total amount even at its highest point in November.
                                                                    The tables below list all new commands that are callable. Some
                                                                    of these may not implement any action and we did not track
           PERCENTAGEs (%) OF INFECTED IPs                          any possible changes in the behavior of each command. Please
                                                                    take note that the dates used in the tables were based on when
  80%                                                               we first received the sample with that particular command
                                                                    rather than when the Zeus author rolled out the changes.
  70%

  60%                                                                  Callable commands in the Zeus botnet

  50%                                              Poland            P2P Variant
                                                   Taiwan            Commands                                           First seen




                                                                                                                                             Zeus
                                                   Mexico            fs_find_by_keywords **                             2012-03-30
  40%
                                                   India             fs_find_add_keywords                               2012-04-09
                                                                     fs_find_execute                                    2012-04-09
  30%                                              Canada
                                                                     fs_pack_path                                       2012-05-24
                                                   Germany
                                                                     ddos_address                                       2012-05-24
  20%                                              Georgia
                                                                     ddos_execute                                       2012-05-24
                                                   Italy
                                                                     ddos_type                                          2012-05-24
  10%                                              USA
                                                                     ddos_url                                           2012-05-24


                                                                    ** fs_find_by_keywords was a short lived command in the P2P
            JUL AUG SEP OCT NOV                                     variant; it was last seen in a sample received on 3rd April 2012.


                                                                     Citadel
Earlier this year, Dell SecureWorks Counter Threat Unit[3] was       Commands                                           First seen
able to connect to approximately 100,000 P2P Zeus bots.
                                                                     dns_filter_add                                      2011-12-10
Using this number as a minimum botnet size, we can say that
                                                                     dns_filter_remove                                   2011-12-10
the most affected Internet Service Providers (ISPs) could have
several thousand of P2P Zeus infections on their customers’          url_open                                            2012-02-12
machines.                                                            module_download_disable                            2012-05-07
                                                                     module_download_enable                             2012-05-07
                                                                     module_execute_disable                             2012-05-07
New backdoor commands in Zeus derivatives                            module_execute_enable                              2012-05-07
Zeus capability is not limited to serving as a banking trojan        info_get_antivirus                                 2012-05-07
only. Since the beginning of its release, it has always contained    info_get_firewall                                  2012-05-07
some backdoor features that are controlled by simple scripts         info_get_software                                  2012-05-07
as ordered by the botnet owner. These scripts are delivered          ddos_start                                         2012-07-03
to infected machines through command and control (CC)
servers.



zeus                                                                                                                                    22
Citadel                                                                        Zeus 2 Timeline of Notable Events
 Commands                                     First seen
 ddos_stop                                     2012-07-03
                                                                         01.04.2010          Birth of Zeus 2.0.0.0
 close_browsers                                2012-09-11
                                                                          xx.10.2010         SpyEye author received Zeus source code[1]
 webinjects_update                             2012-09-11
 download_file                                 2012-09-11
 search_file                                   2012-09-11
 tokenspy_update                               2012-09-11
 upload_file                                   2012-09-11                 xx.04.2011         Earliest known date of Ice IX debut[2]
 tokenspy_disable                              2012-10-06
 bot_transfer                                  2012-10-06                 xx.05.2011         Zeus 2.0.8.9 source code leaked online

                                                                          xx.08.2011         First public sale of Ice IX on the internet
 Ice IX                                                                   03.09.2011         Earliest P2P Zeus variant identified by FS
 Commands                                     First seen
                                                                                             Labs
 bot_update_exe                                2011-11-03
                                                                          05.09.2011         First P2P Zeus backup domain registered

                                                                           03.11.2011        Earliest Ice IX sample identified by FS Labs
Besides being used as a banking trojan, some Zeus botnets
may now also be used to perform distributed denial of service              xx.11.2011        P2P gang started incorporating DDoS
(DDoS) attacks on targeted websites where interested parties                                 attack in their operations[3]
can rent a botnet from the controller for certain fees. As can
be seen from the new backdoor commands, both the Citadel                   xx.12.2011        First date of Citadel identification[4]




                                                                                                                                                Zeus
and the P2P versions received the DDoS features during the
summer, but the reason behind the P2P feature update may                   10.12.2011        Earliest Citadel sample seen by FS Labs
be different. According to Dell SecureWorks Counter Threat
Unit[3], the crew running the P2P variant used DDoS attacks to
prevent victims of banking trojans from accessing their online
banking accounts until the fraudulent transactions had been
completed. Thus reason for the DDoS feature update may be
                                                                          30.03.2012         First change made to P2P Zeus backdoor
to stop having to rent a third party botnet kit that the gang
                                                                                             commands
had been using to conduct attacks that took place between
November 2011 and summer 2012.
                                                                          07.05.2012         Citadel received backdoor commands to
                                                                                             control additional modules

                                                                          14.05.2012         A custom Zeus 2 variant that includes
                                                                                             ransomware features found

                                                                          24.05.2012         DDoS feature added to P2P Zeus

                                                                          03.07.2012         DDoS feature added to CItadel



SOURCES

[1] KrebsonSecurity; Brian Krebs; SpyEye v. ZeuS Rivalry Ends in Quiet Merger; published 24 Oct 2010;
http://krebsonsecurity.com/2010/10/spyeye-v-zeus-rivalry-ends-in-quiet-merger/
[2] RSA FraudAction Research Labs; New Trojan Ice IX Written Over Zeus’ Ruins; published 24 Aug 2011;
http://blogs.rsa.com/rsafarl/new-trojan-ice-ix-written-over-zeus-ruins/
[3] Dell SecureWorks; Brett Stone-Goss; The Lifecycle of Peer-to-Peer (Gameover) ZeuS; published 23 Jul 2012;
http://www.secureworks.com/cyber-threat-intelligence/threats/The_Lifecycle_of_Peer_to_Peer_Gameover_ZeuS/
[4] Seculert Blog; Citadel - An Open-Source Malware Project; published 8 Feb 2012;
http://blog.seculert.com/2012/02/citadel-open-source-malware-project.html


zeus                                                                                                                                       23
The complete infographic can be viewed at
      http://bit.ly/How2RobBanks
Exploits                                             Top Targeted Vulnerabilities in 2012

In 2012, we saw the exploitation of known vulnerabilities in         These then are the most commonly targeted CVE
a popular program or the operating system become one of              vulnerabilities of 2012:
the most popular, if not the most popular, technique used by
malware distributors, hackers and attackers in order to gain         CVE-2011-3402
access to or control of a user’s machine.                            A vulnerability in the TrueType font parsing engine used in the
                                                                     kernel drivers of various Microsoft Windows operating system
From the normal user’s perspective, the most likely scenario in      versions (including XP, Windows Vista and Windows 7) allows
which they are likely to encounter an attempted vulnerability        remote attackers to run arbitrary code on a user’s machine.
exploit of their machine is through visiting a malicious or          The attack uses a Word document or web page containing
compromised website. Though some attacks continue to use             specially crafted malicious font data. More information on this
tried-and-true social engineering tactics, which require an          vulnerability can be found on the infographic on page 27.
element of deception and are relatively easy for an alert user
to spot (“Click this link for free stuff!” or “Download this codec   CVE-2010-0188
to view this tantalizing video!”), in more sophisticated attacks     A vulnerability in Adobe Reader and various versions of
users are unlikely to see any overt signs that an attack has         Adobe Acrobat allows attackers to use a specially crafted PDF
taken place at all; instead, their machine is quickly and silently   document to force the application to crash, causing a denial of
compromised during the short period it was exposed to the            service. According to reports, the attack document is also able
malicious or compromised website.                                    to drop a malicious file onto the compromised system, which
                                                                     then connects to a remote site for further instructions.
In some cases, the attack is tailored specifically to target a
particular set of users. Targeted user groups are typically          CVE-2012-4681
either the users of specific banks (making the attack a case of      Vulnerabilities in the Java Runtime Environment (JRE) running
monetary theft) or users employed by a specific company or           in web browsers allow attackers to use a specially crafted
in a specific field (essentially corporate or political espionage,   applet to run arbitrary code on the compromised machine.




                                                                                                                                          exploits
see the Corporate Espionage case study on page 12). These            Users are most commonly exposed to the malicious applet
targeted attacks are hardly new—we’ve seen cases of spear            when they are directed (either through social engineering or
phishing come and go over the years. The main change                 poisoned search results) to a malicious webpage hosting the
that we’ve seen in the last few years is that rather than            attack applet.
depending on the user to download an infected attachment
or enter sensitive data into a malicious page masquerading as
                                                                     CVE-2012-5076
a legitimate portal, the attacks now make use of exploits and/
                                                                     A vulnerability in the JRE component of Oracle Java SE 7 Update
or exploit kits to directly compromise the user’s machine,
                                                                     7 and earlier allows attackers to use a specially crafted applet
without needing any action from the user.
                                                                     to run arbitrary code on the compromised machine, usually to
                                                                     download additional malicious files onto it.
In 2012, we saw a wide range of exploits being used to
target known vulnerabilities, but surprisingly, statistics
from F-Secure’s cloud lookup systems indicate that in most           CVE-2012-0507
countries, the majority of exploits detected were related to         A vulnerability in the AtomicReferenceArray of various versions
only four vulnerabilities, all reported within the last two years    of Oracle Java allows attackers to essentially breach the
and designated with official Common Vulnerabilities and              ‘sandbox’ or contained environment of the Java installation,
Exposure (CVE) identifiers. The preference for targeting these       permitting the attacker to perform malicious actions on the
four vulnerabilities may be related to the fact the some of the      affected machine.
most popular exploit kits of today, particularly BlackHole and
Cool Exploit, have incorporated the exploits targeting these         CVE-2012-1723
vulnerabilities into their capabilities. Ironically, most of these   A vulnerability in the Java HotSpot VM in the JRE component
vulnerabilities have already had security updates or patches         of various versions of Oracle Java allows attackers to essentially
released by the relevant software vendors. Two other Java-           breach the ‘sandbox’ or contained environment of the Java
specific vulnerabilities, though nowhere near as frequently          installation, permitting the attacker to perform malicious
targeted as the first four, also saw enough attacks to be worth      actions on the affected machine.
noting.



exploits                                                                                                                           25
Netherlands                                                                                                         Belgium
Exploit Prevalence:                                                                                                 Exploit Prevalence:
139
                          2011-3402                                                                  2012-4681
                                                                                                                    121

2011-3402:    39%                                            2011-3402                                              2011-3402:      36%
2010-0188:    32%                                                                2010-0188                          2010-0188:      35%
2012-4681:    17%                                                                                    2012-5076      2012-4681:      16%
2012-5076:     9%                                                                                                   2012-5076:       11%

                                           2012-4681
                      2010-0188                                                                                     Sweden
                                                                                                                    Exploit Prevalence:
                                                                                                2010-0188           102
                                                                            2012-4681
                                                             2011-3402
                                           2012-5076                                                                2011-3402:     31%
                                                                                                                    2010-0188:     29%
                                                                                                 2012-5076          2012-4681:     29%
                                                                                                                    2012-5076:      9%
infographic
                                                                   These were the top 10 countries that saw the most exploits
Most Targeted CVE Vulnerabilities,                                 targeting known CVE vulnerabilities in H2 2012, ranked by
                                                                   Exploit Prevalence, which is calculated as the count of CVE-
Top 10 Countries                                                   related detections reported per 1,000 users in the country for
H2 2012                                                            that time period. For example, during H2 2012, our systems
                                                                   recorded a CVE-related exploit detection for 139 of every
                                                                   1,000 users in the Netherlands. Also listed are the top 4 CVE
                                                                   vulnerabilities targeted in each country, as well as their relative
                                                                   percentage of all CVE-related detections from that country.


                  2010- 2012-4681                              2010-0188                          2010-0188
                                                    2012-
                  0188                              4681                                 2011-
                                       2012-                          2012-              3402 2012-4681 2012-
                             2011-3402 5076                 2011-3402 5076                              5076


                  Italy                            Germany                               France
                  Exploit Prevalence: 88           Exploit Prevalence: 78                Exploit Prevalence: 69
                  2010-0188:                38%    2012-4681:             32%            2011-3402:             32%
                  2012-4681:                29%    2010-0188:             26%            2010-0188:             28%
                  2011-3402:                22%    2011-3402:             22%            2012-4681:             24%
                  2012-5076:                 8%    2012-5076:             15%            2012-5076:             13%


                                                     2011-3402              2010-0188                 2010-0188
                                2012-5076
                 2012-4681                         2012-     2010-           2012-5076                 2012-5076

                                                   4681      0188
                                           2010-
                                 2011-     0188                              2011-3402                2011- 2012-
                                                                                                      3402 4681
                                 3402
                                                            2012-5076        2012-4681


                 US                                UK                      Poland                     Finland
                 Exploit Prevalence:               Exploit Prevalence:     Exploit Prevalence:        Exploit Prevalence:
                 87                                67                      61                         45
                 2012-4681:                 47%    2011-3402:      30%     2010-0188:      35%        2010-0188:     33%
                 2012-5076:                 25%    2012-4681:       28%    2012-5076:      24%        2012-5076:     25%
                 2011-3402:                 16%    2010-0188:       28%    2011-3402:      21%        2011-3402:      21%
                 2010-0188:                  9%    2012-5076:        11%   2012-4681:      16%        2012-4681:      17%
infographic
                                                                      Belgium
                                                                                          Sweden
                                                                                                      34
                                                                      72 56
                                                                                               Netherlands




CVE-2011-3402
                                                                     UK
                                                                          21
                                                                                                     11Denmark
                USA
                      16                                                                                                     13       Poland

                                                                                                                  17
                                                                                                                  Germany


                                                                                                25                                   19 Czech Republic
Most Exploited Users,                                                                                                            25     Austria

                                                                                                                                                    27
                                                                                                France

Top 15 Countries
                                                                                                                                                    Greece
Calculated as the count of CVE-2011-3402-
related detections per 1,000 users in the
country, as seen by F-Secure’s cloud lookup
                                                                           15                            Switzerland

                                                                                                         40
                                                                           Spain
systems in H2 2012.
For example, in Belgium,
                                                                                                                       21 Italy
72 out of every 1,000 users
reported seeing a CVE-2011-
3402-related detection in the
second half of the year.                                                                                       2% Blackhole

                                                                                                            11%        The Cool (kit) factor
                                                            11
                                                                                                           Others      In H2 2012, most of the malicious
First reported in 2011, the term CVE-2011-3402 refers to a                               Cool                          sites we saw with the CVE-2011-

                                                                                         87%
vulnerability in the Windows operating system component
                                                                                                                       3042 exploit were using the Cool
that handles TrueType fonts.                                                                                           Exploit kit to attack unsuspecting
                                                                                                                       site visitors.
Shortly afterwards, an exploit became public that took
advantage of this vulnerability to, among other things,
install malware onto the affected system.
                                                                                    +87+2+
                                                                                         34%




The exploit was first used in the Duqu malware, which
                                                                                                 Germany
                                                                                                     26%
                                                                                                    26%




                                                                                                                                          Ukraine




only targeted specific organizations in certain countries.
                                                                                France




                                                                                                             Russia


                                                                                                                       USA




In October 2012, the exploit was added to the Cool
                                                                                                                                UK




Exploit kit, and shortly after to 5 other kits as well. It quickly
became one of the most common exploits seen by normal                            The Euro zone
computer users in H2 2012.                                                        60% percent of malicious sites hosting kits with
                                                                                  the CVE-2011-3042 exploit were registered to just 2
                                                                                  countries: France and Germany.
CVE-2012-4681 1000=
CVE-2011-3402 980=
CVE-2010-0188 950=                                                               The greatest hits
                                                                                   Despite being relatively new, of all CVE-related hits
CVE-2012-5076 500=
                                                                                   logged by F-Secure’s cloud lookup systems in H2 2012,
CVE-2012-0507 100=                                                                 CVE-2011-3402-related detections were the second
                                                                                   most frequent.
                                              135 000
Threat Report H2 2012
Threat Report H2 2012
Threat Report H2 2012
Threat Report H2 2012
Threat Report H2 2012
Threat Report H2 2012
Threat Report H2 2012
Threat Report H2 2012
Threat Report H2 2012
Threat Report H2 2012
Threat Report H2 2012
Threat Report H2 2012
Threat Report H2 2012

Weitere ähnliche Inhalte

Was ist angesagt?

Buyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection PlatformsBuyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection PlatformsFindWhitePapers
 
Mobile security hakin9_Revista
Mobile security hakin9_RevistaMobile security hakin9_Revista
Mobile security hakin9_Revistathe_ro0t
 
The state of privacy and data security compliance
The state of privacy and data security complianceThe state of privacy and data security compliance
The state of privacy and data security complianceFindWhitePapers
 
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIIBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIAGILLY
 
Is your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersIs your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersFindWhitePapers
 
Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0mobileironmarketing
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productGFI Software
 
Cscu module 02 securing operating systems
Cscu module 02 securing operating systemsCscu module 02 securing operating systems
Cscu module 02 securing operating systemsSejahtera Affif
 
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...ESET Middle East
 
2010-05 Real Business, Real Threats! Don't be an Unsuspecting Target
2010-05 Real Business, Real Threats!  Don't be an Unsuspecting Target 2010-05 Real Business, Real Threats!  Don't be an Unsuspecting Target
2010-05 Real Business, Real Threats! Don't be an Unsuspecting Target Raleigh ISSA
 
Social engineering
Social engineeringSocial engineering
Social engineeringBola Oduyale
 
White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?Windstream Enterprise
 
Design of Indonesia Malware Attack Monitoring Center - Charles Lim
Design of Indonesia Malware Attack Monitoring Center - Charles LimDesign of Indonesia Malware Attack Monitoring Center - Charles Lim
Design of Indonesia Malware Attack Monitoring Center - Charles Limidsecconf
 
Dan Guido SOURCE Boston 2011
Dan Guido SOURCE Boston 2011Dan Guido SOURCE Boston 2011
Dan Guido SOURCE Boston 2011Source Conference
 

Was ist angesagt? (20)

Buyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection PlatformsBuyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection Platforms
 
Hakin9 05 2013
Hakin9 05 2013Hakin9 05 2013
Hakin9 05 2013
 
Mobile security hakin9_Revista
Mobile security hakin9_RevistaMobile security hakin9_Revista
Mobile security hakin9_Revista
 
The state of privacy and data security compliance
The state of privacy and data security complianceThe state of privacy and data security compliance
The state of privacy and data security compliance
 
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIIBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
 
Privacy, Security
Privacy, SecurityPrivacy, Security
Privacy, Security
 
Is your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersIs your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computers
 
Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0
 
Hacking 10 2010
Hacking 10 2010Hacking 10 2010
Hacking 10 2010
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 
Info sec 12 v1 2
Info sec 12 v1 2Info sec 12 v1 2
Info sec 12 v1 2
 
Cscu module 02 securing operating systems
Cscu module 02 securing operating systemsCscu module 02 securing operating systems
Cscu module 02 securing operating systems
 
csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
 
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
 
Spo2 w22
Spo2 w22Spo2 w22
Spo2 w22
 
2010-05 Real Business, Real Threats! Don't be an Unsuspecting Target
2010-05 Real Business, Real Threats!  Don't be an Unsuspecting Target 2010-05 Real Business, Real Threats!  Don't be an Unsuspecting Target
2010-05 Real Business, Real Threats! Don't be an Unsuspecting Target
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?
 
Design of Indonesia Malware Attack Monitoring Center - Charles Lim
Design of Indonesia Malware Attack Monitoring Center - Charles LimDesign of Indonesia Malware Attack Monitoring Center - Charles Lim
Design of Indonesia Malware Attack Monitoring Center - Charles Lim
 
Dan Guido SOURCE Boston 2011
Dan Guido SOURCE Boston 2011Dan Guido SOURCE Boston 2011
Dan Guido SOURCE Boston 2011
 

Ähnlich wie Threat Report H2 2012

Bitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlBitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlJose Lopez
 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015Andreanne Clarke
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-naAndreas Hiller
 
Network Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan BankersNetwork Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan BankersBlueliv
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Deb Birch
 
Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitKaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitPR Americas
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018Panda Security
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Kim Jensen
 
rovide 34 paragraphs that define how the IT security landscape has evo.docx
rovide 34 paragraphs that define how the IT security landscape has evo.docxrovide 34 paragraphs that define how the IT security landscape has evo.docx
rovide 34 paragraphs that define how the IT security landscape has evo.docxacarolyn
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareTeodoro Cipresso
 
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by DownloadsStop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by DownloadsInvincea, Inc.
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Security
 
Protecting Against the New Wave of Malware
Protecting Against the New Wave of MalwareProtecting Against the New Wave of Malware
Protecting Against the New Wave of MalwareGFI Software
 

Ähnlich wie Threat Report H2 2012 (20)

Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
 
Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012
 
Bitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlBitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat Control
 
AVG Threat Report Q4 2012
AVG Threat Report Q4 2012AVG Threat Report Q4 2012
AVG Threat Report Q4 2012
 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
 
Network Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan BankersNetwork Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan Bankers
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
 
Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitKaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst Summit
 
Rp threat-predictions-2013
Rp threat-predictions-2013Rp threat-predictions-2013
Rp threat-predictions-2013
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
 
virus
virusvirus
virus
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009
 
rovide 34 paragraphs that define how the IT security landscape has evo.docx
rovide 34 paragraphs that define how the IT security landscape has evo.docxrovide 34 paragraphs that define how the IT security landscape has evo.docx
rovide 34 paragraphs that define how the IT security landscape has evo.docx
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
 
CTI Report
CTI ReportCTI Report
CTI Report
 
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by DownloadsStop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
 
Protecting Against the New Wave of Malware
Protecting Against the New Wave of MalwareProtecting Against the New Wave of Malware
Protecting Against the New Wave of Malware
 

Mehr von F-Secure Corporation

How do you predict the threat landscape?
How do you predict the threat landscape?How do you predict the threat landscape?
How do you predict the threat landscape?F-Secure Corporation
 
Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!F-Secure Corporation
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceF-Secure Corporation
 
Security A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsSecurity A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsF-Secure Corporation
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace F-Secure Corporation
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espaceLes attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espaceF-Secure Corporation
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?F-Secure Corporation
 
Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3F-Secure Corporation
 
Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2F-Secure Corporation
 
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeCyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeF-Secure Corporation
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF-Secure Corporation
 
F-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Corporation
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windowsF-Secure Corporation
 
Six things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsSix things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsF-Secure Corporation
 
Small and midsize business security is big business
Small and midsize business security is big businessSmall and midsize business security is big business
Small and midsize business security is big businessF-Secure Corporation
 
大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業F-Secure Corporation
 
Why should you care about government surveillance?
Why should you care about government surveillance?Why should you care about government surveillance?
Why should you care about government surveillance?F-Secure Corporation
 
Arbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitetArbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitetF-Secure Corporation
 

Mehr von F-Secure Corporation (20)

Post-mortem of a data breach
Post-mortem of a data breachPost-mortem of a data breach
Post-mortem of a data breach
 
How do you predict the threat landscape?
How do you predict the threat landscape?How do you predict the threat landscape?
How do you predict the threat landscape?
 
Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security Service
 
Security A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsSecurity A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important terms
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espaceLes attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?
 
Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3
 
Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2
 
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeCyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat Landscape
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and management
 
F-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior control
 
The State of the Net in India
The State of the Net in IndiaThe State of the Net in India
The State of the Net in India
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windows
 
Six things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsSix things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutions
 
Small and midsize business security is big business
Small and midsize business security is big businessSmall and midsize business security is big business
Small and midsize business security is big business
 
大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業
 
Why should you care about government surveillance?
Why should you care about government surveillance?Why should you care about government surveillance?
Why should you care about government surveillance?
 
Arbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitetArbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitet
 

Kürzlich hochgeladen

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Kürzlich hochgeladen (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Threat Report H2 2012

  • 1. Threat Report H2 2012 Protecting the irreplaceable | www.f-secure.com
  • 2. F-Secure Labs At the F-Secure Response Labs in Helsinki, Finland, and Kuala Lumpur, Malaysia, security experts work around the clock to ensure our customers are protected from the latest online threats. At any given moment, F-Secure Response Labs staff is on top of the worldwide security situation, ensuring that sudden virus and malware outbreaks Protection around the clock are dealt with promptly and effectively. Response Labs’ work is assisted by a host of automatic systems that track worldwide threat occurences in real time, collecting and analyzing hundreds of thousands of data samples per day. Criminals who make use of virus and malware to profit from these attacks are constantly at work on new threats. This situation demands around the clock vigilance on our part to ensure that our customers are protected.
  • 3. foreword Today, the most common way of getting hit by malware is by browsing the Web. It hasn’t always been this way. Years ago, floppy disks were the main malware vector. Then sharing of executable files. Then e-mail attachments. But for the past five years, the Web has been the main source of malware. The Web is the problem largely because of Exploit Kits. Kits such as BlackHole, Cool Exploit, Eleanore, Incognito, Yes or Crimepack automate the process of infecting computers via exploits. There is no exploit without a vulnerability. Ultimately, vulnerabilities are just bugs, that is, programming errors. We have bugs because programs are written by human beings, and human beings make mistakes. Software bugs have been a problem for as longs as we have had programmable computers—and they are not going to disappear. Bugs were not very critical until access to the Internet became widespread. Before, you could have been working on a word processor and opening a Mikko HyppÖnen corrupted document file, and as a result, your word processor would have crashed. Chief Research Officer Even if annoying, such a crash would not have been too big of a deal. You might have lost any unsaved work in open documents, but that would have been it. However, things changed as soon as the Internet entered the picture. Suddenly, bugs that used to be just a nuisance could be used to take over your computer. Yet, even the most serious vulnerabilities are worthless for the attacker, if they get patched. Therefore, the most valuable exploits are targeting vulnerabilities that are not known to the vendor behind the exploited product. This means that the vendor cannot fix the bug and issue a security patch to close the hole. Software bugs have been a problem for as longs as we have had programmable computers—and they are not going to disappear. If a security patch is available and the vulnerability starts to get exploited by the attackers five days after the patch came out, the users have had five days to react. If there is no patch available, the users have no time at all to secure themselves; literally, zero days. This is where the term ‘Zero Day Vulnerability’ comes from: users are vulnerable, even if they have applied all possible patches. One of the key security mechanisms continues to be patching. Make sure all your systems are always fully up-to-date. This drastically reduces the risk of getting infected. But for Zero Day vulnerabilities, there are no patches available. However, antivirus products can help against even them. We’re in a constant race against the attackers. And this race isn’t going to be over any time soon. FOREWORD 3
  • 4. Executive Summary executive summary Three things visibly stand out in this past half year: botnets (with special reference to ZeroAcess), exploits (particularly against the Java development platform) and banking trojans (Zeus). ZeroAccess was easily the most prevalent botnet we saw in 2012, with infections most visible in France, United States and Sweden. It is also one of the most actively developed and perhaps the most profitable botnet of last year. In this report, we go through the distribution methods and payment schemes of ZeroAccess’s ‘affiliate program’, as well as its two main profit- generating activities: click fraud and BitCoin mining. Aside from ZeroAccess, other notable botnets of 2012 are Zeus, Carberp, Dorkbot and SpamSoldier (a mobile botnet). Java was the main target for most of the exploit-based attacks we saw during the past half year. This is aptly demonstrated in the statistics for the top 10 most prevalent detections recorded by our cloud lookup systems, in which the combined total of detections for the Java- specific CVE-2012-4681 and CVE-2012-5076 vulnerabilities and the Majava generic detections, which also identify samples that exploit Java-related vulnerabilities, account for one third of the samples identified during this period. Exploit kits plays a big role in this prevalence. In addition, exploits against other programs such as the PDF document reader (CVE-2010-0188) or Windows TrueType font (CVE-2011-3402) made notable impacts in H2 2012, as detailed further in this report. With regards to banking-trojans, a botnet known as Zeus—which is also the name for the malware used to infect the user’s machines—is the main story for 2012. Analysis of the geography for Zeus’s infection distribution highlights the United States, Italy and Germany as the most affected countries. In addition to its banking-trojan capabilities, the Zeus malware also functions as a backdoor, allowing it to be directly controlled from the botnet’s command and control (C&C) servers. An examination of the different sets of backdoor commands used by Zeus derivatives (known as Citadel and Ice IX) gives more detail of what other malicious actions this malware can perform. In terms of online security, we look at the more ambiguous side of the ever-growing popularity of website hosting, and how its increasingly affordable and user-friendly nature also makes it well suited to supporting malware hosting and malvertising. We also take a look at multi-platform attacks, in which a coordinated attack campaign is launched against multiple platforms (both desktop and mobile), often with multiple malware. And finally on the mobile scene, the Android and Symbian platforms continue to be the main focus of threats, accounting for 79% and 19%, respectively, of all new mobile malware variants identified in 2012. executive summary 4
  • 5. Contents This Threat Report highlights trends and new developments seen in the malware threat landscape by analysts in F-Secure Labs during the second half of 2012. Also included are case studies covering selected noteworthy, highly-prevalent threats from this period. contributing foreword3 AUTHORS Broderick Aquilino Executive Summary 4 Karmina Aquino Contents5 Christine Bejerasco Edilberto Cajucom Incidents Calendar 6 Su Gim Goh In Review 7 Alia Hilyati Timo Hirvonen Of Note 10 Mikko Hypponen the password 11 Sarah Jamaludin COrporate espionage 12 Jarno Niemela Mikko Suominen Case Studies 14 Chin Yick Low BotS15 Sean Sullivan ZeRoAccess17 Marko Thure Juha Ylipekkala Zeus21 Exploits25 Web28 Multi-Platform attacks 32 Mobile35 Sources38 contents 5
  • 6. Incidents Calendar H2 2012 incidents calendar (July-December)* jul Aug SEPT OCT NOV DEC FBI support for Out-of-band Patch Friday Syrian Internet,mobile DNSChanger ended connections cut off Imuler.B backdoor found on OS X Multi-platform Intel/OS X backdoor found Malware signed Berlin poice warned of with Adobe certificate Android banking trojans Commercial multi-platform surveillance tools found Samsung TouchWiz exploit Cool Exploit kit Iran-targeted malware reported rivalling Blackhole reported New Mac Revir threat Indian government email found accounts hacked New Linux rootkit found Gauss threat targeted Dexter malware hit point the London Olympics Huawei controversy in US Congress of sales (POS) ITU Telecom World ‘12 raised Australian hospital’s Blackhole updated faster Internet/government concerns records ransomed than flaws patched Java update closed 3 Mac threat found on Dalai vulnerabilities Lama-related webite Matt Honan ‘hack’ highlighted One rogue ad hits Finnish flaws in accounts systems web traffic Eurograbber attack on European banks reported Samsung Exynos exploit reported Online In the news PC threats Mobile threats Hacktivism espionage Sources: See page 38. incidents calendar 6
  • 7. In Review changes in the threat landscape Unlike the first half of 2012, the second half of the year saw no major malware outbreaks on any platform. Instead, a handful of incidents took place during this time period, most of which were notable as indications of how inventive the attackers have been in finding ways to compromise a user’s machine, data or money. These incidents included the hack into the Wired Matt Honan’s Gmail and Apple accounts, which exposed loopholes in those account systems; the Adobe-certified malware episode, in which attackers went to the extent of stealing Adobe’s digital certificate in order to sign malware used in targeted attacks; and the Eurograbber attack, in which a variant of the Zeus crimeware was reportedly used to steal money from various corporations and banks in Europe. An interesting development in 2012 has been the increasing public awareness of cyber-security and the various implications of being vulnerable to attack over a borderless Internet. News reports of alleged online or malware-based attacks against Iranian facilities drew attention to state-sponsored cyber-attacks. A conference gathering the various telecommunications entities to discuss basic infrastructure issues raised concerns about Internet governance, and the role of governments in it. The past year also saw US politicians, not generally considered the most tech-savvy of users, raise concerns over perceived reliance on IT solutions for sensitive government systems being provided by foreign corporations seen as potentially unreliable. Though it is probably a positive development that more people are becoming exposed to topics that have long been considered irrelevant or academic, only time will tell what will result from the increased awareness. Rather than a single major event, perhaps the most noteworthy aspect of H2 2012 is the way that the various trends we saw emerging in the first two quarters of the year have continued to grow apace—that is, the growth of botnets, the ‘standardization’ of vulnerability exploitation and the increasing ‘establishment’ of exploit kits. When it comes to botnets, the news has been mixed at best. The last few years have seen concerted efforts by players from different fields—telecommunications, information security and even government organizations—to take down or at least hamper the activities of various botnets, which have compromised millions of user’s computers and been used to perform such activities as monetary fraud and online hacking. These combined efforts resulted in totally shuttering, or at least seriously hampering, major botnets such as Rustock, Zeus and DNSChanger. Unfortunately, despite these commendable efforts, the botnets have been regularly resurrecting, often with new strategies or mechanisms for garnering profit. In addition, the operators running these botnets have been aggressively marketing their ‘products’ to other hackers and malware distributors. Their efforts include offering affiliate programs with attractive ‘pay-per-installation’ rates and ‘rent-a-botnet’ schemes that allow attackers to use the combined power of the infected hosts to perform attacks or other nefarious activities. These sophisticated business tactics have garnered significant returns. In some cases, such as ZeroAccess, the reborn botnets have grown to count millions of infected hosts. See the cases studies Bots (pg. 15), ZeroAccess (pg. 17) and Zeus (pg. 21) for more information on botnets. Another change we saw last year was the increasing use of vulnerability exploitation, often in tandem with established social engineering tactics. Unlike previous years, when most of the infections we saw involved trojans, 2012 was definitely the year of the exploit, as exploit- In review 7
  • 8. Top 10 detections in H2 2012, top countries* ZeroAccess 27% FR us se dk others Majava 26% US fr fi se others Downadup 11% br fr my it others BlackHole 9% fr fi se nl others CVE-2012-4681 6% us se fr de others CVE-2011-3402 6% fr se nl fi others CVE-2010-0188 6% fr se fi nl others CVE-2012-5076 3% fi us fr se others PDF Exploits 3% fi fr se de others Sinowal 3% nl se fi others % 0 25 50 75 100 *Based on statistics from F-Secure’s cloud lookup systems from July to December 2012. related detections accounted for approximately 28% of all detections F-Secure’s cloud lookup systems saw in H2 2012. In addition, malware designed to exploit vulnerabilities related to the Java development platform made up about 68% of all exploit-related detections recorded by our systems in the second half of last year. If we look at the list of Top 10 Detections (above) seen by our cloud lookup systems in H2 2012 in more detail, two detections which specifically identify samples exploiting the Java-specific CVE-2012-4681 and CVE-2012-5076 vulnerabilities alone account for 9% of the malware identified by the top 10 detections. In addition, the Majava generic detections, which identify samples that exploit known vulnerabilities, including the Java-specific CVE-2012-0507 and CVE-2012-1723 vulnerabilities, account for another 26% of the top 10 detections, as well as having the dubious honor of being the second most common detection overall reported by our backend systems. The sheer volume of Java-related detections indicate both the widespread popularity of that platform and its susceptibility to the malicious inventiveness of malware authors. Interestingly enough, when considering exploit attacks in general, though we saw attacks exploiting numerous vulnerabilities in multiple platforms and programs in 2012, the vast majority of the cases were related to only four vulnerabilities—CVE- 2011-3402 and CVE-2010-0188, which are Windows-related vulnerabiltiies, and the previously mentioned Java vulnerabilities, CVE-2012-4681 and CVE-2012-5076. All of these vulnerabilities, incidentally, have already had security patches released by their relevant vendors. in review 8
  • 9. This skewed preference in attack targeting can be directly attributed to the popular usage of exploit kits such as Blackhole and Cool Exploit, which have incorporated the exploits for these vulnerabilities, in some cases faster than the vendors were able to patch them. It’s perhaps not too surprising then that BlackHole-related detections account for 9% of all samples detected by the top 10 detections of H2 2012. For more information on these exploits, see the Exploits case study on page 25. And as a closing note, a quick look at our detection statistics for Mac indicates that even though Windows machines continues to be the main target for attacks, the Mac platform is increasingly coming in for a share of unwanted attention. Apart from the major Flashback outbreak in early 2012, we saw a slow but steady increase in malware on the Mac platform, as we detected 121 new, unique variants in all of 2012, the majority of them backdoors. By contrast, in 2011, we recorded only 59 new unique variants discovered on that platform. 85 +4+4+7+z Mac Malware by type, Jan - Dec 2012 Total= 121 variants* Backdoor, 85% Others 4% Rogue, 4% Trojan, 7% *The total is counted based on unique variants detected from Jan to Dec 2012, rather than total file count. Riskware and repackaged installers are not counted; multi-component malware are only counted once. in review 9
  • 10. Of Note the Password 11 COrporate espionage 12
  • 11. Password the password dead man walking Computer passwords are something like fifty years old. And Determine which accounts that are your critical points of until a little over twenty years ago, they were very often a shared failure, and make sure they are all well defended. Two factor resource where multiple people used the same password (or authentication is good, but even that is not a bulletproof set of passwords) for access to computer systems. The use of solution. It is important to use every option available. individual passwords was actually something of an innovation at the time. For example, Google’s Gmail allows users to create their own security question for password resets. There is absolutely no Then came the World Wide Web, and with it, the ever growing reason why this question needs to be based on reality. It can need for more and more account passwords. As time has just as easily be another “password”. One which is written passed and our online lives have grown, it is now not at all down and stored safely at home, where only you have access uncommon for people to have dozens of passwords to keep to it. track of. And what’s worse is that all of those passwords should be “strong” passwords and people shouldn’t reuse them And if you are a parent of teenage children… you really should between accounts. It’s too much! have “the talk” with them about their use of passwords. The habits they form now will have a big impact on their future The second half of 2012 provided more than enough evidence online lives. to demonstrate the problem of passwords. Hacks, breaches, database dumps—these are terms that average individuals Hopefully, one day soon, a true successor will rise to take the (not just techies) are now familiar with. With today’s processing password’s place and we will all be able to let the password power, passwords that are strong enough to withstand brute die a dignified death. Unfortunately, we are more likely to force attacks are too difficult for the human brain to remember. experience fits and starts towards a new solution. Prepare yourself now, 2013 isn’t going to be kind for those who are Even if the passwords are strong, our systems of authenticating unprepared. account resets are flawed. A strong password is useless if social engineering tactics can be used to reset those passwords. The password is dead and we all know it. But unfortunately, its successor has yet to turn up. So what’s to be done in the meantime? Triage. • Use a password manager such as KeePass or Password Recommended Reading Safe • Kill old accounts that you no longer use • Hacked: passwords have failed and it’s time • Untangle cross-linked accounts for something new[1] • Consider using a “secret” email address for account Matt Honan discusses the account hack that disrupted his maintenance digital life and its implications for online security • Be careful about what you share on social media. If you share, don’t rely on personal information for your • Google declares war on the password[2] account password resets Find out more about Google’s experiment with device-based • Use two-factor authentication options if available account authentication SOURCES [1] Wired; Matt Honan; Hacked: passwords have failed and it’s time for something new; published 17Jan 2013; http://www.wired.co.uk/magazine/archive/2013/01/features/hacked?page=all [2] Wired; Robert McMillan; Google declares war on the password; published 18 Jan 2013; http://www.wired.com/wiredenterprise/2013/01/google-password/ Password 11
  • 12. COrporate of the ‘watering hole’ attack rise espionage Espionage In Q4 2012, we watched the nature of corporate espionage Numerous examples of corporate espionage attacks have attacks change. Before, almost all recorded corporate been reported in the F-Secure Weblog over the years, many of espionage cases were based on using specially crafted them involving poisoned e-mail file attachments sent directly documents containing exploits and a malware payload. Now, to the targeted organizations. spies have started to leverage vulnerabilities in web browsers and browser plugins to achieve their aims in so-called These attacks contrast sharply with the most recent case of a ‘watering hole’ attacks. watering hole attack—the 21st December 2012 compromise of the Council of Foreign Relations (CFR) website[1]. In this attack, ‘Watering hole’ attacks are called such because instead of the website was injected with a previously unknown exploit compromising a random website and infecting anyone who that affected versions 6, 7 and 8 of the Internet Explorer (IE) happens to visit the site, the attackers are more discriminating web browser. Compromising the website itself was not the attacker’s final objective; it was merely “Cross-referencing this list [of known attack domains] used as which naturally include members visitors, a conduit to infect the website’s against the Alexa.com’s list of 1 million most common of the CSR itself. And considering that CSR domains showed that 99.6% of these potential CC sites counts among its members both current and former US political elite and the were outside of Alexa’s top domains.” founders of multinational companies, the list of potential targets is very interesting. in both the users being targeted and the site used as the infection vector. The attackers specifically attack a site The rise of web-based attacks in corporate espionage raises which is commonly used by employees of the actual target two points: first, this trend means that any corporation with organization. When these employees visit the compromised an online presence that serves such potentially ‘interesting‘ site, their browser or computer is then attacked, typically by targets may be at risk of unwittingly serving as an attack exploiting a vulnerability that allows trojans or backdoors to conduit, and secondly; obviously, such organizations must be installed on the machine. From that point on, the installed now find a way to mitigate such a risk, in order to protect malware becomes the gateway for attackers to reach their real themselves and their clients. target: the internal network and/or communications of the compromised employee’s companies. Figure 1: Screenshots of an e-mail and malicious file attachment used in a targeted attack Corporate espionage 12
  • 13. How a ‘watering hole’ attack works Espionage Targeted Organization www Exploit kit www Compromised Attacker Attacker gains access to computer compromised computer For companies with online resources that may be vulnerable A second, very effective method of ruining the spy’s day is to to ‘watering hole’ attacks, it is very important to invest in web use DNS whitelisting in the company‘s DNS server so that only and server security. Performing regular audits to verify that specific, approved public sites can be accessed on the user’s your web server is serving only what it should is also highly machine. This precaution directly interferes with the spy’s recommended. ability to communicate with its installed trojan(s), as well as helping to prevent information stolen from the machine being Defending against watering hole attacks does not require sent out to the attacker’s command and control (CC) server. anything new that should not already be in place to protect against more mundane web attacks which target zero day Done right, this method also has the advantage of not vulnerabilities, thereby circumventing detection-based interfering with the way most users work or browse the security coverage. A corporate security suite with behavioral Internet. At F-Secure, we maintain a list of known attack based detection should of course be a part of the protection domains potentially associated with corporate espionage. solution, as it can still provide a measure of protection by Cross-referencing this list against Alexa.com’s list of 1 million actively looking for and red-flagging suspicious behavior, most common domains showed that 99.6% of these potential rather than static reliance on known features to identify a CC sites were outside of Alexa’s top domains. malicious file. So if your organization is in possession of information that But when we consider dealing with advanced and persistent might be interesting to other companies, we recommend attackers, one layer of protection is not enough. At a a custom DNS whitelisting solution that is relaxed enough minimum, corporate users should use Microsoft’s free Exploit to allow your users to work, but still strict enough to block Mitigation Toolkit (EMET) to harden their system’s memory unknown domains. And while attackers can use CC channels handling for client applications such as web browsers, web that are trickier to block, such as Twitter or Facebook, this browser plugins and document readers. simple precaution does make it more difficult for attackers to operate. SOURCE [1] The Washington Free Beacon; Chinese Hackers Suspected in Cyber Attack on Council on Foreign Relations; published 27 Dec. 2012; http://freebeacon.com/chinese-hackers-suspected-in-cyberattack-on-council-on-foreign-relations/ Corporate espionage 13
  • 15. BotS The world of bots in 2012 In the last few years, concerted efforts by various parties to take down or hamstring the operation of botnets, which were costing millions of users control of their machines, their data and/or their money. In 2012 however, we saw the resurrection of many of these botnets, often in a more aggressive form and with new malicious products, updated ‘packaging’ or marketing and distribution strategies and more efficient money-making mechanisms. ZeroAccess Bots Of all the botnets we saw this year, definitely the fastest growing one was ZeroAccess, which racked up millions of infections globally in 2012, with up to 140,000 unique IPs in the US and Europe, as seen on the infection map at right [27]. The actual malware that turns a users’s computers into a bot is typically served by malicious sites which the user is tricked into visiting The malicious site contains an exploit kit, usually Blackhole, which targets vulnerabilities on the user’s machine while they’re visiting the site. Once the machine is compromised, the kit drops the malware, which then turns the computer into a ZeroAccess bot. The bot then retrieves a new list of advertisements from Figure 1: Google Earth map of ZeroAccess infections in the US [1]. Red markers indicate an infected unique IP address or cluster of IP addresses. ZeroAccess’s command and control (CC) server every day. The ZeroAccess botnet reportedly clicks 140 million ads a day. As this is essentially click fraud, it has been estimated that the 900 ZeuS CC servers around the world. This number may botnet is costing up to USD 900,000 of daily revenue loss to not be truly reflective of the botnet’s size, as the latest version legitimate online advertisers. Click fraud has been on the rise of Zeus includes a peer to peers protocol that maintains as the online advertisement vendors realistically have no way communication within the botnet itself, allowing a bot to fetch to differentiate between a legitimate click and a fraudulent configuration files and update from other infected hosts in the one. botnet. This feature was dubbed “Gameover” and removes the need for a centralized CC infrastructure, making it harder for Another revenue source for ZeroAccess is its ability to mine for security researchers to track the botnet. Bitcoin, a virtual currency that is managed in a peer-to-peer (P2P) infrastructure. Bitcoin miners harness the computational Apart from the introduction of the Gameover feature, the main power from the bots to perform complex calculations to find change with Zeus has been tweaks done to make the malware a missing block to verify Bitcoin transactions, and that would more user-friendly, in effect making it an attractive resource reward them in more Bitcoin currency that is agreed within even for wannabe attackers with low technical capabilities. the same peer to peer network, and these can be converted With its fancy control and administration panel, well to cash. More than half of the botnet is dedicated to mining documented manual and a builder, Zeus allows both amateur Bitcoin for profit. Further details of ZeroAccess’s profit- and expert attackers to craft, design and build executables to generating activities can be found in the case study on page 17. infect the victim computers in a very short amount of time. Citadel, the third derivative of Zeus, sets itself apart by Zeus enabling a more rapid deployment of new features and Moving on, Zeus (and its rival cum partner, SpyEye) are customization through an enhanced user interface, again with perhaps still the most talked about banking-trojans in 2012. the aim of helping novice hackers get in the game of deploying Zeus has been referred to as “the God of Do-it-Yourself their crimeware. This “dynamic config” functionality allows botnets”. Despite various takedown efforts, as of the end of botmasters to create web injections on the fly, a vital ability December 2012, The ZeuS Tracker project has seen almost in today’s online crime landscape as bots are also taken down Bots 15
  • 16. quickly. The most important feature for Citadel however is the The Carberp-infected mobile app is distributed on the Android availability of a “Customer Relationship Management” system platform, with most of the targeted users being customers of through the use of a social network platform to support European and Russian banks. As online banking continues reporting and fixing bugs. This kit is definitely professional to rise in many countries, making such online transactions grade, and we expect to see a continuous rise in infections by attractive targets to cybercriminals, banking-related botnets Citadel in the near future. such as Carberp are expected to continue growing in 2013. Carberp DorkBot Following the success of the Zeus and Spyeye, Carberp is most Then there is DorkBot, which was discovered spreading notable for making a comeback with a tweaked product and through Skype in October 2012. The malware steals user ‘marketing’ approach. First appearing in 2011 a regular data- account and passwords from FaceBook, Twitter, Netflix and Bots stealing banking malware, Carberp’s spread was temporarily various Instant Messaging (IM) channels. From an infected hampered by a takedown effort from Russian agencies in early social networking account, DorkBot sent out images to the 2012. Unfortunately, in December this botnet was discovered users’ contacts list asking the contacts if the attached image to have resurrected with a new ability to infect a computer’s was their profile pic. Falling for this cliched social engineering boot record, a component that launches even before the main tactic resulted in an executable installing a backdoor and the operating system (OS) starts, making any malware in the boot DorkBot worm on the user’s machine, which was then enrolled record harder to detect and remove. in a botnet. Carberp’s authors or operators also changed the way the Unlike previously mentioned botnets, DorkBot makes its malware was distributed in order to attract more usage from profit through ransom—literally by locking down the victim’s other malware distributors. Carberp was previously only computer, allegedly for the presence of ‘illegal content’ such available as a standalone malware through private underground as pornography or pirated music. It then demands a ‘fine’ marketplaces. Since its resurrection, Carberp has pursued a of $200 to be paid within 48 hours, failing which the victims new “malware-as-a-service” model that allows users to lease would be ‘reported to a government enforcement agency’ use of the botnet itself for prices ranging from USD 2000 to for further prosecution. DorkBot is also capable of making up to USD 10,000 a month. In addition, the buyer is offered a more money out of its infected hosts by using their combined choice of botnet configurations. The priciest format includes power to perpetrate click fraud, which incidentally creates an the bootkit functionality, which has boosted its market price attractive revenue source for the authors. to about USD 40,000. Though the prices may seem steep, this rental scheme appears to be particularly attractive to less tech-savvy users who simply want a means to an end - that is, Mobile botnets to install more trojans on more victim machines. And finally, though it is still at an embryonic stage in comparison, we are also seeing botnets operating on the Carberp has also spread to the mobile platform in the form mobile platform, specifically Android. These mobile botnets of man in the mobile attacks. For a Carberp-in-the-mobile do exactly what botnets did when they first appeared on (CitMo) attack to work, the user must have both a mobile computers - that is, generate spam. app and a computer infected with the desktop version of the Carberp malware. Once the mobile app is installed, it is The SpamSoldier malware sends SMS messages to a hundred able to intercept SMS messages containing mTAN’s (mobile Android devices (in the US) at a time. The sender has no Transaction Authorization Numbers), which are sent by idea of this activity, as the sent SMS messages are deleted banks as an authentication measure used to validate online immediately once sent, making the sky high phone bills that transactions performed by the user. The intercepted mTAN result an unpleasant surprise. These spam messages may also is then forwarded to a remote server, from which it is later contain social engineering content, including links that lead to retrieved and used by the Carberp trojan installed on the same other malware, therefore compounding the malicious effect user’s computer in order to gain access to the user’s banking of these spambots. account. SOURCE [1] F-Secure Weblog; Sean Sullivan; The United States of ZeroAccess; published 20 Sept. 2012; http://www.f-secure.com/weblog/archives/00002430.html Bots 16
  • 17. ZeRoAccess botnet malware in the wild The most profitable ZeroAccess is one of today’s most notable botnets. It was first discovered by researchers back in 2010, when it drew a lot of attention for its capability for terminating all processes related to security tools, including those belonging to anti-virus products. When too many researchers focused on this self-protection capability however, ZeroAccess’ author decided to drop the feature and focus more on improving its custom peer-to-peer (P2P) network protocol, which is unique to ZeroAccess. After the change[1] , ZeroAccess became easier to spot by anti-virus products, yet it continued to spread like wildfire around the world due to the improved P2P technique[2]. This success can be largely attributed to its affiliate program. Affiliate program: ZeroAccess success story Affiliate programs are a well-known marketing strategy and The variety of distribution schemes and methods used by the are widely used by many e-commerce websites[3]. Essentially, numerous affiliates have contributed to the volume of trojan- a business owner with an e-commerce site to promote dropper variants detected by antivirus products every day. commissions other site owners to help drive customers to All driven by the same motive which is to collect attractive ZeroAccess it (and hopefully eventually make a purchase). The website revenue share from the gang. owners are then compensated for providing these customer leads. Figure 1: A botnet operator seeking partners in an underground forum Adopting this concept, ZeroAccess’s author or operator(s) Methods used by ZeroAccess distributors has managed to distribute the program to a large number of machines with the help of its enlisted partners. Distribution methods The ZeroAccess gang advertises the malware installer in Downloader trojan Dropping a downloader trojan onto a Russian underground forums, actively looking for distributor machine, which proceeds to download partners. Their objective is to seek other cybercriminals who and install the botnet are more capable in distributing the malware and do so more Exploit kit Using an exploit kit (e.g., Blackhole) in a efficiently. drive-by-download attack Fake media file or Hosting infected files in P2P file sharing The malware distributors generally consist of experienced keygen or crack services using enticing names, such as affiliates, each of them employing their own methods of ‘microsoft.office.2010.vl.editi.keygen. distributing the Zeroaccess installers, in order to fulfill the exe’ recruiter’s requirements. P2P file sharing service Abusing a P2P file sharing website to host the ZeroAccess installer The most popular distribution methods we’ve seen involve Spam email Sending spam emails containing an exploit kits, spam e-mails, trojans-downloaders, and seeding attachment or a link that could enable fake media files on P2P file-sharing services and on video further exploitation sites, though the specific details in each case depend on the distributor handling the operations. ZeroAccess 17
  • 18. ZeroAccess botnet affiliate program structure ZeroAccess botnet operator $$$ Bitcoin mining Click fraud underground forum Distributor A Exploit kits Distributor B Victims ZeroAccess Distributor C Spam emails Downloader trojan P2P network Distributor n The partners are compensated based on a Pay-Per-Install Given the rate of pay, it is no surprise that ZeroAccess is (PPI) service scheme[4] and the rate differs depending on the widespread in the US alone[5]. After the US, the commission geographical location of the machine on which the malware rate sorted from highest to lowest are Australia, Canada, Great was successfully installed. A successful installation in the Britain, and others. Some distributors even post screenshots United States will net the highest payout, with the gang willing of the payment they’ve received in underground forums to to pay USD 500 per 1,000 installations in that location. show the reliability of their recruiter. The ZeroAccess gang can afford to pay such high incentives to its recruits because the army of bots created by the affiliate’s efforts is able to generate even more revenue in return. Once the malware is successfully installed on the victim machines, ZeroAccess will begin downloading and installing additional malware onto the machines, which will generate profit for the botnet operators through click fraud and Bitcoin mining operations. Figure 2: Proof of payments made by recruiter Botnet operators prefer the click fraud payload because since 2006 [6], it has been a proven way to generate income from the pay-per-click (PPC) or the cost-per-click advertising. ZeroAccess 18
  • 19. Zeroaccess infections, top countries Bitcoin mining has too many constraints. For instance, the success of generating a bitcoin depends on the difficulty level by percentage (%) of the target specified in the Bitcoin network and might even require some luck[7]. Furthermore, the victim’s machine needs 35% 3538+8654 to run on a decent CPU power, preferably with GPU or FPGA US hardware, in a reasonable amount of time[8]. Even with a large number of botnets, the difficulty factors in solving Bitcoin blocks hinder Bitcoin mining operation from performing as well as click fraud which only requires the victims to have an internet connection and a web browser. 38% 5% Italy Others Despite the difficulties in Bitcoin mining, the fact that the 5% Romania ZeroAccess botnet was modified to drop its problematic self-protection feature and introduce the Bitcoin mining 5% Canada operations indicates that ZeroAccess’s operators are very 6% India ambitious to keep the botnet growing and are not afraid of 8% Japan taking risks. *Based on statistics gathered from national ASN-registered networks. ZeroAccess Conclusion Given ZeroAccess’s current success as a huge, fully functional profit-generating ‘machine’, it’s unlikely that we’ll see it going zeroaccess’s profit-generating activities, away anytime soon. The ZeroAccess malware - which poses the by percentage (%) 1783 most direct threat to the users - will continue to exist as a hidden danger on malicious or boobytrapped websites. The affiliate program that encourages the spread of malware will continue 17% to attract more cybercriminals due to the botnet operators’ Bitcoin mining established reputation for reliably paying its affiliates and adjusting commission rates to maintain their attractiveness. And finally, the criminal organizations behind the botnet have demonstrated that they’re willing to experiment and modify their ‘product’ in order to increase their ability to make money. As such, we expect the ZeroAccess botnet to grow and evolve, with new features or feature updates being introduced in the near future. 83% Click fraud Sources [1] F-Secure Weblog; Threat Research; ZeroAccess’s Way of Self-Deletion; published 13 June 2012; http://www.f-secure.com/weblog/archives/00002385.html [2] F-Secure Weblog; Sean Sullivan; ZeroAccess: We’re Gonna Need a Bigger Planet; published 17 September 2012; http://www.f-secure.com/weblog/archives/00002428.html [3] Wikipedia; Affiliate Marketing; http://en.wikipedia.org/wiki/Affiliate_marketing [4] Wikipedia; Compensation Methods; http://en.wikipedia.org/wiki/Compensation_methods#Pay-per-install_.28PPI.29 [5] F-Secure Weblog; Sean Sullivan; The United States of ZeroAccess, published 20 September 2012; http://www.f-secure.com/weblog/archives/00002430.html [6] MSNBC; Associated Press; Google settles advertising suit for $90 million; published 8 March 2006; http://www.msnbc.msn.com/id/11734026/#.ULiDyN2sHvA [7] Bitcoin Wiki; Target; http://en.bitcoin.it/wiki/Target [8] Wikipedia; Bitcoin; http://en.wikipedia.org/wiki/Bitcoin ZeroAccess 19
  • 20. ZEROACCESS INFECTIONS In the USA, Japan, and europe* ZeroAccess Europe USA japan *Red markers indicate an infected unique IP address or cluster of IP addresses. ZeroAccess 20
  • 21. Zeus robbing banks in modern times Zeus makes up a significant portion of banking trojans; it compromises millions of computers around the world and causes millions of dollars in loss to its victims. In a typical operation, Zeus modifies a targeted webpage to collect valuable information. For example, adding a part that requests potential victims to enter additional login details or personal information when they visited the webpage. The information is later used to access the victims’ online account and to perform unauthorized transactions. P2P Zeus geography Of all derivatives and variants, the peer-to-peer (P2P) version Web-Injection Targets by country is particularly special because it is private and forms only one large botnet. Other derivatives usually consist of numerous yet smaller botnets, each run by someone who has purchased 88 a version of Zeus. From late August to mid-November 2012, we monitored the P2P bots and tracked the websites that they had targeted to compromise with web injections. The targeted sites were defined by a configuration data that the 47 bots received from other infected machines, and is stored in encrypted form to the Windows registry. 23 18 15 The configuration data revealed that a total of 644 unique 14 11 10 URLs were targeted for web-injections during the monitoring Zeus period, with a special focus on sites based in North America. Not all of these URLs included the domain names. Sometimes, USA Canada Italy Poland Saudi Arabia UAE Germany Rest of the world only the path is used for identifying a targeted website. And many domains had several different URLs leading to them, using different paths. After excluding URLs with missing domain names and duplicate domains, a total of 243 unique domains were left. In summary, the targeted websites can be categorized into the following types: • Personal online banking When it comes to the number of machines infected with P2P • Corporate online banking (mainly for North American Zeus, the US leads the pack followed by Italy. This number small businesses) was based on 5395 random samples analyzed between July to • Investment and online trading sites November. After the US and Italy, no other countries in the • Credit card services subsequent positions really stand out from the pack as the • Extremely popular global websites (e.g. Amazon, eBay, difference in the number of infection varies only slightly. Facebook, etc.) Geographically, North America is the primary focal point of Top-10 countries with the most P2P Zeus P2P Zeus botnet where it targeted 88 US-based websites and infections 23 Canadian-based websites. Several European countries were also hot targets for web-injection. In the configuration data, entries involving Italian websites were actively added, removed country unique ips % of all ips or changed; throughout the changes, Italy still remains as one USA 1809 33.53% of the favorite targeted countries. Poland started to creep into Italy 439 8.14% one of the top spots when 15 Polish sites were added to the Germany 205 3.80% targeted list in September and October when there were none Georgia 203 3.76% listed in August. A real surprise from the findings is the number Mexico 179 3.32% of targeted Middle Eastern banks as compared to the number Canada 168 3.11% of infections in the same area. zeus 21
  • 22. country unique ips % of all ips Different derivatives (i.e. Citadel, Ice IX, and P2P) that popped up after the original Zeus 2 source code was leaked online have India 167 3.10% received drastically different commands since then. These Brazil 143 2.65% commands provide a good indication of the development Romania 133 2.47% pace of each derivative. Citadel leads with 20 new commands Taiwan 110 2.04% while Ice IX only received one, making it the closest version to the leaked version 2.0.8.9. For Citadel and Ice IX, the earliest date listed on each respective table was also the date when we Every month, the US and Italy were consistently positioned at ran into the first sample of the derivative. For the P2P variant the top in terms of infection numbers. When Polish sites started however, we received the first sample on 3rd September 2011 to become targets, the number of infection in Poland more but only saw the first changes to the backdoor commands six than doubled but this number only accounted for two percent months later. of the total amount even at its highest point in November. The tables below list all new commands that are callable. Some of these may not implement any action and we did not track PERCENTAGEs (%) OF INFECTED IPs any possible changes in the behavior of each command. Please take note that the dates used in the tables were based on when 80% we first received the sample with that particular command rather than when the Zeus author rolled out the changes. 70% 60% Callable commands in the Zeus botnet 50% Poland P2P Variant Taiwan Commands First seen Zeus Mexico fs_find_by_keywords ** 2012-03-30 40% India fs_find_add_keywords 2012-04-09 fs_find_execute 2012-04-09 30% Canada fs_pack_path 2012-05-24 Germany ddos_address 2012-05-24 20% Georgia ddos_execute 2012-05-24 Italy ddos_type 2012-05-24 10% USA ddos_url 2012-05-24 ** fs_find_by_keywords was a short lived command in the P2P JUL AUG SEP OCT NOV variant; it was last seen in a sample received on 3rd April 2012. Citadel Earlier this year, Dell SecureWorks Counter Threat Unit[3] was Commands First seen able to connect to approximately 100,000 P2P Zeus bots. dns_filter_add 2011-12-10 Using this number as a minimum botnet size, we can say that dns_filter_remove 2011-12-10 the most affected Internet Service Providers (ISPs) could have several thousand of P2P Zeus infections on their customers’ url_open 2012-02-12 machines. module_download_disable 2012-05-07 module_download_enable 2012-05-07 module_execute_disable 2012-05-07 New backdoor commands in Zeus derivatives module_execute_enable 2012-05-07 Zeus capability is not limited to serving as a banking trojan info_get_antivirus 2012-05-07 only. Since the beginning of its release, it has always contained info_get_firewall 2012-05-07 some backdoor features that are controlled by simple scripts info_get_software 2012-05-07 as ordered by the botnet owner. These scripts are delivered ddos_start 2012-07-03 to infected machines through command and control (CC) servers. zeus 22
  • 23. Citadel Zeus 2 Timeline of Notable Events Commands First seen ddos_stop 2012-07-03 01.04.2010 Birth of Zeus 2.0.0.0 close_browsers 2012-09-11 xx.10.2010 SpyEye author received Zeus source code[1] webinjects_update 2012-09-11 download_file 2012-09-11 search_file 2012-09-11 tokenspy_update 2012-09-11 upload_file 2012-09-11 xx.04.2011 Earliest known date of Ice IX debut[2] tokenspy_disable 2012-10-06 bot_transfer 2012-10-06 xx.05.2011 Zeus 2.0.8.9 source code leaked online xx.08.2011 First public sale of Ice IX on the internet Ice IX 03.09.2011 Earliest P2P Zeus variant identified by FS Commands First seen Labs bot_update_exe 2011-11-03 05.09.2011 First P2P Zeus backup domain registered 03.11.2011 Earliest Ice IX sample identified by FS Labs Besides being used as a banking trojan, some Zeus botnets may now also be used to perform distributed denial of service xx.11.2011 P2P gang started incorporating DDoS (DDoS) attacks on targeted websites where interested parties attack in their operations[3] can rent a botnet from the controller for certain fees. As can be seen from the new backdoor commands, both the Citadel xx.12.2011 First date of Citadel identification[4] Zeus and the P2P versions received the DDoS features during the summer, but the reason behind the P2P feature update may 10.12.2011 Earliest Citadel sample seen by FS Labs be different. According to Dell SecureWorks Counter Threat Unit[3], the crew running the P2P variant used DDoS attacks to prevent victims of banking trojans from accessing their online banking accounts until the fraudulent transactions had been completed. Thus reason for the DDoS feature update may be 30.03.2012 First change made to P2P Zeus backdoor to stop having to rent a third party botnet kit that the gang commands had been using to conduct attacks that took place between November 2011 and summer 2012. 07.05.2012 Citadel received backdoor commands to control additional modules 14.05.2012 A custom Zeus 2 variant that includes ransomware features found 24.05.2012 DDoS feature added to P2P Zeus 03.07.2012 DDoS feature added to CItadel SOURCES [1] KrebsonSecurity; Brian Krebs; SpyEye v. ZeuS Rivalry Ends in Quiet Merger; published 24 Oct 2010; http://krebsonsecurity.com/2010/10/spyeye-v-zeus-rivalry-ends-in-quiet-merger/ [2] RSA FraudAction Research Labs; New Trojan Ice IX Written Over Zeus’ Ruins; published 24 Aug 2011; http://blogs.rsa.com/rsafarl/new-trojan-ice-ix-written-over-zeus-ruins/ [3] Dell SecureWorks; Brett Stone-Goss; The Lifecycle of Peer-to-Peer (Gameover) ZeuS; published 23 Jul 2012; http://www.secureworks.com/cyber-threat-intelligence/threats/The_Lifecycle_of_Peer_to_Peer_Gameover_ZeuS/ [4] Seculert Blog; Citadel - An Open-Source Malware Project; published 8 Feb 2012; http://blog.seculert.com/2012/02/citadel-open-source-malware-project.html zeus 23
  • 24. The complete infographic can be viewed at http://bit.ly/How2RobBanks
  • 25. Exploits Top Targeted Vulnerabilities in 2012 In 2012, we saw the exploitation of known vulnerabilities in These then are the most commonly targeted CVE a popular program or the operating system become one of vulnerabilities of 2012: the most popular, if not the most popular, technique used by malware distributors, hackers and attackers in order to gain CVE-2011-3402 access to or control of a user’s machine. A vulnerability in the TrueType font parsing engine used in the kernel drivers of various Microsoft Windows operating system From the normal user’s perspective, the most likely scenario in versions (including XP, Windows Vista and Windows 7) allows which they are likely to encounter an attempted vulnerability remote attackers to run arbitrary code on a user’s machine. exploit of their machine is through visiting a malicious or The attack uses a Word document or web page containing compromised website. Though some attacks continue to use specially crafted malicious font data. More information on this tried-and-true social engineering tactics, which require an vulnerability can be found on the infographic on page 27. element of deception and are relatively easy for an alert user to spot (“Click this link for free stuff!” or “Download this codec CVE-2010-0188 to view this tantalizing video!”), in more sophisticated attacks A vulnerability in Adobe Reader and various versions of users are unlikely to see any overt signs that an attack has Adobe Acrobat allows attackers to use a specially crafted PDF taken place at all; instead, their machine is quickly and silently document to force the application to crash, causing a denial of compromised during the short period it was exposed to the service. According to reports, the attack document is also able malicious or compromised website. to drop a malicious file onto the compromised system, which then connects to a remote site for further instructions. In some cases, the attack is tailored specifically to target a particular set of users. Targeted user groups are typically CVE-2012-4681 either the users of specific banks (making the attack a case of Vulnerabilities in the Java Runtime Environment (JRE) running monetary theft) or users employed by a specific company or in web browsers allow attackers to use a specially crafted in a specific field (essentially corporate or political espionage, applet to run arbitrary code on the compromised machine. exploits see the Corporate Espionage case study on page 12). These Users are most commonly exposed to the malicious applet targeted attacks are hardly new—we’ve seen cases of spear when they are directed (either through social engineering or phishing come and go over the years. The main change poisoned search results) to a malicious webpage hosting the that we’ve seen in the last few years is that rather than attack applet. depending on the user to download an infected attachment or enter sensitive data into a malicious page masquerading as CVE-2012-5076 a legitimate portal, the attacks now make use of exploits and/ A vulnerability in the JRE component of Oracle Java SE 7 Update or exploit kits to directly compromise the user’s machine, 7 and earlier allows attackers to use a specially crafted applet without needing any action from the user. to run arbitrary code on the compromised machine, usually to download additional malicious files onto it. In 2012, we saw a wide range of exploits being used to target known vulnerabilities, but surprisingly, statistics from F-Secure’s cloud lookup systems indicate that in most CVE-2012-0507 countries, the majority of exploits detected were related to A vulnerability in the AtomicReferenceArray of various versions only four vulnerabilities, all reported within the last two years of Oracle Java allows attackers to essentially breach the and designated with official Common Vulnerabilities and ‘sandbox’ or contained environment of the Java installation, Exposure (CVE) identifiers. The preference for targeting these permitting the attacker to perform malicious actions on the four vulnerabilities may be related to the fact the some of the affected machine. most popular exploit kits of today, particularly BlackHole and Cool Exploit, have incorporated the exploits targeting these CVE-2012-1723 vulnerabilities into their capabilities. Ironically, most of these A vulnerability in the Java HotSpot VM in the JRE component vulnerabilities have already had security updates or patches of various versions of Oracle Java allows attackers to essentially released by the relevant software vendors. Two other Java- breach the ‘sandbox’ or contained environment of the Java specific vulnerabilities, though nowhere near as frequently installation, permitting the attacker to perform malicious targeted as the first four, also saw enough attacks to be worth actions on the affected machine. noting. exploits 25
  • 26. Netherlands Belgium Exploit Prevalence: Exploit Prevalence: 139 2011-3402 2012-4681 121 2011-3402: 39% 2011-3402 2011-3402: 36% 2010-0188: 32% 2010-0188 2010-0188: 35% 2012-4681: 17% 2012-5076 2012-4681: 16% 2012-5076: 9% 2012-5076: 11% 2012-4681 2010-0188 Sweden Exploit Prevalence: 2010-0188 102 2012-4681 2011-3402 2012-5076 2011-3402: 31% 2010-0188: 29% 2012-5076 2012-4681: 29% 2012-5076: 9% infographic These were the top 10 countries that saw the most exploits Most Targeted CVE Vulnerabilities, targeting known CVE vulnerabilities in H2 2012, ranked by Exploit Prevalence, which is calculated as the count of CVE- Top 10 Countries related detections reported per 1,000 users in the country for H2 2012 that time period. For example, during H2 2012, our systems recorded a CVE-related exploit detection for 139 of every 1,000 users in the Netherlands. Also listed are the top 4 CVE vulnerabilities targeted in each country, as well as their relative percentage of all CVE-related detections from that country. 2010- 2012-4681 2010-0188 2010-0188 2012- 0188 4681 2011- 2012- 2012- 3402 2012-4681 2012- 2011-3402 5076 2011-3402 5076 5076 Italy Germany France Exploit Prevalence: 88 Exploit Prevalence: 78 Exploit Prevalence: 69 2010-0188: 38% 2012-4681: 32% 2011-3402: 32% 2012-4681: 29% 2010-0188: 26% 2010-0188: 28% 2011-3402: 22% 2011-3402: 22% 2012-4681: 24% 2012-5076: 8% 2012-5076: 15% 2012-5076: 13% 2011-3402 2010-0188 2010-0188 2012-5076 2012-4681 2012- 2010- 2012-5076 2012-5076 4681 0188 2010- 2011- 0188 2011-3402 2011- 2012- 3402 4681 3402 2012-5076 2012-4681 US UK Poland Finland Exploit Prevalence: Exploit Prevalence: Exploit Prevalence: Exploit Prevalence: 87 67 61 45 2012-4681: 47% 2011-3402: 30% 2010-0188: 35% 2010-0188: 33% 2012-5076: 25% 2012-4681: 28% 2012-5076: 24% 2012-5076: 25% 2011-3402: 16% 2010-0188: 28% 2011-3402: 21% 2011-3402: 21% 2010-0188: 9% 2012-5076: 11% 2012-4681: 16% 2012-4681: 17%
  • 27. infographic Belgium Sweden 34 72 56 Netherlands CVE-2011-3402 UK 21 11Denmark USA 16 13 Poland 17 Germany 25 19 Czech Republic Most Exploited Users, 25 Austria 27 France Top 15 Countries Greece Calculated as the count of CVE-2011-3402- related detections per 1,000 users in the country, as seen by F-Secure’s cloud lookup 15 Switzerland 40 Spain systems in H2 2012. For example, in Belgium, 21 Italy 72 out of every 1,000 users reported seeing a CVE-2011- 3402-related detection in the second half of the year. 2% Blackhole 11% The Cool (kit) factor 11 Others In H2 2012, most of the malicious First reported in 2011, the term CVE-2011-3402 refers to a Cool sites we saw with the CVE-2011- 87% vulnerability in the Windows operating system component 3042 exploit were using the Cool that handles TrueType fonts. Exploit kit to attack unsuspecting site visitors. Shortly afterwards, an exploit became public that took advantage of this vulnerability to, among other things, install malware onto the affected system. +87+2+ 34% The exploit was first used in the Duqu malware, which Germany 26% 26% Ukraine only targeted specific organizations in certain countries. France Russia USA In October 2012, the exploit was added to the Cool UK Exploit kit, and shortly after to 5 other kits as well. It quickly became one of the most common exploits seen by normal The Euro zone computer users in H2 2012. 60% percent of malicious sites hosting kits with the CVE-2011-3042 exploit were registered to just 2 countries: France and Germany. CVE-2012-4681 1000= CVE-2011-3402 980= CVE-2010-0188 950= The greatest hits Despite being relatively new, of all CVE-related hits CVE-2012-5076 500= logged by F-Secure’s cloud lookup systems in H2 2012, CVE-2012-0507 100= CVE-2011-3402-related detections were the second most frequent. 135 000