Malware 5
Malware 5
Key Terms
Malware is malicious software or code that typically takes control of, collects information
from, or damages an infected endpoint. Malware broadly includes viruses, worms, Trojan
horses (including remote access Trojans, or RATs), ransomware, anti-AV, logic bombs,
backdoors, rootkits, bootkits, spyware, and (to a lesser extent) adware.
An exploit is a small piece of software code, part of a malformed data file, or a sequence
(string) of commands that leverages a vulnerability in a system or software, causing
unintended or unanticipated behavior in the system or software.
A vulnerability is a bug or flaw that exists in a system or software and creates a security risk.
Malware
Malware is malicious software or code that typically takes control of, collects information from, or damages an
infected endpoint. Malware broadly includes:
Viruses. A virus is malware that is self-replicating but must first infect a host program and be executed by a
user or process.
Worms. A worm is malware that typically targets a computer network by replicating itself to spread
rapidly. Unlike viruses, worms do not need to infect other programs and do not need to be executed by
a user or process.
Trojan horses. A Trojan horse is malware that is disguised as a harmless program but actually gives an
attacker full control and elevated privileges of an endpoint when installed. Unlike other types of
malware, Trojan horses are typically not self-replicating.
Anti-AV. Anti-AV is malware that disables legitimately installed antivirus software on the compromised
endpoint, thereby preventing automatic detection and removal of other malware.
Logic bombs. A logic bomb is malware that is triggered by a specified condition, such as a given date or a
particular user account being disabled.
Backdoors. A backdoor is malware that allows an attacker to bypass authentication to gain access to a
compromised system.
Rootkits. A rootkit is malware that provides privileged (root-level) access to a computer. Rootkits are
installed in the BIOS of a machine, which means operating system-level security tools cannot detect
them.
Bootkits. A bootkit is malware that is a kernel-mode variant of a rootkit, commonly used to attack
computers that are protected by full-disk encryption.
Spyware and adware. Spyware and adware are types of malware that collect information, such as internet
surfing behavior, login credentials, and financial account information on an infected endpoint. Spyware
often changes browser and other software settings, and slows computer and internet speeds on an
infected endpoint. Adware is spyware that displays annoying advertisements on an infected endpoint,
often as pop-up banners.
Key Terms
A boot sector virus targets the boot sector or master boot record (MBR) of an endpoint’s
storage drive or other removable storage media.
A boot sector contains machine code that is loaded into an endpoint’s memory by firmware
during the startup process, before the operating system is loaded.
A master boot record (MBR) contains information about how the logical partitions (or file
systems) are organized on the storage media and an executable boot loader that starts up
the installed operating system.
A floppy disk is a removable magnetic storage medium commonly used from the mid-1970s
until about 2007, when it was largely replaced by compact discs and removable USB storage
devices. Floppy disks were typically available in 8-inch, 5¼-inch, and 3½-inch sizes with
capacities from 90 kilobytes to 200 megabytes.
The first computer virus was Elk Cloner, written in 1982 by a ninth-grade high school student near Pittsburgh,
Pennsylvania. Elk Cloner was a relatively benign boot sector virus that displayed a poem on the fiftieth time
that an infected floppy disk was inserted into an Apple II computer.
The first PC virus was a boot sector virus, written in 1986, called Brain. Brain was also relatively benign and
displayed a message with the actual contact information for the creators of the virus. Brain was written by two
Pakistani brothers who created the virus so that they could track piracy of their medical software.
One of the first computer worms to gain widespread notoriety was the Morris worm, written by a Harvard and
Cornell University graduate student, Robert Tappan Morris, in 1988. The worm exploited weak passwords and
known vulnerabilities in several Unix programs and spread rapidly across the early internet (the worm infected
up to an estimated 10 percent of all Unix machines connected to the internet at that time – about 6,000
computers), sometimes infecting a computer numerous times to the point that it was rendered useless – an
example of an early DoS attack. The U.S. Government Accountability Office (GAO) estimated the damage
caused by the Morris worm between US$100,000 and US$10 million.
Unfortunately, more than 35 years since these early examples of malware, modern malware has evolved and
is used for far more sinister purposes. Examples of modern malware include:
WannaCry. In a period of just 24 hours in May 2017, the WannaCry ransomware attack infected more than
230,000 vulnerable Windows computers in more than 150 countries worldwide. Although the attack
was quickly halted after the discovery of a “kill switch,” the total economic damage is estimated
between hundreds of millions to as much as US$4 billion, despite the perpetrators collecting only 327
ransom payments totaling about US$130,000.
HenBox. HenBox typically masquerades as legitimate Android system and VPN apps, and sometimes drops
and installs legitimate versions of other apps as a decoy. The primary goal of the HenBox apps appears
to be to spy on those who install them. By using traits similar to legitimate apps, for example, copycat
iconography and app or package names, HenBox lures victims into downloading and installing the
malicious apps from third-party, non-Google Play app stores that often have fewer security and vetting
procedures for the apps they host. As with other Android malware, some apps may also be available on
forums or file-sharing sites, or even may be sent to victims as email attachments.
TeleRAT. Telegram Bots are special accounts that do not require an additional phone number to set up
and are generally used to enrich Telegram chats with content from external services or to get
customized notifications and news. TeleRAT abuses Telegram’s Bot API for C2 and data exfiltration.
Key Terms
A dynamic-link library (DLL) is a type of file used in Microsoft operating systems that enables
multiple programs to simultaneously share programming instructions contained in a single
file to perform specific functions.
Modern malware is typically stealthy and evasive, and now plays a central role in a coordinated attack against
a target.
Advanced malware leverages networks to gain power and resilience, and can be updated – just like any other
software application – so that an attacker can change course and dig deeper into the network or make
changes and enact countermeasures.
This is a fundamental shift compared to earlier types of malware, which were generally independent agents
that simply infected and replicated themselves. Advanced malware increasingly has become a centrally
coordinated, networked application in a very real sense. In much the same way that the internet changed
what was possible in personal computing, ubiquitous network access is changing what is possible in the world
of malware. Now all malware of the same type can work together toward a common goal, with each infected
endpoint expanding the attack foothold and increasing the potential damage to the organization.
Distributed, fault-tolerant architecture. Advanced malware takes full advantage of the resiliency built into
the internet itself. Advanced malware can have multiple control servers distributed all over the world
with multiple fallback options, and can also leverage other infected endpoints as communication
channels, thus providing a near infinite number of communication paths to adapt to changing
conditions or update code as needed.
Multifunctionality. Updates from C2 servers can also completely change the functionality of advanced
malware. This multifunctional capability enables an attacker to use various endpoints strategically to
accomplish specific desired tasks, such as stealing credit card numbers, sending spam containing other
malware payloads (such as spyware), or installing ransomware for the purpose of extortion.
Obfuscation. Advanced malware often uses common obfuscation techniques to hide certain binary strings
that are characteristically used in malware and therefore are easily detected by anti-malware
signatures, or to hide an entire malware program.
Key Terms
Polymorphism alters part of the malware code with every iteration, such as the encryption
key or decryption routine, but the malware payload remains unchanged.
Metamorphism uses more advanced techniques than polymorphism to alter malware code
with each iteration. Although the malware payload changes with each iteration – for
example, by using a different code structure or sequence or by inserting garbage code to
change the file size – the fundamental behavior of the malware payload remains unchanged.