Understanding Trojans, Backdoors, Rootkits, Viruses, and Worms: Definitions and Examples
This chapter explores key types of malicious software, including Trojans, backdoors, rootkits, viruses, and worms. Trojans masquerade as benign software to deliver harmful code, while backdoors provide unauthorized access to systems. Rootkits hide malware by modifying the operating system. Viruses replicate by attaching themselves to other files, and worms spread across networks autonomously. We’ll discuss examples like the Melissa virus and the origins of various Trojans. Understanding these threats is crucial for effective cybersecurity.
Understanding Trojans, Backdoors, Rootkits, Viruses, and Worms: Definitions and Examples
E N D
Presentation Transcript
Chapter 5 Trojans, Backdoors, Rootkits Viruses, and Worms
Definitions • Trojans: Programs that hide malicious code • Backdoor: Way of accessing a computer without the security and authentication procedures that are normally required • Rootkit: Modify the OS to conceal malicious programs while they run • Virus: self-replicating (within a machine) by producing its own code; attach copies of itself to other executable code • Worm: infects local and remote machines; spread automatically
Some overlap • Example: Melisa “Virus” (1999) • Trojan: entered computers by masquerading as an email • Virus: infected word processing files when opened • Worm: used Outlook to spread itself to user’s personal address book
Trojans and Backdoors • Trojan: • Malicious program disguised as something benign • Often delivered as part of a “wrapper” process • Examples: • BackOrifice: 31337 or 31338 – “Cult of the Dead Cow” • NetBus: 12345, 12346, 20034 • Whack-a-mole: 12361 or 12362 • Delivered via: • NetBIOS remote install • Fake executables • ActiveX controls, VBScript, Java scripts • Spyware / Adware
Trojans and Backdoors • Backdoor • Allows access to the system • Often delivered via a Trojan • May install a new service, or use an unused existing service • Remote Access Trojan (RAT)
Overt & Covert Channels • Overt: normal and legitimate use • Covert: using programs in unintended way • Tunneling is a good way for Trojans to bypass IDS • Port redirectors: modify which ports are used • Datapipe (Linux) • Fpipe (Windows) • Port analyzing • Fport: • Identify unknown open ports and their associated applications
Types of Trojans • Remote Access Trojans (RATs) • Data-Sending Trojans • Collect passwords & other confidential data • Eg: eBlaster • Destructive Trojans: destroy files or OS • DoS Trojans: cause DoS attack • Proxy Trojans: help hacker hide • FTP Trojans: connect via port 21 • Security Software Disabler Trojans • FireKiller 2000
Reverse Connecting Trojans • External attacker accesses internal systems • QAZ: 7597 • Replaces Notepad.exe with Note.com • Tini: 7777; Windows Backdoor trojan allowing command prompt to anyone who connects • Donald Dick: 23476 or 23477 • NetBus: 12345, 12346, 20034, 23476 • Netcat: allows telnet session • Sample command: nc –L –p 5000 –t –e cmd.exe • SubSeven • BackOrifice 2000: 31337 • Firekiller 2000
Symptoms of Trojans • Programs auto starting and running • Screen flips • Sudden reduction in system resources • Corrupt or missing files • CD-ROM drawer opens and closes • Wallpaper, background, etc changes • Unexpected/suspicious Web sites • Mouse moves by itself or pointer disappears • Taskbar disappears • Task Manager is disabled
Scanning for Trojans • netstat –an • Back Orifice UDP 31337, 31338 • Deep Throat UDP 2140, 3150 • NetBus TCP 12345, 12346 • Whack-a-Mole TCP 12361, 12362 • NetBus 2 TCP 20034 • GirlFriend TCP 21544 • Sockets de Troie TCP 5000, 5001, 50505 • Masters Paradise TCP 3129, 40421, 40422 • 40423, 40426
Scanning for Trojans • Devil TCP 65000 • Evil TCP 23456 • Doly Trojan TCP 1011, 1012, 1015 • Chargen UDP 9, 19 • Stealth Spy Phaze TCP 555 • NetBIOS datagram TCP, UDP 138 • Sub Seven TCP 6711, 6712, 6713 • ICQ Trojan TCP 1033 • MStream UDP 9325
Scanning for Trojans • The Prayer 1.0 – 2.0 TCP 9999 • Online KeyLogger UDP 49301 • Portal of Doom TCP,UDP 10067, 10167 • Senna Spy TCP 13000 • Trojan Cow TCP 2001
Netcat • Features: • Firewall testing, port scanning, create backdoor, identify services • Command line interface opens TCP and UDP • -d: detach from the console • -l –p [port]: creates a listening TCP port • -z: port scanning • -v: verbose mode • -e: run at any time • -L: auto restart after dropped connection • -u: switches to UDP
Wrappers (Glueware) • Three things needed: • Legitimate Program • Trojan Program • Wrapper Program • Bundle Trojans with legitimate software • Trojan Man • Yet Another Binder • Predator Wrapper • Graffiti • EXE Maker • Restorator
Trojan Countermeasures • Spyware detectors • Malwarebytes • Norton Internet Security • Fport • Tripwire • Check file signature, size, integrity • Dsniff: contains Trojans, collection of hacking tools • Windows Built-in Commands • Sigverif • SFC (system file checker): sfc /scannow • “What’s Running” or “What’s on My Computer?” • Be wary of free cleaning applications
Viruses and Worms • International Computer Security Association (ICSA) • Sets standards for AV software • Virus: infects another file and spreads • Worm: • Does not need a carrier program • Often exists inside other files (like Word or Excel) • Examples: Nimda, I Love You
Virus Types • Polymorphic: change signature to avoid detection – eg: Virut (requires reformat) • Stealth: hide • File: infects files that can load/execute (.exe, .com, .bin, .sys) • Armored: encrypted • Boot Sector: modifies master boot files • System Sector: affect the executable code of the disk • Program: infect .BIN, .COM, .EXE, .SYS files
Virus Types • Macro: perform a sequence of actions when a particular app is triggered; eg: Excel • Tunneling: tunnel under antivirus software and hide • Multipartite: affects multiple targets • Dual Payload: • Eg: Chernobyl: changes 1st MB of HD to zero; replaces code of BIOS to garbage • Network: run code on remote systems • Source Code: not common, very hard to write due to different compilers and languages
Writing a Virus • Example: • Batch file called Game.bat • text @ echo off • delete c:\windows\system32\*.* • delete c:\windows\*.* • Convert Game.bat to Game.com with ‘bat2com’ utility • Assign an icon with Windows file properties screen • Send as email attachment
Virus Constructions Kits • Kefi’s HTML Virus Construction Kit • Virus Creation Laboratory v1.0 • The Smeg Virus Construction Kit • Rajaat’s Tiny Flexible Mutator v1.1 • Windows Virus Creation Kit v1.00
Detecting Viruses & Worms • Scanning with UP TO DATE scanner • Use Sheep Dip or SocketShield • Isolate one computer from the network and run downloaded software there first • Integrity checking • Tripwire • With MD5 • Downside: can’t detect differences made by virus versus a bug • Testing antivirus software • EICAR.com • X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*