{"id":199,"date":"2016-06-29T08:12:36","date_gmt":"2016-06-29T08:12:36","guid":{"rendered":"http:\/\/www.volucer.it\/?p=199"},"modified":"2016-06-29T09:13:30","modified_gmt":"2016-06-29T09:13:30","slug":"malicious-software-sophistication-mass","status":"publish","type":"post","link":"https:\/\/www.volucer.it\/?p=199","title":{"rendered":"MAlicious Software Sophistication (MASS)"},"content":{"rendered":"<p><em>Strong interests in the cyberspace produce lots of highly sophisticated malicious software.<\/em><\/p>\n<p><strong>CYBERSPACE INHABITANTS<\/strong><br \/>\nTo enter the cyberspace means to probably be the target of thieves, hackers, activists, terrorists, nation-states cyber warriors and foreign intelligence services. In this scenario the strong competition in cybercrime and cyberwarfare continuously brings an increasing proliferation of malicious programs and an increment in\u00a0their level of sophistication.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>MALWARE PROLIFERATION<\/strong><\/p>\n<p>According to the data published by the major antivirus companies we have an average of 400000 new malware samples every day.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-200\" src=\"http:\/\/www.volucer.it\/wp-content\/uploads\/2016\/06\/NewMalwarePerDay.png\" alt=\"Malware per Day\" width=\"774\" height=\"459\" srcset=\"https:\/\/www.volucer.it\/wp-content\/uploads\/2016\/06\/NewMalwarePerDay.png 774w, https:\/\/www.volucer.it\/wp-content\/uploads\/2016\/06\/NewMalwarePerDay-300x178.png 300w, https:\/\/www.volucer.it\/wp-content\/uploads\/2016\/06\/NewMalwarePerDay-768x455.png 768w\" sizes=\"auto, (max-width: 774px) 100vw, 774px\" \/><\/p>\n<p>This data could be a little bit inflated by the antivirus companies but if we consider as true only the 2% of 400000, this means that we have 8000 new strains of computer malware per day in the wild.<\/p>\n<p>Today it is impossible to live without digital technology, which is the base of digital society where governments, institutions, industries and individuals operate and interact in the everyday life.<\/p>\n<p>So, to face the high-profile data breaches and ever increasing cyber threats coming from the same digital world, huge investments in information security are made around the world (according to Gartner in 2015 the spending was of above $75.4 billions).<\/p>\n<p>But the security seems an illusion after hearing about the result of a research made at Imperva, a data security research firm in California.<br \/>\nA group of researchers infected a computer with 82 new malwares and ran against them 40 threat-detection engines of the most important antivirus companies.<br \/>\nThe result was that only 5 percent of the malwares was detected. This means that even if the antivirus software is almost useless for fighting new malwares, it is necessary to protect us from the already known ones by increasing\u00a0the level of security and protection.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>EVERYONE COULD BE A TARGET<\/strong><\/p>\n<p>In the leakage involving\u00a0Twitter on June 8th 2016 user accounts have been hacked, but not on Twitter's servers. This means that 32.888.300 users have been singularly hacked by a Russian hacker. This is amazing and underlines how easy it is to guess the users' passwords and to infect users' computers in order to steal users' credentials.<br \/>\nThe password frequencies in the following chart show how users don\u2019t pay too much attention to the passwords they use. In the chart we consider only the first 25th most used passwords. The statistic is done on 20210641 user accounts released from several leakages [04].<br \/>\nThey probably think: why should I be hacked? I\u2019m a normal ordinary guy, who cares about\u00a0me? But what it is important for a bad guy is to get some profit. So, a huge quantity of accounts to sell in the dark market is a good reason to steal every Twitter user's credentials. In fact, the amount is the key factor which attracts the buyer.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-201\" src=\"http:\/\/www.volucer.it\/wp-content\/uploads\/2016\/06\/MostUsedPassword.png\" alt=\"Most Used Password\" width=\"776\" height=\"571\" srcset=\"https:\/\/www.volucer.it\/wp-content\/uploads\/2016\/06\/MostUsedPassword.png 776w, https:\/\/www.volucer.it\/wp-content\/uploads\/2016\/06\/MostUsedPassword-300x221.png 300w, https:\/\/www.volucer.it\/wp-content\/uploads\/2016\/06\/MostUsedPassword-768x565.png 768w\" sizes=\"auto, (max-width: 776px) 100vw, 776px\" \/><\/p>\n<p>Even if the chameleon attacks or the werewolf attacks are able to bypass easily the antivirus defense, it is important to pay\u00a0more attention to our access keys to prevent\u00a0the leakage of this huge quantity of user accounts because, I think, most of Twitter user accounts are simply guessed by the bad guy.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>MALICIOUS SOFTWARE ANALYSIS<\/strong><\/p>\n<p>Malicious Software is characterized by four components:<\/p>\n<ul>\n<li>propagation methods,<\/li>\n<li>exploits,<\/li>\n<li>payloads,<\/li>\n<li style=\"text-align: justify;\">level of sophistication.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Propagations<\/strong> are the means of transportation of malicious code from the origin to the target. The propagation methods depend on scale and specificity. The target may be consituted by machines\u00a0connected to the internet (<em>large scale<\/em>) this could mean for example that someone tries to create a bot-net. Or the target could be a small area network (<em>small scale<\/em>), for example if a company is going to be attacked for some reason.<br \/>\n<em>Specificity<\/em> could be connected to constraints placed on malicious code. If they are based on technical limitations they could be a particular operating system or a software version. If they are based on personal information they could be account credentials, details about co-workers or the presence of certain filenames on the victim's machine.<br \/>\nThe level of propagation is directly proportional to the probability of detection and the limitation of defensive response.<\/p>\n<p><strong>Exploits<\/strong> act to enable the propagation method and payloads operation.<br \/>\nThe exploit severity is indicated by the score (CVSS) assigned to a vulnerability.<\/p>\n<p>The <strong>payloads<\/strong> is code written to manipulate system resources and create some effect on a computer system.<br \/>\nWe can see that, today, there is an increase in\u00a0the level of payload customization. We have payload for a web server, for a desktop computer, for a Domain Controller, for a smart phone, and so on. Every payload is tailored to a specific target in order to be very small and guarantee the maximum likelihood of success.<\/p>\n<p>The level of <strong>sophistication<\/strong> of a malicious code can speak and tell us some useful information. MAlicious Software Sophistication analysis is an approach that can be used to figure out who is behind it: individuals, groups, organizations or states.<br \/>\nIn this scenario we have, from one side generic malwares that are created by individuals or a small group who generally makes use of third-party exploit kits like <em>Blackhole Exploit Kit<\/em> [05], from the other side we have organizations or states with greater resources who can develop innovative attack methods and new exploits like Duqu 2.0 [06] the Most Sophisticated Malware ever seen.<\/p>\n<p>&nbsp;<\/p>\n<p>The power between attacker and defender is strongly asymmetric. The defender needs huge quantities of resources to defend himself, even because he should operate in a proactive manner to fight against these kind of threats.<br \/>\nThe study of malicious code is important to understand how attackers act in order to detect in progress attacks and to prepare a better defense response.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>REFERENCES<\/strong><\/p>\n<p><strong>[01]<\/strong> Trey Herr, Eric Armbrust, Milware: Identification and Implications of State Authored Malicious Software, The George Washington University, 2015;<br \/>\n<strong>[02]<\/strong> https:\/\/www.first.org\/: CVSS: Common Vulnerability Scoring System;<\/p>\n<p><strong>[03]<\/strong> Marc Goodman, Future Crimes: Inside the Digital Underground and the Battle for Or Connected world, Anchor Books, 2015.<br \/>\n<strong>[04]<\/strong> https:\/\/www.leakedsource.com\/: leaked databases that contain information of large public interest.<br \/>\n<strong>[05]<\/strong> https:\/\/en.wikipedia.org\/wiki\/Blackhole_exploit_kit: The Blackhole exploit kit is as of 2012 the most prevalent web threat.<\/p>\n<p><strong>[06]<\/strong> https:\/\/en.wikipedia.org\/wiki\/Duqu_2.0: Kaspersky discovered the malware, and Symantec confirmed those findings.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Strong interests in the cyberspace produce lots of highly sophisticated malicious software. CYBERSPACE INHABITANTS To enter the cyberspace means to probably be the target of thieves, hackers, activists, terrorists, nation-states cyber warriors and foreign intelligence services. In this scenario the strong competition in cybercrime and cyberwarfare continuously brings an increasing proliferation of malicious programs and <a class=\"read-more\" href=\"https:\/\/www.volucer.it\/?p=199\">...continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-199","post","type-post","status-publish","format-standard","hentry","category-cybersecurity"],"_links":{"self":[{"href":"https:\/\/www.volucer.it\/index.php?rest_route=\/wp\/v2\/posts\/199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.volucer.it\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.volucer.it\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.volucer.it\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.volucer.it\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=199"}],"version-history":[{"count":15,"href":"https:\/\/www.volucer.it\/index.php?rest_route=\/wp\/v2\/posts\/199\/revisions"}],"predecessor-version":[{"id":217,"href":"https:\/\/www.volucer.it\/index.php?rest_route=\/wp\/v2\/posts\/199\/revisions\/217"}],"wp:attachment":[{"href":"https:\/\/www.volucer.it\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=199"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.volucer.it\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=199"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.volucer.it\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}