0% found this document useful (0 votes)
87 views39 pages

Slide-Worm Part 1

Computer worms spread by exploiting vulnerabilities in software to propagate themselves to other systems without permission. This document classifies worms based on their target discovery method, carrier, activation mechanism, and payload. It provides examples of historical worms like the Morris Worm, Code Red, Nimda, Sasser, Witty, and SQL Slammer worm and analyzes their propagation methods and impacts. In general, worm propagation involves an initial infection, target acquisition through scanning or lists, transmission to the target, and activation on the new system.

Uploaded by

Nhật Huy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
87 views39 pages

Slide-Worm Part 1

Computer worms spread by exploiting vulnerabilities in software to propagate themselves to other systems without permission. This document classifies worms based on their target discovery method, carrier, activation mechanism, and payload. It provides examples of historical worms like the Morris Worm, Code Red, Nimda, Sasser, Witty, and SQL Slammer worm and analyzes their propagation methods and impacts. In general, worm propagation involves an initial infection, target acquisition through scanning or lists, transmission to the target, and activation on the new system.

Uploaded by

Nhật Huy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 39

Computer worm

Introduction

• What is a worm?
• Piece of software that propagates using
vulnerabilities in software/application
• Self-propagating (distinct from a virus)
• Self-replicating
• Spread through the Internet easily due to its open
communication model
Classification of Worms
• Target Discovery
• How does a worm find new hosts to infect?

• Carrier
• How does it transmit itself to the target?

• Activation
• Mechanism by which the worm operates on the target

• Payloads
• What the worm carries to reach its goal

N.Weaver, V.Paxson, et al, “A taxonomy of computer worms”, Proc. Of the ACM workshop on Rapid Malcode, pp.11-18, 2003.
+


Activation
Target
Discovery Attacker

Payload

Carrier

OVERVIEW
Target
Discovery
Target
Discovery

• Scanning
•sequential, random,
•Optimization
●Preference for local addresses: Same OS and applications in a sub-
network
●Permutation scanning: Utilize distributed coordination to more effectively
scan
●Bandwidth-limited scanning: Do not wait for response
!
!
Target Discovery
● Pre-generated Target Lists
– Attacker made a target list in advance

• Internal Target Lists


• Discover the local communication topology
• Difficult to detect
• Suggests highly distributed sensors

● Externally Generated Target Lists


– Metaservers keep a list of all the servers which are
currently active (Ex. Online game)
Target Discovery
● Passive
– Wait for potential victims to contact the worm (Ex.
Un-patched browser)

– Rely on user behavior to discover new targets


● Contagion worms rely on normal communication
to discover new victims

– No anomalous traffic patterns during target


discovery
Carrier
• Self-Carried Carrier
• Actively transmits itself as part of the infection process
• Second Channel
• Require a secondary communication channel
• Example Blaster: primary channel is RPC;
• secondary channel is TFTP
• Embedded
– Sends itself as part of a normal communication channel, either appending to or
replacing normal messages ( e.g. web requests)
– Usually used by passive worms
– Relatively stealthy


Activation
Activation

• Human Activation
• Convince a local user to execute the worm
• The slowest activation approach
• e.g. MyDoom
• Human activity-based activation

e.g. Activated when the user performs some activity not normally related to a worm (Ex. resetting the machine, logging in)
• Scheduled process activation
• Unauthorized auto-updater programs
• Ex. Use DNS redirection attack to serve a file to the desktop system to infect the target
• Self Activation
• Initiate their own execution by exploiting vulnerabilities in services that are always on and available
• The fastest activation approach

Payload
Payload

• Internet Remote Control


• Internet DOS : paper’s dream realized
• Data Damage: Chernobyl , Klez
• Physical World Damage
• Human control ! Blackmail ! 

Attacker
Attacker

• Experimental Curiosity
– Continual tendency for various individuals to experiment with viruses and worms

● Pride and Power


– A desire to acquire power, to show off their knowledge and ability to inflict harm on others
● Commercial Advantage
– Profit by manipulating financial markets via a synthetic economic disaster
● Extortion and Criminal Gain
– Credit-card information
● Random Protest
– Disrupt networks and infrastructure
● Political Protest
● Terrorism ! Example
● Cyber Warfare 

History of Worms

Source:http://www.sans.org/rr/whitepapers/malicious/1410.php
Morris Worm
• Topological Worm (6-10% of all Internet hosts infected)
• First large-scale worm that targeted VAX, Sun Unix systems
• Target Discovery
• Scanning the local subnet
• Activation
• Self Activation
• Propagation Mechanism (Self Carried)
• Exploiting a fingered buffer overflow
• Payload
• None
Code Red I
• July 19, 2001: more than 359,000 computers connected to the Internet were
infected by Code-Red I v2 worm in less than 14 hours
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
Source: http://www.caida.org
Code Red I

• Target Discovery
• Scanning
• Activation
• Self Activation
• Propagation Mechanism (Self Carried)
• Exploiting a Microsoft IIS Web Server buffer overflow
• Payload
• Defacement of websites
Code Red I
• Exploited buffer overflow in Indexing Service in Microsoft IIS Server
• Days 1-19 of each month
• displays ‘hacked by Chinese’ message on English language servers
• tries to open connections to infect randomly chosen machines using 100 threads
• Day 20-27
• stops trying to spread
• launches a denial-of-service attack on the IP address of www1.whitehouse.gon
• Code Red I v1
• July 12, 2001
• Used static seed for random number generator
• Each infected computer tries to infect always the same IP addresses
• Not very damaging, spread slowly
• Memory resident
• Code Red I v2
• July 19, 2001
• Used random seed for random number generator
Code Red Damage

• 359,000 hosts infected in 24 hour period

• Between 11:00 and 16:00 UTC, the growth is


exponential

• 2,000 hosts infected per minute at the peak of the


infection rate (16:00 UTC)
Nimda (September 18,
2001)
• Target Discovery
• Scanning, Email
• Activation
• Self Activation, User action
• Propagation Mechanism (Self Carried)
• Exploiting a Microsoft IIS Web Server buffer overflow
• Payload
• Defacement of websites
• Multi-mode spreading:
– attack IIS servers via infected clients
– email itself to address book as a virus
– copy itself across open network shares
– modifying Web pages on infected servers w/ client exploit
– scanning for Code Red II backdoor
• Spread across firewalls.
SASSER Worm (2004)
• April 29, 2004

• Target Discovery
• Random Scanning of IP addresses on TCP port 445,
• can scan up to 1,024 addresses simultaneously

• Mode of Transmission
• Buffer Overflow in Windows Local Security Authority Service
Server (LSASS)

• Payload
• Rootkit potential
• Escalation of privileges
Witty (2004)
• March 19, 2004
• Buffer overflow vulnerability in ISS PAM
module
• Single UDP packet exploits flaw in the passive analysis of
Internet Security Systems (ISS) products.
• “Bandwidth-limited” UDP worm like Slammer.
• Vulnerable pop. (12K) attained in 75 minutes.
• Payload: slowly corrupt random disk blocks.
• Detailed telescope analysis reveals worm targeted a US
military base and was launched from a European retail ISP
account.
Slammer Worm – Before
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
Figure taken from http://www.caida.org/outreach/papers/2003/sapphire/sapphire.html
Slammer Worm - After
SQL Slammer

• The Slammer worm (also called Sapphire worm)


consists of an IP scanner combined with an exploit for
MS SQL Server, written in 376 bytes of code.
• Slammer exploited connectionless UDP service, rather
than connection-oriented TCP.
• Entire worm fit in a single packet!
• Worm infected 75,000+ hosts in 10 minutes (despite
broken random number generator).
– At its peak, doubled every 8.5 seconds
Slammer Worm
• Propagation speed was Sapphire's novel feature: in the first minute, the
infected population doubled in size every 8.5 (±1) seconds.
• The worm achieved its full scanning rate (over 55 million scans per
second) after approximately three minutes, after which the rate of growth
slowed down somewhat because significant portions of the network did
not have enough bandwidth to allow it to operate unhindered. Most
vulnerable machines were infected within 10-minutes of the worm's
release. Although worms with this rapid propagation had been predicted
on theoretical grounds, the spread of Sapphire provides the first real
incident demonstrating the capabilities of a high-speed worm.
• By comparison, it was two orders magnitude faster than the Code Red
worm, which infected over 359,000 hosts on July 19th, 2001. In
comparison, the Code Red worm population had a leisurely doubling time
of about 37 minutes.
General Model of Worm Propagation

Source:http://www.sans.org/rr/whitepapers/malicious/1410.php
Summary of Worm
Propagation
Worm propagation can be broadly described by a 3 (or 4) step process
illustrated in the figure before:
0.) Initial Infection: The model begins with the presumption that there exists
a system that is already infected by the worm and that the worm is active
on this system.
1.) Target Acquisition: In order for the worm to propagate itself it must find
additional systems to infect. Worms may actively target systems using:

a. IP addresses

b. Email addresses

c. File system traversal

It should also be noted that worms may passively target client system i.e.
the trojaned web content delivered by web servers infected with the
Nimda worm.

Worm Propagation
2.)Delivery of Hostile Code: Once a system has been targeted, it is necessary to transfer the worm
to the targeted system in preparation for infection. Code delivery has been observed to take
place via the following:
a. Network file systems b. Email
c. Web clients d. Remote command shell (or equivalent)
e. As part of packet payload associated with buffer overflows and similar programmatic exploits.
3.) Execution of Hostile Code: The presence of hostile code on a system is
not sufficient for worm propagation; execution of the code must be
triggered in some fashion. Code may be executed via:
a. Direct invocation from the command line (or equivalent)
b. Buffer overflow or other programmatic attack
c. Email clients d. Web clients
e. User intervention f. Automatic execution by target system.
4.) Some worms may only transfer a portion of their code in step 3. In that
case it is necessary for them to transfer the remaining code once the
target system has been compromised. This can be achieved via
a. FTP/TFTP
b. Network file systems
Benchmarks and Metrics

● Infection Size
– Percentage of nodes infected
● Reaction Time
– Time between detection of a worm and deployment of worm
control measures
– Obviously the lower the better
● Penetration Ratio
– Number of nodes infected compared to the size of the
possible domain
– Related to infection ratio
● False Positives/Negatives

You might also like