SlideShare a Scribd company logo
Scareware From Ireland



                  Mark Hillick

   IrissCert Incident Handler




        http://www.iriss.ie
       mark.hillick@iriss.ie


   Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   1
What is Scareware?




   Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   2
Irish Scareware Exploit

 Browse to Irish website & collect your fake anti-
  virus




               Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   3
Dialog-box fun…..




   Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   4
Dialog-box fun cont…..




   Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   5
System Scan




   Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   6
Trojan Log file




    Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   7
Money, please!




   Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   8
Are you sure?




   Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   9
Are you mad????




   Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   10
BSOD




  Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   11
Effect on the end-user….




   Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   12
Exploit

 Exploited Sites hosted on one server
   Microsoft FTPd & IIS 6.0


 Two most popular web site attacks –

   Gumblar
     PHP Sites


   Asprox
     SQL Injection

                  Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   13
Pass the Parcel

 http://compromisedsite.ie

   http://jobstopfil.biz

      http://poppka.net

       http://sujetline.ru

       http://grownclubfest.ru


 PDF & SWF files served back


                      Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   14
Obfuscation

 Engaged SANS ISC Malware Team

   Heavily obfuscated javascript

   Used techniques not seen before




               Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   15
Complex Design….




   Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   16
Tools Used
 Tamper Data, Live HTTP Headers – Firefox

 Burp Suite

 Tcpdump, Wireshark & Netwitness

 Dig/nslookup



                 Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   17
Incident Handling - Containment




Source: http://www.tazworld.co.uk/gallery/pictures/www.tazworld.co.uk_taz_035.gif
© Warner Bros. Entertainment Inc.

                              Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   18
Incident Handling - Eradication




Source -> http://www.alexross.com/CJ011.jpg © Warner Bros. Entertainment Inc

                               Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   19
Incident Handling - Recovery




   Dilbert ©2009, United Feature Syndicate, Inc.

   Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   20
Incident Handling - Lessons Learned

 Patch web-server & application
   Input validation


 Close unnecessary open ports (e.g. FTP)

 Password Policy

 Regular back-ups

 Web-app security testing
                Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   21
Securing the Desktop

 End-User Defence



 Rescue CDs
   Google -> “rescue site:raymond.cc”



 Free Tools
   http://zeltser.com/fighting-malicious-software/


                 Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   22
Next Steps & Extra Info

 Sans GCIH Gold Paper
    −   Scareware & its evolution
    −   Incident Handling Process


   Full Incident Report
    −   http://www.iriss.ie – in shared documents
    −   http://www.hillick.net/things/scareware.doc




                   Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   23
References

 Sunbelt Blog

 Dancho Danchev Blog

 SANS ISC (Thanks to @bojanz)

 VRT-Sourcefire Blog

 Symantec White Papers

 Sans Forensics Blog

                 Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS   24
That's it.....




                           Hat Tip for image - Jesse M. Heines - http://teaching.cs.uml.edu/~heines/images/
                   questions.gif




     Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS                       25

More Related Content

PDF
Scare Ware From Ireland
PDF
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
PPTX
Nsc42 - is the cloud secure - is easy if you do it smart ECC Conference
PPTX
Secure Your Mobile Apps
PPTX
A day in the life of a pentester
PDF
6 Security Tips for Using Public WiFi
PDF
Common Security Misconception
PPTX
Webinar On Ethical Hacking & Cybersecurity - Day2
Scare Ware From Ireland
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Nsc42 - is the cloud secure - is easy if you do it smart ECC Conference
Secure Your Mobile Apps
A day in the life of a pentester
6 Security Tips for Using Public WiFi
Common Security Misconception
Webinar On Ethical Hacking & Cybersecurity - Day2

What's hot (12)

PDF
Building & Hacking Modern iOS Apps
PDF
The view of auditor on cybercrime
PDF
Stranger Danger (NodeSummit, 2016)
PDF
Lviv MD Day 2015 Анастасія Войтова "Data transfer security for mobile apps: w...
PDF
Testing iOS apps without jailbreak in 2018
PDF
Best business protection for windows
PDF
SIPNOC 2014 - Is It Time For TLS for SIP?
ODP
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
PPTX
D3SF17 -Keynote - Staying Ahead of the Curve
PDF
How to make Android apps secure: dos and don’ts
PDF
Continuous Security
PDF
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?
Building & Hacking Modern iOS Apps
The view of auditor on cybercrime
Stranger Danger (NodeSummit, 2016)
Lviv MD Day 2015 Анастасія Войтова "Data transfer security for mobile apps: w...
Testing iOS apps without jailbreak in 2018
Best business protection for windows
SIPNOC 2014 - Is It Time For TLS for SIP?
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
D3SF17 -Keynote - Staying Ahead of the Curve
How to make Android apps secure: dos and don’ts
Continuous Security
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?
Ad

Viewers also liked (17)

PPTX
Ugur400
PDF
Scareware y ramsomware . valdez avila , ramirez camacho , vazquez martinez
PPTX
Access Point
PDF
New Cisco Access Points
PPTX
Spyware and rootkit
PPT
Spyware Adware1
PPTX
History of Laptops ppt
PPTX
Laptop Evolution
PPT
PPT
Trojan Horse Presentation
PPTX
Modem presentation
PPT
spyware
PPT
Laptops of 2018 ppt
PPT
Bluetooth Technology
ODP
Virus and antivirus final ppt
PPT
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Ugur400
Scareware y ramsomware . valdez avila , ramirez camacho , vazquez martinez
Access Point
New Cisco Access Points
Spyware and rootkit
Spyware Adware1
History of Laptops ppt
Laptop Evolution
Trojan Horse Presentation
Modem presentation
spyware
Laptops of 2018 ppt
Bluetooth Technology
Virus and antivirus final ppt
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Ad

Similar to Scareware - Irisscon 2009 (20)

PPT
Lec21 security
PDF
Presentation cisco iron port product family
PDF
During the Next Generation Network and Data Centre – Now and into the Future ...
PDF
How to perform an Infrastructure Security Gap Analysis
PDF
Internet security: a landscape of unintended consequences
PPTX
Linux Foundation Live Webinar: Applying Governance to CI/CD
PDF
Docker app armor_usecase
PPTX
Segurdad de red para la generacion de la nube symantec
PDF
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
PDF
The security phoenix - from the ashes of DEV-OPS Appsec California 2020
PDF
SIEM evolution
PDF
Basic Internet Security (for Association of Bridal Consultants - Italy)
PDF
Rapidly developing IoT (Internet of Things) applications - Part 2: Arduino, B...
PPT
lec21-security.ppt
PPT
lec21-security.ppt
PPT
Network security of internet of things.ppt
PPT
lec21-security.ppt
PPT
lec21-securitytcp attacks and others.ppt
PPT
my lecture 21.network security.2023.ppt
PPT
network.ppt
Lec21 security
Presentation cisco iron port product family
During the Next Generation Network and Data Centre – Now and into the Future ...
How to perform an Infrastructure Security Gap Analysis
Internet security: a landscape of unintended consequences
Linux Foundation Live Webinar: Applying Governance to CI/CD
Docker app armor_usecase
Segurdad de red para la generacion de la nube symantec
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
The security phoenix - from the ashes of DEV-OPS Appsec California 2020
SIEM evolution
Basic Internet Security (for Association of Bridal Consultants - Italy)
Rapidly developing IoT (Internet of Things) applications - Part 2: Arduino, B...
lec21-security.ppt
lec21-security.ppt
Network security of internet of things.ppt
lec21-security.ppt
lec21-securitytcp attacks and others.ppt
my lecture 21.network security.2023.ppt
network.ppt

More from Mark Hillick (9)

PDF
Peeling back your Network Layers with Security Onion
PDF
Introduction to MongoDB
PDF
PHP Loves MongoDB - Dublin MUG (by Hannes)
PDF
HackEire 2009
PDF
Integrated Cache on Netscaler
PDF
Scareware Traversing the World via Ireland
PDF
Implementing a WAF
PDF
CTF: Bringing back more than sexy!
PDF
MongoDB - Who, What & Where!
Peeling back your Network Layers with Security Onion
Introduction to MongoDB
PHP Loves MongoDB - Dublin MUG (by Hannes)
HackEire 2009
Integrated Cache on Netscaler
Scareware Traversing the World via Ireland
Implementing a WAF
CTF: Bringing back more than sexy!
MongoDB - Who, What & Where!

Recently uploaded (20)

PPTX
Big Data Technologies - Introduction.pptx
PPTX
Cloud computing and distributed systems.
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Empathic Computing: Creating Shared Understanding
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Big Data Technologies - Introduction.pptx
Cloud computing and distributed systems.
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Unlocking AI with Model Context Protocol (MCP)
Empathic Computing: Creating Shared Understanding
Chapter 3 Spatial Domain Image Processing.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Understanding_Digital_Forensics_Presentation.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Electronic commerce courselecture one. Pdf
Encapsulation_ Review paper, used for researhc scholars
MYSQL Presentation for SQL database connectivity
Digital-Transformation-Roadmap-for-Companies.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation theory and applications.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

Scareware - Irisscon 2009

  • 1. Scareware From Ireland Mark Hillick IrissCert Incident Handler http://www.iriss.ie mark.hillick@iriss.ie Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 1
  • 2. What is Scareware? Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 2
  • 3. Irish Scareware Exploit  Browse to Irish website & collect your fake anti- virus Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 3
  • 4. Dialog-box fun….. Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 4
  • 5. Dialog-box fun cont….. Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 5
  • 6. System Scan Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 6
  • 7. Trojan Log file Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 7
  • 8. Money, please! Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 8
  • 9. Are you sure? Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 9
  • 10. Are you mad???? Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 10
  • 11. BSOD Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 11
  • 12. Effect on the end-user…. Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 12
  • 13. Exploit  Exploited Sites hosted on one server  Microsoft FTPd & IIS 6.0  Two most popular web site attacks –  Gumblar PHP Sites  Asprox SQL Injection Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 13
  • 14. Pass the Parcel  http://compromisedsite.ie  http://jobstopfil.biz http://poppka.net  http://sujetline.ru  http://grownclubfest.ru  PDF & SWF files served back Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 14
  • 15. Obfuscation  Engaged SANS ISC Malware Team  Heavily obfuscated javascript  Used techniques not seen before Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 15
  • 16. Complex Design…. Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 16
  • 17. Tools Used  Tamper Data, Live HTTP Headers – Firefox  Burp Suite  Tcpdump, Wireshark & Netwitness  Dig/nslookup Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 17
  • 18. Incident Handling - Containment Source: http://www.tazworld.co.uk/gallery/pictures/www.tazworld.co.uk_taz_035.gif © Warner Bros. Entertainment Inc. Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 18
  • 19. Incident Handling - Eradication Source -> http://www.alexross.com/CJ011.jpg © Warner Bros. Entertainment Inc Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 19
  • 20. Incident Handling - Recovery Dilbert ©2009, United Feature Syndicate, Inc. Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 20
  • 21. Incident Handling - Lessons Learned  Patch web-server & application  Input validation  Close unnecessary open ports (e.g. FTP)  Password Policy  Regular back-ups  Web-app security testing Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 21
  • 22. Securing the Desktop  End-User Defence  Rescue CDs  Google -> “rescue site:raymond.cc”  Free Tools  http://zeltser.com/fighting-malicious-software/ Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 22
  • 23. Next Steps & Extra Info  Sans GCIH Gold Paper − Scareware & its evolution − Incident Handling Process  Full Incident Report − http://www.iriss.ie – in shared documents − http://www.hillick.net/things/scareware.doc Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 23
  • 24. References  Sunbelt Blog  Dancho Danchev Blog  SANS ISC (Thanks to @bojanz)  VRT-Sourcefire Blog  Symantec White Papers  Sans Forensics Blog Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 24
  • 25. That's it..... Hat Tip for image - Jesse M. Heines - http://teaching.cs.uml.edu/~heines/images/ questions.gif Scareware From Ireland - Twitter "markofu" & "irisscert" © 2009 IRISS 25

Editor's Notes

  • #3: Going to define scareware – Software scares end-user into thinking computer has an infection; 43 million fake anti-virus download attempts (June-July 09) – Symantec white paper Explain why criminals use Scareware and their motives. This is to give theaudience a reason to care about what you are talking about. Describe what happened to end-user computer Describe the infrastructure behind the scareware Describe the Exploit Describe how IRISS handled the incident Give some recommendations and resources for desktop controls Give References Answer questions throughout
  • #4: IRISS notified by a member. Confirmed it ourselves through testing and further through links with URL/IP/AV vendor and SANS ISC
  • #5: Dialog Box windows popping up everywhere to scare the end-user NB. – I was able to install AVG during it and sys Internals Tools.
  • #6: Dialog Box windows popping up everywhere to scare the end-user
  • #7: Looks very like leading anti-virus/anti-malware desktop solutions
  • #8: Log file – adding some reality, professionalism 
  • #9: Does that not look the Verisign logo??? At this point, it’s “Game Over”.
  • #10: Are you sure? Seriously?
  • #11: At the last minute, I decide I was uncomfortable with paying the cash. It warns me – emphasises that I will be continuing UNPROTECTED. http://sunbeltblog.blogspot.com/2009/07/new-rogue-tactic-blue-screen-of.html - According to anti-spyware firm Sunbelt Software, this ‘Blue Screen of Death’ trick is a new trick from July 2009
  • #12: The return of the infamous BSOD……this surely has to panic end-users 
  • #13: For the average end-user, this is the only conceivable output.
  • #14: We have no concrete facts around how the site was exploited, however, there were quite a few issues with servers from this web farm and they were running IIS6 on Windows. Most of the current attacks (confirmed with SANS ISC) are either performed with Gumblar or Asprox. Although the server was running IIS 6.0 the malware did not exploit IIS per se but rather used weak web appsecurity. Tie in with Eoin's talk later and also highlight where the problems lie. http://en.wikipedia.org/wiki/Gumblar Further information -
  • #15: This is what happened when the user accessed the site – multiple redirects to external sites that all host malware. Therefore, the Irish sites are termed as intermediaries for sites that serve malware. McAfee SiteAdvisor, TrustSource – no good PDF & SWF - do not exploit the latest 0-day but some older vulnerabilities (namely the Collab one and util.printf) Difficult to get sites closed down – complexity (slide 14 will expand on this further) Also highlight that the redirects can happen to any site? E.g. New York Times etc.
  • #16: Comment on the links we have with Sans ISC. Comment on the advanced skills that the ‘bad guys’ have!!
  • #17: Exploited sites in Ireland – Irish websites Redirects - Domains hosted in Russia - Russian name & registrar Grownclubfest.ru Poppka.net https://www.onlinepurchasesolution.com https://www.securebillingsoftware.com webst.ru – hosting company Still working on closing sites – still serving malware Servers physically located in China – Netcraft Payment URLs hosted in Canada, registered
  • #18: Summary of the tools that were used
  • #19: Contact Hosting Company/Owner Possible temporary take-down Make IRISS members away of malware code Encourage company to disclose to customers (hhhhmmm, keep in?) Inform SANS, AV, IP reputation sites & URL filtering vendors Attempt takedown of malware-serving sites
  • #20: Recommended steps - Take site offline momentarily while the code is being removed. Only restore service to the site when it has been cleaned or a back-up has been restored. Remove malware code or restore latest clean back-up
  • #21: Scan application and restore service if clean Ask external URL/AV vendors to rescan site Inform customers if necessary that site is back up
  • #22: Not sure what to do here – should I be recommending what to do on a web application? Explain how to reduce the risk of this type of attack impacting your server. Contact Hosting Company/Owner Possible temporary take-down Make IRISS members away of malware code Inform SANS, AV & URL filtering vendors Attempt takedown of malware-serving sites
  • #23: Defence in Depth Desktop – AV, Anti-Spyware, Anti-Malware, Registry Cleaners Personal Firewall Browser – security add-on
  • #24: Add-ons – NoScript, Google Safe Browsing, AVG Toolbar, WOT, AdBlock Plus, Flashblock, ShowIP, Clear Private Data This scareware only ran on Windows Free Tools - http://zeltser.com/fighting-malicious-software/lookup-malicious-websites.html, http://zeltser.com/fighting-malicious-software/malicious-ip-blocklists.html, http://zeltser.com/reverse-malware/automated-malware-analysis.html
  • #25: http://sunbeltblog.blogspot.com/2009/07/new-rogue-tactic-blue-screen-of.html Google search http://ddanchev.blogspot.com/ for ‘scareware’ or ‘virus’ http://isc.sans.org/ (Thanks to @bojanz) http://vrt-sourcefire.blogspot.com/2009/11/paranoia-and-rise-of-fake-antivirus.html http://eval.symantec.com/mktginfo/enterprise/white_papers/b-symc_report_on_rogue_security_software_WP_20016952.en-us.pdf http://blogs.sans.org/computer-forensics/2009/11/07/lists-for-investigating-malware-incidents/