mirage malware siddartha eleti clemson university

15
MIRAGE MALWARE SIDDARTHA ELETI CLEMSON UNIVERSITY

Upload: leticia-slate

Post on 22-Dec-2015

232 views

Category:

Documents


0 download

TRANSCRIPT

  • Slide 1
  • Slide 2
  • MIRAGE MALWARE SIDDARTHA ELETI CLEMSON UNIVERSITY
  • Slide 3
  • CONTENTS: 1. WHAT IS MALWARE 2. WHAT IS MIRAGE 3. HOW DOES MIRAGE WORK 4. CONCLUSION
  • Slide 4
  • WHAT IS MALWARE? Malware is a malicious program that is meant to disrupt computer operations, gather sensitive information, or gain access to private computer systems. Malware could be code or scripts or active content etc. Over the past few decades many malwares like STUXNET, Nimda, myDoom etc. have affected organizations, personal computers etc. and this year among many others its MIRAGE.
  • Slide 5
  • WHAT IS MIRAGE? Mirage is a malware that has appeared under the radar since April 2012. Dell SecureWorks has been tracking a cyber espionage campaign that uses a remote access Trojan (RAT) named Mirage (also known as MirageFox.
  • Slide 6
  • HOW DOES MIRAGE WORK?
  • Slide 7
  • SPEAR-PISHING Mirage was intended to attack individuals at big oil and energy companies. So it uses a technique called Spear-Pishing. Spear-Pishing is a process of acquiring sensitive information from specific individuals or an organization by masquerading as a trustworthy entity. In this scenario, the attackers gather personal information about the targets to increase their probability of success.
  • Slide 8
  • INSTALLATION The spearpishing emails contains an attachment that includes malicious payload which installs a copy of Mirage on the computer The attachments are stand-alone executable files that open an embedded PDF and execute the Mirage Trojan in the background Mirage installs itself into c:\Windows or the Users Home directory It also creates a backboor which waits for instructions from the attacker Mirage creates registry keys on every boot so that the system remains infected
  • Slide 9
  • COMMUNICATION Mirage phones home to its c2 servers using standard HTTP Post request over the ports 80, 443 and 8080. It can also use SSL for added security. Iniitial phone-home request contains detailed system information of the infected system. Example : Once the c2 server gets this it responds with HTTP response code 200 ok.
  • Slide 10
  • After a successful connection, infected system still sends regular check-in updates with its mac address in it. All of its communications with its command and control servers are disguised to appear like the URL traffic pattern associated with Google searches. VARIANT 2: Another variant of Mirage uses HTTP Get requests for communication. In this variant instead of Mirage in the beginning of the message it uses It is the end of the world and I feel Fine", from the REM song "It's the end of the world."
  • Slide 11
  • VICTIMS The picture below shows the sources of infected hosts. After deep analysis researchers have found one infected host, an executive-level finance manager of the Philippine-based oil company.
  • Slide 12
  • ATTACKERS SecureWorks have identified that the attackers were operating out of china. Used dynamic DNS domains for callbacks to c2 servers. The hosting companies in US were running Htran. In 2011 analysis the software author was identified as member of Chinese hacker group HUC, the Honker Union of China. Despite efforts during analysis of home phone activity researches four unique second-level domains were identified of which two shares a common email Id.
  • Slide 13
  • INTENTIONS The intention behind the attacks are still not known but they have hit many energy and oil companies world wide. Its unclear about what kind of data they were trying to steal from the specific targets yet.
  • Slide 14
  • CONCLUSION Mirage was a light weight simple malware which proved to be effective because it was able to reach mid and senior-level executives. This malware represents only a small piece of an ongoing worldwide campaign. This proves that for a successful campaign only a small quantity of infected systems are required.
  • Slide 15
  • CITED SITES http://www.secureworks.com/cyber-threat-intelligence/threats/the- mirage-campaign/ http://www.secureworks.com/cyber-threat-intelligence/threats/the- mirage-campaign/ http://news.cnet.com/8301-1009_3-57517388-83/cyberspying-effort- drops-mirage-on-energy-firms/ http://news.cnet.com/8301-1009_3-57517388-83/cyberspying-effort- drops-mirage-on-energy-firms/ http://www.scmagazine.com/new-espionage-campaign-tied-to-rsa- breach-ghostnet-attacks/article/259991/ http://www.scmagazine.com/new-espionage-campaign-tied-to-rsa- breach-ghostnet-attacks/article/259991/ http://en.wikipedia.org/wiki/Malware
  • Slide 16
  • Thank you