mobile viruses and worms report it653

Upload: ajay-jangid

Post on 08-Apr-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/7/2019 Mobile Viruses and Worms Report IT653

    1/18

  • 8/7/2019 Mobile Viruses and Worms Report IT653

    2/18

  • 8/7/2019 Mobile Viruses and Worms Report IT653

    3/18

    Abstract

    This document is the project report for Mobile Worms and Viruses completed as

    part of the course IT653 (Network Security) at KReSIT, IIT Bombay. We beginwith examining what Mobile Worms and Viruses are, and the differences between

    these and their PC 1 counterparts. This report refers to such malicious software

    for mobile devices as Mobile Malware. The mode of spreading of mobile malware

    and their effects have been enumerated. The risks and threats from these are then

    examined, and various methods that have been used to prevent and protect against

    their attacks are listed. Case studies of three widespread and important mobile

    malware, Cabir, ComWar and CardTrap are presented. We also examine the extent

    of harm that could be caused by mobile malware in combination with other newer

    technology. Though such viruses do not yet exist, it can be seen that it is only a

    matter of time before they can wreak havoc.

    Declaration

    This report based on the input from sources we found on the Internet. We acknowledge the

    use of these sources. The figures, charts, graphs and tables used in the report have been

    taken from these sources. Mention of the source for each figure, chart, graph or table has

    been mentioned along with the figure or chart. A list of the sources that were referred for

    the creation of the report appears in the Bibliography.

    Keywords: Mobile Viruses, Mobile Worms, Cabir, ComWar, CardTrap, MOSES, Proactive

    Security, Location Tracking, DDOS, Mobile bugging

    1Personal Computer

    ii

  • 8/7/2019 Mobile Viruses and Worms Report IT653

    4/18

    1 Introduction

    A large number of mobile devices are now part of everyday use. These include cell phones,

    smartphones and PDAs (Personal Digital Assistants). The functionality and applications offered

    by current day mobile devices are beginning to rival those offered by a traditional PC. These

    mobile devices are usually have some form of connectivity (e.g., GSM, GPRS, Bluetooth, WiFi).These devices have vulnerabilities like PCs, but also have some peculiarities of their own. Worms

    and viruses, and other malicious software have been released that exploit vulnerabilities in some

    of these devices. These malware can cause harm or annoyance to the users of the mobile devices.

    Over the past few years, there has been a substantial increase in the number of malware that have

    been written for mobile devices. As per [2], there exist at least 31 families and 170 variants of

    known mobile malware. Statistics [2] have shown that at least 10 Trojans are released every week.

    Even though it took computer viruses twenty years to evolve, their mobile device counterparts

    have evolved in just a span of two years.

    To understand the threat that is involved, we first present the comparison of the environment

    for PC-based and mobile device malware.

    1.1 Comparison between mobile malware and PC malware

    The following points illustrate the differences and similarities between mobile malware and PC

    malware.

    Vulnerabilities in PCs that have been exploited are related to vulnerabilities in the operat-

    ing system or application software. Patches for such vulnerabilities are released periodically

    by the software vendors. The users (or administrators) of the PCs are then responsible for

    ensuring that these patches are applied to their systems as and when released.

    Though vulnerabilities for mobile devices have been found and documented [2], it is very

    difficult to roll-out patches to the software or firmware on the mobile devices that have

    already been sold. Considering that the users of mobile devices include a vast majority of

    people that are not security conscious, it is difficult to expect users to apply patches to

    their devices as and when the patches are released. This problem is compounded because

    there is no easy way to upgrade the firmware or software of a mobile device just by using

    the mobile device. Connectivity with a PC is usually the only way to upgrade the firmware

    or software.

    Mobile devices such as phones are almost always switched on and stay connected to the

    network.

    Unlike a PC whose neighboring network nodes remain relatively fixed, the neighbors

    of a mobile device keep changing with every change of location of the user carrying the

    mobile device. As a result, for example, a single user with an infected phone entering a

    stadium, can potentially infect the phones of all the people within the stadium if these

    phones have the same vulnerability.

    Mobile phone users are less security conscious than the average Internet user.

    1

  • 8/7/2019 Mobile Viruses and Worms Report IT653

    5/18

    On the positive side:

    Unlike PCs, several variants of mobile devices exist. This makes it difficult for the mobile

    malware to infect or spread to dissimilar devices. For example, a mobile worm spreading

    through MMS can do little if the phone it has infected does not have MMS functionality.

    Mobile malware have not yet caused critical harm or damage. At most

    they increase the users billing, or

    cause the mobile phone to stop working (can be restored by a factory reset)

    However, as a result, there is not enough motivation, either for device manufacturers or

    for the users, for taking preventive action against mobile malware.

    2 A survey of current mobile malware

    2.1 Classification

    As with any entity with multiple types, a taxonomy based classification is necessary to properly

    identify the various individuals to respective classes. According to [2] the following was seen to

    be the best mode of classifying mobile malware.

    The classification system is structured on the following three characteristics:

    Behavior:

    Mobile malware can be classified depending upon the way the malware behaves. For

    example, whether it propagates like a virus or a worm, or whether it opens backdoors for

    attackers, like a trojan.

    Environment:

    Another characteristic in the classification is the type of operating system that the mo-

    bile malware has been designed to infect and spread to. This also includes vulnerable

    applications that the malware might exploit.

    The family name and variant:

    Some malware are variants of existing ones. This classification characteristic identifies if

    the mobile malware is a completely new entity or has been built based on some other

    previously existing one.

    2.2 Attack vectors for mobile malware

    Current known mobile malware use the following attack vectors:

    Bluetooth: Many mobile devices have the capability to communicate with other devices

    in a short range using the Bluetooth technology. However, several flaws exist in both

    the protocol as well as its implementation [8]. Some mobile malware exploit these to

    spread. Others disguise themselves as legitimate applications (Trojans) and try to spread

    to other devices that are within its Bluetooth communication range. These latter types of

    malware prompt the user to install the application and when the user does install them,

    these malware cause harm to the mobile. The first known mobile malware, Cabir spread

    through Bluetooth.

    2

  • 8/7/2019 Mobile Viruses and Worms Report IT653

    6/18

    Malware that spread through Bluetooth can only communicate within the range of com-

    munication of Bluetooth devices (typically a few meters). However, such malware can

    still rapidly spread across many devices if there is dense collection of Bluetooth-enabled

    devices. Such an attack has been reported previously [3] at the World Athletics champi-

    onship in Helsinki in 2005. A large number of people that were in the stadium had their

    devices infected with Cabir very rapidly.

    SMS2, MMS3, WiFi: Some mobile malware spread themselves through SMS, MMS or

    WiFi technology. Most of these send SMS or MMS to other phones and attach themselves

    to the message that they send. ComWar, for example, spreads through MMS.

    There also exists a buffer overflow vulnerability in the SMIL (Synchronized Multimedia

    Integration Language) parser on mobile devices based on the Microsoft Windows Mobile

    2003 operating system. This parser is used for parsing incoming MMS messages. As

    demonstrated by [5], this can be exploited to launch a buffer overflow attack on the recipient

    of such an MMS message. The user only needs to view the message to trigger the exploit;

    there is no need to explicitly launch an application.

    Malware that spread through SMS or MMS can spread across larger areas simply because

    the only restriction to spreading across the continents is the amount of balance left in the

    users mobile phone account.

    Some worms that spread exploiting vulnerabilities in WiFi could also infect mobile devices

    that are WiFi capable.

    Vulnerabilities in the operating system: Vulnerabilities exist in the operating systems

    used by mobile devices. SymbianOS, included as the operating system in most Nokia

    mobile phones, has several vulnerabilities [2], [3]. For example, one vulnerability found inthe Symbian Series 6.x devices (Nokia 3650 and Siemens SX-1) is to create a file called

    INFO.wmlc in the root folder with 67 spaces between the INFO and the .. This

    causes the mobile to work slowly or even crash.

    Microsoft Windows Mobile 2003 is the other popular operating system used on mobile

    devices. This latter operating system also suffers from vulnerabilities. For example, the

    Duts virus exploits a zero-day vulnerability in the file handling API of the operating

    system.

    At this point, it is worth mentioning that there are also several phones [13] (some by

    Motorola and Samsung) that use Linux or its variant as the operating system.

    2.3 Mobile Virus Families

    Figures 1 and 2 shows the increase in known mobile malware. Figure 1 shows variants of mobile

    viruses in each month from June 2004 (first mobile virus found in June 2004) till June 2006

    along with cumulative index.

    Figure 2 shows the increase in the known mobile malware families. As per [2], there are 31

    families of virus and 170 variants exist today. This also shows the curve is rapidly increasing

    and hence in future we may expect much more harmful viruses.

    2Short Messaging Service3Multimedia Messaging Service

    3

  • 8/7/2019 Mobile Viruses and Worms Report IT653

    7/18

    Figure 1: Increase in known mobile malware variants

    (Source: [2])

    Figure 2: Increases in known mobile malware families

    (Source: [2])

    The figure 4 in the Appendix shows classification of the known mobile malware. We can see

    that 15 variants exist for Cabir and 31 for Skuller. Most of the current known mobile malware

    affect the Symbian operating system.

    2.4 Harm caused by mobile malware

    Current mobile malware are capable of causing the following harm to the infected devices or its

    user:

    Causing financial loss to the user

    Initiate unnecessary calls, send SMS or MMS

    Send private information (such as contacts or address book information) to a prede-

    fined phone

    4

  • 8/7/2019 Mobile Viruses and Worms Report IT653

    8/18

    Spread via Bluetooth, causing drainage of battery

    Cause the devices to work slowly or to crash

    Infect files (attach its code to the application sis files)

    Modify or replace icons or system applications

    Wipe out information (such as address books) on the infected devices

    Install bogus applications on the device

    Allow remote control of the device

    3 Case Studies

    In this section, we look at case studies of some important and widespread mobile malware.

    3.1 Cabir

    Cabir is the first network worm capable of spreading through Bluetooth and was first detected

    in June 2004. It was a Proof-of-Concept code developed by the group 29A. The intention was

    to demonstrate how to exploit Bluetooth to spread worms. This worm infects mobile phones

    which run the Symbian OS. Any handset running the Symbian OS is potentially vulnerable to

    infection. Examples of such phones include the Nokia 3650, 7650 and N-Gage phones.

    The worm itself is an SIS format file, called caribe.sis. Each time the infected phone is

    switched on, the worm scans the list of active Bluetooth connections. The worm selects the

    first active connection detected and attempts to send its main file, caribe.sis, to this device. Ifreceipt of the infected file is confirmed, the users will be asked if they wish to launch the file.

    This worm does not cause any real harm since the intention was to only demonstrate how

    Bluetooth could be used for spreading. However, since the worm keeps scanning for active

    Bluetooth devices, it drains the battery of the phone rapidly.

    Since Cabir is well documented and code is available freely, other malicious users used it for

    developing malicious code to cause real damage. Cabir has 15 different variants.

    3.2 Comwar

    Comwar is the second landmark in mobile malware. This is the first worm for mobiles phoneswhich is able to propagate via MMS and could potentially go global in just minutes. It also

    spreads over Bluetooth. It infects telephones running under OS Symbian Series 60.

    The executable worm file is packed into a Symbian archive (*.SIS). The archive is approx-

    imately 27 - 30KB in size. The name of the file varies: when propagating via Bluetooth, the

    worm creates a random file name, which is 8 characters long, e.g. bg82o s1.sis

    Once launched, the worm searches for accessible Bluetooth devices and sends the infected

    .SIS archive under a random name to these devices. When the recipient user confirms that the

    file is to be accepted, it will infect the phone.

    The worm also sends itself via MMS to all contacts in the address book. The subject and

    text of the messages varies. Since it sends MMS to all the contacts in address book it is not

    5

  • 8/7/2019 Mobile Viruses and Worms Report IT653

    9/18

    as a proof of concept and the intention is to cause financial harm by charging the mobile user.

    Scanning active Bluetooth devices also drains the battery.

    3.3 Cardtrap

    Cardtrap is the first mobile virus found which is capable of infecting Windows PCs. The most sig-

    nificant characteristics of Cardtrap are that it also installs three Windows worms (Win32.Rays,

    Win32.Padobot.Z and Win32.Cydog.B) onto the devices memory card. Once the card is in-

    serted into the PC, Padobot.Z will attempt to start automatically on machines running Windows

    OS via the autorun.ini file.

    A recent virus called Crossover (2006) spreads from Windows desktop PCs to mobile devices

    running on Windows Mobile Pocket PC. Once it is installed on a Windows PC, the virus makes

    a copy of itself and adds a registry entry pointing to the new file so that the payload is activated

    each time the machine is rebooted. It then waits for an application for synchronizing Pocket

    PC devices with the infected Windows desktop PC.

    When a connection is detected, it copies itself over to the Pocket PC device, deletes all filesin the My Documents directory, copies itself to the system directory and places a link to itself

    in the startup directory.

    4 Futuristic Threats (original ideas by the authors)

    This section has been thought of entirely by the authors.

    Mobile malware as present today, does not present a significant risk to the average mobile user.

    This is mainly because of the lack of potent mobile malware in the wild. We could determine

    the following factors resulting in mobile malware being less harmful.

    Mobile devices did not store any critical information. Thus leaking it or erasing was not

    lucrative to the mobile malware developers.

    Most of the mobile devices in use today do not support programmable capabilities or

    for that matter processors capable of running applications. As a result, even with the

    penetration of mobile devices being high, those that can support these mobile malware is

    not very large.

    Depending upon our study of the current technologies prevalent in the mobile domain, the

    vulnerabilities present in them and the different possibilities of attack, we could briefly categorize

    the futuristic threats in the following categories.

    4.1 Location Tracking

    Services already exist for tracking mobile users [6]. By using one of the many mobile phone

    location tracking services aimed at businesses or concerned parents, and some trickery, it is

    possibly to get almost anyones mobile phone position without their agreement. All that is

    required is their mobile phone number, and carrier. Over the past year a number of sites have

    popped up offering web based mobile phone tracking services. To use their services you purchase

    a monthly subscription or set number of credits, and enter in the targets phone number. The

    target then receives an SMS message asking them to confirm they consent to the tracking. After

    6

  • 8/7/2019 Mobile Viruses and Worms Report IT653

    10/18

    the target replies, the tracker can then request their position online and receive a street address,

    post code, and map of their location with an accuracy of around 250 meters.

    4.2 Bugging

    A bug is a tiny transmitter, that can covertly transmit the video and audio data to any receiver

    nearby that is tuned to receive it. A mobile bug is an application that can take the microphone

    audio data and the camera video data and stream it over a bluetooth connection. If an attacker

    designs a mobile trojan and covertly installs it on a mobile device, then all the incoming and

    outgoing voice calls can be tracked by that attacker. The trojan can also be programmed to

    record this data and send it over a GPRS connection. This will result in a serious invasion of

    privacy as well as a security risk. Leakage of video data can result in private information being

    made public. Also as a result of the video data sent over the GPRS the user can be tracked

    anywhere, including sensitive locations.

    4.3 Leakage of confidential data

    Mobile phones are increasingly being used for making online payments and managing e-accounts.

    As a result of this a large amount of confidential data gets stored into the mobile. This includes

    account information, account balance, passwords, credit card numbers, transactions etc. Also

    mobile phones need authorization information which is stored in the form of public and private

    keys. Since the data is easily accessible to any application, all of such sensitive and highly

    confidential information can be easily leaked out by a trojan installed on the system.

    4.4 DDOS attack

    One of the most serious effects of having a multitude of mobile devices under a single MSP is

    the threat of a DDOS attack. According to [12] a denial vulnerability existed in the GGSN4

    made by Nokia. This could be remotely exploited by an attacker by sending a TCP packet as

    0xFF. This was not handled by the GGSN which sent it into kernel panic and resulted in a

    reboot of the GGSN. As a result of this, all the mobile devices connected to that GGSN would

    lose connectivity.

    This is a very serious vulnerability and one which can be attacked very easily. The DDOS

    attack can be launched in two stages. In stage one the trojan will get installed into as many

    mobile devices as possible and thus create a zombie army. Then on a aforementioned date and

    time all of them will start to bombard the GGSN with these malformed packets resulting inmultiple reboots by the GGSN. Even if the GGSN blocked the devices one by one, it would take

    a lot of time till they were all blocked.

    The above exploit is the most serious effect possible of mobile malware that can result in

    huge losses both for the mobile service providers as well as the users. Compared to DDOS

    attacks on websites which hinder the access only to them, a DDOS attack on a mobile service

    provider results in the total disconnection of all the clients under that service provider.

    4Gateway GPRS Service Node

    7

  • 8/7/2019 Mobile Viruses and Worms Report IT653

    11/18

  • 8/7/2019 Mobile Viruses and Worms Report IT653

    12/18

    Limited battery life in mobile devices.

    Eliminating the possibilities of various types of attacks launched against the implementa-

    tion.

    According to [10]

    The MOSES project employs a novel system-level design methodology to build the

    hardware / software platform. The MOSES design methodology combines state-of-

    the-art commercial design tools with several novel domain-specific methodologies that

    are indispensable in deriving an optimized system architecture.

    As per the MOSES methodology, a separate device from the main processor relates to a huge

    jump in security. The idea is that if the security implementation is performed on a device

    separate from the main processor,then if the main processor gets hacked into, the hacker wont

    have access to stored passwords and encryption keys that would be necessary for them to gain

    access to further information.

    Software Architecture

    The software architecture for MOSES is layered and runs parallel to the one found in network

    protocols. The top layer provides a generic interface which applications can use to be ported to

    the platform. It consists of security primitives such as key generation, encryption/decryption of

    a block of data which are implemented on top of a layer of complex mathematical operations.

    Hardware Architecture

    One of the most important features provided by the MOSES architecture is the extension of pro-cessor instruction set for including cryptographic operations. This not only assists in increasing

    the computational speed but also reduces the power consumed by the processor.

    Performance

    The MOSES platform has shown to speed up the execution of security protocols such as SSL,

    IPSec, WTLS etc. For small data transactions, the MOSES platform contributes to an overall

    transaction speedup of around 2.18X. In the case of large transactions, MOSES achieves and

    overall transaction speed-up of 3.05X. [10]

    5.3 Proactive Approach

    The crucial protection measure performed in insecure environment is the search and destroy

    methodology which is better known as the reactive approach. According to this principle, we

    build a database of all the known virus signatures and then analyze the network traffic for their

    existence.

    This approach works when the network penetration is large but the network speed is slow.

    As a result by the time the virus reaches critical mass and begins to cause chaos, the scanners

    are already ready to pick it up.

    But in todays high speed networks, malware reach critical mass within a few hours. As

    a result reactive approach fails miserably. In light of such context, we discuss a proactive

    approach[1] that is better suited for solving this problem.

    9

  • 8/7/2019 Mobile Viruses and Worms Report IT653

    13/18

  • 8/7/2019 Mobile Viruses and Worms Report IT653

    14/18

    2. the parameters of the behavior vectors change by a certain threshold over the previous

    values.

    Proactive Containment Methods

    Once the monitors setup within any cluster determine that the traffic from a particular client

    is over a particular threshold, then we need to perform proactive containment to prevent an

    infection from spreading, if one exists. This is performed in two stages.

    Virus Throttling Algorithm

    The virus throttling algorithm is designed keeping in mind the average flow of traffic in a network.

    When a worm tries to propagate within a network, it repeatedly sends itself to every recipient

    within that network. This type of behavior is identified by the virus throttling algorithm and

    mitigated. The need for virus throttling algorithm exists because if a general user sends out a

    legitimate and genuine message to multiple users, then a direct block approach will block this

    legitimate message resulting in a false positive for the proactive approach. The intermediate

    step of rate limiting due to the virus throttling algorithm decreases the false positive rate to a

    near negligible value.

    Figure 3: Virus Throttling Algorithm

    (Source: [1])

    The virus throttling algorithm works as follows : A working set of size n is maintained for

    every client. This holds the clients that have been recently sent a message to. Whenever the

    client wants to send a new message, the recipient is matched against this working set. If the

    recipient exists, the message is sent immediately. If the recipient does not exist, then this message

    11

  • 8/7/2019 Mobile Viruses and Worms Report IT653

    15/18

    is put on a delay queue. At periodic intervals, the top entry is removed from the delay queue.

    This entry replaces the oldest entry from the working set using the least recently used algorithm.

    Once that is done, all messages queued up for that recipient are delivered immediately. Also if

    the queue length exceeds a particular threshold value, then all further messages can b e blocked.

    Quarantine

    The aim of the virus throttling algorithm is to identify the false positives in the classifications

    performed by the monitors installed in the clusters. Hence we set up a time and message

    threshold on the output of the virus throttling algorithm. If after a certain period also the

    message rate from the sender does not reduce, we can be certain that the client has been

    infected by a worm, and hence we can quarantine that client from the network. All messages

    from that client will thus be blocked.

    5.4 Our thoughts on protective measures

    With the increasing number of attack vectors being developed and the vulnerabilities being

    exposed, the need for advanced protective measures is very much on the rise. As a result, the

    protective measures proposed above have a very strong futuristic value. The main aspect of both

    of these proposed schemes is to be proactive in approach and not reactive. Since the spread time

    of mobile malware has dropped down exponentially, the malware can reach critical mass before

    any proper reactive techniques can be designed to successfully combat it. Hence the proactive

    measures are the only ray of hope as they can curb the malware from propagation before it is

    even detected.

    The MOSES system [10] designed has a very strong architectural base. Separating the crypto

    engines from the actual mobile processing provides a fence within which all the secure data isheld. As a result, even if the processor security was compromised, the attacker cannot decipher

    the secure data held within it. MOSES also uses secure connections for all communications and

    hence evesdropping these by bug applications installed on the phone is not possible.

    We found that the work done on proactive security in mobile networks [1] is highly needed

    in view of the current and forthcoming network threats. The ideas of behavior vectors and

    behavioral clustering proposed by the group have a solid ground in data mining activities. As

    a result, it is not possible for the worm to propagate at a high rate without being detected and

    effectively quarantined.

    One disadvantage we found with this approach is that the Mobile service provider needs

    to carefully monitor and update all the parameters involved with this approach. This requires

    significant effort and also changes to the current underlying technology. Hence most of the

    mobile service providers are hesitant and unwilling in adopting this protection measure. But

    in due course of time, with faster network speed and higher network load, the mobile service

    provider will face threats from the infected mobile devices. We have shown one such example in

    the section Futuristic Threats. In such a scenario, the service provider will have to implement

    protective measures to protect the network from such attacks.

    12

  • 8/7/2019 Mobile Viruses and Worms Report IT653

    16/18

  • 8/7/2019 Mobile Viruses and Worms Report IT653

    17/18

    [11] Trend Micro. (October 2006) Trend Micro Mobile Security. [Online]. Available: http://

    www.trendmicro.com/en/products/mobile/tmms/evaluate/overview.htm

    [12] CVE-2003-0368. (October 2006) Common Vulnerabilities and Exposure. [Online] Available:

    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0368

    [13] Linux Devices. (October 2006) The Linux Mobile Phones Showcase. [Online] Available:

    http://www.linuxdevices.com/articles/AT9423084269.html

    [14] 29A. (October 2006) Source Code - Cabir. [Online] Available: http://netsecurity.

    51cto.com/art/200605/26545.htm

    14

  • 8/7/2019 Mobile Viruses and Worms Report IT653

    18/18

    7 APPENDIX

    Known mobile malware

    Figure 4: Mobile Malware Families at a glance

    (Source: [2])

    15