October 13, 2006 4:00 AM PDT

The future of malware: Trojan horses

Related Stories

A banner year for security bugs

October 11, 2006

Zero-day attacks continue to hit Microsoft

September 27, 2006

Security firm: Samsung site hosts Trojan

September 8, 2006

Zero-day Wednesdays

July 24, 2006

Hacking for dollars

July 6, 2005
MONTREAL--Some of the most dangerous cyberattacks are the least visible ones.

Widespread worms, viruses or Trojan horses spammed to millions of mailboxes are typically not a grave concern anymore, security experts said at the Virus Bulletin conference here Thursday. Instead, especially for organizations, targeted Trojan horses have become the nightmare scenario, they said.

"Targeted Trojan horses are still a tiny amount of the overall threat landscape, but it is what the top corporations worry about most," said Vincent Weafer, a senior director at Symantec Security Response. "This is what they stay up at night worried about."

The stealthy attacks install keystroke-logging or screen-scraping software, and they are used for industrial espionage and other financially motivated crimes, experts said.

Cybercrooks send messages to one or a few addresses at a targeted organization and attempt to trick their victim into opening the infected attachment--typically, a Microsoft Office file that exploits a yet-to-be-patched vulnerability to drop the malicious payload.

Security technology can stop common attacks, but targeted attacks fly under the radar. That's because traditional products, which scan e-mail at the network gateway or on the desktop, can't recognize the threat. Alarm bells will ring if a new attack targets thousands of people or more, but not if just a handful of e-mails laden with a new Trojan horse is sent.

"It is very much sweeping in under the radar," said Graham Cluley, a senior technology consultant at Sophos, a U.K.-based antivirus company. If it is a big attack, security companies would know something is up, because it hits their customers' systems and their own honeypots (traps set up to catch new and existing threats), he said.

"It is very much sweeping in under the radar."
--Graham Cluley, senior technology consultant, Sophos

Targeted attacks are, at most, a blip on the radar in the big scheme of security problems, researchers said. MessageLabs pulls about 3 million pieces of malicious software out of e-mail messages every day. Only seven of those can be classified as a targeted Trojan attack, said Alex Shipp, a senior antivirus technologist at the e-mail security company.

"A typical targeted attack will consist of between one and 10 similar e-mails directed at between one and three organizations," Shipp said. "By far the most common form of attack is to send just one e-mail to one organization."

In the past two years, MessageLabs has seen such attacks hit multinational companies, governments and military bodies. Other recurring targets include law firms, human rights organizations, news organizations and educational establishments, Shipp said.

Most attacks include Office files that use yet-to-be-patched vulnerabilities in the Microsoft application to install malicious code on vulnerable systems. The software giant has patched many such flaws on recent Patch Tuesdays.

Office files are also popular with attackers because organizations typically allow people to receive those files in e-mail, while executables or other files seen as more likely to be malicious are often blocked, Shipp said. "By and large, the best way of getting into an organization is to use something that the company lets in," he said.

The future of malware
The use of zero-day flaws circumvents traditional signature-based security products. These products rely on attack signatures (the "fingerprint" of the threat) to block the attack, which requires the attack to have been identified at least once before.

"This is the future of malware attacks," said Andreas Marx, an antivirus software specialist at the University of Magdeburg in Germany. "People affected by this won't be protected by antivirus software because there is no signature."

A signature is created when antivirus companies get a report from an infected company, when they see samples in their own honeypots, or get samples from other antivirus companies. "This doesn't happen with targeted attacks, as only an extremely small number of people get infected," Marx said.

As an example, Shipp said that only four antivirus products today detect one specific targeted attack that was first spotted months ago. Other products still let it through. MessageLabs is able to identity some of the threats by looking at the specific details of Office documents attached to e-mail and pinpointing unusual code in them, he said.

The identity of the attackers is mostly unknown. Security experts have theories of multiple gangs in different parts of the world, but haven't been able to pinpoint them.

The motivation of the attackers is also topic of dispute. From his analysis, Shipp believes the intent is to steal information. "In other words, corporate espionage," he said.

But Symantec's Weafer isn't so sure. "Whether they are for hire, or whether they are simply trying stuff out is not clear," he said.

Security companies are working on behavioral blocking and other techniques that go beyond signature-based detection to protect systems. Heuristics, which are programs that use pattern recognition, instead of being based on algorithms, are one example.

"Antivirus companies have moved in leaps and bounds in terms of heuristic attacks," Cluley said. "It is not completely disastrous, even if it doesn't appear on the radar. Good proactive protection can still defend against a lot of this stuff," he said.

The real good news is that there is a only a very low probability that any specific company was attacked last year, Shipp said. "The bad news is, if you were attacked and it was successful, it is of very high value," he said.

See more CNET content tagged:
Alex Shipp, attack, radar, MessageLabs Ltd., Graham Cluley

8 comments

Join the conversation!
Add your comment
Not to Brag ...
Not to brag, but I called this. Back when Intel was offering a serial number embedded into each pentium chip, I said right here on c/Net that was going to be the biggest security threat ever for the very reasons explained in this article. I even suggested that protecting serial numbers would be necessary to prevent targetted attacks, which would negate the whole purpose of the serial numbers. Hah. At least I was correct one time! ;-)

mark d.
Posted by markdoiron (1138 comments )
Reply Link Flag
Could you please explain?
According to the article, the reason for the success of these attacks is that targeted attacks slip past virus scanners because they are not included in the scanners' signature files. And they are not included in these files because they have attacked too few people to be noticed. What does that have to do with processor serial numbers? Seems to me that the serial numbers are a completely separate issue. Having a processor with a serial number makes you no more or less vulnerable to the targeted trojan.
Posted by cubicleslave1 (27 comments )
Link Flag
I worry more about
I'm more concerned that the top leaders of our major corporations are spying on me, planning attacks against me, and creating trojans that will ruin my life.

Could someone please create a trojan that would rid us of bad CEO's.
Posted by GrandpaN1947 (187 comments )
Reply Link Flag
Well, maybe the trojans....
Are being made by major corporations. That is a possibility that no one wants to raise, that the trojan horses are being made by people connected with the antivirus and anti-spyware companies.

That is a possibility that I think might be at least possible, though not plausible.
Posted by Leria (585 comments )
Link Flag
If They Didn't Drink The Microsoft Kool Aid
Companies could eliminate this spyware threat by running Unix based thin clients on the desktop, uing products like Open Office, and disallowing document macros. Desktop computers shouldn't have to run any security software at all, that should run on a central server. The article doesn't even address what happens if the antivirus/spyware software crashes and stops running, or is disabled accidentally or intentionally.

We didn't have these security problems when companies ran IBM 3270 or Vax terminal sessions. The problem came about when an inherently insecure, stand-alone single user operating system became the corporate desktop standard. Now we are stuck with the consequences of that decision. You can try to put band-aid on top of band-aid over the problem but you will still fail.
Posted by maxwis (141 comments )
Reply Link Flag
Re: Microsoft Kool Aid
We have the situation today because corporate managers who
controlled the purse strings wanted the same thing that they were
using at home with the family. Unix, in thier eyes, was a system for
geeks which they simply didn't understand and sadly enough,
weren't going to purchase..
Posted by imacpwr (456 comments )
Link Flag
 

Join the conversation

Add your comment

The posting of advertisements, profanity, or personal attacks is prohibited. Click here to review our Terms of Use.

What's Hot

Discussions

Shared

RSS Feeds

Add headlines from CNET News to your homepage or feedreader.