http://wormholetravel.net/pentest.html
According to Greek mythology, the
Greeks won the Trojan War by entering in to the fortified city of Troy hiding
in a huge, hollow wooden horse. The Greeks built a huge wooden horse for their
soldiers to hide in. They left the horse in front of the gates of Troy. The
Trojans thought it to be a gift from the Greeks, who had withdrawn from the
war, and so they transported the horse into their city. At night, the Spartan
soldiers broke through the wooden horse, and opened the gates for their soldiers
who eventually destroyed the city of Troy.
Taking a cue from Greek mythology, a
computer Trojan is defined as a "malicious, security-breaking program that
is disguised as something benign." A computer Trojan horse is used to
enter a victim's computer undetected, granting the attacker unrestricted access
to the data stored on that computer and causing immense damage to the victim.
For example, a user downloads what appears to be a movie or a music file, but
when he or she runs it, it unleashes a dangerous program that may erase the
unsuspecting user's disk and send his or her credit card numbers and passwords
to a stranger. A Trojan can also be wrapped into a legitimate program, meaning
that this program may have hidden functionality that the user is unaware of.
In another scenario, a victim may
also be used as an intermediary to attack others—without his or her knowledge.
Attackers can use the victim's computer to commit illegal denial-of-service
attacks such as those that virtually crippled the DALnet IRC network for months
on end. (DALnet is an
Internet relay chat (IRC) network that is a form of instant communication over
the network.)
Trojan horses work on the same level of
privileges that the victim user has. If the victim had the privileges, Trojan
can delete files, transmit information, modify existing files, and install
other programs (such as programs that provide unauthorized network access and
execute privilege-elevation attacks). The Trojan horse can attempt to exploit a
vulnerability to increase the level of access beyond that of the user running
the Trojan horse. If successful, the Trojan horse can operate with increased
privileges and may install other malicious codes on the victim's machine.
A compromise of any system on a network
may affect the other systems on the network. Systems that transmit
authentication credentials such as passwords over shared networks in clear text
or in a trivially encrypted form are particularly vulnerable. If a system on
such a network is compromised, the intruder may be able to record user names
and passwords or other sensitive information.
Additionally, a Trojan, depending on the
actions it performs, may falsely implicate the remote system as the source of
an attack by spoofing and, thereby, cause the remote system to incur
liabilities.
Purpose of Trojans
Trojan horses are the dangerous malicious
programs that affect computer systems without the victim's knowledge. The
purpose of Trojan is to:
- Delete
or replace the operating system's critical files
- Generate
fake traffic to create DOS attacks
- Download
spyware, adware, and malicious files
- Record
screenshots, and audio and video of the victim's PC
-
Steal information such as passwords, security codes, and credit card
information using keyloggers
- Disable
firewalls and antivirus software
- Create
backdoors to gain remote access
- Infect
a victim's PC as a proxy server for relaying attacks
- Use
a victim's PC as a botnet to perform DDoS attacks
- Use
a victim's PC for spamming and blasting email messages
What Do Trojan Creators Look For?
Trojans are written to steal information
from other systems and to exercise control over them. Trojans look for the
target's personal information and, if found, return it to the Trojan writer
(attacker). They can also allow attackers to take full control over a system.
Trojans are not solely used for
destructive purposes; they can also be used for spying on someone's machine and
accessing private and/or sensitive information.
Trojans are created for the following reasons:
-
To steal sensitive information, such as:
-
Credit card information, which can be used for domain registration, as
well as for shopping.
-
Account data such
as email passwords,
dial-up passwords, and
web services passwords. Email addresses
also help attackers to spam.
- Important company projects including presentations and work-related
papers could be the targets of these attackers, who may be working for rival
companies.
- Attackers can use the target's computers
for storing archives of illegal materials, such as child pornography. The
target can continue to use their computer, and have no idea about the illegal
activities for which their computer is being used.
- Attackers can use the target computer as an FTP Server for pirated
software.
- Script kiddies may just want to have fun
with the target's system. They might plant a Trojan in the system, which then
starts acting strangely: the CD tray opens and closes frequently, the mouse
functions improperly, etc.
The compromised system might be used for
other illegal purposes, and the target would be held responsible for all
illegal activities, if the authorities discover them.
Indications of a Trojan Attack
A Trojan is software designed to steal
data and demolish your system. It creates a backdoor to attackers to intrude
into your system in stealth mode. The system becomes vulnerable to the Trojan
and attackers can easily launch their attack on the system if it is not
safeguarded. Trojans can enter your system using various means such as email
attachments, downloads, instant messages, open ports, etc. The following are
some of the indications that you may notice on your system when it is attacked
by the Trojan:
- CD-ROM
drawer opens and closes by itself
- Computer
browser is redirected to unknown pages
- Strange
chat boxes appear on target's computer
- Documents
or messages are printed from the printer
- Functions
of the right and left mouse buttons are reversed
- Abnormal
activity by the modem, network adapter, or hard drive
- The
account passwords are changed or unauthorized access
- Strange
purchase statements appear in the credit card bills
- The
ISP complains to the target that his or her computer is IP scanning
- People
know too much personal information about a target
Though Trojans run in stealth mode, they
exhibit some characteristics, observing which; you can determine the existence
of Trojans on your computer. The following are typical symptoms of a Trojan
horse virus infection:
- Antivirus
software is disabled or does not work properly
- The
taskbar disappears
- Windows
color settings change
- Computer
screen flips upside down or inverts
- Screensaver's
settings change automatically
- Wallpaper
or background settings change
- Windows
Start button disappears
- Mouse
pointer disappears or moves by itself
- The
computer shuts down and powers off by itself
- Ctrl+Alt+Del
stops working
- Repeated
crashes or programs open/close unexpectedly
- The
computer monitor turns itself off and on
Common Ports Used by Trojans
IP ports play an important role in
connecting your computer to the Internet and surfing the web, downloading
information and files, running software updates, and sending and receiving
emails and messages so that you can connect to the world. Each computer has
unique sending and receiving ports for each function.
Users need to have a basic understanding
of the state of an "active connection" and ports commonly used by
Trojans to determine if the system has been compromised.
There are different states, but the
"listening" state is the important one in this context. This state is
generated when a system listens for a port number when it is waiting to make a
connection with another system. Trojans are in a listening state when a system
is rebooted. Some Trojans use more than one port as one port may be used for
"listening" and the other(s) for data transfer.
How to Infect Systems Using a Trojan
An attacker can control the hardware as
well as software on the system remotely by installing Trojans. When a Trojan is
installed on the system, not only does the data become vulnerable to threats,
chances are that the attacker can perform attacks on the third-party system.
Attackers infect the system using Trojans in many ways:
- Trojans are included in bundled
shareware or downloadable software. When a user downloads those files, Trojans
are installed onto the systems automatically.
- Users are tricked with the different
pop-up ads. It is programmed by the attacker in such a way that it doesn't
matter if is the user clicks YES or NO; a download starts and the Trojan is
installed onto the system automatically.
- Attackers send Trojans through email
attachments. When those attachments are opened, the Trojan is installed on the
system.
- Users are sometimes tempted to click on
different kinds of files such as greeting cards, porn videos, images, etc.,
where Trojans are silently installed one the system.
The step-by-step process for infecting machines using a Trojan is as
follows:
Step 1. Create a new Trojan packet using a
Trojan Horse Construction Kit.
Step 2. Create a dropper, which is a part
in a Trojanized packet that installs the malicious code on the target system.
Step 3. Create a
wrapper using tools to install the Trojan on the victim's computer. By using
various tools like petite.exe, Graffiti.exe, EliteWrap, etc., a wrapper is
created to install the Trojan on the victim's computer.
Step 4. Propagate the
Trojan. Computer virus propagation (spreading) can be done through various
methods:
- An automatic execution mechanism is one
method where traditionally it was spread through floppy disks and is now spread
through various external devices. Once the computer is booted, the virus
automatically spreads over the computer.
- Even viruses can be propagated through
emails, Internet chats, network sharing, P2P file sharing, network redirecting,
or hijacking.
Step 5. Execute the
Dropper. Dropper is used by attackers to disguise their malware. The user is
confused and believes that all the files are genuine or known files. Once it
gets loaded into the host computer, it helps other malware to get loaded and
perform the task.
Step 6. Execute the
damage routine. Most computer viruses contain a Damage Routine that delivers
payloads. A payload sometimes just displays some images or messages whereas
other payloads can even delete files, reformat hard drives, or cause other
damage.
Wrappers
Source: http://www.objs.com
Wrappers are used to bind the Trojan
executable with a genuine-looking .EXE application such as games or office
applications. When the user runs the wrapped EXE, it first installs the Trojan
in the background and then runs the wrapping application in the foreground. The
attacker can compress any (DOS/WIN) binary with tools such as petite.exe. This
tool decompresses an EXE file (once compressed) on runtime. This makes it
possible for the Trojan to get in virtually undetected, since most antivirus
software is not able to detect the signatures in the file.
The attacker can place several executables
inside one executable, as well. These wrappers may also support functions such
as running one file in the background while another one is running on the
desktop.
Technically speaking, wrappers can be
considered another type of software "glueware" used to bind other
software components together. A wrapper encapsulates into a single data source
to make it usable in a more convenient fashion than the original unwrapped
source.
Users can be tricked into installing
Trojan horses by being enticed or frightened. For instance, a Trojan horse
might arrive in an email described as a computer game. When the user receives
the mail, the description of the game may entice him or her to install it.
Although it may, in fact, be a game, it may also be taking other action that is
not readily apparent to the user, such as deleting files or mailing sensitive
information to the attacker. In another instance, wan attacker sends a birthday
greeting that will install a Trojan as the user watches, such as a birthday
cake dancing across the screen.
Fake Programs
- Attackers can easily lure a victim into
downloading free programs that are suitable for their needs, and loaded with
features such as an address book, access to check several P0P3 accounts, and
many other functions that make it even better than the currently used email client.
- The victim downloads the program and
marks it as TRUSTED, so that the protection software fails to alert him or her
of the new software being used. The email and P0P3 account passwords are mailed
directly to the attacker's mailbox without anyone noticing. Cached passwords
and keystrokes can also be mailed. The aim is to gather ample information and
send it to the attacker.
- In some cases, an attacker may have
complete access to a system, but what the attacker does depends on his or her
ideas about how to use the hidden program's functions. While sending email and
using port 25 or 110 for POP3, these could be used for connections from the
attacker's machine (not at home, of course, but from another hacked machine) to
connect and use the hidden functions they implemented in the used email client.
- The victim downloads the program and
marks it as TRUSTED, so that the protection software fails to alert him or her
of the new software being used. The email and POP3 account passwords are mailed
directly to the attacker's mailbox without anyone noticing. Cached passwords
and keystrokes can also be mailed. The aim is to gather ample information and
send it to the attacker.
- In some cases, an attacker may have
complete access to a system, but what the attacker does depends on his or her
ideas about how to use the hidden program's functions. While sending email and
using port 25 or 110 for POP3, these could be used for connections from the
attacker's machine (not at home, of course, but from another hacked machine) to
connect and use the hidden functions they implemented in the freeware program.
The idea here is to offer a program that requires a connection with a server be
established.
- Attackers thrive on creativity. Consider
an example where a fake audio galaxy, which is a site for downloading MP3, is
given. An attacker generates such a site by using 15-gb space on his system to
place a larger archive there for the MP3. In addition, some other systems are
also configured in the same fashion. This is done to fool users into thinking
that they are downloading from other people who are spread across the network.
The software acts as a backdoor and will infect thousands of naive users using
ADSL connections.
- Some fake programs have hidden codes,
but still maintain a professional look. These websites link to anti-Trojan
software, thus fooling users into trusting them. Included in the setup is
readme.txt. This can deceive almost any user, so proper attention needs to be
given to any freeware before it is downloaded.
Shrink-Wrapped Software
Legitimate
"shrink-wrapped"
software packaged by a
disgruntled employee can contain Trojans.
Via Attachments
When unaware web users receive an email
saying they will get free porn or free Internet access if they run an attached
.exe file, they might run it without completely understanding the risk to their
machines.
-Example:
- A user has a good friend who is carrying
out some research and wants to know about a topic related to his friend's field
of research. He sends an email to his friend asking about the topic and waits
for a reply. The attacker targeting the user also knows his friend's email
address. The attacker will simply code a program to fake the email From: field
and make it appear to be the friend's email address, but it will include the
TROJANED attachment. The user will check his email, and see that his friend has
answered his query in an attachment, and download and run it without thinking
that it might be a Trojan. The end result is an infection.
-
Trash email with the subject line, "Microsoft IE Update,"
without viewing it.
- Some email clients, such as Outlook
Express, have bugs that automatically execute the attached files.
Untrusted Sites and Freeware Software
-
A site located at a free web space provider or one just offering
programs for illegal activities can be considered suspicious.
There are many underground sites such as
NeuroticKat Software. It is highly risky to download any program or tool
located on such a suspicious site that can serve as a conduit for a Trojan attack on a victim's
computer. No matter what software you use, are you ready to take that risk?
- Many sites are available that have a
professional look and contain huge archives. These sites are full of feedback
forms and links to other popular sites. Users must take the time to scan such
files before downloading them, so that it can be determined whether or not they
are coming from a genuine site or a suspicious one.
- Software such as mIRC, ICQ, PGP, or any
other popular software must be downloaded from its original (or official
dedicated mirror) site, and not from any other websites that may have links to
download supposedly the same software.
- Webmasters of well-known security
portals, who have vast archives with various "hacking" programs,
should be responsible for the files they provide and scan them often with
anti-virus and anti-Trojan software to guarantee the site to be "free of
Trojans and viruses." Suppose an attacker submits a program infected with
a Trojan, в e.g., a UDP flooder, to the webmaster for the archive; if the
webmaster is not alert, the attacker may use the webmaster's irresponsibility
to infect the site's files with a Trojan.
- Users who deal with any kind of software
or web application should scan their systems on a daily basis. If they detect
any new file, it should be examined. If any suspicion arises regarding the
file, it must be forwarded to software detection labs for further analysis.
- It is easy to infect machines using
freeware programs. "Free is not always the best" and hence these
programs are hazardous for systems.
NetBIOS (File Sharing)
If port 139 on the system is open, i.e.,
file sharing is enabled, it can be used by others to access the system, install
trojan.exe, and modify a system's file.
The attacker can also use a DoS attack to
shut down the system and force a reboot, so the Trojan can restart itself
immediately. To block file sharing in the WinME version, go to:
Start -> Settings -> Control Panel -> Network -> File and Print
Sharing
- Uncheck the boxes there. This will prevent
NetBIOS abuse.
How to Deploy a Trojan
A Trojan is the means by which an attacker
can gain access to the victim's system. In order to gain control over the
victim's machine, an attacker creates a Trojan server, and then sends an email
to a victim containing a link to the Trojan server. Once the victim clicks on
the link sent by the attacker, it connects him or her directly to the Trojan
server. The Trojan server sends a Trojan to the victim system. The attacker installs
the Trojan, infecting the victim's machine. As a result, victim is connected to
the attack server unknowingly. Once the victim connects to an attacker server,
the attacker takes complete control over the victim's system and performs any
action the attacker chooses. If the victim carries out any online transaction
or purchase, then the attacker can easily steal sensitive information such as
credit card details, account information, etc. In addition, attackers can also
use the victim's machine as the source for launching attacks on other systems.
Computers typically get infected by users
clicking on a malicious link or opening an email attachment that installs a
Trojan on their computers that serves as a back door to criminals who can then
command the computer to send spam email.
Evading Antivirus Techniques
The following are the various
techniques used by Trojans, viruses, and worms to evade most of antivirus
software:
1. Never
use Trojans downloaded from the web (antivirus detects these easily).
2. Write
your own Trojan and embed it into an application.
3. Change
the Trojan's syntax:
e
Convert an EXE to VB script e
Convert an EXE to a DOC file e
Convert an EXE to a PPT file
4. Change
the checksum.
5. Change
the content of the Trojan using a hex editor.
6. Break
the Trojan file into multiple pieces.
Command Shell Trojan: Netcat
Using Netcat эп attacker can set up a port
or a backdoor that will allow him or her to telnet into a DOS shell. With a
simple command such as C:\>nc -L -p 5000 -t -e cmd.exe, the attacker can
bind port 5000. With Netcat, the user can create outbound or inbound
connections, TCP or UDP, to or from any port. It provides for full DNS
forward/reverse checking, with appropriate warnings. Additionally, it provides
the ability to use any local source port, any locally configured network source
address, and it comes with built-in port-scanning capabilities. It has a
built-in loose source-routing capability and can read command-line arguments
from standard input. Another feature is the ability to let another program
respond to inbound connections (another program service established
connections).
In the simplest usage, "nc host
port" creates a TCP connection to the given port on the given target host.
The standard input is then sent to the host, and anything that comes back
across the connection is sent to the standard output. This continues
indefinitely, until the network side of the connection shuts down. This
behavior is different from most other applications, which shut everything down
and exit after an end-of-file on the standard input. Netcat can also function as
a server by listening for inbound connections on arbitrary ports, and then
doing the same reading and writing. With minor limitations, Netcat does not
really care if it runs in client or server mode; it still moves data back and
forth until there is none left. In either mode, shutdown can be forced after a
configurable time of inactivity on the network side.
Features:
- Outbound
or inbound connections, TCP or UDP, to or from any port
- Full
DNS forward/reverse checking, with appropriate warnings
- Ability
to use any local source port
- Ability
to use any locally configured network source address
- Built-in
port-scanning capabilities, with randomizer
- Built-in
loose source-routing capability
- Can
read command-line arguments from standard input
- Slow-send
mode, one line every N seconds
- Hex
dump of transmitted and received data
- Optional
ability to let another program service establish connections
- Optional
telnet-options responder using the command nc -I -p 23 -t -e cmd.exe
- Where
23 is the port for telnet, -I option is to listen, -e option is to execute, -t
option tells Netcat to handle any telnet negotiation the client might expect.
Netcat is a utility used for reading and
writing the networks that support TCP and UDP protocols. It is a Trojan that is
used to open either the TCP or UDP port on a target system and hackers with the
help of Telnet gain the access over the system.
Defacement Trojans: Restorator
Source: http://www.bome.com
Restorator is a versatile skin editor for
any Win32 programs. The tool can modify the target interface of any Windows
32-bit program and thus create target-styled Custom Applications (UCAs). You
can view, extract, add, remove, and change images, icons, text, dialogs,
sounds, videos, version, dialogs, and menus in almost all programs.
Technically speaking, it allows you to
edit the resources in many file types, for example .ocx (Active X), .scr
(Screen Saver), and others. The attacker can distribute modifications in a
small, self-executing file. It is a standalone program that redoes the
modifications made to a program. Its Grab function allows you to retrieve
resources from files on a target's disk.
Restorator is the Borne flagship product
that allows you to do resource (resources are application-dependent data that
the respective programmer includes in the program) editing. It is a utility for
editing Windows resources in applications and their components, e.g., files
with .exe, .dll, .res, .re, and .dcr extensions. You can use this for
translation/localization, customization, design improvement, and development.
This resource editor comes with an intuitive target-interface. You can replace
logos and can control resource files in the software development process. It
can intrude into the target's system and its working programs.
Botnet Trojans
A botnet is a collection of software
robots (worms, Trojan horses, and backdoors) that run automatically. It refers
to a collection of compromised machines running programs under a common command
and control infrastructure. A botnet's originator (attacker) can control the
group remotely. These are computers (a group of zombie computers) infected by
worms or Trojans and taken over surreptitiously by attackers and brought into
networks to send spam, more viruses, or launch denial of service attacks. This
is a computer that has been infected and taken over by an attacker by using a
virus/Trojan/malware.
Botnet owners usually target educational,
government, military, and other networks. With the help of botnets, attacks
like denial of service, creation or misuse of SMTP mails, click fraud, theft of
application serial numbers, login IDs, credit card numbers, etc. are performed.
HTTP/HTTPS Trojans
HTTP/HTTPS Trojans can bypass any
firewall, and work in the reverse way of a straight HTTP tunnel. They use
web-based interfaces and port 80. These Trojans are executed on the internal
host and spawn a child every day at a certain time. The child program appears
to be a target to the firewall which, in turn, allows it to access the
Internet. However, this child program executes a local shell, connects to the
web server that the attacker owns on the Internet through a legitimate-looking
HTTP request, and sends it a ready signal. The legitimate-looking answer from
the attacker's web server is in reality a series of commands that the child can
execute on the machine's local shell. All traffic is converted into a
Base64-like structure and given as a value for a cgi-string, so the attacker
can avoid detection. The following is an example of a connection:
Slave:GET/cgi-bin/order?
M5mAejTgZdgYOdgIO0BqFfVYTgjFLdgxEdblHe7krj HTTP/l.O
Master replies with: gSmAifbknz
The GET of the internal host (SLAVE) is
just the command prompt of the shell; the answer is an encoded "Is"
command from the attacker on the external server (MASTER). The SLAVE tries to
connect daily at a specified time to the MASTER. If needed, the child is
spawned because if the shell hangs, the attacker can check and fix it the next
day. In case the administrator sees connections to the attacker's server and
connects it to himself, the administrator just sees a broken web server because
there is a token (password) in the encoded cgi GET request. WWW proxies (e.g.,
squid, a full-featured web proxy cache1) are supported. The program masks its
name in the process listing. The programs are reasonably small with the master
and slave programs, just 260-lines per file. Usage is easy: edit rwwwshell.pl
for the correct values, execute "rwwwshell.pl slave" on the SLAVE,
and run "rwwwshell.pl" on the MASTER just before it is the time at
which the slave tries to connect.
ICMP Tunneling
The concept of ICMP tunneling is simple
since arbitrary information tunneling in the data portion of ICMP.ECHO and
ICMP.ECHOREPLY packets is possible. ICMP_ECHO traffic contains a covert channel
that can be destroyed due to tunneling. Network devices do not filter the
contents of ICMP_ECHO traffic, making the use of this channel attractive to
hackers.
Attackers simply pass them, drop them, or
return them. The Trojan packets themselves are masquerading as common ICMP_ECHO
traffic. The packets can encapsulate (tunnel) any required information.
Covert channels are methods in which an
attacker can hide the data in a protocol that is undetectable. They rely on
techniques called tunneling, which allow one protocol to be carried over
another protocol. A covert channel is defined as a vessel through which the
information can pass, and it is generally not used for information exchanges.
Therefore, covert channels cannot be detected by using standard system security
methods. Any process or bit of data can be a covert channel. This makes it an
attractive mode of transmission for a Trojan, since an attacker can use the
covert channel to install the backdoor on the target machine.
Remote Access Trojans
Remote access Trojans provide full
control over the target's system to attackers and enables them to remotely
access files, private conversations, accounting data, and so on in the target's
machine. The remote access Trojan acts as a server, and listens on a port that
is not supposed to be available to Internet attackers. Therefore, if the target
is behind a firewall on the network, there is less chance that a remote
attacker would be able to connect to the Trojan. Attackers on the same network located
behind the firewall can easily access the Trojans.
Examples include the Back Orifice
and NetBus Trojans. Another example, the Bugbear virus that hit the Internet in
September 2002, installed a Trojan horse on targets' systems, giving access to
sensitive data to the remote attackers.
This Trojan works like a remote
desktop access. The attacker gains complete GUI access to the remote system.
The process is as as follows:
1. Infects
(Rebecca's) computer with server.exe and plants Reverse Connecting Trojan.
2. The
Trojan connects to Port 80
to the attacker in Russia
establishing a reverse
connection.
E-banking Trojans
E-banking Trojans are very dangerous and
have become a major threat to the banking transactions performed online. This
Trojan is installed on the victim's computer when he or she clicks the email
attachment or clicks on some advertisement once the target logins in to the
banking site. The Trojan is preprogrammed with a minimum range and maximum
range to steal. So it doesn't withdraw all the money from the bank. Then the
Trojan creates screenshots of the bank account statement; the victims aren't
aware of this type of fraud and thinks that there is no variation in their bank
balance unless they check the balance from other systems or from ATM machines.
Only when they check the balance will the differences be noticed.
Here the attacker first infects the
malicious advertisements and publishes these advertisements among genuine
websites. When the victims access the infected website, it automatically
redirects him or her to a website from where the exploit kit gets loaded onto
the victim's system. Thus, the exploit kit allows the attacker to control what
is loaded in the victim's system and used for installing a Trojan horse. This
malware is highly obfuscated and can only be detected by few anti-virus
systems. The system of the victim is now a botnet from where the Trojan easily
sends and receives instruction from the control and command server without the
knowledge of the victim. When a victim access his or her bank account from the
infected system, all the sensitive information, i.e., used by the victim in
accessing account information such as login credentials (user name password),
phone number, security number, date of birth, etc. are sent to the Control and
Command Server by the Trojan. If the victim is accessing the transaction
section of the banking website for performing online transactions, then the
data that is entered by the victim on the transaction form is sent to the
Control and Command Server instead of to the bank website. The control and
command server system analyzes and decodes the information and identifies
suitable money mule bank accounts. The Trojan receives instructions from the
control and command server to send the latest transaction form that is updated
by the control and command server to the bank for transferring money to the
mule account. Confirmation from the bank about successful/failed transaction of
the money that was transferred is also reported by the Trojan to the control
and command server.
Banking Trojan Analysis
A banker Trojan is a malicious program
that allows obtaining personal information about users and clients using online
banking and payment systems.
A banking Trojan analysis involves the
following three basic types:
Tan Gabbler: A
Transaction Authentication Number (TAN) is used for authenticating the online
banking transaction, which is a single-use password. The banking Trojan
explicitly attacks the target's online banking services that depend on the TAN.
When the TAN is entered, the Trojan grabs that number and changes that number
with any random number that is incorrect and rejected by the bank. The content
is filtered by the Trojan and the incorrect number is replaced in order to
satisfy the target. An attacker can misuse the intercepted TAN with the
target's login details.
HTML Injection: This
type of Trojan creates duplicate fields on the online banking sites and these
extra fields are used by the attacker to collect the targets account details,
credit card number, date of birth, etc. Attackers can use this information to
impersonate and compromise the target's account.
Form Grabber: This is
an advanced method of collecting data from the Internet available on the
various browsers. This is highly effective in collecting the target IDs,
passwords, and other sensitive information.
Credit Card Trojans
Credit card Trojans, once they are
installed on the victim's system, collect various details such as credit card
numbers, latest billing details, etc. Then, a fake online banking registration
form is created and they make the credit card user believe that it is genuine
information from the bank. Once the user enters the required information,
attackers collect the information and use the credit card for personal use
without the knowledge of the victim.
Credit card Trojans steal victims'
credit-card-related data such as card number, CW2s, and billing details. These
Trojans trick users into visit fake e-banking websites and entering personal
information. The Trojan servers transmit the stolen data to remote hackers
using email, FTP, IRC, or other methods.
Data Hiding Trojans (Encrypted Trojans)
Encryption Trojans encrypt the data
present on the victim's computer and renders the complete data unusable:
"Your computer caught our software while browsing illegal porn pages, all
your documents, text files, databases in the folder My Documents was encrypted
with complex password.'' Attackers demand a ransom or force victims to make
purchases from their online drugstores in return for the password to unlock
files: "Do not try to search for a program that encrypted your information
- it simply does not exists in your hard disk anymore," pay us the money
to unlock the password." This can be decrypted only by the attacker, who
demands money, or they can force the user buy from a few websites for
decryption.
How to Detect Trojans
Trojans are malicious programs that
masquerade as a useful or legitimate file but
their actual purpose is to take
complete control over your computer, thereby accessing your files and
confidential information. In order to avoid such unauthorized access and to
protect your files and personal information, an antivirus product has to be
used, which automatically scans and detects the presence of Trojans on your
system or you can also detect the Trojans installed on your system manually.
The following are the steps for detecting Trojans:
1. Scan
for suspicious OPEN PORTS
2. Scan
for suspicious RUNNING PROCESSES
3. Scan
for suspicious REGISTRY ENTRIES
4. Scan
for suspicious DEVICE DRIVERS installed on the computer
5. Scan
for suspicious WINDOWS SERVICES
6. Scan
for suspicious STARTUP PROGRAMS
7. Scan
for suspicious FILES and FOLDERS
8. Scan
for suspicious NETWORK ACTIVITIES
9. Scan
for suspicious modification to OPERATING SYSTEM FILES
10. Run
Trojan SCANNER to detect Trojans
Trojan Countermeasures
A Trojan is a malicious program that
masquerades as a genuine application. When these Trojans are activated, they
lead to many issues such as erasing data, replacing data on a victim's
computer, corrupting files, spreading viruses, and spying on the victim's
system and secretly reporting the data, recording keystrokes to steal sensitive
information such as credit card number, user names, passwords etc. and opening
a backdoor on the victim's system for carrying out precarious activities in the
future. In order to prevent such activities and reduce the risks against Trojans,
the following countermeasure should be adopted:
- Avoid
opening email attachments received from unknown senders
- Block
all unnecessary ports at the host and firewall
- Avoid
accepting the programs transferred by instant messaging
- Harden
weak, default configuration settings
- Disable
unused functionality including protocols and services
- Monitor
the internal network traffic for odd ports or encrypted traffic
-
Avoid downloading and executing applications from untrusted sources
-
Install patches and security updates for the operating systems and
applications
-
Scan CDs and floppy disks with antivirus software before using
-
Restrict permissions within the desktop environment to prevent malicious
applications installation
-
Avoid typing the commands blindly
and implementing pre-fabricated programs or scripts
-
Manage local workstation file integrity through checksums, auditing, and
port scanning
-
Run local versions of antivirus, firewall, and intrusion detection
software on the desktop
Pen Testing for Trojans and Backdoors
Step 1: Scan for open
ports
Open ports are the primary sources to
launch attacks. Therefore, in an attempt to make your network secure by
conducting pen testing, you should find the open ports and protect them. You
can find the unnecessary open ports by scanning for open ports. For this
purpose, you can use the tools such as TCPView and CurrPorts.
Step 2: Scan for
running processes
Most Trojans don't require the user to
start the process. They start automatically and don't even notify the user.
This kind of Trojan can be detected by scanning for running processes. In order
to scan for running processes, you can use tools such as What's Running, which
scans your system and lists all currently active programs, processes, services,
modules, and network connections. It also includes special areas to display
startup programs.
Step 3: Scan for
registry entries
A few Trojans run in the background
without any notification to the system's user. If you want to test for such
Trojans, then you should scan for registry entries. This can be done with the
help of tools such as JV Power Tools and PC Tools Registry Mechanic.
Step 4: Scan for
device drivers installed on the computer
In order to control the hardware, most
modern OSes use their own device drivers. Attackers can take advantage of this
situation to spread Trojans and backdoors through device driver files. Trojans
spread through device drivers infect the device driver files and other
processes.
Step 5: Scan for Windows
services
If you find any of the Windows services
suspicious, then check the associated executable files. To scan Windows
services, you can use the tools such as SrvMan and ServiWin.
Step 6: Scan for
startup programs
Some Trojans run automatically when you
start Windows. Therefore, scan for Startup programs using tools such as
Starter, Security AutoRun, and Autoruns and check the listed startup programs
and determine if all the programs in the list can be recognized with known
functionalities.
Step 7: Scan for
files and folders
The easy way for an attacker to hack a
system is with the use of files embedded with Trojan packages. Firewalls,
IDSes, and other security mechanisms may fail to prevent this kind of attack.
Therefore, you need to scan all files and folders for Trojans and backdoors.
You can scan files and folders using tools such as FCIV, TRIPWIRE, SIGVERIF,
FastSum, and WinMD5.
Step 8: Scan for network activities
Network activities such as upload of bulk
files or unusually high traffic going to a particular web address may sometimes
represent a sign of Trojan. You should scan for such network activities. Tools
such as Capsa Network Analyzer can be used for this purpose.
Step 9: Scan for
modification to OS files
Check the critical OS file modification
or manipulation using tools
such as TRIPWIRE or manually compare
hash values if you have a backup copy.
Step 10: Run Trojan
Scanner to detect Trojans
Trojan scanners such as Trojan Hunter and
Emsisoft Anti-Malware are readily available in the market. You can install and
run those Trojan scanners to detect Trojans on your system.
Step 11: Document all
the findings
Once you conduct all possible tests to
find the Trojans, document all the findings that you obtain at each test for
analysis and check if there is any sign of a Trojan.
Step 12: Isolate the
machine from the network
When you find a Trojan on a machine, you
should isolate the machine immediately from the network before it takes control
over other systems in the network. Check whether the antivirus software is
updated or not.
If the antivirus is not updated, then
update it and then run it to scan the system. If the antivirus is already
updated, then find other antivirus solutions to clean Trojans.
Комментариев нет:
Отправить комментарий