150 likes | 383 Views
CLEMSON UNIVERSITY. MIRAGE MALWARE . SIDDARTHA ELETI. Contents: 1. What is Malware 2. What is MIRAGE 3. How Does Mirage work 4. conclusion. Malware is a malicious program that is meant to disrupt computer operations, gather sensitive information, or gain access to private computer systems.
E N D
CLEMSON UNIVERSITY MIRAGE MALWARE SIDDARTHA ELETI
Contents:1. What is Malware2. What is MIRAGE3. How Does Mirage work4. conclusion
Malware is a malicious program that is meant to disrupt computer operations, gather sensitive information, or gain access to private computer systems. • Malware could be code or scripts or active content etc. • Over the past few decades many malwares like STUXNET, Nimda, myDoom etc. have affected organizations, personal computers etc. and this year among many others its “MIRAGE” . What is MALWARE?
Mirage is a malware that has appeared under the radar since April 2012. • Dell SecureWorks has been tracking a cyber espionage campaign that uses a remote access Trojan (RAT) named Mirage (also known as MirageFox. What is MIRAGE?
Mirage was intended to attack individuals at big oil and energy companies. • So it uses a technique called Spear-Pishing. • Spear-Pishing is a process of acquiring sensitive information from specific individuals or an organization by masquerading as a trustworthy entity. • In this scenario, the attackers gather personal information about the targets to increase their probability of success. Spear-Pishing
The spearpishing emails contains an attachment that includes malicious payload which installs a copy of Mirage on the computer • The attachments are stand-alone executable files that open an embedded PDF and execute the Mirage Trojan in the background • Mirage installs itself into “c:\Windows” or the Users Home directory • It also creates a backboor which waits for instructions from the attacker • Mirage creates registry keys on every boot so that the system remains infected installation
Mirage phones home to its c2 servers using standard HTTP Post request over the ports 80, 443 and 8080. • It can also use SSL for added security. • Iniitial phone-home request contains detailed system information of the infected system. • Example : • Once the c2 server gets this it responds with HTTP response code “200 ok”. Communication
After a successful connection, infected system still sends regular check-in updates with its mac address in it. • All of its communications with its command and control servers are disguised to appear like the URL traffic pattern associated with Google searches. VARIANT 2: • Another variant of Mirage uses HTTP Get requests for communication. • In this variant instead of ‘Mirage’ in the beginning of the message it uses “It is the end of the world and I feel Fine", from the REM song "It's the end of the world."
The picture below shows the sources of infected hosts. • After deep analysis researchers have found one infected host,an executive-level finance manager of the Philippine-based oil company. victims
SecureWorks have identified that the attackers were operating out of china. • Used dynamic DNS domains for callbacks to c2 servers. • The hosting companies in US were running Htran. In 2011 analysis the software author was identified as member of Chinese hacker group HUC, the Honker Union of China. • Despite efforts during analysis of home phone activity researches four unique second-level domains were identified of which two shares a common email Id. Attackers
The intention behind the attacks are still not known but they have hit many energy and oil companies world wide. • Its unclear about what kind of data they were trying to steal from the specific targets yet. Intentions
Mirage was a light weight simple malware which proved to be effective because it was able to reach mid and senior-level executives. • This malware represents only a small piece of an ongoing worldwide campaign. • This proves that for a successful campaign only a small quantity of infected systems are required. conclusion
http://www.secureworks.com/cyber-threat-intelligence/threats/the-mirage-campaign/http://www.secureworks.com/cyber-threat-intelligence/threats/the-mirage-campaign/ • http://news.cnet.com/8301-1009_3-57517388-83/cyberspying-effort-drops-mirage-on-energy-firms/ • http://www.scmagazine.com/new-espionage-campaign-tied-to-rsa-breach-ghostnet-attacks/article/259991/ • http://en.wikipedia.org/wiki/Malware Cited sites