Malware Classification
Malware Classification
Malware Classification
Ransomware
• Fileless malware is a type of malicious activity that uses native, legitimate tools
built into a system to execute a cyber attack. Unlike traditional malware, fileless
malware does not require an attacker to install any code on a target’s system,
making it hard to detect.
• This fileless technique of using native tools to conduct a malicious attack
is sometimes referred to as living off the land or LOLbins
Common Fileless Malware Techniques
• While attackers don’t have to install code to launch a fileless malware attack,
they still need to get access to the environment so they can modify its native
tools to serve their purposes. Access and attacks can be accomplished in
several ways, such as through the use of:
• Exploit kits
• Hijacked native tools
• Registry resident malware
• Memory-only malware
• Fileless ransomware
• Stolen credentials
Exploit kits
• Attackers may commence a fileless attack through the use of stolen credentials so
they can access their target under the guise of a legitimate user. Once inside, the
attacker can use native tools such as Windows Management Instrumentation
(WMI) or PowerShell to conduct their attack. They can establish persistence by
hiding code in the registry or the kernel, or by creating user accounts that grant
them access to any system they choose.
Spyware Definition
• Spyware is a type of malware that covertly infects a computer or mobile device and collects
sensitive information like passwords, personal identification numbers (PINs), and payment
information. The information is then sent to advertisers, data collection firms, or malicious
third parties for a profit.
• Spyware is one of the most common threats on the internet. It was more commonly
installed in Windows desktop browsers, but has evolved to operate on Apple computers
and mobile phones as well. Mobile spyware attacks have become much more common and
advanced as people rely on their phones to conduct banking activities and access other
sensitive information. However, not all software that tracks online activity is malicious. For
example, some website tracking cookies can serve as a legitimate function to customize a
user’s website experience by remembering login information.
• Anyone can be a target of spyware. Authors of spyware do not typically target a specific
person like a spear phishing attack would. Spyware authors prioritize the information they
can gather rather than who it is from, so spyware attacks try to collect as many victims as
possible. Since spyware typically runs in the background of the operating system, it is
difficult to detect and even harder to mitigate without advanced security tools and
solutions.
Types of Spyware
• There are several types of spyware. While all spyware programs share the common goal of
stealing personal information, each uses unique tactics to do so.
• 1. Adware
• Adware tracks a user’s web surfing history and activity to optimize advertising efforts. Although
adware is technically a form of spyware, it does not install software on a user’s computer or
capture keystrokes. Thus, the danger in adware is the erosion of a user’s privacy since the data
captured by adware is accumulated with data captured about the user’s activity elsewhere on
the internet. This information is then used to create a profile that can be shared or sold to
advertisers without the user’s consent.
• 2. Trojan
• A trojan is a digital attack that disguises itself as desirable code or software. Trojans may hide in
games, apps or even software patches. They may also be embedded in attachments in phishing
emails. Once downloaded by users, trojans can take control of victims’ systems for malicious
purposes such as deleting files, encrypting files or sharing sensitive information with other
parties.
• 3. Keylogger
• A keylogger is a type of spyware that monitors user activity. When installed, keyloggers can
steal passwords, user IDs, banking details and other sensitive information. Keyloggers can be
inserted into a system through phishing, social engineering or malicious downloads.
• 4. System Monitor
• A system monitor captures virtually everything the user does on the infected
computer or device. System monitors can be programmed to record all keystrokes,
the user’s browser activity and history, as well as any form of communication, such
as emails, webchats or social media activity.
• 5. RedShell
• RedShell is a type of spyware that installs itself on a device whenever specific PC
games are downloaded to track online activity. Developers use this information as
feedback to better understand their users, and improve their games and marketing
campaigns.
• 6. RootKits
• Rootkits allow attackers to easily infiltrate a system, as they are almost always
undetectable. To infiltrate a system, they either exploit security vulnerabilities or
logging as an administrator.
• 7. Tracking Cookies
• Websites, both legitimate and illegitimate, drop cookies into your device to track
users’ online activity.
Spyware Infects Devices
• Trojans are a very common and versatile attack vehicle for cybercriminals. Here we
explore 10 examples of Trojans and how they work:
• Exploit Trojan: As the name implies, these Trojans identify and exploit
vulnerabilities within software applications in order to gain access to the system.
• Downloader Trojan: This type of malware typically targets infected devices and
installs a new version of a malicious program onto the device.
• Ransom Trojan: Like general ransomware, this Trojan malware extorts users in
order to restore an infected device and its contents.
• Backdoor Trojan: The attacker uses the malware to set up access points to the
network.
• Distributed Denial of Service (DDoS) attack Trojan: Backdoor Trojans can be
deployed to multiple devices in order to create a botnet, or zombie network, that
can then be used to carry out a DDoS attack. In this type of attack, infected devices
can access wireless routers, which can then be used to redirect traffic or flood a
network.
• Fake AV Trojan: Disguised as antivirus software, this Trojan is actually
ransomware that requires users to pay fees to detect or remove
threats. Like the software itself, the issues this program claims to
have found are usually fake.
• Rootkit Trojan: This program attempts to hide or obscure an object
on the infected computer or device in order to extend the amount of
time the program can run undetected on an infected system.
• SMS Trojan: A mobile device attack, this Trojan malware can send
and intercept text messages. It can also be used to generate revenue
by sending SMS messages to premium-rate numbers.
• Banking Trojan or Trojan Banker: This type of Trojan specifically
targets financial accounts. It is designed to steal data related to bank
accounts, credit or debit cards or other electronic payment platforms.
• Trojan GameThief: This program specifically targets online gamers
and attempts to access their gaming account credentials.
Rootkit Malware
• Known rootkits can be classified into a few broad families, although there are many
hybrids as well. The main families are:
• Firmware Rootkits
• A firmware rootkit targets the software that runs particular hardware components by
storing themselves on the software that runs during the boot process before the
operating system starts up. They are especially stealthy because they can persist
through reinstallation of the operating system.
• The use of firmware rootkits has grown as technology has moved away from hard-
coded BIOS software and toward BIOS software that can be updated remotely. Cloud
computing systems that place multiple virtual machines on a single physical system
are also vulnerable.
• Examples of firmware rootkits include:
• UEFI rootkit
• Cloaker
• VGA rootkit
• Kernel Mode Rootkits
• A kernel mode rootkit is a sophisticated piece of malware that can add new code to the
operating system or delete and edit operating system code. They are complicated to create,
and if a kernel rootkit is buggy, it will heavily impact the target computer’s performance. On
the bright side, a buggy kernel rootkit will leave a trail of breadcrumbs that antivirus solutions
will detect.
• Examples of kernel mode rootkits include:
• Spicy Hot Pot
• FU
• Knark
• Bootloader Rootkits
• Bootloader rootkits boot up concurrently with the operating system and target the Master
Boot Record (MBR), which is the first code executed when starting up a computer, or the
Volume Boot Record (VBR), which contains the code needed to initiate the boot process or the
code for loading an operating system or application. By attaching itself to one of these types of
records, a bootloader rootkit will not appear in a standard file system view and will be difficult
for an antivirus or rootkit remover to detect.
• Examples of bootloader rootkits include:
• Stoned Bootkit
• Olmasco
• Rovnix
• Virtualized rootkits
• Unlike kernel mode rootkits, which boot up at the same time the targeted system boots
up, a virtualized rootkit boots up before the operating system boots up. Virtualized
rootkits take hold deep in the computer and are extremely difficult – or even impossible –
to remove.
• User Mode Rootkits
• User mode rootkits modify the behavior of application programming interfaces. They can
display false information to administrators, intercept system calls, filter process output
and take other actions to hide their presence. However, because user mode rootkits
target applications rather than operating systems or other critical processes, they do leave
breadcrumbs that trigger antivirus and rootkit remover alerts and they are not as hard to
remove as some other types of rootkit malware.
• Examples of user mode rootkits include:
• Vanquish
• Hacker Defender
• Aphex
• Memory Rootkits
• Memory rootkits load into the RAM, so they persist only until the RAM is cleared when
the system is restarted. While active, their malicious activities consume the targeted
system’s resources and thus reduce the performance of its RAM memory.
• Definition of Keyloggers
• Keyloggers are tools that can record every keystroke that you type into
a computer or mobile keyboard. Because you interact with a device
primarily through the keyboard, keyloggers can record a lot of
information about your activity. For example, keyloggers can track
credit card information that you enter, websites you visit and
passwords you use.
• Keyloggers aren’t always used for illegal purposes. Consider the
following examples of legal uses for keylogging software:
• Parents might use a keylogger to monitor a child’s screen time.
• Companies often use keylogger software as part of
employee monitoring software to help track employee productivity.
• Information technology departments can use keylogger software to
troubleshoot issues on a device.
• While there are legal uses for keyloggers, malicious users commonly
use keyloggers to monitor your activity and commit cybercrimes.
Botnet
• Once an adversary is in control of a botnet, the malicious possibilities are extensive. A botnet can be used
to conduct many types of attacks, including:
• 1. Phishing
• Botnets can be used to distribute malware via phishing emails. Because botnets are automated and
consist of many bots, shutting down a phishing campaign is like playing a game of Whack-A-Mole.
• 2. Distributed Denial-of-Service (DDoS) attack
• During a DDoS attack, the botnet sends an overwhelming number of requests to a targeted server or
application, causing it to crash. Network layer DDoS attacks use SYN floods, UDP floods, DNS amplification,
and other techniques designed to eat up the target’s bandwidth and prevent legitimate requests from
being served. Application-layer DDoS attacks use HTTP floods, Slowloris or RUDY attacks, zero-day attacks
and other attacks that target vulnerabilities in an operating system, application or protocol in order to
crash a particular application.
• Many will remember the massive Mirai botnet DDoS attack. Mirai is an IoT botnet made up of hundreds of
thousands of compromised IoT devices, which in 2016, took down services like OVH, DYN, and Krebs on
Security.
• 3. Spambots
• Spambots harvest emails from websites, forums, guestbooks, chat rooms and anyplace else users enter
their email addresses. Once acquired, the emails are used to create accounts and send spam messages.
Over 80 percent of spam is thought to come from botnets.
Mobile Malware Definition
• Cybercriminals use various tactics to infect mobile devices. If you’re focused on improving your
mobile malware protection, it’s important to understand the different types of mobile malware
threats. Here are some of the most common types:
• Remote Access Tools (RATs) offer extensive access to data from infected victim devices and are
often used for intelligence collection. RATs can typically access information such as installed
applications, call history, address books, web browsing history, and sms data. RATs may also be used
to send SMS messages, enable device cameras, and log GPS data.
• Bank trojans are often disguised as legitimate applications and seek to compromise users who
conduct their banking business — including money transfers and bill payments — from their mobile
devices. This type of trojan aims to steal financial login and password details.
• Ransomware is a type of malware used to lock out a user from their device and demand a
“ransom” payment — usually in untraceable Bitcoin. Once the victim pays the ransom, access codes
are provided to allow them to unlock their mobile device.
• Cryptomining Malware enables attackers to covertly execute calculations on a victim’s device
– allowing them to generate cryptocurrency. Cryptomining is often conducted through Trojan code
that is hidden in legitimate-looking apps.
• Advertising Click Fraud is a type of malware that allows an attacker to hijack a device to generate
income through fake ad clicks.
Worms