Match Point: Analysis of the Anna Kournikova Virus

Global Information Assurance Certification Paper
Copyright SANS Institute
Author Retains Full Rights
This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without express written permission.
Interested in learning more?
Check out the list of upcoming events offering
"Security Essentials Bootcamp Style (Security 401)"
at http://www.giac.org/registration/gsec
Match Point:
Analysis of the Anna Kournikova virus
ull
rig
ht
s.
By Mark Muzzi
rr
eta
ins
f
We’ve seen this time and time again within the past two years. An innocent
looking email arrives in our inbox and subsequently begins to wreak havoc with our
company’s mail server, and the mail servers of all the addresses listed in our address
book. It is the purpose of this paper to examine the latest such outbreak called the Anna
Kournikova or VBS/SST virus. This paper will examine the technicalities of the virus,
how fingerprint
it was able =toAF19
spread,
and2F94
examine
how
the user
canF8B5
better06E4
defend
themselves
Key
FA27
998D
FDB5
DE3D
A169
4E46 from
such a virus. In the end, you will hopefully come away with a better understanding of
how a virus works and how to better defend yourself against them.
5,
A
ut
ho
Malware is the term used to describe types of malicious code. Consisting of
viruses, Trojan horses, worms and malicious applets these are the major players in the
disruption of productivity among computer users.
A virus can best be described as:
te
20
00
-2
00
A self-replicating program containing code that explicitly copies itself and that can
“infect” other programs by modifying them or their environment such that a call to an
infected program implies a call to a possibly evolved copy of the virus.
The two basic types are:
• File Infector
• Boot Record Infector (1)
In
sti
tu
Some viruses do little or no damage, simply replicating themselves, while others affect
programs a degrade system performance. Never assume that a virus is harmless and leave
it alone.
SA
NS
Trojan Horses are programs with a hidden action. Usually they are disguised as
some harmless program. A popular example of a Trojan horse is Back-Orifice.
©
Malicious Applets are applets that attack a local system via the web, and can
include denial of service, invasion of privacy, and annoyance. These are different from
attack applets, which look for weaknesses in the implementation of the Java security
Model
Worm viruses are able to spread themselves either as a host computer worm or a
Key
fingerprint
AF19
FA27 2F94
998D
DE3D
F8B5 06E4
network
worm. =Host
computer
worms
are FDB5
local to
the machine
theyA169
run on4E46
and use
network connections only to replicate themselves out to other computers. Once a copy is
made and out on another host, the original terminates itself, so there is only one copy out
at any given time. Network worms are made up of various parts called “segments”
© SANS Institute 2000 - 2005
Author retains full rights.
running on separate machines. The network is used for communication purposes as well
as propagating segments to new host systems. Worms of both types also tend to
propagate themselves without any action form the user.
ins
f
ull
rig
ht
s.
The Anna Kournikova (VBS/SST) virus aka VBS.Lee-o, VBS.OnTheFly,
VBS.Kalamar, and VBS.Vbswg.gen could be either a virus or a worm. The code requires
the user to open the email and run the attached file, making it in this respect a virus.
Although it has also been referred to as a worm, since it uses a network to propagate
itself, instead of using disks or files. It is because of this it is incredibly similar to “Love
Bug” virus.
ut
ho
rr
eta
The Love Bug virus appeared around May 4th, 2000. It contained the subject line
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
“ILOVEYOU” and asked the user to check the attached love letter. The love Letter was a
VBScript and runs on systems with windows scripting host (WSH) or systems that
interpret Visual Basic and have a Wscript library, just like the Anna Kournikova virus.
The Anna Kournikova virus itself was written using a virus kit called “Visual Basic Worm
Generator’.
20
00
-2
00
5,
A
The Anna Kournikova virus arrives as an email attachment called
AnnaKournikova.jpg.vbs with the subject line “ Here you have, ;o)”. As of February 15th,
2001, its only known payload is a mass-mailing routine that emails everyone within your
Microsoft Outlook Address book, and a date trigger of January 26th, which upon reaching
that date, the worm redirects your web browser to a site in the Netherlands. It creates the
registry key:
te
HKEY_CURRENT_USER\Software\OnTheFly
sti
tu
This is the key that attempts to redirect your browser. There is also a registry that is
created upon successful completion of the mass-mailing called:
NS
In
HKEY_CURRENT_USER\Software\OnTheFly\mailed
©
SA
This key prevents the mail routine from running again. If an attempt is made to delete the
worm it will try to recreate itself, but due to a bug in the code, the worm recreates itself as
a zero-byte file.
A 20-year old Dutch man with the moniker “OnTheFly” created the virus. What
makes this, in the writer’s eyes a very significant event, is that OnTheFly proclaims he
knows nothing about programming, and set the virus up using a kit called “Visual Basic
Worm Generator. In a letter OnTheFly posted on the Internet Tuesday February 13th, he
statedfingerprint
that he saw
a research
on998D
the website
of International
Data
Corp.,
a
Key
= AF19
FA27note
2F94
FDB5 DE3D
F8B5 06E4
A169
4E46
Framingham Mass., analyst firm, that said users had failed to learn anything from the
“Love Bug” experience. Taking inspiration from the note, OnTheFly decided to test their
theory.
© SANS Institute 2000 - 2005
Author retains full rights.
ull
rig
ht
s.
After releasing his letter and claiming remorse for having caused such a wide
outbreak, OnTheFly turned himself into Dutch authorities. The Netherlands has a
computer misuse law, but are uncertain if it can be used in this case. It also unlikely that
the Dutch Courts will allow the man to be turned over to U.S. Authorities. Also what still
remains to be determined are whether charges will be brought against the creator of the
virus kit, named Kalamar. Kalamar is an 18-year-old teenager from Argentina. Upon
discovery that his virus kit had been used in the creation of the Anna Kournikova virus
Kalamar removed the virus tool from his site.
ho
rr
eta
ins
f
So how was it possible for this virus to Spread so fast? Anna Kournikova virus
uses virus characteristics similar to the “Love Bug” virus, running only on windows
operating system, and only being able to propagate on machines that had not installed a
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
patch provided by Microsoft for Outlook, after the spread of the Love Bug virus. This
virus spread quickly because of ineffective security policies, uneducated users, and in
secure systems.
00
5,
A
ut
The lack of an effective security policy is extremely dangerous. By not properly
stating your company’s stance on such matters as information disclosure, responsibilities,
backups, virus detection, and other security issues, your company is setting itself up for
failure.
sti
tu
te
20
00
-2
An effective security policy should reflect the overall stance of the organization
about security, and how that stance will affect the individuals within the organization. The
policy should let people know what is expected of them, defining who is responsible for
what activities, who has accountability for those activities, and explain what the
consequences are for not following them. When creating a policy you must allow room
for change, whether it is an overall change in your organizations stance on security or one
from within the business community.
SA
NS
In
Educating the members of your organization to the risk of malicious software
should be a key part of your security policy. By letting people know what dangers are out
there, you begin to lay down a base layer of protection. Although the Anna Kournikova
virus was not very lethal, it is only a matter of time before such a lethal virus will be
released upon the world. Education is a major key to this.
©
One of the best ways to detect and protect against infection is an anti-viral
program. Although sometimes these prove in effective, especially when the users fail to
update their virus definitions, and when the attacker writes a new virus program that
subverts the existing definitions. When this occurs the best way to detect infection is by
the indication of different behavior by your computer. The system may suddenly seem
slower,
the drive= light
on2F94
for no
apparent
stays
on, A169
the drive
makes a
Key
fingerprint
AF19turns
FA27
998D
FDB5reason,
DE3Dand
F8B5
06E4
4E46
large amount of noise. These are some sings that there may be infection, but they are not
in and of themselves indications that there is infection.
If infection has occurred, DON’T PANIC. The system needs to be contained
© SANS Institute 2000 - 2005
Author retains full rights.
ull
rig
ht
s.
through isolation. Unplug the network connection and leave the system powered and
ready, but do not use it. If you are not the System Administrator, contact them
immediately and ask for help. Fix the problem by installing anti-viral software to clean up
the system or to determine that you are not infected. The last thing you need to do is
share your experience. By letting others know, even if you made a mistake, you prevent
them from doing the same type of error and causing valuable harm to productivity.
ins
f
Anti-virus software is an indispensable tool in maintaining a secure work
environment. There are three techniques for software protection: activity monitoring
programs, virus scanners, and integrity checkers.
ut
ho
rr
eta
Activity monitors or behavior blockers attempt to prevent infection by looking for
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
virus-like activity. (e.g. writing to .exe) They posses the potential to detect viruses that
have not been seen before. Bearing in mind that the virus performs some action that the
monitor is looking for. These are considered a weak form of defense since some viruses
posses the ability to circumvent the monitoring or even have the ability to disable the
monitoring.
00
-2
00
5,
A
Scanners are the best-known form of defense. The search for known viruses by
looking for signatures or specific algorithms. Norton and McAfee anti-virus are the most
popular examples of scanners. Scanners suffer from the fact that they are not proactive,
and must rely on existing definitions, thereby causing even simple new viruses to be
missed. Alone they are only a partial defense against viruses.
sti
tu
te
20
Integrity checkers compute checksums or hash values of files and store the results
in a database. Later the program recomputes this value and checks it against the original.
If a virus has modified a file the values will not match, indicating that an infection has
occurred. These programs are true virus detectors not virus preventers like the scanner
anti-virus software.
©
SA
NS
In
Remembering the “Defense in Depth” strategy can help us with our virus
detection capabilities. Not one type of software defense is by itself a good defense. Only
when combined with the capabilities of the other types of software do we begin to get a
solid defense. Also a backup strategy should be implemented in the event that a virus
leaves us in a position of un-recoverability.
A lack of regular backups can be a serious threat to any organization. Often antivirus software has never been updated since the time the machine was first turned on.
This will result in catastrophe, especially in the case of critical production machines.
There are three types of backup techniques: full, incremental, and differential.
Full backups
capture
all FA27
files. They
typically
on aF8B5
weekly
basis,
and4E46
are necessary
Key
fingerprint
= AF19
2F94 are
998D
FDB5 run
DE3D
06E4
A169
to restore a system from a severely damaging event.
Differential Backups leave what is known as the archive bit in place after saving a
file. An archive bit is a special tag Windows systems use. It signals the backup program
© SANS Institute 2000 - 2005
Author retains full rights.
ull
rig
ht
s.
that the file has changed since the previous backup took place. Therefore when a
differential backup is run on Monday, and the Full was performed on Sunday, the
differential Backup will contain only those files that changed since the time of the full
backup. Differential Backups will tend to get larger as time progresses, since they backup
all files that have changed since the full backup was last run.
rr
eta
ins
f
Incremental Backups look for changes that have occurred since the last full or
incremental backup. It scans the file system and looks for files with their archive bit
turned on. When it completes its backup, the files that were scanned will have their
archive bits turned off. Administrators can save the system configuration, and then
capture changed information quickly using incremental backups. A problem exists in that
all incrementals since the last full backup are required to do a full restore. Requiring the
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
administrator to restore first from the full backup and then from each subsequent
incremental backup up to the failure.
20
00
-2
00
5,
A
ut
ho
The purpose of this paper was to examine the technicalities of the Anna
Kournikova virus, how it was able to spread, and examine how both users and
administrators can better defend their organization from such a virus. The paper touched
on different types of anti-virus software, their use, and how proper backups and security
policy can best be used together to provide a “Defense in Depth” type structure against
viruses. Although recent history, basically the subject of this paper, tells that these lessons
have yet to be learned. Hopefully through reading this you have come away with a better
understanding of how important it is to defend against such threats.
http://www.faqs.org/faqs/computer-virus/faq/index.html
sti
(1)
tu
te
Sources
SA
NS
In
Alijo, Hernán, ZDNet Latin America and Lemos, Robert, ZDNet News, “Purported 'Anna'
virus toolkit author yanks files from site” February 15th, 2001, ZDNET
http://www.zdnet.com/zdnn/stories/news/0,4586,2686768,00.html
©
Leyden, John, “Dutch Police arrest virus suspect”, The Register, February 14th, 2001
http://www.securityfocus.com/news/153
Leyden, John, “ Kournikova virus strikes net” The Register, February 12th, 2001
http://www.securityfocus.com/news/151
Delio,
Michelle,=“Why
Surrendered”,
Wired
News,
14th, 2001
Key
fingerprint
AF19Worm
FA27 Writter
2F94 998D
FDB5 DE3D
F8B5
06E4February
A169 4E46
http://www.wired.com/news/culture/0,1284,41809,00.html
Chien, Eric, and Hindocha, Neal “Virus Encyclopedia: VBS.SST@mm”,
© SANS Institute 2000 - 2005
Author retains full rights.
Symantec, February 12th 2001
http://www.symantec.com/avcenter/venc/data/[email protected]
ull
rig
ht
s.
Green, John “Security Essentials 1.1” SANS Network Security 2000, October 20th, 2000
ins
f
Northcutt, Stephen “Information System Security K-2” SANS Network Security 2000,
October 16th, 2000
©
SA
NS
In
sti
tu
te
20
00
-2
00
5,
A
ut
ho
rr
eta
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
© SANS Institute 2000 - 2005
Author retains full rights.
Last Updated: June 15th, 2017
Upcoming Training
SANS Minneapolis 2017
Minneapolis, MN
Jun 19, 2017 - Jun 24, 2017
Live Event
SANS Cyber Defence Canberra 2017
Canberra, Australia
Jun 26, 2017 - Jul 08, 2017
Live Event
SANS Columbia, MD 2017
Columbia, MD
Jun 26, 2017 - Jul 01, 2017
Live Event
SANS Paris 2017
Paris, France
Jun 26, 2017 - Jul 01, 2017
Live Event
SANS London July 2017
Jul 03, 2017 - Jul 08, 2017
Live Event
Cyber Defence Japan 2017
London, United
Kingdom
Tokyo, Japan
Jul 05, 2017 - Jul 15, 2017
Live Event
SANS Munich Summer 2017
Munich, Germany
Jul 10, 2017 - Jul 15, 2017
Live Event
SANS Cyber Defence Singapore 2017
Singapore, Singapore
Jul 10, 2017 - Jul 15, 2017
Live Event
Community SANS Phoenix SEC401
Phoenix, AZ
Jul 10, 2017 - Jul 15, 2017
Community SANS
SANS Los Angeles - Long Beach 2017
Long Beach, CA
Jul 10, 2017 - Jul 15, 2017
Live Event
Mentor Session - SEC401
Macon, GA
Jul 12, 2017 - Aug 23, 2017
Mentor
Mentor Session - SEC401
Ventura, CA
Jul 12, 2017 - Sep 13, 2017
Mentor
Community SANS Atlanta SEC401
Atlanta, GA
Jul 17, 2017 - Jul 22, 2017
Community SANS
SANSFIRE 2017
Washington, DC
Jul 22, 2017 - Jul 29, 2017
Live Event
Community SANS Charleston SEC401
Charleston, SC
Jul 24, 2017 - Jul 29, 2017
Community SANS
SANSFIRE 2017 - SEC401: Security Essentials Bootcamp Style
Washington, DC
Jul 24, 2017 - Jul 29, 2017
vLive
Community SANS Fort Lauderdale SEC401
Fort Lauderdale, FL
Jul 31, 2017 - Aug 05, 2017
Community SANS
SANS San Antonio 2017
San Antonio, TX
Aug 06, 2017 - Aug 11, 2017
Live Event
SANS Prague 2017
Prague, Czech Republic
Aug 07, 2017 - Aug 12, 2017
Live Event
SANS Boston 2017
Boston, MA
Aug 07, 2017 - Aug 12, 2017
Live Event
SANS Salt Lake City 2017
Salt Lake City, UT
Aug 14, 2017 - Aug 19, 2017
Live Event
Community SANS Omaha SEC401*
Omaha, NE
Aug 14, 2017 - Aug 19, 2017 Community SANS
SANS New York City 2017
New York City, NY
Aug 14, 2017 - Aug 19, 2017
Community SANS San Diego SEC401
San Diego, CA
Aug 21, 2017 - Aug 26, 2017 Community SANS
Virginia Beach 2017 - SEC401: Security Essentials Bootcamp
Style
Community SANS Trenton SEC401
Virginia Beach, VA
Aug 21, 2017 - Aug 26, 2017
Trenton, NJ
Aug 21, 2017 - Aug 26, 2017 Community SANS
SANS Virginia Beach 2017
Virginia Beach, VA
Aug 21, 2017 - Sep 01, 2017
Live Event
SANS Adelaide 2017
Adelaide, Australia
Aug 21, 2017 - Aug 26, 2017
Live Event
SANS Chicago 2017
Chicago, IL
Aug 21, 2017 - Aug 26, 2017
Live Event
Mentor Session - SEC401
Minneapolis, MN
Aug 29, 2017 - Oct 10, 2017
Mentor
SANS Tampa - Clearwater 2017
Clearwater, FL
Sep 05, 2017 - Sep 10, 2017
Live Event
Live Event
vLive