You are on page 1of 14

Super worms and Crypto virology: a Deadly Combination

Abstract attacks are high automation and speed,


Understanding the possible extent of the increasing sophistication of attack tools,
future attacks is the key to successfully vulnerability discovery rate that is
protecting against them. Designers of hard to keep up with, increasing
protection mechanisms need to keep in permeability of firewalls and highly
mind the potential ferocity and asymmetric nature of threat [1].
sophistication of viruses that are just Monitoring organizations
around the corner. That is why we think name worms as one of the four most
that the potential destructive capabilities alarming types of today’s attacks.
of fast spreading worms like the Warhol The most notable incidents that
worm, Flash worm and Curious Yellow caused such concern include the
need to be explored to the maximum outbreaks of Code Red [10], Code Red II
extent possible. While re-visiting some [11], Nimda [9], and, more recently,
techniques of viruses from the past, we Linux.slapper [12] worms. All four
can come across some that utilize worms were noted for their extraordinary
cryptographic tools in their malicious propagations speeds; however, Damage
activity. That alarming property, -wise, they were rated as a low threat.
combined with the speed of the so-called Such a discrepancy between the levels
“super worms”, is explored in the of propagation techniques and
present work. Suggestions for destructive capabilities was
countermeasures and future work are immediately spotted, and several
given. interesting works were produced ([2],
[3],[4]) that (sometimes too
Keywords emotionally) put the situation in
Computer viruses, worms, cryptography, perspective and explored the limits of
crypto virology destructive potential of fast-spreading,
cooperating malicious entities. However,
1. Introduction this potential becomes even more
The most distinctive and overwhelming when one tries to
alarming trends in current computer combine the swiftness of the worms with

2
the ferocity of some viruses from the quick analysis of the worms that plagued
past. Cryptography, as some point out the internet in 2001. The famous Code
[5], is usually thought of as a science Red virus was quite successful in its
that supplies us with tools to enforce propagation. However, it performed
integrity and confidentiality; however, random automatic scanning for the new
its undoubted strengths can be used to victims, and utilized the only
attack these same properties. Some of vulnerability in the Microsoft Internet
the studied viruses relied on Information Services (IIS). The worm
cryptographic tools to cause damage that did not use any local information to
is quite hard to un-do. spread itself more efficiently. It did not
This paper explores the have any communication or coordination
combination of fast worms and crypto capabilities .Nonetheless, after a quick
virologic virus techniques. First, in analysis, the authors come to a
Section 2.1, we give a survey of works conclusion that the proportion of web
describing the Warhol worm, Flash servers infected grew exponentially with
worm and Curious Yellow. Then, in time. In the beginning, each infected
Section 2.2 we describe Cryptovirology server was able to find 1.8 other
and potential damage that can be done vulnerable servers per hour; in the final
by viruses with cryptographic stages of the worm’s life, the rate was
capabilities. Section 3 is dedicated to 0.7. Code Red turned itself off on July
further damage assessment and the 19, 2001. Damage-wise, Code Red had a
counter measures to the problem that we distributed denial of service (DDOS)
suggest. Finally, Section 4 is a summary payload targeting the IP address of
of the ideas outlined in this paper. www.whitehouse.gov, and some web site
defacement capabilities. Apart from that,
2. Overview it initiated an extraordinary amount of
scanning traffic from the victim host.
2.1 Warhol Worm While somewhat bothersome, these
actions cannot be considered a serious
The widely discussed [13]
attack and indicate that the creator of the
work on the Warhol worm begins by a
worm most likely pursued experimental

3
goals. A distinctive characteristic of hosts with similar vulnerabilities tend to
Code Red is the very random nature of be closer on the network, and also the
scanning it performed. According to quicker contamination of firewall-
authors. Data Code Red entities scanned protected domains, once some Code Red
the same computers for the same II instance managed to get inside such
vulnerabilities up to 500000 times per network. The worm died by design on
hour! The proportion of wasted October 1, 2001.
scanning traffic becomes even more Based on the new propagation
impressive if we consider the strategy, we can conclude that the author
percentage of all possible IP addresses of Code Red II, most likely, also pursued
that actually map to active web servers experimental goals, taking no time to
running IIS with the targeted address multiple vulnerabilities, or
vulnerability. Such a random develop a more meaningful way to
propagation strategy has several spread the virus.
disadvantages: it wastes victim’s The new virus had a potentially
resources, greatly reduces the more damaging payload, which installed
propagation speed, reveals itself on the a root backdoor allowing unrestricted
target system, and makes the worm remote access to the infected host.
world-famous in a matter of hours. However, Code Red II was quickly
Code Red II targeted the same contained too, immediately revealing
single IIS vulnerability as Code Red. As itself on the victim hosts.
a scanning strategy improvement, it The authors also argue that
chose a random IP address from the analysis of Code Red II behavior would
Victim’s the class B address space with be more involved than Code Red’s, due
probability of 3/8, a random IP address to the fact that the two viruses
from the victim’s the class A address overlapped and interfered with each
space with probability of 1/2, and an other, and also to the local scanning
absolutely random IP address with a strategy of the former.
probability of 1/8. The authors note that Finally, the authors describe the
such improved scanning strategy was Nimda worm, which contained a few
successful, due to the fact that apparently obvious improvements. Nimda used five

4
different ways to propagate itself, A large part of the paper is
namely: an IIS vulnerability, bulk dedicated to considering possible worm
emails, open network shares, defaced improvements. The authors refer to the
web pages to infect visitors through their improved virus as a “Warhol worm”.
browsers and backdoors left by Code First, they look at so-called .hit-list
Red II and sadmind viruses. Such scanning., which is collecting a list of
multi-vector approach also helped to vulnerable hosts prior to worm launch.
penetrate the firewalls quicker, since After the pre-scanning stage, the worm
most organizations leave incoming mail would be unleashed on the hosts in the
handling to the mail server or even users list. The authors argue that it took
themselves. These improvements made existing worm the longest to infect the
Nimda another widely discussed worm; first 10000 hosts and infection grew
however, Nimda still appears to be a exponentially; therefore, a boost of
quick hack that lacks any solid design or 50000 would greatly speed up the
purpose. The worm displayed the same propagation.
characteristics; the authors cite their
measurements on a Lawrence Berkeley Permutation scanning is another
National Laboratory computer that improvement targeted at reducing the
showed a peak hit rate of 140 Nimda scanning overlap between warm entities.
HTTP connections per second. Despite The new worm would generate an IP
the same inefficiency, system address space permutation using a 32-bit
administrators report Nimda activity block cipher and a pre-selected key. It
still, more than a year since the attack would encrypt an IP to get the
[13]. corresponding permutation, and decrypt
Nimda did not carry a to get an IP. During the infection, it
communication or coordination payload. would work up the permutation starting
According to most sources ([9],[2]), the from a random IP’s hash, and re-start at
worm did not include any apparent a random point in the hash every time it
destructive functions, apart from the comes across an already infected
ones that facilitated further propagation. system. Another improvement would be
to stop completely after running into

5
several infected hosts in row; that would The authors proceed to describe
indicate that the Internet is completely a so-called Flash worm. Such a worm,
infected. they argue, would require a somewhat
In a partitioned permutation more involved preparation stage;
scheme, worm instances get a hash range however, their simulations show that it
they are responsible for, and they halve would spread out in about 30 seconds as
their range every time they infect a new opposed to 15 minutes it takes the
host, giving the other half to the new Warhol worm to subvert the Internet. In
instance. When an instance completes its order to start a Flash worm, an
range scan, it restarts from a random individual (or a terrorist organization)
point in the hash. would preferably have an access to an
Topological scanning relies on the OC-12 type of network connection. In
information and properties of the that case, according to the author’s
infected hosts, such as email addresses Calculations, they would be able to pre-
found on hard drives, a list of peers from scan the whole web server space in a
a peer-to-peer networks a host might be reasonable amount of time, and build a
participating in, etc. Some ([13]) note list of approximately 9 million web
that a “spider” type of virus, which servers to start with. Such a list would
would operate similarly to web indexing cover the majority of the Internet,
and email collecting spiders, might also according to the recent Netcraft survey
be efficient. That kind of a virus would [14], and would require only 7.5 Mbytes
be completely topology-dependent, to store in compressed form, according
traversing the network using popular to author’s. Calculations. The first Flash
protocols (HTTP, FTP, etc.) following worm instances would take the entire
the links it collects on its way. Such a list, and would handle it similarly to the
possibility can also be considered in a permutation scanning hash, halving the
separate work. Giving Warhol worm list for every new victim. Some
spider-like capabilities appears to be redundancy would be required to prevent
another improvement in its propagation the first several instances from getting
techniques. caught and not covering their part of the
Internet.

6
Finally, the authors describe a ("multimode" or "multivector" worms).
stealthy slow-propagating contagion He also included a brief discussion of
worm, which prefers concealing itself to distributed control and update
fast propagation. Although it presents Mechanisms; however, it still did not
another interesting research topic, we contain a solid coordination strategy.
would like to focus on the first two
worms as the ones having a greater 2.2 Curious Yellow
destructive potential.
Throughout the paper, the The issues of worm
authors complement their arguments communication and coordination were
with descriptions of measurements and addressed in the design of a Curious
simulations they performed, and overall Yellow worm [4].
form an impression of a credible Although the work is
research work. somewhat fictional in it nature and the
We observe that despite being author does not always provide a proof
a first serious analysis of worm design for his ideas, it presents another serious
and suggesting a multitude of further analysis of the worm potential and
research directions, the authors seldom numerous directions for future research.
mention a possibility of worm instances First, the author describes
cooperating Communicating with each the benefits of worm coordination,
other and the originator of the worm. We which include the ability to easily assign
also note that the described worms do an infection domain to each instance of
not rely on any cryptographic the worm, easy control and update
mechanisms except for trivial IP hashing mechanisms, and less traffic which
for permutation scanning or, perhaps, reveals the worm.
encrypting itself to hide from static anti- The difficulties of such
virus scanners. coordination include problems with the
Nicholas Weaver published a truly gigantic scale of coordination,
follow-up work exploring how minimizing coordination costs, the need
permutation scanning interacts with to take spoofed updates into account, etc.
different ways the virus spreads itself The author concludes that some of these

7
issues are similar to the ones observed in updates, etc., could be distributed
large scale peer-to-peer networks. network-wide in less that 15 seconds.
The author then proceeds to Although that estimate remains to be
describing a peer-to-peer Chord strategy verified, if we accept it, then we now
developed at MIT [15] in the context of have a malicious network that potentially
a large-scale worm. The scheme, which can patch itself much quicker than a
is essentially a distributed hash table, corresponding solution would be
is used to assign portions of task distributed network-wide.
space to individual instances of the In the section that explores
worm. In the improved version of Chord, potential uses for such a powerful
Achord, all nodes act anonymously: a network, the author notes that a DDOS
node cannot determine the identity of against a few servers or disruption of the
other nodes. The author argues that in a entire Internet would not utilize the
developing worm network, it would take worm to its full potential. Among the
a node O (logN) time to communicate more creative uses the author names the
with any other node, and a node would possibility
have to store information about O (logN) of defacing web pages uncontrollably,
nodes for the most efficient either at the host or at surrounding
communication. Therefore, in a network routers, isolating the unwanted servers,
of 10 million nodes (which approximates or the ones resisting the intrusion, by re-
the number of potential infected web routing traffic around them, utilizing the
servers) it would take correspondingly CPU power of infected machines and
23 node hops and 23 nodes to store. The stealing sensitive information.
instances use a hash (for example, A considerable part of the
SHA1) for identification, and once they paper is dedicated to drawing an
find a new target, they pass it to the emotional picture of the subverted
closest neighbor, or infect it themselves. network. The author mostly focuses on
As an unsupported claim, the fictional aspects of such an attack, as
author argues that the Curious Yellow opposed to exploring the particular
worm would form a fully connected destructive directions an attacker might
network, and any messages such as code take.

8
The author briefly mentions cryptographic capabilities that have been
that in order to safely use the updates, observed during that time. LZR, AIDS
the worm instances would have to have Information Trojan and KOH were
the originator’s public key, and viruses briefly observed on some
authenticate each update to prevent computers in 1994-1996 that exhibited
unauthorized patches that might disrupt some characteristics that the authors
the operation of the worm. generalize to the main idea of the paper.
A hypothetical concept of Curious The main goal is to make a victim host
Blue, a worm that cleans up after a dependent upon the virus. They define a
Curious Yellow infection by using property of a high survivability of a
similar propagation strategies, or by virus, which can be summarized as
exploiting a potential vulnerability in .you kill the virus, you lose the data.. As
Curious Yellow itself, is also briefly a close approximation to a highly
mentioned. However, the author agrees survivable virus, they suggest a scenario
with security experts on the fact that where a virus makes the victim host
forcefully patching a large number of depended upon the originator of the
arbitrary servers is a very questionable virus. Such virus would encrypt some
action, both from the legal and technical sensitive data with some public key, but
point of view. it would not contain a private key to
decrypt it, therefore making any attempts
2.3 Crypto virology to recover the data by analyzing its
source code useless. The originator of
As an attempt to outline more such virus would hold the key to the
concrete threat the rapidly propagating data, therefore gaining control over the
worms carry, we will briefly describe a victim.
1996 study on crypto virology [5]. It Crypto virologic attacks exploit
presents an interesting twist on this dependency to the benefit of the
cryptography, showing its possible virus originator. The authors consider
malicious applications. two examples of such attacks, a
The authors start off by reversible denial of service attack, and
analyzing several viruses with an information extortion attack.

9
In a reversible denial of to the victim that the virus managed
service attack, the virus is equipped to get a hold of. The virus encrypts
with a strong random number the sensitive data on victim.s host as
generator and a strong seeding before, and then it calculates a
procedure, and mounts an attack by checksum of a (possibly very large) file
generating a random session key Ks, and targeted by the attacker. The virus then
a random initialization vector IV. A prompts for the exchange of cipher text
simple cryptographic protocol forms the C from the previous attack that now also
basis for the attack. The message {Ks, contains the checksum, and the targeted
IV} is encrypted with the public key of data, for the key to the hijacked victim.s
the virus’s originator, resulting in cipher data. Virus owner compares the
text C. Next, the virus encrypts the checksum to the data received, and if
targeted data on the victim’s system really is the data desired, the key is
using Ks, IV, and a symmetric algorithm. released and the victim safely recovers
After successful encryption, the virus the data.
overwrites the original data. Finally, the The remainder of the work is
virus prompts the victim.s operator to dedicated to modifying a crypto virus
send cipher text C to the virus’s in such a way so it becomes highly
originator, obtain a decrypted version of survivable. The authors suggest
C, and regain access to their data by distributing parts of the private key with
decrypting it with Ks, and IV. We note virus instances, so that complete
that this attack is more efficient with recovery is possible only if all victims
relatively small files, since encrypting a cooperate, and explore the various
large file might reveal the virus and also arrangements and capabilities this
it complicates the exchange process. approach carries. We leave out most of
Another interesting kind of this discussion, since we feel that the
crypto virologic attack we will describe arrangement in which the originator of
here is the information extortion attack. the virus controls the data would be
This kind of attack is based on trading much more useful in the context of fast-
access to some target data in exchange spreading viruses.
for other data which is more valuable

10
The authors describe a
rudimentary mechanism of supplying 3. Open Questions
automatic feedback to the author of
crypto viruses. In order to steal the As a relatively recent
needed data without directly interacting development, a linux.slapper worm
with the victim, the author would have appeared to be the first attempt to
to intercept one of the victim’s virus’s implement a coordinated malicious
offspring that would contain an network [12]. The Linux-based worm
encrypted copy of the data. However, created a peer-to-peer network of
they admit that such a scenario is highly infected nodes. Communication was
unlikely and inefficient, especially basic, allowing the network to learn its
considering the rates at which viruses own topology, and launch DDOS attacks
propagated at the time the paper was as a single unit when commanded from a
written. single remote location. Slapper missed
Some suggestions for counter the ability to authenticate
measures are actually included in the communication, and it was quickly
work. Traditional active virus detection contained, partly due to the prompt
and frequent backups are proposed. response by affected Red Hat Apache
Another suggestion is strict control over server administrators. We note that in
cryptographic tools. Since including all the Curious Yellow scheme, coordinated
necessary tools with the virus would infection might not be very useful --
make it large, inefficient and easy to partitioned permutation seems a
detect, the virus actually has to rely sufficient strategy to avoid overlapped
on the ones built into the victim scanning. However, coordinated control
system, and the authors argue that by and update mechanisms, as we stated
carefully controlling such accesses, the before, open a multitude of opportunities
virus can be defeated. However, they do for malicious activity.
not supply any scenarios of such control;
furthermore, they admit that this would
be relatively hard to enforce.

11
3.1 Damage systems and trick them into allowing
access to those tools. All attempts to
Let us imagine a crypto analyze the traffic and track down the
virologic super worm. It would combine worm owner fail, since all traffic is
the propagation speed of the Warhol minimized -- most of the times, it is not
worm, or a Flash worm, depending on even apparent that a victim is
the capabilities of the creator; infected; and finally, we can suggest
communication capabilities of Curious periodic traffic exchanges to prevent
Yellow, and cryptography-based traffic analysis. Even if some of these
malicious payload. Traditional active periodic exchange messages are
virus detection, proposed as one counter observed, it would not be clear if the
measure, would be helpless against such message, which is, of course, encrypted,
worm, since the updates could be actually contains some meaningful date
distributed much faster that the system (like an update), or simply is a
administrators can clean their system. placeholder message.
The virus stays afloat by constantly re- We note that the full
infecting the whole Internet using new scheme, in which all instances of the
zero-day vulnerabilities discovered by worm and its creator remain completely
the worm owner. Despite the anonymous, and yet communication
observations that as the worms get more occurs on the regular basis without
complex, they become more vulnerable revealing the parties involved, is yet to
and easier to subvert themselves [13], be developed. However, it would be
a team of highly motivated experts wise to assume that such a scheme can
with a solid destructive plan can easily be implemented in the nearest future and
produce a fault-free design and prepare for the worst.
implementation of such a worm. Regular Frequent backups would be a
updates ensure invisibility even from the somewhat effective measure against the
Curious Blue worm, which attempts to crypto virologic attacks of the worm;
disinfect the victims. Worm instances however, staying undetected for a
observe schemes of access control to long period of time and carefully
cryptographic tools on the victim’s analyzing the information flow on the

12
victim system allows the worm to them might lead the worm to the
hijack the sensitive data between the encrypted versions of certificates and
backups. Therefore, we can conclude e-cash. Even though they cannot be
that none of the countermeasures stolen in encrypted form, they still can
presented in the covered works would be be subverted once the worm finds out
an adequate response to the worm. about the nature of that data.
Furthermore, we observe that One effective tool to combat
this worm would threaten the existence the Crypto virologic super worm that we
of most of the digital payment schemes envision are automated response-enabled
([6], [7]), as well some certificate Intrusion Detection Systems (IDS).
systems ([8]). E-cash and certificates can Although state-of-the-art is not at that
be instantly subverted, and either traded point yet, a fruitful direction for research
for real money, or same e-cash, or for would be trying to develop coordinated
some sensitive information. response-enabled IDS’s that quickly
generate signatures of unknown attacks
3.2 Countermeasures and communicate them to their peers
before the worm. Specification-based
Apart from vague advice to IDS’s that allow detection of unknown
perform the back-ups and patch the attack and automated response
systems on the regular basis, there are a techniques are now being developed at
few things that we can suggest. several research sites, including the
Specifically for certificates and University of California, Davis
e-cash schemes, we can suggest storing Computer Security Lab.
them in encrypted form, so that even in
case of an infection, the worm would
not be able to tell that encrypted 4. Summary
data from regular files which present no
interest to it. However, that appears to be By analyzing the successful
a non-trivial implementation problem, worm implementations, we can conclude
since the victim needs to somehow that only the lack of the clear damage
obtain these, and the very request for strategy saved the Internet this time. The

13
propagation strategies used in real
attacks were not the most well-thought-
out, either. Needless to say, a
coordinated and well-planned attack can
be much more devastating unless some
countermeasures are taken.
In this work, we tried to
combine the most notable recent works
on the fast propagating malicious viruses
with an interesting work on viruses with
cryptographic capabilities to explore the
extent of the possible damage that can be
done by such a combination. We
explored the questions that we felt these
works left open. We also analyzed
suggested counter measures to such a
worm, and proposed a few counter
measures of our own.

5. References

1. http:\\www.wikipedia.org
2. http:\\www.howstuffworks.com
3. http:\\www.webopedia.com

14

You might also like