SlideShare a Scribd company logo
1 of 17
Download to read offline
Motive Security Labs
Malware Report – H1 2015
2
Motive Security Labs Malware Report – H1 2015
Alcatel-Lucent
Table of contents
Introduction  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 3
2015 first half highlights .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 3
Malware in mobile networks .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 4
Mobile network infection rate .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 4
Infections by device type .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 4
Android malware samples continue growth in 2015. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 6
Top Android malware .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 6
Examples of mobile threats. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 7
Malware in fixed residential networks  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 10
Top 20 residential network infections .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 10
Top 20 high-threat-level infections .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 11
Top 25 most prolific threats. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 12
2015 so far .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 12
Stagefright.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 12
Encrypted command and control.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 13
Scanning, DDoS and NAT.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 13
New adware. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 14
Mobile spyware .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 15
Summary and conclusion .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 15
Terminology and definitions .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 16
About Motive Security Labs  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 16
3
Motive Security Labs Malware Report – H1 2015
Alcatel-Lucent
Introduction
The “Motive Security Labs H1 2015 Malware Report” examines general trends and statistics for
malware infections in devices connected through mobile and fixed networks. The data in this report is
aggregated across the networks where the Motive Security Guardian network-based malware detection
solutions are deployed. This solution is deployed in major mobile and fixed networks around the world,
covering over 100 million devices.
2015 first half highlights
Mobile
•	 The mobile infection rate declined to 0.50% in Q1 due to a reduction in infections on devices running
the Android™ operating system (Android) and then rose to 0.75% at the end of Q2 due to a noticeable
increase in adware infections on PCs running the Microsoft Windows® operating system (Windows/PCs).
•	 80% of infections on the mobile network are attributable to Windows/PCs connected via dongles,
mobile Wi-Fi® hotspots or tethered through phones.
•	 Mobile spyware is definitely on the increase. Ten of the malware entries on the top 25 mobile
infection list are mobile spyware. These are apps that are used to spy on the phone’s owner. They
track the phone’s location, monitor ingoing and outgoing calls and text messages, monitor email and
track the victim’s web browsing.
Residential
•	 The overall monthly infection rate in residential fixed broadband networks averaged 14.4%, up slightly
from 2014. The increase is mostly
•	 attributable to an increase in moderate-threat-level adware infections.
•	 The infection rate for high-level threats such as a bots, rootkits, keyloggers and banking Trojans
increased to 6.3% from 5% in 2014.
80%
of mobile
infections
are on
Windows PCs
14%
of homes are
infected with
malware
of the
top10 25
smart phone
infections are
spyware
4
Motive Security Labs Malware Report – H1 2015
Alcatel-Lucent
Malware in mobile networks
In the first half of 2015 the overall mobile infection rate continued its upward trend. The number of
Android malware samples continued to grow significantly, but not at the exponential rates seen in 2013.
Mobile network infection rate
Figure 1 shows the percentage of infected mobile devices observed on a monthly basis since December
2012. This data is averaged from actual mobile deployments.
Figure 1. Mobile infection rate since December 2012
0.6%
0.7%
0.5%
0.4%
Mobile infection rate
0.8%
Oct 12 May 13 Nov 13 Jun 14 Dec 14 Jul 15
After two years of growth, the infection rate for mobile devices actually dropped from 0.68% in January
2015 to 0.50% in April. It then rebounded to close the first half of 2015 at 0.75% at the end of June.
A number of factors caused this, but the major contributing factors have been a reduction in Android
infections in the early part of the year followed by an increase in Windows/PC infections in Q2.
Infections by device type
Figure 2 shows the percentage of infections by device type. Most people are surprised to find such a
high proportion of Windows/PC devices involved. These Windows/PCs are connected to the mobile
network via dongles and mobile Wi-Fi devices or simply tethered through smartphones. They are
responsible for a large percentage of the malware infections observed. This is because these devices are
still the favorite of hardcore professional cybercriminals who have a huge investment in the Windows
malware ecosystem. As the mobile network becomes the access network of choice for many Windows/
PCs, the malware moves with them. In June of 2015 Windows/PCs were responsible for about 80% of
the malware infections that we detected on the mobile network.
Figure 2. Infected device types from 2013 to 2015
Android Windows
Infected device type 2013 – 2015
Jan13
Feb
Mar
Apr
May
June
July
Aug
Sept
Oct
Nov
Dec
Jan14
Feb
Mar
Apr
May
June
July
Aug
Sept
Oct
Nov
Dec
Jan15
Feb
Mar
Apr
May
June
0
10
20
30
40
50
60
70
80
90
100
5
Motive Security Labs Malware Report – H1 2015
Alcatel-Lucent
Between 2013 and 2014 the contribution to the infection rates in the mobile network were roughly
50/50 between Android and Windows/PCs. This changed significantly in 2015. At the end of Q2, 80%
of infections observed on the mobile network were from Windows/PCs connected via dongles, mobile
Wi-Fi hotspots or tethered through phones. Android devices made up 20% of the infections. The other
smartphones (iPhone, Blackberry, Windows Mobile, etc.) made up less than 1% of the infections we have
observed. The iPhone and Blackberry have a more controlled app distribution environment and are
thus less of a target.
Two factors contributed to this change. In Q1 the actual number of Android infections declined. This
was followed by a significant increase in Windows/PC adware infections in Q2.
Currently most Android malware is distributed as “Trojanized” apps and Android offers the easiest
target for this because of its open app environment. Specifically, the following Android issues have
been observed:
•	 Android apps can be downloaded from third-party app stores and web sites.
•	 There is no control of the digital certificates used to sign Android apps.
¬	Android apps are usually self-signed and can’t be traced to the developer.
¬	It is easy to hijack an Android app, inject code into it and re-sign it.
Another way to look at the data is to show the contribution of the device types to the infection rate
itself, as shown in Figure 3.
Figure 3: Contribution to infection rate by device type
0.6%
0.7%
0.5%
0.4%
0.3%
0.2%
Infections by device type
0.8%
0.1%
0.0%
Oct 12 May 13
Android
Nov 13 Jun 14 Dec 14 Jul 15
Windows Total
This clearly indicates the reduction in Android infection in Q1 and the increase in Windows/PC infection
in Q2.
The Android reduction is probably due to efforts by Google to eliminate malware from Google Play
and to the introduction of the Verify Apps feature on Android. Most Android malware is distributed as
Trojanized apps that are downloaded and installed from Google Play and other third-party app stores.
So eliminating malware from the app store and verifying apps at install time can have a major impact
on the infection rate. The Verify Apps feature was introduced in Android 4.2 (JellyBean) and is now
available on close to 80% of deployed devices. It is activated by default, but the user does have to
consent to have the service run the first time they side-load an app.
6
Motive Security Labs Malware Report – H1 2015
Alcatel-Lucent
The increase in Windows/PC infections can be attributed to the fact that more people are using their
phone’s data connection to provide Internet access for their devices. Most of these infections are due
to a resurgence of moderate-threat-level adware, bundled with games and free software.  
Android malware samples continue growth in 2015
An indicator of Android malware growth is the increase in the number of samples in our malware
database. The chart below shows numbers since June 2012.
Figure 4. Mobile malware samples since June 2012
Mobile malware samples
0
50000
100000
150000
200000
250000
300000
Jul 12 Oct 12 Jan 13 Apr 13 Jul 13 Oct 13 Jan 14 Apr 14 Jul 14 Oct 14 Jan 15 Apr 15 Jul 15
The number of Android malware samples more than doubled in the first half of 2015.
 
Top Android malware
Table 1 shows the top 25 Android malware infections detected in H2 2014 in the networks where the
Motive solution is deployed.
Table 1. Top 25 Android malware detected in H2 2014
NAME LEVEL % PREVIOUS
Android.MobileSpyware.Kasandra High 31.30 New
Android.Adware.Uapush.A Moderate 28.82 1
Android.Trojan.SmsTracker High 22.36 3
Android.MobileSpyware.Gappusin High 2.86 New
Android.MobileSpyware.SpyMob.a High 2.05 5
Android.Trojan.FakeFlash High 1.46 7
Android.MobileSpyware.CellSpy High 0.98 New
Android.MobileSpyware.Tekwon.A High 0.87 16
Android.Trojan.Wapsx High 0.86 8
Android.Bot.Notcompatible High 0.77 6
Android.Trojan.SMSreg.gc High 0.74 41
Android.MobileSpyware.Phonerec High 0.55 15
Android.Trojan.Qdplugin High 0.54 10
Android.ScareWare.SLocker.A High 0.52 New
Android.MobileSpyware.GinMaste High 0.47 9
7
Motive Security Labs Malware Report – H1 2015
Alcatel-Lucent
NAME LEVEL % PREVIOUS
Android.MobileSpyware.Spyoo.C High 0.39 27
Android.Backdoor.Agent.bz High 0.34 New
Android.Downloader.Stew.a High 0.29 New
Android.MobileSpyware.FakeDoc High 0.28 21
Android.ScareWare.Koler.C High 0.26 13
Android.Adware.Kuguo.A Moderate 0.22 18
Android.Backdoor.Advulna High 0.21 14
Android.MobileSpyware.SpyBubbl High 0.2 13
Android.Backdoor.Opfake.a High 0.17 34
Android.Trojan.Cajino High 0.15 New
Cybercriminals are quick to take advantage of opportunities that are unique to the mobile ecosystem.
Ten of the top 25 are in the mobile spyware category. These are apps that are used to spy on the
phone’s owner. They track the phone’s location and monitor ingoing and outgoing calls and text
messages. These are functions that are unique to the mobile environment. Similarly the SMS Trojans
that make their living by sending text messages to premium SMS numbers are unique to the mobile
space. Two of the top 25 fall into this category.
However, there is also a cross-over from the traditional Windows/PC malware space. For example the
top 25 includes:
•	 A variety of scare-ware apps that try to extort money by claiming to have encrypted the phone’s data
•	 Identity theft apps that steal personal information from the device
•	 Malicious adware that uses personal information without consent to provide annoying targeted ads
•	 A web proxy app that allows hackers to anonymously browse the web through an infected phone (at
the owner’s expense)
 
Examples of mobile threats
Kasandra.B is a high-threat-level Android remote-access Trojan. It is packaged to look like Kaspersky’s
Security for Mobile, but is actually a Trojan that gives the attacker unrestricted access to sensitive
details such as Short Message Service (SMS) messages, contact lists, call logs, browser history (including
banking credentials), and GPS location data stored in Android devices. It stores all the data in an
“adaptive multi-rate file on the SD card” to later upload them to a remote command and control (C&C)
server. It is also known as SandroRAT.
Figure 5. Kasandra.B summary
MAP: ANDROID.MOBILESPYWARE.KASANDRA.B
Name: Android.MobileSpyware.Kasandra.B
Signature State: Active
Type: MobileSpyware
Class: Cybercrime
Level: High
30000
20000
10000
May 16 Jun 01 Jun 16 Jul 01 Jul 16 Aug 01
May 16 Jun 01 Jun 16 Jul 01 Jul 16 Aug 01
0
1000
750
500
250
0
Signature hits
Infections
8
Motive Security Labs Malware Report – H1 2015
Alcatel-Lucent
Uapush.A is an Android adware Trojan with a moderate threat level; it also sends SMS messages and
steals personal information from the compromised device. The malware has its web-based C&C site
located in China.
Figure 6. Uapush.A summary
Name: Android.Adware.Uapush.A
Signature State: Active
Type: Adware
Class: Spyware
Level: Moderate
30000
20000
10000
May 16 Jun 01 Jun 16 Jul 01 Jul 16 Aug 01
May 16 Jun 01 Jun 16 Jul 01 Jul 16 Aug 01
0
1000
750
500
250
0
Signature hits
Infections
MAP: ANDROID.ADWARE.UAPUSH.A
SMSTracker is an Android spyphone app that provides a complete remote phone tracking and
monitoring system for Android phones. It allows the attacker to remotely track and monitor all SMS,
Multimedia Messaging Service (MMS), text messages, voice calls, GPS locations and browser history. This
is also known as Android.Monitor.Gizmo.A.
Figure 7. SMSTracker summary
Name: Android.MobileSpyware.SMSTracker
Signature ID: 2807732
Signature State: Active
Type: Mobile Spyware
Class: Identity Theft
Level: High
30000
20000
10000
May 16 Jun 01 Jun 16 Jul 01 Jul 16 Aug 01
May 16 Jun 01 Jun 16 Jul 01 Jul 16 Aug 01
0
1000
750
500
250
0
Signature hits
Infections
MAP: ANDROID.TROJAN.SMSTRACKER
SpyMob.A is a commercial monitoring tool that collects information pertaining to SMS messages, contact
list, call log and GPS location of a targeted device. These details are later uploaded to Spy2Mobile
servers and can be viewed by logging in to the user’s account at Spy2Mobile.com. For more details on
its capabilities and features, see http://spytomobile.com/en.
9
Motive Security Labs Malware Report – H1 2015
Alcatel-Lucent
Figure 8. SpyMob.A summary
Name: Android.MobileSpyware.SpyMob.A
Signature State: Active
Type: MobileSpyware
Class: Cybercrime
Level: High
30000
20000
10000
May 16 Jun 01 Jun 16 Jul 01 Jul 16 Aug 01
May 16 Jun 01 Jun 16 Jul 01 Jul 16 Aug 01
0
1000
750
500
250
0
Signature hits
Infections
MAP: ANDROID.MOBILESPYWARE.SPYMOB.A
 
NotCompatible is an Android bot that uses the infected phone to provide anonymous proxy web
browsing services. This can consume large amounts of bandwidth and airtime, as the phone serves as a
proxy for illicit web browsing activity. The C&C is located in Germany and Holland. The C&C protocol is
the same as that of a Windows-based web proxy bot.
Figure 9. NotCompatible summary
Name: Android.Bot.NotCompatible
Signature State: Active
Type: Bot
Class: Cybercrime
Level: High
30000
20000
10000
May 16 Jun 01 Jun 16 Jul 01 Jul 16 Aug 01
May 16 Jun 01 Jun 16 Jul 01 Jul 16 Aug 01
0
1000
750
500
250
0
Signature hits
Infections
MAP: ANDROID.BOT.NOTCOMPATIBLE
Koler is an Android scareware Trojan that claims it has encrypted all the data on your phone and
demands a ransom to restore the data. The victims are usually visitors to Internet-based pornographic
sites, who are duped into downloading and installing a “premium access video player.” The malware
“lock-screen” is customized depending on the location of the phone.
Figure 10. Koler summary
Name: Android.Scareware.Koler
Signature State: Active
Type: Scareware
Class: Cybercrime
Level: High
30000
20000
10000
May 16 Jun 01 Jun 16 Jul 01 Jul 16 Aug 01
May 16 Jun 01 Jun 16 Jul 01 Jul 16 Aug 01
0
1000
750
500
250
0
Signature hits
Infections
MAP: ANDROID.SCAREWARE.KOLER.C
10
Motive Security Labs Malware Report – H1 2015
Alcatel-Lucent
Malware in fixed residential networks
In 2014 the infection rate in residential networks rose significantly, as can be seen the chart in Figure
11. However the increase was almost entirely due to moderate-threat-level “adware” infections. This
dropped off somewhat in the first half of 2015, while high-threat-level infections remained fairly level.
Figure 11. Residential infection rate
2012
Q1
Residential infection rate (%)
2012
Q2
2012
Q3
2012
Q4
2013
Q3
2013
Q4
2014
Q1
2014
Q2
2014
Q3
2014
Q4
2015
Q1
2015
Q2
2013
Q1
2013
Q2
TotalHighModerate
2
0
4
6
8
10
12
14
16
18
20
In Q1 2015, 15.7% of residences had some sort of malware infection. Of these, 6.6% had a high-threat-
level infection and 10.8% had a moderate infection. In Q2 2015, the overall infection rate dropped to
13.1%, with 6.0% high-threat-level infections and 8.8% moderate.
 
Top 20 residential network infections
Table 2 shows the top home network infections detected in Motive deployments. The results are
aggregated and the order is based on the number of infections detected over the six-month period
of this report.
Table 2. Top 20 home network infections
NAME THREAT LEVEL % PREVIOUS
Win32.Adware.PullUpdate Moderate 8.33 20
Win32.Trojan.Poweliks.A High 6.41 New
Win32.Adware.BrowseFox.G Moderate 6.07 6
Win32.Adware.ShopperPro.AR Moderate 5.71 29
Win32.AdWare.AddLyrics.T Moderate 5.58 4
Win32.Adware.MarketScore Moderate 5.29 12
Win32.Adware.Wysotot Moderate 4.74 2
Win32.Adware.iBryte Moderate 4.33 1
Win32.Adware.Eorezo Moderate 3.74 3
Win32.Downloader.Obvod.K High 3.37 35
Win32.Adware.Megasearch Moderate 2.68 8
Win32.Downloader.WinOptimizer High 2.42 New
Win32.Adware.OptimizerPro Moderate 2.4 22
11
Motive Security Labs Malware Report – H1 2015
Alcatel-Lucent
NAME THREAT LEVEL % PREVIOUS
Win32.Bot.ZeroAccess2 High 1.65 15
Win32.Adware.Bundlore Moderate 1.62 17
Win32.Trojan.Bunitu.B High 1.37 27
Win32.Adware.InstallMonetizer Moderate 1.36 19
Win32.Trackware.Binder High 1.28 9
Android.MobileSpyware.Kasandra High 1.16 New
Win32.ScareWare.Crowti.A High 1.06 New
In 2015 moderate-threat-level adware continued to dominate. Of the top 20 threats in the first half of
2015, 12 are adware. The activity of high-threat-level bots has declined somewhat, with the exception
of bots associated with DDoS, which have remained the same. It could be that cybercriminals now find
it more cost effective to rent cloud-based computing power for spam and phishing activity.
 
Top 20 high-threat-level infections
Table 3 shows the top 20 high-threat-level malware infections that lead to identity theft, cybercrime or
other online attacks.
Table 3. Top 20 high-threat-level infections
NAME % PREVIOUS
Win32.Trojan.Poweliks.A 18.7 35
Win32.Downloader.Obvod.K 9.84 12
Win32.Downloader.WinOptimizer 7.05 New
Win32.Bot.ZeroAccess2 4.82 3
Win32.Trojan.Bunitu.B 3.99 7
Android.MobileSpyware.Kasandra 3.38 New
Win32.ScareWare.Crowti.A 3.1 New
Win32.Trojan.Malagent 3.03 8
Win32.Downloader.Banload.AUN 1.6 19
Win32.Trojan.Comine.M 1.33 36
Win32.Trojan.Pesut.A 1.21 44
Win32.Trojan.Usinec.A 1.14 37
Win32.Trojan.Googost.A 1.13 84
Win32.Trojan.Zeprox.A 1.1 55
Win32.Trojan.Clicker 1.1 20
Win32.Downloader.DownloadAssis 1.1 25
Indep.Bot.DNSAmplification 1.07 1
Win32.Trojan.CI.A 0.96 5
Win32.Downloader.Ramnit.J 0.94 47
Win32.Worm.Koobface.gen.B 0.84 10
The top 20 list contains the usual suspects from previous reports with bots, downloaders, banking
Trojans, and password stealers.
 
12
Motive Security Labs Malware Report – H1 2015
Alcatel-Lucent
Top 25 most prolific threats
Figure 12 shows the top 20 most prolific malware infections found on the Internet. The order is based
on the number of distinct samples we have captured from the Internet at large. Finding a large number
of samples indicates that the malware distribution is extensive and that the malware author is making
a serious attempt to evade detection by antivirus products.
Figure 12. Most prolific malware
Most prolific malware
Worm:Win32/Allaple.A
Worm.Win32/Soltern.L
Virus:Win32/Elkern.B
Worm:Win32/Vobfus.EK
Trojan:Win32/Beaugrit.gen!AAA
Virus:Win32/Nabucur.D
SoftwareBundler:Win32/InstalleRex
Virus:Win32/Ramnit.A
Virus:Win32/Virut.BN
Virus:Win32/Sality.AT
Virus:Win32/Virut.BR
TrojanDownloader:Win32/Upatre.AA
Virus:Win32/Parite.B
Virus:Win32/Mikcer.B
Virus:Win32/Expiro.CD
TrojanSpy:Win32/Lydra.gen!A
Virus:Win32/Virut.EPO
TrojanDownloader:Win32/Upatre
TrojanDownloader:Win32/Tugspay.A
Virus:Win32/Virut.BO
0% 1% 2% 3% 4% 5% 6% 8% 9%7%
 
2015 so far
Stagefright
Stagefright was the major story at the end of Q2 2015. It is a series of vulnerabilities in Android’s media
display software that provides attackers with complete control of the phone by simply sending it an MMS
message with a specially crafted media attachment. When the message is received, Android automatically
tries to open the attachment and the device is infected without any interaction from the user. So far
there is no known malware in the wild that exploits this vulnerability, but a proof-of-concept exploit that
provided remote root access to the phone was demonstrated at the Black Hat USA conference in August
2015. Google has pointed out that the Android’s built in “Address Space Layout Randomization” feature
will make it difficult for attackers to exploit this vulnerability. I guess we’ll find out.
What’s so remarkable about the Stagefright vulnerability is that the sheer number of potentially affected
mobile devices is estimated to be close to 1 billion. While the scale of the exposure is unprecedented in
the mobile device landscape, the really scary part is that the attacker can take complete control of the
phone by simply sending it an MMS message, bypassing any on-device security solutions.
Patches are available, but the real question is how to get them deployed. One positive aspect of
Stagefright is that it has forced Google, Android phone manufacturers and the mobile carriers to take
a serious look at how to improve the ability to get security patches deployed in the field. Updates
are now available for Google’s Nexus line and Samsung, HTC, LG, Sony and Motorola all have updates
available. One interim solution is to disable automatic processing of multimedia attachments.
13
Motive Security Labs Malware Report – H1 2015
Alcatel-Lucent
Stagefright is not the only vulnerability discovered in 2015. Security researchers have been fairly busy
so far this year. Researchers at MWR discovered a flaw in the Google Admin app that could be used by
a malicious app to “break into the app’s sandbox environment and read its files.” Trend Micro reported
another vulnerability in the media display software that can be used in a similar manner to Stagefright.
IBM researchers also demonstrated an Android deserialization flaw that allows code execution in the
system server process.
Despite the reduction in Android infections in the first half of 2015, vulnerabilities like Stagefright
remind us that the potential for a major infection event is always a possibility. We have also noticed that
smartphone malware is becoming more sophisticated in both its C&C and its persistence on the device.
For the first time we recently witnessed Android malware that was able to survive a factory reset.
Encrypted command and control
Motive Security Guardian detects malware infections by looking for known C&C exchanges in the
network traffic. So how can we detect malware if the C&C traffic is encrypted? This is an excellent
question that has been made more relevant by the fact that over the past year the use of Secure
Sockets Layer (SSL) encryption for web applications has increased significantly. The assumption
is that as more regular apps move to SSL, so will the malware C&C.
So we reviewed some stats from our malware analysis lab. Only 2.6% of active malware families
used encrypted C&C protocols and most of those could be detected by inspecting the traffic. Often
encrypted C&C traffic can be identified by characteristics in the initial handshake between the bot and
its controller, key exchanges, file downloads, exploit attempts and scanning activity. This can include
specific packet content, port numbers, packet lengths and packet sequences. In some cases it is very
easy to identify the bot. For example:
•	 Malware that uses its own home-grown cryptography is usually the easiest to detect due to its use
of fixed keys that result in fixed binary content, use of specific ports, or use of an easily recognizable
key exchange sequence.
•	 Malware that spreads by means of a network vulnerability can be detected from the use of that
vulnerability, which is something that can’t be encrypted.
•	 Malware that generates other network activity, such as DDoS, spam or scanning can be identified
by that activity even although the C&C is secure.
Malware that uses standard cryptography such as SSL is more difficult, but in these cases we can often
use the certificate exchange, which is done in clear text, to identify the malware. In cases where this
is not possible, we can often accurately identify the malware using IP or Domain Name System (DNS)
blacklists.
In the first half of this year we have analyzed network traffic from 332 unique malware families.
We were unable to develop detection rules for only four of those due to encryption.
Scanning, DDoS and NAT
A lot of scanning is taking place out there on the Internet. Most of it is due to cybercriminals (or
security researchers) looking for vulnerable hosts. In mobile networks this can have an unexpected side
effect. When a mobile device establishes a data connection, it is assigned an IP address and provided
with connectivity to the Internet. Although the Internet connection will remain logically established, the
actual radio connection to the local cell is typically timed out after 10 to 20 seconds of inactivity and
the device is moved to an idle state. If someone on the Internet sends an IP packet to an idle device, the
radio connection must be re-established via a mechanism called paging in order to deliver the packet.
This paging process uses significant radio resources. Since many devices will typically be in the idle
state, scanning through an IP subnet can cause a “paging storm” and overload limited radio resources.
14
Motive Security Labs Malware Report – H1 2015
Alcatel-Lucent
We commonly see scans looking for hosts that will participate (unwillingly) in DDoS amplification
attacks. We have seen this for both DNS and Network Time Protocol (NTP) amplification attacks. For
example, it is quite common in mobile networks to have mobile Wi-Fi hotspots that act as recursive
DNS servers and can be leveraged to participate in a DNS DDoS attack. Here the mobile operator has
double jeopardy. The scanning causes “paging storms” and the actual DDoS attack puts a huge stress on
the mobile carrier’s DNS infrastructure.
Both the scanning and DDoS problems are not an issue if network address translation (NAT) is used.
Since many mobile carriers use NAT, they are not currently vulnerable to these problems. However
if they migrate to Internet-accessible IPv6 addresses, their mobile devices will become visible to the
Internet and they will have to worry about scanning and DDoS activities.
New adware
Adware has definitely been on the increase in 2015 with the ads themselves becoming more sinister.
One of interest is called BetterSurf. This is moderate-threat-level Windows adware. This malware arrives
with software bundlers that offer free applications or games. When installed, it adds a plugin to the
Internet Explorer, Firefox and Chrome browsers that injects popup ads into web pages. So far it looks
like regular, run-of-the-mill adware; however the ads themselves are dangerous.
Many are phishing attempts that redirect the browser to web sites that attempt to install additional
unwanted applications on the infected device. Some of the ads are full screen popups that are designed
to look like instructions from Microsoft asking you to download and install the latest security patch.
One popup looked like a “blue screen error” with instructions to call a 1-800 number for technical
support. When you call the numbers you are taken to a “help desk” that immediately asks for remote
access to your computer and then charges exorbitant rates for bogus technical support for non-existent
problems. The screen shot is shown in Figure 13.
Figure 13. Example of BetterSurf adware infection
15
Motive Security Labs Malware Report – H1 2015
Alcatel-Lucent
Mobile spyware
In the mobile space the use of commercial spyphone apps has really taken off. These apps allow you
to track the movements of the phone’s owner, their phone calls, text messages, e-mails and browsing
habits. Often these are used for reasonable activities, like keeping track of your children, but there are
also far more sinister uses for these types of applications.
The modern smartphone also presents the perfect platform for cyber-espionage. First, it can be used
simply as a tool that the owner (spy) can use to photograph, film, record audio, scan networks and send
the results immediately through the air to a safe site for analysis. In the “bring your own device” (BYOD)
context it makes a perfect target for advanced persistent threat (APT) attacks. A smartphone infected
with professional mobile spyware allows the attacker to:
•	 Monitor the victim’s location
•	 Monitor phone calls and text message
•	 Monitor e-mail and contacts
•	 Access data on the phone
•	 Take pictures and video
•	 Record conversations
•	 Scan and probe the local corporate network
•	 Exfiltrate data through the air, bypassing corporate firewalls
 
Summary and conclusion
On the fixed residential side, the overall malware infection rate rose to 15.7% in Q1 and then dropped
to 13.1% in Q2. The biggest factor in these changes was moderate-threat-level adware. The infection
rate for high-threat-level infections increased in 2015. Currently 6% of homes monitored by Motive
Security Guardian are infected with a high-threat-level variety of malware such as a bots, rootkits or
banking Trojans.
On the mobile front, infection levels rose to 0.75% in Q2 2015 from 0.68% in December 2014. However
the increase was due to infections on Windows/PCs and laptops connected to the mobile network via
phones, dongles and mobile Wi-Fi hotspots. Android infection rates actually fell in 2015. Less than 1%
of the infections are from other devices such as iPhones, BlackBerry smartphones and Windows Phones.
The number of Android malware samples in our database more than doubled in the first half of 2015.
Despite the reduction in Android infections in the first half of 2015, vulnerabilities like Stagefright
remind us that the potential for a major infection event is always a possibility. We have also noticed that
smartphone malware is becoming more sophisticated in both its C&C and its persistence on the device.
For the first time we recently witnessed Android malware that was able to survive a factory reset.
In terms of malware trends, on the mobile side we have seen an increase in the area of mobile spyware
that tracks the victim’s calls, text messages and location. On the residential side, we have seen a
significant increase in adware with 14 out of the top 20 being in that category.
 
16
Motive Security Labs Malware Report – H1 2015
Alcatel-Lucent
Terminology and definitions
This section defines some of the terminology used in the report.
TERM DEFINITION
Advanced persistent threat (APT) A targeted cyber-attack launched against a company or government
department by professional hackers using state-of-the-art tools, usually
with information theft as the main motivation
Infection vector The mechanism used to infect a computer or network device. For example,
in computers running the Windows operating system, the most popular
infection vector is a web-based exploit kit, whereas on the Android phone
it is a Trojanized application.
Bot An infected computer that is part of a botnet. A botnet is a network of
infected computers that are controlled remotely via the Internet by cyber-
criminals. Botnets are used for sending spam email, ad-click fraud, DDoS
attacks, distributing additional malware, Bitcoin mining and a variety of
other purposes.
Rootkit A malware component that compromises the computer’s operating system
software for the purposes of concealing the malware from antivirus and
other detection technologies
Trojan Computer program or application that looks fine on the surface, but
actually contains malware hidden inside. From the term Trojan Horse.
High/moderate threat level We split malware into high and moderate threat levels. High is any
threat that does damage, steals personal information or steals money. A
moderate threat is one that does no serious damage, but will be perceived
by most as annoying and disruptive.
Ad-click fraud Advertisers pay money, typically a few cents, when someone clicks on
a web-based advertisement. Ad-click fraud occurs when someone uses
software to fake these ad clicks and collects money from the advertisers
for the fake clicks. Typically the ad-click software is packaged as malware
and distributed through a botnet that is controlled by cyber-criminals who
make money from the ad-click fraud.
Bitcoin mining Bitcoins are a form of virtual cyber-currency that can be created through
complex arithmetic calculations that take a lot of computing power to
perform. The process of executing these calculations to generate new
Bitcoins is referred to as Bitcoin mining. Cyber-criminals use large botnets
to efficiently generate new Bitcoins.
 
www.alcatel-lucent.com Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks
of Alcatel-Lucent. All other trademarks are the property of their respective owners.
The information presented is subject to change without notice. Alcatel-Lucent assumes no
responsibility for inaccuracies contained herein. Copyright © 2015 Alcatel-Lucent.
All rights reserved. PR1508013821EN (September)
About Motive Security Labs
Motive Security Labs focuses on the behavior of malware communications to develop network
detection rules that specifically and positively detect current threats. This approach enables the
detection of malware in the service provider’s network and the signatures developed form the
foundation of the Motive Security Guardian product suite.
To accurately detect that a user is infected, our detection rule set looks for network behavior
that provides unequivocal evidence of infection coming from the user’s computer. This includes:
•	 Malware command and control (C&C) communications
•	 Backdoor connections
•	 Attempts to infect others (for example, exploits)
•	 Excessive e-mail
•	 Denial of Service (DoS) and hacking activity
Four main activities support our signature development and verification process:
1.	 Monitor information sources from major security vendors and maintain a database of currently
active threats
2.	 Collect malware samples (>10,000/day), classify and correlate them against the threat database
3.	 Execute samples matching the top threats in a sandbox environment and compare against our
current signature set
4.	 Conduct a detailed analysis of the malware’s behavior and build new signature if a sample fails
to trigger a signature
As an active member of the security community, Motive Security Labs also shares this research
by publishing a list of home network infections and the top emerging threats on the Internet — and
this report.

More Related Content

What's hot

Gupshup whats app_api_document_v1.2_29thjune
Gupshup whats app_api_document_v1.2_29thjuneGupshup whats app_api_document_v1.2_29thjune
Gupshup whats app_api_document_v1.2_29thjune
SantoshKrishnaSista
 
10 examples-of-social-media-command-centers
10 examples-of-social-media-command-centers10 examples-of-social-media-command-centers
10 examples-of-social-media-command-centers
Shamsher Khan
 

What's hot (11)

Android OS Security: Risks and Limitations. AISEC Technical Report
Android OS Security: Risks and Limitations. AISEC Technical ReportAndroid OS Security: Risks and Limitations. AISEC Technical Report
Android OS Security: Risks and Limitations. AISEC Technical Report
 
Stopping Malware
Stopping MalwareStopping Malware
Stopping Malware
 
Sample global animal shelter software market report 2022
Sample global animal shelter software market report 2022Sample global animal shelter software market report 2022
Sample global animal shelter software market report 2022
 
Compliance implications of social media
Compliance implications of social mediaCompliance implications of social media
Compliance implications of social media
 
State of Software Security - Enterprise Testing of Software Supply Chain
State of Software Security - Enterprise Testing of Software Supply ChainState of Software Security - Enterprise Testing of Software Supply Chain
State of Software Security - Enterprise Testing of Software Supply Chain
 
Gupshup whats app_api_document_v1.2_29thjune
Gupshup whats app_api_document_v1.2_29thjuneGupshup whats app_api_document_v1.2_29thjune
Gupshup whats app_api_document_v1.2_29thjune
 
Whats New In Wm65
Whats New In Wm65Whats New In Wm65
Whats New In Wm65
 
Wap Usability
Wap UsabilityWap Usability
Wap Usability
 
10 examples-of-social-media-command-centers
10 examples-of-social-media-command-centers10 examples-of-social-media-command-centers
10 examples-of-social-media-command-centers
 
Evolution of-exploit-kits
Evolution of-exploit-kitsEvolution of-exploit-kits
Evolution of-exploit-kits
 
BSidesSF 2016 - A year in the wild: fighting malware at the corporate level
BSidesSF 2016 - A year in the wild: fighting malware at the corporate levelBSidesSF 2016 - A year in the wild: fighting malware at the corporate level
BSidesSF 2016 - A year in the wild: fighting malware at the corporate level
 

Viewers also liked

Feet on the Ground and Phis in the Sky by Dani Barto (1)
Feet on the Ground and Phis in the Sky by Dani Barto (1)Feet on the Ground and Phis in the Sky by Dani Barto (1)
Feet on the Ground and Phis in the Sky by Dani Barto (1)
Dani Barto
 
DemetriusGoodwinresume2016.doc
DemetriusGoodwinresume2016.docDemetriusGoodwinresume2016.doc
DemetriusGoodwinresume2016.doc
Demetrius Goodwin
 
Revenue Recognition Is Changing(Funkadelic)
Revenue Recognition Is Changing(Funkadelic)Revenue Recognition Is Changing(Funkadelic)
Revenue Recognition Is Changing(Funkadelic)
Stephanie Hampton
 
Esseen palautus
Esseen palautusEsseen palautus
Esseen palautus
HooKooM
 
제 7장정의적 특성의 평가 이서영
제 7장정의적 특성의 평가 이서영제 7장정의적 특성의 평가 이서영
제 7장정의적 특성의 평가 이서영
서영 이
 

Viewers also liked (14)

F67 iii 2012-05-30
F67 iii 2012-05-30F67 iii 2012-05-30
F67 iii 2012-05-30
 
Red4348 critical assignment 1
Red4348 critical assignment 1Red4348 critical assignment 1
Red4348 critical assignment 1
 
Plow Through Your Winter Problems
Plow Through Your Winter ProblemsPlow Through Your Winter Problems
Plow Through Your Winter Problems
 
04. pti perangkat keras; cpu dan alat penyimpan
04. pti   perangkat keras; cpu dan alat penyimpan04. pti   perangkat keras; cpu dan alat penyimpan
04. pti perangkat keras; cpu dan alat penyimpan
 
Feet on the Ground and Phis in the Sky by Dani Barto (1)
Feet on the Ground and Phis in the Sky by Dani Barto (1)Feet on the Ground and Phis in the Sky by Dani Barto (1)
Feet on the Ground and Phis in the Sky by Dani Barto (1)
 
The Top 5 Hearing Aid Myths Exposed
The Top 5 Hearing Aid Myths ExposedThe Top 5 Hearing Aid Myths Exposed
The Top 5 Hearing Aid Myths Exposed
 
03. pti perangkat lunak
03. pti   perangkat lunak03. pti   perangkat lunak
03. pti perangkat lunak
 
DemetriusGoodwinresume2016.doc
DemetriusGoodwinresume2016.docDemetriusGoodwinresume2016.doc
DemetriusGoodwinresume2016.doc
 
Revenue Recognition Is Changing(Funkadelic)
Revenue Recognition Is Changing(Funkadelic)Revenue Recognition Is Changing(Funkadelic)
Revenue Recognition Is Changing(Funkadelic)
 
Esseen palautus
Esseen palautusEsseen palautus
Esseen palautus
 
Presentazione iniziale - Parole chiave - Idee - Brevetti esistenti
Presentazione iniziale - Parole chiave - Idee - Brevetti esistentiPresentazione iniziale - Parole chiave - Idee - Brevetti esistenti
Presentazione iniziale - Parole chiave - Idee - Brevetti esistenti
 
NMO WS15 v2 web
NMO WS15 v2 webNMO WS15 v2 web
NMO WS15 v2 web
 
제 7장정의적 특성의 평가 이서영
제 7장정의적 특성의 평가 이서영제 7장정의적 특성의 평가 이서영
제 7장정의적 특성의 평가 이서영
 
MFS Team Proposal
MFS Team ProposalMFS Team Proposal
MFS Team Proposal
 

Similar to Motive_Security_Labs_Malware_Report_1H2015

Symantec Internet Security Threat Report - 2009
Symantec Internet Security Threat Report - 2009Symantec Internet Security Threat Report - 2009
Symantec Internet Security Threat Report - 2009
guest6561cc
 
Why Traditional Anti Malware Whitepaper
Why Traditional Anti Malware WhitepaperWhy Traditional Anti Malware Whitepaper
Why Traditional Anti Malware Whitepaper
AVG Technologies
 
Fireeye definitive-guide-next-gen-threat-protection-2
Fireeye definitive-guide-next-gen-threat-protection-2Fireeye definitive-guide-next-gen-threat-protection-2
Fireeye definitive-guide-next-gen-threat-protection-2
drewz lin
 
Fireeye definitive-guide-next-gen-threat-protection
Fireeye definitive-guide-next-gen-threat-protectionFireeye definitive-guide-next-gen-threat-protection
Fireeye definitive-guide-next-gen-threat-protection
Alex Lim
 
Hi-Tech Crime Trends 2014
Hi-Tech Crime Trends 2014Hi-Tech Crime Trends 2014
Hi-Tech Crime Trends 2014
Group-IB
 
Asymmetric threat 4_paper (1)
Asymmetric threat 4_paper (1)Asymmetric threat 4_paper (1)
Asymmetric threat 4_paper (1)
MarioEliseo3
 
Creating andrCreating-Android-Applicationsoid-applications
Creating andrCreating-Android-Applicationsoid-applicationsCreating andrCreating-Android-Applicationsoid-applications
Creating andrCreating-Android-Applicationsoid-applications
Marwoutta Dh
 
Nokia_3110_APAC_UG_en
Nokia_3110_APAC_UG_enNokia_3110_APAC_UG_en
Nokia_3110_APAC_UG_en
OumAarya
 
R@D 4 - Digital Activism Survey Report 2009
R@D 4 - Digital Activism Survey Report 2009R@D 4 - Digital Activism Survey Report 2009
R@D 4 - Digital Activism Survey Report 2009
DigiActive
 

Similar to Motive_Security_Labs_Malware_Report_1H2015 (20)

Trends for 2014: The Challenge of Internet Privacy
Trends for 2014: The Challenge of Internet PrivacyTrends for 2014: The Challenge of Internet Privacy
Trends for 2014: The Challenge of Internet Privacy
 
Nominum 2017 Spring Data Revelations Security Report
Nominum 2017 Spring Data Revelations Security ReportNominum 2017 Spring Data Revelations Security Report
Nominum 2017 Spring Data Revelations Security Report
 
2020-trustwave-global-security-report.pdf
2020-trustwave-global-security-report.pdf2020-trustwave-global-security-report.pdf
2020-trustwave-global-security-report.pdf
 
Symantec Internet Security Threat Report - 2009
Symantec Internet Security Threat Report - 2009Symantec Internet Security Threat Report - 2009
Symantec Internet Security Threat Report - 2009
 
M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails
 
State of Software Security - Public Companies Supplement
State of Software Security - Public Companies SupplementState of Software Security - Public Companies Supplement
State of Software Security - Public Companies Supplement
 
Why Traditional Anti Malware Whitepaper
Why Traditional Anti Malware WhitepaperWhy Traditional Anti Malware Whitepaper
Why Traditional Anti Malware Whitepaper
 
Wisr2011 en
Wisr2011 enWisr2011 en
Wisr2011 en
 
Final 2016 cyber captive survey
Final 2016 cyber captive surveyFinal 2016 cyber captive survey
Final 2016 cyber captive survey
 
Fireeye definitive-guide-next-gen-threat-protection-2
Fireeye definitive-guide-next-gen-threat-protection-2Fireeye definitive-guide-next-gen-threat-protection-2
Fireeye definitive-guide-next-gen-threat-protection-2
 
Fireeye definitive-guide-next-gen-threat-protection
Fireeye definitive-guide-next-gen-threat-protectionFireeye definitive-guide-next-gen-threat-protection
Fireeye definitive-guide-next-gen-threat-protection
 
Hi-Tech Crime Trends 2014
Hi-Tech Crime Trends 2014Hi-Tech Crime Trends 2014
Hi-Tech Crime Trends 2014
 
Asymmetric threat 4_paper (1)
Asymmetric threat 4_paper (1)Asymmetric threat 4_paper (1)
Asymmetric threat 4_paper (1)
 
2016 technology Industry Report
2016 technology Industry Report2016 technology Industry Report
2016 technology Industry Report
 
XSLATE_B10_Users_Guide_FINAL
XSLATE_B10_Users_Guide_FINALXSLATE_B10_Users_Guide_FINAL
XSLATE_B10_Users_Guide_FINAL
 
Creating andrCreating-Android-Applicationsoid-applications
Creating andrCreating-Android-Applicationsoid-applicationsCreating andrCreating-Android-Applicationsoid-applications
Creating andrCreating-Android-Applicationsoid-applications
 
Rand rr1751
Rand rr1751Rand rr1751
Rand rr1751
 
Security in mobile banking apps
Security in mobile banking appsSecurity in mobile banking apps
Security in mobile banking apps
 
Nokia_3110_APAC_UG_en
Nokia_3110_APAC_UG_enNokia_3110_APAC_UG_en
Nokia_3110_APAC_UG_en
 
R@D 4 - Digital Activism Survey Report 2009
R@D 4 - Digital Activism Survey Report 2009R@D 4 - Digital Activism Survey Report 2009
R@D 4 - Digital Activism Survey Report 2009
 

Motive_Security_Labs_Malware_Report_1H2015

  • 1. Motive Security Labs Malware Report – H1 2015
  • 2. 2 Motive Security Labs Malware Report – H1 2015 Alcatel-Lucent Table of contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2015 first half highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Malware in mobile networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Mobile network infection rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Infections by device type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Android malware samples continue growth in 2015. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Top Android malware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Examples of mobile threats. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Malware in fixed residential networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Top 20 residential network infections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Top 20 high-threat-level infections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Top 25 most prolific threats. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 2015 so far . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Stagefright. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Encrypted command and control. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Scanning, DDoS and NAT. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 New adware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Mobile spyware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Summary and conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Terminology and definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 About Motive Security Labs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
  • 3. 3 Motive Security Labs Malware Report – H1 2015 Alcatel-Lucent Introduction The “Motive Security Labs H1 2015 Malware Report” examines general trends and statistics for malware infections in devices connected through mobile and fixed networks. The data in this report is aggregated across the networks where the Motive Security Guardian network-based malware detection solutions are deployed. This solution is deployed in major mobile and fixed networks around the world, covering over 100 million devices. 2015 first half highlights Mobile • The mobile infection rate declined to 0.50% in Q1 due to a reduction in infections on devices running the Android™ operating system (Android) and then rose to 0.75% at the end of Q2 due to a noticeable increase in adware infections on PCs running the Microsoft Windows® operating system (Windows/PCs). • 80% of infections on the mobile network are attributable to Windows/PCs connected via dongles, mobile Wi-Fi® hotspots or tethered through phones. • Mobile spyware is definitely on the increase. Ten of the malware entries on the top 25 mobile infection list are mobile spyware. These are apps that are used to spy on the phone’s owner. They track the phone’s location, monitor ingoing and outgoing calls and text messages, monitor email and track the victim’s web browsing. Residential • The overall monthly infection rate in residential fixed broadband networks averaged 14.4%, up slightly from 2014. The increase is mostly • attributable to an increase in moderate-threat-level adware infections. • The infection rate for high-level threats such as a bots, rootkits, keyloggers and banking Trojans increased to 6.3% from 5% in 2014. 80% of mobile infections are on Windows PCs 14% of homes are infected with malware of the top10 25 smart phone infections are spyware
  • 4. 4 Motive Security Labs Malware Report – H1 2015 Alcatel-Lucent Malware in mobile networks In the first half of 2015 the overall mobile infection rate continued its upward trend. The number of Android malware samples continued to grow significantly, but not at the exponential rates seen in 2013. Mobile network infection rate Figure 1 shows the percentage of infected mobile devices observed on a monthly basis since December 2012. This data is averaged from actual mobile deployments. Figure 1. Mobile infection rate since December 2012 0.6% 0.7% 0.5% 0.4% Mobile infection rate 0.8% Oct 12 May 13 Nov 13 Jun 14 Dec 14 Jul 15 After two years of growth, the infection rate for mobile devices actually dropped from 0.68% in January 2015 to 0.50% in April. It then rebounded to close the first half of 2015 at 0.75% at the end of June. A number of factors caused this, but the major contributing factors have been a reduction in Android infections in the early part of the year followed by an increase in Windows/PC infections in Q2. Infections by device type Figure 2 shows the percentage of infections by device type. Most people are surprised to find such a high proportion of Windows/PC devices involved. These Windows/PCs are connected to the mobile network via dongles and mobile Wi-Fi devices or simply tethered through smartphones. They are responsible for a large percentage of the malware infections observed. This is because these devices are still the favorite of hardcore professional cybercriminals who have a huge investment in the Windows malware ecosystem. As the mobile network becomes the access network of choice for many Windows/ PCs, the malware moves with them. In June of 2015 Windows/PCs were responsible for about 80% of the malware infections that we detected on the mobile network. Figure 2. Infected device types from 2013 to 2015 Android Windows Infected device type 2013 – 2015 Jan13 Feb Mar Apr May June July Aug Sept Oct Nov Dec Jan14 Feb Mar Apr May June July Aug Sept Oct Nov Dec Jan15 Feb Mar Apr May June 0 10 20 30 40 50 60 70 80 90 100
  • 5. 5 Motive Security Labs Malware Report – H1 2015 Alcatel-Lucent Between 2013 and 2014 the contribution to the infection rates in the mobile network were roughly 50/50 between Android and Windows/PCs. This changed significantly in 2015. At the end of Q2, 80% of infections observed on the mobile network were from Windows/PCs connected via dongles, mobile Wi-Fi hotspots or tethered through phones. Android devices made up 20% of the infections. The other smartphones (iPhone, Blackberry, Windows Mobile, etc.) made up less than 1% of the infections we have observed. The iPhone and Blackberry have a more controlled app distribution environment and are thus less of a target. Two factors contributed to this change. In Q1 the actual number of Android infections declined. This was followed by a significant increase in Windows/PC adware infections in Q2. Currently most Android malware is distributed as “Trojanized” apps and Android offers the easiest target for this because of its open app environment. Specifically, the following Android issues have been observed: • Android apps can be downloaded from third-party app stores and web sites. • There is no control of the digital certificates used to sign Android apps. ¬ Android apps are usually self-signed and can’t be traced to the developer. ¬ It is easy to hijack an Android app, inject code into it and re-sign it. Another way to look at the data is to show the contribution of the device types to the infection rate itself, as shown in Figure 3. Figure 3: Contribution to infection rate by device type 0.6% 0.7% 0.5% 0.4% 0.3% 0.2% Infections by device type 0.8% 0.1% 0.0% Oct 12 May 13 Android Nov 13 Jun 14 Dec 14 Jul 15 Windows Total This clearly indicates the reduction in Android infection in Q1 and the increase in Windows/PC infection in Q2. The Android reduction is probably due to efforts by Google to eliminate malware from Google Play and to the introduction of the Verify Apps feature on Android. Most Android malware is distributed as Trojanized apps that are downloaded and installed from Google Play and other third-party app stores. So eliminating malware from the app store and verifying apps at install time can have a major impact on the infection rate. The Verify Apps feature was introduced in Android 4.2 (JellyBean) and is now available on close to 80% of deployed devices. It is activated by default, but the user does have to consent to have the service run the first time they side-load an app.
  • 6. 6 Motive Security Labs Malware Report – H1 2015 Alcatel-Lucent The increase in Windows/PC infections can be attributed to the fact that more people are using their phone’s data connection to provide Internet access for their devices. Most of these infections are due to a resurgence of moderate-threat-level adware, bundled with games and free software.   Android malware samples continue growth in 2015 An indicator of Android malware growth is the increase in the number of samples in our malware database. The chart below shows numbers since June 2012. Figure 4. Mobile malware samples since June 2012 Mobile malware samples 0 50000 100000 150000 200000 250000 300000 Jul 12 Oct 12 Jan 13 Apr 13 Jul 13 Oct 13 Jan 14 Apr 14 Jul 14 Oct 14 Jan 15 Apr 15 Jul 15 The number of Android malware samples more than doubled in the first half of 2015.   Top Android malware Table 1 shows the top 25 Android malware infections detected in H2 2014 in the networks where the Motive solution is deployed. Table 1. Top 25 Android malware detected in H2 2014 NAME LEVEL % PREVIOUS Android.MobileSpyware.Kasandra High 31.30 New Android.Adware.Uapush.A Moderate 28.82 1 Android.Trojan.SmsTracker High 22.36 3 Android.MobileSpyware.Gappusin High 2.86 New Android.MobileSpyware.SpyMob.a High 2.05 5 Android.Trojan.FakeFlash High 1.46 7 Android.MobileSpyware.CellSpy High 0.98 New Android.MobileSpyware.Tekwon.A High 0.87 16 Android.Trojan.Wapsx High 0.86 8 Android.Bot.Notcompatible High 0.77 6 Android.Trojan.SMSreg.gc High 0.74 41 Android.MobileSpyware.Phonerec High 0.55 15 Android.Trojan.Qdplugin High 0.54 10 Android.ScareWare.SLocker.A High 0.52 New Android.MobileSpyware.GinMaste High 0.47 9
  • 7. 7 Motive Security Labs Malware Report – H1 2015 Alcatel-Lucent NAME LEVEL % PREVIOUS Android.MobileSpyware.Spyoo.C High 0.39 27 Android.Backdoor.Agent.bz High 0.34 New Android.Downloader.Stew.a High 0.29 New Android.MobileSpyware.FakeDoc High 0.28 21 Android.ScareWare.Koler.C High 0.26 13 Android.Adware.Kuguo.A Moderate 0.22 18 Android.Backdoor.Advulna High 0.21 14 Android.MobileSpyware.SpyBubbl High 0.2 13 Android.Backdoor.Opfake.a High 0.17 34 Android.Trojan.Cajino High 0.15 New Cybercriminals are quick to take advantage of opportunities that are unique to the mobile ecosystem. Ten of the top 25 are in the mobile spyware category. These are apps that are used to spy on the phone’s owner. They track the phone’s location and monitor ingoing and outgoing calls and text messages. These are functions that are unique to the mobile environment. Similarly the SMS Trojans that make their living by sending text messages to premium SMS numbers are unique to the mobile space. Two of the top 25 fall into this category. However, there is also a cross-over from the traditional Windows/PC malware space. For example the top 25 includes: • A variety of scare-ware apps that try to extort money by claiming to have encrypted the phone’s data • Identity theft apps that steal personal information from the device • Malicious adware that uses personal information without consent to provide annoying targeted ads • A web proxy app that allows hackers to anonymously browse the web through an infected phone (at the owner’s expense)   Examples of mobile threats Kasandra.B is a high-threat-level Android remote-access Trojan. It is packaged to look like Kaspersky’s Security for Mobile, but is actually a Trojan that gives the attacker unrestricted access to sensitive details such as Short Message Service (SMS) messages, contact lists, call logs, browser history (including banking credentials), and GPS location data stored in Android devices. It stores all the data in an “adaptive multi-rate file on the SD card” to later upload them to a remote command and control (C&C) server. It is also known as SandroRAT. Figure 5. Kasandra.B summary MAP: ANDROID.MOBILESPYWARE.KASANDRA.B Name: Android.MobileSpyware.Kasandra.B Signature State: Active Type: MobileSpyware Class: Cybercrime Level: High 30000 20000 10000 May 16 Jun 01 Jun 16 Jul 01 Jul 16 Aug 01 May 16 Jun 01 Jun 16 Jul 01 Jul 16 Aug 01 0 1000 750 500 250 0 Signature hits Infections
  • 8. 8 Motive Security Labs Malware Report – H1 2015 Alcatel-Lucent Uapush.A is an Android adware Trojan with a moderate threat level; it also sends SMS messages and steals personal information from the compromised device. The malware has its web-based C&C site located in China. Figure 6. Uapush.A summary Name: Android.Adware.Uapush.A Signature State: Active Type: Adware Class: Spyware Level: Moderate 30000 20000 10000 May 16 Jun 01 Jun 16 Jul 01 Jul 16 Aug 01 May 16 Jun 01 Jun 16 Jul 01 Jul 16 Aug 01 0 1000 750 500 250 0 Signature hits Infections MAP: ANDROID.ADWARE.UAPUSH.A SMSTracker is an Android spyphone app that provides a complete remote phone tracking and monitoring system for Android phones. It allows the attacker to remotely track and monitor all SMS, Multimedia Messaging Service (MMS), text messages, voice calls, GPS locations and browser history. This is also known as Android.Monitor.Gizmo.A. Figure 7. SMSTracker summary Name: Android.MobileSpyware.SMSTracker Signature ID: 2807732 Signature State: Active Type: Mobile Spyware Class: Identity Theft Level: High 30000 20000 10000 May 16 Jun 01 Jun 16 Jul 01 Jul 16 Aug 01 May 16 Jun 01 Jun 16 Jul 01 Jul 16 Aug 01 0 1000 750 500 250 0 Signature hits Infections MAP: ANDROID.TROJAN.SMSTRACKER SpyMob.A is a commercial monitoring tool that collects information pertaining to SMS messages, contact list, call log and GPS location of a targeted device. These details are later uploaded to Spy2Mobile servers and can be viewed by logging in to the user’s account at Spy2Mobile.com. For more details on its capabilities and features, see http://spytomobile.com/en.
  • 9. 9 Motive Security Labs Malware Report – H1 2015 Alcatel-Lucent Figure 8. SpyMob.A summary Name: Android.MobileSpyware.SpyMob.A Signature State: Active Type: MobileSpyware Class: Cybercrime Level: High 30000 20000 10000 May 16 Jun 01 Jun 16 Jul 01 Jul 16 Aug 01 May 16 Jun 01 Jun 16 Jul 01 Jul 16 Aug 01 0 1000 750 500 250 0 Signature hits Infections MAP: ANDROID.MOBILESPYWARE.SPYMOB.A   NotCompatible is an Android bot that uses the infected phone to provide anonymous proxy web browsing services. This can consume large amounts of bandwidth and airtime, as the phone serves as a proxy for illicit web browsing activity. The C&C is located in Germany and Holland. The C&C protocol is the same as that of a Windows-based web proxy bot. Figure 9. NotCompatible summary Name: Android.Bot.NotCompatible Signature State: Active Type: Bot Class: Cybercrime Level: High 30000 20000 10000 May 16 Jun 01 Jun 16 Jul 01 Jul 16 Aug 01 May 16 Jun 01 Jun 16 Jul 01 Jul 16 Aug 01 0 1000 750 500 250 0 Signature hits Infections MAP: ANDROID.BOT.NOTCOMPATIBLE Koler is an Android scareware Trojan that claims it has encrypted all the data on your phone and demands a ransom to restore the data. The victims are usually visitors to Internet-based pornographic sites, who are duped into downloading and installing a “premium access video player.” The malware “lock-screen” is customized depending on the location of the phone. Figure 10. Koler summary Name: Android.Scareware.Koler Signature State: Active Type: Scareware Class: Cybercrime Level: High 30000 20000 10000 May 16 Jun 01 Jun 16 Jul 01 Jul 16 Aug 01 May 16 Jun 01 Jun 16 Jul 01 Jul 16 Aug 01 0 1000 750 500 250 0 Signature hits Infections MAP: ANDROID.SCAREWARE.KOLER.C
  • 10. 10 Motive Security Labs Malware Report – H1 2015 Alcatel-Lucent Malware in fixed residential networks In 2014 the infection rate in residential networks rose significantly, as can be seen the chart in Figure 11. However the increase was almost entirely due to moderate-threat-level “adware” infections. This dropped off somewhat in the first half of 2015, while high-threat-level infections remained fairly level. Figure 11. Residential infection rate 2012 Q1 Residential infection rate (%) 2012 Q2 2012 Q3 2012 Q4 2013 Q3 2013 Q4 2014 Q1 2014 Q2 2014 Q3 2014 Q4 2015 Q1 2015 Q2 2013 Q1 2013 Q2 TotalHighModerate 2 0 4 6 8 10 12 14 16 18 20 In Q1 2015, 15.7% of residences had some sort of malware infection. Of these, 6.6% had a high-threat- level infection and 10.8% had a moderate infection. In Q2 2015, the overall infection rate dropped to 13.1%, with 6.0% high-threat-level infections and 8.8% moderate.   Top 20 residential network infections Table 2 shows the top home network infections detected in Motive deployments. The results are aggregated and the order is based on the number of infections detected over the six-month period of this report. Table 2. Top 20 home network infections NAME THREAT LEVEL % PREVIOUS Win32.Adware.PullUpdate Moderate 8.33 20 Win32.Trojan.Poweliks.A High 6.41 New Win32.Adware.BrowseFox.G Moderate 6.07 6 Win32.Adware.ShopperPro.AR Moderate 5.71 29 Win32.AdWare.AddLyrics.T Moderate 5.58 4 Win32.Adware.MarketScore Moderate 5.29 12 Win32.Adware.Wysotot Moderate 4.74 2 Win32.Adware.iBryte Moderate 4.33 1 Win32.Adware.Eorezo Moderate 3.74 3 Win32.Downloader.Obvod.K High 3.37 35 Win32.Adware.Megasearch Moderate 2.68 8 Win32.Downloader.WinOptimizer High 2.42 New Win32.Adware.OptimizerPro Moderate 2.4 22
  • 11. 11 Motive Security Labs Malware Report – H1 2015 Alcatel-Lucent NAME THREAT LEVEL % PREVIOUS Win32.Bot.ZeroAccess2 High 1.65 15 Win32.Adware.Bundlore Moderate 1.62 17 Win32.Trojan.Bunitu.B High 1.37 27 Win32.Adware.InstallMonetizer Moderate 1.36 19 Win32.Trackware.Binder High 1.28 9 Android.MobileSpyware.Kasandra High 1.16 New Win32.ScareWare.Crowti.A High 1.06 New In 2015 moderate-threat-level adware continued to dominate. Of the top 20 threats in the first half of 2015, 12 are adware. The activity of high-threat-level bots has declined somewhat, with the exception of bots associated with DDoS, which have remained the same. It could be that cybercriminals now find it more cost effective to rent cloud-based computing power for spam and phishing activity.   Top 20 high-threat-level infections Table 3 shows the top 20 high-threat-level malware infections that lead to identity theft, cybercrime or other online attacks. Table 3. Top 20 high-threat-level infections NAME % PREVIOUS Win32.Trojan.Poweliks.A 18.7 35 Win32.Downloader.Obvod.K 9.84 12 Win32.Downloader.WinOptimizer 7.05 New Win32.Bot.ZeroAccess2 4.82 3 Win32.Trojan.Bunitu.B 3.99 7 Android.MobileSpyware.Kasandra 3.38 New Win32.ScareWare.Crowti.A 3.1 New Win32.Trojan.Malagent 3.03 8 Win32.Downloader.Banload.AUN 1.6 19 Win32.Trojan.Comine.M 1.33 36 Win32.Trojan.Pesut.A 1.21 44 Win32.Trojan.Usinec.A 1.14 37 Win32.Trojan.Googost.A 1.13 84 Win32.Trojan.Zeprox.A 1.1 55 Win32.Trojan.Clicker 1.1 20 Win32.Downloader.DownloadAssis 1.1 25 Indep.Bot.DNSAmplification 1.07 1 Win32.Trojan.CI.A 0.96 5 Win32.Downloader.Ramnit.J 0.94 47 Win32.Worm.Koobface.gen.B 0.84 10 The top 20 list contains the usual suspects from previous reports with bots, downloaders, banking Trojans, and password stealers.  
  • 12. 12 Motive Security Labs Malware Report – H1 2015 Alcatel-Lucent Top 25 most prolific threats Figure 12 shows the top 20 most prolific malware infections found on the Internet. The order is based on the number of distinct samples we have captured from the Internet at large. Finding a large number of samples indicates that the malware distribution is extensive and that the malware author is making a serious attempt to evade detection by antivirus products. Figure 12. Most prolific malware Most prolific malware Worm:Win32/Allaple.A Worm.Win32/Soltern.L Virus:Win32/Elkern.B Worm:Win32/Vobfus.EK Trojan:Win32/Beaugrit.gen!AAA Virus:Win32/Nabucur.D SoftwareBundler:Win32/InstalleRex Virus:Win32/Ramnit.A Virus:Win32/Virut.BN Virus:Win32/Sality.AT Virus:Win32/Virut.BR TrojanDownloader:Win32/Upatre.AA Virus:Win32/Parite.B Virus:Win32/Mikcer.B Virus:Win32/Expiro.CD TrojanSpy:Win32/Lydra.gen!A Virus:Win32/Virut.EPO TrojanDownloader:Win32/Upatre TrojanDownloader:Win32/Tugspay.A Virus:Win32/Virut.BO 0% 1% 2% 3% 4% 5% 6% 8% 9%7%   2015 so far Stagefright Stagefright was the major story at the end of Q2 2015. It is a series of vulnerabilities in Android’s media display software that provides attackers with complete control of the phone by simply sending it an MMS message with a specially crafted media attachment. When the message is received, Android automatically tries to open the attachment and the device is infected without any interaction from the user. So far there is no known malware in the wild that exploits this vulnerability, but a proof-of-concept exploit that provided remote root access to the phone was demonstrated at the Black Hat USA conference in August 2015. Google has pointed out that the Android’s built in “Address Space Layout Randomization” feature will make it difficult for attackers to exploit this vulnerability. I guess we’ll find out. What’s so remarkable about the Stagefright vulnerability is that the sheer number of potentially affected mobile devices is estimated to be close to 1 billion. While the scale of the exposure is unprecedented in the mobile device landscape, the really scary part is that the attacker can take complete control of the phone by simply sending it an MMS message, bypassing any on-device security solutions. Patches are available, but the real question is how to get them deployed. One positive aspect of Stagefright is that it has forced Google, Android phone manufacturers and the mobile carriers to take a serious look at how to improve the ability to get security patches deployed in the field. Updates are now available for Google’s Nexus line and Samsung, HTC, LG, Sony and Motorola all have updates available. One interim solution is to disable automatic processing of multimedia attachments.
  • 13. 13 Motive Security Labs Malware Report – H1 2015 Alcatel-Lucent Stagefright is not the only vulnerability discovered in 2015. Security researchers have been fairly busy so far this year. Researchers at MWR discovered a flaw in the Google Admin app that could be used by a malicious app to “break into the app’s sandbox environment and read its files.” Trend Micro reported another vulnerability in the media display software that can be used in a similar manner to Stagefright. IBM researchers also demonstrated an Android deserialization flaw that allows code execution in the system server process. Despite the reduction in Android infections in the first half of 2015, vulnerabilities like Stagefright remind us that the potential for a major infection event is always a possibility. We have also noticed that smartphone malware is becoming more sophisticated in both its C&C and its persistence on the device. For the first time we recently witnessed Android malware that was able to survive a factory reset. Encrypted command and control Motive Security Guardian detects malware infections by looking for known C&C exchanges in the network traffic. So how can we detect malware if the C&C traffic is encrypted? This is an excellent question that has been made more relevant by the fact that over the past year the use of Secure Sockets Layer (SSL) encryption for web applications has increased significantly. The assumption is that as more regular apps move to SSL, so will the malware C&C. So we reviewed some stats from our malware analysis lab. Only 2.6% of active malware families used encrypted C&C protocols and most of those could be detected by inspecting the traffic. Often encrypted C&C traffic can be identified by characteristics in the initial handshake between the bot and its controller, key exchanges, file downloads, exploit attempts and scanning activity. This can include specific packet content, port numbers, packet lengths and packet sequences. In some cases it is very easy to identify the bot. For example: • Malware that uses its own home-grown cryptography is usually the easiest to detect due to its use of fixed keys that result in fixed binary content, use of specific ports, or use of an easily recognizable key exchange sequence. • Malware that spreads by means of a network vulnerability can be detected from the use of that vulnerability, which is something that can’t be encrypted. • Malware that generates other network activity, such as DDoS, spam or scanning can be identified by that activity even although the C&C is secure. Malware that uses standard cryptography such as SSL is more difficult, but in these cases we can often use the certificate exchange, which is done in clear text, to identify the malware. In cases where this is not possible, we can often accurately identify the malware using IP or Domain Name System (DNS) blacklists. In the first half of this year we have analyzed network traffic from 332 unique malware families. We were unable to develop detection rules for only four of those due to encryption. Scanning, DDoS and NAT A lot of scanning is taking place out there on the Internet. Most of it is due to cybercriminals (or security researchers) looking for vulnerable hosts. In mobile networks this can have an unexpected side effect. When a mobile device establishes a data connection, it is assigned an IP address and provided with connectivity to the Internet. Although the Internet connection will remain logically established, the actual radio connection to the local cell is typically timed out after 10 to 20 seconds of inactivity and the device is moved to an idle state. If someone on the Internet sends an IP packet to an idle device, the radio connection must be re-established via a mechanism called paging in order to deliver the packet. This paging process uses significant radio resources. Since many devices will typically be in the idle state, scanning through an IP subnet can cause a “paging storm” and overload limited radio resources.
  • 14. 14 Motive Security Labs Malware Report – H1 2015 Alcatel-Lucent We commonly see scans looking for hosts that will participate (unwillingly) in DDoS amplification attacks. We have seen this for both DNS and Network Time Protocol (NTP) amplification attacks. For example, it is quite common in mobile networks to have mobile Wi-Fi hotspots that act as recursive DNS servers and can be leveraged to participate in a DNS DDoS attack. Here the mobile operator has double jeopardy. The scanning causes “paging storms” and the actual DDoS attack puts a huge stress on the mobile carrier’s DNS infrastructure. Both the scanning and DDoS problems are not an issue if network address translation (NAT) is used. Since many mobile carriers use NAT, they are not currently vulnerable to these problems. However if they migrate to Internet-accessible IPv6 addresses, their mobile devices will become visible to the Internet and they will have to worry about scanning and DDoS activities. New adware Adware has definitely been on the increase in 2015 with the ads themselves becoming more sinister. One of interest is called BetterSurf. This is moderate-threat-level Windows adware. This malware arrives with software bundlers that offer free applications or games. When installed, it adds a plugin to the Internet Explorer, Firefox and Chrome browsers that injects popup ads into web pages. So far it looks like regular, run-of-the-mill adware; however the ads themselves are dangerous. Many are phishing attempts that redirect the browser to web sites that attempt to install additional unwanted applications on the infected device. Some of the ads are full screen popups that are designed to look like instructions from Microsoft asking you to download and install the latest security patch. One popup looked like a “blue screen error” with instructions to call a 1-800 number for technical support. When you call the numbers you are taken to a “help desk” that immediately asks for remote access to your computer and then charges exorbitant rates for bogus technical support for non-existent problems. The screen shot is shown in Figure 13. Figure 13. Example of BetterSurf adware infection
  • 15. 15 Motive Security Labs Malware Report – H1 2015 Alcatel-Lucent Mobile spyware In the mobile space the use of commercial spyphone apps has really taken off. These apps allow you to track the movements of the phone’s owner, their phone calls, text messages, e-mails and browsing habits. Often these are used for reasonable activities, like keeping track of your children, but there are also far more sinister uses for these types of applications. The modern smartphone also presents the perfect platform for cyber-espionage. First, it can be used simply as a tool that the owner (spy) can use to photograph, film, record audio, scan networks and send the results immediately through the air to a safe site for analysis. In the “bring your own device” (BYOD) context it makes a perfect target for advanced persistent threat (APT) attacks. A smartphone infected with professional mobile spyware allows the attacker to: • Monitor the victim’s location • Monitor phone calls and text message • Monitor e-mail and contacts • Access data on the phone • Take pictures and video • Record conversations • Scan and probe the local corporate network • Exfiltrate data through the air, bypassing corporate firewalls   Summary and conclusion On the fixed residential side, the overall malware infection rate rose to 15.7% in Q1 and then dropped to 13.1% in Q2. The biggest factor in these changes was moderate-threat-level adware. The infection rate for high-threat-level infections increased in 2015. Currently 6% of homes monitored by Motive Security Guardian are infected with a high-threat-level variety of malware such as a bots, rootkits or banking Trojans. On the mobile front, infection levels rose to 0.75% in Q2 2015 from 0.68% in December 2014. However the increase was due to infections on Windows/PCs and laptops connected to the mobile network via phones, dongles and mobile Wi-Fi hotspots. Android infection rates actually fell in 2015. Less than 1% of the infections are from other devices such as iPhones, BlackBerry smartphones and Windows Phones. The number of Android malware samples in our database more than doubled in the first half of 2015. Despite the reduction in Android infections in the first half of 2015, vulnerabilities like Stagefright remind us that the potential for a major infection event is always a possibility. We have also noticed that smartphone malware is becoming more sophisticated in both its C&C and its persistence on the device. For the first time we recently witnessed Android malware that was able to survive a factory reset. In terms of malware trends, on the mobile side we have seen an increase in the area of mobile spyware that tracks the victim’s calls, text messages and location. On the residential side, we have seen a significant increase in adware with 14 out of the top 20 being in that category.  
  • 16. 16 Motive Security Labs Malware Report – H1 2015 Alcatel-Lucent Terminology and definitions This section defines some of the terminology used in the report. TERM DEFINITION Advanced persistent threat (APT) A targeted cyber-attack launched against a company or government department by professional hackers using state-of-the-art tools, usually with information theft as the main motivation Infection vector The mechanism used to infect a computer or network device. For example, in computers running the Windows operating system, the most popular infection vector is a web-based exploit kit, whereas on the Android phone it is a Trojanized application. Bot An infected computer that is part of a botnet. A botnet is a network of infected computers that are controlled remotely via the Internet by cyber- criminals. Botnets are used for sending spam email, ad-click fraud, DDoS attacks, distributing additional malware, Bitcoin mining and a variety of other purposes. Rootkit A malware component that compromises the computer’s operating system software for the purposes of concealing the malware from antivirus and other detection technologies Trojan Computer program or application that looks fine on the surface, but actually contains malware hidden inside. From the term Trojan Horse. High/moderate threat level We split malware into high and moderate threat levels. High is any threat that does damage, steals personal information or steals money. A moderate threat is one that does no serious damage, but will be perceived by most as annoying and disruptive. Ad-click fraud Advertisers pay money, typically a few cents, when someone clicks on a web-based advertisement. Ad-click fraud occurs when someone uses software to fake these ad clicks and collects money from the advertisers for the fake clicks. Typically the ad-click software is packaged as malware and distributed through a botnet that is controlled by cyber-criminals who make money from the ad-click fraud. Bitcoin mining Bitcoins are a form of virtual cyber-currency that can be created through complex arithmetic calculations that take a lot of computing power to perform. The process of executing these calculations to generate new Bitcoins is referred to as Bitcoin mining. Cyber-criminals use large botnets to efficiently generate new Bitcoins.  
  • 17. www.alcatel-lucent.com Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks of Alcatel-Lucent. All other trademarks are the property of their respective owners. The information presented is subject to change without notice. Alcatel-Lucent assumes no responsibility for inaccuracies contained herein. Copyright © 2015 Alcatel-Lucent. All rights reserved. PR1508013821EN (September) About Motive Security Labs Motive Security Labs focuses on the behavior of malware communications to develop network detection rules that specifically and positively detect current threats. This approach enables the detection of malware in the service provider’s network and the signatures developed form the foundation of the Motive Security Guardian product suite. To accurately detect that a user is infected, our detection rule set looks for network behavior that provides unequivocal evidence of infection coming from the user’s computer. This includes: • Malware command and control (C&C) communications • Backdoor connections • Attempts to infect others (for example, exploits) • Excessive e-mail • Denial of Service (DoS) and hacking activity Four main activities support our signature development and verification process: 1. Monitor information sources from major security vendors and maintain a database of currently active threats 2. Collect malware samples (>10,000/day), classify and correlate them against the threat database 3. Execute samples matching the top threats in a sandbox environment and compare against our current signature set 4. Conduct a detailed analysis of the malware’s behavior and build new signature if a sample fails to trigger a signature As an active member of the security community, Motive Security Labs also shares this research by publishing a list of home network infections and the top emerging threats on the Internet — and this report.