New Malware Family Highlight: Kuluoz


According to Palo Alto Networks ''Threat Landscape Review'', one particular malware family, Kuluoz (also known as Asprox), stands out as prevalent in the sample data. This single family accounts for 4.9 million malicious sessions recorded during the month of October 2014. It impacted 1,933 companies across 10 industries reviewed. Firewall WildFire identified a total of 268,084 unique samples determined to be Kuluoz, 82.4% of which had not been collected by VirusTotal at the time of analysis.

The first version of Asprox appeared in 2007, and it was given its name by researchers who identified that it frequently tried to infect ASP (Active Server Pages) based websites. At the time the malware used command and control infrastructure hosted by the now-defunct McColo Corp ISP. By 2013, the primary components of Asprox had been replaced by a new malware family dubbed Kuluoz. While Asprox was an “all-in-one” malware, Kuluoz uses a modular design, which allows it to evade detection and gives attackers more flexibility. In May a new campaign was identified distributing Kuluoz that was generating over 30,000 new WildFire sessions per hour. Since that time Kuluoz has persisted to be highly prevalent across the entire world and the October data shows this pattern continues.

The constantly evolving Kuluoz family is currently known for the following:

High distribution volume through geo location-associated spam e-mail templates
Use of e-mail attachments and Web links that masquerade as document or
media files
Modular design, promoting extensibility
Distinct roles for nodes in botnet including:
  • Spam generator for continued botnet propagation
  • Downloader of additional malware
  • Distributor of generalized commercial spam
Platform-specific malware delivery based on user agent detection

Much of Kuluoz’s success is owed to its self-propagation feature and its selection of e-mail themes geared towards social engineering of targets. After Kuluoz infects a system, it immediately begins downloading additional components, which can take the following actions:

Retrieve the latest spam templates and e-mail address list from the attacker and
e-mail copies of itself to those addresses using the supplied template.
Download and install additional malware that can earn money for the attacker
(i.e. AdWare, RansomWare and Banking Trojans).
Attempt to infect websites through known vulnerabilities.
Steal e-mail, FTP and Web browser credentials from the infected system.

While the total number of Kuluoz sessions in October 2014 is very high, viewing this data on a daily basis revealed a distinct pattern. Every weekend the total number of Kuluoz sessions drops close to zero, indicating that the systems responsible for sending much of the spam have stopped doing so, either on instructions from the attacker or by shutting down completely.

The Kuluoz attackers stay ahead of antivirus detection by regularly regenerating the malware so that it frequently appears brand new, despite containing the same functionality.

Defending Against Kuluoz

It is important that information security professionals and defenders are aware of the threats specific to their company and industry and stay up to date on the latest threat intelligence focused on their area. The following recommendations will ensure defenders are best poised for success:

User awareness:
Awareness and training for users will reduce the impact of any type of e-mail phishing. A number of Kuluoz variants require extra steps to be performed by a user (e.g., opening of a ZIP archive and then running a malicious binary). Encourage users to be wary of unexpected or unsolicited e-mails, especially those that employ any sort of pressure tactic and/or leverage the themes cited above.

Protocol monitoring and control:
Visibility into the protocols used by malware for delivery of Command and Control (HTTP, SMTP, IMAP, FTP) with structured and clearly defined response actions (most of which can and should be automated) to prevent or reduce associated impacts.

Automated analysis:
Automation of static and dynamic analysis for unknown samples addresses the natural gap between the development of a variant for a threat and its coverage through signature-based technology. Antivirus and other security control-related signatures fall short. Solutions such as Palo Alto Networks WildFire allow for enterprises to identify new and emerging threats that remain unknown to other security controls in the environment.

Intelligence fusion:
Leveraging actionable intelligence is a cornerstone of Computer Network Defense (CND) operations. Threats such as Kuluoz rely heavily on embedded initial Command and Control (C2) communications to fully realize the potential of its role(s) within the botnet. Up-to-date feeds on malicious domains, IPs, file signatures and hashes, as well as integration of intelligence gleaned from automated solutions in the environment, enable robust security solutions that empower network defenders.


Комментарии

Популярные сообщения из этого блога

Деловое и дружеское общение: в чем различие?

Убедитесь, что ключевые слова работают на пользу Вашему резюме

Обязательно ли изучать английский?