Page 102 - StudyBook.pdf
P. 102

86     Chapter 2 • General Security Concepts: Attacks

                 As an example, the QAZ Trojan horse infected computers in 2000.This is the
             Trojan that was used to hack into Microsoft’s network and allowed the hackers to
             access source code.This particular Trojan spreads within a network of shared com-
             puter systems, infecting the Notepad.exe file. It opens port 7597 (part of a block of
             unassigned ports) on the network, allowing a hacker to gain access at a later time
             through the infected computer. If the user of an infected system opens Notepad,
             the virus is run. QAZ Trojan will look for individual systems that share a net-
             worked drive and then seek out the Windows folder and infect the Notepad.exe file
             on those systems.The first thing that QAZ Trojan does is to rename Notepad.exe to
             Note.com, and then the Trojan creates a virus-infected file Notepad.exe. QAZ Trojan
             then rewrites the system registry to load itself every time the computer is booted.
             This Trojan was particularly insidious, because most users had been told that text
             files were safe from viruses, so they didn’t hesitate running a program associated
             with Notepad.

             Rootkits

             A rootkit is type of malware that tries to conceal its presence from the OS and anti-
             virus programs in a computer. Its name comes from the UNIX world, where
             hackers try to keep root-level (superuser) access to a computer long after they infect
             it.A rootkit can modify the basic blocks of an OS like the kernel or communication
             drivers, or replace commonly used system programs with rootkit versions. Security
             researchers have even demonstrated rootkits that install as a virtual machine man-
             ager, and then loads the victim’s OS as a virtual machine. Such a rootkit would be
             virtually impossible to detect. Rootkits can make it easy for hackers to install remote
             control programs or software that can cause significant damage.
                 The most famous and widespread rootkit infestation happened in 2005, when
             Sony BMG Music Entertainment used a rootkit to implement copy protection in
             some of its music CDs. Even worse, other attackers could use the rootkit’s stealth
             features to hide their own viruses on infected computers.The rootkit was very hard
             to uninstall, and according to some researchers, it could have infected over 500,000
             computers. Eventually, major anti-virus vendors included removal tools for the
             rootkit, but it was a public relations nightmare for Sony.An earlier rootkit is
             t0rnkit, which can be used to infect and take control over Linux machines.

             Back Doors

             A back door is essentially any program or deliberate configuration designed to
             allow for remote access to a system.Trojans, rootkits, and even legitimate programs




          www.syngress.com
   97   98   99   100   101   102   103   104   105   106   107