What is out there?

2006-01-01

Gabor Szappanos

VirusBuster, Hungary
Editor: Helen Martin

Abstract

Gabor Szappanos asks whether we have a realistic picture of what threats are bothering end users.


Table of contents

Introduction

Do we know what is spreading out there? We, the anti-virus industry, at least pretend that we do. How about our users? From recent experience, it seems that neither we nor they have a truly accurate picture. First, consider the press. Their attention turns only to the latest and most destructive email virus as if it was the greatest threat of them all. Are they to blame? Not really. We are feeding them with data. So, let's turn our attention to ourselves.

The Virus Bulletin prevalence table for October 2005 reports the following:

Win32/Mytob53.21%
Win32/Netsky36.16%
Win32/Mydoom5.06%
Win32/Bagle1.86%
Win32/Zafi0.74%
Win32/Sdbot0.69%
Win32/Funlove0.38%
Others1.9%

Politically, it might not be the wisest idea to point the finger of blame at Virus Bulletin in an article published here. So, are anti-virus vendors any better? One of VirusBuster's recent prevalence lists presented this top ten:

So, it seems that everyone agrees that email worms rule the known malware universe, with a few Trojan disturbances. In fact, nothing could be further from the truth. Support departments report that the majority of their support calls come from customers experiencing problems caused by Trojans, adware and spyware.

This should be reflected in the statistics, so why isn't it? The problem lies in the methodology we use to collect statistics. The easiest way to do it is to collect information from email gateway logs. But that information relates to captured infected emails. One infected PC may send out zillions of infected emails. While the total number of captures is related to the number of infected systems, it is not a one-to-one ratio.

We collect statistics from other sources, as well. This includes user reports and statistics gathered from other types of malware trap. How are these data merged? A user reporting a malware infection represents one infected computer. Meanwhile, 100 captures of Zafi.B may also represent a single infected PC. How do we compare apples with oranges?

Obviously, some form of normalization is needed. The only remaining detail is the question of the normalization factors. Fortunately, in certain cases we have been able to measure it. Apart from spreading in email Zafi.B also performs a DDoS attack on the VirusBuster web server (www.virusbuster.hu). This gave us the opportunity to estimate the number of computers infected with Zafi.B.

In a one-hour period on 14 June 2004 we experienced attacks from 105,926 different IP addresses. During the same period MessageLabs reported 169,211 infected messages (from 6,459 different hosts). This means that at their measurement point one infected host generated 26.19 messages per day, or 786 infected messages per month. The raw capture statistics of our email traps for September 2005 are as follows:

I-Worm.Netsky.Q1523,074
I-Worm.Zafi.B501,265
I-Worm.Zafi.D481,479
I-Worm.Mydoom.R119,185
Trojan.DL.Bagle.DA90,657
I-Worm.MyTob.H68,801
I-Worm.Netsky.D365,640
I-Worm.Mytob.J63,074
I-Worm.NetSky.Z53,729
I-Worm.Yaha.E45,652
I-Worm.Netsky.P27,017
I-Worm.Mytob.FV23,476
I-Worm.Mytob.DR19,673
I-Worm.Netsky.R14,991
I-Worm.Mytob.FA13,060
I-Worm.Netsky.B12,325
I-Worm.Mytob.FC11,312
I-Worm.Mytob.DU10,647
I-Worm.Mytob.IY10,001
I-Worm.Klez.H9,773

At this time, our web server logs indicated that there were slightly more than 10,000 Zafi.B infected computers. This means that at this measurement point we have 50 messages per infected host per month. Unfortunately, the normalization factors differ not only with the particular virus variants, but they also vary between different measurement points. Rather hopeless indeed.

Regrettably, we do not have similar data for other email worms. So there is no general solution for obtaining the number of infected PCs from the number of infected messages captured. One could try to extract the original sender from the emails and count all the messages coming from the same PC as only one infection, but that information is not always available to those who gather the statistics.

Email is not the only media that is used for spreading viruses. Network worms spread via open (or weakly protected) network shares and/or using Windows vulnerabilities. These worms can be captured using SMB traps, or protocol (or rather vulnerability) emulator traps. Protocol emulator traps exist for Windows operating systems (WormRadar, iDefense Multipot, HBPot), as well as for x86 Linux operating systems (mwcollect, nepenthes). The success of these traps lies in the extent to which they support the shell codes used by different worms, therefore they require periodical updating.

Malware collected with mwcollect in July and August 2005 shows the following distribution:

Worm.RBot.BTW8.33%
Worm.Rbot.BYE8.05%
Trojan.DR.Juntador.N7.26%
Worm.Codbot.Y5.72%
Worm.RBot.BWY4.84%
Worm.RBot.BZQ4.56%
Worm.RBot.BXS4.51%
Worm.RBot.BWL3.96%
Worm.RBot.BYD3.58%
Worm.RBot.BZV2.93%
Trojan.DR.Juntador.M2.79%
Worm.RBot.BXR2.70%
Worm.RBot.CCC2.23%
Worm.RBot.BZM2.23%
Trojan.DR.Juntador.D2.14%
Other34.16%

It is important to note the appearance of the Juntador droppers, which are self-spreading packages with a custom dropper, usually consisting of an RBot variant (responsible for spreading to other hosts) and an adware installer. Clearly the intention is to use the botnets to install adware packages.

With reasonable normalization of data, and merging the statistics coming from our different traps and user reports, our latest monthly prevalence list looks like this:

Which is starting to look more realistic.

Is there any hope of getting some real-world data? Yes, we can collect statistics from infected user PCs. There are different approaches for this.

One is to use native worm traps. These are real computers with default OS installations without security patches, connected to the Internet. The great advantage of this approach is that we can collect the samples grabbed by the downloaders as well. The dropped files are also available on these traps. This means that all samples related to an incident are present. The statistics collected from these traps give the best estimate of what the user population is infected with.

Statistics collected in a specific native trap (operated by Arcabit) are listed in the table shown below. The table shows that the user population is targeted with a wide range of different malware. The percentage of adware is surprisingly high, indicating that adware is very much an underrated problem.

2005.08 2005.09 
Trojan.Poebot.B8.73%Trojan.Poebot.B16.09%
Trojan.Downloader.Dyfuca.Ei3.87%Trojan.Poebot.D8.91%
Trojan.Lowzones.Hp.S023.85%Trojan.Small.Hp7.12%
Trojan.Downloader.Agent.Tv3.74%Adware.Elitetoolbar.A165.28%
Adware.180search.A313.26%Adware.Elitetoolbar.A04.Etb.B25.15%
Trojan.Downloader.Istbar.Gen3.18%Trojan.Rbot.Gen4.75%
Trojan.Dubar3.05%Trojan.Small.Hp.A164.16%
Trojan.Downloader.Agent.Fx2.89%Adware.Mediaticket.A164.16%
Adware.Mediagtw.A52.65%Trojan.Small.Hp.A012.18%
Trojan.Roundstid.Hp2.55%Trojan.Hwclk1.65%
Trojan.Downloader.Small.Asf2.55%Adware.Betterinternet.A11.65%
Trojan.Nail.B52.28%Trojan.Nanspy.E1.58%
Adware.Mediagtw.A12.20%Trojan.Rbot.J181.45%
Adware.Mediaticket.S052.07%Worm.Gaobot.Gen1.32%
Trojan.Downloader.Small.Gr2.04%Trojan.Rbot1.19%
Trojan.Poebot.D1.96%Adware.Elitetoolbar.A01.A21.12%
Trojan.Downloader.Vb.Jl1.96%Adware.Elitetoolbar.A01.A11.12%
Adware.Elitetoolbar.S021.96%Adware.Clientax.A161.12%
Trojan.Rbot.Hp1.94%Trojan.Rbot.Hp.A021.06%
Adware.Bargainbuddy1.80%Adware.Toolbar.Elitebar.Am1.06%
Other:41.44%Other:27.90%

Table 1. Statistics collected in a specific naming trap (operated by Arcabit).

While this is a very good approach to observing real-world threats, it is still limited in two respects. First, only malware specific to the installed OS version is collected, and secondly, this method does not take into account the active participation of users (such as web browsing, online chat, P2P file exchange, etc.).

It would be useful to carry out sampling on the users' computers. While this is performed by the support department of every AV company, the sample numbers are not high enough to draw any statistically significant conclusions.

At this year's AVAR conference researchers from Eset presented statistics collected using their ThreatSense.Net technology. They collect samples that are detected heuristically by their scanner. Obviously, this method is a very biased sampling – the question is can we draw (mostly) unbiased conclusions from it? If we ask the right questions, the answer is yes. According to the latest AV-Comparatives.Org, the NOD32 scanner is not particularly biased towards Trojans or worms. If we ask only if Trojans or worms are more prevalent on infected computers, then despite the biased sampling the result will be usable.

Win32/TrojanDownloader.Swizzor43.68%
Win32/Dialer.HZ7.66%
Win32/Dialer.Q7.00%
Win32/Dialer4.61%
Win32/TrojanDownloader.INService4.54%
Win32/Adware.BetterInternet3.31%
Worm.RBot1.65%
Win32/TrojanDownloader.Dluca1.38%
Win32/Dialer.NAD1.04%
Win32/Adware.NdotNet0.87%

The variant names are not of scientific use, but the fact that the majority of the incidents belong to Trojans or adware is another indicator that email worms (or even network worms) are not the biggest threats users face nowadays.

This conclusion is also supported by the long-term tendencies of the different Virus Patrol projects presented at VB2005 by Dmitry Gryaznov: non-replicating malware has taken over from viruses and worms on the Usenet. This does not necessarily indicate the infected state of the user population, but it is a good indication of what is being pushed to them via these additional distribution channels. Clearly, malware distributors are shifting towards Trojans – which can earn them more money than simply playing with self-spreading worms.

Conclusion

While it is not possible to find a single source for virus prevalence statistics, useful information can be obtained when statistics are combined from several sources as detailed here. Using all these pieces we still may not be able to put a single prevalence chart on our websites, but we will get a much better understanding of what bothers our users.

All these pieces point to the same conclusion: email worms are no longer the number one threat – non-replicating malware outweigh them in importance. There are positive tendencies though. The WildList has started to include bots, which brings the picture a little closer to reality. Hopefully, vendors will find a way to normalize their statistics to eliminate the over-representation of email worms. Then the press may actually get the real picture and start asking us about the latest terrible destructive adware program – but that will be a different problem.

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest articles:

Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

Aditya Sood & Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited to compromise the C&C panel in order to gather threat intelligence, and present a model of mobile AppInjects.

Cryptojacking on the fly: TeamTNT using NVIDIA drivers to mine cryptocurrency

TeamTNT is known for attacking insecure and vulnerable Kubernetes deployments in order to infiltrate organizations’ dedicated environments and transform them into attack launchpads. In this article Aditya Sood presents a new module introduced by…

Collector-stealer: a Russian origin credential and information extractor

Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In this article, researchers Aditya K Sood and Rohit Chaturvedi present a 360…

Fighting Fire with Fire

In 1989, Joe Wells encountered his first virus: Jerusalem. He disassembled the virus, and from that moment onward, was intrigued by the properties of these small pieces of self-replicating code. Joe Wells was an expert on computer viruses, was partly…

Run your malicious VBA macros anywhere!

Kurt Natvig wanted to understand whether it’s possible to recompile VBA macros to another language, which could then easily be ‘run’ on any gateway, thus revealing a sample’s true nature in a safe manner. In this article he explains how he recompiled…


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.