Titans' revenge: Detecting Zeus via its own flaws

  • Authors:
  • Marco Riccardi;Roberto Di Pietro;Marta Palanques;Jorge Aguilí Vila

  • Affiliations:
  • Barcelona Digital Technology Centre, eSecurity Research Group, Roc Boronat 117, 5th Floor, 08018 Barcelona, Spain;Barcelona Digital Technology Centre, eSecurity Research Group, Roc Boronat 117, 5th Floor, 08018 Barcelona, Spain and Universití di Roma Tre, Maths Dept., L.go S. L. Murialdo 1, 00146 Roma, I ...;Barcelona Digital Technology Centre, eSecurity Research Group, Roc Boronat 117, 5th Floor, 08018 Barcelona, Spain;CaixaBank, CSIRT, Av. Diagonal, 621, 08028 Barcelona, Spain

  • Venue:
  • Computer Networks: The International Journal of Computer and Telecommunications Networking
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Malware is one of the main threats to the Internet security in general, and to commercial transactions in particular. However, given the high level of sophistication reached by malware (e.g. usage of encrypted payload and obfuscation techniques), malware detection tools and techniques still call for effective and efficient solutions. In this paper, we address a specific, dreadful, and widely diffused financial malware: Zeus. The contributions of this paper are manifold: first, we propose a technique to break the encrypted malware communications, extracting the keystream used to encrypt such communications; second, we provide a generalization of the proposed keystream extraction technique. Further, we propose Cronus, an IDS that specifically targets Zeus malware. The implementation of Cronus has been experimentally tested on a production network, and its high quality performance and effectiveness are discussed. Finally, we highlight some principles underlying malware-and Zeus in particular-that could pave the way for further investigation in this field.