Access for sale: a new class of worm

  • Authors:
  • Stuart E. Schechter;Michael D. Smith

  • Affiliations:
  • Harvard University, Cambridge, MA;Harvard University, Cambridge, MA

  • Venue:
  • Proceedings of the 2003 ACM workshop on Rapid malcode
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

The damage inflicted by viruses and worms has been limited by the risks that come with the more lucrative payloads. The problem facing authors of self-reproducing malware is that monetizing each intrusion requires the author to risk communication with the infected system. Malware authors looking to minimize risk and maximize loot have been better off carefully targeting trojan horses at a few systems at a time. However, this could change if malware authors could infect a large number of systems using a worm and sell access to infected systems to other black hats. We introduce a new type of worm that enables this division of labor, installing a back door on each infected system that opens only when presented a system-specific ticket generated by the worm's author. The risk to the worm's author is minimized because he need not communicate with the infected systems. This new class of attack could increase the incentives to write malware and create a market for such specialized skills. In addition to describing this new threat, we propose a number of approaches for defending against it.