SlideShare une entreprise Scribd logo
1  sur  33
Detecting Unknown Malware using Network
Behavior Correlation
Correlation Technology

• A network behavior correlation technology used to detect known and unknown
malware.


• Currently implemented in an out-of-band network sensor appliance called the “Threat
Discovery Appliance” which is bundled with a series of different service packages
known collectively as “Threat Management Services”.


• Adoption of this technology in other Trend Micro products is ongoing.




                                             Copyright 2007 - Trend Micro Inc.
Paramount Q1 2008 - 2
Correlation Technology




                         Copyright 2007 - Trend Micro Inc.
Paramount Q1 2008 - 3
How Do We Analyze Network Traffic?




                                      Assemble packets into one stream

                                 Extract embedded files & send to scanning engines


                             Extract embedded URLs and perform WRS check

                         Scan the traffic stream for exploits and network worms


                        Perform single-session correlation on the traffic stream




                             Copyright 2007 - Trend Micro Inc.
Paramount Q1 2008 - 4
Protocol Support

              We currently support over 40 protocols using port agnostic protocol detection to accurately
              identify protocols regardless of the port used




                         Network Services                                                   Web Traffic
                                DNS                                                               HTTP
                              DCE-RPC                                                             SSH
                               Telnet                                                              AIM
                                RDP                                                                IRC
                                VNC
                                                   Supported
                                                   Protocols
                            File Transfer                                           Email and Messaging
                                FTP                                                             SMTP
                                TFTP                                                            POP3
                                SMB                                                             Gmail
                                                                                              Yahoo Mail
                                                                                               Hotmail




                                                              Copyright 2007 - Trend Micro Inc.
Paramount Q1 2008 - 5
What We Do
• The Threat Analysis Group is a department of the Network Content Security Group and is
responsible for the operations that utilize our correlation technology.


• Over the years we have developed and improved upon several dedicated malware
replication systems, also known as “sandboxes”. These systems are responsible for executing
malware and logging all of their activities.


• Early on, we processed current malware along with a few years backlog of older samples.
Analysis of this network traffic provided us with the data used to create a majority of our early
ruleset. These rules are generic in nature and based upon the common behavior of different
malware types.


• Due to the volatile nature of malware, we determined that older samples were not worth our
time any longer and now focus solely on brand new malware, utilizing various feeds of
malware samples. Nowadays, the majority of our new rules focus on specific malware families.




                                                Copyright 2007 - Trend Micro Inc.
 Paramount Q1 2008 - 6
What characteristics are we looking for


 Downloaders

 Packed / Compressed Executables

 Names of downloaded files
 belong to system files
 svchost.exe winlogon.exe lsass.exe



 File extension do not match
 expected file type
 JPG extension but file is actually EXE

 Unique / Unknown
 HTTP user-agents




                 7                        Copyright 2007 - Trend Micro Inc.
What characteristics are we looking for


 Spyware/Grayware

 Unique / Unknown
 HTTP user-agents

 Names of downloaded
 files belong to trademarked/copyrighted
 spyware applications
 Gain, Media Motor, Hotbar, SpySherrif




                8                        Copyright 2007 - Trend Micro Inc.
What characteristics are we looking for


 Backdoors

 Rogue services
 Un-authorized SMTP, HTTP servers
 Opened ports


 Loopback commands shells
 Loopback command shells
 DOS Shell visible at the network traffic


 Non standard service ports
 HTTP Traffic on non HTTP port




                  9                         Copyright 2007 - Trend Micro Inc.
What characteristics are we looking for


 Mass mailers
 Attachments with long filenames
  (space padded)

 File extensions do not match
 expected file type

 File inside archive attachment
 contains double extension

 Packed files

 Suspicious URLs in message body




           10                      Copyright 2007 - Trend Micro Inc.
What characteristics are we looking for


 Bots

 IRC traffic
 Bad NICKs, channelnames, bot commands



 Non-standard service ports
 Typically HTTP or IRC
 Ex. IRC traffic on port 8080 (HTTP proxy)




 File transfers to
 blacklisted domains




                 11                          Copyright 2007 - Trend Micro Inc.
Scenario


                                                                       Corporate Network




                    Rule 8 - Packed executable
                     file dropped on a network
                               share

                                                                           C$


     WORM_AGOBOT,
                                                                         Admin$
      PE_LOOKED




      12                           Copyright 2007 - Trend Micro Inc.
Scenario


             External Mail Server


                                    Internet




                                                                              Corporate Network




      Internal Mail Server
                                                                           WORM_NETSKY,
                                                                           WORM_MYTOB,
                                                                           WORM_AGOBOT




        13                             Copyright 2007 - Trend Micro Inc.
Scenario


           IRC Server


                                           Internet




                                                                                     Corporate Network
                                                     Rule 26 - IRC session
                        Rule 7 - IRC BOT            established with a known
                        commands found                      bad C&C




                                                                              WORM_IRCBOT.EN




      14                                      Copyright 2007 - Trend Micro Inc.
Scenario


            Malicious
             Website



                                           Internet




                                                                                    Corporate Network
                Rule 88 - HTTP requests
             attempted to download known
                Malware-
                Malware-used filenames




           TROJ_DLOADER,
            TROJ_AGENT




      15                                        Copyright 2007 - Trend Micro Inc.
Rule Descriptions
Monitored client is receiving email with phishing link (External)
Rule ID: 72
Scenario: SMTP server receives phishing emails
Email sender domain is in list of commonly phished domains and email contains
   IP address
The email will trigger rule ID 72, direction is external




                 Sender: customerservice@ebay.com
                 URL: http://70.88.210.45:81/ebay.com/index.html




                                  Monitored Network
                                                Copyright 2007 - Trend Micro Inc.
Rule Descriptions
Monitored client is sending out phishing email (Internal)
Rule ID: 72
Scenario: Infected host is sending phishing emails
Email sender domain is in list of commonly phished domains and email contains
   IP address
The email will trigger rule ID 72, direction is internal




                 Sender: customerservice@ebay.com
                 URL: http://70.88.210.45:81/ebay.com/index.html




                                  Monitored Network
                                                Copyright 2007 - Trend Micro Inc.
Rule Descriptions
Hacking attempt
Rule ID: 38 & 15
Fields of interest: username (not SMB)

•   This rule is triggered when a certain threshold of failed login attempts is
    reached. Below are the details of these thresholds per protocol.
•   For the SMB protocol, the possible attacker is the destination IP address.

                                      Rule ID 38                    Rule ID 15
                    Protocol      (threshold trigger)           (threshold trigger)
                       FTP               =4x                           =20x
                      POP3               =4x                           =20x
                  *Cisco Telnet          =3x                           =6x
                     **SMB               =12x                          =18x




                                                   Copyright 2007 - Trend Micro Inc.
Rule Descriptions
Hacking attempt
Rule ID: 38 & 15
Scenario: Infected Host brute force attacks other hosts within monitored network
There are a high number of failed login attempts on each attacked host
The attacks will trigger rule IDs 38 & 15, direction is internal for both




                             15 failed SMB logins




                                   21 failed SMB logins

                               Monitored Network
                                             Copyright 2007 - Trend Micro Inc.
Rule Descriptions
Monitored client is downloading a suspicious file.
Rule ID: 66
Scenario: Host downloads an executable file from web site
Web server reports content type as image/gif
This event will trigger rule ID 66, direction is external



                          HTTP Response reports
                         content type as: image/gif
                        But file is actually executable




                                 Monitored Network

                                                    Copyright 2007 - Trend Micro Inc.
Rule Descriptions
Monitored client is using a protocol on a non-standard port.
Rule ID: 33
Fields of interest: nickname, channelname
• The Internet Relay Chat (IRC) protocol typically uses a port in the
   range of 6665-6669. It is common for malicious IRC bots to use non-
   standard ports for their communication.
• This rule is triggered when an incoming or outgoing connection is
   detected using the IRC protocol on a port outside of this range. There
   is still a chance this is legitimate IRC traffic, but more likely it is a “bot”
   communication.




                                         Copyright 2007 - Trend Micro Inc.
Rule Descriptions
Monitored client has a malware that is communicating to an external
  party.
Rule ID: 33
Scenario: Infected host is communicating with an IRC C&C server using the IRC
   protocol, but using port 8080 instead of one of the standard ports in the range
   of 6665-6669.
This communication will trigger rule ID 33, direction is internal but could just as
   well be external if the response was captured instead.




                                                                      Port: 8080




                               Monitored Network
                                         Copyright 2007 - Trend Micro Inc.
Relevance Rules
How It Works (Zeus)




          Create a profile based Relevance Pattern! differences
             Group the packet captures of the same family
                     Create the on similarities and



                      23            Copyright 2007 - Trend Micro Inc.
Relevance Rules
Possible Relevance Rule for Hupigon

MD5: 5e3831266f8d68bc3713c35963a39f75

                                                   MD5: fbdc7c613fb23527929c18eb55fad5f0



        GET /*.txt HTTP/1.0rnUser-Agent: *rnHost: *rnPragma: no-cachern
MD5: 5e5c3e7cbc5ca7ecb48964494519068d
        Note: * wildcard for any




                                                   MD5: 46fd78ea03e2e8a6a07196f791fbb03c




                           24            Copyright 2007 - Trend Micro Inc.
Relevance Rules
•   With the power and flexibility of the scripting language we use to create rules,
    we are able to perform calculations and bitwise operations in order to validate
    custom malware protocols such as the one used by the Palevo
    (Mariposa/Butterfly) bot.




                                          Copyright 2007 - Trend Micro Inc.
Rule Correlation
• We are limited to correlating only the data within a single
  session, and in a single direction. For example, we can
  correlate the data within an HTTP request or an HTTP
  response, but not between the two.
• To address this issue, further correlation is performed in a
  separate process on these initial events generated.
• With this approach, any type of correlation is possible, and the
  results are quite powerful. Reports are delivered that can
  pinpoint confirmed malware infections so the customer does not
  have to analyze logs and make his own determinations.




                                    Copyright 2007 - Trend Micro Inc.
Our Threat Assessment Results
Despite having the most current industry standard security
technology…
 • 100% of companies had active malware
 • 72% of companies had one or more IRC bots
 • 56% of companies had information stealing malware
 • 50% of companies had 4 or more IRC bots
 • 80% of companies had malware web downloads
 • 42% of companies had a network worm (1)

• $6M = average total cost of a major data breach in 2008 (2)

 1 Based on 130 assessments worldwide at company’s averaging over 7,484
  employees and included representatives from the manufacturing, government,
  education, financial services, retail, and healthcare industries.
 2 Ponemon Institute

                                                                             27
                                                 Copyright 2007 - Trend Micro Inc.
Detection Samples
Virut propagating via brute force login attempts and open shares




                                            Copyright 2007 - Trend Micro Inc.
Detection Samples
IRC bot communicating with its C&C server




                                            Copyright 2007 - Trend Micro Inc.
Detection Samples
Bot sending spam




                    Copyright 2007 - Trend Micro Inc.
Detection Samples
Drive-by download and downloaders




                                    Copyright 2007 - Trend Micro Inc.
Detection Samples
Stuxnet!!




                    Copyright 2007 - Trend Micro Inc.
Thank You




Classification   11/8/2010   33   Copyright 2007 - Trend Micro Inc.

Contenu connexe

Tendances

SMB Traffic Analyzer @ SDC 2010
SMB Traffic Analyzer @ SDC 2010SMB Traffic Analyzer @ SDC 2010
SMB Traffic Analyzer @ SDC 2010hhetter
 
Gtb Product Technical Present
Gtb Product Technical PresentGtb Product Technical Present
Gtb Product Technical Presentgtbsalesindia
 
Cisco Certified Network Associate
Cisco Certified Network AssociateCisco Certified Network Associate
Cisco Certified Network AssociateSumit K Das
 
Comp tia n+_session_04
Comp tia n+_session_04Comp tia n+_session_04
Comp tia n+_session_04Niit Care
 
skype-peer to peer protocol
skype-peer to peer protocolskype-peer to peer protocol
skype-peer to peer protocolDhwaniHingorani
 
Emg White Paper Ver1.2
Emg White Paper Ver1.2Emg White Paper Ver1.2
Emg White Paper Ver1.2bradgaunt
 

Tendances (13)

Tom Krcha - Future of Flash
Tom Krcha - Future of FlashTom Krcha - Future of Flash
Tom Krcha - Future of Flash
 
10 fn s15
10 fn s1510 fn s15
10 fn s15
 
Week3 applications
Week3 applicationsWeek3 applications
Week3 applications
 
Skype
SkypeSkype
Skype
 
SMB Traffic Analyzer @ SDC 2010
SMB Traffic Analyzer @ SDC 2010SMB Traffic Analyzer @ SDC 2010
SMB Traffic Analyzer @ SDC 2010
 
SKYPE AS OVERLAY NETWORK
SKYPE AS OVERLAY NETWORKSKYPE AS OVERLAY NETWORK
SKYPE AS OVERLAY NETWORK
 
Gtb Product Technical Present
Gtb Product Technical PresentGtb Product Technical Present
Gtb Product Technical Present
 
Cisco Certified Network Associate
Cisco Certified Network AssociateCisco Certified Network Associate
Cisco Certified Network Associate
 
Big Data Smarter Networks
Big Data Smarter NetworksBig Data Smarter Networks
Big Data Smarter Networks
 
Comp tia n+_session_04
Comp tia n+_session_04Comp tia n+_session_04
Comp tia n+_session_04
 
skype-peer to peer protocol
skype-peer to peer protocolskype-peer to peer protocol
skype-peer to peer protocol
 
Emg White Paper Ver1.2
Emg White Paper Ver1.2Emg White Paper Ver1.2
Emg White Paper Ver1.2
 
Sip Paper
Sip PaperSip Paper
Sip Paper
 

En vedette (20)

Honey Potz - BSides SLC 2015
Honey Potz - BSides SLC 2015Honey Potz - BSides SLC 2015
Honey Potz - BSides SLC 2015
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Computing (cloude & grid) & honey pots
Computing (cloude & grid) & honey potsComputing (cloude & grid) & honey pots
Computing (cloude & grid) & honey pots
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
 
Honeypots - November 8th Misec presentation
Honeypots - November 8th Misec presentationHoneypots - November 8th Misec presentation
Honeypots - November 8th Misec presentation
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
 
Honeypots.ppt1800363876
Honeypots.ppt1800363876Honeypots.ppt1800363876
Honeypots.ppt1800363876
 
Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)
 
Honeypot
HoneypotHoneypot
Honeypot
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...
 
Virtual honeypot
Virtual honeypotVirtual honeypot
Virtual honeypot
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honey pots
Honey potsHoney pots
Honey pots
 
honey pots introduction and its types
honey pots introduction and its typeshoney pots introduction and its types
honey pots introduction and its types
 
Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief Overview
 
All about Honeypots & Honeynets
All about Honeypots & HoneynetsAll about Honeypots & Honeynets
All about Honeypots & Honeynets
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honey pots
Honey potsHoney pots
Honey pots
 

Similaire à Comment détecter des virus inconnus en utilisant des « honey pots » et d’autres technologies (David Girard & Anthony Arrott)

OMG Data-Distribution Service (DDS) Tutorial - 2009
OMG Data-Distribution Service (DDS) Tutorial - 2009OMG Data-Distribution Service (DDS) Tutorial - 2009
OMG Data-Distribution Service (DDS) Tutorial - 2009Gerardo Pardo-Castellote
 
Www architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protectionWww architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protectionAustina Francis
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application LayerYaser Rahmati
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerVuz Dở Hơi
 
Chapter 10 : Application layer
Chapter 10 : Application layerChapter 10 : Application layer
Chapter 10 : Application layerteknetir
 
Materi Perkuliahan Jaringan Komputer Teknik Informatika Chapter 2
Materi Perkuliahan Jaringan Komputer Teknik Informatika Chapter 2Materi Perkuliahan Jaringan Komputer Teknik Informatika Chapter 2
Materi Perkuliahan Jaringan Komputer Teknik Informatika Chapter 2Raga Yustia
 
Jesse Burke RDPwned HackMiami7
Jesse Burke RDPwned HackMiami7Jesse Burke RDPwned HackMiami7
Jesse Burke RDPwned HackMiami7Jesse Burke
 
Lecture application layer
Lecture application layerLecture application layer
Lecture application layerHasam Panezai
 
Microsoft Direct Access (Part II)_John Delizo
Microsoft Direct Access (Part II)_John DelizoMicrosoft Direct Access (Part II)_John Delizo
Microsoft Direct Access (Part II)_John DelizoQuek Lilian
 
Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)Jeremiah Grossman
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache), webhostingguy
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache), webhostingguy
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Webwebhostingguy
 
Computer Network Case Study - bajju.pptx
Computer Network Case Study - bajju.pptxComputer Network Case Study - bajju.pptx
Computer Network Case Study - bajju.pptxShivamBajaj36
 
Cloud mz cto_roundtable
Cloud mz cto_roundtableCloud mz cto_roundtable
Cloud mz cto_roundtableeaiti
 

Similaire à Comment détecter des virus inconnus en utilisant des « honey pots » et d’autres technologies (David Girard & Anthony Arrott) (20)

OMG Data-Distribution Service (DDS) Tutorial - 2009
OMG Data-Distribution Service (DDS) Tutorial - 2009OMG Data-Distribution Service (DDS) Tutorial - 2009
OMG Data-Distribution Service (DDS) Tutorial - 2009
 
Www architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protectionWww architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protection
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application Layer
 
Chapter 10 : Application layer
Chapter 10 : Application layerChapter 10 : Application layer
Chapter 10 : Application layer
 
Chapter2 application
Chapter2 applicationChapter2 application
Chapter2 application
 
Materi Perkuliahan Jaringan Komputer Teknik Informatika Chapter 2
Materi Perkuliahan Jaringan Komputer Teknik Informatika Chapter 2Materi Perkuliahan Jaringan Komputer Teknik Informatika Chapter 2
Materi Perkuliahan Jaringan Komputer Teknik Informatika Chapter 2
 
Jesse Burke RDPwned HackMiami7
Jesse Burke RDPwned HackMiami7Jesse Burke RDPwned HackMiami7
Jesse Burke RDPwned HackMiami7
 
Lecture application layer
Lecture application layerLecture application layer
Lecture application layer
 
App layer
App layerApp layer
App layer
 
Microsoft Direct Access (Part II)_John Delizo
Microsoft Direct Access (Part II)_John DelizoMicrosoft Direct Access (Part II)_John Delizo
Microsoft Direct Access (Part II)_John Delizo
 
Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)
 
Ravi kumar
Ravi kumarRavi kumar
Ravi kumar
 
Chapter2[one.]
Chapter2[one.]Chapter2[one.]
Chapter2[one.]
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache),
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache),
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
 
Computer Network Case Study - bajju.pptx
Computer Network Case Study - bajju.pptxComputer Network Case Study - bajju.pptx
Computer Network Case Study - bajju.pptx
 
Cloud mz cto_roundtable
Cloud mz cto_roundtableCloud mz cto_roundtable
Cloud mz cto_roundtable
 
10 fn s15
10 fn s1510 fn s15
10 fn s15
 

Plus de Hackfest Communication

Du fuzzing dans les tests d'intrusions? (Éric Gingras)
Du fuzzing dans les tests d'intrusions? (Éric Gingras)Du fuzzing dans les tests d'intrusions? (Éric Gingras)
Du fuzzing dans les tests d'intrusions? (Éric Gingras)Hackfest Communication
 
Quelles lois sont applicables au hacker? Énormément moins que tu penses. (Bot...
Quelles lois sont applicables au hacker? Énormément moins que tu penses. (Bot...Quelles lois sont applicables au hacker? Énormément moins que tu penses. (Bot...
Quelles lois sont applicables au hacker? Énormément moins que tu penses. (Bot...Hackfest Communication
 
Conservation et la circulation des renseignements personnels des services de ...
Conservation et la circulation des renseignements personnels des services de ...Conservation et la circulation des renseignements personnels des services de ...
Conservation et la circulation des renseignements personnels des services de ...Hackfest Communication
 
Stack Smashing Protector (Paul Rascagneres)
Stack Smashing Protector (Paul Rascagneres)Stack Smashing Protector (Paul Rascagneres)
Stack Smashing Protector (Paul Rascagneres)Hackfest Communication
 
Mots de passe et mécanismes d’authentification (Thomas Pornin)
Mots de passe et mécanismes d’authentification (Thomas Pornin)Mots de passe et mécanismes d’authentification (Thomas Pornin)
Mots de passe et mécanismes d’authentification (Thomas Pornin)Hackfest Communication
 
Comment détecter des virus inconnus en utilisant des « Honeypots » et d’autre...
Comment détecter des virus inconnus en utilisant des « Honeypots » et d’autre...Comment détecter des virus inconnus en utilisant des « Honeypots » et d’autre...
Comment détecter des virus inconnus en utilisant des « Honeypots » et d’autre...Hackfest Communication
 
PostNet, une nouvelle ère de Botnet résilient (Julien Desfossez & David Goulet)
PostNet, une nouvelle ère de Botnet résilient (Julien Desfossez & David Goulet)PostNet, une nouvelle ère de Botnet résilient (Julien Desfossez & David Goulet)
PostNet, une nouvelle ère de Botnet résilient (Julien Desfossez & David Goulet)Hackfest Communication
 
La détection d'intrusions est-elle morte en 2003 ? (Éric Gingras)
La détection d'intrusions est-elle morte en 2003 ? (Éric Gingras)La détection d'intrusions est-elle morte en 2003 ? (Éric Gingras)
La détection d'intrusions est-elle morte en 2003 ? (Éric Gingras)Hackfest Communication
 
Responsabilisation des données confidentielles en entreprise (Étienne Dubreuil)
Responsabilisation des données confidentielles en entreprise (Étienne Dubreuil)Responsabilisation des données confidentielles en entreprise (Étienne Dubreuil)
Responsabilisation des données confidentielles en entreprise (Étienne Dubreuil)Hackfest Communication
 
Le GPU à la rescousse du CPU (Charles Demers-Tremblay)
Le GPU à la rescousse du CPU (Charles Demers-Tremblay)Le GPU à la rescousse du CPU (Charles Demers-Tremblay)
Le GPU à la rescousse du CPU (Charles Demers-Tremblay)Hackfest Communication
 
802.1X filaire, un monde idéal illusoire? (Olivier Bilodeau)
802.1X filaire, un monde idéal illusoire? (Olivier Bilodeau)802.1X filaire, un monde idéal illusoire? (Olivier Bilodeau)
802.1X filaire, un monde idéal illusoire? (Olivier Bilodeau)Hackfest Communication
 

Plus de Hackfest Communication (14)

Hackerspace jan-2013
Hackerspace jan-2013Hackerspace jan-2013
Hackerspace jan-2013
 
Hackfest @ WAQ2011
Hackfest @ WAQ2011Hackfest @ WAQ2011
Hackfest @ WAQ2011
 
Du fuzzing dans les tests d'intrusions? (Éric Gingras)
Du fuzzing dans les tests d'intrusions? (Éric Gingras)Du fuzzing dans les tests d'intrusions? (Éric Gingras)
Du fuzzing dans les tests d'intrusions? (Éric Gingras)
 
Quelles lois sont applicables au hacker? Énormément moins que tu penses. (Bot...
Quelles lois sont applicables au hacker? Énormément moins que tu penses. (Bot...Quelles lois sont applicables au hacker? Énormément moins que tu penses. (Bot...
Quelles lois sont applicables au hacker? Énormément moins que tu penses. (Bot...
 
Broken by design (Danny Fullerton)
Broken by design (Danny Fullerton)Broken by design (Danny Fullerton)
Broken by design (Danny Fullerton)
 
Conservation et la circulation des renseignements personnels des services de ...
Conservation et la circulation des renseignements personnels des services de ...Conservation et la circulation des renseignements personnels des services de ...
Conservation et la circulation des renseignements personnels des services de ...
 
Stack Smashing Protector (Paul Rascagneres)
Stack Smashing Protector (Paul Rascagneres)Stack Smashing Protector (Paul Rascagneres)
Stack Smashing Protector (Paul Rascagneres)
 
Mots de passe et mécanismes d’authentification (Thomas Pornin)
Mots de passe et mécanismes d’authentification (Thomas Pornin)Mots de passe et mécanismes d’authentification (Thomas Pornin)
Mots de passe et mécanismes d’authentification (Thomas Pornin)
 
Comment détecter des virus inconnus en utilisant des « Honeypots » et d’autre...
Comment détecter des virus inconnus en utilisant des « Honeypots » et d’autre...Comment détecter des virus inconnus en utilisant des « Honeypots » et d’autre...
Comment détecter des virus inconnus en utilisant des « Honeypots » et d’autre...
 
PostNet, une nouvelle ère de Botnet résilient (Julien Desfossez & David Goulet)
PostNet, une nouvelle ère de Botnet résilient (Julien Desfossez & David Goulet)PostNet, une nouvelle ère de Botnet résilient (Julien Desfossez & David Goulet)
PostNet, une nouvelle ère de Botnet résilient (Julien Desfossez & David Goulet)
 
La détection d'intrusions est-elle morte en 2003 ? (Éric Gingras)
La détection d'intrusions est-elle morte en 2003 ? (Éric Gingras)La détection d'intrusions est-elle morte en 2003 ? (Éric Gingras)
La détection d'intrusions est-elle morte en 2003 ? (Éric Gingras)
 
Responsabilisation des données confidentielles en entreprise (Étienne Dubreuil)
Responsabilisation des données confidentielles en entreprise (Étienne Dubreuil)Responsabilisation des données confidentielles en entreprise (Étienne Dubreuil)
Responsabilisation des données confidentielles en entreprise (Étienne Dubreuil)
 
Le GPU à la rescousse du CPU (Charles Demers-Tremblay)
Le GPU à la rescousse du CPU (Charles Demers-Tremblay)Le GPU à la rescousse du CPU (Charles Demers-Tremblay)
Le GPU à la rescousse du CPU (Charles Demers-Tremblay)
 
802.1X filaire, un monde idéal illusoire? (Olivier Bilodeau)
802.1X filaire, un monde idéal illusoire? (Olivier Bilodeau)802.1X filaire, un monde idéal illusoire? (Olivier Bilodeau)
802.1X filaire, un monde idéal illusoire? (Olivier Bilodeau)
 

Dernier

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Dernier (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Comment détecter des virus inconnus en utilisant des « honey pots » et d’autres technologies (David Girard & Anthony Arrott)

  • 1. Detecting Unknown Malware using Network Behavior Correlation
  • 2. Correlation Technology • A network behavior correlation technology used to detect known and unknown malware. • Currently implemented in an out-of-band network sensor appliance called the “Threat Discovery Appliance” which is bundled with a series of different service packages known collectively as “Threat Management Services”. • Adoption of this technology in other Trend Micro products is ongoing. Copyright 2007 - Trend Micro Inc. Paramount Q1 2008 - 2
  • 3. Correlation Technology Copyright 2007 - Trend Micro Inc. Paramount Q1 2008 - 3
  • 4. How Do We Analyze Network Traffic? Assemble packets into one stream Extract embedded files & send to scanning engines Extract embedded URLs and perform WRS check Scan the traffic stream for exploits and network worms Perform single-session correlation on the traffic stream Copyright 2007 - Trend Micro Inc. Paramount Q1 2008 - 4
  • 5. Protocol Support We currently support over 40 protocols using port agnostic protocol detection to accurately identify protocols regardless of the port used Network Services Web Traffic DNS HTTP DCE-RPC SSH Telnet AIM RDP IRC VNC Supported Protocols File Transfer Email and Messaging FTP SMTP TFTP POP3 SMB Gmail Yahoo Mail Hotmail Copyright 2007 - Trend Micro Inc. Paramount Q1 2008 - 5
  • 6. What We Do • The Threat Analysis Group is a department of the Network Content Security Group and is responsible for the operations that utilize our correlation technology. • Over the years we have developed and improved upon several dedicated malware replication systems, also known as “sandboxes”. These systems are responsible for executing malware and logging all of their activities. • Early on, we processed current malware along with a few years backlog of older samples. Analysis of this network traffic provided us with the data used to create a majority of our early ruleset. These rules are generic in nature and based upon the common behavior of different malware types. • Due to the volatile nature of malware, we determined that older samples were not worth our time any longer and now focus solely on brand new malware, utilizing various feeds of malware samples. Nowadays, the majority of our new rules focus on specific malware families. Copyright 2007 - Trend Micro Inc. Paramount Q1 2008 - 6
  • 7. What characteristics are we looking for Downloaders Packed / Compressed Executables Names of downloaded files belong to system files svchost.exe winlogon.exe lsass.exe File extension do not match expected file type JPG extension but file is actually EXE Unique / Unknown HTTP user-agents 7 Copyright 2007 - Trend Micro Inc.
  • 8. What characteristics are we looking for Spyware/Grayware Unique / Unknown HTTP user-agents Names of downloaded files belong to trademarked/copyrighted spyware applications Gain, Media Motor, Hotbar, SpySherrif 8 Copyright 2007 - Trend Micro Inc.
  • 9. What characteristics are we looking for Backdoors Rogue services Un-authorized SMTP, HTTP servers Opened ports Loopback commands shells Loopback command shells DOS Shell visible at the network traffic Non standard service ports HTTP Traffic on non HTTP port 9 Copyright 2007 - Trend Micro Inc.
  • 10. What characteristics are we looking for Mass mailers Attachments with long filenames (space padded) File extensions do not match expected file type File inside archive attachment contains double extension Packed files Suspicious URLs in message body 10 Copyright 2007 - Trend Micro Inc.
  • 11. What characteristics are we looking for Bots IRC traffic Bad NICKs, channelnames, bot commands Non-standard service ports Typically HTTP or IRC Ex. IRC traffic on port 8080 (HTTP proxy) File transfers to blacklisted domains 11 Copyright 2007 - Trend Micro Inc.
  • 12. Scenario Corporate Network Rule 8 - Packed executable file dropped on a network share C$ WORM_AGOBOT, Admin$ PE_LOOKED 12 Copyright 2007 - Trend Micro Inc.
  • 13. Scenario External Mail Server Internet Corporate Network Internal Mail Server WORM_NETSKY, WORM_MYTOB, WORM_AGOBOT 13 Copyright 2007 - Trend Micro Inc.
  • 14. Scenario IRC Server Internet Corporate Network Rule 26 - IRC session Rule 7 - IRC BOT established with a known commands found bad C&C WORM_IRCBOT.EN 14 Copyright 2007 - Trend Micro Inc.
  • 15. Scenario Malicious Website Internet Corporate Network Rule 88 - HTTP requests attempted to download known Malware- Malware-used filenames TROJ_DLOADER, TROJ_AGENT 15 Copyright 2007 - Trend Micro Inc.
  • 16. Rule Descriptions Monitored client is receiving email with phishing link (External) Rule ID: 72 Scenario: SMTP server receives phishing emails Email sender domain is in list of commonly phished domains and email contains IP address The email will trigger rule ID 72, direction is external Sender: customerservice@ebay.com URL: http://70.88.210.45:81/ebay.com/index.html Monitored Network Copyright 2007 - Trend Micro Inc.
  • 17. Rule Descriptions Monitored client is sending out phishing email (Internal) Rule ID: 72 Scenario: Infected host is sending phishing emails Email sender domain is in list of commonly phished domains and email contains IP address The email will trigger rule ID 72, direction is internal Sender: customerservice@ebay.com URL: http://70.88.210.45:81/ebay.com/index.html Monitored Network Copyright 2007 - Trend Micro Inc.
  • 18. Rule Descriptions Hacking attempt Rule ID: 38 & 15 Fields of interest: username (not SMB) • This rule is triggered when a certain threshold of failed login attempts is reached. Below are the details of these thresholds per protocol. • For the SMB protocol, the possible attacker is the destination IP address. Rule ID 38 Rule ID 15 Protocol (threshold trigger) (threshold trigger) FTP =4x =20x POP3 =4x =20x *Cisco Telnet =3x =6x **SMB =12x =18x Copyright 2007 - Trend Micro Inc.
  • 19. Rule Descriptions Hacking attempt Rule ID: 38 & 15 Scenario: Infected Host brute force attacks other hosts within monitored network There are a high number of failed login attempts on each attacked host The attacks will trigger rule IDs 38 & 15, direction is internal for both 15 failed SMB logins 21 failed SMB logins Monitored Network Copyright 2007 - Trend Micro Inc.
  • 20. Rule Descriptions Monitored client is downloading a suspicious file. Rule ID: 66 Scenario: Host downloads an executable file from web site Web server reports content type as image/gif This event will trigger rule ID 66, direction is external HTTP Response reports content type as: image/gif But file is actually executable Monitored Network Copyright 2007 - Trend Micro Inc.
  • 21. Rule Descriptions Monitored client is using a protocol on a non-standard port. Rule ID: 33 Fields of interest: nickname, channelname • The Internet Relay Chat (IRC) protocol typically uses a port in the range of 6665-6669. It is common for malicious IRC bots to use non- standard ports for their communication. • This rule is triggered when an incoming or outgoing connection is detected using the IRC protocol on a port outside of this range. There is still a chance this is legitimate IRC traffic, but more likely it is a “bot” communication. Copyright 2007 - Trend Micro Inc.
  • 22. Rule Descriptions Monitored client has a malware that is communicating to an external party. Rule ID: 33 Scenario: Infected host is communicating with an IRC C&C server using the IRC protocol, but using port 8080 instead of one of the standard ports in the range of 6665-6669. This communication will trigger rule ID 33, direction is internal but could just as well be external if the response was captured instead. Port: 8080 Monitored Network Copyright 2007 - Trend Micro Inc.
  • 23. Relevance Rules How It Works (Zeus) Create a profile based Relevance Pattern! differences Group the packet captures of the same family Create the on similarities and 23 Copyright 2007 - Trend Micro Inc.
  • 24. Relevance Rules Possible Relevance Rule for Hupigon MD5: 5e3831266f8d68bc3713c35963a39f75 MD5: fbdc7c613fb23527929c18eb55fad5f0 GET /*.txt HTTP/1.0rnUser-Agent: *rnHost: *rnPragma: no-cachern MD5: 5e5c3e7cbc5ca7ecb48964494519068d Note: * wildcard for any MD5: 46fd78ea03e2e8a6a07196f791fbb03c 24 Copyright 2007 - Trend Micro Inc.
  • 25. Relevance Rules • With the power and flexibility of the scripting language we use to create rules, we are able to perform calculations and bitwise operations in order to validate custom malware protocols such as the one used by the Palevo (Mariposa/Butterfly) bot. Copyright 2007 - Trend Micro Inc.
  • 26. Rule Correlation • We are limited to correlating only the data within a single session, and in a single direction. For example, we can correlate the data within an HTTP request or an HTTP response, but not between the two. • To address this issue, further correlation is performed in a separate process on these initial events generated. • With this approach, any type of correlation is possible, and the results are quite powerful. Reports are delivered that can pinpoint confirmed malware infections so the customer does not have to analyze logs and make his own determinations. Copyright 2007 - Trend Micro Inc.
  • 27. Our Threat Assessment Results Despite having the most current industry standard security technology… • 100% of companies had active malware • 72% of companies had one or more IRC bots • 56% of companies had information stealing malware • 50% of companies had 4 or more IRC bots • 80% of companies had malware web downloads • 42% of companies had a network worm (1) • $6M = average total cost of a major data breach in 2008 (2) 1 Based on 130 assessments worldwide at company’s averaging over 7,484 employees and included representatives from the manufacturing, government, education, financial services, retail, and healthcare industries. 2 Ponemon Institute 27 Copyright 2007 - Trend Micro Inc.
  • 28. Detection Samples Virut propagating via brute force login attempts and open shares Copyright 2007 - Trend Micro Inc.
  • 29. Detection Samples IRC bot communicating with its C&C server Copyright 2007 - Trend Micro Inc.
  • 30. Detection Samples Bot sending spam Copyright 2007 - Trend Micro Inc.
  • 31. Detection Samples Drive-by download and downloaders Copyright 2007 - Trend Micro Inc.
  • 32. Detection Samples Stuxnet!! Copyright 2007 - Trend Micro Inc.
  • 33. Thank You Classification 11/8/2010 33 Copyright 2007 - Trend Micro Inc.