{"id":66581,"date":"2015-09-07T11:46:41","date_gmt":"2015-09-07T15:46:41","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cryptocurrency-stealing-malware-landscape-dell-secureworks\/"},"modified":"2015-09-07T11:46:41","modified_gmt":"2015-09-07T15:46:41","slug":"cryptocurrency-stealing-malware-landscape-dell-secureworks","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cryptocurrency-2\/cryptocurrency-stealing-malware-landscape-dell-secureworks\/","title":{"rendered":"Cryptocurrency-Stealing Malware Landscape &#8211; Dell SecureWorks"},"content":{"rendered":"<p><p>    Introduction  <\/p>\n<p>    Bitcoin, a digital currency and payment system introduced in    2009, has been subject to an increasing amount of attention    from thieves. Although the system itself is protected by strong    cryptography, thieves have stolen millions of dollars of    bitcoin[i] from    victims by exploiting weaknesses in Bitcoin private key storage    systems.  <\/p>\n<p>    Since Bitcoin's introduction, an increasing number of    alternative digital currencies (altcoins) have been created,    based on the original Bitcoin client's source code. Even though    none of these altcoins have approached the per-coin value of    Bitcoin, some have achieved total market caps measuring in the    millions of dollars. As a result, these altcoins have also been    targeted for theft.  <\/p>\n<p>    Mass theft of cryptocurrency is usually accomplished through    the hacking of exchanges or marketplaces. These thefts are    typically well-publicized, and the total number of stolen coins    is known. However, another category of Bitcoin theft targets    individual users' wallets or exchange accounts via malware such    as general-purpose remote access trojans (RATs) or specialized    cryptocurrency-stealing malware (CCSM). Due to the skyrocketing    value of cryptocurrencies since the beginning of 2013 and the    relative simplicity of coding malware and tools to steal    cryptocurrency, the Dell SecureWorks Counter Threat Unit(TM)    (CTU) research team predicts that CCSM will become one of the    fastest-growing categories of malware.  <\/p>\n<p>    CCSM classification project  <\/p>\n<p>    To understand the scope of this new threat, CTU researchers    embarked on a project to obtain and classify as many CCSM    samples as possible. Researchers scanned incoming malware    streams with YARA rules, searching for samples that refer to    known cryptocurrency software wallet filenames and locations.    These samples were classified into families based on    similarity. As of this publication, there are more than 100    unique families of malware on the Internet with functionality    to steal wallet files or to steal cryptocurrency using other    means.  <\/p>\n<p>    Overall trends  <\/p>\n<p>    Figure 1 shows the increase in the Windows-compatible CCSM over    time. This chart tracks only Windows malware because the    Windows portable executable format includes a timestamp in the    file headers showing exactly when the malware was compiled.    Most malware authors do not bother to alter this timestamp    post-release, so it a reasonable and reliable indicator of when    a particular sample was created. This chart shows the    relationships between average monthly Bitcoin price, new family    emergence, and overall total number of families. These    variables show a correlation between malware emergence and the    price (acceptance) of the currency.  <\/p>\n<p>        Figure 1. The correlation between Bitcoin price, new malware    emergence, and total threat of cryptocurrency-stealing malware.    (Source: Dell SecureWorks)  <\/p>\n<p>    The trend shown in Figure 1 closely follows the overall price    trend of Bitcoin. As Bitcoin has become more valuable, more    malware authors are targeting it. The record-breaking highs in    Bitcoin value from the end of 2013 into 2014 have been    accompanied by record-breaking numbers of new CCSM families.  <\/p>\n<p>    Popularity of coins in CCSM  <\/p>\n<p>    All CCSM analyzed by CTU researchers targeted Bitcoin. Figure 2    shows the distribution of CCSM-targeted altcoins between    January 2009 and the middle of February, 2014.  <\/p>\n<p>        Figure 2. The distribution of altcoins targeted by CCSM    between January 2009 and mid-February, 2014. (Source: Dell    SecureWorks)  <\/p>\n<p>    Figure 3 shows the overall ratio of samples belonging to each    malware family. A few malware families seem to be in widespread    distribution, while others may have only one or two variants.    The \"Unclassified\" group represents cryptocurrency malware that    CTU researchers have not classified as of this publication. The    \"Miscellaneous\" group includes the cryptocurrency malware    families the CTU research team has discovered that would not    fit into the chart.  <\/p>\n<p>        Figure 3. The overall ratio of discovered samples belonging    to each malware family. (Source: Dell SecureWorks)  <\/p>\n<p>    CCSM categories  <\/p>\n<p>    Wallet stealer  <\/p>\n<p>    The most common type of CCSM is the wallet stealer, a category    that includes nearly every family of CTU-analyzed CCSM. This    type of malware searches for \"wallet.dat\" or other well-known    wallet software key storage locations, either by checking known    file locations or by searching all hard drives for matching    filenames. Typically, the file is uploaded to a remote FTP,    HTTP, or SMTP server where the thief can extract the keys and    steal the coins by signing a transaction, transferring the    coins to the thief's Bitcoin\/altcoin address.  <\/p>\n<p>    Most cryptocurrency security guides recommend protecting the wallet with a strong    passphrase, preventing the thief from decrypting and using the    private keys if the file is stolen. To counter this protection,    many of the analyzed wallet-stealer malware families use a    keylogger or clipboard monitor to obtain the wallet file's    passphrase and send it to the thief.  <\/p>\n<p>    Credential stealer  <\/p>\n<p>    Many wallet-stealer families also steal credentials for various    web-based wallets, such as Bitcoin exchanges. Some individuals    keep a significant amount of bitcoin or other currency in    exchanges to trade on price movements. Malware authors are    aware of this activity, and many victims have reported that    their exchange wallets were emptied without their    authorization. In most cases, it is impossible to know exactly    what malware was used in the theft, because a full forensic    analysis of the victim's hard drive is rarely performed.  <\/p>\n<p>    Many exchanges have implemented two-factor authentication (2FA)    using one-time PINs (OTP) to combat unauthorized account    logins. However, advanced malware can easily bypass OTP-based    2FA by intercepting the OTP as it is used and creating a second    hidden browser window to log the thief into the account from    the victim's computer. Simultaneously, the malware displays a    fake \"authentication failed\" message and blocks the victim's    access to the website while the thief empties the account. CTU    researchers have not observed a verified example of this type    of attack against cryptocurrency exchanges. However, this    technique has been successfully used against online banking    sites for several years, and it is only a matter of time before    CCSM uses this approach.  <\/p>\n<p>    Man in the middle  <\/p>\n<p>    CTU researchers have observed at least one family of CCSM that    does not exfiltrate wallet files or private keys. Instead, it    acts as a \"man in the middle,\" altering the recipient address    of a transaction before it is signed. The observed sample runs    in the background, monitoring the contents of the clipboard.    The malware checks new data in the clipboard for a valid    Bitcoin address. If the data is a valid address, the malware    replaces it with the thief's Bitcoin address. Victims who do    not notice the replacement send the bitcoins to the thief.  <\/p>\n<p>    RPC automation  <\/p>\n<p>    Bitcoin and altcoin \"reference client\" software includes remote    procedure call (RPC) functionality, which allows another    program to interact with the wallet software. In many cases, a    thief with access to this functionality could connect to a    running client on a local TCP port and steal the balance of an    unencrypted wallet using only two commands (three if the wallet    is encrypted and the malware has obtained the passphrase). CTU    researchers have not witnessed any CCSM malware taking    advantage of this technique as of this publication. It would be    difficult to detect this type of theft from a network    standpoint, as the transaction would look like any authorized    transaction. Another advantage to this technique is that it    requires no external command and control (C2) or exfiltration    server that can be shut down or blocked.  <\/p>\n<p>    Detection rates  <\/p>\n<p>    Across the CCSM samples analyzed by CTU researchers, the    average unweighted detection rate across all major antivirus    (AV) vendors was 48.9%. Figure 4 lists the major CCSM families    classified by the CTU research team and their respective    detection rates averaged across all major AV vendors.  <\/p>\n<p>        Figure 4. Top CCSM families and their detection rate across    AV vendors as of February 20, 2014. (Source: Dell    SecureWorks)  <\/p>\n<p>    Wallet protection  <\/p>\n<p>    Client software choices  <\/p>\n<p>    When the private keys for a cryptocurrency are stored on a    computer connected to the Internet, the potential for theft    exists. For Bitcoin there are alternative wallets, such as    Armory and Electrum, which can protect against theft-by-malware    by using a split arrangement for key storage. One computer,    disconnected from any network, runs a copy of the software and    holds the private key that can sign transactions. A second    computer connected to the Internet holds only a master public    key of which addresses belong to the offline wallet. This    computer can generate transactions, but it cannot sign them    because it does not have the private key. A user wishing to    transfer coins generates an unsigned transaction on the online    computer, carries the transaction to the offline computer,    signs the transaction, and then carries it to the online    computer to broadcast the transaction to the Bitcoin network.  <\/p>\n<p>    Using a split Armory or Electrum wallet can make processing    transactions much safer, although the user must still verify    the transaction details to ensure malware on the online    computer has not altered the transaction before it is signed.    Unfortunately, no such clients currently exist for altcoins,    although the need for them is recognized and bounties have been    offered for their development.  <\/p>\n<p>    Hardware wallets  <\/p>\n<p>    Using two computers in a split arrangement where transactions    are carried via \"sneakernet\" is relatively secure, but the    logistics are complicated. A much more convenient method would    be to use a dedicated hardware device to store the private keys    and verify transactions without the possibility of theft. These    devices are already in development, with one (the \"Trezor\"    wallet) due to be shipped within the first quarter of 2014.  <\/p>\n<p>    Transaction integrity verification  <\/p>\n<p>    Hardware wallets work well for local transactions but not for    safely interacting with a remote website on a potentially    infected computer. Securely verifying a transaction that has    transited a potentially compromised waypoint requires an    offline device that can display the details of the transaction    before it is processed. Public-key cryptography signs the    transaction data on the bank's server before the data is sent    to the user. The offline device can verify the signature of the    transaction and determine if any changes occurred in transit.    If the transaction shows no tampering, the offline device    generates a one-time code that authenticates the transaction.    This transaction integrity verification (TIV) should become    standard for all financial entities, including institutions and    sites that accept cryptocurrencies.  <\/p>\n<p>    Conclusion  <\/p>\n<p>    After observing CCSM, CTU researchers drew the following    conclusions:  <\/p>\n<p>    As discussed in Enterprise Best Practices for Cryptocurrency    Adoption, wallet security is the most pivotal aspect to    keeping funds secure. Implementing the practices outlined in    that publication will mitigate most, if not all, of the current    threats to cryptocurrency wallets.  <\/p>\n<p>    Appendix  <\/p>\n<p>    Table 1 lists the most commonly observed malicious filenames in    the CTU research team's sample set.  <\/p>\n<p>    Table 1. Common filenames in malware samples.<\/p>\n<p>    Endnotes  <\/p>\n<p>    [i] Bitcoin (capitalized) refers to the protocol,    software, and community, while bitcoins (lowercase) are    currency units.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the article here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.secureworks.com\/cyber-threat-intelligence\/threats\/cryptocurrency-stealing-malware-landscape\/\" title=\"Cryptocurrency-Stealing Malware Landscape - Dell SecureWorks\">Cryptocurrency-Stealing Malware Landscape - Dell SecureWorks<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Introduction Bitcoin, a digital currency and payment system introduced in 2009, has been subject to an increasing amount of attention from thieves. Although the system itself is protected by strong cryptography, thieves have stolen millions of dollars of bitcoin[i] from victims by exploiting weaknesses in Bitcoin private key storage systems. Since Bitcoin's introduction, an increasing number of alternative digital currencies (altcoins) have been created, based on the original Bitcoin client's source code <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cryptocurrency-2\/cryptocurrency-stealing-malware-landscape-dell-secureworks\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94874],"tags":[],"class_list":["post-66581","post","type-post","status-publish","format-standard","hentry","category-cryptocurrency-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/66581"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=66581"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/66581\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=66581"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=66581"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=66581"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}