Il buono, il brutto, il cattivo

2008-09-01

Paul Baccas

Sophos, UK
Editor: Helen Martin

Abstract

Paul Baccas summarises the good, the bad and the ugly within Jakobsson and Ramzan's 'Crimeware: Understanding New Attacks and Defenses'.


Title: Crimeware: Understanding New Attacks and Defenses

Authors: Markus Jakobsson and Zulfikar Ramzan (Eds)

Publisher: Symantec Press

ISBN 13: 978-0-321-50195-0

Pages: 608

Cover price: $54.99

Reviewing this book has been a frustrating task for two reasons: the lack of a definable structure and the gushing reviews on the covers. My review will address the first point throughout, and will be considerably less gushing.

There is a current trend among IT-related books for chapters to be written by different people on different, but related, topics. For most of these books this causes a problem with the narrative flow and they become akin to the lecture notes of a course where each class has a guest speaker. The chapters of this book are more like academic papers – in fact, some of the chapters are academic papers, published verbatim with seemingly no regard for whether the topic has previously been introduced. While there is a narrative thread for anyone who tries to find it, most of it is lost in the weave.

Like Sergio Leone’s film this book has parts that are good, parts that are bad and parts that are ugly – and thanks to the book’s format these descriptions can often be applied to different parts of the same chapter.

The move of malware authors from being electronic graffiti artists (harmless in their own minds and annoying/destructive in the minds of their victims) to serious authors of crimeware has been the pervading trend of the last decade. Defining and exploring crimeware is a laudable goal in any book, and this one starts well.

The first chapter, ‘Overview of Crimeware’, is a good introduction and I considered it to bode well for the rest of the book. This is followed by ‘A Taxonomy of Coding Errors’, which is informative, but in my opinion slightly off topic. The subject of taxonomy within the malware industry is a recurring one, however it is one I would rather leave to biologists.

Next, ‘Crimeware and Peer-to-Peer Networks’ comprises two research papers cleaved together into one chapter. Each part of the chapter has its own introduction, method, results and conclusion. This type of presentation is valid for undergraduate dissertations, however if I were the supervisor I would be querying the assumptions and methodology of the first part of chapter 3.

The next chapter is the one that I feel deserves most of my ire. ‘Crimeware in Small Devices’ contains three parts: USB, RFID and mobile. A cursory six pages are dedicated to the clear and present threats of USB device malware, three pages are dedicated to the burgeoning threat of mobile malware, while the technology which the authors say is ‘on the verge of exciting times’, RFID, is allocated nine pages. While the authors of the latter section (Crispo et al.) have done a lot of research into RFID, I do not think it deserves such a large section, or that a largely previously published piece of work warrants inclusion in such a book.

Chapters 5 and 6, ‘Crimeware in Firmware’ and ‘Crimeware in the Browser’, both have good and ugly points, the ugly being the different sections not quite jelling. The second part of chapter 5, ‘Modeling WiFi Malware Epidemics’, is US-centric and could have done with some examples from Europe. Chapter 6 has lots of positives even though the sections are disparate.

Chapters 7 and 8, ‘Bot Networks’ and ‘Rootkits’, are very good and along with the last two chapters provide a solid core to this book. As reference material these chapters alone are worth the price of the book. My only complaint is that the rootkit detection section is a little light.

After the high point of chapters 7 and 8 comes a low point in the form of the next two chapters, ‘Virtual Worlds and Fraud’ and ‘Cybercrime and Politics’. These are mainly about traditional crimes rather than relating specifically to malware.

The four chapters following: ‘Online Advertising Fraud’; ‘Crimeware Business Models’; ‘The Education Aspect of Security’; and ‘Surreptitious Code and the Law’, are all good. Indeed, had ‘Crimeware Business Models’ started the book the whole narrative might have flowed better. Chapter 14 is a little hard going for a non-lawyer and, dealing only with US law, slightly limited as a reference.

The chapter ‘Crimeware and Trusted Computing’ is interesting only because Trusted Computing reappears as a ‘solution’ to the malware/crimeware problem every few years and yet it has not yet produced a viable solution.

The penultimate chapter, ‘Technical Defense Techniques’, is another mishmash of subjects whose highlight is an analysis of ‘Crimeware-Resistant Authentication’. The final chapter, ‘The Future of Crimeware’, is a good round-up of the subjects discussed.

This book has high aspirations and in parts it meets them. However, the lack of direction is problematic. A series of disparate papers joined by a common thread, the book seems more like the proceedings of a conference than a useful reference text. Nonetheless, there are several sections of the book that I will read again and I will keep it on my bookshelf for that reason.

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest articles:

Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

Aditya Sood & Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited to compromise the C&C panel in order to gather threat intelligence, and present a model of mobile AppInjects.

Cryptojacking on the fly: TeamTNT using NVIDIA drivers to mine cryptocurrency

TeamTNT is known for attacking insecure and vulnerable Kubernetes deployments in order to infiltrate organizations’ dedicated environments and transform them into attack launchpads. In this article Aditya Sood presents a new module introduced by…

Collector-stealer: a Russian origin credential and information extractor

Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In this article, researchers Aditya K Sood and Rohit Chaturvedi present a 360…

Fighting Fire with Fire

In 1989, Joe Wells encountered his first virus: Jerusalem. He disassembled the virus, and from that moment onward, was intrigued by the properties of these small pieces of self-replicating code. Joe Wells was an expert on computer viruses, was partly…

Run your malicious VBA macros anywhere!

Kurt Natvig wanted to understand whether it’s possible to recompile VBA macros to another language, which could then easily be ‘run’ on any gateway, thus revealing a sample’s true nature in a safe manner. In this article he explains how he recompiled…


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.