Nowadays Information stealers are reaching high levels of sophistication. The number of families and variants observed increased exponentially in the last years. Furthermore, these trojans are sold on underground markets along with automatic frameworks that include web-based administration panels, builders and customization procedures. From a technical point of view such malware is equipped with a functionality, called WebInject, that exploits API hooking techniques to intercept all sensitive data in a browser context and modify web pages on infected hosts. In this paper we propose Prometheus, an automatic system that is able to analyze trojans that base their attack technique on DOM modifications. Prometheus is able to identify the injection operations performed by malware, and generate signatures based on the injection behavior. Furthermore, it is able to extract the WebInject targets by using memory forensic techniques. We evaluated Prometheus against real-world, online websites and a dataset of distinct variants of financial trojans. In our experiments we show that our approach correctly recognizes known variants of WebInject-based malware and successfully extracts the WebInject targets.

Prometheus: Analyzing WebInject-based information stealers / A. Continella, M. Carminati, M. Polino, A. Lanzi, S. Zanero, F. Maggi. - In: JOURNAL OF COMPUTER SECURITY. - ISSN 0926-227X. - 25:2(2017), pp. 117-137. [10.3233/JCS-15773]

Prometheus: Analyzing WebInject-based information stealers

A. Lanzi;
2017

Abstract

Nowadays Information stealers are reaching high levels of sophistication. The number of families and variants observed increased exponentially in the last years. Furthermore, these trojans are sold on underground markets along with automatic frameworks that include web-based administration panels, builders and customization procedures. From a technical point of view such malware is equipped with a functionality, called WebInject, that exploits API hooking techniques to intercept all sensitive data in a browser context and modify web pages on infected hosts. In this paper we propose Prometheus, an automatic system that is able to analyze trojans that base their attack technique on DOM modifications. Prometheus is able to identify the injection operations performed by malware, and generate signatures based on the injection behavior. Furthermore, it is able to extract the WebInject targets by using memory forensic techniques. We evaluated Prometheus against real-world, online websites and a dataset of distinct variants of financial trojans. In our experiments we show that our approach correctly recognizes known variants of WebInject-based malware and successfully extracts the WebInject targets.
No
English
banking trojan; info-stealer; WebInject; Software; Safety, Risk, Reliability and Quality; Hardware and Architecture; Computer Networks and Communications
Settore ING-INF/01 - Elettronica
Articolo
Comitato scientifico
Pubblicazione scientifica
2017
IOS Press
25
2
117
137
21
Pubblicato
Periodico con rilevanza internazionale
http://www.iospress.nl/
scopus
crossref
medra
Aderisco
info:eu-repo/semantics/article
Prometheus: Analyzing WebInject-based information stealers / A. Continella, M. Carminati, M. Polino, A. Lanzi, S. Zanero, F. Maggi. - In: JOURNAL OF COMPUTER SECURITY. - ISSN 0926-227X. - 25:2(2017), pp. 117-137. [10.3233/JCS-15773]
none
Prodotti della ricerca::01 - Articolo su periodico
6
262
Article (author)
no
A. Continella, M. Carminati, M. Polino, A. Lanzi, S. Zanero, F. Maggi
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/501792
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 12
  • ???jsp.display-item.citation.isi??? 7
social impact