• DocumentCode
    3751095
  • Title

    Covert remote syscall communication at kernel level: A SPOOKY backdoor

  • Author

    Florian Kerber;Dominik Teubert;Ulrike Meyer

  • Author_Institution
    RWTH Aachen University Research Group IT Security Mies-van-der-Rohe Str. 15, 52074 Aachen, Germany
  • fYear
    2015
  • Firstpage
    74
  • Lastpage
    81
  • Abstract
    Malware today often uses very sophisticated methods to avoid being detected on the victim machine itself. However, hiding the actual communication between an attacker and his malware is often neglected by malware authors. As a consequence, intermediate hosts inspecting the incoming and outgoing traffic of the victim host may be able to detect the infection. In this paper, we describe a proof-of-concept server backdoor which hides the in- and exfiltration of data in incoming and outgoing benign traffic of the victim server. Using a low-traffic system call proxy, our backdoor allows the remote execution of arbitrary programs on the victim server without being detectable by network intrusion detection systems. We implement our proof-of-concept backdoor using the HTTP protocol´s Cookie-header and evaluate it against the SNORT network intrusion detection system. In addition, we show how to use other widespread services such as SSH, IPsec, and OpenVPN to conceal the attacker´s communication and briefly discuss countermeasures.
  • Keywords
    "Servers","Kernel","Malware","Intrusion detection","Protocols","Ports (Computers)"
  • Publisher
    ieee
  • Conference_Titel
    Malicious and Unwanted Software (MALWARE), 2015 10th International Conference on
  • Print_ISBN
    978-1-5090-0317-4
  • Type

    conf

  • DOI
    10.1109/MALWARE.2015.7413687
  • Filename
    7413687