Botware / Malware defense

Prevention:

  1. Ensure OS and software patches on the desktop are up to date.
  2. Disallow installation of new software on desktop (users have no administrative rights)
  3. Block domains that are known to be distributing malware.
        - Malware domains http://www.malwaredomains.com
        - C&C list http://www.emergingthreats.net/rules/bleeding-botcc.rules
        - RBN list http://www.emergingthreats.net/rules/bleeding-rbn.rules
  4. Utilize a different AV scanning on web proxy (defense in depth).
  5. Blocking IRC ports which offers some protection against older generation of botnets.
  6. Blocking all bad ports and make all traffic go through proxies, where traffic and anonymous behavior can be monitored.
  7. Browser hardening using Firefox Noscript and IE zones.
  8. Watch office documents in email, particularly from spoofed sources.  If the in coming source IP doesn't match the header information, drop the email.
  9. When performing JRE updates, ensure the old version get removed.
  10. Using HIPS (Host Intrusion Prevention System) to prevent potential harmful or abnormal behavior on the desktops.

 

Detection:

  1. Deploy listening nepenthes sensors on local IP space for early detection of infected machines.
  2. Deploy commercial and opensource detection systems - BotHunter, MainNerve .   
  3. Setting up internal darknets to detect bots that are wildly spreading thru blind network scans.
  4. Egress monitoring during off-hours to pick out phone homes.
  5. Monitor user-agent strings on the web proxy and detect anomalies.
  6. Content monitoring using Data Loss Monitoring systems.
  7. Scan for BHO (Browser Helper Object) and match it against known bad list such as the one at Castlecops.
  • 1 Users Found This Useful
Was this answer helpful?

Related Articles

URL injections information

URL Injection attacks typically mean the server for which the IP address of the attacker is...

Rootkit help

RootKit -- Spyware and Junkware detection and removal tool Go to Rootkit Hunter homepage, and...

Ddos protection with bandwith shaping

Protecting your host from SYN floods From Alexey's iproute documentation, adapted to netfilter...

Chrootkit help

SSH as admin to your server. DO NOT use telnet, it should be disabled anyways. #Change to rootsu...

Brute Force Detection

BFD -- Brute Force Detection BFD is a shell script which parses security logs and detects...