Written evidence submitted by Dr Richard
Clayton (Malware 10)
1. I am currently a Senior Research Assistant
in the Computer Laboratory of the University of Cambridge. At
present I am engaged in a three-year collaboration with the National
Physical Laboratory (NPL) to develop robust measurements of Internet
security mechanisms.
2. I have a particular research interest in cybercrime.
My research falls mainly under the heading of Security Economics
- a field based on the premise that it is easier to explain security
issues with an economic analysis rather than simply using a technical
or "computer science" approach. I am particularly interested
in measuring criminal activity rather than merely describing it.
3. I have been using the Internet since the early
1990s, ran a software house that created one of the earliest mass-market
Internet access products, and worked at Demon Internet, then the
largest UK ISP, from 1995 until 2000. In October 2000 I returned
to Cambridge to study for a PhD. My doctorate was awarded in January
2006 for my thesis, "Anonymity and Traceability in Cyberspace".
4. I have continued to work in the Computer Laboratory
doing academic research. On several occasions I have acted as
specialist adviser to House of Lords and House of Commons Select
Committees in inquiries into cybercrime and Internet security.
5. I have written, or co-written, over 40 peer-reviewed
professional publications. My main research interest over the
past few years has been into the criminal activity called "phishing"
- the theft of financial credentials by impersonating legitimate
websites. More recently I have been starting to look at the role
of malware in the criminal eco-system and I have published work
on how malware clean-up should be approached from a security economics
standpoint.
6. I should also declare that in addition to
my employment at Cambridge and my past association with Parliamentary
Committees, I am a director of a small consultancy company that
sells my time and expertise. Additionally, I am presently employed
by Yahoo! in a part-time capacity within their security team.
7. This document expresses my personal opinions,
and is in no way the expression of an official position held by
the University of Cambridge, NPL, or Yahoo!
Q1. What proportion of cyber-crime is associated
with malware?
8. I have been pointing out for years there are
almost no reliable figures about cybercrime. In a report I wrote
with colleagues for the European Network and Information Security
Agency (ENISA)[13]
we set out the problems in detail in section #4.2.
9. Summarising 14 pages of densely argued analysis
for this submission is impossible, but in section #4.4 we made
two recommendations, both of which I would commend to this Committee:
We recommend that the Commission (or the European
Central Bank) regulate to ensure the publication of robust loss
statistics for electronic crime.
We recommend that ENISA collect and publish data
about the quantity of spam and other bad traffic emitted by European
ISPs.
10. Until we have reliable data we will not be
able to assess the size of the cybercrime problem nor whether
we are making any impact on it. Of course, assessing that impact
in purely monetary terms is simplistic and the Committee ought
to go beyond what we recommended to ENISA and require the recording
of all electronic crime incidents, not just those resulting
in monetary loss.
11. For example, the UK banking industry already
publishes fraud loss figures - but these do not actually document
how much money has been stolen, but rather how much the banks
end up out of pocket. The bank has no loss if they detect the
crime promptly enough to undo electronic transfers before the
money leaves the banking system (which we understand is achieved
in about half of all cases).
12. Additionally, banks regularly attempt to
dump their losses onto their customers, personal and business,
by suggesting that the failure of security mechanisms is the customers'
fault, despite those mechanisms having been specified by the bank.
13. In particular, to return to this inquiry's
focus on malware: banks and others have chosen to rely on general
purpose browsers and they have chosen to rely on identifying users
simply by their ability to regurgitate a password. Unfortunately,
when user machines are infected by malware this reliance is misplaced.
14. Most modern malware includes a "keylogger"
- functionality to record all the keystrokes typed by the user
and relay them to the attacker. In response, the banks have moved
to systems that prompt on the screen for just a few characters
from the password. There is now malware that snaps a copy of the
screen area around the mouse and the criminal learns the password
one character at a time.
15. More sophisticated software performs "man-in-the-browser"
attacks by intercepting legitimate interactions with the bank
- perhaps paying a gas bill - and replacing this request with
a transfer of money to the criminal's account.
16. This type of malware operates in "real-time"
and will defeat the protection provided by the "CAP readers"
(the calculator-like devices that many of the banks have issued).
This is because the user will type in the numbers from the screen
still believing that they are paying their gas bill. Even after
the fraud is complete the malware will keep the user from realising
they have been defrauded by rewriting onscreen bank statements
to continue the pretence of paying for gas.
17. One could carry on for many pages in discussing
numerous different types of malware and explaining all the different
types of criminality that it underpins. Unfortunately, this descriptive
approach is pretty much all that we have - we have almost no reliable
quantitative information.
18. Hence it is not really possible for anyone
to give an accurate answer to the Committee's specific question
about the proportion of cybercrime that is associated with malware.
All that can be said, in the most general terms, is that the eco-system
for mass-market criminality is based on spam sent by botnets,
and those botnets are constructed by compromising end-user machines
with malware. Furthermore, the majority of specialist attacks
on high-value targets - performing industrial espionage or compromising
finance departments - are also based on malware.
Q4. What is the cost of malware to individuals
and how effective is the industry in providing protection to computer
users?
19. The committee asks a number of questions
about malware authorship and the cost of protection which other
experts will be able to address. What I can discuss, from my own
research, is the ineffectiveness of protection - and, rather unusually,
I even have some detailed numbers about this relating to the activities
of one particular criminal gang.
20. First some generalities. Systems such as
spam filters act to protect individuals by preventing them from
ever coming into contact with malware. However once an email evades
those filters and arrives in the inbox with a malware attachment
or a link to a bad website then there is almost no further protection
at all. Of course some people will see through the "social
engineering" and will not be fooled into clicking the malware
into action, but now that the criminals understand what is too
enticing to ignore (and now they have fixed all their grammar
and spelling errors) clicks are extremely common.
21. I have spent the past year tracking "Instant
Messenger worms" - malware that is spread between Instant
Messenger buddies. What happens is that users receive a message
over Skype, Yahoo! Messenger, Microsoft Messenger, Facebook Talk
etc. which says something like:
foto http://ofacebooks.net/album.php?your@email.addre.ss
22. If the user clicks on the link in this message
then Windows will put up a warning message asking whether you
wish to run a program from ofacebooks.net. Most people, I believe,
are so eager to see the promised photograph that they will immediately
press OK and thereby become infected by the malware.
23. Once the malware is running on a new machine
it contacts its command and control system (C&C) to determine
what it should do next. The C&C will generally instruct it
to send a message to all of the new victim's buddies (saying foto
etc) to garner new recruits. The C&C will then download specialist
malware (keyloggers, vulnerability scanners, spam senders, etc)
and the machine will be mined for financial data and turned into
a resource in a botnet.
24. At the time of writing, my research shows
that the malware for the most active worm is being downloaded
just over 70,000 times a day and the number of victims, worldwide,
is now well into the millions. This research is currently unpublished
- but I expect it to be of significant import, not least because
for once we have some accurate numbers to work with.
25. One might expect anti-virus software to detect
the downloaded malware and hence provide protection. However,
the criminals tweak the malware on a daily basis and only deploy
it once it is passed as safe. Then of course the anti-virus software
is updated, but too late to protect anyone.
26. To take just one example of the how ineffective
anti-virus software is: consider the specific version of the malware
that the criminals were using between 10:27 and 14:23 GMT on the
5 September. It was tested at 16:54 (90 minutes after the criminals
stopped deploying it) and by that time it was detected by only
seven of 44 anti-virus products; and those seven did not include
any of the top three products by market share. Even 24 hours later,
only 11 products reported this particular malware sample to be
bad.
27. Of course, not all malware gets onto people's
machines because they click on a link and are "socially engineered"
into ignoring warnings. Some infections result from exploiting
software bugs - for example in the add-ons that automatically
play videos within the browser.
28. The large software companies such as Microsoft
and Adobe provide automated patching systems to correct bugs.
However, modern computers are running software from dozens, if
not hundreds, of companies - and most of these companies do not
have sophisticated patch distribution mechanisms. It would be
desirable for companies such as Microsoft to open their patching
platforms to third parties so that users could have a fully integrated
way of staying up-to-date.
29. Other companies are just as slow at deploying
patches, and in particular the mobile phone companies can be years
behind at pushing out patches to their subscribers' handsets.[14]
This is a classic failure that is easily explained by "security
economics": the people in a position to fix the problem are
not those who would suffer a loss. We often have to resort to
fixing such problems by regulation - and this Committee should
recommend that subscribers should be entitled to claim damages
from their network provider if their phone (or their data) was
damaged as a result of an unpatched vulnerability for which they
have delayed rolling out a fix.
Q5. Should the Government have a responsibility
to deal with the spread of malware in a similar way to human disease?
30. Another way that industry fails to protect
Internet users is by failing to act when their users are known
to be compromised.
31. It is often possible to record the unique
IP addresses of machines that are contacting a C&C system.
Additionally, when a botnet is shut down it is now usual practice
to set up a "sinkhole" that will log the identities
of the compromised machines which continue to try and make contact
with the disabled C&C.
32. The operators of the sinkhole are unable
to communicate with the owners of the compromised machines directly
- they can only identify the ISP that is providing Internet connectivity.
So it is up to the ISP to pass the bad news on to the relevant
customer, because only the ISP knows who was using the IP address
at the relevant time. In practice very few ISPs relay information
and almost none go looking for further sources of this type of
data.
33. We can see how poor the data passing is by
examining the data collected by the Shadowserver Foundation, who
operate a sinkhole for Conficker - malware that infected seven
million machines worldwide in November 2008 and which still poses
a threat to the infected machines. The Shadowserver data[15]
shows that infections have dropped from 5.5 million in September
2010 to 3.5 million now; the worst affected UK ISP has seen a
reduction from 7000 to 5000 infected machines over the same period.
The best ISPs completely eradicated the problem, and ensured their
customers were safe, two years or more ago, and I suspect that
the drop in numbers is as now much to do with old computers being
scrapped as customers being told of their problem.
34. The reason that ISPs discard notifications
is because contacting their customers is expensive - the standard
meme is that one phone call to a customer wipes out the profit
made on them for a year. This makes a good sound-bite - but it
is roughly correct. My own analysis shows that the cost equates
to eight months of profit, so the ISPs are indeed acting rationally
in so far as their own self-interest is concerned.
35. Financial concerns are the basis of the industry-wide
agreements (in Germany, Australia and The Netherlands) in which
all the ISPs promise to pass on malware infection notifications.
The idea is to ensure that no-one can steal market share by undercutting
prices by failing to incur the cost of contacting customers.
36. This committee should recommend just such
an ISP industry-wide agreement in the UK. However, the recommendation
should go further and instruct the ISP industry to explicitly
seek out sources of data, from sinkhole operators and others,
so that UK Internet users have the best possible chance of being
told if their machines are harbouring malware.
37. The Committee should pay particular attention
to the system being operated by Comcast - the large cable provider
- in the United States. They monitor traffic to their domain name
servers - the machines that convert human-memorable hostnames
into the IP addresses needed to communicate across the Internet.
38. Comcast use a datafeed from Damballa, a specialist
anti-malware firm, to identify when hostname lookups are performed
by malware that is attempting, for example, to locate C&C
servers. When the presence of malware is deduced then the customer
is informed, usually by means of a pop-up message when they next
use their browser.
39. One of the many reasons that ISPs fear talking
to customers about malware is not just that they want to avoid
delivering bad news, but they fear being pressured into having
to explain all of the detail - and then being roped in to fix
the problem. What Comcast have done to avoid this is to provide
substantial online help and links to free online clean-up tools.
Further, they have done a bulk deal with a specialist company
who will, for an $89.95 fee, give personal help to customers.
40. I considered the economics of this type of
clean-up operation in a paper that I presented to the Ninth Workshop
on the Economics of Information Security in 2010. This peer-reviewed
conference is the leading forum for work in the Security Economics
field. A slightly revised version of the paper was subsequently
published in Volume 81 of the Communications & Strategies
journal.[16]
41. My paper,[17]
"Might governments clean-up malware?" supposed
that the government would subsidise the cost of malware clean-up,
and modelled what the costs might be. I considered a world in
which ISPs passed problem reports on to their users, but if the
user could not fix the problem they would be referred to a standard
clean-up service. The users would pay a nominal sum ($30 (£20)
perhaps) to avoid any moral hazard, and the government would subsidise
the rest.
42. The thrust of my argument is that this is
not as expensive a scheme as it might at first appear because
the contractor would be able to sell other services off the back
of their interaction with users. Hence they would swallow some
of the subsidy costs themselves in order to land the government's
contract. My modelling suggests that the actual cost for such
a scheme would be less than £0.50 per citizen per year -
comparable with the costs of fluoridising the water.
43. There are of course numerous details and
assumptions in this scheme, and I refer the Committee to the full
paper for all of the details, and a discussion of the advantages
of involving the government in such a scheme. The Committee might
also note that the German malware clean-up initiative[18]
is partially funded by the German government.
Q6. How effective is the Government in co-ordinating
a response to cyber-crime that uses malware?
44. The government has not dealt with cybercrime
effectively, whether it involves malware or not. Successive administrations
have failed to provide adequate funding to grow and develop the
specialist police units who work in this area. A very small number
of officers have practical experience of tackling cybercrime and
this has given them a rarity value in the job market, so that
personnel retention is a significant issue.
45. The Committee should be recommending more
resources - if only because cybercrime is volume crime that affects
very large numbers of citizens. We have (a rarity as ever) some
good data on credit card fraud, much of which is Internet related.
A supplementary document to the British Crime Survey was published
by the Home Office in May 2010. It looked at data from 2008-09
and found that 6.4% of credit card owners were aware of fraudulent
use of their card over the previous 12 months. Victimisation rates
were higher at 11.7% for incomes over £50,000/annum. If the
Internet had been used at all (irrespective of income) the rate
was 7.7% and if the Internet was used "every day" then
it was 8.9%. In contrast, the 2010-11 British Crime Survey found
that burglary affected just 2.6% of households and thefts from
cars affected 4.2% of households.
46. There has also been a complete failure by
government to even start to address the need for effective international
responses to cybercrime. Police work needs to be coordinated at
the international level, because otherwise committing a crimes
in another country will make you untouchable.
47. In the US when 1930's bank robbers used the
new-fangled automobile to flee across state lines, the solution
was to make bank robbery (along with auto-theft and other related
offences) into federal offences rather keeping them as state-specific
infractions. However, this solution does not look to be practical
for cyberspace, because there is no global body with the equivalent
reach over the world's countries that the US federal government
had over the individual US states.
48. We are not going to see cyber-police operating
across borders in the near future, but we should be looking to
see substantially more international cooperation in pursuing criminals
in one jurisdiction who have committed crimes in another.
49. The best solution that I and colleagues have
been able to suggest (in the ENISA paper already mentioned above
in paragraph 8) is a liaison system such as Eisenhower developed
in 1943 within SHAEF and which morphed into NATO. In such a system
police forces would dispatch trusted officers to formulate pan-European
(or preferably global) strategy for dealing with cybercriminals.
Their role would be to represent their country's police forces,
and within the global strategy they would make tactical commitments
to deal with criminals on their own soil and would ask for help
with pursuing those who targeted their citizens but were based
abroad.
50. We need proper international cooperation
- to move beyond the current approach where every national police
force targets the same, biggest, multi-national criminal gang
and no-one worries about the rest of the top three, let alone
the top 10. We must end a situation where cybercrime is a lucrative
career choice with a miniscule risk of ever being chased after,
let alone caught.
7 September 2011
13 R Anderson, R Boehme, R Clayton, T Moore: Security
Economics and the Internal Market. ENISA, Jan 2008.
http://www.enisa.europa.eu/act/sr/reports/econ-sec Back
14
R Lemos: Fast phone patching still a fantasy. CSO Magazine, 7
April 2011. http://www.csoonline.com/article/679205/fast-phone-patching-still-a-fantasy Back
15
http://www.shadowserver.org/wiki/pmwiki.php/Stats/Conficker Back
16
R Clayton: Might governments clean up malware? Ninth Annual
Workshop on Economics and Information Security (WEIS10), Cambridge
MA, US, June 7-8 2010.
R Clayton: Might governments clean up malware? Comms &
Strategies, 81, 2011, pp. 87-104. Back
17
http://www.cl.cam.ac.uk/~rnc1/malware.pdf Back
18
https://www.botfrei.de/en/index.html Back
|