Inspect machinesenvironments on a regular basis Do not rely on visual inspection or what your machine tells you. Gateway inspection Quarantine a machine on detection, or visual clues such as fake antivirus pop- Profi le tra ffi c Inspect egress tra ffi c

e-Security | Cyber Security Malaysia | Vol: 26-Q12011 © CyberSecurity Malaysia 2011 - All Rights Reserved 15 Organizations are waging a full-blown war on computer zombies - infected machines that obediently obey commands from remote masters without question or complaint. Yes, “The Walking Dead” in Cyberspace. But, this is no Hollywood act. Zombies have the potential to exponentially grow in numbers, each ultimately reporting to the same master, forming a botnet. With a wealth of infectious zombies crawling about, we have identii ed seven ways for companies in Malaysia to prevent zombie attacks.

1. Inspect machinesenvironments on a regular basis

Zombies can be very patient pieces of code that can wait weeks or months before activating. Do not assume all is well on a one-shot inspection that fails to observe malicious activity.

2. Do not rely on visual inspection or what your machine tells you. Gateway inspection

of tra ffi c is the best approach to sniff out a zombie, since packets have already been sent from a machine and should not be further altered Zombies can infect machines with rootkits, gaining kernel-level privileges that allow it to essentially control the operating system – hiding i les, windows, network trafi c, etc.

3. Quarantine a machine on detection, or visual clues such as fake antivirus pop-

ups. Clean before re-instating into network Zombies make money for their masters. The most popular way is through scareware, windows that pop up claiming a user needs to purchase cleaning software. It’s a sure sign a resident zombie has downloaded this software to generate cash l ow. Zombies can quickly infect other local machines on a network, so it’s very important to quarantine immediately until the threat has been cleansed.

4. Profi le tra ffi c

Zombies often have a repetitive habit of responding the same way to the same servers on the same port–Typically HTTP. If a steady stream of outbound HTTP requests to the same IP is detected, especially a browser isn’t in use, then there’s a good chance a zombie has infected the system.

5. Inspect egress tra ffi c

Intrusion prevention helps stop zombies from Stop your Computer from Becoming a Zombie BY | Derek Manky invading a network. The same technology can also help detect zombie chatter. Even if a machine is infected with a zombie, detecting and blocking zombie trafi c that is outbound to its master is an effective way to mitigate the threat. This way, the zombie still lives but cannot receive commands or send information such as stolen bank credentials.

6. Avoid infection. Defend against