BOTCOIN Bitcoin-Mining on Botnets

Slides:



Advertisements
Similar presentations
Botcoin: Monetizing Stolen Cycles UC San Diego and George Mason University Presented By: Amanda Watson CSCI 780: Advanced Network Security.
Advertisements

1. 2 A High Tech Crime Investigation Lessons learned by the National High Tech Crime Center Hans Oude Alink, project leader NHTCC November 2005.
Bitcoin is the FUTURE of MONEY!!
On Power Splitting Games in Distributed Computation: The case of Bitcoin Pooled Mining Loi Luu, Ratul Saha, Inian Parameshwaran, Prateek Saxena & Aquinas.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Click Trajectories: End-to-End Analysis of the spam value chain Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Tristan Halvorson,
University of Central Florida CAP 6135: Malware and Software Vulnerability Spring 2012 Paper Presentation Dude, where’s that IP? Circumventing measurement-based.
Security Update Vincent BRILLAULT HEPiX Spring 2014, Annecy.
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
J. Anish Dev College of Engineering, Guindy, Anna University Bitcoin mining acceleration and performance quantification.
Botnets By: Brandon Sherman. What is a Botnet? Botnet is a term referring to a network of multiple computers being affected by software robots. These.
Bitcoins – Mining and Trading Jonathan Day, Carpe Diem 18 th July 2013.
1 Bitcoin A Digital Currency. Functions of Money.
Monetizing ZeroAccess With: Chris Grier (Berkeley/ICSI), Vern Paxson (Berkeley/ICSI), Vacha Dave (Microsoft/UCSD), Saikat Guha (Microsoft), Damon McCoy.
CATCHING CLICK-SPAM IN SEARCH AD NETWORKS Vacha Dave +, Saikat Guha ★ and Yin Zhang * + University of California, San Diego ★ Microsoft Research India.
Empirical Analysis of Search Advertising Strategies BHANU C. VATTIKONDA, VACHA DAVE, SAIKAT GUHA, ALEX C. SNOEREN.
Deanonimization methods in Bitcoin Network Marko Marić.
Cryptocurrencies: challenges and caveats Khaled Baqer Cambridge University.
1 Bitcoin Bitcoin: A Peer-to-Peer Electronic Cash System – Satoshi Nakamoto A Fistful of Bitcoins: Characterizing Payments Among Men with No Names – Sarah.
First… What is Cryptocurrency? A Cryptocurrency is a digital currency that is created through mathematical engineering (algorithm). It is designed to.
Motivation ✓ ✘ ? Bitcoin/Ideal Credit Card Works on Internet
“Connecting bitcoiners worldwide”
Crypto Mining Presented by: 803Mine.com & TheCryptoMiners.com.
Kermit Lowry, John Whatley, Wesley Cooper, and Matthew Eith
Economics of Virtual Currency
A lustrum of malware network communication: Evolution & insights
Bitcoin and the Blockchain
Blockchains . or . How to avoid paying $40,000,000 for two pizzas
Blockchain Introduction
Higher Information Systems
To Catch a Ratter: Monitoring the Behavior of
Energy Task By Aodhán McGuigan.
Article by:. rown Farinholt, Mohammad Rezaeirad, Paul Pearce, Hitesh
Welcome to Pay Mining & Solutions LLC
Cryptocurrencies By Rui Sakurai and Shane Spears
Generating revenue from surplus solar power using cryptocurrency
Bitcoin Explained in 2 Minutes
Click Trajectories: End to End Analysis of the Spam Value Chain
Easy Tips for Beginners on How to Mine Zcash Cryptocurrency
Dash Mining - for Dummies. Dash, an altcoin, is best known for two main features – ability to send instantly and highest level of privacy provision. It’s.
Anonymity vs. Privacy Campbell R. Harvey Duke University, NBER and
So what is Blockchain anyway?
Zcash Mining – A Guide For Beginners. Zcash (also known as ZEC and seventeenth most valued cryptocurrency with market capitalization of $500 million)
Bitcoin Cloud Mining Script - Bitcoin Trading Script - Bitcoin Mining Software | Bitcoin Mining Script.
Norton.com/Setup | +1(844) | Norton Internet Security
Best Cryptocurrency Development Company
Bitcoin Mining Script | Cryptocurrency Mining Script | Bitcoin Mining Software.
Overview ➔ Cryptocurrency Wallet App - One of the most popular Crypto wallet apps in Europe. Cryptocurrency Wallet App ➔ This Wallet app design and developed.
Cryptocurrency Wallet Development Company ERC20 Token Development Company Coin Wallet Development Services.
Developer Cryptocurrency Developer Cryptocurrency | Cryptocurrency Consultant in Chennai | Blockchain Development Agency.
Data Structures and Analysis (COMP 410)
Anonymity vs. Privacy Campbell R. Harvey Duke University, NBER and
BLOCKCHAIN BASICS & LEGAL ISSUES
Ecological Community in the Green Planet
Bitcoin and the Blockchain
Bitcoin: A New Internet Currency
Campbell R. Harvey Duke University and NBER
Nonce Making Sense of Nonces.
Campbell R. Harvey Duke University and NBER
Cryptocurrency: Should we invest or not?
Campbell R. Harvey Duke University and NBER
Blockchain Principles
Data Structures and Analysis (COMP 410)
Data Mining & Machine Learning Lab
Presentation On Bit-Coins.
Basics of Bitcoins for Beginners: How Bitcoin Process Works
Wokshop SAIS 2018 Dr. Meg Murray Kennesaw state university
Digital Payments NFC Payments, Digital Wallets, Virtua; Currencies and Cryptocurrencies, Bitcoins, Blockchains and Mobile and Cloud Based Payments.
Campbell R. Harvey Duke University and NBER
Cryptocurrency and Blockchain Technology
Presentation transcript:

BOTCOIN Bitcoin-Mining on Botnets Univ of California San Diego Computer Science and Engineering BOTCOIN Bitcoin-Mining on Botnets Danny Y. Huang Hitesh Dharmdasani, Sarah Meiklejohn Vacha Dave, Chris Grier, Damon McCoy Stefan Savage, Nicholas Weaver Alex C. Snoeren, Kirill Levchenko

Motivation Unique IP address  Money Spam  $$$ Click-fraud  $$$ Computational Power  Money Mining Bitcoins 100% CPU  $$$

Motivation Loss in productivity High electricity bill Scale? Kevin Loss in productivity High electricity bill Scale?  Who? Operations? Profitable? Implications?  Bitcoin-mining in relation to spam/click-fraud?

What we learned about botnets: Contributions What we learned about botnets: Identities Modus Operandi Revenue Implications

How you can make bitcoins Pick a different integer Apply SHA-256 on integer Mining App Takes 100+ years P2P Network Found hash collision Get 25 .

Mining Pools Free! Parallelizes hashing. Finds solution faster. Workers divide reward. BUT: Hardware costs Energy costs Mining Pool Free! miner.exe my_wallet http://pool.com 6

We want to identify these botnets! Botnet Mining Mining Pool Pool pays botnet Malware connects to pool We want to identify these botnets! Victim Victim Victim miner.exe botnet_wallet http://pool.com

Finding the Mining Malware Malware Databases Threat Expert, Emerging Threats, … 2,000 binaries 10 botnets Bitcoin Malware Reports / Blogs Leaked Data Interviews with Pools

Examples of Mining Botnets ZeroAccess Spamming, click-fraud Bitcoin-mining FeodalCash Affiliate program Zenica xfhp.ru Fareit Dload asia Hitma UK misc gamers BMControl bitcoin wallet addresses in public cloud

Outline Identities Identities Modus Operandi Modus Operandi Revenue What we learned about botnets: Identities Identities 2,000 binaries 10 botnets Modus Operandi Modus Operandi e.g. affiliate program, wallet addresses in cloud Revenue Revenue Implications

Botnet Mining Revenue ZeroAccess FeodalCash BMControl Lots of challenges! Gather botnet wallet addresses ZeroAccess FeodalCash 486 bitcoins in 1 year 168 bitcoins in 3 months 3,000 bitcoins Look up in public ledger (i.e. blockchain) BMControl Examine payments from mining pool (Meiklejohn et al)

Botnet Revenue in Bitcoins

Botnet Revenue in US Dollars

Mining Revenue

Mining Revenue My CPU $0.002/day BMControl $300/day My CPU $0.20/day

Number of New Botnet Mining Operations Litecoin Mining Revenue Different hash function - Bitcoin: SHA-256 - Litecoin: Scrypt Litecoin Mining Revenue

Outline Identities Identities Modus Operandi Modus Operandi Revenue What we learned about botnets: Identities 2,000 binaries 10 botnets Identities Modus Operandi e.g. affiliate program, wallet addresses in cloud Modus Operandi Revenue Revenue 4,000 bitcoins in 2 years Implications Implications

Implication & Conclusion Spam Bitcoin-mining Litecoin-mining *coin-mining Click-fraud

What we learned about botnets: Outline What we learned about botnets: Identities Modus Operandi Revenue Implications