To Catch a Ratter: Monitoring the Behavior of

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Anomaly Detection Steven M. Bellovin Matsuzaki ‘maz’ Yoshinobu 1.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Trojan Horse Program Presented by : Lori Agrawal.
 What is a botnet?  How are botnets created?  How are they controlled?  How are bots acquired?  What type of attacks are they responsible for? 
Threats To A Computer Network
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
SOA Security Chapter 12 SOA for Dummies. Outline User Authentication/ authorization Authenticating Software and Data Auditing and the Enterprise Service.
(NHA) The Laboratory of Computer Communication and Networking Network Host Analyzer.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
What’s New in WatchGuard XCS 10.0 Update 3 WatchGuard Training.
Maintaining and Updating Windows Server 2008
MIS Week 7 Site:
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Advanced Persistent Threats CS461/ECE422 Spring 2012.
KaZaA: Behind the Scenes Shreeram Sahasrabudhe Lehigh University
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Introduction to Honeypot, Botnet, and Security Measurement
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Honeypot and Intrusion Detection System
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Topic 5: Basic Security.
Advanced Persistent Threats (APT) Sasha Browning.
Homework tar file Download your course tarball from web page – Named using your PSU ID – Chapter labeled for each binary.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
Computer virus Done: Aaesha Mohammed ID: H
RAT-based APT Detection for Provenance Graph Analytics
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
Mac OS X backdoor Trojan, now in beta? 報告人:劉旭哲. Introduction It targets users of Mac OS X As even the malware itself admits, it is not yet finished. It.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
Standard Demo 1 © Hacking Team All Rights Reserved.
Main Features of iSafe All-in-One Keylogger Universal keylogger of isafe, Inc. Suitable for home parental control,corporate employee monitoring and cheating.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
How To Remove Flooders?-Get Help Website:
Understanding Cyber Attacks: Technical Aspects of Cyber Kill Chain
Botnets A collection of compromised machines
BASIC CONCEPTS ON INTERNET &
Module 8: Networking Services
Malware Reverse Engineering Process
3.6 Fundamentals of cyber security
IT Security  .
Instructor Materials Chapter 7 Network Security
Backdoor Attacks.
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
HISTORY OF COMPUTERS AND TECHNOLOGY
To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild By Jun Hao Xu Authors: Brown Farinholt, Mohammad Rezaeiradt,
Malware Reverse Engineering Process
Article by:. rown Farinholt, Mohammad Rezaeirad, Paul Pearce, Hitesh
Remote Control and Advanced Techniques
BotCatch: A Behavior and Signature Correlated Bot Detection Approach
Botnets A collection of compromised machines
NET 311 Information Security
Virus Attack Final Presentation
Chap 10 Malicious Software.
Radoslaw Jedynak, PhD Poland, Technical University of Radom
Chap 10 Malicious Software.
CMSC 491/691 Malware Analysis
Electronic Communication and the Internet
Unit 1 Fundamentals of IT
Wireless Spoofing Attacks on Mobile Devices
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
Presentation transcript:

To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild Authors: Brown Farinholt, Mohammad Rezaeiradt, Paul Pearce, Hitesh Dharmdasani, Haikuo Yin, Stevens Le Blond, Damon McCoy, Kirill Levchenko Presented by: Ben Mitchell

Motivation - Current problems Recent shift from large scale threats like botnets to lower volume threats designed to target specific users or systems. Increase in human operated malware such as remote access trojans (RATS). Surprisingly there is a lack of understanding of RATS Low barrier to entry, many tutorials to help people learn to use RATS

Motivation - Goal of the paper To better understand the behavior of RAT operators in realistic situations.

Background - What is a RAT? Remote access trojan Usually downloaded invisibly along with a benign program, such as a game, or sent as an email attachment Controlled individually by remote human operator Gives full administrative control over the target computer to the operator

Background - What can RATs be used for? File access Webcam access Microphone access Launching attacks Remote desktop (RDP) Keylogging credentials

Background - RAT infection process

Background - DarkComet A popular commercial RAT Allows a operator to control the system with a Graphical User Interface Is commonly used to spy on victims by taking screen captures, key-logging, or interacting with webcams/microphones.

Methodology - Sample collection VirusTotal is an online service that analyzes files and URLs enabling the identification of viruses, worms, trojans Used VirusTotal to obtain 19,109 samples of DarkComet malware 19,109 samples

Methodology - Sample extraction DarkComet offers two runtime package options, UPX and MPress. Of the 19,109 samples collected: 18% were packed with UPX or Mpress 74% were not packed 8% were malformed 74% not packed 18% UPX / Mpress 8% malformed

Methodology - Sample extraction In total 17,516 samples were unpacked When unpacked the following was collected: The password used to encrypt the controller network traffic Version of DarkComet used A list of addresses of the stub’s controller: domain names, IP addresses, and ports. 74% not packed 18% UPX / Mpress 8% malformed DarkComet Version Passwords Controller IP address, Ports, domain names

Methodology - Scanning A host infected by DarkComet it establishes contact with controllers through TCP Afterwards controllers reply with a specific message To find controllers we can open a socket and wait for the specific message Two tools are used to carry out this scanning, ZMAP and Shodan

Methodology - Controller monitoring Controller IP address, Ports, domain names Of the 17,516 samples unpacked, 13,339 valid addresses were obtained Extracted domain names were resolved hourly through DNS resolution techniques. Over the course of the project these 13,339 addresses were linked to 9,877 unique operators. 13,339 domains 9,877 controllers Unique DarkComet controllers

Methodology - Operator monitoring Two separate experiments each lasting 2 weeks Goal of experiments to monitor the behavior of live DarkComet operators in realistic machines Samples selected and installed from previously collected DarkComet malware 1,165 samples used in 2,747 total runs Methods used to select which samples were run 1,165 samples used Executed 2747 times combined

Methodology - Experiment 1 20 identical honeypots used to host DarkComet malware Each honeypot received similar responses from operators Encrypted network traffic between operator and host recorded 20 honeypots used

Methodology - Experiment 2 8 honeypots used to host DarkComet malware Each honeypot has a carefully designed, unique persona College student Male PC gamer Male Doctor Bitcoin miner Bank Teller Control, unmodified Female political figure Male Academic researcher

Methodology - Behavioral Reconstruction Recorded network traffic decrypted using passwords gathered from unpacking DarkComet samples DarkComet network signatures gathered from static analysis and exhaustive testing Signature engine takes recorded decrypted network traffic and returns the source and action carried out E.g. operator accessed webcam <Timestamp>

Results - Who is using RATs? http://www.pngall.com/technology-png Countries of the IP addresses of scanned DarkComet controllers User-types of the IP addresses of scanned DarkComet controllers Large number of Turkish and Russian addresses Casual ratters from residential areas

Results - When are RAT operators active http://www.pngall.com/technology-png Most active after midday More active on weekends than weekdays

Results - What actions RAT operators take First action Second action Third action Fourth action Last action http://www.pngall.com/technology-png

Results - Motives 61% User Access 58% Credentials 16% Vantage point http://www.pngall.com/technology-png 58% Credentials 16% Vantage point (webcam mic, chat, pics, documents) (Steam accounts, bitcoin wallets, email accounts) (DDoS attacks, fraud, deploying hacking tools)

Results - Operator interaction http://www.pngall.com/technology-png Operators used RDP actively for longer duration when personas were present Overall similar levels of total operator connection times 5 personas presented higher average operator interaction durations than the control honeypot Operators most interested with Banker

Results - Criticism Only analyzing DarkComet samples Leading to potentially skewed results Other RATs to consider, Sub7, BlackShades, NetBus, Back Orifice, JSpy http://www.pngall.com/technology-png

Results - Criticism Only taking samples from VirusTotal Potentially missing more skilled undetectable operators Heavy emphasis on casual ratters http://www.pngall.com/technology-png

Results - Criticism Control Male PC gamer Male Doctor Female political figure Male Academic researcher Bitcoin miner College student Bank Teller Analysis of persona results was not detailed enough Operator actions on each persona were not discussed individually Reasoning for each persona being chosen was not given http://www.pngall.com/technology-png

Thank You Questions?