Your Botnet is my Botnet: Analysis of a Botnet Takeover

Slides:



Advertisements
Similar presentations
Your Botnet is My Botnet: Analysis of a Botnet Takeover
Advertisements

BRETT STONE-GROSS, MARCO COVA, LORENZO CAVALLARO, BOB GILBERT, MARTIN SZYDLOWSKI, RICHARD KEMMERER, CHRISTOPHER KRUEGEL, AND GIOVANNI VIGNA PRESENTATION.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Lecture 11 Intrusion Detection (cont)
1. Introduction The underground Internet economy Web-based malware The system analyzing the post-infection network behavior of web-based malware How do.
Norman SecureSurf Protect your users when surfing the Internet.
Introduction to Honeypot, Botnet, and Security Measurement
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Report: 鄭志欣 Conference: Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Chris Kruegel, and Giovanni.
APT29 HAMMERTOSS Jayakrishnan M.
14 Publishing a Web Site Section 14.1 Identify the technical needs of a Web server Evaluate Web hosts Compare and contrast internal and external Web hosting.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross,
Botnet behavior and detection October RONOG Silviu Sofronie – a Head of Forensics.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer,
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
Web Server.
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
Powerpoint presentation on Drive-by download attack -By Yogita Goyal.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
Chapter 8 E-Commerce Technologies Introduction to Business Information Systems by Mark Huber, Craig Piercy, Patrick McKeown, and James Norrie.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
4.01 How Web Pages Work.
Botnets A collection of compromised machines
BUILD SECURE PRODUCTS AND SERVICES
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
TMG Client Protection 6NPS – Session 7.
Instructor Materials Chapter 5 Providing Network Services
DDoS Attacks on Financial Institutions Presentation
A lustrum of malware network communication: Evolution & insights
IT Security  .
Instructor Materials Chapter 7 Network Security
Web Development Web Servers.
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
Chapter 8 Building the Transaction Database
ICT Communications Lesson 1: Using the Internet and the World Wide Web
ADVANCED PERSISTENT THREATS (APTs) - Simulation
Botnets A collection of compromised machines
Jon Peppler, Menlo Security Channels
Your Botnet is My Botnet: Analysis of a Botnet Takeover
Unit 1.6 Systems security Lesson 2
Section 14.1 Section 14.2 Identify the technical needs of a Web server
Unit# 5: Internet and Worldwide Web
Securing Windows 7 Lesson 10.
Cyber security and Computer Misuse
Test 3 review FTP & Cybersecurity
4.01 How Web Pages Work.
The Internet and Electronic mail
Wireless Spoofing Attacks on Mobile Devices
Marcial Quinones-Cardona
Presented by Shashank Shekhar Sahoo
Presentation transcript:

Your Botnet is my Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of California, Santa Barbara [bstone,marco,sullivan,rgilbert,msz,kemm,chris,vigna]@cs.ucsb.edu Presented by: Siddharth Pathak (as part of CSCE 715 curriculum- Spring 2017)

BOTNETS

What is a Botnet? A botnet is a number of Internet-connected devices used by a botnet owner to perform various tasks. Botnets can be used to perform Distributed Denial Of Service Attack, steal data, send spam, allow the attacker access to the device and its connection. The owner can control the botnet using command and control (C&C) software. [1] [1] Source: Wikipedia

Approaches to Analyze Botnets Passive & Active Attacks Network Analysis - Collecting Spam Emails, Observing DNS queries, Analyze netflow data. Infiltration - using an actual malware sample or a client simulating a bot- these samples could be obtained by honeypots, honey clients or spam traps. Hijacking (Torpig) - Taking control of the C&C channel. A Botnet Takeover.

TORPIG

Torpig (Background) Distributed as a part of Mebroot Rootkit. “One of the most advanced pieces of crimeware ever created” Distributed as a part of Mebroot Rootkit. Victims infected by drive-by-download attacks. Mebroot injects Torpig modules into popular applications, and so Torpig and monitor them and store significant information. Performs active Phishing Attacks and sends information back to C&C. Communication in the Torpig Botnet lack basic CIA , a fact which authors exploited to gain control of the botnet.

Torpig (Mechanism)

Torpig (Mechanism cont.) Web pages on legitimate but vulnerable web sites are modified with the inclusion of HTML tags. The HTML tags cause victim’s web browser to request JavaScript code. This JS code is requested from a website (drive-by-download server), This JavaScript code launches a number of exploits against the browser. If any exploit is successful, an executable is downloaded from the drive-by- download server to the victim machine, and it is executed. (Mebroot) Mebroot contacts the Mebroot C&C server to obtain malicious modules. Periodically, Torpig contacts the Torpig C&C server to upload the data stolen since the previous reporting time. Phishing attacks performed in two phases with the help of an Injection Server.

Domain Flux (Communication between bots and C&C servers) Each bot uses a domain generation algorithm (DGA) to compute a list of domain names. This list is computed independently by each bot and is regenerated periodically. Then, the bot attempts to contact the hosts in the domain list in order until one succeeds, i.e., the domain resolves to an IP address and the corresponding server provides a response that is valid in the botnet’s protocol. If a domain is blocked, the bot simply rolls over to the following domain in the list. Domain flux is also used to contact the Mebroot C&C servers and the drive- by-download servers.

DGA Domain Generation Algorithm

TAKING CONTROL

Sinkholing Preparation The authors purchased service from two different hosting providers that are well-known to be unresponsive to abuse complaints, and registered their .com and .net domains with two different registrars. Then they set up an Apache web server to receive and log bot requests, and recorded all network traffic. Then automated the process of downloading the data from hosting providers. Once a data file was downloaded, they removed it from the server on the hosting provider. Therefore, if the servers were compromised, an attacker would not have access to any historical data.

Data Collection Principles PRINCIPLE 1. The sinkholed botnet should be operated so that any harm and/or damage to victims and targets of attacks would be minimized. When a bot contacted the server, always replied with an okn message and never sent it a new configuration file. By responding with okn, the bots remained in contact only with the author’s servers. PRINCIPLE 2. The sinkholed botnet should collect enough information to enable notification and remediation of affected parties. The authors worked with ISPs and law enforcement agencies, including the United States Department of Defense (DoD) and FBI Cybercrime units, to assist them with this effort.

BOTNET ANALYSIS

Data Collection & Format All bots communicate with the Torpig C&C through HTTP POST requests. The URL used for this request contains the hexadecimal representation of the bot identifier and a submission header. The body of the request contains the data stolen from the victim’s machine, if any. The submission header and the body are encrypted using the Torpig encryption algorithm (base64 and XOR). The bot identifier (a token that is computed on the basis of hardware and software characteristics of the infected machine) is used as the symmetric key and is sent in the clear.

Botnet Size Counting Bots by nid Counting Bots by Submission Header Counting unique nids underestimates the botnet’s footprint. Counting Bots by Submission Header By counting unique tuples from the Torpig headers consisting of (nid, os, cn, bld, ver), the authors estimated that the botnet’s footprint for the ten days of monitoring consisted of 182,914 machines.

Botnet Size (cont.) Identifying Probers & Researchers The authors determined the nid values generated on a standard configuration of the VMware and QEMU virtual machines and found 40 hosts using these values. (Possibly researchers) They identified hosts that send invalid requests to the C&C server (i.e., requests that cannot be generated by Torpig bots). For example, these bots used the GET HTTP method in requests where a real Torpig bot would use the POST method. Using this approach, they discounted another 74 hosts. They further ignored background noise, such as scanning of the web server and traffic from search engine bots. After subtracting probers and researchers, the final estimate of the botnet’s footprint was 182,800 hosts.

Botnet Size (cont.) Botnet Size vs IP Count Figure 5 displays the number of unique IP addresses observed. Figure 6 shows average number of new bots per hour. Figure 7 shows how the number of cumulative new IP addresses over time increased linearly. While Figure 8 shows how the aggregate number of new bots observed decayed quickly. Figure 9 entails that the observed number of unique bot IDs per hour and the number of unique IP addresses,are virtually identical. While Figure 10 shows that the number of IPs per day does not accurately reflect the botnet’s live population.

Botnet Size (cont.) New Infections New infections were approximated by counting the number of distinct victims whose initial submission header contains a timestamp of 0. 49,294 new infections were estimated whilst the authors controlled the C&C.

Botnet as a Service Torpig transmits its build type in all communications with the C&C server, and, in particular, includes it in both the submission header (as the bld parameter) and in each data item contained in a submission body (for example, in Figure 3 the build type was gnh5). Therefore, the most convincing explanation of the build type is that it denotes different “customers” of the Torpig botnet, who, presumably, get access to their data in exchange for a fee. If correct, this interpretation would mean that Torpig is actually used as a “malware service”, accessible to third parties who do not want or cannot build their own botnet infrastructure. Following slides show some examples of Botnet Services available on the darknet.

Source 1: https://blog. radware

Source 1: https://blog. radware

THREATS & DATA ANALYSIS

Financial Data Stealing Torpig obtained the credentials of 8,310 accounts at 410 different institutions. The top targeted institutions were PayPal (1,770 accounts), PosteItaliane (765), Capital One (314), E*Trade (304), and Chase (217). On the other end of the spectrum, a large number of companies had only a handful of compromised accounts (e.g., 310 had ten or less). The most common cards include Visa (1,056), MasterCard (447), American Express (81), Maestro (36), and Discover (24).

Proxies Torpig opens two ports on the local machine, one to be used as a SOCKS proxy, the other as an HTTP proxy. 20.2% of the machines we observed were publicly accessible. Their proxies, therefore, could be easily leveraged by miscreants to, for example, send spam or navigate anonymously. While we have no evidence that the presence of these IPs on the ZEN blocklist is a consequence of the Torpig infection, it is clear that Torpig has the potential to drag its victims into a variety of malicious activities. Furthermore, since most IPs are “clean”, they can be used for spamming, anonymous navigation, or other dubious enterprises.

Denial-of-Service Considering there were more than 70,000 active hosts at peak intervals. Using 435 kbps as a conservative estimate for each bot’s upstream bandwidth. The aggregate bandwidth for the DSL/Cable connections is roughly 17 Gbps. If we further add in corporate networks, which account for 22% of infected hosts, and consider that they typically have significantly larger upstream connections, the aggregate bandwidth is likely to be considerably higher. Hence, a botnet of this size could cause a massive distributed denial-of-service (DDoS) attack.

Password Analysis Almost 28% of the victims reused their credentials for accessing 368,501 websites. For each infected host H, the authors retrieved all the unique username and password pairs c submitted by H. Afterward, the number wc of distinct web services where a credential c was used was obtained. Finally, we concluded that c had been reused across wc different web services, if wc was greater than or equal to 2.

CONCLUSION

Concluding Remarks.. The authors present a comprehensive analysis of the operations of the Torpig botnet. Controlling hundreds of thousands of hosts that were volunteering Gigabytes of sensitive information provided us with the unique opportunity to understand both the characteristics of the botnet victims and the potential for profit and malicious activity of the botnet creators. Ultimately they concluded that simple rules of behavior imposed by the US government would go a long way toward preventing obviously-malicious behavior.

Some lessons learned The authors found that a naïve evaluation of botnet size based on the count of distinct IPs yields grossly overestimated results (a finding that confirms previous, similar results). The victims of botnets are often users with poorly maintained machines that choose easily guessable passwords to protect access to sensitive sites. Interacting with registrars, hosting facilities, victim institutions, and law enforcement is a rather complicated process. In some cases, simply identifying the point of contact for one of the registrars involved required several days of frustrating attempts.

THANK YOU.