Mapping Out Cyber Crime Infrastructure A Law Enforcement Approach Jon Flaherty UK National Cyber Crime Unit 13 th May 2015 RIPE 70 - Amsterdam.

Slides:



Advertisements
Similar presentations
Module II Footprinting
Advertisements

Who cares about abuse? Rodney Tillotson, JANET-CERT APNIC, August 2001 United Kingdom Education & Research Networking Association.
Module 13: Implementing ISA Server 2004 Enterprise Edition: Site-to-Site VPN Scenario.
Internet Basics The Internet Is… – a network of networks – a community of people, businesses, schools and organizations – , web pages, databases,
Managing IP addresses for your private clouds 2013 ASEAN CAS Summit Bangkok, Thailand 7 February 2013 George Kuo Member Services Manager.
IPv4 Run Out and Transitioning to IPv6 Marco Hogewoning Trainer, RIPE NCC.
NetScanTools ® LE Law Enforcement Version of NetScanTools ® from Northwest Performance Software, Inc. netscantools.com.
December 2013 Internet Number Resource Report. December 2013 Internet Number Resource Report INTERNET NUMBER RESOURCE STATUS REPORT As of 31 December.
March 2014 Internet Number Resource Report. March 2014 Internet Number Resource Report INTERNET NUMBER RESOURCE STATUS REPORT As of 31 March 2014 Prepared.
Handling Internet Network Abuse Reports at APNIC 21 October 2010 LAP-CNSA Workshop, Melbourne George Kuo.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Copyright 2012 Trend Micro Inc. Raimund Genes, CTO Innovation In Cloud Security.
Canadian*- US Law Enforcement Internet Governance Cooperative Efforts April 19, 2010 Marc Moreau Royal Canadian Mounted Police Robert Flaim Federal Bureau.
CSC586 Network Forensics IP Tracing/Domain Name Tracing.
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
IBM Security Network Protection (XGS)
Authors: Thomas Ristenpart, et at.
Internet Operations and the RIRs. Overview ARIN and the Regional Internet Registry (RIR) System IP Number Resources, DNS and Routing IP Address Management.
IP Address Management The RIR System & IP policy
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Windows Server 2008 Chapter 8 Last Update
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
ES 101. Module 3 Domain Name System (DNS). Last Lecture Routing and IP addressing.
PacNOG 6: Nadi, Fiji Dealing with DDoS Attacks Hervey Allen Network Startup Resource Center.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 The Impact of IPv6 on Society ~ a Government Perspective ~ Kaori ITO Ministry of Public Management, Home Affairs, Posts and Telecommunications ( MPHPT)
Mr C Johnston ICT Teacher
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E Database SIG APNIC Database Privacy Issues 1 March 2001 APRICOT, Malaysia Fabrina.
Confidential and proprietary material for authorized Verizon Business personnel only. Use, disclosure or distribution of this material is not permitted.
CRIO: Scaling IP Routing with the Core Router-Integrated Overlay Xinyang (Joy) Zhang Paul Francis Jia Wang Kaoru Yoshida.
Database Update Kaveh Ranjbar Database Department Manager, RIPE NCC.
Overview Who is AusRegistry? Why use the existing infrastructure? What this means for you? Questions raised and Important points.
Internet Addressing and the RIR system 11 February 2004 Phnom Penh, Cambodia Paul Wilson, APNIC.
Prepared by The Regional Internet Registries [APNIC, ARIN, LACNIC and RIPE NCC]
DNS & SPAM SHAREPOINT 2010 IT:NETWORK:APPLICATIONS.
Introduction to The Internet ISP Workshops 1 Last updated 24 April 2013.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
CIS 450 – Network Security Chapter 3 – Information Gathering.
Module 4: Fundamentals of Communication Technologies.
Deploying a Web Application Presented By: Muhammad Naveed Date:
1 APNIC allocation and policy update JPNIC OPM July 17, Tokyo, Japan Guangliang Pan.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Chapter 5: Implementing Intrusion Prevention
UNIVERSAL ACCEPTANCE Presentation at APNIC Edmon Chung.
AFRINIC Update Anne-Rachel Inné COO, AFRINIC ARIN 32, Phoenix October 2013.
17 March 2002IEPG - Minneapolis RIR Update A Joint Presentation Prepared By APNIC, ARIN, RIPE NCC.
Anne Lord & Mirjam Kühne. AfNOG Workshop, 10 May IP Address Management AfNOG Workshop, 11 May 2001 Accra, Ghana presented by:
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Resource Quality Assurance in LACNIC Arturo L. Servin APNIC 31.
Domain name forensics: a systematic approach to investing an internet presence Source : Digital Investigation (2004) 1, Date : Mar. 7 th, 2006.
Securing Future Growth: Getting Ready for IPv6 NOW! ccTLD Workshop, 8 th April 2011 Noumea, New Caledonia Miwa Fujii, Senior IPv6 Program Specialist, APNIC.
30 April 2003 ITU SG2, Geneva, Switzerland Axel Pawlik, RIPE NCC Information Document 21-E ITU-T Study Group 2 May 2003 Question:1/2 Source:TSB Title:The.
AFRINIC Update Madhvi Gokool Registration Service Manager RIPE66 meeting, Dublin May 2013.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
1 The Internet Registry System Mirjam Kühne RIPE NCC EC-POP Brussels 5 July 1999.
IPv4 IXP Address Policy APNIC Policy SIG Meeting Taipei, August 2001 Philip Smith.
Copyright (c) 2002 Japan Network Information Center Proposal for IPv6 Policy for Essential Infrastructure in the AP region Izumi Okutani IP Address Section.
Whois & Data Accuracy Across the RIRs. Terms ISP – An Internet Service Provider is allocated address space by an RIR for the purpose of providing connectivity.
Policy Implementation Report Leslie Nobile. Purpose Update the community on recently implemented policies Provide relevant operational details.
Under the Shadow of sunshine
Scaling Network Load Balancing Clusters
Global Registry Knowledge Update Leslie Nobile
We Care About Data Quality at IXPs
IPv6 address deployment status Paul Wilson, APNIC
IIS.
RIPE Whois Database Software Recent Changes
Joint IPv6 Forum/IPv6 SIG APNIC 15, Taipei, Taiwan 26 February 2003
A Proposal to Protect Historical Records in APNIC Whois Database
IPv6 Allocation Service in JPNIC
Presentation transcript:

Mapping Out Cyber Crime Infrastructure A Law Enforcement Approach Jon Flaherty UK National Cyber Crime Unit 13 th May 2015 RIPE 70 - Amsterdam

Cyber Crime Infrastructure “A Disposal Front End With A Static Stable Back End” Compromised and malicious domains hosting exploits Local log file tracing network intrusions / drops Leads to a common static and more stable IP infrastructure RIPE NCC members caught up in the middle of it ?

A New Approach “Targeting the Infra not the Incident” How does LE begin to map it ? Can we disrupt it ? Need for collaboration with RIPE community and service providers

TEST CASE AIM Attribute a suspect ISP and reseller infrastructure to “Bullet Proof Hosting” activity OBJECTIVES Design an ISP mapping strategy that visualises target infrastructure to enhance attribution and operational strategy

Mapping Strategy A 4 Stage Methodology Stage 1 : Collation of intelligence Stage 2 : IPv4 Network WHOIS research Stage 3 : Mapping IPv4 to DNS enrichment Stage 4 : Visualisation

Stage 1 - Collation of Intelligence What do we know so far ? Hosting provider and suspects located in one country Operating under alias names Single strand IPv4 intelligence linked to lots of cyber crime

Stage 2 – IPv4 Network WHOIS Research Mapping single strand intelligence across the WHOIS Find ISP & Reseller full IPv4 address ranges Dates of IP assignment Identify ASN / upstream providers who announce IP routes

Stage 2 Now what do we know ? Additional Hosting / Reseller IPv4 space Consistent hosting providers of reseller space Multiple RIPE NCC members announce target IP traffic Static IP infrastructure, small, consistent /27 IP address ranges RIPE WHOIS reveals more provider alias names and handles Small ARIN infrastructure

Stage 3 – Mapping IPv4 space to DNS Enrichment What domain traffic and types of service point to these ranges ? Web, Mail, Name, VPN Servers Number of sites hosted Historic domains Bad Traffic Data Enrichment – Abuse feeds

Stage 3 Now what do we know ? Target ISP ranges show legitimate web traffic UK reseller ranges carry known malicious traffic UK hosted GOZ and DGA activity across.eu ccTLD’s –.991ce.34691a c.1736.ced xxxxxx.xxxxx.eu GOZ privacy protected domains with a common registrar VPN end point servers and VPN over DNS traffic –ln-037.rd id v0.tun.vpnoverdns.com Beginning to see the bad from the good….

Stage 4 – Visualisation Charting the infrastructure Bulk domain WHOIS lookups Geo locating IP ranges and records Colour coded clusters Layering ownership Pattern matching

AIM Attribute a suspect ISP and reseller infrastructure to “Bullet Proof Hosting” activity OBJECTIVES Design an ISP mapping strategy that visualises target infrastructure to enhance attribution and operational strategy

BPH Picture Clean Front v Malicious Reseller End Ranges Diversified infra of PVS hosted content and VPN end points Reseller architecture across more than one member / country Small IP blocks / multiple RIPE Database handles An attraction to cheap virtual hosting / IXP ASN commonalities / sponsoring org’s for IP ranges Use of RIPE NCC tools gives LE more routes to best evidence……

Can We Disrupt The Abuse ? Need For Collaboration - Mapping infrastructure identifies abuse at greater scale LE migrating into proactive CERT prevention / outreach to Industry IP reseller intelligence mapped and shared to members PDNS entries notified as an ISP abuse issue / feed to Industry Malicious IP ranges become Spamhaus blacklist entries Privacy/Proxy abuse becomes an ICANN compliance submission

Questions