UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross,

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

A Survey of Botnet Size Measurement PRESENTED: KAI-HSIANG YANG ( 楊凱翔 ) DATE: 2013/11/04 1/24.
Your Botnet is My Botnet: Analysis of a Botnet Takeover
BRETT STONE-GROSS, MARCO COVA, LORENZO CAVALLARO, BOB GILBERT, MARTIN SZYDLOWSKI, RICHARD KEMMERER, CHRISTOPHER KRUEGEL, AND GIOVANNI VIGNA PRESENTATION.
Zombie or not to be: Trough the meshes of Botnets - Guillaume Lovet AVAR 2005 Tianjin, China.
MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
 What is a botnet?  How are botnets created?  How are they controlled?  How are bots acquired?  What type of attacks are they responsible for? 
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
WEB SECURITY. WEB ATTACK TYPES Buffer OverflowsXML InjectionsSession Hijacking Attacks WEB Attack Types.
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
Understanding the Network-Level Behavior of Spammers Mike Delahunty Bryan Lutz Kimberly Peng Kevin Kazmierski John Thykattil By Anirudh Ramachandran and.
The problems associated with operating an effective anti-spam blocklist system in an increasingly hostile environment. Robert Gallagher September 2004.
1 Software Testing and Quality Assurance Lecture 32 – SWE 205 Course Objective: Basics of Programming Languages & Software Construction Techniques.
Threat infrastructure: proxies, botnets, fast-flux
On the Feasibility of Large-Scale Infections of iOS Devices
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
1. Introduction The underground Internet economy Web-based malware The system analyzing the post-infection network behavior of web-based malware How do.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Botnets Uses, Prevention, and Examples. Background Robot Network Programs communicating over a network to complete a task Adapted new meaning in the security.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
1 Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling - Proceedings.
Botnets An Introduction Into the World of Botnets Tyler Hudak
資安新聞簡報 報告者:劉旭哲、曾家雄. Spam down, but malware up 報告者:劉旭哲.
Speaker : YUN–KUAN,CHANG Date : 2009/10/13 Working the botnet: how dynamic DNS is revitalising the zombie army.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Cyber Crimes.
 Collection of connected programs communicating with similar programs to perform tasks  Legal  IRC bots to moderate/administer channels  Origin of.
Report: 鄭志欣 Conference: Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Chris Kruegel, and Giovanni.
APT29 HAMMERTOSS Jayakrishnan M.
Niels Provos and Panayiotis Mavrommatis Google Google Inc. Moheeb Abu Rajab and Fabian Monrose Johns Hopkins University 17 th USENIX Security Symposium.
14 Publishing a Web Site Section 14.1 Identify the technical needs of a Web server Evaluate Web hosts Compare and contrast internal and external Web hosting.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
XHTML Introductory1 Linking and Publishing Basic Web Pages Chapter 3.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Botnets: Yesterday, Today, and Tomorrow CS 598: Advanced Internet Presented by: Imranul Hoque.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
Botnet behavior and detection October RONOG Silviu Sofronie – a Head of Forensics.
BOTNETS Presented By : Ramesh kumar Ramesh kumar 08EBKIT049 08EBKIT049 A BIGGEST THREAT TO INERNET.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
Christopher Kruegel University of California Engin Kirda Institute Eurecom Clemens Kolbitsch Thorsten Holz Secure Systems Lab Vienna University of Technology.
Studying Spamming Botnets Using Botlab 台灣科技大學資工所 楊馨豪 2009/10/201 Machine Learning And Bioinformatics Laboratory.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Sid Stamm, Zulfikar Ramzan and Markus Jokobsson Erkang Xu.
Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer,
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
Role Of Network IDS in Network Perimeter Defense.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
E-Commerce & Bank Security By: Mark Reed COSC 480.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
Powerpoint presentation on Drive-by download attack -By Yogita Goyal.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
TMG Client Protection 6NPS – Session 7.
A lustrum of malware network communication: Evolution & insights
Ad-blocker circumvention System
Your Botnet is My Botnet: Analysis of a Botnet Takeover
Chapter 19 Domain Name System (DNS)
Section 14.1 Section 14.2 Identify the technical needs of a Web server
Your Botnet is my Botnet: Analysis of a Botnet Takeover
Presentation transcript:

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Outline Introduction Domain flux Taking control of the Botnet Botnet analysis Threats and data analysis Conclusion

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Introduction A botnet is a collection of compromised computers connected to the Internet. Termed "bots", they are used for malicious purposes. When a computer becomes compromised, it becomes a part of a botnet. Botnets are usually controlled via standards based network protocols such as IRC and http.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Introduction (cont.)

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Introduction (cont.) Botnets are the primary means for cyber-criminals to carry out their malicious tasks sending spam mails launching denial-of-service attacks stealing personal data such as mail accounts or bank credentials.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Introduction (cont.) Once infected with a bot, the victim host will join a botnet, which is a network of compromised machines that are under the control of a malicious entity, typically referred to as the botmaster. First malware was developed for fun, Right now malware is spread for financial profit.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Introduction (cont.) Approch to study botnets One approach to study botnets is to perform passive analysis of secondary effects that are caused by the activity of compromised machines. –Collected spam mails that were likely sent by bots Similar measurements focused on DNS queries or DNS blacklist queries Analysis of secondary effects provides insights into particular botnet-related behaviors, one can typically only monitor a small portion of the Internet.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Introduction (cont.) Active approach to study botnets is via infiltration. –Using an actual malware sample or a client simulating a bot, researchers join a botnet to perform analysis from the inside. –To achieve this, honeypots, honey clients, or spam traps are used to obtain a copy of a malware sample.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Introduction (cont.) Attackers have unfortunately adapted, and most current botnets use stripped-down IRC or HTTP servers as their centralized command and control channels. One way to achieve this is to directly seize the physical machines that host the C&C infrastructure.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Introduction (cont.) By collaborating with domain registrars, it is possible to change the mapping of a botnet domain to a machine which is controlled by the defender. Several recent botnets, including Torpig, use the concept of domain flux.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Introduction (cont.) Torpig uses Mebroot to get new victims –Mebroot is a rootkit that takes control of a machine by replacing the system’s Master Boot Record (MBR). –This allows Mebroot to be executed at boot time, before the operating system is loaded, and to remain undetected by most anti-virus tools.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Introduction (cont.) How Torpig distributes and gets data

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Introduction (cont.) Torpig uses phishing attacks to actively elicit additional, sensitive information from its victims. This performance may not be observed during the passive monitoring it normally performs. –First, whenever the infected machine visits one of the domains specified in the configuration file (typically, a banking web site), Torpig issues a request to an injection server. –The second step occurs when the user visits the trigger page. At that time, Torpig requests the injection URL from the injection server and injects the returned content into the user’s browser.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Introduction (cont.)

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Domain flux Botnet authors have identified several ways to make these schemes more flexible and robust against take-down actions, e.g., by using IP fast-flux techniques. With fast-flux, the bots would query a certain domain that is mapped onto a set of IP addresses, which change frequently. However, fast-flux uses only a single domain name, which constitutes a single point of failure.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Domain flux (cont.) Torpig solves this issue by using a different technique for locating its C&C servers: domain flux. If a domain is blocked, the bot simply rolls over to the following domain in its domain list. Using the generated weekly domain: dw, a bot appends a number of TLDs: in order, dw.com, dw.net, and dw.biz.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Domain flux (cont.) If all three connections fail, Torpig computes a “daily” domain: dd, appending as the above. They did not register all the weekly domains in advance, which was a critical factor in enabling our hijacking. The feasibility of these sinkholing attacks depends not only on technical means but also on economic factors. Generating those domains requires an inexpensive modification while registering them costs time and money

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Domain flux (cont.)

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Taking control of the Botnet Author registered the.com and.net domains that were to be used by the botnet from January 25th, 2009 to February 15th, However, on February 4th, 2009, the Mebroot controllers distributed a new Torpig binary that updated the domain algorithm.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Taking control of the Botnet (cont.) During the ten days that author controlled the botnet, and collected over 8.7GB of Apache log files and 69GB of pcap data. However, on January 19th, when we started our collection, we instantly received HTTP requests from 359 infected machines.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Taking control of the Botnet (cont.) Author protected the victims according to: PRINCIPLE 1. –The sinkholed botnet should be operated so that any harm and/or damage to victims and targets of attacks would be minimized. PRINCIPLE 2. –The sinkholed botnet should collect enough information to enable notification and remediation of affected parties.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Botnet analysis The submission header and the body are encrypted using the Torpig encryption algorithm (base64 and XOR). –The header contains the time stamp when the configuration file was last updated (ts), –the IP address of the bot (ip), –the port numbers of the HTTP and SOCKS proxies that Torpig opens on the infected machine (hport and sport), –the operating system version and locale (os and cn), –the bot identifier (nid), –and the build and version number of Torpig (bld and ver)

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Botnet analysis (cont.)

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Botnet analysis (cont.)

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Botnet size Botnet analysis (cont.) Botnet size Counting Bots by nid this value was unique for each machine and remained constant over time therefore, it would provide an accurate method to uniquely identify each bot.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Botnet analysis (cont.) Authors were able to reconstruct the algorithm used to compute this 8-byte value by reverse engineering the Torpig binary. For static, the nid depends on (software or hardware) characteristics of the infected machine’s hard disk. For unique, authors correlated this value with the other information provided in the submission header. 2,079 cases for which this assumption did not hold. between Jan 25, 2009 and February 4, 2009, 180,835 nid values were observed.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Botnet analysis (cont.) Counting unique tuples the Torpig headers consisting of (nid, os, cn, bld, ver), authors estimate that the botnet’s footprint for the ten days of their monitoring consisted of 182,914 machines. security researchers & other curious individuals virtual machines are often used by researchers; hosts that send invalid requests After subtracting probers and researchers, our final estimate of the botnet’s footprint is 182,800 hosts.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Botnet analysis (cont.) the number of unique IP addresses observed during the ten days.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering the number of new bots observed during the ten days.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Botnet analysis (cont.) The similarity between bot IDs and IPs per hour is a consequence of each infected host connecting to the C&C every 20 minutes

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering the number of IPs per day does not accurately reflect the botnet’s live population, with a difference of 36.5% between IP addresses and bot IDs.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Botnet analysis (cont.)

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Botnet analysis (cont.) Figure 11 shows the new infections over time.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Botnet analysis (cont.) Botnet as a service Torpig DLLs are marked with a build type represented by the bld field in the header. 12 different values for the bld parameter: dxtrbc, eagle, gnh1, gnh2, gnh3, gnh4, gnh5, grey, grobin, grobin1, mentat, and zipp. the most convincing explanation of the build type is that it denotes different “customers” of the Torpig botnet, who, presumably, get access to their data in exchange for a fee.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Threats and data analysis Financial Data Stealing Torpig is specifically crafted to obtain information that can be readily monetized in the underground market. “man-in-the-browser” phishing attacks in ten days of activity, the Torpig controllers may have profited anywhere between $83K and $8.3M.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Threats and data analysis (cont.) the number of accounts at financial institutions that were stolen by Torpig and sent to our C&C server.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Threats and data analysis (cont.) Proxies Authors wanted to verify if spam was sent through machines in the Torpig botnet. Torpig has the potential to drag its victims into a variety of malicious activities.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Threats and data analysis (cont.) Denial-of Service using 435 kbps as a conservative estimate for each bot’s upstream bandwidth. The aggregate bandwidth for the DSL/Cable connections is roughly 17 Gbps a botnet of this size could cause a massive distributed denial- of-service (DDoS) attack.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Threats and data analysis (cont.) Password Analysis almost 28% of the victims reused their credentials for accessing 368,501 web sites.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Conclusion Author addresses a comprehensive analysis of the operations of the Torpig botnet. First, a naïve evaluation of botnet size based on the count of distinct IPs yields grossly overestimated results. Second, the victims of botnets are often users with poorly maintained machines that choose easily guessable passwords to protect access to sensitive sites. Third, interacting with registrars, hosting facilities, victim institutions, and law enforcement is a rather complicated process.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Thank you & Question?