Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer,

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

A look into Bullet Proof Hosting November DefCamp 5 Silviu Sofronie – Head of Forensics
A Survey of Botnet Size Measurement PRESENTED: KAI-HSIANG YANG ( 楊凱翔 ) DATE: 2013/11/04 1/24.
Your Botnet is My Botnet: Analysis of a Botnet Takeover
Breaking Trust On The Internet
BRETT STONE-GROSS, MARCO COVA, LORENZO CAVALLARO, BOB GILBERT, MARTIN SZYDLOWSKI, RICHARD KEMMERER, CHRISTOPHER KRUEGEL, AND GIOVANNI VIGNA PRESENTATION.
Zombie or not to be: Trough the meshes of Botnets - Guillaume Lovet AVAR 2005 Tianjin, China.
MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Cyber X-Force-SMS alert system for threats.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
 What is a botnet?  How are botnets created?  How are they controlled?  How are bots acquired?  What type of attacks are they responsible for? 
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Threat infrastructure: proxies, botnets, fast-flux
On the Feasibility of Large-Scale Infections of iOS Devices
Borrowed from Brent ByungHoon Kang, GMU. A Network of Compromised Computers on the Internet IP locations of the Waledac botnet. Borrowed from Brent ByungHoon.
Authors: Thomas Ristenpart, et at.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
2009/9/151 Rishi : Identify Bot Contaminated Hosts By IRC Nickname Evaluation Reporter : Fong-Ruei, Li Machine Learning and Bioinformatics Lab In Proceedings.
Web Client/Server Communication A290/A590, Fall /09/2014.
1. Introduction The underground Internet economy Web-based malware The system analyzing the post-infection network behavior of web-based malware How do.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Botnets Uses, Prevention, and Examples. Background Robot Network Programs communicating over a network to complete a task Adapted new meaning in the security.
Reconnaissance & Enumeration Baseline, Monitor, Detect, Analyze, Respond, & Recover Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago,
1 Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling - Proceedings.
1 UCR Know thy enemy: what do attackers want? Slide credits: some slides adapted from Lorenzo Cavallaro and others.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
資安新聞簡報 報告者:劉旭哲、曾家雄. Spam down, but malware up 報告者:劉旭哲.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Cyber Crimes.
 Collection of connected programs communicating with similar programs to perform tasks  Legal  IRC bots to moderate/administer channels  Origin of.
Report: 鄭志欣 Conference: Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Chris Kruegel, and Giovanni.
APT29 HAMMERTOSS Jayakrishnan M.
BotNet Detection Techniques By Shreyas Sali
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Jeong, Hyun-Cheol. 2 Contents DDoS Attacks in Korea 1 1 Countermeasures against DDoS Attacks in Korea Countermeasures against DDoS Attacks in.
Botnets: Yesterday, Today, and Tomorrow CS 598: Advanced Internet Presented by: Imranul Hoque.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross,
Botnet behavior and detection October RONOG Silviu Sofronie – a Head of Forensics.
Automatically Generating Models for Botnet Detection Presenter: 葉倚任 Authors: Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel,
Not So Fast Flux Networks for Concealing Scam Servers Theodore O. Cochran; James Cannady, Ph.D. Risks and Security of Internet and Systems (CRiSIS), 2010.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
Sid Stamm, Zulfikar Ramzan and Markus Jokobsson Erkang Xu.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Malicious Software.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
Botnets Borrowed from Brent ByungHoon Kang, GMU. A Network of Compromised Computers on the Internet IP locations of the Waledac botnet. Borrowed from.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
Powerpoint presentation on Drive-by download attack -By Yogita Goyal.
Fast Flux Hosting and DNS ICANN SSAC What is Fast Flux Hosting? An evasion technique Goal of all fast flux variants –Avoid detection and take down of.
Published: USENIX HotBots, 2007 Presented: Wei-Cheng Xiao 2016/10/11.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Botnets A collection of compromised machines
A lustrum of malware network communication: Evolution & insights
Botnets A collection of compromised machines
Your Botnet is My Botnet: Analysis of a Botnet Takeover
Your Botnet is my Botnet: Analysis of a Botnet Takeover
Presentation transcript:

Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings of the 16th ACM conference on Computer and communications security,2009 報告人 : 徐裕量 2009/11/10

Outline Introduction Domain flux Taking control of the Botnet Botnet analysis Threats and data analysis Conclusion

Introduction Botnets are the primary means for cyber- criminals to carry out their nefarious tasks,such as  sending spam mails,  launching denial-of-service attacks  stealing personal data such as mail accounts or bank credentials.

Introduction (cont.) Once infected with a bot, the victim host will join a botnet, which is a network of compromised machines that are under the control of a malicious entity, typically referred to as the botmaster. Malware was developed for fun, to the current situation, where malware is spread for financial profit.

Introduction (cont.) One approach to study botnets is to perform passive analysis of secondary effects that are caused by the activity of compromised machines.  Collected spam mails that were likely sent by bots  Similar measurements focused on DNS queries or DNS blacklist queries  analyzed network traffic (netflow data) at the tier-1 ISP level for cues that are characteristic for certain botnets

Introduction (cont.) Active approach to study botnets is via infiltration.  Using an actual malware sample or a client simulating a bot, researchers join a botnet to perform analysis from the inside.  To achieve this, honeypots, honey clients, or spam traps are used to obtain a copy of a malware sample.

Introduction (cont.) Attackers have unfortunately adapted, and most current botnets use stripped-down IRC or HTTP servers as their centralized command and control channels. One way to achieve this is to directly seize the physical machines that host the C&C infrastructure.

Introduction (cont.) Therefore, by collaborating with domain registrars, it is possible to change the mapping of a botnet domain to point to a machine controlled by the defender. Several recent botnets, including Torpig, use the concept of domain flux.

Introduction (cont.) Torpig has been distributed to its victims as part of Mebroot.  Mebroot is a rootkit that takes control of a machine by replacing the system’s Master Boot Record (MBR).  This allows Mebroot to be executed at boot time, before the operating system is loaded, and to remain undetected by most anti-virus tools.

Introduction (cont.)

Torpig uses phishing attacks to actively elicit additional, sensitive information from its victims, which, otherwise, may not be observed during the passive monitoring it normally performs.  First, whenever the infected machine visits one of the domains specified in the configuration file (typically, a banking web site), Torpig issues a request to an injection server.  The second step occurs when the user visits the trigger page. At that time, Torpig requests the injection URL from the injection server and injects the returned content into the user’s browser.

Introduction (cont.)

Domain flux Botnet authors have identified several ways to make these schemes more flexible and robust against take-down actions, e.g., by using IP fast- flux techniques. With fast-flux, the bots would query a certain domain that is mapped onto a set of IP addresses, which change frequently. However, fast-flux uses only a single domain name, which constitutes a single point of failure.

Domain flux (cont.) Torpig solves this issue by using a different technique for locating its C&C servers, which we refer to as domain flux. If a domain is blocked, the bot simply rolls over to the following domain in the list. Using the generated domain name dw, a bot appends a number of TLDs: in order, dw.com, dw.net, and dw.biz.

Domain flux (cont.)

If all three connections fail, Torpig computes a “daily” domain, say dd, which in addition depends on the current day. Unfortunately, this is a countermeasure that is already in use. Newer variants of Conficker generate 50,000 domains per day and introduce non-determinism in their generation algorithm.

Taking control of the Botnet we were able to register the.com and.net domains that were to be used by the botnet for three consecutive weeks from January 25th, 2009 to February 15th, However, on February 4th, 2009, the Mebroot controllers distributed a new Torpig binary that updated the domain algorithm.

Taking control of the Botnet (cont.) During the ten days that we controlled the botnet, we collected over 8.7GB of Apache log files and 69GB of pcap data. However, on January 19th, when we started our collection, we instantly received HTTP requests from 359 infected machines.

Taking control of the Botnet (cont.) PRINCIPLE 1.  The sinkholed botnet should be operated so that any harm and/or damage to victims and targets of attacks would be minimized. PRINCIPLE 2.  The sinkholed botnet should collect enough information to enable notification and remediation of affected parties.

Botnet analysis The submission header and the body are encrypted using the Torpig encryption algorithm (base64 and XOR).  The header contains the time stamp when the configuration file was last updated (ts),  the IP address of the bot (ip),  the port numbers of the HTTP and SOCKS proxies that Torpig opens on the infected machine (hport and sport),  the operating system version and locale (os and cn),  the bot identifier (nid),  and the build and version number of Torpig (bld and ver)

Botnet analysis (cont.)

Counting Bots by nid The algorithm first queries the primary SCSI hard disk for its model and serial numbers. If no SCSI hard disk is present, or retrieving the disk information is unsuccessful, it will then try to extract the same information from the primary physical hard disk drive (i.e., IDE or SATA). The disk information is then used as input to a hashing function that produces the final nid value. If retrieving hardware information fails, the nid value is obtained by concatenating the hard-coded value of 0xBAD1D222 with the Windows volume serial number.

Botnet analysis (cont.) As a reference point, between Jan 25, 2009 and February 4, 2009, 180,835 nid values were observed. By counting unique tuples from the Torpig headers consisting of (nid, os, cn, bld, ver), we estimate that the botnet’s footprint for the ten days of our monitoring consisted of 182,914 machines. After subtracting probers and researchers, our final estimate of the botnet’s footprint is 182,800 hosts.

Botnet analysis (cont.)

During our study, we observed 12 different values for the bld parameter: dxtrbc, eagle, gnh1, gnh2, gnh3, gnh4, gnh5, grey, grobin, grobin1, mentat, and zipp. Not all builds contribute equally to the amount of data stolen. The most active versions are dxtrbc (5,432,528 submissions), gnh5 (2,836,198), and mentat (1,582,547).

Threats and data analysis

Threats and data analysis (cont.) Symantec indicated ranges of prices for common goods and, in particular, priced credit cards between $0.10–$25 and bank accounts from $10–$1,000. If these figures are accurate, in ten days of activity, the Torpig controllers may have profited anywhere between $83K and $8.3M.

Threats and data analysis (cont.)

Conclusion we present a comprehensive analysis of the operations of the Torpig botnet. First, we found that a naïve evaluation of botnet size based on the count of distinct IPs yields grossly overestimated results. Second, the victims of botnets are often users with poorly maintained machines that choose easily guessable passwords to protect access to sensitive sites.

Conclusion (cont.) Third, we learned that interacting with registrars, hosting facilities, victim institutions, and law enforcement is a rather complicated process.

Question?