The Koobface Botnet and the Rise of Social Malware Kurt Thomas David M. Nicol

Slides:



Advertisements
Similar presentations
Managing the Security and Privacy Risks of Social Media Don Knox, CPP, CITRMS Global Security and Risk Analysis Manager Caterpillar (309)
Advertisements

@ SPAM : T HE U NDERGROUND ON 140 C HARACTERS OR L ESS Chris Grier, Vern Paxson, Michael Zhang University of California, Berkeley Kurt Thomas University.
RB-Seeker: Auto-detection of Redirection Botnet Presenter: Yi-Ren Yeh Authors: Xin Hu, Matthew Knysz, Kang G. Shin NDSS 2009 The slides is modified from.
7 Effective Habits when using the Internet Philip O’Kane 1.
Design and Evaluation of a Real-Time URL Spam Filtering Service
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
Design and Evaluation of a Real- Time URL Spam Filtering Service Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, Dawn Song University of California,
Cloak and Dagger. In a nutshell… Cloaking Cloaking in search engines Search engines’ response to cloaking Lifetime of cloaked search results Cloaked pages.
 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail.
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
Towards Online Spam Filtering in Social Networks Hongyu Gao, Yan Chen, Kathy Lee, Diana Palsetia and Alok Choudhary Lab for Internet and Security Technology.
CAP6135: Malware and Software Vulnerability Analysis Examples of Term Projects Cliff Zou Spring 2012.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology USENIX Security '08 Presented by Lei Wu.
1 Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling - Proceedings.
Presentation by Kathleen Stoeckle All Your iFRAMEs Point to Us 17th USENIX Security Symposium (Security'08), San Jose, CA, 2008 Google Technical Report.
11 The Ghost In The Browser Analysis of Web-based Malware Reporter: 林佳宜 Advisor: Chun-Ying Huang /3/29.
TwitterSearch : A Comparison of Microblog Search and Web Search
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
資安新聞簡報 報告者:劉旭哲、曾家雄. Spam down, but malware up 報告者:劉旭哲.
Phishing and Intrusion Prevention Tod Beardsley, TippingPoint (a division of 3Com), 02/15/06 – IMP-201.
WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream.
Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks.
APT29 HAMMERTOSS Jayakrishnan M.
Authors: Gianluca Stringhini Christopher Kruegel Giovanni Vigna University of California, Santa Barbara Presenter: Justin Rhodes.
Niels Provos and Panayiotis Mavrommatis Google Google Inc. Moheeb Abu Rajab and Fabian Monrose Johns Hopkins University 17 th USENIX Security Symposium.
John P., Fang Yu, Yinglian Xie, Martin Abadi, Arvind Krishnamurthy University of California, Santa Cruz USENIX SECURITY SYMPOSIUM, August, 2010 John P.,
Discovery of Emergent Malicious Campaigns in Cellular Networks Nathaniel Boggs, Wei Wang, Suhas Mathur, Baris Coskun, Carol Pincock © 2013 AT&T Intellectual.
Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs Justin Ma, Lawrence Saul, Stefan Savage, Geoff Voelker Computer Science.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Network and Systems Security By, Vigya Sharma (2011MCS2564) FaisalAlam(2011MCS2608) DETECTING SPAMMERS ON SOCIAL NETWORKS.
Suspended Accounts in Retrospect: An Analysis of Twitter Spam Kurt Thomas, Chris Grier, Vern Paxson, Dawn Song University of California, Berkeley International.
Jonell Baltazar, A Trend Micro Research Paper (Retrieved May 2010).
Supplied on \web site. on January 10 th, 2008 Reducing Risk Through Incremental Malware Detection January 2008.
Click to edit Master title style Click to edit Master text styles Second level Third level Fourth level Fifth level June 10 th, 2009Event details (title,
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
A Multifaceted Approach to Understanding the Botnet Phenomenon Authors : Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis Computer Science.
Botnet behavior and detection October RONOG Silviu Sofronie – a Head of Forensics.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Christopher Kruegel University of California Engin Kirda Institute Eurecom Clemens Kolbitsch Thorsten Holz Secure Systems Lab Vienna University of Technology.
Studying Spamming Botnets Using Botlab 台灣科技大學資工所 楊馨豪 2009/10/201 Machine Learning And Bioinformatics Laboratory.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
Published: Internet Measurement Conference (IMC) 2006 Presented by Wei-Cheng Xiao 2015/11/221.
Twitter Games: How Successful Spammers Pick Targets Vasumathi Sridharan, Vaibhav Shankar, Minaxi Gupta School of Informatics and Computing, Indiana University.
Studying Spamming Botnets Using Botlab
Trends in Circumventing Web-Malware Detection UTSA Moheeb Abu Rajab, Lucas Ballard, Nav Jagpal, Panayiotis Mavrommatis, Daisuke Nojiri, Niels Provos, Ludwig.
CNIT 124: Advanced Ethical Hacking Ch 10: Client-Side Exploitation.
Socialbots and its implication On ONLINE SOCIAL Networks Md Abdul Alim, Xiang Li and Tianyi Pan Group 18.
Detecting and Characterizing Social Spam Campaigns Yan Chen Lab for Internet and Security Technology (LIST) Northwestern Univ.
0wning the koobface botnet. intro web 2.0 botnet spreads through social networks –facebook –myspace –twitter, etc.
Phi.sh/$oCiaL: The Phishing Landscape through Short URLs Sidharth Chhabra *, Anupama Aggarwal †, Fabricio Benevenuto ‡, Ponnurangam Kumaraguru † * Delhi.
The hidden part of TDSS Sergey (k1k) Golovanov, Malware Expert Global Research and Analysis Team Kaspersky Lab.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Learning to Detect and Classify Malicious Executables in the Wild by J
Uncovering Social Spammers: Social Honeypots + Machine Learning
Social Media Attacks.
A lustrum of malware network communication: Evolution & insights
Malicious Advertisements
IT Security awareness Training.
Internet Worm propagation
Facebook Immune System
Presented by Aaron Ballew
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
Presentation transcript:

The Koobface Botnet and the Rise of Social Malware Kurt Thomas David M. Nicol

Motivation Online social networks becoming attractive target for scams – Unprotected population – Exploit user trust in ‘friends’ Scams propagated via stolen accounts – 86% of Twitter spam accounts compromised [Grier et al. CCS2010] – 97% of Facebook spam accounts compromised [Gao et al. IMC2010] Koobface botnet is a prime example – Steals social network credentials – Spreads to friends – Creates fake accounts to help seed infections

Contributions Develop emulator to infiltrate Koobface – Replays packets to C&C for work – Allows safe interact with botnet C&C Infrastructure: – 1,800 compromised domains – 4,100 zombies Fraudulent/Infected accounts: – 30,000 fraudulent Gmail accounts – 942 fraudulent Facebook accounts – 247 compromised Twitter accounts Blacklist catch only 26% of spammed URLs – Only 13% of detections occur within the window of users clicking URL

Outline Infection chain Developing emulator Spam characteristics Blacklist limitations

Infection Chain: Facebook Inbox message contains bit.ly URL to Blogspot account

Infection Chain: Blogspot location.href = ‘

Infection Chain: Compromised Domain location.href = ‘ ’

Infection Chain: Zombie User prompted to install Flash Player upgrade

Goal of Infiltration c Identify spam accounts c Identify abused services Identify compromised domains, availability cc Identify compromised machines, availability

Developing Emulator Capture sample in wild Run sample in Windows XP VM – Vary browser type – Seed with Facebook, Twitter, or no account Record outgoing packets Manually reverse engineer protocol – Includes binary analysis for encryption function

Extracting Protocol Messages Query for account to spam with: Query for URL to spam: Query for executables, actions:

Resulting Data Replayed C&C queries over one month, recovering: – 1,800 compromised domains – 4,100 zombie IPs Searched public tweets, recovering: – 247 Twitter compromised accounts – 2,847 malicious tweets Queried C&C for credentials, recovering: – 30,000 fraudulent Gmail accounts – 942 fraudulent Facebook accounts – 506 malicious messages

Spam Accounts Facebook: – Log into provided credentials (first confirm fraudulent) – Recover inbox, friend list Twitter: – Publicly search for spam strings; “OMFG!! You must see…” – Save all tweets, friend list; filter benign messages Profile StatisticFacebookTwitter Accounts Messages Templates47613 Friends200,51513,001

Spam Volume Twitter Facebook

Infection Length Measure length from first to last tweet – Median lifetime: 6 days – Attribute drop in spam volume to deinfection

Clickthrough How many users visit spammed URLs? – Majority of URLs shortened with bit.ly – Recover statistics from API Distinct links clicked 137,698 times On average, 80% of visits within first 2 days

Circumventing Detection Facebook, Twitter only check visible URL for blacklist status – Obfuscate with IP, shortener, public webhosting Previously blacklisted URLs can be re-used TemplateSample / /reader/shared/

Blacklist Detection Begin with ground truth of 500 spammed URLs – How many are detected by blacklists? – What is delay between appearing in C&C traffic vs. appearing on blacklist? BlacklistFraction of URLs Detected Google Safebrowsing26.7% SURBL5.7% Joewein0%

Blacklist Delay: Google Safebrowsing Detected URLs (26.7%): – 50% of detections occur within 2 days of appearing on C&C Undetected URLs (73.3%): – At least 4 days old, up to 25 days old Summary: only 13% of detections occur within click window

Conclusion Koobface botnet shows social networks viable target for exploit – Users trust their ‘friends’ – Limited protections available Blacklists too slow, miss too many URLs – Services such as bit.ly, blogspot abused to evade detection Infiltration provides a route for detection – Recover spam templates, URLs – Identify accounts propagating spam