Download presentation
Presentation is loading. Please wait.
Published byScott Gardner Modified over 9 years ago
1
Botcoin: Monetizing Stolen Cycles UC San Diego and George Mason University Presented By: Amanda Watson CSCI 780: Advanced Network Security
2
Outline Introduction Related Work Background Methodology Analysis Discussion Conclusion Epilogue
3
Bots Send spam, commit click fraud, DOS attacks, steal user data Botmaster: uses bots to extract value from the above actions Botnet: compromised computers under the control of the botmaster Demand for a bot determines the value Security evolution depends on the demand
4
Bitcoin Mining Repeatedly computing the SHA-256 cryptographic hash function over a large range of values State-Space search Can be conducted in parallel Botmaster can add bitcoin mining to the current activities of his botnet without interfering with the others Pro: Potentially lucrative depending on the number of bots Con: Easier to detect than other activities
5
Outline Introduction Related Work Background Methodology Analysis Discussion Conclusion Epilogue
6
Related Work Analysis of the transactions in the Bitcoin network Measures activity Tests the limits of anonymity Analysis of the silk road (underground drug market) Shutdown October 13, 2013 Bitcoin mining can be “gamed” by an appropriately powerful adversary Can disrupt the Bitcoin economy Profitable malware Pay-per-install, fake anti-virus, click fraud
7
Outline Introduction Related Work Background Methodology Analysis Discussion Conclusion Epilogue
8
Bitcoin Proposed by Satoshi Nakamoto in 2008 Not backed by any government Purely a peer to peer virtual currency Bitcoins are acquired through mining Transactions are public through the blockchain Public ledger maintained by a peer-to-peer network
9
Bitcoin 1Bitcoin = $402.53
10
Bitcoin Mining Miner receives valid transactions through the peer-to- peer network Group them into blocks set of transactions header containing a hash of the previous block and a nonce Compute a SHA-256 hash value of the block If the value has the correct number of leading zeros Miner passes it on to others to verify Coinbase: pays transaction fees and the block reward If the value does not have the correct number of leading zeros Repeat the process
11
Pooled Mining Combine the mining power of many individual miner and payout a small amount for work completed Pool server manages pending transaction Provides starting point to workers Workers mine the blocks Report results to the server
12
Botnet Mining Use a existing or newly created botnet to mine for bitcoins Direct Pool Mining Distribute a mining executable with a wrapper script that specifies mining parameters Generally banned for mining pools Proxied Pool Mining Proxy connections through a controlled server Requires additional infrastructure Dark Pool Mining Botmaster maintains a pool server Bots connect to his pool Limited to the number of bots he controls
13
Outline Introduction Related Work Background Methodology Analysis Discussion Conclusion Epilogue
14
Methodology Goals: Identify mining malware Identify size of infected population Identify the value of the bitcoins extracted Methodology Identify Mining Malware Extract Mining Credentials Estimate Earnings Estimate Infected Population Identify Pool Proxies
15
Identifying Mining Malware All mining malware uses the HTTP-based getwork protocol Use this to identify mining malware with a network trace To get the network traffic of various malware Execute the binaries in a malware execution environment Use data for public and private sandboxes that provides information and logs of the actions of the binaries If the binary is requesting access to a bitcoin pool server, it is being used for bitcoin mining
16
Extracting Mining Credentials Mining software is generally generic Credentials are passed on command line Extract the credentials: Command-line arguments Extract the credentials from the packaged binary HTTP basic authentication Extract credentials from a network trace Command-and-control channel Credentials are contained in a Dropbox or Pastebin file Reverse engineer the malware and use memory snapshots from the de-obfuscated the payload Pool operators Public pool operators provide lists of user names and wallet addresses
17
Earnings Mapping miners to wallet addresses Contact the pool operators to ask for the information Publicly visible pool statistics Some pools provide public leaderboards Blockchain analysis All transactions are visible Knowing the payout address allows estimates for a specific miner Clustering wallet addresses Botmasters may use different addresses for different campaigns Addresses used as inputs to the same transaction will be controlled by the same user This allows us to cluster addresses used by a single botmaster
18
Estimating Infected Population Contact anti-virus software vendors to obtain mining malware data E i : estimated bot population I i : number of infections in country i per vender M i : number of machines in country i per vendor T i : number of machines in country i This is the expected lower bound Computers without antivirus for the vendors are not counted Estimates are only for specific binaries
19
Identifying Pool Proxies Cross-login test Credentials can be hidden by an HTTP proxy Create miner accounts in major mining pools If the miner account can connect to the suspected bitcoin mining proxy, then it should be used for bitcoin mining Passive DNS The lifetime of a dark mining pool depends on the lifetime of the botnet Use passive DNS data from the ISC Security Information Exchange Block Reversal A pool will provide the same coinbase across similar workers This allows us to match possible bots to a pool Leaked Data
20
Outline Introduction Related Work Background Methodology Analysis Discussion Conclusion Epilogue
21
DLoad.asia(Redem and Darksons) Began mining in 2011 Ended in November of 2012 Earnings Darksons : 2,403 BTC Redem : over 10,000 BTC Over 100,000 IP’s Population - number of infections
22
ZeroAccess 9,000,000 infected PC’s Began December 2011 Earnings : 400 BTC Began mining through proxy servers, now a part of Eligus Population - number of infections
23
BMControl Began mining in September 2012 Part of Eligus Earnings Adds 16,000 new bots per day Average mining rate/ bot : 3.75MH/sec Now mines for Litecoin Population - number of infections
24
FeodalCash Began mining in May 2013 Part of Eligus Earnings : 168 BTC Population - 62,500 infections at its peak
25
Fareit Bots Began mining April 9, 2013 Used a pool proxy with the Black Hole exploit kit Earnings : 265 BTC Population - 12,500 infections
26
Zenica Earnings 312,000 or more active IP’s 170 BTC in 3 months Population Prevalent in Southeast Asia Vietnam and Thailand account for 70% of sampled infections
27
HitmanUK Botmaster launched a DDoS attacked after the pool blacklisted the botnet Paralyzed the pool Prevented mining for a few hours Pool operator then let the botmaster back in Began in February 2013 Earnings : 4 BTC Adds 16,000 new bots per day Average mining rate/ bot : 3.75MH/sec
28
Xfhp.ru Miner Uses Zbot to download the Bitcoin mining plugin Population Southeast Asia South America
29
Skype Miner Used Skype and social engineering to distribute bot Sent a compromised skype message If the message was clicked then the victim would be taken to a webpage that downloaded an executable and attempted to install the Bitcoin mining malware Began mining in July 2012 Earnings : 250
30
Miscellaneous There are many small mining operations
31
Outline Introduction Related Work Background Methodology Analysis Discussion Conclusion Epilogue
32
Mining Revenue Depends on hashing and network difficulty Daily Revenue: MH – million SHA-256 computations 8.22 x 10 -12 MH/sec
33
Botnet Costs Cost of acquiring bots Cost associated with the monetization scheme More information is needed for non-acquisition costs: Infrastructure Development Day to day operation
34
Profitability Varies based on exchange rates 3 classes of profitability Absolutely profitable: revenue exceeds cost for a botnet solely for mining Marginally profitable: revenue exceeds additional cost for an established botnet adding mining Unprofitable: mining does not cover additional costs Bitcoin is expected to remain profitable for large botnets
35
Outline Introduction Related Work Background Methodology Analysis Discussion Conclusion Epilogue
36
Conclusion It is possible to track the earning of botnets because Bitcoin transactions are public Larger botnets have earned sizable amounts of Bitcoins and have been in operations for years Most of these are found in geographic locations with lower costs of bots Developed a method to trace mining pool malware even when proxy server are used to hide the pool
37
Outline Introduction Related Work Background Methodology Analysis Discussion Conclusion Epilogue
38
Litecoin Decentralized virtual currency based on bitcoin 1 litecoin = $4.19 4 times faster to produce a block when mining Lessens the effect of specialized hardware
39
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.