01 2 2 3
play

!"#$%&%'(")'(*++,#&-)./01( - PowerPoint PPT Presentation

!"#$%&%'(")'(*++,#&-)./01( 2,&)%&(2-.3'.)$( 456577( 8,+9#.$:&(;<=7=(>"?@"33"A(B)1C(D33(E.$:&/(E%/%#F%'(G,#3'H.'%C( 7( About I-)&%#(*33?"))(


  1. !"#$%&%'(")'(*++,#&-)./01( 2,&)%&(2-.3'.)$( 456577( 8,+9#.$:&(;<=7=(>"?@"33"A(B)1C(D33(E.$:&/(E%/%#F%'(G,#3'H.'%C( 7(

  2. About • I-)&%#(*33?"))( – !"#$%#&'(')*+,-#.)/0)11)#23+4# – 5$)*6#$%#7689($*(-#2:7+;8'#23+4# • 2#.%J(2.,K( – 5''3#93#2<#936=(>*?#%$*#>@$#6'+)6'(#A#5=91>#)36#*=3#93>'*3);$3)1# B'3>'(>#>')/(-#&C.#D*$=B(#)36#+$3(=1;3D#B*)+;+'(#)*$=36#>,'# @$*164## – E$*/'*1?#F,9'%#G'+=*9>?#G>*)>'D9(>#%$*#25H-#.9*'+>$*#$%#IJE$*+'# %$*#2GG-#"*$%'((9$3)1#G'*89+'(#.9*'+>$*#%$*#KLG#G$M@)*'-#N')6#$%# 7O)+P#G'*89+'(#QHQ7-#'>+4# – E*'R='3>#@*9>'*-#+$1=/39(>#)36#01$DD'*#@9>,#1$>(#$%# @,9>'B)B'*(S# • ,OBTUU01$D46)/0)11)4+$/#C#,OBTUU>'+,39+)193%$6$>3'>401$D(B$>4+$/U##

  3. Targeted? VUWUXX# Y#

  4. Opportunistic? VUWUXX# Z#

  5. G:%#%(&,(2%$.)L( VUWUXX# [#

  6. Today’s Threat Landscape • G:"&M/(.&(&"N%(&,(@%1,?%("(19@%#1#.?.)"3L( O),H(:,H(&,(-/%( D@.3.&9(&,(.)/&"33(/,PH"#%(( "(/%"#1:(%)$.)%( ,)(9,-#(,H)(1,?+-&%#( • G:"&("@,-&(&:,/%(Q"'F")1%'R(&:#%"&/L( !,,3/(")'(/%#F.1%/("F".3"@3%( J,#(/"3%A(#%)&(")'(3%"/%( S%'%#"&%'(%1,/9/&%?(,J( T+%1."3./&(/%#F.1%/(")'( &,,3(")'(/%#F.1%(+#,F.'%#/( $#"9U?"#N%&(%V+%#0/%(J,#(:.#%( W.'%,(:,HU&,M/(")'("'F%#0X.)$( VUWUXX# V#

  7. Back in the old days ! • T%3JU1,)&".)%'(@,&)%&(@-.3'.)$(-).&( – GP911(#)11#+$3>)93'6#@9>,93#)#(93D1'#>')/# H)1@)*'#7=>,$*# Q^B1$9>#F$6'*# ]'0#.'8'1$B'*# Q/)91#G'36'*# E*)=6#N)361'*# • *)%U/&,+(1#.?%(/:,+( – 5=91693D-#/)3)D93D-#69(>*90=;3D## C#/$3';\93D#>,'#0$>3'># – 7=>$3$/$=(#+?0'*+*9/'#=39>################ VUWUXX# W#

  8. A Brief History of Botnets VUWUXX# _#

  9. A Brief History of Botnets <$$#/)3?#$B'*)>$*(# +$/B';3D#%$*# 69/939(,93D#*'>=*3(# VUWUXX# `#

  10. A Brief History of Botnets H$*'#;/'#(B'3>#0)O193D## >,'9*#+$/B';>$*(# b..$G-#()0$>)D'-#93%$*/)3>(-#'>+4c# VUWUXX# Xa#

  11. A Brief History of Botnets L*$@93D# 6'D*''(#$%# (B'+9)19\);$3# H)3?#+*9/93)1# $B'*)>$*#>')/(# 69(($18'# VUWUXX# XX#

  12. A Brief History of Botnets E'6'*)>'6# ('*89+'(# /$6'1# 23>*$6=+;$3#$%# 3'@09'(#@9>,#/939/)1# >'+,39+)1#(P911# VUWUXX# Xd#

  13. Service Specialization • 8,)/,3.'"0,)(,J(%V+%#0/%( – .'69+)>'6#D=3(#%$*#,9*'# 5$>3'>#e9>#7=>,$*(# ",9(,93D#.'8'1$B'*(# 5=1P#GB)/#G'36'*(# .*98'J0?#F$6'*(# F)*6'*(# • 2,-0Y-%(/+%1."3.X"0,)/( – <*)3(1);$3#('*89+'(#%$*#(B')*#B,9(,93D#+)/B)9D3(# – Q^B1$9>#@')B$39\);$3#%$*#736*$96#/)1@)*'# – 7*09>*);$3#('*89+'(#0'>@''3#0$>3'>#0=?'*(U('11'*(# VUWUXX# XY#

  14. D(W.@#")&(Z"#N%&( VUWUXX# XZ#

  15. Self-contained Ecosystem • T%#F.1%(")'(&,,3(+#,F./.,).)$(( – E*$/#+$O)D'J936=(>*?#>$#%=11J('*89+'#$f'*93D(# • [#.1.)$(?,'%3/(&,(/-.&(")9(+,1N%&( – 5=?J>$J*'3>-#*'3>J>$J0=?# – G'*89+'#b)36#89+;/c#0)*>'*93D# • D\3."&%(/9/&%?/( – &'('11'*(# – !)1='J)66#('*89+'(# VUWUXX# X[#

  16. The Business of Crimeware • Z-30+3%(1,?+,)%)&/(&,(@,&)%&(@-.3'.)$( – F*');$3#$%#>,'#0$>3'>#+*9/'@)*'# – E$*+'U>*9+P#89+;/#>$#93(>)1193D#>,'#+*9/'@)*'# – 5=91693D#)#*$0=(>#F3F#93%*)(>*=+>=*'# – H$3';\);$3T#1)=36'*93D-#/=1'(-#'>+4# • [3%)&9(,J(,++,#&-).&9(J,#(&:.#'U+"#0%/( >#.F.)$(&:%(W.10?(&,(&:%(2"')%//( ",9(,93D# 51)+P,)>#GQ:# N)+P'6#G9>'# 23g'+;$3# :=>J$%J0)36# 5)33'*(# G$+9)1#K'>@$*P# VUWUXX# XV#

  17. An Infection Lifecycle ]+'"&%(>,H)3,"'%# ( Dropper unpacks on the F$3h*/#93(>)11);$3# Victim machine and runs 2(#>,9(#)#*')1#/)+,93'i# N)8'#2#(''3#9>#0'%$*'i# !"#$%&'($)*$+&'),-$.,/' >#,++%#^/_( W.10?( 8#.?.)"3(8,)&#,3 ( >,H)3,"'(2,&(D$%)& ( ]+'"&%#( H=1;B1'#F3F#B*$^9'(# N$(>#0$>#)D'3>b(c# [,/&(])+"1N ( G'B)*)>'#F3F#B$*>)1(# 7D'3>#('1'+;$3#+*9>'*9)# .9()01'#1$+)1#('+=*9>?# kB6)>'(#>$#0$>#)D'3># ],9>'19(>'6#*'B$(9>$*9'(# "*'8'3>#=B6)>'(UB)>+,'(# kB6)>'(#>$#19(>#$%#F3Fl(# !/012&'3,%/&%'$4&/%' 238'3>$*?#89+;/# 7D'3>#93>'D*9>?#+,'+P93D# >,H)3,"'%#( j$+P93D#$%#)D'3>#>$#89+;/# >"&"(E%+,/.&,#9 ( 2((=93D#$%#0)>+,'6#+$//)36(# j$DD93D#$%#93(>)11#(=++'(('(# 5&(,%&'$--&66'7'-,/%+,)'' Q3+*?B>'6#h1'(#%*$/#89+;/# G>$1'3#B)((@$*6(#C#"22# [,/&(D$%)&(B)/&"33 ( E%+,/.&,#9( .'1'>'#6*$BB'*U93(>)11'*# F1')*#1$D(#C#'8'3>(# F)>)1$D='#C#938'3>$*?# CnC Proxies CnC Portals VUWUXX# XW#

  18. Malware Reviews VUWUXX# X_#

  19. AV Testing VUWUXX# X`#

  20. AV Testing The service lowest prices on the market: $0.12 for one-time validation (6 cents per file) and $ 20 per month for full-NL ( VUWUXX# da#

  21. Tutorials VUWUXX# dX#

  22. Bullet-proof Hosting VUWUXX# dd#

  23. Full Service Hosting Providers • !"#$%&%'(/%#F.1%( ,`%#.)$/( – F)>'*93D#'^+1=(98'1?#>$#+?0'*# +*9/93)1(# VUWUXX# dY#

  24. VPN Services VUWUXX# dZ#

  25. VPN Services VUWUXX# d[#

  26. Call Service Translation • S,#%.$)(3")$-"$%(/-++,#&( – F*9/'#(B'+9h+# VUWUXX# dV#

  27. Exploit packs • a3%,),#%(aV+(F7C4C<( • [#.1.)$( – ")+P)D'T#mdaaa# – kB6)>'(T#mXaa# – &'0=916#%$*#3'@#2"T#m[a# • T+%1."3(+#.1.)$( – G=0)++#Q69;$3T#md[aa# – &'3>)1#Q69;$3T#mYaaa# VUWUXX# dW#

  28. Exploit Pack Diversity VUWUXX# d_#

  29. Exploit Pack Management • S-33(1"+"@.3.&9(+,#&"3/( • Z-30+3%(%V+3,.&/( – H=1;JB1)n$*/#C#)BB# VUWUXX# d`#

  30. DDoS for Rent VUWUXX# Ya#

  31. Botnet Selling • 2-.3'U&,U/%33(?,'%3/( – "=019+#%$*=/#B$(;3D(# – "*98)>'#%$*=/#*'R='(>(# – H'69)>$*(#>$#%)+919>)>'# >*)3(%'*(# VUWUXX# YX#

  32. Buy Specific Bot Victims • 8,?+#,?./%'(/9/&%?/( – N)+P'6#o/)3=)11?p# – N)+P'6#89)#L$$D1'6$*P(# – 5)+P6$$*#6'198'*?# • 8"?+".$)/( – o:BB$*>=39(;+p#6'198'*?# – G9M93D#$%#89+;/#938'3>$*?# – GB'+9)19\'6#()1'#$%# 3$>)01'#(?(>'/(#

  33. PPI .9(>*90=>'6#<.jY#8)*9)3>(# VUWUXX# YY#

  34. Full Service PPI VUWUXX# YZ#

  35. Gangstabucks .9(>*90=>'6#<.jZ#8)*9)3>(# VUWUXX# Y[#

  36. >./13".?%#/(b([#,&%10,)( VUWUXX# YV#

  37. Disclaimers • c%$.0?"&%(,#(J#"-'L( – F$//$3#=('#$%#69(+1)9/'*(#)36#)D*''/'3>(# • Q[#,&%10,)R(")'(".#(,J("-&:%)01.&9( – "*$$%#$%#+$3+'B># – K$>#%$*#+*9/93)1#=('# – "1')('#6$#3$>#=('#911'D)11?# – 23>'*3)1#>'(;3D#B=*B$('(#$31?# – ])**)3>?#8$96#9%#=('6#%$*#+*9/93)1#B=*B$('(# – F$//'*+9)1#3'>@$*P#)6/939(>*)>$*(#$31?# – F19+P#,'*'#>$#)++'B>#%=11#*'(B$3(90919>?# VUWUXX# YW#

  38. DDoSer Tool 7C G%("#%(),&(:%3'(#%/+,)/.@3%(J,#(")9( "10,)/(9,-(-/%(,-#(/,JH"#%(J,#C( d4 ]'#)*'#3$>#*'(B$3(901'#9%#?$=#B=*+,)('#>,9(#@9>,$=># ,)893D#)3?#=36'*(>)3693D#$%#,$@#9>#@$*P(4# Y4 <,'*'#)*'#K:#*'%=36(-#)11#()1'(#)*'# !"#$ 4# Z4 2%#?$=*#B$*>)1#)++$=3>#D'>(#(>$1'3-#?$=#,)8'#>$#B*$896'# $@3'*(,9B#$%#9>#0'%$*'#@'#@911#$f'*#(=BB$*>#$3#,'1B93D# ?$=#D'>#9>#0)+P-#$>,'*@9('#9>(#3$>#$=*#B*$01'/4# b"=*+,)('#23%$*/);$3#'>+4c# [4 ]'#$31?#$f'*#(=BB$*>#9%#9>(#($/'>,93D#$3#$=*#'36-# $>,'*@9('#@'#)*'#3$>#*'(B$3(901'#9%#?$=*#,)893D# B*$01'/(#@9>,#=(93D#$=*#($M@)*'4#b]'#)*'#,'*'#>$# ,'1B-#3$>#(B$$3#%''64c# ]'#6$#3$>#(=BB$*>#*'($16#)++$=3>(q# G%("#%(),&( V4 :%3'(#%/+,)/.@3%(.J(9,-("#%(/1"??%'(@9("( #%/%33%#A(&,(@%(/"J%(9,-(/:,-3'(,)39(@-9( >>,T%E(J#,?(-/C # 2%#?$=#696#3$>#B=*+,)('#%*$/#=(# >,'3#@'#)*'#3$>#*'R=9*'6#>$#D98'#?$=#(=BB$*>4# W4 r$=#/)?#D'>#>*$11'6#$3#93#sk('*#+,)>s-#@'#6$3t>#+)*'-# ($#6$3>#+$/'#+*?93D#>$#=(#0'+)=('#9>(#3$>#$=*#B*$01'/# >,)>#?$=*#(>=B969>?#$8'*#+$/'(#?$=4# VUWUXX# Y_#

  39. DarkComet RAT Disclaimer • 83.1NU&:#,-$:(a]cD5>./13".?%#/( VUWUXX# Y`#

  40. Scam Reporting VUWUXX# Za#

  41. 2,&)%&(2-.3'.)$(b(*+%#"0,)/( VUWUXX# ZX#

  42. 2010 Biggest Botnets <=7=(2,&)%& # [%#1%)&"$%(,J( <==d( W.10?([,+-3"0,) # [,/.0,) # 7 # <.j5$>3'>7#b&=6'])*1$+PH$0c# XZ4_u# JJ# < # &$D='7!5$>3'>#bE*')P?GB96'*F)*>'1c# [4Wu# JJ# e # v'=(5$>3'>5#bE$=*j)P'&96'*(c# [4Yu# JJ# f # H$3P9%# [4du# [>,# g # e$$0%)+'47# Z4au# w#>$BXa# 4 # F$3h+P'*4F# d4_u# w#>$BXa# 6 # N)/@'R#bL*)?G=3L9*1(c# d4[u# JJ# h # 76@)*'<*$g)35$>3'>#b]9+P'6&$+PH$3(>'*(c# d4du# JJ# d # G)19>?# d4Xu# w#>$BXa# 7= # GB?Q?'5$>3'>7#b:3'G>*''><*$$Bc# X4`u# JJ# VUWUXX# Zd#

  43. Feature Creep

  44. Kit Development & Deployment i%-/( T+9a9%( !>TT( VUWUXX# ZZ#

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend