FIRESHARK A TOOL TO LINK THE MALICIOUS WEB
Stephan Chenette Principal Security Researcher Websense Labs
A TOOL TO LINK THE MALICIOUS WEB Agenda Introduction Fireshark - - PowerPoint PPT Presentation
Stephan Chenette Principal Security Researcher Websense Labs FIRESHARK A TOOL TO LINK THE MALICIOUS WEB Agenda Introduction Fireshark Details Web Communities Malicious Web Communities Mass Injection Analysis Redirection
FIRESHARK A TOOL TO LINK THE MALICIOUS WEB
Stephan Chenette Principal Security Researcher Websense Labs
Agenda
Mass Injection Analysis Redirection Chaining DeobfuscationAnalysis Content Profiling
2
Why you should care
URL Injection attacks are increasing
225% increase in the number of new compromised legitimate websites in the last 12 months Source: Websense Security Labs, State of Internet Security, Q3-Q4 2009 Report
3
Why you should care
researchers
e.g. nine-ball, beladen (~40k compromises)
view of an attack + low level content profiling
4
Connecting the dots
Mass Injections examples
5
Public Tools Available today
Websites:
Tools:
6
Malzilla vs the Pheonix Exploit Kit
7
JSUNPACK VS. Phoenix
8
Spidermonkey/ CaffeineMonkey
engine
9
Obfuscated Content
10
Crimepack 2.8 (released before Easter)
Exploits include:
Adobe Acrobat Reader Exploits (including CVE-2010-0188) (ALL) JRE (GSB & SERIALIZE) (ALL) MDAC (IE) MS09-032 (IE) MS09-002 (IE) CVE-2010-0806 (IE)
11
Crimepack 2.8 Anti-Analysis
Features include:
PDF/JAR/JPG files)
unpackers to decode your page
12
Crimepack 2.8 Changes
13
Problems with emulation DOM Always behind
a function
14
Problems with emulation DOM Always behind
15
Problems with emulation External scripts
16
What about crawlers??
17
You dare doubt me?? Me!!!?? =]
18
FireShark Introduction
websites
injection attacks
19
Send URLs to FireShark
20
Malicious URL Feed
FireShark Architect (Two Modes)
Used in an automated manor Alert/Auto-Categorize
Manual Inspection Injection Research
21
Single-User Mode Demo
22
Local FireShark Demo
23
Now Parse the Log file
is up to you… A few scripts provided e.g:
24
Post-Run Analysis
post-analysis correlation process
25
Monitoring communities
26
Monitoring communities
27
Mass Injection Attack
28
The Importance of Data correlation
29
The Importance of Data correlation
30
31
32
Top 25 Global Alexa List (mid-Feb 2010)
google.com facebook.com youtube.com yahoo.com live.com wikipedia.org blogger.com baidu.com msn.com qq.com yahoo.co.jp twitter.com google.co.in google.cn sina.com.cn myspace.com google.de wordpress.com microsoft.com amazon.com taobao.com google.co.uk bing.com ebay.com google.fr
33
Visiting youtube.com
34
visiting youtube.com
35
36
37
38
39
40
41
42
43
Major Ad Networks
44
Top 100 Global Alexa List (mid-Feb 2010)
45
Top 100 Global Alexa List (mid-Feb 2010)
46
Victims of “Malvertisements” (2009)
47
Horoscope.com Economy
48
49
Down the Rabbit hole
campaigns
understanding of the malicious webscape
50
Down the Rabbit hole
51
Injection Example #1
Injection Example #1
52
Injection Example #1
53
Injection Example #1
Popular campaign will emerge
Injections into unique websites will lead to same hosts
Details of the attack
Screen Shots Source code, Deobfuscted DOM, Network traffic
54
Bird’s Eye View of 500 Compromised Websites
55
Breadth – Popularity of Request connection
56
Breadth – Popularity of Request connection
57
Breadth – Popularity of Request connection
58
Down the Rabbit hole
59
Injection Campaign #1: 93.186.127.49
“W93.186” Injection Campaign
60
“W93.186” Injection Campaign
61
“W93.186” Injection Campaign Screen Shot
62
Observations from 93.186.127.49 attack
63
Operation b49
Rascop.com…a familiar foe?
64
65
Infamous Rascop.com
66
rascop.com = NXD (feb 10’) Waledac Fast-flux domain
Rascop.com and friends say goodbye but landing pages here to stay
67
Injection Example #2
68
Attack #2: ru:8080
Breadth – Popularity of Request connection
69
Breadth – Popularity of Request connection
70
Polymorphic Injected Code Variation #1
71
Polymorphic Injected Code Variation #2
72
Polymorphic Injected Code Variation #3
73
Depth – Diff DOM/SRC
74
Depth – Script link in DOM
75
Polymorphic Injected Code Variation #3
76
DOM View
(Final View of DOM after JS/events)
77
Log Analysis
1.
hxxp://clicksor-com.eastmoney.com.mobile- de.homesaleplus.ru:8080/ocn.ne.jp/ocn.ne.jp/class mates.com/linkhelper.cn/google.com/
2.
hxxp://chip-de.ggpht.com.deezer- com.viewhomesale .ru:8080/google.com/google.com/timeanddate.co m/avg.com/zshare.net/
78
ru:8080 URL Injection Campaign
Similarities between infected sites:
Leaseweb (Netherlands) and OVH.com (France)
79
The Never-ending story
80
Observations from ru:8080 Injection attack
automatically
redirectors
e.g. Many infected sites also led to Gumblar infected domains, indicating that attackers perhaps had shared stolen FTP credentials
81
Injection Example #3
82
Breadth – Popularity of Response connection
83
Breadth – Popularity of Response connection
84
85
Connection Request/No Response
Src: hxxp://sportgun.pl.ua/st/go.php?sid=2& Dst: hxxp://uplevelgmno.vn.ua/111/sv777/index.php
86
Round #2 Connection Request/Response
87
Fetches Exploits
88
type: response src: hxxp://uplevelgmno.vn.ua/111/sv777/pdf.php dst: hxxp://uplevelgmno.vn.ua/111/sv777/index.php status: 200
type: response src: hxxp://uplevelgmno.vn.ua/111/sv777/dev.s.AdgredY.class dst: hxxp://uplevelgmno.vn.ua/111/sv777/index.php status: 200
PDF VirusTotal Results
89
Eleonore Exploits Pack
hxxp://uplevelgmno.vn.ua/111/sv777/stat.php
90
Obfuscated Chunk in Source Code
91
Deobfuscated DOM
92
Exploit Kit
93
Observations from Injection attack #3
are common
platforms/browsers are targeted
traditional AV signatures are always behind
94
Fireshark vs Phoenix (works!)
95
96
Conclusions/Take-away
Increase of 225% over the last 12 months Frequently updated to contain fresh links iframe/script tags & direct malicious code
injection
Exploits target various OS/applications
Mass Injection Analysis Redirection Chaining Content Profiling
97
Download Fireshark – fireshark.org
98
Questions?
Contact: Stephan Chenette, schenette@websense.com Addition thanks to:
99