black market botnets black market botnets
play

Black Market Botnets Black Market Botnets Nathan Friess Friess - PowerPoint PPT Presentation

Black Market Botnets Black Market Botnets Nathan Friess Friess Nathan John Aycock Aycock John Ryan Vogt Ryan Vogt Department of Computer Science Department of Computer Science University of Calgary University of Calgary Canada Canada


  1. Black Market Botnets Black Market Botnets Nathan Friess Friess Nathan John Aycock Aycock John Ryan Vogt Ryan Vogt Department of Computer Science Department of Computer Science University of Calgary University of Calgary Canada Canada

  2. Botnets: Current Scenario : Current Scenario Botnets � Infect computers Infect computers � � Spam attachments/links, drive Spam attachments/links, drive- -by downloads by downloads � � Control victim Control victim � � Spam Spam botnets botnets � � Gather data Gather data � � Key loggers, monitor network traffic Key loggers, monitor network traffic �

  3. “Interesting Interesting” ” Data Data “ � Identity: Passwords, PINs, SSN Identity: Passwords, PINs, SSN � � Financial: Credit Cards, Tax Returns Financial: Credit Cards, Tax Returns � � Corporate Secrets Corporate Secrets � � Design Documentation, Schematics Design Documentation, Schematics � � Financial Reports Financial Reports � � Personal Secrets Personal Secrets � � Latest gossip on celebrities Latest gossip on celebrities � � Illegal Files, Terrorist Plans Illegal Files, Terrorist Plans �

  4. Our Prediction Our Prediction � More types of data will be stolen and used More types of data will be stolen and used � for profit for profit

  5. Our Prediction Our Prediction � More types of data will be stolen and used More types of data will be stolen and used � for profit for profit

  6. The Business Case The Business Case Passwords Credit Cards Volume Celebrity Secrets Trade Secrets Love Letters ??? Available Data

  7. Gozi: A First Step : A First Step Gozi � February 2007 February 2007 � � Monitor HTTP POST requests (even SSL) Monitor HTTP POST requests (even SSL) � � Upload POST data to central server Upload POST data to central server � � Customers search for data (based on web Customers search for data (based on web � site, form fields, etc.) and pay to download site, form fields, etc.) and pay to download � Doesn Doesn’ ’t upload local files t upload local files � � Limited searching capabilities Limited searching capabilities �

  8. Black Market Botnets Black Market Botnets ��������� ������ ���������

  9. Black Market Botnets Black Market Botnets ��������� ������ ������ ��������� Basic Architecture

  10. Black Market Botnets Black Market Botnets ��������� ������ ������ ������ ��������� ������ Basic Architecture

  11. Black Market Botnets Black Market Botnets ��������� “Bunnies” ������ ������ ������ ��������� ������ Basic Architecture

  12. Black Market Botnets Black Market Botnets ��������� ������ ������ ������ ��������� ������ Basic Architecture

  13. Black Market Botnets Black Market Botnets ��������� ������ ������ ��������� Advanced Architecture

  14. Black Market Botnets Black Market Botnets ��������� ������� ������ ������� ������ ��������� Advanced Architecture

  15. Black Market Botnets Black Market Botnets ��������� ������� ������ ������� ������ ��������� Advanced Architecture

  16. Black Market Botnets Black Market Botnets ��������� ������� ������ ������� ������ ��������� Advanced Architecture

  17. Interesting Document Interesting Document Indicators Indicators � Document Types: .TAX Document Types: .TAX � � Financial Data: Spreadsheets Financial Data: Spreadsheets � � Specific Vocabulary: Specific Vocabulary: � Technical Terms, Poetry Technical Terms, Poetry � Activity: Recently Edited, Viewed Activity: Recently Edited, Viewed �

  18. Auction Infrastructure Auction Infrastructure � eBay eBay � � Hide document fragments Hide document fragments � using steganography steganography using � Legitimate cover for fund Legitimate cover for fund � transfer transfer � Don Don’ ’t really need to ship a physical product t really need to ship a physical product � � Existing model: drug trafficking Existing model: drug trafficking �

  19. Additional Markets Additional Markets � Victims pay Victims pay botmaster botmaster to not publish to not publish � documents: Bidding Wars documents: Bidding Wars � Pre Pre- -seed seed botnet botnet with customer queries with customer queries � � Allow customers to write scripts to search Allow customers to write scripts to search � for specific data for specific data

  20. Defenses Defenses � Avoid being infected Avoid being infected � � Limit document exposure Limit document exposure � � Keep archived files offline Keep archived files offline � � Hide documents using Hide documents using steganography steganography �

  21. Defenses Defenses � Digital Rights Management Digital Rights Management � � Investigate leaks Investigate leaks � � Fingerprint documents, trace back to Fingerprint documents, trace back to � infected computer infected computer � Follow money trail, trace back to Follow money trail, trace back to botmaster botmaster � � Actively attack document gathering Actively attack document gathering � � Insert useless documents into Insert useless documents into botnet botnet �

  22. Conclusions Conclusions � Valuable data is available in Valuable data is available in botnets botnets � � It is already possible to connect data and It is already possible to connect data and � customers customers � A black market for data can exist, even if A black market for data can exist, even if � botmasters don don’ ’t know what is in demand t know what is in demand botmasters

  23. Black Market Botnets Black Market Botnets Nathan Friess Friess Nathan John Aycock Aycock John Ryan Vogt Ryan Vogt Department of Computer Science Department of Computer Science University of Calgary University of Calgary Canada Canada

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend