Botnet Tracking:
Tools, Techniques, and Lessons Learned
- Dr. Jose Nazario
Botnet Tracking: Tools, Techniques, and Lessons Learned Dr. Jose - - PowerPoint PPT Presentation
Botnet Tracking: Tools, Techniques, and Lessons Learned Dr. Jose Nazario About Arbor Networks Founded in 2000 ~150 employees worldwide Peakflow product lines Peakflow SP for service providers Peakflow X for enterprises
Tools, Techniques, and Lessons Learned
Company Confidential Page 2
arbornetworks.com
– Peakflow SP for service providers – Peakflow X for enterprises
– Primarily NetFlow-based data collection
Company Confidential Page 3
arbornetworks.com
– Unknown threat scale – Big concern to many
Company Confidential Page 4
arbornetworks.com
– Use network exploits to propagate
– Start up a network listener service, inbound connections
– Connect outbound to receive connections
– Rootkits hide their presence
– Keystroke loggers for information theft
system
Company Confidential Page 5
arbornetworks.com
– Spam (increasingly pump and dump) – DDoS – Warez, stolen media
Company Confidential Page 6
arbornetworks.com
– Popular with AV, security companies
– Our primary goal
– Small, specialized field
Company Confidential Page 7
arbornetworks.com
– Can’t do this from your desktop!
– Botnet server, passwords, bot characteristics, etc
– Have to know what a bot would do
– Have to have a botnet client to participate
Company Confidential Page 8
arbornetworks.com
– Don’t want it to tie back to you
– Don’t want to be too obvious
– Exploits, vulnerabilities, underground economy
– Be able to read and write foreign languages
Company Confidential Page 9
arbornetworks.com
– Repeat for every new bot
participating in an attack
“out of place”
hence suspicious)
Company Confidential Page 10
arbornetworks.com
Company Confidential Page 11
arbornetworks.com
– Active monitoring – Multiple networks at once
– Kaiten affects Linux systems
Company Confidential Page 12
arbornetworks.com
Company Confidential Page 13
arbornetworks.com
Company Confidential Page 14
arbornetworks.com
– Blacklists, AV writeups insufficient
– In house analysis
– Back when it was free
– Strong research community
Company Confidential Page 15
arbornetworks.com
DDoS attacks
– Most attacks are not against a significant target – Most attacks are not crippling to the endpoint
spring of 2006
– Against a series of anti-spam and anti-DDoS companies
adware bots
– Not all bots have DDoS capabilities – Type of bot used can often indicate intent of herder
Company Confidential Page 16
arbornetworks.com
– Arbor project to analyze global DDoS provalence – Over 20,000 DDoS attacks measured between Sept 2006 and January 2007
DDoS attacks
– Over 21,000 attacks in this timeframe – Over 400 unique IRC servers
– 2% of all DDoS attacks measured by Arbor had clear botnet cause – 13% of all DDoS attacks recorded by botnet tracking showed up in Arbor monitors
Company Confidential Page 17
arbornetworks.com
– Nepenthes or other honeypots
– Whitestar list, DA, NSP-SEC, Shadowserver, etc
– Sandboxing (Norman dominates)
– Shadowserver, some private tracking
Company Confidential Page 18
arbornetworks.com
– GPL licensed, using CVS! – GUI-based configuration, no coding skills needed – Bug fixing
– SpyBot, SDBot, Reptile, Agobot, Rbot, RxBot, Kaiten, etc … – Lots of overlapping capabilities, not all support DDoS – Which codebase you use depends on your intentions
Company Confidential Page 19
arbornetworks.com
– Too many snoops on IRC – Too easy to break into – Lots its “elite” factor some time ago
– Growing number of HTTP, IM, and other bots
– They know these are monitored
Company Confidential Page 20
arbornetworks.com
– Lots of basic RE analysts – Armed with tools like sandboxes – Lots of collection networks (ie Nepenthes) – Rapidly caught, analyzed, and tracked botnets
– Explosion in bots and botnets launched – Only a few botnet groups were actively thwarting attacks – HTTP and P2P bots were not very popular yet (still IRC heavy) – Lots of botnets were very visible
Company Confidential Page 21
arbornetworks.com
techniques
– Increased use of debugger checks – Delays in revealing useful information – Poisoning data – Inject fake bots to detect people who mine Norman for data
– Detected or ignored
– Fingerprinted and blocked, or simply ignored
Company Confidential Page 22
arbornetworks.com
Can barely use IRC DDoS as a pissing match Lured by adware dollars Write their own communication protocols Thwart or slow RE analysts High impact, high profile DDoS Very well groomed botnets Limits of current efficient reaction
Company Confidential Page 23
arbornetworks.com
– Takedown, blackhole, etc – Becoming facilitated with commercial solutions
– Trustworthiness of the data is key
– This is a reactive cycle – Need proactive mechanisms
Company Confidential Page 24
arbornetworks.com
– Thousands of botnets a week, only so much operators can do – Cannot blindly block
– DNS registrar – DNS server network(s) – C&C host network(s)
Company Confidential Page 25
arbornetworks.com
– HTTP, peer to peer
Company Confidential Page 26
arbornetworks.com
– Windows “Somelender” bots - homegrown Caesar cipher
(66.186.35.22:8080) :ckodg!j@tyrant PRIVMSG ## :=GoU6jyt7xCuvfRamp+NOAeNFFF/q/h9EHT/H6DV5fxcD7RoX9Pt5a/o2AST9N+j4Y4jf (66.186.35.22:8080) :ckodg!j@tyrant PRIVMSG ## :=rvyJWDmfvujXJ4XDKp5 (66.186.35.22:8080) :ckodg!j@tyrant PRIVMSG ## :=+rhlS+/trmwFfUNtERLa
Decrypts to:
(66.186.35.22:8080) :ckodg!j@tyrant PRIVMSG ## :40% ddos tcp 65.77.140.140 6667 900 -s -f -i -2 (66.186.35.22:8080) :ckodg!j@tyrant PRIVMSG ## :* kill dos (66.186.35.22:8080) :ckodg!j@tyrant PRIVMSG ## :* kill ddos
Company Confidential Page 27
arbornetworks.com
– Mimic bot
– Honeypot the bot and monitor it
Company Confidential Page 28
arbornetworks.com
– Achieve polymorphism by simply repackaging bots – New or modified packer – Fresh compile – Bingo, AV fails to detect
box
– Spyware, adware, spam tools, etc … – The bot code itself can be thrown away once it’s gotten the second stage payload on board
Company Confidential Page 29
arbornetworks.com
– Anti VMWare, debugger, sandbox mechanisms available as drop in modules
– Abuse well-known holes in these tools, bot stops working in their presence – Thwarts automated analysis, requires a trained human
Company Confidential Page 30
arbornetworks.com
– eg Debugger detection – Poisoned "wells" (honeypots)
– Detect VMWare – Detect Norman – Result: no results
Company Confidential Page 31
arbornetworks.com
Company Confidential Page 32
arbornetworks.com
Company Confidential Page 33
arbornetworks.com
– Phone home (register, poll for commands) – Register, await an inbound connection
– http://XXXXXXXX/index.php? id=jqkooamqechepsegsa &scn=0 &inf=0 &ver=19 &cnt=GBR
Company Confidential Page 34
arbornetworks.com
– No long lived connection
– Hiding in the maelstrom
– Easy to block
– Poll server, understand replies
Company Confidential Page 35
arbornetworks.com
– UDP-based eDonkey protocol – Used to send spam
– Encrypted TCP, custom command protocol – No clear use for this network yet – Network is still alive
Company Confidential Page 36
arbornetworks.com
– No central point to shut down – No central point to block
– Network manager can enter network from anywhere
Company Confidential Page 37
arbornetworks.com
– Getting the bot on there was the end goal – Keeping the bot on there was important
– The bot is just to bootstrap new code on there – The bigger that window of opportunity is, the better – Evade AV detection by staying ahead – First seen on a wide scale with Zotob
Company Confidential Page 38
arbornetworks.com
Company Confidential Page 39
arbornetworks.com
Bad Bad Guys uys
Good Guys Good Guys
Then Now Scalable Not
Company Confidential Page 40
arbornetworks.com
– Collaboration will be crucial
Company Confidential Page 41
arbornetworks.com
How do we get from here ….. To here? We must.