Studying Spamming Botnets Using BotLab
Arvind Krishnamurthy John John, Alex Moshchuk, Steve Gribble University of Washington Joint work with:
Botnets: a Growing Threat Increasing awareness, but there is a - - PDF document
Studying Spamming Botnets Using BotLab Arvind Krishnamurthy Joint work with: John John, Alex Moshchuk, Steve Gribble University of Washington Botnets: a Growing Threat Increasing awareness, but there is a dearth of hard facts especially
Arvind Krishnamurthy John John, Alex Moshchuk, Steve Gribble University of Washington Joint work with:
Bot Bot Bot Command & Control Server (C&C) Infecting Machine IRC Messages
Honeypot Infecting Machine Snooper Bot Bot Command & Control Server (C&C) I R C M e s s a g e s
malicious programs
polymorphic packers)
servers
active crawling of spam URLs
malicious
legitimate (compromised) webservers
Incoming Spam
URLs
Message Summary DB
Relay IPs Headers Subject
Malware Crawler
URLs
Archival Storage Internet
TOR
discarding old ones
a fingerprint, which is a sequence of flow records
(DNS, IP, TCP/UDP)
VM detection
times as some bots issue random requests (e.g., Google searches)
New Bot Binary
Malware Crawler Network Fingerprinting
New VM-aware Bot
Bot VM Bot VM Virtual Machines
Execution Engine Internet
TOR Bot Bare-metal Bot
before they start sending regular spam
webservices (such as HotMail)
blacklist suspicious IP ranges
rate are considered suspicious
botnets; so manual tweaking possible
Bot VM Bot VM Virtual Machines
Execution Engine Outgoing Spam
Bot Bare-metal Bot spamhole
Internet
TOR C&C Traffic
attribution; identify IPs for a given botnet
source IPs and merge with an attributed set if there is overlap
URLs
Message Summary DB
Relay IPs Headers Subject Bot VM Bot VM Virtual Machines
Clustering DNS Monitoring
H
t n a m e s Subjects, Relays Resolved IP addresses
Correlation Analysis Execution Engine Result Storage Outgoing Spam
Bot Bare-metal Bot spamhole
Botnet C&C Discovery C&C servers contacted
C&C protocol spam send rate (msgs/min)
Grum Kraken Pushdo Rustock MegaD Srizbi Storm
Botnet C&C Discovery C&C servers contacted
C&C protocol spam send rate (msgs/min)
Grum static IP 1 Kraken algorithmic DNS 41 Pushdo set of static IPs 96 Rustock static IP 1 MegaD static DNS name 21 Srizbi set of static IPs 20 Storm p2p (Overnet) N/A
Botnet C&C Discovery C&C servers contacted
C&C protocol spam send rate (msgs/min)
Grum static IP 1 encrypted HTTP Kraken algorithmic DNS 41 encrypted HTTP Pushdo set of static IPs 96 encrypted HTTP Rustock static IP 1 encrypted HTTP MegaD static DNS name 21 encrypted custom protocol (port 80) Srizbi set of static IPs 20 unencrypted HTTP Storm p2p (Overnet) N/A encrypted custom
Botnet C&C Discovery C&C servers contacted
C&C protocol spam send rate (msgs/min)
Grum static IP 1 encrypted HTTP 344 Kraken algorithmic DNS 41 encrypted HTTP 331 Pushdo set of static IPs 96 encrypted HTTP 289 Rustock static IP 1 encrypted HTTP 33 MegaD static DNS name 21 encrypted custom protocol (port 80) 1638 Srizbi set of static IPs 20 unencrypted HTTP 1848 Storm p2p (Overnet) N/A encrypted custom 20
mailing list sizes
more duplicates in recipient email addresses
for each C&C query, then probability that an email address will appear again in the next K emails is
Rustock’s is 1.2 billion, Kraken’s is 350 million
Links in 80% of spam point to only 15 IP clusters
in a single day at a given location?
recipient address model
sent to an UW email address
bot over a given period
developed a Firefox plugin to check against this
incoming email with the list of spam subjects and list of URLs being propagated by captive bots
many of the ideas proposed earlier
captive bots, network fingerprinting, and correlation
spam campaigns, and hosting infrastructures
spam filtering, bot detection, etc.)