botnets collective defense and project mars
play

Botnets, Collective Defense, and Project MARS Jeff Williams - PowerPoint PPT Presentation

Botnets, Collective Defense, and Project MARS Jeff Williams Principal Group Program Manager Microsoft Malware Protection Center The Basics A Picture of Health? Location 1Q2010 2Q10 3Q10 4Q10 Delta 4.2% United States 11,025,811


  1. Botnets, Collective Defense, and Project MARS Jeff Williams Principal Group Program Manager Microsoft Malware Protection Center

  2. The Basics

  3. A Picture of Health? Location 1Q2010 2Q10 3Q10 4Q10 Delta 4.2% ▲ United States 11,025,811 9,609,215 11,340,751 11,817,437 1 -2.1% ▼ 2 Brazil 2,026,578 2,354,709 2,985,999 2,922,695 -8.6% ▼ 3 China 2,168,810 1,943,154 2,059,052 1,882,460 12.1% ▲ 4 France 1,943,841 1,510,857 1,601,786 1,794,953 18.9% ▲ 5 United Kingdom 1,490,594 1,285,570 1,563,102 1,857,905 -3.9% ▼ 6 Spain 1,358,584 1,348,683 1,588,712 1,526,491 56.8% ▲ 7 Korea 962,624 1,015,173 1,070,163 1,678,368

  4. Case Study: Botnets

  5. The Maturity of Response Over Time • Some historic examples – Blaster – Slammer – Zotob – WinFixer – Cutwail – Intercage & McColo de-peerings – Mariposa • More Recent Examples – Bredolab – Waledac – Rustock – AFCore

  6. 10,000 20,000 30,000 40,000 50,000 60,000 70,000 80,000 0 January March May 2005 July September November Early Examples: Blaster January March May 2006 July September November January March MSBlast Detections May 2007 July September November January March May 2008 July September November January March May 2009 July September November January March May 2010 July September November January 2011 March May

  7. Early Examples (con’t) • Slammer – Vuln patched in July 2002 – Cross product vulnerability (SQL, MSDE) – Unthrottled (impacting response) – ISPs • Zotob – actor attribution – foreign laws

  8. Detections 100000 150000 200000 250000 300000 50000 0 Early Examples: WinFixer 2009 January 2009 February 2009 March 2009 April 2009 May 2009 June 2009 July 2009 August 2009 September 2009 October 2009 November 2009 December Detections WinFixer 2010 January 2010 February 2010 March 2010 April 2010 May 2010 June 2010 July 2010 August 2010 September 2010 October 2010 November 2010 December 2011 January 2011 February 2011 March 2011 April 2011 May Total

  9. De-Peering Security Fix Data • Atrivo/Intercage – Dropped offline – Re-peered – Dropped again • McColo de-peering SpamCop Data – Followed Intercage – 75% drop in spam – Srizbi connection – Rustock connection – Re-peered in 4 days

  10. Cutwail Data from Symantec Hosted Services

  11. Mariposa • Mariposa – Industry partnership with LE and Academia – Hoster participation in the investigation – Multiple arrests – C&C reactivation within 60 days Data from Trend Micro

  12. Feels quite a lot like this…

  13. Plays Well With Others • Operation Bot Roast – Industry/LE partnerships – Broad scale actor attribution – Prosecutions of Soloway, Brewer, Ancheta, Downey, Walker and Goldstein • Operation Bot Roast II – Additional indictments on DDoS, Fraud, Wiretap* and other charges – Discovery exposes $20+ million in economic losses

  14. Better Together

  15. Waledac- Operation b49

  16. Bredolab

  17. Rustock- Operation b107

  18. Afcore

  19. Defenses Against Cyber Threat OFFENSE IMPACT INDIVIDUAL COLLECTIVE ACTIVE DEFENSE DEFENSE DEFENSE ACTION

  20. Internet Health Model: Observing Symptoms USER INITIATES ACCESS INTERNET Financial Institute Notify ASSESS & REMEDY Firewall Security Anti-Malware On Updates

  21. Internet Health Model: Promoting Wellness USER INITIATES ACCESS INTERNET Financial Institute ASSESS & REMEDY Firewall Security Anti-Malware On Updates

  22. Building a Collective Defense The International Telecommunications Union’s Botnet Mitigation Tool Kit Japan’s Cyber Clean Center France’s Signal Spam Germany’s Anti-Botnet Advisory Center Microsoft Active Response for Security

  23. Helping our Common Customers Operation b49 Feb 2010 Operation b107 March 2011 Target: Waledac Target: Rustock Cleanup Goal: Build relationships Cleanup Goal: Disinfect systems and processes to reach customers before attackers regain control Enhancements: ISP Results ISP Reduction Expanded Partners • 1 97% • Removal Tools 2 96% 3 93% • Updated support site 4 78% 5 82% 6 66% Status Status ~22,000 infected IPs remaining 1.2m Unique IP addresses observed in ~70% reduction world wide first 7 days following the takedown

  24. ISP Based Remediation Efforts Vision: Improve and maintain the health of endpoints connected to the network to create confident customers and grow the information society. Reactive Preventative Observing Symptoms of Illness Demonstrating Health of Device D Service Provider gates access based on health of device Device C Level of Visibility Service Provider notifies user based on health of device. B Service Provider IP Address notifies user of compromise A Additional Factors: ISP notifies user of • Health Requirements • Opt-in vs. Mandatory compromise • Notify vs. Enforce • Type of Notification

  25. Rustock Progress Remediation phase Additional investigation • Directed engagement with ISPs and • Forensic analysis of C&C hard drives CERTs • Involved parties identified • Delivery of Tools – Hoster • Ongoing delivery of IP Data & Webmoney • Timestamps for infected systems • Notification • Legal agreements allowing for redistribution of the Microsoft Safety Additional collateral Scanner in a walled garden ISP Reduction Country Reduction 1 69% 1 81% 2 56% 2 69% 3 51% 3 68% 4 49% 4 67% 5 49% 5 66% 6 45% 6 64% 7 34% 7 56% 8 32% 8 54% 9 32% 9 54% 10 31% 10 53%

  26. We’re Not Done Yet…

  27. Call to Action • Solve hard problems in customer notification and remediation – Scam proof communications – Reliable cleaning tools • Create next generation collective defenses – Device health technologies to prevent infections – Definition and measurement of healthy devices • Share intelligence about infected nodes within an ASN with the ASN owner – Provide tools for remediation. • Leverage SNDS

  28. Whack-a-Mole 2.0

  29. One more thing…

  30. Resources http://support.microsoft.com/botnets http://www.microsoft.com/security/scanner/en-gb/default.aspx http://www.microsoft.com/av http://blogs.technet.com/mmpc http://www.microsoft.com/sir http://blogs.technet.com/ecostrat http://postmaster.live.com/snds

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend