Cybercrime and Attacks in in the Dark Sid ide of the Web
- Dr. Marco Balduzzi*
Senior Researcher at Trend Micro http://www.madlab.it @embyte
*With the cooperation of Mayra
Rosario and Vincenzo Ciancaglini
Cybercrime and Attacks in in the Dark Sid ide of the Web Dr. Marco - - PowerPoint PPT Presentation
Cybercrime and Attacks in in the Dark Sid ide of the Web Dr. Marco Balduzzi * Senior Researcher at Trend Micro http://www.madlab.it @embyte * With the cooperation of Mayra Rosario and Vincenzo Ciancaglini The Dark Ecosystem Dark Nets TOR
Senior Researcher at Trend Micro http://www.madlab.it @embyte
*With the cooperation of Mayra
Rosario and Vincenzo Ciancaglini
Dark Nets
Custom DNS
Rogue TLDs
timestamp:[2015\-01\-01 TO 2015\-12\-31] AND title:marketplace
Privoxy + + TOR ano anonymizer
Sq Squid transparent pr proxy
Poli
+ TOR OR 64 ins nstances I2P Fr Freenet Cus Custom DN DNS res esol
(DNSMASQ) SQ) Na Namecoi
DN DNS rogue
Cesi Cesidia ian roo
Ope Opennic ic
Nam ameSpac ace …
Headless browser
HAR Log Page DOM Screen Shot Title Text
Metadata
Raw HTML Links Email Bitcoin Wallets
Scrapinghub's Splash
Crawler based on Python's Scrapy + multiprocess + Splash access
Extract links, emails, bitcoin wallets
Embedded links classification (WRS)
categorization
Page translation
Significant wordcloud
Pag age text Tok
izatio ion Fi Filterin ing Sem Semantic ic di distance ma matrix ix Hie Hierarchic ical l clusterin ing Cl Clus uster lab abel l and and po popu pula larit ity Wor
d clou
Scrap text from HTML, clean up, strip spaces, etc Create list of (word, frequency) pairs Keep only substantives How “far” are words from one another? Group similar words Label clusters, sum frequencies Draw using summed frequencies
lxml NLTK.wordnet Wor
(p (pil illo low)
TorrentLocker, i.e. variant of CryptoLocker Payment page hosted in TOR
◎wzaxcyqroduouk5n.onion/axdf84v.php/user_code=qz1n2i&user_pass=9019 ◎wzaxcyqroduouk5n.onion/o2xd3x.php/user_code=8llak0&user_pass=6775
Cashout via BITCOINS
Month 1: Different advertisement strategies to honeypot #1
# # Daily Daily POST OST Re Requests
Average of 1.4 malicious uploads per day
Pre-installed web shells attracted the most of “visitors” CMS #1-2 reached via Google Dorks (on Tor2Web), CMS #3 no because custom CMS #2 reached via TOR’s search engine’s query “Index of /files/images/” (http://hss3uro2hsxfogfq.onion)
# Attacks # Days with Attacks
compromising opponents
“business”
Instruction Points Public Key Private Key Instruction Points Public Key XYZ.onion Signing Keypair Generation
Dark Web as “corner case” of the Internet… NO! Active and Dynamic Underground Market Motivated and Knowledgeable Attackers Manual and Targeted Attacks Modern and Sophisticated Threats
Senior Researcher at Trend Micro http://www.madlab.it @embyte
*With the cooperation of Mayra
Rosario and Vincenzo Ciancaglini