Leveraging Honest Users:
Stealth Command-and-Control of Botnets Diogo Mónica
INESC-ID/IST diogo.monica@ist.utl.pt
Thursday, August 29, 13
Leveraging Honest Users: Stealth Command-and-Control of Botnets - - PowerPoint PPT Presentation
Leveraging Honest Users: Stealth Command-and-Control of Botnets Diogo Mnica INESC-ID/IST diogo.monica@ist.utl.pt Thursday, August 29, 13 Summary Motivation Problem statement Stealth C&C using browsers Final remarks
Stealth Command-and-Control of Botnets Diogo Mónica
INESC-ID/IST diogo.monica@ist.utl.pt
Thursday, August 29, 13
Thursday, August 29, 13
takedown and detection
C&C infrastructure might take
Thursday, August 29, 13
Thursday, August 29, 13
through some open port
Thursday, August 29, 13
Thursday, August 29, 13
Bots
BM
Thursday, August 29, 13
Thursday, August 29, 13
Thursday, August 29, 13
for the botmaster
Thursday, August 29, 13
number of requests per second
Thursday, August 29, 13
malicious code
Botmaster
0x72e4b76 0xc52b7d0 0x80762b8 0xde3254e 0x72e4b76 0xc52b7d0 0x80762b8 0xde3254e 0x72e4b76 0xc52b7d0 0x80762b8 0xde3254eBots
Vulnerable Web App
Web Users
Thursday, August 29, 13
Thursday, August 29, 13
botmaster’s orders
quickly
the web-browser disappear
Thursday, August 29, 13
Javascript
Thursday, August 29, 13
Thursday, August 29, 13
Thursday, August 29, 13
30,000 500 5000 10,000 15,000 20,000 25,000 1 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
Number of Hosts
Percentage of bots %
▲ 15 minutes
■ 20 minutes
20 minutes
w/ cooperation
S M B
Thursday, August 29, 13
poisoning, abuse URL shortener, etc
legitimate websites
Thursday, August 29, 13
(credit-cards, email accounts, SSN’s, etc)
each bot for robustness and stealthiness, but makes it difficult to create an upstream channel
Thursday, August 29, 13
information encoded along with spam
key, ensuring confidentiality of data
Thursday, August 29, 13
Thursday, August 29, 13
and signs it with it’s own public key
this key-pair
“legitimate” dissemination website
Thursday, August 29, 13
Bot Master (bm)
x 7 2 e 4 b 7 6 x c 5 2 b 7 d x 8 7 6 2 b 8 x d e 3 2 5 4 eBot Dissemination Website (W) Dissemination Layer Host
1 2
Kbm, K-1 w, {Kw}K-1 bm, {C}K-1 bm Kbm{Kw}K-1 bm, {M}K-1 w
1 2 1
Thursday, August 29, 13
Bot
Dissemination Layer Host
Dst IP, {C}K-1 bm Message M
{Kw}K-1 bm, {M}K-1 w M'
Ack Message M'
Thursday, August 29, 13
Encrypted finger
Dissemination Layer Host
x 7 2 e 4 b 7 6 x c 5 2 b 7 d x 8 7 6 2 b 8 x d e 3 2 5 4 e x 7 2 e 4 b 7 6 x c 5 2 b 7 d x 8 7 6 2 b 8 x d e 3 2 5 4 e x 7 2 e 4 b 7 6 x c 5 2 b 7 d x 8 7 6 2 b 8 x d e 3 2 5 4 e x 7 2 e 4 b 7 6 x c 5 2 b 7 d x 8 7 6 2 b 8 x d e 3 2 5 4 eCommand Dissemination A B C D
x 7 2 e 4 b 7 6 x c 5 2 b 7 d x 8 7 6 2 b 8 x d e 3 2 5 4 e x 7 2 e 4 b 7 6 x c 5 2 b 7 d x 8 7 6 2 b 8 x d e 3 2 5 4 e x 7 2 e 4 b 7 6 x c 5 2 b 7 d x 8 7 6 2 b 8 x d e 3 2 5 4 e x 7 2 e 4 b 7 6 x c 5 2 b 7 d x 8 7 6 2 b 8 x d e 3 2 5 4 e2 1 3 4
N/A {A}Kbm {A}Kbm,{B}Kbm,{C}Kbm
1 2 4
{A}Kbm,{B}Kbm
3 Thursday, August 29, 13
Bots
x 7 2 e 4 b 7 6 x c 5 2 b 7 d x 8 7 6 2 b 8 x d e 3 2 5 4 e x 7 2 e 4 b 7 6 x c 5 2 b 7 d x 8 7 6 2 b 8 x d e 3 2 5 4 e x 7 2 e 4 b 7 6 x c 5 2 b 7 d x 8 7 6 2 b 8 x d e 3 2 5 4 eEncrypted finger set by D1 Encrypted finger set by D2
x 7 2 e 4 b 7 6 x c 5 2 b 7 d x 8 7 6 2 b 8 x d e 3 2 5 4 eDissemination Layer Hosts
D1 D2 Thursday, August 29, 13
Thursday, August 29, 13
crawling through the overlay.
Thursday, August 29, 13
BM
0x72e4b76 0xc52b7d0 0x80762b8 0xde3254e 0x72e4b76 0xc52b7d0 0x80762b8 0xde3254e 0x72e4b76 0xc52b7d0 0x80762b8 0xde3254e 0x72e4b76 0xc52b7d0 0x80762b8 0xde3254e 0x72e4b76 0xc52b7d0 0x80762b8 0xde3254e 0x72e4b76 0xc52b7d0 0x80762b8 0xde3254e 0x72e4b76 0xc52b7d0 0x80762b8 0xde3254e 0x72e4b76 0xc52b7d0 0x80762b8 0xde3254eq
0x72e4b76 0xc52b7d0 0x80762b8 0xde3254eto guarantee anonymity when retrieving data
Thursday, August 29, 13
landscape
websites
Thursday, August 29, 13
diogo.monica@ist.utl.pt
Thursday, August 29, 13