Malice on the Internet
A Peek into Today’s Security Attacks
Arvind Krishnamurthy
Thursday, November 4, 2010
Malice on the Internet A Peek into Todays Security Attacks Arvind - - PowerPoint PPT Presentation
Malice on the Internet A Peek into Todays Security Attacks Arvind Krishnamurthy Thursday, November 4, 2010 Bit of History: Morris Worm Worm was released in 1988 by Robert Morris Graduate student at Cornell, son of NSA scientist
A Peek into Today’s Security Attacks
Arvind Krishnamurthy
Thursday, November 4, 2010
harmlessly measure the size of the Internet
fast as it could and overloaded infected machines
to 3 years of probabation
Thursday, November 4, 2010
buffer overflow attack against a vulnerable version
VAX systems
caused it to execute code creating a new worm copy
attacked fingerd on Suns running BSD, causing them to crash (instead of spawning a new copy)
Thursday, November 4, 2010
today?
Thursday, November 4, 2010
Thursday, November 4, 2010
above
Thursday, November 4, 2010
Thursday, November 4, 2010
Thursday, November 4, 2010
Search for vulnerable webservers Compromise webserver Host phishing/malware page Propagate link to potential victims Compromised machine joins a Botnet
Thursday, November 4, 2010
Thursday, November 4, 2010
Search for vulnerable webservers Compromise webserver Host phishing/malware page Propagate link to potential victims Compromised machine joins a Botnet
Thursday, November 4, 2010
attract more web traffic
Thursday, November 4, 2010
"index of /etc”
Thursday, November 4, 2010
Text
search term
Thursday, November 4, 2010
Text
search term
Thursday, November 4, 2010
Text
search term
“Powered by DataLife Engine”
Thursday, November 4, 2010
Text
search term
Thursday, November 4, 2010
Thursday, November 4, 2010
Thursday, November 4, 2010
1. Start with a few known malicious queries (seed set) 2. Expand the seed set 3. Generalize
attacks
Thursday, November 4, 2010
Seed queries Seed queries Seed queries
Thursday, November 4, 2010
Seed queries Seed queries Seed queries
Thursday, November 4, 2010
Seed queries Seed queries Seed queries
Thursday, November 4, 2010
Seed queries Seed queries Seed queries
Thursday, November 4, 2010
Seed queries Seed queries Seed queries
Search log
Seed query IPs
Expanded query set
Thursday, November 4, 2010
Seed queries Seed queries Seed queries
Search log
Seed query IPs
Expanded query set
Thursday, November 4, 2010
Seed queries Seed queries Seed queries
Search log
Seed query IPs
Expanded query set Regular expression engine Attackers' queries + results
Regular expressions
Thursday, November 4, 2010
Seed queries Seed queries Seed queries
Search log
Seed query IPs
Expanded query set Regular expression engine Attackers' queries + results
Regular expressions
Thursday, November 4, 2010
Seed queries
Thursday, November 4, 2010
Seed queries
Expanded set
Thursday, November 4, 2010
Seed queries
Expanded set
RegEx match
Thursday, November 4, 2010
Thursday, November 4, 2010
Seed queries Seed queries Seed queries
Search log
Seed query IPs
Expanded query set Regular expression engine Attackers' queries + results
Regular expressions Loop back seed queries
Thursday, November 4, 2010
Seed queries
Expanded set
RegEx match
RegEx match + loopback
Thursday, November 4, 2010
Search for vulnerable webservers Compromise webserver Host phishing/malware page Propagate link to potential victims Compromised machine joins a Botnet
Thursday, November 4, 2010
shopping carts
file by issuing a post on:
interpreter
http://www.example.com/store/admin/file_manager.php/ login.php?action=processuploads
Thursday, November 4, 2010
upload new files, perform brute force password cracking, open a network port, etc.
Thursday, November 4, 2010
Thursday, November 4, 2010
being used to compromise
attackers
Thursday, November 4, 2010
vulnerable software
software
Thursday, November 4, 2010
World Wide Web Malicious query feed
Web pages
Encapsulated pages HEAT-SEEKING HONEYPOT Search results VM Apache Webapp Add to search engine index Query Attackers Attack log Attack request
1
1
1
2
1
3
1
4
1
5
1
6
1
7
Thursday, November 4, 2010
World Wide Web Malicious query feed
Web pages
Encapsulated pages HEAT-SEEKING HONEYPOT Search results VM Apache Webapp Add to search engine index Query Attackers Attack log Attack request
1
1
1
2
1
3
1
4
1
5
1
6
1
7
Thursday, November 4, 2010
World Wide Web Malicious query feed
Web pages
Encapsulated pages HEAT-SEEKING HONEYPOT Search results VM Apache Webapp Add to search engine index Query Attackers Attack log Attack request
1
1
1
2
1
3
1
4
1
5
1
6
1
7
the corresponding vulnerable software
Thursday, November 4, 2010
new pages based on this content
World Wide Web Malicious query feed
Web pages
Encapsulated pages HEAT-SEEKING HONEYPOT Search results VM Apache Webapp Add to search engine index Query Attackers Attack log Attack request
1
1
1
2
1
3
1
4
1
5
1
6
1
7
Thursday, November 4, 2010
pages
World Wide Web Malicious query feed
Web pages
Encapsulated pages HEAT-SEEKING HONEYPOT Search results VM Apache Webapp Add to search engine index Query Attackers Attack log Attack request
1
1
1
2
1
3
1
4
1
5
1
6
1
7
Thursday, November 4, 2010
World Wide Web Malicious query feed
Web pages
Encapsulated pages HEAT-SEEKING HONEYPOT Search results VM Apache Webapp Add to search engine index Query Attackers Attack log Attack request
1
1
1
2
1
3
1
4
1
5
1
6
1
7
Thursday, November 4, 2010
manually installed 4 software packages
!"# !""# !"""# !""""#
!# $# %# &# '# (# )# *# +# !"# !!# !$# !%# !&# !'# !(# !)# !*# !+# $"# $!# $$# $%# $&#
!"#$%&'()'*+,+-,' .(/%01(-'123%'4(&5%&%5'$0'6*+,+-,7'
Thursday, November 4, 2010
Category Description Example Traffic (%) ADMIN Find administrator console GET,POST /store/admin/login.php 1.00 COMMENT Post spam in comment or forum POST /forum/reply.php?do=newreply&t=12 FILE Access files on filesystem GET /cgi-bin/img.pl?f=../etc/passwd 43.57 INSTALL Access software install script GET /phpmyadmin/scripts/setup.php 12.47 PASSWD Brute-force password attack GET joomla/admin/?uppass=superman1 2.68 PROXY Check for open proxy GET http://www.wantsfly.com/prx2.php 0.40 RFI Look for remote file inclusion (RFI) vulnerabilities GET /ec.php?l=http://213.41.16.24/t/c.in 10.94 SQLI Look for SQL injection vulnerabilities GET /index.php?option=c' 1.40 XMLRPC Look for the presence of a certain xmlrpc script GET /blog/xmlrpc.php 18.97 XSS Check for cross-site-scripting (XSS) GET /index.html?umf=<script>foo</script> 0.19 OTHER Everything else 8.40 Thursday, November 4, 2010
Search for vulnerable webservers Host phishing/malware page Propagate link to potential victims Compromised machine joins a Botnet Compromise webserver
Thursday, November 4, 2010
trust:
search results. Typically referred to as Search Engine Optimization (SEO)
Thursday, November 4, 2010
Thursday, November 4, 2010
Trends keywords
boost page rank
what is presented to the user (called cloaking)
Thursday, November 4, 2010
techniques?
Thursday, November 4, 2010
Search for vulnerable webservers Host phishing/malware page Compromised machine joins a Botnet Propagate link to potential victims Compromise webserver
Thursday, November 4, 2010
facts especially in real-time
Thursday, November 4, 2010
To build a botnet monitoring platform that can track the activities of the most significant spamming botnets currently operating in real-time
Thursday, November 4, 2010
behavior without causing harm
Thursday, November 4, 2010
Incoming Spam
URLs
Message Summary DB
Relay IPs Headers Subject
Malware Crawler
URLs
Archival Storage Internet
TOR Thursday, November 4, 2010
URLs
Incoming Spam
URLs
Message Summary DB
Relay IPs Headers Subject
Malware Crawler
URLs
Archival Storage Internet
TOR Thursday, November 4, 2010
URLs
malicious
Incoming Spam
URLs
Message Summary DB
Relay IPs Headers Subject
Malware Crawler
URLs
Archival Storage Internet
TOR Thursday, November 4, 2010
URLs
malicious
legitimate (compromised) webservers
Incoming Spam
URLs
Message Summary DB
Relay IPs Headers Subject
Malware Crawler
URLs
Archival Storage Internet
TOR Thursday, November 4, 2010
discarding duplicates
fingerprint, which is a sequence
(DNS, IP , TCP/UDP)
VM to check for VM detection
bots issue random flows (e.g., Google searches)
New Bot Binary
Malware Crawler Network Fingerprinting
New VM-aware Bot
Bot VM Bot VM Virtual Machines
Execution Engine Internet
TOR Bot Bare-metal Bot Thursday, November 4, 2010
spam they send
bots to get them to run
Bot VM Bot VM Virtual Machines
Execution Engine Outgoing Spam
Bot Bare-metal Bot spamhole
Internet
TOR C&C Traffic Thursday, November 4, 2010
verified later by the C&C server
C&C server Special mail server
Thursday, November 4, 2010
verified later by the C&C server
C&C server Special mail server
Test Email
Thursday, November 4, 2010
verified later by the C&C server
C&C server Special mail server
Test Email Message code #$#@
Thursday, November 4, 2010
verified later by the C&C server
C&C server Special mail server
Test Email Message code #$#@ Code $%@@
Thursday, November 4, 2010
verified later by the C&C server
C&C server Special mail server
Test Email Message code #$#@ Code $%@@
Thursday, November 4, 2010
verified later by the C&C server
C&C server Special mail server
Test Email Message code #$#@ Code $%@@
Thursday, November 4, 2010
webservices (such as HotMail)
blacklist suspicious IP ranges
rate are considered suspicious
botnets; so manual tweaking possible
Bot VM Bot VM Virtual Machines
Execution Engine Outgoing Spam
Bot Bare-metal Bot spamhole
Internet
TOR C&C Traffic Thursday, November 4, 2010
Thursday, November 4, 2010
URLs
Message Summary DB
Relay IPs Headers Subject Bot VM Bot VM Virtual Machines
Clustering DNS Monitoring
Hostnames Subjects, Relays Resolved IP addresses
Correlation Analysis Execution Engine Result Storage Outgoing Spam
Bot Bare-metal Bot spamhole
Outgoing Spam Incoming Spam
Thursday, November 4, 2010
Thursday, November 4, 2010
botnets (489 subjects/day per botnet)
Thursday, November 4, 2010
21% 1% 3% 4% 16% 20% 35%
Srizbi Rustock MegaD Kraken Unknown Pushdo Storm
The Internet
Thursday, November 4, 2010
21% 1% 3% 4% 16% 20% 35%
Srizbi Rustock MegaD Kraken Unknown Pushdo Storm
The Internet
Thursday, November 4, 2010
Thursday, November 4, 2010
Thursday, November 4, 2010
Thursday, November 4, 2010
Thursday, November 4, 2010
infrastructure relate to the botnets?
Web servers
1
Botnets
2 4 3
Thursday, November 4, 2010
infrastructure relate to the botnets?
Web servers
1
Botnets
2 4 3
Thursday, November 4, 2010
infrastructure relate to the botnets?
Web servers
1
Botnets
2 4 3
Thursday, November 4, 2010
infrastructure relate to the botnets?
botnet point to a single set of web servers?
Web servers
1
Botnets
2 4 3
Thursday, November 4, 2010
infrastructure relate to the botnets?
botnet point to a single set of web servers?
Web servers
1
Botnets
2 4 3
Thursday, November 4, 2010
infrastructure relate to the botnets?
many mapping
campaigns is a 3rd party service and not tied to botnets
Web servers
1
Botnets
2 4 3
Thursday, November 4, 2010
infrastructure relate to the botnets?
many mapping
campaigns is a 3rd party service and not tied to botnets
Web servers
1
Botnets
2 4 3
Thursday, November 4, 2010
address many of these attacks
systems that we have developed
done carefully to ensure safety
Thursday, November 4, 2010
(arvind@cs) or stop by my office (CSE 544).
Thursday, November 4, 2010