mining threat intelligence from billion scale ssh brute
play

Mining Threat-intelligence from Billion- scale SSH Brute-Force - PowerPoint PPT Presentation

Mining Threat-intelligence from Billion- scale SSH Brute-Force Attacks Yuming Wu 1 , Phuong M. Cao 1 , Alexander Withers 2 , Zbigniew T. Kalbarczyk 1 , Ravishankar K. Iyer 1 1 University of Illinois at Urbana-Champaign (UIUC) 2 National


  1. Mining Threat-intelligence from Billion- scale SSH Brute-Force Attacks Yuming Wu 1 § , Phuong M. Cao 1 § , Alexander Withers 2 , Zbigniew T. Kalbarczyk 1 , Ravishankar K. Iyer 1 1 University of Illinois at Urbana-Champaign (UIUC) 2 National Center for Supercomputing Applications (NCSA) § Joint first authors

  2. Key Findings Implications • Over 70% are persistent attackers • Discerning global coordination efforts in SSH key exploitation and client version spoofing • Identification of 7 SSH keys related to outdated vulnerabilities • Alerting cloud providers and IoT vendors regarding stolen SSH keys • Globally distributed IPs massively spoofed over one million fake client • Deterring large-scale evasion techniques versions using anomaly detectors or rate limiters • Discovery of human-supervised • Preparing for resourceful and strategic versus fully automated botnets human-supervised attacks 2

  3. Analysis Workflow 3

  4. Exploitation, Coordination, and Evasion - Leaked SSH Keys • We identified 7 keys related to outdated vulnerabilities – indicating some devices still unpatched Attackers had adequate details (i.e., credentials) about relevant vulnerabilities that were related with these 7 keys, when plotting the targeted attacks 4

  5. Exploitation, Coordination, and Evasion - Leaked SSH Keys: Attack Origins • Attackers leveraged Google LLC (Google), Charter Communications, and Portlane to exploit the 7 identified leaked keys • Attackers from Google-registered IPs attempted all 7 keys with four other unknown keys on the same day Speculation: Attackers were rapidly switching ASes to evade detection, and possibly switching targets 5

  6. Exploitation, Coordination, and Evasion - Key-based Collaboration • An SSH key was exploited by 20 countries • The globally coordinated botnet exploited a single SSH key 90 times within only 4 days • The last key was persistently used one single country for 2,700 times spanning 5 months The globally coordinated bot wrapped up its fruitless attacks and shifted targets 50× faster than the persistent, single-country botnet 6

  7. Exploitation, Coordination, and Evasion - Client Version-based Collaboration and Evasion • More than 1.7 million new client versions 7000x 1.0000 were spoofed in August alone max previous months 0.9998 • Only several hundred globally- distributed IPs were spoofing 0.9996 cdf (e.g. SSH-2.0-OpenSSH_+qLfH) 0.9994 Aug • Yet 90% IPs used only 1 client version 0.9992 Sep Oct 0.9990 • The top-spoofing IP advertised 400,000 10 1 10 2 10 3 10 4 10 5 # Unique client versions per IP unique client versions during its 200- hour attack campaign A globally-coordinated botnets were involved in forging a million permutations of client versions at high frequencies Voids signature-based detectors 7

  8. Analysis Workflow 8

  9. Human-supervised Attack Techniques - Data-driven Methodology Purpose: identify evidence of human attackers • Time zone and duration selection 0.4 µ + 3 σ µ • Ratio: average weekday to weekend attempt pmf 0.2 computation for each IP 0.0 • Tail analysis of ratio distribution 10 0 10 1 10 2 0 ratio • All IPs in the tail present similar activity patterns; used the same group of credentials; came from 10 7 the same /8 subnet Attempts 10 5 10 3 • Periodic variations with decreasing activities 10 1 1 3 5 7 2 4 6 1 3 5 7 2 4 6 1 3 5 7 2 4 6 1 3 5 7 2 4 Day of week on weekends (especially Sundays) 9

  10. Human-supervised versus Fully Automated Bots Human-supervised botnet is more resourceful, ambitious, and strategic than full automated one 10

  11. Conclusions Future • Investigated a broad scope of • Landscape of unidentified, SSH attack strategies unknown SSH keys • Discovered large-scale, • Resourceful attackers with persistent, and evasion attacks relatively large number of legitimate client versions • Contributed a scientific data- driven approach to differentiate • Threat intelligence sharing between human-supervised across peer sites with and fully automated botnet preservation of privacy 11

  12. Thank you! 12

  13. Acknowledgements • SDAIA: https://wiki.ncsa.illinois.edu/display/cybersec/SDAIA • NSF Grant: CICI: Secure Data Architecture: Shared Intelligence Platform for Protecting our National Cyberinfrastructure. Award Number: 1547249 • NSF Grant: SI2-SSE: AttackTagger: Early Threat Detection for Scientific Cyberinfrastructure. Award Number: 1535070 • DEPEND group Symphony Cluster 13

  14. References • “Ssh bad keys,” 2017, https://github.com/rapid7/ssh-badkeys. • “Packet storm,” 2019, https://packetstormsecurity.com/. 14

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend