Network Analysis of Point of Sale System Compromises Operation - - PowerPoint PPT Presentation

network analysis of point of sale system compromises
SMART_READER_LITE
LIVE PREVIEW

Network Analysis of Point of Sale System Compromises Operation - - PowerPoint PPT Presentation

Network Analysis of Point of Sale System Compromises Operation Terminal Guidance Chicago Electronic & Financial Crimes Task Force U.S. Secret Service Outline Background Hypothesis Deployment Methodology Data Analysis


slide-1
SLIDE 1

Network Analysis of Point of Sale System Compromises

Operation Terminal Guidance Chicago Electronic & Financial Crimes Task Force U.S. Secret Service

slide-2
SLIDE 2

Outline

  • Background
  • Hypothesis
  • Deployment Methodology
  • Data Analysis
  • Findings
  • Discussion
slide-3
SLIDE 3

Investigative Goals

  • Hypothesis: Remote attackers were not

targeting point of sale (POS) system software, rather POS system compromises are a result of insecure deployment of the underlying operating system by automated scanning and vulnerability exploitation

slide-4
SLIDE 4

Deployment Methodology

ADSL Router/Modem Honeywall Point of Sale System Remote Management

VMnet 0 (Bridged to Host) VMnet 2 VMnet 4

eth2 10.10.1.x eth0 0.0.0.0 eth1 0.0.0.0 eth0 10.10.1.x

*Each server represents a virtual machine

eth1 192.168.1.1 eth0 68.166.251.x

VMnet 3

Firewall

eth0 192.168.1.x

ADSL Router/Modem Honeywall Point of Sale System Remote Management

VMnet 0 (Bridged to Host) VMnet 2 VMnet 4

eth2 10.10.1.x eth0 0.0.0.0 eth1 0.0.0.0 eth0 10.10.1.x

*Each server represents a virtual machine

eth1 192.168.1.1 eth0 68.166.251.x

VMnet 3

Firewall

eth0 192.168.1.x

ADSL Router/Modem Honeywall Point of Sale Systems Remote Management

VMnet 0 (Bridged to Host) VMnet 2 VMnet 4

eth2 10.10.1.x eth0 0.0.0.0 eth1 0.0.0.0 eth0 10.10.1.x

*Each server represents a virtual machine

eth0 68.166.251.x eth0 68.166.251.x eth0 68.166.251.x

ADSL Router/Modem Honeywall Point of Sale Systems Remote Management

VMnet 0 (Bridged to Host) VMnet 2 VMnet 4

eth2 10.10.1.x eth0 0.0.0.0 eth1 0.0.0.0 eth0 10.10.1.x

*Each server represents a virtual machine

eth0 68.166.251.x eth0 68.166.251.x eth0 68.166.251.x

Test Group Honeynet Control Group Honeynet Honeytoken

slide-5
SLIDE 5

Data Analysis

0.05 0.1 0.15 0.2 0.25 0.3 1026 1027 1028 135 5901 445 139 80 Ports Connection Frequency (Percentage) POS A POS B POS C

Control Group

Connection Attempts by port

slide-6
SLIDE 6

Data Analysis

0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 135 139 445 1026 1394 5017 5900 Ports Connection Frequence (Percentage) POS A POS B POS C

Test Group

Connection Attempts by port

slide-7
SLIDE 7

Data Analysis

  • Association rules

– Clustering

  • T: Number of virtual POS systems with connection

attempts from a single source

  • ni: Number of packets from a source to a virtual

POS system

  • N: Total number of packets from a source to all

three POS systems

  • N=∑ ni

Support(R) = # connections (POS system A, B, and C) #connections

Data analysis methodology from

  • F. Pouget and M. Dacier. “Honeypot Based Forensics.”
slide-8
SLIDE 8

Data Analysis

1 90.9% Cluster 14: T=1, N=2 5901 1 83% Cluster 13: T=1, N=1 1028 1 98% Cluster 12: T=1, N=1 1027 1 53.5% Cluster 11: T=1, N=1 1026 2 20% 70% 7.1% Cluster 8: T=1, N=1 Cluster 9: T=1, N=2 Cluster 10: T=1, N=3 445 1 75% 10.1% Cluster 6: T=1, N=2 Cluster 7: T=1, N=3 139 2 54.5% 22% Cluster 4: T=1, N=1 Cluster 5: T=1, N=2 135 1 43.5% 10.9% 4.3% Cluster 1: T=1, N=3 Cluster 2: T=1, N=1 Cluster 3: T=2, N=8 (n=5, n=3) 80 Support % > 1% Support % Item Sets Port

Control Group Clusters

slide-9
SLIDE 9

Data Analysis

20% Cluster 11: T=3, N=3 5900 10% 10% Cluster 9: T=3, N=8 (n=2, n=3, n=3) Cluster 10: T=3, N=30 (n=10, n=10, n=10) 2967 3 20% 16.7% 1.7% 16.7% Cluster 5: T=1, N=12 Cluster 6: T=1, N=15 Cluster 7: T=1, N=6 Cluster 8: T=1, N=9 1394 2 1.8% 20% 50.9% Cluster 2: T=2, N=3 Cluster 3: T=3, N=3 (n=1,n=1, n=1) Cluster 4: T=1, N=1 1026 22.2% Cluster 1: T=2, N=34 445 Support % > 1% Support % Item Sets Port

Test Group Clusters

slide-10
SLIDE 10

Data Analysis

  • Edit Distance Analysis

– Extract TCP payloads from previous identified cluster members – Compare packets from each IP address against all others identified through clustering

<mss E..0.{@.k.l\=.y. D..s.....jd..... p............... <mss E..0.{@.k.l\=.y. D..s.....jd..... p............... <mss E..0..@.o.A.;W\. D..s.].......... p...^2.......... <mss E..0..@.o.A.;W\. D..s.].......... p...^2..........

Source B Source A

Attack Phrases

slide-11
SLIDE 11

Data Analysis

12 32 5901 Cluster 14 65 12 1028 Cluster 13 169 86 1026 Cluster 11 18 4 445 Cluster 10 8 5 445 Cluster 9 10 3 445 Cluster 8 5 1 139 Cluster 7 9 2 139 Cluster 6 Std Deviation Phrase Distance (Lines) Port Cluster ***Clusters 1,2, 3,4,5, and 12 were discarded as not statistically significant

Control Group Phrase Distance

slide-12
SLIDE 12

Data Analysis

257 240 5900 Cluster 11 1143 1422 1394 Cluster 8 136 529 1394 Cluster 7 170 280 1394 Cluster 6 85 360 1394 Cluster 5 238 324 1026 Cluster 2 Std Deviation Phrase Distance (Lines) Port Cluster

***Clusters 1,3,4,9,10 were discarded as not statistically significant

Test Group Phrase Distance

slide-13
SLIDE 13

Data Analysis

UDP Source Port UDP Destination Port TCP Destination Port Seq Number IP Destination Address TCP Source Port IP Header Checksum IP Source Address TTL IP Transport Protocol IP Flags IP Fragment IP Total Length IP ID IP Header Length IP Differential Services IP Version Ethertype Packet Length

Network Traffic Overview POS A – Control Group

Visualization methodology from Greg Conti’s. “Security Data Visualization.”

slide-14
SLIDE 14

Data Analysis

Source IP TCP Source Port TCP Destinatio n Port Source IP TCP Destination Port

slide-15
SLIDE 15

Data Analysis

  • The TCP outlier is

associated with browsing public web site to ensure connectivity

  • Uniform length of

packets

slide-16
SLIDE 16

Data Analysis

TCP Packet Tree Map UDP Packet Tree Map

slide-17
SLIDE 17

Data Analysis

  • Examination of the UDP packets identified

in the previous tree map revealed them to be spam targeting messenger applications

slide-18
SLIDE 18

Findings

  • Automated scanning of select set of ports
  • Multiple exploits targeting multiple OS’s

from single source IP address

  • Attackers not aware compromised system

is a POS system until after compromise and exploit

  • Insecure installation of operating system

and applications lead to compromise

slide-19
SLIDE 19

Discussion

Ryan E. Moore Special Agent U.S. Secret Service 312-353-5431 ryan.moore@usss.dhs.gov

All references available upon request