only post comments made by the speakers or panelists do
play

Only post comments made by the speakers or panelists Do not post - PowerPoint PPT Presentation

Social Media Posting Allowed Tweeter, Facebook, LinkedIn, other social media posts are welcomed in this session if you: Only post comments made by the speakers or panelists Do not post comments or questions from the


  1. – Social Media Posting Allowed – 
 Tweeter, Facebook, LinkedIn, other social media posts 
 are welcomed in this session if you: 
 • Only post comments made by the speakers or panelists • Do not post comments or questions from the audience 
 (but you can share the speakers’ responses to questions) • Do not post the name, position or company of other meeting attendees • Do not post conversations with attendees • M 3 AAWG is not a deliverability conference; we are: • An industry working group meeting • An anti-abuse conference, or • A gathering of security experts • All of the M 3 AAWG Membership, Trademarks and Logo guidelines apply ( https://www.m3aawg.org/members/how-promote-m3aawg#TrademarkGuidelines ) • Appreciate a shout out to @maawg and #m3aawg42 M3AAWG 42nd General Meeting | San Francisco | February 2018

  2. Understanding the Mirai Botnet Manos Antonakakis ✝ , Tim April ◆ , Michael Bailey ★ , Matthew Bernhard ‡ , Elie Bursztein ✱ Jaime Cochran △ , Michalis Kallitsis ● , Damian Menscher ✱ , Zakir Durumeric ‡ Deepak Kumar ★ , Chad Seaman ◆ , J. Alex Halderman ‡ , Luca Invernizzi ✱ , Chaz Lever ✝ Zane Ma ★ , Joshua Mason ★ , Nick Sullivan △ , Kurt Thomas ✱ , Yi Zhou ★ ◆ Akamai Technologies, △ Cloudflare, ✝ Georgia Institute of Technology, ✱ Google, ● Merit Network ★ University of Illinois Urbana-Champaign , ‡ University of Michigan Understanding the Mirai Botnet ▪︎ Zane Ma 2

  3. Internet of Things 2016 2020 6 - 9 Billion ~30 Billion Understanding the Mirai Botnet ▪︎ Zane Ma 3

  4. IoT Botnets 2012 Carna Botnet 2015 BASHLITE / gafgyt 420,000 devices 1,000,000 devices Understanding the Mirai Botnet ▪︎ Zane Ma 4

  5. Mirai Understanding the Mirai Botnet ▪︎ Zane Ma 5

  6. Lifecycle Attacker • Fast, stateless port-scanning: �� Send command SYN w/ TCP seq # = dest IP Command Report �� Dispatch Loader • Check for SYN-ACKs where & Control Server Infrastructure TCP seq # = src IP + 1 �� Relay ��� Load � � Report • Raw socket, requires root Devices �� Scan Victim Bots • If port open, brute force telnet � Attack login credentials DDoS Target Understanding the Mirai Botnet ▪︎ Zane Ma 6

  7. Lifecycle Attacker • Reports successful IP:port, �� Send command username:password Command Report �� Dispatch Loader • Report server aggregates & Control Server Infrastructure results �� Relay ��� Load � � Report Devices �� Scan Victim Bots � Attack DDoS Target Understanding the Mirai Botnet ▪︎ Zane Ma 7

  8. Lifecycle Attacker • Asynchronous from scanning �� Send command + reporting Command Report �� Dispatch Loader • Supports building up potential & Control Server Infrastructure “hit list” �� Relay ��� Load � � Report Devices �� Scan Victim Bots � Attack DDoS Target Understanding the Mirai Botnet ▪︎ Zane Ma 8

  9. Lifecycle Attacker • Determines architecture, �� Send command wget/tftp 1 out of 9 archs. Command Report �� Dispatch Loader • Defensive - kills competing & Control Server Infrastructure Mirai, and any processes �� Relay ��� Load � � Report listening on HTTP/Telnet/SSH Devices �� Scan Victim • Obfuscates process name Bots and removes executable - � Attack does not survive reboots DDoS Target Understanding the Mirai Botnet ▪︎ Zane Ma 9

  10. Lifecycle Attacker • Simple attack API - �� Send command configurable duration, attack size (# bots), IP spoofing Command Report �� Dispatch Loader & Control Server Infrastructure • Supports 10 attack types, �� Relay ��� Load � � Report volumetric/TCP/application Devices �� Scan Victim Bots � Attack DDoS Target Understanding the Mirai Botnet ▪︎ Zane Ma 10

  11. Lifecycle Attacker • C&C resolves domains, �� Send command issues attacks on IPs Command Report �� Dispatch Loader & Control Server Infrastructure �� Relay ��� Load � � Report Devices �� Scan Victim Bots � Attack DDoS Target Understanding the Mirai Botnet ▪︎ Zane Ma 11

  12. Lifecycle Attacker • Attacks do not interrupt �� Send command scanning Command Report �� Dispatch Loader • Fingerprintable application & Control Server Infrastructure level packets �� Relay ��� Load � � Report • Configurable reflection / Devices �� Scan Victim amplification attacks Bots � Attack DDoS Target Understanding the Mirai Botnet ▪︎ Zane Ma 12

  13. Measurement Attacker Data Source Size �� Send command Network Telescope 4.7M unused IPs Command Report �� Dispatch Loader • 0.1% of IPv4 address space & Control Server Infrastructure �� Relay ��� Load � • 1.1M packets / min � Report • Look for Mirai fingerprint Devices �� Scan Victim Bots � Attack DDoS Target Understanding the Mirai Botnet ▪︎ Zane Ma 13

  14. Measurement Attacker Data Source Size �� Send command Network Telescope 4.7M unused IPs Command Report �� Dispatch Loader • 0.1% of IPv4 address space & Control Server Infrastructure �� Relay ��� Load � • 1.1M packets / min � Report • Look for Mirai fingerprint Devices �� Scan Victim Bots • Handling IP churn: look for active � Attack concurrent scans DDoS Target Understanding the Mirai Botnet ▪︎ Zane Ma 14

  15. Measurement Attacker Data Source Size �� Send command Network Telescope 4.7M unused IPs Active Scanning 136 IPv4 scans Command Report �� Dispatch Loader & Control Server Infrastructure • Application protocol banners �� Relay ��� Load � � Report (telnet, FTP, HTTP, etc.) Devices �� Scan Victim • Device attribution: NMap service Bots probes, manual labeling � Attack DDoS Target Understanding the Mirai Botnet ▪︎ Zane Ma 15

  16. Measurement Attacker Data Source Size �� Send command Network Telescope 4.7M unused IPs Active Scanning 136 IPv4 scans Command Report �� Dispatch Loader & Control Server Infrastructure • Application protocol banners �� Relay ��� Load � � Report (telnet, FTP, HTTP, etc.) Devices �� Scan Victim • Device attribution: NMap service Bots probes, manual labeling � Attack • Future work: Individual device DDoS Target fingerprinting Understanding the Mirai Botnet ▪︎ Zane Ma 16

  17. Measurement Attacker Data Source Size �� Send command Network Telescope 4.7M unused IPs Active Scanning 136 IPv4 scans Command Report �� Dispatch Loader & Control Server Infrastructure Telnet Honeypots 434 binaries �� Relay ��� Load � � Report • Busybox shell that accepts any telnet login credentials Devices �� Scan Victim Bots • Used collected binaries to � Attack generate YARA rules DDoS Target Understanding the Mirai Botnet ▪︎ Zane Ma 17

  18. Measurement Attacker Data Source Size �� Send command Network Telescope 4.7M unused IPs Active Scanning 136 IPv4 scans Command Report �� Dispatch Loader & Control Server Infrastructure Telnet Honeypots 434 binaries �� Relay ��� Load � Malware Repository 594 binaries � Report • Found VirusTotal binaries Devices �� Scan Victim matching YARA rules Bots � Attack DDoS Target Understanding the Mirai Botnet ▪︎ Zane Ma 18

  19. Measurement Attacker Data Source Size �� Send command Network Telescope 4.7M unused IPs Active Scanning 136 IPv4 scans Command Report �� Dispatch Loader & Control Server Infrastructure Telnet Honeypots 434 binaries �� Relay ��� Load � Malware Repository 594 binaries � Report Active/Passive DNS 499M daily RRs Devices �� Scan Victim • Active = Thales DNS monitoring Bots system, using zone files, domain lists � Attack • Passive = Resource Records from DDoS Target large US ISP Understanding the Mirai Botnet ▪︎ Zane Ma 19

  20. Measurement Attacker Data Source Size �� Send command Network Telescope 4.7M unused IPs Active Scanning 136 IPv4 scans Command Report �� Dispatch Loader & Control Server Infrastructure Telnet Honeypots 434 binaries �� Relay ��� Load � Malware Repository 594 binaries � Report Active/Passive DNS 499M daily RRs Devices �� Scan Victim C2 Milkers 64K issued attacks Bots • C&C doesn’t authenticate / � Attack validate connecting bots DDoS Target Understanding the Mirai Botnet ▪︎ Zane Ma 20

  21. Measurement Attacker Data Source Size �� Send command Network Telescope 4.7M unused IPs Active Scanning 136 IPv4 scans Command Report �� Dispatch Loader & Control Server Infrastructure Telnet Honeypots 434 binaries �� Relay ��� Load � Malware Repository 594 binaries � Report Active/Passive DNS 499M daily RRs Devices �� Scan Victim C2 Milkers 64K issued attacks Bots Krebs DDoS Attack 170K attacker IPs � Attack DDoS Target Understanding the Mirai Botnet ▪︎ Zane Ma 21

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend