PhiGARo: Automatic Phishing Detection and Incident Response - - PowerPoint PPT Presentation

phigaro automatic phishing detection and incident
SMART_READER_LITE
LIVE PREVIEW

PhiGARo: Automatic Phishing Detection and Incident Response - - PowerPoint PPT Presentation

PhiGARo: Automatic Phishing Detection and Incident Response Framework Martin Husk, Jakub egan {husakm|cegan}@ics.muni.cz ECTCM 2014 Fribourg, Switzerland Outline Introduction, Phishing incident response, PhiGARo (phishing


slide-1
SLIDE 1

PhiGARo: Automatic Phishing Detection and Incident Response Framework

Martin Husák, Jakub Čegan {husakm|cegan}@ics.muni.cz

ECTCM 2014 Fribourg, Switzerland

slide-2
SLIDE 2

Outline

— Introduction, — Phishing incident response, — PhiGARo (phishing incident response tool), — Phishing honeypots (work in progress), — Conclusion.

Martin Husák, Jakub Čegan· PhiGARo: Automatic Phishing Detection and Incident Response Framework· 10. 9. 2014 2 / 23

slide-3
SLIDE 3

Research Questions

Question I.

How can we effectively handle a phishing incident?

Question II.

Can we automate phishing incident handling?

Question III.

Can we automate phishing incident reporting?

Question IV.

How can we attract phishers to phishing sensors?

Martin Husák, Jakub Čegan· PhiGARo: Automatic Phishing Detection and Incident Response Framework· 10. 9. 2014 3 / 23

slide-4
SLIDE 4

Masaryk University

— 40,000 users, — 15,000 active IP addresses a day, — Many faculties, subnets, and local administrators, — 1 security department – CSIRT-MU. — Not applying strict firewall or e-mail filtering rules, — Emphasis on open network and academic freedom. — >100 reported phishing incidents per year, — Unknown number of unreported incidents.

Martin Husák, Jakub Čegan· PhiGARo: Automatic Phishing Detection and Incident Response Framework· 10. 9. 2014 4 / 23

slide-5
SLIDE 5

Tools of the Trade

— Central security contact point, — Interaction with end-users and local administrators, — Request tracking software (RT), — 24 network probes (NetFlow, IPFIX), — Custom NetFlow analysis tools as an output of R&D.

Martin Husák, Jakub Čegan· PhiGARo: Automatic Phishing Detection and Incident Response Framework· 10. 9. 2014 5 / 23

slide-6
SLIDE 6

Phishing incident response

Question I.

How can we effectively handle a phishing incident?

Question II.

Can we automate phishing incident handling?

Question III.

Can we automate phishing incident reporting?

Question IV.

How can we attract phishers to phishing sensors?

Martin Husák, Jakub Čegan· PhiGARo: Automatic Phishing Detection and Incident Response Framework· 10. 9. 2014 6 / 23

slide-7
SLIDE 7

Phishing incident response

  • 1. Incident is reported,
  • 2. Searching for victims – checking mailserver logs and

network monitoring data,

  • 3. Interpreting the result, filtering false positives,
  • 4. Mitigation – restricting access to phishing websites,

filtering e-mails,

  • 5. Send warning to victims,
  • 6. Receive confirmation from victims.

Martin Husák, Jakub Čegan· PhiGARo: Automatic Phishing Detection and Incident Response Framework· 10. 9. 2014 7 / 23

slide-8
SLIDE 8

Phishing incident response

— We rely on reports from users, — Manual handling requires experienced worker, — The process is laborious and time consuming, — It may be too late to mitigate the attack.

Martin Husák, Jakub Čegan· PhiGARo: Automatic Phishing Detection and Incident Response Framework· 10. 9. 2014 8 / 23

slide-9
SLIDE 9

Phishing incident response

Question I.

How can we effectively handle a phishing incident?

Question II.

Can we automate phishing incident handling?

Question III.

Can we automate phishing incident reporting?

Question IV.

How can we attract phishers to phishing sensors?

Martin Husák, Jakub Čegan· PhiGARo: Automatic Phishing Detection and Incident Response Framework· 10. 9. 2014 9 / 23

slide-10
SLIDE 10

PhiGARo

— Phishing: Gather, Analyze, React, and Distribute, — Semi-automatic phishing incident response tool, — Modular architecture, — Incident handler runs PhiGARo after receiving phishing report, — PhiGARo performs the incident handling routine, — Incident handler receives confirmation from victims.

Martin Husák, Jakub Čegan· PhiGARo: Automatic Phishing Detection and Incident Response Framework· 10. 9. 2014 10 / 23

slide-11
SLIDE 11

PhiGARo

Martin Husák, Jakub Čegan· PhiGARo: Automatic Phishing Detection and Incident Response Framework· 10. 9. 2014 11 / 23

slide-12
SLIDE 12

PhiGARo

Martin Husák, Jakub Čegan· PhiGARo: Automatic Phishing Detection and Incident Response Framework· 10. 9. 2014 12 / 23

slide-13
SLIDE 13

PhiGARo modules

— Request Tracker integration, — URL expander and URL redirection uncloaking, — Sendmail log parsing module, — NetFlow/IPFIX module (network traffic monitoring), — HTTP(S) module (extended flow monitoring), — E-mail blocking API, — RTBH API (blocking of network traffic), — Reporting phishing hosted on Google Docs, — Storage of phishing pages (screenshots), — Phishing form filling simulator.

Martin Husák, Jakub Čegan· PhiGARo: Automatic Phishing Detection and Incident Response Framework· 10. 9. 2014 13 / 23

slide-14
SLIDE 14

Phishing detection

Question I.

How can we effectively handle a phishing incident?

Question II.

Can we automate phishing incident handling?

Question III.

Can we automate phishing incident reporting?

Question IV.

How can we attract phishers to phishing sensors?

Martin Husák, Jakub Čegan· PhiGARo: Automatic Phishing Detection and Incident Response Framework· 10. 9. 2014 14 / 23

slide-15
SLIDE 15

Phishing detection

— Reliance on user reports is insufficient, — Existing methods focus on filtering e-mail on mailservers or mailboxes, — Keyword search, data mining, machine learning... — Maintaining common phishing reporting tool in large networks is difficult.

Martin Husák, Jakub Čegan· PhiGARo: Automatic Phishing Detection and Incident Response Framework· 10. 9. 2014 15 / 23

slide-16
SLIDE 16

Honeypots

— System resources whose value lies in illicit use, — Honeypots are generally free of false positives, — Spamtrap – honeypot e-mail address or mailserver deployed to collect spam, — Honeytoken – e-mail address, account name...

Martin Husák, Jakub Čegan· PhiGARo: Automatic Phishing Detection and Incident Response Framework· 10. 9. 2014 16 / 23

slide-17
SLIDE 17

Honeypots

— Mailserver honeypot is deployed in the network, — Phishing detection method is set up at the honeypot, — Incoming e-mails are checked if they contain phishing, — Recognized phishing is reported to PhiGARo, — PhiGARo automatically starts handling the incident.

Martin Husák, Jakub Čegan· PhiGARo: Automatic Phishing Detection and Incident Response Framework· 10. 9. 2014 17 / 23

slide-18
SLIDE 18

Phishing detection

Martin Husák, Jakub Čegan· PhiGARo: Automatic Phishing Detection and Incident Response Framework· 10. 9. 2014 18 / 23

slide-19
SLIDE 19

Attracting attackers

Question I.

How can we effectively handle a phishing incident?

Question II.

Can we automate phishing incident handling?

Question III.

Can we automate phishing incident reporting?

Question IV.

How can we attract phishers to phishing sensors?

Martin Husák, Jakub Čegan· PhiGARo: Automatic Phishing Detection and Incident Response Framework· 10. 9. 2014 19 / 23

slide-20
SLIDE 20

Attracting attackers

— Honeytokens are placed to be accessible by web crawlers, e-mail harvester... — Responding to earlier phishing from honeytoken e-mail addresses, — Using PhiGARo to respond automatically (extension of form filling simulator), — Black market poisoning (advanced).

Martin Husák, Jakub Čegan· PhiGARo: Automatic Phishing Detection and Incident Response Framework· 10. 9. 2014 20 / 23

slide-21
SLIDE 21

Attracting attackers

— Concept of Virtual organization, — Custom domain, honeytokens, web content, etc. assigned to honeypots, — Increasing trustworthiness of a honeypots and honeytokens, — Adversary checks the domain, visits website, and is persuaded that the honeytokens are valid.

Martin Husák, Jakub Čegan· PhiGARo: Automatic Phishing Detection and Incident Response Framework· 10. 9. 2014 21 / 23

slide-22
SLIDE 22

Conclusion

— Manual phishing incident handling is laborious. — The process of incident handling is automated by the phishing incident response tool PhiGARo. — PhiGARo is publicly available as a modular tool at: http://www.muni.cz/ics/services/csirt/ tools/phigaro?lang=en — We propose using honeypots to overcome reliance

  • n user reports.

— A concept of Virtual organization was discussed to attract phishers to honeypots.

Martin Husák, Jakub Čegan· PhiGARo: Automatic Phishing Detection and Incident Response Framework· 10. 9. 2014 22 / 23

slide-23
SLIDE 23

Thank you for your attention.

Martin Husák, Jakub Čegan {husakm|cegan}@ics.muni.cz