ransomware detection
play

Ransomware detection with Bro Mike Stokkel 13 Sept 2016 - PowerPoint PPT Presentation

Ransomware detection with Bro Mike Stokkel 13 Sept 2016 Introduction Who am I? Mike Stokkel Security Analyst @ Fox-IT Internship at Fox-IT Bachelor July 2016 Introduction Agenda What am I going to talk about?


  1. Ransomware detection with Bro Mike Stokkel 13 Sept 2016

  2. Introduction • Who am I? – Mike Stokkel – Security Analyst @ Fox-IT – Internship at Fox-IT – Bachelor July 2016 Introduction

  3. Agenda • What am I going to talk about? – Fox-IT – Ransomware – Bro Policy – Results – Demo

  4. Fox-IT

  5. Company • Located: Delft, The Netherlands • IT security – Managed Security Services – Auditing – Cryptographic solutions Fox-IT

  6. Security Operation Center • Snort-based detection • Bro Fox-IT

  7. Ransomware

  8. Explanation • Malware – Encryption – Payment – Decryption • Rising concern Ransomware

  9. Encryption • Process – Master key (public and private key) – Generating a key for the victim – Encrypting the victim’s key Ransomware

  10. Impact • Personal Computer – Local files • Company – Network Share • To pay or not to pay? Ransomware

  11. Spreading Methods • Exploit Kits – Browser vulnerabilities • E-mail – Malicious document – Macros Ransomware

  12. Exploit Kit • Version check • IP check • Download ransomware payload • Run payload Ransomware

  13. Malicious document • Macro • VBS script • Download & execute payload Ransomware

  14. Remote desktop programs • TeamViewer hack • RDP brute force Ransomware

  15. Detection Methods • IDS – Snort rules • Problem Ransomware

  16. Bro Policy

  17. Approach • Ransomware behavior – SMB • Possible solutions – File extension listing – Threshold SMB commands – Command-and-Control communication Bro Policy

  18. Entropy • Randomness of data • 0 – 8 bits per character Bro policy

  19. What about …. • Compressed files • Images • PDF • Mime/Media type Bro policy

  20. Functions • SMB parser – Events • File over new connection • Chunk event • SumStat – Threshold • Notice.log Bro Policy

  21. File over new connection • Check for SMB traffic • Check for certain filenames • Check for Mime type • Check for SMB action • Check if SMB action equals Write • Add File analyzer Bro Policy

  22. Chunk event • Check if the offset equals 0 • Calculate entropy of data collected from SMB write command • Use SumStat to add +1 for the threshold • Write to log file • Write a Notice.log Bro Policy

  23. Results

  24. Live Testing • Two new kinds of Ransomware Bro Policy

  25. Live Testing • Two new kinds of Ransomware – Google Chrome & Mozilla Firefox • Encrypted cache • Encryption tools – TrueCrypt – VeraCrypt • Documents – Printing – Creating Bro Policy

  26. Demo

  27. Samples • Locky/Zepto • Cryptowall • CTBLocker • Jigsaw (and all families) • Mobef • Shade • Maktub • Cerber/Alpha • Teslacrypt • Rokku • Crysis • Cerber • Bandarchor Demo

  28. Thank you for having me!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend