Tracking desktop ransomware payments end to end Elie Bursztein, - - PowerPoint PPT Presentation

tracking desktop ransomware payments end to end
SMART_READER_LITE
LIVE PREVIEW

Tracking desktop ransomware payments end to end Elie Bursztein, - - PowerPoint PPT Presentation

Tracking desktop ransomware payments end to end Elie Bursztein, Kylie McRoberts, Luca Invernizzi with the help of many people from UCSD, NYU, and Chainalysis Only 37% of users backup their data g.co/research/protect Since 2016 ransomware


slide-1
SLIDE 1

Tracking desktop ransomware payments end to end

Elie Bursztein, Kylie McRoberts, Luca Invernizzi

with the help of many people from UCSD, NYU, and Chainalysis

slide-2
SLIDE 2

g.co/research/protect

Only 37% of users backup their data

slide-3
SLIDE 3
slide-4
SLIDE 4

g.co/research/protect

Since 2016 “ransomware” search queries increased by 877%

slide-5
SLIDE 5

g.co/research/protect

How profitable is ransomware?

slide-6
SLIDE 6

Agenda

  • 1. How we trace ransom payments at scale
  • 2. Revenue & ecosystem insights
  • 3. The kingpins and the fads
slide-7
SLIDE 7

The website ahead contains malware

Keeping users safe

slide-8
SLIDE 8

g.co/research/protect

Google Chainalysis

The team

University of California, San Diego New York University

slide-9
SLIDE 9

Life of a ransomware infection

slide-10
SLIDE 10

Victim gets infected

slide-11
SLIDE 11

Victim is shown ransom note

Payment URL

slide-12
SLIDE 12

Victim visits payment site via Tor

Victim ID Unique Bitcoin wallet

slide-13
SLIDE 13

Victim buys bitcoin at exchange

slide-14
SLIDE 14

g.co/research/protect

Why Bitcoin?

Pseudonymous No need to show ID card to create wallets Fully Automatable Allows scalable payment processing Fungible Bitcoins are easily converted into cash Irrefutable Transactions can’t be reverted

slide-15
SLIDE 15

g.co/research/protect

Transaction 152Lf[...]

  • n 2016-08-09

Bitcoin transactions are public

Sender wallet: 1N1Nn[...] 4 BTC Receiver wallet: 152Lf[...]

slide-16
SLIDE 16

g.co/research/protect

Life of a ransom payment

  • 1. Victim buys

bitcoins at exchange

slide-17
SLIDE 17

g.co/research/protect

  • 1. Victim buys

bitcoins at exchange

  • 2. Ransom moves

across multiple wallets

...

Life of a ransom payment

slide-18
SLIDE 18

g.co/research/protect

  • 1. Victim buys

bitcoins at exchange

  • 2. Ransom moves

across multiple wallets

  • 3. Criminal accumulates

bitcoins then sells them for currency at exchange

...

Life of a ransom payment

slide-19
SLIDE 19

Measuring revenue

slide-20
SLIDE 20

g.co/research/protect

Identifying victims

...

To identify other victims, we look at transactions with the criminal’s accumulation wallet

slide-21
SLIDE 21

g.co/research/protect

Discovering payment network

slide-22
SLIDE 22

g.co/research/protect

Discovering payment network

slide-23
SLIDE 23

g.co/research/protect

Discovering payment network

... ... ...

slide-24
SLIDE 24

g.co/research/protect

Gathering seed bitcoin transactions

Victim reports Synthetic “victims”

slide-25
SLIDE 25

g.co/research/protect

Automating payment tracing

Initial seed ransomware Dataset expansion & clustering Payment site and wallet extraction Payment tracing

Compute near-collision blocks

slide-26
SLIDE 26

g.co/research/protect

Static/Dynamic signatures

Initial dataset: 34 families, 154k binaries

slide-27
SLIDE 27

g.co/research/protect

Cerber - v1

Using clustering for dataset expansion

Cerber -v2

Shared infrastructure

NotPetya - v1

Code similarity

slide-28
SLIDE 28

g.co/research/protect

Expanded dataset 301,588 binaries 154,227

Seed dataset

147,361

Additional binaries

slide-29
SLIDE 29

g.co/research/protect

Automatically identifying payment sites at scale

+ =

Tor proxy URL

hjhqmbxyinislkkt.1a58vj.top/XXXX Found in 4 files and 1 screenshot

Bitcoin wallet

1AZvk[...] Found in 16 files and 1 screenshot

slide-30
SLIDE 30

g.co/research/protect

Tracing payments through the bitcoin chain

NotPetya WannaCry Locky LocalBitcoin BtcBank BiThumb BTC-E Coinbase Huobi Poloniex

slide-31
SLIDE 31

Market insights

slide-32
SLIDE 32

g.co/research/protect

$25,253,505

slide-33
SLIDE 33

g.co/research/protect

In 2016 ransomware became a multi-million $ business

slide-34
SLIDE 34

g.co/research/protect

The ecosystem is dominated by a few kingpins

slide-35
SLIDE 35

g.co/research/protect

A fast changing market

slide-36
SLIDE 36

g.co/research/protect

In 2017 ransomware increased binary diversity to evade AVs

slide-37
SLIDE 37

g.co/research/protect

Many victims buy Bitcoins through the “Craigslist of Bitcoin”

slide-38
SLIDE 38

g.co/research/protect

Victim payments

Did not account for transaction fees

90% 9%

Paid the ransom in a single transaction

Split payment in multiple transactions

slide-39
SLIDE 39

g.co/research/protect

95%

traced ransoms cashed out via BTC-E

Cashout list available on request

slide-40
SLIDE 40

Ransomware notable actors

slide-41
SLIDE 41

g.co/research/protect

Locky

Bringing ransoms to the masses

slide-42
SLIDE 42
slide-43
SLIDE 43

g.co/research/protect

The first ransomware to make >$1M per month

slide-44
SLIDE 44

g.co/research/protect

Renting-out cybercriminal infrastructure

Locky Dridex

Dridex, Locky, Cerber are distributed via the Necurs botnet

slide-45
SLIDE 45

g.co/research/protect

Cerber

Rise of ransomware as service

slide-46
SLIDE 46

g.co/research/protect

Enrolling low tech criminals made Cerber the new king of the hill in 2017

slide-47
SLIDE 47

g.co/research/protect

Consistent income - $200k per month for over a year

slide-48
SLIDE 48

g.co/research/protect

8 affiliates are responsible for 50% of the infections

slide-49
SLIDE 49

g.co/research/protect

Embedding ransom site in the blockchain

1AzkuxChzMB4[...] 1Azkux.top

Hardcoded wallet transacts with new wallets periodically. Cerber derives ransom site from these wallets.

slide-50
SLIDE 50

g.co/research/protect

From infection to full encryption in under a minute

slide-51
SLIDE 51

g.co/research/protect

Spora

Ransomware business model refined

slide-52
SLIDE 52
slide-53
SLIDE 53

Wannacry notPetya

Rise of the impostors

slide-54
SLIDE 54
slide-55
SLIDE 55
slide-56
SLIDE 56

g.co/research/protect

The (low) bottom line

56 BTC revenue 5 bitcoin wallets $0 cashed-out

slide-57
SLIDE 57

g.co/research/protect

Testing out the malware, then unleashing it at once

slide-58
SLIDE 58
slide-59
SLIDE 59

g.co/research/protect

No early warning - Activity start on the day of the outbreak

slide-60
SLIDE 60

g.co/research/protect

Takeaways

Multi-million dollar black market

Ransomware generates tens of millions of revenue for criminals

RaaS is the new black

Cerber’s affiliate model is taking the world by storm

Rise of the impostors

Wipeware pretending to be ransomware is on the rise

slide-61
SLIDE 61

Questions?

Join us tomorrow 12pm | South Seas CD

Attacking encrypted USB keys the hard(ware) way

slide-62
SLIDE 62

Thank you

g.co/research/protect