Understanding the use of stolen account credentials by - - PowerPoint PPT Presentation

understanding the use of stolen account credentials by
SMART_READER_LITE
LIVE PREVIEW

Understanding the use of stolen account credentials by - - PowerPoint PPT Presentation

Understanding the use of stolen account credentials by cybercriminals Gianluca Stringhini University College London Abuse on online services [NDSS2017] [NDSS2013] [ACSAC2010] Malware Spam [AsiaCCS2017] [TDSC2016] [USENIX2011]


slide-1
SLIDE 1

Understanding the use of stolen account credentials by cybercriminals

Gianluca Stringhini

University College London

slide-2
SLIDE 2

Abuse on online services

Understanding the use of stolen account credentials by cybercriminals

Spam [ACSAC2010] [NDSS2013] [TDSC2016] [USENIX2011] Information stealing [IMC2016] [CSET2016] [USENIX2015] Reputation manipulation [IMC2013] [WWW2017] [WOSN2012] Fraud [DIMVA2015] [CCS2015] Hate/Bullying [ICWSM2017] [WebSci2017]

2

Malware [NDSS2017] [AsiaCCS2017]

slide-3
SLIDE 3

Compromised accounts

Credentials to online accounts get stolen by cybercriminals

  • Phishing
  • Data breaches
  • Information-stealing malware

These credentials are then misused for profit (anecdotes)

  • Steal sensitive information
  • Send spam
  • Sell the credentials on the black market

Understanding the use of stolen account credentials by cybercriminals

Question: How are stolen credentials used by criminals in the wild?

3

slide-4
SLIDE 4

How can we answer this question?

No data available: we aren’t Google, Facebook etc.

  • From the outside, we can only see spam

In 2014, a paper by Google shed some light on these topics, but their focus was narrow and they left many questions unanswered We decided to collect data ourselves and to enable the research community to better understand the ecosystem of stolen account credentials

Understanding the use of stolen account credentials by cybercriminals 4

slide-5
SLIDE 5

Gmail “honey” accounts

Google allows to enhance the functionality of accounts by setting up Google App Scripts We can use this functionality to set up honeypots!

  • Monitor which emails are opened
  • Monitor which emails are sent
  • Monitor durations of accesses, OS, browser
  • Monitor locations of accesses

We can then leak credentials and have criminals use them

Understanding the use of stolen account credentials by cybercriminals 5

slide-6
SLIDE 6

Our system (publicly available)

Understanding the use of stolen account credentials by cybercriminals

We asked Google to monitor the accounts on their side too

6

slide-7
SLIDE 7

How does the outlet of a leak influence criminal activity? [IMC2016]

Corporate webmail honey accounts (100 accounts)

  • Belonging to a fictitious company
  • Populated using the Enron dataset

We leaked the credentials through three outlets

  • Paste sites
  • Underground forums
  • Information stealing malware

We monitored activity to the accounts for 7 months, receiving 329 accesses

Understanding the use of stolen account credentials by cybercriminals 7

slide-8
SLIDE 8

Types of accesses

Curious – just check if accounts are real Gold Diggers – look for sensitive information

  • Use the information
  • Set a price tag

Spammers – send spam Hijackers – change the password locking the owner out

Understanding the use of stolen account credentials by cybercriminals 8

slide-9
SLIDE 9

Influence of leak outlet on activity

Understanding the use of stolen account credentials by cybercriminals

Accesses of credentials leaked through malware are the “stealthiest”

9

slide-10
SLIDE 10

Some accesses are stealthier than others

Understanding the use of stolen account credentials by cybercriminals 10

slide-11
SLIDE 11

What are “gold-diggers” looking for?

Mostly financial or account information Popular words are:

  • Seller
  • Account
  • Payment
  • Bitcoin

Understanding the use of stolen account credentials by cybercriminals 11

slide-12
SLIDE 12

Timeline of account accesses

Understanding the use of stolen account credentials by cybercriminals 12

slide-13
SLIDE 13

How does information on the location of the account owner influence accesses? [IMC2016]

Understanding the use of stolen account credentials by cybercriminals 13

slide-14
SLIDE 14

How does the language of an account influence criminal activity? [arxiv]

We created 30 accounts in three different languages

  • 10 English accounts
  • 10 Greek accounts
  • 10 Romanian accounts

We hid fake email invoices for banking institutions in each account Summary of findings:

  • Criminals are more likely to find the hidden sensitive information in the

Greek accounts

  • Criminals spend more time on Greek accounts

Possible explanation: if criminals do not understand the language of an account, they use automated translation tools

Understanding the use of stolen account credentials by cybercriminals 14

slide-15
SLIDE 15

How does leaking credentials on the Dark Web affect criminal activity? [under submission]

Understanding the use of stolen account credentials by cybercriminals 15

We replicated the surface Web experiment on the Dark Web (paste sites and forums)

Some preliminary results:

  • Dark Web accesses receive many

more accesses than surface Web

  • nes
  • Dark Web accesses show a

higher degree of sophistication

slide-16
SLIDE 16

Conclusion

  • We released a honeypot system that allows you to

design your own experiments to better understand the modus operandi of cybercriminals

  • We shed some light on the way that stolen Gmail

accounts are used in the wild

  • We also developed a honeypot version for Google

Spreadsheets

Understanding the use of stolen account credentials by cybercriminals 16

slide-17
SLIDE 17

Questions?

g.stringhini@ucl.ac.uk @gianluca_string

References: [1] J. Onaolapo, E. Mariconti, G. Stringhini. What Happens After You are Pwnd: Undertsanding the Use of Stolen Webmail Credentials in the Wild. In IMC 2016 [2] M. Lazarov, J. Onaolapo, G. Stringhini. Honey Sheets: What Happens to Leaked Google Spreadsheets? In USENIX CSET 2016 [3] E. Bernard-Jones, J. Onaolapo, G. Stringhini. Email Babel: Does Language Affect Criminal Activity in Compromised Webmail Accounts? On Arxiv. Code available at: https://bitbucket.org/gianluca_students/gmail-honeypot