understanding the use of stolen account credentials by
play

Understanding the use of stolen account credentials by - PowerPoint PPT Presentation

Understanding the use of stolen account credentials by cybercriminals Gianluca Stringhini University College London Abuse on online services [NDSS2017] [NDSS2013] [ACSAC2010] Malware Spam [AsiaCCS2017] [TDSC2016] [USENIX2011]


  1. Understanding the use of stolen account credentials by cybercriminals Gianluca Stringhini University College London

  2. Abuse on online services [NDSS2017] [NDSS2013] [ACSAC2010] Malware Spam [AsiaCCS2017] [TDSC2016] [USENIX2011] [CSET2016] [IMC2016] Information stealing [DIMVA2015] [USENIX2015] Fraud [CCS2015] [IMC2013] [WWW2017] [ICWSM2017] Reputation manipulation Hate/Bullying [WOSN2012] [WebSci2017] Understanding the use of stolen account credentials by cybercriminals 2

  3. Compromised accounts Credentials to online accounts get stolen by cybercriminals • Phishing • Data breaches • Information-stealing malware Question: How are stolen credentials used by criminals in the wild? These credentials are then misused for profit (anecdotes) • Steal sensitive information • Send spam • Sell the credentials on the black market Understanding the use of stolen account credentials by cybercriminals 3

  4. How can we answer this question? No data available: we aren’t Google, Facebook etc.  From the outside, we can only see spam In 2014, a paper by Google shed some light on these topics, but their focus was narrow and they left many questions unanswered We decided to collect data ourselves and to enable the research community to better understand the ecosystem of stolen account credentials Understanding the use of stolen account credentials by cybercriminals 4

  5. Gmail “honey” accounts Google allows to enhance the functionality of accounts by setting up Google App Scripts We can use this functionality to set up honeypots! • Monitor which emails are opened • Monitor which emails are sent • Monitor durations of accesses, OS, browser • Monitor locations of accesses We can then leak credentials and have criminals use them Understanding the use of stolen account credentials by cybercriminals 5

  6. Our system (publicly available) We asked Google to monitor the accounts on their side too Understanding the use of stolen account credentials by cybercriminals 6

  7. How does the outlet of a leak influence criminal activity? [IMC2016] Corporate webmail honey accounts (100 accounts) • Belonging to a fictitious company • Populated using the Enron dataset We leaked the credentials through three outlets • Paste sites • Underground forums • Information stealing malware We monitored activity to the accounts for 7 months, receiving 329 accesses Understanding the use of stolen account credentials by cybercriminals 7

  8. Types of accesses Curious – just check if accounts are real Gold Diggers – look for sensitive information • Use the information • Set a price tag Spammers – send spam Hijackers – change the password locking the owner out Understanding the use of stolen account credentials by cybercriminals 8

  9. Influence of leak outlet on activity Accesses of credentials leaked through malware are the “stealthiest” Understanding the use of stolen account credentials by cybercriminals 9

  10. Some accesses are stealthier than others Understanding the use of stolen account credentials by cybercriminals 10

  11. What are “gold-diggers” looking for? Mostly financial or account information Popular words are: • Seller • Account • Payment • Bitcoin Understanding the use of stolen account credentials by cybercriminals 11

  12. Timeline of account accesses Understanding the use of stolen account credentials by cybercriminals 12

  13. How does information on the location of the account owner influence accesses? [IMC2016] Understanding the use of stolen account credentials by cybercriminals 13

  14. How does the language of an account influence criminal activity? [arxiv] We created 30 accounts in three different languages • 10 English accounts • 10 Greek accounts • 10 Romanian accounts We hid fake email invoices for banking institutions in each account Summary of findings: • Criminals are more likely to find the hidden sensitive information in the Greek accounts • Criminals spend more time on Greek accounts Possible explanation: if criminals do not understand the language of an account, they use automated translation tools Understanding the use of stolen account credentials by cybercriminals 14

  15. How does leaking credentials on the Dark Web affect criminal activity? [under submission] We replicated the surface Web experiment on the Dark Web (paste sites and forums) Some preliminary results: • Dark Web accesses receive many more accesses than surface Web ones • Dark Web accesses show a higher degree of sophistication Understanding the use of stolen account credentials by cybercriminals 15

  16. Conclusion • We released a honeypot system that allows you to design your own experiments to better understand the modus operandi of cybercriminals • We shed some light on the way that stolen Gmail accounts are used in the wild • We also developed a honeypot version for Google Spreadsheets Understanding the use of stolen account credentials by cybercriminals 16

  17. References: [1] J. Onaolapo, E. Mariconti, G. Stringhini. What Happens After You are Pwnd: Undertsanding the Use of Stolen Webmail Credentials in the Wild . In IMC 2016 [2] M. Lazarov, J. Onaolapo, G. Stringhini. Honey Sheets: What Happens to Leaked Google Spreadsheets? In USENIX CSET 2016 [3] E. Bernard-Jones, J. Onaolapo, G. Stringhini. Email Babel: Does Language Affect Criminal Activity in Compromised Webmail Accounts? On Arxiv. Questions? g.stringhini@ucl.ac.uk Code available at: @gianluca_string https://bitbucket.org/gianluca_students/gmail-honeypot

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend