UPnP: Unlimited Proxies and Pwnage Waylon Grange Sr. Threat - - PowerPoint PPT Presentation

upnp unlimited proxies and pwnage
SMART_READER_LITE
LIVE PREVIEW

UPnP: Unlimited Proxies and Pwnage Waylon Grange Sr. Threat - - PowerPoint PPT Presentation

UPnP: Unlimited Proxies and Pwnage Waylon Grange Sr. Threat Researcher, Symantec @professor__plum Exploits long forgotten UPnP (SSDP) DDoS P n P U Most people think of DDoS attacks when asked about UPnP abuse These attacks are


slide-1
SLIDE 1

UPnP: Unlimited Proxies and Pwnage

Waylon Grange

  • Sr. Threat Researcher, Symantec

@professor__plum

slide-2
SLIDE 2
slide-3
SLIDE 3

Exploits long forgotten

slide-4
SLIDE 4

UPnP (SSDP) DDoS

  • Most people think of DDoS attacks when

asked about UPnP abuse

  • These attacks are actually SSDP
  • Service used to discover the UPnP port
  • Has roughly a 30x magnification ratio

U P n P U P n P U P n P

slide-5
SLIDE 5

Script kiddies and DDoS

slide-6
SLIDE 6

in a nut shell

Yo, open up port 3074 and forward it to 192.168.0.5:3074 so I can gamez! I got ya bro

slide-7
SLIDE 7

UPnP AddPortMapping

slide-8
SLIDE 8

UPnP observed

Yo, open up port 3074 and… actually just give me a shell I got ya bro

slide-9
SLIDE 9

OSVDB-94924

slide-10
SLIDE 10

As if it wasn’t bad enough

I got ya bro Yo, I want a shell too

slide-11
SLIDE 11

Doesn’t anyone notice this?

slide-12
SLIDE 12

Satori "awakening"

  • Mirai varient
  • Started up in early December
  • Exploited UPnP
  • > 1/2 million bots in 4 days
  • C2 host was null routed to kill botnet
  • Author Dox’ed, source code released
slide-13
SLIDE 13

GetGenericPortMappingEntry

slide-14
SLIDE 14

Router management interfaces

slide-15
SLIDE 15

ipTime backdoor

slide-16
SLIDE 16

Who’s interface is it anyway?

I got ya bro Yo, open up port 45670 and forward it to duckduckgo.com:443

slide-17
SLIDE 17

4 million vulnerable devices

slide-18
SLIDE 18

So who’s using this?

  • 62% were to Google DNS
  • Censorship avoidance?
  • 37% were to Web Analytics servers
  • Mostly to *.trafficjunky.net
  • Click fraud / Advertising?
  • <1% was something else…

*data source Akamai

1% 37% 62%

DNS Web Ads Other

slide-19
SLIDE 19

Onion routing

  • One group chained together router proxies
  • Process of building and tearing down

connections appeared automated

  • UPnP command packet also forwarded

through routers

  • Each port is first connected to

duckduckgo for testing before use in tunnel

*Image source wikipedia

slide-20
SLIDE 20

Inception group

  • Active since 2014 or earlier
  • Targeting Embassies, Energy, Aerospace,

Defense, Government, Media, Research

  • Toolset includes Windows, *nix, Android,

iOS, and Blackberry

  • Known to insert ‘false flags’ to mislead

researcher

  • High level of OPSEC
  • Makes extensive used of public

infrastructure for C&C

slide-21
SLIDE 21

Decoy documents

slide-22
SLIDE 22

Recon documents

slide-23
SLIDE 23

Remote exploit document

slide-24
SLIDE 24

Inception windows core module

slide-25
SLIDE 25

Don’t forget to take out the trash

  • Malware is configured to delete plugins

from cloud provider once they are downloaded

  • One cloud provider would send deleted

files to a recycle bin

  • Recovered 1 years worth of victim tasking
slide-26
SLIDE 26

Plugins detected

  • Detailed survey module
  • Domain membership, processes/loaded modules,

hardware enumeration, installed products, logical and mapped drive info

  • File hunting module
  • Can match on regex patterns
  • Browser history, stored passwords and session

stealing module

  • IE, Chrome, Opera, Firefox, Torch, Yandex
  • File listing
  • Works on local or remote drives (can map additional

paths given credentials)

slide-27
SLIDE 27

Cloud logs

slide-28
SLIDE 28

Example C&C channel path

slide-29
SLIDE 29

UPnP honey pot

  • Please make it a smart honey box, don’t

be a blind proxy

  • SSL traffic can be intercepted!
  • Geographic region does make a difference
  • UPnP Commands to support
  • AddPortMapping
  • GetGenericPortMappingEntry
  • DeletePortMapping
slide-30
SLIDE 30

Acknowledgements

slide-31
SLIDE 31

Thank you

Waylon Grange @professor__plum

slide-32
SLIDE 32

Inception Android C2 dead drops