Spike DDoS Toolkit OVERVIEW INDICATORS OF BINARY INFECTION. TLP: GREEN GSI ID: 1078 Risk Factor - High
|
|
|
- Geraldine Gibbs
- 10 years ago
- Views:
Transcription
1 Spike DDoS Toolkit TLP: GREEN GSI ID: 1078 Risk Factor - High OVERVIEW In 2014, PLXsert has observed a trend in new distributed denial of service (DDoS) malware originating from Asia. These binaries have been targeting Linux operating systems principally, but now PLXsert has identified a new malware kit that can also infect Windows systems and embedded devices. Several iterations of the Spike DDoS toolkit can communicate and execute commands to infected Windows, desktop Linux and ARM-based devices running the Linux operating system (OS). Binary payloads from this toolkit are dropped and executed after the successful compromise of targeted devices, which may include PCs, servers, routers, Internet of Things (IoT) devices (i.e., smart thermostat systems and washer/dryers) and home-based customer premises equipment (CPE) routing devices. The toolkit has multiple DDoS payloads, including SYN flood, UDP flood, Domain Name System (DNS) query flood, and GET floods. Several campaigns have been reported against hosts in Asia and the U.S. 1 Several Akamai customers have been targeted by DDoS attack campaigns launched from this botnet. One attack peaked at 215 gigabits per second (Gbps) and 150 million packets per second (Mpps). INDICATORS OF BINARY INFECTION The principal indicators of infection are the presence of a series of binaries that infect specific operating systems and architectures. PLXsert analyzed binary payloads associated with the Spike DDoS toolkit that targeted desktop Linux OSs and ARM-based Linux hosts. Russian anti-virus company Doctor Web also reported on what may be iterations of the toolkit, and evidence of the payloads being ported to Windows has surfaced. 2 The binaries associated with the Spike DDoS toolkit consists of one binary, while the iterations found by DrWeb may include several different binaries and other scripts associated with an infection. 1 "Linux Trojan Ported to Windows." Dr.Web Anti-virus. Doctor Web, 14 Aug "DDoS Trojans Attack Linux." Dr.Web Anti-virus. Doctor Web, 15 May
2 TOOLKIT ANALYSIS The Spike DDoS toolkit contains components of a typical client-based botnet: a command and control (C2) panel, binary payloads for infection and DDoS payload builders. The C2 and the builders are Windows binaries for use by the malicious actor, while the infectious payloads were designed to target mainly Linux or other embedded devices. The ability of the Spike toolkit to generate an ARM-based payload suggests that the authors of such tools are targeting devices such as routers and IoT devices to expand their botnets for a post-pc era of botnet propagation. The C2 panel contains a fairly basic interface written in Mandarin Chinese. It consists of a top panel for listing the connected bots, a bottom tabbed interface for task information, and subsequent tabs for the different types of DDoS payloads it supports. Figure 1 shows the main C2 panel interface with one connected bot in a lab environment. Figure 1: The main interface of the command-and-control panel of the Spike DDoS toolkit 2
3 Spike bot variations The Spike DDoS toolkit analyzed by PLXsert included a C2 panel and three payload builders. Two of the builders generate 32-bit and 64-bit Linux payloads. The third, called Typhoon builder, generates a 32-bit ARM executable (Figure 2). The addition of the ARM payload suggests that the author of the toolkit may intend to infect devices beyond PCs and servers. Routers, CPEs and other embedded devices running Linux could be the target of such an ARM-compatible payload. plxsert$ file DDos_arm DDos_arm: ELF 32-bit LSB executable, ARM, version 1 (SYSV), statically linked, for GNU/Linux , stripped Figure 2: The output of the File command on the ARM DDoS bot payload generated by the Typhoon builder Figure 3 shows the presence of string data found in the ARM-compatible binary. This string data is also present in the other Linux binary payloads available from the Spike DDoS toolkit. Figure 3: A disassembly of the ARM bot payload PLXsert tested the ARM bot using a Raspberry PI, a popular programmable embedded device. Figure 4 and Figure 5 demonstrate a proof-of-concept of an ARM-based bot running on the embedded device. 3
4 Figure 4: The ARM bot established a connection to the C2 server, which is listening on port 2000 of a Windows XP system Figure 5: The C2 panel shows the connected ARM bot is active and ready to receive commands The introduction of a multi-platform DDoS toolkit such as the Spike DDoS toolkit indicates the direction that malicious actors are taking. The ARM payload for Linux could be used to target popular embedded devices, CPEs and Internet of Things devices; at least the subset of those devices that can be exploited and on which remote code execution can be attained. Bot initialization The Spike DDoS toolkit analyzed by PLXsert is capable of creating three types of binary payloads: a 32-bit Linux binary, a 64-bit Linux binary and a 32-bit ARM-based binary. Initial analysis showed that all the 4
5 payloads have the same capabilities. Once a binary is configured and built, it can be run on a victim host and will call back home to its C2. The initial call-home packet, shown in Figure 6, contains information about the infected machine such as its kernel version and CPU information. It also contains an extra string that may identify the author of the tool as Mr. Black. Figure 6: The initial call-home packet to identify the victim machine to the C2 DDOS PAYLOADS The Spike DDoS toolkit can be used to launch several types of denial of service attacks. The C2 panel indicates the capability to launch four DDoS attacks: SYN, DNS, UDP and GET floods. These also appear in the bot payloads in a function named DealwithDDoS(), which is shown in Figure 7. This function receives the argument from the C2 and then parses the commands. Once it determines which attack to perform, the function creates a thread and calls the corresponding flood function. int cdecl DealwithDDoS(void *arg) int result; // eax@1 int i; // [sp+1ch] [bp-ch]@3 int j; // [sp+1ch] [bp-ch]@7 int k; // [sp+1ch] [bp-ch]@11 int l; // [sp+1ch] [bp-ch]@15 int m; // [sp+1ch] [bp-ch]@19 result = StopFlag; if ( StopFlag ) StopFlag = 0; result = *((_DWORD *)arg + 65); switch ( result ) case 1: for ( i = 0; ; ++i ) result = *((_DWORD *)arg + 66); if ( result <= i ) pthread_create((pthread_t *)&id[4 * i], 0, SYN_Flood, arg); case 2: for ( j = 0; ; ++j ) result = *((_DWORD *)arg + 66); 5
6 arg); if ( result <= j ) pthread_create((pthread_t *)&id[4 * j], 0, UDP_Flood, arg); case 5: for ( k = 0; ; ++k ) result = *((_DWORD *)arg + 66); if ( result <= k ) pthread_create((pthread_t *)&id[4 * k], 0, (void *(*)(void *))GET_Flood, case 3: for ( l = 0; ; ++l ) result = *((_DWORD *)arg + 66); if ( result <= l ) pthread_create((pthread_t *)&id[4 * l], 0, ICMP_Flood, arg); case 4: for ( m = 0; ; ++m ) result = *((_DWORD *)arg + 66); if ( result <= m ) pthread_create((pthread_t *)&id[4 * m], 0, DNS_Flood, arg); default: return result; return result; Figure 7: Decompiled code of the function that parses DDoS commands from the C2 SYN flood The C2 panel provides options to control the target, size and bandwidth of a SYN flood payload. The default packet size is 40, which accounts for basic TCP/IP headers and a payload size of zero. However, the packet size can be adjusted by an attacker, as shown in Figure 8. 6
7 Figure 8: SYN flood options in the C2 panel Figure 9 shows a SYN flood payload with the default size of 40 bytes and a payload with a user-defined size of 1024 bytes. The first payload only includes the IP and TCP headers with no data payload, while the second includes a data payload. Default 0-byte payload flood 19:59: IP > : Flags [S], seq , win 512, length 0 E..(.=...B...P.=.P.=...P...?$ byte payload flood 19:59: IP > : Flags [S], seq : , win 512, length 1024 E..(.5...D...P.5.P.5...P...< _.@...@...@...$ =.h A......=...n.@ Figure 9: Lab-simulated SYN flood payloads: The first with a zero-byte payload, and the second with a 1024-byte payload UDP flood As with the SYN flood, the Spike toolkit allows an attacker to specify a size for a UDP flood. The payload simply consists of hardcoded Xs. Figure 10 shows the C2 panel options for a UDP flood. Figure 11 shows the UDP flood payload. 7
8 Figure 10: UDP flood options in the C2 panel 20:03: IP > : UDP, length 1024 XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX Figure 11: Lab-simulated UDP flood payload ICMP (ping) flood The Spike DDoS toolkit claims to implement an ICMP flood. However, an analysis of the DDoS traffic and the code made it evident that the implementation was flawed; the ICMP payload was crafted incorrectly. Figure 12 shows locations in the disassembly of the bot payload where the ICMP flood function is implemented. The protocol number passed to the socket function is 17 (UDP), and a hardcoded buffer size of 12 is used for the send() function call. This causes an ICMP flood command to send a hardcoded UDP flood payload of 12 bytes. 8
9 Figure 12: ICMP flood function with questionable implementation details Figure 13 shows the C2 panel option for the ICMP flood. The field for size (default value of 2048) is unused in the code. The payload size always seems to be 12 bytes, as shown in Figure 14. Figure 13: ICMP Flood options in the C2 panel Figure 14 shows the lab generated ICMP flood. The implementation creates a UDP flood of 12 bytes instead of the proposed ICMP flood. 20:16: IP > : UDP, length 12 E..(!@[email protected]...>...P.v...k... Figure 14: A lab-simulated ICMP flood payload from the Spike DDoS toolkit 9
10 DNS flood The input options for the DNS flood include a target DNS server, the domain to query and the number of threads and time elapsed, which are shown in Figure 15. The toolkit will then generate random subdomains and random types of DNS queries to the DNS server. Figure 16 shows a DNS query flood payload generated by the Spike DDoS toolkit in a lab environment. Figure 15: DNS flood options in the C2 panel 20:19: IP > : A? zmsuuwaxmh.dnsfloodtarget.com. (47) 20:19: IP > : MX? kjrlhjlgro.dnsfloodtarget.com. (47) 20:19: IP > : MB? zhd.dnsfloodtarget.com. (40) 20:19: IP > : A? xuxrqz.dnsfloodtarget.com. (43) 20:19: IP > : HINFO? jatt.dnsfloodtarget.com. (41) Figure 16: A lab-simulated DNS query flood from the Spike DDoS toolkit GET flood The GET flood payload also uses hardcoded values. Figure 17 shows the target IP, port (set at 80) the number of threads (set at 10), and the packets per second (set at 20) in the C2 panel. In this advisory PLXsert provides a SNORT rule to identify and mitigate GET flood payload from the Spike DDoS toolkit. A lab-generated GET flood payload is shown in Figure
11 Figure 17: GET flood options in the command and control panel 10:44: IP > : Flags [FP.], seq 1:270, ack 1, win 115, options [nop,nop,ts val ecr 29974], length 269 / HTTP/1.1 Accept: text/html, application/xhtml+xml, */* Accept-Language: zh-cn User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Accept-Encoding: gzip, deflate Host: Connection: Keep-Alive Pragma: no-cache Figure 18: A lab-simulated GET flood payload from the Spike DDoS toolkit OBSERVED ATTACK Figure 19 highlights an actual DDoS attack mitigated by Akamai from a Spike DDoS botnet. The metrics show the distribution of the attack at each of Akamai s DDoS scrubbing centers. This attack peaked at 215 Gbps and 150 Mpps. Akamai Scrubbing Center San Jose London Hong Kong WashingtonDC Frankfurt Peak bits per second (bps) 25 Gbps 40 Gbps 30 Gbps 70 Gbps 50 Gbps Peak packets per second (pps) 14 Mpps 35 Mpps 28 Mpps 28 Mpps 45 Mpps Figure 19: Attack campaign distribution by scrubbing center 11
12 DDoS MITIGATION From the target s perspective, most of the Layer 3 DDoS attack signatures can be mitigated by implementing access control lists (ACLs). For the layer 7 GET flood, PLXsert has produced a SNORT signature to defend against this attack. SNORT rule for DDoS protection This rule assumes that the host header and domain are no larger than 58 bytes. alert TCP $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS \ (msg: "Spike"; \ flow: to_server; \ content:!"cookie"; depth:306; \ content: "GET / HTTP/1.1"; depth:14; \ content: "Accept\: text/html, application/xhtml+xml, */*"; distance:2; within:45; \ content: "Accept-Language\: zh-cn"; distance:2; within:22; \ content: "User-Agent\: Mozilla/5.0 (compatible\; MSIE 10.0\; Windows NT 6.1\; WOW64\; Trident/6.0)"; distance:2; within:83; \ content: "Accept-Encoding\: gzip, deflate"; distance:2; within:30; \ content: "Host"; distance:2; within:4; \ content: "Connection\: Keep-Alive"; distance:2; within:78; \ content: "Pragma\: no-cache"; distance:2; within:16; \ classtype: GET-Flood; \ sid: ; rev:1;) Figure 20: A PLXsert SNORT rule to stop GET floods from the Spike DDoS toolkit System hardening The multi-architecture malware code found in this kit increases the threat s complexity and sophistication and makes it necessary to apply hardening measures to each of the targeted operating systems and platforms. The following organizations provide guidance for system hardening: SANS Institute checklist for Linux server hardening 3 Microsoft list of baseline Windows hardening guidelines to secure windows servers 4 The National Security Agency guidelines for securing various operating systems 5 Tripwire security recommendations for small office, home office (SOHO) routers 6 NIST guide to secure mobile devices in the enterprise 7 University of Michigan guide to securing and managing Android security phones/tablet 8 OWASP list of the 10 most critical Internet of Things (IoT) security risks 9 3 Lori Homsher and Tim Evans, Linux Security Checklist, Security Consensus Operational Readiness Evaluation. SANS Institute. 4 "Baseline Server Hardening." TechNet. Microsoft. 5 "Operating Systems." Central Security Service. National Security Agency. 6 Young, Craig. "Five Tips for Securing SOHO Routers - The State of Security." The State of Security. Tripwire, Inc, 10 Oct Souppaya, Murugiah P., and Karen A. Scarfone. "Publication Citation: Guidelines for Managing the Security of Mobile Devices in the Enterprise." The National Institute of Standards and Technology (NIST). U.S. Department of Commerce, 21 June "Secure and Manage Your Android Phone/Tablet." Safe Computing at the University of Michigan. University of Michigan. 12
13 YARA rule YARA is an open source tool designed to identify and classify malware threats. It is typically used as a host-based detection mechanism and provides a strong Perl-compatible regular expressions (PCRE) engine to match identifying features of threats at a binary level or more. PLXsert utilizes YARA rules to classify threats that persist across many campaigns and over time. Figure 21 contains a YARA rule provided by PLXsert to identify the bot payloads associated with the Spike DDoS Toolkit. rule Spikev4 meta: author = "PLXsert" description = "Rule to detect the Spike v4.0 Bot payloads" strings: $st0 = "Int Server..." $st1 = "INFO:%d %d" $st2 = "VERS0NEX:%s %d %d %s" $st3 = "Mr.Black" $st4 = "DealwithDDoS" condition: all of them Figure 21: PLXsert YARA rule to detect the Spike DDoS toolkit bot payloads CONCLUSION There is a rising trend in botnet activity from Asia that has targeted Linux servers primarily, but is now diversifying and targeting Windows hosts, routers, CPE and ARM-compatible Linux distributions as well. DDoS attackers can gain additional resources by extending the range of devices that can be harnessed by a botnet. As a result, these botnets can produce significant DDoS attack campaigns. New DDoS kits, such as the Spike DDoS toolkit, are incorporating malware designed to target multiple devices and platforms, thus requiring system administrators to thoroughly check and harden devices that may not have been targeted or thought to be at risk for botnet infection in the past. The Spike DDoS toolkit does not use new types of DDoS attacks. Most of its payloads are typical in any DDoS toolkit. In addition, its payload implementations are either fairly simplistic or implemented incorrectly. What Spike does bring, however, is diversity in infection with the introduction of ARM-based binary payloads. 9 "OWASP Internet of Things Top Ten Project." Open Web Application Security Project (OWASP). HP Fortify on Demand. 13
14 These botnets will likely be used eventually in attack campaigns against targets in regions beyond Asia, and against a variety of verticals. Unless there are significant community cleanup efforts, this infestation is likely to spread and there is likely to be a surge in the number of new iterations that incorporate new payloads and signatures. PLXsert will continue researching these binaries and provide further advisories should it be warranted. CONTRIBUTORS: PLXsert ABOUT THE PROLEXIC SECURITY ENGINEERING AND RESEARCH TEAM (PLXsert) PLXsert monitors malicious cyber threats globally and analyzes these attacks using proprietary techniques and equipment. Through research, digital forensics and post-event analysis, PLXsert is able to build a global view of security threats, vulnerabilities and trends, which is shared with customers and the security community. By identifying the sources and associated attributes of individual attacks, along with best practices to identify and mitigate security threats and vulnerabilities, PLXsert helps organizations make more informed, proactive decisions. ABOUT AKAMAI Akamai is the leading provider of cloud services for delivering, optimizing and securing online content and business applications. At the core of the Company's solutions is the Akamai Intelligent Platform, providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud. To learn more about how Akamai is accelerating the pace of innovation in a hyperconnected world, please visit or blogs.akamai.com, and on Twitter. 14
JOOMLA REFLECTION DDOS-FOR-HIRE
1 TLP: GREEN GSI ID: 1085 JOOMLA REFLECTION DDOS-FOR-HIRE RISK FACTOR - HIGH 1.1 / OVERVIEW / Following a series of vulnerability disclosures throughout 2014, the popular content management framework Joomla
DNS FLOODER V1.1. akamai s [state of the internet] / Threat Advisory
GSI ID: 1065 DNS FLOODER V1.1 RISK FACTOR - HIGH 1.1 OVERVIEW / PLXSert has observed the release and rapid deployment of a new DNS reflection toolkit for distributed denial of service (DDoS) attacks. The
NTP-AMP: AMPLIFICATION TACTICS AND ANALYSIS
GSI ID: 1070 NTP-AMP: AMPLIFICATION TACTICS AND ANALYSIS RISK FACTOR - HIGH 1.1 OVERVIEW / Amplification is not a new distributed denial of service (DDoS) attack method, nor is the misuse of the Network
The server will respond to the client with a list of instances. One such attack was analyzed by an information security researcher in January 2015.
1 TLP: GREEN 02.11.15 GSI ID: 1086 SECURITY BULLETIN: MS SQL REFLECTION DDOS RISK FACTOR - MEDIUM 1.1 / OVERVIEW / Beginning in October 2014, PLXsert observed the use of a new type of reflection-based
SSDP REFLECTION DDOS ATTACKS
TLP: AMBER GSI ID: 1079 SSDP REFLECTION DDOS ATTACKS RISK FACTOR - HIGH 1.1 OVERVIEW / PLXsert has observed the use of a new reflection and amplification distributed denial of service (DDoS) attack that
IptabLes/IptabLex DDoS Bots
IptabLes/IptabLex DDoS Bots TLP - GREEN GSI ID: 1077 Risk Factor - High OVERVIEW During Q2 2014, Akamai s Prolexic Security Engineering and Research Team (PLXsert) detected and measured distributed denial
[state of the internet] / DDoS Reflection Vectors. Threat Advisory: NetBIOS name server, RPC portmap and Sentinel reflection DDoS
TLP: GREEN Issue Date: 2015.10.28 Risk Factor- Medium Threat Advisory: NetBIOS name server, RPC portmap and Sentinel reflection DDoS 1.0 / OVERVIEW / In the third quarter of 2015, Akamai mitigated and
Threat Advisory: Trivial File Transfer Protocol (TFTP) Reflection DDoS
Classification: TLP-GREEN RISK LEVEL: MEDIUM Threat Advisory: Trivial File Transfer Protocol (TFTP) Reflection DDoS Release Date: 6.1.16 1.0 / OVERVIEW / Akamai SIRT is investigating a new DDoS reflection
How To Mitigate A Ddos Attack
VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT ISSUE 3 3RD QUARTER 2014 CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS 4 Mitigations by Attack Size 4 Mitigations by Industry 5
Introduction to DDoS Attacks. Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter
Introduction to DDoS Attacks Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter DDoS in the News Q1 2014 DDoS Attack Trends DDoS Attack Trends Q4 2013 Mobile devices
[ X OR DDoS T h r e a t A d v i sory] akamai.com
[ X OR DDoS T h r e a t A d v i sory] akamai.com What is the XOR DDoS threat The XOR DDoS botnet has produced DDoS attacks from a few Gbps to 150+ Gbps The gaming sector has been the primary target, followed
DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest
DDoS Attacks: The Latest Threat to Availability Dr. Bill Highleyman Managing Editor Availability Digest The Anatomy of a DDoS Attack Sombers Associates, Inc. 2013 2 What is a Distributed Denial of Service
Acquia Cloud Edge Protect Powered by CloudFlare
Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....
Stop DDoS Attacks in Minutes
PREVENTIA Forward Thinking Security Solutions Stop DDoS Attacks in Minutes 1 On average there are more than 7,000 DDoS attacks observed daily. You ve seen the headlines. Distributed Denial of Service (DDoS)
Exercise 7 Network Forensics
Exercise 7 Network Forensics What Will You Learn? The network forensics exercise is aimed at introducing you to the post-mortem analysis of pcap file dumps and Cisco netflow logs. In particular you will:
Radware Security Research. Reverse Engineering a Sophisticated DDoS Attack Bot. Author: Zeev Ravid
Reverse Engineering a Sophisticated DDoS Attack Bot Author: Zeev Ravid July 2015 Introduction In July 2015, Radware s Emergency Response Team (ERT) noticed a significant increased usage of the Tsunami
Prolexic Quarterly Global DDoS Attack Report
Prolexic Quarterly Global DDoS Attack Report Q1 2014 Malicious actors choose reflection, not infection to launch high-bandwidth attacks www.prolexic.com Akamai s State of the Internet Report: Gain insight
CloudFlare advanced DDoS protection
CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE [email protected] www.cloudflare.com
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons
This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons Attribution-ShareAlike 4.0 International license. As a provider
VALIDATING DDoS THREAT PROTECTION
VALIDATING DDoS THREAT PROTECTION Ensure your DDoS Solution Works in Real-World Conditions WHITE PAPER Executive Summary This white paper is for security and networking professionals who are looking to
This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons
This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons Attribution-ShareAlike 4.0 International license. As a provider
DDoS Attacks Can Take Down Your Online Services
DDoS Attacks Can Take Down Your Online Services Dr. Bill Highleyman Managing Editor, Availability Digest Continuity Insights New York 2014 October 8, 2014 [email protected] Who Am I? Dr. Bill
Availability Digest. www.availabilitydigest.com. Prolexic a DDoS Mitigation Service Provider April 2013
the Availability Digest Prolexic a DDoS Mitigation Service Provider April 2013 Prolexic (www.prolexic.com) is a firm that focuses solely on mitigating Distributed Denial of Service (DDoS) attacks. Headquartered
TDC s perspective on DDoS threats
TDC s perspective on DDoS threats DDoS Dagen Stockholm March 2013 Lars Højberg, Technical Security Manager, TDC TDC in Sweden TDC in the Nordics 9 300 employees (2012) Turnover: 26,1 billion DKK (2012)
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks
CSE 3482 Introduction to Computer Security Denial of Service (DoS) Attacks Instructor: N. Vlajic, Winter 2015 Learning Objectives Upon completion of this material, you should be able to: Explain the basic
STATISTICS ON BOTNET-ASSISTED DDOS ATTACKS IN Q1 2015
STATISTICS ON BOTNET-ASSISTED DDOS ATTACKS IN Q1 2015 www.kaspersky.com 2 CONTENTS Methodology 3 Main findings 4 Geography of attacks 5 Time variations in the number of DDoS attacks 7 Types and duration
www.prolexic.com Stop DDoS Attacks in Minutes
www.prolexic.com Stop DDoS Attacks in Minutes Prolexic gives us the strong insurance policy against DDoS attacks that we were looking for. Mark Johnson, Chief Financial Officer, RealVision You ve seen
How To Protect A Dns Authority Server From A Flood Attack
the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point
SECURING APACHE : DOS & DDOS ATTACKS - II
SECURING APACHE : DOS & DDOS ATTACKS - II How DDoS attacks are performed A DDoS attack has to be carefully prepared by the attackers. They first recruit the zombie army, by looking for vulnerable machines,
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
EZ Snort Rules Find the Truffles, Leave the Dirt. David J. Bianco Vorant Network Security, Inc. [email protected]. 2006, Vorant Network Security, Inc.
EZ Snort Rules Find the Truffles, Leave the Dirt David J. Bianco Vorant Network Security, Inc. [email protected] 2006, Vorant Network Security, Inc. Table of Contents Intro to Snort Configuration Anatomy
Acunetix Website Audit. 5 November, 2014. Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build 20120808)
Acunetix Website Audit 5 November, 2014 Developer Report Generated by Acunetix WVS Reporter (v8.0 Build 20120808) Scan of http://filesbi.go.id:80/ Scan details Scan information Starttime 05/11/2014 14:44:06
How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks
How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks Stop DDoS before they stop you! James Braunegg (Micron 21) What Is Distributed Denial of Service A Denial of Service attack (DoS)
Distributed Denial of Service Attack Tools
Distributed Denial of Service Attack Tools Introduction: Distributed Denial of Service Attack Tools Internet Security Systems (ISS) has identified a number of distributed denial of service tools readily
CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM
59 CHAPETR 3 DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM 3.1. INTRODUCTION The last decade has seen many prominent DDoS attack on high profile webservers. In order to provide an effective defense against
IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for
Intrusion Detection Intrusion Detection Security Intrusion: a security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts
Network/Internet Forensic and Intrusion Log Analysis
Course Introduction Enterprises all over the globe are compromised remotely by malicious hackers each day. Credit card numbers, proprietary information, account usernames and passwords, and a wealth of
DDoS Attacks & Mitigation
DDoS Attacks & Mitigation Sang Young Security Consultant [email protected] 1 DoS Attack DoS & DDoS an attack render a target unusable by legitimate users DDoS Attack launch the DoS attacks from various
[state of the internet] / SECURITY / THREAT ADVISORY. Threat Advisory: BillGates Botnet
Issue Date: 4.4.16 Risk Factor- High TLP: WHITE Threat Advisory: BillGates Botnet 1.0 / OVERVIEW / Akamai s Security Intelligence Research Team (SIRT) continues to see the BillGates trojan/bot family of
Analysis of a DDoS Attack
Analysis of a DDoS Attack December 2014 CONFIDENTIAL CORERO INTERNAL USE ONLY Methodology around DDoS Detection & Mitigation Corero methodology for DDoS protection Initial Configuration Monitoring and
Alert (TA14-212A) Backoff Point-of-Sale Malware
Alert (TA14-212A) Backoff Point-of-Sale Malware Original release date: July 31, 2014 Systems Affected Point-of-Sale Systems Overview This advisory was prepared in collaboration with the National Cybersecurity
SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper
SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013
Security workshop Belnet Aris Adamantiadis Brussels 18 th April 2013 Agenda What is a botnet? Symptoms How does it work? Life cycle How to fight against botnets? Proactive and reactive NIDS 2 What is a
Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide
Table of Content I. Note... 1 II. Login... 1 III. Real-time, Daily and Monthly Report... 3 Part A: Real-time Report... 3 Part 1: Traffic Details... 4 Part 2: Protocol Details... 5 Part B: Daily Report...
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Multifaceted Approach to Understanding the Botnet Phenomenon
Multifaceted Approach to Understanding the Botnet Phenomenon Christos P. Margiolas University of Crete A brief presentation for the paper: Multifaceted Approach to Understanding the Botnet Phenomenon Basic
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation
White Paper Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation Table of Contents Introduction... 3 Common DDoS Mitigation Measures...
Detecting peer-to-peer botnets
Detecting peer-to-peer botnets Reinier Schoof & Ralph Koning System and Network Engineering University of Amsterdam mail: [email protected], [email protected] February 4, 2007 1 Introduction Spam,
Survey on DDoS Attack Detection and Prevention in Cloud
Survey on DDoS Detection and Prevention in Cloud Patel Ankita Fenil Khatiwala Computer Department, Uka Tarsadia University, Bardoli, Surat, Gujrat Abstract: Cloud is becoming a dominant computing platform
DDoS Threat Report. Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter
DDoS Threat Report Insights on Finding, Fighting, and Living with DDoS Attacks v1.1 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter DDoS in the News - 2014 DDoS Trends
How To Block A Ddos Attack On A Network With A Firewall
A Prolexic White Paper Firewalls: Limitations When Applied to DDoS Protection Introduction Firewalls are often used to restrict certain protocols during normal network situations and when Distributed Denial
Cloud Security In Your Contingency Plans
Cloud Security In Your Contingency Plans Jerry Lock Security Sales Lead, Greater China Contingency Plans Avoid data theft and downtime by extending the security perimeter outside the data-center and protect
Why Is DDoS Prevention a Challenge?
ANALYST BRIEF Why Is DDoS Prevention a Challenge? PROTECTING AGAINST DISTRIBUTED DENIAL-OF-SERVICE ATTACKS Authors Andrew Braunberg, Mike Spanbauer Overview Over the past decade, the threat landscape has
Denial of Service. Tom Chen SMU [email protected]
Denial of Service Tom Chen SMU [email protected] Outline Introduction Basics of DoS Distributed DoS (DDoS) Defenses Tracing Attacks TC/BUPT/8704 SMU Engineering p. 2 Introduction What is DoS? 4 types
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
This report is a detailed analysis of the dropper and the payload of the HIMAN malware.
PAGE 5 Check Point Malware Research Group HIMAN Malware Analysis December 12, 2013 Researcher: Overview This report is a detailed analysis of the dropper and the payload of the HIMAN malware. This malware
How to Evaluate DDoS Mitigation Providers:
Akamai White Paper How to Evaluate DDoS Mitigation Providers: Four Critical Criteria How to Evaluate DDoS Mitigation Providers 2 TABLE OF CONTENTS INTRODUCTION 3 CRITERIA #1: THREAT INTELLIGENCE 3 CRITERIA
Chinese Chicken: Multiplatform DDoS botnets
Chinese Chicken: Multiplatform DDoS botnets Peter Kálnai @pkalnai Jaromír Hořejší @JaromirHorejsi Dec 3 nd Dec 5 th 2014 Nancy, France Outline Timeline (+References) Binaries, common characteristics Advertisements
DDoS DETECTING. DDoS ATTACKS WITH INFRASTRUCTURE MONITORING. [ Executive Brief ] Your data isn t safe. And neither is your website or your business.
[ Executive Brief ] DDoS DETECTING DDoS ATTACKS WITH INFRASTRUCTURE MONITORING. Your data isn t safe. And neither is your website or your business. Hacking has become more prevalent and more sophisticated
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
Lab exercise: Working with Wireshark and Snort for Intrusion Detection
CS 491S: Computer and Network Security Fall 2008 Lab exercise: Working with Wireshark and Snort for Intrusion Detection Abstract: This lab is intended to give you experience with two key tools used by
Arbor s Solution for ISP
Arbor s Solution for ISP Recent Attack Cases DDoS is an Exploding & Evolving Trend More Attack Motivations Geopolitical Burma taken offline by DDOS attack Protests Extortion Visa, PayPal, and MasterCard
Denial of Service Attacks
2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,
DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product
DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen Eldad Chai, VP Product Incapsula Application Delivery from the Cloud 2 DDoS 101 ISP Network Devices Web servers Applications
Revealing Botnets Using Network Traffic Statistics
Revealing Botnets Using Network Traffic Statistics P. Čeleda, R. Krejčí, V. Krmíček {celeda vojtec}@ics.muni.cz, [email protected] Security and Protection of Information 2011, 10-12 May 2011, Brno,
DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION
DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION Stephen Gates Chief Security Evangelist Corero Network Security Session ID: SEC-W04 Session Classification: Intermediate Recent Headlines Are Denial of
VISA SECURITY ALERT December 2015 KUHOOK POINT OF SALE MALWARE. Summary. Distribution and Installation
VISA SECURITY ALERT December 2015 KUHOOK POINT OF SALE MALWARE Distribution: Merchants, Acquirers Who should read this: Information security, incident response, cyber intelligence staff Summary Kuhook
DDoS Protection on the Security Gateway
DDoS Protection on the Security Gateway Best Practices 24 August 2014 Protected 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
Intrusion Detection in AlienVault
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
Don t get DDoSed and Confused. Patrick Sullivan, CISSP, GSLC, GWAPT, GCIH Managed, Security Services
Don t get DDoSed and Confused Patrick Sullivan, CISSP, GSLC, GWAPT, GCIH Managed, Security Services Agenda Intro/Data Collection DDoS Basics Trends and Statistics Adversarial Groups/Motivations Defense
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
Seminar Computer Security
Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example
Malicious Network Traffic Analysis
Malicious Network Traffic Analysis Uncover system intrusions by identifying malicious network activity. There are a tremendous amount of network based attacks to be aware of on the internet today and the
DDoS Vulnerability Analysis of Bittorrent Protocol
DDoS Vulnerability Analysis of Bittorrent Protocol Ka Cheung Sia [email protected] Abstract Bittorrent (BT) traffic had been reported to contribute to 3% of the Internet traffic nowadays and the number
CSCI 6900. Computer Network Attacks and Defenses
CSCI 6900 Computer Network Attacks and Defenses Lecture 2: Overview of research topics in computer and network security (part B) Instructor: Prof. Roberto Perdisci Spam Detection SPAM = Unsolicited bulk
Denial of Service Attacks, What They are and How to Combat Them
Denial of Service Attacks, What They are and How to Combat Them John P. Pironti, CISSP Genuity, Inc. Principal Enterprise Solutions Architect Principal Security Consultant Version 1.0 November 12, 2001
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
Networks and Security Lab. Network Forensics
Networks and Security Lab Network Forensics Network Forensics - continued We start off from the previous week s exercises and analyze each trace file in detail. Tools needed: Wireshark and your favorite
Network forensics 101 Network monitoring with Netflow, nfsen + nfdump
Network forensics 101 Network monitoring with Netflow, nfsen + nfdump www.enisa.europa.eu Agenda Intro to netflow Metrics Toolbox (Nfsen + Nfdump) Demo www.enisa.europa.eu 2 What is Netflow Netflow = Netflow
TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor [email protected]
TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor [email protected] Abstract TCP SYN flooding attack is a kind of denial-of-service attack. This SYN flooding attack is using the weakness
Rise of the Machines: An Internet-Wide Analysis of Web Bots in 2014
SESSION ID: SPO2-W04 Rise of the Machines: An Internet-Wide Analysis of Web Bots in 2014 John Summers VP, Security Products Akamai #RSAC The Akamai Intelligent Platform The Platform 167,000+ Servers 2,300+
Context Threat Intelligence
Context Threat Intelligence Threat Advisory The Monju Incident Context Ref. Author TA10009 Context Threat Intelligence (CTI) Date 27/01/2014 Tel +44 (0) 20 7537 7515 Fax +44 (0) 20 7537 1071 Email [email protected]
Analysis of Network Packets. C DAC Bangalore Electronics City
Analysis of Network Packets C DAC Bangalore Electronics City Agenda TCP/IP Protocol Security concerns related to Protocols Packet Analysis Signature based Analysis Anomaly based Analysis Traffic Analysis
Network Security Demonstration - Snort based IDS Integration -
Network Security Demonstration - Snort based IDS Integration - Hyuk Lim ([email protected]) with TJ Ha, CW Jeong, J Narantuya, JW Kim Wireless Communications and Networking Lab School of Information and
Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015
Arrow ECS University 2015 Radware Hybrid Cloud WAF Service 9 Ottobre 2015 Get to Know Radware 2 Our Track Record Company Growth Over 10,000 Customers USD Millions 200.00 150.00 32% 144.1 16% 167.0 15%
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík {celeda velan jirsik}@ics.muni.cz Part I Introduction P. Čeleda et al. Network Security Monitoring and Behavior
How To Monitor Network Activity On Palo Alto Network On Pnetorama On A Pcosa.Com (For Free)
Monitor Network Activity Palo Alto Networks Panorama Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
