SPAMTRACER TRACKING FLY- BY SPAMMERS



Similar documents
THE Internet is partitioned into tens of thousands

arxiv: v2 [cs.ni] 20 Apr 2015

SysSec 7 Network Security. Aurélien Francillon

BGP route monitoring. Mar, 25, 2008 Matsuzaki maz Yoshinobu

LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains

BGP FORGOTTEN BUT USEFUL FEATURES. Piotr Wojciechowski (CCIE #25543)

Are BGP Routers Open To Attack? An Experiment

The Hillstone and Trend Micro Joint Solution

Outline. Outline. Outline

DDOS Mi'ga'on in RedIRIS. SIG- ISM. Vienna

Understanding the Network-Level Behavior of Spammers

Detecting BGP hijacks in 2014

Complete Protection against Evolving DDoS Threats

A Strategy for Transitioning to BGP Security

WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA

Policy-Based AS Path Verification with Enhanced Comparison Algorithm to Prevent 1-Hop AS Path Hijacking in Real Time

Characterizing Large-scale Routing Anomalies: A Case Study of the China Telecom Incident

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

Informa4on Security Management at Cer4ficate Authori4es

Network Security. Mobin Javed. October 5, 2011

We Know It Before You Do: Predicting Malicious Domains

The RouteNormalizer and Network Routing Anomalification

Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor

Measurement Study on the Internet reachability. 3.1 Introduction. 3. Internet Backbone

BBM467 Data Intensive ApplicaAons

Cisco RSA Announcement Update

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme

Luciano Minuchin CIO Sebastian Motta CSO DIRECCIÓN NACIONAL DEL REGISTRO DE DOMINIOS DE INTERNET

Kaspersky DDoS Prevention

Firewall Security. Presented by: Daminda Perera

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January

TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING

Symantec Security.cloud - Skeptic Whitepaper

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

A very short history of networking

Internet Monitoring via DNS Traffic Analysis. Wenke Lee Georgia Institute of Technology

Practical BGP Security: Architecture, Techniques and Tools

Detecting spam machines, a Netflow-data based approach

Tools and Techniques for the Analysis of Large Scale BGP Datasets. Manish Karir, Larry Blunk (Merit) Dion Blazakis, John Baras (UMd)

Monitoring BGP and Route Leaks using OpenBMP and Apache Kafka

Fuzzy Network Profiling for Intrusion Detection

Embedded BGP Routing Monitoring. Th. Lévy O. Marcé

MITIGATING SPAM USING NETWORK-LEVEL FEATURES

Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project

Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System

DDoS attacks in CESNET2

The OpenDNS Global Network Delivers a Secure Connection Every Time. Everywhere.

The Coremelt Attack. Ahren Studer and Adrian Perrig. We ve Come to Rely on the Internet

A Monitor Tool for Anti-spam Mechanisms and Spammers Behavior

RFC 4264 : BGP Wedgies ---- Bad Policy Interactions that Cannot be Debugged

Introducing IBM s Advanced Threat Protection Platform

Know Your Foe. Threat Infrastructure Analysis Pitfalls

Whose IP Is It Anyways: Tales of IP Reputation Failures

BREAKING HTTPS WITH BGP HIJACKING. Artyom Gavrichenkov R&D Team Lead, Qrator Labs

How To Load Balance On A Bgg On A Network With A Network (Networking) On A Pc Or Ipa On A Computer Or Ipad On A 2G Network On A Microsoft Ipa (Netnet) On An Ip

No Cloud Allowed. Denying Service to DDOS Protection Services

Security Toolsets for ISP Defense

DDoS Overview and Incident Response Guide. July 2014

Stop DDoS Attacks in Minutes

Service Description DDoS Mitigation Service

Intelligent Routing Platform White Paper

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Evolving Threat Landscape

Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team

Secure Your Mobile Workplace

Detecting Spam at the Network Level

Module 12 Multihoming to the Same ISP

Internet Routing Protocols Lecture 04 BGP Continued

Inspecting DNS Flow Traffic for Purposes of Botnet Detection

Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.

technical Operations Area IP Resource Management

Transcription:

SPAMTRACER TRACKING FLY- BY SPAMMERS RIPE 67 PIERRE- ANTOINE VERVIER SYMANTEC RESEARCH LABS Pierre- Antoine_Vervier@symantec.com RIPE 67 - Athens - Oct. 14 th - 18 th, 2013 1

2 Where It All Begins CONJECTURE Spammers would use BGP hijacking to send spam from the stolen IP space and remain untraceable Short- lived (< 1 day) routes to unused IP space + spam [Ramachandran2006, Hu2007] Anecdotal reports on mailing lists POTENTIAL EFFECTS Misa]ribute a]acks launched from hijacked networks due to hijackers stealing IP idenfty Spam filters heavily rely on IP reputaaon as a first layer of defense 2

Fly- By Spammers :: Myth or Reality? 3 3

4 BGP Hijacking CAUSE The injecaon of erroneous rouang informaaon into BGP No widely deployed security mechanism yet E.g., ROA, BGPsec EFFECTS Blackhole or MITM [Pilosof 2008] of the vicam network EXPLANATIONS Router misconfiguraaon, operaaonal fault E.g., Hijack of part of Youtube network by Pakistan Telecom Malicious intent? 4

Your Mission, Should You Accept It 5 Validate or invalidate on a large scale the conjecture about fly- by spammers Assess the prevalence of this phenomenon SPAMTRACER collect roufng informaaon about spam networks extract abnormal rouang behaviors to detect possible BGP hijacks 5

6 SPAMTRACER :: PresentaFon ASSUMPTION When an IP address block is hijacked for stealthy spamming, a roufng change will be observed when the block is released by the spammer to remain stealthy METHOD Collect BGP routes and IP/AS traceroutes to spamming networks just aier spam is received and during several days Look for a rouang change from the hijacked state to the normal state of the network 6

SPAMTRACER :: System Architecture 7 Symantec.cloud Live spam feed Data collection Select Spams IP Monitored IP's IP i Team Cymru Bogon IP prefixes Data analysis IP/AS traceroute BGP routes IP/AS & BGP routes to IP i BGP & Traceroute Anomaly Detection Identification of Hijackings Possible Hijack/ Suspicious Benign 7

29 hijacked prefixes from Jan. to Jul. 2013 8 8

Hijack durafon between 1 and 20 days 9 9

Fly- By Spammers :: Hijack Signature 10 Hijacked networks were dormant address blocks, i.e., by the ame the networks were hijacked they had been lei idle by their owner adverased for a short period of ame adverased from an apparently legifmate origin AS but via a rogue upstream AS see [Huston2005] In pracace, we observed idle intervals between 3 months and 7 years hijack durafons between 1 day and 20 days, mostly < 5 days rogue upstream ASes were hijacked too 10

Case Studies :: 11 Suspicious BGP Routes & Spam Suspicious BGP announcements 11

Case Studies :: 12 Suspicious BGP Routes & Spam Strong temporal correlaaon between suspicious BGP announcements and spam BGP announcements are quite short- lived! No idenafied spam bot! A lot of scam web sites adverased in spam mails were hosted in the hijacked networks 12

Case Studies :: 13 Suspicious BGP Routes & DNSBLs Only 2 address blocks appeared in the Uceprotect* blacklist at the ame of the suspicious BGP announcements Suspicious BGP announcements Noace: blacklist entries automaacally expire aier 7 days *h]p://www.uceprotect.net 13

How Stealthy Were Spammers? 14 Out of 29 hijacked address blocks 6 (21%) were listed in Uceprotect 13 (45%) were listed in Spamhaus DROP (Don t Route Or Peer) DROP is supposed to list hijacked address blocks but li]le is known about their lisang policy 29 (100%) were observed only once during the ame period of the experiment Fly- by spammers seem to manage to remain under the radar! 14

Which Networks Were Targeted? All hijacked address blocks were assigned to a different organizaaon (i.e., a different owner) Out of 29 organizaaons 12 (41%) were found to be dissolved or very likely out of business 17 (59%) were found to be sfll in business or no conclusive evidence of them being out of business could be found Fly- by spammers seem to simply target dormant address blocks regardless of their owner sall being business or not 15 15

What About Long- Lived Hijacks? 16 We looked specifically for short- lived hijacks each spam network was monitored for 1 week aier spam was received But what about long- lived ones it happens also, e.g., LinkTelecom hijack [Nanog2011, ISTR2012, Vervier2013, Schlamp2013] lasted 5 months but they are less straightorward to detect and it seems to defeat the assumed purpose of evading blacklisang We are working on updaang our framework to detect these cases 16

How To Prevent Fly- By Spammers? 17 In the observed hijack cases, spammers did not tamper with the origin of the address blocks but adverased the address blocks via rogue upstream ASes BGPsec is currently the most promising architecture for securing BGP both Route OriginaFon and Route PropagaFon must be secured to prevent fly- by spammers secured Route Originaaon via ROAs is being more and more deployed but secured Route Propagaaon is sall at a too early stage The soluaon for now is thus to encourage the following of rouang best pracfces and use detecfon systems to miagate the effect of these a]acks, e.g., by feeding IP- based reputaaon systems with hijacked address blocks 17

18 Conclusion The observed fly- by spammer cases show that this phenomenon is happening though it does not currently seem to be a very prevalent technique to send spam, e.g., compared to botnets However, it is important to detect those a]acks because hijacking address blocks hinder traceability of a]ackers and can lead to misacribufng a]acks when responding with possibly legal acaons! 18

19 PerspecFves Provide an interface for network operators to query idenafied hijacks Ongoing collaborafon with Insatut Eurécom (FRA) and TU München (GER) to build a comprehensive system for the detecaon and invesagaaon of malicious BGP hijacks 19

20 Thank you! Time for Q&A! 20

21 Some references [Ramachandran 2006] A. Ramachandran and N. Feamster. Understanding the network- level behavior of spammers. In SIGCOMM 06: Proceedings of the 2006 conference on Applicaaons, technologies, architectures, and protocols for computer communicaaons, pages 291-302, 2006. [Hu 2007] X. Hu and Z. M. Mao. Accurate Real- Time Idenaficaaon of IP Prefix Hijacking. In Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P), pages 3-17, 2007. [Pilosov 2008] A. Pilosov and T. Kapela. Stealing the Internet: An Internet- Scale Man In The Middle A]ack. Defcon 16, Las Vegas, NV, August 2008. [Huston 2005] G. Huston. Auto- Detecang Hijacked Prefixes? RIPE 50, May 2005. [Nanog 2011] Prefix hijacking by Michael Lindsay via Internap, h]p://mailman.nanog.org/pipermail/ nanog/2011- August/039381.html, August 2011. [ISTR 2012] Symantec Internet Security Threat Report: Future Spam Trends: BGP Hijacking. Case Study - Beware of "Fly- by Spammers". h]p://www.symantec.com/threatreport/, April 2012. [Vervier 2013] P.- A. Vervier and O. Thonnard. Spamtracer: How Stealthy Are Spammers? In the 5 th IEEE Internaaonal Traffic Monitoring and Analysis Workshop (TMA), pages 453-458, 2013. [Schlamp 2013] J. Schlamp, G. Carle, and E. W. Biersack. A Forensic Case Study on AS Hijacking: The A]acker's Perspecave. ACM Computer Communica0on Review (CCR), pages 5-12, 2013. 21