Good Bot, Bad Bot, Ugly Bot. Battle of the Bots!



Similar documents
The SMB Cyber Security Survival Guide

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL

Rise of the Machines: An Internet-Wide Analysis of Web Bots in 2014

10 Things Every Web Application Firewall Should Provide Share this ebook

Cloud Security In Your Contingency Plans

FORBIDDEN - Ethical Hacking Workshop Duration

Introduction: 1. Daily 360 Website Scanning for Malware

Property of Secure Network Technologies-Do Not Distribute or Post Without Written Permission-Copyrights and Trademark Apply

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

A TASTE OF HTTP BOTNETS

Whose IP Is It Anyways: Tales of IP Reputation Failures

WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2

RETHINKING CYBER SECURITY Changing the Business Conversation

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

Loophole+ with Ethical Hacking and Penetration Testing

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Current Threat Scenario and Recent Attack Trends

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

High Speed Internet - User Guide. Welcome to. your world.

Fighting Advanced Threats

Stop DDoS Attacks in Minutes

DDoS Attacks - Peeling the Onion on One of the Most Sophisticated Ever Seen. Eldad Chai, VP Product

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

TLP WHITE. Denial of service attacks: what you need to know

Threat Events: Software Attacks (cont.)

Web Security. Discovering, Analyzing and Mitigating Web Security Threats

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

WEB ATTACKS AND COUNTERMEASURES

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Innovations in Network Security

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

Prevent Malware attacks with F5 WebSafe and MobileSafe. Alfredo Vistola Security Solution Architect, EMEA

Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers

National Cyber Security Month 2015: Daily Security Awareness Tips

Information Security Threat Trends

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Next Generation IPS and Reputation Services

End-to-End Application Security from the Cloud

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Protect Your Business and Customers from Online Fraud

Protection against DDoS and WEB attacks. Michael Soukonnik Radware Ltd

How to Identify Phishing s

DATA SHEET. What Darktrace Finds

IT Security Community

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

AVG AntiVirus. How does this benefit you?

RSA Web Threat Detection

What Next Gen Firewalls Miss: 6 Requirements to Protect Web Applications

Attacks from the Inside

A Network Administrator s Guide to Web App Security

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Advanced Persistent Threats

Effective Methods to Detect Current Security Threats

Protecting What Matters Most. Bartosz Kryński Senior Consultant, Clico

Where every interaction matters.

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

Cyber Security and Critical Information Infrastructure

Four Steps to Defeat a DDoS Attack

Four Steps to Defeat a DDoS Attack

From Rivals to BFF: WAF & VA Unite OWASP The OWASP Foundation

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!

2012 NORTON CYBERCRIME REPORT

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Enterprise-Grade Security from the Cloud

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

Data Center security trends

Stop DDoS Attacks in Minutes

Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa

Stopping zombies, botnets and other - and web-borne threats

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

Security Analytics for Smart Grid

Applications and data are the main targets for modern attacks. Adoption of dedicated application and data security concepts, technologies and

Top 10 Tips to Keep Your Small Business Safe

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security

Unknown threats in Sweden. Study publication August 27, 2014

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

Cyber Security for Start-ups: An Affordable 10-Step Plan

Security and Privacy

Can We Become Resilient to Cyber Attacks?

Mobile Malware Network View. Kevin McNamee : Alcatel-Lucent

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Transcription:

SESSION ID: TTA-R08 Good Bot, Bad Bot, Ugly Bot. Battle of the Bots! John Ellis 周 由 安 Chief Strategist, Cyber Security (APJ) Akamai Technologies @zenofsecurity

About me Kiwi (New Zealander) 20+ years experience in IT security (trained sheep to hack) Have worked in defence, telecommunications and banking Consider myself a student, but love to share what I know 9 years in Singapore, and see we re still trying to find the Asian solution to the Asian problem (talk to me afterwards if you want to know more). Still trying to learn Mandarin.might one day get there 2

Cyber buzz bingo Cyber SaaS Threat Intel Cloud BOYD IoT Cyber Kill Chain Innovation Big Data Breach TTPs Signal to noise Cross-Platform SMAC Next-gen APT China Data Driven Thought Leaders Cyber Attack BOT Game Changer PaaS Cyber Crime Hacktivist

What is a bot? A software application that automates tasks that are simple and structurally repetitive at much higher rates or precision than a human.

Bot trends & environment Good Bad Bots Account for 29% of all website visits 22% fraud activity Bad 3.5% Hacking tools Search engine, crawlers, spider bots Vulnerability scanner, Site performance bots Partner bots Aggregator, media bots 44% Human traffic Spam bots 56% Bot traffic Scraper bots 3% scrapers Hacker, Fraud bots 0.5% Spammers DDoS bots Good Bots Account for 27% of all website visits Source: Incapsula / Akamai

Good bots Search engine optimization (SEO) Marketing Vulnerability Scanners Performance analysis tools

Bad bots Fraud Vulnerability scanners Malware Scrapers (your competitors) Spam (it ain t ham) DDoS attacks Did I mention malware?

Ugly naughty bots Scrapers Want to know everything about you Price Aggregators Crawlers Too Friendly Malicious? Maybe, Maybe not

SPAM Bots Target marketing Improve SEO Malware distribution Fraud 9

Scraper Bots (an example) Scraping Service / Tools Aggregator Website 10

Commercial Scraping Services / Tools kimono 11

The BOT evolution Cloud Server Mobile Desktop Internet of Things (IoT) 12

DDoS Bots DDoS attacks instances plotted over time Q113-Q115 Source: Akamai SOTI Security Report Q1 2015 13

Top 10 Source Countries for DDoS Attacks China 1.4 billion people Italy 8.38% 642 million people online German 17.3% China 23.45% Russia 5.95% France 6.03% U.K. 6.17% Korea 6.23% India 6.93% Over 50% of systems infected with viruses 9 out 10 Windows systems pirated Spain 7.29% 70% of Windows systems never patched 14 U.S. 12.18%

DDoS 4 Bitcoin (DD4BC) Who, What, Where & How DD4BC (DDoS For Bitcoins) Online ransom group Not ransomware No other attribution Publicly available DDoS toolkits & rented botnets in the underground Who are the targets? 4% 7% Banking & Credit Unions 15% Gaming Media & Entertainment 74% Payment Processing 15

Great Canon (GC) of China An in-path system, capable of injecting traffic and directly suppressing traffic Acting as a full man-in-themiddle for targeted flows Harnesses legitamate web browsing traffic for attack capability and capacity Coding error provides clue as to how to detect and filter traffic. Example of cat and mouse game Targets of http get flood DDoS attack Source: https://citizenlab.org/wp-content/uploads/2009/10/chinasgreatcannon.pdf 16

Value of a hacked PC (Brian Kerbs) Phishing site Malware download site Warez / Piracy server Child pornography server Spam site Web Server Bot activity Spam zombie DDoS extortion zombie Click fraud zombie Anonymization proxy Captcha solving zombie Webmail spam Stranded aboard scam Harvesting email accounts Harvesting associated accounts Online gaming characters Online gaming goods PC game licenses OS licence keys Webmail Virtual goods Spam zombie DDoS extortion zombie Click fraud zombie Anonymization proxy Captcha solving zombie Account credentials Financial credentials Ebay / paypal fake auction Online gaming creds Skype / VoIP creds Website / FTP creds Client side encrypt certs Bank account data Credit card data Stock trading account data Mutual fund account data Facebook Twitter Linkedin Google+ Reputation hacking Hostage attacks Source: http://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc-revisited/ 17 Email account ransom Fake antivirus Ransomware Web cam extortion

Using Botnets to access market insights Investors Legal return on investment Illegal access to information Managers / Analysts Legion / infantry / operators Source: Interpol 18

Account checkers and Fraud 1 2 3 4 5 How does this evil deed typically happen? Builds tools server Cultivate list of open proxies Acquire compromised logins Check / alter compromised accounts Make fraudulent purchase Compromise Attackers use variety of server tools to Obtain rapidly Attackers check may list obtain the modify of web validity the harvested proxies shipping of the / accounts. address of the victim and make Use Open stolen bulletproof proxies credentials allow hosting from route sites with Accounts that work are marked, and proxies around such the The attackers merchandise as IP pastebin, log blacklists in sent using to or the an from address near the attacker and picked up. underground credentials. sites. did Proxies Recently someone gift need cards, to both mention be physical of and the Once logged in, the attackers can cloud? sufficient Many electronic collect the underground have been key items user s length personal to mask forums purchase as they are easily available, data and Load attack sell credit difficult such card to trace information and easy to to use transport. for further fraud scripts ready to go purchases with their stored information. Source: https://www.akamai.com/us/en/multimedia/documents/infosec/akamai-security-and-compliance-account-checkers-and-fraud.pdf 19

Account checkers and Fraud 20

How to manage em BOTS

Block, Mitigate or Manage? Blocking BOTS causes them to go underground, mutate and harder to detect Not sure if bot...or Management strategies vary depending on the nature of the BOT and it s goal Stupid human?

Aggressiveness TTPs for the Good, Bad and Ugly Reduce Impact Terminate with extreme prejudice Welcome Bots Client Validation Desirable Degrees of Desirability Undesirable

BOT Response Methods Solution Landscape (what can you buy) From a technology perspective: Slow BOT/ Serve Alt./ etc. HTML Obscuring/ Rewriting BOT Obfuscation Cloud WAFs Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. CAPTCHA Cloud BOT Mgt. On Prem WAFs Alert/ Deny No BOT Detection Rate Based Detection Cross Customer Header/IP Based Tracking BOT Detection Methods Cross Customer Fingerprint Based Tracking Advanced BOT Evasion Traps

Cooking your BOT management program Detection Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Learnings Mitigation

Bot Detection Methods Client reputation Client and browser fingerprinting HTTP header anomaly detection JavaScript Injection JS BOT evasion traps Behavioral Analysis

Bot Response Methods IP blocking Geo blocking Rate controls Web Application Firewall Rules Obfuscation for HTML, JS, URL and Form Serve slow, stale, alternate, tar pit CAPTCHA challenge

Bot Learnings BOT scoring, categorization and trends Crowd sourcing of new BOTS www.botopedia.org Resource usage by BOT Input into evolving your detection and mitigation tactics Understand the cost of your mitigation strategies

7 Key Ingredients to Succeed (today) 1. Scale your defenses with a Cloud WAF Extend your perimeter beyond your site 2. Reverse Proxy Automatically drops traffic not on port 80 or port 443 Avoid data theft and downtime by extending the 3. Geo-based blocking security perimeter outside the data-center and Refuse requests from customer-selected list of countries protect from increasing frequency, scale and 4. sophistication Validate against of web known attacks. list of attackers Positive or negative security model (black or white lists) 5. Rate Controls Block requests that are too fast or too slow (anomaly scoring) 6. Data driven WAF WAF rules continuously refined based on visibility into web 7. Caching Dynamic and static caching to serve requests

Looking ahead Good Bots are an essential part of our Internet ecosystem It s an arms race, and you need to have a clear strategy If you don t have a WAF.get one!!! Threat intel (bingo) is vital in understanding. Learn from others Now you ve got a strategy, have a plan and rehearse it! It s hard but understand what normal looks like (try..please) Think active defense be smart in how you operate

Friend or Foe? You need to decide

I would like to thank Mike Smith (Akamai APJ Security CTO) Patrick Laverty (Akamai CSIRT) Mike Kun (Akamai CSIRT) Dave Lewis (Akamai Global Security Advocate).and Akamai s customers and competitors (they keep me honest) 我 也 感 谢 我 的 太 太 ( 大 熊 猫 ) 32