Stanford Computer Security Lab. TrackBack Spam: Abuse and Prevention. Elie Bursztein, Peifung E. Lam, John C. Mitchell Stanford University

Similar documents
TrackBack Spam: Abuse and Prevention

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

Case 2:08-cv ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

Analysis One Code Desc. Transaction Amount. Fiscal Period

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017

Domain Name Abuse Detection. Liming Wang

Deep Security/Intrusion Defense Firewall - IDS/IPS Coverage Statistics and Comparison

Deep Security Intrusion Detection & Prevention (IDS/IPS) Coverage Statistics and Comparison

Using big data analytics to identify malicious content: a case study on spam s

The Latest Internet Threats to Affect Your Organisation. Tom Gillis SVP Worldwide Marketing IronPort Systems, Inc.

ACTIVE MICROSOFT CERTIFICATIONS:

Ashley Institute of Training Schedule of VET Tuition Fees 2015

How To Get Rid Of A Phish Locker On A Computer (For A Bank)

CENTERPOINT ENERGY TEXARKANA SERVICE AREA GAS SUPPLY RATE (GSR) JULY Small Commercial Service (SCS-1) GSR

PHISHING IN SEASON TAX TIME MALWARE, PHISHING AND FRAUD

Dragonfly: Energy Companies Under Sabotage Threat Symantec Security Response

How To Get A Certificate From Ms.Net For A Server Server

Deep Security Vulnerability Protection Summary

CAFIS REPORT

Consumer ID Theft Total Costs

SPAM: 101 Cause and Effect

ACTIVE MICROSOFT CERTIFICATIONS:

Long Live Hosting! Use Solution-based Offers to Re-position Your Business and Reach New Audiences Parallels IP Holdings GmbH

ACTIVE MICROSOFT CERTIFICATIONS:

Computing & Telecommunications Services Monthly Report March 2015

When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper

BUGAT TROJAN JOINS THE MOBILE REVOLUTION

Cisco & Big Data Security

When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling

Evolving threats and counter technology

The Japanese Experience Countering Spam ITU TELECOM WORLD 2006

Whose IP Is It Anyways: Tales of IP Reputation Failures

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review

Choosing a Cell Phone Plan-Verizon

Market Assessment & Campaign SLA Calculator LOGO WE OPEN THE DOOR, SO YOU CAN CLOSE IT.

P/T 2B: 2 nd Half of Term (8 weeks) Start: 25-AUG-2014 End: 19-OCT-2014 Start: 20-OCT-2014 End: 14-DEC-2014

Equipping your Forecasting Toolkit to Account for Ongoing Changes

P/T 2B: 2 nd Half of Term (8 weeks) Start: 26-AUG-2013 End: 20-OCT-2013 Start: 21-OCT-2013 End: 15-DEC-2013

P/T 2B: 2 nd Half of Term (8 weeks) Start: 24-AUG-2015 End: 18-OCT-2015 Start: 19-OCT-2015 End: 13-DEC-2015

Using Web Analytics to Improve Marketing Performance

A!Team!Cymru!EIS!Report:!Growing!Exploitation!of!Small! OfCice!Routers!Creating!Serious!Risks!

How To Protect Your Network From Threats From Your Network (For A Mobile) And From Your Customers (For An Enterprise)

When Reputation is Not Enough. Barracuda Security Gateway s Predictive Sender Profiling. White Paper

DNS POISONING, AKA PHARMING, MAKES THE HEADLINES IN NOVEMBER S NEWS

March 2010 Report #39

AgriLife Information Technology IT General Session January 2010

CentralNic Privacy Policy Last Updated: July 31, 2012 Page 1 of 12. CentralNic. Version 1.0. July 31,

BCOE Payroll Calendar. Monday Tuesday Wednesday Thursday Friday Jun Jul Full Force Calc

Insurance and Banking Subcommittee

Dealing with Big Data in Cyber Intelligence

ZNetLive Malware Monitoring

Reputation Metrics Troubleshooter. Share it!

Resource Management Spreadsheet Capabilities. Stuart Dixon Resource Manager

REVERSE ENGINEERING THE AUTOMOTIVE PURCHASE FUNNEL KEN INSANA SENIOR MANAGER, CONSUMER RESEARCH

Microsoft Exchange 2003

Proposal to Reduce Opening Hours at the Revenues & Benefits Coventry Call Centre

Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002

CYBERSECURITY INESTIGATION AND ANALYSIS

Executive Summary. McAfee Labs Threats Report: Third Quarter 2013

Detailed guidance for employers

How to Protect Your Dealership's Online Reputation

Using Open Source Software to Manage Policies and Clinical Guidelines. Library & Knowledge Service Derby Teaching Hospitals NHS Foundation Trust

Reverse Transfer on a National Scale: Why? How?

Agenda. John Veldhuis, Sophos The playing field Threats Mobile Device Management. Pagina 2

Supervisor Instructions for Approving Web Time Entry


Department of Public Welfare (DPW)

JISC data.bris project & EPSRC Platform project: progress against workplan (October 2012)

Yandex: Webmaster Tools Overview and Guidelines

SpamTitan Outlook Addin V2.0

Current counter-measures and responses by CERTs

RadBlue Load Tester Version 6. [Released: 09 DEC 2009]

Japan s Countermeasures against Spam

Interest Rates. Countrywide Building Society. Savings Growth Data Sheet. Gross (% per annum)

Accident & Emergency Department Clinical Quality Indicators

Architectural Services Data Summary March 2011

Comprehensive Filtering. Whitepaper

Intercept Anti-Spam Quick Start Guide

Quick Start Guide. active directory maintenance checklist

Who will win the battle - Spammers or Service Providers?

2016 Examina on dates

Freedom of Information Request Reference No: I note you seek access to the following information:

HIDING THE NETWORK BEHIND THE NETWORK. BOTNET PROXY BUSINESS MODEL Alexandru Maximciuc, Cristina Vatamanu & Razvan Benchea Bitdefender, Romania

Secure Your Mobile Workplace

Comparing share-price performance of a stock

2015 Examination dates

BILD and WELT: Two successful Paid Content Strategies Capital Markets Day Berlin, December 10, Donata Hopfen, Publishing Director BILD Group

oct 03 / 2013 nov 12 / oct 05 / oct 07 / oct 21 / oct 24 / nov 07 / 2013 nov 14 / 2013.

Phone Fax

Statistics for ( )

ACCESS Nursing Programs Session 1 Center Valley Campus Only 8 Weeks Academic Calendar 8 Weeks

ACCESS Nursing Programs Session 1 Center Valley Campus Only 8 Weeks Academic Calendar 8 Weeks

SYMANTEC INTELLIGENCE REPORT NOVEMBER 2013

Image Spam: The Epidemic of 2006

Easter Seals Central Texas Programs Outcome Profiles Monthly and Year to Date FY % 87% 80% 80% 84% 84% 83%

Visendo Suite a reliable solution for SMBs

Unified Security Management and Open Threat Exchange

Symantec's Secret Sauce for Mobile Threat Protection. Jon Dreyfus, Ellen Linardi, Matthew Yeo

Transcription:

Abuse and Prevention Stanford University Stanford Computer Security Lab TrackBack Spam:

Introduction Many users nowadays post information on cloud computing sites Sites sometimes need to link to each other However, cross-referencing can become a vehicle for abuses (such as spamming) This calls for a study of security issues on cross-referencing between cloud sites

Introduction (cont.) Blog cross-referencing offers one such example Blogs have automated mechanisms, called Linkbacks, to facilitate cross-referencing, and this has been exploited by spammers

Introduction (cont.) We carried out a 1-year study of a major spamming platform, and analyzed 10 million spams Gained insight on attacker s method of operation and resources Propose a defense against blog spams

Outline Blog Spam Experiment setup : Honey blog! Results Defense

General Stats on Blogs Source: universalmccann 184 Million blogs world-wide 73% of internet users have read a blog 50% post comments

Common Blog Platforms

Why blogs are special Blog are designed around the idea of user pushing content As an example, Linkbacks allow cross-linking between blogs. More specifically, when blog A cites another blog B, a notification of the citation can be sent to B, which can then link back to blog A automatically.

TrackBack - a type of LinkBack TrackBack URL Auto discovery of TrackBack URL Trigger The URL of TrackBack capture script Resource Description Framework (RDF) Code on blog site extracts citations to other blogs Notification HTTP Post

TrackBack URL and Blog Comments

Trackback Post variables [title] => Title of the referencing blog entry [url] => http://www.mysite.com/page [excerpt] => Post excerpt... [blog_name] => Mysite blog

Problem Trackbacks are used to push spam do malevolent Search Engine Optimization One blog spam can reach thousand of users

How big is the problem? Source: Akismet.com Blog Spam

Honey Blog A blog acting as a potential target for spamming Instrumented our blog site and analyzed spams

Setup Hosted a real blog (dotclear) with a modified TrackBack mechanism Record TrackBacks Passive fingerprinting Sample the lure site

Activity 100000 Trackback Spams 75000 Number of Spams 50000 25000 Mar 1, 2007 Mar 18, 2007 Apr 4, 2007 Apr 21, 2007 0 Mar-Apr 2007 May 8, 2007 Jun 11, 2007 Jun 28, 2007 Jul 15, 2007 Aug 1, 2007 Aug 18, 2007 Sep 4, 2007 May-Jun 2007 May 25, 2007 Oct 25, 2007 Nov 11, 2007 Nov 28, 2007 Dec 15, 2007 Jan 1, 2008 Jan 18, 2008 Feb 4, 2008 July 2007-Apr 2008 July 2007-Apr 2008 Sep 21, 2007 Oct 8, 2007 Feb 21, 2008 Mar 9, 2008 Mar 26, 2008 Apr 12, 2008 Apr 29, 2008

Unique Spammer IPs 2800 Unique Spammer IPs 2100 Unique IPs 1400 700 0 Mar 1, 2007 Mar 18, 2007 Apr 4, 2007 Apr 21, 2007 May 8, 2007 May 25, 2007 Jun 28, 2007 Jul 15, 2007 Aug 1, 2007 Aug 18, 2007 Mar-Apr Mar-Apr May-Jun May-Jun 2007 2007 2007 2007 Jun 11, 2007 Sep 21, 2007 Oct 8, 2007 Oct 25, 2007 Nov 11, 2007 Sep 4, 2007 Nov 28, 2007 Dec 15, 2007 Jan 1, 2008 Jan 18, 2008 Feb 4, 2008 Feb 21, 2008 Mar 9, 2008 July 2007-Apr 2008 July 2007-Apr 2008 Mar 26, 2008 Apr 12, 2008 Apr 29, 2008

IP Geolocation Distribution 100 IP Geolocation Distribution 75 Percentage % 50 25 0 Mar 1, 2007 Mar 10, 2007 Mar-Apr 2007 May-Jun 2007 Mar 19, 2007 Mar 28, 2007 Apr 6, 2007 Apr 15, 2007 Apr 24, 2007 May 3, 2007 May 12, 2007 May 21, 2007 May 30, 2007 Jun 8, 2007 Russia USA Germany UK Russia USA Germany UK Jun 17, 2007 Jun 2007-Apr 2008 July 2007- Apr 2008

Max Uptime of Spamming IPs by Day 12000 Max Uptime of All Spamming IPs by Day 9000 Uptime in Hours 6000 3000 Jan 4, 2008 Jan 9, 2008 Jan 14, 2008 Jan 19, 2008 Jan 24, 2008 Jan 29, 2008 Feb 3, 2008 Feb 8, 2008 0 Feb 13, 2008 Feb 18, 2008 Feb 23, 2008 Feb 28, 2008 Mar 4, 2008 Mar 9, 2008 Mar 14, 2008 Mar 19, 2008 Mar 24, 2008 Mar 29, 2008 Apr 3, 2008 Apr 8, 2008 Apr 13, 2008 Apr 18, 2008 Apr 23, 2008 January January February March March April 2008 Apr 28, 2008

User Agents in Spamming 100 User Agents in Spamming 75 Percentage % 50 25 0 Mar-Apr May-Jun May-Jun Jul 2007-Apr 2008 July 2007-Apr 2008 2007 2007 2007 2007 Mar 1, 2007 Apr 1, 2007 May 1, 2007 Jun 1, 2007 Jul 1, 2007 Aug 1, 2007 Sep 1, 2007 Oct 1, 2007 Nov 1, 2007 Dec 1, 2007 Jan 1, 2008 Feb 1, 2008 Mar 1, 2008 Apr 1, 2008 WordPress/1.9 WordPress 1.9 WordPress/2.0 WordPress/2.1.2 WordPress 2.1.2 WordPress 2.1 IE 6 XP Firefox Opera

Trackback content Random keywords revolving around adult theme Blog URLs in the Trackback pings are of the form random-words.nx.cn

Trackback Post sample Apparent Bayesian poisoning against spam filters: [title] => Please teacher hentai pics [url] =>http://please-teacher-hentaipics.howdsl.nx.cn/index.html [excerpt] => pics Please teacher hentai pics... [blog_name] =>Please teacher hentai pics

Created using Wordle

Spam Workflow Servers submit Trackback spam Spam points to Social network site exploited as relay site obscufaction Relay site links to lure sites with purported adult content obscufaction Lure site badgers user to download fake video plugins hosted on malware site

Relay URL Www.nx.cn, a community hosting site at Ningxia province, PRC Exploited by attackers as relay The hosting site started to use CAPTCHA (some in Chinese) around May, 2008 We observed a corresponding drop of spam activities using them as relay

Behind the relay Lead to various sites selectedclipz.com, gogomovz.com (purported adult site) vidzwares.com (malware distribution site) Need an id in the url download.php?id=429

The Lure site

Whois Domain Name: GOGOMOVZ.COM Registrar: ONLINENIC, INC. Whois Server: whois.onlinenic.com Referral URL: http://www.onlinenic.com Name Server: NS1.GOGOMOVZ.COM Name Server: NS2.GOGOMOVZ.COM. Updated Date: 22-oct-2008 Creation Date: 22-oct-2008 Expiration Date: 22-oct-2009 Registrant:... ul Beketova 3 Nijnii Novgorod,n/a,RUSSIAN FEDERATION 603057

DNS analysis : related domains ns1.clipzsaloon.com ns1.clipztube.com ns1.freexxxmovz.com ns1.itunnelz.com ns1.vidzselector.com, and more...

Malware Binary flagged as TrojanDownloader:Win32/Zlob.gen!dll Trojan.Popuper.origin Downloader.Zlob.LI

TalkBack Designed a secure protocol: TalkBack Address the root of the problem: prevent spammers to post notifications Key ideas : Lightweight PKI Global rate limiting

Goals Sender authenticity Receiver authenticity Notification integrity Notification irrefutability

How it works Authority 1. Seed request 4. Talkback reporting Sender 2.Auto-Discovery 3. Talkback posting Receiver

Conclusion Linking between cloud sites can become a vehicle for spamming One such example is blog TrackBacks We did a 1 year study of a major blog spamming platform: 10 million spams analyzed Gained insight about TrackBack spam and spammers Provided us a basis to build better defense

Related work and alternative approaches TrackBack Validator [21] - Parsing sender page to find the link Reputation system IP Blacklisting Local rate limiting

Stanford Computer Security Lab Questions? Thank you!