Zeus Attack Charts and Targeting Domains Online

Similar documents
ONLINE BANKING FRAUD MITIGATION

TECHNICAL REPORT. An Analysis of Domain Silver, Inc..pl Domains

Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing

Cloud Security VS Cybercrime Economy: The Kaspersky Vision. Eugene Kaspersky Co-founder & CEO, Kaspersky Lab

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

SPAMMING BOTNETS: SIGNATURES AND CHARACTERISTICS

Where every interaction matters.

Property of Secure Network Technologies-Do Not Distribute or Post Without Written Permission-Copyrights and Trademark Apply

Large-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity

isheriff CLOUD SECURITY

Security A to Z the most important terms

Beyond the Hype: Advanced Persistent Threats

Information Security for Modern Enterprises

Operation Liberpy : Keyloggers and information theft in Latin America

Managing Web Security in an Increasingly Challenging Threat Landscape

Fighting Advanced Threats

[state of the internet] / SEO Attacks. Threat Advisory: Continuous Uptick in SEO Attacks

Security Challenges and Solutions for Higher Education. May 2011

The Impact of Cybercrime on Business

WHITEPAPER. Combating Cybercrime A Collective Global Response

Botnets: The dark side of cloud computing

LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains

Internet Banking Attacks. Karel Miko, CISA DCIT, a.s. (Prague, Czech Republic)

Blackhole Exploit Kit: A Spam Campaign, Not a Series of Individual Spam Runs AN IN-DEPTH ANALYSIS

INDUSTRY OVERVIEW: HEALTHCARE

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

The Information Security Problem

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Marble & MobileIron Mobile App Risk Mitigation

The effect of cybercrime on a Bank's finances

Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Figure 1: A screenshot of a known Zeus variant called Citadel

Targeted Intrusion Remediation: Lessons From The Front Lines. Jim Aldridge

INDUSTRY OVERVIEW: FINANCIAL

Reducing the Cost and Complexity of Web Vulnerability Management

Kaspersky Lab. Contents

Research Topics in the National Cyber Security Research Agenda

The thriving malware industry: Cybercrime made easy

KASPERSKY DDoS PROTECTION. Protecting your business against financial and reputational losses with Kaspersky DDoS Protection

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Innovations in Network Security

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Cyber security trends & strategy for business (digital?)

Digital Evidence and Threat Intelligence

MITB Grabbing Login Credentials

BEHIND THE SCENES OF A FAKE TOKEN MOBILE APP OPERATION

STATISTICS ON BOTNET-ASSISTED DDOS ATTACKS IN Q1 2015

CYBERSECURITY INESTIGATION AND ANALYSIS

CITADEL TROJAN OUTGROWING ITS ZEUS ORIGINS

Using big data analytics to identify malicious content: a case study on spam s

Advanced Persistent. From FUD to Facts. A Websense Brief By Patrick Murray, Senior Director of Product Management

Protect Your Business and Customers from Online Fraud

ZeuS: A Persistent Criminal Enterprise

The Hillstone and Trend Micro Joint Solution

Factoring Malware and Organized Crime in to Web Application Security

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

Countermeasures against Bots

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Adaptive Intelligent Firewall - der nächste Entwicklungssprung der NGFW. Jürgen Seitz Systems Engineering Manager

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

Policies and Practices on Network Security of MIIT

ONLINE RECONNAISSANCE

LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages

10 Things Every Web Application Firewall Should Provide Share this ebook

Resilient Botnet Command and Control with Tor

Exploiting Fundamental Weaknesses in Command and Control (C&C) Panels


With Great Power comes Great Responsibility: Managing Privileged Users

RETHINKING ORC: NRF S CYBER SECURITY EFFORTS. OMG Cross Domain Threat & Risk Information Exchange Day, March 23, 2015

Session 30. IT Security: Threats, Vulnerabilities and Countermeasures. Phillip Loranger, DoED CISO Robert Ingwalson, FSA CISO

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Commissioned Study. SURVEY: Web Threats Expose Businesses to Data Loss

How To Protect Yourself From A Dos/Ddos Attack

A General-purpose Laboratory for Large-scale Botnet Experiments

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

of firms with remote users say Web-borne attacks impacted company financials.

Presented By: Corporate Security Information Security Treasury Management

FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

BioCatch Fraud Detection CHECKLIST. 6 Use Cases Solved with Behavioral Biometrics Technology

Malware & Botnets. Botnets

How To Get Rid Of A Phish Locker On A Computer (For A Bank)

ACCOUNT TAKEOVER TO IDENTITY TAKEOVER

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

The Cloud App Visibility Blindspot

Malicious Network Traffic Analysis

Malware B-Z: Inside the Threat From Blackhole to ZeroAccess

Fast Flux Hosting and DNS ICANN SSAC

Advanced Security Methods for efraud and Messaging

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

An Efficient Methodology for Detecting Spam Using Spot System

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

Fraud Threat Intelligence

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Global IT Security Risks

Data Center security trends

Transcription:

Online Banking Fraud: Extracting intelligence from Zeus configuration files Samaneh Tajalizadehkhoob, Hadi Asghari, Carlos Gañán, Michel van Eeten Delft University of Technology 1

The online banking fraud problem Fraud statistics for the Single European Payment area are around 800 million (European Central Bank, 2014) Different banks with different properties are targeted around the world No patterns have been found till now Little information is published about the targeted domains Even when the information exists, it is incomplete and under/over counted 2

3

Methodology Fox-IT provided access to 11,000 records of Zeus financial malware configuration files from 2009 to 2013Q1. The file contains instructions on: which target to attack what user data to gather how to do so 4

Questions What type of domains are targeted via ZeuS? Are some financial services targeted more often than other? Why? How are new targets identified over time? What is the impact on attack volume of attack code becoming more easily availabe over time? How quickly does attack code (web injects) develop over time? 5

Findings - targeted domains Over 4 years, we saw 2,412 unique domains targeted via14,870 unique URLs Located in 92 countries From 2,131 unique botnets (based on different encrypted command and control channels) Over 74% of the targets are financial service providers 6

Findings - attack persistency 7

Is target popularity related to its size? There is a minor, but significant relationship between the size of a domain (measured by Alexa ranking) and the persistency of attacks 8

Is target popularity related to its size? United States: out of around 6,500 active financial institutions, only 175 have been targeted Almost all of the larger banks (48 of the top 50) are attacked Size acts as a threshold for being attacked; it does not predict attack intensity 9

Number of active botnets Zeus source code leakage Figure 12 - Entrance of new Zeus attackers (botnet keys) per month Looking at the country of the attacked domains also confirms the pattern. Figure 13 shows the overlap 10

Trial of new targets The lack of growth in the population of Zeus targets resembles the phenomenon discussed by Florêncio & Herley (2013): the majority of users go unharmed each year, despite the claims of security On average, 601 domains each month become targets of Zeus attacks experts that many attacks are getting cheaper and easier. One of their explanations is victim diversity: Out of these on average, 112 of these are new domains each month if the fraction of all users who succumb to a certain attack is too small then the entire attack is There is a stable ceiling in the number of attacked domains, as well as in rendered unprofitable. This is especially true when the gains per victim are unclear. 8 the trial and error or new targets Figure 11- Trial of new Zeus targeted domains per month Online (2009-2013Q1) Banking Fraud and Target Selection by Cybercriminals 11

Trial of new targets Figure 12 - Entrance of new Zeus attackers (botnet keys) per month Looking at the country of the attacked domains also confirms the pattern. Figure 13 sh between the targeted countries across four years (2009-2012). Out of the total 92 atta Seeking new seven targets were across only attacked a larger in 2009, area and seventeen only in 2012. This shift in the variety In 2012, 17 new countries were targeted, but 18 countries from the countries, despite the overall stability in the size of the attacks, points to a trial and err previous years were no longer being attacked finite resources and players; i.e., the attacks are not spreading like mushrooms. Figure 13 - Venn diagram of location of attacked domains accross the years 8 Attack code development 12

Summary Not every Financial Service Provider is equally popular among criminals Size is a threshold for getting attacked, but does not predict the intensity Attack persistence varies widely. Half the domains are targeted briefly, mostly likely in search of new targets A ceiling exists in the overall number of domains simultaneously attacked, even after the ZeuS code leak 13

Summary Attacks to the same URL are more than 90% similar, no matter the length of the inject; this suggests code sharing, stealing or selling (inject-code-as-a-service) among criminals; Attacks (and defense!) is less dynamic than often presumed The underground market for bots and malware may have lower economic entry barriers for criminals and reduced costs in the value chain of attacks, but it has not increased attack volume (number of botnets) or the number of targets Attack ceiling suggests other bottlenecks in the criminal value chain, such as in cash out operations and mule recruitment Defense should focus on these bottlenecks, not on reducing abundant attacker resources (i.e., bots, malware and injects) 14

Question? 15

Inject code development over time The data contains 1.1m target URLs with inject codes. On average, each inject code is repeated 27 times; 43% repeated over 1,000 times, and just 1% appears once! Substantial amount of inject code sees no or very little development over time High level of code re-use suggests sharing, stealing or selling code across attackers 16

Inject Code Size vs. Repetition 17

Next steps Map security properties of attacked services (e.g., authentication mechanism) Study interaction among attack and defense (e.g., deterrence, waterbed effect?) Statistically model factors that determine fraud levels in countries Identify most cost-effective countermeasures 18