Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

Similar documents
Innovations in Network Security

ENEE 757 CMSC 818V. Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

CRYPTUS DIPLOMA IN IT SECURITY

CS 356 Lecture 9 Malicious Code. Spring 2013

Information Security Threat Trends

Malicious Network Traffic Analysis

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

Property of Secure Network Technologies-Do Not Distribute or Post Without Written Permission-Copyrights and Trademark Apply

Detailed Description about course module wise:

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Network Incident Report

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

Malware. Björn Victor 1 Feb [Based on Stallings&Brown]

Computer Security DD2395

A Critical Investigation of Botnet

6. ecommerce Security and Payment Systems. Alexander Nikov. Teaching Objectives. Video: Online Banking, Is It Secure?

Security A to Z the most important terms

Countermeasures against Bots

Protecting against Mobile Attacks

The anatomy of an online banking fraud

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Module 5: Analytical Writing

WEB ATTACKS AND COUNTERMEASURES

MITB Grabbing Login Credentials

FORBIDDEN - Ethical Hacking Workshop Duration

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Cloud Services Prevent Zero-day and Targeted Attacks

Stopping zombies, botnets and other - and web-borne threats

13 Ways Through A Firewall

Network Security and the Small Business

Ethical Hacking Course Layout

Using big data analytics to identify malicious content: a case study on spam s

Threat Events: Software Attacks (cont.)

Loophole+ with Ethical Hacking and Penetration Testing

BotNets- Cyber Torrirism

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Tespok Kenya icsirt: Enterprise Cyber Threat Attack Targets Report

Resilient Botnet Command and Control with Tor

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

ACS-3921/ Computer Security And Privacy. Lecture Note 5 October 7 th 2015 Chapter 5 Database and Cloud Security

Security Evaluation CLX.Sentinel

Symantec enterprise security. Symantec Internet Security Threat Report April An important note about these statistics.

Network Attacks. Common Network Attacks and Exploits

3 Marketing Security Risks. How to combat the threats to the security of your Marketing Database

The Key to Secure Online Financial Transactions

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

CERT Polska operates within the framework of the Research and Academic Computer Network CERT POLSKA REPORT

Secure Your Mobile Workplace

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

Unknown threats in Sweden. Study publication August 27, 2014

CSE509 System Security

IBM Protocol Analysis Module

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

CEH Version8 Course Outline

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Advanced Persistent Threat

CERT-GOV-GE Activities & International Partnerships

About Botnet, and the influence that Botnet gives to broadband ISP

Melde- und Analysestelle Informationssicherung MELANI Torpig/Mebroot Reverse Code Engineering (RCE)

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

The HoneyNet Project Scan Of The Month Scan 27

The Hillstone and Trend Micro Joint Solution

A TASTE OF HTTP BOTNETS

1949 Self-reproducing cellular automata Core Wars

Course Content: Session 1. Ethics & Hacking

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

Firewall and UTM Solutions Guide

Operation Liberpy : Keyloggers and information theft in Latin America

Cyber Attack Trend and Botnet

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Botnets Die Hard Owned and Operated

Factoring Malware and Organized Crime in to Web Application Security

Knowlton Project Analysis Study: Examining Trends in Cyber Security: Merging Network Defense and Analysis

Transcription:

Overview Common Internet Threats Tom Chothia Computer Security, Lecture 19 Phishing Sites Trojans, Worms, Viruses, Drive-bydownloads Net Fast Flux Domain Flux Infiltration of a Net Underground economy. APTs Phishing Sites Phishers setting up fake look a like sites. Send spam asking user to connect. Redirection by other malware. http://www.phishtank.com Spear Phishing / Whaling Mass Phishing has a very poor success rate. Targeting a phishing attack takes more time but works better. E.g. Send fake e-mail pretending to be a boss s secretary. Send fake CVs/pdf malware to HR recruitment Viruses & Worms A virus is a self replicating program that requires interaction to spread e.g. autorun.inf on a USB stick. opening a malware pdf Worms are self replicating program than can spread on their own. E.g. Morris Worm, SQL Slammer, Conficker The term Virus is often miss-used. Virus: Pentagon Attack Joel Brenner (ex-nsa) alleges that the Pentagon was attack via USB drives left in the car park. Employes found, them took them inside and plugged them in. autorun.inf ran malware. Pentagon superglued up all the USB ports. (USB drives banned until 2011)

Trojans Trojans are malware that need a user to download and run them. Often malware pretends to be keygens or anti-virus. Most attacks against Apple have been Trojans. Drive-by-download Drive-by-downloads are malware infected webpages. Viewing the page with a vulnerable browser and OS will get you infected. Often JavaScript based on buffer overflows in browser plugins. Attacks often via XSS attacks. RootKit Malware installed on Machines Typically: Gives repeated, root access to machine. Often installs other payloads Hard to detect E.g. Mebroot which alters the Master Boot Record of a machine to load before the OS. Zero Day A zero day attack, is an attack that is: previously unknown, no current defense. i.e. you have zero days to patch your system Zero days are very rare, and valuable to both attacks and anti-virus companies, security contractors. Man in the Browser Attacks Rootkits can be set to attack the browser. In this case all certificates can be faked. Anything that looks like a credit card no. or bank log in can be collected. TLS and web defense can t stop this.

nets net Command and Control Most attackers are in it to make money. A single credit card number or spam e- mail isn t worth very much. C&C 131.253.18.12 Networks of hacked computers (bots) are organised into large networks (botnets). Denial-of-service attack Fast Flux With this many computers it s easy to over load some web site. Easiest type of attack uses (rents) a botnet to perform a distributed denial-ofservice attack. Often used to blackmail companies, or for political reasons. Instead of using a IP address bots look for a URL. To stop the IPs getting blocked new IP addresses are registered every few mins. Makes it impossible to go after the hosts. net Command and Control Zeus C&C www.ealo.net Zeus is one of the large botnets. Uses Fast Flux Many C&C servers Spreads mainly via Trojans. Man-in-the-browser (form grabbing) Sends Spam, Phishing. Code is available for sale on black markets.

Domain Flux s continuously generates new URLs. E.g. based on a hash of the date and a secret value. masters know and register the URL in advance. Even if all C&C is shut down, bots will switch to a new URL in a few days. We can try to block all future URLs (hard) Conflicker Computer Worm that installs a botnet more than 10 million infections. first version would not infect computers with Ukrainian keyboard layout. spreads NetBIOS buffer overflows and guessing admin passwords. uses Domain Flux and P2P Largely contained by security researchers who have blocked tens of thousands of domain names. P2P More recent malware sets itself up as a P2P network. Malware connects to C&C and other bots. If the main C&C goes down botmasters can connect to any bot and update them all with a new C&C. Torpig/Mebroot Mebroot is a root kit, that writes itself into the Master Boot Record. Executes before OS loads Very hard to detect. Spreads via drive by downloads. Downloads and installs other payloads. Torpig is a botnet downloaded and installed by Mebroot. Torpig Marco Cova and colleagues reverse engineered Torpig s domain flux algorithm. Looking ahead they noticed that some Torpig URLs weren't registered. So they decided to register the addresses themselves. The Take Over. On the day of the URL switch 180000 infected computers started reporting to them. Torpig used simple XOR encryption of data, which was cracked. They had complete control of the Torpig botnet (but not Mebroot).

What they found. It took 10 days for Mebroot to replace Torpig with a new payload. For 10-days they had complete control of the botnet and saw all data. Form Data ~8000 bank/paypal account logins. 1660 credit card numbers & ccv At $0.10 $25 per card, $10 $1,000 per account this = $83K to $8.3M. Torpig also opened a proxy, which could be used by attackers. Underground Markets Roles 1. Attacker that steals the data (e.g. via botnet s, phishing etc). 2. Cashiers: take credit cards and bank accounts and removes cash. 3. Drops: people who provide a place to send goods. 4. Service sellers: bot masters rent botnets for spam, DDoS, phishing. 5. Based on web forums and IRC Market places Internet Relay Channel (IRC) Anyone can connect and live chat Web forums, less common now. Tor Hidden services, growing fast Although attacked by FBI in the last few months. Bitcoin electronic current Based on partial SHA hash collisions: If you can find a partial collision you have minted a bitcoin. Passed from one person to another by signing an entry in a public database. Only the person with the signing key can pass it on. Payment other methods Webmoney online payment based in Russia Western Union money transfer Closed down: E-Gold another digital currency: trading shut down in 2009 due to crime Liberty Reserve based in Costa Rica, taken down in May.

Typical Transaction 1: Hacker steals 1000 fullz (credit card number, CVV, name, address, etc.) Sells them on forum for 10 bitcoins ( 4300) Buyer sells then in groups of 20 to cashiers for 300 in Webmoney Typical Transaction 1: Cashiers meets drops in Internet chat rooms who agree to receive goods. Cashiers orders goods online and has them sent to the drops Drops sell goods and send half the money to the Cashiers via Western Union. Typical Transaction 2: master offers network for DDoS attack at 200 a day. Attacker hires the botnet to attack small company, bring down their site. Attacker anonymously contacts the company and asks for 10,000 in bitcoins to stop. Less Common Attacks: Advanced Persistent Threats APT are attackers that will put a lot of time and effort into attacking a target. Well funded, technically advanced. Common techniques include: Very carefully crafted phish attacks Waterholding: Drive-by-downloads on website likely to be used by public. Zero days Reading The Symantec Internet Security Threat Report, 2013. what happened in cyber security last year Marco et al. s paper on Torpig. h linked to from the lecture website. Conclusion Phishing Sites Trojans, Worms, Viruses, Drive-bydownloads Net Fast Flux Domain Flux Infiltration of a Net Underground economy. APTs