Resilient Botnet Command and Control with Tor



Similar documents
Running the Tor client on Mac OS X

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

Proxies. Chapter 4. Network & Security Gildas Avoine

Uncover security risks on your enterprise network

UNMASKCONTENT: THE CASE STUDY

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

Multifaceted Approach to Understanding the Botnet Phenomenon

Introduction to Computer Security Benoit Donnet Academic Year

Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team

Seminar Computer Security

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

Detecting peer-to-peer botnets

Operation Liberpy : Keyloggers and information theft in Latin America

Intro to Firewalls. Summary

HIDING THE NETWORK BEHIND THE NETWORK. BOTNET PROXY BUSINESS MODEL Alexandru Maximciuc, Cristina Vatamanu & Razvan Benchea Bitdefender, Romania

Proxy Server, Network Address Translator, Firewall. Proxy Server

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router

The Hillstone and Trend Micro Joint Solution

Internet Privacy Options

Lessons learned: Sinkholing the Zeroaccess botnet. Ross Gibb. Attack Investigations Team Symantec Security Response.

VIRUS TRACKER CHALLENGES OF RUNNING A LARGE SCALE SINKHOLE OPERATION

A Domain Name for your PC

F-Secure Internet Gatekeeper Virtual Appliance

Web Content Filtering. Why Sorting Solutions? Why ST BERNARD?

KASPERSKY DDoS PROTECTION. Protecting your business against financial and reputational losses with Kaspersky DDoS Protection

Protecting the Infrastructure: Symantec Web Gateway

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

ENEE 757 CMSC 818V. Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park

Implementing Reverse Proxy Using Squid. Prepared By Visolve Squid Team

IDS and Penetration Testing Lab IIIa

CMPT 471 Networking II

Troubleshooting / FAQ

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

CSCE 465 Computer & Network Security

Best Practices for Controlling Skype within the Enterprise. Whitepaper

Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

ExamPDF. Higher Quality,Better service!

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

10 Things Every Web Application Firewall Should Provide Share this ebook

F-Secure Internet Gatekeeper

Volume SYSLOG JUNCTION. User s Guide. User s Guide

BotNets- Cyber Torrirism

About Botnet, and the influence that Botnet gives to broadband ISP

Firewalls CSCI 454/554

Load Balancing & High Availability

FTP e TFTP. File transfer protocols PSA1

Best Practices for Controlling Skype within the Enterprise > White Paper

Managing Web Security in an Increasingly Challenging Threat Landscape

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

Introduction: 1. Daily 360 Website Scanning for Malware

Debugging With Netalyzr

Chapter 9 Firewalls and Intrusion Prevention Systems

Whose IP Is It Anyways: Tales of IP Reputation Failures

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

Zscaler Internet Security Frequently Asked Questions

Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015

Barracuda Web Filter Demo Guide Version 3.3 GETTING STARTED

Security Evaluation CLX.Sentinel

AccessEnforcer. HTTPS web filter overview

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

CENSURFRIDNS a.k.a. UNCENSOREDDNS. Thomas Steen Rasmussen

Malware in the clouds. Building the Undetectable Bot

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

The F5 Intelligent DNS Scale Reference Architecture.

Technical Glossary from Frontier

CITADEL TROJAN OUTGROWING ITS ZEUS ORIGINS

ThreatSTOP Technology Overview

NEFSIS DEDICATED SERVER

FAQs for Oracle iplanet Proxy Server 4.0

Web Hosting: Pipeline Program Technical Self Study Guide

Lab 1: Security Audit

A perspective to incident response or another set of recommendations for malware authors

Configuration Example

HTG XROADS NETWORKS. Network Appliance How To Guide: EdgeDNS. How To Guide

The Underground Economy of the Pay-Per-Install (PPI) Business

Hosted CanIt. Roaring Penguin Software Inc. 26 April 2011

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Adaptive Intelligent Firewall - der nächste Entwicklungssprung der NGFW. Jürgen Seitz Systems Engineering Manager

A Critical Investigation of Botnet

Load Balancing Web Proxies Load Balancing Web Filters Load Balancing Web Gateways. Deployment Guide

Network Defense Tools

Firewall Design Principles Firewall Characteristics Types of Firewalls

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

WHEN THE HUNTER BECOMES THE HUNTED HUNTING DOWN BOTNETS USING NETWORK TRAFFIC ANALYSIS

Transcription:

Resilient Botnet Command and Control with Tor Dennis Brown July 2010 10/14/10 1

Who am I? Dennis Brown Security Researcher for Tenable Network Solutions Toorcon 10, 11 Defcon 18 PaulDotCom Podcast Rhode Island's Defcon Group DC401 Disclaimer Not affiliated with the Tor project

Tor is a wonderful tool! Most people that use it aren't malicious Anonymity becoming increasingly important Can't say enough good things about it! Tor can be abused! Just like most security tools Anonymity works for good and evil I Really Like Tor!

Overview Focus on botnet command and control Case studies using Zeus and IRC bots Techniques to use Tor to anonymize servers Primary focus on Hidden Services Goal of keeping servers up, and botnets alive Examine advantages/disadvantages to methods Other options Tor provides to botnets

Why is this important? Malware using Tor has been discussed for years If it exists, it is not being exposed publicly/at all Potential for devastating impact Technology widely available Trivial to deploy (in most cases) Minimal work to add anonymity Safeguards can be taken to detect this activity Varying levels of complexity

Doesn't it stink when your botnet gets shut down? Lots of time lost Proper planning Setting up servers Building the bot Crypting, binding, etc. Spreading Lots of money lost Upfront costs may be wasted No communication with bots means no money!

How do botnets get taken down? Hosting provider de-peered Example: McColo, Troyak Server hosting botnet cleans up/kicks off Public IRC servers, free web hosting DNS Revoked Some jerk took it over IP of C&C server banned Like if your ISP shuts down your cable modem...

Seriously, people do that. http://hackforums.net/showthread.php?tid=112221

Tor to the Rescue!

What is a Hidden Service? Added to Tor in 2004 Allows user to run a server anonymously Resolves to a.onion domain Only routable through Tor Hidden Services Works behind NAT, Firewalls, etc. No need to expose services to the network We can use this to our advantage to stay hidden Need to watch out for leaking identifying data!

Hidden Services Technical details: https://www.torproject.org/hidden-services.html.en A hidden service advertises to Tor Uses a public key, communicates with relays Act as induction points to route traffic properly Simple configuration In torrc: Locating Hidden Services - Overlier and Syverson

Zeus/Zbot/Wnspoem The #1 Crimeware toolkit in use today Hooks into various APIs to capture data Not a single botnet Malware creation kit Primarially focused on stealing banking info Can be configured to steal anything Configurable via webinjects

Zeus Monoculture

Zeus Configuration File

So where does Tor come in? Zeus on its own doesn't support proxies Can't use Tor directly Only allows for valid URLs Need some sort of intemediary Fortunately, there's a free solution!

Tor2Web Tor2Web is a proxy to redirect.onion web traffic Not a part of Tor; 3 rd party tool Web redirection service Scripts to set up your own proxy! Command and Control happens via Tor2Web Configure bot to connect to http://vlnv2m3jhiutnhp2.tor2web.com/ Bot connects to Tor2Web, and is then redirected to Hidden Service via.onion address

Not very hard to do! Simple script to reformat requests via Squid From Tor2Web.com

Live Demo Failure Incoming Zeus 1.2.4.1 (2009 vintage) C&C Server Ubuntu Server LAMP package no custom config Tor running a hidden service for port 80 Windows XP SP2 Build Zeus binary to go to a Tor2Web URL Execute Zeus binary If all goes well, should see a bot appear on the CP! Here we go...

Strengths and Weaknesses Strengths Hides the C&C server Nearly impossible to track down C&C server virtually immune to takedown Weaknesses Easy to filter Tor2Web traffic Who knows what Tor2Web is logging? Running your own Tor2Web proxy is better Still a single point of failure

Better Solution! Build proxy support into the bot! Load Tor onto the host Some way to resolve.onion domains Privoxy, Polipo, mapaddress Access.onion domains directly Will require SOCKS 5 support Not aware of any bots that support proxies

IRC Bot Socks 5 support Connecting to mapaddress 10.40.40.200 Joins #EvilHackerChannel Things to note IP address of bot Country bot is reporting to be from Demo #2

Strengths Traffic directly from host to server via Tor No middleman as before Works for more than just HTTP! Very hard to stop Block Tor traffic? Consider Tor a virus? Weaknesses May require code to be added Not accessible to kit users Need to load Tor on the system, configure and run Traffic pattern changes Great job!

Private Tor Networks When you want to keep it even more secret Stay off the public Tor network Great for the paranoid Can be faster than the public Tor network Track bandwidth of infected hosts High bandwidth hosts act as relays Blocking Exit nodes won't be published Smaller network will be easier to discover/block

(Not So) Stupid Hidden Service Tricks

Public Keys Tor creates a private key when hidden services are enabled Does so when no key is available Added to the HiddenServiceDir If no key is available, a new key is created Backups can be redistributed Keys can be generated up-front What can we do with this?

Stay Alive! Takedown Resilience C&C server can be easily moved Load public key on new server Maintain communication with bots Potential to lose data returned to C&C server Small price to pay Issue multiple.onion domains for C&C Give the appearance that the botnet is larger than it is! Frequent domain swapping

Hidden Services on Bots If bots are running Tor Run hidden services locally! Zeus Back Connect model RDP/VNC Socks Proxy Web server Have bots report.onion domain to C&C Model update distribution after P2P botnets Tell bots of some.onion domains NAT is no concern!

Since they're all running Tor... How about turning them all into relays? Increase bandwidth of Tor overall Could have positive benefits to your botnet How about turning them all into exit nodes? Control a majority of available exit nodes? Probably not a good idea! Expose identities of infected hosts Other Thoughts

Conclusion Trivial to control existing HTTP bots via Tor With some risk Possible to get much more protection easily Add SOCKS support to bot clients Keeping a C&C server up is easier Controlling bots with hidden services has benefits Defenses do exist, but they may not be easy

Thanks for attending! Q&A Contact Info dennis.brown@gmail.com Twitter: br0wnd