About Botnet, and the influence that Botnet gives to broadband ISP



Similar documents
Countermeasures against Bots

BotNets- Cyber Torrirism

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL

Network Incident Report

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Revealing Botnets Using Network Traffic Statistics

Symantec enterprise security. Symantec Internet Security Threat Report April An important note about these statistics.

Information Security Threat Trends

Seminar Computer Security

The HoneyNet Project Scan Of The Month Scan 27

The anatomy of an online banking fraud

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Phone Fax

DDoS Attacks Can Take Down Your Online Services

Security A to Z the most important terms

Network and Incident monitoring

Current counter-measures and responses by CERTs

Current Threat Scenario and Recent Attack Trends

Countermeasures against Spyware

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno

2010 Carnegie Mellon University. Malware and Malicious Traffic

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

A Critical Investigation of Botnet

Detecting peer-to-peer botnets

Intrusion Forecasting Framework for Early Warning System against Cyber Attack

ENEE 757 CMSC 818V. Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

PC Security and Maintenance

Mobile Malware Network View. Kevin McNamee : Alcatel-Lucent

Multifaceted Approach to Understanding the Botnet Phenomenon

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Promoting Network Security (A Service Provider Perspective)

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

AT&T Real-Time Network Security Overview

Botnet Detection by Abnormal IRC Traffic Analysis

Test Case - Privatefirewall 5.0, Intrusion and Malware Defense

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

UNMASKCONTENT: THE CASE STUDY

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

PEER-TO-PEER NETWORK

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

How To Mitigate A Ddos Attack

How To Protect A Dns Authority Server From A Flood Attack

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

Preventing your Network from Being Abused by Spammers

INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS

Protecting the Infrastructure: Symantec Web Gateway

Denial of Service Attacks

Stopping zombies, botnets and other - and web-borne threats

CS Network Security: Botnets

Uncover security risks on your enterprise network

Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc

TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING

HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

SECURING APACHE : DOS & DDOS ATTACKS - II

Security Incidents And Trends In Croatia. Domagoj Klasić

MITB Grabbing Login Credentials

WEB ATTACKS AND COUNTERMEASURES

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

CERT-GOV-GE Activities & International Partnerships

Denial of Service (DoS)

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

How To Protect Your Network From Attack From A Hacker On A University Server

Secure Your Mobile Workplace

Network Service, Systems and Data Communications Monitoring Policy

Arbor s Solution for ISP

Firewall and UTM Solutions Guide

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

Tips to help you stay safe online

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

The Environment Surrounding DNS. 3.1 The Latest DNS Trends. 3. Technology Trends

CALNET 3 Category 7 Network Based Management Security. Table of Contents

Codes of Connection for Devices Connected to Newcastle University ICT Network

CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency

Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team

Transcription:

About net, and the influence that net gives to broadband ISP Masaru AKAI BB Technology / SBB-SIRT

Agenda Who are we? What is net? About Telecom-ISAC-Japan Analyzing code How does net work? BB Technology Corp. 2

Who are we? Now I am in a BB Technology 1. Known as Yahoo! BB in Japan over 5,000,000 subscribers ADSL service in Japan. 2. We service BB Phone VoIP Service over 4,800,000 subscribers 3. We service BBTV Multicast Broad casting and Video on Demand Services 4. We service BB Mobile Point HotSpot(802.11b/11Mbps) service 5. We service Softbank Mobile Former Vodafone Japan over 15,000,000 subscribers BB Technology Corp. 3

What is? A bot is common parlance on the Internet for a software program that is a software agent. A bot interacts with other network services intended for people as if it were a person. One typical use of bots is to gather information. The term is derived from the word "robot," reflecting the autonomous character in the "virtual robot"-ness of the concept. The most common bots are those that covertly install themselves on people's computers for malicious purposes, and that have been described as remote attack tools. http://en.wikipedia.org/wiki/internet_bot BB Technology Corp. 4

What is net? net is a jargon term for a collection of software robots, or bots, which run autonomously. This can also refer to the network of computers using distributed computing software. While the term botnet can be used to refer to any group of bots, such as IRC bots, the word is generally used to refer to a collection of compromised machines running programs, usually referred to as worms, Trojan horses, or backdoors, under a common command and control infrastructure. http://en.wikipedia.org/wiki/net BB Technology Corp. 5

Japanese carriers fight against net A company s web site regularly received the DDoS attack by Virus software. They tried to conceal appearance of Web server from the world of DNS, and to ward off attack. However, unexpected and a serious side effect were caused through this medium. A large load was caused in the DNS server of Internet Service BB Technology Provider. Corp. 6

Japanese carriers fight against net But the Web server of A company was not able to be retrieved with DNS, infected PC with Virus software was not lost. Infection PC continuously generated a large amount of DNS query, and it became the result of several usual times the load hanging to the DNS server on ISP sides by the condition of making an error of it and returning. Telecom-ISAC Japan decided to take contacting in A company, and to hit the action of the problem jointly. Since this problem, Telecom-ISAC-Japan fight against net etc. BB Technology Corp. 7

What is Telecom-ISAC-Japan? BB Technology Corp. 8

Telecom-ISAC Japan *Telecom-ISAC Japan must be managed as an independent and reliable organization. *We collect, share, analyze, and provide information on Incidents through cooperation and coordination among Members. *Telecom-ISAC Japan takes immediate actions or preventive measures against Incidents to minimize the effect on Members telecommunication services and other important infrastructures. Source X Source Y Source Z Threats Analysis Storing Subject for protection Incidents Collection of information Immediate actions Telecom-ISAC Japan Preventive measures Collection and provision of information Contribution to the industry security Member A Member B Member C Incidents Threats 9

Overview of Telecom-ISAC Japan General user Member E-mail, fax, etc. Portal site Security information Links What s new Events information Glossary For members Vulnerability info Industry info Technical info Delivery of urgent information Telecom-ISAC Japan 1. Provision of vulnerability and alerts information 2. Operation of a portal site (Provision of general security information, etc) 3. Incident Collecting Systems * Incident handling system * Wide-area monitoring system 4. Construction and operation of Analysis Center and ISAC Operations Center 5. Cooperation and coordination with other organizations (JPCERT, NIRT, etc.) 6. Establishment of technical forum Information Management on Wide-area monitoring system Information Management on Incident Handling Database of vulnerability and alerts information Information Management on Controls and Analyses Function of information collection National Incident Response Team E-mail, fax, etc. NIRT Members Sensors Domestic related sites (JPCERT, IPA, etc.) Foreign related sites (CERT, ISAC, etc.) 10

Analyzing code How does net work?

net investigation of actual conditions result Observation record of net The majority of subspecies of cannot be detected even with the latest pattern file. One person in 40-50 Internet users is infected with. When unmeasured PC connect to the net, it is infected in 4 minutes. The bandwidth being occupied by is several Gbps in Japan.

net investigation of actual conditions result Breeding record of net Wild is obtained. Change to livestock to My (Construction of net for investigation environment) The art was trained.(ability measurement examination) Check Action, Power and Ability Is there a method of exterminating net? 13

Operation My net Building

Environment for constructed net investigation IRC-1 IRC-2 Web DNS Herder Mail Spammer Fake Internet Target host 15

Download Source code of 16

Parameters of bot source code Set item concerning IRC Server IRC Server s IPAddress, Service port Backup IRC Server s IPAddress, Service port Herder s Auth Password IRC Server connection password IRC Channel Name, JOIN Password Setting concerning operation of bot Check of TOPICCMD etc. 17

Connect IRC Server as HERDER HERDER s name is foo 18

Bury bot and execution IRC-1 IRC-2 Web DNS 88888888 Herder Mail Spammer Fake Internet Target host 19

expands infection, net is constructed. Herder Spammer IRC-1 IRC-2 Web DNS Fake Internet When infected, does the infection activity to adjoin IP addresses automatically. Mail The main body program is downloaded when succeeding in infection and it completes making. Target host 20

Complete to build My net s IP logging IRC-1 IRC-2 Web DNS Herder Mail Spammer Fake Internet Target host 21

Complete to build my net 22

My net Ability investigation

Investigation result of Source code(agobot Agobot) Circulation of source Auth/Encryption polymorphic BOT Generator IRC Anti AntiVirus Version up Original channel Anti Debugger/VM Maintenance Control Self defense HERDER Can change anytime BOT Windows Linux Information gathering Account FTP, IRC, PAYPAL AOL connection with vulnerable Clients E-Mail, Product Key Infection activity Using vulnerability Using Network sharing Using Virus Attack DDoS Exploited PCs SPAM Relay 24

Investigation of Attack function (Ability)

SPAM Mail Sending IRC-1 IRC-2 Web DNS Spammer Mail Herder Ramdom/tcp 25/tcp Mail Spammer Fake Internet Target host 26

DDoS Attack IRC-1 IRC-2 Web DNS Herder Target host Spammer Fake Internet 27

Investigation of net operation

Recovery of My net Completed ÜIRC-1 IRC-2 Web DNS Herder Mail Spammer Fake Internet Target host 29

Herder Form of use of IRC server IRC-1 IRC-2 IRC-3 IRC-4 Control channel Management channel Fake Internet 30

Conclusion net is GREAT system. We should also deal seriously because cracker is serious. It is serious as the information leakage tool. doesn't notice the fact that information flows out and an infected fact. There is no specific medicine. It is need to correct vulnerability as the Internet system. (vulnerable PCs & Servers) infected PC C&C servers Download servers HERDER 31

Situation of BB Technology I cannot talk many of things from the viewpoint of the information protection... These data are on site person only. BB Technology Corp. 32

Are you ready? Hereafter, broadband network will advance in most countries. At that time, can you defend the users from net and other Malware? Keep secure (Routers, Servers, etc.) Source address validation ACL (Bogon Filter, etc.) urpf, etc. Create security community BB Technology Corp. 33

Q&A BB Technology Corp. 34

Thank you! About net, and the influence that net gives to broadband ISP Masaru AKAI makai@bb.softbank.co.jp SBBSIRT BB Technology Corp. BB Technology Corp. 35