BotNets- Cyber Torrirism



Similar documents
Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

About Botnet, and the influence that Botnet gives to broadband ISP

Seminar Computer Security

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Detecting peer-to-peer botnets

Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team

Symantec enterprise security. Symantec Internet Security Threat Report April An important note about these statistics.

DDos. Distributed Denial of Service Attacks. by Mark Schuchter

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

HACKING RELOADED. Hacken IS simple! Christian H. Gresser

Network attack and defense

A Critical Investigation of Botnet

ENEE 757 CMSC 818V. Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park

Information Security Threat Trends

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Computer System Security Updates

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

Countermeasures against Bots

DDoS Attacks Can Take Down Your Online Services

Risk Assessment and Cloud Strategy Development: Getting it Right this Time!

Detecting P2P-Controlled Bots on the Host

The Leading Provider of Endpoint Security Solutions

BOTs: Cyber-zombies. Tom Kellermann, CISM World Bank Treasury Security Team July 2004

Top tips for improved network security

SECURING APACHE : DOS & DDOS ATTACKS - II

Revealing Botnets Using Network Traffic Statistics

PEER-TO-PEER NETWORK

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Current Threat Scenario and Recent Attack Trends

Security Business Review

Implementation of Botcatch for Identifying Bot Infected Hosts

Spyware. Summary. Overview of Spyware. Who Is Spying?

TLP WHITE. Denial of service attacks: what you need to know

Beyond the Noise: More Complex Issues with Incident Response

Spyware: Securing gateway and endpoint against data theft

Why to talk about Botnets

The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report:

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Security A to Z the most important terms

Multifaceted Approach to Understanding the Botnet Phenomenon

Protection for Mac and Linux computers: genuine need or nice to have?

Denial of Service (DoS) Technical Primer

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Attacks from the Inside

Botnets. An Introduction Into the World of Botnets. Tyler Hudak KoreLogic Security

Symptoms Based Detection and Removal of Bot Processes

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

NETWORK SECURITY ASPECTS & VULNERABILITIES

Botnet Detection by Abnormal IRC Traffic Analysis

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

CEH Version8 Course Outline

Introducing IBM s Advanced Threat Protection Platform

How To Mitigate A Ddos Attack

CS Network Security: Botnets

Homeland Security Perspectives: Cyber Security Partnerships and Measurement Activities

Defending Against Data Beaches: Internal Controls for Cybersecurity

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Recommended Practice Case Study: Cross-Site Scripting. February 2007

WHITE PAPER. Understanding How File Size Affects Malware Detection

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Detailed Description about course module wise:

Network Incident Report

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Malicious Software. Ola Flygt Växjö University, Sweden Viruses and Related Threats

HoneyBOT User Guide A Windows based honeypot solution

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

Beyond the Hype: Advanced Persistent Threats

What Do You Mean My Cloud Data Isn t Secure?

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure

McAfee Botnet Protection: Correlation, Context and Intelligence. REV: (July 2011)

Malware Analysis Quiz 6

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

FORBIDDEN - Ethical Hacking Workshop Duration

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Security in DSL Networks. Issues and Solutions for Small-to-Medium Sized Enterprises

Denial of Service (DoS)

Kick starting science...

The Microsoft JPEG Vulnerability and the Six New Content Security Requirements

Evolving Optical Transport Network Security

24/7 Visibility into Advanced Malware on Networks and Endpoints

GlobalSign Malware Monitoring

Stopping zombies, botnets and other - and web-borne threats

Large-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity

Network Security and the Small Business

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

Practical tips for a. Safe Christmas

Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs

LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains

E-BUSINESS THREATS AND SOLUTIONS

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Korea s experience of massive DDoS attacks from Botnet

Transcription:

BotNets- Cyber Torrirism Battling the threats of internet Assoc. Prof. Dr. Sureswaran Ramadass National Advanced IPv6 Center - Director

Why Talk About Botnets? Because Bot Statistics Suggest Assimilation In 2006, Microsoft s Malicious Software Removal Tool (MSRT) found backdoor trojans on 62% of the 5.7 million computers it scanned. The majority of these were bots. Commtouch found, 87% of all email sent over the Internet during 2006 was spam. Botnets generated 85% of that spam. Commtouch s GlobalView Reputation Service identifies between 300,000 and 500,000 newly active zombies per day, on average. ISPs rank zombies as the single largest threat facing network services and operational security*. * Worldwide Infrastructure Security Report, Arbor Networks, September 2007. Page 2

Why Talk About Botnets? Cyber Attack Sophistication Continues To Evolve Page 3 High Intruder Knowledge Attack Sophistication Low disabling audits self-replicating code password guessing back doors sweepers exploiting known vulnerabilities password cracking packet spoofing burglaries sniffers hijacking sessions stealth / advanced scanning techniques Staged denial of service attack distributed attack tools www attacks 1980 1985 1990 1995 2000+ GUI Cross site scripting automated probes/scans network mgmt. diagnostics Attackers bots Tools Source: CERT

Botnet Powered Attacks Targeting the World With full control of a massive army of machines, the only limit to a botherder s attack potential is his imagination. Distributed Denial of Service (DDoS) Attacks BlueSecurity Estonia Extortion of small businesses Spamming Email spam SPIM Forum spam Page 4

What is Botnets? Zombie Army A Botnet is a network of compromised computers under the control of a remote attacker. Botnets consist of: Bot herder The attacker controlling the malicious network (also called a Botmaster). Bot A compromised computers under the Bot herders control (also called zombies, or drones). Bot Client The malicious trojan installed on a compromised machine that connects it to the Botnet. Command and Control Channel (C&C) The communication channel the Bot herder uses to remotely control the bots. Page 5

What is Bot herder? Bot master Botnet originator (bot herder, bot master) starts the process Bot herder sends viruses, worms, etc. to unprotected PCs» Direct attacks on home PC without patches or firewall» Indirect attacks via malicious HTML files that exploit vulnerabilities (especially in MS Internet Explorer)» Malware attacks on peer-to-peer networks Infected PC receives, executes Trojan application bot Bot logs onto C&C IRC server, waits for commands Bot herder sends commands to bots via IRC server» Send spam» Steal serial numbers, financial information, intellectual property, etc.» Scan servers and infect other unprotected PCs, thereby adding more zombie computers to botnet Page 6

What is Bot? The Zombie/drone Bot = autonomous programs capable of acting on instructions Typically a large (up to several hundred thousand) group of remotely controlled zombie systems» Machine owners are not aware they have been compromised» Controlled and upgraded via IRC or P2P Used as the platform for various attacks Distributed denial of service Spam and click fraud Launching pad for new exploits/worms Page 7

What is Bot Client? Compromising a machine-worms 1. Botnet operator sends out viruses or worms (bot client) infect ordinary users [trojan application is the bot] 2. The bot on the infected PC logs into an IRC server Server is known as the command-and-control server 3. Attackers gets access to botnet from operator Spammers 4. Attackers sends instructions to the infected PCs To send out spam 5. Infected PCs will Send out spam messages Page 8

What is Bot C&C? Command and Control Server (C2) Without bot communication, botnet would not be as useful or dynamic IRC servers are not best choice for bot communication However,» Simpler protocol could be used» Usually unencrypted, easy to get into and take over or shut down» IRC servers freely available, simple to set up» Attackers usually have experience with IRC communication Bots log into a specific IRC channel Bots are written to accept specific commands and execute them (sometimes from specific users) Page 9

What is Bot C&C? Command and Control Server (C2) Today, bot herders primarily rely on these three protocols for their C&C:» Internet Relay Chat (IRC) Protocol» Hyper-Text Transfer Protocol (HTTP)» Peer-to-Peer (P2P) networking protocols. Page 10

Botnet Life Cycle? Botnet and bot Life Cycle Botnet Life Cycle o Bot herder configures initial parameters: infection vectors, payload, stealth, C&C details o Bot herder registers dynamic DNS server o Bot herder launches, seeds new bots o Bots spread, grow o Other botnets steal bots o Botnet reaches stasis, stops growing o Bot herder abandons botnet, severs traces thereto o Bot herder unregisters dynamic DNS server Bot Life Cycle o Bot establishes C&C on compromised computer o Bot scans for vulnerable targets to spread itself o User, others take bot down o Bot recovers from takedown o Bot upgrades itself with new code o Bot sits idle, awaiting instructions Page 11

Botnet in Action? Putting all together 1. Botmaster infects victim with bot (worm, social engineering, etc) Botmaster Victim 4. 3. Repeat. Botmaster Soon sends the botmaster commands has through an army IRC C&C of bots channel to to control bots from a single point 2. Bot connects to IRC C&C channel Page 12 IRC Server

Botnets used for? Hiring the Botnets Phishing Spam Distributed Denial of Service Click Fraud Adware/Spyware Installation Identity Theft Making Additional Income!!! Keystroke logging Stealing registration keys or files Whatever you pay for them to do! Or whatever makes money or is fun for the operator. Page 13

Botnet in Action Attack Summary Obf JS Malicious Script 2 http://foo.com 3 4 Exp ANI ANI exploit http://foo2.com http://bar.com Troj/Banker Payload malware Spam campaign 1 Page 14

Page 15

The Botnet: contined The Lifecycle of a Botnet Page 16

The Current Threats The SpamThru Trojan Over 1 Billion Emails Page 17

Break Visualizing a Botnet Relax, and Enjoy the Video Page 18

Types Botnets IRC botnets Until recently, IRC-based botnets were by far the most prevalent type exploited in the wild. Benefits of IRC to botherder: Well established and understood protocol Freely available IRC server software Interactive, two-way communication Offers redundancy with linked IRC servers Most blackhats grow up using IRC. Botnet user Page 19

Types Botnets IRC botnets Botherders are migrating away from IRC botnets because researchers know how to track them. Drawbacks: Centralized server IRC is not that secure by default Security researchers understand IRC too. Common IRC Bots: SDBot Rbot (Rxbot) Gaobot Botnet user Page 20

Types Botnets P2P botnets Distributed control Page 21

Types Botnets P2P botnets Hard to disable Page 22

What is a Botnet? P2P Botnet Diagram Page 23

Types Botnets P2P botnets P2P communication channels offer anonymity to botherders a and resiliency to botnets. Benefits of P2P to botherder: Drawbacks: P2P Bots:» Decentralized; No single point of failure» Botherder can send commands from any peer» Security by Obscurity; There is no P2P RFC» Other peers can potentially take over the botnet» Phatbot: AOL s WASTE protocol» Storm: Overnet/eDonkey P2P protocol

Types Botnets HTTP botnet HTTP Post Command to C&C URL Polling Method Registration Method Page 25

What is a Botnet? HTTP Botnets Botherders are shifting to HTTP-based botnets that serve a single purpose. Benefits of HTTP to botherder: Drawbacks:» Also very robust with freely available server software» HTTP acts as a covert channel for a botherder s traffic» Web application technologies help botherders get organized.» Still a Centralized server» Easy for researchers to analyze. Recent HTTP Bots:» Zunker (Zupacha): Spam bot Page 26» BlackEnergy: DDoS bot

What Bots can do? The Zombie/drone Each bot can scan IP space for new victims Automatically» Each bot contains hard-coded list of IRC servers DNS names» As infection is spreading, IRC servers and channels that the new bots are looking for are often no longer reachable On-command: target specific /8 or /16 prefixes» Botmasters share information about prefixes to avoid Evidence of botnet-on-botnet warfare o DoS server by multiple IRC connections ( cloning ) Active botnet management o Detect non-responding bots, identify superbots Page 27

Botnets used for? Network for hire Botnet user (customer) Botnet originator (owner) Page 28

Botnets, the hardest Challenges Determining the source of a botnet-based attack is challenging:» Every zombie host is an attacker» Botnets can exist in a benign state for an arbitrary amount of time before they are used for a specific attack Traditional approach:» identify the C&C server and disable it New trend:» P2P networks,» C&C server anonymized among the other peers (zombies) Measuring the size of botnets Page 29

Botnets, Research Methods Capture Active (go out and get malware)» Actual (use vulnerable browser/application)» Simulated (use tool that mimics vulnerable app)» FTP (go to malware repository) Passive (let it come to you)» Honeypot/net» Collection from infected end-users Page 30

Botnets, Research Monitoring of herder - botmatser Logging onto herder IRC server to get info Passive monitoring» Either listening between infected machine and herder or spoofing infected PC Active monitoring» Poking around in the IRC server Sniffing traffic between bot & control channel What if herder is using 'mixed' server?» innocent and illegitimate traffic together Page 31

Botnets, Research Monitoring of herder bot matser Infected IRC Herder unbiased Researcher unbiased Page 32

Avoid Assimilation: Botnet Defense Preventing Bot Infections Protecting your network from a botnet s many attack vectors requires Defense in Depth. Use a Firewall Patch regularly and promptly Use AntiVirus (AV) software Deploy an Intrusion Prevention System (IPS) Implement application-level content filtering Define a Security Policy and share it with your users systematically Page 33 USER EDUCATION IS VITAL!

Recommendation Readings Botnets: The Killer Web Application, Craig Schiller ISBN 1-59749-135-7 Managing an Information Security and Privacy Awareness and Training Program, Rebecca Herold ISBN 0-8493-2963-9 The CISO Handbook: A Practical Guide to Securing Your Company, Michael Gentile ISBN 0-8493-1952-8 Google Hacking for Penetration Testers, Volume 1, Johnny Long ISBN 1-93183-636-1 Page 34

Thank You