Asamoah-Botnet-Monitoring

Total Page:16

File Type:pdf, Size:1020Kb

Asamoah-Botnet-Monitoring Jointly presented by: Nurefsan Sertbas and Asamoah K. Acheampong Web Server ■ DDoS traffic peaked at 500Gbps in 2015 [Arbor Networks, 2016] ■ ZeroAccess : Crooks can milk '$100k a day' from 1-millionDDoS-zombie [THe Register, Sept-2012] Botmaster C2 Server Updates/Commands ■ Centralized ■ Uses Command and Control (C2) servers (HTTP / IRC servers) ■ Single point of failure / monitoring ■ Botmaster Distributed (P2P) ■ No C2 servers / No centralized monitoring ■ Bots (inter)connected via an overlay ■ Hop-by-hop command dissemination ■ Resilient to node failures and attacks § Three major approaches: § Honeypot-based detection (Generic) § Intrusion Prevention/Detection Systems (IPS/IDS) § Communication/Flow-based Detection Mechanisms Examples: • BotGrep • Botyacc • PeerHunter • PeerDigger • PeerRush • … § Motivation: - Drawbacks of signature & anomaly based detection • Signature based detection: – Cannot detect previously unknown botnets – Encrypted malicious communications • Anomaly based detection: – Produces large # of FPs – Longer setup times - Idea: Observe flows instead individual packets § Proposed Solution: Flow based detection - Extract metadata by NetFlow - (who talks to whom, when, how..) - No need to have a knowledge of a complete communication - Assumes only limited knowledge on botnet flows n Walk when k=4 1 19-18-1-3-11 2 16-14-15-13-11 … … READER WALKER • Reads NetFlow data • Random Walker algorithm • Creates communication graph NORMALIZER CLUSTERER • Calculates how likely a • DBSCAN to perform the vertex is to be the end final clustering node • Results probability distribution http://try.bro.org/#/?example=hello Get a Mirai Pcap from https://github.com/ixiacom/ATI/tree/master/PCAPS Assuming a part of attack signature is first 4 byte of "\x00\x00\x00\x01" Goal: Write a basic script to check that pattern and detect those packets Solution: You can also try with following functions By Asamoah K. Acheampong ■ Enumerate infected macHines ■ Infection cleanup ■ Alert stakeHolders, e.g., ISPs ■ Identify control infrastructure(s) ■ Arrest tHe botmaster Botmaster ■ Takedown servers Reverse engineer malware to discover or understand: Protocols ■ Botnet messages / communication protocols ■ Seed list (or bootstrap list) or C&C Servers Seed list Reverse Engineering § Usage of honeypots § Infiltration of C&C servers (e.g., IRC or HTTP Servers) § IP flow correlation at ISP/Network level § ‘Vulnerable’ devices which have the sole purpose of getting infected § Two types: § Low-interaction Honeypot: (Limited) Protocol emulations § High-interaction Honeypot: Complete System interaction, e.g., physical machine. § Usage: Useful to detect ongoing propagation of malware and understanding the behaviour of the malware § Honeypots can emulate ANYTHING: • HTTPS, FTP, MySQL, SIP, SSH • Modbus, S7, SNMP, SMB, HTTP, Telnet, SMTP eduroam Multi-stage attack detection and signature generation with ICS honeypots. Vasilomanolakis et al. NOMS 2016 B E A Superpeers D F J C G MM I Bot D H Membership Maintenance (MM) mechanism No. NeighborNAT ■ Ensures overlay remains connected 1 E ■ Periodically maintains a Neighborlist (NL) ■ Probes responsiveness of neigHbors every 2 F MM-interval (256 sec up to 40 min) 3 GI ■ Update/Replace entries as needed *TheNon-superpeers size of an NL ranges between 50-1000■ entriesRequest additional neigHbors Firewall ■ Non-superpeers rely on superpeers to stay connected § A Windows OS-based virus first seen in 2003 § File infector, i.e., via Removable devices and SMB § Backdoor, FTP password stealer, … § Disables general security applications upon infection § Adoption of P2P communication architecture since 2009 § Business Model: Malware (component) dropper via infected URLs § Lack of a centralized architecture: Impossible to take down the botnet § Only through a coordinated takedown (P2P botnet takedown strategies like Sinkholing attacks) § It’s resiliency is evident from the ‘track record’ of Sality since 2003. § Network communications (UDP) encrypted with RC4 § Dynamic keys using packet’s payload-data hash and size § Implication : No easy pattern-matching signatures for IDS/IPS § Two active versions : V3 and V4 § URLPack : Update issued by botmasters to instruct infected bots to download and install additional (new) malware or components. § Each update consists of up to 10 different URLs, camouflaged as graphic files § The only malware delivery mechanism to the bots Update Frequency of URLPacks in Sality V3 (Since April 2015) URLPack Seq. Number Date Issued http://pisochne.net/bottom.gif230 - http://prabhuinfotech.com/images/bottom.gif231 24th April 2015 http://winmark.co.in/image.gif232 25th May 2015 http://dom.lapok.hu/pdf/image.gif234 27th May 2015 http://agruse.com/image.gif236 9 th July 2015 http://tangnhung.50webs.com/anh/image.gif240 24th August 2015 http://67.225.144.42/images/image.gif241 6th October 2015 350 11th November 2015 B E A D Protocols F J Seed list C G I H Crawler Crawlers mimic bots in need of neighbors to: ■ Enumerate bots (mostly superpeers) NL-Req NAT ■ Discover interconnectivity of bots B E Drawback: A C F ■ Non-superpeers not reachable (60-90% of bots) Non-superpeers DVisual representationG Firewall of the topology of botsZeroAccess in GameOver Botnet,Zeus December 2015 Day Responsive Discovered 1 5752 6646 2 5603 6411 3 5539 6324 4 5359 6120 5 5496 6230 6 5626 6400 7 5676 6564 Discovered Peers Responsive Peers 1,521 Total Unique IPs: 5,496 702 544 Percentage of Unique IPs Countries B XS E A Superpeers D Protocols F J C Crawler G I H Sensors mimic reliable and stable superpeers to: ■ Enumerate both superpeers and non-superpeers ■ Reliably respond to MM probing messages NAT ■ All Sality BotsBecome on 1 stpopularApril 2015among otHer bots ■ Hide among bots “Sensors are stealthier than crawlers”, Non-superpeers Andriesse et al., 2015 Firewall Drawback: ■ No connectivity information § About 90% of all bots are not directly reachable via crawling § Behind Firewall and NAT devices Daily Aggregation Hourly Aggregation 120,904 Total Unique IPs: 896,638 86,210 66,591 Percentage of Unique IPs Countries 22,131 Total Unique IPs: 198,239 21,406 12,683 Percentage of Unique IPs Countries Activities Dynamic nature of other Anti-monitoring of P2P Botnets (competing) countermeasures researchers Less Invasive Crawler Crawling Detection Algorithm Mechanism Botnet (LICA) Surveillance System (BoSS) Sensor Detection ZeusMilker Mechanism Inherit most of the properties of P2P networks. § Dynamic IP address allocation pools,Sality (e.g.,V3 ISPs,Crawling DHCP) (7-days) § High churn rate and diurnal effects § Network/securityAbout > 90% devices, e.g., NAT, Firewall nodes are § AbsenceNOT of unique identifiers OwhWOW!… Okay… Cool! § reachableOver/under estimating multiple nodes behind same IP Only> 12,000 about bots < ~1,400 in 7 days! bots § We viaare under-estimating crawling 690 >= Total_bots <= 1,447 Activities Dynamic nature of other Anti-monitoring of P2P Botnets (competing) countermeasures researchers Less Invasive Crawler Crawling Detection Algorithm Mechanism Botnet (LICA) Surveillance System (BoSS) Sensor Detection ZeusMilker Mechanism Many third-parties snooping around P2P botnets § Introduce a lot of noise from their activities § Attacks (e.g., Neighbor list poisoning, sybil attacks) § Spoofing of invalid addresses/IDs § Over-estimation prone to happen § Aggressive monitoring § Requests as high as 15 request/min (consistent and constant rate, 24x7) § Generate random IDs on-the-fly § Stress-test our crawlers and sensors § Malformed packets / commands / contents: Require a LOT of bug-fixing! § Testing our system’s assumptions: Replay REAL commands Geo§ Sometimes-IP location ‘help of other’ you researchers/parties without being asked crawling ;-) in Sality V3 on 1st April 2015 § Help popularize our sensors (by returning as neighbors) § However, introduces bias in some measurements Activities Dynamic nature of other Anti-monitoring of P2P Botnets (competing) countermeasures researchers Less Invasive Crawler Crawling Detection Algorithm Mechanism Botnet (LICA) Surveillance System (BoSS) Sensor Detection ZeusMilker Mechanism Activities Botnet’s anti- Dynamic nature of other monitoring of P2P Botnets (competing) countermeasures researchers Less Invasive Crawler Crawling Detection Algorithm Mechanism Botnet (LICA) Surveillance System (BoSS) Sensor Detection ZeusMilker Mechanism X B Bot comes online E A IsIf this yes, bot contacting blacklist D me too frequently?this botF J C G I Bot goes offline H Crawler Challenges in crawling: ■ Delay in crawling introduces noise in crawl data X ■ Botnet anti-crawling countermeasures: B E 1. Restricted NL-reply mechanisms Disclosing only a subset of neighbors A C F 2. Automated blacklisting mechanisms Force crawlers to rate-limit their crawl D G H frequency S S S E Try to get into NL of D D F FULL GameOver Zeus even G prevents duplicate entries from a /20 network prefix Bot D Botnet anti-sensor countermeasures: No. Neighbor Reputation 1. Local reputation mechanism (Sality) 1 E 1000 Prefer older bot to newly discovered ones 2 F 700 2. IP address-based filtering mechanism Cannot deploy multiple sensors using same 3 G 86 address/network to prevent sinkHoling attacks Activities Botnet’s anti- Dynamic nature of other monitoring of P2P Botnets (competing) countermeasures researchers Crawler BoSS Detection Mechanism Botnet Less Invasive Surveillance Crawling System (BoSS) Algorithm (LICA) Sensor Detection Mechanism ZeusMilker Future ■ Advanced Anti-Monitoring Countermeasures Now ■ Collaborative Monitoring ■ (Simple) Anti-Monitoring ■ Review Existing Cyber Laws Countermeasures ■ Independent Monitoring 41/27 .
Recommended publications
  • Ransom Where?
    Ransom where? Holding data hostage with ransomware May 2019 Author With the evolution of digitization and increased interconnectivity, the cyberthreat landscape has transformed from merely a security and privacy concern to a danger much more insidious by nature — ransomware. Ransomware is a type of malware that is designed to encrypt, Imani Barnes Analyst 646.572.3930 destroy or shut down networks in exchange [email protected] for a paid ransom. Through the deployment of ransomware, cybercriminals are no longer just seeking to steal credit card information and other sensitive personally identifiable information (PII). Instead, they have upped their games to manipulate organizations into paying large sums of money in exchange for the safe release of their data and control of their systems. While there are some business sectors in which the presence of this cyberexposure is overt, cybercriminals are broadening their scopes of potential victims to include targets of opportunity1 across a multitude of industries. This paper will provide insight into how ransomware evolved as a cyberextortion instrument, identify notorious strains and explain how companies can protect themselves. 1 WIRED. “Meet LockerGoga, the Ransomware Crippling Industrial Firms” March 25, 2019; https://www.wired.com/story/lockergoga-ransomware-crippling-industrial-firms/. 2 Ransom where? | May 2019 A brief history of ransomware The first signs of ransomware appeared in 1989 in the healthcare industry. An attacker used infected floppy disks to encrypt computer files, claiming that the user was in “breach of a licensing agreement,”2 and demanded $189 for a decryption key. While the attempt to extort was unsuccessful, this attack became commonly known as PC Cyborg and set the archetype in motion for future attacks.
    [Show full text]
  • Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for Takedown
    Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for Takedown Colin C. Ife¢, Yun Sheny, Steven J. Murdoch¢, and Gianluca Stringhiniz ¢University College London, yNorton Research Group, zBoston University ¢yUnited Kingdom, zUnited States {colin.ife,s.murdoch}@ucl.ac.uk,[email protected],[email protected] ABSTRACT 1 INTRODUCTION The malware and botnet phenomenon is among the most signif- Malware delivery has evolved into a major business for the cyber- icant threats to cybersecurity today. Consequently, law enforce- criminal economy and a complex problem for the security commu- ment agencies, security companies, and researchers are constantly nity. The botnet – a network of malware-infected devices that is seeking to disrupt these malicious operations through so-called controlled by a single actor through one or more command and takedown counter-operations. Unfortunately, the success of these control (C&C) servers – is one phenomenon that has benefited takedowns is mixed. Furthermore, very little is understood as to from the malware delivery revolution. Diverse distribution vectors how botnets and malware delivery operations respond to takedown have enabled such malicious networks to expand more quickly and attempts. We present a comprehensive study of three malware de- efficiently than ever before. Once established, these botnets canbe livery operations that were targeted for takedown in 2015–16 using leveraged to commit a wide array of secondary computer crimes, global download metadata provided by Symantec. In summary, we such as data theft, financial fraud, coercion (ransomware), send- found that: (1) Distributed delivery architectures were commonly ing spam messages, distributed denial of service (DDoS) attacks, used, indicating the need for better security hygiene and coordina- and unauthorised cryptocurrency mining [1, 14, 17, 47, 48].
    [Show full text]
  • Mcafee Labs Threats Report August 2014
    McAfee Labs Threats Report August 2014 Heartbleed Heartbleed presents a new cybercrime opportunity. 600,000 To-do lists The Heartbleed vulnerability Lists of Heartbleed-vulnerable exposed an estimated 600,000 websites are helpful to users but websites to information theft. can also act as “to-do” lists for cyber thieves. Unpatched websites Black market Despite server upgrades, many Criminals continue to extract websites remain vulnerable. information from Heartbleed- vulnerable websites and are selling it on the black market. McAfee Phishing Quiz Phishing continues to be an effective tactic for infiltrating enterprise networks. Average Score by Department (percent of email samples correctly identified) Only 6% of all test takers correctly 65% identified all ten email samples as phishing or legitimate. 60% 80% 55% of all test takers fell for at least one of the seven phishing emails. 50% 88% of test takers in Accounting & 0 Finance and HR fell for at least one of the seven phishing emails. Accounting & Finance Human Resources Other Departments The McAfee Phishing Quiz tested business users’ ability to detect online scams. Operation Tovar During Operation Tovar—The Gameover Zeus and CryptoLocker takedown: For CryptoLocker For Gameover Zeus more than 125,000 more than 120,000 domains were blocked. domains were sinkholed. Since the announcement of Operation Tovar: 80,000 times Copycats ****** McAfee Stinger, a free ****** are on the rise, creating tool that detects and ****** new ransomware or removes malware financial-targeting (including Gameover Zeus malware using the leaked and CryptoLocker), was Zeus source code. downloaded more than 80,000 times. McAfee joined global law enforcement agencies and others to take down Gameover Zeus and CryptoLocker.
    [Show full text]
  • ZEUSMILKER: Circumventing the P2P Zeus Neighbor List Restriction Mechanism
    ZEUSMILKER: Circumventing the P2P Zeus Neighbor List Restriction Mechanism Shankar Karuppayah∗¶, Stefanie Roos‡, Christian Rossow§, Max Muhlh¨ auser¨ ∗, Mathias Fischer† ∗ Telecooperation Group † Networking and Security Group Technische Universitat¨ Darmstadt / CASED, Germany International Computer Science Institute, USA fi[email protected] mfi[email protected] § Cluster of Excellence, MMCI ‡Privacy and Data Security ¶ National Advanced IPv6 Center, Saarland University, Germany TU Dresden, Germany Universiti Sains Malaysia (USM), [email protected] [email protected] Malaysia Abstract—The emerging trend of highly-resilient Peer-to-Peer Monitoring P2P botnets requires reverse-engineering of the (P2P) botnets poses a huge security threat to our modern society. botnet’s malware to at least extract the botnet’s communication Carefully designed countermeasures as applied in sophisticated protocol as well as a seedlist of potential active bots. After- P2P botnets such as P2P Zeus impede botnet monitoring and wards, an analyst can start gathering intelligence about the successive takedown. These countermeasures reduce the accuracy botnet by either injecting sensor nodes or by actively crawling of the monitored data, such that an exact reconstruction of it. Sensor nodes [4], [5] can obtain a complete overview of the the botnet’s topology is hard to obtain efficiently. However, an accurate topology snapshot, revealing particularly the identities botnet population, but do not reveal the graph structure of the of all bots, is crucial to execute effective botnet takedown botnet. However, such connectivity information (“who knows operations. With the goal of obtaining the required snapshot whom”) is required to launch successful takedown attempts in an efficient manner, we provide a detailed description and such as sinkholing [4], [6].
    [Show full text]
  • History of Ransomware
    THREAT INTEL REPORT History of Ransomware What is ransomware? Ransomware is a type of malicious software, or malware, that denies a victim access to a computer system or data until a ransom is paid.1 The first case of ransomware occurred in 1989 and has since evolved into one of the most profitable cybercrimes. This evolution is charted in Figure 1 at the end of the report, for easy visual reference of the timeline discussed below. 1989: The AIDS Trojan The first ransomware virus was created by Harvard-trained evolutionary biologist Joseph L. Popp in 1989.2 Popp conducted the attack by distributing 20,000 floppy discs to AIDS researchers from 90 countries that attended the World Health Organizations (WHO) International AIDS Conference in Stockholm.3 Popp claimed that the discs contained a program that analyzed an individual’s risk of acquiring AIDS through a risk questionnaire.4 However, the disc contained a malware program that hid file directories, locked file names, and demanded victims send $189 to a P.O. box in Panama if the victims wanted their data back.5 Referred to as the “AIDS Trojan” and the “PS Cyborg,” the malware utilized simple symmetric cryptography and tools were soon available to decrypt the file names.6 The healthcare industry remains a popular target of ransomware attacks over thirty years after the AIDS Trojan. 2005: GPCoder and Archiveus The next evolution of ransomware emerged after computing was transformed by the internet in the early 2000s. One of the first examples of ransomware distributed online was the GPCoder 1 “Ransomware,” Cybersecurity and Infrastructure Security Agency, 2020, https://www.us- cert.gov/Ransomware.
    [Show full text]
  • Gameover Zeus – Bad Guys and Backends
    Gameover Zeus { Bad Guys and Backends Michael Sandee, Tillmann Werner, Elliott Peterson August 5, 2015 Cui Honorem, Honorem Dr. Brett Stone-Gross, Dell SecureWorks Frank Ruiz, Fox-IT Dr. Christian Rossow, Saarland University Dennis Andriesse, VU University Amsterdam Dr. Christian Dietrich, CrowdStrike @kafeine UK NCA US DOJ CCIPS The ShadowServer Foundation Spamhaus And many others. M. Sandee, T. Werner, E. Peterson Gameover Zeus { Bad Guys and Backends 1 of 39 Criminal Overview Fraud Cycle • Spam, infection, account takeover, fraud • International wire, DDoS attack against FI, cashout, funds laundered • Losses ranged from $10,000 to $6,900,000 Dirtjumper C2 Monitoring { Credit to Dell SecureWorks 11/06/2012 18:03:46 02|300|1500 https://[redacted].com 11/06/2012 21:33:43 01|300|1500 https://[redacted].com 11/07/2012 08:48:50 02|999|1500 https://[redacted].com 11/08/2012 06:48:58 12|300|1500 https://[redacted].com 11/09/2012 03:43:54 02|100|1500 https://[redacted].com 11/10/2012 18:53:56 01|100|1500 https://[redacted].com 11/11/2012 23:53:55 01|100|1500 https://[redacted].com 11/12/2012 23:53:54 01|100|1500 https://[redacted].com/authentication/logon 11/13/2012 20:13:56 03|999|1500 https://[redacted].com/authentication/logon 11/13/2012 20:13:56 03|999|1500 https://[redacted].com M. Sandee, T. Werner, E. Peterson Gameover Zeus { Bad Guys and Backends 2 of 39 The Gameover Zeus Operation M. Sandee, T. Werner, E. Peterson Gameover Zeus { Bad Guys and Backends 3 of 39 Brief History of Zeus Evolution of the Zeus Family Version Date Description Zeus 1 Emerged in 2005 Sold as crimeware kit Zeus 2 Emerged in 2009 Sold as crimeware kit, code for 2.0.8.9 leaked in 2011 Murofet, Licat September 2010 { September 2011 Private builds Gameover Zeus September 2011 { June 2014 Private builds, introduced P2P protocol POST /gameover2.php HTTP/1.1 Accept: */* X-ID: 7777 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727) Host: pinkmite.com Content-Length: 3091 Connection: Keep-Alive M.
    [Show full text]
  • Held for Ransom
    HELD FOR RANSOM DEFENDING YOUR DATA AGAINST RANSOMWARE Topics • What is Ransomware? • Basic Ransomware Operation • A Little History • Ransomware Characteristics • Actual Compromises • Some Help With Recovery • A Plan for Protection www.bleepingcomputer.com 2 What is Ransomware? • Windows ransomware, such as Cryptolocker, Cryptowall, Locky, and Samas, does not bother to steal your critical files (Office documents, photos, videos) as it is much easier to just encrypt them in-place and give you a ransom note. • If the ransom is not paid by its due date, you do not get the decryption key needed to decrypt your files. • Depending on the variant of Ransomware you’ve been infected with, you may be able to recover your files. It’s not just Windows: •Linux.Encoder, which exploits a security vulnerability in the Magneto e-commerce platform. •OS X KeRanger, distributed through compromised www.wysiwygventures.com Transmission BitTorrent client. 3 Basic Ransomware Operation • Infect system via email attachment, Angler exploit kit (0- day Flash exploit), or GameOver Zeus Botnet. • Contact CnC server to generate / receive encryption key. • Perform a depth first search of all disk folders (including network drives), encrypting files with targeted extensions using with one of several algorithms, such as RSA, ECC, AES. • Place ransom notes in all folders where files were encrypted. • Delete malware when encryption is complete and display final ransom note. 4 Basic Ransomware Operation • Depending on which variant of Ransomware a system has been infected with, other activities shown here may also take place: • Deletion of Shadow Volume copies: – "C:\Windows\SYsWOW64\cmd.exe" /C "C:\Windows\Sysnative\vssadmin.exe" Delete Shadows /All /Quiet • Secure deletion of original files after they’ve been encrypted.
    [Show full text]
  • Statement of Joseph Demarest Assistant Director Cyber Division Federal Bureau of Investigation Before the Subcommitt
    STATEMENT OF JOSEPH DEMAREST ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM COMMITTEE ON THE JUDICIARY UNITED STATES SENATE ENTITLED “TAKING DOWN BOTNETS: PUBLIC AND PRIVATE EFFORTS TO DISRUPT AND DISMANTLE CYBERCRIMINAL NETWORKS” PRESENTED JULY 15, 2014 Statement of Joseph Demarest Assistant Director Cyber Division Federal Bureau of Investigation Before the Committee on the Judiciary Subcommittee on Crime and Terrorism United States Senate At a Hearing Entitled “Taking Down Botnets: Public and Private Efforts to Disrupt and Dismantle Cybercriminal Networks” Presented July 15, 2014 Good morning Senator Whitehouse. I thank you for holding this hearing today, and I look forward to discussing the progress the FBI has made on campaigns to disrupt and disable significant botnets. As you well know, we face cyber threats from state-sponsored hackers, hackers for hire, organized cyber syndicates, and terrorists. They seek our state secrets, our trade secrets, our technology, and our ideas – things of incredible value to all of us. They may seek to strike our critical infrastructure and our economy. The threat is so dire that cyber security has topped the Director of National Intelligence list of global threats for the second consecutive year. Cyber criminal threats post very real risks to the economic security and privacy of the United States and its citizens. The use of botnets is on the rise. Industry experts estimate that botnets attacks have resulted in the overall loss of millions of dollars from financial institutions and other major U.S. businesses. They also affect universities, hospitals, defense contractors, government, and even private citizens.The “weapons” of a cyber criminal are tools, like botnets, which are created with malicious software that is readily available for purchase on the Internet.
    [Show full text]
  • Understanding the Twitter User Networks of Viruses and Ransomware Attacks
    Understanding the Twitter user networks of Viruses and Ransomware attacks Michelangelo Puliga12,∗ Guido Caldarelli123†, Alessandro Chessa12‡, and Rocco De Nicola1§ 1 Scuola IMT Alti Studi Lucca, Piazza San Francesco 19 55100, Italy [email protected] 2 Laboratorio Linkalab, Cagliari, Italy 3 London Institute for Mathematical Sciences, 35a South St. Mayfair London UK Abstract We study the networks of Twitter users posting information about Ransomware and Virus and other malware since 2010. We collected more than 200k tweets about 25 attacks measuring the impact of these outbreaks on the social network. We used the mention network as paradigm of network analysis showing that the networks have a similar behavior in terms of topology and tweet/retweet volumes. A detailed analysis on the data allowed us to better understand the role of the major technical web sites in diffusing the news of each new epidemic, while a study of the social media response reveal how this one is strictly correlated with the media hype but it is not directly proportional to the virus/ransomware diffusion. In fact ransomware is perceived as a problem hundred times more relevant than worms or botnets. We investigated the hypothesis of Early Warning signals in Twitter of malware attacks showing that, despite the popularity of the platform and its large user base, the chances of identifying early warning signals are pretty low. Finally we study the most active users, their distribution and their tendency of discussing more attack and how in time the users switch from a topic to another. Investigating the quality of the information on Twitter about malware we saw a great quality and the possibility to use this information as automatic classification of new attacks.
    [Show full text]
  • In the United States District Court for the Western District of Pennsylvania
    IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF PENNSYLVANIA UNITED STATES OF AMERICA ) ) Plaintiff, ) Civil Action No. 15-CIV-1315 ) v. ) ) ANDREY GHINKUL ) a/k/a Andrei Ghincul ) a/k/a “smilex,” ) ) MAKSIM VIKTOROVICH YAKUBETS ) a/k/a “aqua,” ) ) IGOR TURASHEV ) a/k/a “nintutu,” ) ) MAKSIM MAZILOV ) a/k/a “caramba,” and, ) ) ANDREY SHKOLOVOY ) a/k/a “caramba,” ) ) Defendants. ) UNITED STATES’ MEMORANDUM OF LAW IN SUPPORT OF MOTION FOR TEMPORARY RESTRAINING ORDER AND ORDER TO SHOW CAUSE Plaintiff, the United States of America, by and through its attorneys, David J. Hickton, United States Attorney for the Western District of Pennsylvania, Leslie R. Caldwell, Assistant Attorney General, Michael A. Comber, Assistant United States Attorney, and Richard D. Green, Senior Trial Attorney, pursuant to 18 U.S.C. §§ 1345, 2521, and Federal Rule of Civil Procedure 65, hereby seeks an ex parte temporary restraining order commanding the defendants to halt a massive fraud and wiretapping scheme that is harming consumers, financial institutions, and other businesses in the United States and around the world. I. OVERVIEW The defendants in this case are responsible for the infection of a vast number of unsuspecting victims’ computers worldwide with malicious software (“malware”): Bugat/Dridex. Bugat/Dridex is a credential harvester that intercepts banking and other online credentials from infected computers and enlists those computers into a “botnet” – a network of infected computers controlled by the defendants. Bugat/Dridex has infected in excess of 100,000 computers in the United States and many more around the world and have generated direct and indirect losses to consumers and businesses that exceed $10 million domestically and likely in excess of $25 million worldwide.
    [Show full text]
  • Download Slides (PDF)
    WORKING TOGETHER: LE AND PRIVATE SECTOR BOTNET TAKEDOWNS Thomas Grasso (FBI) Alan Neville (Symantec) Working Together: LE and private sector botnet takedowns 1 Agenda Working Together: LE and private sector botnet takedowns 2 What are botnets? Working Together: LE and private sector botnet takedowns 3 Growing resilience of cybercrime networks TRADITIONAL BOTNET PEER TO PEER BOTNET Single point of failure No single point of failure Only one or a few C&C servers Every peer acts as C&C server Vulnerable to takedown & sinkholing Difficult to take down or sinkhole Unsurprisingly, cybercriminals are increasingly moving to P2P infrastructure Working Together: LE and private sector botnet takedowns 4 How we took out half a million ZeroAccess bots ZeroAccess uses highly resilient P2P architecture Each bot acts as a C&C, sinkholing almost impossible Create sinkholes that act like bot peers Inject sinkhole address in peer list and let it propagate ZA Eventually bots only have our sinkhole peer address GAME OVER FOR ZEROACCESS! SYMC ZA Working Together: LE and private sector botnet takedowns 5 Operation Tovar: Takedown of GameOver & Zeus/Crytolocker COLLABORATION BETWEEN LAW ENFORCEMENT AND SECURITY INDUSTRY Flaw in C&C communication is exploited to redirect traffic to servers owned by law enforcement Security industry Infections show signs assists with cleanup of increasing again, providing removal need for ongoing tools action Working Together: LE and private sector botnet takedowns 6 Collaborative Approach to Botnet Takedowns Working Together: LE and private sector botnet takedowns 7 Botnet Threat Focus Cell • A collaborative effort involving government, private sector and academia to combat the botnet threat.
    [Show full text]
  • A Study on Ransomware and Its Effect on India and Rest of the World
    Special Issue - 2017 International Journal of Engineering Research & Technology (IJERT) ` ISSN: 2278-0181 NCICCNDA - 2017 Conference Proceedings A Study on Ransomware and its Effect on India and Rest of the World Naveen Kumar C.G Dr.Sanjay Pande M.B Research Scholar, Professor and Head of the Department Bharathiar University GMIT, Davanagere, Coimbatore, Tamilnadu, India Karnataka,India Abstract- - Increased growth of internet technology pave III. TYPES OF CYBER ATTACKS the way to every individual and organizations to access Cyber-attacks are mainly categorized into four types, they the information in touch of fingertip. Almost all the are: organizations are transacting their day to day activities using internet and they are completely depend upon the . Targeted attack internet. Internet is exposed to many type of threats and attacks, it is the responsibility of the stakeholders to Cyber-attacks that are geared at particular organizations, secure their information by these attacks. Right now, services, and individuals to obtain private, technical, and information security is one of the top priority of the institutional information, and other intellectual assets for the organizations and also the individuals. Cyberattack is an purpose of vandalism or monetary gain. offensive type that targets on information systems, infrastructures, and computer networks etc. by a means . APT (Advanced Persistent Threat) of malicious act and destroys or steals the information. This paper is aimed to study the recent attack of A kind of targeted attack geared at a particular entity and ransomware, history of ransomware, its impact on India carried out continuously and persistently using a variety of and rest of the world.
    [Show full text]