Catching Predators at Watering Holes: Finding and Understanding Strategically Compromised Websites
Total Page:16
File Type:pdf, Size:1020Kb
Catching Predators at Watering Holes: Finding and Understanding Strategically Compromised Websites Sumayah Alrwais1,2, Kan Yuan1, Eihal Alowaisheq1,2, Xiaojing Liao3, Alina Oprea4, XiaoFeng Wang1 and Zhou Li5 1 Indiana University at Bloomington, {salrwais, kanyuan, ealowais, xw7}@indiana.edu 2King Saud University, Riyadh, Saudi Arabia, {salrwais, ealowaisheq}@ksu.edu.sa 3Georgia Institute of Technology, [email protected] 4Northeastern University, [email protected] 5RSA Laboratories, [email protected] ABSTRACT as you always did in countless prior visits. This time, however, the Unlike a random, run-of-the-mill website infection, in a strategic menu stealthily drops a piece of malware on your office computer, web attack, the adversary carefully chooses the target frequently which later silently collects your personal and business information visited by an organization or a group of individuals to compro- and further propagates across your company’s internal network. It mise, for the purpose of gaining a step closer to the organization turns out that the malware was actually strategically planted there or collecting information from the group. This type of attacks, for the purpose of infiltrating your company, due to the popularity called “watering hole”, have been increasingly utilized by APT ac- of the restaurant among the company’s employees. This is an exam- tors to get into the internal networks of big companies and gov- ple of targeted infiltrations, which aim at one specific organization, ernment agencies or monitor politically oriented groups. With its population group or industry of high value. They are the first step importance, little has been done so far to understand how the attack of an Advanced Persistent Threat (APT) [34, 45], a continuous, works, not to mention any concrete step to counter this threat. multi-stage and stealthy hacking process for such serious purposes In this paper, we report our first step toward better understand- as international espionage, sabotage, intellectual property theft and ing this emerging threat, through systematically discovering and domestic surveillance, etc. In the past few years, APT attacks have analyzing new watering hole instances and attack campaigns. This led to the breach of critical national infrastructures [29] and the was made possible by a carefully designed methodology, which re- computing systems of leading companies [48], news agencies [53] peatedly monitors a large number potential watering hole targets to and political dissidents [55]. According to various published re- detect unusual changes that could be indicative of strategic com- ports (e.g., [34, 45]), such an attack involves several phases, among promises. Running this system on the HTTP traffic generated from which the most important are the steps (reconnaissance and deliv- visits to 61K websites for over 5 years, we are able to discover and ery) that get adversaries a foothold into the target system. This is often achieved through social engineering, such as spear phish- confirm 17 watering holes and 6 campaigns never reported before. 1 Given so far there are merely 29 watering holes reported by blogs ing [39, 42] and increasingly strategic website compromising , and technical reports, the findings we made contribute to the re- dubbed “watering hole attacks”[29], as described in the above ex- search on this attack vector, by adding 59% more attack instances ample. and information about how they work to the public knowledge. Strategic site targeting. Simply put, in a watering hole attack, the Analyzing the new watering holes allows us to gain deeper un- adversary carefully selects a set of websites frequently visited by derstanding of these attacks, such as repeated compromises of po- his targets and by compromising these sites gains opportunities to litical websites, their long lifetimes, unique evasion strategy (lever- penetrate the targets’ systems, in a way much like the predator lurk- aging other compromised sites to serve attack payloads) and new ing around a watering hole to wait for its prey to show up. Since the exploit techniques (no malware delivery, web only information gath- selected websites are typically trusted by the target, such an attack ering). Also, our study brings to light interesting new observations, is often very effective, as pointed out by a Symantec report: “Any including the discovery of a recent JSONP attack on an NGO web- manufacturers who are in the defense supply chain need to be wary site that has been widely reported and apparently forced the attack of attacks emanating from subsidiaries, business partners, and as- to stop. sociated companies, as they may have been compromised and used as a stepping-stone to the truly intended target” [54]. Examples in- 1. INTRODUCTION clude the compromise of the Council on Foreign Relation website for attacking other agencies [37], the infection on forbes.com that Consider that you are viewing your favorite restaurant’s menu, targets the defense industry [53] and the use of a restaurant menu to get into an oil company’s network [59]. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed Defense against watering hole attacks is challenging. These at- for profit or commercial advantage and that copies bear this notice and the full cita- tacks often involve zero-day exploits, malware or other unique tech- tion on the first page. Copyrights for components of this work owned by others than niques, which are hard to detect. Limiting access to all such fre- ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or re- quently visited sites is not a viable solution, given the inconve- publish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. nience it would bring in. Without scalable techniques, monitor- ACSAC ’16, December 05-09, 2016, Los Angeles, CA, USA 1 Throughout this paper, we use the two terms “Strategic compromise” and “watering c 2016 ACM. ISBN 978-1-4503-4771-6/16/12. $15.00 hole” interchangeably. DOI: http://dx.doi.org/10.1145/2991079.2991112 ing these sites for malicious activities is difficult, due to their large mised multiple times, the Carter Center, cartercenter.com and other number (e.g., 120K sites we found to be visited for at least 10 times politically oriented watering hole campaigns. For the attacks on within 8 months from a company’s traffic traces). Most impor- enterprises, we observed new instances and interesting strategies. tantly, given the fact that such targeted attacks only aim at a small For example, an India shipyard’s website was found to be strategi- set of carefully selected targets, and therefore are much less fre- cally compromised and a new watering hole running the ScanBox quent [46, 39, 42] and stealthier than random compromises, so far framework [22] was found to exhibit targeting behavior never re- only 29 watering hole instances have been reported and made pub- ported before, e.g., delivering malicious payload to website visitors lic. In the absence of adequate real-world attack data, our under- from a computing center in San Diego but not from a university. standing of this emerging threat is very limited, making it hard to These new findings help us better understand such strategic com- come up with any effective response. promises. Particularly, our study presents strong evidence that the watering hole perpetrators not only aim at a specific organization Finding watering holes. In this paper, we report the first system- but also at a group of politically oriented people. Further, the atic study on watering holes, making an important step toward bet- repeated compromises of political sites demonstrate that they are ter understanding such elusive but significant threat, through dis- relatively soft targets compared with the corporate websites that covery of new strategic compromises and in-depth analysis of these are better protected and rarely exploited multiple times. Also, we cases. This was achieved using a new methodology which helped found that watering holes are characterized by a long lifetime, in find new watering holes by continuously analyzing the network some cases, a few years, and unique evasion tricks, which hide their traffic triggered during the visit to a set of likely target websites. attack payloads, redirection scripts etc. on legitimate (but compro- At the center of the methodology is Eyeson, a system that performs mised) or legitimate looking third party domains, or even utilize a lightweight persistent surveillance of the likely targets by inspect- these domains as command and control (C&C) centers. In terms ing only the headers of the HTTP requests to the site. From such of attack techniques, it is surprising to see that the adversary may thin information, Eyeson automatically builds a model for the rate not deliver any malware or compromise the victim’s system at all: of the change (based upon quantified features such as hostnames, sometimes, all they do is just collect information through the vic- content types, URL patterns, file names, etc.) observed across dif- tim’s browser (e.g., the JSONP watering hole). ferent visits to the same site. Once a sudden big change occurs (dis- covered from HTTP headers), which are supposed to be unlikely to Contributions. The contributions of the paper are outlined below: happen according to the model, the site is flagged and goes through •New understanding of the watering hole attacks. We conducted other analyses to determine if it is indeed compromised. the first systematic study on strategic compromises leading to the The simplicity and efficiency of the methodology enable contin- discovery of high impact watering hole attacks never reported be- uous monitoring and analysis of a large number of potential tar- fore.