SlideShare a Scribd company logo
Extracting the Malware Signal from
Internet Noise
Andrew Morris, Researcher
1
# whoami
• Andrew Morris
• Background in offense
• R&D @ Endgame
2
Tactical Insights from Global Trends
• My network is being scanned/attacked
– Am I being targeted specifically?
– Are other people seeing this as well?
• A vulnerability has been disclosed
– Is anyone probing for this vulnerability?
– Is anyone exploiting this vulnerability?
3
4
Faraday
A Global Network of Sensors
Untargeted
Malware
Geographically &
Logically
Dispersed
Omnidirectional
Internet Traffic for
Collection &
Analysis
If something is *not* in Faraday, it is likely targeted
Capabilities
Iptables
HTTP
Telnet
FTP
SSH
Strategic Packet Capture
Custom sensors
5
Faraday Architecture
6
Four Kinds of Traffic on Your Network
The difference between these can be hundreds of thousands of $$ in incident response
Worm, Mass
Exploit
Campaign
Regular Web
User
Advanced
Persistent
Threat
Search Engines
(e.g. Google)
MaliciousBenign
Omnidirectional Targeted
7
My Network is Being Attacked
Omnidirectional Malicious
$ faraday --ip
123.123.123.123 | wc -l
42013
Targeted Malicious
$ faraday --ip 1.2.3.4|
wc -l
0
8
A Vulnerability Has Been Disclosed
• Is anyone probing for this vulnerability?
• Is anyone massively exploiting this vulnerability?
9
Cisco CVE-2016-1287
Cisco ASA Software IKEv1
and IKEv2
Buffer Overflow Vulnerability
• Critical
• Disclosed Feb 10, 2016
• Affects all Cisco ASAs
0
500
1000
1500
2000
2500
3000
Faraday Port 500
Faraday Port
500
10
Cisco CVE-2016-1287
The spike and diversity of IP addresses over time implies:
• People are not just probing, but actively targeting it
• Where they are coming from
• Who may have known about the vulnerability prior to public
disclosure
• It is not (yet) being massively exploited
11
Redis CVE-2015-4335
• Remote code execution vulnerability in
Redis
– Built and deployed a custom Redis sensor
less than 24 hours after the vulnerability was
published
– Observed attacker behavior
– Recorded attacker IP addresses
12
CVE-????-????
• Traffic observed targeted unknown
devices
• No known vulnerabilities on services
running on those ports
13
Fun Stuff
• Data Science Early Warning Applications
• Dangling DNS
• Bandwidth budget calculation
• Worm tracking
• Search engine spoofing
• Reflected DDOS attacks
• Provider threat model
14
Really Fun Stuff
• Integration into Endgame cyber operations platform
– Visibility into novel attacker techniques
– Ability to collect new malware samples
– Input into reputation services
– Situational awareness
Conclusion
• Whether an attack is targeted or not
• Derive Internet-wide vulnerability exploitation
attempts
• Collect omnidirectionally targeted malware
samples
16
17
Questions?
Thank You!
amorris@endgame.com
@andrew___morris
18

More Related Content

What's hot (19)

PDF
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
Edureka!
 
DOCX
Zero-Day Vulnerability and Heuristic Analysis
Ahmed Banafa
 
PDF
What is Penetration & Penetration test ?
Bhavin Shah
 
PPTX
Malware Analysis
Ramin Farajpour Cami
 
PDF
Target attack (hkust gold edition)(public version)
Anthony Lai
 
DOCX
Jeffrey_Smith_Resume_2016
Jeffrey Smith
 
PPTX
Types of Attack in Information and Network Security
padmeshagrekar
 
PDF
Cs8792 cns - unit v
ArthyR3
 
PPTX
Session Slide
Muralidharan Radhakrishnan
 
PDF
Penetration Testing Execution Phases
Nasir Bhutta
 
PDF
(SACON) Wayne Tufek - chapter six - dwell time
Priyanka Aash
 
PPTX
WTF is Penetration Testing v.2
Scott Sutherland
 
PPT
Best Practices for Leveraging Security Threat Intelligence
AlienVault
 
PPTX
Berkarir di Cyber Security
Satria Ady Pradana
 
PDF
TTPs for Threat hunting In Oil Refineries
Dragos, Inc.
 
PPTX
Ethical Hacking Redefined
Pawan Patil
 
PPTX
Spice world 2014 hacker smackdown
AlienVault
 
PDF
Supply Chain Attack Backdooring Your Networks
Bangladesh Network Operators Group
 
PPT
Ethical hacking
shahhardik27
 
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
Edureka!
 
Zero-Day Vulnerability and Heuristic Analysis
Ahmed Banafa
 
What is Penetration & Penetration test ?
Bhavin Shah
 
Malware Analysis
Ramin Farajpour Cami
 
Target attack (hkust gold edition)(public version)
Anthony Lai
 
Jeffrey_Smith_Resume_2016
Jeffrey Smith
 
Types of Attack in Information and Network Security
padmeshagrekar
 
Cs8792 cns - unit v
ArthyR3
 
Penetration Testing Execution Phases
Nasir Bhutta
 
(SACON) Wayne Tufek - chapter six - dwell time
Priyanka Aash
 
WTF is Penetration Testing v.2
Scott Sutherland
 
Best Practices for Leveraging Security Threat Intelligence
AlienVault
 
Berkarir di Cyber Security
Satria Ady Pradana
 
TTPs for Threat hunting In Oil Refineries
Dragos, Inc.
 
Ethical Hacking Redefined
Pawan Patil
 
Spice world 2014 hacker smackdown
AlienVault
 
Supply Chain Attack Backdooring Your Networks
Bangladesh Network Operators Group
 
Ethical hacking
shahhardik27
 

Similar to Extracting the Malware Signal from Internet Noise (20)

PDF
[Hitcon 2019] Some things about recent Internet IoT/ICS attacks - a perspecti...
Canaan Kao
 
PDF
HITB2013AMS Defenting the enterprise, a russian way!
F _
 
PDF
The Big Hairy Edge Device Security Problem
Andrew Morris
 
PDF
2023 NCIT: Introduction to Intrusion Detection
APNIC
 
PDF
Threat Con 2021: What's Hitting my Honeypots
APNIC
 
PDF
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
PROIDEA
 
PPTX
Defend-Against-Next-Gen-Attacks-with-Wire-Data-by-Pete-Anderson.pptx
adrianitoterremoto
 
PDF
Analyzing and Defending from Modern Internet Threats
NECST Lab @ Politecnico di Milano
 
PDF
IoT Security, Mirai Revisited
Clare Nelson, CISSP, CIPP-E
 
DOC
Discovery of Compromised Machines
Anton Chuvakin
 
PDF
Global threat-landscape report by fortinet.
Reham Maher El-Safarini
 
PDF
Avast @ Machine Learning
Avast
 
PDF
Detection of Spreading Process on many assets over the network
Security Bootcamp
 
PDF
CommunicAsia 2021: What is hitting my honeypots?
APNIC
 
PDF
Visualizing Threats: Network Visualization for Cyber Security
Cambridge Intelligence
 
PDF
GreyNoise - Mass Exploitation
Andrew Morris
 
PDF
Watchtowers of the Internet - Source Boston 2012
Stephan Chenette
 
PDF
Practical Malware Analysis Ch 14: Malware-Focused Network Signatures
Sam Bowne
 
PDF
DDoS Attack on DNS using infected IoT Devices
Seungjoo Kim
 
ODP
Security its-more-than-just-your-database-you-should-worry-about
David Busby, CISSP
 
[Hitcon 2019] Some things about recent Internet IoT/ICS attacks - a perspecti...
Canaan Kao
 
HITB2013AMS Defenting the enterprise, a russian way!
F _
 
The Big Hairy Edge Device Security Problem
Andrew Morris
 
2023 NCIT: Introduction to Intrusion Detection
APNIC
 
Threat Con 2021: What's Hitting my Honeypots
APNIC
 
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
PROIDEA
 
Defend-Against-Next-Gen-Attacks-with-Wire-Data-by-Pete-Anderson.pptx
adrianitoterremoto
 
Analyzing and Defending from Modern Internet Threats
NECST Lab @ Politecnico di Milano
 
IoT Security, Mirai Revisited
Clare Nelson, CISSP, CIPP-E
 
Discovery of Compromised Machines
Anton Chuvakin
 
Global threat-landscape report by fortinet.
Reham Maher El-Safarini
 
Avast @ Machine Learning
Avast
 
Detection of Spreading Process on many assets over the network
Security Bootcamp
 
CommunicAsia 2021: What is hitting my honeypots?
APNIC
 
Visualizing Threats: Network Visualization for Cyber Security
Cambridge Intelligence
 
GreyNoise - Mass Exploitation
Andrew Morris
 
Watchtowers of the Internet - Source Boston 2012
Stephan Chenette
 
Practical Malware Analysis Ch 14: Malware-Focused Network Signatures
Sam Bowne
 
DDoS Attack on DNS using infected IoT Devices
Seungjoo Kim
 
Security its-more-than-just-your-database-you-should-worry-about
David Busby, CISSP
 
Ad

Recently uploaded (20)

PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PDF
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
PDF
Blockchain Transactions Explained For Everyone
CIFDAQ
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PDF
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
PDF
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
PPTX
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PPTX
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
PDF
Python basic programing language for automation
DanialHabibi2
 
PPTX
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
PDF
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
Blockchain Transactions Explained For Everyone
CIFDAQ
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
Python basic programing language for automation
DanialHabibi2
 
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
Ad

Extracting the Malware Signal from Internet Noise

  • 1. Extracting the Malware Signal from Internet Noise Andrew Morris, Researcher 1
  • 2. # whoami • Andrew Morris • Background in offense • R&D @ Endgame 2
  • 3. Tactical Insights from Global Trends • My network is being scanned/attacked – Am I being targeted specifically? – Are other people seeing this as well? • A vulnerability has been disclosed – Is anyone probing for this vulnerability? – Is anyone exploiting this vulnerability? 3
  • 4. 4 Faraday A Global Network of Sensors Untargeted Malware Geographically & Logically Dispersed Omnidirectional Internet Traffic for Collection & Analysis If something is *not* in Faraday, it is likely targeted
  • 7. Four Kinds of Traffic on Your Network The difference between these can be hundreds of thousands of $$ in incident response Worm, Mass Exploit Campaign Regular Web User Advanced Persistent Threat Search Engines (e.g. Google) MaliciousBenign Omnidirectional Targeted 7
  • 8. My Network is Being Attacked Omnidirectional Malicious $ faraday --ip 123.123.123.123 | wc -l 42013 Targeted Malicious $ faraday --ip 1.2.3.4| wc -l 0 8
  • 9. A Vulnerability Has Been Disclosed • Is anyone probing for this vulnerability? • Is anyone massively exploiting this vulnerability? 9
  • 10. Cisco CVE-2016-1287 Cisco ASA Software IKEv1 and IKEv2 Buffer Overflow Vulnerability • Critical • Disclosed Feb 10, 2016 • Affects all Cisco ASAs 0 500 1000 1500 2000 2500 3000 Faraday Port 500 Faraday Port 500 10
  • 11. Cisco CVE-2016-1287 The spike and diversity of IP addresses over time implies: • People are not just probing, but actively targeting it • Where they are coming from • Who may have known about the vulnerability prior to public disclosure • It is not (yet) being massively exploited 11
  • 12. Redis CVE-2015-4335 • Remote code execution vulnerability in Redis – Built and deployed a custom Redis sensor less than 24 hours after the vulnerability was published – Observed attacker behavior – Recorded attacker IP addresses 12
  • 13. CVE-????-???? • Traffic observed targeted unknown devices • No known vulnerabilities on services running on those ports 13
  • 14. Fun Stuff • Data Science Early Warning Applications • Dangling DNS • Bandwidth budget calculation • Worm tracking • Search engine spoofing • Reflected DDOS attacks • Provider threat model 14
  • 15. Really Fun Stuff • Integration into Endgame cyber operations platform – Visibility into novel attacker techniques – Ability to collect new malware samples – Input into reputation services – Situational awareness
  • 16. Conclusion • Whether an attack is targeted or not • Derive Internet-wide vulnerability exploitation attempts • Collect omnidirectionally targeted malware samples 16

Editor's Notes

  • #4: Changed title - was ‘Problems’
  • #5: See slide 19 for previous version, here’s the text for you to either speak to or add back in case I emphasized the wrong points: Network of sensors Geographically and locally diverse Collect, catalogue, and analyze omnidirectional Internet traffic If something is *not* in Faraday, it is targeted By collecting all omnidirectional traffic, we can reduce it from regular traffic Distinguish all “background noise” Collect untargeted malware
  • #6: I stole the check marks from Phil’s – I kind of like that it adds color, and reinforces the positive, but can easily be convinced they aren’t necessary See slide 22, 23 for previous versions
  • #7: See hidden slide 20 for original version
  • #8: See hidden slide 21 for previous version
  • #9: Got rid of scanned in the header since it only covers malicious in the body; see slide 24 for original
  • #10: Combined this with a build out to lead into the example
  • #11: See slide 25 for original – added graph and reorganized Yellow circle only appears on a build, you can delete, but may be useful visually to show how small the numbers were prior, not that it was non-existent Should the title of the graph have ‘scans’ or something like that after Port 500? Omitted the following text from the next slide “Huge spike in relevant traffic when this vulnerability was disclosed” as you can speak to it here with the chart, and it segues well to next slide.
  • #12: When I was working on this earlier today, Bobby came by and noted this would be a good place to reiterate probing vs exploited with the language I gave it. It was previously: Faraday told us: Yes, people are actively probing for this Where they were coming from Who may have known about the vulnerability prior to public disclosure Is it not (yet) being massively exploited
  • #15: Added early warning with data science
  • #17: Removed the ‘or not’s, since that is implied
  • #28: I stole the check marks from Phil’s – I kind of like that it adds color, and reinforces the positive, but can easily be convinced they aren’t necessary See slide 22, 23 for previous versions