SlideShare a Scribd company logo
Trends in Network Security Ben Feinstein, CISSP GCFA Director of Research SecureWorks Counter Threat Unit℠ Friday, April 23 rd , 2010 Informática64 Móstoles, Spain
Introduction
Who Am I? Native of Atlanta, Georgia USA 12 years old, dial-up UNIX shell, telneting around the world Professional software developer as a teenager Bachelor of Science in Computer Science (c. Economics), 2001 Harvey Mudd College, Claremont, California USA Author of RFC 4765 and RFC 4767 Software Engineer at a series of security start-ups, 2001 – 2006 Joined SecureWorks in 2006 Certified Information Systems Security Professional (CISSP) SANS Global Information Assurance Certified Forensics Analyst (GCFA)
Who is SecureWorks? Market leading provider of information security services Managed Security Services Provider (MSSP) Security and Risk Consulting (SRC) Over 2,700 clients worldwide, including more than 10% of Fortune 500 Suite of managed information and network security services Security Information Management (SIM) On Demand Log Monitoring Intrusion Prevention Systems (IPS) / Intrusion Detection Systems (IDS) Threat Intelligence Firewall Host IPS Vulnerability Scanning Web Application Scanning Log Retention Encrypted Email
Agenda
Agenda Computer Networks Vulnerability Trends of 2009 Malware Trends of 2009 Information Disclosure Aurora Other Trends The New .CN Mariposa / ButterflyBot Conclusion Q & A
From Mainframes to Today’s Internet
The Development of Computer Networks Advanced Research Projects Agency (ARPA) Established in 1958 after Soviet launch of Sputnik satellite in 1957 Later renamed the Defense Advanced Research Projects Agency (DARPA) Directly manages a $3.2B budget ARPANET developed by ARPA for US Department of Defense (DoD) Development work began in 1969
Decentralization of Computing Power Mainframes gave way to Personal Computers (PCs) Development of Local Area Networks (LANs) Dial-up Internet Broadband Internet
ARPANET, circa March 1977
Map of Internet Routers (2005), Opte Project http://www.opte.org/
Map of Online Communities, xkcd #256 http://xkcd.com/256/ , Spring 2007
Some (Much) Older Networks to Remember Hawala Pony Express Source: International Monetary Fund
Network Security
The Network as an Attack Surface Concept of Threat Modeling Concept of an Attack Surface Local Attacks vs. Remote Attacks Common Vulnerability Scoring System (CVSS) version 2 Exploitability metrics Access Vector: Local, Adjacent Network, Network Widespread adoption of Firewalls Widespread adoption of the Web Web 2.0
Vulnerability Trends of 2009
2009 Vulnerability Trends Vulnerabilities disclosed for document readers and editors soared. Office documents including spreadsheets and presentations Portable Document Format (PDF) documents – the dubious champ Favorite vector of “Spear Phishers”, including “Operation Aurora” The appearance of new malicious Web links has skyrocketed globally in the past year.  Phishing, Malvertisements, Fake-AV, etc. A large number of sophisticated web-attack toolkits are available for sale. CSS and SQLi attacks primarily used to redirect web-surfers to an attack-toolkit! Phishing attacks via email increased dramatically in the second half of 2009, with activity coming from countries not previously been in the game.  Attackers are shifting their geographical profiles due to various pressures Lots and lots of money to be made
Vulnerability Metrics for 2H 2009
Malware Trends of 2009
2009 Malware Trends Malware authors and operators innovated Koobface, Mariposa (Butterfly Bot), Zbot (ZeuS), and Mebroot increased compatibility with Vista and Windows 7 Complex and user friendly Banking Trojans (ZeuS, SpyEye, BlackEnergy2) are available as configurable kits Sophisticated RATs (e.g. Aurora’s “Hydraq”) are also in use Better prepared for takedowns and other countermeasures Lessons learned from the days of The RBN Taking advantage of “cloud” services – virtualized hosting environments, geographically distributed content delivery networks, and dynamic DNS services DNS double and triple-flux technologies
2009 Malware Trends Man in the browser/endpoint  Trojan Horse is used to intercept and manipulate calls between the main application’s executable (the browser) and its security mechanisms or libraries  Common objective of this attack is to cause financial fraud by manipulating transactions of Internet banking systems, even when other authentication factors are in use High-dollar Commercial OLB creds - compromised Challenge secret questions – compromised IP Geo-location - compromised Email out-of-band - compromised Hardware token - compromised Device fingerprinting - compromised Dual approver - compromised SMS out-of-band - compromised
2009 Malware Trends Compromised web pages frequently vehicle of choice for mass malware distribution Hence, most servers are compromised in order to compromise client Those clients may then be used to compromise servers inside the enterprise! (Aurora!) Drive-by downloads – malware code using everything from simple UU-encoding techniques to elaborate self-decoding JavaScripts  Sophisticated software development Authors of malware kits (Trojan toolkits, web-attack toolkits,  droppers, rootkits, etc.) are becoming very responsive to their client-base and are producing highly usable, modular and upgradeable software at a tremendous rate. For instance, the BlackEnergy2 Trojan-builder kit has a fully modular plug-in architecture which allows for the separate sale of plug-ins for different purposes and designed to target specific PKI schemes, etc.
2009 Malware Trends Greater efficiency and targeting Dasient: 5.5 million web pages on 560,000 websites infected with malware Q4 2009.  Two years ago, infected web pages would infect users' computers with an average of at least a dozen pieces of malware; the most recent figures have that number falling to just 2.8 Smaller number of malicious programs means that users are less likely to notice an attack. Operators learning valuable business lessons Operate 24/7 network of login-interceptors for high-value accounts Operators are singling out SMBs that tend to have cash on hand and no real IT Extremely sophisticated and profitable money-mule/laundering infrastructure now exists
 
Contemporary ACH / Wire Fraud Automated Clearing House (ACH) 1 - 4 victims / day Average take $100,000 / victim $500K - $1M/week $100M attempted in 2009 $40M+ unrecovered > All US bank robberies combined Losses borne by victims due to ACH rules ALL done by ONE Eastern European crew
Recent ACH Fraud Cases XXXX County - $415,000 XXXX Corp - $447,000 XXXX Energy - $200,000 XXXX Construction - $588,000 XXXX Industrial - $1,200,000 XXXX School District - $117,000 XXXX XXXX School - $150,000 XXXX University - $189,000
Source: myNetWatchman
Source: myNetWatchman
Source: myNetWatchman
Information Disclosure: Lessons from Airplanes and ATMs
Information Disclosure Failing to redact documents correctly Not removing document metadata Not sanitizing hard drives and other media Unencrypted data
Information Disclosure TSA published a SOP manual with sensitive information redacted
Information Disclosure The TSA added black bars on top of text and images to prevent it from being seen
Information Disclosure The NSA specifically states that this will not work in their manual on redacting safely: Google: “Redact Confidence”
Information Disclosure [Source:  Redacting with Confidence: How to Safely Publish Sanitized Reports Converted From Word to PDF]
Information Disclosure 40% of hard drives purchased from eBay contain personal information 36% Financial data 21% Emails 11% Corporate Documents  [source:  Kessler International]  Wipe drives before they leave your control There are several bootable programs that will wipe all media attached to a computer  DBAN – Darik’s Boot and Nuke
Information Disclosure A security researcher purchased an ATM via Craig’s List He found 1,000 debit card numbers stored in the machine Who has access to your data? What are their controls on it?
Imperva notified rockyou.com of a SQL injection flaw on Dec 4 th Rockyou.com fixed the problem over the weekend The database stored passwords in plaintext A hacker disclosed that he had copied the entire database before the flaw was fixed Information Disclosure
Information Disclosure The database contains the usernames and passwords for over 32 million account Included in the database were also passwords for partner websites This is a classic example of where defense in depth would have offered superior protection
Aurora
Background: Titan Rain intrusion set An intrusion set is a collection of evidence, data, artifacts, logs, malware samples or other items that is all related in some way Titan Rain was one such intrusion set Coordinated intrusions of US Gov’t & Defense Industrial Base, circa 2003 Labeled as Chinese in origin Nature of and identities of adversaries unknown
Background: Advanced Persistent Threat (APT) Advanced: Adversary has capability to use anything from simple, public exploits to performing their own vulnerability discovery work and developing 0-day attacks. Persistent: Adversary has well defined goals and objectives and is persistent at pursuing them. Adversary will try various avenues of attack, looking for one that will yield the desired outcome. Does not typically refer to things like ZeuS
Aurora Publicly disclosed hacking incident inside Google and other major companies Belief within infosec community that PRC has been waging a long term, persistent campaign of “espionage-by-malware” Titan Rain, GhostNet Grown bolder over time
Aurora In May of 2009 a number of actors in Mainland China began a targeted attack on Google and several other major US-Based corporations with the intent of exfiltrating sensitive data for political and financial gain. The Aurora team used a privately-held IE-7 0-day exploit as well as an Adobe PDF vulnerability to infect workstations at Google and others with sophisticated RATs Social-engineering using methods similar to Fake-AV campaigns was also used Once the Aurora team had access to internal systems, they quickly compromised source-code repositories, email databases, and other extremely sensitive financial and operational data from the inside
Aurora “ Aurora” is taken directly from strings within some custom software components of the attack Debug symbol file path in custom code
Aurora Known samples of main backdoor trojan used in attacks no older than 2009 Attack may have been in works for some time Custom modules in Aurora codebase with timestamps as old as May 2006 Timeframe just after Titan Rain had blown up and PRC’s limited arsenal of mostly “COTS” trojans were being increasingly detected by commercial AV
Aurora With a completely original code base and its use restricted to highly targeted attacks, Hydraq seems to have escaped detection until now Compiler leaves many clues in a binary PE resource section may reveal language code Aurora author was careful to either compile on English-language system, or to modify the language code in the binary after the fact
Aurora Peculiarities and origins of CRC algorithm used suggest author familiar w/ simplified Chinese
Aurora Partial JavaScript code used to exploit Google If only they were using Chrome…
New Details Emerge April 19 – New York Times reported that Aurora stole source code to Google’s single sign-on (SSO) system “Gaia” “ Cyberattack on Google Said to Hit Password System”, John Markoff Aurora had access to “Moma”, Google’s internal employee database May have used information from Moma to target the individual developers working on Gaia Source code exfiltrated to Rackspace servers, and then onto ???
Other Trends
Other Trends Social engineering Phishing / Spearphishing E.g., Rogue AV Hybrid attacks Targeted verticals and enterprises Advanced Trojans Social Networks (Facebook, Twitter) Trusted relationships Superb ROI platform for URL-based attacks Botnet sophistication and innovation Spread of infection by reputable or legit websites continuously evolving  attacks and malware methods Threats come more from organized crime However, involvement of state actors has finally come to the forefront
Other Trends 0-day black market Premium paid for 0-days Tipping Point has heard of governments offering $1 million for a good one Good guys can’t compete at those prices ‘ Aurora’ used an IE 0-day that it had developed Weak economy in US fosters fraudsters’ recruitment of unwitting, desperate money mules Weak economy abroad has led to a large number of highly skilled IT experts in desperate situations Global cooperation in these cases is still in its infancy
Other Trends Clients vs. Servers For the moment, the pendulum has swung away from servers Servers are now more likely to be compromised as a means to compromise a large number of clients While the very large financial database breaches do occur, they are now more likely  to come from a compromised workstation with privileged access on the inside The weakest-link rule is true now more than ever
The new .CN
The new .CN In December 2009, published a bulletin regarding new restrictions on purchasing .CN ccTLD domain names The new restrictions consisted of: Webmasters to submit paper application and show ID when registering a domain name Business license if applicable  Have to submit the information within 5 days or risk losing the domain Continued to monitor domains hosting malicious executables and have noticed an interesting trend Domains registered with a ccTLD of .CN have slightly declined where domains registered with a ccTLD of .IN have started to increase starting right around the timeframe of the CNNIC announcement
The new .CN
The new .CN .RU domains have also seen an increase since the .CN registration requirements were announced. RU-CENTER has stated they will implement rules similar to CNNIC starting April 1st
The new .CN
Mariposa / ButterflyBot
Mariposa / ButterflyBot Publicly sold botnet kit called “BFBOT” Distributed as binary “builder” kit, full source code is not available Author has since “retired”, but perhaps not Very typical of generic botnet kits, e.g. Rbot, Agobot, Phatbot Uses console-based master control program Not likely to catch on with script kiddies due to complexity of setup/use and lack of new development
Mariposa / ButterflyBot Named after a domain that it was contacting butterfly [dot] sinip [dot] es Initially discovered early 2009 Sold on bfsecurity.net “ Security tool designed to stealthy run on winnt based systems (win2k to winvista) and to stealthy and efficiently spread with 3 spreaders, which were specially designed and improved compared to already known public methods. (sic)” The three spreaders are MSN, USB, and P2P. Listed P2P networks were “ares, bearshare, imesh, shareaza, kazaa, dcplusplus, emule, emuleplus, limewire. (sic)”
Commercial Market for ButterflyBot Source: Panda Security
ButterflyBot Capabilities Information Theft  Steal data from Internet Explorer (protected storage and Autocomplete (IE 7+) password stealing) Mozilla Firefox (stored passwords stealing) Downloader Download files via HTTP and execute them on the infected computer DDoS TCP SYN or UDP packet flooding Propagation MSN Instant Messenger USB autorun Copying itself to well-known P2P application download directories VNC Server Scan Scan for VNC (Virtual Network Computing) servers that may allow AUTHBYPASS or NOAUTH access.
ButterflyBot Console Source: Symantec
ButterflyBot Master Client Source: Panda Security
ButterflyBot Configuration Tool Source: Panda Security
Mariposa Takedown Botnet size fluctuated between 500K and 1 million infected hosts spanning more then 190 countries Botmasters made money by allowing other cybercrooks to utilize parts of the botnet This lead to a variety of malware being installed Advanced keyloggers Various Banking trojans RATs (Remote access Trojans) Fake AV
Mariposa Takedown Due to a coordinated effort between law enforcement and the security community, three individuals were identified and arrested “ netkairo” of Balmaseda age 31 “ jonyloleante” of Molina de Segura age 30 “ ostiator“ of Santiago de Compostela age 25 Action taken on domains December 23, 2009 at 1700 Spanish time US FBI and Spanish Civil Guard Believed that suspects would be less able to react due to Christmas holiday and time with family Suspects unknown, using VPNs from Swedish provider Relakks During counter attack, “netkairo” make a fatal mistake Did not use VPN, revealed IP address in Spain IP provided to Civil Guard
Mariposa Takedown “ netkairo” apprehended by agents of the Civil Guard on February 12, 2010 at his home in Balmaseda, Spain Digital forensics of seized computers lead to 2 further arrests in Spain Cases in front of Judge Garzón of the National Court
Conclusion
Conclusion Defenders remain at a significant disadvantage Must attack both sides of the risk vs. reward equation Closer cooperation is needed between security community and law enforcement Human weakness is arguably more important than technological vulnerabilities in today’s cyber crime ecosystem Attractive ROI of Social Engineering
Q & A
Special Thanks Chema Alonso & Informática64 Maite Villalba and the Universidad Europea de Madrid You, my audience!

More Related Content

PPT
Network security
Vikas Jagtap
 
PPTX
Network security
Simranpreet Singh
 
PPTX
Modern Network Security Issue and Challenge
Ikhtiar Khan Sohan
 
PDF
Network Security Fundamentals
Fat-Thing Gabriel-Culley
 
PDF
Computer Network Security
Sachithra Gayan
 
PDF
Network security - OSI Security Architecture
BharathiKrishna6
 
PPTX
02 introduction to network security
Joe McCarthy
 
Network security
Vikas Jagtap
 
Network security
Simranpreet Singh
 
Modern Network Security Issue and Challenge
Ikhtiar Khan Sohan
 
Network Security Fundamentals
Fat-Thing Gabriel-Culley
 
Computer Network Security
Sachithra Gayan
 
Network security - OSI Security Architecture
BharathiKrishna6
 
02 introduction to network security
Joe McCarthy
 

What's hot (20)

PPTX
Network security
fatimasaham
 
PPTX
Network security and firewalls
Murali Mohan
 
PPTX
Network Security Issues
AfreenYousaf
 
PPTX
Network security
Nkosinathi Lungu
 
PDF
Wireless Security Needs For Enterprises
shrutisreddy
 
PPTX
Privacy & Security Aspects in Mobile Networks
DefCamp
 
PPTX
Network Security: Attacks, Tools and Techniques
waqasahmad1995
 
PPTX
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Seqrite
 
PDF
Secure and distributed data discovery and dissemination in wireless sensor ne...
LeMeniz Infotech
 
PPT
Network management and security
Ankit Bhandari
 
PPT
Network Security
Raymond Jose
 
PPTX
Presentation network security
cegonsoft1999
 
PDF
Approach of Data Security in Local Network Using Distributed Firewalls
International Journal of Science and Research (IJSR)
 
PPTX
امن نظم المعلومات وامن الشبكات
Amr Rashed
 
PPTX
A framework for securing wireless home networks 1
Ryan Mc Donagh
 
PPT
Ch06 Wireless Network Security
Information Technology
 
PPTX
Network security
Harsh Kishore Mishra
 
PPT
Network security
Ali Kamil
 
PDF
Network security for E-Commerce
Hem Pokhrel
 
Network security
fatimasaham
 
Network security and firewalls
Murali Mohan
 
Network Security Issues
AfreenYousaf
 
Network security
Nkosinathi Lungu
 
Wireless Security Needs For Enterprises
shrutisreddy
 
Privacy & Security Aspects in Mobile Networks
DefCamp
 
Network Security: Attacks, Tools and Techniques
waqasahmad1995
 
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Seqrite
 
Secure and distributed data discovery and dissemination in wireless sensor ne...
LeMeniz Infotech
 
Network management and security
Ankit Bhandari
 
Network Security
Raymond Jose
 
Presentation network security
cegonsoft1999
 
Approach of Data Security in Local Network Using Distributed Firewalls
International Journal of Science and Research (IJSR)
 
امن نظم المعلومات وامن الشبكات
Amr Rashed
 
A framework for securing wireless home networks 1
Ryan Mc Donagh
 
Ch06 Wireless Network Security
Information Technology
 
Network security
Harsh Kishore Mishra
 
Network security
Ali Kamil
 
Network security for E-Commerce
Hem Pokhrel
 
Ad

Similar to Trends in network security feinstein - informatica64 (20)

DOCX
Cyber Security DepartmentGraduation Project (407422)
OllieShoresna
 
PPTX
Cyber Security
BryCunal
 
PDF
Anatomy of a cyber attack
Mark Silver
 
PDF
Information security
Appin Faridabad
 
DOCX
4777.team c.final
AlexisHarvey8
 
PDF
Corporate threat vector and landscape
yohansurya2
 
PDF
C018131821
IOSR Journals
 
PPT
Event - Internet Thailand - Total Security Perimeters
Somyos U.
 
DOCX
cybersecurity essay.docx
ssuser719d6b
 
PPT
The Consumerisation of Corporate IT
Peter Wood
 
PPT
Information security in todays world
Sibghatullah Khattak
 
PPTX
Emerging Threats to Infrastructure
Jorge Orchilles
 
PDF
Cisco 2014 Midyear Security Report
Cisco Security
 
PDF
Toward Continuous Cybersecurity With Network Automation
Ken Flott
 
PDF
Toward Continuous Cybersecurity with Network Automation
E.S.G. JR. Consulting, Inc.
 
PDF
Cybersecurity Goes Mainstream
Rob Marson
 
Cyber Security DepartmentGraduation Project (407422)
OllieShoresna
 
Cyber Security
BryCunal
 
Anatomy of a cyber attack
Mark Silver
 
Information security
Appin Faridabad
 
4777.team c.final
AlexisHarvey8
 
Corporate threat vector and landscape
yohansurya2
 
C018131821
IOSR Journals
 
Event - Internet Thailand - Total Security Perimeters
Somyos U.
 
cybersecurity essay.docx
ssuser719d6b
 
The Consumerisation of Corporate IT
Peter Wood
 
Information security in todays world
Sibghatullah Khattak
 
Emerging Threats to Infrastructure
Jorge Orchilles
 
Cisco 2014 Midyear Security Report
Cisco Security
 
Toward Continuous Cybersecurity With Network Automation
Ken Flott
 
Toward Continuous Cybersecurity with Network Automation
E.S.G. JR. Consulting, Inc.
 
Cybersecurity Goes Mainstream
Rob Marson
 
Ad

More from Chema Alonso (20)

PPTX
CyberCamp 2015: Low Hanging Fruit
Chema Alonso
 
PDF
Índice Pentesting con Kali 2.0
Chema Alonso
 
PDF
Configurar y utilizar Latch en Magento
Chema Alonso
 
PPTX
Cazando Cibercriminales con: OSINT + Cloud Computing + Big Data
Chema Alonso
 
PDF
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
Chema Alonso
 
PDF
CritoReto 4: Buscando una aguja en un pajar
Chema Alonso
 
PDF
Dorking & Pentesting with Tacyt
Chema Alonso
 
PDF
Pentesting con PowerShell: Libro de 0xWord
Chema Alonso
 
PDF
Foca API v0.1
Chema Alonso
 
PDF
Recuperar dispositivos de sonido en Windows Vista y Windows 7
Chema Alonso
 
PPTX
It's a Kind of Magic
Chema Alonso
 
PPTX
Ingenieros y hackers
Chema Alonso
 
PDF
Cuarta Edición del Curso Online de Especialización en Seguridad Informática p...
Chema Alonso
 
PDF
Auditoría de TrueCrypt: Informe final fase II
Chema Alonso
 
PPTX
El juego es el mismo
Chema Alonso
 
PDF
El Hardware en Apple ¿Es tan bueno?
Chema Alonso
 
PDF
Latch en Linux (Ubuntu): El cerrojo digital
Chema Alonso
 
PDF
Hacking con Python
Chema Alonso
 
PPTX
Shuabang Botnet
Chema Alonso
 
PPTX
Tu iPhone es tan (in)seguro como tu Windows
Chema Alonso
 
CyberCamp 2015: Low Hanging Fruit
Chema Alonso
 
Índice Pentesting con Kali 2.0
Chema Alonso
 
Configurar y utilizar Latch en Magento
Chema Alonso
 
Cazando Cibercriminales con: OSINT + Cloud Computing + Big Data
Chema Alonso
 
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
Chema Alonso
 
CritoReto 4: Buscando una aguja en un pajar
Chema Alonso
 
Dorking & Pentesting with Tacyt
Chema Alonso
 
Pentesting con PowerShell: Libro de 0xWord
Chema Alonso
 
Foca API v0.1
Chema Alonso
 
Recuperar dispositivos de sonido en Windows Vista y Windows 7
Chema Alonso
 
It's a Kind of Magic
Chema Alonso
 
Ingenieros y hackers
Chema Alonso
 
Cuarta Edición del Curso Online de Especialización en Seguridad Informática p...
Chema Alonso
 
Auditoría de TrueCrypt: Informe final fase II
Chema Alonso
 
El juego es el mismo
Chema Alonso
 
El Hardware en Apple ¿Es tan bueno?
Chema Alonso
 
Latch en Linux (Ubuntu): El cerrojo digital
Chema Alonso
 
Hacking con Python
Chema Alonso
 
Shuabang Botnet
Chema Alonso
 
Tu iPhone es tan (in)seguro como tu Windows
Chema Alonso
 

Trends in network security feinstein - informatica64

  • 1. Trends in Network Security Ben Feinstein, CISSP GCFA Director of Research SecureWorks Counter Threat Unit℠ Friday, April 23 rd , 2010 Informática64 Móstoles, Spain
  • 3. Who Am I? Native of Atlanta, Georgia USA 12 years old, dial-up UNIX shell, telneting around the world Professional software developer as a teenager Bachelor of Science in Computer Science (c. Economics), 2001 Harvey Mudd College, Claremont, California USA Author of RFC 4765 and RFC 4767 Software Engineer at a series of security start-ups, 2001 – 2006 Joined SecureWorks in 2006 Certified Information Systems Security Professional (CISSP) SANS Global Information Assurance Certified Forensics Analyst (GCFA)
  • 4. Who is SecureWorks? Market leading provider of information security services Managed Security Services Provider (MSSP) Security and Risk Consulting (SRC) Over 2,700 clients worldwide, including more than 10% of Fortune 500 Suite of managed information and network security services Security Information Management (SIM) On Demand Log Monitoring Intrusion Prevention Systems (IPS) / Intrusion Detection Systems (IDS) Threat Intelligence Firewall Host IPS Vulnerability Scanning Web Application Scanning Log Retention Encrypted Email
  • 6. Agenda Computer Networks Vulnerability Trends of 2009 Malware Trends of 2009 Information Disclosure Aurora Other Trends The New .CN Mariposa / ButterflyBot Conclusion Q & A
  • 7. From Mainframes to Today’s Internet
  • 8. The Development of Computer Networks Advanced Research Projects Agency (ARPA) Established in 1958 after Soviet launch of Sputnik satellite in 1957 Later renamed the Defense Advanced Research Projects Agency (DARPA) Directly manages a $3.2B budget ARPANET developed by ARPA for US Department of Defense (DoD) Development work began in 1969
  • 9. Decentralization of Computing Power Mainframes gave way to Personal Computers (PCs) Development of Local Area Networks (LANs) Dial-up Internet Broadband Internet
  • 11. Map of Internet Routers (2005), Opte Project http://www.opte.org/
  • 12. Map of Online Communities, xkcd #256 http://xkcd.com/256/ , Spring 2007
  • 13. Some (Much) Older Networks to Remember Hawala Pony Express Source: International Monetary Fund
  • 15. The Network as an Attack Surface Concept of Threat Modeling Concept of an Attack Surface Local Attacks vs. Remote Attacks Common Vulnerability Scoring System (CVSS) version 2 Exploitability metrics Access Vector: Local, Adjacent Network, Network Widespread adoption of Firewalls Widespread adoption of the Web Web 2.0
  • 17. 2009 Vulnerability Trends Vulnerabilities disclosed for document readers and editors soared. Office documents including spreadsheets and presentations Portable Document Format (PDF) documents – the dubious champ Favorite vector of “Spear Phishers”, including “Operation Aurora” The appearance of new malicious Web links has skyrocketed globally in the past year. Phishing, Malvertisements, Fake-AV, etc. A large number of sophisticated web-attack toolkits are available for sale. CSS and SQLi attacks primarily used to redirect web-surfers to an attack-toolkit! Phishing attacks via email increased dramatically in the second half of 2009, with activity coming from countries not previously been in the game. Attackers are shifting their geographical profiles due to various pressures Lots and lots of money to be made
  • 20. 2009 Malware Trends Malware authors and operators innovated Koobface, Mariposa (Butterfly Bot), Zbot (ZeuS), and Mebroot increased compatibility with Vista and Windows 7 Complex and user friendly Banking Trojans (ZeuS, SpyEye, BlackEnergy2) are available as configurable kits Sophisticated RATs (e.g. Aurora’s “Hydraq”) are also in use Better prepared for takedowns and other countermeasures Lessons learned from the days of The RBN Taking advantage of “cloud” services – virtualized hosting environments, geographically distributed content delivery networks, and dynamic DNS services DNS double and triple-flux technologies
  • 21. 2009 Malware Trends Man in the browser/endpoint Trojan Horse is used to intercept and manipulate calls between the main application’s executable (the browser) and its security mechanisms or libraries Common objective of this attack is to cause financial fraud by manipulating transactions of Internet banking systems, even when other authentication factors are in use High-dollar Commercial OLB creds - compromised Challenge secret questions – compromised IP Geo-location - compromised Email out-of-band - compromised Hardware token - compromised Device fingerprinting - compromised Dual approver - compromised SMS out-of-band - compromised
  • 22. 2009 Malware Trends Compromised web pages frequently vehicle of choice for mass malware distribution Hence, most servers are compromised in order to compromise client Those clients may then be used to compromise servers inside the enterprise! (Aurora!) Drive-by downloads – malware code using everything from simple UU-encoding techniques to elaborate self-decoding JavaScripts Sophisticated software development Authors of malware kits (Trojan toolkits, web-attack toolkits, droppers, rootkits, etc.) are becoming very responsive to their client-base and are producing highly usable, modular and upgradeable software at a tremendous rate. For instance, the BlackEnergy2 Trojan-builder kit has a fully modular plug-in architecture which allows for the separate sale of plug-ins for different purposes and designed to target specific PKI schemes, etc.
  • 23. 2009 Malware Trends Greater efficiency and targeting Dasient: 5.5 million web pages on 560,000 websites infected with malware Q4 2009. Two years ago, infected web pages would infect users' computers with an average of at least a dozen pieces of malware; the most recent figures have that number falling to just 2.8 Smaller number of malicious programs means that users are less likely to notice an attack. Operators learning valuable business lessons Operate 24/7 network of login-interceptors for high-value accounts Operators are singling out SMBs that tend to have cash on hand and no real IT Extremely sophisticated and profitable money-mule/laundering infrastructure now exists
  • 24.  
  • 25. Contemporary ACH / Wire Fraud Automated Clearing House (ACH) 1 - 4 victims / day Average take $100,000 / victim $500K - $1M/week $100M attempted in 2009 $40M+ unrecovered > All US bank robberies combined Losses borne by victims due to ACH rules ALL done by ONE Eastern European crew
  • 26. Recent ACH Fraud Cases XXXX County - $415,000 XXXX Corp - $447,000 XXXX Energy - $200,000 XXXX Construction - $588,000 XXXX Industrial - $1,200,000 XXXX School District - $117,000 XXXX XXXX School - $150,000 XXXX University - $189,000
  • 30. Information Disclosure: Lessons from Airplanes and ATMs
  • 31. Information Disclosure Failing to redact documents correctly Not removing document metadata Not sanitizing hard drives and other media Unencrypted data
  • 32. Information Disclosure TSA published a SOP manual with sensitive information redacted
  • 33. Information Disclosure The TSA added black bars on top of text and images to prevent it from being seen
  • 34. Information Disclosure The NSA specifically states that this will not work in their manual on redacting safely: Google: “Redact Confidence”
  • 35. Information Disclosure [Source: Redacting with Confidence: How to Safely Publish Sanitized Reports Converted From Word to PDF]
  • 36. Information Disclosure 40% of hard drives purchased from eBay contain personal information 36% Financial data 21% Emails 11% Corporate Documents [source: Kessler International] Wipe drives before they leave your control There are several bootable programs that will wipe all media attached to a computer DBAN – Darik’s Boot and Nuke
  • 37. Information Disclosure A security researcher purchased an ATM via Craig’s List He found 1,000 debit card numbers stored in the machine Who has access to your data? What are their controls on it?
  • 38. Imperva notified rockyou.com of a SQL injection flaw on Dec 4 th Rockyou.com fixed the problem over the weekend The database stored passwords in plaintext A hacker disclosed that he had copied the entire database before the flaw was fixed Information Disclosure
  • 39. Information Disclosure The database contains the usernames and passwords for over 32 million account Included in the database were also passwords for partner websites This is a classic example of where defense in depth would have offered superior protection
  • 41. Background: Titan Rain intrusion set An intrusion set is a collection of evidence, data, artifacts, logs, malware samples or other items that is all related in some way Titan Rain was one such intrusion set Coordinated intrusions of US Gov’t & Defense Industrial Base, circa 2003 Labeled as Chinese in origin Nature of and identities of adversaries unknown
  • 42. Background: Advanced Persistent Threat (APT) Advanced: Adversary has capability to use anything from simple, public exploits to performing their own vulnerability discovery work and developing 0-day attacks. Persistent: Adversary has well defined goals and objectives and is persistent at pursuing them. Adversary will try various avenues of attack, looking for one that will yield the desired outcome. Does not typically refer to things like ZeuS
  • 43. Aurora Publicly disclosed hacking incident inside Google and other major companies Belief within infosec community that PRC has been waging a long term, persistent campaign of “espionage-by-malware” Titan Rain, GhostNet Grown bolder over time
  • 44. Aurora In May of 2009 a number of actors in Mainland China began a targeted attack on Google and several other major US-Based corporations with the intent of exfiltrating sensitive data for political and financial gain. The Aurora team used a privately-held IE-7 0-day exploit as well as an Adobe PDF vulnerability to infect workstations at Google and others with sophisticated RATs Social-engineering using methods similar to Fake-AV campaigns was also used Once the Aurora team had access to internal systems, they quickly compromised source-code repositories, email databases, and other extremely sensitive financial and operational data from the inside
  • 45. Aurora “ Aurora” is taken directly from strings within some custom software components of the attack Debug symbol file path in custom code
  • 46. Aurora Known samples of main backdoor trojan used in attacks no older than 2009 Attack may have been in works for some time Custom modules in Aurora codebase with timestamps as old as May 2006 Timeframe just after Titan Rain had blown up and PRC’s limited arsenal of mostly “COTS” trojans were being increasingly detected by commercial AV
  • 47. Aurora With a completely original code base and its use restricted to highly targeted attacks, Hydraq seems to have escaped detection until now Compiler leaves many clues in a binary PE resource section may reveal language code Aurora author was careful to either compile on English-language system, or to modify the language code in the binary after the fact
  • 48. Aurora Peculiarities and origins of CRC algorithm used suggest author familiar w/ simplified Chinese
  • 49. Aurora Partial JavaScript code used to exploit Google If only they were using Chrome…
  • 50. New Details Emerge April 19 – New York Times reported that Aurora stole source code to Google’s single sign-on (SSO) system “Gaia” “ Cyberattack on Google Said to Hit Password System”, John Markoff Aurora had access to “Moma”, Google’s internal employee database May have used information from Moma to target the individual developers working on Gaia Source code exfiltrated to Rackspace servers, and then onto ???
  • 52. Other Trends Social engineering Phishing / Spearphishing E.g., Rogue AV Hybrid attacks Targeted verticals and enterprises Advanced Trojans Social Networks (Facebook, Twitter) Trusted relationships Superb ROI platform for URL-based attacks Botnet sophistication and innovation Spread of infection by reputable or legit websites continuously evolving attacks and malware methods Threats come more from organized crime However, involvement of state actors has finally come to the forefront
  • 53. Other Trends 0-day black market Premium paid for 0-days Tipping Point has heard of governments offering $1 million for a good one Good guys can’t compete at those prices ‘ Aurora’ used an IE 0-day that it had developed Weak economy in US fosters fraudsters’ recruitment of unwitting, desperate money mules Weak economy abroad has led to a large number of highly skilled IT experts in desperate situations Global cooperation in these cases is still in its infancy
  • 54. Other Trends Clients vs. Servers For the moment, the pendulum has swung away from servers Servers are now more likely to be compromised as a means to compromise a large number of clients While the very large financial database breaches do occur, they are now more likely to come from a compromised workstation with privileged access on the inside The weakest-link rule is true now more than ever
  • 56. The new .CN In December 2009, published a bulletin regarding new restrictions on purchasing .CN ccTLD domain names The new restrictions consisted of: Webmasters to submit paper application and show ID when registering a domain name Business license if applicable Have to submit the information within 5 days or risk losing the domain Continued to monitor domains hosting malicious executables and have noticed an interesting trend Domains registered with a ccTLD of .CN have slightly declined where domains registered with a ccTLD of .IN have started to increase starting right around the timeframe of the CNNIC announcement
  • 58. The new .CN .RU domains have also seen an increase since the .CN registration requirements were announced. RU-CENTER has stated they will implement rules similar to CNNIC starting April 1st
  • 61. Mariposa / ButterflyBot Publicly sold botnet kit called “BFBOT” Distributed as binary “builder” kit, full source code is not available Author has since “retired”, but perhaps not Very typical of generic botnet kits, e.g. Rbot, Agobot, Phatbot Uses console-based master control program Not likely to catch on with script kiddies due to complexity of setup/use and lack of new development
  • 62. Mariposa / ButterflyBot Named after a domain that it was contacting butterfly [dot] sinip [dot] es Initially discovered early 2009 Sold on bfsecurity.net “ Security tool designed to stealthy run on winnt based systems (win2k to winvista) and to stealthy and efficiently spread with 3 spreaders, which were specially designed and improved compared to already known public methods. (sic)” The three spreaders are MSN, USB, and P2P. Listed P2P networks were “ares, bearshare, imesh, shareaza, kazaa, dcplusplus, emule, emuleplus, limewire. (sic)”
  • 63. Commercial Market for ButterflyBot Source: Panda Security
  • 64. ButterflyBot Capabilities Information Theft Steal data from Internet Explorer (protected storage and Autocomplete (IE 7+) password stealing) Mozilla Firefox (stored passwords stealing) Downloader Download files via HTTP and execute them on the infected computer DDoS TCP SYN or UDP packet flooding Propagation MSN Instant Messenger USB autorun Copying itself to well-known P2P application download directories VNC Server Scan Scan for VNC (Virtual Network Computing) servers that may allow AUTHBYPASS or NOAUTH access.
  • 66. ButterflyBot Master Client Source: Panda Security
  • 67. ButterflyBot Configuration Tool Source: Panda Security
  • 68. Mariposa Takedown Botnet size fluctuated between 500K and 1 million infected hosts spanning more then 190 countries Botmasters made money by allowing other cybercrooks to utilize parts of the botnet This lead to a variety of malware being installed Advanced keyloggers Various Banking trojans RATs (Remote access Trojans) Fake AV
  • 69. Mariposa Takedown Due to a coordinated effort between law enforcement and the security community, three individuals were identified and arrested “ netkairo” of Balmaseda age 31 “ jonyloleante” of Molina de Segura age 30 “ ostiator“ of Santiago de Compostela age 25 Action taken on domains December 23, 2009 at 1700 Spanish time US FBI and Spanish Civil Guard Believed that suspects would be less able to react due to Christmas holiday and time with family Suspects unknown, using VPNs from Swedish provider Relakks During counter attack, “netkairo” make a fatal mistake Did not use VPN, revealed IP address in Spain IP provided to Civil Guard
  • 70. Mariposa Takedown “ netkairo” apprehended by agents of the Civil Guard on February 12, 2010 at his home in Balmaseda, Spain Digital forensics of seized computers lead to 2 further arrests in Spain Cases in front of Judge Garzón of the National Court
  • 72. Conclusion Defenders remain at a significant disadvantage Must attack both sides of the risk vs. reward equation Closer cooperation is needed between security community and law enforcement Human weakness is arguably more important than technological vulnerabilities in today’s cyber crime ecosystem Attractive ROI of Social Engineering
  • 73. Q & A
  • 74. Special Thanks Chema Alonso & Informática64 Maite Villalba and the Universidad Europea de Madrid You, my audience!

Editor's Notes

  • #4: Harvey Mudd College, Claremont, California USA Co-op with Aerospace Corporation, El Segundo, California USA (2000) Federally Funded Research & Development Corporation (FFRDC) Supports national security, civil and commercial space programs Graduate of FBI Citizens’ Academy
  • #9: ARPA renamed to DARPA in March 1972 Renamed ARPA again in February 1993 Renamed DARPA again in March 1996
  • #14: Hawala – today, “probably used mostly for migrant workers’ remittances to their countries of origin” Chart source: International Monetary Fund, http://www.imf.org/external/pubs/ft/fandd/2002/12/elqorchi.htm Pony Express – 1860-1861; 2,000 miles from Missouri to Sacramento, California; 190 stations spaced at roughly 10 mile intervals (about the maximum distance a horse could run at full gallop). Riders carried along a mochila and changed horses at each station. Replaced by the telegraph.
  • #25: Avprofit says it will pay affiliates roughly $1,000 for every 1,000 times they distribute this installer program, or about $1 per install.
  • #27: Krebs on Security blog, written by Brian Krebs formerly of the Washington Post http://www.krebsonsecurity.com/category/smallbizvictims/ Formerly wrote Security Fix blog for the Washington Post http://voices.washingtonpost.com/securityfix/small_business_victims/ “ Computer Crooks Steal $100,000 from Ill. Town”, 2010-04-06 http://krebsonsecurity.com/2010/04/computer-crooks-steal-100000-from-ill-town/ “ Online Thieves Take $205,000 Bite Out of Missouri Dental Practice”, 2010-03-30 http://krebsonsecurity.com/2010/03/online-thieves-take-205000-bite-out-of-missouri-dental-practice/ “ Organized Crooks Hit NJ Town, Ark. Utility”, 2010-03-22 http://krebsonsecurity.com/2010/03/organized-crooks-hit-nj-town-arizona-utility/
  • #28: Avalanche is fast-flux hosting network similar to Asprox
  • #51: http://www.nytimes.com/2010/04/20/technology/20google.html
  • #61: Reported in the October 2009 CTU Threat Intelligence webinar
  • #62: Reported in the October 2009 CTU Threat Intelligence webinar
  • #64: http://www.pandasecurity.com/homeusers/security-info/217587/information/ButterflyBot.A
  • #66: http://www.symantec.com/connect/blogs/mariposa-butterfly-bot-kit
  • #67: http://www.pandasecurity.com/homeusers/security-info/217587/information/ButterflyBot.A
  • #68: http://www.pandasecurity.com/homeusers/security-info/217587/information/ButterflyBot.A