0nights2011

69
Dissecting unlawful Internet Activities Fyodor Yarochkin @fygrave Armorize Technologies

Upload: blah-

Post on 27-Jan-2015

107 views

Category:

Documents


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: 0nights2011

Dissecting unlawful Internet Activities

Fyodor Yarochkin

@fygraveArmorize Technologies

Page 2: 0nights2011

АГЕНДА

Observations

Case studies

Sampling goods and services

Q & A

(c) 2011 Armorize Technologies

Page 3: 0nights2011

MEET THE AUTHORS

(c) 2011 Armorize Technologies

Page 4: 0nights2011

Our environment

Honeypots (http, ftp, ssh, smtp, ...)

Sandboxes + proactive internet “browsing”

End points around the globe

Public discussion groups of interest: scrapping and indexing

(c) 2011 Armorize Technologies

Page 5: 0nights2011

Overview

(c) 2011 Armorize Technologies

Page 6: 0nights2011

What makes the news..

MALWAREBlack SEO

Fake AVMass Injections

CC abuse

(c) 2011 Armorize Technologies

Page 7: 0nights2011

MAIN ACTORS

KiddiesProfit Oriented

Crime APT

(c) 2011 Armorize Technologies

Page 8: 0nights2011

Range of players!

(c) 2011 Armorize Technologies

Page 9: 0nights2011

Kiddies: hit our honeypots daily :)

(c) 2011 Armorize Technologies

Page 10: 0nights2011

Still live in IRCBOT age

(c) 2011 Armorize Technologies

Page 11: 0nights2011

APT

• Kiddies are not very interesting. Following the APT guys is a bit more fun

APT – advanced persistent threat (made lots of noise after Aurora attacksBut, .. how advanced that is.. really :-))

(c) 2011 Armorize Technologies

Page 12: 0nights2011

APT: attack vectors – often plain silly

(c) 2011 Armorize Technologies

Page 13: 0nights2011

APT: in taiwan

• Targets: academics, post, rail, ..

(c) 2011 Armorize Technologies

Page 14: 0nights2011

APT: main characteristics

• Attacks are planned and methodological

• In many instances – the primary aim of an action is information gathering (i.e. javascript that collects and posts the user environment information)

• Malicious content is well-prepared (digitally signed w/ valid certificates etc etc)

(c) 2011 Armorize Technologies

Page 15: 0nights2011

APT Research from xecure-lab guys

(c) 2011 Armorize Technologies

Page 16: 0nights2011

Aptdeezer: apt analysis platform from xecure-lab

(c) 2011 Armorize Technologies

Page 17: 0nights2011

Businessmen are fun to study:)

Online goods

services

Traffic

(c) 2011 Armorize Technologies

Page 18: 0nights2011

How to steal a million?

(c) 2011 Armorize Technologies

Page 19: 0nights2011

Effectiveness

• Old school: steal it from a bank. Make a lot of noise and either get caught (or run to South America)

• New school: steal a dollar from a million people. It is still a million (and no noise).

(c) 2011 Armorize Technologies

Page 20: 0nights2011

So, where is the money?

CC cashing

Banking credentialsAds (PPC)

Mobile scam

Pharm

Pr0n

DIRECT SOURCES:

Extortions“Software”

INDIRECT SOURCES:

TRAFF Credentials Online goods& services

(c) 2011 Armorize Technologies

Page 21: 0nights2011

TRAFFIC..

• You need users to start visiting your “milking resource” to start with..

(c) 2011 Armorize Technologies

Page 22: 0nights2011

TRAF. COST

• AU - 300-550$

• UK - 220-300$

• IT - 200-350$

• NZ - 200-250$

• ES,DE,FR - 170-250$

• US - 100-150$

• RU, UA, KZ, KG .. 10-40$(c) 2011 Armorize Technologies

Page 23: 0nights2011

Case studies~

(c) 2011 Armorize Technologies

Page 24: 0nights2011

Infrastructure compromise: case study

(c) 2011 Armorize Technologies

Page 25: 0nights2011

UNDER THE HOOD

(c) 2011 Armorize Technologies

Page 26: 0nights2011

Looking into Packet fields

(c) 2011 Armorize Technologies

Page 27: 0nights2011

TRACKING THE GHOST

(c) 2011 Armorize Technologies

Page 28: 0nights2011

HYPO: ATTACK SCENARIO

(c) 2011 Armorize Technologies

Page 29: 0nights2011

RESULTED IN...

http://tools.cisco.com/security/center/viewAlert.x?alertId=17778

(c) 2011 Armorize Technologies

Page 30: 0nights2011

Compromised CAs

• How about combining this and compromised CA?

(c) 2011 Armorize Technologies

Page 31: 0nights2011

WHAT HAD HAPPENED..

Your taffic is mirrored!!

tunnel source <interface>

tunnel destination <badIP>

(c) 2011 Armorize Technologies

Page 32: 0nights2011

How were they 0wn3d?

(c) 2011 Armorize Technologies

Page 33: 0nights2011

AND MORE..

(c) 2011 Armorize Technologies

Page 34: 0nights2011

LESSON LEARNT

• The whole city compromised

• Users infected on the fly. Visiting legimate web sites

• Tricky to investigate

• Affected parties - complete denial

(c) 2011 Armorize Technologies

Page 35: 0nights2011

Other varieties ;-)

(c) 2011 Armorize Technologies

Page 36: 0nights2011

Ad ABUSE: “MALVERTISEMENT”

(c) 2011 Armorize Technologies

Page 37: 0nights2011

Introducing ad. Space hell :)

Source: razorfishmedia.com

(c) 2011 Armorize Technologies

Page 38: 0nights2011

Ad network dynamic bidding

• Ad network dynamic bidding system is asking for abuse :-)

• Decentralized, small players feed data to bigger guys (doubleclick), verification is mostly manual, real-time content tampering is easy, automated target selection, number of mechanisms that prevent click fraud (and makes automated analysis hard!!!)

(c) 2011 Armorize Technologies

Page 39: 0nights2011

MALVERT. Mechanics

iframe

redirect

iframe

redirect

iframe

Iframe to TDS(c) 2011 Armorize Technologies

Page 40: 0nights2011

Malvertisement (cont)

(c) 2011 Armorize Technologies

Page 41: 0nights2011

Malvert: agencies get 0wned

• Pulpomedia incident:

(c) 2011 Armorize Technologies

Page 42: 0nights2011

Extortions going international

(c) 2011 Armorize Technologies

Page 43: 0nights2011

Also spanish version

Credit: http://xylibox.blogspot.com/

(c) 2011 Armorize Technologies

Page 44: 0nights2011

Common characteristics

• Hosting and domain registration

Registration Service Provided By: Bizcn.comWebsite: http://www.cnobin.comWhois Server: whois.bizcn.com

Domain name: bundespol.net

Registrant Contact: Whois Privacy Protection Service Whois Agent [email protected] +86.05922577888 fax: +86.05922577111 No. 61 Wanghai Road, Xiamen Software Park xiamen fujian 361008 cn

person: Ionut Triparemarks: SC GoldenIdeas SRL

address: Str. Drumul Sarii, nr. 57Caddress: Sector 6, Bucuresti

phone: +0744885334abuse-mailbox: [email protected]

nic-hdl: IT1737-RIPEsource: RIPE # Filtered

mnt-by: GOLDENIDEAS-MNT

person: Ionut Triparemarks: SC GoldenIdeas SRL

address: Str. Drumul Sarii, nr. 57Caddress: Sector 6, Bucuresti

phone: +0744885334abuse-mailbox: [email protected]

nic-hdl: IT1737-RIPEsource: RIPE # Filtered

mnt-by: GOLDENIDEAS-MNT

(c) 2011 Armorize Technologies

Page 45: 0nights2011

WAS ON THE NEWS

(c) 2011 Armorize Technologies

Page 46: 0nights2011

COMMON PATTERNS

Exploits Social tricks

(c) 2011 Armorize Technologies

Page 47: 0nights2011

“Social engineering”

(c) 2011 Armorize Technologies

Page 48: 0nights2011

Well-operated :)

• Spreads through advertisements (social engineering and exploits)

• Reboots machine until license is purchased (80USD)

• Provides support hotline (hosted in India)• Uses legimate payment gateways (possible

to do refunds)(c) 2011 Armorize Technologies

Page 49: 0nights2011

Another attack: infrastructure

(c) 2011 Armorize Technologies

Page 50: 0nights2011

Infrastructure

Speedtest.net

Ads.ookla.com

http://35ksegugsfkfue.cx.cc(c) 2011 Armorize Technologies

Page 51: 0nights2011

TDS systems: TRAFF marketplace

(c) 2011 Armorize Technologies

Page 52: 0nights2011

COMMON TDS

(c) 2011 Armorize Technologies

Page 53: 0nights2011

TDS + verification srv

(c) 2011 Armorize Technologies

Page 54: 0nights2011

SEO:Another option

• Black SEO:

(c) 2011 Armorize Technologies

Page 55: 0nights2011

SEO USE and abuse :)

<*bad* word (rus)

(c) 2011 Armorize Technologies

Page 56: 0nights2011

SEO SERVICES

(c) 2011 Armorize Technologies

Page 57: 0nights2011

Goods and services :Sampling :)

(c) 2011 Armorize Technologies

Page 58: 0nights2011

Digital currencies

• Modern day hawalla

(c) 2011 Armorize Technologies

Page 59: 0nights2011

Amusing portals

(c) 2011 Armorize Technologies

Page 60: 0nights2011

PASSPORT COPIES

(c) 2011 Armorize Technologies

Page 61: 0nights2011

.. OR A SET

For money of any state of dirtinessPack includes1. Online bank account access2.ATM card (1000/6000USD per month withdrawal limit)3. online access passwords4. Passport copy of “poor john”5. SIM card

(c) 2011 Armorize Technologies

Page 62: 0nights2011

MALWARE Q/A AND HOSTING

(c) 2011 Armorize Technologies

Page 63: 0nights2011

Abuse-resistant hosting

(c) 2011 Armorize Technologies

Page 64: 0nights2011

CLOUD-cracking

(c) 2011 Armorize Technologies

Page 65: 0nights2011

AND CAPTCHA

(c) 2011 Armorize Technologies

Page 66: 0nights2011

MOBILESo far - easy to spot with

static analysis tools (android, j2me)

(c) 2011 Armorize Technologies

Page 67: 0nights2011

Press the button “stop” as soon as Press the button “stop” as soon as possible!possible!

(c) 2011 Armorize Technologies

Page 68: 0nights2011

LEARNING POSSIBILITIES :)

(c) 2011 Armorize Technologies

Page 69: 0nights2011

Questions

l

(c) 2011 Armorize Technologies