demystifying a malware attack - rootcon 10/talks/rootcon... · – damballa – f-secure – trend...

26
Demystifying a Malware Attack Christopher Elisan Principal Malware Scientist RSA

Upload: others

Post on 01-Mar-2021

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Demystifying a Malware Attack - ROOTCON 10/Talks/ROOTCON... · – Damballa – F-Secure – Trend Micro • @Tophs. Author of 2012 2015. Co-Author of 2016. Agenda • The Attack

Demystifying a Malware AttackChristopher Elisan

Principal Malware Scientist RSA

Page 2: Demystifying a Malware Attack - ROOTCON 10/Talks/ROOTCON... · – Damballa – F-Secure – Trend Micro • @Tophs. Author of 2012 2015. Co-Author of 2016. Agenda • The Attack

About Me•  Principal Malware

Scientist / Sr. Manager MIT•  Past Adventures– Damballa– F-Secure– Trend Micro

•  @Tophs

Page 3: Demystifying a Malware Attack - ROOTCON 10/Talks/ROOTCON... · – Damballa – F-Secure – Trend Micro • @Tophs. Author of 2012 2015. Co-Author of 2016. Agenda • The Attack

Author of

20152012

Page 4: Demystifying a Malware Attack - ROOTCON 10/Talks/ROOTCON... · – Damballa – F-Secure – Trend Micro • @Tophs. Author of 2012 2015. Co-Author of 2016. Agenda • The Attack

Co-Author of

2016

Page 5: Demystifying a Malware Attack - ROOTCON 10/Talks/ROOTCON... · – Damballa – F-Secure – Trend Micro • @Tophs. Author of 2012 2015. Co-Author of 2016. Agenda • The Attack

Agenda•  The Attack•  Behind the Scenes•  Lessons Learned

Page 6: Demystifying a Malware Attack - ROOTCON 10/Talks/ROOTCON... · – Damballa – F-Secure – Trend Micro • @Tophs. Author of 2012 2015. Co-Author of 2016. Agenda • The Attack

The Attack

Page 7: Demystifying a Malware Attack - ROOTCON 10/Talks/ROOTCON... · – Damballa – F-Secure – Trend Micro • @Tophs. Author of 2012 2015. Co-Author of 2016. Agenda • The Attack

We Are All Under Attack

OPPORTUNISTIC TARGETED

Page 8: Demystifying a Malware Attack - ROOTCON 10/Talks/ROOTCON... · – Damballa – F-Secure – Trend Micro • @Tophs. Author of 2012 2015. Co-Author of 2016. Agenda • The Attack

Opportunistic Attack

Page 9: Demystifying a Malware Attack - ROOTCON 10/Talks/ROOTCON... · – Damballa – F-Secure – Trend Micro • @Tophs. Author of 2012 2015. Co-Author of 2016. Agenda • The Attack

Opportunistic Attack

Page 10: Demystifying a Malware Attack - ROOTCON 10/Talks/ROOTCON... · – Damballa – F-Secure – Trend Micro • @Tophs. Author of 2012 2015. Co-Author of 2016. Agenda • The Attack

Opportunistic Attack

Page 11: Demystifying a Malware Attack - ROOTCON 10/Talks/ROOTCON... · – Damballa – F-Secure – Trend Micro • @Tophs. Author of 2012 2015. Co-Author of 2016. Agenda • The Attack

Targeted Attack

Page 12: Demystifying a Malware Attack - ROOTCON 10/Talks/ROOTCON... · – Damballa – F-Secure – Trend Micro • @Tophs. Author of 2012 2015. Co-Author of 2016. Agenda • The Attack

Regardless of the attack, the threat infrastructure and the people behind them

are similar

Page 13: Demystifying a Malware Attack - ROOTCON 10/Talks/ROOTCON... · – Damballa – F-Secure – Trend Micro • @Tophs. Author of 2012 2015. Co-Author of 2016. Agenda • The Attack

Behind the Scenes

Page 14: Demystifying a Malware Attack - ROOTCON 10/Talks/ROOTCON... · – Damballa – F-Secure – Trend Micro • @Tophs. Author of 2012 2015. Co-Author of 2016. Agenda • The Attack

©ChristopherElisan-Malware,Rootkits&Botnets:ABeginner’sGuide(McGraw-HillProfessional) ChristopherC.Elisan

MalwareInstaller

RootkitComponent

A4ackComponent

Regenera7onComponent

Configura7onFile BotAgent

DeploymentTechnology

InstallsMalwareComponents

DeploystheMalwareInstaller

MalwareServingDomains

Command&ControlDomain

DropZone

DropZones

Checksforupdatesbeforeinstalla7on

MalwareComponents

Dropsstoleninforma7on MCsendsstatus/C&Csendscommands

MCchecksforupdates/MSDdownloadsupdates

Attack Infrastructure

Page 15: Demystifying a Malware Attack - ROOTCON 10/Talks/ROOTCON... · – Damballa – F-Secure – Trend Micro • @Tophs. Author of 2012 2015. Co-Author of 2016. Agenda • The Attack

Sponsor•  Government•  CommercialOrganiza7on•  Non-commercialOrganiza7on•  Ac7vistGroups•  Individual•  TerroristOrganiza7on

MoneyMules•  Unsuspec7ngPublic•  Workfromhome

CrimeBoss•  Runstheshow•  Individualororganiza7on•  Middlemanbetweensponsor

andTPs•  Canbeasponsor

MalwareWriters•  Originalmalwarecreator(s)•  Offermalware“off-the-rack”

orcustombuilt•  MayofferDIYconstruc7onkits•  Money-backguaranteeifdetected•  24x7support

DeploymentProvider•  Specializeddistribu7onnetwork•  A4ractsandinfectsvic7ms•  Global&targetedcontentdelivery•  DeliverythroughSpam/drive-by/USB/etc.•  Offers24x7support

BotnetOperator•  Operatesasec7onofthebotnet

fordirectfinancialgain•  Issuescommandstothebotagents•  MaybetheBotnetMaster

BotnetMaster•  Individualorcriminalteamthat

ownsthebotnet•  Maintainsandcontrolsthebotnet•  Holdsadmincreden7alsforCnC

ResilienceProvider(MSP)•  ProvidesCnCresilienceservices•  An7-takedownnetworkconstruc7on•  Bullet-proofdomainhos7ng•  Fast-fluxDNSservices•  Offers24x7Support

The Attackers

Page 16: Demystifying a Malware Attack - ROOTCON 10/Talks/ROOTCON... · – Damballa – F-Secure – Trend Micro • @Tophs. Author of 2012 2015. Co-Author of 2016. Agenda • The Attack

Malware Tools•  DiY Kits•  Armoring Tools

Page 17: Demystifying a Malware Attack - ROOTCON 10/Talks/ROOTCON... · – Damballa – F-Secure – Trend Micro • @Tophs. Author of 2012 2015. Co-Author of 2016. Agenda • The Attack

DiY Kits

Page 18: Demystifying a Malware Attack - ROOTCON 10/Talks/ROOTCON... · – Damballa – F-Secure – Trend Micro • @Tophs. Author of 2012 2015. Co-Author of 2016. Agenda • The Attack

DiY Kits

ChristopherC.Elisan

Page 19: Demystifying a Malware Attack - ROOTCON 10/Talks/ROOTCON... · – Damballa – F-Secure – Trend Micro • @Tophs. Author of 2012 2015. Co-Author of 2016. Agenda • The Attack

ChristopherC.Elisan

Armoring Tools

Page 20: Demystifying a Malware Attack - ROOTCON 10/Talks/ROOTCON... · – Damballa – F-Secure – Trend Micro • @Tophs. Author of 2012 2015. Co-Author of 2016. Agenda • The Attack

Armoring Tools

ChristopherC.Elisan

Page 21: Demystifying a Malware Attack - ROOTCON 10/Talks/ROOTCON... · – Damballa – F-Secure – Trend Micro • @Tophs. Author of 2012 2015. Co-Author of 2016. Agenda • The Attack

The Malware Factory

Page 22: Demystifying a Malware Attack - ROOTCON 10/Talks/ROOTCON... · – Damballa – F-Secure – Trend Micro • @Tophs. Author of 2012 2015. Co-Author of 2016. Agenda • The Attack

The Malware Factory

Page 23: Demystifying a Malware Attack - ROOTCON 10/Talks/ROOTCON... · – Damballa – F-Secure – Trend Micro • @Tophs. Author of 2012 2015. Co-Author of 2016. Agenda • The Attack

Lessons Learned

Page 24: Demystifying a Malware Attack - ROOTCON 10/Talks/ROOTCON... · – Damballa – F-Secure – Trend Micro • @Tophs. Author of 2012 2015. Co-Author of 2016. Agenda • The Attack

The Whole Picture•  To fully understand the

threat, we need to look at the following…– Target (Roles, systems)–  Infrastructure– Different roles required

to support the infrastructure

Page 25: Demystifying a Malware Attack - ROOTCON 10/Talks/ROOTCON... · – Damballa – F-Secure – Trend Micro • @Tophs. Author of 2012 2015. Co-Author of 2016. Agenda • The Attack

Sometimes it is hard, so we collaborate

•  Technical– Research– Scientific approach– Knowledge Sharing

•  Legal– Work with LEOs– Share evidence to

appropriate entities

Page 26: Demystifying a Malware Attack - ROOTCON 10/Talks/ROOTCON... · – Damballa – F-Secure – Trend Micro • @Tophs. Author of 2012 2015. Co-Author of 2016. Agenda • The Attack

*ImagesarecopiedfromtheInternetandareownedbytheirrespec:veauthors

Thank You!!!