版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)
文檔簡介
DynamicDNSAbuse
Analyst
ChrisBakerSeniorPrincipalData
dig@slide.deckchris.baker
;<<>>DiG9.8.3-P1<<>>
;;globaloptions:+cmd
;;Gotanswer:
;;->>HEADER<<-opcode:QUERY,status:NOERROR,id:1337H@X0R
;;flags:qraara;QUERY:1,ANSWER:1,AUTHORITY:1,ADDITIONAL:0
;;QUESTIONSECTION:
chris.baker.3600INNS.
chris.baker.138547INMXcbaker@baker@
chris.baker.3600INTWEET@datumrich
;;Querytime:111msec
;;SERVER:#53()
;;WHEN:WedAug1612:00:002016
;;MSGSIZErcvd:99
Contents
Overview
1.DynamicDNSService
?CriminalCostModel
2.DataAvailableforAnalysis
3.InteractionPatterns
4.AdaptingMethodology
?JscriptInfection
?DNSBeaconing
WhyDynamicDNS?
FrankDenis@jedisct1:
“ThepriceofanIPAddress(V4ofcourse)isgreaterthanthepriceofadomainnameandthepriceofadomainisgreaterthanthepriceofasubdomain.”
ThebusinessofDynamicDNSisprovidingsubdomainsasaservice
InvestmentModel
Acriminalexpendsanaccountoracreditcard
whentheycreateanaccountonourplatform
Theoperating
profitabilitytheir
costneedstobedwarfedbythe
activityotherwisewouldn’ttheydo
somethingelse?
ddns.hostname.tld
ddns.hostname.tld
ddns.hostname.tld
ddns.hostname.tld
Overview/Summary
Creates:
Phishedpersonrequests
Theyareredirectto:
/wordpress/wp-content/plugins/rthytrghf/index.htm
ExamplePage
MileHighTechnicalSummary
Modifies:
ChangetosinkholeSinkhole->http://<Sinkhole-IP>/campaigntag-html.htm
TotalPossibleAudience
(everyoneinthespamlist)
AudienceSolicited
Messagereachedinbox
MessageOpened
LinkClicked
CredentialsSubmitted
AppleAccounts
WehavesomesampledatarelatedtoApplephishingthatareinteresting
SampleSetof45Campaigns
Summarystats:Userswhoclickedthelink/visitedtheredirectionlandingpage
–Min:18
–Median:187
–Mean:467
–Max1689
ResaleValueofAccounts
90%70%50%30%
Min:$88.00$71.50$49.50$27.50
Median:$924.00$720.50$517.00$308.00
Mean:$2,310.00$1,798.50$1,287.00$770.00
Max$8,360.00$6,501.00$4,647.50$2,788.50
Ifwetakethemedianpriceof$5.50peraccountwecan
estimatetheprofitabilityofvariousratesofcredential
submissionandresale
DataTrail:DDNSHostCreation
Username
Datetime
IPAddress
UserAgentString
Datetime
Hostname
IPAddress
URL
Whatistherateofhostnamecreation?Howmanydifferentendpoints?Howmanydifferenthostnames?
EndUserDataTrail:Contrast
AccountCreation
Username
Datetime
IPAddress
UserAgent
HostnameCreation
Datetime
Hostname
IPAddress
URL
UserAgent
WastheaccountcreatedfromanIPinthesamenetblockastheIPthehostnameissettoresolveto?
DoestheGeoIPofaddressplacetheminthesamecountry?Continent?
Example:
HostnameCreated
u876trtr.fuettertdasnetz.de
3
2
3
Phishing
Ifwestripoffthedomainportion
u876trtr
uy85rr
3yi87
awu7o
hguy5434rer
ui783ert
d3678iyhgfd
xey6hg
2hmmn7
a54hgh
yu74er
3gtij5
NamesandEndpoints
Letsreviewthedata
?Usercreatedatotalof12domains
?User’saccountcontains12domainnames
?Namesappeartobepseudo-randomlygenerated
?Allcreatedwithin10minsofpurchasingtheservice
?Allofthedomainsresolvetothesamewordpressinstance
?WordpressinstanceURIcontainsstring“wp-content”
?WordpressinstanceURIcontainspseudo-randomgeneratedhtmlendpoint
Rateofnamecreation,numberofpersistentnames,andtheendpointsallpointtophishing
ExploitKits
Exploitkitsareapplicationinfrastructuredesignedforcompromisingendusersystems
?Keeptrackofwheretheendusercamefrom
?Sourceoftraffic
?Geographyofenduser
?Mosthaveanumberofdifferentvulnerabilitiestheycanleveragetoaccomplishtheirgoal
-Trackwhatvulnerabilitywasusedtocompromisetheenduserssystem
-Tracksuccessrate
?Impressivefocusonbusinessmetrics
TrafficDirectionServices
FindingendusertraffictoexploitisadifferentcorecompetencythanoperatingexploitationinfrastructureTrafficDirectionServicesservethreebasicfunctions
?Steeringtraffic
?ByGeoIP,UserAgent,OperatingSystem,Referral
?Filteringtraffic
?Rulesfordealingwithsecurityfirms,searchenginecontentreviewbots…etc
?Example:IfIPbelongstoGoogleBotredirecttocleanpage
?Collectingtrafficmetrics
?Reportingonthetwofunctionsabovefortracking/billing
SegmentationofExploitKitsandTrafficDirectionServices
?Allowgroups/actorstofocusontheircorecompetency
?Trafficdirectionserviceshelpprotectexploitkits/mitigatetheriskoflosingtheexploitnode
?Exploitkitsarecenteredaroundmaximizingtheinfectionrateoftrafficwhichtheyreceive
?
?
?
?
?
?
Activity
?
?
?
?
?
?
?
?
?
?
FingerPrint
45400f3233e52d15694cf990.worse-than.tv
26745522c585519482f0e3e3.worse-than.tv
d22a34203ed4dc4571e361de.worse-than.tv
Accountscontain3to5hostnamesactiveatatime
Domainsarepseudo-randomlygenerated
Theyrotateonafixedinterval5min/30min/1hour
TheendpointisusuallythesameIPaddressforadayormore
Rateofnamecreation,numberofpersistentnames,andendpoints=TDS/ExploitKit
Howaretheydifferent?
ScenarioDifference
?Phishersneedthedomainusedintheircampaignemailtostayactive
?Exploit/TDScampaignsrotatethesedomainsfrequentlytoavoiddetection
?KeyVariables:Totalnumberofdomainsactiveatonetime&Persistence
?PhishershavebeenusingcompromisedCMSinstancestohosttheirpages
?Exploit/TDScampaigns,onesthatuseourDDNS,areallusingcloud/VPSproviders
?KeyVariable:Endpointclassification
IdentifyingInfrastructure
?IPReputationProfiling
?DoesanaccounthavemultipledomainsorIPsfromknownquestionableASes?
?Doesanaccounthaveacollectionofdomainswithsimilarqueryvolume?
?Howlonghasthehostexisted?
?Howmanynewhostshavebeencreatedordeleted?
?ForthosedefendingnetworksthisisacasewherelookingatpassiveDNSwouldhelp
RateandProviderIndicators
?Identifycustomerswiththehighratesofdomaincreation
?Isitaccompaniedbyahighrateofremoval
?QuantifythediversityofIPscreatingrecordswiththeArecordIP
?Thishelpsclarifyiftheaccountisbeingshared
?QuantifythediversityofIPsbeingusedforArecordIPs
?ASProfilingofIPs
?Infrastructureasaserviceprovider
?Small/MidsizedISP
?VPNprovider/TorExitNodes
2638UniqueASNs946UniqueASNs1991UniqueASNs
443UniqueASNs89UniqueASNs719UniqueASNs
476UniqueASNs722UniqueASNs
Sinkfirstthenblock
Wecanclosetheaccountstoppingtheirabilitytocreatemoredomains
Reportthecredentialstheyusedtopayfortheaccount
Butfirstitiskeytopointthedomainstoasinkhole
?Ifwejustcloseandblockthemwehavenoinsightintothevolumeoftrafficandthetypeoftrafficassociatedwiththedomain
?SinkingdomainsinthecaseofTDS/Exploitkitsprovidesinsightintothereferrersandorcriminalinfrastructure
?SinkingdomainsinthecaseofphishingexposesadditionalURIsofinterest
AdaptingIdentificationMethodology
1:JscriptInfection
2:DNSBeaconMalware
Case1:JSBackdoor
Thereisacompromisedmachinewithabackdooronasinglehost.Vendordetectionisnon-existent.ItisaJSbackdoormakingC2connectionsatregularintervals.
C2connectionsaremadetothebelow:
60,*.
GET
https[:]//offpotubeda.endofinternet[.]net:443/related/?action=get_config
&guid=<redacted>&version=1115
FirstSteps
Quantify
?22accountsatthetimehadhostnamesrelatedto60
Identify
?Theaccountassociatedwiththesuppliedmalicioushostnamecreateditfrom2
Theimpactedpartyprovidedacopyofthe.jsfiletheyfoundontheinfectedmachine
Betweentheemailandaccountusagehistory,itseemsclearadomaingenerationalgorithmwasbeingused
DNSTrafficIntel
Whoaskedforwhat?Whendidtheyaskforit?Howoftenaretheyasking?
<Epoch>#8899
<Epoch>#8899
<Epoch>#8899
<Epoch>#8899
RecursiveDNSServers
Authoritative
DNSServer
EndpointsRequestingDGADomains
Lookingatwhoisasking…
InmostcasestherequestorforauthoritativeDNSrecordsisarecursiveresolver
Thisisonewaytoassesspotentiallyimpactedorganizationsorgeographies
AmajorityofrecursiveresolversontheinternetimplementDNSsourceportrandomization
?/html/rfc5452
40and2001:67c:2070:8b06::2whereonlyrequestingDGAdomainsandalwaysusingsourceport53(forIPv4)
DGAdomainsandalwaysusingsourceport53(forIPv4)
?"Delta-X”LTDUkriane,Kyiv.
40Connectivity
ASN200000
OtherAnomalies
Unlikealloftheotherrequests40wasalsoappendingahashtoeachauthoritativerequestwhilerequestingthebasedomaininthesamesecond
?1431410081a3f34ef153f6b09091ad104add8e5e987.isctm.isteingeek.de
?1431410081isctm.isteingeek.de
?1431410081
?1431410081
?1431410081
?1431410081
?1431410081a2bf47eb9d1297cc614fcc876af7ac28e.webgdame.isteingeek.de
?1431410081webgdame.isteingeek.de
LookingattheDGA
WhilediggingintothisportionDanielPlohmannwasabletoreverseengineertheDGA
ThehoststheDGAwastargeting:
?
?isteingeek.de
?
Aswellasthecollectionofngramswhichareusedtogeneratethethirdtierdomainname:
ohuswhatsiasisoffnetwebcallhowaskelcodeqctupogtmtubedamernokosiledsitenafpkunbonrimakeinnahostadoldforjownto
Mitigation/OutReach
WiththeDGAsolveditbecamefeasibletoregisterthedomainnamesbeforetheactor
?Insteadofreclaimingthedomainsaftertheywereregistered
Preregistrationbegan…
?IPsfrom1,358ASNsmadeconnectionstothesinkhole
?ASNswithtiesto117countries
?14,185uniqueIPsmadeconnectionstothesinkholeduringthefirst5daysofobservation
DuetothenumberofinfectedendpointsandtheirprofilewegeneratedafeedforShadowServer
WindowsEndpointstoSinkhole
AdditionstotheSinkhole
DespitelookinglikeJavascript,themalwarewaswrittenin"Jscript”
?AJavascriptlikevbscriptalternativecreatedbyMicrosoft
?Thisnuancehintedthatitmightbeagoodideatoensurethatwep0foranotherOSfingerprintingtoolwasdeployedtothesinkhole
?Thegoalofthisbeingtheabilitytosegment“possiblyinfected”from“researchrelated”requestorsoperatingunderthetheorythatonlythingswithWindowsfingerprintsshouldbeconsidered
Verifyingp0ffingerprints
2%
3%
0%
95%
Windows7or8
WindowsNTkernel
Linux
FreeBSD
Thispatternsoundsfamiliar
Whydidn’tyourExploitKit/TrafficDirectionServicepatternpickthisup?
?Itsregisteringdomainsonafixedinterval
?Itsaddinganddeletingdomainstoaccountsthatresolvetothesame
endpoint
Theysplittheactivityupacrossmultipleaccounts…
?Oneaccountwouldaddadomain
?Anotheraccountwouldaddthefollowupdomain…etc
Oneimportanttakeawayfromthiswastotakeawiderviewandlookat
findingactivitysplayedacrossendpoints
Alsolookingatrecursivetrafficforthedomainiskey
HigherQualityDGA
Theyusedasetofngramswhichmake
“l(fā)essanomalouslooking”names
Someofthedomainsareevenallreal
words!
Earlierwewerelookingatdomainslike:
?Longrunsofonlyconsonants
?Alackofcommonvowelconsonant
groupings…
?owhatnetweb.isteingeek.de
?
?
?whatishowask.isteingeek.de
?
?isweblcode.isteingeek.de
?
?
?webaskctu.isteingeek.de
?
Case2:DNSBeaconingMalware
InearlyDecember2014wereceivedasamplefromShadowServerunlikeothersseeninthepast
?ItwasofspecificinterestbecausethesandboxshowedsomeveryinterestingDNStraffic
OnJan11th2015postedadetailedlookattheNorthKoreanCentralNewsAgencywebserver
Theposthaddetailsaboutaspecifictypeofmalwarebeingdistributedfromthewebsite
CylanceReport:KCNAMalware
Thedomain,a.gwas.perl.sh,isrequestedbythemalware
TheresultingIPaddressoftheDNSqueryofa.gwas.perl.sh(3)isthensentaDNSquery
Thetargetdomainisastringwhichpresumablyidentifiesfeaturesabouttheinfectedvictim.
ImageandDetailsfrom/infinity-vs.-the-real-world-kcna-malware
SamePatternDifferentHash
Asthiswasmakingitswastotheblog-o-spherearagtagbandwaslookingintoasimilarsample
?DanielPlohmannofFraunhoferFKIE
?StevenAdairofVolexity
Theinitialrelationshipwascenteredonthedomaina.gwas.perl.sh
ThenafterseeingwhatCylancepublishedaboutthedomainnamesusedforbeaconingwecouldconfirmthatthenetworkcommunicationlookedthesame
C&CDomain
Thebinaryourteamwasfocusingonused3hardcodedC&Cnodes:
?a.gwas.perl.sh
?
?
ThelatterofthedomainsisonewhichisusingDyn’sDynamicDNSplatform
AftergoingovertheincidentwithourCustomerServiceteamthedomainwasmovetoasinkhole
Whoisasking?
WiththedomainresolvingtoasinkholewenowwerereceivingallofthetrafficoriginallydestinedfortheC&Cdomain
ThisallowedustocapturetheDNSbeaconqueries
AtfirstwewereusingBroIDStologalloftheDNStraffic,howeveritwasrunningalowercasefunctionontheCNAME
Thisleadtoaswitchtothemostrichdatastreamfullnetworkcapture!
akatcpdump
RecursiveResolversQueryingfor
Thescalehelpsshowthediversitybut>99%ofthequeriesare
fromCN
EndpointssendingDNSBeaconstothesinkhole
Thescalehelpsshowthediversitybut>99%ofthebeaconscome
fromCN
Reversing
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 礦井環(huán)保聚氨酯保溫施工協(xié)議
- 租賃合同范本:建筑設(shè)施
- 醫(yī)療資產(chǎn)捐贈分配指南
- 農(nóng)民工防暑降溫措施
- 航空航天項目招投標(biāo)方案范本
- 糧食加工廠火災(zāi)風(fēng)險控制
- 廣告公司車位租賃協(xié)議范本
- 皮革廠防火門招標(biāo)資料
- 影視基地轉(zhuǎn)讓合同范例
- 空氣凈化器生產(chǎn)經(jīng)理招聘書
- 四川省眉山市2023-2024學(xué)年八年級上學(xué)期語文期中試卷(含答案)
- 期中 (試題) -2024-2025學(xué)年譯林版(三起)英語三年級上冊
- GB/T 23863-2024博物館照明設(shè)計規(guī)范
- 10以內(nèi)加減法(直接打印,20篇)
- 《田螺姑娘》兒童故事ppt課件(圖文演講)
- 【樓屋面裂縫原因及防治措施研究(論文)】
- DDL法在英語寫作中的應(yīng)用研究
- 向?qū)?使用說明書
- 北信源-終端準(zhǔn)入控制系統(tǒng)
- 【《項鏈》莫泊?!俊俄楁湣氛n本劇劇本
- CM-4 融創(chuàng)集團結(jié)算管理制度
評論
0/150
提交評論