580 likes | 625 Views
Learn about botnets, C&C mechanisms, bot herders, infections, control methods, propagation, and more in this detailed guide from The Shadowserver Foundation. Understand the complexities, motivations, and usage of botnets in the digital landscape.
E N D
Botnets and BotherdersThe Shadowserver Foundation Hillar Leoste
Agenda • Botnets • Shadowserver • Botnets IRL • Questions The Shadowserver Foundation
Botnets – The Good, Bad, and Ugly A look into the methods, usage, control, and motivations of botnet herders
Botnet A distributed network of compromised computers controlled by a malicious user via a command & control mechanism. C&C “Command & Control” A computer or a network of computers, controlled by a herder, that sends commands to the botnet. Drone or Zombie A compromised computer that receives commands via the C&C Bot Herder Individual who owns or controls the botnet. IRC A protocol designed for real time chat communication based on client-server architecture Definitions The Shadowserver Foundation
Botnets - Spreading Scanning • exploiting vulnerabilities • “Night of the Living Dead” Email and IM links • still a major vector Drive-by Downloads • Web redirects • Social networking sites • P2P sharing The Shadowserver Foundation
5 6 7 4 3 2 1 2 Zombie 1 Zombie CC - Chat Server Distribution Server Internet 1. Are you vulnerable for Win X problem ? 2. Yes / No 3. If Yes => send malware to infect 4. After installation => connect to CC 5. Master command => download / update 6. Request download from dist. server 7. Sends requested download Bot autopropagation infection scheme The Shadowserver Foundation
Botnets – Spreading The Shadowserver Foundation
Botnets - Infections The Shadowserver Foundation
Botnets – 0day InfectionsMonthly stats The Shadowserver Foundation
Botnets – Retest InfectionsMonthy stats The Shadowserver Foundation
Architecture Agobot Sophisticated – Complete – Modular Rootkit-like capabilities P2P protocol SDBot Much simpler – smaller Easy to extend Hundreds of variants Control Agobot Standard and custom IRC command ddos_maxthreads spam_aol_channel bot_topiccmd SDBot Lightweight IRC Executes channel topic as command Interprets other messages as commands Bot - Details The Shadowserver Foundation
Propagation Agobot Assigns network ranges to drones scan.addnetrange <IP_range> scan.startall SDBot Base version has no scanning capabilities Variants now include scanning and propagation very advanced Attack Mechanisms Agobot Elaborate set of self contained modules Many types of DDoS attacks SDBot No exploits in base version Easily and rapidly expanded Bot - Details The Shadowserver Foundation
Centralized IRC Easy to Deploy Low Latency Central weak link HTTP Drone calls home via port 80 Can seem like normal traffic Distributed P2P No central server More complex More difficult to detect and takedown Hybrid IRC/HTTP P2P/HTTP Botnets - Control The Shadowserver Foundation
DDoS attacks TCP or UDP floods HTTP spidering Spamming Phishing Harvest email addresses Traffic Sniffing Interesting clear-text data Can help 'steal' other botnets Keylogging & E-Fraud bypasses encrypted channels use of filters Malware Propagation scanning and infecting rapid deployment of exploits Clickthrough Fraud pay-per-click manipulate polls, surveys, etc. Warez and Pirated Goods Botnets - Usage The Shadowserver Foundation
Hacker Info Cmd My IP is x.y.z.z Chat Server Webserver / node Computer Crash Internet Access line blocked Botnet attack on a webserver / node The Shadowserver Foundation
Botnets – Usage (DDoS) The Shadowserver Foundation
Botnets – Herder Defense • Use of Dynamic DNS • Short TTL in DNS Records (Fastflux) • Channel and Server Changes • Being directed to another C&C • Via HTTP download • Obfuscate drone hostnames • Encryption of intra-channel communications • Modified IRC servers • Anti-Sandbox mechanisms in binaries The Shadowserver Foundation
Botnets - Motivation Script Kiddies stay away ! • For-profit industry Becoming an Industry • underground network • various roles Targeted Attacks • Sophistication • Industrial Espionage • State Sponsored The Shadowserver Foundation
Botnets – Organizational Dedicated networks • IRC, P2P, Web sites Various roles and hierarchies • Advertising • “Consumer Reports” • Traffic in a variety of goods and services Public Information • No presumption of privacy • Relationships The Shadowserver Foundation
Botnets - Relationships The Shadowserver Foundation
Botnets - Relationships The Shadowserver Foundation
Detection, Tracking, and Closure? The Shadowserver Foundation process and methodology
Shadowserver The Shadowserver Foundation • An all volunteer watchdog group of security professionals that gather, track, and report on malware, botnet activity, and electronic fraud. It is the mission of the Shadowserver Foundation • To improve the security of the Internet by raising awareness of the presence of compromised servers, malicious attackers, and the spread of malware. The Shadowserver Foundation
Shadowserver The Shadowserver Foundation
Server based Emulate vulnerable systems Deploy and wait Nepenthes Client based Threats are changing Initiate connections to Internet Emulate a user Seed with known malicious URLs HoneyC & Capture-HPC Botnets – Detection & Capture Honeypots • Auto-submit • Deploy on wide variety of IP space • Server & Client based Honeytokens • Email – IM - IRC • Spamtraps • Link spam • Social networking • Forums The Shadowserver Foundation
Botnets - Nepenthes The Shadowserver Foundation
Botnets - Sandboxing Manual • Static • Dynamic Automated • Notification • Classification The Basics • C&C address – Port – Channel • Nick & Ident • Passwords The Shadowserver Foundation
Botnets - Tracking The Shadowserver Foundation
Botnets - Tracking The Shadowserver Foundation
Recipients ~30 CERTS ~100 ASN owners Bleeding Edge Snort 5 Public IRC Services 3 DNS Registrars 4 Commercial Vendors 2 private mailing lists 7 International LEO’s 3 US Federal LEO’s 5 International government critical infrastructure groups Shadowserver Revisited – Reports~500 Custom reports produced daily Report Types • DDoS • C&C List • Compromised Host • Click-Through Fraud • Drones • Proxies • URL Report Filters • ASN • CIDR • Country Code The Shadowserver Foundation
Shadowserver Revisited – DDoS Reports The Shadowserver Foundation
Two Minutes The Shadowserver Foundation
Botnets – Real Life A case study of a group of bad actors on their actions and methodology
Botnets – Real Life The Shadowserver Foundation
Botnets – Real Life • Binary captured by honeypot system on 2006-08-22 • SDBot variant using #rap@tamer.pikolata.net:6121 • Used 32 different hosts (IPs) as C&C servers in less than 60 days • Moved between servers at least 40 times • At least six other control channels known to use this hostname The Shadowserver Foundation
Real Life – The Malware • The C&C spread 51 unique binaries in the two months • Two-thirds were SDBot variants, others are RBot, Zapchast, Parite.B, Kirsun, ... The Shadowserver Foundation
Real Life - Speading • Using standard spreading mechanisms (asn, dcom, lsass, ...) The Shadowserver Foundation
Real Life - Usage • Running DDOS (targets were usually servers being run by 'enemy' groups) • Keylogging (Data used for ID theft and efraud) The Shadowserver Foundation
Real Life – More Usage • Click-fraud (Money-making. Accounts could be used to track back the herders) • Clone flooding (Often advertising new underground servers and carding channels) The Shadowserver Foundation
Real Life - Cooperation • Cooperative scanning of network ranges • Downloading/Installing binaries for a 'friend' or in exchange for something • Helping out with bots to ddos targets that can handle a high load • Sharing/trading private IRC servers • Sharing/trading bot sources and binaries The Shadowserver Foundation
Real Life - ChanOps mr`bet DDOS, Sniffing Mr|YlLi Clone flooding, proxies KaHIN DDOS, Clone flooding Location: Turkey Realname: Mehmet The Shadowserver Foundation
Real Life – More ChanOps Sh3llx DDOS, Sniffing, Clone flooding Bill DDOS Location: Kosovo gu3sT DDOS, Proxies, Clone flooding The Shadowserver Foundation
Real Life - Summary • Several domain names were removed • Several servers shutdown • No real affect on the operations of this group • Why? The Shadowserver Foundation
Future Trends Where is all this going? What do we have to look forward to?
Future Trends - Malware • Rootkits • AntiVirus Detection • Scripting Worms • RSS Hijack • Client-side Exploits • Escalation of Privileges • Packers and Protectors • Themida, private packers The Shadowserver Foundation
Future Trends - Themida The Shadowserver Foundation
Future Trends - Botnets • New Protocols • HTTP – P2P – VOIP – IM • Nugache, Skype and Storm worm • Encryption • Covert channels via TCP and ICMP tunneling • Smaller and Distributed Botnets • Distributed DNS services • Stronger Protection of the Botnet • Industry Bankroll The Shadowserver Foundation
HTTP based C&C • Black Energy • Very simple and light • DDOS • Last known version – 1.9.2 • http://asert.arbornetworks.com/2007/10/blackenergy-ddos-bot-analysis-available The Shadowserver Foundation
HTTP based C&C • Zunker • Sophisticated • SPAM • http://pandalabs.pandasecurity.com/archive/Zunker.aspx The Shadowserver Foundation
HTTP based C&C • MPack • ICEPack • Barracuda • Pinch • etc The Shadowserver Foundation