200 likes | 390 Views
Internet Vulnerabilities & Criminal Activity. Internet Forensics 12.1 April 26, 2010. Internet Forensics & Computer Forensics. Computer Forensics Computer off / power it off Hard drive is imaged Examination made of hard drive copy No live capture of memory Internet Forensics
E N D
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010
Internet Forensics & Computer Forensics • Computer Forensics • Computer off / power it off • Hard drive is imaged • Examination made of hard drive copy • No live capture of memory • Internet Forensics • Done while computer is on • May or may not examine memory • Network activity is captured and analyzed
Malware Analysis • Goal - provide insight into attackers • Malware has two purposes • Steal information from victim computers • Commander victim computer’s resources for attacker’s use • Malware secondary features • Propagation • Locate & terminate security programs & competing malware • Hide itself from system administrators
Malware Programs • Most derived from a small, stable base of existing code • Small changes to obfuscation scheme • Command & control credentials change • No need to change what works • Custom programmed malware unlikely to be identified by security software
Extracting Information • Author vs Attacker • More interested in the attacker • Information that can lead to attackers identity • How malware interacts with the Internet • What type of information is being targeted • Commonalities with previously analyzed software
Malware Network Interactions • Receiving commands • Command & control site • Exfiltrate data • Drop site • Unique identifier (advertising fraud)
Identifying Advertising Revenue • Advertising fraud • Pay-per-view, pay-per-click, pay-per-install • To receive revenue, web site operator must be identified • Tracking number • May be found in malware • May be found in the URL for the advertisement • Extracted tracking number starting point to identifying recipient
Identifying Drop Sites • Malware that steals data will upload data to a specific site for later retrieval • Passwords, keystrokes, network traffic, documents • Data may be uploaded to drop site using: • HTTP • FTP • E-mail
Identifying Drop Sites cont. • Drop site location • May be hard coded into malware • May be found by query to web site or IRC channel • Possible actions once drop site is located • Analyze traffic to site to help find attacker • Analyze data at drop site & inform victims and financial institutions • Shut down drop site • Will only work with a hard coded site
Forensic Examination • Computer is off • Image the hard drive on site • Transport computer to lab and image the hard drive • Examine image in a lab environment • Computer is on • Observe & document the following before shutting machine down • Running processes • Open ports • Memory • Use of encryption
Examination of Malware • Malware files should be: • Located, recovered, neutralized to prevent accidental execution, analyzed • Antivirus testing • Can identify known malware • Information can be obtained from antivirus web site • Cannot identify network contact sites • Anti-virus sites not detailed or accurate enough for court
Examination of Malware cont. • Study strings in the binary • Locates embedded text • Text may be packed to further obfuscate • Indicates malware has specific targets • Runtime Analysis • Run malware in an isolated environment • Use simulation of the Internet & targeted sites • Use network tools to observe malware’s behavior • Look for : • Method used to transfer data • Address where data is sent
Examination of Malware cont. • Reverse Engineering • Converts file back to source code • Need some understanding of programming • Identify sites used for Command & Control (C&C) • Central point of communication between malware & attacker • C&C sites usually illegally hosted on compromised servers • Look for host name / IP number of C&C site • Attack will normally connect to C&C site using a proxy or other compromised host
Examination of Malware cont. • Identify C&C site continued • Malware identifies C&C site using IP address or DNS resource record • IP address more vulnerable as IP address can be shut down • DNS resource record can just be resolved to new IP number • Nature of DNS record can provide leads • Contact & payment details • Other DNS records with same contact information • Other IP addresses associated with DNS record • Attackers choice of type of host or network can provide information on attacker’s activities
Extracting Incidental Artifacts • Can find other information stored in malware with investigative value • Use “strings” command • Messages or comments from the author or attacker • Metadata about the development environment • May be placed in malware to intentionally mislead investigators • May lead to author not attacker
More to Learn from Malware • Two different malwares using the same C&C site may belong to the same attacker • Why not go after the author? • Prosecution requires: • Knowledge • Intent • Damages & monetary loss • Techniques used by malware authors point out weaknesses in network security
Attackers • Will balance cost, risk & potential profit • Sophistication is expensive • Will only employ sophisticated techniques when there is sufficient profit • Will use what ever techniques work • Understand social behavior • Security professionals have limited time / resources, work fixed hours • Infrastructure used for attack will eventually be shut down • Schedule attacks to maximize time till attack is noticed
Attackers cont. • Understand the culture of victims being targeted • E-mail, application icons, programs named to be as enticing as possible • Exploit jurisdictions & geography • Know the law enforcement difficulties working internationally • Use several proxies in different counties to route connections • Know which countries are weak on cyber enforcement
Attackers cont. • Monetary thresholds & other crimes • Know that most countries have monetary limits on crimes pursued • Internet provides “protection” for attackers • Rules for juveniles different - attackers exploit this • Study & evade network defenses • Understand how firewalls & antivirus software works • Have learned how to circumvent security measures • Outbound connections to C&C and drop sites • Use ubiquitous HTTP protocol
Supporting Other Investigations • Malware code analysis may assist in other computer forensic investigations • Combating the “Malware on the Machine” defense • Defendants claim illegal materials on computer due to malware • Examine malware on the machine • Examine network traffic records • Could the malware have committed the crime • Is functionality present in the malware to commit the attack