版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
DynamicDNSAbuse
Analyst
ChrisBakerSeniorPrincipalData
dig@slide.deckchris.baker
;<<>>DiG9.8.3-P1<<>>
;;globaloptions:+cmd
;;Gotanswer:
;;->>HEADER<<-opcode:QUERY,status:NOERROR,id:1337H@X0R
;;flags:qraara;QUERY:1,ANSWER:1,AUTHORITY:1,ADDITIONAL:0
;;QUESTIONSECTION:
chris.baker.3600INNS.
chris.baker.138547INMXcbaker@baker@
chris.baker.3600INTWEET@datumrich
;;Querytime:111msec
;;SERVER:#53()
;;WHEN:WedAug1612:00:002016
;;MSGSIZErcvd:99
Contents
Overview
1.DynamicDNSService
•CriminalCostModel
2.DataAvailableforAnalysis
3.InteractionPatterns
4.AdaptingMethodology
•JscriptInfection
•DNSBeaconing
WhyDynamicDNS?
FrankDenis@jedisct1:
“ThepriceofanIPAddress(V4ofcourse)isgreaterthanthepriceofadomainnameandthepriceofadomainisgreaterthanthepriceofasubdomain.”
ThebusinessofDynamicDNSisprovidingsubdomainsasaservice
InvestmentModel
Acriminalexpendsanaccountoracreditcard
whentheycreateanaccountonourplatform
Theoperating
profitabilitytheir
costneedstobedwarfedbythe
activityotherwisewouldn’ttheydo
somethingelse?
ddns.hostname.tld
ddns.hostname.tld
ddns.hostname.tld
ddns.hostname.tld
Overview/Summary
Creates:
Phishedpersonrequests
Theyareredirectto:
/wordpress/wp-content/plugins/rthytrghf/index.htm
ExamplePage
MileHighTechnicalSummary
Modifies:
ChangetosinkholeSinkhole->http://<Sinkhole-IP>/campaigntag-html.htm
TotalPossibleAudience
(everyoneinthespamlist)
AudienceSolicited
Messagereachedinbox
MessageOpened
LinkClicked
CredentialsSubmitted
AppleAccounts
WehavesomesampledatarelatedtoApplephishingthatareinteresting
SampleSetof45Campaigns
Summarystats:Userswhoclickedthelink/visitedtheredirectionlandingpage
–Min:18
–Median:187
–Mean:467
–Max1689
ResaleValueofAccounts
90%70%50%30%
Min:$88.00$71.50$49.50$27.50
Median:$924.00$720.50$517.00$308.00
Mean:$2,310.00$1,798.50$1,287.00$770.00
Max$8,360.00$6,501.00$4,647.50$2,788.50
Ifwetakethemedianpriceof$5.50peraccountwecan
estimatetheprofitabilityofvariousratesofcredential
submissionandresale
DataTrail:DDNSHostCreation
Username
Datetime
IPAddress
UserAgentString
Datetime
Hostname
IPAddress
URL
Whatistherateofhostnamecreation?Howmanydifferentendpoints?Howmanydifferenthostnames?
EndUserDataTrail:Contrast
AccountCreation
Username
Datetime
IPAddress
UserAgent
HostnameCreation
Datetime
Hostname
IPAddress
URL
UserAgent
WastheaccountcreatedfromanIPinthesamenetblockastheIPthehostnameissettoresolveto?
DoestheGeoIPofaddressplacetheminthesamecountry?Continent?
Example:
HostnameCreated
u876trtr.fuettertdasnetz.de
3
2
3
Phishing
Ifwestripoffthedomainportion
u876trtr
uy85rr
3yi87
awu7o
hguy5434rer
ui783ert
d3678iyhgfd
xey6hg
2hmmn7
a54hgh
yu74er
3gtij5
NamesandEndpoints
Letsreviewthedata
•Usercreatedatotalof12domains
•User’saccountcontains12domainnames
•Namesappeartobepseudo-randomlygenerated
•Allcreatedwithin10minsofpurchasingtheservice
•Allofthedomainsresolvetothesamewordpressinstance
•WordpressinstanceURIcontainsstring“wp-content”
•WordpressinstanceURIcontainspseudo-randomgeneratedhtmlendpoint
Rateofnamecreation,numberofpersistentnames,andtheendpointsallpointtophishing
ExploitKits
Exploitkitsareapplicationinfrastructuredesignedforcompromisingendusersystems
•Keeptrackofwheretheendusercamefrom
−Sourceoftraffic
−Geographyofenduser
•Mosthaveanumberofdifferentvulnerabilitiestheycanleveragetoaccomplishtheirgoal
-Trackwhatvulnerabilitywasusedtocompromisetheenduserssystem
-Tracksuccessrate
•Impressivefocusonbusinessmetrics
TrafficDirectionServices
FindingendusertraffictoexploitisadifferentcorecompetencythanoperatingexploitationinfrastructureTrafficDirectionServicesservethreebasicfunctions
•Steeringtraffic
•ByGeoIP,UserAgent,OperatingSystem,Referral
•Filteringtraffic
•Rulesfordealingwithsecurityfirms,searchenginecontentreviewbots…etc
•Example:IfIPbelongstoGoogleBotredirecttocleanpage
•Collectingtrafficmetrics
•Reportingonthetwofunctionsabovefortracking/billing
SegmentationofExploitKitsandTrafficDirectionServices
•Allowgroups/actorstofocusontheircorecompetency
•Trafficdirectionserviceshelpprotectexploitkits/mitigatetheriskoflosingtheexploitnode
•Exploitkitsarecenteredaroundmaximizingtheinfectionrateoftrafficwhichtheyreceive
•
•
•
•
•
•
Activity
•
•
•
•
•
•
•
•
•
•
FingerPrint
45400f3233e52d15694cf990.worse-than.tv
26745522c585519482f0e3e3.worse-than.tv
d22a34203ed4dc4571e361de.worse-than.tv
Accountscontain3to5hostnamesactiveatatime
Domainsarepseudo-randomlygenerated
Theyrotateonafixedinterval5min/30min/1hour
TheendpointisusuallythesameIPaddressforadayormore
Rateofnamecreation,numberofpersistentnames,andendpoints=TDS/ExploitKit
Howaretheydifferent?
ScenarioDifference
•Phishersneedthedomainusedintheircampaignemailtostayactive
•Exploit/TDScampaignsrotatethesedomainsfrequentlytoavoiddetection
•KeyVariables:Totalnumberofdomainsactiveatonetime&Persistence
•PhishershavebeenusingcompromisedCMSinstancestohosttheirpages
•Exploit/TDScampaigns,onesthatuseourDDNS,areallusingcloud/VPSproviders
•KeyVariable:Endpointclassification
IdentifyingInfrastructure
•IPReputationProfiling
•DoesanaccounthavemultipledomainsorIPsfromknownquestionableASes?
•Doesanaccounthaveacollectionofdomainswithsimilarqueryvolume?
•Howlonghasthehostexisted?
•Howmanynewhostshavebeencreatedordeleted?
•ForthosedefendingnetworksthisisacasewherelookingatpassiveDNSwouldhelp
RateandProviderIndicators
•Identifycustomerswiththehighratesofdomaincreation
•Isitaccompaniedbyahighrateofremoval
•QuantifythediversityofIPscreatingrecordswiththeArecordIP
•Thishelpsclarifyiftheaccountisbeingshared
•QuantifythediversityofIPsbeingusedforArecordIPs
•ASProfilingofIPs
•Infrastructureasaserviceprovider
•Small/MidsizedISP
•VPNprovider/TorExitNodes
2638UniqueASNs946UniqueASNs1991UniqueASNs
443UniqueASNs89UniqueASNs719UniqueASNs
476UniqueASNs722UniqueASNs
Sinkfirstthenblock
Wecanclosetheaccountstoppingtheirabilitytocreatemoredomains
Reportthecredentialstheyusedtopayfortheaccount
Butfirstitiskeytopointthedomainstoasinkhole
•Ifwejustcloseandblockthemwehavenoinsightintothevolumeoftrafficandthetypeoftrafficassociatedwiththedomain
•SinkingdomainsinthecaseofTDS/Exploitkitsprovidesinsightintothereferrersandorcriminalinfrastructure
•SinkingdomainsinthecaseofphishingexposesadditionalURIsofinterest
AdaptingIdentificationMethodology
1:JscriptInfection
2:DNSBeaconMalware
Case1:JSBackdoor
Thereisacompromisedmachinewithabackdooronasinglehost.Vendordetectionisnon-existent.ItisaJSbackdoormakingC2connectionsatregularintervals.
C2connectionsaremadetothebelow:
60,*.
GET
https[:]//offpotubeda.endofinternet[.]net:443/related/?action=get_config
&guid=<redacted>&version=1115
FirstSteps
Quantify
•22accountsatthetimehadhostnamesrelatedto60
Identify
•Theaccountassociatedwiththesuppliedmalicioushostnamecreateditfrom2
Theimpactedpartyprovidedacopyofthe.jsfiletheyfoundontheinfectedmachine
Betweentheemailandaccountusagehistory,itseemsclearadomaingenerationalgorithmwasbeingused
DNSTrafficIntel
Whoaskedforwhat?Whendidtheyaskforit?Howoftenaretheyasking?
<Epoch>#8899
<Epoch>#8899
<Epoch>#8899
<Epoch>#8899
RecursiveDNSServers
Authoritative
DNSServer
EndpointsRequestingDGADomains
Lookingatwhoisasking…
InmostcasestherequestorforauthoritativeDNSrecordsisarecursiveresolver
Thisisonewaytoassesspotentiallyimpactedorganizationsorgeographies
AmajorityofrecursiveresolversontheinternetimplementDNSsourceportrandomization
•/html/rfc5452
40and2001:67c:2070:8b06::2whereonlyrequestingDGAdomainsandalwaysusingsourceport53(forIPv4)
DGAdomainsandalwaysusingsourceport53(forIPv4)
•"Delta-X”LTDUkriane,Kyiv.
40Connectivity
ASN200000
OtherAnomalies
Unlikealloftheotherrequests40wasalsoappendingahashtoeachauthoritativerequestwhilerequestingthebasedomaininthesamesecond
•1431410081a3f34ef153f6b09091ad104add8e5e987.isctm.isteingeek.de
•1431410081isctm.isteingeek.de
•1431410081
•1431410081
•1431410081
•1431410081
•1431410081a2bf47eb9d1297cc614fcc876af7ac28e.webgdame.isteingeek.de
•1431410081webgdame.isteingeek.de
LookingattheDGA
WhilediggingintothisportionDanielPlohmannwasabletoreverseengineertheDGA
ThehoststheDGAwastargeting:
•
•isteingeek.de
•
Aswellasthecollectionofngramswhichareusedtogeneratethethirdtierdomainname:
ohuswhatsiasisoffnetwebcallhowaskelcodeqctupogtmtubedamernokosiledsitenafpkunbonrimakeinnahostadoldforjownto
Mitigation/OutReach
WiththeDGAsolveditbecamefeasibletoregisterthedomainnamesbeforetheactor
•Insteadofreclaimingthedomainsaftertheywereregistered
Preregistrationbegan…
•IPsfrom1,358ASNsmadeconnectionstothesinkhole
•ASNswithtiesto117countries
•14,185uniqueIPsmadeconnectionstothesinkholeduringthefirst5daysofobservation
DuetothenumberofinfectedendpointsandtheirprofilewegeneratedafeedforShadowServer
WindowsEndpointstoSinkhole
AdditionstotheSinkhole
DespitelookinglikeJavascript,themalwarewaswrittenin"Jscript”
•AJavascriptlikevbscriptalternativecreatedbyMicrosoft
•Thisnuancehintedthatitmightbeagoodideatoensurethatwep0foranotherOSfingerprintingtoolwasdeployedtothesinkhole
•Thegoalofthisbeingtheabilitytosegment“possiblyinfected”from“researchrelated”requestorsoperatingunderthetheorythatonlythingswithWindowsfingerprintsshouldbeconsidered
Verifyingp0ffingerprints
2%
3%
0%
95%
Windows7or8
WindowsNTkernel
Linux
FreeBSD
Thispatternsoundsfamiliar
Whydidn’tyourExploitKit/TrafficDirectionServicepatternpickthisup?
•Itsregisteringdomainsonafixedinterval
•Itsaddinganddeletingdomainstoaccountsthatresolvetothesame
endpoint
Theysplittheactivityupacrossmultipleaccounts…
•Oneaccountwouldaddadomain
•Anotheraccountwouldaddthefollowupdomain…etc
Oneimportanttakeawayfromthiswastotakeawiderviewandlookat
findingactivitysplayedacrossendpoints
Alsolookingatrecursivetrafficforthedomainiskey
HigherQualityDGA
Theyusedasetofngramswhichmake
“lessanomalouslooking”names
Someofthedomainsareevenallreal
words!
Earlierwewerelookingatdomainslike:
•Longrunsofonlyconsonants
•Alackofcommonvowelconsonant
groupings…
•owhatnetweb.isteingeek.de
•
•
•whatishowask.isteingeek.de
•
•isweblcode.isteingeek.de
•
•
•webaskctu.isteingeek.de
•
Case2:DNSBeaconingMalware
InearlyDecember2014wereceivedasamplefromShadowServerunlikeothersseeninthepast
•ItwasofspecificinterestbecausethesandboxshowedsomeveryinterestingDNStraffic
OnJan11th2015postedadetailedlookattheNorthKoreanCentralNewsAgencywebserver
Theposthaddetailsaboutaspecifictypeofmalwarebeingdistributedfromthewebsite
CylanceReport:KCNAMalware
Thedomain,a.gwas.perl.sh,isrequestedbythemalware
TheresultingIPaddressoftheDNSqueryofa.gwas.perl.sh(3)isthensentaDNSquery
Thetargetdomainisastringwhichpresumablyidentifiesfeaturesabouttheinfectedvictim.
ImageandDetailsfrom/infinity-vs.-the-real-world-kcna-malware
SamePatternDifferentHash
Asthiswasmakingitswastotheblog-o-spherearagtagbandwaslookingintoasimilarsample
•DanielPlohmannofFraunhoferFKIE
•StevenAdairofVolexity
Theinitialrelationshipwascenteredonthedomaina.gwas.perl.sh
ThenafterseeingwhatCylancepublishedaboutthedomainnamesusedforbeaconingwecouldconfirmthatthenetworkcommunicationlookedthesame
C&CDomain
Thebinaryourteamwasfocusingonused3hardcodedC&Cnodes:
•a.gwas.perl.sh
•
•
ThelatterofthedomainsisonewhichisusingDyn’sDynamicDNSplatform
AftergoingovertheincidentwithourCustomerServiceteamthedomainwasmovetoasinkhole
Whoisasking?
WiththedomainresolvingtoasinkholewenowwerereceivingallofthetrafficoriginallydestinedfortheC&Cdomain
ThisallowedustocapturetheDNSbeaconqueries
AtfirstwewereusingBroIDStologalloftheDNStraffic,howeveritwasrunningalowercasefunctionontheCNAME
Thisleadtoaswitchtothemostrichdatastreamfullnetworkcapture!
akatcpdump
RecursiveResolversQueryingfor
Thescalehelpsshowthediversitybut>99%ofthequeriesare
fromCN
EndpointssendingDNSBeaconstothesinkhole
Thescalehelpsshowthediversitybut>99%ofthebeaconscome
fromCN
Reversing
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025年度高科技研发中心监事聘用合同模板3篇
- 2025年度兼职教师教育资源共享与开发合同3篇
- 二零二五年度台球室租赁与青少年培训课程合同3篇
- 2025年度文化创意产业项目投资公司正规合同3篇
- 二零二五年度自驾游租车服务及景点门票合同3篇
- 二零二五年度文化旅游企业股东股权转让合同范例3篇
- 2025年度金融科技公司股权合资合同样本3篇
- 2025年度产业升级改造拆迁房产分割与税收优惠政策合同3篇
- 二零二五年度建筑材料供货与建筑防水保温合同3篇
- 二零二五年度农产品电商平台入驻服务合同版2篇
- 中建安全标准化图册图集(上下全集)(全电子版)
- 高一物理必修一思维导图
- 锚索张拉和锁定记录表
- 2016年校本课程--------合唱教案1
- 【原创】《圆柱与圆锥》复习课教教学设计
- 《中国药典》规定中药饮片用量
- 国网合肥供电公司城市新建住宅小区电力建设实施细则
- 初中物理元件实物图及一些常用图形
- 中小学生备战期末迎接期末考试动员班会PPT
- 房测之友BMF用户说明书
- 国自然模板(空白版)
评论
0/150
提交评论