SlideShare une entreprise Scribd logo
1  sur  23
A LUSTRUM OF MALWARE
NETWORK COMMUNICATION
EVOLUTION AND INSIGHTS
C H A Z L E V E R , P h D C A N D I DAT E
WHY DO WE CARE ABOUT MALWARE?
What is malware?
• Quite simply it is malicious software (e.g., viruses, spyware,
ransomware, and adware).
Why do we care?
• Used for illicit activities that affect individuals, enterprises, and
even governments.
• Reverse engineering malware is the foundation upon which
numerous security defenses are based.
WHAT IS MALWARE ANALYSIS?
What is malware analysis?
• Process of studying the functionality and potential impact of
malware samples.
• Static analysis examines malware without executing it.
• Dynamic analysis examines malware by running it in controlled
sandbox.
Why is it important?
• This is how indicators of compromise (IOCs) and other
information are derived from actual malware samples.
MORE MALWARE, MORE PROBLEMS?
• Cyber attacks are on the rise.
• Malware has been at the center
of a number of these attacks.
• Despite access to more malware
samples than ever, malware
based security products did not
prevent threats.
HOW MUCH MALWARE IS THERE?
5
Collection
Issues
ARE WE DOING IT WRONG?
6
A LUSTRUM OF MALWARE
What did we do?
• Study the network signal extracted from malware over a
half decade.
What are we trying to understand?
• Is malware effective for use with early warning systems?
• What are limitations of systems that rely on malware
samples for defense?
WHERE’S THE DATA?
8
*All datasets correspond to January 2011 through August 2015.
MALWARE CLASSIFICATION
What’s the goal?
• Cluster AV labels from VirusTotal based on family.
• Link each family with a both a type and queried e2LDs.
• Will use this information to provide extra context in later analysis.
What did we do?
• Modify AVClass1 to spit out a type (i.e., PUP or malware) for each
sample.
• Ran over our dataset of 23.9M VirusTotal reports.
9
GROWTH IN MALWARE BY TYPE
10
Collection Issue
CLASSIFICATION RESULTS
• There are more malware families, but PUP families tend to
have more samples per family.
11
Top Families by Sample Top Families by e2LD
• Malware families tend to have more e2LDs per sample,
indicating greater domain polymorphism.
CLEANING UP DATASETS
Invalid Domains
• Remove NX Domains to reduce the effects of Domain Generation Algorithms (DGA)
• Reduction from 6.8M to 1.31M e2LDs
Benign Domains
• Remove popular domains from Alexa
• Remove known content delivery networks (CDN)
• Manually whitelist remaining domains
• Reduction from 1.31M to 1.29M e2LDs
Spam Domains
• Remove resolutions from binaries with lots of MX lookups
• Remove resolutions with mail related keywords (e.g., mail, smtp, imap)
• Reduction from 1.29M to 329,348 e2LDs
Reverse Zone Delegations
• Remove reverse delegations, which often result from system level processes and introduce lots of
noise.
• Reduction from 329,348 to 327,514 e2LDs
12
DOMAIN POLYMORPHISM
• Most malware samples resolve fewer than 10 unique full qualified
domains (FQDNs).
• Most registered domains only queried by a single, unique
malware sample.
• Evasion appears to happen on the registered domain.
Blacklisting domains may do little to prevent future
communication from new samples.
13
subdomain.example.com
MALWARE QUERYING DYNAMIC DNS
• Evasion happens on the child label.
• Queried 8.6M (32%) distinct samples in our dataset.
14
Description: The Top 100 most popular Dynamic DNS domains queried by malware
samples.
MALWARE QUERYING CDNS
• Most popular CDNs are the usual suspects.
• Malware communication is hiding in plain site.
15
Description: Complete list of all known CDN domains queried by malware samples in
our dataset.
MALWARE QUERYING DGA DOMAINS
• Over 12.5M (46%) of
malware samples contained
at least one NX domain.
16
• Before filtering, we found
that 3M (44%) of all
domains were in DGArchive.
• After filtering, we found that
55,396 (17%) of filtered
domains were in DGArchive.
MALWARE QUERYING SPAM DOMAINS
• Most spam related malware
samples queried hundreds or
thousands of MX domains.
17
• Most popular spam related
sample (i.e., MyDoom) is
over a decade old.
AN INCONVENIENT TRUTH
18
(a) pDNS (b) PBL
(c) Expired Domains
Description: Time difference
between a domain was first seen in
passive DNS, public blacklists, or an
expired domain list rather than
through dynamic malware analysis.
LIFETIME OF DOMAINS
19
(a) Malware (b) PUP (c) Unknown
Description: Joint distribution of domain lifetime and resolution frequency
observed in passive DNS for PUP, Malware, and Unclassified domains.
Notice similarities
INFRASTRUCTURE ANALYSIS
2012
Notice pockets of abuse
INFRASTRUCTURE ANALYSIS
2012 2013
2014 2015
Pockets of abuse
across all years
KEY TAKE-AWAYS
• Waiting for malware to be discovered results in long
windows of vulnerability and potentially limited efficacy.
• Network defenses have the potential to identify threats
before the malware sample is discovered.
• Malware analysis is still extremely useful, but it’s
important to understand the limitations.
THANK YOU
THANK YOU!
chazlever@gatech.edu
linkedin.com/in/chazlever
@chazlever

Contenu connexe

Tendances

Shmoocon Epilogue 2013 - Ruining security models with SSH
Shmoocon Epilogue 2013 - Ruining security models with SSHShmoocon Epilogue 2013 - Ruining security models with SSH
Shmoocon Epilogue 2013 - Ruining security models with SSH
Andrew Morris
 
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
Andrew Morris
 
Lateral Movement - Phreaknik 2016
Lateral Movement - Phreaknik 2016Lateral Movement - Phreaknik 2016
Lateral Movement - Phreaknik 2016
Xavier Ashe
 
Hack Attack! An Introduction to Penetration Testing
Hack Attack! An Introduction to Penetration TestingHack Attack! An Introduction to Penetration Testing
Hack Attack! An Introduction to Penetration Testing
Steve Phillips
 

Tendances (20)

Shmoocon Epilogue 2013 - Ruining security models with SSH
Shmoocon Epilogue 2013 - Ruining security models with SSHShmoocon Epilogue 2013 - Ruining security models with SSH
Shmoocon Epilogue 2013 - Ruining security models with SSH
 
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse TeamsUsing GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams
 
BlueHat v17 || Disrupting the Mirai Botnet
BlueHat v17 || Disrupting the Mirai Botnet BlueHat v17 || Disrupting the Mirai Botnet
BlueHat v17 || Disrupting the Mirai Botnet
 
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
 
Adversarial Post-Ex: Lessons From The Pros
Adversarial Post-Ex: Lessons From The ProsAdversarial Post-Ex: Lessons From The Pros
Adversarial Post-Ex: Lessons From The Pros
 
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...
 
Threat Con 2021: What's Hitting my Honeypots
Threat Con 2021: What's Hitting my HoneypotsThreat Con 2021: What's Hitting my Honeypots
Threat Con 2021: What's Hitting my Honeypots
 
OFFENSIVE: Exploiting DNS servers changes BlackHat Asia 2014
OFFENSIVE: Exploiting DNS servers changes BlackHat Asia 2014OFFENSIVE: Exploiting DNS servers changes BlackHat Asia 2014
OFFENSIVE: Exploiting DNS servers changes BlackHat Asia 2014
 
BSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
BSidesLV 2016 - Powershell - Hunting on the Endpoint - GerritzBSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
BSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
 
Lateral Movement - Phreaknik 2016
Lateral Movement - Phreaknik 2016Lateral Movement - Phreaknik 2016
Lateral Movement - Phreaknik 2016
 
Malware Analysis Made Simple
Malware Analysis Made SimpleMalware Analysis Made Simple
Malware Analysis Made Simple
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
 
Botconf ppt
Botconf   pptBotconf   ppt
Botconf ppt
 
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud XiaoFruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
 
Sullivan white boxcrypto-baythreat-2013
Sullivan white boxcrypto-baythreat-2013Sullivan white boxcrypto-baythreat-2013
Sullivan white boxcrypto-baythreat-2013
 
Modern Reconnaissance Phase on APT - protection layer
Modern Reconnaissance Phase on APT - protection layerModern Reconnaissance Phase on APT - protection layer
Modern Reconnaissance Phase on APT - protection layer
 
ION Hangzhou - How to Deploy DNSSEC
ION Hangzhou - How to Deploy DNSSECION Hangzhou - How to Deploy DNSSEC
ION Hangzhou - How to Deploy DNSSEC
 
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDefcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
 
Hack Attack! An Introduction to Penetration Testing
Hack Attack! An Introduction to Penetration TestingHack Attack! An Introduction to Penetration Testing
Hack Attack! An Introduction to Penetration Testing
 
Lateral Movement: How attackers quietly traverse your Network
Lateral Movement: How attackers quietly traverse your NetworkLateral Movement: How attackers quietly traverse your Network
Lateral Movement: How attackers quietly traverse your Network
 

Similaire à BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insights

Watchtowers of the Internet - Source Boston 2012
Watchtowers of the Internet - Source Boston 2012Watchtowers of the Internet - Source Boston 2012
Watchtowers of the Internet - Source Boston 2012
Stephan Chenette
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Emulex Corporation
 
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
Alex Pinto
 

Similaire à BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insights (20)

Watchtowers of the Internet - Source Boston 2012
Watchtowers of the Internet - Source Boston 2012Watchtowers of the Internet - Source Boston 2012
Watchtowers of the Internet - Source Boston 2012
 
Talos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseTalos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the Noise
 
Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...
Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...
Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...
 
The modern-malware-review-march-2013
The modern-malware-review-march-2013 The modern-malware-review-march-2013
The modern-malware-review-march-2013
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
 
The Modern Malware Review March 2013
The Modern Malware Review March 2013The Modern Malware Review March 2013
The Modern Malware Review March 2013
 
Splunk Enterprise for InfoSec Hands-On Breakout Session
Splunk Enterprise for InfoSec Hands-On Breakout SessionSplunk Enterprise for InfoSec Hands-On Breakout Session
Splunk Enterprise for InfoSec Hands-On Breakout Session
 
Clean dns enus
Clean dns enusClean dns enus
Clean dns enus
 
Advanced Threat Defense Intel Security
Advanced Threat Defense  Intel SecurityAdvanced Threat Defense  Intel Security
Advanced Threat Defense Intel Security
 
Clean dns enus
Clean dns enusClean dns enus
Clean dns enus
 
CleanDNS_enUS
CleanDNS_enUSCleanDNS_enUS
CleanDNS_enUS
 
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
 
Hunting on the cheap
Hunting on the cheapHunting on the cheap
Hunting on the cheap
 
Hunting on the Cheap
Hunting on the CheapHunting on the Cheap
Hunting on the Cheap
 
Lacework | Top 10 Cloud Security Threats
Lacework | Top 10 Cloud Security ThreatsLacework | Top 10 Cloud Security Threats
Lacework | Top 10 Cloud Security Threats
 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
 
Next Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and DefenseNext Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and Defense
 
From liability to asset, the role you should be playing in your security arch...
From liability to asset, the role you should be playing in your security arch...From liability to asset, the role you should be playing in your security arch...
From liability to asset, the role you should be playing in your security arch...
 
Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version external
 
Ransomware Attack: Best Practices to proactively prevent contain and respond
Ransomware Attack: Best Practices to proactively prevent contain and respondRansomware Attack: Best Practices to proactively prevent contain and respond
Ransomware Attack: Best Practices to proactively prevent contain and respond
 

Plus de BlueHat Security Conference

BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
BlueHat Security Conference
 
BlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
BlueHat Seattle 2019 || Kubernetes Practical Attack and DefenseBlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
BlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
BlueHat Security Conference
 
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
BlueHat Security Conference
 
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
BlueHat Security Conference
 
BlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiledBlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiled
BlueHat Security Conference
 
BlueHat v18 || Memory resident implants - code injection is alive and well
BlueHat v18 || Memory resident implants - code injection is alive and wellBlueHat v18 || Memory resident implants - code injection is alive and well
BlueHat v18 || Memory resident implants - code injection is alive and well
BlueHat Security Conference
 
BlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Massive scale usb device driver fuzz without deviceBlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat Security Conference
 
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat Security Conference
 
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deceptionBlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat Security Conference
 

Plus de BlueHat Security Conference (20)

BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
 
BlueHat Seattle 2019 || Keynote
BlueHat Seattle 2019 || KeynoteBlueHat Seattle 2019 || Keynote
BlueHat Seattle 2019 || Keynote
 
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One StoryBlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
 
BlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
BlueHat Seattle 2019 || Kubernetes Practical Attack and DefenseBlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
BlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
 
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come alone
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come aloneBlueHat Seattle 2019 || Open Source Security, vulnerabilities never come alone
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come alone
 
BlueHat Seattle 2019 || Modern Binary Analysis with ILs
BlueHat Seattle 2019 || Modern Binary Analysis with ILsBlueHat Seattle 2019 || Modern Binary Analysis with ILs
BlueHat Seattle 2019 || Modern Binary Analysis with ILs
 
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.
 
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure ADBlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
 
BlueHat Seattle 2019 || Autopsies of Recent DFIR Investigations
BlueHat Seattle 2019 || Autopsies of Recent DFIR InvestigationsBlueHat Seattle 2019 || Autopsies of Recent DFIR Investigations
BlueHat Seattle 2019 || Autopsies of Recent DFIR Investigations
 
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
 
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
 
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
 
BlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiledBlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiled
 
BlueHat v18 || WSL reloaded - Let's try to do better fuzzing
BlueHat v18 || WSL reloaded - Let's try to do better fuzzingBlueHat v18 || WSL reloaded - Let's try to do better fuzzing
BlueHat v18 || WSL reloaded - Let's try to do better fuzzing
 
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxyBlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
 
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windows
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windowsBlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windows
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windows
 
BlueHat v18 || Memory resident implants - code injection is alive and well
BlueHat v18 || Memory resident implants - code injection is alive and wellBlueHat v18 || Memory resident implants - code injection is alive and well
BlueHat v18 || Memory resident implants - code injection is alive and well
 
BlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Massive scale usb device driver fuzz without deviceBlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Massive scale usb device driver fuzz without device
 
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
 
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deceptionBlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deception
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Dernier (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 

BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insights

  • 1. A LUSTRUM OF MALWARE NETWORK COMMUNICATION EVOLUTION AND INSIGHTS C H A Z L E V E R , P h D C A N D I DAT E
  • 2. WHY DO WE CARE ABOUT MALWARE? What is malware? • Quite simply it is malicious software (e.g., viruses, spyware, ransomware, and adware). Why do we care? • Used for illicit activities that affect individuals, enterprises, and even governments. • Reverse engineering malware is the foundation upon which numerous security defenses are based.
  • 3. WHAT IS MALWARE ANALYSIS? What is malware analysis? • Process of studying the functionality and potential impact of malware samples. • Static analysis examines malware without executing it. • Dynamic analysis examines malware by running it in controlled sandbox. Why is it important? • This is how indicators of compromise (IOCs) and other information are derived from actual malware samples.
  • 4. MORE MALWARE, MORE PROBLEMS? • Cyber attacks are on the rise. • Malware has been at the center of a number of these attacks. • Despite access to more malware samples than ever, malware based security products did not prevent threats.
  • 5. HOW MUCH MALWARE IS THERE? 5 Collection Issues
  • 6. ARE WE DOING IT WRONG? 6
  • 7. A LUSTRUM OF MALWARE What did we do? • Study the network signal extracted from malware over a half decade. What are we trying to understand? • Is malware effective for use with early warning systems? • What are limitations of systems that rely on malware samples for defense?
  • 8. WHERE’S THE DATA? 8 *All datasets correspond to January 2011 through August 2015.
  • 9. MALWARE CLASSIFICATION What’s the goal? • Cluster AV labels from VirusTotal based on family. • Link each family with a both a type and queried e2LDs. • Will use this information to provide extra context in later analysis. What did we do? • Modify AVClass1 to spit out a type (i.e., PUP or malware) for each sample. • Ran over our dataset of 23.9M VirusTotal reports. 9
  • 10. GROWTH IN MALWARE BY TYPE 10 Collection Issue
  • 11. CLASSIFICATION RESULTS • There are more malware families, but PUP families tend to have more samples per family. 11 Top Families by Sample Top Families by e2LD • Malware families tend to have more e2LDs per sample, indicating greater domain polymorphism.
  • 12. CLEANING UP DATASETS Invalid Domains • Remove NX Domains to reduce the effects of Domain Generation Algorithms (DGA) • Reduction from 6.8M to 1.31M e2LDs Benign Domains • Remove popular domains from Alexa • Remove known content delivery networks (CDN) • Manually whitelist remaining domains • Reduction from 1.31M to 1.29M e2LDs Spam Domains • Remove resolutions from binaries with lots of MX lookups • Remove resolutions with mail related keywords (e.g., mail, smtp, imap) • Reduction from 1.29M to 329,348 e2LDs Reverse Zone Delegations • Remove reverse delegations, which often result from system level processes and introduce lots of noise. • Reduction from 329,348 to 327,514 e2LDs 12
  • 13. DOMAIN POLYMORPHISM • Most malware samples resolve fewer than 10 unique full qualified domains (FQDNs). • Most registered domains only queried by a single, unique malware sample. • Evasion appears to happen on the registered domain. Blacklisting domains may do little to prevent future communication from new samples. 13 subdomain.example.com
  • 14. MALWARE QUERYING DYNAMIC DNS • Evasion happens on the child label. • Queried 8.6M (32%) distinct samples in our dataset. 14 Description: The Top 100 most popular Dynamic DNS domains queried by malware samples.
  • 15. MALWARE QUERYING CDNS • Most popular CDNs are the usual suspects. • Malware communication is hiding in plain site. 15 Description: Complete list of all known CDN domains queried by malware samples in our dataset.
  • 16. MALWARE QUERYING DGA DOMAINS • Over 12.5M (46%) of malware samples contained at least one NX domain. 16 • Before filtering, we found that 3M (44%) of all domains were in DGArchive. • After filtering, we found that 55,396 (17%) of filtered domains were in DGArchive.
  • 17. MALWARE QUERYING SPAM DOMAINS • Most spam related malware samples queried hundreds or thousands of MX domains. 17 • Most popular spam related sample (i.e., MyDoom) is over a decade old.
  • 18. AN INCONVENIENT TRUTH 18 (a) pDNS (b) PBL (c) Expired Domains Description: Time difference between a domain was first seen in passive DNS, public blacklists, or an expired domain list rather than through dynamic malware analysis.
  • 19. LIFETIME OF DOMAINS 19 (a) Malware (b) PUP (c) Unknown Description: Joint distribution of domain lifetime and resolution frequency observed in passive DNS for PUP, Malware, and Unclassified domains. Notice similarities
  • 21. INFRASTRUCTURE ANALYSIS 2012 2013 2014 2015 Pockets of abuse across all years
  • 22. KEY TAKE-AWAYS • Waiting for malware to be discovered results in long windows of vulnerability and potentially limited efficacy. • Network defenses have the potential to identify threats before the malware sample is discovered. • Malware analysis is still extremely useful, but it’s important to understand the limitations.

Notes de l'éditeur

  1. Malware is simply malicious software. Lots of different types but “malware” is the general umbrella under which they fall. Malware is used to facilitate illicit activity on the Internet—affecting individuals, enterprises, and even nation states. Give some examples of different types of malware abuse (Mirai botnet, banking trojans, etc.)
  2. Defense frequently rely on malware analysis, and therefore, require the malware sample for future protection. AVs will build signatures from malware analysis. IDSes and blacklists will rely on the networks signal extracted from malware analysis.
  3. - The world isn’t on fire, but there are definitely some potential pitfalls.
  4. To our knowledge, largest such study performed. Brought together a number of different datasets to better understand network communication from malware.
  5. - Largest classification effort to date
  6. LOTS of malware and increasing year over year. Shows an increase in PUP samples over time—even overtaking number of malware samples in 2015. Previous work Kotzias et. al shows the same trend but on much smaller datasets. Work by Thomas et. al showed that Google Safe Browsing generates 3X as many detections for PUP as malware.
  7. 3,834 families with 10 samples are over 90% of all samples. 3,165 are malware 669 are PUP PUP has an average of 16K samples per family. Malware has an average of only 3.5K per family. We identifed 36.5K malware e2LDs and 9.1K PUP e2LDs.
  8. Found 718 e2LDs that account for 51,350 FQDNs The most popular dynamic DNS domain is: dnsd.me (owned by the dynamic DNS provider DNSdynamic [1]), queried by 216,221 unique MD5s service is not only free, but it offers unlimited registrations and an API for account management—making it very attractive for malware authors
  9. The most popular CDNs did *not* appear to be lesser known, shady organizations! The top five most queried CDN domains include akamai.net, edgesuite.net, cloudfront.net, netdna-cdn.com, and akadns.net. The akamai.net domain alone: is queried by 2,183,352 distinct malware samples has 1,492 unique child labels under it.
  10. DGAs are a prevalent form behavior seen across many different malware samples. Account for a large number of domains from malware analysis Illustrates the challenges of building blacklists from malware feeds
  11. - Provides motivation for why we treated these different than other samples.
  12. PBL Only 30% of domains were added to PBLs before being observed in malware analysis. 20% were reported with a delay of over 500 days Result is consistent with previous work by Kuhrer et. al where domains seen in DNS on average 384 days before PBL Reputation systems have also shown the ability to discover threats faster than PBLs pDNS Long tail on left part of graph can be partially explained by malware relying on benign infrastructure such as dynamic DNS and CDN providers. Potentially long setup phase. Expired Domains Has a pronounced effect on the right side of the graph (i.e., more domains seen after discovering malware sample) Summary Blacklists built from dynamic malware analysis will still be unaware of potential threats for several weeks or even months.
  13. Malware/Unknown Three separate hotspots: bottom left, top right, bottom right Malware and unknown appear to show same behavior (i.e., unknown likely not PUP) PUP prevalence of PUP domains over last 2-3 years justifies [1000, 1000] bounding of the joint distribution Organizations failing to block PUP domains End-point security engines that do not manage to remediate PUP infections. Summarizing all three types of domains frequently have long domain lifetimes many of those domains are frequently looked up. most domains were only resolved by a single sample in Section V-A1 this suggests that many samples remain active on the Internet for extended periods of time.