SlideShare a Scribd company logo
1 of 44
Exploiting Redundancy Properties of
Malicious Infrastructure
John Bambenek, Manager of Threat Systems
Fidelis Cybersecurity
PHDays 6 – Moscow, Russia
© Fidelis Cybersecurity
Intro
• Manager at Fidelis Cybersecurity of a team responsible for
automation and data mining threat information.
• Faculty at University of Illinois – Urbana-Champaign in
Computer Science.
• Participate (and run) many private groups investigating
major criminal threats on the internet.
• I generally focus only on criminal threats and avoid nation-
state/espionage.
2
© Fidelis Cybersecurity
Agenda
• Single Point of Failure vs Redundancy
• Redundancy techniques
• Detection
• Sinkholing
• Increased Fingerprints
• Targeted Intelligence Operations
• Surveillance
• Towards more Effective Disruption
3
© Fidelis Cybersecurity
Single Point of Failure vs Redundancy
• Many malware attacks rely on a single method of
communication (a single IP, DNS name, tor node, etc).
• Easy to set up and maintain, low cost of entry.
• However, only two states: up or down.
• Cannot establish a pattern on a single data point.
• Many RATs are single C2 based.
• Attackers who want to persist need something else.
4
© Fidelis Cybersecurity
Single C2 Examples
5
Example of static C2 config (more on barncat later)
© Fidelis Cybersecurity
Multi C2 example
6
Example of static C2 config (more on barncat later)
© Fidelis Cybersecurity
Redundancy Techniques
• Multiple IPs/Hostnames (static lists)
• Use of Fast Flux / Double Flux
• DGAs
• Tor/I2P
• Multiple Methods
• If done right, uses multiple ISPs/providers
7
© Fidelis Cybersecurity
Detection
• If you already know about a threat, you can protect based
on a single piece of information.
• For unknown threats, you need to have a pattern and
single data points aren’t a pattern.
• Redundancy helps us by forcing the adversary to create
fingerprints we can use to detect otherwise “unknown”
threats.
• Allows for data mining, statistical analysis, etc.
8
© Fidelis Cybersecurity
Goal
• Goal: Force adversary to behavior that inherently requires
them to create patterns.
• Takedowns are risky because the attacker can adapt back
into an “unknown threat”. Patterns, however, tend to persist
if you have visibility into their behavior.
9
© Fidelis Cybersecurity
Detection
• Double flux networks rely on a massive pool of
endpoints and nameservers so taking down a single
IP has no impact to adversary.
divewithsharks.hk. 1800 IN A 70.68.187.xxx [xxx.vf.shawcable.net]
divewithsharks.hk. 1800 IN A 76.209.81.xxx [SBIS-AS - AT&T Internet Services]
divewithsharks.hk. 1800 IN A 85.207.74.xxx [adsl-ustixxx-74-207-85.bluetone.cz]
divewithsharks.hk. 1800 IN A 90.144.43.xxx [d90-144-43-xxx.cust.tele2.fr]
divewithsharks.hk. 1800 IN A 142.165.41.xxx [142-165-41-xxx.msjw.hsdb.sasknet.sk.ca]
10
© Fidelis Cybersecurity
Detection – Flux networks
• Besides CDNs, very few valid DNS queries will have
multiple low TTL A records across geographies and network
boundaries (especially in residential IP space).
• Almost no one has low TTL NS records (very limited use
case).
• Can combine with domain/IP rep or alexa to increase
confidence.
11
© Fidelis Cybersecurity
Detection - DGAs
• Pseudorandom domain names (or hostnames) usually
many hundreds or thousands generated (potentially per
day).
• Attacker only needs to control one of the domains, if it gets
suspended they can just register another to reassert
control.
12
© Fidelis Cybersecurity
Detection – DGAs (tinba)
• pmlmfbehhunq.com,72.52.4.90,a.ns36.de|b.ns36.de
• pmqeelsxyddk.com,188.120.224.164,ns1.reg.ru|ns2.reg.ru
• pqtcwrrrvgvf.ru,158.58.170.148,a.dnspod.com|b.dnspod.com|c.dnspod.com
• pubejsbumwql.com,72.52.4.90,a.ns36.de|b.ns36.de
• qrwlypygphht.ru,158.58.170.148,a.dnspod.com|b.dnspod.com|c.dnspod.com
• Easy to load known DGA domains into RPZ to block at
DNS level.
13
© Fidelis Cybersecurity
Detection - DGAs
• Easy to find “unknown” DGAs.
• The biggest obvious network behavior of DGA enabled malware
is a large number of NXDOMAIN responses to queries.
• Most DGAs have a majority of domains unregistered)
• Looking at DNS logs for repetitive queries to NXDOMAIN or
known sinkholed IPs.
14
© Fidelis Cybersecurity
Detection - DGAs
• For non-word list DGAs, checking domain names for high entropy finds
“random” looking domains.
• N-Gram analysis can also be used to find DGA-like domains.
• Based on looking at sequences of characters that do not naturally
occur in a given language to create a score (essentially anti-
patterns).
• i.e. “QQ” is not naturally occurring 2-letter combination in English
• Based on statistical comparisons of letter combinations in “natural”
language and observed domain names, you can make some
conclusions.
15
© Fidelis Cybersecurity
Detection - DGAs
• Can be language specific so care needs to be done for
other languages.
• Using n-grams is not a 100% confidence prospect, other
checking needs to be done.
• See “Use of n-Gram models for DGA detection” once
published.
16
© Fidelis Cybersecurity
Sinkholing
• For DGAs, most domains are unregistered.
• If researcher registers one (or several) of those domains,
victims will beacon to them.
• Useful for telemetry data or developing signatures.
• Some adversaries have started creating sinkhole-aware
malware.
17
© Fidelis Cybersecurity
Other uses of sinkholing
• If you can make victims thinking you are the C2, you can, to
an extent, control the victim.
• May require other data (encryption keys) and mimicking
the C2 protocol.
• Some (but not all) malware families have a self-destruct
option to uninstall on victim’s machine.
• This has been done in the past as part of takedowns.
18
© Fidelis Cybersecurity
Other users of sinkholing
• You can also engage in direct control of the victim.
• A “white hat” hacker, recently breached part of an exploit kit network to
install Avira instead of the intended malware by replacing the binary.
• Transient benefit.
• If you do this, please just install Flash/Adobe/Java patches instead.
• More persistent benefit
19
© Fidelis Cybersecurity
Important Note
• Doing any of the above without legal authority is probably
criminal in almost every jurisdiction represented in this
room.
• Going to jail is bad, I don’t recommend it.
20
© Fidelis Cybersecurity
Targeted Intelligence Operations
• Our biggest difficulty in prosecuting cybercrime is the
difficulty in getting information between nations.
• International cooperation is often marred by unrelated
foreign policy constraints, sometimes even with private
sector actors.
• To make matters worse, as a consequence of the amount
of data and metadata created by computers and networks,
there is a huge amount of tools available to hide.
21
© Fidelis Cybersecurity
Targeted Intelligence Operations
• When the adversary has only a single static C2, your
options are limited:
• Take it down
• Get a wiretap
• If you take it down and lack other tracking ability, the
attacker will just set up their operation elsewhere… and
potentially break your visibility into their operations.
22
© Fidelis Cybersecurity
Targeted Intelligence Operations
• When an adversary uses redundant C2 methods, a
disruption in part of their communications is not critical.
• They may not make wholesale changes.
• The key to a targeted intelligence operation is to have
enough impact so the adversary does something but not
enough impact where they disappear and stop operating.
23
© Fidelis Cybersecurity
Examples
• During Cryptolocker, they often used the same Chinese
registrar (DNSPOD) for their DGA registrations.
• In 2013, Chinese-American cooperation was not great.
• Objectives:
• I wanted to build a relationship with a Chinese company to
deal with obvious abuse.
• I wanted to see how they would change if that registrar
suspended a few domains.
24
© Fidelis Cybersecurity
Examples
• Results:
• For a few days, they kept using DNSPOD.
• For two weeks, they used a different register before going
back to DNSPOD.
• The cycling of registrant accounts led to some good leads
available to “western” law enforcement for their
investigation.
• I opened the door to working with other Chinese
companies on criminal matters.
25
© Fidelis Cybersecurity
Example #2
• I was tracking a criminal service provider who used a
“shared hosting” account to manage their infrastructure.
• I paid “a premium” to get an account on the same box to
see if I can use poor file system permissions to gather
additional intelligence (perfectly legal).
• It didn’t work but attacker didn’t know that.
• Attacker was aware of who I am and that I was tracking
him, so I subtly let him know I got an account on the same
box.
26
© Fidelis Cybersecurity
Example #2
• Attacker very quickly moved their C2 operations using a
control panel “move” function.
• Also required them to reissue binaries and cause some
disruption and a poor “customer experience”.
• Most important, using the “move function” left files behind
after they left. This allows for possibility of a search warrant
to obtain that data without the adversary being aware.
27
© Fidelis Cybersecurity
More Fingerprints
• The use of redundancy also comes with new fingerprints
that can be used to identify adversaries.
• DGAs inherently mean WHOIS artifacts could be used to
find and track specific adversaries in all their operations.
28
© Fidelis Cybersecurity
Whois Info
• Many actors will use WHOIS protection… some just use fake
information.
• “David Bowers” (yingw90@yahoo.com) is common for Bedep.
$ grep "David Bowers" *.txt | grep Registrant
whois-bfzflqejohxmq.com.txt:Registrant Name: David Bowers
whois-demoqmfritwektsd.com.txt:Registrant Name: David Bowers
whois-eulletnyrxagvokz.com.txt:Registrant Name: David Bowers
whois-lepnzsiqowk94.com.txt:Registrant Name: David Bowers
whois-mhqfmrapcgphff4y.com.txt:Registrant Name: David Bowers
whois-natrhkylqoxjtqt45.com.txt:Registrant Name: David Bowers
© Fidelis Cybersecurity
David Bowers
bfzflqejohxmq.com,Domain used by bedep (-4 days to today),2015-08-16
eulletnyrxagvokz.com,Domain used by bedep (-4 days to today),2015-08-
16
natrhkylqoxjtqt45.com,Domain used by bedep (-4 days to today),2015-
08-16
nrqagzfcsnneozu.com,Domain used by bedep (-4 days to today),2015-
08-16
But why stop with just known DGAs, what other domains are associated
with “David Bowers”?
© Fidelis Cybersecurity
David Bowers
• Using DomainTools.com, it’s possible to see all domains
registered by a name, email, etc.
• Domains seen associated with necurs and angler as well.
• Can also set up registrant alerts on e-mail addresses used
to register domains.
31
© Fidelis Cybersecurity
David Bowers
© Fidelis Cybersecurity
Registrant Alert
33
© Fidelis Cybersecurity
Fingerprints Example #2
• In a single static C2, the use of SSL could be a one-time
cert, could use a dedicated key or specific certificate
details, there is no way to know.
• If there are many redundant C2s, they may re-use some
information. For malware that does certificate pinning, they
HAVE to use the same cert.
34
© Fidelis Cybersecurity
Fingerprints Example #2
Certificate:
Data:
Version: 1 (0x0)
Serial Number:
fa:21:6b:2c:8e:6c:35:f6
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=EU, ST=Oregon, L=Cincinati, O=Oracle Corporation,
OU=Oracle, CN=Oracle
Developer/emailAddress=admin@oracle.com
35
© Fidelis Cybersecurity
More fingerprints
• Shodan (and other tools) can search for specific SSL certs
on internet facing services.
• Possible to programmatically hunt application stores for
malicious certs in applications.
36
© Fidelis Cybersecurity
Surveillance
• DNS data can change, IPs can come and go.
• Use adnstools to bulk resolve all DNS indicators on a
frequent basis (this is what my DGA feeds is based on).
• C2s can start or stop listening or issuing instructions.
• These changes (and the related metadata) can prove key in
an investigation.
37
© Fidelis Cybersecurity
Surveillance
 Creation of feeds and intake is still a passive tactic.
 Possible to see C2 changes and notify in near-time to
potentially take action on the data.
 This uses the Pushover application (Apple and Google
stores) which has a very simple API.
© Fidelis Cybersecurity
New Matsnu domains registered
© Fidelis Cybersecurity
Pushover
curl -s 
--form-string "token=$appkey" 
--form-string "user=$userkey" 
--form-string "message=$message" 
https://api.pushover.net/1/messages.json
40
© Fidelis Cybersecurity
Pairing with other data
• Barncat (the malware config data earlier) is a bulk malware
config ripping engine to statically get config data from
malware binaries.
• Includes fields like “campaign ID”, Mutex, and C2
information that can be correlated.
41
© Fidelis Cybersecurity
More effective disruption
• The “good guys” need to get lucky only once to attribute the
adversary. The adversary has to be lucky every time to
ensure this doesn’t happen.
• The more they have to do, the harder this becomes.
• All successful prosecutions involve monitoring an adversary
over the long-term to find the one time they screw up and
expose themselves.
• Exploiting redundancy provides the opportunity to make this
happen.
42
© Fidelis Cybersecurity
Free Resources
• For my DGA feeds, go to
http://osint.bambenekconsulting.com/feeds (no
authentication needed)
• For static malware configs, go to
https://barncat.fidelissecurity.com (email me for access at
john.Bambenek@fidelissecurity.com)
43
Questions & Thank You!
Find more of our research at: www.threatgeek.com
John Bambenek / john.bambenek@fidelissecurity.com
Thanks to Vladimir Kropotov, Fyodor Yarochkin, Kevin
Breen and Tim Leedy for their research and contributions
to these efforts.

More Related Content

What's hot

How to secure HCE
How to secure HCEHow to secure HCE
How to secure HCERiscure
 
Why is it so hard to make secure chips?
Why is it so hard to make secure chips?Why is it so hard to make secure chips?
Why is it so hard to make secure chips?Riscure
 
Incubation of ICS Malware (English)
Incubation of ICS Malware (English)Incubation of ICS Malware (English)
Incubation of ICS Malware (English)Digital Bond
 
Practical Security Assessments of IoT Devices and Systems
Practical Security Assessments of IoT Devices and Systems Practical Security Assessments of IoT Devices and Systems
Practical Security Assessments of IoT Devices and Systems Ollie Whitehouse
 
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...NCCOMMS
 
How to secure electronic passports
How to secure electronic passportsHow to secure electronic passports
How to secure electronic passportsRiscure
 
Penetration Testing vs. Vulnerability Scanning
Penetration Testing vs. Vulnerability ScanningPenetration Testing vs. Vulnerability Scanning
Penetration Testing vs. Vulnerability ScanningSecurityMetrics
 
CSF18 - For Your Ears Only - Sasha Kranjac
CSF18 - For Your Ears Only - Sasha KranjacCSF18 - For Your Ears Only - Sasha Kranjac
CSF18 - For Your Ears Only - Sasha KranjacNCCOMMS
 
Ethical Hacking and Penetration Testing
Ethical Hacking and Penetration Testing Ethical Hacking and Penetration Testing
Ethical Hacking and Penetration Testing Rishabh Upadhyay
 
Fault Injection on Automotive Diagnosis Protocols
Fault Injection on Automotive Diagnosis ProtocolsFault Injection on Automotive Diagnosis Protocols
Fault Injection on Automotive Diagnosis ProtocolsRiscure
 
Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015Hykeos
 
Hijacking a Pizza Delivery Robot (using SQL injection)
Hijacking a Pizza Delivery Robot (using SQL injection)Hijacking a Pizza Delivery Robot (using SQL injection)
Hijacking a Pizza Delivery Robot (using SQL injection)Priyanka Aash
 
Pki 201 Key Management
Pki 201 Key ManagementPki 201 Key Management
Pki 201 Key ManagementNCC Group
 
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...CODE BLUE
 
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - HowardBirds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - HowardHITCON GIRLS
 
How to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoHow to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoArash Ramez
 
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesSave Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesLancope, Inc.
 
Anti-tampering in Android and Take Look at Google SafetyNet Attestation API
Anti-tampering in Android and Take Look at Google SafetyNet Attestation APIAnti-tampering in Android and Take Look at Google SafetyNet Attestation API
Anti-tampering in Android and Take Look at Google SafetyNet Attestation APIArash Ramez
 

What's hot (20)

How to secure HCE
How to secure HCEHow to secure HCE
How to secure HCE
 
Why is it so hard to make secure chips?
Why is it so hard to make secure chips?Why is it so hard to make secure chips?
Why is it so hard to make secure chips?
 
Incubation of ICS Malware (English)
Incubation of ICS Malware (English)Incubation of ICS Malware (English)
Incubation of ICS Malware (English)
 
Practical Security Assessments of IoT Devices and Systems
Practical Security Assessments of IoT Devices and Systems Practical Security Assessments of IoT Devices and Systems
Practical Security Assessments of IoT Devices and Systems
 
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
 
IOT Security FUN-damental
IOT Security FUN-damentalIOT Security FUN-damental
IOT Security FUN-damental
 
How to secure electronic passports
How to secure electronic passportsHow to secure electronic passports
How to secure electronic passports
 
Penetration Testing vs. Vulnerability Scanning
Penetration Testing vs. Vulnerability ScanningPenetration Testing vs. Vulnerability Scanning
Penetration Testing vs. Vulnerability Scanning
 
CSF18 - For Your Ears Only - Sasha Kranjac
CSF18 - For Your Ears Only - Sasha KranjacCSF18 - For Your Ears Only - Sasha Kranjac
CSF18 - For Your Ears Only - Sasha Kranjac
 
Ethical Hacking and Penetration Testing
Ethical Hacking and Penetration Testing Ethical Hacking and Penetration Testing
Ethical Hacking and Penetration Testing
 
Fault Injection on Automotive Diagnosis Protocols
Fault Injection on Automotive Diagnosis ProtocolsFault Injection on Automotive Diagnosis Protocols
Fault Injection on Automotive Diagnosis Protocols
 
Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015
 
Hijacking a Pizza Delivery Robot (using SQL injection)
Hijacking a Pizza Delivery Robot (using SQL injection)Hijacking a Pizza Delivery Robot (using SQL injection)
Hijacking a Pizza Delivery Robot (using SQL injection)
 
OWASP Mobile TOP 10 2014
OWASP Mobile TOP 10 2014OWASP Mobile TOP 10 2014
OWASP Mobile TOP 10 2014
 
Pki 201 Key Management
Pki 201 Key ManagementPki 201 Key Management
Pki 201 Key Management
 
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
 
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - HowardBirds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
 
How to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoHow to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part Two
 
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesSave Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
 
Anti-tampering in Android and Take Look at Google SafetyNet Attestation API
Anti-tampering in Android and Take Look at Google SafetyNet Attestation APIAnti-tampering in Android and Take Look at Google SafetyNet Attestation API
Anti-tampering in Android and Take Look at Google SafetyNet Attestation API
 

Viewers also liked

Waf.js: как защищать веб-приложения с использованием JavaScript
Waf.js: как защищать веб-приложения с использованием JavaScriptWaf.js: как защищать веб-приложения с использованием JavaScript
Waf.js: как защищать веб-приложения с использованием JavaScriptPositive Hack Days
 
200 open source проектов спустя: опыт статического анализа исходного кода
200 open source проектов спустя:опыт статического анализа исходного кода200 open source проектов спустя:опыт статического анализа исходного кода
200 open source проектов спустя: опыт статического анализа исходного кодаPositive Hack Days
 
Современные DDoS-атаки: тенденции, опасность, подходы к защите
Современные DDoS-атаки: тенденции, опасность, подходы к защитеСовременные DDoS-атаки: тенденции, опасность, подходы к защите
Современные DDoS-атаки: тенденции, опасность, подходы к защитеPositive Hack Days
 
Как «вправить» автомобилю «мозги»
Как «вправить» автомобилю «мозги»Как «вправить» автомобилю «мозги»
Как «вправить» автомобилю «мозги»Positive Hack Days
 
Обратная разработка бинарных форматов с помощью Kaitai Struct
Обратная разработка бинарных форматов с помощью Kaitai StructОбратная разработка бинарных форматов с помощью Kaitai Struct
Обратная разработка бинарных форматов с помощью Kaitai StructPositive Hack Days
 
Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...
Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...
Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...Positive Hack Days
 
Современные DDoS-атаки: тенденции, опасность, подходы к защите
Современные DDoS-атаки: тенденции, опасность, подходы к защитеСовременные DDoS-атаки: тенденции, опасность, подходы к защите
Современные DDoS-атаки: тенденции, опасность, подходы к защитеPositive Hack Days
 
Перехват беспроводных гаджетов — от квадрокоптеров до мышек
Перехват беспроводных гаджетов — от квадрокоптеров до мышекПерехват беспроводных гаджетов — от квадрокоптеров до мышек
Перехват беспроводных гаджетов — от квадрокоптеров до мышекPositive Hack Days
 
Применение виртуализации для динамического анализа
Применение виртуализации для динамического анализаПрименение виртуализации для динамического анализа
Применение виртуализации для динамического анализаPositive Hack Days
 
Damn Vulnerable Chemical Process
Damn Vulnerable Chemical ProcessDamn Vulnerable Chemical Process
Damn Vulnerable Chemical ProcessPositive Hack Days
 
SSDL: один день из жизни разработчика
SSDL: один день из жизни разработчикаSSDL: один день из жизни разработчика
SSDL: один день из жизни разработчикаPositive Hack Days
 
Positive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days. Pavlov. Network Infrastructure Security AssessmentPositive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days. Pavlov. Network Infrastructure Security AssessmentPositive Hack Days
 
Как увидеть невидимые инциденты
Как увидеть невидимые инцидентыКак увидеть невидимые инциденты
Как увидеть невидимые инцидентыPositive Hack Days
 
Janitor to CISO in 360 Seconds: Exploiting Mechanical Privilege Escalation
Janitor to CISO in 360 Seconds: Exploiting Mechanical Privilege EscalationJanitor to CISO in 360 Seconds: Exploiting Mechanical Privilege Escalation
Janitor to CISO in 360 Seconds: Exploiting Mechanical Privilege EscalationPositive Hack Days
 
Восток — дело тонкое, или Уязвимости медицинского и индустриального ПО
Восток — дело тонкое, или Уязвимости медицинского и индустриального ПОВосток — дело тонкое, или Уязвимости медицинского и индустриального ПО
Восток — дело тонкое, или Уязвимости медицинского и индустриального ПОPositive Hack Days
 
Аспекты деятельности инсайдеров на предприятии
Аспекты деятельности инсайдеров на предприятииАспекты деятельности инсайдеров на предприятии
Аспекты деятельности инсайдеров на предприятииPositive Hack Days
 

Viewers also liked (20)

Waf.js: как защищать веб-приложения с использованием JavaScript
Waf.js: как защищать веб-приложения с использованием JavaScriptWaf.js: как защищать веб-приложения с использованием JavaScript
Waf.js: как защищать веб-приложения с использованием JavaScript
 
200 open source проектов спустя: опыт статического анализа исходного кода
200 open source проектов спустя:опыт статического анализа исходного кода200 open source проектов спустя:опыт статического анализа исходного кода
200 open source проектов спустя: опыт статического анализа исходного кода
 
Защищенность GSM
Защищенность GSMЗащищенность GSM
Защищенность GSM
 
Современные DDoS-атаки: тенденции, опасность, подходы к защите
Современные DDoS-атаки: тенденции, опасность, подходы к защитеСовременные DDoS-атаки: тенденции, опасность, подходы к защите
Современные DDoS-атаки: тенденции, опасность, подходы к защите
 
Как «вправить» автомобилю «мозги»
Как «вправить» автомобилю «мозги»Как «вправить» автомобилю «мозги»
Как «вправить» автомобилю «мозги»
 
Обратная разработка бинарных форматов с помощью Kaitai Struct
Обратная разработка бинарных форматов с помощью Kaitai StructОбратная разработка бинарных форматов с помощью Kaitai Struct
Обратная разработка бинарных форматов с помощью Kaitai Struct
 
Attacks on SAP Mobile
Attacks on SAP MobileAttacks on SAP Mobile
Attacks on SAP Mobile
 
Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...
Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...
Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...
 
Современные DDoS-атаки: тенденции, опасность, подходы к защите
Современные DDoS-атаки: тенденции, опасность, подходы к защитеСовременные DDoS-атаки: тенденции, опасность, подходы к защите
Современные DDoS-атаки: тенденции, опасность, подходы к защите
 
Перехват беспроводных гаджетов — от квадрокоптеров до мышек
Перехват беспроводных гаджетов — от квадрокоптеров до мышекПерехват беспроводных гаджетов — от квадрокоптеров до мышек
Перехват беспроводных гаджетов — от квадрокоптеров до мышек
 
Применение виртуализации для динамического анализа
Применение виртуализации для динамического анализаПрименение виртуализации для динамического анализа
Применение виртуализации для динамического анализа
 
Выживший
ВыжившийВыживший
Выживший
 
Damn Vulnerable Chemical Process
Damn Vulnerable Chemical ProcessDamn Vulnerable Chemical Process
Damn Vulnerable Chemical Process
 
SSDL: один день из жизни разработчика
SSDL: один день из жизни разработчикаSSDL: один день из жизни разработчика
SSDL: один день из жизни разработчика
 
Positive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days. Pavlov. Network Infrastructure Security AssessmentPositive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days. Pavlov. Network Infrastructure Security Assessment
 
Как увидеть невидимые инциденты
Как увидеть невидимые инцидентыКак увидеть невидимые инциденты
Как увидеть невидимые инциденты
 
Why IT Security Is Fucked Up
Why IT Security Is Fucked UpWhy IT Security Is Fucked Up
Why IT Security Is Fucked Up
 
Janitor to CISO in 360 Seconds: Exploiting Mechanical Privilege Escalation
Janitor to CISO in 360 Seconds: Exploiting Mechanical Privilege EscalationJanitor to CISO in 360 Seconds: Exploiting Mechanical Privilege Escalation
Janitor to CISO in 360 Seconds: Exploiting Mechanical Privilege Escalation
 
Восток — дело тонкое, или Уязвимости медицинского и индустриального ПО
Восток — дело тонкое, или Уязвимости медицинского и индустриального ПОВосток — дело тонкое, или Уязвимости медицинского и индустриального ПО
Восток — дело тонкое, или Уязвимости медицинского и индустриального ПО
 
Аспекты деятельности инсайдеров на предприятии
Аспекты деятельности инсайдеров на предприятииАспекты деятельности инсайдеров на предприятии
Аспекты деятельности инсайдеров на предприятии
 

Similar to Exploiting Redundancy Properties of Malicious Infrastructure for Incident Detection

HITCON 2017: Building a Public RPZ Service to Protect the World's Consumers
HITCON 2017: Building a Public RPZ Service to Protect the World's ConsumersHITCON 2017: Building a Public RPZ Service to Protect the World's Consumers
HITCON 2017: Building a Public RPZ Service to Protect the World's ConsumersJohn Bambenek
 
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.AlgoSec
 
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_230 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2Gaurav Srivastav
 
Cyber Security
Cyber SecurityCyber Security
Cyber Securityfrcarlson
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDebra Baker, CISSP CSSP
 
Applying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacksApplying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacksFidelis Cybersecurity
 
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.pptKaukau9
 
Capture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception DefenseCapture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception DefenseFidelis Cybersecurity
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalA. Phillip Smith
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
 
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis ElevateInsider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis ElevateFidelis Cybersecurity
 
Corporate Espionage without the Hassle of Committing Felonies
Corporate Espionage without the Hassle of Committing FeloniesCorporate Espionage without the Hassle of Committing Felonies
Corporate Espionage without the Hassle of Committing FeloniesJohn Bambenek
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 
Security Lifecycle Management Process
Security Lifecycle Management ProcessSecurity Lifecycle Management Process
Security Lifecycle Management ProcessBill Ross
 
MISP Summit 2018: Barncat: Using MISP for Bulk Malware Surveillance
MISP Summit 2018: Barncat: Using MISP for Bulk Malware SurveillanceMISP Summit 2018: Barncat: Using MISP for Bulk Malware Surveillance
MISP Summit 2018: Barncat: Using MISP for Bulk Malware SurveillanceJohn Bambenek
 
(SACON) Wayne Tufek - chapter two - kill chain
(SACON) Wayne Tufek - chapter two - kill chain(SACON) Wayne Tufek - chapter two - kill chain
(SACON) Wayne Tufek - chapter two - kill chainPriyanka Aash
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?360mnbsu
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Anpumathews
 
Fidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception SolutionFidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception SolutionFidelis Cybersecurity
 

Similar to Exploiting Redundancy Properties of Malicious Infrastructure for Incident Detection (20)

HITCON 2017: Building a Public RPZ Service to Protect the World's Consumers
HITCON 2017: Building a Public RPZ Service to Protect the World's ConsumersHITCON 2017: Building a Public RPZ Service to Protect the World's Consumers
HITCON 2017: Building a Public RPZ Service to Protect the World's Consumers
 
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.
 
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_230 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptx
 
Applying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacksApplying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacks
 
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
 
Capture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception DefenseCapture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception Defense
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis ElevateInsider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
 
Corporate Espionage without the Hassle of Committing Felonies
Corporate Espionage without the Hassle of Committing FeloniesCorporate Espionage without the Hassle of Committing Felonies
Corporate Espionage without the Hassle of Committing Felonies
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Security Lifecycle Management Process
Security Lifecycle Management ProcessSecurity Lifecycle Management Process
Security Lifecycle Management Process
 
MISP Summit 2018: Barncat: Using MISP for Bulk Malware Surveillance
MISP Summit 2018: Barncat: Using MISP for Bulk Malware SurveillanceMISP Summit 2018: Barncat: Using MISP for Bulk Malware Surveillance
MISP Summit 2018: Barncat: Using MISP for Bulk Malware Surveillance
 
(SACON) Wayne Tufek - chapter two - kill chain
(SACON) Wayne Tufek - chapter two - kill chain(SACON) Wayne Tufek - chapter two - kill chain
(SACON) Wayne Tufek - chapter two - kill chain
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Fidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception SolutionFidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception Solution
 

More from Positive Hack Days

Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesИнструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesPositive Hack Days
 
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerКак мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerPositive Hack Days
 
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesТиповая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesPositive Hack Days
 
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikАналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikPositive Hack Days
 
Использование анализатора кода SonarQube
Использование анализатора кода SonarQubeИспользование анализатора кода SonarQube
Использование анализатора кода SonarQubePositive Hack Days
 
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityРазвитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityPositive Hack Days
 
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Positive Hack Days
 
Автоматизация построения правил для Approof
Автоматизация построения правил для ApproofАвтоматизация построения правил для Approof
Автоматизация построения правил для ApproofPositive Hack Days
 
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Positive Hack Days
 
Формальные методы защиты приложений
Формальные методы защиты приложенийФормальные методы защиты приложений
Формальные методы защиты приложенийPositive Hack Days
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложенийPositive Hack Days
 
Теоретические основы Application Security
Теоретические основы Application SecurityТеоретические основы Application Security
Теоретические основы Application SecurityPositive Hack Days
 
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летОт экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летPositive Hack Days
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиPositive Hack Days
 
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОТребования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОPositive Hack Days
 
Формальная верификация кода на языке Си
Формальная верификация кода на языке СиФормальная верификация кода на языке Си
Формальная верификация кода на языке СиPositive Hack Days
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CorePositive Hack Days
 
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опытSOC для КИИ: израильский опыт
SOC для КИИ: израильский опытPositive Hack Days
 
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterHoneywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterPositive Hack Days
 
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиCredential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиPositive Hack Days
 

More from Positive Hack Days (20)

Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesИнструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
 
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerКак мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows Docker
 
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesТиповая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive Technologies
 
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikАналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + Qlik
 
Использование анализатора кода SonarQube
Использование анализатора кода SonarQubeИспользование анализатора кода SonarQube
Использование анализатора кода SonarQube
 
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityРазвитие сообщества Open DevOps Community
Развитие сообщества Open DevOps Community
 
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
 
Автоматизация построения правил для Approof
Автоматизация построения правил для ApproofАвтоматизация построения правил для Approof
Автоматизация построения правил для Approof
 
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»
 
Формальные методы защиты приложений
Формальные методы защиты приложенийФормальные методы защиты приложений
Формальные методы защиты приложений
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложений
 
Теоретические основы Application Security
Теоретические основы Application SecurityТеоретические основы Application Security
Теоретические основы Application Security
 
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летОт экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 лет
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на грабли
 
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОТребования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПО
 
Формальная верификация кода на языке Си
Формальная верификация кода на языке СиФормальная верификация кода на языке Си
Формальная верификация кода на языке Си
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
 
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опытSOC для КИИ: израильский опыт
SOC для КИИ: израильский опыт
 
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterHoneywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services Center
 
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиCredential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атаки
 

Recently uploaded

办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 

Recently uploaded (20)

办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 

Exploiting Redundancy Properties of Malicious Infrastructure for Incident Detection

  • 1. Exploiting Redundancy Properties of Malicious Infrastructure John Bambenek, Manager of Threat Systems Fidelis Cybersecurity PHDays 6 – Moscow, Russia
  • 2. © Fidelis Cybersecurity Intro • Manager at Fidelis Cybersecurity of a team responsible for automation and data mining threat information. • Faculty at University of Illinois – Urbana-Champaign in Computer Science. • Participate (and run) many private groups investigating major criminal threats on the internet. • I generally focus only on criminal threats and avoid nation- state/espionage. 2
  • 3. © Fidelis Cybersecurity Agenda • Single Point of Failure vs Redundancy • Redundancy techniques • Detection • Sinkholing • Increased Fingerprints • Targeted Intelligence Operations • Surveillance • Towards more Effective Disruption 3
  • 4. © Fidelis Cybersecurity Single Point of Failure vs Redundancy • Many malware attacks rely on a single method of communication (a single IP, DNS name, tor node, etc). • Easy to set up and maintain, low cost of entry. • However, only two states: up or down. • Cannot establish a pattern on a single data point. • Many RATs are single C2 based. • Attackers who want to persist need something else. 4
  • 5. © Fidelis Cybersecurity Single C2 Examples 5 Example of static C2 config (more on barncat later)
  • 6. © Fidelis Cybersecurity Multi C2 example 6 Example of static C2 config (more on barncat later)
  • 7. © Fidelis Cybersecurity Redundancy Techniques • Multiple IPs/Hostnames (static lists) • Use of Fast Flux / Double Flux • DGAs • Tor/I2P • Multiple Methods • If done right, uses multiple ISPs/providers 7
  • 8. © Fidelis Cybersecurity Detection • If you already know about a threat, you can protect based on a single piece of information. • For unknown threats, you need to have a pattern and single data points aren’t a pattern. • Redundancy helps us by forcing the adversary to create fingerprints we can use to detect otherwise “unknown” threats. • Allows for data mining, statistical analysis, etc. 8
  • 9. © Fidelis Cybersecurity Goal • Goal: Force adversary to behavior that inherently requires them to create patterns. • Takedowns are risky because the attacker can adapt back into an “unknown threat”. Patterns, however, tend to persist if you have visibility into their behavior. 9
  • 10. © Fidelis Cybersecurity Detection • Double flux networks rely on a massive pool of endpoints and nameservers so taking down a single IP has no impact to adversary. divewithsharks.hk. 1800 IN A 70.68.187.xxx [xxx.vf.shawcable.net] divewithsharks.hk. 1800 IN A 76.209.81.xxx [SBIS-AS - AT&T Internet Services] divewithsharks.hk. 1800 IN A 85.207.74.xxx [adsl-ustixxx-74-207-85.bluetone.cz] divewithsharks.hk. 1800 IN A 90.144.43.xxx [d90-144-43-xxx.cust.tele2.fr] divewithsharks.hk. 1800 IN A 142.165.41.xxx [142-165-41-xxx.msjw.hsdb.sasknet.sk.ca] 10
  • 11. © Fidelis Cybersecurity Detection – Flux networks • Besides CDNs, very few valid DNS queries will have multiple low TTL A records across geographies and network boundaries (especially in residential IP space). • Almost no one has low TTL NS records (very limited use case). • Can combine with domain/IP rep or alexa to increase confidence. 11
  • 12. © Fidelis Cybersecurity Detection - DGAs • Pseudorandom domain names (or hostnames) usually many hundreds or thousands generated (potentially per day). • Attacker only needs to control one of the domains, if it gets suspended they can just register another to reassert control. 12
  • 13. © Fidelis Cybersecurity Detection – DGAs (tinba) • pmlmfbehhunq.com,72.52.4.90,a.ns36.de|b.ns36.de • pmqeelsxyddk.com,188.120.224.164,ns1.reg.ru|ns2.reg.ru • pqtcwrrrvgvf.ru,158.58.170.148,a.dnspod.com|b.dnspod.com|c.dnspod.com • pubejsbumwql.com,72.52.4.90,a.ns36.de|b.ns36.de • qrwlypygphht.ru,158.58.170.148,a.dnspod.com|b.dnspod.com|c.dnspod.com • Easy to load known DGA domains into RPZ to block at DNS level. 13
  • 14. © Fidelis Cybersecurity Detection - DGAs • Easy to find “unknown” DGAs. • The biggest obvious network behavior of DGA enabled malware is a large number of NXDOMAIN responses to queries. • Most DGAs have a majority of domains unregistered) • Looking at DNS logs for repetitive queries to NXDOMAIN or known sinkholed IPs. 14
  • 15. © Fidelis Cybersecurity Detection - DGAs • For non-word list DGAs, checking domain names for high entropy finds “random” looking domains. • N-Gram analysis can also be used to find DGA-like domains. • Based on looking at sequences of characters that do not naturally occur in a given language to create a score (essentially anti- patterns). • i.e. “QQ” is not naturally occurring 2-letter combination in English • Based on statistical comparisons of letter combinations in “natural” language and observed domain names, you can make some conclusions. 15
  • 16. © Fidelis Cybersecurity Detection - DGAs • Can be language specific so care needs to be done for other languages. • Using n-grams is not a 100% confidence prospect, other checking needs to be done. • See “Use of n-Gram models for DGA detection” once published. 16
  • 17. © Fidelis Cybersecurity Sinkholing • For DGAs, most domains are unregistered. • If researcher registers one (or several) of those domains, victims will beacon to them. • Useful for telemetry data or developing signatures. • Some adversaries have started creating sinkhole-aware malware. 17
  • 18. © Fidelis Cybersecurity Other uses of sinkholing • If you can make victims thinking you are the C2, you can, to an extent, control the victim. • May require other data (encryption keys) and mimicking the C2 protocol. • Some (but not all) malware families have a self-destruct option to uninstall on victim’s machine. • This has been done in the past as part of takedowns. 18
  • 19. © Fidelis Cybersecurity Other users of sinkholing • You can also engage in direct control of the victim. • A “white hat” hacker, recently breached part of an exploit kit network to install Avira instead of the intended malware by replacing the binary. • Transient benefit. • If you do this, please just install Flash/Adobe/Java patches instead. • More persistent benefit 19
  • 20. © Fidelis Cybersecurity Important Note • Doing any of the above without legal authority is probably criminal in almost every jurisdiction represented in this room. • Going to jail is bad, I don’t recommend it. 20
  • 21. © Fidelis Cybersecurity Targeted Intelligence Operations • Our biggest difficulty in prosecuting cybercrime is the difficulty in getting information between nations. • International cooperation is often marred by unrelated foreign policy constraints, sometimes even with private sector actors. • To make matters worse, as a consequence of the amount of data and metadata created by computers and networks, there is a huge amount of tools available to hide. 21
  • 22. © Fidelis Cybersecurity Targeted Intelligence Operations • When the adversary has only a single static C2, your options are limited: • Take it down • Get a wiretap • If you take it down and lack other tracking ability, the attacker will just set up their operation elsewhere… and potentially break your visibility into their operations. 22
  • 23. © Fidelis Cybersecurity Targeted Intelligence Operations • When an adversary uses redundant C2 methods, a disruption in part of their communications is not critical. • They may not make wholesale changes. • The key to a targeted intelligence operation is to have enough impact so the adversary does something but not enough impact where they disappear and stop operating. 23
  • 24. © Fidelis Cybersecurity Examples • During Cryptolocker, they often used the same Chinese registrar (DNSPOD) for their DGA registrations. • In 2013, Chinese-American cooperation was not great. • Objectives: • I wanted to build a relationship with a Chinese company to deal with obvious abuse. • I wanted to see how they would change if that registrar suspended a few domains. 24
  • 25. © Fidelis Cybersecurity Examples • Results: • For a few days, they kept using DNSPOD. • For two weeks, they used a different register before going back to DNSPOD. • The cycling of registrant accounts led to some good leads available to “western” law enforcement for their investigation. • I opened the door to working with other Chinese companies on criminal matters. 25
  • 26. © Fidelis Cybersecurity Example #2 • I was tracking a criminal service provider who used a “shared hosting” account to manage their infrastructure. • I paid “a premium” to get an account on the same box to see if I can use poor file system permissions to gather additional intelligence (perfectly legal). • It didn’t work but attacker didn’t know that. • Attacker was aware of who I am and that I was tracking him, so I subtly let him know I got an account on the same box. 26
  • 27. © Fidelis Cybersecurity Example #2 • Attacker very quickly moved their C2 operations using a control panel “move” function. • Also required them to reissue binaries and cause some disruption and a poor “customer experience”. • Most important, using the “move function” left files behind after they left. This allows for possibility of a search warrant to obtain that data without the adversary being aware. 27
  • 28. © Fidelis Cybersecurity More Fingerprints • The use of redundancy also comes with new fingerprints that can be used to identify adversaries. • DGAs inherently mean WHOIS artifacts could be used to find and track specific adversaries in all their operations. 28
  • 29. © Fidelis Cybersecurity Whois Info • Many actors will use WHOIS protection… some just use fake information. • “David Bowers” (yingw90@yahoo.com) is common for Bedep. $ grep "David Bowers" *.txt | grep Registrant whois-bfzflqejohxmq.com.txt:Registrant Name: David Bowers whois-demoqmfritwektsd.com.txt:Registrant Name: David Bowers whois-eulletnyrxagvokz.com.txt:Registrant Name: David Bowers whois-lepnzsiqowk94.com.txt:Registrant Name: David Bowers whois-mhqfmrapcgphff4y.com.txt:Registrant Name: David Bowers whois-natrhkylqoxjtqt45.com.txt:Registrant Name: David Bowers
  • 30. © Fidelis Cybersecurity David Bowers bfzflqejohxmq.com,Domain used by bedep (-4 days to today),2015-08-16 eulletnyrxagvokz.com,Domain used by bedep (-4 days to today),2015-08- 16 natrhkylqoxjtqt45.com,Domain used by bedep (-4 days to today),2015- 08-16 nrqagzfcsnneozu.com,Domain used by bedep (-4 days to today),2015- 08-16 But why stop with just known DGAs, what other domains are associated with “David Bowers”?
  • 31. © Fidelis Cybersecurity David Bowers • Using DomainTools.com, it’s possible to see all domains registered by a name, email, etc. • Domains seen associated with necurs and angler as well. • Can also set up registrant alerts on e-mail addresses used to register domains. 31
  • 34. © Fidelis Cybersecurity Fingerprints Example #2 • In a single static C2, the use of SSL could be a one-time cert, could use a dedicated key or specific certificate details, there is no way to know. • If there are many redundant C2s, they may re-use some information. For malware that does certificate pinning, they HAVE to use the same cert. 34
  • 35. © Fidelis Cybersecurity Fingerprints Example #2 Certificate: Data: Version: 1 (0x0) Serial Number: fa:21:6b:2c:8e:6c:35:f6 Signature Algorithm: sha1WithRSAEncryption Issuer: C=EU, ST=Oregon, L=Cincinati, O=Oracle Corporation, OU=Oracle, CN=Oracle Developer/emailAddress=admin@oracle.com 35
  • 36. © Fidelis Cybersecurity More fingerprints • Shodan (and other tools) can search for specific SSL certs on internet facing services. • Possible to programmatically hunt application stores for malicious certs in applications. 36
  • 37. © Fidelis Cybersecurity Surveillance • DNS data can change, IPs can come and go. • Use adnstools to bulk resolve all DNS indicators on a frequent basis (this is what my DGA feeds is based on). • C2s can start or stop listening or issuing instructions. • These changes (and the related metadata) can prove key in an investigation. 37
  • 38. © Fidelis Cybersecurity Surveillance  Creation of feeds and intake is still a passive tactic.  Possible to see C2 changes and notify in near-time to potentially take action on the data.  This uses the Pushover application (Apple and Google stores) which has a very simple API.
  • 39. © Fidelis Cybersecurity New Matsnu domains registered
  • 40. © Fidelis Cybersecurity Pushover curl -s --form-string "token=$appkey" --form-string "user=$userkey" --form-string "message=$message" https://api.pushover.net/1/messages.json 40
  • 41. © Fidelis Cybersecurity Pairing with other data • Barncat (the malware config data earlier) is a bulk malware config ripping engine to statically get config data from malware binaries. • Includes fields like “campaign ID”, Mutex, and C2 information that can be correlated. 41
  • 42. © Fidelis Cybersecurity More effective disruption • The “good guys” need to get lucky only once to attribute the adversary. The adversary has to be lucky every time to ensure this doesn’t happen. • The more they have to do, the harder this becomes. • All successful prosecutions involve monitoring an adversary over the long-term to find the one time they screw up and expose themselves. • Exploiting redundancy provides the opportunity to make this happen. 42
  • 43. © Fidelis Cybersecurity Free Resources • For my DGA feeds, go to http://osint.bambenekconsulting.com/feeds (no authentication needed) • For static malware configs, go to https://barncat.fidelissecurity.com (email me for access at john.Bambenek@fidelissecurity.com) 43
  • 44. Questions & Thank You! Find more of our research at: www.threatgeek.com John Bambenek / john.bambenek@fidelissecurity.com Thanks to Vladimir Kropotov, Fyodor Yarochkin, Kevin Breen and Tim Leedy for their research and contributions to these efforts.