botnets - university of maryland · 2019-08-30 · botnets • collection of compromised machines...

16
BOTNETS GRAD SEC NOV 21 2017

Upload: others

Post on 01-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: BOTNETS - University Of Maryland · 2019-08-30 · BOTNETS • Collection of compromised machines (bots) under unified control of an attacker (botmaster) • Method of compromise

BOTNETS

GRAD SECNOV 21 2017

Page 2: BOTNETS - University Of Maryland · 2019-08-30 · BOTNETS • Collection of compromised machines (bots) under unified control of an attacker (botmaster) • Method of compromise

TODAY’S PAPERS

Page 3: BOTNETS - University Of Maryland · 2019-08-30 · BOTNETS • Collection of compromised machines (bots) under unified control of an attacker (botmaster) • Method of compromise

BOTNETS

• Collection of compromised machines (bots) under unified control of an attacker (botmaster)

• Method of compromise decoupled from method of control

• Launch a worm/virus, etc.: remember, payload is orthogonal!

• Upon infection, a new bot “phones home” to rendezvous with botnet “command-and-control” (C&C)

• Botmaster uses C&C to push out commands and updates

Page 4: BOTNETS - University Of Maryland · 2019-08-30 · BOTNETS • Collection of compromised machines (bots) under unified control of an attacker (botmaster) • Method of compromise

BOTNETS

• Collection of compromised machines (bots) under unified control of an attacker (botmaster)

• Method of compromise decoupled from method of control

• Launch a worm/virus, etc.: remember, payload is orthogonal!

• Upon infection, a new bot “phones home” to rendezvous with botnet “command-and-control” (C&C)

• Botmaster uses C&C to push out commands and updates

Page 5: BOTNETS - University Of Maryland · 2019-08-30 · BOTNETS • Collection of compromised machines (bots) under unified control of an attacker (botmaster) • Method of compromise

BOTNETS

• Collection of compromised machines (bots) under unified control of an attacker (botmaster)

• Method of compromise decoupled from method of control

• Launch a worm/virus, etc.: remember, payload is orthogonal!

• Upon infection, a new bot “phones home” to rendezvous with botnet “command-and-control” (C&C)

• Botmaster uses C&C to push out commands and updates

C&C

Page 6: BOTNETS - University Of Maryland · 2019-08-30 · BOTNETS • Collection of compromised machines (bots) under unified control of an attacker (botmaster) • Method of compromise

BOTNETS

• Collection of compromised machines (bots) under unified control of an attacker (botmaster)

• Method of compromise decoupled from method of control

• Launch a worm/virus, etc.: remember, payload is orthogonal!

• Upon infection, a new bot “phones home” to rendezvous with botnet “command-and-control” (C&C)

• Botmaster uses C&C to push out commands and updates

C&C

Page 7: BOTNETS - University Of Maryland · 2019-08-30 · BOTNETS • Collection of compromised machines (bots) under unified control of an attacker (botmaster) • Method of compromise

BOTNETS

• Collection of compromised machines (bots) under unified control of an attacker (botmaster)

• Method of compromise decoupled from method of control

• Launch a worm/virus, etc.: remember, payload is orthogonal!

• Upon infection, a new bot “phones home” to rendezvous with botnet “command-and-control” (C&C)

• Botmaster uses C&C to push out commands and updates

C&C

Topology can be star (like this), hierarchical, peer-to-peer…

Page 8: BOTNETS - University Of Maryland · 2019-08-30 · BOTNETS • Collection of compromised machines (bots) under unified control of an attacker (botmaster) • Method of compromise

TORPIG

Page 9: BOTNETS - University Of Maryland · 2019-08-30 · BOTNETS • Collection of compromised machines (bots) under unified control of an attacker (botmaster) • Method of compromise

DOMAIN FLUXING

How do these bots know where to go?

Issue DNS lookups for a known hostname

Provides a level of indirection: Bots know the name ahead of time, but the botmaster can move the C&C node to different IP addresses, as needed

Problem: Network operators will simply firewall a known-malicious domain name

Domain fluxing: Generate random domain names. Move on by the time you’re found

Page 10: BOTNETS - University Of Maryland · 2019-08-30 · BOTNETS • Collection of compromised machines (bots) under unified control of an attacker (botmaster) • Method of compromise

YOUR BOTNET IS MY BOTNETDomain fluxing: Generate random domain names. Move on by the time you’re found

(This) Botnet takeover: Anticipate the domain names; register those not yet purchased

Page 11: BOTNETS - University Of Maryland · 2019-08-30 · BOTNETS • Collection of compromised machines (bots) under unified control of an attacker (botmaster) • Method of compromise

YOUR BOTNET IS MY BOTNETDomain fluxing: Generate random domain names. Move on by the time you’re found

(This) Botnet takeover: Anticipate the domain names; register those not yet purchased

Keep in touch with bots, but never send a new config file

Worked with ISPs and law enforcement to take them down

ETHICAL CONCERN: DO NO HARM

Page 12: BOTNETS - University Of Maryland · 2019-08-30 · BOTNETS • Collection of compromised machines (bots) under unified control of an attacker (botmaster) • Method of compromise

WHAT DID THEY LEARN?

70GB over 10 days

Page 13: BOTNETS - University Of Maryland · 2019-08-30 · BOTNETS • Collection of compromised machines (bots) under unified control of an attacker (botmaster) • Method of compromise

BOTNET SIZE: HOW TO COUNT?

Page 14: BOTNETS - University Of Maryland · 2019-08-30 · BOTNETS • Collection of compromised machines (bots) under unified control of an attacker (botmaster) • Method of compromise

BOTNET SIZE: HOW TO COUNT?

Page 15: BOTNETS - University Of Maryland · 2019-08-30 · BOTNETS • Collection of compromised machines (bots) under unified control of an attacker (botmaster) • Method of compromise

BOTNET SIZE: HOW TO COUNT?

Page 16: BOTNETS - University Of Maryland · 2019-08-30 · BOTNETS • Collection of compromised machines (bots) under unified control of an attacker (botmaster) • Method of compromise

IP ADDRESSES ARE POOR IDENTIFIERSNAT boxes: Small set of public IP addresses (typically one), Large set of private IP addresses (many)

Carrier-grade NATs (CGNATS): NATs at a regional/national level A single host can have a different IP address for each connection

“The trouble with Tor” Tor exit nodes also NAT Destinations cannot (based on IP addr)distinguish between the exit node’s traffic and Tor clients’ traffic

Cloudflare shows Tor users captchas to differentiate