Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2)...

47
BOTNETS BOTNETS Detection, Classification, and Countermeasures Prof. Dr. Peter Martini, Fraunhofer FKIE and Univ. of Bonn, Germany October 5, 2011 Cyber Defense © Fraunhofer FKIE

Transcript of Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2)...

Page 1: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

BOTNETSBOTNETSDetection, Classification, and Countermeasures

Prof. Dr. Peter Martini, Fraunhofer FKIE and Univ. of Bonn, Germany

October 5, 2011

Cyber Defense© Forschungsgruppe Cyber Defense, Fraunhofer FKIE © Fraunhofer FKIE

Page 2: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Fraunhofer-FKIEF h f I tit t f C i ti I f ti P i d E iFraunhofer Institute for Communication, Information Processing, and Ergonomics

FKIE is a research institute active in the areas of defense and security.

FKIE develops models, methods and tools for Network Enabled Capabilities.

Research Areas Command and Control Systems Communication Systems

Location WachtbergFounded in 1963Staff > 300

Multisensor Data Processing for Surveillance Human Factors & Human-Machine-Systems Information & Knowledge Management

Budget > 24 Mio €

Director Prof.Dr. Peter Martinig g

Unmanned Systems Cyber Defense

WWW www.fkie.frauhofer.de

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

2

© Fraunhofer FKIE

© Fraunhofer FKIE

Page 3: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

FKIE – Cyber Defensef d blDefense and Public Security

Protection against „Cyber Attacks“ Protection of Critical IT Infrastructures Protection of Command&Control in „Cyber-Physical Systems“

Always in Our Minds: Practical Relevance Thinking starts at the Application“ „Thinking starts at the Application Focus: Defense and Public Security Support for Decision Makers, Users, Operators Training, Consulting, Implementation Support Protection and Quick Restoration of the Reliability and the

Trustworthiness of Computer Systems and Networksp y

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

3

© Fraunhofer FKIE

© Fraunhofer FKIE

Page 4: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Introduction

Cyber WarIntroduction

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

4

© Fraunhofer FKIE

Page 5: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Cyber WarfFact of Fiction ?

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

5

© Fraunhofer FKIE

Page 6: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Tages-Anzeiger 24.11.10:ld d f“Stuxnet was a worldwide test of weapons”

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

6

© Fraunhofer FKIE

Page 7: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

2009: „Conficker“

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

7

© Fraunhofer FKIE

Page 8: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Goals of Cyber Attacksdb k f

.tw

o.p

df

A Handbook from Aug. 15, 2005ar

my.

gu

ide.

sup

p.

ebu

ilder

file

s/u

s.a

uild

erco

nte

nt/

site

1. Loss of Integrity Modification of Data

2 Loss of Availability

tech

cj.c

om

/sit

ebu 2. Loss of Availability

Slowing-Down or Blocking of Systems/Functions

3. Loss of Confidentiality Espionage Battle for the Public Opinion

htt

p://

ww

w.h

it Espionage, Battle for the Public Opinion

4. Physical Destruction Supervisory Control and Data Acquisition (SCADA)

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

8

© Fraunhofer FKIE

Page 9: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Example: Gmail-Hacking; Google (June 1, 2011 12:42)

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

9

© Fraunhofer FKIE

Page 10: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Reuters (June 1, 2011 7:30pm EDT)

U32

0110

601

g-i

dU

STR

E750

6Uu

s-g

oo

gle

-hac

kin

icle

/201

1/06

/01/

u.r

eute

rs.c

om

/art

ih

ttp

://w

ww

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

10

© Fraunhofer FKIE

Page 11: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

11

© Fraunhofer FKIE

Page 12: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

BBC (June 2, 2011 08:33 GMT)

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

12

© Fraunhofer FKIE

Page 13: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

”Malware” and “Botnets”© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

13

© Fraunhofer FKIE

Page 14: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Malware and Botnets Th B iThe Basics

Definition: Malware (short for malicious software) is software designed to perform activities on or grant access to a computer system without the owner's knowledge or consent.g

First Appearence: depends on definition, known cases are

1971 – Creeper / Worm (spreading in ARPANET)

(another worm named “Reaper” was used to remove Creeper)

"I'm the creeper, catch me if you can!"

1986 – Brain / Virus

Welcome to the Dungeon (c) 1986 Basit * Amjad (pvt) Ltd. BRAIN COMPUTER SERVICES 730 NIZAM BLOCK ALLAMA IQBAL TOWN BRAIN COMPUTER SERVICES 730 NIZAM BLOCK ALLAMA IQBAL TOWN LAHORE‐PAKISTAN PHONE: 430791,443248,280530. Beware of 

this VIRUS.... Contact us for vaccination... 

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

14

Page 15: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Malware and Botnets Th B i (2)The Basics (2)

Classical types of malicious software:

Virus (self-replicating code)

Worm (autonomous network based spreading) Worm (autonomous, network-based spreading)

Trojan Horse (deceptive program, carrying other malware)

Keylogger (intercepts keystrokes)y gg p y

Spyware (gathers data from an infected machine)

Rootkit (grants hidden access to a system)

( f ) Dialer (uses modem to generate profits over premium numbers)

Scareware (social engineering of users)

Ransomware (performs extortion by e g encrypting the hard drive) Ransomware (performs extortion by e.g. encrypting the hard drive)

Today, these classifications are no longer useful, as most malware combines various aspects of functionality.

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

15

Page 16: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Malware and BotnetsTh B i (3)The Basics (3)

Definition: Botnets combine infected computer systems into a network f i d t (b t bi ) t d d t ll d b of compromised systems (bots, zombies) …. operated and controlled by a

third party (botmaster/botherder).

Botnets combine classical malware functionality to a dangerous weapon y gwith lots of application areas.

Motivations:

Fi i l i t t P liti l i t t Financial interests

Spam

Financial Fraud

Political interests

Denial of Service (’07 against Estonia, …) Financial Fraud

Identity Theft

Extortion

Espionage (’08 GhostNet)

Sabotage (’09 Stuxnet)

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

16

Page 17: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

“Malware” and “Botnets” f f lLife Expectancy of Malware

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

17

© Fraunhofer FKIE

Page 18: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

“Malware” and “Botnets” fl dCoreflood

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

18

© Fraunhofer FKIE

Page 19: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

“Malware” und “Botnets” fl dCoreflood

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

19

© Fraunhofer FKIE

Page 20: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

BotnetsHow to Set Up a Botnet

C&C

3

4

13

2

5

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

20

© Fraunhofer FKIE

Page 21: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Botnetsk bTakeover by USB Devices

Botnets as autonomous or partially autonomous systemsp y y Autonomous proliferation Autonomous coordination of infected systems Configuration of future activities in case of pre-defined conditions

o Time-of-Dayo Time of Dayo Geo-Locationo System Environment (Operating System, I/O devices, …)o …

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

21

© Fraunhofer FKIE

Page 22: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Malware Economy R l d iRoles and services

Around malware, a complete economy has evolved.

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

22

Page 23: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Analysis of Malware and Botnets© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

23

y© Fraunhofer FKIE

Page 24: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

A large zoo of malwareC ll ti l lCollecting malware samples

AV-Test: tracking of malware samples

2010: New Malware Samples~ 55.000 per day

2 300 per hour~ 2.300 per hour~ 38 per minute

S i f i

[http://www.av-test.org]

Scanning for viruses only provides limited protection.

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

24

Page 25: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

A large zoo of botnets llas well…

Shadowserver: tracking of known C&C servers

[http://www shadowserver org/wiki/pmwiki php/Stats/BotnetCharts]

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

25

[http://www.shadowserver.org/wiki/pmwiki.php/Stats/BotnetCharts]

Page 26: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

DDoS-Attacks: Distributed Denial of Service

ng

lat_

Mer

cato

r.p

:Wo

rld

_Map

_fl

ia.o

rg/w

iki/F

iletp

://en

.wik

iped

mai

n Im

age,

htt

Pub

lic D

om

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

26

© Fraunhofer FKIE

Page 27: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Botnets: Detection & Counter-MeasuresS l t d M th dSelected Methods

Passive Techniques Active Techniques Passive Techniques

Traffic Analysis

DNS-based Approaches

Active Techniques

Sinkholing

InfiltrationDNS based Approaches

Analysis of Spam

Analysis of Log Files

Infiltration

DNS Cache Snooping

Tracking of Fast-Flux Networks

Honeypots

Evaluation of AV Feedback

IRC-based detection & monitoring

Enumeration of Peer-to-Peer NetworksNetworks

Other Techniques Other Techniques

Reverse Engineering

C&C forensics & abuse desks

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

27

Page 28: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Botnets: Detection & Counter-Measures S l t d M th dSelected Methods

Passive Techniques Active Techniques Passive Techniques

Traffic Analysis

DNS-based Approaches

Active Techniques

Sinkholing

InfiltrationDNS based Approaches

Analysis of Spam

Analysis of Log Files

Infiltration

DNS Cache Snooping

Tracking of Fast-Flux Networks

Honeypots

Evaluation of AV Feedback

IRC-based detection & monitoring

Enumeration of Peer-to-Peer NetworksNetworks

Other Techniques Other Techniques

Reverse Engineering

C&C forensics & abuse desks

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

28

Page 29: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

„Traffic Sinkholing“k

Redirect bot communication to a “sinkhole”

… Take a Detour

• Redirect bot communication to a “sinkhole”– List of infected systems Estimation of real size– If acceptable: Block commands

• Challenge– Global Cooperation (ISP level or really global)

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

29

© Fraunhofer FKIE

Page 30: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Example: Confickerd b f k

YJOLENTXKSY NET A Domain Name generated by Conficker

YJOLENTXKSY.NET Domain Name: YJOLENTXKSY.NET Registrar: KEY-SYSTEMS GMBH Registrar: KEY SYSTEMS GMBH Whois Server: whois.rrpproxy.net Referral URL: http://www.key-systems.netName Server: NS1.MYDOMAIN-IN.NET a e Se e S OName Server: NS2.MYDOMAIN-IN.NET Name Server: NS3.MYDOMAIN-IN.NET Status: ok Updated Date: 14-may-2009 Creation Date: 04-mar-2009 Expiration Date: 04-mar-2010

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

30

© Fraunhofer FKIE

Page 31: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Confickerb f f dNumber of Infected Systems

2009 2010Quelle: http://www.confickerworkinggroup.org/wiki/pmwiki.php/ANY/InfectionTracking

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

31

© Fraunhofer FKIE

Page 32: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Confickerb f f dNumber of Infected Systems

Quelle: http://www.confickerworkinggroup.org/wiki/pmwiki.php/ANY/InfectionTracking

2010 2011

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

32

© Fraunhofer FKIE

Page 33: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Approaches to detection & measurement of botnetsE l th d Si kh liExample method: Sinkholing

Conficker Sinkhole: “Population Data”

„Many people equate one IP to one system, but that is not usually the case “ (impact: NAT mobile devices dial up )case. (impact: NAT, mobile devices, dial-up, …)

„The daily numbers should represent the potential maximum level of the infection, but in previous test cases usually prove to be much less h h i S k h f 25% 75% f h l than that maximum. So, take the range of 25% to 75% of the values

that we display as the possible infection population and you will be close to the real value. And yes, this is a very large range, and you can see h e do not like to q ote an n mbers for infection pop lations see why we do not like to quote any numbers for infection populations, and why you will see very high and low numbers get quoted regularly depending on the purpose of the person making the quote.“

[Conficker Working Group Website: Section on infection trackinghttp://www confickerworkinggroup org/wiki/pmwiki php/ANY/InfectionTracking ]

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

33

http://www.confickerworkinggroup.org/wiki/pmwiki.php/ANY/InfectionTracking ]

Page 34: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Approaches to detection & measurement of botnetsE l th d Si kh liExample method: Sinkholing

Daily Conficker Sinkhole Data with 25-75% region markedy g

[Conficker Working Group Website: Section on infection trackinghttp://www confickerworkinggroup org/wiki/pmwiki php/ANY/InfectionTracking ]

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

34

http://www.confickerworkinggroup.org/wiki/pmwiki.php/ANY/InfectionTracking ]

Page 35: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Advanced Malware AnalysisCh llChallenges

Only binary code from executables is given Only binary code from executables is given

Blackbox view

Reverse Engineeringg g

Static Analysis

Dynamic Analysis / Debugging

Malware uses various mechanisms to complicate analysis

Timing traps

Obf ti Obfuscation

Runtime modification of code

Cryptography Cryptography

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

35

Page 36: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Advanced Malware AnalysisBl kb i / S db iBlackboxing / Sandboxing

Execution of malware in a controlled environment Execution of malware in a controlled environment

secured against spreading

closely monitored closely monitored

Observation of behavior provides insights into the malware functionality

Integration / hooking into system

Malicious functionality (theft, spam, DDoS, spreading)

Command-and-control protocols and servers

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

36

Page 37: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Advanced Malware AnalysisR E i iReverse Engineering

Static analysis Static analysis

Analysis without execution

Assembly / Basic Block level Assembly / Basic Block level

Control flow analysis

Data and Structure available Data and Structure available

Strings, constants, …

Functions, relationships, …, p ,

Detailed study of algorithms possible

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

37

Page 38: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Advanced Malware AnalysisR E i iReverse Engineering

Static analysis: Stepping stones Static analysis: Stepping stones

Malware can easily consists of 1000+ functions

Malware can be packed (decrypts only during runtime)

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

38

Page 39: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Advanced Malware AnalysisB fit f l iBenefits of analysis

Derivation of signatures for Derivation of signatures for

Anti-virus

Intrusion Detection Systems (IDS) Intrusion Detection Systems (IDS)

Investigation of C&C infrastructure

C&C servers C&C servers

C&C protocol

Weaknesses and possible vulnerabilitiesp

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

39

Page 40: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Botnet Mitigation© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

40

g© Fraunhofer FKIE

Page 41: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Approaches to botnet countermeasuresB t t C d&C t l St tBotnet Command&Control Structures

Centralized (HTTP, IRC, …)

Decentralized (P2P)

Locomotive (Domain Generation Algorithms, DGA)

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

41

Page 42: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Approaches to botnet countermeasuresC t ti d h llCurrent practices and challenges

Takedown of C&C Servers

Abuse request to hosting provider: disconnect / power off server

Challenge: non-cooperative (bulletproof) hosting

Handling of C&C domains

Abuse request to registrar in charge: deregistration Abuse request to registrar in charge: deregistration

Register unused C&C domains in advance

De-Peering of rogue ISPsDe Peering of rogue ISPs

Benign ISP‘s decision cooperation needed to stop services

Court: Restraining order (e.g. FTC vs. 3FN / Pricewert)

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

42

Page 43: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Approaches to botnet countermeasuresC t ti d h llCurrent practices and challenges

Actions against botnet C&C infrastructure do not affect infections

Systems remain instable and vulnerable

Many computers infected with multiple malware

Pay-per-install and update features can be used to extend botnet populationp p

Incomplete takedowns may raise botnet resilience

Infrastructure may be migrated after regaining control

„Teaching“ botmasters to update and enhance

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

43

Page 44: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Combating BotnetsE l f S f ll I ti t d B t tExamples of Successfully Investigated Botnets

Storm Worm (2008) Storm Worm (2008)

Waledac (2008)

Kraken (2008) Kraken (2008)

Conficker (2008-2009)

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

44

Page 45: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Additional Reading

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

45

© Fraunhofer FKIE

Page 46: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Take Home Messages

1. Complex IT Systems are vulnerable The Anti Virus Industry lost the battle a long time ago. There is a whole economy around malicious software. Botnets add Command&Control: They pave the way for organized attacks.

2. The Genie is out of the Bottle: Botnets are here to stay with us Deterrance does not really work today (issue of attribution) Deterrance does not really work today (issue of attribution). International Co-Operation is essential: Co-Operative Defense against Cyber Attacks.

3. Resilience is Essential Something will happen. M k th t th ff t f th U k b t ll d Make sure that the effects of the Unkown can be controlled.

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

46

© Fraunhofer FKIE

Page 47: Martini LCN 111005 web.ppt [Kompatibilitätsmodus] · Malware and Botnets Th B i (2)The Basics (2) Classical types of malicious software: Virus (self-replicating code) Worm (autonomous

Cyber DefensePractically relevant solutions for

detecting, analyzing, and responding to cyber attacks

Monitoring & Situational AwarenessIDS for heterogeneous NetworksOperational Picture & Situational AwarenessIntrusion Response

Resource-efficient CryptographyEfficient Key Management Application Protection Protocols Network Protection Protocols

[email protected]+49 (228) 9435 - 378

Digital Forensics & Malware Analysis

+49 (228) 9435 - 378

Secure Network ArchitecturesDigital Forensics & Malware AnalysisMalware AnalysisDigital ForensicsHoneypots/HoneynetsBotnet Analysis

Secure Network ArchitecturesInteroperable Coalition ArchitecturesMulti-Level SecurityGateway ConceptsP d C N ki

© Forschungsgruppe Cyber Defense, Fraunhofer FKIE

Protected Core Networking