On cyber-attacks and cyber-security in...

60
On cyber-attacks and cyber-security ... in 60min Director of Threat Research, SophosLabs Nov 2016 Dmitry Samosseiko

Transcript of On cyber-attacks and cyber-security in...

Page 1: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

On cyber-attacks and cyber-security

... in 60min

Director of Threat Research, SophosLabs

Nov 2016

Dmitry Samosseiko

Page 2: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

The good old days…

2

Page 3: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

2010

Page 4: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

4

Page 5: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

2013

Sources: KrebsOnSecurity.com Forbes.com 5

• 200 million – Estimated dollar cost to credit unions and community banks for reissuing 21.8 million cards

• 18.00 – 35.70 - The median price range (in dollars) per card stolen from Target and resold on the black market

• 1 million – 3 million – The estimated number of cards stolen from Target that were successfully sold on the black market and used for fraud

• 53.7 million – The income that hackers likely generated from the sale of 2 million cards stolen from Target).

Page 6: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

2016

Page 7: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Yesterday

Page 8: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Who is the target…

8

Targeted Mass-spread

• Large corporations

• Government agencies and contractors

• Industrial systems

• Political activists and celebrities

• Retailers, banks, credit unions, online stores, casinos, ATMs

• Anyone with Internet access

Page 9: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Source and Motive…

9

Nation-state

cyber-espionage

Hacktivism

“Cyber weapons”

Financially motivated (cybercrime)

Page 10: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

10

Page 11: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Malware monetization options

SOURCE: http://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc-revisited/

Page 12: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Cybercrime malware by type

12

•Viruses = infecting files, self-propagates

•Worms = spreads through network holes, self-propagates

•Trojans = resident software with backdoor functionality, pretends to be legitimate, doesn’t self-propagate

Page 13: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Botnet use

Picture source: http://en.wikipedia.org/wiki/Botnet 13

1. Email spam

2. Web spam (comments)

3. DDoS (Distributed Denial of Service)

4. Information stealers

5. …

A botnet is a robot network: a collection of infected online devices, which could be laptops, servers, phones, routers, webcams, or any connected device that can run programs and send data across the internet.

Page 14: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Sept 2016 – A record high 620 Gbps DDoS from Mirai IoT botnet

Sophos Confidential 14

Page 15: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Banking Malware

Victim Cybercrime group

Victim’s Bank

Money mules

• Steals account credentials on banking websites

• Initiates automatic money transfer

• “Web injects“ (injecting DLL into browser process)

• “Vawtrack” – Crimeware-as-a-Service model (steal to order)

• https://www.sophos.com/en-us/medialibrary/PDFs/technical%20papers/sophos-vawtrak-international-crimeware-as-a-service-tpna.pdf

Page 16: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Vawtrak Crimeware-as-a-Service (CaaS)

• EXE attachment or Exploit Kit attack

• Injects into legitimate process

• Hooks APIs to inspect network traffic

• Connects to C&C

• Receives configuration file

• Injects code into web pages of specific URLs

Sophos paper: Vawtrak – International crimeware-as-a-service

Page 17: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Vawtrack web inject

Page 18: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Screen Locker Ransomware

Page 19: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

“Police Locker”

Page 20: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Early monetization methods: Prepaid cards and cash vouchers

20

Page 21: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat
Page 22: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

File Crypting Ransomware

22

Page 23: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Common ransomware characteristics

23

• Unbreakable encryption

• Unique public key is generated on the server

• Deletes “shadow” copies of files

• Uses I2P proxies to communicate with its command-n-control

• Uses TOR network and Bitcoins for payments

• Infection vectors: email, drive-by downloads, malvertizement

Page 24: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Ransomware + Bitcoins =

Bitcoins

• Available world-wide

• Practically untraceable

Ransomware

• Indiscriminate

• Openly criminal

Cryptolocker: 17,706,729.70 USD (Nov 2013)

Page 25: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Coincidence?

25

Cryptolocker search trends

Bitcoin price

Page 26: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

CTB-Locker

“… customisable by the affiliate who has purchased the CTB-Locker instance, the available options have grown over time, more recently – English, French, German, Spanish, Latvian, Dutch and Italian.”

Page 27: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

TorrentLocker/Crypt0L0cker

“TorrentLocker criminals went so far as to refuse to push the Ransomware executable to victim machines whose IP addresses did not belong to the target countries.”

Page 28: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

TorrentLocker

Local currency

Local BC exchanges

Page 29: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

CryptoWall

29

Page 30: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Attack example, stage 1

30

Page 31: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

… stage 2 (CHM file)

31

Page 32: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

… stage 3 (EXE)

32

• Launches new instance of explorer.exe

• Injects unpacked CryptoWall binary code into this process

• Original process exits

• vssadmin.exe Delete Shadows /All /Quiet

• Achieves persistence with autorun registry keys

• Starts a new process for CnC communication via I2P

• Obtains unique public key

• Uses AES 256 encryption to encrypt documents

• Writes and displays “how to decrypt” note in the language, based on GEO IP lookup

Page 33: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Spammed DOC with embedded LNK spawning Powershell download

Sophos Confidential 33

Page 34: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Web-based attacks

34

> 100 000 new malicious pages every day

80% belong to

legitimate sites

Page 35: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Exploit kits/packs

• Cheap ($50/month)

• Easy to use

• ‘Silent’ infection of victims

Page 36: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

36

Page 37: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Website infections

• Linux trojans

• FTP account hacking

• cPanel exploits

• SQL Injections

• Vulnerable webservers, CMS (Wordpress, Drupal, …), PHP

Page 38: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Evasion Techniques

38

• Binaries repackaged every 20 min (!) and AV tested

+ server side polymorphism

• 100s of payload domains created daily

• 10,000s of new infected websites stealing legitimate traffic or used as payload or CnC servers

Everything is a moving target

Page 39: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

39

Page 40: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Android malware

40

• Information stealers

• SMS senders

• Phishing

• Privilege escalation

• Zeus for Android

• Fake AV

• Ransomware

• Adware

• Spyware

0

20000

40000

60000

80000

100000

120000

140000

160000

180000

200000

Malware vs PUA growth

Page 41: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Android Ransomware

Page 42: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Mac malware?

42

Page 43: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Scareware for Macs

43

Page 44: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

July 2016 - OSX/Eleanor-A

Sophos Confidential 44

Page 45: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

March 2016: OSX/KeRanger-A

Sophos Confidential 45

Page 46: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

September 2016 – OSX/PWSSync-B

Sophos Confidential 46

• Configures itself as an OS X LaunchAgent • Steals passwords and other credentials from your OS X Keychain • Calls home to download additional scripts to run.

Page 47: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

OSX malware?

47

•Commercial keyloggers

•Ransomware

•Password stealers

•“Bundleware”

•Search result substitution, Ad-theft

Page 48: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Linux malware

48

1. Linux Web servers is the perfect “launch pad” for malware and exploits targeting Windows

2. A Linux “botnet” is a perfect platform for spam and DDOS

Combine this with a common belief that Unix/Linux ‘is safe’ and needs no AV. The result is -- highly effective malware spreading on Unix/Linux, and going unnoticed for a long time

• ELF

• PHP

• Perl

• Shell

Page 49: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Linux malware example: Troj/Apmod

• Installs itself as an Apache module which inspect outgoing HTTP content

• Injects JavaScript code into every page served

• The JavaScript writes an <IFRAME> to the page

• The <IFRAME> points to a malicious/compromised site

We call it the “web traffic hijacking”

Page 50: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

What can be done?

50

Awareness

Security measures

Legal actions and takedowns

Page 51: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Legal actions and takedown efforts

51

• Nov 2009 – “Mega-D” (30-35% of spam). Arrested

• Feb 2010 – “Mariposa” botnet, 12M PCs. Arrested.

• Mar 2010 – “Zeus” botnet. Arrested

• Oct 2010 – “Bredolab” botnet, 30M PCs!

• Sep 2011 – “Kelihos” botnet

• Mar 2011 – “Rustock” botnet. On the run.

• …

• Nov 2012 – “Nitol”

• Jan 2013 – Zeus botmaster arrested

• June 2014 - Operation “Tovar”

• Sept 2015 – Arrests tied to Citadel and Dridex

Page 52: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Sophos Labs

52

Abingdon

Vancouver

Budapest

Ahmedabad Sydney

Sydney

•Real-time response to incidents

•24/7/365 operation

Threat Response

•Deep expertise into threats & attacks

•Create powerful protection solutions

Threat Research

•Build bespoke systems to automate threat analysis & response

•Enable SophosLabs to scale

Automation development

•Ensure effectiveness & quality of releases

•Own risk management

Quality Assurance

Page 53: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Threat

Collection Analysis

Protection

& Remediation

Page 54: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Snapshot of 2016 Threat Landscape

54

150,000

• Suspicious URLs seen & analysed daily

30,000

• Malicious URLs daily, over 80% of which are from legitimate web sites

5 million

• Spam messages daily across 20 countries

400,000

• Previously unseen files received daily

2,000

• Previously unseen Android apps daily

600 million

• Live Protection lookup events added to Hadoop cluster

Page 55: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat
Page 56: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

… across all the platforms and threat types

• Email spam

• Malicious software

• Adware

• Application control

• Windows (32/64)

• Android

• Linux

• OSX

• … and browsers!

Page 57: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat
Page 58: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

https://home.sophos.com/

Page 59: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Thank you!

Twitter:

@samosseiko

Blogs:

http://nakedsecurity.sophos.com/

http://blogs.sophos.com/

59

Page 60: On cyber-attacks and cyber-security in 60mincourses.ece.ubc.ca/cpen442/sessions/guest_lectures/... · 2016-12-01 · On cyber-attacks and cyber-security ... in 60min Director of Threat

Questions?