What is Botnet?
Download
Report
Transcript What is Botnet?
Recent Advanced Botnets
- MegaD & Waledac
What is Botnet?
Bots: compromised hosts, “Zombies”
Botnets: networks of bots that are under the control of a
human operator (botmaster)
(generally looks like) Worm + C&C channel
Command and Control Channel
Disseminate the botmasters’ commands to their bot armies
Communication (IRC, HTTP, … (can be encrypted))
Worm
2010/10/22
Attack
(DoS, spamming, phishing site, …)
Propagation
(vulnerabilities, file sharing, P2P, …)
Speaker: Li-Ming Chen
2
Lifecycle of a Typical Botnet Infection
Uses of Botnets:
• Phishing attacks
• Spam
• ID/information theft
• DDoS
• Distributing other malwares
2010/10/22
Speaker: Li-Ming Chen
3
Why is Botnet so Daunting?
Underground Economics!
Multilayered/Multifunction
C&C Architecture
Botnet structures
change (e.g., P2P)
Always behind
the mirror
Fast-flux
Secure Comm.!
(hide C&C servers
or other bots behind
an ever-changing
network)
Multi-vector exploitation
+ Social Engineering Tech.
2010/10/22
Speaker: Li-Ming Chen
4
Overview
MegaD (aka Ozdok)
Waledac
Analysis method
Architecture
Operation/Malicious Activities
Analysis method
Architecture
Operation/Malicious Activities
Summary & Discussion
2010/10/22
Speaker: Li-Ming Chen
5
Paper Reference
MegaD
Chia Yuan Cho, Juan Caballero, Chris Grier, Vern Paxson, and
Dawn Song, “Insights from the Inside: A View of Botnet
Management from Infiltration,” in Proc. USENIX LEET, 2010.
Waledac
Greg Sinclair, Chris Nunnery, and Brent ByungHoon Kang, “The
Waledac Protocol: The How and Why,” in Proc. MALWARE, 2009.
Chris Nunnery, Greg Sinclair, and Brent ByungHoon Kang,
“Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of
Botmaster Systems in a Multi-Tier Botnet Infrastructure,” in Proc.
USENIX LEET, 2010.
2010/10/22
Speaker: Li-Ming Chen
6
MegaD
MegaD (aka Ozdok)
http://en.wikipedia.org/wiki/Mega-D_botnet
A mass spamming botnet, appeared 2007
1/3 of worldwide spam at its peak!!
Resilience – survived two major takedown attempts
2010/10/22
2008/12, US FTC + Marshal Software (McColo ISP shutdown)
2009/11, Takedown effort by FireEye
Speaker: Li-Ming Chen
7
MegaD C&C Servers & Dialogs
A MegaD bot interacts during its lifetime with 4 types
of C&C servers
Master Servers (MS)
Drop Servers (DS)
Template Servers (TS)
SMTP Servers (SS)
2 different “sequences of commands” (dialog) issued
by MS are observed
Spam Dialog (launch spam campaigns)
Download Dialog (update a new binary code)
2010/10/22
Speaker: Li-Ming Chen
8
MegaD – Spam Dialog
2010/10/22
(1) request a command
(2) test spam-sending
capability
(3) MS engages the bot in an
elaborate preparation phase
to obtain information about
the infected host
(4) get a spam template
(5) start spam
When it finishes, it (bot) reinitiates the spam dialog
Speaker: Li-Ming Chen
9
MegaD – Download Dialog
2010/10/22
(1) request a command
(2) test spam-sending
capability
(3, 4, 5) MS orders the bot to
download a new binary from
a DS and execute it
Speaker: Li-Ming Chen
10
MegaD C&C Servers
Function
How to connect/locate
Master Servers
(MS)
Distribute commands, pull-based
(reply with both auth info. and a
general command)
Domain name hardcoded in the
bot binary
Drop Servers
(DS)
Distribute new binaries
MS indicates a URL specifying a
file to download
Template Servers
(TS)
Distribute spam templates
MS specifies the address and
port of the TS
(1) test spam-sending capability
(2) notify an SMTP server after
template downloading and prior
to commencing to spam
(1) MS specifies the server’s
hostname
(2) Embedded in the spam
template
SMTP Servers
(SS)
2010/10/22
Speaker: Li-Ming Chen
11
Infiltrating MegaD
Goal
Monitor MegaD’s malicious activities (spam only!)
Discover complete C&C architecture
Techniques:
Milker [11, 12] – a bot emulator w/o malicious side effects
Google hacking – a trick to discover MS
*Honeypot
[11] Juan Caballero et al., “Dispatcher: Enabling active botnet infiltration using automatic protocol
reverse-engineering,” in Proc. ACM CCS, 2009.
[12] Juan Caballero et al., “Binary code extraction and interface identification for security applications,”
in Proc. NDSS, 2010.
2010/10/22
Speaker: Li-Ming Chen
12
Milker
(Observation) MegaD only carries out spams
Milkers:
Templates fully describe the botnet’s spam operation
C&C Milker: periodically query a MS for commands
Template Milker: periodically query a TS for templates
IP address diversity: Tor (onion network)
Pre-requisites:
MegaD’s protocol grammar [11]
Encryption/decryption functions used by MegaD [12]
2010/10/22
Speaker: Li-Ming Chen
13
Google Hacking
Google hacking is just a “trick”
Intuition:
MegaD MSes listen at TCP port 80 or 443
Camouflaged as normal web servers by crafting response to
“GET /”
leverage the ubiquity of search engines locating web servers
on port 80/443 around the Internet
Hyperlink to a MicroSoft webpage
The camouflage content gets added to the search engineer’s
database
just google the “distinguishable elements” to locate that MSes
2010/10/22
4 results on 4 unique hostnames with no false positive
Speaker: Li-Ming Chen
14
Google Hack Returns 4 Unique Results
(MegaD crafted response)
(copy from author’s slides)
2010/10/22
Speaker: Li-Ming Chen
15
Insights from Infiltration
Takedown and Reconstruction
View of Complete C&C Architecture
Template Milking & Botnet Management
2010/10/22
Speaker: Li-Ming Chen
16
FireEye’s Takedown Effort
(infiltration begin)
(FireEye takedown the MS-S1 and SS1)
(Spam: 4% 0% (11/6) 17% (16 days later))
Finding:
Template contents remain unchanged for 1 week after takedown
Lack of backup domains and ISPs/infrastructure
Time taken to setup new infrastructure = 1 week
2010/10/22
Speaker: Li-Ming Chen
17
MegaD’s Takedown Recovery
11/13, templates updated to
point to new SS2 & MS-S2
Recovery:
X
O
(1) Resilience: remnant servers redirect remaining bots to new
C&C servers
(2) New bots: push out new MegaD binaries!
2010/10/22
16 days after takedown, MegaD’s spam exceeded pre-takedown
level
Speaker: Li-Ming Chen
18
MegaD’s C&C Architecture
Q: multiple botmaster?
1/29,
MS-D1 by google hacking,
and led to others
A: maybe.. (evidence #1)
1/17
11/13
11/13
(TS server replacement)
X
TS2
443
10/27~2/18
(always on)
2010/10/22
2/17
Speaker: Li-Ming Chen
1/24
12/10~
1/14
X
TS3
443
12/22~
2/2
19
Template Milking & Botnet Management
Collect 271K templates from
the 7 TSes over 4 months
Template:
Template + element database
Each data element has a set of
values in the template
polymorphic
Template’s change shows
that how botmaster manages
the botnet
2010/10/22
Speaker: Li-Ming Chen
20
Changes in Template Structure
Plot occurrences of unique data elements across all
template servers
It’s an evidence (#2) of separate management!
(only 2 days templates
from TS7)
(element ID)
2010/10/22
Speaker: Li-Ming Chen
21
Changes in Polymorphic Data Elements
3 types of (element) polymorphism been identified
Single-set polymorphic (fixed set)
Multi-set polymorphic (manually updated by botmaster)
e.g., URL, BODY_HTML
Every-set polymorphic (auto-updated by TS)
e.g., DOMAINS, IMG, LINK
Every-set
Multi-set
2010/10/22
Speaker: Li-Ming Chen
22
Changes in Polymorphic Data Elements
(cont’d)
Update rate for multi-set polymorphic elements is
also an evidence (#3) of separate management!
Days between dynamic subject updates, {DIKSBJ}
Groups:
Group 1
Arch: no TS replacement.
Template: specific structure,
infrequent updates.
2010/10/22
Group 2
Arch: TS replacement.
Template: specific structure,
frequent updates.
Speaker: Li-Ming Chen
23
Conclusion (MegaD)
MegaD infiltration over 4 months
Techniques:
Milker + Google Hacking
Insights:
Rich view of the MegaD C&C architecture
How the botnet actually recovers from a takedown
Evidence of distinct botmaster management groups
2010/10/22
But they share the same SMTP server
Speaker: Li-Ming Chen
24
Overview
MegaD (aka Ozdok)
Waledac
Analysis method
Architecture
Operation/Malicious Activities
Analysis method
Architecture
Operation/Malicious Activities
Summary & Discussion
2010/10/22
Speaker: Li-Ming Chen
25
Waledac
Waledac (possible successor to the Stome botnet)
http://en.wikipedia.org/wiki/Waledac_botnet
Appeared in late 2008
A spam-generating phishing infrastructure with fastflux functionality
• 3 Symantec’s blog and a technical report
http://www.symantec.com/connect/blogs/paper-waledac
• Trend Micro’s report
http://us.trendmicro.com/imperia/md/content/us/pdf/threats/securitylibrary/infiltrating_the
_waledac_botnet_v2.pdf
2010/10/22
Speaker: Li-Ming Chen
26
Analysis Method
Not use infiltration
Methods:
Binary analysis
Have file system data from higher tiers of the botnet
Network traffic traces analysis
2010/10/22
Speaker: Li-Ming Chen
27
Waledac Hierarchy
Botmaster
Botmaster-owned infrastructure
UTS (Upper-Tier Server)
TSL (just the name of the Window registry entry)
Infected host systems
(C&C servers)
Repeater
Spammer
w/o NAT,
Single tier peering
(Bots)
Nodes behind NAT
2010/10/22
Speaker: Li-Ming Chen
28
Lower Layer: Infected Host Systems
An infected victim decides itself as a:
Spammer: if it is unreachable by other nodes (private IP)
Repeater: if it has non-private IP address
Tasks: spamming, local data harvesting (e.g., email addresses)
More tasks: HTTP proxying, fast-flux DNS
Bootstrap (after compromise…):
Waledac binary contains a bootstrap IP list and a URL
(fast-flux)
Locate neighboring repeaters
Join/registration (through each tier to the head-end C&C
server)
Get section key for future communication
2010/10/22
Speaker: Li-Ming Chen
29
Botnet Communication
Security: 5 types of encoding scheme:
P2P (repeater tier only):
Each bot maintains a “fresh” repeater nodes list
“Single tier peering” reduces the overall traffic handling
requirements for the higher tiers
2010/10/22
Speaker: Li-Ming Chen
30
Botnet Communication
Command and Control:
Fast-flux:
Request and reply both use “symmetric” XML format
9 unique commands been identified
A repeater may act as a DNS server for supporting
Waledac fast-flux network
It will respond to DNS queries from both lower bots and
other nodes in the Internet
Spammers retrieve commands in a pull-based
scheme
2010/10/22
Speaker: Li-Ming Chen
31
TSL
Hide UTS from repeaters & Initiate target spam
campaigns
(Guess) servers in TSL tier:
X
(1) self-organizing, information sharing
O
(2) independently report to a central server
TSL Configuration:
CentOS
ntp, BIND (a DNS server), PHP, nginx (a http server), …
phpmailer
2010/10/22
Speaker: Li-Ming Chen
32
UTS (Upper-Tier Server)
Purpose:
Autonomous C&C
Credential repository
Provide
repacking
Maintain binaries and bootstrap lists
service
Audit, monitors population, vitality statistics
Interact with underground 3rd parties (spamit.com, j-roger.com)
UTS Configuration:
CentOS
PHP, CLI (command line interface), flat-files, no central DB…
2010/10/22
Speaker: Li-Ming Chen
33
Malicious Activities
Differentiated spamming
Low Quality Spam (buck spam through spammers)
High Quality Spam (authenticated & targeted)
Data harvesting
Network traffic (winpcap)
HDD Scanning (email)
2010/10/22
Speaker: Li-Ming Chen
34
High Quality Spam (HQS)
(Collected
from bots)
3rd party
collaboration
(test credentials
before real spam)
2010/10/22
Speaker: Li-Ming Chen
35
Conclude (Waledac)
Hierarchical C&C architecture (multi-service tiers)
Repeater single tier peering
HQS authenticated spam
Node auditing
2010/10/22
Speaker: Li-Ming Chen
36
Overview
MegaD (aka Ozdok)
Waledac
Analysis method
Architecture
Operation/Malicious Activities
Analysis method
Architecture
Operation/Malicious Activities
Summary & Discussion
2010/10/22
Speaker: Li-Ming Chen
37
Summary
MegaD
Multifunction C&C Architecture
Takedown & Recovery
Waledac
Multilayered C&C Architecture + P2P Botnet Infrastructure
Advanced spam technique and botnet management
2010/10/22
Speaker: Li-Ming Chen
38
Botnet Detection
Target:
Bots, whole botnet, C&C servers, botmaster!!
Solutions:
BotHunter detect bot’s lifecycle
BotSniffer detect spatial-temporal properties of C&C
BotMinner monitor malicious activities and C&C
communication, and co-inference
Temporal persistence characteristic of a single bot
Infiltration
BotGrep detect P2P structure of botnet
…
2010/10/22
Speaker: Li-Ming Chen
39
Discussion
Things make botnet detection more challenging
Pull-based C&C communication
Fast-flux
Encryption/polymorphism
Proprietary C&C techniques and architecture
Problems:
Forensics – identify botmaster
bots botnet or botnet bots
2010/10/22
Speaker: Li-Ming Chen
40