Slammer ’ s Bandwidth-Limited Growth �
80% of Code Red 2 Code Red 2 re-re- Code Red 1 and Code Red 2 Code Red 2 re- cleaned up due to released Jan 2004 Nimda endemic dies off released with Oct. onset of Blaster (and 2005; not since … ?) again 2003 die-off
Code Red 2 re-re- Feb 7 2012! released Jan 2004 (and 2005; not since … ?)
2009 - 2010
2012
2013-2014
Stuxnet : Slowly ramped up centrifuge speeds until they flew apart … … while feeding false readings to control system. Included 4 zero days for spreading
Flame : General information stealer. Includes geolocation from local photos, taking screenshots, microphone access to capture local audio, recording Skype calls, download contacts from nearby BlueTooth devices. Exploited previously unknown MD5 hash collision vulnerability . Built-in autowipe “ kill switch ” .
Gauss : Specifically targets banking transactions, mainly in Lebanon. Includes trapdoor looking for specific accounts, undeciphered to date.
#!/usr/bin/perl while (<>) { chomp; if ( /^(get|post|options|head|...)(.*)/i ) { # Do not respond if it looks like an exploit last if length > 1000; my $date = gmtime; if ( $1 =~ /get|head/i ) print "HTTP/1.1 200 OK\r\n"; elsif ( $1 =~ /search/i ) print "HTTP/1.1 411 Length Required\r\n"; elsif ( $1 =~ /options/i ) { print "HTTP/1.1 200 OK\r\n"; print "DASL: \r\nDAV: 1, 2\r\n"; print "Public: OPTIONS, TRACE, GET, HEAD, DELETE, ...\r\n"; print "Allow: OPTIONS, TRACE, GET, HEAD, DELETE, ...\r\n"; } elsif ( $1 =~ /propfind/i ) print "HTTP/1.1 207 Multi-Status\r\n"; else print "HTTP/1.1 405 Method Not Allowed\r\n"; } print <<EOF; Server: Microsoft-IIS/5.0 Date: $date GMT Content-Length: 0 Content-Type: text/html Set-Cookie: ASPSESSIONIDACBAABCQ=BHAMAEHAOAIHMOMGJCPFLBGO; path=/ Cache-control: private EOF last; } }
GQ: Building a Large-Scale Honeyfarm • Honeyfarm : use a network telescope to route scan traffic to a set of honeypots • Goal: scale to 100,000s of monitored addresses … • … at high fidelity Physical Honeyfarm Servers GRE Tunnels Global or direct routing Internet Advertised Dark Space MGMT Gateway VM VM VM VM VM VM VM VM VM
GQ: Building a Large-Scale Honeyfarm • Honeyfarm : use a network telescope to route scan traffic to a set of honeypots • Goal: scale to 100,000s of monitored addresses … • … at high fidelity Physical Honeyfarm Servers GRE Tunnels Global or direct routing Internet Advertised Dark Space MGMT Gateway VM VM VM VM VM VM Dark space: blocks of otherwise VM VM VM unallocated addresses
GQ: Building a Large-Scale Honeyfarm • Honeyfarm : use a network telescope to route scan traffic to a set of honeypots • Goal: scale to 100,000s of monitored addresses … • … at high fidelity Physical Honeyfarm Servers GRE Tunnels Global or direct routing Internet Advertised Dark Space MGMT Gateway VM VM VM VM VM VM Routers send dark space traffic either via VM VM VM tunnels or direct attachment
GQ: Building a Large-Scale Honeyfarm • Honeyfarm : use a network telescope to route scan traffic to a set of honeypots • Goal: scale to 100,000s of monitored addresses … • … at high fidelity Physical Honeyfarm Servers GRE Tunnels Global or direct routing Internet Advertised Dark Space MGMT Gateway VM VM VM VM VM VM Gateway applies filtering to reduce load, allocates VM VM VM honeypot and mediates communication
GQ: Building a Large-Scale Honeyfarm • Honeyfarm : use a network telescope to route scan traffic to a set of honeypots • Goal: scale to 100,000s of monitored addresses … • … at high fidelity Physical Honeyfarm Servers GRE Tunnels Global or direct routing Internet Advertised Dark Space MGMT Gateway VM VM VM VM VM VM Outbound communication attempted by a honeypot VM VM VM
GQ: Building a Large-Scale Honeyfarm • Honeyfarm : use a network telescope to route scan traffic to a set of honeypots • Goal: scale to 100,000s of monitored addresses … • … at high fidelity Physical Honeyfarm Servers GRE Tunnels Global or direct routing Internet Advertised Dark Space MGMT Gateway VM VM VM VM VM VM Outbound communication attempted by a honeypot VM VM VM can be redirected back to another honeypot
GQ: Building a Large-Scale Honeyfarm • Honeyfarm : use a network telescope to route scan traffic to a set of honeypots • Goal: scale to 100,000s of monitored addresses … • … at high fidelity Physical Honeyfarm Servers GRE Tunnels Global or direct routing Internet Advertised Dark Space MGMT Gateway VM VM VM VM VM VM If redirected traffic again tries to communicate VM VM VM outbound, then we have found a worm
Polymorphic Propagation Decryptor Key Encrypted Glob of Bits ê Decryptor Once running, worm Encryptor uses an encryptor with Key Main Worm Code a new key to propagate } Jmp ¡ ê Decryptor Key2 Different Encrypted Glob of Bits
Recommend
More recommend