a tool to link the
play

A TOOL TO LINK THE MALICIOUS WEB Agenda Introduction Fireshark - PowerPoint PPT Presentation

Stephan Chenette Principal Security Researcher Websense Labs FIRESHARK A TOOL TO LINK THE MALICIOUS WEB Agenda Introduction Fireshark Details Web Communities Malicious Web Communities Mass Injection Analysis Redirection


  1. Stephan Chenette Principal Security Researcher Websense Labs FIRESHARK A TOOL TO LINK THE MALICIOUS WEB

  2. Agenda  Introduction  Fireshark Details  Web Communities  Malicious Web Communities  Mass Injection Analysis  Redirection Chaining  DeobfuscationAnalysis  Content Profiling  Conclusion 2

  3. Why you should care URL Injection attacks are increasing 225% increase in the number of new compromised legitimate websites in the last 12 months Source: Websense Security Labs, State of Internet Security, Q3-Q4 2009 Report 3

  4. Why you should care  The deobfuscation tools are NOT sufficient  Emulators are meant for products not researchers  Mass Injection attacks are hard to correlate e.g. nine-ball, beladen (~40k compromises)  A need exist that satisfied both the high level view of an attack + low level content profiling  Fireshark. 4

  5. Connecting the dots Mass Injections examples  Gumblar ~60,000 compromises  Beladen ~40,000 compromises  Nine-ball ~20,000 compromises 5

  6. Public Tools Available today Websites: Tools:   Wepawet Malzilla   Anubis Rhino Debugger   ZeusTracker FF JavaScript Deobfuscator   BLADE (*new*) DS’s SpiderMonkey   Robtex Jsunpack   Unmask Parasites Caffeine Monkey   Malwaredomainlist.com NJS  Badwarebusters.org  VirusTotal.com 6

  7. Malzilla vs the Pheonix Exploit Kit 7

  8. JSUNPACK VS. Phoenix 8

  9. Spidermonkey/ CaffeineMonkey  Lacks DOM features + Only a JavaScript engine 9

  10. Obfuscated Content  Iframe/script injection (compromised pages)  Crimepack exploit kit  Eleonore exploit kit  Phoenix exploit kit  YES exploit kit  SEO sploit pack  Fragus exploit kit  Neosploit kit  More… 10

  11. Crimepack 2.8 (released before Easter) Exploits include:  Adobe Acrobat Reader Exploits (including CVE-2010-0188) (ALL)  JRE (GSB & SERIALIZE) (ALL)  MDAC (IE)  MS09-032 (IE)  MS09-002 (IE)  CVE-2010-0806 (IE) 11

  12. Crimepack 2.8 Anti-Analysis Features include: 1. Undetected from AV Scanners (JavaScript & PDF/JAR/JPG files) 2. Random PDF Obfuscation (Not using static pdf file like other packs) 3. Blacklist checker & AutoChecker 4. Prevent Wepawet, Jsunpack and other JavaScript unpackers to decode your page 12

  13. Crimepack 2.8 Changes  Added CVE-2010-0806  Added CVE-2010-0188  Added more ip's to block  IFrame generator  Redirector for non-vulnerable traffic  New JS cryptor  Anti-Kaspersky emulation 13

  14. Problems with emulation DOM Always behind  document.body is undefined  document.title is undefined  document.forms is undefined  document.documentElement is undefined  document.URL is undefined  document.getElementsByTagName is not a function 14

  15. Problems with emulation DOM Always behind  window.location.search  window.addEvent is not a function  window.onDomReady is not a function  window.parent is undefined  window.screen is undefined  window.top is undefined  screen is not defined  top is not defined  parent is not defined  self is not defined  location.protocol 15

  16. Problems with emulation External scripts  jQuery is not defined  urchinTracker is not defined  SWFObject is not defined 16

  17. What about crawlers??  Wget  Curl  Selenium  Use a web proxy like fiddler  Redirection Chains? Sort of.  Content Profiling? Not really. 17

  18. You dare doubt me?? Me!!!?? =] 18

  19. FireShark Introduction  Firefox plugin  Accepts commands to crawl compromised websites  Stores events and data sets.  Post-data analysis correlates data  End result = better understanding of URL injection attacks 19

  20. Send URLs to FireShark Malicious URL Feed 20

  21. FireShark Architect (Two Modes)  Network Mode  Used in an automated manor  Alert/Auto-Categorize  Single-user mode  Manual Inspection  Injection Research 21

  22. Single-User Mode Demo 22

  23. Local FireShark Demo 23

  24. Now Parse the Log file  Fireshark Log  What comes next is up to you… A few scripts provided e.g:  Graphmaker.pl  InOut.pl 24

  25. Post-Run Analysis  Log is analyzed manually or automatically via post-analysis correlation process 25

  26. Monitoring communities 26

  27. Monitoring communities 27

  28. Mass Injection Attack  Example of a Injection attack community 28

  29. The Importance of Data correlation 29

  30. The Importance of Data correlation 30

  31. 31

  32. “Web Communities” 32

  33. Top 25 Global Alexa List (mid-Feb 2010) google.com google.co.in facebook.com google.cn youtube.com sina.com.cn yahoo.com myspace.com live.com google.de wikipedia.org wordpress.com blogger.com microsoft.com baidu.com amazon.com msn.com taobao.com qq.com google.co.uk yahoo.co.jp bing.com twitter.com ebay.com google.fr 33

  34. Visiting youtube.com • This is all the content your browser is feed when visiting youtube.com 34

  35. 35

  36. 36

  37. 37

  38. 38

  39. 39

  40. 40

  41. 41

  42. 42

  43. 43

  44. Major Ad Networks  Doubleclick (Google)  Yield Manager (Yahoo)  Fastclick (ValueClick) 44

  45. Top 100 Global Alexa List (mid-Feb 2010) 45

  46. Top 100 Global Alexa List (mid-Feb 2010) 46

  47. Victims of “ Malvertisements ” (2009)  The Drudge Report  Horoscope.com  Lyrics.com  slacker.com  Eweek.com  The New York Times  Philadelphia Inquirer  Expedia, Rhapsody 47

  48. Horoscope.com Economy 48

  49. “Malicious Web Communities” 49

  50. Down the Rabbit hole  Analysis of Three exemplary Injection campaigns  Injection campaigns occur daily  A breadth view analysis helps us gain a better understanding of the malicious webscape 50

  51. Down the Rabbit hole Injection Example #1 51

  52. Injection Example #1  (Nov/Dec 2009)  13k matches/24hrs 52

  53. Injection Example #1  (Nov/Dec 2009)  13k matches/24hrs 53

  54. Injection Example #1  Step 1) Analyze a subset (500/13k)  Breadth  Popular campaign will emerge  Injections into unique websites will lead to same hosts  Depth  Details of the attack  Screen Shots  Source code, Deobfuscted DOM, Network traffic 54

  55. Bird’s Eye View of 500 Compromised Websites 55

  56. Breadth – Popularity of Request connection 56

  57. Breadth – Popularity of Request connection 57

  58. Breadth – Popularity of Request connection 58

  59. Down the Rabbit hole Injection Campaign #1: 93.186.127.49 59

  60. “W93.186” Injection Campaign 60

  61. “W93.186” Injection Campaign 61

  62. “W93.186” Injection Campaign Screen Shot 62

  63. Observations from 93.186.127.49 attack Operation b49 63

  64. Rascop.com…a familiar foe? 64

  65. 65

  66. Infamous Rascop.com rascop.com = NXD (feb 10’) Waledac Fast-flux domain 66

  67. Rascop.com and friends say goodbye but landing pages here to stay  Waladec domains were NXD in the takedown  Landing pages were still online though 67

  68. Injection Example #2 Attack #2: ru:8080 68

  69. Breadth – Popularity of Request connection 69

  70. Breadth – Popularity of Request connection  250/5k URLs lead to homesalesplus.ru 70

  71. Polymorphic Injected Code Variation #1 71

  72. Polymorphic Injected Code Variation #2 72

  73. Polymorphic Injected Code Variation #3 73

  74. Depth – Diff DOM/SRC 74

  75. Depth – Script link in DOM 75

  76. Polymorphic Injected Code Variation #3 76

  77. DOM View  DOM ==> Mutable Memory representation (Final View of DOM after JS/events) 77

  78. Log Analysis  Further Analysis showed variations: hxxp://clicksor-com.eastmoney.com.mobile- 1. de. homesaleplus.ru:8080 /ocn.ne.jp/ocn.ne.jp/class mates.com/linkhelper.cn/google.com/ hxxp://chip-de.ggpht.com.deezer- 2. com. viewhomesale .ru:8080 /google.com/google.com/timeanddate.co m/avg.com/zshare.net/ 78

  79. ru:8080 URL Injection Campaign Similarities between infected sites:  Port 8080  Various changing .ru domains  Legitimate content on port 80 served by Apache  Malicious domains are mapped to 5 different IPs  Malicious IP addresses are on hosting providers Leaseweb (Netherlands) and OVH.com (France)  Landing domains were NXD Dec 09’/Jan 10’ 79

  80. The Never-ending story  Where one ends, another begins 80

  81. Observations from ru:8080 Injection attack  Compromised websites can and are updated automatically  Compromised websites are injected with multiple redirectors  Sharing of stolen FTP credentials e.g. Many infected sites also led to Gumblar infected domains, indicating that attackers perhaps had shared stolen FTP credentials 81

  82. Injection Example #3  Mass Injection #3  ~5700 infected pages  ~5300 unique hosts 82

  83. Breadth – Popularity of Response connection 83

  84. Breadth – Popularity of Response connection  sportgun.pl.ua sends a response back to 50+ hosts 84

  85. 85

Recommend


More recommend