Black Market Botnets Black Market Botnets Nathan Friess Friess Nathan John Aycock Aycock John Ryan Vogt Ryan Vogt Department of Computer Science Department of Computer Science University of Calgary University of Calgary Canada Canada
Botnets: Current Scenario : Current Scenario Botnets � Infect computers Infect computers � � Spam attachments/links, drive Spam attachments/links, drive- -by downloads by downloads � � Control victim Control victim � � Spam Spam botnets botnets � � Gather data Gather data � � Key loggers, monitor network traffic Key loggers, monitor network traffic �
“Interesting Interesting” ” Data Data “ � Identity: Passwords, PINs, SSN Identity: Passwords, PINs, SSN � � Financial: Credit Cards, Tax Returns Financial: Credit Cards, Tax Returns � � Corporate Secrets Corporate Secrets � � Design Documentation, Schematics Design Documentation, Schematics � � Financial Reports Financial Reports � � Personal Secrets Personal Secrets � � Latest gossip on celebrities Latest gossip on celebrities � � Illegal Files, Terrorist Plans Illegal Files, Terrorist Plans �
Our Prediction Our Prediction � More types of data will be stolen and used More types of data will be stolen and used � for profit for profit
Our Prediction Our Prediction � More types of data will be stolen and used More types of data will be stolen and used � for profit for profit
The Business Case The Business Case Passwords Credit Cards Volume Celebrity Secrets Trade Secrets Love Letters ??? Available Data
Gozi: A First Step : A First Step Gozi � February 2007 February 2007 � � Monitor HTTP POST requests (even SSL) Monitor HTTP POST requests (even SSL) � � Upload POST data to central server Upload POST data to central server � � Customers search for data (based on web Customers search for data (based on web � site, form fields, etc.) and pay to download site, form fields, etc.) and pay to download � Doesn Doesn’ ’t upload local files t upload local files � � Limited searching capabilities Limited searching capabilities �
Black Market Botnets Black Market Botnets ��������� ������ ���������
Black Market Botnets Black Market Botnets ��������� ������ ������ ��������� Basic Architecture
Black Market Botnets Black Market Botnets ��������� ������ ������ ������ ��������� ������ Basic Architecture
Black Market Botnets Black Market Botnets ��������� “Bunnies” ������ ������ ������ ��������� ������ Basic Architecture
Black Market Botnets Black Market Botnets ��������� ������ ������ ������ ��������� ������ Basic Architecture
Black Market Botnets Black Market Botnets ��������� ������ ������ ��������� Advanced Architecture
Black Market Botnets Black Market Botnets ��������� ������� ������ ������� ������ ��������� Advanced Architecture
Black Market Botnets Black Market Botnets ��������� ������� ������ ������� ������ ��������� Advanced Architecture
Black Market Botnets Black Market Botnets ��������� ������� ������ ������� ������ ��������� Advanced Architecture
Interesting Document Interesting Document Indicators Indicators � Document Types: .TAX Document Types: .TAX � � Financial Data: Spreadsheets Financial Data: Spreadsheets � � Specific Vocabulary: Specific Vocabulary: � Technical Terms, Poetry Technical Terms, Poetry � Activity: Recently Edited, Viewed Activity: Recently Edited, Viewed �
Auction Infrastructure Auction Infrastructure � eBay eBay � � Hide document fragments Hide document fragments � using steganography steganography using � Legitimate cover for fund Legitimate cover for fund � transfer transfer � Don Don’ ’t really need to ship a physical product t really need to ship a physical product � � Existing model: drug trafficking Existing model: drug trafficking �
Additional Markets Additional Markets � Victims pay Victims pay botmaster botmaster to not publish to not publish � documents: Bidding Wars documents: Bidding Wars � Pre Pre- -seed seed botnet botnet with customer queries with customer queries � � Allow customers to write scripts to search Allow customers to write scripts to search � for specific data for specific data
Defenses Defenses � Avoid being infected Avoid being infected � � Limit document exposure Limit document exposure � � Keep archived files offline Keep archived files offline � � Hide documents using Hide documents using steganography steganography �
Defenses Defenses � Digital Rights Management Digital Rights Management � � Investigate leaks Investigate leaks � � Fingerprint documents, trace back to Fingerprint documents, trace back to � infected computer infected computer � Follow money trail, trace back to Follow money trail, trace back to botmaster botmaster � � Actively attack document gathering Actively attack document gathering � � Insert useless documents into Insert useless documents into botnet botnet �
Conclusions Conclusions � Valuable data is available in Valuable data is available in botnets botnets � � It is already possible to connect data and It is already possible to connect data and � customers customers � A black market for data can exist, even if A black market for data can exist, even if � botmasters don don’ ’t know what is in demand t know what is in demand botmasters
Black Market Botnets Black Market Botnets Nathan Friess Friess Nathan John Aycock Aycock John Ryan Vogt Ryan Vogt Department of Computer Science Department of Computer Science University of Calgary University of Calgary Canada Canada
Recommend
More recommend