inside a bbb malware scheme mapping and dissecting
play

Inside a BBB Malware Scheme: Mapping and Dissecting Attacker - PowerPoint PPT Presentation

Inside a BBB Malware Scheme: Mapping and Dissecting Attacker Infrastructure Prepared for FIRST 2008 Michael La Pilla VeriSign iDefense Malicious Code Operations Team June 26, 2008 Why Should Incident Responders Care? + US Commercial Accounts


  1. Inside a BBB Malware Scheme: Mapping and Dissecting Attacker Infrastructure Prepared for FIRST 2008 Michael La Pilla VeriSign iDefense Malicious Code Operations Team June 26, 2008

  2. Why Should Incident Responders Care? + US Commercial Accounts (the current target) NOT covered by Regulation E (read http://www.gpoaccess.gov/ecfr/ for more details in US) + Businesses of all size losing money, not just the banks 2

  3. Retail vs. Commercial Trojan Attacker Consumer Level Attacks Business/Corporate Level Attacks Victim PC Victim PC Corporate System Custom Data: Custom Data: Standardized Data: Business Account Credentials Bank Account Credentials Credit Card Numbers Certificates Certificates Debit Card Numbers VPN Keys Security Questions Employee Data Contact Lists 3

  4. What is a “BBB Attack” + Targeted e-mail using social engineering + Coined after use of Better Business Bureau name + “BBB Attack” is like saying “Storm Worm” + 60+ documented attacks Feb 2007 – June 2008 4 4

  5. BBB Attacks - FTC 5 5

  6. US Courts – April 14, 2008 6 6

  7. US Courts – April 14, 2008 7 7

  8. US Courts – April 14, 2008 8 8

  9. Not Just BBB 9 9

  10. Multiple Attackers, Different Infrastructures 10 10

  11. The “A” Approach Attachment Install Site 1 (Hardcoded Tier 2) Real Government Web Site [attackrelatedname].php Legitimate PDF gl.php log to txt file Drop Site 1 (Tier 3) install.exe b.php 11

  12. The “A” Approach (continued) Drop Site 1 (Tier 3) install.exe b.php kit.zip DelZip179.dll Tier 1 server Victim Machine (hardcoded) svchost.exe nirsoft tools 301 Redirect Tier 2 (Dynamic) Drop Site 2 gl.php p.php b.php 12

  13. The “B” Approach C&C Site http://[realstic-domain].tld/something.php Victim Machine [clever name].dll Drop Site http://[bulletproof host]/[some letters]/parse.php 13

  14. Demo #1 - BBBMapper.py 14

  15. Attack Mitigation Strategies + Variations on MFA + Transaction Verification + Server-side Detection + Credential Recovery / Victim IP Flagging + User Education + Transaction Fraud Detection + IDS/IPS Exploiting Lack of Attacker Innovation 15

  16. User Education…Really? + Never 100 percent, but many success stories + Explain the situation, potential variations, and give a picture + Water-cooler effect in action 16

  17. Snort Sigs For FIRST Member Organizations + Available via e-mail for any members, can be shared with entire list if posting signatures to list is permissible 17

  18. Demo #2 – The Real Payload 18

  19. Q&A Special Thanks Matt Richard + FIRST SC and Members + The kind folks from Conference & Publication Services, LLC + for dealing with all our last minute changes Michael La Pilla mlapilla@idefense.com VeriSign iDefense Malicious Code Operations Team

Recommend


More recommend