Inside a BBB Malware Scheme: Mapping and Dissecting Attacker Infrastructure Prepared for FIRST 2008 Michael La Pilla VeriSign iDefense Malicious Code Operations Team June 26, 2008
Why Should Incident Responders Care? + US Commercial Accounts (the current target) NOT covered by Regulation E (read http://www.gpoaccess.gov/ecfr/ for more details in US) + Businesses of all size losing money, not just the banks 2
Retail vs. Commercial Trojan Attacker Consumer Level Attacks Business/Corporate Level Attacks Victim PC Victim PC Corporate System Custom Data: Custom Data: Standardized Data: Business Account Credentials Bank Account Credentials Credit Card Numbers Certificates Certificates Debit Card Numbers VPN Keys Security Questions Employee Data Contact Lists 3
What is a “BBB Attack” + Targeted e-mail using social engineering + Coined after use of Better Business Bureau name + “BBB Attack” is like saying “Storm Worm” + 60+ documented attacks Feb 2007 – June 2008 4 4
BBB Attacks - FTC 5 5
US Courts – April 14, 2008 6 6
US Courts – April 14, 2008 7 7
US Courts – April 14, 2008 8 8
Not Just BBB 9 9
Multiple Attackers, Different Infrastructures 10 10
The “A” Approach Attachment Install Site 1 (Hardcoded Tier 2) Real Government Web Site [attackrelatedname].php Legitimate PDF gl.php log to txt file Drop Site 1 (Tier 3) install.exe b.php 11
The “A” Approach (continued) Drop Site 1 (Tier 3) install.exe b.php kit.zip DelZip179.dll Tier 1 server Victim Machine (hardcoded) svchost.exe nirsoft tools 301 Redirect Tier 2 (Dynamic) Drop Site 2 gl.php p.php b.php 12
The “B” Approach C&C Site http://[realstic-domain].tld/something.php Victim Machine [clever name].dll Drop Site http://[bulletproof host]/[some letters]/parse.php 13
Demo #1 - BBBMapper.py 14
Attack Mitigation Strategies + Variations on MFA + Transaction Verification + Server-side Detection + Credential Recovery / Victim IP Flagging + User Education + Transaction Fraud Detection + IDS/IPS Exploiting Lack of Attacker Innovation 15
User Education…Really? + Never 100 percent, but many success stories + Explain the situation, potential variations, and give a picture + Water-cooler effect in action 16
Snort Sigs For FIRST Member Organizations + Available via e-mail for any members, can be shared with entire list if posting signatures to list is permissible 17
Demo #2 – The Real Payload 18
Q&A Special Thanks Matt Richard + FIRST SC and Members + The kind folks from Conference & Publication Services, LLC + for dealing with all our last minute changes Michael La Pilla mlapilla@idefense.com VeriSign iDefense Malicious Code Operations Team
Recommend
More recommend