ransomware detection
play

Ransomware detection with Bro Mike Stokkel 13 Sept 2016 - PowerPoint PPT Presentation

Ransomware detection with Bro Mike Stokkel 13 Sept 2016 Introduction Who am I? Mike Stokkel Security Analyst @ Fox-IT Internship at Fox-IT Bachelor July 2016 Introduction Agenda What am I going to talk about?


  1. Ransomware detection with Bro Mike Stokkel 13 Sept 2016

  2. Introduction • Who am I? – Mike Stokkel – Security Analyst @ Fox-IT – Internship at Fox-IT – Bachelor July 2016 Introduction

  3. Agenda • What am I going to talk about? – Fox-IT – Ransomware – Bro Policy – Results – Demo

  4. Fox-IT

  5. Company • Located: Delft, The Netherlands • IT security – Managed Security Services – Auditing – Cryptographic solutions Fox-IT

  6. Security Operation Center • Snort-based detection • Bro Fox-IT

  7. Ransomware

  8. Explanation • Malware – Encryption – Payment – Decryption • Rising concern Ransomware

  9. Encryption • Process – Master key (public and private key) – Generating a key for the victim – Encrypting the victim’s key Ransomware

  10. Impact • Personal Computer – Local files • Company – Network Share • To pay or not to pay? Ransomware

  11. Spreading Methods • Exploit Kits – Browser vulnerabilities • E-mail – Malicious document – Macros Ransomware

  12. Exploit Kit • Version check • IP check • Download ransomware payload • Run payload Ransomware

  13. Malicious document • Macro • VBS script • Download & execute payload Ransomware

  14. Remote desktop programs • TeamViewer hack • RDP brute force Ransomware

  15. Detection Methods • IDS – Snort rules • Problem Ransomware

  16. Bro Policy

  17. Approach • Ransomware behavior – SMB • Possible solutions – File extension listing – Threshold SMB commands – Command-and-Control communication Bro Policy

  18. Entropy • Randomness of data • 0 – 8 bits per character Bro policy

  19. What about …. • Compressed files • Images • PDF • Mime/Media type Bro policy

  20. Functions • SMB parser – Events • File over new connection • Chunk event • SumStat – Threshold • Notice.log Bro Policy

  21. File over new connection • Check for SMB traffic • Check for certain filenames • Check for Mime type • Check for SMB action • Check if SMB action equals Write • Add File analyzer Bro Policy

  22. Chunk event • Check if the offset equals 0 • Calculate entropy of data collected from SMB write command • Use SumStat to add +1 for the threshold • Write to log file • Write a Notice.log Bro Policy

  23. Results

  24. Live Testing • Two new kinds of Ransomware Bro Policy

  25. Live Testing • Two new kinds of Ransomware – Google Chrome & Mozilla Firefox • Encrypted cache • Encryption tools – TrueCrypt – VeraCrypt • Documents – Printing – Creating Bro Policy

  26. Demo

  27. Samples • Locky/Zepto • Cryptowall • CTBLocker • Jigsaw (and all families) • Mobef • Shade • Maktub • Cerber/Alpha • Teslacrypt • Rokku • Crysis • Cerber • Bandarchor Demo

  28. Thank you for having me!

Recommend


More recommend