27

cloud - UW Computer Sciences User Pagespages.cs.wisc.edu/~ace/media/lectures/cloud.pdf · cloud computing & e-crime ... [Your Botnet is My Botnet: Analysis of a Botnet Takeover, 2009

Embed Size (px)

Citation preview

Page 1: cloud - UW Computer Sciences User Pagespages.cs.wisc.edu/~ace/media/lectures/cloud.pdf · cloud computing & e-crime ... [Your Botnet is My Botnet: Analysis of a Botnet Takeover, 2009
Page 2: cloud - UW Computer Sciences User Pagespages.cs.wisc.edu/~ace/media/lectures/cloud.pdf · cloud computing & e-crime ... [Your Botnet is My Botnet: Analysis of a Botnet Takeover, 2009

cs642

cloud computing & e-crime

adam everspaugh [email protected]

computer security

Page 3: cloud - UW Computer Sciences User Pagespages.cs.wisc.edu/~ace/media/lectures/cloud.pdf · cloud computing & e-crime ... [Your Botnet is My Botnet: Analysis of a Botnet Takeover, 2009

announcementsHW4 due in one week

This week: cloud computing and malware & ecrime

Next week: Bitcoin and Android security

Friday, May 6: Exam review session

Sunday, May 8: Final exam

Page 4: cloud - UW Computer Sciences User Pagespages.cs.wisc.edu/~ace/media/lectures/cloud.pdf · cloud computing & e-crime ... [Your Botnet is My Botnet: Analysis of a Botnet Takeover, 2009

todayCloud computing and placement vulnerabilities

Malware, botnets, and crime

Page 5: cloud - UW Computer Sciences User Pagespages.cs.wisc.edu/~ace/media/lectures/cloud.pdf · cloud computing & e-crime ... [Your Botnet is My Botnet: Analysis of a Botnet Takeover, 2009

CloudServices

VMsInfrastructure-as-a-service

Storage

WebCache/TLSTermination

Page 6: cloud - UW Computer Sciences User Pagespages.cs.wisc.edu/~ace/media/lectures/cloud.pdf · cloud computing & e-crime ... [Your Botnet is My Botnet: Analysis of a Botnet Takeover, 2009

Asimplifiedmodelofpubliccloudcomputing

Owned/operatedbycloudprovider

UserA

UserB

virtualmachines(VMs)

virtualmachines(VMs)

UsersrunVirtualMachines(VMs)oncloudprovider’sinfrastructure

VirtualMachineManager

VirtualMachineManager(VMM)managesphysicalserverresourcesforVMs

TotheVMshouldlooklikededicatedserver

Multitenancy(userssharephysicalresources)

Page 7: cloud - UW Computer Sciences User Pagespages.cs.wisc.edu/~ace/media/lectures/cloud.pdf · cloud computing & e-crime ... [Your Botnet is My Botnet: Analysis of a Botnet Takeover, 2009

Anewthreatmodel:

UserA

Badguy

AttackeridentifiesoneormorevictimsVMsincloud

2)Launchattacksusingphysicalproximity

1)AchieveadvantageousplacementvialaunchingofVMinstances

ExploitVMMvulnerability Side-channelattackDoS

Page 8: cloud - UW Computer Sciences User Pagespages.cs.wisc.edu/~ace/media/lectures/cloud.pdf · cloud computing & e-crime ... [Your Botnet is My Botnet: Analysis of a Botnet Takeover, 2009

Checkingforco-residence

Anatomyofattack

checkthatVMisonsameserverastarget-network-basedco-residencechecks-efficacyconfirmedbycovertchannels

Placementvulnerability:attackerscanknowinglyachieveco-residencewithtargetAchievingco-residence

bruteforcingplacementinstancefloodingaftertargetlaunches

Location-basedattacksside-channels,DoS,escape-from-VM

Page 9: cloud - UW Computer Sciences User Pagespages.cs.wisc.edu/~ace/media/lectures/cloud.pdf · cloud computing & e-crime ... [Your Botnet is My Botnet: Analysis of a Botnet Takeover, 2009

Cross-VMsidechannelsusingCPUcachecontention

AttackerVM

VictimVM

Mainmemory

CPUdatacache

1)Readinalargearray(fillCPUcachewithattackerdata)

2)Busyloop(allowvictimtorun)

3)Measuretimetoreadlargearray(theloadmeasurement)

Page 10: cloud - UW Computer Sciences User Pagespages.cs.wisc.edu/~ace/media/lectures/cloud.pdf · cloud computing & e-crime ... [Your Botnet is My Botnet: Analysis of a Botnet Takeover, 2009

Cache-basedcross-VMloadmeasurementonEC2

RepeatedHTTPgetrequests

Performscacheloadmeasurements

RunningApacheserver

Instancesco-resident Instancesco-resident InstancesNOTco-resident

3pairsofinstances,2pairsco-residentand1not100cacheloadmeasurementsduringHTTPgets(1024bytepage)andwithnoHTTPgets

[Hey,You,GetOffofmyCloud,2009,Ristenpart,etal.]

Page 11: cloud - UW Computer Sciences User Pagespages.cs.wisc.edu/~ace/media/lectures/cloud.pdf · cloud computing & e-crime ... [Your Botnet is My Botnet: Analysis of a Botnet Takeover, 2009

Checkingforco-residence

Anatomyofattack

checkthatVMisonsameserverastarget-network-basedco-residencechecks-efficacyconfirmedbycovertchannels

Placementvulnerability:attackerscanknowinglyachieveco-residencewithtargetAchievingco-residence

bruteforcingplacementinstancefloodingaftertargetlaunches

Location-basedattacksside-channels,DoS,escape-from-VM

Page 12: cloud - UW Computer Sciences User Pagespages.cs.wisc.edu/~ace/media/lectures/cloud.pdf · cloud computing & e-crime ... [Your Botnet is My Botnet: Analysis of a Botnet Takeover, 2009

Howhardshouldco-locationbe?

- Randomplacementpolicy- N=50kmachines- v=#victimVMs,a=#attackerVMs- Probabilityofcollision:Pc=1-(1-v/N)a

UserA

Badguy

Page 13: cloud - UW Computer Sciences User Pagespages.cs.wisc.edu/~ace/media/lectures/cloud.pdf · cloud computing & e-crime ... [Your Botnet is My Botnet: Analysis of a Botnet Takeover, 2009

Co-locationStrategies

• Basicstrategy

• TriggerlaunchofvictimVMs• DriveHTTPtrafficandtrigger

autoscalingtolaunchmorevictimVMs

• TimelaunchofattackerVMsinco-ordination

• Howeffectiveisthis?

• Howmuchdoesthiscost?

• Howlongdoesthistake?

Page 14: cloud - UW Computer Sciences User Pagespages.cs.wisc.edu/~ace/media/lectures/cloud.pdf · cloud computing & e-crime ... [Your Botnet is My Botnet: Analysis of a Botnet Takeover, 2009

[APlacementVulnerabilityStudyinPublicClouds,2015,VVaradarajan]

Page 15: cloud - UW Computer Sciences User Pagespages.cs.wisc.edu/~ace/media/lectures/cloud.pdf · cloud computing & e-crime ... [Your Botnet is My Botnet: Analysis of a Botnet Takeover, 2009

[APlacementVulnerabilityStudyinPublicClouds,2015,VVaradarajan]

• Cheapeststrategy:$0.14(GCE)

• Mostexpensivestrategy:$5.30(Azure)

Page 16: cloud - UW Computer Sciences User Pagespages.cs.wisc.edu/~ace/media/lectures/cloud.pdf · cloud computing & e-crime ... [Your Botnet is My Botnet: Analysis of a Botnet Takeover, 2009

ecrime

Page 17: cloud - UW Computer Sciences User Pagespages.cs.wisc.edu/~ace/media/lectures/cloud.pdf · cloud computing & e-crime ... [Your Botnet is My Botnet: Analysis of a Botnet Takeover, 2009

Botnets

• Botnets:– CommandandControl(C&C)

– Zombiehosts(bots)

• C&Ctype:– centralized,peer-to-peer

• Infectionvector:– spam,scanning,worm(self-propagatingvirus)

• Usage:?

Page 18: cloud - UW Computer Sciences User Pagespages.cs.wisc.edu/~ace/media/lectures/cloud.pdf · cloud computing & e-crime ... [Your Botnet is My Botnet: Analysis of a Botnet Takeover, 2009

Howtomakemoneyoffabotnet?

• Rental– “Paymemoney,andI’llletyouusemybotnet…noquestionsasked”

• DDoSextortion– “PaymeorItakeyourlegitimatebusinessoffweb”

• Bulktrafficselling– “Paymetodirectbotstowebsitestoboostvisitcounts”

• Clickfraud,SEO– “Simulateclicksonadvertisedlinkstogeneraterevenue”– Cloaking,linkfarms,etc.

• Theftofmonetizableinformation(eg.,financialaccounts)• Ransomware– “I’veencryptedyourharddrive,nowpaymemoneytounencryptit”

• Advertiseproducts

think-pair-share

Page 19: cloud - UW Computer Sciences User Pagespages.cs.wisc.edu/~ace/media/lectures/cloud.pdf · cloud computing & e-crime ... [Your Botnet is My Botnet: Analysis of a Botnet Takeover, 2009

TorpigBotnet

• 2005-2009?

• 50k-180kbots

• 2008:"Mostadvancedpieceofcrimewareeverbuilt"

• Usedomainfluxtocontactcommandandcontrol(C&C)servers

• HijackedbyUCSantaBarbararesearchersandstudiedfor10days

[YourBotnetisMyBotnet:AnalysisofaBotnetTakeover,2009,Stone-Grossetal.]

Page 20: cloud - UW Computer Sciences User Pagespages.cs.wisc.edu/~ace/media/lectures/cloud.pdf · cloud computing & e-crime ... [Your Botnet is My Botnet: Analysis of a Botnet Takeover, 2009

HowtojoinaTorpigbotnet

1: Clickondodgylinktovulnerablewebsite

2-4:DownloadMebrootmalware

5: MebrootdownloadsTorpigDLL(yourabot!)

6: UploadallyousensitivedatatoTorpigC&C

7: Profit!(notyours)

Page 21: cloud - UW Computer Sciences User Pagespages.cs.wisc.edu/~ace/media/lectures/cloud.pdf · cloud computing & e-crime ... [Your Botnet is My Botnet: Analysis of a Botnet Takeover, 2009

DomainFlux• EachbotgeneratescandidatedomainnamesforC&Cservers

• Probeeachone,usethefirstonethattalkstheC&Cprotocol

• Researchersranthealgorithmforwardseveralweeks

• Discoveredun-registereddomainsandregisteredthem

• SetuptheirownC&Cserver

• Yourbotnetismybotnet

Page 22: cloud - UW Computer Sciences User Pagespages.cs.wisc.edu/~ace/media/lectures/cloud.pdf · cloud computing & e-crime ... [Your Botnet is My Botnet: Analysis of a Botnet Takeover, 2009

Stealingabotnet

• Researchersboughttwodomainsandhosting

• PutupC&Cservertocaptureallreportedinformationbybots

• ControlledTorpigbotnetfor10days

• Captured70GBsofstoleninformation

• Usedthesedatatostudyhowbigthebotnetwasandwhatitdid(crime)

Page 23: cloud - UW Computer Sciences User Pagespages.cs.wisc.edu/~ace/media/lectures/cloud.pdf · cloud computing & e-crime ... [Your Botnet is My Botnet: Analysis of a Botnet Takeover, 2009

Estimatingbotnetsize

TorpigbotsreporttoC&CserversusingauniquebotnetIDUsefulforcorrectlyestimatingsize

Page 24: cloud - UW Computer Sciences User Pagespages.cs.wisc.edu/~ace/media/lectures/cloud.pdf · cloud computing & e-crime ... [Your Botnet is My Botnet: Analysis of a Botnet Takeover, 2009
Page 25: cloud - UW Computer Sciences User Pagespages.cs.wisc.edu/~ace/media/lectures/cloud.pdf · cloud computing & e-crime ... [Your Botnet is My Botnet: Analysis of a Botnet Takeover, 2009

StealingFinancialAccounts

In10days,stolenaccountsfrom:- Paypal(1770)- PosteItaliane(765)- CapitalOne(314)- E*Trade(304)- Chase(217)

Page 26: cloud - UW Computer Sciences User Pagespages.cs.wisc.edu/~ace/media/lectures/cloud.pdf · cloud computing & e-crime ... [Your Botnet is My Botnet: Analysis of a Botnet Takeover, 2009

Ethics

● PRINCIPLE1.● Thesinkholedbotnetshouldbeoperatedsothatanyharmand/ordamagetovictimsandtargetsofattackswouldbeminimized.

● PRINCIPLE2.● Thesinkholedbotnetshouldcollectenoughinformationtoenablenotificationandremediationofaffectedparties.

Twoprinciplestoprotectvictims

Page 27: cloud - UW Computer Sciences User Pagespages.cs.wisc.edu/~ace/media/lectures/cloud.pdf · cloud computing & e-crime ... [Your Botnet is My Botnet: Analysis of a Botnet Takeover, 2009

recapCloud computing / Placement vulnerabilities / Co-residency detection via side-channels / Co-location strategies

Malware + botnets / Botnet uses / Architecture / Domain flux, C&C hijacking