22
© 2015 Carnegie Mellon University Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Distribution Statement A: Approved for Public Release; Distribution is Unlimited Using Domain Name Registrant Information To Identify Malicious Domains Mark Langston

Using Domain Name Registrant Information to Identify Malicious … · 2016-01-21 · Using Domain Name Registrant Information to Identify Malicious Domains Author: Mark Langston Subject:

  • Upload
    others

  • View
    8

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Using Domain Name Registrant Information to Identify Malicious … · 2016-01-21 · Using Domain Name Registrant Information to Identify Malicious Domains Author: Mark Langston Subject:

© 2015 Carnegie Mellon University

Software Engineering InstituteCarnegie Mellon UniversityPittsburgh, PA 15213

Distribution Statement A: Approved for Public Release; Distribution is Unlimited

Using Domain Name Registrant Information To Identify Malicious DomainsMark Langston

Page 2: Using Domain Name Registrant Information to Identify Malicious … · 2016-01-21 · Using Domain Name Registrant Information to Identify Malicious Domains Author: Mark Langston Subject:

© 2015 Carnegie Mellon UniversityDistribution Statement A: Approved for Public Release; Distribution is Unlimited

Do Bad Actors Use Fake Addresses?

Page 3: Using Domain Name Registrant Information to Identify Malicious … · 2016-01-21 · Using Domain Name Registrant Information to Identify Malicious Domains Author: Mark Langston Subject:

3Using Domain Name Registrant InformationNovember 24, 2015© 2015 Carnegie Mellon UniversityDistribution Statement A: Approved for Public Release; Distribution is Unlimited

Copyright 2015 Carnegie Mellon University

This material is based upon work funded and supported by the Department of Defense under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center.

NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN “AS-IS” BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT.

[Distribution Statement A] This material has been approved for public release and unlimited distribution. Please see Copyright notice for non-US Government use and distribution.

This material may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other use. Requests for permission should be directed to the Software Engineering Institute at [email protected].

CERT® is a registered mark of Carnegie Mellon University.

DM-0003089

Page 4: Using Domain Name Registrant Information to Identify Malicious … · 2016-01-21 · Using Domain Name Registrant Information to Identify Malicious Domains Author: Mark Langston Subject:

4Using Domain Name Registrant InformationNovember 24, 2015© 2015 Carnegie Mellon UniversityDistribution Statement A: Approved for Public Release; Distribution is Unlimited

“Secrecy is a way of organizing institutions and human activity to render them invisible.”

“Secrecy is self-contradictory; because what is made secret exists in the world, it is visible.”

Trevor Paglen, artist (“Six Landscapes”. Chaos Communication Congress, 2013)

Secrecy, and Finding What’s Hidden

Page 5: Using Domain Name Registrant Information to Identify Malicious … · 2016-01-21 · Using Domain Name Registrant Information to Identify Malicious Domains Author: Mark Langston Subject:

5Using Domain Name Registrant InformationNovember 24, 2015© 2015 Carnegie Mellon UniversityDistribution Statement A: Approved for Public Release; Distribution is Unlimited

• Not all in one place.

• Whois API, LLC• Not all ccTLDs• Not all TLDs (e.g.,

.edu, .mil)• 162 million records• 2015, Q2• 238GB

The Problem With WHOIS Data

Page 6: Using Domain Name Registrant Information to Identify Malicious … · 2016-01-21 · Using Domain Name Registrant Information to Identify Malicious Domains Author: Mark Langston Subject:

6Using Domain Name Registrant InformationNovember 24, 2015© 2015 Carnegie Mellon UniversityDistribution Statement A: Approved for Public Release; Distribution is Unlimited

• Phishing domain blacklist

• June 2015• Hosts-file.net

(Malwarebytes)• 734,428 unique

fully-qualified domain names

• 103,658 unique domains

What Constitutes a Bad Actor?

Page 7: Using Domain Name Registrant Information to Identify Malicious … · 2016-01-21 · Using Domain Name Registrant Information to Identify Malicious Domains Author: Mark Langston Subject:

7Using Domain Name Registrant InformationNovember 24, 2015© 2015 Carnegie Mellon UniversityDistribution Statement A: Approved for Public Release; Distribution is Unlimited

The Address That Started It All

Gazetny Lane Bldg. 1 17 9 125009 Moscu Rusia125009 RUSSIAN [email protected] Petr Abandonato

Page 8: Using Domain Name Registrant Information to Identify Malicious … · 2016-01-21 · Using Domain Name Registrant Information to Identify Malicious Domains Author: Mark Langston Subject:

8Using Domain Name Registrant InformationNovember 24, 2015© 2015 Carnegie Mellon UniversityDistribution Statement A: Approved for Public Release; Distribution is Unlimited

The Address That Stoked The Flames

Ilyinka Street 23, Moscow 103132, RUSSIAN [email protected], Spy Eye

Page 9: Using Domain Name Registrant Information to Identify Malicious … · 2016-01-21 · Using Domain Name Registrant Information to Identify Malicious Domains Author: Mark Langston Subject:

9Using Domain Name Registrant InformationNovember 24, 2015© 2015 Carnegie Mellon UniversityDistribution Statement A: Approved for Public Release; Distribution is Unlimited

• Hadoop, Spark (PySpark)• Only 58% of phishing

domains found in WHOIS data

• Half of the remaining are in TLDs for which there was no data

• Three most frequent: .tk(4,612), .ru (4,384), .co.uk(2,716)

• Leaving 20,309 that just weren’t found.

Diving in!

Page 10: Using Domain Name Registrant Information to Identify Malicious … · 2016-01-21 · Using Domain Name Registrant Information to Identify Malicious Domains Author: Mark Langston Subject:

10Using Domain Name Registrant InformationNovember 24, 2015© 2015 Carnegie Mellon UniversityDistribution Statement A: Approved for Public Release; Distribution is Unlimited

• GoDaddy the most frequent registrar (23.9%)

• eNom (13.4%)• Network Solutions (5.3%)• Publicdomainregistry.com,

name.com, Tucows, Soluciones Corporativas IP (12.1%)

Diving in! Registrars!

Page 11: Using Domain Name Registrant Information to Identify Malicious … · 2016-01-21 · Using Domain Name Registrant Information to Identify Malicious Domains Author: Mark Langston Subject:

11Using Domain Name Registrant InformationNovember 24, 2015© 2015 Carnegie Mellon UniversityDistribution Statement A: Approved for Public Release; Distribution is Unlimited

Then…

…things started to go wrong.

Page 12: Using Domain Name Registrant Information to Identify Malicious … · 2016-01-21 · Using Domain Name Registrant Information to Identify Malicious Domains Author: Mark Langston Subject:

12Using Domain Name Registrant InformationNovember 24, 2015© 2015 Carnegie Mellon UniversityDistribution Statement A: Approved for Public Release; Distribution is Unlimited

• 17,551 domains used some form of privacy protection.

• Another 2,960 had no registrant information.

• Rendering opaque 34% of the domains for which we have data.

Privacy Services

Page 13: Using Domain Name Registrant Information to Identify Malicious … · 2016-01-21 · Using Domain Name Registrant Information to Identify Malicious Domains Author: Mark Langston Subject:

13Using Domain Name Registrant InformationNovember 24, 2015© 2015 Carnegie Mellon UniversityDistribution Statement A: Approved for Public Release; Distribution is Unlimited

• 625 domains (mostly GoDaddy) were listed as “Repossessed”.

• Another 217 (all eNom) were in a “reactivation period”.

Repossession

Page 14: Using Domain Name Registrant Information to Identify Malicious … · 2016-01-21 · Using Domain Name Registrant Information to Identify Malicious Domains Author: Mark Langston Subject:

14Using Domain Name Registrant InformationNovember 24, 2015© 2015 Carnegie Mellon UniversityDistribution Statement A: Approved for Public Release; Distribution is Unlimited

• 395 domains registered to gbclaw.net.

• Another 963 registered to MarkMonitor

• 52 registered to Stephen Gaffigan

• 34 to CitizenHawk

Repossession (cont.)

Page 15: Using Domain Name Registrant Information to Identify Malicious … · 2016-01-21 · Using Domain Name Registrant Information to Identify Malicious Domains Author: Mark Langston Subject:

15Using Domain Name Registrant InformationNovember 24, 2015© 2015 Carnegie Mellon UniversityDistribution Statement A: Approved for Public Release; Distribution is Unlimited

• 181 registered to Frank Schilling/Name Administration IncBVI.

• 408 to New Ventures Services Corp.

Resellers

Page 16: Using Domain Name Registrant Information to Identify Malicious … · 2016-01-21 · Using Domain Name Registrant Information to Identify Malicious Domains Author: Mark Langston Subject:

16Using Domain Name Registrant InformationNovember 24, 2015© 2015 Carnegie Mellon UniversityDistribution Statement A: Approved for Public Release; Distribution is Unlimited

• 204 only info is BIZCN.COM, INC

• Linked to illegal internet pharmacies (Huffington Post, 11/7/14; Wall Street Journal, October 27, 2014)

• Found in breach of ICANN accreditation agreement May 8, 2014

Rogue Registrars

Page 17: Using Domain Name Registrant Information to Identify Malicious … · 2016-01-21 · Using Domain Name Registrant Information to Identify Malicious Domains Author: Mark Langston Subject:

17Using Domain Name Registrant InformationNovember 24, 2015© 2015 Carnegie Mellon UniversityDistribution Statement A: Approved for Public Release; Distribution is Unlimited

• 415 registered to Nadeem Qadir(e.g., travelasity.com)

• 325 BladimirBoyiko (e.g., wwwpbs.org)

• Both use 2006.nip.net email address

Rypo…er, Typosquatters

Page 18: Using Domain Name Registrant Information to Identify Malicious … · 2016-01-21 · Using Domain Name Registrant Information to Identify Malicious Domains Author: Mark Langston Subject:

18Using Domain Name Registrant InformationNovember 24, 2015© 2015 Carnegie Mellon UniversityDistribution Statement A: Approved for Public Release; Distribution is Unlimited

• 220 registered to GDS Licensing

• Associated with illegal import of fake cancer drug Avastin in 2013

• Several domains checked with legitscript.comlisted as “rogue” pharmacies.

Other Suspicious Activity

Page 19: Using Domain Name Registrant Information to Identify Malicious … · 2016-01-21 · Using Domain Name Registrant Information to Identify Malicious Domains Author: Mark Langston Subject:

19Using Domain Name Registrant InformationNovember 24, 2015© 2015 Carnegie Mellon UniversityDistribution Statement A: Approved for Public Release; Distribution is Unlimited

• Harjanti Chandra• 1,321 unique

domains• All in the .info gTLD• Appear related to

popular mobile app downloads

• Websites hosted in Hanoi, Vietnam

• Registrant in Indonesia

More Suspicious Activity

Page 20: Using Domain Name Registrant Information to Identify Malicious … · 2016-01-21 · Using Domain Name Registrant Information to Identify Malicious Domains Author: Mark Langston Subject:

20Using Domain Name Registrant InformationNovember 24, 2015© 2015 Carnegie Mellon UniversityDistribution Statement A: Approved for Public Release; Distribution is Unlimited

Conclusions

Page 21: Using Domain Name Registrant Information to Identify Malicious … · 2016-01-21 · Using Domain Name Registrant Information to Identify Malicious Domains Author: Mark Langston Subject:

21Using Domain Name Registrant InformationNovember 24, 2015© 2015 Carnegie Mellon UniversityDistribution Statement A: Approved for Public Release; Distribution is Unlimited

• Registrant information mining is difficult – no standards for field entries, even within an entity

• WHOIS Privacy services present a barrier to analysis• There are entities whose names may be worthy of a priori filtering

– but identifying those entities is time-consuming, often subjective, and largely manual

• The legal aspect of domain name ownership does not always keep pace with usage – malicious activity may extend beyond ownership changes, or begin before legal proceedings can start

• Fake address “watering holes” do not seem to be prevalent, or even common.

Conclusions

Page 22: Using Domain Name Registrant Information to Identify Malicious … · 2016-01-21 · Using Domain Name Registrant Information to Identify Malicious Domains Author: Mark Langston Subject:

22Using Domain Name Registrant InformationNovember 24, 2015© 2015 Carnegie Mellon UniversityDistribution Statement A: Approved for Public Release; Distribution is Unlimited

Presenter / Point of Contact Mark LangstonMember of Technical StaffTelephone: +1 412.268.1942Email: [email protected]

Contact Information