93
Text Barbarians At The Gate(way) Examination of actors, tools and defenses

Text Examination of actors, tools and defenses

Embed Size (px)

Citation preview

Page 1: Text Examination of actors, tools and defenses

Text

Barbarians At The Gate(way)Examination of actors, tools and defenses

Page 2: Text Examination of actors, tools and defenses

#whoamiDave Lewis @gattaca [email protected]

Page 3: Text Examination of actors, tools and defenses
Page 4: Text Examination of actors, tools and defenses
Page 5: Text Examination of actors, tools and defenses
Page 6: Text Examination of actors, tools and defenses
Page 7: Text Examination of actors, tools and defenses

W E F O U N D H I M !M Y S T E R Y S O LV E D !

Page 8: Text Examination of actors, tools and defenses
Page 9: Text Examination of actors, tools and defenses
Page 10: Text Examination of actors, tools and defenses
Page 11: Text Examination of actors, tools and defenses
Page 12: Text Examination of actors, tools and defenses
Page 13: Text Examination of actors, tools and defenses

It left me wanting…

Page 14: Text Examination of actors, tools and defenses

Game PlanActors

Attacks

Tools

Trends

Data

Now what?

Page 15: Text Examination of actors, tools and defenses

Actors: For Hire

Page 16: Text Examination of actors, tools and defenses

Current(ish) prices on the Russian underground market:Hacking corporate mailbox: $500

Winlocker ransomware: $10-20

Intelligent exploit bundle: $10-$3,000

Hiring a DDoS attack: $30-$70/day, $1,200/month

Botnet: $200 for 2,000 bots

DDoS botnet: $700

Page 17: Text Examination of actors, tools and defenses
Page 18: Text Examination of actors, tools and defenses

Actors: Bored Kids

Page 19: Text Examination of actors, tools and defenses

B O R E D T E E N SA N D

Page 20: Text Examination of actors, tools and defenses
Page 21: Text Examination of actors, tools and defenses

H A C K T I V I S T ST H E

Page 22: Text Examination of actors, tools and defenses

Actors: Nation States

Page 23: Text Examination of actors, tools and defenses

S TA N D A R D V I L L A I N ST H E R E A R E

Page 24: Text Examination of actors, tools and defenses

A R C H V I L L A I N SA N D T H E R E A R E

Page 25: Text Examination of actors, tools and defenses

Actors: al-Qassam Cyber Fighters, QCF

QCF is an Iranian group that has been focused on attacking US and Canadian banks.

They use the Brobot botnet that attacks from compromised servers. Using server hardware and connection they can usually overwhelm scrubbers with traffic.

Page 26: Text Examination of actors, tools and defenses

Attacks

Page 27: Text Examination of actors, tools and defenses

Attack Vectors Over HTTP

Page 28: Text Examination of actors, tools and defenses

Attack Vectors Over HTTPS

Page 29: Text Examination of actors, tools and defenses

Types of Attacks

SYN Floods

UDP Floods

ICMP Floods

NTP Amplification

HTTP Flood

Page 30: Text Examination of actors, tools and defenses

Attacks: Volumetric

Page 31: Text Examination of actors, tools and defenses

Your website can be overwhelmed…

Page 32: Text Examination of actors, tools and defenses
Page 33: Text Examination of actors, tools and defenses
Page 34: Text Examination of actors, tools and defenses
Page 35: Text Examination of actors, tools and defenses

SSDP

Page 36: Text Examination of actors, tools and defenses
Page 37: Text Examination of actors, tools and defenses

Attacks: Application Layer

Page 38: Text Examination of actors, tools and defenses

Application Layer DDoS

Page 39: Text Examination of actors, tools and defenses
Page 40: Text Examination of actors, tools and defenses
Page 41: Text Examination of actors, tools and defenses
Page 42: Text Examination of actors, tools and defenses

Attacks: Extortion

Page 43: Text Examination of actors, tools and defenses

DD4BC

Began by targeting sites with ransom demands

Failure to pay lead to increased $$$ to stop the attack

Earlier attacks focused on businesses that would avoid reporting the attacks to law enforcement.

Once research published they relocated their campaigns to APAC

Page 44: Text Examination of actors, tools and defenses
Page 45: Text Examination of actors, tools and defenses

More recently…

DD4BC continues to inform victims that they will launch a DDoS attack of 400-500 Gbps against them.

To date, DD4BC attack campaigns mitigated by Akamai have not exceeded 50 Gbps in size.

That’s up from the high of 15-20 Gbps observed

Page 46: Text Examination of actors, tools and defenses
Page 47: Text Examination of actors, tools and defenses
Page 48: Text Examination of actors, tools and defenses

Attacks: Amplification

Page 49: Text Examination of actors, tools and defenses
Page 50: Text Examination of actors, tools and defenses

Tools

Page 51: Text Examination of actors, tools and defenses

Tools: Havij

Page 52: Text Examination of actors, tools and defenses

Tools: Donut

Page 53: Text Examination of actors, tools and defenses

Tools: Donut (con’t)

GET / HTTP/1.1

Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/msword, application/vnd.ms-powerpoint, application/vnd.ms-excel, */*

Accept-Language: en-us

Accept-Encoding: gzip, deflate

User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.0.3705)

Host: www.foo.bar

Connection: Close

Page 54: Text Examination of actors, tools and defenses

Tools: HULK

Page 55: Text Examination of actors, tools and defenses

Tools: HULK (con’t)GET /?NJB=VURZQ HTTP/1.1

Accept-Encoding: identity

Host: www.foo.bar

Keep-Alive: 112

User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.3) Gecko/20090913 Firefox/3.5.3

Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7

Connection: close

Referer: http://www.foo.bar

Cache-Control: no-cache

Page 56: Text Examination of actors, tools and defenses

Tools: LOIC

Page 57: Text Examination of actors, tools and defenses

Tools: HOIC

Page 58: Text Examination of actors, tools and defenses

Tools: Brobot

Brobot is a PHP trojan that allows an attacker to take control of a victim's compromised hosted Web server and use it to launch DDOS attacks.

Page 59: Text Examination of actors, tools and defenses

Tools: WGET

Page 60: Text Examination of actors, tools and defenses

Trends

Page 61: Text Examination of actors, tools and defenses

Media Grandstanding

Page 62: Text Examination of actors, tools and defenses

Commoditization of DDoS

Page 63: Text Examination of actors, tools and defenses
Page 64: Text Examination of actors, tools and defenses
Page 65: Text Examination of actors, tools and defenses

What’s your fancy?

Page 66: Text Examination of actors, tools and defenses

What’s a Booter?

Page 67: Text Examination of actors, tools and defenses

OK, What’s a Stresser?

Page 68: Text Examination of actors, tools and defenses

Stressers or BootersxBOOT

Flash Stresser

Hyper Stresser

Grim Booter

Anonymous Stresser

Titanium Stresser / Lizards

Big Bang Booter…and so on.

Page 69: Text Examination of actors, tools and defenses
Page 70: Text Examination of actors, tools and defenses

Some other highlights

DDoS agents targeting Joomla and other SaaS apps

A heap-based buffer overflow vulnerability in Linux  systems

Attackers using new MS SQL reflection techniques

Data breaches fueling login attacks 

Page 71: Text Examination of actors, tools and defenses

OK so, attribution?

Page 72: Text Examination of actors, tools and defenses
Page 73: Text Examination of actors, tools and defenses

Text

Page 74: Text Examination of actors, tools and defenses

Text

Page 75: Text Examination of actors, tools and defenses

MEGA MEGA MEGA

These large attacks all contained SYN floods

12:34:04.270528 IP X.X.X.X.54202 > Y.Y.Y.Y.80: Flags [S], seq 1801649395:1801650365, win 64755, length 970

....E.....@...}.6.....6....Pkb......P...c...................................................................<snip>..................................................

Page 76: Text Examination of actors, tools and defenses

DDoS: Function of Time

Page 77: Text Examination of actors, tools and defenses

Other ObservationsSQLi

Local/Remote File Inclusion

Popping shells

PHP Injection

Malicious File upload

JAVA …best remote access platform ever!

Page 78: Text Examination of actors, tools and defenses

SQL Injection…still

Page 79: Text Examination of actors, tools and defenses
Page 80: Text Examination of actors, tools and defenses

Why this is a problem.

Page 81: Text Examination of actors, tools and defenses

Passwords

Page 82: Text Examination of actors, tools and defenses
Page 83: Text Examination of actors, tools and defenses

File Inclusions

Page 84: Text Examination of actors, tools and defenses

Malicious Uploads

KCFinder file upload vulnerability

Open Flash Chart file upload vulnerability (CVE-2009-4140)

appRain CMF (uploadify.php) unrestricted file upload exploit (CVE-2012-1153)

FCKeditor file upload vulnerability (CVE-2008-6178)

Page 85: Text Examination of actors, tools and defenses

Undead Army

Page 86: Text Examination of actors, tools and defenses

So, what to do?I might know a vendor that could help :-)

SQL INJECTION IS A SOLVABLE PROBLEM

Harden systems

Work with your ISP on mitigation strategies

Use ACL lists to deal with known bad IPs

IP Rate limiting

PATCH PATCH PATCH

Page 87: Text Examination of actors, tools and defenses
Page 88: Text Examination of actors, tools and defenses

STATEOFTHEINTERNET.COM

Page 89: Text Examination of actors, tools and defenses
Page 90: Text Examination of actors, tools and defenses

A K A M A I I S H I R I N G !A N D W I T H T H A T …

Page 91: Text Examination of actors, tools and defenses

Thanks

Page 92: Text Examination of actors, tools and defenses

고맙습니다 Q U E S T I O N S ?T H A N K S F O R L I S T E N I N G

Page 93: Text Examination of actors, tools and defenses

Questions? Thanks

Dave Lewis @gattaca

[email protected]