36
Dark Web Impact on Hidden Services in the Tor- based Criminal Ecosystem Dr. Marco Balduzzi @embyte Sr. Researcher at Trend Micro Forward-Looking Threat Research

Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr

Embed Size (px)

Citation preview

Page 1: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr

Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem

Dr. Marco Balduzzi @embyte

Sr. Researcher at Trend Micro

Forward-Looking Threat Research

Page 2: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr
Page 3: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr

A perfect platform for eCrime

Page 4: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr
Page 5: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr
Page 6: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr
Page 7: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr
Page 8: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr

Courtesy Ionut Ilascu, Softpedia

Page 9: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr

What do attackers do?

Page 10: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr

What do attackers do? After…

Page 11: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr

How to Study such Attacks?(In the Dark Web)

Page 12: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr

We simulate a cyber-criminal installation in Tor

Page 13: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr
Page 14: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr

Honeypot

I. Black market

II. Hosting/service provider in Tor

III. Underground forum

IV. Misconfigured server (FTP/SSH/IRC)

Technology

I. OsCommerce

II. WordPress + Shells

III. Custom

IV. Debian Linux

Page 15: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr

Honeypot #3

Page 16: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr

Registration Only Forum

Page 17: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr

Exposes a Local File Inclusion vuln

Page 18: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr

Role of Tor2web proxies

Page 19: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr
Page 20: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr

Data Collection and Advertisement

• 7 months experiment

• Month 1: Different advertisement strategies to honeypot #1

• Month 2: Advertised ALL honeypots using ALL strategies

• Month 3-7: Restricted access by blocking incoming Tor2web traffic

Page 21: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr

Daily POST Requests

Page 22: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr

Attacks and Files Uploads

• Phase 2 onwards

• Average of 1.4 malicious uploads per day

Page 23: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr

[Canali et al. NDSS 2013]

Page 24: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr

Traditional Web Attacks

Page 25: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr

Password-protected Shells

Page 26: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr

Obfuscation

Page 27: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr
Page 28: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr

Abuse of Tor Anonymity for Attacks

Page 29: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr
Page 30: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr

• Specifically targeting underground services in Tor like marketplaces, forums

• Our honeypot!

Case of Tor-centric defacement

Page 31: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr

• Cyber-criminal gangs compromising opponents

• Self-promoting their “business”

Page 32: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr

Tor’s private key theft

• Used to compute the hidden service descriptor

Instruction Points

Public Key

Private Key

Instruction Points

Public Key

XYZ.onion

Signing

KeypairGeneration

Page 33: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr

Tor’s private key theft

• Over 400 attempts

• MiTM, hijack, decryption

Page 34: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr

Discussion

• Tor2web proxies play important role!

– Make the dark web not as private as someone would think

• Hidden services are equally visible and exposed as surface services

– Receive attacks within days

Page 35: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr

Discussion

• Dark Web is not safe heaven

– Attackers are actively conducting attacks against hidden services

– Both automated and manuals

• Cyber-criminals are looking for services operated by opponent groups

– Voluntarily attack them

Page 36: Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr

• This work represents a first result in the direction of understanding the attacks landscape in the Dark Web.

Dr. Marco Balduzzi @embyte

Sr. Researcher at Trend Micro

Forward-Looking Threat Research

http://www.madlab.it/papers/sac17_darknets.pdf