Internet Vulnerabilities & Criminal Activity
Download
Report
Transcript Internet Vulnerabilities & Criminal Activity
Internet Vulnerabilities &
Criminal Activity
Internet Forensics
12.1
April 26, 2010
Internet Forensics & Computer Forensics
Computer Forensics
Computer off / power it off
Hard drive is imaged
Examination made of hard drive copy
No live capture of memory
Internet Forensics
Done while computer is on
May or may not examine memory
Network activity is captured and analyzed
Malware Analysis
Goal - provide insight into attackers
Malware has two purposes
Steal information from victim computers
Commander victim computer’s resources for
attacker’s use
Malware secondary features
Propagation
Locate & terminate security programs &
competing malware
Hide itself from system administrators
Malware Programs
Most derived from a small, stable base
of existing code
Small changes to obfuscation scheme
Command & control credentials change
No need to change what works
Custom programmed malware unlikely
to be identified by security software
Extracting Information
Author vs Attacker
More interested in the attacker
Information that can lead to attackers
identity
How malware interacts with the Internet
What type of information is being targeted
Commonalities with previously analyzed
software
Malware Network Interactions
Receiving commands
Command & control site
Exfiltrate data
Drop site
Unique identifier (advertising fraud)
Identifying Advertising Revenue
Advertising fraud
Pay-per-view, pay-per-click, pay-per-install
To receive revenue, web site operator must
be identified
Tracking number
May be found in malware
May be found in the URL for the advertisement
Extracted tracking number starting point to
identifying recipient
Identifying Drop Sites
Malware that steals data will upload data to a
specific site for later retrieval
Passwords, keystrokes, network traffic, documents
Data may be uploaded to drop site using:
HTTP
FTP
E-mail
Identifying Drop Sites cont.
Drop site location
May be hard coded into malware
May be found by query to web site or IRC channel
Possible actions once drop site is located
Analyze traffic to site to help find attacker
Analyze data at drop site & inform victims and
financial institutions
Shut down drop site
Will only work with a hard coded site
Forensic Examination
Computer is off
Image the hard drive on site
Transport computer to lab and image the hard drive
Examine image in a lab environment
Computer is on
Observe & document the following before shutting
machine down
Running processes
Open ports
Memory
Use of encryption
Examination of Malware
Malware files should be:
Located, recovered, neutralized to prevent
accidental execution, analyzed
Antivirus testing
Can identify known malware
Information can be obtained from antivirus web
site
Cannot identify network contact sites
Anti-virus sites not detailed or accurate enough for
court
Examination of Malware cont.
Study strings in the binary
Locates embedded text
Text may be packed to further obfuscate
Indicates malware has specific targets
Runtime Analysis
Run malware in an isolated environment
Use simulation of the Internet & targeted sites
Use network tools to observe malware’s behavior
Look for :
Method used to transfer data
Address where data is sent
Examination of Malware cont.
Reverse Engineering
Converts file back to source code
Need some understanding of programming
Identify sites used for Command & Control
(C&C)
Central point of communication between malware
& attacker
C&C sites usually illegally hosted on compromised
servers
Look for host name / IP number of C&C site
Attack will normally connect to C&C site using a
proxy or other compromised host
Examination of Malware cont.
Identify C&C site continued
Malware identifies C&C site using IP address or
DNS resource record
IP address more vulnerable as IP address can be shut
down
DNS resource record can just be resolved to new IP
number
Nature of DNS record can provide leads
Contact & payment details
Other DNS records with same contact information
Other IP addresses associated with DNS record
Attackers choice of type of host or network can
provide information on attacker’s activities
Extracting Incidental Artifacts
Can find other information stored in malware
with investigative value
Use “strings” command
Messages or comments from the author or
attacker
Metadata about the development
environment
May be placed in malware to intentionally
mislead investigators
May lead to author not attacker
More to Learn from Malware
Two different malwares using the same C&C
site may belong to the same attacker
Why not go after the author?
Prosecution requires:
Knowledge
Intent
Damages & monetary loss
Techniques used by malware authors point
out weaknesses in network security
Attackers
Will balance cost, risk & potential profit
Sophistication is expensive
Will only employ sophisticated techniques when
there is sufficient profit
Will use what ever techniques work
Understand social behavior
Security professionals have limited time /
resources, work fixed hours
Infrastructure used for attack will eventually be
shut down
Schedule attacks to maximize time till attack is
noticed
Attackers cont.
Understand the culture of victims being
targeted
E-mail, application icons, programs named to be
as enticing as possible
Exploit jurisdictions & geography
Know the law enforcement difficulties working
internationally
Use several proxies in different counties to route
connections
Know which countries are weak on cyber
enforcement
Attackers cont.
Monetary thresholds & other crimes
Know that most countries have monetary limits on
crimes pursued
Internet provides “protection” for attackers
Rules for juveniles different - attackers exploit this
Study & evade network defenses
Understand how firewalls & antivirus software
works
Have learned how to circumvent security
measures
Outbound connections to C&C and drop sites
Use ubiquitous HTTP protocol
Supporting Other Investigations
Malware code analysis may assist in other
computer forensic investigations
Combating the “Malware on the Machine”
defense
Defendants claim illegal materials on computer
due to malware
Examine malware on the machine
Examine network traffic records
Could the malware have committed the crime
Is functionality present in the malware to commit
the attack