avalanche - double flux 02 - eurojust avalanche... · the avalanche platform uses a complex system...

2
1 st layer Cluster infrastructure Proxy layer A v a l a n c h e a d m i n i s t r a t o r The criminals controlling the cluster can now give instrucons to and/or extract data from your computer 2 nd layer Double fast flux 3 rd layer Backend infrastructure Will normally point to an IP where bots go for registraon, to receive instrucons, or to acvate aacks. The proxies redirect the traffic and are used to disguise the originang source of these instrucons. hellosd4f.com, hellog7hr.com, helloxyz1.com, .... A Domain Generaon Algorithm (DGA) generates thousands of new domain names every day deliver money muling pages or deploys mulple malware redirects to the criminal cluster infrastructure and splits per botnet Network of compromised computers redirect to a proxy mulple individual computers are used to host the domain for a short period of me A d m i n A d m i n A d m i n A d m i n A d m i n Gozy malware A d m i n URLzone malware A d m i n Rovnix malware A d m i n TeslaCrypt malware Malware Money muling Administraon infrastructure Name Server is used to resolve the domain name Fast Flux: the name server record changes every five minutes (300s) - TTL (me to live) Operation Avalanche IP Address Record provides the IP address of the domain Fast Flux: the IP addresses change every five minutes (300s) - TTL (me to live) Potenally millions of infected devices connected to the internet request to connect to a list of addresses Computers connected to the Internet use name servers to resolve human readable domain names into the IP addresses used to route the IP network traffic (e.g. www.europol.europa.eu has the following IP: 158.169.131.22). Usually one domain is delegated to one IP address for a long period of me. The technique known as Fast Flux involves automacally and frequently changing the IP address records associated with a domain name. Single Fast Flux changes the IP address used to host address records associated with a domain (such as a website name). Double Fast Flux changes both the IP address records and the name server that is used to resolve the domain too. The Avalanche plaorm uses a complex system of Double Fast Flux networks and layers of proxy servers to rapidly change the apparent locaon of IP address records from a domain and the name servers that resolve it, with the aim of making it more difficult for Law Enforcement to trace and take down hosted criminal infrastructures. request to connect Copyright © 2016 Europol

Upload: phungnguyet

Post on 09-Feb-2019

226 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Avalanche - double flux 02 - Eurojust Avalanche... · The Avalanche platform uses a complex system of Double Fast Flux networks and layers of proxy servers to rapidly change the apparent

1st la

yer

Cluster infrastructure

Prox

y la

yer

Avala

nche administrator

The criminals controlling the cluster can now give instructions to and/or extract data from your computer

2nd la

yer

Doub

le fa

st fl

ux3rd

laye

rBa

cken

d in

fras

truc

ture

Will normally point to an IP where bots go for registration, to receive instructions, or to activate attacks.

The proxies redirect the traffic and are used to disguise the originating source of these instructions.

hellosd4f.com, hellog7hr.com, helloxyz1.com, ....A Domain Generation Algorithm (DGA) generates thousands of new domain names every day

deliv

er m

oney

mul

ing

page

sor

dep

loys

mul

tiple

mal

war

e

redirects to the criminal cluster infrastructure and splits per botnet

Network of compromised computers

redirect to a proxy

multiple individual computers are used to host the domain for a short period of time

Ad

min

Ad

min

Ad

min

Ad

min

Ad

min

Gozy malware

Ad

min

URLzone malware

Ad

min

Rovnix malware

Ad

min

TeslaCrypt malware

Malware Money muling

Administration infrastructure

Name Serveris used to resolve the domain name

Fast Flux: the name server record changes every five minutes (300s) - TTL (time to live)

Operation Avalanche

IP Address Recordprovides the IP address of the domain

Fast Flux: the IP addresses change every five minutes (300s) - TTL (time to live)

Potentially millions of infected devices connected to

the internet request to connect to a list of addresses

Computers connected to the Internet use name servers to resolve human readable domain names into the IP addresses used to route the IP network traffic (e.g. www.europol.europa.eu has the following IP: 158.169.131.22). Usually one domain is delegated to one IP address for a long period of time.

The technique known as Fast Flux involves automatically and frequently changing the IP address records associated with a domain name. Single Fast Flux changes the IP address used to host address records associated with a domain (such as a website name). Double Fast Flux changes both the IP address records and the name server that is used to resolve the domain too.

The Avalanche platform uses a complex system of Double Fast Flux networks and layers of proxy servers to rapidly change the apparent location of IP address records from a domain and the name servers that resolve it, with the aim of making it more difficult for Law Enforcement to trace and take down hosted criminal infrastructures.

request to connect

Copy

right

© 2

016

Euro

pol

Page 2: Avalanche - double flux 02 - Eurojust Avalanche... · The Avalanche platform uses a complex system of Double Fast Flux networks and layers of proxy servers to rapidly change the apparent

Law enforcement Name Server

Infected devices

Law enforcement server

hello05112016gr5jjk5.comhello05112016rt4ki880.comhello05112016334fed7.com....

List of DNS addresses

The IP providers inform the infected machine owners that are infected.

Top-level domain (TLD) .com

Domain Generation Algorithm (DGA): Generating thousands of domain names every dayrequest

to connect

Based on an official request the TLD refers to a law enforce-ment nameserver replacing the criminals’ nameserver

queries Top-level domain

redirects to Sinkhole IP

“Sinkhole”

What happens when the police seize or block the domains used by the malware?

What happens next

The infected computers continue trying to communicate with the criminal servers through the domains.

hardcoded or created daily by a DGA

responds back to the infected computer

The computer emergency response teams (CERTs) provide the list of infected machines to the IP providers.

IP providers

Copy

right

© 2

016

Euro

pol