cybercrime and attacks in the dark side of the web · significant wordcloud page text tokenization...

39
Cybercrime and Attacks in the Dark Side of the Web Dr. Marco Balduzzi * Senior Researcher at Trend Micro http://www.madlab.it @embyte * With the cooperation of Mayra Rosario and Vincenzo Ciancaglini

Upload: others

Post on 25-Jul-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

Cybercrime and Attacks in the Dark Side of the Web

Dr. Marco Balduzzi*

Senior Researcher at Trend Microhttp://www.madlab.it @embyte

*With the cooperation of Mayra Rosario and Vincenzo Ciancaglini

Page 2: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity
Page 3: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

The Dark Ecosystem

Dark Nets• TOR• I2P• Freenet

Custom DNS• Namecoin

• Emercoin

Rogue TLDs• Cesidian Root• OpenNIC• NewNations• …

Page 4: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

A perfect platform for Cybercrime

Page 5: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

Our Investigative System: DEMOtimestamp:[2015\-01\-01 TO 2015\-12\-31] AND title:marketplace

Page 6: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

Our Gateway to the Dark Internet

Privoxy + TOR

anonymizerSquid transparent proxy

Polipo + TOR 64

instancesI2P Freenet Custom DNS resolver (DNSMASQ)

Namecoin DNS

rogueTLD DNS

Cesidian root

Opennic NameSpace …

Page 7: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

Data Exploration

Headless browser

HAR LogPage DOM

Screen

Shot

Title

Text

Metadata

Raw HTML

Links

Email

BitcoinWallets

Page 8: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

Headless Browser

Scrapinghub's Splash• QTWebkit browser, Dockerized, LUA scriptable• Full HTTP traces

Crawler based on Python's Scrapy + multiprocess + Splash access• Headers rewrite• Shared queue support• Har log -> HTTP redirection chain

Extract links, emails, bitcoin wallets

Page 9: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

Data Analysis

Embedded links classification (WRS)• Surface Web links• Classification and

categorization

Page translation• Language detection•Non-English to English

Significant wordcloud• Semantic clustering• Custom algorithm

Page 10: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

Significant Wordcloud

Page text

Tokenization

Filtering

Semantic distance matrix

Hierarchical clustering

Cluster label and popularity

Word cloud

Scrap text from HTML, clean up, strip spaces, etc

Create list of (word, frequency) pairs

Keep only substantives

How “far” are words from one another?

Group similar words

Label clusters, sum frequencies

Draw using summed frequencies

lxml

NLT

K.w

ord

net

Wordcloud(pillow)

Page 11: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

The Dark Portal

Page 12: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

Examples

Page 13: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

Guns

Page 14: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

Identities and Passports

Page 15: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

Credit Cards

Page 16: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

Accounts, e.g. Israeli Paypal

Page 17: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

Cashout services

Page 18: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

Bulletproof Hosting Providers

Page 19: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

Impact on organizations

Dark Web traffic is difficult to be detected by traditional systems (IDS)

Resilient and stealth malware

Persistence and monitoring (APT)

Page 20: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

TorrentLocker, i.e. variant of CryptoLocker

Payment page hosted in TOR◎wzaxcyqroduouk5n.onion/axdf84v.php/user_code=qz1n2i&user_pass=9019

◎wzaxcyqroduouk5n.onion/o2xd3x.php/user_code=8llak0&user_pass=6775

Cashout via BITCOINS

Ransomware

Page 21: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

Keylogger

Page 22: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

Organized Attacks

Page 23: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

We simulated a cybercriminal

installation in the Dark Web

Page 24: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

Honeypot

I. Black Market

II. Hosting Provider

III. Underground Forum

IV. Misconfigured Server (FTP/SSH/IRC)

Technology

I. Wordpress + Shells

II. OsCommerce

III. Custom Web App

IV. Custom OS (Linux)

Page 25: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity
Page 26: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

Registration-Only Forum

Page 27: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

Exposes a Local File Inclusion

Page 28: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

A 7-months experiment

Month 1: Different advertisement strategies to honeypot #1

# D

aily

PO

ST R

equ

ests

Average of 1.4 malicious uploads per day

Page 29: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

Manual VS Automated Attacks

Pre-installed web shells attracted the most of “visitors”

CMS #1-2 reached via Google Dorks (on Tor2Web), CMS #3 no because custom

CMS #2 reached via TOR’s search engine’s query “Index of /files/images/”(http://hss3uro2hsxfogfq.onion)

# Attacks

# Days with Attacks

Page 30: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

Traditional Web Attacks

Page 31: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

Password-protected Shells

Page 32: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

Smart use of Obfuscation

Page 33: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

Abuse of Tor for Anonymized Attacks

Page 34: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

(Anonymized) Phishing Campaign

Page 35: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

Rival Gangs

• Cyber-criminal gangs compromising opponents

• Self-promoting their “business”

Page 36: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

(TOR Keys)

Used to compute the hidden service descriptor

Instruction

Points

Public

Key

Private Key

Instruction

Points

Public

Key

XYZ.onion

Signing

Keypair

Generation

Page 37: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

HS’ Private Key theft

400+ attacks

MiTM, hijack and decryption

Page 38: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

Dark Web as “corner case” of the Internet… NO!

Active and Dynamic Underground Market

Motivated and Knowledgeable Attackers

Manual and Targeted Attacks

Modern and Sophisticated Threats

Lessons Learned

Page 39: Cybercrime and Attacks in the Dark Side of the Web · Significant Wordcloud Page text Tokenization Filtering Semantic distance matrix Hierarchical clustering Cluster label and popularity

Thank You!

Dr. Marco Balduzzi*

Senior Researcher at Trend Microhttp://www.madlab.it @embyte

*With the cooperation of Mayra Rosario and Vincenzo Ciancaglini