exploit kits - tel aviv university · pdf file · 2016-06-03exploit kits a weapon...

34
©2016 Check Point Software Technologies Ltd. 1 ©2016 Check Point Software Technologies Ltd. Omri Herscovici Exploit Kits A Weapon Of Mass Infection

Upload: truongbao

Post on 10-Mar-2018

222 views

Category:

Documents


7 download

TRANSCRIPT

©2016 Check Point Software Technologies Ltd. 1 ©2016 Check Point Software Technologies Ltd.

Omri Herscovici

Exploit Kits A Weapon Of Mass Infection

©2016 Check Point Software Technologies Ltd. 2

Meet “Paunch”

©2016 Check Point Software Technologies Ltd. 3 [Protected] Non-confidential content

Exploit Kit

©2016 Check Point Software Technologies Ltd. 4

Motivation

THE INTERNET

1. Malware

2. Traffic

3. Infect traffic with malware

Attacker You

©2016 Check Point Software Technologies Ltd. 5

Malware

©2016 Check Point Software Technologies Ltd. 6

Traffic

• Emails

• Compromised Website

• Malvertisement

©2016 Check Point Software Technologies Ltd. 7

©2016 Check Point Software Technologies Ltd. 8

Exploit Kit-as-a-Service

• Automated Toolkits

• Scan Victim’s Web Browser

• Find Vulnerabilites

• Exploit

• Deliver Payload

©2016 Check Point Software Technologies Ltd. 9

Infection Process

Victim visits a hacked website

Redirect to Exploit Kit

Start process of infection

Compromised Website Victim

Exploit Kit

©2016 Check Point Software Technologies Ltd. 10

Exploit Kit-as-a-Service

©2016 Check Point Software Technologies Ltd. 11

Exploit Kit

• Automates the exploitation of client-side vulnerabilities.

• Who is the Client – The cyber criminal.

• Who is the Target – Users of the internet.

Exploit Kit

Framework Payload (Malware) Traffic (users)

Infected Machine

©2016 Check Point Software Technologies Ltd. 12

©2016 Check Point Software Technologies Ltd. 13

©2016 Check Point Software Technologies Ltd. 14

Exploit Kits In The Wild

©2016 Check Point Software Technologies Ltd. 15 [Protected] Non-confidential content

Video

©2016 Check Point Software Technologies Ltd. 17

What Makes a Good Exploit Kit?

• Prevalence of vulnerabilities exploited by the EK

• Exploit stability and updates

• Evasion from researchers

• Evasion from IPS and IDS, Anti-Virus products

• Client support (statistics and technical support)

• Eventually all these effect the infection rate of the EK and it’s life cycle

©2016 Check Point Software Technologies Ltd. 18

Infection Process – Quick Overview

Redirected to the exploit kit server

Landing Page Exploit

Asks for the flash file (exploit)

Malware

Asks for the malware (payload)

©2016 Check Point Software Technologies Ltd.

LANDING PAGE

01

©2016 Check Point Software Technologies Ltd. 20

Infection Process – Landing Page

redirected to exploit kit’s server

Serves the landing page

Evasion

• Serve once for given IP

• Check for ‘referrer’ header

©2016 Check Point Software Technologies Ltd. 21

De-Obfuscation Example

©2016 Check Point Software Technologies Ltd. 22

More Landing Page Protections

• Evasion from web

emulators

• Evasion from AV

products by

enumerating drivers

• Evasion from Chrome

• Network encryption scheme

©2016 Check Point Software Technologies Ltd.

EXPLOIT

02

©2016 Check Point Software Technologies Ltd. 24

Exploit

• “A piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug, glitch or vulnerability.” (Wikipedia)

• What types of exploits are included in exploit kits?

©2016 Check Point Software Technologies Ltd. 27

Exploits Distribution – 2013-2016

2, 14%

8, 57%

4, 29%

Exploits used by exploit kits per technology 2013

Flash

Java

IE

7, 78%

0, 0%

2, 22%

0, 0%

Exploits used by exploit kits per technology 2014

Flash

Java

IE

Silverlight

9, 82%

0, 0%

1, 9%

1, 9%

Exploits used by exploit kits per technology 2015

Flash

Java

IE

Silverlight

100%

Exploits used by exploit kits per technology 2016

Flash

©2016 Check Point Software Technologies Ltd. 28

• Public Exploits (Exploit-db.com / Metasploit)

• 0-Days

• Purchase

• Security Companies

Where do you get exploits?

©2016 Check Point Software Technologies Ltd. 29

Old Vulnerabilities

©2016 Check Point Software Technologies Ltd. 30

Exploit Obfuscation

Java Silverlight

• Researcher challenge is to identify the vulnerability

©2016 Check Point Software Technologies Ltd. 31

Exploit Delivery

• Landing page with obfuscated code

• Need to maximize hit rate – use multiple exploits

First Method - Infinity Second Method - Neutrino

Detection Phase - Constant 1. Landing page

2. Minified Jquery 1.9.1

3. Plugin Detector

4. Exploit request

Exploitation Phase – Changeable; depends

on the exploit decided

©2016 Check Point Software Technologies Ltd.

MALWARE

03

©2016 Check Point Software Technologies Ltd. 33

Malware

• Malware is encrypted

• Neutrino – simple xor for each download

• Infinity – one time (per campaign) RC4 encrypted

©2016 Check Point Software Technologies Ltd. 40

Client Support

• Regular exploits updates

• Support clients through email

• Change Log

• Statistic page

• FAQ page

©2016 Check Point Software Technologies Ltd. 41

Offensive

©2016 Check Point Software Technologies Ltd. 63

• 15 Active Control Panels

• 100,000$ Monthly Revenue

for the developer

• 5 Exploits

• 72.6% Ransomware

• 27.4% Banking Trojan

• 1,846,678 Attacked Machines

• 184,568 Success (9.95%)

Statistics

France 5%

Spain 11%

Germany 4%

Italy 8% US

5% Argentina 16%

Mexico 13%

Bulgaria 13%

Romania 18%

Poland 19% 0

50000

100000

150000

200000

250000

300000

Att

em

pts

©2016 Check Point Software Technologies Ltd. 64