mapping criminal infrastructures from “patient zero” using ...€¦ · what search-and-pivot...

19
Mapping criminal infrastructures from “patient zero” using Whois David Piscitello Interisle Consulting Group

Upload: others

Post on 19-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Mapping criminal infrastructures from “patient zero” using ...€¦ · WHAT SEARCH-AND-PIVOT FROM “PATIENT ZERO” REVEALED •The suspect appears to have used GMO’s bulk

Mappingcriminalinfrastructuresfrom“patientzero”usingWhois

DavidPiscitelloInterisle ConsultingGroup

Page 2: Mapping criminal infrastructures from “patient zero” using ...€¦ · WHAT SEARCH-AND-PIVOT FROM “PATIENT ZERO” REVEALED •The suspect appears to have used GMO’s bulk

Massivedatabreaches– e.g.,Target,Sony–weretheresultofasuccessfulphishing

attack

Whoishelpsinvestigatorslearnwhat’sbelowthesurfaceofbreachesorothercyberattacks

Page 3: Mapping criminal infrastructures from “patient zero” using ...€¦ · WHAT SEARCH-AND-PIVOT FROM “PATIENT ZERO” REVEALED •The suspect appears to have used GMO’s bulk

PatientzeroThefirstpatientinan

outbreakwhoisnoticedbyhealthauthoritiestypicallytriggersa

responseorinvestigation

Page 4: Mapping criminal infrastructures from “patient zero” using ...€¦ · WHAT SEARCH-AND-PIVOT FROM “PATIENT ZERO” REVEALED •The suspect appears to have used GMO’s bulk

Frompatientzeroinvestigatorsgatherinformationtomapthe

progressionofadiseaseoutbreak

•Whoispatientzero?•Whatarehissymptoms?•Wherewashefound?•Wheredidhetravelfromandto?•Whendidhetravel?•Whatthreatdoeshisconditionpose?

Page 5: Mapping criminal infrastructures from “patient zero” using ...€¦ · WHAT SEARCH-AND-PIVOT FROM “PATIENT ZERO” REVEALED •The suspect appears to have used GMO’s bulk

Indexdomainsarethe“patientzeros”ofcyberinvestigations

•Whoisthedomainholder?§Notifythebreachvictim§ Pursuethecyberattacker

•Whereandwhenwerethedomainsregistered?•Whatotherdomainshavesimilarregistrationdata?

Attacksofteninvolveaconspiracyofdomains…useindexdomaintoidentifythatconspiracy

Page 6: Mapping criminal infrastructures from “patient zero” using ...€¦ · WHAT SEARCH-AND-PIVOT FROM “PATIENT ZERO” REVEALED •The suspect appears to have used GMO’s bulk

HowdofirstrespondersuseWhois?

CriminalAbuseofDomainNames:BulkRegistrationandContactInformationAccess

http://www.interisle.net/sub/CriminalDomainAbuse.pdf

Page 7: Mapping criminal infrastructures from “patient zero” using ...€¦ · WHAT SEARCH-AND-PIVOT FROM “PATIENT ZERO” REVEALED •The suspect appears to have used GMO’s bulk

CASESTUDYCRIMINALDOMAINS

IN.TOKYO

• Abuseactivityin.TOKYOfromDecember12,2018throughDecember25,2018

• 8,715.TOKYOcriminalabusedomainnames

RegistrarIANAID

CriminalAbuse

DomainsIdentified

Percent

GMOInternet,Inc.d/b/aOnamae.com

49 8,713 100.0

NameCheap,Inc.

1068 2 0.0

Nearlyallofthesewereregisteredusingasingleregistrar

Page 8: Mapping criminal infrastructures from “patient zero” using ...€¦ · WHAT SEARCH-AND-PIVOT FROM “PATIENT ZERO” REVEALED •The suspect appears to have used GMO’s bulk

WHYTHISREGISTRAR?- VERYCHEAPDOMAINREGISTRATIONS- CUSTOMERSCANREGISTERINVOLUME- CUSTOMERSCANGENERATERANDOMLOOKINGDOMAINS 8

1¥=€0.0083

Customerscanuploadafileofnames

Websitewillcreaterandomnames

Page 9: Mapping criminal infrastructures from “patient zero” using ...€¦ · WHAT SEARCH-AND-PIVOT FROM “PATIENT ZERO” REVEALED •The suspect appears to have used GMO’s bulk

CHEAPDOMAINNAMESCONTRIBUTETOACRIMINALMARKETPLACEINWHICHSMALLINVESTMENTSCANYIELD

EXTRAORDINARYRETURNS

9

1000s OFDOMAINNAMESCANBEACQUIREDFORPENNIESPER

DOMAINFROMREGISTRARSLIKEGMOINTERNET

MAILINGLISTSCANBE

PURCHASEDINTHEDARKWEBOR

ONLINE

RANSOMWARECANBEPURCHASEDASASERVICEFOR€35

PHISHING KITSCANBEDOWNLOADEDFORFREEFROM

SOCIALMEDIASITES

ONLINETUTORIALSAREAVAILABLEFROMYOUTUBE

ASSUMINGARANSOMWARE

EXTORTIONFEEOF$200-500USD,ARANSOMWARE

ATTACKISPROFITABLEWITHAHANDFULOF

VICTIMS

EVENASINGLERANSOMWAREORPHISHINGCAMPAIGNISALUCRATIVEENTERPRISE

Page 10: Mapping criminal infrastructures from “patient zero” using ...€¦ · WHAT SEARCH-AND-PIVOT FROM “PATIENT ZERO” REVEALED •The suspect appears to have used GMO’s bulk

IDENTIFYINGCRIMINALACTORS:SEARCHANDPIVOT

• .TOKYOsamplespansa“post-GDPR”timeperiod

• UsehistoricalandrecentWhoisrecords• Use{registrantname,registrantorganization,registrantemail} to

• SEARCH historicalWhoisdatabases• PIVOT tootherdatabasesorsocialmedia

• toidentifythecriminalactors

• OnlysomeWhoisrecordscontaincontactdata• Assumethatcriminalssubmitinaccurateorfraudulentlycomposeddata

10

Page 11: Mapping criminal infrastructures from “patient zero” using ...€¦ · WHAT SEARCH-AND-PIVOT FROM “PATIENT ZERO” REVEALED •The suspect appears to have used GMO’s bulk

WHATDOESSEARCH-AND-PIVOTREVEALS?• Theharmfulcontentorattackmessages• Wherecriminalactorshostinfrastructure,e.g.

• Malwareorransomwareexecutables

• Phishingorfinancialfraudwebpages

• Politicalinfluencecampaignmaterial

• Mailserversthatsendphishinglures

• DNSserversthatsupportDDoSattacks

• Otherdomainholdersthatmaybepartofacriminalenterprise

• OtherTop-leveldomainsinwhichthecriminalactorhasregisterednames

11

Page 12: Mapping criminal infrastructures from “patient zero” using ...€¦ · WHAT SEARCH-AND-PIVOT FROM “PATIENT ZERO” REVEALED •The suspect appears to have used GMO’s bulk

WHATSEARCH-AND-PIVOTFROM“PATIENTZERO”REVEALED

• ThesuspectappearstohaveusedGMO’sbulkregistrationtoolstogeneratethousandsofrandom-lookingdomainsnamesinmattersofminutes.• GMOoffered.TOKYOdomainsregistrationsatverylowcost.

• ThesuspectprovidedaregistrantaddressinJapan.• Thesuspectstargeted.TOKYObutnotexclusively..INFO,.CLUB,.ONLINE,.XYZ,.BIZ,.SPACE,and.WORKwerealsotargeted.

• ThesuspecthostedJapanesephishingormalwareatthreehostingproviders:• InterQ GMOInternet,Inc.,IDCFrontier,Inc.,SakuraInternet,Inc.

Page 13: Mapping criminal infrastructures from “patient zero” using ...€¦ · WHAT SEARCH-AND-PIVOT FROM “PATIENT ZERO” REVEALED •The suspect appears to have used GMO’s bulk

LET’SREVIEW:

JAPANESESPAMMERSTARGETEDJAPANESEUSERSUSINGAJAPANESEREGISTRARANDJAPANESEHOSTINGOPERATORS

13

Page 14: Mapping criminal infrastructures from “patient zero” using ...€¦ · WHAT SEARCH-AND-PIVOT FROM “PATIENT ZERO” REVEALED •The suspect appears to have used GMO’s bulk

COMPLETEWHOISRECORDSAREESSENTIAL

IFFIRSTRESPONDERSANDLAWENFORCEMENT

ARETOIDENTIFYVICTIMSANDCRIMINALACTORS

BUT…DUETOANOVERLYBROADINTERPRETATIONOF

THEEUGDPR

PUBLICWHOISISNOWDARK

Page 15: Mapping criminal infrastructures from “patient zero” using ...€¦ · WHAT SEARCH-AND-PIVOT FROM “PATIENT ZERO” REVEALED •The suspect appears to have used GMO’s bulk

EU’SGDPRISINTENDEDTOPROTECTPERSONALPRIVACY

WhoisimplementationprotectsInternetcriminalsordarkorganizations

Page 16: Mapping criminal infrastructures from “patient zero” using ...€¦ · WHAT SEARCH-AND-PIVOT FROM “PATIENT ZERO” REVEALED •The suspect appears to have used GMO’s bulk

ADVERSEEFFECTSOFICANNWHOISPOLICY

“Onesizefitsall”

RegistriesareredactingmoredatathanisrequiredbyGDPR

Solutionassumesalldataprotectionlawswillalignwith

GDPR

Legitimatedisclosureofnon-publicWhoisisstillnotdefined

Nopolicyfortimelyorpredictableaccess Noaccreditationframeworks

Blanketredaction

Inhibitssearchestocorrelatedomainsoractorstoattacks

NodiscriminationbetweenEUdatasubjectsandlegalpersons

16

Page 17: Mapping criminal infrastructures from “patient zero” using ...€¦ · WHAT SEARCH-AND-PIVOT FROM “PATIENT ZERO” REVEALED •The suspect appears to have used GMO’s bulk

EFFECTOFICANNPOLICYONACCESSTO

HISTORICALCOMPLETEWHOIS

RECORDS

Facts&Figures:WhoisPolicyChangesImpairBlocklistingDefenses

http://lnnk.in/@whoisimpedesblocklisting

Page 18: Mapping criminal infrastructures from “patient zero” using ...€¦ · WHAT SEARCH-AND-PIVOT FROM “PATIENT ZERO” REVEALED •The suspect appears to have used GMO’s bulk

• WHENPRIVACYREGULATIONBLOCKSCRIMINALINVESTIGATIONCITIZENSAREEXPOSEDTOHARMANDLOSS

• DATAPROTECTIONREGULATIONSMUSTACCOMMODATEFIRSTRESPONDERANDLAWENFORCEMENTACCESSTOCRITICALINFORMATION

18

PRIVACYPROTECTIONANDPUBLICSAFETY:ADELICATE

BALANCINGACT

Page 19: Mapping criminal infrastructures from “patient zero” using ...€¦ · WHAT SEARCH-AND-PIVOT FROM “PATIENT ZERO” REVEALED •The suspect appears to have used GMO’s bulk

CreativeCommons

• Slide2,3:LassaFeverinvestigation,MikeBlythhttps://www.flickr.com/photos/blyth/

• Slide3:EnzooticPlagueinvestigation,CDCGlobal,https://www.flickr.com/photos/cdcglobal/

• Slide4:WorldMap,Sharereproductions,https://www.flickr.com/photos/shaireproductions/

• Slide10:ComputerHackers,https://www.flickr.com/photos/121483302@N02/

• AllotherimagesfromPixabay Images