searching for evil

59
Searching for Evil Ross Anderson Richard Clayton Joint work with Tyler Moore, Steven Murdoch & Shishir Nagaraja &DPEULGJH WK -DQXDU\

Upload: others

Post on 18-Dec-2021

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Searching for Evil

Searching for EvilRoss Anderson

Richard Clayton

Joint work withTyler Moore, Steven Murdoch & Shishir Nagaraja

&DPEULGJH��WK�-DQXDU\�����

Page 2: Searching for Evil

Traffic analysis

• Traffic analysis was always critical in electronicwarfare – call-signs hid identities, but you’d recognisea radio operator from his ‘fist’

• Most of the information from police wiretaps is whocalled whom, not what was said

• We got interested circa 1995 (the crypto wars)• When people developed online anonymity systems,

traffic analysis became the big threat• Traffic analysis is about to become a really big issue

for online services such as Google!

Page 3: Searching for Evil

Security and economics• Electronic banking: UK banks were less liable for fraud, so

ended up suffering more internal fraud and more errors• Distributed denial of service: viruses now don’t attack the

infected machine so much as using it to attack others• Health records: hospitals, not patients, buy IT systems, so

they protect hospitals’ interests rather than patient privacy• Why is Microsoft software so insecure, despite market

dominance?• Problems like these led us to start studying security

economics at the turn of the century• Now there are 100+ active researchers

Page 4: Searching for Evil

Security economics (2)

• Microeconomics can help explain phenomena likeadverse selection and moral hazard (why do Volvodrivers have more accidents?)

• Application to search: Ben Edelman, “Adverseselection on online trust certifications”

• The top Google advert is about twice as likely asthe top free search result to be malicious

• Conclusion: ‘Don’t click on ads’• What can be done about this?

Page 5: Searching for Evil

Topology and vulnerability

• Many real-world networks can be modeled asscale-free – social contacts, disease spread, spreadof computer viruses

• Power-law distribution of vertex order, oftenarising from preferential attachment

• Highly-connected nodes greatly enhanceconnectivity

• … and also vulnerability – if you attack them, thenetwork is rapidly disconnected

Page 6: Searching for Evil

Topology and vulnerability (2)

• Example: Sierra Leone HIV/AIDS programtreated prostitutes first – only 2% of populationinfected (vs 40% in Botswana)

• Example: if you conquer a country, subvert or killthe bourgeoisie first

• What about the dynamic case, e.g. insurgency?Police keep arresting, insurgents keep recruiting

• This work: we apply evolutionary game theory tostudy this dynamic case

Page 7: Searching for Evil

Simulation methodology

• After Axelrod’s work on iterated prisoners’ dilemma• Scale-free network of 400 nodes• At each round, attacker kills 10 nodes – their

selection is his strategy• Defender recruits 10 more, then reconfigures

network – how he does this is his strategy• Iterate search for defense, attack strategy

Page 8: Searching for Evil

Naïve defenses don’t work!• Basic vertex-

order attack –network deadafter 2 rounds

• Randomreplenishment – 3rounds

• Scale-freereplenishment – 4rounds

Page 9: Searching for Evil

Evolving defense strategies• Black – scale free

replenishment• Green – replace

high-order nodeswith rings

• Cyan - replacehigh-order nodeswith cliques

• Cliques workvery well againstthe vertex-orderattack

Page 10: Searching for Evil

Evolving attack strategies

• Centrality attacksare the best counterwe found to clique-based defenses

• Rings: G, Bcliques: C, M

• Vertex-orderattack: B, G, C

• Attack usingcentrality: R, B, M

Page 11: Searching for Evil

Part II

Searching for ………..

phishingother criminalssharp practiceand “MFA”

Page 12: Searching for Evil

Types of phishing website

• Misleading domain namehttp://www.banckname.com/

http://www.bankname.xtrasecuresite.com/

• Insecure end userhttp://www.example.com/~user/www.bankname.com/

• Insecure machinehttp://www.example.com/bankname/login/

http://49320.0401/bankname/login/

• Free web hostinghttp://www.bank.com.freespacesitename.com/

Page 13: Searching for Evil

• Compromised machines run a proxy• Domains do not infringe trademarks

– name servers usually done in similar style• Distinctive URL style

http://session9999.bank.com.lof80.info/signon/

• Some usage of “fast-flux” from Feb’07 onwards– viz: resolving to 5 (or 10…) IP addresses at once

Rock-phish is different!

Page 14: Searching for Evil

111196 57Fast-flux rock-phishdomains

Medianlifetime

Meanlifetime

# sites(8 weeks)

Phishing websitelifetimes (hours)

20 621695Non-rock

181394287Fast-flux rock-phishIP addresses

26172 125Rock-phishIP addresses

55 95 421Rock-phishdomains

Page 15: Searching for Evil

Free web-hosting take-down data

18.132.8 155doramail

6.923.8 174yahoo.com

16.833.81253pochta.ru

38.253.1 254by.ru

18.852.4 159alice.it

medianmean# sitesSite lifetime(in hours)

BUT: almost all sites (except on Yahoo!) wereeBay (65 hour average; this is 1/3 of their total)

Page 16: Searching for Evil
Page 17: Searching for Evil
Page 18: Searching for Evil
Page 19: Searching for Evil

Mule recruitment

• Proportion of spam devoted to recruitmentshows that this is a significant bottleneck

• Aegis, Lux Capital, Sydney Car Centre, etc, etc– mixture of real firms and invented ones– some “fast-flux” hosting involved

• Only the vigilantes are taking these down– impersonated are clueless and/or unmotivated

• Long-lived sites usually indexed by Google

Page 20: Searching for Evil

Medianlifetime

Meanlifetime# domainsMule website

lifetimes (hours)

1058 75110Lux Capital

-ongoing24+Waller Truck

13518217Sydney Car Centre

311 292 11Aegis Capital Group

Mule recruitment site takedown is slow!

Page 21: Searching for Evil
Page 22: Searching for Evil
Page 23: Searching for Evil
Page 24: Searching for Evil

Fake escrow sites

• Large number (a dozen or so) of sets of fakeescrow sites used for auction scams

• Typically getting half a dozen victims aweek, but profit in each case is the price ofa second-hand car or motorcycle!

• Tracked by “AA419” and taken down byamateur “vigilantes”

Page 25: Searching for Evil
Page 26: Searching for Evil
Page 27: Searching for Evil
Page 28: Searching for Evil
Page 29: Searching for Evil
Page 30: Searching for Evil
Page 31: Searching for Evil
Page 32: Searching for Evil
Page 33: Searching for Evil
Page 34: Searching for Evil
Page 35: Searching for Evil
Page 36: Searching for Evil

Pills, Penises and Photography

• Canadian Pharmacy &c– hosted on same fast-flux pools as some of the

phishing sites. Links remain unclear• Google picking up a proportion of these

sites, but by no means all• Some fake shopping sites, which fool some

reputation systems, though Google searchesshow complaints on the first page.

Page 37: Searching for Evil
Page 38: Searching for Evil
Page 39: Searching for Evil

Fake banks

• These are not “phishing”– no-one takes them down, apart from the vigilantes

• Usual pattern of repeated phrases on each newsite, so googling finds more examples– sometimes old links left in (hand-edited!)

• Sometimes part of a “419” scheme– inconvenient to show existence of dictator’s

$millions in a real bank account!• Or sometimes part of a lottery scam

Page 40: Searching for Evil
Page 41: Searching for Evil

Post-modern Ponzi schemes

• High Yield Investment Program (HYIP)– propose returns of x% per DAY

• Basically Ponzi (pyramid) schemes that payinitial investors from newly joined mugs

• Often splash out for HTTPS certificates !• Now some are up-front about Ponzi nature• Reputation sites document their status

Page 42: Searching for Evil
Page 43: Searching for Evil
Page 44: Searching for Evil
Page 45: Searching for Evil
Page 46: Searching for Evil
Page 47: Searching for Evil
Page 48: Searching for Evil
Page 49: Searching for Evil

Fake Institution

• Sends spam hoping for links to website• Site has new graphics and layout, but stolen

content (lightly) edited for new context• Point of site seems to be the job adverts• Ads are by Google!• A handful of similar sites known to exist…

– owner appears to be “Nichifor Valentin” fromTulcea in Romania (cyberdomino.com)

Page 50: Searching for Evil
Page 51: Searching for Evil
Page 52: Searching for Evil
Page 53: Searching for Evil
Page 54: Searching for Evil
Page 55: Searching for Evil
Page 56: Searching for Evil

Privila Inc

• Purchasing abandoned domain names– creating content to match the domain– avoiding cross-linking etc so “pukka”

• Using interns to create content– college kids who want a “journalism” CV– much is at the High School term paper level /

• Now have over 100 authors, over 250 sitesand a LOT of Google Ads – which are inmany cases the main value of the site /

Page 57: Searching for Evil

yesyesnonononoAdverts

nonovigilantesvigilantesvigilantesbanks &expertsRemoval

noyesa bityesyesyesSelf-similar

nononononoyesTryingto hide?

dozensfewhandfuldozensdozensthousandsNumber permonth

PrivilaInc

FakeInstitute

FakeBank

PillsPenis &c

FakeEscrowPhishing

 

Page 58: Searching for Evil

Our research questions

• How do we fix the incentives to preventphishing from being so effective ?

• What algorithms can detect reputation traders, andother covert communities?

• Can community reputation sites make a long-termcontribution?

• Is advertising distorting the web?• What other cool things are there at the boundary

of technology and economics?

Page 59: Searching for Evil

Searching for Evil

http://www.lightbluetouchpaper.org