spam/botnets and malware

23
SPAM/BOTNETS and Malware Neil Warner, CIO, GoDaddy.com Moderator: Dan Kaplan, deputy editor, SC Magazine

Upload: neva

Post on 24-Feb-2016

38 views

Category:

Documents


0 download

DESCRIPTION

SPAM/BOTNETS and Malware. Neil Warner, CIO, GoDaddy.com Moderator: Dan Kaplan, deputy editor, SC Magazine. We Put Up Walls. Modern Day Fort. War Against SPAM. How do you Detect SPAM Mails? Key words Heuristics/Abnormal behavior What can you do to defend against it? SPAM Filters - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: SPAM/BOTNETS and Malware

SPAM/BOTNETS and Malware Neil Warner, CIO, GoDaddy.com Moderator: Dan Kaplan, deputy editor, SC Magazine

Page 2: SPAM/BOTNETS and Malware

We Put Up Walls

Page 3: SPAM/BOTNETS and Malware

Modern Day Fort

Page 4: SPAM/BOTNETS and Malware

How do you Detect SPAM Mails?– Key words– Heuristics/Abnormal behavior

What can you do to defend against it?– SPAM Filters– Reputation services to block traffic from those

Spamming IP addresses– Take down the root cause

War Against SPAM

Page 5: SPAM/BOTNETS and Malware

SPAM

US34%

CN16%

RU12%

UK7%

AR7%

BR6%

FR5%

ES5%

RO4%

DE4%

Page 6: SPAM/BOTNETS and Malware

What are Botnets used for? How do we detect them? How can we defend Against it? Botnet lifecycle

– Bot-herder configures initial bot parameters such as infection vectors, payload, stealth, C&C details

– Register a DDNS– Register a static IP– Bot-herder launches or seeds new bot(s)– Bots spread– Causes an increase of DDoS being sent to the victim– Losing bots to rival botnets

Bot Army

Page 7: SPAM/BOTNETS and Malware

Botnets

US53%

RU8%

DE8%

UK7%

FR6%

UA6%

NL5%

CA3%

SE2%

ES2%

Page 8: SPAM/BOTNETS and Malware

Different types of Malware Broad Category

– Trojans, Rootkits, Backdoors Malware for Fun and Profit

– Spyware, Key loggers, Dialers, Bots, Proxies, SEO etc..

Grayware

Camouflaged Attacks

Page 9: SPAM/BOTNETS and Malware

Malware

US45%

CN11%

RU9%

DE8%

NL6%

UA6%

UK4% KR

3% CA3%

CZ3%

Top 10 Malware Countries

Page 10: SPAM/BOTNETS and Malware

Threat Landscape - Brute Force

Page 11: SPAM/BOTNETS and Malware

Threat Landscape - FTP

Page 12: SPAM/BOTNETS and Malware

Threat Landscape - SSH

Page 13: SPAM/BOTNETS and Malware

Threat Landscape - Conficker

Page 14: SPAM/BOTNETS and Malware

Threat Landscape - Slammer

Page 15: SPAM/BOTNETS and Malware

Threat Landscape - Fake Search Agents

Page 16: SPAM/BOTNETS and Malware

Threat Landscape - e107 bot

Page 17: SPAM/BOTNETS and Malware

How Does Malware Happen

$$$$$$

<html>Holy Crap! Infected! Click Here to clean</html>

GET http://intermediary.com/ll.php

Make HTTP calls to infection script and site is infected

Compromised Attack Server(s)

Servers with Compromised Accounts(Zeus/Phishing/etc)

FTP/SSH Upload of Attack Shell/Script

Casual Web User Visits Infected Site

End Users

Fake AV

<script>http://intermediary.com/ll.php</script>

Disposable Domain Name

Page 18: SPAM/BOTNETS and Malware

0 Day vulnerability in a web application or Web Server– Compromises the web sites– Redirects the end user to a malware site or competitors website.– Example: Fake AV Campaign

Fake AV

Page 19: SPAM/BOTNETS and Malware

What Can We Do?

Network/Application Security toolsFirewallsIntrusion Prevention SystemsIntrusion Detection SystemsWeb Application FirewallsNetwork Access ControlsAntivirusReputation based AccessCode Audits

Page 20: SPAM/BOTNETS and Malware

The Most Important Deterent

Security Professionals

Page 21: SPAM/BOTNETS and Malware

Is The Internet Worth IT?

Page 22: SPAM/BOTNETS and Malware

Thank You| Q&A

Neil Warner, CIO [email protected]

Page 23: SPAM/BOTNETS and Malware

https://zeustracker.abuse.ch/ http://www.malwaredomainlist.com/ http://www.phishtank.com/ http://www.clean-mx.de/ http://en.wikipedia.org/wiki/Botnet http://en.wikipedia.org/wiki/Malware

References