veelashamoonsamy radbouduniversity,thenetherlands … · inadvertently making cyber criminals rich:...

107
Detection of browser-based cryptocurrency mining Veelasha Moonsamy Radboud University, The Netherlands 25 June 2019 Blockchain and Cryptocurrencies Security School University of Padova, Italy

Upload: others

Post on 14-Jul-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Detection of browser-based cryptocurrency mining

Veelasha MoonsamyRadboud University, The Netherlands

25 June 2019Blockchain and Cryptocurrencies Security School

University of Padova, Italy

Page 2: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Radboud University, Nijmegen, NL

2

Page 3: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

DiS research areas

I (Applied) CryptoI Symmetric key cryptoI Identity-based applicationsI Smart cards and RFID security

I Hardware securityI Side-channel analysis and countermeasuresI Fault attacks

I System SecurityI Efficient implementations of crypto: hardware and softwareI Post-quantum cryptoI Lightweight crypto: protocols and implementationsI Privacy engineering (Privacy & Identity lab)I Read more about DiS members:

https://www.ru.nl/dis/people/members/

3

Page 4: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

iHUB – latest development

I https://www.ru.nl/ihub/I Radboud University’s new interdisciplinary research hub on Security,

Privacy, and Data GovernanceI iHub brings together a diverse range of scholars from across the

humanities, social sciences, engineering and natural sciencesI Tackle urgent questions raised by the increased digitalization and

datafication of science and societyI Join the mailing list to keep up-to-date: https://mailman.

science.ru.nl/mailman/listinfo/ihub-followers

4

Page 5: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Erasmus+ programme as of January 2019:Nijmegen & Padova

I Allows for students (and staff) to study (and teach) at universities inthe EU member states for set periods of time

I Inter-institutional agreement from 2018/19 until 2021/22I Suitable for both student and staff exchangesI More about:

I Bachelor programme: https://www.ru.nl/english/education/bachelors/computing-science/programme-outline/

I Master programme: https://www.ru.nl/english/education/masters/computing-science/programme-outline/

I All courses are taught in English (both at the Bachelor and Masterlevel)

5

Page 6: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Summer Schools organized by DiS members

1. Summer school on real-world crypto and privacy (June 2020,Croatia)

I This year: 17-21 June (last week), with 200 participantsI https://summerschool-croatia.cs.ru.nl/I Registration and stipend application will open in February 2020

2. Interdisciplinary Summerschool on Privacy (September, Nijmegen)I 1-6 September 2019I https://isp.cs.ru.nl/2019/I This year’s theme: Dark Patterns

6

Page 7: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Summer Schools organized by DiS members

1. Summer school on real-world crypto and privacy (June 2020,Croatia)

I This year: 17-21 June (last week), with 200 participantsI https://summerschool-croatia.cs.ru.nl/I Registration and stipend application will open in February 2020

2. Interdisciplinary Summerschool on Privacy (September, Nijmegen)I 1-6 September 2019I https://isp.cs.ru.nl/2019/I This year’s theme: Dark Patterns

6

Page 8: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Summer Schools organized by DiS members

1. Summer school on real-world crypto and privacy (June 2020,Croatia)

I This year: 17-21 June (last week), with 200 participantsI https://summerschool-croatia.cs.ru.nl/I Registration and stipend application will open in February 2020

2. Interdisciplinary Summerschool on Privacy (September, Nijmegen)I 1-6 September 2019I https://isp.cs.ru.nl/2019/I This year’s theme: Dark Patterns

6

Page 9: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Conferences organized by DiS members

I Eurocrypt 2020, https://eurocrypt.iacr.org/2020/

I RWC 2021 (Amsterdam), https://rwc.iacr.org

I Both conferences offer student stipends

7

Page 10: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Conferences organized by DiS members

I Eurocrypt 2020, https://eurocrypt.iacr.org/2020/

I RWC 2021 (Amsterdam), https://rwc.iacr.org

I Both conferences offer student stipends

7

Page 11: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Conferences organized by DiS members

I Eurocrypt 2020, https://eurocrypt.iacr.org/2020/

I RWC 2021 (Amsterdam), https://rwc.iacr.org

I Both conferences offer student stipends

7

Page 12: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Conferences organized by DiS members

I Eurocrypt 2020, https://eurocrypt.iacr.org/2020/

I RWC 2021 (Amsterdam), https://rwc.iacr.org

I Both conferences offer student stipends

7

Page 13: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Acknowledgment

I Joint collaboration:

I Paper available at: www.veelasha.orgI Link to GitHub repo in the paper

8

Page 14: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Cryptocurrency: the rise of decentralized money

I A cryptocurrency:- is a digital asset designed to work as a medium of exchange

I In 2009, the first cryptocurrency, ‘Bitcoin’ was introducedI Fast forward to 2018, about 1600 cryptocurrencies are in existence,

out of which more than 600 still see an active tradeI An overall surge in market value across cryptocurrencies, which are

mineable without specialized hardware, has renewed interest incryptominers

I ... which in turn led to the proliferation of cryptomining services,such as Coinhive - introduced in September 2017

I Can be easily integrated into a website to mine on its visitors’devices from within the browser

9

Page 15: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Cryptocurrency: the rise of decentralized money

I A cryptocurrency:- is a digital asset designed to work as a medium of exchange- uses cryptography to secure financial transactions, control thecreation of additional units, and verify the transfer of assets

I In 2009, the first cryptocurrency, ‘Bitcoin’ was introducedI Fast forward to 2018, about 1600 cryptocurrencies are in existence,

out of which more than 600 still see an active tradeI An overall surge in market value across cryptocurrencies, which are

mineable without specialized hardware, has renewed interest incryptominers

I ... which in turn led to the proliferation of cryptomining services,such as Coinhive - introduced in September 2017

I Can be easily integrated into a website to mine on its visitors’devices from within the browser

9

Page 16: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Cryptocurrency: the rise of decentralized money

I A cryptocurrency:- is a digital asset designed to work as a medium of exchange- uses cryptography to secure financial transactions, control thecreation of additional units, and verify the transfer of assets

I In 2009, the first cryptocurrency, ‘Bitcoin’ was introduced

I Fast forward to 2018, about 1600 cryptocurrencies are in existence,out of which more than 600 still see an active trade

I An overall surge in market value across cryptocurrencies, which aremineable without specialized hardware, has renewed interest incryptominers

I ... which in turn led to the proliferation of cryptomining services,such as Coinhive - introduced in September 2017

I Can be easily integrated into a website to mine on its visitors’devices from within the browser

9

Page 17: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Cryptocurrency: the rise of decentralized money

I A cryptocurrency:- is a digital asset designed to work as a medium of exchange- uses cryptography to secure financial transactions, control thecreation of additional units, and verify the transfer of assets

I In 2009, the first cryptocurrency, ‘Bitcoin’ was introducedI Fast forward to 2018, about 1600 cryptocurrencies are in existence,

out of which more than 600 still see an active trade

I An overall surge in market value across cryptocurrencies, which aremineable without specialized hardware, has renewed interest incryptominers

I ... which in turn led to the proliferation of cryptomining services,such as Coinhive - introduced in September 2017

I Can be easily integrated into a website to mine on its visitors’devices from within the browser

9

Page 18: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Cryptocurrency: the rise of decentralized money

I A cryptocurrency:- is a digital asset designed to work as a medium of exchange- uses cryptography to secure financial transactions, control thecreation of additional units, and verify the transfer of assets

I In 2009, the first cryptocurrency, ‘Bitcoin’ was introducedI Fast forward to 2018, about 1600 cryptocurrencies are in existence,

out of which more than 600 still see an active tradeI An overall surge in market value across cryptocurrencies, which are

mineable without specialized hardware, has renewed interest incryptominers

I ... which in turn led to the proliferation of cryptomining services,such as Coinhive - introduced in September 2017

I Can be easily integrated into a website to mine on its visitors’devices from within the browser

9

Page 19: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Cryptocurrency: the rise of decentralized money

I A cryptocurrency:- is a digital asset designed to work as a medium of exchange- uses cryptography to secure financial transactions, control thecreation of additional units, and verify the transfer of assets

I In 2009, the first cryptocurrency, ‘Bitcoin’ was introducedI Fast forward to 2018, about 1600 cryptocurrencies are in existence,

out of which more than 600 still see an active tradeI An overall surge in market value across cryptocurrencies, which are

mineable without specialized hardware, has renewed interest incryptominers

I ... which in turn led to the proliferation of cryptomining services,such as Coinhive - introduced in September 2017

I Can be easily integrated into a website to mine on its visitors’devices from within the browser

9

Page 20: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Cryptocurrency: the rise of decentralized money

I A cryptocurrency:- is a digital asset designed to work as a medium of exchange- uses cryptography to secure financial transactions, control thecreation of additional units, and verify the transfer of assets

I In 2009, the first cryptocurrency, ‘Bitcoin’ was introducedI Fast forward to 2018, about 1600 cryptocurrencies are in existence,

out of which more than 600 still see an active tradeI An overall surge in market value across cryptocurrencies, which are

mineable without specialized hardware, has renewed interest incryptominers

I ... which in turn led to the proliferation of cryptomining services,such as Coinhive - introduced in September 2017

I Can be easily integrated into a website to mine on its visitors’devices from within the browser

9

Page 21: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

From September 2017 onwards ...

It started with:

10

Page 22: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

From September 2017 onwards ...

It started with:

10

Page 23: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

From September 2017 onwards ...And things went downhill very quickly:

11

Page 24: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Recent update

I 08 March 2019: Coinhive is no longer in operation* 1

I Community’s reaction:

1https://coinhive.com/blog/en/discontinuation-of-coinhive12

Page 25: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Recent update

I 08 March 2019: Coinhive is no longer in operation* 1

I Community’s reaction:

1https://coinhive.com/blog/en/discontinuation-of-coinhive12

Page 26: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Drive-by mining aka Cryptojacking

I Is a web-based attackI An infected website secretly executes a mining script (Javascript

code and/or WebAssembly module) in user’s browser to minecryptocurrencies

I Is considered malicious only when user does not explicitly give theirconsent

I In this work: we study the prevalence of drive-by mining attacks onAlexa’s Top 1 million websites

13

Page 27: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Drive-by mining aka Cryptojacking

I Is a web-based attackI An infected website secretly executes a mining script (Javascript

code and/or WebAssembly module) in user’s browser to minecryptocurrencies

I Is considered malicious only when user does not explicitly give theirconsent

I In this work: we study the prevalence of drive-by mining attacks onAlexa’s Top 1 million websites

13

Page 28: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Threat Model

User Webserver

Webserver/ External Server

WebSocket Proxy

Mining Pool

HTTP Request

HTTP Response(Orchestrator Code)

Fetch Mining Payload

Relay Communication

Mining Pool Communication

1

2

3

4

5

14

Page 29: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Current detection methods

Two main approaches have been used:1. Blacklist-based approach2. High CPU-based approach

15

Page 30: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Current detection method: Blacklist-based approach

I Existing defenses:

I CoinBlockerList2: maintains a blacklist of mining pools and proxyservers that are manually collected from reports on security blogsand Twitter

I Dr. Mine3: blocks drive-by mining by means of explicitly blacklistedURLs (based on for e.g. CoinBlockerLists)

I MinerBlock4: combines blacklists with detecting potential miningcode inside loaded JavaScript files

I Shortcomings:I Not scalableI Prone to high false negativesI Easily defeated by URL randomization and domain generation

algorithms

2https://gitlab.com/ZeroDot1/CoinBlockerLists3https://github.com/1lastBr3ath/drmine4https://github.com/xd4rker/MinerBlock

16

Page 31: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Current detection method: Blacklist-based approach

I Existing defenses:I CoinBlockerList2: maintains a blacklist of mining pools and proxy

servers that are manually collected from reports on security blogsand Twitter

I Dr. Mine3: blocks drive-by mining by means of explicitly blacklistedURLs (based on for e.g. CoinBlockerLists)

I MinerBlock4: combines blacklists with detecting potential miningcode inside loaded JavaScript files

I Shortcomings:I Not scalableI Prone to high false negativesI Easily defeated by URL randomization and domain generation

algorithms

2https://gitlab.com/ZeroDot1/CoinBlockerLists3https://github.com/1lastBr3ath/drmine4https://github.com/xd4rker/MinerBlock

16

Page 32: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Current detection method: Blacklist-based approach

I Existing defenses:I CoinBlockerList2: maintains a blacklist of mining pools and proxy

servers that are manually collected from reports on security blogsand Twitter

I Dr. Mine3: blocks drive-by mining by means of explicitly blacklistedURLs (based on for e.g. CoinBlockerLists)

I MinerBlock4: combines blacklists with detecting potential miningcode inside loaded JavaScript files

I Shortcomings:I Not scalableI Prone to high false negativesI Easily defeated by URL randomization and domain generation

algorithms

2https://gitlab.com/ZeroDot1/CoinBlockerLists3https://github.com/1lastBr3ath/drmine4https://github.com/xd4rker/MinerBlock

16

Page 33: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Current detection method: Blacklist-based approach

I Existing defenses:I CoinBlockerList2: maintains a blacklist of mining pools and proxy

servers that are manually collected from reports on security blogsand Twitter

I Dr. Mine3: blocks drive-by mining by means of explicitly blacklistedURLs (based on for e.g. CoinBlockerLists)

I MinerBlock4: combines blacklists with detecting potential miningcode inside loaded JavaScript files

I Shortcomings:I Not scalableI Prone to high false negativesI Easily defeated by URL randomization and domain generation

algorithms

2https://gitlab.com/ZeroDot1/CoinBlockerLists3https://github.com/1lastBr3ath/drmine4https://github.com/xd4rker/MinerBlock

16

Page 34: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Current detection method: Blacklist-based approach

I Existing defenses:I CoinBlockerList2: maintains a blacklist of mining pools and proxy

servers that are manually collected from reports on security blogsand Twitter

I Dr. Mine3: blocks drive-by mining by means of explicitly blacklistedURLs (based on for e.g. CoinBlockerLists)

I MinerBlock4: combines blacklists with detecting potential miningcode inside loaded JavaScript files

I Shortcomings:I Not scalableI Prone to high false negativesI Easily defeated by URL randomization and domain generation

algorithms

2https://gitlab.com/ZeroDot1/CoinBlockerLists3https://github.com/1lastBr3ath/drmine4https://github.com/xd4rker/MinerBlock

16

Page 35: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Current detection methods: High CPU-based approach

I Several studies found high CPU usage from the website can be usedas an indicator of drive-by mining

I Consequently, many drive-by miners started throttling their CPUusage to around 25%

I Implications:I False positives, as there might exist other CPU-intensive use cases

(e.g. games)I False negatives, as cryptominers have started to throttle their CPU

usage to evade detection

17

Page 36: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Current detection methods: High CPU-based approach

I Several studies found high CPU usage from the website can be usedas an indicator of drive-by mining

I Consequently, many drive-by miners started throttling their CPUusage to around 25%

I Implications:I False positives, as there might exist other CPU-intensive use cases

(e.g. games)I False negatives, as cryptominers have started to throttle their CPU

usage to evade detection

17

Page 37: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Current detection methods: High CPU-based approach

I Several studies found high CPU usage from the website can be usedas an indicator of drive-by mining

I Consequently, many drive-by miners started throttling their CPUusage to around 25%

I Implications:I False positives, as there might exist other CPU-intensive use cases

(e.g. games)I False negatives, as cryptominers have started to throttle their CPU

usage to evade detection

17

Page 38: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Minesweeper: contributions

I Perform first in-depth assessment of drive-by mining

I Discuss why current defenses based on blacklisting and CPU usageare ineffective

I Propose MineSweeper, a novel detection approach based on theidentification of the cryptographic functions (static analysis) andcache events (during run-time)

18

Page 39: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Minesweeper: contributions

I Perform first in-depth assessment of drive-by miningI Discuss why current defenses based on blacklisting and CPU usage

are ineffective

I Propose MineSweeper, a novel detection approach based on theidentification of the cryptographic functions (static analysis) andcache events (during run-time)

18

Page 40: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Minesweeper: contributions

I Perform first in-depth assessment of drive-by miningI Discuss why current defenses based on blacklisting and CPU usage

are ineffectiveI Propose MineSweeper, a novel detection approach based on the

identification of the cryptographic functions (static analysis) andcache events (during run-time)

18

Page 41: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Drive-by mining in the wild

I Conducted a large-scale analysis with the aim to answer thefollowing questions:

1. How prevalent is drive-by mining in the wild?2. How many different drive-by mining services exist currently?3. Which evasion tactics do drive-by mining services employ?4. What is the modus operandi of different types of campaign?5. How much profit do these campaigns make?6. What are the common characteristics across different drive-by mining

services that can be used for their detection?

19

Page 42: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Drive-by mining in the wild

I Conducted a large-scale analysis with the aim to answer thefollowing questions:1. How prevalent is drive-by mining in the wild?

2. How many different drive-by mining services exist currently?3. Which evasion tactics do drive-by mining services employ?4. What is the modus operandi of different types of campaign?5. How much profit do these campaigns make?6. What are the common characteristics across different drive-by mining

services that can be used for their detection?

19

Page 43: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Drive-by mining in the wild

I Conducted a large-scale analysis with the aim to answer thefollowing questions:1. How prevalent is drive-by mining in the wild?2. How many different drive-by mining services exist currently?

3. Which evasion tactics do drive-by mining services employ?4. What is the modus operandi of different types of campaign?5. How much profit do these campaigns make?6. What are the common characteristics across different drive-by mining

services that can be used for their detection?

19

Page 44: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Drive-by mining in the wild

I Conducted a large-scale analysis with the aim to answer thefollowing questions:1. How prevalent is drive-by mining in the wild?2. How many different drive-by mining services exist currently?3. Which evasion tactics do drive-by mining services employ?

4. What is the modus operandi of different types of campaign?5. How much profit do these campaigns make?6. What are the common characteristics across different drive-by mining

services that can be used for their detection?

19

Page 45: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Drive-by mining in the wild

I Conducted a large-scale analysis with the aim to answer thefollowing questions:1. How prevalent is drive-by mining in the wild?2. How many different drive-by mining services exist currently?3. Which evasion tactics do drive-by mining services employ?4. What is the modus operandi of different types of campaign?

5. How much profit do these campaigns make?6. What are the common characteristics across different drive-by mining

services that can be used for their detection?

19

Page 46: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Drive-by mining in the wild

I Conducted a large-scale analysis with the aim to answer thefollowing questions:1. How prevalent is drive-by mining in the wild?2. How many different drive-by mining services exist currently?3. Which evasion tactics do drive-by mining services employ?4. What is the modus operandi of different types of campaign?5. How much profit do these campaigns make?

6. What are the common characteristics across different drive-by miningservices that can be used for their detection?

19

Page 47: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Drive-by mining in the wild

I Conducted a large-scale analysis with the aim to answer thefollowing questions:1. How prevalent is drive-by mining in the wild?2. How many different drive-by mining services exist currently?3. Which evasion tactics do drive-by mining services employ?4. What is the modus operandi of different types of campaign?5. How much profit do these campaigns make?6. What are the common characteristics across different drive-by mining

services that can be used for their detection?

19

Page 48: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Large-scale Analysis: experiment set-up

20

Page 49: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Data collection

I Over a period of one week in mid-March 2018

I CrawlerI Crawled landing page and 3 internal pagesI Stayed on each visited page for 4 secondsI No simulated interacted, i.e. the crawler did not give any consent for

cryptominingI Crawled 991,513 websites; 4.6 TB raw data and 550 MB data

profiles

21

Page 50: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Data collection

I Over a period of one week in mid-March 2018I Crawler

I Crawled landing page and 3 internal pagesI Stayed on each visited page for 4 secondsI No simulated interacted, i.e. the crawler did not give any consent for

cryptomining

I Crawled 991,513 websites; 4.6 TB raw data and 550 MB dataprofiles

21

Page 51: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Data collection

I Over a period of one week in mid-March 2018I Crawler

I Crawled landing page and 3 internal pagesI Stayed on each visited page for 4 secondsI No simulated interacted, i.e. the crawler did not give any consent for

cryptominingI Crawled 991,513 websites; 4.6 TB raw data and 550 MB data

profiles

21

Page 52: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Preliminary results: Cryptomining code (1/2)

I Recall: cryptomining code consists of orchestrator code and miningpayload

I Identification of orchestrator code

I Websites embed the orchestrator script in the main pageI Can be detected by looking for specific string patternsI Keywords: CoinHive.Anonymous or coinhive.min.js

22

Page 53: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Preliminary results: Cryptomining code (1/2)

I Recall: cryptomining code consists of orchestrator code and miningpayload

I Identification of orchestrator code

I Websites embed the orchestrator script in the main pageI Can be detected by looking for specific string patternsI Keywords: CoinHive.Anonymous or coinhive.min.js

22

Page 54: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Preliminary results: Cryptomining code (1/2)

I Recall: cryptomining code consists of orchestrator code and miningpayload

I Identification of orchestrator codeI Websites embed the orchestrator script in the main page

I Can be detected by looking for specific string patternsI Keywords: CoinHive.Anonymous or coinhive.min.js

22

Page 55: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Preliminary results: Cryptomining code (1/2)

I Recall: cryptomining code consists of orchestrator code and miningpayload

I Identification of orchestrator codeI Websites embed the orchestrator script in the main pageI Can be detected by looking for specific string patterns

I Keywords: CoinHive.Anonymous or coinhive.min.js

22

Page 56: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Preliminary results: Cryptomining code (1/2)

I Recall: cryptomining code consists of orchestrator code and miningpayload

I Identification of orchestrator codeI Websites embed the orchestrator script in the main pageI Can be detected by looking for specific string patterns

I Keywords: CoinHive.Anonymous or coinhive.min.js

22

Page 57: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Preliminary results: Cryptomining code (1/2)

I Recall: cryptomining code consists of orchestrator code and miningpayload

I Identification of orchestrator codeI Websites embed the orchestrator script in the main pageI Can be detected by looking for specific string patterns

I Keywords: CoinHive.Anonymous or coinhive.min.js

22

Page 58: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Preliminary results: Cryptomining code (2/2)

I Identification of mining payloadI Dump the Wasm (WebAssembly) payloadI –dump-wasm- module flag in Chrome dumps the loaded Wasm

modulesI Keyword-based search: cryptonight_hash and

CryptonightWasmWrapper

23

Page 59: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Effectiveness of fingerprint-based detection

I Detected 866 websites; 59.35% used Coinhive cryptomining servicesI Issues with keyword-based fingerprinting: code obfuscation and

manual effort of updating signatures

24

Page 60: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Effectiveness of fingerprint-based detection

I Detected 866 websites; 59.35% used Coinhive cryptomining services

I Issues with keyword-based fingerprinting: code obfuscation andmanual effort of updating signatures

24

Page 61: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Effectiveness of fingerprint-based detection

I Detected 866 websites; 59.35% used Coinhive cryptomining servicesI Issues with keyword-based fingerprinting: code obfuscation and

manual effort of updating signatures

24

Page 62: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Preliminary results: Mining pool communication (1/2)

I Miners use the Stratum protocol to communicate with the miningpool

I Use of WebSockets to allow full-duplex, asynchronouscommunication between code running on a webpage and servers

I Search in WebSocket frames for keywords related to Stratumprotocol

[scale=0.4]images/stratum.png

25

Page 63: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Preliminary results: Mining pool communication (1/2)

I Miners use the Stratum protocol to communicate with the miningpool

I Use of WebSockets to allow full-duplex, asynchronouscommunication between code running on a webpage and servers

I Search in WebSocket frames for keywords related to Stratumprotocol

[scale=0.4]images/stratum.png

25

Page 64: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Preliminary results: Mining pool communication (1/2)

I Miners use the Stratum protocol to communicate with the miningpool

I Use of WebSockets to allow full-duplex, asynchronouscommunication between code running on a webpage and servers

I Search in WebSocket frames for keywords related to Stratumprotocol

25

Page 65: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Preliminary results: Mining pool communication (2/2)

I 59,319 (5.39%) websites use WebSocketsI 1,008 websites use Stratum protocol for communicationI 2,377 websites encode the data (Hex code or salted Base64)

- more on this later

26

Page 66: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Summary of key findings

I Identified 1,735 websites as mining cryptocurrency, out of which1,627 (93.78%) could be identified based on keywords in thecryptomining code

I 1,008 (58.10%) use the Stratum protocol in plaintext, 174 (10.03%)obfuscate the communication protocol

I All the websites (100.00%) use Wasm for the cryptomining payloadand open a WebSocket

I At least 197 (11.36%) websites throttle their CPU usage to less than50%, while for only 12 (0.69%) mining websites we observed a CPUload of less than 25%.

27

Page 67: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Summary of key findings

I Identified 1,735 websites as mining cryptocurrency, out of which1,627 (93.78%) could be identified based on keywords in thecryptomining code

I 1,008 (58.10%) use the Stratum protocol in plaintext, 174 (10.03%)obfuscate the communication protocol

I All the websites (100.00%) use Wasm for the cryptomining payloadand open a WebSocket

I At least 197 (11.36%) websites throttle their CPU usage to less than50%, while for only 12 (0.69%) mining websites we observed a CPUload of less than 25%.

27

Page 68: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Summary of key findings

I Identified 1,735 websites as mining cryptocurrency, out of which1,627 (93.78%) could be identified based on keywords in thecryptomining code

I 1,008 (58.10%) use the Stratum protocol in plaintext, 174 (10.03%)obfuscate the communication protocol

I All the websites (100.00%) use Wasm for the cryptomining payloadand open a WebSocket

I At least 197 (11.36%) websites throttle their CPU usage to less than50%, while for only 12 (0.69%) mining websites we observed a CPUload of less than 25%.

27

Page 69: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Summary of key findings

I Identified 1,735 websites as mining cryptocurrency, out of which1,627 (93.78%) could be identified based on keywords in thecryptomining code

I 1,008 (58.10%) use the Stratum protocol in plaintext, 174 (10.03%)obfuscate the communication protocol

I All the websites (100.00%) use Wasm for the cryptomining payloadand open a WebSocket

I At least 197 (11.36%) websites throttle their CPU usage to less than50%, while for only 12 (0.69%) mining websites we observed a CPUload of less than 25%.

27

Page 70: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

In-depth analysis: evasion techniques

I We identified three evasion techniques, which are widely used by thedrive-by mining services in our dataset1. Code obfuscation2. Obfuscated Stratum communication3. Anti-debugging tricks

28

Page 71: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

In-depth analysis: code obfuscation

I Packed code: The compressed and encoded orchestrator script isdecoded using a chain of decoding functions at run time.

I PCharCode: The orchestrator script is converted to charCode andembedded in the webpage. At run time, it is converted back to astring and executed using JavaScript’s eval() function.

I Name obfuscation: Variable names and functions names arereplaced with random strings.

I Dead code injection: Random blocks of code, which are neverexecuted, are added to the script to make reverse engineering moredifficult.

I Filename and URL randomization: The name of the JavaScriptfile is randomized or the URL it is loaded from is shortened to avoiddetection based on pattern matching.

29

Page 72: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

In-depth analysis: code obfuscation

I Packed code: The compressed and encoded orchestrator script isdecoded using a chain of decoding functions at run time.

I PCharCode: The orchestrator script is converted to charCode andembedded in the webpage. At run time, it is converted back to astring and executed using JavaScript’s eval() function.

I Name obfuscation: Variable names and functions names arereplaced with random strings.

I Dead code injection: Random blocks of code, which are neverexecuted, are added to the script to make reverse engineering moredifficult.

I Filename and URL randomization: The name of the JavaScriptfile is randomized or the URL it is loaded from is shortened to avoiddetection based on pattern matching.

All of the above mainly applied to orchestrator code; the onlyobfuscation on mining payload is name obfuscation

29

Page 73: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

In-depth analysis: obfuscated Stratum communication

I Identified the Stratum protocol in plaintext for 1,008 websites

I Manually analyzed the WebSocket communication for the remaining727 websites and found the following:

I 174 websites obfuscate by encoding the request, either as Hex code,or with salted Base64 encoding before transmitting it through theWebSocket

I We could not identify any pool communication for remaining 553websites, either due to other encodings, or due to slow serverconnections

30

Page 74: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

In-depth analysis: obfuscated Stratum communication

I Identified the Stratum protocol in plaintext for 1,008 websitesI Manually analyzed the WebSocket communication for the remaining

727 websites and found the following:I 174 websites obfuscate by encoding the request, either as Hex code,

or with salted Base64 encoding before transmitting it through theWebSocket

I We could not identify any pool communication for remaining 553websites, either due to other encodings, or due to slow serverconnections

30

Page 75: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

In-depth analysis: Anti-debugging tricks

I 139 websites used anti-debugging tricksI Checked code periodically to see whether the user is analyzing the

code served by the webpage using developer toolsI If the developer tools are open in the browser, it stops executing any

further code

31

Page 76: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

MineSweeper

Page 77: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

MineSweeper

I MineSweeper employs multiples stages in order to detect awebminer:

33

Page 78: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

CryptoNight algorithm (1/2)

I CryptoNight was proposed in 2013 and popularly used by Monero(XMR)

I We exploit two fundamental characteristics:

I It makes use of several cryptographic primitives, such as:I A memory hard algorithm

I High-performances on ordinary CPUsI Inefficient on today’s special purpose devices (ASICs)I Internal memory-hard loop: alternate reads and writes to the Last

Level Cache (LLC)

34

Page 79: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

CryptoNight algorithm (1/2)

I CryptoNight was proposed in 2013 and popularly used by Monero(XMR)

I We exploit two fundamental characteristics:

I It makes use of several cryptographic primitives, such as:I A memory hard algorithm

I High-performances on ordinary CPUsI Inefficient on today’s special purpose devices (ASICs)I Internal memory-hard loop: alternate reads and writes to the Last

Level Cache (LLC)

34

Page 80: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

CryptoNight algorithm (1/2)

I CryptoNight was proposed in 2013 and popularly used by Monero(XMR)

I We exploit two fundamental characteristics:I It makes use of several cryptographic primitives, such as:

Keccak 1600-516, Keccak-f 1600, AES, BLAKE-256, Groestl-256,and Skein-256

I A memory hard algorithmI High-performances on ordinary CPUsI Inefficient on today’s special purpose devices (ASICs)I Internal memory-hard loop: alternate reads and writes to the Last

Level Cache (LLC)

34

Page 81: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

CryptoNight algorithm (1/2)

I CryptoNight was proposed in 2013 and popularly used by Monero(XMR)

I We exploit two fundamental characteristics:I It makes use of several cryptographic primitives, such as:

Keccak 1600-516, Keccak-f 1600, AES, BLAKE-256, Groestl-256,and Skein-256

I A memory hard algorithmI High-performances on ordinary CPUsI Inefficient on today’s special purpose devices (ASICs)I Internal memory-hard loop: alternate reads and writes to the Last

Level Cache (LLC)

34

Page 82: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

CryptoNight algorithm (2/2)

Scratchpad Initialization

Memory-hardloop

Final result calculation

Keccak 1600-512

Key expansion + 10 AES rounds

Keccak-f 1600

Loop preparation

524.288 Iterations

AES

XOR

8bt_ADD

8bt_MUL

XOR

S c r a t c h p a d

BLAKE-Groestl-Skein hash-select

S c r a t c h p a d

8 rounds

AES Write

Key expansion + 10 AES rounds

8 roundsAES

XORRead

Write

Write

Read

I CryptoNight allocates a scratchpad of 2MB in memoryI On modern processors ends up in the LLC

35

Page 83: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Wasm analysis

I Linear assembly bytecode translation using the WebAssembly BinaryToolkit (WABT) debugger

I Functions identification - to create an internal representation of thecode for each function

I Cryptographic operation count - track the control flow and cryptooperands

I Static call graph construction, including identification of loops

36

Page 84: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

CryptoNight detection

I MineSweeper is given as input a CryptoNight fingerprintI We created a fingerprint for each of CryptoNight’s cryptographic

primitives based on operands counts and flow structure

37

Page 85: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

CryptoNight detection - an example

I Assume the fingerprint for BLAKE-256 has 80 XOR, 85 left shift,and 32 right shift instructions

I Function foo(), which is an implementation of BLAKE-256, thatwe want to match against this fingerprint, contains 86 XOR, 85 leftshift, and 33 right shift instructions

I In this case, the similarity score is 3 and difference score is 2I All three types of instructions are present in foo(); foo() contains

extra XOR and an extra shift instruction

38

Page 86: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

CryptoNight detection - an example

I Assume the fingerprint for BLAKE-256 has 80 XOR, 85 left shift,and 32 right shift instructions

I Function foo(), which is an implementation of BLAKE-256, thatwe want to match against this fingerprint, contains 86 XOR, 85 leftshift, and 33 right shift instructions

I In this case, the similarity score is 3 and difference score is 2I All three types of instructions are present in foo(); foo() contains

extra XOR and an extra shift instruction

38

Page 87: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

CryptoNight detection - an example

I Assume the fingerprint for BLAKE-256 has 80 XOR, 85 left shift,and 32 right shift instructions

I Function foo(), which is an implementation of BLAKE-256, thatwe want to match against this fingerprint, contains 86 XOR, 85 leftshift, and 33 right shift instructions

I In this case, the similarity score is 3 and difference score is 2

I All three types of instructions are present in foo(); foo() containsextra XOR and an extra shift instruction

38

Page 88: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

CryptoNight detection - an example

I Assume the fingerprint for BLAKE-256 has 80 XOR, 85 left shift,and 32 right shift instructions

I Function foo(), which is an implementation of BLAKE-256, thatwe want to match against this fingerprint, contains 86 XOR, 85 leftshift, and 33 right shift instructions

I In this case, the similarity score is 3 and difference score is 2I All three types of instructions are present in foo(); foo() contains

extra XOR and an extra shift instruction

38

Page 89: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Evaluation of cryptofunction detection

I Identified 40 unique samples among the 748 collected Wasm samplesI Applied the cryptofunction detection routine of MineSweeper on

them

39

Page 90: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

CPU cache events monitoring

I What if an attack would sacrifice part of the profits for obfuscatedWasm?

I Solution: CPU cache events monitoringI MineSweeper monitors the L1 and L3 for load and store events

caused by the CryptoNight algorithmI Also detects a fundamental characteristic of the CryptoNight

algorithm: the memory-hard loop!

40

Page 91: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

CPU cache events monitoring

I What if an attack would sacrifice part of the profits for obfuscatedWasm?

I Solution: CPU cache events monitoring

I MineSweeper monitors the L1 and L3 for load and store eventscaused by the CryptoNight algorithm

I Also detects a fundamental characteristic of the CryptoNightalgorithm: the memory-hard loop!

40

Page 92: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

CPU cache events monitoring

I What if an attack would sacrifice part of the profits for obfuscatedWasm?

I Solution: CPU cache events monitoringI MineSweeper monitors the L1 and L3 for load and store events

caused by the CryptoNight algorithm

I Also detects a fundamental characteristic of the CryptoNightalgorithm: the memory-hard loop!

40

Page 93: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

CPU cache events monitoring

I What if an attack would sacrifice part of the profits for obfuscatedWasm?

I Solution: CPU cache events monitoringI MineSweeper monitors the L1 and L3 for load and store events

caused by the CryptoNight algorithmI Also detects a fundamental characteristic of the CryptoNight

algorithm: the memory-hard loop!

40

Page 94: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Evaluation of blacklisting approaches

I For comparison, we evaluate MineSweeper against Dr. Mine

I Dr. Mine uses CoinBlockerLists as the basis to detect miningwebsites

I Visited the 1,735 websites that were mining during our first crawl forthe large-scale analysis with both tools

I Dr. Mine could only find 272 websites, while MineSweeper found785 websites that were still actively mining cryptocurrency

41

Page 95: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Evaluation of blacklisting approaches

I For comparison, we evaluate MineSweeper against Dr. MineI Dr. Mine uses CoinBlockerLists as the basis to detect mining

websites

I Visited the 1,735 websites that were mining during our first crawl forthe large-scale analysis with both tools

I Dr. Mine could only find 272 websites, while MineSweeper found785 websites that were still actively mining cryptocurrency

41

Page 96: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Evaluation of blacklisting approaches

I For comparison, we evaluate MineSweeper against Dr. MineI Dr. Mine uses CoinBlockerLists as the basis to detect mining

websitesI Visited the 1,735 websites that were mining during our first crawl for

the large-scale analysis with both tools

I Dr. Mine could only find 272 websites, while MineSweeper found785 websites that were still actively mining cryptocurrency

41

Page 97: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Evaluation of blacklisting approaches

I For comparison, we evaluate MineSweeper against Dr. MineI Dr. Mine uses CoinBlockerLists as the basis to detect mining

websitesI Visited the 1,735 websites that were mining during our first crawl for

the large-scale analysis with both toolsI Dr. Mine could only find 272 websites, while MineSweeper found

785 websites that were still actively mining cryptocurrency

41

Page 98: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Evaluation of CPU cache events monitoring (1/2)

I We visited 7 pages for the following categories of web applications:I Web minersI VideoplayersI Wasm-based gamesI JavaScript (JS) games

42

Page 99: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Evaluation of CPU cache events monitoring (2/2)

Our tests confirm us the effectiveness of this detection method onCryptoNight-based algorithms

Performance countermeasurements for the L1 cache fordifferent types of web applications

(logscale)

Performance countermeasurements for the L3 cache fordifferent types of web applications

(logscale)

43

Page 100: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Conclusion

I Drive-by mining is real and can be very profitable for high trafficwebsites

I Current defenses are not sufficient to stop malicious miningI To severely impact their profitability, we need to aim at the core

properties of the miners code: cryptographic functions andmemory behaviors

44

Page 101: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Post-Minesweeper related work5

I Inadvertently Making Cyber Criminals Rich: A Comprehensive Studyof Cryptojacking Campaigns at Internet Scale,https://www.usenix.org/conference/usenixsecurity19/presentation/bijmans

I This work builds upon MinesweeperI Performs two large studies into the world of cryptojacking, focused

on organized cryptomining and the spread of cryptojacking on theInternet.

I Dissecting Android Cryptocurrency Miners,https://arxiv.org/abs/1905.02602

I Analyzed the Android miners and identified how they workI What are the most popular libraries and APIs used to facilitate the

development of the mining scriptI What static features are typical for this class of applications

5This is not an exhaustive list45

Page 102: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Post-Minesweeper related work5

I Inadvertently Making Cyber Criminals Rich: A Comprehensive Studyof Cryptojacking Campaigns at Internet Scale,https://www.usenix.org/conference/usenixsecurity19/presentation/bijmans

I This work builds upon MinesweeperI Performs two large studies into the world of cryptojacking, focused

on organized cryptomining and the spread of cryptojacking on theInternet.

I Dissecting Android Cryptocurrency Miners,https://arxiv.org/abs/1905.02602

I Analyzed the Android miners and identified how they workI What are the most popular libraries and APIs used to facilitate the

development of the mining scriptI What static features are typical for this class of applications

5This is not an exhaustive list45

Page 103: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Post-Minesweeper related work5

I Inadvertently Making Cyber Criminals Rich: A Comprehensive Studyof Cryptojacking Campaigns at Internet Scale,https://www.usenix.org/conference/usenixsecurity19/presentation/bijmans

I This work builds upon MinesweeperI Performs two large studies into the world of cryptojacking, focused

on organized cryptomining and the spread of cryptojacking on theInternet.

I Dissecting Android Cryptocurrency Miners,https://arxiv.org/abs/1905.02602

I Analyzed the Android miners and identified how they workI What are the most popular libraries and APIs used to facilitate the

development of the mining scriptI What static features are typical for this class of applications

5This is not an exhaustive list45

Page 104: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Future directions

I Network-based cryptomining detection (e.g. with university orcompany network)

I Detecting “pop-under” windows used for concealing illegitimatemining

46

Page 105: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Future directions

I Network-based cryptomining detection (e.g. with university orcompany network)

I Detecting “pop-under” windows used for concealing illegitimatemining

46

Page 106: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Future directions

I Network-based cryptomining detection (e.g. with university orcompany network)

I Detecting “pop-under” windows used for concealing illegitimatemining

46

Page 107: VeelashaMoonsamy RadboudUniversity,TheNetherlands … · Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale,

Thank you for your attention!

[email protected]

@veelasha_m

47