• Aucun résultat trouvé

Exploit Kits

N/A
N/A
Protected

Academic year: 2022

Partager "Exploit Kits "

Copied!
63
0
0

Texte intégral

(1)

Exploit Kits

Hunting the Hunters

(2)

Who Am I???

•  Nick Biasini (@infosec_nick)

•  Coffee Roaster

•  Beer Snob

•  Occasional Gamer

•  Threat Researcher Talos

•  10+ Years in Industry

•  All the Roles

•  Research

•  Exploit Kits

•  Spam campaign

(3)

Exploit Kits

•  Web Based Compromise Platform

•   Assembly Line Approach

•  Couple of major parts

•  Gate

•  Landing Page

•  Exploit Page

•  Payload

(4)

Payloads

•  Malware Downloaders

•  Trojans

•  Ransomware

•  Ransomware

•   Ransomware

•   Ransomware

•  RANSOMWARE!!!

(5)

History

(6)

Exploit Kits Today

(7)

How do you get compromised

(8)

Video Demo

(9)

Hunting Exploit Kits

(10)

Initial Redirection / Gates

(11)

You Want Some Spam with that

(12)

Stuff I’ve Found While Hunting

(13)

Exploit Kits Today

(14)

Angler Exploit Kit

(15)

Angler Effectiveness

Angler Exploit Vulnerability User Activity Update Published Version

15.0.0.246 16.0.0.235 16.0.0.257 16.0.0.287 16.0.0.296 16.0.0.305 17.0.0.134 17.0.0.169 17.0.0.188

CVE-2015-0310 CVE-2015-0313

CVE-2015-0336

CVE-2015-0359

CVE-2015-0390

1 FEB 1 MAR 1 APR 1 MAY 1 JUN

(16)

Where I started

•  Deep Data Analytics July 2015

•  Telemetry from users

•  ~1000 Sandbox Runs

•  July 2015

•  Angler Underwent several URL Changes

•  Multiple “Hacking Team” 0-Days added

(17)

What Was I Hunting??

(18)

So It Began

URL EndsWith In ‘*/viewtopic.php, */viewforum.php, */search.php’

None or Bad Web Reputation URL Host NOT www.*

URL Host NOT forum.*

URL Path NOT /forum/*

URL Host != Referrer Host Referrer NOT Google

Referrer NOT Bing

Referrer NOT Facebook Referrer NOT NULL

(19)

IP Findings

(20)

Provider Breakdown

(21)

Now on to the Providers

(22)

Limestone to the Rescue

(23)

A Treasure Trove of Data

USER PROXY

SERVER

User Requests Page

Proxy Server Gets data from Exploit Server (Port 81)

Exploit Server Sends HTTP Requests to Status Server Status Server Tracks

HTTP Requests / Status

Roll up of log data pushed to Master Server

MASTER SERVER

EXPLOIT SERVER

STATUS SERVER

(24)

NGINX Config

(25)

Show Me the Money

(26)

UPDATES

•  Landing Page URLs have gotten….difficult

•  No more obvious commonalities

•  Many drastically different versions

(27)

Rig Exploit Kit

(28)

Same Process New Exploit Kit

(29)

Rig IP Activity

(30)

Eurobyte

(31)

Immediate Pivot

•  Within 72 Hours of our publishing

•  Rig Users completely abandoned Eurobyte

•  Moved to a new provider…..more

on that in a minute

(32)

Nuclear

(33)

Searching Was…....Painful

•   Starting Point

•  .asp flash files

•   Soooo much noise

•  The Great Filtering

•  25 Exclusions Later

•  I’m left with a search that is best described as….

(34)

Another Provider Breakthrough

(35)

Treasure Trove of Data

(36)

Now That’s a Global Threat

(37)

Country Details

(38)

Angler Comparison

(39)

No Game Consoles Allowed

(40)

Every 5 Minutes a GET

(41)

Health Monitoring

(42)

Now A Gate Like No Other

(43)

It Starts With a Pattern

(44)

It’s Time

(45)

Total Traffic

(46)

Shadowed Domains

(47)

What’s in a filename

(48)

Basic Findings

•  Shadowed Domains

•  Found ~50 Domains Used

•  All GoDaddy Domains

•  Found ~20 Registrant Accounts

•  Multiple Domains Used Per Account

•  Basic Structure

•  Subdomain.domain/word/word/file.js

•  Volume was shocking

•  ~900,000 Rows of Redirection

•  Hiding in Noise

•  ~0.1% of Redirection led to Exploit Kits

(49)

Is it a unique gate?

(50)

Wait that’s not a gate

(51)

Is it just Rig or Gate or Both

(52)

Example IP 2

(53)

Back to the IP’s

(54)

Holy Pattern Batman!!

(55)
(56)

Rig Exploit Kit Provider

(57)

Key Findings

•  Largest Malvertising Campaign I’ve Ever Seen

•  Found another link between Angler & Rig

•  First was malvertising directing to both

•  Found infrastructure being used by the gate one day and Rig the next

•  Means that there are users with both Angler & Rig instances

•  Or there is a connection between them behind the scenes

•  More research ongoing

(58)

Summary

•  Exploit Kits compromise anyone

•  They are Everywhere

•  Malvertising / Compromised Websites are major sources of traffic

•  Always evolving changing

•  Sophisticated Threat

•  Exploit Kits + Ransomware + Bitcoin + Tor = Major Challenges

(59)

Thank You Slide

(60)

Are You A Provider???

project-aspis@external.cisco.com

@infosec_nick

www.talosintel.com/aspis/

CONTACT ME I WANT TO WORK WITH YOU!!!!

(61)

Registrants to Watch

(62)

Prolific Angler Domain Owner

(63)

talosintel.com blog.talosintel.com

@talossecurity

@infosec_nick

Références

Documents relatifs

Every processing element in a CS-2 system has its own dedicated interface to the communications network; a Meiko designed communications processor.. The

Specifying fonts If you created your own .Xdefaults-hostname file during a session, and you want the new font values applied to clients that are currently running, you

This is a SQL Server–generated name for a primary key on the Employees table of the Accounting database, which we will create later in the chapter — the PK is for primary key (which

The following example uses the xml data type to return the results of a SELECT statement in this function.. The return value is set as the xml data type, which is then returned

Although MSDE is compatible with all other versions of SQL Server 2000 and thus makes an excellent development tool in a stand-alone environment, the absence of administrative

SQL Server 2005 ofrece una plataforma de datos más confiable, segura y SQL Server 2005 ofrece una plataforma de datos más confiable, segura y productiva para aplicaciones de unidad

We are investigating the Widget interface options (current 12-chip, 4-chip version of current, new interface logic with sOl'le processing l'Ioved froft the Z8

Subscriber’s smartcard contains his profile, his current applications table (AIT) and their. associated secure