Top Banner
Fast Detection of New Malicious Domains using DNS Dhia Mahjoub OpenDNS October 18 th , 2013
36

Fast Detection of New Malicious Domains using DNS

Jan 14, 2015

Download

Technology

OpenDNS

OpenDNS Security Researcher Dhia Mahjoub presented this talk at BSides Raleigh on October 18th, 2013.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Fast Detection of New Malicious Domains using DNS

 

Fast Detection of New Malicious Domains using DNS

Dhia  Mahjoub  OpenDNS  

October  18th,  2013  

Page 2: Fast Detection of New Malicious Domains using DNS

Outline  •  DNS  infrastructure  •  Monitoring/detec@on  system  •  Domain/IP  watch  list  •  Post-­‐detec@on  filtering  •  Implementa@on  •  Use  cases  •  FF  Kelihos  domains,  EK  domains,  Ransomware,  Trojans  •  Conclusion  

Page 3: Fast Detection of New Malicious Domains using DNS

querylogs   authlogs  

DNS  big  data  

Page 4: Fast Detection of New Malicious Domains using DNS

OpenDNS’  Network  Map  

Page 5: Fast Detection of New Malicious Domains using DNS

Malicious  use  of  DNS  

•  Botnet/Malware  C&C  

•  DGAs  

•  Fast  flux  

•  DNS  amplifica@on  aXacks  

Page 6: Fast Detection of New Malicious Domains using DNS

Our  Focus  

•  AXack  domains,  not  compromised  domains    -­‐>Exploit  kit  domains    -­‐>Malware  delivery  domains  

Page 7: Fast Detection of New Malicious Domains using DNS

Fast  Flux  Monitoring/Detec@on  System  

•  TTL=0  Kelihos  Fast  Flux  domains    7-­‐months  study  presented  at  APWG  eCrime  2013  hXp://labs.umbrella.com/2013/09/24/real-­‐@me-­‐monitoring-­‐kelihos-­‐fast-­‐flux-­‐botnet-­‐case-­‐study-­‐presented-­‐apwg-­‐ecrime-­‐2013/  

 •  TTL=150  

•  TTL=300  

•  TTL=1440,  spam  domains  

Page 8: Fast Detection of New Malicious Domains using DNS

Fast  Flux  Monitoring/Detec@on  System  

While  true  1.  Select  a  seed  of  Kelihos  domains  w/  a  confirmed  profile  2.  Con@nuously  milk  domains  for  IPs    3.  Con@nuously  “inverse  lookup”  IPs  in  passive  DNS,  for  

new  domains  that  start  resolving  to  these  IPs  4.  Check  detected  domains  for  known  profile  (e.g.  TTL,  

registra@on,  existence  of  payload,  etc)  5.  Add  new  domains  to  the  ini@al  seed  

Page 9: Fast Detection of New Malicious Domains using DNS

Kelihos  domains  profile  

•  Various  gTLDs,  ccTLDs,  1  single  IP,  TTL=0,  hosted  on  Kelihos  botnet  IP  pool  (growing),  infected  individual  machines,  recent  registra@on,  delivering  malware  executables  with  known  names  

•  Recorded  case(s)  of  domain  resolving  to  several  IPs  with  TTL=600,  cocala.asia,  or  TTL=300  

Page 10: Fast Detection of New Malicious Domains using DNS

Generalized  Monitoring/Detec@on  System  

•  While  true  •  Read  IP  watch  list,  launch  parallel  process  for  every  IP  •  A  process  performs  IP  inverse  lookup  against  DNSDB  •  Every  process  returns  new  domains  for  IP  •  Join  all  processes’  output,  check  against  blacklist  •  Keep  only  new  domains  •  Perform  parallelized  post  discovery  checks  using  

different  heuris@cs:  traffic  paXern,  name  paXern,  extra  IP  reputa@on  check,  etc.  

•  Add  new  domains  to  blacklist  

Page 11: Fast Detection of New Malicious Domains using DNS

Watch  list  selec@on  •  Con@nuous  background  process  

•  Different  methods/heuris@cs  to  harvest  new  IPs  with  high  risk  poten@al  

•  Use  fresh  blacklist,  3rd  party  BL  domain  list  

Page 12: Fast Detection of New Malicious Domains using DNS

Watch  list  selec@on  (cont’d)  •  Resolve  IPs  and  cluster  by  popularity,  age,  aXack  theme  

 -­‐>IP  observed  to  host  exclusively  EK  domains  or  ransomware  -­‐>Similar  name  paXern  of  hosted  domains  -­‐>Similar  traffic  paXern  

•  Remove  IPs  on  large  shared  hos@ng  providers  unless  excep@ons  (e.g  keep  OVH  CIDR  dedicated  to  malware),  sinkholes,  other  IP  profiles  that  could  cause  FPs  

Page 13: Fast Detection of New Malicious Domains using DNS

Harves@ng  bad  IPs  •  When  we  discover  new  high  risk  IPs,  why  not  just  block  

IPs?  Sure,  we  can,  and  we  open  do!  

•  But  you  lose  intel  and  inves@ga@ve  material  related  to  domains:  name  paXerns,  DGAs,  dynamic  DNS  usage,  malicious  subdomains  under  legi@mate  compromised  domains  

Page 14: Fast Detection of New Malicious Domains using DNS

Post  detec@on  checks  •  Traffic  paXern,  name  paXern,  further  IP  reputa@on  check  

•  If  a  spike  or  beginning  of  spike,  then  poten@al  risk  domain  

•  Exclude  spam  domains  

•  But  spike  means  domain  has  already  delivered  aXack  

Page 15: Fast Detection of New Malicious Domains using DNS

Post  detec@on  checks  (cont’d)  •  So  preemp@ve  blocking  is  necessary  if  domain  has  high  

poten@al  of  being  an  aXack  domain  

•  Not  everything  should  be  automated  

•  Human  intel  and  inves@ga@on  needed  at  @mes  to  remove  FPs  and  add  FN  back  -­‐>  Fine-­‐tune  the  model  

Page 16: Fast Detection of New Malicious Domains using DNS

Plarorm  and  tools  used  -­‐Pig  on  Hadoop  cluster    -­‐Raw  logs  on  HDFS    -­‐Indexed  DNSDB  in  HBase    -­‐Python,  shell,  Gnu  Parallel    

Page 17: Fast Detection of New Malicious Domains using DNS

System  in  a  nutshell    -­‐>Constantly  running  process  of  harves@ng  fresh  high  risk  IPs    -­‐>Constantly  running  process  of  discovering  fresh  malicious  domains    -­‐>Constantly  querying  DNSDB  with  IP  inverse  lookups    Backend:  -­‐>DNSDB  constantly  fed  with  authorita@ve  traffic  from  all  resolvers            

             

Page 18: Fast Detection of New Malicious Domains using DNS

Whitelist  

•  IPs  hos@ng  spam  domains    A  lot  of  IPs  on  AS15149,  e.g.  216.169.100.133  

•  Shared  hos@ng  IPs  with  a  large  number  of  general  purpose  websites  

 

Page 19: Fast Detection of New Malicious Domains using DNS

Use  cases  •  Kelihos  fast  flux  botnet  •  Fake  AV  •  .pl  domains  used  for  Kovter  and  other  •  Godaddy  compromised  domains  •  Cryptolocker  CnC  discovery  •  NuclearPack  EK  •  Browlock  domains  

Page 20: Fast Detection of New Malicious Domains using DNS

Kelihos  Fast  flux  •  Kelihos  fast  flux  botnet  •  Up  un@l  Sep  16th,  about  984  domains  (and  subdomains)  

hosted  on  28757  IPs  hXp://labs.umbrella.com/2013/09/24/real-­‐@me-­‐monitoring-­‐kelihos-­‐fast-­‐flux-­‐botnet-­‐case-­‐study-­‐presented-­‐apwg-­‐ecrime-­‐2013/  

•  Sample  of  domains  of  Aug-­‐Sep  •  399  domains  on  8159  IPs  

Page 21: Fast Detection of New Malicious Domains using DNS
Page 22: Fast Detection of New Malicious Domains using DNS

Fake  AV  •  82.208.40.11  hos@ng  23502  Fake  AV,  Fake  SW  domains  for  

76  days    

hXps://www.virustotal.com/en/ip-­‐address/82.208.40.11/informa@on/  

•  Free  domains  under  cz.cc,  uni.me  •  176.31.125.91  hos@ng  6687  similar  domains  for  66  days  

Page 23: Fast Detection of New Malicious Domains using DNS

.pl  used  for  ransomware  •  Sample  of  .pl  domains  •  19267  domains  on  12  IPs  •  3  level  domains  

   f9photo.ucuphahnui.kepno.pl      95oishi.maimuofief.pisz.pl  

•  First  2  labels  are  DGAs  

•  Used  in  malver@sing  campaigns  on  adult  websites  leading  to  Exploit  kit  domains  and  Kovter  ransomware  dropping  hXp://www.malekal.com/2013/07/31/en-­‐urausy-­‐adulrriendzfinder-­‐malver@sing-­‐banner/  

from  malware.dontneedcoffee.com  

Page 24: Fast Detection of New Malicious Domains using DNS
Page 25: Fast Detection of New Malicious Domains using DNS

NuclearPack  EK    -­‐>1523  domains  on  198.50.225.113  •  2  level  domains  under  .biz  •  1st  label  is  random,  16  2LDs  registered  July  28th  •  hxxp://[email protected]:

59902/0e724s2d10467436c6149sce02712a.html  -­‐>1378  domains  on  198.50.235.198  •  2  level  domains  under  .biz  •  1st  label  is  random  •  hxxp://u5s1av.diwalipearl.biz:

55252/5a9b00e34d8b18cb571ba56a357cfafc.html  

Page 26: Fast Detection of New Malicious Domains using DNS

NuclearPack  EK    -­‐>198.50.235.200  became  ac@ve  on  Oct  15th  •  Already  hos@ng  400+  domains  •  hxxp://[email protected]:

44142/4078c813508ad60acc95d0744365c68c.html  •  Shiping  on  198.50.128.0/17  OVH  prefix  

Page 27: Fast Detection of New Malicious Domains using DNS

Compromised  GoDaddy  domains  •  Campaign  of  injec@ng  malicious  subdomains  (3LDs)  under  

legi@mate/compromised  Godaddy  domains  (2LDs)  •  5  IPs  hos@ng  800  subdomains  (3LDs)  over  10  days  in  Aug-­‐Sep      •  Used  to  serve  Cool  exploit  kit  through  CookieBomb  aXack  on  

compromised  websites  and  finally  drop  Reveton  hXp://quequero.org/2013/09/ac@ve-­‐cookiebomb-­‐cve-­‐2013-­‐2465-­‐reveton/    

•  Happened  before  in  2012  and  happening  again  hXp://nakedsecurity.sophos.com/2012/11/23/hacked-­‐go-­‐daddy-­‐ransomware/  

 

Page 28: Fast Detection of New Malicious Domains using DNS

Compromised  GoDaddy  domains  

Page 29: Fast Detection of New Malicious Domains using DNS

Cryptolocker  CnCs  •  Ransomware  released  early  September  2013  •  Encrypts  your  files  and  asks  for  a  $300  ransom  to  get  them  

back  •  2  ini@al  Cryptolocker  CnCs  were  picked  up  by  the  system  a  

day  before  they  were  published  on  Sep  11  

•  xeogrhxquuubt.com  

•  qaaepodedahnslq.org    

Page 30: Fast Detection of New Malicious Domains using DNS

Browlock  domains  •  Browser-­‐based  ransomware  targeted  at  countries  in  3  

different  con@nents  •  Example:  194.44.49.150  hos@ng  2629  subdomains  over  26  

days  

Page 31: Fast Detection of New Malicious Domains using DNS

Browlock  domains  

Page 32: Fast Detection of New Malicious Domains using DNS

Browlock  domains  (cont’d)  •  Browser-­‐based  ransomware  targeted  at  countries  in  3  

different  con@nents  •  193.169.87.15,  196.47.100.2,  over  a  period  of  13  days,  

hos@ng  8978  browlock  domains  and  domains  with  adult-­‐themed  names  that  redirect  to  browlock  

 

Page 33: Fast Detection of New Malicious Domains using DNS

Browlock  domains  (cont’d)  

Page 34: Fast Detection of New Malicious Domains using DNS

Conclusion  •  Ongoing  research  and  work  to  increase  coverage  and  

accuracy  of  early  detec@on  of  domains  before  they  deliver  aXacks  

•  Extend  coverage  to  shared  hos@ng  IPs  

•  Effec@ve  early  detec@on/protec@on  DNS-­‐based  system  •  Use  it  with  other  protec@on  methods:  AV,  IDS,  etc.  •  Experimenta@on  in  our  lab  with  streaming  technologies:  

Storm,  Kava,  Zeromq    -­‐>  Complementary  with  DNSDB-­‐based  detec@on  system  

Page 35: Fast Detection of New Malicious Domains using DNS

Contact  Info  •  Contact  me  at  [email protected]  if  you  are  interested  in:  •  Asking  ques@ons  •  Collabora@ng  

•  Follow  me  on  TwiXer  @DhiaLite  •  Blogs  hXp://labs.umbrella.com/author/dhia/  

Page 36: Fast Detection of New Malicious Domains using DNS

Thank  you    

(Q  &  A)