We-built-a-honeypot-and-p4wned-ransomware-developers-too

Christiaan Beek
Christiaan BeekAdvanced Threat Research - Office of the CTO at Intel Security
#RSAC
SESSION ID:SESSION ID:
Ben Potter
We Built a Honeypot and p4wned
Ransomware Developers Too
FLE-F02
Senior Security & Compliance Consultant
Amazon Web Services
@benji_potter
Christiaan Beek
Lead Scientist & Principal Engineer
McAfee
@ChristiaanBeek
#RSAC
The state of Ransomware
#RSAC
$a1={
51 53 55 8B 6C 24 10 56 57 6A 20 8B 45 00 8D 75
04 24 01 0C 01 46 89 45 00 C6 46 FF 03 C6 06 01
46 56 E8
}
$a2={
03 00 04 00 05 00 06 00 08 00 09 00 0A 00 0D 00
10 00 11 00 12 00 13 00 14 00 15 00 16 00 2F 00
30 00 31 00 32 00 33 00 34 00 35 00 36 00 37 00
38 00 39 00 3C 00 3D 00 3E 00 3F 00 40 00 41 00
44 00 45 00 46 00 62 00 63 00 64 00 66 00 67 00
68 00 69 00 6A 00 6B 00 84 00 87 00 88 00 96 00
FF 00 01 C0 02 C0 03 C0 04 C0 05 C0 06 C0 07 C0
08 C0 09 C0 0A C0 0B C0 0C C0 0D C0 0E C0 0F C0
10 C0 11 C0 12 C0 13 C0 14 C0 23 C0 24 C0 27 C0
2B C0 2C C0 FF FE
}
condition:
((uint16(0) == 0x5A4D)) and (filesize < 15000000) and
all of them
Remember WannaCry?
#RSAC
4
• Started by organized crime with affiliate programs
• Now open-sourced code available
• Buying ransomware-kits is easy
• Ransomware-as-a-Service programs
• Customer Satisfaction
Why is ransomware so successful?
#RSAC
New ransomware families 2016 - 2017
40
Jan Feb Mar Apr May
40 38
55
42
64
Dec
45
40
Nov
39
Oct
41
Jun
#RSAC
namespace hidden_tear_decrypter
{
public partial class Form1 : Form
{
string userName = Environment.UserName;
string userDir = "C:Users";
public Form1()
{
InitializeComponent();
}
public byte[] AES_Decrypt(byte[] bytesToBeDecrypted, byte[]
passwordBytes)
{
byte[] decryptedBytes = null;
// Set your salt here, change it to meet your flavor:
// The salt bytes must be at least 8 bytes.
byte[] saltBytes = new byte[] { 1, 2, 3, 4, 5, 6, 7, 8 };
Ransomware based on ‘one source-code’
Original source-code
Derived variants
#RSAC
Another example
$105k in a little more than a month…
#RSAC
Customer Support
10/4/2017
#RSAC
Who is behind Ransomware?
Let the code speak…..
#RSAC
No More Ransom!
#RSAC
Fightback Begins
10/4/2017
#RSAC
Demystifying the Problem
#RSAC
Decryption tools
• Decrypting over 57 ransomware families
• Prevented $ 17,5 Million USD going into criminal
pockets so far
• Multiple take-down operations and arrests
• More to come
#RSAC
Some “event” on May 12th Caused a little spike
#RSAC
Someone Is Not Happy
10/4/2017
#RSAC
Fake site asking for money to decrypt….
10/4/2017
#RSAC
#Hashtag Analysis
Analysis by SocialSafeguard: May 2017
17
#RSAC
Under Attack
#RSAC
Attack!
Of the attacks made to the site, approximately 95% of the attacks
came from IP’s that were a proxy or VPN service
A significant percentage of the attacks had specific signatures that
were easy to block
The day of launch was the “busiest” day
Does this stop ransomware?
Sadly no
— It stops the loss of information to third parties
— It does allow the blue team to defend the network more easily
#RSAC
Attack!
CDN:
Amazon
CloudFronT
DNS:
Amazon
Route 53
The Internet
Content:
Amazon S3
WAF:
AWS WAF
Barracuda
WAF Elastic Load
Balancing
Load
Balancing
Elastic Load
Balancing
Load
Balancing
Web Servers;
Auto scaled
#RSAC
Attack!
Use publicly available lists to block known bad IP’s and User Agents
Automatically block subsequent requests that behave “badly”
Obscure HTTP response codes – everything is 200
Know what “good” looks like– makes finding “bad” easy
Plan for the worst, then… – humans are the weakest link
Automate everything you can
Is Crypto Sheriff really PHP….
#RSAC
Interesting
CDN Reported Responses:
Hits 116,322,764 = hit cache
Misses 41,534,770 = missed cache eg CryptoSheriff
Error 51,37,011 = bad requests
Redirect 383,262 = http to https
Interesting Requests:
x0dx0a x0dx0a C_E_R_B_E_R
R_A_N_S_O_M_W_A_R_Ex0dx0a x0dx0a x0dx0a
#########################################################################
x0dx0a x0dx0a x0dx0a Cannot you find the files you
need?x0dx0a Is the content of the files that you looked for not
readable???x0dx0a x0dx0a It is normal because the files'
names, as well as the data in your filesx0dx0a have been
encrypted.x0dx0a x0dx0a ...
#RSAC
Interesting
More Interesting Requests:
x0dx0aJe doCUMeNTen, fOTO's, dAtAbAsES en anDERe bElaNgrijKE
bESTanDeN zIJN vERsLeUtelDx0dx0amet de sTErkstE eNCRYpTiE eN uNieke
sLEutEl, geGeNEReERd vOor deze
cOMpUTErx0dx0ax0dx0aPrIvxc3xa9 dEcRYPtIE sLEUtel iS
oPGeSLaGen op eEn geheIme seRVER eN nIeManD kan je x0dx0abestAnDEn
ontsLEUTEleN toTdaT eR beTaAld iS eN je de slEUtEl
ontVANgT.x0dx0ax0dx0aAlS je dE hOoFd loCK vEnSTEr zIEt, voLG
dan de instruCTiES op vAn dE locKER. ...
All your files have been encrypted!x0dx0ax0dx0aAll your
documents (databases, texts, images, videos, musics etc.) were encrypted. The
encryption was done using a secret key x0dx0athat is now on our
servers.x0dx0ax0dx0aTo decrypt your files you will need to
buy the secret key from us. We are the only on the world who can provide this
for you.x0dx0ax0dx0aNote that every 6 hours, a random file is
permanently deleted. The faster ...
#RSAC
Top Query Strings
Query #
nsextt=%250d%250ans%253anetsparker056650%253dvuln 14999
nsextt=%250ans%253anetsparker056650%253dvuln 14999
hTTp://r87.com/n 14995
http://r87.com/? 14995
utm_medium=blg&utm_source=kd_post_160725&utm_campaign=ww_promo 6373
utm_medium=smm&utm_source=fb_p_160725&utm_campaign=ww_nomoreransom_
facebook 3558
utm_medium=blg&utm_source=kd_post_160725&utm_campaign=us_kl_release 1861
platform=hootsuite 1600
utm_campaign=Ransomware&utm_source=CambsCops&utm_medium=Social+medi
a&utm_content=Ransomware 1455
utm_source=smm_tw&utm_medium=de_tw_o_0516 1440
#RSAC
Apply What You Have Learned Today
Choose DNS provider, secure registrar records
Use a CDN with WAF capability that scales
Defense in depth + obscurity
Too much visibility is never enough – take action
Whitelist vs Blacklist
Out-scaling attacks
1 of 25

Recommended

Cracking Salted Hashes by
Cracking Salted HashesCracking Salted Hashes
Cracking Salted Hashesn|u - The Open Security Community
501 views14 slides
End-to-End Analysis of a Domain Generating Algorithm Malware Family by
End-to-End Analysis of a Domain Generating Algorithm Malware FamilyEnd-to-End Analysis of a Domain Generating Algorithm Malware Family
End-to-End Analysis of a Domain Generating Algorithm Malware FamilyCrowdStrike
9K views62 slides
Php Security by
Php SecurityPhp Security
Php Securityricardophp
732 views37 slides
SSH: Seguranca no Acesso Remoto by
SSH: Seguranca no Acesso RemotoSSH: Seguranca no Acesso Remoto
SSH: Seguranca no Acesso RemotoTiago Cruz
1.4K views27 slides
Da APK al Golden Ticket by
Da APK al Golden TicketDa APK al Golden Ticket
Da APK al Golden TicketGiuseppe Trotta
419 views63 slides
Python Cryptography & Security by
Python Cryptography & SecurityPython Cryptography & Security
Python Cryptography & SecurityJose Manuel Ortega Candel
2.8K views61 slides

More Related Content

What's hot

An Introduction to PASETO Tokens by
An Introduction to PASETO TokensAn Introduction to PASETO Tokens
An Introduction to PASETO TokensAll Things Open
224 views21 slides
2018 colombia deconstruyendo y evolucionando la seguridad en servicios rest by
2018 colombia deconstruyendo y evolucionando la seguridad en servicios rest2018 colombia deconstruyendo y evolucionando la seguridad en servicios rest
2018 colombia deconstruyendo y evolucionando la seguridad en servicios restCésar Hernández
84 views104 slides
A curious case of broken dns responses - RIPE75 by
A curious case of broken dns responses - RIPE75A curious case of broken dns responses - RIPE75
A curious case of broken dns responses - RIPE75Babak Farrokhi
729 views23 slides
Cryptography With PHP by
Cryptography With PHPCryptography With PHP
Cryptography With PHPMark Niebergall
3.2K views102 slides
Salt Cryptography & Cracking Salted Hashes by fb1h2s by
Salt Cryptography & Cracking Salted Hashes by fb1h2sSalt Cryptography & Cracking Salted Hashes by fb1h2s
Salt Cryptography & Cracking Salted Hashes by fb1h2sn|u - The Open Security Community
4.3K views22 slides
We need t go deeper - Testing inception apps. by
We need t go deeper - Testing inception apps.We need t go deeper - Testing inception apps.
We need t go deeper - Testing inception apps.SecuRing
1.1K views78 slides

What's hot(18)

An Introduction to PASETO Tokens by All Things Open
An Introduction to PASETO TokensAn Introduction to PASETO Tokens
An Introduction to PASETO Tokens
All Things Open224 views
2018 colombia deconstruyendo y evolucionando la seguridad en servicios rest by César Hernández
2018 colombia deconstruyendo y evolucionando la seguridad en servicios rest2018 colombia deconstruyendo y evolucionando la seguridad en servicios rest
2018 colombia deconstruyendo y evolucionando la seguridad en servicios rest
A curious case of broken dns responses - RIPE75 by Babak Farrokhi
A curious case of broken dns responses - RIPE75A curious case of broken dns responses - RIPE75
A curious case of broken dns responses - RIPE75
Babak Farrokhi729 views
We need t go deeper - Testing inception apps. by SecuRing
We need t go deeper - Testing inception apps.We need t go deeper - Testing inception apps.
We need t go deeper - Testing inception apps.
SecuRing1.1K views
Code obfuscation, php shells & more by Mattias Geniar
Code obfuscation, php shells & moreCode obfuscation, php shells & more
Code obfuscation, php shells & more
Mattias Geniar11.2K views
TOR... ALL THE THINGS Whitepaper by CrowdStrike
TOR... ALL THE THINGS WhitepaperTOR... ALL THE THINGS Whitepaper
TOR... ALL THE THINGS Whitepaper
CrowdStrike2K views
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn... by APNIC
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...
APNIC336 views
Simplest-Ownage-Human-Observed… - Routers by Logicaltrust pl
 Simplest-Ownage-Human-Observed… - Routers Simplest-Ownage-Human-Observed… - Routers
Simplest-Ownage-Human-Observed… - Routers
Logicaltrust pl2.5K views
festival ICT 2013: Solid as diamond: use ruby in an web application penetrati... by festival ICT 2016
festival ICT 2013: Solid as diamond: use ruby in an web application penetrati...festival ICT 2013: Solid as diamond: use ruby in an web application penetrati...
festival ICT 2013: Solid as diamond: use ruby in an web application penetrati...
festival ICT 20162.5K views
Php through the eyes of a hoster by Combell NV
Php through the eyes of a hosterPhp through the eyes of a hoster
Php through the eyes of a hoster
Combell NV1.2K views
Raconte-moi X.509 : anatomie d'une autorité de certification by Jean-Christophe Sirot
Raconte-moi X.509 : anatomie d'une autorité de certificationRaconte-moi X.509 : anatomie d'une autorité de certification
Raconte-moi X.509 : anatomie d'une autorité de certification

Similar to We-built-a-honeypot-and-p4wned-ransomware-developers-too

SSL Securing Oracle DB by
SSL Securing Oracle DBSSL Securing Oracle DB
SSL Securing Oracle DBHarris Baskaran
929 views56 slides
RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies by
RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case StudiesRSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies
RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case StudiesWayne Huang
1.4K views40 slides
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a... by
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...EC-Council
392 views23 slides
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst... by
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...Amazon Web Services
1.1K views65 slides
String Comparison Surprises: Did Postgres lose my data? by
String Comparison Surprises: Did Postgres lose my data?String Comparison Surprises: Did Postgres lose my data?
String Comparison Surprises: Did Postgres lose my data?Jeremy Schneider
1 view86 slides
Lost in the Ether: How Ethereum Hacks Are Shaping the Blockchain Future by
Lost in the Ether: How Ethereum Hacks Are Shaping the Blockchain FutureLost in the Ether: How Ethereum Hacks Are Shaping the Blockchain Future
Lost in the Ether: How Ethereum Hacks Are Shaping the Blockchain FuturePriyanka Aash
236 views60 slides

Similar to We-built-a-honeypot-and-p4wned-ransomware-developers-too(20)

RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies by Wayne Huang
RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case StudiesRSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies
RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies
Wayne Huang1.4K views
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a... by EC-Council
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
EC-Council392 views
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst... by Amazon Web Services
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...
Amazon Web Services1.1K views
String Comparison Surprises: Did Postgres lose my data? by Jeremy Schneider
String Comparison Surprises: Did Postgres lose my data?String Comparison Surprises: Did Postgres lose my data?
String Comparison Surprises: Did Postgres lose my data?
Lost in the Ether: How Ethereum Hacks Are Shaping the Blockchain Future by Priyanka Aash
Lost in the Ether: How Ethereum Hacks Are Shaping the Blockchain FutureLost in the Ether: How Ethereum Hacks Are Shaping the Blockchain Future
Lost in the Ether: How Ethereum Hacks Are Shaping the Blockchain Future
Priyanka Aash236 views
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It! by Mike Schwartz
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!
Mike Schwartz1.7K views
DON'T Use Two-Factor Authentication...Unless You Need It! by Priyanka Aash
DON'T Use Two-Factor Authentication...Unless You Need It!DON'T Use Two-Factor Authentication...Unless You Need It!
DON'T Use Two-Factor Authentication...Unless You Need It!
Priyanka Aash398 views
Early Detection of Malicious Activity—How Well Do You Know Your DNS? by Priyanka Aash
Early Detection of Malicious Activity—How Well Do You Know Your DNS?Early Detection of Malicious Activity—How Well Do You Know Your DNS?
Early Detection of Malicious Activity—How Well Do You Know Your DNS?
Priyanka Aash489 views
Introduction To Encryption in Lasso 8.5 by bilcorry
Introduction To Encryption in Lasso 8.5Introduction To Encryption in Lasso 8.5
Introduction To Encryption in Lasso 8.5
bilcorry1.3K views
DevOOPS: Attacks and Defenses for DevOps Toolchains by Chris Gates
DevOOPS: Attacks and Defenses for DevOps ToolchainsDevOOPS: Attacks and Defenses for DevOps Toolchains
DevOOPS: Attacks and Defenses for DevOps Toolchains
Chris Gates4.6K views
Jose Selvi - Side-Channels Uncovered [rootedvlc2018] by RootedCON
Jose Selvi - Side-Channels Uncovered [rootedvlc2018]Jose Selvi - Side-Channels Uncovered [rootedvlc2018]
Jose Selvi - Side-Channels Uncovered [rootedvlc2018]
RootedCON234 views
Django SEM by Gandi24
Django SEMDjango SEM
Django SEM
Gandi246K views
HTTP For the Good or the Bad by Xavier Mertens
HTTP For the Good or the BadHTTP For the Good or the Bad
HTTP For the Good or the Bad
Xavier Mertens4.3K views
us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-La... by sonjeku1
us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-La...us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-La...
us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-La...
sonjeku191 views
Dreaming of IoCs Adding Time Context to Threat Intelligence by Priyanka Aash
Dreaming of IoCs Adding Time Context to Threat IntelligenceDreaming of IoCs Adding Time Context to Threat Intelligence
Dreaming of IoCs Adding Time Context to Threat Intelligence
Priyanka Aash1.4K views
BalCCon2k18 - Towards the perfect cryptocurrency wallet by Nemanja Nikodijević
BalCCon2k18 - Towards the perfect cryptocurrency walletBalCCon2k18 - Towards the perfect cryptocurrency wallet
BalCCon2k18 - Towards the perfect cryptocurrency wallet

More from Christiaan Beek

3871778 by
38717783871778
3871778Christiaan Beek
275 views35 slides
"There's a pot of Bitcoins behind the ransomware rainbow" by
"There's a pot of Bitcoins behind the ransomware rainbow""There's a pot of Bitcoins behind the ransomware rainbow"
"There's a pot of Bitcoins behind the ransomware rainbow"Christiaan Beek
2.1K views36 slides
The 4horsemen of ics secapocalypse by
The 4horsemen of ics secapocalypseThe 4horsemen of ics secapocalypse
The 4horsemen of ics secapocalypseChristiaan Beek
1.1K views29 slides
From hybernation file to malware analysis with volatility by
From hybernation file to malware analysis with volatilityFrom hybernation file to malware analysis with volatility
From hybernation file to malware analysis with volatilityChristiaan Beek
2.7K views2 slides
Offensive malware usage and defense by
Offensive malware usage and defenseOffensive malware usage and defense
Offensive malware usage and defenseChristiaan Beek
5.1K views42 slides
Taming worms, rats, dragons & more by
Taming worms, rats, dragons & moreTaming worms, rats, dragons & more
Taming worms, rats, dragons & moreChristiaan Beek
1.6K views79 slides

More from Christiaan Beek(6)

"There's a pot of Bitcoins behind the ransomware rainbow" by Christiaan Beek
"There's a pot of Bitcoins behind the ransomware rainbow""There's a pot of Bitcoins behind the ransomware rainbow"
"There's a pot of Bitcoins behind the ransomware rainbow"
Christiaan Beek2.1K views
The 4horsemen of ics secapocalypse by Christiaan Beek
The 4horsemen of ics secapocalypseThe 4horsemen of ics secapocalypse
The 4horsemen of ics secapocalypse
Christiaan Beek1.1K views
From hybernation file to malware analysis with volatility by Christiaan Beek
From hybernation file to malware analysis with volatilityFrom hybernation file to malware analysis with volatility
From hybernation file to malware analysis with volatility
Christiaan Beek2.7K views
Offensive malware usage and defense by Christiaan Beek
Offensive malware usage and defenseOffensive malware usage and defense
Offensive malware usage and defense
Christiaan Beek5.1K views
Taming worms, rats, dragons & more by Christiaan Beek
Taming worms, rats, dragons & moreTaming worms, rats, dragons & more
Taming worms, rats, dragons & more
Christiaan Beek1.6K views

Recently uploaded

Audience profile.pptx by
Audience profile.pptxAudience profile.pptx
Audience profile.pptxMollyBrown86
12 views2 slides
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲 by
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲Infosec train
7 views6 slides
UiPath Document Understanding_Day 2.pptx by
UiPath Document Understanding_Day 2.pptxUiPath Document Understanding_Day 2.pptx
UiPath Document Understanding_Day 2.pptxRohitRadhakrishnan8
282 views21 slides
DU Series - Day 4.pptx by
DU Series - Day 4.pptxDU Series - Day 4.pptx
DU Series - Day 4.pptxUiPathCommunity
94 views28 slides
Building trust in our information ecosystem: who do we trust in an emergency by
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergencyTina Purnat
85 views18 slides
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf by
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdfIGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdfRIPE NCC
15 views11 slides

Recently uploaded(20)

𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲 by Infosec train
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲
Infosec train7 views
Building trust in our information ecosystem: who do we trust in an emergency by Tina Purnat
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergency
Tina Purnat85 views
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf by RIPE NCC
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdfIGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf
RIPE NCC15 views
We see everywhere that many people are talking about technology.docx by ssuserc5935b
We see everywhere that many people are talking about technology.docxWe see everywhere that many people are talking about technology.docx
We see everywhere that many people are talking about technology.docx
ssuserc5935b6 views
UiPath Document Understanding_Day 3.pptx by UiPathCommunity
UiPath Document Understanding_Day 3.pptxUiPath Document Understanding_Day 3.pptx
UiPath Document Understanding_Day 3.pptx
UiPathCommunity95 views
Serverless cloud architecture patterns by Jimmy Dahlqvist
Serverless cloud architecture patternsServerless cloud architecture patterns
Serverless cloud architecture patterns
Jimmy Dahlqvist17 views
google forms survey (1).pptx by MollyBrown86
google forms survey (1).pptxgoogle forms survey (1).pptx
google forms survey (1).pptx
MollyBrown8614 views
AI Powered event-driven translation bot by Jimmy Dahlqvist
AI Powered event-driven translation botAI Powered event-driven translation bot
AI Powered event-driven translation bot
Jimmy Dahlqvist16 views
PORTFOLIO 1 (Bret Michael Pepito).pdf by brejess0410
PORTFOLIO 1 (Bret Michael Pepito).pdfPORTFOLIO 1 (Bret Michael Pepito).pdf
PORTFOLIO 1 (Bret Michael Pepito).pdf
brejess04107 views
IETF 118: Starlink Protocol Performance by APNIC
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol Performance
APNIC124 views
Existing documentaries (1).docx by MollyBrown86
Existing documentaries (1).docxExisting documentaries (1).docx
Existing documentaries (1).docx
MollyBrown8613 views

We-built-a-honeypot-and-p4wned-ransomware-developers-too

  • 1. #RSAC SESSION ID:SESSION ID: Ben Potter We Built a Honeypot and p4wned Ransomware Developers Too FLE-F02 Senior Security & Compliance Consultant Amazon Web Services @benji_potter Christiaan Beek Lead Scientist & Principal Engineer McAfee @ChristiaanBeek
  • 2. #RSAC The state of Ransomware
  • 3. #RSAC $a1={ 51 53 55 8B 6C 24 10 56 57 6A 20 8B 45 00 8D 75 04 24 01 0C 01 46 89 45 00 C6 46 FF 03 C6 06 01 46 56 E8 } $a2={ 03 00 04 00 05 00 06 00 08 00 09 00 0A 00 0D 00 10 00 11 00 12 00 13 00 14 00 15 00 16 00 2F 00 30 00 31 00 32 00 33 00 34 00 35 00 36 00 37 00 38 00 39 00 3C 00 3D 00 3E 00 3F 00 40 00 41 00 44 00 45 00 46 00 62 00 63 00 64 00 66 00 67 00 68 00 69 00 6A 00 6B 00 84 00 87 00 88 00 96 00 FF 00 01 C0 02 C0 03 C0 04 C0 05 C0 06 C0 07 C0 08 C0 09 C0 0A C0 0B C0 0C C0 0D C0 0E C0 0F C0 10 C0 11 C0 12 C0 13 C0 14 C0 23 C0 24 C0 27 C0 2B C0 2C C0 FF FE } condition: ((uint16(0) == 0x5A4D)) and (filesize < 15000000) and all of them Remember WannaCry?
  • 4. #RSAC 4 • Started by organized crime with affiliate programs • Now open-sourced code available • Buying ransomware-kits is easy • Ransomware-as-a-Service programs • Customer Satisfaction Why is ransomware so successful?
  • 5. #RSAC New ransomware families 2016 - 2017 40 Jan Feb Mar Apr May 40 38 55 42 64 Dec 45 40 Nov 39 Oct 41 Jun
  • 6. #RSAC namespace hidden_tear_decrypter { public partial class Form1 : Form { string userName = Environment.UserName; string userDir = "C:Users"; public Form1() { InitializeComponent(); } public byte[] AES_Decrypt(byte[] bytesToBeDecrypted, byte[] passwordBytes) { byte[] decryptedBytes = null; // Set your salt here, change it to meet your flavor: // The salt bytes must be at least 8 bytes. byte[] saltBytes = new byte[] { 1, 2, 3, 4, 5, 6, 7, 8 }; Ransomware based on ‘one source-code’ Original source-code Derived variants
  • 7. #RSAC Another example $105k in a little more than a month…
  • 9. #RSAC Who is behind Ransomware? Let the code speak…..
  • 13. #RSAC Decryption tools • Decrypting over 57 ransomware families • Prevented $ 17,5 Million USD going into criminal pockets so far • Multiple take-down operations and arrests • More to come
  • 14. #RSAC Some “event” on May 12th Caused a little spike
  • 15. #RSAC Someone Is Not Happy 10/4/2017
  • 16. #RSAC Fake site asking for money to decrypt…. 10/4/2017
  • 17. #RSAC #Hashtag Analysis Analysis by SocialSafeguard: May 2017 17
  • 19. #RSAC Attack! Of the attacks made to the site, approximately 95% of the attacks came from IP’s that were a proxy or VPN service A significant percentage of the attacks had specific signatures that were easy to block The day of launch was the “busiest” day Does this stop ransomware? Sadly no — It stops the loss of information to third parties — It does allow the blue team to defend the network more easily
  • 20. #RSAC Attack! CDN: Amazon CloudFronT DNS: Amazon Route 53 The Internet Content: Amazon S3 WAF: AWS WAF Barracuda WAF Elastic Load Balancing Load Balancing Elastic Load Balancing Load Balancing Web Servers; Auto scaled
  • 21. #RSAC Attack! Use publicly available lists to block known bad IP’s and User Agents Automatically block subsequent requests that behave “badly” Obscure HTTP response codes – everything is 200 Know what “good” looks like– makes finding “bad” easy Plan for the worst, then… – humans are the weakest link Automate everything you can Is Crypto Sheriff really PHP….
  • 22. #RSAC Interesting CDN Reported Responses: Hits 116,322,764 = hit cache Misses 41,534,770 = missed cache eg CryptoSheriff Error 51,37,011 = bad requests Redirect 383,262 = http to https Interesting Requests: x0dx0a x0dx0a C_E_R_B_E_R R_A_N_S_O_M_W_A_R_Ex0dx0a x0dx0a x0dx0a ######################################################################### x0dx0a x0dx0a x0dx0a Cannot you find the files you need?x0dx0a Is the content of the files that you looked for not readable???x0dx0a x0dx0a It is normal because the files' names, as well as the data in your filesx0dx0a have been encrypted.x0dx0a x0dx0a ...
  • 23. #RSAC Interesting More Interesting Requests: x0dx0aJe doCUMeNTen, fOTO's, dAtAbAsES en anDERe bElaNgrijKE bESTanDeN zIJN vERsLeUtelDx0dx0amet de sTErkstE eNCRYpTiE eN uNieke sLEutEl, geGeNEReERd vOor deze cOMpUTErx0dx0ax0dx0aPrIvxc3xa9 dEcRYPtIE sLEUtel iS oPGeSLaGen op eEn geheIme seRVER eN nIeManD kan je x0dx0abestAnDEn ontsLEUTEleN toTdaT eR beTaAld iS eN je de slEUtEl ontVANgT.x0dx0ax0dx0aAlS je dE hOoFd loCK vEnSTEr zIEt, voLG dan de instruCTiES op vAn dE locKER. ... All your files have been encrypted!x0dx0ax0dx0aAll your documents (databases, texts, images, videos, musics etc.) were encrypted. The encryption was done using a secret key x0dx0athat is now on our servers.x0dx0ax0dx0aTo decrypt your files you will need to buy the secret key from us. We are the only on the world who can provide this for you.x0dx0ax0dx0aNote that every 6 hours, a random file is permanently deleted. The faster ...
  • 24. #RSAC Top Query Strings Query # nsextt=%250d%250ans%253anetsparker056650%253dvuln 14999 nsextt=%250ans%253anetsparker056650%253dvuln 14999 hTTp://r87.com/n 14995 http://r87.com/? 14995 utm_medium=blg&utm_source=kd_post_160725&utm_campaign=ww_promo 6373 utm_medium=smm&utm_source=fb_p_160725&utm_campaign=ww_nomoreransom_ facebook 3558 utm_medium=blg&utm_source=kd_post_160725&utm_campaign=us_kl_release 1861 platform=hootsuite 1600 utm_campaign=Ransomware&utm_source=CambsCops&utm_medium=Social+medi a&utm_content=Ransomware 1455 utm_source=smm_tw&utm_medium=de_tw_o_0516 1440
  • 25. #RSAC Apply What You Have Learned Today Choose DNS provider, secure registrar records Use a CDN with WAF capability that scales Defense in depth + obscurity Too much visibility is never enough – take action Whitelist vs Blacklist Out-scaling attacks