SlideShare a Scribd company logo
Behind the Scenes:
The Industry of Social Media Manipulation Driven by Malware
GoSecure Research
Masarah Paquet-Clouston, Olivier Bilodeau
Back in 2015-2016
Linux/Moose ?
Linux/Moose
An IoT botnet that
conducts social
media
manipulation
Social Media Manipulation
The Ecosystem of Social
Media Manipulation
Presentation is
about:
•A four-year long
investigation
•Various
investigative
techniques
•A mapping of all
actors involved
•Affects routers / Internet of Things (IoT)
• Embedded Linux systems with busybox userland
•Worm-like behavior
• Telnet credential brute force
•Payload: Proxy service
• SOCKSv4/v5, HTTP, HTTPS
Linux/Moose
Honeypots
• Software-based
• Low interaction
• Side-loaded an ARM
virtual machine
• Which we infected
HTTPS Man-in-the-Middle (MITM) Attack
Accessed the
raw traffic!
What did we have?
•Several infected hosts actively used by
operators
•HTTPS traffic in plaintext
•C&C traffic
•Publicly available seller market
Whitelisted IPs
Reseller model?
Variables Honeypots used
Websites targeted
TLS fingerprints
User agents
API calls
Timestamps
Accounts created on social networks
Accounts followed on social networks
Traffic analysis
Whitelisted IP
Fake account
Buyer
Where do we stand?
•Fake accounts
•Pinned to a given honeypot
•Originate from a single whitelisted IP address
•Whitelisted IP addresses
•Runs on Windows servers
•RDP is actively used
Automation Software
• We tried to find the Linux/Moose provider
• Based on User-Agents: Mobile and Desktop
• Socks proxy support
• Found different features
• Proxy-type HTTP / Socks
• Per account User-Agents (Mobile and Desktop)
• Custom browsing patterns
• Found different business models
• Unlimited accounts
• One-time fee / Pay-per-month / Pay-per-account
Automation Software Summary
Architecture Browser Packer Our Target?
GramDominator
/ Socinator
.Net CEF Not packed No socks proxy
support
FollowAdder Xojo /
REALBasic
CEF Obscure Xojo
framework
No unlimited
accounts
MassPlanner C++ / .Net CEF Themida /
WinLicense 2.x
Only one overridable
User-Agent
FollowingLike .Net BotSocial, a
custom
browser in .Net
ILProtector Custom User-Agent
feature too recent
FollowLiker Java compiled
to native code
HtmlUnit Java
Library
Excelsior JET Doesn’t interact with
Instagram similarly
Where do we stand?
Found several automation software vendors
Reseller model is not at the
botnet level
Found in the decrypted traffic
Reseller panels
•Sell popularity
in bulk
•All look alike
Simple
Investigation
N=343
Fingerprint of the web
application
Domain registration
information
HTML content
IP address
Reseller Panel Providers
All in one solution :
•Ready to go software
•Provides web hosting
•Domain name
sometimes included
Features:
•API to receive orders
•API to send orders
•Track your workers
Several conversations by reseller panel owners
on BlackHatWorld about THE main provider
Several conversations by reseller panel owners
on BlackHatWorld about THE main provider
Several conversations by reseller panel owners
on BlackHatWorld about THE main provider
Several conversations by reseller panel owners
on BlackHatWorld about THE main provider
Where do we stand?
•A system of resellers and reseller panel providers
•Automation software to create and orchestrate
fake accounts
Working around Blocks
• Automation software supports proxy lists
A New Actor Enters the Game
Previously Studied Botnet Residential Proxy Services
Shocking Business Model
Storm Proxies
• Received IPs from USA:
Kansas City, Lincoln NE
and Sunnyvale CA
• ISPs have conflicting
information:
• Digital Energy
Technologies Chile with
Org Host1Plus
• Victoria Mahe with Org
Joe's Datacenter, LLC
• Traceroute leads to the
US
Storm Proxies (cont)
• Uses Squid for
proxying
• Doesn’t protect scans
to localhost
• Linux system
• Most likely Debian
Jessie
• Exim 4.84_2
• Squid 3.4.8
RSocks
• Received IPs all
from same subnet
in Russia
• ISP: Adman LLC
• Traceroute
confirms Russia
RSocks (cont)
• Exposes SSH on 3389
• Doesn’t protect scans
to localhost
• Unable to fingerprint
proxy service
• Most likely Debian
Jessie
• SSH banner deb8u7
Valar Solutions
• Received a single IP from
France
• Scaleway, Dedibox
• Traffic goes out an IPv6
address in the USA
• AT&T Internet Services
Valar (cont)
• Uses 3Proxy
• on 1067 non-continuous ports
• Identified by nmap
• Confirmed by error message
strings that match source code
• Protects from localhost scans
• Both IPv4 and IPv6
• IPv6 sealed from outside
• Proxy entry is Debian 9
• Nginx + OpenSSH
Residential Proxy Providers Summary
Infrastructure Geoip / Whois Powered by
Malware?
Luminati Leveraging willing
participants’ phones
Unknown Unlikely
Storm Proxies Debian 8 (Jessie) with Squid Misleading
information
Unlikely
RSocks Debian 8 (Jessie) with
unknown proxy
Small unknown ISP Unlikely
High Proxies CentOS/RHEL 7 with Squid Misleading
information
Unlikely
Valar Solutions Debian 9 (Stretch) with
3Proxy. Tunnel between
France and USA. IPv6.
Legit AT&T Internet
Services
Unlikely
For More
Where do we stand?
•IoT botnet or residential proxy services
•Automation software
•Reseller panels and reseller panel providers
Who buys from reseller panels?
Potential Buyers
Linux/Moose
86% of the relayed traffic focused on Instagram
List of potential customers:
522 accounts
Method:
Content analysis
Entertainment Industry (20%)
Selling Products and Services (21%)
Personal Profiles (26%)
The Unexpected Ones
The Fascinating Ones
We made an experiment…
Linux/Moose’s Targeted Social Networks
In 2016
$95
$22.5
Squirrel buys 10,000 followers on Instagram
< $1.8
Cheapest reseller panel
N = 36
N = 33
$47/month
$10-60
/month
2$/proxy
/month
Meanwhile…
N = 3
N = 15
N = 7
To fulfill an order of 100,000 followers
on Instagram
Each bot (honeypot) performed, on average,
1,186 follows per month on Instagram
85 bots per month
or
2,529 bots a day 2$/proxy
/month
Linux/Moose makes 100,000 follows
on Instagram per day
Creates 100k followers per day at
$22.5/10,000 follows
$250 per day
$82,125 per year
Median price
reseller
-> $1,000 a day at $22.5/10,000 follows
-> That is 45 orders of 10,000 follows
-> 450,000 follows a day
-> 11 382 bots
1 client = $365 000/year
What to do
next?
Regulate the sale of social
media manipulation
Policy makers:
Target the middle-man
Law enforcement:
Social networks:
Continue to increase the costs of creating
fake likes and follows
Individuals (you)
Focus on the content rather
than the container!
What is this person bringing
to society? Is this post legit?
What are the sources?
Thank you! Questions?
Olivier Bilodeau
obilodeau@gosecure.net
@obilodeau
Masarah Paquet-Clouston
mcpc@gosecure.net
@masarahclouston
Artwork
https://gosecure.net/blog/ https://nsec.io/

More Related Content

What's hot

FIWARE Global Summit - Connecting to IoT
FIWARE Global Summit - Connecting to IoTFIWARE Global Summit - Connecting to IoT
FIWARE Global Summit - Connecting to IoT
FIWARE
 
FIWARE Tech Summit - FIWARE Connecting to IoT
FIWARE Tech Summit - FIWARE Connecting to IoTFIWARE Tech Summit - FIWARE Connecting to IoT
FIWARE Tech Summit - FIWARE Connecting to IoT
FIWARE
 
Blockchain IoT Night / 25th Oct 2017
Blockchain IoT Night / 25th Oct 2017Blockchain IoT Night / 25th Oct 2017
Blockchain IoT Night / 25th Oct 2017
Lothar Wieske
 
Microwaves vs Humans: How to secure your cloud
Microwaves vs Humans: How to secure your cloudMicrowaves vs Humans: How to secure your cloud
Microwaves vs Humans: How to secure your cloud
dlapiduz
 
Delivering a New Architecture for Security: Blockchain + Trusted Computing
Delivering a New Architecture for Security: Blockchain + Trusted ComputingDelivering a New Architecture for Security: Blockchain + Trusted Computing
Delivering a New Architecture for Security: Blockchain + Trusted Computing
Rivetz
 
CNIT 141: 13. TLS
CNIT 141: 13. TLSCNIT 141: 13. TLS
CNIT 141: 13. TLS
Sam Bowne
 
"How overlay networks can make public clouds your global WAN" from LASCON 2013
"How overlay networks can make public clouds your global WAN" from LASCON 2013"How overlay networks can make public clouds your global WAN" from LASCON 2013
"How overlay networks can make public clouds your global WAN" from LASCON 2013
Ryan Koop
 
Splunk - обзор решения
Splunk - обзор решенияSplunk - обзор решения
Splunk - обзор решения
Vasily Mikhailov
 
Hacking Airwaves with Pineapples
Hacking Airwaves with PineapplesHacking Airwaves with Pineapples
Hacking Airwaves with Pineapples
Hostway|HOSTING
 
FreeSBC - Getting Started
FreeSBC - Getting StartedFreeSBC - Getting Started
FreeSBC - Getting Started
Alan Percy
 
Building the Network - The Things Conference 2018
Building the Network - The Things Conference 2018Building the Network - The Things Conference 2018
Building the Network - The Things Conference 2018
Johan Stokking
 
Cybesecurity of the IoT
Cybesecurity of the IoTCybesecurity of the IoT
Cybesecurity of the IoT
Altoros
 
Ending the Tyranny of Expensive Security Tools: A New Hope
Ending the Tyranny of Expensive Security Tools: A New HopeEnding the Tyranny of Expensive Security Tools: A New Hope
Ending the Tyranny of Expensive Security Tools: A New Hope
Michele Chubirka
 
Firepower ngfw internet
Firepower ngfw internetFirepower ngfw internet
Firepower ngfw internet
Rony Melo
 
Creating Provable Cybersecurity with Blockchain and Trusted Computing
Creating Provable Cybersecurity with Blockchain and Trusted ComputingCreating Provable Cybersecurity with Blockchain and Trusted Computing
Creating Provable Cybersecurity with Blockchain and Trusted Computing
Rivetz
 
IoT Seminar (Jan. 2016) - (3) benjamin cabé - building an open internet of th...
IoT Seminar (Jan. 2016) - (3) benjamin cabé - building an open internet of th...IoT Seminar (Jan. 2016) - (3) benjamin cabé - building an open internet of th...
IoT Seminar (Jan. 2016) - (3) benjamin cabé - building an open internet of th...
Open Mobile Alliance
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Alan Percy
 
Implementation of IPsec with PKI
Implementation of IPsec with PKIImplementation of IPsec with PKI
Implementation of IPsec with PKI
Sukhpreet Singh
 

What's hot (18)

FIWARE Global Summit - Connecting to IoT
FIWARE Global Summit - Connecting to IoTFIWARE Global Summit - Connecting to IoT
FIWARE Global Summit - Connecting to IoT
 
FIWARE Tech Summit - FIWARE Connecting to IoT
FIWARE Tech Summit - FIWARE Connecting to IoTFIWARE Tech Summit - FIWARE Connecting to IoT
FIWARE Tech Summit - FIWARE Connecting to IoT
 
Blockchain IoT Night / 25th Oct 2017
Blockchain IoT Night / 25th Oct 2017Blockchain IoT Night / 25th Oct 2017
Blockchain IoT Night / 25th Oct 2017
 
Microwaves vs Humans: How to secure your cloud
Microwaves vs Humans: How to secure your cloudMicrowaves vs Humans: How to secure your cloud
Microwaves vs Humans: How to secure your cloud
 
Delivering a New Architecture for Security: Blockchain + Trusted Computing
Delivering a New Architecture for Security: Blockchain + Trusted ComputingDelivering a New Architecture for Security: Blockchain + Trusted Computing
Delivering a New Architecture for Security: Blockchain + Trusted Computing
 
CNIT 141: 13. TLS
CNIT 141: 13. TLSCNIT 141: 13. TLS
CNIT 141: 13. TLS
 
"How overlay networks can make public clouds your global WAN" from LASCON 2013
"How overlay networks can make public clouds your global WAN" from LASCON 2013"How overlay networks can make public clouds your global WAN" from LASCON 2013
"How overlay networks can make public clouds your global WAN" from LASCON 2013
 
Splunk - обзор решения
Splunk - обзор решенияSplunk - обзор решения
Splunk - обзор решения
 
Hacking Airwaves with Pineapples
Hacking Airwaves with PineapplesHacking Airwaves with Pineapples
Hacking Airwaves with Pineapples
 
FreeSBC - Getting Started
FreeSBC - Getting StartedFreeSBC - Getting Started
FreeSBC - Getting Started
 
Building the Network - The Things Conference 2018
Building the Network - The Things Conference 2018Building the Network - The Things Conference 2018
Building the Network - The Things Conference 2018
 
Cybesecurity of the IoT
Cybesecurity of the IoTCybesecurity of the IoT
Cybesecurity of the IoT
 
Ending the Tyranny of Expensive Security Tools: A New Hope
Ending the Tyranny of Expensive Security Tools: A New HopeEnding the Tyranny of Expensive Security Tools: A New Hope
Ending the Tyranny of Expensive Security Tools: A New Hope
 
Firepower ngfw internet
Firepower ngfw internetFirepower ngfw internet
Firepower ngfw internet
 
Creating Provable Cybersecurity with Blockchain and Trusted Computing
Creating Provable Cybersecurity with Blockchain and Trusted ComputingCreating Provable Cybersecurity with Blockchain and Trusted Computing
Creating Provable Cybersecurity with Blockchain and Trusted Computing
 
IoT Seminar (Jan. 2016) - (3) benjamin cabé - building an open internet of th...
IoT Seminar (Jan. 2016) - (3) benjamin cabé - building an open internet of th...IoT Seminar (Jan. 2016) - (3) benjamin cabé - building an open internet of th...
IoT Seminar (Jan. 2016) - (3) benjamin cabé - building an open internet of th...
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
 
Implementation of IPsec with PKI
Implementation of IPsec with PKIImplementation of IPsec with PKI
Implementation of IPsec with PKI
 

Similar to DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of social media manipulation driven by malware

Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to execution
AlgoSec
 
Hyperledger Blockchain
Hyperledger BlockchainHyperledger Blockchain
Hyperledger Blockchain
Afraz Khan
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Abhinav Biswas
 
AtlSecCon 2016
AtlSecCon 2016AtlSecCon 2016
AtlSecCon 2016
Earl Carter
 
Cloud Security Primer - F5 Networks
Cloud Security Primer - F5 NetworksCloud Security Primer - F5 Networks
Cloud Security Primer - F5 Networks
Harry Gunns
 
Distributed Sensor Data Contextualization for Threat Intelligence Analysis
Distributed Sensor Data Contextualization for Threat Intelligence AnalysisDistributed Sensor Data Contextualization for Threat Intelligence Analysis
Distributed Sensor Data Contextualization for Threat Intelligence Analysis
Jason Trost
 
Sntvt sentivate presentation_blockfyre
Sntvt sentivate presentation_blockfyreSntvt sentivate presentation_blockfyre
Sntvt sentivate presentation_blockfyre
Jonathan Habicht
 
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Hacken_Ecosystem
 
Open Source All The Things
Open Source All The ThingsOpen Source All The Things
Open Source All The Things
All Things Open
 
The evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivityThe evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivity
APNIC
 
Weaponizing Intelligence: Interdiction in Today’s Threat Landscape
Weaponizing Intelligence:  Interdiction in Today’s Threat LandscapeWeaponizing Intelligence:  Interdiction in Today’s Threat Landscape
Weaponizing Intelligence: Interdiction in Today’s Threat Landscape
Priyanka Aash
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
b coatesworth
 
20130226 How Personal Is Your Cloud?
20130226 How Personal Is Your Cloud?20130226 How Personal Is Your Cloud?
20130226 How Personal Is Your Cloud?
T.Rob Wyatt
 
Cyberscout Presentation
Cyberscout PresentationCyberscout Presentation
Cyberscout Presentation
Firoze Hussain
 
Automation Attacks At Scale
Automation Attacks At ScaleAutomation Attacks At Scale
Automation Attacks At Scale
Mayank Dhiman
 
Deep and Dark internet Safari, How to hire a hacker? Robbrecht van Amerongen
Deep and Dark internet Safari, How to hire a hacker? Robbrecht van AmerongenDeep and Dark internet Safari, How to hire a hacker? Robbrecht van Amerongen
Deep and Dark internet Safari, How to hire a hacker? Robbrecht van Amerongen
Getting value from IoT, Integration and Data Analytics
 
Hyperledger community update February 2018
Hyperledger  community update   February 2018Hyperledger  community update   February 2018
Hyperledger community update February 2018
Christopher Ferris
 
Hyperledger community update Feb 20, 2018
Hyperledger community update Feb 20, 2018Hyperledger community update Feb 20, 2018
Hyperledger community update Feb 20, 2018
Arnaud Le Hors
 
Cloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and TechniquesCloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and Techniques
Gokul Alex
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
BeyondTrust
 

Similar to DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of social media manipulation driven by malware (20)

Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to execution
 
Hyperledger Blockchain
Hyperledger BlockchainHyperledger Blockchain
Hyperledger Blockchain
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
AtlSecCon 2016
AtlSecCon 2016AtlSecCon 2016
AtlSecCon 2016
 
Cloud Security Primer - F5 Networks
Cloud Security Primer - F5 NetworksCloud Security Primer - F5 Networks
Cloud Security Primer - F5 Networks
 
Distributed Sensor Data Contextualization for Threat Intelligence Analysis
Distributed Sensor Data Contextualization for Threat Intelligence AnalysisDistributed Sensor Data Contextualization for Threat Intelligence Analysis
Distributed Sensor Data Contextualization for Threat Intelligence Analysis
 
Sntvt sentivate presentation_blockfyre
Sntvt sentivate presentation_blockfyreSntvt sentivate presentation_blockfyre
Sntvt sentivate presentation_blockfyre
 
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
 
Open Source All The Things
Open Source All The ThingsOpen Source All The Things
Open Source All The Things
 
The evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivityThe evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivity
 
Weaponizing Intelligence: Interdiction in Today’s Threat Landscape
Weaponizing Intelligence:  Interdiction in Today’s Threat LandscapeWeaponizing Intelligence:  Interdiction in Today’s Threat Landscape
Weaponizing Intelligence: Interdiction in Today’s Threat Landscape
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
20130226 How Personal Is Your Cloud?
20130226 How Personal Is Your Cloud?20130226 How Personal Is Your Cloud?
20130226 How Personal Is Your Cloud?
 
Cyberscout Presentation
Cyberscout PresentationCyberscout Presentation
Cyberscout Presentation
 
Automation Attacks At Scale
Automation Attacks At ScaleAutomation Attacks At Scale
Automation Attacks At Scale
 
Deep and Dark internet Safari, How to hire a hacker? Robbrecht van Amerongen
Deep and Dark internet Safari, How to hire a hacker? Robbrecht van AmerongenDeep and Dark internet Safari, How to hire a hacker? Robbrecht van Amerongen
Deep and Dark internet Safari, How to hire a hacker? Robbrecht van Amerongen
 
Hyperledger community update February 2018
Hyperledger  community update   February 2018Hyperledger  community update   February 2018
Hyperledger community update February 2018
 
Hyperledger community update Feb 20, 2018
Hyperledger community update Feb 20, 2018Hyperledger community update Feb 20, 2018
Hyperledger community update Feb 20, 2018
 
Cloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and TechniquesCloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and Techniques
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
 

More from Felipe Prado

DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryDEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
Felipe Prado
 
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
Felipe Prado
 
DEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsDEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got ants
Felipe Prado
 
DEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionDEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryption
Felipe Prado
 
DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101
Felipe Prado
 
DEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentDEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a government
Felipe Prado
 
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareDEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
Felipe Prado
 
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
Felipe Prado
 
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationDEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
Felipe Prado
 
DEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceDEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interface
Felipe Prado
 
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionistDEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
Felipe Prado
 
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksDEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
Felipe Prado
 
DEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityDEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud security
Felipe Prado
 
DEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsDEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portals
Felipe Prado
 
DEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchDEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitch
Felipe Prado
 
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
Felipe Prado
 
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksDEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
Felipe Prado
 
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationDEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
Felipe Prado
 
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncDEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
Felipe Prado
 
DEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesDEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devices
Felipe Prado
 

More from Felipe Prado (20)

DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryDEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
 
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
 
DEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsDEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got ants
 
DEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionDEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryption
 
DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101
 
DEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentDEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a government
 
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareDEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
 
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
 
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationDEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
 
DEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceDEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interface
 
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionistDEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
 
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksDEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
 
DEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityDEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud security
 
DEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsDEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portals
 
DEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchDEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitch
 
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
 
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksDEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
 
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationDEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
 
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncDEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
 
DEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesDEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devices
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 

DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of social media manipulation driven by malware

  • 1. Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware GoSecure Research Masarah Paquet-Clouston, Olivier Bilodeau
  • 4. Linux/Moose An IoT botnet that conducts social media manipulation
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. The Ecosystem of Social Media Manipulation Presentation is about: •A four-year long investigation •Various investigative techniques •A mapping of all actors involved
  • 13.
  • 14.
  • 15. •Affects routers / Internet of Things (IoT) • Embedded Linux systems with busybox userland •Worm-like behavior • Telnet credential brute force •Payload: Proxy service • SOCKSv4/v5, HTTP, HTTPS Linux/Moose
  • 16. Honeypots • Software-based • Low interaction • Side-loaded an ARM virtual machine • Which we infected
  • 17.
  • 20. What did we have? •Several infected hosts actively used by operators •HTTPS traffic in plaintext •C&C traffic •Publicly available seller market
  • 21.
  • 22.
  • 24.
  • 25. Variables Honeypots used Websites targeted TLS fingerprints User agents API calls Timestamps Accounts created on social networks Accounts followed on social networks Traffic analysis
  • 27. Where do we stand? •Fake accounts •Pinned to a given honeypot •Originate from a single whitelisted IP address •Whitelisted IP addresses •Runs on Windows servers •RDP is actively used
  • 28.
  • 29.
  • 30. Automation Software • We tried to find the Linux/Moose provider • Based on User-Agents: Mobile and Desktop • Socks proxy support • Found different features • Proxy-type HTTP / Socks • Per account User-Agents (Mobile and Desktop) • Custom browsing patterns • Found different business models • Unlimited accounts • One-time fee / Pay-per-month / Pay-per-account
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37. Automation Software Summary Architecture Browser Packer Our Target? GramDominator / Socinator .Net CEF Not packed No socks proxy support FollowAdder Xojo / REALBasic CEF Obscure Xojo framework No unlimited accounts MassPlanner C++ / .Net CEF Themida / WinLicense 2.x Only one overridable User-Agent FollowingLike .Net BotSocial, a custom browser in .Net ILProtector Custom User-Agent feature too recent FollowLiker Java compiled to native code HtmlUnit Java Library Excelsior JET Doesn’t interact with Instagram similarly
  • 38. Where do we stand? Found several automation software vendors Reseller model is not at the botnet level
  • 39.
  • 40.
  • 41. Found in the decrypted traffic
  • 42.
  • 43.
  • 44. Reseller panels •Sell popularity in bulk •All look alike
  • 45. Simple Investigation N=343 Fingerprint of the web application Domain registration information HTML content IP address
  • 46.
  • 47.
  • 48.
  • 49.
  • 50. Reseller Panel Providers All in one solution : •Ready to go software •Provides web hosting •Domain name sometimes included Features: •API to receive orders •API to send orders •Track your workers
  • 51.
  • 52. Several conversations by reseller panel owners on BlackHatWorld about THE main provider
  • 53. Several conversations by reseller panel owners on BlackHatWorld about THE main provider
  • 54. Several conversations by reseller panel owners on BlackHatWorld about THE main provider
  • 55. Several conversations by reseller panel owners on BlackHatWorld about THE main provider
  • 56. Where do we stand? •A system of resellers and reseller panel providers •Automation software to create and orchestrate fake accounts
  • 57. Working around Blocks • Automation software supports proxy lists
  • 58. A New Actor Enters the Game Previously Studied Botnet Residential Proxy Services
  • 59.
  • 60.
  • 61.
  • 62.
  • 64. Storm Proxies • Received IPs from USA: Kansas City, Lincoln NE and Sunnyvale CA • ISPs have conflicting information: • Digital Energy Technologies Chile with Org Host1Plus • Victoria Mahe with Org Joe's Datacenter, LLC • Traceroute leads to the US
  • 65. Storm Proxies (cont) • Uses Squid for proxying • Doesn’t protect scans to localhost • Linux system • Most likely Debian Jessie • Exim 4.84_2 • Squid 3.4.8
  • 66. RSocks • Received IPs all from same subnet in Russia • ISP: Adman LLC • Traceroute confirms Russia
  • 67. RSocks (cont) • Exposes SSH on 3389 • Doesn’t protect scans to localhost • Unable to fingerprint proxy service • Most likely Debian Jessie • SSH banner deb8u7
  • 68. Valar Solutions • Received a single IP from France • Scaleway, Dedibox • Traffic goes out an IPv6 address in the USA • AT&T Internet Services
  • 69. Valar (cont) • Uses 3Proxy • on 1067 non-continuous ports • Identified by nmap • Confirmed by error message strings that match source code • Protects from localhost scans • Both IPv4 and IPv6 • IPv6 sealed from outside • Proxy entry is Debian 9 • Nginx + OpenSSH
  • 70. Residential Proxy Providers Summary Infrastructure Geoip / Whois Powered by Malware? Luminati Leveraging willing participants’ phones Unknown Unlikely Storm Proxies Debian 8 (Jessie) with Squid Misleading information Unlikely RSocks Debian 8 (Jessie) with unknown proxy Small unknown ISP Unlikely High Proxies CentOS/RHEL 7 with Squid Misleading information Unlikely Valar Solutions Debian 9 (Stretch) with 3Proxy. Tunnel between France and USA. IPv6. Legit AT&T Internet Services Unlikely
  • 72. Where do we stand? •IoT botnet or residential proxy services •Automation software •Reseller panels and reseller panel providers Who buys from reseller panels?
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80. Potential Buyers Linux/Moose 86% of the relayed traffic focused on Instagram List of potential customers: 522 accounts Method: Content analysis
  • 82. Selling Products and Services (21%)
  • 86. We made an experiment…
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 94. $95 $22.5 Squirrel buys 10,000 followers on Instagram < $1.8 Cheapest reseller panel N = 36 N = 33
  • 96. To fulfill an order of 100,000 followers on Instagram Each bot (honeypot) performed, on average, 1,186 follows per month on Instagram 85 bots per month or 2,529 bots a day 2$/proxy /month
  • 97. Linux/Moose makes 100,000 follows on Instagram per day Creates 100k followers per day at $22.5/10,000 follows $250 per day $82,125 per year Median price reseller
  • 98. -> $1,000 a day at $22.5/10,000 follows -> That is 45 orders of 10,000 follows -> 450,000 follows a day -> 11 382 bots 1 client = $365 000/year
  • 99.
  • 101. Regulate the sale of social media manipulation Policy makers:
  • 102. Target the middle-man Law enforcement:
  • 103. Social networks: Continue to increase the costs of creating fake likes and follows
  • 104. Individuals (you) Focus on the content rather than the container! What is this person bringing to society? Is this post legit? What are the sources?
  • 105.
  • 106.
  • 107. Thank you! Questions? Olivier Bilodeau obilodeau@gosecure.net @obilodeau Masarah Paquet-Clouston mcpc@gosecure.net @masarahclouston Artwork https://gosecure.net/blog/ https://nsec.io/