SlideShare a Scribd company logo
1 of 51
Paper Review
An Empirical Study of HTTP-based Financial Botnets
Raymond
1
Outline
• Introduction
• Methodology and Emulation Environment
• Comparative Analysis of Various Bots
• Analytical Observations
• Challenges
• Solution and Conclusion
2
Introduction
3
Botnet
• A botnet is a collection of infected machines (bots)
controlled by a bot herder through a C&C server
C&C
server
malware
malware
malware
Bot herder
4
Financial Botnets
• This breed of botnets is designed and deployed to
conduct financial crimes such as online fraud, money
laundering, and identity theft by infecting a large number
of end-user systems across the globe.
5
232 devices are infected
per minute
• An RSA study further disclosed that every minute on the
Internet approximately 232 computers are being infected
with malware globally.
6
Spread bots 1/3
• There are several ways to spread bots but phishing and
drive-by download attacks are the two most prominent
ones
7
Spread bots 1/3
Phishing
• attack are executed through emails embedded with
malicious links that are distributed to a large set of users.
• This attack exploits the users’ gullibility using social
engineering tricks.
• Upon clicking a web link, the user’s browser is redirected
to a malicious domain which serves malware.
8
Spread bots 1/3
drive-by download
• an attacker compromises a high-traffic website and
injects code that points to a malicious domain.
9
Spread bots 2/3
• On visiting a malicious domain, a Browser Exploit Pack
(BEP), an automated framework consisting several
exploits, fingerprints the browsers environment, and if
found vulnerable, an appropriate exploit is served to
compromise the machine.
10
Spread bots 3/3
11
Botnets have Become
Bigger and Better
Statistic shows the total number of bots present in the various families of botnets when taken down by FBI in different takedown operations.
12
Top 4 Financial Botnets
• A Kaspersky study [9] found that the top 4 financial
botnets are Zeus (variants), SpyEye, Carberp and
Citadel.
13
Top 4 Financial Botnets
• Carberp botnet caused approximately close to $250
million in losses
• Citadel botnet caused $500 million losses to
companies and organizations across the globe.
• Earlier versions of Zeus and SpyEye botnets
collectively stole $100 million from target organizations
14
Methodology and
Emulation Environment
15
Test Step
• 1.we used an infiltration technique where we joined the
botnet environment to better understand its behavior
• 2.We conducted several tests using active and passive
approaches for investigating infections:
o Continuous monitoring and traffic analysis
o Reverse engineering and behavior analysis
o Penetration testing
16
anti anti-VM bot
• do something made the VMware machines behave like a
standard operating system
o ex:
• VMWare support tools were not installed
• kernel debugging was turned off
• the Media Access Control (MAC) address was modified
• Desktop Management Information (DMI) related to Basic Input Output
System (BIOS) and certain components of operating system (VM) were
modified
17
18
Comparative Analysis of
Various Bots
19
Protocol
20
Anti-sandbox
21
Exploitation
Mutex object can be used to determine whether the system is already infected or not,
and detecting the presence of virtual machines, traffic analyzers, Anti-Viruses(AV) in the
system.
the PDEF+ component is designed to check the effectiveness of bots in bypassing anti-
virus systems running on the client side
22
Spreading
23
Remote Manage
24
Defensive Mechanisms
Socks Proxy
bot herders can restrict source direct access to the C&C panels offer vertify method, if
bot match, it allow the bot to download configuration file limit source of incoming http
request
Domain Generation Algorithms
generate pseudorandom domain names,
Advantage is that use DGAs to strengthen their C&C communication channels so that
fingerprinting of C&C servers becomes more difficult
25
Module
• This design shows that the bots can be extended by building
additional plugins that can be incorporated directly to execute
extended code in the infected system.
o For example,
• the malware author can design a new plugin for a specific bot and use the C&C
panel to update the bot by sending an updated configuration having a new plugin
listed in it. When the bot gets updated, the new pluginsimply executes.
26
Data Exfiltration
27
Data Exfiltration
• Man-in-the-Browser Attacks
o MitB is capable of manipulating the communication flow of various browser
components
o most common MitB attack techniques based on hooking used by bots:
• Form-grabbing
• WebInjects
• WebFakes.
28
Man-in-the-Browser
Attacks
29
DDoS
30
Best Botnet
31
Analytical Observations
32
Analytical Observations
• Malware authors are developing more sophisticated
botnet designs by reusing and modifying existing
botnet source codes.
33
Analytical Observations
• Communication channels of HTTP-based financial
botnets are secured using gates
34
Analytical Observations
• Use of DGAs as a C&C communication mechanism has
increased in last few years and we expect this trend to
continue in the future
35
Analytical Observations
• the bots primarily target browsers to steal sensitive
information pertaining to critical websites. Almost every
HTTP-based botnet performs browser hooking to carry
out nefarious tasks.
36
Analytical Observations
• distribution using automated exploit frameworks called
browser exploit packs which exploit a specific
vulnerability in browser components and download bots
onto the user systems without their knowledge
37
Analytical Observations
• well-defined development APIs and plugin architecture
frameworks which can be used to extend the
functionalities of bots.
38
Analytical Observations
• use Windows built-in cryptographic APIs with custom
encryption routines to avoid detection and further
complicate any analysis.
39
Challenges
40
Challenges
• HTTPS is an end-to-end security solution that protects
from Man-in-the-Middle (MitM) attack but it does not
provide any protection against MitB attacks
41
Challenges
• TFA does not protect from MitB attacks
o TFA raises the bar with respect to the ease of use of stolen authentication data,
but TFA neither prevents the theft nor eliminates the data’s value.
42
Challenges
• Developing signatures for IPS/IDS for bot detections fail
to stop unknown malware (financial botnets) running in
the wild. The thriving botnet ecosystem is proof of that
43
Solution and Conclusion
44
Solutions
To defend against WebInject attacks
• One solution is to build an HTML/JavaScript-based
webpage verification system that detects modifications
that have happened when webpages are rendered in the
browser.
45
Solutions
To foil Form-grabbing attacks
• data is encrypted before it is exfiltrated by the bot from
the infected system.
46
Solutions
to overcome malware detection VM
• building next-generation complete emulated
environments by simulating the physical hardware
including CPU, memory, etc.
47
Solutions
to protect enterprises against unknown attacks
• data mining and machine learning can play a vital
role ,but such solutions are still not able to cope with
existing and emerging threats.
48
Solutions
Other
• understanding how one bot detects the presence of
other bot
o ex:
o if mutex names are used by SpyEye to detect Zeus bots, the same patterns can
be fed to end-user security solutions (anti-virus engines) to detect and eradicate
the bots
49
Solutions
The most important way
• Technology alone cannot protect users from all types of
malicious attacks.
• Improved user education which instructs the user to
understand the importance of safe surfing habits, best
and secure ways to perform online banking, avoid
visiting the destinations which they are not sure of, etc.
50
Q & A
51

More Related Content

Viewers also liked

從AlphaGo的設計淺談資安領域的異常分析流程
從AlphaGo的設計淺談資安領域的異常分析流程從AlphaGo的設計淺談資安領域的異常分析流程
從AlphaGo的設計淺談資安領域的異常分析流程Jhang Raymond
 
Mahout資料分析基礎入門
Mahout資料分析基礎入門Mahout資料分析基礎入門
Mahout資料分析基礎入門Jhang Raymond
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShareSlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShareSlideShare
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksSlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShareSlideShare
 

Viewers also liked (6)

從AlphaGo的設計淺談資安領域的異常分析流程
從AlphaGo的設計淺談資安領域的異常分析流程從AlphaGo的設計淺談資安領域的異常分析流程
從AlphaGo的設計淺談資安領域的異常分析流程
 
Mahout資料分析基礎入門
Mahout資料分析基礎入門Mahout資料分析基礎入門
Mahout資料分析基礎入門
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShare
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 

Similar to paper review about botnet

Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...Julia Yu-Chin Cheng
 
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...APNIC
 
A Survey of Botnet Detection Techniques
A Survey of Botnet Detection TechniquesA Survey of Botnet Detection Techniques
A Survey of Botnet Detection Techniquesijsrd.com
 
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...Aditya K Sood
 
Fight fire with fire draft
Fight fire with fire draftFight fire with fire draft
Fight fire with fire draftNishant Agrawal
 
[2010 CodeEngn Conference 04] Max - Fighting against Botnet
[2010 CodeEngn Conference 04] Max - Fighting against Botnet[2010 CodeEngn Conference 04] Max - Fighting against Botnet
[2010 CodeEngn Conference 04] Max - Fighting against BotnetGangSeok Lee
 
Understanding the Botnet Phenomenon
Understanding the Botnet PhenomenonUnderstanding the Botnet Phenomenon
Understanding the Botnet PhenomenonDr. Amarjeet Singh
 
An Efficient Framework for Detection & Classification of IoT BotNet.pptx
An Efficient Framework for Detection & Classification of IoT BotNet.pptxAn Efficient Framework for Detection & Classification of IoT BotNet.pptx
An Efficient Framework for Detection & Classification of IoT BotNet.pptxSandeep Maurya
 
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...IRJET Journal
 
Tracing Back The Botmaster
Tracing Back The BotmasterTracing Back The Botmaster
Tracing Back The BotmasterIJERA Editor
 
Botnet and its Detection Techniques
Botnet  and its Detection Techniques Botnet  and its Detection Techniques
Botnet and its Detection Techniques SafiUllah Saikat
 
How to measure your security response readiness?
How to measure your security response readiness?How to measure your security response readiness?
How to measure your security response readiness?Tomasz Jakubowski
 
Study on Botnet Architecture
Study on Botnet ArchitectureStudy on Botnet Architecture
Study on Botnet ArchitectureBini Bs
 
Famous C&C servers from inside to outside.
Famous C&C servers from inside to outside.Famous C&C servers from inside to outside.
Famous C&C servers from inside to outside.Senad Aruc
 
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...MITRE - ATT&CKcon
 
Study on Botnet Architecture
Study on Botnet ArchitectureStudy on Botnet Architecture
Study on Botnet ArchitectureBini Bs
 
A Taxonomy of Botnet Detection Approaches
A Taxonomy of Botnet Detection ApproachesA Taxonomy of Botnet Detection Approaches
A Taxonomy of Botnet Detection ApproachesFabrizio Farinacci
 

Similar to paper review about botnet (20)

Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
 
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
 
A Survey of Botnet Detection Techniques
A Survey of Botnet Detection TechniquesA Survey of Botnet Detection Techniques
A Survey of Botnet Detection Techniques
 
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
 
Fight fire with fire draft
Fight fire with fire draftFight fire with fire draft
Fight fire with fire draft
 
Botnets
BotnetsBotnets
Botnets
 
[2010 CodeEngn Conference 04] Max - Fighting against Botnet
[2010 CodeEngn Conference 04] Max - Fighting against Botnet[2010 CodeEngn Conference 04] Max - Fighting against Botnet
[2010 CodeEngn Conference 04] Max - Fighting against Botnet
 
Understanding the Botnet Phenomenon
Understanding the Botnet PhenomenonUnderstanding the Botnet Phenomenon
Understanding the Botnet Phenomenon
 
Botnet Architecture
Botnet ArchitectureBotnet Architecture
Botnet Architecture
 
An Efficient Framework for Detection & Classification of IoT BotNet.pptx
An Efficient Framework for Detection & Classification of IoT BotNet.pptxAn Efficient Framework for Detection & Classification of IoT BotNet.pptx
An Efficient Framework for Detection & Classification of IoT BotNet.pptx
 
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
 
Tracing Back The Botmaster
Tracing Back The BotmasterTracing Back The Botmaster
Tracing Back The Botmaster
 
Botnet and its Detection Techniques
Botnet  and its Detection Techniques Botnet  and its Detection Techniques
Botnet and its Detection Techniques
 
BOTLAB excersise
BOTLAB excersiseBOTLAB excersise
BOTLAB excersise
 
How to measure your security response readiness?
How to measure your security response readiness?How to measure your security response readiness?
How to measure your security response readiness?
 
Study on Botnet Architecture
Study on Botnet ArchitectureStudy on Botnet Architecture
Study on Botnet Architecture
 
Famous C&C servers from inside to outside.
Famous C&C servers from inside to outside.Famous C&C servers from inside to outside.
Famous C&C servers from inside to outside.
 
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
 
Study on Botnet Architecture
Study on Botnet ArchitectureStudy on Botnet Architecture
Study on Botnet Architecture
 
A Taxonomy of Botnet Detection Approaches
A Taxonomy of Botnet Detection ApproachesA Taxonomy of Botnet Detection Approaches
A Taxonomy of Botnet Detection Approaches
 

Recently uploaded

Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 

Recently uploaded (20)

Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 

paper review about botnet

  • 1. Paper Review An Empirical Study of HTTP-based Financial Botnets Raymond 1
  • 2. Outline • Introduction • Methodology and Emulation Environment • Comparative Analysis of Various Bots • Analytical Observations • Challenges • Solution and Conclusion 2
  • 4. Botnet • A botnet is a collection of infected machines (bots) controlled by a bot herder through a C&C server C&C server malware malware malware Bot herder 4
  • 5. Financial Botnets • This breed of botnets is designed and deployed to conduct financial crimes such as online fraud, money laundering, and identity theft by infecting a large number of end-user systems across the globe. 5
  • 6. 232 devices are infected per minute • An RSA study further disclosed that every minute on the Internet approximately 232 computers are being infected with malware globally. 6
  • 7. Spread bots 1/3 • There are several ways to spread bots but phishing and drive-by download attacks are the two most prominent ones 7
  • 8. Spread bots 1/3 Phishing • attack are executed through emails embedded with malicious links that are distributed to a large set of users. • This attack exploits the users’ gullibility using social engineering tricks. • Upon clicking a web link, the user’s browser is redirected to a malicious domain which serves malware. 8
  • 9. Spread bots 1/3 drive-by download • an attacker compromises a high-traffic website and injects code that points to a malicious domain. 9
  • 10. Spread bots 2/3 • On visiting a malicious domain, a Browser Exploit Pack (BEP), an automated framework consisting several exploits, fingerprints the browsers environment, and if found vulnerable, an appropriate exploit is served to compromise the machine. 10
  • 12. Botnets have Become Bigger and Better Statistic shows the total number of bots present in the various families of botnets when taken down by FBI in different takedown operations. 12
  • 13. Top 4 Financial Botnets • A Kaspersky study [9] found that the top 4 financial botnets are Zeus (variants), SpyEye, Carberp and Citadel. 13
  • 14. Top 4 Financial Botnets • Carberp botnet caused approximately close to $250 million in losses • Citadel botnet caused $500 million losses to companies and organizations across the globe. • Earlier versions of Zeus and SpyEye botnets collectively stole $100 million from target organizations 14
  • 16. Test Step • 1.we used an infiltration technique where we joined the botnet environment to better understand its behavior • 2.We conducted several tests using active and passive approaches for investigating infections: o Continuous monitoring and traffic analysis o Reverse engineering and behavior analysis o Penetration testing 16
  • 17. anti anti-VM bot • do something made the VMware machines behave like a standard operating system o ex: • VMWare support tools were not installed • kernel debugging was turned off • the Media Access Control (MAC) address was modified • Desktop Management Information (DMI) related to Basic Input Output System (BIOS) and certain components of operating system (VM) were modified 17
  • 18. 18
  • 22. Exploitation Mutex object can be used to determine whether the system is already infected or not, and detecting the presence of virtual machines, traffic analyzers, Anti-Viruses(AV) in the system. the PDEF+ component is designed to check the effectiveness of bots in bypassing anti- virus systems running on the client side 22
  • 25. Defensive Mechanisms Socks Proxy bot herders can restrict source direct access to the C&C panels offer vertify method, if bot match, it allow the bot to download configuration file limit source of incoming http request Domain Generation Algorithms generate pseudorandom domain names, Advantage is that use DGAs to strengthen their C&C communication channels so that fingerprinting of C&C servers becomes more difficult 25
  • 26. Module • This design shows that the bots can be extended by building additional plugins that can be incorporated directly to execute extended code in the infected system. o For example, • the malware author can design a new plugin for a specific bot and use the C&C panel to update the bot by sending an updated configuration having a new plugin listed in it. When the bot gets updated, the new pluginsimply executes. 26
  • 28. Data Exfiltration • Man-in-the-Browser Attacks o MitB is capable of manipulating the communication flow of various browser components o most common MitB attack techniques based on hooking used by bots: • Form-grabbing • WebInjects • WebFakes. 28
  • 33. Analytical Observations • Malware authors are developing more sophisticated botnet designs by reusing and modifying existing botnet source codes. 33
  • 34. Analytical Observations • Communication channels of HTTP-based financial botnets are secured using gates 34
  • 35. Analytical Observations • Use of DGAs as a C&C communication mechanism has increased in last few years and we expect this trend to continue in the future 35
  • 36. Analytical Observations • the bots primarily target browsers to steal sensitive information pertaining to critical websites. Almost every HTTP-based botnet performs browser hooking to carry out nefarious tasks. 36
  • 37. Analytical Observations • distribution using automated exploit frameworks called browser exploit packs which exploit a specific vulnerability in browser components and download bots onto the user systems without their knowledge 37
  • 38. Analytical Observations • well-defined development APIs and plugin architecture frameworks which can be used to extend the functionalities of bots. 38
  • 39. Analytical Observations • use Windows built-in cryptographic APIs with custom encryption routines to avoid detection and further complicate any analysis. 39
  • 41. Challenges • HTTPS is an end-to-end security solution that protects from Man-in-the-Middle (MitM) attack but it does not provide any protection against MitB attacks 41
  • 42. Challenges • TFA does not protect from MitB attacks o TFA raises the bar with respect to the ease of use of stolen authentication data, but TFA neither prevents the theft nor eliminates the data’s value. 42
  • 43. Challenges • Developing signatures for IPS/IDS for bot detections fail to stop unknown malware (financial botnets) running in the wild. The thriving botnet ecosystem is proof of that 43
  • 45. Solutions To defend against WebInject attacks • One solution is to build an HTML/JavaScript-based webpage verification system that detects modifications that have happened when webpages are rendered in the browser. 45
  • 46. Solutions To foil Form-grabbing attacks • data is encrypted before it is exfiltrated by the bot from the infected system. 46
  • 47. Solutions to overcome malware detection VM • building next-generation complete emulated environments by simulating the physical hardware including CPU, memory, etc. 47
  • 48. Solutions to protect enterprises against unknown attacks • data mining and machine learning can play a vital role ,but such solutions are still not able to cope with existing and emerging threats. 48
  • 49. Solutions Other • understanding how one bot detects the presence of other bot o ex: o if mutex names are used by SpyEye to detect Zeus bots, the same patterns can be fed to end-user security solutions (anti-virus engines) to detect and eradicate the bots 49
  • 50. Solutions The most important way • Technology alone cannot protect users from all types of malicious attacks. • Improved user education which instructs the user to understand the importance of safe surfing habits, best and secure ways to perform online banking, avoid visiting the destinations which they are not sure of, etc. 50