Speaker: Terry Zink, Program Manager, Microsoft
Goals:
- Understand the current threat landscape
- Understand what Microsoft is doing in this space
- Understand how Microsoft combats these threats
Variety
- (Terry performed a card trick at this time)
- Trick cards?
- Sleight of hand?
- Secret partner?
- Something else?
Spammers?
- Russian Business Network (RBN)
- worst of the worst.
- Responsible for the Storm botnet
- ISP – phishing, spam, malware
- Bullet-proof hosting “ISP allows you to do anything”
- Based in St. Petersburg, Russia
- Offers Web Hosting
- Now allegedly involved in Black SEO, DOS attacks and rogue Antivirus
- The Partnerka
- Use a lot of Web 2.0
- Affiliate marketing – will drive traffic to your site
- Black SEO, spam, malware
- Spam is less lucrative but still done by more elite spammers
- Upload spammy content to throwaway sites like facebook, twitter
- Glavmed
How much money do they actually make?
- Meds4U - $16,000/month
- CoolCodecs
- $6500/month
- MegaSales.ru
- $25/sale
- $4916/11 days
- I am a spammer (reddit.com)
- $1000/day
Forefront Online – Total inbound mail 400-600 billion per quarter.
Spam Trends – Gambling and 419 are up
Phishing – sites are looking very legitimate
Avalanche – group responsible for 2/3’s of all phishing sites.
Phishing needs 3 things: 1.) Phish email sent. 2.) Bypass phishing filters. 3.) user clicking on link.
Sender Policy Framework (SPF) – Add authorized sender IP’s to the DNS text record.
Botnet distribution (July 2009)
- Rustock – 39.7%
- Older botnet (c.2005)
- #1 Spammer
- No discernable pattern in headers
- “Sleepy” behavior – slow drizzle
- Sophisticated polymorphic rootkit botnet
- Implemented as a driver – runs at lowest level
- Infects system drivers, features anti-rootkit protection
- Some become adjusted to hardware, wont run on other systems
- More prevalent on older versions of windows
- US, Korea, Japan, UK, Romania
- TLS – their preference. decryption slows down mailgates
- Forefront online issued a fix to stop accepting TLS from botnet IP’s
- Bagle-cb – 28.6%
- Been around since 2004
- Spread by email or p2p
- Cutwail – 10.4%
- Lethic – 8.6%
- Grum – 6.7%
- Donbot – …
- Waledac
- Newbie – 2008.
- Main purpose is to spam
- Propagates by spamming links to itself
- Binary is packed with several packers (obfuscated)
- Makes use of multiple fast-flux nodes
- Uses encryption between nodes – hard to track
- Characters in spam:
- Recognizable HELO string
- US, Brazil, South Korea, Spain, France
Operation b49
- Microsoft took down the Waledac Botnet
- Microsoft got a court order to shut domains down “home of botnet”
- Pushdo/Cutwail
- Pushdo malware, cutwail is spamming software
- Cutwail – key encryption: “reva gurd iuh an it ak-lehsoP” (means screw you, my friend AV’r.)
- Multi-threaded
- Recognizable HELO string
- US, Russia, Japan, Brazil, …
Fast Flux & Double Fast Flux
- Very clever spam technique
- check out http://www.rxcoenbitee.cn
- Changes DNS A records every 10 minutes – constantly redirecting victims
- Double Fast Flux – uses DNS referrals to change the authoritative name server.
- Makes it very difficult for anti-spam to keep up with this.
- How do you stop double-fast-flux?
- You make really big lists.
- have listener programs throughout the world collecting real-time updates resolutions and sending them to the main list.
- Regex
- FOBE uses Regex’s to predict where spam is going to come from …hmm.
- Trafficconverter.biz
- -> conficker worm
- Started using MD6 in January
- Switched
Summary
- Spam up
- Phishing up
- Malware up
- Botnets up
- Piracy down
- Detection green up

Call Detail Record Analysis
ReplyDeleteCall Detail Record Analysis
Call Detail Record Analysis
Call Detail Record Analysis
Call Detail Record Analysis
Call Detail Record Analysis