phigaro: automatic phishing detection and …—phigaro performs the incident handling routine,...

23
PhiGARo: Automatic Phishing Detection and Incident Response Framework Martin Husák, Jakub Čegan {husakm|cegan}@ics.muni.cz ECTCM 2014 Fribourg, Switzerland

Upload: others

Post on 22-Jul-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: PhiGARo: Automatic Phishing Detection and …—PhiGARo performs the incident handling routine, —Incident handler receives confirmation from victims. Martin Husák, Jakub Čegan

PhiGARo: Automatic PhishingDetection and Incident ResponseFramework

Martin Husák, Jakub Čegan{husakm|cegan}@ics.muni.cz

ECTCM 2014Fribourg, Switzerland

Page 2: PhiGARo: Automatic Phishing Detection and …—PhiGARo performs the incident handling routine, —Incident handler receives confirmation from victims. Martin Husák, Jakub Čegan

Outline

— Introduction,— Phishing incident response,— PhiGARo (phishing incident response tool),— Phishing honeypots (work in progress),— Conclusion.

Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 2 / 23

Page 3: PhiGARo: Automatic Phishing Detection and …—PhiGARo performs the incident handling routine, —Incident handler receives confirmation from victims. Martin Husák, Jakub Čegan

Research Questions

Question I.How can we effectively handle a phishing incident?

Question II.Can we automate phishing incident handling?

Question III.Can we automate phishing incident reporting?

Question IV.How can we attract phishers to phishing sensors?

Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 3 / 23

Page 4: PhiGARo: Automatic Phishing Detection and …—PhiGARo performs the incident handling routine, —Incident handler receives confirmation from victims. Martin Husák, Jakub Čegan

Masaryk University

— 40,000 users,— 15,000 active IP addresses a day,— Many faculties, subnets, and local administrators,— 1 security department – CSIRT-MU.

— Not applying strict firewall or e-mail filtering rules,— Emphasis on open network and academic freedom.

— >100 reported phishing incidents per year,— Unknown number of unreported incidents.

Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 4 / 23

Page 5: PhiGARo: Automatic Phishing Detection and …—PhiGARo performs the incident handling routine, —Incident handler receives confirmation from victims. Martin Husák, Jakub Čegan

Tools of the Trade

— Central security contact point,— Interaction with end-users and local administrators,— Request tracking software (RT),— 24 network probes (NetFlow, IPFIX),— Custom NetFlow analysis tools as an output of R&D.

Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 5 / 23

Page 6: PhiGARo: Automatic Phishing Detection and …—PhiGARo performs the incident handling routine, —Incident handler receives confirmation from victims. Martin Husák, Jakub Čegan

Phishing incident response

Question I.How can we effectively handle a phishing incident?

Question II.Can we automate phishing incident handling?

Question III.Can we automate phishing incident reporting?

Question IV.How can we attract phishers to phishing sensors?

Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 6 / 23

Page 7: PhiGARo: Automatic Phishing Detection and …—PhiGARo performs the incident handling routine, —Incident handler receives confirmation from victims. Martin Husák, Jakub Čegan

Phishing incident response

1. Incident is reported,2. Searching for victims – checking mailserver logs andnetwork monitoring data,

3. Interpreting the result, filtering false positives,4. Mitigation – restricting access to phishing websites,filtering e-mails,

5. Send warning to victims,6. Receive confirmation from victims.

Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 7 / 23

Page 8: PhiGARo: Automatic Phishing Detection and …—PhiGARo performs the incident handling routine, —Incident handler receives confirmation from victims. Martin Husák, Jakub Čegan

Phishing incident response

— We rely on reports from users,— Manual handling requires experienced worker,— The process is laborious and time consuming,— It may be too late to mitigate the attack.

Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 8 / 23

Page 9: PhiGARo: Automatic Phishing Detection and …—PhiGARo performs the incident handling routine, —Incident handler receives confirmation from victims. Martin Husák, Jakub Čegan

Phishing incident response

Question I.How can we effectively handle a phishing incident?

Question II.Can we automate phishing incident handling?

Question III.Can we automate phishing incident reporting?

Question IV.How can we attract phishers to phishing sensors?

Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 9 / 23

Page 10: PhiGARo: Automatic Phishing Detection and …—PhiGARo performs the incident handling routine, —Incident handler receives confirmation from victims. Martin Husák, Jakub Čegan

PhiGARo

— Phishing: Gather, Analyze, React, and Distribute,— Semi-automatic phishing incident response tool,— Modular architecture,— Incident handler runs PhiGARo after receivingphishing report,

— PhiGARo performs the incident handling routine,— Incident handler receives confirmation from victims.

Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 10 / 23

Page 11: PhiGARo: Automatic Phishing Detection and …—PhiGARo performs the incident handling routine, —Incident handler receives confirmation from victims. Martin Husák, Jakub Čegan

PhiGARo

Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 11 / 23

Page 12: PhiGARo: Automatic Phishing Detection and …—PhiGARo performs the incident handling routine, —Incident handler receives confirmation from victims. Martin Husák, Jakub Čegan

PhiGARo

Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 12 / 23

Page 13: PhiGARo: Automatic Phishing Detection and …—PhiGARo performs the incident handling routine, —Incident handler receives confirmation from victims. Martin Husák, Jakub Čegan

PhiGARo modules

— Request Tracker integration,— URL expander and URL redirection uncloaking,— Sendmail log parsing module,— NetFlow/IPFIX module (network traffic monitoring),— HTTP(S) module (extended flow monitoring),— E-mail blocking API,— RTBH API (blocking of network traffic),— Reporting phishing hosted on Google Docs,— Storage of phishing pages (screenshots),— Phishing form filling simulator.

Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 13 / 23

Page 14: PhiGARo: Automatic Phishing Detection and …—PhiGARo performs the incident handling routine, —Incident handler receives confirmation from victims. Martin Husák, Jakub Čegan

Phishing detection

Question I.How can we effectively handle a phishing incident?

Question II.Can we automate phishing incident handling?

Question III.Can we automate phishing incident reporting?

Question IV.How can we attract phishers to phishing sensors?

Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 14 / 23

Page 15: PhiGARo: Automatic Phishing Detection and …—PhiGARo performs the incident handling routine, —Incident handler receives confirmation from victims. Martin Husák, Jakub Čegan

Phishing detection

— Reliance on user reports is insufficient,— Existing methods focus on filtering e-mail onmailservers or mailboxes,

— Keyword search, data mining, machine learning. . .— Maintaining common phishing reporting tool inlarge networks is difficult.

Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 15 / 23

Page 16: PhiGARo: Automatic Phishing Detection and …—PhiGARo performs the incident handling routine, —Incident handler receives confirmation from victims. Martin Husák, Jakub Čegan

Honeypots

— System resources whose value lies in illicit use,— Honeypots are generally free of false positives,— Spamtrap – honeypot e-mail address or mailserverdeployed to collect spam,

— Honeytoken – e-mail address, account name. . .

Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 16 / 23

Page 17: PhiGARo: Automatic Phishing Detection and …—PhiGARo performs the incident handling routine, —Incident handler receives confirmation from victims. Martin Husák, Jakub Čegan

Honeypots

— Mailserver honeypot is deployed in the network,— Phishing detection method is set up at the honeypot,— Incoming e-mails are checked if they containphishing,

— Recognized phishing is reported to PhiGARo,— PhiGARo automatically starts handling the incident.

Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 17 / 23

Page 18: PhiGARo: Automatic Phishing Detection and …—PhiGARo performs the incident handling routine, —Incident handler receives confirmation from victims. Martin Husák, Jakub Čegan

Phishing detection

Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 18 / 23

Page 19: PhiGARo: Automatic Phishing Detection and …—PhiGARo performs the incident handling routine, —Incident handler receives confirmation from victims. Martin Husák, Jakub Čegan

Attracting attackers

Question I.How can we effectively handle a phishing incident?

Question II.Can we automate phishing incident handling?

Question III.Can we automate phishing incident reporting?

Question IV.How can we attract phishers to phishing sensors?

Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 19 / 23

Page 20: PhiGARo: Automatic Phishing Detection and …—PhiGARo performs the incident handling routine, —Incident handler receives confirmation from victims. Martin Husák, Jakub Čegan

Attracting attackers

— Honeytokens are placed to be accessible by webcrawlers, e-mail harvester. . .

— Responding to earlier phishing from honeytokene-mail addresses,

— Using PhiGARo to respond automatically(extension of form filling simulator),

— Black market poisoning (advanced).

Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 20 / 23

Page 21: PhiGARo: Automatic Phishing Detection and …—PhiGARo performs the incident handling routine, —Incident handler receives confirmation from victims. Martin Husák, Jakub Čegan

Attracting attackers

— Concept of Virtual organization,— Custom domain, honeytokens, web content, etc.assigned to honeypots,

— Increasing trustworthiness of a honeypots andhoneytokens,

— Adversary checks the domain, visits website, and ispersuaded that the honeytokens are valid.

Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 21 / 23

Page 22: PhiGARo: Automatic Phishing Detection and …—PhiGARo performs the incident handling routine, —Incident handler receives confirmation from victims. Martin Husák, Jakub Čegan

Conclusion

— Manual phishing incident handling is laborious.— The process of incident handling is automated bythe phishing incident response tool PhiGARo.

— PhiGARo is publicly available as a modular tool at:http://www.muni.cz/ics/services/csirt/tools/phigaro?lang=en

— We propose using honeypots to overcome relianceon user reports.

— A concept of Virtual organization was discussed toattract phishers to honeypots.

Martin Husák, Jakub Čegan · PhiGARo: Automatic Phishing Detection and Incident Response Framework · 10. 9. 2014 22 / 23

Page 23: PhiGARo: Automatic Phishing Detection and …—PhiGARo performs the incident handling routine, —Incident handler receives confirmation from victims. Martin Husák, Jakub Čegan

Thank you for your attention.

Martin Husák, Jakub Čegan{husakm|cegan}@ics.muni.cz