the slingshot project - dfn-cert · 2015-03-06 · –download dataset at slingshot.mpi-sws.org •...

32
The Slingshot Project Measuring, analyzing, and defending against targeted attacks Stevens Le Blond

Upload: others

Post on 13-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

The Slingshot Project

Measuring, analyzing, anddefending against targeted attacks

Stevens Le Blond

Page 2: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

Software security model

2

Obscurity Reactivity

Correctness Isolation

Page 3: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

3

Skype enables large-scale IP tracking…

# days

# u

sers

Page 4: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

4

Stevens

Paul Francis(my boss)

12/9/10I would like to use you as an example to showthat I can find the IP of anyone who has loggedon Skype in 72 hours. Is that OK with you?

12/9/10You can use me as an example. I don'tcare if my IP address is private or not!

12/12/10BTW, am I to understand that you

know what P2P downloads I have made?

12/15/10Everybody was very impressed with your visit, andwe'd be delighted if you could do a post-doc here.

… and targeted tracking

Page 5: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

Four years later…

5

DoS me!

Paul,Francis

Page 6: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

Open research problems

• Traffic analysis (Aqua project):

– Can break most anonymity networks

• e.g., >98.3% of anonymous VoIP calls traced after one month based on real voice workload

– Can we build apps that resist traffic analysis?

• Targeted attacks (this talk):

– How are they carried out today?

– What does it teach us about defenses?

6

Page 7: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

Targeted attacks

7

Stuxnet:

2010 Now

Entice specific users, organizations, or communities into installing malware

RSA watering-hole attack:

2012

2014peer-reviewed studies

on targeted attacksTargets:

GovernmentCompanyNGO/Civilians

Page 8: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

Outline

8

Attacker(s) Target(s)

Malware

Attack vectors

Social engineering

Email services

• How specialized is command and control?

• How sophisticated is social engineering?

• What are the most common attack vectors?

NGO

Data

Future work

Page 9: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

A look at targeted attacks through the lense of an NGO

Joint work with: Adina Uritesc, Cedric Gilbert,Zheng Leong Chua, Prateek Saxena, Engin Kirda

Page 10: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

Outline

10

Attacker(s) Target(s)

Malware

Attack vectors

Social engineering

Email services

• How specialized is command and control?

• How sophisticated is social engineering?

• What are the most common attack vectors?

NGO

Data

Future work

Page 11: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

Our dataset of targeted attacks

• Contacted >100 NGOs in 2013

• Collaborate with a targeted human-rights NGO (WUC) representing the Uyghur

• Two NGO affiliates share >1.5k suspicious emails (>1.1k w/ malware)

• Attack numerous related targets with same emails (via To or Cc)

11

The target:WUC

Page 12: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

What organizations are being targeted?

12

>100 targeted organizations

Dataset captures attacks against NGOs and few high-profile targets

Page 13: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

Example of targeted attack

13

Page 14: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

Outline

14

Attacker(s) Target(s)Email services

Malware

Attack vectors

Social engineering

• How specialized is command and control?

• How sophisticated is social engineering?

• What are the most common attack vectors?

Data

WUC

Future work

Page 15: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

How specialized is Command and Control (C2)?

15

Federal gov.

State and local gov.

Services/Consulting/VAR

Financial services

Telecommunications

Aerospace/Defense/Airlines

Energy/Utilities/Petroleum refining

Healthcare/Pharmaceuticals

Entertainment/Media/Hospitality

Insurance

Chemicals/Manufacturing/Mining

High-tech

Higher educations

WUC

• Cluster >500 samples

• >25% of malware linked to known groups

• One group (DTL) targeted wide range of industries

Same C2 used for diverse organizations / industries

Source: FireEye

Page 16: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

Outline

16

After compromise

Attacker(s) Target(s)Email services

• How specialized is command and control?

• How sophisticated is social engineering?

– What is the timing of attacks?

– Are topic and language tailored to targets?

– Do emails impersonate contacts of targets?

• What are the most common attack vectors?

Malware

Attack vectors

Social engineering

WUC

Data

Future work

Page 17: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

What is the timing of attacks?

17

WUC

ETUE

Others

Attacks occur often; over long time periods; sprayed over several targets

Time

Volunteer joined WUC

Volunteer

Page 18: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

Are topic and language tailored to targets?

18

Topics

Frac

tio

n o

f m

alic

iou

s em

ails

Topics and languages aremanually tailored to targets

51% 29% 12% 2% 4%1,116

Page 19: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

Do emails impersonate contacts of targets?

19

Years

Frac

tio

n o

f m

alic

iou

s em

ails

Attackers exploit legitimacy of targets’ real social contacts

Page 20: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

Outline

20

Attacker(s) Target(s)Email services

Malware

Attack vectors

Social engineering

• How specialized is command and control?

• How sophisticated is social engineering?

• What are the most common attack vectors?

Data

WUC

Future work

Page 21: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

Timeline of exploited vulnerabilities

21

Time (years)

Attacks exploit recent but disclosed vulnerabilities (no 0-days)

Page 22: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

(In)effectiveness of reactive security

22

GMail Hotmail Yahoo!

Det

ecti

on

rat

e

Fails to detect even old exploits

Page 23: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

Impact of application-level isolation

23

Time

# m

alic

iou

s d

ocu

men

ts

Significantly raises the bar

Acrobat X deploys isolation

Page 24: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

Future work

24

Attacker(s) Target(s)Defenses

• Generalize results

• Monitoring and attack attribution

• Defenses

– Detection of contact impersonation

– Dynamic analysis in controlled env.

– Spatio-temporal, OS-based isolation

Malware

Attack vectors

Social engineering

Data

Future work

Page 25: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

Detecting contact impersonationin spear-phishing attacks

Joint work with: Istemi Ekin Akkus, Cedric Gilbert, Peter Druschel

Page 26: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

Do spam filters detect spoofed emails?

26

Existing filters fail todetect spoofed contacts

Page 27: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

Unilateral detection of contact impersonation in malicious emails

• A browser extension that leverages:

– Typo emails/names

– Authentication

– Writing style

• Switches to crypto signatures if both users support it

• Optionally uploads attachments for dynamic analysis

27

Page 28: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

Experimental setup

28

Authorship verification(Writeprints w/ training set)

Legit emailsImpersonated emails

Incoming emails(testing set)

Page 29: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

Experimental setup cont.

• Enron dataset

– Keep users with >= 4.5k words

– Emulate impersonated emails

– Verify authorship of emails >= 25 words

• Accuracy metrics

– Recall: Fraction of attacks detected

– Precision: Fraction of warnings corresponding to attacks

29

What accuracy of authorship verification for email workload?

Page 30: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

Can we verify that legitimate

contact wrote email?

30

We can verify authorshipwith high accuracy

CD

F o

f se

nd

ers

Recall / precision rates

Page 31: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

Future work

31

Attacker(s) Target(s)Defenses

• Generalize results

• Monitoring and attack attribution

• Defenses

– Detection of contact impersonation

– Dynamic analysis in controlled env.

– Spatio-temporal, OS-based isolation

Malware

Attack vectors

Social engineering

Data

Future work

Page 32: The Slingshot Project - DFN-CERT · 2015-03-06 · –Download dataset at slingshot.mpi-sws.org • Social engineering: –Topic, language, and senders manually tailored to targets

Take home messages• Low-volume, socially engineered communications which entice specific

targets into installing malware

• Malware:

– Same entities target corporations, political institutions, and NGOs

– Download dataset at slingshot.mpi-sws.org

• Social engineering:

– Topic, language, and senders manually tailored to targets

– Stylometry accurately detects contact impersonation

• Attack vectors:

– Recent but disclosed vulnerabilities that evade reactive defenses

– Data indicates isolation is effective in the wild

32