using honeyclients for detection and response against new ... · client-side exploits are a growing...

27
© 2008 The MITRE Corporation. All rights reserved Information Assurance Using Honeyclients for Detection and Response Against New Attacks Kathy Wang MITRE Corporation [email protected]

Upload: others

Post on 07-Oct-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Using Honeyclients for Detection and Response Against New ... · Client-side exploits are a growing threat – Lots of client-side vulnerabilities Microsoft Internet Explorer has

© 2008 The MITRE Corporation. All rights reserved

InformationAssurance

Using Honeyclients for Detection and Response Against New AttacksKathy WangMITRE [email protected]

Page 2: Using Honeyclients for Detection and Response Against New ... · Client-side exploits are a growing threat – Lots of client-side vulnerabilities Microsoft Internet Explorer has

© 2008 The MITRE Corporation. All rights reserved2

Problem

Client-side exploits are a growing threat– Lots of client-side vulnerabilities

Microsoft Internet Explorer has more than 50 serious vulnerabilities in last 6 months (SecurityFocus database)

– Lots of client-side exploits90% of all PCs harbor spyware (Webroot, 2006)

We need to be able to proactively detect and characterize client-side attacks before we get hit

We lack a proactive detection technology for client-side attacks

Page 3: Using Honeyclients for Detection and Response Against New ... · Client-side exploits are a growing threat – Lots of client-side vulnerabilities Microsoft Internet Explorer has

© 2008 The MITRE Corporation. All rights reserved3

A New ‘Business’ Model

Presenter
Presentation Notes
Another example of an attack is shown here. A Russian company has created a one-line exploit code, which exploits a vulnerability in a web browser client. Web masters can obtain and install this one-line exploit code on their web servers, and anyone who accesses that web site with a vulnerable client will become infected. The Russian company pays the web masters six cents for each vulnerable web client host that is infected via that one-line exploit code. The Russian company now has remote control of all the hosts that were driving that vulnerable client, and will round up those hosts and use them as part of a botnet to send spamming emails, etc. So, how are we doing at detecting sites like these? Not very well…
Page 4: Using Honeyclients for Detection and Response Against New ... · Client-side exploits are a growing threat – Lots of client-side vulnerabilities Microsoft Internet Explorer has

© 2008 The MITRE Corporation. All rights reserved4

Current SituationCurrent coverage of client-side exploits is inadequate– Over 50% of recent vulnerabilities are client-based (SecurityFocus)– Only 1.5% of Snort Intrusion Detection System signatures are

based on client-side attacks (www.snort.org)

Honeypots– Detect server-side attacks– Passive devices

Current methods of client-side exploit detection are reactive– Anti-virus– Anti-spyware– Clueful users

Page 5: Using Honeyclients for Detection and Response Against New ... · Client-side exploits are a growing threat – Lots of client-side vulnerabilities Microsoft Internet Explorer has

© 2008 The MITRE Corporation. All rights reserved5

Background - Honeyclients

Honeyclients provide capability to proactively detect client-side exploits– A honeyclient is a system that drives a client application to

potentially malicious servers– Any changes made on honeyclient system are unauthorized – no

false positives!– We detect exploits even without prior signatures

Page 6: Using Honeyclients for Detection and Response Against New ... · Client-side exploits are a growing threat – Lots of client-side vulnerabilities Microsoft Internet Explorer has

© 2008 The MITRE Corporation. All rights reserved6

Basic Honeyclient Package

Client-side Exploit

Database

MaliciousServer

Request Response

Linux Host

Traffic logs

Windows VMHoneyclient

Prototype Capabilities• Integrity checks• Drive IE• Extract URLs• Recurse (Internal)• Recurse (External)• Virtual host• Protective firewall• Exploit DB• Image rotation• Modular clients• Traffic history• Secure logging• Memory checks

Dedicated DSL

Internet

Page 7: Using Honeyclients for Detection and Response Against New ... · Client-side exploits are a growing threat – Lots of client-side vulnerabilities Microsoft Internet Explorer has

© 2008 The MITRE Corporation. All rights reserved7

New Honeyclient Project Capabilities

Active content site module– Automates Macromedia Flash site spidering

Keyword scoring module– More intelligent browsing of links

Comprehensive honeyclient database module with CGI-based web front-end– Easy querying for malware-related activity and characteristics– Quick demo

Real-time integrity checks– Significant integrity check time improvement

Fully operational honeyclients– 7 honeyclients operating on 24/7 basis

Extensive honeyclient project website deployed– SVN repository, wiki, ticketing system, weblogs– Google Analytics

Page 8: Using Honeyclients for Detection and Response Against New ... · Client-side exploits are a growing threat – Lots of client-side vulnerabilities Microsoft Internet Explorer has

© 2008 The MITRE Corporation. All rights reserved8

Additional Project Information

Our project websitehttp://honeyclient.mitre.org

Send us email, and we will add you to the mailing [email protected]@mitre.org

We need beta testers!http://www.honeyclient.org/trac/wiki/download

Developers are welcome too!SVN repository is available, let us know if you’d like access

Page 9: Using Honeyclients for Detection and Response Against New ... · Client-side exploits are a growing threat – Lots of client-side vulnerabilities Microsoft Internet Explorer has

© 2008 The MITRE Corporation. All rights reserved9

Additional Information

Page 10: Using Honeyclients for Detection and Response Against New ... · Client-side exploits are a growing threat – Lots of client-side vulnerabilities Microsoft Internet Explorer has

© 2008 The MITRE Corporation. All rights reserved10

Why Should You Run Honeyclients?

Operational benefits– Increase your visibility of emerging client-side threats– Malware collection and analysis– Share your results, and obtain other organizations’ results

Networking benefits– Group forum meetings– Government, industry, academic participation– Discussion on latest trends in client-side exploits

Page 11: Using Honeyclients for Detection and Response Against New ... · Client-side exploits are a growing threat – Lots of client-side vulnerabilities Microsoft Internet Explorer has

© 2008 The MITRE Corporation. All rights reserved11

Why Should You Run Honeyclients?

Cost benefits– HoneyClient package and Linux OSes are open-sourced– VMWare Server is free– Your costs: hardware, Internet connection, Windows license,

analysts

Other factors to consider– Your private data will not be leaked– Opportunity to provide public service through data sharing

Page 12: Using Honeyclients for Detection and Response Against New ... · Client-side exploits are a growing threat – Lots of client-side vulnerabilities Microsoft Internet Explorer has

© 2008 The MITRE Corporation. All rights reserved12

Some Honeyclient Case Examples

Please DO NOT go to any of the sites on the following slides unless you REALLY know what you’re doing!!!)

<Disclaimer>

</Disclaimer>

Page 13: Using Honeyclients for Detection and Response Against New ... · Client-side exploits are a growing threat – Lots of client-side vulnerabilities Microsoft Internet Explorer has

© 2008 The MITRE Corporation. All rights reserved13

www.world0fwarcraft.net (Changes)

Suspicious file

Page 14: Using Honeyclients for Detection and Response Against New ... · Client-side exploits are a growing threat – Lots of client-side vulnerabilities Microsoft Internet Explorer has

© 2008 The MITRE Corporation. All rights reserved14

www.world0fwarcraft.net (Changes)

Where’s /etc/hosts file???Definitely suspicious

Page 15: Using Honeyclients for Detection and Response Against New ... · Client-side exploits are a growing threat – Lots of client-side vulnerabilities Microsoft Internet Explorer has

© 2008 The MITRE Corporation. All rights reserved15

www.world0fwarcraft.net (Scans)

Page 16: Using Honeyclients for Detection and Response Against New ... · Client-side exploits are a growing threat – Lots of client-side vulnerabilities Microsoft Internet Explorer has

© 2008 The MITRE Corporation. All rights reserved16

www.sharky.in (Changes)

Suspicious behavior, let’scheck it out further!

Page 17: Using Honeyclients for Detection and Response Against New ... · Client-side exploits are a growing threat – Lots of client-side vulnerabilities Microsoft Internet Explorer has

© 2008 The MITRE Corporation. All rights reserved17

www.sharky.in (Changes)

This definitely doesn’tlook good…

Page 18: Using Honeyclients for Detection and Response Against New ... · Client-side exploits are a growing threat – Lots of client-side vulnerabilities Microsoft Internet Explorer has

© 2008 The MITRE Corporation. All rights reserved18

www.sharky.in (Scan)

Poor resultson scans…

Page 19: Using Honeyclients for Detection and Response Against New ... · Client-side exploits are a growing threat – Lots of client-side vulnerabilities Microsoft Internet Explorer has

© 2008 The MITRE Corporation. All rights reserved19

www.exploitoff.net (Changes)

OK. Let’s checkthis out.

Page 20: Using Honeyclients for Detection and Response Against New ... · Client-side exploits are a growing threat – Lots of client-side vulnerabilities Microsoft Internet Explorer has

© 2008 The MITRE Corporation. All rights reserved20

www.exploitoff.net (Changes)

Definitely not normal…

Page 21: Using Honeyclients for Detection and Response Against New ... · Client-side exploits are a growing threat – Lots of client-side vulnerabilities Microsoft Internet Explorer has

© 2008 The MITRE Corporation. All rights reserved21

www.exploitoff.net (Changes)

More badness…

Page 22: Using Honeyclients for Detection and Response Against New ... · Client-side exploits are a growing threat – Lots of client-side vulnerabilities Microsoft Internet Explorer has

© 2008 The MITRE Corporation. All rights reserved22

www.exploitoff.net (Scans)

Note that this binaryis very poorly identified…

Page 23: Using Honeyclients for Detection and Response Against New ... · Client-side exploits are a growing threat – Lots of client-side vulnerabilities Microsoft Internet Explorer has

© 2008 The MITRE Corporation. All rights reserved23

www.haaretz.com (Changes)

So many bad sites, so little time…

Page 24: Using Honeyclients for Detection and Response Against New ... · Client-side exploits are a growing threat – Lots of client-side vulnerabilities Microsoft Internet Explorer has

© 2008 The MITRE Corporation. All rights reserved24

www.haaretz.com (Changes)

What is this’46W9GLCI.htm’file anyway???

Trying to adda printer???

Page 25: Using Honeyclients for Detection and Response Against New ... · Client-side exploits are a growing threat – Lots of client-side vulnerabilities Microsoft Internet Explorer has

© 2008 The MITRE Corporation. All rights reserved25

www.haaretz.com (Changes)

Here it is again…

Page 26: Using Honeyclients for Detection and Response Against New ... · Client-side exploits are a growing threat – Lots of client-side vulnerabilities Microsoft Internet Explorer has

© 2008 The MITRE Corporation. All rights reserved26

www.haaretz.com

Clearly, a hacker witha political agenda!

Page 27: Using Honeyclients for Detection and Response Against New ... · Client-side exploits are a growing threat – Lots of client-side vulnerabilities Microsoft Internet Explorer has

© 2008 The MITRE Corporation. All rights reserved27

ns1.hosting101.biz

Yikes!Very, very bad sign…