Web Wreck-utation - CanSecWest 2008

91
Wreck-utation Dan Hubbard Stephan Chenette Websense Security Labs CanSec 2008

Transcript of Web Wreck-utation - CanSecWest 2008

Page 1: Web Wreck-utation - CanSecWest 2008

Wreck-utation

Dan HubbardStephan Chenette

Websense Security LabsCanSec 2008

Page 2: Web Wreck-utation - CanSecWest 2008
Page 3: Web Wreck-utation - CanSecWest 2008

Reputation: is the opinion (more technically, a social evaluation) of the public toward a

person, a group of people, or an organization. It is an important factor in many fields, such as business, online communities or social status.

Page 4: Web Wreck-utation - CanSecWest 2008

Reputation: is the opinion (more technically, a social evaluation) of the public toward a

person, a group of people, or an organization. It is an important factor in many fields, such as business, online communities or social status.

Online Reputation is a factor in any online community where trust is important. Examples include eBay, an auction

service which uses a system of customer feedback to publicly rate each member's reputation.

Page 5: Web Wreck-utation - CanSecWest 2008

Best thing since sliced bread?

Page 6: Web Wreck-utation - CanSecWest 2008

Best thing since sliced bread? “Reputation systems are the future

defense againstmalicious code and SPAM”

Page 7: Web Wreck-utation - CanSecWest 2008

“You are only as good as your reputation”

Best thing since sliced bread? “Reputation systems are the future

defense againstmalicious code and SPAM”

Page 8: Web Wreck-utation - CanSecWest 2008

“You are only as good as your reputation”

“Reputation is the next stage in the antivirus evolution”

Best thing since sliced bread? “Reputation systems are the future

defense againstmalicious code and SPAM”

Page 9: Web Wreck-utation - CanSecWest 2008

Good *or* Bad

Page 10: Web Wreck-utation - CanSecWest 2008

Good *or* Bad

Mozilla.org

Page 11: Web Wreck-utation - CanSecWest 2008

Good *or* Bad

Russian Business NetworkMozilla.org

Page 12: Web Wreck-utation - CanSecWest 2008

Good *and* Bad

Page 13: Web Wreck-utation - CanSecWest 2008

Good *and* Bad

MSNBC Sports

Page 14: Web Wreck-utation - CanSecWest 2008

Good *and* Bad

MSNBC Sports StatsMSNBC Sports

Page 15: Web Wreck-utation - CanSecWest 2008

Good *gone* Bad

Page 16: Web Wreck-utation - CanSecWest 2008

Good *gone* Bad

Super Bowl Site

Page 17: Web Wreck-utation - CanSecWest 2008

Good *gone* Bad

Super Bowl Site 0wned from China

Page 18: Web Wreck-utation - CanSecWest 2008

Using Reputation forSecurity Decisions

Page 19: Web Wreck-utation - CanSecWest 2008

Using Reputation forSecurity Decisions

Web ReputationEmail Reputation

Domain ReputationBonus: Binary Reputation

Page 20: Web Wreck-utation - CanSecWest 2008

REPUTATION

AGEGEO

HISTORY

COUSINTRAFFIC

TYPOS

LEXICALNEIGHBORS

Page 21: Web Wreck-utation - CanSecWest 2008

TOP 100

CURRENTEVENTS

REGIONAL &

GENRE

PERSONAL &

GARBAGE

THE LONG TAILTHE BLOG TAIL

Web Reputation

Page 22: Web Wreck-utation - CanSecWest 2008

TOP 100

CURRENTEVENTS

REGIONAL &

GENRE

PERSONAL &

GARBAGE

THE LONG TAILTHE BLOG TAIL

PHISH, FRAUD, SPAM

Web Reputation

Page 23: Web Wreck-utation - CanSecWest 2008

TOP 100

CURRENTEVENTS

REGIONAL &

GENRE

PERSONAL &

GARBAGE

THE LONG TAILTHE BLOG TAIL

PHISH, FRAUD, SPAM

Web Wreck-utation

Page 24: Web Wreck-utation - CanSecWest 2008

TOP 100

CURRENTEVENTS

REGIONAL &

GENRE

PERSONAL &

GARBAGE

THE LONG TAILTHE BLOG TAIL

HOSTING +REGIONAL + COLLATERAL

DAMAGE

PHISH, FRAUD, SPAM

Web Wreck-utation

Page 25: Web Wreck-utation - CanSecWest 2008

TOP 100

CURRENTEVENTS

REGIONAL &

GENRE

PERSONAL &

GARBAGE

THE LONG TAILTHE BLOG TAIL

HOSTING +REGIONAL + COLLATERAL

DAMAGE

BIG NAMECOMPROMISES

& SEOPHISH, FRAUD, SPAM

Web Wreck-utation

Page 26: Web Wreck-utation - CanSecWest 2008

TOP 100

CURRENTEVENTS

REGIONAL &

GENRE

PERSONAL &

GARBAGE

THE LONG TAILTHE BLOG TAIL

HOSTING +REGIONAL + COLLATERAL

DAMAGE

BIG NAMECOMPROMISES

& SEO

EXPLOIT 2.0

PHISH, FRAUD, SPAM

Web Wreck-utation

Page 27: Web Wreck-utation - CanSecWest 2008

mysql>

Page 28: Web Wreck-utation - CanSecWest 2008

SELECT COUNT  FROM vurldb WHERE hostname RLIKE

'(.+\.)?(googlepages|geocities|yahoo|facebook|myspace|google|live)\.com'

AND category IN ('Malicious Web Sites', 'Spyware', 'Keylogger') AND

add_date BETWEEN '2008-02-01' AND '2008-02-29';

3032

mysql>

mysql>

Page 29: Web Wreck-utation - CanSecWest 2008

The BLOG TAIL / WEB TWO DOT UH OH

Page 30: Web Wreck-utation - CanSecWest 2008

Blogger: Allows embedded URL’s to malicious code

The BLOG TAIL / WEB TWO DOT UH OH

Page 31: Web Wreck-utation - CanSecWest 2008

Blogger: Allows embedded URL’s to malicious codeCalendar + DOCS: allow embedded malicious code

The BLOG TAIL / WEB TWO DOT UH OH

Page 32: Web Wreck-utation - CanSecWest 2008

Blogger: Allows embedded URL’s to malicious codeCalendar + DOCS: allow embedded malicious codeGooglePages: allows upload of malicious code

The BLOG TAIL / WEB TWO DOT UH OH

Page 33: Web Wreck-utation - CanSecWest 2008

Blogger: Allows embedded URL’s to malicious codeCalendar + DOCS: allow embedded malicious codeGooglePages: allows upload of malicious codePicasso Albums: allow embedded URL’s to malicious code

The BLOG TAIL / WEB TWO DOT UH OH

Page 34: Web Wreck-utation - CanSecWest 2008

Using Reputation forSecurity Decisions

Page 35: Web Wreck-utation - CanSecWest 2008

The webs most visited sites are increasingly being used to host malicious code

Spammers, and malcode groups have wised up to industry use of reputation and are exploiting it

> 50% of malicious websites are compromised

70% of top 100 sites rely on user uploaded content

Most top sites have poor, if any, input validation

What’s the Problem ?

Page 36: Web Wreck-utation - CanSecWest 2008

eBay input validationeBay is unquestionably one of the most

popular websites (high reputation)

eBay does some input but not in real-time

Page 37: Web Wreck-utation - CanSecWest 2008

Seller Reputation

We blogged in the past of sellers making their reputation go from 0 to “Power Seller”

Page 38: Web Wreck-utation - CanSecWest 2008

Seller Reputation

We blogged in the past of sellers making their reputation go from 0 to “Power Seller”

Page 39: Web Wreck-utation - CanSecWest 2008

“make me a power seller”

• How did this user accomplish this?

Page 40: Web Wreck-utation - CanSecWest 2008

Congrats, your have been 0wned

Page 41: Web Wreck-utation - CanSecWest 2008

Adding malicious listings to eBay…

Page 42: Web Wreck-utation - CanSecWest 2008

eBay Sploit

Page 43: Web Wreck-utation - CanSecWest 2008

eBay Sploit

Page 44: Web Wreck-utation - CanSecWest 2008
Page 45: Web Wreck-utation - CanSecWest 2008

90 minutes later.....

Page 46: Web Wreck-utation - CanSecWest 2008

Easy as Pie?

Page 47: Web Wreck-utation - CanSecWest 2008

Easy as Pie?

Page 48: Web Wreck-utation - CanSecWest 2008

Everything has a price!Buying good Reputation

Page 49: Web Wreck-utation - CanSecWest 2008

Expired Domain dreamcast.com

Page 50: Web Wreck-utation - CanSecWest 2008

IFRAME:Content Injection

> 20,000 sites infected today (all had good reputation)

ZDNet.com, news.com, history.com, usatoday.com, etc. The list goes on

This attack used search engine optimization caching within high reputable sites to cache

malicious content

Page 51: Web Wreck-utation - CanSecWest 2008

IFRAME:Content Injection

Page 52: Web Wreck-utation - CanSecWest 2008

Attacks are using a bot to automatically search inside Blogdigger search engine.

In turn Blogdigger is caching the results.

IFRAME:Content Injection

Page 53: Web Wreck-utation - CanSecWest 2008

IFRAME is able to escape the parent tag

IFRAME:Content Injection

Page 54: Web Wreck-utation - CanSecWest 2008

Unsuspecting user who trust the site is redirected automatically to this PUS site

IFRAME:Content Injection

Page 55: Web Wreck-utation - CanSecWest 2008

Email Wreck-utation

Page 56: Web Wreck-utation - CanSecWest 2008

Email Wreck-utationHas been around for a lot longer than

Web Reputation

Several sender technologies: (SPF, DKIM,SenderID)

Reputation systems have helped move the problem

Page 57: Web Wreck-utation - CanSecWest 2008

Email Wreck-utation

Page 58: Web Wreck-utation - CanSecWest 2008

Email Wreck-utationStart your own company and add

SPF, SenderID, etc records, and move around

Page 59: Web Wreck-utation - CanSecWest 2008

Email Wreck-utationStart your own company and add

SPF, SenderID, etc records, and move around

Hijack a “good” open relay

Page 60: Web Wreck-utation - CanSecWest 2008

Email Wreck-utationStart your own company and add

SPF, SenderID, etc records, and move around

Hijack a “good” open relay

Use a webmail provider like Yahoo!, Gmail, Microsoft

Page 61: Web Wreck-utation - CanSecWest 2008

Email Wreck-utationStart your own company and add

SPF, SenderID, etc records, and move around

Hijack a “good” open relay

Use a webmail provider like Yahoo!, Gmail, Microsoft

Spread wealth to BLOGS (Splogs)

Page 62: Web Wreck-utation - CanSecWest 2008

Email Wreck-utation“Legit Sender”

Page 63: Web Wreck-utation - CanSecWest 2008

Email: “Legit” SPF

Page 64: Web Wreck-utation - CanSecWest 2008

Email: “Legit” SPF"Theres never been a better time to get a new car"

mail.yakdrive.com [67.218.177.112]mail.jadeblond.com [67.218.177.54]mail.routevery.com [67.218.177.53]mail.filterwind.com [67.218.185.50]mail.routevery.com [67.218.177.53]mail.bendton.com [67.218.177.73]

mail.wellcometo.com [67.218.185.76]mail.domesell.com [67.218.185.96]mail.smashoot.com [67.218.185.94]

mail.arrivespark.com [67.218.185.117]mail.spearmine.com [67.218.185.74]mail.cleanfluff.com [67.218.171.33]

mail.thirdground.com [67.218.171.20]

Page 65: Web Wreck-utation - CanSecWest 2008

Email: “Legit” SPF

Page 66: Web Wreck-utation - CanSecWest 2008

Email: “Legit” SPF

Page 67: Web Wreck-utation - CanSecWest 2008

MS Live Sending SPAM

Page 68: Web Wreck-utation - CanSecWest 2008

MS Live Captchas

Page 69: Web Wreck-utation - CanSecWest 2008

Gmail Captchas

Page 70: Web Wreck-utation - CanSecWest 2008

Cruel Irony: Google Redirects

http://www.google.com/pagead/iclk?sa=3Dl&ai=3DoOfDzh&num==3D07504&adurl=3Dhttp://visamedicalopinion.com/run.exe

Page 71: Web Wreck-utation - CanSecWest 2008

Moving Targets

Page 72: Web Wreck-utation - CanSecWest 2008

Moving Targets: SPLOG

Page 73: Web Wreck-utation - CanSecWest 2008

Moving Targets: SPLOG

Page 74: Web Wreck-utation - CanSecWest 2008

Moving Targets: SPLOG

Page 75: Web Wreck-utation - CanSecWest 2008

Domain Reputation

Page 76: Web Wreck-utation - CanSecWest 2008

Domain ReputationMostly used for email

Some people are re-factoring for Web

Domain tasting best example (age)

Cousin / Likeliness of other domains used

We have something called LexiRep also

Page 77: Web Wreck-utation - CanSecWest 2008

Domain Wreck-utation

Page 78: Web Wreck-utation - CanSecWest 2008

Domain Wreck-utationWeb 80 - 20 rule works against this

Compromised sites are not accounted for

Domain stealing, acquiring, breaks age and history algorithms

DNS spoofing, hacks ,etc

Do not account for URL’s, hostnames

Page 79: Web Wreck-utation - CanSecWest 2008

Application reputation

Packer heuristics are commonly used to categorize a malicious binary, because 90% of

all malicious binaries are packed.

Malicious authors have increasingly started to try to fool application detection engines into thinking the binary in question is not a

packed binary.

Page 80: Web Wreck-utation - CanSecWest 2008

Storm EcardApplication reputation

Sections look normal

Page 81: Web Wreck-utation - CanSecWest 2008

Storm EcardApplication reputation

Entry point matches MinGW GCC

Page 82: Web Wreck-utation - CanSecWest 2008

Storm EcardApplication reputation

• Eventually a call to the packed code…

Page 83: Web Wreck-utation - CanSecWest 2008

Storm EcardApplication reputation

How did it do this? There are multiple programs to scramble the true identity…. i.e. DotFix Fake Signer, pseudo signer, etc

Page 84: Web Wreck-utation - CanSecWest 2008

Conclusion

Page 85: Web Wreck-utation - CanSecWest 2008

ConclusionReputation systems for security are effective in long tail of

Internet

Page 86: Web Wreck-utation - CanSecWest 2008

ConclusionReputation systems for security are effective in long tail of

Internet

Reputation can be used with other parts of the equation to make better decisions

Page 87: Web Wreck-utation - CanSecWest 2008

ConclusionReputation systems for security are effective in long tail of

Internet

Reputation can be used with other parts of the equation to make better decisions

Web reputation is less affective than email reputation based on the new dynamics of the web, the large numbers of

compromised web-sites, and web two dot uh-oh

Page 88: Web Wreck-utation - CanSecWest 2008

Conclusion

Page 89: Web Wreck-utation - CanSecWest 2008

Conclusion

Page 90: Web Wreck-utation - CanSecWest 2008

Conclusion

Page 91: Web Wreck-utation - CanSecWest 2008

dhubbard | schenette<at>websense.com

THANKS !