SlideShare una empresa de Scribd logo
1 de 22
Descargar para leer sin conexión
OnionBots:	
  Subver0ng	
  Privacy	
  Infrastructure	
  
for	
  Cyber	
  A:acks	
  
Amirali	
  Sana0nia 	
   	
  Guevara	
  Noubir	
  	
  
	
  
College	
  of	
  Computer	
  and	
  Informa0on	
  Science	
  
Northeastern	
  University,	
  Boston,	
  MA	
  
1	
  
Mo0va0on	
  
•  Abusing	
  privacy	
  infrastructure	
  	
  
–  Tor	
  Hidden	
  Services	
  
•  Recent	
  examples	
  of	
  abuse	
  of	
  privacy	
  infrastructure	
  and	
  
technology	
  
–  Silk	
  road,	
  cryptolocker,	
  Zeus	
  64,	
  Chewbacca	
  botnet	
  
•  Infected	
  devices	
  can	
  setup	
  a	
  botnet	
  through	
  Tor	
  
Hidden	
  Services	
  
–  No	
  nodes	
  know	
  the	
  IP/loca0on	
  of	
  others	
  
–  C&C	
  can	
  be	
  anywhere	
  
2	
  
Outline	
  
•  Evolu0on	
  of	
  botnets	
  and	
  their	
  shortcomings	
  
•  Review	
  of	
  Tor	
  and	
  Hidden	
  Services	
  
•  OnionBots	
  
– Life	
  Cycle	
  
– C&C	
  Communica0on	
  
– Dynamic	
  Distributed	
  Self	
  Repairing	
  (DDSR)	
  
– Sybil	
  Onion	
  A:ack	
  Protocol	
  (SOAP)	
  
3	
  
Evolu0on	
  of	
  Botnets	
  
•  Popular	
  for	
  denial	
  of	
  service	
  a:acks,	
  spam,	
  click	
  
frauds,	
  bitcoin	
  mining,	
  stealing	
  sensi0ve	
  
informa0on,	
  and	
  other	
  malicious	
  ac0vi0es	
  
•  Communica0ons	
  between	
  botmaster	
  &	
  bots	
  (C&C)	
  
–  Centralized	
  -­‐>	
  P2P;	
  HTTP	
  or	
  IRC;	
  	
  
–  Fast	
  Flux,	
  Double	
  Flux	
  to	
  randomize	
  the	
  IP	
  addresses	
  
–  Domain	
  Genera0on	
  Algorithms	
  (DGA)	
  
•  Various	
  technical	
  mi0ga0ons	
  
–  Limited	
  by	
  problems	
  of	
  jurisdic0on	
  	
  
4	
  
Centralized	
  
•  Easy	
  to	
  build	
  and	
  maintain	
  
•  Single	
  point	
  of	
  failure	
  
•  Does	
  not	
  scale	
  
•  Easy	
  to	
  detect	
  and	
  mi0gate	
  
•  Analysis	
  of	
  traffic	
  
•  Clustering	
  of	
  the	
  hosts	
  
5	
  
Fast-­‐flux	
  
•  Mapping	
  numerous	
  IP	
  addresses	
  associated	
  with	
  
a	
  single	
  fully	
  qualified	
  domain	
  name	
  (FQDN)	
  
•  	
  Single-­‐flux	
  
–  mul0ple	
  nodes	
  registering	
  and	
  de-­‐registering	
  as	
  the	
  
DNS	
  A	
  record	
  
•  Double-­‐flux	
  
–  More	
  sophis0cated	
  
–  mul0ple	
  nodes	
  registering	
  and	
  de-­‐registering	
  as	
  the	
  
DNS	
  Name	
  Server	
  (NS)	
  record	
  
•  Can	
  be	
  neutralized	
  by	
  taking	
  over	
  the	
  domain	
  	
  
6	
  
DGA	
  
•  Periodically	
  genera0ng	
  domain	
  names,	
  used	
  
as	
  rendezvous	
  point	
  
•  Once	
  a	
  sample	
  is	
  obtained	
  it	
  becomes	
  easier	
  
to	
  block	
  
•  Conficker.a	
  and	
  .b	
  are	
  prime	
  examples	
  
•  E.g.,	
  	
  zffezlkgfnox.net	
  
•  Can	
  be	
  blocked	
  using	
  pa:erns	
  in	
  the	
  domains	
  
7	
  
Tor	
  
•  Most	
  widely	
  used	
  anonymity-­‐network	
  
•  Based	
  on	
  onion	
  rou0ng	
  of	
  packets	
  
•  Hidden	
  services	
  (HS)	
  provides	
  anonymity	
  for	
  
the	
  servers	
  
•  Silkroad	
  and	
  Cryptolocker	
  are	
  prime	
  examples	
  
•  It	
  is	
  possible	
  to	
  block	
  access	
  to	
  a	
  single	
  HS	
  
with	
  sufficient	
  resources	
  
8	
  
Tor	
  Hidden	
  Services	
  
9	
  
Tor	
  Hidden	
  Services	
  
10	
  
OnionBot:	
  a	
  Crypto-­‐based	
  P2P	
  Botnet	
  
•  Typical	
  botnet	
  lifecycle	
  
–  Infec0on:	
  phishing,	
  spam,	
  remote	
  exploits,	
  drive-­‐by-­‐download	
  
or	
  zero-­‐day	
  vulnerabili0es	
  	
  
–  Rally	
  or	
  bootstrapping:	
  join	
  the	
  botnet	
  
–  Wait	
  for	
  commands	
  
–  	
  Execu0on	
  
•  OnionBot	
  key	
  features	
  
–  Similar	
  lifecycle	
  
–  Fully	
  decoupled	
  from	
  IP	
  addresses:	
  only	
  .onion	
  addresses	
  
–  Self-­‐healing	
  P2P	
  network	
  on	
  top	
  of	
  Tor	
  
–  Temporarily	
  knowledge	
  of	
  neighbors	
  .onion	
  addresses	
  
–  Indis0nguishable	
  traffic:	
  control,	
  data,	
  src/dst,	
  from	
  random	
  
–  Access	
  for	
  botmaster	
  from	
  any	
  bot	
  through	
  hidden	
  services	
  	
  
11	
  
Botnet	
  as	
  a	
  Service	
  
•  Provide	
  a	
  stealthy	
  virtual	
  machine	
  
– Time	
  limited	
  access	
  tokens	
  from	
  botmaster	
  
– Accessible	
  though	
  HiddenServices	
  
•  Payment	
  with	
  Bitcoins	
  +	
  mixing	
  	
  
12	
  
C&C	
  Communica0ons	
  in	
  OnionBot	
  
•  All	
  bots	
  know	
  OnionBot	
  master’s	
  public	
  key	
  
•  Communicate	
  through	
  flooding	
  over	
  P2P	
  net	
  
•  Unicast	
  communica0ons	
  are	
  indis0nguishable	
  
from	
  random	
  noise	
  (Elligator	
  crypto	
  keys)	
  
•  Bots	
  periodically	
  change	
  their	
  .onion	
  address	
  
•  Bots	
  report	
  .onion	
  address	
  key-­‐seed	
  to	
  
botmaster	
  
13	
  
Maintaining	
  the	
  OnionBot	
  Graph	
  
•  Dynamic	
  Distributed	
  Self	
  Repairing	
  (DDSR)	
  
– Based	
  on	
  Neighbors	
  of	
  Neighbor	
  technique	
  +	
  
pruning	
  +	
  forgemng	
  
– When	
  a	
  node	
  is	
  deleted,	
  each	
  pair	
  of	
  its	
  neighbors	
  
will	
  form	
  an	
  edge	
  
– To	
  maintain	
  a	
  low	
  degree,	
  a	
  node	
  deletes	
  the	
  
highest	
  degree	
  node	
  from	
  its	
  peer	
  list	
  
– New	
  .onion	
  address	
  is	
  generated	
  based	
  on	
  a	
  
secret	
  key	
  and	
  0me	
  
14	
  
Pruning	
  vs	
  No-­‐Pruning	
  
15	
  
DDSR	
  in	
  Ac0on	
  
16	
  
DDSR	
  Proper0es	
  
•  Low	
  diameter,	
  degree,	
  resiliency	
  to	
  nodes	
  dele0ons,	
  	
  
17	
  
Targe0ng	
  OnionBots	
  
•  Denial	
  of	
  Service	
  a:ack	
  against	
  .onion	
  addresses	
  
•  Does	
  not	
  scale	
  
•  Needs	
  prior	
  knowledge	
  of	
  the	
  .onion	
  domains	
  
•  More	
  long	
  term	
  approaches:	
  
– CAPTCHAs	
  
– Thro:ling	
  entry	
  guards	
  
– Reusing	
  failed	
  par0al	
  circuits	
  
18	
  
Sybil	
  Onion	
  A:ack	
  Protocol	
  (SOAP)	
  	
  
•  	
  	
  
19	
  
Conclusion	
  
•  Next	
  Genera0on	
  of	
  Botnets:	
  
– Subvert	
  privacy	
  infrastructures	
  
– Strong	
  cryptographic	
  blocks	
  
– Resilient	
  and	
  dependable	
  network	
  forma0ons	
  and	
  
maintenance	
  
– Tor	
  for	
  hiding	
  the	
  traffic	
  
– Bitcoin	
  for	
  anonymous	
  payments	
  
20	
  
21	
  
Interests	
  in	
  OnionBots	
  	
  
22	
  

Más contenido relacionado

La actualidad más candente

Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh BhatiaOWASP Delhi
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using TorJack Maynard
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterMohammed Bharmal
 
TOR... ALL THE THINGS
TOR... ALL THE THINGSTOR... ALL THE THINGS
TOR... ALL THE THINGSCrowdStrike
 
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...Thoughtworks
 
Anonymity Systems: Tor
Anonymity Systems: TorAnonymity Systems: Tor
Anonymity Systems: Torantitree
 
Onion protocol
Onion protocolOnion protocol
Onion protocolAnshu Raj
 
Anonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAnonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAli Habeeb
 
Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Saprative Jana
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504 Prashant Rana
 

La actualidad más candente (18)

Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
 
Tor
TorTor
Tor
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
 
TOR... ALL THE THINGS
TOR... ALL THE THINGSTOR... ALL THE THINGS
TOR... ALL THE THINGS
 
How TOR works?
How TOR works?How TOR works?
How TOR works?
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
Anonymity Systems: Tor
Anonymity Systems: TorAnonymity Systems: Tor
Anonymity Systems: Tor
 
Onion protocol
Onion protocolOnion protocol
Onion protocol
 
Anonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAnonymous Connections And Onion Routing
Anonymous Connections And Onion Routing
 
Tor Network
Tor NetworkTor Network
Tor Network
 
Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
 
Tor
TorTor
Tor
 
Tor
TorTor
Tor
 
Tor browser
Tor browserTor browser
Tor browser
 

Destacado

Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Enrique Martin
 
Onion network architecture
Onion network architectureOnion network architecture
Onion network architecturemahdi ataeyan
 
Potential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructurePotential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructureUnisys Corporation
 
Introduction to Python for Security Professionals
Introduction to Python for Security ProfessionalsIntroduction to Python for Security Professionals
Introduction to Python for Security ProfessionalsAndrew McNicol
 

Destacado (6)

Cryptography in Python
Cryptography in PythonCryptography in Python
Cryptography in Python
 
Python Cryptography & Security
Python Cryptography & SecurityPython Cryptography & Security
Python Cryptography & Security
 
Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...
 
Onion network architecture
Onion network architectureOnion network architecture
Onion network architecture
 
Potential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructurePotential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical Infrastructure
 
Introduction to Python for Security Professionals
Introduction to Python for Security ProfessionalsIntroduction to Python for Security Professionals
Introduction to Python for Security Professionals
 

Similar a OnionBots: Subverting Privacy Infrastructure for Cyber Attacks

An Evolving Era of Botnet Empires @ BSides Las Vegas
An Evolving Era of Botnet Empires @ BSides Las VegasAn Evolving Era of Botnet Empires @ BSides Las Vegas
An Evolving Era of Botnet Empires @ BSides Las VegasAndrea Scarfo
 
Setting Up .Onion Addresses for your Enterprise, v3.5
Setting Up .Onion Addresses for your Enterprise, v3.5Setting Up .Onion Addresses for your Enterprise, v3.5
Setting Up .Onion Addresses for your Enterprise, v3.5Alec Muffett
 
Botnetsand applications
Botnetsand applicationsBotnetsand applications
Botnetsand applicationsUltraUploader
 
Richard Kemmerer Keynote icsm11
Richard Kemmerer Keynote icsm11Richard Kemmerer Keynote icsm11
Richard Kemmerer Keynote icsm11ICSM 2011
 
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eradicate the Bots in the Belfry - Information Security Summit - Eric VanderburgEradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eradicate the Bots in the Belfry - Information Security Summit - Eric VanderburgEric Vanderburg
 
Anonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsAnonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsBiagio Botticelli
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYVinil Patel
 
DDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and MitigationDDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and MitigationWilson Rogerio Lopes
 
26-security2.ppt
26-security2.ppt26-security2.ppt
26-security2.pptsumita02
 
26-security2.ppt
26-security2.ppt26-security2.ppt
26-security2.pptjepoy808
 
26-security2.ppt
26-security2.ppt26-security2.ppt
26-security2.pptanakorang28
 
Botnet and its Detection Techniques
Botnet  and its Detection Techniques Botnet  and its Detection Techniques
Botnet and its Detection Techniques SafiUllah Saikat
 
Bluetooth Part-17
Bluetooth Part-17Bluetooth Part-17
Bluetooth Part-17Techvilla
 
Why and How to use Onion Networking - #EMFCamp2018
Why and How to use Onion Networking - #EMFCamp2018Why and How to use Onion Networking - #EMFCamp2018
Why and How to use Onion Networking - #EMFCamp2018Alec Muffett
 

Similar a OnionBots: Subverting Privacy Infrastructure for Cyber Attacks (20)

An Evolving Era of Botnet Empires @ BSides Las Vegas
An Evolving Era of Botnet Empires @ BSides Las VegasAn Evolving Era of Botnet Empires @ BSides Las Vegas
An Evolving Era of Botnet Empires @ BSides Las Vegas
 
Setting Up .Onion Addresses for your Enterprise, v3.5
Setting Up .Onion Addresses for your Enterprise, v3.5Setting Up .Onion Addresses for your Enterprise, v3.5
Setting Up .Onion Addresses for your Enterprise, v3.5
 
Botnetsand applications
Botnetsand applicationsBotnetsand applications
Botnetsand applications
 
Richard Kemmerer Keynote icsm11
Richard Kemmerer Keynote icsm11Richard Kemmerer Keynote icsm11
Richard Kemmerer Keynote icsm11
 
BlueHat v17 || Disrupting the Mirai Botnet
BlueHat v17 || Disrupting the Mirai Botnet BlueHat v17 || Disrupting the Mirai Botnet
BlueHat v17 || Disrupting the Mirai Botnet
 
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eradicate the Bots in the Belfry - Information Security Summit - Eric VanderburgEradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
Eradicate the Bots in the Belfry - Information Security Summit - Eric Vanderburg
 
Anonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsAnonymity in the web based on routing protocols
Anonymity in the web based on routing protocols
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
26 security2
26 security226 security2
26 security2
 
Security attacks
Security attacksSecurity attacks
Security attacks
 
DDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and MitigationDDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and Mitigation
 
Dos threats and countermeasures
Dos threats and countermeasuresDos threats and countermeasures
Dos threats and countermeasures
 
26-security2.ppt
26-security2.ppt26-security2.ppt
26-security2.ppt
 
26-security2.ppt
26-security2.ppt26-security2.ppt
26-security2.ppt
 
26-security2.ppt
26-security2.ppt26-security2.ppt
26-security2.ppt
 
Defense against botnets
Defense against botnetsDefense against botnets
Defense against botnets
 
Botnet and its Detection Techniques
Botnet  and its Detection Techniques Botnet  and its Detection Techniques
Botnet and its Detection Techniques
 
Bluetooth Part-17
Bluetooth Part-17Bluetooth Part-17
Bluetooth Part-17
 
Why and How to use Onion Networking - #EMFCamp2018
Why and How to use Onion Networking - #EMFCamp2018Why and How to use Onion Networking - #EMFCamp2018
Why and How to use Onion Networking - #EMFCamp2018
 
Dmk blackops2006
Dmk blackops2006Dmk blackops2006
Dmk blackops2006
 

Último

Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 

Último (20)

Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 

OnionBots: Subverting Privacy Infrastructure for Cyber Attacks

  • 1. OnionBots:  Subver0ng  Privacy  Infrastructure   for  Cyber  A:acks   Amirali  Sana0nia    Guevara  Noubir       College  of  Computer  and  Informa0on  Science   Northeastern  University,  Boston,  MA   1  
  • 2. Mo0va0on   •  Abusing  privacy  infrastructure     –  Tor  Hidden  Services   •  Recent  examples  of  abuse  of  privacy  infrastructure  and   technology   –  Silk  road,  cryptolocker,  Zeus  64,  Chewbacca  botnet   •  Infected  devices  can  setup  a  botnet  through  Tor   Hidden  Services   –  No  nodes  know  the  IP/loca0on  of  others   –  C&C  can  be  anywhere   2  
  • 3. Outline   •  Evolu0on  of  botnets  and  their  shortcomings   •  Review  of  Tor  and  Hidden  Services   •  OnionBots   – Life  Cycle   – C&C  Communica0on   – Dynamic  Distributed  Self  Repairing  (DDSR)   – Sybil  Onion  A:ack  Protocol  (SOAP)   3  
  • 4. Evolu0on  of  Botnets   •  Popular  for  denial  of  service  a:acks,  spam,  click   frauds,  bitcoin  mining,  stealing  sensi0ve   informa0on,  and  other  malicious  ac0vi0es   •  Communica0ons  between  botmaster  &  bots  (C&C)   –  Centralized  -­‐>  P2P;  HTTP  or  IRC;     –  Fast  Flux,  Double  Flux  to  randomize  the  IP  addresses   –  Domain  Genera0on  Algorithms  (DGA)   •  Various  technical  mi0ga0ons   –  Limited  by  problems  of  jurisdic0on     4  
  • 5. Centralized   •  Easy  to  build  and  maintain   •  Single  point  of  failure   •  Does  not  scale   •  Easy  to  detect  and  mi0gate   •  Analysis  of  traffic   •  Clustering  of  the  hosts   5  
  • 6. Fast-­‐flux   •  Mapping  numerous  IP  addresses  associated  with   a  single  fully  qualified  domain  name  (FQDN)   •   Single-­‐flux   –  mul0ple  nodes  registering  and  de-­‐registering  as  the   DNS  A  record   •  Double-­‐flux   –  More  sophis0cated   –  mul0ple  nodes  registering  and  de-­‐registering  as  the   DNS  Name  Server  (NS)  record   •  Can  be  neutralized  by  taking  over  the  domain     6  
  • 7. DGA   •  Periodically  genera0ng  domain  names,  used   as  rendezvous  point   •  Once  a  sample  is  obtained  it  becomes  easier   to  block   •  Conficker.a  and  .b  are  prime  examples   •  E.g.,    zffezlkgfnox.net   •  Can  be  blocked  using  pa:erns  in  the  domains   7  
  • 8. Tor   •  Most  widely  used  anonymity-­‐network   •  Based  on  onion  rou0ng  of  packets   •  Hidden  services  (HS)  provides  anonymity  for   the  servers   •  Silkroad  and  Cryptolocker  are  prime  examples   •  It  is  possible  to  block  access  to  a  single  HS   with  sufficient  resources   8  
  • 11. OnionBot:  a  Crypto-­‐based  P2P  Botnet   •  Typical  botnet  lifecycle   –  Infec0on:  phishing,  spam,  remote  exploits,  drive-­‐by-­‐download   or  zero-­‐day  vulnerabili0es     –  Rally  or  bootstrapping:  join  the  botnet   –  Wait  for  commands   –   Execu0on   •  OnionBot  key  features   –  Similar  lifecycle   –  Fully  decoupled  from  IP  addresses:  only  .onion  addresses   –  Self-­‐healing  P2P  network  on  top  of  Tor   –  Temporarily  knowledge  of  neighbors  .onion  addresses   –  Indis0nguishable  traffic:  control,  data,  src/dst,  from  random   –  Access  for  botmaster  from  any  bot  through  hidden  services     11  
  • 12. Botnet  as  a  Service   •  Provide  a  stealthy  virtual  machine   – Time  limited  access  tokens  from  botmaster   – Accessible  though  HiddenServices   •  Payment  with  Bitcoins  +  mixing     12  
  • 13. C&C  Communica0ons  in  OnionBot   •  All  bots  know  OnionBot  master’s  public  key   •  Communicate  through  flooding  over  P2P  net   •  Unicast  communica0ons  are  indis0nguishable   from  random  noise  (Elligator  crypto  keys)   •  Bots  periodically  change  their  .onion  address   •  Bots  report  .onion  address  key-­‐seed  to   botmaster   13  
  • 14. Maintaining  the  OnionBot  Graph   •  Dynamic  Distributed  Self  Repairing  (DDSR)   – Based  on  Neighbors  of  Neighbor  technique  +   pruning  +  forgemng   – When  a  node  is  deleted,  each  pair  of  its  neighbors   will  form  an  edge   – To  maintain  a  low  degree,  a  node  deletes  the   highest  degree  node  from  its  peer  list   – New  .onion  address  is  generated  based  on  a   secret  key  and  0me   14  
  • 16. DDSR  in  Ac0on   16  
  • 17. DDSR  Proper0es   •  Low  diameter,  degree,  resiliency  to  nodes  dele0ons,     17  
  • 18. Targe0ng  OnionBots   •  Denial  of  Service  a:ack  against  .onion  addresses   •  Does  not  scale   •  Needs  prior  knowledge  of  the  .onion  domains   •  More  long  term  approaches:   – CAPTCHAs   – Thro:ling  entry  guards   – Reusing  failed  par0al  circuits   18  
  • 19. Sybil  Onion  A:ack  Protocol  (SOAP)     •      19  
  • 20. Conclusion   •  Next  Genera0on  of  Botnets:   – Subvert  privacy  infrastructures   – Strong  cryptographic  blocks   – Resilient  and  dependable  network  forma0ons  and   maintenance   – Tor  for  hiding  the  traffic   – Bitcoin  for  anonymous  payments   20  
  • 21. 21