3 research outputs found

    NGBPA Next Generation BotNet Protocol Analysis

    Full text link
    Abstract The command & control (c&c) protocols of botnets are moving away from plaintext IRC communicationt towards encrypted and obfuscated protocols. In gen-eral, these protocols are proprietary. Therefore, standard network monitoring tools are not able to extract the commands from the collected traffic. However, if we want to monitor these new botnets, we need to know how their protocol decryption works. In this paper we present a novel approach in malware analysis for locating the en-cryption and decryption functions in botnet programs. This information can be used to extract these functions for c&c protocols. We illustrate the applicability of our approach by a sample from the Kraken botnet. Using our approach, we were able to identify the encryption routine within minutes. We then extracted the c&c protocol encryption and decryption. Both are presented in this paper.

    Identifying and combating cyber-threats in the field of online banking

    Get PDF
    This thesis has been carried out in the industrial environment external to the University, as an industrial PhD. The results of this PhD have been tested, validated, and implemented in the production environment of Caixabank and have been used as models for others who have followed the same ideas. The most burning threats against banks throughout the Internet environment are based on software tools developed by criminal groups, applications running on web environment either on the computer of the victim (Malware) or on their mobile device itself through downloading rogue applications (fake app's with Malware APP). Method of the thesis has been used is an approximation of qualitative exploratory research on the problem, the answer to this problem and the use of preventive methods to this problem like used authentication systems. This method is based on samples, events, surveys, laboratory tests, experiments, proof of concept; ultimately actual data that has been able to deduce the thesis proposal, using both laboratory research and grounded theory methods of data pilot experiments conducted in real environments. I've been researching the various aspects related to e-crime following a line of research focusing on intrinsically related topics: - The methods, means and systems of attack: Malware, Malware families of banker Trojans, Malware cases of use, Zeus as case of use. - The fixed platforms, mobile applications and as a means for malware attacks. - forensic methods to analyze the malware and infrastructure attacks. - Continuous improvement of methods of authentication of customers and users as a first line of defense anti- malware. - Using biometrics as innovative factor authentication.The line investigating Malware and attack systems intrinsically is closed related to authentication methods and systems to infect customer (executables, APP's, etc.), because the main purpose of malware is precisely steal data entered in the "logon "authentication system, to operate and thus, fraudulently, steal money from online banking customers. Experiments in the Malware allowed establishing a new method of decryption establishing guidelines to combat its effects describing his fraudulent scheme and operation infection. I propose a general methodology to break the encryption communications malware (keystream), extracting the system used to encrypt such communications and a general approach of the Keystream technique. We show that this methodology can be used to respond to the threat of Zeus and finally provide lessons learned highlighting some general principles of Malware (in general) and in particular proposing Zeus Cronus, an IDS that specifically seeks the Zeus malware, testing it experimentally in a network production and providing an effective skills to combat the Malware are discussed. The thesis is a research interrelated progressive evolution between malware infection systems and authentication methods, reflected in the research work cumulatively, showing an evolution of research output and looking for a progressive improvement of methods authentication and recommendations for prevention and preventing infections, a review of the main app stores for mobile financial services and a proposal to these stores. The most common methods eIDAMS (authentication methods and electronic identification) implemented in Europe and its robustness are analyzed. An analysis of adequacy is presented in terms of efficiency, usability, costs, types of operations and segments including possibilities of use as authentication method with biometrics as innovation.Este trabajo de tesis se ha realizado en el entorno industrial externo a la Universidad como un PhD industrial Los resultados de este PhD han sido testeados, validados, e implementados en el entorno de producci贸n de Caixabank y han sido utilizados como modelos por otras que han seguido las mismas ideas. Las amenazas m谩s candentes contra los bancos en todo el entorno Internet, se basan en herramientas software desarrolladas por los grupos delincuentes, aplicaciones que se ejecutan tanto en entornos web ya sea en el propio ordenador de la v铆ctima (Malware) o en sus dispositivos m贸viles mediante la descarga de falsas aplicaciones (APP falsa con Malware). Como m茅todo se ha utilizado una aproximaci贸n de investigaci贸n exploratoria cualitativa sobre el problema, la respuesta a este problema y el uso de m茅todos preventivos a este problema a trav茅s de la autenticaci贸n. Este m茅todo se ha basado en muestras, hechos, encuestas, pruebas de laboratorio, experimentos, pruebas de concepto; en definitiva datos reales de los que se ha podido deducir la tesis propuesta, utilizando tanto investigaci贸n de laboratorio como m茅todos de teor铆a fundamentada en datos de experimentos pilotos realizados en entornos reales. He estado investigando los diversos aspectos relacionados con e-crime siguiendo una l铆nea de investigaci贸n focalizada en temas intr铆nsecamente relacionadas: - Los m茅todos, medios y sistemas de ataque: Malware, familias de Malware de troyanos bancarios, casos de usos de Malware, Zeus como caso de uso. - Las plataformas fijas, los m贸viles y sus aplicaciones como medio para realizar los ataques de Malware. - M茅todos forenses para analizar el Malware y su infraestructura de ataque. - Mejora continuada de los m茅todos de autenticaci贸n de los clientes y usuarios como primera barrera de defensa anti- malware. - Uso de la biometr铆a como factor de autenticaci贸n innovador. La l铆nea investiga el Malware y sus sistemas de ataque intr铆nsecamente relacionada con los m茅todos de autenticaci贸n y los sistemas para infectar al cliente (ejecutables, APP's, etc.) porque el objetivo principal del malware es robar precisamente los datos que se introducen en el "logon" del sistema de autenticaci贸n para operar de forma fraudulenta y sustraer as铆 el dinero de los clientes de banca electr贸nica. Los experimentos realizados en el Malware permitieron establecer un m茅todo novedoso de descifrado que estableci贸 pautas para combatir sus efectos fraudulentos describiendo su esquema de infecci贸n y funcionamiento Propongo una metodolog铆a general para romper el cifrado de comunicaciones del malware (keystream) extrayendo el sistema utilizado para cifrar dichas comunicaciones y una generalizaci贸n de la t茅cnica de Keystream. Se demuestra que esta metodolog铆a puede usarse para responder a la amenaza de Zeus y finalmente proveemos lecciones aprendidas resaltando algunos principios generales del Malware (en general) y Zeus en particular proponiendo Cronus, un IDS que persigue espec铆ficamente el Malware Zeus, prob谩ndolo experimentalmente en una red de producci贸n y se discuten sus habilidades y efectividad. En la tesis hay una evoluci贸n investigativa progresiva interrelacionada entre el Malware, sistemas de infecci贸n y los m茅todos de autenticaci贸n, que se refleja en los trabajos de investigaci贸n de manera acumulativa, mostrando una evoluci贸n del output de investigaci贸n y buscando una mejora progresiva de los m茅todos de autenticaci贸n y de la prevenci贸n y recomendaciones para evitar las infecciones, una revisi贸n de las principales tiendas de Apps para servicios financieros para m贸viles y una propuesta para estas tiendas. Se analizan los m茅todos m谩s comunes eIDAMS (M茅todos de Autenticaci贸n e Identificaci贸n electr贸nica) implementados en Europa y su robustez y presentamos un an谩lisis de adecuaci贸n en funci贸n de eficiencia, usabilidad, costes, tipos de operaci贸n y segmentos incluyendo un an谩lisis de posibilidades con m茅todos biom茅tricos como innovaci贸n.Postprint (published version
    corecore