Presentation is loading. Please wait.

Presentation is loading. Please wait.

Web Based Attacks Symantec White Paper Offense – The Other Side By AC 2 Craig, RB, Henky, Sohail.

Similar presentations

Presentation on theme: "Web Based Attacks Symantec White Paper Offense – The Other Side By AC 2 Craig, RB, Henky, Sohail."— Presentation transcript:

1 Web Based Attacks Symantec White Paper Offense – The Other Side By AC 2 Craig, RB, Henky, Sohail

2 General Impression on Whitepaper Overall the white paper was informative Does not clearly define audience – For sophisticated users: too introductory – For novice users: lack of practical guidelines (ex: comparison of various products such as Symantec vs freeware AVG) Somewhat outdated – rapidly changing threats

3 Items Missed – Other vectors: Web 2.0 vulnerabilities Webmail threats Social media sites (ex: Facebook, Twitter, etc) Online video sites (ex: Youtube, adult video sites, etc) “Black-hat” Search Engine Optimization (SEO) – Global Economics of cybercrime

4 Web 2.0 Vulnerabilities Cross Site Scripting (XSS)- Malicious input is sent by an attacker, stored by a system, and then displayed to other users. CSRF/ CGRF- Malicious site code generates requests to a different site to which the victim is authorized, for example through a persistent cookie Phishing- Installs a fraudulent widget or redirects to a fraudulent website to steal sensitive information from the victim Injection Flaws- XML injection, XPath injection, JavaScript injection and JSON injection

5 Webmail Threats Increasing SPAM and Unsolicited E-mail – Resurge of SPAM mails during the Obama presidency campaign (2008) – Malware that disguised as invoices from Fed-Ex and UPS (2009) – Online Pharmacy scam (2009) Webmail Service – 10 K of accounts were leaked on Oct 09, for Hotmail, Gmail, Yahoo and other popular Webmail sites Content and Virus filtering outside perimeter – Cloud based filtering to secure E-mail and corporate network

6 Online Video as a Vector We have entered into the “You Tube” age where anyone can upload a video. – Online web links trick victims in loading a program “stream viewer” to watch the movie – This is actually a malware program

7 Social Networking In 2009 about 2% of all online clicks going thru 4000 Cisco security devices were for Social networking sites. Facebook was the winner with 1.35% of all online clicks. So who posses the most online security risk Business cannot ignore these threats anymore (my company blocked facebook access)

8 Social Networking Perceived Threat

9 The Koobface It’s a sophisticated worm which registers and activates facebok accounts Sends invitation to random facebook users Joins random groups, and post messages on friends wall (which includes link to videos which have malware) And it is SMART it protects itself from detection by not making too many new friends.

10 The Mikeyy Mooney Worms Twitter in April 2009 got attacked by the StalkDaily Worm This was a work of a 17 year old called Mikeyy Mooney. (Who did this because he was bored) The worm basically posts unwanted messages to users pages In December 2009, the Twitter DNS was compromised and visitors were redirected to a site hacked by the Iranian Cyber Army

11 SAMMY (XSS) (a.k.a JS.Spacehero) On Oct 4, 2005 The first major worm to use cross-site scripting (XSS) vulnerability Over One million personal users profile were altered overnight MySpace at that time had over 32 million users and was among the top 10 visited site in the US Using JavaScript viral code the worm infected the site and made the hacker – Sammy a “friend” and a “Hero” on the infected users profile The worm displayed a string something like “but most of all, Sammy is my hero”

12 Search Engine Optimization (SEO) Standard marketing technique used by many legitimate firms to promote internet presence Involves: – careful selection of keywords and topics – Manipulation of links to increase a page’s popularity Attract visitors with SEO to push links to the top of search results

13 ‘Black-hat’ SEO ‘White-hat’ SEO: approved methods by search vendors: editing content to increase relevance to certain search keywords ‘Black-hat’ SEO: spamdexing, ‘doorway’ pages, spam messages posted on blogs/forums.

14 ‘Black-hat’ SEO Cont’d Most popular: ‘doorway’ sites – hosting content specifically created/optimized for a particular topic & search phrases – Link to a promoted site using URL containing affiliate ID – High density of related keywords  when indexed by search engine, referred site by ‘doorway’ will rank higher & placed higher in search results Common ‘black-hat’ SEO workflow: – Mining Google Trends data for most popular search topics (ex: ‘death of david carradine’, ‘lady gaga’, etc) – Generating content related to popular search phrases & linking to a promotional site – Uploading content as a blog, forum post, Wiki article, or as a site Most of the steps automated by SEO software tools

15 ‘Black-hat’ SEO Cont’d Custom tools for sale on underground black-hat forums to generate contents that seems genuine & interlink pages across domains for more exposure – A-Poster: specializing in spamming guestbooks – Xrumer: discussion forums – automated forum registrations, generate email accounts – ZennoPoster: generate accounts on any webmail site, social networks, blogs, free web-hosting provides, etc Send SMS messages Parse search results Place spam on forums and guestbooks

16 Countries hosting Malicious Websites US is #1 (Top 3 in 2009: US, Russia, China) China’s figure dropped from 51.4% (2007) to 27.7% (2008), to 11.2% (2009) Peru moving strongly up to 4 th in 2009 2008 2009

17 Global Cybercrime Honest money is harder to come by People being lured into world of crime, programmers who can’t find legit jobs are more easily recruited by criminal gangs Malware has evolved to become a major industry in itself, with complicated economic infrastructure & population of well-organized, well-funded criminal gangs, highly motivated & highly trained programmers generating massive volumes of malicious codes and exploits

18 Partnerka Russian term referring to complex networks of affiliates linked by a common desire to make money from the internet. Groups are well organized, dominated by Russians, & responsible for high proportion of spam campaigns and malware attacks Biggest area of activity includes: online pharmacies selling illegal, off-prescription and often unsafe drugs (promoted thru spam and SEO). Ex: The Canadian Pharmacy

19 Top Spammers

20 Partnerka cont’d Other activities: – ‘Scareware’ rogue/fake anti-virus – Counterfeit goods (ex: fake Rolexes & high end merchandises) – Online casinos (favorite method for money laundering) – Adult sites – Dating sites Cash comes from: – Direct sales of fake or illegal goods – Complex affiliations with pay-per-click or pay-per-install marketing firms, who in turn get paid by often legit companies hoping to get more incoming traffic – Botnets & phishers selling data of stolen credit card information – Malware creators selling Trojans, spamming & SEO manipulation tools

21 Partnerka cont’d Typical revenues: – A single Canadian Pharmacy spam campaign can net 200 purchases ($16,000 in revenues daily) – An affiliate webmaster redirecting 10,000 hits per day to a single scareware site can earn up to $180,000 annually. Not homogeneous groups – different gangs in strong competition with each other. – Allegiance: more generous commission rates, shorter ‘hold’ periods, support for wider range of payment options, hi-quality promotional, better support, etc – Perks: Expensive parties for members, generous holiday gifts, sweepstakes with prize like luxury cars, etc – Can turn ugly  DDoS attacks by competing gangs

22 References Sophos 2009 Security Threat Report ( report-jan-2009-na.pdf) report-jan-2009-na.pdf Sophos 2010 Security Threat Report ( wpna.pdf) Cross –site scripting worms and viruses ( Dmitry Samosseiko, “The Partnerka – What is It, and Why Should You Care?” (,20091011,13175.html)

Download ppt "Web Based Attacks Symantec White Paper Offense – The Other Side By AC 2 Craig, RB, Henky, Sohail."

Similar presentations

Ads by Google