SlideShare uma empresa Scribd logo
1 de 69
www.pandasecurity.com
Lessons Learned from Mariposa:
Avoiding Disaster, Protecting from
Cybercrime
Sean-Paul Correll
Threat Researcher
Panda Security, USA
www.pandasecurity.com
May 2009
2
www.pandasecurity.com
October 2009
3
www.pandasecurity.com
Mariposa Working Group
Defence Intelligence
Panda Security
Georgia Tech Information Security Center
Neustar
Researchers who wish to remain anonymous
In collaboration with:
FBI
Spanish Civil Guard
4
www.pandasecurity.com
Some of the DNS domain names
observed as C&C servers:
lalundelau.sinip.es
bf2back.sinip.es
thejacksonfive.mobi
butterfly.BigMoney.biz
bfisback.sinip.es
qwertasdfg.sinip.es
5
www.pandasecurity.com
Early estimates
6
??????????
Command & Control
SPAIN
USA
100,000 – 200,000 Victims
PANAMA
www.pandasecurity.com7
??????????
Command & Control
SPAIN
USA
PANAMA
100,000 – 200,000 Victims SINKHOLE
www.pandasecurity.com
Timeline
December 21st 2009
Spanish LE visit to CDMON (Spanish ISP)
December 23rd 2009
All C&C domains pointed to sinkhole:
Cdmon, ChangeIP, Directi, GetmyIP, DynDNS
December 24th 2009
New binary (2/24 @ VirusTotal) dropped.
8
www.pandasecurity.com
Staying undetected…
9
The botnet operators used
Swedish VPN providers in order
to avoid physical detection.
The sinkhole caused the main
botnet operator to panic and
connect to the infrastructure
using his home DSL connection.
www.pandasecurity.com
Panic at the disco!
C&C sinkhole panic allowed us to trace the
botnet operators Internet connection back to
Spain.
Spanish LE visits ISP to retrieve DSL customer
information
Time to make some arrests!
10
www.pandasecurity.com
MWG: Let’s move on the arrest!
Spain LE: Not so fast!
Law enforcement roadblocks:
Owning a botnet is not illegal in Spain
Spanish law protects criminals
Forensic skills are not up to par
11
www.pandasecurity.com
Timeline
January 22nd 2010
Bot master bribed CDMON tech support to
recover booster.estr.es for €500.
January 25th 2010
Bot master launches DDOS against Defence Intelligence
sustained 900MB/s traffic
February 3rd 2010
Bot master arrested at home by Spanish Civil Guard
12
www.pandasecurity.com
What did we uncover after the arrest?
13
www.pandasecurity.com
Stolen Credentials
• Personal information from over 1,000,000 victims
Credit Cards
Social Security numbers
Bank Accounts
Intranet credentials
Data from universities, banks, + half of Fortune 1000 companies
14
What did we uncover after the arrest?
www.pandasecurity.com15
www.pandasecurity.com
Anti-detection/debugging tools…
16
www.pandasecurity.com
Anti-detection/debugging tools
17
www.pandasecurity.com
Licensing control system
18
Butterfly Bot Version
Licensing control UID
www.pandasecurity.com
Builder packed with Themida
19
www.pandasecurity.com
Timeline after initial arrest
February 10th 2010
Butterfly.bigmoney.biz recovered by Mariposa.
Moved C&C servers to Israeli & Chinese domain
registrars.
February 24th 2010
Ostiator & JonnyLoleante arrested
March 3rd 2010
Mariposa Final Takedown
20
www.pandasecurity.com21
Infections in 189 different countries
www.pandasecurity.com
Top 10 infected countries
22
www.pandasecurity.com
Infection statistics
31,901 infected towns and cities
23
www.pandasecurity.com
Infection statistics
24
Over half of Fortune
1000’s infected
Over 40 banks infected
www.pandasecurity.com
Why was Mariposa so successful?
25
www.pandasecurity.com
Strong AV signature evasion + Botnet Infrastructure
26
+ =
www.pandasecurity.com
Peer to Peer (P2P)
27
www.pandasecurity.com
P2P – Strengths and Weaknesses
28
Low chance of infecting corporate
networks (perimeter blocking)
High chance of infecting home networks
(piracy)
APAC region had a high concentration of
infections. High risk due to rampant piracy.
65% of software is pirated in India according to
Business Software Alliance Study:
http://bit.ly/bLlN06
www.pandasecurity.com
USB Distribution
29
www.pandasecurity.com
USB – Strengths and Weaknesses
30
High chance of infection in corporate networks
USB enabled by default in most
organizations
Working from home introduces threats into
the workplace.
High chance of infection in home networks
We use USB devices every day
Knowledge of USB threat vector low
www.pandasecurity.com
MSN Messenger
31
www.pandasecurity.com
MSN Messenger
32
www.pandasecurity.com
MSN Messenger – Strengths and Weaknesses
33
Moderate chance of infection in corporate networks
Sometimes used for interoffice communication
31% of businesses use instant messaging according to Nielson
High chance of infection in home networks
40% of home users use instant messaging according to Nielson
MSN usage ranks high in most affected countries
Unique social engineering capability
www.pandasecurity.com
Exploit Kits
34
www.pandasecurity.com
Exploit kits– Strengths and Weaknesses
35
Moderate chance of infection in corporate networks
Operating system updates are most likely enforced via policy
Non system software updates are most likely not enforced via policy
Antivirus software installed by default
High chance of infection in home networks
Operating system updates not always installed.
Non system software updates are almost never installed (unless forced)
Antivirus software may not be installed
www.pandasecurity.com
Mariposa Botnet Control Software
36
www.pandasecurity.com
Command and Control Software
37
www.pandasecurity.com38
www.pandasecurity.com39
www.pandasecurity.com40
www.pandasecurity.com41
www.pandasecurity.com42
www.pandasecurity.com43
www.pandasecurity.com
Who are these guys?
44
www.pandasecurity.com
Members Arrested
Netkairo, 31, Spain
Ostiator, 25, Spain
jonnyloleante, 30, Spain
45
DDP Team:
Dias De Pesadilla Team – Nightmare Days Team
www.pandasecurity.com
What were their roles?
46
www.pandasecurity.com47
www.pandasecurity.com
Butterfly Bot Packages
48
www.pandasecurity.com
Butterfly Module Prices
49
www.pandasecurity.com
How much money were they earning?
10,000€ / month (around each 3,000)
Ads
Pay per click
Renting portions of the botnet
Post data grabber (stealing credentials)
50
www.pandasecurity.com51
www.pandasecurity.com52
www.pandasecurity.com53
www.pandasecurity.com
Monday, March 22nd
54
www.pandasecurity.com55
www.pandasecurity.com56
www.pandasecurity.com
Commenting on the blog
57
www.pandasecurity.com58
www.pandasecurity.com59
www.pandasecurity.com60
www.pandasecurity.com61
Iuis_corrons following Luis_Corrons
www.pandasecurity.com
D’oh!
62
www.pandasecurity.com
What are we dealing with here?
63
www.pandasecurity.com
The Slovenian Connection
64
www.pandasecurity.com65
www.pandasecurity.com66
www.pandasecurity.com
Collateral Damage?
67
Dejan Janzekovic
www.pandasecurity.com
Lessons Learned
Just shutting down botnet C&C’s does not stop the bad guys.
Arresting the bad guys doesn’t stop them either 
Signature based Antivirus detection isn’t good enough. Signatures
can take weeks to develop.
Cyber legislation needs significant improvements to adapt to the
current threat landscape situation
Communication with law enforcement is often one-way and
difficult, but results are better than simple shutdowns.
68
www.pandasecurity.com
Thank you!
Sean-Paul Correll
Threat Researcher
Panda Security, USA
Twitter: http://twitter.com/lithium
E-mail: lithium@us.pandasecurity.com

Mais conteúdo relacionado

Mais procurados

Malware's Most Wanted: Linux and Internet of Things Malware
Malware's Most Wanted: Linux and Internet of Things MalwareMalware's Most Wanted: Linux and Internet of Things Malware
Malware's Most Wanted: Linux and Internet of Things MalwareCyphort
 
Malware self protection-matrix
Malware self protection-matrixMalware self protection-matrix
Malware self protection-matrixCyphort
 
Cybersecurity 5 road_blocks
Cybersecurity 5 road_blocksCybersecurity 5 road_blocks
Cybersecurity 5 road_blocksCyphort
 
Understanding Malware Lateral Spread Used in High Value Attacks
Understanding Malware Lateral Spread Used in High Value AttacksUnderstanding Malware Lateral Spread Used in High Value Attacks
Understanding Malware Lateral Spread Used in High Value AttacksCyphort
 
MMW Anti-Sandbox Techniques
MMW Anti-Sandbox TechniquesMMW Anti-Sandbox Techniques
MMW Anti-Sandbox TechniquesCyphort
 
Malware's Most Wanted: The Many Faces of Malware
Malware's Most Wanted: The Many Faces of MalwareMalware's Most Wanted: The Many Faces of Malware
Malware's Most Wanted: The Many Faces of MalwareCyphort
 
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014viaForensics
 
Malware Most Wanted: Security Ecosystem
Malware Most Wanted: Security EcosystemMalware Most Wanted: Security Ecosystem
Malware Most Wanted: Security EcosystemCyphort
 
Malware Most Wanted: Evil Bunny
Malware Most Wanted: Evil BunnyMalware Most Wanted: Evil Bunny
Malware Most Wanted: Evil BunnyCyphort
 
Via forensics thotcon-2013-mobile-security-with-santoku-linux
Via forensics thotcon-2013-mobile-security-with-santoku-linuxVia forensics thotcon-2013-mobile-security-with-santoku-linux
Via forensics thotcon-2013-mobile-security-with-santoku-linuxviaForensics
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...HackIT Ukraine
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocentdanish3
 
CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....
CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....
CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....CSO_Presentations
 

Mais procurados (13)

Malware's Most Wanted: Linux and Internet of Things Malware
Malware's Most Wanted: Linux and Internet of Things MalwareMalware's Most Wanted: Linux and Internet of Things Malware
Malware's Most Wanted: Linux and Internet of Things Malware
 
Malware self protection-matrix
Malware self protection-matrixMalware self protection-matrix
Malware self protection-matrix
 
Cybersecurity 5 road_blocks
Cybersecurity 5 road_blocksCybersecurity 5 road_blocks
Cybersecurity 5 road_blocks
 
Understanding Malware Lateral Spread Used in High Value Attacks
Understanding Malware Lateral Spread Used in High Value AttacksUnderstanding Malware Lateral Spread Used in High Value Attacks
Understanding Malware Lateral Spread Used in High Value Attacks
 
MMW Anti-Sandbox Techniques
MMW Anti-Sandbox TechniquesMMW Anti-Sandbox Techniques
MMW Anti-Sandbox Techniques
 
Malware's Most Wanted: The Many Faces of Malware
Malware's Most Wanted: The Many Faces of MalwareMalware's Most Wanted: The Many Faces of Malware
Malware's Most Wanted: The Many Faces of Malware
 
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
 
Malware Most Wanted: Security Ecosystem
Malware Most Wanted: Security EcosystemMalware Most Wanted: Security Ecosystem
Malware Most Wanted: Security Ecosystem
 
Malware Most Wanted: Evil Bunny
Malware Most Wanted: Evil BunnyMalware Most Wanted: Evil Bunny
Malware Most Wanted: Evil Bunny
 
Via forensics thotcon-2013-mobile-security-with-santoku-linux
Via forensics thotcon-2013-mobile-security-with-santoku-linuxVia forensics thotcon-2013-mobile-security-with-santoku-linux
Via forensics thotcon-2013-mobile-security-with-santoku-linux
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocent
 
CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....
CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....
CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....
 

Semelhante a Mariposa Botnet

WeSecure Data Security Congres: How to build a data governance framework
WeSecure Data Security Congres: How to build a data governance frameworkWeSecure Data Security Congres: How to build a data governance framework
WeSecure Data Security Congres: How to build a data governance frameworkWeSecure
 
Managing Network Security Monitoring at Large Scale with Puppet - PuppetConf ...
Managing Network Security Monitoring at Large Scale with Puppet - PuppetConf ...Managing Network Security Monitoring at Large Scale with Puppet - PuppetConf ...
Managing Network Security Monitoring at Large Scale with Puppet - PuppetConf ...Puppet
 
Hacking and Cyber Security.
Hacking and Cyber Security.Hacking and Cyber Security.
Hacking and Cyber Security.Kalpesh Doru
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerceSensePost
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsUlf Mattsson
 
Security Opportunities A Silicon Valley VC Perspective
Security Opportunities  A Silicon Valley VC PerspectiveSecurity Opportunities  A Silicon Valley VC Perspective
Security Opportunities A Silicon Valley VC PerspectivePositive Hack Days
 
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Nancy Nimmegeers
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Security
 
Webinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWebinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWultra
 
Nsc42 - is the cloud secure - is easy if you do it smart ECC Conference
Nsc42 - is the cloud secure - is easy if you do it smart ECC ConferenceNsc42 - is the cloud secure - is easy if you do it smart ECC Conference
Nsc42 - is the cloud secure - is easy if you do it smart ECC ConferenceNSC42 Ltd
 
Corporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomwareCorporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomwareCyber Security Alliance
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofAdrian Sanabria
 
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.Jan Geirnaert
 
2013 PMA Business Security Insights
2013 PMA Business Security Insights2013 PMA Business Security Insights
2013 PMA Business Security Insightsgotopaz
 
SplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral AnalyticsSplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral AnalyticsSplunk
 
Evolución de la Ciber Seguridad
Evolución de la Ciber SeguridadEvolución de la Ciber Seguridad
Evolución de la Ciber SeguridadCristian Garcia G.
 
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summerDEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summerFelipe Prado
 

Semelhante a Mariposa Botnet (20)

WeSecure Data Security Congres: How to build a data governance framework
WeSecure Data Security Congres: How to build a data governance frameworkWeSecure Data Security Congres: How to build a data governance framework
WeSecure Data Security Congres: How to build a data governance framework
 
Managing Network Security Monitoring at Large Scale with Puppet - PuppetConf ...
Managing Network Security Monitoring at Large Scale with Puppet - PuppetConf ...Managing Network Security Monitoring at Large Scale with Puppet - PuppetConf ...
Managing Network Security Monitoring at Large Scale with Puppet - PuppetConf ...
 
Hacking and Cyber Security.
Hacking and Cyber Security.Hacking and Cyber Security.
Hacking and Cyber Security.
 
A6704d01
A6704d01A6704d01
A6704d01
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
 
Security Opportunities A Silicon Valley VC Perspective
Security Opportunities  A Silicon Valley VC PerspectiveSecurity Opportunities  A Silicon Valley VC Perspective
Security Opportunities A Silicon Valley VC Perspective
 
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
 
DeepPhish: Simulating malicious AI
DeepPhish: Simulating malicious AIDeepPhish: Simulating malicious AI
DeepPhish: Simulating malicious AI
 
Webinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWebinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking Apps
 
Nsc42 - is the cloud secure - is easy if you do it smart ECC Conference
Nsc42 - is the cloud secure - is easy if you do it smart ECC ConferenceNsc42 - is the cloud secure - is easy if you do it smart ECC Conference
Nsc42 - is the cloud secure - is easy if you do it smart ECC Conference
 
Corporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomwareCorporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomware
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
 
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
 
2013 PMA Business Security Insights
2013 PMA Business Security Insights2013 PMA Business Security Insights
2013 PMA Business Security Insights
 
SplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral AnalyticsSplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral Analytics
 
Evolución de la Ciber Seguridad
Evolución de la Ciber SeguridadEvolución de la Ciber Seguridad
Evolución de la Ciber Seguridad
 
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summerDEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
 
Repost _Healthcare
Repost _HealthcareRepost _Healthcare
Repost _Healthcare
 

Mariposa Botnet