SlideShare a Scribd company logo
 

Fast Detection of New Malicious
Domains using DNS
Dhia	
  Mahjoub	
  
OpenDNS	
  
October	
  18th,	
  2013	
  
Outline	
  
• 
• 
• 
• 
• 
• 
• 
• 

DNS	
  infrastructure	
  
Monitoring/detec@on	
  system	
  
Domain/IP	
  watch	
  list	
  
Post-­‐detec@on	
  filtering	
  
Implementa@on	
  
Use	
  cases	
  
FF	
  Kelihos	
  domains,	
  EK	
  domains,	
  Ransomware,	
  Trojans	
  
Conclusion	
  
DNS	
  big	
  data	
  

querylogs	
  

authlogs	
  
OpenDNS’	
  Network	
  Map	
  
Malicious	
  use	
  of	
  DNS	
  
•  Botnet/Malware	
  C&C	
  
•  DGAs	
  
•  Fast	
  flux	
  
•  DNS	
  amplifica@on	
  aXacks	
  
Our	
  Focus	
  
•  AXack	
  domains,	
  not	
  compromised	
  domains	
  
	
  
-­‐>Exploit	
  kit	
  domains	
  
	
  
-­‐>Malware	
  delivery	
  domains	
  
Fast	
  Flux	
  Monitoring/Detec@on	
  System	
  
•  TTL=0	
  Kelihos	
  Fast	
  Flux	
  domains	
  
	
  7-­‐months	
  study	
  presented	
  at	
  APWG	
  eCrime	
  2013	
  
hXp://labs.umbrella.com/2013/09/24/real-­‐@me-­‐monitoring-­‐kelihos-­‐fast-­‐
flux-­‐botnet-­‐case-­‐study-­‐presented-­‐apwg-­‐ecrime-­‐2013/	
  

	
  
•  TTL=150	
  
•  TTL=300	
  
•  TTL=1440,	
  spam	
  domains	
  
Fast	
  Flux	
  Monitoring/Detec@on	
  System	
  
While	
  true	
  
1.  Select	
  a	
  seed	
  of	
  Kelihos	
  domains	
  w/	
  a	
  confirmed	
  profile	
  
2.  Con@nuously	
  milk	
  domains	
  for	
  IPs	
  	
  
3.  Con@nuously	
  “inverse	
  lookup”	
  IPs	
  in	
  passive	
  DNS,	
  for	
  
new	
  domains	
  that	
  start	
  resolving	
  to	
  these	
  IPs	
  
4.  Check	
  detected	
  domains	
  for	
  known	
  profile	
  (e.g.	
  TTL,	
  
registra@on,	
  existence	
  of	
  payload,	
  etc)	
  
5.  Add	
  new	
  domains	
  to	
  the	
  ini@al	
  seed	
  
Kelihos	
  domains	
  profile	
  
•  Various	
  gTLDs,	
  ccTLDs,	
  1	
  single	
  IP,	
  TTL=0,	
  hosted	
  on	
  
Kelihos	
  botnet	
  IP	
  pool	
  (growing),	
  infected	
  individual	
  
machines,	
  recent	
  registra@on,	
  delivering	
  malware	
  
executables	
  with	
  known	
  names	
  
•  Recorded	
  case(s)	
  of	
  domain	
  resolving	
  to	
  several	
  IPs	
  
with	
  TTL=600,	
  cocala.asia,	
  or	
  TTL=300	
  
Generalized	
  Monitoring/Detec@on	
  System	
  
•  While	
  true	
  
•  Read	
  IP	
  watch	
  list,	
  launch	
  parallel	
  process	
  for	
  every	
  IP	
  
•  A	
  process	
  performs	
  IP	
  inverse	
  lookup	
  against	
  DNSDB	
  
•  Every	
  process	
  returns	
  new	
  domains	
  for	
  IP	
  
•  Join	
  all	
  processes’	
  output,	
  check	
  against	
  blacklist	
  
•  Keep	
  only	
  new	
  domains	
  
•  Perform	
  parallelized	
  post	
  discovery	
  checks	
  using	
  
different	
  heuris@cs:	
  traffic	
  paXern,	
  name	
  paXern,	
  extra	
  
IP	
  reputa@on	
  check,	
  etc.	
  
•  Add	
  new	
  domains	
  to	
  blacklist	
  
Watch	
  list	
  selec@on	
  
•  Con@nuous	
  background	
  process	
  
•  Different	
  methods/heuris@cs	
  to	
  harvest	
  new	
  IPs	
  with	
  high	
  
risk	
  poten@al	
  
•  Use	
  fresh	
  blacklist,	
  3rd	
  party	
  BL	
  domain	
  list	
  
Watch	
  list	
  selec@on	
  (cont’d)	
  
•  Resolve	
  IPs	
  and	
  cluster	
  by	
  popularity,	
  age,	
  aXack	
  theme	
  
	
  -­‐>IP	
  observed	
  to	
  host	
  exclusively	
  EK	
  domains	
  or	
  ransomware	
  
-­‐>Similar	
  name	
  paXern	
  of	
  hosted	
  domains	
  
-­‐>Similar	
  traffic	
  paXern	
  

•  Remove	
  IPs	
  on	
  large	
  shared	
  hos@ng	
  providers	
  unless	
  
excep@ons	
  (e.g	
  keep	
  OVH	
  CIDR	
  dedicated	
  to	
  malware),	
  
sinkholes,	
  other	
  IP	
  profiles	
  that	
  could	
  cause	
  FPs	
  
Harves@ng	
  bad	
  IPs	
  
•  When	
  we	
  discover	
  new	
  high	
  risk	
  IPs,	
  why	
  not	
  just	
  block	
  
IPs?	
  Sure,	
  we	
  can,	
  and	
  we	
  open	
  do!	
  
•  But	
  you	
  lose	
  intel	
  and	
  inves@ga@ve	
  material	
  related	
  to	
  
domains:	
  name	
  paXerns,	
  DGAs,	
  dynamic	
  DNS	
  usage,	
  
malicious	
  subdomains	
  under	
  legi@mate	
  compromised	
  
domains	
  
Post	
  detec@on	
  checks	
  
•  Traffic	
  paXern,	
  name	
  paXern,	
  further	
  IP	
  reputa@on	
  check	
  
•  If	
  a	
  spike	
  or	
  beginning	
  of	
  spike,	
  then	
  poten@al	
  risk	
  domain	
  

•  Exclude	
  spam	
  domains	
  
•  But	
  spike	
  means	
  domain	
  has	
  already	
  delivered	
  aXack	
  
Post	
  detec@on	
  checks	
  (cont’d)	
  
•  So	
  preemp@ve	
  blocking	
  is	
  necessary	
  if	
  domain	
  has	
  high	
  
poten@al	
  of	
  being	
  an	
  aXack	
  domain	
  
•  Not	
  everything	
  should	
  be	
  automated	
  
•  Human	
  intel	
  and	
  inves@ga@on	
  needed	
  at	
  @mes	
  to	
  remove	
  
FPs	
  and	
  add	
  FN	
  back	
  -­‐>	
  Fine-­‐tune	
  the	
  model	
  
Plarorm	
  and	
  tools	
  used	
  
-­‐Pig	
  on	
  Hadoop	
  cluster	
  
	
  
-­‐Raw	
  logs	
  on	
  HDFS	
  
	
  
-­‐Indexed	
  DNSDB	
  in	
  HBase	
  
	
  
-­‐Python,	
  shell,	
  Gnu	
  Parallel	
  
	
  
System	
  in	
  a	
  nutshell	
  
	
  
-­‐>Constantly	
  running	
  process	
  of	
  harves@ng	
  fresh	
  high	
  risk	
  IPs	
  
	
  
-­‐>Constantly	
  running	
  process	
  of	
  discovering	
  fresh	
  malicious	
  
domains	
  
	
  
-­‐>Constantly	
  querying	
  DNSDB	
  with	
  IP	
  inverse	
  lookups	
  
	
  
Backend:	
  
-­‐>DNSDB	
  constantly	
  fed	
  with	
  authorita@ve	
  traffic	
  from	
  all	
  
resolvers	
  	
  
	
  
Whitelist	
  
•  IPs	
  hos@ng	
  spam	
  domains	
  
	
  A	
  lot	
  of	
  IPs	
  on	
  AS15149,	
  e.g.	
  216.169.100.133	
  
•  Shared	
  hos@ng	
  IPs	
  with	
  a	
  large	
  number	
  of	
  general	
  
purpose	
  websites	
  
	
  
Use	
  cases	
  
• 
• 
• 
• 
• 
• 
• 

Kelihos	
  fast	
  flux	
  botnet	
  
Fake	
  AV	
  
.pl	
  domains	
  used	
  for	
  Kovter	
  and	
  other	
  
Godaddy	
  compromised	
  domains	
  
Cryptolocker	
  CnC	
  discovery	
  
NuclearPack	
  EK	
  
Browlock	
  domains	
  
Kelihos	
  Fast	
  flux	
  
• 
• 

Kelihos	
  fast	
  flux	
  botnet	
  
Up	
  un@l	
  Sep	
  16th,	
  about	
  984	
  domains	
  (and	
  subdomains)	
  
hosted	
  on	
  28757	
  IPs	
  
hXp://labs.umbrella.com/2013/09/24/real-­‐@me-­‐monitoring-­‐kelihos-­‐fast-­‐
flux-­‐botnet-­‐case-­‐study-­‐presented-­‐apwg-­‐ecrime-­‐2013/	
  

• 
• 

Sample	
  of	
  domains	
  of	
  Aug-­‐Sep	
  
399	
  domains	
  on	
  8159	
  IPs	
  
Fast Detection of New Malicious Domains using DNS
Fake	
  AV	
  
• 

82.208.40.11	
  hos@ng	
  23502	
  Fake	
  AV,	
  Fake	
  SW	
  domains	
  for	
  
76	
  days	
  

	
  
hXps://www.virustotal.com/en/ip-­‐address/82.208.40.11/informa@on/	
  

• 
• 

Free	
  domains	
  under	
  cz.cc,	
  uni.me	
  
176.31.125.91	
  hos@ng	
  6687	
  similar	
  domains	
  for	
  66	
  days	
  
.pl	
  used	
  for	
  ransomware	
  
Sample	
  of	
  .pl	
  domains	
  
19267	
  domains	
  on	
  12	
  IPs	
  
3	
  level	
  domains	
  
	
   	
  f9photo.ucuphahnui.kepno.pl	
  
	
   	
  95oishi.maimuofief.pisz.pl	
  
•  First	
  2	
  labels	
  are	
  DGAs	
  
• 
• 
• 

from	
  malware.dontneedcoffee.com	
  

• 

Used	
  in	
  malver@sing	
  campaigns	
  on	
  adult	
  websites	
  leading	
  to	
  
Exploit	
  kit	
  domains	
  and	
  Kovter	
  ransomware	
  dropping	
  
hXp://www.malekal.com/2013/07/31/en-­‐urausy-­‐adulrriendzfinder-­‐
malver@sing-­‐banner/	
  
Fast Detection of New Malicious Domains using DNS
NuclearPack	
  EK	
  	
  
-­‐>1523	
  domains	
  on	
  198.50.225.113	
  
•  2	
  level	
  domains	
  under	
  .biz	
  
•  1st	
  label	
  is	
  random,	
  16	
  2LDs	
  registered	
  July	
  28th	
  
•  hxxp://dreut.valen@nespell.biz:
59902/0e724s2d10467436c6149sce02712a.html	
  
-­‐>1378	
  domains	
  on	
  198.50.235.198	
  
•  2	
  level	
  domains	
  under	
  .biz	
  
•  1st	
  label	
  is	
  random	
  
•  hxxp://u5s1av.diwalipearl.biz:
55252/5a9b00e34d8b18cb571ba56a357cfafc.html	
  
NuclearPack	
  EK	
  	
  
-­‐>198.50.235.200	
  became	
  ac@ve	
  on	
  Oct	
  15th	
  
•  Already	
  hos@ng	
  400+	
  domains	
  
•  hxxp://clgang.elec@ondayfabulous.biz:
44142/4078c813508ad60acc95d0744365c68c.html	
  
•  Shiping	
  on	
  198.50.128.0/17	
  OVH	
  prefix	
  
Compromised	
  GoDaddy	
  domains	
  
•  Campaign	
  of	
  injec@ng	
  malicious	
  subdomains	
  (3LDs)	
  under	
  
legi@mate/compromised	
  Godaddy	
  domains	
  (2LDs)	
  
•  5	
  IPs	
  hos@ng	
  800	
  subdomains	
  (3LDs)	
  over	
  10	
  days	
  in	
  Aug-­‐Sep	
  
	
  	
  
•  Used	
  to	
  serve	
  Cool	
  exploit	
  kit	
  through	
  CookieBomb	
  aXack	
  on	
  
compromised	
  websites	
  and	
  finally	
  drop	
  Reveton	
  
hXp://quequero.org/2013/09/ac@ve-­‐cookiebomb-­‐cve-­‐2013-­‐2465-­‐
reveton/	
  
	
  

•  Happened	
  before	
  in	
  2012	
  and	
  happening	
  again	
  
hXp://nakedsecurity.sophos.com/2012/11/23/hacked-­‐go-­‐daddy-­‐
ransomware/	
  

	
  
Compromised	
  GoDaddy	
  domains	
  
Cryptolocker	
  CnCs	
  
•  Ransomware	
  released	
  early	
  September	
  2013	
  
•  Encrypts	
  your	
  files	
  and	
  asks	
  for	
  a	
  $300	
  ransom	
  to	
  get	
  them	
  
back	
  
•  2	
  ini@al	
  Cryptolocker	
  CnCs	
  were	
  picked	
  up	
  by	
  the	
  system	
  a	
  
day	
  before	
  they	
  were	
  published	
  on	
  Sep	
  11	
  
•  xeogrhxquuubt.com	
  
•  qaaepodedahnslq.org	
  
	
  
Browlock	
  domains	
  
•  Browser-­‐based	
  ransomware	
  targeted	
  at	
  countries	
  in	
  3	
  
different	
  con@nents	
  
•  Example:	
  194.44.49.150	
  hos@ng	
  2629	
  subdomains	
  over	
  26	
  
days	
  
Browlock	
  domains	
  
Browlock	
  domains	
  (cont’d)	
  
•  Browser-­‐based	
  ransomware	
  targeted	
  at	
  countries	
  in	
  3	
  
different	
  con@nents	
  
•  193.169.87.15,	
  196.47.100.2,	
  over	
  a	
  period	
  of	
  13	
  days,	
  
hos@ng	
  8978	
  browlock	
  domains	
  and	
  domains	
  with	
  adult-­‐
themed	
  names	
  that	
  redirect	
  to	
  browlock	
  
	
  
Browlock	
  domains	
  (cont’d)	
  
Conclusion	
  
•  Ongoing	
  research	
  and	
  work	
  to	
  increase	
  coverage	
  and	
  
accuracy	
  of	
  early	
  detec@on	
  of	
  domains	
  before	
  they	
  
deliver	
  aXacks	
  
•  Extend	
  coverage	
  to	
  shared	
  hos@ng	
  IPs	
  
•  Effec@ve	
  early	
  detec@on/protec@on	
  DNS-­‐based	
  system	
  
•  Use	
  it	
  with	
  other	
  protec@on	
  methods:	
  AV,	
  IDS,	
  etc.	
  
•  Experimenta@on	
  in	
  our	
  lab	
  with	
  streaming	
  technologies:	
  
Storm,	
  Kava,	
  Zeromq	
  
	
  -­‐>	
  Complementary	
  with	
  DNSDB-­‐based	
  detec@on	
  system	
  
Contact	
  Info	
  
•  Contact	
  me	
  at	
  dhia@opendns.com	
  if	
  you	
  are	
  
interested	
  in:	
  
•  Asking	
  ques@ons	
  
•  Collabora@ng	
  
•  Follow	
  me	
  on	
  TwiXer	
  @DhiaLite	
  
•  Blogs	
  hXp://labs.umbrella.com/author/dhia/	
  
Thank	
  you	
  
	
  
(Q	
  &	
  A)	
  

More Related Content

PDF
Defcon
PDF
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
PPTX
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
PPTX
Early Detection of Malicious Flux Networks via Large Scale Passive DNS Traffi...
PDF
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
PDF
DNSSEC - Domain Name System Security Extensions
PDF
Encrypted DNS - DNS over TLS / DNS over HTTPS
PDF
Class Project Showcase: DNS Spoofing
Defcon
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
Early Detection of Malicious Flux Networks via Large Scale Passive DNS Traffi...
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
DNSSEC - Domain Name System Security Extensions
Encrypted DNS - DNS over TLS / DNS over HTTPS
Class Project Showcase: DNS Spoofing

What's hot (20)

PDF
Understanding the DNS & DNSSEC
PDF
08 tcp-dns
PDF
The DNSSEC KSK of the root rolls
PDF
DNSSEC signing Tutorial
PPTX
DoH, DoT and ESNI
PDF
Namespaces for Local Networks
PDF
Part 2 - Local Name Resolution in Windows Networks
PDF
CNIT 40: 2: DNS Protocol and Architecture
PDF
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
PDF
The CAA-Record for increased encryption security
PDF
"Into the Fog The Return of ICEFOG APT" - Chi en (Ashley) Shen
PDF
Minieri CS6262 Project Poster
PDF
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
ODP
DNSSEC - WHAT IS IT ? INSTALL AND CONFIGURE IN CHROOT JAIL
PDF
DNS High-Availability Tools - Open-Source Load Balancing Solutions
PDF
4Developers: Dns vs webapp
PDF
CNIT 40: 4: Monitoring and detecting security breaches
PDF
CNIT 40: 1: The Importance of DNS Security
PDF
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
PDF
CONFidence 2018: Detecting Phishing from pDNS (Irena Damsky)
Understanding the DNS & DNSSEC
08 tcp-dns
The DNSSEC KSK of the root rolls
DNSSEC signing Tutorial
DoH, DoT and ESNI
Namespaces for Local Networks
Part 2 - Local Name Resolution in Windows Networks
CNIT 40: 2: DNS Protocol and Architecture
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
The CAA-Record for increased encryption security
"Into the Fog The Return of ICEFOG APT" - Chi en (Ashley) Shen
Minieri CS6262 Project Poster
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
DNSSEC - WHAT IS IT ? INSTALL AND CONFIGURE IN CHROOT JAIL
DNS High-Availability Tools - Open-Source Load Balancing Solutions
4Developers: Dns vs webapp
CNIT 40: 4: Monitoring and detecting security breaches
CNIT 40: 1: The Importance of DNS Security
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
CONFidence 2018: Detecting Phishing from pDNS (Irena Damsky)
Ad

Similar to Fast Detection of New Malicious Domains using DNS (20)

PDF
HSB - Secure DNS en BGP ontwikkelingen - Benno Overeinder
PPTX
Dafgjgghhghfhjgghjhgy06-Footprinting.pptx
PDF
Malicious Domain Profiling
PDF
Bug bounty recon.pdf
PDF
Foot printing as phase of Hacking in cybersecurity
PDF
Frontera распределенный робот для обхода веба в больших объемах / Александр С...
PDF
Multi-Layer DDoS Mitigation Strategies
PDF
Burp suite
PDF
fgont-h2hc-2020-ipv6-security.pdf
PDF
waptLab09 tis lab is used for college lab exam
PPTX
Cloud Device Insecurity
PPTX
Red Team Apocalypse
PDF
CNIT 121: 10 Enterprise Services
PDF
aclpwn - Active Directory ACL exploitation with BloodHound
PPTX
The basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwon
PDF
CNIT 40: 4: Monitoring and detecting security breaches
PDF
Hadoop Distributed File System
PDF
CNIT 152 10 Enterprise Service
PDF
CNIT 152: 10 Enterprise Services
HSB - Secure DNS en BGP ontwikkelingen - Benno Overeinder
Dafgjgghhghfhjgghjhgy06-Footprinting.pptx
Malicious Domain Profiling
Bug bounty recon.pdf
Foot printing as phase of Hacking in cybersecurity
Frontera распределенный робот для обхода веба в больших объемах / Александр С...
Multi-Layer DDoS Mitigation Strategies
Burp suite
fgont-h2hc-2020-ipv6-security.pdf
waptLab09 tis lab is used for college lab exam
Cloud Device Insecurity
Red Team Apocalypse
CNIT 121: 10 Enterprise Services
aclpwn - Active Directory ACL exploitation with BloodHound
The basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwon
CNIT 40: 4: Monitoring and detecting security breaches
Hadoop Distributed File System
CNIT 152 10 Enterprise Service
CNIT 152: 10 Enterprise Services
Ad

More from OpenDNS (19)

PDF
Blackhat USA 2015: BGP Stream Presentation
PDF
What Happens Before the Kill Chain
PDF
Highly Available Docker Networking With BGP
PDF
One Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
PDF
Security Ninjas: An Open Source Application Security Training Program
PDF
OpenDNS CTO Dan Hubbard VizSec 2014 Keynote Slides
PPTX
Standardizing and Strengthening Security to Lower Costs
PDF
Docker at OpenDNS
PDF
IP Routing, AWS, and Docker
PDF
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE Boston
PDF
Network Security: A Four Point Analysis of Appliances vs. the Cloud
PDF
CanSecWest 2014 Presentation: "Intelligent Use of Intelligence: Design to Dis...
PDF
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
PPTX
Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...
PDF
Baythreat Cryptolocker Presentation
PDF
Cryptolocker Webcast
PDF
MSP Webcast - Leveraging Cloud Security to Become a Virtual CIO
PDF
Umbrella for MSPs: Enterprise Grade Malware Protection & Containment
PDF
Umbrella for MSPs: Cloud Security via N-able
Blackhat USA 2015: BGP Stream Presentation
What Happens Before the Kill Chain
Highly Available Docker Networking With BGP
One Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
Security Ninjas: An Open Source Application Security Training Program
OpenDNS CTO Dan Hubbard VizSec 2014 Keynote Slides
Standardizing and Strengthening Security to Lower Costs
Docker at OpenDNS
IP Routing, AWS, and Docker
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE Boston
Network Security: A Four Point Analysis of Appliances vs. the Cloud
CanSecWest 2014 Presentation: "Intelligent Use of Intelligence: Design to Dis...
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...
Baythreat Cryptolocker Presentation
Cryptolocker Webcast
MSP Webcast - Leveraging Cloud Security to Become a Virtual CIO
Umbrella for MSPs: Enterprise Grade Malware Protection & Containment
Umbrella for MSPs: Cloud Security via N-able

Recently uploaded (20)

PDF
DevOps & Developer Experience Summer BBQ
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
AI And Its Effect On The Evolving IT Sector In Australia - Elevate
PDF
Modernizing your data center with Dell and AMD
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
HCSP-Presales-Campus Network Planning and Design V1.0 Training Material-Witho...
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Sensors and Actuators in IoT Systems using pdf
PPTX
CroxyProxy Instagram Access id login.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Event Presentation Google Cloud Next Extended 2025
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
REPORT: Heating appliances market in Poland 2024
PDF
Electronic commerce courselecture one. Pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
DevOps & Developer Experience Summer BBQ
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
AI And Its Effect On The Evolving IT Sector In Australia - Elevate
Modernizing your data center with Dell and AMD
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
“AI and Expert System Decision Support & Business Intelligence Systems”
HCSP-Presales-Campus Network Planning and Design V1.0 Training Material-Witho...
NewMind AI Monthly Chronicles - July 2025
Dropbox Q2 2025 Financial Results & Investor Presentation
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Sensors and Actuators in IoT Systems using pdf
CroxyProxy Instagram Access id login.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
NewMind AI Weekly Chronicles - August'25 Week I
Event Presentation Google Cloud Next Extended 2025
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
REPORT: Heating appliances market in Poland 2024
Electronic commerce courselecture one. Pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto

Fast Detection of New Malicious Domains using DNS

  • 1.   Fast Detection of New Malicious Domains using DNS Dhia  Mahjoub   OpenDNS   October  18th,  2013  
  • 2. Outline   •  •  •  •  •  •  •  •  DNS  infrastructure   Monitoring/detec@on  system   Domain/IP  watch  list   Post-­‐detec@on  filtering   Implementa@on   Use  cases   FF  Kelihos  domains,  EK  domains,  Ransomware,  Trojans   Conclusion  
  • 3. DNS  big  data   querylogs   authlogs  
  • 5. Malicious  use  of  DNS   •  Botnet/Malware  C&C   •  DGAs   •  Fast  flux   •  DNS  amplifica@on  aXacks  
  • 6. Our  Focus   •  AXack  domains,  not  compromised  domains     -­‐>Exploit  kit  domains     -­‐>Malware  delivery  domains  
  • 7. Fast  Flux  Monitoring/Detec@on  System   •  TTL=0  Kelihos  Fast  Flux  domains    7-­‐months  study  presented  at  APWG  eCrime  2013   hXp://labs.umbrella.com/2013/09/24/real-­‐@me-­‐monitoring-­‐kelihos-­‐fast-­‐ flux-­‐botnet-­‐case-­‐study-­‐presented-­‐apwg-­‐ecrime-­‐2013/     •  TTL=150   •  TTL=300   •  TTL=1440,  spam  domains  
  • 8. Fast  Flux  Monitoring/Detec@on  System   While  true   1.  Select  a  seed  of  Kelihos  domains  w/  a  confirmed  profile   2.  Con@nuously  milk  domains  for  IPs     3.  Con@nuously  “inverse  lookup”  IPs  in  passive  DNS,  for   new  domains  that  start  resolving  to  these  IPs   4.  Check  detected  domains  for  known  profile  (e.g.  TTL,   registra@on,  existence  of  payload,  etc)   5.  Add  new  domains  to  the  ini@al  seed  
  • 9. Kelihos  domains  profile   •  Various  gTLDs,  ccTLDs,  1  single  IP,  TTL=0,  hosted  on   Kelihos  botnet  IP  pool  (growing),  infected  individual   machines,  recent  registra@on,  delivering  malware   executables  with  known  names   •  Recorded  case(s)  of  domain  resolving  to  several  IPs   with  TTL=600,  cocala.asia,  or  TTL=300  
  • 10. Generalized  Monitoring/Detec@on  System   •  While  true   •  Read  IP  watch  list,  launch  parallel  process  for  every  IP   •  A  process  performs  IP  inverse  lookup  against  DNSDB   •  Every  process  returns  new  domains  for  IP   •  Join  all  processes’  output,  check  against  blacklist   •  Keep  only  new  domains   •  Perform  parallelized  post  discovery  checks  using   different  heuris@cs:  traffic  paXern,  name  paXern,  extra   IP  reputa@on  check,  etc.   •  Add  new  domains  to  blacklist  
  • 11. Watch  list  selec@on   •  Con@nuous  background  process   •  Different  methods/heuris@cs  to  harvest  new  IPs  with  high   risk  poten@al   •  Use  fresh  blacklist,  3rd  party  BL  domain  list  
  • 12. Watch  list  selec@on  (cont’d)   •  Resolve  IPs  and  cluster  by  popularity,  age,  aXack  theme    -­‐>IP  observed  to  host  exclusively  EK  domains  or  ransomware   -­‐>Similar  name  paXern  of  hosted  domains   -­‐>Similar  traffic  paXern   •  Remove  IPs  on  large  shared  hos@ng  providers  unless   excep@ons  (e.g  keep  OVH  CIDR  dedicated  to  malware),   sinkholes,  other  IP  profiles  that  could  cause  FPs  
  • 13. Harves@ng  bad  IPs   •  When  we  discover  new  high  risk  IPs,  why  not  just  block   IPs?  Sure,  we  can,  and  we  open  do!   •  But  you  lose  intel  and  inves@ga@ve  material  related  to   domains:  name  paXerns,  DGAs,  dynamic  DNS  usage,   malicious  subdomains  under  legi@mate  compromised   domains  
  • 14. Post  detec@on  checks   •  Traffic  paXern,  name  paXern,  further  IP  reputa@on  check   •  If  a  spike  or  beginning  of  spike,  then  poten@al  risk  domain   •  Exclude  spam  domains   •  But  spike  means  domain  has  already  delivered  aXack  
  • 15. Post  detec@on  checks  (cont’d)   •  So  preemp@ve  blocking  is  necessary  if  domain  has  high   poten@al  of  being  an  aXack  domain   •  Not  everything  should  be  automated   •  Human  intel  and  inves@ga@on  needed  at  @mes  to  remove   FPs  and  add  FN  back  -­‐>  Fine-­‐tune  the  model  
  • 16. Plarorm  and  tools  used   -­‐Pig  on  Hadoop  cluster     -­‐Raw  logs  on  HDFS     -­‐Indexed  DNSDB  in  HBase     -­‐Python,  shell,  Gnu  Parallel    
  • 17. System  in  a  nutshell     -­‐>Constantly  running  process  of  harves@ng  fresh  high  risk  IPs     -­‐>Constantly  running  process  of  discovering  fresh  malicious   domains     -­‐>Constantly  querying  DNSDB  with  IP  inverse  lookups     Backend:   -­‐>DNSDB  constantly  fed  with  authorita@ve  traffic  from  all   resolvers      
  • 18. Whitelist   •  IPs  hos@ng  spam  domains    A  lot  of  IPs  on  AS15149,  e.g.  216.169.100.133   •  Shared  hos@ng  IPs  with  a  large  number  of  general   purpose  websites    
  • 19. Use  cases   •  •  •  •  •  •  •  Kelihos  fast  flux  botnet   Fake  AV   .pl  domains  used  for  Kovter  and  other   Godaddy  compromised  domains   Cryptolocker  CnC  discovery   NuclearPack  EK   Browlock  domains  
  • 20. Kelihos  Fast  flux   •  •  Kelihos  fast  flux  botnet   Up  un@l  Sep  16th,  about  984  domains  (and  subdomains)   hosted  on  28757  IPs   hXp://labs.umbrella.com/2013/09/24/real-­‐@me-­‐monitoring-­‐kelihos-­‐fast-­‐ flux-­‐botnet-­‐case-­‐study-­‐presented-­‐apwg-­‐ecrime-­‐2013/   •  •  Sample  of  domains  of  Aug-­‐Sep   399  domains  on  8159  IPs  
  • 22. Fake  AV   •  82.208.40.11  hos@ng  23502  Fake  AV,  Fake  SW  domains  for   76  days     hXps://www.virustotal.com/en/ip-­‐address/82.208.40.11/informa@on/   •  •  Free  domains  under  cz.cc,  uni.me   176.31.125.91  hos@ng  6687  similar  domains  for  66  days  
  • 23. .pl  used  for  ransomware   Sample  of  .pl  domains   19267  domains  on  12  IPs   3  level  domains      f9photo.ucuphahnui.kepno.pl      95oishi.maimuofief.pisz.pl   •  First  2  labels  are  DGAs   •  •  •  from  malware.dontneedcoffee.com   •  Used  in  malver@sing  campaigns  on  adult  websites  leading  to   Exploit  kit  domains  and  Kovter  ransomware  dropping   hXp://www.malekal.com/2013/07/31/en-­‐urausy-­‐adulrriendzfinder-­‐ malver@sing-­‐banner/  
  • 25. NuclearPack  EK     -­‐>1523  domains  on  198.50.225.113   •  2  level  domains  under  .biz   •  1st  label  is  random,  16  2LDs  registered  July  28th   •  hxxp://[email protected]: 59902/0e724s2d10467436c6149sce02712a.html   -­‐>1378  domains  on  198.50.235.198   •  2  level  domains  under  .biz   •  1st  label  is  random   •  hxxp://u5s1av.diwalipearl.biz: 55252/5a9b00e34d8b18cb571ba56a357cfafc.html  
  • 26. NuclearPack  EK     -­‐>198.50.235.200  became  ac@ve  on  Oct  15th   •  Already  hos@ng  400+  domains   •  hxxp://[email protected]: 44142/4078c813508ad60acc95d0744365c68c.html   •  Shiping  on  198.50.128.0/17  OVH  prefix  
  • 27. Compromised  GoDaddy  domains   •  Campaign  of  injec@ng  malicious  subdomains  (3LDs)  under   legi@mate/compromised  Godaddy  domains  (2LDs)   •  5  IPs  hos@ng  800  subdomains  (3LDs)  over  10  days  in  Aug-­‐Sep       •  Used  to  serve  Cool  exploit  kit  through  CookieBomb  aXack  on   compromised  websites  and  finally  drop  Reveton   hXp://quequero.org/2013/09/ac@ve-­‐cookiebomb-­‐cve-­‐2013-­‐2465-­‐ reveton/     •  Happened  before  in  2012  and  happening  again   hXp://nakedsecurity.sophos.com/2012/11/23/hacked-­‐go-­‐daddy-­‐ ransomware/    
  • 29. Cryptolocker  CnCs   •  Ransomware  released  early  September  2013   •  Encrypts  your  files  and  asks  for  a  $300  ransom  to  get  them   back   •  2  ini@al  Cryptolocker  CnCs  were  picked  up  by  the  system  a   day  before  they  were  published  on  Sep  11   •  xeogrhxquuubt.com   •  qaaepodedahnslq.org    
  • 30. Browlock  domains   •  Browser-­‐based  ransomware  targeted  at  countries  in  3   different  con@nents   •  Example:  194.44.49.150  hos@ng  2629  subdomains  over  26   days  
  • 32. Browlock  domains  (cont’d)   •  Browser-­‐based  ransomware  targeted  at  countries  in  3   different  con@nents   •  193.169.87.15,  196.47.100.2,  over  a  period  of  13  days,   hos@ng  8978  browlock  domains  and  domains  with  adult-­‐ themed  names  that  redirect  to  browlock    
  • 34. Conclusion   •  Ongoing  research  and  work  to  increase  coverage  and   accuracy  of  early  detec@on  of  domains  before  they   deliver  aXacks   •  Extend  coverage  to  shared  hos@ng  IPs   •  Effec@ve  early  detec@on/protec@on  DNS-­‐based  system   •  Use  it  with  other  protec@on  methods:  AV,  IDS,  etc.   •  Experimenta@on  in  our  lab  with  streaming  technologies:   Storm,  Kava,  Zeromq    -­‐>  Complementary  with  DNSDB-­‐based  detec@on  system  
  • 35. Contact  Info   •  Contact  me  at  [email protected]  if  you  are   interested  in:   •  Asking  ques@ons   •  Collabora@ng   •  Follow  me  on  TwiXer  @DhiaLite   •  Blogs  hXp://labs.umbrella.com/author/dhia/  
  • 36. Thank  you     (Q  &  A)