A Botnet was using DNS tunneling for its C&C operations
#4n6strider

A Botnet was using DNS tunneling for its C&C operations

Another great example of contribution of big data analysis to IT Security operations. Data were collected by using a free proxy, anonymized automatically during the collection.

SCOPE:

Encrypted traffic towards huge number of WordPress based websites with big prevalence of DNS communication collected as list of anonymized flows.

ACTION:

All recognized WordPress sites were listed for crawling to collect domain registration information. 

This crawling exercise revealed that domains were registered in batches of similar time ranges.

From this data, "location" information was extracted. Additionally, this information was linked to unique URI of each WordPress site considered as a relation from data point of view.

In case that connection reoccurred more than once, multiplicities were ignored to improve readability of a final picture.

Below is raw data, yet certain patterns is already obvious:

  • There are three main affected locations. {Rounded areas on top of each peak}
  • Each location made huge number of connections to unique WordPress domain. {These rounded areas are actually domains linked to main locations}
  • Certain WordPress domains were reached from more than one locations, some of them were queried from all locations. {Pattern where two different colours meet at one group of nodes on the picture}
  • By analysis of DNS requests it was found that certain domains are named using specific pattern while the rest of the names was random. These names were added to the "word list" for future patterns matching.
  • Previously mentioned behavior is a typical for so called DGA - based malware.
  • Botnet was identified by correlation of the traffic related to affected hosts. In this case, should the creator randomized the time span between the command and the answer of the machine, it would be close to impossible to detect the botnet activity. {This was separate analysis, not included to this article. Process was similar to which is used by the Stratosphere IPS}

CONCLUSION:

Using big-data analysis and open source tools it was possible to identify the threat and to report the suspicion which hopefully helped to block part of the Botnet. 

Do you have a dataset you would like to analyze for a similar behavior? Reach me via Linkedin and I am happy to help or advice.

-----------------------------------------------------------------------------------------------

Following pictures are added only for illustration, to please security data science - geeks like myself.

A detail of central component:

This picture shows first grouped view on raw data. Central "star-like" component suggests symmetric relation within single class of nodes. Community detection was used for coloring.

Evelyn T.

Global Audit & Assurance Business Information Security Officer | Opinions are my own

8 年

Can you get this up and running this week? ;)

回复

要查看或添加评论,请登录

Jindrich Karasek的更多文章

  • Enhancing Defenses Against Cognitive Warfare through Cyber Threat Hunting, OSINT, and Ethical Hacking

    Enhancing Defenses Against Cognitive Warfare through Cyber Threat Hunting, OSINT, and Ethical Hacking

    {Consider this text as my public research notes, that I am building on while doing presentations, case studies, spot…

    2 条评论
  • A phishing story

    A phishing story

    Phishing threat is still valid and it remains the most prevalent way how the attacker get into the enterprise…

  • Election manipulation

    Election manipulation

    Introductory picture {Picture 0} below shows grouped website scan of Government of the Country. Various websites…

    1 条评论
  • RansomWare data mining

    RansomWare data mining

    Recently, I did small research regarding how many different ransomware is found in the wild. Point was to check, if…

  • Penetration test of Mobile devices WiFi

    Penetration test of Mobile devices WiFi

    Do you have a cellphone always connected to the internet? Do you connect to every public WiFi available? In article…

  • Let′s spy on malicious hackers!

    Let′s spy on malicious hackers!

    Lets spy on malicious hackers! On my website: https://4n6strider.it I reveal the hypothetical structure of a SIEM…

    3 条评论
  • Knowledge Management

    Knowledge Management

    The training is crucial part of every company' s security policy. There is an analysis below of a "Knowledge…

    1 条评论
  • Nmap on Twitter

    Nmap on Twitter

    This is only small post, an appetizer generated during processing, I will add more details in future on my website…

    2 条评论
  • My own social network - hackers would love to do this.

    My own social network - hackers would love to do this.

    One of the good use cases for so called "big data" approach is modeling of private social network. Same of course…

  • IT Security meets Data Science

    IT Security meets Data Science

    Quote: The purpose of abstraction: “Is not to be vague but to create a new semantic level on which one can be…

社区洞察

其他会员也浏览了