text
stringlengths 4
429
|
---|
Botnet |
The collective name for malware-infected victims with established connections to a |
CnC server and remotely controlled by criminal operators. |
Criminal Operators |
The person or team that builds, manages and reaps financial reward |
from a botnet. |
Page 8 |
The Command Structure of the Aurora Botnet |
How Advanced Persistent Threats Breach Enterprises |
APTs breach enterprises through a wide variety of vectors, even in the presence of properly designed |
and maintained defense-in-depth strategies: |
Internet-based malware infection |
Physical malware infection |
External exploitation |
Well funded APT adversaries do not necessarily need to breach perimeter security controls from an |
external perspective. They can, and often do, leverage |
insider threat |
and |
trusted connection |
vectors |
to access and compromise targeted systems. |
Abuse and compromise of |
trusted connections |
is a key ingredient for many APTs. While the targeted |
organization may employ sophisticated technologies in order to prevent infection and compromise of |
their digital systems, criminal operators often tunnel into an organization using the hijacked |
credentials of employees or business partners, or via less-secured remote offices. As such, almost any |
organization or remote site may fall victim to an APT and be utilized as a soft entry or information |
harvesting point. |
A key requirement for APTs (as opposed to an |
everyday |
botnet) is to remain invisible for as long as |
possible. As such, the criminal operators of APT technologies tend to focus on |
low and slow |
attacks |
stealthily moving from one compromised host to the next, without generating regular or predictable |
network traffic |
to hunt for specific data or system objectives. Tremendous effort is invested to ensure |
that malicious actions cannot be observed by legitimate operators of these systems. |
Page 9 |
The Command Structure of the Aurora Botnet |
Malware is a key ingredient in successful APT operations. Modern |
off-the-shelf |
and commercial |
malware includes all of the features and functionality necessary to infect digital systems, hide from |
host-based detection systems, navigate networks, capture and extricate key data, provide video |
surveillance and deliver silent covert channels for remote control. APT operators often use custom |
malware tools to achieve specific objectives and harvest information from non-standard systems. |
At the very heart of every APT lies remote control functionality. Criminal operators need this capability |
in order to navigate to specific hosts within target organizations, exploit and manipulate local systems, |
and gain continuous access to critical information. If an APT cannot connect with its criminal |
operators, then it cannot transmit any intelligence it may have captured. In effect, it has been |
neutered. This characteristic makes APTs appear as a sub-category of botnets. |
While APT malware can remain stealthy at the host level, the network activity associated with remote |
control is more easily identified. As such, APTs are most effectively identified, contained and disrupted |
at the network level. |
Controlling the Victim |
Once the victim |
s computer has been compromised, the malware component will typically establish its |
first CnC session to register itself with the botnet CnC server. In order for this to occur, the botnet |
operator must correctly set up the CnC servers and also configure appropriate resolution services such |
as registering domain names and configuring DNS resolution settings. |
Depending upon the sophistication of the botnet operators, this CnC infrastructure can take on many |
different forms, with each alternative offering varying degrees of robustness and flexibility. Readers |
are encouraged to read Damballa |
s earlier whitepaper titled, |
Botnet Communication Topologies: |
Understanding the Intricacies of Botnet Command-and-Control, |
for more information on this topic. |
Page 10 |
The Command Structure of the Aurora Botnet |
Detailed analysis of DNS intricacies for CnC domain name querying and management follow. |
Key Concepts: DNS Overview |
DNS resolution can be generally viewed as having two phases |
a private stub (or |
recursive |
) layer, |
and a public authoritative (or |
iterative |
) layer. |
Figure 4: Conceptual view of Aurora DNS lookups and multiple monitoring opportunities. Damballa |
used the convenience of an authority monitoring system to gather [qr aa] responses. |
The figure above illustrates how Aurora victims performed DNS lookups, and provides a simplified |
delegation tree for several of the Aurora-related CnC domains. An Aurora authority DNS zone is |
depicted: the light blue zone delegated to No-IP. The No-IP zone has been simplified in the diagram to |
include the authority DNS servers, nf[1-4].no-ip.com, as well as the actual Aurora CnC domain, |
blog1.servebeer.com, even though in practice these are separate delegations from the .com TLD |
parent. An infected host is depicted in the light green area. Its resolution path consists of the virus |
code (designated as VX), a local stub resolver (often available through various statically named or |
random DLL files on Windows hosts), and a local recursive DNS server. The |
private |
portions of DNS |
traffic occur within this local envelope, colored as the light green area. No DNS monitoring takes place |
here, in part because of the possible presence of PII, and because of the staggering volume of traffic |
monitoring might entail, for even a small network. Such networks often generate billions of queries |
per day below the recursive. |
When a victim attempts to contact the Aurora CnC domain blog1.servebeer.com, it must first |
discover the delegation of the zone to the No-IP authority name servers. (To save space, these steps |
are not shown in the figure above). The overall delegation of authority is shown in the figure as a tree. |
The hosts nf[1-4].no-ip.com are the authorities for the CnC zone. Thus, the victim network |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.