slides

advertisement
Cyber Security Project
Team:
Sukhada Kulkarni
Anoop Vintha
Yashwanth Takena
Shajay Jayaprakasan
1
Research Topics
 Smartphone Malware
 Cross-site scripting
 CloudFlare
 Social Engineering
2
Smartphone Malware
 85% of the world population uses smartphone
 Android OS to suffer more cybercriminal attacks
 Increased by 63% between 2012- 13
 Malicious Google Apps in Google play quadrupled between
2011- 13
10
5
0
60000
12.7%
Malicious Apps
Percentage of
Total Apps
15
2.7%
2011
Year
2013
42000
40000
20000
0
11000
2011
2013
Year
Source: http://www.infoworld.com/d/security/report-android-malware-and-spyware-apps-spike-in-the-google-play-store-236702
3
Different ways to hack
 Apps Downloadable from Google Play
 Constructing Malware Apps as Legitimate as possible
 More Chargeware type of Apps which employs deceptive charging
practices to siphon payments
 Targeting most addictive and popular Android games like FlappyBird
 Inserted Malware in game sends mobile related information like IMEI
number or mobile OS version number to hackers
Source:http://blog.trendmicro.com/trendlabs-security-intelligence/1730-malicious-apps-still-available-on-popular-android-app-providers/ 4
Different ways to hack
 Mobile Botnets
 Gain control of the victim’s handset, collects contact lists, phone
numbers, message details, geo-location data from the compromised
device.
 MDK Trojan, which uses Advanced Encryption Standard (AES)
algorithms to encrypt data and remain in stealthy mode and thus
closing the way for security researchers to conduct malware analysis.
 MisoSMS, mobile botnet known to steal SMS messages from the
infected phone.
5
Different ways to hack
 Mobile Banking Trojans
 Majority of mobile malware targeted user’s money and bankcards
 Zeus in the Mobile (ZITMO), designed to run on Android operating
system which steal the Mobile Transaction Authorization Numbers
(mTANs) without mobile users noticing
 Malware in QR code scanners
 MQR Codes are growing in popularity and seem to be popping
up everywhere.
 Hackers are using them to disguise the ultimate address stored in
the QR code which may lead to maliciously install malware on
devices, or direct them to questionable websites.
6
Android: SHODAN Findings
 Used Python program and the API to extract android related data
 Performed penetration testing to check for Android devices which
are vulnerable
SEARCH CRITERIA
RESULTS
Mobile Phones found on Shodan
478111
United States
7290
Android os
8940
Android (200)
5600
Android authenticate (401)
1595
Android last modified www-authenticate (403)
76
7
Android: HackerWeb Analytics
Android Related Posts
Author Rankings
Rank
1
2
3
4
5
6
7
8
9
10
AuthorName
virus_c
karlos
Tech-Bot
NiTrOwow
The System
Hess
Rein0
delphifocus
LeFF
DrunKnHack0r
Forum
vctool
vctool
vctool
hackhound
elitehack
hackhound
elitehack
hackhound
hackhound
vctool
Reputation
score
8
5
0
676
5
320
9
42
286
0
Number Of
Posts
59
16
13
10
9
8
5
5
4
4
8
Cross Site Scripting
 Cross-site scripting was revealed
as the most common weakness
making up to 55% of
vulnerabilities in 2013.
 Cross-site scripting is increasingly
common in the cloud computing
world, up more than 160% in the
fourth quarter of 2012.
Incident Frequency
9%
31%
16%
35%
9%
 Cross-site scripting has become
the most common security
vulnerability with 68% of websites
as likely open to XSS attacks.
9
Findings from Shodan
 The following logic is used to decide if the site is secured
or not:
X-XSS-Protection: 1; mode=block Site is secured
X-XSS-Protection: 0
Site is not secured
 Using Sodan search, we found sites which are not
secured by finding the string “X-XSS-Protection: 0 across
the various sites. The distribution of the unsecured sites
was plotted using the data collected.
10
Findings from HackerWeb
 The theme breakdown shows common motives behind
the exploited cross site scripting.
Themes Breakdown
Identity theft
Accessing restrictive information
Free access to paid services
Altering browser functionality
Spying web browsing habits
Denial of Service attacks
11
CloudFlare Security
 CloudFlare provides performance and security for any website.
Hundreds of thousands of websites use CloudFlare
 CloudFlare is neither hardware nor software. It works at the DNS level
 CloudFlare learns from data, it tracks traffic and any sudden
change/increase is investigated to asses whether it is legitimate or an
attack.
12
CloudFlare IP Resolvers
 From Hacker Web posts we found some of the ways to hack cloudflare
and get the website real IP address. A quick way to get the real IP off of
any forum which uses CloudFlare DDoS protection
 Go to http://iplogger.org/getnewid.php and copy the 3rd link in the
boxes
 Go to any forum where you can change your avatar.
/usercp.php?action=avatarStep
 Paste the image url retrieved from IPLogger earlier and click on change
avatar.
 Get back to IPLogger and click "View Log." button. This forwards to a
statistics page where real IP address can be found.
13
CloudFlare Hacker’s Solution
The following steps can ensure proper protection and does not allow any
malware into the cloudflare community
 Go to CloudFlare.com, login to your account and add your domain to
account.
 It scans all your DNS Records and let you update name servers to
cloudflare’s
 Update your name servers and wait for cloudflare to activate. Wait for
CloudFlare to activate your domain (You will get an email when it is
done).
 Go Login to your cloudflare account
 Click the gear beside your domain name and click DNS settings
 Delete all the records except these two and click on I'm done
14
CloudFlare: HackerWeb Analytics
CloudFlare Related Posts
Author Rankings
Rank
1
2
3
4
5
6
7
8
9
10
AuthorName
NiTrOwow
virus_c
Hess
Ravage
Neelix
0l1v3r Q33n
Nighthawk
tezhost
lucienx
EviL.rOmina
Forum
hackhound
vctool
hackhound
hackhound
hackhound
elitehack
anon
vctool
vctool
elitehack
Reputation
Score
676
8
320
534
356
4
0
0
0
18
Number of
Posts
10
4
3
3
2
2
1
1
1
1
15
Sentiment Analysis: Threats
Entities Sentiment Breakdown
 Analysis of hackerweb 14
12
forums reveal IP resolver
10
and DDoS attacks are 8
6
mostly talked about
4
 Text analysis is done to
find what kind of
attacks is Cloudflare
mostly prune to
2
0
 HackerWeb forums
analyzed: Vctool, Anon,
elitehack, hackhoud,
icode
cloudflare
hosting provider
Positive
CloudFlare IP
resolver
Neutral
cloudfare ddos
CloudFlare
Hacked
Negative
Themes Breakdown
cloudflare
hosting provider
CloudFlare IP resolver
cloudfare ddos
CloudFlare Hacked
16
Social Engineering
 Popular tool for cybercriminals to get hands on
confidential information
 The attack vector is a combination of
psychological and technical ploys
 Social engineering attacks are on the rise, 48 percent of large
companies have been targeted past 2 years
 The volume and sophistication of the mobile threats are also
increasing. The mobile world makes it much easier for hackers to
monetize attacks.
17
Sentiment Analysis: targets
 Analysis of hackerweb
forums reveal financial
services such as bank
accounts are the
primary targets
 Retail outlets payment
services and email
accounts follow closely
in the list
Entities Sentiment Breakdown
10
8
6
4
2
0
Bank Accounts Retail Outlets Email accounts
Positive
Neutral
Facebook
Microsoft
Negative
 HackerWeb forums
analyzed: Vctool, Anon,
elitehack, hackhoud,
icode
18
Sentiment Analysis: Medium
 Software and Internet are
the primary channel of
attacks
 Phone and SMS Phishing
has also surged in the past
few years.
 The common targets of
social engineering are
students, corporate
executives, countries and
religious groups.
19
References

http://midsizeinsider.com/en-us/article/mobile-applications-the-launch-pad-for

http://www.zdnet.com/banking-trojans-emerge-as-dominant-mobile-malware-threat-7000026707/

http://www.infoworld.com/d/security/report-android-malware-and-spyware-apps-spike-in-the-googleplay-store-236702

http://tech.firstpost.com/news-analysis/android-malware-increasing-tips-protect-phone-218395.html

https://www.cloudflare.com/

http://arstechnica.com/security/2014/02/biggest-ddos-ever-aimed-at-cloudflares-content-deliverynetwork/

http://shodanio.wordpress.com/2014/01/13/shodan-google-spreadsheets/

https://www.defcon.org/images/defcon-18/dc-18-presentations/Schearer/DEFCON-18-SchearerSHODAN.pdf

https://www.virusbtn.com/index
20
Download