+ All Categories
Home > Documents > Ransomware detection - Zeek

Ransomware detection - Zeek

Date post: 04-Jan-2022
Category:
Upload: others
View: 6 times
Download: 0 times
Share this document with a friend
28
Ransomware detection with Bro Mike Stokkel 13 Sept 2016
Transcript
Page 1: Ransomware detection - Zeek

Ransomware detectionwith Bro

Mike Stokkel

13 Sept 2016

Page 2: Ransomware detection - Zeek

• Who am I?

– Mike Stokkel

– Security Analyst @ Fox-IT

– Internship at Fox-IT

– Bachelor July 2016

Introduction

Introduction

Page 3: Ransomware detection - Zeek

• What am I going to talk about?

– Fox-IT

– Ransomware

– Bro Policy

– Results

– Demo

Agenda

Page 4: Ransomware detection - Zeek

Fox-IT

Page 5: Ransomware detection - Zeek

• Located: Delft, The Netherlands

• IT security

– Managed Security Services

– Auditing

– Cryptographic solutions

Company

Fox-IT

Page 6: Ransomware detection - Zeek

• Snort-based detection

• Bro

Security Operation Center

Fox-IT

Page 7: Ransomware detection - Zeek

Ransomware

Page 8: Ransomware detection - Zeek

• Malware

– Encryption

– Payment

– Decryption

• Rising concern

Explanation

Ransomware

Page 9: Ransomware detection - Zeek

• Process

– Master key (public and private key)

– Generating a key for the victim

– Encrypting the victim’s key

Encryption

Ransomware

Page 10: Ransomware detection - Zeek

• Personal Computer

– Local files

• Company

– Network Share

• To pay or not to pay?

Impact

Ransomware

Page 11: Ransomware detection - Zeek

• Exploit Kits

– Browser vulnerabilities

• E-mail

– Malicious document

– Macros

Spreading Methods

Ransomware

Page 12: Ransomware detection - Zeek

• Version check

• IP check

• Download ransomware payload

• Run payload

Exploit Kit

Ransomware

Page 13: Ransomware detection - Zeek

• Macro

• VBS script

• Download & execute payload

Malicious document

Ransomware

Page 14: Ransomware detection - Zeek

• TeamViewer hack

• RDP brute force

Remote desktop programs

Ransomware

Page 15: Ransomware detection - Zeek

• IDS

– Snort rules

• Problem

Detection Methods

Ransomware

Page 16: Ransomware detection - Zeek

Bro Policy

Page 17: Ransomware detection - Zeek

• Ransomware behavior

– SMB

• Possible solutions

– File extension listing

– Threshold SMB commands

– Command-and-Control communication

Approach

Bro Policy

Page 18: Ransomware detection - Zeek

• Randomness of data

• 0 – 8 bits per character

Entropy

Bro policy

Page 19: Ransomware detection - Zeek

• Compressed files

• Images

• PDF

• Mime/Media type

What about ….

Bro policy

Page 20: Ransomware detection - Zeek

• SMB parser

– Events

• File over new connection

• Chunk event

• SumStat

– Threshold

• Notice.log

Functions

Bro Policy

Page 21: Ransomware detection - Zeek

• Check for SMB traffic

• Check for certain filenames

• Check for Mime type

• Check for SMB action

• Check if SMB action equals Write

• Add File analyzer

File over new connection

Bro Policy

Page 22: Ransomware detection - Zeek

• Check if the offset equals 0

• Calculate entropy of data collected from SMB

write command

• Use SumStat to add +1 for the threshold

• Write to log file

• Write a Notice.log

Chunk event

Bro Policy

Page 23: Ransomware detection - Zeek

Results

Page 24: Ransomware detection - Zeek

• Two new kinds of Ransomware

Live Testing

Bro Policy

Page 25: Ransomware detection - Zeek

• Two new kinds of Ransomware

– Google Chrome & Mozilla Firefox

• Encrypted cache

• Encryption tools

– TrueCrypt

– VeraCrypt

• Documents

– Printing

– Creating

Live Testing

Bro Policy

Page 26: Ransomware detection - Zeek

Demo

Page 27: Ransomware detection - Zeek

• Locky/Zepto

• Cryptowall

• CTBLocker

• Jigsaw (and all families)

• Mobef

• Shade

• Maktub

• Cerber/Alpha

• Teslacrypt

• Rokku

• Crysis

• Cerber

• Bandarchor

Samples

Demo

Page 28: Ransomware detection - Zeek

Thank you for having me!


Recommended