+ All Categories
Home > Documents > Thursday, 16 October 2008 1

Thursday, 16 October 2008 1

Date post: 12-Sep-2021
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
74
1 Thursday, 16 October 2008
Transcript
Page 1: Thursday, 16 October 2008 1

1Thursday, 16 October 2008

Page 2: Thursday, 16 October 2008 1

The Evolution of Spam and Messaging Security

Neil CookHead of Technology Services, EMEA, Cloudmark, Inc.

ESNOG, BarcelonaOctober, 2008

1Thursday, 16 October 2008

Page 3: Thursday, 16 October 2008 1

2Thursday, 16 October 2008

Page 4: Thursday, 16 October 2008 1

A Glossary of Recent Security Terms

phishing, pharming, attack surface, botnets, bot herders,

packet inspection, honeypots, spyware, rootkits,

zero day, underground economy, naive bayesian, vishing,

two factor authentication, active scripting, spear phishing, pentests,

pretexting, differentiated security, adware,

DNS amplification, zombies, click fraud

2Thursday, 16 October 2008

Page 5: Thursday, 16 October 2008 1

3Thursday, 16 October 2008

Page 6: Thursday, 16 October 2008 1

Industry Luminaries on the State of Security

"... Internet is at serious risk ... botnets could eat the Internet."

- Vint Cerf, Father of InternetWorld Economic Forum

3Thursday, 16 October 2008

Page 7: Thursday, 16 October 2008 1

Industry Luminaries on the State of Security

"... even the most innocent of websites can ruin your life ..."

- Dr Jose Nazario, AuthorDefense and Detection Strategies Against Internet Worms

3Thursday, 16 October 2008

Page 8: Thursday, 16 October 2008 1

Should we be really really afraid?

4Thursday, 16 October 2008

Page 9: Thursday, 16 October 2008 1

5Thursday, 16 October 2008

Page 10: Thursday, 16 October 2008 1

Evolution and Future Trends

5Thursday, 16 October 2008

Page 11: Thursday, 16 October 2008 1

Computer security is a very splintered subject.

Some coherence would be nice.

Evolution and Future Trends

5Thursday, 16 October 2008

Page 12: Thursday, 16 October 2008 1

Spam is a microcosm of computer security.

No, really!

6Thursday, 16 October 2008

Page 13: Thursday, 16 October 2008 1

Analysis of Evolution of Spam =

Fundamental Principles of Computer Security

7Thursday, 16 October 2008

Page 14: Thursday, 16 October 2008 1

Everyone can observe spam.

8Thursday, 16 October 2008

Page 15: Thursday, 16 October 2008 1

9Thursday, 16 October 2008

Page 16: Thursday, 16 October 2008 1

Spam Legitimate

9Thursday, 16 October 2008

Page 17: Thursday, 16 October 2008 1

10Thursday, 16 October 2008

Page 18: Thursday, 16 October 2008 1

10Thursday, 16 October 2008

Page 19: Thursday, 16 October 2008 1

Adware

MalwareMS Word Doc

Spyware

10Thursday, 16 October 2008

Page 20: Thursday, 16 October 2008 1

Spam is highly evolved.

11Thursday, 16 October 2008

Page 21: Thursday, 16 October 2008 1

Spam is still here.

12Thursday, 16 October 2008

Page 22: Thursday, 16 October 2008 1

13Thursday, 16 October 2008

Page 23: Thursday, 16 October 2008 1

Time

Impr

ovem

ent

19801975 1985 1990 1995

1,000

100

10

1

Innovation C Innovation DInnovation A Innovation B

Moore’s Law

13Thursday, 16 October 2008

Page 24: Thursday, 16 October 2008 1

Time

Impr

ovem

ent

19801975 1985 1990 1995

1,000

100

10

1

Innovation C Innovation DInnovation A Innovation B

The Security Curve

13Thursday, 16 October 2008

Page 25: Thursday, 16 October 2008 1

Fundamental Principle #1

Good security must thrive in an environment

that is intentionally hostile to it.

14Thursday, 16 October 2008

Page 26: Thursday, 16 October 2008 1

The focus of security should be the attacker.

15Thursday, 16 October 2008

Page 27: Thursday, 16 October 2008 1

The motivation of attacker is to make money.

16Thursday, 16 October 2008

Page 28: Thursday, 16 October 2008 1

We can cast the security problem as a problem of economics.

17Thursday, 16 October 2008

Page 29: Thursday, 16 October 2008 1

Fundamental Principle #2The Optimal Target Selection Strategy

The attacker selects the most valuable and least

defended targets.

18Thursday, 16 October 2008

Page 30: Thursday, 16 October 2008 1

Spam is BIG...

...because email is the #1 Internet application and wasdesigned with no security.

19Thursday, 16 October 2008

Page 31: Thursday, 16 October 2008 1

Microsoft Windows is attacked more...

... because 96% of the computers in the world run

Windows, and security is poor.

20Thursday, 16 October 2008

Page 32: Thursday, 16 October 2008 1

Social networks are being attacked...

... because they are the top websites, and are poorly defended

21Thursday, 16 October 2008

Page 33: Thursday, 16 October 2008 1

Social Networking Spam

Someone has a crush on you! www.YouGotCrushedOn.com

Someone has a crush on you! www.GotSpringCrush.com

Someone has a crush on you! www.YouGotCrushedOn.com

22Thursday, 16 October 2008

Page 34: Thursday, 16 October 2008 1

Categories of Spam

23Thursday, 16 October 2008

Page 35: Thursday, 16 October 2008 1

Categories of Spam

‣ 45% of spam in 2006 was pharmaceutical spam

‣ 33% of spam in 2007 was stock spam

‣ 2% of spam in 2007 was website hosting offers

23Thursday, 16 October 2008

Page 36: Thursday, 16 October 2008 1

A Graph for Optimal Target Selection

24Thursday, 16 October 2008

Page 37: Thursday, 16 October 2008 1

A Graph for Optimal Target Selection

‣ Targets lie in the top right quadrant

‣ Targets move left on X axis as security is introduced

‣ Targets move up on Y axis as services become popular

Ease of Exploiting Target

Valu

e to

Atta

cker

= Targets

24Thursday, 16 October 2008

Page 38: Thursday, 16 October 2008 1

The attacker is a shrewd investor, reassesses as conditions change.

25Thursday, 16 October 2008

Page 39: Thursday, 16 October 2008 1

We examined spam wars from an economic perspective.

26Thursday, 16 October 2008

Page 40: Thursday, 16 October 2008 1

Fundamental Principle #3

The struggle between attacker and defender takes two forms:

1. Attrition Warfare2. Transmutation

27Thursday, 16 October 2008

Page 41: Thursday, 16 October 2008 1

Attrition Warfare in SpamURL cycling and listing

28Thursday, 16 October 2008

Page 42: Thursday, 16 October 2008 1

Number of Domains Used for Spam in 2003?

45,000Cost of these domains: USD $31,000

29Thursday, 16 October 2008

Page 43: Thursday, 16 October 2008 1

Number of Domains Used for Spam in 2007?

1,6878,00Cost of these domains: USD $9.8M

30Thursday, 16 October 2008

Page 44: Thursday, 16 October 2008 1

Number of Blogspot/Redirector URLs Used for Spam in 2008?

Unlimited?Cost of these domains: USD $0

31Thursday, 16 October 2008

Page 45: Thursday, 16 October 2008 1

Fundamental Principle #4

Attrition warfare happens when an attacker figures out a

way to exploit a defense strategy at a fixed cost.

32Thursday, 16 October 2008

Page 46: Thursday, 16 October 2008 1

Average time to discover a new spam domain in 2003?

8 minutes

33Thursday, 16 October 2008

Page 47: Thursday, 16 October 2008 1

Average time to discover a new spam domain in 2007?

22 seconds

34Thursday, 16 October 2008

Page 48: Thursday, 16 October 2008 1

Many Types of Attrition Wars in Spam

35Thursday, 16 October 2008

Page 49: Thursday, 16 October 2008 1

Many Types of Attrition Wars in Spam

‣ IP Reputation tracking

‣ Bayesian Noise Elimination

‣ Hash Busting

35Thursday, 16 October 2008

Page 50: Thursday, 16 October 2008 1

Many Types of Attrition Wars in Spam

‣ IP Reputation tracking

‣ Bayesian Noise Elimination

‣ Hash Busting

Whoever had the fastest tempo won the attrition war

35Thursday, 16 October 2008

Page 51: Thursday, 16 October 2008 1

The most common way to achieve high tempo is automation.

But the cost of automating different strategies can vary

quite a bit.

36Thursday, 16 October 2008

Page 52: Thursday, 16 October 2008 1

Fundamental Principle #5

Effective attrition attack strategies are cheaper to automate than their defense counterparts,

and vice versa.

37Thursday, 16 October 2008

Page 53: Thursday, 16 October 2008 1

DDoS space is set in a war of attrition.

38Thursday, 16 October 2008

Page 54: Thursday, 16 October 2008 1

What happens when attrition warfare is no longer profitable to the attacker?

39Thursday, 16 October 2008

Page 55: Thursday, 16 October 2008 1

What happens when attrition warfare is no longer profitable to the attacker?

‣ Attacker can find a new target, eg spammers are moving to blogs, social networks, cell phones.

‣Transmutate.

39Thursday, 16 October 2008

Page 56: Thursday, 16 October 2008 1

Fundamental Principle #6

Transmutation is an new attack strategy that steps outside the

parameters of the defense.

It is a response to a loss in war of attrition.

40Thursday, 16 October 2008

Page 57: Thursday, 16 October 2008 1

Pump and dump stock spam defeated many anti-spam systems.

41Thursday, 16 October 2008

Page 58: Thursday, 16 October 2008 1

Botnets made Spam Filtering based IP Reputation a lot more difficult -

particularly Outbound Spam

© 2

001-

2006

Clo

udm

ark

Inc.

| C

ON

FID

EN

TIA

L

26

© 2

001-

2006

Clo

udm

ark

Inc.

| C

ON

FID

EN

TIA

L

26

Internet

Zombie PC

ISP network

3rd Party MTA (Hotmail)

Inbound MTA & Message Store

Outbound MTA

Zombie sends mail directly to an external MTA. Outbound MTA Anti-Abuse detection bypassed.

POP3

SMTP

SMTP

SMTP

SMTP

42Thursday, 16 October 2008

Page 59: Thursday, 16 October 2008 1

Social Networking Spam friend request Spam

Comment Spam and Phishing

Fictitious “Friend Request”

Spammy Profiles

Wall Spam

43Thursday, 16 October 2008

Page 60: Thursday, 16 October 2008 1

Transmutation is a creative

process.

It has an R&D cost.

44Thursday, 16 October 2008

Page 61: Thursday, 16 October 2008 1

Fundamental Principle #7

A successful defense to transmutation is to turn it into a

war of attrition

45Thursday, 16 October 2008

Page 62: Thursday, 16 October 2008 1

Fundamental Principle #8

Target bounding strategies cripple infrastructure and provide no

security.

46Thursday, 16 October 2008

Page 63: Thursday, 16 October 2008 1

Internet worms work by exploiting vulnerabilities in

network softare.

Sasser exploited XP in 2004, spread at an alaming rate, caused Delta to cancel flights, shutdown some satellite communications, Sampo bank to close 130

branches.

47Thursday, 16 October 2008

Page 64: Thursday, 16 October 2008 1

Transmutation in worms. Spam + Social Engineering

“230 dead as Storm batters Europe”

“Radical Muslim drinking enemies blood”

“Chinese missile shot down USA satellite”

“Fidel Castro dead.”

48Thursday, 16 October 2008

Page 65: Thursday, 16 October 2008 1

Storm worm defeated by

antispam systems like Cloudmark

and Postini running high tempo

attrition wars on binary content in

email.

49Thursday, 16 October 2008

Page 66: Thursday, 16 October 2008 1

More Transmutations:Indirect/Redirect Virus/Spam

http://charleshenegar4626.blogspot.com

http://marionblakeman405.blogspot.com

http://james-dfarley3237.blogspot.com

50Thursday, 16 October 2008

Page 67: Thursday, 16 October 2008 1

Fundamental Principle #9

There's always the potential for a new transmutation whose nature is

impossible to predict.

51Thursday, 16 October 2008

Page 68: Thursday, 16 October 2008 1

Conclusion #1You can predict the infrastructure targets at risk

52Thursday, 16 October 2008

Page 69: Thursday, 16 October 2008 1

Conclusion #1You can predict the infrastructure targets at risk

‣ Use optimal target selection strategy often

‣ For example: mobile messaging will be attacked when e-commerce models appear. Or when the cost of sending mobile spam messages becomes economically viable.

52Thursday, 16 October 2008

Page 70: Thursday, 16 October 2008 1

Conclusion #2You cannot predict the form of attacks

53Thursday, 16 October 2008

Page 71: Thursday, 16 October 2008 1

Conclusion #2You cannot predict the form of attacks

‣ Specific approaches and attacks can’t be predicted.

‣ These attacks will transmutate rapidly as you create responses to them.

53Thursday, 16 October 2008

Page 72: Thursday, 16 October 2008 1

Conclusion #3Maintain a high tempo security process internally

54Thursday, 16 October 2008

Page 73: Thursday, 16 October 2008 1

Conclusion #3Maintain a high tempo security process internally

‣ Select the highest tempo security partners and proxies.

‣ Speed up evaluation of proposed security processes.

‣ Avoid target bounding approaches.

‣ Create risk mitigation models for collateral damage.

54Thursday, 16 October 2008

Page 74: Thursday, 16 October 2008 1

Thankyou

55Thursday, 16 October 2008


Recommended