4) Criminal Business Models, Botnet C&C and Takedowns Flashcards

1
Q

What is MaaS?

A

Malware as a service; one of the business models in the underground scene

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Garants?

A

Highly trusted member of the underground scene. Act as escrow and exchange money between two gangs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain some Cybercrime business models?

A

FakeAV: AntiVirus programm that claims to have found multiple new malware on our system. With the exchange of money, it will remove the malware;

ID Theft: Identity theft deals with personal identifiable information clickfraud: Monitize an infected computer by force them to click on ads. For every click an attacker will receive money;

DDoS: Multiple requests to one system. Goal is to bring a system down;

SPAM: Use infected systems to send out ads via email;

Bitcoin mining: use processing power of infected system to mine cryptocoins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain how TOR works.

A
  1. Contact Directory Servers to get List of TOR nodes
  2. Alice picks random path with three hops and negotiate session keys with each hop
  3. Decrypting layers of envelopes hop-by-hop, each node can only decrypt one layer
  4. Circuit established.
  5. Circuit will change after 10min.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe what is meant by the term Zero-Day Exploit, and what sort of attacks would these commonly be used in.

A

A zero-day exploit is an exploit of a security hole for which no patch is available yet. Normally for very targeted attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does a Hidden Service work in TOR?

A
  1. Select Introduction Points & send public key, builds circuits
  2. Create Hidden Service Descriptor (public key, intro points) and advertises hidden service at the database => sent to distributed hash table
  3. HS will have an onion URL of 16 chars.onion
  4. Client downloads Hidden Service Descriptor and create circuit to Rendezvous Point
  5. Sends Introduction Message w/ one time secret+RP to Introduction points
  6. Hidden services connects to Rendezvous Point (acts as Relay)
  7. Connection established
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can you find criminal forums online?

A

Search in well known forums for hints; use username or oder coding words for advanced searches;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is/are Money Mules?

A

Re-Transfer money from illigal activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is/are Carders?

A

Monitize stolen credit card information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is/are Exploit Writers?

A

Write zero-day exploits for very targeted attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is/are Bullet Proof Hosting?

A

Provides highly secure hosting. Provider will not shutdown service or hand out any log files by legal request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is/are Resellers?

A

Resells any goods or services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is/are Card makers?

A

works closley together with carders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What kind of botnets are common?

A
  • Single Client
  • Multi Client
  • Multi-Headed
  • Multi-tiered
  • Peer-to-Peer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain the following types of botnets: Single Client, Multi Client, Multi-Headed, Multi-tiered, Peer-to-Peer.

A
  • Single Client: 1-to-1 botnet;
  • Multi Client: Classical clients to server relationsship;
  • Multi headed: Botnet has a list of multiple C&C servers. Try to reach one of them. Hard coded domain name;
  • DGA or Fast-Flux (ip changes on DNS);
  • Multi tier: proxy botnet servers forward traffic to bullet proof hosted botnet;
  • Peer-to-Peer: no real head of botnet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain a few botnet takedown approaches.

A
  • Seize the server
  • Reverse DGA algorhythm to block domains
  • Build Garden Walls
  • Sinkholing DNS
  • Proxy sinkholing
  • Take down criminial business with bad reputation
17
Q

What is Bullet Proof Hosting?

A

Hosting providing does not handle any legal requests. Whether it’s about giving out logs or shutting down hosting.

18
Q

What is Sinkholing?

A

Sinkholing is a technical approach where LE works closely together with hoster or DNS registrar. One way is changing DNS entries of a malicious domain to a system under control of LAW enforcement. With Proxy Sinkholing the traffic still goes to the malicious C&C server but traffic will also be forwarded to a system under control of LE for information gathering.

19
Q

What are the problems of sinkholing?

A
  • Handling PII + Legislation
  • Difficulties in measurement
  • disrupting others investigation
  • Political issues
  • Bots self destructing
  • Data loss caused by you
  • Attracting attack of the attacker on the Sinkhole
20
Q

What is a sandbox?

A

It’s a isolated environment to execute & analyse malicious code. It can also be used to test software. Sandbox protects the host system for any damage.

21
Q

What are advantages / disadvantages of a sandbox?

A

Can not do everything; malware might detect sandbox and behave differently

22
Q

What is YARA?

A

YARA is a tool used by malware analyst to find malicious software, based on pattern searching. Investigator can create different rulesets and search based on rules for malware on the system.