180 likes | 210 Views
Explore the complexities of domain take-down processes for illicit activities, analyzing security loopholes and duration before domain release.
E N D
Cracking the Wall of Confinement: Understanding and Analysing Malicious Domain Take-downs Asil Stanikzai 30 September 2019
Motivation and Scope of Research Project: - Period an abusive domain remain active before take-down. - Understanding the period of domain take-down before release. - How soon seized domains become available for purchase after release. - Evaluating the security loophole of take-down process Problem Statement: - Domain take-down is complicated and opaque process - Little information about take-down domains, parties, and controlling operators. Data collected based on: - various sinkhole feeds - 8 domain blacklists - Passive DNS data spanning for 6 years - Historical WHOIS information
Background Domain Take-down: the seizure process of domain names by law enforcement which are involved in illicit activities, such as malware distribution, pharmaceutical, and counterfeit goods trading or any violation to Acceptable Use Policies (AUPs) defined by ICANN.
Take-down Steps, Parties, and Elements Parties and Processes: -Take-down Requestor: reports the domain violation (complain to registrar, court order). -Take-down Authority: third-party services specialised in domain take-down. -Take-down Executor: take-down operation operators Elements: -Sinkholing: redirecting the seized domain traffic to specific server -Delisting: refusing to resolve the domain name translation.
Sinkhole Delisting Extensible Provisioning Protocol (EPP) manages WHOIS database registration status codes • Sinkholing: • Showing warning banners for victims visiting the domain • Mimic the operation of C&C for research purpose
Identifying Sinkholed and delisted Domains • Used PDNS data to identify sinkholed domains. - Provided by Farsight (TLD zone and DNS sensors) • Used WHOIS historical data to identify delisted domains. - Provided by 360 Netlab - Used developed algorithm to check EPP codes
Method for Finding Take-down Domain - 1 Million malicious domains were analysed to identify seized domains and duration. - 625K domains were identified as take-down domain after analysing PDNS and WHOIS Records
Analysing Take-Down Operation • A Sinkholed and blacklisted 35,045 domain. • B Sinkholed and delisted 4,429 domains. • C Blacklisted and delisted 17,135 domains. • D Sinkholed, blacklisted and delisted 193 domains.
Pre-emptive and Non-Pre-emptive Take-down Operator: FBI, Microsoft, ShadowServer, CWGSH, and SeeScoredCard TLD: Name, cm, me, org, ws, biz, and net
Active Duration Active duration is the time from first appearance of the domain in the PDNS until the time it was found to be sinkholed.
Sinkhole Duration Operator: CertPI, CWGSH, FBI, Microsoft TLD: biz, info, org, ws
Take-down Loopholes • Dangling DNS Records: A security risk which allows adversary to hijack the sinkholed domain. • Expired Sinkhole: Domains are reused by adversaries after expiry date. • 350K (56.46%) of all take-down domains in the past six years are released. • 7148 (14.14%) of take-down domains in the past ten months are released.
Critique • Confusing data between pre-emptive and active duration (FBI 2000 domains) • Lack of technical method for identifying sinkhole operators -Manually internet search and reading court orders may possibly result to miss some important operators. • Sinkholed domains are reused after expiry date. • No clear mechanism for selecting 8 blacklisting -Expanding public blacklisting could increase the number of blacklisted domains.
Conclusion • Domain take-down can be done by sinkholing or delisting. • 625K take downed domains were analysed. • FBI, Microsoft, ShadowServer, CWGSH, and SeeScoredCard react quickly in take-down. • CertPI, CWGSH, FBI, Microsoft confines malicious domains for longer. • 56.46% of domains are released with 14.14% of them in less than ten months