Agenda
Review of project slides
DDoS attacks
Mirai
DDoS/Malware-as-a-Service
Ransomware and Bitcoin
Impact of DDoS
Search for “ddos attack” in Google News
DDoS: Amplification
DNS Amplification
NTP Amplification
Spoofed IP address
Mitigation
What makes DDoS possible?
Mirai Botnet
Mirai Population
DDoS-as-a-Service
Malware-as-a-Service
Booters: Malware-hosting-as-a-Service
Booters: Malware-hosting-as-a-Service
Payment
Tracking Ransomware End-to-end
Danny Y. Huang
Maxwell Matthaios Aliapoulios, Vector Guo Li�Luca Invernizzi, Elie Bursztein, Kylie McRoberts, Jonathan Levin�Kirill Levchenko, Alex C. Snoeren, Damon McCoy
Ransomware causes financial damages
Ransomware causes financial damages
Ransomware causes financial damages
Ransomware causes financial damages
How much ransomware revenue?
How to shut down ransomware?
How typical ransomware works
Spam, compromised websites, etc
How typical ransomware works
How typical ransomware works
All your files are encrypted!
Send 0.5 bitcoins to the following address.
175mBiaNSSHAhoCbpv25y1rJYK4A7d7d1b
How typical ransomware works
All your files are encrypted!
Send 0.5 bitcoins to the following address.
175mBiaNSSHAhoCbpv25y1rJYK4A7d7d1b
Cerber: median ~$1,000
Locky: median ~$1,800
How typical ransomware works
All your files are encrypted!
Send 0.5 bitcoins to the following address.
175mBiaNSSHAhoCbpv25y1rJYK4A7d7d1b
unique ransom wallet address
How typical ransomware works
Victim’s money
How typical ransomware works
Exchange
Victim’s �bitcoins
Victim’s money
How typical ransomware works
Exchange
Victim’s �bitcoins
Ransom wallet address
Ransomware’s bitcoins
Victim’s money
How typical ransomware works
Exchange
Victim’s �bitcoins
Ransom wallet address
Ransomware’s bitcoins
Victim’s money
How typical ransomware works
Exchange
Victim’s �bitcoins
Ransom wallet address
Ransomware’s bitcoins
Victim’s money
Exchange
Ransomware’s money
Bitcoin’s price rose from $500 to $4,000 in a year
Bitcoin can be used for commerce
Bitcoin can be used for commerce
Bitcoin wallets and wallet addresses
Danny
Merchant
Bitcoin Wallet
Bitcoin Wallet
Wallet�Address
1JwN...
Wallet�Address
1CVk...
Paying bitcoins to merchant
1JwN→1CVk: 0.05
(pending)
transaction
merchant’s wallet address?
Paying bitcoins to merchant
1JwN→1CVk: 0.05
(pending)
transaction
merchant’s wallet address
Paying bitcoins to merchant
1JwN→1CVk: 0.05
(pending)
transaction
merchant’s wallet address
Danny’s� wallet address
Bitcoin’s decentralized transaction processing
1JwN→1CVk: 0.05
(pending)
Bitcoin’s
Peer-to-peer�Network
1JwN→1CVk: 0.05
(pending)
1JwN→1CVk: 0.05
(pending)
Transactions are public�and partially anonymous.
Decentralized transaction processing
1JwN→1CVk: 0.05
(unconfirmed)
~ 5 min
1JwN→1CVk: 0.05
(unconfirmed)
1JwN→1CVk: 0.05
(unconfirmed)
Bitcoin’s
Peer-to-peer�Network
Decentralized transaction processing
1JwN→1CVk: 0.05
(confirmed)
1JwN→1CVk: 0.05
(confirmed)
1JwN→1CVk: 0.05
(confirmed)
blockchain
blockchain
blockchain
Bitcoin’s
Peer-to-peer�Network
Two ways to get bitcoins into my wallet
Buy bitcoins via exchange
Mine bitcoins
1
2
Mining produces new bitcoins
Peer-to-peer�Network
Run mining software to find hash collision
Found collision first? �12.5 bitcoins to �my wallet address
miner
miner
miner
Electricity → Bitcoins → Cash
How typical ransomware works
Exchange
Victim’s �bitcoins
Ransom wallet address
Ransomware’s bitcoins
Victim’s money
Exchange
Ransomware’s money
Research questions
How to estimate the total ransom paid (or revenue)?
How to identify chokepoints?
Research questions
How to estimate the total ransom paid (or revenue)?
How to identify chokepoints?
Overview of results
How to estimate the total ransom paid (or revenue)?
How to identify chokepoints?
Overview of results
How to estimate the total ransom paid (or revenue)?
How to identify chokepoints?
Overview of results
How to estimate the total ransom paid (or revenue)?
How to identify chokepoints?
Overview of results
How to estimate the total ransom paid (or revenue)?
How to identify chokepoints?
1
Overview of results
How to estimate the total ransom paid (or revenue)?
How to identify chokepoints?
1
2
Blockchain Analysis
1
Methodology: Follow the money
Methodology: Follow the money
Methodology: Follow the money
Methodology: Follow the money
Methodology: Follow the money
Methodology: Follow the money
known victim
0.5
Methodology: Follow the money
known victim
0.5
Methodology: Follow the money
Co-spending
known victim
0.5
Methodology: Follow the money
Co-spending
known victim
0.5
Methodology: Follow the money
Co-spending
known victim
0.5
1.0
1.3
Methodology: Follow the money
Co-spending
known victim
0.5
1.0
1.3
potential victim
Methodology: Follow the money
artificial “victim”
Methodology: Follow the money
artificial “victim”
0.001
Methodology: Follow the money
Co-spending
artificial “victim”
0.001
Methodology: Follow the money
Co-spending
artificial “victim”
0.001
1.0
1.3
potential victim
Ransom payments over time
Number of payments per day
Median ransom amount per day (USD)
Ransom payments over time
Total ransom received
USD
per
month
Total ransom received
$7.7m
$1.8m
$69k
$6.6m
$100k
USD
per
month
Potential liquidation at exchanges
Fraction of revenue sent to exchanges
$2.6 m
$24 k
Reverse Engineering Cerber’s C&C
2
Cerber’s outbound UDP traffic
Infected host
IP: x.y.z.1
IP: x.y.z.2
IP: x.y.z.3
IP: x.y.z.254
Cerber’s outbound UDP traffic
Infected host
IP: x.y.z.1
IP: x.y.z.2
IP: x.y.z.3
IP: x.y.z.254
me
two-week data
victim IP�victim ID
affiliate ID
...
Country distribution for victims
Cerber’s outbound UDP traffic
Infected host
IP: x.y.z.1
IP: x.y.z.2
IP: x.y.z.3
IP: x.y.z.254
me
two-week data
victim IP�victim ID
affiliate ID
...
Number of infected IP addr per affiliate
Affiliate ID
3% of affiliates caused 50% of infected IPs
Affiliate ID
Summary
3
Summary
Tracked ransom payments for 10 ransomware families using co-spending wallet addr
Reverse engineered C&C protocol for Cerber ransomware
Key Methods
Summary
Tracked ransom payments for 10 ransomware families using co-spending wallet addr
Reverse engineered C&C protocol for Cerber ransomware
Key Methods
Summary
Tracked ransom payments for 10 ransomware families using co-spending wallet addr
Reverse engineered C&C protocol for Cerber ransomware
Estimated revenue:
10 families, >$16 million
over two years
Possible chokepoints: exchanges and affiliates
Key Methods
Key Results
Summary
Tracked ransom payments for 10 ransomware families using co-spending wallet addr
Reverse engineered C&C protocol for Cerber ransomware
Estimated revenue:
10 families, >$16 million
over two years
Possible chokepoints: exchanges and affiliates
Danny Y. Huang — Postdoc at Princeton — http://hdanny.org
Key Methods
Key Results
Appendix
4
Potentially missing Locky’s ransom payments
Google results
binaries found
bitcoin payment