[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2991079.2991112acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

Catching predators at watering holes: finding and understanding strategically compromised websites

Published: 05 December 2016 Publication History

Abstract

Unlike a random, run-of-the-mill website infection, in a strategic web attack, the adversary carefully chooses the target frequently visited by an organization or a group of individuals to compromise, for the purpose of gaining a step closer to the organization or collecting information from the group. This type of attacks, called "watering hole", have been increasingly utilized by APT actors to get into the internal networks of big companies and government agencies or monitor politically oriented groups. With its importance, little has been done so far to understand how the attack works, not to mention any concrete step to counter this threat.
In this paper, we report our first step toward better understanding this emerging threat, through systematically discovering and analyzing new watering hole instances and attack campaigns. This was made possible by a carefully designed methodology, which repeatedly monitors a large number potential watering hole targets to detect unusual changes that could be indicative of strategic compromises. Running this system on the HTTP traffic generated from visits to 61K websites for over 5 years, we are able to discover and confirm 17 watering holes and 6 campaigns never reported before. Given so far there are merely 29 watering holes reported by blogs and technical reports, the findings we made contribute to the research on this attack vector, by adding 59% more attack instances and information about how they work to the public knowledge.
Analyzing the new watering holes allows us to gain deeper understanding of these attacks, such as repeated compromises of political websites, their long lifetimes, unique evasion strategy (leveraging other compromised sites to serve attack payloads) and new exploit techniques (no malware delivery, web only information gathering). Also, our study brings to light interesting new observations, including the discovery of a recent JSONP attack on an NGO website that has been widely reported and apparently forced the attack to stop.

References

[1]
Ad blocking with ad server hostnames and ip addresses. pgl.yoyo.org/as.
[2]
Cve cve2008-2463 details. http://www.cvedetails.com/cve-details.php?t=1&cve_id=CVE2008-2463.
[3]
Dns bh, malware domain blocklist. www.malwaredomains.com/.
[4]
Farsight security information exchange. https://api.dnsdb.info/.
[5]
hphosts. www.hosts-file.net/.
[6]
Malc0de database. http://malc0de.com/database/.
[7]
Malware domains list. http://www.malwaredomainlist.com/.
[8]
Most valuable professional. http://www.mvps.org/.
[9]
Project honey pot. https://www.projecthoneypot.org/.
[10]
Rockland trust. https://www.rocklandtrust.com/.
[11]
Sucuri. https://sitecheck.sucuri.net.
[12]
Tor project: Anonymity online. https://www.torproject.org/.
[13]
Viruswatch - viruswatch watching adress changes of malware URL's. http://lists.clean-mx.com/cgi-bin/mailman/listinfo/viruswatch/.
[14]
Js hijacking. http://jzking121.blog.51cto.com/5436671/1306505, Oct 2013.
[15]
2014 hong kong protests. http://en.wikipedia.org/wiki/2014_Hong_Kong_protests, 2014.
[16]
Javascript keylogger - pastebin.com. http://pastebin.com/XYGMqEsp, 2014.
[17]
Scanbox javascript code - exploit packs. https://hiddencodes.wordpress.com/2014/10/23/scanbox-javascript-code-exploit-packs/, 2014.
[18]
Vulnerability summary for cve-2014-6332. https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6332, 2014.
[19]
Scanbox javascript code. http://weisuo.org/?post=131, 2015.
[20]
AGGARWAL, C. Outlier analysis. Springer, 2013.
[21]
Alexa. Alexa top global sites. http://www.alexa.com/topsites, May 2015.
[22]
Blascol, J. Watering holes exploiting jsonp hijacking to track users in china. https://www.alienvault.com/blogs/labs-research/watering-holes-exploiting-jsonp-hijacking-to-track-users-in-china, 2015.
[23]
Borgolte, K., Kruegel, C., and Vigna, G. Delta: Automatic Identification of Unknown Web-based Infection Campaigns. In Proceedings of the ACM Conference on Computer and Communications Security (2013), CCS '13, ACM.
[24]
Breunig, M. M., Kriegel, H.-P., Ng, R. T., and Sander, J. LOF: Identifying density-based local outliers. In Proceedings of the 20OO ACM SIGMOD (2000), ACM.
[25]
Canali, D., and Balzarotti, D. Behind the scenes of online attacks: an analysis of exploitation behaviors on the web. In In Proceeding of the Network and Distributed System Security Symposium (NDSS'13) (2013).
[26]
Canali, D., Balzarotti, D., and Francillon, A. The role of web hosting providers in detecting compromised websites. In Proceedings of the 22nd international conference on World Wide Web (Republic and Canton of Geneva, Switzerland, 2013), WWW '13, International World Wide Web Conferences Steering Committee, pp. 177--188.
[27]
Canali, D., Cova, M., Vigna, G., and Kruegel, C. Prophiler: a fast filter for the large-scale detection of malicious web pages. In Proceedings of the 20th international conference on World wide web (New York, NY, USA, 2011), WWW '11, ACM, pp. 197--206.
[28]
Cox, A., Elisan, C., Gragido, W., Harrington, C., and McNeill, Jon McNeill, J. The voho campaign: an in depth analysis. https://blogs.rsa.com/wp-content/uploads/2014/10/VOHO_WP_FINAL_READY-FOR-Publication-09242012_AC.pdf, Sept 2012.
[29]
Doman, C., and Lancaster, T. Scanbox framework - who's affected, and who's using it? http://pwc.blogs.com/cyber_security_updates/2014/10/scanbox-framework-whos-affected-and-whos-using-it-1.html/, 2014.
[30]
Doman, C., and Lancaster, T. A deeper look into scanbox. http://pwc.blogs.com/cyber_security_updates/2015/02/a-deeper-look-into-scanbox.html/, 2015.
[31]
Grossman, J. Advanced web attack techniques using gmail. http://jeremiahgrossman.blogspot.de/2006/01/advanced-web-attack-techniques-using.html, Jan 2006.
[32]
Hardy, S., Crete-Nishihata, M., Kleemola, K., Senft, A., Sonne, B., Wiseman, G., Gill, P., and Deibert, R. J. Targeted threat index: Characterizing and quantifying politically-motivated targeted malware. In Proceedings of the 23rd USENIX Conference on Security Symposium (Berkeley, CA, USA, 2014), SEC'14, USENIX Association, pp. 527--541.
[33]
Hutchins, E., Clopperty, M., and Amin, R. Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. In Proc. 6th Annual International Conference on Information Warfare and Security (2011).
[34]
Invernizzi, L., Benvenuti, S., Cova, M., Comparetti, P. M., Kruegel, C., and Vigna, G. Evilseed: A guided approach to finding malicious web pages. In Proceedings of the 2012 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2012), SP '12, IEEE Computer Society, pp. 428--442.
[35]
John, J. P., Yu, F., Xie, Y., Krishnamurthy, A., and Abadi, M. deseo: combating search-result poisoning. In Proceedings of the 20th USENIX conference on Security (Berkeley, CA, USA, 2011), SEC'11, USENIX Association, pp. 20--20.
[36]
Kindlund, D. Cfr watering hole attack details. https://www.fireeye.com/blog/threat-research/2012/12/council-foreign-relations-water-hole-attack-details.html, 2012.
[37]
Krebs, B. Anthem breach may have started in april 2014. http://krebsonsecurity.com/2015/02/anthem-breach-may-have-started-in-april-2014/, 2014.
[38]
Le Blond, S., Uritesc, A., Gilbert, C., Chua, Z. L., Saxena, P., and Kirda, E. A look at targeted attacks through the lense of an ngo. In Proceedings of the 23rd USENIX Conference on Security Symposium (Berkeley, CA, USA, 2014), SEC'14, USENIX Association, pp. 543--558.
[39]
Lee, M., and Lewis, D. Clustering disparate attacks: Mapping the activities of the advanced persistent threat. In Virus Bulletin Conference (2011), VB'11.
[40]
Leontiadis, N., Moore, T., and Christin, N. Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade. In Proceedings of the 20th USENIX conference on Security (Berkeley, CA, USA, 2011), SEC'11, USENIX Association, pp. 19--19.
[41]
Li, F., Lai, A., and Ddl, D. Evidence of advanced persistent threat: A case study of malware for political espionage. In Proceedings of the 2011 6th International Conference on Malicious and Unwanted Software (Washington, DC, USA, 2011), MALWARE '11, IEEE Computer Society, pp. 102--109.
[42]
Li, Z., Alrwais, S., Wang, X., and Alowaisheq, E. Hunting the red fox online: Understanding and detection of mass redirect-script injections. In Proceedings of the 2014 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2014), SP '14, IEEE Computer Society, pp. 3--18.
[43]
Li, Z., Alrwais, S., Xie, Y., Yu, F., and Wang, X. Finding the linchpins of the dark web: a study on topologically dedicated hosts on malicious web infrastructures. In Proceedings of the 2013 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2013), SP '13, IEEE Computer Society, pp. 112--126.
[44]
MANDIANT. APT1: Exposing one of China's cyber espionage units. Report available from www.mandiant.com, 2013.
[45]
Marczak, W. R., Scott-Railton, J., Marquis-Boire, M., and Paxson, V. When governments hack opponents: A look at actors and technology. In Proceedings of the 23rd USENIX Conference on Security Symposium (Berkeley, CA, USA, 2014), SEC'14, USENIX Association, pp. 511--525.
[46]
Microsoft. Microsoft security essentials. http://http://windows.microsoft.com/en-us/windows/security-essentials-download/, 2013.
[47]
Mimoso, M. ios developer site at core of facebook, apple watering hole attack. https://threatpost.com/ios-developer-site-core-facebook-apple-watering-hole-attack-022013/77546/, 2013.
[48]
Moore, T., and Clayton, R. Financial cryptography and data security. Springer-Verlag, Berlin, Heidelberg, 2009, ch. Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing, pp. 256--272.
[49]
Papadimitriou, S., Kitagawa, H., Gibbons, P., and Faloutsos, C. LOCI: fast outlier detection using the local correlation integral. In Proceedings of the IEEE International Conference on Data Engineering (ICDE) (2003), IEEE.
[50]
Perlroth, N. Chinese hackers circumvent popular web privacy tools. http://www.nytimes.com/2015/06/13/technology/chinese-hackers-circumvent-popular-web-privacy-tools.html, 2015.
[51]
Petnel, R. Easylist. https://easylist-downloads.adblockplus.org/easylist.txt.
[52]
Research, I. Chinese espionage campaign compromises forbes.com to target us defense, financial services companies in watering hole style attack. http://www.invincea.com/2015/02/chinese-espionage-campaign-compromises-forbes/, 2015.
[53]
Response, S. S. The elderwood project. http://www.symantec.com/connect/blogs/elderwood-project/, 2012.
[54]
Salmi, D. "watering hole" attacks targeting political sites. https://blog.avast.com/2013/01/07/watering-hole-attacks-targeting-political-sites/, 2013.
[55]
Segura, J. Domain shadowing with a twist. https://blog.malwarebytes.org/malvertising-2/2015/04/domain-shadowing-with-a-twist/, 2015.
[56]
Spohn, M. Know your digital enemy. http://www.mcafee.com/us/resources/white-papers/foundstone/wp-know-your-digital-enemy.pdf, March 2012.
[57]
Stevenson, A. Chinese spooks hit tor and vpn users with watering hole cyber attacks. http://www.v3.co.uk/v3-uk/news/2413082/chinese-spooks-hit-tor-and-vpn-users-with-watering-hole-cyber-attacks, 2015.
[58]
Teodorescu, M. Hackers used a chinese restaurant menu to breach a big oil company intranet. http://www.electronicproducts.com/Computer_Systems/Servers/Hackers_used_a_Chinese_restaurant_menu_to-_breach_a_big_oil_company_s_intranet.aspx, 2014.
[59]
Thonnard, O., Bilge, L., O'Gorman, G., Kiernan, S., and Lee, M. Industrial espionage and targeted attacks: Understanding the characteristics of an escalating threat. In Proceedings of the 15th International Conference on Research in Attacks, Intrusions, and Defenses (Berlin, Heidelberg, 2012), RAID'12, Springer-Verlag, pp. 64--85.
[60]
Vasek, M., and Moore, T. Identifying risk factors for webserver compromise. In Financial Cryptography and Data Security (March 2014), vol. 8437 of Lecture Notes in Computer Science, Springer, pp. 326--345.
[61]
VirusTotal. Virustotal - free online virus, malware and URL scanner. https://www.virustotal.com/, 2013.
[62]
VirusTotal. Virustotal - free online virus, malware and URL scanner. https://www.virustotal.com/en/file/110bf923b8617045fafa7a35a9a9e0878d87b1a3b9fb3c8bd1fdab7907259c8d/analysis//, 2015.
[63]
Yun, C. Baidu, ali, tencent use jsonp to hijack user tracking. http://www.freebuf.com/articles/web/70025.html, 2015.

Cited By

View all
  • (2024)X-MyoNET: Biometric Identification Using Deep Processing of Dynamic Surface ElectromyographyIEEE Transactions on Instrumentation and Measurement10.1109/TIM.2024.338457173(1-13)Online publication date: 2024
  • (2023)Cyber ForensicsDigital Technologies in Modeling and Management10.4018/978-1-6684-9576-6.ch005(93-115)Online publication date: 27-Oct-2023
  • (2022)Survey and Taxonomy of Adversarial Reconnaissance TechniquesACM Computing Surveys10.1145/353870455:6(1-38)Online publication date: 7-Dec-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ACSAC '16: Proceedings of the 32nd Annual Conference on Computer Security Applications
December 2016
614 pages
ISBN:9781450347716
DOI:10.1145/2991079
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • ACSA: Applied Computing Security Assoc

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 December 2016

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

ACSAC '16
Sponsor:
  • ACSA
ACSAC '16: 2016 Annual Computer Security Applications Conference
December 5 - 8, 2016
California, Los Angeles, USA

Acceptance Rates

Overall Acceptance Rate 104 of 497 submissions, 21%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)24
  • Downloads (Last 6 weeks)4
Reflects downloads up to 05 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)X-MyoNET: Biometric Identification Using Deep Processing of Dynamic Surface ElectromyographyIEEE Transactions on Instrumentation and Measurement10.1109/TIM.2024.338457173(1-13)Online publication date: 2024
  • (2023)Cyber ForensicsDigital Technologies in Modeling and Management10.4018/978-1-6684-9576-6.ch005(93-115)Online publication date: 27-Oct-2023
  • (2022)Survey and Taxonomy of Adversarial Reconnaissance TechniquesACM Computing Surveys10.1145/353870455:6(1-38)Online publication date: 7-Dec-2022
  • (2021)Detection of Malicious Servers for Preventing Client-Side AttacksMehran University Research Journal of Engineering and Technology10.22581/muet1982.2101.2040:1(230-240)Online publication date: 1-Jan-2021
  • (2021)Challenges and pitfalls in malware researchComputers and Security10.1016/j.cose.2021.102287106:COnline publication date: 1-Jul-2021
  • (2020)On the Security of Practical Mail User Agents against Cache Side-Channel AttacksApplied Sciences10.3390/app1011377010:11(3770)Online publication date: 29-May-2020
  • (2019)Security Analysis of Devolo HomePlug DevicesProceedings of the 12th European Workshop on Systems Security10.1145/3301417.3312499(1-6)Online publication date: 25-Mar-2019
  • (2019)Leveraging cyber threat intelligence for a dynamic risk frameworkInternational Journal of Information Security10.1007/s10207-019-00433-2Online publication date: 8-Apr-2019
  • (2018)‘Delayed Disclosure’: National Security, Whistle-Blowers and the Nature of SecrecyPolitical Studies10.1177/003232171876499067:2(291-306)Online publication date: 28-Mar-2018
  • (2018)A Novel Semantic-Aware Approach for Detecting Malicious Web TrafficInformation and Communications Security10.1007/978-3-319-89500-0_54(633-645)Online publication date: 10-Apr-2018
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media