TY - GEN
T1 - Manufacturing compromise
T2 - 2012 ACM Conference on Computer and Communications Security, CCS 2012
AU - Grier, Chris
AU - Ballard, Lucas
AU - Caballero, Juan
AU - Chachra, Neha
AU - Dietrich, Christian J.
AU - Levchenko, Kirill
AU - Mavrommatis, Panayiotis
AU - McCoy, Damon
AU - Nappa, Antonio
AU - Pitsillidis, Andreas
AU - Provos, Niels
AU - Rafique, M. Zubair
AU - Rajab, Moheeb Abu
AU - Rossow, Christian
AU - Thomas, Kurt
AU - Paxson, Vern
AU - Savage, Stefan
AU - Voelker, Geoffrey M.
PY - 2012
Y1 - 2012
N2 - We investigate the emergence of the exploit-as-a-service model for driveby browser compromise. In this regime, attackers pay for an exploit kit or service to do the "dirty work" of exploiting a victim's browser, decoupling the complexities of browser and plugin vulnerabilities from the challenges of generating traffic to a website under the attacker's control. Upon a successful exploit, these kits load and execute a binary provided by the attacker, effectively transferring control of a victim's machine to the attacker. In order to understand the impact of the exploit-as-a-service paradigm on the malware ecosystem, we perform a detailed analysis of the prevalence of exploit kits, the families of malware installed upon a successful exploit, and the volume of traffic that malicious web sites receive. To carry out this study, we analyze 77,000 malicious URLs received from Google Safe Browsing, along with a crowd-sourced feed of blacklisted URLs known to direct to exploit kits. These URLs led to over 10,000 distinct binaries, which we ran in a contained environment. Our results show that many of the most prominent families of malware now propagate through driveby downloads-32 families in all. Their activities are supported by a handful of exploit kits, with Blackhole accounting for 29% of all malicious URLs in our data, followed in popularity by Incognito.We use DNS traffic from real networks to provide a unique perspective on the popularity of malware families based on the frequency that their binaries are installed by drivebys, as well as the lifetime and popularity of domains funneling users to exploits.
AB - We investigate the emergence of the exploit-as-a-service model for driveby browser compromise. In this regime, attackers pay for an exploit kit or service to do the "dirty work" of exploiting a victim's browser, decoupling the complexities of browser and plugin vulnerabilities from the challenges of generating traffic to a website under the attacker's control. Upon a successful exploit, these kits load and execute a binary provided by the attacker, effectively transferring control of a victim's machine to the attacker. In order to understand the impact of the exploit-as-a-service paradigm on the malware ecosystem, we perform a detailed analysis of the prevalence of exploit kits, the families of malware installed upon a successful exploit, and the volume of traffic that malicious web sites receive. To carry out this study, we analyze 77,000 malicious URLs received from Google Safe Browsing, along with a crowd-sourced feed of blacklisted URLs known to direct to exploit kits. These URLs led to over 10,000 distinct binaries, which we ran in a contained environment. Our results show that many of the most prominent families of malware now propagate through driveby downloads-32 families in all. Their activities are supported by a handful of exploit kits, with Blackhole accounting for 29% of all malicious URLs in our data, followed in popularity by Incognito.We use DNS traffic from real networks to provide a unique perspective on the popularity of malware families based on the frequency that their binaries are installed by drivebys, as well as the lifetime and popularity of domains funneling users to exploits.
KW - Malware
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=84869388520&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84869388520&partnerID=8YFLogxK
U2 - 10.1145/2382196.2382283
DO - 10.1145/2382196.2382283
M3 - Conference contribution
AN - SCOPUS:84869388520
SN - 9781450316507
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 821
EP - 832
BT - CCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security
Y2 - 16 October 2012 through 18 October 2012
ER -