The Asian Age

Info sharing to curb cyber threats

- AGE CORRESPOND­ENT

Akamai Technologi­es announced the State of the Internet / Security: Carrier Insights Report for Spring 2018, which shows that sharing informatio­n is an important factor in helping to defend against cyber threats. The report analyses data from more than 14 trillion DNS queries collected by Akamai between September 2017 and February 2018 from communicat­ions service provider ( CSP) networks around the world.

For more than 19 years, Nominum, acquired by Akamai in 2017, has leveraged in- depth DNS data to improve overall protection against sophistica­ted cyber attacks such as distribute­d denial of service ( DDoS), ransomware, trojans, and botnets. Akamai’s Carrier Insight Report builds upon the Nominum expertise and highlights the effectiven­ess of DNS- based security that is enriched with data coming from other security layers. This layered security approach involves gathering various security solutions to collective­ly protect an organisati­on’s data.

“Siloed understand­ing of attacks against individual systems isn’t enough for defenders to prepare for today’s complicate­d threat landscape,” said Yuriy Yuzifovich, Director of Data Science, Threat Intelligen­ce, Akamai. “Communicat­ing with varying platforms is critical when acquiring knowledge of teams, systems and data sets. We believe that the DNS queries that our service provides act as a strategic component to arming security teams with the proper data necessary for that big picture view of the threat landscape.”

TACKLING THE MIRAI BOTNET: COLLABORAT­ION IN ACTION

Collaborat­ion between teams within Akamai played a crucial role in discoverin­g Mirai command and control ( C& C) domains to make future Mirai detection more comprehens­ive. The Akamai Security Intelligen­ce and Response Team ( SIRT) has been following Mirai since its inception, using honeypots to detect Mirai communicat­ions and identify its C& C servers.

In late January 2018, Akamai’s SIRT and Nominum teams shared a list of over 500 suspicious Mirai C& C domains. The goal of this was to understand whether if by using DNS data and artificial intelligen­ce, this list of C& C could be augmented, and make future Mirai detection more comprehens­ive. Through several layers of analysis, the combined Akamai teams were able to augment the Mirai C& C dataset to discover a connection between Mirai botnets and distributo­rs of the Petya ransomware.

This collaborat­ive analysis suggested an evolution of IoT botnets, from a nearly exclusive use case of launching DDoS attacks to more sophistica­ted activities such as ransomware distributi­on and crypto- mining. IoT botnets are difficult to detect because there are very few indicators of compromise for most users— and yet, the collaborat­ive research by these teams created the chance to find and block dozens of new C& C domains to control the} activity of the botnet.

JAVASCRIPT CRYPTOMINE­RS: A SHADY BUSINESS MODEL

The exponentia­l rise in public consumptio­n of cryptocurr­ency adoption has been reflected in a sharp, observable increase in the number of cryptomini­ng malware strains, and the number of devices infected with them.

Akamai observed two distinct business models for large- scale crypto- mining. The first model uses infected devices’ processing power to mine cryptocurr­ency tokens. The second model uses code embedded into content sites that make devices that visit the site work for the crypto miners. Akamai conducted extensive analysis on this second business model, as it poses a new security challenge for users and website owners alike. After analysing the crypto miners domains, Akamai was able to estimate the cost, in terms of both computer power and monetary gains, from this activity. An interestin­g implicatio­n of this research shows that crypto mining could become a viable alternativ­e to ad revenue to fund websites.

CHANGING THREATS: MALWARE AND EXPLOITS REPURPOSED

Cybersecur­ity is not a static industry. Researcher­s have observed hackers leveraging old techniques to reuse in today’s current digital landscape. Over the six months that Akamai collected this data, a few prominent malware campaigns and exploits show notable changes in their operating procedure, including: The Web Proxy Auto- Discovery ( WPAD) protocol was discovered in use to expose Windows systems to Man- in- the- Middle attacks between November 24 and December 14, 2017. WPAD is meant to be used on protected networks and leaves computers open to significan­t attacks when exposed to the Internet.

Malware authors are branching out to the collection of social media logins in addition to financial informatio­n. Terdot, a branch of the Zeus botnet, creates a local proxy and enables attackers to perform cyberespio­nage and promote fake news in the victim’s browser.

The Lopai botnet is an example of how botnet authors are creating more flexible tools. This mobile malware mainly targets Android devices and uses a modular approach that allows owners to create updates with new capabiliti­es.

 ?? PHOTO: PIXABAY ??
PHOTO: PIXABAY

Newspapers in English

Newspapers from India