Over the last several months, RSA Research embarked on a cross-organizational effort against RIG Exploit Kit (RIG EK or just plain RIG), which led to insight into the operational infrastructure (and possibly the entire ecosystem), as well as significant discoveries related to domain shadowing. Domain shadowing is “a technique in which attackers steal domain account credentials from their owners for the purpose of creating subdomains directed at malicious servers”.
As a direct result of these efforts, tens of thousands of active shadow domain resources were removed from RIG, malvertising, and malspam operations.
Research Methodology and Acknowledgments
It is important to note that our continuing research and findings have only been made possible by the combined chi of our astute colleagues at GoDaddy and a number of community researchers. Specifically, we would like to acknowledge the work of @broadanalysis, @dynamicanalysis, @executemalware, @malwarebytes, @Zerophage1337, and especially Brad Duncan of malware-traffic-analysis.net and Palo Alto Unit 42. We would also like to give a special thanks to Rintaro Koike (@nao_sec, http://nao-sec.org/), whose ongoing collaboration has also been critical for this research.
RIG EXPLOIT KIT
Figure 1. RIG delivery overview
As shown by the graphic below, RIG remains an active and payload-diversified exploit kit on the market today.
Figure 2. RIG exploit kit activity as of May 17, 2017 (Credit @executemalware)
Figure 3. Mar 6, 2017 injected iframe
Figure 4. Mar 20, 2017 injected iframe
Figure 5. Apr 10, 2017 injected iframe
Figure 6. May 15, 2017 injected iframe
Figure 7. RIG URL parameters as of May 12, 2017
When evaluating a slice of compromised sites (derived from crawlers) referring traffic to RIG landing pages the registrars appear to be a somewhat typical cross-section of domain registrars (Figure 8).
Figure 8. Compromised sites with distributed registrants
GATES and TRAFFIC DISTRIBUTION SYSTEMs (TDS)
However, this began to change during the end of March, and into April and May, as several new campaigns appeared. While the GoodMan and Seamless campaigns use traditional gates, such as hurtmehard[.]net in the case of GoodMan the Decimal-IP campaign redirects traffic using integer-expressed IP addresses to reach RIG landing pages. This is likely to avoid traditional indicator of compromise (IOC) based detection measures, which is also why current threat actors have adopted such a technique (Figure 9).
Figure 9. Decimal IP redirects to RIG
Figure 10. Network traffic to RIG landing pages
Figure 11 is a partially de-obfuscated landing page as observed in the wild on May 16th, 2017.
Figure 11. May 16, 2017 RIG landing page
The primary purpose of RIG landing pages is to intelligently exploit incoming client machines victimizing them with a diverse set of payloads pushed by a number of different campaigns.
Figure 12. RIG-related Flash exploit scan results
In addition to the noted Flash exploits, RIG landing pages were also seen to deliver payloads targeting Internet Explorer (IE) with exploits against CVE-2016-0189, CVE-2015-2419, and CVE-2014-6332 (Figure 13).
Figure 13. CVE by user agent; https://github.com/nao-sec/RigEK
While the primary focus of this discussion is not the reverse engineering of RIG landing pages or related exploits, it is important to mention that several strong technical walk-throughs exist within current security research. Specifically, we recommend examples from RSA Research and nao_sec.
Figure 14. Your friendly Cerber welcome screen
EITEST was the second most active campaign noted in our early research. It is still active and delivering a wide variety of malicious payloads (e.g., the Dreambot banking trojan), but often falls back to the reliable income of ransomware. Specifically noted were payloads of Cerber, CryptoShield, Sage, and Spora in February and March. A technical walk-through of the CryptoShield payload is found in Appendix B.
Figure 15. CryptoShield welcome screen
The Decimal-IP campaign, one of two recently active campaigns leveraging RIG, has recently been observed delivering smokeloader (sample). Among the several researchers actively following this activity, zerophage has several technical walk-throughs with a sample of network traffic in Figure 16.
Figure 16. Decimal IP redirect delivers Smokeloader
Seamless, the final campaign addressed in this research, has recently been observed delivering Latentbot and Ramnit ransomware. Relevant technical documentation on this campaign exists from both Cisco and Brad Duncan, who annotated Figure 17.
FOOTPRINTING A SHADOW INFRASTRUCTURE
Figure 18. Sample of RIG operational infrastructure as observed from 27 Feb, 2017
During analysis we noted three interesting aspects of this infrastructure. First, there was a high degree of target IP subnet re-use in RIG activity observed from the end of February through March and into early April.
Figure 19. RIG backend hosting ASNs
In past research, we discussed the significance and availability of bulletproof hosting for crimeware actors. RSA Research observed RIG-related Autonomous System Numbers (ASNs) fall primarily within a core group of ‘commercially obfuscated’ bulletproof hosting providers (e.g. TimeWeb). Specifically, these ASNs have enough legitimate mixed-used traffic (making them unlikely to be blacklisted) to provide obfuscated operational relay for crimeware actors. A cursory OSINT search turns up numerous indicators supporting this assertion:
Almost predictably, attempts to crawl domains hosted within RIG-related netblocks (Figure 19) did not turn up a single instance of an injected iframe (with substring matches based on Figure 7 patterns) referring traffic to RIG landing pages. This may indicate sites compromised for this purpose may specifically be targeted for their proximity and draw of Western traffic, especially given what we know about some payloads’ country and language whitelisting.
Secondly, we noted heavy SSL certificate re-use, which we initially believed might be RIG related; however, further investigation demonstrated certificate proliferation across a large number of ASN-localized domains (e.g., see Figure 20). Based on these findings, we assess that these SSL certs are not RIG related and likely employed generically by the hosting provider(s).
Serial Issuer Organization Shodan Listing
620617 GeoTrust Inc. https://www.shodan.io/search?query=ssl.cert.serial%3A620617
983750 GeoTrust, Inc. n/a
66288 GeoTrust Inc. https://www.shodan.io/search?query=ssl.cert.serial%3A66288
Figure 20. Shodan certificate details; shodan.io
Examination of Whois registration details for RIG landing page domains revealed GoDaddy as the primary registrar. Figure 21 is a Maltego screenshot breaking down Registrars for 395 unique subdomains verified to be serving RIG landing pages between Feb 21 and Apr 10, 2017.
Figure 21. RIG landing pages with common registrar
Based on these findings, we isolated all individual registrant emails owning these subdomains (initially blocking out the generic registrants, e.g., abuse@). Taking these registrant emails in batches we proceeded to identify all related domains and subdomains – successfully identifying thousands of shadow domains hosted by a major provider. Figure 22 is a Maltego screenshot of more than 2200 subdomains registered to 18 GoDaddy registrants, each of which were actively abused during RIG operations from Mar 25 to Apr 5, 2017. These are believed to be compromised accounts.
Figure 22. Compromised accounts being used for shadow domains
Subdomains owned by these compromised accounts appear to be shadowing legitimate GoDaddy domains and are hosting current RIG landing pages in the foreign net blocks previously referenced (Figure 19). DNS A records provide further evidence of this observation as seen in Figures 23 and 24 (courtesy of centralops.net)
Figure 23. Sample DNS records for a shadow domain
Figure 24. March 28, 2017 – DNS A record for a shadow domain
The actors behind RIG routinely clean up and delete the subdomain and DNS A records before new shadows are created. Preliminary analysis of shadow domain DNS A records indicates a lifespan of 5-10 days before deletion. That being said, we also believe the actual availability of these shadow domains based on backend hosting (i.e., ASNs in Figure 19) is likely closer to 24-48hrs. Evidence to this fact is the creation and subsequent removal of this shadow domain from DNS records on March 30, 2017 (Figure 25).
Figure 25. March 30, 2017 – Cleaned up DNS records for shadow domain
This activity has continued into April and May, as shown in Figure 26 below.
Figure 26. May 16, 2017 RIG shadow domain seen via DNS A records
COLLABORATION WITH GODADDY
Historical domain shadowing activity was analyzed over a 60-day window using various identified patterns of behavior. During this period, RIG shadow activity was observed to be using one primary pattern for subdomain generation consisting of words selected at random from a fixed wordlist (e.g., ‘red’, ‘admin’, ‘info’, ‘save’, and ‘new’).
RSA Research also verified these shadow domains as RIG-related by correlating both the destination IPs in GoDaddy DNS data (i.e. where the DNS A records were pointing for shadow domains) with RSA-observed RIG backend netblocks (Figure 19), as well as sandboxing active shadow domains. Figures 27 and 28, observed in early May, illustrate shadow domains in use as RIG Landing Pages. These results consistently accepted current RIG URL patterns and dropped known .swf exploits (e.g., md5: dc7d6b8b623fdf82a8ba48195bd1bdbf).
Figure 27. Sandboxing a shadow domain serving as RIG landing page.
Figure 28. Sandboxing another shadow domain serving as RIG landing page
Additionally, domain-shadowing activities following several alternative patterns were identified during the course of this investigation. In totality, shadowing activity was seen to affect hundreds of customers, with each having on average 150 shadow registrations injected into their DNS records. Daily DNS modifications were measured to be about 450 new shadow subdomains per day. The source initiating a vast majority of these record changes are browser invocations by an unknown client or multiple clients on the TOR network.
The most prominent domain-shadowing pattern was identified to be using a random 3-5 letter subdomain name consisting of alphanumeric characters. Example subdomains observed in this set are ‘m47xh’, ‘mv6’, ‘eeiv’, ‘l4pj2’, ‘eiq0s’, and ‘bthi’. This set is most numerous and consists of over 95% of current shadow registrations. This shadowing activity was observed in over 30,000 subdomains total affecting over 800 domains. The active subdomains were constantly fluctuating with entries continually being added and removed in an automated fashion with an average of 900 record modifications per day.
Figure 29. Active shadows during period of observation
Preliminary OSINT analysis of this activity indicates that this pattern may be related to ongoing malspam and malvertising activity, leading to a broad spectrum of crimeware deliveries. Examples of these activities are shown below in Figures 30 and 31.
Figure 30. Spam from other shadow domains?
Figure 31. Google dorking other shadow domains
Collectively, the shadow records identified pointed to approximately 240 unique IP addresses over 20 different class C subnets. Unfortunately, additional analysis of destinations was not possible, as the associated hosting providers were not engaged in the course of our investigation. Identification of this behavior has led to it being shutdown at scale as described below in the “Remediation” section.
AN ECOSYSTEM FUELED BY COMPROMISED CREDENTIALS
The Internet, rife with info-stealers for years, has a number of viable campaigns that may need to be evaluated for attribution. An effort to cross-correlate these compromised credentials against the last several years’ “known infostealer” dumps had negative results, indicating that those campaigns were not likely culprits. Many other options do exist though.
In terms of the shadow domains themselves, it is believed that the threat actors waging these campaigns rely upon sophisticated phishing operations to acquire legitimate customer credentials (e.g., Figure 32). GoDaddy’s 17 million customers and 71 million domain names makes them a natural target for wide-scale and sophisticated phishing attacks. GoDaddy continues to advocate for Two Factor Authentication (TFA) and actively work with hosting providers serving these phishing pages to take down sites hosting this malicious content.
Figure 32. A previous GoDaddy targeted spear-phishing campaign
In terms of the compromised sites (sites referring traffic via injected iframes to GoDaddy shadow domains), the cross section of affected domain registrars implies a more opportunistic approach. While it remains unclear what methods may have been employed as a means for harvesting these credentials, community research exists on the usage of IoT botnets to brute force WordPress sites.
If these observations and speculations are valid, perhaps we need to consider the RIG operations model as more of an ecosystem as suggested by Figure 33.
Figure 33. Speculated RIG ecosystem
The focus moving forward is to continue developing processes for at-scale detection and removal of malicious DNS records, as well as to integrate preventative measures into the domain modification data flow. As these efforts mature in their ability to prevent and disrupt shadowing, the direction will shift away from reliance of submitted indicators for ad-hoc remediation. Instead, they will depend on the analysis of internal datasets to identify and remove malicious records in an automated fashion.
Success in these areas will minimize Time to Detection and Time to Remediation while significantly reducing the shadow domains’ lifespan. Architectural mitigations are also being evaluated for integration into accounts at high risk for domain shadowing. This path of action will keep GoDaddy accounts more secure and reduce the effectiveness of domain shadowing as a technique for malware distribution.
IMPACT and CONCLUSION
Figure 34. RIG backend not available for Decimal IP Campaign
Determining the impact of such a takedown on the inextricable pile of ongoing ransomware, malvertising, and malspam campaigns is significantly more challenging. What we do know is that on May 16, 2017, tens of thousands of active shadow domain resources were removed from an active crimeware actor’s operational capabilities.
This report concludes this phase of our research and related findings; however, we anticipate further joint research on the role that domain shadowing operations play in the larger crimeware ecosystem.
PseudoDarkleech Campaign: Cerber ransomware
EITEST Campaign: Cryptoshield ransomware
|Update your feed preferences|