The role of hosting providers in fighting command and control infrastructure of financial malware

Samaneh Tajalizadehkhoob, C. Hernandez Ganan, Arman Noroozian, Michel Van Eeten

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

7 Citations (Scopus)
2933 Downloads (Pure)

Abstract

A variety of botnets are used in attacks on financial services. Banks and security firms invest a lot of effort in detecting and combating malware-assisted takeover of customer accounts. A critical resource of these botnets is their command-and-control (C&C) infrastructure. Attackers rent or compromise servers to operate their C&C infrastructure. Hosting providers routinely take down C&C servers, but the effectiveness of this mitigation strategy depends on understanding how attackers select the hosting providers to host their servers. Do they prefer, for example, providers who are slow or unwilling in taking down C&Cs? In this paper, we analyze 7 years of data on the C&C servers of botnets that have engaged in attacks on financial services. Our aim is to understand whether attackers prefer certain types of providers or whether their C&Cs are randomly distributed across the whole attack surface of the hosting industry. We extract a set of structural properties of providers to capture the attack surface. We model the distribution of C&Cs across providers and show that the mere size of the provider can explain around 71% of the variance in the number of C&Cs per provider, whereas the rule of law in the country only explains around 1%. We further observe that price, time in business, popularity and ratio of vulnerable websites of providers relate signi ficantly with C&C counts. Finally, we find that the speed with which providers take down C&C domains has only a weak relation with C&C occurrence rates, adding only 1% explained variance. This suggests attackers have little to no preference for providers who allow long-lived C&C domains.

Original languageEnglish
Title of host publicationProceedings of the 2017 ACM Asia Conference on Computer and Communications Security -ASIA CCS 2017
PublisherAssociation for Computing Machinery (ACM)
Pages575-586
Number of pages12
ISBN (Electronic)9781450349444
DOIs
Publication statusPublished - 2017
Event2017 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2017 - Abu Dhabi, United Arab Emirates
Duration: 2 Apr 20176 Apr 2017

Conference

Conference2017 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2017
Country/TerritoryUnited Arab Emirates
CityAbu Dhabi
Period2/04/176/04/17

Keywords

  • Financial malware
  • Hosting providers
  • Modeling abuse

Fingerprint

Dive into the research topics of 'The role of hosting providers in fighting command and control infrastructure of financial malware'. Together they form a unique fingerprint.

Cite this