Loading…
eCrime 2018 has ended
View analytic
Tuesday, May 15 • 09:45 - 10:15
Unblockable Chains - Is Blockchain the ultimate malicious infrastructure?

Sign up or log in to save this to your schedule and see who's attending!

In this principal research, we investigate the possibilities blockchain technologies pose as an infrastructure for malicious operations. We will demonstrate a POC of a fully functional C&C infrastructure on top of the Ethereum network - the second largest public blockchain which also acts as a distributed computing platform featuring a smart contract functionality.
As Blockchain technologies gain more traction in recent years, it brings promise of creating a decentralized, distributed and transparent economy which aim to disrupt our current centric organizational structures and reduce middlemen.Notoriously, crypto coins have been the currency of choice on the dark web for conducting illegal transactions. But what about the underlying technology, the Blockchain? Could a distributed, public, popular, global ledger be [ab]used as the infrastructure for the ultimate command and control mechanism? 
Managing a botnet is a problem in distributed computing. Once infected, a host must be able to discover, reach and maintain communication with its operator over long periods. Over the years much effort has been made to perfect these capabilities to avoiding detection, maintain anonymity and resist take downs. From plain old HTTP requests, through DIY TCP protocols and encryption, up to fancy P2P networks, DGAs, Fast Flux and cloud service use. While all these techniques have varying degree of resilience and covertness, all are vulnerable to take down once network topology has been determined. Can blockchain turn this around?
In this talk, which will include many code examples and a live demo, we will discuss:
  • How can the blockchain solves the 'first contact' problem?
  • How to cope with the fact that all data, code and transactions are publicly visible on the blockchain?
  • What is the footprint of running a blockchain node on the client and how to minimize resources?
  • Cost analysis: Is it feasible financially to run a botnet at scale on top of a blockchain?
  • Is it takedown resilient? Can an adversary interrupt or take over the network? Or cause its resources (ether) to deplete? What are the design pitfalls to mitigate such concerns?
  • What information will be revealed to someone tracking the bot? how do you deal with it?
  • Does it scale? 

Finally, we will try to offer possible mitigations and detection methods.
*All code in this project is be available as Open source.

Talk outline - Unblockable Chains
  • WhoAmI?
  • Intro to Malicious operation infrastructure
  • HowTo - The Ultimate infrastructure
  • Blockchain. What is it and what is it good for?
  • Intro to Ethereum - Platform for unstoppable applications
  • Connecting the dots - how malware infrastructure would look like on the blockchain?
  • Signing the contract - Define protocol between implants and controller
  • Writing an unstoppable CnC smart contract. attempt #1 - Let's get dirty!
  • Transactions, Calls and Event logs
  • Attempt #2 - Getting better
  • How much?! Cost of storage and transactions on the EVM
  • Attempt #3 - it's cheaper now!
  • Transparency on the blockchain. Can everyone see my stuff?!
  • Preventing data leakage and replay attacks
  • Final attempt - going dark
  • Demo!
  • Dealing with takedowns and takeovers attempts
  • Cost analysis
  • Scaling - Feasible or just a nice POC?
  • Mitigation, Possible?
  • Conclusions and Future work
  • Reveal git repo
  • Questions?

Speakers
avatar for Omer Zohar

Omer Zohar

Independent
A security researcher for over a decade, Omer is currently exploring the opportunities emerging technologies such as blockchain and AI might create for the bad guys to improve their infrastructure and how to mitigate them. Omer has been conducting multidisciplinary research on malware... Read More →


Tuesday May 15, 2018 09:45 - 10:15
La Jolla Ballroom - Salon ABCD 2nd Floor