Domain Name System (DNS) is the backbone of the Internet. However, threat actors have abused the antiquated protocol to facilitate command-and-control (C2) actions, to tunnel, or to exfiltrate sensitive information in novel ways. The FireEye breach and Solarwinds intrusions of late 2020 demonstrated the sophistication of hacker groups. Researchers were eager to reverse-engineer the malware and eager to decode the encrypted traffic. Noticeably, organizations were keen on being first to "solve the puzzle". Dr. Eric Cole of SANS Institute routinely expressed "prevention is ideal, but detection is a must". Detection analytics may not always provide the underlying context in encrypted traffic, but will at least give a fighting chance for defenders to detect the anomaly. SUNBURST is an open-source moniker for the backdoor that affected Solarwinds Orion. While analyzing the malware with security vendor research, there is a possible single-point-of-failure in the C2 phase of the Cyber Kill Chain provides an avenue for defenders to exploit and detect the activity itself. One small chance is better than none. The assumption is that encryption increases entropy in strings. SUNBURST relied on encryption to exfiltrate data through DNS queries of which the adversary prepended to registered Fully-Qualified Domain Names (FQDNs). These FQDNs were typo-squatted to mimic Amazon Web Services (AWS) domains. SUNBURST detection is possible through a simple 1-variable t-test across all DNS logs for a given day. The detection code is located on GitHub (https://github.com/MalwareMorghulis/SUNBURST).
翻译:域名系统(DNS)是网络的基础。但是,威胁行为者滥用了这种陈旧的协议,以新颖的方式促进命令和控制(C2)操作、隧道或从机密信息中泄露信息。2020 年末的 FireEye 泄露事件和 Solarwinds 入侵示范了黑客团体的复杂性。研究人员渴望反向工程恶意软件,并渴望解码加密流量。值得注意的是,组织很渴望第一个“解决难题”。SANS 研究所的 Eric Cole 博士经常表达“预防是理想的,但检测是必须的”。检测分析可能不总能提供加密流量的潜在上下文,但至少会为防御者提供检测异常的机会。SUNBURST 是 Solarwinds Orion 受影响的后门的一种开源名称。在与安全供应商的研究中分析恶意软件时,发现在网络杀伤链(Cyber Kill Chain)的 C2 阶段存在可能的单一故障点,为防御者提供了利用和检测活动本身的途径。一次小的机会总比没有好。假设加密会增加字符串的熵。SUNBURST 依赖于加密来通过 DNS 查询将数据泄露到已注册的完全限定域名(FQDN)中,这些 FQDN 是 typo-squatted,以模仿 Amazon Web Services (AWS) 域。可以通过对给定日期的所有 DNS 日志进行简单的 1 变量 t 检验来检测 SUNBURST。检测代码位于 GitHub(https://github.com/MalwareMorghulis/SUNBURST)上。