Detect Cryptojacking with QRadar
According to various sources such as the Financial Times, Dark Reading, Business Insider and X-Force Threat Intelligence, cryptojacking has had a huge increase in the first 6 months of 2018, a reported increase of 629% compared with the previous 2017 quarter.
There is evidence to suggest Cryptojackers are moving away from the traditional way of doing this – installing cryptomining as a hidden background process, and instead trying to compromise popular sites with cryptomining malware – thus generating huge amounts of hash power.
“Cryptojacking involves hijacking the processing power of unsuspecting internet browsers in order to create — or “mine” — cryptocurrencies, typically an energy-intensive process.”
With QRadar, we can easily detect these types of activities through a downloadable content extension and threat intelligence feeds from XForce Exchange, thus improving existing rules within a customer’s deployment (referencing Cryptomining IP’s / domains).
At the 60th Jubilee of IBM Hursley we demo’ed “Spot and Stop Cryptojackers” at the annual Festival of Innovation. It was an opportunity to showcase the power of QRadar, but also see the breadth of IBM’s technology. The vast array of technology intrigued me, particularly use cases for areas such as Artificial Intelligence, Machine Learning, Data Analytics, IoT, Cloud and Security.
In our demo, we explore how IBM’s QRadar can spot and stop cryptojacking in cloud computing offerings such as Amazon Web Services (AWS). QRadar is industry-leading Security Information Event and Management (SIEM) software, which provide log and flow aggregation, vulnerability and risk assessment, with out of the box “rules” for detecting behavioural and threshold related anomalies.
Above, is the workflow of how an attack might play-out. Let’s take a classic phishing email for example;
(1) Attacker phishes user with convincing email with the purpose of obtaining AWS credentials.
(3) Attacker creates cloud based mining rig, spawning hundreds of EC2’s to execute mining scripts, or load browsers which are accessing a compromised site.
(4) Cryptomining hashes sent to an intermediary such as CoinHive who validate the transactions and transfers into an anonymous wallet.
(5) Attacker moves funds into anonymous wallet and withdraws to fiat currency via exchange.
Let’s look at how QRadar can detect this type of activity at each stage.
Stage 1–2 – QRadar has in-built rules which can detect of logins from non-business geographies or multiple logins attempts using the same credential set. In this case, we have at least 2 successful logins using the Console Login (AWS’s main account) from the UK & Russia.
Stage 2–3 – Credentials compromised by an attacker, subsequent EC2 instances are then spawned in AWS. QRadar can detect the creation of the EC2 instances, and also extract other useful infomation such as the operating system or network interface. These are easily customisable within the QRadar platform, allowing users to customise their log and reporting capabilities.
For example, if an EC2 instance is using an operating system “outside of the norm”, it could be a case for flagging this for further investigation. Something such as Kali Linux, an OS typically used for Pen-testing/Network forensics — could be cause for concern.
Stage 3–4 – EC2 instances loading infected cryptomining site and sending computed hashes to Attacker’s anonymous Wallet via intermediary such as Coinhive.
We can detect and anaylse these through integrations with QRadar Advisor with Watson (Fig 1.3), as well as User Behavioural Analytics (Fig 1.4).
QRadar Advisor with Watson offers Security Operations Analysts deeper insights into an offense through correlation of net flow data, log data, vulnerability data and threat intelligence feeds using STIX and TAXII. This significantly reduces the overall time to investigation and allows for better mitigation activities to follow; such as updating firewall rules, IPS or scheduling patches for the affected assets. Mitigation in this instance would be to ensure endpoints are using the latest browsers which either provide extensions to detect cryptojacking, or prompt the user prior to rending the website.
User Behavioural Analytics (UBA) is a fanastic integration with QRadar — primarily for analyzing user activity to detect malicious insiders or to determine if a user’s credentials have been compromised. This lends itself perfectly when detecting malicious activity using cloud credentials.
UBA integration with QRadar allows easy detection of potentially compromised accounts, taking into account activity seen. In this case, we’ve seen multiple access from 2 different geographies — followed by an EC2 instance using an unsupported OS — such as Kali Linux, then followed by creation of EC2 instances in quick succession.
UBA supplements the offense triggered by these events, showing the timeline of events and users involved — user allowing SOC analysts to quickly assess, stop or mitigate the impact.
Cryptomining Collections https://exchange.xforce.ibmcloud.com/search/cryptomining