STE WILLIAMS

Researchers Create Legal Botnet Abusing Free Cloud Service Offers

Mar
04

Last week at the RSA Conference, a pair of researchers demonstrated how it was possible to legally create a botnet for free by abusing trial accounts made available by high-powered platform-as-a-service (PaaS) and infrastructure-as-a-service (IaaS) offerings today.

“We were curious if we could build a botnet out of freely available cloud services,” says Rob Ragan, senior security associate for Bishop Fox, who has been experimenting on that premise for the last several years with his colleague Oscar Salazar, security associate for Bishop Fox. “We started getting all these emails and alerts of ‘Here’s a free Amazon EC2 box, there’s free storage space, here’s a free platform to develop and host your code.’ We thought, ‘Wow! That is a lot of computing power for free.'”

The question they asked themselves was how hard would it be to automate the process of signing up for an unlimited number of free accounts from these sites and then develop a central control system from which an attacker could potentially launch malicious activities. The answer: it wouldn’t be hard at all.

RSA Conference 2014Click here for more articles about the RSA Conference.

“We were really easily able to get hundreds of boxes on certain providers and have a central way to to launch things like massive port scans from,” Ragan says. “We also did a proof-of-concept on cryptocurrency or Bitcoin mining. Because if you’re getting this free computing power and don’t have the power bill from it, why not use that to generate mining. That would be a huge motivation for malicious threat actors using these platforms.”

The project was made possible through the development of a process to automate the creation of unique email accounts on free email services and then special scripting to automate the process of clicking on email verification links sent to those accounts.

The researchers initially refined that process during a penetration test of a sweepstakes website in which they showed an attacker could game the drawing and up the chances of winning through exactly such a method.

The process of developing the botnet came with the usual kinks that this kind of research typically brings to the surface. For example, they told an amusing story about scrambling in the middle of the night to code a “stop” mechanism to their automated system once they turned it on and figured out it worked.

“We had basically just coded the start button and then we thought ‘Uh oh! How do we stop it?'” Salazar said. “We had to quickly figure out how to stop our botnet from getting away from us.”

Much of the abuse the pair tested was made possible due to poor verification of users during the trial account creation process. Even when some services tried to limit accounts by limiting Internet access to those accounts, the researchers were easily able to break the accounts from those bonds through quick workarounds. Of the 150 different PaaS and IaaS sites the duo tested, two-thirds of them were not doing any CAPTCHAs, SMS verification, or credit card verification beyond simple email account verification.

According to Ragan, while these extra steps can also be worked around, cloud services need to embrace them in order to make it more expensive for potential attackers to do exactly what they did. Not only is this a huge vulnerability for these service providers, but it is opening them up to huge bills from Amazon as in many instances these services are launching free Amazon EC2 boxes on behalf of trial accounts, which is computing power they’ll have to pay the tab for in these abuse cases.

This is likely how attackers will try to work the system, as these days Amazon has implemented strict authentication controls to prevent exactly such kinds of abuse.

“You could just register accounts, it didn’t require SMS, it didn’t’ require credit cards, you just needed a valid email address and then you’d have access to free Amazon EC2 boxes,” Salazar says. “Over the last couple of years, Amazon has really increased its security and now it requires a credit card and SMS and email verification. So Amazon is putting a bunch of protection around its services and now these other companies starting up are basically leasing EC2 boxes but they’re not putting the same protections in place. So you’re basically getting free Amazon boxes through them on their dime.”

Have a comment on this story? Please click “Add Your Comment” below. If you’d like to contact Dark Reading’s editors directly, send us a message.

Article source: http://www.darkreading.com/researchers-create-legal-botnet-abusing/240166428

Comments

Comments are closed.