WordyThief: A Malicious Spammer

Renée Burton, V. Tymchenko, Nicholas Sundvall, Minh Hoang, J. Mozley, M. Josten
{"title":"WordyThief: A Malicious Spammer","authors":"Renée Burton, V. Tymchenko, Nicholas Sundvall, Minh Hoang, J. Mozley, M. Josten","doi":"10.1109/eCrime51433.2020.9493261","DOIUrl":null,"url":null,"abstract":"We detail the tradecraft used to discover and exploit a prolific Russian-affiliated malicious spam actor. To the best of our knowledge, this paper is the first description of the actor, whom we call WordyThief, and the first publication demonstrating the application of graph techniques to the identification of malicious spam campaigns. This work contributes to the threat intelligence community both as a technique that can be utilized in daily practice, and as a thorough account of WordyThief, who continues to spread malware in October 2020. We initially discovered isolated malware campaigns using large-scale bipartite graphs created from email metadata. These graphs and related campaign specifics revealed the use of domain names within the spammer’s infrastructure devised through dictionary domain generation algorithms (DDGAs). Using a second graph-based technique and time series analysis, we recovered the underlying dictionaries and temporal behavior of the actor. A retrospective review of spam collection and correlation with other Domain Name System (DNS) information led us to conclude that the campaigns were all the work of a single actor. We tracked their activity and substantiated our methods retrospectively, through December 2019. We also leveraged open source intelligence (OSINT) to verify our findings. We found that WordyThief operates a large spam infrastructure and distributes malware that steals personal and financial information from victims. This paper includes not only the scientific methods used to detect the actor, but also detailed descriptions and analyses of several elements of their tactics, techniques, and procedures (TTP). We include an analysis of the actor’s tendency to use of aged domains, a text analysis of their emails, use of embedded IP tracking in their campaigns, harvesting of open source images, and an exposition of their evolving exploitation techniques.","PeriodicalId":103272,"journal":{"name":"2020 APWG Symposium on Electronic Crime Research (eCrime)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 APWG Symposium on Electronic Crime Research (eCrime)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/eCrime51433.2020.9493261","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

We detail the tradecraft used to discover and exploit a prolific Russian-affiliated malicious spam actor. To the best of our knowledge, this paper is the first description of the actor, whom we call WordyThief, and the first publication demonstrating the application of graph techniques to the identification of malicious spam campaigns. This work contributes to the threat intelligence community both as a technique that can be utilized in daily practice, and as a thorough account of WordyThief, who continues to spread malware in October 2020. We initially discovered isolated malware campaigns using large-scale bipartite graphs created from email metadata. These graphs and related campaign specifics revealed the use of domain names within the spammer’s infrastructure devised through dictionary domain generation algorithms (DDGAs). Using a second graph-based technique and time series analysis, we recovered the underlying dictionaries and temporal behavior of the actor. A retrospective review of spam collection and correlation with other Domain Name System (DNS) information led us to conclude that the campaigns were all the work of a single actor. We tracked their activity and substantiated our methods retrospectively, through December 2019. We also leveraged open source intelligence (OSINT) to verify our findings. We found that WordyThief operates a large spam infrastructure and distributes malware that steals personal and financial information from victims. This paper includes not only the scientific methods used to detect the actor, but also detailed descriptions and analyses of several elements of their tactics, techniques, and procedures (TTP). We include an analysis of the actor’s tendency to use of aged domains, a text analysis of their emails, use of embedded IP tracking in their campaigns, harvesting of open source images, and an exposition of their evolving exploitation techniques.
WordyThief:恶意垃圾邮件发送者
我们详细介绍了用于发现和利用一个多产的俄罗斯附属恶意垃圾邮件演员的间谍技术。据我们所知,这篇论文是第一篇描述这个被我们称为WordyThief的攻击者的文章,也是第一篇展示将图形技术应用于识别恶意垃圾邮件活动的文章。这项工作为威胁情报界做出了贡献,既是一种可以在日常实践中使用的技术,也是对2020年10月继续传播恶意软件的WordyThief的全面描述。我们最初发现孤立的恶意软件活动使用从电子邮件元数据创建的大规模二部图。这些图表和相关的活动细节揭示了垃圾邮件发送者通过字典域生成算法(ddga)设计的基础设施中域名的使用情况。使用第二种基于图的技术和时间序列分析,我们恢复了参与者的底层字典和时间行为。对垃圾邮件收集和与其他域名系统(DNS)信息的相关性的回顾性审查使我们得出结论,这些活动都是单个参与者的工作。我们追踪了他们的活动,并回顾性地证实了我们的方法,直到2019年12月。我们还利用开源情报(OSINT)来验证我们的发现。我们发现,WordyThief运营着一个庞大的垃圾邮件基础设施,并分发恶意软件,窃取受害者的个人和财务信息。本文不仅包括用于检测行为人的科学方法,而且还详细描述和分析了他们的战术,技术和程序(TTP)的几个要素。我们分析了攻击者使用老域名的倾向,对他们的电子邮件进行文本分析,在他们的活动中使用嵌入式IP跟踪,收集开源图像,并阐述了他们不断发展的利用技术。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信