Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

3/4/2014
09:30 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Researchers Create Legal Botnet Abusing Free Cloud Service Offers

Hack depends on scripts creating scores of unique email addresses and automating execution of email verification

Last week at the RSA Conference, a pair of researchers demonstrated how it was possible to legally create a botnet for free by abusing trial accounts made available by high-powered platform-as-a-service (PaaS) and infrastructure-as-a-service (IaaS) offerings.

RSA Conference 2014
Click here for more articles about the RSA Conference.

"We were curious if we could build a botnet out of freely available cloud services," said Rob Ragan, senior security associate for Bishop Fox, who has been experimenting on that premise for the past several years with his colleague Oscar Salazar, security associate at Bishop Fox. "We started getting all these emails and alerts of, 'Here's a free Amazon EC2 box, there's free storage space, here's a free platform to develop and host your code.' We thought, 'Wow! That is a lot of computing power for free.'"

The question they asked themselves was how hard would it be to automate the process of signing up for an unlimited number of free accounts from these sites and then developing a central control system from which an attacker could potentially launch malicious activities. The answer: not hard at all.

"We were really easily able to get hundreds of boxes on certain providers and have a central way to launch things like massive port scans," Ragan says. "We also did a proof-of-concept on cryptocurrency or Bitcoin mining. If you're getting this free computing power and don't have the power bill from it, why not use that to generate mining? That would be a huge motivation for malicious threat actors using these platforms." The project was made possible through the development of a process to automate the creation of unique email accounts on free email services, and then special scripting to automate the process of clicking on email verification links sent to those accounts.

The researchers initially refined that process during a penetration test of a sweepstakes website in which they showed an attacker could game the drawing and up the chances of winning through exactly such a method.

The process of developing the botnet came with the usual kinks. For example, the researchers told an amusing story about scrambling in the middle of the night to code a "stop" mechanism to their automated system once they turned it on and saw it worked.

"We had basically just coded the start button, and then we thought, 'Uh, oh! How do we stop it?'" Salazar said. "We had to quickly figure out how to stop our botnet from getting away from us."

Much of the abuse the pair tested was made possible due to poor verification of users during the trial account creation process. Even when some services tried to limit accounts by limiting Internet access, the researchers were easily able to employ quick workarounds. Of the 150 different PaaS and IaaS sites the duo tested, two-thirds were not doing any CAPTCHAs, SMS verification, or credit card verification beyond simple email account verification.

According to Ragan, while these extra steps can also be worked around, cloud services still need to embrace them in order to make it more expensive for potential attackers to do exactly what they did. Not only is it a huge vulnerability for these service providers, but it is opening them up to huge bills from Amazon because, in many instances, these services are launching free Amazon EC2 boxes on behalf of trial accounts. That is computing power they service providers will have to pay for in these abuse cases.

This is likely how attackers will try to work the system given that Amazon has implemented strict authentication controls to prevent exactly such kinds of abuse. "You could just register accounts. It didn't require SMS, it didn't require credit cards -- you just needed a valid email address, and then you'd have access to free Amazon EC2 boxes," Salazar said. "Over the last couple of years, Amazon has really increased its security, and now it requires a credit card and SMS and email verification. So Amazon is putting a bunch of protection around its services, and now these other companies starting up are basically leasing EC2 boxes, but they're not putting the same protections in place. So you're basically getting free Amazon boxes through them on their dime."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0565
PUBLISHED: 2020-02-25
NaCl in 2015 allowed the CLFLUSH instruction, making rowhammer attacks possible.
CVE-2020-9393
PUBLISHED: 2020-02-25
An issue was discovered in the pricing-table-by-supsystic plugin before 1.8.2 for WordPress. It allows XSS.
CVE-2020-9394
PUBLISHED: 2020-02-25
An issue was discovered in the pricing-table-by-supsystic plugin before 1.8.2 for WordPress. It allows CSRF.
CVE-2019-3999
PUBLISHED: 2020-02-25
Improper neutralization of special elements used in an OS command in Druva inSync Windows Client 6.5.0 allows a local, unauthenticated attacker to execute arbitrary operating system commands with SYSTEM privileges.
CVE-2020-8809
PUBLISHED: 2020-02-25
Gurux GXDLMS Director prior to 8.5.1905.1301 downloads updates to add-ins and OBIS code over an unencrypted HTTP connection. A man-in-the-middle attacker can prompt the user to download updates by modifying the contents of gurux.fi/obis/files.xml and gurux.fi/updates/updates.xml. Then, the attacker ...