Aposemat Project

 

Update april 2019

 

MALWARE EXEC. RESEARCH & DETECTION IN NET

1,3 years update

Team

Maria Jose Erquiaga

Simona Musilova

Yury Kasimov

Anna Shirokova

Sebastian Garcia

Thomas O'hara

ongoing research lines

  • simona

    • telnet profiler & attack detector

    • analysis of attacks on devices

    • analysis of camera edimax firmware/traffic

  • yury

    • separate webbots/humans.

  • Anna

    • ssh encrypted login detection

    • mqtt from our honeypots to avast

    • geost botnet analysis

    • RESEARCH ON THE UNDERGROUND OF IOT BLACKMARKEt

  • MARIA

    • IOT MALWARE INFECTION

    • IOT MALWARE ANALYSIS

    • GEOST BOTNET ANALYSIS​

  • THOMAS

    • honeypots admin

    • SMTP ATTACKS ANALYSIS

    • RESEARCH ON THE UNDERGROUND OF IOT BLACKMARKET

  • all

    • network class ​

iot underground. new

  • use our external iot honeypots

  • use real telnet/ssh servers so attacks are real

  • profile attackers

  • go to underground forums

  • analyze the blackmarket of iot

    • how is attacking/selling/buying

    • structure of business

  • 7 IOT rpi DEVICES, ~11 iot devices honeypots

    • 65 MALWARE FAMILIES executed

    • ~820 PCAP CAPTURES

  • 11 IoT Honeypots (3 CAMERAS/ALEXA/PHILIPS HUE /Router /odroid/synology nas/mips router/avast router)

    • ~450 captures

so far ~550 GB IN 15 MONTHS

Summary

  • EXTERNAL HONEYPOTS (CTU/AMAZON/ETC.)