New IP Address Blacklist Based On Web Chatter 31
itwbennett writes: A new approach to assembling blacklists analyzes chatter on the dark and open Web and can find malicious IP addresses that would have been missed using honeypots and intrusion detection systems, according to a report by security startup Recorded Future. On traditional blacklists, 99 percent of the addresses are for inbound activity, 'when someone is attacking your system from an external address,' said Staffan Truvé, chief scientist and co-founder at Recorded Future. On Recorded Future's new list, half of the addresses are for outbound activity, 'when an intruder is already in your systems, and is trying to connect to the outside world to exfiltrate data,' said Truvé. For example, Recorded Future identified 476 IP addresses associated with both the Dyreza and the Upatre malware families — only 41 of which were known to existing blacklists.
Does this mean victims are being blacklisted? (Score:2)
Seems like IPs sending out their sensitive data to attackers would normally be termed "victims"?
Re: (Score:3)
Oatensibly, this would blacklist bots...
Then again, if someone popped onto a random IRC server in the undernet, and started chatting about every IP address for windowsupdate.com...
I am also curious as to how they handle DHCP, and if there's a timeout for the IPs listed?
Re: (Score:2)
But, with the new features built into Windows10, Windows updates can come from anywhere!
What could possibly go wrong with that??
Re: (Score:3)
Re: (Score:2)
Re: (Score:1)
You are assuming they are analyzing traffic reports. They aren't. they are scraping chat logs, twitter, pastebins and other resources to gather domains/ips with more than 1 mention of malware, it's right in the article.
None of what they are talking about in this article relates to traffic monitoring, at all, by any stretch. It has nothing to do with coding your malware to connect to random IPs or domains. It's literally them sending a bot into rooms and recording the chats. And depending on which IRC n
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Days, weeks, months to chat, find, forum reading, ability to test the very latest and more expensive tools.
The hope is the same type of ip networks will be used for the final testing and chat as for the "project"
That can be detected.
The feel of anonymity and having privacy can be strong once a small group of skilled people are ready for their
Re: (Score:2)
Re: (Score:2)
Not much of the US private sector is really "free" anymore not to help make lists or have gov networks installed to track traffic in real time.
Cyber Information Sharing Act is just the start with its FOIA issues and domestic access beyond NSL (national security letter) or FISC (FISA Court) access.
Over time the entire US tech sectors private net logging is been guided in
Re: (Score:2)
Re:Does this mean victims are being blacklisted? (Score:4, Interesting)
The article doesn't come out clearly to state this, but I can't see them adding end users IPs to a black list, I suspect that are referring to the IP the infected machine is trying to send data TO, as opposed to the IPs that the attacks are originating from.
Think command an control network as inbound, it sends package updates and commands to the infected machine.
The infected machine then attempts to send data off to another server, likely not connected in any way to the C&C system. This outbound IP would be blockable.
But you can't block the users ip as it's likely a dynamic IP assigned by their ISP.
Then again you can argue that once you are infected, you should be blacklisted and that could be something to look into.
I read the article (not the full report) and they are talking about scanning tweets, chats, pastebins and other stuff looking for IPs / domains with at least 2 mentions of malware.
I find it hard to believe these IPs are end users machines.
Re: (Score:2)
The article doesn't come out clearly to state this, but I can't see them adding end users IPs to a black list,
Why not? You might not blackhole the IP, but you could certainly ignore whole classes of traffic from such a host, and you could redirect them to a page telling them to get their act together.
Quick! (Score:3)
Really? In this age - Blacklists? (Score:1, Funny)
Re: (Score:2)
They're not blueprints either, they're prints of color.
IPs often assoc with multi-homed hosts (Score:2)
Useless w/IPV6 (Score:2)
Once IPV6 is widely adopted, the idea of having any meaningful data associated with an IP address is DEAD.
The bad guys will have a nearly limitless pool of IPs to spoof and choose from, and they'll just discard them every few seconds or minutes and a get a new batch to use. That's because IPV6 has a mind-bogglingly immense address space. How much? Well....
Let's assume every single one of the 100 billion stars in the galaxy is inhabited, and each star has a population of 10 trillion humans in orbit around it
Unusual outbound activity (Score:2)