Skip to main content

The Role of Cloud Services in Malicious Software: Trends and Insights

  • Conference paper
  • First Online:
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9148))

Abstract

In this paper we investigate the way cyber-criminals abuse public cloud services to host part of their malicious infrastructures, including exploit servers to distribute malware, C&C servers to manage infected terminals, redirectors to increase anonymity, and drop zones to host stolen data.

We conduct a large scale analysis of all the malware samples submitted to the Anubis malware analysis system between 2008 and 2014. For each sample, we extracted and analyzed all malware interactions with Amazon EC2, a major public cloud service provider, in order to better understand the malicious activities that involve public cloud services. In our experiments, we distinguish between benign cloud services that are passively used by malware (such as file sharing, URL shortening, and pay-per-install services), and other dedicated machines that play a key role in the malware infrastructure. Our results reveal that cyber-criminals sustain long-lived operations through the use of public cloud resources, either as a redundant or a major component of their malware infrastructures. We also observe that the number of malicious and dedicated cloud-based domains has increased almost 4 times between 2010 and 2013. To understand the reasons behind this trend, we also present a detailed analysis using public DNS records. For instance, we observe that certain dedicated malicious domains hosted on the cloud remain active for an average of 110 days since they are first observed in the wild.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://docs.aws.amazon.com/general/latest/gr/aws-ip-ranges.html.

  2. 2.

    https://archive.org/web/.

  3. 3.

    http://www.virustotal.com.

  4. 4.

    http://online-file-sharing-services-review.toptenreviews.com/.

  5. 5.

    http://www.iss.net/security_center/reference/vuln/HTTP_Malware_XSinkhole.htm.

  6. 6.

    https://www.dnsdb.info/.

  7. 7.

    http://spywareremove.com/.

References

  1. Best pay-per-install affiliate program reviews. http://pay-per-install.com. Accessed December 2014

  2. Amazon, E.: Amazon elastic compute cloud (amazon ec2) (2010). http://aws.amazon.com/ec2/

  3. AVTest Institute. Malware statistics & trends report. http://www.av-test.org/en/statistics/malware/

  4. Azure, W.: Microsofts cloud platform (2013). http://azure.microsoft.com/

  5. Bayer, U., Comparetti, P.M., Hlauschek, C., Kruegel, C., Kirda, E.: Scalable, behavior-based malware clustering. NDSS 9, 8–11 (2009)

    Google Scholar 

  6. Bayer, U., Kruegel, C., Kirda, E.: Ttanalyze: a tool for analyzing malware. In: 15th European Institute for Computer Antivirus Research (EICAR 2006) Annual Conference (2006)

    Google Scholar 

  7. Bestuzhev, D.: Financial data stealing malware now on amazon web services cloud (2011). http://www.securelist.com/en/blog/208188099/Financial_data_stealing_Malware_now_on_Amazon_Web_Services_Cloud. Accessed 15-May-2014

  8. Caballero, J., Grier, C., Kreibich, C., Paxson, V.: Measuring pay-per-install: the commoditization of malware distribution. In: 20th USENIX Conference on Security (2011)

    Google Scholar 

  9. Canali, D., Balzarotti, D., Francillon, A.: The role of web hosting providers in detecting compromised websites. In: Proceedings of the 22nd International Conference on World Wide Web, International World Wide Web Conferences Steering Committee, pp. 177–188 (2013)

    Google Scholar 

  10. Cohen, R.: The cloud hits the mainstream: more than half of u.s. businesses now use cloud computing. In: Forbes Magazine (2013)

    Google Scholar 

  11. Ferrer, M.C.: Zeus in the cloud. http://community.ca.com/blogs/securityadvisor/archive/2009/12/09/zeus-in-the-cloud.aspx

  12. Hamza, Y.A., Omar, M.D.: Cloud computing security: abuse and nefarious use of cloud computing. Int. J. Comput. Eng. Res. 3, 22–27 (2013)

    Google Scholar 

  13. He, K., Fisher, A., Wang, L., Gember, A., Akella, A., Ristenpart, T.: Next stop, the cloud: understanding modern web service deployment in ec2 and azure. In: ACM Internet Measurement Conference (IMC) (2013)

    Google Scholar 

  14. Higgins, K.J.: Dropbox, wordpress used as cloud cover in new apt attacks (2013). http://www.darkreading.com/attacks-breaches/dropbox-wordpress-used-as-cloud-cover-in-new-apt-attacks/d/d-id/1140098?. Accessed 15 May 2014

  15. Ko, R.K., Jagadpramana, P., Mowbray, M., Pearson, S., Kirchberg, M., Liang, Q., Lee, B.S.: Trustcloud: a framework for accountability and trust in cloud computing. In: 2011 IEEE World Congress on Services (SERVICES), pp. 584–588. IEEE (2011)

    Google Scholar 

  16. Li, Z., Alrwais, S., Xie, Y., Yu, F., Wang, X.: Finding the linchpins of the dark web: a study on topologically dedicated hosts on malicious web infrastructures. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 112–126. IEEE (2013)

    Google Scholar 

  17. Los, R., Shackleford, D., Sullivan, B.: The notorious nine cloud computing top threats in 2013. In: Cloud Security Alliance (2013)

    Google Scholar 

  18. Nappa, A., Xu, Z., Rafique, M.Z., Caballero, J., Cyberprobe, G.Gu.: Towards internet-scale active detection of malicious servers. In: Network and Distributed System Security Symposium (NDSS) (2014)

    Google Scholar 

  19. Perdisci, R., Lee, W., Feamster, N.: Behavioral clustering of http-based malware and signature generation using malicious network traces. In: USENIX Symposium on Networked Systems Design and Implementation (NSDI) (2010)

    Google Scholar 

  20. Solutionary. Security Engineering Research Team (SERT) Quarterly Threat Intelligence Report (2014). http://www.solutionary.com/_assets/pdf/research/sert-q4-2013-threat-intelligence.pdf. Accessed 15 May 2014

  21. Unuchek, R.: Gcm in malicious attachments (2013). http://www.securelist.com/en/blog/8113/GCM_in_malicious_attachments. Accessed 15 May 2014

  22. Wang, L., Nappa, A., Caballero, J., Ristenpart, T., Akella, A.: Whowas: a platform for measuring web deployments on iaas clouds. In: ACM Internet Measurement Conference (IMC) (2014)

    Google Scholar 

Download references

Acknowledgments

We would like to thank the reviewers for their valuable comments that allowed us to improve the quality of this paper. This research was partly funded by the French Ministry of education and research under Cifre grant given to Xiao Han, and by the European Unions Horizon 2020 project SUPERCLOUD under grant agreement 643964.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiao Han .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Han, X., Kheir, N., Balzarotti, D. (2015). The Role of Cloud Services in Malicious Software: Trends and Insights. In: Almgren, M., Gulisano, V., Maggi, F. (eds) Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2015. Lecture Notes in Computer Science(), vol 9148. Springer, Cham. https://doi.org/10.1007/978-3-319-20550-2_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-20550-2_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-20549-6

  • Online ISBN: 978-3-319-20550-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics