skip to main content
10.1145/3372297.3423355acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Mnemosyne: An Effective and Efficient Postmortem Watering Hole Attack Investigation System

Published: 02 November 2020 Publication History

Abstract

Compromising a website that is routinely visited by employees of a targeted organization has become a popular technique for nation-state level adversaries to penetrate an enterprise's network. This technique, dubbed a "watering hole" attack, leverages a compromised website to serve as a stepping stone into the true victims' network. Despite watering hole attacks being one of the main techniques used by attackers to achieve the initial compromise stage of the cyber kill chain, there has been relatively little research related to detecting or investigating complex watering hole attacks. While there is existing work that seeks to detect malicious modifications made to an otherwise benign website, we argue that simply detecting that the website is compromised is only the first stage of the investigation. In this paper, we propose Mnemosyne, a postmortem forensic analysis engine that relies on browser-based attack provenance to accurately reconstruct, investigate, and assess the ramifications of watering hole attacks. Mnemosyne relies on a lightweight browser-modification-free auditing daemon to passively collect causality logs related to the browser's execution. Next, Mnemosyne applies a set of versioning techniques on top of these causality logs to precisely pinpoint when the website was compromised and what modifications were made by the adversary. Following this step, Mnemosyne relies on a novel user-level analysis to assess how the malicious modifications affected the targeted enterprise and seeks to identify exactly which employees fell victim to the attack. Throughout our extensive evaluation, we found that Mnemosyne's forensic analysis engine was able to identify the true victims in all seven real-world watering hole scenarios, while also reducing the amount of manual analysis required by the forensic analyst by 98.17% on average.

Supplementary Material

MOV File (Copy of CSS2020_fpe404_JoeyAllen - Nano Zii.mov)
Presentation video

References

[1]
]aptcost2015 cost of cyber crime study: United states, a . http://www.ponemon.org/blog/2015-cost-of-cyber-crime-united-states.
[2]
]aptnotesAptnotes, b . https://github.com/kbandla/APTnotes.git.
[3]
dmoz. https://dmoz-odp.org/.
[4]
emaildefender. https://www.secantcorp.com/emaildefender.
[5]
Mitre att&ck. https://attack.mitre.org/.
[6]
passivetotal. https://www.riskiq.com/products/passivetotal.
[7]
How was the attack on the pfsa and polish banks carried out, and who else was targeted by criminals? https://niebezpiecznik.pl/post/jak-przeprowadzono-atak-na-knf-i-polskie-banki-oraz-kto-jeszcze-byl-na-celowniku-przestepcow/.
[8]
puppeteer. https://developers.google.com/web/tools/puppeteer.
[9]
splunk. https://www.splunk.com.
[10]
waf. https://owasp.org/www-community/Web_Application_Firewall.
[11]
F. R. Barbehenn Brittany, January 2020. https://unit42.paloaltonetworks.com/xhunt-campaign-new-watering-hole-identified-for-credential-harvesting/.
[12]
A. Bates, D. J. Tian, K. R. Butler, and T. Moyer. Trustworthy whole-system provenance for the linux kernel. In 24th USENIX Security Symposium (USENIX Security 15), pages 319--334, 2015.
[13]
K. Borgolte, C. Kruegel, and G. Vigna. Delta: automatic identification of unknown web-based infection campaigns. In Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS), Berlin, Germany, Oct. 2013.
[14]
K. Borgolte, C. Kruegel, and G. Vigna. Meerkat: Detecting website defacements through image-based object recognition. In 24th $$USENIX$$ Security Symposium ($$USENIX$$ Security 15), pages 595--610, 2015.
[15]
K. D. Bowers, C. Hart, A. Juels, and N. Triandopoulos. Pillarbox: Combating next-generation malware with fast forward-secure logging. In Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Gothenburg, Sweden, Sept. 2014.
[16]
P. Chen, L. Desmet, and C. Huygens. A study on advanced persistent threats. In IFIP International Conference on Communications and Multimedia Security, pages 63--72. Springer, 2014.
[17]
C. Curtsinger, B. Livshits, B. G. Zorn, and C. Seifert. Zozzle: Fast and precise in-browser javascript malware detection. In USENIX security symposium, pages 33--48. San Francisco, 2011.
[18]
D. Devecsery, M. Chow, X. Dou, J. Flinn, and P. M. Chen. Eidetic systems. In Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI), Broomfield, Colorado, Oct. 2014.
[19]
ld, and Schatz]pageloadS. Egger, P. Reichl, T. Hoßfeld, and R. Schatz. ?time is bandwidth?? narrowing the gap between subjective time perception and quality of experience. In 2012 IEEE international conference on communications (ICC), pages 1325--1330. IEEE, 2012.
[20]
A. Gehani and D. Tariq. SPADE: support for provenance auditing in distributed environments. In Proceedings of the 13th International Middleware Conference (Middleware), 2012.
[21]
F. Hacquebord. Two years of pawn storm. Trend Micro Forward-Looking Threat Research Team, April, 25, 2017.
[22]
X. Han, T. Pasquier, A. Bates, J. Mickens, and M. Seltzer. Unicorn: Runtime provenance-based detector for advanced persistent threats. In Network and Distributed System Security Symposium, 2020.
[23]
W. U. Hassan, S. Guo, D. Li, Z. Chen, K. Jee, Z. Li, and A. Bates. Nodoze: Combatting threat alert fatigue with automated provenance triage. In Proceedings of the 26th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feb. 2019.
[24]
Hassan, Bates, and Marino]rapsheetW. U. Hassan, A. Bates, and D. Marino. Tactical provenance analysis for endpoint detection and response systems. In Proceedings of the IEEE Symposium on Security and Privacy, 2020 a .
[25]
Hassan, Noureddine, Datta, and Bates]omegaW. U. Hassan, M. A. Noureddine, P. Datta, and A. Bates. Omegalog: High-fidelity attack investigation via transparent multi-layer log analysis. In Proc. NDSS, 2020 b .
[26]
M. N. Hossain, S. M. Milajerdi, J. Wang, B. Eshete, R. Gjomemo, R. Sekar, S. Stoller, and V. Venkatakrishnan. Sleuth: Real-time attack scenario reconstruction from cots audit data. In 26th USENIX Security Symposium (USENIX Security 17), pages 487--504, 2017.
[27]
M. N. Hossain, S. Sheikhi, and R. Sekar. Combating dependence explosion in forensic analysis using alternative tag propagation semantics. In IEEE S&P, 2020.
[28]
B. S. A. Intelligence. Lazarus & watering-hole attacks, February 2017. https://baesystemsai.blogspot.com/2017/02/lazarus-watering-hole-attacks.html.
[29]
Y. Ji, S. Lee, E. Downing, W. Wang, M. Fazzini, T. Kim, A. Orso, and W. Lee. Rain: Refinable attack investigation with on-demand inter-process information flow tracking. In Proceedings of the 24rd ACM Conference on Computer and Communications Security (CCS), Dallas, Texas, Oct. 2017.
[30]
Y. Ji, S. Lee, M. Fazzini, J. Allen, E. Downing, T. Kim, A. Orso, and W. Lee. Enabling refinable cross-host attack investigation with efficient data flow tagging and tracking. In 27th USENIX Security Symposium (USENIX Security 18), pages 1705--1722, 2018.
[31]
Kaspersky. Darkhotel apt, November 2014. https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/08070903/darkhotel_kl_07.11.pdf.
[32]
R. P. Kasturi, Y. Sun, R. Duan, O. Alrawi, E. Asdar, V. Zhu, Y. Kwon, and B. Saltaformaggio. Tardis: Rolling back the clock on cms-targeting cyber attacks. In Proceedings of the 41st IEEE Symposium on Security and Privacy (Oakland), San Francisco, CA, 2020.
[33]
S. T. King and P. M. Chen. Backtracking intrusions. ACM Transactions on Computer Systems (TOCS), 23 (1): 51--76, 2005.
[34]
S. T. King, Z. M. Mao, D. G. Lucchetti, and P. M. Chen. Enriching intrusion alerts through multi-host causality. In Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feb. 2005.
[35]
]energyPassiveTotalY. Klijnsma. New insights into energetic bear's watering hole cyber attacks on turkish critical infrastructure, November 2017 a . https://www.riskiq.com/blog/labs/energetic-bear.
[36]
]flashPassiveTotalY. Klijnsma. Fake flash player update linked to watering hole attack on popular middle east news site, September 2017 b . https://www.riskiq.com/blog/labs/fake-flash-update-watering-hole-attack.
[37]
C. Kolbitsch, B. Livshits, B. Zorn, and C. Seifert. Rozzle: De-cloaking internet malware. In 2012 IEEE Symposium on Security and Privacy, pages 443--457. IEEE, 2012.
[38]
D. P. Kwiatkowski Ivan, Aime Félix. Holy water: ongoing targeted water-holing attack in asia, March 2020. https://securelist.com/holy-water-ongoing-targeted-water-holing-attack-in-asia/96311/.
[39]
Y. Kwon, D. Kim, W. N. Sumner, K. Kim, B. Saltaformaggio, X. Zhang, and D. Xu. LDX: Causality inference by lightweight dual execution. In Proceedings of the 21st ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Atlanta, GA, Apr. 2016.
[40]
Y. Kwon, F. Wang, W. Wang, K. H. Lee, W.-C. Lee, S. Ma, X. Zhang, D. Xu, S. Jha, G. F. Ciocarlie, et al. Mci: Modeling-based causality inference in audit logging for attack investigation. In NDSS, 2018.
[41]
D. Lassalle, S. Koessel, and S. Abair. Oceanlotus blossoms: Mass digital surveillance and attacks targeting asean, asian nations, the media, human rights groups, and civil society, Nov. 2017. https://www.volexity.com/blog/2017/11/06/oceanlotus-blossoms-mass-digital-surveillance-and-exploitation-of-asean-nations-the-media-human-rights-and-civil-society/.
[42]
K. H. Lee, X. Zhang, and D. Xu. High accuracy attack provenance via binary-based execution partition. In Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feb. 2013.
[43]
B. Li, P. Vadrevu, K. H. Lee, R. Perdisci, J. Liu, B. Rahbarinia, K. Li, and M. Antonakakis. Jsgraph: Enabling reconstruction of web attacks via efficient tracking of live in-browser javascript executions. In NDSS, 2018.
[44]
Z. Li, S. Alrwais, X. Wang, and E. Alowaisheq. Hunting the red fox online: Understanding and detection of mass redirect-script injections. In Proceedings of the 35th IEEE Symposium on Security and Privacy (Oakland), San Jose, CA, May 2014.
[45]
Y. Liu, M. Zhang, D. Li, K. Jee, Z. Li, Z. Wu, J. Rhee, and P. Mittal. Towards a timely causality analysis for enterprise security. In NDSS, 2018.
[46]
L. Lu, V. Yegneswaran, P. Porras, and W. Lee. Blade: an attack-agnostic approach for preventing drive-by malware infections. In Proceedings of the 17th ACM conference on Computer and communications security, pages 440--450, 2010.
[47]
S. Ma, K. H. Lee, C. H. Kim, J. Rhee, X. Zhang, and D. Xu. Accurate, low cost and instrumentation-free security audit logging for windows. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2015.
[48]
S. Ma, X. Zhang, and D. Xu. ProTracer: towards practical provenance tracing by alternating between logging and tainting. In Proceedings of the 23rd Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feb. 2016.
[49]
S. Ma, J. Zhai, F. Wang, K. H. Lee, X. Zhang, and D. Xu. Mpi: Multiple perspective attack investigation with semantic aware execution partitioning. In Proceedings of the 25th USENIX Security Symposium (Security), Vancouver, BC, Canada, Aug. 2017.
[50]
S. Ma, J. Zhai, Y. Kwon, K. H. Lee, X. Zhang, G. Ciocarlie, A. Gehani, V. Yegneswaran, D. Xu, and S. Jha. Kernel-supported cost-effective audit logging for causality tracking. In Proceedings of the 2018 USENIX Annual Technical Conference (ATC), Boston, MA, July 2018.
[51]
E. A. Manzoor, S. Momeni, and L. Akoglu. Fast memory-efficient anomaly detection in streaming heterogeneous graphs. In Proceedings of the 22nd ACM SIGKDD Knowledge Discovery and Data Mining (KDD), San Francisco, CA, 2016.
[52]
S. Milajerdi, R. Gjomemo, B. Eshete, R. Sekar, and V. Venkatakrishnan. Holmes: Real-time apt detection through correlation of suspicious information flows. In Proceedings of the 40th IEEE Symposium on Security and Privacy (Oakland), San Jose, CA, May 2019.
[53]
]appleM. Mimoso. Apple watering hole attack, February 2013 a. https://threatpost.com/ios-developer-site-core-facebook-apple-watering-hole-attack-022013/77546.
[54]
]clickjackingM. Mimoso, May 2013 b . https://threatpost.com/watering-hole-attack-claims-us-department-of-labor-website/100081/.
[55]
M. Mimoso. Four distinct watering hole attacks dropping scanbox keylogger, October 2014. https://threatpost.com/four-distinct-watering-hole-attacks-dropping-scanbox-keylogger/109061/.
[56]
A. Moshchuk, T. Bragin, S. D. Gribble, and H. M. Levy. A crawler-based study of spyware in the web. In NDSS, volume 1, page 2, 2006.
[57]
A. Moshchuk, T. Bragin, D. Deville, S. D. Gribble, and H. M. Levy. Spyproxy: Execution-based detection of malicious web content. In Proceedings of the 16th USENIX Security Symposium (Security), Boston, MA, Aug. 2007.
[58]
C. Neasbitt, B. Li, R. Perdisci, L. Lu, K. Singh, and K. Li. Webcapsule: Towards a lightweight forensic engine for web browsers. In Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS), Denver, Colorado, Oct. 2015.
[59]
R. Paccagnella, P. Datta, W. U. Hassan, A. Bates, C. W. Fletcher, A. Miller, and D. Tian. Custos: Practical tamper-evident auditing of operating systems using trusted execution. In Proc. of the Symposium on Network and Distributed System Security (NDSS), 2020.
[60]
P. Paganini. Watering hole attacks on polish banks linked to lazarus group, February 2017. https://securityaffairs.co/wordpress/56235/apt/lazarus-group-polish-bank.html.
[61]
P. Vadrevu, J. Liu, B. Li, B. Rahbarinia, K. H. Lee, and R. Perdisci. Enabling reconstruction of attacks on users via efficient browsing snapshots. In Proceedings of the 24th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feb. 2017.
[62]
Q. Wang, W. U. Hassan, A. Bates, and C. Gunter. Fear and logging in the internet of things. In Network and Distributed Systems Symposium, 2018.
[63]
Q. Wang, W. U. Hassan, D. Li, K. Jee, X. Yu, K. Zou, J. Rhee, Z. Chen, W. Cheng, C. Gunter, et al. You are what you do: Hunting stealthy malware via data provenance analysis. In Symposium on Network and Distributed System Security (NDSS), 2020.
[64]
Y.-M. Wang, D. Beck, X. Jiang, and R. Roussev. Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In IN NDSS. Citeseer, 2006.
[65]
T. Yadav and A. M. Rao. Technical aspects of cyber kill chain. CoRR, abs/1606.03184, 2016. URL http://arxiv.org/abs/1606.03184.
[66]
R. Yang, S. Ma, H. Xu, X. Zhang, and Y. Chen. Uiscope: Accurate, instrumentation-free, and visible attack investigation for gui applications. 2020.
[67]
W. Zhou, S. Mapara, Y. Ren, Y. Li, A. Haeberlen, Z. Ives, B. T. Loo, and M. Sherr. Distributed time-aware provenance. In Proceedings of the 38th International Conference on Very Large Data Bases (VLDB), volume 6, pages 49--60, Istanbul, Turkey, Sept. 2012.
[68]
Z. Zorz. Banks around the world targeted in watering hole attacks, February 2017. https://www.helpnetsecurity.com/2017/02/14/banks-watering-hole-attacks/.

Cited By

View all
  • (2024)WEBRRProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3698994(1669-1686)Online publication date: 14-Aug-2024
  • (2023)TeSec: Accurate Server-side Attack Investigation for Web Applications2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179402(2799-2816)Online publication date: May-2023
  • (2022)An Exploratory Study of Cognitive Sciences Applied to CybersecurityElectronics10.3390/electronics1111169211:11(1692)Online publication date: 26-May-2022
  • Show More Cited By

Index Terms

  1. Mnemosyne: An Effective and Efficient Postmortem Watering Hole Attack Investigation System

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security
      October 2020
      2180 pages
      ISBN:9781450370899
      DOI:10.1145/3372297
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 02 November 2020

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. attack provenance
      2. forensic analysis
      3. watering hole attack

      Qualifiers

      • Research-article

      Conference

      CCS '20
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

      Upcoming Conference

      CCS '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)81
      • Downloads (Last 6 weeks)11
      Reflects downloads up to 05 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)WEBRRProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3698994(1669-1686)Online publication date: 14-Aug-2024
      • (2023)TeSec: Accurate Server-side Attack Investigation for Web Applications2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179402(2799-2816)Online publication date: May-2023
      • (2022)An Exploratory Study of Cognitive Sciences Applied to CybersecurityElectronics10.3390/electronics1111169211:11(1692)Online publication date: 26-May-2022
      • (2022)A Survey on Cyber Security Threats in IoT-Enabled Maritime IndustryIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2022.3164678(1-14)Online publication date: 2022
      • (2020)Assessment of End-User Susceptibility to Cybersecurity Threats in Saudi Arabia by Simulating Phishing AttacksInformation10.3390/info1112054711:12(547)Online publication date: 25-Nov-2020

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media