Login  |   Register Logout  |   中文
Modify
Deregister
[Bulletin] Huawei Intelligent Security Center of a new edition is now available. You can click New Edition in the upper right corner of the page to experience it.
  • Security Notice

  • Research

  • Signature Update

  • Knowledge Base Query

  • Intelligence Query

  • FireHunter-Cloud FireHunter-Cloud

  • My Device

  • Support

MAPP Notice
Vulnerability Notice
Security Alert
PSIRT Advisories
Security Blog
Major Security Events
Signature Update
Version Notice
Signature Change Description
Feedback
IPS New Grammar Manual
Information Release
Subscription
URL Category Query
IPS Threat
APPWiKi

Basics of Deep Web


Release Date : 2017-05-17 17:03:55    Update Date : 2018-11-27 17:19:27    Author :

【Abstract】The ransomware worm WannaCrypt and its variants spread worldwide and infected a large number of Windows hosts in a short period of time, causing serious economic loss and panic. Since it is ransomware, it must be related to money. Who dares to blackmail users around the world for money? Are hackers not afraid to be caught by the police? In fact, hackers take anti-tracking measures to ensure their own security. In this worm attack, we find that hackers hide their identities in the following ways: ransom is paid using anonymous bitcoin, and the controlled server is deployed on the deep web.

1  What Is Deep Web?

The deep web, which is in comparison to the Internet accessible to the public, is a part of the Internet that is inaccessible to conventional search engines. The Onion Router (Tor) is the most popular means to access the deep web.

The Tor network is connected by computers installed with Tor software. The Tor network structure is similar to an onion. It can only be seen from outside, and must be stripped layer by layer before the core is seen. On the Tor network, the transmission between routers is encrypted by the point-to-point symmetric key to form a hierarchical structure.

2  Why Can the Deep Web Be Anonymous and Untraceable?

Assume that a user wants to browse the Google home page anonymously. On the Tor network, the user's computer will randomly send the web request that is encrypted in several layers to another computer installed with Tor (this computer is called guard). After stripping off the first encryption layer, the guard continues to randomly forward the request to another computer, which then removes another encryption layer and forwards the request. This process continues.

The last computer in the chain is called the exit node. After the exit node removes the last encryption layer, the real destination address (that is, the address of the Google home page) of the request is seen. In this access process, the first computer knows the network address of the sender, and the exit node knows the network address of the destination site, but no computer in the chain knows the complete information. The layer-by-layer encryption routing scheme is Tor.




When Tor is used to create a private network path, the user software or client establishes a circuit formed by several encrypted connections through the relay on the network. The circuit is extended hop by hop, and the relay on the circuit only knows the previous relay from which the data is received and the destination relay of the data to be sent. No separate relay knows the complete path of the data packet. The client and each hop on the circuit negotiate a set of independent keys to prevent data from being traced on any hop.

3 How Does the WannaCrypt Ransomware Worm Use Tor to Elude Tracing?

Let's see how the criminals behind WannaCrypt use Tor to hide themselves.

According to the analysis, WannaCrypt releases the executable program named tasksche.exe in C:\windows (Windows 7) after it is executed. The program is a ransomware program that encrypts disk files. After the program is executed, a ransomware interface appears.



In the sample release file list, there are lots of files and folders whose extension name is wnry. In the TaskData directory, a Tor-related client program is found.



This program is used to communicate with the server on the deep web. The configuration list of the communication server is in c.wnry. 



The following table lists the deep web servers:

gx7ekbenv2riucmf.onion

57g7spgrzlojinas.onion

xxlvbrloxvriy2c5.onion

76jdd2ir2embyv47.onion

cwwnhwhlz52maqm7.onion

So what is the role of the deep web servers in this WannaCrypt incident? We find that if you click the Decrypt button on the ransomware interface, only a few files can be decrypted.



The analysis shows that WannaCrypt stores a decryption key locally, but the key can only decrypt a small quantity of files. If you want to decrypt all the files, pay for the private decryption key. The analysis shows that the paid private key is delivered by the server on the Tor network. The servers mentioned earlier are the ones hidden on the deep web to deliver the private decryption key.

The WannaCrypt decryption process is as follows:




The following figure shows some packets for the ransomware to communicate with the deep web server, which are intercepted after CheckPayment is clicked. It can be seen that the server is gx7ekbenv2riucmf.onion.



It is shown that the key server plays a very important role in the ransomware incident. To avoid tracing and cracking, the criminals deploy the server on the deep web and use the Tor client to communicate with the server.

4 What Else Can Tor Do For Cybercrime?

Tor can be exploited to construct botnets.

Botnet operators can deploy C&C services on the Tor network to hide C&C servers. Such botnets insert Tor component programs into malicious programs in transit. Infected zombie hosts communicate with the C&C servers through Tor. Hackers control the zombie hosts through the C&C servers on the Tor network.



When a botnet is constructed using Tor, it is difficult to trace and expose the controllers' identities. Moreover, the C&C servers are not exposed, eliminating the risk of being shut down.

Tor can be used by ransomware.

Ransomware is classified into crypto-ransomware and locking-ransomware. Crypto-ransomware renders user data inaccessible by employing cryptography against user files, disks, and databases on the victim devices. Locking-ransomware maliciously alters passwords on the victim devices to keep users from accessing resources on the devices.

Ransomware often uses the Tor network for local control and payment. Local control is similar to botnet situation. Generally, servers are hidden on the Tor network. In ransomware payment, the Tor network is used to provide an address for paying bitcoins. For example, CryptoWall3.0 and PETYA ransomware provides a link address ending with .onion in the ransomware information to inform the user of the transaction address, which is difficult to trace.




Tor can be used for black market.

The Tor network can hide the sender's address information as well as the receiver's server address information. Therefore, the deep web becomes the heaven of the black market, and there are numerous transaction websites on the deep web. You can find anything you want on the deep web. The famous black market website offers an anonymous market named "Silk Road". Although "Silk Road" has been banned, but similar websites still exist on the deep web.






【Copyright Notice】 This article is the original content of HUAWEI Security Center. When reprinting, you must indicate the source (HUAWEI Security Center), link and author of the article, otherwise you may be held liable.If you find any suspected infringing content on this website, please visit the Feedback page to report and provide relevant evidence. Once verified, we will immediately remove the allegedly infringing content.




BackTop
Comment


5 1
Like Disagree





  • t****@huawei.com 2019-07-02 20:09:14

       写的很详细,很受益!



View more
Fold

Related links Huawei | Contact Us Tel:Huawei Service-Hotline | About Us Privacy Data Protection Statement

Copyright ©Huawei Technologies Co., Ltd. 2008 - 2026. All rights reserved.