News

Rise of the Machines is coming: bots pretend to be humans with the new trick

As report Akamai company specialists, malware programs operators armored with the new technique of bypass detection.

Method is called “Cipher Stunting» and allows pretending that generated by bots traffic is generated by real people.

Technique is in changing sent by bots ClientHello messages.

ClientHello is a first packet with data about communication parameters (of necessary TLS version, applied encryption methods and supported compression methods), transited to server in the process of handshake. These data is not encrypted, due to it security mechanisms can analyze client’s fingerprints and differentiate legitimate and malware traffic.

With the help of “Cipher Stunting” attackers can cheat tools for taking digital fingerprints and present malware traffic as a legitimate one.

As Akamai specialists explained, most often website data transition is performed by HTTPS (HTTP over SSL/TLS) protocol. Data about the client server gets during TLS-handshake, and with its help differs legitimate and malware traffic. Nevertheless, attackers learned to modify signatures and cheat websites security mechanisms.

“A majority (~82%) of the malicious traffic (including application attacks, web scraping, credential abuse, etc.) Akamai witnesses is carried out using secure connections over SSL/TLS. This number has grown over the last few years”, — told Moshe Zioni, Director of Threat Research of Akamai.

As a rule, cybercriminals bypass security mechanisms by randomization of SSL/TLS signature. However, “Cipher Stunting” significantly differs from such approach, as for changing of TLS-fingerprint encryption itself randomized.

Handshake Diagram

According to Akamai data, by the end of February 2019 was noted 1,3 billions of TLS-signature modification that is 20% more than in October 2018.

Source: https://blogs.akamai.com

Daniel Zimmermann

Daniel Zimmermann has been writing on security and malware subjects for many years and has been working in the security industry for over 10 years. Daniel was educated at the Saarland University in Saarbrücken, Germany and currently lives in New York.

Recent Posts

Qehu Virus Removal Guide (+Decrypt .qehu files)

Qehu - General Info Qehu is a destructive software functioning as typical ransomware. Michael Gillespie,…

13 hours ago

Qepi Virus Removal Guide (+Decrypt .qepi files)

Qepi Virus - Details Qepi is a destructive software functioning as typical ransomware. Michael Gillespie,…

13 hours ago

Remove Wifebaabuy.live pop-up ads (Virus Removal Guide)

Wifebaabuy.live is a domain that tries to trick you into clik to its browser notifications…

15 hours ago

Remove Relativeads.net pop-up ads (Virus Removal Guide)

Relativeads.net is a domain that tries to force you into clik to its browser notifications…

15 hours ago

Remove Vamtoa pop-up ads (Virus Removal Guide)

Vamtoacm.com is a domain that tries to force you into clik to its browser notifications…

15 hours ago

Remove Clicks2apk pop-up ads (Virus Removal Guide)

Clicks2apk.com is a site that tries to force you into subscribing to its browser notifications…

15 hours ago