+ All Categories
Home > Documents > 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and...

1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and...

Date post: 02-Jan-2016
Category:
Upload: horatio-robbins
View: 219 times
Download: 2 times
Share this document with a friend
Popular Tags:
39
1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence on target users even for encrypted communications (Skype, PGP, secure web mail, etc.) www.hackingteam.it
Transcript
Page 1: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

1

REMOTE CONTROL SYSTEM

version 7.0

A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full

intelligence on target users even for encrypted communications (Skype, PGP, secure web mail, etc.)

www.hackingteam.it

Page 2: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

2

What the press says

Financial Times, The Economist “Governments must have IT offensive

capabilities”

“The new frontier of intelligence is cyberspace”

“Spy on suspected terrorists by inserting a remote forensic agent on their computers”

Page 3: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

3

Financial Times

Page 4: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

4

The Economist

Page 5: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

5

The Economist

Page 6: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

6

Introduction

Page 7: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

7

Hacking Team Ltd HT is a 100% Italian company founded in 2003 by

Valeriano Bedeschi and David Vincenzetti with the ambition of being one of the market reference in penetration testing (Ethical Hacking) services in Italy

The company developed in 2004 a unique solution for for attacking, infecting and remotely controlling targets (PCs, MACs, smartphones of different types)

In order to finance such a solution we completed a first round of financing in 2007 by: Innogest Sgr, the leading Italian VC fund (€80M

under management) Finlombarda Sgr: the main regional VC fund in

Lombardy

Page 8: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

Hacking Team, financialsHuge market traction

First mover advantage Market leader Rapid growth to market dominance Financially very strong

2009 results (Actual, YoY)

Revenues: +37% EBITDA: +147% EBIT: +121%

8

Page 9: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

Our Offer

Remote Control System A comprehensive IT offensive security

system for remotely attacking, infecting and controlling PCs and smartphones

Hacking Team’s educational and technical support services

9

Page 10: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

10

RCS – a few key metrics

More than 20 customers are currently using our solution in 5 different continents and 15 countries

More than 4000 active investigations as at today (estimated)

In order to guarantee optimal performance, strong development since inception with : 25 patches finalized since product launch More than new 20 modules released

Page 11: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

11

Skype is a nightmare for LEAs

IT offensive security represents a new and highly innovative technology

It’s growing very fast because of phenomena such as terrorism, industrial espionage and insider trading

Advanced use of the Internet by terrorists makes LEAs increasingly nervous

Example: the exponential growth of encrypted VoIP communications (Skype claims millions of users) by residential and business users, is a nightmare for LEAs

Page 12: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

12

Why IT offensive security

Cyber space is a very attractive place for criminals: It’s cheap, quick and easy to access

IT offensive security systems can be complementary to more traditional passive IT monitoring solutions

Governments need to have both defensive and offensive (IT) capabilities

Page 13: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

13

IT offensive security

Operational scenarios:

1. “Standard” criminal investigation (evidence gathering) performed by Government Organizations such as Police and Anticorruption (LEAs).

2. Intelligence gathering activities performed by Security Agencies for fighting serious crime and terrorism

Page 14: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

14

Remote Control System

Remote Control System is an IT stealth investigative tool for LEAs and security agencies

It allows passive monitoring and active control of all data and processes on selected target devices E.g., uploading and stealthily executing programs

on target, or destroying the target

Such devices might or might not be connected to the Internet

Page 15: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

15

Functionalities

Page 16: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

16

PC: Monitoring and Logging

Remote Control System can monitor and log any action performed on the target personal computer Web browsing Opened/Closed/Deleted files Keystrokes (any UNICODE language) Printed documents Chat, email, instant messaging Remote Audio Spy Camera snapshots VoIP conversations (eg: Skype) …

Page 17: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

PC: architectures

Windows XPWindows 2003Windows VistaWindows 7Mac OS X (Leopard 10.x)

17

Page 18: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

1818

Remote Control System can monitor and log any action performed on the target smartphone Call history Address book & Calendar Email messages Chat/IM messages SMS/MMS interception Localization (cell signal info, GPS info) Remote Audio Spy Camera snapshots Voice calls interception …

Smartphones: Monitoring and Logging

Page 19: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

Smartphones: architectures

Windows Mobile 5Windows Mobile 6Windows Mobile 6.5 iPhone OS 2.x iPhone OS 3.xSymbian S60 3rd editionBlackBerry OS 4.5

19

Page 20: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

20

Clear technology & product roadmap to market dominance

Q1 2011 Q2 2011 Q3 2011 Q4 2011

Linux

Injection Proxy Appliance

Symbian

Page 21: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

21

Key Features

Page 22: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

22

Key features

Invisibility: Anti-viruses, anti-spywares, anti-rootkits, anti-keyloggers cannot detect our product

► It is resistant to all products in 2009 Gartner Endpoint Security Magic Quadrant (Gartner is likely the most respected name in IT research worldwide)

Flexibility: advanced-logic based on event/action paradigm

► Send data only when the target is away► Activate microphone only when inside a given location► and many more...

Advanced installation: can be installed locally or remotely by means of various attack vectors

Page 23: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

23

Key features

Robustness & Scalability: the solution can scale up to unlimited numbers of targets and each investigation can be assigned to different teams

Integration with LI platforms: it can be integrated with existing investigation platforms. Data can be automatically forwarded to them once they arrive to our Collection Node

Uniformed management: a single console to configure the agents, perform data analysis, configure the attack vectors, manage the users and monitor the system

Privilege separation: each user/group can be granted with different privileges and assigned to different activities

Page 24: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

24

Key features

Stealthiness: the Collection Node can be hidden behind a chain of anonymizers which can be easily changed on the fly

Data mining: evidences can be easily retrieved and visualized performing advanced filtering on collected data

Alerting: you can be alerted when sensitive data arrives in the system

► E.g. you were waiting for a particular password to be recorded or a particular file to be opened on an encrypted volume

Page 25: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

Attack Vectors

25

Page 26: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

Local (hands-on) attack

(Boot from) USB key/CD-ROM Physical hard-drive extraction and low-

level direct access by another PC Encrypted disk? Evil Maid Attack!

PC running and locked by screensaver? Kill screensaver!

Protected by DeepFreeze-like restoration technology? Make RCS permanent infection!

26

Page 27: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

Remote attacks, 1/3

You know your target’s email only Send spoofed e-mail with “special

attachment”► E.g., .PDF, .PPT, .DOC, .MOV, etc

Attachment is composed by exploit + RCS backdoor Attachment creation totally automatic and

transparent to the user > 50 zero day and non-zero day exploits

guaranteed available by means of integrated RCS Exploit Portal

27

Page 28: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

Remote attacks, 2/3

You can access your target’s network or your target’s ISP Use RCS Injection Proxy Proprietary patent-pending technology Handles network speeds till 10G/bits! Infects targets on the fly,

automagically!

28

Page 29: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

Remote attacks, 3/3

You have other intelligence information about your target Use RCS Support Portal Social engineering support provided

by means of secure channel Active 24x7x365

29

Page 30: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

30

Use cases

Page 31: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

Voice Communications

Issue: the targets are using encrypted VoIP to communicate

The voip agent is able to record audio before the encryption and after the decryption

The microphone agent can be used to record the surroundings even if the target is not using the computer to communicate

31

Page 32: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

Encrypted chat

Issue: the target is using a third party encryption plugin (such as OTR) over common chat protocols (MSN, Yahoo!, Gtalk, Skype)

The chat agent is able to capture data before the encryption and after the decryption

You don’t have to worry about encryption anymore

32

Page 33: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

PGP Encrypted data

Issue: passive interception can record data, but can not decrypt it

The file capture agent can be used to retrieve the private keyring of the target

The keylog agent can be used to view the passphrase for the private keyring

Recorded data can now be decrypted

33

Page 34: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

Webmail interception

Issue: modern webmails are really a mess to be decoded on LI platform (ajax & co.)

The URL agent can make a screenshot of the visited page (incoming emails)

The keylog agent can be used to capture outgoing emails while the user is writing

The clipboard agent can capture the body if it is copy-and-pasted (PGP tray)

34

Page 35: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

Deepfrozen Internet Café PCs

Issue: Rootkits don’t survive reboot of DeepFreezed computers

Our solution is DeepFreeze resistant Just install it

35

Page 36: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

36

Final words

Page 37: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

Why trusting HT?

Reputation Our software has been widely deployed and is used

for national security issues worldwide

No remote access to data from HT The infrastructure is totally at customer’s site

No “hidden features” inside You can have a full source code walk–through

37

Page 38: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

How we can help you

Delivery on-siteSite Acceptance TestProduct trainingAdvanced training On-site assistanceSupport Portal Exploit Portal

38

Page 39: 1 REMOTE CONTROL SYSTEM version 7.0 A Stealth, Spyware-Based System for Attacking, Infecting and Monitoring Computers and Smartphones. Full intelligence.

mailto:

[email protected]

39


Recommended