+ All Categories
Home > Documents > A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across...

A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across...

Date post: 23-Jul-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
86
A Broad View of the Ecosystem of Socially Engineered Exploit Documents Stevens Le Blond, Cédric Gilbert, Utkarsh Upadhyay, Manuel Gomez Rodriguez and David Choffnes
Transcript
Page 1: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

A Broad View of the Ecosystem ofSocially Engineered Exploit Documents

StevensLeBlond,CédricGilbert,UtkarshUpadhyay,ManuelGomezRodriguezandDavidChoffnes

Page 2: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Challenges with measuring targeted attacks

• Low-volume,sociallyengineeredmessagesthatconvincespecificvictimstoinstallmalware

2

Page 3: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Challenges with measuring targeted attacks

• Low-volume,sociallyengineeredmessagesthatconvincespecificvictimstoinstallmalware• ThreestudiespublishedatUsenixSecurity’14• Tibet(Hardyetal.),MiddleEast(Marczaketal.),andUyghur(LeBlondetal.)

2

Page 4: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Challenges with measuring targeted attacks

• Low-volume,sociallyengineeredmessagesthatconvincespecificvictimstoinstallmalware• ThreestudiespublishedatUsenixSecurity’14• Tibet(Hardyetal.),MiddleEast(Marczaketal.),andUyghur(LeBlondetal.)

2

Page 5: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Challenges with measuring targeted attacks

• Low-volume,sociallyengineeredmessagesthatconvincespecificvictimstoinstallmalware• ThreestudiespublishedatUsenixSecurity’14• Tibet(Hardyetal.),MiddleEast(Marczaketal.),andUyghur(LeBlondetal.)

?

2

Page 6: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Challenges with measuring targeted attacks

• Low-volume,sociallyengineeredmessagesthatconvincespecificvictimstoinstallmalware• ThreestudiespublishedatUsenixSecurity’14• Tibet(Hardyetal.),MiddleEast(Marczaketal.),andUyghur(LeBlondetal.)

Measuringtargetedattacksisalonganddifficultprocess

?

2

Page 7: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Can Anti-Virus Aggregators (VirusTotal) help?

3

Page 8: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Can Anti-Virus Aggregators (VirusTotal) help?

3

Page 9: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Can Anti-Virus Aggregators (VirusTotal) help?

3

Page 10: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Can Anti-Virus Aggregators (VirusTotal) help?

3

Page 11: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

VirusTotal Statistics (one week)

4

Page 12: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

VirusTotal Statistics (one week)

4

Page 13: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

VirusTotal Statistics (one week)

4

Page 14: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

VirusTotal Statistics (one week)

4

Page 15: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

VirusTotal Statistics (one week)

4

Page 16: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

VirusTotal Statistics (one week)

4

Page 17: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

VirusTotal as a vantage point to measure targeted attacks

5

Page 18: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

VirusTotal as a vantage point to measure targeted attacks

5

Page 19: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

VirusTotal as a vantage point to measure targeted attacks

5

Page 20: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

VirusTotal as a vantage point to measure targeted attacks

5

Page 21: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Research questions

• DotargetedgroupsuploadexploitdocumentstoVirusTotal?

• Canwescaleouranalysistohundredsofthousandsofsamples?

• Howdoattacksfacedbydifferentgroupscomparewitheachother?

• IsVirusTotalusedbyotheractorssuchasattackersandresearchers?

6

Page 22: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Outline

1) Methodology2) Analysisofexploitdocuments3) Futurework

7

Page 23: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Exploit document infection process

Exploit Decoy Malware

8

Page 24: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Exploit document infection process

Exploit Decoy Malware

8

Page 25: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Exploit document infection process

Exploit Decoy Malware

8

Page 26: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Exploit document infection process

Exploit Decoy Malware

8

Page 27: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Data acquisition and processing workflow

9

Page 28: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Data acquisition and processing workflow

9

Page 29: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Can we scale our analysis to hundreds of thousands of samples? Acquisition

257,635

10

Page 30: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Can we scale our analysis to hundreds of thousands of samples? Acquisition

257,635

10

Page 31: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Can we scale our analysis to hundreds of thousands of samples? Acquisition

257,635 143

10

Page 32: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Data acquisition and processing workflow

11

Page 33: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Can we scale our analysis to hundreds of thousands of samples? Detection

257,635 143

12

Page 34: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Can we scale our analysis to hundreds of thousands of samples? Detection

Officew/EMET Acrobatw/EMET

257,635 143

200320072010

VIIIIXXXI

SP0SP1SP2SP3 0.01.02.03.04.05.0

12

Page 35: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Can we scale our analysis to hundreds of thousands of samples? Detection

Officew/EMET Acrobatw/EMET

257,635 143

200320072010

VIIIIXXXI

SP0SP1SP2SP3 0.01.02.03.04.05.0

12

Page 36: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Can we scale our analysis to hundreds of thousands of samples? Detection

Officew/EMET Acrobatw/EMET

257,635 143

200320072010

VIIIIXXXI

SP0SP1SP2SP3 0.01.02.03.04.05.0

-219,79437,841

-29114

12

Page 37: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

How many versions ofreaders do we have to test?

#affectedversions

CDF

13

Page 38: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

How many versions ofreaders do we have to test?

Fewexploitsareportableacrossallreaderversions

#affectedversions

CDF

13

Page 39: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Data acquisition and processing workflow

14

Page 40: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Can we scale our analysis to hundreds of thousands of samples? Extraction

Officew/EMET Acrobatw/EMET

257,635 143

200320072010

VIIIIXXXI

SP0SP1SP2SP3 0.01.02.03.04.05.0

-219,79437,841

-29114

15

Page 41: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Can we scale our analysis to hundreds of thousands of samples? Extraction

Acrobatw/driver0.01.02.03.04.05.0

Officew/EMET Acrobatw/EMET

257,635 143

200320072010

VIIIIXXXI

SP0SP1SP2SP3 0.01.02.03.04.05.0Officew/driver200320072010

VIIIIXXXI

SP0SP1SP2SP3

-219,79437,841

-29114

15

Page 42: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Can we scale our analysis to hundreds of thousands of samples? Extraction

Acrobatw/driver0.01.02.03.04.05.0

Officew/EMET Acrobatw/EMET

257,635 143

200320072010

VIIIIXXXI

SP0SP1SP2SP3 0.01.02.03.04.05.0Officew/driver200320072010

VIIIIXXXI

SP0SP1SP2SP3

-219,79437,841

-29114

15

Page 43: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Can we scale our analysis to hundreds of thousands of samples? Extraction

Acrobatw/driver0.01.02.03.04.05.0

Officew/EMET Acrobatw/EMET

257,635 143

200320072010

VIIIIXXXI

SP0SP1SP2SP3 0.01.02.03.04.05.0Officew/driver200320072010

VIIIIXXXI

SP0SP1SP2SP3

-219,79437,841

-29114

-34,0263,815

-11103

15

Page 44: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Data acquisition and processing workflow

16

Page 45: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Can we scale our analysis to hundreds of thousands of samples? Analysis

-29114

-11103

Acrobatw/driver0.01.02.03.04.05.0

Officew/EMET Acrobatw/EMET

257,635

200320072010

VIIIIXXXI

SP0SP1SP2SP3 0.01.02.03.04.05.0Officew/driver200320072010

VIIIIXXXI

SP0SP1SP2SP3

-219,79437,841

-34,0263,815

143

17

Page 46: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Can we scale our analysis to hundreds of thousands of samples? Analysis

Acrobatw/driver0.01.02.03.04.05.0

Officew/EMET Acrobatw/EMET

257,635

200320072010

VIIIIXXXI

SP0SP1SP2SP3 0.01.02.03.04.05.0Officew/driver200320072010

VIIIIXXXI

SP0SP1SP2SP3

-219,79437,841

-34,0263,815

17

Page 47: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Can we scale our analysis to hundreds of thousands of samples? Analysis

Acrobatw/driver0.01.02.03.04.05.0

Officew/EMET Acrobatw/EMET

200320072010

VIIIIXXXI

SP0SP1SP2SP3 0.01.02.03.04.05.0Officew/driver200320072010

VIIIIXXXI

SP0SP1SP2SP3

-219,79437,841

-34,0263,815

TranslatorsMalwaresandboxes

17

Page 48: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Can we scale our analysis to hundreds of thousands of samples? Analysis

Acrobatw/driver0.01.02.03.04.05.0

Officew/EMET Acrobatw/EMET

200320072010

VIIIIXXXI

SP0SP1SP2SP3 0.01.02.03.04.05.0Officew/driver200320072010

VIIIIXXXI

SP0SP1SP2SP3

-219,79437,841

-34,0263,815

TranslatorsMalwaresandboxes

17

Page 49: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Can we scale our analysis to hundreds of thousands of samples? Analysis

Acrobatw/driver0.01.02.03.04.05.0

Officew/EMET Acrobatw/EMET

200320072010

VIIIIXXXI

SP0SP1SP2SP3 0.01.02.03.04.05.0Officew/driver200320072010

VIIIIXXXI

SP0SP1SP2SP3

-219,79437,841

-34,0263,815

TranslatorsMalwaresandboxes

2,447 3,705

17

Page 50: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Outline

1) Methodology2) Analysisofexploitdocuments3) Futurework

18

Page 51: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Do targeted groups upload exploit documents on VirusTotal? Likely targets (inferred from decoys)

19

Page 52: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Do targeted groups upload exploit documents on VirusTotal? Likely targets (inferred from decoys)

19

Page 53: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Do targeted groups upload exploit documents on VirusTotal? Likely targets (inferred from decoys)

19

Page 54: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Do targeted groups upload exploit documents on VirusTotal? Likely targets (inferred from decoys)

VirusTotalgivesvisibilityintoattackstargetingnumerousgroups 19

Page 55: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

How attacks faced by different groups compare with each other? Languages of decoys

Fractio

n

20

Page 56: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

How attacks faced by different groups compare with each other? Languages of decoys

Fractio

n

20

Page 57: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

How attacks faced by different groups compare with each other? Languages of decoys

Fractio

n

20

Page 58: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

How attacks faced by different groups compare with each other? Languages of decoys

Fractio

n

20

Page 59: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

How attacks faced by different groups compare with each other? Languages of decoys

Decoystendtousetheofficiallanguageofthegroupstheytarget

Fractio

n

20

Page 60: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

How attacks faced by different groups compare with each other? Malware targeting

21

Page 61: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

How attacks faced by different groups compare with each other? Malware targeting

21

Page 62: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

How attacks faced by different groups compare with each other? Malware targeting

21

Page 63: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

How attacks faced by different groups compare with each other? Malware targeting

21

Page 64: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

How attacks faced by different groups compare with each other? Malware targeting

Fromourdataset,malwarefamiliestendtotargetoneortwocountries 21

Page 65: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Targeted regions

• Chineseinfluence:Tibet,Uyghur,Taiwan

• AsiaPacific:Myanmar,thePhilippines,Thailand,andVietnam

• AsiaPacific,G20:India,Indonesia,Japan,andSouthKorea

• RussiaandUSA

Page 66: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

How do attacks faced by different groups compare with each other? Malware targeting (cont.)

Fractio

n

23

Page 67: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

How do attacks faced by different groups compare with each other? Malware targeting (cont.)

Fractio

n

23

Page 68: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

How do attacks faced by different groups compare with each other? Malware targeting (cont.)

Fractio

n

23

Page 69: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

How do attacks faced by different groups compare with each other? Malware targeting (cont.)

Fractio

n

23

Page 70: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

How do attacks faced by different groups compare with each other? Malware targeting (cont.)

Malwarefoundinmultiplecountriestendtotargetaconfinedregion

Fractio

n

23

Page 71: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Outline

1) Methodology2) Analysisofexploitdocuments3) Futurework

24

Page 72: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Future work

•Monitoringoperatorbehavioroftargetedmalware

•Analysisofevasionstechniques,attackersoperations,andotherattackvectors

•Deployon-premisesandcloud-basedservicesforanalysisofemailattachments

25

Page 73: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Take home messages

• Complementarymethodologytomeasuretargetedattacksatscale

• At-riskgroupsuploadexploitdocumentstoVirusTotal

• Groupstendtobetargetedwithtailoreddecoysandmalwarefamilies

• Preliminaryimpact• Servicedeployedatemailproviderwith100,000+users• Datasetandacademicserviceavailableathttps://slingshot.dedis.ch

26

Page 74: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Frequently Asked Questions

[email protected]

• WhataretheobservationalbiasesofusingVirusTotal?

• Whatarethecommontypesofmaliciousdocumentsthatyoufilteredout?

• Whydidyoufocusonexploitdocuments?

• Whatprecautionsdidyoutaketoreducefalsenegatives?

• Didyoufindindicationsofsuccessfulcompromises?

27

Page 75: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow
Page 76: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

What are the observational biases of using VirusTotal?

• Coverageoftargetedattacksislimitedtothoseusersandorganizationswhouploadsuspiciousfiles

• VirusTotal’svisibilityislikelyskewedtowardsuserswhoworkwithnon-classifiedmaterial

• VirusTotaldatasetoffersapartialcoverageofattackswhereindividualsandNGOsarelikelyover-represented

Page 77: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

What are the most common malicious documents that you filtered out?

Page 78: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Why did you focus on exploit documents?

• Exploitdocumentsarethemostcommonvectoroftargetedattacksidentifiedbyrelatedwork

•Macrosrequireadditionaluserapprovalandcanbeforciblydisabledbysystemadministrators

• UsedagainstarangeoftargetsincludingNGOs,newsagencies,andmilitary,governmentalandintelligenceagencies

Page 79: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

What precautions did you take to reduce false negatives?

• ReducingdetectionFNs• CrossvalidatedEMETdetectionresultswithgroundtruthfromtheWUCdataset• 29/143WUCdocumentswerenotdetectedbyEMET,noneofthemFNs(16MacOSX,9wrongreaderversion,2password,and2withoutexploit)

• ReducingextractionFNs• ManuallyinspectedEMETdetectionsthatdidn’twritefilestodisk• 29/4,259documentsdetectedbyEMETdidnotwriteanyfilestodisk,noneofthemFNs(6crashes,4experimental,and19dysfunctional)

• Noneofouranalysesdependsonthelackofevasiontechniquesinthemalwareembeddedinexploitdocuments

Page 80: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Did you find indication of successful compromises?

• Codeddecoysbasedontheirlanguages,thecountriestheyreferto,ethnicgroupsanddates,andwhethertheytargetedspecificindividualsororganizations

• NativespeakersindependentlycodedthedocumentswritteninRussian,TraditionalChinese,Uyghur,andVietnamese

• Identifieddocumentslikelyexfiltratedfromcompromisedsystemsandusedasdecoysinexploitdocumentstargetingnew,relatedvictims

Page 81: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Did you find indication of successful compromises (cont.)?

Fractio

n

Page 82: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Did you find indication of successful compromises (cont.)?

Mostgroupsweretargetedwithreplayeddecoys

Fractio

n

Page 83: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Did you find evidence of zero-day vulnerabilities?

• WecollaboratedwithalargeAVvendortodeterminetheCVEtagsoftheexploitedreadervulnerabilities

• ThevendorscannedalltheexploitdocumentsthatwedetectedandcomparedtheresultingCVEwiththemajorityofVirusTotaltags• IfthetwoCVEsmatched,nofurtheractionwastaken• Otherwise,thesamplewasanalyzedmanually

• SamplesforwhichtheCVEreleasedatewasafterthedateofuploadonVirusTotalwereexaminedmanuallytodeterminetheCVE’scorrectness

• Basedonthismethodology,wedidn’tfindevidenceofzero-dayvulnerabilities

Page 84: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Can you estimate the dates of the decoys?

• Wecodeddecoysaccordingtotheirlanguages,thecountriestheyreferto,ethnicgroupsanddates,andwhethertheytargetedspecificindividualsororganizations

• NativespeakersindependentlycodedthedocumentswritteninRussian,TraditionalChinese,Uyghur,andVietnamese

Page 85: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Can you estimate the dates of the decoys (cont.)?

Fractio

n

Page 86: A Broad View of the Ecosystem of Socially Engineered ...€¦ · Few exploits are portable across all reader versions # affected versions CDF 13. Data acquisition and processing workflow

Can you estimate the dates of the decoys (cont.)?

Allgroupsexhibiteddecoysreferringtoaleastoneyearin2013-2015

Fractio

n


Recommended