+ All Categories
Home > Documents > Targeted Attacks: Then and Now - Virus Bulletin · • Link to a website which hosts a zero day...

Targeted Attacks: Then and Now - Virus Bulletin · • Link to a website which hosts a zero day...

Date post: 23-Jun-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
15
Targeted Attacks: Then and Now Targeted Attacks: Then and Now Ken Dunham, Director of Global Response CISSP, GCIH Gold (Honors), GSEC, GCFA, GREM [email protected] Proprietary and Confidential Information – Copyright© 2010 – All Rights Reserved Kim Grillo, Engineer, [email protected]
Transcript
Page 1: Targeted Attacks: Then and Now - Virus Bulletin · • Link to a website which hosts a zero day exploit (CVE‐2010‐ 0249), vulnerability in Internet Explorer (IE) 6. IE 6 Usage

Targeted Attacks: Then and NowTargeted Attacks:  Then and NowKen Dunham, Director of Global ResponseCISSP, GCIH Gold (Honors), GSEC, GCFA, [email protected]

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved

Kim Grillo, Engineer, [email protected]

Page 2: Targeted Attacks: Then and Now - Virus Bulletin · • Link to a website which hosts a zero day exploit (CVE‐2010‐ 0249), vulnerability in Internet Explorer (IE) 6. IE 6 Usage

Introduction

• BBB Attacks of 2007‐2008BBB Attacks of 2007 2008

• Eastern Europe Attacks

• Operation Aurora attacks

• Mitigation• Mitigation

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 2

Page 3: Targeted Attacks: Then and Now - Virus Bulletin · • Link to a website which hosts a zero day exploit (CVE‐2010‐ 0249), vulnerability in Internet Explorer (IE) 6. IE 6 Usage

BBB Attacks of 2007‐2008

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 3

Page 4: Targeted Attacks: Then and Now - Virus Bulletin · • Link to a website which hosts a zero day exploit (CVE‐2010‐ 0249), vulnerability in Internet Explorer (IE) 6. IE 6 Usage

BBB Attacks of 2007‐2008

Secondary payloads downloaded from compromised websites hosting c99 shells.

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 4

Page 5: Targeted Attacks: Then and Now - Virus Bulletin · • Link to a website which hosts a zero day exploit (CVE‐2010‐ 0249), vulnerability in Internet Explorer (IE) 6. IE 6 Usage

BBB Attacks of 2007‐2008

• July 2008 ‐ a number of attackers were arrested byJuly 2008  a number of attackers were arrested by US and Romanian law enforcement.

• http://webtv realitatea net/actual/cei 19 hackeri• http://webtv.realitatea.net/actual/cei‐19‐hackeri‐retinuti‐au‐fost‐adusi‐la‐tribun for video.

I ti ti i i i US• Investigation is ongoing in US.

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 5

Page 6: Targeted Attacks: Then and Now - Virus Bulletin · • Link to a website which hosts a zero day exploit (CVE‐2010‐ 0249), vulnerability in Internet Explorer (IE) 6. IE 6 Usage

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved

merln.ndu.edu

6

Page 7: Targeted Attacks: Then and Now - Virus Bulletin · • Link to a website which hosts a zero day exploit (CVE‐2010‐ 0249), vulnerability in Internet Explorer (IE) 6. IE 6 Usage

Eastern Europe Attacksp

• 2009 – 3 companies victims of malware attacks with plinks based on attack characteristics

• Company 1 – Zeus variant targeting customers, p y g gkeylogged data used to setup fraudulent accounts that would be used to transfer money to mules.

• Company 2 – Haxdoor variant, C&C hosted at IP address that historically hosted Company 1 attacks.

• Company 3 – Haxdoor variant, same configuration file (MD5) as Company 2. All h k l i ll l if URL d• All three attacks only install malware if correct URL and parameters are used and only once, otherwise downloads non malicious notepad exe

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved

downloads non malicious notepad.exe.

7

Page 8: Targeted Attacks: Then and Now - Virus Bulletin · • Link to a website which hosts a zero day exploit (CVE‐2010‐ 0249), vulnerability in Internet Explorer (IE) 6. IE 6 Usage

Eastern Europe Attacksp

• September 2009 – Liberty Exploit KitSeptember 2009  Liberty Exploit Kit– Installed Haxdoor variant, same MD5 as Company 2 d 3 tt k2 and 3 attacks.

– Connected to same IP address as Company 2 attacks.

• Haxdoor attack from May 2009 used same yMD5, C&C hosted on IP with money mule recruitment domainsrecruitment domains.

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 8

Page 9: Targeted Attacks: Then and Now - Virus Bulletin · • Link to a website which hosts a zero day exploit (CVE‐2010‐ 0249), vulnerability in Internet Explorer (IE) 6. IE 6 Usage

Eastern Europe Attacksp

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 9

Page 10: Targeted Attacks: Then and Now - Virus Bulletin · • Link to a website which hosts a zero day exploit (CVE‐2010‐ 0249), vulnerability in Internet Explorer (IE) 6. IE 6 Usage

http://images.astronet.ru/pubd/2007/04/09/0001221491/aurora1_wikipedia.jpg

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 10

Page 11: Targeted Attacks: Then and Now - Virus Bulletin · • Link to a website which hosts a zero day exploit (CVE‐2010‐ 0249), vulnerability in Internet Explorer (IE) 6. IE 6 Usage

Operation Aurora Attacksp• The attacker’s social engineer a victim into opening a 

malicious website The malicious email may have beenmalicious website.  The malicious email may have been delivered to an oversea employee, likely in China, from one of their trusted contacts.their trusted contacts.

• Link to a website which hosts a zero day exploit (CVE‐2010‐0249), vulnerability in Internet Explorer (IE) 6.y p

IE 6 Usage as of February 2010

40%50%60%70%

60 75%

0%10%20%30%

China USA Worldwide

60.75%

5.78% 11.74%

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 11

Page 12: Targeted Attacks: Then and Now - Virus Bulletin · • Link to a website which hosts a zero day exploit (CVE‐2010‐ 0249), vulnerability in Internet Explorer (IE) 6. IE 6 Usage

Operation Aurora Attacksp

• Once installed and executed the malwareOnce installed and executed, the malware connects to C&C servers using dynamic DNS 

iservices.

• The attackers escalated privileges to gain p g gaccess to the corporate network where they can search for collect and exfiltrate data ofcan search for, collect, and exfiltrate data of interest.

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 12

Page 13: Targeted Attacks: Then and Now - Virus Bulletin · • Link to a website which hosts a zero day exploit (CVE‐2010‐ 0249), vulnerability in Internet Explorer (IE) 6. IE 6 Usage

Mitigationg

• Network– Access Control– Blacklisting– Monitoring

• Application– Enable DEP for Windows and IE– Use an alternative PDF reader– Application Policies– PatchingU• Users– Education and Training

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 13

Page 14: Targeted Attacks: Then and Now - Virus Bulletin · • Link to a website which hosts a zero day exploit (CVE‐2010‐ 0249), vulnerability in Internet Explorer (IE) 6. IE 6 Usage

Key Trendsy

• All attacks involve highlyAll attacks involve highly targeted attacks against 

ifi i di id l fspecific individuals of interest within companies of interest.

• Attacks are becomingAttacks are becoming increasingly sophisticated.

k l b i ifi• Attacks are also becoming sector specific.

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 14

Page 15: Targeted Attacks: Then and Now - Virus Bulletin · • Link to a website which hosts a zero day exploit (CVE‐2010‐ 0249), vulnerability in Internet Explorer (IE) 6. IE 6 Usage

[email protected]

Proprietary  and  Confidential   Information  – Copyright© 2010  – All  Rights  Reserved 15


Recommended