SlideShare uma empresa Scribd logo
1 de 34
www.Garage4Hackers.com 
Lessons learned tracking an APT team 
Advance Persistent Threats 
[APT] Tracking for Dummies 
http:/www.Garage4Hackers.com 
Garage4Hackers
About Me 
[Garage4Hackers ] 
A community of like minded security folks. 
Garage4Hackers 
Forum based community www.Garage4Hackers.com. 
Ranchoddas Series Webcast every month [promoting free 
info sec education]. :- THN is one of our biggest supporter. 
www.garage4hackers.com/ranchoddas-webcast 
https://twitter.com/Garage4Hackers 
Our views and opinions do not represent those of our 
employers.
Netravler APT Attribution 
This talk would be on how we attributed the APT team 
behind Netravler . 
How we did it and how you could do the same. 
Reference: 
http://www.kaspersky.com/about/news/virus/2013/NetTraveler 
_is_back_with_new_tricks 
http://www.kaspersky.com/about/news/virus/2014/NetTraveler 
-Gets-Makeover-for-Tenth-Anniversary 
http://kasperskycontenthub.com/wp-content/ 
uploads/sites/43/vlpdfs/kaspersky-the-net-traveler-part1- 
final.pdf
Tracking an APT Team 
Agenda: 
Garage4Hackers 
Exploit/Malware analysis. 
Information gathering . 
Finding security bugs in attacker infrastructure. 
Taking over attacker Command and Controller 
servers. 
Identifying victims. 
Countering attacks. 
What ever mentioned in the talk today is based on data collected 
over an year. This research was done with active participation 
from g4h members
The Attack. 
Spear-phishing :Comes form Spoofed email 
address via email. 
Garage4Hackers 
Watering hole technique (browser exploits, drive 
by downloads) to infect victims surfing the web
Step 1: Email header analysis . 
Evidences to Collect. 
http://mxtoolbox.com/Public/Tools/EmailHeaders.aspx 
1) Collect sender time, return path, SMTP address etc. 
Garage4Hackers
Garage4Hackers 
Step 2: Exploit Analysis 
The objective is to identify/extract the malware dropped using 
the exploit. 
Collect Metadata embedded in the exploit . 
Find any piece of information that would help in attribution. 
Identify CVE using virustotal.com helps when the exploit is 
not a 0-day .
Automated: MS-office exploit 
analysis. 
These sites should help. 
www.document-analyzer.net/ 
www.joesecurity.org 
http://scan.xecure-lab.com/ 
Garage4Hackers
Extracting Malware out of 
Exploits. 
Manual: MS-office exploit analysis. 
Garage4Hackers 
Run the document file in a virtual machine and use process 
monitor to watch system level changes [drops at temp file]. 
Use Sandboxie to execute the document file and extract the 
binary. 
Load office in a debugger and put breakpoints at file write API.
Evidences Collected from Step 
1,2. 
Sent from a spoofed email address . 
The email contained a malicious attachment, which exploited cve- 
2010-333 rtf exploit . 
Based on initial analysis the same malware samples were used to 
attacks Korea and Russia. 
Campaign that have been active since 2009 . 
Opening the exploit drops a legitimate file with 
md5: e617348b8947f28e2a280dd93c75a6ad. 
File Name: Jallianwala Bagh massacre a deeply shameful act.doc 
It drops the following binaries: 
c0c093987a55fe9ac61e6e2b5a362d51 netmgr.dll 
8dc61b737990385473dca9bfc826727b winlogin.exe 
Garage4Hackers
Step 3: Malware Analysis 
Evidences to Collect. 
Command and Control Domain names/ IP address. 
Whois Information about the IP address. 
Registrant Email Address 
Malware Activities. 
Interesting strings in Malware . 
Garage4Hackers
Automated Malware 
Analysis 
http://anubis.iseclab.org/ 
https://aerie.cs.berkeley.edu/ 
http://camas.comodo.com/ 
http://eureka.cyber-ta.org/ 
https://malwr.com/submission/ 
http://www.threatexpert.com/submit.aspx 
Garage4Hackers 
http://www.threattracksecurity.com/resources/sandbox-malware- 
analysis.aspx 
Source: http://zeltser.com/reverse-malware/automated-malware-analysis.html
Manual: Malware 
Analysis. Reversing Malware: 
• Normally controller 
information would be 
encrypted or encoded 
inside the malware. 
• Just run the malware in a 
debugger and then 
analyze the heap for IP 
address / Domain patters. 
• Alternately put breakpoint 
at Winsock Functions and 
analyze the stack . 
http://msdn.microsoft.com/en-us/ 
library/windows/desktop/ms7413 
94(v=vs.85).aspx 
Garage4Hackers
Manual: Malware 
Analysis. 
• You can figure out 
encryption/encoding 
algorithms. 
• The current malware 
compressed data and then 
base64 encoded them 
before sending them to 
attacker controlled servers. 
• Registry / File system 
values malwares write for 
persistence. 
Garage4Hackers
Evidences Collected from Step 3. 
Controller Information: 
http://www.faceboak.net/2012nt/nettraveler.asp 
IP: 110.34.193.13 
Request: Compressed+B64 encoded Get request 
Garage4Hackers
Domain Information. 
IP address 110.34.193.13 hosted many 
domains . 
Also each domains we identified were 
behind the fast flux domain. 
Registrant email ID were found using 
whois and was used to reverse query 
other domains. 
Source: http://blogs.mcafee.com/mcafee-labs/ 
travnet-trojan-could-be-part-of-apt-campaign 
Garage4Hackers
We wrote a Fast Flux 
Monitor 
Garage4Hackers 
• Collected all IP address associated with 
the group. 
• Created another program to get whois 
info of all these IP address registration 
information.
Garage4Hackers 
Step 4: Offensive Attacks on 
C&C 
Collect information about victims. 
Find information about attackers . 
Identify stolen information . 
Collect tools used by attackers. 
Learn about attacker tools and tactics. 
Some time you find 0-days on these server, this would give 
better protection. 
“The only real defense is offensive defense” (Mao 
Zedong)
Find Vulnerabilities. 
On the C&C application . 
On the hosted server . 
Or what ever evil ways you could think about. 
Garage4Hackers 
We found a lame bug in the controller application and we had our first non-interactive shell on the 
controller.
Attack the Attackers 
Garage4Hackers
Result 
Huge no of C&C servers were under control. 
Lot of evidences to collect. 
Garage4Hackers
They looked for : 
- .ppt(x) , .xls(x) .doc(x) .pdf 
Encrypted ??: 
• The contents were 
compressed and 
unusable. 
• Decompression was 
needed to convert it 
back to a usable 
format. 
Garage4Hackers
Lots of Data and Lots of 
Victims 
Garage4Hackers 
Source: http://www.kaspersky.com/about/news/virus/2014/NetTraveler-Gets-Makeover-for-Tenth-Anniversary
Evidences Collected 
Webserver logs, System logs . 
Activity and admin login logs. 
Victim Information. 
IP address and Mac Address. 
Highlights: 
1. Attackers where behind a proxy. 
2. Military like working pattern identified 
24/7. 
3. The controller admins showed lack of 
technicalskills. (So the developers of 
Nettravler is not themaintainers of the 
controllers. ) 
Garage4Hackers 
00 ** ** ** 
01 ** ** 
02 ** ** ** 
03 ** ** 
04 ** ** 
05 ** ** 
06 ** ** 
07 ** ** ** 
08 ** ** 
09 ** ** 
10 ** 
11 ** ** ** 
12 ** ** ** 
M T W T F S SU
Retaliation by AttackersGarage4Hackers 
While analyzing the data on the 
controllers, we were attacked by the 
attackers. The attacker attacked from 
61.178.77.18 IP and tried to sent Ms08- 
067 exploit . 
61.178.77.* is a notorious IP range and 
is attributed in many attacks against 
governments around the world. 
Some advance googling, we stumbled 
upon an interesting discovery, soldiers 
from PLA Lanzhou camp talking about 
their experiences and the above IP was 
there . 
http://tieba.baidu.com/f?ct=335544320&lm=0&rn=30&tn= 
postBrowserN&sc=0&z=65932096&pn=0&word=%C1%D 
9%D4%F3 
The Lanzhou Military Region is one of 
seven military regions in the People's 
Republic of China.
Netravler Attribution 
Huge amount spent for the malware infrastructure 
[Military funds]. 
24/7 Working hours [Military working hours] . 
Low technical skills, developers of Netravler were 
different from the maintainers [ Trained users not core 
hackers]. 
IP address attribution to PLA[People liberation Army] 
military camp. 
All evidences were leading to PLA IT department 
Lanzhou .
The End 
Not really :D 
Garage4Hackers
Tracking the SMTP server. Garage4Hackers 
Finger print IP address of SMTP server from Email 
header analysis . 
Identified an Exploit/Phishing mailer kit named Chilly 
fisher 
Go to step 4, identify vulnerabilities in the server 
hosting the exploit kit.
Chilly Fisher Exploit Kit 
Garage4Hackers 
The kit had a frontend and Backend code . 
The function of the Front end code was to send mass 
phishing/exploit emails to targets. 
The front end code allowed attackers to mass include target 
emails, subject and email content. 
The phishing email sent has a hyperlink with unique callback 
to the backend code. 
The kit contained a phishing and browser exploit module .
Victim Database 
Garage4Hackers
Chillyfisher Database 
Garage4Hackers 
The backend database used is MS-Access . All collected 
information is stored in this database. 
Chillyfisher instance had "Loginlog" table having 
information's about ChillyFisher admins who logged into the 
control panel.
IP attribution. 
All the logged in Admins were from China. 
Garage4Hackers 
There were around 10,000 unique IP address found in target 
db.
Chillyfisher Targets. 
Garage4Hackers
Questions 
Garage4Hackers 
info@garage4hackers.com 
www.Garage4Hackers.com

Mais conteúdo relacionado

Mais procurados

Reverse Engineering Malware: A look inside Operation Tovar
Reverse Engineering Malware: A look inside Operation TovarReverse Engineering Malware: A look inside Operation Tovar
Reverse Engineering Malware: A look inside Operation TovarLancope, Inc.
 
David Bianco - Enterprise Security Monitoring
David Bianco - Enterprise Security MonitoringDavid Bianco - Enterprise Security Monitoring
David Bianco - Enterprise Security Monitoringbsidesaugusta
 
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)Detection of Malware Downloads via Graph Mining (AsiaCCS '16)
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)Marco Balduzzi
 
Carbanak apt eng
Carbanak apt engCarbanak apt eng
Carbanak apt engMerve Kara
 
Plead APT @ EECTF 2016
Plead APT @ EECTF 2016Plead APT @ EECTF 2016
Plead APT @ EECTF 2016Marco Balduzzi
 
PHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On LabPHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On LabTeymur Kheirkhabarov
 
Inside Cybercrime Groups Harvesting Active Directory for Fun and Profit - Vit...
Inside Cybercrime Groups Harvesting Active Directory for Fun and Profit - Vit...Inside Cybercrime Groups Harvesting Active Directory for Fun and Profit - Vit...
Inside Cybercrime Groups Harvesting Active Directory for Fun and Profit - Vit...PROIDEA
 
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows toolIntroducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows toolMichael Gough
 
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...Chi En (Ashley) Shen
 
Cloud Security Summit (Boston) - Live Hack Demo
Cloud Security Summit (Boston) - Live Hack Demo Cloud Security Summit (Boston) - Live Hack Demo
Cloud Security Summit (Boston) - Live Hack Demo Alert Logic
 
Hunting on the Cheap
Hunting on the CheapHunting on the Cheap
Hunting on the CheapEndgameInc
 
MITRE AttACK framework it is time you took notice_v1.0
MITRE AttACK framework it is time you took notice_v1.0MITRE AttACK framework it is time you took notice_v1.0
MITRE AttACK framework it is time you took notice_v1.0Michael Gough
 
Threat hunting and achieving security maturity
Threat hunting and achieving security maturityThreat hunting and achieving security maturity
Threat hunting and achieving security maturityDNIF
 
Billions & Billions of Logs
Billions & Billions of LogsBillions & Billions of Logs
Billions & Billions of LogsJack Crook
 
Threat hunting in cyber world
Threat hunting in cyber worldThreat hunting in cyber world
Threat hunting in cyber worldAkash Sarode
 
Sharpening your Threat-Hunting Program with ATTACK Framework
Sharpening your Threat-Hunting Program with ATTACK FrameworkSharpening your Threat-Hunting Program with ATTACK Framework
Sharpening your Threat-Hunting Program with ATTACK FrameworkMITRE - ATT&CKcon
 
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't EnoughNTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't EnoughNorth Texas Chapter of the ISSA
 
Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Priyanka Aash
 

Mais procurados (19)

Reverse Engineering Malware: A look inside Operation Tovar
Reverse Engineering Malware: A look inside Operation TovarReverse Engineering Malware: A look inside Operation Tovar
Reverse Engineering Malware: A look inside Operation Tovar
 
David Bianco - Enterprise Security Monitoring
David Bianco - Enterprise Security MonitoringDavid Bianco - Enterprise Security Monitoring
David Bianco - Enterprise Security Monitoring
 
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)Detection of Malware Downloads via Graph Mining (AsiaCCS '16)
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)
 
Carbanak apt eng
Carbanak apt engCarbanak apt eng
Carbanak apt eng
 
Plead APT @ EECTF 2016
Plead APT @ EECTF 2016Plead APT @ EECTF 2016
Plead APT @ EECTF 2016
 
PHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On LabPHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On Lab
 
Inside Cybercrime Groups Harvesting Active Directory for Fun and Profit - Vit...
Inside Cybercrime Groups Harvesting Active Directory for Fun and Profit - Vit...Inside Cybercrime Groups Harvesting Active Directory for Fun and Profit - Vit...
Inside Cybercrime Groups Harvesting Active Directory for Fun and Profit - Vit...
 
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows toolIntroducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
 
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
 
Cloud Security Summit (Boston) - Live Hack Demo
Cloud Security Summit (Boston) - Live Hack Demo Cloud Security Summit (Boston) - Live Hack Demo
Cloud Security Summit (Boston) - Live Hack Demo
 
Hunting on the Cheap
Hunting on the CheapHunting on the Cheap
Hunting on the Cheap
 
Sigma and YARA Rules
Sigma and YARA RulesSigma and YARA Rules
Sigma and YARA Rules
 
MITRE AttACK framework it is time you took notice_v1.0
MITRE AttACK framework it is time you took notice_v1.0MITRE AttACK framework it is time you took notice_v1.0
MITRE AttACK framework it is time you took notice_v1.0
 
Threat hunting and achieving security maturity
Threat hunting and achieving security maturityThreat hunting and achieving security maturity
Threat hunting and achieving security maturity
 
Billions & Billions of Logs
Billions & Billions of LogsBillions & Billions of Logs
Billions & Billions of Logs
 
Threat hunting in cyber world
Threat hunting in cyber worldThreat hunting in cyber world
Threat hunting in cyber world
 
Sharpening your Threat-Hunting Program with ATTACK Framework
Sharpening your Threat-Hunting Program with ATTACK FrameworkSharpening your Threat-Hunting Program with ATTACK Framework
Sharpening your Threat-Hunting Program with ATTACK Framework
 
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't EnoughNTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
 
Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst
 

Semelhante a Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.

ENPM808 Independent Study Final Report - amaster 2019
ENPM808 Independent Study Final Report - amaster 2019ENPM808 Independent Study Final Report - amaster 2019
ENPM808 Independent Study Final Report - amaster 2019Alexander Master
 
Deep Exploit@Black Hat Europe 2018 Arsenal
Deep Exploit@Black Hat Europe 2018 ArsenalDeep Exploit@Black Hat Europe 2018 Arsenal
Deep Exploit@Black Hat Europe 2018 ArsenalIsao Takaesu
 
Lab-4 Reconnaissance and Information Gathering  A hacker.docx
Lab-4 Reconnaissance and Information Gathering         A hacker.docxLab-4 Reconnaissance and Information Gathering         A hacker.docx
Lab-4 Reconnaissance and Information Gathering  A hacker.docxLaticiaGrissomzz
 
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...grecsl
 
Hacking Client Side Insecurities
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecuritiesamiable_indian
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopErnest Staats
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008ClubHack
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008ClubHack
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CDamiable_indian
 
How to measure your security response readiness?
How to measure your security response readiness?How to measure your security response readiness?
How to measure your security response readiness?Tomasz Jakubowski
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing BasicsRick Wanner
 
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network SecurityMMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network SecurityAPNIC
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopErnest Staats
 

Semelhante a Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???. (20)

DR FAT
DR FATDR FAT
DR FAT
 
ENPM808 Independent Study Final Report - amaster 2019
ENPM808 Independent Study Final Report - amaster 2019ENPM808 Independent Study Final Report - amaster 2019
ENPM808 Independent Study Final Report - amaster 2019
 
Deep Exploit@Black Hat Europe 2018 Arsenal
Deep Exploit@Black Hat Europe 2018 ArsenalDeep Exploit@Black Hat Europe 2018 Arsenal
Deep Exploit@Black Hat Europe 2018 Arsenal
 
Unveiling-Patchwork
Unveiling-PatchworkUnveiling-Patchwork
Unveiling-Patchwork
 
Lab-4 Reconnaissance and Information Gathering  A hacker.docx
Lab-4 Reconnaissance and Information Gathering         A hacker.docxLab-4 Reconnaissance and Information Gathering         A hacker.docx
Lab-4 Reconnaissance and Information Gathering  A hacker.docx
 
Computer security
Computer securityComputer security
Computer security
 
The FatRat
The FatRatThe FatRat
The FatRat
 
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
 
Hacking Client Side Insecurities
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecurities
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 
Security Handbook
 Security Handbook Security Handbook
Security Handbook
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
 
How to measure your security response readiness?
How to measure your security response readiness?How to measure your security response readiness?
How to measure your security response readiness?
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Fake malware and virus scanners
Fake malware and virus scannersFake malware and virus scanners
Fake malware and virus scanners
 
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network SecurityMMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 
G3t R00t at IUT
G3t R00t at IUTG3t R00t at IUT
G3t R00t at IUT
 

Último

Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 

Último (17)

Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 

Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.

  • 1. www.Garage4Hackers.com Lessons learned tracking an APT team Advance Persistent Threats [APT] Tracking for Dummies http:/www.Garage4Hackers.com Garage4Hackers
  • 2. About Me [Garage4Hackers ] A community of like minded security folks. Garage4Hackers Forum based community www.Garage4Hackers.com. Ranchoddas Series Webcast every month [promoting free info sec education]. :- THN is one of our biggest supporter. www.garage4hackers.com/ranchoddas-webcast https://twitter.com/Garage4Hackers Our views and opinions do not represent those of our employers.
  • 3. Netravler APT Attribution This talk would be on how we attributed the APT team behind Netravler . How we did it and how you could do the same. Reference: http://www.kaspersky.com/about/news/virus/2013/NetTraveler _is_back_with_new_tricks http://www.kaspersky.com/about/news/virus/2014/NetTraveler -Gets-Makeover-for-Tenth-Anniversary http://kasperskycontenthub.com/wp-content/ uploads/sites/43/vlpdfs/kaspersky-the-net-traveler-part1- final.pdf
  • 4. Tracking an APT Team Agenda: Garage4Hackers Exploit/Malware analysis. Information gathering . Finding security bugs in attacker infrastructure. Taking over attacker Command and Controller servers. Identifying victims. Countering attacks. What ever mentioned in the talk today is based on data collected over an year. This research was done with active participation from g4h members
  • 5. The Attack. Spear-phishing :Comes form Spoofed email address via email. Garage4Hackers Watering hole technique (browser exploits, drive by downloads) to infect victims surfing the web
  • 6. Step 1: Email header analysis . Evidences to Collect. http://mxtoolbox.com/Public/Tools/EmailHeaders.aspx 1) Collect sender time, return path, SMTP address etc. Garage4Hackers
  • 7. Garage4Hackers Step 2: Exploit Analysis The objective is to identify/extract the malware dropped using the exploit. Collect Metadata embedded in the exploit . Find any piece of information that would help in attribution. Identify CVE using virustotal.com helps when the exploit is not a 0-day .
  • 8. Automated: MS-office exploit analysis. These sites should help. www.document-analyzer.net/ www.joesecurity.org http://scan.xecure-lab.com/ Garage4Hackers
  • 9. Extracting Malware out of Exploits. Manual: MS-office exploit analysis. Garage4Hackers Run the document file in a virtual machine and use process monitor to watch system level changes [drops at temp file]. Use Sandboxie to execute the document file and extract the binary. Load office in a debugger and put breakpoints at file write API.
  • 10. Evidences Collected from Step 1,2. Sent from a spoofed email address . The email contained a malicious attachment, which exploited cve- 2010-333 rtf exploit . Based on initial analysis the same malware samples were used to attacks Korea and Russia. Campaign that have been active since 2009 . Opening the exploit drops a legitimate file with md5: e617348b8947f28e2a280dd93c75a6ad. File Name: Jallianwala Bagh massacre a deeply shameful act.doc It drops the following binaries: c0c093987a55fe9ac61e6e2b5a362d51 netmgr.dll 8dc61b737990385473dca9bfc826727b winlogin.exe Garage4Hackers
  • 11. Step 3: Malware Analysis Evidences to Collect. Command and Control Domain names/ IP address. Whois Information about the IP address. Registrant Email Address Malware Activities. Interesting strings in Malware . Garage4Hackers
  • 12. Automated Malware Analysis http://anubis.iseclab.org/ https://aerie.cs.berkeley.edu/ http://camas.comodo.com/ http://eureka.cyber-ta.org/ https://malwr.com/submission/ http://www.threatexpert.com/submit.aspx Garage4Hackers http://www.threattracksecurity.com/resources/sandbox-malware- analysis.aspx Source: http://zeltser.com/reverse-malware/automated-malware-analysis.html
  • 13. Manual: Malware Analysis. Reversing Malware: • Normally controller information would be encrypted or encoded inside the malware. • Just run the malware in a debugger and then analyze the heap for IP address / Domain patters. • Alternately put breakpoint at Winsock Functions and analyze the stack . http://msdn.microsoft.com/en-us/ library/windows/desktop/ms7413 94(v=vs.85).aspx Garage4Hackers
  • 14. Manual: Malware Analysis. • You can figure out encryption/encoding algorithms. • The current malware compressed data and then base64 encoded them before sending them to attacker controlled servers. • Registry / File system values malwares write for persistence. Garage4Hackers
  • 15. Evidences Collected from Step 3. Controller Information: http://www.faceboak.net/2012nt/nettraveler.asp IP: 110.34.193.13 Request: Compressed+B64 encoded Get request Garage4Hackers
  • 16. Domain Information. IP address 110.34.193.13 hosted many domains . Also each domains we identified were behind the fast flux domain. Registrant email ID were found using whois and was used to reverse query other domains. Source: http://blogs.mcafee.com/mcafee-labs/ travnet-trojan-could-be-part-of-apt-campaign Garage4Hackers
  • 17. We wrote a Fast Flux Monitor Garage4Hackers • Collected all IP address associated with the group. • Created another program to get whois info of all these IP address registration information.
  • 18. Garage4Hackers Step 4: Offensive Attacks on C&C Collect information about victims. Find information about attackers . Identify stolen information . Collect tools used by attackers. Learn about attacker tools and tactics. Some time you find 0-days on these server, this would give better protection. “The only real defense is offensive defense” (Mao Zedong)
  • 19. Find Vulnerabilities. On the C&C application . On the hosted server . Or what ever evil ways you could think about. Garage4Hackers We found a lame bug in the controller application and we had our first non-interactive shell on the controller.
  • 20. Attack the Attackers Garage4Hackers
  • 21. Result Huge no of C&C servers were under control. Lot of evidences to collect. Garage4Hackers
  • 22. They looked for : - .ppt(x) , .xls(x) .doc(x) .pdf Encrypted ??: • The contents were compressed and unusable. • Decompression was needed to convert it back to a usable format. Garage4Hackers
  • 23. Lots of Data and Lots of Victims Garage4Hackers Source: http://www.kaspersky.com/about/news/virus/2014/NetTraveler-Gets-Makeover-for-Tenth-Anniversary
  • 24. Evidences Collected Webserver logs, System logs . Activity and admin login logs. Victim Information. IP address and Mac Address. Highlights: 1. Attackers where behind a proxy. 2. Military like working pattern identified 24/7. 3. The controller admins showed lack of technicalskills. (So the developers of Nettravler is not themaintainers of the controllers. ) Garage4Hackers 00 ** ** ** 01 ** ** 02 ** ** ** 03 ** ** 04 ** ** 05 ** ** 06 ** ** 07 ** ** ** 08 ** ** 09 ** ** 10 ** 11 ** ** ** 12 ** ** ** M T W T F S SU
  • 25. Retaliation by AttackersGarage4Hackers While analyzing the data on the controllers, we were attacked by the attackers. The attacker attacked from 61.178.77.18 IP and tried to sent Ms08- 067 exploit . 61.178.77.* is a notorious IP range and is attributed in many attacks against governments around the world. Some advance googling, we stumbled upon an interesting discovery, soldiers from PLA Lanzhou camp talking about their experiences and the above IP was there . http://tieba.baidu.com/f?ct=335544320&lm=0&rn=30&tn= postBrowserN&sc=0&z=65932096&pn=0&word=%C1%D 9%D4%F3 The Lanzhou Military Region is one of seven military regions in the People's Republic of China.
  • 26. Netravler Attribution Huge amount spent for the malware infrastructure [Military funds]. 24/7 Working hours [Military working hours] . Low technical skills, developers of Netravler were different from the maintainers [ Trained users not core hackers]. IP address attribution to PLA[People liberation Army] military camp. All evidences were leading to PLA IT department Lanzhou .
  • 27. The End Not really :D Garage4Hackers
  • 28. Tracking the SMTP server. Garage4Hackers Finger print IP address of SMTP server from Email header analysis . Identified an Exploit/Phishing mailer kit named Chilly fisher Go to step 4, identify vulnerabilities in the server hosting the exploit kit.
  • 29. Chilly Fisher Exploit Kit Garage4Hackers The kit had a frontend and Backend code . The function of the Front end code was to send mass phishing/exploit emails to targets. The front end code allowed attackers to mass include target emails, subject and email content. The phishing email sent has a hyperlink with unique callback to the backend code. The kit contained a phishing and browser exploit module .
  • 31. Chillyfisher Database Garage4Hackers The backend database used is MS-Access . All collected information is stored in this database. Chillyfisher instance had "Loginlog" table having information's about ChillyFisher admins who logged into the control panel.
  • 32. IP attribution. All the logged in Admins were from China. Garage4Hackers There were around 10,000 unique IP address found in target db.

Notas do Editor

  1. I was privilaged to publish my research papers in many prominent Security conferecnes.
  2. Advanced Persistent Threat (APT) APT is a set of stealthy and continuous computer hacking processes, often orchestrated by human(s) targeting a specific entity. APT usually targets organizations and or nations for business or political motives. So if ever your organization is attacked , this talk would be useful in tracking the culprits.