SlideShare uma empresa Scribd logo
1 de 30
Dr	
  Andrew	
  Clark	
  
Senior	
  Technical	
  Advisor,	
  CERT	
  Australia	
  
Tracking	
  cyber	
  kidnappers	
  
APRICOT	
  2015,	
  Fukuoka	
  
APCERT	
  Security	
  Track	
  
data
Tracking	
  cyber	
  kidnappers	
  
data
Presenta2on	
  overview	
  
•  About	
  CERT	
  Australia	
  
•  Ransomware	
  campaign	
  targeGng	
  Australia	
  
–  CharacterisGcs	
  
–  Response	
  
–  Analysis	
  
•  Related	
  campaigns	
  
•  Conclusion	
  
2	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
Tracking	
  cyber	
  kidnappers	
  
data
•  Provides	
  major	
  Australian	
  
businesses	
  with	
  informaGon	
  
about	
  cyber	
  threats	
  and	
  
support	
  in	
  responding	
  to	
  
cyber	
  security	
  incidents	
  
•  Focus	
  on	
  systems	
  of	
  naGonal	
  
interest,	
  including	
  criGcal	
  
infrastructure	
  
About	
  CERT	
  Australia	
  
3	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
Tracking	
  cyber	
  kidnappers	
  
data
•  Trusted	
  source	
  of	
  informaGon	
  for	
  partners	
  
(over	
  500	
  Australian	
  businesses)	
  
•  ParGcipant	
  in	
  a	
  global	
  network	
  of	
  naGonal	
  
CERTs,	
  including	
  APCERT	
  
About	
  CERT	
  Australia	
  
4	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
Tracking	
  cyber	
  kidnappers	
  
data
CERT	
  Australia	
  services	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
5	
  
Proac2ve	
  
Reac2ve	
  
Publica2ons	
  
v  Advisories	
  
v  Good	
  pracGce	
  guides	
  
v  Protect	
  products	
  	
  
	
  
Informa2on	
  exchanges	
  
v  Regional	
  	
  
v  NaGonal	
  	
  
	
  
Training	
  and	
  Exercises	
  
v  ICS	
  /	
  domesGc	
  training	
  	
  
v  Eg.	
  Cyber	
  Storm	
  
v  Regional	
  exercises	
  
v  Custom	
  exercises	
  
	
  
Assistance	
  /	
  support	
  to	
  
v  ACSC	
  agency	
  partners	
  
v  Hotline	
  
	
  
Ac2vi2es	
  
v  Onsite	
  assistance	
  
(e.g.	
  major	
  ISPs,	
  
technology	
  companies)	
  
v  CND	
  advice	
  
v  Offsite	
  malware,	
  log	
  and	
  
other	
  analysis	
  
	
  
Tracking	
  cyber	
  kidnappers	
  
data
Background	
  
•  In	
  late	
  2013,	
  CERT	
  Australia	
  began	
  tracking	
  an	
  internaGonal	
  
ransomware	
  campaign	
  targeGng	
  Australia	
  
•  The	
  aWack	
  was	
  prolonged	
  
–  persisGng	
  throughout	
  2014	
  (and	
  into	
  2015)	
  
–  affected	
  a	
  large	
  range	
  of	
  partners,	
  across	
  all	
  sectors	
  
•  The	
  email	
  lures	
  used	
  localised	
  themes	
  
•  The	
  infrastructure	
  shiYed	
  rapidly	
  to	
  confound	
  detecGon	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
6	
  
Tracking	
  cyber	
  kidnappers	
  
data
Background	
  –	
  targe2ng*	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
7	
  *	
  Source:	
  “TorrentLocker:	
  Ransomware	
  in	
  a	
  country	
  near	
  you”,	
  M-­‐E.M.	
  Léveillé,	
  December	
  2014.	
  	
  
Tracking	
  cyber	
  kidnappers	
  
data
The	
  ‘business’	
  model	
  (a.k.a.	
  TorrentLocker)	
  
1.  Send	
  themed	
  spam	
  containing	
  website	
  link	
  to	
  vicGm	
  
(official	
  looking	
  domain	
  names,	
  e.g.	
  aus-­‐post.info)	
  
2.  VicGm	
  visits	
  website	
  and	
  downloads	
  ‘bill’	
  or	
  
‘viewer’	
  (malware)	
  and	
  runs	
  it	
  
3.  Malware	
  encrypts	
  files	
  (including	
  those	
  on	
  network	
  
shares)	
  and	
  asks	
  for	
  ransom	
  to	
  decrypt	
  them	
  
4.  VicGm	
  pays	
  ransom	
  (BitCoins)	
  via	
  TOR-­‐protected	
  site	
  
5.  VicGm	
  downloads	
  decrypGon	
  program	
  to	
  decrypt	
  files	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
8	
  
Tracking	
  cyber	
  kidnappers	
  
data
Campaign	
  characteris2cs	
  
•  Keep	
  ‘consumers’	
  (vicGms)	
  confident	
  
–  Re-­‐used	
  previous	
  campaign	
  branding	
  (CryptoLocker)	
  
–  Won’t	
  pay	
  if	
  they’re	
  not	
  going	
  to	
  get	
  their	
  files	
  back	
  
•  Constantly	
  evolving	
  
–  New	
  domains	
  registered	
  almost	
  daily	
  
•  	
  to	
  keep	
  ahead	
  of	
  takedowns	
  
–  Malware	
  binary	
  changed	
  almost	
  daily	
  
•  to	
  keep	
  ahead	
  of	
  anG-­‐virus	
  updates	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
9	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
10	
  
AV	
  resistant	
  for	
  24-­‐48	
  hrs	
  
11	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
Tracking	
  cyber	
  kidnappers	
  
data
Campaign	
  characteris2cs	
  
•  Constantly	
  evolving	
  (cont.)	
  
–  New	
  infrastructure	
  (IP	
  addresses)	
  
–  Regular	
  theme	
  updates	
  
•  Australia	
  Post	
  (parcel	
  to	
  collect)	
  
•  Energy	
  Australia	
  (electricity	
  bill)	
  
•  Telstra	
  (telephone	
  bill)	
  
•  NSW	
  Government	
  (traffic	
  speeding	
  fine)	
  
•  Various	
  other	
  internaGonal	
  flavours	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
12	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
13	
  
postaut.com/	
  
energy-­‐objecGve.com/	
  
Examples	
  
energy-­‐australia.org	
  
energyaaa.com	
  
energyai.net	
  
energymar.com	
  
14	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
telstraa.biz/	
  
Examples	
  
telstra-­‐info.com	
  
teltsra.net	
  
tesltra.org	
  
tesltraa.org	
  
15	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
details-­‐nsw1-­‐gov.net/	
  
Examples	
  
nsw-­‐gov.net	
  
osr-­‐nsw-­‐gov.net	
  
state-­‐nsw-­‐gov.com	
  
penalty-­‐nsw-­‐gov.org	
  
16	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
csposta24.org/	
  
Examples	
  
cs-­‐post24.org	
  
cz-­‐posta.net	
  
cz-­‐post.net	
  
(Czech	
  Post)	
  
17	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
mysda24.org/	
  
Examples	
  
sda-­‐expresso24.com	
  
sda-­‐express24.org	
  
mysda24.com	
  
(Italian	
  Post)	
  
18	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
auspost-­‐home.com	
  ??	
  
Examples	
  
royalmail-­‐service.co.uk	
  
royalmail-­‐groupltd.net	
  
royalmail-­‐service.org	
  
royalmail-­‐tracking24.net	
  
	
  
	
  
19	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
Tracking	
  cyber	
  kidnappers	
  
data
Campaign	
  characteris2cs	
  
•  Constantly	
  evolving	
  (cont.)	
  
– InfecGon	
  vector	
  	
  
a.  vicGm	
  downloads	
  exe/rar/zip	
  
b.  aWachment	
  (Word)	
  with	
  malicious	
  macro	
  
–  macro	
  downloads	
  encrypGon	
  malware	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
20	
  
Examples:	
  
	
  
royalmail-­‐service.co.uk	
  
	
  
royalmail-­‐groupltd.net	
  
	
  
royalmail-­‐service.org	
  
	
  
royalmail-­‐
tracking24.net	
  
	
  
	
  
MACROS
Now with social
engineering
21	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
Tracking	
  cyber	
  kidnappers	
  
data
The	
  CERT’s	
  incident	
  response	
  role	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
22	
  
Analysis	
  
CERT	
  
VicGms	
  
Theme	
  
VicGms	
  
Partners	
  
Law	
  
Enforcement	
  
Samples	
  
Advice	
  
Samples	
  
Advisories	
  
and	
  
indicators	
  
Tracking	
  cyber	
  kidnappers	
  
data
Defending	
  against	
  ransomware	
  
•  Staff	
  educaGon	
  and	
  awareness	
  training	
  
•  ApplicaGon	
  whitelisGng	
  
–  Not	
  just	
  EXE’s	
  
–  DLL’s,	
  SCRIPTS	
  and	
  MACROS	
  !	
  
•  Restrict	
  admin	
  privileges	
  (to	
  reduce	
  impact)	
  
•  Regular	
  back-­‐ups	
  or	
  snapshots	
  (and	
  store	
  offline)	
  
•  Block	
  indicators	
  of	
  compromise	
  (IOCs)	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
23	
  
Tracking	
  cyber	
  kidnappers	
  
data
Analysis	
  -­‐	
  indicators	
  
•  Pre-­‐infecGon	
  
–  Email	
  messages	
  
•  sender,	
  subject,	
  links	
  (URLs)	
  
–  ‘Fake’	
  domains	
  (mimicking	
  valid	
  sites)	
  
•  Post-­‐infecGon	
  
–  C2	
  domains	
  &	
  IP	
  addresses	
  
–  File	
  names	
  and	
  hashes	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
24	
  
Tracking	
  cyber	
  kidnappers	
  
data
Analysis	
  –	
  indicator	
  sharing	
  
•  Express	
  indicators	
  in	
  STIX	
  format	
  
•  STIX:	
  Structured	
  Threat	
  InformaGon	
  eXpression	
  
–  highly	
  descripGve	
  
•  indicators,	
  observables,	
  TTPs,	
  CoA,	
  Kill	
  Chain	
  
–  machine	
  readable	
  
•  supported	
  by	
  growing	
  number	
  of	
  tools	
  
–  automated	
  sharing	
  via	
  TAXII	
  service	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
25	
  
Tracking	
  cyber	
  kidnappers	
  
data
Analysis	
  -­‐	
  links	
  to	
  other	
  campaigns	
  
•  Links	
  between	
  this	
  ransomware	
  campaign	
  and	
  
banking	
  trojans	
  have	
  been	
  idenGfied	
  
– Hesperbot	
  
– Dridex	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
26	
  
Info.doc	
  “Invoice	
  Theme”	
  Macro	
  
MACRO	
  >	
  h[W]p://109.105.193[.]99/a.png	
  
C2	
  =	
  allwayshappy[.]ru	
  	
  	
  	
  (Dridex)	
  	
  
MACRO	
  >	
  h[W]p://officeimage[.]ru/au.png	
  
C2	
  =	
  casinoroyal7[.]ru	
  	
  	
  (TorrentLocker)	
  
	
  
Order.doc	
  “Invoice	
  Theme”	
  Macro	
  
Australia	
  Post	
  Phishing	
  
aupostalservice24[.]org	
  
track_309280983902001.EXE	
  
(MD5:	
  381e3c5e57431ecbeb072463cacd2056)	
  	
  
C2	
  =	
  casinoroyal7[.]ru	
  	
  (TorrentLocker)	
  
	
  
Nsw-­‐gov	
  Speeding	
  Fine	
  Phishing	
  
	
  
penalty_id_879847922.exe	
  	
  
(MD5:	
  D0533A17312C65B5C5560696E4CA994C)	
  
C2	
  =	
  allwayshappy[.]ru	
  	
  (TorrentLocker)	
  
	
  
Metadata	
  linked	
  
C2	
  linked	
   C2	
  linked	
  
Same	
  IP	
  
27	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
Tracking	
  cyber	
  kidnappers	
  
data
Analysis	
  –	
  Word	
  Macro	
  observa2ons	
  
•  As	
  before,	
  actors	
  are	
  conGnually	
  tweaking	
  techniques,	
  
also	
  modernising	
  old	
  techniques	
  
–  Early	
  word	
  macro	
  code	
  >	
  URL’s	
  were	
  in	
  clear	
  text	
  
–  Newer	
  variants	
  are	
  increasingly	
  more	
  obfuscated	
  
–  Password	
  protected	
  macro’s	
  appearing	
  
–  SANDBOXES	
  having	
  some	
  trouble	
  scanning	
  these	
  files	
  
–  Advanced	
  variants	
  uGlizing	
  Powershell	
  
–  Latest	
  variant	
  using	
  embedded	
  EXE’s,	
  smaller	
  footprint	
  
28	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
Tracking	
  cyber	
  kidnappers	
  
data
Australia	
  
Post	
  
Theme	
  
Oct	
  2013	
  
Hesperbot	
  
Australia	
  
Post	
  
Theme	
  
Nov	
  2013	
  
CryptoLocker	
  
Energy	
  
Australia	
  
Theme	
  
May	
  2014	
  
CryptoLocker	
  
/CryptoWall	
  
Telstra	
  
Theme	
  
Sep	
  2014	
  
TorrentLocker	
  
NSW-­‐Gov	
  
“RTA	
  Speeding	
  Fine”	
  
Theme	
  
Oct	
  2014	
  
TorrentLocker	
  
“Invoice”	
  
Theme	
  .DOC	
  Macros	
  
Oct	
  2014	
  
Dridex	
  /	
  	
  
TorrentLocker	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
29	
  
Tracking	
  cyber	
  kidnappers	
  
data
Conclusion	
  
•  Organised,	
  well	
  funded	
  and	
  VERY	
  persistent	
  
•  Prolific	
  -­‐	
  affecGng	
  government,	
  individuals,	
  small	
  and	
  large	
  businesses	
  
•  MulGple	
  countries	
  targeted,	
  with	
  localised	
  themes	
  
•  Actors	
  are	
  nimble	
  and	
  conGnually	
  tweaking	
  techniques	
  
–  TorrentLocker	
  updated	
  within	
  a	
  week	
  to	
  patch	
  a	
  “XOR”	
  bug	
  allowing	
  decrypGon.	
  
(September	
  2014)	
  
–  Phishing	
  websites	
  filtering	
  source	
  IP	
  address	
  via	
  country	
  
–  Freshly	
  compromised	
  WordPress	
  websites	
  used	
  in	
  phishing	
  emails	
  as	
  redirector	
  
links,	
  complicaGng	
  detecGon	
  and	
  filtering	
  
–  ConGnual	
  wave	
  of	
  new	
  IP	
  addresses	
  used	
  to	
  host	
  phishing	
  sites.	
  Clean	
  reputaGon,	
  
IP	
  addresses	
  mostly	
  not	
  seen	
  before.	
  
APRICOT	
  2015	
  –	
  Fukuoka	
  -­‐	
  APCERT	
  Security	
  Track	
  
30	
  

Mais conteúdo relacionado

Mais procurados

IANA Transition Update, August 2016
IANA Transition Update, August 2016IANA Transition Update, August 2016
IANA Transition Update, August 2016APNIC
 
BKNIX Peering Forum: Quick introduction of HKIX
BKNIX Peering Forum: Quick introduction of HKIXBKNIX Peering Forum: Quick introduction of HKIX
BKNIX Peering Forum: Quick introduction of HKIXAPNIC
 
Government
Government Government
Government APNIC
 
CNNIC Update, by Jessica Shen [APNIC 38 / NIR SIG]
CNNIC Update, by Jessica Shen [APNIC 38 / NIR SIG]CNNIC Update, by Jessica Shen [APNIC 38 / NIR SIG]
CNNIC Update, by Jessica Shen [APNIC 38 / NIR SIG]APNIC
 
APNIC Update, APEC TEL 54
APNIC Update, APEC TEL 54APNIC Update, APEC TEL 54
APNIC Update, APEC TEL 54APNIC
 
CommuniCast 2014: APNIC Services Update
CommuniCast 2014: APNIC Services Update CommuniCast 2014: APNIC Services Update
CommuniCast 2014: APNIC Services Update APNIC
 
IPv4 Transfers, Taiwan Internet Forum
IPv4 Transfers, Taiwan Internet ForumIPv4 Transfers, Taiwan Internet Forum
IPv4 Transfers, Taiwan Internet ForumAPNIC
 
Myanmar Member Gathering
Myanmar Member GatheringMyanmar Member Gathering
Myanmar Member GatheringAPNIC
 
Internet Measurement Networks - SANOG 24
Internet Measurement Networks - SANOG 24Internet Measurement Networks - SANOG 24
Internet Measurement Networks - SANOG 24APNIC
 
APNIC Update for ARIN 35
APNIC Update for ARIN 35APNIC Update for ARIN 35
APNIC Update for ARIN 35APNIC
 
AFRINIC 26/AIS 2017: APNIC Update
AFRINIC 26/AIS 2017: APNIC UpdateAFRINIC 26/AIS 2017: APNIC Update
AFRINIC 26/AIS 2017: APNIC UpdateAPNIC
 
IANA Activities Update by Elise Gerich [APRICOT 2015]
IANA Activities Update by Elise Gerich [APRICOT 2015]IANA Activities Update by Elise Gerich [APRICOT 2015]
IANA Activities Update by Elise Gerich [APRICOT 2015]APNIC
 
ITU-APNIC collaboration on the transition from IPv4 to IPv6
ITU-APNIC collaboration on the transition from IPv4 to IPv6ITU-APNIC collaboration on the transition from IPv4 to IPv6
ITU-APNIC collaboration on the transition from IPv4 to IPv6APNIC
 
APNIC Update: btNOG 3
APNIC Update: btNOG 3APNIC Update: btNOG 3
APNIC Update: btNOG 3APNIC
 
IOT, It's the Internet...only bigger
IOT, It's the Internet...only biggerIOT, It's the Internet...only bigger
IOT, It's the Internet...only biggerAPNIC
 
APNIC Member Services
APNIC Member ServicesAPNIC Member Services
APNIC Member ServicesAPNIC
 
AFRINIC 24 - APNIC Update
AFRINIC 24 - APNIC UpdateAFRINIC 24 - APNIC Update
AFRINIC 24 - APNIC UpdateRobbie Mitchell
 
PNG IXP Inauguration: APNIC Update
PNG IXP Inauguration: APNIC UpdatePNG IXP Inauguration: APNIC Update
PNG IXP Inauguration: APNIC UpdateAPNIC
 
Internet infrastructure in South Asia
Internet infrastructure in South AsiaInternet infrastructure in South Asia
Internet infrastructure in South AsiaAPNIC
 
34 - IDNOG03 - Fakrul Alam (APNIC) - Securing Global Routing System and Oper...
34 - IDNOG03  - Fakrul Alam (APNIC) - Securing Global Routing System and Oper...34 - IDNOG03  - Fakrul Alam (APNIC) - Securing Global Routing System and Oper...
34 - IDNOG03 - Fakrul Alam (APNIC) - Securing Global Routing System and Oper...Indonesia Network Operators Group
 

Mais procurados (20)

IANA Transition Update, August 2016
IANA Transition Update, August 2016IANA Transition Update, August 2016
IANA Transition Update, August 2016
 
BKNIX Peering Forum: Quick introduction of HKIX
BKNIX Peering Forum: Quick introduction of HKIXBKNIX Peering Forum: Quick introduction of HKIX
BKNIX Peering Forum: Quick introduction of HKIX
 
Government
Government Government
Government
 
CNNIC Update, by Jessica Shen [APNIC 38 / NIR SIG]
CNNIC Update, by Jessica Shen [APNIC 38 / NIR SIG]CNNIC Update, by Jessica Shen [APNIC 38 / NIR SIG]
CNNIC Update, by Jessica Shen [APNIC 38 / NIR SIG]
 
APNIC Update, APEC TEL 54
APNIC Update, APEC TEL 54APNIC Update, APEC TEL 54
APNIC Update, APEC TEL 54
 
CommuniCast 2014: APNIC Services Update
CommuniCast 2014: APNIC Services Update CommuniCast 2014: APNIC Services Update
CommuniCast 2014: APNIC Services Update
 
IPv4 Transfers, Taiwan Internet Forum
IPv4 Transfers, Taiwan Internet ForumIPv4 Transfers, Taiwan Internet Forum
IPv4 Transfers, Taiwan Internet Forum
 
Myanmar Member Gathering
Myanmar Member GatheringMyanmar Member Gathering
Myanmar Member Gathering
 
Internet Measurement Networks - SANOG 24
Internet Measurement Networks - SANOG 24Internet Measurement Networks - SANOG 24
Internet Measurement Networks - SANOG 24
 
APNIC Update for ARIN 35
APNIC Update for ARIN 35APNIC Update for ARIN 35
APNIC Update for ARIN 35
 
AFRINIC 26/AIS 2017: APNIC Update
AFRINIC 26/AIS 2017: APNIC UpdateAFRINIC 26/AIS 2017: APNIC Update
AFRINIC 26/AIS 2017: APNIC Update
 
IANA Activities Update by Elise Gerich [APRICOT 2015]
IANA Activities Update by Elise Gerich [APRICOT 2015]IANA Activities Update by Elise Gerich [APRICOT 2015]
IANA Activities Update by Elise Gerich [APRICOT 2015]
 
ITU-APNIC collaboration on the transition from IPv4 to IPv6
ITU-APNIC collaboration on the transition from IPv4 to IPv6ITU-APNIC collaboration on the transition from IPv4 to IPv6
ITU-APNIC collaboration on the transition from IPv4 to IPv6
 
APNIC Update: btNOG 3
APNIC Update: btNOG 3APNIC Update: btNOG 3
APNIC Update: btNOG 3
 
IOT, It's the Internet...only bigger
IOT, It's the Internet...only biggerIOT, It's the Internet...only bigger
IOT, It's the Internet...only bigger
 
APNIC Member Services
APNIC Member ServicesAPNIC Member Services
APNIC Member Services
 
AFRINIC 24 - APNIC Update
AFRINIC 24 - APNIC UpdateAFRINIC 24 - APNIC Update
AFRINIC 24 - APNIC Update
 
PNG IXP Inauguration: APNIC Update
PNG IXP Inauguration: APNIC UpdatePNG IXP Inauguration: APNIC Update
PNG IXP Inauguration: APNIC Update
 
Internet infrastructure in South Asia
Internet infrastructure in South AsiaInternet infrastructure in South Asia
Internet infrastructure in South Asia
 
34 - IDNOG03 - Fakrul Alam (APNIC) - Securing Global Routing System and Oper...
34 - IDNOG03  - Fakrul Alam (APNIC) - Securing Global Routing System and Oper...34 - IDNOG03  - Fakrul Alam (APNIC) - Securing Global Routing System and Oper...
34 - IDNOG03 - Fakrul Alam (APNIC) - Securing Global Routing System and Oper...
 

Semelhante a Tracking cyber kidnappers by Andrew Clark [APRICOT 2015]

CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]APNIC
 
PITA 22: Addressing interconnection and security in the Pacific
PITA 22: Addressing interconnection and security in the PacificPITA 22: Addressing interconnection and security in the Pacific
PITA 22: Addressing interconnection and security in the PacificAPNIC
 
Incident Handling in a BYOD Environment
Incident Handling in a BYOD EnvironmentIncident Handling in a BYOD Environment
Incident Handling in a BYOD EnvironmentIben Rodriguez
 
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyScience of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyShawn Riley
 
Splunk for Security: Background & Customer Case Study
Splunk for Security: Background & Customer Case StudySplunk for Security: Background & Customer Case Study
Splunk for Security: Background & Customer Case StudyAndrew Gerber
 
SplunkLive! Customer Presentation – UMCP
SplunkLive! Customer Presentation – UMCPSplunkLive! Customer Presentation – UMCP
SplunkLive! Customer Presentation – UMCPSplunk
 
Security tools
Security toolsSecurity tools
Security toolsAdri Jovin
 
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntopIT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntopInfluxData
 
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am GamesScalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am GamesScalar Decisions
 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...REVULN
 
Mitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuMitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuNixu Corporation
 
Current Conditions and Challenges of Cybersecurity in Taiwan
Current Conditions and Challenges of Cybersecurity in TaiwanCurrent Conditions and Challenges of Cybersecurity in Taiwan
Current Conditions and Challenges of Cybersecurity in TaiwanAPNIC
 
2014-12-16 defense news - shutdown the hackers
2014-12-16  defense news - shutdown the hackers2014-12-16  defense news - shutdown the hackers
2014-12-16 defense news - shutdown the hackersShawn Wells
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSavvius, Inc
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 
Urooj's Resume May16
Urooj's Resume May16Urooj's Resume May16
Urooj's Resume May16Urooj Pasha
 
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with trainingASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with trainingAPNIC
 

Semelhante a Tracking cyber kidnappers by Andrew Clark [APRICOT 2015] (20)

CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
PITA 22: Addressing interconnection and security in the Pacific
PITA 22: Addressing interconnection and security in the PacificPITA 22: Addressing interconnection and security in the Pacific
PITA 22: Addressing interconnection and security in the Pacific
 
Incident Handling in a BYOD Environment
Incident Handling in a BYOD EnvironmentIncident Handling in a BYOD Environment
Incident Handling in a BYOD Environment
 
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyScience of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis Methodology
 
Splunk for Security: Background & Customer Case Study
Splunk for Security: Background & Customer Case StudySplunk for Security: Background & Customer Case Study
Splunk for Security: Background & Customer Case Study
 
CompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and TricksCompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and Tricks
 
SplunkLive! Customer Presentation – UMCP
SplunkLive! Customer Presentation – UMCPSplunkLive! Customer Presentation – UMCP
SplunkLive! Customer Presentation – UMCP
 
Security tools
Security toolsSecurity tools
Security tools
 
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntopIT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
 
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am GamesScalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
 
Incident handling of cyber espionage
Incident handling of cyber espionageIncident handling of cyber espionage
Incident handling of cyber espionage
 
Mitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuMitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo Nixu
 
Current Conditions and Challenges of Cybersecurity in Taiwan
Current Conditions and Challenges of Cybersecurity in TaiwanCurrent Conditions and Challenges of Cybersecurity in Taiwan
Current Conditions and Challenges of Cybersecurity in Taiwan
 
2014-12-16 defense news - shutdown the hackers
2014-12-16  defense news - shutdown the hackers2014-12-16  defense news - shutdown the hackers
2014-12-16 defense news - shutdown the hackers
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network Attacks
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
Urooj's Resume May16
Urooj's Resume May16Urooj's Resume May16
Urooj's Resume May16
 
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with trainingASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
 

Mais de APNIC

IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonAPNIC
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonAPNIC
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPNIC
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6APNIC
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!APNIC
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023APNIC
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAPNIC
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAPNIC
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAPNIC
 
AFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & DevelopmentAFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & DevelopmentAPNIC
 
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAfghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAPNIC
 
IDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerationsIDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerationsAPNIC
 
IDNIC OPM 2023 - Internet Number Registry System
IDNIC OPM 2023 - Internet Number Registry SystemIDNIC OPM 2023 - Internet Number Registry System
IDNIC OPM 2023 - Internet Number Registry SystemAPNIC
 

Mais de APNIC (20)

IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment Status
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressing
 
AFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & DevelopmentAFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & Development
 
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAfghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
 
IDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerationsIDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerations
 
IDNIC OPM 2023 - Internet Number Registry System
IDNIC OPM 2023 - Internet Number Registry SystemIDNIC OPM 2023 - Internet Number Registry System
IDNIC OPM 2023 - Internet Number Registry System
 

Último

Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 

Último (20)

Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 

Tracking cyber kidnappers by Andrew Clark [APRICOT 2015]

  • 1. Dr  Andrew  Clark   Senior  Technical  Advisor,  CERT  Australia   Tracking  cyber  kidnappers   APRICOT  2015,  Fukuoka   APCERT  Security  Track   data
  • 2. Tracking  cyber  kidnappers   data Presenta2on  overview   •  About  CERT  Australia   •  Ransomware  campaign  targeGng  Australia   –  CharacterisGcs   –  Response   –  Analysis   •  Related  campaigns   •  Conclusion   2   APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track  
  • 3. Tracking  cyber  kidnappers   data •  Provides  major  Australian   businesses  with  informaGon   about  cyber  threats  and   support  in  responding  to   cyber  security  incidents   •  Focus  on  systems  of  naGonal   interest,  including  criGcal   infrastructure   About  CERT  Australia   3   APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track  
  • 4. Tracking  cyber  kidnappers   data •  Trusted  source  of  informaGon  for  partners   (over  500  Australian  businesses)   •  ParGcipant  in  a  global  network  of  naGonal   CERTs,  including  APCERT   About  CERT  Australia   4   APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track  
  • 5. Tracking  cyber  kidnappers   data CERT  Australia  services   APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track   5   Proac2ve   Reac2ve   Publica2ons   v  Advisories   v  Good  pracGce  guides   v  Protect  products       Informa2on  exchanges   v  Regional     v  NaGonal       Training  and  Exercises   v  ICS  /  domesGc  training     v  Eg.  Cyber  Storm   v  Regional  exercises   v  Custom  exercises     Assistance  /  support  to   v  ACSC  agency  partners   v  Hotline     Ac2vi2es   v  Onsite  assistance   (e.g.  major  ISPs,   technology  companies)   v  CND  advice   v  Offsite  malware,  log  and   other  analysis    
  • 6. Tracking  cyber  kidnappers   data Background   •  In  late  2013,  CERT  Australia  began  tracking  an  internaGonal   ransomware  campaign  targeGng  Australia   •  The  aWack  was  prolonged   –  persisGng  throughout  2014  (and  into  2015)   –  affected  a  large  range  of  partners,  across  all  sectors   •  The  email  lures  used  localised  themes   •  The  infrastructure  shiYed  rapidly  to  confound  detecGon   APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track   6  
  • 7. Tracking  cyber  kidnappers   data Background  –  targe2ng*   APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track   7  *  Source:  “TorrentLocker:  Ransomware  in  a  country  near  you”,  M-­‐E.M.  Léveillé,  December  2014.    
  • 8. Tracking  cyber  kidnappers   data The  ‘business’  model  (a.k.a.  TorrentLocker)   1.  Send  themed  spam  containing  website  link  to  vicGm   (official  looking  domain  names,  e.g.  aus-­‐post.info)   2.  VicGm  visits  website  and  downloads  ‘bill’  or   ‘viewer’  (malware)  and  runs  it   3.  Malware  encrypts  files  (including  those  on  network   shares)  and  asks  for  ransom  to  decrypt  them   4.  VicGm  pays  ransom  (BitCoins)  via  TOR-­‐protected  site   5.  VicGm  downloads  decrypGon  program  to  decrypt  files   APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track   8  
  • 9. Tracking  cyber  kidnappers   data Campaign  characteris2cs   •  Keep  ‘consumers’  (vicGms)  confident   –  Re-­‐used  previous  campaign  branding  (CryptoLocker)   –  Won’t  pay  if  they’re  not  going  to  get  their  files  back   •  Constantly  evolving   –  New  domains  registered  almost  daily   •   to  keep  ahead  of  takedowns   –  Malware  binary  changed  almost  daily   •  to  keep  ahead  of  anG-­‐virus  updates   APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track   9  
  • 10. APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track   10  
  • 11. AV  resistant  for  24-­‐48  hrs   11   APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track  
  • 12. Tracking  cyber  kidnappers   data Campaign  characteris2cs   •  Constantly  evolving  (cont.)   –  New  infrastructure  (IP  addresses)   –  Regular  theme  updates   •  Australia  Post  (parcel  to  collect)   •  Energy  Australia  (electricity  bill)   •  Telstra  (telephone  bill)   •  NSW  Government  (traffic  speeding  fine)   •  Various  other  internaGonal  flavours   APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track   12  
  • 13. APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track   13   postaut.com/  
  • 14. energy-­‐objecGve.com/   Examples   energy-­‐australia.org   energyaaa.com   energyai.net   energymar.com   14   APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track  
  • 15. telstraa.biz/   Examples   telstra-­‐info.com   teltsra.net   tesltra.org   tesltraa.org   15   APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track  
  • 16. details-­‐nsw1-­‐gov.net/   Examples   nsw-­‐gov.net   osr-­‐nsw-­‐gov.net   state-­‐nsw-­‐gov.com   penalty-­‐nsw-­‐gov.org   16   APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track  
  • 17. csposta24.org/   Examples   cs-­‐post24.org   cz-­‐posta.net   cz-­‐post.net   (Czech  Post)   17   APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track  
  • 18. mysda24.org/   Examples   sda-­‐expresso24.com   sda-­‐express24.org   mysda24.com   (Italian  Post)   18   APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track  
  • 19. auspost-­‐home.com  ??   Examples   royalmail-­‐service.co.uk   royalmail-­‐groupltd.net   royalmail-­‐service.org   royalmail-­‐tracking24.net       19   APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track  
  • 20. Tracking  cyber  kidnappers   data Campaign  characteris2cs   •  Constantly  evolving  (cont.)   – InfecGon  vector     a.  vicGm  downloads  exe/rar/zip   b.  aWachment  (Word)  with  malicious  macro   –  macro  downloads  encrypGon  malware   APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track   20  
  • 21. Examples:     royalmail-­‐service.co.uk     royalmail-­‐groupltd.net     royalmail-­‐service.org     royalmail-­‐ tracking24.net       MACROS Now with social engineering 21   APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track  
  • 22. Tracking  cyber  kidnappers   data The  CERT’s  incident  response  role   APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track   22   Analysis   CERT   VicGms   Theme   VicGms   Partners   Law   Enforcement   Samples   Advice   Samples   Advisories   and   indicators  
  • 23. Tracking  cyber  kidnappers   data Defending  against  ransomware   •  Staff  educaGon  and  awareness  training   •  ApplicaGon  whitelisGng   –  Not  just  EXE’s   –  DLL’s,  SCRIPTS  and  MACROS  !   •  Restrict  admin  privileges  (to  reduce  impact)   •  Regular  back-­‐ups  or  snapshots  (and  store  offline)   •  Block  indicators  of  compromise  (IOCs)   APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track   23  
  • 24. Tracking  cyber  kidnappers   data Analysis  -­‐  indicators   •  Pre-­‐infecGon   –  Email  messages   •  sender,  subject,  links  (URLs)   –  ‘Fake’  domains  (mimicking  valid  sites)   •  Post-­‐infecGon   –  C2  domains  &  IP  addresses   –  File  names  and  hashes   APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track   24  
  • 25. Tracking  cyber  kidnappers   data Analysis  –  indicator  sharing   •  Express  indicators  in  STIX  format   •  STIX:  Structured  Threat  InformaGon  eXpression   –  highly  descripGve   •  indicators,  observables,  TTPs,  CoA,  Kill  Chain   –  machine  readable   •  supported  by  growing  number  of  tools   –  automated  sharing  via  TAXII  service   APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track   25  
  • 26. Tracking  cyber  kidnappers   data Analysis  -­‐  links  to  other  campaigns   •  Links  between  this  ransomware  campaign  and   banking  trojans  have  been  idenGfied   – Hesperbot   – Dridex   APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track   26  
  • 27. Info.doc  “Invoice  Theme”  Macro   MACRO  >  h[W]p://109.105.193[.]99/a.png   C2  =  allwayshappy[.]ru        (Dridex)     MACRO  >  h[W]p://officeimage[.]ru/au.png   C2  =  casinoroyal7[.]ru      (TorrentLocker)     Order.doc  “Invoice  Theme”  Macro   Australia  Post  Phishing   aupostalservice24[.]org   track_309280983902001.EXE   (MD5:  381e3c5e57431ecbeb072463cacd2056)     C2  =  casinoroyal7[.]ru    (TorrentLocker)     Nsw-­‐gov  Speeding  Fine  Phishing     penalty_id_879847922.exe     (MD5:  D0533A17312C65B5C5560696E4CA994C)   C2  =  allwayshappy[.]ru    (TorrentLocker)     Metadata  linked   C2  linked   C2  linked   Same  IP   27   APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track  
  • 28. Tracking  cyber  kidnappers   data Analysis  –  Word  Macro  observa2ons   •  As  before,  actors  are  conGnually  tweaking  techniques,   also  modernising  old  techniques   –  Early  word  macro  code  >  URL’s  were  in  clear  text   –  Newer  variants  are  increasingly  more  obfuscated   –  Password  protected  macro’s  appearing   –  SANDBOXES  having  some  trouble  scanning  these  files   –  Advanced  variants  uGlizing  Powershell   –  Latest  variant  using  embedded  EXE’s,  smaller  footprint   28   APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track  
  • 29. Tracking  cyber  kidnappers   data Australia   Post   Theme   Oct  2013   Hesperbot   Australia   Post   Theme   Nov  2013   CryptoLocker   Energy   Australia   Theme   May  2014   CryptoLocker   /CryptoWall   Telstra   Theme   Sep  2014   TorrentLocker   NSW-­‐Gov   “RTA  Speeding  Fine”   Theme   Oct  2014   TorrentLocker   “Invoice”   Theme  .DOC  Macros   Oct  2014   Dridex  /     TorrentLocker   APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track   29  
  • 30. Tracking  cyber  kidnappers   data Conclusion   •  Organised,  well  funded  and  VERY  persistent   •  Prolific  -­‐  affecGng  government,  individuals,  small  and  large  businesses   •  MulGple  countries  targeted,  with  localised  themes   •  Actors  are  nimble  and  conGnually  tweaking  techniques   –  TorrentLocker  updated  within  a  week  to  patch  a  “XOR”  bug  allowing  decrypGon.   (September  2014)   –  Phishing  websites  filtering  source  IP  address  via  country   –  Freshly  compromised  WordPress  websites  used  in  phishing  emails  as  redirector   links,  complicaGng  detecGon  and  filtering   –  ConGnual  wave  of  new  IP  addresses  used  to  host  phishing  sites.  Clean  reputaGon,   IP  addresses  mostly  not  seen  before.   APRICOT  2015  –  Fukuoka  -­‐  APCERT  Security  Track   30  

Notas do Editor

  1. To track the activity, the CERT worked closely with Stay Smart Online and other ACSC agencies, including the Australian Federal Police and the Australian Crime Commission. In particular, when the actors shifted to a new delivery mechanism using malicious Microsoft Word documents containing macros, the CERT was able to quickly identify the change and pre-warn its partners. The CERT facilitated and led the proactive defence effort by providing timely indicators of compromise to our partners, as well as assisting with infrastructure takedowns and victim recovery. This was accomplished through our own analysis and by leveraging our national and international partnerships. Throughout the campaign the CERT also provided its partners with longer term preventative strategies.
  2. Notice the 22558 captcha is re-used across campaigns.
  3. Notice the 22558 captcha is re-used across campaigns.
  4. Notice the 22558 captcha is re-used across campaigns. This Australia Post domain was also incorrectly configured by attackers with a UK Royal Mail splash page.
  5. Application whitelisting of macro’s is becoming an important consideration
  6. ANIMATED SLIDE Links exist between earlier Australia Post theme phishing emails distributing CryptoLocker/TorrentLocker and recent Word Documents Early word documents distributing TorrentLocker are clearly also linked to newer variants distributing Dridex banking malware. This was further shown when an Australia Post theme email containing a Word Document was first seen, late November 2014.
  7. We conducted an in-depth investigation because attacks were so prolific, prolonged and involved. Found rapidly changing lures, C2 infrastructure and implants – torrentlocker, cryptolocker, hesperbot, etc CERT able to provide proactive information to our members of this kind of attack, due in part to what our international partner certs had been seeing.
  8. Aspects of these campaigns: - Shadow Volume copies Ransom time limit Bitcoin ransom in AUD Domains also used to drop hesperbot and other trojans – usually banking Reputational damage to large business Worked with Stay Smart Online and CSOC / ACSC to provide readily available online advice and publicise these attacks to forewarn targets and assist those affected.