Log Stealers - Shopping time for Threat Actors!

Speck&Tech
Speck&TechSpeck&Tech
Log Stealers
Shopping time for Threat Actors!
Mirko Ioris & Francesco Pavanello - Cyber Security Technical Consultants
What is a log
stealer
malware?
Log (or information)
stealer malware is a type
of Trojan that gathers
sensitive data from the
compromised system and
sends it to the attacker.
Typical targets are login
credentials, credit card
information, crypto
wallets and browser
information (cookies,
history, autofill).
https://blog.sekoia.io/traffers-a-deep-dive-into-the-information-stealer-ecosystem
Log stealer malware infection chain
§ YouTube video on stolen account
§ Websites masquerading as blogs to deliver
password-protected archives
§ Software installation pages to deliver password-
protected archives
§ Phishing emails
§ Google ADS
https://blog.sekoia.io/traffers-a-deep-dive-into-the-information-stealer-ecosystem
Log Stealers
Redline
§ Available from: February 2020
(on WWH Club and BHF forum)
§ Owners: Glade aka REDGlade
§ Telegram channel: https://t.me/REDLINESELLER |
https://t.me/redlinesupport_new
§ Nationality: Russian
§ Other info: More than 2 Million records on Russian
Market
§ Service cost: from 100$ to 200$ per month
Redline
https://medium.com/s2wblog/deep-analysis-of-redline-stealer-leaked-credential-with-wcf-7b31901da904
Redline communication with the C2 server for retrieving configuration and send the stolen data.
Other stealers use similar methodologies.
§ Available from: 20/05/2019, version 2.0 from
15/09/2022 (on XSS forum)
§ Owners: @raccoonstealer on XSS forum
§ Other info: More than 1 Million records on Russian Market
§ Nationality: Ukrainian
§ Service cost: 200$ / month
§ Telegram channel: https://t.me/miaranimator |
https://t.me/gr33nl1ght
Raccoon
§ At least 50 million unique credentials stolen worldwide
§ FBI disclosure site on https://raccoon.ic3.gov/home
Raccoon
Marketplaces
Telegram markets
§ Independent sellers
§ Go here https://github.com/fastfire/deepdarkCTI/blob/main/telegram.md and search for 'logs'
2Easy Market
§ More than 850.000 records
§ Paid access
§ Catalogue: logs only
§ Log name format: prefix+unique numbers chars (i.e.
2easy_logs_651587.zip)
§ Deposit available in: Bitcoin BTC, Bitcoincash BCH, Dash DASH,
Dogecoin DOGE, Ethereum ETH, Ethereumclassic ETC, Litecoin
LTC, Monero XMR, Zcash
§ Can search for: Seller, Date, Country, Word Available metadata:
Links, Seller, Country, Installed Date, Price USD, Seller Rating
§ Online Support + Telegram chat for updates
Genesis Market
§ More than 460.000 records
§ Invitation access
§ Catalogue: logs only
§ Deposit available in: Bitcoin BTC, Litecoin LTC, Monero XMR,
Dashs
§ Offers tools like Genesis Security Plugin & Genesium Browser
§ Log name format: 32 hexadecimal chars (i.e.
7B034E8C77F92627192802CCCE2AB3DD.zip)
§ Can search for: Bot Name, Name, Domain, IP, Country, OS, Price
§ Available metadata: Links, Country, # of Resources, # of
Browsers, Installed Date, Updated Date, IP (first 2 triplets), OS,
Price USD
§ Online Support
`
Russian Market
§ More than 7.000.000 records
§ Paid access
§ Catalogue: logs, RDP access, PayPal accounts, credit cards
§ Log name format: prefix+unique numbers chars (i.e. LOGID-
5260493.zip)
§ Deposit available in: Bitcoin BTC, Ethereum ETH, Litecoin LTC
§ Can search for: stealer, state, ISP, System, City, Outlook,
Country, Zip, Links
§ Available metadata: Links, Stealer, Country, Structure, Installed
Date, Size, Vendor, Price USD, Online Support
Log
Example
Stealers organize logs in a ZIP folder. There is
no standard format but usually the following
are the information contained:
Log
Example
Stealers organize logs in a ZIP folder. There is
no standard format but usually the following
are the information contained:
Log
Example
Stealers organize logs in a ZIP folder. There is
no standard format but usually the following
are the information contained:
Log
Example
Stealers organize logs in a ZIP folder. There is
no standard format but usually the following
are the information contained:
Log
Example
Stealers organize logs in a ZIP folder. There is
no standard format but usually the following
are the information contained:
Market Scraper
Market scraper
§ A research should be done in OPSEC mode
§ Online
§ Keywords based the real domains:
wuerth-phoenix.com à rth-ph
§ A lot of garbage
§ Offline
§ Real domains
§ Evidence of interest
§ Useful Python libraries and API
§ Selenium
§ Pyppeteer & Beautifulsoup
§ Requests & Beautifulsoup
§ Undetectedchromedriver
§ 2Captcha API (charged)
Market scraper
§ A script divided in 2 phases:
§ Online
§ Login & captcha resolution
Market scraper
§ A script divided in 2 phases:
§ Online
§ Login & captcha resolution
Market scraper
§ A script divided in 2 phases:
§ Online
§ Login & captcha resolution
§ Research using keywords
Market scraper
§ A script divided in 2 phases:
§ Online
§ Login & captcha resolution
§ Research using keywords
§ Export of results in JSON format
Market scraper
§ A script divided in 2 phases:
§ Online
§ Login & captcha resolution
§ Research using keywords
§ Export of results in JSON format
§ Offline
§ Filtering results
§ Saving evidence on the database
SATAYO
integration
SATAYO integration
We have developed scrapers able to monitor the 3 major marketplaces (Russian, 2Easy, Genesis).
Evidence Analysis
§ Compromised system information
§ Identity of the victim
§ Credentials found within the log
§ Optional login test
§ Mitigation and suggestions
Fun Facts
Traffers analysis
Open Shodan and search using this dork: http.html:"stealer"
Traffers analysis
Open Shodan and search using this dork: http.html:"stealer"
2easy analysis
Open Shodan and search using this dork: http.html:“2easy.shop"
2easy analysis
Open Shodan and search using this dork: http.html:“2easy.shop"
Contact information
§ Mirko Ioris
§ - mirko.ioris@wuerth-phoenix.com
§ - linkedin.com/in/mirkoioris18
§ - @Mikkos
§ Francesco Pavanello
§ - francesco.pavanello@wuerth-phoenix.com
§ - linkedin.com/in/francescopavanello
§ - @frapava98
Thank you
Grazie Danke
#WEINNOVATE
1 de 35

Recomendados

WTF is Digital Risk Protection por
WTF is Digital Risk ProtectionWTF is Digital Risk Protection
WTF is Digital Risk ProtectionDigital Shadows
226 visualizações15 slides
Azure 仮想マシンにおける運用管理・高可用性設計のベストプラクティス por
Azure 仮想マシンにおける運用管理・高可用性設計のベストプラクティスAzure 仮想マシンにおける運用管理・高可用性設計のベストプラクティス
Azure 仮想マシンにおける運用管理・高可用性設計のベストプラクティスYusuke Oi
4K visualizações71 slides
Introduction to Cross Site Scripting ( XSS ) por
Introduction to Cross Site Scripting ( XSS )Introduction to Cross Site Scripting ( XSS )
Introduction to Cross Site Scripting ( XSS )Irfad Imtiaz
1.8K visualizações32 slides
S04_Microsoft XDR によるセキュアなハイブリッドクラウド環境の実現 [Microsoft Japan Digital Days] por
S04_Microsoft XDR によるセキュアなハイブリッドクラウド環境の実現 [Microsoft Japan Digital Days]S04_Microsoft XDR によるセキュアなハイブリッドクラウド環境の実現 [Microsoft Japan Digital Days]
S04_Microsoft XDR によるセキュアなハイブリッドクラウド環境の実現 [Microsoft Japan Digital Days]日本マイクロソフト株式会社
497 visualizações39 slides
Static Web AppsとBlazor WebAssemblyのすすめ por
Static Web AppsとBlazor  WebAssemblyのすすめStatic Web AppsとBlazor  WebAssemblyのすすめ
Static Web AppsとBlazor WebAssemblyのすすめTomomitsuKusaba
525 visualizações21 slides
seminar report on Sql injection por
seminar report on Sql injectionseminar report on Sql injection
seminar report on Sql injectionJawhar Ali
2.7K visualizações23 slides

Mais conteúdo relacionado

Mais procurados

Malware- Types, Detection and Future por
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Futurekaranwayne
6.2K visualizações15 slides
Rails の自動読み込みを支える技術 por
Rails の自動読み込みを支える技術Rails の自動読み込みを支える技術
Rails の自動読み込みを支える技術Tomohiko Himura
20.4K visualizações34 slides
DDoS対処の戦術と戦略 por
DDoS対処の戦術と戦略DDoS対処の戦術と戦略
DDoS対処の戦術と戦略Tomohiro Nakashima
6.4K visualizações40 slides
Sql injection por
Sql injectionSql injection
Sql injectionPallavi Biswas
27.7K visualizações16 slides
Web security por
Web securityWeb security
Web securityPadam Banthia
800 visualizações24 slides
從零架設直播伺服器 por
從零架設直播伺服器從零架設直播伺服器
從零架設直播伺服器Claire Chang
1.1K visualizações24 slides

Mais procurados(20)

Malware- Types, Detection and Future por karanwayne
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
karanwayne6.2K visualizações
Rails の自動読み込みを支える技術 por Tomohiko Himura
Rails の自動読み込みを支える技術Rails の自動読み込みを支える技術
Rails の自動読み込みを支える技術
Tomohiko Himura20.4K visualizações
DDoS対処の戦術と戦略 por Tomohiro Nakashima
DDoS対処の戦術と戦略DDoS対処の戦術と戦略
DDoS対処の戦術と戦略
Tomohiro Nakashima6.4K visualizações
Sql injection por Pallavi Biswas
Sql injectionSql injection
Sql injection
Pallavi Biswas27.7K visualizações
Web security por Padam Banthia
Web securityWeb security
Web security
Padam Banthia800 visualizações
從零架設直播伺服器 por Claire Chang
從零架設直播伺服器從零架設直播伺服器
從零架設直播伺服器
Claire Chang1.1K visualizações
SQL INJECTION por Anoop T
SQL INJECTIONSQL INJECTION
SQL INJECTION
Anoop T24.7K visualizações
de:code 2019 SE01 Azure Active Directory のログの"みかた“ - 長期保存・外部 SIEM 連携・分析手法 - por Dai Matsui
de:code 2019 SE01 Azure Active Directory のログの"みかた“- 長期保存・外部 SIEM 連携・分析手法 -de:code 2019 SE01 Azure Active Directory のログの"みかた“- 長期保存・外部 SIEM 連携・分析手法 -
de:code 2019 SE01 Azure Active Directory のログの"みかた“ - 長期保存・外部 SIEM 連携・分析手法 -
Dai Matsui1.3K visualizações
Ws2012フェールオーバークラスタリングdeep dive 130802 por wintechq
Ws2012フェールオーバークラスタリングdeep dive 130802Ws2012フェールオーバークラスタリングdeep dive 130802
Ws2012フェールオーバークラスタリングdeep dive 130802
wintechq9.7K visualizações
明日からはじめられる Docker + さくらvpsを使った開発環境構築 por MILI-LLC
明日からはじめられる Docker + さくらvpsを使った開発環境構築明日からはじめられる Docker + さくらvpsを使った開発環境構築
明日からはじめられる Docker + さくらvpsを使った開発環境構築
MILI-LLC1.5K visualizações
Metasploit por henelpj
MetasploitMetasploit
Metasploit
henelpj3.9K visualizações
INF-023_マイクロソフトの特権管理ソリューションの全貌 ~永続的な管理者特権の廃止への道~ por decode2016
INF-023_マイクロソフトの特権管理ソリューションの全貌 ~永続的な管理者特権の廃止への道~INF-023_マイクロソフトの特権管理ソリューションの全貌 ~永続的な管理者特権の廃止への道~
INF-023_マイクロソフトの特権管理ソリューションの全貌 ~永続的な管理者特権の廃止への道~
decode2016375 visualizações
OMG DDS Tutorial - Part I por Angelo Corsaro
OMG DDS Tutorial - Part IOMG DDS Tutorial - Part I
OMG DDS Tutorial - Part I
Angelo Corsaro2K visualizações
Azure Key Vault por junichi anno
Azure Key VaultAzure Key Vault
Azure Key Vault
junichi anno3.3K visualizações
とあるセキュリティ会社のIoTセキュリティチームの日常(ErrataはDescription参照) por Tatsuya (達也) Katsuhara (勝原)
とあるセキュリティ会社のIoTセキュリティチームの日常(ErrataはDescription参照)とあるセキュリティ会社のIoTセキュリティチームの日常(ErrataはDescription参照)
とあるセキュリティ会社のIoTセキュリティチームの日常(ErrataはDescription参照)
[db tech showcase Tokyo 2015] E27: Neo4jグラフデータベース by クリエーションライン株式会社 李昌桓 por Insight Technology, Inc.
[db tech showcase Tokyo 2015] E27: Neo4jグラフデータベース by クリエーションライン株式会社 李昌桓[db tech showcase Tokyo 2015] E27: Neo4jグラフデータベース by クリエーションライン株式会社 李昌桓
[db tech showcase Tokyo 2015] E27: Neo4jグラフデータベース by クリエーションライン株式会社 李昌桓
Insight Technology, Inc.10K visualizações
Active Directory とシームレスにマルチに連携する多要素認証基盤の活用方法 por ID-Based Security イニシアティブ
Active Directory とシームレスにマルチに連携する多要素認証基盤の活用方法Active Directory とシームレスにマルチに連携する多要素認証基盤の活用方法
Active Directory とシームレスにマルチに連携する多要素認証基盤の活用方法
Cyber security por Aman Pradhan
Cyber securityCyber security
Cyber security
Aman Pradhan2.4K visualizações

Similar a Log Stealers - Shopping time for Threat Actors!

NPTs por
NPTsNPTs
NPTsBrandon Levene
1.1K visualizações44 slides
Automation Attacks At Scale por
Automation Attacks At ScaleAutomation Attacks At Scale
Automation Attacks At ScaleMayank Dhiman
1.1K visualizações38 slides
Security Vulnerabilities: How to Defend Against Them por
Security Vulnerabilities: How to Defend Against ThemSecurity Vulnerabilities: How to Defend Against Them
Security Vulnerabilities: How to Defend Against ThemMartin Vigo
441 visualizações66 slides
2023-May.pptx por
2023-May.pptx2023-May.pptx
2023-May.pptxmnaeemuetcs
29 visualizações30 slides
Intrigue Core: Scaling Assessment Automation por
Intrigue Core: Scaling Assessment AutomationIntrigue Core: Scaling Assessment Automation
Intrigue Core: Scaling Assessment AutomationJonathan Cran
7.6K visualizações36 slides
From russia final_bluehat10 por
From russia final_bluehat10From russia final_bluehat10
From russia final_bluehat10F _
773 visualizações81 slides

Similar a Log Stealers - Shopping time for Threat Actors!(20)

NPTs por Brandon Levene
NPTsNPTs
NPTs
Brandon Levene1.1K visualizações
Automation Attacks At Scale por Mayank Dhiman
Automation Attacks At ScaleAutomation Attacks At Scale
Automation Attacks At Scale
Mayank Dhiman1.1K visualizações
Security Vulnerabilities: How to Defend Against Them por Martin Vigo
Security Vulnerabilities: How to Defend Against ThemSecurity Vulnerabilities: How to Defend Against Them
Security Vulnerabilities: How to Defend Against Them
Martin Vigo441 visualizações
2023-May.pptx por mnaeemuetcs
2023-May.pptx2023-May.pptx
2023-May.pptx
mnaeemuetcs29 visualizações
Intrigue Core: Scaling Assessment Automation por Jonathan Cran
Intrigue Core: Scaling Assessment AutomationIntrigue Core: Scaling Assessment Automation
Intrigue Core: Scaling Assessment Automation
Jonathan Cran7.6K visualizações
From russia final_bluehat10 por F _
From russia final_bluehat10From russia final_bluehat10
From russia final_bluehat10
F _773 visualizações
Romulus OWASP por Grupo Gesfor I+D+i
Romulus OWASPRomulus OWASP
Romulus OWASP
Grupo Gesfor I+D+i2.1K visualizações
Gates Toorcon X New School Information Gathering por Chris Gates
Gates Toorcon X New School Information GatheringGates Toorcon X New School Information Gathering
Gates Toorcon X New School Information Gathering
Chris Gates2.6K visualizações
Rapport ICO Rating por Société Tripalio
Rapport ICO RatingRapport ICO Rating
Rapport ICO Rating
Société Tripalio100 visualizações
Virus Bulletin 2018: Lazarus Group a mahjong game played with different sets ... por Peter Kálnai
Virus Bulletin 2018: Lazarus Group a mahjong game played with different sets ...Virus Bulletin 2018: Lazarus Group a mahjong game played with different sets ...
Virus Bulletin 2018: Lazarus Group a mahjong game played with different sets ...
Peter Kálnai152 visualizações
Dirty Little Secrets They Didn't Teach You In Pentest Class v2 por Rob Fuller
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Rob Fuller45.5K visualizações
Dirty Little Secrets They Didn't Teach You In Pentest Class v2 por Chris Gates
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Chris Gates2.7K visualizações
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover" por Jishnu Pradeep
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
Jishnu Pradeep807 visualizações
apidays LIVE Australia 2021 - Levelling up database security by thinking in A... por apidays
apidays LIVE Australia 2021 - Levelling up database security by thinking in A...apidays LIVE Australia 2021 - Levelling up database security by thinking in A...
apidays LIVE Australia 2021 - Levelling up database security by thinking in A...
apidays160 visualizações
Pedro Fortuna - Protecting Crypto Exchanges From a New Wave of Man-in-the-Bro... por Hacken_Ecosystem
Pedro Fortuna - Protecting Crypto Exchanges From a New Wave of Man-in-the-Bro...Pedro Fortuna - Protecting Crypto Exchanges From a New Wave of Man-in-the-Bro...
Pedro Fortuna - Protecting Crypto Exchanges From a New Wave of Man-in-the-Bro...
Hacken_Ecosystem122 visualizações
Automating your SOC/CSIRT - The case study: Pescatore a real time URL Classifier por Roberto Sponchioni
Automating your SOC/CSIRT - The case study: Pescatore a real time URL ClassifierAutomating your SOC/CSIRT - The case study: Pescatore a real time URL Classifier
Automating your SOC/CSIRT - The case study: Pescatore a real time URL Classifier
Roberto Sponchioni226 visualizações
Hitbkl 2012 por F _
Hitbkl 2012Hitbkl 2012
Hitbkl 2012
F _612 visualizações
Understanding Malware Lateral Spread Used in High Value Attacks por Cyphort
Understanding Malware Lateral Spread Used in High Value AttacksUnderstanding Malware Lateral Spread Used in High Value Attacks
Understanding Malware Lateral Spread Used in High Value Attacks
Cyphort1.6K visualizações
Metadata in the Blockchain: The OP_RETURN Explosion por Coin Sciences Ltd
Metadata in the Blockchain: The OP_RETURN ExplosionMetadata in the Blockchain: The OP_RETURN Explosion
Metadata in the Blockchain: The OP_RETURN Explosion
Coin Sciences Ltd21.8K visualizações
RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies por Wayne Huang
RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case StudiesRSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies
RSA 2015 Bitcoin's Future Threats: Expert's Roundtable based on 150 Case Studies
Wayne Huang1.4K visualizações

Mais de Speck&Tech

Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ... por
Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...
Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...Speck&Tech
74 visualizações12 slides
Monitorare una flotta di autobus: architettura di un progetto di acquisizione... por
Monitorare una flotta di autobus: architettura di un progetto di acquisizione...Monitorare una flotta di autobus: architettura di un progetto di acquisizione...
Monitorare una flotta di autobus: architettura di un progetto di acquisizione...Speck&Tech
72 visualizações18 slides
Why LLMs should be handled with care por
Why LLMs should be handled with careWhy LLMs should be handled with care
Why LLMs should be handled with careSpeck&Tech
89 visualizações21 slides
Privacy in the era of quantum computers por
Privacy in the era of quantum computersPrivacy in the era of quantum computers
Privacy in the era of quantum computersSpeck&Tech
205 visualizações37 slides
Machine learning with quantum computers por
Machine learning with quantum computersMachine learning with quantum computers
Machine learning with quantum computersSpeck&Tech
217 visualizações20 slides
Give your Web App superpowers by using GPUs por
Give your Web App superpowers by using GPUsGive your Web App superpowers by using GPUs
Give your Web App superpowers by using GPUsSpeck&Tech
209 visualizações60 slides

Mais de Speck&Tech(20)

Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ... por Speck&Tech
Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...
Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...
Speck&Tech74 visualizações
Monitorare una flotta di autobus: architettura di un progetto di acquisizione... por Speck&Tech
Monitorare una flotta di autobus: architettura di un progetto di acquisizione...Monitorare una flotta di autobus: architettura di un progetto di acquisizione...
Monitorare una flotta di autobus: architettura di un progetto di acquisizione...
Speck&Tech72 visualizações
Why LLMs should be handled with care por Speck&Tech
Why LLMs should be handled with careWhy LLMs should be handled with care
Why LLMs should be handled with care
Speck&Tech89 visualizações
Privacy in the era of quantum computers por Speck&Tech
Privacy in the era of quantum computersPrivacy in the era of quantum computers
Privacy in the era of quantum computers
Speck&Tech205 visualizações
Machine learning with quantum computers por Speck&Tech
Machine learning with quantum computersMachine learning with quantum computers
Machine learning with quantum computers
Speck&Tech217 visualizações
Give your Web App superpowers by using GPUs por Speck&Tech
Give your Web App superpowers by using GPUsGive your Web App superpowers by using GPUs
Give your Web App superpowers by using GPUs
Speck&Tech209 visualizações
From leaf to orbit: exploring forests with technology por Speck&Tech
From leaf to orbit: exploring forests with technologyFrom leaf to orbit: exploring forests with technology
From leaf to orbit: exploring forests with technology
Speck&Tech101 visualizações
Innovating Wood por Speck&Tech
Innovating WoodInnovating Wood
Innovating Wood
Speck&Tech141 visualizações
Behind the scenes of our everyday Internet: the role of an IXP like MIX por Speck&Tech
Behind the scenes of our everyday Internet: the role of an IXP like MIXBehind the scenes of our everyday Internet: the role of an IXP like MIX
Behind the scenes of our everyday Internet: the role of an IXP like MIX
Speck&Tech101 visualizações
Architecting a 35 PB distributed parallel file system for science por Speck&Tech
Architecting a 35 PB distributed parallel file system for scienceArchitecting a 35 PB distributed parallel file system for science
Architecting a 35 PB distributed parallel file system for science
Speck&Tech129 visualizações
Truck planning: how to certify the right route por Speck&Tech
Truck planning: how to certify the right routeTruck planning: how to certify the right route
Truck planning: how to certify the right route
Speck&Tech229 visualizações
Break it up! 5G, cruise control, autonomous vehicle cooperation, and bending ... por Speck&Tech
Break it up! 5G, cruise control, autonomous vehicle cooperation, and bending ...Break it up! 5G, cruise control, autonomous vehicle cooperation, and bending ...
Break it up! 5G, cruise control, autonomous vehicle cooperation, and bending ...
Speck&Tech230 visualizações
AI and Space: finally, no more arguing with the GPS por Speck&Tech
AI and Space: finally, no more arguing with the GPSAI and Space: finally, no more arguing with the GPS
AI and Space: finally, no more arguing with the GPS
Speck&Tech171 visualizações
Space is open for business por Speck&Tech
Space is open for businessSpace is open for business
Space is open for business
Speck&Tech177 visualizações
Building large science space projects por Speck&Tech
Building large science space projectsBuilding large science space projects
Building large science space projects
Speck&Tech161 visualizações
Breaking the Laws of Robotics: Attacking Industrial Robots por Speck&Tech
Breaking the Laws of Robotics: Attacking Industrial RobotsBreaking the Laws of Robotics: Attacking Industrial Robots
Breaking the Laws of Robotics: Attacking Industrial Robots
Speck&Tech179 visualizações
Design beyond deliverables por Speck&Tech
Design beyond deliverablesDesign beyond deliverables
Design beyond deliverables
Speck&Tech195 visualizações
Your website is ugly - how to fix it (and why you should care) por Speck&Tech
Your website is ugly - how to fix it (and why you should care)Your website is ugly - how to fix it (and why you should care)
Your website is ugly - how to fix it (and why you should care)
Speck&Tech218 visualizações
Why you should get a worse computer por Speck&Tech
Why you should get a worse computerWhy you should get a worse computer
Why you should get a worse computer
Speck&Tech228 visualizações
Intelligenza artificiale: uno yin o uno yang per i diritti umani? por Speck&Tech
Intelligenza artificiale: uno yin o uno yang per i diritti umani?Intelligenza artificiale: uno yin o uno yang per i diritti umani?
Intelligenza artificiale: uno yin o uno yang per i diritti umani?
Speck&Tech175 visualizações

Último

Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ por
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericShapeBlue
130 visualizações9 slides
Digital Personal Data Protection (DPDP) Practical Approach For CISOs por
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
158 visualizações59 slides
The Power of Heat Decarbonisation Plans in the Built Environment por
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built EnvironmentIES VE
79 visualizações20 slides
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... por
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...James Anderson
160 visualizações32 slides
NTGapps NTG LowCode Platform por
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform Mustafa Kuğu
423 visualizações30 slides
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... por
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...ShapeBlue
132 visualizações13 slides

Último(20)

Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ por ShapeBlue
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
ShapeBlue130 visualizações
Digital Personal Data Protection (DPDP) Practical Approach For CISOs por Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash158 visualizações
The Power of Heat Decarbonisation Plans in the Built Environment por IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE79 visualizações
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... por James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson160 visualizações
NTGapps NTG LowCode Platform por Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu423 visualizações
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... por ShapeBlue
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
ShapeBlue132 visualizações
DRBD Deep Dive - Philipp Reisner - LINBIT por ShapeBlue
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue180 visualizações
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... por ShapeBlue
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
ShapeBlue173 visualizações
Business Analyst Series 2023 - Week 4 Session 8 por DianaGray10
Business Analyst Series 2023 -  Week 4 Session 8Business Analyst Series 2023 -  Week 4 Session 8
Business Analyst Series 2023 - Week 4 Session 8
DianaGray10123 visualizações
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates por ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue252 visualizações
Ransomware is Knocking your Door_Final.pdf por Security Bootcamp
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdf
Security Bootcamp96 visualizações
Qualifying SaaS, IaaS.pptx por Sachin Bhandari
Qualifying SaaS, IaaS.pptxQualifying SaaS, IaaS.pptx
Qualifying SaaS, IaaS.pptx
Sachin Bhandari1K visualizações
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue por ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
ShapeBlue138 visualizações
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... por ShapeBlue
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
ShapeBlue145 visualizações
State of the Union - Rohit Yadav - Apache CloudStack por ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue297 visualizações
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue por ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue135 visualizações
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... por ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue166 visualizações
Business Analyst Series 2023 - Week 4 Session 7 por DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10139 visualizações
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... por ShapeBlue
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
ShapeBlue186 visualizações
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue por ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueMigrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
ShapeBlue218 visualizações

Log Stealers - Shopping time for Threat Actors!

  • 1. Log Stealers Shopping time for Threat Actors! Mirko Ioris & Francesco Pavanello - Cyber Security Technical Consultants
  • 2. What is a log stealer malware? Log (or information) stealer malware is a type of Trojan that gathers sensitive data from the compromised system and sends it to the attacker. Typical targets are login credentials, credit card information, crypto wallets and browser information (cookies, history, autofill). https://blog.sekoia.io/traffers-a-deep-dive-into-the-information-stealer-ecosystem
  • 3. Log stealer malware infection chain § YouTube video on stolen account § Websites masquerading as blogs to deliver password-protected archives § Software installation pages to deliver password- protected archives § Phishing emails § Google ADS https://blog.sekoia.io/traffers-a-deep-dive-into-the-information-stealer-ecosystem
  • 5. Redline § Available from: February 2020 (on WWH Club and BHF forum) § Owners: Glade aka REDGlade § Telegram channel: https://t.me/REDLINESELLER | https://t.me/redlinesupport_new § Nationality: Russian § Other info: More than 2 Million records on Russian Market § Service cost: from 100$ to 200$ per month
  • 6. Redline https://medium.com/s2wblog/deep-analysis-of-redline-stealer-leaked-credential-with-wcf-7b31901da904 Redline communication with the C2 server for retrieving configuration and send the stolen data. Other stealers use similar methodologies.
  • 7. § Available from: 20/05/2019, version 2.0 from 15/09/2022 (on XSS forum) § Owners: @raccoonstealer on XSS forum § Other info: More than 1 Million records on Russian Market § Nationality: Ukrainian § Service cost: 200$ / month § Telegram channel: https://t.me/miaranimator | https://t.me/gr33nl1ght Raccoon
  • 8. § At least 50 million unique credentials stolen worldwide § FBI disclosure site on https://raccoon.ic3.gov/home Raccoon
  • 10. Telegram markets § Independent sellers § Go here https://github.com/fastfire/deepdarkCTI/blob/main/telegram.md and search for 'logs'
  • 11. 2Easy Market § More than 850.000 records § Paid access § Catalogue: logs only § Log name format: prefix+unique numbers chars (i.e. 2easy_logs_651587.zip) § Deposit available in: Bitcoin BTC, Bitcoincash BCH, Dash DASH, Dogecoin DOGE, Ethereum ETH, Ethereumclassic ETC, Litecoin LTC, Monero XMR, Zcash § Can search for: Seller, Date, Country, Word Available metadata: Links, Seller, Country, Installed Date, Price USD, Seller Rating § Online Support + Telegram chat for updates
  • 12. Genesis Market § More than 460.000 records § Invitation access § Catalogue: logs only § Deposit available in: Bitcoin BTC, Litecoin LTC, Monero XMR, Dashs § Offers tools like Genesis Security Plugin & Genesium Browser § Log name format: 32 hexadecimal chars (i.e. 7B034E8C77F92627192802CCCE2AB3DD.zip) § Can search for: Bot Name, Name, Domain, IP, Country, OS, Price § Available metadata: Links, Country, # of Resources, # of Browsers, Installed Date, Updated Date, IP (first 2 triplets), OS, Price USD § Online Support `
  • 13. Russian Market § More than 7.000.000 records § Paid access § Catalogue: logs, RDP access, PayPal accounts, credit cards § Log name format: prefix+unique numbers chars (i.e. LOGID- 5260493.zip) § Deposit available in: Bitcoin BTC, Ethereum ETH, Litecoin LTC § Can search for: stealer, state, ISP, System, City, Outlook, Country, Zip, Links § Available metadata: Links, Stealer, Country, Structure, Installed Date, Size, Vendor, Price USD, Online Support
  • 14. Log Example Stealers organize logs in a ZIP folder. There is no standard format but usually the following are the information contained:
  • 15. Log Example Stealers organize logs in a ZIP folder. There is no standard format but usually the following are the information contained:
  • 16. Log Example Stealers organize logs in a ZIP folder. There is no standard format but usually the following are the information contained:
  • 17. Log Example Stealers organize logs in a ZIP folder. There is no standard format but usually the following are the information contained:
  • 18. Log Example Stealers organize logs in a ZIP folder. There is no standard format but usually the following are the information contained:
  • 20. Market scraper § A research should be done in OPSEC mode § Online § Keywords based the real domains: wuerth-phoenix.com à rth-ph § A lot of garbage § Offline § Real domains § Evidence of interest § Useful Python libraries and API § Selenium § Pyppeteer & Beautifulsoup § Requests & Beautifulsoup § Undetectedchromedriver § 2Captcha API (charged)
  • 21. Market scraper § A script divided in 2 phases: § Online § Login & captcha resolution
  • 22. Market scraper § A script divided in 2 phases: § Online § Login & captcha resolution
  • 23. Market scraper § A script divided in 2 phases: § Online § Login & captcha resolution § Research using keywords
  • 24. Market scraper § A script divided in 2 phases: § Online § Login & captcha resolution § Research using keywords § Export of results in JSON format
  • 25. Market scraper § A script divided in 2 phases: § Online § Login & captcha resolution § Research using keywords § Export of results in JSON format § Offline § Filtering results § Saving evidence on the database
  • 27. SATAYO integration We have developed scrapers able to monitor the 3 major marketplaces (Russian, 2Easy, Genesis).
  • 28. Evidence Analysis § Compromised system information § Identity of the victim § Credentials found within the log § Optional login test § Mitigation and suggestions
  • 30. Traffers analysis Open Shodan and search using this dork: http.html:"stealer"
  • 31. Traffers analysis Open Shodan and search using this dork: http.html:"stealer"
  • 32. 2easy analysis Open Shodan and search using this dork: http.html:“2easy.shop"
  • 33. 2easy analysis Open Shodan and search using this dork: http.html:“2easy.shop"
  • 34. Contact information § Mirko Ioris § - mirko.ioris@wuerth-phoenix.com § - linkedin.com/in/mirkoioris18 § - @Mikkos § Francesco Pavanello § - francesco.pavanello@wuerth-phoenix.com § - linkedin.com/in/francescopavanello § - @frapava98