a broad view of the ecosystem of socially engineered
play

A Broad View of the Ecosystem of Socially Engineered Exploit - PowerPoint PPT Presentation

A Broad View of the Ecosystem of Socially Engineered Exploit Documents Stevens Le Blond, Cdric Gilbert, Utkarsh Upadhyay, Manuel Gomez Rodriguez and David Choffnes Challenges with measuring targeted attacks Low-volume, socially


  1. A Broad View of the Ecosystem of 
 Socially Engineered Exploit Documents Stevens Le Blond, Cédric Gilbert, Utkarsh Upadhyay, Manuel Gomez Rodriguez and David Choffnes

  2. Challenges with measuring targeted attacks • Low-volume, socially engineered messages that convince 
 specific victims to install malware 2

  3. Challenges with measuring targeted attacks • Low-volume, socially engineered messages that convince 
 specific victims to install malware • Three studies published at Usenix Security’14 • Tibet (Hardy et al.), Middle East (Marczak et al.), and Uyghur (Le Blond et al.) 2

  4. Challenges with measuring targeted attacks • Low-volume, socially engineered messages that convince 
 specific victims to install malware • Three studies published at Usenix Security’14 • Tibet (Hardy et al.), Middle East (Marczak et al.), and Uyghur (Le Blond et al.) 2

  5. Challenges with measuring targeted attacks • Low-volume, socially engineered messages that convince 
 specific victims to install malware • Three studies published at Usenix Security’14 • Tibet (Hardy et al.), Middle East (Marczak et al.), and Uyghur (Le Blond et al.) ? 2

  6. Challenges with measuring targeted attacks • Low-volume, socially engineered messages that convince 
 specific victims to install malware • Three studies published at Usenix Security’14 • Tibet (Hardy et al.), Middle East (Marczak et al.), and Uyghur (Le Blond et al.) ? Measuring targeted attacks 
 is a long and difficult process 2

  7. Can Anti-Virus Aggregators (VirusTotal) help? 3

  8. Can Anti-Virus Aggregators (VirusTotal) help? 3

  9. Can Anti-Virus Aggregators (VirusTotal) help? 3

  10. Can Anti-Virus Aggregators (VirusTotal) help? 3

  11. VirusTotal Statistics (one week) 4

  12. VirusTotal Statistics (one week) 4

  13. VirusTotal Statistics (one week) 4

  14. VirusTotal Statistics (one week) 4

  15. VirusTotal Statistics (one week) 4

  16. VirusTotal Statistics (one week) 4

  17. VirusTotal as a vantage point 
 to measure targeted attacks 5

  18. VirusTotal as a vantage point 
 to measure targeted attacks 5

  19. VirusTotal as a vantage point 
 to measure targeted attacks 5

  20. VirusTotal as a vantage point 
 to measure targeted attacks 5

  21. Research questions • Do targeted groups upload exploit documents to VirusTotal? • Can we scale our analysis to hundreds of thousands of samples? • How do attacks faced by different groups compare with each other? • Is VirusTotal used by other actors such as attackers and researchers? 6

  22. Outline 1) Methodology 2) Analysis of exploit documents 3) Future work 7

  23. Exploit document infection process Exploit Decoy Malware 8

  24. Exploit document infection process Exploit Decoy Malware 8

  25. Exploit document infection process Exploit Decoy Malware 8

  26. Exploit document infection process Exploit Decoy Malware 8

  27. Data acquisition and processing workflow 9

  28. Data acquisition and processing workflow 9

  29. Can we scale our analysis to hundreds of thousands of samples? Acquisition 257,635 10

  30. Can we scale our analysis to hundreds of thousands of samples? Acquisition 257,635 10

  31. Can we scale our analysis to hundreds of thousands of samples? Acquisition 257,635 143 10

  32. Data acquisition and processing workflow 11

  33. Can we scale our analysis to hundreds of thousands of samples? Detection 257,635 143 12

  34. Can we scale our analysis to hundreds of thousands of samples? Detection Office w/ EMET Acrobat w/ EMET SP0 SP1 SP2 SP3 0.0 1.0 2.0 3.0 4.0 5.0 VIII 2003 IX 2007 X 2010 XI 257,635 143 12

  35. Can we scale our analysis to hundreds of thousands of samples? Detection Office w/ EMET Acrobat w/ EMET SP0 SP1 SP2 SP3 0.0 1.0 2.0 3.0 4.0 5.0 VIII 2003 IX 2007 X 2010 XI 257,635 143 12

  36. Can we scale our analysis to hundreds of thousands of samples? Detection Office w/ EMET Acrobat w/ EMET SP0 SP1 SP2 SP3 0.0 1.0 2.0 3.0 4.0 5.0 VIII 2003 IX 2007 X 2010 XI 257,635 143 - 219,794 -29 37,841 114 12

  37. How many versions of 
 readers do we have to test? CDF # affected versions 13

  38. How many versions of 
 readers do we have to test? CDF # affected versions Few exploits are portable across all reader versions 13

  39. Data acquisition and processing workflow 14

  40. Can we scale our analysis to hundreds of thousands of samples? Extraction Office w/ EMET Acrobat w/ EMET SP0 SP1 SP2 SP3 0.0 1.0 2.0 3.0 4.0 5.0 VIII 2003 IX 2007 X 2010 XI - 219,794 -29 257,635 143 37,841 114 15

  41. Can we scale our analysis to hundreds of thousands of samples? Extraction Office w/ driver Acrobat w/ driver Office w/ EMET Acrobat w/ EMET SP0 SP1 SP2 SP3 0.0 1.0 2.0 3.0 4.0 5.0 SP0 SP1 SP2 SP3 0.0 1.0 2.0 3.0 4.0 5.0 VIII 2003 VIII 2003 IX 2007 IX 2007 X 2010 X 2010 XI XI - 219,794 -29 257,635 143 37,841 114 15

  42. Can we scale our analysis to hundreds of thousands of samples? Extraction Office w/ driver Acrobat w/ driver Office w/ EMET Acrobat w/ EMET SP0 SP1 SP2 SP3 0.0 1.0 2.0 3.0 4.0 5.0 SP0 SP1 SP2 SP3 0.0 1.0 2.0 3.0 4.0 5.0 VIII 2003 VIII 2003 IX 2007 IX 2007 X 2010 X 2010 XI XI - 219,794 -29 257,635 143 37,841 114 15

  43. Can we scale our analysis to hundreds of thousands of samples? Extraction Office w/ driver Acrobat w/ driver Office w/ EMET Acrobat w/ EMET SP0 SP1 SP2 SP3 0.0 1.0 2.0 3.0 4.0 5.0 SP0 SP1 SP2 SP3 0.0 1.0 2.0 3.0 4.0 5.0 VIII 2003 VIII 2003 IX 2007 IX 2007 X 2010 X 2010 XI XI - 219,794 -29 -34,026 257,635 143 -11 37,841 114 3,815 103 15

  44. Data acquisition and processing workflow 16

  45. Can we scale our analysis to hundreds of thousands of samples? Analysis Acrobat w/ driver Office w/ driver Office w/ EMET Acrobat w/ EMET SP0 SP1 SP2 SP3 0.0 1.0 2.0 3.0 4.0 5.0 SP0 SP1 SP2 SP3 0.0 1.0 2.0 3.0 4.0 5.0 VIII 2003 VIII 2003 IX 2007 IX 2007 X 2010 X 2010 XI XI - 219,794 -29 257,635 143 -34,026 -11 37,841 114 3,815 103 17

  46. Can we scale our analysis to hundreds of thousands of samples? Analysis Acrobat w/ driver Office w/ driver Office w/ EMET Acrobat w/ EMET SP0 SP1 SP2 SP3 0.0 1.0 2.0 3.0 4.0 5.0 SP0 SP1 SP2 SP3 0.0 1.0 2.0 3.0 4.0 5.0 VIII 2003 VIII 2003 IX 2007 IX 2007 X 2010 X 2010 XI XI - 219,794 257,635 -34,026 37,841 3,815 17

  47. Can we scale our analysis to hundreds of thousands of samples? Analysis Malware Acrobat w/ driver sandboxes Office w/ driver Translators Office w/ EMET Acrobat w/ EMET SP0 SP1 SP2 SP3 0.0 1.0 2.0 3.0 4.0 5.0 SP0 SP1 SP2 SP3 0.0 1.0 2.0 3.0 4.0 5.0 VIII 2003 VIII 2003 IX 2007 IX 2007 X 2010 X 2010 XI XI - 219,794 -34,026 37,841 3,815 17

  48. Can we scale our analysis to hundreds of thousands of samples? Analysis Malware Acrobat w/ driver sandboxes Office w/ driver Translators Office w/ EMET Acrobat w/ EMET SP0 SP1 SP2 SP3 0.0 1.0 2.0 3.0 4.0 5.0 SP0 SP1 SP2 SP3 0.0 1.0 2.0 3.0 4.0 5.0 VIII 2003 VIII 2003 IX 2007 IX 2007 X 2010 X 2010 XI XI - 219,794 -34,026 37,841 3,815 17

  49. Can we scale our analysis to hundreds of thousands of samples? Analysis Malware Acrobat w/ driver sandboxes Office w/ driver Translators Office w/ EMET Acrobat w/ EMET SP0 SP1 SP2 SP3 0.0 1.0 2.0 3.0 4.0 5.0 SP0 SP1 SP2 SP3 0.0 1.0 2.0 3.0 4.0 5.0 VIII 2003 VIII 2003 IX 2007 IX 2007 X 2010 X 2010 XI XI - 219,794 -34,026 2,447 3,705 37,841 3,815 17

  50. Outline 1) Methodology 2) Analysis of exploit documents 3) Future work 18

  51. Do targeted groups upload exploit documents on VirusTotal? Likely targets (inferred from decoys) 19

  52. Do targeted groups upload exploit documents on VirusTotal? Likely targets (inferred from decoys) 19

  53. Do targeted groups upload exploit documents on VirusTotal? Likely targets (inferred from decoys) 19

  54. Do targeted groups upload exploit documents on VirusTotal? Likely targets (inferred from decoys) VirusTotal gives visibility into attacks targeting numerous groups 19

  55. How attacks faced by different groups compare with each other? Languages of decoys Fraction 20

  56. How attacks faced by different groups compare with each other? Languages of decoys Fraction 20

  57. How attacks faced by different groups compare with each other? Languages of decoys Fraction 20

  58. How attacks faced by different groups compare with each other? Languages of decoys Fraction 20

  59. How attacks faced by different groups compare with each other? Languages of decoys Fraction Decoys tend to use the official language of the groups they target 20

  60. How attacks faced by different groups compare with each other? Malware targeting 21

  61. How attacks faced by different groups compare with each other? Malware targeting 21

  62. How attacks faced by different groups compare with each other? Malware targeting 21

  63. How attacks faced by different groups compare with each other? Malware targeting 21

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend