Finger Pointing for Fun, Finger Pointing for Fun, Profit and War? Profit and War? Profit and War? Profit and War?
Tom Parker Tom Parker tom.at.rooted.dot.net
- m.at.rooted.dot.net
tom.at.rooted.dot.net
- m.at.rooted.dot.net
Finger Pointing for Fun, Finger Pointing for Fun, Profit and War? - - PowerPoint PPT Presentation
Finger Pointing for Fun, Finger Pointing for Fun, Profit and War? Profit and War? Profit and War? Profit and War? Tom Parker Tom Parker tom.at.rooted.dot.net tom.at.rooted.dot.net om.at.rooted.dot.net om.at.rooted.dot.net Quick
Background & Recent Events
Background & Recent Events
Attribution
Technical Analysis Today
Technical Analysis Today
Technical Attribution 101
Enhancing Existing Methodologies
Enhancing Existing Methodologies
Non Technical Data Correlation & Augmentation
WSJ “Wide Cyber Attack Is Linked to China”
60 Minutes “Sabotaging the System”
60 Minutes Sabotaging the System
Google/Adobe “Aurora Incident”
Targeted SCADA Malware?
Targeted SCADA Malware?
Profiling Adversarial Technical Capabilities
Insight into State Sponsored Programs
Creating Linkage Between Actor Groups
Tracking the Supply Chain
We often don’t care about this..
Doesn’t generally help develop countermeasures
Attributing to the actor/group level is often enough
Attributing to the actor/group level is often enough
Differentiation between groups
Identification of group geography
Identification of group geography
Indications of sponsorship
Nation State (China Russia
Nation State (China, Russia
Organized Crime (RBN et al?)
Activist Group
Activist Group
Where worlds collide
Code sharing between groups
Code sharing between groups
Static and Runtime Binary Analysis
Static and Runtime Binary Analysis
Memory Forensics
Vulnerability Exploitation & Payload Analysis
Vulnerability Exploitation & Payload Analysis
Command & Control
Post
Post
Known Signature
Virus
Virus
What does the code do?
Payoff/Impact Given Success
Perceived Probability of Success Given an
Perceived Probability of Detection Given an
Perceived Probability of Attribution
Perceived Consequences
Perceived Consequences
Adversary
Payoff/Impact Given Success
Perceived
Perceived
Perceived
Attack sources
Other Relevant Packet Data
Attack tools and their origins
Planning
Execution
Follow through
All attack tools have their origins..
All attack tools have their origins..
These can be put into two broad categories:
Public
Public
Often simply prove a concept
Often not ‘robust’
Many contain backdoors
Private
Frequently
Generally better written
May be based on private attack API’s
How easy is it to use a given attack tool
Prior technical knowledge required to use tool
Prior target knowledge required to use tool
Was it an appropriate tool to use for a given task?
Web Application Flaws Web Application Flaws Public Public Private Private
Proprietary Application Penetration:
Proprietary Application Penetration:
SQL Injection
SQL Injection 3 5 5
Open Source Application Penetration:
SQL Injection 3 5 5
Proprietary Application Penetration:
Proprietary Application Penetration:
Arbitrary Code Injection
Arbitrary Code Injection 2 4 4
Open Source Application Penetration:
Arbitrary Code Injection
Arbitrary Code Injection 2 4 4
Proprietary Application Penetration: p y pp p y pp
OS command execution using
OS command execution using MSSQL MSSQL Injection Injection 3 5 5
Proprietary Application Penetration:
OS command execution using
OS command execution using SyBase SyBase SQL SQL Injection Injection 3 5 5
Proprietary Application Penetration:
SQL Injection only (MS SQL) ) 4 6 6
Proprietary Application Penetration:
SQL Injection only (IBM DB2)
SQL Injection only (IBM DB2) 6 8 8
Proprietary Application Penetration:
SQL Injection only (Oracle)
SQL Injection only (Oracle) 6 8 8
Almost all geared around traditional IR
In most cases; not appropriate for attribution
In most cases; not appropriate for attribution
Exploit /Payload Analysis
Known Tooling/Markings
Known Tooling/Markings
Normally Requires Manual Effort to Identify
Binary Image Meta Data
Binary Image Meta Data
Email Addresses
User Names
User Names
Etc..
Improved Reliability
Specific host type/OS level targeting
Specific host type/OS level targeting
Possible to automate coloration with
Advanced / Improved
Re
Repairing Corrupted Heaps
Repairing Corrupted Heaps
Less Overhead
No Large Heap Sprays
No Large Heap Sprays
Or Excessive CPU Overhead
Continued Target Process Execution
Continued Target Process Execution
Java
System / Application Log files
*NIX Core files
Execution based on SW (browser) version?
Operating System
Operating System
Less likely to function on ASLR / DEP
Bypass IDS/IPS Signatures
Improved Payloads Demonstrate Capability
Lots of Investment from Anti
Small
Small Prime Prime Product Product
Create Large Prime # Per Function
Create Large Prime # Per Function
Unique Prime # / Each
Unique Prime # / Each Opcode Opcode
Unique Prime # / Each
Unique Prime # / Each Opcode Opcode
Resistant to Reordering
Resistant to Reordering
API Call
API Call Structure Analysis Structure Analysis
Prog1.Func Prog2.Func Function Checksums
Function Checksums
Variables / Constant Tracking
Variables / Constant Tracking
RegSetValueEx RegSetValueEx MessageBox RegCreateKeyEx RegCreateKeyEx
A Static Birthmark of Binary Executables Executables Based on Based on API Call Structure API Call Structure
BinDiff
Useful for closed
Good for tracking malware ‘genomes’
Good for tracking malware genomes
Most malware based off of ‘kits’
In most cases
Yes
Identification of API call context
Defines weighting of API calls
C&C Channel Hosts Correlation
Check
Check
Post
Auxiliary Tools / Code Utilized
Auxiliary Tools / Code Utilized
Data Exfiltrated
Secondary Targets Attacked
Secondary Targets Attacked
Maltego
Palantir Palantir