the a
play

THE A AND THE P OF THE T #APT #APT # APT #APwot ADVANCED w e - PowerPoint PPT Presentation

THE A AND THE P OF THE T #APT #APT # APT #APwot ADVANCED w e dont [ d v :n :n(t) (t)st st] understand it PERSISTENT we detected it [p s st st nt nt] too late Ma Mari rion on Ma Marsc rschalek halek


  1. THE A AND THE P OF THE T

  2. #APT #APT # APT #APwot

  3. ADVANCED w e don‘t [ ə d ˈ v ɑ :n :n(t) (t)st st] understand it PERSISTENT we detected it [p əˈ s ɪ st st ə nt nt] too late

  4. Ma Mari rion on Ma Marsc rschalek halek @pinkflawd marion@cyphort.com desktopwallpaper.info

  5. A A TROJAN VIRUS TARGETED INSIDE IN Dig Digital ital THREAT THREAT AD ADWARE WARE ROOTKIT APT Thr Threa eat t WORM EXPLOIT SPYWARE Hist History ory SU SURVEILL VEILLAN ANCE CE MULTI-COMPONENT SO SOFT FTWARE ARE MALWARE http://www.hdbackgroundpoint.com

  6. A THREAT DETECTION HISTORY Source: obsoletemedia.org

  7. Your signature update. www.crane.com

  8. Virus Detection Signature Product Computer Server

  9. Checksums Byte Patterns Behavior Patterns Static / Dynamic Heuristics Whitelisting Network Streams Cloud Protection

  10. BOILS DOWN TO The binary is known. The binary is recognized. The behavior of the binary is recognized.

  11. BOILS DOWN TO KNOW KN OWLED LEDGE GE PR PRED EDICTIVE CTIVE BAS ASED ED THREAT THREAT DETECTION DETECTION

  12. NO NOT BE T BEING ING UNIQ UNIQUE UE Runtime packer trigger heuristics! Altered compiler settings don‘t ... Dynamic API resolving Character-wise string recovery http://www.dvd-ppt-slideshow.com

  13. jump table FTW FindNextFileA spot the string

  14. ON ONE B E BINA INARY TO R RY TO RULE ULE F FOR OREVER EVER Filehash-based detection Updating of binaries in irregular intervals Route traffic through local proxy

  15. ZEUS ZEUS %APP%\Uwirpa 10.12.2013 23:50 %APP%\Woyxhi 10.12.2013 23:50 %APP%\Hibyo E (DDIE) 19.12.2013 00:10 %APP%\Nezah 19.12.2013 00:10 %APP%\Afqag 19.12.2013 23:29 VASION %APP%\Zasi 19.12.2013 23:29 %APP%\Eqzauf 20.12.2013 22:23 %APP%\Ubapo 20.12.2013 22:23 %APP%\Ydgowa 20.12.2013 22:23 %APP%\Olosu 20.12.2013 23:03 %APP%\Taal 20.12.2013 23:03 %APP%\Taosep 20.12.2013 23:03 %APP%\Wokyco 16.01.2014 13:22 %APP%\Semi 17.01.2014 16:34 %APP%\Uheh 17.01.2014 16:34

  16. REPE REPETIT TITIVE A IVE ARTI RTIFAC FACTS TS File names Domain names Registry key names / value names Infiltration methods Persistence methods

  17. ENVI ENVIRO RONM NMENT ENTAL AL INS INSENS ENSITI ITIVIT VITY Might want to refuse executing in sandboxes, emulators & analyst‘s machines Potentially targeted systems usually homogeneous

  18. Only infecting Tuesdays, sorry. Or 16, 17 and 18 next month?

  19. SING SINGULA ULAR PER R PERSIST SISTENC ENCE Remember the P? Registry & service list monitored One process easy to kill MBR regularly scanned Why not do all?

  20. SEPA SEPARAT RATION ION OF LA OF LAYER YERS Runtime packers trigger heuristics! In-memory scanning identifies equal payloads Consistent evasion tricks multiply success

  21. KN KNOWN OWN SPHER SPHERES ES Remember the A? Find new battle fields Virtual machine execution Kernel land code Bootkits BIOS

  22. BATTLE FIELD you said?

  23. That moment a researcher tells you what‘s wrong with your system, an attacker is already exploiting it.

  24. Bl Black ackEnerg Energy Crimeware going APT: Sandworm Runtime Packer Malware-like startup & infiltration Driven by plugins

  25. Ha Have vex RAT used by EnergeticBear Targets ICS data, accessed via (T) EDD DDIE IE Windows COM/DCOM Standard system infiltration No protection

  26. S anatomy of a genius hack BL BLACK ACK POS Target‘s Network Los Angeles Russia

  27. Evil Ev il Bu Bunny ny FileMan/Inet PerfMon Big Boss Worker0 Manage Worker1 MainThread Worker Threads Worker2 CommandParsing Worker3 ScriptExecution

  28. 1. Unique binaries 2. Irregular updates 3. No repetitive artifacts 4. Environmental sensitivity 5. Multiple persistence techniques 6. Consistent evasion 7. Unknown spheres

  29. The A and the P of the T 1 2 3 4 5 6 7 estimated BlackEnergy 56 Mio. credit cards Havex compromised BlackPOS EvilBunny

  30. http://wall.alphacoders.com/big.php?i=318353

  31. RESOURCES • Havex - http://www.cyphort.com/windows-meets-industrial-control-systems-ics- havex-rat-spells-security-risks-2/ • BlackPOS - http://www.cyphort.com/parallels-among-three-notorious-pos- malwares-attacking-u-s-retailers/ • EvilBunny - https://drive.google.com/a/cyphort.com/file/d/0B9Mrr- en8FX4M2lXN1B4eElHcE0/view • Eddie - http://maiden-world.com/downloads/wallpaper.html

  32. Thank you! Marion Marschalek @pinkflawd marion@cyphort.com http://karmadecay.com/

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend