when governments hack opponents
play

When Governments Hack Opponents Bill Marczak First, Bahraini - PowerPoint PPT Presentation

When Governments Hack Opponents Bill Marczak First, Bahraini jailers armed with stifg rubber hoses beat the 39-year-old school administrator and human rights activist in a windowless room... Then, they dragged him upstairs for questioning by


  1. When Governments Hack Opponents Bill Marczak

  2. First, Bahraini jailers armed with stifg rubber hoses beat the 39-year-old school administrator and human rights activist in a windowless room... Then, they dragged him upstairs for questioning by a uniformed offjcer armed with another kind of weapon: transcripts of his text messages and details from Abdul Ghani al-Khanjar Bahraini Activist personal mobile phone conversations...

  3. Activist communication tools...

  4. “Cred”

  5. If you get a suspicious email or message, send it to me!

  6. If you get a suspicious email or message, send it to me! Hey Bill, I got a weird email! Ahmed Mansoor UAE Activist

  7. The Data

  8. Order to uncover the user of an IP address of @alkawarahnews Batelco (residential ISP) Mohammed Salah Acting Chief Prosecutor, Capital Region

  9. “It is a secret investigation involving private methods of our department that cannot be disclosed” Col. Fawaz al-Sumaim Bahrain Cyber Crime Unit

  10. (Arrested activist) Greetings, I am a translator of the revolution. Do you need translation of this?

  11. (Arrested activist) Greetings, I am a translator of the revolution. Do you need translation of this?

  12. (Arrested activist)

  13. (Arrested activist)

  14. Sketch: Social Engineering

  15. “New secrets about torture of Ahmed Mansoor Emiratis in state prisons” UAE Activist

  16. Nice Bait, we’ll take it!

  17. Nice Bait, we’ll take it! Factory-Reset iPhone (Wi-Fi Only)

  18. Nice Bait, we’ll take it! Wi-Fi Factory-Reset Intercept & iPhone record Internet (Wi-Fi Only) traffjc

  19. Nice Bait, we’ll take it! Wi-Fi Factory-Reset Intercept & The Internet iPhone record Internet (Wi-Fi Only) traffjc

  20. Nice Bait, we’ll take it! Wi-Fi Factory-Reset Intercept & The Internet iPhone record Internet (Wi-Fi Only) traffjc Type in the link from Mansoor...

  21. … and what happens next will SHOCK YOU! Safari window closes!

  22. … and what happens next will SHOCK YOU! Safari window closes! Tring [sic] to download bundle!

  23. CVE-2016-4657 Visiting a maliciously crafted website may lead to arbitrary code execution CVE-2016-4655 An application may be able to disclose kernel memory CVE-2016-4656 An application may be able to execute arbitrary code with kernel privileges

  24. CVE-2016-4657 Visiting a maliciously crafted website may lead to arbitrary code execution CVE-2016-4655 An application may be able to disclose kernel memory CVE-2016-4656 An application may be able to execute arbitrary code with kernel privileges

  25. Attribution

  26. When we clicked again, redirect to: https://sms.webadv.co/redirect.aspx

  27. When we clicked again, redirect to: https://sms.webadv.co/redirect.aspx <html><head><meta http-equiv='refresh' content='0;url=http://www.google.com' /><meta http-equiv='refresh' content='1;url=http://www.google.com' /><title></title></head><body></body></html>

  28. When we clicked again, redirect to: https://sms.webadv.co/redirect.aspx <html><head><meta http-equiv='refresh' content='0;url=http://www.google.com' /><meta http-equiv='refresh' content='1;url=http://www.google.com' /><title></title></head><body></body></html> Wow, that's weird!

  29. plan: Use zmap to Fetch /redirect.aspx from every ipv4 address (2 32 = 4,294,967,296 ) 1. 2. Check which responses are the same as our fingerprint: <html><head><meta http-equiv='refresh' content='0;url=http://www.google.com' /><meta http-equiv='refresh' content='1;url=http://www.google.com' /><title></title></head><body></body></html>

  30. Result: 149 ip addresses New plan: look at historical internet scanning data for the 149 ip addresses https://shodan.io/ https://censys.io/ https://opendata.rapid7.com/

  31. Result: 19 ip addresses returned in response to a fetch for / \xef\xbb\xbf<HTML><HEAD><META HTTP-EQUIV="refresh" CONTENT="0;URL=http://www.google.com/"> <TITLE></TITLE></HEAD><BODY> </BODY></HTML>

  32. Result: 19 ip addresses returned in response to a fetch for / \xef\xbb\xbf<HTML><HEAD><META HTTP-EQUIV="refresh" CONTENT="0;URL=http://www.google.com/"> <TITLE></TITLE></HEAD><BODY> </BODY></HTML> New plan: what else returned this?

  33. Result: 19 ip addresses returned in response to a fetch for / \xef\xbb\xbf<HTML><HEAD><META HTTP-EQUIV="refresh" CONTENT="0;URL=http://www.google.com/"> <TITLE></TITLE></HEAD><BODY> </BODY></HTML> New plan: what else returned this? Result: 89 IP addresses including: Admin Organization: Nso Group Admin Street: P.O Box 4166 Admin City: Hertzelia Admin Country: IL Admin Email: IT@nsogroup.com

  34. "NSO Group is a leader in the field of Cyber warfare." “… a powerful and unique monitoring tool, called Pegasus , which allows remote and stealth monitoring and full data extraction from remote targets devices via untraceable commands." "...exclusively for the use of Government, Law Enforcement and Intelligence Agencies."

  35. Fingerprint #1 Fingerprint #2 19 IPs Ahmed Mansoor 2013-2014 2016

  36. Why do NSO servers return Google redirects? <html><head><meta http-equiv='refresh' content='0;url=http://www.google.com' /><meta http-equiv='refresh' content='1;url=http://www.google.com' /><title></title></head><body></body></html> \xef\xbb\xbf<HTML><HEAD><META HTTP-EQUIV="refresh" CONTENT="0;URL=http://www.google.com/"> <TITLE></TITLE></HEAD><BODY> </BODY></HTML>

  37. Why do NSO servers return Google redirects? <html><head><meta http-equiv='refresh' content='0;url=http://www.google.com' /><meta http-equiv='refresh' content='1;url=http://www.google.com' /><title></title></head><body></body></html> \xef\xbb\xbf<HTML><HEAD><META HTTP-EQUIV="refresh" CONTENT="0;URL=http://www.google.com/"> <TITLE></TITLE></HEAD><BODY> </BODY></HTML> Decoy Page: “redirect or customize undesired remote … landing on the server”

  38. Fake Apache Decoy Pages (Hacking Team)

  39. Fake Apache Decoy Pages (Hacking Team) Apache Hacking Team HTTP/1.1 404 Not Found HTTP/1.1 404 NotFound Date: $DATE Connection: close Server: $SERVER Content-Type: text/html Content-Length: $LENGTH Content-length: $LENGTH Connection:close Server: Apache/2.4.4 (Unix) OpenSSL/1.0.0g Content-Type: text/html ; charset=$CHARSET

  40. Fake Apache Decoy Pages (FinFisher) Apache FinFisher HTTP/1.1 403 Forbidden HTTP/1.1 403 Forbidden Date: $DATE GMT Date: $DATE UTC Server: Apache Server: Apache Vary: Accept-Encoding Vary: Accept-Encoding Content-Length: 321 Content-Length: 321 Content-Type: text/html; charset=iso-8859-1 Content-Type: text/html; charset=iso-8859-1

  41. Fake Apache Decoy Pages (FinFisher) Apache FinFisher <html><body><h1>It <!DOCTYPE HTML PUBLIC ``-//IETF//DTD HTML works!</h1></body></html> 2.0//EN''> <html> <head> <title>200 OK</title> </head> <body> <h1>It works!</h1> </body></html>

  42. Spyware Command-and-Control

  43. Command and Control Victim Victim

  44. Command and Control Victim Proxy Proxy Proxy Victim "The Cloud"

  45. Command and Control Victim Proxy Monitoring Center Proxy Proxy Gateway / Firewall C&C Server Victim Government Agency Premises "The Cloud"

  46. Command and Control Scanning finds these... Victim Proxy Monitoring Center Proxy Proxy Gateway / Firewall C&C Server Victim Government Agency Premises "The Cloud"

  47. Command and Control Scanning finds these... Victim Proxy Monitoring … but not Center these Proxy Proxy Gateway / Firewall C&C Server Victim Government Agency Premises "The Cloud"

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend