when governments hack opponents

When Governments Hack Opponents Bill Marczak First, Bahraini - PowerPoint PPT Presentation

When Governments Hack Opponents Bill Marczak First, Bahraini jailers armed with stifg rubber hoses beat the 39-year-old school administrator and human rights activist in a windowless room... Then, they dragged him upstairs for questioning by


  1. When Governments Hack Opponents Bill Marczak

  2. First, Bahraini jailers armed with stifg rubber hoses beat the 39-year-old school administrator and human rights activist in a windowless room... Then, they dragged him upstairs for questioning by a uniformed offjcer armed with another kind of weapon: transcripts of his text messages and details from Abdul Ghani al-Khanjar Bahraini Activist personal mobile phone conversations...

  3. Activist communication tools...

  4. “Cred”

  5. If you get a suspicious email or message, send it to me!

  6. If you get a suspicious email or message, send it to me! Hey Bill, I got a weird email! Ahmed Mansoor UAE Activist

  7. The Data

  8. Order to uncover the user of an IP address of @alkawarahnews Batelco (residential ISP) Mohammed Salah Acting Chief Prosecutor, Capital Region

  9. “It is a secret investigation involving private methods of our department that cannot be disclosed” Col. Fawaz al-Sumaim Bahrain Cyber Crime Unit

  10. (Arrested activist) Greetings, I am a translator of the revolution. Do you need translation of this?

  11. (Arrested activist) Greetings, I am a translator of the revolution. Do you need translation of this?

  12. (Arrested activist)

  13. (Arrested activist)

  14. Sketch: Social Engineering

  15. “New secrets about torture of Ahmed Mansoor Emiratis in state prisons” UAE Activist

  16. Nice Bait, we’ll take it!

  17. Nice Bait, we’ll take it! Factory-Reset iPhone (Wi-Fi Only)

  18. Nice Bait, we’ll take it! Wi-Fi Factory-Reset Intercept & iPhone record Internet (Wi-Fi Only) traffjc

  19. Nice Bait, we’ll take it! Wi-Fi Factory-Reset Intercept & The Internet iPhone record Internet (Wi-Fi Only) traffjc

  20. Nice Bait, we’ll take it! Wi-Fi Factory-Reset Intercept & The Internet iPhone record Internet (Wi-Fi Only) traffjc Type in the link from Mansoor...

  21. … and what happens next will SHOCK YOU! Safari window closes!

  22. … and what happens next will SHOCK YOU! Safari window closes! Tring [sic] to download bundle!

  23. CVE-2016-4657 Visiting a maliciously crafted website may lead to arbitrary code execution CVE-2016-4655 An application may be able to disclose kernel memory CVE-2016-4656 An application may be able to execute arbitrary code with kernel privileges

  24. CVE-2016-4657 Visiting a maliciously crafted website may lead to arbitrary code execution CVE-2016-4655 An application may be able to disclose kernel memory CVE-2016-4656 An application may be able to execute arbitrary code with kernel privileges

  25. Attribution

  26. When we clicked again, redirect to: https://sms.webadv.co/redirect.aspx

  27. When we clicked again, redirect to: https://sms.webadv.co/redirect.aspx <html><head><meta http-equiv='refresh' content='0;url=http://www.google.com' /><meta http-equiv='refresh' content='1;url=http://www.google.com' /><title></title></head><body></body></html>

  28. When we clicked again, redirect to: https://sms.webadv.co/redirect.aspx <html><head><meta http-equiv='refresh' content='0;url=http://www.google.com' /><meta http-equiv='refresh' content='1;url=http://www.google.com' /><title></title></head><body></body></html> Wow, that's weird!

  29. plan: Use zmap to Fetch /redirect.aspx from every ipv4 address (2 32 = 4,294,967,296 ) 1. 2. Check which responses are the same as our fingerprint: <html><head><meta http-equiv='refresh' content='0;url=http://www.google.com' /><meta http-equiv='refresh' content='1;url=http://www.google.com' /><title></title></head><body></body></html>

  30. Result: 149 ip addresses New plan: look at historical internet scanning data for the 149 ip addresses https://shodan.io/ https://censys.io/ https://opendata.rapid7.com/

  31. Result: 19 ip addresses returned in response to a fetch for / \xef\xbb\xbf<HTML><HEAD><META HTTP-EQUIV="refresh" CONTENT="0;URL=http://www.google.com/"> <TITLE></TITLE></HEAD><BODY> </BODY></HTML>

  32. Result: 19 ip addresses returned in response to a fetch for / \xef\xbb\xbf<HTML><HEAD><META HTTP-EQUIV="refresh" CONTENT="0;URL=http://www.google.com/"> <TITLE></TITLE></HEAD><BODY> </BODY></HTML> New plan: what else returned this?

  33. Result: 19 ip addresses returned in response to a fetch for / \xef\xbb\xbf<HTML><HEAD><META HTTP-EQUIV="refresh" CONTENT="0;URL=http://www.google.com/"> <TITLE></TITLE></HEAD><BODY> </BODY></HTML> New plan: what else returned this? Result: 89 IP addresses including: Admin Organization: Nso Group Admin Street: P.O Box 4166 Admin City: Hertzelia Admin Country: IL Admin Email: IT@nsogroup.com

  34. "NSO Group is a leader in the field of Cyber warfare." “… a powerful and unique monitoring tool, called Pegasus , which allows remote and stealth monitoring and full data extraction from remote targets devices via untraceable commands." "...exclusively for the use of Government, Law Enforcement and Intelligence Agencies."

  35. Fingerprint #1 Fingerprint #2 19 IPs Ahmed Mansoor 2013-2014 2016

  36. Why do NSO servers return Google redirects? <html><head><meta http-equiv='refresh' content='0;url=http://www.google.com' /><meta http-equiv='refresh' content='1;url=http://www.google.com' /><title></title></head><body></body></html> \xef\xbb\xbf<HTML><HEAD><META HTTP-EQUIV="refresh" CONTENT="0;URL=http://www.google.com/"> <TITLE></TITLE></HEAD><BODY> </BODY></HTML>

  37. Why do NSO servers return Google redirects? <html><head><meta http-equiv='refresh' content='0;url=http://www.google.com' /><meta http-equiv='refresh' content='1;url=http://www.google.com' /><title></title></head><body></body></html> \xef\xbb\xbf<HTML><HEAD><META HTTP-EQUIV="refresh" CONTENT="0;URL=http://www.google.com/"> <TITLE></TITLE></HEAD><BODY> </BODY></HTML> Decoy Page: “redirect or customize undesired remote … landing on the server”

  38. Fake Apache Decoy Pages (Hacking Team)

  39. Fake Apache Decoy Pages (Hacking Team) Apache Hacking Team HTTP/1.1 404 Not Found HTTP/1.1 404 NotFound Date: $DATE Connection: close Server: $SERVER Content-Type: text/html Content-Length: $LENGTH Content-length: $LENGTH Connection:close Server: Apache/2.4.4 (Unix) OpenSSL/1.0.0g Content-Type: text/html ; charset=$CHARSET

  40. Fake Apache Decoy Pages (FinFisher) Apache FinFisher HTTP/1.1 403 Forbidden HTTP/1.1 403 Forbidden Date: $DATE GMT Date: $DATE UTC Server: Apache Server: Apache Vary: Accept-Encoding Vary: Accept-Encoding Content-Length: 321 Content-Length: 321 Content-Type: text/html; charset=iso-8859-1 Content-Type: text/html; charset=iso-8859-1

  41. Fake Apache Decoy Pages (FinFisher) Apache FinFisher <html><body><h1>It <!DOCTYPE HTML PUBLIC ``-//IETF//DTD HTML works!</h1></body></html> 2.0//EN''> <html> <head> <title>200 OK</title> </head> <body> <h1>It works!</h1> </body></html>

  42. Spyware Command-and-Control

  43. Command and Control Victim Victim

  44. Command and Control Victim Proxy Proxy Proxy Victim "The Cloud"

  45. Command and Control Victim Proxy Monitoring Center Proxy Proxy Gateway / Firewall C&C Server Victim Government Agency Premises "The Cloud"

  46. Command and Control Scanning finds these... Victim Proxy Monitoring Center Proxy Proxy Gateway / Firewall C&C Server Victim Government Agency Premises "The Cloud"

  47. Command and Control Scanning finds these... Victim Proxy Monitoring … but not Center these Proxy Proxy Gateway / Firewall C&C Server Victim Government Agency Premises "The Cloud"

Recommend


More recommend