If you can't read please download the document
Upload
galen
View
136
Download
0
Embed Size (px)
DESCRIPTION
Attacks Using Malicious Hangul Word Processor Documents. Jaebyung Yoon @ KrCERT /CC. Introduction of HWP. Hangul ( 한 / 글 ) : W ord P rocessor of Hancom Inc . HWP is a filename extension and abbreviation of Hangul Word Processor - PowerPoint PPT Presentation
Citation preview
Attacks Using Malicious Hangul Word Processor DocumentsJaebyung Yoon @ KrCERT/CCIntroduction of HWPHangul(/) : Word Processor of Hancom Inc.HWP is a filename extension and abbreviation of Hangul Word ProcessorThe latest version is Hangul 2014 for Windows, Hangul 2008 for Linux, and Hangul 2006 for Mac OS XThe first version is 0.9 in 1989
2 byte language Word ProcessorOther Asian Word Processors
Ichitaro Japanese Word ProcessorNJStar Chinese Word ProcessorFirst Generation (~1999, HWP 3.0)
Second Generation (2000~, HWP 5.0)
History of Hangul
Save a Local SW Maker (The New York Times, 1999)
History of HangulHangul Sales Composition
Hancom sales compositionOffice S/W Market Share
Hangul supports the special needs of Korean written language especially governments needs.
De facto format especially in Korean government, military and public education.
Government officer receives a lot of e-mails attached HWP file EVERYDAY.
Attackers also knew this circumstance so they has researched the HWP document format as well as software vulnerabilities for a long time.Stature of Hangul in KoreaCan not tell malicious or not before open
The contents of malicious document is related with recipients business.
Malicious HWP Composed of vulnerability part, exploit part, malware part and normal document part.
Malicious HWP DocumentComposition of malicious document
Normal document
Malware part
Vulnerability part
Exploit Part
NORMAL.hwp
MALWARE.exeOLE (Object Linking and Embedding)
HWP Document Format
Streams of Bodytext storage are loaded
File structure and memory layout Exploit
tremendous size in documentHeap SprayEB 08 = jmp (here+0x08)Normal case (two tmp files)
Malicious case (normal document(hwp.hwp), ~AB.tmp, msloger.exe, tmp.dat)
On document loading (tmp files)
Hwp.exe process is not opened by user but ~AB.tmp.
~AB.tmpMalware Action 1
System information leakage from compromised PCMalware Action 2
Use of MalwareInformation leakageDocument leakageSecurity bypassRemote desktop
Key logger,System informationHWP, DOCXVaccine, firewallTeam ViewerDocument Content and social issueRobert King visited South Korea (US special envoy for North Korean Human Rights Issues)Solution of North Korea NuclearDokdo issueDiaoyu/Senkaku Islands disputeWorld Energy Congress5th generations of Chinese leadership60th anniversary of ArmisticeWorld Energy Congress Daegu 201312. 612. 712. 912. 1012. 1113. 8Just before new china leader inaugurationSouth Korean presidential election, 2012Dokdo ceremony by Korean national football playerChinese navy exercise near Diaoyu/SenkakusThe Day of Information Security 2012Personal Information Protection ActKey election promiseKorean War & PeaceCONTENTSISSUEKeyword of DocumentKorean WarNational SecurityDefense PolicyKorea Air forceFuture Warterritorial disputeDokdoPeace of Korean peninsulaArmistice 60 yearsMilitaryNew product researchWageContractPersonal Information Protection ActEnergy forumEnterpriseleadershipcontactsSAMSUNGTax auditMovie newsThe publicNorth Korea and ChinaKim Jong-unreunificationMinistry of unificationNuclearUnification forumNorth Korea StrategiesrefugeesNorth KoreaForeign policyAsia issuePark Geun-hyeEast AsiaMinistryKey pledgeUnified Progressive PartyPolicyforeign NewsChina visiteconomic unionNext governmentPolicy recommendationGovtHow to be loved by wifeelection pledgeTakeshimaLGScenario of malicious document attack
Government
.
MilitaryOrganization Spear phishing mail Open document Information leakage Information gathering
AttackerCompromised
E-mail accountAttack featureUse Email account like C&C Use document as decoyUse normal program as malware to avoid detectionUse Zero-day VulnerabilityPersistent Attack
Use email as command and control
Attack feature
Mail address & account info.
example.com [email protected]@example.comid : namepw : [email protected]@example.comid : namepw : passexample.comMalware delivery & info. leakageFinal destination- attackers account
Sign insend
malwarefromtoHardcoded in malwareInformation flow through emailAttack feature
SentLeaked Information from compromised PCUse zero-day vulnerabilityAbout 15% of malicious documents use zero-day vulnerability.Finding zero-day and making exploit are not easy.Must understand HWP document formatOwn tools to exploit They have researched the document format and software
Only KoreaUnlike doc & pdf, HWP is used in Korea onlyIt means opportunity cost is very high
Attack featureA team not a person - guessing
Attack featureSince Oct. 2012Hancom office, Gom player, NateON Vulnerability(2013, 179 cases)Especially HWP zero-day
Response - KrCERT/CC Vulnerability Reward ProgramSecure Coding in software design step
Detect Abnormal section data and dont load to memory
Response - Vendor (Hancom)
New version of Hancom office (2014)Detect and protect of malicious document Enhanced Secure codingSoftware UserMUST Update ALL softwareMUST use VaccineTake care before opening attached file in email
VendorIntroduce secure codingRapid respond for vulnerabilityEffort to make users update
CERT or security companyMake pattern to detect malicious documentShare the vulnerability information
Response - ConclusionThank [email protected]