32
THE A AND THE P OF THE T

The A and the P of the T

  • Upload
    cyphort

  • View
    80

  • Download
    1

Embed Size (px)

DESCRIPTION

Marion Marschalek talk at the Vienna Security BSides

Citation preview

Page 1: The A and the P of the T

THE A

AND THE P

OF THE T

Page 2: The A and the P of the T

#APT

#APT

#APT#APwot

Page 3: The A and the P of the T

ADVANCED

[ədˈvɑ:n(t)st]

PERSISTENT

[pəˈsɪstənt]

we don‘t understand it

we detected it too late

Page 4: The A and the P of the T

Marion Marschalek@pinkflawd

[email protected]

desktopwallpaper.info

Page 5: The A and the P of the T

A Digital Threat Historyhttp://www.hdbackgroundpoint.com

VIRUS

EXPLOITWORM

TROJAN

MULTI-COMPONENTMALWARE

ADWARE ROOTKIT

SPYWARE

APT

TARGETED THREAT

SURVEILLANCE

SOFTWARE

INSIDETHREAT

Page 6: The A and the P of the T

Source:

obsoletemedia.org

A THREAT

DETECTION

HISTORY

Page 7: The A and the P of the T

www.crane.com

Your signature update.

Page 8: The A and the P of the T

Virus

Detection

Signature

Product

Computer

Server

Page 9: The A and the P of the T

Checksums

Byte Patterns

Behavior Patterns

Static / Dynamic Heuristics

Whitelisting

Network Streams

Cloud Protection

Page 10: The A and the P of the T

BOILS DOWN TO

The binary is known.

The binary is recognized.

The behavior of the binary is recognized.

Page 11: The A and the P of the T

KNOWLEDGE BASEDTHREAT DETECTION

BOILS DOWN TO

PREDICTIVETHREAT

DETECTION

Page 12: The A and the P of the T

NOT BEING UNIQUE

Runtime packer trigger heuristics!

Altered compiler settings don‘t ...

Dynamic API resolving

Character-wise string recovery

http://www.dvd-ppt-slideshow.com

Page 13: The A and the P of the T

jump table FTW

spot the string

FindNextFileA

Page 14: The A and the P of the T

ONE BINARY TO RULE FOREVER

Filehash-based detection

Updating of binaries in irregular intervals

Route traffic through local proxy

Page 15: The A and the P of the T

ZEUS

E(DDIE)

VASION

%APP%\Uwirpa 10.12.2013 23:50

%APP%\Woyxhi 10.12.2013 23:50

%APP%\Hibyo 19.12.2013 00:10

%APP%\Nezah 19.12.2013 00:10

%APP%\Afqag 19.12.2013 23:29

%APP%\Zasi 19.12.2013 23:29

%APP%\Eqzauf 20.12.2013 22:23

%APP%\Ubapo 20.12.2013 22:23

%APP%\Ydgowa 20.12.2013 22:23

%APP%\Olosu 20.12.2013 23:03

%APP%\Taal 20.12.2013 23:03

%APP%\Taosep 20.12.2013 23:03

%APP%\Wokyco 16.01.2014 13:22

%APP%\Semi 17.01.2014 16:34

%APP%\Uheh 17.01.2014 16:34

Page 16: The A and the P of the T

REPETITIVE ARTIFACTSFile names

Domain names

Registry key names / value names

Infiltration methods

Persistence methods

Page 17: The A and the P of the T

ENVIRONMENTALINSENSITIVITY

Might want to refuse executing in sandboxes, emulators &

analyst‘s machines

Potentially targeted systems usually homogeneous

Page 18: The A and the P of the T

Only

infecting

Tuesdays,

sorry.

Or 16, 17 and 18next month?

Page 19: The A and the P of the T

SINGULAR PERSISTENCE

Remember the P?

Registry & service list monitoredOne process easy to killMBR regularly scanned

Why not do all?

Page 20: The A and the P of the T

SEPARATION OF LAYERS

Runtime packers trigger heuristics!

In-memory scanning identifies equal payloads

Consistent evasion tricks multiply success

Page 21: The A and the P of the T

KNOWN SPHERESRemember the A?

Find new battle fields

Virtual machine executionKernel land code

Bootkits

BIOS

Page 22: The A and the P of the T

BATTLE

FIELD

you said?

Page 23: The A and the P of the T

That moment a researcher tells you what‘s wrong with your system, an attacker is already exploiting it.

Page 24: The A and the P of the T

BlackEnergy

Crimeware going APT: Sandworm

Runtime Packer

Malware-like startup & infiltration

Driven by plugins

Page 25: The A and the P of the T

Havex

RAT used by EnergeticBear

Targets ICS data, accessed via Windows COM/DCOM

Standard system infiltration

No protection

(T)EDDIE

Page 26: The A and the P of the T

Target‘s Network

BLACK POS anatomy of a genius hack

Los Angeles Russia

Page 27: The A and the P of the T

Big Boss

Worker2

Worker1

Worker0

Worker3

MainThread

PerfMon

CommandParsing

ScriptExecution

ManageWorkerThreads

FileMan/InetEvil Bunny

Page 28: The A and the P of the T

1. Unique binaries2. Irregular updates3. No repetitive artifacts4. Environmental sensitivity5. Multiple persistence techniques6. Consistent evasion7. Unknown spheres

Page 29: The A and the P of the T

The A and the P of the T

1 2 3 4 5 6 7

BlackEnergy

Havex

BlackPOS

EvilBunny

estimated 56 Mio.

credit cards compromised

Page 30: The A and the P of the T

http://wall.alphacoders.com/big.php?i=318353

Page 31: The A and the P of the T

RESOURCES

• Havex - http://www.cyphort.com/windows-meets-industrial-control-systems-ics-

havex-rat-spells-security-risks-2/

• BlackPOS - http://www.cyphort.com/parallels-among-three-notorious-pos-

malwares-attacking-u-s-retailers/

• EvilBunny - https://drive.google.com/a/cyphort.com/file/d/0B9Mrr-

en8FX4M2lXN1B4eElHcE0/view

• Eddie - http://maiden-world.com/downloads/wallpaper.html

Page 32: The A and the P of the T

Thank you!

Marion Marschalek@[email protected]

http://karmadecay.com/