42
Target Attack (HKUST Gold version) Anthony LAI {Founder, Researcher}

Target attack (hkust gold edition)(public version)

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Target attack (hkust gold edition)(public version)

Target Attack (HKUST Gold version)Anthony LAI

{Founder, Researcher}

Page 2: Target attack (hkust gold edition)(public version)
Page 3: Target attack (hkust gold edition)(public version)

What is VXRL?Valkyrie-X Security Research Group• Voluntary, officially registered, non-commercial and

hobbyist group; • Focus on Web hacking, reverse engineering/exploitation,

malware analysis, forensics analysis, offensive security and attack analysis;

• Connect to and collaborate with researchers for research opportunity;

• Emphasise skills and knowledge sharing; • “Offensive, Creative and Fun”

Page 4: Target attack (hkust gold edition)(public version)

Conference and CTF participation

Page 5: Target attack (hkust gold edition)(public version)

Breaking News: VX@Blackhat USA 2014

Page 6: Target attack (hkust gold edition)(public version)

About APT Attribution and DNS Profiling

Page 7: Target attack (hkust gold edition)(public version)

Our research, talks and workshop- Network Forensics Kungfu Workshop, DFRWS Europe 2014 (Amsterdam)- APT Attack and Network Forensics Framework, APWG eCrime 2014- APT Espionage Case Studies, IEEE Malware 2011- Facebook Forensics, published in US government site, workshop done for TCD and HTCIA.

Page 8: Target attack (hkust gold edition)(public version)

Our research, talks and workshop- China is a victim, too. :) - AVTokyo 2013.5- APT Clustering and Attacker Profiling: DEFCON 19, HITCON, SYSCAN Taipei- DDoS Kungfu - DEFCON 20, AVTokyo - Chinese Malware analysis and Internet Censorship- Blackhat USA 2010 & DEF CON 18- Operation Saving Private Records - Webapp Security “Fengshui”

Page 9: Target attack (hkust gold edition)(public version)

Who am I?Focus on penetration test, threat analysis and code audit and give private corporate training

Threat advisor and pentest team mentor in various MNCs

CFP Speaker: Blackhat USA, DEFCON 18-20, Codegate, AVTokyo, Hack In Taipei, APWG, DFRWS, HTCIA APAC

Passionate over Capture The Flag games, reverse engineering and exploitation

Research interest: threat correlation, attacker profiling and payload analysis

SANS GREM, GCFA and GWAPT mentor; (ISC)2 ISLA APAC Sr. InfoSec Professional Award

Page 10: Target attack (hkust gold edition)(public version)

Agenda

What is target attack?Attack symptoms (illustrated with case #1)Our main dish case studiesMore …..

Page 11: Target attack (hkust gold edition)(public version)

Target Attack or APT?!

Target Attack (a.k.a Advanced Persistent Threat (APT)) is defined as “a long term pattern of targeted, sophisticated attack”

Page 12: Target attack (hkust gold edition)(public version)

Target Attack or APT?!

Consistent with more adversaries (e.g. nation states or terrorist groups with highly sophisticated levels of expertise and resources that seek to establish permanent footholds in organizations for purposes of impeding aspects of the organizational missions.

Page 13: Target attack (hkust gold edition)(public version)

ReferenceNational Institute of Science and Technology. 2011. Information Security Risk. [ONLINE] Available at:http://csrc.nist.gov/publications/nistpubs/800-39/SP800-39-final.pdf.

Page 14: Target attack (hkust gold edition)(public version)

Attack Symptoms

Step 1: Sending speared phishing emailSpoof your fellows, reporters, groupmate, etc.

Page 15: Target attack (hkust gold edition)(public version)

Attack Symptoms

Step 2: Aha, with an attachmentThe attachment could be a doc, docx, xlsx, xls, ppt, pptx, zip, rar, 7z, pdf files, or shortcut file.

Page 16: Target attack (hkust gold edition)(public version)

Attack SymptomsStep 3: When a target opens it, several exploits are launched:For this case, CVE-2012-0158

Page 17: Target attack (hkust gold edition)(public version)

Attack Symptoms

Step 4: Persistence and Connection to Botnet C2 server

Page 18: Target attack (hkust gold edition)(public version)

Attack SymptomsStep 5: Monitoring: Escalate or RetreatOperator will interact and monitor the compromised target’s machine. If there is no relevant and high value of intelligence, he/she considers uninstalling the payload.

On the contrary, he/she may load more advanced payload(s) to the target.

Page 19: Target attack (hkust gold edition)(public version)

Overall Observation

<CENSORED>

Page 21: Target attack (hkust gold edition)(public version)

18 Feb 2013Mandiant released a report named as “APT1” Report, it claims China PLA 61398 Unit is liable to attack at least 141 US organizations and companies.

Report: http://intelreport.mandiant.com/ News:http://blog.ifeng.com/article/23454037.html

Page 22: Target attack (hkust gold edition)(public version)

APT1 Report SummaryHighlights of the report include:

● APT1 is believed to be the 2nd Bureau of the People’s Liberation Army (PLA) General Staff Department’s (GSD) 3rd Department, which is most commonly known by its Military Unit Cover Designator (MUCD) as Unit 61398.

● APT1 has systematically stolen hundreds of terabytes of data from at least 141 organizations.● APT1 focuses on compromising organizations across a broad range of industries in English-speaking countries.● APT1 maintains an extensive infrastructure of computer systems around the world.● In over 97% of the 1,905 times Mandiant observed APT1 intruders connecting to their attack infrastructure, APT1

used IP addresses registered in Shanghai and systems set to use the Simplified Chinese language.● The size of APT1’s infrastructure implies a large organization with at least dozens, but potentially hundreds of

human operators.● In an effort to underscore that there are actual individuals behind the keyboard, Mandiant is revealing three

personas that are associated with APT1 activity.● Mandiant is releasing more than 3,000 indicators to bolster defenses against APT1 operations.

Page 23: Target attack (hkust gold edition)(public version)

APT1 Report

143.89.xxx.xxx? HKUST? Oh yeah!

Page 24: Target attack (hkust gold edition)(public version)

APT1 Report

What is HTRAN communication?

Page 25: Target attack (hkust gold edition)(public version)

Okay, HKUST timeVXRL tried to search 143.89.xxx.xxx:

Page 26: Target attack (hkust gold edition)(public version)

Okay, HKUST time (Y2012)

Page 28: Target attack (hkust gold edition)(public version)

Okay 143.89.*.* history :-)

Page 30: Target attack (hkust gold edition)(public version)

Okay, as alumni, I made query to ITSC:<CENSORED>

Page 31: Target attack (hkust gold edition)(public version)

Okay…..?!

<CENSORED>

Page 32: Target attack (hkust gold edition)(public version)

Okay, let us talks about HKUST

As an alumni, I made the following query on 11 March 2014:<CENSORED>

Page 33: Target attack (hkust gold edition)(public version)

Okay, Incident Response policy :-)

http://itsc.ust.hk/services/it-security/incident-responses/

Alright, no policy at all :)

Page 34: Target attack (hkust gold edition)(public version)

Observation

Y2011-Y2012: Noone knows about the machine was compromised.

Page 35: Target attack (hkust gold edition)(public version)

Other than the rank, please take care of your information and system, HKUST :-)<CENSORED>

Page 36: Target attack (hkust gold edition)(public version)

Lesson Learnt

How about your company?React only when incident strikes?Can you take the reputation loss risk?

Page 38: Target attack (hkust gold edition)(public version)

Counter comments against APT1 ReportRan2, VXRL:Some comments from the report is not sufficient raised by Ran2URL: http://espionageware.blogspot.hk

Page 39: Target attack (hkust gold edition)(public version)

In fact, China is also a victim :-)China is a victim, too :) @ AVTokyo 2013.5 Conference - Darkfloyd x ZettaURL: http://www.slideshare.net/anthonylai1668/avtokyo-2014-0xdfzetta

Page 40: Target attack (hkust gold edition)(public version)
Page 41: Target attack (hkust gold edition)(public version)

Targeted by Fangongheike

Page 42: Target attack (hkust gold edition)(public version)

Thank you for your listening

Email: Darkfloyd[at]vxrl.orgTwitter: @anthonation