holger unterbrink security researcher · • security engines and tools ... making the internet...

55
Holger Unterbrink Security Researcher

Upload: others

Post on 23-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Holger Unterbrink

Security Researcher

Page 2: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Agenda

• Who Is Talos ?

• Threats Talos has invest igated recent ly

Page 3: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Who is Talos

• Cisco’s threat intelligence organization

• Threat hunting

• Malware analysis

• 5 groups collaborating to produce threat intel

• Reputation feeds, signatures, IOC

• Security engines and tools

• Threat reports and blogs

• Who is behind Talos

• Cisco, Ironport, Sourcefire, ScanSafe,…

• RevEng, Data Scientists, Spam -, Web-,

DNS-, BGP-Experts, …

Page 4: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

THREAT DATA CYCLE

Page 5: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

TALOS PRODUCTS & INTELLIGENCE

Talos develops the threat intelligence detection that goes into all Cisco Security products and services.

Open Source End Point Cloud Web Network ServicesEmail Intelligence

P R O D U C T S

ESA

SpamCop

SenderBase

Snort Rules

ClamAV Sigs

AMP

ClamAV

CWS

OpenDNS

WSA FirePower

ClamAV

ATA

IR

ThreatGrid

D E T E C T I O N S E R V I C E S

Email Reputation

Malware

Protection

URL, Domain, IP

Reputation

Phishing

Protection

Vulnerability

Protection

Malware

Protection

Policy & Control

Cloud & End

Point IOCs

Malware

Protection

IP Reputation

URL, Domain, IP

Reputation

Malware

Protection

AVC

URL, Domain, IP

Reputation

Malware

Protection

AVC

Policy & Control

Malware

Protection

URL, Domain, IP

Reputation

Vulnerability

Protection

Cloud & End

Point IOCs

Malware

Protection

URL, Domain, IP

Reputation

Vulnerability

Protection

Custom

Protection

Cloud & End

Point IOCs

Malware

Protection

URL, Domain, IP

Reputation

Network

Protection

Page 6: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

250+Full Time Threat Intel Researchers

MILLIONSOf Telemetry Agents

4Global Data Centers

1100Threat Traps

Over 100Threat Intelligence Partners

THREAT INTEL

1.5 MILLION

Daily Malware Samples

600 BILLION

Daily Email Messages

16 BILLION

Daily Web Requests

Global

Honeypotnetwork

Open Source

Communities

• Spamcop

• OpenDNS• Senderbase

Vulnerability Discovery (Internal)

3.4 BILLION

AMP requestsTelemetry

ThreatGridCommunity

INTEL SHARING

AspisCrete

AEGIS

3rd Party Programs (MAPP)

ISACs

TALOS INTEL BREAKDOWN

Page 7: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

INTELLIGENCE COMMUNITIES

Project Aspis – collaboration between Talos and host providers

• Talos provides expertise and resources to identify major threat actors

• Providers potentially save significant costs in fraudulent charges

• Talos gains real world insight into threats on a global scale, helping us

improve detection and prevention, making the internet safer for everyone

[email protected]

AEGIS – information exchange between Talos and participating members

of the security industry

• Open to partners, customers, and members of the security industry

• Collaborative nexus of intelligence sharing in order to provide better

detection and insight into worldwide threats

[email protected]

Page 8: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Talos Homepage

http://www.talosintelligence.com/

Page 9: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Talos Homepage

Page 10: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Threats Investigated by Talos

Page 11: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Ransomware

Page 12: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Ransomware In format ion

TeslaCrypt 3 – Tales from-crypt(o)http://blog.talosintel.com/2016/03/teslacrypt-301-tales-from-crypto.html

• TeslaCrypt Details• Elliptic Curve Cryptography Basics

TeslaCrypt – The Battle is overhttp://blog.talosintel.com/2016/06/teslacrypt-decryptor.html

Page 13: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

More Ransomware In format ion

Cryptowall 4:http://blog.talosintel.com/2015/12/cryptowall-4.html

• Localized docs

• Eastern Europe regions excluded

SamSam:http://blog.talosintel.com/2016/03/samsam-ransomware.html

• Manually installed ransomware

Page 14: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Qbot Banking Trojan

Page 15: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Overview

• Around since 2008

• Recently experienced a large surge in development

and deployments

• Infection via browser based exploit kits

• Targets sensitive banking credentials and

FTP credentials

Qbot Banking Trojan

Page 16: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Packer

Header

code

Header

Stub code

packedorg. code

Header

Stub code

unpackedorg. code

jmpunpackpack

Org. executablee.g. Trojan.exe Packed executable

Unpacked executablein memory

Page 17: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Malware Packer

Payload(unpacked malware)

(Un)Packer Frequently changed

Much lessfrequently changed

Executable

Page 18: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Qbot Packer

Payload(unpacked malware)

(Un)Packer

Payload(unpacked malware)

618 different samples 73 different samples

Page 19: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Qbot Dropper

Payload(unpacked malware)

%appdata%\Microsoft\[RandomName]\ [RandomName].exe

{ProductId,Computer Name,Harddrive Serial Number}

PRNG

Page 20: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

RC4 encrypted Log Fi le

Script to decrypt logs for enhances IR

analysis

This will print out configuration information including initial infection time andFTP Exfil server information.

RC4 key generated by converting the folder name to lowercase, then taking the SHA1 hash of the resulting string

%appdata%\Microsoft\oykyjxjx\oykyjxj.dll

Page 21: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Updater

http[:]//<maliciousdomain.com>/viewtopic.php

• first 20 bytes are the RC4 key• 20-byte SHA1 hash • Updated version of Obot

Page 22: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Domain Generat ion Algor i thms (DGA)

2.mar.2016.00000001

First digit is the tens digit of the day of the month (though 2 is also used for days 30 and 31)e.g. 16. March 2016 = 1

22. March 2016 = 230. March 2016 = 2

Constant

Get date by sending an innocent looking GET request to Google and parsing the HTTP 301 Response for the date

Generate date based string:

Page 23: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Domain Generat ion Algor i thms (DGA)

2.mar.2016.00000001

Mersenne Twister (PRNG)

llrbprhssvbsmmfrpsojzjct.org

TLD Array[n]:.info.com.org.net…

n

…and use it as seed for the Mersenne Twister PRNG:

Page 24: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Webin jects – Fake Log Off

“set_url https://*.<BankDomain>.com/*logoff* GPR http://<MaliciousSite>/fakes/onlineserv_cm_logoff.html”

Sign out

Page 25: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

FTP Exf i l

Content: " ext_ip=[%s] dnsname=[%s] hostname=[%s] user=[%s] domain=[%s]

is_admin=[%s] os=[%s] qbot_version=[%s] install_time= %s] exe=[%s]“ …

FTP to a list of servers hardcoded in its config file.

“article_covezh618946_1450458170.zip”

“article” string | Random Value| Seconds since Linux Epoch |.zip

Page 26: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Compi la t ion by Day (Sun -Sat)

Page 27: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Compi le Time – Working Hours ?

Page 28: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

MS Rich Headers (undocumented)

Embedded compiler and linker version

MS Visual Studio executables

Page 29: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Rich Headers - Unpacked b inar ies

• 154 unpacked binaries contained only 6 unique Rich Headers• Some of which were almost identical • Likely caused by minor compiler updates on the same computer

These headers suggest the unpacked binaries were compiled in 3 unique environments

Page 30: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Rich Headers – Packed b inar ies

• The packed binaries contained 44 unique Rich Headers• 35 of which seemed to be slight variants of the others. • None of which matched the 3 Rich Headers from the unpacked binaries.

The packed binaries appear to be compiled from 9 unique environments

Page 31: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

The Group ?

Coder Team3 group members

6AM-8PM GMTMo-Fr* (Su)

Packer Team9 group members~10AM - 10:30PM GMTMo-Sa* (Su)

Developing and maintaining malware and a malicious infrastructure is a full time job !

Page 32: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

More In format ion

Qbot on the risehttp://blog.talosintel.com/2016/04/qbot-on-the-rise.html

Page 33: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

ShadowGate Takedown

Page 34: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

What is a Gate?

redir-iframes

profiling andexploitation

Proxy ExploitKit Server (EK)

Gate

Victim

WebServer• Compromised or• Malvertising

Page 35: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

What is ShadowGate?

• Large scale Malvertising based EK gate• Moved from Angler to Neutrino EK• Long lasting periods of inactivity• Very picky:

• Only 0.1% send finally to an EK• Large Scale Malvertising Campaign

• US/Canada/Middle East/China/New Zealand• Delivered various payloads including

Ransomware and Trojans

• Other Gates: Darkleech, Pseudo Darkleech, EITest

Page 36: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Campaign Deta i ls

Action Taken• Shadowed Domains Registered through GoDaddy

• Worked with GoDaddy to get domains shutdown• After first shutdown Gate pivoted• Found second server/campaign

• Also shutdown by GoDaddy

Domain shadowing:<attacker registered sub domain>. <legit domain>e.g. hasdsakdal.merrybrycemas.com

Page 37: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

More In format ion

Shadow Gate Campaign Take down (blog post)http://blog.talosintel.com/2016/09/shadowgate-takedown.html

Shadow Gate in action (video):

http://blog.talosintel.com/2016/09/shadowgate-takedown.html

Page 38: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Closing

Page 39: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

More can be found here

Checkout our blog: http://blog.talosintel.com/

Page 40: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

http://www.talosintelligence.com/

@talossecurity

Aegis Program: [email protected] Program: [email protected]

Page 41: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Angler Exploit Kit

Page 42: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Vic t ims View Demo

Page 43: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Explo i t Deta i ls

“Hacking Team” Adobe Flash 0days

CVE-2015-5119, CVE-2015-5122

IE 10 and 11 JScript9 Memory

Corruption Vulnerability

CVE-2015-2419

IE OLE Vulnerability

CVE 2014-6332

No JAVA ! Adobe Flash

CVE

2014-6332

Silverlight

Page 44: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Analys is

• Extremely innovative in evading or bypassing security devices

• Infrastructure

• One landing page serving 90000 victims a day

• 10% served with an exploit

• 40% success rate

• Hosting Information

• Found 60%+ Angler activity for month at two providers

• Limestone Networks and Hetzner

• $10,000 in cost and lost revenue each month for Limestone

due to use of stolen CC

Page 45: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Angler Back-End Archi tecture Exposed

Redirect to Proxy Server

Page 46: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Show Me The Money

http://talosintel.com/angler-exposed/

Page 47: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Overview

• Ransomware first seen beginning of 2015• First ransomware targeting gamers• Distributed via Exploitkits and Phishing Emails• Fast Evolution, but…• A history of cryptographic flaws

TeslaCrypt

Page 48: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Simpl i f ied Encrypt ion Algor i thm

Temp.AES256

key15/10/07 12:39 <DIR> .15/10/07 12:39 <DIR> ..15/10/07 12:36 78,971 1.jpg15/10/07 12:39 154,330 2.jpg15/10/07 12:36 123,240 3.jpg…

AES Encryption

1.jpg

PublicKey Encryption

Encrypted AES256 key

Meta data

Encrypted 1.jpg

• Elliptic Curve Cryptography• Encrypted Temporary AES key can only be decrypted with the private key• The public key is embedded in the malware dropper

Scan logical volumes

.XXX, .TTT, .MICRO, others*

Encrypted File

Org. File

Page 49: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

They are ly ing, can you bel ieve i t ?

Page 50: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though
Page 51: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though
Page 52: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though
Page 53: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though
Page 54: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

More In format ion

TeslaCrypt 3 – Tales from-crypt(o)http://blog.talosintel.com/2016/03/teslacrypt-301-tales-from-crypto.html

• TeslaCrypt Details• Elliptic Curve Cryptography Basics

TeslaCrypt – The Battle is overhttp://blog.talosintel.com/2016/06/teslacrypt-decryptor.html

Page 55: Holger Unterbrink Security Researcher · • Security engines and tools ... making the internet safer for everyone ... First digit is the tens digit of the day of the month (though

Other Ransomware

Cryptowall 4:http://blog.talosintel.com/2015/12/cryptowall-4.html

• Localized docs

• Eastern Europe regions excluded

SamSam:http://blog.talosintel.com/2016/03/samsam-ransomware.html

• Manually installed ransomware