Quantcast
Channel: Threat Geek
Viewing all 87 articles
Browse latest View live

Fidelis Threat Advisory #1021: The Turbo campaign, featuring Derusbi for 64-bit Linux

$
0
0

In the summer of 2015, Fidelis Cybersecurity had the opportunity to analyze a Derusbi malware sample used as part of a campaign we’ve labeled Turbo, for the associated kernel module that was deployed. Derusbi has been widely covered and associated with Chinese threat actors. This malware has been reported to have been used in high-profile incidents like the ones involvingWellpoint/Anthem, USIS and Mitsubishi Heavy Industries. These incidents have ranged from simple targeting to reported breaches. Every one of these campaigns involved a Windows version of Derusbi.

While we’ve analyzed many common variants of Derusbi, this one got our attention because this is a 64-bit Linux variant of Derusbi, the only such sample we have observed in our datasets as well as in public repositories. To our knowledge, no analysis of such malware has been made publicly available.

Key Findings

  • Both the malware and kernel module demonstrate cloaking and anti-analysis techniques. While they mimic techniques observed in Windows tools used by APT in some respects, the use in the Linux environment has forced new and sometimes unique implementations.
  • This Derusbi sample shares command and control (C2) infrastructure with PlugX samples targeting Windows systems seen in public repositories. It is our understanding that these tools were used in conjunction in the campaign.
  • The Derusbi sample has command and control patterns that precisely match those observed with the Windows samples. This will allow for reuse of command and control platforms for intrusions involving both Windows and Linux samples.
  • We believe the binary was recompiled on the same day it was installed, with the kernel module rebuilt to precisely match the configuration on the target system. This suggests the active participation of developers with the team conducting the operation. This is distinct from the workflow associated with the more mature APT tools, where builders for tools like PlugX, Sakula and Derusbi are assumed to be available to multiple actor sets who are likely simply users of these tools.
  • The active participation of developers is further substantiated by the use of the Turbo Linux kernel module, which was clearly compiled for the precise Linux version running on the target system.

Analysis

A number of anti-forensics techniques must be bypassed in order to determine the true capabilities of this sample. Two techniques used to hamper forensic analysis include the ability to run as a memory-resident memory module to prevent file-based detection of the Linux Kernel Module on the localhost and the ability to cleanly remove it from disk.

This 64-bit Linux variant of Derusbi shares many of the common capabilities provided by a typical remote access tool, including directory and file operations, command execution and remote access.  Additionally, obfuscation capabilities, such as timestomping and process hiding, make this sample even more interesting and difficult to analyze.

It is important to note that it would take significant effort to replicate the capabilities of the Windows version into the Linux version. This indicates an investment by the adversary to gain additional footholds within a victim’s infrastructure. By adding 64-bit Linux servers and clients to their target list it is evident that advanced threat actors continue to add to their capabilities. Enterprises worldwide have been investing in Windows-based detection and remediation platforms for many years now. Linux is widely used in the datacenter and for hosting critical applications and databases. The use of such malware instantly bypasses entire classes of commercial, Windows-only security products, thus opening up significant new exposures for enterprises.

To see the full report and findings, please visit Fidelis Threat Advisory #1021

View the IOCs, including the Yara rule, on GitHub.

View the Yara rule.

Updated on 3/8/2016 


Part 1: Pay Up, It’s a Hostile Hospital Takeover!

$
0
0

Fidelis-VideoShot-4

Ransomware attacks targeting the healthcare community are sending shockwaves through the industry. In late March, Washington DC-based MedStar Health became the latest in a series of providers to fall victim to ransomware.

The impact of a network-wide ransomware attack grinds operations to a standstill. Patient care is often at stake. In the wake of the MedStar attack, staff scrambled to provide services without access to emails and electronic patient records. It is not very surprising that Hollywood Presbyterian Medical Center in Los Angeles paid the perpetrators $17,000 in Bitcoin to regain access to their files after the February ransomware attack.

With these attacks, we’re seeing new attack strategies come into play. Ransomware, once a scourge largely against individuals, is now hitting companies and critical infrastructure where it hurts. These attacks demonstrate that data is becoming the new human ransom as criminals seek to cripple organizations by encrypting files with a private key – available at high cost – known only to the attacker.

When criminals target critical infrastructure, ransomware crosses an especially serious line, according to one of our partners who is a leading expert in cybersecurity law. “This case [the Hollywood Presbyterian incident] is an example of how cyber can impact the physical world – here, [it affects] the provision of medical services as some patients were diverted to other facilities,” says Tony Kim, global co-chair of cybersecurity at Orrick, Herrington & Sutcliffe LLP, a leading global law firm. “We’ve seen similar dynamics in relation to hacked vehicles, power grids, and other critical services.”

Criminals are also getting more aggressive in their attacks and demanding higher ransom payments, according to a partner who is a top expert on cyberinsurance. “Cyber extortion and ransomware are, without question, on the rise,” shares Toby Merrill, senior vice president, global cyber practice leader for Chubb, the world’s largest publicly traded property and casualty insurer. “A concerning aspect is that the demand values are increasing exponentially. What used to be a few thousand dollars with commoditized ransomware is turning into larger cyber extortion events."

The Hollywood Presbyterian hospital ransom was particularly vicious in that criminals sought an extremely high dollar payment of $3.4 million. The final amount negotiated, $17,000, was substantially less. Is this a new approach in which the terrorist expects the victim to negotiate, as with human ransoms? Start with an outrageous sum and settle for less? This figure is much higher than the average payout for ransomware. Will we see future ransomware victims adopt this practice of negotiating settlements to eke out maximum value from the payer?

Hospitals and companies can manage and minimize ransomware risk if they are prepared. These organizations must be as aggressive and flexible as the attackers to avoid hostile takeover of their networks, proprietary data and user information. Stay tuned for our next blog post on actionable steps organizations can take to guard against ransomware attacks. 

-- Barnaby Page

Part 2: Bolster Defenses to Prepare for Ransomware Attacks

$
0
0

Ransomware

As criminals continue their relentless ransomware attacks on healthcare providers, organizations are asking how to prepare and minimize the impact of an attack.

What can an organization do to bolster their defenses? Prepare! We advise the following strategy to handle a ransomware incident:

1. Assess your current capabilities focusing on your users’ awareness posture and data security. This involves a risk assessment that looks at systems and employees. Companies also need to test email phishing vulnerabilities and safe browsing habits (e.g., social engineering). Deploy safe browser configurations and test your company’s ability to respond to an incident. It is one thing to have a plan and another to execute the plan successfully.

2. Consider implementing session-based network detection tools that can detect, analyze and block exploit kit (EK) activity. As exploit kits deliver ransomware (teslacrypt, etc.) to your network, you may be able to block the EK and see the encryption keys exchanged prior to encrypting your data. You may also detect shifts in infrastructure, which will trigger an alert. Be proactive to avoid putting your entire infrastructure at risk.

3. Develop a Disaster Recovery and Business Continuity (DRBC) plan and consider purchasing cyber insurance to transfer risk. Insurance companies are adjusting coverage based on a company’s security profile and response plans. For example, Ironshore offers full policy limits for both network and data extortion. “But if the applicant doesn't have a DRBC plan in place, then we will cap the limit to $1 million,” says Kurt Suhs, vice president, Ironshore.

4. Finally, if you are hit with ransomware, turn to outside counsel and forensics firms for help. They can negotiate and pay ransom fees if needed without creating a Bitcoin account. They can manage company fallout and repair brand reputation. Organizations may also need assistance in recovering data from backups, volume snapshots or restore points.

A solid (DRBC) plan and experienced cybersecurity partners are critical to keeping networks and information secure. Learn how we can help your organization with proactive and compromise assessments, and incident response.

 

-- Barnaby Page

5 Tips from the Front Lines of a Critical Security Incident

$
0
0

Endpoint-blogHere we go again. Stress levels are rising. Colleagues are in a panic and executives want answers now. Critical alerts suggest you’ve been compromised. The question is: Where did it happen?How did the attacker get in? Are any endpoints compromised? What’s the extent of the damage? What was stolen?

Sound familiar?

Security teams face these challenges daily as thousands of alerts flicker across their monitors indicating potential incidents. Tasked with reviewing and triaging these suspected incidents, analysts are unable to quickly validate whether an incident is real or not. They receive little context and they can’t assess the potential impact.

It can take days or weeks to investigate, retrieve and analyze data about a threat. Then, time-consuming manual processes slow things even more as you toggle data back and forth between multiple security solutions to analyze your entire fleet of endpoints. What’s the result? Analysts often miss the most critical attacks or detect them long after vital data has been stolen.

Avoid the panic. Ignore the knee-jerk reaction to remove the impacted system and reimage it. Chances are that one compromised machine is just the tip of the iceberg. Wiping it clean could alert the attacker and cause them to dive deeper into your network. A better alternative is to start with this approach:

  • Evaluate the capabilities of your security processes and technologies
  • Identify gaps and opportunities for improved efficiency
  • Determine what solution(s) will best fill those gaps
  • Get more from your existing security infrastructure

To help you get started, we’ve compiled five questions to help you think about how you can improve your incident response capabilities:

  • What processes can you automate? For example, can you collect an endpoint triage package based on an alert you get from your next-gen network device? To effectively detect and respond to a security incident you need to gather and analyze multiple complementary data sources as one. Reducing the number of manual steps required to piece together data from multiple sources and streamlining these workflows will shrink the time it takes to detect, investigative, analyze and resolve an incident.
  • What type of threat intelligence are you able to consume? Are you limited? Intelligence is critical to increasing your ability to detect and respond to an attack. Being able to consume threat intelligence in a broad range of formats increases your team’s ability to detect, prioritize, and successfully remediate threats.
  • Can you quickly capture information from your endpoints to help triage an alert? Collecting and analyzing rich endpoint data can take hours or even days. And it often results in false positives. Automating these tasks is one of the easiest ways to improve productivity. If you can get an initial set of data such as running processes, open network connections or recently executed applications you can quickly validate the severity of an alert. Also, the benefits of detecting security incidents early in the attack lifecycle translates to lower costs associated with a breach and less complexity.
  • Are you able to identify the source of an initial compromise or how an attacker moved laterally to other systems? Understanding what happened before and after an alert gives you visibility into the scope of the compromise. It also helps you perform a damage assessment by showing you what, if anything, was taken. Traditional forensic data is difficult to piece together and often incomplete. Advanced endpoint detection and response technology that records data enables analysts to quickly query and review past events. This provides visibility and context into what happened so you can fully respond and eliminate the attacker.
  • Can you immediately halt data exfiltration and lateral movement or kill a process? Manual remediation is extremely time consuming and requires skilled analysts who are in high demand. Immediately stopping data exfiltration and isolating the endpoint decreases the time to resolve an incident and the risk of intellectual property loss. Implementing endpoint detection and response solutions, with system management capabilities, consolidates resources better and improves overall security hygiene.

Our initial recommendations will help you gain greater visibility and intelligence about your alerts so you can detect and respond faster to critical incidents. The end goal is to help your team detect the bad guys faster – before they steal your important data.

Want to learn more? Check out our in-depth Rapid Detection and Response Model guide to help build and strengthen your incident response programs. Read more about our Fidelis Endpoint solution, which provides the visibility, context and automation required to identify security breaches as they are unfolding, enabling security teams to quickly focus on the incidents that matter. Watch our Fidelis Endpoint overview video here. For immediate incident response assistance, contact our Fidelis Security Consulting Services here.

-- Jennifer Bielski, product marketing manager

Turbo Twist: Two 64-bit Derusbi Strains Converge

$
0
0

To follow up on the March report on the discovery of a 64-bit Linux variant of Derusbi used in the Turbo campaign, this post covers our analysis of two unique Windows variants of the Derusbi PGV_PVID malware. Derusbi has been widely covered and associated with numerous Chinese cyber espionage actors, including the group known as C0d0s0 Team (aka Sunshop Group) and its watering-hole attacks using Forbes[.]com in 2014.

What made these two variants of interest is that, as of April 28, 2016, there are zero (0) antivirus detections of these variants at VirusTotal. On April 29, our team also scanned these variants with two different local antivirus tools running the latest virus signatures and the APT malware was still undetected. Based on compile times in the variants analyzed, it appears that this variant has been around since at least 2013.

Some of the strings in these variants have also been observed in variants of the Bergard APT malware. The Derusbi variants were identified and named by Proofpoint earlier this year.

Our Yara hunting rule that detected these two Derusbi PGV_PVID variants with zero antivirus detections also detected two other variants that are detected by AVs as “Derusbi”. One of the Derusbi PGV_PVID samples that we analyzed shares its command-and-control server with a Rekaf sample identified by Proofpoint, furthering the connection between these families that they established in their post.

Interestingly, at least one of the domains used here is currently registered with the China-based domain broker we identified in the Turbo campaign report. After doing some pivots involving the IP addresses observed in our analysis, we have a trove of very interesting domains, all listed at the bottom of this report. These domains include ones that might purport to represent prominent U.S. defense contractors, media outlets, etc. It has to be noted that we have not identified malware or a campaign that uses these domains, but in our observation, the purpose of registering these domains would be to launch a targeted campaign against the named organization or others that trust them, such as partners and customers. These techniques were widely observed in 2015, in events involving U.S. OPM, Anthem Healthcare, etc.

These domain pivots have also shown us further connections between these PGV_PVID, Rekaf and Bergard variants of Derusbi. The specific indicators are provided later in this post, but the relationship is illustrated with these tables. The dates on these records is worth noting, since it could potentially indicate campaign periods.

Passive DNS relationship

Domain

google-dash[.]com

office365e[.]com

Record Type

A

A

Time

first seen 04-09-2016

last seen 04-19-2016

first seen 04-25-2016

last seen 04-29-2016

 * Source DomainTools/Farsight DNSDB

Passive DNS relationship from 121.54.168[.]216

Domain

google-dash[.]com

ukoffering[.]com

microsoft-cache[.]com

Record Type

A

A

A

Time

first seen 01-14-2016

last seen 04-02-2016

first seen 01-29-2016

last seen 02-02-2016

first seen 01-03-2016

last seen 01-23-2016

 * Source DomainTools/Farsight DNSDB

In this vein, there's a clear preponderance of popular online services and technologies – variants of Google, Office 365, Virtualbox and VMtools feature in this domain set. It has to be noted that these are technologies that are very popular across a broad set of enterprises and offer a very broad set of opportunities.

 

Malware Analysis

All four variants perform an HTTP request that is almost identical, with the exception of the Command & Control server and a small variant in one of the “Referrer” values. Even a 16-digit value in the URL and Cookie was the same. This beacon format and 16-digit value was also observed in the PGV_PVID variants analyzed earlier this year by Proofpoint.

Three of the samples contained the following string of interest: “payload_service_x64.dll”.

These PGV_PVID variants were observed encoding some of its configuration, APIs and other strings with a single-byte XOR key. Some of the keys used are: 0x90, 0xEB and 0x57.

It was also interesting to see how these samples were trying to disguise themselves during entrenchment as valid services in the system to try to confuse incident responders, computer forensics investigators and network administrators. The following screenshots show the Microsoft service management console with the legit and malicious service (malicious service highlighted):

Derusbi1

 

Derusbi2

 

The following is a list of the malware samples analyzed:

 

MD5CnCAV detectionsCompiled DateImphash
3e4fbb9190227848af32dacb17e9fd17

google-dash[dot]com

012/4/14

86fafe21566d0906fecc5dfd939f3e45

b93197e2aa147fe6b70695ae7bb298b0

office365e[dot]com

012/4/14

86fafe21566d0906fecc5dfd939f3e45 

4979e819d3ffbea81c7111fb515c1c7

web01.kruul[dot]com

224/11/13711a1d4aef8414cf1db45a6945ba3d84
791295ef196cf8c20913b3cce76af29a

google-dash[dot]com

1612/4/146752d45fd952c97c969939600acc5748

 

Two samples of the network traffic format associated with this threat:

  1. b93197e2aa147fe6b70695ae7bb298b0

GET /pki/nss/init?0220372661170240 HTTP/1.1

Referer: http://www.microsoft.com/

Accept: */*

Accept-Language: en-us

Accept-Encoding: gzip, deflate

User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Win32)

Host: office365e[dot]com:80

Cache-Control: no-cache

Connection: Keep-Alive

Cookie: pgv_pvid=0220372661170240

  1. 3e4fbb9190227848af32dacb17e9fd17

GET /pki/nss/init?0220372661170240 HTTP/1.1

Referer: http://www.google.com/

Accept: */*

Accept-Language: en-us

Accept-Encoding: gzip, deflate

User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Win32)

Host: www.google-dash[dot]com:80

Cache-Control: no-cache

Connection: Keep-Alive

Cookie: pgv_pvid=0220372661170240

Antivirus detection for two of the samples:

1. 3e4fbb9190227848af32dacb17e9fd17

Derusbi3

 2. b93197e2aa147fe6b70695ae7bb298b0

Derusbi4

  

Indicators of Compromise

Registry Entrenchment

  • HKLM\System\CurrentControlSet\services\hkmservice\Parameters\ServiceDll=[CWD]\64.dll
  • HKLM\System\CurrentControlSet\services\ swprvsvc\Parameters\ServiceDll=[CWD]\swprv64.dll
  • HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{BD5A117E-658C-4b8c-AED3-3D177B36F0A8}\stubpath=C:\Windows\system32\regsvr32.exe /s [CWD]\MSChartCtrl.ocx

Service Information

  • Display Name 1: Health Key and Certificate Management Service
  • Service Name 1: hkmservice
  • Display Name 2: Microsoft office products Shadow Copy Provider
  • Service Name 2: swprvsvc

Mutex

  • 2-7-26-96EFFFFD-6666-706b-6506-3B6BC6486663-0-7-2
  • 1-5-19-85EDC10D-6745-404b-A50D-4BCBC6480873-1-5-19

Command & Control Servers

  • google-dash[dot]com
  • office365e[dot]com
  • kruul[dot]com
  • nsa.org[dot]cn

URLs

  • /projects/security/pki/nss/index.htm?[16 digits]
  • /developers/menu.php?[16 digits]
  • /pki/nss/init?[16 digits]
  • /solutions/company-size/smb/index.htm?[16 digits]
  • /selfservice/microsites/search.php?[16 digits]
  • /store/category_groups?[16 digits]

 

Yara detection rule

The following Yara rule was created to detect these samples:

rule apt_win32_dll_bergard_pgv_pvid_variant

{

               meta:

                               copyright = “Fidelis Cybersecurity”

                strings:

                                $ = "Accept:"

                                $ = "User-Agent: %s"

                                $ = "Host: %s:%d"

                                $ = "Cache-Control: no-cache"

                                $ = "Connection: Keep-Alive"

                                $ = "Cookie: pgv_pvid="

                                $ = "Content-Type: application/x-octet-stream"

                                $ = "User-Agent: %s"

                                $ = "Host: %s:%d"

                                $ = "Pragma: no-cache"

                                $ = "Connection: Keep-Alive"

                                $ = "HTTP/1.0"

                condition:

                                (uint16(0) == 0x5A4D) and (all of them)

        }

Domains identified from pDNS pivots

asixgroupincmeer[.]biz

attrcorp[.]com

smtp.attrcorp[.]com

office365e[.]com

office365e[.]com

usapappers[.]com

e.usapappers[.]com

bee.usapappers[.]com

ftp.usapappers[.]com

sun.usapappers[.]com

wow.usapappers[.]com

shot.usapappers[.]com

email.usapappers[.]com

dijlacultus[.]com

bbs.dijlacultus[.]com

fok.dijlacultus[.]com

back.dijlacultus[.]com

info.dijlacultus[.]com

live.dijlacultus[.]com

mail.dijlacultus[.]com

news.dijlacultus[.]com

serv.dijlacultus[.]com

tele.dijlacultus[.]com

thec.dijlacultus[.]com

zero.dijlacultus[.]com

swiss.dijlacultus[.]com

living.dijlacultus[.]com

mailsrv.dijlacultus[.]com

google-dash[.]com

virtualboxs[.]com

steletracker[.]com

vmtools[.]net

pwc.vmtools[.]net

win.winlogon[.]net

asia.winlogon[.]net

winner.winlogon[.]net

hawkthorn[.]net

strightspunddeals[.]net

northropgruman[.]org

owa.northropgruman[.]org

vpn.northropgruman[.]org

soft.northropgruman[.]org

update.northropgruman[.]org

software.northropgruman[.]org

cegauoqsykgqecqc[.]org

eimqqakugeccgwak[.]org

uogwoigiuweyccsw[.]org

soyy[.]info

haha[.]school

ns1.krimeware[.]com

ns2.krimeware[.]com

tianzhen[.]co

www[.]tianzhen[.]co

monsterlegendsvn[.]biz

www[.]monsterlegendsvn[.]biz

nickytoh[.]com

www[.]nickytoh[.]com

seratjati[.]com

aiselamodefactory[.]com

tasty-and-healthy[.]com

nickytoh[.]net

www[.]nickytoh[.]net

animationmyth[.]net

www[.]animationmyth[.]net

petersenstore[.]org

www[.]petersenstore[.]org

forum.haha[.]school

musicis[.]science

 

References

-- The Fidelis Threat Research Team

 

 

 

 

 

 

 

 

 

Welcome to the Jungle: Tips for Staying Secure When You’re on the Road

$
0
0

IStock_000001428391_Small

The summer travel season is right in front of us. While the jungle may not be your intended destination, that’s exactly where you’re likely to find yourself. When you walk out the door with your smartphone and laptop, you become a high-value target. Your individual privacy and your employer’s valuable data is at risk, sought after by attackers eager to get their paws on it.  

But don’t fret. Here are some simple (and free) steps you can take to keep your information safe when travelling. If you like these tips, check out my recent webinar that goes into more depth about security precautions executives and employees should take when travelling or working remotely.

 

Beware of rogue Wi-Fi access points and unmanaged networks

While mobile hotspots in coffee shops and airports are convenient, shared computers and free Wi-Fi are easy attack zones. Wi-Fi skimming, in which anyone on the public network can “sniff” your traffic, is a common tactic. Public Wi-Fi networks may appear legit, but some are specifically designed to dupe connected users Fake hotspot registration pages -- designed to look like the real deal -- entice you to hand over your credit card information. Public computers may be infected with malware or in the hands of keystroke loggers.

  • Avoid using public computers to login to your company’s network.
  • Use Virtual Private Network (VPN) connections on your connected devices to secure your internet connection and your encrypted traffic, especially on public Wi-Fi.
  • Use a personal VPN service, such as Private Internet Access, for personal computing.

 

Always use two-factor authentication

Two-factor authentication is an imperative no matter where you are or what device you’re using. It requires both something you know – such as a PIN or password – and something you have, such as your cell phone. Users input their passwords or protected log-on credentials and a secondary device provides a random one-time use code to authenticate the second log-on step. Most major email programs and many popular websites now offer two-factor authentication. You can see how to do it on Gmail here.

  • Turn on two-factor authentication to access your online accounts.
  • Visit https://twofactorauth.org to find websites that support two-factor authentication.

 

Encrypt your laptop and devices to protect data and corporate networks

Illegal access to your computer or device enables attackers to infiltrate corporate networks and steal your files. In some cases, when travelling to foreign countries, border agents reserve the right to examine your computer and possibly copy files. Your privacy is compromised and your data can be exposed. But if your device is encrypted, access to your computer or phone doesn’t mean they can access the data. Full-disk encryption is a strong precaution -- use it at all times.

  • Don’t blindly flip on encryption – make sure you understand the basics.
  • Fully research encryption options and follow instructions.
  • Remember, if you forget your passphrase, it’s difficult to gain access into an encrypted hard drive.

 

Guard against electronic surveillance

Electronic eavesdropping has been reported on airlines and in hotel rooms, taxis and meeting rooms. When you’re in a public place you should never expect your communications are private. Assume that phone calls and electronic communications are insecure and being monitored by adversaries.

  • When travelling to foreign countries, consider bringing a company-owned loaner cellphone, laptop and/or tablet with minimal and non-critical data stored. This limits the loss of corporate and personal data if the device is lost, stolen or confiscated by officials.
  • Ensure the phone is encrypted and is set to wipe after a number of failed login attempts.
  • Use a single-use email – not your regular business email account – from your company or from an external provider, such as Gmail. Use different passwords than your regular email.
  • Don’t carry unencrypted USBs or connect foreign electronic storage devices to your computer or phone, as they may be compromised.
  • Avoid enabling Bluetooth and always switch off the microphone, camera and location applications on your computer and devices.

Organizations invest millions of dollars in sophisticated security measures to protect you when you’re on their network. But the moment you step out into the jungle, your choices can make an even larger impact on your security. Be aware and take basic precautions. While security practices may seem inconvenient and burdensome, the stakes are too high to consider cybersecurity an afterthought.

For additional tips, watch my on-demand webinar, Welcome to the Jungle on practical operational security for travelers.

 

-- Justin Harvey

Vawtrak Trojan: Bank on it Evolving

$
0
0

IStock_000088498443_SmallOn May 12, 2016, Fidelis Cybersecurity witnessed an update to Vawtrak malware, a banking trojan, spread via an email campaign using subpoena- and lawsuit-related themes.  The configurations observed in this campaign point to an attempt to harvest user credentials when visiting accounts on major financial websites in the U.S. and U.K., such as ADP, Capital One, Citibank, Lloyds Bank, etc. The downloaded Vawtrak malware displays characteristics unlike previously seen variants, including new obfuscation and potential antivirus injection. The full list of targets and details around the technical evolution are discussed in detail below. Further, we're publishing an IDA decoder script to aid fellow researchers.

Vawtrak (aka Neverquest) is a modularized banking trojan active since at least 2013. Banking trojans are malware designed to steal your credentials through various methods (harvesting, keylogging, Man-In-The-Browser, etc.). Historically, Vawtrak has been broken down into “projects” by researchers; the current campaign is referred to as Vawtrak project id: 82.

Vawtrak has been observed being pushed both by Angler Exploit Kit and spam campaigns utilizing many delivery mechanisms.  In this campaign, the malware utilizes a macro document that drops and executes an embedded executable file, the downloader H1N1, which then downloads a pony dll and Vawtrak. It has a larger target list when compared to other banking trojans (See “Project 82 Targets” below), includes a tested and expansive webinject system, and comes with at least five modules that are commonly downloaded in both 32- and 64-bit variety: injecter_(32|64).dll, dg_(32|64).dll, keylog_(32|64).dll, pony_(32|64).dll and bc_(32|64).dll.

Once Vawtrak makes it to disk, it commonly uses the same loader program to inject the AP32 compressed DLL, depending on whether the system is 32- or 64-bit architecture.

 

1. The strings are encoded using a linear congruential generator (LCG) fed by a psuedorandom number generator (PRNG) (#4 and #5).  The strings in this loader were encoded the same way as the dll strings.

Decoded strings

cookingwithme[.]date

GET /?id=%0.8X00%0.4X

Host: %s

http:// %s/?id=%0[.]8X01%0[.]4X

ns#Sophos#AgentSv#McTray#avp#fshoster32#egui#dwengine#vsserv#avgidsagent#Avira.ServiceHost#AvastSvc

 

2. The traffic pattern generated with these strings is not a normal Vawtrak traffic pattern. Typically, traffic would be generated by the injected dll and not the loader. If the domain resolves, then the loader generates the traffic pattern with swprintf after gathering some information about the system(VolumeID and adapter settings). In the case of this recent and updated version, the parameters passed to swprintf were in the wrong order and caused the loader to crash. This could be some sort of mechanism for trying to track new infections or, possibly, could be used to limit the loader to running only until that domain is activated.

Image1

Parameters in wrong order

Image2

 

 

Parameters fixed

 Image3

Generated traffic

A Vawtrak sample later delivered by H1N1 on May 16, 2016 did not appear to contain this logic, which suggests that it’s being actively tested during development. However, the May 16 version used the domain found in the loader piece of the May 12 sample as a C2 domain.

 

3. Both samples contained the string of antivirus names. The loader enumerates the list of running processes, stripping off the ‘.exe’ of each one and then seeing if the name appears in that long string.

Image4

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  

If the string is found, then it sets a flag and immediately begins searching for explorer.exe in an attempt to inject. To test, we spun up a fake Sophos program that appeared to have been injected as suspected. Once the DLL is injected, the malware patches certain functions in memory (CreateProcessInternalW and RegGetValueW) for every process it injects, with the patched in routine looking for Chrome-related objects. We didn’t see any signs of the malware attempting to do anything specific to the injected AV processes, but the functionality could be added in the future to disable or attempt to circumvent them in some way.

Vawtrak is one of the more advanced banking trojans used by cybercriminals today. The observed changes to the malware demonstrate continued development to circumvent detection and thwart AV protection mechanisms. Since Vawtrak began to gain strength late 2015, its target list has grown steadily.  As Vawtrak development continues, we expect the target list to expand and additional techniques to be leveraged to infect systems. 

 

View the IOCs on GitHub https://github.com/fideliscyber

 

 

12may2016 Vawtrak

MD5: 5238cd34caae600b3f592e2595aa6949

IOC

foundingcast[.]com/rss/feed/stream

dringeraout[.] com/rss/feed/stream

broilerona[.]com/rss/feed/stream

bookeranto[.]com/rss/feed/stream

vineriadana[.]com/rss/feed/stream

greyscrolling[.]com/rss/feed/stream

solidarepapero[.]com/rss/feed/stream

svenorta[.]com/rss/feed/stream

Webinjects:

Silvmafo[.]net

 

16may2016 Vawtrak

MD5: 6fad86a0fcc912f32474f6c7a86fe37a

IOC:

goodtrade[.]bid/rss/feed/stream 

todaywith[.]date/rss/feed/stream 

quicklinks[.]download/rss/feed/stream 

beproudof[.]faith/rss/feed/stream 

takeaphoto[.]loan/rss/feed/stream 

oldblackman[.]party/rss/feed/stream 

fastblackspeed[.]racing/rss/feed/stream 

cangetyour[.]review/rss/feed/stream 

epicsimple[.]science/rss/feed/stream 

fastandeasy[.]trade/rss/feed/stream 

seeyounow[.]webcam/rss/feed/stream 

championinred[.]win/rss/feed/stream 

chalengeforyou[.]win/rss/feed/stream 

cookingwithme[.]date/rss/feed/stream 

 

Project 82 Targets

Adp.com

Americanexpress.com

Barclayswealth.com

Blilk.com

Blockchain.info/wallet/

Bankofamerica.com

Tdbank.com

Capitalonebank.com

Chase.com

Cibc.com

Citibank.com

Citi.com

Db-direct.db.com

Discoverbank.com

Etrade.com

Fidelity.com

Hmrc.gov.uk

Key.com

Lanb.com

Lloydsbank.co.uk

Bankofscotland.co.uk

Myapps.paychex.com

Netteller.com

Onlinebanking.pnc.com

Schwab.com

t-mobile.com

securentrycorp\..*\.com

usaa.com

vanguard.com

wellsfargo.com

westlaw.com

 

IDA python script for decoding unpacked loader and dll strings

def PRNG(seed):

            seed = (seed * 0x41c64e6d) + 0x3039

            return (seed & 0xFFFFFFFF)

#Unpacked loader - Md5: 3678dc31a2be281fa7ed178d535364fb

for addr in XrefsTo(0x401a1b, flags=0):

#Unpacked dll - Md5: 54db3f86aabaf3e87016bcff923dba41

#for addr in XrefsTo(0x10007df8, flags=0):

            addr = addr.frm

            #print(hex(addr))

            addr = idc.PrevHead(addr)

            while GetMnem(addr) != "push":

                        addr = idc.PrevHead(addr)

            print(hex(addr))

            #Get first param pushed which is address of domain

            data_addr = GetOperandValue(addr,0)

            init_seed = Dword(data_addr)

            data_addr += 4

            xork = Dword(data_addr)

            data_addr += 4

            length = (init_seed ^ xork) >> 16

            out = ""

            for i in range(length):

                        init_seed = PRNG(init_seed)

                        out += chr((Byte(data_addr) - (init_seed & 0xFF)) & 0xFF)

                        data_addr += 1

            if out[-2:] == '\x00\x00':

                        print(out.decode('utf16'))

            else:

                        print(out)

addr = 0x1000f8a0

for i in range(10):

            data_addr = Dword(addr)

            addr += 4

            init_seed = Dword(data_addr)

            data_addr += 4

            xork = Dword(data_addr)

            data_addr += 4

            length = (init_seed ^ xork) >> 16

            out = ""

            for i in range(length):

                        init_seed = PRNG(init_seed)

                        out += chr((Byte(data_addr) - (init_seed & 0xFF)) & 0xFF)

                        data_addr += 1

            print(out)

 

-- Jason Reaves, Threat Researcher

Attacker vs. Victim: Investigating an Incident from Both Perspectives

$
0
0

IStock_000089368073_Small

At InfoSecurity Europe in June, I will be showing a demonstration of what we call: “Attacker vs. Victim”, which uses real zero days, malware and tools to compromise a fictitious company and steal data. The purpose of this demo is to show executives, media and security practitioners what an actual breach looks like, and how dangerous they can be. As an industry, we talk about cyber attacks and cyber defense on a daily basis, but it is surprising how many people haven’t actually seen an attack from beginning to end.

There are no air raid sirens for cyber attacks. So when an attack occurs, victims rarely have any idea what is happening. My demo simulates exactly what happens following actual incidents that we, as a company, work on a daily basis. A seemingly innocent FedEx email states “click here to re-route your package.” It could fool even the wariest user. After clicking on this link, nothing happens at least from the user perspective, yet the attacker has already established a foothold in your network.

A foothold. It seems so tenuous, temporary or benign, but that’s all that is needed these days. One endpoint, somewhere on the inside and the attacker(s) can now launch additional attacks or exploits against the enterprise. Perhaps their goal isn’t to find intellectual property or personal identifiable information, but to spy on their victim by turning on the webcam and microphone without the user knowing it.

Enterprises face these types of threats on a daily basis. One of my favorite industry adages is - We have to be right every single time, but the attacker only has to be correct once. I couldn’t agree more. It’s as if we are playing a game of chess with the enemy, except instead of going turn for turn, they get three moves for every one of ours. Of course, the attackers never fight fair. The malware they employ is getting harder and harder to find.

In my demonstration I use a pervasive Remote Access Trojan (RAT), known as DarkComet, which focuses on command and control communication. In this toolkit, the authors have made created “signature-less” droppers by adding randomisation routines, which are loaded onto the victim’s computer.

Scary right? Vendors present this reality to show enterprises everything that’s bad in the real world, how easily it can happen and the extensive damage it creates. However, there is hope - a realization by organisations that you can’t prevent bad things from happening on your network or your endpoints. It’s human nature to want to prevent harmful incidents from occurring. As a parent, we want to protect our children knowing that they will experience the cuts, bruises and scrapes. What matters is how we react to these unfortunate events.

A board director reads the latest news and sees their competitor’s name in the headlines: Company X suffers major breach and millions of customer records were stolen. A chain of events unfolds. The board member calls the CEO and states “This breach cannot happen to us,” then the CEO calls the CISO to say “We need to prevent breaches into our networks. Are we secure and what happens if we’re compromised?” The CISO is immediately put into a difficult position, a “prevent bad stuff from happening” scenario. What kind of funding for prevention vs. detection do you think the CISO is going to get?

Brian Karney, Fidelis’ SVP of Products, laments regularly with an accurate point “If there’s a dollar to be spent on security, it’s going towards prevention and not detection and response.” This is unfortunate, but again, there is hope. Organisations are now realizing they can’t prevent everything, but in the absence of prevention, what’s the answer? Detection. Getting better and faster at detecting the bad things that happen in the enterprise.

From a metrics perspective, it really comes down to two key focus areas: 1) Mean time to detect; and 2) Mean time to resolve. It’s as simple as that. Can organisations reduce how long it takes to detect when they’ve been compromised? Can they get faster at resolving these incidents? These are the two big questions that need answering.

I’m not saying that prevention is dead! Quite the contrary, there are so many threats (both commodity and targeted) out there that can be characterised as a signature, rule or pattern.  Strive for prevention, but realise that at the end of the day, you will always need to detect the hidden and deeply embedded threats that prevention tools missed.

I’ll leave you with one of my favourite historical quotes (from a Russian proverb), which has perfect cybersecurity significance in meaning: “Trust, but verify” (Доверяй, но проверяй). It was spoken by U.S. President Ronald Reagan in the 1980s, emphasising trust and cooperation with the USSR, in relation to their mutual nuclear disarmament. This quote can be applied perfectly to cybersecurity and is actually great advice for enterprises today.

Come by and see my ‘’Attacker vs. Victim” demo at the Fidelis Stand, B160, InfoSecurity Europe in Olympia London between 7 and 9 June 2016. I’d like to hear about your security ops challenges and share stories.

-- Justin Harvey, CSO


New Ursnif Variant Targeting Italy and U.S.

$
0
0

Video3

Fidelis Cybersecurity has been investigating a new variant of Ursnif, a family of trojans that captures and reports information about user activity back to the attacker. We recently observed the variant distributed in phishing runs designed to appear as legitimate banking-related emails. On infected hosts, it attempts to perform webinjects to capture credentials for major U.S. banking sites, including Citibank, JPMorgan Chase, USAA and Capital One. Interestingly, it takes screenshots when victims visit a variety of Italian sites, such as Unicredit, Poste and Relax Banking. To evade detection, it also blocks access to a surprisingly large number of security-related websites. What specifically grabbed our attention was the change in command-and-control traffic that distinguishes it from standard Ursnif.

Even as ransomware dominates the headlines, banking trojans are a profitable mainstay of the criminal domain.As recently reported, ransomware like CryptXXX has acquired credential-theft capabilities, signaling a marriage of sorts within the crime family. Banking trojans have been the vehicle for numerous innovations in malware over the years. These developments in Ursnif show us that technical investment across the crime domain continues. The targeting of Italian and U.S. financial institutions also points to the global scope of opportunity for such criminal actors.

This post covers our analysis of these changes and how we reversed them. Further, we share configuration details as well as IOCs.

Infection Chain

The campaign we observed involves a javascript downloader spammed out in zip files. By using file names ending in .doc.jsIt, it disguises itself by pretending to be a document. The javascript downloader we analyzed included over 400 links that mostly appeared randomized -- except for one in particular, (fuchsias[.]net/New_Folder/icq[.]scr). The large number of random links were likely inserted as an attempt to hide the payload from researchers.

Once launched, it then downloads Andromeda, which is commonly used to deliver other malware. Using RC4 encryption, Andromeda will check in with its panel to retrieve a list of modules, or payloads, to  download. In this case, Andromeda downloaded a variant of Ursnif, along with Pony malware. This variant has been tracked by other researchers and is notable in that it uses a /images/ structure in its C2 communications, as seen in the example traffic later in this post.

After being unpacked and decoded, it's clear that this variant contains strings commonly associated with Ursnif. It also contains the strings associated with Rovnix and Gozi. This is likely why many researchers have been calling it Ursnif/ISFB/Gozi. There appears to be, at the very least, two versions of Ursnif in use for different purposes. One has been heavily reported as a fileless Ursnif variant delivering POS malware and has also recently been called PowerSniff. This variant, however, doesn’t appear to have the same C2 traffic, as the string appears almost base64-ish in nature and the strings allude to it being more focused on form-grabbing and web-injection.

Command-and-Control

As it turns out, this variant actually has the normal Ursnif traffic – except that it is encrypted and encoded to hide. After unpacking the DLL, we can either decode the strings section -- or as luck would have it, the malware will do it for us -- and copy the decoded section right over the old one. After that, looking at it in IDA becomes significantly easier.

Now that we can see the decoded strings and we can even see where the version number is passed in, finding the point where the traffic is created becomes a little easier.

Blog1

After being generated, Ursnif will then generate a random url variable that's prepended to the previously generated traffic string. The reason it prepends this will become apparent later, as the string will be encrypted in CBC (Cipher Block Chaining) mode and so the random data at the beginning will cause the traffic string to differ every time.

Blog2

After it is concatenated onto the newly generated random URL variable, the string is passed off to a function to be encrypted and base64 encoded. In this case, the encryption used was Serpent, a runner-up for AES. We can identify this algorithm by narrowing in on a particular loop in the code where it uses the magic number 0x9e3779b9 and loops 0x84 times (when going by DWORD values).

Blog3

This can be seen in a C implementation of this algorithm below.

Blog4

Unlike most of the implementations found online, the one in Ursnif involves CBC. After finding a good implementation of the algorithm using the ECB (Electronic Codebook) written by Bjorn Edstrom and studying the description of CBC, we can turn this Python code into a CBC mode for testing fairly easily, as the bot uses an IV of 16 NULL bytes.

Blog5

 

After encrypting the URL, the bot then Base64 encodes the string and trims off any newlines or base64 padding ‘=’ characters. Blog6

Next, the bot passes the string to a function that will enumerate all characters in the string, looking for ‘/’ and ‘+’ characters. When found, they will be converted into their hex form preceded by an underscore such as ‘_2F’.

Blog7

Next, the string is passed off to a function that will add random slashes to the string in order to make it look more like a URL string.

Blog8

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

The URL string is finished by adding either a .bmp or .gif extension to the end and appending the entire string to /images/ and then appending the combined string to the domain or domain-and-URL combination in the bot.

After finally checking in, the bot will get a fairly large U.S. config and the targets are included below. This run of Ursnif appears to be spammed to both the U.S. and Italy, which makes sense, given the targets are primarily businesses based in these countries. However, Ursnif itself has basic form-grabbing capabilities, so any site or application that an infected user logs into could potentially be compromised. Attackers are stealing log-in credentials and, in some instances, screenshots.

Conclusion

Ursnif continues to see investments and remains a potent banking trojan. As with other banking trojans, the use of multi-factor access (MFA) controls is the best countermeasure to protect against such man-in-the-browser attacks. Small businesses as well as individuals with significant assets should try to separate their at-risk activities like email and casual browsing from access to online banking accounts.

IOCs on github

Ursnif C2 traffic:

/images/m89YU8FR_2BLnh4BjlLxD/t7_2Bv438LF_2FbJ/8xe7ol0u0cwYZkh/0DXcEFUPxp_2FlFGWJ/NB7hXLQHe/rxCTURJJPaTVSnxx8Jvj/uSIi183z9S4gxxnr32l/lYlmn6SSylEN_2F16gIsyh/MazJwpDyN3tfg/7FYfye4.gif

 

Ursnif C2s:

goyanok[.]at/krp3cmg/images/

outaplaceshave[.]cn/krp3cmg/images/

noopex[.]at/krp3cmg/images/

hothegivforsuffer[.]cn/krp3cmg/images/

lopertopgo[.]su/krp3cmg/images/

nexpoo[.]at/krp3cmg/images/

pergozip[.]at/krp3cmg/images/

justiceseasfriends[.]cn/krp3cmg/images/

mid100[.]at/krp3cmg/images/

goinumder[.]su/krp3cmg/images/

trepeatedandequal[.]cn/krp3cmg/images/

hulivam[.]at/krp3cmg/images/

therepalon[.]su/krp3cmg/images/

creatortherefore[.]cn/krp3cmg/images/

 

Webinject targets:

https://online[.]citibank[.]com/US/CBOL/ain/cardasboa/flow[.]actio*

https://online[.]cit*[.]com/US/JSO/signon/LocaleUsernameSignon*

https://*bank[.]bbt[.]com/auth/pwd*

https://bankofamerica[.]com

https://*access[.]jpmorgan[.]com

https://businessaccess[.]citibank[.]citigroup.com

https://*.treasury[.]pncbank.com/*/esec/login*

https://onepass[.]regions[.]com

https://usbank[.]com

https://*businessonline[.]tdbank[.]com/*orporate*anking*eb/*ore/*ogin*

https://www[.]usaa[.]com

https://secure[.]capitalone360[.]com

 

Screenshot Targets:

https://online-smallbusiness[.]unicredit[.]it

https://bancopostaonline[.]poste.it

https://www[.]relaxbanking[.]it

https://qweb[.]quercia[.]com/

https://secure1[.]businesswaybnl[.]it

https://*cariparma[.]it

https://www[.]bmedonline[.]it

 

VNC Targets:

https://www[.]paypal[.]com

 

Blocks Access to:

*.nai[.]com*

*2-viruses[.]com*

*aava[.].org*

*abuse[.]ch*

*adwarereport[.]com*

*agnitum*

*allnod*

*amtso[.]org*

*analysis[.]seclab*

*answers[.]microsoft.com*

*anti-malware*

*anti-spyware*

*anti-virus*

*antirootkit[.]com*

*antivir*

*auditmypc[.]com*

*authentium[.]com*

*av-comparatives[.]org*

*av-desk*

*av-test*

*av.eu*

*avast*

*avertlabs[.]com*

*avg[.]com*

*avg[.]cz*

*avgfrance[.]com*

*avira*

*avirus*

*avp[.]ru*

*avsoft[.]ru*

*bitdefender*

*bobbear[.]co.uk*

*ca-store[.]com.au*

*centralops[.]net*

*check-mark[.]com*

*checkvir[.]com*

*clamav*

*clamsupport*

*clamwin*

*cleanallspyware[.]com*

*cleanuninstall[.]com*

*cnet[.]com*

*comodo[.]com*

*comodogroup[.]com*

*companies-house[.]gov.uk*

*cybercrime*

*cyprotect[.]com*

*defenx. [.]nl*

*dialognauka[.]ru*

*diamondcs[.]com[.]au*

*dnsstuff[.]com*

*domaintools[.]com*

*dr-web*

*drsolomon[.]com*

*drweb*

*dw.com[.]com*

*edgesuitenet*

*emsisoft[.]com*

*enisa.europa[.]eu*

*esafe[.]com*

*escanav[.]com*

*eset[.]co.uk*

*eset[.]com*

*eset[.]eu*

*eset[.]org*

*eset[.]sk*

*esetindia[.]com*

*f-prot*

*f-secure*

*finjan[.]com*

*firewallguide[.]com*

*fraudaid[.]com*

*free-av*

*free-firewall[.]org*

*freespaceinternetsecurity[.]com*

*fsa[.]gov.uk*

*gdata.*

*gdatasoftware[.]co.uk*

*gietl[.]com*

*gmer[.]net*

*gratissoftware*

*grisoft*

*hackerguardian[.]com*

*hijackthis.de*

*icsalabs[.]com*

*ika-rus[.]com*

*ikarus-software*

*inline-software*

*interpol[.]int*

*iopus[.]com*

*iseclab[.]org*

*joebox[.]org*

*jotti[.]org*

*k-otik[.]com*

*kaspersky*

*kerio[.]com*

*kerio[.]eu*

*kingsoftsecurity[.]com*

*krebsonsecurity[.]com*

*lavasoft*

*majorgeeks[.]com*

*malekal[.]com*

*malwarebytes[.]org*

*mbamupdates[.]com*

*mcafee*

*met[.]police.uk*

*microworldsystems[.]com*

*misec[.]net*

*moosoft[.]com*

*msecn[.]net*

*mwcollect[.]org*

*my-etrust*

*myantispyware[.]com*

*nbi[.]gov.ph*

*netfreighters[.]com.au*

*networkassociates[.]com*

*noadware[.]net*

*nod-32*

*nod32[.]com[.]au*

*nod32[.]nl*

*nordnet[.]com*

*norman[.]com*

*norman[.]no*

*norton[.]com*

*novirus[.]ru*

*nsclean[.]com*

*nsslabs[.]com*

*offensivecomputing[.]net*

*onecare[.]live.com*

*outpostfirewall[.]com*

*pandasecurity*

*pandasoftware*

*pchelpforum[.]com*

*pcpro[.]co.uk*

*pcthreat[.]com*

*pctools[.]com*

*pcworld[.]com*

*persona[.]firewall*

*pestpatrol[.]com*

*police[.]gov.hk*

*prevx[.]com*

*projecthoneypot[.]org*

*protectstar-testlab[.]org*

*removevirus[.]org*

*ripe[.]net*

*robtex[.]com*

*rokop-security[.]de*

*safebrowsing*

*sald[.]com*

*sandbox*

*scambusters[.]org*

*scanalert[.]com*

*scanwith[.]com*

*schoonepc[.]nl*

*sectools[.]org*

*securesoft[.]com.au*

*securetec[.]com.au*

*securitoo[.]com*

*secuser[.]com*

*secuser[.]model-fx.com*

*shop[.]ca.com*

*simplysup[.]com*

*siteadvisor[.]com*

*softonic[.]com*

*sophos[.]com*

*spamcop[.]net*

*spamhaus[.]org*

*spamtrackers[.]eu*

*spyblocker-software[.]com*

*spywareguide[.]com*

*spywarewarrior[.]com*

*staples[.]com*

*staysafeonline[.]info*

*sunbelt-software[.]com*

*superantispyware*

*sygate[.]com*

*symantec*

*techsupportforum[.]com*

*threatexpert[.]com*

*threatfire[.]com*

*threatmetrix[.]com*

*tinysoftware[.]com*

*treasury[.]gov*

*trendmicro*

*trojan-killer[.]ne*

*trustdefender[.]com*

*trusteer[.]com*

*tucows[.]com*

*update.microsoft[.]com*

*uploadmalware[.]com*

*vba32[.]de*

*vergelijk[.]nl*

*vet[.]com[.]au*

*virscan[.]org*

*virus-help[.]net*

*virusall[.]ru*

*virusblokada[.]ru*

*virusbtn[.]com*

*virusinfo[.]info*

*viruslab[.]ru*

*viruslist*

*virussen[.]upc.nl*

*virustotalc[.]om*

*visualizesoftware[.]com*

*vupen[.]com*

*webroot*

*wilderssecurity[.]com*

*wildlist[.]org*

*windows[.]microsoft.com*

*z-oleg[.]com*

*zonealarm[.]com*

*zonelabs[.]com*

*zonelog[.]co.uk*

!*skypectoc*

!*localhost*

!apps[.]facebook.com/games

 

-- The Fidelis Threat Research Team researcher Jason Reaves

Building a Business Case for Security that the CFO Can Understand

$
0
0


Wheel-hiresOne of the biggest challenges when you go shopping for new security tools is answering the inevitable question from finance: “What’s the value?”  Determining the ROI of a new security product isn’t always an exact science. There are no hard and fast rules to follow – which is why generic ROI calculators should be avoided at all costs (pun intended). 

But why is it so hard? Why can’t vendors just wow you with the promise of savings of 100%? The science of security is a moving target.  Much like snowflakes, every organization is unique – their existing infrastructure, the size of the organization, what’s at risk, what a security incident means to them, and so on.  The list of variables goes on and on. And most organizations will define success a bit differently.

There’s also a dirty little secret when it comes to security tools. Most of them don’t actually save you any time or money. Or, at least they don’t save you any hard dollars and cents that you can point to and measure. In fact, most security tools create more work. They generate new alerts, which your already-overburdened security team has to investigate and track down.

So, what’s an organization to do when the CFO comes calling?  Building a business is all about presenting the numbers.  In security the biggest benefit will always be reduced risk. “Buy this tool (or hire this person) and bad things are less likely to happen,” the vendor will tell you. And it’s true. But the problem is that when it comes to talking to your CFO or CISO it’s also theoretical. It leads you into a debate about how likely it is that bad things are really going to happen (“What would anyone want to steal from us?”). The other problem is that it’s likely the same justification that was used to make the case for the last five security products you bought.

Now don’t get me wrong. Reduced risk is absolutely important. But what’s equally important – and, in fact, I would argue more important when it comes to actually justifying an incremental security investment – is how much time and/or people a new tool will save you. Will it make you more efficient? Will it let your tier 1 analysts do the tasks of a tier 2 analyst? Will it let your tier 3 analysts do the work of an incident responder? If so, those are hard dollars that any CFO can understand. And while the reduced risk that comes with the tool may be the reason you want to buy the tool, it becomes the icing on the cake for the finance and procurement team.

Here are a few other hard costs to consider as you build your business case:

  • Can it automate tedious day-to-day activities?
  • Does it improve the time it takes to resolve a threat?
  • Will it help you consolidate your security stack (e.g. reduce the number of agents operating on endpoints or the number of network security appliances in your rack)?
  • Can it improve the quality of your incident response?

We recently commissioned Forrester Consulting to do an economic analysis of the benefits realized by Fidelis Network™. You can check out the cost savings and benefits we bring to the table right here. In short, the Total Economic Impact™ study found a composite organization based on interviewed customers experiences a risk-adjusted benefits of $2.7 million over a three-year period, with 46% of those benefits coming from hard benefits including increased productivity and reduced hardware costs. Take a look and tell us what you think.

 -- Kristen Cooper, VP Product Marketing

Understanding the Web Shell Game

$
0
0

Thumb_td_webshells_BLOG_1000



What can bad guys use to launch a ransomware attack, facilitate an email spamming platform, or ensure persistent access to an enterprise?
Compiled malware and compromised credentials could work. But web shells provide an even more stealthy way to establish a beachhead and quietly hide on the network for future operations.

Web shells are not a new tactic. But they have been used in a number of recent attacks. We saw them in the ransomware attack that hit MedStar, which operates hospitals and healthcare facilities throughout the Washington D.C. metro area. Web shells have also recently been uncovered on a Facebook server, found on a popular software tool used by websites to process user-submitted photos, and discovered within a compromised commercial bank.

What makes them such a popular tactic in the attacker’s toolkit? One reason is that they are hard to detect. Attackers typically install web shells on Internet-facing web servers where they take advantage of installed applications. Depending on configuration and installed applications, internally facing servers could be targeted as well.

An attacker can introduce a web shell by exploiting a web application vulnerability or even a feature, such as content upload. The web shell can be as simple as a piece of code that provides a command shell on the targeted system. Or it can be as complex as an executable file that installs a full-blown Remote Administration Tools (RAT). The web shell code runs on the targeted server using existing resident applications.

Recently, the Los Angeles Times was hit when attackers leveraged a subdomain page using WordPress, a popular Content Management System (CMS) used for blogging and serving content. Many times, CMS targeting is associated with email spam campaigns.

While web shells are a favorite tool for email spammers, we have also witnessed numerous nation state actors employ web shells as part of cyber espionage campaigns.

Despite the seemingly ubiquitous nature of web shells, defenders and system owners can take preemptive actions to reduce the likelihood of being compromised by them. In parallel, defenders and administrators can also use web shell footprints and artifacts to detect their presence. Here are a few recommendations to get you started:

  • Review anomalies in access and error logs regularly.
  • Ensure server software and web applications are updated regularly.
  • Prevent your web server from divulging specific details/information about itself.

Fidelis’ white paper, Understanding Web Shells, contains additional preemptive considerations, artifacts useful in detecting many web shells and additional recommendations. Download the complimentary paper to learn more.

-- David Gilbert, Manager, Security Consulting Services

Findings from Analysis of DNC Intrusion Malware

$
0
0

Blog_DNC_1_final

 

The Security Consulting team here at Fidelis specializes in investigations of critical security incidents by advanced threat actors. Last week, after Guccifer 2.0 claimed responsibility for the intrusion into the Democratic National Committee’s (DNC) servers, we were provided with the malware samples from the CrowdStrike investigation. We performed an independent review of the malware and other data (filenames, file sizes, IP addresses) in order to validate and provide our perspective on the reporting done by CrowdStrike.  This blog post provides a summary of our findings.

Many of you may be following the recent news related to the compromise of the Democratic National Committee’s servers that was first reported by our colleagues over at CrowdStrike in a blog post published on June 14, 2016. Their post attributed the incident to Advanced Persistent Threat (APT) actors associated with the Russian Government named COZY BEAR and FANCY BEAR. The following day, the story got all the more interesting when an individual using the moniker Guccifer 2.0 claimed that CrowdStrike got it wrong and that he had, in fact, been the one to penetrate the DNC’s servers.

We have helped hundreds of organizations deal with similar situations so we know the latest tactics, techniques, and procedures (TTPs) exceptionally well. Our analysis relies on the intelligence repository we have built through this analysis as well as Open Source Intelligence to substantiate our findings.

Before we proceed to the details of our analysis here’s a quick cheat sheet on different names that security researchers have used to refer to these threat actors. However, it’s important to note that actor mappings between attribution sets aren't precise. Different research methodologies and necessarily separate encounters with these actors lead to unique attribution sets. The overlaps noted here are commonly accepted.

 

Capture

 

As part of our investigation, we analyzed the same malware files that were used in the DNC incident. Here are a few highlights of our findings from reverse engineering the provided malware:

1. The malware samples matched the description, form and function that was described in the CrowdStrike blog post.

2. The malware samples contained complex coding structures and utilized obfuscation techniques that we have seen advanced adversaries utilize in other investigations we have conducted. This wasn’t “Script Kiddie” stuff.

3. In addition, they were similar and at times identical to malware that other vendors have associated to these actor sets.

a. For instance, in one of their Unit 42 blog posts Palo Alto Networks provides some detailed reversing and analysis on other malware that they attributed to COZY BEAR named “SeaDuke.” The Fidelis Reverse Engineering team noted that in the samples of “SeaDaddy,” that were provided to us from the DNC incident, there were nearly identical code obfuscation techniques and methods. In fact, once decompiled, the two programs were very similar in form and function. They both used identical persistence methods (Powershell, a RUN registry key, and a .lnk file stored in the Startup directory).

b. The SeaDaddy sample had a self-delete function named “seppuku” which was identified in a previous SeaDuke sample described by Symantec and attributed to the COZY BEAR APT group. It’s worth noting that seppuku is a Japanese word for harakiri or self-disembowelment.

c. For the X-Tunnel sample, which is malware associated with FANCY BEAR, our analysis confirmed three distinct features that are of note:

i. A sample component in the code was named “Xtunnel_Http_Method.exe” as was reported by Microsoft and attributed by them to FANCY BEAR (or “Strontium” as they named the group) in their Security Intelligence Report Volume 19.

ii. There was a copy of OpenSSL embedded in the code and it was version 1.0.1e from February 2013 which was reported on by Netzpolitik and attributed to the same attack group in 2015.

iii. The Command and Control (C2) IPs were hardcoded into the provided sample which also matched the Netzpolotik reporting.

iv. The arguments in the sample were also identical to the Netzpolitik reporting.

4. The malware samples were conspicuously large (1.9 MB for X-Tunnel and 3.1 MB for SeaDaddy) and contained all or most of their embedded dependencies and functional code. This is a very specific modus operandi less sophisticated actors do not employ.

So what does this mean? Who is responsible for the DNC hack? Based on our comparative analysis we agree with CrowdStrike and believe that the COZY BEAR and FANCY BEAR APT groups were involved in successful intrusions at the DNC. The malware samples contain data and programing elements that are similar to malware that we have encountered in past incident response investigations and are linked to similar threat actors.

In addition to CrowdStrike, several other security firms have analyzed and published findings on malware samples that were similar and in some cases nearly identical to those used in the DNC incident. Many of these firms attributed the malware to Russian APT groups.

That brings us to the issue about Guccifer 2.0’s claim of responsibility for the attack. Several researchers have raised questions about the allegedly stolen documents posted by Guccifer 2.0. Ars Technica reported similar findings that align with some of our initial analysis on this topic.

While we believe this settles the question of “who was responsible for the DNC attack,” we will continue to watch, along with the rest of the security community, the new twists and turns this story takes as the U.S. presidential elections swings into full gear.

- Michael Buratowski, senior vice president, Security Consulting Services

 

Cyber-Brexit: The Chance for a Cybersecurity Renaissance

$
0
0

IStock_91833187_SMALL

Well Britain, you’ve done it. The referendum is over and it's time to start thinking ahead about how the UK will reconcile its new laws and regulations.  I believe that the UK could be at the beginning of a cybersecurity Renaissance, and I’ll explain why.

At this point, it is uncertain how long it will take the United Kingdom to fully leave the EU, although the plan is that there will be a two-year transition phase.  The next step in the process, according to Article 50 of the Lisbon Treaty, is for the UK to notify the EU council, although I’m sure this will come as no surprise. 

Discussions will ensue that negotiate the process of the departure.  If no discussions take place and no agreements are in place in two years, the UK will no longer fall under EU jurisdiction. 

Let’s take a look at some of the EU cybersecurity laws, directives and initiatives and how their absence could affect the UK.

European Union Cybersecurity Plan

What is it?

Directives, laws and regulations are best implemented when there is an overarching strategy in place to support the plans, ideals and goal or the legislation.  The EU Cybersecurity Plan is a bit antiquated, and the UK government has a real opportunity to put forth a new, strong, technically savvy plan that addresses cyber-resilience in this new age of cyber threats. 

What is the UK’s next move?

Much like the United States’ Cybersecurity National Action Plan (CNAP), the UK should focus on building up its cybersecurity workforce and building new ways for businesses to detect, respond, track and share information on threats.  The UK has an opportunity to not only bolster its security posture, but become a major cybersecurity player in the world by encouraging information security businesses, professionals and educators to work toward a common goal to address and respond to threats.

Network and Information Security Directive (NIS)

What is it?

Stemming from the EU’s Cybersecurity Plan, the NIS is a directive that was adopted on 17 May 2016 to go into full effect in August 2016.  The NIS seeks to improve the EU’s cyber-resilience by:

  • Identifying critical industry sectors, such as energy, transport, finance and health. Within each of these sectors, member states must identify which organisations are providing essential services.  This falls right in step with standard security procedures, beginning with: identifying your critical assets and services.  These critical industries will also be required to report cyber-incidents to their national authorities (see below)
  • Identifying providers of digital services, including e-commerce platforms, search engines, cloud services, etc. Naturally so, these providers will be treated differently than critical industry providers and subject to different rules and regulations. The EU recognises that these businesses depend on the freedom of information (and transportation thereof) between member states.
  • Each member state will be responsible for designating (or creating) national authorities to be responsible for cybersecurity.
  • These authorities will also be tasked with creating national Computer Security Incident Response Teams (CSIRT)’s to track, report and share information on cyberattacks.

What is the UK’s next move?

The UK is on track with creating its own CSIRT as the UK-CERT already exists.  As for classifying critical businesses and organisations, if they haven’t already done so, this should be relatively easy for the UK.  The hard part will be in introducing legislation to parliament that will focus on the laws that will govern them.  This would naturally include information and technology standards, guidelines, policies and response plans.

There are three recommendations that I have for the UK in replacing the NIS with its own directives:

  1. The cyber posture of the UK’s critical infrastructure should be heavily scrutinised with technically competent oversight. There should be a strong partnership between private critical infrastructure providers and the government, UK-CERT and even, yes, the military.  Foreign adversaries have increasingly targeted critical infrastructure and cooperating with the military can provide a lot of forewarning into upcoming attacks.  In my controversial personal opinion, more critical infrastructure organisations should conduct studies around pulling the plug and air-gapping their most sensitive systems.
  1. The UK-CERT should ensure that relationships that have been made with other EU CSIRT’s are kept intact, even strengthened. Cyber threat intelligence sharing has become a critical tool for predicting, detecting and responding to large-scale attacks.  I would hate to see EU CSIRT’s or the UK-CERT fail to share critical information indicators or intelligence simply because of Brexit.  Just as the Internet is without borders, so should the sharing of cyber threat intelligence.

  2. While we should always strive for preventing cyberattacks, we have seen that the most destructive and clever attacks have thwarted preventive technology. Therefore, I would urge the UK to focus more on the detection and response to these threats.  This not only includes emphasising the importance of full network and endpoint visibility technology, but the education, training and development of the nation’s cyber-response professionals.  This includes, but is not limited to:
  • Fostering innovative approaches to getting the next generation workforce interested, and subsequently trained, in cybersecurity. I would recommend that this not just be aimed at university-level, but even younger kids in high school. I would love to see more organisations like 1nterrupt, which is focused on educating this age-level on security, popping up all over the United Kingdom.

  • Creating education programmes to recruit (or create) cybersecurity professionals to join the UK government to help create new policies, technology and defend against threats.

  • Create attractive new financial programmes for cybersecurity companies to innovate and operate in the United Kingdom. This could include tax incentives for foreign companies to locate offices in the UK or visa sponsorship for those considering cybersecurity as a profession. These types of proactive economic plans could position the UK as Europe’s cybersecurity capital.

General Data Protection Regulation (GDPR)

What is it?

The GDPR is the EU’s latest legislation and its aim is to alleviate the continent’s privacy concerns by:

  • Establishing data privacy rights around the use and protection of personal data (as per the EU website) including the right 'to be forgotten’, the right to object and the right of data portability from one service provider to another.
  • Mandating companies that process personal data appoint a Data Protection Officer, whose responsibility is to ensure that proper controls are in place, being monitored and reported to the government.
  • Formation of an independent supervisory authority in UN member states that are responsible for reporting and enforcement of the data protection regulations.
  • Requiring companies of each UN member state to report material data breaches that involve personal information to their national authorities mentioned above, or face fines of up to €20 million or 4% of their annual revenue.

What is the UK’s next move?

Historically, from compromises such as last year’s TalkTalk breach,  we have seen that  UK citizens take their personal data very seriously.  It will be imperative for the government to act quickly in establishing personal data protection regulations, standards and authorities.  The first step should be for the UK to form a comprehensive definition of what personal data actually is.  Once completed, this should naturally lead to a ‘domino effect’ for laws and regulations to fall into place to support the confidentiality, integrity and availability of the data.  Perhaps the United States and the United Kingdom could work together on this, since the US hasn’t completed this first step yet!

Safe Harbor & EU-US Privacy Shield

What is it?

Finally, we come to the long anticipated Safe Harbor Framework which was designed to facilitate the exchange of personal data between the United States and EU member states.  Since the EU data protection directives differ from the United States’ privacy laws, it was necessary to streamline this process between the two.  In October 2015, partially stemming from the Snowden Revelations, the EU issued a judgment declaring Safe Harbor as invalid.  Since then, the EU and the US have been working closely on a new framework called Privacy Shield.

What’s next in the UK move?

The UK could be in congruence with the EU-US Privacy Shield agreement.  Transfer of sensitive data across borders has become critical in this new cloud and mobile age, and having a tri-lateral agreement on this subject would be very beneficial for all parties involved.  Too much investment is at stake for the UK not to be in the middle of these agreements by participating and influencing the next iteration of the framework.

Summing it All Up

For right or wrong, good or bad, the UK has decided to leave the European Union.  The sole intent of the referendum was to make the right decision for the government, businesses and citizens.  Now that the decision has been made, it is critically important for all of us to look ahead and challenge ourselves to make the best decisions and plans…not just for today, but also for tomorrow. 

With that in mind, I think that the UK has a chance to reinvent its economy and identify itself as a world leader when it comes to cybersecurity.  Because threats know no borders.  Threats do not respect laws, regulations, directives, frameworks or referendums.  Threats transcend privacy and confidentiality.  It will be a paramount for the UK and EU to find common-ground, and keeping the lines of sharing open, in a post-referendum world.

Fidelis stands with both the United Kingdom and the European Union in leaving attackers no place to hide.

God save the Queen.

-- Justin Harvey, Fidelis Cybersecurity CSO

 

Shining a Light on Xenon: Unravelling the Crypter

$
0
0

Spotlight

We've recently observed a new crypter called Xenon used to deliver Locky, a strain of ransomware, and Ruckguv, a type of malware that can download and install other types of malware. Xenon employs a novel trick to bypass debuggers, which we’ll describe here along with the techniques it uses. We also provide a Python script to decrypt objects packed using Xenon and the Krypton crypter, which we believe is its predecessor.

Delivering and monetizing malware involves a large chain of independent tools – exploit kits, traffic distribution systems, spambots and more. The crypter occupies a special place in this chain, where it's typically used by threat actors to evade common security measures, such as antivirus and spam filters.

Many companies use crypters for legitimate purposes – to guard their systems, protect their code and products, and safeguard their intellectual property by protecting their binaries from reverse engineering. Crypters sold on underground forums serve similar purposes, but are more focused on bypassing sandbox/antivirus detections. The authors of these tools are acutely aware that researchers are poking at them, so they go to great lengths to evade detection and analysis.

The Xenon crypter seems aptly named. Parallels exist between Xenon crypter and Xenon, an odorless and colorless gas with very low chemical reactivity. Ultimately, every crypter author aspires to effectively hide malware to render it virtually invisible to evade observation.

In early 2016, Krypton was used along with Radamant ransomware. It was also sold on underground forums. When we first looked, Xenon struck us as familiar in that it uses the same unhandledexceptionfilter chaining method to start the real code. It also uses the beingdebugged flag as part of the XOR decoding process, so if you’re in a debugger the payload will not run properly.

But most interestingly, Xenon uses an undocumented NtYieldExecution interrupt that will give up the current thread's execution time to any other thread. So if the current thread is in a debugger, but running a single-threaded program, then the timing will be off. It appears Xenon uses this technique in a loop to run a custom sleep routine.

Xenon uses the same header structure as Krypton but uses a third XOR key:

1

 

 

 

The XOR loops in both Krypton and Xenon -- as well as in previous crypters -- are always the same, using the IsBeingDebugged flag as an offset to the XOR key:

2

 

 

 

 

 

 

The offset to the payloads header is stored in a dword val, as shown above.

3

In the above diagram, you can see:

  • The second XOR after it executes the long NtYieldExecutionunhandledexception chain, followed by an
  • LZNT Decompress, and the
  • Third XOR

These collective techniques form an effective defense against detection and analysis. And yet uncracking just this one layer can reveal numerous malware strains hidden beneath the crypter. Xenon uses some tricks that we haven't seen to good effect.

This analysis has been captured in a pair of unpacking scripts available for download at: https://github.com/fideliscyber 

-- Fidelis Threat Research Team researcher Jason Reaves

 

Me and Mr. Robot: Tracking the Actor Behind the MAN1 Crypter

$
0
0

Man1-new

With season two of Mr. Robot approaching, the storyline follows a hacker group that takes down an evil global corporation and collapses the financial market. Led by the mysterious Mr. Robot, the hackers use a variety of tricks to evade detection, and seem to cover their tracks at every turn. There are similarities shared by the show's hackers and real-life attackers.

Hackers are human. Like the rest of us, they are creatures of habit, turning to familiar tools and techniques time and time again. As they hone their craft, attackers develop their skills and accumulate knowledge. And while they go to great lengths to hide from view and keep their actions under the radar, they leave tracks if you know where to look. By examining subtle clues attackers leave behind, it’s possible for threat researchers to track malware back to a specific actor.

Malware artifacts provide these valuable clues, serving as tools, techniques and procedures (TTPs) in tracking the ongoing operations of a specific threat actor. In this case, we focus on MAN1, a sophisticated crypter dating back to 2014 that's still used today.

We hope that presenting this research publicly will help researchers pursue similar avenues when following threat actors.

 

The Actor

Associating an actor to a string of campaigns is never an easy task. Crimeware operates like an underground business -- multiple players may be involved in one project, pieces of an operation may be outsourced to various entities, and elements can be handled by multiple groups over time. In these instances, it becomes harder to prove that the same criminal group is behind a string of malware campaigns.

However, subtle tricks and routines found in packers and crypters provide valuable clues for threat researchers. A crypter, in its basic form, is designed to obfuscate code. In some cases, it's possible to associate actors with their payloads, which allows threat researchers to track the movement of specific actors over time. Given the utility of these obfuscation techniques, actors often keep their tricks of the trade private and do not sell them to the masses on the underground.

One actor, or group, using such tricks is MAN1. We've associated MAN1 with Dyre, a trojan first used in large-scale campaigns targeting customers of major financial institutions and later used to target organizations in additional sectors that include technology, petrochemical and others. The MAN1 moniker comes from the binaries the Dyre malware downloads from compromised websites. These downloaded files usually included a man1.exe file, which was typically an older version of Dyre.

 

Tracking MAN1

To link MAN1 to Dyre, we had to take a look at earlier campaigns. Before Dyre, these actors used Chanitor to download Vawtrak, a banking trojan. The server delivering Chanitor used “bulletproof hosting,” which are hosting services permitting extreme leniency in their terms of service. Later, this actor gradually began delivering both Vawtrak and Dyre. Eventually, the actor began delivering Dyre exclusively. The servers used at the beginning of this transition hold an important clue to uncover the identity of the actor: These same few servers were also used to deliver Vawtrak using Chanitor.

As with most long-established actors, MAN1 exhibits distinct TTPs in performing their ongoing malicious activities. The crypter discussed here is one such tool used by this actor since its involvement in Vawtrak in 2014, and possibly earlier. While crypters are relatively common, really good crypters -- designed to prevent detection through various methods -- can sell for a lot of money on the underground, where they typically remain private and used for a very long time.

The uniqueness and complexity of the crypter, coupled with the other TTPs used by this group, provides another valuable clue and paints a clearer picture of the actor. Over time, the research community picked up on this actor's subtleties, such as its consistent use of ‘feedweb_data’ or ‘cached_data’ folders on compromised websites. These characteristics made it possible for researchers to track this actor's involvement across multiple malware families over time.

  

A Timeline of Exploits

Let's take a look at MAN1's activities beginning in March 2015.

Timeline

 

March 2015: Chanitor, Vawtrak: By tracing the IP range by naming schemes and crypter usage, we find the actor's first involvement with Vawtrak, when it spammed out Chanitor as a flight confirmation (1) to deliver Vawtrak from 91.194.254.213/us/file.jpg.

April 2015: Chanitor → Vawtrak, Dyre: In April 2015, we spotted a glaring association with this actor's involvement in both Dyre and the old Vawtrak in a spam campaign (2) that used a macro to download a text file that contained the url to the payload. This technique provides the actor flexibility, in that they can use the same spam campaign to deliver multiple payloads. This technique has one drawback: It needs to burn through extra compromised websites. This campaign had two payloads – one from 91.194.254.235/uss/file.exe using Chanitor (delivering Vawtrak) and one from 91.194.254.222/us2/file.exe delivering Dyre. The Dyre sample used in this campaign was named ‘man1’. This IP range used can be traced back further -- to Chanitor delivering old Vawtrak -- and was also used for testing the newer Vawtrak seen today.

May 2015: Rovnix, Pony → ReactorBot: This actor has shown interest in using the newest malware within the crimeware domain. In May 2015, a new banker emerged and was distributed using Rovnix as a dropper. The downloaded and loaded dll was named ReactorDemo.dll, eventually known as ReactorBot (3). This actor was involved in a spam run delivering CVE-2014-1761 that exploited RTFs delivering Pony, which would then download ReactorBot from locations such as:

Encentivhealth[.]m/wp-content/plugins/cached_data/n1.exe

Also in May, we see this actor using a similar naming structure on compromised websites to deliver Dyre, which was identified as a MAN1 campaign within the research community, from macro docs downloading Pony. In this instance, we see one of the compromised website folder structures exhibit characteristics used by this actor:

Cyctechnology[.]com/wp-content/plugins/cached_data/m1.exe

The /cached_data/ structure is probably familiar to some from frequent Dyre spamming.  Why use the same naming structure on compromised websites? Our guess is that it’s an automated process as demonstrated when you examine the contents of that folder across multiple servers.

Image1

 

 

 

 

 

November 2015: Dyre, Vawtrak: In early November 2015, we witnessed one of the Dyre actors  transition from Dyre to the updated version of Vawtrak. This actor continued to deliver both Dyre and Vawtrak during multiple spam campaigns on November 2, 2015 (4, 5). The timing of this transition raises suspicions, as it corresponded with a Dyre takedown event later that same month (6). For the Dyre run, we see the /sliva/ structure for the Pony runs (cd445e52eb7d2ca7359a8513157dd0a9), which is still used today for campaigns delivering Vawtrak.

May 2016: H1N1 → Pony, Vawtrak, Nymaim → Gozi: Earlier, on May 25, 2016, researchers observed a spam campaign delivering Vawtrak and using similar techniques. But instead of Chanitor, the loader was H1N1 downloading Pony as pm.dll and Vawtrak as inst.exe.

Also of note is this actor’s recent use of Nymaim from spammed out macro documents dropping Pony (7). These documents would download Nymaim from places such as:

elfielatorestaurante[.]com/wp-content/plugins/cached_data/print[.]exe

It would then deliver a Gozi/ISFB module targeting US entities*.  This delivery was later coined GozNym due to the custom work linking the Gozi/ISFB module to Nymaim (8).

* A portion of these targets can be found toward the end of this post.

June 2016: H1N1, Chanitor/Hancitor → Vawtrak: Recently, this actor pushed Vawtrak heavily using a variety of delivery methods. Two methods seen recently are H1N1 and a Chanitor variant (also called Hancitor). These campaigns are noteworthy for the MAN1 crypter and the tactics it uses. One such tactic involves delivering Pony separately from Vawtrak, even though Vawtrak comes with a stealer module component. This actor has also been observed using the same Pony gate structure of  ‘/sl/gate.php’ or ‘/zapoy/gate.php’. A recent campaign on June 7, 2016 utilized a Word document dropper using names that followed a pattern of ‘report_\d{7}.doc’ to deliver a Chanitor variant that would check-in to a gate with the uri ‘/sl/gate.php’ and then download both Pony and Vawtrak.

Also of note on these recent campaigns is the man1.exe file that may show up on compromised websites. This can be seen on a campaign from June 20, 2016, in which H1N1 delivered the usual Pony and Vawtrak malware. However, if we look a little closer at the website, it downloads Pony from ('crr-medvezonok[.]ru/about/pm.dll') and we find a number of other executables residing on that server in that same subfolder ('inst1.exe', 'inst2.exe', 'inst3.exe', 'man1.exe'). The executable man1.exe is actually an old unpacked Dyre malware sample -- further pointing to this actor's previous involvement in Dyre.

Latest: To date, the actor continues using the MAN1 crypter. The actor sticks to the same naming scheme for up to months at a time. These consistent TTPs could be due to a number of reasons: The actor may be using a toolkit or buying mass quantities of shelled servers from the same entity and going through them systematically. Either way, by identifying these key characteristics, we narrowed in on an actor’s use of this custom crypter, which then made it possible for us to trace this actor’s movement across multiple malware families over years. We’ve found other notable malware associated with this actor by following the crypter’s evolution over time. This malware includes a P2P Gozi variant, CTB Locker and Andromeda.

 

Peeling Back the Layers of the Crypter

Researchers commonly have to break through layers of crypters or packers in order to get to the underlying malware code, and it becomes instinctive to experienced researchers. Some crypters used for malware add functions, such as anti-virtualization or anti-sandboxing. The problem with most crypters is that they are a fire-and-forget tool used to bypass antivirus and sandbox detections. Some crypters employ a more drastic technique in which they use multiple layers that involve dynamically generated code. MAN1 is one such advanced crypter.

While it is often tempting to break through all the layers to get to the heart of the malware, our research supports the idea that sometimes these discarded layers can be used to bridge the gap and turn research into intelligence to help profile actors. This proved to be the case with the MAN1 crypter.

In the MAN1 crypter, the first layer is mostly just a bunch of deadcode with limited functionality, but it allows quite a bit of throwaway code to be added. This deadcode can be added for numerous reasons -- from throwing off sandbox reports, to messing with AV heuristics and generally making it a pain to signature off of. Eventually the code will decode the next layer, which is where most of the real work can begin. Usually, this first layer will be XOR decoded, but will be surrounded by a large amount of useless code operating on Windows or fonts that don't exist.

 Image2

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

The second and third layers function roughly the same as the first, with the exception of decoding. The second layer decodes the output of the first layer and the third layer decodes the output of the second.

Each layer shares the following common characteristics:

  • Is numbered
  • Contains variable length, numbered chunks
  • Each chunk may be compressed

To accommodate this setup, each chunk has an attached header as shown in this mock up:

struct DataBlob {

  unsigned short CheckVal1;

  unsigned short CheckVal2;

  unsigned short CheckOffset;

  struct ChunkHeader {

    unsigned int SetNum;

    unsigned int length;

    unsigned int SetIndex;

    unsigned int check;

    unsigned int key;

    unsigned int compressedflag;

    unsigned int uncompressedSize;

  }chunk;

  char data[chunk.length];

}

 

As the layer performs its decoding routine, it utilizes shellcode that is decoded and reassembled for every chunk in the next layer. This shellcode is then used to decode the data in the found chunk. The same shellcode is used on all layers, but differs from sample to sample. This characteristic leads us to believe it is dynamically generated to perform various types of decoding operations and keys on the layers. By comparing this layer between two different samples delivered on the same day, we can see slight differences. This means the layer is generated when the crypt happens on the payload because it is required to encode the payload.

Image3

  

Here we can see the main loop from one sample employing this technique:

Image4

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Getting through the crypter is trivial.  Breaking on kernel32!VirtualAlloc results in returning to the main loop of the layer as each calls VirtualAlloc every time it goes to reconstruct the shellcode layer. Adding a breakpoint to the end of that loop (the instruction just after kernel32!VirtualAlloc) presents the next layer.  From there, execute ‘till return’ twice and then the next call will copy over the reconstructed code segment and a JMP.

 

Conclusion

Intimate knowledge of the crypter and other techniques have allowed us to tie numerous campaigns over the years to a single actor. We're aware that other researchers have identified some of these threads and our intention behind publishing this body of knowledge is to encourage others to recognize MAN1 and help build a fuller profile. The criminal landscape is vast, but there are often significant volumes of activity spanning campaigns and malware families that tie back to individual actors.

IOCs are available on our Github at https://git.io/vKlZb

 

-- Fidelis Threat Research Team researcher Jason Reaves

 

References

1: https://techhelplist.com/spam-list/742-order-confirmation-for-flight-malware

2: https://techhelplist.com/spam-list/785-payment-confirmation-for-tax-refund-request-malware

3: http://www.kernelmode.info/forum/viewtopic.php?f=16&t=981&start=70#p25915

4: https://techhelplist.com/spam-list/957-e-ticket-confirmation-aa-malware

5: https://myonlinesecurity.co.uk/american-airlines-e-ticket-confirmation-word-doc-malware/

6: http://www.scmagazine.com/dyre-trojan-almost-dead-after-takedown-by-the-russians/article/472074/

7: https://techhelplist.com/spam-list/995-re-recipient-domain-name-sucks-malware

8: https://securityintelligence.com/meet-goznym-the-banking-malware-offspring-of-gozi-isfb-and-nymaim/

 

Nymaim Gozi Module Targets:

https[:]//*pib*[.]secure-banking[.]com/*
https[:]//www[.]svbconnect[.]com/auth*
https[:]//connect-ch*[.]ubs[.]com/workbench/*
https[:]//clientlogin[.]ibb[.]ubs[.]com/login*
https[:]//achieveaccess[.]citizenscommercialbanking[.]com/CitizensWebApplication/achieve/loginScreen*
https[:]//onlinebusinessplus[.]vancity[.]com/business/default[.]jsp*
https[:]//www[.]vancity[.]com/BusinessBanking*
https[:]//cashmanageronline[.]bbt[.]com/auth/*
https[:]//onepass[.]regions[.]com/*
https[:]//commerceconnections[.]commercebank[.]com/*
https[:]//pfo[.]us[.]hsbc[.]com/*
https[:]//*/fi*/bb/logon*
https[:]//www8[.]comerica[.]com*
https[:]//connect[.]bnymellon[.]com/ConnectLogin/login/LoginPage[.]jsp*
https[:]//wellsoffice[.]wellsfargo[.]com/portal/signon/index[.]jsp*
https[:]//*[.]ibanking-services[.]com/*
https[:]//*LoginAdv[.]aspx*
https[:]//*ebanking-services[.]com/EamWeb*
https[:]//*/wcmfd/wcmpw/*
https[:]//*phcp/servlet*
https[:]//*[.]blilk[.]com/Core/Authentication/*
https[:]//*1961/*1961[.]ashx*
https[:]//*AOP/Password[.]aspx*
https[:]//*ally[.]com*
https[:]//*cm[.]netteller[.]com/login2008/Authentication*
https[:]//securentrycorp*/Authentication/zbf/k/*
https[:]//*/onlineserv/CM/*
https[:]//*tob/live/usp-core/app/initialLogin*
https[:]//*/CLKCCM/*/login[.]asp*
https[:]//*/Authentication/Login[.]aspx*
https[:]//*engine/login/logins*[.]asp*
https[:]//*myebanking[.]net*
https[:]//*hbloginv50*
https[:]//*User/AccessSignin/*
https[:]//drob[.]santanderbank[.]com/*
https[:]//*bnymellonwealthmanagement[.]com*
*businessonline[.]tdbank[.]com/corporatebankingweb/core*
https[:]//express[.]53[.]com/portal/auth/login/Login*
https[:]//express[.]53[.]com/portal/auth/login/Login*
*/ibanking3/login[.]aspx*
https[:]//trz[.]tranzact[.]org/LogonOTP[.]aspx
https[:]//login[.]tranzact[.]org/account/login*
https[:]//access[.]jpmorgan[.]com/jpmalogon*
https[:]//jpmcsso[.]jpmorgan[.]com/sso/action/federateLogin*markets[.]jpmorgan[.]com*
https[:]//jpmcsso[.]jpmorgan[.]com/sso/action/login*mdcommercial[.]jpmorgan[.]com*
https[:]//cashproonline[.]bankofamerica[.]com/AuthenticationFrameworkWeb/cpo/login/public/loginMain[.]faces*
https[:]//businessaccess[.]citibank[.]citigroup[.]com/cbusol/signon[.]do*
https[:]//www[.]treasury[.]pncbank[.]com/idp/esec/login[.]ht*
https[:]//singlepoint[.]usbank[.]com/cs70_banking/logon/sbuser*
https[:]//*/cmserver/welcome/*
https[:]//*engine/login/businesslogin[.]asp*
https[:]//*/engine/login/businesslogins[.]asp*
https[:]//*/pub/html/login[.]html*
https[:]//ktt[.]key[.]com/ktt/cmd/logon*
https[:]//*secure[.]fundsxpress[.]com/*
https[:]//banamexusa[.]btbanking[.]com/onlineserv/CM/ 


Chinese Browsers: The Perfect Reconnaissance Tool

$
0
0

IStock_82524687_SMALL

One of our trusted partners from Poland, Exatel S.A., has discovered that a web browser developed by Maxthon, a company from China, has been collecting sensitive data from its users.  The Maxthon browser has anywhere from .75-1% of the global browser market, and has been estimated to be 2-3% of China’s own domestic browser market.  Total global user count is estimated to be in the hundreds of millions.

You can read their full report here:

English:  https://exatel.pl/advisory/maxthonreporten.pdf

Polish: https://exatel.pl/advisory/maxthonreportpl.pdf

Using the Fidelis Network solution, Exatel found that there was a periodic upload of encrypted content to China from the Maxthon browser.  The uploaded content-type was purported to be “image/pjpeg”, but Fidelis had found that the filename was actually a zip and there was a dat.txt file included. 

Image1

 

 

 

 

 

 

 

 

 

This is the part that gets fishy. Upon extracting and examining the dat.txt, it was discovered that the file was encrypted.  Why would a browser be trying to obfuscate a payload like that?  Exatel dug deeper by doing some reverse engineering inside of the browser binary and found common encryption routines (AES-128-ECB) being used as well as the passphrase: ‘eu3o4[r04cml4eir’.

Exatel was able to decrypt the dat.txt and found amazing results in the contents, Maxthon was transmitting:

  • Endpoint information such as:
    • OS version, screen resolution.
    • CPU type/speed and amount of memory installed.
    • Location of the Maxthon executable.
    • Status of adblock (enabled or not, number of ads blocked).
    • Homepage URL.
  • Each and every full URL that the user visited (including the user’s google searches).
  • List of installed applications including their version numbers.

Screenshot of dat.txt showing a URL:

Image2

 

Screenshot of dat.txt showing a list of installed applications and their versions:

Image3

 

Upon further investigation, Maxthon does have an opt-in for users to send some basic data back for analysis.  According to their website and forums, the User Experience Improvement Program’s (UEIP) goal is to gather statistics and datapoints using voluntary and anonymous means in order to help with debugging and performance.  Exatel and Fidelis observed that the sensitive data contained in dat.txt was being sent back to Maxthon regardless of the user’s selection to participate in the UEIP.

Essentially, the information that is being transmitted back contains almost everything you would want in conducting a reconnaissance operation to know exactly where to attack.  Knowing the exact operating system and installed applications, and browsing habits it would be trivial to send a perfectly crafted spearphish to the victim or perhaps setup a watering hole attack on one of their most frequented websites.

I think that this discovery raises two very important points:

  1. Companies, countries and users need to be aware of the potentially egregious data capture happening through installed applications and leaving their respective organizations (and endpoints). Organizations such as Citizenlab have also published similar discoveries but there is still relatively low awareness of these practices.
  1. “Trust, but verify”: Often we’re installing software onto our endpoints at home and at work, but we’re not verifying that the code is doing what it is purported to do. Visibility into both the network and endpoints has become critical for organizations.

Exatel’s discovery is a great example of verifying and validating traffic.  We look forward to the opportunity to highlight more discoveries from our customers and partners.

Note to Users of Fidelis Network: Users will see alerts under the ‘TRT Attributed Intelligence’ rule for Maxthon browser exfiltration.

-- Fidelis Cybersecurity CSO Justin Harvey

 

 

Chasing Down RATs with Barncat

$
0
0

Thumb_TI_barncat_500Threat actors provide valuable clues when they compromise a new environment. But a single clue, such as a malware sample, seldom sheds the necessary light on an attack. Sniffing out the tools and tactics of attackers requires that you (or someone you know) has seen them before. Historical attack data can serve as a valuable resource for analysts by helping to identify and contextualize the adversary and rank the risk of an attack.

Today, we are excited to make a new (and we think pretty interesting) database available to the security community at no cost. The Fidelis Barncat™ Intelligence Database (or just Barncat for short) includes more than 100,000 records with remote access tool (RAT) configuration settings that we have extracted from malware samples gathered during our incident response investigations and other intelligence gathering operations over the past decade. As many of you know, while file hashes are easy to change, attackers are much less likely to change the configuration settings in the Remote Access Tool (RATs) they use to create their malware. By creating IOCs that find malware with unique configuration settings, security teams can identify attackers with more accuracy and attribute multiple attacks to a common threat actor.

Consider Dark Comet, a commodity  RAT. It’s commonly used by novice threat actors and would-be internet stalkers. It’s also being used in high-profile attacks by attackers with more sophisticated motives. To deceive defenders, sophisticated attackers may use RATs in an attempt to appear unskilled or less threatening. Barncat enables analysts to review a current sample, compare its configuration to previous samples, and correlate specific uses of malware families and activities to a specific threat actor.

To illustrate, let’s look at a JSocket sample observed last year with a “NICKNAME” configuration setting of “August24rd Bombing”. The NICKNAME setting seems nefarious and a quick trip to Wikipedia shows August 24 as the anniversary of the bombing of two civilian airliners at Moscow’s Domodedovo Airport. Terrorists have an affinity for these anniversaries. In fact, many JSocket incidents were traced back to RATs used by terrorist actors and groups.

Given these indicators, it’s easy to jump to conclusions. Even seasoned security experts could succumb to the temptation to quickly label this malware campaign as terrorist-related and spin up their hype machine. But be careful not to jump too quickly.

The Barncat database lets you dig deeper to come to a more informed conclusion. For example, searching for any JSocket sample with “Bomb” in the NICKNAME yields several other similar values (September 3rd, 30th September, etc.). In all of these cases, the C2 points to nikresut015js.zapto.org which (at the time) resolved to a U.S. IP address. This common data point suggests a common attacker among all the configurations.

The NICKNAME filed in the JSocket builder is a free-form text field. The use of “bombing” is simply nomenclature used by this adversary to describe discrete builds he sends into the world. In this case, the attacker removes the month and date, and types over the setting for each new version as indicated by the “rd” in the Nickname field from “August24rd Bombing”. The previous setting appears to have been “August3rd Bombing.”

In this case, the historical data shows the threat actor is not as malevolent as it seemed at first glance. The data could also result in the opposite conclusion, linking seemingly simple attacks to sophisticated attackers or terrorists.

The intelligence we are sharing via Barncat is available to the security community via one of our Malware Information Sharing Platform (MISP) instances. With the API, the data can be loaded into an internal Splunk instance, CIF or any number of tools to cross-check various aspects of a currently observed attack and see if previous malware samples can be linked. 

We are making the Barncat database available at no cost to the security community. It’s intended to be used by CERTs, research organizations, government entities, ISPs and other large commercial enterprises. To ensure proper use of this resource, organizations requesting access to the database must to provide some information about their organization, and how they plan to use the Barncat intelligence database. You can learn more and apply for access on the Fidelis website. As more people draw new insights from this data, we look forward to sharing and discussing them here on ThreatGeek.

-- Threat Systems Manager John Bambenek

DNC Email Leak: A Cybersecurity Watershed Moment

$
0
0

IStock_9032812_SMALL

In politics, getting the dirt on your adversary is nothing new. Candidates and campaigns have been trying to dig up dirt on each other since the dawn of democracy in Athens. More recently, we’ve seen everything from burgling party headquarters, to wiretaps, and campaign stalkers that record every word a candidate utters in public.

Most of these methods were employed to obtain information on an opponent so the information could be “weaponized” into a “gotcha” moment during a speech or used as a campaign talking point to discredit the opposing party. But as we watch the DNC leak unfold, it signifies an important watershed moment. Here’s why.

The DNC breach demonstrates the sophistication of a well-planned cyber espionage attack. First, the scale, timeliness and sensitivity of the data is significant. A massive dump of twenty-thousand emails was stolen and posted online for the world to see. It went beyond the release of a big data archive as we saw with the Ashley Madison and other recent data breaches.

Wikileaks took it a step further by putting the emails into a search engine. With the data now indexed, people could easily search and find the topics they’re most interested in. Private, internal email conversations between democratic party leaders revealed a collusion to give the nomination to Hillary Clinton, remarks about Sanders’ religion (or lack thereof), along with a variety of other topics.

Then there was the timing. All of this confidential information was exposed just before the start of the Democratic National Convention. Releasing thousands of documents worth of confidential information is the new norm. In December 2015, I predicted this would happen and it continues at greater scale and severity

Another reason this is a watershed moment centers around the suspected actor who committed the crime. Over a 12-month period, the DNC was victim to not just one, but two intrusions from a nation-state actor, Russia. They had access to the DNC’s complete network and endpoint infrastructure, including email servers. With that much time and access it’s more logical to ask what they didn’t take than speculate what they did take.

From a cyberespionage perspective, it would be surprising if the Russians simply didn’t grab “all” of the emails from the DNC. Now, it’s a matter of wait and see as to what other confidential information will be released and when.

While it is certainly possible that an insider was responsible, perhaps someone that was disillusioned about the DNC/Hillary link or upset with Sanders losing the primary, in order to commit the crime an insider would need access to the DNC email servers. Access to internal networks are typically guarded with tight access controls. Any unauthorized access would have alerted network administrators and have been discovered by Crowdstrike during their investigation.

Finally, if Russia is to blame, this breach marks the first time that a nation-state has used cyber espionage to influence a United States election. Sure, nation states have their preferences on who we want to choose as our President, and may even try some of their spycraft or dollars to influence it. But this email breach crosses a red line that we haven’t seen crossed before.

If you look back over the last five years there have been plenty of other watershed moments as cyber has become a primary domain used by nation states. A few others include…

  • 2010– Malware “Stuxnet” released by western nations to disable Iran’s centrifuge efforts. This is widely attributed as the first kinetic cyberattack on record.
  • 2013– Mandiant releases APT1 report exposing China’s cyberespionage campaign to steal commercial intellectual property for their own economic gain.
  • 2014– N. Korean’s attack on Sony. Not only one of the most destructive cyberattacks by disabling thousands of machines, but the first of many “embarrassment” leak breaches (Ashley Madison and others) to follow.
  • 2015– Suspected Chinese state sponsored attackers breach the Office of Personnel Management (OPM) and steal the “crown jewels” – top secret background files on millions of Federal workers.

If a nation-state is to blame for the DNC email leak, one thing is certain, this event will have shifted from a partisan issue to a national security issue. The safety and security of our nation revolves around the democratic process to elect our leaders.

It’s a slippery slope. If nation states choose to interfere or influence this process, the question becomes: “What will the next red line be?” We can be sure of one thing: the United States of America will have to act accordingly to ensure that these attacks are prevented in the future.

 

-Fidelis Cybersecurity CSO Justin Harvey

Black Hat 2016: Viva Las Vegas with Fidelis Cybersecurity

$
0
0

Booth_TG

We're counting down the last few days to Black Hat USA 2016. As you pack your suitcase and map out your schedule, plan on joining a meetup, seeing a demo or hitting us up for swag at the Fidelis Networking Lounge (aka Booth #1116). We can’t promise unicorns and narwhals, but we will have cool t-shirts, pinball and comfy chairs.

Here’s a quick rundown on where you can find us:

TECHNOLOGY & FREEWARE: At Black Hat, we’re debuting no-cost tools to help the security community stop attacks and prevent data theft. New resources include the Barncat Intelligence Database, the ThreatScannertool for finding malware residing on an endpoint, and CCNumberFinder to support PCI DSS compliance. While you’re there, you can also check out the latest updates with Fidelis Network™ and Fidelis Endpoint™. And, be sure to pick up a limited edition shirt – get ‘em while they last.

WHEN: Wednesday, 8/3, 10:00am - 7:00pm & Thursday, 8/4, 10:00am – 5:00pm
WHERE: Fidelis Network Lounge (Booth #1116) during expo hours.

BLACK HAT ARSENAL TECH DEMO:Learn more about Fidelis ThreatScanner™, a command-line tool that uses IOCs or YARA rules to hunt for threats on a single machine and automatically generate a report with details of the suspicious artifacts. Learn more.
WHEN: Wednesday, 8/3, 2:00 - 3:50pm
WHERE: Arsenal, Palm Foyer, Level 3, Station 9

FIDELIS PRESENTS: Fidelis CSO Justin Harvey (@jbharvey) explains ten remarkable things you can do when you have the right historical metadata during his talk on entitled “Ten Impossible Things You Can Do with the Right Metadata” on the Business Hall Floor.Learn more.

WHEN: Wednesday, August 3, 4:10 – 4:55pmWHERE: Business Hall Theater B

FIDELIS MEETUPS @ Booth #1116:We’re hosting a series of meetups. Whether you're a security ninja, reverse engineer, director of information security or malware analyst, this is a chance to participate in an all-things-cybersecurity idea exchange. Stop by and share your thoughts and experiences with other industry professionals or kick back and listen to the latest and greatest from the community.

MEETUP: 72 Hours Later - Moderated by: Ryan Vela
DESCRIPTION: Ugh, breached! How do you handle what’s rarely black and white? How do you cope with the aftermath? And zombies!  Did we mention zombies?
WHEN: Wednesday, 8/3 at 1:00pm Learn more

MEETUP: Talk Metadata with Me - Moderated by Justin Harvey (@jbharvey)
DESCRIPTION: Ever wondered what deep dark secrets your network and endpoints are harboring? If they could talk metadata to you, what could you do with that information?
WHEN: Wednesday, 8/3 at 5:30pm Learn more

MEETUP: Intel vs. Indicators - Moderated by John Bambenek (@bambenek) & Hardik Modi (@hardikmodi)
DESCRIPTION: It’s an alert smack down! In this corner we have intel, in the other corner we have indicators; Bring your best luche libre mask and discover how you can build and leverage intel to win the battle.
WHEN: Thursday, 8/4 at 12:30pm Learn more

MEETUP: Inside Out - The Anatomy of an Attacker - Moderated by Steve Bongardt (@stevebongardt)
DESCRIPTION: Ever wondered what motivates an attacker?  What signs/signals would you look for? Ever wondered about your own tendencies?
WHEN: Thursday, 8/4 at 2:00pm Learn more

For all things Fidelis at Black Hat, check out our event page or schedule a meeting or demo at Black Hat with us.

See you in Vegas!

-- The Fidelis Team

FANCY BEAR Has an (IT) Itch that They Can’t Scratch

$
0
0

Following news reports that the Democratic Congressional Campaign Committee (DCCC) was breached via a spoofed donation website, the ThreatConnect Research team and Fidelis Cybersecurity teamed up to collaborate and take a look at the associated domain to ferret out additional details on the activity.

The initial indications from the DCCC breach suggest FANCY BEAR pawprints based on the following: 

  • First, the registrant - fisterboks@email[.]com - behind the spoofed domain actblues[.]com has registered three other domains, all of which have been linked to FANCY BEAR by German Intelligence (BfV).
  • Second, the timing is consistent with an adversary reacting to heightened focus after the DNC breach was announced.
  • Third, the two name servers used by fisterboks@email[.]com to register four suspicious domains are the same ones used by frank_merdeux@europe[.]com, the registrant of misdepatrment[.]com, a spoofed domain that previously resolved to a FANCY BEAR command and control IP address used in the DNC breach.
  • Finally, a pattern exists where the actor is creating fictitious registrant email addresses by leveraging free webmail providers, such as 1&1’s Mail.com or Chewie Mail, to register faux domains which contain minor character transpositions or modified spellings. Additionally, the actor is favoring registrars and hosting providers that seemingly provide anonymity by accepting bitcoin for payment.

The following would strengthen our assessment of FANCY BEAR’s involvement:

  • Additional information indicating if the actblues[.]com domain was used to compromise the DCCC. At this point, we don’t know whether the domain was used for socially engineered phishing emails, serving up malware, or stealing user credentials.
  • If malware is involved with this compromise, having a sample or information on the malware would help us identify whether it is consistent with other tools used by FANCY BEAR.
  • If there is any other infrastructure involved with this compromise beyond the actblues[.]com domain and IP, identifying links between registration and hosting information for that infrastructure and known FANCY BEAR infrastructure could augment the confidence in our assessment.

Spoofed DCCC Domain Identified

Both of our companies respectively researched the domain secure.actblues[.]com, which spoofs the DCCC’s legitimate donation site secure.actblue[.]com. FANCY BEAR actors previously used the same technique with the domain misdepatrment[.]com, which spoofed the legitimate domain belonging to MIS Department, a Democratic National Committee IT contractor. The actblues[.]com domain, which is hosted on a Netherlands IP Address 191.101.31[.]112 (Host1Plus, a division of Digital Energy Technologies Ltd.), was registered using a privacy protection service through the I.T. Itch registrar.

Image 1

 

After reviewing the Start of Authority (SOA) record for actblues[.]com we were able to identify the email address fisterboks@email[.]com originally registered the domain.

Image 2

This fisterboks@email[.]com email address has previously registered three other domains, intelsupportcenter[.]com (hosted on a dedicated server at 81.95.7[.]11), intelsupportcenter[.]net (not active), and fastcontech[.]com, all of which have been attributed to FANCY BEAR activity in an official German Intelligence (BfV) report Cyber Brief Nr. 01/2016. It should also be noted that fastcontech[.]com is hosted at the same ISP as one of the IP’s listed by Crowdstrike for FANCY BEAR (185.86.148[.]227).

Perfect Timing

Upon further review of the actblues[.]com domain using the ThreatConnect Farsight Passive DNS integration, we were able to identify the date and time when the domain first resolved.

Image 3

The actblues[.]com domain was initially registered on June 14th and resolved to the 191.101.31[.]112 IP shortly thereafter. This indicates that the domain was operationalized in less than a day. Stepping out and looking at additional context related to the DNC activity, we identified that CrowdStrike’s initial report on the DNC hack was also published on June 14th. This suggests that, after being outed, FANCY BEAR actors shifted their operation immediately to another target that might allow them to continue collection against Democratic figures involved in the U.S. election.

Peripheral Associations

The surrounding infrastructure around the secure[.]actblues[.]com host in the 191.101.31.0/24 network merited a closer look. In one example, we identified that the suspicious domain geopoliticsmonitor[.]com resolved to IP Address 191.101.31[.]116. According to DomainTools, the WHOIS information for geopoliticsmonitor[.]com lists boltini_sandy@post[.]com as the domain registrant and I.T. Itch as providing administrative and name services.

Image 4

This domain appears to be a spoof of the legitimate domain geopoliticalmonitor.com. Geopolitical Monitor lists itself as a Canadian “international intelligence publication and consultancy”. This aligns with the suspicious domain stratforglobal[.]net, which uses the the Xtra Orbit name services (xtraorbit[.]com / xo.*.orderbox-dns.com) and registrant idolbreaker@mail[.]com detailed in our previous blog. Stratfor lists itself as a “geopolitical intelligence firm that provides strategic analysis and forecasting to individuals and organizations around the world.” Targeting of either of these organizations and or their customers might yield strategic insights or facilitate secondary operations.

In reviewing the peripheral networks associated with FANCY BEAR infrastructure, we saw correlation to the following hosts identified in PricewaterhouseCoopers's Sofacy II– Same Sofacy, Different Day:

  • globalnewsweekly[.]com
  • osce-oscc[.]org
  • enisa-europa[.]com
  • enisa-europa[.]org
  • militaryobserver[.]net

As well as other suspicious domains such as:

  • academl[.]com - spoofing Blackwater’s new company name.
  • tolonevvs[.]com - spoofing an Afghanistan news outlet.
  • eurosatory-2014[.]com - spoofing Eurosatory, a yearly military defense conference.
  • check-italia[.]ml - spoofing an organization associated with Italy’s Ministry of Economic Development.

The Name Server Connections

The fisterboks@email[.]com surfaced in our previous post on FANCY BEAR’s use of a bitcoin name server. At the time, we were interested in the two domains intelsupportcenter[.]com and intelsupportcenter[.]net because they looked like domain spoofs of the Intel Corporation, not necessarily because they were registered by fisterboks@email[.]com.

The name services in question - .bitcoin-dns[.]hosting - were also used by misdepatrment[.]com, a spoofed domain (of the legitimate misdepartment.com) that resolved to a FANCY BEAR command and control IP address used in the DNC breach. The same name servers have been used by other FANCY BEAR-linked domains as well as a long list of other suspicious domains that have not been attributed to any particular threat actor.

The domains actblues[.]com and fastcontech[.]com - the two fisterboks@email[.]com domains we identified from the SOA records - were registered through a different name server called I.T. Itch. fastcontech[.]com was also identified in the German Intelligence report on FANCY BEAR and is hosted on a dedicated server at the 185.61.149[.]198 IP address.

When we looked to see who else was using the I.T. Itch name server, we found httpconnectsys[.]com. This domain is notable as the SOA record indicates that it was initially registered by frank_merdeux@europe[.]com, the same email address that was used to register the misdepatrment[.]com domain. At the time of this writing, we have not identified any other name servers used by either registrant.

I.T. Itch Registrar

I.T. Itch (ititch[.]com) bills itself as an anonymous web hosting, bitcoin hosting, private domain registration company with a “100% non-compliance rate” aiming to help entities maintain an anonymous digital presence. The company allegedly accomplishes this by “actively ignoring and impeding digital data requests and take-down notices”. Websites on the company’s infrastructure purportedly leverage “web servers located in secret locations on three different continents,” further protecting customers’ private information and freedom of speech, essentially making the site owners anonymous.

Naturally, this promise of anonymity is attractive to cyber threat actors. However, it is this proclivity for anonymous infrastructure, coupled with available SOA records, that led the ThreatConnect Research team to identify additional APT-related infrastructure using I.T. Itch name servers, despite the use of Privacy Protect services to mask registrant data.

Scrutinizing Additional Suspicious Domains on I.T. Itch Name Server

We took a look at all of the domains that were registered this year that currently use the same name server (ititch[.]com) as actblues[.]com. From there, we attempted to identify those domains that were hosted on dedicated servers and stood out the most with respect to their name, and potentially what domains or topics they spoofed. Malicious actors from a variety of APT groups will often host their malicious domains on dedicated IP addresses. While this is NOT indicative of malicious activity, it can help us prioritize domains for additional review.

It is important to note that name server co-location does not definitively associate suspicious domains with previous malicious activity. Furthermore, we cannot immediately confirm that the domains listed below are hosting malware or are otherwise attributable to malicious APT activity; however, they deserve additional scrutiny due to the patterns identified above, and the fact that they were registered using a service like I.T. Itch.

This is an initial review of the 1,000+ domains registered this year that use the name server. A more thorough review of the domains may help identify additional, suspicious domains. The table below captures those that stood out the most to us based on our initial review. The table details the domain, registrant email addresses, registration date, hosting IP, and the number of domains hosted at that IP.

Domain

Registrant Email

Create Date

Hosting IP

Number of Domains at IP

actblues[.]com

contact@privacyprotect[.]org

6/14/16

191.101.31.112

1

appclientsupport[.]ca

 

2/22/16

195.62.53.44

1

appleappcache[.]com

contact@privacyprotect[.]org

5/26/16

185.24.233.114

1

appleauthservice[.]com

contact@privacyprotect[.]org

5/12/16

185.106.122.100

1

applerefund[.]com

larry19ct@gmail[.]com

5/9/16

198.50.218.231

1

archivenow[.]org

contact@privacyprotect[.]org

6/24/16

91.216.245.38

1

bbcupdatenews[.]com

contact@privacyprotect[.]org

6/26/16

185.106.122.35

1

bit-co[.]org

contact@privacyprotect[.]org

5/7/16

141.105.67.90

1

bitsdelivery[.]com

bastien[.]prignon@mail[.]com

7/9/16

217.23.2.148

1

buy0day[.]com

0dayshop@ruggedinbox[.]com

1/29/16

91.235.142.58

1

dynamicnewsfeeds[.]com

contact@privacyprotect[.]org

5/7/16

185.61.138.58

1

ebiqiuty[.]com

contact@privacyprotect[.]org

6/14/16

185.61.149.44

1

eigsecure[.]com

contact@privacyprotect[.]org

7/24/16

94.102.53.142

1

facebook-profiles[.]com

contact@privacyprotect[.]org

2/9/16

87.120.37.93

1

great-support[.]com

contact@privacyprotect[.]org

5/26/16

185.86.151.35

1

hackborders[.]net

7anoncats@yopmail[.]com

5/31/16

91.121.146.56

1

login-hosts[.]com

12ez@freshs[.]co[.]uk

2/23/16

76.74.177.251

1

logmein-careservice[.]com

sslajot@mail[.]ru

6/10/16

45.32.227.21

1

new-ru[.]org

contact@privacyprotect[.]org

7/21/16

46.148.17.227

1

passwordreset[.]co

yosha@openmailbox[.]org

4/16/16

5.100.155.82

1

securityresearch[.]cc

contact@privacyprotect[.]org

2/21/16

5.100.155.91

1

symantecupdates[.]com

contact@privacyprotect[.]org

5/3/16

185.24.233.122

1

socialmedia-lab[.]com

contact@privacyprotect[.]org

6/13/16

185.86.148.88

2

vortex-sandbox-microsoft[.]com

contact@privacyprotect[.]org

4/7/16

5.63.153.177

2

mofa-uae[.]com

contact@privacyprotect[.]org

2/11/16

185.61.138.53

3

social-microsoft[.]com

contact@privacyprotect[.]org

5/5/16

194.58.111.54

5

vpssecurehost[.]com

contact@privacyprotect[.]org

5/27/16

103.195.184.126

6

As we highlighted above, the suspicious domains are not immediately attributable to any malicious activity; however, their nature and use of these name servers suggest that they merit additional review. Some of the more suspicious domains from the above list are:

Ebiqiuty[.]com - This domain appears to spoof the legitimate domain ebiquity[.]com which belongs to Ebiquity -- a company that specializes in marketing analytics for customers around the world. This domain is also notable because it was registered the same day as actblues[.]com. Malicious actors will occasionally register multiple domains at a time to reduce the number of registrar transactions they have to be involved with. This domain currently redirects to Ebiquity’s legitimate site; however, we have yet to confirm whether it is in fact owned by Ebiquity. No available registration or hosting information indicates that Ebiquity registered this domain.

Bbcupdatenews[.]com - This domain spoofs the BBC News website. Spoofing news and media domains like this one is a common tactic for FANCY BEAR.

Symantecupdates[.]com - This domain stands out as it clearly spoofs anti-virus company Symantec. Further review of this domain identifies that it was previously registered using the email address li2384826402@yahoo[.]com, which was used to register domains used in the Anthem and OPM attacks.

Social-microsoft[.]com - The other domains hosted at the same IP also spoof technology-related services, including proxysys-config[.]com, system-proxy[.]info, and telemetry-akadns[.]net.

Conclusion

Actblues[.]com’s intended target, SOA record, registrant, and name server information probably point toward an association with recent Russian FANCY BEAR activity. The registration of the actblues[.]com domain on the same date FANCY BEAR’s compromise of the DNC was publicly reported further suggests that the group may be attempting to maintain access to systems used by those in the U.S. Democratic Party. Finally, these efforts would certainly be consistent with Russia’s recent activity targeting the DNC and their historic use of spoofed domains. If Russia is, in fact, responsible for the spoofed actblues[.]com domain and leveraging it against the DCCC, the question that naturally follows is...when does Guccifer 2.0 show up to take credit?

Viewing all 87 articles
Browse latest View live