CYBER ANALYTICS PROJECT FORBIS SAMANTHA GOVINDARAJ ASHWIN GUO HAOYAN SINHA ANUSHREE FEB 26 2014.

20
CYBER ANALYTICS PROJECT FORBIS SAMANTHA GOVINDARAJ ASHWIN GUO HAOYAN SINHA ANUSHREE FEB 26 2014

Transcript of CYBER ANALYTICS PROJECT FORBIS SAMANTHA GOVINDARAJ ASHWIN GUO HAOYAN SINHA ANUSHREE FEB 26 2014.

Page 1: CYBER ANALYTICS PROJECT FORBIS SAMANTHA GOVINDARAJ ASHWIN GUO HAOYAN SINHA ANUSHREE FEB 26 2014.

CYBER ANALYTICS PROJECT

FORBIS SAMANTHA

GOVINDARAJ ASHWIN

GUO HAOYAN

SINHA ANUSHREE

FEB 26 2014

Page 2: CYBER ANALYTICS PROJECT FORBIS SAMANTHA GOVINDARAJ ASHWIN GUO HAOYAN SINHA ANUSHREE FEB 26 2014.

INTRODUCTION

The purpose of this project is to research different cyberspace vulnerabilities and opportunities

Cyber analytics offers a better understanding of organizations’ infrastructure and its vulnerabilities

In this project we have researched different vulnerabilities such as – The state of Automatic Teller Machine security in the wake of the 2009 Russian

ATM hack

Cracking WEP/WPA wireless networks

Trojan malware and its impact

Use of keylogger to hack information

Page 3: CYBER ANALYTICS PROJECT FORBIS SAMANTHA GOVINDARAJ ASHWIN GUO HAOYAN SINHA ANUSHREE FEB 26 2014.

RESEARCH QUESTIONS

What is the state of Automatic Teller Machine security in the wake of the 2009 Russian ATM hack using the Troj/Skimmer-A malware and the 2013 $44.7 million worldwide ATM cyberheist?

How can I crack a WEP or WPA wireless network and analyze packet exchange in a network?

How is Zeus Bot setup in the system, the links where it can be hosted and how to avoid Zeus Tracker?

How can we use Keylogger to “hack” information?

Page 4: CYBER ANALYTICS PROJECT FORBIS SAMANTHA GOVINDARAJ ASHWIN GUO HAOYAN SINHA ANUSHREE FEB 26 2014.

Automatic Teller Machines

BACKGROUND

2009 – Russian hackers use Skimmer-A Trojan to hack ATMs

Required the employment of an insider to inject the Trojan in person

Diebold ATMs

2013 – Worldwide cyber gang employs 2 part scheme resulting in

$44.7 million cyber heist

Social Engineering for database access (phishing)

International cooperation of multiple cells of the cyber gang

Page 5: CYBER ANALYTICS PROJECT FORBIS SAMANTHA GOVINDARAJ ASHWIN GUO HAOYAN SINHA ANUSHREE FEB 26 2014.

ATMs – Shodan,Python Script and SQL

import MySQLdb

from shodan import WebAPI

SHODAN_API_KEY = "lT3whkyVHH7iAtP28iNIq7hVNlK638vR"

api = WebAPI(SHODAN_API_KEY)

try:

# Search Shodan

shodansearch = raw_input( 'Enter Search Parameter' )

results = api.search(shodansearch, page=1, limit=3000, \

offset=None)

# Show the results

print 'Results found: %s' % results['total']

for result in results['matches']:

# searchid = '0'

ip = result['ip']

port = result['port']

# server = result['names']

# mac = result['mac']

city = result['city']

country = result['country_name']

# operatesys = result['os']

updatedt = str(result['updated'])

lat = str(result['latitude']) lon = str(result['longitude']) devicedata = result['data'] portnum = int(port) strip = str(ip) # strhost = ('\n'.join((host))) # Open database connection db = MySQLdb.connect(host='127.0.0.1', user='shodan', passwd='shodan', db='ShodanDB')

# prepare a cursor object using cursor() method cursor = db.cursor() null = None

sql = "INSERT INTO dv_ip_atm(ip, port, city, country, updatedt, \ lat, lon, devicedata) VALUES ('%s','%s','%s','%s','%s','%s','%s','%s')" \ % (ip, port, city, country, updatedt, lat, lon, devicedata) try: # Execute the SQL command cursor.execute(sql) # Commit your changes in the database db.commit() print "successfully inserted 1 row" except: # Rollback in case there is any error db.rollback() print "Error inserting Data: rolledback" print "Error on IP '%s'" % strip # disconnect from server db.close()

except Exception, e:

United States Devices

SELECT ip, port, country,

devicedata

FROM dv_ip_atm

WHERE country="United States";

United Kingdom devices

SELECT ip, port, country,

devicedata

FROM dv_ip_atm

WHERE country="United

Kingdom";

Page 6: CYBER ANALYTICS PROJECT FORBIS SAMANTHA GOVINDARAJ ASHWIN GUO HAOYAN SINHA ANUSHREE FEB 26 2014.

ATM Protections

DV-IP ATM device

Video and embedded transaction logging

Available web interface

Human factor remains weakest link

Unprotected web interface accessible

Page 7: CYBER ANALYTICS PROJECT FORBIS SAMANTHA GOVINDARAJ ASHWIN GUO HAOYAN SINHA ANUSHREE FEB 26 2014.

ATM Findings Distribution of DV-IP ATM Device

United Kingdom

47%United States23%

Germany9%

France8%

Italy7%

Sweden6%

DV-IP ATM Distribution

17%

13%

8%

8%8%4%

4%4%

4%

4%4%4%

4%

4%4%

4%DV-IT ATM Dist - Tail End

TurkeyAustraliaIndiaIrelandAnonymous ProxyAustriaMaltaNorwayCzech RepublicSpainSwitzerlandNether-landsNew Zea-landGreeceEstonia

Page 8: CYBER ANALYTICS PROJECT FORBIS SAMANTHA GOVINDARAJ ASHWIN GUO HAOYAN SINHA ANUSHREE FEB 26 2014.

Aircrack

Cracking WEP and WPA (Dictionary attack) keys

Decrypting WEP or WPA encrypted capture files with known key

Packet sniffer: Places air traffic into PCAP or IVS files and shows information about networks

Creating encrypted packets for injection

Allows you to access the wireless card from other computers

Page 9: CYBER ANALYTICS PROJECT FORBIS SAMANTHA GOVINDARAJ ASHWIN GUO HAOYAN SINHA ANUSHREE FEB 26 2014.

Aircrack – Database posts

anonposts elitehackposts hackhoundposts vctoolposts0

2

4

6

8

10

12

14

16

18

5

1716

12

Database posts

Page 10: CYBER ANALYTICS PROJECT FORBIS SAMANTHA GOVINDARAJ ASHWIN GUO HAOYAN SINHA ANUSHREE FEB 26 2014.

Aircrack - Statistics

Title StatsDatabase posts 50

First post 27-Jan-10

Last post 10-Sep-13

Post rank of 1 29

Unique authors 24

Threads 15

Posts with attachments 4

Page 11: CYBER ANALYTICS PROJECT FORBIS SAMANTHA GOVINDARAJ ASHWIN GUO HAOYAN SINHA ANUSHREE FEB 26 2014.

Aircrack - Findings

For cracking, 5,000 Data/IV's for 64 bit encryption and 10,000 Data/IV's for 128 bit encryption

128 bit WEP key can be cracked in less than 2 minutes

It is less efficient on UNIX systems

It's a little bit longer when it's a WPA protection because of the handshake and dictionary attack for cracking process

For WEP, you need to collect IV packets, once you have a sufficient amount

WPA, PSK and AES can be cracked

Page 12: CYBER ANALYTICS PROJECT FORBIS SAMANTHA GOVINDARAJ ASHWIN GUO HAOYAN SINHA ANUSHREE FEB 26 2014.

Zeus BotNet: A toolkit providing a malware creator with all tools required to build and

administer a botnet

Some of the features of this botnet: Captures credentials over HTTP, HTTPS, FTP, POP3 and Steals/deletes HTTP and flash

cookies

Steals client-side X.509 public key infrastructure certificates

Captures screenshots and scrapes HTML from target sites

Modifies the local hosts file

Groups the infected user systems into different botnets to distribute command and control

Has a major function to kill the operating system

Sends a lot of information to C&C server, such as the version of the bot, operating system, local time, geographic locations, etc.

Page 13: CYBER ANALYTICS PROJECT FORBIS SAMANTHA GOVINDARAJ ASHWIN GUO HAOYAN SINHA ANUSHREE FEB 26 2014.

Zeus Botnet– Database posts

Database posts

anonpostselitehackposts

hackhoundpostsicodeposts

vctoolposts

0

50

100

150

200

250

300

350

400

Number of posts

Number of posts

Page 14: CYBER ANALYTICS PROJECT FORBIS SAMANTHA GOVINDARAJ ASHWIN GUO HAOYAN SINHA ANUSHREE FEB 26 2014.

Zeus Botnet - Statistics

13

33

38

79

Zeus and its variant account for half of total known banking malware

ZeusCitadelGameover ZeusShylockOther

Page 15: CYBER ANALYTICS PROJECT FORBIS SAMANTHA GOVINDARAJ ASHWIN GUO HAOYAN SINHA ANUSHREE FEB 26 2014.

Zeus Botnet - Findings

Mirage Anti-Bot: a software that blocks all known bots site including :

Zeus Bot, Palevo Bot and Spyeye Bot

The code to avoid Zeus Tracker, a software that tracks Zeus Botnet

Latest Version: Zeus 3.0 (upgrade to GameOver Zeus)

Setup of Zeus Botnet

Links to host Zeus Botnet

Page 16: CYBER ANALYTICS PROJECT FORBIS SAMANTHA GOVINDARAJ ASHWIN GUO HAOYAN SINHA ANUSHREE FEB 26 2014.

Keylogger: A keylogger also know as keystroke logger is software or hardware device which

monitors each and every key typed by you on your keyboard

Keylogger can also harm you by storing all the sensitive information such as your username and password, bank credit card details etc

 

There are two types of keylogger hardware keylogger and software keylogger

Software keylogger is installed in your computer where as a Hardware keylogger is attached to your keyboard

For the hardware, it is easy to discover, however, it is hard for people to realized that if they are using a computer with a keylogger software

Page 17: CYBER ANALYTICS PROJECT FORBIS SAMANTHA GOVINDARAJ ASHWIN GUO HAOYAN SINHA ANUSHREE FEB 26 2014.

Keylogger – Database posts

Database posts

454

162

# of related results

U.S. China

Page 18: CYBER ANALYTICS PROJECT FORBIS SAMANTHA GOVINDARAJ ASHWIN GUO HAOYAN SINHA ANUSHREE FEB 26 2014.

Keylogger - Statistics

Zeus and its variant account for half of total known banking malware

Name of Table # of 1st postrankanonposts 17

elitehack 53

hackhound 16

icode 33

vctool 106

unpack 129

cnhonkerarmy 14

Total 368

Percentage 59.74%

Page 19: CYBER ANALYTICS PROJECT FORBIS SAMANTHA GOVINDARAJ ASHWIN GUO HAOYAN SINHA ANUSHREE FEB 26 2014.

Keylogger - Findings

Based on the data from Hacker Web, there are total seven tables who is talking about the Keylogger

Two of them are Chinese forums and rest of them are U.S. From the Pie Chart we can see the partition of these two countries’ discussion results of Keylogger

From the Table we can see that the Keylogger is a very hot topic in the world wide

There are above 50% of the posts are ranking the 1st in the forums that is discussing about the Keylogger

Page 20: CYBER ANALYTICS PROJECT FORBIS SAMANTHA GOVINDARAJ ASHWIN GUO HAOYAN SINHA ANUSHREE FEB 26 2014.

REFERENCES http://hackhound.org/forums/topic/3581-looking-for-the-besteasiest-tools-to-open-a-wep-wifi-network/

http://www.aircrack-ng.org/

http://en.wikipedia.org/wiki/Aircrack-ng

http://vctools.net/forum/Thread-hack-wifi-password-in-windows-wep

http://vctools.net/forum/Thread-wireless-hacking-wep-crack-backtrack3

http://hackhound.org/forums/topic/1303-wifi-cracker/

http://hackhound.org/forums/topic/2320-botfuck-bots-to-the-right-direction-script/

http://vctools.net/forum/Thread-tutorial-setup-zeus-bot-with-pictures-tutorial#axzz2uOBW2z1X

http://vctools.net/forum/Thread-how-to-avoid-zeustracker#axzz2uOBW2z1X

http://vctools.net/forum/Thread-where-to-host-your-istealer-zeus#axzz2uOBW2z1X

http://hackhound.org/forums/topic/2320-botfuck-bots-to-the-right-direction-script/

http://vctools.net/forum/Thread-tutorial-setup-zeus-bot-with-pictures-tutorial#axzz2uOBW2z1X

http://vctools.net/forum/Thread-how-to-avoid-zeustracker#axzz2uOBW2z1X

http://vctools.net/forum/Thread-where-to-host-your-istealer-zeus#axzz2uOBW2z1X

http://security.blogoverflow.com/2012/08/exploiting-atms-a-quick-overview-of-recent-hacks/

http://www.globalpost.com/dispatch/news/business/technology/130510/hackers-steal-millions-atms-worldwide-cyberheist#ixzz2T0Kbkco1

http://www.businessinsider.com/how-hackers-stole-44-million-from-atms-2013-5

http://www.atmmarketplace.com/blog/12343/Could-mobile-be-the-future-for-ATMs-and-FI-brands

 http://security.blogoverflow.com/2012/08/exploiting-atms-a-quick-overview-of-recent-hacks/

http://www.dedicatedmicros.com/europe/products_details.php?product_id=214

http://www.diebold.com/products-services/atm-self-service/terminals/Pages/default.aspx

https://www.tritonatm.com/products/triton_connect/

http://www.diebold.com/Diebold%20Asset%20Library/dbd_atmfraudandsecurity_whitepaper.pdf