The New Generation of Targeted Attacks

52
The New Generation of Targeted Attacks Eric Chien Technical Director, Symantec Security Response 1 Sep 2010

description

The New Generation of Targeted Attacks. Eric Chien. Sep 2010. Technical Director, Symantec Security Response. - PowerPoint PPT Presentation

Transcript of The New Generation of Targeted Attacks

Page 1: The New Generation of Targeted Attacks

The New Generation of Targeted AttacksEric ChienTechnical Director, Symantec Security Response

1

Sep 2010

Page 2: The New Generation of Targeted Attacks

Targeted attacks are similar malicious threats sent to a narrow set of recipients based on their employment industry or direct involvement in an organization to gain access to intellectual property and confidential documents.

.

RAID 2010 - The New Generation of Targeted Attacks 2

Page 3: The New Generation of Targeted Attacks

• A Walk Through the Malware History• History of Targeted Attacks• The Methodology of Targeted Attacks

Overview

• Aurora (Hydraq)• Demonstration• Stuxnet

A Closer Look

• Protection Challenges• Summary

Defense

RAID 2010 - The New Generation of Targeted Attacks 3

1

2

3

Agenda

Page 4: The New Generation of Targeted Attacks

History of Malware

4RAID 2010 - The New Generation of Targeted Attacks

Page 5: The New Generation of Targeted Attacks

The Era of Discovery

RAID 2010 - The New Generation of Targeted Attacks 5

1986 1987 1988 1989 1991

First IBM PC virus:Brain boot sector virus created in Pakistan

First Polymorphic Virus:Chameleon developed by Ralf Burger

1990

First DOS File Infector:Virdem presented at the Chaos Computer Club

Page 6: The New Generation of Targeted Attacks

The Era of Transition

RAID 2010 - The New Generation of Targeted Attacks 6

1992 1993 1994 1995 1997

Michaelangelo trigger date: Causes widespread media panic that computers would be unbootable

First Word Macro virus:Concept is the first macro virus infected Microsoft Word documents

1996 1998

CIH:A Windows file infector that would flash the BIOS

Page 7: The New Generation of Targeted Attacks

The Era of Fame and Glory

RAID 2010 - The New Generation of Targeted Attacks 7

LoveLetter Worm:First VBS script virus to spread rapidly via Outlook email

1999 2000 2001 2002 20042003 2005

Anna Kournikova:Just another email worm, but successful in propagation using racy pictures of Anna Kournikova as bait

Blended Threats:CodeRed, Nimda spread without any user interaction using Microsoft system vulnerabilities

Worm wars:MyDoom, Netsky, Sobig, all compete for machines to infectEmail systems down:

The Melissa worm spreads rapidly to computers via email causing networks to come to a crawl

Samy My Hero:XSS worm spreads on MySpace automatically friending a million users

Page 8: The New Generation of Targeted Attacks

The Era of Mass Cybercrime

RAID 2010 - The New Generation of Targeted Attacks 8

Mebroot:MBR rootkit that steals user credentials and enables spamming

2006 2007 2008 2009 2010

Koobface:Spreads via social networks and installs pay-per-install software

Conficker:Spreads via MS08-067, builds millions-sized botnet to install pay-per-install software

Storm Worm:P2P Botnet for spamming and stealing user credentials

Rogue AV:Becomes ubiquitous charging $50-$100 for fake proteciton

Zeus Bot:Hackers botnet executable of choice -- steals online banking credentials

Hydraq:Targets multiple US corporations in search of intellectual property

Stuxnet:Targets industrial control systems in Iran

Page 9: The New Generation of Targeted Attacks

RAID 2010 - The New Generation of Targeted Attacks 9

1998 1999 2000 2001 2002

Solar Sunrise:Attacks stealing passwords from DoD systems conducted by 2 Californian and 1 Israeli teenager

Moonlight Maze:Attacks targeting US military secrets reported to be conducted by Russia

Page 10: The New Generation of Targeted Attacks

RAID 2010 - The New Generation of Targeted Attacks 10

2003 2004 2005 2006 2007

Titan Rain:Coordinated attacks on US government military installations and private contractors

US Government:Systems in the Department of Defense, State, Commerce, Energy, and NASA all comprised and terabytes of information confirmed stolen.

Page 11: The New Generation of Targeted Attacks

RAID 2010 - The New Generation of Targeted Attacks 11

2008 2009 2010 2011

Ghostnet:Attacks on Tibetan organizations and embassies of many EMEA countries, and NATO systems.

Aurora (Hydraq):Google announcesthey have been a victim of the Hydraq attacks

Stuxnet:Malware discovered targeting Iran industrial control systems

Page 12: The New Generation of Targeted Attacks

RAID 2010 - The New Generation of Targeted Attacks 12

2003 2004 2005 2006 2007

Titan Rain:Coordinated attacks on US government military installations and private contractors

US Government:Systems in the Department of Defense, State, Commerce, Energy, and NASA all comprised and terabytes of information confirmed stolen.

Page 13: The New Generation of Targeted Attacks

RAID 2010 - The New Generation of Targeted Attacks 13

1998 1999 2000 2001 2002

Solar Sunrise:Attacks stealing passwords from DoD systems conducted by 2 Californian and 1 Israeli teenager

Moonlight Maze:Attacks targeting US military secrets reported to be conducted by Russia

Page 14: The New Generation of Targeted Attacks

RAID 2010 - The New Generation of Targeted Attacks 14

2003 2004 2005 2006 2007

Titan Rain:Coordinated attacks on US government military installations and private contractors

US Government:Systems in the Department of Defense, State, Commerce, Energy, and NASA all comprised and terabytes of information confirmed stolen.

Page 15: The New Generation of Targeted Attacks

RAID 2010 - The New Generation of Targeted Attacks 15

2008 2009 2010 2011

Ghostnet:Attacks on Tibetan organizations and embassies of many EMEA countries, and NATO systems.

Aurora (Hydraq):Google announcesthey have been a victim of the Hydraq attacks

Stuxnet:Malware discovered targeting Iran industrial control systems

Page 16: The New Generation of Targeted Attacks

16

RAID 2010 - The New Generation of Targeted Attacks

Targeted Attack Methodology

Page 18: The New Generation of Targeted Attacks

Targeted Attack MethodologyPayload Install and Execution

RAID 2010 - The New Generation of Targeted Attacks 18

Victim

http://example.com/abc.html

Malicious Server

Backdoor ProgramMalicious Server

AttackerConfidential Information

Page 19: The New Generation of Targeted Attacks

Targeted Attack MethodologyMass Attacks vs. Targeted Attacks

Phase Mass Attack Targeted Attack

Incursion Generic social engineeringBy-chance infection

Handcrafted and personalized methods of delivery

Discovery Typically no discovery, assumes content is in a pre-defined and predictable location

Examination of the infected resource, monitoring of the user to determine additional accessible resources, and network enumeration

Capture Pre-defined specific data or data that matches a pre-defined pattern such as a credit card number

Manual analysis and inspection of the data

Exfiltration Information sent to a dump site often with little protection; dump site serves as long term storage

Information sent back directly to the attacker and not stored in a known location for an extended period

RAID 2010 - The New Generation of Targeted Attacks 19

Page 20: The New Generation of Targeted Attacks

A Closer Look at Hydraq

20

RAID 2010 - The New Generation of Targeted Attacks

Page 21: The New Generation of Targeted Attacks

TimelineHydraq Attacks

RAID 2010 - The New Generation of Targeted Attacks 21

2009 APR MAY JUN JUL AUG SEP OCT NOV DEC JAN 2010

April:First confirmed attack related to December Hydraq attacks

Samples contain build times dating back to at least April 2007

June/July:Attacks primarily using exploit PDFs deliver earlier variants of Hydraq

August:BugSec private reports IE vulnerability (CVE-2010-0249) to Microsoft, which is used in Dec attacks

January 12:Google announces they have been a victim of a targeted attack

Page 22: The New Generation of Targeted Attacks

TimelineDecember Hydraq Incident

RAID 2010 - The New Generation of Targeted Attacks 22

2009 DECEMBER JANUARY 2010

December 10:More than 30 companies targeted by Hydraq attackers throughout December

January 14: Microsoft release Security Bulletin (979352) acknowledging CVE2010-0249

January 15:Exploit is made public and integrated into Metasploit

January 18: Broad usage of CVE2010-0249 begins

January 12:Google announces they have been a victim of a targeted attack

January 21:Microsoft releases patches for CVE2010-0249

Page 23: The New Generation of Targeted Attacks

Hydraq AttacksKey Facts

• More than 30 enterprises discover attacks in January 2010• Key personnel were targeted and sent information related to their business

activities via email and instant messaging• A link was provided that led to an 0-day exploit targeting IE6• Other exploits (such as PDFs) had been used historically• The exploit silently downloaded and executed Trojan.Hydraq• Trojan.Hydraq allowed backdoor access to the infected machine

– Features are simple relative to other current threats

– Many code blocks appear to be copied from public sources

• Attackers performed reconnaissance and obtained sensitive information from the infected machine and gained access to other resources on the network

• Attacks were customized to each organization and specific details vary per targeted organization

RAID 2010 - The New Generation of Targeted Attacks 23

Page 24: The New Generation of Targeted Attacks

December Hydraq IncidentPersonal Email or IM to the Victim

RAID 2010 - The New Generation of Targeted Attacks 24

AttackerVictim

Hi Eric,

I met you at the Malware Conference last month. Wanted to let you know I got this great shot of you doing your presentation. I posted it here:

http://photo1.zyns.com/72895381_1683721_d.html

Page 25: The New Generation of Targeted Attacks

Victim

December Hydraq IncidentBait Leads to 0-Day Exploit

RAID 2010 - The New Generation of Targeted Attacks 25

PHOTO1.ZYNS.COM

Free dynamic DNS service provided by ChangeIP.com

203.69.40.144

Malicious server hosted by Chunghwa Telecom Co., Ltd. in Taiwan

Webpage with 0-day Exploit

Page 26: The New Generation of Targeted Attacks

December Hydraq IncidentExploit Downloads Dropper

RAID 2010 - The New Generation of Targeted Attacks 26

Victimhttp://demo1.ftpaccess.cc/ad.jpg

Free dynamic DNS service provided by DynDNS

FTPACCESS.CC

XOR Encoded

Saved to %APPDATA%\a.exe

a.exe

Malicious server hosted by Chunghwa Telecom Co., Ltd. in Taiwan

Decoded by the shellcode and saved to %APPDATA%\b.exe

Hydraq Dropperb.exe

Decoded

Page 27: The New Generation of Targeted Attacks

Victim

svchost.exerasmon.dll

Hydraq

Adds itself as a service to the netsvc service group

December Hydraq IncidentDropper Installs Hydraq Trojan

RAID 2010 - The New Generation of Targeted Attacks 27

Hydraq Dropperb.exe

Drops %system%\rasmon.dll

rasmon.dll

Hydraq

rasmon.dll

Hydraq

%TEMP%\1758.nls

Drops a Windows logon password stealer

rasmon.dll

Hydraq

Page 28: The New Generation of Targeted Attacks

December Hydraq IncidentHydraq Connects to Command & Control

RAID 2010 - The New Generation of Targeted Attacks 28

Victim

HydraqConnects to C&C server *.homelinux.org:443

(uses custom protocol – not HTTPS)

Free dynamic DNS service provided by DynDNS

HOMELINUX.ORG:443

Malicious server hosted by Rackspace, San Antonio

72.3.224.71:443Attacker

Page 29: The New Generation of Targeted Attacks

DemonstrationOverview

RAID 2010 - The New Generation of Targeted Attacks 29

Attacker Victim

Targeted socially engineered attack begins, e.g., via email

Victim unwittingly visits malicious server

Malicious payload delivered, VNC-like remote control

Attacker now has full access to victims computer…

… and potentially every computer connected to the victim

Page 30: The New Generation of Targeted Attacks

A Closer Look at Stuxnet

RAID 2010 - The New Generation of Targeted Attacks 30

Page 31: The New Generation of Targeted Attacks

Stuxnet

• Attacks industrial control systems• Spreads by copying itself to USB drives

– LNK vulnerability

– Autorun.inf

• Spreads via network shares• Spreads using 2 known and 4 0-day Microsoft vulnerabilities

– MS08-067

– Default password in Siemens WinCC

– LNK: allows automatic spreading via USB keys

– Printer Spooler: allows network spreading to remote machines

– Undisclosed 1: local privilege escalation vulnerability

– Undisclosed 2: local privilege escalation vulnerability RAID 2010 - The New Generation of Targeted Attacks 3

1

Page 32: The New Generation of Targeted Attacks

Stuxnet

• Uses a Windows rootkit to hide Windows binaries– Signed by one of 2 stolen certificates from ‘JMicron’ and ‘Realtek’

• Injects STL code into Siemens PLCs (Progammable Logic Controllers)• Uses rootkit techniques to hide injected PLC code

– Patches Siemens Step 7 software, which is used to view PLC code

• Communicates with C&C servers using HTTP– www.mypremierfutbol.com

– www.todaysfutbol.com

• Steals designs documents for industrial control systems• Sabotages targeted industrial control systems• Targeted system likely in Iran

RAID 2010 - The New Generation of Targeted Attacks 32

Page 33: The New Generation of Targeted Attacks

StuxnetMethod of Delivery

RAID 2010 - The New Generation of Targeted Attacks 33

Attacker Victim

Employee

Co-workers

Page 34: The New Generation of Targeted Attacks

StuxnetICS System Discovery

RAID 2010 - The New Generation of Targeted Attacks 34

http://<domain>/index.php?data=[DATA]

www.mypremierfutbol.comwww.todaysfutbol.com

Attacker

http://<domain>/index.php?data=Step7_Installed

Page 35: The New Generation of Targeted Attacks

StuxnetICS Command & Control

RAID 2010 - The New Generation of Targeted Attacks 35

Design Documents

www.mypremierfutbol.comwww.todaysfutbol.com

Commands to sabotage PLC

www.mypremierfutbol.comwww.todaysfutbol.com

Page 36: The New Generation of Targeted Attacks

Stuxnet

RAID 2010 - The New Generation of Targeted Attacks 36

Page 37: The New Generation of Targeted Attacks

Stuxnet

W32.Stuxnet - Threat Intel 37

Over 40,000 infected unique external IPs, from over 115 countries

IRAN INDONESIA INDIA AZERBAIJAN PAKISTAN MALAYSIA USA UZBEKISTAN RUSSIA GREAT BRITAIN

OTHERS0.00

10.00

20.00

30.00

40.00

50.00

60.00

70.00

58.31

17.83

9.96

3.401.40 1.16 0.89 0.71 0.61 0.57

5.15

Geographic Distribution of Infections

Uniq

ue IP

s Con

tact

C&

C Se

rver

(%)

Page 38: The New Generation of Targeted Attacks

Stuxnet

RAID 2010 - The New Generation of Targeted Attacks 38

67.60

8.10 4.98 2.18 2.18 1.56 1.25

12.15

0.00

10.00

20.00

30.00

40.00

50.00

60.00

70.00

80.00

IRA

N

SOU

TH K

ORE

A

USA

GRE

AT

BRIT

AIN

IND

ON

ESIA

TAIW

AN

IND

IA

OTH

ERS

Distribution of Infected Systems with Siemens Software

Page 39: The New Generation of Targeted Attacks

Defense and Protection Challenges

RAID 2010 - The New Generation of Targeted Attacks 39

Page 40: The New Generation of Targeted Attacks

Defenses

RAID 2010 - The New Generation of Targeted Attacks 40

AttackerVictim

Email / IM GatewaySPAM / Content Filtering

Buffer Overflow /Exploit protection

Malicious Server

IPS Protection/URL Blocking

Backdoor Program

Reputation Scanning

Data Loss Prevention

Behavior Blocking /AV Scanning

Page 41: The New Generation of Targeted Attacks

Protection Challenges for Targeted Attacks

41

Technology Effectiveness Reason

Email/IM SPAM Filtering Weak • Personalized emails to victims evade SPAM filters

Anti-virus signature scanning Weak •Attackers can pre-scan executables with existing AV software, and modify until they are no longer detected•Spaghetti code confuses heuristic scanning

Intrusion Prevention Systems Moderate • Most 0-day attacks evade IPS scanners• Protocol anomaly detection may have blocked post- infection communications

Browser Shield &Buffer Overflow Protection

High • Doesn’t require a-priori knowledge of the exploit• Triggers on anomalies in execution path

URL Blocking / Content Filtering Weak • Attacker-generated domains unknown to filter• These domains are therefore typically allowed

File Reputation Scanning High • Relies only on the community reputation of the file, which is typically low for personalized malware files

Behavior Blocking High • Prevents malicious behaviors

Data Loss Prevention Moderate • Network compromised, but sensitive data retained

RAID 2010 - The New Generation of Targeted Attacks

Page 42: The New Generation of Targeted Attacks

Summary

• Targeted attacks similar to the Hydraq attacks have been occurring for at least a decade

• The vast majority of attacks are never disclosed• Government entities, contractors, and large enterprises are the

primary targets• Attacks are personalized to the victim• Attacks are often technically simple, but devastating in their

payload• Targeted attacks will continue in the foreseeable future• Protection from targeted attacks requires vigilance as a breach

only requires a single evasion

RAID 2010 - The New Generation of Targeted Attacks 42

Page 43: The New Generation of Targeted Attacks

Questions?

43

RAID 2010 - The New Generation of Targeted Attacks

Page 44: The New Generation of Targeted Attacks

Thank you!

Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

RAID 2010 - The New Generation of Targeted Attacks 44

Eric ChienTechnical DirectorSymantec Security Response

Page 45: The New Generation of Targeted Attacks

Appendix

45

RAID 2010 - The New Generation of Targeted Attacks

Page 46: The New Generation of Targeted Attacks

Internet Explorer Vulnerability

46

RAID 2010 - The New Generation of Targeted Attacks

Page 47: The New Generation of Targeted Attacks

Internet Explorer Vulnerability

• Vulnerability when Internet Explorer accesses an object that no longer exists• Exploit code is delivered via a specially crafted webpage• Allows remote code execution under the context of the logged-on user• Specifically targets Internet Explorer 6• Patches released on January 21, 2010 (CVE2009-0249 / MS10-002)• Exploit code leaks on to Internet on January 14, 2010

– Added to penetration test tools such as Metasploit– Internet Explorer 6, 7, 8 all vulnerable– Exploits now exist for 6, 7, and 8 bypassing built-in IE security (DEP/ASLR)– Exploits do not bypass IE Protected Mode (IE7,8 on Vista/Win7)

• Secondary vulnerability can be exploited to bypass protected mode– An additional 10 (7 in January, 3 in December) similar vulnerabilities have been

disclosed and patched by Microsoft– Symantec has seen relatively low usage (peak rate: 8,000 attacks a day)

RAID 2010 - The New Generation of Targeted Attacks 47

Page 48: The New Generation of Targeted Attacks

Trojan.Hydraq

48

RAID 2010 - The New Generation of Targeted Attacks

rasmon.dll

Page 49: The New Generation of Targeted Attacks

Trojan.HydraqNotable characteristics

• Code is obfuscated using spaghetti code

RAID 2010 - The New Generation of Targeted Attacks 49

rasmon.dll

Page 50: The New Generation of Targeted Attacks

Trojan.HydraqSpaghetti Code

RAID 2010 - The New Generation of Targeted Attacks 50

A

B

C

D

E

A

B

C

D

E

rasmon.dll

Page 51: The New Generation of Targeted Attacks

Trojan.HydraqNotable characteristics

• Code is obfuscated using spaghetti code • Stays resident by adding itself under the netsvc service group

– Running under svchost.exe

• Drops a Windows logon password stealer that hides itself• Downloads a modified version of VNC remote control software • Instructed to download additional target-specific malicious

components

RAID 2010 - The New Generation of Targeted Attacks 51

rasmon.dll

Page 52: The New Generation of Targeted Attacks

Trojan.HydraqNetwork Communication

• Contacts the command and control server over port 443. – Traffic is not legitimate SSL traffic, but a custom protocol

• Network traffic is trivially encoded– Header data is XOR’d or NOT’d

– Data is XOR’d using a random key generated at runtime

• Header data contains 23 hardcoded backdoor commands– Read and write to the file system and registry

– Control processes

– Download and execute additional files

– Clear system logs

– Shutdown and restart the system

– Uninstall the threatRAID 2010 - The New Generation of Targeted Attacks 5

2

rasmon.dll