learning from the bad guys is learning from the best

24
Learning from the bad guys is learning from the best A practical overview on how the bad guys adopt and circumvent security initiatives Commercial – in - Confidence Alex Shipp Imagineer

Upload: morela

Post on 23-Feb-2016

54 views

Category:

Documents


0 download

DESCRIPTION

A practical overview on how the bad guys adopt and circumvent security initiatives. Learning from the bad guys is learning from the best. Alex Shipp Imagineer. Commercial – in - Confidence. Zeus. One of the most successful rootkits Features - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Learning from the bad guys is learning from the best

Learning from the bad guys is learning from the best

A practical overview on how the bad guys adopt and circumvent security initiatives

Commercial – in - Confidence

Alex ShippImagineer

Page 2: Learning from the bad guys is learning from the best

Commercial – in - Confidence

Zeus One of the most successful rootkits Features

It steals user private and confidential information (form grabber)

can inject arbitrary HTML code into any website (also encrypted websites)

can steal certificates will take screenshots to defeat virtual keyboards backconnect feature (SOCKS, BackConnect, VNC) Everything is encrypted

Page 3: Learning from the bad guys is learning from the best

Commercial – in - Confidence

Zeus v2.0

Enhanced Zeus v2 core engine Able to infect Mozilla Firefox Able to infect Windows Vista and

Windows 7▪ They do everything in user-mode (!)

New Encryption method

Details in the TrustDefender Labs report

Page 4: Learning from the bad guys is learning from the best

Commercial – in - Confidence

Zeus plugins

Zeus supports a plugin style infrastructure New BackConnect mechanism▪ E.g. Real-time notification via IM once a

victim is online▪ SOCKS / VNC works even behind NAT

Extensive Javascript engine that can be plugged into Zeus v1 or Zeus v2

Page 5: Learning from the bad guys is learning from the best

Commercial – in - Confidence

Javascript Engine Dramatically increased functionality with

javascript code where they can harvest any challenge/response and/or token

values in real-time and in a more interactive way.

Allows bypass of nearly all challenge mechanisms (e.g. SMS/email/VRU OOB, token, secret

questions/answers, elaborate challenge/response)

Page 6: Learning from the bad guys is learning from the best

Commercial – in - Confidence

Javascript Engine Observations

No “static” HTML injections anymore Nothing happens until after the login Dynamic connection to C&C server▪ Send/receive data within one webpage▪ transparent to the Webbrowser

Dynamic content delivery▪ E.g. After compromise, they return “24h

maintenance” page

But let’s have a look

Page 7: Learning from the bad guys is learning from the best

Commercial – in - Confidence

Login page (unmodified)

Page 8: Learning from the bad guys is learning from the best

Commercial – in - Confidence

Account verification

Page 9: Learning from the bad guys is learning from the best

Commercial – in - Confidence

Cover your tracks

Page 10: Learning from the bad guys is learning from the best

Commercial – in - Confidence

WesCorp login

Page 11: Learning from the bad guys is learning from the best

Commercial – in - Confidence

Ok, I have to use the token (nothing ususual)

Page 12: Learning from the bad guys is learning from the best

Commercial – in - Confidence

Authorizing... (60 down to 0)

Page 13: Learning from the bad guys is learning from the best

Commercial – in - Confidence

Ups... timeout

Page 14: Learning from the bad guys is learning from the best

Commercial – in - Confidence

After restart, the machine is gone

Page 15: Learning from the bad guys is learning from the best

Commercial – in - Confidence

Javascript Engine

As well as manipulating user-supplied content, they can also access system supplied content.

Bad news if you “encrypt” the password on the client side Zeus can just inject code into your

JavaScript files (!)

Page 16: Learning from the bad guys is learning from the best

Commercial – in - Confidence

Javascript Engine

Watch the download of the loginPin.js

And once it’s downloaded...

Page 17: Learning from the bad guys is learning from the best

Commercial – in - Confidence

Completely transparent

Page 18: Learning from the bad guys is learning from the best

Commercial – in - Confidence

Device fingerprinting won’t help BackConnect feature via SOCKS or

VNC Undermines any device fingerprinting

Page 19: Learning from the bad guys is learning from the best

Commercial – in - Confidence

How is Zeus distributed? Drive-by attacks

PDF, Flash or any othersoftware

Phishing attacks

Heavily geo baseddistribution

This is done via a flash object that calls URLMON.DLL.URLDownloadToFileA to save http://<<hostname>>/l.php?i=18 locally to pdfupd.exe and then execute it with WinExec

More details in the next TrustDefender Labs Report

Page 20: Learning from the bad guys is learning from the best

Commercial – in - Confidence

Mebroot is by far the most successful rootkit that is able to stay under the radar

Technically sophisticated, but also very clever We know that they could infect much more

machines, but don’t do so

Bad news: They have a comprehensive javascript engine as well However not used yet (AFAWK)

What is mebroot doing?

Page 21: Learning from the bad guys is learning from the best

Commercial – in - Confidence

Sizzler CSS Selector Engine

If it looks scary, it is scary Watch out for simple device authentication

What is mebroot doing?

Page 22: Learning from the bad guys is learning from the best

Commercial – in - Confidence

Phishing still works (!) Real world example

Bank uses transactional 2FA hardware tokens Phishing site asks for login credentials +

private phone number Fraudsters ring the customer and tell him that

his account got compromised (which is true!) and tell him that in order to get it reconnected, they should enter the following number into their token and confirm the reply!

Phishing with transactional 2FA

Page 23: Learning from the bad guys is learning from the best

Commercial – in - Confidence

... is the R&D arm of TrustDefender TrustDefender is a online-transaction

security solution providing Real-time customer endpoint risk-

assessment & protection for online transactions

More info http://www.trustdefender.com/blog

TrustDefender Labs

Page 24: Learning from the bad guys is learning from the best

Commercial – in - Confidence

Bad guys adopt heavily Protect all parts of the chain.

If one breaks, the chain is broken

Questions?