Peeling The Layers Of Vawtrak
|
|
|
- Silas Summers
- 10 years ago
- Views:
Transcription
1 Peeling The Layers Of Vawtrak October 20-21, 2015 Raul Alvarez Copyright Fortinet Inc. All rights reserved.
2 About Me
3 About Me Senior Security Fortinet 21 published articles in Virus Bulletin Regular contributor in our company blog 3
4 Agenda
5 Agenda Ø Ø Ø Vawtrak and Tor DGA Tor Tor2Web Vawtrak and its Layers Different features Different layers Multiple armoring strategies within the layers Vawtrak and Volatility Using Volatility Malware as a platform 5
6 Banking Malware
7 Banking Malware and C&C Binary updates/enhancements Operational commands Storage of stolen banking credentials Latest configuration 7
8 Banking Malware Protection Strategy Binary armoring to avoid detection Continuous monitoring of AV detection Using DGA to minimize takedowns Hiding its C&C via Tor 8
9 Vawtrak
10 What is Vawtrak? Also known as Neverquest A banking trojan Uses layering techniques similar to a Matryoshka doll Uses multiple armoring strategies Uses DGA Uses Tor2web 10
11 Vawtrak and Tor
12 DGA Hiding is not enough
13 DGA Ø Ø Ø Ø Ø DGA Domain name Generation Algorithm Also called PrDGA (Pseudo-random DGA) Generates a binary seed Can be a constant value Can be generated from the current time and date Generates a string of random alpha-numeric characters Adds a variation of TLDs, such as com, org, info 13
14 How DGA works Ø Ø Ø Ø Ø Client-side and Server-side uses the same algorithm The server-side registers one or more generated domain names The client-side tries all possible combination of generated domain names The client-side establishes connection to the server-side The server-side un-registers the registered domain to avoid detection 14
15 C&C
16 C&C Not a fixed string Derived from a DWORD value Controlled by 40-byte XOR key Different variants, different domains 16
17 Vawtrak s DGA seed byte generator alphanumeric generator 17
18 Different variants, different domains sample #1 18
19 Different variants, different domains sample #2 19
20 Different variants, different domains sample #3 20
21 Different variants, different domains sample #4 21
22 Tor2Web C&C
23 Vawtrak s DGA 23
24 Tor2Web C&C sample #2 24
25 Tor2Web C&C sample #4 25
26 How Tor Works
27 How Tor Works Image taken from torproject.org 27
28 How Tor Works Image taken from torproject.org 28
29 How Tor Works Image taken from torproject.org 29
30 Tor and Hidden Services
31 Hidden Service: Deep Web Radio 31
32 Hidden Service: Electronic Store 32
33 Hidden Service: Online News 33
34 Hidden Service: Free 34
35 Hidden Service: File Storage 35
36 Hidden Service: Tor Supermarket 36
37 Hidden Service: Chat Rooms 37
38 Hidden Service: The Hidden Wiki 38
39 And so much more q q q q q q q q q q /Messaging Books Financial Audio/Music Domain/Hosting Security Blogs Social networks Forums And so much more 39
40 Tor2Web
41 Tor2Web Ø Browsing hidden services via a normal web browser 41
42 Tor2Web Ø Header page 42
43 Can Vawtrak really use DGA to create a randomized Tor C&Cs?
44 Tor2Web C&C Pre-set.onion domains Pseudorandom DGA will not work Tor2Web C&C is not so random 44
45 Tor2Web C&C sample #2 45
46 Tor2Web C&C otsxxxxgxbcwvrqs 4bpxxxxz4e7n6gnb bc3xxxxf4m3lnw4o sample #4 46
47 Vawtrak and its Layers
48 Armoring Strategies Within The Layers Anti-Emulator Anti-Debugger Anti-Analysis Encryption/ Decryption Garbage Collection Hashing Compression/ Decompression Code injection 48
49 Layers of Vawtrak Layer 1 Anti-Emulator Anti-Debugger Anti-Analysis decryption decoy Layer 2 (encrypted) overlay decryption garbage collection Layer 3 decrypted + compressed Layer 2 Decompression RtlDecompressBuffer Layer 3 decompressed Self-code Injection Anti-Antimalware Layer 3 resource section hashing for validity decryption Layer 4 Layer 2 49
50 Layer 1: Anti-Emulator Layer 1 Anti-Emulator Anti-Debugger Anti-Analysis decryption decoy Layer 2 (encrypted) overlay decryption garbage collection Layer 3 decrypted + compressed Layer 2 Decompression RtlDecompressBuffer Layer 3 decompressed Self-code Injection Anti-Antimalware Layer 3 resource section hashing for validity decryption Layer 4 Layer 2 50
51 Layer 1: Anti-Emulator Hundreds of assembly language instruction 0x00 ADD BYTE PTR DS:[eax],al 51
52 Layer 1: Anti-Debugger Layer 1 Anti-Emulator Anti-Debugger Anti-Analysis decryption decoy Layer 2 (encrypted) overlay decryption garbage collection Layer 3 decrypted + compressed Layer 2 Decompression RtlDecompressBuffer Layer 3 decompressed Self-code Injection Anti-Antimalware Layer 3 resource section hashing for validity decryption Layer 4 Layer 2 52
53 Layer 1: Anti-Debugger PEB(Process Environment Block) BeingDebugged ImageBase FFFFFFFF SpareBool Mutant Stage 1 Stage 2 53
54 Layer 1: Anti-Analysis Layer 1 Anti-Emulator Anti-Debugger Anti-Analysis decryption decoy Layer 2 (encrypted) overlay decryption garbage collection Layer 3 decrypted + compressed Layer 2 Decompression RtlDecompressBuffer Layer 3 decompressed Self-code Injection Anti-Antimalware Layer 3 resource section hashing for validity decryption Layer 4 Layer 2 54
55 Layer 1: Anti-Analysis CreateFileA API using RETN 55
56 Layer 1: Decryption Layer 1 Anti-Emulator Anti-Debugger Anti-Analysis decryption decoy Layer 2 (encrypted) overlay decryption garbage collection Layer 3 decrypted + compressed Layer 2 Decompression RtlDecompressBuffer Layer 3 decompressed Self-code Injection Anti-Antimalware Layer 3 resource section hashing for validity decryption Layer 4 Layer 2 56
57 Layer 1: Decryption filename Layer 2 executable file decoy file 57
58 Layer 2: Decryption + Garbage Collection Layer 1 Anti-Emulator Anti-Debugger Anti-Analysis decryption decoy Layer 2 (encrypted) overlay decryption garbage collection Layer 3 decrypted + compressed Layer 2 Decompression RtlDecompressBuffer Layer 3 decompressed Self-code Injection Anti-Antimalware Layer 3 resource section hashing for validity decryption Layer 4 Layer 2 58
59 Layer 2: Decryption + Garbage Collection garbage code relevant code decryption algorithm decrypted/compressed executable 59
60 Layer 2: Decompression Layer 1 Anti-Emulator Anti-Debugger Anti-Analysis decryption decoy Layer 2 (encrypted) overlay decryption garbage collection Layer 3 decrypted + compressed Layer 2 Decompression RtlDecompressBuffer Layer 3 decompressed Self-code Injection Anti-Antimalware Layer 3 resource section hashing for validity decryption Layer 4 Layer 2 60
61 Layer 2: Decompression RtlDecompressBuffer RtlDecompressBuffer( 0x102,0x1744e8, 0x30e00, 0x1436d0, 0x2F9AE, 0x12fcc4) Syntax: NTSTATUS RtlDecompressBuffer( _In_ USHORT CompressionFormat, _Out_ PUCHAR UncompressedBuffer, _In_ ULONG UncompressedBufferSize, _In_ PUCHAR CompressedBuffer, _In_ ULONG CompressedBufferSize, _Out_ PULONG FinalUncompressedSize ); compressed decompressed 61
62 Layer 2: Self-code Injection Layer 1 Anti-Emulator Anti-Debugger Anti-Analysis decryption decoy Layer 2 (encrypted) overlay decryption garbage collection Layer 3 decrypted + compressed Layer 2 Decompression RtlDecompressBuffer Layer 3 decompressed Self-code Injection Anti-Antimalware Layer 3 resource section hashing for validity decryption Layer 4 Layer 2 62
63 Layer 2: Self-code Injection Steps: 1. Allocates new memory(0x8a0000) 2. Copies the decompressed Layer 3 to 0x8a Zeroes out the original location(0x400000) of Layer 2 4. Copies Layer 3 from 0x8a0000 to 0x Fixes IAT of Layer 3 in 0x Executes Layer 3 63
64 Layer 3: Anti-antimalware Layer 1 Anti-Emulator Anti-Debugger Anti-Analysis decryption decoy Layer 2 (encrypted) overlay decryption garbage collection Layer 3 decrypted + compressed Layer 2 Decompression RtlDecompressBuffer Layer 3 decompressed Self-code Injection Anti-Antimalware Layer 3 resource section hashing for validity decryption Layer 4 Layer 2 64
65 Layer 3: Anti-antimalware 1. Traverses the following folders: Program Files Program Files (x86) %AppData% 2. Creates hash value for the antimalware pathname 3. Creates registry key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows \Safer\CodeIdentifi ers\0\paths\[hash value] SaferFlags = 0 ItemData = pathname 65
66 Layer 3: Anti-antimalware 66
67 Layer 3: Generating Layer 4 Layer 1 Anti-Emulator Anti-Debugger Anti-Analysis decryption decoy Layer 2 (encrypted) overlay decryption garbage collection Layer 3 decrypted + compressed Layer 2 Decompression RtlDecompressBuffer Layer 3 decompressed Self-code Injection Anti-Antimalware Layer 3 resource section hashing for validity decryption Layer 4 Layer 2 67
68 Layer 3: Generating Layer 4 1. Copies RT_RCDATA from.rscr section to the heap memory 2. Calculates the hash (0x24D2EDEA) of the raw data 3. Decrypts the raw data 4. Calculates the hash(0x ) of the decrypted data(dll) 5. Creates random filename +.dat 6. Copies the decrypted data from heap memory to newly created file (Layer 4) 7. Creates new startup registry key for Layer 4(DLL) 68
69 Demo
70
71 Decoy File 71
72 Vawtrak and Volatility
73 Volatility 73
74 psxview c:\v24 --profile=winxpsp2x86 -f vawtrak.vmem psxview Volatility Foundation Volatility Framework 2.4 Offset(P) Name PID pslist psscan thrdproc pspcid csrss session deskth x01b8db28 mainout-crypted 224 True True True True True True True 0x019d4c90 cmd.exe 1420 True True True True True True True 0x01aa01d8 lsass.exe 680 True True True True True True True 0x wscntfy.exe 1672 True True True True True True True 0x0193c8d8 jusched.exe 1832 True True True True True True True 0x018ebda0 winlogon.exe 624 True True True True True True True 0x01aa4a28 svchost.exe 1208 True True True True True True True 0x01aaada0 svchost.exe 1044 True True True True True True True 0x018deac0 explorer.exe 1692 True True True True True True True <<cut>> 74
75 malfind c:\v24 --profile=winxpsp2x86 -f vawtrak.vmem malfind -p 224 Volatility Foundation Volatility Framework 2.4 Process: mainout-crypted Pid: 224 Address: 0x Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE Flags: CommitCharge: 1, MemCommit: 1, PrivateMemory: 1, Protection: 6 0x ec b ac USWV...$... 0x c d c fc...$...$. 0x c e f...f..$... 0x e c b 8c n..$8...$8 0x x x x x ec x89000a 8b8424ac x c78424d x89001c c78424fc x c784249e f6e 0x c x89003c 8b 0x89003d 8c2438 PUSH EBP PUSH EBX PUSH EDI PUSH ESI SUB ESP, 0x198 MOV EAX, [ESP+0x1ac] MOV DWORD [ESP+0xd4], 0x0 MOV DWORD [ESP+0xfc], 0x0 MOV WORD [ESP+0x9e], 0x6e0f MOV DWORD [ESP+0x138], 0x1 DB 0x8b MOV [EAX+EDI], FS 75
76 yarascan c:\v24 --profile=winxpsp2x86 -f vawtrak.vmem yarascan -p yara-rules="mz Rule: r1 Owner: Process mainout-crypted Pid 224 0x77dd0000 4d 5a ff ff MZ... 0x77dd0010 b x77dd x77dd f x77dd0040 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd !..L.!Th 0x77dd f d e 6e 6f is.program.canno 0x77dd e e f t.be.run.in.dos. 0x77dd0070 6d 6f e 0d 0d 0a mode...$... 0x77dd0080 a8 6a e2 68 ec 0b 8c 3b ec 0b 8c 3b ec 0b 8c 3b.j.h...;...;...; 0x77dd0090 2f 04 d1 3b eb 0b 8c 3b 2f b e1 0b 8c 3b /..;...;/..;...; 0x77dd00a0 3d 07 d3 3b ee 0b 8c 3b ec 0b 8d 3b 54 0a 8c 3b =..;...;...;T..; 0x77dd00b0 2f 04 d0 3b ed 0b 8c 3b 2f 04 d2 3b ed 0b 8c 3b /..;...;/..;...; 0x77dd00c0 2f 04 ec 3b f1 0b 8c 3b 2f 04 d3 3b 7e 0b 8c 3b /..;...;/..;~..; 0x77dd00d0 2f 04 d6 3b ed 0b 8c 3b ec 0b 8c 3b /..;...;Rich...; 0x77dd00e x77dd00f c PE..L...q..I... Rule: r1 Owner: Process mainout-crypted Pid 224 0x77de8218 4d 5a 75 1d 8b 48 3c 8d b da d2 0x77de c f 94 c2 8b c2 5b 5d c2 04.<.PE...[].. 0x77de c0 eb f d 5a MZ... <<next slide>> 76
77 yarascan <<continuation>> 0x77de8248 8b ff 55 8b ec 51 8b f b 0x77de8258 7d fc f d 45 0x77de ff 75 0c ff 15 a8 11 dd f8 0x77de8278 ff f f x77de a ff 75 0c ff 15 0c 12 dd 77 8b d8 0x77de8298 3b de a ff dd 77 0x77de82a ff dd b 0x77de82b b 45 fc 5f 5e 5b c9 c2 0c x77de82c a a ff 75 0x77de82d8 0c ff dd 77 8b d8 83 fb ff ff 75 0x77de82e a 02 e8 57 ff ff ff fc ff x77de82f8 10 dd 77 eb bf ff dd 77 e9 e x77de b ff 55 8b ec 81 ec Rule: r1 Owner: Process mainout-crypted Pid 224 0x77de8240 4d 5a b ff 55 8b ec 51 8b 45 0x77de f b 7d fc x77de8260 0f d ff 75 0c x77de8270 ff 15 a8 11 dd f8 ff f x77de f a ff 75 0c 0x77de8290 ff 15 0c 12 dd 77 8b d8 3b de a 0x77de82a ff dd ff x77de82b0 dd b b 45 fc 5f 0x77de82c0 5e 5b c9 c2 0c a a..U..Q.E.SV3.HW. }..u.tgh..y...e.p.u..u...w....e.t.9u...y...v VVj.V.u...w.. ;.tavvvj.s...w S.G...4..w9w.tF. E...E._^[...Vh...j.Vj.h...u...w...t..u.Sj..W...S.E...4..w...T..w......U...P... MZ...U..Q.E.SV3.HW.}..u.tgH..Y...E.P.u..u....w...E.t.9u...Y...VVVj.V.u....w..;.taVVVj.S...wS.G...4..w9w.tF.E...E._ ^[...Vh...j.Vj 77
78 yarascan Rule: r1 Owner: Process mainout-crypted Pid 224 0x d 5a ff ff MZ... 0x b x x e x e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd !..L.!Th 0x f d e 6e 6f is.program.canno 0x e e f t.be.run.in.dos. 0x d 6f e 0d 0d 0a mode...$... 0x f d7 9a 16 0e b9 c9 16 0e b9 c9 16 0e b9 c9 Ro... 0x f 76 2c c9 17 0e b9 c9 16 0e b9 c9 15 0e b9 c9.v,... 0x004000a0 1f 76 2a c9 1b 0e b9 c9 16 0e b8 c9 4a 0e b9 c9.v*...j... 0x004000b c9 1b 0e b9 c c9 17 0e b9 c9 yx...yx#... 0x004000c c9 17 0e b9 c e b9 c9 yx$...rich... 0x004000d x004000e c PE..L... 0x004000f0 6e 22 2c e n",r... 78
79 yarascan Rule: r1 Owner: Process mainout-crypted Pid 224 0x001436d3 4d 5a ff ff MZ x001436e3 b d e8 00 0c 0e 0x001436f3 00 ba 0e 00 b4 09 cd 21 b c cd !...L.!Th 0x f d e is..program..can 0x e 6f e e 20 not..be.run.i.n. 0x f d 6f e 0d 0d 0a DOS.mo.de...$.. 0x f d7 9a 16 0e b9 c f 76 2c c9.ro...a...v,. 0x b f 2a c9 1b 02 0f b8 c9 4a 11...*...J. 0x f yx...yx#..'yx$ 0x ab c..Ric.h.3..PE..L 0x e 22 2c e b...n",R... 0x a e e 10...B..F...~. 0x b 05 cc x001437a a 00 9a f4 5f c7 02 0f 81...`..._... 0x001437b c c...A..h\... 0x001437c c d E.P... 79
80 yarascan Rule: r1 Owner: Process mainout-crypted Pid 224 0x001744e8 4d 5a ff ff MZ... 0x001744f8 b x x e x e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd !..L.!Th 0x f d e 6e 6f is.program.canno 0x e e f t.be.run.in.dos. 0x d 6f e 0d 0d 0a mode...$... 0x f d7 9a 16 0e b9 c9 16 0e b9 c9 16 0e b9 c9 Ro... 0x f 76 2c c9 17 0e b9 c9 16 0e b9 c9 15 0e b9 c9.v,... 0x f 76 2a c9 1b 0e b9 c9 16 0e b8 c9 4a 0e b9 c9.v*...j... 0x c9 1b 0e b9 c c9 17 0e b9 c9 yx...yx#... 0x001745a c9 17 0e b9 c e b9 c9 yx$...rich... 0x001745b x001745c c PE..L... 0x001745d8 6e 22 2c e n",r... 80
81 yarascan Rule: r1 Owner: Process mainout-crypted Pid 224 0x008a0000 4d 5a ff ff MZ... 0x008a0010 b x008a x008a e x008a0040 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd !..L.!Th 0x008a f d e 6e 6f is.program.canno 0x008a e e f t.be.run.in.dos. 0x008a0070 6d 6f e 0d 0d 0a mode...$... 0x008a f d7 9a 16 0e b9 c9 16 0e b9 c9 16 0e b9 c9 Ro... 0x008a0090 1f 76 2c c9 17 0e b9 c9 16 0e b9 c9 15 0e b9 c9.v,... 0x008a00a0 1f 76 2a c9 1b 0e b9 c9 16 0e b8 c9 4a 0e b9 c9.v*...j... 0x008a00b c9 1b 0e b9 c c9 17 0e b9 c9 yx...yx#... 0x008a00c c9 17 0e b9 c e b9 c9 yx$...rich... 0x008a00d x008a00e c PE..L... 0x008a00f0 6e 22 2c e n",r... 81
82 yarascan Rule: r1 Owner: Process mainout-crypted Pid 224 0x00aaa668 4d 5a ff ff MZ... 0x00aaa678 b x00aaa x00aaa d x00aaa6a8 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd !..L.!Th 0x00aaa6b f d e 6e 6f is.program.canno 0x00aaa6c e e f t.be.run.in.dos. 0x00aaa6d8 6d 6f e 0d 0d 0a mode...$... 0x00aaa6e8 8b e6 cf f4 67 b5 cf f4 67 b5 cf f4 67 b5...g...g...g. 0x00aaa6f8 3e 32 a8 b5 d6 f4 67 b5 3e 32 aa b5 c4 f4 67 b5 >2...g.>2...g. 0x00aaa708 3e 32 a9 b5 95 f4 67 b5 c6 8c f4 b5 ca f4 67 b5 >2...g...g. 0x00aaa718 cf f4 66 b5 9c f4 67 b5 54 1f a8 b5 cd f4 67 b5..f...g.t...g. 0x00aaa f ae b5 ce f4 67 b5 54 1f ab b5 ce f4 67 b5 T...g.T...g. 0x00aaa cf f4 67 b c Rich..g.PE..L... 0x00aaa e1 2d e B.-R...! 0x00aaa758 0b
83 yarascan Libraries (DLL) loaded in the memory also have the MZ header. 83
84 Malware As A Platform
85 Malware As A Platform vawtrak vawtrak mainoutcrypted-5.exe decompressed executable encrypted overlay decrypted overlay compressed exe decompressed executable decompressed executable Diana-23.jpg mainoutcrypted-5.exe resource section payload executable 85
86
Detecting Malware With Memory Forensics. Hal Pomeranz SANS Institute
Detecting Malware With Memory Forensics Hal Pomeranz SANS Institute Why Memory Forensics? Everything in the OS traverses RAM Processes and threads Malware (including rootkit technologies) Network sockets,
Fighting malware on your own
Fighting malware on your own Vitaliy Kamlyuk Senior Virus Analyst Kaspersky Lab [email protected] Why fight malware on your own? 5 reasons: 1. Touch 100% of protection yourself 2. Be prepared
TitanMist: Your First Step to Reversing Nirvana TitanMist. mist.reversinglabs.com
TitanMist: Your First Step to Reversing Nirvana TitanMist mist.reversinglabs.com Contents Introduction to TitanEngine.. 3 Introduction to TitanMist 4 Creating an unpacker for TitanMist.. 5 References and
Visa Smart Debit/Credit Certificate Authority Public Keys
CHIP AND NEW TECHNOLOGIES Visa Smart Debit/Credit Certificate Authority Public Keys Overview The EMV standard calls for the use of Public Key technology for offline authentication, for aspects of online
EMV (Chip-and-PIN) Protocol
EMV (Chip-and-PIN) Protocol Märt Bakhoff December 15, 2014 Abstract The objective of this report is to observe and describe a real world online transaction made between a debit card issued by an Estonian
Hide and seek - how targeted attacks hide behind clean applications Szappanos Gábor
Hide and seek - how targeted attacks hide behind clean applications Szappanos Gábor Principal Malware Researcher 1 Honourable mentions: 2010. Stuxnet digitally signed drivers: stolen certificate June 2012.
Efficient Program Exploration by Input Fuzzing
Efficient Program Exploration by Input Fuzzing towards a new approach in malcious code detection Guillaume Bonfante Jean-Yves Marion Ta Thanh Dinh Université de Lorraine CNRS - INRIA Nancy First Botnet
SERVER CERTIFICATES OF THE VETUMA SERVICE
Page 1 Version: 3.5, 4.11.2015 SERVER CERTIFICATES OF THE VETUMA SERVICE 1 (18) Page 2 Version: 3.5, 4.11.2015 Table of Contents 1. Introduction... 3 2. Test Environment... 3 2.1 Vetuma test environment...
TCG Algorithm Registry. Family 2.0" Level 00 Revision 01.15. April 17, 2014. Published. Contact: [email protected].
Family 2.0" Level 00 Revision 01.15 April 17, 2014 Published Contact: [email protected] TCG TCG Published Copyright TCG 2014 Disclaimers, Notices, and License Terms THIS SPECIFICATION IS
Title: Bugger The Debugger - Pre Interaction Debugger Code Execution
White Paper Title: Bugger The Debugger Pre Interaction Debugger Code Execution Prepared by: Brett Moore Network Intrusion Specialist, CTO SecurityAssessment.com Date: April 2005 Abstract The use of debuggers
SERVER CERTIFICATES OF THE VETUMA SERVICE
Page 1 Version: 3.4, 19.12.2014 SERVER CERTIFICATES OF THE VETUMA SERVICE 1 (18) Page 2 Version: 3.4, 19.12.2014 Table of Contents 1. Introduction... 3 2. Test Environment... 3 2.1 Vetuma test environment...
Egil Aspevik Martinsen Polymorphic Viruses. Material from Master Thesis «Detection of Junk Instructions in Malicious Software»
Egil Aspevik Martinsen Polymorphic Viruses Material from Master Thesis «Detection of Junk Instructions in Malicious Software» 1 History 1982 Elk Cloner Brain 1987 1260 1992 Ply 1997 Melissa ILOVEYOU Zmist
1. General function and functionality of the malware
1. General function and functionality of the malware The malware executes in a command shell, it begins by checking to see if the executing file contains the MZP file extension, and then continues to access
Slaying the Virtual Memory Monster - Part II
1 of 8 04/19/2012 07:53 PM Slaying the Virtual Memory Monster - Part II Reed Robison 1 Oct 2007 4:46 PM 17 Someday I ll learn to write a simple blog post a couple of paragraphs about something cool and
Inside a killer IMBot. Wei Ming Khoo University of Cambridge 19 Nov 2010
Do you? or Inside a killer IMBot Wei Ming Khoo University of Cambridge 19 Nov 2010 Background Tracking a botnet propagating over Skype & Yahoo IM. Bait is Foto Exploits social connectivity (friend
Preface. DirX Document Set
Preface DirX Document Set Preface The DirX Troubleshooting Guide describes how to solve problems that can occur in DirX installations. The book is organized as follows: Chapter 1 provides a summary of
[ X OR DDoS T h r e a t A d v i sory] akamai.com
[ X OR DDoS T h r e a t A d v i sory] akamai.com What is the XOR DDoS threat The XOR DDoS botnet has produced DDoS attacks from a few Gbps to 150+ Gbps The gaming sector has been the primary target, followed
Outlook 2003/2007 NK2 File Format and Developer Guidelines
Outlook 2003/2007 NK2 File Format and Developer Guidelines This post explains how Microsoft Office Outlook 2007 interacts with the nickname cache file, also known as the.nk2 file. The.nk2 file is where
KALE: A High-Degree Algebraic-Resistant Variant of The Advanced Encryption Standard
KALE: A High-Degree Algebraic-Resistant Variant of The Advanced Encryption Standard Dr. Gavekort c/o Vakiopaine Bar Kauppakatu 6, 41 Jyväskylä FINLAND [email protected] Abstract. We have discovered that the
Advanced Encryption Standard by Example. 1.0 Preface. 2.0 Terminology. Written By: Adam Berent V.1.7
Written By: Adam Berent Advanced Encryption Standard by Example V.1.7 1.0 Preface The following document provides a detailed and easy to understand explanation of the implementation of the AES (RIJNDAEL)
Advanced Encryption Standard by Example. 1.0 Preface. 2.0 Terminology. Written By: Adam Berent V.1.5
Written By: Adam Berent Advanced Encryption Standard by Example V.1.5 1.0 Preface The following document provides a detailed and easy to understand explanation of the implementation of the AES (RIJNDAEL)
This report is a detailed analysis of the dropper and the payload of the HIMAN malware.
PAGE 5 Check Point Malware Research Group HIMAN Malware Analysis December 12, 2013 Researcher: Overview This report is a detailed analysis of the dropper and the payload of the HIMAN malware. This malware
esrever gnireenigne tfosorcim seiranib
esrever gnireenigne tfosorcim seiranib Alexander Sotirov [email protected] CanSecWest / core06 Reverse Engineering Microsoft Binaries Alexander Sotirov [email protected] CanSecWest / core06 Overview
Bypassing Anti- Virus Scanners
Bypassing Anti- Virus Scanners Abstract Anti-Virus manufacturers nowadays implements more and more complex functions and algorithms in order to detect the latest and newest viruses along with their variants.
Persist It Using and Abusing Microsoft s Fix It Patches
Persist It Using and Abusing Microsoft s Fix It Patches Jon Erickson : isight Partners : [email protected] Abstract: Microsoft has often used Fix it patches, which are a subset of Application
VISA SECURITY ALERT December 2015 KUHOOK POINT OF SALE MALWARE. Summary. Distribution and Installation
VISA SECURITY ALERT December 2015 KUHOOK POINT OF SALE MALWARE Distribution: Merchants, Acquirers Who should read this: Information security, incident response, cyber intelligence staff Summary Kuhook
Malware Analysis Report
NSHC 2014. 02. 20 Malware Analysis Report [ Xtreme RAT ] A server program of Xtreme RAT, a type of RAT (Remote Administration Tool), is distributed recently. The system which is infected with the server
Software Fingerprinting for Automated Malicious Code Analysis
Software Fingerprinting for Automated Malicious Code Analysis Philippe Charland Mission Critical Cyber Security Section October 25, 2012 Terms of Release: This document is approved for release to Defence
CROSS REFERENCE. Cross Reference Index 110-122. Cast ID Number 110-111 Connector ID Number 111 Engine ID Number 112-122. 2015 Ford Motor Company 109
CROSS REFERENCE Cross Reference Index 110-122 Cast ID Number 110-111 Connector ID Number 111 112-122 2015 Ford Motor Company 109 CROSS REFERENCE Cast ID Number Cast ID Ford Service # MC Part # Part Type
Absolute Backdoor Revisited. Vitaliy Kamlyuk, Kaspersky Lab Sergey Belov, Kaspersky Lab Anibal Sacco, Cubica Labs
Absolute Backdoor Revisited Vitaliy Kamlyuk, Kaspersky Lab Sergey Belov, Kaspersky Lab Anibal Sacco, Cubica Labs BlackHat, Las Vegas August, 2014 What is Computrace? Computrace is an Anti-Theft software
The Value of Physical Memory for Incident Response
The Value of Physical Memory for Incident Response MCSI 3604 Fair Oaks Blvd Suite 250 Sacramento, CA 95864 www.mcsi.mantech.com 2003-2015 ManTech Cyber Solutions International, All Rights Reserved. Physical
Heap-based Buffer Overflow Vulnerability in Adobe Flash Player
Analysis of Zero-Day Exploit_Issue 03 Heap-based Buffer Overflow Vulnerability in Adobe Flash Player CVE-2014-0556 20 December 2014 Table of Content Overview... 3 1. CVE-2014-0556 Vulnerability... 3 2.
Attacking x86 Windows Binaries by Jump Oriented Programming
Attacking x86 Windows Binaries by Jump Oriented Programming L. Erdődi * * Faculty of John von Neumann, Óbuda University, Budapest, Hungary [email protected] Abstract Jump oriented programming
CANape CCP Communication Version 1.1 02/06/03 Application Note AN-AMC-1-100
Version 1.1 02/06/03 Application Note AN-AMC-1-100 Author(s) Restrictions Abstract Kim Lemon Public Document This application note concentrates on explaining the fundamental concepts about CANape and CCP
A Museum of API Obfuscation on Win32
A Museum of API Obfuscation on Win32 Masaki Suenaga Senior Software Engineer Contents Abstract... 1 File Image vs. Memory Image... 2 API Analysis... 4 Generating Memory Dumps... 5 Runtime API Address Resolution...
HTC Windows Phone 7 Arbitrary Read/Write of Kernel Memory 10/11/2011
MWR InfoSecurity Advisory HTC Windows Phone 7 Arbitrary Read/Write of Kernel Memory 10/11/2011 Package Name Date 10/11/2011 Affected Versions HTC Windows Phone 7 Phones HTC HD7 confirmed to be vulnerable.
ZeroAccess. James Wyke. SophosLabs UK
ZeroAccess James Wyke SophosLabs UK Abstract ZeroAccess is a sophisticated kernel-mode rootkit that is rapidly becoming one of the most widespread threats in the current malware ecosystem. ZeroAccess ability
Removing Sentinel SuperPro dongle from Applications and details on dongle way of cracking Shub-Nigurrath of ARTeam Version 1.
Removing Sentinel SuperPro dongle from Applications Shub-Nigurrath of ARTeam Version 1.0 September 2006 1. Abstract... 2 2. Possible approaches: emulations vs simulation... 3 2.1. How a dongle works...
Configurable Events for APC Network Management Card
Configurable s for APC Network Management Card Table of Contents Silcon DP300E Series 3 Smart-UPS / Matrix 7 Symmetra 9 Symmetra 3-Phase 13 Environmental Monitor 21 Configurable s for APC Network Management
SL-8800 HDCP 2.2 and HDCP 1.x Protocol Analyzer for HDMI User Guide
SL-8800 HDCP 2.2 and HDCP 1.x Protocol Analyzer for HDMI Simplay-UG-02003-A July 2015 Contents 1. Overview... 4 1.1. SL-8800 HDCP Protocol Analyzer Test Equipment... 4 1.2. HDCP 2.2/HDCP 1.x Protocol Analyzer
Security of EnOcean Radio Networks
V1.9 / Page 1 / 37 V1.1 Content 1... 6 1.1 Terms & Abbreviations... 6 2 Introduction... 6 3 Scenarios... 6 3.1 Attacker scenarios... 7 3.2 System Architecture... 10 4 Specification... 10 4.1 Security for
Fault attack on the DVB Common Scrambling Algorithm
Fault attack on the DVB Common Scrambling Algorithm Kai Wirt Technical University Darmstadt Department of Computer Science Darmstadt, Germany [email protected] Abstract. The Common Scrambling
Abysssec Research. 1) Advisory information. 2) Vulnerable version
Abysssec Research 1) Advisory information Title Version Discovery Vendor Impact Contact Twitter CVE : Apple QuickTime FlashPix NumberOfTiles Remote Code Execution Vulnerability : QuickTime player 7.6.5
A TrendLabs Report. 2Q Report on Targeted Attack Campaigns
A TrendLabs Report 2Q Report on Targeted Attack Campaigns Contents Introduction...4 Campaigns Observed in 2Q...5 Targeted Attack Campaigns Profiling...5 Affected Industry Sectors...6 Affected Regions...6
On the Security of Digital Video Broadcast Encryption
On the Security of Digital Video Broadcast Encryption Markus Diett October 26, 2007 Diploma Thesis Ruhr-Universität Bochum Chair for Communication Security (COSY) Prof. Dr.-Ing. Christof Paar Dipl.-Inf.
Ransomware: Next-Generation Fake Antivirus
Ransomware: Next-Generation Fake Antivirus By Anand Ajjan, Senior Threat Researcher, SophosLabs Contents 1. Overview 2 2. Ransomware versus fake antivirus 2 3. The ransomware timeline 3 3.1. Early variants
Analysis and Diversion of Duqu s Driver
Analysis and Diversion of Duqu s Driver Guillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier, Aurélien Thierry To cite this version: Guillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier, Aurélien Thierry.
3. USB FLASH DRIVE PREPARATION. Almost all current PC firmware permits booting from a USB drive, allowing the launch
3. USB FLASH DRIVE PREPARATION 3.1 INTRODUCTION Almost all current PC firmware permits booting from a USB drive, allowing the launch of an operating system from a bootable flash drive. Such a configuration
Operation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
Introduction to Reverse Engineering
Introduction to Reverse Engineering Inbar Raz Malware Research Lab Manager December 2011 What is Reverse Engineering? Reverse engineering is the process of discovering the technological principles of a
Return-oriented programming without returns
Faculty of Computer Science Institute for System Architecture, Operating Systems Group Return-oriented programming without urns S. Checkoway, L. Davi, A. Dmitrienko, A. Sadeghi, H. Shacham, M. Winandy
Digital Forensic analysis of malware infected machine Case study ***
Abstract Digital Forensic analysis of malware infected machine Case study Amulya Podile, Keerthi G & Krishna Sastry Pendyala# Incident Response & Malware Analysis Unit, Digital Forensics CoE, Tata Consultancy
Packers. (5th April 2010) Ange Albertini http://corkami.blogspot.com Creative Commons Attribution 3.0
Packers (5th April 2010) Ange Albertini 3.0 Table of contents 3 Models: simple, malware, advanced 4 Categories and Features: compresser, protecter, crypter, bundler, virtualiser, mutater 5 Landscape: Free,
Packers Models. simple. malware. advanced. allocation. decryption. decompression. engine loading. integrity check. DRM Management
allocation allocation (VirtualAlloc / empty section) trapped start allocation (VirtualAlloc / empty section) (MANY layers,add/rol/xor) startup decompression engine loading (one layer,add/rol/xor) (Tea/RC4/operators)
Hotpatching and the Rise of Third-Party Patches
Hotpatching and the Rise of Third-Party Patches Alexander Sotirov [email protected] BlackHat USA 2006 Overview In the next one hour, we will cover: Third-party security patches _ recent developments
Soft-Starter SSW-06 V1.6X
Motors Energy Automation Coatings Soft-Starter SSW-06 V1.6X Serial Communication Manual Language: English Document: 0899.5731 / 04 Serial Communication Manual Series: SSW-06 V1.6X Language: English Document
Software security. Buffer overflow attacks SQL injections. Lecture 11 EIT060 Computer Security
Software security Buffer overflow attacks SQL injections Lecture 11 EIT060 Computer Security Buffer overflow attacks Buffer overrun is another common term Definition A condition at an interface under which
Implementation of Web Application Firewall
Implementation of Web Application Firewall OuTian 1 Introduction Abstract Web 層 應 用 程 式 之 攻 擊 日 趨 嚴 重, 而 國 內 多 數 企 業 仍 不 知 該 如 何 以 資 安 設 備 阻 擋, 仍 在 採 購 傳 統 的 Firewall/IPS,
CS61: Systems Programing and Machine Organization
CS61: Systems Programing and Machine Organization Fall 2009 Section Notes for Week 2 (September 14 th - 18 th ) Topics to be covered: I. Binary Basics II. Signed Numbers III. Architecture Overview IV.
CITIZEN LAB TECHNICAL BRIEF 001 IEXPL0RE RAT
CITIZEN LAB TECHNICAL BRIEF 001 IEXPL0RE RAT BY ETH HARDY AUGUT 2012 1 INTRODUCTION This report describes a remote access trojan (RAT) that three human rights-related organizations taking part in a Citizen
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
How to create OpenDocument URL s with SAP BusinessObjects BI 4.0
How to create OpenDocument URL s with SAP BusinessObjects BI 4.0 Creator: Twitter: Blog: Pieter Verstraeten http://www.twitter.com/pverstraeten http://www.pieterverstraeten.com/blog Hi, Thanks for downloading
Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr
Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr Copyright c 2007-2010 Xavier Clerc [email protected] Released under the LGPL version 3 February 6, 2010 Abstract: This
CIT 480: Securing Computer Systems. Malware
CIT 480: Securing Computer Systems Malware Topics 1. Anti-Virus Software 2. Virus Types 3. Infection Methods 4. Rootkits 5. Malware Analysis 6. Protective Mechanisms 7. Malware Factories 8. Botnets Malware
Melde- und Analysestelle Informationssicherung MELANI Torpig/Mebroot Reverse Code Engineering (RCE)
Melde- und Analysestelle Informationssicherung MELANI Torpig/Mebroot Reverse Code Engineering (RCE) Andreas Greulich, MELANI Swiss Cyber Storm, 18 April 2009 Agenda Part 1: Introduction (~5 ) Infection
finding malware on compromised Windows machines
S TEVEN ALEXANDER finding malware on compromised Windows machines Steven is a programmer for Merced College. He manages the college s intrusion detection system. [email protected] This article
URL encoding uses hex code prefixed by %. Quoted Printable encoding uses hex code prefixed by =.
ASCII = American National Standard Code for Information Interchange ANSI X3.4 1986 (R1997) (PDF), ANSI INCITS 4 1986 (R1997) (Printed Edition) Coded Character Set 7 Bit American National Standard Code
Self Protection Techniques in Malware
DSIE 10 5 th Doctoral lsymposium on Informatics Engineering i January 28 29, 2010 Porto, Portugal Self Protection Techniques in Malware Tiago Santos Overview Introduction Malware Types Why Self Protection?
McAfee Labs Threat Advisory W32/Autorun.worm.aaeb-h
Summary McAfee Labs Threat Advisory W32/Autorun.worm.aaeb-h August 9, 2013 W32/Autorun.worm.aaeb-h has the ability to infect removable media devices, as well as mounted network shares. Infection starts
G DATA SECURITYLABS CASE STUDY OPERATION TOOHASH HOW TARGETED ATTACKS WORK
G DATA SECURITYLABS CASE STUDY OPERATION TOOHASH HOW TARGETED ATTACKS WORK CONTENTS Executive Summary... 2 The Malware used 2 Information Stealing 2 Campaign Analysis... 3 Targets 3 Spear Phishing Campaign
Pattern Co. Monkey Trouble Wall Quilt. Size: 48" x 58"
.............................................................................................................................................. Pattern Co..........................................................................................
The Windows Shortcut File Format as reverse-engineered by Jesse Hager [email protected] Document Version 1.0
Disclaimer The Windows Shortcut File Format as reverse-engineered by Jesse Hager [email protected] Document Version 1.0 This document is provided AS-IS basis, without any warranties or representations
USB HID to PS/2 Scan Code Translation Table
Key Name HID Usage Page HID Usage ID PS/2 Set 1 Make* PS/2 Set 1 Break* PS/2 Set 2 Make PS/2 Set 2 Break System Power 01 81 E0 5E E0 DE E0 37 E0 F0 37 System Sleep 01 82 E0 5F E0 DF E0 3F E0 F0 3F System
Oracle Managed File Getting Started - Transfer FTP Server to File Table of Contents
Oracle Managed File Getting Started - Transfer FTP Server to File Table of Contents Goals... 3 High- Level Steps... 4 Basic FTP to File with Compression... 4 Steps in Detail... 4 MFT Console: Login and
For a 64-bit system. I - Presentation Of The Shellcode
#How To Create Your Own Shellcode On Arch Linux? #Author : N3td3v!l #Contact-mail : [email protected] #Website : Nopotm.ir #Spcial tnx to : C0nn3ct0r And All Honest Hackerz and Security Managers I - Presentation
Parasitics: The Next Generation. Vitaly Zaytsev Abhishek Karnik Joshua Phillips
Parasitics: The Next Generation. Vitaly Zaytsev Abhishek Karnik Joshua Phillips Agenda Overview W32/Xpaj analysis Overview of a virtual machine Software protection trends W32/Winemmem analysis W32/Induc
Reverse Engineering Malware Part 1
Reverse Engineering Malware Part 1 Author :Arunpreet Singh Blog : https://reverse2learn.wordpress.com MD5 Hash : 1d8ea40a41988b9c3db9eff5fce3abe5 This is First Part of 2 Part Series.This Malware Drops
Dyre: Emerging threat on financial fraud landscape
SECURITY RESPONSE Dyre: Emerging threat on financial fraud landscape Symantec Security Response Version 1.0 June 23, 2015 Dyre is a multi-pronged threat and is often used to download additional malware
Binary Representation
Binary Representation The basis of all digital data is binary representation. Binary - means two 1, 0 True, False Hot, Cold On, Off We must tbe able to handle more than just values for real world problems
Off-by-One exploitation tutorial
Off-by-One exploitation tutorial By Saif El-Sherei www.elsherei.com Introduction: I decided to get a bit more into Linux exploitation, so I thought it would be nice if I document this as a good friend
Sniffing SAP R GUI Passwords
Sniffing SAP R GUI Passwords 6. Juli 2009, Andreas Baus, René Ledosquet Abstract This paper describes a practical attack against the protocol used by SAP R for client server communication. The purpose
The ASCII Character Set
The ASCII Character Set The American Standard Code for Information Interchange or ASCII assigns values between 0 and 255 for upper and lower case letters, numeric digits, punctuation marks and other symbols.
GB ethernet UDP interface in FPGA
GB ethernet UDP interface in FPGA NIKHEF, PeterJ 05 August 2013 1 LED0 RxFifos 0 1 n Rx Stream Select Rx_buf2data pkt_buffers Rx Packet Buffer 64 KB Flags Rx_mac2buf Overview Good/Bad Frame Rx FPGA ML605
WLSI Windows Local Shellcode Injection. Cesar Cerrudo Argeniss (www.argeniss.com)
WLSI Windows Local Shellcode Injection Cesar Cerrudo Argeniss (www.argeniss.com) Overview _ Introduction _ Establishing a LPC connection _ Creating a shared section _ The technique _ Building an exploit
ASCII CODES WITH GREEK CHARACTERS
ASCII CODES WITH GREEK CHARACTERS Dec Hex Char Description 0 0 NUL (Null) 1 1 SOH (Start of Header) 2 2 STX (Start of Text) 3 3 ETX (End of Text) 4 4 EOT (End of Transmission) 5 5 ENQ (Enquiry) 6 6 ACK
Security Technical. Overview. BlackBerry Enterprise Server for Microsoft Exchange. Version: 5.0 Service Pack: 4
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Security Technical Overview Published: 2014-01-17 SWD-20140117135425071 Contents 1 New in this release...10 2 Overview...
Introduction. Application Security. Reasons For Reverse Engineering. This lecture. Java Byte Code
Introduction Application Security Tom Chothia Computer Security, Lecture 16 Compiled code is really just data which can be edit and inspected. By examining low level code protections can be removed and
BlackBerry Enterprise Server 5.0 SP3 and BlackBerry 7.1
BlackBerry Enterprise Server 5.0 SP3 and BlackBerry 7.1 Version: 5.0 Service Pack: 3 Security Technical Overview Published: 2012-01-17 SWD-1936256-0117012253-001 Contents 1 Document revision history...
Application Note. Introduction AN2471/D 3/2003. PC Master Software Communication Protocol Specification
Application Note 3/2003 PC Master Software Communication Protocol Specification By Pavel Kania and Michal Hanak S 3 L Applications Engineerings MCSL Roznov pod Radhostem Introduction The purpose of this
Michael Ligh (@imhlv2)
Michael Ligh (@imhlv2) Suspect uses TrueCrypt for disk encryp?on Most recent version: 7.1a Suspect runs Windows 8 / Server 2012 What can you do, given a disk and memory image? Provide three of the most
Network Configuration Example
Network Configuration Example OSPF Version 3 for IPv6 Feature Guide Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
Hacking cars in the style of Stuxnet
Hacking cars in the style of Stuxnet András Szijj 1, Levente Buttyán 1, Zsolt Szalay 2 1 CrySyS Lab, Department of Networked Systems and Services 2 Department of Automobiles and Vehicle Manufacturing Budapest
Rijndael Encryption implementation on different platforms, with emphasis on performance
Rijndael Encryption implementation on different platforms, with emphasis on performance KAFUUMA JOHN SSENYONJO Bsc (Hons) Computer Software Theory University of Bath May 2005 Rijndael Encryption implementation
An Introduction to Incident Detection and Response Memory Forensic Analysis
An Introduction to Incident Detection and Response Memory Forensic Analysis Alexandre Dulaunoy - TLP:WHITE [email protected] February 6, 2015 An overview to incident response Detection Analysis Containment Investigation
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Command Param1 Param2 Return1 Return2 Description. 0xE9 0..0x7F (id) speed pos_high pos_low Set servo #id speed & read position
set Description 0..0x7F (id) Set servo #id target position 0xE1 Read EEPROM 0xE2 Write EEPROM 0xE3 Read memory 0xE4 Write memory 0xE5 Read position 0xE6 Set target position 0xE7 version id Read version
Detecting the One Percent: Advanced Targeted Malware Detection
Detecting the One Percent: Advanced Targeted Malware Detection Tomer Teller Check Point Software Technologies Session ID: SP02-T19 Session Classification: Intermediate Antivirus 20 th+ Anniversary The
ON-BOARDING TOOL USER GUIDE. HKEx Orion Market Data Platform Securities Market & Index Datafeed Products Mainland Market Data Hub (MMDH)
ON-BOARDING TOOL USER GUIDE HKEx Orion Market Data Platform Securities Market & Index Datafeed Products Mainland Market Data Hub (MMDH) Version 1.1 27 May 2013 Document History DOCUMENT HISTORY Distribution
Gameover Zeus Bad Guys and Backends
Gameover Zeus Bad Guys and Backends Elliott Peterson, Michael Sandee, Tillmann Werner August 5, 2015 Cui Honorem, Honorem Dr. Brett Stone-Gross, Dell SecureWorks Frank Ruiz, Fox-IT Dr. Christian Rossow,
