APT A%ribu*on and DNS Profiling. Frankie Li ran2@vxrl.org Twi4er: @espionageware



Similar documents
Threat Intelligence is Dead. Long Live Threat Intelligence!

Open Source Threat Intelligence. Kyle R Maxwell (@kylemaxwell) Senior Researcher, Verizon RISK Team

Eight Essential Elements for Effective Threat Intelligence Management May 2015

How to set up the Integrated DNS Server for Inbound Load Balancing

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

WHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware

All about Threat Central

Threat Advisory: Accellion File Transfer Appliance Vulnerability

Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Doris Yang Vectra Networks, Inc. June 16, 2015 The World Ahead

How to Configure the Windows DNS Server

Cyber Intelligence Workforce

gathering Dave van Stein 9 april 2009

Cymon.io. Open Threat Intelligence. 29 October 2015 Copyright 2015 esentire, Inc. 1

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA

We Know It Before You Do: Predicting Malicious Domains

Chris Gates

Malicious Network Traffic Analysis

Cyber Security Metrics Dashboards & Analytics

Integrating MSS, SEP and NGFW to catch targeted APTs

Description: Objective: Attending students will learn:

Endpoint Threat Detection without the Pain

DNS Firewalls with BIND: ISC RPZ and the IID Approach. Tuesday, 26 June 2012

SPEAR-PHISHING ATTACKS

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Networks and Security Lab. Network Forensics

SES / CIF. Internet2 Combined Industry and Research Constituency Meeting April 24, 2012

Defense Security Service

The Third Rail: New Stakeholders Tackle Security Threats and Solutions

Security Intelligence Services. Cybersecurity training.

APPLICATION PROGRAMMING INTERFACE

LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains

Threat Intelligence Buyer s Guide

Ty Miller. Director, Threat Intelligence Pty Ltd

After the Attack: RSA's Security Operations Transformed

Advanced Endpoint Protection

Hacking Techniques & Intrusion Detection

ThreatSTOP Technology Overview

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Redefining SIEM to Real Time Security Intelligence

ICS, SCADA, and Non-Traditional Incident Response. Kyle Wilhoit Threat Researcher, Trend Micro

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

Unified Security Management and Open Threat Exchange

Measures to Protect (University) Domain Registrations and DNS Against Attacks. Dave Piscitello, ICANN

Gregg Gerber. Strategic Engagement, Emerging Markets

Targeted attacks: Tools and techniques

Ed Ferrara, MSIA, CISSP Fox School of Business

Installing and Setting up Microsoft DNS Server

DYNAMIC DNS: DATA EXFILTRATION

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

The Big Data Paradigm Shift. Insight Through Automation

Basheer Al-Duwairi Jordan University of Science & Technology

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Preetham Mohan Pawar ( )

A fresh new look into Information Gathering. Christian Martorella IV OWASP MEETING SPAIN

Course Content: Session 1. Ethics & Hacking

Comprehensive Understanding of Malicious Overlay Networks

WHITE PAPER: THREAT INTELLIGENCE RANKING

HOW LOOKOUT S PREDICTIVE SECURITY UNMASKED A MOBILE THREAT

Kerem Kocaer 2010/04/14

Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Spear Phishing Attacks Why They are Successful and How to Stop Them

RETHINK SECURITY FOR UNKNOWN ATTACKS

Palo Alto Networks. October 6

G DATA SECURITYLABS CASE STUDY OPERATION TOOHASH HOW TARGETED ATTACKS WORK

STRATEGIC ADVANTAGE: CONSULTING & ISIGHT INTELLIGENCE

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Automated Protection Against Advanced Attacks

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

Indicator Expansion Techniques Tracking Cyber Threats via DNS and Netflow Analysis

WHEN THE HUNTER BECOMES THE HUNTED HUNTING DOWN BOTNETS USING NETWORK TRAFFIC ANALYSIS

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS

Check Point: Sandblast Zero-Day protection

Modern Approach to Incident Response: Automated Response Architecture

WildFire. Preparing for Modern Network Attacks

Exploring the Black Hole Exploit Kit

WRITTEN TESTIMONY OF

A New Approach to Assessing Advanced Threat Solutions

Shellshock. Oz Elisyan & Maxim Zavodchik

When less is more (Spear-Phishing and Other Methods to Steal Data) Alexander Raczyński

Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

Threat Intelligence: Friend of the Enterprise

Analyzing HTTP/HTTPS Traffic Logs

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

GRC & Cyber Security Conference - Bringing the Silos Together ISACA Ireland 3 Oct 2014 Fahad Ehsan

Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. abechtsoudis (at) ieee.

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Transcription:

APT A%ribu*on and DNS Profiling Frankie Li ran2@vxrl.org Twi4er: @espionageware

Agenda APT A4ribu<on: Who wrote these codes? Tac<cs, Techniques and Procedures (TTP) Behavior of APT adversary HUMINT extracted from DNS or Whois Gather intelligence from open source Dynamically monitoring of PassiveDNS è PassiveWhois Analysis by visualiza<on tool (Maltego) MalProfile Tools and demo

Who am I? From a place in China, but not so China ;) Sunday researcher in malware analysis and digital forensics Part <me lecturer A Lazy blogger (espionageware.blogspot.com) NOT associated with PLA 61398 or Mandiant NOT associated with PLA 61486 or CrowdStrike or Taia Global

APT ATTRIBUTION

APT A%ribu*on Disclaimer: Not going to provide any opinion on the latest indictment or Yoke Bun or Clock Tower Not a major concern for private sector, but for LE or intelligence agencies Not difficult, if you have source code Not hard, if you focus only on strings & human readable data within a malware program But, to a4ribute responsibility with Certainty is almost impossible, unless they make a mistake

Who wrote these codes? Source code a4ribu<on A4ributes of Windows binaries A4ribu<on malware A4ribu<on of APT by digital DNA

Source code a%ribu*on The term Stylometry refers the applica<on of a4ribute the authorship by coding style Kind of profiling by wri<ng style Comments and coding crumbs JStylo: By comparing unknown documents with a known candidate author s document* Not a solu<on because most APT samples collected are compiled binaries *Islam, A. (2013). Poster: Source Code Authorship A4ribu<on

A%ributes of Windows Malware PE headers are des- constructed and metadata (ar<facts) are categorized (Yonts, 2012) Extract the technical and contextual a4ributes or genes from different layers to group the malware (Xecure- Lab, 2012 and Pfeffer, 2012) By a proprietary reverse engineering and behavioral analysis technology (Digital DNA, 2014)

PE Deconstruc*on

A%ribu*on Using Gene*c Informa*on From: Xecure- Lab, 2012

TACTICS, TECHNIQUES AND PROCEDURES (TTP)

Human is the key A4ribu<on: Tracking Cyber Spies & Digital Criminals (Hoglund, 2010) Forensics marks that could be extracted from raw data in three intelligence layers Net Recon Developer Fingerprints Tac<cs, Techniques, and Procedures (TTP) Among these three layers, TTP should carry the highest intelligence value for iden<fying human a4ackers But, near impossibility of finding the human actors with defini<ve intelligence Social Cyberspace (i.e., DIGINT) Physical Surveillance (i.e., HUMINT) h4p://www.youtube.com/ watch?v=k4ry1trqhdk

Hoglund s malware intel life *me

TTP A military term? A term to describe the behavior of adversary? A modern term to replace modus operandi? the method of opera<on The habits of working TTP are human- influenced factors

Pyramid of Pain From David Bianco s Blog h4p://detect- respond.blogspot.hk/2013/03/ the- pyramid- of- pain.html

TTP OR BEHAVIOR OF APT ADVERSARY

APT life cycle

Extended APT life cycle

APT infrastructure tac*cs Domain registra<on Naming conven<on is not typo squarng, but follows a pa4ern of meaningful Chinese PingYing 拼音 Crea<on DNS- IP address pairs Engaging a friendly ISP to use a por<on of their C- class subnet of IP addresses situated at the domicile of the targeted vic<ms DNS names and IP addresses may be cycled for reuse (a.k.a. campaigns), which may provide indica<ons or links to the a4acker groups Embedding mul<ple DNS A- records in exploits Preparing spear- phishing email content aser reconnaissance of the targeted vic<ms Launching malicious a4achments through spear- phishing emails

APT infrastructure tac*cs- 2 The exploits drop binaries that extract the DNS records and begin communica<ng with the C2 by resolving the IP addresses from DNS servers. The C2 servers or C2 proxies register the infec<ons on the C2 database The intelligence analysts of the a4acker groups review the preliminary collected informa<on of the targeted vic<ms through C2 portals. The infected machines are further instructed to perform exfiltra<on of collect further intelligence from the infected machines. The infrastructure technical persons of the a4acker group apply changes (domain manipula<on) to the DNS- IP address pair, domain name registra<on informa<on (Whois informa<on), and the parked domains from <me to <me or when a specific incident occurs In contrast with the Fast- Flux Services Networks men<oned by the HoneyNet Project, the informa<on does not change with high frequency

HUMINT EXTRACTED FROM DNS

What is kept in DNS & Whois Domain names: A Record, Cname, NS record Whois records: valid email address (once), name, street address, name servers Parked- domains: temporary IP address assigned crea<on of first DNS record on the name server (newly created domains are kept under 1 IP address for future use)

HUMINT intel collected Extract DNS from the malicious code (sandbox) Lookup the currently assigned IP address Retrieve all parked- domains from the iden<fied IP address Retrieve whois informa<on from the iden<fied domains Update iden<fied record to a rela<onal database for future analysis Repeat the process and record all changes in the database

Intel collec*on process

QUERIES FROM OPEN SOURCE

Open source Nslookup Whois Domain tools: reverse DNS and reverse whois h4p://bgp.he.net h4p://virustotal.com h4p://passivedns.mnemonic.no h4ps://www.farsightsecurity.com h4ps://www.passivetotal.org

DomainTools Ouch!

h%p://bgp.he.net

PASSIVE DNS TO PASSIVE WHOIS

Passive DNS Passive DNS is a technology that constructs zone replicas without coopera<on from zone administrators, and is based on captured name server response Passive DNS is a highly scalable network design that stores and indexes both historical DNS data that can help answer ques<ons such as: where did this domain name point to in the past which domain name points to a given IP network VirusTotal kept passive DNS records collected from malicious samples Higher chance malicious historical DNS- IP records

VirusTotal - PassiveDNS

Passive Whois There are no open source keeping those whois changes, like VirusTotal Passive DNS project (or whois history at who.is) By stepping through the IP lookup, retrieval of parked- domains and whois lookup, any changes will then be updated to a rela<onal database

Passive Whois

ANALYSIS BY VISUALIZATION MALTEGO

Sample called OverProtect

CONCLUSION

Intui*ve views on the a%ribu*on of APT Con<nuously monitoring whois servers and DNS IP address pairs Intelligence may be lost if they change their TTP in the future, par<cularly aser the publica<on of this paper TTP are determined by the cultural background of the a4acker groups The intelligence collec<on process should thus be adjusted toward these changes and analysts should have the same cultural mindset

Is a%ribu*on with certainty possible? All discussed methods may generate some value to the a4ribu<on But, TTP should carry the highest intelligence value for iden<fying human a4ackers Any ar<facts that support the highest human link should be allocated with highest value to the a4ribu<on However, the increasing sharing of TTP and tools by various actors may reduce the reliability to associate with them. (I ve read a paper promo<ng a framework called OpenAPT) Another challenging factor is a4ribu<on intelligence are not shared enough and intelligence community are not fully understood

TOOLS

MalProfile Tools and MalProfile Local Transforms The tools consists of 2 parts: MalProfile script to grabbing intelligence from the Internet Maltego Local Transforms to help analysis process

MalProfile.py

Google Project Special thanks go to Kenneth Tse and Eric Yuen who is upgrading my messy code into a class You can find the code at: h4ps:// code.google.com/p/malicious- domain- profiling/ To allow more intelligence can be added when new TTP be iden<fied Any interested are welcome to contribute to this project. Please contact ran2@vxrl.org or kennetht@gmail.com

malicious- domain- profiling

DEMO

Sample called OverProtect and Insurance

Thank you! Q&A Frankie Li Ran2@vxrl.org h4p://espionageware.blogspot.com

Please complete the Speaker Feedback Surveys Frankie Li Ran2@vxrl.org h4p://espionageware.blogspot.com