Tech Report. Targeted attack on. France s TV5Monde



Similar documents
CYBER SECURITY THREAT REPORT Q1

Open an attachment and bring down your network?

ONLINE RECONNAISSANCE

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them

Security A to Z the most important terms

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

Collateral Effects of Cyberwar

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Case 2:14-cv GMN-GWF Document 2 Filed 06/19/14 Page 1 of 27

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!

Hacker Intelligence Initiative, Monthly Trend Report #15

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

Recommended Practice Case Study: Cross-Site Scripting. February 2007

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Ed Ferrara, MSIA, CISSP Fox School of Business

Marble & MobileIron Mobile App Risk Mitigation

Top Ten Cyber Threats

The Nitro Attacks. Security Response. Stealing Secrets from the Chemical Industry. Introduction. Targets. Eric Chien and Gavin O Gorman

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

Load Testing How To. Load Testing Overview

CYBER SECURITY. II. SCANDALOUS HACKINGS To show the seriousness of hacking we have included some very scandalous hacking incidences.

N-Dimension Solutions Cyber Security for Utilities

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark

Brief self-introduction

INFORMATION SECURITY REVIEW

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Hunting for Indicators of Compromise

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Firewalls and Software Updates

HoneyBOT User Guide A Windows based honeypot solution

CUSTOMER S GUIDE. DNA Broadband

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation

things you haven t done to protect your business from cybercrime

ICTN Enterprise Database Security Issues and Solutions

Cloud Services Prevent Zero-day and Targeted Attacks

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Defensible Strategy To. Cyber Incident Response

Test Case - Privatefirewall 5.0, Intrusion and Malware Defense

Network Detective. HIPAA Compliance Module RapidFire Tools, Inc. All rights reserved V

Fighting Off an Advanced Persistent Threat & Defending Infrastructure and Data. Dave Shackleford February, 2012

Mobile Labs Plugin for IBM Urban Code Deploy

Surviving the Era of Hack Attacks Cyber Security on a Global Scale

V ISA SECURITY ALERT 13 November 2015

WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security

NATIONAL CYBER SECURITY AWARENESS MONTH

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

Software that provides secure access to technology, everywhere.

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

Introduction: 1. Daily 360 Website Scanning for Malware

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3

Remote Access Securing Your Employees Out of the Office

PCI Security Scan Procedures. Version 1.0 December 2004

ANTIVIRUS BEST PRACTICES

Bitrix Site Manager ASP.NET. Installation Guide

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

The Key to Secure Online Financial Transactions

Manipulating Microsoft SQL Server Using SQL Injection

5. At the Windows Component panel, select the Internet Information Services (IIS) checkbox, and then hit Next.

Securing Internet Facing. Applications. Technical White Paper. configuration drift, in which IT members open up ports or make small, supposedly

Security Assessment through Google Tools -Focusing on the Korea University Website

Operation Liberpy : Keyloggers and information theft in Latin America

SHINOBOT/SHINOC2 MANUAL

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

Course Content: Session 1. Ethics & Hacking

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security

Common Data Breach Threats Facing Financial Institutions

Resilience and Cyber Essentials

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

ClickView 24-7 Cloud User Manual

Keyloggers ETHICAL HACKING EEL-4789 GROUP 2: WILLIAM LOPEZ HUMBERTO GUERRA ENIO PENA ERICK BARRERA JUAN SAYOL

2012 Data Breach Investigations Report

Privilege Gone Wild: The State of Privileged Account Management in 2015

Protecting Your Organisation from Targeted Cyber Intrusion

Advanced & Persistent Threat Analysis - I

Cybercrime and Identity Theft: Awareness and Protection 2015 HLC Conference

Transcription:

Tech Report Targeted attack on France s TV5Monde May 05, 2015

Tabel of Content Introduction... 3 Attack Outline... 3 Findings #1: Njrat and Njworm, based in the Middle East... 6 Findings #2: Source code generator and generation process... 7 Findings #3: VB script backdoor... 9 Conclusion... 12

Introduction Increasingly, cyberattacks targeting various industrial sectors are directed towards prominent institutions. In a recent incident reported on April 8, 2015, TV5 Monde, one of France s largest global television networks was attacked by hackers, resulting in the disruption of eleven TV5 Monde s channels. According to TV5 Monde, a hacker group claiming to be linked to the Islamic State Group executed the attack. This report analyzes the malwares used in the targeted attack against TV5 Monde in France. Attack Outline At 10 pm on April 8, 2015, TV5 Monde fell victim to a cyberattack by Islamic fundamentalist hacker group, Cyber Caliphate, which claims to be linked to the Islamic State of Iraq and Syria (ISIS). Back in January 2015, this group hacked into the official Twitter account of the United States Central Command. In this incident, 11 programme broadcasts of TV5 Monde channels were disrupted for 3 hours as the hacker group breaches the Network s internal systems and overriding the digital broadcast system. The hacker group also took control of the Network s administrative systems making emails inaccessible. The Network s social media accounts and website were not spared. The Network s Facebook account was hacked, and made to display images of ISIS. [Figure 1] French newspaper article on TV5Monde attack Complete details on the attack are still uncertain, but the Network s soft approach to security was exposed on live television.

[Figure 2] Live television displays usernames and passwords on wall A live interview with a reporter the next day of the attack displayed usernames and passwords written on post-it notes. One of the post-it notes revealed the network's passwords for YouTube. Twitter user pent0thal confirmed that the password was "lemotdepassedeyoutube," which translates in English to "the password of YouTube." [Figure 3] Another password spotted

The same user, pent0thal, discovered another password in a publicly broadcasted segment of the news, which can be seen above. TV5Monde s negligent approach to security, like writing account information on notepads pasted on walls, may have contributed to the hacking incident. On April 9, 2015, Blue Coat, a security vendor, released a press statement on the TV5Monde attack. [Figure 4] Press statement by Blue Coat (*Source: Blue Coat Blog) According to this statement, the malware used in the TV5 Monde attack is a variant of Njworm that is popular in the Middle East.

Findings #1: Njrat and Njworm, based in the Middle East A Kuwaiti, known by the alias njq8, created NjRAT and Njworm. A simple search on the web shows that there are numerous online video tutorials in the Arabic language sharing knowledge on executing and exploiting with njrat and Njworm. This level of knowledge sharing and support is making the backdoor malware popular among attackers in the Middle-East region. [Fig, 5] Video tutorial in the Arabic language (*Source: www.youtube.com/watch?v=sktoonku1w0) Many variants of this malware have been found ever since the source code was disclosed in May 2013. A C# source code generator was even uploaded on an Arabic developer s site on December 8, 2014. With the increase in threats involving this malware, Microsoft Malware Protection Center (MMPC) took down the NjRAT and Njworm malware families in June 2014. These malware families are believed to have been created by Kuwaiti, Naser Al Mutairi, aka njq8, and Algerian, Mohamed Benabdellah, aka Houdini. There is also VB source code generators. The VBS codes are slightly different as compared to the C# source code generator, but it performs the same action stealing personal information and acting as a backdoor. When the VB source code generator runs, the attacker must enter the port number, and specify the host address, name, directory and installation name. The output files created could be slightly different.

Findings #2: Source code generator and generation process Let s take a look at how some source code generators work. 1. Source Code Generator 1 When you execute the generator, a window to set the port will appear. Then, a message stating the port is successfully connected will appear as below. [Figure 6] Port connected If you right-click on the white bar on the message above, a window will appear to send commands. The command types are divided into w0rm, Computer, Run and Options, and you can send various commands based on the command type. [Figure 7] Command window After selecting a command, and clicking Builder, a window to initialize the IP and port will appear. You can specify the host, port, name and install name, and select one of the six directories. [Figure 8] Generating source codes through Builder 2. Source Code Generator 2 Let us take a look at another source code generator. When you open the generator, a window to enter the port number as in [Figure 9] and a window to specify a few settings as in [Figure 10] will appear.

[Figure 9] Home screen for Source Code Generator 2 [Figure 10] Settings page The command type is simpler. The options are only Run File, VBS Code and Uninstall Worm. [Figure 11] Command window You can specify the host, port, name and install name. The Spread File Name and directory has been modified.

[Figure 12] Settings page for Source Code Generator 2 The biggest difference between the two source code generators is the process to verify whether the environment is a virtual environment or physical environment. Source Code Generator 1 does not include a function to verify the environment. On the other hand, Source Code Generator 2 offers vmcheck() function at the beginning of the exploit codes, where if it is verified that the environment is verified as virtual, the exploit code jumps to a process that immediately deletes the VBS file and terminates. Findings #3: VB script backdoor The malware used in TV5Monde attack is a VBS (Visual Basic Script) malware created with one of these source code generators. It steals personal information and allows remote control, and performs the following actions: 1. Create files C:\Documents and Settings\Administrator\Start Menu\Programs\Startup\SecurityNajaf.vbs C:\Documents and Settings\Administrator\LocalSettings\Temp\(Original).vbs 2. Enable auto-run via Registry HKCU\Software\Microsoft\Windows\CurrentVersion\Run\SecurityNajaf "wscript.exe //B "SecurityNajaf.vbs"" HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityNajaff "wscript.exe //B "SecurityNajaf.vbs"" 3. Communicate with C&C server The scripts are divided into initialization codes and backdoor codes. The initialization codes contain install name, IP and port details.

[Figure 13] Initialization codes The backdoor codes define the action of the commands sent to the C&C server. [Figure 14] Remote command execution codes This malware not only acts as a backdoor, but also steal user information that includes user name, computer name, volume serial number and Windows version.

[Figure 15] System information extraction codes The originating address of the detected malware was the malware itself, so it is determined and highly possible that it was created for testing.

Conclusion AhnLab has investigated the malware that seized control of France s TV5Monde and disrupting the broadcast of 11 TV5Monde s channels. Television networks are the perfect targets for cyber-attacks intended for political reasons and it has been proven possible for attackers to take control of the television broadcast. Television broadcast companies have an immediate need to reinforce security and take targeted attacks seriously. Malware that are widely used in specific countries or regions could be executed as political attacks, so it is also important to be up-to-date about these malware. <References> French TV station TV5Monde hit by Islamic State hack www.dailymail.co.uk/wires/afp/article-3031644/french-tv5monde-hitpro-islamic-state-hackers.html Simple njrat Fuels Nascent Middle East Cybercrime Scene www.symantec.com/connect/blogs/simple-njrat-fuels-nascent-middleeast-cybercrime-scene New RATs Emerge from Leaked Njw0rm Source Code http://blog.trendmicro.com/trendlabs-security-intelligence/new-rats-emerge-fromleaked-njw0rm-source-code www.eff.org/files/2013/12/28/quantum_of_surveillance4d.pdf www.cnbc.com/id/102330338 https://twitter.com/pent0thal www.bluecoat.com/security-blog/2015--04-09/visual-basicscript-malware-reportedly-used-tv5-monde-intrusion www.youtube.com/watch?v=sktoonku1w0 https://jomgegar.com/topic/14665-njrat-v07dbuilderstub-fullsource-code/ http://www.lemonde.fr/pixels/article/2015/04/09/les-sites-de-tv5-monde-detournes-par-un-groupeislamiste_4612099_4408996.html http://blogs.technet.com/b/mmpc/archive/2014/06/30/microsoftdigital-crimes-unit-disrupts-jenxcus-and-bladabindimalware-families.aspx http://blogs.microsoft.com/blog/2014/06/30/microsoft-takes-onglobal-cybercrime-epidemic-in-tenth-malware-disruption/

AhnLab, Inc. www.ahnlab.com 2015 AhnLab, Inc. All rights reserved. Reproduction and/or distribution of a whole or part of this document without prior written permission from AhnLab are strictly prohibited.