Spear Phishing. October 12, 2015 TLP: WHITE. www.excellium-services.com



Similar documents
Learn from malware! A practical guide of spear phishing for red teams. Paul Jung

Targeted attacks: Tools and techniques

How users bypass your security!

Internet Standards. Sam Silberman, Constant Contact

SPAM, VIRUSES AND PHISHING, OH MY! Michael Starks, CISSP, CISA ISSA Fellow 10/08/2015

Creating a User Profile for Outlook 2013

FSOEP Web Banking & Fraud: Corporate Treasury Attacks

APT Advanced Persistent Threat Time to rethink?

DomainKeys Identified Mail DKIM authenticates senders, message content

Configuration Information

How to Use the File Transfer (FTP) Service

CipherMail Gateway Quick Setup Guide

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

. Daniel Zappala. CS 460 Computer Networking Brigham Young University

How to set up Outlook Anywhere on your home system

Social Engineering Toolkit

ing from The E2 Shop System address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password

Protecting Your Organisation from Targeted Cyber Intrusion

Curbing Threats & Spear Phishing The Promise & Results with DMARC

Lesson 13: DNS Security. Javier Osuna GMV Head of Security and Process Consulting Division

Basic Exchange Setup Guide

Talk Internet User Guides Controlgate Administrative User Guide

Configuring Alarm s From The Field Logger DL1080/DL1081 Using SMTP2GO As The Outgoing Server

How to Identify Phishing s

Device Log Export ENGLISH

How To Set Up An Outlook Mailbox On A Windows 2007 (For Free) With A Free Account On A Blackberry Or Ipad (For A Free) Or Ipa (For An Ipa) With An Outlook 2007 (Free) Or

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

How To Upgrade To Symantec Mail Security Appliance 7.5.5

Basic Exchange Setup Guide

Updated: 7/10/2013 Author: Tim Unten

DON T BE FOOLED BY SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam FREE GUIDE. December 2014 Oliver James Enterprise

Setting Up Free and Paid Accounts. To Set Up Your Account

Microsoft Exchange Mailbox Software Setup Guide

F-Secure Messaging Security Gateway. Deployment Guide

1. Navigate to Control Panel and click on User Accounts and Family Safety. 2. Click on User Accounts

Guidance for recipients of an encrypted NHSmail

Sending SMS Text Messages to Cell Phones Using the Generator Plug-in

Configuration Information

Anti-Phishing Best Practices for ISPs and Mailbox Providers

Windows XP Exchange Client Installation Instructions

Web Meetings through VPN. Note: Conductor means person leading the meeting. Table of Contents. Instant Web Meetings with VPN (Conductor)...

Advancements in Botnet Attacks and Malware Distribution

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

How We're Getting Creamed

Massey University Wireless Network - Client

Chapter 3 Restricting Access From Your Network

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

Reading an sent with Voltage Secur . Using the Voltage Secur Zero Download Messenger (ZDM)

English Translation of SecurityGateway for Exchange/SMTP Servers

Encryption Procedures

Microsoft Exchange Mailbox Software Setup Guide

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.

SANS Institute First Five Quick Wins

SPEAR PHISHING UNDERSTANDING THE THREAT

UNI - WINDOWS. How to... Access your University on your Windows Computer. Introduction. Step 1/1 - Setting Up Your Windows Computer

Exim4U. Server Solution For Unix And Linux Systems

Spear phishing campaign targeting staff to perform wire transfers

Endpoint Security VPN for Windows 32-bit/64-bit

INSTANT MESSAGING SECURITY

Implementing MDaemon as an Security Gateway to Exchange Server

HowTo: Logging, reporting, log-analysis and log server setup Version 2007nx Release 3. Log server version 2.0

How to Configure Outlook Client for Exchange

Protect your brand from phishing s by implementing DMARC 1

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.

SENDING WITH ENTRAPASS CORPORATE EDITION

Web Authentication Application Note

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Configuration Guide for Exchange 2003, 2007 and 2010

Malicious Mitigation Strategy Guide

Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence

Security 8.0 Administrator s Guide

Astaro Mail Archiving Getting Started Guide

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

Configuration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see "Deploy Inbox Rules" below.

How to configure your client

Welcome to the Protecting Your Identity. Training Module

Note that if at any time during the setup process you are asked to login, click either Cancel or Work Offline depending upon the prompt.

ANTI-VIRUS POLICY OCIO TABLE OF CONTENTS

Egress Switch Best Practice Security Guide V4.x

SESA Securing with Cisco Security Appliance Parts 1 and 2

Set Up Setup with Microsoft Outlook 2007 using POP3

Advanced Settings. Help Documentation

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

To configure Outlook Express for your InfoMetrics address:

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

MDaemon Vs. Microsoft Exchange Server 2013 Standard

Alberni Valley IT Services Virtual domain information.

DST . Product FAQs. Thank you for using our products. DST UK

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions

Clearswift Information Governance

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to or Network Folder

Metasploit ing the target machine is a fascinating subject to all security professionals. The rich list of exploit codes and other handy modules of

Scan to Quick Setup Guide

VMware vcenter Support Assistant 5.1.1

Countermeasures against Spyware

Transcription:

Spear Phishing October 12, 2015 TLP: WHITE www.excellium-services.com

Agenda How it s made Soo easy to find victims Inventory of evils documents The art of spoofing How to react to phishing Basics things to do Security awareness EyeMail Questions & Answers

How it s made How to phish an organisation? 1. Find victims emails 2. Send a mail to a victim with an evil payload 3. If needed convince him to execute the payload

Soo easy to find victims Email is based on old protocols No security in mind No trust anywhere in the protocol Some protocol patches

Soo easy to find victims Google, Bing, Exalead, etc Instantly with tools $./theharvester.py -b all -d excellium-services.com Full harvest.. [-] Searching in Google.. Searching 0 results... Searching 100 results... [-] Searching in PGP Key server.. [-] Searching in Bing.. Searching 50 results... Searching 100 results... [-] Searching in Exalead.. Searching 50 results... Searching 100 results... Searching 150 results... [+] Emails found: ------------------ contact@excellium-services.com cbianco@excellium-services.com ctessaro@excellium-services.com jgayet@excellium-services.com pruaro@excellium-services.com xvincens@excellium-services.com fdemkiw@excellium-services.com mgrandcolas@excellium-services.com gcomunello@excellium-services.com ajolibert@excellium-services.com pjung@excellium-services.com rsinicco@excellium-services.com skaiser@excellium-services.com crosenkranz@excellium-services.com lhernandez@excellium-services.com

Soo easy to find victims With one valid email you got the «format», If not usually; christophe.bianco@excellium-services.com c.bianco@excellium-service.com cbianco@excellium-services.com

Soo easy to find victims got the «format»? Linkedin do the rest

How it s made Sometimes, you just have to ask to the mail gateway Who look s to the external gateway log anyway! $ nc smtp.victim.org 25 220 smtp.victim.org ESMTP Postfix ehlo ns2.attacker.org 250-smtp.victim.org mail from: pentester@excellium-services.com 250 2.1.0 Ok rcpt to:abianco@victim.org 550 5.1.1 <abianco@victim.org>: Recipient address rejected: User unknown in local recipient table rcpt to:bbianco@victim.org 550 5.1.1 <bbianco@victim.org>: Recipient address rejected: User unknown in local recipient table rcpt to:cbianco@victim.org 450 4.2.0 <cbianco@victim.org>: Recipient address rejected: Greylisted

How it s made If you use tri/quadgram, it s also bruteforcable cbi@excellium-services.com chbi@excellium-services.com 9

Inventory of evil documents A website or a File.

Inventory of evil documents «Classical phising» Credentials stealing 11

Inventory of evil documents Software exploitation is a reality Flash Player

Inventory of evil documents Sometime just KISS Send executables (exe, cpl, scr, pif, etc ) Send scripts (vbs, bat, cmd, etc ) The матрёшка solution (zip, cab, 7zip, zip in zip, etc ) Encrypt the file with a password Use an office document 13

Inventory of evil documents Sometime just KISS

Inventory of evil documents Office document have macros! How to convice a user to activate macros?

Inventory of evil documents

The art of spoofing How to convice someone to open something? Ascii homographic attack cbianco@excellium.lu -> cbianco@exce11ium.lu

The art of spoofing How to convice someone to open something? Unicode homographic attack Use internationalized domain (IDN) Use cyrillic, greek, hebrew or roman letters.

The art of spoofing How to convice someone to open something? pjung@xn--llm-rv-2ofaec7ji6b9pfhg714c.com

The art of spoofing How to convice someone to open something? SMTP PART BODY PART 20

The art of spoofing How to convice someone to open something? Body «from» field manipulation test@eyeguard.lu 21

The art of spoofing Some statistics 34,40% Follow the link 65,60% Don't click

Spear phishing How to react to phishing

How to react to phishing Control/Harden what you have in place Sensible files should be blocked Crypted file should warn Spoofing should be blocked Deploy Spf / Dkim / Dmarc Mail gateway should be monitored Deploy Anti-exploitation tool

How to react to phishing Train people to recognize phising Learn them what is possible Learn them to detect key points. Learn them to report incidents.

How to react to phishing Reduce response time Setup policies and processes Incident Response plan Continuus integration

1 11 21 31 41 51 61 71 81 91 101 111 121 131 141 151 161 171 181 191 EyeMail assessment Spoofing Tests File extension Phishing Communiaction with C&C User Awareness Top 10 Clickers 11/03/2015 12:00 11/03/2015 02:24 10/03/2015 16:48 10/03/2015 07:12 09/03/2015 21:36 09/03/2015 12:00 Clicks over the time Andy.YYYYY@lu.XXXXXX.com luca.yyyyy@lu.xxxxxx.com Franz.YYYYY@lu.XXXXXX.com

EyeMail assessment Aware people reduce risk and increase detection; 34,40% 21,75% 28

EyeMail assessment Validate gateway configuration Spoofing tests (Email + Body) Attachements and variations Who block s.wsf and.hta? + 20 File types x 18 Variations per files More than 350 security controls 29

EyeMail assessment Spear as an exercise; Perform a spear phishing in your infrastructure Evaluate your staff security awareness Evaluate your detection and alerts process Assess Browser and plugins versions 30

EyeWeb assessment Web Surfing Security Review: EyeWeb Bypass web proxy Fingerprint Patch/plugin management Workstation attack Authentication spoofing Administrator awarness 31

EyeWeb assessment 32

Thanks!