different governmental uses for malware - black hat | home · 2015-05-28 · •different...

38

Upload: others

Post on 08-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage
Page 2: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage

• Different governmental uses for malware

• Law Enforcement

• Espionage

• Surveillance

• Sabotage

• Warfare

Page 3: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage
Page 4: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage
Page 5: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage

Protecting the irreplaceable | f-secure.com

Page 6: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage

CosmicDuke

Page 7: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage

Masking "file.scr"

Page 8: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage

• rcs.Заказ.doc

• rcs.18.jpg

• rcs.DSC_1365527283.jpg

CVE-2011-0611

Page 9: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage

CosmicDuke remnants• c:\botgenstudio\generations\8f1777b0\bin\Bot.pdb

• d:\production\nitro\sva\generations\809113dd\bin\Bot.pdb

• d:\sva\nitro\botgenstudio\interface\generations\80ddfcc1\bin\Bot.pdb

• D:\PRODUCTION\NITRO\KSK\Generations\70BCDEA1\bin\Bot.pdb

• C:\Projects\NEMESIS\nemesis-gemina\nemesis\bin\carriers\ezlzma_x86_exe.pdb

Page 10: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage
Page 11: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage

Havex

Page 12: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage
Page 13: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage
Page 14: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage
Page 15: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage

Agent.BTZ / Turla / Snake / Uroburos

Page 16: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage

Turla

Agent.BTZ

Page 17: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage

Developer Signatures

$Id: event.c 14097 2010-11-01 14:46:27Z gilg $

$Id: mime64.c 12892 2010-06-24 14:31:59Z vlad $

$Id: named_mutex.c 15594 2011-03-18 08:04:09Z gilg $

$Id: nt.c 20719 2012-12-05 12:31:20Z gilg $

$Id: ntsystem.c 19662 2012-07-09 13:17:17Z gilg $

$Id: snake_config.c 5204 2007-01-04 10:28:19Z vlad $

Page 18: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage

6es7-315-2 / 6es7-417

Page 19: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage

Protecting the irreplaceable | f-secure.com

Page 20: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage
Page 21: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage
Page 22: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage
Page 23: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage

"There was also some music playing randomly on several of the workstations during the middle of the night with the volume maxed out. I believe it was the american band acdcthunderstruck. It was all very strange and happened very quickly. the attackers also managed to gain root access to the machine they entered from and removed all the logs."

Page 24: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage

Gauss encryptionmov ecx, (LENGTHOF tToCrypt)-1

mov edx, OFFSET tToCrypt

mov ebx, OFFSET tEncrypt

L1:

mov eax, [edx]

XOR eax, ACDCnot eax

mov [ebx], eax

inc edx

inc EBX

LOOP L1

mov edx, OFFSET tOutEncr

call WriteString

mov edx, OFFSET tEncrypt

call WriteString

call Crlf

ret

Page 25: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage
Page 26: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage
Page 27: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage
Page 28: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage
Page 29: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage

FinFly

Page 30: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage
Page 31: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage

UAE, Bahrain, Saudi Arabia, Syria…

• Finfisher (Gamma)

• RCS (Hacking Team)

• DarkComet

• BlackShades

• Xtreme RAT

• Spynet

Page 32: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage

Image Source: When Governments Hack Opponents: A Look at Actors and Technology, Citizen Lab + ICSI

Page 33: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage
Page 34: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage

Hacker Units indside UKUSA intelligence agencies

JTRIG

Page 35: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage

THE EYES

• FIVE EYES: USA, UK, Canada, Australia, New Zealand

• NINE EYES: Five Eyes + Denmark, Norway, The Netherlands and France

• FOURTEEN EYES: Nine Eyes + Sweden, Germany, Belgium, Italy and Spain

Page 36: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage

• free brokep

FREE Peter Sunde

Page 37: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage

Geneva Convention

"Legitimate military targets are limited to those objects which by their nature make an effective contribution to military action and whose total or partial destruction, capture or neutralization, in the circumstances ruling at the time, offers a definite military advantage"

Page 38: Different governmental uses for malware - Black Hat | Home · 2015-05-28 · •Different governmental uses for malware •Law Enforcement •Espionage •Surveillance •Sabotage

Please fill your feedback form if you havenice things to say. Otherwise, never mind.

Thank You