Abusing 3rd-Party Services For Command And Control

Slides:



Advertisements
Similar presentations
1 © Copyright, Risk Masters, Inc All rights reserved.Draft for Discussion Purposes Only RMI Risk Masters, Inc. Emerging Trends in Cyber-Security.
Advertisements

Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Botnets Abhishek Debchoudhury Jason Holmes. What is a botnet? A network of computers running software that runs autonomously. In a security context we.
Threat Intelligence with Open Source tools Cornerstones of
Advanced Persistent Threats CS461/ECE422 Spring 2012.
APT29 HAMMERTOSS Jayakrishnan M.
© 2015 iboss, Inc. All rights reserved. All trademarks and registered trademarks are the property of their respective owners. Senior Network Architect.
Honeypots. Introduction A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems.
Jcow Ramiyus N. Wood By.
PowerShell Shenanigans Lateral Movement with PowerShell
Cyber vulnerabilities and the threat of attack: Making things better:
IIM Intro What is IIM? An information delivery and management solution. IIM App iPad Client Integration IIM Services Interface IIM Web Account Payment.
Security Innovation & Startup. OPEN THREAT EXCHANGE (OTX): THE HISTORY AND FUTURE OF OPEN THREAT INTELLIGENCE COMMUNITY ALIENVAULT OTX.
POWERSHELL SHENANIGANS KIERAN JACOBSEN HP ENTERPRISE SERVICES.
Lecture 1 Page 1 CS 239, Fall 2010 Distributed Denial of Service Attacks and Defenses CS 239 Advanced Topics in Computer Security Peter Reiher September.
November 19, 2008 CSC 682 Use of Virtualization to Thwart Malware Written by: Ryan Lehan Presented by: Ryan Lehan Directed By: Ryan Lehan Produced By:
Advanced Persistent Threats (APT) Sasha Browning.
HUSKY CONSULTANTS FRANKLIN VALENCIA WIOLETA MILCZAREK ANTHONY GAGLIARDI JR. BRIAN CONNERY.
1 Tactics and Penetration Testing. Overview Tactics: A procedure or set of maneuvers engaged in to achieve an end, an aim, or a goal. Tactics Penetration.
Sky Advanced Threat Prevention
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
Koustav Sadhukhan, Rao Arvind Mallari and Tarun Yadav DRDO, Ministry of Defense, INDIA Cyber Attack Thread: A Control-flow Based Approach to Deconstruct.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Agenda 1 What is Digital Marketing? 2 Why People Are Going Online? 4 What Does Digital Marketing Consists of? 7 Digital Marketing Measurement 3 Benefits.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
CMSC 818J: Privacy enhancing technologies Lecture 2.
An Anatomy of a Targeted Cyberattack
Dropbox: “It Just Works”
Proactive Incident Response
Understanding Cyber Attacks: Technical Aspects of Cyber Kill Chain
IoT Security Part 2, The Malware
Cyber intelligence made easy.
Current State of the Dasvis Project and Ideas for Moving Forward
BMC Integration Service Overview and Architecture
Now, let’s implement/trial Windows Defender Advanced Threat Protection
Alina Oprea Associate Professor, CCIS Northeastern University
A lustrum of malware network communication: Evolution & insights
What is Atlas ? ATLAS is the name of the project that encompasses a range of IOT technologies into outcomes for the Bureau ATLAS is a completely new data.
Defeat Tomorrow’s Threats Today
Intelligence Driven Defense, The Next Generation SOC
Active Cyber Security, OnDemand
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
ADVANCED PERSISTENT THREATS (APTs) - Simulation
Training the Future Cyber Security Specialist: A Novel Approach
2018 Real Cisco Dumps IT-Dumps
Determined Human Adversaries: Mitigations
BRK3277 Making the best of the cloud: How Exchange Online is different from Exchange on-premises Tony
Combining the best of Audit and Penetration Testing
Microsoft powerpoint - google slides - apple keynote
Xutong Chen and Yan Chen
How to build a defense-in-depth
Secure Browsing Because malware usually doesn’t identify itself.
MISSION STRATEGIC DIRECTION
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Soar Agents for Cyberspace 5/15/2018
The Next Generation Cyber Security in the 4th Industrial Revolution
Panda Adaptive Defense Platform and Services
12/6/2018 Honeypot ICT Infrastructure Sashan
Technical Capabilities
Intrusion Detection system
THE HITCHHIKER’S GUIDE TO THREAT RESEARCH.
Agenda Need of Cloud Computing What is Cloud Computing
Determined Human Adversaries: Mitigations
Basic Dynamic Analysis VMs and Sandboxes
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
Threat Landscape Update
Presentation transcript:

Abusing 3rd-Party Services For Command And Control Vince Trune

Vince Trune - @Truneski whoami Vince Trune - @Truneski Electronics Engineer from Jomo Kenyatta University of Agriculture and technology . Red-Teamer and Freelance Penetration Tester. First time AfricaHackon conference presenter (be nice) More into Threat, Emulation and Replication.

About This talk about how attackers can abuse trusted 3rd party services and file sharing services to your detriment and profit.

Intro 3rd party services include social media sites like Twitter and Facebook File sharing sites like DropBox and Google docs.

3rd Party Advantages Social media services are now a necessity for any marketing team, PR team and by extension the technical teams. File Sharing sites are free, easy to use, extremely fast and can be used in conjunction with social media sites. Almost whitelisted and unmonitored traffic in most organizations.

Why Do This Talk Already being used by Advanced Persistent Threats (APTs) in the wild. Give a technical edge to our Red-Team OPs. (Offense fuels Defense) More fun and a tremendous learning experience.

Advanced Persistent Threats

Attacker Infrastructure Paid Cloud Services Digital ocean, AWS, Azure, etc.. Utilize previously compromised infrastructure Hack people to hack other people Utilize 3rd party services and file sharing sites Utilize techniques to bend traffic in “legitimate” ways

Real World Case Studies

Dropbox: Operation BugDrop Targeted Ukraine on a Grand Scale. Prime Motivation for early release of Invoke-DBC2. DropBox for Data Exfiltration and Storing C2 Plugins.

Github: WINNT GANG Github for Command & Control . Financially motivated and engaged in active Cyber-Espionage. Mostly uses Plug-X RAT for its attacks.

Twitter: APT 29 Uses Twitter to control their malware (Hammertoss) Stego over Github for data Exfiltration. Russian State Sponsored Probably.

Current Tools GCat - Shell over gmail Empire 2.0 - Able to do custom C2 modules including 3rd party apps DropSmack - C2 over Dropbox sync folder Instegogram - C2 over Instagram with stego DropBoxC2 - C2 Over Dropbox Invoke-DBC2 – C2 over Powershell and DropBox

Threat Emulation & Replication: My Approach Adversary Emulation Features Uses API for all interaction with the C2 services. AES-128 For Encryption of Communications. PowerShell for client-side(victim) code: Runs in memory, Powerful and Wide Scalability.

Limitations Hard to model and truly emulate the adversarial tactics and techniques Requires considerable skill for a small Red Team Our Proof Of Concepts are easily defeated.

Demos

Defend The Land Invest in your Security Team Endpoint Based: Binary Signature Heuristics(AV) Network Baseline: Timestamp Analysis & Beaconing Establish a Baseline for nodes in the environment Network & Process Correlation & EventLogging Should Powershell be calling out to Twitter’s API

Data Sources to Consider Network PCAP / Span off of core switch and egress DNS logs or passive DNS Netflow Proxy logs Internal Threat Intel (Sandbox Detonation) Endpoint (eventing is best) Process listing events Network connection events DNS lookup events Service add/removal events Program install / uninstall events

APTs are creative and will find ways to use your weaknesses Conclusion APTs are creative and will find ways to use your weaknesses 3rd party services make for quick and easy C2 or exfiltration vectors Detecting the use of 3rd party services for C2 is difficult Requires foundational network collection Attacker activity will often come in a series of behaviors to create a pattern Need to look for anomalous activity

References

Questions