The Hacking Suite for Governmental Interception Remote Control System The Hacking Suite for Governmental Interception Milan - 23/08/2013
The Building Blocks
Remote Agent Secure Frontend Scalable Backend Infection Vectors
Complete solution, not a toolkit Totally developed by us
Remote agent Your personal 007
Internet Desktop installation Mobile Installation Working offline… Then send data.
What can we collect?
Camera Messages Chat Microphone Contacts Calendars Calls Location Keystrokes Documents Passwords Visited websites And much more… Social -> calendar + contacts
Runs on an event-driven logic Autonomous
Events Actions When crossing the border Every day at midnight On hidden SMS On voice call Actions Start microphone recording Destroy the device Send collected data Take a camera snapshot Social -> calendar + contacts
Many different events and actions Combine them to suit your needs
What if my target is security aware?
Invisible to target user Invisible to antivirus and anti-rootkits Anti-forensic measures Resistant to format and restoration
Evidence on remote device How can we collect it?
Firewalls and proxies are passed through Internet connection Firewalls and proxies are passed through
Open and saved networks WiFi Open and saved networks
Avoid billing the target with custom APN GPRS / UMTS / 3G+ Avoid billing the target with custom APN
Where can I install the Agent?
Enough of features. Let’s see on what devices you can operate the RCS Enough of features. Let’s see on what devices you can operate the RCS. On Windows for sure, so 90% of the desktop market is covered.
Secure Frontend An invisible barrier
Agent is connecting to your servers Your identity must be kept secret
Let’s say we have RCS in one country… And the backdoor in another… Suppose you control a number of server around the world. You may think of forwarding the traffic…
Configurable on-the-fly Evidence stays encrypted
Scalable Backend Your data vault
Scalable by design
Agents x 300 Collector Database
Agents x 10000 Collector 1 Collector 2 … Collector N Database Shard 1 Shard 2 … Shard N
Adding servers is transparent Load balancing is automatic Scale when you need Adding servers is transparent Load balancing is automatic
No database administration required Set & Forget backups Fast restore in 5 minutes
Be informed on interesting events Real-time alerting Be informed on interesting events
Polished graphical console The whole system from a single point
Infection Vectors Deploy your forces
How can I deploy my agent?
When the target opens a document
0-day exploits pack Always up to date
While the target browses the web
Inject into downloaded applications Inject into web pages
Bob’s laptop Internet Web site Network Injector
Send your target an SMS
And many more…
Third-party Integration Combine your weapons
Easily integrate with your monitoring center
Demo time!