Operación Emmental David Sancho FTR team 5/11/14

Slides:



Advertisements
Similar presentations
HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Supplied on \web site. on January 10 th, 2008 Customer Security Management Reducing Internet fraud June 1 st, 2008 eSAC Walk Thru © Copyright Prevx Limited.
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Investigating Malicious Software Steve Romig The Ohio State University April 2002.
A few simple steps, hints and tips to figure out if it is indeed fake. - By Emily Breuss.
Social Engineering J Nivethan. Social Engineering The process of deceiving people into giving away access or confidential information Onlinne Phone Offline.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Phishing – Read Behind The Lines Veljko Pejović
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Lab 3 Cookie Stealing using XSS Kara James, Chelsea Collins, Trevor Norwood, David Johnson.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
How It Applies In A Virtual World
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Security Issues: Phishing, Pharming, and Spam
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Data Security.
Web Security Tips Li-Chiou Chen & Mary Long Pace University September 1 st, 2010.
Reliability & Desirability of Data
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Getting Started Introduction Section 0 Lecture 1 Slide 1 Section 0 Slide 1 INTRODUCTION TO Modern Physics PHYX 2710 Fall 2004 Intermediate Lab Fall.
Cybersecurity Test Review Introduction to Digital Technology.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
1 UNIT 13 The World Wide Web. Introduction 2 Agenda The World Wide Web Search Engines Video Streaming 3.
Managing Money Workshop The National Autistic Society AGM
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
Computer Security Keeping you and your computer safe in the digital world.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
WHAT THE APP IS THAT? DECEPTION AND COUNTERMEASURES IN THE ANDROID USER INTERFACE.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Chapter 40 Internet Security.
What they are and how to protect against them
Tonga Institute of Higher Education IT 141: Information Systems
An Introduction to Phishing and Viruses
Learn how to protect yourself against common attacks
Unit 4 IT Security.
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
How to use the internet safely and How to protect my personal data?
Authentication 2.0: User Generated Security
Phishing is a form of social engineering that attempts to steal sensitive information.
ADVANCED PERSISTENT THREATS (APTs) - Simulation
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Information Security Session October 24, 2005
Tonga Institute of Higher Education IT 141: Information Systems
Tonga Institute of Higher Education IT 141: Information Systems
What is Phishing? Pronounced “Fishing”
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Wireless Spoofing Attacks on Mobile Devices
Internet Safety By: Ayana Shiggs.
Communicating in the IT Industry
Internet Safety By: Ayana Shiggs.
Week 7 - Wednesday CS363.
Cybersecurity Simplified: Phishing
Presentation transcript:

Operación Emmental David Sancho FTR team 5/11/14 Copyright 2014 Trend Micro Inc.

The Way In… 5/11/14 Copyright 2014 Trend Micro Inc. 2

The Way In… 5/11/14 Copyright 2014 Trend Micro Inc. 3

La entrada First things first, the infection vector we have identified is email. The attackers send spam campaigns localized in the language of the potential victims using brand names that are very identifiable to the people from these countries and in their local language. Screenshot is from an attack directed to people from Switzerland. 5/11/14 Copyright 2014 Trend Micro Inc. 4

One of the innovative social engineering techniques used in this attack is the use of RTF files with the trojan embedded. RTF files are text files so at first glance they might seem innocuous. Microsoft allows for OLE objects to be embedded into them though. The picture shows one such file as used in the attack. Note how Windows uses Wordpad to open these and the user needs to double-click on the trojan, which is disguised as a receipt from the Swiss online shop shown earlier. Also, instead of a regular EXE file, it’s a control panel extension (for more info on these, check the Trend Micro paper on CPL threats). 5/11/14 Copyright 2014 Trend Micro Inc. 5

Upon infection, the trojan just changes the DNS configuration and adds a new certificate in the machine. This means that the trojan is not persistent. It will never run again and therefore we can consider the machine uninfected. If the trojan was not detected immediately by the AV software, it will never have a second chance ever again. [The picture of the cert store is there to convey the sense of how difficult to spot this thing is. It’s impossible to tell it apart] 5/11/14 Copyright 2014 Trend Micro Inc. 6

When the user tries to access his or her online bank, the DNS redirection points them to a malicious server instead. This is very similar to how rove digital had established a rogue DNS server network to redirect hijack advertisements. In this case, the redirections affects only certain online banks in certain countries. This is much more devious and at the same time much more difficult to spot, since the potential victims are much fewer. A infected computer from a different country would never notice any difference at all. Note how the domain name in the screenshot is the real one. The user could end up there by clicking on a real link from google, using a previous browser bookmark or even by typing the name manually. At this point, the attack is a sophisticated case of phishing (i.e: impersonating an online bank web page) 5/11/14 Copyright 2014 Trend Micro Inc. 7

At this point in the attack, the supposed bank page is trying to social-engineer the user into installing an android app to enhance the security of the transaction. The page requires the user to install the app that is supposed to generate unique token as two-factor authentication. The screenshot shows the QR code for this android installation. It also asks for the token generated by this – supposedly secure – android app. 5/11/14 Copyright 2014 Trend Micro Inc. 8

Once the user installs the android app, it generates this token that can be input into the page to continue the banking transaction. Remember that the user is only dealing with the fake banking page so no real transaction is taking place. All this is just theather to distract the user with what is really happening. 5/11/14 Copyright 2014 Trend Micro Inc. 9

Pero qué ocurre en realidad? All this is like a magic trick. The attackers are an illusion to distract the user from what it’s really happening… 5/11/14 Copyright 2014 Trend Micro Inc. 10

The attackers have managed to dupe the victim into installing a rogue android app on the victim’s smartphone AND they convinced the victim to disclose the login details (username and password). Next, they will try to log into the bank. When the real bank site sends an SMS, the rogue app will forward the token to the attackers and hide this from the victim. This will provide the attackers with all they need to perform banking transactions impersonating the victim: username, password and SMS token. 5/11/14 Copyright 2014 Trend Micro Inc. 11

Infraestructura Servidores Hosting Servidores DNS Servidores C&C Troyano Windows Troyano Android Receptor SMS 5/11/14 Copyright 2014 Trend Micro Inc.

Dominios hxxp://security-apps.net/Raiffeisen.apk hxxp://security-apps.biz/Raiffeisen.apk hxxp://tc-zo.ch/security/ZKB.apk 5/11/14 Copyright 2014 Trend Micro Inc.

Oleg Makarov oleg_makarov555@yahoo.com Quién registró esto? This is very likely a fake name. It’s still good info for us to see what the people behind this operation have been up to 5/11/14 Copyright 2014 Trend Micro Inc. 14

Más cosas de Oleg safe-browser.biz safe-time.net security-apps.biz banking-security.net certificate-security.com chromeupd.pw ffupdate.pw ieupdate.pw safe-browser.biz safe-time.net security-apps.biz security-apps.net sfotware.pw softwareup.pw All of these domains have been used for scams and malware-related social engineering. We don’t have further leads at this time as to who might be behind it. 5/11/14 Copyright 2014 Trend Micro Inc. 15

Obnilim rid In the source of the android app, we could find a string “obnilim rid” that could be translated in Russia slang as “set to zero”. We believe the authors are Russian speakers. Due to the decentralized structure of modern cybercrime, this does not necessarily means that Operation Emmental is Russian but whoever is behind, does have connections in the Russian underground. 5/11/14 Copyright 2014 Trend Micro Inc. 16

Our own intelligence gives us hints as to where this threat is coming from. We have seen these domains have been checked repeatedly from IPs from Romania. This possibly means that the owners of Operation Emmental rely on Romanian network operators. The whole thing clearly traces back to Eastern Europe but we cannot be more specific than that. 5/11/14 Copyright 2014 Trend Micro Inc. 17

Copyright 2014 Trend Micro Inc. 5/11/14 Copyright 2014 Trend Micro Inc. 18

Gracias! 19