MIRAGE CPSC 620 Project By Neeraj Jain Hiranmayi Pai.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

A look into Bullet Proof Hosting November DefCamp 5 Silviu Sofronie – Head of Forensics
MIRAGE MALWARE SIDDARTHA ELETI CLEMSON UNIVERSITY.
By Hiranmayi Pai Neeraj Jain
CHINESE HACKERS. Where do they come from? In 2007 private security firm Mandiant was hired by the New York Times to trace cyber-attacks on their network.
Unit 18 Data Security 1.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Trojan Horse Program Presented by : Lori Agrawal.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Privacy - not readable Permanent - not alterable (can't edit, delete) Reliable - (changes detectable) But the data must be accessible to persons authorized.
IBM Security Network Protection (XGS)
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
1. Introduction The underground Internet economy Web-based malware The system analyzing the post-infection network behavior of web-based malware How do.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber Crime Tanmay S Dikshit.
In Dire Straits: Straight Talk on Dyre
Hacker Zombie Computer Reflectors Target.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
How Web Servers and the Internet Work by by: Marshall Brainby: Marshall Brain
Chapter 8 The Internet: A Resource for All of Us.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 23 How Web Host Servers Work.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 8 Omar Meqdadi Department of Computer Science and Software Engineering University of.
Studying Spamming Botnets Using Botlab 台灣科技大學資工所 楊馨豪 2009/10/201 Machine Learning And Bioinformatics Laboratory.
Topic 5: Basic Security.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Mastering Windows Network Forensics and Investigation Chapter 10: Introduction to Malware.
Malicious Software.
Sky Advanced Threat Prevention
Module 10: Windows Firewall and Caching Fundamentals.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
CSI 3125, Preliminaries, page 1 Networking. CSI 3125, Preliminaries, page 2 Networking A network represents interconnection of computers that is capable.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
The Internet, Fourth Edition-- Illustrated 1 The Internet – Illustrated Introductory, Fourth Edition Unit B Understanding Browser Basics.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
Chapter 1 Real World Incidents Spring Incident Response & Computer Forensics.
Mac OS X backdoor Trojan, now in beta? 報告人:劉旭哲. Introduction It targets users of Mac OS X As even the malware itself admits, it is not yet finished. It.
Koustav Sadhukhan, Rao Arvind Mallari and Tarun Yadav DRDO, Ministry of Defense, INDIA Cyber Attack Thread: A Control-flow Based Approach to Deconstruct.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Understanding Cyber Attacks: Technical Aspects of Cyber Kill Chain
TMG Client Protection 6NPS – Session 7.
Instructor Materials Chapter 7 Network Security
TYPES OF SERVER. TYPES OF SERVER What is a server.
ADVANCED PERSISTENT THREATS (APTs) - Simulation
SPRING DRAGON APT - A CASE STUDY OF TARGETED ATTACKS IN APAC COUNTRIES
Information Security & Privacy
Chap 10 Malicious Software.
Anatomy of a Large Scale Attack
Chap 10 Malicious Software.
Information Security – Sep 18
Presentation transcript:

MIRAGE CPSC 620 Project By Neeraj Jain Hiranmayi Pai

Table of Contents  Introduction  Background  Analysis  Identification of Victims  Threat Factors  Conclusion

Introduction  What is a malware?  What is a “Mirage” malware?

Background  Is linked to the same hackers behind the RSA breach last year [1].  Mirage shares attributes with the malware families JKDDOS and Lingbo  Mirage Trojan targets mid-level to senior-level executives by sending out spear-phishing .`

Analysis  Distribution Vector  Behavior Analysis  Control and Command Server Operations  Variants

Distribution Vector  The spear phishing s contain an attachment that includes a malicious payload that installs a copy of Mirage.  CTU researchers have identified several files that drop and execute a copy of Mirage onto a target system. These "droppers" are designed to look and behave like PDF documents.

Behavior Analysis  There are two main variants of the Mirage Trojan.  Variants are based on the way the trojan communicates with the command and control (C2) servers.  When Mirage executes, the original file copies itself to a folder under C:\Documents and Settings\ \ or C:\Windows\ and then deletes the original file.  CTU researchers have observed the following filenames created after execution: svchost.exe,ernel32.dll, thumb.db, csrss.exe, Reader_SL.exe, MSN.exe

Control and Command Server Operations - 1  Mirage tries to send a system profile by contacting the C2 server using a standard HTTP request.  This profile contains the CPU speed, memory size, system name and username.  It is observed that this communication occurs over ports 80, 443 and 8080

Control and Command Server Operations - 2  Variant 1

Control and Command Server Operations - 3 Raw valuesMirage Raw hex0x4d0x690x720x610x670x65 Raw decimal Encoded decimal Encoded hex 0x4d0x6a0x740x640x6b0x6a Encoded values Mjtdkj

Control and Command Server Operations - 4  The second variant of Mirage uses HTTP GET requests

Variants  Several Mirage variants are customized for specific need, not for widespread targeting.  One of the variant was found configured with the default credentials of the targeted environments web proxy servers.

Identification of Victims

Threat Actors  When investigating the DNS addresses of the C2 servers, CTU researchers identified several IP addresses of hosting companies based in the United States that are running HTran.  In the CTU research team's 2011 analysis of HTran, the software's author was identified as a member of the Chinese hacker group HUC, the Honker Union of China.2011 analysis

Conclusion  Mirage represents only one small piece of malware involved in an ongoing worldwide campaign[2].  The IP addresses of the systems used by hackers to remotely control Mirage-infected machines belong to the China Beijing Province Network (AS4808), as did three of the IP addresses used in the Sin Digoo campaign [3].  For companies in the targeted industries, using active intrusion detection and prevention systems as well as DNS monitoring for malicious domains is essential to detecting this activity.

References 1) intelligence/threats/the-mirage-campaign/ intelligence/threats/the-mirage-campaign/ 2) targets-oil-companies targets-oil-companies 3) pionage_campaign/ pionage_campaign/