In Dire Straits: Straight Talk on Dyre

Slides:



Advertisements
Similar presentations
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
Advertisements

Supplied on \web site. on January 10 th, 2008 Customer Security Management Reducing Internet fraud June 1 st, 2008 eSAC Walk Thru © Copyright Prevx Limited.
A Software Keylogger Attack By Daniel Shapiro. Social Engineering Users follow “spoofed” s to counterfeit sites Users “give up” personal financial.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
 What is a botnet?  How are botnets created?  How are they controlled?  How are bots acquired?  What type of attacks are they responsible for? 
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
LittleOrange Internet Security an Endpoint Security Appliance.
On the Feasibility of Large-Scale Infections of iOS Devices
What’s New in WatchGuard XCS 10.0 Update 3 WatchGuard Training.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Department Of Computer Engineering
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Security Guidelines and Management
1 E LECTRICAL E NGINEERING AND C OMPUTER S CIENCES U NIVERSITY OF C ALIFORNIA Berkeley Combating Stealth Malware and Botnets in Higher Education Educause.
MIRAGE CPSC 620 Project By Neeraj Jain Hiranmayi Pai.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Course 201 – Administration, Content Inspection and SSL VPN
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
eScan Total Security Suite with Cloud Security
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
資安新聞簡報 報告者:劉旭哲、曾家雄. Spam down, but malware up 報告者:劉旭哲.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
APT29 HAMMERTOSS Jayakrishnan M.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Staying Safe Online Keep your Information Secure.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
IT security By Tilly Gerlack.
Configuring Electronic Health Records Privacy and Security in the US Lecture f This material (Comp11_Unit7f) was developed by Oregon Health & Science University,
Vantage Report 3.0 Product Sales Guide
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Jeong, Hyun-Cheol. 2 Contents DDoS Attacks in Korea 1 1 Countermeasures against DDoS Attacks in Korea Countermeasures against DDoS Attacks in.
1 Operating Systems Security. 2 Where Malware hides ? Autoexec.bat or autoexec.nt can start malware before windows start Config.sys, config.nt Autorun.inf.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Smart Protection Network Kelvin Liu AVP, Core Tech Development.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Module 7: Advanced Application and Web Filtering.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
2012 Malnet Report: Breaking the Vicious Cycle Grant Asplund Senior Technology Evangelist.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 7 EMPLOYMENT CONTRACTS & CODES OF CONDUCT.
Understanding and breaking the cyber kill chain
Managing Windows Security
TMG Client Protection 6NPS – Session 7.
A lustrum of malware network communication: Evolution & insights
Backdoor Attacks.
Jon Peppler, Menlo Security Channels
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

In Dire Straits: Straight Talk on Dyre August 2015 Eric R. Jenko, Senior Security Researcher, CTU

Dyre :: Overview Dyre - a.k.a. “Dyreza”, “Dyzap”, “Dyranges” Emerged early June 2014 after Operation Tovar Evolved to be one of the most prominent banking trojans in circulation Commonly referred to as a “banking trojan” Primarily targets online banking websites to harvest credentials to commit Automated Clearing House (ACH) and wire fraud May be more appropriate to consider it like a web proxy It has the capability to “target” any website At its core, it monitors traffic looking for specific targets When a target is encountered, Dyre intercepts and manipulates the requests and responses

Dyre :: Distribution Vectors UPATRE CUTWAIL SPAM Primarily distributed by spam from the Cutwail botnet Initially via links to Dropbox or Cubby file storage services Later leveraging Lerspeng and, most prominently, Upatre Recent campaigns have used two other downloaders Pony (a.k.a., “Fareit”) and Ruckguv (new) Dyre (similar to Bugat v5) leverages private spam mailers

Dyre :: Architecture and Operation Dyre consists of two modules A dropper and the main DLL (both 32-bit and 64-bit versions) Critical data is stored in the DLL’s resource section Initial config, RSA key, Botnet ID, C2 servers Modified copy is saved to and launched from C:\Windows Registers “Google Update Service” system service for persistence Newer versions are VM-aware – Checks available CPUs Dyre’s persistence mechanism and drop location

Dyre :: Operation :: Connect and Register Dyre checks Google for network connectivity Dyre obtains its external IP address STUN requests to hard-coded servers (Session Traversal Utilities for NAT) Fallback method via icanhazip.com Dyre registers with the C2 and pulls configs/plugins (using SSL) Register the Bot: GET /CAMP_ID/BOT_ID/5/cert/EXT_IP/ Register the OS of the Bot: GET /CAMP_ID/BOT_ID/0/Win_XP_32bit/1023/EXT_IP/ Send “alive” signal: GET /CAMP_ID/BOT_ID/1/FcJgUwyCWvgLPymGiJGwUkwCVcBMmiD/EXT_IP/ Send NAT status: GET /CAMP_ID/BOT_ID/14/NAT/Port%20restricted%20NAT/0/EXT_IP/ CAMP_ID : Campaign ID | BOT_ID : Individual Bot identifier | EXT_IP : External IP Address

Dyre :: Operation :: Config and Plugin Retrieval Web Injects config: GET /CAMP_ID/BOT_ID/5/respparser/EXT_IP/ Web Fakes config: GET /CAMP_ID/BOT_ID/5/httprdc/EXT_IP/ Grabber plugin: GET /CAMP_ID/BOT_ID/5/twgARCH/EXT_IP/ VNC plugin: GET /CAMP_ID/BOT_ID/5/n_vncARCH/EXT_IP/ TV plugin: GET /CAMP_ID/BOT_ID/5/n_tvARCH/EXT_IP/ Back Connect plugin: GET /CAMP_ID/BOT_ID/5/cfg_bc/EXT_IP/ I2P plugin: GET /CAMP_ID/BOT_ID/5/i2pARCH/EXT_IP/ CAMP_ID : Campaign ID | BOT_ID : Individual Bot identifier | EXT_IP : External IP Address | ARCH : Architecture

Dyre :: Operation :: Web Injects Server Injects Bank Page Web Inject Server Config Match Acme Bank Injected Web Page http://acmebank.com/login user:eric pw:password123 Acme Bank HTTP POST: user & pw, browser info, cookies Exfil Server Dyre’s injects happen dynamically at the C2 Allows for greater flexibility and less maintenance Complicates analysis and investigation

Dyre :: Operation :: Web Fakes Web Fake Server Fake Acme Bank Page Config Match Acme Bank Fake Web Page http://acmebank.com/login user: eric pw: password123 Acme Bank Subsequent requests go to Web Fake Server Target site is mimicked and hosted by the threat actors Allows actors to dynamically change site pages and content Complicates analysis and investigation

Dyre :: Command & Control Infrastructure Geographic distribution of Dyre C2 servers (proxy layer) as of December 2014 Dyre uses a proxy layer to hide its backend (true) C2 infrastructure Dyre can fall back on two additional control mechanisms: Domain Generation Algorithm (DGA) 1,000 34-char domains daily for 1 of 8 ccTLDs in Asia & Pac. Islands Invisible Internet Project (I2P) plugin (limited usage)

Dyre :: Best Practices To reduce the risk and impact of compromises: Staff Education/Training: Ensure your organization’s security awareness and training program includes the dangers of email and social engineering and utilizes up-to-date threat intelligence Email Filtering: Where feasible, employ filters and scan the contents of email attachments It’s also advisable to consider blocking email with executable attachments, including those found in archives (ZIP, RAR, etc.) Malware Sandbox Analysis: Such inline technology should conduct automated analysis of hyperlinks and/or attachments within incoming email to gauge potential maliciousness Endpoint System Controls: Endpoint controls should limit users’ ability to open malicious email attachments and prevent malware installation and execution. Keep end-user antivirus, operating system, browser, and other third-party software up to date. Ensure an appropriate level of logging is enabled on hosts and the logs are routinely reviewed for anomalous/malicious activity Network-based Controls: Block I2P traffic at corporate firewalls Apply post-infection controls such as firewall policies, web proxies For additional information on Dyre, please read our Threat Analysis publication: http://www.secureworks.com/cyber-threat-intelligence/threats/dyre-banking-trojan/

Questions? Eric R. Jenko ejenko@secureworks.com