Download presentation
Presentation is loading. Please wait.
Published byCordelia Page Modified over 9 years ago
1
A practical overview on how the bad guys adopt and circumvent security initiatives Commercial – in - Confidence Alex Shipp Imagineer
2
Commercial – in - Confidence One of the most successful rootkits Features It steals user private and confidential information (form grabber) can inject arbitrary HTML code into any website (also encrypted websites) can steal certificates will take screenshots to defeat virtual keyboards backconnect feature (SOCKS, BackConnect, VNC) Everything is encrypted
3
Commercial – in - Confidence Enhanced Zeus v2 core engine Able to infect Mozilla Firefox Able to infect Windows Vista and Windows 7 ▪ They do everything in user-mode (!) New Encryption method Details in the TrustDefender Labs report
4
Commercial – in - Confidence Zeus supports a plugin style infrastructure New BackConnect mechanism ▪ E.g. Real-time notification via IM once a victim is online ▪ SOCKS / VNC works even behind NAT Extensive Javascript engine that can be plugged into Zeus v1 or Zeus v2
5
Commercial – in - Confidence Dramatically increased functionality with javascript code where they can harvest any challenge/response and/or token values in real-time and in a more interactive way. Allows bypass of nearly all challenge mechanisms (e.g. SMS/email/VRU OOB, token, secret questions/answers, elaborate challenge/response)
6
Commercial – in - Confidence Observations No “static” HTML injections anymore Nothing happens until after the login Dynamic connection to C&C server ▪ Send/receive data within one webpage ▪ transparent to the Webbrowser Dynamic content delivery ▪ E.g. After compromise, they return “24h maintenance” page But let’s have a look
7
Commercial – in - Confidence
15
As well as manipulating user-supplied content, they can also access system supplied content. Bad news if you “encrypt” the password on the client side Zeus can just inject code into your JavaScript files (!)
16
Commercial – in - Confidence Watch the download of the loginPin.js And once it’s downloaded...
17
Commercial – in - Confidence
18
BackConnect feature via SOCKS or VNC Undermines any device fingerprinting
19
Commercial – in - Confidence Drive-by attacks PDF, Flash or any other software Phishing attacks Heavily geo based distribution This is done via a flash object that calls URLMON.DLL.URLDownloadToFileA to save http:// >/l.php?i=18 locally to pdfupd.exe and then execute it with WinExec More details in the next TrustDefender Labs Report
20
Commercial – in - Confidence Mebroot is by far the most successful rootkit that is able to stay under the radar Technically sophisticated, but also very clever We know that they could infect much more machines, but don’t do so Bad news: They have a comprehensive javascript engine as well However not used yet (AFAWK)
21
Commercial – in - Confidence Sizzler CSS Selector Engine If it looks scary, it is scary Watch out for simple device authentication
22
Commercial – in - Confidence Phishing still works (!) Real world example Bank uses transactional 2FA hardware tokens Phishing site asks for login credentials + private phone number Fraudsters ring the customer and tell him that his account got compromised (which is true!) and tell him that in order to get it reconnected, they should enter the following number into their token and confirm the reply!
23
Commercial – in - Confidence ... is the R&D arm of TrustDefender TrustDefender is a online-transaction security solution providing Real-time customer endpoint risk-assessment & protection for online transactions More info http://www.trustdefender.com/blog http://www.trustdefender.com/blog
24
Commercial – in - Confidence Bad guys adopt heavily Protect all parts of the chain. If one breaks, the chain is broken
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.