Saturday, October 19, 2013

You're Owned and Just Don't Know It. The Malware Obfuscation attack.

Note
NO company listed on this page offers a "Magic Bullet Solution or Tool.  Just wanted to clarify that   FYI.  Some remediation and solution providers are listed at the bottom.

As far as solution providers and tools:  Everyones environment is different, and each requires its own set of tools based on budget, corporate culture, and topology. 


Onward,

  I'm going to ask you a question that I don’t want you to answer.  Just to take a moment and think about it.  Do you think your network is already compromised, and you just haven’t found out about it yet?
That thought probably keeps you up at night, or it should.

“The bad guys” aka The Adversary 
What do they want? This all depends on the threat actor, some just want to see the world burn, what do the rest want?
Many are after Intellectual Property, financial information, destroying company reputation, etc.
Financials
Customer reputation
Money
Contacts
Destruction

Often it’s just a global crimeware kit, and the author discovered he had much more than a user with a bank account, and sells you out to the highest bidder.

The Magic Bullet Solution: 
Organizations from various sectors are spending vast amounts of money on more, and more advanced threats tools.
Managers, CISOs, and CIOs are speaking with vendors or reading articles advertising various tools, which may or may not fit within your companies budget, and the vendors are selling these tools as a "silver bullet solution."
The reality is most organizations already have an arsenal of tools, and not enough staff to review the data that's already being collected, and attempting to monitor their production environment.  These new tools only add more information the analysts cannot ingest, let alone form a picture of what's actually occurring on the network.

The adversary has the same or similar tools, and knows exactly what tools your organization uses, and they know how you use them, against you, and I'll tell you why.  For the single-purpose of staying one-step ahead of these tools, and continuing to perfect their obfuscation techniques.

The Con’s Recon: 
How does an adversary gain information about an organization?
This information is learned using what is called social profiling; this can be accomplished on sites similar to, LinkedIn, Facebook, Twitter, and Google. With the use of these sites an adversary has the ability to track your organization, and create an organizational chart, down to who reports to whom, and which manger reports to which director, and which director reports to which VP, and so forth. This includes phone numbers, email addresses, personal blogs, and through social engineering can even obtain information about where your children go to school, what your personal schedule is, and what packages you're expecting in the mail.
People like to talk about themselves, and they like to blog, tweet, and post on pictures on Facebook showing what they’re doing.  This also can leave geo location information in pictures.  Without proper privacy settings on any of these platforms this information is practically public to the entire world!

The tools of the Trade:
Cree-py
Maltego 
The Harvester
http://checkusernames.com/ Check Usernames - Useful for checking the existence of a given username across 160 Social Networks
Human Intelligence (HUMINT) Methodology always involves direct interaction - whether physical, or verbal.
Gathering is usually done under an assumed identity (remember pretexting?).
Key Employees
Partners/Suppliers
IMINT can also refer to satellite intelligence, (cross over between IMINT and OSINT if it extends to Google Earth and its equivalents).
Covert Gathering - Corporate
On-Location Gathering
Physical security inspections
Wireless scanning / RF frequency scanning
Employee behavior training inspection
Accessible/adjacent facilities (shared spaces)
Dumpster diving
Types of equipment in use
Offsite Gathering
Data center locations
Network provisioning/provider
Foundstone has a tool, named SiteDigger, which allows us to search a domain using specially strings from both the Google Hacking Database (GHDB) and Foundstone Database (FSDB).

How would you enumerate the targets infrastructure without touching it?

Maltego is a program that can be used to determine relationships and real world links between:
People
Groups (Social Networks)
Companies
Organizations
Web Sites
Domains



So again what information do I want with these tools???
Network blocks, and owned ASNs
Email adresses
External infrastructure profile
Technologies used Peremeter tools
Purchase agreements 3rd party vendors
Remote access
Application usage  Browser user agents…
Defense technologies
Human capability

These individual targets are going to be inside your organization, and closest to the data the advisory is trying to gain access, and with the least possible resistance.
This can all be done with a simple phone call to an individual administrative assistant, and actually use the personal information they received on the Internet to use against the victim.  All to make that individual perceive they're giving information to a person they know or trust.
Gain a false sense of trust in order to get the individual target to drop their defenses.

The Delivery
With all this reconnaissance information,  an adversary can build a profile of what tools are being used in your perimeter, what operating systems are used on workstations, and potentially account names, and  even passwords, once again, only using social engineering.

This is the intelligence required to create the perfect RAT , which will be used, once inside the organization.
Exploits can be written, and used against specific operating systems, common applications like browsers, Adobe or Oracle products.  This even includes version each application is using.
Yes social engineering.

With the intelligence gathered on your organization the RAT is packaged up, and all that’s left is a creative method of delivery. Phishing, Watering Hole, Thumb Drive, or in this case a spear phishing attack.
The delivery will most likely make it through your perimeter because the scoring is fairly low, often only choosing a single target to decrease the fidelity of the event from triggering an alert.

Of course this was tested against your perimeter with several previous fake fishing type email probes to several recipients or potentially single-user with nothing more than a URL, and a short message

 The intent is to create a DNS query (roll call) from the link is clicked on.  In reality it was nothing but a harmless http or https request, none of which would cause an alarm by any of your perimeter tools.  This query, would of course, resolve to a local address in a legitimate hosting provider's ASN, and the would be monitored for hits using DNS monitoring tools.

The weaponized email will contain a link that will actually perform an http /GET to download a well-known EK.

It’s the Payload inside this EK that will contain the RAT the adversary created, both making the advanced threat tools and the cyber security department played the fool.
You see the average response will most likely be this was a typical malware campaign, and will most likely end up as a reimaged of the host within a given period of time.

The RAT will use the information gleaned from their “Recon” social engineering phase against your company’s weaknesses.

Once the emails embedded URL is clicked, and the payload is delivered, the dropper EK actually extracts its contents with various premeditated exploits by either embedding them into memory or even a video card.  The exploit could be a utility that spoofs the source of browser updates, or well known exploits targeting Adobe or Oracle products, or just attempts to finds cloud storage with open file shares like Dropbox, or vulnerabilities in your already known operating systems.

The first objective of the RAT has been known and used for a long time with tools like Metasploit or other hacking tools; looking for a jump host.  The adversary wants off this machine and onto another machine as quick as possible (persistence).

At this point there’s no requirement for any command-and-control, thus there's no contact from the RAT.  The communication would be limited to lateral movement and only detected if you use, or have  a solid endpoint security solution.
Now the RAT's objective is to harvest data on the infected machine or machines, and only then make a connection to a predetermined location and exfiltrate using SSL HTTP or FTP.  This exfiltration of data could even be transmitted from several of the jump hosts in a peer-to-peer sharing application, and in several simultaneous garbage looking transmissions like bit torrent.

Remember the RAT is already inside the perimeter.  The adversary is in the squishy center of your network.
The infected hosts can remain silent for as long as the adversary deems fit for sufficient information gathered, and the security department to completely forget the original alert from the first infected host of the phishing infection.

A few days later the victim companies financials, accounts, passwords, intellectual properly,  network topology from critical systems show up on Pastebin or in the media, or sold off to the highest bidder.

A few take away points:

  • Crack SSL if your organization permits it, and understand your egress traffic.
  • Don't take a crimeware kit for face value. Use your Advanced Threat tools but do the Forensics @Volatility is priceless. You might have missed the advanced threat you've been looking for.
  • Stop wasting money on tools that are always one step behind the adversary and always promising, "that feature is in the next release”
  • Find respectable companies that can help find tools to fit your organizations needs and at an affordable price.
  • Use Passive tools to prevent giving away your indicators letting the adversary know you saw them.  Virustotal "search feature",  OpenDNS
  • COLLABORATE  COLLABORATE COLLABORATE with other organizations in your industry.  This is priceless information.  What activity are you both seeing, and put two and two together.
  • RSS research feeds are your friend.  A great project to mention for Security professionals for RSS feeds is The OpenSourceRSSList       
I highly recommend this list for #DFIR #Infosec || research groups like:






Naming a few off the top of my head. Solid research groups!! 
  • Pull out indicators you can use for advance threat detection tools.
  • Find and follow Forensic groups or DFIR.  Their already doing this research for you including cracking XOR, Obfuscation, identifying fake registrar's selling domains to crimeware organizations..   etc.
  • Get HELP.  Stop reading fluff in magazine reviews.  RIGHT tools, and the right advise for your infrastructure!  Accuvant MicroSolved 
  • Most important of all; Have a good incident response plan or IRT.  Know what, and how you're going to recover from this type of breech when it finally hits your organization.


- Jim @RazorEQX  (lacking an editor)

Hope this helps.   In the end we can all #awkwardhug



Friday, October 18, 2013

The OSINT RSS LIST

OSINT RSS LIST 

Is a group of researchers focused on providing creditable new RSS feeds for CERTS, IRT's and Forensic analysts to integrate, mitigate, and remediate threats on the Internet today.  We are a non profit organization with a mission to provide credible, accurate and fast intelligence to the InfoSec community.  
If you wish to have your news feed, research listed on this site send your information on the contact page, and we'll review your material.  Pending a review, we'll add your feeds to our RSS list.  
The RSS lists is updated weekly (or when there is enough new material) so check back often.  The current version is 5.0.


http://opensourcerss.net/opensourcerss.net.html

If you're Interested In OSINT you might want to check out their RSS feeds.  

Wednesday, October 16, 2013

Sadistic torture of of a pre-op surgery researcher

 
  Not sure if its the meds for the pain before this upcoming surgery or just plain torture.
Twice now Ive awoke at 3am with a great idea for a research paper,  and then come to the realization  it hurts like hell to type so i’ll just go back to bed..
Six more days and a wakeup.


-R

Thursday, October 10, 2013

Untangle 10.0 Open Question & Answer Session


Untangle 10.0
If you have a friend or family thats not very technical, or you're just looking for a cheap firewalls solution with lots of features, I highly recommend this product.  I use this product at home and Its simple to setup and administrate and doesn't require much as far as a system to run it on.  Just need a box with two nic cards and the .iso is a self install.  Its nice and graphical.  Looks a bit like a rack mount and you drag over the services as blades into the rack you want to add.  Best of all its Free.    






How does your brand compare?

UntangleBarracudaFortinetSonicWALLSophos
Basic UTMYesYesYesYesYes
Content FilteringYesAdd-OnYesYesYes
Spam FilteringYesAdd-OnYesAdd-OnYes
Network PerformanceYesNoNoNoNo
Remote AccessYesAdd-OnAdd-OnAdd-OnYes
Live SupportYesAdd-OnYesAdd-OnYes
No-Hassle BuyingYesYesNoNoNo

They also have an upcoming Q&A 

Join Untangle Engineering, Technical Support and Sales for an open question & answer session about our latest release, Untangle 10.0.
We'll answer your questions live for as long as time allows. If you can't attend the session, please register anyway. We'll send you a recording after the webinar concludes.

Title:
Untangle 10.0 Open Question & Answer Session
Date:
Thursday, October 17, 2013
Time:
10:00 AM - 10:45 AM PDT

After registering you will receive a confirmation email containing information about joining the Webinar.

System Requirements
PC-based attendees
Required: Windows® 8, 7, Vista, XP or 2003 Server

Mac®-based attendees
Required: Mac OS® X 10.6 or newer


Mobile attendees
Required: iPhone®, iPad®, Android™ phone or Android tablet

Linux – We apologize that GoToWebinar does not support Linux at this time. We continue to pressure http://www.untangle.com/store/firewall.htmlthem to do so.

Wednesday, October 9, 2013

Sourcefire - Feel the FIRE Power!

FirePOWER network security appliances are based on a flexible enterprise security architecture to deliver industry-best threat protection and low total cost of ownership with unmatched performance, scalability and energy efficiency. Sourcefire FirePOWER network security appliances are the foundation for Sourcefire’s entire portfolio of network security solutions.
Optimized for network security processing, FirePOWER packs unmatched performance into a smaller footprint, leading the market in energy efficiency as evidenced by NSS Labs’ Network IPS Individual Product Test Results for the FirePOWER 8260 and NSS Labs NGFW Individual Product Test Results for the FirePOWER 8290. Unparalleled throughput speeds from 50Mbps up to 40Gbps for threat inspection along with 150 microsecond latency, address the widest range of enterprise requirements. FirePOWER delivers this breakthrough performance with purpose-built hardware acceleration technology and by leveraging three separate data processing stages, each custom designed for particular workloads

FirePOWER received top ranking in NSS Labs’ 2012 Security Value Map for IPS and in NSS Labs’ 2013 Security Value Map for NGFW which measures security effectiveness and TCO.
Flexible Security Architecture
FirePOWER delivers a flexible, enterprise security architecture with the capability to expand and run varied and diverse security functions, including:
8000 Series
The higher-end 8000 Series appliances marry an extensible platform with the industry’s fastest and most accurate IPS inspection to fit into your network today and in the future.
  • 7 different IPS throughputs models from 2Gbps to 40Gbps
  • Network modules in 9 configurations to support fiber and copper with integrated fail-open/bypass and non-bypass capabilities
The FirePOWER 8260 achieved breakthrough results in NSS Labs testing with real-world traffic mixes and practical IPS policies applied.
Sourcefire 8260Next-closest Competitor
NSS-tested, Real-world Throughput27.6Gbps11.5Gbps
Price/Mbps-Protected$19$33
Annual Energy Cost/Mbps$0.04$0.06
Gbps/Rack Unit6.9Gbps2.9Gbps

Source: NSS Labs Network IPS Individual Product Test Results, Sourcefire 8260 IPS Appliance, April 2011; and NSS Labs Network IPS Group Test, Q4 2010.
Access your free copy of the 2012 NSS Labs Network IPS Individual Product Test Results for the FirePOWER 8260.
The FirePOWER 8290 excelled in NSS Labs testing with real-world traffic mixes and NGFW methodology applied.
Access your free copy of the 2013 NSS Labs Next-Generation Firewall Product Analysis Report for the FirePOWER 8290.
7000 Series
The 7000 Series supports lower network performance requirements, eliminating over-buying while gaining the same standardized features and management ease as the 8000 Series appliances.
With 7 different throughput models (from 50Mbps to 1.25Gbps) and up to 12 available ports to support mixed media, the 7000 Series shares the following features with the 8000 Series:
Solid state storageSimplified command line interface
Integrated lights out managementSimplified command line interface
LCD displays and control panelProgrammable fail-open interfaces
SNMP monitoringRedundant power supplies

Sourcefire 8260Next-closest Competitor
NSS-tested, Real-world Throughput27.6Gbps11.5Gbps
Price/Mbps-Protected$19$33
Annual Energy Cost/Mbps$0.04$0.06
Gbps/Rack Unit6.9Gbps2.9Gbps

Source: NSS Labs Network IPS Individual Product Test Results, Sourcefire 8260 IPS Appliance, April 2011; and NSS Labs Network IPS Group Test, Q4 2010.
7000 Series

Data Sheet

The 7000 Series supports lower network performance requirements, eliminating over-buying while gaining the same standardized features and management ease as the 8000 Series appliances.
With 7 different throughput models (from 50Mbps to 1.25Gbps) and up to 12 available ports to support mixed media, the 7000 Series shares the following features with the 8000 Series:
Solid state storageSimplified command line interface
Integrated lights out managementSimplified command line interface
LCD displays and control panelProgrammable fail-open interfaces
SNMP monitoringRedundant power supplies