Showing posts with label Security news. Show all posts
Showing posts with label Security news. Show all posts

Friday, 9 September 2016

SMS for 2-Factor Authentication can be compromised

2-AF bypass

Earlier this year in May 2016, the National Institute of Standards and Technology (NIST) published a guideline recommending the depreciation of SMS authentication as the second factor for strong authentication. NIST has recommended other forms of two-factor such as time-base one-time passwords generated by mobile apps — over text messaging.

In SMS-based two-factor authentication (2FA), a user must confirm the intended login or transaction by entering an OTP sent to their mobile phone — typically, a four- to eight-digit numerical code. This authentication method was once believed to protect against man-in-the-middle (MitM) attacks until security professionals realized that text messages can be intercepted by fraudsters easily.

If a mobile phone is compromised due to some malware, a fraudster can command the malware to monitor text messages, including OTPs, mobile SIM swaps, SIM clones, number porting attacks, fake caller ID and call forwarding scams which are operated by customer service representatives.

But 2FA has a major problem with also phones which have not been corrupted. Since encryption is not applied to short message transmission by default, messages could be intercepted and snooped during transmission, even if the receiving device wasn’t infected by malware. Moreover, SMS are stored in plaintext by short message service center (SMSC) before they are successfully delivered to the intended recipient. These messages can be seen by anyone in SMSC and there are spying programs too like FlexiSpy which enable intruders to automatically record all incoming and outgoing SMS messages and then upload the logs to a remote server for later viewing and analysis.

This method will fool a decent percentage of users who have enabled text messages as a form of two-factor authentication. Certainly, text messaging isn’t the strongest form of 2-factor authentication, but it is better than allowing a login with nothing more than a username and password, as this scam illustrates. For this reason, most companies haven’t urgently migrated to other authentication methods.

Other safer options like push-to-approve to biometrics, such as fingerprint scans, retina scans or even voice recognition will take time. Google recently went a step further by debuting a new “push” authentication system that generates a prompt on the user’s mobile device that users need to tap to approve login requests.

But presently, the need of the hour is that websites should make user-friendly password policies and put the burden on verifier. It’s important that the users are not asked every time to improve their security by changing the passwords frequently because they are not improving it.
2-AF bypass

Earlier this year in May 2016, the National Institute of Standards and Technology (NIST) published a guideline recommending the depreciation of SMS authentication as the second factor for strong authentication. NIST has recommended other forms of two-factor such as time-base one-time passwords generated by mobile apps — over text messaging.

In SMS-based two-factor authentication (2FA), a user must confirm the intended login or transaction by entering an OTP sent to their mobile phone — typically, a four- to eight-digit numerical code. This authentication method was once believed to protect against man-in-the-middle (MitM) attacks until security professionals realized that text messages can be intercepted by fraudsters easily.

If a mobile phone is compromised due to some malware, a fraudster can command the malware to monitor text messages, including OTPs, mobile SIM swaps, SIM clones, number porting attacks, fake caller ID and call forwarding scams which are operated by customer service representatives.

But 2FA has a major problem with also phones which have not been corrupted. Since encryption is not applied to short message transmission by default, messages could be intercepted and snooped during transmission, even if the receiving device wasn’t infected by malware. Moreover, SMS are stored in plaintext by short message service center (SMSC) before they are successfully delivered to the intended recipient. These messages can be seen by anyone in SMSC and there are spying programs too like FlexiSpy which enable intruders to automatically record all incoming and outgoing SMS messages and then upload the logs to a remote server for later viewing and analysis.

This method will fool a decent percentage of users who have enabled text messages as a form of two-factor authentication. Certainly, text messaging isn’t the strongest form of 2-factor authentication, but it is better than allowing a login with nothing more than a username and password, as this scam illustrates. For this reason, most companies haven’t urgently migrated to other authentication methods.

Other safer options like push-to-approve to biometrics, such as fingerprint scans, retina scans or even voice recognition will take time. Google recently went a step further by debuting a new “push” authentication system that generates a prompt on the user’s mobile device that users need to tap to approve login requests.

But presently, the need of the hour is that websites should make user-friendly password policies and put the burden on verifier. It’s important that the users are not asked every time to improve their security by changing the passwords frequently because they are not improving it.

Sunday, 27 March 2016

Billions at Risk of Computer Hack due to Wireless Mouse

Bastille Networks, a startup cyber security company that looks to better patrol wireless traffic has discovered a flaw that could possibly allow hackers to attack and take over computers using a wireless mouse connection, which could leave millions of networks and billions of computers vulnerable to attack.
The cyber security firm said Wednesday that while Bluetooth devices are not vulnerable for the same kind of attack, wireless mouse and keyboards using radio communication protocols operating in the 2.4 GHz ISM band are subject to hacking from up to 100 meters away.
The security researchers, Marc Newlin and Balint Seeber at Bastille Networks found that wireless mouse made by the likes of HP, Dell, Lenovo, and Amazon could be security risks as they use unencrypted signals to communicate with computers. In other words, the seemingly innocent-looking wireless mouse could actually be a way for hackers to break into your computer.
“They haven’t encrypted the mouse traffic that makes it possible for the attacker to send unencrypted traffic to the dongle pretending to be a keyboard and have it result as keystrokes on your computer. This would be the same as if the attacker was sitting at your computer typing on the computer,” said Newlin.
A hacker uses an antenna, a wireless chip called a dongle, both available for less than $20 (USD), and a simple line of code to trick the wireless chip connected to the target computer into accepting it as a mouse.
“So the attacker can send data to the dongle, pretend it’s a mouse but say ‘actually I am a keyboard and please type these letters’,” added Newlin.
“If we sent unencrypted keyboard strokes as if we were a mouse it started typing on the computer, typing at a 1000 words per minute,” said Chris Rouland, the CTO and Founder of Bastille.
The hacker can take over the computer or gain access to a network due to the vulnerability of the wireless mouse within seconds.
Rouland says that while companies are very good at encrypting and protecting their networks and websites, they do not reimburse for all cyber traffic across the whole radio spectrum. He says it’s time to re-think cyber security, particularly in the world where smart phones are capable of transferring huge amounts of data per second.
“No one was looking at the air space. So I wanted to build this cyber x-ray vision to be able to see what was inside a corporation’s air space versus what was just plugged into the wired network or what was on a Wifi hotspot,” said Rouland.
Bastille is hoping to cash in on its security error findings and provide new types of sensors that take into consideration more of the dangers present in a wireless world.
Meanwhile, Bastille is keeping a check on the wireless mouse problem. Some companies are beginning to provide firmware updates to correct the security issues pointed out the company.
Bastille Networks, a startup cyber security company that looks to better patrol wireless traffic has discovered a flaw that could possibly allow hackers to attack and take over computers using a wireless mouse connection, which could leave millions of networks and billions of computers vulnerable to attack.
The cyber security firm said Wednesday that while Bluetooth devices are not vulnerable for the same kind of attack, wireless mouse and keyboards using radio communication protocols operating in the 2.4 GHz ISM band are subject to hacking from up to 100 meters away.
The security researchers, Marc Newlin and Balint Seeber at Bastille Networks found that wireless mouse made by the likes of HP, Dell, Lenovo, and Amazon could be security risks as they use unencrypted signals to communicate with computers. In other words, the seemingly innocent-looking wireless mouse could actually be a way for hackers to break into your computer.
“They haven’t encrypted the mouse traffic that makes it possible for the attacker to send unencrypted traffic to the dongle pretending to be a keyboard and have it result as keystrokes on your computer. This would be the same as if the attacker was sitting at your computer typing on the computer,” said Newlin.
A hacker uses an antenna, a wireless chip called a dongle, both available for less than $20 (USD), and a simple line of code to trick the wireless chip connected to the target computer into accepting it as a mouse.
“So the attacker can send data to the dongle, pretend it’s a mouse but say ‘actually I am a keyboard and please type these letters’,” added Newlin.
“If we sent unencrypted keyboard strokes as if we were a mouse it started typing on the computer, typing at a 1000 words per minute,” said Chris Rouland, the CTO and Founder of Bastille.
The hacker can take over the computer or gain access to a network due to the vulnerability of the wireless mouse within seconds.
Rouland says that while companies are very good at encrypting and protecting their networks and websites, they do not reimburse for all cyber traffic across the whole radio spectrum. He says it’s time to re-think cyber security, particularly in the world where smart phones are capable of transferring huge amounts of data per second.
“No one was looking at the air space. So I wanted to build this cyber x-ray vision to be able to see what was inside a corporation’s air space versus what was just plugged into the wired network or what was on a Wifi hotspot,” said Rouland.
Bastille is hoping to cash in on its security error findings and provide new types of sensors that take into consideration more of the dangers present in a wireless world.
Meanwhile, Bastille is keeping a check on the wireless mouse problem. Some companies are beginning to provide firmware updates to correct the security issues pointed out the company.

Wednesday, 2 March 2016

Pentagon invites hackers in and backs encryption

Ash CarterImage copyrightGetty Images
Image captionThe US defence secretary invited hackers to help find security holes
The Pentagon has invited external experts to hack into its systems in the first such test of its cybersecurity measures.
The method is often used by private companies that want to use the expertise of "friendly" hackers to find holes in their systems.
It came after the US defence secretary backed strong encryption amid the FBI's phone unlocking row with Apple.
Ash Carter called on tech firms and the US government to work together.
The US Department of Defense launched its Hack the Pentagon project on Wednesday, inviting vetted outside hackers to test the security of some of its public websites.
According to the Reuters news agency, the programme will be modelled on the hacking bounties often run by firms, in which experts are offered incentives to identify and report security issues. The Pentagon said it was also considering offering financial rewards.

'Digital defences'

"I am confident that this innovative initiative will strengthen our digital defences and ultimately enhance our national security," Mr Carter said.
The Pentagon has long tested its own networks using internal so-called "red teams" but this initiative - the first such scheme to be run by the US federal government - would open at least some of its vast network of computer systems to cyberchallenges from across industry and academia.
However, the Pentagon said that other more sensitive networks or key weapons programs would not be included in the scheme, at least initially. "The goal is not to comprise any aspect of our critical systems, but to still challenge our cybersecurity in a new and innovative way," one senior defence official told Reuters.
The official said they expected thousands of qualified participants to sign up ahead of the pilot scheme's opening in April.
James ComeyImage copyrightGetty Images
Image captionFBI director James Comey appeared before Congress amid his bureau's encryption battle with Apple
During a visit to Silicon Valley on Tuesday, Mr Carter underscored the US military's support for data security and strong encryption. Speaking on the day that bothApple and the FBI appeared before the US congress over the former's refusal to help the latter overcome an iPhone's encryption protection, he said that the Pentagon viewed strong encryption as critical.
Reuters reported that Mr Carter declined to address a live case directly and said that no one case should drive policy decisions. But he did call for greater co-operation between Silicon Valley and Washington on data security.
He said that a failure to work together would allow China, Russia and others who he said did not favour a free internet to set new global standards, according to the news agency.
"We shouldn't let the solutions to this larger issue of how to handle data security as a society be driven by any one particular case," Mr Carter told reporters after a speech to the Commonwealth Club of San Francisco. "It would be unreasonable."
In his speech, Mr Carter said: "It is easy to see wrong ways to do this. One would be a law hastily written in anger or grief. Another would be to have the rules be written by Russia or China."
EncryptionImage copyrightGetty Images
Image captionEncryption has become a battleground between tech firms and governments
On the same day, it was announced that the Turing Award had been given to a pair of cryptographers whose ideas helped make the internet possible.
According to the Associated Press, the recipients - Whitfield Diffie, a former chief security officer of Sun Microsystems, and Martin Hellman, a professor emeritus of electrical engineering at Stanford University - said that giving governments control over encrypted communications would put everyone at risk.
The pair were chosen for the $1m (£700,000) award for contributions to computing for the ideas of public-key cryptography and digital signatures, which they introduced in 1976.
The concepts now secure all kinds of data, from online communications and financial transactions to internet-connected infrastructure like power plants, the AP agency reported.
Ash CarterImage copyrightGetty Images
Image captionThe US defence secretary invited hackers to help find security holes
The Pentagon has invited external experts to hack into its systems in the first such test of its cybersecurity measures.
The method is often used by private companies that want to use the expertise of "friendly" hackers to find holes in their systems.
It came after the US defence secretary backed strong encryption amid the FBI's phone unlocking row with Apple.
Ash Carter called on tech firms and the US government to work together.
The US Department of Defense launched its Hack the Pentagon project on Wednesday, inviting vetted outside hackers to test the security of some of its public websites.
According to the Reuters news agency, the programme will be modelled on the hacking bounties often run by firms, in which experts are offered incentives to identify and report security issues. The Pentagon said it was also considering offering financial rewards.

'Digital defences'

"I am confident that this innovative initiative will strengthen our digital defences and ultimately enhance our national security," Mr Carter said.
The Pentagon has long tested its own networks using internal so-called "red teams" but this initiative - the first such scheme to be run by the US federal government - would open at least some of its vast network of computer systems to cyberchallenges from across industry and academia.
However, the Pentagon said that other more sensitive networks or key weapons programs would not be included in the scheme, at least initially. "The goal is not to comprise any aspect of our critical systems, but to still challenge our cybersecurity in a new and innovative way," one senior defence official told Reuters.
The official said they expected thousands of qualified participants to sign up ahead of the pilot scheme's opening in April.
James ComeyImage copyrightGetty Images
Image captionFBI director James Comey appeared before Congress amid his bureau's encryption battle with Apple
During a visit to Silicon Valley on Tuesday, Mr Carter underscored the US military's support for data security and strong encryption. Speaking on the day that bothApple and the FBI appeared before the US congress over the former's refusal to help the latter overcome an iPhone's encryption protection, he said that the Pentagon viewed strong encryption as critical.
Reuters reported that Mr Carter declined to address a live case directly and said that no one case should drive policy decisions. But he did call for greater co-operation between Silicon Valley and Washington on data security.
He said that a failure to work together would allow China, Russia and others who he said did not favour a free internet to set new global standards, according to the news agency.
"We shouldn't let the solutions to this larger issue of how to handle data security as a society be driven by any one particular case," Mr Carter told reporters after a speech to the Commonwealth Club of San Francisco. "It would be unreasonable."
In his speech, Mr Carter said: "It is easy to see wrong ways to do this. One would be a law hastily written in anger or grief. Another would be to have the rules be written by Russia or China."
EncryptionImage copyrightGetty Images
Image captionEncryption has become a battleground between tech firms and governments
On the same day, it was announced that the Turing Award had been given to a pair of cryptographers whose ideas helped make the internet possible.
According to the Associated Press, the recipients - Whitfield Diffie, a former chief security officer of Sun Microsystems, and Martin Hellman, a professor emeritus of electrical engineering at Stanford University - said that giving governments control over encrypted communications would put everyone at risk.
The pair were chosen for the $1m (£700,000) award for contributions to computing for the ideas of public-key cryptography and digital signatures, which they introduced in 1976.
The concepts now secure all kinds of data, from online communications and financial transactions to internet-connected infrastructure like power plants, the AP agency reported.

Thursday, 28 January 2016

Banks want tech giants to sign mobile security code

Demonstration of Apple Pay being used on an iPhone at its launch in late 2014. Its popularity waned in 2015 as it suffered high fraud rates. Photo: Supplied

Banks and payment companies are nutting out a new security protocol for digital wallets in Australia to avoid a repeat of the spike in identity theft when Apple Pay was introduced in the US.
Members of the Australian Payments Clearing Association – which includes banks, credit card companies and payments networks – are worried tech companies, including Google, Apple and Samsung, do not have to adhere to the same security and privacy requirements for customer information as they do.
Its 100 members, as well as regulators ASIC, the Reserve Bank, APRA and the ACCC, are due to respond to a private consultation draft of a Third Party Digital Wallet Security Code by the end of January.
"Australian financial institutions are subject to prudential regulation and ongoing supervision in relation to their privacy compliance. Mobile wallet providers are not subject to the same level of ongoing supervision," the consultation paper says
Google, Apple and Samsung are not members of APCA and would be required to sign the voluntary code for it to be enforceable, even though the underlying payment systems they are using are APCA members.
Apple Pay launched with American Express in Australia in November and Android Pay should be available here by April.
Several banks – including Commonwealth Bank and Westpac in 2015 and NAB on Monday – have released their own digital wallets. But the software and phone makers wallets are expected to be more popular as any card can be used on them.
The APCA consultation paper says Apple Pay was adopted quickly when it was first released in the US in October 2014, with 25 per cent of respondents to a survey in April 2015 by Clearing House saying they had Apple's mobile wallet app on their phones. A follow up survey in July found this had dropped to 13 per cent. The biggest reason cited for the drop was poor security.

Stolen credit card numbers

The decline followed reports of people using stolen credit card numbers and US social security numbers – which can be bought on the "dark market" online for as little as $US1 each – as proof of identity when loading their iPhones with card details.
Fraud rates were reportedly up to 6 per cent on Apple Pay, compared with around 0.1 per cent for in-person transactions on cards.
As well as lax practices at banks, the banks complained Apple didn't provide enough data on the phone owner to check identity.
Some say mobile devices connected to the internet are more vulnerable to fraud. Online fraud is much higher than "card present fraud" because numbers can be stolen and quickly used to buy things online. Without strict ID checks, a stolen card number can be added to a mobile device as easily as a website.
APCA's 2015 financial year statistics show online transactions account for 80 per cent of all card fraud and this rose by more than 25 per cent in the year to June from $256.5 million to $322.7 million.
Ryan Yuzon, a director of bank consultant RFi, said US banks initially were slack about checking the identity of the user. Most now check that the phone number is registered to the same person as the card, as well as making other checks. As a result, fraud rates have declined, but he agreed this could change as mobile devices replaced plastic.
"[Contactless] on the phone seems to offer a bridge for fraud perpetrated at the physical point of sale using stolen card numbers, rather than being limited to card-not-present payments."
The digital wallet code, however, endorses existing methods of identification. Banks here require several documents, including passport or drivers licence numbers as well as salary and bank statements and employment details. Instead, it says the device and software makers should have identification and verification methods as strong as the banks.
It would also make it compulsory to use a new security measure called tokenisation of card numbers if the device providers are not using security chips embedded in the phone or SIM card, which is considered as safe as present chip cards.
Several new tokenisation methods store the tokens in software, which are considered more vulnerable to hacking.                              

Demonstration of Apple Pay being used on an iPhone at its launch in late 2014. Its popularity waned in 2015 as it suffered high fraud rates. Photo: Supplied

Banks and payment companies are nutting out a new security protocol for digital wallets in Australia to avoid a repeat of the spike in identity theft when Apple Pay was introduced in the US.
Members of the Australian Payments Clearing Association – which includes banks, credit card companies and payments networks – are worried tech companies, including Google, Apple and Samsung, do not have to adhere to the same security and privacy requirements for customer information as they do.
Its 100 members, as well as regulators ASIC, the Reserve Bank, APRA and the ACCC, are due to respond to a private consultation draft of a Third Party Digital Wallet Security Code by the end of January.
"Australian financial institutions are subject to prudential regulation and ongoing supervision in relation to their privacy compliance. Mobile wallet providers are not subject to the same level of ongoing supervision," the consultation paper says
Google, Apple and Samsung are not members of APCA and would be required to sign the voluntary code for it to be enforceable, even though the underlying payment systems they are using are APCA members.
Apple Pay launched with American Express in Australia in November and Android Pay should be available here by April.
Several banks – including Commonwealth Bank and Westpac in 2015 and NAB on Monday – have released their own digital wallets. But the software and phone makers wallets are expected to be more popular as any card can be used on them.
The APCA consultation paper says Apple Pay was adopted quickly when it was first released in the US in October 2014, with 25 per cent of respondents to a survey in April 2015 by Clearing House saying they had Apple's mobile wallet app on their phones. A follow up survey in July found this had dropped to 13 per cent. The biggest reason cited for the drop was poor security.

Stolen credit card numbers

The decline followed reports of people using stolen credit card numbers and US social security numbers – which can be bought on the "dark market" online for as little as $US1 each – as proof of identity when loading their iPhones with card details.
Fraud rates were reportedly up to 6 per cent on Apple Pay, compared with around 0.1 per cent for in-person transactions on cards.
As well as lax practices at banks, the banks complained Apple didn't provide enough data on the phone owner to check identity.
Some say mobile devices connected to the internet are more vulnerable to fraud. Online fraud is much higher than "card present fraud" because numbers can be stolen and quickly used to buy things online. Without strict ID checks, a stolen card number can be added to a mobile device as easily as a website.
APCA's 2015 financial year statistics show online transactions account for 80 per cent of all card fraud and this rose by more than 25 per cent in the year to June from $256.5 million to $322.7 million.
Ryan Yuzon, a director of bank consultant RFi, said US banks initially were slack about checking the identity of the user. Most now check that the phone number is registered to the same person as the card, as well as making other checks. As a result, fraud rates have declined, but he agreed this could change as mobile devices replaced plastic.
"[Contactless] on the phone seems to offer a bridge for fraud perpetrated at the physical point of sale using stolen card numbers, rather than being limited to card-not-present payments."
The digital wallet code, however, endorses existing methods of identification. Banks here require several documents, including passport or drivers licence numbers as well as salary and bank statements and employment details. Instead, it says the device and software makers should have identification and verification methods as strong as the banks.
It would also make it compulsory to use a new security measure called tokenisation of card numbers if the device providers are not using security chips embedded in the phone or SIM card, which is considered as safe as present chip cards.
Several new tokenisation methods store the tokens in software, which are considered more vulnerable to hacking.                              

Friday, 8 January 2016

Ukrainian blackout caused by hackers that attacked media company, researchers say

Power company suffered a major attack that led to blackouts across western Ukraine, after an attack on a Ukrainian media company
Smokestacks in Dniprodzershynsk, Ukraine.
A power blackout in Ukraine over Christmas and a destructive cyberattack on a major Ukrainian media company were caused by the same malware from the same major hacking group, known as Sandworm, according to security researchers at Symantec.
The blackout, which affected large parts of western Ukraine, is believed to be the first example of a power outage deliberately caused by a hacking attack. The country’s state intelligence agency, the SBU, attributed the attacks to state-sponsored hackers from Russia. If true, that would link the hacking of the power grid to the general escalation of cyberwarfare between the two nations in the aftermath of the invasion of Crimea.
That attribution was strengthened by the revelation that the hacking of power company Prykarpattyaoblenergo was carried out using malware substantially similar to an earlier attack, which affected the computers of a Ukranian media company in late October 2015.
Symantec researchers say that initially, a computer at the media company was compromised by malware called “BlackEnergy”. “The attackers appear to have used this infection to retrieve administrator credentials and used them to execute Disakil [a second type of Malware] on a number of computers. Communication from these computers halted after Disakil was executed, suggesting that it succeeded in wiping them and rendering them inoperable.
“The group behind the BlackEnergy Trojan is known as Sandworm and has a history of targeting organizations in Ukraine. It has also been known to attack Nato, a number of western European countries, and companies operating in the energy sector.”
The same malware was implicated in the attack on the country’s power grid,according to Robert Lee of information security firm Sans, who wrote that “if the malware does end up being related to the BlackEnergy2 campaign then this adds to the possibility that the facility … was specifically targeted”.
Advertisement
The link to BlackEnergy was backed up by Eugene Bryskin, of the Ukrainian government’s Computer Emergency Response Team. Bryskin told Forbes that Sans’ suspicions were accurate, particularly the link to BlackEnergy.
Hacking attacks on physical infrastructure have long been a concern among the security community, but have been rarely seen in practice.
Part of that is due to the nature of the industrial control systems for critical infrastructure, which tend not to be connected to the wider internet, and to use poorly understood proprietary instruction sets. This sort of “security by obscurity” provides a high hurdle for potential attackers to leap, but as hacking becomes an accepted part of international conflict, the resources available to attackers have rendered physical infrastructure a tempting target.
In 2013, researchers with industrial consultants Automatak found 25 serious vulnerabilities in the control systems for power plants, and warned that the security through obscurity was a false comfort. “If someone tries to breach the control centre through the internet, they have to bypass layers of firewalls. But someone could go out to a remote substation that has very little physical security and get on the network and take out hundreds of substations potentially. And they don’t necessarily have to get into the substation either.”
When it comes to Ukraine, however, it doesn’t look like the attackers had to go that far. Analysis of the malware suggests that the main vector of attack was a compromised Excel spreadsheet, which was used to run the malware on computers within the power company’s control centre. It would then seek out some specific programs used as part of the industrial control system, and simply erase them before restarting the computer.
Power company suffered a major attack that led to blackouts across western Ukraine, after an attack on a Ukrainian media company
Smokestacks in Dniprodzershynsk, Ukraine.
A power blackout in Ukraine over Christmas and a destructive cyberattack on a major Ukrainian media company were caused by the same malware from the same major hacking group, known as Sandworm, according to security researchers at Symantec.
The blackout, which affected large parts of western Ukraine, is believed to be the first example of a power outage deliberately caused by a hacking attack. The country’s state intelligence agency, the SBU, attributed the attacks to state-sponsored hackers from Russia. If true, that would link the hacking of the power grid to the general escalation of cyberwarfare between the two nations in the aftermath of the invasion of Crimea.
That attribution was strengthened by the revelation that the hacking of power company Prykarpattyaoblenergo was carried out using malware substantially similar to an earlier attack, which affected the computers of a Ukranian media company in late October 2015.
Symantec researchers say that initially, a computer at the media company was compromised by malware called “BlackEnergy”. “The attackers appear to have used this infection to retrieve administrator credentials and used them to execute Disakil [a second type of Malware] on a number of computers. Communication from these computers halted after Disakil was executed, suggesting that it succeeded in wiping them and rendering them inoperable.
“The group behind the BlackEnergy Trojan is known as Sandworm and has a history of targeting organizations in Ukraine. It has also been known to attack Nato, a number of western European countries, and companies operating in the energy sector.”
The same malware was implicated in the attack on the country’s power grid,according to Robert Lee of information security firm Sans, who wrote that “if the malware does end up being related to the BlackEnergy2 campaign then this adds to the possibility that the facility … was specifically targeted”.
Advertisement
The link to BlackEnergy was backed up by Eugene Bryskin, of the Ukrainian government’s Computer Emergency Response Team. Bryskin told Forbes that Sans’ suspicions were accurate, particularly the link to BlackEnergy.
Hacking attacks on physical infrastructure have long been a concern among the security community, but have been rarely seen in practice.
Part of that is due to the nature of the industrial control systems for critical infrastructure, which tend not to be connected to the wider internet, and to use poorly understood proprietary instruction sets. This sort of “security by obscurity” provides a high hurdle for potential attackers to leap, but as hacking becomes an accepted part of international conflict, the resources available to attackers have rendered physical infrastructure a tempting target.
In 2013, researchers with industrial consultants Automatak found 25 serious vulnerabilities in the control systems for power plants, and warned that the security through obscurity was a false comfort. “If someone tries to breach the control centre through the internet, they have to bypass layers of firewalls. But someone could go out to a remote substation that has very little physical security and get on the network and take out hundreds of substations potentially. And they don’t necessarily have to get into the substation either.”
When it comes to Ukraine, however, it doesn’t look like the attackers had to go that far. Analysis of the malware suggests that the main vector of attack was a compromised Excel spreadsheet, which was used to run the malware on computers within the power company’s control centre. It would then seek out some specific programs used as part of the industrial control system, and simply erase them before restarting the computer.

Tuesday, 17 November 2015

JPMorgan Hack — Three Men Charged in Biggest Bank Hack in History


The US government has charged hackers over the largest ever hacking case in financial history.

The US Court of the Southern District of New York has charged three men accused of hacking into many financial institutions, including JPMorgan Chase that, according to the officials, was "the largest theft of user data from a U.S. financial institution in history."
JPMorgan Chase is one of the world's biggest banks that controls total assets worth more than $2.59 Trillion.





The Hackers targeted at least nine financial institutions between 2012 and mid-2015, including JPMorgan Chase, brokerages and a major business news publication, and stolen information of "over 100 Million customers," Bloomberg reported Tuesday.

The three men, including Gery ShalonZiv Orenstein, and Joshua Samuel Aaron were charged with 23 counts, including hacking, identity theft, securities fraud, and money laundering, among others.

A separate indictment was also filed against an alleged hacker, Anthony Murgio, who was previously arrested for a cyber attack on JPMorgan as well as for operating an illegal Bitcoin exchange.

The spokeswoman for JPMorgan Chase Patricia Wexler confirmed the bank's 2014 data breach hack that affected around 80 Million households.
"We appreciate the strong partnership with law enforcement in bringing the criminals to justice,"Wexler said in an email statement. "As we did here, we continue to cooperate with law enforcement in fighting cybercrime."
U.S. Attorney Preet Bharara in Manhattan will announce the details of the indictments in a press conference that has been scheduled for later today at 1 St. Andrew's Plaza.

The US government has charged hackers over the largest ever hacking case in financial history.

The US Court of the Southern District of New York has charged three men accused of hacking into many financial institutions, including JPMorgan Chase that, according to the officials, was "the largest theft of user data from a U.S. financial institution in history."
JPMorgan Chase is one of the world's biggest banks that controls total assets worth more than $2.59 Trillion.





The Hackers targeted at least nine financial institutions between 2012 and mid-2015, including JPMorgan Chase, brokerages and a major business news publication, and stolen information of "over 100 Million customers," Bloomberg reported Tuesday.

The three men, including Gery ShalonZiv Orenstein, and Joshua Samuel Aaron were charged with 23 counts, including hacking, identity theft, securities fraud, and money laundering, among others.

A separate indictment was also filed against an alleged hacker, Anthony Murgio, who was previously arrested for a cyber attack on JPMorgan as well as for operating an illegal Bitcoin exchange.

The spokeswoman for JPMorgan Chase Patricia Wexler confirmed the bank's 2014 data breach hack that affected around 80 Million households.
"We appreciate the strong partnership with law enforcement in bringing the criminals to justice,"Wexler said in an email statement. "As we did here, we continue to cooperate with law enforcement in fighting cybercrime."
U.S. Attorney Preet Bharara in Manhattan will announce the details of the indictments in a press conference that has been scheduled for later today at 1 St. Andrew's Plaza.

Cybercriminals are gearing up for the holidays

The upcoming holiday season could be a lucrative time for cybercriminals, according to a newThreatMetrix Q3 Cybercrime Report. The digital identity company detected 45 million e-commerce attacks during Q3, a 25 percent increase over the previous quarter.  Login attacks were also up 40 percent more than in the previous quarter.
E-commerce transactions broken down consist of the following percentages and risks:
  • 78 percent of transactions were account logins, with five percent high risk.
  • 21 percent of transactions were payments, with 3.2 percent high risk.
  • One percent of transactions were account creations, with nearly seven percent high risk.
During this period ThreatMatrix detected  90 million attempted attacks across industries, representing a 20 percent increase over Q3.
This increase in attacks can largely be attributed to the growing sophistication of cybercriminals and the amount of customer data available for interception. Fraudsters are using bots and botnets to run massive identity testing sessions in order to penetrate fraud defenses.
With consumers storing more personal information in online accounts – cybercriminals find personal data to be a prime target for takeover. It was also noted in the report, that with the migration to EMV in the United States, the attacks on e-commerce retailers are expected to increase this holiday season.
Vanita Pandey, senior director, strategy and product marketing at ThreatMetrix said “We are living in a dystopian post-breach world where our trusted and established paradigms are fast changing. As traditional businesses embrace a “mobile-first” approach, they are faced with a constant threat of attacks, whether from well-organized crime rings, regular hackers and fraudsters or simply unsuspecting good customers and employees who become victims of cybercriminals. As a result, timely detection is fast becoming more critical than prevention.”
The upcoming holiday season could be a lucrative time for cybercriminals, according to a newThreatMetrix Q3 Cybercrime Report. The digital identity company detected 45 million e-commerce attacks during Q3, a 25 percent increase over the previous quarter.  Login attacks were also up 40 percent more than in the previous quarter.
E-commerce transactions broken down consist of the following percentages and risks:
  • 78 percent of transactions were account logins, with five percent high risk.
  • 21 percent of transactions were payments, with 3.2 percent high risk.
  • One percent of transactions were account creations, with nearly seven percent high risk.
During this period ThreatMatrix detected  90 million attempted attacks across industries, representing a 20 percent increase over Q3.
This increase in attacks can largely be attributed to the growing sophistication of cybercriminals and the amount of customer data available for interception. Fraudsters are using bots and botnets to run massive identity testing sessions in order to penetrate fraud defenses.
With consumers storing more personal information in online accounts – cybercriminals find personal data to be a prime target for takeover. It was also noted in the report, that with the migration to EMV in the United States, the attacks on e-commerce retailers are expected to increase this holiday season.
Vanita Pandey, senior director, strategy and product marketing at ThreatMetrix said “We are living in a dystopian post-breach world where our trusted and established paradigms are fast changing. As traditional businesses embrace a “mobile-first” approach, they are faced with a constant threat of attacks, whether from well-organized crime rings, regular hackers and fraudsters or simply unsuspecting good customers and employees who become victims of cybercriminals. As a result, timely detection is fast becoming more critical than prevention.”

Dyre Deep Dive

Norse Labs on the Dyre banking Trojan
Because of the infrastructure required to build Dyre, the manpower needed to execute the attacks, and the knowledge of banking systems demonstrated— the group behind Dyre is a well-funded, intelligent, and a sophisticated cybercrime organization. The group likely operates out of Eastern Europe, possibly in the Ukraine and/or Russia.
Dyer Trojan Attack Life Cycle
In 2014, the takedown of banking Trojans such as Gameover, Zeus, Shylock, and Ramnit created a void for cybercriminal groups. Since its first appearance in June 2014, the Dyre Trojan has effectively filled this void by targeting corporate and private banking accounts in a succession of phishing campaigns across the globe, including the Royal Bank of Scotland, Citigroup, JPMorgan Chase, and Bank of America. This makes Dyre, also known as Dyreza, Dyranges, or Battdil, one of the more potent banking trojans currently in operation. 1,2
Because of the infrastructure required to build Dyre, the manpower needed to execute the attacks, and the knowledge of banking systems demonstrated— the group behind Dyre is a well-funded, intelligent, and a sophisticated cybercrime organization. The group likely operates out of Eastern Europe, possibly in the Ukraine and/or Russia. This assessment is based on several factors: the attackers follow a Monday to Friday five-day work week; the group appears to operate in the UTC +2 or UTC +3 time zones; and over 80 percent of all Dyre servers come through Russian and Ukrainian IP addresses. Multiple teams could also be using the Dyre Trojan at the same time, attacking from different geographic locations. The attackers have primarily targeted banks in English-speaking countries, focusing on the US and UK. 1,3,4
The main purpose of Dyre is to steal banking credentials such as user name, password, and PIN number through spam/phishing emails that mimic the official banking sites. The stolen information is sent to either a predetermined email address, to drop sites, or to a URL via HTTP post. In reverse-engineering the sample that we are describing herein, Norse has also identified encrypted communications on TCP/4443. Some versions of Dyre download a worm that is capable of composing email messages in Microsoft Outlook with the “Upatre” malware attached, which is then used to send thousands of spam emails in order to spread. 1,5
Dyre has ability to steal login credentials by browser hooking and bypassing SSL, and uses a man-in-the-middle (MITM) proxy server. It also has Remote Access Trojan (RAT) capabilities, complex process injections, and Distributed Denial of Service (DDoS) capabilities. Dyre has a robust command-and-control backup system that can use I2P (the Invisible Internet Project), an overlay network similar to TOR, and uses time-dependent domain generation algorithms (DGAs). In our next blog post, we’ll be presenting data from sink-holing efforts using at least one such domain. 6,7
Dyre variants are wrapped with custom downloaders, which use some of the newest packers/protectors. Norse Fusion Analysts analyzed one such sample that was extracted from our malware pipeline. In this analysis, we will be presenting the most complicated part of the Dyre lifecycle, the initial infection vector. The custom obfuscators analyzed use constant unfolding, data-encoding schemes, extraneous/dead code insertion, and pattern obfuscation techniques. The more advanced packer/protectors use virtual machine obfuscation. The downloaders, or stage one installers, then push the binaries to the computer in a variety of different ways. The hash of the sample analyzed is:
MD5: 1DFF4F80F95FD272A73F79CA3382681D.

Environmental differences:

 Windows XP and Windows 7 x64
On Windows XP and Windows 7 – 64 Bit, Dyre will install and register a system service called “Google Update Service.” Looking inside the registry entry for the service will yield the entry for ““ImagePath”. This is the image path and name of the malware executable.
Since the malware is registered as a service, it automatically executes at Windows boot. 6
Dyre uses the generic service host process (svchost.exe) for all the communications with the command-and-control (C2s) server. The communications is encrypted over SSL on TCP ports 443 or 4443.
Windows 7 x86
On Windows 7 – 32 Bit, Dyre acts a bit differently. The malware writes an autorun key entry:: HKCU\Software\Microsoft\Windows\CurrentVersion\Run, pointing to the executable.
Dyre injects itself into Explorer.exe in order to communicate with the C2 server.
While analyzing stage one the (download/Installer). Norse ran into advanced polymorphism that swaps groups of instructions, calls to extraneous routines, multiple conditional jumps, and other calls into various sections of obfuscated code.
Opening the sample in IDA Pro we see:
Looking at the first two calls “Sleep” and “auxSetVolume()”. Sleep’s argument is for ten milliseconds. auxSetVolume is then called with two parameters which are both zero.
Looking at the header files, “mmsystem.h” and “mmsyscom.h” we see the return values are:
mmsyscom.h:
MMSYSERR_BASE.JPG
mmsystem.h:
MMSYSERR_BADDEVICEID.JPG
The return value for “auxSetVolume()” is MMSYSERR_BADDEVICEID (device ID out of range).
Being that the return value is two (2) the code will not jump. So, we will enter the function 00401000. The function 00401000 is the beginning of the custom packer/protector. Starting at the beginning of the function, it will setup 624 bytes on the stack for local variables.
Function_00401000.JPG
Qmemcpy is not in the windows SDK so the debugger only shows inline assembly for this function.
What we see inside IDA Pro:
IDA Pro 2
What we see inside Ollydbg:
Ollydbg
Qmemcpy copies a 25 byte string: “7HEvytGstrror……….”
The code then sets up local stack variables with the encoded APIs and modules like kernel32.dll. They’re stored in the “dwords_*******” below. We also see VirtualAlloc is used as one of the parameters and setup to be called by sub_40145D.
dwords
At this step, we dumped the buffer and reanalyzed it inside IDA Pro to analyze the graph below.
The function pointer at the end will be called. We will drop into another routine that grabs the encrypted buffer and decrypts it. Allowing us to dump the file:
Next would be the “Get File” routine:
IDA Pro - Image 1
It then sleeps for ten milliseconds and calls auxSetVolume() with two parameters, which are both zero.
Looking at the header file, “Mmsystem.h,” we see the return values are:
#define MMSYSERROR_BASE 0
Mmsystem.h
The return value is MMSYSERR_BADDEVICEID (device ID out of range).
MMSYSERR_BADDEVICEID
Being that the return value is two (2) the code will not jump into the function 00401000.
The function 00401000 is the beginning of the custom packer/protector. Starting at the beginning of the function, it will setup 624 bytes on the stack for local variables.
function 00401000
Qmemcpy is not in the windows SDK so the debugger only shows assembly for this function.
It copies a 25 byte string: 7HEvytGstrror……….
debugger
The code then sets up local stack variables with encoded APIs and modules like kernel32.dll.
VirtualAlloc is used as a parameter and is setup to be called by sub_40145D.
VirtualAlloc
Inside sub_40145D we see:
sub_40145D
According to MSDN ResumeThread() fails if the return value is ( -1 ).
The if statement needs (a1) to be present and ResumeThread() to not equal 75. This will satisfy the logical (&&) operator.
(a1) turns out to be VirtualAlloc ( 0, 0x1400, 0x1000, 0x40 )
The first parameter is Null; the system will determine where to allocate the region.
The second parameter is the size of the buffer.
The third parameter is the allocation type (MEM_COMMIT).
The fourth parameter is the memory protection for the region of pages to be allocated (0x40 is equal to PAGE_EXECUTE_READWRITE).
The empty buffer, which will be used later on:
Empty buffer
Some dummy routines and extraneous code:
Dummy routines
TerminateThread(), returns 0; which fails.
The SelectObject() returns the values below:
SelectObject()
SelectObject() returns 0.
MSDN states that PulseEvent() will return zero if the function fails.
PulseEvent()
Locating the scrambled API “7HEvetGst?Eror”:
scrambled API
GetFileAttributesA() tries a long random string and fails:
GetFileAttributes
The two while loops below will fill the newly acquired buffer above with new code, then it will call the new code with three (3) parameters.
New code
This is what the above code looks like in IDA PRO.
It will run its polymorphic routine as seen here in green:
 IDA PRO. - polymorphic routine
This is what the buffer looks like now, after the algorithm runs:
buffer-e-3
At this step, we dumped the buffer and reanalyzed it inside IDA Pro to get the graph below.
The function pointer at the end will be called and we are dropped into another routine that grabs the encrypted buffer and decrypts it, allowing us to dump the file:
another routine that grabs the encrypted buffer and decrypts it
This is the Get File routine:
Get File routine
It uses subtraction and a rotation decryption mechanism. At the end of this routine you can dump the buffer and analyze the payload.
The payload’s MD5 hash at this point is 3AE3DDDEF5F677145A59FA5B5E974760
Here is the actual payload:
payload
The first thing we notice in the payload is a virtual machine check:
if ( *(_DWORD *)(__readfsdword(0x30) + 0x64) >= 2u )// NumberOfProcessors (PEB + 0x64) >= 2
It then locates and calls GetSystemPowerStatus and creates a 4 MB heap and sets a flag. It creates 100 SHA1 hashes based on random strings and then check the first 4 bytes of the 100th hash.
It will apply debug privileges and enumerate all the processes, searching for svchost. It will create a system SID, and store the process ID of the executable found.
Service setup is a code block that calls StartServiceCtrlDispatcher(). If we look into the MSDN description, we can read the following:
“When the service control manager starts a service process, it waits for the process to call the StartServiceCtrlDispatcher function.”
The service control manager uses this connection to send control and service start requests to the main thread of the service process.
If a service runs in its own process, the main thread of the service process should immediately call StartServiceCtrlDispatcher(). All initialization tasks are done in the service’s ServiceMain function when the service is started.
We have a Service which runs in its own process, so StartServiceCtrlDispatcher() gets immediately called. Again, if we look at MSDN:
BOOL WINAPI StartServiceCtrlDispatcher(
_In_ const SERVICE_TABLE_ENTRY *lpServiceTable
);
The function has a single pointer to the structure SERVICE_TABLE_ENTRY as a parameter. Now we look at this structure:
typedef struct _SERVICE_TABLE_ENTRY {
LPTSTR         lpServiceName;
LPSERVICE_MAIN_FUNCTION lpServiceProc;
} SERVICE_TABLE_ENTRY, *LPSERVICE_TABLE_ENTRY;
It has two pointers, one points to the name of the Service process, and the other points to the ServiceMain function. The ServiceMain description from MSDN:
“The entry point for a service. When the service control manager receives a request to start a service, it starts the service process (if it is not already running). The main thread of the service process calls the StartServiceCtrlDispatcher function with a pointer to an array of SERVICE_TABLE_ENTRY structures. Then the service control manager sends a start request to the service control dispatcher for this service process. The service control dispatcher creates a new thread to execute the ServiceMain function of the service being started.
The ServiceMain function should immediately call the RegisterServiceCtrlHandlerEx function to specify a HandlerEx function to handle control requests. Next, it should call the SetServiceStatus function to send status information to the service control manager. After these calls, the function should complete the initialization of the service. Do not attempt to start another service in the ServiceMain function.”
So the ServiceMain function is the entry point for a Service, just like WinMain() for a Windows-based application or DllMain() for a dynamic-link library (DLL). Now we follow ServiceMain in IDA Pro and end up in a bunch of random bytes. So what’s going on here? We see two function calls to RegisterServiceCtrlHandler() and SetServiceStatus() just as described by MSDN above, but IDA Pro doesn’t recognized the ServiceMain function as executable code, so here we have to convert the bytes into code manually! After doing this we can continue our analysis.
Here is ServiceMain:
service-main-e3
The Handler:
handler-e3
Create_Process():
create process-e3
After the initialization of the service and handler, the sample will check its operational condition:
operational condition
As we go into the function:
function
The function checks to see if the piece of malware is operating from the WINDOWS directory. If not, it will drop the exe and restart a new process. It also checks whether it should create the service.
If it passes both checks, it will check to see if there is an open mutex. If not, it will go into “Off_To_The_Wild_Blue_Yonder()” to inject into svchost.exe.
Before injecting into svchost two resources are needed: the payload and the key.
svchost
Get_Resource maps the payload into memory.
Get_Resource maps the payload into memory.
The Injection process happens in function 402DA0, which uses a method similar to Carberp.
The Injection process happens in function 402DA0, which uses a method similar to Carberp.
Here is the Carberp injection process:
Carberp injection process
Source: Github 8
Using the resource file and key, we can decode the resource with this algorithm:
void substitutionCipher( unsigned char* pfile, streampos size, unsigned char* pkey )
{
int ifilesize = size;
pDecoded = new unsigned char [ ifilesize ];
for( int i = 0; i < ifilesize; ++i ){
pDecoded[ i ] = pkey[ pfile[ i ] ];
}
}
Here is the encoded resource:
encoded resource
And here it is decoded:
decoded
Looking into the decoded resource file, we can now see all the strings! Download here.
The Dyre Trojan emerged in 2015 to become one of the most credible and effective threats against the banking and financial services industry. The malware is backed by a skilled and resource-rich cybercrime group that has put considerable time and resources into developing a tool that can affect banks and customers worldwide.
As a result, Dyre is constantly evolving in order to evade detection, and this poses significant challenges to security professionals. The best defense against this type of threat is to educate employees about the dangers of clicking email links and attachments. As part of any comprehensive security program, which should include security awareness training, organizations may also consider proactively spear-phishing employees using real-world scenarios that culminate in a “teachable moment” to reinforce this idea.


In our next blog post, we’ll be presenting data from sink-holing efforts using DGAs (Domain Generation Algorithms) that are present in malware like Dyre to prevent C2 takedown.

References:

1 Symantec. (2015). Dyre: Emerging threat on financial fraud landscape (Version 1.0) [PDF file]. Retrieved from http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/dyre-emerging-threat.pdf
2 Protecting Against the Dyre Trojan: Don’t Bring a Knife to a Gunfight [Web log post]. (2014, December 8). Retrieved October 15, 2015, from https://securityintelligence.com/protecting-against-the-dyre-trojan-dont-bring-a-knife-to-a-gunfight/
3 IBM: Dyre Malware Takes Summer Holiday in Spain. Retrieved [Web log post]. (2015, July). Retrieved from http://www.globalsecuritymag.com/Limor-Kessem-Cybersecurity,20150720,54521.html
IBM. (April, 2015). The Dyre Wolf: Attacks on Corporate Banking Accounts. [PDF file]. Retrieved from https://portal.sec.ibm.com/mss/html/en_US/support_resources/pdf/Dyre_Wolf_MSS_Threat_Report.pdf
 Trend Micro: A Closer Look At DYRE Malware, Part 1 Retrieved [Web log post]. (2014, October 8). Retrieved from http://blog.trendmicro.com/trendlabs-security-intelligence/a-closer-look-at-dyre-malware-part-1/
 Dev Central: Dyer Malware Analysis Retrieved [Web log post]. (2014, November 10). Retrieved from https://devcentral.f5.com/articles/dyre-malware-analysis
 Dell SecureWorks: Dyer Banking Trojan [Web log post]. (2014, December 17). Retrieved from http://www.secureworks.com/cyber-threat-intelligence/threats/dyre-banking-trojan/
 GitHub:hzeroo/Carberp. [Web log post]. (2013, June 25). Retrieved from https://github.com/hzeroo/Carberp/blob/master/source%20-%20absource/pro/all%20source/RemoteCtl/hvnc2/core/svchost_inj.cpp
Norse Labs on the Dyre banking Trojan
Because of the infrastructure required to build Dyre, the manpower needed to execute the attacks, and the knowledge of banking systems demonstrated— the group behind Dyre is a well-funded, intelligent, and a sophisticated cybercrime organization. The group likely operates out of Eastern Europe, possibly in the Ukraine and/or Russia.
Dyer Trojan Attack Life Cycle
In 2014, the takedown of banking Trojans such as Gameover, Zeus, Shylock, and Ramnit created a void for cybercriminal groups. Since its first appearance in June 2014, the Dyre Trojan has effectively filled this void by targeting corporate and private banking accounts in a succession of phishing campaigns across the globe, including the Royal Bank of Scotland, Citigroup, JPMorgan Chase, and Bank of America. This makes Dyre, also known as Dyreza, Dyranges, or Battdil, one of the more potent banking trojans currently in operation. 1,2
Because of the infrastructure required to build Dyre, the manpower needed to execute the attacks, and the knowledge of banking systems demonstrated— the group behind Dyre is a well-funded, intelligent, and a sophisticated cybercrime organization. The group likely operates out of Eastern Europe, possibly in the Ukraine and/or Russia. This assessment is based on several factors: the attackers follow a Monday to Friday five-day work week; the group appears to operate in the UTC +2 or UTC +3 time zones; and over 80 percent of all Dyre servers come through Russian and Ukrainian IP addresses. Multiple teams could also be using the Dyre Trojan at the same time, attacking from different geographic locations. The attackers have primarily targeted banks in English-speaking countries, focusing on the US and UK. 1,3,4
The main purpose of Dyre is to steal banking credentials such as user name, password, and PIN number through spam/phishing emails that mimic the official banking sites. The stolen information is sent to either a predetermined email address, to drop sites, or to a URL via HTTP post. In reverse-engineering the sample that we are describing herein, Norse has also identified encrypted communications on TCP/4443. Some versions of Dyre download a worm that is capable of composing email messages in Microsoft Outlook with the “Upatre” malware attached, which is then used to send thousands of spam emails in order to spread. 1,5
Dyre has ability to steal login credentials by browser hooking and bypassing SSL, and uses a man-in-the-middle (MITM) proxy server. It also has Remote Access Trojan (RAT) capabilities, complex process injections, and Distributed Denial of Service (DDoS) capabilities. Dyre has a robust command-and-control backup system that can use I2P (the Invisible Internet Project), an overlay network similar to TOR, and uses time-dependent domain generation algorithms (DGAs). In our next blog post, we’ll be presenting data from sink-holing efforts using at least one such domain. 6,7
Dyre variants are wrapped with custom downloaders, which use some of the newest packers/protectors. Norse Fusion Analysts analyzed one such sample that was extracted from our malware pipeline. In this analysis, we will be presenting the most complicated part of the Dyre lifecycle, the initial infection vector. The custom obfuscators analyzed use constant unfolding, data-encoding schemes, extraneous/dead code insertion, and pattern obfuscation techniques. The more advanced packer/protectors use virtual machine obfuscation. The downloaders, or stage one installers, then push the binaries to the computer in a variety of different ways. The hash of the sample analyzed is:
MD5: 1DFF4F80F95FD272A73F79CA3382681D.

Environmental differences:

 Windows XP and Windows 7 x64
On Windows XP and Windows 7 – 64 Bit, Dyre will install and register a system service called “Google Update Service.” Looking inside the registry entry for the service will yield the entry for ““ImagePath”. This is the image path and name of the malware executable.
Since the malware is registered as a service, it automatically executes at Windows boot. 6
Dyre uses the generic service host process (svchost.exe) for all the communications with the command-and-control (C2s) server. The communications is encrypted over SSL on TCP ports 443 or 4443.
Windows 7 x86
On Windows 7 – 32 Bit, Dyre acts a bit differently. The malware writes an autorun key entry:: HKCU\Software\Microsoft\Windows\CurrentVersion\Run, pointing to the executable.
Dyre injects itself into Explorer.exe in order to communicate with the C2 server.
While analyzing stage one the (download/Installer). Norse ran into advanced polymorphism that swaps groups of instructions, calls to extraneous routines, multiple conditional jumps, and other calls into various sections of obfuscated code.
Opening the sample in IDA Pro we see:
Looking at the first two calls “Sleep” and “auxSetVolume()”. Sleep’s argument is for ten milliseconds. auxSetVolume is then called with two parameters which are both zero.
Looking at the header files, “mmsystem.h” and “mmsyscom.h” we see the return values are:
mmsyscom.h:
MMSYSERR_BASE.JPG
mmsystem.h:
MMSYSERR_BADDEVICEID.JPG
The return value for “auxSetVolume()” is MMSYSERR_BADDEVICEID (device ID out of range).
Being that the return value is two (2) the code will not jump. So, we will enter the function 00401000. The function 00401000 is the beginning of the custom packer/protector. Starting at the beginning of the function, it will setup 624 bytes on the stack for local variables.
Function_00401000.JPG
Qmemcpy is not in the windows SDK so the debugger only shows inline assembly for this function.
What we see inside IDA Pro:
IDA Pro 2
What we see inside Ollydbg:
Ollydbg
Qmemcpy copies a 25 byte string: “7HEvytGstrror……….”
The code then sets up local stack variables with the encoded APIs and modules like kernel32.dll. They’re stored in the “dwords_*******” below. We also see VirtualAlloc is used as one of the parameters and setup to be called by sub_40145D.
dwords
At this step, we dumped the buffer and reanalyzed it inside IDA Pro to analyze the graph below.
The function pointer at the end will be called. We will drop into another routine that grabs the encrypted buffer and decrypts it. Allowing us to dump the file:
Next would be the “Get File” routine:
IDA Pro - Image 1
It then sleeps for ten milliseconds and calls auxSetVolume() with two parameters, which are both zero.
Looking at the header file, “Mmsystem.h,” we see the return values are:
#define MMSYSERROR_BASE 0
Mmsystem.h
The return value is MMSYSERR_BADDEVICEID (device ID out of range).
MMSYSERR_BADDEVICEID
Being that the return value is two (2) the code will not jump into the function 00401000.
The function 00401000 is the beginning of the custom packer/protector. Starting at the beginning of the function, it will setup 624 bytes on the stack for local variables.
function 00401000
Qmemcpy is not in the windows SDK so the debugger only shows assembly for this function.
It copies a 25 byte string: 7HEvytGstrror……….
debugger
The code then sets up local stack variables with encoded APIs and modules like kernel32.dll.
VirtualAlloc is used as a parameter and is setup to be called by sub_40145D.
VirtualAlloc
Inside sub_40145D we see:
sub_40145D
According to MSDN ResumeThread() fails if the return value is ( -1 ).
The if statement needs (a1) to be present and ResumeThread() to not equal 75. This will satisfy the logical (&&) operator.
(a1) turns out to be VirtualAlloc ( 0, 0x1400, 0x1000, 0x40 )
The first parameter is Null; the system will determine where to allocate the region.
The second parameter is the size of the buffer.
The third parameter is the allocation type (MEM_COMMIT).
The fourth parameter is the memory protection for the region of pages to be allocated (0x40 is equal to PAGE_EXECUTE_READWRITE).
The empty buffer, which will be used later on:
Empty buffer
Some dummy routines and extraneous code:
Dummy routines
TerminateThread(), returns 0; which fails.
The SelectObject() returns the values below:
SelectObject()
SelectObject() returns 0.
MSDN states that PulseEvent() will return zero if the function fails.
PulseEvent()
Locating the scrambled API “7HEvetGst?Eror”:
scrambled API
GetFileAttributesA() tries a long random string and fails:
GetFileAttributes
The two while loops below will fill the newly acquired buffer above with new code, then it will call the new code with three (3) parameters.
New code
This is what the above code looks like in IDA PRO.
It will run its polymorphic routine as seen here in green:
 IDA PRO. - polymorphic routine
This is what the buffer looks like now, after the algorithm runs:
buffer-e-3
At this step, we dumped the buffer and reanalyzed it inside IDA Pro to get the graph below.
The function pointer at the end will be called and we are dropped into another routine that grabs the encrypted buffer and decrypts it, allowing us to dump the file:
another routine that grabs the encrypted buffer and decrypts it
This is the Get File routine:
Get File routine
It uses subtraction and a rotation decryption mechanism. At the end of this routine you can dump the buffer and analyze the payload.
The payload’s MD5 hash at this point is 3AE3DDDEF5F677145A59FA5B5E974760
Here is the actual payload:
payload
The first thing we notice in the payload is a virtual machine check:
if ( *(_DWORD *)(__readfsdword(0x30) + 0x64) >= 2u )// NumberOfProcessors (PEB + 0x64) >= 2
It then locates and calls GetSystemPowerStatus and creates a 4 MB heap and sets a flag. It creates 100 SHA1 hashes based on random strings and then check the first 4 bytes of the 100th hash.
It will apply debug privileges and enumerate all the processes, searching for svchost. It will create a system SID, and store the process ID of the executable found.
Service setup is a code block that calls StartServiceCtrlDispatcher(). If we look into the MSDN description, we can read the following:
“When the service control manager starts a service process, it waits for the process to call the StartServiceCtrlDispatcher function.”
The service control manager uses this connection to send control and service start requests to the main thread of the service process.
If a service runs in its own process, the main thread of the service process should immediately call StartServiceCtrlDispatcher(). All initialization tasks are done in the service’s ServiceMain function when the service is started.
We have a Service which runs in its own process, so StartServiceCtrlDispatcher() gets immediately called. Again, if we look at MSDN:
BOOL WINAPI StartServiceCtrlDispatcher(
_In_ const SERVICE_TABLE_ENTRY *lpServiceTable
);
The function has a single pointer to the structure SERVICE_TABLE_ENTRY as a parameter. Now we look at this structure:
typedef struct _SERVICE_TABLE_ENTRY {
LPTSTR         lpServiceName;
LPSERVICE_MAIN_FUNCTION lpServiceProc;
} SERVICE_TABLE_ENTRY, *LPSERVICE_TABLE_ENTRY;
It has two pointers, one points to the name of the Service process, and the other points to the ServiceMain function. The ServiceMain description from MSDN:
“The entry point for a service. When the service control manager receives a request to start a service, it starts the service process (if it is not already running). The main thread of the service process calls the StartServiceCtrlDispatcher function with a pointer to an array of SERVICE_TABLE_ENTRY structures. Then the service control manager sends a start request to the service control dispatcher for this service process. The service control dispatcher creates a new thread to execute the ServiceMain function of the service being started.
The ServiceMain function should immediately call the RegisterServiceCtrlHandlerEx function to specify a HandlerEx function to handle control requests. Next, it should call the SetServiceStatus function to send status information to the service control manager. After these calls, the function should complete the initialization of the service. Do not attempt to start another service in the ServiceMain function.”
So the ServiceMain function is the entry point for a Service, just like WinMain() for a Windows-based application or DllMain() for a dynamic-link library (DLL). Now we follow ServiceMain in IDA Pro and end up in a bunch of random bytes. So what’s going on here? We see two function calls to RegisterServiceCtrlHandler() and SetServiceStatus() just as described by MSDN above, but IDA Pro doesn’t recognized the ServiceMain function as executable code, so here we have to convert the bytes into code manually! After doing this we can continue our analysis.
Here is ServiceMain:
service-main-e3
The Handler:
handler-e3
Create_Process():
create process-e3
After the initialization of the service and handler, the sample will check its operational condition:
operational condition
As we go into the function:
function
The function checks to see if the piece of malware is operating from the WINDOWS directory. If not, it will drop the exe and restart a new process. It also checks whether it should create the service.
If it passes both checks, it will check to see if there is an open mutex. If not, it will go into “Off_To_The_Wild_Blue_Yonder()” to inject into svchost.exe.
Before injecting into svchost two resources are needed: the payload and the key.
svchost
Get_Resource maps the payload into memory.
Get_Resource maps the payload into memory.
The Injection process happens in function 402DA0, which uses a method similar to Carberp.
The Injection process happens in function 402DA0, which uses a method similar to Carberp.
Here is the Carberp injection process:
Carberp injection process
Source: Github 8
Using the resource file and key, we can decode the resource with this algorithm:
void substitutionCipher( unsigned char* pfile, streampos size, unsigned char* pkey )
{
int ifilesize = size;
pDecoded = new unsigned char [ ifilesize ];
for( int i = 0; i < ifilesize; ++i ){
pDecoded[ i ] = pkey[ pfile[ i ] ];
}
}
Here is the encoded resource:
encoded resource
And here it is decoded:
decoded
Looking into the decoded resource file, we can now see all the strings! Download here.
The Dyre Trojan emerged in 2015 to become one of the most credible and effective threats against the banking and financial services industry. The malware is backed by a skilled and resource-rich cybercrime group that has put considerable time and resources into developing a tool that can affect banks and customers worldwide.
As a result, Dyre is constantly evolving in order to evade detection, and this poses significant challenges to security professionals. The best defense against this type of threat is to educate employees about the dangers of clicking email links and attachments. As part of any comprehensive security program, which should include security awareness training, organizations may also consider proactively spear-phishing employees using real-world scenarios that culminate in a “teachable moment” to reinforce this idea.


In our next blog post, we’ll be presenting data from sink-holing efforts using DGAs (Domain Generation Algorithms) that are present in malware like Dyre to prevent C2 takedown.

References:

1 Symantec. (2015). Dyre: Emerging threat on financial fraud landscape (Version 1.0) [PDF file]. Retrieved from http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/dyre-emerging-threat.pdf
2 Protecting Against the Dyre Trojan: Don’t Bring a Knife to a Gunfight [Web log post]. (2014, December 8). Retrieved October 15, 2015, from https://securityintelligence.com/protecting-against-the-dyre-trojan-dont-bring-a-knife-to-a-gunfight/
3 IBM: Dyre Malware Takes Summer Holiday in Spain. Retrieved [Web log post]. (2015, July). Retrieved from http://www.globalsecuritymag.com/Limor-Kessem-Cybersecurity,20150720,54521.html
IBM. (April, 2015). The Dyre Wolf: Attacks on Corporate Banking Accounts. [PDF file]. Retrieved from https://portal.sec.ibm.com/mss/html/en_US/support_resources/pdf/Dyre_Wolf_MSS_Threat_Report.pdf
 Trend Micro: A Closer Look At DYRE Malware, Part 1 Retrieved [Web log post]. (2014, October 8). Retrieved from http://blog.trendmicro.com/trendlabs-security-intelligence/a-closer-look-at-dyre-malware-part-1/
 Dev Central: Dyer Malware Analysis Retrieved [Web log post]. (2014, November 10). Retrieved from https://devcentral.f5.com/articles/dyre-malware-analysis
 Dell SecureWorks: Dyer Banking Trojan [Web log post]. (2014, December 17). Retrieved from http://www.secureworks.com/cyber-threat-intelligence/threats/dyre-banking-trojan/
 GitHub:hzeroo/Carberp. [Web log post]. (2013, June 25). Retrieved from https://github.com/hzeroo/Carberp/blob/master/source%20-%20absource/pro/all%20source/RemoteCtl/hvnc2/core/svchost_inj.cpp

 

Security Learner's Blog

This content is DMCA Protected.Copying or reproducing of procedure is prohibited.Do Not Copy!!