clydeiii commited on
Commit
6c2de02
·
verified ·
1 Parent(s): e8d73f5

Upload 17 files

Browse files

as found here https://raw.githubusercontent.com/aptnotes/data/master/APTnotes.json

2006.clean.txt ADDED
@@ -0,0 +1,278 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ "Wicked Rose" and the NCPH Hacking Group
2
+ by Ken Dunham & Jim Melnick
3
+ Zero-day attacks, where an attack occurs before public knowledge of a vulnerability is known, is
4
+ a growing cause of concern for security professionals in the 21st century. An unprecedented
5
+ number of zero-day attacks took place in 2006, largely involving Microsoft Office Files. Ken
6
+ Dunham, Director of the Rapid Response Team, and Jim Melnick, Director of Threat Operations,
7
+ led the VeriSign iDefense intelligence team to track down Chinese hackers for hire out of China,
8
+ responsible for many of the attacks in 2006. Wicked Rose is the ring-leader of the NCPH
9
+ hacking group and this is the story of their maturation into significant global threat by 2006.
10
+ Introduction to N.C.P.H.
11
+ N.C.P.H. (Network Crack Program Hacker) has about ten members or associates. Four core
12
+ members exist as of 2006:
13
+ (Wicked) Rose
14
+ KuNgBiM
15
+ Rodag
16
+ Charles
17
+ There are also some six other associates within NCPH and two other positions (possibly unfilled
18
+ positions) whose purpose is unclear. However,
19
+ Rose
20
+ or
21
+ Wicked Rose
22
+ seems to be the
23
+ primary leader. Membership rules, recruiting goals and standards are unknown. However, some
24
+ members appear to be current or former students of Sichuan University of Science and
25
+ Engineering.1
26
+ The group is responsible for development and deployment of exploit codes related vulnerabilities
27
+ in Microsoft Word Malformed OLE Structure Code Execution and Microsoft Excel Malformed
28
+ BIFF Structure Code Execution.
29
+ Public Knowledge of a Zero-Day Word Exploit
30
+ The story of NCPH zero-day attacks begins publicly on May 18, 2006. On this day the Internet
31
+ Storm Center reports a new possible zero-day attack. iDefense worked closely with SANS and
32
+ other organizations to analyze the threat landscape as it related to exploitation of this
33
+ vulnerability. Within the next 36 hours, iDefense gained access to multiple codes and extracted a
34
+ new rootkit called GinWui. Independent research proved the following:
35
+ Exploitation targeted a new vulnerability that allowed attackers to successfully exploit
36
+ computers running fully patched versions of Microsoft Word 2002 and others.
37
+ Exploitation dated to May 12, 2006 and involved at least six unique hostile exploit files.
38
+ iDefense confirmed that attacks targeted two organizations, one in the United States and
39
+ one in Japan.
40
+ Chinese-authored rootkits GinWui.A and GinWui.B exist in several attacks. iDefense
41
+ identified the rootkits' source and authors as Chinese actor "Wicked Rose" and others
42
+ profiled later in this report.
43
+ www.suse.edu.cn & http://www.study-in-china.org/school/Sichuan/suse/
44
+ Successful installation of the rootkit requires Administrator or Debugger rights. Initial
45
+ exploitation, however, does not require Administrator rights.
46
+ iDefense identified unique malicious code attacks pointing to nease.net and authored
47
+ several Snort signatures for this traffic. iDefense continues to monitor other domains
48
+ related to the attack.
49
+ The original attack upon a large DoD entity within the USA began on May 12, 2006. Targets of
50
+ the attacker were apparently "Googled" by the attacker. Three variations of a Microsoft Word
51
+ zero-day attack are involved in the attack. A few dozen attack files are first distributed to less
52
+ than a dozen targets to identify which version works within the organization.
53
+ Once attackers identify the vulnerable version of Microsoft Word used within the organization
54
+ close to 200 messages sent out to multiple targets within the organization within 24 hours. This
55
+ second wave of attack is distributed as "Planning document 5-16-2006.doc". This code is
56
+ improved beyond the first variant sent out earlier to identify the vulnerable version of Word
57
+ within the targeted network.
58
+ A third attack commences on May 17, 2006. During this period, the Internet Storm Center and
59
+ others get involved and the case becomes public. In the end, iDefense identified six unique
60
+ samples, of which three are more prevalent than other variants.
61
+ The GinWui Backdoor Rootkit Payload
62
+ Zero day attacks commenced in May 2006 attempted to install a GinWui backdoor Trojan horse
63
+ and Windows rootkit. A DLL file called winguis.dll and several SYS files install themselves
64
+ when a computer is successfully attacked through an exploit. Two versions of the GinWui
65
+ rootkit are installed during several attacks in May and June 2006.
66
+ NCHP 5.0 Screenshot (GinWui Rootkit)
67
+ Wicked Rose is the author of the GinWui malicious code. His code and support posts related to
68
+ GinWui distributions exist on the Chinese NCPH and Evil Octal forums. Wicked Rose
69
+ associates with WHG and others on this form. WHT hosted version "3.0beta.3" of the "NCPH
70
+ remote control" rootkit code on May 2, 2006. This distribution of GinWui was largely unknown
71
+ and undetected by anti-virus companies at the time of release.
72
+ Versions of GinWui used in targeted attacks of May and June 2006 are private versions, not
73
+ released to the public. This proves that Wicked Rose either constructed the zero day attacks or
74
+ sold private code to users that performed the attack.
75
+ Wicked Rose later documents additional updates to his rootkit code, version .50, at
76
+ http://rodag.blogbus.com/index.html. By this time Wicked Rose was performing full-time
77
+ development of this malicious code as a hacker for hire.
78
+ June 21, 2007
79
+ Continued US Targeted Attacks
80
+ Just over a month later, following initial GinWui based targeted attacks, another Microsoft Word
81
+ exploit occurs on June 21, 2006. A spoofed e-mail is sent to a target containing a hostile
82
+ Microsoft Word document. Analysis of the attack reveals that it's likely a test file used to
83
+ identify what version of Word may be running within the targeted organization, rather than a
84
+ refined targeted attack upon a known version of Microsoft Word. Chinese text within the Word
85
+ document reveal Chinese characters discussing a systematic evaluation of offsets for Microsoft
86
+ Word exploitation:
87
+ RipGof attacks reveal a Chinese string related to systematic testing of offsets for exploitation.
88
+ Backtracking Targeted Attacks: RipGof
89
+ In June 2006 another targeted attack emerges, but it's not GinWui this time but a new code,
90
+ RipGof.B. The attack attempts to exploit MS06-027 to install RipGof.B, a Trojan horse. This is
91
+ the same exploit code used in the former Zero-Day attacks linked to Wicked Rose and the NCPH
92
+ hacking group. The exploit code is still private at this time, proving that the author of both
93
+ GinWui and RipGof attacks are the same individual or group or affiliated through underground
94
+ criminal operations.
95
+ RipGof.B is an improvement of the former exploit used in GinWui attacks. RipGof.B attacks
96
+ included improvements to shellcode that attempts to fork to different locations based upon the
97
+ address value of the stack to exploit multiple versions of Microsoft Word. Once installed,
98
+ RipGof.B attempts to connect to enjoy.irdet.com and enjoy.bmwsee.com over TCP port 80. It
99
+ runs as a rootkit and backdoor Trojan horse and phones home to a Chinese server with stolen
100
+ data.
101
+ RipGof malicious code does not exist as a distribution in the underground, leading investigators
102
+ to look into the original RipGof.A malicious code. Over a year prior to the 2006 targeted attacks
103
+ RipGof.A emerges in the wild. RipGof.A attempted to exploit the Jet Engine Database exploit in
104
+ March 2005. This proves attempted exploitation and installation of code through RipGof for a
105
+ year prior to more sophisticated codes and attacks.
106
+ In summary, RipGof and GinWui attacks both use the same private exploit code against
107
+ Microsoft Word and both install rootkit based codes to steal and send information back to
108
+ Chinese sources. This circumstantial evidence reveals that Wicked Rose and the NCPH group
109
+ likely began their exploitation efforts at least a year and a half to two years prior to sophisticated
110
+ attacks that commenced in 2006. Once the group found a vulnerability within Microsoft Word
111
+ they were able to improve upon it and their targeted attack techniques to distribute multiple
112
+ targeted attacks and malicious codes for criminal gain as hackers for hire.
113
+ Timeline of Events
114
+ Wicked Rose and the NCPH hacking group are implicated in multiple Office based attacks over
115
+ a two year period. An attack in 2006 used RipGof.B in the attack. RipGof.A first emerged a
116
+ year earlier using an exploit that is relatively unsophisticated. Over the next year the Evil
117
+ Security Team, also out of China, creates the Dasher worm and uses the PcShares Trojan in an
118
+ attack. Wicked Rose gives a recommendation on the Trojan the day it is updated in the spring of
119
+ 2006, showing a close affiliation between Wicked Rose and the Evil Security Team actors.
120
+ Multiple attacks that take place in May and June and later 2006 are related to privately held
121
+ exploit code for both Microsoft Word and Excel, proven to be developed by Wicked Rose. A
122
+ timeline of proven associated events related to Wicked Rose attacks is below:
123
+ April 22, 2005 - RipGof.A JetEngine DB Attack
124
+ Dec. 19, 2005
125
+ Dasher worm and PcShare Trojan attack by Evil Security Team
126
+ April 27, 2006 Update to windowsupdates.net attack site
127
+ April 30, 2006 - Wicked Rose Drops out of School
128
+ May 2, 2006
129
+ 3.0beta3 NCPH remote control (GinWui) public release
130
+ May 12, 2006 - Initial probing and GinWui.A exploitation attempts against US target
131
+ May 15, 2006 - PcShare Trojan update recommended by Wicked Rose on day of new release
132
+ May 16, 2006 - Update to windowsupdates.net attack site
133
+ May 16, 2006 - Multiple GinWui.A attacks against US target
134
+ May 18, 2006 - SANS reports zero-day attack
135
+ May 19, 2006 Update to windowsupdates.net attack site
136
+ May 20, 2006 - GinWui.B Attack
137
+ May 20, 2006 - WZT Kicked out of NCPH
138
+ May 29, 2006 - GinWui.C Attack
139
+ June 1, 2006 Update to windowsupdates.net attack site
140
+ June 9, 2006
141
+ Mdropper.F Attack
142
+ June 14, 2006
143
+ Daserf.A Attack
144
+ June 15, 2006
145
+ Mdropper.G Attack
146
+ June 15, 2006
147
+ Booli.A Trojan Attack
148
+ June 16, 2006 - Flux.E Attack
149
+ June 18, 2006 - RipGof.B Attack
150
+ June 23, 2006
151
+ PPDropper.A
152
+ June 23, 2006
153
+ Booli.B Trojan attack
154
+ June 25, 2006 - GinWui.D Attack
155
+ June 26, 2006 - GinWui.E Attack
156
+ Sept. 27, 2006
157
+ PPDropper.F Attack
158
+ Sept. 30, 2006
159
+ GinWui.G Attack
160
+ Oct. 9, 2006
161
+ Wicked Rose reports pay increase; likely in September
162
+ A Pictorial Introduction to Wicked Rose and NCPH
163
+ Just who are Wicked Rose and the NCPH hacker group? As it turns out, a collection of college
164
+ students in China who likely room with one another and regularly support their hacking interests.
165
+ In-depth research implicates Wicked Rose as the ring-leader of the group, responsible for
166
+ managing hacker for hire relationships and paying group members for their work as hackers.
167
+ During the time of targeted attacks in 2006 their income increased significantly, to full-time
168
+ wages for part time hacking. Wicked Rose, leader of the group, is pictured below:
169
+ (MeiGui HeiKe)
170
+ Rose Hacker
171
+ QQ number is 5372453 www.mghacker.com
172
+ Wicked Rose maintains a personal site at www.mghacker.com.
173
+ Wicked Rose's Website: www.mghacker.com
174
+ Rose is an approximate 20-year-old (2006) student at the Sichuan University of Science &
175
+ Engineering. In the spring of 2006 Wicked Rose claims to have dropped out of school for full
176
+ time hacking opportunities. Specifically, on April 30, 2006 his blog entry claims he did not
177
+ register for his university exam. He performed significant updates to his rootkit code from
178
+ March through June 2006. He later returned to school by September 2006.
179
+ Wicked Rose claims responsibility on his blog for targeted e-mail based attacks containing
180
+ Microsoft Word and CHM exploits from the spring of 2006.
181
+ Other NCPH-member websites include: http://rodag.blogbus.com,
182
+ http://www.cppblog.com/charles and http://kungbim.blogbus.com. The main NCPH website is
183
+ www.ncph.net:
184
+ NCPH Studio website www.ncph.net
185
+ Registration information for ncph.net reveals a Chinese registrant:
186
+ Registrant Contact: ncph studio ([email protected]) si chuan li gong xue yuan
187
+ zigong, Sichuan, cn 643000 P: +86.13154663992 F: +86.13154663992
188
+ The main location of the NCPH group is in Zigong, Sichuan Province, in south-central China.
189
+ Zigong, Sichuan Province, in south-central China
190
+ The NCPH group (NCPH Studio) in Zigong, China, is shown here:
191
+ NCPH hackers at work in the
192
+ ncph studio
193
+ Left to right:
194
+ Wicked Rose,
195
+ KuNgBiM, Charles and Rodag
196
+ Additional photos featuring Wicked Rose and NCPH hackers are below, captured from their
197
+ various websites and blog entries in 2006. Chinese translation for each photo are below:
198
+ "Wicked Rose"
199
+ From an ancient Chinese poem,
200
+ expressing the devotion of his heart for
201
+ hacking.
202
+ "After you choose the technology you
203
+ love, you have to research every system
204
+ and code everyday!"
205
+ Charles: "Silence belongs to our
206
+ world..."
207
+ Charles
208
+ "Charles always laughs so brightly when
209
+ searching for program problems!"
210
+ KuNgBiM
211
+ "Only we can feel this kind of happy..."
212
+ Ronag
213
+ "Behind every successful design, he
214
+ always has a slight smile
215
+ Wicked Rose and NCPH hacking photos
216
+ WHG (
217
+ WHG is not a core member of NCPH but a close affiliate of Wicked Rose. WHG appears to be
218
+ central to development of the NCPH rootkit, aka GinWui. WHG is credited by Wicked Rose as
219
+ one of the authors of this malicious code. WHG is an experienced malicious code author with
220
+ the following contact information:
221
+ E-mail address:
222
+ QQ Number:
223
+ Website:
224
+ Real Name:
225
+ Location:
226
227
+ 312016
228
+ http://cnasm.com
229
+ May be "Zhao Jibing",
230
+ Believed to be employed in the Sichuan province of China.
231
+ WZT is a former member of the NCPH group who was kicked out during the time of zero-day
232
+ attacks in May 2006. WZT was removed on May 20, 2006. During this time period the zeroday attacks became publicly disclosed, increasing pressure upon the hacking group. It is feasible
233
+ that WZT may have offended the group in some way related to zero-day attack techniques, strife
234
+ over hacker for hire deals, or competition for hacker for hire deals.
235
+ WZT is a former coding expert within the NCPH group and many years experience in hacking.
236
+ He is responsible for creating multiple tools and regularly giving credit to the infamous Li0n
237
+ Chinese hacker (founder of Honker Union (HUC) Chinese group. WZT maintains a website at
238
+ tthacker.cublog.cn.
239
+ The Jiangsu Connection?
240
+ WHOIS registrant data for related domains used within attacks and hacker sites reveals a
241
+ connection with the Jiangsu province of China. One domain, windowsupdates.net, is used in
242
+ attacks and revolves to an IP address in the Sichuan province. Meanwhile, the registrant
243
+ "zhaofeng network" is reportedly based out of Jiangsu, not Sichuan. Some of the WHOIS
244
+ information clearly contains fraudulent information to presumably direct researchers away from
245
+ the true identity and location of the attacker responsible for registering the hostile domain. The
246
+ connection to the Jiangsu and Sichuan provinces remains unclear.
247
+ Concluding Comments
248
+ Prior to Wicked Rose and NCPH hacker for hire attacks in 2006, Chinese hackers are only
249
+ known for their patriotic hacking. This disturbing development reveals two critical threats: 1)
250
+ motives of Chinese hackers are changing 2) Chinese hackers are regularly associated with
251
+ sophisticated attacks as of 2006.
252
+ Wicked Rose implicates himself in his early blog entries and website posts in 2006 and prior.
253
+ An unknown company or entity reportedly paid Wicked Rose for hacking at the rate of 2,000
254
+ RMB a month, about $250 USD. At this time Wicked Rose gave 200 RMB to NCPH hackers
255
+ and kept the rest for himself. Once targeted attacks took place the payment increased five-fold to
256
+ 5,000 RMB monthly with $1,000 a month going to NCPH hackers. This is a significant amount
257
+ of money in China, effectively paying hackers a full-time wage for part-time hacking.
258
+ Throughout the summer of 2006, while Wicked Rose was not in school, over 35 zero-day
259
+ attacks, proof-of-concept codes, and attacks against un-patched Microsoft Office vulnerabilities
260
+ are discovered in the wild. With Wicked Rose claiming responsibility for early attacks and the
261
+ lead author of both GinWui and the NCPH hacking group, there is little doubt left as to his
262
+ involvement in attacks to date.
263
+ By the end of 2006 attacks become increasingly sophisticated. In one instance a popular
264
+ PowerPoint file distributed during the Christmas holiday season for the last two years prior is
265
+ used within a socially engineered attack upon one individual within an energy sector US based
266
+ company. The PowerPoint file is modified to include an exploit that silently installs malicious
267
+ code. This same individual receives another e-mail containing a Microsoft Word exploit. In this
268
+ case only one individual within the company is targeted, and with just two messages socially
269
+ engineered for maximum success. This is a much more targeted and stealthy approach for
270
+ attacks compared to the earlier attacks performed by the group in the late spring of 2006.
271
+ NCPH continues to be a significant threat going forth for several reasons.
272
+ 1. Attacks continue to take place in the wild and are very difficult to identify on a targeted
273
+ basis. Only the most sophisticated networks and system administrators are able to
274
+ properly protect and capture hostile targeted attack files before an attack takes place.
275
+ 2. NCPH is a serious dedicated hacking group that is methodical and disciplined in their
276
+ development of new exploits and attacks.
277
+ 3. NCPH is motivated by both the thrill and challenge of hacking and money as a motive.
278
+ 4. Attacks by the group are highly targeted and stealthy, very difficult to detect and remove.
2008.clean.txt ADDED
The diff for this file is too large to render. See raw diff
 
2009.clean.txt ADDED
The diff for this file is too large to render. See raw diff
 
2010.clean.txt ADDED
The diff for this file is too large to render. See raw diff
 
2011.clean.txt ADDED
The diff for this file is too large to render. See raw diff
 
2012.clean.txt ADDED
The diff for this file is too large to render. See raw diff
 
2013.clean.txt ADDED
The diff for this file is too large to render. See raw diff
 
2014.clean.txt ADDED
The diff for this file is too large to render. See raw diff
 
2015.clean.txt ADDED
The diff for this file is too large to render. See raw diff
 
2016.clean.txt ADDED
The diff for this file is too large to render. See raw diff
 
2017.clean.txt ADDED
The diff for this file is too large to render. See raw diff
 
2018.clean.txt ADDED
The diff for this file is too large to render. See raw diff
 
2019.clean.txt ADDED
The diff for this file is too large to render. See raw diff
 
2020.clean.txt ADDED
The diff for this file is too large to render. See raw diff
 
2021.clean.txt ADDED
The diff for this file is too large to render. See raw diff
 
2022.clean.txt ADDED
The diff for this file is too large to render. See raw diff
 
2023.clean.txt ADDED
The diff for this file is too large to render. See raw diff