text
stringlengths 4
429
|
---|
OHHDL (D)
|
Nov 2009
|
TIBETAN MP
|
Oct 2009
|
Drewla
|
Sep 2008
|
jdusnemsaz.com
|
119.84.4.43
|
jdusnemsaz.com
|
119.84.4.43
|
jdusnemsaz.com
|
119.84.4.43
|
lookbytheway.net
|
221.5.250.98
|
/two/zq2009/index.php
|
NQueryFileop
|
/two/zq2009/index.php
|
NQueryFileop
|
/two/zq2009/index.php
|
NQueryFileop
|
/cgi-bin/NQueryFileop
|
NQueryFileop
|
Further analysis of the network traffic also revealed that at least one of the systems was infected with additional
|
malware not associated with the aforementioned command and control servers. The system was attempting
|
DNS resolutions of multiple hostnames. Two of the hostnames resolved to IP addresses but were not available
|
when the system attempted to communicate to them. The other hostname did not resolve at all.
|
The failed DNS resolution was for www.assam2008.net, which is a domain that has been used by a different
|
group of attackers in the past in conjunction with the Enfal trojan, and suggests a limited connection between
|
the current malware under investigation and malware used in previous attacks on other targets. This domain
|
name was available for registration and was added to our ongoing sinkhole project.
|
While recording network traffic in the field, we observed the attackers removing two senstive documents from
|
the OHHDL (see fig. 1, page 15). The data was compressed using CAB, split into 100kb chunks when necessary, encoded with base64, and then uploaded to a command and control server. In this case, data was being
|
uploaded to c2etejs.com, which is hosted on the same IP address (119.84.4.43) as jdusnemsaz.com.
|
We reconstructed the documents that were exfiltrated from the OHHDL:
|
letters - current.doc
|
and
|
letters - master
|
2009.doc (see fig. 2, page 15).
|
The documents contained over 1,500 letters sent from the Dalai Lama
|
s office
|
between January and November 2009. While many of the letters are perfunctory
|
responses to various invitations
|
and interview requests
|
they allow the attackers to collect information on anyone contacting the Dalai Lama
|
office. Moreover, there are some communications contained within these documents that could be considered sensitive, such as communications between the OHHDL and Offices of Tibet around the world. Some communications
|
contain generic information of the Dalai Lama
|
s travelling details including schedule of appearances
|
but very
|
little that could not be established through open sources and publicly available information on the internet.
|
JR03-2010 Shadows in the Cloud - PART 3: MAPPING THE SHADOWS IN THE CLOUD
|
Figure 1:
|
A screen capture of a sensitive document being uploaded to a command and control server.
|
Figure 2:
|
The Word Documents Exfiltrated from the OHHDL
|
JR03-2010 Shadows in the Cloud - PART 3: MAPPING THE SHADOWS IN THE CLOUD
|
Technical Investigation
|
During the technical investigation we examined the data collected from the field, third-party sources, and from
|
our DNS sinkhole project in order to determine the attack vectors used to exploit and compromise the victims.
|
While we were unable to determine how any one individual computer came to be compromised, we documented a variety of exploits used by the attackers. We mapped out the broader command and control infrastructure
|
by discovering new pieces of malware located on servers that we identified, and catalogued any new servers
|
that these instances of malware were configured with. We also looked at domains that were co-hosted on the
|
same servers we had already identified, and used searches to identify Twitter, Google Groups, Blogspot, Baidu
|
Blogs, blog.com, and Yahoo! Mail accounts that were misused by the attackers to update compromised computers with new command and control locations. We also discovered a panel or listing of compromised computers.
|
During our investigation into one of the servers we made a significant discovery: we were able to recover data
|
that was being exfiltrated by the attackers from compromised computers. These documents were only available
|
on the command and control server for a short time after being uploaded by the compromised systems, as the
|
attackers frequently removed them at irregular time intervals.
|
3.2.1 Attack Vectors / Malware
|
Victims of cyber espionage are often specifically targeted by the attacker and not by happenstance. While it is
|
possible for a cyber criminal to mass-distribute malware across the Internet with specific intent to compromise
|
a select set of individuals or organizations, it is not likely to be the most effective tool for the intended job. The
|
differences in approaches, based on an analysis of tools and kits, can therefore provide some insight into the
|
branching of cyber espionage from cyber crime, or at least help distinguish more
|
connected
|
attackers from
|
less connected
|
ones. The varying levels of sophistication in tools, research and delivery set these actors apart,
|
can make them more or less effective, and establish their level of connection within the underground community. A very sophisticated attacker, for example, will likely be part of a network in the criminal underground
|
that has access to the latest exploits and kits that generate files with exploits to install their malicious payload.
|
These kits and files are not readily available to the average cyber criminal. A slightly less sophisticated attacker
|
might have access to the same kits and exploits once the vulnerability has been publicly disclosed, but prior to
|
there being a security patch issued for them. While from time to time various methods of generating malicious
|
PDFs and other document types will appear on websites like the Metasploit (www.metasploit.com) and milw0rm (www.milw0rm.com), the vast majority of these exploits and kits are not available publicly.
|
The ability to successfully compromise a target relies on more than just code designed to exploit vulnerabilities
|
in software
|
it requires
|
exploiting the human element
|
as well (Nolan and Levesque 2005). The digital traces
|
individuals leave behind on the Internet can be used to manipulate trust, and are used by attackers to encourage
|
targets to execute malicious code on their systems. The first phase of a targeted attack usually involves an
|
information acquisition phase,
|
in which information on potential targets is compiled from a variety of public
|
sources, including social and professional networking sites, conference proceedings, academic papers and project
|
information, in order to generate a profile of the target (Smith and Toppel 2009).
|
Targeted malware attacks often leverage publicly available information to make their social engineering attempts
|
more plausible. Individuals are much more likely to become victims of targeted attacks if malware is sent to
|
them from what appears to be an acquaintance or a colleague (Jagatic et al. 2007). Targeted malware attacks
|
are, in many cases, personalised at the individual or organizational level. Moreover, an attacker may leverage
|
the credentials of a previously compromised acquaintance to add increased levels of legitimacy to the attack. As
|
a result, the attackers are able to convince the target into executing malicious code on their own computer, thus
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.