text
stringlengths 4
429
|
---|
3.4 Backdoor Communication Protocol 0x00: Establishing Communication
|
3.5 Backdoor Communication Protocol 0x01: Execution of Client-Server Commands
|
3.6 Backdoor Command Reference
|
3.7 Backdoor Command Table
|
3.9 Backdoor Commands In Action
|
Summary
|
Safe Computing Habits
|
Appendix A - Other variant method of installation
|
Appendix B - Initial Handshake
|
Appendix C - Customize Character Decoding
|
Appendix D - Real-time Graphical Control
|
Appendix E - Domain Name List
|
Reference
|
CA ISBU-ISI WHITE PAPER: IN-DEPTH ANALYSIS OF HYDRAQ
|
Introduction
|
In mid-December, we detected a highly sophisticated and targeted attack on our corporate
|
infrastructure originating from China that resulted in the theft of intellectual property from Google.
|
... we have evidence to suggest that a primary goal of the attackers was accessing the Gmail
|
accounts of Chinese human rights activists.
|
This statement was taken from a Google blog post entitled "A new approach to China"[1], in which
|
Google declared its decision to stop censoring its search results in China.
|
Internet freedom vs cyber crime is a deep issue that crosses all boundaries; and the same brought
|
global debate about internet censorship and human rights [2].
|
This incident prompted authorities and world leaders to discuss and work on matters of cyber
|
crime; taking into consideration that cyber threats may affect national security [3].
|
The report
|
Tracking GhostNet: Investigating a Cyber Espionage Network
|
[4] as published last
|
year, highlights cyberwarfare as a major global concern.
|
Evidently, an increasing wealth of online information and resources will attract attackers. For highprofile threats such as Hydraq, it is important to understand the underlying attack technique and its
|
technical details.
|
This paper seeks to explore and discover the level of skill the attackers employed to successfully
|
deploy this highly sophisticated attack.
|
CA ISBU-ISI WHITE PAPER: IN-DEPTH ANALYSIS OF HYDRAQ
|
Anatomy of an Attack
|
[Attacker]
|
Reconnaissance
|
Deploying attacks
|
Internet activity
|
IE 0-day Exploit Attack (CVE-2010-049)
|
[Target User]
|
Remote Shellcode APIs
|
shell32.SHGetSpecialFolderPathA
|
urlmon.URLDownloadToFileA
|
...kernel32.CreateFileA
|
...kernel32.GetFileSize
|
// decrypt downloaded file
|
...kernel32.CreateFileA
|
...kernel32.SetFilePointer
|
...kernel32.ReadFile
|
...kernel32.WriteFile
|
...kernel32.CloseHandle
|
...kernel32.CloseHandle
|
...kernel32.DeleteFileA
|
...kernel32.MultiByteToWideChar
|
// Execute Win32/Hydraq dropper
|
kernel32.CreateProcessInternalW
|
[Attacker]
|
Win32/Hydraq allows remote attacker gain control.
|
[Target User]
|
covert communication channel
|
transmission of sensitive information
|
CA ISBU-ISI WHITE PAPER: IN-DEPTH ANALYSIS OF HYDRAQ
|
1. How Hackers Gain Access
|
1.1 Reconnaissance
|
Profiling the target is a basic principle of hacking. This refers to a reconnaissance phase where
|
the attacker evaluates and determine ways to launch a successful attack.
|
Reconnaissance with Whois, DNS and IP/Network could provide preliminary information about
|
the target organization
|
s infrastructure. In addition, a combination of social engineering and
|
physical (on-site) reconnaissance is also considered as a valuable source of information.
|
To learn more about the target, attackers performs passive and active scanning to understand
|
the target network topology, platforms, ports and services, vulnerabilities and security defenses.
|
The profiling also extends to people that have knowledge and access to the target organization
|
including employees, contractors, and visitors. Cyber reconnaissance is very useful in this case,
|
gathering detailed information through social networking sites and tracing digital footprints
|
through search engine results. Attackers could compromise the
|
circle of trust
|
of the target, including friends, family members and even internet browsing habits can be analyzed to successfully gain access.
|
1.2 0Day Hack Attack
|
Hydraq exploits the zero-day (0day) vulnerability in Internet Explorer, which is referred to as
|
CVE-2010-0249 [5] and MS10-002 [6].
|
In reconnaissance stage, Hydraq masterminds have been able to devise a plan for successful
|
hacking attack. Evidently, the authors found an opportunity to target Internet Explorer and evade
|
security detection through an unknown vulnerability.
|
Sophisticated social engineering tricks can then be deployed to entice target users to visit a
|
compromised web site.
|
1.3 MS10-002 (CVE-2010-049) Analysis
|
It is a common characteristic for attackers to obfuscate malicious JavaScript to conceal the
|
code
|
s real intentions and also avoid detection by security scanners [Listing 01].
|
CA ISBU-ISI WHITE PAPER: IN-DEPTH ANALYSIS OF HYDRAQ
|
OBFUSCATED
|
DeOBFUSCATED
|
< Shellcode >
|
< Exploit Code >
|
[Listing 01 - Hydraq JavaScript (JS/Hydraq) distributed for targeted attack]
|
In general use, obfuscation is designed for code protection regardless of whether the intentions
|
are good or bad.
|
Hydraq
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.