text
stringlengths
4
429
and drive type. It then sends the gathered information to the client.
Command 0x06
Task 0x07
Searches the directory and sends all filenames to client.
Task 0x01
Creates a thread to perform the following:
1. Search a file with conditions (date time created).
2. Send the file to remote server
Through Command 0x03, a remote attacker using Hydraq can manipulate the registry and use
Command 0x05 Task 09 to store and update gathered information. Command 04 Task 09
retrieves the stored information and assures the integrity of the file sent to remote attacker.
The backdoor can retrieve any file and information at anytime using Command 0x06 Task 01.
CA ISBU-ISI WHITE PAPER: IN-DEPTH ANALYSIS OF HYDRAQ
Hydraq reads the contents of network.ics using Command 0x09 Task 0x01. Network.ics contains information including network name and number mapping for local area network.
Command 0x09
Task 0x01
Reads 616 bytes (0x268) of information stored in the file %system%\drivers
\etc\networks.ics and sends the content to the remote server.
The attacker can manipulate the routing table to redirect traffic to the compromised system. The
Command 0x04 Task 0x02 can be used to open or execute a file or program, and Command
0x04 Task 0x08 can be use to update network.ics content.
Thus, it can perform a man-in-the-middle attack, where attacker can intercept traffic and capture
information.
3.9.2 Surveillance
Hydraq probing capabilities can determine whether the compromised machine has audio/video enabled applications and devices (for example instant messengers and webcam connection). The
attacker can use available application and devices to capture images, voice and video for surveillance.
However, as discussed earlier, Hydraq can also initiate a real-time graphical control and watch a
user
s desktop using Command 0x07 Task 0x0B (see Appendix D for discussion of acelpvc.dll
and VedioDriver.dll installation).
3.9.3 Covert Communication
As discussed, Hydraq
s client-server uses port 443 as an overt communication channel1 (see
Backdoor Communication Protocol) and embeds a custom header (see Appendix B showing the
initial handshake header) to avoid discovery of on-going attacks over the network.
3.9.4 Covering Tracks
Covering tracks is important in hacking. It extends or allows the attacker to stay undetected for a
long period of time. It also removes evidence of hacking and lessens the chances of identification.
If Hydraq can escalate privileges it can also adjust them; if it can execute and run any program/
application, it can terminate it. It can remove its traces in services, registry, file/s, folder/s, change
file attributes and move file/s into different locations. It can also force shutdowns or reboot the system, which can remove valuable traces in memory to avoid digital forensics discovery.
Furthermore, in Command 0x04 Task 0x02 the remote attacker can clear Application Event
logs.
1 Overt channel is any communication path for the authorized data transmission within a computer system or network. HTTP
and HTTP SSL is an overt channel.
CA ISBU-ISI WHITE PAPER: IN-DEPTH ANALYSIS OF HYDRAQ
Command 0x05
Task 0x05
Clears the
Application
event logs.
3.9.5 Expandable Features
In Command 0x02 Task 0x00, the remote attacker can download and execute arbitrary files
onto compromised systems, and it can adjust process token privileges using Command 0x00
Task 0x00. This sets of commands further expands the capability of the attacks.
Command 0x02 Task 0x00
Execute a new thread to perform the following:
1. Connect to the client.
2. Downloads an arbitrary file.
3. Save it as %Temp%\mdm.exe
4. Execute the downloaded file, else delete the file.
Command 0x00
Task 0x00
Adjust Token Privilege / Access Privilege Escalation and Enumerate Process.
The backdoor configuration that is stored in the registry can be updated using Command 05 Task
0x08. This means that the remote attacker can modify and change the connection details at anytime.
CA ISBU-ISI WHITE PAPER: IN-DEPTH ANALYSIS OF HYDRAQ
Summary
The discovery of Hydraq allowed us to explore and understand the underlying features of a highly
sophisticated means of attack. It takes time, organization, skill, and resources to successfully deploy coordinated attacks against high profile infrastructures such as Google.
Clearly, the increasing wealth of information stored in the cloud2 is becoming an attractive target.
The emerging world of cyberspace is now at war against cybercriminals and those conducting cyberwarfare [7] [8]. Sophisticated attacks exploiting unknown software vulnerabilities as means of entry point provides an advantage for attackers to silently infiltrate and perform various forms of spying including the ability to deploy video and audio surveillance, and the probing and stealing of
sensitive desired information. Hydraq
s communication protocol is carefully crafted and researched making it difficult to detect and recognize an on-going attack over the network. The level
of detail of the backdoor commands allow a remote attacker to perform the necessary tasks using
a smaller resource footprint.
In conclusion, the emergence of this type of sophisticated offensive capability will continue to pose
challenges for cyberspace security defenses. By exposing the intricate details of Hydraq, we hope
to assist and contribute to overall cyber security learning and awareness.
2 Cloud refers to services accessed and stored on the internet cloud. Take note, Google disclosed
that attackers accessed
two Gmail accounts of Chinese human rights activist. [1]
CA ISBU-ISI WHITE PAPER: IN-DEPTH ANALYSIS OF HYDRAQ
Safe Computing Habits
With the proliferation of Web-based attacks vector and the increase in global Internet usage, it is
more important than ever to be cautious to ensure safety online. Security is a process. To be secure, you must be aware, apply the right technology, understand your daily computing activity and
identify the amount of information or data you want to secure.
Let the Technology Work For You
Here are some easy steps and reminder to ensure that your CA security products provides optimal
protection for you.
1. Your security scanner must be always turned on and up-to-date with the latest signature. Realtime scanning protects you from possible infection that you may get from compromised Websites, network shares, email and flash drives.
2. Turn on your firewall. Your firewall provides a different layer of security that guards you from
network attacks and blocks unauthorized access to your machine. A firewall with real-time malware behavior intrusion detection could prevent or lessen the impact of malware infection.
3. Turn on Data Execution Prevention (DEP). This feature is available in Windows XP SP3, Windows Server 2003, Windows Server 2008, Windows Vista and Windows 7. Refer Microsoft instruction on how to configure memory protection in Windows XP SP 2 at
http://technet.microsoft.com/en-us/library/cc700810.aspx
4. Increase your browser security settings. You can refer CERT Web browser security tips at
http://www.cert.org/tech_tips/securing_browser
Be Security-Aware
1. Do NOT open email from people you don
t know. Think twice and verify before clicking a URL or