text
stringlengths 4
429
|
---|
and drive type. It then sends the gathered information to the client.
|
Command 0x06
|
Task 0x07
|
Searches the directory and sends all filenames to client.
|
Task 0x01
|
Creates a thread to perform the following:
|
1. Search a file with conditions (date time created).
|
2. Send the file to remote server
|
Through Command 0x03, a remote attacker using Hydraq can manipulate the registry and use
|
Command 0x05 Task 09 to store and update gathered information. Command 04 Task 09
|
retrieves the stored information and assures the integrity of the file sent to remote attacker.
|
The backdoor can retrieve any file and information at anytime using Command 0x06 Task 01.
|
CA ISBU-ISI WHITE PAPER: IN-DEPTH ANALYSIS OF HYDRAQ
|
Hydraq reads the contents of network.ics using Command 0x09 Task 0x01. Network.ics contains information including network name and number mapping for local area network.
|
Command 0x09
|
Task 0x01
|
Reads 616 bytes (0x268) of information stored in the file %system%\drivers
|
\etc\networks.ics and sends the content to the remote server.
|
The attacker can manipulate the routing table to redirect traffic to the compromised system. The
|
Command 0x04 Task 0x02 can be used to open or execute a file or program, and Command
|
0x04 Task 0x08 can be use to update network.ics content.
|
Thus, it can perform a man-in-the-middle attack, where attacker can intercept traffic and capture
|
information.
|
3.9.2 Surveillance
|
Hydraq probing capabilities can determine whether the compromised machine has audio/video enabled applications and devices (for example instant messengers and webcam connection). The
|
attacker can use available application and devices to capture images, voice and video for surveillance.
|
However, as discussed earlier, Hydraq can also initiate a real-time graphical control and watch a
|
user
|
s desktop using Command 0x07 Task 0x0B (see Appendix D for discussion of acelpvc.dll
|
and VedioDriver.dll installation).
|
3.9.3 Covert Communication
|
As discussed, Hydraq
|
s client-server uses port 443 as an overt communication channel1 (see
|
Backdoor Communication Protocol) and embeds a custom header (see Appendix B showing the
|
initial handshake header) to avoid discovery of on-going attacks over the network.
|
3.9.4 Covering Tracks
|
Covering tracks is important in hacking. It extends or allows the attacker to stay undetected for a
|
long period of time. It also removes evidence of hacking and lessens the chances of identification.
|
If Hydraq can escalate privileges it can also adjust them; if it can execute and run any program/
|
application, it can terminate it. It can remove its traces in services, registry, file/s, folder/s, change
|
file attributes and move file/s into different locations. It can also force shutdowns or reboot the system, which can remove valuable traces in memory to avoid digital forensics discovery.
|
Furthermore, in Command 0x04 Task 0x02 the remote attacker can clear Application Event
|
logs.
|
1 Overt channel is any communication path for the authorized data transmission within a computer system or network. HTTP
|
and HTTP SSL is an overt channel.
|
CA ISBU-ISI WHITE PAPER: IN-DEPTH ANALYSIS OF HYDRAQ
|
Command 0x05
|
Task 0x05
|
Clears the
|
Application
|
event logs.
|
3.9.5 Expandable Features
|
In Command 0x02 Task 0x00, the remote attacker can download and execute arbitrary files
|
onto compromised systems, and it can adjust process token privileges using Command 0x00
|
Task 0x00. This sets of commands further expands the capability of the attacks.
|
Command 0x02 Task 0x00
|
Execute a new thread to perform the following:
|
1. Connect to the client.
|
2. Downloads an arbitrary file.
|
3. Save it as %Temp%\mdm.exe
|
4. Execute the downloaded file, else delete the file.
|
Command 0x00
|
Task 0x00
|
Adjust Token Privilege / Access Privilege Escalation and Enumerate Process.
|
The backdoor configuration that is stored in the registry can be updated using Command 05 Task
|
0x08. This means that the remote attacker can modify and change the connection details at anytime.
|
CA ISBU-ISI WHITE PAPER: IN-DEPTH ANALYSIS OF HYDRAQ
|
Summary
|
The discovery of Hydraq allowed us to explore and understand the underlying features of a highly
|
sophisticated means of attack. It takes time, organization, skill, and resources to successfully deploy coordinated attacks against high profile infrastructures such as Google.
|
Clearly, the increasing wealth of information stored in the cloud2 is becoming an attractive target.
|
The emerging world of cyberspace is now at war against cybercriminals and those conducting cyberwarfare [7] [8]. Sophisticated attacks exploiting unknown software vulnerabilities as means of entry point provides an advantage for attackers to silently infiltrate and perform various forms of spying including the ability to deploy video and audio surveillance, and the probing and stealing of
|
sensitive desired information. Hydraq
|
s communication protocol is carefully crafted and researched making it difficult to detect and recognize an on-going attack over the network. The level
|
of detail of the backdoor commands allow a remote attacker to perform the necessary tasks using
|
a smaller resource footprint.
|
In conclusion, the emergence of this type of sophisticated offensive capability will continue to pose
|
challenges for cyberspace security defenses. By exposing the intricate details of Hydraq, we hope
|
to assist and contribute to overall cyber security learning and awareness.
|
2 Cloud refers to services accessed and stored on the internet cloud. Take note, Google disclosed
|
that attackers accessed
|
two Gmail accounts of Chinese human rights activist. [1]
|
CA ISBU-ISI WHITE PAPER: IN-DEPTH ANALYSIS OF HYDRAQ
|
Safe Computing Habits
|
With the proliferation of Web-based attacks vector and the increase in global Internet usage, it is
|
more important than ever to be cautious to ensure safety online. Security is a process. To be secure, you must be aware, apply the right technology, understand your daily computing activity and
|
identify the amount of information or data you want to secure.
|
Let the Technology Work For You
|
Here are some easy steps and reminder to ensure that your CA security products provides optimal
|
protection for you.
|
1. Your security scanner must be always turned on and up-to-date with the latest signature. Realtime scanning protects you from possible infection that you may get from compromised Websites, network shares, email and flash drives.
|
2. Turn on your firewall. Your firewall provides a different layer of security that guards you from
|
network attacks and blocks unauthorized access to your machine. A firewall with real-time malware behavior intrusion detection could prevent or lessen the impact of malware infection.
|
3. Turn on Data Execution Prevention (DEP). This feature is available in Windows XP SP3, Windows Server 2003, Windows Server 2008, Windows Vista and Windows 7. Refer Microsoft instruction on how to configure memory protection in Windows XP SP 2 at
|
http://technet.microsoft.com/en-us/library/cc700810.aspx
|
4. Increase your browser security settings. You can refer CERT Web browser security tips at
|
http://www.cert.org/tech_tips/securing_browser
|
Be Security-Aware
|
1. Do NOT open email from people you don
|
t know. Think twice and verify before clicking a URL or
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.