text
stringlengths 4
429
|
---|
Red Sky was purportedly arrested on 10/17/12, was convicted |
The attack on Jehad Abdulla is noteworthy, as the ac- |
of insulting the King on his Twitter account @RedSky446, |
count |
s activity aligned with communities typically critical of |
and was sentenced to four months prison.5 When released, he |
Bahrain |
s opposition. However, the account also directly crit- |
found that the passwords for his Twitter, Facebook, and e-mail |
icized the King on occasion, in one case referring to him as |
accounts had been changed, and did not know how to recover |
weak |
and |
stingy. |
An account linked to al9mood sent Je- |
his accounts. |
had Abdulla an IP spy link on 10/2/12 in a public message. On |
The message that Red Sky |
s account sent to Al Kawarah |
10/16/12, Salman Darwish was arrested for insulting the King |
News included a link shortened using Google |
s goo.gl ser- |
using the Jehad Abdulla account. He was sentenced to one |
vice. We used the goo.gl API to access analytics for the link, |
month in prison, partly on the basis of his confession. Salman |
finding that it unshortened to iplogger.org/25SX and was |
father claims that police denied Salman food, drink, and medi- |
created on 12/8/12. The link had received only one click, which |
cal care. |
came from Bahrain with the referrer www.facebook.com. |
Ali |
s case files contained a request from the Public Prose- Another account linked to al9mood targeted @YLUBH, the |
cution for information on an IP address that it had linked to Al Twitter account of Yokogawa Union, a trade union at the |
Kawarah News about 22 hours after the link was created. Court Bahraini branch of a Japanese company. @YLUBH received at |
documents indicate that ISP data linked the IP address to Ali, least three IP spy links in late 2012, sent via public Twitter mes- |
and on this basis he was sentenced to one year in prison. sages. Yokogawa fired the leader of the trade union, Sami Ab- |
Red Sky also targeted M in Figure 2. M recalled click- dulaziz Hassan, on 3/23/13 [30]. It later emerged that Sami was |
ing on a link from Red Sky while using an Internet connec- indeed the operator of the @YLUBH account, and that the police |
tion from one of the houses in M |
s village. The house was had called him in for questioning in relation to its tweets [31]. |
raided by police on 3/12/13, who were looking for the sub- |
Use of embedded remote images: We identified several |
scriber of the house |
s internet connection. Police questioning |
targets who received spoofed e-mails containing embedded |
5 According to information we received from two Twitter users, one remote images. Figure 2 shows two such cases, Maryam |
of whom claimed to have met Red Sky in prison; another to be a col- and Sayed Yousif. The attacker sent the e-mails using |
league. ReadNotify.com, which records the user |
s IP address upon |
5 |
USENIX Association |
23rd USENIX Security Symposium |
515 |
their mail client downloading the remote image.6 sophisticated than FinSpy and RCS, they share the same ba- |
While ReadNotify.com forbids spoofing in their TOS, sic functionality, including screen capture, keylogging, remote |
the service has a vulnerability known to the attackers (and monitoring of webcams and microphones, remote shell, and file |
which we confirmed) that allows spoofing the From address exfiltration. |
by directly setting the parameters on a submission form on their In the most common attack sequence we observed, illus- |
website We have not found evidence suggesting this vulnerabil- trated with three examples in Figure 3, the attacker seeds mal- |
ity is publicly known, but it appears clear that the attacker ex- ware via private chat messages, posts in opposition-controlled |
ploited it, as the web form adds a X-Mai1er: RNwebmail social media groups, or e-mail. These techniques often limit |
header not added when sending through ReadNotify.com |
s the world-visibility of malicious files and links, slowing their |
other supported methods. The header appeared in each e-mail detection by common AV products. Typically, targets receive |
the targets forwarded to us. either (1) a PE in a .zip or .rar, (2) a file download link, or |
When spoofing using this method, the original sender ad- (3) a link that will trigger a drive-by download. The messages |
dress still appears in X-Sender and other headers. Accord- usually include text, often in Arabic, that attempts to persuade |
ing to these, the e-mails received by the targets all came from the target to execute the file or click the link. |
[email protected]. A link sent in one of these e- The first attacks in Figure 3 date to 2012, and use bait files |
mails was connected to the al9mood bit.ly account. with a DarkComet RAT payload. These attacks share the same |
In monitoring accounts connected to al9mood, we counted C&C, 216.6.0.28, a Syrian IP address belonging to the Syr- |
more than 200 IP spy links in Twitter messages and public ian Telecommunications Establishment, and publicly reported |
Facebook posts. Attackers often used (1) accounts of promi- as a C&C of Syrian malware since February 2012 [45]. The |
nent or trusted but jailed individuals like |
Red Sky, |
(2) fake first bait file presents to the victim as a PDF containing infor- |
personas (e.g., attractive women or fake job seekers when tar- mation about a planned uprising in Aleppo. In fact the file is a |
geting a labor union), or (3) impersonations of legitimate ac- Windows Screensaver (.scr) that masquerades as a PDF using |
counts. In one particularly clever tactic, attackers exploited Unicode RLO, rendering a name such as |
.fdp.scr |
dis- |
Twitter |
s default font, for example substituting a lowercase |
play to the victim as |
.rcs.pdf. |
The second bait file is |
with an uppercase |
or switching vowels (e.g. from |
to a dummy program containing DarkComet while masquerading |
) to create at-a-glance identical usernames. In addition, as a Skype call encryption program, playing to opposition para- |
malicious accounts tended to quickly delete IP spy tweets sent noia about government backdoors in common software. The |
via (public) mentions, and frequently change profile names. third attack in Figure 3, observed in October 2013, entices tar- |
gets with e-mails purporting to contain or link to videos about |
the current conflict, infecting victims with Xtreme RAT, and |
4.2 Syria using the C&C tn1.linkpc.net. |
The use of RATs against the opposition has been a well- For seeding, the attackers typically use compromised ac- |
documented feature of the Syrian Civil War since the first re- counts (including those of arrested individuals) or fake iden- |
ports were published in early 2012 [36, 39, 40, 32, 34]. The tities masquerading as pro-opposition. Our illustration shows |
phenomenon is widespread, and in our experience, most mem- in abstract terms the use of Victim A |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.