text
stringlengths 4
429
|
---|
s account to seed mal- |
bers of the opposition know that some hacking is taking place. ware ( |
Aleppo Plan |
) via (say) Skype messages to Victim(s) |
As summarized in Table 3, the attacks often include fake or ma- Bn . In the cases of Opp. Member C and NGO Worker |
liciously packaged security tools; intriguing, or ideological, or D (here, actual victims, not abstract), targeting was by e-mail |
movement-relevant content (e.g. lists of wanted persons). The from domains apparently belonging to opposition groups, in- |
seeding techniques and bait files suggest a good understanding dicating a potential compromise. One domain remains active, |
of the opposition |
s needs, fears and behavior, coupled with ba- hosting a website of the Salafist Al-Nusra front [46], while the |
sic familiarity with off-the-shelf RATs. In some cases attacks other appears dormant. Opp. Member C received a malicious |
occur in a context that points to a more direct connection to file as an e-mail attachment, while NGO Worker D was sent a |
one of the belligerents: the Syrian opposition has regularly ob- shortened link (url[.]no/Uu5) to a download from a directory |
served that detainees |
accounts begin seeding malware shortly of Mrconstrucciones[.]net,7 a site that may have been com- |
after their arrest by government forces [41]. promised. Both attacks resulted in an Xtreme RAT infection. |
Researchers and security professionals have already profiled Interestingly, in the case of the fake Skype encryption |
many of these RATs, including DarkComet [42, 43], Black- the deception extended to a YouTube video from |
IT Se- |
shades Remote Controller [38], Xtreme RAT [44], njRAT [26], curity Lab |
[47] demonstrating the program |
s purported ca- |
and ShadowTech [36]. Some are available for purchase by any- pabilities, as well as a website promoting the tool, skype- |
one, in contrast to |
government only |
FinSpy and RCS. For ex- encryption.sytes.net. The attackers also constructed a ba- |
ample, Xtreme RAT retails for e350, while a version of Black- sic, faux GUI for their |
Encryption |
program (see Figure 4). |
shades lists for e40. Others, like DarkComet, are free. We The fake GUI has a number of non-functional buttons like |
have also observed cracked versions of these RATs on Arabic- crypt |
and |
DeCrypt, |
which generate fake prompts. While dis- |
language hacker forums, making them available with little ef- tracted by this meaningless interaction, the victim |
s machine is |
fort and no payment trail. While the RATs are cheaper and less infected with DarkComet 3.3 [32, 33]. |
Anecdotally, campaign volume appears to track significant |
6 YahooMail and the iPhone mail client automatically load these re- |
mote images, especially in e-mails spoofed from trusted senders. 7 Obfuscated to avoid accidental clicks on active malware URLs. |
6 |
23rd USENIX Security Symposium |
USENIX Association |
Type Features Examples (RATs) |
Security tools Executable files presented as a |
tool |
often accompanied by justifica- |
Skype Encryption |
(DC) [32, 33], |
Facebook Security |
(cus- |
tions or statements of its value in the targeted seeding, for example on tom) [34], Anti-hacker (DC) [35], Fake Freegate VPN (ST) [36] |
a social media site, at the download location, or in videos |
Ideologically or A document or PE as download or attachment with accompanying en- |
Names of individuals wanted by the Regime, |
(DC) |
Aleppo |
movement-relevant couragement to open or act on the material, often masquerading as [uprising] Plan |
(DC) [37], important video (BS) [38], |
Hama |
files legitimate PDF documents or inadvertently leaked regime programs. Rebels Council |
document (DC) [39], |
wanted persons |
Frequent use of RLO to disguise true extension (such as .exe or database frontend (custom), movement relevant video (njRAT), |
.scr) file about the Free Syrian Army (Xtreme RAT) |
Miscellaneous tools Tools pretending to offer functionality relevant to the opposition, such hack facebook pro v6.9 (DC) [40] |
as a fake tool claiming to |
mass report |
regime pages on Facebook |
Table 3: Campaigns and RATs employed in Syrian surveillance. BS = Blackshades, DC = DarkComet, ST = Shad- |
owTech. |
Skype |
SY Malware tn1.linkpc.net skype-encription Encryption |
Xtreme Rat Mrconstrucciones.net Url.no |
Actors .sytes.net |
216.6.0.28 fsa.zip |
Dark Comet |
SY Gov't Account seeds |
Aleppo Plan |
E-Mail E-Mail |
Victim A Credentials |
Arrested |
gained |
Aleppo Plan |
Victim(s) Bn Clicks Opp. Member C NGO Worker D |
file Account seeds |
Aleppo Plan |
Figure 3: A sample from the ecosystem of Syrian malware campaigns. |
events in the ongoing conflict. For example, campaigns dwin- |
dled and then rebounded within hours after Syria |
s 2012 Inter- |
net shutdown [48]. Similarly, activity observed by the authors |
also dwindled prior to expectation of US-led military action |
against Syrian government targets in September 2013. Once |
this option appeared to be off the table, the volume of new |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.