text
stringlengths 4
429
|
---|
samples and campaigns we observed again increased, includ- |
ing the recent targeting of NGO workers per Figure 3. We are |
aware of only a negligible number of cases of the opposition |
using similar RATs against Syrian Government supporters, al- |
though evidence exists of other kinds of electronic attacks by |
third parties. |
Real world consequences. The logistics and activities of |
Syria |
s numerous opposition groups are intentionally concealed |
from public view to protect both their efficacy, and the lives of |
people participating in them. Nevertheless, Syrian opposition |
members are generally familiar with stories off digital compro- Figure 4: The fake Skype program distracts the victim |
mises of high-profile figures, including those entrusted with the with the promise of encrypted communications while in- |
most sensitive roles, as well as rank-and-file members. Com- fecting their machine with DarkComet. |
promise of operational security poses a documented threat to |
life both for victims of electronic compromise, and to family |
members and associates. |
The Syrian conflict is ongoing, making it difficult to assem- |
7 |
USENIX Association |
23rd USENIX Security Symposium |
517 |
ble comprehensive evidence of linkages between government UAE Gov't HackingTeam 3-Stage |
Exploit Kit |
actors and malware campaigns. Moreover, many individuals owner.no-ip.biz |
whose identities have been compromised are in prison or oth- |
erwise disappeared, and thus unable to relate the evidence pre- CVE-2010-3333 |
sented to them during interrogation. Still, strong circumstantial |
evidence links the use of RATs, phishing, and government ac- |
wikileaks |
Xtreme RAT |
tivity, which we briefly summarize here: (1) many Syrians have RCS |
veryimportant |
recounted to journalists and the authors how interrogators con- |
fronted them with material from their computers. For example: |
The policeman told me, |
Do you remember when |
you were talking to your friend and you told him |
you had something wrong [sic] and paid a lot of Author |
money? At that time we were taking information ar-24.com Communicated |
via E-Mail |
from your laptop. |
[41] |
(2) Syrian activists have supplied cases to international journal- |
ists [41], where arrests are quickly followed by the social me- Ahmed |
Laptop |
infected |
dia accounts of detained individuals seeding malware to contact E-Mail account |
lists (Figure 3). (3) Finally, despite the notoriety of the attack compromised |
campaigns, including mention of C&C IPs in international me- |
dia [45], the Syrian government has made no public statements |
about these campaigns nor acted to shut down the servers. Figure 5: Part of the ecosystem of UAE surveillance at- |
Beyond the ongoing challenges of attribution, these malware tacks. |
campaigns have a tangible impact on the Syrian opposition, and |
generally align with the interests of the Syrian government |
s from ar-24.com, which in turn downloaded spyware from |
propaganda operations. The case of Abdul Razzaq Tlass, a ar-24.com. We denote this combination as the 3-Stage Ex- |
leader in the Free Syrian Army, is illustrative of the potential ploit Kit in Figure 5. |
uses of such campaigns. In 2012 a string of videos emerged The C&C server also ran on ar-24.com. When we ob- |
showing Tlass sexting and engaged in lewd activity in front of tained the sample in July 2012, ar-24.com resolved to an |
a webcam [49]. While he denied the videos, the harm to his rep- IP address on Linode, a hosting provider. Three months later, it |
utation was substantial and he was eventually replaced [50]. resolved to a UAE address belonging to the Royal Group [52], |
an organization linked to the UAE government; it is chaired by |
Sheikh Tahnoon bin Zayed Al-Nayhan, a member of the UAE |
4.3 UAE |
ruling family and a son of the founder of the UAE. |
While the UAE has experienced no recent uprising or politi- Identification as RCS: We identified strings in memory |
cal unrest, it has nevertheless cracked down on its opposition, that matched those in a Symantec analysis [53] of RCS (also |
concurrent with the Arab Spring. known as DaVinci or Crisis), a product of the Italian com- |
The first attacks we observed in the UAE involved a pany Hacking Team [54]. We also located a structurally sim- |
government-grade |
lawful interception |
trojan known as Re- ilar Word document via VirusTotal. The document used the |
mote Control System (RCS), sold by the Italian company Hack- same exploit and attempted to download a second stage from |
ing Team. The associated C&C server indicated direct UAE rcs-demo.hackingteam.it, which was unavailable at |
government involvement. Over time, we stopped receiving the time of testing. |
RCS samples from UAE targets, and instead observed a shift Analysis of capabilities: RCS has a suite of functionality |
to the use of off-the-shelf RATs, and possible involvement of largely similar to FinSpy. One difference was in the vectors |
cyber-mercenary groups. However, poor attacker operational used to install the spyware. We located additional samples (see |
security allowed us to link most observed attacks together. |
5), some of which were embedded in a .jar file that installs |
an OS-appropriate version of RCS (Windows or OSX), option- |
RCS. UAE activist Ahmed Mansoor (per Figure 5), impris- ally using an exploit. If embedded as an applet, and no exploit |
oned from April to November 2011 after signing an online pro- is present, Java displays a security warning and asks the user |
democracy petition [51], received an e-mail purportedly from whether they authorize the installation. We also saw instances |
Arabic Wikileaks |
in July 2012. He opened the associated at- of the 3-Stage Exploit Kit where the first stage contained a |
tachment, |
veryimportant.doc, |
and saw what he described as Flash exploit; in some cases, we could obtain all stages and |
scrambled letters |
. He forwarded us the e-mail for investiga- confirm that these installed RCS. Some samples were packed |
tion. with the MPress packer [55], and some Windows samples were |
The attachment exploited CVE-2010-3333, an RTF pars- obfuscated to look like the PuTTY SSH client. |
ing vulnerability in Microsoft Office. The document did not Another difference is in persistence. For example, the RCS |
contain any bait content, and part of the malformed RTF sample sent to Ahmed adds a Run registry key, whereas the |
that triggered the exploit was displayed in the document. FinSpy samples used in Bahrain overwrite the hard disk |
s boot |
The exploit loaded shellcode that downloaded a second stage sector to modify the boot process; the spyware is loaded be- |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.