text
stringlengths 4
429
|
---|
x
|
.tex
|
e
|
e
|
e
|
e
|
e
|
e
|
e
|
e
|
0
|
10 011 011 01
|
10 011 001 01
|
EXECUTIVE
|
SUMMARY
|
BAE Systems Applied Intelligence: Snake Rootkit Report 2014 2
|
OVERVIEW
|
One of the questions which comes up in the months after big security whitepaper disclosures is:
|
where are they now? In other words, what happened to the operators, tools, and infrastructure
|
which was revealed in the reports, blog-posts, and press interviews.
|
Did they continue on as before, did they re-build the disclosed infrastructure and tools, did they go
|
away and get jobs in another line of work?
|
In some cases, the disclosure had little, if any impact on the operation. For example, after the
|
McAfee ShadyRAT report in 2011, there was absolutely no change in the attacks from the group
|
behind this. However, when Mandiant released their APT1 report in 2013, there was a noticeable
|
reduction in activity from the group
|
and much of the tools and infrastructure has not been seen
|
since.
|
In the September 2010 issue of Foreign Affairs magazine1, former US Deputy Secretary of Defense
|
William J. Lynn discussed a cyber-attack which happened two years previously on the DoD
|
classified computer networks. Lynn described how a foreign intelligence agency planted malicious
|
code on the networks with the aim of transferring data to servers under their control.
|
The article included the now oft-quoted phrase
|
digital beachhead
|
to describe what was
|
undoubtedly a significant compromise of US military systems. Further reports in the press2 kept the
|
story alive in 2011, but since then this threat has received remarkably little attention.
|
However, the operation behind the attacks has continued with little modification to the tools and
|
techniques, in spite of the widespread attention a few years ago. They use highly sophisticated
|
malware tools to maintain persistent access to their targets. These tools can be used for covert
|
communications in a number of different modes, some of which present significant challenges for
|
traditional security technologies to detect.
|
There are some threats which come and go, whilst there are others which are permanent
|
features of the landscape. In this paper, we describe the tools and techniques of one of the most
|
sophisticated and persistent threats we track. We hope this will help victims identify intrusions and
|
understand their need to improve defences. Cyber security is a collaborative effort
|
the operation
|
described in this paper again raises the bar for the security community in their efforts to keep up
|
with the attackers in cyber-space
|
http://www.foreignaffairs.com/articles/66552/william-j-lynn-iii/defending-a-new-domain
|
http://www.reuters.com/article/2011/06/17/us-usa-cybersecurity-worm-idUSTRE75F5TB20110617
|
BAE Systems Applied Intelligence: Snake Rootkit Report 2014 3
|
TECHNICAL
|
DESCRIPTION
|
BAE Systems Applied Intelligence: Snake Rootkit Report 2014 4
|
BACKGROUND
|
When antivirus back-end classification platforms cannot identify a malware family for an analysed malicious sample, they assign
|
generic names, such as
|
Trojan Horse
|
or
|
Agent
|
. The variant letters are also assigned automatically, by using hexavigesimal
|
(or Base26) notation. That is, the variant letters are auto-assigned starting from
|
, followed with
|
, and so on until
|
. Next
|
comes
|
and so on, until
|
. After that, the variant letters start from
|
and so on, until
|
Back in 2008 an unknown malicious file was discovered and auto-classified as
|
Agent.BTZ
|
, meaning it was registered as unknown
|
malicious sample #1,898 in an anti-virus classification system. It wasn
|
t given an actual name, only a generic one.
|
Meanwhile, internally the authors behind this malware were using their own naming systems - with specific titles for their file
|
components and projects such as
|
snake
|
uroburos
|
sengoku
|
, and
|
snark
|
used to denote variants of their framework.
|
A recent report from German security company GData3 described a sample from the
|
uroburos
|
variant of this framework. Their
|
report revealed the complex nature of this malware family, and showed that the operation behind
|
Agent.BTZ
|
has continued. As
|
a result of this disclosure, we are also releasing our own technical analysis of the threat, including a timeline of known samples,
|
known Command-and-Control (C&C) servers, and other indicators to aid investigators in discovering attacks.
|
Reverse engineering of recent malware samples shows these to be much more advanced variants of Agent.BTZ, though still sharing
|
many similarities and encryption methods with the original. Further investigation allowed us to locate related samples compiled
|
between 2006 and 2014, and spanning across several distinctive generations. The first section of this report gives an overview of
|
the samples collected, where they were reported and the timelines derived from their analysis.
|
Snake
|
s architecture turned out to be quite interesting. We have identified two distinct variants, both highly flexible but with two
|
different techniques for establishing and maintaining a presence on the target system. In general, its operation relies on kernel
|
mode drivers, making it a rootkit. It is designed to covertly install a backdoor on a compromised system, hide the presence of its
|
components, provide a communication mechanism with its C&C servers, and enable an effective data exfiltration mechanism. At the
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.