SlideShare une entreprise Scribd logo
1  sur  35
Télécharger pour lire hors ligne
SESSION ID:
#RSAC
Derek Manky
ORDER VS. MAD SCIENCE
ANALYZING BLACK HAT SWARM
INTELLIGENCE
HT-W02
Global Security Strategist
For>net, Office of CISO
/in/derekmanky
WAR GAMES
The Rise of the Machines
#RSAC
§  Experimental self-replica>ng program
§  WriJen in 1971 to demonstrate a ‘mobile’ applica>on
§  Infected DEC PDP-10 computers running TENEX OS
§  Just 1 year aQer Unix ‘Epoch Time’ began
§  ‘Reaper’ worm created in ‘72 to delete it
1 January 1970 00:00:00 GMT à Epoch >mestamp 0
1971: Creeper – The First Computer Virus
#RSAC
COMPOUNDED CYBERCRIME
Evolving AJack Capabili>es
Threat Landscape
CRIMEWARE PRODUCERS
Source Code
Junior Developers
Copy	&	paste	
Senior DevelopersExploits Packers Special
Pla^orm
s
Mobile
CRIME SERVICES ENABLERS
Quality Assurance
Crypters / Packers
Scanners
HosMng
Infec>ons / Drop Zones
Management
Botnet Rentals
Installs / Spam /
SEO / DDoS
Money Mules
Accounts Receivable
ConsulMng
Affiliates
Criminal
OrganizaMons
Sales, Licensing,
Maintenance
Partnerships
Affiliate Programs
FakeAV / Ransomware / Botnets
VicMms
Bank
Accounts
Creden>als
& Data
Digital Real
Estate
#RSAC
SPEED KILLS: SWARM BOTNETS
AcceleraMng the ATack Chain
Hit Me With Your Best Shot – Fire Away
#RSAC
Swarm – Individual Survival Using the Group
Starlings flock toward dusk in order to avoid predators…
create a ‘murmuring’
Collec>ve behavior
exhibited by en>>es,
par>cularly animals
Similar size or
same species
Aggregate together,
usually moving together
in some direc>on
Ants build resiliency through cooperaMve structures or
mass defense / aTack strategies
#RSAC
Other Biomechanical Examples
of Swarm Behavior
Stock trading is o`en irraMonal relaMve to the underlying value of a
company due to swarm behavior
Group behavior can be radically different
from individual behavior
Humans also Behave in Swarm Fashion
Old saying – a person is
smart, a crowd is not
Tend to exhibit swarm
behavior depending on
situa>on
Aggregate and size of
grouping determines
behavior
#RSAC
#RSAC
EXFILTRATION 5
GATHER 4
EXPAND3
BREAK-IN2
PLANNING1
•  Deliver remote exploits and
malware
•  Establish backdoors for
commands
•  Iden>fy and collect
sensi>ve data
•  Staging Server
•  Research target
•  Build or Acquire Tools
•  Test tools + detec>on
The Accelerated AJack Chain
Automa>on & Swarm Decrease TTB (Time to Breach)
•  Move laterally to increase
system access
•  Stronger Foothold
•  Data exfiltra>on through
command and control services to
external network
SURVIVE… Or PROFIT?
6
#RSAC
•  Shodan is a search engine that indexes open ports and services
•  AJacker Queries Shodan
•  AJacker uses a list of known exploits to aJack known IoT and other
systems based on indexed queries given by Shodan
•  AJackers then aJacks IoT or vulnerable systems directly bypassing
per miter security features gaining a foothold into internal networks.
Autosploit – Building Swarms
#RSAC
Autosploit Workflow
Autosploit
Interface
Shodan
Query
Gather Known
Vulnerabili>es
Indexed by
Shodan
Launch
and run
exploits
1. Attacker launches Autosploit script
2. Autosploit queries Shodan for known
exploits
3. Autosploit uses intelligent matching
(optional) to match additional exploits
to ports and services
4. Autosploit configures metasploit as
a “reverse listener” to launch an
attack to a victim.
5. Victim connects back to the
attacker’s Autosploit, allowing (many
times) for the attacker to bypass
security measures
#RSAC
Problems with Autosploit
Easy to launch
No real skills needed
No discrimina>on between hosts
Uses dangerous exploits that may crash/destroy sytems
Shodan
Shodan uses hive func>ons by looking for similar systems with similar func>ons
Categorizes vulnerabili>es
Allows users to search for vulnerable systems that are live
[ AUTOSPLOIT DEMONSTRATION ]
#RSAC
Botnet Building Blocks
Typical Botnet Components
AJacker
(botmaster, herder)
C&C Server Zombies Vic>m / target Communica>ons
channels
AJacker Control Server Botnet AJach Nodes Vic>m
Ini>ate AJack AJack Traffic
#RSAC
Blackhat Swarms – Removing the C2
Next GeneraMon Botnet 3.0: Swarm
What if Botnets could u>lize swarm intelligence?
§  Largely Accelerated AJack Chain
§  Human Out of Loop
§  Strengthened Blackhat Hive
Botnet AJach Nodes Vic>m
AJack Traffic
Satori Botnet example
§  If camera is hacked or under stress it skips the
system if beJer targets are found (pheromones)
#RSAC
Frankenstein Malware
§  Localized swarm behavior – code building blocks
from legi>mate running processes
§  Seman>c Blueprint contains malware goals
§  Malware scans for exis>ng underlining code in
memory
§  Malware uses pieces of code from various
programs to create new malware
§  Lua gives flexibility, add code
§  Debug in real->me
#RSAC
Hajime Precursor
•  Intelligent IOT Botnet – Nine Pla^orms + x86
•  TR-069 Exploit (MSSP/Telco Control)
•  First detected October 25, 2016
•  30,000+ detec>ons per day (For>Guard)
#RSAC
Hajime Precursor
•  Hajime, a mul> pla^orm worm with a decentralized C2 (First known IOT)
•  IoT is the target, basically any pla^orm that runs busybox
•  ARMv5-7, MIPS LiJle endian, Intel x86-64
Once ini>ally infected will
randomly probe for other
devices
If found a telnet port open it
will try to brute for logins
Once inside a couple of
commands are issued
These commands are used
to further iden>fy the
enviroment
$ enable
$ system
$ shell
$ sh
$ /bin/busybox ECCHI
Once iden>fied the target
architecutre, binaries for
that pla^orm are
downloaded from the
aJacking host
# echo -ne
"x7fx45x4c
x46x01x01x01x00x00x00x00x00x00x00x00x00x02x00x28x00x01x0
0x00
x00x54x00x01x00x34x00x00x00x44x01x00x00x00x02x00x05x34x0
0x20x00x01x00x2
8x00x04x00x03x00x01x00x00x00x00x00x00x00x00x00x01x00"
> .s; /bin/busybox
ECCHI
# echo
The purpose of this piece of
code which is basically piped
in hexadecimal through the
network and dumped to a
local file and then executed
is to download the stage2
The download of the stage 2
begins, which is the botnet
comminica>on part, using
encrypted trackerless
torrent uTP
# unlink file
AQer all Hajime deletes itself
from the filesystem, having
footprint in memory only
#RSAC
Hide and Seek
•  Second known decentralized P2P IOT botnet
•  Swarm	characteris-cs	
•  Known exploit to spread to TP Link routers
•  Confirmed Capabili>es
•  AMD x64, ARM
•  Brute force aJacks
•  Target addi>on to random list
•  File retrieval commands through P2P nodes
•  Peer request-response model
•  ‘i’ request à ‘I’ response
•  ‘h’ request à ‘H’ response
•  ‘z’ request à ‘O’ response
•  ‘~’ request à ‘^’ response
#RSAC
Hide and Seek
Fig 1: HNS Adds firewall rule to allow traffic
on UDP port for P2P
Fig 3: P2P communicaMon traffic captured, retrieving ELF files
Fig 2: Scanning for next vicMms
Fig 4: List of supported run Mme commands
#RSAC
Hide and Seek
'e' + IP:PORT's' + path
‘m<data’ ßà Y<data>’
2) Target is identified by swarm
3) Target is swarmed, penetrated
4) File information leaked
through swarm (IP, etc)
1) Seed the Swarm Autosploit)
#RSAC
ORDER: HIVE NETWORKS (HIVENETS)
All Your Bots are Belong To Us
Building a Cohesive Security Fabric
#RSAC
Hive – Group Survival Using the Individual
Elephants, Meercats, and even humans ac>ng as a corpora>on
Decentralized,
mul>component
mind
Displayed by
social insects and
some animals
Individual is the
lowest cell unit
Quickly dies if
individual
becomes
separated
Many animals
display forms of
this behavior…
#RSAC
Hive – Group Survival Using the Individual
Bees: individual = simplis>c
•  As a group the intelligence rises
•  Individuals responsible for jobs
•  Complex communica>on and
rituals
•  Sub-groups have specific roles
such as food gathering, digging,
feeding pupae, cleaning
•  All will act in defense of aJack
Example – complex sub-group communicaMons
Circular = nearby food Tail wag = far away food
#RSAC
Is Cloud a Hive?
Cloud
•  More of an extension of the hive
•  As a component it is oQen like a sub-group
•  Serves a func>on to infrastructure, resources
•  Connects worker nodes and extends func>onality
•  Example: cloud-based security solu>ons such as
sandbox, web content filtering, others
Hive
•  Decentralized, mul>component
•  Group is intertwined through individuals
•  Individual is the lowest cell unit
•  Unable to act sufficiently as a stand-alone Quickly
#RSAC
Hive Defense Strategy
#RSAC
Hive Defense Strategy
#RSAC
Cyber Threat Alliance
Integra>on of CTA Intelligence into Mul>ple Vendors (Swarm)
FOUNDING MEMBERS AFFILIATE & CONTRIBUTING MEMBERS
“The	best	way	to	combat	the	negative	impact	of	cybercriminals	and	best	protect	our	customers	is	
through	cooperation	and	partnership	based	on	actionable	intelligence	from	diverse	sources.”		
Ken	Xie,	founder,	chairman	of	the	board	and	CEO,	Fortinet
#RSAC
ex·pert sys·tem
noun
COMPUTING
a piece of soQware programmed using ar>ficial
intelligence techniques. Such systems use databases of
expert knowledge to offer advice or make decisions in
such areas as medical diagnosis and trading on the stock
exchange.
Advanced Solu>ons for Swarm
#RSAC
Advanced Solu>ons for Swarm: AI An>-Malware
MALICIOUS
CLEAN
OUTPUT
L J
INPUT
RAW SAMPLES
Feature Set Improvements
§  Quality
§  Stabilized Number
§  Weigh>ng Confidence
ConMnued Accuracy to
a High Degree of
Confidence
FEATURESQuan>ty
Quality
#RSAC
YESTERDAY’S PRIMARY STRATEGY:
STATIC BOUNDARY SECURITY
SWARM STRATEGY:
AGILE MACRO AND MICRO SEGMENTATION
IoT
Mobile
Windows
Mac
Visibility,
Control,
Consistency
100G
5G
Private
Campus
Core
WAN
Access
Public
#RSAC
IoT
Mobile
Windows
Mac
Visibility,
Control,
Consistency
100G
5G
SWARM STRATEGY:
AGILE MACRO AND MICRO SEGMENTATION
Public
Private
Campus
Core
WAN
Access
#RSAC
Recon
Delivery
Exploit
C & C
Internal Recon
Maintain
Accelerated AJack Chain Defense: Hive Defense in Kill Chain
Protect Detect Disrupt Degrade Deceive Contain
LOWRISKHIGH
NG Firewall
AV, IPS,WF,
Botnet
Mail
Security
Advanced Threat ProtecMon
Framework
(Sandbox Technology working with FW, Endpoints, Mail, WAF)
Database Monitoring and MulM-AuthenMcaMon
Internal SegmentaMon Firewalls – Architecture
#RSAC
Following Through
§  Next week you should:
§  Think about your hive – where is it located (distributed, centralized, etc)
§  In the first three months following this presentaMon you should:
§  Iden>fy cri>cal assets, resources within your hive
§  Within six months you should:
§  Create an orchestrated security model that is your hive defense
§  Integra>on of security devices vs. kill chain
§  Consider AI solu>ons vs. zero day code
§  Shared, ac>onable intelligence between security solu>ons
§  Think about how to repurpose human admins (SOC/NOC) with such solu>ons
34
#RSAC
ORDER VS. MAD SCIENCE

Contenu connexe

Tendances

Malware collection and analysis
Malware collection and analysisMalware collection and analysis
Malware collection and analysisChong-Kuan Chen
 
Attacking Automatic Wireless Network Selection
Attacking Automatic Wireless Network SelectionAttacking Automatic Wireless Network Selection
Attacking Automatic Wireless Network Selectionamiable_indian
 
DDoS Attack on DNS using infected IoT Devices
DDoS Attack on DNS using infected IoT DevicesDDoS Attack on DNS using infected IoT Devices
DDoS Attack on DNS using infected IoT DevicesSeungjoo Kim
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014grecsl
 
2012 S&P Paper Reading Session1
2012 S&P Paper Reading Session12012 S&P Paper Reading Session1
2012 S&P Paper Reading Session1Chong-Kuan Chen
 
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...grecsl
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin
 
Entropy and denial of service attacks
Entropy and denial of service attacksEntropy and denial of service attacks
Entropy and denial of service attackschris zlatis
 
Parrot Drones Hijacking
Parrot Drones HijackingParrot Drones Hijacking
Parrot Drones HijackingPriyanka Aash
 
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for  Intrusion DetectionCloudslam09:Building a Cloud Computing Analysis System for  Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion DetectionWei-Yu Chen
 
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemy
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemyRooted2020 stefano maccaglia--_the_enemy_of_my_enemy
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemyRootedCON
 
Practical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksPractical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksSecurity Session
 
10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques10 DDoS Mitigation Techniques
10 DDoS Mitigation TechniquesIntruGuard
 
Phases of penetration testing
Phases of penetration testingPhases of penetration testing
Phases of penetration testingAbdul Rahman
 
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiProfessor Lili Saghafi
 

Tendances (20)

Malware collection and analysis
Malware collection and analysisMalware collection and analysis
Malware collection and analysis
 
Attacking Automatic Wireless Network Selection
Attacking Automatic Wireless Network SelectionAttacking Automatic Wireless Network Selection
Attacking Automatic Wireless Network Selection
 
DDoS Attack on DNS using infected IoT Devices
DDoS Attack on DNS using infected IoT DevicesDDoS Attack on DNS using infected IoT Devices
DDoS Attack on DNS using infected IoT Devices
 
G3t R00t at IUT
G3t R00t at IUTG3t R00t at IUT
G3t R00t at IUT
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
 
2012 S&P Paper Reading Session1
2012 S&P Paper Reading Session12012 S&P Paper Reading Session1
2012 S&P Paper Reading Session1
 
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
 
5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
 
Entropy and denial of service attacks
Entropy and denial of service attacksEntropy and denial of service attacks
Entropy and denial of service attacks
 
Parrot Drones Hijacking
Parrot Drones HijackingParrot Drones Hijacking
Parrot Drones Hijacking
 
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for  Intrusion DetectionCloudslam09:Building a Cloud Computing Analysis System for  Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
 
Database Firewall with Snort
Database Firewall with SnortDatabase Firewall with Snort
Database Firewall with Snort
 
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemy
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemyRooted2020 stefano maccaglia--_the_enemy_of_my_enemy
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemy
 
Practical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksPractical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacks
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques
 
Phases of penetration testing
Phases of penetration testingPhases of penetration testing
Phases of penetration testing
 
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
 
Unveiling-Patchwork
Unveiling-PatchworkUnveiling-Patchwork
Unveiling-Patchwork
 

Similaire à Order vs. Mad Science: Analyzing Black Hat Swarm Intelligence

3. APTs Presentation
3. APTs Presentation3. APTs Presentation
3. APTs Presentationisc2-hellenic
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob HolcombPriyanka Aash
 
Talk28oct14
Talk28oct14Talk28oct14
Talk28oct14mjos
 
Catch Me If You Can - Finding APTs in your network
Catch Me If You Can - Finding APTs in your networkCatch Me If You Can - Finding APTs in your network
Catch Me If You Can - Finding APTs in your networkDefCamp
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing BasicsRick Wanner
 
(130119) #fitalk apt, cyber espionage threat
(130119) #fitalk   apt, cyber espionage threat(130119) #fitalk   apt, cyber espionage threat
(130119) #fitalk apt, cyber espionage threatINSIGHT FORENSIC
 
Recon for the Defender: You Know Nothing (about Your Assets), Jon Snow
Recon for the Defender: You Know Nothing (about Your Assets), Jon SnowRecon for the Defender: You Know Nothing (about Your Assets), Jon Snow
Recon for the Defender: You Know Nothing (about Your Assets), Jon SnowPriyanka Aash
 
RSA 2018: Recon For the Defender - You know nothing (about your assets)
RSA 2018: Recon For the Defender - You know nothing (about your assets)RSA 2018: Recon For the Defender - You know nothing (about your assets)
RSA 2018: Recon For the Defender - You know nothing (about your assets)Jonathan Cran
 
Watchtowers of the Internet - Source Boston 2012
Watchtowers of the Internet - Source Boston 2012Watchtowers of the Internet - Source Boston 2012
Watchtowers of the Internet - Source Boston 2012Stephan Chenette
 
How to measure your security response readiness?
How to measure your security response readiness?How to measure your security response readiness?
How to measure your security response readiness?Tomasz Jakubowski
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingANURAG CHAKRABORTY
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingRaghav Bisht
 
Protecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeLancope, Inc.
 
Offline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encriptionOffline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encriptionmalvvv
 

Similaire à Order vs. Mad Science: Analyzing Black Hat Swarm Intelligence (20)

3. APTs Presentation
3. APTs Presentation3. APTs Presentation
3. APTs Presentation
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob Holcomb
 
Talk28oct14
Talk28oct14Talk28oct14
Talk28oct14
 
Catch Me If You Can - Finding APTs in your network
Catch Me If You Can - Finding APTs in your networkCatch Me If You Can - Finding APTs in your network
Catch Me If You Can - Finding APTs in your network
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
(130119) #fitalk apt, cyber espionage threat
(130119) #fitalk   apt, cyber espionage threat(130119) #fitalk   apt, cyber espionage threat
(130119) #fitalk apt, cyber espionage threat
 
Recon for the Defender: You Know Nothing (about Your Assets), Jon Snow
Recon for the Defender: You Know Nothing (about Your Assets), Jon SnowRecon for the Defender: You Know Nothing (about Your Assets), Jon Snow
Recon for the Defender: You Know Nothing (about Your Assets), Jon Snow
 
RSA 2018: Recon For the Defender - You know nothing (about your assets)
RSA 2018: Recon For the Defender - You know nothing (about your assets)RSA 2018: Recon For the Defender - You know nothing (about your assets)
RSA 2018: Recon For the Defender - You know nothing (about your assets)
 
Watchtowers of the Internet - Source Boston 2012
Watchtowers of the Internet - Source Boston 2012Watchtowers of the Internet - Source Boston 2012
Watchtowers of the Internet - Source Boston 2012
 
How to measure your security response readiness?
How to measure your security response readiness?How to measure your security response readiness?
How to measure your security response readiness?
 
Intrusion Techniques
Intrusion TechniquesIntrusion Techniques
Intrusion Techniques
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Protecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber Crime
 
Coporate Espionage
Coporate EspionageCoporate Espionage
Coporate Espionage
 
Offline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encriptionOffline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encription
 

Plus de Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

Plus de Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Dernier

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Order vs. Mad Science: Analyzing Black Hat Swarm Intelligence

  • 1. SESSION ID: #RSAC Derek Manky ORDER VS. MAD SCIENCE ANALYZING BLACK HAT SWARM INTELLIGENCE HT-W02 Global Security Strategist For>net, Office of CISO /in/derekmanky
  • 2. WAR GAMES The Rise of the Machines
  • 3. #RSAC §  Experimental self-replica>ng program §  WriJen in 1971 to demonstrate a ‘mobile’ applica>on §  Infected DEC PDP-10 computers running TENEX OS §  Just 1 year aQer Unix ‘Epoch Time’ began §  ‘Reaper’ worm created in ‘72 to delete it 1 January 1970 00:00:00 GMT à Epoch >mestamp 0 1971: Creeper – The First Computer Virus
  • 4. #RSAC COMPOUNDED CYBERCRIME Evolving AJack Capabili>es Threat Landscape CRIMEWARE PRODUCERS Source Code Junior Developers Copy & paste Senior DevelopersExploits Packers Special Pla^orm s Mobile CRIME SERVICES ENABLERS Quality Assurance Crypters / Packers Scanners HosMng Infec>ons / Drop Zones Management Botnet Rentals Installs / Spam / SEO / DDoS Money Mules Accounts Receivable ConsulMng Affiliates Criminal OrganizaMons Sales, Licensing, Maintenance Partnerships Affiliate Programs FakeAV / Ransomware / Botnets VicMms Bank Accounts Creden>als & Data Digital Real Estate
  • 5. #RSAC SPEED KILLS: SWARM BOTNETS AcceleraMng the ATack Chain Hit Me With Your Best Shot – Fire Away
  • 6. #RSAC Swarm – Individual Survival Using the Group Starlings flock toward dusk in order to avoid predators… create a ‘murmuring’ Collec>ve behavior exhibited by en>>es, par>cularly animals Similar size or same species Aggregate together, usually moving together in some direc>on Ants build resiliency through cooperaMve structures or mass defense / aTack strategies
  • 7. #RSAC Other Biomechanical Examples of Swarm Behavior Stock trading is o`en irraMonal relaMve to the underlying value of a company due to swarm behavior Group behavior can be radically different from individual behavior Humans also Behave in Swarm Fashion Old saying – a person is smart, a crowd is not Tend to exhibit swarm behavior depending on situa>on Aggregate and size of grouping determines behavior
  • 9. #RSAC EXFILTRATION 5 GATHER 4 EXPAND3 BREAK-IN2 PLANNING1 •  Deliver remote exploits and malware •  Establish backdoors for commands •  Iden>fy and collect sensi>ve data •  Staging Server •  Research target •  Build or Acquire Tools •  Test tools + detec>on The Accelerated AJack Chain Automa>on & Swarm Decrease TTB (Time to Breach) •  Move laterally to increase system access •  Stronger Foothold •  Data exfiltra>on through command and control services to external network SURVIVE… Or PROFIT? 6
  • 10. #RSAC •  Shodan is a search engine that indexes open ports and services •  AJacker Queries Shodan •  AJacker uses a list of known exploits to aJack known IoT and other systems based on indexed queries given by Shodan •  AJackers then aJacks IoT or vulnerable systems directly bypassing per miter security features gaining a foothold into internal networks. Autosploit – Building Swarms
  • 11. #RSAC Autosploit Workflow Autosploit Interface Shodan Query Gather Known Vulnerabili>es Indexed by Shodan Launch and run exploits 1. Attacker launches Autosploit script 2. Autosploit queries Shodan for known exploits 3. Autosploit uses intelligent matching (optional) to match additional exploits to ports and services 4. Autosploit configures metasploit as a “reverse listener” to launch an attack to a victim. 5. Victim connects back to the attacker’s Autosploit, allowing (many times) for the attacker to bypass security measures
  • 12. #RSAC Problems with Autosploit Easy to launch No real skills needed No discrimina>on between hosts Uses dangerous exploits that may crash/destroy sytems Shodan Shodan uses hive func>ons by looking for similar systems with similar func>ons Categorizes vulnerabili>es Allows users to search for vulnerable systems that are live
  • 14. #RSAC Botnet Building Blocks Typical Botnet Components AJacker (botmaster, herder) C&C Server Zombies Vic>m / target Communica>ons channels AJacker Control Server Botnet AJach Nodes Vic>m Ini>ate AJack AJack Traffic
  • 15. #RSAC Blackhat Swarms – Removing the C2 Next GeneraMon Botnet 3.0: Swarm What if Botnets could u>lize swarm intelligence? §  Largely Accelerated AJack Chain §  Human Out of Loop §  Strengthened Blackhat Hive Botnet AJach Nodes Vic>m AJack Traffic Satori Botnet example §  If camera is hacked or under stress it skips the system if beJer targets are found (pheromones)
  • 16. #RSAC Frankenstein Malware §  Localized swarm behavior – code building blocks from legi>mate running processes §  Seman>c Blueprint contains malware goals §  Malware scans for exis>ng underlining code in memory §  Malware uses pieces of code from various programs to create new malware §  Lua gives flexibility, add code §  Debug in real->me
  • 17. #RSAC Hajime Precursor •  Intelligent IOT Botnet – Nine Pla^orms + x86 •  TR-069 Exploit (MSSP/Telco Control) •  First detected October 25, 2016 •  30,000+ detec>ons per day (For>Guard)
  • 18. #RSAC Hajime Precursor •  Hajime, a mul> pla^orm worm with a decentralized C2 (First known IOT) •  IoT is the target, basically any pla^orm that runs busybox •  ARMv5-7, MIPS LiJle endian, Intel x86-64 Once ini>ally infected will randomly probe for other devices If found a telnet port open it will try to brute for logins Once inside a couple of commands are issued These commands are used to further iden>fy the enviroment $ enable $ system $ shell $ sh $ /bin/busybox ECCHI Once iden>fied the target architecutre, binaries for that pla^orm are downloaded from the aJacking host # echo -ne "x7fx45x4c x46x01x01x01x00x00x00x00x00x00x00x00x00x02x00x28x00x01x0 0x00 x00x54x00x01x00x34x00x00x00x44x01x00x00x00x02x00x05x34x0 0x20x00x01x00x2 8x00x04x00x03x00x01x00x00x00x00x00x00x00x00x00x01x00" > .s; /bin/busybox ECCHI # echo The purpose of this piece of code which is basically piped in hexadecimal through the network and dumped to a local file and then executed is to download the stage2 The download of the stage 2 begins, which is the botnet comminica>on part, using encrypted trackerless torrent uTP # unlink file AQer all Hajime deletes itself from the filesystem, having footprint in memory only
  • 19. #RSAC Hide and Seek •  Second known decentralized P2P IOT botnet •  Swarm characteris-cs •  Known exploit to spread to TP Link routers •  Confirmed Capabili>es •  AMD x64, ARM •  Brute force aJacks •  Target addi>on to random list •  File retrieval commands through P2P nodes •  Peer request-response model •  ‘i’ request à ‘I’ response •  ‘h’ request à ‘H’ response •  ‘z’ request à ‘O’ response •  ‘~’ request à ‘^’ response
  • 20. #RSAC Hide and Seek Fig 1: HNS Adds firewall rule to allow traffic on UDP port for P2P Fig 3: P2P communicaMon traffic captured, retrieving ELF files Fig 2: Scanning for next vicMms Fig 4: List of supported run Mme commands
  • 21. #RSAC Hide and Seek 'e' + IP:PORT's' + path ‘m<data’ ßà Y<data>’ 2) Target is identified by swarm 3) Target is swarmed, penetrated 4) File information leaked through swarm (IP, etc) 1) Seed the Swarm Autosploit)
  • 22. #RSAC ORDER: HIVE NETWORKS (HIVENETS) All Your Bots are Belong To Us Building a Cohesive Security Fabric
  • 23. #RSAC Hive – Group Survival Using the Individual Elephants, Meercats, and even humans ac>ng as a corpora>on Decentralized, mul>component mind Displayed by social insects and some animals Individual is the lowest cell unit Quickly dies if individual becomes separated Many animals display forms of this behavior…
  • 24. #RSAC Hive – Group Survival Using the Individual Bees: individual = simplis>c •  As a group the intelligence rises •  Individuals responsible for jobs •  Complex communica>on and rituals •  Sub-groups have specific roles such as food gathering, digging, feeding pupae, cleaning •  All will act in defense of aJack Example – complex sub-group communicaMons Circular = nearby food Tail wag = far away food
  • 25. #RSAC Is Cloud a Hive? Cloud •  More of an extension of the hive •  As a component it is oQen like a sub-group •  Serves a func>on to infrastructure, resources •  Connects worker nodes and extends func>onality •  Example: cloud-based security solu>ons such as sandbox, web content filtering, others Hive •  Decentralized, mul>component •  Group is intertwined through individuals •  Individual is the lowest cell unit •  Unable to act sufficiently as a stand-alone Quickly
  • 28. #RSAC Cyber Threat Alliance Integra>on of CTA Intelligence into Mul>ple Vendors (Swarm) FOUNDING MEMBERS AFFILIATE & CONTRIBUTING MEMBERS “The best way to combat the negative impact of cybercriminals and best protect our customers is through cooperation and partnership based on actionable intelligence from diverse sources.” Ken Xie, founder, chairman of the board and CEO, Fortinet
  • 29. #RSAC ex·pert sys·tem noun COMPUTING a piece of soQware programmed using ar>ficial intelligence techniques. Such systems use databases of expert knowledge to offer advice or make decisions in such areas as medical diagnosis and trading on the stock exchange. Advanced Solu>ons for Swarm
  • 30. #RSAC Advanced Solu>ons for Swarm: AI An>-Malware MALICIOUS CLEAN OUTPUT L J INPUT RAW SAMPLES Feature Set Improvements §  Quality §  Stabilized Number §  Weigh>ng Confidence ConMnued Accuracy to a High Degree of Confidence FEATURESQuan>ty Quality
  • 31. #RSAC YESTERDAY’S PRIMARY STRATEGY: STATIC BOUNDARY SECURITY SWARM STRATEGY: AGILE MACRO AND MICRO SEGMENTATION IoT Mobile Windows Mac Visibility, Control, Consistency 100G 5G Private Campus Core WAN Access Public
  • 33. #RSAC Recon Delivery Exploit C & C Internal Recon Maintain Accelerated AJack Chain Defense: Hive Defense in Kill Chain Protect Detect Disrupt Degrade Deceive Contain LOWRISKHIGH NG Firewall AV, IPS,WF, Botnet Mail Security Advanced Threat ProtecMon Framework (Sandbox Technology working with FW, Endpoints, Mail, WAF) Database Monitoring and MulM-AuthenMcaMon Internal SegmentaMon Firewalls – Architecture
  • 34. #RSAC Following Through §  Next week you should: §  Think about your hive – where is it located (distributed, centralized, etc) §  In the first three months following this presentaMon you should: §  Iden>fy cri>cal assets, resources within your hive §  Within six months you should: §  Create an orchestrated security model that is your hive defense §  Integra>on of security devices vs. kill chain §  Consider AI solu>ons vs. zero day code §  Shared, ac>onable intelligence between security solu>ons §  Think about how to repurpose human admins (SOC/NOC) with such solu>ons 34