SlideShare une entreprise Scribd logo
1  sur  68
Télécharger pour lire hors ligne
Cybercrime in Russia: Trends and issues
  Robert Lipovsky, Aleksandr Matrosov and Dmitry Volkov
This presentation is confidential
 and not subject to public
 disclosure
Agenda
General cybercrime trends in 2010
Most prevalent threats and incidents
Reasons for the incidents’ growth
Evolution of the cash-out scheme
Legal evasions and loopholes
Successful criminal prosecutions

Analysis of malware used in the attacks
Group-IB
oFirst and only public company in Russia
 engaged in digital crime investigation and
 computer forensics consulting


oEstablished in 2003

o Assistance to law enforcement authorities
 on particularly difficult cases

o Partners and researchers in 48 countries

o Russian HoneyPot-Net project

o 24/7 monitoring and incident response
Cybercrime in 2010
Global computer crime market turnover at
7 billion dollars

Share of cybercriminals living in Russia
estimated at 1.3 billion dollars ~19% of
global crime

Cybercriminals from Russian speaking
countries: 2.5 billion dollars ~36% of
global crime

    *research report "The Russian cybercrime market in 2010: status and trends”
    http://www.group-ib.ru/wp-content/uploads/2011/04/Group-IB_Report_Russian-cybercrime-market_2010_eng.pdf
Most prevalent threats and incidents

1. Fraud targeted at Russian banks and
   payment systems

2. SMS fraud using premium
   numbers(“winlockers”/LockScreen
   trojans)

3. DDoS attacks – Growth in number and
   in power

4. Unauthorized access to sensitive
   corporate information

     *research report "The Russian cybercrime market in 2010: status and trends”
     http://www.group-ib.ru/wp-content/uploads/2011/04/Group-IB_Report_Russian-cybercrime-market_2010_eng.pdf
Incident statistics by Group-IB forensic lab

 1000
                                                     931
  900

  800

  700
               Share of cybercriminals living in Russia
                                               586
  600
                      estimated to increase to               2009
  500

  400
                1.8 billion dollars in 2011                  2010


  300
                     (vs. 1.3 billion213 2010)
                                      in
  200
                             124
                72                   92
  100                   60
          30
   0
        unauthorized
                     brand attacks   DDoS       bank fraud
        access
 SMS fraud (LockScreens) not shown because the numbers are
 disproportionally greater
DDoS attacks: Growth in number and power

                     attackers DDoS bank if transaction
                     exceeds 150 000 $

                     most powerful attack 100 Gb/sec
                     (victims: UkrTelecom, Yandex, EvoSwitch
                     but real target was a dating affiliate program)
SMS fraud using premium numbers:
LockScreen malware




o If your country is affected, please, contact us for information


o Group-IB developed a case-tutorial for this type of
 investigation
Reasons for the incidents’ growth
o Legal evasions and loopholes
o Low cost of services in Russia

o Lack of legal jobs for young IT-
 specialists

o High profit and minimum investments
 from cybercrime

o Low information security vs. high
 cybercrime groups activities

o Shift of attack targets back to USSR :)
Cost of services in Russia
 Hacking of a website: from $50
 Guaranteed hack of a mailbox (Yandex, Mail, Rambler, Gmail):
  from $45
 Mobile phone bug: from 5000$
 SMS service bug: from 1000$
 Massive distribution of Trojan and spyware: from 20$ (1000
  users)
 Spam services:
           o   400,000 companies - $55
           o   1,800,000 private persons - $100
           o   90,000 companies in St. Petersburg - $30
           o   450,000 private persons in Ukraine - $50
           o   6,000,000 private persons in Russia - $150
           o   4,000,000 emails on @mail.ru - $200
Evolution of the Cash-out scheme
                For amounts up to 40k $
Evolution of the Cash-out scheme
                 For amounts 40-200k $
Evolution of the Cash-out scheme
                For amounts over 200k $
Chapter 28 of the Penal Code

       Article 272.            Article 273.              Article 274.
   Illegal Access to      Development, Use and      Violation of Rules for
 Computer Information     Spreading of Malicious      the Operation of
                                Software            Computers, Computer
                                                      Systems or Their
                                                          Networks
                          Criminal responsibility

    Maximum fine of
      300 000 RUB
                          Imprisonment for up to    Imprisonment for up to
           or
                                 7 years                   4 years
 imprisonment for up to
        5 years.
Legislative initiatives
The Committee against Cyber-Crime at the
Russian Association of Electronic
Communication (RAEC)

Improvement of Russian legislation in the
field of cyber crimes

Anti-SPAM legislation

Support against online child pornography
Successful criminal prosecutions
o Group-IB, Economic Crimes Division and Dept K MVD
 busted a group of cybercriminals who developed and
 spread the “LockScreen” malware

o 10 cybercriminals have been arrested
Successful criminal prosecutions
      Leo Kuvaev case (BadCow)
Successful criminal prosecutions
     Leo Kuvaev case (BadCow)
Successful criminal prosecutions
              DDoS case (Cxim)




o Provided DDoS as a service
o Arrested for DDoS against Russian banks
o 8 months in jail
Successful criminal prosecutions
           Russian bank-fraud case
Group #1
  o stole 600 000$ in a single transaction
  o case in court
  o used Win32/Sheldor


                          Group #2
                            o stole 832 000$ (over 1 month)
                            o case in court
                            o used phishing sites (hosted on
                             Gogax)
Interesting facts about Russian bank fraud


            • Mass distribution since 2009
        1
            • Six cybercrime groups attacking Russian
              banks
        2

            • Maximum amount stolen at one time from
              single bank account: 14 814 820$
        3
Interesting facts about Russian bank fraud

         These guys are still free!
Analysis of malware
used in the attacks on Russian Internet Banking systems
Overview

2010: year of attacks on Russian banks
• number of incidents has more than doubled compared to 2009*


Over 95%* of incidents involve banking trojans

Malware tailored to Russian banks and payment
systems

However!
• Can (and IS) used in other countries as well
        *research report "The Russian cybercrime market in 2010: status and trends”
        http://www.group-ib.ru/wp-content/uploads/2011/04/Group-IB_Report_Russian-cybercrime-market_2010_eng.pdf
Malware family share by incidents (%)*
(in the last 6 months)




  40

  30

  20

  10

   0




       *as investigated by Group-IB
Most prevalent banking malware in Russia


  Malware Family                   Description
  Win32/RDPdoor    Backdoor; uses MS Remote Desktop; botnet

  Win32/Sheldor    Backdoor; abuses the TeamViewer application;
                   botnet
  Win32/Carberp    Universal trojan with modules for targeted
                   attack on Russian banks; botnet
  Win32/Hodprot    Downloader; installs other malware modules;
                   strong encryption of its C&C protocol
  Win32/Qhost      Malware that modifies the hosts file
Win32/RDPdoor
Stealing money using MS Remote Desktop…
Win32/RDPdoor overview

 Appearance: First samples detected in April 2010
 Cost: ~ 2.000$

 Key feature: Abuses components of Thinsoft BeTwin for RDP

 • Most prevalent banking trojan in Russia
 • Bypassing advanced security mechanisms (Smartcards,
   etc.)
Win32/RDPdoor detection statistics by country
Cloud data from ThreatSense.Net


                   April 2010 – March 2011



                                             Russia
                                             Ukraine
                                             Kazakhstan
                                             Belarus

                                             Thailand

                                             Bulgaria

                                             United States

                                             Israel

                                             Moldova

                                             Rest of the world
Win32/RDPdoor installation


 infected                                                       Win32/RDPdoor
computer                                                             C&C

                run dropper and send system information
            1


      authentication on C&C and provide Thinsoft BeTwin for installation
                                                                  2


                send status information
            3
Win32/RDPdoor installation
Win32/RDPdoor installation
Stealing authentication data


1. Install GINA extension DLL
2. Display fake logon screen
3. Capture user name &
   password
4. Send to C&C
Win32/RDPdoor bot commands



     Bot Command                Description
     “P”           change password for BeTwin terminal
                   session
     “B”           reinstall BeTwinServiceXP module
     “S”           administration of BeTwin terminal
                   session
     “R”           install BeTwinServiceXP module
     “T”           BeTwin backconnection initialization
     “U”           update main modules and
                   configuration
Win32/RDPdoor bot commands
Win32/RDPdoor updating

New dropper with a new configuration embedded is received after „U‟
command
Win32/Sheldor
Win32/Sheldor overview


 Appearance: First samples detected in June 2010
 Cost: ~ 2.500$

 Key feature: Abuses the TeamViewer application for remote
 access



 • Using the TeamViewer cloud adds another level of
   anonymity
Win32/Sheldor detection statistics by country
Cloud data from ThreatSense.Net

                   April 2010 – March 2011



                                             Russia
                                             Ukraine
                                             Kazakhstan
                                             Moldova

                                             United States

                                             China

                                             Belarus

                                             Israel

                                             Georgia

                                             Rest of the world
Win32/Sheldor and TeamViewer in action

1.   Request cloud ID
2.   Set cloud ID
3.   Send ID to C&C                        TeamViewer
4.   Malicious connection                     cloud



                     1           2

      infected
                                                4
     computer




                                           Win32/Sheldor
                                 3
     GET                                       C&C
     /getinfo.php?id=414%20034%20883&pwd
     =6655&stat=1
Win32/Sheldor and TeamViewer in action

1.   Request cloud ID
2.   Set cloud ID
3.   Send ID to C&C
4.   Malicious connection




                  GET
                  /getinfo.php?id=414%20034%20883&pwd
                  =6655&stat=1
Under the hood: DLL hooking



                         TeamViewer.exe




       TV.dll
    (proxy DLL)



                              TS.dll
                         (original TS.dll)
Malicious DLL call graph
Malicious DLL decompilation


                              Functions for calling
                              from original TS.dll


                              Load original TS.dll




                              Hook functions


                               C&C URL
Win32/Sheldor bot commands



  Bot Command                        Description
  exec          download and ShellExecute/CreateThread
                additional module
  monitor_off   send command “stop monitoring” to C&C
  monitor_on    send command “start monitoring” to C&C
  power_off     ExitWindowsEx(EWX_POWEROFF,
                SHTDN_REASON_MAJOR_OPERATINGSYSTEM)
  shutdown      ExitWindowsEx(EWX_REBOOT,
                SHTDN_REASON_MAJOR_OPERATINGSYSTEM)
  killbot       delete all files, directories and registry keys
Sheldor C&C panel
Win32/Carberp
Win32/Carberp overview


 Appearance: First samples detected in February 2010
 Cost: ~ 9.000$

 Key feature: Advanced information stealing trojan with
 plug-ins



 • Customizable to specific banks
 • Man-in-the-browser attacks (IE, FireFox)
 • Grand Theft: Real cases with millions of $$$ stolen
Win32/Carberp detection statistics by country
Cloud data from ThreatSense.Net

                   April 2010 – March 2011
                                             Russia
                                             Ukraine
                                             Spain
                                             United States
                                             Turkey

                                             Kazakhstan

                                             Italy

                                             Mexico

                                             Thailand

                                             Netherlands

                                             Argentina

                                             Belarus

                                             Greece

                                             United Kingdom

                                             Rest of the world
C&C panel: Bots by country
Win32/Carberp detections over time in Russia
Cloud data from ThreatSense.Net

                   April 2010 – March 2011
Win32/Carberp bot commands


 Bot Command                           Description

 update              Download new version of Carberp


 dexec/download      Download and execute PE-file

 kill_bot/killuser   • Delete trojan from the system
                     • Delete user's Windows account (latest version)

 startsb/loaddll     Download DLL and load into trojan's memory
                     address space


 grabber             Grab HTML form data and send to C&C
Win32/Carberp self-protection
Self-protect method Win32/Carberp.W Win32/Carberp.X
Bypassing AV-emulators      many calls of GUI WinAPI many calls of GUI
                            functions                WinAPI functions

Code injection method       ZwResumeThread()          ZwQueueApcThread()

Command and string                                    custom encryption
encryption                                           algorithm
Bot authentication on C&C                             file with authentication
                                                     data stored on infected
                                                      PC
API function encryption     custom encryption         custom encryption
                            algorithm                 algorithm
Detection of AV hooks       comparison of the first   comparison of the first
                            original bytes            original bytes
Bypassing static AV         adds random junk bytes to adds random junk bytes
signatures                  dropped files             to dropped files
Hiding in the system        hook system functions     hook system functions
Win32/Carberp distribution channels



            Direct distribution           Distribution via partners



  control                                        “partnerka”
                           affiliate ID
   panel                                       (affiliate program)




                          exploit pack
                                              • BlackHat SEO
                                              • Infected Blogs
                                              • etc
Win32/Carberp botnet control panel
Win32/Carberp control panel – Bank settings
Cab-files with stolen data
Stolen data: BS-Client IB system
Stolen data: CyberPlat payment system
Stolen data: iBank IB system
Stolen data: SberBank IB
Stolen data: UkrSibBank IB
Win32/Carberp Summary


Cybercrime kit using multiple stealing techniques

Since early 2010 targeting other regions too

Several independent cybercrime groups involved

Joint investigation of Russian police, Group-IB and
ESET
Summary
                       Win32/RDPdoor      Win32/Sheldor    Win32/Carberp
First appearance       April 2010         June 2010        February 2010

Cost                   2000 $             2500 $           9000 $

Prevalence             Russia,            Russia,          Russia,
                       Ukraine,           Ukraine,         Ukraine,
                       Kazakhstan         Kazakhstan       Spain,
                                                           USA
Remote Access          RDP via ThinSoft   Via TeamViewer   Via plug-ins
                       BeTwin
Information stealing   manually           manually         automated

Plug-ins
                                                                  
Complexity
                                                      

Botnet
                                                                  
Conclusion


• Banks in other countries becoming new targets of
 Russian cybercrime groups

• Attackers respond to new security measures with new
 methods to bypass them

• Cybercriminals use stolen money to stay out of jail

• Disabling C&C servers not enough to stop them

• Only way of fighting them is by cooperation
Questions
Thank you for your attention ;)

 Robert Lipovsky, ESET
 lipovsky@eset.sk

 Aleksandr Matrosov, ESET
 matrosov@eset.sk
 @matrosov

 Dmitry Volkov, Group-IB
 volkov@group-ib.ru
 @groupib

Contenu connexe

En vedette

Архитектура Cisco Smart Grid
Архитектура Cisco Smart GridАрхитектура Cisco Smart Grid
Архитектура Cisco Smart GridCisco Russia
 
Smart Meter Architectures and Interfaces - Dec 2010
Smart Meter Architectures and Interfaces - Dec 2010Smart Meter Architectures and Interfaces - Dec 2010
Smart Meter Architectures and Interfaces - Dec 2010Simon Harrison
 
Malware's most wanted-zberp-the_financial_trojan
Malware's most wanted-zberp-the_financial_trojanMalware's most wanted-zberp-the_financial_trojan
Malware's most wanted-zberp-the_financial_trojanCyphort
 
Cisco Connected Grid. Технические решения автоматизации подстанций электричес...
Cisco Connected Grid. Технические решения автоматизации подстанций электричес...Cisco Connected Grid. Технические решения автоматизации подстанций электричес...
Cisco Connected Grid. Технические решения автоматизации подстанций электричес...Cisco Russia
 
Python Programming: Class and Object Oriented Programming
Python Programming: Class and Object Oriented ProgrammingPython Programming: Class and Object Oriented Programming
Python Programming: Class and Object Oriented ProgrammingChan Shik Lim
 
Российская криптография: блочные шифры и их режимы шифрования (Russian crypto...
Российская криптография: блочные шифры и их режимы шифрования (Russian crypto...Российская криптография: блочные шифры и их режимы шифрования (Russian crypto...
Российская криптография: блочные шифры и их режимы шифрования (Russian crypto...Advanced monitoring
 
Вебинар по криптомаршрутизаторам, 14.12.2016
Вебинар по криптомаршрутизаторам, 14.12.2016Вебинар по криптомаршрутизаторам, 14.12.2016
Вебинар по криптомаршрутизаторам, 14.12.2016S-Terra CSP
 
Sergey Negodyaev - Cybercrime in Russia and its impact on the economy
Sergey Negodyaev - Cybercrime in Russia and its impact on the economySergey Negodyaev - Cybercrime in Russia and its impact on the economy
Sergey Negodyaev - Cybercrime in Russia and its impact on the economyInfotropic Media
 
Object Oriented Code RE with HexraysCodeXplorer
Object Oriented Code RE with HexraysCodeXplorerObject Oriented Code RE with HexraysCodeXplorer
Object Oriented Code RE with HexraysCodeXplorerAlex Matrosov
 
Политика обнаружения и реагирования на инциденты информационной безопасности
Политика  обнаружения и реагирования на инциденты информационной безопасностиПолитика  обнаружения и реагирования на инциденты информационной безопасности
Политика обнаружения и реагирования на инциденты информационной безопасностиEvgeniy Shauro
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Steve Poole
 
Crypto regulations in Russia
Crypto regulations in RussiaCrypto regulations in Russia
Crypto regulations in RussiaAleksey Lukatskiy
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesAshesh R
 
Risks to Cloud based critical infrastructure -- DHS bulletin
Risks to Cloud based critical infrastructure -- DHS bulletinRisks to Cloud based critical infrastructure -- DHS bulletin
Risks to Cloud based critical infrastructure -- DHS bulletinDavid Sweigert
 
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Dinesh O Bareja
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
Content Marketing Ideas! How to Find the Best Stories to Tell Your Customers
Content Marketing Ideas! How to Find the Best Stories to Tell Your CustomersContent Marketing Ideas! How to Find the Best Stories to Tell Your Customers
Content Marketing Ideas! How to Find the Best Stories to Tell Your CustomersTopRank Marketing Agency
 
OpenPGP and Russian Cryptography
OpenPGP and Russian CryptographyOpenPGP and Russian Cryptography
OpenPGP and Russian CryptographyDmitry Baryshkov
 
Python Programming: Tuning and Optimization
Python Programming: Tuning and OptimizationPython Programming: Tuning and Optimization
Python Programming: Tuning and OptimizationChan Shik Lim
 
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)
Study notes for CompTIA Certified Advanced Security Practitioner  (ver2)Study notes for CompTIA Certified Advanced Security Practitioner  (ver2)
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)David Sweigert
 

En vedette (20)

Архитектура Cisco Smart Grid
Архитектура Cisco Smart GridАрхитектура Cisco Smart Grid
Архитектура Cisco Smart Grid
 
Smart Meter Architectures and Interfaces - Dec 2010
Smart Meter Architectures and Interfaces - Dec 2010Smart Meter Architectures and Interfaces - Dec 2010
Smart Meter Architectures and Interfaces - Dec 2010
 
Malware's most wanted-zberp-the_financial_trojan
Malware's most wanted-zberp-the_financial_trojanMalware's most wanted-zberp-the_financial_trojan
Malware's most wanted-zberp-the_financial_trojan
 
Cisco Connected Grid. Технические решения автоматизации подстанций электричес...
Cisco Connected Grid. Технические решения автоматизации подстанций электричес...Cisco Connected Grid. Технические решения автоматизации подстанций электричес...
Cisco Connected Grid. Технические решения автоматизации подстанций электричес...
 
Python Programming: Class and Object Oriented Programming
Python Programming: Class and Object Oriented ProgrammingPython Programming: Class and Object Oriented Programming
Python Programming: Class and Object Oriented Programming
 
Российская криптография: блочные шифры и их режимы шифрования (Russian crypto...
Российская криптография: блочные шифры и их режимы шифрования (Russian crypto...Российская криптография: блочные шифры и их режимы шифрования (Russian crypto...
Российская криптография: блочные шифры и их режимы шифрования (Russian crypto...
 
Вебинар по криптомаршрутизаторам, 14.12.2016
Вебинар по криптомаршрутизаторам, 14.12.2016Вебинар по криптомаршрутизаторам, 14.12.2016
Вебинар по криптомаршрутизаторам, 14.12.2016
 
Sergey Negodyaev - Cybercrime in Russia and its impact on the economy
Sergey Negodyaev - Cybercrime in Russia and its impact on the economySergey Negodyaev - Cybercrime in Russia and its impact on the economy
Sergey Negodyaev - Cybercrime in Russia and its impact on the economy
 
Object Oriented Code RE with HexraysCodeXplorer
Object Oriented Code RE with HexraysCodeXplorerObject Oriented Code RE with HexraysCodeXplorer
Object Oriented Code RE with HexraysCodeXplorer
 
Политика обнаружения и реагирования на инциденты информационной безопасности
Политика  обнаружения и реагирования на инциденты информационной безопасностиПолитика  обнаружения и реагирования на инциденты информационной безопасности
Политика обнаружения и реагирования на инциденты информационной безопасности
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 
Crypto regulations in Russia
Crypto regulations in RussiaCrypto regulations in Russia
Crypto regulations in Russia
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
Risks to Cloud based critical infrastructure -- DHS bulletin
Risks to Cloud based critical infrastructure -- DHS bulletinRisks to Cloud based critical infrastructure -- DHS bulletin
Risks to Cloud based critical infrastructure -- DHS bulletin
 
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Content Marketing Ideas! How to Find the Best Stories to Tell Your Customers
Content Marketing Ideas! How to Find the Best Stories to Tell Your CustomersContent Marketing Ideas! How to Find the Best Stories to Tell Your Customers
Content Marketing Ideas! How to Find the Best Stories to Tell Your Customers
 
OpenPGP and Russian Cryptography
OpenPGP and Russian CryptographyOpenPGP and Russian Cryptography
OpenPGP and Russian Cryptography
 
Python Programming: Tuning and Optimization
Python Programming: Tuning and OptimizationPython Programming: Tuning and Optimization
Python Programming: Tuning and Optimization
 
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)
Study notes for CompTIA Certified Advanced Security Practitioner  (ver2)Study notes for CompTIA Certified Advanced Security Practitioner  (ver2)
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)
 

Similaire à Cybercrime Trends Russia: Banking Malware Analysis</TITLE

Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trendsShreedeep Rayamajhi
 
Cyber crimes Challenges in Global and Oman
Cyber crimes Challenges in Global and OmanCyber crimes Challenges in Global and Oman
Cyber crimes Challenges in Global and OmanMubarak Al Hadadi
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing ThreatNick Miller
 
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...Denis Gorchakov
 
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...Cristian Driga
 
MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence Cyphort
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxbkbk37
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxwrite12
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfKALPITKALPIT1
 
20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threat20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threatLuc Beirens
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Crimeware Fingerprinting Final
Crimeware Fingerprinting  FinalCrimeware Fingerprinting  Final
Crimeware Fingerprinting Finaljponnoly
 
HR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataHR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataParsons Behle & Latimer
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 

Similaire à Cybercrime Trends Russia: Banking Malware Analysis</TITLE (20)

Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
 
Cyber crimes Challenges in Global and Oman
Cyber crimes Challenges in Global and OmanCyber crimes Challenges in Global and Oman
Cyber crimes Challenges in Global and Oman
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
 
The Dangers of Lapto
The Dangers of LaptoThe Dangers of Lapto
The Dangers of Lapto
 
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...
 
MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Ransomware-as-a-Service: The business of distributing cyber attacks
Ransomware-as-a-Service: The business of distributing cyber attacksRansomware-as-a-Service: The business of distributing cyber attacks
Ransomware-as-a-Service: The business of distributing cyber attacks
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threat20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threat
 
File000145
File000145File000145
File000145
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Crimeware Fingerprinting Final
Crimeware Fingerprinting  FinalCrimeware Fingerprinting  Final
Crimeware Fingerprinting Final
 
HR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataHR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company Data
 
Botnet
BotnetBotnet
Botnet
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 

Plus de Alex Matrosov

BERserk: New RSA Signature Forgery Attack
BERserk: New RSA Signature Forgery AttackBERserk: New RSA Signature Forgery Attack
BERserk: New RSA Signature Forgery AttackAlex Matrosov
 
BIOS and Secure Boot Attacks Uncovered
BIOS and Secure Boot Attacks UncoveredBIOS and Secure Boot Attacks Uncovered
BIOS and Secure Boot Attacks UncoveredAlex Matrosov
 
HexRaysCodeXplorer: object oriented RE for fun and profit
HexRaysCodeXplorer: object oriented RE for fun and profitHexRaysCodeXplorer: object oriented RE for fun and profit
HexRaysCodeXplorer: object oriented RE for fun and profitAlex Matrosov
 
Bootkits: past, present & future
Bootkits: past, present & futureBootkits: past, present & future
Bootkits: past, present & futureAlex Matrosov
 
HexRaysCodeXplorer: make object-oriented RE easier
HexRaysCodeXplorer: make object-oriented RE easierHexRaysCodeXplorer: make object-oriented RE easier
HexRaysCodeXplorer: make object-oriented RE easierAlex Matrosov
 
Reconstructing Gapz: Position-Independent Code Analysis Problem
Reconstructing Gapz: Position-Independent Code Analysis ProblemReconstructing Gapz: Position-Independent Code Analysis Problem
Reconstructing Gapz: Position-Independent Code Analysis ProblemAlex Matrosov
 
Advanced Evasion Techniques by Win32/Gapz
Advanced Evasion Techniques by Win32/GapzAdvanced Evasion Techniques by Win32/Gapz
Advanced Evasion Techniques by Win32/GapzAlex Matrosov
 
Festi botnet analysis and investigation
Festi botnet analysis and investigationFesti botnet analysis and investigation
Festi botnet analysis and investigationAlex Matrosov
 
Win32/Flamer: Reverse Engineering and Framework Reconstruction
Win32/Flamer: Reverse Engineering and Framework ReconstructionWin32/Flamer: Reverse Engineering and Framework Reconstruction
Win32/Flamer: Reverse Engineering and Framework ReconstructionAlex Matrosov
 
Smartcard vulnerabilities in modern banking malware
Smartcard vulnerabilities in modern banking malwareSmartcard vulnerabilities in modern banking malware
Smartcard vulnerabilities in modern banking malwareAlex Matrosov
 
Carberp Evolution and BlackHole: Investigation Beyond the Event Horizon
Carberp Evolution and BlackHole: Investigation Beyond the Event HorizonCarberp Evolution and BlackHole: Investigation Beyond the Event Horizon
Carberp Evolution and BlackHole: Investigation Beyond the Event HorizonAlex Matrosov
 
Modern malware techniques for attacking RBS systems in Russia
Modern malware techniques for attacking RBS systems in RussiaModern malware techniques for attacking RBS systems in Russia
Modern malware techniques for attacking RBS systems in RussiaAlex Matrosov
 
Win32/Duqu: involution of Stuxnet
Win32/Duqu: involution of StuxnetWin32/Duqu: involution of Stuxnet
Win32/Duqu: involution of StuxnetAlex Matrosov
 
Modern Bootkit Trends: Bypassing Kernel-Mode Signing Policy
Modern Bootkit Trends: Bypassing Kernel-Mode Signing PolicyModern Bootkit Trends: Bypassing Kernel-Mode Signing Policy
Modern Bootkit Trends: Bypassing Kernel-Mode Signing PolicyAlex Matrosov
 
Defeating x64: Modern Trends of Kernel-Mode Rootkits
Defeating x64: Modern Trends of Kernel-Mode RootkitsDefeating x64: Modern Trends of Kernel-Mode Rootkits
Defeating x64: Modern Trends of Kernel-Mode RootkitsAlex Matrosov
 
Defeating x64: The Evolution of the TDL Rootkit
Defeating x64: The Evolution of the TDL RootkitDefeating x64: The Evolution of the TDL Rootkit
Defeating x64: The Evolution of the TDL RootkitAlex Matrosov
 
Проведение криминалистической экспертизы и анализа руткит-программ на примере...
Проведение криминалистической экспертизы и анализа руткит-программ на примере...Проведение криминалистической экспертизы и анализа руткит-программ на примере...
Проведение криминалистической экспертизы и анализа руткит-программ на примере...Alex Matrosov
 

Plus de Alex Matrosov (19)

BERserk: New RSA Signature Forgery Attack
BERserk: New RSA Signature Forgery AttackBERserk: New RSA Signature Forgery Attack
BERserk: New RSA Signature Forgery Attack
 
BIOS and Secure Boot Attacks Uncovered
BIOS and Secure Boot Attacks UncoveredBIOS and Secure Boot Attacks Uncovered
BIOS and Secure Boot Attacks Uncovered
 
HexRaysCodeXplorer: object oriented RE for fun and profit
HexRaysCodeXplorer: object oriented RE for fun and profitHexRaysCodeXplorer: object oriented RE for fun and profit
HexRaysCodeXplorer: object oriented RE for fun and profit
 
Bootkits: past, present & future
Bootkits: past, present & futureBootkits: past, present & future
Bootkits: past, present & future
 
HexRaysCodeXplorer: make object-oriented RE easier
HexRaysCodeXplorer: make object-oriented RE easierHexRaysCodeXplorer: make object-oriented RE easier
HexRaysCodeXplorer: make object-oriented RE easier
 
Reconstructing Gapz: Position-Independent Code Analysis Problem
Reconstructing Gapz: Position-Independent Code Analysis ProblemReconstructing Gapz: Position-Independent Code Analysis Problem
Reconstructing Gapz: Position-Independent Code Analysis Problem
 
Advanced Evasion Techniques by Win32/Gapz
Advanced Evasion Techniques by Win32/GapzAdvanced Evasion Techniques by Win32/Gapz
Advanced Evasion Techniques by Win32/Gapz
 
Festi botnet analysis and investigation
Festi botnet analysis and investigationFesti botnet analysis and investigation
Festi botnet analysis and investigation
 
Win32/Flamer: Reverse Engineering and Framework Reconstruction
Win32/Flamer: Reverse Engineering and Framework ReconstructionWin32/Flamer: Reverse Engineering and Framework Reconstruction
Win32/Flamer: Reverse Engineering and Framework Reconstruction
 
Smartcard vulnerabilities in modern banking malware
Smartcard vulnerabilities in modern banking malwareSmartcard vulnerabilities in modern banking malware
Smartcard vulnerabilities in modern banking malware
 
Carberp Evolution and BlackHole: Investigation Beyond the Event Horizon
Carberp Evolution and BlackHole: Investigation Beyond the Event HorizonCarberp Evolution and BlackHole: Investigation Beyond the Event Horizon
Carberp Evolution and BlackHole: Investigation Beyond the Event Horizon
 
Modern malware techniques for attacking RBS systems in Russia
Modern malware techniques for attacking RBS systems in RussiaModern malware techniques for attacking RBS systems in Russia
Modern malware techniques for attacking RBS systems in Russia
 
Win32/Duqu: involution of Stuxnet
Win32/Duqu: involution of StuxnetWin32/Duqu: involution of Stuxnet
Win32/Duqu: involution of Stuxnet
 
Modern Bootkit Trends: Bypassing Kernel-Mode Signing Policy
Modern Bootkit Trends: Bypassing Kernel-Mode Signing PolicyModern Bootkit Trends: Bypassing Kernel-Mode Signing Policy
Modern Bootkit Trends: Bypassing Kernel-Mode Signing Policy
 
Defeating x64: Modern Trends of Kernel-Mode Rootkits
Defeating x64: Modern Trends of Kernel-Mode RootkitsDefeating x64: Modern Trends of Kernel-Mode Rootkits
Defeating x64: Modern Trends of Kernel-Mode Rootkits
 
Defeating x64: The Evolution of the TDL Rootkit
Defeating x64: The Evolution of the TDL RootkitDefeating x64: The Evolution of the TDL Rootkit
Defeating x64: The Evolution of the TDL Rootkit
 
Проведение криминалистической экспертизы и анализа руткит-программ на примере...
Проведение криминалистической экспертизы и анализа руткит-программ на примере...Проведение криминалистической экспертизы и анализа руткит-программ на примере...
Проведение криминалистической экспертизы и анализа руткит-программ на примере...
 
Stuxnet msu
Stuxnet msuStuxnet msu
Stuxnet msu
 
RusCrypto'2009
RusCrypto'2009RusCrypto'2009
RusCrypto'2009
 

Dernier

Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 

Dernier (20)

Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 

Cybercrime Trends Russia: Banking Malware Analysis</TITLE

  • 1. Cybercrime in Russia: Trends and issues Robert Lipovsky, Aleksandr Matrosov and Dmitry Volkov
  • 2. This presentation is confidential and not subject to public disclosure
  • 3. Agenda General cybercrime trends in 2010 Most prevalent threats and incidents Reasons for the incidents’ growth Evolution of the cash-out scheme Legal evasions and loopholes Successful criminal prosecutions Analysis of malware used in the attacks
  • 4. Group-IB oFirst and only public company in Russia engaged in digital crime investigation and computer forensics consulting oEstablished in 2003 o Assistance to law enforcement authorities on particularly difficult cases o Partners and researchers in 48 countries o Russian HoneyPot-Net project o 24/7 monitoring and incident response
  • 5. Cybercrime in 2010 Global computer crime market turnover at 7 billion dollars Share of cybercriminals living in Russia estimated at 1.3 billion dollars ~19% of global crime Cybercriminals from Russian speaking countries: 2.5 billion dollars ~36% of global crime *research report "The Russian cybercrime market in 2010: status and trends” http://www.group-ib.ru/wp-content/uploads/2011/04/Group-IB_Report_Russian-cybercrime-market_2010_eng.pdf
  • 6. Most prevalent threats and incidents 1. Fraud targeted at Russian banks and payment systems 2. SMS fraud using premium numbers(“winlockers”/LockScreen trojans) 3. DDoS attacks – Growth in number and in power 4. Unauthorized access to sensitive corporate information *research report "The Russian cybercrime market in 2010: status and trends” http://www.group-ib.ru/wp-content/uploads/2011/04/Group-IB_Report_Russian-cybercrime-market_2010_eng.pdf
  • 7. Incident statistics by Group-IB forensic lab 1000 931 900 800 700 Share of cybercriminals living in Russia 586 600 estimated to increase to 2009 500 400 1.8 billion dollars in 2011 2010 300 (vs. 1.3 billion213 2010) in 200 124 72 92 100 60 30 0 unauthorized brand attacks DDoS bank fraud access SMS fraud (LockScreens) not shown because the numbers are disproportionally greater
  • 8. DDoS attacks: Growth in number and power attackers DDoS bank if transaction exceeds 150 000 $ most powerful attack 100 Gb/sec (victims: UkrTelecom, Yandex, EvoSwitch but real target was a dating affiliate program)
  • 9. SMS fraud using premium numbers: LockScreen malware o If your country is affected, please, contact us for information o Group-IB developed a case-tutorial for this type of investigation
  • 10. Reasons for the incidents’ growth o Legal evasions and loopholes o Low cost of services in Russia o Lack of legal jobs for young IT- specialists o High profit and minimum investments from cybercrime o Low information security vs. high cybercrime groups activities o Shift of attack targets back to USSR :)
  • 11. Cost of services in Russia  Hacking of a website: from $50  Guaranteed hack of a mailbox (Yandex, Mail, Rambler, Gmail): from $45  Mobile phone bug: from 5000$  SMS service bug: from 1000$  Massive distribution of Trojan and spyware: from 20$ (1000 users)  Spam services: o 400,000 companies - $55 o 1,800,000 private persons - $100 o 90,000 companies in St. Petersburg - $30 o 450,000 private persons in Ukraine - $50 o 6,000,000 private persons in Russia - $150 o 4,000,000 emails on @mail.ru - $200
  • 12. Evolution of the Cash-out scheme For amounts up to 40k $
  • 13. Evolution of the Cash-out scheme For amounts 40-200k $
  • 14. Evolution of the Cash-out scheme For amounts over 200k $
  • 15. Chapter 28 of the Penal Code Article 272. Article 273. Article 274. Illegal Access to Development, Use and Violation of Rules for Computer Information Spreading of Malicious the Operation of Software Computers, Computer Systems or Their Networks Criminal responsibility Maximum fine of 300 000 RUB Imprisonment for up to Imprisonment for up to or 7 years 4 years imprisonment for up to 5 years.
  • 16. Legislative initiatives The Committee against Cyber-Crime at the Russian Association of Electronic Communication (RAEC) Improvement of Russian legislation in the field of cyber crimes Anti-SPAM legislation Support against online child pornography
  • 17. Successful criminal prosecutions o Group-IB, Economic Crimes Division and Dept K MVD busted a group of cybercriminals who developed and spread the “LockScreen” malware o 10 cybercriminals have been arrested
  • 18. Successful criminal prosecutions Leo Kuvaev case (BadCow)
  • 19. Successful criminal prosecutions Leo Kuvaev case (BadCow)
  • 20. Successful criminal prosecutions DDoS case (Cxim) o Provided DDoS as a service o Arrested for DDoS against Russian banks o 8 months in jail
  • 21. Successful criminal prosecutions Russian bank-fraud case Group #1 o stole 600 000$ in a single transaction o case in court o used Win32/Sheldor Group #2 o stole 832 000$ (over 1 month) o case in court o used phishing sites (hosted on Gogax)
  • 22. Interesting facts about Russian bank fraud • Mass distribution since 2009 1 • Six cybercrime groups attacking Russian banks 2 • Maximum amount stolen at one time from single bank account: 14 814 820$ 3
  • 23. Interesting facts about Russian bank fraud These guys are still free!
  • 24. Analysis of malware used in the attacks on Russian Internet Banking systems
  • 25. Overview 2010: year of attacks on Russian banks • number of incidents has more than doubled compared to 2009* Over 95%* of incidents involve banking trojans Malware tailored to Russian banks and payment systems However! • Can (and IS) used in other countries as well *research report "The Russian cybercrime market in 2010: status and trends” http://www.group-ib.ru/wp-content/uploads/2011/04/Group-IB_Report_Russian-cybercrime-market_2010_eng.pdf
  • 26. Malware family share by incidents (%)* (in the last 6 months) 40 30 20 10 0 *as investigated by Group-IB
  • 27. Most prevalent banking malware in Russia Malware Family Description Win32/RDPdoor Backdoor; uses MS Remote Desktop; botnet Win32/Sheldor Backdoor; abuses the TeamViewer application; botnet Win32/Carberp Universal trojan with modules for targeted attack on Russian banks; botnet Win32/Hodprot Downloader; installs other malware modules; strong encryption of its C&C protocol Win32/Qhost Malware that modifies the hosts file
  • 29. Stealing money using MS Remote Desktop… Win32/RDPdoor overview Appearance: First samples detected in April 2010 Cost: ~ 2.000$ Key feature: Abuses components of Thinsoft BeTwin for RDP • Most prevalent banking trojan in Russia • Bypassing advanced security mechanisms (Smartcards, etc.)
  • 30. Win32/RDPdoor detection statistics by country Cloud data from ThreatSense.Net April 2010 – March 2011 Russia Ukraine Kazakhstan Belarus Thailand Bulgaria United States Israel Moldova Rest of the world
  • 31. Win32/RDPdoor installation infected Win32/RDPdoor computer C&C run dropper and send system information 1 authentication on C&C and provide Thinsoft BeTwin for installation 2 send status information 3
  • 34. Stealing authentication data 1. Install GINA extension DLL 2. Display fake logon screen 3. Capture user name & password 4. Send to C&C
  • 35. Win32/RDPdoor bot commands Bot Command Description “P” change password for BeTwin terminal session “B” reinstall BeTwinServiceXP module “S” administration of BeTwin terminal session “R” install BeTwinServiceXP module “T” BeTwin backconnection initialization “U” update main modules and configuration
  • 37. Win32/RDPdoor updating New dropper with a new configuration embedded is received after „U‟ command
  • 39. Win32/Sheldor overview Appearance: First samples detected in June 2010 Cost: ~ 2.500$ Key feature: Abuses the TeamViewer application for remote access • Using the TeamViewer cloud adds another level of anonymity
  • 40. Win32/Sheldor detection statistics by country Cloud data from ThreatSense.Net April 2010 – March 2011 Russia Ukraine Kazakhstan Moldova United States China Belarus Israel Georgia Rest of the world
  • 41. Win32/Sheldor and TeamViewer in action 1. Request cloud ID 2. Set cloud ID 3. Send ID to C&C TeamViewer 4. Malicious connection cloud 1 2 infected 4 computer Win32/Sheldor 3 GET C&C /getinfo.php?id=414%20034%20883&pwd =6655&stat=1
  • 42. Win32/Sheldor and TeamViewer in action 1. Request cloud ID 2. Set cloud ID 3. Send ID to C&C 4. Malicious connection GET /getinfo.php?id=414%20034%20883&pwd =6655&stat=1
  • 43. Under the hood: DLL hooking TeamViewer.exe TV.dll (proxy DLL) TS.dll (original TS.dll)
  • 45. Malicious DLL decompilation Functions for calling from original TS.dll Load original TS.dll Hook functions C&C URL
  • 46. Win32/Sheldor bot commands Bot Command Description exec download and ShellExecute/CreateThread additional module monitor_off send command “stop monitoring” to C&C monitor_on send command “start monitoring” to C&C power_off ExitWindowsEx(EWX_POWEROFF, SHTDN_REASON_MAJOR_OPERATINGSYSTEM) shutdown ExitWindowsEx(EWX_REBOOT, SHTDN_REASON_MAJOR_OPERATINGSYSTEM) killbot delete all files, directories and registry keys
  • 49. Win32/Carberp overview Appearance: First samples detected in February 2010 Cost: ~ 9.000$ Key feature: Advanced information stealing trojan with plug-ins • Customizable to specific banks • Man-in-the-browser attacks (IE, FireFox) • Grand Theft: Real cases with millions of $$$ stolen
  • 50. Win32/Carberp detection statistics by country Cloud data from ThreatSense.Net April 2010 – March 2011 Russia Ukraine Spain United States Turkey Kazakhstan Italy Mexico Thailand Netherlands Argentina Belarus Greece United Kingdom Rest of the world
  • 51. C&C panel: Bots by country
  • 52. Win32/Carberp detections over time in Russia Cloud data from ThreatSense.Net April 2010 – March 2011
  • 53. Win32/Carberp bot commands Bot Command Description update Download new version of Carberp dexec/download Download and execute PE-file kill_bot/killuser • Delete trojan from the system • Delete user's Windows account (latest version) startsb/loaddll Download DLL and load into trojan's memory address space grabber Grab HTML form data and send to C&C
  • 54. Win32/Carberp self-protection Self-protect method Win32/Carberp.W Win32/Carberp.X Bypassing AV-emulators many calls of GUI WinAPI many calls of GUI functions WinAPI functions Code injection method ZwResumeThread() ZwQueueApcThread() Command and string custom encryption encryption  algorithm Bot authentication on C&C file with authentication  data stored on infected PC API function encryption custom encryption custom encryption algorithm algorithm Detection of AV hooks comparison of the first comparison of the first original bytes original bytes Bypassing static AV adds random junk bytes to adds random junk bytes signatures dropped files to dropped files Hiding in the system hook system functions hook system functions
  • 55. Win32/Carberp distribution channels Direct distribution Distribution via partners control “partnerka” affiliate ID panel (affiliate program) exploit pack • BlackHat SEO • Infected Blogs • etc
  • 57. Win32/Carberp control panel – Bank settings
  • 60. Stolen data: CyberPlat payment system
  • 61. Stolen data: iBank IB system
  • 64. Win32/Carberp Summary Cybercrime kit using multiple stealing techniques Since early 2010 targeting other regions too Several independent cybercrime groups involved Joint investigation of Russian police, Group-IB and ESET
  • 65. Summary Win32/RDPdoor Win32/Sheldor Win32/Carberp First appearance April 2010 June 2010 February 2010 Cost 2000 $ 2500 $ 9000 $ Prevalence Russia, Russia, Russia, Ukraine, Ukraine, Ukraine, Kazakhstan Kazakhstan Spain, USA Remote Access RDP via ThinSoft Via TeamViewer Via plug-ins BeTwin Information stealing manually manually automated Plug-ins    Complexity    Botnet   
  • 66. Conclusion • Banks in other countries becoming new targets of Russian cybercrime groups • Attackers respond to new security measures with new methods to bypass them • Cybercriminals use stolen money to stay out of jail • Disabling C&C servers not enough to stop them • Only way of fighting them is by cooperation
  • 68. Thank you for your attention ;) Robert Lipovsky, ESET lipovsky@eset.sk Aleksandr Matrosov, ESET matrosov@eset.sk @matrosov Dmitry Volkov, Group-IB volkov@group-ib.ru @groupib