SlideShare ist ein Scribd-Unternehmen logo
1 von 30
APTs, Cyber-
attacks, Cybercrime, Cyber
warfare and Cyber threats
exposed
Marcus Murray & Hasain Alshakarti
Truesec Security Team, MVP-Enterprise Security
x2
Marcus Murray   Hasain Alshakarti
The threat landscape is changing..




             It used to be kids hacking for fun…..
Not anymore....
Most countries have “cyber capabilities” today..
The ”Mandiant report”
Unit 61398 is partially situated on Datong Road
(大同路) in Gaoqiaozhen (高桥镇), which is
located in the Pudong New Area (浦东新区) of
Shanghai (上海). The central building in this
compound is a 130,663 square foot facility that
is 12 stories high and was built in early 2007.




                   * Mandiant APT1 report 2013
We estimate that Unit 61398 is staffed by
hundreds, and perhaps thousands of people
based on the size of Unit 61398’s physical
infrastructure.
“Unit 61398 requires its personnel to be
trained in computer security and computer
network operations and also requires its
personnel to be proficient in the English
language.”




               * Mandiant APT1 report 2013
“They have systematically stolen hundreds of
terabytes of data from at least 141
organizations, and has demonstrated the
capability and intent to steal from dozens of
organizations simultaneously”*




                * Mandiant APT1 report 2013
“Among other large-scale thefts of intellectual
property, we have observed them stealing 6.5
terabytes of compressed data from a single
organization over a ten-month time period.”




                * Mandiant APT1 report 2013
Attack process
                               Initial   Establish         Lateral          Complete
            Initial recon                                 Movement
                            compromize   foothold                            mission



                                               Maintain                Internal
                                               presence                 Recon




                                                           Escalate
                                                          privileges
Attack process
Initial recon
Initial recon
Initial compromize


   Web Srv   Mail Srv




   DC        File Srv   Mail Srv




                                   Client   Client



                                   Admin     User
Establish foothold

                                                     C & C SRV




   Web Srv   Mail Srv




   DC        File Srv   Mail Srv




                                   Client   Client



                                   Admin     User
What about antivirus?



                                        Av-test



  Trojan.exe   Avhide   Newtrojan.exe
Lateral movement


  Web Srv   Mail Srv




   DC       File Srv   Mail Srv




                                  Client   Client



                                  Admin     User
Complete mission


   Web Srv   Mail Srv




   DC        File Srv   Mail Srv




                                   Client   Client



                                   Admin     User
What about network detection?
Complete mission
 Harvest data
 • intellectual property
 • business contracts
 • negotiations,
 • policy papers
 • internal memoranda
 • etc.

 Compress and collect
 • Rar+pwd
 • etc.
Channel over MSN
Channel over Google calendar
FQDN used..
About half of APT1’s known zones were named according to three themes:

•   News
•   Technology
•   Business.


        aoldaily.com                 mediaxsds.net
                                                                  reutersnewsonline.com
        aunewsonline.com             myyahoonews.com
                                                                  rssadvanced.org
        canadatvsite.com             newsesport.com
                                                                  saltlakenews.org
        canoedaily.com               newsonet.net
                                                                  sportreadok.net
        cnndaily.com                 newsonlinesite.com
                                                                  todayusa.org
        cnndaily.net                 newspappers.org
                                                                  usapappers.com
        cnnnewsdaily.com             nytimesnews.net
                                                                  usnewssite.com
        defenceonline.net            oplaymagzine.com
                                                                  yahoodaily.com
        freshreaders.net             phoenixtvus.com
        giftnews.org                 purpledaily.com
        issnbgkit.net
Origins of attacks..
Marcus Murray   Hasain Alshakarti
Thank you for listening! 

Weitere ähnliche Inhalte

Andere mochten auch

Shared Interests as a Bridge Toward a Muslim Marriage
Shared Interests as a Bridge Toward a Muslim MarriageShared Interests as a Bridge Toward a Muslim Marriage
Shared Interests as a Bridge Toward a Muslim MarriageMuslims4Marriage
 
Pivotal: Virtualize Big Data to Make the Elephant Dance
Pivotal: Virtualize Big Data to Make the Elephant DancePivotal: Virtualize Big Data to Make the Elephant Dance
Pivotal: Virtualize Big Data to Make the Elephant DanceEMC
 
KNOWMATICS AND THE RELATED FIELDS OF STUDY- EDUCATION, PSYCHOLOGY, BRAIN RESE...
KNOWMATICS AND THE RELATED FIELDS OF STUDY- EDUCATION, PSYCHOLOGY, BRAIN RESE...KNOWMATICS AND THE RELATED FIELDS OF STUDY- EDUCATION, PSYCHOLOGY, BRAIN RESE...
KNOWMATICS AND THE RELATED FIELDS OF STUDY- EDUCATION, PSYCHOLOGY, BRAIN RESE...Dr. Raju M. Mathew
 
White Paper: EMC Greenplum Data Computing Appliance Enhances EMC IT's Global ...
White Paper: EMC Greenplum Data Computing Appliance Enhances EMC IT's Global ...White Paper: EMC Greenplum Data Computing Appliance Enhances EMC IT's Global ...
White Paper: EMC Greenplum Data Computing Appliance Enhances EMC IT's Global ...EMC
 
Дифракция
ДифракцияДифракция
ДифракцияGvanca95
 
Federmanager Bologna: English introduction - 15 november 2013
Federmanager Bologna: English introduction - 15 november 2013Federmanager Bologna: English introduction - 15 november 2013
Federmanager Bologna: English introduction - 15 november 2013Marco Frullanti
 
Hannah Strakey
Hannah StrakeyHannah Strakey
Hannah StrakeyDax Vorona
 
Africa after imperialism
Africa after imperialismAfrica after imperialism
Africa after imperialismTravis Klein
 
IT Ops Mgmt in the New Virtualized, Software-defined World
IT Ops Mgmt in the New Virtualized, Software-defined WorldIT Ops Mgmt in the New Virtualized, Software-defined World
IT Ops Mgmt in the New Virtualized, Software-defined WorldEMC
 
Program imunisasi
Program imunisasiProgram imunisasi
Program imunisasihendrassite
 
Up in china_fortune_media
Up in china_fortune_mediaUp in china_fortune_media
Up in china_fortune_mediaShari Monnes
 
How Does Long-term Care Insurance Work?
How Does Long-term Care Insurance Work?How Does Long-term Care Insurance Work?
How Does Long-term Care Insurance Work?Laurel Blond
 

Andere mochten auch (15)

Shared Interests as a Bridge Toward a Muslim Marriage
Shared Interests as a Bridge Toward a Muslim MarriageShared Interests as a Bridge Toward a Muslim Marriage
Shared Interests as a Bridge Toward a Muslim Marriage
 
Pivotal: Virtualize Big Data to Make the Elephant Dance
Pivotal: Virtualize Big Data to Make the Elephant DancePivotal: Virtualize Big Data to Make the Elephant Dance
Pivotal: Virtualize Big Data to Make the Elephant Dance
 
KNOWMATICS AND THE RELATED FIELDS OF STUDY- EDUCATION, PSYCHOLOGY, BRAIN RESE...
KNOWMATICS AND THE RELATED FIELDS OF STUDY- EDUCATION, PSYCHOLOGY, BRAIN RESE...KNOWMATICS AND THE RELATED FIELDS OF STUDY- EDUCATION, PSYCHOLOGY, BRAIN RESE...
KNOWMATICS AND THE RELATED FIELDS OF STUDY- EDUCATION, PSYCHOLOGY, BRAIN RESE...
 
Audi rs6
Audi rs6Audi rs6
Audi rs6
 
White Paper: EMC Greenplum Data Computing Appliance Enhances EMC IT's Global ...
White Paper: EMC Greenplum Data Computing Appliance Enhances EMC IT's Global ...White Paper: EMC Greenplum Data Computing Appliance Enhances EMC IT's Global ...
White Paper: EMC Greenplum Data Computing Appliance Enhances EMC IT's Global ...
 
Дифракция
ДифракцияДифракция
Дифракция
 
Federmanager Bologna: English introduction - 15 november 2013
Federmanager Bologna: English introduction - 15 november 2013Federmanager Bologna: English introduction - 15 november 2013
Federmanager Bologna: English introduction - 15 november 2013
 
Doc2
Doc2Doc2
Doc2
 
Mobile mini trends
Mobile mini trendsMobile mini trends
Mobile mini trends
 
Hannah Strakey
Hannah StrakeyHannah Strakey
Hannah Strakey
 
Africa after imperialism
Africa after imperialismAfrica after imperialism
Africa after imperialism
 
IT Ops Mgmt in the New Virtualized, Software-defined World
IT Ops Mgmt in the New Virtualized, Software-defined WorldIT Ops Mgmt in the New Virtualized, Software-defined World
IT Ops Mgmt in the New Virtualized, Software-defined World
 
Program imunisasi
Program imunisasiProgram imunisasi
Program imunisasi
 
Up in china_fortune_media
Up in china_fortune_mediaUp in china_fortune_media
Up in china_fortune_media
 
How Does Long-term Care Insurance Work?
How Does Long-term Care Insurance Work?How Does Long-term Care Insurance Work?
How Does Long-term Care Insurance Work?
 

Ähnlich wie APTs, Cyber Threats, and Cyberwarfare Exposed

2012: The End of the World?
2012: The End of the World?2012: The End of the World?
2012: The End of the World?Saumil Shah
 
Implementing a comprehensive application security progaram - Tawfiq
Implementing a comprehensive application security progaram - Tawfiq Implementing a comprehensive application security progaram - Tawfiq
Implementing a comprehensive application security progaram - Tawfiq OWASP-Qatar Chapter
 
OSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and PractitionersOSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and PractitionersMegan DeBlois
 
Cyber Security and Open Source
Cyber Security and Open SourceCyber Security and Open Source
Cyber Security and Open SourcePOSSCON
 
BSidesSF 2016 - A year in the wild: fighting malware at the corporate level
BSidesSF 2016 - A year in the wild: fighting malware at the corporate levelBSidesSF 2016 - A year in the wild: fighting malware at the corporate level
BSidesSF 2016 - A year in the wild: fighting malware at the corporate levelJakub "Kuba" Sendor
 

Ähnlich wie APTs, Cyber Threats, and Cyberwarfare Exposed (7)

2012: The End of the World?
2012: The End of the World?2012: The End of the World?
2012: The End of the World?
 
Data Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. MookheyData Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. Mookhey
 
Application security enterprise strategies
Application security enterprise strategiesApplication security enterprise strategies
Application security enterprise strategies
 
Implementing a comprehensive application security progaram - Tawfiq
Implementing a comprehensive application security progaram - Tawfiq Implementing a comprehensive application security progaram - Tawfiq
Implementing a comprehensive application security progaram - Tawfiq
 
OSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and PractitionersOSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and Practitioners
 
Cyber Security and Open Source
Cyber Security and Open SourceCyber Security and Open Source
Cyber Security and Open Source
 
BSidesSF 2016 - A year in the wild: fighting malware at the corporate level
BSidesSF 2016 - A year in the wild: fighting malware at the corporate levelBSidesSF 2016 - A year in the wild: fighting malware at the corporate level
BSidesSF 2016 - A year in the wild: fighting malware at the corporate level
 

Mehr von Microsoft TechNet - Belgium and Luxembourg

Mehr von Microsoft TechNet - Belgium and Luxembourg (20)

Windows 10: all you need to know!
Windows 10: all you need to know!Windows 10: all you need to know!
Windows 10: all you need to know!
 
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de KeukelaereConfiguration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
 
Windows 8.1 a closer look
Windows 8.1 a closer lookWindows 8.1 a closer look
Windows 8.1 a closer look
 
So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Deploying and managing ConfigMgr Clients
Deploying and managing ConfigMgr ClientsDeploying and managing ConfigMgr Clients
Deploying and managing ConfigMgr Clients
 
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
 
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware UpdatingHands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
 
SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012
 
Jump start your application monitoring with APM
Jump start your application monitoring with APMJump start your application monitoring with APM
Jump start your application monitoring with APM
 
What’s new in Lync Server 2013: Persistent Chat
What’s new in Lync Server 2013: Persistent ChatWhat’s new in Lync Server 2013: Persistent Chat
What’s new in Lync Server 2013: Persistent Chat
 
What's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & DevicesWhat's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & Devices
 
Office 365 ProPlus: Click-to-run deployment and management
Office 365 ProPlus: Click-to-run deployment and managementOffice 365 ProPlus: Click-to-run deployment and management
Office 365 ProPlus: Click-to-run deployment and management
 
Office 365 Identity Management options
Office 365 Identity Management options Office 365 Identity Management options
Office 365 Identity Management options
 
SharePoint Installation and Upgrade: Untangling Your Options
SharePoint Installation and Upgrade: Untangling Your Options SharePoint Installation and Upgrade: Untangling Your Options
SharePoint Installation and Upgrade: Untangling Your Options
 
The application model in real life
The application model in real lifeThe application model in real life
The application model in real life
 
Microsoft private cloud with Cisco and Netapp - Flexpod solution
Microsoft private cloud with Cisco and Netapp -  Flexpod solutionMicrosoft private cloud with Cisco and Netapp -  Flexpod solution
Microsoft private cloud with Cisco and Netapp - Flexpod solution
 
Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise
 
Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management
 
Network Management in System Center 2012 SP1 - VMM
Network Management in System Center 2012  SP1 - VMM Network Management in System Center 2012  SP1 - VMM
Network Management in System Center 2012 SP1 - VMM
 

APTs, Cyber Threats, and Cyberwarfare Exposed

  • 1. APTs, Cyber- attacks, Cybercrime, Cyber warfare and Cyber threats exposed Marcus Murray & Hasain Alshakarti Truesec Security Team, MVP-Enterprise Security x2
  • 2. Marcus Murray Hasain Alshakarti
  • 3. The threat landscape is changing.. It used to be kids hacking for fun…..
  • 5. Most countries have “cyber capabilities” today..
  • 7. Unit 61398 is partially situated on Datong Road (大同路) in Gaoqiaozhen (高桥镇), which is located in the Pudong New Area (浦东新区) of Shanghai (上海). The central building in this compound is a 130,663 square foot facility that is 12 stories high and was built in early 2007. * Mandiant APT1 report 2013
  • 8. We estimate that Unit 61398 is staffed by hundreds, and perhaps thousands of people based on the size of Unit 61398’s physical infrastructure.
  • 9. “Unit 61398 requires its personnel to be trained in computer security and computer network operations and also requires its personnel to be proficient in the English language.” * Mandiant APT1 report 2013
  • 10. “They have systematically stolen hundreds of terabytes of data from at least 141 organizations, and has demonstrated the capability and intent to steal from dozens of organizations simultaneously”* * Mandiant APT1 report 2013
  • 11. “Among other large-scale thefts of intellectual property, we have observed them stealing 6.5 terabytes of compressed data from a single organization over a ten-month time period.” * Mandiant APT1 report 2013
  • 12. Attack process Initial Establish Lateral Complete Initial recon Movement compromize foothold mission Maintain Internal presence Recon Escalate privileges
  • 16. Initial compromize Web Srv Mail Srv DC File Srv Mail Srv Client Client Admin User
  • 17. Establish foothold C & C SRV Web Srv Mail Srv DC File Srv Mail Srv Client Client Admin User
  • 18. What about antivirus? Av-test Trojan.exe Avhide Newtrojan.exe
  • 19.
  • 20.
  • 21. Lateral movement Web Srv Mail Srv DC File Srv Mail Srv Client Client Admin User
  • 22. Complete mission Web Srv Mail Srv DC File Srv Mail Srv Client Client Admin User
  • 23. What about network detection?
  • 24. Complete mission Harvest data • intellectual property • business contracts • negotiations, • policy papers • internal memoranda • etc. Compress and collect • Rar+pwd • etc.
  • 27. FQDN used.. About half of APT1’s known zones were named according to three themes: • News • Technology • Business. aoldaily.com mediaxsds.net reutersnewsonline.com aunewsonline.com myyahoonews.com rssadvanced.org canadatvsite.com newsesport.com saltlakenews.org canoedaily.com newsonet.net sportreadok.net cnndaily.com newsonlinesite.com todayusa.org cnndaily.net newspappers.org usapappers.com cnnnewsdaily.com nytimesnews.net usnewssite.com defenceonline.net oplaymagzine.com yahoodaily.com freshreaders.net phoenixtvus.com giftnews.org purpledaily.com issnbgkit.net
  • 29. Marcus Murray Hasain Alshakarti
  • 30. Thank you for listening! 