SlideShare ist ein Scribd-Unternehmen logo
1 von 43
Downloaden Sie, um offline zu lesen
Going  Kine)c  on  Electronic  
Crime  Networks
THOTCON0x06
John  Bambenek,  Fidelis  Cybersecurity
  
Introduc)on
  
•  Sr. Threat Researcher with Fidelis Cybersecurity
•  Faculty at the University of Illinois at Urbana-
Champaign
•  Producer of open-source intelligence feeds
•  Run several takedown-oriented groups for various
malware families
Problem  Statement
•  Right now we are on the losing
end of an arms race
•  The adversaries produce more malware than we can
possibly analyze.
•  We have to operate in the open while they operate in
secret.
•  Their core business is exploitation, security for us is a
cost center.
•  We operate in a global economy without an effective
means of global law enforcement.
TL;DR
  
Bad News: We’re Doomed
Good News: Unlimited Job Security
What  to  do…
•  You could keep playing defense:
•  Firewall Rules
•  IDS/IPS Rules
•  AV Signatures
•  IoCs
•  Etc etc etc
The  problem  of  “sufficiency”
•  Once we “detect” a threat work occurs until some
“defense” is developed.
•  Once a threat is “blocked”, the work tends to stop.
•  The threat actor can operate with impunity and just
has to tweak tactics occasionally.
•  Those in most need of security are least likely to
have it / afford it.
What  to  do…
•  Or you can take the fight to the
adversary and go kinetic?
•  Why kinetic?
•  No, I’m not talking about predator
drones…
•  Or hacking back…
What  to  do…
What  is  a  takedown?
•  An attempt to disrupt an ongoing electronic
crime operation with the intent of ending it
entirely.
•  Successful takedowns: Operation Tovar,
Conficker
•  Unsuccessful takedowns: Kelihos (all 4)
•  Complete disasters: No-Ip
Aren’t  takedowns  just  media  ploys?
Aren’t  takedowns  just  media  ploys?
•  Right now there is far too much media
pimping in our industry by <insert company
name here>.
•  There have been plenty of takedowns for PR
purposes. And white papers. And blog
posts… etc.
•  Doesn’t mean to stop trying to have an
impact.
How  to  tell  difference?
•  Takedowns, like all security related activity
requires OPSEC.
•  What’s the first rule of OPSEC?
Do  takedowns  do  any  good?
•  Some argue because crime doesn’t stop
takedowns don’t do any good.
•  Sure, stupid takedowns don’t do much
good.
•  But arrests haven’t stopped rape,
murder and theft in a few thousand
years either.
Do  takedowns  do  any  good?
•  Writing detection rules don’t stop
criminals from adapting either.
•  Key is to do things in a thoughtful way
to maximize impact and minimize risk.
•  Hopefully along the way an indictment
can be had.
How  to  do  takedowns…
•  Largely depends on the threat and the
complexity.
•  Can be as simple as asking a provider
to shut someone down.
•  Can be as complicated as involving
dozens of organizations, law
enforcement across multiple countries.
The  Easy  Way
•  Getting things taken down for criminal
activity can be time-consuming.
•  Getting things taken down for “brand
damage” / DMCA is generally easy.
•  Seriously, ICANN has minimal
security rules for domains, but they
are all over brand damage /
impersonation.
The  Easy  Way
•  That only works for “small” threats…
the kind of threats that are easy to come
back anyway.
•  Most threats are too big for one
organization to handle.
•  There are shared threats and unique
threats. Most are shared threats.
Building  the  Intel  for  Takedowns
•  Have to build the “what” before you can
answer the “how”.
•  Almost all malware wants to talk
“somewhere”.
•  Enumerate *ALL* avenues an adversary
can contact an infected machine.
Example  #1
•  Example #1: Domain Generation
Algorithms
•  Based on some math, a pseudo-random
but predictable list of domains are
generated.
Example  #1
•  If you can RE a DGA, you can use it to
build intel.
•  See Johannes Bader’s blog:
johannesbader.ch
•  Create a domain list, use adns-tools to
resolve large numbers of them on a
routine basis, instant SIGINT tool
Example  #1
tmabjkeyftudpk.com , Domain used by Cryptolocker - Flashback DGA for
11 May 2015
eiavquoeipblqq.net , Domain used by Cryptolocker - Flashback DGA for
11 May 2015
rvyqndcrbqsxqu.biz , Domain used by Cryptolocker - Flashback DGA for
11 May 2015
fjccjegtytxxsh.ru , Domain used by Cryptolocker - Flashback DGA for 11
May 2015
swbwgmthrupkju.org , Domain used by Cryptolocker - Flashback DGA
for 11 May 2015
gqfoopfpkaxjjf.co.uk , Domain used by Cryptolocker - Flashback DGA for
11 May 2015
Example  #1
•  You could use this list to find what
resolves and where the adversary is
sitting…
50.63.202.25 , IP used by matsnu C&C
54.228.194.98 , IP used by matsnu C&C
Example  #1
•  Or you could take all the domains current and
future in a legal action.
•  If there is no other path to access, you have
severed the adversary’s ability to control.
(Operation Tovar did this).
•  You could also buy all the domains…
•  Expensive, unless you are a registrar which is
cheaper than you think to do.
•  Or you could ask registrar to suspend. Many will
take action (some won’t).
•  AlienSpy example
Example  #2
•  Example 2
•  Mine malware for C2 information
•  https://github.com/kevthehermit/RATDecoders
•  Python scripts that will statically rip configurations
out of 32 different flavors of RATs.
•  Disclaimer: I had nothing to do with the
development of these tools; they just fit my need
and Kevin Breen deserves mad props.
Sample  DarkComet  config
Key: CampaignID Value: Guest16
Key: Domains Value: ######.ddns.net:1234
Key: FTPHost Value:
Key: FTPKeyLogs Value:
Key: FTPPassword Value:
Key: FTPPort Value:
Key: FTPRoot Value:
Key: FTPSize Value:
Key: FTPUserName Value:
Key: FireWallBypass Value: 0
Key: Gencode Value: 3yHVnheK6eDm
Key: Mutex Value: DC_MUTEX-W45NCJ6
Key: OfflineKeylogger Value: 1
Key: Password Value:
Key: Version Value: #KCMDDC51#
Sample  njRat  config
Key: Campaign ID Value: 1111111111111111111
Key: Domain Value: #####.ddns.net
Key: Install Dir Value: UserProfile
Key: Install Flag Value: False
Key: Install Name Value: svchost.exe
Key: Network Separator Value: |'|'|
Key: Port Value: 1177
Key: Registry Value Value:
5d5e3c1b562e3a75dc95740a35744ad0
Key: version Value: 0.6.4
Processing  DNS/IP  Info
•  Config takes FQDN or IP in free-form field.
•  The only configuration item any processing is done
on is here.
•  If RFC 1918 IP, then drop config.
•  If FQDN resolves to RFC1918 IP, keep it.
•  If it doesn’t resolve, keep it.
Sample  Output
0739b6a1bc018a842b87dcb95a73248d3842c5de,150213,Dark Comet Config,Guest16,######.ddns
.net,,1604,,,,o1o5GgYr8yBB,DC_MUTEX-4E844NR
0745a4278793542d15bbdbe3e1f9eb8691e8b4fb,150213,Dark Comet Config,Guest16,######.noip.me,,1604
,,,,aWUZabkXJRte,DC_MUTEX-TX61KQS
07540d2b4d8bd83e9ba43b2e5d9a2578677cba20,150213,Dark Comet Config,FUDDDDD,######.no-ip.biz,
204.95.99.66,1604,,,,qZYsyVu0kMpS,DC_MUTEX-8VK1Q5N
07560860bc1d58822db871492ea1aa56f120191a,150213,Dark Comet Config,Victim,######.no-ip.biz,,1604
,,,,sfAEjh4m1lQ7,DC_MUTEX-F2T2XKC
07998ff3d00d232b6f35db69ee5a549da11e96d1,150213,Dark Comet Config,test1,,192.116.50.238,90,,,,4A
2xbJmSqvuc,DC_MUTEX-F54S21D
07ac914bdb5b4cda59715df8421ec1adfaa79cc7,150213,Dark Comet Config,Guest16,######.ddns.net,31.13
2.106.94,1604,1.#######.z8.ru,######60,######2012,zwd8tEC0F0tA,DC_MUTEX-W3VUKQN
NOTE – Redacted entries are username and password for FTP drop for
keylogs.
So  you  have  data.  Now  what?
•  You have four options for takedown
related actions:
•  Use the criminal justice system
•  Use civil litigation
•  Work with providers directly (AUP/
ToS/Contract enforcement)
•  Other “less legal” means which we
will not discuss here.
Criminal  Jus)ce  System
•  The ideal result… someone gets arrested.
•  Generally, work for big online crime cases
starts with private sector research.
•  Very time consuming but low cost.
•  LE in almost every country willing to work
with anyone who can help build cases.
•  Yet cooperation between countries can be
problematic.
Criminal  Jus)ce  System
•  Important tool to motivate law enforcement
is to enumerate harm.
•  Sinkhole domains (if possible) to build victim
information.
•  Before LE will act they want to know how
their citizens are impacted.
•  Possible to get cooperation even in “hostile”
jurisdictions.
Civil  li)ga)on
•  Involves an aggrieved party (or
regulatory body) going to court for some
remedy.
•  Generally not available to most people
for lack of “standing”.
•  Can also lead to some collateral damage.
Work  with  providers  directly
•  Some are more cooperative than others.
•  Many go from uncooperative to cooperative.
•  Takes time to build a relationship and trust.
•  Bypasses “foreign policy” issues and gets
results.
•  As example, I’ve gotten cooperation inside
Russia and China on security issues.
Risk  assessment
•  Before any takedown is taken, a “risk
assessment” should be done.
•  What collateral damage could be done?
•  Is action being taken against a third-party
and not the target?
•  Will less aggressive means accomplish the
mission without resorting to heavy-handed
tactics?
Post-­‐Takedown  ac)vity
•  Just because you takedown the C2 network,
it doesn’t necessarily mean you have cleaned
up infected machines.
•  Operative Tovar created a mechanism for
people to recover files and to see if they were
infected to make private individuals “whole”.
•  This is the most neglected part of takedowns.
The  Key  to  All  of  This…
•  Most threats are too big for one
organization to tackle.
•  Many organizations have unique data or
skillsets.
•  Key is to have a group of people across
organizations all contributing to a
reasonable amount to the goal.
The  Key  to  All  of  This…
•  Private working groups aren’t exclusive
to big companies or security companies.
•  Takes willingness to contribute
something to get something in return.
•  Added benefit is access to information
to protect your organization you
wouldn’t have otherwise.
Venues  to  par)cipate  in  takedown  ac)vity
•  Microsoft CME Program
•  Private working groups (some are more
open than others)
•  I run 4.
The  Upshot
•  There is more work than could possibly be done.
•  If you want to contribute effort, find a venue to do
so.
•  Reverse-engineering
•  Tooling
•  OSINT research
•  Etc.
•  Much of the work is not as high-skill as you would
think, just takes time, motivation and a willingness
to learn.
Call  to  Ac)on
•  There is more work than could possibly be done.
•  If you want to contribute effort, find a venue to do
so.
•  Reverse-engineering
•  Tooling
•  OSINT research
•  Etc.
•  Much of the work is not as high-skill as you would
think, just takes time, motivation and a willingness
to learn.
Bocom  Line
“The infosec industry doesn’t need
another white paper.
What we need is bodies in the streets.”
This  is  here  just  because  it  amuses  me
QUESTIONS?
THANK  YOU
John.bambenek@fidelissecurity.com  /  217  493  0760
@bambenek

Weitere ähnliche Inhalte

Was ist angesagt?

Corporate Espionage without the Hassle of Committing Felonies
Corporate Espionage without the Hassle of Committing FeloniesCorporate Espionage without the Hassle of Committing Felonies
Corporate Espionage without the Hassle of Committing FeloniesJohn Bambenek
 
GreyNoise - Lowering Signal To Noise
GreyNoise - Lowering Signal To NoiseGreyNoise - Lowering Signal To Noise
GreyNoise - Lowering Signal To NoiseAndrew Morris
 
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...Andrew Morris
 
BSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
BSidesLV 2016 - Powershell - Hunting on the Endpoint - GerritzBSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
BSidesLV 2016 - Powershell - Hunting on the Endpoint - GerritzChristopher Gerritz
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceChristopher Gerritz
 
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptxChi En (Ashley) Shen
 
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse TeamsUsing GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse TeamsAndrew Morris
 
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg dayCSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg dayCanSecWest
 
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel NaderBreaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel NaderEC-Council
 
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...EC-Council
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...EC-Council
 
"There's a pot of Bitcoins behind the ransomware rainbow"
"There's a pot of Bitcoins behind the ransomware rainbow""There's a pot of Bitcoins behind the ransomware rainbow"
"There's a pot of Bitcoins behind the ransomware rainbow"Christiaan Beek
 
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...Andrew Morris
 
External to DA, the OS X Way
External to DA, the OS X WayExternal to DA, the OS X Way
External to DA, the OS X WayStephan Borosh
 
The Background Noise of the Internet
The Background Noise of the InternetThe Background Noise of the Internet
The Background Noise of the InternetAndrew Morris
 
Does a Bear Leak in the Woods?
Does a Bear Leak in the Woods?Does a Bear Leak in the Woods?
Does a Bear Leak in the Woods?ThreatConnect
 
Security by Weston Hecker
Security by Weston HeckerSecurity by Weston Hecker
Security by Weston HeckerEC-Council
 
Blackhat USA 2014 - The New Scourge of Ransomware
Blackhat USA 2014 - The New Scourge of RansomwareBlackhat USA 2014 - The New Scourge of Ransomware
Blackhat USA 2014 - The New Scourge of RansomwareJohn Bambenek
 
Paranoia 2018: A Process is No One
Paranoia 2018: A Process is No OneParanoia 2018: A Process is No One
Paranoia 2018: A Process is No OneJared Atkinson
 
Defending Against 1,000,000 Cyber Attacks by Michael Banks
Defending Against 1,000,000 Cyber Attacks by Michael BanksDefending Against 1,000,000 Cyber Attacks by Michael Banks
Defending Against 1,000,000 Cyber Attacks by Michael BanksEC-Council
 

Was ist angesagt? (20)

Corporate Espionage without the Hassle of Committing Felonies
Corporate Espionage without the Hassle of Committing FeloniesCorporate Espionage without the Hassle of Committing Felonies
Corporate Espionage without the Hassle of Committing Felonies
 
GreyNoise - Lowering Signal To Noise
GreyNoise - Lowering Signal To NoiseGreyNoise - Lowering Signal To Noise
GreyNoise - Lowering Signal To Noise
 
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
 
BSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
BSidesLV 2016 - Powershell - Hunting on the Endpoint - GerritzBSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
BSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home Workforce
 
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
 
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse TeamsUsing GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams
 
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg dayCSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
 
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel NaderBreaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
 
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
 
"There's a pot of Bitcoins behind the ransomware rainbow"
"There's a pot of Bitcoins behind the ransomware rainbow""There's a pot of Bitcoins behind the ransomware rainbow"
"There's a pot of Bitcoins behind the ransomware rainbow"
 
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...
 
External to DA, the OS X Way
External to DA, the OS X WayExternal to DA, the OS X Way
External to DA, the OS X Way
 
The Background Noise of the Internet
The Background Noise of the InternetThe Background Noise of the Internet
The Background Noise of the Internet
 
Does a Bear Leak in the Woods?
Does a Bear Leak in the Woods?Does a Bear Leak in the Woods?
Does a Bear Leak in the Woods?
 
Security by Weston Hecker
Security by Weston HeckerSecurity by Weston Hecker
Security by Weston Hecker
 
Blackhat USA 2014 - The New Scourge of Ransomware
Blackhat USA 2014 - The New Scourge of RansomwareBlackhat USA 2014 - The New Scourge of Ransomware
Blackhat USA 2014 - The New Scourge of Ransomware
 
Paranoia 2018: A Process is No One
Paranoia 2018: A Process is No OneParanoia 2018: A Process is No One
Paranoia 2018: A Process is No One
 
Defending Against 1,000,000 Cyber Attacks by Michael Banks
Defending Against 1,000,000 Cyber Attacks by Michael BanksDefending Against 1,000,000 Cyber Attacks by Michael Banks
Defending Against 1,000,000 Cyber Attacks by Michael Banks
 

Ähnlich wie THOTCON 0x6: Going Kinetic on Electronic Crime Networks

Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaSteve Poole
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSECSean Whalen
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Steve Poole
 
Incident Response Fails
Incident Response FailsIncident Response Fails
Incident Response FailsMichael Gough
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developerSteve Poole
 
The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.Teri Radichel
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAPNIC
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Barry Greene
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and DefenseAndrew McNicol
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber worldNikhil Tripathi
 
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018Codemotion
 
Devoxx Belgium 2022 - Debugging distributed systems
Devoxx Belgium 2022 - Debugging distributed systemsDevoxx Belgium 2022 - Debugging distributed systems
Devoxx Belgium 2022 - Debugging distributed systemsBert Jan Schrijver
 
Arnhem JUG March 2023 - Debugging distributed systems
Arnhem JUG March 2023 - Debugging distributed systemsArnhem JUG March 2023 - Debugging distributed systems
Arnhem JUG March 2023 - Debugging distributed systemsBert Jan Schrijver
 
Hit by a Cyberattack: lesson learned
 Hit by a Cyberattack: lesson learned Hit by a Cyberattack: lesson learned
Hit by a Cyberattack: lesson learnedB.A.
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsGDSCCVR
 
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial EmulationScott Sutherland
 
Protecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeLancope, Inc.
 

Ähnlich wie THOTCON 0x6: Going Kinetic on Electronic Crime Networks (20)

Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 
Incident Response Fails
Incident Response FailsIncident Response Fails
Incident Response Fails
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
 
The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...
 
hacking
hackinghacking
hacking
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 
Janitor vs cleaner
Janitor vs cleanerJanitor vs cleaner
Janitor vs cleaner
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber world
 
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018
 
Devoxx Belgium 2022 - Debugging distributed systems
Devoxx Belgium 2022 - Debugging distributed systemsDevoxx Belgium 2022 - Debugging distributed systems
Devoxx Belgium 2022 - Debugging distributed systems
 
Arnhem JUG March 2023 - Debugging distributed systems
Arnhem JUG March 2023 - Debugging distributed systemsArnhem JUG March 2023 - Debugging distributed systems
Arnhem JUG March 2023 - Debugging distributed systems
 
Hit by a Cyberattack: lesson learned
 Hit by a Cyberattack: lesson learned Hit by a Cyberattack: lesson learned
Hit by a Cyberattack: lesson learned
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
 
Protecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber Crime
 

Mehr von John Bambenek

I'm All Up in Your Blockchain - Hunting Down the Nazis
I'm All Up in Your Blockchain - Hunting Down the NazisI'm All Up in Your Blockchain - Hunting Down the Nazis
I'm All Up in Your Blockchain - Hunting Down the NazisJohn Bambenek
 
MISP Summit 2018: Barncat: Using MISP for Bulk Malware Surveillance
MISP Summit 2018: Barncat: Using MISP for Bulk Malware SurveillanceMISP Summit 2018: Barncat: Using MISP for Bulk Malware Surveillance
MISP Summit 2018: Barncat: Using MISP for Bulk Malware SurveillanceJohn Bambenek
 
SANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesSANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesJohn Bambenek
 
Tracking Exploit Kits - Virus Bulletin 2016
Tracking Exploit Kits - Virus Bulletin 2016Tracking Exploit Kits - Virus Bulletin 2016
Tracking Exploit Kits - Virus Bulletin 2016John Bambenek
 
IESBGA 2014 Cybercrime Seminar by John Bambenek
IESBGA 2014 Cybercrime Seminar by John BambenekIESBGA 2014 Cybercrime Seminar by John Bambenek
IESBGA 2014 Cybercrime Seminar by John BambenekJohn Bambenek
 
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014John Bambenek
 
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...John Bambenek
 
Cybercrime & Computer Forensics - ISBA Master Series CLE, Nov 18, 2011
Cybercrime & Computer Forensics - ISBA Master Series CLE, Nov 18, 2011Cybercrime & Computer Forensics - ISBA Master Series CLE, Nov 18, 2011
Cybercrime & Computer Forensics - ISBA Master Series CLE, Nov 18, 2011John Bambenek
 
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...John Bambenek
 

Mehr von John Bambenek (9)

I'm All Up in Your Blockchain - Hunting Down the Nazis
I'm All Up in Your Blockchain - Hunting Down the NazisI'm All Up in Your Blockchain - Hunting Down the Nazis
I'm All Up in Your Blockchain - Hunting Down the Nazis
 
MISP Summit 2018: Barncat: Using MISP for Bulk Malware Surveillance
MISP Summit 2018: Barncat: Using MISP for Bulk Malware SurveillanceMISP Summit 2018: Barncat: Using MISP for Bulk Malware Surveillance
MISP Summit 2018: Barncat: Using MISP for Bulk Malware Surveillance
 
SANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesSANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political Breaches
 
Tracking Exploit Kits - Virus Bulletin 2016
Tracking Exploit Kits - Virus Bulletin 2016Tracking Exploit Kits - Virus Bulletin 2016
Tracking Exploit Kits - Virus Bulletin 2016
 
IESBGA 2014 Cybercrime Seminar by John Bambenek
IESBGA 2014 Cybercrime Seminar by John BambenekIESBGA 2014 Cybercrime Seminar by John Bambenek
IESBGA 2014 Cybercrime Seminar by John Bambenek
 
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
 
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...
 
Cybercrime & Computer Forensics - ISBA Master Series CLE, Nov 18, 2011
Cybercrime & Computer Forensics - ISBA Master Series CLE, Nov 18, 2011Cybercrime & Computer Forensics - ISBA Master Series CLE, Nov 18, 2011
Cybercrime & Computer Forensics - ISBA Master Series CLE, Nov 18, 2011
 
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
 

Kürzlich hochgeladen

Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.CarlotaBedoya1
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 

Kürzlich hochgeladen (20)

Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 

THOTCON 0x6: Going Kinetic on Electronic Crime Networks

  • 1. Going  Kine)c  on  Electronic   Crime  Networks THOTCON0x06 John  Bambenek,  Fidelis  Cybersecurity  
  • 2. Introduc)on   •  Sr. Threat Researcher with Fidelis Cybersecurity •  Faculty at the University of Illinois at Urbana- Champaign •  Producer of open-source intelligence feeds •  Run several takedown-oriented groups for various malware families
  • 3. Problem  Statement •  Right now we are on the losing end of an arms race •  The adversaries produce more malware than we can possibly analyze. •  We have to operate in the open while they operate in secret. •  Their core business is exploitation, security for us is a cost center. •  We operate in a global economy without an effective means of global law enforcement.
  • 4. TL;DR   Bad News: We’re Doomed Good News: Unlimited Job Security
  • 5. What  to  do… •  You could keep playing defense: •  Firewall Rules •  IDS/IPS Rules •  AV Signatures •  IoCs •  Etc etc etc
  • 6. The  problem  of  “sufficiency” •  Once we “detect” a threat work occurs until some “defense” is developed. •  Once a threat is “blocked”, the work tends to stop. •  The threat actor can operate with impunity and just has to tweak tactics occasionally. •  Those in most need of security are least likely to have it / afford it.
  • 7. What  to  do… •  Or you can take the fight to the adversary and go kinetic? •  Why kinetic? •  No, I’m not talking about predator drones… •  Or hacking back…
  • 9. What  is  a  takedown? •  An attempt to disrupt an ongoing electronic crime operation with the intent of ending it entirely. •  Successful takedowns: Operation Tovar, Conficker •  Unsuccessful takedowns: Kelihos (all 4) •  Complete disasters: No-Ip
  • 10. Aren’t  takedowns  just  media  ploys?
  • 11. Aren’t  takedowns  just  media  ploys? •  Right now there is far too much media pimping in our industry by <insert company name here>. •  There have been plenty of takedowns for PR purposes. And white papers. And blog posts… etc. •  Doesn’t mean to stop trying to have an impact.
  • 12. How  to  tell  difference? •  Takedowns, like all security related activity requires OPSEC. •  What’s the first rule of OPSEC?
  • 13. Do  takedowns  do  any  good? •  Some argue because crime doesn’t stop takedowns don’t do any good. •  Sure, stupid takedowns don’t do much good. •  But arrests haven’t stopped rape, murder and theft in a few thousand years either.
  • 14. Do  takedowns  do  any  good? •  Writing detection rules don’t stop criminals from adapting either. •  Key is to do things in a thoughtful way to maximize impact and minimize risk. •  Hopefully along the way an indictment can be had.
  • 15. How  to  do  takedowns… •  Largely depends on the threat and the complexity. •  Can be as simple as asking a provider to shut someone down. •  Can be as complicated as involving dozens of organizations, law enforcement across multiple countries.
  • 16. The  Easy  Way •  Getting things taken down for criminal activity can be time-consuming. •  Getting things taken down for “brand damage” / DMCA is generally easy. •  Seriously, ICANN has minimal security rules for domains, but they are all over brand damage / impersonation.
  • 17. The  Easy  Way •  That only works for “small” threats… the kind of threats that are easy to come back anyway. •  Most threats are too big for one organization to handle. •  There are shared threats and unique threats. Most are shared threats.
  • 18. Building  the  Intel  for  Takedowns •  Have to build the “what” before you can answer the “how”. •  Almost all malware wants to talk “somewhere”. •  Enumerate *ALL* avenues an adversary can contact an infected machine.
  • 19. Example  #1 •  Example #1: Domain Generation Algorithms •  Based on some math, a pseudo-random but predictable list of domains are generated.
  • 20. Example  #1 •  If you can RE a DGA, you can use it to build intel. •  See Johannes Bader’s blog: johannesbader.ch •  Create a domain list, use adns-tools to resolve large numbers of them on a routine basis, instant SIGINT tool
  • 21. Example  #1 tmabjkeyftudpk.com , Domain used by Cryptolocker - Flashback DGA for 11 May 2015 eiavquoeipblqq.net , Domain used by Cryptolocker - Flashback DGA for 11 May 2015 rvyqndcrbqsxqu.biz , Domain used by Cryptolocker - Flashback DGA for 11 May 2015 fjccjegtytxxsh.ru , Domain used by Cryptolocker - Flashback DGA for 11 May 2015 swbwgmthrupkju.org , Domain used by Cryptolocker - Flashback DGA for 11 May 2015 gqfoopfpkaxjjf.co.uk , Domain used by Cryptolocker - Flashback DGA for 11 May 2015
  • 22. Example  #1 •  You could use this list to find what resolves and where the adversary is sitting… 50.63.202.25 , IP used by matsnu C&C 54.228.194.98 , IP used by matsnu C&C
  • 23. Example  #1 •  Or you could take all the domains current and future in a legal action. •  If there is no other path to access, you have severed the adversary’s ability to control. (Operation Tovar did this). •  You could also buy all the domains… •  Expensive, unless you are a registrar which is cheaper than you think to do. •  Or you could ask registrar to suspend. Many will take action (some won’t). •  AlienSpy example
  • 24. Example  #2 •  Example 2 •  Mine malware for C2 information •  https://github.com/kevthehermit/RATDecoders •  Python scripts that will statically rip configurations out of 32 different flavors of RATs. •  Disclaimer: I had nothing to do with the development of these tools; they just fit my need and Kevin Breen deserves mad props.
  • 25. Sample  DarkComet  config Key: CampaignID Value: Guest16 Key: Domains Value: ######.ddns.net:1234 Key: FTPHost Value: Key: FTPKeyLogs Value: Key: FTPPassword Value: Key: FTPPort Value: Key: FTPRoot Value: Key: FTPSize Value: Key: FTPUserName Value: Key: FireWallBypass Value: 0 Key: Gencode Value: 3yHVnheK6eDm Key: Mutex Value: DC_MUTEX-W45NCJ6 Key: OfflineKeylogger Value: 1 Key: Password Value: Key: Version Value: #KCMDDC51#
  • 26. Sample  njRat  config Key: Campaign ID Value: 1111111111111111111 Key: Domain Value: #####.ddns.net Key: Install Dir Value: UserProfile Key: Install Flag Value: False Key: Install Name Value: svchost.exe Key: Network Separator Value: |'|'| Key: Port Value: 1177 Key: Registry Value Value: 5d5e3c1b562e3a75dc95740a35744ad0 Key: version Value: 0.6.4
  • 27. Processing  DNS/IP  Info •  Config takes FQDN or IP in free-form field. •  The only configuration item any processing is done on is here. •  If RFC 1918 IP, then drop config. •  If FQDN resolves to RFC1918 IP, keep it. •  If it doesn’t resolve, keep it.
  • 28. Sample  Output 0739b6a1bc018a842b87dcb95a73248d3842c5de,150213,Dark Comet Config,Guest16,######.ddns .net,,1604,,,,o1o5GgYr8yBB,DC_MUTEX-4E844NR 0745a4278793542d15bbdbe3e1f9eb8691e8b4fb,150213,Dark Comet Config,Guest16,######.noip.me,,1604 ,,,,aWUZabkXJRte,DC_MUTEX-TX61KQS 07540d2b4d8bd83e9ba43b2e5d9a2578677cba20,150213,Dark Comet Config,FUDDDDD,######.no-ip.biz, 204.95.99.66,1604,,,,qZYsyVu0kMpS,DC_MUTEX-8VK1Q5N 07560860bc1d58822db871492ea1aa56f120191a,150213,Dark Comet Config,Victim,######.no-ip.biz,,1604 ,,,,sfAEjh4m1lQ7,DC_MUTEX-F2T2XKC 07998ff3d00d232b6f35db69ee5a549da11e96d1,150213,Dark Comet Config,test1,,192.116.50.238,90,,,,4A 2xbJmSqvuc,DC_MUTEX-F54S21D 07ac914bdb5b4cda59715df8421ec1adfaa79cc7,150213,Dark Comet Config,Guest16,######.ddns.net,31.13 2.106.94,1604,1.#######.z8.ru,######60,######2012,zwd8tEC0F0tA,DC_MUTEX-W3VUKQN NOTE – Redacted entries are username and password for FTP drop for keylogs.
  • 29. So  you  have  data.  Now  what? •  You have four options for takedown related actions: •  Use the criminal justice system •  Use civil litigation •  Work with providers directly (AUP/ ToS/Contract enforcement) •  Other “less legal” means which we will not discuss here.
  • 30. Criminal  Jus)ce  System •  The ideal result… someone gets arrested. •  Generally, work for big online crime cases starts with private sector research. •  Very time consuming but low cost. •  LE in almost every country willing to work with anyone who can help build cases. •  Yet cooperation between countries can be problematic.
  • 31. Criminal  Jus)ce  System •  Important tool to motivate law enforcement is to enumerate harm. •  Sinkhole domains (if possible) to build victim information. •  Before LE will act they want to know how their citizens are impacted. •  Possible to get cooperation even in “hostile” jurisdictions.
  • 32. Civil  li)ga)on •  Involves an aggrieved party (or regulatory body) going to court for some remedy. •  Generally not available to most people for lack of “standing”. •  Can also lead to some collateral damage.
  • 33. Work  with  providers  directly •  Some are more cooperative than others. •  Many go from uncooperative to cooperative. •  Takes time to build a relationship and trust. •  Bypasses “foreign policy” issues and gets results. •  As example, I’ve gotten cooperation inside Russia and China on security issues.
  • 34. Risk  assessment •  Before any takedown is taken, a “risk assessment” should be done. •  What collateral damage could be done? •  Is action being taken against a third-party and not the target? •  Will less aggressive means accomplish the mission without resorting to heavy-handed tactics?
  • 35. Post-­‐Takedown  ac)vity •  Just because you takedown the C2 network, it doesn’t necessarily mean you have cleaned up infected machines. •  Operative Tovar created a mechanism for people to recover files and to see if they were infected to make private individuals “whole”. •  This is the most neglected part of takedowns.
  • 36. The  Key  to  All  of  This… •  Most threats are too big for one organization to tackle. •  Many organizations have unique data or skillsets. •  Key is to have a group of people across organizations all contributing to a reasonable amount to the goal.
  • 37. The  Key  to  All  of  This… •  Private working groups aren’t exclusive to big companies or security companies. •  Takes willingness to contribute something to get something in return. •  Added benefit is access to information to protect your organization you wouldn’t have otherwise.
  • 38. Venues  to  par)cipate  in  takedown  ac)vity •  Microsoft CME Program •  Private working groups (some are more open than others) •  I run 4.
  • 39. The  Upshot •  There is more work than could possibly be done. •  If you want to contribute effort, find a venue to do so. •  Reverse-engineering •  Tooling •  OSINT research •  Etc. •  Much of the work is not as high-skill as you would think, just takes time, motivation and a willingness to learn.
  • 40. Call  to  Ac)on •  There is more work than could possibly be done. •  If you want to contribute effort, find a venue to do so. •  Reverse-engineering •  Tooling •  OSINT research •  Etc. •  Much of the work is not as high-skill as you would think, just takes time, motivation and a willingness to learn.
  • 41. Bocom  Line “The infosec industry doesn’t need another white paper. What we need is bodies in the streets.”
  • 42. This  is  here  just  because  it  amuses  me