SlideShare ist ein Scribd-Unternehmen logo
1 von 30
1All material confidential and proprietary
Guccifer 2.0, the DNC Hack, and
Fancy Bears, Oh My!
July 26, 2016
2All material confidential and proprietary
• The DNC Breach and the case for Russian attribution
• Additional related Sofacy Infrastructure
• The Guccifer 2.0 persona
• Analytic Resources
• Conclusions
Agenda
3All material confidential and proprietary
From Russia, With Love
The Basics of the DNC Breach and the BEARs
© 2016 ThreatConnect, Inc. All Rights Reserved
4All material confidential and proprietary
15 June
• Washington Post article reports breach,
cites CrowdStrike attribution to Russian
Advanced Persistent Threat (APT) groups
• FANCY BEAR
• COZY BEAR
Separate breaches
• No evidence the two groups knew the other
was there
Guccifer 2.0
• Threat actor calling himself Guccifer 2.0
comes out claiming credit for the breach
The DNC Breach
5All material confidential and proprietary
FANCY BEAR
Background DNC Breach
● AKA Sofacy, APT 28
● Extensive targeting of defense ministries and
military victims
● Suspected GRU, Russia’s primary military
intelligence service
● Implants include Sofacy, X-Agent, X-Tunnel,
WinIDS droppers
● Steals victim credentials by spoofing their web-
based email services
● Linked to intrusions into the German Bundestag
and France’s TV5 Monde
● Breached DNC in April 2016
● X-Agent malware with capabilities to do remote
command execution, file transmission and
keylogging.
● X-Tunnel network tunneling tool
● Both tools deployed via RemCOM, an open-source
replacement for PsExec available from GitHub.
● Anti-forensic measures such as periodic event log
clearing and resetting timestamps of files.
6All material confidential and proprietary
Background DNC Breach
● AKA CozyDuke, APT 29
● Wide ranging target set
● Uses sophisticated RATs w/extensive anti-analysis
techniques
● Broadly targeted spearphish campaigns with links
to a malicious dropper
● Linked to intrusions into unclassified White House,
State Department, and U.S. Joint Chiefs of Staff
networks
● Breached DNC in Summer 2015
● SeaDaddy implant developed in Python and a
Powershell backdoor stored only in WMI database
● Allowed the adversary to launch malicious code
automatically at will, executing in memory
● Powershell version of MimiKatz used to acquire
credentials for lateral movement
COZY BEAR
7All material confidential and proprietary© 2016 ThreatConnect, Inc. All Rights Reserved
Meanwhile,
at ThreatConnect...
8All material confidential and proprietary
● Started looking for other
BEAR infrastructure
● Shared out the CrowdStrike
analysis
9All material confidential and proprietary
Passive DNS on FANCY
BEAR IP:
● misdepatrment[.]com
● Spoofs MIS Department’s
legitimate domain
10All material confidential and proprietary
Legitimate MIS
Department domain:
● Lists DNC as a client
● Spoofed domains a
common tactic
11All material confidential and proprietary
Whois Information:
● Paris France
● @europe.com email
12All material confidential and proprietary
Passive DNS on Spoofed
Domain:
● Previously parked at a
French IP
● IP has hosted other
suspicious domains
13All material confidential and proprietary
The BEAR
Essentials
● Fingerprints of known Russian APT
threat actors identified by
● Additional infrastructure discovered
● Victims consistent with known
targeting focus
14All material confidential and proprietary
Evaluating the Guccifer 2.0 Claims
Could He Be a Third DNC Hacker?
© 2016 ThreatConnect, Inc. All Rights Reserved
15All material confidential and proprietary
The Shiйy ФbjЭkt
Guccifer 2.0
• Emerged shortly after DNC breach is reported
• Borrowed Guccifer name from Marcel Lazăr Lehel
• Jailed Romanian hacker awaiting trial in Virginia
• No affiliation to FANCY/COZY BEAR or Russia
• Romanian
• Self proclaimed as “among the best hackers
in the world”
Claimed responsibility for DNC breach
• “Hacked” the DNC in Summer 2015
• Denounces CrowdStrike’s report and attribution
• Hastily created Twitter and Wordpress accounts
• Published documents after CrowdStrike report
• Opposition research report, donor data, etc.
16All material confidential and proprietary
Guccifer 2.0’s story doesn’t
seem to line up
• Lack of backstory
• Document metadata
• RTF file type
• Russian Author
• Timestamps don’t match
• Timeline
Something Smells Fishy
BEWARE OF
GUCCIFER
PHISHING
17All material confidential and proprietary
Compares:
● Suspicious domain
registration and resolution
dates
● CrowdStrike report date
● Guccifer 2.0 accounts
creation and activity
● Initial release document
metadata
Timeline
18All material confidential and proprietary
Analysis of Competing Hypotheses (ACH)
Hypotheses:
Let’s do an ACH
• Diagnostic analytic technique
• Identification of alternative explanations
for a situation
• Evaluation of evidence pertaining to
those explanations
• Structured Analytic Techniques Primer
Guccifer 2.0 is/is not
an independent actor
Guccifer 2.0 is/is not a
D&D campaign
19All material confidential and proprietary
Hypothesis 1
The case FOR Guccifer as an independent actor
CrowdStrike Report Disrupted
Guccifer 2.0’s Desired Timing
• Seeking significant social
impact
• Procure additional
documents
• Release closer to election
could have greater impact
Low Social Media Profile
Reflects OPSEC
• Minimize openly
available intelligence on
himself
• Went on the offensive
after CrowdStrike report
and created new
accounts
Timestamp Inconsistencies
Aren’t a Big Deal
• Compromised
documents saved to
secure, offline media
• Only immediate access
to altered documents
being used in follow-on
operations
20All material confidential and proprietary
Hypothesis 1
The case AGAINST Guccifer as an independent actor
Questionable Integrity of Leaked Docs
• Why alter the files if looking to
expose “illuminati?”
Guccifer 2.0’s Actions are
Atypical Hacktivist Behaviors
• Typically, hacktivists don’t stay quiet for long
• Politically-motivated hacktivists often quickly
seek publicity
• Could have gotten scooped
We also identified significant inconsistencies ...
21All material confidential and proprietary
Inconsistency – NGP VAN and 0-day Exploits
Claim: Found 0-day in niche, NGP VAN, SaaS platform
• Fuzzing, IDA Pro, WinDbg
Problem: Targeted platform is a multi-tenant cloud solution
• No local binary to fuzz, disassemble, or debug
Claim: Compromised the DNC last summer
• Exploited bug that gave Sanders campaign
unauthorized access to voter information
Problem: Bug did not exist until December 2015
• Only Chuck Norris can exploit a vulnerability for
software that has not yet been written
22All material confidential and proprietary
Inconsistency – Statements and Vernacular
Claim: Romanian
Problem: Doesn’t speak the language or know geography
• More familiar with U.S. politics than Romania
Claim: Finding a 0-day only seems difficult
Problem: Technical experts wouldn’t respond like this
• Instead, SMEs would mention skillsets
Claim: “Trojan like virus” in DNC compromise
Problem: SMEs know the difference between Trojan
and virus
23All material confidential and proprietary
Hypothesis 2
The case FOR Guccifer as a D&D campaign
Precedent and Doctrine
• CyberCaliphate
claims
responsibility for
Russian TV5
Monde hack
• Russian doctrine
on information
operations
Breadcrumbs left for
researchers to find
• Clues purposefully
left behind
• Reference to a
Soviet
revolutionary
Inconsistencies and
Weak Backstory are
Evidence of Haste
• Documents leaked
only after
CrowdStrike
attribution
• Hastily constructed
and
underdeveloped
persona
FANCY BEAR and
Guccifer 2.0 both
Leveraging France-
based parallels
• C2 infrastructure
and Guccifer 2.0’s
Twitter
24All material confidential and proprietary
One Other Thing...The French Connection
Several associations to France
• IP originally hosting misdepatrment[.]com
• Twitter account
Media communications
• French AOL account - guccifer20@aol[.]fr
• Originating French IP - 95.130.54[.]34
Elite VPN
• vpn-service[.]us
• sec.service@mail[.]ru original registrant
• Russian-based VPN with French infrastructure
25All material confidential and proprietary
Hypothesis 2
The case AGAINST Guccifer as a D&D campaign
Why inject so much doubt about the
couments?
• BEARs would have access to the
original, unaltered documents
• Would make a more compelling case
and cause more confusion about
attribution
Actively influencing the American election
changes the cost/benefit analysis
• Leaks from D&D campaign would
change scope of the operation
• Manipulating election risks retaliation
26All material confidential and proprietary
Analysis and Projections
© 2016 ThreatConnect, Inc. All Rights Reserved
27All material confidential and proprietary
ACH
Conclusion
Our ACH identified the most compelling evidence
supporting:
● Guccifer 2.0 IS a part of a D&D campaign
● Guccifer 2.0 IS NOT an independent hacker
Inconsistencies in all of the hypothetical cases:
● Wiggle room for Guccifer 2.0 to explain away his actions
He’s not a time-traveling Chuck Norris hacktivist bent on
reforming the US politics.
He’s more likely a censored platform for Moscow to spin the
media to show their version of the “truth.”
28All material confidential and proprietary
Possible Future Scenarios
Steady State:
Purpose of DNC breach was
espionage; Guccifer 2.0 is a
propaganda sideshow with
very little risk.
• Continuation of
existing behavior (pre-
WikiLeaks disclosure)
Game Changer:
Russia seeks to influence
the U.S. election
• Worst case scenario
• Precedent exists
The Long Game:
Guccifer 2.0 useful for
other operations
• Could be used to release
data from other attacks
• Strategic leaks
29All material confidential and proprietary
ThreatConnect Blogs
www.threatconnect.com/blog
Rebooting Watergate:
• Additional research into the DNC breach and associated infrastructure
Shiny Object:
• Evaluation of hypotheses on Guccifer 2.0’s true identity
The Man, The Myth, The Legend:
• Update to previous Guccifer 2.0 evaluation and projections for the
persona’s future use
All Roads Lead to Russia:
• Review of French infrastructure associated with Guccifer 2.0’s media
communications
What’s in a Name Server:
• Identifies additional suspicious infrastructure based on name servers
30All material confidential and proprietary
THANK YOU!
© 2016 ThreatConnect, Inc. All Rights Reserved
Twitter: @threatconnect
Sign up for a free account:
http://www.threatconnect.com/free
Come see us at Black Hat 2016: booth #148

Weitere ähnliche Inhalte

Was ist angesagt?

AVTokyo 2013.5 - China is a victim, too :-) (English version)
AVTokyo 2013.5 - China is a victim, too :-) (English version)AVTokyo 2013.5 - China is a victim, too :-) (English version)
AVTokyo 2013.5 - China is a victim, too :-) (English version)
Anthony Lai
 
DEFCON 20 (2012) – Tenacious Diggity – 29July2012 – Slides.PDF
DEFCON 20 (2012) – Tenacious Diggity – 29July2012 – Slides.PDFDEFCON 20 (2012) – Tenacious Diggity – 29July2012 – Slides.PDF
DEFCON 20 (2012) – Tenacious Diggity – 29July2012 – Slides.PDF
Bishop Fox
 

Was ist angesagt? (20)

AVTokyo 2013.5 - China is a victim, too :-) (English version)
AVTokyo 2013.5 - China is a victim, too :-) (English version)AVTokyo 2013.5 - China is a victim, too :-) (English version)
AVTokyo 2013.5 - China is a victim, too :-) (English version)
 
THOTCON 0x6: Going Kinetic on Electronic Crime Networks
THOTCON 0x6: Going Kinetic on Electronic Crime NetworksTHOTCON 0x6: Going Kinetic on Electronic Crime Networks
THOTCON 0x6: Going Kinetic on Electronic Crime Networks
 
Thotcon 0x5 - Retroactive Wiretapping VPN over DNS
Thotcon 0x5 - Retroactive Wiretapping VPN over DNSThotcon 0x5 - Retroactive Wiretapping VPN over DNS
Thotcon 0x5 - Retroactive Wiretapping VPN over DNS
 
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkAdvantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
 
Backdoor Dreaming
Backdoor DreamingBackdoor Dreaming
Backdoor Dreaming
 
Lazarus talk tlp white
Lazarus talk   tlp whiteLazarus talk   tlp white
Lazarus talk tlp white
 
The Future of Hacking
The Future of HackingThe Future of Hacking
The Future of Hacking
 
ANALYZE'15 - Bulk Malware Analysis at Scale
ANALYZE'15 - Bulk Malware Analysis at ScaleANALYZE'15 - Bulk Malware Analysis at Scale
ANALYZE'15 - Bulk Malware Analysis at Scale
 
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeHacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
 
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian HilemanAre your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
 
GreyNoise - Lowering Signal To Noise
GreyNoise - Lowering Signal To NoiseGreyNoise - Lowering Signal To Noise
GreyNoise - Lowering Signal To Noise
 
OWASP – Internet of Things (IoT) – Top 10 Vulnerabilities List
OWASP – Internet of Things (IoT) – Top 10 Vulnerabilities ListOWASP – Internet of Things (IoT) – Top 10 Vulnerabilities List
OWASP – Internet of Things (IoT) – Top 10 Vulnerabilities List
 
Ransomware: History, Analysis, & Mitigation
Ransomware: History, Analysis, & MitigationRansomware: History, Analysis, & Mitigation
Ransomware: History, Analysis, & Mitigation
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
 
A Journey Into Deception Based Security
A Journey Into Deception Based SecurityA Journey Into Deception Based Security
A Journey Into Deception Based Security
 
HITCON 2015 - DGAs, DNS and Threat Intelligence
HITCON 2015 - DGAs, DNS and Threat IntelligenceHITCON 2015 - DGAs, DNS and Threat Intelligence
HITCON 2015 - DGAs, DNS and Threat Intelligence
 
DEFCON 20 (2012) – Tenacious Diggity – 29July2012 – Slides.PDF
DEFCON 20 (2012) – Tenacious Diggity – 29July2012 – Slides.PDFDEFCON 20 (2012) – Tenacious Diggity – 29July2012 – Slides.PDF
DEFCON 20 (2012) – Tenacious Diggity – 29July2012 – Slides.PDF
 
Introducing Globaleaks
Introducing GlobaleaksIntroducing Globaleaks
Introducing Globaleaks
 
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
 
Osint presentation nov 2019
Osint presentation nov 2019Osint presentation nov 2019
Osint presentation nov 2019
 

Andere mochten auch

WATER DISTRIBUTION SYSTEM DESIGN REPORT UET LAHORE by envian
WATER DISTRIBUTION SYSTEM DESIGN REPORT UET LAHORE by envianWATER DISTRIBUTION SYSTEM DESIGN REPORT UET LAHORE by envian
WATER DISTRIBUTION SYSTEM DESIGN REPORT UET LAHORE by envian
Muhammad Usman
 
Water Supply - Design Approach And Methodologies
Water  Supply - Design Approach And MethodologiesWater  Supply - Design Approach And Methodologies
Water Supply - Design Approach And Methodologies
Ir. Abdul Aziz Abas
 

Andere mochten auch (10)

The Diamond Model for Intrusion Analysis - Threat Intelligence
The Diamond Model for Intrusion Analysis - Threat IntelligenceThe Diamond Model for Intrusion Analysis - Threat Intelligence
The Diamond Model for Intrusion Analysis - Threat Intelligence
 
Startup dans les nuages - breizhcamp 2015
Startup dans les nuages - breizhcamp 2015Startup dans les nuages - breizhcamp 2015
Startup dans les nuages - breizhcamp 2015
 
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...
 
Open Source Malware Lab
Open Source Malware LabOpen Source Malware Lab
Open Source Malware Lab
 
WATER DISTRIBUTION SYSTEM DESIGN REPORT UET LAHORE by envian
WATER DISTRIBUTION SYSTEM DESIGN REPORT UET LAHORE by envianWATER DISTRIBUTION SYSTEM DESIGN REPORT UET LAHORE by envian
WATER DISTRIBUTION SYSTEM DESIGN REPORT UET LAHORE by envian
 
Water distribution system design report
Water distribution system design reportWater distribution system design report
Water distribution system design report
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
WATER SUPPLY SYSTEM
WATER SUPPLY SYSTEM WATER SUPPLY SYSTEM
WATER SUPPLY SYSTEM
 
Water Supply - Design Approach And Methodologies
Water  Supply - Design Approach And MethodologiesWater  Supply - Design Approach And Methodologies
Water Supply - Design Approach And Methodologies
 
Sanitary and water supply
Sanitary and water supplySanitary and water supply
Sanitary and water supply
 

Ähnlich wie Guccifer 2.0 the DNC Hack, and Fancy Bears, Oh My!

San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
Pw Carey
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
CODE BLUE
 
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
Lior Rotkovitch
 

Ähnlich wie Guccifer 2.0 the DNC Hack, and Fancy Bears, Oh My! (20)

Viktor Zhora - Cyber and Geopolitics: Ukrainian factor
Viktor Zhora - Cyber and Geopolitics: Ukrainian factorViktor Zhora - Cyber and Geopolitics: Ukrainian factor
Viktor Zhora - Cyber and Geopolitics: Ukrainian factor
 
https://uii.io/Oneconflict
https://uii.io/Oneconflicthttps://uii.io/Oneconflict
https://uii.io/Oneconflict
 
G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...
G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...
G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...
 
Open Web Data Feeds for Cybersecurity & Homeland Security Intelligence
Open Web Data Feeds for Cybersecurity & Homeland Security IntelligenceOpen Web Data Feeds for Cybersecurity & Homeland Security Intelligence
Open Web Data Feeds for Cybersecurity & Homeland Security Intelligence
 
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
 
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
 
2017 Phshing Trends and Intelligence Report: Ransomware Explosion
2017 Phshing Trends and Intelligence Report: Ransomware Explosion2017 Phshing Trends and Intelligence Report: Ransomware Explosion
2017 Phshing Trends and Intelligence Report: Ransomware Explosion
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
 
Bear Hunting: History and Attribution of Russian Intelligence Operations
Bear Hunting: History and Attribution of Russian Intelligence OperationsBear Hunting: History and Attribution of Russian Intelligence Operations
Bear Hunting: History and Attribution of Russian Intelligence Operations
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
dark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdfdark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdf
 
2016 us election cyber attack
2016 us election cyber attack2016 us election cyber attack
2016 us election cyber attack
 
SANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesSANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political Breaches
 
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
 
Most notable apt_ attacks_of_2015_and_2016 predictions
Most notable apt_ attacks_of_2015_and_2016 predictionsMost notable apt_ attacks_of_2015_and_2016 predictions
Most notable apt_ attacks_of_2015_and_2016 predictions
 
Preventing Abuse on Facebook During the 2018 US Midterm Elections, Facebook's...
Preventing Abuse on Facebook During the 2018 US Midterm Elections, Facebook's...Preventing Abuse on Facebook During the 2018 US Midterm Elections, Facebook's...
Preventing Abuse on Facebook During the 2018 US Midterm Elections, Facebook's...
 
Quant & Crypto Gold
Quant & Crypto GoldQuant & Crypto Gold
Quant & Crypto Gold
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
 
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
 

Mehr von ThreatConnect

Advanced Threat Hunting - BotConf 2017
Advanced Threat Hunting - BotConf 2017Advanced Threat Hunting - BotConf 2017
Advanced Threat Hunting - BotConf 2017
ThreatConnect
 
Dollars and Sense of Sharing Threat Intelligence
Dollars and Sense of Sharing Threat IntelligenceDollars and Sense of Sharing Threat Intelligence
Dollars and Sense of Sharing Threat Intelligence
ThreatConnect
 

Mehr von ThreatConnect (11)

Advanced Threat Hunting - BotConf 2017
Advanced Threat Hunting - BotConf 2017Advanced Threat Hunting - BotConf 2017
Advanced Threat Hunting - BotConf 2017
 
Save Time and Act Faster with Playbooks
Save Time and Act Faster with PlaybooksSave Time and Act Faster with Playbooks
Save Time and Act Faster with Playbooks
 
Intelligence driven defense webinar
Intelligence driven defense webinarIntelligence driven defense webinar
Intelligence driven defense webinar
 
Managing Indicator Deprecation in ThreatConnect
Managing Indicator Deprecation in ThreatConnectManaging Indicator Deprecation in ThreatConnect
Managing Indicator Deprecation in ThreatConnect
 
Operationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent ActorsOperationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent Actors
 
Threat Intelligence is a Journey; Not a Destination
Threat Intelligence is a Journey; Not a DestinationThreat Intelligence is a Journey; Not a Destination
Threat Intelligence is a Journey; Not a Destination
 
Episode IV: A New Scope
Episode IV: A New ScopeEpisode IV: A New Scope
Episode IV: A New Scope
 
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
 
Maltego Webinar Slides
Maltego Webinar SlidesMaltego Webinar Slides
Maltego Webinar Slides
 
The Business Benefits of Threat Intelligence Webinar
The Business Benefits of Threat Intelligence WebinarThe Business Benefits of Threat Intelligence Webinar
The Business Benefits of Threat Intelligence Webinar
 
Dollars and Sense of Sharing Threat Intelligence
Dollars and Sense of Sharing Threat IntelligenceDollars and Sense of Sharing Threat Intelligence
Dollars and Sense of Sharing Threat Intelligence
 

Kürzlich hochgeladen

The 100x Factor Growth with AI - Susan Diaz
The 100x Factor  Growth with AI - Susan DiazThe 100x Factor  Growth with AI - Susan Diaz
Riding the Wave of AI Disruption - Navigating the AI Fear Cycle in Marketing ...
Riding the Wave of AI Disruption - Navigating the AI Fear Cycle in Marketing ...Riding the Wave of AI Disruption - Navigating the AI Fear Cycle in Marketing ...
Riding the Wave of AI Disruption - Navigating the AI Fear Cycle in Marketing ...
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 

Kürzlich hochgeladen (20)

Unraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptxUnraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptx
 
Major SEO Trends in 2024 - Banyanbrain Digital
Major SEO Trends in 2024 - Banyanbrain DigitalMajor SEO Trends in 2024 - Banyanbrain Digital
Major SEO Trends in 2024 - Banyanbrain Digital
 
Google 3rd-Party Cookie Deprecation [Update] + 5 Best Strategies
Google 3rd-Party Cookie Deprecation [Update] + 5 Best StrategiesGoogle 3rd-Party Cookie Deprecation [Update] + 5 Best Strategies
Google 3rd-Party Cookie Deprecation [Update] + 5 Best Strategies
 
Unraveling the Mystery of the Hinterkaifeck Murders.pptx
Unraveling the Mystery of the Hinterkaifeck Murders.pptxUnraveling the Mystery of the Hinterkaifeck Murders.pptx
Unraveling the Mystery of the Hinterkaifeck Murders.pptx
 
W.H.Bender Quote 61 -Influential restaurant and food service industry network...
W.H.Bender Quote 61 -Influential restaurant and food service industry network...W.H.Bender Quote 61 -Influential restaurant and food service industry network...
W.H.Bender Quote 61 -Influential restaurant and food service industry network...
 
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
 
The Future of Brands on LinkedIn - Alison Kaltman
The Future of Brands on LinkedIn - Alison KaltmanThe Future of Brands on LinkedIn - Alison Kaltman
The Future of Brands on LinkedIn - Alison Kaltman
 
The Science of Landing Page Messaging.pdf
The Science of Landing Page Messaging.pdfThe Science of Landing Page Messaging.pdf
The Science of Landing Page Messaging.pdf
 
Unlocking the Mystery of the Voynich Manuscript
Unlocking the Mystery of the Voynich ManuscriptUnlocking the Mystery of the Voynich Manuscript
Unlocking the Mystery of the Voynich Manuscript
 
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort Service
 
Kraft Mac and Cheese campaign presentation
Kraft Mac and Cheese campaign presentationKraft Mac and Cheese campaign presentation
Kraft Mac and Cheese campaign presentation
 
The 100x Factor Growth with AI - Susan Diaz
The 100x Factor  Growth with AI - Susan DiazThe 100x Factor  Growth with AI - Susan Diaz
The 100x Factor Growth with AI - Susan Diaz
 
Digital Strategy Master Class - Andrew Rupert
Digital Strategy Master Class - Andrew RupertDigital Strategy Master Class - Andrew Rupert
Digital Strategy Master Class - Andrew Rupert
 
Cash payment girl 9257726604 Hand ✋ to Hand over girl
Cash payment girl 9257726604 Hand ✋ to Hand over girlCash payment girl 9257726604 Hand ✋ to Hand over girl
Cash payment girl 9257726604 Hand ✋ to Hand over girl
 
Brand Strategy Master Class - Juntae DeLane
Brand Strategy Master Class - Juntae DeLaneBrand Strategy Master Class - Juntae DeLane
Brand Strategy Master Class - Juntae DeLane
 
How to Create a Social Media Plan Like a Pro - Jordan Scheltgen
How to Create a Social Media Plan Like a Pro - Jordan ScheltgenHow to Create a Social Media Plan Like a Pro - Jordan Scheltgen
How to Create a Social Media Plan Like a Pro - Jordan Scheltgen
 
Social media, ppt. Features, characteristics
Social media, ppt. Features, characteristicsSocial media, ppt. Features, characteristics
Social media, ppt. Features, characteristics
 
Instant Digital Issuance: An Overview With Critical First Touch Best Practices
Instant Digital Issuance: An Overview With Critical First Touch Best PracticesInstant Digital Issuance: An Overview With Critical First Touch Best Practices
Instant Digital Issuance: An Overview With Critical First Touch Best Practices
 
Riding the Wave of AI Disruption - Navigating the AI Fear Cycle in Marketing ...
Riding the Wave of AI Disruption - Navigating the AI Fear Cycle in Marketing ...Riding the Wave of AI Disruption - Navigating the AI Fear Cycle in Marketing ...
Riding the Wave of AI Disruption - Navigating the AI Fear Cycle in Marketing ...
 
BDSM⚡Call Girls in Sector 144 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 144 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 144 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 144 Noida Escorts >༒8448380779 Escort Service
 

Guccifer 2.0 the DNC Hack, and Fancy Bears, Oh My!

  • 1. 1All material confidential and proprietary Guccifer 2.0, the DNC Hack, and Fancy Bears, Oh My! July 26, 2016
  • 2. 2All material confidential and proprietary • The DNC Breach and the case for Russian attribution • Additional related Sofacy Infrastructure • The Guccifer 2.0 persona • Analytic Resources • Conclusions Agenda
  • 3. 3All material confidential and proprietary From Russia, With Love The Basics of the DNC Breach and the BEARs © 2016 ThreatConnect, Inc. All Rights Reserved
  • 4. 4All material confidential and proprietary 15 June • Washington Post article reports breach, cites CrowdStrike attribution to Russian Advanced Persistent Threat (APT) groups • FANCY BEAR • COZY BEAR Separate breaches • No evidence the two groups knew the other was there Guccifer 2.0 • Threat actor calling himself Guccifer 2.0 comes out claiming credit for the breach The DNC Breach
  • 5. 5All material confidential and proprietary FANCY BEAR Background DNC Breach ● AKA Sofacy, APT 28 ● Extensive targeting of defense ministries and military victims ● Suspected GRU, Russia’s primary military intelligence service ● Implants include Sofacy, X-Agent, X-Tunnel, WinIDS droppers ● Steals victim credentials by spoofing their web- based email services ● Linked to intrusions into the German Bundestag and France’s TV5 Monde ● Breached DNC in April 2016 ● X-Agent malware with capabilities to do remote command execution, file transmission and keylogging. ● X-Tunnel network tunneling tool ● Both tools deployed via RemCOM, an open-source replacement for PsExec available from GitHub. ● Anti-forensic measures such as periodic event log clearing and resetting timestamps of files.
  • 6. 6All material confidential and proprietary Background DNC Breach ● AKA CozyDuke, APT 29 ● Wide ranging target set ● Uses sophisticated RATs w/extensive anti-analysis techniques ● Broadly targeted spearphish campaigns with links to a malicious dropper ● Linked to intrusions into unclassified White House, State Department, and U.S. Joint Chiefs of Staff networks ● Breached DNC in Summer 2015 ● SeaDaddy implant developed in Python and a Powershell backdoor stored only in WMI database ● Allowed the adversary to launch malicious code automatically at will, executing in memory ● Powershell version of MimiKatz used to acquire credentials for lateral movement COZY BEAR
  • 7. 7All material confidential and proprietary© 2016 ThreatConnect, Inc. All Rights Reserved Meanwhile, at ThreatConnect...
  • 8. 8All material confidential and proprietary ● Started looking for other BEAR infrastructure ● Shared out the CrowdStrike analysis
  • 9. 9All material confidential and proprietary Passive DNS on FANCY BEAR IP: ● misdepatrment[.]com ● Spoofs MIS Department’s legitimate domain
  • 10. 10All material confidential and proprietary Legitimate MIS Department domain: ● Lists DNC as a client ● Spoofed domains a common tactic
  • 11. 11All material confidential and proprietary Whois Information: ● Paris France ● @europe.com email
  • 12. 12All material confidential and proprietary Passive DNS on Spoofed Domain: ● Previously parked at a French IP ● IP has hosted other suspicious domains
  • 13. 13All material confidential and proprietary The BEAR Essentials ● Fingerprints of known Russian APT threat actors identified by ● Additional infrastructure discovered ● Victims consistent with known targeting focus
  • 14. 14All material confidential and proprietary Evaluating the Guccifer 2.0 Claims Could He Be a Third DNC Hacker? © 2016 ThreatConnect, Inc. All Rights Reserved
  • 15. 15All material confidential and proprietary The Shiйy ФbjЭkt Guccifer 2.0 • Emerged shortly after DNC breach is reported • Borrowed Guccifer name from Marcel Lazăr Lehel • Jailed Romanian hacker awaiting trial in Virginia • No affiliation to FANCY/COZY BEAR or Russia • Romanian • Self proclaimed as “among the best hackers in the world” Claimed responsibility for DNC breach • “Hacked” the DNC in Summer 2015 • Denounces CrowdStrike’s report and attribution • Hastily created Twitter and Wordpress accounts • Published documents after CrowdStrike report • Opposition research report, donor data, etc.
  • 16. 16All material confidential and proprietary Guccifer 2.0’s story doesn’t seem to line up • Lack of backstory • Document metadata • RTF file type • Russian Author • Timestamps don’t match • Timeline Something Smells Fishy BEWARE OF GUCCIFER PHISHING
  • 17. 17All material confidential and proprietary Compares: ● Suspicious domain registration and resolution dates ● CrowdStrike report date ● Guccifer 2.0 accounts creation and activity ● Initial release document metadata Timeline
  • 18. 18All material confidential and proprietary Analysis of Competing Hypotheses (ACH) Hypotheses: Let’s do an ACH • Diagnostic analytic technique • Identification of alternative explanations for a situation • Evaluation of evidence pertaining to those explanations • Structured Analytic Techniques Primer Guccifer 2.0 is/is not an independent actor Guccifer 2.0 is/is not a D&D campaign
  • 19. 19All material confidential and proprietary Hypothesis 1 The case FOR Guccifer as an independent actor CrowdStrike Report Disrupted Guccifer 2.0’s Desired Timing • Seeking significant social impact • Procure additional documents • Release closer to election could have greater impact Low Social Media Profile Reflects OPSEC • Minimize openly available intelligence on himself • Went on the offensive after CrowdStrike report and created new accounts Timestamp Inconsistencies Aren’t a Big Deal • Compromised documents saved to secure, offline media • Only immediate access to altered documents being used in follow-on operations
  • 20. 20All material confidential and proprietary Hypothesis 1 The case AGAINST Guccifer as an independent actor Questionable Integrity of Leaked Docs • Why alter the files if looking to expose “illuminati?” Guccifer 2.0’s Actions are Atypical Hacktivist Behaviors • Typically, hacktivists don’t stay quiet for long • Politically-motivated hacktivists often quickly seek publicity • Could have gotten scooped We also identified significant inconsistencies ...
  • 21. 21All material confidential and proprietary Inconsistency – NGP VAN and 0-day Exploits Claim: Found 0-day in niche, NGP VAN, SaaS platform • Fuzzing, IDA Pro, WinDbg Problem: Targeted platform is a multi-tenant cloud solution • No local binary to fuzz, disassemble, or debug Claim: Compromised the DNC last summer • Exploited bug that gave Sanders campaign unauthorized access to voter information Problem: Bug did not exist until December 2015 • Only Chuck Norris can exploit a vulnerability for software that has not yet been written
  • 22. 22All material confidential and proprietary Inconsistency – Statements and Vernacular Claim: Romanian Problem: Doesn’t speak the language or know geography • More familiar with U.S. politics than Romania Claim: Finding a 0-day only seems difficult Problem: Technical experts wouldn’t respond like this • Instead, SMEs would mention skillsets Claim: “Trojan like virus” in DNC compromise Problem: SMEs know the difference between Trojan and virus
  • 23. 23All material confidential and proprietary Hypothesis 2 The case FOR Guccifer as a D&D campaign Precedent and Doctrine • CyberCaliphate claims responsibility for Russian TV5 Monde hack • Russian doctrine on information operations Breadcrumbs left for researchers to find • Clues purposefully left behind • Reference to a Soviet revolutionary Inconsistencies and Weak Backstory are Evidence of Haste • Documents leaked only after CrowdStrike attribution • Hastily constructed and underdeveloped persona FANCY BEAR and Guccifer 2.0 both Leveraging France- based parallels • C2 infrastructure and Guccifer 2.0’s Twitter
  • 24. 24All material confidential and proprietary One Other Thing...The French Connection Several associations to France • IP originally hosting misdepatrment[.]com • Twitter account Media communications • French AOL account - guccifer20@aol[.]fr • Originating French IP - 95.130.54[.]34 Elite VPN • vpn-service[.]us • sec.service@mail[.]ru original registrant • Russian-based VPN with French infrastructure
  • 25. 25All material confidential and proprietary Hypothesis 2 The case AGAINST Guccifer as a D&D campaign Why inject so much doubt about the couments? • BEARs would have access to the original, unaltered documents • Would make a more compelling case and cause more confusion about attribution Actively influencing the American election changes the cost/benefit analysis • Leaks from D&D campaign would change scope of the operation • Manipulating election risks retaliation
  • 26. 26All material confidential and proprietary Analysis and Projections © 2016 ThreatConnect, Inc. All Rights Reserved
  • 27. 27All material confidential and proprietary ACH Conclusion Our ACH identified the most compelling evidence supporting: ● Guccifer 2.0 IS a part of a D&D campaign ● Guccifer 2.0 IS NOT an independent hacker Inconsistencies in all of the hypothetical cases: ● Wiggle room for Guccifer 2.0 to explain away his actions He’s not a time-traveling Chuck Norris hacktivist bent on reforming the US politics. He’s more likely a censored platform for Moscow to spin the media to show their version of the “truth.”
  • 28. 28All material confidential and proprietary Possible Future Scenarios Steady State: Purpose of DNC breach was espionage; Guccifer 2.0 is a propaganda sideshow with very little risk. • Continuation of existing behavior (pre- WikiLeaks disclosure) Game Changer: Russia seeks to influence the U.S. election • Worst case scenario • Precedent exists The Long Game: Guccifer 2.0 useful for other operations • Could be used to release data from other attacks • Strategic leaks
  • 29. 29All material confidential and proprietary ThreatConnect Blogs www.threatconnect.com/blog Rebooting Watergate: • Additional research into the DNC breach and associated infrastructure Shiny Object: • Evaluation of hypotheses on Guccifer 2.0’s true identity The Man, The Myth, The Legend: • Update to previous Guccifer 2.0 evaluation and projections for the persona’s future use All Roads Lead to Russia: • Review of French infrastructure associated with Guccifer 2.0’s media communications What’s in a Name Server: • Identifies additional suspicious infrastructure based on name servers
  • 30. 30All material confidential and proprietary THANK YOU! © 2016 ThreatConnect, Inc. All Rights Reserved Twitter: @threatconnect Sign up for a free account: http://www.threatconnect.com/free Come see us at Black Hat 2016: booth #148