0% found this document useful (0 votes)
58 views23 pages

Advanced Persistent Threats

Advanced Persistent Threats (APTs) are continuous, targeted, and stealthy cyber attacks. They use creative techniques and inventions to evade detection unlike ordinary malware. APTs target specific organizations and individuals. They have long lifecycles that involve continuous adaptation. Examples of notorious APTs discussed include Stuxnet, Flame, Regin, Duqu, and the Sony attack. Stuxnet spread using 4 zero-day exploits to target industrial systems, while Flame was a large, modular malware that stole data across Asia. Regin had many infection vectors and customized modules to target various industries. Duqu exploited fonts to remain undetected and used disposable command and control servers. The Sony attack

Uploaded by

drhollywood2001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views23 pages

Advanced Persistent Threats

Advanced Persistent Threats (APTs) are continuous, targeted, and stealthy cyber attacks. They use creative techniques and inventions to evade detection unlike ordinary malware. APTs target specific organizations and individuals. They have long lifecycles that involve continuous adaptation. Examples of notorious APTs discussed include Stuxnet, Flame, Regin, Duqu, and the Sony attack. Stuxnet spread using 4 zero-day exploits to target industrial systems, while Flame was a large, modular malware that stole data across Asia. Regin had many infection vectors and customized modules to target various industries. Duqu exploited fonts to remain undetected and used disposable command and control servers. The Sony attack

Uploaded by

drhollywood2001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

Advanced Persistent Threats

Brace your selves! Winter is coming


Hossein Ghannad
Mohammad Rasoul Safarkhani
Mehran Fallah
What is it?
Continuous and chained
Creative uses and inventions
Not like ordinary malwares
Targeted
Stealthy
Targets
Targets
Wait !
To name a few
A Simple Sample !
The PiuPiu oversharing site allows users to create PiuPiu accounts
and post 140-character messages. The federal government wants
PiuPiu to surveil user activity on the site, by archiving any posts that
match certain patterns outlined in a national security letter. Subject
to the nondisclosure constraints of the letter, PiuPiu may not inform
anyone of the surveillance request.
Data Structure
Goal
Write code to scan incoming Pius before they are posted, to see if
they match any patterns requested in a national security letter
The current system has a function called int preprocess( piu * entry
), to determine if a Piu is suitable for display, or to alter it if
necessary; before it returns, it will call a function the programmer
will write called void surveil( piu * entry ).
Goal (cntd)
a surveillance request is an array of N user-Piu patterns.
If the input Piu matches one of these patterns, archive (fwrite) the
Piu to the FILE handle
The Good (Or Evil?) Part
Write surveil() in such a way that the act of surveillance is subtly
leaked to the user or to the outside world in such a way that an
informed outsider can tell if someone is being archived.
Codes

uses *m += 1 in place of m += 1 or *m++

assigns p->piu_length if the user record matched a surveillance request


The Winner!
APT Lifecycle
Case Studies
The Infamous Stuxnet
Flame
Reign
Duqu
Sony Attack
Facts : StuxNet
Activity Start : 2009 , Discovered : 2012
Can inject code into PLC.
Spreads by using USB & 4 different 0-day exploits.
Updated it self across the LAN.
Manages to remain hidden by mutating itself.
58.85% rate of critical infrastructure infection.
Used a hardcoded
Manipulated sensor reports.
Facts : Flame
Very Huge, Over 20 MB in size, 23 modules.
So many variants.
Records audio, logs keys, takes screenshots, attacks Bluetooth
devices.
80 C&C servers across Asia.
1000-5000 Infected machines
Facts : Regin
Many spread vectors. USB Devices, Browser Exploits etc
Multi Target. ISP, Telecom.s, Energy, research, airliners, hospitality
etc
Five stages of attacks
Self mutating, customizable modules.
Distributed .
Facts : DUQU
12 completely different variants.
Sophisticated cover tracking mechanisms.
Exploited a font. ( Dexter Regular)
Stayed silent until you walked away ! (Thats my boy ;) )
Used disposable C&C .
P2P Architecture. ( Thats innovative!)
Facts : Sony
Malware Unknown. Possibly committed suicide.
Wiped all the data after doing its job.
Heavily manipulated monitoring systems.
Not convinced?
Heres More
Thanks for attending.

Q&A

You might also like