CSIS News: Who are the victims of phishing?

Multiple times, a specific gang of criminals has targeted Denmark with a phishing campaign aimed at NemID users. NemID is the official log-in solution for Danish Internet banks, government websites and some other private companies (http://en.wikipedia.org/wiki/NemID).

The campaigns have tried to lure people into giving away their usernames and passwords and also their NemID one-time-password cards working as a form of two factor authentication. We have warned about this several times:

•    https://www.csis.dk/da/csis/blog/4245/
•    https://www.csis.dk/da/csis/blog/4237/

In the second article we even used pictures to document that people actually upload their OTP to the criminals.

We have been monitoring these campaigns and as a result we have obtained a lot of information including data which can be used to identify the victims.
Below, there is a picture that illustrates who jumps at the bait based on age and gender.


We are working closely with law enforcement to arrest the criminals behind these attacks. Apart from that, we are shooting down the compromised webservers abused in these phishing campaigns.

So far we have observed five campaigns. The estimated number of spam mails coming out of the “botnet” (likely rented) is approximately 250.000 per campaign. Despite the fact that only 117 people have fallen victims to the scam so far, it still seems to be a very profitable business for the criminals behind the campaigns.

Interestingly, primarily males between the age of 65 and 74 have provided the criminals with both their usernames and passwords and a photo of their NemID OTP’s. In fact, mostly males fall victim to these campaigns and, as the statistics have taught us, it’s primarily older people passing on sensitive data to the bad guys.

We are trying to prevent further losses by blocking access to the phishing websites with the Heimdal Security Agent. Check out the website of Heimdal Security here:
https://heimdalsecurity.com/

Continue reading CSIS News: Who are the victims of phishing?

CSIS News: Increase in ZeuSP2P targets

Due to its data stealing capabilities, ZeuS P2P (aka Gameover) is a prevalent and serious threat towards both online banking services, companies and ordinary end-users .

Most people have already heard of ZeuS P2P, but in short, it is an improved and complex code based on the ZeuS/Zbot source code that was leaked in 2011: https://www.csis.dk/en/csis/blog/3229/

ZeuS P2P is a black-market Crime as a Service setup (CaaS). It hosts several unique campaigns/BOTids in a bullet proof hosting (BP) infrastructure and provides a full featured multiservice for organized and hardcore cybercriminals.

Upatre
The dropper identified as “Upatre” is often seen attached in spam mail campaigns and acts basically as the door opener which downloads the ZeuS P2P main component using various filenames to camouflage the hostile action and also implements SSL to encrypt the download traffic. This approach is used to effectively bypass most perimeter defenses.

Resilient: rootkit, P2P, DGA, BP hosting
The malware itself consists of several components and advanced features. Obvious ZeuS P2P rely on Peer to Peer, a DGA (Domain Generating Algorithm) and other fallback functions, which makes it both more resilient and less transparent.

The masterminds behind the ZeuS P2P CaaS have clearly obtained technical knowledge and experience in takedowns and have made this botnet much more robust and stabile as compared to other threats we are monitoring. ZeuS P2P supports both UDP and TCP for communication tasks including peer list exchange, Command & Control (C&C) server registration and malware updates.

To make ZeuS P2P harder to remove from a compromised host, it recently implemented a rootkit dropped with a random filename into kernel user land: [%windows system folder%]drivers. This rootkit is known as Necurs.

The ZeuS based webinjects
The malware also includes a basic ZeuS webinject template, but each customer in the ZeuS P2P CaaS can modify and add new advanced webinjects and increase the number of targets.

Below, there is an overview of unique webinjects used by ZeuS P2P in Q1 2014.

Analyzing the above stats, it becomes obvious that the different perpetrators utilizing ZeuS P2P as a digital data harvesting weapon, are not surprisingly still maintaining, developing and improving their webinjects to hit a broader range of victims and targets. From 1097 unique “brands” targeted in the beginning of 2013 has now expanded to 1515 by the end of Marts 2014. That’s an increase in 418 new targets in just a quarter!

Amongst the “new countries” being significantly targeted by this malware family we are seeing: South Africa, Nigeria, India, Singapore, Turkey, UAE, Saudi Arabia, Australia, Croatia, Greece,  but in general we are seeing brands from all over the world being attacked.

We have noted significant geographically wider spread targets, which means different gangs of ZeuS P2P have begun attacking targets in countries that have previously not been hit as hard as they are as a result of this. As a direct consequence, the new targets will need to improve their security to prevent losses related to the ongoing attacks coming out of the ZeuS P2P CaaS.

We estimate that the complete infrastructure of ZeuS P2P has infected and controls several million unique PCs across the globe.

Continue reading CSIS News: Increase in ZeuSP2P targets

CSIS Blog: Personal data leakage check platform

Data security has been the focus of many, both in the wake of the much-publicized “Heartbleed” error but also of the intense attention that the “Se&Hør” scandal has received in the media and the general subsequent concern about data leakage. We have now released a tool where you can check if data, according to our database, has been leaked to others.


In connection with the ever-ongoing and extensive Heartbleed hole (CVE-2014-0160), Heimdal Security now releases a proprietary tool that makes it possible for all to check if their user information and passwords are available to hackers.

In this connection CTO and security expert Jan Kaastrup from CSIS Security Group says:
“In connection with the Heartbleed security weakness millions of users’ data has been leaked and it has unfortunately been alarming easy for hackers to get access to this data. We therefore found it necessary to be able to offer a service which can check if your personal data has been leaked. We have been working at full stretch to get this service ready ever since.”

The DataLEAK tool from Heimdal Security checks large amounts of data collected in connection with detection of IT crime. The only thing that is required to gain access to the service is that the user enters his e-mail address in a form. A full report/result is then sent to the recipient and this report/result gives a current-day image whether data may have been be leaked or collected by malicious hackers.

In this connection Heimdal Security and CSIS still encourage users to change the passwords they use on the Internet.

Until July 31, 2014 the tool is free for everyone to use whereafter only the company’s customers will have access to the service.

Further information and access to our on-line DataLEAK tool can be found on the address:
https://heimdalsecurity.com/en/heartbleed-new-user

Continue reading CSIS Blog: Personal data leakage check platform

CSIS Blog: ZeuS campaign camouflaged as RTF

CSIS has observed and analyzed several spam emails sent in ”targeted spam campaigns” where the attached file either is an RTF or an RTF packed in a zip archive.

RTF means Rich Text Format and is used in connection with word processing. Most Windows installations with Microsoft Office will as default open RTF documents in Microsoft Word and this is where the risk is introduced. When opening the attached rtf file, the attacker will use social engineering and tempt the victim to double-click on an embedded OLE object inside the document. If the victim double-clicks the object a CPL file will be served. No exploits have been observed in these attacks. It sorely relies on social engineeing.


CPL files are system files primarily connected with Windows Control Panel Extension but can be used for running arbitrary commands and this is exactly the process this gang is using.

If the user ignores several warnings and despite opens the CPL file it will make a HTTP GET against a download server where it will fetch and run a binary file.

This binary file is an information thief in the ZeuS class but it has been significantly improved and contains several new qualities that a.o. open in-session webinjects and MiTM (Man in the Middle) attacks. This is a.o. done by installing a CA root certificate and at the same time modifying local DNS settings. Several rogue DNS servers have been identified.

Changing the DNS also avoids the infected host to connect to several domains related to antivirus vendors, software and support portals and security companies (small snippet):

avg.com
softonic.com
domaintools.com
siteadvisor.com
staples.com
avast.com
norton.com
mcafee.com
avira.com
comodo.com
eset.com
malwarebytes.org
virustotal.com
bitdefender.com
trendmicro.com
majorgeeks.com
lavasoft.com
mcafeesecure.com
spamcop.net
sophos.com

[…]

The code is protected using a Visual Basic (VB) cryptor on top of the win32PE. This protects the underlying code from antivirus detection but which at the same time makes static and dynamic analysis more troublesome.

The VB-cryptor being used can be linked to at least two groups of IT criminals making systematic and targeted attacks on homebanking systems across Europe. The cryptor can be recognized by various “compile” remnants that a.o. reveal the following: “bubu.vbp”.

We have dubbed this ZeuS/Citadel variant ”Zalabu” (internal naming). Microsoft have named it “Retefe”. It is to be considered as a serious threat. It harvests data, can spam emails from the infected machine to a list of friends harvested on the local machine, and at the same time it can perform real-time MiTM attacks against various online services.

Another interesting observation is the fact that the code also tries to disable Microsoft Anti-malware protection.

The campaigns are geographically targeted and are distributed in several languages.

We have blocked several domains in CSIS Secure DNS whereby also Heimdal PRO and corporate customers are protected against data leakage and remote control of compromised machines.

Microsoft has also done a write-up on this campaign/malware with some additional details:
http://blogs.technet.com/b/mmpc/archive/2014/02/27/a-close-look-at-a-targeted-attack-delivery.aspx

Continue reading CSIS Blog: ZeuS campaign camouflaged as RTF

CSIS Blog: New day-same spam: ZeuS P2P

This morning a spam campaign has hit a lot of random e-mail adresses proporting to be from Staples. The spam mail carries an attachment:

Order_8029079.zip -> File: Order.exe
MD5:  84a6030c8265b33c3c4e68d29975bd76

Screendump of spammail below:


If the attached zip file is executed it will drop its payload to root as C:Order.exe, then delete the file and move it to windows temporary folder as “codecupdater.exe” which then in turn also drops “dotoo.exe”. Next up the malware checks the HOSTS file and conduct a series of anti- debugging and sandbox checks.

As always the code injects itself into several legit processes.

The malware calls back and downloads additional malware from: poragdas.com (182.18.143.140). This domain should be blocked at gateway level and is already blocked in CSIS Secure DNS.

This downloader (UPatre) receives 4 / 50 on Virustotal.com:
https://www.virustotal.com/en/file/7ff43c5448b8edf9f0f373e56709a24719f0a972b381accf76a0f1fa0c324542/analysis/

Continue reading CSIS Blog: New day-same spam: ZeuS P2P

CSIS News: 10 security challenges in 2014

To look deeply into the crystal ball to predict a threat landscape which changes dynamically and at great speed is not a task to be taken lightly. Nevertheless, we have in the CSIS e-Crime Unit tried to bring together the trends and tendencies, which we believe will create IT security headlines and challenges in 2014.

1» Data Leaks

With the digital development and not at least the digitization of paperwork, the big-data phenomenon will result in more and larger data leaks than we have seen so far. This combined with the fact that we over the last 2 years have observed an increase of infected machines in Denmark.

An increase in data leaks is a natural consequence of the fact that digitalization has been carried out at a speed, where IT security aspects have not been adequately assessed and therefore have not been implemented properly. We expect data leaks – also in Denmark – and with a tightening of rules from the European Union, the 2014 may cost Danish companies and public authorities dear.

2» Drive-by attacks and patch management

The technique where the IT criminal misuse vulnerabilities in popular software packages will continue. Requirements will be made that companies and authorities implement solid patch-management solutions.

That patch management is important, and that drive-by attack is a real risk of any enterprise is unequivocally shown in ENISA’s publication “ENISA Threat Landscape 2013 – Overview of current and emerging cyber-threats” which can be downloaded from the address:
https://www.enisa.europa.eu/activities/risk-management/evolving-threat-environment/enisa-threat-landscape-2013-overview-of-current-and-emerging-cyber-threats

3» DDoS and digital demonstrations

We have already seen how so-called commercial DDoS mitigation services (Distributed denial of service, also known as booters) has given rise to concerns during the past year. Services, where ordinary people can buy into at moderate cost and drive political or strategic objectives to their knees.

Demonstrations in the form of DDoS attacks and random web page defacements will continue to affect private enterprises and public institutions.

4» Attacks on mobile devices

We have heard it from the security industry before and frequently, but we believe that exploits and malware targeted at mobile devices, including operating systems such as Android, Windows mobile, and iOS, will increase significantly in 2014. Mobile devices take up a gradually significant market share and will attract more and more attention from IT criminals who will try to make fortunes on it.

At the same time we know a massive rise in malware specifically targeted at Android all too well, even if we in Denmark so far have been relatively spared of malware for mobile devices.

5» ByoD

Devices, gadgets, and generally miscellaneous mobile equipment can be a challenge for enterprises and public authorities to manage and control. We expect that 2014 will be the year where there will be a number of new technologies, which will make this work easier, but also that significant resources are expected to be earmarked for this work. The work and the challenges with ByoD (Bring your own Device) have only just begun.

6» Post-Snowden and data privacy

Surveillance from state authorities, in particular in the wake of the many revelations of NSA’s systematic monitoring and surveillance, will force the market to higher encryption and data protection initiatives. Surveillance has given a dented image to several data centers and Cloud providers, and as a consequence, these – to regain customers’ confidence – will be compelled to a number of initiatives for better protection of data that is stored outside the enterprise’s network.

But in addition we also foresee that a number of enterprises in 2014 will begin to implement strong encryption of e-mail and other popular Internet based transport channels.

The race to protect data with strong encryption has in several places been referred to as an upcoming “Cryptowar”.

7» Targeted Attacks / spear phishing

In 2012 and 2013 we have seen numerous spear phishing and targeted attacks that make use of a mixture of zero-day vulnerabilities and APT (Advanced Persistent Threats). In Denmark, and in a number of countries we compare ourselves with, large funds have already been allocated for a defense against targeted attacks.

That job postings at the same time openly advertise for people with specific technical offensive skills, signals an escalation of state sponsored digital attacks, and as a consequence also demands for increased focus on protection of sensitive data.

8» More sophisticated crimeware

Stealing digital values on the Internet is a bargain. It has created a vibrant underground economy where hackers and talented developers on the one hand continue to develop and sell commercial “Crime as a Service” products and regular Crimekits, and on the other hand the affected stakeholders who are trying to protect the customers’ assets.

As a consequence of the fact that several of the targets that the IT criminals in the past ten years have selected as their primary targets, being financial institutions, these have also upgraded their security in several areas. To circumvent the security of systematic and comprehensive attacks makes considerable technical demands, why we expect that the IT criminals will shift their focus from ordinary bank customers to enterprises and public institutions that have significantly more financial resources in their accounts. A weapon that the IT criminals will build in these tools and services is the possibility to make “real time attacks” and “social engineering”.

9» Windows XP support dead

In April 2014 Microsoft will stop supporting Windows XP. This also means that the software giant will cease to launch updates to one of the most popular and widely-used operating systems ever.

With the end of Windows XP support millions of machines, which have not made and upgraded or changed to a different operating system, will potentially be left behind as cannon fodder for damaging code.

Windows XP is not only an end user product but is also found in numerous consoles which are not easy to upgrade. This applies, for example, to payment card terminals, terminals at airports, ATMs, and terminals in production environments. Obviously the end of the support of Windows XP will leave a lot of these installations without the opportunity for mending arising vulnerabilities unless a separate and expensive agreement is made with Microsoft. In this connection we anticipate that many of these systems will be left in operation but at the same time also in danger of potential misuse/infections.

10» Code signed malware

We have already in the course of 2013 seen a significant increase in malware that has been digitally signed with stolen certificates from legitimate enterprises and developers.

The purpose of misusing code signing is obvious to achieve a higher degree of trust/confidence as the issuer of the binary code is validated through signing the code. IT criminals have misused this both in connection with targeted attacks, but also more widely scattered attacks with net banking and information thieves, ransomware, and false security products have been observed making use of digital code signing.

When IT criminals do code signing, it is thus the aim to make the code appear legitimate. Several security solutions, including anti-virus products, assess the code by, among other things, looking at whether it is digitally signed and whether the source is confident. This way, signed malware can escape security solutions.

Conclusion

2014 shows signs of becoming busy within the IT security industry but especially for the many Danish enterprises and public authorities who must try to protect their digital values in a complex threat landscape where attacks and threats come from several sources.  CSIS concludes this in “10 Danish IT security challenges in 2014” which has just been published.

The company expects to see more infected machines, more data leaks, increased fear of surveillance, and a generally increased focus on IT security next year.  As opposed to previously, the management in several Danish enterprises has also realized that IT security must be treated as an urgent priority.


Continue reading CSIS News: 10 security challenges in 2014

CSIS Blog: An update on the Hesperbanker BOTnet

Currently this malware family is targeting only a few European countries, but it’s very likely that the authors have plans to make this a prevalent and more widespread threat as they continue to develop and improve both the binary code as well as their backend systems.

Our friends at ESET (http://www.welivesecurity.com/2013/09/04/hesperbot-a-new-advanced-banking-trojan-in-the-wild/) was the first to spot this malware and dubbed it: “Hesperbot”. We assume the name was chosen because of a string/reference found inside the binary dropper: “hesperus_core_entry”. We have decided to name it: “Hesperbanker”.

In Greek mythology, Hesperus is the Evening Star, the planet Venus in the evening (http://en.wikipedia.org/wiki/Hesperus). Does that ring a bell? Some clues: ZeuS and Hermes … The code is distributed as both x86 and x64, win32 binaries as well as components for several smartphones.

Targeted countries based on campaign-IDs:
The current countries being targeted include Turkey, Portugal, Germany and the Czech Republic. Again in the same manner as other crimekits the different countries are marked with a campaign-IDs e.g. “tr-botnet”, “pt-botnet” etc.

Plugins/modules
First of all the code makes use of several anti- debugging and sandbox tricks. It consists of a dropper and a main component along with several plugins. We have been able to find plugins/modules which could be used to circumvent various 2FA mechanisms. This includes VNC, video/movie recorder, screen capture and a keylogger.

Targeted brands
Currently the following targets are specified in the config file:

Germany
postbank.de

Portugal
bpinet.pt
cgd.pt
millenniumbcp.pt
santandertotta.pt

Turkey
akbank.com
denizbank.com
finansbank.com.tr
garanti.com.tr
kuveytturk.com.tr
teb.com.tr
vakifbank.com.tr
yapikredi.com.tr
ziraatbank.com.tr

Czech Republic
ba-ca.com
business24.cz
csob.cz
cz.unicreditbanking.net
mojebanka.cz
netbanka.cz
rb.cz
sberbankcz.cz
servis24.cz
uctrader.unicreditgroup.eu

Based on the geographical targeted campaigns we have created a small infection map to illustrate where Hesperbanker have zombies in their control. This correspond perfectly with the target list.


Approx. 7.000-8.000 Windows based PCs are zombies and tied into the Hesperbanker BOTnet. They constantly leak sensitive data to the perps and furthermore opens up a gateway for fraudulent and unautorized online banking transactions.

We have several times tried to dismantle the central C&C server domains which are served by ENOM/Namecheap and hosted at the bullet proof facilities of Hostland ltd. in Saint-Petersburg. In fact a lot of bad stuff is hosted in this netblock: 185.26.120.0 – 185.26.121.255.

Continue reading CSIS Blog: An update on the Hesperbanker BOTnet

CSIS News: Keyplayer in reshipping network arrested

For public release TLP:Green:

The documentary program, OperationX aired on Danish TV2 last night, have the past two months been investigating and tracking a large reshipping scam orchestrated from Vilnius in Lithuania.

The criminal setup have involved abuse of a large volume of stolen credit cards, which then was used to buy expensive electronic goods and bikes from ecommerce stores both in Denmark and Germany and probably elsewhere in Europe.

With the use of packet mules, working out of Denmark, the goods was then shipped to Lithuania and sold using various Internet forums.

The CSIS eCrime Unit was called in to support the investigation and we managed through several digital channels to track the person running the criminal outfit. How we exactly managed to do this will not be made publicly available. As a result of this work, the Lithuanian police arrested Aleksandrs Mirakovskis and subsequently have pleaded guilty to several charges.


Apparently, the apartment of Aleksandrs Mirakovskis, which was raided by the local police, also contained facilities to produce large amounts of fake credit cards.


In Denmark alone, one single ecommerce store, have lost millions of kroner due to this scam and have reported more than 600 incidents to the national police which only have led to a single charge.

The magnitude of package reshipping and fraud using stolen credit cards to buy expensive electronic goods is difficult to estimate, but it’s clearly costing Danish eCommerce stores millions of kroner every year.

Continue reading CSIS News: Keyplayer in reshipping network arrested