SlideShare a Scribd company logo
1 of 18
Georgia                    NATO
CYBER ATTACKS ON GEORGIAN GOVERNMENTAL RESOURCES
                                       Turkey, Ankara 2012
                                          Zurab Akhvlediani




                                              www.dea.gov.ge
Introduction                                                                                           2




   CERT-Georgia which is Governmental “Computer Emergency Response Team” of Republic of
   Georgia has Discovered Cyber Attack Incident, which seems to be Cyber Espionage Example.


        Advanced Malicious Software was Collecting Sensitive, Confidential Information about
     Georgian and American Security Documents and then uploading it to some of Command and
                     Control Servers. (which changes often upon detection).

      After investigating Attackers Servers and Malicious Files, we have linked this Cyber Attack to
                                   Russian Official Security Agencies.
Introduction                                                                                  3




 In march, 2011 CERT-GOV-GE have dioscovered Botnet Command & Control Web Server.

 After Analysing Webserver, Malicious Files and Various Scripts we found out that:

 1. Some of the Georgian NEWS sites were Hacked. (The Malicious script was injected only in
    the pages, where SPECIFIC information was presented)

 2. After visiting this pages, Computer was infected with Unknown Malicious Program.
    (None of Antivirus Product could Identify this threat, by the time of discovery).

 3. When executed, Malicious File Fully Controls Infected Computers.

 4. Searches for the “Sensitive words” into the Document Files.

 5. Makes Video and Audio Capture using built-in microphone.
4




Targeted Audience


Cyber Attack was designed very smartly. Various Georgian News-Related web-sites
were hacked and modified only Specific News pages (eg. NATO delegation Visit in
Georgia, US-Georgian Agreements and Meetings, Georgian Military NEWS).

www.caucasustimes.com – Site about the NEWS from Caucasian Region

www.cei.ge               – Caucasus Energy and Infrastructure

www.psnews.ge            - Georgian NEWS Site
1. Example of injected script into the                     5
Hacked NEWS website




                                         www.psnews.info
6




              Malicious file was evolving and Develpoed time to time:


30 March, 2011 – Virus Steals Sensitive Docuements, Certificates

14 September 2011 – Changed Infection Mechanism, new Bypassing methods for the
(Antivirus/Firewall/IDS)

25 November 2011 – Virus is more encrypted and obfuscated. infects windows 7
Operating System

12 December 2011 – added Video Recording capability, scanning and infecting
computers through the Network, changed Spreading vector

Command & Control Webserver changes its Destination upon Detection:
Hosted on US, German, French, Hungary, Czech and Russian Hosting Providers.
Infection Vector                                     7




                   Encoded shellcode into PHP file
Downloading Actual Virus File                                                             8




     shellcode Downloads either calc.exe file Directly or makes Get request to calc.php
     to reassemble then to calc.exe (due to firewall ids/ips evasion).




                                Base64 encoded EXE file
Downloading Malicious File                       9
From Russian Website



    www.rbc.ru      -    Рос Бизнес Консалтинг
Infected Computer                                                                        10
BOT



    Not detected with Major Antivirus Product, Bypasses Windows 7 sp1 pathced,
    with Firewall enabled.
    As of 25.03.2011, 20.06.2011, 16.01.2012, 25.03.20112

    After Executing calc.exe itself does 2 major things:

    - injecting into iexplorer.exe and communicating to defaced sites, for C&C address
    retrival

    - creating usbserv.exe bot file in Application Data directory, and writing it to
    autorun in Windows Registry.
Virus Functionalities                                                       11




     • Send any file from the local hard drive to the remote server.
     • Steal certificates
     • Search the hard drive for Microsoft Word documents
     • Search the hard drive for remote desktop configuration files
     • Take screenshots
     • Record audio using the microphone
     • Record video using the webcam
     • Scan the local network to identify other hosts on the same network
     • Execute arbitrary commands on the infected system


       The commands are activated manually and were sent to each host
       individually rather than being broadcast to all infected hosts.
12
Sensitive Words
Destination                                                                                       13




• In The Final Steps Cyber Attacker Steals Matched files, uploads them to the Server. This server is
  often bought from various hosting providers and it changes destination country and IP address
  very often.



  September, 2010 – georgiaonline.xp3.biz (United States) FreeWebHostingArea.com
  March, 2011    – ema.gov.ge                       (Georgia) (hacked webserver)
  April , 2011   - 178.32.91.70                      (France) OVH Hosting
  June, 2011     - 88.198.240.123 / 88.198.238.55 (Germany) DME Hosting
  October, 2011 - 94.199.48.104                     (Hungary) Net23.hu
  November. 2011 - 173.212.192.83                   ( United States )
  December, 2011 - 31.31.75.63                      (Czech Republic)
  January, 2012     - 31.214.140.214                (Germany) DME Hosting
  March, 2012       – 78.46.145.24                   (Germany) DME Hosting
14
Unmasking The Cyber Attackers (Counter Cyber-Intelligence)



   CERT-GOV-GE gained full access to Command & Control servers, Decrypted
   communication mechanisms and malicious files. After Analyzing all the gathered
   information we have identified Cyber attacker persons and organizations.

In 2011-2012, During This New Cyber Espionage Attack, we have identified Russian Security agencies, ones again.

              We have found: 3 main facts, which indicate to Russian Official State organizations.


Warynews.ru – site used to control infected Georgian computers – IP and DNS servers belonges to Russian Business
Network. (mentioned in various Blacklist, Bad Reputation)

www.rbc.ru – written directly into MALWARE code, to communicate with Attackers if every communication channel is
closed. Official name “Russian Business Consulting” – official website, linked with RBN.

Legalcrf.in –Sending Malicious files through SPAM email FROM “admin@President.gov.ge”.
Obscure Registrator, Only Discoverable by Indian WHOIS Service,
Person - Artur Jafuniaev
Address: Lubianka 13, Moscow           <- Federal Security Service of the Russian Federation (FSB)
                                          information and communication technologies Division
15
Unmasking The Cyber Attackers (Counter Cyber-Intelligence)



• We have been monitoring Command & Control Server in 24/7 manner and
  once observed that, attacker ran malicious code in his OWN operating
  system to check new functions.
• Then we have got video of him, personnaly. We have captured process
  of creating new malicious modules.

    We have Obtained Russian Document, from email, where he was giving someone
    instructions how to use this malicious software and how to infect targets.

• We have linked him with some of German and Russian hackers.


• Then we have Obtained information about his destination City, Internet Service Provider,
  Email and etc.
16
Responding Steps




1) CERT Georgia gained access to Command and Controlling Servers which were run by the
   attacker.

2) We have identified all of the Infected computers destinated in Georgia. Then contacted
   Govermental agencies, gave them necessary information how to respond to this incident
   and helped them to disinfect machines.

3) Also CERT-GOV-GE collaborated with US-CERT, Bundes-CERT-Germany, CERT-Ukraine,
   Microsoft Security Divisions, ESET, various hosting Providers. (To shut down attacking servers
   and obtain data for further forensic analysis).
Q/A                                                              17




 Contact Information:


                           The Ministry of Justice
                           Data Exchange Agency

                                Tbilisi, Georgia 0102
                        Tsminda Nikolozis/Nino Chxeizis St. N2




                        Phone: +995 (32) 2 91 51 40
                         E-mail: info@dea.gov.ge
                           zakhvlediani@dea.gov.ge
Thank You

Questions…

More Related Content

What's hot

02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - NotesKranthi
 
yoda at rotary_pune_club
yoda at rotary_pune_clubyoda at rotary_pune_club
yoda at rotary_pune_clubAntz911
 
Ethical Hacking4
Ethical Hacking4Ethical Hacking4
Ethical Hacking4dodontn
 
Fbi cyber division bulletin on tools reportedly used by opm hackers
Fbi cyber division bulletin on tools reportedly used by opm hackersFbi cyber division bulletin on tools reportedly used by opm hackers
Fbi cyber division bulletin on tools reportedly used by opm hackersRepentSinner
 
Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismPost Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismRichard Stiennon
 
Types of malware threats
Types of malware threatsTypes of malware threats
Types of malware threatsEC-Council
 
Is Troy Burning - An overview of targeted cyber attacks
Is Troy Burning - An overview of targeted cyber attacksIs Troy Burning - An overview of targeted cyber attacks
Is Troy Burning - An overview of targeted cyber attacksguest6f3af5
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoorsseth edmond
 
Detection of running backdoors
Detection of running backdoorsDetection of running backdoors
Detection of running backdoorsmridulahuja
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoorsGaurav Dalvi
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoorsjibinmanjooran
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSavvius, Inc
 
Methods of Cybersecurity Attacks
Methods of Cybersecurity AttacksMethods of Cybersecurity Attacks
Methods of Cybersecurity AttacksZyrellLalaguna
 
Research Paper on Rootkit.
Research Paper on Rootkit.Research Paper on Rootkit.
Research Paper on Rootkit.Anuj Khandelwal
 
Detecting Intrusions and Malware - Eric Vanderburg - JurInnov
Detecting Intrusions and Malware - Eric Vanderburg - JurInnovDetecting Intrusions and Malware - Eric Vanderburg - JurInnov
Detecting Intrusions and Malware - Eric Vanderburg - JurInnovEric Vanderburg
 
MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence Cyphort
 
DerbyCon 2017 - Behind Enemy Lines
DerbyCon 2017 - Behind Enemy LinesDerbyCon 2017 - Behind Enemy Lines
DerbyCon 2017 - Behind Enemy LinesMichael Flossman
 

What's hot (20)

02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
computer security
computer securitycomputer security
computer security
 
News Bytes - December 2012
News Bytes - December 2012News Bytes - December 2012
News Bytes - December 2012
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
yoda at rotary_pune_club
yoda at rotary_pune_clubyoda at rotary_pune_club
yoda at rotary_pune_club
 
Ethical Hacking4
Ethical Hacking4Ethical Hacking4
Ethical Hacking4
 
Fbi cyber division bulletin on tools reportedly used by opm hackers
Fbi cyber division bulletin on tools reportedly used by opm hackersFbi cyber division bulletin on tools reportedly used by opm hackers
Fbi cyber division bulletin on tools reportedly used by opm hackers
 
Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismPost Apocalyptic Cyber Realism
Post Apocalyptic Cyber Realism
 
Types of malware threats
Types of malware threatsTypes of malware threats
Types of malware threats
 
Is Troy Burning - An overview of targeted cyber attacks
Is Troy Burning - An overview of targeted cyber attacksIs Troy Burning - An overview of targeted cyber attacks
Is Troy Burning - An overview of targeted cyber attacks
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
Detection of running backdoors
Detection of running backdoorsDetection of running backdoors
Detection of running backdoors
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoors
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network Attacks
 
Methods of Cybersecurity Attacks
Methods of Cybersecurity AttacksMethods of Cybersecurity Attacks
Methods of Cybersecurity Attacks
 
Research Paper on Rootkit.
Research Paper on Rootkit.Research Paper on Rootkit.
Research Paper on Rootkit.
 
Detecting Intrusions and Malware - Eric Vanderburg - JurInnov
Detecting Intrusions and Malware - Eric Vanderburg - JurInnovDetecting Intrusions and Malware - Eric Vanderburg - JurInnov
Detecting Intrusions and Malware - Eric Vanderburg - JurInnov
 
MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence
 
DerbyCon 2017 - Behind Enemy Lines
DerbyCon 2017 - Behind Enemy LinesDerbyCon 2017 - Behind Enemy Lines
DerbyCon 2017 - Behind Enemy Lines
 

Similar to Georgia NATO Cyber Attacks on Governmental Resources

RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Data breach at Target, demystified.
Data breach at Target, demystified.Data breach at Target, demystified.
Data breach at Target, demystified.Cyphort
 
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Microfestival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Microfestival ICT 2016
 
cyber attacks in May , breaches in May
cyber attacks in May , breaches in Maycyber attacks in May , breaches in May
cyber attacks in May , breaches in MaySathish Kumar K
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threatsZscaler
 
Mobile application security
Mobile application securityMobile application security
Mobile application securityEY Belgium
 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecRaghunath G
 
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...Lior Rotkovitch
 
SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15haney888
 
SplunkLive! Amsterdam 2015 - Analytics based security breakout
SplunkLive! Amsterdam 2015 - Analytics based security breakoutSplunkLive! Amsterdam 2015 - Analytics based security breakout
SplunkLive! Amsterdam 2015 - Analytics based security breakoutSplunk
 
Palestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry morePalestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry moreBHack Conference
 

Similar to Georgia NATO Cyber Attacks on Governmental Resources (20)

News bytes Sept-2011
News bytes Sept-2011News bytes Sept-2011
News bytes Sept-2011
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Data breach at Target, demystified.
Data breach at Target, demystified.Data breach at Target, demystified.
Data breach at Target, demystified.
 
News bytes Oct-2011
News bytes  Oct-2011News bytes  Oct-2011
News bytes Oct-2011
 
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Microfestival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
 
Attack on Sony
Attack on SonyAttack on Sony
Attack on Sony
 
Malware Freak Show
Malware Freak ShowMalware Freak Show
Malware Freak Show
 
cyber attacks in May , breaches in May
cyber attacks in May , breaches in Maycyber attacks in May , breaches in May
cyber attacks in May , breaches in May
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threats
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Mobile application security
Mobile application securityMobile application security
Mobile application security
 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_Dec
 
Code protection
Code protectionCode protection
Code protection
 
Ransomware ly
Ransomware lyRansomware ly
Ransomware ly
 
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
 
SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15
 
SplunkLive! Amsterdam 2015 - Analytics based security breakout
SplunkLive! Amsterdam 2015 - Analytics based security breakoutSplunkLive! Amsterdam 2015 - Analytics based security breakout
SplunkLive! Amsterdam 2015 - Analytics based security breakout
 
Palestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry morePalestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry more
 

Recently uploaded

A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 

Recently uploaded (20)

A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 

Georgia NATO Cyber Attacks on Governmental Resources

  • 1. Georgia NATO CYBER ATTACKS ON GEORGIAN GOVERNMENTAL RESOURCES Turkey, Ankara 2012 Zurab Akhvlediani www.dea.gov.ge
  • 2. Introduction 2 CERT-Georgia which is Governmental “Computer Emergency Response Team” of Republic of Georgia has Discovered Cyber Attack Incident, which seems to be Cyber Espionage Example. Advanced Malicious Software was Collecting Sensitive, Confidential Information about Georgian and American Security Documents and then uploading it to some of Command and Control Servers. (which changes often upon detection). After investigating Attackers Servers and Malicious Files, we have linked this Cyber Attack to Russian Official Security Agencies.
  • 3. Introduction 3 In march, 2011 CERT-GOV-GE have dioscovered Botnet Command & Control Web Server. After Analysing Webserver, Malicious Files and Various Scripts we found out that: 1. Some of the Georgian NEWS sites were Hacked. (The Malicious script was injected only in the pages, where SPECIFIC information was presented) 2. After visiting this pages, Computer was infected with Unknown Malicious Program. (None of Antivirus Product could Identify this threat, by the time of discovery). 3. When executed, Malicious File Fully Controls Infected Computers. 4. Searches for the “Sensitive words” into the Document Files. 5. Makes Video and Audio Capture using built-in microphone.
  • 4. 4 Targeted Audience Cyber Attack was designed very smartly. Various Georgian News-Related web-sites were hacked and modified only Specific News pages (eg. NATO delegation Visit in Georgia, US-Georgian Agreements and Meetings, Georgian Military NEWS). www.caucasustimes.com – Site about the NEWS from Caucasian Region www.cei.ge – Caucasus Energy and Infrastructure www.psnews.ge - Georgian NEWS Site
  • 5. 1. Example of injected script into the 5 Hacked NEWS website www.psnews.info
  • 6. 6 Malicious file was evolving and Develpoed time to time: 30 March, 2011 – Virus Steals Sensitive Docuements, Certificates 14 September 2011 – Changed Infection Mechanism, new Bypassing methods for the (Antivirus/Firewall/IDS) 25 November 2011 – Virus is more encrypted and obfuscated. infects windows 7 Operating System 12 December 2011 – added Video Recording capability, scanning and infecting computers through the Network, changed Spreading vector Command & Control Webserver changes its Destination upon Detection: Hosted on US, German, French, Hungary, Czech and Russian Hosting Providers.
  • 7. Infection Vector 7 Encoded shellcode into PHP file
  • 8. Downloading Actual Virus File 8 shellcode Downloads either calc.exe file Directly or makes Get request to calc.php to reassemble then to calc.exe (due to firewall ids/ips evasion). Base64 encoded EXE file
  • 9. Downloading Malicious File 9 From Russian Website www.rbc.ru - Рос Бизнес Консалтинг
  • 10. Infected Computer 10 BOT Not detected with Major Antivirus Product, Bypasses Windows 7 sp1 pathced, with Firewall enabled. As of 25.03.2011, 20.06.2011, 16.01.2012, 25.03.20112 After Executing calc.exe itself does 2 major things: - injecting into iexplorer.exe and communicating to defaced sites, for C&C address retrival - creating usbserv.exe bot file in Application Data directory, and writing it to autorun in Windows Registry.
  • 11. Virus Functionalities 11 • Send any file from the local hard drive to the remote server. • Steal certificates • Search the hard drive for Microsoft Word documents • Search the hard drive for remote desktop configuration files • Take screenshots • Record audio using the microphone • Record video using the webcam • Scan the local network to identify other hosts on the same network • Execute arbitrary commands on the infected system The commands are activated manually and were sent to each host individually rather than being broadcast to all infected hosts.
  • 13. Destination 13 • In The Final Steps Cyber Attacker Steals Matched files, uploads them to the Server. This server is often bought from various hosting providers and it changes destination country and IP address very often. September, 2010 – georgiaonline.xp3.biz (United States) FreeWebHostingArea.com March, 2011 – ema.gov.ge (Georgia) (hacked webserver) April , 2011 - 178.32.91.70 (France) OVH Hosting June, 2011 - 88.198.240.123 / 88.198.238.55 (Germany) DME Hosting October, 2011 - 94.199.48.104 (Hungary) Net23.hu November. 2011 - 173.212.192.83 ( United States ) December, 2011 - 31.31.75.63 (Czech Republic) January, 2012 - 31.214.140.214 (Germany) DME Hosting March, 2012 – 78.46.145.24 (Germany) DME Hosting
  • 14. 14 Unmasking The Cyber Attackers (Counter Cyber-Intelligence) CERT-GOV-GE gained full access to Command & Control servers, Decrypted communication mechanisms and malicious files. After Analyzing all the gathered information we have identified Cyber attacker persons and organizations. In 2011-2012, During This New Cyber Espionage Attack, we have identified Russian Security agencies, ones again. We have found: 3 main facts, which indicate to Russian Official State organizations. Warynews.ru – site used to control infected Georgian computers – IP and DNS servers belonges to Russian Business Network. (mentioned in various Blacklist, Bad Reputation) www.rbc.ru – written directly into MALWARE code, to communicate with Attackers if every communication channel is closed. Official name “Russian Business Consulting” – official website, linked with RBN. Legalcrf.in –Sending Malicious files through SPAM email FROM “admin@President.gov.ge”. Obscure Registrator, Only Discoverable by Indian WHOIS Service, Person - Artur Jafuniaev Address: Lubianka 13, Moscow <- Federal Security Service of the Russian Federation (FSB) information and communication technologies Division
  • 15. 15 Unmasking The Cyber Attackers (Counter Cyber-Intelligence) • We have been monitoring Command & Control Server in 24/7 manner and once observed that, attacker ran malicious code in his OWN operating system to check new functions. • Then we have got video of him, personnaly. We have captured process of creating new malicious modules. We have Obtained Russian Document, from email, where he was giving someone instructions how to use this malicious software and how to infect targets. • We have linked him with some of German and Russian hackers. • Then we have Obtained information about his destination City, Internet Service Provider, Email and etc.
  • 16. 16 Responding Steps 1) CERT Georgia gained access to Command and Controlling Servers which were run by the attacker. 2) We have identified all of the Infected computers destinated in Georgia. Then contacted Govermental agencies, gave them necessary information how to respond to this incident and helped them to disinfect machines. 3) Also CERT-GOV-GE collaborated with US-CERT, Bundes-CERT-Germany, CERT-Ukraine, Microsoft Security Divisions, ESET, various hosting Providers. (To shut down attacking servers and obtain data for further forensic analysis).
  • 17. Q/A 17 Contact Information: The Ministry of Justice Data Exchange Agency Tbilisi, Georgia 0102 Tsminda Nikolozis/Nino Chxeizis St. N2 Phone: +995 (32) 2 91 51 40 E-mail: info@dea.gov.ge zakhvlediani@dea.gov.ge

Editor's Notes

  1. Attack was discovered by CERT-Georgia.
  2. *Only the persons who was interested in such information were infected with this Advanced Threat, despite of Security Defensive measure’s and Softwares used on targets Computer and Network Systems. Threat was highly encrypted and used contemporary stealthy techniques, so that none of security tools could indetify it.