SlideShare a Scribd company logo
1 of 2
Download to read offline
MALAYSIA,
THAILAND &
SINGAPORE
LOCATION OF
COMMAND
AND
CONTROL
SERVERS:
MALWARE TYPE:
MULTI-STAGE
TRACKING
AND DATA
EXFILTRATION
MALWARE
FORWARD WITHOUT FEAR
©2016 Forcepoint LLC. All rights reserved.
Forcepoint™ is a trademark of Forcepoint LLC.
134
NUMBER OF
COUNTRIES
WITH JAKU
VICTIMS
19k
NUMBER OF
UNIQUE
VICTIMS
6MONTHS
LENGTH OF
INVESTIGATION
TO DATE:
J
A
K
U
CRYPTOGRAPHY,
STEGANOGRAPHY,
FAKE FILE TYPES,
STEALTH INJECTION,
ANTI-VIRUS
ENGINE DETECTION
(AND OTHERS)
EVASION TECHNIQUES USED:
EXPOSURE TO COMPROMISED
BITTORRENT SITES, USE OF
UNLICENSED SOFTWARE &
DOWNLOADING OF WAREZ
SOFTWARE
PAYLOADS ARE DELIVERED VIA:
GLOBAL(SIGNIFICANT
CLUSTERING IN
JAPAN, SOUTH
KOREA & CHINA)
LOCATION OF VICTIMS:
SOUTH
KOREA
JAPAN CHINA TAIWAN USA
BY COUNTRY
ANALYSIS OF A BOTNET CAMPAIGN
MEAN DWELL TIME
93 DAYS
MAX DWELL TIME
348 DAYS
FORWARD WITHOUT FEAR
©2016 Forcepoint LLC. All rights reserved.
Forcepoint™ is a trademark of Forcepoint LLC.
JAKUistargetingspecificvictims
ANALYSIS OF A BOTNET CAMPAIGN
JAKU is the name of the botnet campaign investigated by the Forcepoint Security Labs Special
Investigations Team. What makes JAKU unique is that within the noise of thousands of botnet
victims, it targets and tracks a small number of specific individuals. These individuals include
members of International Non-Governmental Organisations (NGOs), Engineering Companies,
Academics, Scientists and Government Employees. North Korea (DPRK) and Pyongyang are the
common theme shared between these individuals.
JAKU targets its victims - 19,000 is a conservative estimate of the number of victims at any one
time - primarily via 'poisoned' BitTorrent file shares. The victims are spread all over the globe,
but a significant number of victims are in South Korea and Japan. Forcepoint Security Labs has
determined that the botnet command and control (C2) servers identified are also located in the
APAC region, including Singapore, Malaysia and Thailand.
Asophisticatedbotnetcampaign
JAKU uses three different C2 mechanisms, making it highly resilient. Compressed and encrypted
code embedded in image files are used to deliver the second stage malware, while the botnet
controllers monitor the botnet members via obfuscated SQLite databases. The controllers also
cleverly re-use widely available open source software, including the UDT network transport
protocol, software copied from Korean blogger sites and re-writes of previously published code.
WhoisbehindtheJAKUbotnetcampaign?
Forcepoint Security Labs focus on awareness and understanding of
intent. This is useful to identify likely future behaviour. We do not
focus on specific attribution. However, there are indicators that
suggest that the author(s) of the malware identified are native
Korean speakers.
Foradeeperdiveintothe
JAKUbotnetcampaign,
downloadthereport
www.forcepoint.com/jaku

More Related Content

Similar to New Cyber Security Technology

Detecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT BotnetsDetecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT BotnetsFarjad Noor
 
Guarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkGuarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkEditor IJCATR
 
Literature survey on peer to peer botnets
Literature survey on peer to peer botnetsLiterature survey on peer to peer botnets
Literature survey on peer to peer botnetsAcad
 
network-insights-into-vawtrak-v2
network-insights-into-vawtrak-v2network-insights-into-vawtrak-v2
network-insights-into-vawtrak-v2Manel Marco
 
Network Insights into Vawtrak v2
Network Insights into Vawtrak v2Network Insights into Vawtrak v2
Network Insights into Vawtrak v2Blueliv
 
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...IRJET Journal
 
Combating Software Piracy Using Code Encryption Technique
Combating Software Piracy Using Code Encryption TechniqueCombating Software Piracy Using Code Encryption Technique
Combating Software Piracy Using Code Encryption Techniquetheijes
 
targeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-septtargeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-sept*****Dominic A Ienco
 
Evolución de la Ciber Seguridad
Evolución de la Ciber SeguridadEvolución de la Ciber Seguridad
Evolución de la Ciber SeguridadCristian Garcia G.
 
Obfuscation and Mutation in Malware
Obfuscation and Mutation in Malware Obfuscation and Mutation in Malware
Obfuscation and Mutation in Malware KADARI SHIVRAJ
 
Tracing Back The Botmaster
Tracing Back The BotmasterTracing Back The Botmaster
Tracing Back The BotmasterIJERA Editor
 
Bot net detection by using ssl encryption
Bot net detection by using ssl encryptionBot net detection by using ssl encryption
Bot net detection by using ssl encryptionAcad
 
A First Look at the Crypto-Mining Malware Ecosystem: A Decade of Unrestricted...
A First Look at the Crypto-Mining Malware Ecosystem: A Decade of Unrestricted...A First Look at the Crypto-Mining Malware Ecosystem: A Decade of Unrestricted...
A First Look at the Crypto-Mining Malware Ecosystem: A Decade of Unrestricted...eraser Juan José Calderón
 
CRYPTOCURRENCY TRACKER ppt.pptx
CRYPTOCURRENCY TRACKER ppt.pptxCRYPTOCURRENCY TRACKER ppt.pptx
CRYPTOCURRENCY TRACKER ppt.pptxSRUSHTIHINGE
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxmahendrarm2112
 
A Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits AttackA Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits AttackCSCJournals
 

Similar to New Cyber Security Technology (20)

Detecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT BotnetsDetecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT Botnets
 
Botnets' networks
Botnets' networksBotnets' networks
Botnets' networks
 
Guarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkGuarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social Network
 
Literature survey on peer to peer botnets
Literature survey on peer to peer botnetsLiterature survey on peer to peer botnets
Literature survey on peer to peer botnets
 
network-insights-into-vawtrak-v2
network-insights-into-vawtrak-v2network-insights-into-vawtrak-v2
network-insights-into-vawtrak-v2
 
Network Insights into Vawtrak v2
Network Insights into Vawtrak v2Network Insights into Vawtrak v2
Network Insights into Vawtrak v2
 
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
 
Combating Software Piracy Using Code Encryption Technique
Combating Software Piracy Using Code Encryption TechniqueCombating Software Piracy Using Code Encryption Technique
Combating Software Piracy Using Code Encryption Technique
 
JAKU Botnet Analysis
JAKU Botnet AnalysisJAKU Botnet Analysis
JAKU Botnet Analysis
 
targeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-septtargeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-sept
 
China Cyber
China CyberChina Cyber
China Cyber
 
Evolución de la Ciber Seguridad
Evolución de la Ciber SeguridadEvolución de la Ciber Seguridad
Evolución de la Ciber Seguridad
 
Obfuscation and Mutation in Malware
Obfuscation and Mutation in Malware Obfuscation and Mutation in Malware
Obfuscation and Mutation in Malware
 
Tracing Back The Botmaster
Tracing Back The BotmasterTracing Back The Botmaster
Tracing Back The Botmaster
 
Bot net detection by using ssl encryption
Bot net detection by using ssl encryptionBot net detection by using ssl encryption
Bot net detection by using ssl encryption
 
A First Look at the Crypto-Mining Malware Ecosystem: A Decade of Unrestricted...
A First Look at the Crypto-Mining Malware Ecosystem: A Decade of Unrestricted...A First Look at the Crypto-Mining Malware Ecosystem: A Decade of Unrestricted...
A First Look at the Crypto-Mining Malware Ecosystem: A Decade of Unrestricted...
 
CRYPTOCURRENCY TRACKER ppt.pptx
CRYPTOCURRENCY TRACKER ppt.pptxCRYPTOCURRENCY TRACKER ppt.pptx
CRYPTOCURRENCY TRACKER ppt.pptx
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
 
A Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits AttackA Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits Attack
 
Unveiling-Patchwork
Unveiling-PatchworkUnveiling-Patchwork
Unveiling-Patchwork
 

More from lunchNtouch

Promise Clock for children during vacation
Promise Clock for children during vacationPromise Clock for children during vacation
Promise Clock for children during vacationlunchNtouch
 
Ceramic razor for women
Ceramic razor for womenCeramic razor for women
Ceramic razor for womenlunchNtouch
 
Device for beuty leg and healthy body
Device for beuty leg and healthy bodyDevice for beuty leg and healthy body
Device for beuty leg and healthy bodylunchNtouch
 
Products for safety hygiene and firefighting
Products for safety hygiene and firefightingProducts for safety hygiene and firefighting
Products for safety hygiene and firefightinglunchNtouch
 
Robotic Toy module for children
Robotic Toy module for childrenRobotic Toy module for children
Robotic Toy module for childrenlunchNtouch
 
Creative system window by using wheels
Creative system window by using wheelsCreative system window by using wheels
Creative system window by using wheelslunchNtouch
 
Innovative design chair for self back-massage
Innovative design chair for self back-massageInnovative design chair for self back-massage
Innovative design chair for self back-massagelunchNtouch
 
Portable Liquid Explosive & Metal Detector
Portable Liquid Explosive & Metal DetectorPortable Liquid Explosive & Metal Detector
Portable Liquid Explosive & Metal DetectorlunchNtouch
 
Complete HiRes Video Solutions
Complete HiRes Video SolutionsComplete HiRes Video Solutions
Complete HiRes Video SolutionslunchNtouch
 
Drug and bomb detector by ion mobility
Drug and bomb detector by ion mobilityDrug and bomb detector by ion mobility
Drug and bomb detector by ion mobilitylunchNtouch
 
2016 New macaron style hats
2016 New macaron style hats2016 New macaron style hats
2016 New macaron style hatslunchNtouch
 
2016 New style hat for dandy people
2016 New style hat for dandy people2016 New style hat for dandy people
2016 New style hat for dandy peoplelunchNtouch
 
2016 New clothes for tomboy concept
2016 New clothes for tomboy concept2016 New clothes for tomboy concept
2016 New clothes for tomboy conceptlunchNtouch
 
Safe Box solution for data protecting
Safe Box solution for data protectingSafe Box solution for data protecting
Safe Box solution for data protectinglunchNtouch
 
Monitoring solution for all action in enterprises
Monitoring solution for all action in enterprisesMonitoring solution for all action in enterprises
Monitoring solution for all action in enterpriseslunchNtouch
 
Long distance wireless cctv total solution
Long distance wireless cctv total solutionLong distance wireless cctv total solution
Long distance wireless cctv total solutionlunchNtouch
 
Wireless cctv system for elevator
Wireless cctv system for elevatorWireless cctv system for elevator
Wireless cctv system for elevatorlunchNtouch
 
Press-released electrical receptacle
Press-released electrical receptaclePress-released electrical receptacle
Press-released electrical receptaclelunchNtouch
 
Macro NFC button which can attach smartphone
Macro NFC button which can attach smartphoneMacro NFC button which can attach smartphone
Macro NFC button which can attach smartphonelunchNtouch
 
3D remote attention tracking system
3D remote attention tracking system3D remote attention tracking system
3D remote attention tracking systemlunchNtouch
 

More from lunchNtouch (20)

Promise Clock for children during vacation
Promise Clock for children during vacationPromise Clock for children during vacation
Promise Clock for children during vacation
 
Ceramic razor for women
Ceramic razor for womenCeramic razor for women
Ceramic razor for women
 
Device for beuty leg and healthy body
Device for beuty leg and healthy bodyDevice for beuty leg and healthy body
Device for beuty leg and healthy body
 
Products for safety hygiene and firefighting
Products for safety hygiene and firefightingProducts for safety hygiene and firefighting
Products for safety hygiene and firefighting
 
Robotic Toy module for children
Robotic Toy module for childrenRobotic Toy module for children
Robotic Toy module for children
 
Creative system window by using wheels
Creative system window by using wheelsCreative system window by using wheels
Creative system window by using wheels
 
Innovative design chair for self back-massage
Innovative design chair for self back-massageInnovative design chair for self back-massage
Innovative design chair for self back-massage
 
Portable Liquid Explosive & Metal Detector
Portable Liquid Explosive & Metal DetectorPortable Liquid Explosive & Metal Detector
Portable Liquid Explosive & Metal Detector
 
Complete HiRes Video Solutions
Complete HiRes Video SolutionsComplete HiRes Video Solutions
Complete HiRes Video Solutions
 
Drug and bomb detector by ion mobility
Drug and bomb detector by ion mobilityDrug and bomb detector by ion mobility
Drug and bomb detector by ion mobility
 
2016 New macaron style hats
2016 New macaron style hats2016 New macaron style hats
2016 New macaron style hats
 
2016 New style hat for dandy people
2016 New style hat for dandy people2016 New style hat for dandy people
2016 New style hat for dandy people
 
2016 New clothes for tomboy concept
2016 New clothes for tomboy concept2016 New clothes for tomboy concept
2016 New clothes for tomboy concept
 
Safe Box solution for data protecting
Safe Box solution for data protectingSafe Box solution for data protecting
Safe Box solution for data protecting
 
Monitoring solution for all action in enterprises
Monitoring solution for all action in enterprisesMonitoring solution for all action in enterprises
Monitoring solution for all action in enterprises
 
Long distance wireless cctv total solution
Long distance wireless cctv total solutionLong distance wireless cctv total solution
Long distance wireless cctv total solution
 
Wireless cctv system for elevator
Wireless cctv system for elevatorWireless cctv system for elevator
Wireless cctv system for elevator
 
Press-released electrical receptacle
Press-released electrical receptaclePress-released electrical receptacle
Press-released electrical receptacle
 
Macro NFC button which can attach smartphone
Macro NFC button which can attach smartphoneMacro NFC button which can attach smartphone
Macro NFC button which can attach smartphone
 
3D remote attention tracking system
3D remote attention tracking system3D remote attention tracking system
3D remote attention tracking system
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

New Cyber Security Technology

  • 1. MALAYSIA, THAILAND & SINGAPORE LOCATION OF COMMAND AND CONTROL SERVERS: MALWARE TYPE: MULTI-STAGE TRACKING AND DATA EXFILTRATION MALWARE FORWARD WITHOUT FEAR ©2016 Forcepoint LLC. All rights reserved. Forcepoint™ is a trademark of Forcepoint LLC. 134 NUMBER OF COUNTRIES WITH JAKU VICTIMS 19k NUMBER OF UNIQUE VICTIMS 6MONTHS LENGTH OF INVESTIGATION TO DATE: J A K U CRYPTOGRAPHY, STEGANOGRAPHY, FAKE FILE TYPES, STEALTH INJECTION, ANTI-VIRUS ENGINE DETECTION (AND OTHERS) EVASION TECHNIQUES USED: EXPOSURE TO COMPROMISED BITTORRENT SITES, USE OF UNLICENSED SOFTWARE & DOWNLOADING OF WAREZ SOFTWARE PAYLOADS ARE DELIVERED VIA: GLOBAL(SIGNIFICANT CLUSTERING IN JAPAN, SOUTH KOREA & CHINA) LOCATION OF VICTIMS: SOUTH KOREA JAPAN CHINA TAIWAN USA BY COUNTRY ANALYSIS OF A BOTNET CAMPAIGN MEAN DWELL TIME 93 DAYS MAX DWELL TIME 348 DAYS
  • 2. FORWARD WITHOUT FEAR ©2016 Forcepoint LLC. All rights reserved. Forcepoint™ is a trademark of Forcepoint LLC. JAKUistargetingspecificvictims ANALYSIS OF A BOTNET CAMPAIGN JAKU is the name of the botnet campaign investigated by the Forcepoint Security Labs Special Investigations Team. What makes JAKU unique is that within the noise of thousands of botnet victims, it targets and tracks a small number of specific individuals. These individuals include members of International Non-Governmental Organisations (NGOs), Engineering Companies, Academics, Scientists and Government Employees. North Korea (DPRK) and Pyongyang are the common theme shared between these individuals. JAKU targets its victims - 19,000 is a conservative estimate of the number of victims at any one time - primarily via 'poisoned' BitTorrent file shares. The victims are spread all over the globe, but a significant number of victims are in South Korea and Japan. Forcepoint Security Labs has determined that the botnet command and control (C2) servers identified are also located in the APAC region, including Singapore, Malaysia and Thailand. Asophisticatedbotnetcampaign JAKU uses three different C2 mechanisms, making it highly resilient. Compressed and encrypted code embedded in image files are used to deliver the second stage malware, while the botnet controllers monitor the botnet members via obfuscated SQLite databases. The controllers also cleverly re-use widely available open source software, including the UDT network transport protocol, software copied from Korean blogger sites and re-writes of previously published code. WhoisbehindtheJAKUbotnetcampaign? Forcepoint Security Labs focus on awareness and understanding of intent. This is useful to identify likely future behaviour. We do not focus on specific attribution. However, there are indicators that suggest that the author(s) of the malware identified are native Korean speakers. Foradeeperdiveintothe JAKUbotnetcampaign, downloadthereport www.forcepoint.com/jaku