SlideShare a Scribd company logo
1 of 41
Download to read offline
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 1
WannaCry | More
jp@mcafee.com
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 2
# man @mcafee
30+ Security Engineers in Latin America
• Intelligence Services (Including SOCs, Law enforcement Agencies)
• Finance Fraud Prevention Group
• DDoS and Defacement handler
• Honey pot, phoney pot and honey network (sudo su -)
• Incident Response


Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 3
Shadow Brokers, August, 16: Alleged they hacked in to
Equation Group and that they have their cyber weapons;
“
”
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 4
The Shadow Brokers: Hacker group that published several leaks
containing hacking tools.
Some of those tools are associated to a global and domestic(US)
surveillance efforts, especially related to Equation Group
https://en.wikipedia.org/wiki/The_Shadow_Brokers
https://en.wikipedia.org/wiki/
Global_surveillance_disclosures_(2013%E2%80%93present)
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 5
Equation Group: known as one of the most sophisticated cyber-attack groups in
the world. About 60 actors.
• How sophisticated? Malwares capable of reprogramming a hard disk
drive firmware.
• What can they do with it? ability to infect and transmitted through
the hard drive firmware of several of the major hard drive manufacturers.
• Bonus: creating and use hidden disk areas and virtual disk systems for its purposes
• How much malware they wrote: about 500 malware infections in more
than 42 countries.
• Sponsored Attacks? Really? Timestamps in the malware seem to indicate
that programmers worked Monday-Friday 08:00-17:00
https://en.wikipedia.org/wiki/Equation_Group
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 6
Some of the tools/vulnerability they used are related to toolbox that used by a
group dubbed Advanced Network Technology
• BULLDOZER: hidden wireless bridge
• CANDYGRAM: tripwire device that emulates a GSM cellphone tower.
• DEITYBOUNCE: Technology that installs a backdoor software implant on Dell PowerEdge servers
• DROPOUTJEEP: "A software implant for the Apple iPhone that utilizes modular mission applications to
provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from
the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower
location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data
connection. All communications with the implant will be covert and encrypted.
• IRONCHEF: Technology that can "infect" networks by installing itself in a computer I/O BIOS
• JETPLOW: Firmware that can be implant to create a permanent backdoor in a Cisco PIX series and ASA
firewalls
• NIGHTSTAND: Portable system that wirelessly installs Microsoft Windows exploits from a distance of up
to eight miles
• TOTEGHOSTLY: Software that can be implanted on a Windows mobile phone allowing full remote control.
* There are 48 known tools at ANT Toolbox: https://en.wikipedia.org/wiki/
NSA_ANT_catalog
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 7
there’s | more…
Some unknown tools (so far for some people) leaked by Shadow
Brokers:
• DEWDROP
• INCISION
• JACKLADDER
• ORANGUTAN
• PATCHICILLIN
• RETICULUM
• SIDETRACK
• STOCSURGEO
I’ll let you do your own research on this on.
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 8
Shadow Brokers, August, 16: Alleged they hacked in to
Equation Group and that they have their cyber weapons;
“
”
So, back to Shadow Brokers
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 9
There are 5 main leaks associated with Shadow Brokers:
 
• First leak: "Equation Group Cyber Weapons Auction - Invitation": the one I just
mentioned before;
• Second Leak: "Message #5 - TrickOrTreat"
• Third Leak: "Message #6 - BLACK FRIDAY / CYBER MONDAY SALE"
• Fourth Leak: "Don't Forget Your Base"
• Fifth Leak: "Lost in Translation": This leak includes, amongst other things, the tools and
exploits codenamed: DANDERSPIRITZ, ODDJOB, FUZZBUNCH, DARKPULSAR,
ETERNALSYNERGY, ETERNALROMANCE, ETERNALBLUE, EXPLODINGCAN and EWOKFRENZY.
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 10
• …Fifth Leak: "Lost in Translation": Exploits and utilities
EARLYSHOVEL RedHat 7.0 - 7.1 Sendmail 8.11.x exploit
EBBISLAND (EBBSHAVE) root RCE via RPC XDR overflow in Solaris 6, 7, 8, 9 & 10 (possibly newer) both SPARC
and x86.
ECHOWRECKER remote Samba 3.0.x Linux exploit.
EASYBEE appears to be an MDaemon email server vulnerability
EASYFUN EasyFun 2.2.0 Exploit for WDaemon / IIS MDaemon/WorldClient pre 9.5.6
EASYPI is an IBM Lotus Notes exploit that gets detected as Stuxnet
EWOKFRENZY is an exploit for IBM Lotus Domino 6.5.4 & 7.0.2
EXPLODINGCAN is an IIS 6.0 exploit that creates a remote backdoor
ETERNALROMANCE is a SMB1 exploit over TCP port 445 which targets XP, 2003, Vista, 7, Windows 8, 2008,
2008 R2, and gives SYSTEM privileges (MS17-010)
EDUCATEDSCHOLAR is a SMB exploit (MS09-050)
EMERALDTHREAD is a SMB exploit for Windows XP and Server 2003 (MS10-061)
EMPHASISMINE is a remote IMAP exploit for IBM Lotus Domino 6.6.4 to 8.5.2
ENGLISHMANSDENTIST sets Outlook Exchange WebAccess rules to trigger executable code on the client's
side to send an email to other users
EPICHERO 0-day exploit (RCE) for Avaya Call Server
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 11
• …Fifth Leak: "Lost in Translation": Exploits and utilities
ERRATICGOPHER is a SMBv1 exploit targeting Windows XP and Server 2003
ETERNALSYNERGY is a SMBv3 remote code execution flaw for Windows 8 and Server 2012 SP0 (MS17-010)
ETERNALBLUE is a SMBv2 exploit for Windows 7 SP1 (MS17-010)
ETERNALCHAMPION is a SMBv1 exploit
ESKIMOROLL is a Kerberos exploit targeting 2000, 2003, 2008 and 2008 R2 domain controllers
ESTEEMAUDIT is an RDP exploit and backdoor for Windows Server 2003
ECLIPSEDWING is an RCE exploit for the Server service in Windows Server 2008 and later (MS08-067)
ETRE is an exploit for IMail 8.10 to 8.22
ETCETERABLUE is an exploit for IMail 7.04 to 8.05
FUZZBUNCH is an exploit framework, similar to MetaSploit
ODDJOB is an implant builder and C&C server that can deliver exploits for Windows 2000 and later, also not
detected by any AV vendors
EXPIREDPAYCHECK IIS6 exploit
EAGERLEVER NBT/SMB exploit for Windows NT4.0, 2000, XP SP1 & SP2, 2003 SP1 & Base Release
EASYFUN WordClient / IIS6.0 exploit
ESSAYKEYNOTE
EVADEFRED
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 12
• …Fifth Leak: "Lost in Translation": Exploits and utilities
PASSFREELY utility which "Bypasses authentication for Oracle servers"
SMBTOUCH check if the target is vulnerable to samba exploits like ETERNALSYNERGY, ETERNALBLUE,
ETERNALROMANCE
ERRATICGOPHERTOUCH Check if the target is running some RPC
IISTOUCH check if the running IIS version is vulnerable
RPCOUTCH get info about windows via RPC
DOPU used to connect to machines exploited by ETERNALCHAMPIONS
NAMEDPIPETOUCH Utility to test for a predefined list of named pipes, mostly AV detection. User can add
checks for custom named pipes.
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 13
Some exploits targeting the Windows operating system, has been patched
with Microsoft Security Bulletin on March 14, 2017, one month before the
leak occurred. One of them was MS17-010.
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 14
WannaCry in a nutshell
The WannaCry ransomware, also known as Wanna Decryptor, leverages
a Windows SMB exploit, dubbed EternalBlue, that allows a remote
hacker to hijack computers running on unpatched Microsoft Windows
operating system.



Once infected, WannaCry also scans for other unpatched PCs connected
to the same local network, as well as scans random hosts on the wider
Internet, to spread itself quickly.
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 15
Why is it so nasty?
 
WannaCry doesn’t rely on the traditional vector for ransomware, email
phishing attacks. Instead, it spreads like a worm from infected system to
infected system by scanning heavily over TCP port 445 (Server Message
Block/SMB), then encrypting files.
 
http://thehackernews.com/2017/05/how-to-wannacry-ransomware.html
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 16
How was it WW
Day 1: Cryout — WannaCry targeted over 200,000 computers in 120
countries.
Day 2: The Patch Day — A security researcher successfully found a way to
slow down the infection rate, and meanwhile, Microsoft releases
emergency patch updates for unsupported versions of Windows (back to
Windows XP but not to Windows 2000).
Day 3: New Variants Arrives — Some new variants of WannaCry, with and
without a kill-switch, were detected in the wild would be difficult to stop
for at least next few weeks.
 
Source: http://thehackernews.com/2017/05/how-to-wannacry-
ransomware.html
 
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 17
Day 4, Day 5, … craziness
Many computers at Day 5 wasn`t patched yet. Many servers with Windows
2000 still doesn`t have a contingency plan, AVs disabled, out-of-day, not
communicating with console…
 
Day 6: Adylkuzz shows up to the public. Some Intel services talked about
this malware back in April 24th. This little dude use PCs to mine
cryptocurrency “Monero” (good thing about it? To avoid reinfection on the
same computer Adylkuzz disables SMB, so is a computer is infected with
Adylkuzz it will not be infected by WannaCry)
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 18
This cyber-attack brought down many organisations to
their knees
“
”somebody
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 19
What else to expect:
Back in time:
Fifth Leak: "Lost in Translation": This leak includes, amongst other
things, the tools and exploits codenamed: DANDERSPIRITZ, ODDJOB,
FUZZBUNCH, DARKPULSAR, ETERNALSYNERGY, ETERNALROMANCE,
ETERNALBLUE, EXPLODINGCAN and EWOKFRENZY.
There’s | more.
Get Ready for the 'Wine of Month Club'
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 20
Wine of month club
So, anyone buying the membership of the "wine of month club" would
be able to get exclusive access to the upcoming leaks, which the Shadow
Brokers claims would include:

• Exploits for web browsers, routers, and smartphones.
• Exploits for operating systems, including Windows 10.
• Compromised data from banks and Swift providers.
• Stolen network information from Russian, Chinese, Iranian, and North
Korean nuclear missile programs.
https://steemit.com/shadowbrokers/@theshadowbrokers/oh-lordy-
comey-wanna-cry-edition
 
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 21
The Vault 
7 March 2017: WikiLeaks released a series of leaks code-named “Vault
7” that compromises 8.761 documents and files. It includes dozens of
malwares targeting iPhone, Android, SmartTVs and Windows.
 
Main concerns now are related to 2 Malware Frameworks
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 22
The Vault 
7 March 2017: WikiLeaks released a series of leaks code-named “Vault
7” that compromises 8.761 documents and files. It includes dozens of
malwares targeting iPhone, Android, SmartTVs and Windows.
 
Main concerns now are related to 2 Malware Frameworks
• AfterMidnight
• Assassin
Those are not simple exploits. Both tools are entire Frameworks,
exploitation, persistence, C&C etc.
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 23
AfterMidnight – Malware Framework
AfterMidnight is a DLL that self-persists as a Windows Service DLL and provides secure execution of “Gremlins”
via a HTTPS based Listening Post (LP).
Once installed on a target machine AM will call back to a configured LP on a configurable schedule, checking
to see if there is a new plan for it to execute. If there is, it downloads and stores all needed components
before loading all new gremlins in memory. https://wikileaks.org/vault7/document/
AfterMidnight_v1_0_Users_Guide
 
Assassin – Malware Framework
Assassin consists of four subsystems: Implant, Builder, Command and Control, and Listening Post.
The ‘Implant‘ provides the core logic and functionality of this tool on a target Windows machine, including
communications and task execution. It is configured using the ‘Builder’ and deployed to a target computer via
some undefined vector.
The ‘Builder‘ configures Implant and ‘Deployment Executables’ before deployment and “provides a custom
command line interface for setting the Implant configuration before generating the Implant,” reads the tool’s user
guide.
The ‘Command and Control‘ subsystem acts as an interface between the operator and the Listening Post (LP),
while the LP allows the Assassin Implant to communicate with the command and control subsystem through a
web server.
https://wikileaks.org/vault7/document/Assassin_v1_4_Users_Guide/
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 24
Hive (Vault 8 leak) November 9th 2017
https://wikileaks.org/vault8/
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 25
How nasty can it be?
 
It will probably depend on how much of those things you will do:
 
• “Doing-nothingness”
• “Doing-sameness”
• “It will not happeness”
• “I'm okness”
• “No needness”
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 26
Ligue Dja!
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 27
Is machine learning alone the answer?
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 28
Is machine learning alone the answer?
https://www.popsci.com/byzantine-science-deceiving-artificial-intelligence
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 29
Don’t trust machines 100% - remember Skynet!
https://www.popsci.com/byzantine-science-deceiving-artificial-intelligence
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 30
How to prevent from those new attacks?
… I really don't know. But no need to run to the mountains or get back
to the typewriter.
 
…. What I know is that you need to work on your security maturity
posture.
Assess your organization, run cyber hygiene, strong patching program,
backup & education.
MCAFEE CONFIDENTIAL 31
Efficacy vs Time
MCAFEE CONFIDENTIAL 32
Protection-only strategy is a terrible mistake
Investing time and energy in Protection only is not enough!!
Look in the past!
 
Find a balance on protection, detection and remediation
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 33
Clarity is the key to take decisions
Assess your organization against some security framework to measure your
security maturity (compare what you have with something)
All basic things such: ISO 27.002, NIST, COBIT, SOX, CRITICAL CONTROLS have to be
covered.
Understating where you are at, define were you want to be (select your taste for
risk)
Create a Plan A and follow this plan till the end
Plan B should be all about reinforcing Plan A
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 34
Have an Incident Response Plan in place (tested)
How to act in front of an incident
from call-tree, war-room to IR “how-to documents” for the most important areas
Why is it important to test?
 
No train, no gain. Cyber Security posture is like a muscle, you have to be trained to
understand how to act.
 
• Dry Run Exercises…
• Malware infection
• DDoS
• Social Engineering
 
Consider having some Honeypots, Honeypots networks, etc.
 
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 35
Consider some Intel for your Security Operation
• “Fresh” and “Good” Info
• Malware Analysis
• Mitigation Strategies
 
* during WannaCry incident many companies was still trying to figure out
what happened 10 hours after the first infection (some of them are still
trying)
Phone Call 15:00 Friday, 12 May:
customer: “What is happening to my network?”
me: “Turn your TV on”
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 36
Know what your Security Tools are able to do. Understand it. Do some
homework. Ask for help before something bad happen. If you don't
invest in education now, I’ll charge you much more to do incident
response ☺
 
Keep your security tools basics working
• Communications
• Repositories
• Versions
• Dashboards
• Reports
Come on. Security Tools aren’t cheap. Block and forget is the worst thing
you could do with your security investment.
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 37
You plan should also consider some hardening.
 
You know how much customer who did some SMB hardening got
infected by WannaCry? : None
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 38
What about products?
Presentations is kinda ending… you not selling any product?
 
It’s not about products!. it’s how you connect the dots!
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 39
You may need products! Of course!
Consider some whitelisting type of technology for some sort of systems
such the ones with fixed functions.
 
I might say you could have some sandboxing tool to help you out too.
Webgateway with antimalware, Data Loss Prevention Program in place,
SIEM solution, and so forth but…
Play by programs not by projects. See the big picture first!
that’s for another presentation
Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 40
No one person, product or organization can fight cybercrime
alone.
Collaborative attitude is the only way to overcame the greatest
challenge of the digital age – cybercrime
Thank you
End.
MCAFEE CONFIDENTIAL
McAfee, the McAfee logo and [insert <other relevant McAfee Names>] are trademarks or registered trademarks of McAfee LLC or its subsidiaries in the U.S. and/or other countries.
Other names and brands may be claimed as the property of others.
Copyright © 2017 McAfee LLC.
41

More Related Content

What's hot

Wannacry | Technical Insight and Lessons Learned
Wannacry | Technical Insight and Lessons LearnedWannacry | Technical Insight and Lessons Learned
Wannacry | Technical Insight and Lessons LearnedThomas Roccia
 
How to prevent WannaCry Ransomware
How to prevent WannaCry RansomwareHow to prevent WannaCry Ransomware
How to prevent WannaCry RansomwareSeminar Links
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomwareJawhar Ali
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011 Trend Micro
 
How to protect your business from Wannacry Ransomware
How to protect your business from Wannacry RansomwareHow to protect your business from Wannacry Ransomware
How to protect your business from Wannacry RansomwareKaspersky
 
What is wanna cry ransomware attack
What is wanna cry ransomware attackWhat is wanna cry ransomware attack
What is wanna cry ransomware attacki-engage
 
Beveilig je data met windows 10
Beveilig je data met windows 10 Beveilig je data met windows 10
Beveilig je data met windows 10 Avanade Nederland
 
Shamoon attacks - Destructive malware targeting Middle East organizations
Shamoon attacks - Destructive malware targeting Middle East organizationsShamoon attacks - Destructive malware targeting Middle East organizations
Shamoon attacks - Destructive malware targeting Middle East organizationsSymantec Security Response
 
Wannacry & Petya ransomware
Wannacry & Petya ransomwareWannacry & Petya ransomware
Wannacry & Petya ransomwareRaghavendra P.V
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...HackIT Ukraine
 
Preventing lateral spread of ransomware
Preventing lateral spread of ransomwarePreventing lateral spread of ransomware
Preventing lateral spread of ransomwareOsirium Limited
 
Wannacry-A Ransomware Attack
Wannacry-A Ransomware AttackWannacry-A Ransomware Attack
Wannacry-A Ransomware AttackMahimaVerma28
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing ThreatNick Miller
 

What's hot (20)

WannaCry? No Thanks!
WannaCry? No Thanks!WannaCry? No Thanks!
WannaCry? No Thanks!
 
Wannacry | Technical Insight and Lessons Learned
Wannacry | Technical Insight and Lessons LearnedWannacry | Technical Insight and Lessons Learned
Wannacry | Technical Insight and Lessons Learned
 
How to prevent WannaCry Ransomware
How to prevent WannaCry RansomwareHow to prevent WannaCry Ransomware
How to prevent WannaCry Ransomware
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomware
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011
 
WannaCry Ransomware
 WannaCry Ransomware WannaCry Ransomware
WannaCry Ransomware
 
Ransomware: Wannacry
Ransomware: WannacryRansomware: Wannacry
Ransomware: Wannacry
 
How to protect your business from Wannacry Ransomware
How to protect your business from Wannacry RansomwareHow to protect your business from Wannacry Ransomware
How to protect your business from Wannacry Ransomware
 
What is wanna cry ransomware attack
What is wanna cry ransomware attackWhat is wanna cry ransomware attack
What is wanna cry ransomware attack
 
Beveilig je data met windows 10
Beveilig je data met windows 10 Beveilig je data met windows 10
Beveilig je data met windows 10
 
Analysing Ransomware
Analysing RansomwareAnalysing Ransomware
Analysing Ransomware
 
Ransomware 2017: New threats emerge
Ransomware 2017: New threats emergeRansomware 2017: New threats emerge
Ransomware 2017: New threats emerge
 
Ransomware
RansomwareRansomware
Ransomware
 
Skywiper
SkywiperSkywiper
Skywiper
 
Shamoon attacks - Destructive malware targeting Middle East organizations
Shamoon attacks - Destructive malware targeting Middle East organizationsShamoon attacks - Destructive malware targeting Middle East organizations
Shamoon attacks - Destructive malware targeting Middle East organizations
 
Wannacry & Petya ransomware
Wannacry & Petya ransomwareWannacry & Petya ransomware
Wannacry & Petya ransomware
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
 
Preventing lateral spread of ransomware
Preventing lateral spread of ransomwarePreventing lateral spread of ransomware
Preventing lateral spread of ransomware
 
Wannacry-A Ransomware Attack
Wannacry-A Ransomware AttackWannacry-A Ransomware Attack
Wannacry-A Ransomware Attack
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 

Similar to Palestra Jeferson Propheta - Wanna Cry more

The EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsThe EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsAndrea Bissoli
 
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...PaloAltoNetworks
 
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
The Seven Most Dangerous New Attack Techniques, and What's Coming NextThe Seven Most Dangerous New Attack Techniques, and What's Coming Next
The Seven Most Dangerous New Attack Techniques, and What's Coming NextPriyanka Aash
 
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
The Seven Most Dangerous New Attack Techniques, and What's Coming NextThe Seven Most Dangerous New Attack Techniques, and What's Coming Next
The Seven Most Dangerous New Attack Techniques, and What's Coming NextPriyanka Aash
 
How to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsHow to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsAll Things Open
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network SecurityHarish Chaudhary
 
Comparative Study of Fileless Ransomware
Comparative Study of Fileless RansomwareComparative Study of Fileless Ransomware
Comparative Study of Fileless Ransomwareijtsrd
 
Mobile security
Mobile securityMobile security
Mobile securityStefaan
 
Analysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin AttackAnalysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin AttackGavin Davey
 
Malware's Most Wanted: Linux and Internet of Things Malware
Malware's Most Wanted: Linux and Internet of Things MalwareMalware's Most Wanted: Linux and Internet of Things Malware
Malware's Most Wanted: Linux and Internet of Things MalwareCyphort
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008ClubHack
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008ClubHack
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CDamiable_indian
 
Hacking Exposed: The Mac Attack
Hacking Exposed: The Mac AttackHacking Exposed: The Mac Attack
Hacking Exposed: The Mac AttackPriyanka Aash
 
Hacking Exposed: The Mac Attack
Hacking Exposed: The Mac AttackHacking Exposed: The Mac Attack
Hacking Exposed: The Mac AttackPriyanka Aash
 

Similar to Palestra Jeferson Propheta - Wanna Cry more (20)

The EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsThe EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systems
 
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
 
Hacking and its Defence
Hacking and its DefenceHacking and its Defence
Hacking and its Defence
 
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
The Seven Most Dangerous New Attack Techniques, and What's Coming NextThe Seven Most Dangerous New Attack Techniques, and What's Coming Next
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
 
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
The Seven Most Dangerous New Attack Techniques, and What's Coming NextThe Seven Most Dangerous New Attack Techniques, and What's Coming Next
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
 
Code protection
Code protectionCode protection
Code protection
 
How to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsHow to 2FA-enable Open Source Applications
How to 2FA-enable Open Source Applications
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
 
Comparative Study of Fileless Ransomware
Comparative Study of Fileless RansomwareComparative Study of Fileless Ransomware
Comparative Study of Fileless Ransomware
 
Mobile security
Mobile securityMobile security
Mobile security
 
Analysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin AttackAnalysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin Attack
 
Malware's Most Wanted: Linux and Internet of Things Malware
Malware's Most Wanted: Linux and Internet of Things MalwareMalware's Most Wanted: Linux and Internet of Things Malware
Malware's Most Wanted: Linux and Internet of Things Malware
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
 
Hacking Exposed: The Mac Attack
Hacking Exposed: The Mac AttackHacking Exposed: The Mac Attack
Hacking Exposed: The Mac Attack
 
Hacking Exposed: The Mac Attack
Hacking Exposed: The Mac AttackHacking Exposed: The Mac Attack
Hacking Exposed: The Mac Attack
 

More from BHack Conference

Palestra William Costa - Pentester Raiz vs Pentester Goumert
Palestra William Costa - Pentester Raiz vs Pentester GoumertPalestra William Costa - Pentester Raiz vs Pentester Goumert
Palestra William Costa - Pentester Raiz vs Pentester GoumertBHack Conference
 
Palestra Daniel Peres - Modelo de Responsabilidade compartilhada AWS e as imp...
Palestra Daniel Peres - Modelo de Responsabilidade compartilhada AWS e as imp...Palestra Daniel Peres - Modelo de Responsabilidade compartilhada AWS e as imp...
Palestra Daniel Peres - Modelo de Responsabilidade compartilhada AWS e as imp...BHack Conference
 
Palestra Murilo Santana - Ownando sistemas por uma porta USB
Palestra Murilo Santana - Ownando sistemas por uma porta USBPalestra Murilo Santana - Ownando sistemas por uma porta USB
Palestra Murilo Santana - Ownando sistemas por uma porta USBBHack Conference
 
Palestra Tony Rodrigues - OctaneLabs WarpSpeed Project – Computação Forense e...
Palestra Tony Rodrigues - OctaneLabs WarpSpeed Project – Computação Forense e...Palestra Tony Rodrigues - OctaneLabs WarpSpeed Project – Computação Forense e...
Palestra Tony Rodrigues - OctaneLabs WarpSpeed Project – Computação Forense e...BHack Conference
 
Palestra Pedro Lopes e Victor Martins - Incidentes na Segurança da Informação...
Palestra Pedro Lopes e Victor Martins - Incidentes na Segurança da Informação...Palestra Pedro Lopes e Victor Martins - Incidentes na Segurança da Informação...
Palestra Pedro Lopes e Victor Martins - Incidentes na Segurança da Informação...BHack Conference
 
Palestra Lucas França - 802.1x e 802.1ae
Palestra Lucas França - 802.1x e 802.1aePalestra Lucas França - 802.1x e 802.1ae
Palestra Lucas França - 802.1x e 802.1aeBHack Conference
 
Palestra Walter Capanema - Liberdade de expressão na internet
Palestra Walter Capanema - Liberdade de expressão na internet Palestra Walter Capanema - Liberdade de expressão na internet
Palestra Walter Capanema - Liberdade de expressão na internet BHack Conference
 
Palestra Regilberto Girão - Segurança digital em camadas – Digital layered se...
Palestra Regilberto Girão - Segurança digital em camadas – Digital layered se...Palestra Regilberto Girão - Segurança digital em camadas – Digital layered se...
Palestra Regilberto Girão - Segurança digital em camadas – Digital layered se...BHack Conference
 
Palestra Rafael Correia - O que eu deveria ter aprendido sobre segurança na g...
Palestra Rafael Correia - O que eu deveria ter aprendido sobre segurança na g...Palestra Rafael Correia - O que eu deveria ter aprendido sobre segurança na g...
Palestra Rafael Correia - O que eu deveria ter aprendido sobre segurança na g...BHack Conference
 

More from BHack Conference (9)

Palestra William Costa - Pentester Raiz vs Pentester Goumert
Palestra William Costa - Pentester Raiz vs Pentester GoumertPalestra William Costa - Pentester Raiz vs Pentester Goumert
Palestra William Costa - Pentester Raiz vs Pentester Goumert
 
Palestra Daniel Peres - Modelo de Responsabilidade compartilhada AWS e as imp...
Palestra Daniel Peres - Modelo de Responsabilidade compartilhada AWS e as imp...Palestra Daniel Peres - Modelo de Responsabilidade compartilhada AWS e as imp...
Palestra Daniel Peres - Modelo de Responsabilidade compartilhada AWS e as imp...
 
Palestra Murilo Santana - Ownando sistemas por uma porta USB
Palestra Murilo Santana - Ownando sistemas por uma porta USBPalestra Murilo Santana - Ownando sistemas por uma porta USB
Palestra Murilo Santana - Ownando sistemas por uma porta USB
 
Palestra Tony Rodrigues - OctaneLabs WarpSpeed Project – Computação Forense e...
Palestra Tony Rodrigues - OctaneLabs WarpSpeed Project – Computação Forense e...Palestra Tony Rodrigues - OctaneLabs WarpSpeed Project – Computação Forense e...
Palestra Tony Rodrigues - OctaneLabs WarpSpeed Project – Computação Forense e...
 
Palestra Pedro Lopes e Victor Martins - Incidentes na Segurança da Informação...
Palestra Pedro Lopes e Victor Martins - Incidentes na Segurança da Informação...Palestra Pedro Lopes e Victor Martins - Incidentes na Segurança da Informação...
Palestra Pedro Lopes e Victor Martins - Incidentes na Segurança da Informação...
 
Palestra Lucas França - 802.1x e 802.1ae
Palestra Lucas França - 802.1x e 802.1aePalestra Lucas França - 802.1x e 802.1ae
Palestra Lucas França - 802.1x e 802.1ae
 
Palestra Walter Capanema - Liberdade de expressão na internet
Palestra Walter Capanema - Liberdade de expressão na internet Palestra Walter Capanema - Liberdade de expressão na internet
Palestra Walter Capanema - Liberdade de expressão na internet
 
Palestra Regilberto Girão - Segurança digital em camadas – Digital layered se...
Palestra Regilberto Girão - Segurança digital em camadas – Digital layered se...Palestra Regilberto Girão - Segurança digital em camadas – Digital layered se...
Palestra Regilberto Girão - Segurança digital em camadas – Digital layered se...
 
Palestra Rafael Correia - O que eu deveria ter aprendido sobre segurança na g...
Palestra Rafael Correia - O que eu deveria ter aprendido sobre segurança na g...Palestra Rafael Correia - O que eu deveria ter aprendido sobre segurança na g...
Palestra Rafael Correia - O que eu deveria ter aprendido sobre segurança na g...
 

Recently uploaded

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 

Recently uploaded (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 

Palestra Jeferson Propheta - Wanna Cry more

  • 1. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 1 WannaCry | More jp@mcafee.com
  • 2. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 2 # man @mcafee 30+ Security Engineers in Latin America • Intelligence Services (Including SOCs, Law enforcement Agencies) • Finance Fraud Prevention Group • DDoS and Defacement handler • Honey pot, phoney pot and honey network (sudo su -) • Incident Response 

  • 3. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 3 Shadow Brokers, August, 16: Alleged they hacked in to Equation Group and that they have their cyber weapons; “ ”
  • 4. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 4 The Shadow Brokers: Hacker group that published several leaks containing hacking tools. Some of those tools are associated to a global and domestic(US) surveillance efforts, especially related to Equation Group https://en.wikipedia.org/wiki/The_Shadow_Brokers https://en.wikipedia.org/wiki/ Global_surveillance_disclosures_(2013%E2%80%93present)
  • 5. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 5 Equation Group: known as one of the most sophisticated cyber-attack groups in the world. About 60 actors. • How sophisticated? Malwares capable of reprogramming a hard disk drive firmware. • What can they do with it? ability to infect and transmitted through the hard drive firmware of several of the major hard drive manufacturers. • Bonus: creating and use hidden disk areas and virtual disk systems for its purposes • How much malware they wrote: about 500 malware infections in more than 42 countries. • Sponsored Attacks? Really? Timestamps in the malware seem to indicate that programmers worked Monday-Friday 08:00-17:00 https://en.wikipedia.org/wiki/Equation_Group
  • 6. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 6 Some of the tools/vulnerability they used are related to toolbox that used by a group dubbed Advanced Network Technology • BULLDOZER: hidden wireless bridge • CANDYGRAM: tripwire device that emulates a GSM cellphone tower. • DEITYBOUNCE: Technology that installs a backdoor software implant on Dell PowerEdge servers • DROPOUTJEEP: "A software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted. • IRONCHEF: Technology that can "infect" networks by installing itself in a computer I/O BIOS • JETPLOW: Firmware that can be implant to create a permanent backdoor in a Cisco PIX series and ASA firewalls • NIGHTSTAND: Portable system that wirelessly installs Microsoft Windows exploits from a distance of up to eight miles • TOTEGHOSTLY: Software that can be implanted on a Windows mobile phone allowing full remote control. * There are 48 known tools at ANT Toolbox: https://en.wikipedia.org/wiki/ NSA_ANT_catalog
  • 7. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 7 there’s | more… Some unknown tools (so far for some people) leaked by Shadow Brokers: • DEWDROP • INCISION • JACKLADDER • ORANGUTAN • PATCHICILLIN • RETICULUM • SIDETRACK • STOCSURGEO I’ll let you do your own research on this on.
  • 8. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 8 Shadow Brokers, August, 16: Alleged they hacked in to Equation Group and that they have their cyber weapons; “ ” So, back to Shadow Brokers
  • 9. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 9 There are 5 main leaks associated with Shadow Brokers:   • First leak: "Equation Group Cyber Weapons Auction - Invitation": the one I just mentioned before; • Second Leak: "Message #5 - TrickOrTreat" • Third Leak: "Message #6 - BLACK FRIDAY / CYBER MONDAY SALE" • Fourth Leak: "Don't Forget Your Base" • Fifth Leak: "Lost in Translation": This leak includes, amongst other things, the tools and exploits codenamed: DANDERSPIRITZ, ODDJOB, FUZZBUNCH, DARKPULSAR, ETERNALSYNERGY, ETERNALROMANCE, ETERNALBLUE, EXPLODINGCAN and EWOKFRENZY.
  • 10. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 10 • …Fifth Leak: "Lost in Translation": Exploits and utilities EARLYSHOVEL RedHat 7.0 - 7.1 Sendmail 8.11.x exploit EBBISLAND (EBBSHAVE) root RCE via RPC XDR overflow in Solaris 6, 7, 8, 9 & 10 (possibly newer) both SPARC and x86. ECHOWRECKER remote Samba 3.0.x Linux exploit. EASYBEE appears to be an MDaemon email server vulnerability EASYFUN EasyFun 2.2.0 Exploit for WDaemon / IIS MDaemon/WorldClient pre 9.5.6 EASYPI is an IBM Lotus Notes exploit that gets detected as Stuxnet EWOKFRENZY is an exploit for IBM Lotus Domino 6.5.4 & 7.0.2 EXPLODINGCAN is an IIS 6.0 exploit that creates a remote backdoor ETERNALROMANCE is a SMB1 exploit over TCP port 445 which targets XP, 2003, Vista, 7, Windows 8, 2008, 2008 R2, and gives SYSTEM privileges (MS17-010) EDUCATEDSCHOLAR is a SMB exploit (MS09-050) EMERALDTHREAD is a SMB exploit for Windows XP and Server 2003 (MS10-061) EMPHASISMINE is a remote IMAP exploit for IBM Lotus Domino 6.6.4 to 8.5.2 ENGLISHMANSDENTIST sets Outlook Exchange WebAccess rules to trigger executable code on the client's side to send an email to other users EPICHERO 0-day exploit (RCE) for Avaya Call Server
  • 11. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 11 • …Fifth Leak: "Lost in Translation": Exploits and utilities ERRATICGOPHER is a SMBv1 exploit targeting Windows XP and Server 2003 ETERNALSYNERGY is a SMBv3 remote code execution flaw for Windows 8 and Server 2012 SP0 (MS17-010) ETERNALBLUE is a SMBv2 exploit for Windows 7 SP1 (MS17-010) ETERNALCHAMPION is a SMBv1 exploit ESKIMOROLL is a Kerberos exploit targeting 2000, 2003, 2008 and 2008 R2 domain controllers ESTEEMAUDIT is an RDP exploit and backdoor for Windows Server 2003 ECLIPSEDWING is an RCE exploit for the Server service in Windows Server 2008 and later (MS08-067) ETRE is an exploit for IMail 8.10 to 8.22 ETCETERABLUE is an exploit for IMail 7.04 to 8.05 FUZZBUNCH is an exploit framework, similar to MetaSploit ODDJOB is an implant builder and C&C server that can deliver exploits for Windows 2000 and later, also not detected by any AV vendors EXPIREDPAYCHECK IIS6 exploit EAGERLEVER NBT/SMB exploit for Windows NT4.0, 2000, XP SP1 & SP2, 2003 SP1 & Base Release EASYFUN WordClient / IIS6.0 exploit ESSAYKEYNOTE EVADEFRED
  • 12. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 12 • …Fifth Leak: "Lost in Translation": Exploits and utilities PASSFREELY utility which "Bypasses authentication for Oracle servers" SMBTOUCH check if the target is vulnerable to samba exploits like ETERNALSYNERGY, ETERNALBLUE, ETERNALROMANCE ERRATICGOPHERTOUCH Check if the target is running some RPC IISTOUCH check if the running IIS version is vulnerable RPCOUTCH get info about windows via RPC DOPU used to connect to machines exploited by ETERNALCHAMPIONS NAMEDPIPETOUCH Utility to test for a predefined list of named pipes, mostly AV detection. User can add checks for custom named pipes.
  • 13. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 13 Some exploits targeting the Windows operating system, has been patched with Microsoft Security Bulletin on March 14, 2017, one month before the leak occurred. One of them was MS17-010.
  • 14. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 14 WannaCry in a nutshell The WannaCry ransomware, also known as Wanna Decryptor, leverages a Windows SMB exploit, dubbed EternalBlue, that allows a remote hacker to hijack computers running on unpatched Microsoft Windows operating system.
 
 Once infected, WannaCry also scans for other unpatched PCs connected to the same local network, as well as scans random hosts on the wider Internet, to spread itself quickly.
  • 15. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 15 Why is it so nasty?   WannaCry doesn’t rely on the traditional vector for ransomware, email phishing attacks. Instead, it spreads like a worm from infected system to infected system by scanning heavily over TCP port 445 (Server Message Block/SMB), then encrypting files.   http://thehackernews.com/2017/05/how-to-wannacry-ransomware.html
  • 16. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 16 How was it WW Day 1: Cryout — WannaCry targeted over 200,000 computers in 120 countries. Day 2: The Patch Day — A security researcher successfully found a way to slow down the infection rate, and meanwhile, Microsoft releases emergency patch updates for unsupported versions of Windows (back to Windows XP but not to Windows 2000). Day 3: New Variants Arrives — Some new variants of WannaCry, with and without a kill-switch, were detected in the wild would be difficult to stop for at least next few weeks.   Source: http://thehackernews.com/2017/05/how-to-wannacry- ransomware.html  
  • 17. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 17 Day 4, Day 5, … craziness Many computers at Day 5 wasn`t patched yet. Many servers with Windows 2000 still doesn`t have a contingency plan, AVs disabled, out-of-day, not communicating with console…   Day 6: Adylkuzz shows up to the public. Some Intel services talked about this malware back in April 24th. This little dude use PCs to mine cryptocurrency “Monero” (good thing about it? To avoid reinfection on the same computer Adylkuzz disables SMB, so is a computer is infected with Adylkuzz it will not be infected by WannaCry)
  • 18. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 18 This cyber-attack brought down many organisations to their knees “ ”somebody
  • 19. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 19 What else to expect: Back in time: Fifth Leak: "Lost in Translation": This leak includes, amongst other things, the tools and exploits codenamed: DANDERSPIRITZ, ODDJOB, FUZZBUNCH, DARKPULSAR, ETERNALSYNERGY, ETERNALROMANCE, ETERNALBLUE, EXPLODINGCAN and EWOKFRENZY. There’s | more. Get Ready for the 'Wine of Month Club'
  • 20. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 20 Wine of month club So, anyone buying the membership of the "wine of month club" would be able to get exclusive access to the upcoming leaks, which the Shadow Brokers claims would include:
 • Exploits for web browsers, routers, and smartphones. • Exploits for operating systems, including Windows 10. • Compromised data from banks and Swift providers. • Stolen network information from Russian, Chinese, Iranian, and North Korean nuclear missile programs. https://steemit.com/shadowbrokers/@theshadowbrokers/oh-lordy- comey-wanna-cry-edition  
  • 21. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 21 The Vault  7 March 2017: WikiLeaks released a series of leaks code-named “Vault 7” that compromises 8.761 documents and files. It includes dozens of malwares targeting iPhone, Android, SmartTVs and Windows.   Main concerns now are related to 2 Malware Frameworks
  • 22. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 22 The Vault  7 March 2017: WikiLeaks released a series of leaks code-named “Vault 7” that compromises 8.761 documents and files. It includes dozens of malwares targeting iPhone, Android, SmartTVs and Windows.   Main concerns now are related to 2 Malware Frameworks • AfterMidnight • Assassin Those are not simple exploits. Both tools are entire Frameworks, exploitation, persistence, C&C etc.
  • 23. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 23 AfterMidnight – Malware Framework AfterMidnight is a DLL that self-persists as a Windows Service DLL and provides secure execution of “Gremlins” via a HTTPS based Listening Post (LP). Once installed on a target machine AM will call back to a configured LP on a configurable schedule, checking to see if there is a new plan for it to execute. If there is, it downloads and stores all needed components before loading all new gremlins in memory. https://wikileaks.org/vault7/document/ AfterMidnight_v1_0_Users_Guide   Assassin – Malware Framework Assassin consists of four subsystems: Implant, Builder, Command and Control, and Listening Post. The ‘Implant‘ provides the core logic and functionality of this tool on a target Windows machine, including communications and task execution. It is configured using the ‘Builder’ and deployed to a target computer via some undefined vector. The ‘Builder‘ configures Implant and ‘Deployment Executables’ before deployment and “provides a custom command line interface for setting the Implant configuration before generating the Implant,” reads the tool’s user guide. The ‘Command and Control‘ subsystem acts as an interface between the operator and the Listening Post (LP), while the LP allows the Assassin Implant to communicate with the command and control subsystem through a web server. https://wikileaks.org/vault7/document/Assassin_v1_4_Users_Guide/
  • 24. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 24 Hive (Vault 8 leak) November 9th 2017 https://wikileaks.org/vault8/
  • 25. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 25 How nasty can it be?   It will probably depend on how much of those things you will do:   • “Doing-nothingness” • “Doing-sameness” • “It will not happeness” • “I'm okness” • “No needness”
  • 26. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 26 Ligue Dja!
  • 27. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 27 Is machine learning alone the answer?
  • 28. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 28 Is machine learning alone the answer? https://www.popsci.com/byzantine-science-deceiving-artificial-intelligence
  • 29. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 29 Don’t trust machines 100% - remember Skynet! https://www.popsci.com/byzantine-science-deceiving-artificial-intelligence
  • 30. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 30 How to prevent from those new attacks? … I really don't know. But no need to run to the mountains or get back to the typewriter.   …. What I know is that you need to work on your security maturity posture. Assess your organization, run cyber hygiene, strong patching program, backup & education.
  • 32. MCAFEE CONFIDENTIAL 32 Protection-only strategy is a terrible mistake Investing time and energy in Protection only is not enough!! Look in the past!   Find a balance on protection, detection and remediation
  • 33. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 33 Clarity is the key to take decisions Assess your organization against some security framework to measure your security maturity (compare what you have with something) All basic things such: ISO 27.002, NIST, COBIT, SOX, CRITICAL CONTROLS have to be covered. Understating where you are at, define were you want to be (select your taste for risk) Create a Plan A and follow this plan till the end Plan B should be all about reinforcing Plan A
  • 34. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 34 Have an Incident Response Plan in place (tested) How to act in front of an incident from call-tree, war-room to IR “how-to documents” for the most important areas Why is it important to test?   No train, no gain. Cyber Security posture is like a muscle, you have to be trained to understand how to act.   • Dry Run Exercises… • Malware infection • DDoS • Social Engineering   Consider having some Honeypots, Honeypots networks, etc.  
  • 35. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 35 Consider some Intel for your Security Operation • “Fresh” and “Good” Info • Malware Analysis • Mitigation Strategies   * during WannaCry incident many companies was still trying to figure out what happened 10 hours after the first infection (some of them are still trying) Phone Call 15:00 Friday, 12 May: customer: “What is happening to my network?” me: “Turn your TV on”
  • 36. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 36 Know what your Security Tools are able to do. Understand it. Do some homework. Ask for help before something bad happen. If you don't invest in education now, I’ll charge you much more to do incident response ☺   Keep your security tools basics working • Communications • Repositories • Versions • Dashboards • Reports Come on. Security Tools aren’t cheap. Block and forget is the worst thing you could do with your security investment.
  • 37. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 37 You plan should also consider some hardening.   You know how much customer who did some SMB hardening got infected by WannaCry? : None
  • 38. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 38 What about products? Presentations is kinda ending… you not selling any product?   It’s not about products!. it’s how you connect the dots!
  • 39. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 39 You may need products! Of course! Consider some whitelisting type of technology for some sort of systems such the ones with fixed functions.   I might say you could have some sandboxing tool to help you out too. Webgateway with antimalware, Data Loss Prevention Program in place, SIEM solution, and so forth but… Play by programs not by projects. See the big picture first! that’s for another presentation
  • 40. Date, specific business group MCAFEE CONFIDENTIALITY LANGUAGE 40 No one person, product or organization can fight cybercrime alone. Collaborative attitude is the only way to overcame the greatest challenge of the digital age – cybercrime Thank you End.
  • 41. MCAFEE CONFIDENTIAL McAfee, the McAfee logo and [insert <other relevant McAfee Names>] are trademarks or registered trademarks of McAfee LLC or its subsidiaries in the U.S. and/or other countries. Other names and brands may be claimed as the property of others. Copyright © 2017 McAfee LLC. 41