SlideShare a Scribd company logo
Uncovering Micro-Targeted 
Malvertising Against US Defense 
Industrial Base 
WEBINAR 
OCTOBER 16, 2014 
PATRICK BELCHER, DIRECTOR OF SECURITY 
ANALYTICS, INVINCEA, INC.
Patrick Belcher, CISSP, CISM 
2 
• Analysis Team manager at Riptech, absorbed by 
Symantec in 2004. 
• Helped stand up the US-CERT for the DHS 
• Lead Cyber Security Analyst for FDIC 
• RSA/NetWitness 
• Cyber analysis and numerous Federal 
agencies including the State Department and 
Department of Defense 
• Performed incident response and analysis 
for several fortune 50 companies. 
• Invincea- Director of Security and Malware 
Analytics
Agenda 
Thanks for Attending this Webinar! Today we will discuss: 
• Operation DeathClick: Attacks Against the US Defense Industrial 
Base 
• How Advanced Adversaries are Using Micro-Targeting techniques 
via Malvertising to Target Your Enterprise 
• How Real Time Bidding Works 
• How do malvertisers choose targets? 
• How do malvertisers setup their malware delivery? 
• How to Protect your organization against Targeted Malvertising
Operation DeathClick 
• Invincea discovered a concerted campaign 
against US Defense companies 
• Operation DeathClick represents a 
blending of traditional cyber-crime 
techniques (malvertising) with APT 
targeting and objectives 
• Expect campaign will soon be used to 
target other sectors: financial, Federal, 
manufacturing, healthcare, etc. 
• Leverages advertising networks on ad-supported 
web sites to compromise 
specific company networks 
• The TTPs involved in DeathClick evade 
almost all network-based and traditional 
endpoint controls. There is no patch for 
this TTP.
Micro-Targeting: How Targeted 
Can it Be? 
You can push targeted ads to: 
• A Region 
• A City 
• A Neighborhood 
• Type of shopper 
• Gender-specific Ads 
• Industry Vertical 
• Specific Corporation 
• Captive Audience/Wireless Tower 
• Specific peoples’ Mobile platform 
• Any combination of the Above 
A couple of scenarios…. 
• Activism 
• Product Placement 
• Special Audience 
• Network intrusion
Targeting the US Defense 
Industrial Base: Dawn.com 
DAWN.COM
Targeting the US Defense 
Industrial Base: 
PsychCentral.com 
PSYCHCENTRAL.COM
Targeting the US Defense 
Industrial Base: 
FleaFlicker.com 
FLEAFLICKER.COM
Targeting the US Defense 
Industrial Base: GPokr.com 
GPOKR.COM
Targeting the US Defense 
Industrial Base: EarthLink 
EARTHLINK.COM
Traditional Web Advertising 
• Ads were once sold in bulk. 
Advertisers paid by the number 
of viewer impressions 
delivered. 
• Advertisers paid more money if 
the ad is clicked. 
• Actual Ad content is hosted 
elsewhere. 
• Advertisers chose which sites 
to deliver ad content. 
Drawbacks: 
• Indiscriminate 
• Costly 
• No great ROI 
• Easily Abused
Now Ads are Targeted 
Ironic targeted ad by Ad Targeting 
Company. This ad is a result of my 
research into ad bidding. 
(cookie based) 
This ad delivery targeted me based on my IP 
address location in Orlando, FL 
(GEO-IP based)
How Does Ad Targeting Work? 
Big Data! 
• Ad Slots Provide the Real 
Estate, Typically 
Doubleclick 
• Other Ad Services and 
Intelligence Services 
Enhance Targeting 
Neustar, Facebook, Twitter, Pubmatic and Others Sell IP intelligence to Ad 
Networks. 
Ad Networks now sell targeted ads for Advertisers
RTB is Now Standard 
Ad placement has evolved. Ad networks now run 
based on Real-Time Ad Bidding. 
Backend Auction happens in milliseconds 
Less expensive than bulk impression buys
Targeted Advertising Too 
Creepy? 
Who knows more about you? Ad networks or the NSA? 
Now Malvertisers Have the Power of RTB Targeting and they are coming after 
YOU!
Evading Traditional Defenses 
The ability to select a target for compromise and the ease of the execution 
via RTB malvertising is known as “micro-targeting via malvertising.” 
Without Advanced host protection, this attack is over 95% successful! 
• Avoids Proxy blacklists 
• Avoids AV detection 
• Bypasses most advanced malware interception 
• See the Invincea Snipertising Whitepaper for full details 
Operation DeathClick (Case Study Available) 
Large Defense and Aerospace contractors targeted by RTB for penetration 
Malvertising delivered via: 
• Pakistani News Outlet 
• Fantasy Football Site 
• Webmail Ads 
• Any advertising supported site 
Attacks bypassed superior defense in depth controls including web 
proxies were stopped by Invincea
Exploited: TheBlaze.com 
12 Ads on Homepage! 
Pubmatic redirects to 
GumGum 
Drops Kryptik- changing 
hashes
Exploited: ShootersForum 
Shootersforum: 
Openx RTB bid 
redirects to in.ua free 
host; drops exploit kit 
that pops Silverlight
Exploited: Trade2win.com 
Trade2win.com: 
Oxygenmedia ad 
bid redirects to 
German ad 
provider, drops 
bundler malware.
Exploited: Answers.com 
Answers.com: 
Clickbait articles drop Kryptik 
Hashes constantly change 
Malware delivered from 
compromised Polish 
government sites.
How Hard is it to do Targeted 
Malvertising? 
From SiteScout: You got cash, you can create your own landing pages and 
begin bidding.
What Much does a Targeted 
Malvertisement Bid cost? 
65 cents! 
Log File from Winning bid against Cox IP Address to drop 
Trojan: 
http://delivery.firstimpression.com/delivery?action=serve& 
ssp_id=3&ssp_wsid=2191400908&dssp_id=100&domain 
_id=2191400908&ad_id=748271&margin=0.4&cid=15538 
0&bn=sj14&ip_addr=24.234.123.133&ua=1540937276&to 
p_level_id=24.234.123.133&second_level_id=154093727 
6&page=thanhniennews.com&retargeted=null&height=90 
&width=728&idfa=null&android_id=null&android_ad_id=n 
ull&bid_price=0.654&count_notify=1&win_price=$AAABS 
MPg1dmFEPqXEZe5_CYviub3uOlabldGew
Funding a Micro-Targeted 
Malvertising Campaign 
• Click Fraud funds the operation. Logs 
show fake Chrome installed in Java 
cache to click on ad banners. 
• Kyle and Stan malvertising uses bundled 
malware and referral abuse to generate 
cash. 
• Chrome and bundled programs evade AV 
detection. 
• Bundled programs spy on endpoints to 
improve ad targeting.
Where Malvertisers Host 
Exploit Landing Pages 
• Compromised WordPress Blogs 
• Unconfigured Apache hosts 
• Cloud-based NGINX subdirectories 
• Government and News pages in Poland 
• Free Hosting sites such as ua.in 
To avoid proxy blacklisting, landing pages are unique and only online for 
minutes. 
To avoid AV or hash detection, exploits employ unique names and hashes 
Landing exploit kits currently focused on cash generation, but can easily 
be converted to exfiltration or banking kits.
Protect Yourself from 
Malvertising 
• Deploy Invincea on 
EndPoints 
Or 
• Disallow external web re-direction. 
• Demand change in the ad 
network business 
• OptOut 
Only 636 Targeting Ad 
Companies to opt out from! 
http://www.rubiconproject.com 
/privacy/consumer-online-profile- 
and-opt-out/ 
http://preferences-mgr. 
truste.com/ 
http://www.ghosteryenterprise.
Invincea Threat Protection 
• Contain all web-based attacks in secure virtual containers 
• Collect threat forensics on attack 
• Protect against known, unknown, and 0-day threats without requiring 
signatures
Free Invincea Research 
Edition 
Each detection shown in this presentation is available for 
online viewing in the Invincea Research Edition Portal. 
Sign up for the Research Edition and get a free licensed 
copy of Invincea FreeSpace Research Edition. Click 
without fear.
Special Thanks and Resources 
Invincea Whitepaper on Real Time Ad Bidding 
Invincea Case Study: RTB Targeting Defense Industry 
Threatpost Kyle and Stan Analysis http://threatpost.com/kyle-and-stan-malvertising-network- 
nine-times-bigger-than-first-reported/108435
Q&A Session 
Invincea Research Edition: www.invincea.com/research-edition 
Webinar Recording + Slide deck: 
Demo Request: http://www.invincea.com/get-protected/enterprise-request-form
Thank you! 
Invincea @Invincea 
Patrick Belcher 
@BelchSpeak

More Related Content

What's hot

Invincea: Reasoning in Incident Response in Tapio
Invincea: Reasoning in Incident Response in TapioInvincea: Reasoning in Incident Response in Tapio
Invincea: Reasoning in Incident Response in Tapio
Invincea, Inc.
 
Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attacker
bugcrowd
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
Priyanka Aash
 
SANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat IntelligenceSANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat Intelligence
Jason Trost
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptions
Tim Mackey
 
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing Presentation
Chris Gates
 
The 4 Levels of Open Source Risk Management
The 4 Levels of Open Source Risk ManagementThe 4 Levels of Open Source Risk Management
The 4 Levels of Open Source Risk Management
Black Duck by Synopsys
 
Introduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivismIntroduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivism
Global Micro Solutions
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
Tim Mackey
 
TTPs for Threat hunting In Oil Refineries
TTPs for Threat hunting In Oil RefineriesTTPs for Threat hunting In Oil Refineries
TTPs for Threat hunting In Oil Refineries
Dragos, Inc.
 
Persistence is Key: Advanced Persistent Threats
Persistence is Key: Advanced Persistent ThreatsPersistence is Key: Advanced Persistent Threats
Persistence is Key: Advanced Persistent Threats
Sameer Thadani
 
Secure application deployment in Apache CloudStack
Secure application deployment in Apache CloudStackSecure application deployment in Apache CloudStack
Secure application deployment in Apache CloudStack
Tim Mackey
 
Security in the Age of Open Source
Security in the Age of Open SourceSecurity in the Age of Open Source
Security in the Age of Open Source
Black Duck by Synopsys
 
Open Source in Application Security
Open Source in Application SecurityOpen Source in Application Security
Open Source in Application Security
Black Duck by Synopsys
 
Advanced red teaming all your badges are belong to us
Advanced red teaming  all your badges are belong to usAdvanced red teaming  all your badges are belong to us
Advanced red teaming all your badges are belong to us
Priyanka Aash
 
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Black Duck by Synopsys
 
Managing Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development LifecycleManaging Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development Lifecycle
Black Duck by Synopsys
 

What's hot (20)

Sandboxing
SandboxingSandboxing
Sandboxing
 
Invincea: Reasoning in Incident Response in Tapio
Invincea: Reasoning in Incident Response in TapioInvincea: Reasoning in Incident Response in Tapio
Invincea: Reasoning in Incident Response in Tapio
 
Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attacker
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
SANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat IntelligenceSANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat Intelligence
 
Security in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptionsSecurity in the age of open source - Myths and misperceptions
Security in the age of open source - Myths and misperceptions
 
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing Presentation
 
The 4 Levels of Open Source Risk Management
The 4 Levels of Open Source Risk ManagementThe 4 Levels of Open Source Risk Management
The 4 Levels of Open Source Risk Management
 
Introduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivismIntroduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivism
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
 
TTPs for Threat hunting In Oil Refineries
TTPs for Threat hunting In Oil RefineriesTTPs for Threat hunting In Oil Refineries
TTPs for Threat hunting In Oil Refineries
 
Persistence is Key: Advanced Persistent Threats
Persistence is Key: Advanced Persistent ThreatsPersistence is Key: Advanced Persistent Threats
Persistence is Key: Advanced Persistent Threats
 
Sandboxing
SandboxingSandboxing
Sandboxing
 
Secure application deployment in Apache CloudStack
Secure application deployment in Apache CloudStackSecure application deployment in Apache CloudStack
Secure application deployment in Apache CloudStack
 
Security in the Age of Open Source
Security in the Age of Open SourceSecurity in the Age of Open Source
Security in the Age of Open Source
 
Open Source in Application Security
Open Source in Application SecurityOpen Source in Application Security
Open Source in Application Security
 
Advanced red teaming all your badges are belong to us
Advanced red teaming  all your badges are belong to usAdvanced red teaming  all your badges are belong to us
Advanced red teaming all your badges are belong to us
 
ATP
ATPATP
ATP
 
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
 
Managing Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development LifecycleManaging Open Source in Application Security and Software Development Lifecycle
Managing Open Source in Application Security and Software Development Lifecycle
 

Viewers also liked

Stop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by DownloadsStop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by DownloadsInvincea, Inc.
 
PoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryPoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail Industry
Invincea, Inc.
 
Detection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day ThreatsDetection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day Threats
Invincea, Inc.
 
Tech ThrowDown: Invincea FreeSpace vs EMET 5.0
Tech ThrowDown:Invincea FreeSpace vs EMET 5.0Tech ThrowDown:Invincea FreeSpace vs EMET 5.0
Tech ThrowDown: Invincea FreeSpace vs EMET 5.0
Invincea, Inc.
 
Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security Evasion
Invincea, Inc.
 
Threats to the Grid | Cyber Challenges Impacting the Energy Sector
Threats to the Grid | Cyber Challenges Impacting the Energy Sector Threats to the Grid | Cyber Challenges Impacting the Energy Sector
Threats to the Grid | Cyber Challenges Impacting the Energy Sector
Invincea, Inc.
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
XEventsHospitality
 

Viewers also liked (7)

Stop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by DownloadsStop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
 
PoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryPoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail Industry
 
Detection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day ThreatsDetection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day Threats
 
Tech ThrowDown: Invincea FreeSpace vs EMET 5.0
Tech ThrowDown:Invincea FreeSpace vs EMET 5.0Tech ThrowDown:Invincea FreeSpace vs EMET 5.0
Tech ThrowDown: Invincea FreeSpace vs EMET 5.0
 
Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security Evasion
 
Threats to the Grid | Cyber Challenges Impacting the Energy Sector
Threats to the Grid | Cyber Challenges Impacting the Energy Sector Threats to the Grid | Cyber Challenges Impacting the Energy Sector
Threats to the Grid | Cyber Challenges Impacting the Energy Sector
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
 

Similar to Webinar: Operation DeathClick: Uncovering Micro-Targeted Malvertising Against US Defense Industrial Base

The cyber house of horrors - securing the expanding attack surface
The cyber house of horrors -  securing the expanding attack surfaceThe cyber house of horrors -  securing the expanding attack surface
The cyber house of horrors - securing the expanding attack surface
Jason Bloomberg
 
IT Security for Nonprofits
IT Security for NonprofitsIT Security for Nonprofits
IT Security for Nonprofits
Community IT Innovators
 
Why Security Matters for Marketers
Why Security Matters for MarketersWhy Security Matters for Marketers
Why Security Matters for Marketers
HubSpot
 
Issa jason dablow
Issa jason dablowIssa jason dablow
Issa jason dablow
ISSA LA
 
Spiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout sessionSpiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout session
Shane Rice
 
Information Security Overview
Information Security OverviewInformation Security Overview
Information Security Overview
n|u - The Open Security Community
 
Standardizing and Strengthening Security to Lower Costs
Standardizing and Strengthening Security to Lower CostsStandardizing and Strengthening Security to Lower Costs
Standardizing and Strengthening Security to Lower Costs
OpenDNS
 
Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to execution
AlgoSec
 
Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version external
Zscaler
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
Adrian Sanabria
 
Getting Started with Sitelock on ResellerClub
Getting Started with Sitelock on ResellerClubGetting Started with Sitelock on ResellerClub
Getting Started with Sitelock on ResellerClub
ResellerClub
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
Blueliv
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
Blueliv
 
CrowdCasts Monthly: Going Beyond the Indicator
CrowdCasts Monthly: Going Beyond the IndicatorCrowdCasts Monthly: Going Beyond the Indicator
CrowdCasts Monthly: Going Beyond the Indicator
CrowdStrike
 
5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack
RedZone Technologies
 
The malware monetization machine
The malware monetization machineThe malware monetization machine
The malware monetization machine
Priyanka Aash
 
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_230 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2Gaurav Srivastav
 
Failed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated RansomwareFailed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated Ransomware
IBM Security
 
The Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityThe Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our Community
AVG Technologies AU
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
ITCamp
 

Similar to Webinar: Operation DeathClick: Uncovering Micro-Targeted Malvertising Against US Defense Industrial Base (20)

The cyber house of horrors - securing the expanding attack surface
The cyber house of horrors -  securing the expanding attack surfaceThe cyber house of horrors -  securing the expanding attack surface
The cyber house of horrors - securing the expanding attack surface
 
IT Security for Nonprofits
IT Security for NonprofitsIT Security for Nonprofits
IT Security for Nonprofits
 
Why Security Matters for Marketers
Why Security Matters for MarketersWhy Security Matters for Marketers
Why Security Matters for Marketers
 
Issa jason dablow
Issa jason dablowIssa jason dablow
Issa jason dablow
 
Spiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout sessionSpiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout session
 
Information Security Overview
Information Security OverviewInformation Security Overview
Information Security Overview
 
Standardizing and Strengthening Security to Lower Costs
Standardizing and Strengthening Security to Lower CostsStandardizing and Strengthening Security to Lower Costs
Standardizing and Strengthening Security to Lower Costs
 
Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to execution
 
Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version external
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
 
Getting Started with Sitelock on ResellerClub
Getting Started with Sitelock on ResellerClubGetting Started with Sitelock on ResellerClub
Getting Started with Sitelock on ResellerClub
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
 
CrowdCasts Monthly: Going Beyond the Indicator
CrowdCasts Monthly: Going Beyond the IndicatorCrowdCasts Monthly: Going Beyond the Indicator
CrowdCasts Monthly: Going Beyond the Indicator
 
5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack
 
The malware monetization machine
The malware monetization machineThe malware monetization machine
The malware monetization machine
 
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_230 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
 
Failed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated RansomwareFailed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated Ransomware
 
The Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityThe Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our Community
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
 

Recently uploaded

A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
kalichargn70th171
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
Boni García
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024
Hironori Washizaki
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
Philip Schwarz
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
mz5nrf0n
 

Recently uploaded (20)

A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
 

Webinar: Operation DeathClick: Uncovering Micro-Targeted Malvertising Against US Defense Industrial Base

  • 1. Uncovering Micro-Targeted Malvertising Against US Defense Industrial Base WEBINAR OCTOBER 16, 2014 PATRICK BELCHER, DIRECTOR OF SECURITY ANALYTICS, INVINCEA, INC.
  • 2. Patrick Belcher, CISSP, CISM 2 • Analysis Team manager at Riptech, absorbed by Symantec in 2004. • Helped stand up the US-CERT for the DHS • Lead Cyber Security Analyst for FDIC • RSA/NetWitness • Cyber analysis and numerous Federal agencies including the State Department and Department of Defense • Performed incident response and analysis for several fortune 50 companies. • Invincea- Director of Security and Malware Analytics
  • 3. Agenda Thanks for Attending this Webinar! Today we will discuss: • Operation DeathClick: Attacks Against the US Defense Industrial Base • How Advanced Adversaries are Using Micro-Targeting techniques via Malvertising to Target Your Enterprise • How Real Time Bidding Works • How do malvertisers choose targets? • How do malvertisers setup their malware delivery? • How to Protect your organization against Targeted Malvertising
  • 4. Operation DeathClick • Invincea discovered a concerted campaign against US Defense companies • Operation DeathClick represents a blending of traditional cyber-crime techniques (malvertising) with APT targeting and objectives • Expect campaign will soon be used to target other sectors: financial, Federal, manufacturing, healthcare, etc. • Leverages advertising networks on ad-supported web sites to compromise specific company networks • The TTPs involved in DeathClick evade almost all network-based and traditional endpoint controls. There is no patch for this TTP.
  • 5. Micro-Targeting: How Targeted Can it Be? You can push targeted ads to: • A Region • A City • A Neighborhood • Type of shopper • Gender-specific Ads • Industry Vertical • Specific Corporation • Captive Audience/Wireless Tower • Specific peoples’ Mobile platform • Any combination of the Above A couple of scenarios…. • Activism • Product Placement • Special Audience • Network intrusion
  • 6.
  • 7. Targeting the US Defense Industrial Base: Dawn.com DAWN.COM
  • 8. Targeting the US Defense Industrial Base: PsychCentral.com PSYCHCENTRAL.COM
  • 9. Targeting the US Defense Industrial Base: FleaFlicker.com FLEAFLICKER.COM
  • 10. Targeting the US Defense Industrial Base: GPokr.com GPOKR.COM
  • 11. Targeting the US Defense Industrial Base: EarthLink EARTHLINK.COM
  • 12. Traditional Web Advertising • Ads were once sold in bulk. Advertisers paid by the number of viewer impressions delivered. • Advertisers paid more money if the ad is clicked. • Actual Ad content is hosted elsewhere. • Advertisers chose which sites to deliver ad content. Drawbacks: • Indiscriminate • Costly • No great ROI • Easily Abused
  • 13. Now Ads are Targeted Ironic targeted ad by Ad Targeting Company. This ad is a result of my research into ad bidding. (cookie based) This ad delivery targeted me based on my IP address location in Orlando, FL (GEO-IP based)
  • 14. How Does Ad Targeting Work? Big Data! • Ad Slots Provide the Real Estate, Typically Doubleclick • Other Ad Services and Intelligence Services Enhance Targeting Neustar, Facebook, Twitter, Pubmatic and Others Sell IP intelligence to Ad Networks. Ad Networks now sell targeted ads for Advertisers
  • 15. RTB is Now Standard Ad placement has evolved. Ad networks now run based on Real-Time Ad Bidding. Backend Auction happens in milliseconds Less expensive than bulk impression buys
  • 16. Targeted Advertising Too Creepy? Who knows more about you? Ad networks or the NSA? Now Malvertisers Have the Power of RTB Targeting and they are coming after YOU!
  • 17. Evading Traditional Defenses The ability to select a target for compromise and the ease of the execution via RTB malvertising is known as “micro-targeting via malvertising.” Without Advanced host protection, this attack is over 95% successful! • Avoids Proxy blacklists • Avoids AV detection • Bypasses most advanced malware interception • See the Invincea Snipertising Whitepaper for full details Operation DeathClick (Case Study Available) Large Defense and Aerospace contractors targeted by RTB for penetration Malvertising delivered via: • Pakistani News Outlet • Fantasy Football Site • Webmail Ads • Any advertising supported site Attacks bypassed superior defense in depth controls including web proxies were stopped by Invincea
  • 18. Exploited: TheBlaze.com 12 Ads on Homepage! Pubmatic redirects to GumGum Drops Kryptik- changing hashes
  • 19. Exploited: ShootersForum Shootersforum: Openx RTB bid redirects to in.ua free host; drops exploit kit that pops Silverlight
  • 20. Exploited: Trade2win.com Trade2win.com: Oxygenmedia ad bid redirects to German ad provider, drops bundler malware.
  • 21. Exploited: Answers.com Answers.com: Clickbait articles drop Kryptik Hashes constantly change Malware delivered from compromised Polish government sites.
  • 22. How Hard is it to do Targeted Malvertising? From SiteScout: You got cash, you can create your own landing pages and begin bidding.
  • 23. What Much does a Targeted Malvertisement Bid cost? 65 cents! Log File from Winning bid against Cox IP Address to drop Trojan: http://delivery.firstimpression.com/delivery?action=serve& ssp_id=3&ssp_wsid=2191400908&dssp_id=100&domain _id=2191400908&ad_id=748271&margin=0.4&cid=15538 0&bn=sj14&ip_addr=24.234.123.133&ua=1540937276&to p_level_id=24.234.123.133&second_level_id=154093727 6&page=thanhniennews.com&retargeted=null&height=90 &width=728&idfa=null&android_id=null&android_ad_id=n ull&bid_price=0.654&count_notify=1&win_price=$AAABS MPg1dmFEPqXEZe5_CYviub3uOlabldGew
  • 24. Funding a Micro-Targeted Malvertising Campaign • Click Fraud funds the operation. Logs show fake Chrome installed in Java cache to click on ad banners. • Kyle and Stan malvertising uses bundled malware and referral abuse to generate cash. • Chrome and bundled programs evade AV detection. • Bundled programs spy on endpoints to improve ad targeting.
  • 25. Where Malvertisers Host Exploit Landing Pages • Compromised WordPress Blogs • Unconfigured Apache hosts • Cloud-based NGINX subdirectories • Government and News pages in Poland • Free Hosting sites such as ua.in To avoid proxy blacklisting, landing pages are unique and only online for minutes. To avoid AV or hash detection, exploits employ unique names and hashes Landing exploit kits currently focused on cash generation, but can easily be converted to exfiltration or banking kits.
  • 26. Protect Yourself from Malvertising • Deploy Invincea on EndPoints Or • Disallow external web re-direction. • Demand change in the ad network business • OptOut Only 636 Targeting Ad Companies to opt out from! http://www.rubiconproject.com /privacy/consumer-online-profile- and-opt-out/ http://preferences-mgr. truste.com/ http://www.ghosteryenterprise.
  • 27. Invincea Threat Protection • Contain all web-based attacks in secure virtual containers • Collect threat forensics on attack • Protect against known, unknown, and 0-day threats without requiring signatures
  • 28. Free Invincea Research Edition Each detection shown in this presentation is available for online viewing in the Invincea Research Edition Portal. Sign up for the Research Edition and get a free licensed copy of Invincea FreeSpace Research Edition. Click without fear.
  • 29. Special Thanks and Resources Invincea Whitepaper on Real Time Ad Bidding Invincea Case Study: RTB Targeting Defense Industry Threatpost Kyle and Stan Analysis http://threatpost.com/kyle-and-stan-malvertising-network- nine-times-bigger-than-first-reported/108435
  • 30. Q&A Session Invincea Research Edition: www.invincea.com/research-edition Webinar Recording + Slide deck: Demo Request: http://www.invincea.com/get-protected/enterprise-request-form
  • 31. Thank you! Invincea @Invincea Patrick Belcher @BelchSpeak