SlideShare a Scribd company logo
THE EQUATION
GROUP -
GRAYFISH
“
The Equation Group is probably one of the
most sophisticated cyber attack groups in
the world; and they are the most
advanced threat actor we have seen.
- Kaspersky Lab
What is
THE EQUATION GROUP
◦ Highly sophisticated threat actor
◦ Only targets specific victims
◦ Multiple malware platforms
◦ High technical expertise and resources
◦ Create some of the most advanced threat
TOOLS AND MALWARE
Fanny
◦ Maps air-gapped
systems using USBs
and Stuxnet exploit
Triplefantasy
◦ Full-featured backdoor
◦ Targets validator
Equationdrug
◦ Modular plugin system
◦ Dynamically loaded by
the attackers
Grayfish
◦ Resides completely in
the HD registry
◦ Use a bootkit to gain
execution at OS startup
Data Access
◦ Knowledge of several
software and hardware
manufacturer designs
C & C Servers
◦ Issue commands to
malware, and collect
stolen data
◦ More than 400!
“
Equation Group are the ones with the
coolest toys, every now and then they
share them with the Stuxnet group and
the Flame group, but they are originally
available only to the Equation Group
people. They are definitely the masters,
giving the others bread crumbs.
- Costin Raiu (director of Kaspersky Lab's global
research and analysis team)
GRAYFISH
 Flashes the firmware of HDs inserting
a ‘pill’
 Hijack the boot sequence of the
operating system
 Install a Virtual File System in the
registry of the hard drive
 Malware execute codes and steals
information
GRAYFISH: THE ARCHITECTURE
BBSVC service
(polymorfic-loader)
Shellcode from
registry
Exploit for Elby
driver + loader (Kernel
mode)
Load platform kernel
mode for orchetrator
(fvexpy.sys)
Load user-mode part
from registry
(mpdkg32/64.dll)
Start payloads
(registry)
X1000 SHA-256
+ AES
Infected VBR
Encrypted container
file + Pill
Non Air Gapped
Attack Vectors:
• Cookie spoofing
• Spear phishing
• CSRF
• XSS
• Java exploits
ATTACK STRATEGIES
Air Gapped
Attack Vectors:
• Physical supports
• Stuxnet hack
• Fanny
INITIAL EXPLOIT
• Escalation of
privilege to
install
TrypleFantasy
INFECTION TRIPLEFANTASY
• Validate
victims,
confirm
interest
UPGRADE GRAYFISH
• Full-featured
espionage
platform
WHY SO DANGEROUS?
“After infection, the computer is not run by itself anymore: it is GRAYFISH
that runs it step by step, making the necessary changes on the fly.”
-Kaspersky Lab
Invisible
Not possible to
be detected by
standard
antivirus
Persistent
Reinstalling
operating
system or
updating the
HD firmware
does nothing
Design
Equation group
got a hold of so
many major
designs
HOW TO DETECT GRAYFISH?
Very difficult:
• Malware is hidden in
service area of the HD
• Specific circumstances
can trigger GRAYFISH
self-destruction.
HOW CAN WE PREVENT IT?
Attempts to tamper the
firmware will fail verification
BUT: firmware was not
designed with security in mind
Manufactures must sign
firmware
Thanks!
ANY QUESTIONS?
You can find me at
antichi.leonardo@gmail.com
REFERENCES
● https://securelist.com/files/2015/02/Equation_group_questions
_and_answers.pdf
● https://securelist.com/a-fanny-equation-i-am-your-father-
stuxnet/68787/
● http://rt.com/usa/239933-equation-group-nsa-links-backsnarf/
● http://www.wired.com/2015/02/nsa-firmware-hacking/
● https://www.schneier.com/blog/archives/2015/02/the_equation
_gr.html
● http://www.theregister.co.uk/2015/02/17/kaspersky_labs_equation
_group/
● http://www.wired.com/2015/02/kapersky-discovers-equation-
group/
● https://leaksource.files.wordpress.com/2013/12/nsa-ant-
iratemonk.jpg
● https://arstechnica.com/information-technology/2015/02/how-
omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-
at-last/
● https://www.fedscoop.com/the-kaspersky-equation/
● https://www.kaspersky.com/about/press-releases/2015_equation-
group-the-crown-creator-of-cyber-espionage
● https://www.pcworld.com/article/2884952/equation-cyberspies-use-
unrivaled-nsastyle-techniques-to-hit-iran-russia.html
DATA DEEPENING
Additional information
Q&A
0
5
10
15
20
25
30
35
40
45
50
Monday Tuesday Wednesday Thursday Friday Saturday Sunday
Equation Group Activity (Samples Count)
DATA
DATA
Malicious PHP script injected into hacked discussion forums
MAIN TARGETS:
• Islamic Jihadist discussion forums
• advertisements on popular websites in the Middle East
NOT INFECT: 1. Jordan 2. Turkey 3. Egypt
GRAYFISH: HOW IT WORKS?
GrayFish Re-flashes
Hard Drive Firmware
Firmware contains
infected Virtual Boot
Record (VBR)
OS uses infected VBR
when it boots
Creates hidden Virtual
File System in HD
registry to store data
Installs malicious
modules on machine
Steals and stores data
Hidden Virtual File
System
User removes malicious
modules
GRAYFISH
Boot steps

More Related Content

What's hot

ウェブセキュリティのありがちな誤解を解説する
ウェブセキュリティのありがちな誤解を解説するウェブセキュリティのありがちな誤解を解説する
ウェブセキュリティのありがちな誤解を解説する
Hiroshi Tokumaru
 
Secure Code Warrior - CRLF injection
Secure Code Warrior - CRLF injectionSecure Code Warrior - CRLF injection
Secure Code Warrior - CRLF injection
Secure Code Warrior
 
OWASP Serbia - A6 security misconfiguration
OWASP Serbia - A6 security misconfigurationOWASP Serbia - A6 security misconfiguration
OWASP Serbia - A6 security misconfigurationNikola Milosevic
 
Jwt == insecurity?
Jwt == insecurity?Jwt == insecurity?
Jwt == insecurity?
snyff
 
Buffer overflow attacks
Buffer overflow attacksBuffer overflow attacks
Buffer overflow attacks
Kapil Nagrale
 
Unraveling the Snake: Turla
Unraveling the Snake: TurlaUnraveling the Snake: Turla
Unraveling the Snake: Turla
Paül Jaramillo
 
Micro vs Nano (servicios)
Micro vs Nano (servicios)Micro vs Nano (servicios)
Micro vs Nano (servicios)
Pedro J. Molina
 
Pwning mobile apps without root or jailbreak
Pwning mobile apps without root or jailbreakPwning mobile apps without root or jailbreak
Pwning mobile apps without root or jailbreak
Abraham Aranguren
 
Hacking Adobe Experience Manager sites
Hacking Adobe Experience Manager sitesHacking Adobe Experience Manager sites
Hacking Adobe Experience Manager sites
Mikhail Egorov
 
スペシャリストになるには
スペシャリストになるにはスペシャリストになるには
スペシャリストになるには外道 父
 
Honeypots
HoneypotsHoneypots
XXE Exposed: SQLi, XSS, XXE and XEE against Web Services
XXE Exposed: SQLi, XSS, XXE and XEE against Web ServicesXXE Exposed: SQLi, XSS, XXE and XEE against Web Services
XXE Exposed: SQLi, XSS, XXE and XEE against Web Services
Abraham Aranguren
 
Sql injection attack
Sql injection attackSql injection attack
Sql injection attack
Raghav Bisht
 
API Vulnerabilties and What to Do About Them
API Vulnerabilties and What to Do About ThemAPI Vulnerabilties and What to Do About Them
API Vulnerabilties and What to Do About Them
Eoin Woods
 
TechTalk - 서버를 해킹 당했습니다
TechTalk - 서버를 해킹 당했습니다TechTalk - 서버를 해킹 당했습니다
TechTalk - 서버를 해킹 당했습니다
Daesung Park
 
Introduction to path traversal attack
Introduction to path traversal attackIntroduction to path traversal attack
Introduction to path traversal attack
Prashant Hegde
 
OWASP AppSecCali 2015 - Marshalling Pickles
OWASP AppSecCali 2015 - Marshalling PicklesOWASP AppSecCali 2015 - Marshalling Pickles
OWASP AppSecCali 2015 - Marshalling Pickles
Christopher Frohoff
 
Java Deserialization Vulnerabilities - The Forgotten Bug Class
Java Deserialization Vulnerabilities - The Forgotten Bug ClassJava Deserialization Vulnerabilities - The Forgotten Bug Class
Java Deserialization Vulnerabilities - The Forgotten Bug Class
CODE WHITE GmbH
 
第9回Jenkins勉強会 超簡単Pipeline講座
第9回Jenkins勉強会 超簡単Pipeline講座第9回Jenkins勉強会 超簡単Pipeline講座
第9回Jenkins勉強会 超簡単Pipeline講座
Hiroko Tamagawa
 
IncrediBuildでビルド時間を最大90%短縮! - インクレディビルドジャパン株式会社 - GTMF 2018 OSAKA
IncrediBuildでビルド時間を最大90%短縮! - インクレディビルドジャパン株式会社 - GTMF 2018 OSAKAIncrediBuildでビルド時間を最大90%短縮! - インクレディビルドジャパン株式会社 - GTMF 2018 OSAKA
IncrediBuildでビルド時間を最大90%短縮! - インクレディビルドジャパン株式会社 - GTMF 2018 OSAKA
Game Tools & Middleware Forum
 

What's hot (20)

ウェブセキュリティのありがちな誤解を解説する
ウェブセキュリティのありがちな誤解を解説するウェブセキュリティのありがちな誤解を解説する
ウェブセキュリティのありがちな誤解を解説する
 
Secure Code Warrior - CRLF injection
Secure Code Warrior - CRLF injectionSecure Code Warrior - CRLF injection
Secure Code Warrior - CRLF injection
 
OWASP Serbia - A6 security misconfiguration
OWASP Serbia - A6 security misconfigurationOWASP Serbia - A6 security misconfiguration
OWASP Serbia - A6 security misconfiguration
 
Jwt == insecurity?
Jwt == insecurity?Jwt == insecurity?
Jwt == insecurity?
 
Buffer overflow attacks
Buffer overflow attacksBuffer overflow attacks
Buffer overflow attacks
 
Unraveling the Snake: Turla
Unraveling the Snake: TurlaUnraveling the Snake: Turla
Unraveling the Snake: Turla
 
Micro vs Nano (servicios)
Micro vs Nano (servicios)Micro vs Nano (servicios)
Micro vs Nano (servicios)
 
Pwning mobile apps without root or jailbreak
Pwning mobile apps without root or jailbreakPwning mobile apps without root or jailbreak
Pwning mobile apps without root or jailbreak
 
Hacking Adobe Experience Manager sites
Hacking Adobe Experience Manager sitesHacking Adobe Experience Manager sites
Hacking Adobe Experience Manager sites
 
スペシャリストになるには
スペシャリストになるにはスペシャリストになるには
スペシャリストになるには
 
Honeypots
HoneypotsHoneypots
Honeypots
 
XXE Exposed: SQLi, XSS, XXE and XEE against Web Services
XXE Exposed: SQLi, XSS, XXE and XEE against Web ServicesXXE Exposed: SQLi, XSS, XXE and XEE against Web Services
XXE Exposed: SQLi, XSS, XXE and XEE against Web Services
 
Sql injection attack
Sql injection attackSql injection attack
Sql injection attack
 
API Vulnerabilties and What to Do About Them
API Vulnerabilties and What to Do About ThemAPI Vulnerabilties and What to Do About Them
API Vulnerabilties and What to Do About Them
 
TechTalk - 서버를 해킹 당했습니다
TechTalk - 서버를 해킹 당했습니다TechTalk - 서버를 해킹 당했습니다
TechTalk - 서버를 해킹 당했습니다
 
Introduction to path traversal attack
Introduction to path traversal attackIntroduction to path traversal attack
Introduction to path traversal attack
 
OWASP AppSecCali 2015 - Marshalling Pickles
OWASP AppSecCali 2015 - Marshalling PicklesOWASP AppSecCali 2015 - Marshalling Pickles
OWASP AppSecCali 2015 - Marshalling Pickles
 
Java Deserialization Vulnerabilities - The Forgotten Bug Class
Java Deserialization Vulnerabilities - The Forgotten Bug ClassJava Deserialization Vulnerabilities - The Forgotten Bug Class
Java Deserialization Vulnerabilities - The Forgotten Bug Class
 
第9回Jenkins勉強会 超簡単Pipeline講座
第9回Jenkins勉強会 超簡単Pipeline講座第9回Jenkins勉強会 超簡単Pipeline講座
第9回Jenkins勉強会 超簡単Pipeline講座
 
IncrediBuildでビルド時間を最大90%短縮! - インクレディビルドジャパン株式会社 - GTMF 2018 OSAKA
IncrediBuildでビルド時間を最大90%短縮! - インクレディビルドジャパン株式会社 - GTMF 2018 OSAKAIncrediBuildでビルド時間を最大90%短縮! - インクレディビルドジャパン株式会社 - GTMF 2018 OSAKA
IncrediBuildでビルド時間を最大90%短縮! - インクレディビルドジャパン株式会社 - GTMF 2018 OSAKA
 

Similar to The Equation Group & Greyfish

Equation group and gray fish
Equation group and gray fishEquation group and gray fish
Equation group and gray fish
DhanashreePaste
 
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoMalware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence Morocco
Touhami Kasbaoui
 
PyTriage: A malware analysis framework
PyTriage: A malware analysis frameworkPyTriage: A malware analysis framework
PyTriage: A malware analysis framework
Yashin Mehaboobe
 
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdfVulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
lior mazor
 
Ethical hacking : Beginner to advanced
Ethical hacking : Beginner to advancedEthical hacking : Beginner to advanced
Ethical hacking : Beginner to advanced
Kavin K
 
Javascript Exploitation
Javascript ExploitationJavascript Exploitation
Javascript ExploitationRashid feroz
 
Kali presentation
Kali presentationKali presentation
Kali presentation
Zain Ul abadin
 
Eliz seminar
Eliz seminar Eliz seminar
Eliz seminar
henelpj
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best Practices
Maxime ALAY-EDDINE
 
BlueHat v17 || Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging ...
BlueHat v17 || Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging ...BlueHat v17 || Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging ...
BlueHat v17 || Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging ...
BlueHat Security Conference
 
Shellshock - A Software Bug
Shellshock - A Software BugShellshock - A Software Bug
Shellshock - A Software Bug
vwchu
 
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
PaloAltoNetworks
 
Unsafe Deserialization Attacks In Java and A New Approach To Protect The JVM ...
Unsafe Deserialization Attacks In Java and A New Approach To Protect The JVM ...Unsafe Deserialization Attacks In Java and A New Approach To Protect The JVM ...
Unsafe Deserialization Attacks In Java and A New Approach To Protect The JVM ...
Apostolos Giannakidis
 
Creating Havoc using Human Interface Device
Creating Havoc using Human Interface DeviceCreating Havoc using Human Interface Device
Creating Havoc using Human Interface DevicePositive Hack Days
 
Proofing against malware
Proofing against malwareProofing against malware
Proofing against malware
SensePost
 
How Malware Works - Understanding Software Vulnerabilities
How Malware Works - Understanding Software VulnerabilitiesHow Malware Works - Understanding Software Vulnerabilities
How Malware Works - Understanding Software Vulnerabilities
Bunmi Sowande
 
Trojan horsies prez
Trojan horsies prezTrojan horsies prez
Trojan horsies prezStudio Sheen
 
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
Orbid
 
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
AI Frontiers
 

Similar to The Equation Group & Greyfish (20)

Equation group and gray fish
Equation group and gray fishEquation group and gray fish
Equation group and gray fish
 
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoMalware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence Morocco
 
PyTriage: A malware analysis framework
PyTriage: A malware analysis frameworkPyTriage: A malware analysis framework
PyTriage: A malware analysis framework
 
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdfVulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
 
Ethical hacking : Beginner to advanced
Ethical hacking : Beginner to advancedEthical hacking : Beginner to advanced
Ethical hacking : Beginner to advanced
 
Javascript Exploitation
Javascript ExploitationJavascript Exploitation
Javascript Exploitation
 
Kali presentation
Kali presentationKali presentation
Kali presentation
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Eliz seminar
Eliz seminar Eliz seminar
Eliz seminar
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best Practices
 
BlueHat v17 || Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging ...
BlueHat v17 || Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging ...BlueHat v17 || Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging ...
BlueHat v17 || Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging ...
 
Shellshock - A Software Bug
Shellshock - A Software BugShellshock - A Software Bug
Shellshock - A Software Bug
 
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
 
Unsafe Deserialization Attacks In Java and A New Approach To Protect The JVM ...
Unsafe Deserialization Attacks In Java and A New Approach To Protect The JVM ...Unsafe Deserialization Attacks In Java and A New Approach To Protect The JVM ...
Unsafe Deserialization Attacks In Java and A New Approach To Protect The JVM ...
 
Creating Havoc using Human Interface Device
Creating Havoc using Human Interface DeviceCreating Havoc using Human Interface Device
Creating Havoc using Human Interface Device
 
Proofing against malware
Proofing against malwareProofing against malware
Proofing against malware
 
How Malware Works - Understanding Software Vulnerabilities
How Malware Works - Understanding Software VulnerabilitiesHow Malware Works - Understanding Software Vulnerabilities
How Malware Works - Understanding Software Vulnerabilities
 
Trojan horsies prez
Trojan horsies prezTrojan horsies prez
Trojan horsies prez
 
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
 
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
 

More from Leonardo Antichi

AES Implementation on FPGA
AES Implementation on FPGAAES Implementation on FPGA
AES Implementation on FPGA
Leonardo Antichi
 
The CCleaner Infection
The CCleaner InfectionThe CCleaner Infection
The CCleaner Infection
Leonardo Antichi
 
Short Brocade Presentation
Short Brocade PresentationShort Brocade Presentation
Short Brocade Presentation
Leonardo Antichi
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
Leonardo Antichi
 
Forcepoint Overview
Forcepoint OverviewForcepoint Overview
Forcepoint Overview
Leonardo Antichi
 
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometrics
Leonardo Antichi
 

More from Leonardo Antichi (6)

AES Implementation on FPGA
AES Implementation on FPGAAES Implementation on FPGA
AES Implementation on FPGA
 
The CCleaner Infection
The CCleaner InfectionThe CCleaner Infection
The CCleaner Infection
 
Short Brocade Presentation
Short Brocade PresentationShort Brocade Presentation
Short Brocade Presentation
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Forcepoint Overview
Forcepoint OverviewForcepoint Overview
Forcepoint Overview
 
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometrics
 

Recently uploaded

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

The Equation Group & Greyfish

  • 2. “ The Equation Group is probably one of the most sophisticated cyber attack groups in the world; and they are the most advanced threat actor we have seen. - Kaspersky Lab
  • 3. What is THE EQUATION GROUP ◦ Highly sophisticated threat actor ◦ Only targets specific victims ◦ Multiple malware platforms ◦ High technical expertise and resources ◦ Create some of the most advanced threat
  • 4. TOOLS AND MALWARE Fanny ◦ Maps air-gapped systems using USBs and Stuxnet exploit Triplefantasy ◦ Full-featured backdoor ◦ Targets validator Equationdrug ◦ Modular plugin system ◦ Dynamically loaded by the attackers Grayfish ◦ Resides completely in the HD registry ◦ Use a bootkit to gain execution at OS startup Data Access ◦ Knowledge of several software and hardware manufacturer designs C & C Servers ◦ Issue commands to malware, and collect stolen data ◦ More than 400!
  • 5. “ Equation Group are the ones with the coolest toys, every now and then they share them with the Stuxnet group and the Flame group, but they are originally available only to the Equation Group people. They are definitely the masters, giving the others bread crumbs. - Costin Raiu (director of Kaspersky Lab's global research and analysis team)
  • 6. GRAYFISH  Flashes the firmware of HDs inserting a ‘pill’  Hijack the boot sequence of the operating system  Install a Virtual File System in the registry of the hard drive  Malware execute codes and steals information
  • 7. GRAYFISH: THE ARCHITECTURE BBSVC service (polymorfic-loader) Shellcode from registry Exploit for Elby driver + loader (Kernel mode) Load platform kernel mode for orchetrator (fvexpy.sys) Load user-mode part from registry (mpdkg32/64.dll) Start payloads (registry) X1000 SHA-256 + AES Infected VBR Encrypted container file + Pill
  • 8. Non Air Gapped Attack Vectors: • Cookie spoofing • Spear phishing • CSRF • XSS • Java exploits ATTACK STRATEGIES Air Gapped Attack Vectors: • Physical supports • Stuxnet hack • Fanny INITIAL EXPLOIT • Escalation of privilege to install TrypleFantasy INFECTION TRIPLEFANTASY • Validate victims, confirm interest UPGRADE GRAYFISH • Full-featured espionage platform
  • 9. WHY SO DANGEROUS? “After infection, the computer is not run by itself anymore: it is GRAYFISH that runs it step by step, making the necessary changes on the fly.” -Kaspersky Lab Invisible Not possible to be detected by standard antivirus Persistent Reinstalling operating system or updating the HD firmware does nothing Design Equation group got a hold of so many major designs
  • 10. HOW TO DETECT GRAYFISH? Very difficult: • Malware is hidden in service area of the HD • Specific circumstances can trigger GRAYFISH self-destruction.
  • 11. HOW CAN WE PREVENT IT? Attempts to tamper the firmware will fail verification BUT: firmware was not designed with security in mind Manufactures must sign firmware
  • 12. Thanks! ANY QUESTIONS? You can find me at antichi.leonardo@gmail.com
  • 13. REFERENCES ● https://securelist.com/files/2015/02/Equation_group_questions _and_answers.pdf ● https://securelist.com/a-fanny-equation-i-am-your-father- stuxnet/68787/ ● http://rt.com/usa/239933-equation-group-nsa-links-backsnarf/ ● http://www.wired.com/2015/02/nsa-firmware-hacking/ ● https://www.schneier.com/blog/archives/2015/02/the_equation _gr.html ● http://www.theregister.co.uk/2015/02/17/kaspersky_labs_equation _group/ ● http://www.wired.com/2015/02/kapersky-discovers-equation- group/ ● https://leaksource.files.wordpress.com/2013/12/nsa-ant- iratemonk.jpg ● https://arstechnica.com/information-technology/2015/02/how- omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found- at-last/ ● https://www.fedscoop.com/the-kaspersky-equation/ ● https://www.kaspersky.com/about/press-releases/2015_equation- group-the-crown-creator-of-cyber-espionage ● https://www.pcworld.com/article/2884952/equation-cyberspies-use- unrivaled-nsastyle-techniques-to-hit-iran-russia.html
  • 15. 0 5 10 15 20 25 30 35 40 45 50 Monday Tuesday Wednesday Thursday Friday Saturday Sunday Equation Group Activity (Samples Count) DATA
  • 16. DATA Malicious PHP script injected into hacked discussion forums MAIN TARGETS: • Islamic Jihadist discussion forums • advertisements on popular websites in the Middle East NOT INFECT: 1. Jordan 2. Turkey 3. Egypt
  • 17. GRAYFISH: HOW IT WORKS? GrayFish Re-flashes Hard Drive Firmware Firmware contains infected Virtual Boot Record (VBR) OS uses infected VBR when it boots Creates hidden Virtual File System in HD registry to store data Installs malicious modules on machine Steals and stores data Hidden Virtual File System User removes malicious modules