• Aucun résultat trouvé

About Me

N/A
N/A
Protected

Academic year: 2022

Partager "About Me"

Copied!
26
0
0

Texte intégral

(1)

When Malware Meets Murphy

Mattijs van Ommeren!

Principal Consultant at Nixu!

Hack In The Box Amsterdam!

Commsec Track!

(2)

About Me

•  Mattijs van Ommeren!

•  Principal Consultant at Nixu!

•  15+ years experience in IT security!

•  Pentesting, incident handling, forensics, research!

•  Twitter: @alcyonsecurity!

•  E-mail: mattijs.vanommeren@nixu.com!

(3)

The Bad Beginning

•  First case of ransomware reported in 2005 (TROJ_CRYZIP.A)!

•  Since 2012 spread across Europe and the U.S.!

•  2013: Cryptolocker!

(4)

The Hostile Hospital

(5)

The Phone call

The goal_of_103.docx.id-0225681007_decode@india.com

(6)

Incident Handling Process

•  Preparation!

•  Identification!

•  Containment!

•  Eradication!

•  Recovery!

•  Lessons Learned!

(7)

Preparation

•  Policy!

•  Response Plan!

•  Communication Plan!

•  Documentation!

•  Access Control!

•  Tools!

•  Training!

(8)

Identification

•  User calls helpdesk and reports “strange file names”!

•  No ransom note!

•  No logs available!

– Logon/logoff events overwritten!

– File System Auditing disabled!

(9)

Encryption in progress

•  Active SMB session:!

– Netstat - ESTABLISHED 445/TCP!

– OPENFILES.EXE!

– Powershell Get-SMBOpenFile (Windows 2012 R2)!

•  Less volatile!

– Firewall connection logs!

– NETFLOW data!

(10)

Containment

•  Prevent it from getting worse!

–  Unplug the network cable?!

–  Set file shares to Read-only access!

–  File/Share Canary!

•  FSRM File Screen (Windows 2008 and up)

https://community.spiceworks.com/how_to/100368- cryptolocker-canary-detect-it-early!

•  File System Audit & Sinkhole

http://www.freeforensics.org/2016/03/proactively-reacting- to-ransomware.html!

–  Block C2 traffic!

(11)

Which Files?

•  Easily identifiable through new file extension!

dir /s /a *_decode@india.com

924 files

(12)

File Explorer

•  Find: _decode@india.com!

954 files (!)

(13)

Powershell

Get-ChildItem Z:\ -Recurse *_decode@india.com

924 files The problem

(14)

Path Length Limitation

hFps://msdn.microsoI.com/en-us/library/aa365247.aspx

(15)

The Ersatz Elevator

SUBST S: "C:\This Is A Very, very, ..., very Long Folder Name"

DIR /s S:

(16)

No Access for you

•  Access Denied to Administrator!

•  ICALCS /takeown ?!

– Also affected by 260 char path limitation!

– Can be quickly circumvented by using SUBST!

•  Or…?!

(17)

Robocopy FTW!

ROBOCOPY Z: NULL /E /B /L

(18)

Powershell & Robocopy

•  https://learn-powershell.net/2013/04/01/list- all-files-regardless-of-260-character-path- restriction-using-powershell-and-robocopy/!

(19)

Let’s rebuild

•  Good news

– a valid backup exists (1 day old)

– Backup soluRon does not suffer from Path Length LimitaRon

•  But...

– 1 TB

– >100.000 files

– What files to restore?

•  Don’t want to overwrite untouched files

(20)

The Wide Window

•  Network restore

– Decentralized file server

– Connected through 40 Mbps WAN link – Restore Rme > 35 hrs

•  Locally Restore to portable hard drive

– Throughput 25-30 MB per second

– Restore Rme approx. 4 hrs (excluding expediRon Rme)

"Never underesRmate the bandwidth of a staRon wagon full of tapes hurtling down the highway."

— Andrew S. Tanenbaum

(21)

We are done, are we?

Well…!

(22)

More affected files

•  Certain files encrypted but NOT renamed by the ransomware!

•  How to identify?!

– Filter on Modified timestamp!

– Contains mix of legitimately edited files and malware encrypted files!

(23)

More filtering

•  Character Frequency Analysis!

– High Entropy -> encrypted file!!

•  Partially encrypted files!

– High entropy block!

(24)

Lessons Learned/

Recommendations

–  Learn how to identify ransomware species!

•  Artifacts, behavior!

–  Familiarize yourself with non-standard recovery scenario’s!

•  Can you selectively restore files based on certain criteria?!

•  Can you still meet RTO?!

–  Consider File Share Canaries!

–  Malware is software and hence is fallible!

•  Failure to append file extension!

•  Other?!

–  Backups are key!

(25)

Thank you + Q & A

(26)

The End

Références

Documents relatifs

The V REF /2 feature is also useful for low level analog voltage systems where an operational amplifier is normally used to boost the input signal prior to digitization.. In a

Clients – Dettes sur emballages et matériels consignés Pour le client, la consignation représente une créance conditionnelle envers le fournisseur étant donné qu’il ne récupére

When there is no conflict, students often take the arguments they gave in the solo phase and put them together to produce a ‘Union’ argument.. Since there is no conflict,

First, Occurrence Grouping has been implemented to be used in a monotonicity- based existence test (OG in Table 1), i.e., an occurrence grouping transform- ing f into f og is

Then insert the newly created CP/M operations diskette in disk drive A, and insert the NEVADA SOFTWARE distribution diskette in drive Band type (ctl-c) to

Concepts that are related to a keyword-based query are used for finding other concepts and rela- tions through the use of a relational Bayesian network built using the

De cette façon, le serveur a bien plus de certitude qu’il dialogue avec le client SMTP correct. Ce mécanisme peut être juste vu comme une version plus immédiate du réessai de