{"id":3637,"date":"2015-02-19T17:51:04","date_gmt":"2015-02-19T17:51:04","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=3637"},"modified":"2020-02-27T03:53:35","modified_gmt":"2020-02-26T16:53:35","slug":"the-equation-carbanak-desert-falcons-security-analyst-summit-summary","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/the-equation-carbanak-desert-falcons-security-analyst-summit-summary\/3637\/","title":{"rendered":"The Equation, Carbanak, Desert Falcons: Security Analyst Summit summary"},"content":{"rendered":"<p>On February 16th and 17th in Cancun, Mexico, the Fourth annual Kaspersky Security Analyst Summit took place. That\u2019s an extremely important event for Kaspersky Lab, where we share our researches and invite to speak our colleagues from other companies from security industry.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#TheEquationAPT, #Carbanak, #DesertFalconsAPT: #SAS summary<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fc3L9&amp;text=+%23TheEquationAPT%2C+%23Carbanak%2C+%23DesertFalconsAPT%3A+%23SAS+summary+\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>In this particular post we discuss three of our keynotes from Security Analyst Summit regarding The Equation APT, Carbanak and an unknown before entity that we called Desert Falcons APT group. If you are interested in detailed research, please follow the appropriate links to Securelist. Here you can also find a few pictures from the Summit, and later videos from our experts\u2019 keynotes will be available either.<\/p>\n<p><strong>Carbanak. The Great Robbery<\/strong><\/p>\n<p><a href=\"https:\/\/securelist.com\/blog\/research\/68732\/the-great-bank-robbery-the-carbanak-apt\/\" target=\"_blank\" rel=\"noopener\">Securelist full report with technical details<\/a>. <a href=\"https:\/\/securelist.ru\/files\/2015\/02\/c36e528f-d48e-4ad0-b822-da1c610e9710.ioc\" target=\"_blank\" rel=\"noopener\">Indicators of compromise<\/a> (in .<a href=\"http:\/\/www.openioc.org\/\" target=\"_blank\" rel=\"noopener nofollow\">IOC<\/a> format).<\/p>\n<p>A lot of comments come on the ATM compromise aspect of Carbanak, which is indeed the most high-profile part of the story: one sends a command, the ATM yields money, with no card or PIN required.<\/p>\n<p>Actually, this is where Carbanak failed: it\u2019s clear that ATMs don\u2019t work that way without a third party intervening. Further investigation showed that ATM cracking was just one method of cashing out. There were others too: criminals could transmit funds to their own accounts, manipulate the balance so that multiple security systems failed to detect it. Without total control about internal bank systems the operation like this would be impossible to conduct. So after the initial infiltration attackers used various methods to gather data on internal workings of the bank, including recording the video.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3642\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2015\/02\/06020300\/4-1.jpg\" alt=\"4\" width=\"748\" height=\"370\"><\/p>\n<p>The actual attack started quite trivially:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3644\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2015\/02\/06020300\/5-1.png\" alt=\"5\" width=\"800\" height=\"183\"><\/p>\n<p style=\"text-align: center\"><em>A letter with a malicious payload exploiting, among others, Microsoft Office vulnerabilities (CVE-2012-0158; CVE-2013-3906) and Microsoft Word (CVE-2014-1761).<\/em><\/p>\n<p><em>So where the $1 bn came from?<\/em><\/p>\n<p>Carbanak investigation had been conducted in close cooperation with various LEAs in various countries. Peter Zinn from National Hi-Tech Crime Unit told about it during his speech in Kaspersky Security Analyst Summit.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3643\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2014\/09\/06042622\/51.jpg\" alt=\"5x\" width=\"800\" height=\"462\"><\/p>\n<p>Information from law enforcement agencies allowed to evaluate the total number of Carbanak victims \u2013 about 100 financial organization. Given the on average they lost between $2.5 and $10 million, the total possible losses may mount exactly up to $1bn.<\/p>\n<p><em>A saviour .bat:<\/em><\/p>\n<p>An interesting situation took place during the investigation, when the fact of infection had been already confirmed and there was a need to identify all of the compromised PCs. It should have been done fast: first \u2013 to block the threat, second \u2013 to gather samples to research. A simple script had been written for this:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3645\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2015\/02\/06020259\/6-1.png\" alt=\"6\" width=\"725\" height=\"432\"><\/p>\n<p><strong>The Equation, or \u201cStuxnet, I am your father\u201d, or attribution difficulties<\/strong><\/p>\n<p>A <a href=\"https:\/\/securelist.com\/blog\/research\/68750\/equation-the-death-star-of-malware-galaxy\/\" target=\"_blank\" rel=\"noopener\">Securelist article<\/a>, <a href=\"https:\/\/securelist.com\/files\/2015\/02\/Equation_group_questions_and_answers.pdf\" target=\"_blank\" rel=\"noopener\">Q&amp;A<\/a> (pdf), <a href=\"https:\/\/securelist.com\/blog\/research\/68787\/a-fanny-equation-i-am-your-father-stuxnet\/\" target=\"_blank\" rel=\"noopener\">Fanny module research<\/a><\/p>\n<p>Every SAS guest received as a present Kim Zetter\u2019s <a href=\"http:\/\/www.amazon.com\/Countdown-Zero-Day-Stuxnet-Digital\/dp\/077043617X\" target=\"_blank\" rel=\"noopener nofollow\">book<\/a> on Stuxnet, signed by author. For your information, it\u2019s a gross 500 pages tome, and, according to Zetter, publisher requested to shorten technical details as much as possible. So if one day a book on The Equation will be written, it won\u2019t be any smaller. An important thing: the investigation of this operation is just beginning right now. We have only published the general information and made a detailed research of one of its modules. Further research will demand time and effort, both from Kaspersky Lab and other companies. Why? Those behind Equation APT is doing their business for more than 10 years, probably even for 20 years already, given the date of first C&amp;C servers domain registration.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3646\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2015\/02\/06020258\/7-1.jpg\" alt=\"7\" width=\"800\" height=\"524\"><\/p>\n<p style=\"text-align: center\"><em>Kaspersky Lab researchers speaking on The Equation at SAS: Igor Sumenkov, Sergery Mineev, Vitaliy Kamlyuk, Costin Raiu.<\/em><\/p>\n<p>\u00a0<\/p>\n<p><em>Grzegorz Brz\u0119czyszczykiewicz <\/em><\/p>\n<p>We have identified with certainty more than 500 victims of The Equation. Given that malicious modules of the operation are armed with self-destruct mechanism, the actual total number of victims may be dozens of thousands. Among them \u2013 governmental organizations, telecoms, aviation industry, gas and oil sector, etc. Our research started when an individual named <em>Grzegorz Brz\u0119czyszczykiewicz<\/em> (spelled approximately \u201cG(r)zhego(r)zh B(r)zhechishchikevich\u201d) suspected that he was a victim of a malicious attack after he has inserted into his CD-Rom a CD with pictures sent to him from a scientific conference in Houston, he was participating in.<\/p>\n<p>His name has been changed for confidentiality reasons. It\u2019s been chosen from this flick:<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/GlOoSsfU6cM?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><br>\nWhat do we know about The Equation now? According to the dates of domain registration and module compilations, the campaign had been active for dozens of years. The oldest modules support Windows 95\/98. Different modules had been used for attacks and data gathering, as well as different methods of infection had been used too (infecting forums, for instance). One of the modules, known as Fanny, was used to gather data on the victims in Asia and Middle East. It had been created in 2008 and exploited two 0day vulnerabilites. The same ones Stuxnet used later. \u201cLater\u201d is the keyword here: this fact, alongwith some other, imply there was a connection between Stuxnet and The Equation.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3647\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2015\/02\/06020258\/8-1.png\" alt=\"8\" width=\"693\" height=\"333\"><\/p>\n<p>And this plugin is, perhaps, the most interesting. Known only by the file name (nls_933w.dll), it was extremely rarely used, in the outstanding cases it allowed to change hard drive (or SSD) firmware. Why? First \u2013 to restore control over the victim\u2019s PC, even if the data had been wiped clean. Second \u2013 for reliable and stealthy data storage. The plugin code yieleded identifiers for 12 hard drive models, those could be subjects to such a procedure. Given that firmware is extremely difficult to analyze and any error can brick the hard drive completely, this module shows how potent this APT group is.<\/p>\n<p><strong>Attribution<\/strong><\/p>\n<p>Now, this is important: \u201cKaspersky Lab\u201d can say absolutely <strong>nothing<\/strong> about those <strong>who<\/strong> is behind Equation APT. We just don\u2019t have enough facts to put a substantiated blame on anyone, or even identify the region or the country the operation had been conducted from. Everything else here is wool-gathering and gossip, and we don\u2019t want to relate ourselves to it. Attribution is a very difficult task, afterall, since even the obvious hints on the origins of the malware creators found in the code (in general, not in The Equation code) sometimes are introduced specifically to send researcher on the wrong track.<\/p>\n<p><strong>TWITTER PULLQUOTE<\/strong> <\/p><blockquote class=\"twitter-pullquote\"><p>We don\u2019t know who is behind #TheEquationAPT: no enough facts. #nogossip<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fc3L9&amp;text=We+don%26%238217%3Bt+know+who+is+behind+%23TheEquationAPT%3A+no+enough+facts.+%23nogossip\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Attribution difficulties have been discussed several times during Security Analyst Summit. Here\u2019s a joking example of speculative approach in Juniper Networks\u2019 Christopher Hoff\u2019s presentation: <span style=\"text-decoration: line-through\">bullshit<\/span> attribution bingo.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3648\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2015\/02\/06020256\/9-1.jpg\" alt=\"9\" width=\"800\" height=\"486\"><\/p>\n<p><strong>Desert Falcons: a new APT campaign in Middle East<\/strong><\/p>\n<p>An <a href=\"https:\/\/securelist.com\/blog\/research\/68787\/a-fanny-equation-i-am-your-father-stuxnet\/\" target=\"_blank\" rel=\"noopener\">article<\/a> at Securelist. <a href=\"https:\/\/securelist.com\/files\/2015\/02\/The-Desert-Falcons-targeted-attacks.pdf\" target=\"_blank\" rel=\"noopener\">A detailed research<\/a> (pdf).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3649\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2015\/02\/06020256\/10-1.jpg\" alt=\"10\" width=\"800\" height=\"495\"><\/p>\n<p>What surprised me the most in Dmitri Bestuzhev\u2019s keynote on Desert Falcons, is that how thoughtful are the attackers about the social engineering. Certainly they attack vie e-mail:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3650\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2015\/02\/06020255\/11-1.jpg\" alt=\"11\" width=\"800\" height=\"473\"><\/p>\n<p>But not just that. They use Facebook. Send friends requests, talk to in in PM, get themselves prepared for <strong>months<\/strong>, gain your confidence, all that to send you eventually a link to a malicious file. Or even simpler, they exploit the fact that influential people don\u2019t block their \u201cwall\u201d from posting at by other people. They react at the key events, important for the potential victims, and adapt their messages and emails.<\/p>\n<p>Those behind Desert Falcons know their victims very well. Probably since they reside in one particular country in the Middle East themselves. This is the primary point in this research: we see a new player developing its own tools to attack and gather data (not using someone else\u2019s stolen tools), well aware of the local landscape. Unlike The Equation, Desert Falcon have come in relatively recently \u2013 in 2011, and are at their peak now. Results: the data stealing malware infecting PC and Android-based handhelds, with over a <em>million<\/em> files and documents stolen from 3000+ victims.<\/p>\n<p>We\u2019re preparing a few more posts based on the keynotes at Security Analyst Summit, on such topics as using legitimate software for criminal purposes (including those in cryptolockers) with separate overview and statistics. A <a href=\"https:\/\/www.kaspersky.com.au\/blog\/kaspersky-security-analyst-summit-2015-the-live-blog\/\" target=\"_blank\" rel=\"noopener\">Live-blog<\/a> at Kaspersky Daily shows quotes from almost all SAS speeches and most interesting social media comments.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On February 16th and 17th in Cancun, Mexico, the Fourth annual Kaspersky Security Analyst Summit took place. Here are several chosen moments from the keynotes presented there.<\/p>\n","protected":false},"author":53,"featured_media":15740,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2994],"tags":[499,963,2288,2289,956],"class_list":{"0":"post-3637","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-apt","10":"tag-carbanak","11":"tag-equationapt","12":"tag-falconsapt","13":"tag-thesas2015"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/the-equation-carbanak-desert-falcons-security-analyst-summit-summary\/3637\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/the-equation-carbanak-desert-falcons-security-analyst-summit-summary\/3637\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/the-equation-carbanak-desert-falcons-security-analyst-summit-summary\/3637\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/apt\/","name":"APT"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/3637","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=3637"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/3637\/revisions"}],"predecessor-version":[{"id":26651,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/3637\/revisions\/26651"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/15740"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=3637"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=3637"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=3637"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}