Top Banner
Senior Security Consultant/Senior Pentester TWITTER, LinkedIN @westonhecker Rapid7 www.Rapid7.com Weston Hecker
51

Security by Weston Hecker

Apr 12, 2017

Download

Technology

EC-Council
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security by Weston Hecker

Senior Security Consultant/Senior Pentester

TWITTER, LinkedIN @westonhecker

Rapid7 www.Rapid7.com

Weston Hecker

Page 2: Security by Weston Hecker

“A little bit about myself and Rapid7”

Senior Security Engineer/Senior Pentester/ Security

Researcher.

Over 11 years Pentesting, Speaker at Defcon 22,23

and 24 Las Vegas, HOPE 11, TakedownCON 2016,B-

sides Boston, Blackhat 2016, Enterprise Connect 2016,

ISC2, SC Congress Toronto.

12 years programming and Reverse Engineering.

Side projects Department of Home Land Security.

Attacking 911 centers / Malware analysis Ransomware.

Hacking ATM’s, Cars, Point of Sale Systems, Hotel Key

Systems - Property Management Software.

Page 3: Security by Weston Hecker

• Funded all my research this year by unbricking

• 100s of 3tb Hard Drives

Page 4: Security by Weston Hecker
Page 5: Security by Weston Hecker
Page 6: Security by Weston Hecker
Page 7: Security by Weston Hecker

“Ransomware: How to Make Your Systems

Immune to Modern Malware/Ransomware”

• What is this talk about? Tools used .

A brief History of Malware and Ransomware.

How I came across the malware.

How it was pulled apart/ A look at payloads and evasion

methods

How to defend your systems from:

Droppers.

Main Payloads.

In effect making you computers immune to most

modern malware

Page 8: Security by Weston Hecker

Special environment “Tackled Virtual Machine”

VMWare, Windows 7, IDA Pro, Unpackers,

Injectors

Page 9: Security by Weston Hecker

“Tested on Over 26 Different Variants ”

• Tested on Which Ransomware? SAMSAM, Custom Variants. 2016

Cryptolocker 1-3. 2015-2016

Cryptowall 1-4. 2014-2016

Locky 1-2. 2016

Malware Had to Evolve cause of ..

Page 10: Security by Weston Hecker

Ransomware Had to

Evolve

Page 11: Security by Weston Hecker

NextGen Security Devices

Page 12: Security by Weston Hecker
Page 13: Security by Weston Hecker

New Years 2016

Page 14: Security by Weston Hecker

“I get excited when people send me malware”

• How did I get my first sample of it ? An acquaintance that I meet at Defcon 18 sends me

malware all the time.

He runs a self destructing mail service on TOR as a

honeypot project.

He comes across a lot of custom tailored malware.

He sold me a few samples on New Years 2016 for 1

billion ISK which is a “EVE online” currency

I recently got some very cool custom tailored ICS

oilfield specific malware. I will be wringing a white

paper on it this October and I have call for papers in at

ICS security convention first of its kind to attack MWD

and oil productions to my knowledge.

Page 15: Security by Weston Hecker

Toolkits

Page 16: Security by Weston Hecker

What is A Dropper

Page 17: Security by Weston Hecker

“A Look at Payloads”

• The End Goal of Malware. What it does

Page 18: Security by Weston Hecker

“A Look at Payloads”

• What does the Ransomware look for >?

Page 19: Security by Weston Hecker

Some of the Malware uses advanced Methods to

stop reverse engineering even ones used by

software companies

Page 20: Security by Weston Hecker

Attacking the Dropper.

Page 21: Security by Weston Hecker

Virus Detection cant keep up with packed droppers

Signatures “Heuristics Engine” Method of protection

fails you

Page 22: Security by Weston Hecker

Old Yeller.exe

Software Method 1

Page 23: Security by Weston Hecker

Why This Works ?

Page 24: Security by Weston Hecker

Anti-Virus Watchdog.

Page 25: Security by Weston Hecker

Change in registry.

Page 26: Security by Weston Hecker

Old Yeller.

Page 27: Security by Weston Hecker

Intentional Blue Screen.

Page 28: Security by Weston Hecker

Keetz.exe

Software Method 2

Page 29: Security by Weston Hecker
Page 30: Security by Weston Hecker

EMO.exe

Emulates sandbox flags that

Malware and droppers are

looking for.

Software Method 3

Page 31: Security by Weston Hecker

EMO-Tool Sand Box Emulator

Page 32: Security by Weston Hecker

Works on most variants of Cryptowall 1, 2, 3 and 4

Cryptolocker and “Sams Choice” Variants that use

7zip or other software to do dirty work.

Hardware Method 1

Page 33: Security by Weston Hecker

Market flooded with Bad USB’s.

Page 34: Security by Weston Hecker

This takes advantage of the

Parse Order of the Ransomware.

Page 35: Security by Weston Hecker

Hacked USB Method

Page 36: Security by Weston Hecker

“A Drive Filled with data keeps malware busy”

• Remember What does the Ransomware look for >?

Page 37: Security by Weston Hecker

Intentional Blue Screen.

Page 38: Security by Weston Hecker

Works on most variants of Cryptowall 1, 2, 3 and 4

Cryptolocker and “Sams Choice” Variants that use

7zip or other software to do dirty work.

Hardware Method 2

Page 39: Security by Weston Hecker

Teensy Honeypot USB Method

• Teensy 3.1 or 3.2• Mounts as USB Drive partition• Change Partition to A:// Drive• Fill with files Load Payload• Once partition is touched switches to HID k

eyboard shuts machine down• Make sure you exclude from your AV• Hard shutdown “Shutdown –h now”• Thanks to the guy at Bsides Boston for the

Idea• Code coming October I’ll update on Twitter

Page 40: Security by Weston Hecker

You can do graceful shutdown

or …..

Page 41: Security by Weston Hecker

You Can Do Graceful Shutdown or the Hardway

Page 42: Security by Weston Hecker

EMO.exe

Crypto-Locker Simulator

Back to Software

Page 43: Security by Weston Hecker

“Hiding Your Files”

• Can also hide files or backup in systems folders.

• Delete backups and shadow copies. Using shift

disk utility function of EMO-Tool

• No Ransomware I came across does DOD or Low

level format.

• Morphing your file system.

• Email plugin strips all macro for that user.

• Switches to internal trusted file extension for that

file.

Page 44: Security by Weston Hecker
Page 45: Security by Weston Hecker

“Testing Frame work Now With Unlock Feature”

• Here is list of tools functions Testing of POST call home.

Search for open WR shares.

Test your backups against encryption.

Calculate ransomware amount.

Build a master unlock file off of Bait file.

Check Different account levels access to parts of your domain.

Report for Pentest reports.

Control Keetz.exe and Oldyeller.exe Emo.exe functions.

Pull Systems files at time of infection.

Downgrade clock on encrypted files if backup is available.

Testing Payload avoidance

Page 46: Security by Weston Hecker

“Version 2.0

of Testing

Tool with

unlock

capabilities”

Page 47: Security by Weston Hecker

“Testing How systems would be

affected by Bitlocker”

Page 48: Security by Weston Hecker

A look at Beta EMO-Tool

Page 49: Security by Weston Hecker

Outlook Plugin

Page 50: Security by Weston Hecker

Other ways to protect your data

Page 51: Security by Weston Hecker

Senior Security Consultant/Senior Pentester

TWITTER @westonhecker

Rapid7

Weston Hecker