YOU ARE DOWNLOADING DOCUMENT

Please tick the box to continue:

Transcript
Page 1: 1 SANS Technology Institute - Candidate for Master of Science Degree 1 Steganography Then and Now John Hally May 2012 GIAC GSEC, GCIA, GCIH, GCFA, GCWN,

1SANS Technology Institute - Candidate for Master of Science Degree 1

SteganographyThen and Now

John HallyMay 2012

GIAC GSEC, GCIA, GCIH, GCFA, GCWN, GPEN

Page 2: 1 SANS Technology Institute - Candidate for Master of Science Degree 1 Steganography Then and Now John Hally May 2012 GIAC GSEC, GCIA, GCIH, GCFA, GCWN,

Steganography

• What it is: Hidden Writing– From Greek words “steganos” (covered) and

“graphie” (writing).– The goal is to hide that communication is

taking place.

• What it is not: Cryptography– The goal of Cryptography is to make data

unreadable by third party.

• Commonly combined together

SANS Technology Institute - Candidate for Master of Science Degree 2

Page 3: 1 SANS Technology Institute - Candidate for Master of Science Degree 1 Steganography Then and Now John Hally May 2012 GIAC GSEC, GCIA, GCIH, GCFA, GCWN,

Uses – Then

• Digital watermarking/copyright protection

• Corporate espionage• Anti-forensics• Terrorist cell covert

communications

SANS Technology Institute - Candidate for Master of Science Degree 3

Page 4: 1 SANS Technology Institute - Candidate for Master of Science Degree 1 Steganography Then and Now John Hally May 2012 GIAC GSEC, GCIA, GCIH, GCFA, GCWN,

Tools - Then

• Then (Circa 2001):– Spammimic– MP3Stego– OutGuess– JPHS (JP Hide and Seek)– Many others:

• www.jjtc.com/Steganography/tools.html

SANS Technology Institute - Candidate for Master of Science Degree 4

Page 5: 1 SANS Technology Institute - Candidate for Master of Science Degree 1 Steganography Then and Now John Hally May 2012 GIAC GSEC, GCIA, GCIH, GCFA, GCWN,

Detection - Then

• Direct comparison using original (visual, statistical)

• Targeted Detection tools – target popular steganography tools

• StegDetect• General framework - Statistical

analysisSANS Technology Institute - Candidate for Master of Science Degree 5

Page 6: 1 SANS Technology Institute - Candidate for Master of Science Degree 1 Steganography Then and Now John Hally May 2012 GIAC GSEC, GCIA, GCIH, GCFA, GCWN,

Tools - Now

• Updates/derivations of original tools

• Steganography Analysis and Research Center (SARC) – Detection Tools

• SARC tools:– StegAlyzerAS– StegAlyzerSS– StegAlyzerRTS

• 3rd Party tool Integration (Fidelis)

SANS Technology Institute - Candidate for Master of Science Degree 6

Page 7: 1 SANS Technology Institute - Candidate for Master of Science Degree 1 Steganography Then and Now John Hally May 2012 GIAC GSEC, GCIA, GCIH, GCFA, GCWN,

Detection - Now

• Signature-based solutions are prevalent

• AntiVirus/AntiMalware similarities• Original Methodologies still

relevant• Forensic expert consensus – not

typically included in investigations

SANS Technology Institute - Candidate for Master of Science Degree 7

Page 8: 1 SANS Technology Institute - Candidate for Master of Science Degree 1 Steganography Then and Now John Hally May 2012 GIAC GSEC, GCIA, GCIH, GCFA, GCWN,

SANS Technology Institute - Candidate for Master of Science Degree 8

In Use Today

• Command and Control• Operation Shady Rat

• Espionage• Russian Intelligence “Illegals

Program”

• Terrorism?

Page 9: 1 SANS Technology Institute - Candidate for Master of Science Degree 1 Steganography Then and Now John Hally May 2012 GIAC GSEC, GCIA, GCIH, GCFA, GCWN,

SANS Technology Institute - Candidate for Master of Science Degree 9

Operation Shady Rat

• A multi-year targeted operation by one ‘actor’ in order to extrude sensitive information from its targets.– 71 compromised organizations identified:

• 21 Government Organizations - including 6 US Federal, 5 State, 3 County

• 6 Industrial Organizations - Construction/heavy industry, Steel, Solar, Energy

• 13 Technology-based Organizations – including 2 Security organizations

• 13 Defense Contractors, many others.

– 3 Stage targeted attack:• Spear Phishing• Command and Control (C&C)• Information Exfiltration

Page 10: 1 SANS Technology Institute - Candidate for Master of Science Degree 1 Steganography Then and Now John Hally May 2012 GIAC GSEC, GCIA, GCIH, GCFA, GCWN,

SANS Technology Institute - Candidate for Master of Science Degree 10

Shady Rat C & C

•Trojan exploit code used steganography

•Commands embedded in HTML and image files

•HTML files used encryption and encoding for obfuscation

•Impregnated commands in images

Page 11: 1 SANS Technology Institute - Candidate for Master of Science Degree 1 Steganography Then and Now John Hally May 2012 GIAC GSEC, GCIA, GCIH, GCFA, GCWN,

SANS Technology Institute - Candidate for Master of Science Degree 11

Examples of Steganographic Files

Page 12: 1 SANS Technology Institute - Candidate for Master of Science Degree 1 Steganography Then and Now John Hally May 2012 GIAC GSEC, GCIA, GCIH, GCFA, GCWN,

SANS Technology Institute - Candidate for Master of Science Degree 12

Espionage

• United States vs. Anna Chapman and Mikhail Semenko

• Illegals Program – Investigation of Russian ‘sleeper’ agents operating in the U.S.

• Main goal was to infiltrate the United States policy making circles.

• Agents were to hide connections between themselves and the Russian Intelligence Federation

Page 13: 1 SANS Technology Institute - Candidate for Master of Science Degree 1 Steganography Then and Now John Hally May 2012 GIAC GSEC, GCIA, GCIH, GCFA, GCWN,

SANS Technology Institute - Candidate for Master of Science Degree 13

Espionage:Covert Communications

• Investigation revealed the use of steganography for communications back to Russia

• Custom steganography program used to embed data in images

• Communications also took place via “wireless drive-by”

• Additional physical steganograhic methods were used

Page 14: 1 SANS Technology Institute - Candidate for Master of Science Degree 1 Steganography Then and Now John Hally May 2012 GIAC GSEC, GCIA, GCIH, GCFA, GCWN,

Enterprise Defenses

• Know your data• Know your traffic• Know your people• Education• Vigilance

SANS Technology Institute - Candidate for Master of Science Degree 14

Page 15: 1 SANS Technology Institute - Candidate for Master of Science Degree 1 Steganography Then and Now John Hally May 2012 GIAC GSEC, GCIA, GCIH, GCFA, GCWN,

Summary

• Steganography• Art of hiding messages in files for covert

communications• Tools

– Hundreds of tools available, many use the same methods

• Detection– Detection methods for well known tools– Statistical analysis required for ‘custom’ tools– Not commonly searched for in typical forensic analysis

• Uses– Command and Control – Shady Rat– Russian Espionage – “Illegals Program”

• Defenses– Know your data, traffic, people– Education and vigilance

SANS Technology Institute - Candidate for Master of Science Degree 15


Related Documents