SlideShare a Scribd company logo
APT .. Malware and Media
Entertainment for the Industry

http://www.3slabs.com
Advanced Persistent Threat

??

• Target: Organization “XYZ”
– Follows Security Best Practices
– Regular Penetration Tests done
– Empty report with Nessus, AppScan/Acunetix/... on their online
assets

I am a h4x0r and I have better and easier
targets than “XYZ”
I am an employee and my employer
“demands” that I compromise “XYZ”
http://threatpost.tumblr.com/post/16467594167/whos-spying-on-whom-examples-include-hacks-of
The Popular “APT”s 2013
•
•
•
•
•
•
•
•

Red October
APT1
MiniDuke
TeamSpy
Flame
Duqu
StuxNet
[ …. Lot more .. ]

Top countries with Online Resources
seeded with Malware

http://www.securelist.com/en/analysis/204792292/IT_Threat_Evolution_Q1_2013
The “supposedly” Father of APT

You cannot blame it all on the CHINESE ANY MORE !
http://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet
Life of an “APT”
Exploits
R&D

AV Evasion

Payloads

[…]

0day Research
Profiling
Ops

Monitoring

Phishing

Analysis

Targeted Attacks

[…]

Admin & Misc
An “APT” without “A”
The Role of Electronic Media
The Front-Line Defenses
The Front-Line Defenses
The Case of APT “proliferation”
• The MiniDuke Exploit CVE-2013-0640
– Adobe Reader 0day Found-in-the-Wild
– Highly Sophisticated Exploit
• ASLR & DEP bypass using
– Information Leak
– Dynamic Return-Oriented-Programming (ROP)
– First ‘public’ example of ROP-only Shellcode

• Reliable Sandbox Escape
http://www.fireeye.com/blog/technical/cyber-exploits/2013/02/the-number-of-the-beast.html
http://www.fireeye.com/blog/technical/cyber-exploits/2013/02/its-a-kind-of-magic-1.html
http://www.varanoid.com/security-vendors/mcafee/analyzing-the-first-rop-only-sandbox-escaping-pdfexploit/
The Case of APT “proliferation”

This exploit was
developed in TAG
TEAM effort with
A “sample” APT Tool

…..
Thank
You

For listening (being awake)

adatta@3slabs.com
@abh1sek

More Related Content

PDF
Spyware
PPT
Owasp osint presentation - by adam nurudini
PPTX
Basics of getting Into Bug Bounty Hunting
PPT
spyware
PDF
PPT
Viruses Spyware and Spam, Oh My!
PPTX
Ethical hacking
PPTX
Internet Security in Web 2.0
Spyware
Owasp osint presentation - by adam nurudini
Basics of getting Into Bug Bounty Hunting
spyware
Viruses Spyware and Spam, Oh My!
Ethical hacking
Internet Security in Web 2.0

What's hot (20)

PPTX
PACE-IT, Security+3.1: Types of Malware
PDF
Open Source Intelligence (OSINT)
PPT
Spyware
PPTX
Spyware and key loggers
PDF
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
PPT
Ethical Hacking and Network Security
PPT
Spyware
PPTX
Datasploit - An Open Source Intelligence Tool
PPT
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
PPTX
PDF
From OSINT to Phishing presentation
PDF
Detecting Ransomware/Bot Infections in Elasticsearch
PPTX
DLL Preloading Attack
PPTX
Web app security essentials
PPT
Brucon presentation
PPT
Computer Virus
PDF
Rafeeq Rehman - Breaking the Phishing Attack Chain
PPT
Hacking
PPTX
DataSploit - BlackHat Asia 2017
PACE-IT, Security+3.1: Types of Malware
Open Source Intelligence (OSINT)
Spyware
Spyware and key loggers
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
Ethical Hacking and Network Security
Spyware
Datasploit - An Open Source Intelligence Tool
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
From OSINT to Phishing presentation
Detecting Ransomware/Bot Infections in Elasticsearch
DLL Preloading Attack
Web app security essentials
Brucon presentation
Computer Virus
Rafeeq Rehman - Breaking the Phishing Attack Chain
Hacking
DataSploit - BlackHat Asia 2017
Ad

Similar to APT Malware & Media (20)

PPTX
Amien Harisen - APT1 Attack
PPTX
Advanced persistent threats
PDF
RSA: Security Analytics Architecture for APT
PPTX
Catch Me If You Can - Finding APTs in your network
PDF
Advanced Persistent Threats Cutting Through The Hype
PPTX
APT in the Financial Sector
PPTX
Common Techniques To Identify Advanced Persistent Threat (APT)
PPTX
Advanced Persistent Threats
PDF
Apt zero day malware
PPTX
Understanding advanced persistent threats (APT)
DOCX
APTs can you catch’em all
PDF
Countering the Advanced Persistent Threat Challenge with Deep Discovery
PDF
Advanced Persistent Threats: How They Sneak In and Stay Hidden
PPTX
Cyber espionage nation state-apt_attacks_on_the_rise
PDF
Adam Palmer: Managing Advanced Cyber Threats for In-House Counsel
PDF
Understanding Advanced Cybersecurity Threats for the In-House Counsel
PDF
Apt sharing tisa protalk 2-2554
PDF
Advanced Persistent Threats in Cybersecurity – Cyber Warfare
PPTX
International Cooperative: APT Hunting
PPTX
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Amien Harisen - APT1 Attack
Advanced persistent threats
RSA: Security Analytics Architecture for APT
Catch Me If You Can - Finding APTs in your network
Advanced Persistent Threats Cutting Through The Hype
APT in the Financial Sector
Common Techniques To Identify Advanced Persistent Threat (APT)
Advanced Persistent Threats
Apt zero day malware
Understanding advanced persistent threats (APT)
APTs can you catch’em all
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Advanced Persistent Threats: How They Sneak In and Stay Hidden
Cyber espionage nation state-apt_attacks_on_the_rise
Adam Palmer: Managing Advanced Cyber Threats for In-House Counsel
Understanding Advanced Cybersecurity Threats for the In-House Counsel
Apt sharing tisa protalk 2-2554
Advanced Persistent Threats in Cybersecurity – Cyber Warfare
International Cooperative: APT Hunting
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Ad

Recently uploaded (20)

PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Spectroscopy.pptx food analysis technology
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Machine learning based COVID-19 study performance prediction
Per capita expenditure prediction using model stacking based on satellite ima...
Reach Out and Touch Someone: Haptics and Empathic Computing
gpt5_lecture_notes_comprehensive_20250812015547.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Assigned Numbers - 2025 - Bluetooth® Document
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
“AI and Expert System Decision Support & Business Intelligence Systems”
Spectroscopy.pptx food analysis technology
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Mobile App Security Testing_ A Comprehensive Guide.pdf
A comparative analysis of optical character recognition models for extracting...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Approach and Philosophy of On baking technology
Chapter 3 Spatial Domain Image Processing.pdf

APT Malware & Media

  • 1. APT .. Malware and Media Entertainment for the Industry http://www.3slabs.com
  • 2. Advanced Persistent Threat ?? • Target: Organization “XYZ” – Follows Security Best Practices – Regular Penetration Tests done – Empty report with Nessus, AppScan/Acunetix/... on their online assets I am a h4x0r and I have better and easier targets than “XYZ” I am an employee and my employer “demands” that I compromise “XYZ”
  • 4. The Popular “APT”s 2013 • • • • • • • • Red October APT1 MiniDuke TeamSpy Flame Duqu StuxNet [ …. Lot more .. ] Top countries with Online Resources seeded with Malware http://www.securelist.com/en/analysis/204792292/IT_Threat_Evolution_Q1_2013
  • 5. The “supposedly” Father of APT You cannot blame it all on the CHINESE ANY MORE ! http://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet
  • 6. Life of an “APT” Exploits R&D AV Evasion Payloads […] 0day Research Profiling Ops Monitoring Phishing Analysis Targeted Attacks […] Admin & Misc
  • 8. The Role of Electronic Media
  • 11. The Case of APT “proliferation” • The MiniDuke Exploit CVE-2013-0640 – Adobe Reader 0day Found-in-the-Wild – Highly Sophisticated Exploit • ASLR & DEP bypass using – Information Leak – Dynamic Return-Oriented-Programming (ROP) – First ‘public’ example of ROP-only Shellcode • Reliable Sandbox Escape http://www.fireeye.com/blog/technical/cyber-exploits/2013/02/the-number-of-the-beast.html http://www.fireeye.com/blog/technical/cyber-exploits/2013/02/its-a-kind-of-magic-1.html http://www.varanoid.com/security-vendors/mcafee/analyzing-the-first-rop-only-sandbox-escaping-pdfexploit/
  • 12. The Case of APT “proliferation” This exploit was developed in TAG TEAM effort with
  • 13. A “sample” APT Tool …..
  • 14. Thank You For listening (being awake) adatta@3slabs.com @abh1sek