SlideShare a Scribd company logo
Georgia                    NATO
CYBER ATTACKS ON GEORGIAN GOVERNMENTAL RESOURCES
                                       Turkey, Ankara 2012
                                          Zurab Akhvlediani




                                              www.dea.gov.ge
Introduction                                                                                           2




   CERT-Georgia which is Governmental “Computer Emergency Response Team” of Republic of
   Georgia has Discovered Cyber Attack Incident, which seems to be Cyber Espionage Example.


        Advanced Malicious Software was Collecting Sensitive, Confidential Information about
     Georgian and American Security Documents and then uploading it to some of Command and
                     Control Servers. (which changes often upon detection).

      After investigating Attackers Servers and Malicious Files, we have linked this Cyber Attack to
                                   Russian Official Security Agencies.
Introduction                                                                                  3




 In march, 2011 CERT-GOV-GE have dioscovered Botnet Command & Control Web Server.

 After Analysing Webserver, Malicious Files and Various Scripts we found out that:

 1. Some of the Georgian NEWS sites were Hacked. (The Malicious script was injected only in
    the pages, where SPECIFIC information was presented)

 2. After visiting this pages, Computer was infected with Unknown Malicious Program.
    (None of Antivirus Product could Identify this threat, by the time of discovery).

 3. When executed, Malicious File Fully Controls Infected Computers.

 4. Searches for the “Sensitive words” into the Document Files.

 5. Makes Video and Audio Capture using built-in microphone.
4




Targeted Audience


Cyber Attack was designed very smartly. Various Georgian News-Related web-sites
were hacked and modified only Specific News pages (eg. NATO delegation Visit in
Georgia, US-Georgian Agreements and Meetings, Georgian Military NEWS).

www.caucasustimes.com – Site about the NEWS from Caucasian Region

www.cei.ge               – Caucasus Energy and Infrastructure

www.psnews.ge            - Georgian NEWS Site
1. Example of injected script into the                     5
Hacked NEWS website




                                         www.psnews.info
6




              Malicious file was evolving and Develpoed time to time:


30 March, 2011 – Virus Steals Sensitive Docuements, Certificates

14 September 2011 – Changed Infection Mechanism, new Bypassing methods for the
(Antivirus/Firewall/IDS)

25 November 2011 – Virus is more encrypted and obfuscated. infects windows 7
Operating System

12 December 2011 – added Video Recording capability, scanning and infecting
computers through the Network, changed Spreading vector

Command & Control Webserver changes its Destination upon Detection:
Hosted on US, German, French, Hungary, Czech and Russian Hosting Providers.
Infection Vector                                     7




                   Encoded shellcode into PHP file
Downloading Actual Virus File                                                             8




     shellcode Downloads either calc.exe file Directly or makes Get request to calc.php
     to reassemble then to calc.exe (due to firewall ids/ips evasion).




                                Base64 encoded EXE file
Downloading Malicious File                       9
From Russian Website



    www.rbc.ru      -    Рос Бизнес Консалтинг
Infected Computer                                                                        10
BOT



    Not detected with Major Antivirus Product, Bypasses Windows 7 sp1 pathced,
    with Firewall enabled.
    As of 25.03.2011, 20.06.2011, 16.01.2012, 25.03.20112

    After Executing calc.exe itself does 2 major things:

    - injecting into iexplorer.exe and communicating to defaced sites, for C&C address
    retrival

    - creating usbserv.exe bot file in Application Data directory, and writing it to
    autorun in Windows Registry.
Virus Functionalities                                                       11




     • Send any file from the local hard drive to the remote server.
     • Steal certificates
     • Search the hard drive for Microsoft Word documents
     • Search the hard drive for remote desktop configuration files
     • Take screenshots
     • Record audio using the microphone
     • Record video using the webcam
     • Scan the local network to identify other hosts on the same network
     • Execute arbitrary commands on the infected system


       The commands are activated manually and were sent to each host
       individually rather than being broadcast to all infected hosts.
12
Sensitive Words
Destination                                                                                       13




• In The Final Steps Cyber Attacker Steals Matched files, uploads them to the Server. This server is
  often bought from various hosting providers and it changes destination country and IP address
  very often.



  September, 2010 – georgiaonline.xp3.biz (United States) FreeWebHostingArea.com
  March, 2011    – ema.gov.ge                       (Georgia) (hacked webserver)
  April , 2011   - 178.32.91.70                      (France) OVH Hosting
  June, 2011     - 88.198.240.123 / 88.198.238.55 (Germany) DME Hosting
  October, 2011 - 94.199.48.104                     (Hungary) Net23.hu
  November. 2011 - 173.212.192.83                   ( United States )
  December, 2011 - 31.31.75.63                      (Czech Republic)
  January, 2012     - 31.214.140.214                (Germany) DME Hosting
  March, 2012       – 78.46.145.24                   (Germany) DME Hosting
14
Unmasking The Cyber Attackers (Counter Cyber-Intelligence)



   CERT-GOV-GE gained full access to Command & Control servers, Decrypted
   communication mechanisms and malicious files. After Analyzing all the gathered
   information we have identified Cyber attacker persons and organizations.

In 2011-2012, During This New Cyber Espionage Attack, we have identified Russian Security agencies, ones again.

              We have found: 3 main facts, which indicate to Russian Official State organizations.


Warynews.ru – site used to control infected Georgian computers – IP and DNS servers belonges to Russian Business
Network. (mentioned in various Blacklist, Bad Reputation)

www.rbc.ru – written directly into MALWARE code, to communicate with Attackers if every communication channel is
closed. Official name “Russian Business Consulting” – official website, linked with RBN.

Legalcrf.in –Sending Malicious files through SPAM email FROM “admin@President.gov.ge”.
Obscure Registrator, Only Discoverable by Indian WHOIS Service,
Person - Artur Jafuniaev
Address: Lubianka 13, Moscow           <- Federal Security Service of the Russian Federation (FSB)
                                          information and communication technologies Division
15
Unmasking The Cyber Attackers (Counter Cyber-Intelligence)



• We have been monitoring Command & Control Server in 24/7 manner and
  once observed that, attacker ran malicious code in his OWN operating
  system to check new functions.
• Then we have got video of him, personnaly. We have captured process
  of creating new malicious modules.

    We have Obtained Russian Document, from email, where he was giving someone
    instructions how to use this malicious software and how to infect targets.

• We have linked him with some of German and Russian hackers.


• Then we have Obtained information about his destination City, Internet Service Provider,
  Email and etc.
16
Responding Steps




1) CERT Georgia gained access to Command and Controlling Servers which were run by the
   attacker.

2) We have identified all of the Infected computers destinated in Georgia. Then contacted
   Govermental agencies, gave them necessary information how to respond to this incident
   and helped them to disinfect machines.

3) Also CERT-GOV-GE collaborated with US-CERT, Bundes-CERT-Germany, CERT-Ukraine,
   Microsoft Security Divisions, ESET, various hosting Providers. (To shut down attacking servers
   and obtain data for further forensic analysis).
Q/A                                                              17




 Contact Information:


                           The Ministry of Justice
                           Data Exchange Agency

                                Tbilisi, Georgia 0102
                        Tsminda Nikolozis/Nino Chxeizis St. N2




                        Phone: +995 (32) 2 91 51 40
                         E-mail: info@dea.gov.ge
                           zakhvlediani@dea.gov.ge
Thank You

Questions…

More Related Content

PDF
Cyber Espionage Against Georgia (Georbot)
PPTX
Information security & EthicalHacking
PPTX
Security News Byes- Nov
PPTX
Type of Malware and its different analysis and its types !
PDF
Stealth Mango and the Prevalence of Mobile Surveillanceware
PDF
Malware freak show
PDF
Introduction of hacking and cracking
Cyber Espionage Against Georgia (Georbot)
Information security & EthicalHacking
Security News Byes- Nov
Type of Malware and its different analysis and its types !
Stealth Mango and the Prevalence of Mobile Surveillanceware
Malware freak show
Introduction of hacking and cracking

What's hot (20)

PDF
02 Types of Computer Forensics Technology - Notes
PPT
computer security
PDF
News Bytes - December 2012
PPTX
Hacking by Pratyush Gupta
PPTX
yoda at rotary_pune_club
PPTX
Ethical Hacking4
PDF
Fbi cyber division bulletin on tools reportedly used by opm hackers
KEY
Post Apocalyptic Cyber Realism
PPTX
Types of malware threats
PDF
Is Troy Burning - An overview of targeted cyber attacks
PPT
Trojan backdoors
PPSX
Detection of running backdoors
PPTX
Trojans and backdoors
DOCX
Introduction to trojans and backdoors
PPTX
Security Attack Analysis for Finding and Stopping Network Attacks
PPTX
Methods of Cybersecurity Attacks
PDF
Research Paper on Rootkit.
PPTX
Detecting Intrusions and Malware - Eric Vanderburg - JurInnov
PPTX
MMW April 2016 Ransomware Resurgence
PPTX
DerbyCon 2017 - Behind Enemy Lines
02 Types of Computer Forensics Technology - Notes
computer security
News Bytes - December 2012
Hacking by Pratyush Gupta
yoda at rotary_pune_club
Ethical Hacking4
Fbi cyber division bulletin on tools reportedly used by opm hackers
Post Apocalyptic Cyber Realism
Types of malware threats
Is Troy Burning - An overview of targeted cyber attacks
Trojan backdoors
Detection of running backdoors
Trojans and backdoors
Introduction to trojans and backdoors
Security Attack Analysis for Finding and Stopping Network Attacks
Methods of Cybersecurity Attacks
Research Paper on Rootkit.
Detecting Intrusions and Malware - Eric Vanderburg - JurInnov
MMW April 2016 Ransomware Resurgence
DerbyCon 2017 - Behind Enemy Lines
Ad

Similar to CYBER ATTACKS ON GEORGIAN GOVERNMENTAL RESOURCES - Zurab Akhvlediani (20)

PPTX
GovSec Joyal New Threat Matrix
PDF
Cybercrime in Russia: Trends and Issues
PPTX
Cybercrime
DOCX
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
PDF
Cybercriminals target online banking
PPTX
Risk base approach for security management fujitsu-fms event 15 aug 2011
DOCX
Instructions please write a 5 page paper answering the question con
PDF
HITB2013AMS Defenting the enterprise, a russian way!
 
PDF
AtlSecCon 2016
PPTX
What we can learn from LulzSec
PPT
CyberAttack -- Whose side is your computer on?
DOCX
Francophoned – A Sophisticated Social Engineering AttackBy Syma.docx
PPTX
Kurt baumgartner lan_deskse2012
PPT
Cybercrime|Cyberwar - connecting the dots
PDF
RSA Monthly Online Fraud Report -- May 2013
 
PDF
10 days of rain whitepaper june 2011
PDF
Lazarus talk tlp white
PPTX
Cyber Wars.pptx
PDF
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
ODP
Hit by a Cyberattack: lesson learned
GovSec Joyal New Threat Matrix
Cybercrime in Russia: Trends and Issues
Cybercrime
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Cybercriminals target online banking
Risk base approach for security management fujitsu-fms event 15 aug 2011
Instructions please write a 5 page paper answering the question con
HITB2013AMS Defenting the enterprise, a russian way!
 
AtlSecCon 2016
What we can learn from LulzSec
CyberAttack -- Whose side is your computer on?
Francophoned – A Sophisticated Social Engineering AttackBy Syma.docx
Kurt baumgartner lan_deskse2012
Cybercrime|Cyberwar - connecting the dots
RSA Monthly Online Fraud Report -- May 2013
 
10 days of rain whitepaper june 2011
Lazarus talk tlp white
Cyber Wars.pptx
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Hit by a Cyberattack: lesson learned
Ad

Recently uploaded (20)

PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Getting Started with Data Integration: FME Form 101
PDF
Mushroom cultivation and it's methods.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
August Patch Tuesday
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
1. Introduction to Computer Programming.pptx
A comparative study of natural language inference in Swahili using monolingua...
Getting Started with Data Integration: FME Form 101
Mushroom cultivation and it's methods.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Hindi spoken digit analysis for native and non-native speakers
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
August Patch Tuesday
DP Operators-handbook-extract for the Mautical Institute
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Encapsulation theory and applications.pdf
Approach and Philosophy of On baking technology
Accuracy of neural networks in brain wave diagnosis of schizophrenia
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
Enhancing emotion recognition model for a student engagement use case through...
OMC Textile Division Presentation 2021.pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A comparative analysis of optical character recognition models for extracting...
1. Introduction to Computer Programming.pptx

CYBER ATTACKS ON GEORGIAN GOVERNMENTAL RESOURCES - Zurab Akhvlediani

  • 1. Georgia NATO CYBER ATTACKS ON GEORGIAN GOVERNMENTAL RESOURCES Turkey, Ankara 2012 Zurab Akhvlediani www.dea.gov.ge
  • 2. Introduction 2 CERT-Georgia which is Governmental “Computer Emergency Response Team” of Republic of Georgia has Discovered Cyber Attack Incident, which seems to be Cyber Espionage Example. Advanced Malicious Software was Collecting Sensitive, Confidential Information about Georgian and American Security Documents and then uploading it to some of Command and Control Servers. (which changes often upon detection). After investigating Attackers Servers and Malicious Files, we have linked this Cyber Attack to Russian Official Security Agencies.
  • 3. Introduction 3 In march, 2011 CERT-GOV-GE have dioscovered Botnet Command & Control Web Server. After Analysing Webserver, Malicious Files and Various Scripts we found out that: 1. Some of the Georgian NEWS sites were Hacked. (The Malicious script was injected only in the pages, where SPECIFIC information was presented) 2. After visiting this pages, Computer was infected with Unknown Malicious Program. (None of Antivirus Product could Identify this threat, by the time of discovery). 3. When executed, Malicious File Fully Controls Infected Computers. 4. Searches for the “Sensitive words” into the Document Files. 5. Makes Video and Audio Capture using built-in microphone.
  • 4. 4 Targeted Audience Cyber Attack was designed very smartly. Various Georgian News-Related web-sites were hacked and modified only Specific News pages (eg. NATO delegation Visit in Georgia, US-Georgian Agreements and Meetings, Georgian Military NEWS). www.caucasustimes.com – Site about the NEWS from Caucasian Region www.cei.ge – Caucasus Energy and Infrastructure www.psnews.ge - Georgian NEWS Site
  • 5. 1. Example of injected script into the 5 Hacked NEWS website www.psnews.info
  • 6. 6 Malicious file was evolving and Develpoed time to time: 30 March, 2011 – Virus Steals Sensitive Docuements, Certificates 14 September 2011 – Changed Infection Mechanism, new Bypassing methods for the (Antivirus/Firewall/IDS) 25 November 2011 – Virus is more encrypted and obfuscated. infects windows 7 Operating System 12 December 2011 – added Video Recording capability, scanning and infecting computers through the Network, changed Spreading vector Command & Control Webserver changes its Destination upon Detection: Hosted on US, German, French, Hungary, Czech and Russian Hosting Providers.
  • 7. Infection Vector 7 Encoded shellcode into PHP file
  • 8. Downloading Actual Virus File 8 shellcode Downloads either calc.exe file Directly or makes Get request to calc.php to reassemble then to calc.exe (due to firewall ids/ips evasion). Base64 encoded EXE file
  • 9. Downloading Malicious File 9 From Russian Website www.rbc.ru - Рос Бизнес Консалтинг
  • 10. Infected Computer 10 BOT Not detected with Major Antivirus Product, Bypasses Windows 7 sp1 pathced, with Firewall enabled. As of 25.03.2011, 20.06.2011, 16.01.2012, 25.03.20112 After Executing calc.exe itself does 2 major things: - injecting into iexplorer.exe and communicating to defaced sites, for C&C address retrival - creating usbserv.exe bot file in Application Data directory, and writing it to autorun in Windows Registry.
  • 11. Virus Functionalities 11 • Send any file from the local hard drive to the remote server. • Steal certificates • Search the hard drive for Microsoft Word documents • Search the hard drive for remote desktop configuration files • Take screenshots • Record audio using the microphone • Record video using the webcam • Scan the local network to identify other hosts on the same network • Execute arbitrary commands on the infected system The commands are activated manually and were sent to each host individually rather than being broadcast to all infected hosts.
  • 13. Destination 13 • In The Final Steps Cyber Attacker Steals Matched files, uploads them to the Server. This server is often bought from various hosting providers and it changes destination country and IP address very often. September, 2010 – georgiaonline.xp3.biz (United States) FreeWebHostingArea.com March, 2011 – ema.gov.ge (Georgia) (hacked webserver) April , 2011 - 178.32.91.70 (France) OVH Hosting June, 2011 - 88.198.240.123 / 88.198.238.55 (Germany) DME Hosting October, 2011 - 94.199.48.104 (Hungary) Net23.hu November. 2011 - 173.212.192.83 ( United States ) December, 2011 - 31.31.75.63 (Czech Republic) January, 2012 - 31.214.140.214 (Germany) DME Hosting March, 2012 – 78.46.145.24 (Germany) DME Hosting
  • 14. 14 Unmasking The Cyber Attackers (Counter Cyber-Intelligence) CERT-GOV-GE gained full access to Command & Control servers, Decrypted communication mechanisms and malicious files. After Analyzing all the gathered information we have identified Cyber attacker persons and organizations. In 2011-2012, During This New Cyber Espionage Attack, we have identified Russian Security agencies, ones again. We have found: 3 main facts, which indicate to Russian Official State organizations. Warynews.ru – site used to control infected Georgian computers – IP and DNS servers belonges to Russian Business Network. (mentioned in various Blacklist, Bad Reputation) www.rbc.ru – written directly into MALWARE code, to communicate with Attackers if every communication channel is closed. Official name “Russian Business Consulting” – official website, linked with RBN. Legalcrf.in –Sending Malicious files through SPAM email FROM “admin@President.gov.ge”. Obscure Registrator, Only Discoverable by Indian WHOIS Service, Person - Artur Jafuniaev Address: Lubianka 13, Moscow <- Federal Security Service of the Russian Federation (FSB) information and communication technologies Division
  • 15. 15 Unmasking The Cyber Attackers (Counter Cyber-Intelligence) • We have been monitoring Command & Control Server in 24/7 manner and once observed that, attacker ran malicious code in his OWN operating system to check new functions. • Then we have got video of him, personnaly. We have captured process of creating new malicious modules. We have Obtained Russian Document, from email, where he was giving someone instructions how to use this malicious software and how to infect targets. • We have linked him with some of German and Russian hackers. • Then we have Obtained information about his destination City, Internet Service Provider, Email and etc.
  • 16. 16 Responding Steps 1) CERT Georgia gained access to Command and Controlling Servers which were run by the attacker. 2) We have identified all of the Infected computers destinated in Georgia. Then contacted Govermental agencies, gave them necessary information how to respond to this incident and helped them to disinfect machines. 3) Also CERT-GOV-GE collaborated with US-CERT, Bundes-CERT-Germany, CERT-Ukraine, Microsoft Security Divisions, ESET, various hosting Providers. (To shut down attacking servers and obtain data for further forensic analysis).
  • 17. Q/A 17 Contact Information: The Ministry of Justice Data Exchange Agency Tbilisi, Georgia 0102 Tsminda Nikolozis/Nino Chxeizis St. N2 Phone: +995 (32) 2 91 51 40 E-mail: info@dea.gov.ge zakhvlediani@dea.gov.ge

Editor's Notes

  • #3: Attack was discovered by CERT-Georgia.
  • #5: *Only the persons who was interested in such information were infected with this Advanced Threat, despite of Security Defensive measure’s and Softwares used on targets Computer and Network Systems. Threat was highly encrypted and used contemporary stealthy techniques, so that none of security tools could indetify it.