SlideShare a Scribd company logo
Hunting the Shadows:
In Depth Analysis of Escalated APT Attacks
Fyodor Yarochkin, Academia Sinica
Pei Kan PK Tsung, Academia Sinica
Ming-Chang Jeremy Chiu, Xecure Lab
Ming-Wei Benson Wu, Xecure Lab
1
Agenda
• Why Taiwan?
• The “Lstudio” player… fun 
• Taking a peek at Weaponry
• APT in a Cloud
• Victimology or … chicken-logy?
2
whoweare
Based in Taiwan
Interests in Computer Forensics
Access to some raw network traffic data (fun!)
Get to fish interesting things (PROFFFIIITT!)
@bensonwu [secret] @fygrave
[censored]
3
Disclaimer
A few words before we move on.
- With this research we are primarily interested in
understanding the Ops and victims of discussed
targeted attacks. We DO NOT attempt to
perform any attribution of potential attackers.
4
Taiwan has been a frontline of
APT battlefield for some time
5
Many interesting things could be observed
(though this is not “Lstudio” group)
6
Elirks: earlier campaign
 Reported by Dell/Secureworks as Elirks
http://www.secureworks.com/cyber-threat-
intelligence/threats/chasing_apt/
7
Elirks evolution
http://tw.myblog.yahoo.com/jw!uzrxZwSGHxowPMGZAaj4I5
http://blog.yam.com/minzhu0906/article/54726977
http://diary.blog.yam.com/bigtree20130514/article/10173342
http://tw.myblog.yahoo.com/jw!uzrxZwSGHxowPMGZAaj4I50
-
http://blogs.yahoo.co.jp/sakasesi2013/31805794.html
http://www.plurk.com/mdbmdb
8
Elirks 2.0 – silly to reuse the
address-space
Managed by the same
IP addresses
(easy to cross-correlate)
9
Another on-going Campaign
 On-going:
10
On average, 48 APT emails a
week!
11
The “Lstudio” group:
Exploring fun things in a
greater detail :)
12
They start with a boring
spearphhiiissh
13
Almost clean :)
14
The APT Landscape in Taiwan
15
We’ll examine the “LStudio”
group today
• Unique indicators of the “LStudio” group:
• Debug symbols (.pdb)
• “horse” label and generator tag
• Some curious discoveries from the “Lstudio”
backend data center … ;-)
16
LStudio binaries have cute things
CSJ-Elise
f:toolscodeCSJEliseReleaseEliseDLL.pdb
http://scan.xecure-lab.com
17
CSJ-Elise ..
TAABAMoGvBjTVXHUHaibnwrAWfchx2x17Rf2roRBnbD/9lu13lWnlAUbBgqw+YNld2vcV5krtXoG__FXI43BxueF4FChFrk
SRgNVP2WQ==
http://140.105.135.71:443/2995ebc9/page_12180900.html
http://118.163.60.73:443/2995ebc9/page_12180912.html
18
They love fast
cars 
19
Evora
20
FASST CARS 
Lstudio Operations and C2
21
“Lstudio” payload Generator
Generator
Owner
Horse Label
Generator-Tag
APT Exploit delivery via email
22
We don’t say victim
肉雞 = G
23
The typical botnet model
24
Very advanced Zoo-management
skills :)
25
APT advanced farming :)
 Operated by roughly 25 “farmers”
 Has controlled over 5,884 machines
 International coverage over 30 countries
 Utilizes 4 different Botnet software families
 Active since 2007
26
The “Lstudio” Chicken Cloud 
APT Cloud
Backend Data Center
Farmer
Boss?
Farmer Group B
Farmer Group ACommand Channel
(Second phase backdoor)
Data Channel
(First phase backdoor)
Configurable Bounce
APT Botnet A
27
APT Botnet B
.. And who are the Chicken ?! 
28
International Chicken Farm Corp.
29
chicken farms went international
TW 84%
US 6%
5,884
chickens
2% 30
KR 1% CN 1%
Share some Chicken 
31
http://www.appledaily.com.tw/
http://www.cna.com.tw
KMT ?
KMT ?
When you travel, your chicken
travel too… 
32
Lets look at some travelers 
33
US
Canada
France
England
Taiwan
ANOTHER DISCOVERY!!
34
.. do have 9 to 5 job ;)…
35
Just like some security researchers
do 
36
AND THE LAST .. SOME HANDY
TOOLS TO SHARE 
37
XecScan: Free API
38
Yara: a swiss-knife of static sigs ;)
39
Yara use
Easy to integrate with your scripts
Integration with a proxy server is possible via
icap yara plugin:
https://github.com/fygrave/c_icap_yara
Raw network traffic monitoring project (and
http/DNS indexing):
https://github.com/fygrave/eyepkflow
40
More cool tools
Moloch https://github.com/aol/moloch
Yara mail
https://github.com/kevthehermit/yaraMail
Yara pcap
https://github.com/kevthehermit/YaraPcap
41
Conclusions
Complex infrastructure
Operates since 2007
Multiple software versions
Multiple back-ends
Victims – government and private sector
Mainly Taiwan but also seen world-wide
42
Questions?
benson.wu@xecure-lab.com
jeremy.chiu@xecure-lab.com
pk@hitcon.org
f@plurk.com
43

More Related Content

PPTX
How to assign a CVE to yourself?
PPTX
Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers
PPTX
Common Techniques To Identify Advanced Persistent Threat (APT)
PDF
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
PPTX
Malware Analysis
PDF
Hiding in Plain Sight: The Danger of Known Vulnerabilities
PDF
Advanced red teaming all your badges are belong to us
PPTX
Deploying a Shadow Threat Intel Capability at CaralinaCon on March 6, 2016
How to assign a CVE to yourself?
Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers
Common Techniques To Identify Advanced Persistent Threat (APT)
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
Malware Analysis
Hiding in Plain Sight: The Danger of Known Vulnerabilities
Advanced red teaming all your badges are belong to us
Deploying a Shadow Threat Intel Capability at CaralinaCon on March 6, 2016

What's hot (20)

PPTX
Python-Assisted Red-Teaming Operation
PDF
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
PDF
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
PDF
How secure are your systems
PDF
01_Metasploit - The Elixir of Network Security
PDF
How MITRE ATT&CK helps security operations
PDF
Security precognition chaos engineering in incident response
PPTX
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
PDF
Breaking and entering how and why dhs conducts penetration tests
PDF
Hacking ble smartwatch
PPT
Security Intelligence: Advanced Persistent Threats
PDF
【HITCON FreeTalk 2018 - Spectre & Meltdown 漏洞的修補策略與 risk mitigation】
PPT
The Future of Automated Malware Generation
PPTX
Down The Rabbit Hole, From Networker to Security Professional
PDF
STAAF, An Efficient Distributed Framework for Performing Large-Scale Android ...
PDF
Apt sharing tisa protalk 2-2554
PDF
Deception Technology: Use Cases & Implementation Approaches
PPT
Networking and penetration testing
PDF
Gunadarma workshop security
PDF
Syrian Malware
Python-Assisted Red-Teaming Operation
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
How secure are your systems
01_Metasploit - The Elixir of Network Security
How MITRE ATT&CK helps security operations
Security precognition chaos engineering in incident response
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
Breaking and entering how and why dhs conducts penetration tests
Hacking ble smartwatch
Security Intelligence: Advanced Persistent Threats
【HITCON FreeTalk 2018 - Spectre & Meltdown 漏洞的修補策略與 risk mitigation】
The Future of Automated Malware Generation
Down The Rabbit Hole, From Networker to Security Professional
STAAF, An Efficient Distributed Framework for Performing Large-Scale Android ...
Apt sharing tisa protalk 2-2554
Deception Technology: Use Cases & Implementation Approaches
Networking and penetration testing
Gunadarma workshop security
Syrian Malware
Ad

Viewers also liked (16)

PDF
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
PPTX
APT 28 :Cyber Espionage and the Russian Government?
PDF
Does a Bear Leak in the Woods?
PPS
Giorgia Mia Ok 23 Settembre
PDF
Protecting your site by detection
PDF
Hacklu2011 tricaud
PDF
Loggin alerting and hunting technology hub 2016
PDF
The moment my site got hacked
PPTX
Cyber espionage nation state-apt_attacks_on_the_rise
PPTX
Intrusion prevention system(ips)
PPTX
¿Influyó Rusia en las elecciones a Presidente de los EE.UU. de 2016?
PPTX
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
PDF
Visiting the Bear Den
PPTX
Layakk - Atacando 3G Vol. 2 [rootedvlc2]
PDF
TEDx Manchester: AI & The Future of Work
PDF
Build Features, Not Apps
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
APT 28 :Cyber Espionage and the Russian Government?
Does a Bear Leak in the Woods?
Giorgia Mia Ok 23 Settembre
Protecting your site by detection
Hacklu2011 tricaud
Loggin alerting and hunting technology hub 2016
The moment my site got hacked
Cyber espionage nation state-apt_attacks_on_the_rise
Intrusion prevention system(ips)
¿Influyó Rusia en las elecciones a Presidente de los EE.UU. de 2016?
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Visiting the Bear Den
Layakk - Atacando 3G Vol. 2 [rootedvlc2]
TEDx Manchester: AI & The Future of Work
Build Features, Not Apps
Ad

Similar to Hunting The Shadows: In Depth Analysis of Escalated APT Attacks (20)

PPTX
THREAT HUNTING FROM ZERO TO HERO123.pptx
PDF
Filip palian mateuszkocielski. simplest ownage human observed… routers
PDF
Simplest-Ownage-Human-Observed… - Routers
PDF
D1 t1 t. yunusov k. nesterov - bootkit via sms
PDF
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
PDF
Richard wartell malware is hard. let's go shopping!!
PDF
HackIM 2012 CTF Walkthrough
PPTX
Find the Hacker
PPTX
Steelcon 2015 - 0wning the internet of trash
PDF
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
PDF
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
PDF
Getting Started with iBeacons (Designers of Things 2014)
PDF
Secure Node Code (workshop, O'Reilly Security)
PDF
Hacking Exposed: The Mac Attack
PDF
Hacking Exposed: The Mac Attack
PDF
Fuzzing: Finding Your Own Bugs and 0days! at Arab Security Conference
PDF
From printed circuit boards to exploits
PDF
"egg" - A stealth fine grained code analyzer
PDF
DEF CON 27 - HUBER AND ROSKOSCH - im on your phone listening attacking voip c...
PDF
Web3 + scams = It's a match
THREAT HUNTING FROM ZERO TO HERO123.pptx
Filip palian mateuszkocielski. simplest ownage human observed… routers
Simplest-Ownage-Human-Observed… - Routers
D1 t1 t. yunusov k. nesterov - bootkit via sms
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
Richard wartell malware is hard. let's go shopping!!
HackIM 2012 CTF Walkthrough
Find the Hacker
Steelcon 2015 - 0wning the internet of trash
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
Getting Started with iBeacons (Designers of Things 2014)
Secure Node Code (workshop, O'Reilly Security)
Hacking Exposed: The Mac Attack
Hacking Exposed: The Mac Attack
Fuzzing: Finding Your Own Bugs and 0days! at Arab Security Conference
From printed circuit boards to exploits
"egg" - A stealth fine grained code analyzer
DEF CON 27 - HUBER AND ROSKOSCH - im on your phone listening attacking voip c...
Web3 + scams = It's a match

More from F _ (13)

PDF
Rsa2016
 
PDF
Hitcon 2014: Surviving in tough Russian Environment
 
PDF
Honeycon2014: Mining IoCs from Honeypot data feeds
 
PDF
Indicators of Compromise Magic: Living with compromise
 
PDF
Incident Response Tactics with Compromise Indicators
 
PDF
whats wrong with modern security tools and other blurps
 
PDF
Phd III - defending enterprise
 
PDF
HITB2013AMS Defenting the enterprise, a russian way!
 
PDF
Hitbkl 2012
 
PPT
From russia final_bluehat10
 
PDF
Hacklu2012 v07
 
PPT
2011 hk fyodor-anthony_ppt
 
PDF
0nights2011
 
Rsa2016
 
Hitcon 2014: Surviving in tough Russian Environment
 
Honeycon2014: Mining IoCs from Honeypot data feeds
 
Indicators of Compromise Magic: Living with compromise
 
Incident Response Tactics with Compromise Indicators
 
whats wrong with modern security tools and other blurps
 
Phd III - defending enterprise
 
HITB2013AMS Defenting the enterprise, a russian way!
 
Hitbkl 2012
 
From russia final_bluehat10
 
Hacklu2012 v07
 
2011 hk fyodor-anthony_ppt
 
0nights2011
 

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Approach and Philosophy of On baking technology
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Machine Learning_overview_presentation.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Cloud computing and distributed systems.
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Encapsulation theory and applications.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Unlocking AI with Model Context Protocol (MCP)
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Approach and Philosophy of On baking technology
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
MYSQL Presentation for SQL database connectivity
Machine Learning_overview_presentation.pptx
A Presentation on Artificial Intelligence
Spectral efficient network and resource selection model in 5G networks
NewMind AI Weekly Chronicles - August'25-Week II
MIND Revenue Release Quarter 2 2025 Press Release
The Rise and Fall of 3GPP – Time for a Sabbatical?
Cloud computing and distributed systems.
Encapsulation_ Review paper, used for researhc scholars
Encapsulation theory and applications.pdf
Electronic commerce courselecture one. Pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
A comparative analysis of optical character recognition models for extracting...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Spectroscopy.pptx food analysis technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...

Hunting The Shadows: In Depth Analysis of Escalated APT Attacks

Editor's Notes

  • #20: 整體設計上Elise,將摒棄現行概念底盤以鋁合金打造、車身鈑件也大量採用碳纖維材質的Elise全車重僅1095公斤,而在Lotus的規劃下,未來Elise將搭載擁有約320匹馬力輸出之2.0升四缸引擎。從近來幾部全新發表的Lotus之上,我們能夠看見新一代Lotus係採用源自"鯊魚"的設計概念,並隨著各車型與定位著不同,而各自發展屬於單一車型的獨特風格,而在Elise之上我們也能看見更多銳利的線條與充滿殺氣的勾勒樂手法,以營造出Elise特別的霸氣! http://cool3c.incar.tw/article/34399