SlideShare a Scribd company logo
1 ©2020 RSA Security LLC or its affiliates. All rights reserved.©2020 RSA Security LLC or its affiliates. All rights reserved.
OH... THAT'S RANSOMWARE AND...
LOOK BEHIND YOU…
A THREE-HEADED MONKEY!...
A flamboyant tale of swashbucklers and leakware....
CONFIDENTIAL
2 ©2020 RSA Security LLC or its affiliates. All rights reserved.
Who we are...
Evolution of the Ransom-world
From Cryptware to Leakware
The Rise of the MaaS
A very recent Ransomware case…
Negotiation, investigation and recovery…
Lesson learned
AGENDA
3 ©2020 RSA Security LLC or its affiliates. All rights reserved.
I am a Senior Principal Consultant and a leading figure of the RSA IR Team
operating worldwide.
I started my career cracking software in 1985 with a Commodore C64…
I decided to get out of the cracking scene in early 2000s and for about three
years I remained focused on Networking… until Nimda and Blaster came out
and testing networks and systems security became an interesting career…
I worked on the offensive side until 2009 when I jumped onto the IR
bandwagon.
Since then, I got busy with engagement around the world covering investigation
in banks, military, governments and telco companies.
STEFANO MACCAGLIA
4 ©2020 RSA Security LLC or its affiliates. All rights reserved.
MARCO FAGGIAN
I am a Senior Consultant for Incident Response operating in the EMEA area.
I joined RSA in 2012 as Delivery Specialist performing implementation, design
and analytics support to customers globally.
From 2016 I am part of the RSA Incident Response team and I participate to
engagements covering Private and Public companies and the Telco sector.
Graduated in Computer Engineering in Padua, I started my career by dealing
with issues related to computer security, collaborating with different
consultancy companies located in Italy and in UK.
My actual role led me to follow some of the most important customers in the
EMEA region.
5 ©2020 RSA Security LLC or its affiliates. All rights reserved.
▪ If we look at the common definition of Ransomware, we stumble on something like this…
Evolution of the ransom-world
Ransomware is malware that employs encryption to hold a victim’s information at ransom.
A user or organization’s critical data is encrypted so that they cannot access files, databases, or applications.
A ransom is then demanded to provide access.
Ransomware is often designed to spread across a network and target database and file servers and can thus quickly paralyze
an entire organization.
It is a growing threat, generating billions of dollars in payments to cybercriminals and inflicting significant damage and
expenses for businesses and governmental organizations.
▪ Are we sure this description is exhaustive nowadays???
6 ©2020 RSA Security LLC or its affiliates. All rights reserved.
• Let’s just play with this…
• Do you see anything strange in this ransomware message?...
• C’mon… don’t focus on the fact they hacked the network…
there is more in this message…
Evolution of the
ransom-world
7 ©2020 RSA Security LLC or its affiliates. All rights reserved.
• Look!... A the three headed monkey!...
Evolution of the
ransom-world
8 ©2020 RSA Security LLC or its affiliates. All rights reserved.
▪ Since December 2019, ransomware operators have been using leakware/ransomware hybrid attacks
more and more often.
▪ These attacks combine the classic ransomware attack with a leakware attack.
Evolution of the Ransom-world
In a classic
ransomware attack,
the victim’s data is
encrypted and is
decrypted after the
victim pays a
ransom.
In a hybrid attack,
the data is stolen,
then encrypted.
The victim is
blackmailed with the
data being released
publicly unless he
pays a certain fee.
In a classic
ransomware attack,
the Ransomware is
the main tool.
In a hybrid attack,
the Ransomware is
just one of the tools.
9 ©2020 RSA Security LLC or its affiliates. All rights reserved.
Long story short…
They just forgot to
tell us:
10 ©2020 RSA Security LLC or its affiliates. All rights reserved.
Hybrid Attacks
• In a hybrid attack, the data is first
stolen, then encrypted.
• Then the victim is asked to pay the
ransom for decryption.
• If the victim declines to pay the
ransom, the attackers threaten him
to release the stolen data publicly.
• In some cases, business partners
and/or customers of the victim are
also informed of the impending
data release to put even more
pressure on the victim.
This strategy is a “game-changer” as it introduces new techniques and new actors…
let’s see an example…
11 ©2020 RSA Security LLC or its affiliates. All rights reserved.
12 ©2020 RSA Security LLC or its affiliates. All rights reserved.
The Malware-as-a-Service
13 ©2020 RSA Security LLC or its affiliates. All rights reserved.
MaaS auction example
14 ©2020 RSA Security LLC or its affiliates. All rights reserved.
15 ©2020 RSA Security LLC or its affiliates. All rights reserved.
16 ©2020 RSA Security LLC or its affiliates. All rights reserved.
17 ©2020 RSA Security LLC or its affiliates. All rights reserved.©2020 RSA Security LLC or its affiliates.
All rights reserved.
A recent case
C O N F I D E N T I A L
18 ©2020 RSA Security LLC or its affiliates. All rights reserved.
19 ©2020 RSA Security LLC or its affiliates. All rights reserved.
19
20 ©2020 RSA Security LLC or its affiliates. All rights reserved.
20
21 ©2020 RSA Security LLC or its affiliates. All rights reserved.
21
22 ©2020 RSA Security LLC or its affiliates. All rights reserved.
Nefilim Ransomware banner
23 ©2020 RSA Security LLC or its affiliates. All rights reserved.
23
Spearphish
email
Macro in
Weaponized
Document
CommandLine
Powershell
downloads
Emotet
Emotet
Nefilim
Ransomware
Disable AV
Data harvesting
Credential theft
TrickBot
Drop final
stage
If the system is of
interest Emotet
accesses a
dropzone
Emotet
downloads
Trickbot
C&C
Dropzone
HTTPS
HTTPS
HTTPS
Look behind you… a one-headed human...
24 ©2020 RSA Security LLC or its affiliates. All rights reserved.
24
25 ©2020 RSA Security LLC or its affiliates. All rights reserved.
25
26 ©2020 RSA Security LLC or its affiliates. All rights reserved.©2020 RSA Security LLC or its affiliates.
All rights reserved.
A Second case
C O N F I D E N T I A L
27 ©2020 RSA Security LLC or its affiliates. All rights reserved. C O N F I D E N T I A L
▪ On a lazy morning in a far land… a customer IPS sent an alert to the SOC:
Dead Men Tell No Tales
▪ Due the fact that the customer has a retainer contract in place with RSA, SOC team decide to open
a call to verify if the IPS alert is anything to worry about… more a scruple from the SOC team,
than a real point of attention.
“Possible Metasploit Reverse HTTPS traffic”
28 ©2020 RSA Security LLC or its affiliates. All rights reserved. C O N F I D E N T I A L
▪ RSA NetWitness packet was already in place on the main datacenter to monitor the network traffic.
Dead Men Tell No Tales
▪ When the incident occurred, the Customer was not having an EDR solution in place, so RSA IR
Team proceeded to deploy RSA NetWitness Endpoint and started to distribute the agent on all the
involved hosts.
29 ©2020 RSA Security LLC or its affiliates. All rights reserved.
30 ©2020 RSA Security LLC or its affiliates. All rights reserved.
31 ©2020 RSA Security LLC or its affiliates. All rights reserved.
32 ©2020 RSA Security LLC or its affiliates. All rights reserved.
C O N F I D E N T I A L
▪ EURMILLAP3275 contacts the link included on the email and few minutes after starts to
communicate on SSL with 2 more hosts.
Patient Zero analysis
No website associate
to the hostname and no
information on Google
about it!
Organization (O) and
Organizational Unit (OU)
on the certificate
Pretend to be signed by a
CA but the CA chain was
not real
Looking for all the SSL traffic
with similar charatteristics allow
RSA analysts to uncover all the
C2 stations used by the attacker.
33 ©2020 RSA Security LLC or its affiliates. All rights reserved. C O N F I D E N T I A L
Patient Zero analysis
The two TXT files, with a name formed
by strings of random characters,
saved in c:ProgramDataMicrosoft
are actually the two javascript that
allow communication with the C2
Through the endpoint analysis performed using NetWitness Endpoint, RSA analyst was able to retrieve part of the
malware artifacts used for the initial infection.
34 ©2020 RSA Security LLC or its affiliates. All rights reserved. C O N F I D E N T I A L
The Malware infection flow
35 ©2020 RSA Security LLC or its affiliates. All rights reserved. C O N F I D E N T I A L
On the same client RSA was able to identify a command line Active Directory query tool called:
Patient zero analysis
File has been stored under
c:WindowsTemp and
executed on the day of the
initial infection, presumably to
enumerate the the Active
Directory servers.
RSA was not able to recover the data exfiltrated due the missing of an EDR in place during the attack.
AdFind.exe
36 ©2020 RSA Security LLC or its affiliates. All rights reserved.
Living-off-the-land
attacks
• Attacker behavior that uses tools or features that already exist in the target
environment.
• Using pre-existing software avoids the process being flagged as suspicious
and reduce the possibility to be intercepted.
• Distinguish malicious use of built-in tools versus the authorized use of
tools by the system administrator can be tough for the analyst.
• Additionally, the attacker is secure to find the correct version of the
software on each machine, don’t need to be warried about compatibility of
it is artifacts.
• Attacker tend to use fileless attack where the resources used are not written
to disk. Thinks that stay in memory are much harder to both detect and to
find later.
37 ©2020 RSA Security LLC or its affiliates. All rights reserved.©2020 RSA Security LLC or its affiliates.
All rights reserved.
To protect and serve…
C O N F I D E N T I A L
38 ©2020 RSA Security LLC or its affiliates. All rights reserved.
Advices for the
Negotiation
• When the Ransomware is detonated it will display
information about on how to contact (the crime gang) to
pay the fee that they are looking for and receive the key to
unencrypt the data.
• While we recommend not to pay, unless critical to keep the
business on, we advise to open the channel for a
conversation with the cybercriminals.
• Once authorized by counsel/client, contact is made with
the gang on the dark web to advise them that systems are
impacted and we would like to discuss getting our data
back, or data not being released to public sites, etc.
• We provide them with a known encrypted file to make sure
they are able to unencrypt and provide us back the known
file to ensure that actually have the decryptor.
• In addition, to gain credibility, we have a discussion about
how to lower price, funds available, etc…
• There is always room in negotiating a fee lower, and the
cybercriminals expect that.
39 ©2020 RSA Security LLC or its affiliates. All rights reserved.
▪ In the last twelve months we participated to the negotiation in several cases and we learned some
important aspects:
▪ Do not underestimate the negotiation from the Cybercriminal gang, they are often skilled individual
with wide experience on such topics… in fact, in one case, we clearly faced a conversation with a
former FSB negotiator (he told us about that).
▪ The conversation should be strictly limited in number of participants. In one case, when an
uninvited participant joined the negotiation at a later stage, the attacker get off the channel and the
data went immediately released…
▪ The attackers are willing to explain how good they are… this is the only weak spot we found during
the negotiations… you can leverage on this to collect some critical items useful for the IR
investigation.
▪ The attacker is usually not keen to overreact, he knows he has some good files in his hand... He
reviewed his stuff before detonating the ransomware, so every attempt to downsize the value of the
stolen material, during the negotiation, will fail… sometime will fail miserably…
Negotiation pitfalls
40 ©2020 RSA Security LLC or its affiliates. All rights reserved.
LESSON LEARNED
Don’t let the pressure guide you… Always think about possibilities…
The blackhats tell you they are perfect… but they are not…
The key is to use the negotiation as a functional step
Don’t take shortcuts… try to support the investigation
Think positive…
41 ©2020 RSA Security LLC or its affiliates. All rights reserved.
Post-Incident
recommendations
• Even with the decryptor, unencrypting the data is a painful and costly experience for a
company...
• Our continuous message to clients is to secure and segment their infrastructure so these
attacks are not as successful. That is cheaper than the response efforts that occur with a breach.
• The anonymity of the Internet and the lack of international cooperation between the
countries have really hampered the ability of law enforcement/prosecutors to take any real
meaningful action to identify and prosecute these OC (organized crime) and nation-state
actors.
• Thus, since this avenue is a long shot to dissuade threat actors, it is up to companies to do a
better job of protecting themselves
42 ©2020 RSA Security LLC or its affiliates. All rights reserved.
Q’n’A
43 ©2020 RSA Security LLC or its affiliates. All rights reserved.
Thanks!

More Related Content

PDF
UN Presentation - 10-17-2018 - Maccaglia
PDF
Light, Dark and... a Sunburst... dissection of a very sophisticated attack.
PPTX
Chasing the Adder. A tale from the APT world...
PDF
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
PPTX
Crack the Code
PDF
WannaCry Ransomware Attack: What to Do Now
DOCX
Case Study of RSA Data Breach
PDF
Analysis of RSA Lockheed Martin Attack
UN Presentation - 10-17-2018 - Maccaglia
Light, Dark and... a Sunburst... dissection of a very sophisticated attack.
Chasing the Adder. A tale from the APT world...
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Crack the Code
WannaCry Ransomware Attack: What to Do Now
Case Study of RSA Data Breach
Analysis of RSA Lockheed Martin Attack

What's hot (20)

PPTX
NDIA 2021 - solar winds overview and takeaways
PDF
Cyber espionage - Tinker, taylor, soldier, spy
PDF
RSA Anatomy of an Attack
PPTX
Evolution of ransomware
PDF
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
PPTX
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
PPTX
Common Techniques To Identify Advanced Persistent Threat (APT)
PPT
Security Intelligence: Advanced Persistent Threats
PPTX
Ransomware: Emergence of the Cyber-Extortion Menace
PPTX
Industry reactions to wanna cry ransomware attacks
PDF
Triangulum - Ransomware Evolved - Why your backups arent good enough
PDF
BSides IR in Heterogeneous Environment
PDF
Flashpoint ransomware april2016
PPTX
seminar report on What is ransomware
PDF
PPTX
Ransomware
PDF
Advanced persistent threats(APT)
PPTX
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
PPTX
Ransomware Detection: Don’t Pay Up. Backup.
PDF
Ransomware 2020 Report
NDIA 2021 - solar winds overview and takeaways
Cyber espionage - Tinker, taylor, soldier, spy
RSA Anatomy of an Attack
Evolution of ransomware
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Common Techniques To Identify Advanced Persistent Threat (APT)
Security Intelligence: Advanced Persistent Threats
Ransomware: Emergence of the Cyber-Extortion Menace
Industry reactions to wanna cry ransomware attacks
Triangulum - Ransomware Evolved - Why your backups arent good enough
BSides IR in Heterogeneous Environment
Flashpoint ransomware april2016
seminar report on What is ransomware
Ransomware
Advanced persistent threats(APT)
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
Ransomware Detection: Don’t Pay Up. Backup.
Ransomware 2020 Report
Ad

Similar to Oh... that's ransomware and... look behind you a three-headed Monkey (20)

PPTX
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
PDF
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
PDF
What is ransomware?
PPTX
Advanced Threats In The Enterprise
PDF
Ransomware Trends 2017 & Mitigation Techniques
PDF
3. Ransomware (cyber awareness series)
PPTX
Defend Your Company Against Ransomware
PPTX
EverSec + Cyphort: Big Trends in Cybersecurity
PDF
How ransomware can hold your business hostage
PPTX
Ransomware : A cyber crime without solution ? by Prashant Mali
PDF
Ransomware ly
PDF
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
PDF
Ransomware (1).pdf
PDF
Get Smart about Ransomware: Protect Yourself and Organization
PDF
How to Help Your Customers Protect Themselves from Ransomware Attacks
PDF
Ransomware : Challenges and best practices
PDF
HCA 530, Week2, Psa i-091516-ransomware notice from fbi
PDF
Ransomware_PDF
PPTX
All your files now belong to us
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
What is ransomware?
Advanced Threats In The Enterprise
Ransomware Trends 2017 & Mitigation Techniques
3. Ransomware (cyber awareness series)
Defend Your Company Against Ransomware
EverSec + Cyphort: Big Trends in Cybersecurity
How ransomware can hold your business hostage
Ransomware : A cyber crime without solution ? by Prashant Mali
Ransomware ly
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
Ransomware (1).pdf
Get Smart about Ransomware: Protect Yourself and Organization
How to Help Your Customers Protect Themselves from Ransomware Attacks
Ransomware : Challenges and best practices
HCA 530, Week2, Psa i-091516-ransomware notice from fbi
Ransomware_PDF
All your files now belong to us
Ad

Recently uploaded (20)

PDF
Why Top Brands Trust Enuncia Global for Language Solutions.pdf
PDF
Swiggy’s Playbook: UX, Logistics & Monetization
PDF
oil_refinery_presentation_v1 sllfmfls.pdf
PPTX
Hydrogel Based delivery Cancer Treatment
PPTX
fundraisepro pitch deck elegant and modern
PPTX
Relationship Management Presentation In Banking.pptx
PDF
Instagram's Product Secrets Unveiled with this PPT
PPTX
Non-Verbal-Communication .mh.pdf_110245_compressed.pptx
PPTX
Introduction to Effective Communication.pptx
PPTX
Presentation for DGJV QMS (PQP)_12.03.2025.pptx
DOC
学位双硕士UTAS毕业证,墨尔本理工学院毕业证留学硕士毕业证
PPTX
Primary and secondary sources, and history
PPTX
nose tajweed for the arabic alphabets for the responsive
PPTX
Understanding-Communication-Berlos-S-M-C-R-Model.pptx
PDF
Parts of Speech Prepositions Presentation in Colorful Cute Style_20250724_230...
PPTX
BIOLOGY TISSUE PPT CLASS 9 PROJECT PUBLIC
PPTX
Project and change Managment: short video sequences for IBA
PPTX
Tour Presentation Educational Activity.pptx
PPTX
Emphasizing It's Not The End 08 06 2025.pptx
PPTX
The spiral of silence is a theory in communication and political science that...
Why Top Brands Trust Enuncia Global for Language Solutions.pdf
Swiggy’s Playbook: UX, Logistics & Monetization
oil_refinery_presentation_v1 sllfmfls.pdf
Hydrogel Based delivery Cancer Treatment
fundraisepro pitch deck elegant and modern
Relationship Management Presentation In Banking.pptx
Instagram's Product Secrets Unveiled with this PPT
Non-Verbal-Communication .mh.pdf_110245_compressed.pptx
Introduction to Effective Communication.pptx
Presentation for DGJV QMS (PQP)_12.03.2025.pptx
学位双硕士UTAS毕业证,墨尔本理工学院毕业证留学硕士毕业证
Primary and secondary sources, and history
nose tajweed for the arabic alphabets for the responsive
Understanding-Communication-Berlos-S-M-C-R-Model.pptx
Parts of Speech Prepositions Presentation in Colorful Cute Style_20250724_230...
BIOLOGY TISSUE PPT CLASS 9 PROJECT PUBLIC
Project and change Managment: short video sequences for IBA
Tour Presentation Educational Activity.pptx
Emphasizing It's Not The End 08 06 2025.pptx
The spiral of silence is a theory in communication and political science that...

Oh... that's ransomware and... look behind you a three-headed Monkey

  • 1. 1 ©2020 RSA Security LLC or its affiliates. All rights reserved.©2020 RSA Security LLC or its affiliates. All rights reserved. OH... THAT'S RANSOMWARE AND... LOOK BEHIND YOU… A THREE-HEADED MONKEY!... A flamboyant tale of swashbucklers and leakware.... CONFIDENTIAL
  • 2. 2 ©2020 RSA Security LLC or its affiliates. All rights reserved. Who we are... Evolution of the Ransom-world From Cryptware to Leakware The Rise of the MaaS A very recent Ransomware case… Negotiation, investigation and recovery… Lesson learned AGENDA
  • 3. 3 ©2020 RSA Security LLC or its affiliates. All rights reserved. I am a Senior Principal Consultant and a leading figure of the RSA IR Team operating worldwide. I started my career cracking software in 1985 with a Commodore C64… I decided to get out of the cracking scene in early 2000s and for about three years I remained focused on Networking… until Nimda and Blaster came out and testing networks and systems security became an interesting career… I worked on the offensive side until 2009 when I jumped onto the IR bandwagon. Since then, I got busy with engagement around the world covering investigation in banks, military, governments and telco companies. STEFANO MACCAGLIA
  • 4. 4 ©2020 RSA Security LLC or its affiliates. All rights reserved. MARCO FAGGIAN I am a Senior Consultant for Incident Response operating in the EMEA area. I joined RSA in 2012 as Delivery Specialist performing implementation, design and analytics support to customers globally. From 2016 I am part of the RSA Incident Response team and I participate to engagements covering Private and Public companies and the Telco sector. Graduated in Computer Engineering in Padua, I started my career by dealing with issues related to computer security, collaborating with different consultancy companies located in Italy and in UK. My actual role led me to follow some of the most important customers in the EMEA region.
  • 5. 5 ©2020 RSA Security LLC or its affiliates. All rights reserved. ▪ If we look at the common definition of Ransomware, we stumble on something like this… Evolution of the ransom-world Ransomware is malware that employs encryption to hold a victim’s information at ransom. A user or organization’s critical data is encrypted so that they cannot access files, databases, or applications. A ransom is then demanded to provide access. Ransomware is often designed to spread across a network and target database and file servers and can thus quickly paralyze an entire organization. It is a growing threat, generating billions of dollars in payments to cybercriminals and inflicting significant damage and expenses for businesses and governmental organizations. ▪ Are we sure this description is exhaustive nowadays???
  • 6. 6 ©2020 RSA Security LLC or its affiliates. All rights reserved. • Let’s just play with this… • Do you see anything strange in this ransomware message?... • C’mon… don’t focus on the fact they hacked the network… there is more in this message… Evolution of the ransom-world
  • 7. 7 ©2020 RSA Security LLC or its affiliates. All rights reserved. • Look!... A the three headed monkey!... Evolution of the ransom-world
  • 8. 8 ©2020 RSA Security LLC or its affiliates. All rights reserved. ▪ Since December 2019, ransomware operators have been using leakware/ransomware hybrid attacks more and more often. ▪ These attacks combine the classic ransomware attack with a leakware attack. Evolution of the Ransom-world In a classic ransomware attack, the victim’s data is encrypted and is decrypted after the victim pays a ransom. In a hybrid attack, the data is stolen, then encrypted. The victim is blackmailed with the data being released publicly unless he pays a certain fee. In a classic ransomware attack, the Ransomware is the main tool. In a hybrid attack, the Ransomware is just one of the tools.
  • 9. 9 ©2020 RSA Security LLC or its affiliates. All rights reserved. Long story short… They just forgot to tell us:
  • 10. 10 ©2020 RSA Security LLC or its affiliates. All rights reserved. Hybrid Attacks • In a hybrid attack, the data is first stolen, then encrypted. • Then the victim is asked to pay the ransom for decryption. • If the victim declines to pay the ransom, the attackers threaten him to release the stolen data publicly. • In some cases, business partners and/or customers of the victim are also informed of the impending data release to put even more pressure on the victim. This strategy is a “game-changer” as it introduces new techniques and new actors… let’s see an example…
  • 11. 11 ©2020 RSA Security LLC or its affiliates. All rights reserved.
  • 12. 12 ©2020 RSA Security LLC or its affiliates. All rights reserved. The Malware-as-a-Service
  • 13. 13 ©2020 RSA Security LLC or its affiliates. All rights reserved. MaaS auction example
  • 14. 14 ©2020 RSA Security LLC or its affiliates. All rights reserved.
  • 15. 15 ©2020 RSA Security LLC or its affiliates. All rights reserved.
  • 16. 16 ©2020 RSA Security LLC or its affiliates. All rights reserved.
  • 17. 17 ©2020 RSA Security LLC or its affiliates. All rights reserved.©2020 RSA Security LLC or its affiliates. All rights reserved. A recent case C O N F I D E N T I A L
  • 18. 18 ©2020 RSA Security LLC or its affiliates. All rights reserved.
  • 19. 19 ©2020 RSA Security LLC or its affiliates. All rights reserved. 19
  • 20. 20 ©2020 RSA Security LLC or its affiliates. All rights reserved. 20
  • 21. 21 ©2020 RSA Security LLC or its affiliates. All rights reserved. 21
  • 22. 22 ©2020 RSA Security LLC or its affiliates. All rights reserved. Nefilim Ransomware banner
  • 23. 23 ©2020 RSA Security LLC or its affiliates. All rights reserved. 23 Spearphish email Macro in Weaponized Document CommandLine Powershell downloads Emotet Emotet Nefilim Ransomware Disable AV Data harvesting Credential theft TrickBot Drop final stage If the system is of interest Emotet accesses a dropzone Emotet downloads Trickbot C&C Dropzone HTTPS HTTPS HTTPS Look behind you… a one-headed human...
  • 24. 24 ©2020 RSA Security LLC or its affiliates. All rights reserved. 24
  • 25. 25 ©2020 RSA Security LLC or its affiliates. All rights reserved. 25
  • 26. 26 ©2020 RSA Security LLC or its affiliates. All rights reserved.©2020 RSA Security LLC or its affiliates. All rights reserved. A Second case C O N F I D E N T I A L
  • 27. 27 ©2020 RSA Security LLC or its affiliates. All rights reserved. C O N F I D E N T I A L ▪ On a lazy morning in a far land… a customer IPS sent an alert to the SOC: Dead Men Tell No Tales ▪ Due the fact that the customer has a retainer contract in place with RSA, SOC team decide to open a call to verify if the IPS alert is anything to worry about… more a scruple from the SOC team, than a real point of attention. “Possible Metasploit Reverse HTTPS traffic”
  • 28. 28 ©2020 RSA Security LLC or its affiliates. All rights reserved. C O N F I D E N T I A L ▪ RSA NetWitness packet was already in place on the main datacenter to monitor the network traffic. Dead Men Tell No Tales ▪ When the incident occurred, the Customer was not having an EDR solution in place, so RSA IR Team proceeded to deploy RSA NetWitness Endpoint and started to distribute the agent on all the involved hosts.
  • 29. 29 ©2020 RSA Security LLC or its affiliates. All rights reserved.
  • 30. 30 ©2020 RSA Security LLC or its affiliates. All rights reserved.
  • 31. 31 ©2020 RSA Security LLC or its affiliates. All rights reserved.
  • 32. 32 ©2020 RSA Security LLC or its affiliates. All rights reserved. C O N F I D E N T I A L ▪ EURMILLAP3275 contacts the link included on the email and few minutes after starts to communicate on SSL with 2 more hosts. Patient Zero analysis No website associate to the hostname and no information on Google about it! Organization (O) and Organizational Unit (OU) on the certificate Pretend to be signed by a CA but the CA chain was not real Looking for all the SSL traffic with similar charatteristics allow RSA analysts to uncover all the C2 stations used by the attacker.
  • 33. 33 ©2020 RSA Security LLC or its affiliates. All rights reserved. C O N F I D E N T I A L Patient Zero analysis The two TXT files, with a name formed by strings of random characters, saved in c:ProgramDataMicrosoft are actually the two javascript that allow communication with the C2 Through the endpoint analysis performed using NetWitness Endpoint, RSA analyst was able to retrieve part of the malware artifacts used for the initial infection.
  • 34. 34 ©2020 RSA Security LLC or its affiliates. All rights reserved. C O N F I D E N T I A L The Malware infection flow
  • 35. 35 ©2020 RSA Security LLC or its affiliates. All rights reserved. C O N F I D E N T I A L On the same client RSA was able to identify a command line Active Directory query tool called: Patient zero analysis File has been stored under c:WindowsTemp and executed on the day of the initial infection, presumably to enumerate the the Active Directory servers. RSA was not able to recover the data exfiltrated due the missing of an EDR in place during the attack. AdFind.exe
  • 36. 36 ©2020 RSA Security LLC or its affiliates. All rights reserved. Living-off-the-land attacks • Attacker behavior that uses tools or features that already exist in the target environment. • Using pre-existing software avoids the process being flagged as suspicious and reduce the possibility to be intercepted. • Distinguish malicious use of built-in tools versus the authorized use of tools by the system administrator can be tough for the analyst. • Additionally, the attacker is secure to find the correct version of the software on each machine, don’t need to be warried about compatibility of it is artifacts. • Attacker tend to use fileless attack where the resources used are not written to disk. Thinks that stay in memory are much harder to both detect and to find later.
  • 37. 37 ©2020 RSA Security LLC or its affiliates. All rights reserved.©2020 RSA Security LLC or its affiliates. All rights reserved. To protect and serve… C O N F I D E N T I A L
  • 38. 38 ©2020 RSA Security LLC or its affiliates. All rights reserved. Advices for the Negotiation • When the Ransomware is detonated it will display information about on how to contact (the crime gang) to pay the fee that they are looking for and receive the key to unencrypt the data. • While we recommend not to pay, unless critical to keep the business on, we advise to open the channel for a conversation with the cybercriminals. • Once authorized by counsel/client, contact is made with the gang on the dark web to advise them that systems are impacted and we would like to discuss getting our data back, or data not being released to public sites, etc. • We provide them with a known encrypted file to make sure they are able to unencrypt and provide us back the known file to ensure that actually have the decryptor. • In addition, to gain credibility, we have a discussion about how to lower price, funds available, etc… • There is always room in negotiating a fee lower, and the cybercriminals expect that.
  • 39. 39 ©2020 RSA Security LLC or its affiliates. All rights reserved. ▪ In the last twelve months we participated to the negotiation in several cases and we learned some important aspects: ▪ Do not underestimate the negotiation from the Cybercriminal gang, they are often skilled individual with wide experience on such topics… in fact, in one case, we clearly faced a conversation with a former FSB negotiator (he told us about that). ▪ The conversation should be strictly limited in number of participants. In one case, when an uninvited participant joined the negotiation at a later stage, the attacker get off the channel and the data went immediately released… ▪ The attackers are willing to explain how good they are… this is the only weak spot we found during the negotiations… you can leverage on this to collect some critical items useful for the IR investigation. ▪ The attacker is usually not keen to overreact, he knows he has some good files in his hand... He reviewed his stuff before detonating the ransomware, so every attempt to downsize the value of the stolen material, during the negotiation, will fail… sometime will fail miserably… Negotiation pitfalls
  • 40. 40 ©2020 RSA Security LLC or its affiliates. All rights reserved. LESSON LEARNED Don’t let the pressure guide you… Always think about possibilities… The blackhats tell you they are perfect… but they are not… The key is to use the negotiation as a functional step Don’t take shortcuts… try to support the investigation Think positive…
  • 41. 41 ©2020 RSA Security LLC or its affiliates. All rights reserved. Post-Incident recommendations • Even with the decryptor, unencrypting the data is a painful and costly experience for a company... • Our continuous message to clients is to secure and segment their infrastructure so these attacks are not as successful. That is cheaper than the response efforts that occur with a breach. • The anonymity of the Internet and the lack of international cooperation between the countries have really hampered the ability of law enforcement/prosecutors to take any real meaningful action to identify and prosecute these OC (organized crime) and nation-state actors. • Thus, since this avenue is a long shot to dissuade threat actors, it is up to companies to do a better job of protecting themselves
  • 42. 42 ©2020 RSA Security LLC or its affiliates. All rights reserved. Q’n’A
  • 43. 43 ©2020 RSA Security LLC or its affiliates. All rights reserved. Thanks!