Ataques dirigidos
a activistas
David Barroso
Telefonica Digital
Uyghur
Uyghur
Uyghurhttp://surveillance.rsf.org/es/
https://tails.boum.org
Ataques dirigidos contra activistas
Ataques dirigidos contra activistas
Ataques dirigidos contra activistas
Ataques dirigidos contra activistas
Uyghur
Ataques dirigidos contra activistas
Source: CitizenLab.org
Source: CitizenLab.org
ddddddasdfsdf
 FinFisher – Gamma Group
 Instala un driver
 Modifica MBR
 Se inyecta en procesos legítimos
(winlogon.exe, svchost.exe)
 Packer & anti-debugging
 AES-256-CBC
 C2: 77.69.140.194 (Bahrain) Puertos: 22, 53,
80, 443, 4111
ddddddasdfsdf
 FinFisher – Gamma Group
Bypassing of 40 regularly tested Antivirus Systems
Covert Communication with Headquarters
Full Skype Monitoring (Calls, Chats, File Transfers, Video,
Contact List)
Recording of common communication like Email, Chats
and Voice-over-IP
Live Surveillance through Webcam and Microphone
Country Tracing of Target
Silent Extracting of Files from Hard-Disk
Process-based Key-logger for faster analysis
Live Remote Forensics on Target System
Advanced Filters to record only important information
Supports most common Operating Systems (Windows,
Mac OSX and Linux)
Source: Rapid7
Source: CitizenLab.org
ddddddasdfsdf
 FinFisher – Gamma Group
 iOS version: install_manager.app
 Instalación por ‘provisioning profile’ (necesario UDID)
 Certificado: Martin Muench (Managing Director)
 /System/Library/LaunchDaemons/com.apple.logind.plis
t
 ‘Dropea’ SyncData.app
 Roba contactos, SMS, histórico de llamadas,
geolocalización, etc.
 Base64
 Versiones para Android, Symbian, BlackBerry
Source: CitizenLab.org
Uyghur
ddddddasdfsdf
 Mamfakinch.com
Svp ne mentionnez pas mon nom ni rien du tout je ne
veux pas d embrouilles…
http://freeme.eu5.org/scandale%20(2).doc
Mamfakinch.com
 Hacking Team – RCS
 OSX.Crisis / W32.Crisis
 Fichero adobe.jar -> versión para mac y win32
 Win32: CurrentVersion/Run. Infección de procesos
 Infecta imágenes VMware
Source: Symantec
Source: Symantec
Uyghur
ddddddasdfsdf
Concerns over Uyghur People.doc
Hosh Hewer.doc
Jenwediki yighingha iltimas qilish Jediwili.doc
list.doc
Press Release on Commemorat the Day of Mourning.doc
The Universal Declaration of Human Rights and the
Unrecognized Population Groups.doc
Uyghur Political Prisoner.doc
2013-02-04 - Deported Uyghurs.doc
Jenwediki yighingha iltimas qilish Jediwili(Behtiyar
Omer).doc
Kadeer Logistics detail.doc
Source: Kaspersky
ddddddasdfsdf
 Vulnerabilidad Word para Mac CVE-2012-
0158
 Abre documento real y ejecuta binario
 Keylogger, información de la máquina, control
remoto
 LaunchDaemon ‘systm’
 Tiny Shell
 AES (12345678) y SHA1
 ‘me’ como contacto
 C2: update.googmail.org (207.204.245.192)
ddddddasdfsdf
1154/0x2610: fstat(0x26, 0xBFFF4CD0, 0x200) = 0 0
1154/0x2610: lseek(0x26, 0x6600, 0x0) = 26112 0
1154/0x2610: open("/tmp/l.sh0", 0x602, 0x1FF) = 40
0
1154/0x2610: open("/tmp/l0", 0x602, 0x1FF) = 41 0
1154/0x2610: open("/tmp/l.doc0", 0x602, 0x1FF) = 42
0
1154/0x2610: read(0x26, "#!/bin/bashnsleep 1n/usr/bin/open
/tmp/l.docncp /tmp/l /tmp/mn/tmp/m0", 0x44) = 68 0
1154/0x2610: write(0x28, "#!/bin/bashnsleep 1n/usr/bin/open
/tmp/l.docncp /tmp/l /tmp/mn/tmp/m0", 0x44) = 68 0
Source: AlienVault
Ataques dirigidos contra activistas
Targeted Attacks
LURK/Gh0stRAT
Source: Citizelab.org
Targeted Attacks
Dalai Lama
Source: Kaspersky
Source: Kaspersky
ddddddasdfsdf
 Vulnerabilidad Word para Mac CVE-2012-
0158
 Abre documento real y ejecuta binario
 Keylogger, información de la máquina, control
remoto
 Binario firmado digitalmente
 C2: 61.178.77.76 TCP/1080
Source: Kaspersky
Source: Kaspersky
Source: Kaspersky
Targeted Attacks
Source: Symantec
Source: Symantec
Source: CitizenLab.org
ddddddasdfsdf
 Vulnerabilidad MSWORD CVE-2012-0158
 Abre documento real y ejecuta binario
 Keylogger, información de la máquina, control
remoto
 Binario firmado digitalmente
 C2: 114.142.147.51
ddddddasdfsdf
Metadata Original Dropped
MD5 8882c40ef1786efb
98ea251e247bfbee
40f41c077e03d72a
39eb1bd7bf6e3341
Last saved by HSwallow lebrale
Creation date Tue., Jun. 12
09:11:00 2012
Wed., Jun. 13
11:39:00 2012
Last save date Tue., Jun. 12
09:11:00 2012
Wed., Jun. 13
11:39:00 2012
Targeted Attacks
Source: CitizenLab.org
Source: CitizenLab.org
Source: CitizenLab.org
ddddddasdfsdf
 APT1 / GOGGLES vs GLASSES
 Aplicación simula ser carpeta
 Instala un PDF no malicioso (job posting en
Nepal), un binario spkptdhv.exe en %temp%
que se instala en el registro
 Comandos: sleep / download & run
GET /ewpindex.htm HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; Windows
NT 5.1; MSIE 7.0; Trident/4.0; Clj26Dbj.XYZ)
Host: ewplus.com
Cache-Control: no-cache
Android
Source: CitizenLab.org
ddddddasdfsdf
 Spoof en el From
 Tibetanos generalmente ‘rootean’ los Android
para instalar fuentes
 También instalan APK debido a restricciones
en Google Play
 Apps modificadas
 Intercepta SMS para dar posición
 Roba histórico de llamadas, SMS y contactos
 C2 android.uyghur.dnsd.me
Source: CitizenLab.org
Source: CitizenLab.org
Android
Source: Kaspersky
Source: Kaspersky
Source: Kaspersky
ddddddasdfsdf
 Robo de contactos, SMS, historial de
llamadas, datos del teléfono
 C2: Base64 a 64.78.161.133
Source: Kaspersky
Todo vale
Source: https://malwarelab.zendesk.com
Ataques dirigidos contra activistas
Ataques dirigidos contra activistas
Ataques dirigidos contra activistas
Ataques dirigidos contra activistas
Ataques dirigidos contra activistas
http://unremote.org
ddddddasdfsdf
 Capture webcam activity
 Disable the notification setting for certain
antivirus programs
 Download and execute arbitrary programs
and commands
 Modify the hosts file
 Record key strokes
 Retrieve system information about the
computer
 Start or end processes
 Steal passwords
 Update itself
ddddddasdfsdf
 %Temp%dclogs[CURRENT DAY]-[RANDOM
NUMBER].dc
 %UserProfile%Start
MenuProgramsStartup(Empty).lnk
ddddddasdfsdf
 Autor: DarkCoderSc
 Fecha: 2008
 Versión actual: 5
 Lamenta lo ocurrido, y ofrece un
desinstalador
Ataques dirigidos contra activistas
Ingenieria Social
Source: Trendmicro
Source: EFF
Source: EFF
Source: EFF
Source: EFF
Malware
Source: EFF
Source: EFF
ddddddasdfsdf
 DarkComet RAT
 C:Documents and
SettingsAdministratorStart
MenuProgramsStartup(Empty).lnk
 C:DOCUME~1ADMINI~1LOCALS~1Temp
.pdf
 C:DOCUME~1ADMINI~1LOCALS~1Temp
Explorer.exe
 C:DOCUME~1ADMINI~1LOCALS~1Temp
msdlg.ocx
 C:DOCUME~1ADMINI~1LOCALS~1Temp
dclogs
Source: EFF
ddddddasdfsdf
 [] Aleppo Team
 [] Aleppo Team
rar
 [29/05/2012 18:03:44] Aleppo Team | | ...: Last
modified plan Aleppo time for Jihad
 [29/05/2012 18:03:46] Aleppo Team | | ...:
Send the file "plan eventually 2.rar"
Source: EFF
Source: EFF
Source: EFF
ddddddasdfsdf
 C:Documents and
SettingsAdministratorStartMenuProgramsS
tartup(empty).lnk
 C:DOCUME~1ADMINI~1LOCALS~1Temp
explorer.exe
 C:DOCUME~1ADMINI~1LOCALS~1Temp
Aleppo plan.pdf
 C:DOCUME~1ADMINI~1LOCALS~1Temp
Firefox.dll
Skype encryption
Source: EFF
Source: EFF
Source: EFF
ddddddasdfsdf
 DarkComet RAT
 http://skype-encryption.sytes.net/
 http://216.6.0.28/SkypeEncryption/Dow
nload/skype.exe
Antihacker
73%
Source: EFF
Source: EFF
Source: EFF
Source: EFF
Source: EFF
Source: EFF
ddddddasdfsdf
 DarkComet RAT
 Se conecta a 216.6.0.28/google.exe
 Keylogger:
C:DOCUME~1ADMINI~1LOCALS~1
Tempdclogs.sys
 C:Documents and
SettingsAdministratorStart
MenuProgramsStartup..lnk
BlackShades
73%
Source: EFF
http://bshades.eu/bsscmds.php
ddddddasdfsdf
With Blackshades Remote Controller you can:
- Control several computers at once, performing tasks
ranging from viewing their screens to
uploading/downloading files from them
- Perform maintenance on a Network
- Help a client out by using the screen capture feature,
even if they are on the other side of the world
- Monitor a specific PC, recording the keystrokes and
remotely managing the files
- Access your computer that you have at home if you are
on holiday
- Monitor the computers of students and their activity while
teaching a computing lesson
- Chat with clients that you are connected to
ddddddasdfsdf
 Cuentas comprometidas Skype
 Fichero .PIF
 ‘Windows Messanger’ – Alta en
firewall, Startup
 C2: alosh66.myftp.org (31.9.170.140)
4444/TCP
Ataques dirigidos contra activistas
Ataques dirigidos contra activistas
ddddddasdfsdf
 OSX.Kitm (Kumar in the mac)
 Rajinder Kumar
 OSX/Filesteal – OSX/HackBack
Source: F-Secure
Source: F-Secure
Ataques dirigidos contra activistas
Source: F-Secure
Source: F-Secure
Source: F-Secure
Gracias
David Barroso
@lostinsecurity

More Related Content

PDF
Windows persistence presentation
PPTX
Indicators of compromise: From malware analysis to eradication
PPTX
Opendaylight app development
PDF
Jackpot! Attacking Arcade Machines
PDF
Linux 系統管理與安全:進階系統管理系統防駭與資訊安全
PDF
Linux 系統管理與安全:基本 Linux 系統知識
PDF
Linux 系統管理與安全:系統防駭與資訊安全
Windows persistence presentation
Indicators of compromise: From malware analysis to eradication
Opendaylight app development
Jackpot! Attacking Arcade Machines
Linux 系統管理與安全:進階系統管理系統防駭與資訊安全
Linux 系統管理與安全:基本 Linux 系統知識
Linux 系統管理與安全:系統防駭與資訊安全

What's hot (20)

PDF
SANS Forensics 2009 - Memory Forensics and Registry Analysis
PPT
Windows forensic artifacts
PDF
Introduction to malwares
PDF
WannaCry emulation report
DOCX
Install log
PPTX
Using the Power to Prove
PPTX
PDF
Containers for sysadmins
DOC
PDF
End of Studies project: Malware Repsonse Center
PPTX
Linux networking
PPT
Unix Programming with Perl
PDF
Simplest-Ownage-Human-Observed… - Routers
PDF
Ch8-Computer Security
PDF
Tracing MariaDB server with bpftrace - MariaDB Server Fest 2021
PDF
Windows 7 forensics -overview-r3
PDF
SANS @Night There's Gold in Them Thar Package Management Databases
PDF
Character_Device_drvier_pc
PPTX
What is suid, sgid and sticky bit
PPT
Registry forensics
SANS Forensics 2009 - Memory Forensics and Registry Analysis
Windows forensic artifacts
Introduction to malwares
WannaCry emulation report
Install log
Using the Power to Prove
Containers for sysadmins
End of Studies project: Malware Repsonse Center
Linux networking
Unix Programming with Perl
Simplest-Ownage-Human-Observed… - Routers
Ch8-Computer Security
Tracing MariaDB server with bpftrace - MariaDB Server Fest 2021
Windows 7 forensics -overview-r3
SANS @Night There's Gold in Them Thar Package Management Databases
Character_Device_drvier_pc
What is suid, sgid and sticky bit
Registry forensics
Ad

Similar to Ataques dirigidos contra activistas (20)

PDF
MacOS forensics and anti-forensics (DC Lviv 2019) presentation
PPTX
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...
TXT
Zhp diag
PDF
Computer technicians-quick-reference-guide
PDF
Solaris_quickref.pdf
PPT
Linux filesystemhierarchy
PPTX
Writing Character driver (loadable module) in linux
PPT
Batch file programming
ODP
Linux Command Line
PDF
Linux Common Command
ODP
NUMOSS 4th Week - Commandline Tutorial
PDF
Introduction to ESP32 Programming [Road to RIoT 2017]
PDF
Владимир Пузанов - JailBreak: Разработка без лимитов
PPT
Swug July 2010 - windows debugging by sainath
PDF
Introduction to shell scripting
PDF
The New Systems Performance
PDF
Part 5 of "Introduction to Linux for Bioinformatics": Working the command lin...
PDF
GDG DevFest Kyoto 2014 これからのGoの話をしよう
PPTX
Nullbyte 6ed. 2019
PPTX
Unmasking Careto through Memory Forensics (video in description)
MacOS forensics and anti-forensics (DC Lviv 2019) presentation
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...
Zhp diag
Computer technicians-quick-reference-guide
Solaris_quickref.pdf
Linux filesystemhierarchy
Writing Character driver (loadable module) in linux
Batch file programming
Linux Command Line
Linux Common Command
NUMOSS 4th Week - Commandline Tutorial
Introduction to ESP32 Programming [Road to RIoT 2017]
Владимир Пузанов - JailBreak: Разработка без лимитов
Swug July 2010 - windows debugging by sainath
Introduction to shell scripting
The New Systems Performance
Part 5 of "Introduction to Linux for Bioinformatics": Working the command lin...
GDG DevFest Kyoto 2014 これからのGoの話をしよう
Nullbyte 6ed. 2019
Unmasking Careto through Memory Forensics (video in description)
Ad

More from David Barroso (12)

PDF
El replanteamiento de la ciberseguridad
PPTX
OPSEC - Amanece que no es poco
PPTX
Infección en BIOS, UEFI y derivados
PPTX
En la época post-Snowden, ¿es la seguridad importante?
PPTX
Un gentil viaje al interior de las extorsiones mediante DDoS
PDF
Common Browser Hijacking Methods
PPT
Yersinia - Demostraciones prácticas de nuevos ataques de nivel dos
PPT
Recursos de la economía sumergida
PPTX
Extorsiones mediante DDoS
PPTX
Respuesta ágil ante incidentes
PPTX
[FTP|SQL|Cache] Injections
PPT
iPhone + Botnets = Fun
El replanteamiento de la ciberseguridad
OPSEC - Amanece que no es poco
Infección en BIOS, UEFI y derivados
En la época post-Snowden, ¿es la seguridad importante?
Un gentil viaje al interior de las extorsiones mediante DDoS
Common Browser Hijacking Methods
Yersinia - Demostraciones prácticas de nuevos ataques de nivel dos
Recursos de la economía sumergida
Extorsiones mediante DDoS
Respuesta ágil ante incidentes
[FTP|SQL|Cache] Injections
iPhone + Botnets = Fun

Recently uploaded (20)

PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PPTX
Internet of Everything -Basic concepts details
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
DOCX
search engine optimization ppt fir known well about this
PDF
STKI Israel Market Study 2025 version august
PPTX
TEXTILE technology diploma scope and career opportunities
PDF
sustainability-14-14877-v2.pddhzftheheeeee
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
NewMind AI Weekly Chronicles – August ’25 Week III
NewMind AI Weekly Chronicles – August ’25 Week IV
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
Internet of Everything -Basic concepts details
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
4 layer Arch & Reference Arch of IoT.pdf
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Build Your First AI Agent with UiPath.pptx
Enhancing plagiarism detection using data pre-processing and machine learning...
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Credit Without Borders: AI and Financial Inclusion in Bangladesh
A review of recent deep learning applications in wood surface defect identifi...
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
search engine optimization ppt fir known well about this
STKI Israel Market Study 2025 version august
TEXTILE technology diploma scope and career opportunities
sustainability-14-14877-v2.pddhzftheheeeee

Ataques dirigidos contra activistas