Researchers use 'fingerprints' tech to spot Russian hackers

[correlate]

Level 18
Thread author
Top Poster
Well-known
May 4, 2019
801
Hackers too leave their fingerprints as they attack enterprises and individuals and cyber security researchers have now developed a new technique to "fingerprint" them, spotting two prolific Russian-origin sellers of Windows exploits.
The team from cyber security firm Check Point, when analysing a complicated attack against one of their customers, noticed a very small 64-bit executable that was executed by the malware. The sample contained unusual debug strings that pointed at an attempt to exploit a vulnerability on the victim machine.


https://www.indiatvnews.com/author/ians
 

silversurfer

Level 85
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Well-known
Aug 17, 2014
10,241
Conclusion
Our research methodology was to fingerprint an exploit writer’s characteristics and later on use these properties as a unique hunting signature. We deployed this technique twice when tracking down Volodya’s exploits and those of PlayBit. Having these two successful test cases, we believe that this research methodology can be used to identify additional exploit writers. We recommend other researchers try our suggested technique and adopt it as an additional tool in their arsenal.

During this research, we focused on the exploits that are used by or embedded in different malware families, both in APT attacks and in commodity malware (especially ransomware). Although they are widespread, we often found detailed malware reports that neglected to mention that the malware at hand also uses an exploit for escalating its privilege.

The fact that we were able to use our technique, repeatedly, to track 16 Windows LPE exploits, written and sold by two different actors, was very surprising. Considering that 15 of them date to the timeframe of 2015-2019, it is plausible to assume that they constitute a significant share of the exploitation market, specifically for Windows LPE exploits.

Finally, it is impossible to tell the overall number of Windows kernel 0-day vulnerabilities that are being actively exploited in the wild. Nation-state actors are less likely to get caught and thus the infosec community does not have clear visibility to their ammo crate. That said, we can still get insights by looking at the exploits that were caught, while remembering this survivorship bias. Last year, Kaspersky reported a single actor who distributed an exploit framework that includes 3 more 0-Days. Adding up these numbers, we see that 8 out of 15 zero-day exploits, more than half of the “market-share”, are attributed to only two actors(!). This means that our research technique could potentially be used to track down many of the actors in the seen market, if not all of them.
 

Dave Russo

Level 21
Verified
Top Poster
Well-known
May 26, 2014
1,069
Malwarebytes or Hitmanpro Alert or Microsoft Emet,are any or all of these programs enough to cover exploits vulnerabilities?
Microsoft strongly implies that if you are running Windows 10, there is no need for EMET anymore. ??? Any incite here is appreciated
 

plat

Level 29
Top Poster
Sep 13, 2018
1,793
EMET doesn't run on later Windows 10 versions, like 1809 to present. We have various Exploit Guards found under App and browser control. This is where you can find SmartScreen settings and Potentially unwanted app blocking, as well as SmartScreen for Microsoft Store apps (in Reputation-based protection).

For Exploit protection:

Under System settings: 6 of 7 mitigations are enabled by default
Under Program settings: there are numerous overrides for various .exe but it's tricky-to-impossible to add your own without silent blocks. It's trial by error, imo. That's one reason I use script-blocking third parties plus firewall hardening. There's the standalone Malwarebytes MBAE's perpetual beta, which I think is still around. Haven't used it though.

I used to run EMET in Windows 8.1. Not user-friendly at all but curiously effective once you configured it properly. (y)

EMET end of life

edit: typo
 
Last edited:

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top