針對Windows系統的「BlueKeep」漏洞攻擊正在發生

 
今年5月微軟警告Windows終端服務存在編號CVE-2019-0708的漏洞,或稱BlueKeep。本漏洞可使攻擊者利用RDP(遠端桌面協定:Remote Desktop Protocol,簡稱RDP)連上目標系統,傳送改造過的呼叫,藉此執行任意程式碼、安裝惡意程式、讀取或刪改資料、或新開具完整權限的用戶帳號。作為預先驗證(pre-authentication)漏洞,BlueKeep可讓蠕蟲繁殖(wormable),從一臺有漏洞的電腦複製自我擴散到其他電腦上,有如WannaCryptor。受影響的作業系統包括Windows 7、Windows Server 2008 及2008 R2,及已經終止支援的Windows XP及Server 2003。
 
在11月針對有BlueKeep漏洞的系統之首波攻擊,雖其主要目的在於植入Monero挖礦軟體,但真正的隱憂在於,此漏洞能讓攻擊者駭入伺服器,再利用自動化工具在內網為害,像是丟入勒索軟體 (類似WannaCryptor) ,因此BlueKeep攻擊仍十分危險,不能掉以輕心。而自5月到目前為止,微軟也發出了三次警告,並提醒用戶盡快修補漏洞、進行更新及呼籲不要小看其嚴重性。
 
 
【ESET勒索病毒解決方案】https://www.eset.tw/html/86/20170605/
或歡迎洽詢資安專業團隊,服務電話:(02)7722-6899
 

Tracking down the developer of Android adware affecting millions of users

We detected a large adware campaign running for about a year, with the involved apps installed eight million times from Google Play alone.We identified 42 apps on Google Play as belonging to the campaign, which had been running since July 2018. Of those, 21 were still available at the time of discovery. We reported the apps to the Google security team and they were swiftly removed. However, the apps are still available in third-party app stores. ESET detects this adware, collectively, as Android/AdDisplay.Ashas.

Figure 1. Apps of the Android/AdDisplay.Ashas family reported to Google by ESET

Figure 2. The most popular member of the Android/AdDisplay.Ashas family on Google Play was “Video downloader master” with over five million downloads

Ashas functionality

All the apps provide the functionality they promise, besides working as adware. The adware functionality is the same in all the apps we analyzed. [Note: The analysis of the functionality below describes a single app, but applies to all apps of the Android/AdDisplay.Ashas family.]

Once launched, the app starts to communicate with its C&C server (whose IP address is base64-encoded in the app). It sends “home” key data about the affected device: device type, OS version, language, number of installed apps, free storage space, battery status, whether the device is rooted and Developer mode enabled, and whether Facebook and FB Messenger are installed.

Figure 3. Sending information about the affected device

The app receives configuration data from the C&C server, needed for displaying ads, and for stealth and resilience.

Figure 4. Configuration file received from the C&C server

As for stealth and resilience, the attacker uses a number of tricks.

First, the malicious app tries to determine whether it is being tested by the Google Play security mechanism. For this purpose, the app receives from the C&C server the isGoogleIp flag, which indicates whether the IP address of the affected device falls within the range of known IP addresses for Google servers. If the server returns this flag as positive, the app will not trigger the adware payload.

Second, the app can set a custom delay between displaying ads. The samples we have seen had their configuration set to delay displaying the first ad by 24 minutes after the device unlocks. This delay means that a typical testing procedure, which takes less than 10 minutes, will not detect any unwanted behavior. Also, the longer the delay, the lower the risk of the user associating the unwanted ads with a particular app.

Third, based on the server response, the app can also hide its icon and create a shortcut instead. If a typical user tries to get rid of the malicious app, chances are that only the shortcut ends up getting removed. The app then continues to run in the background without the user’s knowledge. This stealth technique has been gaining popularity among adware-related threats distributed via Google Play.

Figure 5. Time delay to postpone displaying ads implemented by the adware

Once the malicious app receives its configuration data, the affected device is ready to display ads as per the attacker’s choice; each ad is displayed as a full screen activity. If the user wants to check which app is responsible for the ad being displayed, by hitting the “Recent apps” button, another trick is used: the app displays a Facebook or Google icon, as seen in Figure 6. The adware mimics these two apps to look legitimate and avoid suspicion – and thus stay on the affected device for as long as possible.

Figure 6. The adware activity impersonates Facebook (left). If the user long-presses the icon, the name of the app responsible for the activity is revealed (right).

Finally, the Ashas adware family has its code hidden under the com.google.xxx package name. This trick – posing as a part of a legitimate Google service – may help avoid scrutiny. Some detection mechanisms and sandboxes may whitelist such package names, in an effort to prevent wasting resources.

Figure 7. Malicious code hidden in a package named “com.google”

Hunting down the developer

Using open-source information, we tracked down the developer of the adware, who we also identified as the campaign’s operator and owner of the C&C server. In the following paragraphs, we outline our  efforts to discover other applications from the same developer and protect our users from it.

First, based on information that is associated with the registered C&C domain, we identified the name of the registrant, along with further data like country and email address, as seen in Figure 8.

Figure 8. Information about the C&C domain used by the Ashas adware

Knowing that the information provided to a domain registrar might be fake, we continued our search. The email address and country information drove us to a list of students attending a class at a Vietnamese university – corroborating the existence of the person under whose name the domain was registered.

Figure 9. A university class student list including the C&C domain registrant

Due to poor privacy practices on the part of our culprit’s university, we now know his date of birth (probably: he seemingly used his birth year as part of his Gmail address, as further partial confirmation), we know that he was a student and what university he attended. We were also able to confirm that the phone number he provided to the domain registrar was genuine. Moreover, we retrieved his University ID; a quick googling showed some of his exam grades. However, his study results are out of the scope of our research.

Based on our culprit’s email address, we were able to find his GitHub repository. His repository proves that he is indeed an Android developer, but it contained no publicly available code of the Ashas adware at the time of writing of this blogpost.

However, a simple Google search for the adware package name returned a “TestDelete” project that had been available in his repository at some point

The malicious developer also has apps in Apple’s App Store. Some of them are iOS versions of the ones removed from Google Play, but none contain adware functionality.

Figure 10. The malicious developer’s apps published on the App Store which don’t contain the Ashas adware

Searching further for the malicious developer’s activities, we also discovered his Youtube channel propagating the Ashas adware and his other projects. As for the Ashas family, one of the associated promotional videos, “Head Soccer World Champion 2018 – Android, ios” was viewed almost three million times and two others reached hundreds of thousands of views, as seen in Figure 11.

Figure 11. YouTube channel of the malicious developer

His YouTube channel provided us with another valuable piece of information: he himself features in a video tutorial for one of his other projects. Thanks to that project, we were able to extract his Facebook profile – which lists his studies at the aforementioned university.

Figure 12. Facebook profile of the C&C domain registrar (cover picture and profile picture edited out)

Linked on the malicious developer’s Facebook profile, we discovered a Facebook page, Minigameshouse, and an associated domain, minigameshouse[.]net. This domain is similar to the one the malware author used for his adware C&C communication, minigameshouse[.]us.

Checking this Minigameshouse page further indicates that this person is indeed the owner of the minigameshouse[.]us domain: the phone number registered with this domain is the same as the phone number appearing on the Facebook page.

Figure 13. Facebook page managed by the C&C domain registrant uses the same base domain name (minigameshouse) and phone number as the registered malicious C&C used by the Ashas adware

Of interest is that on the Minigameshouse Facebook page, the malicious developer promotes a slew of games beyond the Ashas family for download on both Google Play and the App Store. However, all of those have been removed from Google Play – despite the fact that some of them didn’t contain any adware functionality.

On top of all this, one of the malicious developer’s YouTube videos – a tutorial on developing an “Instant Game” for Facebook – serves as an example of operational security completely ignored. We were able to see that his recently visited web sites were Google Play pages belonging to apps containing the Ashas adware. He also used his email account to log into various services in the video, which identifies him as the adware domain owner, beyond any doubt.

Thanks to the video, we were even able to identify three further apps that contained adware functionality and were available on Google Play.

Figure 14. Screenshots from this developer’s YouTube video shows history of checking Ashas adware on Google Play

ESET telemetry

Figure 15. ESET detections of Android/AdDisplay.Ashas on Android devices by country

Is adware harmful?

Because the real nature of apps containing adware is usually hidden to the user, these apps and their developers should be considered untrustworthy. When installed on a device, apps containing adware may, among other things:

  • Annoy users with intrusive advertisements, including scam ads
  • Waste the device’s battery resources
  • Generate increased network traffic
  • Gather users’ personal information
  • Hide their presence on the affected device to achieve persistence
  • Generate revenue for their operator without any user interaction

Conclusion

Based solely on open source intelligence, we were able to trace the developer of the Ashas adware and establish his identity and discover additional related adware-infected apps. Seeing that the developer did not take any measures to protect his identity, it seems likely that his intentions weren’t dishonest at first – and this is also supported by the fact that not all his published apps contained unwanted ads.

At some point in his Google Play “career”, he apparently decided to increase his ad revenue by implementing adware functionality in his apps’ code. The various stealth and resilience techniques implemented in the adware show us that the culprit was aware of the malicious nature of the added functionality and attempted to keep it hidden.

Sneaking unwanted or harmful functionality into popular, benign apps is a common practice among “bad” developers, and we are committed to tracking down such apps. We report them to Google and take other steps to disrupt malicious campaigns we discover. Last but not least, we publish our findings to help Android users protect themselves.

Indicators of Compromise (IoCs)

Package name Hash Installs
com.ngocph.masterfree c1c958afa12a4fceb595539c6d208e6b103415d7 5,000,000+
com.mghstudio.ringtonemaker 7a8640d4a766c3e4c4707f038c12f30ad7e21876 500,000+
com.hunghh.instadownloader 8421f9f25dd30766f864490c26766d381b89dbee 500,000+
com.chungit.tank1990 237f9bfe204e857abb51db15d6092d350ad3eb01 500,000+
com.video.downloadmasterfree 43fea80444befe79b55e1f05d980261318472dff 100,000+
com.massapp.instadownloader 1382c2990bdce7d0aa081336214b78a06fceef62 100,000+
com.chungit.tankbattle 1630b926c1732ca0bb2f1150ad491e19030bcbf2 100,000+
com.chungit.basketball 188ca2d47e1fe777c6e9223e6f0f487cb5e98f2d 100,000+
com.applecat.worldchampion2018 502a1d6ab73d0aaa4d7821d6568833028b6595ec 100,000+
org.minigamehouse.photoalbum a8e02fbd37d0787ee28d444272d72b894041003a 100,000+
com.mngh.tuanvn.fbvideodownloader 035624f9ac5f76cc38707f796457a34ec2a97946 100,000+
com.v2social.socialdownloader 2b84fb67519487d676844e5744d8d3d1c935c4b7 100,000+
com.hikeforig.hashtag 8ed42a6bcb14396563bb2475528d708c368da316 100,000+
com.chungit.heroesjump c72e92e675afceca23bbe77008d921195114700c 100,000+
com.mp4.video.downloader 61E2C86199B2D94ABF2F7508300E3DB44AE1C6F1 100,000+
com.videotomp4.downloader 1f54e35729a5409628511b9bf6503863e9353ec9 50,000+
boxs.puzzles.Puzzlebox b084a07fdfd1db25354ad3afea6fa7af497fb7dc 50,000+
com.intatwitfb.download.videodownloader 8d5ef663c32c1dbcdd5cd7af14674a02fed30467 50,000+
com.doscreenrecorder.screenrecorder e7da1b95e5ddfd2ac71587ad3f95b2bb5c0f365d 50,000+
com.toptools.allvideodownloader 32E476EA431C6F0995C75ACC5980BDBEF07C8F7F 50,000+
com.top1.videodownloader a24529933f57aa46ee5a9fd3c3f7234a1642fe17 10,000+
com.santastudio.headsoccer2 86d48c25d24842bac634c2bd75dbf721bcf4e2ea 10,000+
com.ringtonemakerpro.ringtonemakerapp2019 5ce9f25dc32ac8b00b9abc3754202e96ef7d66d9 10,000+
com.hugofq.solucionariodebaldor 3bb546880d93e9743ac99ad4295ccaf982920260 10,000+
com.anit.bouncingball 6e93a24fb64d2f6db2095bb17afa12c34b2c8452 10,000+
com.dktools.liteforfb 7bc079b1d01686d974888aa5398d6de54fd9d116 10,000+
net.radiogroup.tvnradio ba29f0b4ad14b3d77956ae70d812eae6ac761bee 10,000+
com.anit.bouncingball 6E93A24FB64D2F6DB2095BB17AFA12C34B2C8452 10,000+
com.floating.tube.bymuicv 6A57D380CDDCD4726ED2CF0E98156BA404112A53 10,000+
org.cocos2dx.SpiderSolitaireGames adbb603195c1cc33f8317ba9f05ae9b74759e75b 5,000+
games.puzzle.crosssum 31088dc35a864158205e89403e1fb46ef6c2c3cd 5,000+
dots.yellow.craft 413ce03236d3604c6c15fc8d1ec3c9887633396c 5,000+
com.tvngroup.ankina.reminderWater 5205a5d78b58a178c389cd1a7b6651fe5eb7eb09 5,000+
com.hdevs.ringtonemaker2019 ba5a4220d30579195a83ddc4c0897eec9df59cb7 5,000+
com.carlosapps.solucionariodebaldor 741a95c34d3ad817582d27783551b5c85c4c605b 5,000+
com.mngh1.flatmusic 32353fae3082eaeedd6c56bb90836c89893dc42c 5,000+
com.tvn.app.smartnote ddf1f864325b76bc7c0a7cfa452562fe0fd41351 1,000+
com.thrtop.alldownloader f46ef932a5f8e946a274961d5bdd789194bd2a7d 1,000+
com.anthu91.soccercard 0913a34436d1a7fcd9b6599fba64102352ef2a4a 1,000+
com.hugofq.wismichudosmildiecisiete 4715bd777d0e76ca954685eb32dc4d16e609824f 1,000+
com.gamebasketball.basketballperfectshot e97133aaf7d4bf90f93fefb405cb71a287790839 1,000+
com.nteam.solitairefree 3095f0f99300c04f5ba877f87ab86636129769b1 100+
com.instafollowers.hiketop 3a14407c3a8ef54f9cba8f61a271ab94013340f8 1+

C&C server

http://35.198.197[.]119:8080

MITRE ATT&CK techniques

Tactic ID Name Description
Initial Access T1475 Deliver Malicious App via Authorized App Store The malware impersonates legitimate services on Google Play
Persistence T1402 App Auto-Start at Device Boot An Android application can listen for the BOOT_COMPLETED broadcast, ensuring that the app’s functionality will be activated every time the device starts
Impact T1472 Generate Fraudulent Advertising Revenue Generates revenue by automatically displaying ads

Kudos to @jaymin9687 for bringing the problem of unwanted ads in the “Video downloader master” app to our attention.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Winnti Group’s skip‑2.0: A Microsoft SQL Server backdoor

Notorious cyberespionage group debases MSSQL

For a while, ESET researchers have been tracking the activities of the Winnti Group, active since at least 2012 and responsible for high-profile supply-chain attacks against the video game and software industry. Recently, we discovered a previously undocumented backdoor targeting Microsoft SQL (MSSQL) that allows attackers to maintain a very discreet foothold inside compromised organizations. This backdoor bears multiple similarities to the PortReuse backdoor, another tool used by the Winnti Group that was first documented by ESET in October 2019, such as the use of the same custom packer and VMProtected launcher, which is why we attribute this backdoor to the Winnti Group.

Earlier this year, we received a sample of this new backdoor called skip-2.0 by its authors and part of the Winnti Group’s arsenal. This backdoor targets MSSQL Server 11 and 12, allowing the attacker to connect stealthily to any MSSQL account by using a magic password – while automatically hiding these connections from the logs. Such a backdoor could allow an attacker to stealthily copy, modify or delete database content. This could be used, for example, to manipulate in-game currencies for financial gain. In-game currency database manipulations by Winnti operators have already been reported. To the best of our knowledge, skip-2.0 is the first MSSQL Server backdoor to be documented publicly. Note that even though MSSQL Server 11 and 12 are not the most recent versions (released in 2012 and 2014, respectively), they are the most commonly used ones according to Censys’s data.

We recently published a white paper updating our understanding of the arsenal of the Winnti Group, and that exposed a previously undocumented backdoor of theirs called PortReuse. It uses an identical packer to that used with the payload embedded in compromised video games uncovered by ESET in March 2019. The VMProtected launcher that drops the PortReuse backdoor was also found being used to launch recent ShadowPad versions. In that context, we were able to find a new tool called skip.2-0 by its developer. It uses the same VMProtected launcher as well as Winnti Group’s custom packer and exhibits multiple similarities with other samples from the Winnti Group’s toolset. This leads us to ascribe skip-2.0 to that toolset also.

This article will focus on the technical details and functionality of this MSSQL Server backdoor, as well as on exposing the technical similarities of skip.2-0 with the Winnti Group’s known arsenal – in particular, with the PortReuse backdoor and ShadowPad. A note on the reasons why we chose the “Winnti Group” naming can be found on our white paper.

VMProtected launcher

We found skip-2.0 while looking for VMProtected launchers, for which the payload is usually either PortReuse or ShadowPad.

Embedded payload

As with the encrypted PortReuse and ShadowPad payloads, skip-2.0 is embedded in the VMProtected launcher’s overlay, as shown in Figure 1:

Figure 1. VMProtected launcher’s headers. The payload is embedded in the PE overlay.

Encryption

<

The payload encryption is identical to that used in the other VMProtected launchers. It is RC5-encrypted with a key derived from the VolumeID and the string f@Ukd!rCto R$. – as described in our previous white paper on the Winnti Group arsenal.

Persistence

As in the case of PortReuse and ShadowPad, the launcher probably persists by exploiting a DLL hijacking vulnerability by being installed at C:WindowsSystem32TSVIPSrv.DLL. This results in the DLL being loaded by the standard Windows SessionEnv service at system startup.

Winnti Group’s custom packer

Once decrypted the embedded payload is actually Winnti Group’s custom packer. This packer is the same shellcode that was documented in our previous article and white paper. It is used to pack the PortReuse backdoor as well as the payload embedded in the compromised video games.

Packer configuration

As described in our previous article, the packer configuration contains the decryption key of the packed binary as well as its original filename, its size and the execution type (EXE or DLL). The payload’s packer configuration is shown in Table 1.

Parent SHA-1Payload SHA-1RC4 keyFilenameLaunch type
9aafe81d07b3e5bb282608f0a2a4656eb485b7c9a2571946ab181657eb825cde07188e8bcd689575163716559Inner-Loader.dll2

Table 1. Payload’s packer configuration

One can see from the packer configuration that the payload is called Inner-LoaderInner-Loader is the name of an injector that is the part of the Winnti Group’s arsenal used to inject the PortReuse backdoor into processes listening on a particular port, as described in our previous publication. Beyond that identical name, by analyzing this payload it appears that it is another variant of the Inner-Loader injector.

Inner-Loader injector

This variant of Inner-Loader, instead of looking for a process listening on a particular port, as in the case when injecting the PortReuse backdoor, looks for a process called sqlserv.exe, which is the conventional process name of MSSQL Server. If found, Inner-Loader then injects a payload into this process. This payload is also packed with the custom packer – the packer configuration of that payload is shown in Table 2.

Parent SHA-1Payload SHA-1RC4 keyFilenameLaunch type
a2571946ab181657eb825cde07188e8bcd68957560b9428d00be5ce562ff3d888441220290a6dac7923567961skip-2.0.dll2

Table 2. Packer configuration of the payload embedded in Inner-Loader

The original filename of this injected payload is skip-2.0.dll.

skip-2.0

After having been injected and launched by Inner-Loaderskip-2.0 first checks whether it is executing within an sqlserv.exe process and if so, retrieves a handle to sqllang.dll, which is loaded by sqlserv.exe. It then proceeds to find and hook multiple functions from that DLL. Figure 2 depicts the skip-2.0 chain of compromise.

Figure 2. skip-2.0 unpacking and injection

Hooking sqllang.dll

The hooking procedure used by skip-2.0 is very similar to the one used by NetAgent, the PortReuse module responsible for installing the networking hook. This hooking library is based on the distorm open source disassembler that is used by multiple open source hooking frameworks. In particular, a disassembling library is needed to correctly compute the size of the instructions to be hooked. One can see in Figure 3 that the hooking procedure used by NetAgent and skip-2.0 are almost identical.

Figure 3. Hex-Rays output comparison between the NetAgent (left) and skip-2.0 (right) hooking procedures

There is one notable difference, which is the fact that the hooking function from skip-2.0 takes the address of the hook to be installed as an argument, while for NetAgent, the address of the hook to install is hardcoded. This is due to the fact that skip-2.0 has to hook multiple functions in sqllang.dll to operate properly, while NetAgent targets only a single function.

To locate each sqllang.dll function to be hooked, skip-2.0 first retrieves the size of the DLL once loaded in memory (i.e. its virtual size) by parsing its PE headers. Then an array of bytes to be matched within sqllang.dll is initialized as shown in Figure 4. Once the address of the first occurrence matching the byte array is found, the hook is installed using the procedure shown in Figure 3.

Figure 4. Hex-Rays output of the procedure initializing the byte array to match in sqllang.dll

The success of the hook installation is then logged in cleartext in a log file located at the hardcoded path C:WindowsTempTS_2CE1.tmp and shown in Figure 5.

Figure 5. Log generated during hooks installation

Should the targeted function not be found, the hook installer searches for a fallback function, with a different set of byte patterns.

Matching a sequence of bytes to locate the address of the targeted function instead of using a static offset, plus using a fallback sequence of bytes, allows skip-2.0 to be more resilient to MSSQL updates and to potentially target multiple sqllang.dll updates.

One password to rule them all

The functions targeted by skip-2.0 are related to authentication and event logging. The targeted functions include:

  • CPwdPolicyManager::ValidatePwdForLogin
  • CSECAuthenticate::AuthenticateLoginIdentity
  • ReportLoginSuccess
  • IssueLoginSuccessReport
  • FExecuteLogonTriggers
  • XeSqlPkg::sql_statement_completed::Publish
  • XeSqlPkg::sql_batch_completed::Publish
  • SecAuditPkg::audit_event::Publish
  • XeSqlPkg::login::Publish
  • XeSqlPkg::ual_instrument_called::Publish

The most interesting function is the first one (CPwdPolicyManager::ValidatePwdForLogin), which is responsible for validating the password provided for a given user. This function’s hook checks whether the password provided by the user matches the magic password; if that is the case, the original function will not be called and the hook will return 0, allowing the connection even though the correct password was not provided. A global flag is then set that will be checked by the other hooked functions responsible for event logging. The corresponding decompiled procedure is shown in Figure 6. In the case where this global flag is set, the hooked logging functions will silently return without calling their corresponding, original functions, so the action will not be logged. In the case where a different password is provided, the original function is called.

Figure 6. Hex-Rays output of the procedure responsible for matching the password provided at login with the hardcoded string

A similar backdooring technique, based on hardcoded passwords, was used with SSH backdoors previously discovered by ESET. The difference here is that skip-2.0 is installed in-memory, while in the case of the SSH backdoors the sshd executable was modified prior to execution.

Additionally, CSECAuthenticate::AuthenticateLoginIdentity will be called from within its hook code but the hook will always return 0. The ReportLoginSucess and IssueLoginSuccessReport hooks will not call the original functions if the magic password was used to log in. The same behavior is applied to FEExecuteLogonTriggers. Other logging functions such as XeSqlPkg::sql_statement_completed::Publish or XeSqlPkg::sql_batch_completed::Publish will also be disabled in the case where the user logged in with the magic password. Multiple audit events are disabled as well, including SecAuditPkg::audit_event::Publish, XeSqlPkg::login::Publish and XeSqlPkg::ual_instrument_called::Publish.

This series of hooks allows the attacker not only to gain persistence in the victim’s MSSQL Server through the use of a special password, but also to remain undetected thanks to the multiple log and event publishing mechanisms that are disabled when that password is used.

We tested skip-2.0 against multiple MSSQL Server versions and found that we were able to login successfully using the special password with MSSQL Server 11 and 12. To check whether a particular sqllang.dll version is targeted by skip-2.0 (i.e., that matches the byte patterns), we created a YARA rule, which can be found in our GitHub repository.

Connection with the Winnti Group

We observed multiple similarities between skip-2.0 and other tools from the Winnti Group’s arsenal. Its VMProtected launcher, custom packer, Inner-Loader injector and hooking framework are part of the already known toolset of the Winnti Group. This leads us to think that skip-2.0 is also part of that toolset.

Conclusion

The skip-2.0 backdoor is an interesting addition to the Winnti Group’s arsenal, sharing a great deal of similarities with the group’s already known toolset, and allowing the attacker to achieve persistence on an MSSQL Server. Considering that administrative privileges are required for installing the hooks, skip-2.0 must be used on already compromised MSSQL Servers to achieve persistence and stealthiness.

We will continue to monitor new activities of the Winnti Group and will publish relevant information on our blog. For any inquiries, contact us at threatintel@eset.com.

Indicators of Compromise (IoCs)

ComponentSHA-1ESET detection name
VMP Loader18E4FEB988CB95D71D81E1964AA6280E22361B9F
4AF89296A15C1EA9068A279E05CC4A41B967C956
Win64/Packed.VMProtect.HX
Inner-Loader injectorA2571946AB181657EB825CDE07188E8BCD689575Win64/Injector.BS
skip-2.060B9428D00BE5CE562FF3D888441220290A6DAC7Win32/Agent.SOK
Known targeted sqllang.dll files (non-exhaustive list)4396D3C904CD340984D474065959E8DD11915444
BE352631E6A6A9D0B7BBA9B82D910FA5AB40C64E
D4ADBC3F77ADE63B836FC4D9E5915A3479F09BD4
0BBD3321F93F3DCDD2A332D1F0326142B3F4961A
FAE6B48F1D6EDDEC79E62844C444FE3955411EE3
A25B25FFA17E63C6884E28E96B487F58DF4502E7
DE76419331381C390A758E634BF2E165A42D4807
ED08E9B4BA6C4B5A1F26D671AD212AA2FB0874A2
1E1B0D91B37BAEBF77F85D1B7C640B8CC02FE11A
59FB000D36612950FEBC36004F1317F7D000AA0B
661DA36BDD115A1E649F3AAE11AD6F7D6FF2DB63
N/A

 

MITRE ATT&CK techniques

TacticIDNameDescription
ExecutionT1035Service Executionskip-2.0 is started with the SessionEnv service
PersistenceT1038DLL Search Order Hijackingskip-2.0 probably uses a DLL hijacking technique against the SessionEnv service
T1179Hookingskip-2.0 hooks multiple functions in sqllang.dll service to bypass authentication and maintain stealth
Defense EvasionT1054Indicator Blockingskip-2.0 blocks event logging
T1045Software Packingskip.2-0 and Inner-Loader are packed using Winnti’s custom packer. Further, the launcher is VMProtected.
DiscoveryT1057Process DiscoveryInner-Loader lists running processes in order to find the process running MSSQL Server
ImpactT1485Data Destructionskip-2.0 allows unauthorized access to MSSQL databases, allowing data destruction or tampering
T1494Runtime Data Manipulationskip-2.0 manipulates event logging at runtime
T1492Stored Data Manipulationskip-2.0 allows unauthorized access to MSSQL databases, allowing manipulation of stored data

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Google與資安大廠ESET、Lookout和 Zimperium聯合成立應用程式防護聯盟

 
圖片來源:Google
 
Google於本周三(11.6)宣佈與資安公司包括ESET、Lookout和 Zimperium合作成立【應用程式防護聯盟(App Defense Alliance)】,加強稽查申請及幫忙掃瞄在Google Play Store上架的app 之安全性。
 
全球Android裝置高達25億台,也成為駭客的攻擊目標。在此之前,所有掃瞄工作,都是由Google員工利用Bouncer及Google Play Protect引擎,來檢查欲上架的app,但是Google Play上發現有害Android app時有所聞,其中不乏下載次數上千萬或上億的app,也突顯光靠Google自己掃瞄力有未逮。
 
Google和ESET、Lookout和 Zimperium的合作,旨在從欲上架Play Store的app中,發現可能有害的應用程式(potential harmful app,PHA),在它們發佈前予以遏止。應用程式防護聯盟成立宗旨,是要透過整合Google Play Protect偵測系統與這三家廠商各自的掃瞄引擎,來檢查正在排隊上架的app,互相補強以免有漏網之魚,而Google和合作廠商也將透過威脅情報及惡意程式互通有無,達到及早偵測的目的。
 
和Google 自己的掃毒引擎Play Protect一樣,ESET、Lookout和 Zimperium的技術都結合機器學習和動/靜態分析來偵測惡意行為,透過多重啟發式引擎一起運作,有助於提供惡意程式偵測效果。
 
資安大廠ESET因威脅偵測成效及安全分析報告的絕佳表現而榮幸與Google攜手合作,一起協助保護世界各地的使用者免受惡意應用程式的傷害。
 
 
為了維護您的行動裝置安全,請選用專業並值得信賴的資安品牌,***ESET行動安全套裝適用於Android系統*** (我要購買:https://www.eset.tw/estore/zh/)

ESET 將於 2019 年 10 月 18 日停售 ESET Multi-Device Security 產品

 

親愛的客戶,感謝您對 ESET 的支持! 我們將於 2019 年 10 月 18 日停售 ESET Multi-Device Security 產品,現有或新用戶可於購買、續期時選購 ESET Internet Security,以繼續讓 ESET 保護您的網上安全。

若有任何資安需求,歡迎聯絡銷售團隊 2893 8860,或上官網查詢:https://www.eset.hk/

Dear customers, thank you for your support on ESET! We would like to announce our ESET Multi-Device Security products will ceased from the market on 18 October 2019. Kindly note for our existing and new users can continue to renew or purchase their licenses under ESET Internet Security for us to protect your online security.

If you have any enquiries, please contact our sales team at 2893 8860 or visit https://en.eset.hk/

關於Version 2 Limited
Version 2 Limited是亞洲最有活力的IT公司之一,公司發展及代理各種不同的互聯網、資訊科技、多媒體產品,其中包括通訊系統、安全、網絡、多媒體及消費市場產品。透過公司龐大的網絡、銷售點、分銷商及合作夥伴,Version 2 Limited 提供廣被市場讚賞的產品及服務。Version 2 Limited 的銷售網絡包括中國大陸、香港、澳門、臺灣、新加坡等地區,客戶來自各行各業,包括全球1000大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

AI駭客 智能資安打造金鐘罩

企業資安走向M型化發展,想打造0罩門,除了依靠AI、發展智能資安以外,企業老板、員工、政府都要一起加入防駭大作戰……
新加坡去年6月底爆發Singhealth醫療系統150萬名病患個資從姓名、生日、地址到身分證號碼及16萬名病患門診配藥資料外洩,當中引起全球嘩然的是駭客目標為新加坡總理李顯龍,經多次嘗試,成功盜取李顯龍個資與配藥紀錄!
隨著以假亂真的社交工程攻擊、釣魚郵件、挖礦病毒盛行,企業「資料外洩」頻率及筆數增加,為資安帶來嚴峻的考驗,而傳統資安工具依照預先制定規則進行防禦的方式顯然已不是對手,結合人工智慧(Artificial Intelligence, AI)及機器學習(Machine Learning)的「智能資安」成為資安新顯學,不過水可以載舟亦可以覆舟,AI也成為駭客犯罪的子彈,駭客與資安系統進入新的諜對諜時代。
「站在防守角度,面對駭客不是技術問題,是人的行為問題,人的行為有太多漏洞讓駭客得以入侵。」投入資安領域超過15年的台灣二版高級產品經理盧惠光剖析,他認為目前國內企業對資安意識呈現M型化的兩極發展,「重視資安的企業沒那麼容易被駭,但同時也很多企業忽視資安,這也是為什麼就整體社會來看駭客會贏的原因。」
#資料外洩人人都有份
盧惠光表示,目前資安發展有2個主要趨勢,一是資料外洩次數與筆數越來越多,二是OT資安威脅增加。他指出,「2019的上半年,國際上資料外洩筆數累計高達41億筆,而全球人口約77億,估計今年底已知的資料外洩筆數會超過全球人口數,平均下來大家都有份,也就是資料外洩是所有人都遇得到。」特別是當企業導入自動化、大數據(Big Data)、AI,或將海量資料存放在雲端,若發生資料外洩,情況就很嚴重。
OT或工控系統被勒索病毒綁架的案例也越來越層出不窮,從車廠、高科技製造業、電廠到辦公大樓都在駭客狙擊射程內。盧惠光說,「工廠為提昇產能、降低成本,導入AI,將IT與OT整合起來,但過程中未注意資安架構,再加上OT資安成本較高,當企業已投入預算推動自動化或AI,未必願意再投入資安領域,造成安全缺口;而OT對工廠而言非常關鍵,若被勒索病毒找上,願意付贖金的機率相對較高。」
另外,盧惠光指出,現在商辦大樓電梯、空調、燈光控制透過「監視控制與資料擷取(Supervisory Control and Data Acquisition, SCADA)」系統管控,之前曾發生某大樓SCADA被駭,要求支付比特幣贖金,類似案例會越來越普遍。
#AI幫忙抓可疑怪客
因應資安威脅不斷上升,加上AI運用日益普及,「智能資安」應運而生。盧惠光笑說,現在連煮飯的電鍋都用AI,需要大量過濾資料的資安也升級為「智能資安」,運用AI、機器學習技術進行預防、偵測,可節省許多人力及提早發現異常。
盧惠光進一步解釋,防毒軟體的做法是攔阻資安威脅進入企業系統,但百密必有一疏,當病毒躲過防禦進入企業系統後,需透過「偵測」發現病毒隱藏地方,在未釀成大禍─勒索、「被」挖礦或更嚴重的資料外洩前,及時排除。
「系統紀錄(Log)查看」是偵測系統內是否藏匿資安威脅的基礎,盧惠光指出,「雖然使用者行為難以預測,但透過機器學習,AI可進行使用者行為監控及分析,判斷這些網路行為是使用者正常行為,還是異常程序透過上網行為將資料傳輸出去;雖然資安人員可以快速檢視,但確認幾百萬筆資料還是需要時間,AI能協助快速抓出可疑資料,再經由人為判斷,以快速反應解除危機。」
去年發生新加坡總理李顯龍病歷被駭一事,盧惠光表示,事件曝光也是由於管理資料庫的人看到一些不正常的Log,追查後才發現李顯龍病歷資料已被抽走,「過程中是有機會找出問題所在的,這也是為什麼需要運用AI協助偵測的原因。」企業委外廠商管理是資安漏洞來源之一,若對外包廠商維管人員管控不當,可能就引狼入室,盧惠光舉例說明,「若企業有100家合作廠商能接觸公司內部系統,實務上企業很難發現是否有廠商IP遭駭客或競爭對手使用,但AI能透過發現異常行為解決系統配置上的問題,在攻擊發生前提前修復不該存在的設定,做到一定程度的預先警告。」
對於智能資安發展,盧惠光認為「目前機器學習無法取代人,且需要仰賴人提供資料,建立學習模組及最後交由人為判斷,將來AI若進展到深度學習(Deep Learning),如同下棋的AlphaGo一樣,那就相當強大,可以自主學習,也能主動發現公司設定漏洞、主動修復,若遇攻擊也會自動反應處理,到時甚至可能取代大部份人的工作。」
#駭客也進入AI時代
不過,智能資安的對立面可能就是智能駭客。盧惠光說,「防毒軟體、作業系統會不斷更新,駭客尋找弱點進入系統的瞬間是困難的,所以需要很多工具、花很多時間,但現在駭客也用AI製作攻擊工具或惡意程式碼(Payload),讓病毒或木馬更有智能,避免被防毒軟體掃到。」
這兩造的AI戰役,彼此消長情況為何?盧惠光坦承,「目前還是Bad Guys(壞人)在贏」,但不是贏在技術而是「人的行為問題」,很多攻擊是通過e-mail夾帶有害連結,若沒人點擊、下載檔案就沒事,但總會有人點開潘朵拉的盒子,打開資安大門,放駭客登堂入室。
談到目前國內企業對資安的防禦態勢,盧惠光觀察到,「很多企業資安防禦還不完整,整體呈現M型分布,M的其中一邊是資安做得很好的大型公司,另一邊則是能不做就不做,中間的企業較少。」
盧惠光說,重視資安的企業IT團隊會進行紅隊演練、滲透測試及對全體員工進行資安教育訓練,管理上則會監控公司電腦,在這樣的環境下,員工不會使用公司電腦及e-mail處理私人事情。相較之下,不管控資安的公司,員工可能會用公司電腦上網逛拍賣、追劇、玩遊戲,增加許多資安風險,「員工的心理就是老闆重視我就小心一點,老闆不重視我就隨意一點。」
*紅隊演練 (Red Team Assessment) 是在不影響企業營運的前提下,對企業進行模擬入侵攻擊,在有限的時間內以無所不用其極的方式,從各種進入點執行攻擊,嘗試達成企業指定的測試任務。
盧惠光強調「資安」不單是預算問題,更多是公司文化及管理態度,「老闆可能願意花4萬元買一台性能很好的筆電,但怕電腦速度變慢就不裝防毒軟體,但筆電裡面承載資料值多少錢,只有丟失時才知道,就像空氣一樣,等不能呼吸就知道空氣多重要。」
#資安保護數位資產
「不少企業對資安抱持『賭一把』的僥倖心理,除非自己遇到或火燒到隔壁才意識到。」盧惠光很感慨,他可理解企業對於把費用投入發展看不到、摸不到的資安而感到兩難,「但資安應該跟實體安全一起看待。相信沒有一家公司可以接受大門沒鎖、窗戶沒關,但公司沒設防火牆就相當於大門沒鎖。」盧惠光指出企業在實體世界會考慮消防、門禁安全,且消防系統每年都會巡檢,確認消防物品、滅火器是否使用期限內,但資安工作卻不一定會做到這程度,「我們現在已到實體安全與IT安全一樣重要的時代,要把數位資產當成有形資產。」
特別是現在網路圈套很多,盧惠光說,「可能駭客偽裝成外包廠商發e-mail通知更新重要程式,且設計真實Logo頁面,員工一時不察點下去就中計了。」他認為,這些釣魚郵件或社交工程就像詐騙集團,先設計情境讓對方信以為真,之後就容易被帶著走,「人都會有弱點,如睡不飽、心情不好時會專注度降低,容易做出錯誤的決策,這也是為什麼星期一是最常發生中毒的日子。」
盧惠光相信,公司正常運作必須實體與網路兩端都是安全的環境,「要投資多少費用在資安這是商業決定,但老闆重視資安的程度會影響員工的行為、習慣、資安文化,這才是最關鍵的,也不是花錢就可解決的。」
#用教育培養資安DNA
對於不重視資安企業的解套方案,盧惠光認為最終還是需要由政府制定法規,「政府制定資安規則、要求,企業就會跟從,歐盟去年開始生效的GDPR就是例子。」GDPR適用於與歐洲生意來往任何地區的所有企業,影響範圍很大,罰款金額最高為全球總營業額4%。
盧惠光解釋,「GDPR可理解為對重大資料外洩的回應,要求企業需更好保護客戶資料,確保每家企業最少做到加密,被偷走的資料加密與未加密相差甚遠,增加對大眾的保障。企業就是要合法賺錢,最能影響老闆資安作為的還是法規。」
對於千變萬化的病毒陷阱,盧惠光認為做教育訓練約可減少10~20%上當的機率,因為「成年人行為很難改變,大部分人上勾都不自知,特別是當自己很忙或遇到沒見過的變種形態時。」若要培養對抗駭客的DNA,盧惠光提議從孩子教育開始,特別是現在孩子從小使用各種數位工具,「資安教育應該就像環保教育一樣,從小教起,這樣才能變成他們認知的一部分。」
我們生活的世界正走向「不斷自動化」,未來公車及其他公共設施、服務會逐漸聯網、自動化,這是否等於給駭客一個超級舞台?對此盧惠光表示不用想得太可怕,「很多人努力當駭客,同時也很多人為安全而努力,自動化社會的資安架構會更深入,理論上是越來越難駭進去;現在資安還在發展階段,未來相關法規上路,M型資安社會也將往鐘型發展,到時具備一定程度的資安意識與機制就是占多數的主流。」他認為可用實體安全概念看待資安發展,「如同飛機、汽車現在都相當安全,但還是會發生事故、意外,只是跟過去相比意外越來越少,資安也是一樣道理。」
#5點快速看資安風向
1.目前趨勢:資料外洩嚴重、對OT威脅升高
2.AI資安:可迅速大量排查威脅,未來深度學習後有取代人類的可能性
3.百密一疏:「人」依然是駭客最大突破口
4.老闆要帶頭:企業領導者越重視資安,組織內的氛圍才帶動得起來
5.破解M型資安社會:政府應訂法律強制推廣,同時扎根於學校教育
*原文出處:能力雜誌<第764期Oct. 2019>_封面故事 延伸篇

微軟緊急發佈IE零時差漏洞更新


微軟於上周緊急發佈IE零時差漏洞更新並呼籲用戶儘速安裝,編號為CVE-2019-1367,發生在IE腳本引擎處理記憶體物件的過程中,會造成記憶體毁損,使攻擊者可在現有使用者電腦上執行任意程式碼。成功開採本漏洞的駭客,可取得和現有使用者相同權限,如果後者具有管理員身份,則攻擊者將能接管整台機器,進而安裝程式、修改/變更/刪除資料,或是新增完整權限的用戶帳號。在Web攻擊情境中,攻擊者可能發送郵件,誘使IE用戶點選其中URL以造訪惡意網站對用戶發動攻擊。受影響的IE版本有9、10和11。但Windows 10 1903版上的IE 11修補程式,則只能由Microsoft Update Catalog手動安裝。
 
另外同時還有編號為CVE-2019-1255的漏洞,則和Windows內建安全軟體Microsoft Defender(原名Windows Defender)中的惡意程式防護引擎(Malware Protection Engine)處理檔案不當有關,但沒有那麼嚴重,也沒有發現有攻擊行為,而且微軟也在幾天後發佈更新版本引擎。
 
ESET資安專家建議,雖然Internet Explorer已經不再獲得微軟的繼續開發,不過現在仍有不少使用者或機構採用,故需定期注意微軟的安全更新,以防駭客入侵或網路攻擊;還有不管是Internet Explorer瀏覽器、其他瀏覽器或是其他應用程式,都應該保持在最新版本並特別注意網路釣魚攻擊或DoS漏洞。
 
*****若有任何資安需求,歡迎洽詢ESET資安專業團隊,服務電話:(02)7722-6899,或上官網查詢:https://www.eset.tw/