News Categories
(34)Malware (39)Malicious emails (11)Web 2.0 (24)Facebook (22)Social Networks (44)Spam (2)Defensio (1)Comment Spam (15)Phishing (9)Web spam (4)Click-jacking (38)Compromise (20)Analysis (38)Exploits (14)Research (3)Presentations (3)Conferences (4)security conference (9)Mass Injection (10)Rogue AV (4)Blackhat SEO (2)Neosploit (23)Targeted attacks (7)Video (14)Zeus (5)Microsoft (4)Monthly Reports (1)twitter (3)Google (18)Vulnerabilities (9)Adobe (12)Java (4)Mobile (4)Apple (1)hacked (1)TAB (1)Black Hat USA 2011 (1)Google+ (20)0-day (1)CVE-2010-2884 (1)CVE-2011-1255 (1)Worm (14)Blackhole exploit kit (1)Incognit Exploit kit (2)Tuesday Patch (6)APT (6)Typosquatting (3)Vulnerability Analysis (1)CVE-2011-3402 (4)Web Research (4)Predictions (3)Adult (5)News (3)Black Hat SEO (6)Data loss (8)Scam (1)QR codes (6)Twitter (1)CVE-2012-0003 (1)CVE-2011-3389 (1)CVE-2012-0004 (1)Phoenix Exploit Kit (1)CrimePack (3)Reverse Engineering (2)Captcha (1)Valentine's day (2)Kelihos (1)SC Magazine Award Winner (1)Wordpress (1)MS12-010 (1)CVE-2012-0002 (1)Infosec (2)CVE-2012-0507 (8)Toolkits (1)Skywiper (2)Flame (1)Flamer (2)Passwords (1)freedom of expression (1)censorship (2)Plugins (3)Malvertising (14)Exploit (1)CVE-2012-1723 (1)CSI (2)ThreatSeeker (2)Adventures in Spam (1)CVE-2012-4681 (1)LBS (2)RAT (1)module Apache/2 (1)Cyber Monday (1)Black Friday (1)Pastebin (4)CVE-2012-4792 (1)iPad (1)super bowl (1)iPhone (2)iOS (4)Spear Phishing (1)Threat Report (3)ThreatScope (1)Dynamic DNS (1)China (1)SSL (1)APT1 (2)DLP (3)Hack (1)CVE-2012-4969 (2)threat lifecycle (1)ThreatSeeker Network (1)ACE (10)exploit kit (1)blackhole (2)Black Hole (1)DNS poisoning (1)RedKit Exploit Kit (4)exploit kits (1)threat stages (1)Certificates (1)Topical (1)Waterhole (1)CVE-2013-2463 (1)Neutrino exploit kit (1)CVE-2013-2473 (1)CVE-2013-3893 (2)Collective Threat Intelligence (1)CVE-2013-3963 (1)Targeted Attack (3)Advanced Malware (1)CVE-2013-3897 (1)Tor (5)cyber-crime (1)Mevade (2)Ransomware (3)Social Engineering (1)CookieBomb (2)LinkedIn (1)CVE-2013-3906 (2)Pony (3)Cryptolocker (2)Upatre (1)application telemetry (1)meta-data (3)dr. watson (1)windows error reporting (1)big data (2)data theft prevention (1)DTP (1)telemetry (2)CVE-2014-0322 (2)MSIE 0-day (1)Deputy Dog (1)Ephemeral Hydra (1)CVE-2013-0074 (1)CVE-2013-3896 (1)Silverlight (2)crash reports (1)POS (1)anomaly detection (1)goon (4)angler (1)ru:8080 (1)magnitude (3)flash (1)CVE-2013-2465 (1)malicious iframes (1)FIESTA (1)Exploits Kit (1)iframe (3)CVE-2014-0160 (2)OpenSSL (3)Heartbleed (3)Citadel (2)CVE-2014-1776 (1)VGX.DLL (1)necrus (1)cutwail (2)gameover (3)vulnerability (3)zbot (1)control panel (1)carberp (1)zberp (1)Caphaw (2)Nuclear exploit kit (1)Shylock (1)Dragonfly (1)Zeus PIF (1)bitly (1)fraud (2)RIG Exploit Kit (1)POS malware (1)Point Of Sale Malware (1)Ukraine (1)Russia (1)Shellshock (1)CVE-2014-6271 (1)poodle (1)cve-2014-3566 (1)sslv3 (1)Ebola (1)CVE-2014-4114 (1)CPA (1)Regin (1)CVE-2015-0311 (1)CVE-2015-0235 (1)linux (1)GHOST (1)CVE-2015-0072 (1)Internet Explorer (1)XSS (1)IE (1)TorrentLocker (1)Product Information (1)Money Laundering (1)APSA10-05 (1)Skype spam
RSS Feed
News
Nov
24
What protection can be offered from sophisticated malware such as Regin?
Posted by Carl Leonard on 24 November 2014 10:29 AM

Websense® Security Labs™ researchers are continuing the analysis of a sophisticated malware attack which has been observed to conduct espionage against Russian, Saudi Arabian, and Irish targets, amongst others.

 

Regin, as the malware family (or toolkit) has been named, is both modular and multi-stage, making the malware extremely customizable.  Regin also uses advanced techniques to hide its activity, including custom encryption and the use of custom UDP and TCP protocols.

 

At the time of writing we can confirm our knowledge of publically-available Indicators of Compromise used in both version 1 of Regin (pre-2011) and version 2 of Regin (2013 onwards) and we have committed those to ACE, our Advanced Classification Engine.

 

Threat Modelling

 

When such sophisticated attacks are broken down into their constituent parts, we look to our threat modelling system of the 7 Stages of Advanced Threats.  This helps us to build a clearer picture of risk based on information known at any given time.

 

7 stages of Advanced Threats:

 

For Regin we can arrive at the following mapping :

 

Stage 1 (Reconnaissance): The authors of Regin are believed to be knowledgeable about the industry sectors targeted and have tailored the malware to suit.  Further, due to the modular nature of the attack, components can be added to suit the approach required by the malware authors based on their reconnaissance discoveries.  It would seem that the number of target organizations is currently low.

 

Stage 2 (Lure): Uncertainty remains around the lures used by the Regin toolkit, but it is thought to involve compromised websites and a means to get those in front of the target.  Most likely the lure would arrive via email, instant message communications, or drive-by attacks hosted on compromised websites.

 

Stage 3 (Redirect): Due to the varying options around the lure stage it is uncertain whether the redirect stage is used by Regin.  Not all malware families subscribe to the all of the prescribed 7 Stages.

 

Stage 4 (Exploit Kit): Exploit code is often used to deliver payloads onto vulnerable machines.  It is not always necessary for a vulnerability to be abused by malware, but it could be a possibility with the Regin toolkit considering its advanced nature.

 

Stage 5 (Dropper): Once the dropper has been deployed, Regin offers a multi-stage download-and-decrypt process to deliver its system files onto the infected machine.  Note that it has been reported that non-traditional file storage areas such as the registry are used by Regin during its configuration phase.  The security community is still hunting for the illusive dropper file, although we do have knowledge of, and have committed to our protection engine, multiple device drivers used in the payload's download process.

 

Stage 6 (Call Home): Regin's control communication is not just specific to the HTTP protocol. The use of UDP and TCP have also been observed.  Further, custom encryption based on existing algorithms seek to hide the transmission of stolen data from solutions not looking out for the use of such custom encryption.

 

Stage 7 (Data Theft): Reports show that data stolen by the toolkit is not always committed to disk, instead sealed in memory only making analysis difficult.

 

Conclusion

 

Regin uses many complex methods to evade detection and make analysis difficult.  The observed trend indicates the complexity of such malware will continue to increase as malware authors fine-tune their skills and adopt such modular and multi-stage malware.

 

As we continue our analysis and discover further Indicators of Compromise, we shall continue to enhance our protection using ACE, our Advanced Classification Engine.  We have configured our ThreatSeeker® Intelligence Cloud to seek out further Indicators of Compromise and we are using technologies such as Yara to help achieve that and supplement our own analytics.


Read more »