Express Computer
Home  »  News  »  Researchers use ‘fingerprints’ tech to spot Russian hackers

Researchers use ‘fingerprints’ tech to spot Russian hackers

0 173

Hackers too leave their fingerprints as they attack enterprises and individuals and cyber security researchers have now developed a new technique to “fingerprint” them, spotting two prolific Russian-origin sellers of Windows exploits.

The team from cyber security firm Check Point, when analysing a complicated attack against one of their customers, noticed a very small 64-bit executable that was executed by the malware.

The sample contained unusual debug strings that pointed at an attempt to exploit a vulnerability on the victim machine.

Even more importantly, the sample had a leftover programme database (PDB) path.

“With the absence of any online resource with this implementation of CVE-2019-0859, we realised that we are not looking at a publicly available PoC, but rather a real-world exploitation tool. This intrigued us to dig deeper,” the researchers said in a blog post on Friday.

Generally, researchers tend to look at the people behind a specific malware family as one unbroken unit.

“It’s easier to envision that each and every component was written by a single person, team, or group. Truth is, writing advanced malware by nation-states or criminals involves different groups of people with various skills,” said Check Point.

A cyber-espionage organisation of a nation-state, is likely to have hundreds or even thousands of employees in different groups and branches.

In such an organisation, the workload of writing the common components is broken down among specialised teams, with different ones responsible for the initial access, collecting sensitive data, lateral movement, and more.

The Check Point team looked specifically at the small 64-bit binary from the incident response case.

“It made a great candidate for us to fingerprint, as the executable was refined from code written by someone other than the exploit author.

“Moreover, the executable was separated from the main binary of the malware, an infamous crimeware, which made us believe that this exploit wasn’t developed in-house by the malware developers,” the researchers explained.

With a careful analysis of the samples, the team was able to understand which samples exploited which CVE.

“At this point, we had more than 10 CVEs that we were able to attribute to the same exploit developer, based on our fingerprinting technique alone and without further intelligence,” Check Point revealed.

Later on, public reports revealed the name of the target exploit seller: Volodya (aka Volodimir), previously known as BuggiCorp.

“It seemed we were not the only ones to track this exploit seller, as Kaspersky reported some relevant information about them on several occasions”.

According to Kaspersky, Volodya first made headlines under their “BuggiCorp” nickname, when they advertised a Windows 0-day for sale with a starting price of $95,000.

Across the years, the price went up and some of their Windows LPE 0-day exploits were sold at a price as high as $200,000.

Volodya sold exploits to both crimeware and APT groups.

“The fact that we were able to use our technique, repeatedly, to track 16 Windows LPE exploits, written and sold by two different actors, was very surprising”.

“We believe that this research methodology can be used to identify additional exploit writers. We recommend other researchers try our suggested technique and adopt it as an additional tool in their arsenal,” the researchers emphasised.

–IANS

Get real time updates directly on you device, subscribe now.

Leave A Reply

Your email address will not be published.

LIVE Webinar

Digitize your HR practice with extensions to success factors

Join us for a virtual meeting on how organizations can use these extensions to not just provide a better experience to its’ employees, but also to significantly improve the efficiency of the HR processes
REGISTER NOW 

Stay updated with News, Trending Stories & Conferences with Express Computer
Follow us on Linkedin
India's Leading e-Governance Summit is here!!! Attend and Know more.
Register Now!
close-image
Attend Webinar & Enhance Your Organisation's Digital Experience.
Register Now
close-image
Enable A Truly Seamless & Secure Workplace.
Register Now
close-image
Attend Inida's Largest BFSI Technology Conclave!
Register Now
close-image
Know how to protect your company in digital era.
Register Now
close-image
Protect Your Critical Assets From Well-Organized Hackers
Register Now
close-image
Find Solutions to Maintain Productivity
Register Now
close-image
Live Webinar : Improve customer experience with Voice Bots
Register Now
close-image
Live Event: Technology Day- Kerala, E- Governance Champions Awards
Register Now
close-image
Virtual Conference : Learn to Automate complex Business Processes
Register Now
close-image