Corporate Presentation Template March 2006

Total Page:16

File Type:pdf, Size:1020Kb

Corporate Presentation Template March 2006 Beyond Aurora’s Veil: A Vulnerable Tale Derek Manky Cyber Security & Threat Research FortiGuard Labs October 26th, 2010: SecTor 2010 ± Toronto, CA Conficker: April Doomsday .. ¼ Meanwhile JBIG2 Zero-Day PDF/SWF . January 2009: . Malicious PDF Samples In the Wild Drop Gh0st RAT Trojan, Exploits CVE-2009-0658 No-Click Variant through Windows Shell Extensions . February 02, 2009: . Adobe Acknowledges via APSA09-01 . March 10, 2009: . Adobe Patches via APSB09-03 . Attacks Occurred Roughly 63 Days Before Patch 2 ... A Vulnerable Tale Gh0st RAT Advertisement Photo 3 Bredolab & Gumblar Meanwhile ¼ Gumblar & Bredolab Botnets Sync Through PDF Exploits . March 18, 2009 . Adobe Issues Patch APSB09-04 Includes CVE-2009-0927, PDF Exploit . March 23, 2009: . Gumblar attack surfaces Compromised websites with exploits Freshly exploiting CVE-2009-0927 . Drops Bredolab Botnet (First appearance) Downloads FTP Stealing Module for Gumblar Downloads FakeAV for Profit . Aggressively Attacked 5 Days After POC Released 4 Bredolab & Gumblar 5 Bredolab & Gumblar Then and Now ¼ Gumblar & Bredolab Botnets Sync Through PDF Exploits . Bredolab . Oct 2009: New Protocol (v2), Custom Encrypted HTTP . Jan 2010: Uses Pushdo Botnet New Webmailing Engine Distributed (Webwail)[1] Cracks CAPTCHAs in < 30 seconds Feb 2010: Downloads Ransomware Force Kills Applications, Demands > $50 USD . Oct 2010: Distributes Grum/Tedroo Botnet . Source Code Available Bredolab now used for various operators & attacks since original incarnation [1] FortiGuard Labs Discovers Webwail in December 2009 6 Bredolab & Gumblar Then and Now ¼ Gumblar & Bredolab Botnets Sync Through PDF Exploits . Gumblar Today[1] 9,350 infected links 951 links hosting exploits 165 malware variants served Popular exploited vulns: CVE-2007-0701 CVE-2008-0655 CVE-2008-2992 CVE-2009-0927 [1] FortiGuard Web Scanning Systems, Oct 19th 2010 7 ... A Vulnerable Tale In The Threat Spotlight ¼ Internet Explorer HTML Memory Corruption (ªAuroraº) . September 30, 2009: . Microsoft Receives Vulnerability Report (Later CVE-2010-0249) . December 15, 2009: . Google Later Acknowledges Attack Discovery . January 04, 2010: C&C Servers Taken Down . January 12, 2010: Attacks Publicly Acknowledged . Dropped Custom Trojan . January 14, 2010: Public POC Exploit Code Available . January 21, 2010: . Microsoft Patches via MS10-002 . Zero-Day 113 Days Before Patch, 7 Days From Public POC 8 ... A Vulnerable Tale ¼ Meanwhile Internet Explorer Use-After-Free . March 09, 2010: . Microsoft Acknowledges via Advisory / CVE-2010-0806 . Web Drive-By Attacks Already In the Wild . Drop Gh0st RAT Trojan, Similar to Aurora . March 30, 2010: . Microsoft Patches via MS10-018 . Attacks Occurred Roughly 21 Days Before Patch . FortiGuard Detects Highest Exploit Rate Before Patch (Zero-Day) 9 Internet Explorer Use-After-Free Exploit Demonstration Fortinet Confidential 11 11 The Next Chapter What can we learn? . !!! Headlines are not everything !!! Reactive defense against high profiles attack == inefficient . Threats often share similar attack techniques Browsers, Document Formats, System Services Conficker Neeris (RPC DCOM), Murofet (DGA) Gh0st RAT (PDF JBIG2) Gumblar (PDF getIcon) Aurora Google/etc & Gh0st RAT: IE Use-After-Free 12 The Next Chapter What can we learn? . Zero-day attacks happen more often than you may think Attacks can continue for months undetected Can be 1-3 week response time for patches Once detected / reported .. Otherwise 6-12 months . Patched vulnerabilities are attacked quickly, and frequently Conficker: 30 Days Gumblar: 5 Days . Patch management! Quick patching is essential Does not work on zero-day attacks 13 The Next Chapter The new decade of threats . Attacks can survive for years . Attacks change extremely frequently Server-side polymorphism Repack hosted malware Repack hosted scripts [Gumblar] Crimeware and source code Copy & paste bots New versions Endless domains Creates tremendous volume 14 FortiGuard Labs – Security Research · 87 Zero-Days Discovered Since 2008, Mostly Critical · Oct 2010: 30+ Outstanding in Zero-Day State 15 http://www.fortiguard.com/advisory/UpcomingAdvisory.html Fighting Back Strategic Defense . Standard security rules apply; often ignored . Layered security vs. Growing attack surface Applicable to Infection & Post-Infection . Education and Training (RSS) Think before you link Use of JS, Flash (Noscript, PDF Reader) Trust management (PGP, SSL) . Alternative software considerations OS, Browsers, Doc Readers, Sandboxes . Access level lock-down (Admin privileges) 16 Fighting Back Layered Security vs. Growing Attack Surface . Intrusion Prevention: Botnet C&C, Zero-Days & Exploits . Application Control: Malicious services . Compromised Facebook Applications . Webfiltering: Botnet C&C, Fast Flux / MalHosting, SEO . Antispam: Spambots & Incoming Campaigns . Antivirus: Trojans, bots, ransomware, etc . Vulnerability Review . Software used vs. alternatives 17 18.
Recommended publications
  • Fortinet's March Threatscape Report Shows Domination of Ransomware and Troublesome Zero-Day
    Fortinet's March Threatscape Report Shows Domination of Ransomware and Troublesome Zero-Day Rise of Ransomware Is Primarily Driven by Bredolab and Pushdo Botnets SUNNYVALE, CA, Apr 01, 2010 (MARKETWIRE via COMTEX News Network) -- Fortinet(R) (NASDAQ: FTNT) -- a leading network security provider and worldwide leader of unified threat management (UTM) solutions -- today announced its March 2010 Threatscape report showed domination of ransomware threats with nine of the detections in the malware top ten list resulting in either scareware or ransomware infesting the victim's PC. Fortinet observed the primary drivers behind these threats to be two of the most notorious botnet "loaders" -- Bredolab and Pushdo. Another important finding is the aggressive entrance of a new zero-day threat in FortiGuard's top ten attack list, MS.IE.Userdata.Behavior.Code.Execution, which accounted for 25 percent of the detected activity last month. Key threat activities for the month of March include: -- SMS-based Ransomware High Activity: A new ransomware threat -- W32/DigiPog.EP -- appeared in Fortinet's top ten malware list. DigiPog is an SMS blocker using Russian language, locking out a system and aggressively killing off popular applications like Internet Explorer and Firefox until an appropriate code is entered into a field provided to the user. To obtain the code, a user must send an SMS message to the provided number, receiving a code in return. Upon execution, DigiPog registers the user's MAC address with its server. It is the first time that SMS-based ransomware enters Fortinet's top ten list, showing that the rise of ransomware is well on its way.
    [Show full text]
  • PC Anti-Virus Protection 2011
    PC Anti-Virus Protection 2011 12 POPULAR ANTI-VIRUS PROGRAMS COMPARED FOR EFFECTIVENESS Dennis Technology Labs, 03/08/2010 www.DennisTechnologyLabs.com This test aims to compare the effectiveness of the most recent releases of popular anti-virus software1. The products include those from Kaspersky, McAfee, Microsoft, Norton (Symantec) and Trend Micro, as well as free versions from Avast, AVG and Avira. Other products include those from BitDefender, ESET, G-Data and K7. The tests were conducted between 07/07/2010 and 22/07/2010 using the most up to date versions of the software available. A total of 12 products were exposed to genuine internet threats that real customers could have encountered during the test period. Crucially, this exposure was carried out in a realistic way, reflecting a customer’s experience as closely as possible. For example, each test system visited real, infected websites that significant numbers of internet users were encountering at the time of the test. These results reflect what would have happened if those users were using one of the seven products tested. EXECUTIVE SUMMARY Q Products that block attacks early tended to protect the system more fully The nature of web-based attacks means that the longer malware has access to a system, the more chances it has of downloading and installing further threats. Products that blocked the malicious and infected websites from the start reduced the risk of compromise by secondary and further downloads. Q 100 per cent protection is rare This test recorded an average protection rate of 87.5 per cent. New threats appear online frequently and it is inevitable that there will be times when specific security products are unable to protect from some of these threats.
    [Show full text]
  • SHS Branding LAUNCH
    MESSAGELABS INTELLIGENCE MESSAGELABS INTELLIGENCE FEBRUARY 2010 Spam Surges in February while Message Size Shrinks Welcome to the February edition of the MessageLabs Intelligence monthly report. This report provides the latest threat trends for February 2010 to keep you informed regarding the ongoing fight against viruses, spam and other unwelcome content. REPORT HIGHLIGHTS Spam – 89.4% in February (an increase of 5.5% since January) Viruses – One in 302.8 emails in February contained malware (an increase of 0.02% since January) Phishing – One in 456.3 emails comprised a phishing attack (an increase of 0.04% since January) Malicious websites – 4,998 websites blocked per day (an increase of 184% since January) 41.6% of all malicious domains blocked were new in February (a decrease of 0.1% since January) 13.3 of all web-based malware blocked was new in February (an increase of 1.2% since January) Grum and Rustock to Blame for February Spam Surge While Volume Grows, Spam File Size Shrinks Waledac Botnet Makes a Comeback before its Demise Olympics-Themed Targeted Malware Gumblar Update REPORT ANALYSIS Grum and Rustock to Blame for Surge in February Spam As expected this time of year, spammers launched a number of spam campaigns related to St. Valentine‟s Day, celebrated on February 14. Around this time, spammers often change their spam runs to include references to the special date. However, the 5.5% increase in spam this month cannot be completely blamed on St. Valentine‟s Day alone. Figure 1 highlights the most recent spam surges in February, and further analysis reveals the underlying cause of these increases.
    [Show full text]
  • KOOBFACE: Inside a Crimeware Network
    JR04-2010 KOOBFACE: Inside a Crimeware Network By NART VILLENEUVE with a foreword by Ron Deibert and Rafal Rohozinski November 12, 2010 WEB VERSION. Also found here: INFOWAR http://www.infowar-monitor.net/koobface MONITOR JR04-2010 Koobface: Inside a Crimeware Network - FOREWORD I Foreword There is an episode of Star Trek in which Captain Kirk and Spock are confronted by their evil doppelgängers who are identical in every way except for their more nefarious, diabolical character. The social networking community Facebook has just such an evil doppelgänger, and it is called Koobface. Ever since the Internet emerged from the world of academia and into the world-of-the-rest-of-us, its growth trajectory has been shadowed by the emergence of a grey economy that has thrived on the opportunities for enrichment that an open, globally connected infrastructure has made possible. In the early years, cybercrime was clumsy, consisting mostly of extortion rackets that leveraged blunt computer network attacks against online casinos or pornography sites to extract funds from frustrated owners. Over time, it has become more sophisticated, more precise: like muggings morphing into rare art theft. The tools of the trade have been increasingly refined, levering ingenuous and constantly evolving malicious software (or malware) with tens of thousands of silently infected computers to hide tracks and steal credentials, like credit card data and passwords, from millions of unsuspecting individuals. It has become one of the world economy’s largest growth sectors—Russian, Chinese, and Israeli gangs are now joined by upstarts from Brazil, Thailand, and Nigeria—all of whom recognize that in the globally connected world, cyberspace offers stealthy and instant means for enrichment.
    [Show full text]
  • SHS Branding LAUNCH
    MESSAGELABS INTELLIGENCE MESSAGELABS INTELLIGENCE JUNE 2010 As the FIFA World Cup Kicks-off, Scams, Malware and Spam Attacks Intensify Welcome to the June edition of the MessageLabs Intelligence monthly report. This report provides the latest threat trends for June 2010 to keep you informed regarding the ongoing fight against viruses, spam, spyware and other unwelcome content. REPORT HIGHLIGHTS • Spam – 89.3% in June (a decrease of 0.9 percentage points since May) • Viruses – One in 276.4 emails in June contained malware (a decrease of 0.11 percentage points since May) • Phishing – One in 634.4 emails comprised a phishing attack (a decrease of 0.26 percentage points since May) • Malicious websites – 1,598 websites blocked per day (a decrease of 9.7% since May) • 30.3% of all malicious domains blocked were new in June (a decrease of 1.8 percentage points since May) • 12.5% of all web-based malware blocked was new in June (an increase of 0.1 percentage points since May) • MessageLabs Intelligence looks at why spam containing FIFA World Cup related messages is expected to increase as the competition continues ww w . m e s s a g e l a b s . c o m in f o @ m e s s a g e l a b s . c o m MESSAGELABS INTELLIGENCE REPORT ANALYSIS Spam containing FIFA World Cup related messages is expected to increase as the competition continues With the 2010 Soccer World Cup in progress, the organisations behind spam, scams and malicious attacks are poised to take full advantage of the world event and cash in on the excitement that surrounds it.
    [Show full text]
  • Targeted Attacks and Operation Aurora
    1. Infrastructure Security Targeted Attacks and Operation Aurora In this report, we will explain incidents that occurred between January and March 2010, and also examine incidents similar to Gumblar that have been occurring since December last year, as well as targeted attacks on U.S. corporations. Additionally, we will take a look at IIJ's MITF anti-malware activities and the technology involved. 1.1 Introduction This report summarizes incidents to which IIJ responded, based on general information obtained by IIJ itself related to the stable operation of the Internet, information from observations of incidents, information acquired through our services, and information obtained from companies and organizations with which IIJ has cooperative relationships. This volume covers the period of time from January 1 through March 31, 2010. In this period incidents of Gumblar and similar malware designed to steal IDs and passwords that we examined in our last report continued to occur, and many website alterations related to these incidents have been reported. A series of vulnerabilities that affect Web browsers and servers were also discovered. Besides these there was also a hijacking incident in which DNS information was manipulated without authorization, and SEO poisoning incidents that took advantage of a natural disaster. Targeted attacks on a number of major U.S. corporations were also a major topic. As seen above, the Internet continues to experience many security-related incidents. 1.2 Incident Summary Here, we discuss the IIJ handling and response to incidents that occurred between January 1 and March 31, 2010. Figure 1 shows the distribution of incidents handled during this period*1.
    [Show full text]
  • The Real Face of KOOBFACE: the Largest Web 2.0 Botnet Explained
    The Real Face of KOOBFACE: The Largest Web 2.0 Botnet Explained A technical paper discussing the KOOBFACE botnet Written by Jonell Baltazar, Joey Costoya, and Ryan Flores Trend Micro Threat Research THE REAL FACE OF KOOBFACE: THE LARGEST WEB 2.0 BOTNET EXPLAINED TABLE OF CONTENTS Table of Contents .................................................................................................................. i Introduction...........................................................................................................................The WALEDAC Botnet 1 Overview................................................................................................................................3 KOOBFACE DOWNLOADER................................................................................................ 5 SOCIAL NETWORK PROPAGATION COMPONENTS ................................................................... 6 WEB SERVER COMPONENT .................................................................................................. 7 ADS PUSHER AND ROGUE ANTIVIRUS INSTALLER................................................................... 8 CAPTCHA BREAKERS........................................................................................................ 8 DATA STEALERS.................................................................................................................. 9 WEB SEARCH HIJACKERS .................................................................................................. 11 ROGUE DNS CHANGERS...................................................................................................
    [Show full text]
  • Understanding Adversarial Strategies from Bot Recruitment to Scheduling
    Understanding Adversarial Strategies from Bot Recruitment to Scheduling 1 2(B) 1 1 Wentao Chang , Aziz Mohaisen ,AnWang, and Songqing Chen 1 George Mason University, Fairfax, USA {wchang7,awang10,sqchen}@gmu.edu 2 The University of Central Florida, Orlando, USA [email protected] Abstract. Today botnets are still one of the most prevalent and devas- tating attacking platforms that cyber criminals rely on to launch large scale Internet attacks. Botmasters behind the scenes are becoming more agile and discreet, and some new and sophisticated strategies are adopted to recruit bots and schedule their activities to evade detection more effectively. In this paper, we conduct a measurement study of 23 active botnet families to uncover some new botmaster strategies based on an operational dataset collected over a period of seven months. Our analysis shows that different from the common perception that bots are randomly recruited in a best-effort manner, bots recruitment has strong geograph- ical and organizational locality, offering defenses a direction and priority when attempting to shut down these botnets. Furthermore, our study to measure dynamics of botnet activity reveals that botmasters start to deliberately schedule their bots to hibernate and alternate in attacks so that the detection window becomes smaller and smaller. Keywords: Distributed denial of service · Botnets Behavioral analysis 1 Introduction Botnets are collections of networks of infected machines (aka bots) that are widely used to carry out a variety of malicious activities as instructed by a botmaster. As a result, botnets are notoriously known as one of the primary attack and threat vectors utilized against critical infrastructures and services in activities that include distributed denial of service (DDoS), spam distribution, phishing, scanning and network exploration, among others.
    [Show full text]
  • The Historical Perspective of Botnet Tools
    Current Journal of Applied Science and Technology 32(6): 1-8, 2019; Article no.CJAST.46653 ISSN: 2457-1024 (Past name: British Journal of Applied Science & Technology, Past ISSN: 2231-0843, NLM ID: 101664541) The Historical Perspective of Botnet Tools Maxwell Scale Uwadia Osagie1*, Osatohanmwen Enagbonma1 and Amanda Iriagbonse Inyang1 1Department of Physical Sciences, Faculty of Science, Benson Idahosa University, P.M.B 1100, GRA, Benin City, Edo State, Nigeria. Authors’ contributions This work was carried out in collaboration between all authors. Author MSUO designed the study, performed the statistical analysis, wrote the protocol, and wrote the first draft of the manuscript. Authors OE and AII managed the analyses of the study. All authors managed the literature searches, read and approved the final manuscript. Article Information DOI: 10.9734/CJAST/2019/v32i630040 Editor(s): (1) Prof. Gregory J. Grigoropoulos, Ship and Marine Hydrodynamics at the School of Naval Architecture and Marine Engineering (SNAME) of the National Technical University of Athens (NTUA), Greece. (2) Dr. Aurora Angela Pisano, Solid and Structural Mechanics, University Mediterranea of Reggio Calabria, Italy. Reviewers: (1) Tutunea Mihaela, Babes-Bolyai University from Cluj-Napoca, Romania. (2) Dr. Jose Ramón Coz Fernández, University Complutense of Madrid, Spain. (3) Iroju Olaronke, Adeyemi College of Education, Nigeria. Complete Peer review History: http://www.sdiarticle3.com/review-history/46653 Received 25 October 2018 Accepted 08 February 2019 Original Research Article Published 25 February 2019 ABSTRACT Bot as it is popularly called is an inherent attributes of botnet tool. Botnet is a group of malicious tools acting as an entity. Furthermore, history has it that the aim of what gave rise to botnet was the idea to simplify the method of message exchange within networking platform.
    [Show full text]
  • Cisco 2009 Midyear Security Report
    Cisco 2009 Midyear Security Report An update on global security threats and trends 1 Introduction 4 Online Security Risks 16 Vulnerabilities Cause for Concern: Technical Innovation and Trends The Weak Links in Social Networking of Online Criminals Malware: Conficker Combines Old Mac OS: Online Criminals Move Beyond Windows Cause for Concern: Criminal Sophistication and New Threats Cloud Computing: Protecting Data in the Cloud and Collaboration Prolific Spammers Caught and Indicted Productivity Applications: Targets of Cause for Optimism: Organizations Collaborate “Spamdexing”: SEO for Online Criminals Zero-Day Exploits to Shut Down Online Threats Financial Information Targeted by Top Alerts: January–June 2009 DNS Poisoning Web 2.0 Security: Filtering Dangerous Content Recent Social Engineering Spam Campaign: Swine Flu Conversations with a Botmaster 20 Data Loss and Compliance Botnets: The Rise — and Fall — of Data Loss Srizbi/Reactor Mailer Identity Theft The Takedown of Srizbi/Reactor Mailer Data Breaches Waledac: Storm 2.0 Insiders Battling the Botnets Web 2.0 Collaboration Quandaries and Mobile Device Threats: Text Message Scams Mobile Device Dilemmas U.S. Government: A New Administration, Compliance a New Focus on Cybersecurity HIPAA Gets HITECH The President’s Smart Phone “Addiction” New “Red Flags” Rules Technology: An Engine of U.S. Growth for the Securing Data Next “New Economy” Policies Geopolitical: Twitter Users Are Broadcasting the Revolution Economic Instability and Online Security 25 Conclusion and Recommendations Conclusion Security Community Making Strides Trends to Watch Spam to Return to Record High Levels More Attacks on Legitimate Websites Social Networking Attacks to Continue Recommendations Cisco Security Intelligence Operations All contents are Copyright © 2009 Cisco Systems, Inc.
    [Show full text]
  • Mcafee Threats Report: Second Quarter 2009 by Mcafee® Avert® Labs Report Mcafee Threats Report: Second Quarter 2009
    Report McAfee Threats Report: Second Quarter 2009 By McAfee® Avert® Labs Report McAfee Threats Report: Second Quarter 2009 Table of Contents Spam Bounces Back 3 New Zombies 4 New Zombies by Country 4 Spam by Country 5 Spam by Subject 6 Web Attacks Change Target 6 Coming From a Home Near You 9 Malware and PUPs 10 Web 2.0 and Twitter 11 Hacktivism Returns 14 Phishing 15 Malware: the Face of Cybercrime 16 Password-Stealing Trojans Grow Rapidly 16 Zeus 17 Crimeware as a Service 19 AutoRun Malware 21 About McAfee Avert Labs 24 About McAfee, Inc. 24 Report McAfee Threats Report: Second Quarter 2009 The McAfee Threats Report brings you the latest in statistics and analysis covering email- and web- based threats. This quarterly report has been created by the researchers at McAfee Avert Labs, whose worldwide staff provides a unique perspective of the threat landscape—ranging from consumers to enterprises, and from the United States to countries around the world. Join us now as we examine the leading security issues of the past three months. Once you’ve finished here, you can find more information at the McAfee Threat Center.1 You’ll also find our first-quarter Threats Report.2 In the second quarter of 2009, we saw spam production recover quickly from a recent setback and grow to record levels. Zombies, computers hijacked by spammers to send messages, also reached record numbers. We break down spam output by country and subject. On the web, malware on both legitimate and malicious sites continues to exploit browsers.
    [Show full text]
  • Les Attaques 2.0 Koobface Et Gumblar
    L’ACTUSÉCU 23 0-DAY, GUMBLAR, KOOBFACE, ANTI-SEC : QUAND LES PIRATES PASSENT A L'ACTION... SOMMAIRE Les meilleures conférences des dernières semaines à la loupe : BlackHat Amsterdam/USA et SSTIC 2009. Retour sur les attaques Gumblar, Koobface et Slowloris L’actualité du mois : Anti-Sec et vulnérabilité «0 day», patch Microsoft, PHPMyAdmin, Slowlaris, Safari local file access, Local root Linux, Trojan Skype... Les blogs, les logiciels et les extensions sécurité... Ce document est la propriété du cabinet XMCO Partners. Toute reproduction est strictement interdite. !!!!!!!!!!!!!!!!! [1] N°23 Tests d'intrusion Mise à l'épreuve de vos réseaux, systèmes et applications web par nos experts en intrusion SÉCU OWASP, OSSTMM, CCWAPSS Audit de sécurité L’ACTU L’ACTU Audit technique et organisationnel de la sécurité de votre Système d'Information Best Practices ISO 27001, PCI DSS, Sarbanes-Oxley Veille en vulnérabilités Suivi personnalisé des vulnérabilités et des correctifs affectant votre Système d'Information Réponse à intrusion Détection et diagnostic d'intrusion, collecte des preuves, étude des logs, autopsie de malware Vous êtes concerné par la sécurité informatique de votre entreprise ? Xmco Partners est un cabinet de conseil dont le métier est l'audit en sécurité informatique. À propos du cabinet Xmco Partners Fondé en 2002 par des experts en sécurité, dirigé par ses fondateurs, nous n'intervenons que sous forme de projets forfaitaires avec engagement de résultats. Les tests d'intrusion, les audits de sécurité, la veille en vulnérabilité constituent les axes majeurs de développement de notre cabinet. Parallèlement, nous intervenons auprès de Directions Générales dans le cadre de missions dʼaccompagnement de RSSI, dʼélaboration de schéma directeur ou encore de séminaires de sensibilisation auprès de plusieurs grands comptes français.
    [Show full text]