PINPOINTING TARGETS: Exploiting Web Analytics to Ensnare Victims

PINPOINTING TARGETS: Exploiting Web Analytics to Ensnare Victims

SPECIAL REPORT FIREEYE THREAT INTELLIGENCE PINPOINTING TARGETS: Exploiting Web Analytics to Ensnare Victims NOVEMBER 2015 SECURITY REIMAGINED SPECIAL REPORT Pinpointing Targets: Exploiting Web Analytics to Ensnare Victims CONTENTS FIREEYE THREAT INTELLIGENCE Jonathan Wrolstad Barry Vengerik Introduction 3 Key Findings 4 The Operation 5 WITCHCOVEN in Action – Profiling Computers and Tracking Users 6 A Means to a Sinister End? 8 Assembling the Pieces 9 Finding a Needle in a Pile of Needles 11 Employ the Data to Deliver Malware 13 Effective, Efficient and Stealthy 15 Likely Intended Targets: Government Officials and Executives in the U.S. and Europe 18 Focus on Eastern Europe and Russian Organizations 18 Similar Reporting 19 Collateral Damage: Snaring Unintended Victims 19 Mitigation 21 Appendix: Technical Details 22 2 SPECIAL REPORT Pinpointing Targets: Exploiting Web Analytics to Ensnare Victims INTRODUCTION The individuals behind this activity have amassed vast amounts of information on OVER web traffic and visitors to more than 100 websites—sites that the threat actors have selectively compromised to gain access to THE their collective audience. PAST we have identified suspected nation-state sponsored cyber actors engaged in a large-scale reconnaissance effort. This effort uses web analytics—the technologies to collect, analyze, and report data from the web—on compromised websites to passively collect information YEAR, from website visitors.1 The individuals behind this activity have amassed vast amounts of information on web traffic and visitors to over 100 websites—sites that the threat actors have selectively compromised to gain access to their collective audience. Web analytics is used every day in much the same way by advertisers, marketers and retailers for insight into the most effective ways to reach their customers and target audiences. This paper explores the dark side of web analytics by demonstrating how the same tools and methods that fuel effective content delivery and e-commerce can potentially allow malicious actors to identify and target victims with pinpoint precision. 1 Kaspersky Labs, Symantec and iSIGHT Partners have reported on campaigns similar, and possibly related to, the activity we describe in this report. 3 SPECIAL REPORT Pinpointing Targets: Exploiting Web Analytics to Ensnare Victims EVERY DAY, EACH OF US VISITS THE WEB AND NAVIGATES TO OUR FAVORITE SITES. We accept that organizations routinely track our online activity. Companies monitor our clicks to see what links we are drawn to and how much time we spend on a given page. Marketers track our demographic information to better understand us as customers. Advertising firms generate revenue through referrals as we start our journey on one website and click a sponsored link to another. Shopping sites use cookies so that the shirt we viewed on a shopping website weeks ago shows up in an advertisement on our favorite news website. Organizations also learn about our computer systems. Scripts working in the background identify the type of browser, operating system or mobile device we are using so that the website displays properly. However, few of us are aware that cyber threat actors may be using those same tools to identify and target their next victims. KEY FINDINGS Threat actors use web The perpetrators alter We believe the actors The operation is most analytics and open source specific websites to redirect analyze the collected data likely the work of threat tools to collect information visitors to a profiling script to identify unique users and actors aligned with a about desired victims and we call WITCHCOVEN. pair them with information government based on their computers to track, This script collects detailed about their computer the extensive collection profile, and possibly infect information about the user’s to later deploy exploits of data, the culprits’ them with targeted malware. computer and installs a tailored to their particular operational restraint, and persistent tracking tool, software and computer our assessment of their called a “supercookie,” which configuration. probable targets. becomes part of a unique "browser fingerprint" that can identify the user’s computer moving forward. 4 SPECIAL REPORT Pinpointing Targets: Exploiting Web Analytics to Ensnare Victims THE OPERATION eginning last year, we identified cyber When an unsuspecting user visits any of the actors integrating free, publicly available over 100 compromised websites, a small piece The following are Btools with custom scripts to monitor the of inserted code—embedded in the site’s HTML examples of some of the online activities of Internet users without their and invisible to casual visitors—quietly redirects web tools embedded knowledge,2 just as corporations track the online the user’s browser to a second compromised in the WITCHCOVEN activity of web users around the world. We website without the user’s knowledge. This code and the data they believe these cyber threat actors are building second website hosts the WITCHCOVEN collect: profiles of potential victims and learning about script,4 which uses profiling techniques to collect the vulnerabilities in users’ computers. These very technical information on the user’s computer. same technologies that marketing firms use to As of early November 2015, we identified a track their clients and ensure their websites work total of 14 websites hosting the WITCHCOVEN on different types of web browsers can help cyber profiling script. The “detect Office” threat actors better identify their victims and module from the tailor future infection attempts. Browser Exploitation We believe these cyber threat Framework,5 an open The cyber threat actors start by compromising source penetration large numbers of legitimate websites. The actors are building profiles of testing tool, determines websites are not randomly chosen targets of potential victims and learning the Microsoft Office opportunity, but specifically selected as part of about the vulnerabilities in version on a computer a tactic called a strategic web compromise.3 The users’ computers. by testing the browser’s attackers then modify the underlying HTML response to various code on the website’s home page (and often ActiveX objects. several subpages). This modification silently The script provides the perpetrators with data redirects visitors to a second website that has on certain applications installed on the user’s also been compromised to host a profiling script computer. WITCHCOVEN uses a number that we call WITCHCOVEN. WITCHCOVEN of open source web tools to retrieve this executes in the background without the user’s information such as the software version. These PluginDetect6 is a knowledge, capturing the visitor’s computer and web tools are freely available, and website JavaScript-based web browser configuration (see Figure 1 for more designers commonly use these (or similar) tools tool to detect the type detail) and placing a highly persistent tracking to enhance a users’ browsing experience. For and version of various cookie (a “supercookie”) on their computer. In all, example, a site may routinely collect information web-browser plugins, we identified over 100 compromised websites about the type and version of visitors’ web such as Java, Flash, redirecting visitors to more than a dozen browsers to ensure that the site content displays Reader, and Shockwave. WITCHCOVEN profiling servers. correctly for as many visitors as possible. 2 We detected a component of the process—the WITCHCOVEN profiling script—discussed later in the report. 3 A strategic web compromise (SWC), also known as a “watering hole” attack, is a method of passively ensnaring victims as opposed to conducting an active attack such as a spear-phishing campaign. In an SWC, threat actors place exploit code on legitimate websites they anticipate their desired victims will visit as part of their normal online activity. If a targeted user travels to the compromised website with a vulnerable computer, malware can be installed on their machine. 4 Technical details on the WITCHCOVEN profiling script are available in the appendix. 5 https://github.com/beefproject/beef/tree/master/modules/browser/detect_office 6 http://www.pinlady.net/PluginDetect/ 5 SPECIAL REPORT Pinpointing Targets: Exploiting Web Analytics to Ensnare Victims WITCHCOVEN IN ACTION – PROFILING COMPUTERS AND TRACKING USERS A person browsing the web visits one of the more than 100 websites with malicious code placed there by the threat actors 1 Legitimate—but compromised—websites contain a script redirecting visitors to another website 2 The WITCHCOVEN script profiles the computer, places a supercookie, and reads the browser fingerprint 3 The threat actors collect the data from the WITCHCOVEN script and browser fingerprint and have several options for follow-on activity 4 Figure 1 Strategic web compromise redirecting to WITCHCOVEN profiling script 6 SPECIAL REPORT Pinpointing Targets: Exploiting Web Analytics to Ensnare Victims In addition to collecting data about installed applications, browser plugins For these reasons, evercookies may be referred and their versions, the WITCHCOVEN script uses another open source tool to as “supercookies” (because they use a broad known as “evercookie”. evercookie is designed to create “extremely persistent range of storage mechanisms) or “zombie cookies” cookies” on a user’s computer by: (because they may be recreated after deletion). In short, the evercookie provides a way to consistently identify and

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    23 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us