En La Mente de Un Hacker
En La Mente de Un Hacker
En La Mente de Un Hacker
INTRODUCTION:
THE EVOLVING THREAT LANDSCAPE.................................................................................... 1
1.0 CYBERTHREATS
1.1 BOTNETS........................................................................................................................ 2
1.2 CONSUMER TOOLS........................................................................................................ 5
1.3 DEFACEMENTS............................................................................................................... 8
1.4 EXPLOIT KITS................................................................................................................. 11
1.5 RANSOMWARE............................................................................................................... 13
1.6 TROJANS........................................................................................................................ 15
5.0 GLOSSARY..................................................................................................................... 39
INTRODUCTION:
The Evolving
Threat
Landscape
CHANGE IS ONE OF THE FEW CONSTANTS IN LIFE, AND
CYBERSECURITY IS NO EXCEPTION TO THIS RULE.
The threat landscape is as diverse as it is sophisticated, thanks largely to the fact that
the skills and tools behind launching cyberattacks have become commoditized. Dark web
marketplaces, the increased availability of online attack tools, open-source botnets …
they have all combined to provide cybercriminals with a plethora of user-friendly and highly
scalable attack vectors and services. As a result, hackers and cybercriminals have reached
a level of maturity and efficiency unsurpassed in the history of cyberwarfare, resulting in a
dramatic increase in attack frequency, complexity and size.
Although these threats constitute a clear and present danger to organizations worldwide,
knowledge is power. Radware’s Hacker’s Almanac assists security experts with
understanding the threat landscape and generating awareness about current tactics,
techniques and procedures used by today’s cybercriminals. It is divided into three sections
and covers common tools and tactics, threat actors and cybersecurity predictions.
Understanding these threats and techniques to mitigate them is the first step in preparing
your security team and implementing the correct policies and systems. Before securing
your network, be sure to conduct an audit of your organization’s network and understand
its vulnerabilities/weaknesses. Then leverage this almanac to study the threats posed
against your organization.
1.1 C Y B E R T H R E AT S
Botnets
These groups aim to infect as many IoT If you are a victim of a botnet attack, consult
devices as possible to build a massive with a DDoS expert, as botnet attacks can
botnet. With the expansion of IoT and the last for days and flood networks at over
lack of regulation surrounding these devices, 1Tbps. In most cases, victims will require a
it’s expected that this problem will worsen. cloud-based mitigation solution for volumetric
However, the victim is also the solution. Users attack protection that scrubs network traffic
who install IoT devices on their network should and allows only legitimate user traffic to pass,
ensure that they are updated and patched and so service is not interrupted.
have all unnecessary ports closed. If you are a
PAG E 2 R A D WA R E H AC K E R ’ S A L M A N AC
Between August and November 2017, security researchers analyzed 32 distinct spam campaigns
and found emails sent from almost 1.2 million distinct IP addresses in over 200 countries. Half of
the IP addresses were concentrated in three countries: India, Vietnam and Iran. Through the 2017
holiday season, researchers stopped an average of 47 million Necurs emails distributing Locky
and GlobeImposter ransomware per day. Necurs possesses a modular architecture enabling it
to remain agile and adapt to the distribution type or collaborate with other malware distributors.
There is speculation about a sophisticated kernel-mode rootkit feature that can disable firewalls
and security solutions. Necurs also uses domain generation algorithms to switch meeting points
between the bots and the C&C servers.
MIRAI
Mirai is a malware that turns network devices running Linux, such as IP cameras and DVRs, into
remotely controlled “bots” that can be used as part of large-scale botnet network attacks. The Mirai
botnet was first found in August 2016 and has since been used in some of the largest and most
disruptive DDoS attacks, including a September 2016 attack against computer security journalist
Brian Krebs’s website, an attack on French web host OVH and the October 2016 Dyn cyberattack.
In addition to generating traffic volumes in excess of 1Tbps, the Mirai botnet features a selection of
10 predefined attack vectors, some effectively taking down service providers’ and cloud scrubbers’
infrastructure by attacking their DDoS mitigation systems. These attack vectors include highly
sophisticated attacks such as GRE Floods, TCP STOMP and Water Torture attacks. Mirai also
highlights the challenges organizations face when it comes to visibility into the legitimacy of GRE
traffic or recursive DNS queries.
Devices were infected via Telnet Brute Force using a dictionary consisting of 61 default
manufacturer CLI credentials. Record-breaking DDoS traffic volumes were generated during the
PAG E 3 R A D WA R E H AC K E R ’ S A L M A N AC
attacks on Krebs and OVH in September 2016. In October 2016, a DNS Water Torture attack was
leveraged during the Dyn attack. Later that month, the Mirai source code was made public, leading
to numerous spinoffs being discovered.
The Mirai source code is now the basis for most botnets. Newer branches have adapted to scan
and exploit more IoT vulnerabilities. Mirai exposed the IoT security problem and paved the road
for new botnets that exclusively target IoT devices. It has given birth to vigilante botnets that try to
protect vulnerable devices (Hajime) or purge the internet of them (BrickerBot).
BRICKERBOT
Imagine a quick-pace bot attack designed to render the victim’s hardware from functioning.
Coined as a permanent denial-of-service (PDoS) attack, this form of cyberattack became
increasingly prevalent in 2017.
Authored by the hacker known as Janit0r, BrickerBot was the first autonomous PDoS botnet.
BrickerBot’s objective is to purge the internet of malicious IoT devices to prevent vulnerable
IoT devices from becoming part of a botnet. BrickerBot attacks via remote execution using a
destructive sequence — no malware is loaded onto the victim machine. It uses a network of
detection sensors, including bots and sentinels, and only attacks infected devices. No scanning
takes place, thereby not generating attention.
The Janit0r calls this project “Internet Chemotherapy.” BrickerBot was first discovered in April 2017
by Radware. Janit0r announced his “retirement” in November 2017 and published some of his
BrickerBot modules, including hundreds of vulnerabilities categorized by device, class and vendor.
Janit0r wrote several white papers on his Internet Chemotherapy project, describing the deplorable
state of the internet. During 2017, BrickerBot allegedly bricked millions of routers and affected
multiple ISPs across different geographies.
WIREX
WireX was a botnet that targeted mobile devices such as cellphones and tablets and was
uncovered in August 2017 when researchers observed its network traffic. The botnet was found
to have infected over 100,000 Android smartphones via hundreds of malicious apps found in
the Google Play™ store, many of which purported to be media/video players, ringtones or tools
for storage managers. These apps infected with the WireX malware were leveraged to conduct
massive DDoS attacks from those infected devices. Researchers estimated that the attacks
originated from more than 70,000 distinct IPs across 100 countries, primarily performing Layer 7
HTTP GET request attacks.
MODUS OPERANDI: Default credentials and known device exploits are primary ways to
compromise anything from a personal computer to an IoT device. Once compromised, the attacker
profits by leveraging the botnet for denial-of-service (DoS) attacks, ad fraud or cryptomining.
PAG E 4 R A D WA R E H AC K E R ’ S A L M A N AC
PREFERRED TARGETS: Currently, the preferred targets for bot herders are insecure cloud
servers, network switches and IoT devices.
1.2 C Y B E R T H R E AT S
Consumer
Tools
Often the justification for these projects is As some of the most commonly available
the intention to highlight potential risks to cyberattack tools, the risk of your organization
prevent infections or reduce damage. With being targeted by coin miners is high given
stressers, they claim that the services are the depth of these campaigns. If you are a
used to improve and test security products victim of a DoS attack, you are also likely
and to understand the attack behavior a victim of a botnet or a rented stresser
targeting their networks. service for which someone paid as little as
$8 per month. In addition, criminals will use
penetration-testing tools like Kali Linux to
discover and exploit network vulnerabilities,
so they can infect a system with RATs and
other malicious software.
PAG E 5 R A D WA R E H AC K E R ’ S A L M A N AC
COIN MINER
Coin miner is a term used to refer to cryptocurrency mining software. Although certain uses of
this software are legitimate, services such as CoinHive are used for malicious purposes. Typically,
cryptocurrency mining happens when a connected device verifies a digital transaction and adds
it to its respected ledger. Cryptojacking is the process of infecting an unauthorized device for
cryptomining purposes. Over the last year, this trend has erupted and overthrown ransomware.
Examples include ADB.miner, which targets Android devices, and Smominru, which spreads and
infects devices with a Monero miner via the EternalBlue exploit.
DEFCON.PRO
Defcon.pro is a stresser service that also offers API access, so others can run their own stresser
services. Packages range from $8 to $45 per month and offer unlimited attacks. They also offer a
$3 trial version for a 200-second attack.
Defcon.pro gained media attention in 2017 when researcher Derrick Farmer discovered the leaked
content of TrueStresser, and it was reported that TrueStresser had created a business out of
Defcon.pro’s API service. TrueStresser had 331 customers who all made upstream calls to Defcon.
pro servers. At the time, Defcon.pro had 7,700 customers and had launched 117,000 DDoS attacks
as of September 2017.
As of March 2018, Defcon.pro reported that it had 11,260 customers and had launched 2,107,817
attacks. The DDoS-as-a-service industry can be profitable for select services, especially for those
that are first to market and offer a new attack vector. Defcon.pro states that it has the capability of
launching 42 concurrent attacks from 17 servers and offers an 8–12Gbps DNS attack vector if the
network load is below 50%.
PAG E 6 R A D WA R E H AC K E R ’ S A L M A N AC
R AT
A remote administration Trojan (RAT) is a malicious payload delivered via an exploit kit. Once
infected with the RAT, an attacker can remotely connect to the device, control systems and
spread the infection. The attackers can use the device to send spam or launch DoS attacks as
well as install keyloggers to access personal information. RATs are often sold on forums and dark
web marketplaces but are also found for free on websites like GitHub.
K ALI LINUX
Kali Linux is a free and widely available operating system used by security professionals. As a result,
Kali Linux is often downloaded and abused by hackers to infect systems. Kali Linux is preloaded
with hundreds of tools classified by the following topics: information gathering, vulnerability analysis,
wireless attacks, web applications, exploitation tools, forensics tools, stress testing, sniffing and
spoofing, password attacks, maintaining access, reverse engineering, hardware hacking and
reporting tools. This operating system can run alone or on a live install, providing tools for users to
“test” network vulnerabilities. A rogue user with Kali Linux is a serious threat because criminals can
easily load Kali Linux onto a thumb drive to make the platform mobile. In recent years, Kali Linux
has been the operating system of choice for many hackers.
PAG E 7 R A D WA R E H AC K E R ’ S A L M A N AC
1.3 C Y B E R T H R E AT S
Defacements
These groups are typically unskilled, using If you think that you are the target of a
basic software to automate their attacks. defacement campaign, update and patch
When major websites are defaced, it is your system immediately and alert network
typically due to network operator negligence. administrators to look for malicious activity,
Web application firewalls are the best way as a hacker will typically add a page to your
to prevent these attacks, but updating domain. You can also monitor for such
content management systems or web attacks retroactively via social media.
services is also effective.
PAG E 8 R A D WA R E H AC K E R ’ S A L M A N AC
ERR0R SQUAD
Err0r SquaD is a group of Bangladeshi hackers that specializes in web application abuse. The
group is known to target content management systems and carry out large-scale defacement
campaigns to spread awareness of its messages. Attackers post YouTube videos on how to utilize
attack methods against their victims so others will join.
E L E C T R O N I C T H U N D E R B O LT T E A M
Electronic Thunderbolt Team is a group of hackers from the Middle East that specializes in deface-
ment campaigns related to political events such as OpIsrael. Members will often target a number of
small and unprotected sites to post a message related to their operation.
G I A N T’S-PS
Giant’s-PS is a group of hackers from an unknown location that currently targets Israeli businesses
and websites with defacement campaigns on behalf of the Palestinians. Its messages often contain
religious content and geopolitical events.
PAG E 9 R A D WA R E H AC K E R ’ S A L M A N AC
ANONPLUS
In 2011, AnonPlus was created with the purpose of becoming a social networking service
developed for Anonymous members. Shortly after its creation, AnonPlus was hacked by rival
groups and has since struggled to maintain a social presence and a secure IRC.
AnonPlus Italia is not affiliated with Anonymous Italia. This group has launched attacks against
government-related websites in Italy and the United States as well as financial institutions. Since
2018, AnonPlus Italia has been involved in political hacktivism against the Italian government. It
has also attacked the website of Milan and leaked personal data from the Florence Democratic
Party. The leak provoked an internal debate within the Anonymous collective since it contained
information of innocent citizens. After the data was posted on the AnonPlus IRC, the server was
taken offline.
Following the leak, AnonPlus’s main Twitter account, @AnonPlus_info, was suspended and the
group decided to stop using social networks entirely. In March 2018, members created their
own website. AnonPlus Italia announced its return with a new manifesto posted on its domains,
Anonplus.tk and Anonplus.rf.gd. It uses these domains to host information about recent attacks.
Its new IRC now resides at webchat.anonplus.cf.
Throughout April 2018, AnonPlus Italia claimed responsibility for defacing 21 websites, 20 of which
use the content management system Drupal. Drupal’s security team released a patch in March
2018 to prevent remote code executions, which allow attackers to execute arbitrary code on
unpatched servers as a result of an issue affecting multiple subsystems with default or common
module configurations. A remote attacker can construct a request with malicious content to exploit
the vulnerability. A successful exploitation may lead to remote code injection on a Drupal server.
PREFERRED TARGETS: Nearly any website can be targeted by a hacktivist. Attackers will
often use a defacement to spread a political message. They will often look for the most popular
accessible website(s) to gain as much notoriety as possible.
PAG E 10 R A D WA R E H AC K E R ’ S A L M A N AC
1.4 C Y B E R T H R E AT S
Exploit
Kits
These tools can target nearly everyone. are browser based and exploit vulnerabilities
Organizations should consider themselves a once an employee visits the malicious landing
daily target for possible exploit kits designed page. Training and preparation start with user
to deliver malicious payloads onto their education. Humans are the weakest link,
network. To prevent this, update network and authors of exploit kits target the masses
devices and ensure that all employee devices in the hope that someone will fall for their
are also updated. Often times, these attacks landing pages. P A G E 11 R A D W A R E H A C K E R ’ S A L M A N A C
MAGNITUDE E XPLOIT KIT
Magnitude is an exploit kit that contains a variety of exploits and payloads, gaining fame when
it was used in the PHP.net, WordPress and Yahoo attacks. Once infected by the exploit kit,
Magnitude allows remote access to the attacker to download payloads such as Zeus, Andromeda
and Necurs. Today it is generally used to infect victims and download ransomware payloads,
generating an estimated thousands of dollars per week for its authors. Magnitude uses a pay-per-
campaign model and requires users to generate the traffic to the landing page containing the kit.
MODUS OPERANDI: An exploit kit is prepackaged malware that is found and traditionally
distributed from a compromised website. Once infected, the attacker can capture credentials
or malware like ransomware or a cryptominer.
P A G E 12 R A D W A R E H A C K E R ’ S A L M A N A C
PREFERRED TARGETS: The target for exploit kits is typically an end user’s browser. More
advanced spear-phishing pages can be used to target corporations.
1.5 C Y B E R T H R E AT S
Ransomware
Only in certain cases have keys been Ransomware campaigns follow a standard
recovered. Over the years, Radware pattern of increased activity in the beginning
researchers have also followed the before settling down. Ransomware, once
ransomware-as-a-service (RaaS) industry, incredibly popular, has fallen out of favor with
which offers novice users the ability to launch attackers, who now prefer cryptojacking
their own campaigns for an established price campaigns. Because of the amount of
or percentage of the profit. Ransomware has attention that ransomware campaigns
existed for over two decades but has only generate, most groups target a wide range of
recently gained popularity among for-profit industries, including manufacturing, retail and
criminals. This trend has tapered off because shipping, in the hope of finding some success.
ransomware campaigns generate a great
P A G E 13 R A D W A R E H A C K E R ’ S A L M A N A C
deal of attention, notifying potential victims If you think that your organization could be a
and thereby discouraging them from paying. target of a ransomware campaign, shoring up
Campaigns that attract less attention are your network is critical. Ransomware can be
typically more profitable. delivered in various ways, most commonly via
spam/phishing emails containing a malicious
document. Other forms of infection include
exploit kits, Trojans and the use of exploits to
gain unauthorized access to an infected device.
WA N N AC RY
WannaCry was one of the more famous ransomware campaigns in recent years and was tracked
back to North Korean programmer Park Jin Hyok, a member of the Lazarus Group. The campaign
affected over 200,000 victims and infected over 300,000 computers across 150 countries with total
damages approaching $1 billion. In terms of monetization, the campaign was considered a failure
with a low profit margin for the operator. WannaCry leveraged the recently disclosed EternalBlue
malware from the Shadow Brokers’ NSA dump.
N O T P E T YA
NotPetya was another famous ransomware campaign attributed to the Russian government.
This attack originated from a malicious software update from MeDoc, a popular accounting and
workflow software solution from Ukraine. The attack infected more than 200,000 computers and
caused over $1 billion in damage. However, several issues did arise during the campaign. The
email provider eventually shut down the extortionist account, making it impossible to communicate
with the attacker. After further research, it was determined that NotPetya was not ransomware but
rather a campaign designed to wipe infected computers.
SAMSAM
SamSam, one of the more profitable campaigns and groups in the ransomware arena, has earned
the attackers over $1 million. Although most ransomware campaigns and groups are random and
opportunistic with their attacks, the SamSam operators selectively targeted victims that were primarily
in healthcare, education and government verticals because they were identified as probable payers.
LOCK Y
Locky is a ransomware variant that appeared in 2016 as part of a phishing campaign containing a
malicious Word document that would download the encryption Trojan. The Necurs botnet typically
sent out these phishing emails. Over the years, the authors behind Locky have released several
P A G E 14 R A D W A R E H A C K E R ’ S A L M A N A C
MODUS OPERANDI: Ransomware typically spreads via phishing emails sent out from a spam
botnet. Variants can also be spread via drive-by downloads.
Trojans
An attacker can perform various criminal If you think that you are a target of this attack
tasks, including, but not limited to, vector, secure both your corporate network
“zombifying” the machine within a botnet and user devices. Proper education and
or DDoS attack, data theft, downloading user hygiene help prevent an employee from
or installing additional malware, file infecting your network. Often an employee
modification or deletion, keylogging, opens a malicious document via phishing or
monitoring the user’s screen, crashing the infects via a drive-by download, allowing the
computer and anonymous internet viewing. Trojan to download malicious payloads.
P A G E 15 R A D W A R E H A C K E R ’ S A L M A N A C
TINYLOADER
TinyLoader is an infamous backdoor malware used to deliver point-of-sale and banking Trojans.
The malware’s name originates from its size, which is typically only a few kilobytes. Once infected
with TinyLoader, it downloads and installs other malicious programs, such as AbaddonPOS.
ZEUS
Zeus is a well-known Trojan horse that steals financial information from a user’s browser using
man-in-the-browser keylogging and form grabbing. Additionally, Zeus installs a backdoor on the
infected machine to be used as part of a DDoS-purposed botnet.
Zeus was detected in 2007 when it was used to attack the U.S. Department of Transportation;
however, its widespread use began in March 2009. Attacks involving Zeus occurred throughout
2010, including an October 2010 attack attempt by an organized crime ring to steal over $70
million from American individuals with Zeus-infected computers. The FBI made over 90 arrests of
suspected members in the United States, and others were arrested in the United Kingdom and
Ukraine in connection with this ring.
In May 2011, the source code for version 2 of Zeus was leaked, leading to various customized
Zeus-based bots. Some of the more advanced custom bots based on the leaked code (such
as Ice IX) attempted to fix the existing issues with Zeus, resulting in harder detection. However,
security researchers have discovered that even the most well-known custom versions are similar
to the original Zeus source code, and thus are not significantly more innovative or dangerous.
EMOTET
Emotet is a piece of malware that targets the banking industry. Once a system is infected, Emotet
installs other banking malware for bank account information theft and modules for launching DoS
attacks. Infections typically originate from users opening malicious documents containing infected
download links and PDFs with embedded files. Emotet also includes a spreader to propagate
throughout a network. Some of its more notable campaigns include Pinkslipbot and Dridex.
P A G E 16 R A D W A R E H A C K E R ’ S A L M A N A C
KOV TER
Kovter is malware designed to target network devices to commit ad fraud and is one of the most
commonly updated malware families. This click-fraud Trojan spreads via spam attachments and
malvertising campaigns, but once it delivered ransomware as well. These attachments, when
opened, contain malicious documents such as infected office files. Kovter is known as “fileless”
malware, meaning that it targets a victim’s registry keys without storing itself on a victim’s hard drive.
MODUS OPERANDI: Typically, Trojan malware is packed inside a legitimate software program and
spread to the victim via social engineering attacks, such as phishing and drive-by downloads, for
future use in DDoS, keylogging, data theft or exfiltration or for downloading other malware.
PREFERRED TARGETS: Like exploit kits, Trojans target the end user’s devices. More advanced
Trojans, such as Emotet and Trickbot, use spear-phishing emails with a financial lure to target the
financial industry.
P A G E 17 R A D W A R E H A C K E R ’ S A L M A N A C
2.1 T H R E AT A C T O R S
A dvanced
Persistent
Threat
ADVANCED PERSISTENT THREAT (APT) IS A COMMONLY USED TERM TO
DESCRIBE A CYBERTHREAT POSED BY THOSE WHOSE OBJECTIVES INCLUDE
ESPIONAGE AND SUBVERSION FOR FINANCIAL OR POLITICAL MOTIVES.
These groups are often backed by If you think that you are a target of an APT
governments possessing a variety of group, take every necessary measure to
techniques and skills at their disposal with secure your network. Often the first step in
the ability to develop more advanced tools. preventing an attack like this is employee
Operators with specific objectives require training. Your employees are the weakest
a high degree of covertness to maintain a link. Training them how to spot phishing and
foothold in the network for long durations. spear-phishing attempts can help prevent
Using various intelligence-gathering future attacks.
techniques and exploits, this troop can
access and live-monitor sensitive data on
a targeted network.
E Q U AT I O N G R O U P | U N I T E D S TAT E S
The Equation Group is a cyberwarfare and intelligence-gathering unit associated with the Tailored
Access Operations (TAO) of the National Security Agency (NSA). This nation-state group has been
in operation since 1998, monitoring and infiltrating enemies of the United States, both foreign and
domestic. As one of the largest components of the NSA’s signal intelligence program, this group
has the ability to compromise commonly used hardware such as routers, switches and firewalls.
In 2016, the hacking group The Shadow Brokers announced that they had compromised Equation
Group’s tool set containing undisclosed exploits and posted them to GitHub. Exploits contained
in the publication included EternalBlue, which served as the basis of the WannaCry attack by the
Lazarus Group.
P A G E 19 R A D W A R E H A C K E R ’ S A L M A N A C
APT1 | CHINA
APT1, also known as Unit 61398 and The Comment Group, is a cyberwarfare organization
associated with the Chinese People’s Liberation Army. This nation-state group has been known to
be operating since 2006 and has been attributed to a number of attacks, including the indictment
of five members for stealing intellectual property and information from U.S. corporations. This
government-backed group focuses on stealing trade secrets and confidential information from
corporations across every vertical, with emphasis on manufacturing, engineering and electronics.
They accomplish this with spear-phishing attacks, malware and password dumping to gain future
access and exfiltrate targeted data.
PREFERRED TARGETS: Nation-state actors typically target the public sector, utilities and critical
infrastructure. They look for any data that will benefit their country’s economy and strengthen both
key business and military strategies.
PAG E 2 0 R A D WA R E H AC K E R ’ S A L M A N AC
2.2 T H R E AT A C T O R S
Denial-
of-Service
Groups
DOS ATTACKS ARE CYBERATTACKS DESIGNED TO RENDER A COMPUTER
OR NETWORK SERVICE UNAVAILABLE TO ITS USERS. A STANDARD DOS
ATTACK IS WHEN AN ATTACKER UTILIZES A SINGLE MACHINE TO
LAUNCH AN ATTACK TO EXHAUST THE RESOURCES OF ANOTHER
MACHINE. A DDOS ATTACK USES MULTIPLE MACHINES TO EXHAUST
THE RESOURCES OF A SINGLE MACHINE.
DoS attacks have been around for some If a denial-of-service group is targeting your
time, but only recently has there been an organization, ensure that your network is
emergence of denial-of-service groups that prepared to face an array of attack vectors
have constructed large botnets to target ranging from saturation floods to Burst
massive organizations for profit or fame. attacks designed to overwhelm mitigation
These groups often utilize their own stresser devices. Hybrid DDoS mitigation capabilities
services and amplification methods to launch that combine on-premise and cloud-based
massive volumetric attacks, but they have volumetric protection for real-time DDoS
also been known to make botnets available mitigation are recommended. This requires
for rent via the darknet. the ability to efficiently identify and block
anomalies that strike your network while
not adversely affecting legitimate traffic. An
PAG E 21 R A D WA R E H AC K E R ’ S A L M A N AC
LIZARD SQUAD
Lizard Squad was active from 2014 to 2016 and gained notoriety for attacks against gaming
networks such as PlayStation and Xbox Live on Christmas Day 2014. In 2016, several copycat
RDoS groups attempted to impersonate Lizard Squad and sent out ransom emails demanding
payment. Lizard Squad never conducted extortion campaigns because it ran successful stresser
services that made a substantial profit, such as Lizard Stresser and Shenron. Members often used
these stressers to launch attacks to advertise their services. AppleJ4ck, a Lizard Squad member,
made close to $1.2 million selling DDoS attacks before his arrest.
MODUS OPERANDI: Threat actors typically leverage botnets and attack scripts. The preferred
attack vector is one that allows spoofing or amplification. Spoofing will allow for any additional
layers of security, while amplification will produce more bandwidth and mask the origin of the
attack. Recently, combing volumetric, botnet-based attacks in combination with bursting or pulsing
waves of bandwidth proved successful.
PREFERRED TARGETS: Those that conduct DDoS attacks outside of extortion tend to be
activists. Their targets include governments, corporations and anyone else with an opposing
political or moral view. A DDoS attack is used to silence or embarrass their targets.
2.3 T H R E AT A C T O R S
Hacktivists
These groups attack anyone who they think If your organization thinks that it is the
is directly involved in the protested event. target of a hacktivist, prepare your network
They believe inaction is action against their accordingly based on the aforementioned
cause. Those that do not join the cause are attributes. Most attacks are annual and
also considered enemies. These hackers also announced publicly days before the
target the innocent to make a political point operation. Make sure that all networks are
and mainly utilize basic GUI-based tools or updated and patched. Inform employees
those found within typical penetration testing of possible increases in malicious emails
systems. These attackers may download seeking to compromise your network.
PAG E 2 3 R A D WA R E H AC K E R ’ S A L M A N AC
basic Python code to automate basic DDoS Secure social media accounts and enforce
attack vectors, but they are largely unable to two-factor authentication where applicable.
conduct attacks solely and instead rely on In addition, monitor social media for specific
renting stressers and paying others to launch hashtags related to the event to provide
their own attacks. advanced notification.
M I LW0 R M
Little is known about milw0rm, which often conceals members’ identities to avoid prosecution.
This international hacking team is best known for penetrating the computers of India’s primary
nuclear research facility, Bhabha Atomic Research Centre (BARC) in Neyveli, on June 3, 1998.
The group conducted hacks for political reasons, including the largest mass hack at that time,
and inserted anti-nuclear weapons and peace messages on its websites. The group’s logo
featured the slogan “Putting the power back in the hands of the people.”
WIKILEAKS
WikiLeaks is an international nonprofit organization that publishes secret information, news leaks
and classified media provided by anonymous sources. Its website, initiated in 2006 in Iceland by
the organization Sunshine Press, claims a database of 10 million documents in the first 10 years
since its launch. Julian Assange, an Australian internet activist, is generally considered its founder,
editor-in-chief and director and has been hiding in the Embassy of Ecuador in London since 2012.
C H A O S C O M P U T E R C L U B (C C C)
The Chaos Computer Club (CCC) is Europe’s largest association of hackers with 7,700 registered
members. It is incorporated as an eingetragener Verein (registered association) in Germany,
with local chapters (called Erfa-Kreise) in various cities in Germany and other German-speaking
countries. Some chapters in Switzerland are organized in the independent sister association Chaos
Computer Club Schweiz.
The CCC describes itself as “a galactic community of life forms, independent of age, sex, race or
societal orientation, which strives across borders for freedom of information.” In general, the CCC
advocates for more transparency in government, freedom of information and the human right to
communicate. Supporting the principles of the hacker ethic, the club also fights for free universal
access to computers, technological infrastructure and the use of open-source software.
PAG E 2 4 R A D WA R E H AC K E R ’ S A L M A N AC
GROUP ANONYMOUS
Anonymous started in 2003 as a collection of amateurs striking websites for fun, but their
activities have taken a far larger, more sinister turn during the past decade. It is known as an
anti-establishment group of which targets have ranged from big businesses and governments
to websites that host questionable/unethical content. Anonymous swamps websites, tricks
targets into revealing details with “phishing” emails and uses computers to crack passwords.
This group vowed to destroy the online recruitment service of ISIS. It has already taken down
more than 1,000 terrorist websites in retaliation for the “jihadis’ war on free speech.” Members
come from all over the world, discussing operations in secret online chatrooms.
PAG E 2 5 R A D WA R E H AC K E R ’ S A L M A N AC
2.4 T H R E AT A C T O R S
Insiders
These types of employees might represent remove the employee from the property.
the most critical threat to your business due Look for unauthorized hardware that may
to the level of trust between employee and have been placed in your facilities. Items can
employer. Ensuring employee happiness include USB drives, rogue access points or
and motivation helps ensure them as one of network hardware that can be plugged into
your best defenses against cyberattacks and other devices.
data theft. If you believe your organization
is a target of an insider threat, contact the In addition to malicious actors, innocent
authorities immediately. If an employee is employees also present a threat. Sometimes
compromising your organization, move to employees accidently or maliciously leak
limit insider knowledge and access and data on social media.
PAG E 26 R A D WA R E H AC K E R ’ S A L M A N AC
OPPORTUNISTS
Opportunist insiders are generally law-abiding citizens who do not possess advanced knowledge
about network security or how to hack their employers. They only act when the moment arises and
steal digital goods for profit. They typically abuse their privileges or steal coworkers’ access to do so.
DISGRUNTLED EMPLOYEES
Disgruntled employees can often be a huge cybersecurity risk for an organization. When employees
perceive that their company has wronged them, it can serve as motivation to damage the company
or its superiors. Often these employees sit at their position for years collecting the information
needed to expose the company. The best way to deal with this threat is to prepare an emergency
plan to isolate any resulting black swan event.
CASH OUT
In a growing trend, some employees are not who they seem to be. They deliberately gain access
to positions in a corporation that allow them to aid the process of fraud against the organization’s
customers. These attackers often look to compromise or incentivize employees in the financial
industry who can assist in committing fraud.
ESPIONAGE
Corporate espionage, a premeditated theft attack and often one of the hardest to spot, involves
an employee who is employed by a specific company for the sole purpose of stealing data and
intellectual property.
MODUS OPERANDI: Insiders typically depart the organization with sensitive data. Other methods
include data or credential theft via phishing emails or USB/mobile devices left behind by an insider
as a lure/trap. Insiders can also deploy rogue access points to inspect corporate network traffic.
PAG E 2 7 R A D WA R E H AC K E R ’ S A L M A N AC
PREFERRED TARGETS: Employers, coworkers and direct supervisors are the main targets of an
insider threat.
2.5 T H R E AT A C T O R S
Organized
Cybercrime
targets include the executive class for with skimmers or networks via point-of-sales
extortion, as well as physical targets such systems with financial malware designed to
as point-of-sale systems and ATMs. harvest and steal credentials.
RTM
RTM is an organized cybercrime group, apparently active since 2015, which is known for its own
Trojan malware, RTM. The group targets user data on remote banking systems in Russia and
neighboring countries. The RTM Trojan is used to spy on victims, log user credentials and target
accounting software.
DARK HOTEL
Dark Hotel is a group popular for its spear-phishing campaigns, delivering malware to targets
staying at luxury hotels and business centers in Asia and the United States. Active since the early
2000s, the group is known to compromise a hotel’s WiFi, redirecting users to its phishing page for
collecting personal information/data.
CARBANAK
Carbanak, also known as Carbon Spider, is an organized cybercrime group notorious for its
eponymously named malware, Carbanak. The group targets financial institutions and is responsible
for stealing 1 billion euros from over 100 financial institutions globally. Carbanak’s tactics, techniques
and procedures support the shift in criminals targeting banking systems over end users and their
personal data.
FIN7
Fin7 is a financially motivated, organized cybercrime group, which is known for attacks against retail
and hospitality verticals. This group leverages point-of-sale malware to target its victims and has
been witnessed leveraging Carbanak malware for data exfiltration and providing remote access to
network systems.
PAG E 2 9 R A D WA R E H AC K E R ’ S A L M A N AC
M O R PH O/ W I L D N E U T R O N G R O U P
Wild Neutron Group is an organized cybercrime group that also goes by the name Jripbot or
Morpho. This group focuses on corporate espionage around the world, with particular effort in the
United States and Europe. Over the last decade, this group has conducted a number of operations
that leveraged attack vectors such as Water Hole attacks and exploit chaining using multiplatform
malware. In recent attacks, the group utilized stolen code signing certificates and gained attention
when it infected companies such as Apple, Microsoft and Twitter.
MODUS OPERANDI: Organized cybercriminals will use nearly any attack vector, from basic legacy
to advanced assaults. Most commonly, they deploy malware via phishing emails or compromised
websites. Some of the more advanced groups will deploy physical or digital skimmers on popular
e-commerce websites to capture credit card data without the victim’s knowledge.
PREFERRED TARGETS: Cybercriminals follow the money. They will target anyone from individual
users to large organizations. Similar to a mafia organization, cybercriminals extort small and
medium-sized businesses that are most vulnerable and due to their propensity to pay.
PAG E 3 0 R A D WA R E H AC K E R ’ S A L M A N AC
2.6 T H R E AT A C T O R S
Patriotic
Hackers
These attacks are typically in response to If you think that you are a target of patriotic
foreign aggression and can be retaliatory hackers, you should be concerned with
attacks by citizens or attacks launched advanced persistent threat groups as well.
by freelance hackers operating for a Patriotic groups are not typically backed
government. As a result, these attacks can by governments but possess government-
create problems for victims because they type cyberattack capabilities. Protecting
have to determine if the threat is from a your network and employees should be the
nation-state or rogue hackers. These groups highest priority. These attackers typically
will respond quickly and furiously to a political target low-hanging fruit (i.e., organizations
event, and resulting attacks can cause with vulnerable networks), which can cause
geopolitical turmoil because these actions maximum damage.
could be considered an act of war. PAG E 31 R A D WA R E H AC K E R ’ S A L M A N AC
SYRIAN ELECTRIC ARMY
The Syrian Electronic Army (SEA) is a group of computer hackers that first surfaced online in
2011 to support the government of Syrian President Bashar al-Assad. Using spamming, website
defacement, malware, phishing and DoS attacks, it has targeted political opposition groups,
Western news organizations, human rights groups and websites that are seemingly neutral to the
Syrian conflict. It has also hacked government websites in the Middle East and Europe, as well as
U.S. defense contractors. The SEA has been linked to a string of attacks focused mostly on news
organizations and technology companies. In addition to hacking the Associated Press Twitter
account, the group has been linked to attacks on ITV, The Onion, Outbrain, The New York Times,
the United States Marine Corp’s recruiting portal, Microsoft, eBay, Facebook, Forbes, The Sun,
The Sunday Times, The Independent, Time Out, NBC, The Daily Mail and Le Monde.
TA R H A N D I S H A N
Tarh Andishan (a Farsi translation meaning “innovators”) was created while Iran was still recovering
from the Stuxnet worm attack (created by the United States and Israel). With an estimated 20
members, many based in Tehran, Iran (along with multiple fringe members located globally), Tarh
Andishan demonstrates what a sophisticated hacker group is capable of. By using automated
wormlike propagation systems, backdoors and SQL injections, along with other advanced tactics,
this group has launched a large number of attacks on prominent agencies, government and military
systems, and private companies globally under what has been termed “Operation Cleaver.”
G U C C I F E R 2 .0
Guccifer 2.0 is the “lone hacker” who took credit for providing WikiLeaks with stolen emails from
the Democratic National Committee in 2016. Varying reports exist of Guccifer’s nationality; however,
apparently, the common belief is that he is an officer of Russia’s Main Intelligence Directorate.
PAG E 3 2 R A D WA R E H AC K E R ’ S A L M A N AC
THE JESTER/TH3J35T3R
The Jester is an unidentified computer vigilante who describes himself as a “grey hat” hacktivist. He
claims to be responsible for attacks on WikiLeaks, 4chan, Iranian President Mahmoud Ahmadinejad
and Islamist websites. He claims to be acting out of American patriotism. The Jester uses a DoS
tool known as “XerXeS,” which he claims to have developed. One of The Jester’s traits is to tweet
“TANGO DOWN” on Twitter whenever he purports to have successfully taken down a website. In
recent years, The Jester focuses on political issues within the United States.
MODUS OPERANDI: The primary methods of these groups range greatly from hacktivist abilities
to those posed by nation-state operators. In some cases, these actors could just be considered
political hacktivists, such as The Jester, who engage in DDoS attacks and defacements, whereas
actors such as Guccifer 2.0 and SEA use more advanced techniques, such as worming malware,
credential theft and data exfiltration.
PREFERRED TARGETS: Political hackers typically target government agencies but are known to
attack key figures and corporations associated with opposing political parties.
PAG E 3 3 R A D WA R E H AC K E R ’ S A L M A N AC
2.7 T H R E AT A C T O R S
Ransom
Denial
of Service
RANSOM DENIAL OF SERVICE (RDOS) IS A TYPE OF DISTRIBUTED DENIAL-
OF-SERVICE (DDOS) ATTACK MOTIVATED BY MONETARY GAIN. IN AN RDOS
ATTACK, THE PERPETRATORS SEND A LETTER THREATENING TO ATTACK
AN ORGANIZATION BY RENDERING ITS OPERATIONS OR CAPABILITIES
UNAVAILABLE UNLESS A RANSOM IS PAID BY A SPECIFIED DEADLINE.
ARMADA COLLECTIVE
The original Armada Collective surfaced in 2015, after the rise of DD4BC, with a series of attacks
focused on banks, e-commerce sites and hosting services in Russia, Thailand and Switzerland.
This group followed the same mission pattern as DD4BC by sending a ransom note to select
companies in a single industry, followed by a sample DDoS attack. If the ransom was not paid
in the allotted time, the group launched a persistent multivector DDoS attack campaign.
XMR
RDoS group XMR_Squad emerged in 2017. Its attacks targeted companies in Germany and the
United States, but were notably different from others. XMR_Squad has an official Twitter account
and a website, likely set up during its original campaign to garner recognition. The group also
changes currencies as its campaigns continue. The group began with euros, followed by bitcoins,
and now uses XMR. This group has also engaged victims by sending out threats via Twitter.
PHANTOM SQUAD
Another group of extortionists emerged in 2017 and leveraged the same name of the original,
notorious Phantom Squad from 2015. This new group began spamming ransom demands in
September 2017 to companies throughout Europe, Asia and the United States. The threat was
deemed fake because the group did not follow through with an attack.
MODUS OPERANDI: Typically, RDoS actors will send an extortion demand to their victim and
follow it with a sample attack to prove their competence. If the ransom is not paid, the attackers
PAG E 3 5 R A D WA R E H AC K E R ’ S A L M A N AC
PREFERRED TARGETS: Like organized cybercriminals, RDoS extortionists tend to target small
and medium-sized businesses that lack advanced DDoS detection and mitigation and are therefore
easier to extort.
3.0
Cybersecurity
Forecast
However, a large percentage of other attacks are carefully coordinated and planned responses
to events that organizations should be aware of in advance. By understanding cybercriminal
tactics, techniques and procedures, you can eliminate the fear of the unknown so prevalent
in cybersecurity.
DDOS
Denial-of-service campaigns vary in size and duration, but they often occur in parallel with specific
events. For example, network operators in the gaming industry can expect attacks and degradation
of services during gaming tournaments or product releases. Nations and regions can now expect
to face cyberattacks associated with political, economical, or social events that are opposed
for ideological reasons. For example, Israel faces a yearly campaign, OpIsrael, that is executed
annually April 7–14.
Organizations involved directly and indirectly with the hunting and shipping of sea life (whales and
dolphins) can expect to be targeted by OpKillingBay, an annual Anonymous operation, at the start
PAG E 3 6 R A D WA R E H AC K E R ’ S A L M A N AC
of the hunting season. Organizations associated with large sporting events will draw unwanted
cyber attention and should develop a pattern of auditing their systems ahead of events to prevent
large-scale service outages.
MALICIOUS BOTS
There are “good” bots, and there are “bad” bots. While most good bots are active daily, crawling
the internet for new content or gathering prices for consumers, bad bots typically follow a more
predictable pattern. If observed, this can assist network operators with preparing for malicious
activity. Scrapers that target the e-commerce industry typically increase activity between June
and August as bot herders become more competitive during the slower shopping months.
Holidays such as Black Friday, Cyber Monday and Valentine’s Day typically witness spikes in
bot activity related to denial of inventory, carding and ad fraud. The travel industry is no exception
either. It typically witnesses spikes in web scraping activity during September, but can also suffer
from inventory exhaustion, carding and ad fraud, in addition to rating and review spamming.
SOCIAL EVENTS
The threat of bots is not limited to just online marketplaces. Malicious activity can also be forecasted
based on social events. The crowds and target-rich environments created by high-profile events
can bring an elevated risk for sponsors and vendors. The Super Bowl, Olympics and World Cup
present a risk to organizers, partners, sponsors, suppliers, service providers and attendees.
Bot herders are aware of these events and the profit that can be generated by targeting them.
These bad actors also have been known to target social events, such as political elections. Typically,
these events are easy to forecast but difficult to pinpoint a starting point. Attacks typically include
DDoS assaults and web defacement aimed at censoring or distorting information. Social bots
can be used to manipulate voters. To maintain the integrity of an election, network operators and
governments need to recognize patterns so they prepare for spikes in cyber activity as an election
draws near.
PAG E 3 7 R A D WA R E H AC K E R ’ S A L M A N AC
4.0
Proactive
Measures
Cybersecurity is a proactive, not a retroactive, Third, get in front of the problem by knowing
industry. Today’s evolving threat landscape cybercriminals, the way they operate and
omits the luxury of a hurry-up-and-wait how they launch attacks. By understanding
strategy. To prepare for future threats, your network, its limitations and how hackers
organizations must work to get ahead of launch attacks, your organization can prepare
modern cybercriminals. Information security for attack vectors commonly leveraged by
requires a proactive team, which is constantly different threat groups.
researching the latest threats before criminals
Last, understanding your network and IT
have an opportunity to leverage the latest
infrastructure allows you to select the optimal
tactics, techniques and procedures against
DDoS solution for your organization. DDoS
its networks.
protection is not a one-size-fits-all menu,
Before researching the enemy and potential but rather it is an a la carte menu with many
attack vectors, understand your organization’s choices. Cybersecurity solutions come in
weaknesses. Ensuring regularly updated various deployment options and with different
hardware and consistently patched software capabilities, requiring each company to select
is the first step in the right direction. Second, the optimal solution that best fits its needs,
conduct major audits of your networks in threats and budget.
advance of potential conflicts. Some threats
PAG E 3 8 R A D WA R E H AC K E R ’ S A L M A N AC
are impossible to predict, but most have a To know more about today’s attack
motive. If you can prepare for an event that vectors, understand the business impact
may trigger an attack ahead of time, your of cyberattacks or learn more about
organization will be better positioned to emerging attack types and tools, visit
defend itself if/when an attack is launched. DDoSWarriors.com.
5.0
Glossary
servers will reply to the GET request and occurs due to the use of user-supplied input
forward an amplified response to the spoofed without proper validation. This can be as
IP address, the victim. The Memcached minimal as outputting the contents of the file,
bandwidth amplification factor can range but depending on the severity, it could lead to
between 10,000x and 51,000x. arbitrary code execution.
Social Engineering — A process of related to network congestion. However, since
psychological manipulation, more commonly a SYN-ACK packet never arrives for any of
known as human hacking. The goal is to the connection requests, the massive number
have the targeted victim divulge confidential of half-open connections quickly fills up the
information or give unauthorized access server’s TCB table before it can time out any
because the hacker has played off the victim’s of the connections. This process continues for
natural human emotion of wanting to help as long as the flood attack continues.
or support. Most of the time, the attacker’s
TCP Flood — One of the oldest, yet very
motives are to gather information for future
popular denial-of-service attacks, TCP Flood
cyberattacks, commit fraud or gain system
involves sending numerous SYN packets to
access for malicious activity.
the victim. In many cases, attackers will spoof
SQL Injection — This technique takes the SRC IP, so the reply (SYN-ACK packet)
advantage of poor application coding. When will not return, thus overwhelming the session/
the application inputs are not sanitized, they connection tables of the targeted server
become vulnerable. Attackers can modify or one of the network entities on the way
an application SQL query to gain access to (typically the firewall). Servers need to open
unauthorized data with administrator access, a state for each SYN packet that arrives, and
run remote commands on the server, drop or they store this state in tables that have limited
create objects in the database and more. size. As big as this table may be, it is easy
to send a sufficient amount of SYN packets
SSDP — An SSDP amplification attack sends
that will fill the table. Once this happens, the
spoofed packets containing the victim’s IP
server starts to drop new requests, including
address to a list of active universal plug-and-
legitimate ones. Similar effects can happen
play (UPnP) devices. The spoofed packet with
on a firewall that also has to process each
an ssdp:rootdevice or ssd:all sent to each
SYN packet. Unlike other TCP or application-
UPnP device on the list replies back with an
level attacks, the attacker does not have to
amplified answer to the victim’s machine that
use a real IP — which is perhaps the biggest
contains all the services on the device.
strength of the attack.
SYN — A SYN Flood overwhelms a target
UDP Flood — In a UDP Flood, the attacker
machine by sending thousands of connection
sends large UDP packets to a single
requests to it using spoofed IP addresses.
destination or to random ports. Since the UDP
This causes the target machine to attempt
protocol is “connectionless” and does not
to open a connection for each malicious
have any type of handshake mechanism, the
request and to subsequently wait for an ACK
main intention of a UDP Flood is to saturate
packet that never arrives. A server under a
the internet pipe. In most cases, the attackers
SYN Flood attack will continue to wait for a
PAG E 41 R A D WA R E H AC K E R ’ S A L M A N AC
© 2019 Radware Ltd. All rights reserved. The Radware products and solutions mentioned in this document
are protected by trademarks, patents and pending patent applications of Radware in the U.S. and other
countries. For more details, please see: https://www.radware.com/LegalNotice/. All other trademarks and
names are property of their respective owners.