Doing Intelligence Right!

Intel Operator
3 min readMay 4, 2018

TL;DR — Insight and recommendations (Necurs & Op: GhostSecret)on threats in a small form factor (no one reads long posts anymore)

Greater awareness (foresight), provides enhanced analysis

Origin

Knowing the methods, sophistication and modus operandi of cybercriminals is fascinating! Especially when we can take actions, to detect and deny these threats. This is the first instalment in an ongoing series of short assessments (<5 min read). I’m enabling you to further assess your risk and be more equipped against cybercriminals.

The Felonious Actors

I will always focus on cybercriminals that have covered new, interesting or unique malicious activity. This month I’m focusing on two (short and sweet) primary cybercriminal operations.

  • Necurs botnet — Leverage internet shortcut or “.URL” files for bypassing detection.
  • Operation GhostSecret — Proliferate use of malicious implants, tools, and malware to persist in victim networks.
Develop your own intelligence repository

Distinguishing Threats

Information on its own may be of utility to the commander, but when related to other information about the operational environment and considered in the light of past experience, it gives rise to a new understanding of the information, which may be termed intelligence

There is real value in identifying adversary tools, techniques, procedures (TTPs). TTP’s are the threat actors’ intentions, actions and behaviours which in turn allows security teams to install improved security.

  • The Necurs botnet and malware spread by Necurs, is loosely (.ini files not defined in MITRE) leveraging the “scripting” technique. This attack technique is effective at subverting the human psyche.
  • Operation GhostSecret leverages the “Remote access tool” technique. This persistence, collection and exfiltration technique is effective if victims have inadequate host based defences.

Victimology

Necurs current targets seem to be “targets of opportunity” with no unique targeting profiles. Operation Ghost Secret modus operandi is targeting critical infrastructure, entertainment, finance, healthcare, and telecommunications. Collective intelligence suggests that imbeded sustained data exfiltration are the current focus for cybercriminals.

Actionable Intelligence

Most, if not all intelligence reporting provides information to make decisions. I will give you “the differentiator”. I have operated in both red and blue teams and these efficient recommendations (bite sized) will help you combat cybercriminals.

Necurs is changing it up!:

  • Track or block outgoing simple message block (SMB) connections to external services.

The Secret Ghost:

  • Threat intelligence (TI) teams create ja3 SSL signatures for indentifed operation — GhostSecret signatures (hashes for dynamic analysis provided by — trendmicro, malwarebytes and malware-traffic-analysis.net).
  • Said TI team, track internal and external network segments for ja3 signatures.
Wisdom is gained from experience, you cannot buy it

Life

  • 17+ years attacking and defending networks
  • Distinctive, reliable, trustworthy and honest.

Contact

If you have further questions about tools, techniques, processes or collected intelligence please contact me @grotezinfosec.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

Intel Operator
Intel Operator

No responses yet

Write a response