{"id":15054,"date":"2015-02-27T14:00:40","date_gmt":"2015-02-27T14:00:40","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=3670"},"modified":"2020-02-26T11:00:24","modified_gmt":"2020-02-26T16:00:24","slug":"non-impervious-cybercriminals-make-mistakes-too","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/non-impervious-cybercriminals-make-mistakes-too\/15054\/","title":{"rendered":"Non-Impervious: cybercriminals make mistakes too"},"content":{"rendered":"<p>APT  campaigns, cryptolockers pandemics, and banking Trojans running wild \u2013 they all  generate a lot of trouble for businesses and end-users alike, especially when  the \u201cfull picture\u201d is seen \u2013 when you see the number of infections,  the level of activity of different malware and\/or APT campaigns. There is one  important detail in this picture. However sophisticated, thoughtful, and  resourceful malware authors can be, they still make mistakes. Sometimes even comedic  ones.<\/p>\n<div class=\"pullquote\">Non-Impervious:  cybercriminals make mistakes too. #security<\/div>\n<p><strong>No perfect crime<\/strong><\/p>\n<p>In  mid-February, during the Kaspersky Security Analyst Summit in Cancun, Kris  McConkey of PricewaterhouseCoopers <a href=\"https:\/\/threatpost.com\/hackers-op-sec-failures-important-clues-to-uncover-apt-gangs\/111088\" target=\"_blank\" rel=\"noopener nofollow\">spoke<\/a> specifically on the mistakes that  cybercriminals make. They go to great lengths to throw researchers off their  scent, but just like in the \u201coffline\u201d crime world they make errors  and leave peculiar traces behind, making them look a bit silly, which makes the  cyberforensic experts happy.<\/p>\n<p><strong>Free Internet; why not use it?<\/strong><\/p>\n<p>For instance,  members of the notorious Comment Crew (APT1), one of the better-documented APT  groups, tied to Chinese Republic\u2019s People Liberation Army Unit 61398, worked at  the highest level of professionalism, and still got uncovered. Researchers at  Mandiant were able to identify the location of its operational headquarters,  malware resources, and the victims they were targeting. How? One of the major  pitfalls was the use of victim\u2019s infrastructure to access the attackers\u2019 personal  social media platforms.<\/p>\n<p>Yes, they  used the victims\u2019 internet access to login into their own social network  accounts.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/02\/06020303\/quadruple-1.png\" alt=\"quadruple\" width=\"492\" height=\"414\" class=\"aligncenter size-full wp-image-3673\"><\/p>\n<p>\u201cThis was a  big giveaway, and it\u2019s likely a result of their government policy,\u201d McConkey  said. \u201cTheir restricted Internet access made unfettered Internet even more  tempting.\u201d<\/p>\n<p><strong>I love my nickname<\/strong><\/p>\n<p>APT1  operators appear to have been \u2018married\u2019 to their online aliases. For instance,  one of the group members going under the handle UglyGorilla left this moniker  stamped all over malware, injection commands in websites, etc.<\/p>\n<p>A similar  story was told when Crowdstrike exposed the PutterPand gang in 2014. They used  personal addresses to register early command and control domains and one handle  in particular, cpyy, was used throughout the campaign. Researchers were able to  eventually link that handle to a Picasa account that was loaded with photos of  the hacker behind the handle, photos of the Unit 61398 office, and other data  pertinent to the investigation. Thank you, cpyy!<\/p>\n<p><strong>We are Wet Bandits!<\/strong><\/p>\n<p>Remember <em>Home Alone<\/em>, 1990 classic? While getting  arrested, two burglars proclaim themselves to be Wet Bandits since they flood  every house they have robbed. A police officer delightfully answers that now  they know every single place they have burglarized.<\/p>\n<p>Something  similar took place here. Though these APT groups learned a lesson and removed  these giveaways from sight.<\/p>\n<p>The  recently revealed APT The Equation also proved to be vulnerable to such  mistakes. According to Kaspersky Lab\u2019s Costin Raiu, one member of The Equation  group accidentally left the username used on the computer in the code of one of  the modules. This proved to be quite helpful.<\/p>\n<p><strong>Cryptoerrors<\/strong><\/p>\n<p>One of the  major cybersecurity headaches today \u2013 encrypting ransomware which often goes  under the common name \u2018cryptolockers\u2019 \u2013 <a href=\"https:\/\/www.kaspersky.com\/blog\/ransomware-outbreak\/\" target=\"_blank\" rel=\"noopener nofollow\">is prone to mistakes as well.<\/a><\/p>\n<p>While they  may use extremely strong encryption, mistakes and imperfections in the code  make them likely to be deciphered by third-party antimalware utilities.  However, without these errors, breaking cryptos is next to impossible: a  2048-bit RSA key used by the later strains of cryptolockers effectively  prohibits any kind of bruteforcing. The only way is to get a grab on their  infrastructure, which is what happened with Gameover ZeuS botnet. But now  criminals behind such ransomware increasingly use Tor to stay anonymous and  conceal their C&amp;C servers.<\/p>\n<p>More on  ransomware is available <a href=\"https:\/\/business.kaspersky.com\/ten-facts-about-ransomware\/3400\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<p><strong>Errare humanum est<\/strong><\/p>\n<p>The ancient  Latin proverb remains true for any kind of software. It\u2019s<a href=\"https:\/\/business.kaspersky.com\/can-we-beat-software-vulnerabilities\/2425\" target=\"_blank\" rel=\"noopener nofollow\"> errors in legitimate software\u2019s  code<\/a> that allow the  large part of malware to be effective, but the mistakes the humans make \u2013 such  as opening the malicious attachments from the e-mail \u2013 contribute a lot to it.  Ironically, it is coding mistakes and human behavioral errors that make the  malware and APT gangs pervious to the efforts of antimalware researchers and  fighters.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals go at great lengths to throw researchers off their scent, but just like in the &#8220;offline&#8221; crime world they make errors and leave peculiar traces behind, making them look a bit silly, while the cyber-forensic experts get happy.<\/p>\n","protected":false},"author":209,"featured_media":15733,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[499,2292,648,2288,36,4209],"class_list":{"0":"post-15054","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-apt","10":"tag-apt1","11":"tag-cryptolocker","12":"tag-equationapt","13":"tag-malware-2","14":"tag-sas-2015"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/non-impervious-cybercriminals-make-mistakes-too\/15054\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/non-impervious-cybercriminals-make-mistakes-too\/15054\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/non-impervious-cybercriminals-make-mistakes-too\/15054\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/apt\/","name":"APT"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15054","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15054"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15054\/revisions"}],"predecessor-version":[{"id":33472,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15054\/revisions\/33472"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15733"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15054"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15054"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}