DNS on fire

Wednesday 2 October 14:30 - 15:00, Green room

Warren Mercer (Cisco Talos)
Paul Rascagneres (Cisco Talos)



Cisco Talos identified malicious actors targeting the DNS protocol successfully for the past several years. In this presentation, we will present two threat actors we have been tracking.

The first one developed a piece of malware, named DNSpionage, targeting several government agencies in the Middle East, as well as an airline. During the research process for DNSpionage, we also discovered an effort to redirect DNSs from the targets and discovered some registered SSL certificates for them. We identified multiple countries targeted by this redirection. On 22 January 2019, the US DHS published a directive concerning this attack vector. We will present the timeline for these events and their technical details.

The second actor is behind the campaign we named 'Sea Turtle'. This actor is more advanced and more aggressive than the previous one. They do not hesitate to directly target registrars and one registry.

The talk will present the two actors and the methodology used to target the victims.

 

 Related links

 

Warren-Mercer-web.jpg

Warren Mercer

Warren Mercer joined Cisco Talos coming from a network security background, having previously worked for other vendors and the financial sector. Focusing on security research and threat intelligence, Warren finds himself in the deep, dark and dirty areas of the Internet and enjoys the thrill of the chase when it comes to tracking down new malware and the bad guys! Warren has spent time in various roles throughout his career, ranging from NOC engineer to leading teams of other passionate security engineers. Warren enjoys keeping up to speed with all the latest security trends, gadgets and gizmos; anything that makes his life easier in work helps!

@SecurityBeard

 

Paul-Rascagneres-web.jpg

Paul Rascagneres

Paul is a security researcher within Cisco Talos, Cisco's threat intelligence and research organization. As a researcher, he performs investigations to identify new threats and presents his findings as publications and at international security conferences throughout the world. He has been involved in security research for seven years, mainly focusing on malware analysis, malware hunting and more specially on Advanced Persistent Threat campaigns and rootkit capabilities. He previously worked for several incident response teams within the private and public sectors.

@r00tbsd


   Download slides    Read paper    Watch video

Back to VB2019 Programme page

Other VB2019 papers

Attribution is in the object: using RTF object dimensions to track APT phishing weaponizers

Michael Raggi (Proofpoint)
Ghareeb Saad (Anomali)

Static analysis methods for detection of Microsoft Office exploits

Chintan Shah (McAfee)

Kimsuky group: tracking the king of the spear-phishing

Jaeki Kim (Financial Security Institute)
Kyoung-Ju Kwak (Financial Security Institute)
Min-Chang Jang (Financial Security Institute)

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.