Shadow Brokers’ latest leak could have come from beyond NSA staging servers

Chris Bing Jan 10, 2017 | CyberScoop

https://www.cyberscoop.com/shadow-brokers-nsa-microsoft-windows-exploits-2017/

A mysterious group that claims to have stolen tools once used by the NSA 
published material Sunday to show it is in possession of Microsoft Windows 
software exploits. 

Screenshots of the alleged exploits in use, along with a comprehensive list of 
filenames and directories were  all shared by the enigmatic group the “Shadow 
Brokers,” in a new blog post. Beyond the supplementary evidence is a set of 
encrypted folders, each protected by a PGP key. The encrypted folders 
presumably hold the actual, functioning exploits Rendition Infosec founder Jake 
Williams told CyberScoop.

A meticulous inspection of the aforementioned filenames and directories 
provides some clues about where the hacking tools came from and when they were 
developed.

Cybersecurity experts tell CyberScoop the viewable evidence suggests the 
existence of advanced hacking tools, which could be used to exfiltrate data, 
destroy digital forensic evidence, attribute old cyberattacks and compromise 
numerous systems running older versions of Windows. The Shadow Brokers are 
supposedly selling the exploits for roughly $850,000 worth of bitcoin in total.

“These filenames and directories look familiar to me … Based on their [Shadow 
Brokers] past behavior, other things they’ve posted, I have no reason to be 
believe they don’t have them,” a former U.S. intelligence official told 
CyberScoop on the condition of anonymity.

Microsoft security teams are aware of the leaked exploits and have begun 
investigating the incident.

“[But] there’s not much for Microsoft to do until the files themselves are made 
public,” said Williams, a former  vulnerability analyst with the Defense 
Department.

“Microsoft has telemetry where they get crash reports that include data about 
what caused a crash. Given that the Shadow Brokers’ are indicating they have 
zero days for IIS [Internet Information Services for Windows Servers], RDP 
[Microsoft Remote Desktop] and SMB [Microsoft Server Message Block], teams are 
likely taking a hard look at crash reports for those services,” Williams said.

Among the trove of published file names and directories is reference to 
“DANDERSPRITZ,” a software tool used by attackers to obfuscate IP and MAC 
addresses. Documents previously revealed by former NSA contractor Edward 
Snowden show that DANDERSPRITZ was used by operators at the spy agency.

Leaked documents describing another plugin, named “EventLogEdit,” show it could 
be used to edit event logs, giving the attacker the ability to manipulate 
digital forensic evidence that would normally show anomalies after an 
intrusion, said Williams. 

“EventLogEdit” was likely developed and deployed by a well resourced and 
technically gifted adversary, like an intelligence service, described Michael 
Zeberlein, director of intelligence analysis with Area 1 Security.

“You can think of most of these exploits as basically offensive, intelligence 
gathering forensic tools; as [system administrator] internals that would help 
an operator get into the guts of a Windows system,” Zeberlein explained.

The use of specific, outdated terminology overlaying specific files, for 
example, and the presence of older versions of JavaScript implies that many of 
the referenced exploits were created prior to 2008, said Zeberlein.

Additionally, the listed files appear to have come from a source repository, he 
said, meaning the leak came from inside a closed environment, rather than on a 
staging attack server that once existed on the open internet.

“An external source would not have all the eggs in the same basket,” said 
Zeberlein, “none of the data is obfuscated to look non-malicious via 
encryption, packing, compression, or renamed to look like something benign to 
fool a victim … the organization of the folder structure is also similar to a 
source repository and there are clear development files in there such as 
optimized and compiled Python files that are not .EXE files.”

If a spy were to rely on these tools for an intelligence gathering operation 
then it should have been heavily audited to confuse the targets, Zeberlein told 
CyberScoop. The files, detailing what each exploit does, are laden with the 
“fingerprints” of its operators.

The new findings are significant because it counters a once prominent theory 
that the Shadow Brokers had stolen their material solely from poorly configured 
NSA staging servers. 

The ShadowBrokers first emerged on social media in August after dumping a trove 
of sophisticated, albeit also outdated, firewall exploits on Github. At the 
time, security experts told CyberScoop that these firewall exploits — a cohort 
of hacking tools designed to target vulnerabilities in Cisco, Fortinet and 
Juniper Networks products — were authentic and capable of penetrating systems. 
Because the source code for these firewall exploits was provided in a public 
forum, random hackers began using the tools themselves.

Sunday’s message from the Shadow Brokers differs from their original firewall 
exploit dump in August as it includes evidence of the tools without ever 
posting the operational code.

“The U.S. has significantly assisted the CNE [computer network exploitation] 
capabilities of our adversaries [by allowing] this leak of code,” said 
Zeberlein, “we respond with a pin-prick Persona non grata response to kick out 
Russian diplomats, whereas this action just Persona non grata’ed our entire 
SIGINT [signals intelligence] capability for cyber.”

“I think that the timing is likely retaliation for the ODNI report and a 
demonstration that they can hurt us more than we can hurt them,” Williams said, 
“it takes more than just listing tools to create good cyber attribution.”

_______________________________________________
Infowarrior mailing list
[email protected]
https://attrition.org/mailman/listinfo/infowarrior

Reply via email to