Agenda:
ISOI XXII
5-6 March 2020
Rome, Italy
Hosted by: World Food Programme

ISOI XXII
Thursday, 5 March 2020
08:00 - 09:00: Registration/Coffee

09:00 - 09:15: Greetings, Welcome to ISOI XXII!
- Fergie and Kate greets
- Special & Logistics announcements, etc.
- Evening plans, will also announce after end of day session.

09:15 - 10:00: Kate Gagnon (World Food Programme), "What the World
Food Programme does, how we do it, and how you can help"

10:00 - 10:45:  Peter Kruse (CSIS Security), "Package Muling as a
Service"

Whenever criminals are breaking into systems, they need to bring the
stolen goods around and into the hands of somebody willing to act as
a mule. Getting access to a bank account and circumventing 2FA is the
easy part of the job. Getting the money out and into the criminal's
account is more complicated. For this reason, money and package mules
are crucial for most finance-based crimes.

Our insight into the package and money muling business shows that
common money mules generally have a low level of education and
oftentimes are in financial need. Thus, they usually end up as the
lowest link in the criminal chain, even though they actually run the
highest risk of being caught by law enforcement. However, since they
are low-profile individuals, we often times see that money and
package mules are not being prioritized enough by law enforcement,
which leaves the supply chain intact and the criminals in business.

This presentation will give a rare insight into the "mule as a
service" business model, in which criminals provide their affiliates
with easy access to a web based service for managing and controlling
mules globally. The service provides everything from recruitment,
managing large number of mules, package and money tracking to trust
rating, etc.

What happens if we interrupt this supply chain instead of taking down
just another BOTnet? Hopefully, my talk will shed light on how well
package and money mules are being operated, and what impact, in
theory, going after this particular element of the criminal service
could have.

10:45 - 11:15: Break

11:15 - 12:00: John Bambenek (ThreatSTOP), "A Tool To Reliably
Classify a Domain's Maliciousness"

Machine learning is touted as a way for security teams to reduce
their workload by creating smart systems that can do the work of
analysts quickly so humans can focus on those things that truly
require human analysis. This talk will cover a new machine learning
tool called MalDomainML that uses a machine learning model produced
using extracted DNS features to reliably (over 96% accuracy) predict
whether an arbitrary domain is malicious.

Outline:
- Brief overview of machine learning - Discussion of adversarial
machine learning and attempts to manipulate automated models
- Using DNS features to inform machine learning models
- Introduction of MalDomainML: a tool to classify malicious domains
- Overview of research results in effectiveness
- Applying methodology to other classes of data


12:00 - 13:00: Lunch

13:00 - 13:45: Anthony Lauro (Akamai Technologies), "A look at
automated traffic generation for credential abuse and retail
inventory shopping automation"

Looking at traffic stats from the Akamai platform over the past 4
years has revealed the percentage of HTTP requests utilizing API’s
has increased to over 83% of Akamai’s overall web traffic volume by
hit count. We’ve also observed that in an analysis of credential
abuse campaigns, more than 75% of ATO and credential stuffing attacks
target API’s because of their inherent speed and the overall lack of
basic security hygiene practices.

Also take a look at how the configurations of these attack tools is
also closely tied to the API schema of the platform they are
attacking for maximum effectiveness.


13:45 - 14:30: Vitali  Kremez (SentinelLabs), "Hidden Link Between
TrickBot 'Anchor' & North Korea 'Lazarus' State Sponsored Group", or
"How North Korean Hackers are Working with Eastern European
Cybercriminals"

Discovery of One of the Most Sophisticated & Resourceful Botnet
Groups on Crimeware Landscape.

We identified a first-of-its-kind possible collaboration between
crimeware organization TrickBot and North Korean advanced persistent
threat (APT) group Lazarus. The TrickBot branch toolset, known as
"Anchor Project," represents the first known link between cybercrime
groups and APT actors. The research is evidence of "Anchor Project"
tools being used to deploy malware possibly associated with the North
Korean regime, a finding with significant national security
implications.

14:30 - 15:00: Break

15:00 - 15:45: Simon Conant (Palo Alto Networks, Unit 42), "Et tu,
[REDACTED]: A commodity RAT with an Italian flair"

With recent law enforcement action against several popular commodity
RATs, the marketplace has shifted to compensate. Turns out that the
author of the most popular commodity RAT on the market today hails
from just down the road...


15:45 - 16:30: Donald 'Mac' McCarthy (Open Source Context), "How
(hi)Jacked is BGP"

BGP Hijacking is a problem. But how big a problem? Using data
collected from July - December of 2019 we will slice up BGP hijacking
by the numbers. What ASNs are the worst offenders of BGP hijacking?
Which prefixes are the most hijacked? What infrastructure is tied to
the worst offenders? What infrastructure exists within the most
hijacked prefixes? On days where there are statistically significant
numbers of BGP events, do they correspond to major geopolitical
events? Defining the size and scope of a problem is a necessary part
of prescribing and evaluating mitigations and/or structural
changes.


16:30 - 17:15: Gabor Szappanos (Sophos), "50 shades of OSINT"

We are in asymmetric warfare, where the criminals can do anything
they want, while the hunters are tied by legal and ethical
constraints.

The IT security community is actively tracking criminals using a wide
selection of methods. These methods range from legally acceptable
information gathering methods to illegally exploiting the servers of
the criminals:

- Accessing data from open directories 
- Fetching data using information leakage of incorrectly administered
web panels
- Using the hard-coded access information from the malware samples
- Using vulnerabilities in the C&C panels to gain access the data
- Hacking the websites that host the C&C panel

The presentation will cover these methods, with examples observed in
the field. It is not done with the purpose of promoting the use of
any of the methods, rather documenting what is actually going on.
We’d be ignorant to not acknowledge what is happening in our field,
and irresponsible if we didn’t try to direct the efforts through the
appropriate channels.

A single researcher can extract a lot of information by analysing the
particular piece of malware. But in many cases can’t act on it
without breaking legal or ethical barriers. Using illegal methods for
gathering intel on threat actors is also counter-productive: the
information can’t be used to prosecute the criminals. Our final goal
should always be identifying the perpetrators and bring them to
justice.

To have success in this fight, a more organised effort is needed
where all pieces of the puzzle are brought together. Instead of going
for the more aggressive and less ethical methods, a different
approach is needed. We promote a model where all parties are brought
together: security researchers for providing the threat intel, ISPs
to shut down the malicious activities and law enforcement to legally
fetch the data and act on it.

17:15: Adjourn

19:00: ISOI Fun Night



Friday, 6 March 2020


08:00 - 09:00: Registration/Coffee

09:00 - 09:45: Krassimir T. Tzvetanov (Purdue University), "OPSEC for
investigators and researchers"

Whether performing an in-depth investigation or merely quick
research, the investigator (or researcher) and the investigation
itself are exposed to certain risks.

This talk focuses on security and safety issues pertaining to online
research and investigations. It covers different areas of the
investigative process and how tools and particular techniques can
leak information detrimental to the case or the investigator.

Furthermore, it goes deeper into how investigators and blue teams can
be profiled and targeted. Those can be either direct attack against
their computer or supporting infrastructure, their person or the
investigation, which in turn may be as subtle as steering it in the
wrong direction or making the evidence inadmissible in court.


09:45 - 10:30: Dan Heywood & James Shank (Team Cymru), "Emissaries
(Pandas) in the Middle East"

China's APT27 (aka Emissary Panda, TG-3390, BRONZE UNION, Iron Tiger,
LuckyMouse) is busy conducting operations targeting the Middle East.
These threat actors exhibited OpSec awareness, minimizing analysis
possibilities, but there is evidence showing communications with
victims in the energy, health care, technology, education, travel,
and government sectors.

Communications patterns used by APT27 threat actors leave
fingerprints for network forensics. Netflow shows an extensive
infrastructure that has evolved over time, including APT27 migrating
between hosting provider, changing network fingerprints of data
exfiltration, and changing certificates for VPN connections.

In December, the Iranian government issued a statement claiming they
had "foiled" an attack by "the well-known APT27" – but is this really
the case...?

This presentation will focus on highlighting various elements of the
ongoing APT27 campaign, including the threat actor's techniques, the
analytic processes used to track APT27, infrastructure in operation
by APT27, and techniques useful to detect possible compromises by
APT27.


10:30 - 11:00: Break

11:00 - 11:45: Alan Neveille (Symantec/Broadcom), "A look into the
recent activities of the DarkSeoul/Operation Troy/Stonefly attack
group"

In March 2013, three South Korean television stations and a bank
suffered an attack in a suspected act of cyberwarfare that coincided
with the 63rd anniversary of the Korean War. At the time, this attack
was attributed to North Korea and dubbed "DarkSeoul". These attacks
continued until 2015 and appeared to have ceased.. until now. This
presentation provides a walk-through of an investigation into the
recent activities of this attack group detailing a coordinated
espionage operation to steal nation-state secrets.


11:15 - 13:00: Lunch

13:00 - 13:45: Bartosz Kwitkowski (PREBYTES), "Please wait while I’m
transferring out your money" -- Automated and semi-automated fraud

Cybercriminals send spam without bothering about being spotted.
Message content and meaning does not matter so much because end-users
are enough "clicky" to infect system. If not the "invoice" then
"agreement" is the magic word opening doors. Bankers such as Danabot,
Trickbot, GozNym (ISFB) are tools to delivers malicious JS which is
used for real-time attacks against online banking users. The analysis
includes retrospection of different attacks and anti-detection
techniques used in the past years.

13:45 - 14:30: Glenn Deen (Comcast) and Ben April (Farsight
Security), "DoH!, DoT and EDDI - the Encrypted DNS Deployment
Initiative"

DoH and DoT have generated a lot of discussion and worry in the
inboxes of Internet engineers and places like the floor of the UK
Parliament. EDDI was created to fill a void in the discussion - a
place to talk about architectural, protocol, and operational issues
in deploying encrypted DNS and has garnered wide support ranging from
major ISPs in North America, UK and Europe to groups like the EFF.
Just what has got all these folks worried and what is EDDI doing to
help?   This talk will attempt to cut through the fear, uncertainty
and doubt around the coming Internet apocalypse.  Ok, that maybe a
bit over the top, but doing this right is important and we’ve got a
couple decades of engineers doing clever things with DNS to keep
working while adding encryption at scale to DNS.   This talk will get
into the details behind what’s going on and hopefully provide some
calming ahead of the apocalypse.

14:30 - 15:00: Break

15:00 - 15:45: Kaspars Osis (ESet), "Danbot Overview"

DanaBot is a modular trojan horse with multi-stage and
multi-component architecture, written in the Delphi language. In our
presentation, we will demonstrate how DanaBot evolved from a
relatively small threat with only a couple of victims to the
well-known malware it is today, affecting users all over the world.
We will also provide a technical look into DanaBotís architecture,
distribution methods and C&C server infrastructure and share the most
notable findings from our research.

We believe that DanaBot is authors provide their affiliates access to
the servers, compiled DanaBot binaries and tools. Each affiliate then
controls its own part of the botnet, runs its own DanaBot
distribution campaigns and uses a different set of webinjects that
usually target
some specific geographic region.

In the first section of our presentation we cover tools available to
the threat actors - DanaBot’s Control Panel application, plugins and
the configuration options.

In the 2nd part of our presentation we cover different DanaBot
campaigns that we have tracked over last 2 years. We take a closer
look at the most notable affiliates, distribution methods used by
them, and show webinject configurations from the actual campaigns
targeting, for example, Poland, Australia, and the USA.

In the final part of the presentation we share lessons we learned by
tracking DanaBot campaigns, release YARA rules and IDA scripts that
we have developed during our research, and provide suggestions on how
to avoid and detect DanaBot infections in your organization.

15:45 - 16:30: Will Peteroy (Gigamon), "Threat Intelligence: Looked
Better on the Sales Brochure"

We'll talk about the expectations and realities of threat
intelligence feeds, including a TLP:RED discussion on the relative
volume and performance of paid vs. free vs. trust-based indicators
and finish up with a conversation on how we can continue to make
threat intelligence
better.

16:30 - 17:15: Karl Perlman (CIP CORE and ENERGYSEC), "Facilitating
security controls for industrial control systems"

This session will focus on procedural and operational controls to
secure industrial controls. Access management, interactive remote
access, electronic controls and network monitoring will be discussed.
Engineering and information security principles will be identified.
Emerging technologies being used to enhance the protection of
industrial control systems will be identified.


17:15: Fergie: Closing Comments








Venue: Rome, Italy