SlideShare a Scribd company logo
1 of 21
Coinbase and the Firefox 0-day
About Me
I’m Philip Martin, the CISO at Coinbase
Ex-Palantir, Amazon, Sun and US Army
00 – Intro
01 – Attack Timeline and Overview
02 – Phase Deep Dives
Agenda
03 –Response and Lessons Learned
04 – Wrap Up & Questions
Phase 1
Recon
Attackers develop
~200 potential targets
they think are related
to cryptocurrency in
some way.
Phase 2
Weaponization
Attackers develop/acquire firefox
0-days, access to Cambridge
University accounts and build
implants
Phase 3
Delivery
Attackers conduct their phishing
campaign and target vetting,
eventually delivering exploit code
to ~5 individuals
Phase 4/5/6
Exploitation, Installation & C2
Attackers cause victims to visit a web page hosted
on the Cambridge domain which delivers the Firefox
0-days and triggers built-in shellcode to download a
phase 1 implant, which then conducts on-system
recon and downloads a phase 2 implant if directed
Phase 7
Actions on Target
Attackers attempt to target obvious credential
stores, & documents. (we know less about
attacker intentions here as we stopped the
intrusion within minutes of it landing on a
corporate system
12 May 2019 2 June 2019 17 June 2019 17 June 2019 17 June 2019
Phase 1
Recon
Attackers develop
~200 potential targets
they think are related
to cryptocurrency in
some way.
Phase 2
Weaponization
Attackers develop/acquire firefox
0-days, access to Cambridge
University accounts and build
implants
Phase 3
Delivery
Attackers conduct their phishing
campaign and target vetting,
eventually delivering exploit code
to ~5 individuals
Phase 4/5/6
Exploitation, Installation & C2
Attackers cause victims to visit a web page hosted
on the Cambridge domain which delivers the Firefox
0-days and triggers built-in shellcode to download a
phase 1 implant, which then conducts on-system
recon and downloads a phase 2 implant if directed
Phase 7
Actions on Target
Attackers attempt to target obvious credential
stores, & documents. (we know less about
attacker intentions here as we stopped the
intrusion within minutes of it landing on a
corporate system
12 May 2019 2 June 2019 17 June 2019 17 June 2019 17 June 2019
Phase 1
Recon
Attackers develop
~200 potential targets
they think are related
to cryptocurrency in
some way.
Phase 2
Weaponization
Attackers develop/acquire firefox
0-days, access to Cambridge
University accounts and build
implants
Phase 3
Delivery
Attackers conduct their phishing
campaign and target vetting,
eventually delivering exploit code
to ~5 individuals
Phase 4/5/6
Exploitation, Installation & C2
Attackers cause victims to visit a web page hosted
on the Cambridge domain which delivers the Firefox
0-days and triggers built-in shellcode to download a
phase 1 implant, which then conducts on-system
recon and downloads a phase 2 implant if directed
Phase 7
Actions on Target
Attackers attempt to target obvious credential
stores, & documents. (we know less about
attacker intentions here as we stopped the
intrusion within minutes of it landing on a
corporate system
12 May 2019 2 June 2019 17 June 2019 17 June 2019 17 June 2019
Phase 1
Recon
Attackers develop
~200 potential targets
they think are related
to cryptocurrency in
some way.
Phase 2
Weaponization
Attackers develop/acquire firefox
0-days, access to Cambridge
University accounts and build
implants
Phase 3
Delivery
Attackers conduct their phishing
campaign and target vetting,
eventually delivering exploit code
to ~5 individuals
Phase 4/5/6
Exploitation, Installation & C2
Attackers cause victims to visit a web page hosted
on the Cambridge domain which delivers the Firefox
0-days and triggers built-in shellcode to download a
phase 1 implant, which then conducts on-system
recon and downloads a phase 2 implant if directed
Phase 7
Actions on Target
Attackers attempt to target obvious credential
stores, & documents. (we know less about
attacker intentions here as we stopped the
intrusion within minutes of it landing on a
corporate system
12 May 2019 2 June 2019 17 June 2019 17 June 2019 17 June 2019
Phase 1
Recon
Attackers develop
~200 potential targets
they think are related
to cryptocurrency in
some way.
Phase 2
Weaponization
Attackers develop/acquire firefox
0-days, access to Cambridge
University accounts and build
implants
Phase 3
Delivery
Attackers conduct their phishing
campaign and target vetting,
eventually delivering exploit code
to ~5 individuals
Phase 4/5/6
Exploitation, Installation & C2
Attackers cause victims to visit a web page hosted
on the Cambridge domain which delivers the Firefox
0-days and triggers built-in shellcode to download a
phase 1 implant, which then conducts on-system
recon and downloads a phase 2 implant if directed
Phase 7
Actions on Target
Attackers attempt to target obvious credential
stores, & documents. (we know less about
attacker intentions here as we stopped the
intrusion within minutes of it landing on a
corporate system
12 May 2019 2 June 2019 17 June 2019 17 June 2019 17 June 2019
Phase 1
Recon
Attackers develop
~200 potential targets
they think are related
to cryptocurrency in
some way.
Phase 2
Weaponization
Attackers develop/acquire firefox
0-days, access to Cambridge
University accounts and build
implants
Phase 3
Delivery
Attackers conduct their phishing
campaign and target vetting,
eventually delivering exploit code
to ~5 individuals
Phase 4/5/6
Exploitation, Installation & C2
Attackers cause victims to visit a web page hosted
on the Cambridge domain which delivers the Firefox
0-days and triggers built-in shellcode to download a
phase 1 implant, which then conducts on-system
recon and downloads a phase 2 implant if directed
Phase 7
Actions on Target
Attackers attempt to target obvious credential
stores, & documents. (we know less about
attacker intentions here as we stopped the
intrusion within minutes of it landing on a
corporate system
12 May 2019 2 June 2019 17 June 2019 17 June 2019 17 June 2019
Phase 1
Recon
Attackers develop
~200 potential targets
they think are related
to cryptocurrency in
some way.
Phase 2
Weaponization
Attackers develop/acquire firefox
0-days, access to Cambridge
University accounts and build
implants
Phase 3
Delivery
Attackers conduct their phishing
campaign and target vetting,
eventually delivering exploit code
to ~5 individuals
Phase 4/5/6
Exploitation, Installation & C2
Attackers cause victims to visit a web page hosted
on the Cambridge domain which delivers the Firefox
0-days and triggers built-in shellcode to download a
phase 1 implant, which then conducts on-system
recon and downloads a phase 2 implant if directed
Phase 7
Actions on Target
Attackers attempt to target obvious credential
stores, & documents. (we know less about
attacker intentions here as we stopped the
intrusion within minutes of it landing on a
corporate system
12 May 2019 2 June 2019 17 June 2019 17 June 2019 17 June 2019
Phase 1
Recon
Attackers develop
~200 potential targets
they think are related
to cryptocurrency in
some way.
Phase 2
Weaponization
Attackers develop/acquire firefox
0-days, access to Cambridge
University accounts and build
implants
Phase 3
Delivery
Attackers conduct their phishing
campaign and target vetting,
eventually delivering exploit code
to ~5 individuals
Phase 4/5/6
Exploitation, Installation & C2
Attackers cause victims to visit a web page hosted
on the Cambridge domain which delivers the Firefox
0-days and triggers built-in shellcode to download a
phase 1 implant, which then conducts on-system
recon and downloads a phase 2 implant if directed
Phase 7
Actions on Target
Attackers attempt to target obvious credential
stores, & documents. (we know less about
attacker intentions here as we stopped the
intrusion within minutes of it landing on a
corporate system
12 May 2019 2 June 2019 17 June 2019 17 June 2019 17 June 2019
Attacker Info
Active since 2016 & not covered
by any TI firm we know
● The first indication of
activity we can find for this
group is around 2016.
● There is essentially no
english-language coverage
of this group
Likely the same actor that
breached CoinCheck
● Based on a report from
Japan’s Cyber Emergency
Center, there is significant
TTP overlap between our
attacker and the one they
describe.
Has dropped at least half a
dozen 0-day
● Reading the reporting, this
attacker has dropped
somewhere around 6 0-
days over the last 3 years.
● IMO one of the more
dangerous actors in crypto
Our Response / Lessons Learned
Visibility is king
● Our time to detect was fast
because we’re fanatical
about visibility and
coverage.
● We’re also fanatical about
alert quality. If the team
gets a page, they have to
know it’s legit.
Rapid response playbooks,
tabletops, practice, practice,
practice
● We had a 20 minute time to
containment because we
practice on a regular basis.
● If you can’t do it drunk at
3AM christmas morning,
you can’t do it
0-day is in your threat model (if
you’re in cryptocurrency)
● I hope this is not a surprise
to anyone here, but if you’re
defending a cryptocurrency
company this should drive
home to you that 0-day is
legitimately in your threat
model.
Any Questions?
(BTW, if this sounds like a fun set of challenges then I’ve probably got
an open role that you’d love… https://coinbase.com/careers)

More Related Content

Similar to [CB19] Coinbase and the Firefox 0-day by Philip Martin

Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...
Dalia Reda
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
Keshab Nath
 
What Are Script Kiddies.pdf
What Are Script Kiddies.pdfWhat Are Script Kiddies.pdf
What Are Script Kiddies.pdf
uzair
 

Similar to [CB19] Coinbase and the Firefox 0-day by Philip Martin (20)

Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
Cyber Threat 2019 NCSC-SANS London Conference - Mandiant Grab Bag of Attacker...
Cyber Threat 2019 NCSC-SANS London Conference - Mandiant Grab Bag of Attacker...Cyber Threat 2019 NCSC-SANS London Conference - Mandiant Grab Bag of Attacker...
Cyber Threat 2019 NCSC-SANS London Conference - Mandiant Grab Bag of Attacker...
 
Everything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeepEverything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeep
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.ppt
 
Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...
 
Presentation defend your company against cyber threats with security solutions
Presentation   defend your company against cyber threats with security solutionsPresentation   defend your company against cyber threats with security solutions
Presentation defend your company against cyber threats with security solutions
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
CS 1.ppt
CS 1.pptCS 1.ppt
CS 1.ppt
 
CS155 Computer Security at Stanford University
CS155 Computer Security at Stanford UniversityCS155 Computer Security at Stanford University
CS155 Computer Security at Stanford University
 
Issa jason dablow
Issa jason dablowIssa jason dablow
Issa jason dablow
 
What Are Script Kiddies.pdf
What Are Script Kiddies.pdfWhat Are Script Kiddies.pdf
What Are Script Kiddies.pdf
 
Internship brochure
Internship brochureInternship brochure
Internship brochure
 
IRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection MethodsIRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection Methods
 
Lessonplan-1.docx
Lessonplan-1.docxLessonplan-1.docx
Lessonplan-1.docx
 
IRJET- Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET-  	  Ethical Hacking Techniques and its Preventive Measures for NewbiesIRJET-  	  Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET- Ethical Hacking Techniques and its Preventive Measures for Newbies
 
Lessonplan-1 (1).docx
Lessonplan-1 (1).docxLessonplan-1 (1).docx
Lessonplan-1 (1).docx
 
Analysis of web application penetration testing
Analysis of web application penetration testingAnalysis of web application penetration testing
Analysis of web application penetration testing
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptx
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3
 

More from CODE BLUE

[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
CODE BLUE
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
CODE BLUE
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
CODE BLUE
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
CODE BLUE
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
CODE BLUE
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
CODE BLUE
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
CODE BLUE
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
CODE BLUE
 

More from CODE BLUE (20)

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
 

Recently uploaded

Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 

Recently uploaded (20)

AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 

[CB19] Coinbase and the Firefox 0-day by Philip Martin

  • 1. Coinbase and the Firefox 0-day
  • 2. About Me I’m Philip Martin, the CISO at Coinbase Ex-Palantir, Amazon, Sun and US Army
  • 3. 00 – Intro 01 – Attack Timeline and Overview 02 – Phase Deep Dives Agenda 03 –Response and Lessons Learned 04 – Wrap Up & Questions
  • 4. Phase 1 Recon Attackers develop ~200 potential targets they think are related to cryptocurrency in some way. Phase 2 Weaponization Attackers develop/acquire firefox 0-days, access to Cambridge University accounts and build implants Phase 3 Delivery Attackers conduct their phishing campaign and target vetting, eventually delivering exploit code to ~5 individuals Phase 4/5/6 Exploitation, Installation & C2 Attackers cause victims to visit a web page hosted on the Cambridge domain which delivers the Firefox 0-days and triggers built-in shellcode to download a phase 1 implant, which then conducts on-system recon and downloads a phase 2 implant if directed Phase 7 Actions on Target Attackers attempt to target obvious credential stores, & documents. (we know less about attacker intentions here as we stopped the intrusion within minutes of it landing on a corporate system 12 May 2019 2 June 2019 17 June 2019 17 June 2019 17 June 2019
  • 5. Phase 1 Recon Attackers develop ~200 potential targets they think are related to cryptocurrency in some way. Phase 2 Weaponization Attackers develop/acquire firefox 0-days, access to Cambridge University accounts and build implants Phase 3 Delivery Attackers conduct their phishing campaign and target vetting, eventually delivering exploit code to ~5 individuals Phase 4/5/6 Exploitation, Installation & C2 Attackers cause victims to visit a web page hosted on the Cambridge domain which delivers the Firefox 0-days and triggers built-in shellcode to download a phase 1 implant, which then conducts on-system recon and downloads a phase 2 implant if directed Phase 7 Actions on Target Attackers attempt to target obvious credential stores, & documents. (we know less about attacker intentions here as we stopped the intrusion within minutes of it landing on a corporate system 12 May 2019 2 June 2019 17 June 2019 17 June 2019 17 June 2019
  • 6. Phase 1 Recon Attackers develop ~200 potential targets they think are related to cryptocurrency in some way. Phase 2 Weaponization Attackers develop/acquire firefox 0-days, access to Cambridge University accounts and build implants Phase 3 Delivery Attackers conduct their phishing campaign and target vetting, eventually delivering exploit code to ~5 individuals Phase 4/5/6 Exploitation, Installation & C2 Attackers cause victims to visit a web page hosted on the Cambridge domain which delivers the Firefox 0-days and triggers built-in shellcode to download a phase 1 implant, which then conducts on-system recon and downloads a phase 2 implant if directed Phase 7 Actions on Target Attackers attempt to target obvious credential stores, & documents. (we know less about attacker intentions here as we stopped the intrusion within minutes of it landing on a corporate system 12 May 2019 2 June 2019 17 June 2019 17 June 2019 17 June 2019
  • 7. Phase 1 Recon Attackers develop ~200 potential targets they think are related to cryptocurrency in some way. Phase 2 Weaponization Attackers develop/acquire firefox 0-days, access to Cambridge University accounts and build implants Phase 3 Delivery Attackers conduct their phishing campaign and target vetting, eventually delivering exploit code to ~5 individuals Phase 4/5/6 Exploitation, Installation & C2 Attackers cause victims to visit a web page hosted on the Cambridge domain which delivers the Firefox 0-days and triggers built-in shellcode to download a phase 1 implant, which then conducts on-system recon and downloads a phase 2 implant if directed Phase 7 Actions on Target Attackers attempt to target obvious credential stores, & documents. (we know less about attacker intentions here as we stopped the intrusion within minutes of it landing on a corporate system 12 May 2019 2 June 2019 17 June 2019 17 June 2019 17 June 2019
  • 8. Phase 1 Recon Attackers develop ~200 potential targets they think are related to cryptocurrency in some way. Phase 2 Weaponization Attackers develop/acquire firefox 0-days, access to Cambridge University accounts and build implants Phase 3 Delivery Attackers conduct their phishing campaign and target vetting, eventually delivering exploit code to ~5 individuals Phase 4/5/6 Exploitation, Installation & C2 Attackers cause victims to visit a web page hosted on the Cambridge domain which delivers the Firefox 0-days and triggers built-in shellcode to download a phase 1 implant, which then conducts on-system recon and downloads a phase 2 implant if directed Phase 7 Actions on Target Attackers attempt to target obvious credential stores, & documents. (we know less about attacker intentions here as we stopped the intrusion within minutes of it landing on a corporate system 12 May 2019 2 June 2019 17 June 2019 17 June 2019 17 June 2019
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Phase 1 Recon Attackers develop ~200 potential targets they think are related to cryptocurrency in some way. Phase 2 Weaponization Attackers develop/acquire firefox 0-days, access to Cambridge University accounts and build implants Phase 3 Delivery Attackers conduct their phishing campaign and target vetting, eventually delivering exploit code to ~5 individuals Phase 4/5/6 Exploitation, Installation & C2 Attackers cause victims to visit a web page hosted on the Cambridge domain which delivers the Firefox 0-days and triggers built-in shellcode to download a phase 1 implant, which then conducts on-system recon and downloads a phase 2 implant if directed Phase 7 Actions on Target Attackers attempt to target obvious credential stores, & documents. (we know less about attacker intentions here as we stopped the intrusion within minutes of it landing on a corporate system 12 May 2019 2 June 2019 17 June 2019 17 June 2019 17 June 2019
  • 14.
  • 15.
  • 16.
  • 17. Phase 1 Recon Attackers develop ~200 potential targets they think are related to cryptocurrency in some way. Phase 2 Weaponization Attackers develop/acquire firefox 0-days, access to Cambridge University accounts and build implants Phase 3 Delivery Attackers conduct their phishing campaign and target vetting, eventually delivering exploit code to ~5 individuals Phase 4/5/6 Exploitation, Installation & C2 Attackers cause victims to visit a web page hosted on the Cambridge domain which delivers the Firefox 0-days and triggers built-in shellcode to download a phase 1 implant, which then conducts on-system recon and downloads a phase 2 implant if directed Phase 7 Actions on Target Attackers attempt to target obvious credential stores, & documents. (we know less about attacker intentions here as we stopped the intrusion within minutes of it landing on a corporate system 12 May 2019 2 June 2019 17 June 2019 17 June 2019 17 June 2019
  • 18. Phase 1 Recon Attackers develop ~200 potential targets they think are related to cryptocurrency in some way. Phase 2 Weaponization Attackers develop/acquire firefox 0-days, access to Cambridge University accounts and build implants Phase 3 Delivery Attackers conduct their phishing campaign and target vetting, eventually delivering exploit code to ~5 individuals Phase 4/5/6 Exploitation, Installation & C2 Attackers cause victims to visit a web page hosted on the Cambridge domain which delivers the Firefox 0-days and triggers built-in shellcode to download a phase 1 implant, which then conducts on-system recon and downloads a phase 2 implant if directed Phase 7 Actions on Target Attackers attempt to target obvious credential stores, & documents. (we know less about attacker intentions here as we stopped the intrusion within minutes of it landing on a corporate system 12 May 2019 2 June 2019 17 June 2019 17 June 2019 17 June 2019
  • 19. Attacker Info Active since 2016 & not covered by any TI firm we know ● The first indication of activity we can find for this group is around 2016. ● There is essentially no english-language coverage of this group Likely the same actor that breached CoinCheck ● Based on a report from Japan’s Cyber Emergency Center, there is significant TTP overlap between our attacker and the one they describe. Has dropped at least half a dozen 0-day ● Reading the reporting, this attacker has dropped somewhere around 6 0- days over the last 3 years. ● IMO one of the more dangerous actors in crypto
  • 20. Our Response / Lessons Learned Visibility is king ● Our time to detect was fast because we’re fanatical about visibility and coverage. ● We’re also fanatical about alert quality. If the team gets a page, they have to know it’s legit. Rapid response playbooks, tabletops, practice, practice, practice ● We had a 20 minute time to containment because we practice on a regular basis. ● If you can’t do it drunk at 3AM christmas morning, you can’t do it 0-day is in your threat model (if you’re in cryptocurrency) ● I hope this is not a surprise to anyone here, but if you’re defending a cryptocurrency company this should drive home to you that 0-day is legitimately in your threat model.
  • 21. Any Questions? (BTW, if this sounds like a fun set of challenges then I’ve probably got an open role that you’d love… https://coinbase.com/careers)

Editor's Notes

  1. Good morning Defcon, thanks for coming out! When I saw the time slot, 10 AM Friday morning, I was a little concerned you might all be sleeping (because I would be, if I wasn’t giving this talk). Really appreciate that you came out and hopefully I’ll give you a fair trade for that effort! What we are going to talk about is an attack by what I think is one of the most dangerous attacker groups in crypto today. This attack targeted cryptocurrency companies, leveraged 2 Firefox 0-days and extensive social engineering. We’re going to spend the next 50 minutes breaking down the attack, how it happened and highlighting a few of the lessons we learned along the way. I’m happy to say that we caught it early when it came out way, customer/corporate funds were never at risk, and were able to detect, respond and contain within minutes and fully remediate/recover within a day or so (although I’m not positive the engineer of ours who was exploited has opened his email again since). But I’m getting ahead of myself...
  2. Hi folks, my name is Philip Martin. I’m the CISO at Coinbase. For those of you that don’t know of us, the way I like to describe our business is that we run the world’s largest and highest stakes Security Capture The Flag. My job is to protect our flags. But really, we’re a cryptocurrency company that stores upwards of 20 billion dollars of digital assets with users across the world and all over the spectrum of technical sophistication. My background is a mix of US Government and Private Sector experience.
  3. Topic and Motivation We’re going to start by walking through the attack, breaking it down into phases so we can talk about each chunk individually (although in real life I doubt the attackers serialized things quite that much) Then we’ll cover how/why we detected the attack (spoiler alert: it was not magic cyber AI) and what lessons we learned from this event. Finally I’ll answer your questions. My guess is I’m going to get more questions than normal in this session, so I’m going to cut myself with about 15 minutes left and if there aren’t 15 minutes of questions, well, you can talk among yourselves for a bit before the next speaker.
  4. Give the quick story
  5. This is the phase we know the least about. We know the attackers put together a list of about 200 people for the initial target set We know the attackers mostly targeted personal email addresses We know they got a few of the initial targets very wrong (e.g. not involved in cryptocurrency at all), but they got the vast majority right As we’ll talk about later, they seemed more interested in IT/infra/eng/security than most, but the initial list cut a pretty broad swath and included a little bit of everything We DONT know where they did their research or what their data sources were We suspsect fairly standard OSINT practices. We DONT know how long this phase lasted or how far in advance the data was collected LEAD OUT: One final note, we don’t really know in what order this occured. We’re assuming that the attackers had the target list ready to go while waiting for a suitable 0-day to pop up, but it could have been the other way around. Assuming we’re right, the attackers next moved into weaponization of their exploit
  6. This is a pretty rich topic area and I’ve lumped both the exploit dev and access to the Cambridge University systems (although we don’t know when the attackers got that access). As you folks already likely know, the attacker leveraged 2 chained exploits CVE-2019–11707 (JIT exploit) and CVE-2019–11708 (sandbox escape). CVE-2019–11707 was a simultaneous(ish) discovery by the attacker and by Samuel Gross of Project Zero. We were able to share the in-the-wild exploit for the bug with him and he has a nice writeup on twitter that covers the differences. Tl;dr the in-the-wild exploit looks like a variant of CVE-2019-9810 (made public in mid-April), so likely someone hunting for this bug pattern, or even specifically a variant of that specific bug. CVE-2019–11708 is more interesting to me. This was the sandbox escape that the attacker used to hop from the browser to the OS. While the underlying mechanism that is exploited has been in firefox for quite a while, the specific way these attackers chose to trigger it has only been possible since 12 May. The attackers seem to have finished getting their operational infra in place on or around the end of May (the attackers registered the domain they used to host the actual 0-day on 28 May). That means, assuming they found the bug right away, about a 2-week cycle from discovery to weaponization as part of an exploit chain. (assumptions: they had the 0-day ready before the phishing went out; they didn’t know about the underlying issue before this change was made). NEXT
  7. In this phase, the attackers also gained access to the Cambridge University accounts they used to actually send the phishing (more on that later). Cambridge allows accounts to host content in home directories under the top level cambridge domain. The attackers used this ability to clone, modify and store legitimate Cambridge pages used in both the social engineering and exploit phases of the attack. The use of the legitimate Cambridge domain gave the attackers a huge leg up in establishing trust with their victims. Don’t know much about the Cambridge side of this equation. Real people? Fake accounts? How long did they have access? Had they leveraged this for other attacks?
  8. This is my favorite phase. The attackers start to send their spearphishing. This is what it looked like...
  9. There were at least 2 variants, one using the Adam Smith prize and one using the Adams Prize (next)
  10. The attackers took at least some effort to give the right message to the right person. If you responded and said something like “I’m not an engineer”, the attackers ceased contact. If you replied with interest the attackers...
  11. Sent you a followup like this. A few days later, the attackers would follow up with...
  12. A message like this. Here finally we get to the actual exploitation. The entire exchange took between 10 days and 2 weeks for most people.
  13. And now we’re in exploitation land. That last URL was a legitimate copy of a login page for Cambridge’s IdP. with two small changes.
  14. A bit of javascript to make sure you were a target that matched their desired profile Note that they seem to want firefox on mac or any other OS. We saw no indication of other exploits being used in this campaign.
  15. This is what you’d see if you visited the site and were not in their target profile.
  16. And the inclusion of the actual exploit code. analyticsfit.com is an attacker controlled domain that was used to host the actual 0-day javascript.
  17. Assuming the exploit landed, your browser would shell out to curl and pull down a stage one implant. If running over, defer to blog post The stage 1 binary was a variant of the Netwire family. While this implant is capable of acting as a fully-featured RAT, the attackers seem to use it mostly as an initial recon and credential theft payload. Delay before stage 2 downloads. The stage 2 payload is a variant of the Mokes family. The attackers seem to use this implant as a full-fledged RAT. We’ve observed activity of the stage 2 implant consistent with direct human control. Our assumption is that stage 1 only advances to stage 2 where the attackers believe they have landed on a host of value.
  18. We stopped the attack on our employee’s system within about 20 minutes, so we don’t have a ton of really good data. We’ve had access to other systems where the attacker was present longer, but without good endpoint logs we’re basing a lot of assumptions on dead-box forensics. The attackers seem to do a fairly basic automated credential pillage in stage 1. We see evidence that, in stage 2, they also target browser credential stores and session tokens. They are interested in pivoting from the endpoint to cloud systems (email, file storage, etc). There is some Japanese-language reporting on these attackers as well that goes into some additional depth.
  19. If you’re a cryptocurrency company, you need to take these folks seriously. They are focused on our industry, they are well funded and operationally skilled with access to 0-days on a regular basis.
  20. RESPONSE Much of this is in the blog post, won’t repeat that. We detected the attack based on defined unusual behaviors (e.g. firefox shelling out, executions from /tmp, unknowns processes touching sensitive directories like .ssh, .aws, etc). LESSONS Visibility is king Our time to detect was fast because we’re fanatical about visibility and coverage. We’re also fanatical about alert quality. If the team gets a page, they have to know it’s legit. Rapid response playbooks, tabletops, practice, practice, practice We had a 20 minute time to containment because we practice on a regular basis. If you can’t do it drunk at 3AM christmas morning, you can’t do it 0-day is in your threat model (if you’re in cryptocurrency) I hope this is not a surprise to anyone here, but if you’re defending a cryptocurrency company this should drive home to you that 0-day is legitimately in your threat model. OTHER STUFF Use of personal email Some cases of personal device compromise
  21. I hope this has been a useful view into this attack and threat actor. I’d be remis if I didn’t mention we’re hiring, including roles in security operations, appsec, threat intel, security engineering, privacy, GRC, etc