Showing posts with label Videos. Show all posts
Showing posts with label Videos. Show all posts

Sunday, December 16, 2018

[Video] CascadiaJS 2018 - Raiders of the Javascript-based Ransomware - Pranshu Bajpai

Written by Pranshu Bajpai |  | LinkedIn

The talk below details Javascript-based malware threats that we have observed in the wild. Traditionally, malware is developed in languages such as C and C++, and so studying Javascript-based malware threats has been an interesting exercise for us.

In this CascadiaJS talk, I share intricacies of the RAA ransomware, the first ransomware written entirely in Javascript, and Cryptojacking attacks. CascadiaJS was a great venue to share this analysis since it brings together Javascript experts and enthusiasts. Please watch the talk embedded below.




Thursday, November 29, 2018

[Video] ToorCon XX - Ransomware versus Cryptojacking - Pranshu Bajpai

Written by Pranshu Bajpai |  | LinkedIn

I recently spoke at ToorCon XX about the dangers of modern ransomware and cryptojacking attacks. These are the top malware threats in 2018 and as part of the Security Research Group at MSU, I was closely following the threat patterns. The video for the talk has now been released by ToorCon, and the video and talk abstract are provided below.

Ransomware and cryptojacking have been recognized as the top malware threats in 2018. Financially motivated cybercriminals are attracted to both since both remain viable means of generating illicit income. In this talk, we delve deep into the latest characteristics observed in ransomware and cryptojacking attacks. Modern ransomware go beyond mere data encryption and come bundled with other threats, while cryptojacking attacks exploit unsuspecting web users by deploying embedded JavaScript miners concealed in websites. We discuss the intricate characteristics of sophisticated modern ransomware variants, cryptojacking attacks, and the results of our web crawl identifying websites involved in cryptojacking. Finally, we compare ransomware and cryptojacking in terms of their potential to generate illicit income for cybercriminals versus the levels of sophistication required to implement their respective campaigns.


Modern malware present multi-faceted threats that leverage a variety of attack vectors. Leading the malware threatscape in 2018 are ransomware and cryptojacking attacks, and the more evolved variants are now implementing targeted attacks against organizations (e.g. SamSam). These modern ransomware include a hybrid cryptosystem that uses a combination of symmetric and asymmetric cryptography. In recent practice, ransomware are going beyond mere data encryption and come bundled with other threats. We present real-world cases of ransomware where we observed these cryptoviral extortions drop trojan horses (e.g. RAA dropping pony) and cryptominers (e.g. BlackRuby). Our research shows that these secondary infections remain active on host even after the ransom is paid. During this talk, we will also discuss how elliptic curve cryptography (ECIES) is deployed in modern ransomware (e.g. Petya and PetrWrap) and the tactical advantages it provides (over RSA) to ransomware operators. We will show how many ransomware variants purge shadow copies (via vssadmin), encrypt network backups (using WNetAddConnection2), and use the latest anti-virus circumvention techniques such as “process doppelganging” (e.g. SynAck ransomware). In addition, we will discuss the results of our preliminary web crawl that identified cryptojacking scripts embedded across a variety of websites. We will discuss just how cryptojacking works, why it is rampantly spreading, how it effects organizations and individuals and how to effectively protect an organization and its employees against it.

In conclusion, we will discuss the future of the most potent ransomware and cryptojacking malware as predicted via analysis of real-world malware samples observed lately in the wild. We will also explore new attack vectors (besides phishing) deployed by these malware such as exploiting critical vulnerabilities (e.g. the infamous EternalBlue) or brute forcing remote services (e.g. RDP or SSH). All arguments presented during the talk will be backed by empirical evidence in form of system snapshots, code snippets, and network packet dumps as collected from real-world malware.

Friday, September 7, 2018

[Video] Crypto Gone Rogue: A Tale of Ransomware, Key Management, and CryptoAPI - GrrCon 2018

Written by Pranshu Bajpai |  | LinkedIn


I recently spoke at GrrCon 2018 about how ransomware actually implement key management models by abusing the resident CryptoAPI on host systems. This 25 minute talk goes deep into explaining what the CryptoAPI entails on a Windows system, what DLLs the ransomware imports, what functions from these DLLs are used by the ransomware, and how Cryptographic Service Providers (CSPs) come into the picture.

This talk also demonstrates the concepts by taking the example of the infamous "NotPetya" ransomware. We reverse engineer the NotPeya malware in IDA disassembler and discuss the cryptographic functions being imported from DLLs on Windows.

 Ransomware such as WannaCry and Petya have been heavily focused upon in the news but are their cryptographic models different from predecessors? Key management is crucial to these cryptoviral extortions and for convenience, they harness the power of resident Crypto APIs available on host. Simply stated, they command victim’s resources to lock victim’s resources. In this talk, we examine popular key management models deployed in infamous cryptovirii with the ultimate objective of providing a deeper comprehension of exactly how resident APIs are being used against users. On a Windows host, CryptoAPI (CAPI) provides cryptographic services to applications. CSPs are sets of DLLs that are associated with CAPI implementing cryptographic functions such as CryptAcquireContext, CryptGenKey, CryptEncrypt, CryptImportKey, CryptExportKey, CryptDestroyKey. In Windows Vista and later, CNG replaces CAPI and the ransomware menace persists. We explain cryptographic functions exploited by several ransomware families and explore answers to crucial questions such as how and where the encryption key is generated, where it is stored, how it is protected while encrypting user data, and how it is securely purged. We provide graphical representations combined with pseudo-codes embodying real-world Crypto API function calls pertaining to key management in ransomware. This talk delves deep into key management in present-day ransomware and is a direct result of real-world case studies of highly virulent infections. Dissections will be shown to back up the arguments.

You can watch the video here:


Wednesday, November 8, 2017

Penetration Testing Video Series by AmIRootYet [Pranshu]

Written by Pranshu Bajpai | Twitter | LinkedIn

As of November 2017, I have started posting a series of videos detailing and demonstrating several penetration testing concepts on a YouTube channel here:

https://www.youtube.com/channel/UC_MuHQPbf3EatJc7M6nDTlQ

The purpose of this channel is to foster a deeper understanding of security concepts and, more importantly, how hackers operate. To beat the enemy, it is crucial to comprehend how they operate. Knowing the adversary is our best defense.

The format of the videos will be a demonstration of a security concept on Kali Linux, that is, a practical lab scenario. I will explain as much as I can in the short videos but at this point I will assume that visitors will do background reading on the theory behind my demonstrations on their own. In future, if time permits, I might include some theory videos as well.

Please subscribe, like, and comment on the channel to show your support. Pursuing a doctoral degree in computer science keeps me very busy and this support encourages me to keep posting regularly despite my busy schedule.

Thank you!