Upload 17 files
Browse filesas found here https://raw.githubusercontent.com/aptnotes/data/master/APTnotes.json
- 2006.clean.txt +278 -0
- 2008.clean.txt +0 -0
- 2009.clean.txt +0 -0
- 2010.clean.txt +0 -0
- 2011.clean.txt +0 -0
- 2012.clean.txt +0 -0
- 2013.clean.txt +0 -0
- 2014.clean.txt +0 -0
- 2015.clean.txt +0 -0
- 2016.clean.txt +0 -0
- 2017.clean.txt +0 -0
- 2018.clean.txt +0 -0
- 2019.clean.txt +0 -0
- 2020.clean.txt +0 -0
- 2021.clean.txt +0 -0
- 2022.clean.txt +0 -0
- 2023.clean.txt +0 -0
2006.clean.txt
ADDED
|
@@ -0,0 +1,278 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
"Wicked Rose" and the NCPH Hacking Group
|
| 2 |
+
by Ken Dunham & Jim Melnick
|
| 3 |
+
Zero-day attacks, where an attack occurs before public knowledge of a vulnerability is known, is
|
| 4 |
+
a growing cause of concern for security professionals in the 21st century. An unprecedented
|
| 5 |
+
number of zero-day attacks took place in 2006, largely involving Microsoft Office Files. Ken
|
| 6 |
+
Dunham, Director of the Rapid Response Team, and Jim Melnick, Director of Threat Operations,
|
| 7 |
+
led the VeriSign iDefense intelligence team to track down Chinese hackers for hire out of China,
|
| 8 |
+
responsible for many of the attacks in 2006. Wicked Rose is the ring-leader of the NCPH
|
| 9 |
+
hacking group and this is the story of their maturation into significant global threat by 2006.
|
| 10 |
+
Introduction to N.C.P.H.
|
| 11 |
+
N.C.P.H. (Network Crack Program Hacker) has about ten members or associates. Four core
|
| 12 |
+
members exist as of 2006:
|
| 13 |
+
(Wicked) Rose
|
| 14 |
+
KuNgBiM
|
| 15 |
+
Rodag
|
| 16 |
+
Charles
|
| 17 |
+
There are also some six other associates within NCPH and two other positions (possibly unfilled
|
| 18 |
+
positions) whose purpose is unclear. However,
|
| 19 |
+
Rose
|
| 20 |
+
or
|
| 21 |
+
Wicked Rose
|
| 22 |
+
seems to be the
|
| 23 |
+
primary leader. Membership rules, recruiting goals and standards are unknown. However, some
|
| 24 |
+
members appear to be current or former students of Sichuan University of Science and
|
| 25 |
+
Engineering.1
|
| 26 |
+
The group is responsible for development and deployment of exploit codes related vulnerabilities
|
| 27 |
+
in Microsoft Word Malformed OLE Structure Code Execution and Microsoft Excel Malformed
|
| 28 |
+
BIFF Structure Code Execution.
|
| 29 |
+
Public Knowledge of a Zero-Day Word Exploit
|
| 30 |
+
The story of NCPH zero-day attacks begins publicly on May 18, 2006. On this day the Internet
|
| 31 |
+
Storm Center reports a new possible zero-day attack. iDefense worked closely with SANS and
|
| 32 |
+
other organizations to analyze the threat landscape as it related to exploitation of this
|
| 33 |
+
vulnerability. Within the next 36 hours, iDefense gained access to multiple codes and extracted a
|
| 34 |
+
new rootkit called GinWui. Independent research proved the following:
|
| 35 |
+
Exploitation targeted a new vulnerability that allowed attackers to successfully exploit
|
| 36 |
+
computers running fully patched versions of Microsoft Word 2002 and others.
|
| 37 |
+
Exploitation dated to May 12, 2006 and involved at least six unique hostile exploit files.
|
| 38 |
+
iDefense confirmed that attacks targeted two organizations, one in the United States and
|
| 39 |
+
one in Japan.
|
| 40 |
+
Chinese-authored rootkits GinWui.A and GinWui.B exist in several attacks. iDefense
|
| 41 |
+
identified the rootkits' source and authors as Chinese actor "Wicked Rose" and others
|
| 42 |
+
profiled later in this report.
|
| 43 |
+
www.suse.edu.cn & http://www.study-in-china.org/school/Sichuan/suse/
|
| 44 |
+
Successful installation of the rootkit requires Administrator or Debugger rights. Initial
|
| 45 |
+
exploitation, however, does not require Administrator rights.
|
| 46 |
+
iDefense identified unique malicious code attacks pointing to nease.net and authored
|
| 47 |
+
several Snort signatures for this traffic. iDefense continues to monitor other domains
|
| 48 |
+
related to the attack.
|
| 49 |
+
The original attack upon a large DoD entity within the USA began on May 12, 2006. Targets of
|
| 50 |
+
the attacker were apparently "Googled" by the attacker. Three variations of a Microsoft Word
|
| 51 |
+
zero-day attack are involved in the attack. A few dozen attack files are first distributed to less
|
| 52 |
+
than a dozen targets to identify which version works within the organization.
|
| 53 |
+
Once attackers identify the vulnerable version of Microsoft Word used within the organization
|
| 54 |
+
close to 200 messages sent out to multiple targets within the organization within 24 hours. This
|
| 55 |
+
second wave of attack is distributed as "Planning document 5-16-2006.doc". This code is
|
| 56 |
+
improved beyond the first variant sent out earlier to identify the vulnerable version of Word
|
| 57 |
+
within the targeted network.
|
| 58 |
+
A third attack commences on May 17, 2006. During this period, the Internet Storm Center and
|
| 59 |
+
others get involved and the case becomes public. In the end, iDefense identified six unique
|
| 60 |
+
samples, of which three are more prevalent than other variants.
|
| 61 |
+
The GinWui Backdoor Rootkit Payload
|
| 62 |
+
Zero day attacks commenced in May 2006 attempted to install a GinWui backdoor Trojan horse
|
| 63 |
+
and Windows rootkit. A DLL file called winguis.dll and several SYS files install themselves
|
| 64 |
+
when a computer is successfully attacked through an exploit. Two versions of the GinWui
|
| 65 |
+
rootkit are installed during several attacks in May and June 2006.
|
| 66 |
+
NCHP 5.0 Screenshot (GinWui Rootkit)
|
| 67 |
+
Wicked Rose is the author of the GinWui malicious code. His code and support posts related to
|
| 68 |
+
GinWui distributions exist on the Chinese NCPH and Evil Octal forums. Wicked Rose
|
| 69 |
+
associates with WHG and others on this form. WHT hosted version "3.0beta.3" of the "NCPH
|
| 70 |
+
remote control" rootkit code on May 2, 2006. This distribution of GinWui was largely unknown
|
| 71 |
+
and undetected by anti-virus companies at the time of release.
|
| 72 |
+
Versions of GinWui used in targeted attacks of May and June 2006 are private versions, not
|
| 73 |
+
released to the public. This proves that Wicked Rose either constructed the zero day attacks or
|
| 74 |
+
sold private code to users that performed the attack.
|
| 75 |
+
Wicked Rose later documents additional updates to his rootkit code, version .50, at
|
| 76 |
+
http://rodag.blogbus.com/index.html. By this time Wicked Rose was performing full-time
|
| 77 |
+
development of this malicious code as a hacker for hire.
|
| 78 |
+
June 21, 2007
|
| 79 |
+
Continued US Targeted Attacks
|
| 80 |
+
Just over a month later, following initial GinWui based targeted attacks, another Microsoft Word
|
| 81 |
+
exploit occurs on June 21, 2006. A spoofed e-mail is sent to a target containing a hostile
|
| 82 |
+
Microsoft Word document. Analysis of the attack reveals that it's likely a test file used to
|
| 83 |
+
identify what version of Word may be running within the targeted organization, rather than a
|
| 84 |
+
refined targeted attack upon a known version of Microsoft Word. Chinese text within the Word
|
| 85 |
+
document reveal Chinese characters discussing a systematic evaluation of offsets for Microsoft
|
| 86 |
+
Word exploitation:
|
| 87 |
+
RipGof attacks reveal a Chinese string related to systematic testing of offsets for exploitation.
|
| 88 |
+
Backtracking Targeted Attacks: RipGof
|
| 89 |
+
In June 2006 another targeted attack emerges, but it's not GinWui this time but a new code,
|
| 90 |
+
RipGof.B. The attack attempts to exploit MS06-027 to install RipGof.B, a Trojan horse. This is
|
| 91 |
+
the same exploit code used in the former Zero-Day attacks linked to Wicked Rose and the NCPH
|
| 92 |
+
hacking group. The exploit code is still private at this time, proving that the author of both
|
| 93 |
+
GinWui and RipGof attacks are the same individual or group or affiliated through underground
|
| 94 |
+
criminal operations.
|
| 95 |
+
RipGof.B is an improvement of the former exploit used in GinWui attacks. RipGof.B attacks
|
| 96 |
+
included improvements to shellcode that attempts to fork to different locations based upon the
|
| 97 |
+
address value of the stack to exploit multiple versions of Microsoft Word. Once installed,
|
| 98 |
+
RipGof.B attempts to connect to enjoy.irdet.com and enjoy.bmwsee.com over TCP port 80. It
|
| 99 |
+
runs as a rootkit and backdoor Trojan horse and phones home to a Chinese server with stolen
|
| 100 |
+
data.
|
| 101 |
+
RipGof malicious code does not exist as a distribution in the underground, leading investigators
|
| 102 |
+
to look into the original RipGof.A malicious code. Over a year prior to the 2006 targeted attacks
|
| 103 |
+
RipGof.A emerges in the wild. RipGof.A attempted to exploit the Jet Engine Database exploit in
|
| 104 |
+
March 2005. This proves attempted exploitation and installation of code through RipGof for a
|
| 105 |
+
year prior to more sophisticated codes and attacks.
|
| 106 |
+
In summary, RipGof and GinWui attacks both use the same private exploit code against
|
| 107 |
+
Microsoft Word and both install rootkit based codes to steal and send information back to
|
| 108 |
+
Chinese sources. This circumstantial evidence reveals that Wicked Rose and the NCPH group
|
| 109 |
+
likely began their exploitation efforts at least a year and a half to two years prior to sophisticated
|
| 110 |
+
attacks that commenced in 2006. Once the group found a vulnerability within Microsoft Word
|
| 111 |
+
they were able to improve upon it and their targeted attack techniques to distribute multiple
|
| 112 |
+
targeted attacks and malicious codes for criminal gain as hackers for hire.
|
| 113 |
+
Timeline of Events
|
| 114 |
+
Wicked Rose and the NCPH hacking group are implicated in multiple Office based attacks over
|
| 115 |
+
a two year period. An attack in 2006 used RipGof.B in the attack. RipGof.A first emerged a
|
| 116 |
+
year earlier using an exploit that is relatively unsophisticated. Over the next year the Evil
|
| 117 |
+
Security Team, also out of China, creates the Dasher worm and uses the PcShares Trojan in an
|
| 118 |
+
attack. Wicked Rose gives a recommendation on the Trojan the day it is updated in the spring of
|
| 119 |
+
2006, showing a close affiliation between Wicked Rose and the Evil Security Team actors.
|
| 120 |
+
Multiple attacks that take place in May and June and later 2006 are related to privately held
|
| 121 |
+
exploit code for both Microsoft Word and Excel, proven to be developed by Wicked Rose. A
|
| 122 |
+
timeline of proven associated events related to Wicked Rose attacks is below:
|
| 123 |
+
April 22, 2005 - RipGof.A JetEngine DB Attack
|
| 124 |
+
Dec. 19, 2005
|
| 125 |
+
Dasher worm and PcShare Trojan attack by Evil Security Team
|
| 126 |
+
April 27, 2006 Update to windowsupdates.net attack site
|
| 127 |
+
April 30, 2006 - Wicked Rose Drops out of School
|
| 128 |
+
May 2, 2006
|
| 129 |
+
3.0beta3 NCPH remote control (GinWui) public release
|
| 130 |
+
May 12, 2006 - Initial probing and GinWui.A exploitation attempts against US target
|
| 131 |
+
May 15, 2006 - PcShare Trojan update recommended by Wicked Rose on day of new release
|
| 132 |
+
May 16, 2006 - Update to windowsupdates.net attack site
|
| 133 |
+
May 16, 2006 - Multiple GinWui.A attacks against US target
|
| 134 |
+
May 18, 2006 - SANS reports zero-day attack
|
| 135 |
+
May 19, 2006 Update to windowsupdates.net attack site
|
| 136 |
+
May 20, 2006 - GinWui.B Attack
|
| 137 |
+
May 20, 2006 - WZT Kicked out of NCPH
|
| 138 |
+
May 29, 2006 - GinWui.C Attack
|
| 139 |
+
June 1, 2006 Update to windowsupdates.net attack site
|
| 140 |
+
June 9, 2006
|
| 141 |
+
Mdropper.F Attack
|
| 142 |
+
June 14, 2006
|
| 143 |
+
Daserf.A Attack
|
| 144 |
+
June 15, 2006
|
| 145 |
+
Mdropper.G Attack
|
| 146 |
+
June 15, 2006
|
| 147 |
+
Booli.A Trojan Attack
|
| 148 |
+
June 16, 2006 - Flux.E Attack
|
| 149 |
+
June 18, 2006 - RipGof.B Attack
|
| 150 |
+
June 23, 2006
|
| 151 |
+
PPDropper.A
|
| 152 |
+
June 23, 2006
|
| 153 |
+
Booli.B Trojan attack
|
| 154 |
+
June 25, 2006 - GinWui.D Attack
|
| 155 |
+
June 26, 2006 - GinWui.E Attack
|
| 156 |
+
Sept. 27, 2006
|
| 157 |
+
PPDropper.F Attack
|
| 158 |
+
Sept. 30, 2006
|
| 159 |
+
GinWui.G Attack
|
| 160 |
+
Oct. 9, 2006
|
| 161 |
+
Wicked Rose reports pay increase; likely in September
|
| 162 |
+
A Pictorial Introduction to Wicked Rose and NCPH
|
| 163 |
+
Just who are Wicked Rose and the NCPH hacker group? As it turns out, a collection of college
|
| 164 |
+
students in China who likely room with one another and regularly support their hacking interests.
|
| 165 |
+
In-depth research implicates Wicked Rose as the ring-leader of the group, responsible for
|
| 166 |
+
managing hacker for hire relationships and paying group members for their work as hackers.
|
| 167 |
+
During the time of targeted attacks in 2006 their income increased significantly, to full-time
|
| 168 |
+
wages for part time hacking. Wicked Rose, leader of the group, is pictured below:
|
| 169 |
+
(MeiGui HeiKe)
|
| 170 |
+
Rose Hacker
|
| 171 |
+
QQ number is 5372453 www.mghacker.com
|
| 172 |
+
Wicked Rose maintains a personal site at www.mghacker.com.
|
| 173 |
+
Wicked Rose's Website: www.mghacker.com
|
| 174 |
+
Rose is an approximate 20-year-old (2006) student at the Sichuan University of Science &
|
| 175 |
+
Engineering. In the spring of 2006 Wicked Rose claims to have dropped out of school for full
|
| 176 |
+
time hacking opportunities. Specifically, on April 30, 2006 his blog entry claims he did not
|
| 177 |
+
register for his university exam. He performed significant updates to his rootkit code from
|
| 178 |
+
March through June 2006. He later returned to school by September 2006.
|
| 179 |
+
Wicked Rose claims responsibility on his blog for targeted e-mail based attacks containing
|
| 180 |
+
Microsoft Word and CHM exploits from the spring of 2006.
|
| 181 |
+
Other NCPH-member websites include: http://rodag.blogbus.com,
|
| 182 |
+
http://www.cppblog.com/charles and http://kungbim.blogbus.com. The main NCPH website is
|
| 183 |
+
www.ncph.net:
|
| 184 |
+
NCPH Studio website www.ncph.net
|
| 185 |
+
Registration information for ncph.net reveals a Chinese registrant:
|
| 186 |
+
Registrant Contact: ncph studio (ncph2005@126.com) si chuan li gong xue yuan
|
| 187 |
+
zigong, Sichuan, cn 643000 P: +86.13154663992 F: +86.13154663992
|
| 188 |
+
The main location of the NCPH group is in Zigong, Sichuan Province, in south-central China.
|
| 189 |
+
Zigong, Sichuan Province, in south-central China
|
| 190 |
+
The NCPH group (NCPH Studio) in Zigong, China, is shown here:
|
| 191 |
+
NCPH hackers at work in the
|
| 192 |
+
ncph studio
|
| 193 |
+
Left to right:
|
| 194 |
+
Wicked Rose,
|
| 195 |
+
KuNgBiM, Charles and Rodag
|
| 196 |
+
Additional photos featuring Wicked Rose and NCPH hackers are below, captured from their
|
| 197 |
+
various websites and blog entries in 2006. Chinese translation for each photo are below:
|
| 198 |
+
"Wicked Rose"
|
| 199 |
+
From an ancient Chinese poem,
|
| 200 |
+
expressing the devotion of his heart for
|
| 201 |
+
hacking.
|
| 202 |
+
"After you choose the technology you
|
| 203 |
+
love, you have to research every system
|
| 204 |
+
and code everyday!"
|
| 205 |
+
Charles: "Silence belongs to our
|
| 206 |
+
world..."
|
| 207 |
+
Charles
|
| 208 |
+
"Charles always laughs so brightly when
|
| 209 |
+
searching for program problems!"
|
| 210 |
+
KuNgBiM
|
| 211 |
+
"Only we can feel this kind of happy..."
|
| 212 |
+
Ronag
|
| 213 |
+
"Behind every successful design, he
|
| 214 |
+
always has a slight smile
|
| 215 |
+
Wicked Rose and NCPH hacking photos
|
| 216 |
+
WHG (
|
| 217 |
+
WHG is not a core member of NCPH but a close affiliate of Wicked Rose. WHG appears to be
|
| 218 |
+
central to development of the NCPH rootkit, aka GinWui. WHG is credited by Wicked Rose as
|
| 219 |
+
one of the authors of this malicious code. WHG is an experienced malicious code author with
|
| 220 |
+
the following contact information:
|
| 221 |
+
E-mail address:
|
| 222 |
+
QQ Number:
|
| 223 |
+
Website:
|
| 224 |
+
Real Name:
|
| 225 |
+
Location:
|
| 226 |
+
whg@163.com
|
| 227 |
+
312016
|
| 228 |
+
http://cnasm.com
|
| 229 |
+
May be "Zhao Jibing",
|
| 230 |
+
Believed to be employed in the Sichuan province of China.
|
| 231 |
+
WZT is a former member of the NCPH group who was kicked out during the time of zero-day
|
| 232 |
+
attacks in May 2006. WZT was removed on May 20, 2006. During this time period the zeroday attacks became publicly disclosed, increasing pressure upon the hacking group. It is feasible
|
| 233 |
+
that WZT may have offended the group in some way related to zero-day attack techniques, strife
|
| 234 |
+
over hacker for hire deals, or competition for hacker for hire deals.
|
| 235 |
+
WZT is a former coding expert within the NCPH group and many years experience in hacking.
|
| 236 |
+
He is responsible for creating multiple tools and regularly giving credit to the infamous Li0n
|
| 237 |
+
Chinese hacker (founder of Honker Union (HUC) Chinese group. WZT maintains a website at
|
| 238 |
+
tthacker.cublog.cn.
|
| 239 |
+
The Jiangsu Connection?
|
| 240 |
+
WHOIS registrant data for related domains used within attacks and hacker sites reveals a
|
| 241 |
+
connection with the Jiangsu province of China. One domain, windowsupdates.net, is used in
|
| 242 |
+
attacks and revolves to an IP address in the Sichuan province. Meanwhile, the registrant
|
| 243 |
+
"zhaofeng network" is reportedly based out of Jiangsu, not Sichuan. Some of the WHOIS
|
| 244 |
+
information clearly contains fraudulent information to presumably direct researchers away from
|
| 245 |
+
the true identity and location of the attacker responsible for registering the hostile domain. The
|
| 246 |
+
connection to the Jiangsu and Sichuan provinces remains unclear.
|
| 247 |
+
Concluding Comments
|
| 248 |
+
Prior to Wicked Rose and NCPH hacker for hire attacks in 2006, Chinese hackers are only
|
| 249 |
+
known for their patriotic hacking. This disturbing development reveals two critical threats: 1)
|
| 250 |
+
motives of Chinese hackers are changing 2) Chinese hackers are regularly associated with
|
| 251 |
+
sophisticated attacks as of 2006.
|
| 252 |
+
Wicked Rose implicates himself in his early blog entries and website posts in 2006 and prior.
|
| 253 |
+
An unknown company or entity reportedly paid Wicked Rose for hacking at the rate of 2,000
|
| 254 |
+
RMB a month, about $250 USD. At this time Wicked Rose gave 200 RMB to NCPH hackers
|
| 255 |
+
and kept the rest for himself. Once targeted attacks took place the payment increased five-fold to
|
| 256 |
+
5,000 RMB monthly with $1,000 a month going to NCPH hackers. This is a significant amount
|
| 257 |
+
of money in China, effectively paying hackers a full-time wage for part-time hacking.
|
| 258 |
+
Throughout the summer of 2006, while Wicked Rose was not in school, over 35 zero-day
|
| 259 |
+
attacks, proof-of-concept codes, and attacks against un-patched Microsoft Office vulnerabilities
|
| 260 |
+
are discovered in the wild. With Wicked Rose claiming responsibility for early attacks and the
|
| 261 |
+
lead author of both GinWui and the NCPH hacking group, there is little doubt left as to his
|
| 262 |
+
involvement in attacks to date.
|
| 263 |
+
By the end of 2006 attacks become increasingly sophisticated. In one instance a popular
|
| 264 |
+
PowerPoint file distributed during the Christmas holiday season for the last two years prior is
|
| 265 |
+
used within a socially engineered attack upon one individual within an energy sector US based
|
| 266 |
+
company. The PowerPoint file is modified to include an exploit that silently installs malicious
|
| 267 |
+
code. This same individual receives another e-mail containing a Microsoft Word exploit. In this
|
| 268 |
+
case only one individual within the company is targeted, and with just two messages socially
|
| 269 |
+
engineered for maximum success. This is a much more targeted and stealthy approach for
|
| 270 |
+
attacks compared to the earlier attacks performed by the group in the late spring of 2006.
|
| 271 |
+
NCPH continues to be a significant threat going forth for several reasons.
|
| 272 |
+
1. Attacks continue to take place in the wild and are very difficult to identify on a targeted
|
| 273 |
+
basis. Only the most sophisticated networks and system administrators are able to
|
| 274 |
+
properly protect and capture hostile targeted attack files before an attack takes place.
|
| 275 |
+
2. NCPH is a serious dedicated hacking group that is methodical and disciplined in their
|
| 276 |
+
development of new exploits and attacks.
|
| 277 |
+
3. NCPH is motivated by both the thrill and challenge of hacking and money as a motive.
|
| 278 |
+
4. Attacks by the group are highly targeted and stealthy, very difficult to detect and remove.
|
2008.clean.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
2009.clean.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
2010.clean.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
2011.clean.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
2012.clean.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
2013.clean.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
2014.clean.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
2015.clean.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
2016.clean.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
2017.clean.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
2018.clean.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
2019.clean.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
2020.clean.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
2021.clean.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
2022.clean.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
2023.clean.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|