The Department of Homeland Security and FBI Have released technical details of the hacking of the Democrat Party and Clinton Campaign that they first described in this document in October. As President Obama promised, the government has released proof that this hacking came from Russian intelligence agencies. Now he has punished them by expelling 35 spies and putting banking and travel sanctions on certain Russians. Americans have a unique ability to effectively punish people around the world that way, since most international commerce uses American dollars and some part of the US banking infrastructure.
Obama also promised that any technical analysis would not reveal all the details of how they uncovered what the Russians did, saying that would give away secret techniques. Instead the document includes a list of malware, exploit kits, viruses, domains, techniques, and IP addresses used by the Russians. The document also gives advice how system administrators can help secure their network against these attacks.
The government is calling this attack Grizzly Steppe and laying blame directly with the RIS (Russian civilians and military intelligence services). They divided these advanced persistent threats into two groups, by the dates of the attack: Summer 2015 (APT 28) and Spring 2016 (APT 29).
CSV and STIX Files
Here are the CSV and STIX files that go with the report. Those give details needed to identity these attacks.
STIX is an XML file format used to exchange virus information between different databases. CSV of course is just a list, with no format, except comma-delimiters.
Here is a sample of the STIX. The top part is just the introduction.
At the top of the CSV file, it lists some of the Russian and other domains used by the attackers. They also list IP addresses. Those are not just in Russia. Many are in the USA.
List of Viruses, Exploit Kits, and Malware
Here is part of the malware listed in the document. The list is not long. Many of the viruses are old. For example, here is a January 2015 technical analysis of one called Seadog.
It might be that the government is keeping secret some of the zero-day exploits.
The government says that phishing was one of the main attack vectors (It always is.). The Russians sent emails to 1,000 individuals. To create the illusion that some of these came from US government and other legitimate organizations, like the Democrat Party, the emails were spoofed to look like they came from those domains. Then the recipients were tricked into logging into and entering their credentials into what looked like official US government or other websites.
Other attacks used SQL injection, Cross-site scripting (XSS), and known vulnerabilities of the devices they attacked.
The government doc shares one Yara signature. It is not clear why they only give one and not one for each virus.
Yara is not an anti-virus tool. Instead it is a way for security researchers to classify malware when they are doing forensics. The Yara file format looks for strings of text, measures file sizes, etc. to identify a virus.
For example, the sample given in the doc below is for a malware called the PAS_TOOL_PHP_WEB_KIT. The source code for it is on Github here. It is some kind of SQL injection or XSS attack using PHP.
To use this you would save the rule as a text file then run it using yara against a file that you believe might be malware. You can download Yara from here.
If you compare the rule below to the malware on Github you can see that all it basically does is look for certain strings to see if they match.
description = "PAS TOOL PHP WEB KIT FOUND"
$php = "<?php"
$base64decode = /\='base'\.\(\d+\*\d+\)\.'_de'\.'code'/
$strreplace = "(str_replace("
$md5 = ".substr(md5(strrev("
$gzinflate = "gzinflate"
$cookie = "_COOKIE"
$isset = "isset"
(filesize > 20KB and filesize < 22KB) and
#cookie == 2 and
#isset == 3 and
all of them
The rest of the document gives advice on how to harden against these Russian attacks. There is nothing new here regarding hardening techniques. Instead they just say to enter those IP addresses and domains into your firewall. Of course antivirus software vendors will take the STIX file and add those rules to their databases and push those out to their customers.