Analyze data uploaded by hackers

Source: Internet
Author: User

Analyze data uploaded by hackers

Attackers and network spies both use the upload scanning tool as one of the methods to test their malicious code. It sounds silly, right? But in the early years, this phenomenon exists, specifically two years ago. In fact, while you are wandering around and reading this report, many people are busy testing their code. When I mention this to most security researchers, their responses are skeptical and come along with issues like "do these people not do their own anti-virus testing ?" Or "you must say that those script boys are training their own technologies ". I do not know why these people use the upload scanning tool, but I am 100% sure they have done so.

In the past two years, I have collected scanning data for file uploads through various technologies to identify user behavior types through the files they uploaded. Compared with viewing files directly, I would like to describe the unique hash of the files uploaded by the user for judgment. When I started doing this, all the operation data that these people now perform had been returned before the scanning tool, faster than those who automatically scan illegal elements. Today, I have obtained more attackers and believe this is the last time that the masses are blinded by scanning tools.

Wired has drafted an article to summarize most of my work over the years. This blog will also provide a guide to how they detect suspicious people through scanning tools. I wrote a short article describing what I learned through different accounts over the years, including the algorithm code that records those activities. These technologies and algorithms help me find a new and interesting activity method to replace the typical record method.

In addition to papers and algorithms, I found this is worth recommending to those who are interested in new cases and want to learn. I have prepared a Google public document describing all the activities of PlugX against illegal molecular testing. In order to easily distinguish it from the file signal detection, I highlighted the files without signal monitoring in green, the five and the following were highlighted in yellow, and the others were made in red. All activities are classified by date, so it is easy to see how illegal elements are "" during testing. This activity began in April 2013, including some examples of files that were uploaded to the scanner but were not seen (accurate hash). These files were used as target files in Hong Kong.

Materials mentioned:

Plugx Development Testing

VirusTotal Mining

@ 91ri.org team]

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.