DIPL. ING.

IVAN SCHMIDT

FOR YOUR SUCCESS

ShadowBrokers - Compromised the SWIFT Network

, Category: RISK     Twitter Facebook Linkedin Google+  

I LOVE IT
0%
I LIKE IT
100%
I CAN IT
0%
I HAVE IT
0%
I NEED IT
0%

ShadowBrokers - Compromised the SWIFT Network

The last time a nation-state used multiple 0days to target another country’s critical infrastructure was when Stuxnet was launched targeting Iran’s nuclear enrichment program. NSAs modus operandi is to gain total access and hack , using multiple 0days, an entire infrastructure of the intended target. In this case, if Shadow Brokers claims are indeed verified, it seems that the NSA sought to totally capture the backbone of international financial system to have a God’s eye into a SWIFT Service Bureau — and potentially the entire SWIFT network. This would fit within standard procedure as a covert entity entrusted with covert actions that may or may not be legal in a technical sense. If the US had a specific target in the region’s financial system, NSA penetration offers redundancy and other options than merely relying upon good faith compliance procedures, standard diplomatic requests, or collaborating with SWIFT Service Bureau.


What is the SWIFT?


The SWIFT organisation hardhearted in Belgium which provides a network that allows financial institutions in 200+ countries to send and receive information about financial transactions to each other. Most of SWIFT members are banks, and trading institutions.

The SWIFT network does not actually transfer funds, but instead it sends payment orders between institutions’ accounts, using SWIFT codes. SWIFT Code also known as Bank Identifier Code (BIC), are used by the SWIFT Network for those transaction and look like XXXXYYZZ (e.g. BARCGB22 for Barclays Bank in Great Britain).


What is a SWIFT Service Bureau?


Accredited SWIFT service bu­reau offers a cost-effective solution for access to the complete range of SWIFT services by eliminating the need for in-house SWIFT expertise and operational support. Think of them of the equivalent of the Cloud providers for Banks. There are 74 certified bureau in the World.


ShadowBrokers’ new release


(14 April Release) ShadowBrokers just released a new archive divided in three different categories:

swift - The most interesting archive as it contains the evidences of the largest infection of a SWIFT Service Bureau to date.
windows - A series of windows tools, and reusable remote exploits for Windows included out of support Windows version and fuzzbunch the “NSA-metasploit”.
oddjob - tools

This release includes logs, excel files, and even for the first time PowerPoint of TOP SECRET documents. This is a first from Shadow Brokers, this would mean ShadowBrokers has definitely more than only tools.


SWIFT


This is the most interesting archive. There are two programs mentioned:
JEEPFLEA_MARKET
JEEPFLEA_POWDER

This is the second significant SWIFT hack revealed in less than 2 years, the first one being the 2016 Bangladesh Bank heist allegedly executed by the North Korean government.

This archive contains several evidences, credentials, internal architecture information of the largest SWIFT Service Bureau of the Middle East: EastNets

As a Certified SWIFT Service Bureau EastNets provides many services related to SWIFT transaction such as compliance, KYC, anti money laundering etc.

According to TreasuryAndRisk, 70% of corporate SWIFT joiners choose a service bureau to avoid the high upfront investment and ongoing operations costs of maintaining their own SWIFT connectivity infrastructure.

There are 74 SWIFT Service Bureaus in the World as we can see on SWIFT Partner website, including EastNets and its Panama/Venezuela partner BCG.

Middle East

America South


A SWIFT Service Bureau, is the kind-of the equivalent of the Cloud for Banks when it comes to their SWIFT transactions and messages, the banks transactions are hosted and managed by the SWIFT Service Bureau via an Oracle Database and the SWIFT Softwares. This is why we see that many of those Service Bureau also offer KYC, Compliance, Anti-Laundering services since they have access to all those transactions as their are the hosting entity for the SWIFT Alliance Access (SAA) of their clients.

Each SAA represents a bank or financial institution, as we can see below:

Banks hosted by EastNet 1

Banks hosted by EastNet 2


In addition of evidences on the hosted machines, the archive also contains reusable tools to extract the information from the Oracle Database such as the list of database users, but also the SWIFT message queries.

Oracle DB script

SQL Query to extract the SWIFT messages

JEEPFLEA is part of the Snowden’s codelist.


JEEPFLEA_MARKET


This is the codename for the EastNets 2013 mission, and like I said above it is also the first time ShadowBrokers release a PowerPoint and clear information about a NSA’s Target. Until now, only Snowden files were used as a source of information on NSA programs.

Many hardcoded passwords can be retrieved from the EastNets machine configuration files.


EastNets has offices in Belgium, Jordan, Egypt and UAE — according to the excel files from the archive. Those excel files have been generated through the dsquery command and contains credential information from the company and its thousands of compromised employees accounts and machines from those different offices, including Administrator accounts.

Remember, that the Headquarter of SWIFT is located in Belgium. Just saying.

List of compromised administrators


Target: EastNets
Country: Dubai, Belgium, Egypt
Quad: 2
Collection: 9 SAAs, Admins
Frontend: Regained access to employee network. Plans to install ZESTYLEAK on VPN FWs in the production network as well as find means of triggerable access.
Middleware: 2 management servers
Backend: Collection on 9 SAA servers


JEEPFLEA_POWDER


According to their website, BCG Business Computer Group is the LatAm strategic partner of EastNets serving Panama and Venezuela.

As the time the document got written (2013), the BCG branch hasn’t been compromised yet.

Target: BCG
Country: Venezuela, Panama
Quad: 1
Collection: None at this time
Frontend: Working on targeting admin boxes using SECONDDATE and IRONVIPER.
Middleware: None at this time
Backend: Future backend will be SAA servers


This would make a lot of sense that the NSA compromise this specific SWIFT Service Bureau for Anti-money laundering (AML) reasons in order to retrieve ties with terrorists groups. But given the small number (120) of SWIFT Service Bureau, and how easy it looks like to compromise them (e.g. 1 IP per Bank)  -  How many of those Service Bureau may have been or are currently compromised?

Also, does this actually represent a direct threat to SWIFT itself ? It does, because this is the first time to date that so much information had been published on how a SWIFT Service Bureau actually works and its internal infrastructure. All of that are very valuable information (such as infrastructure map, scripts, tools etc.) for an attacker.

It’s very valuable for an attack to know the relationship between Front-End/Middleware/Backend interfaces. Remember, CISCO had to release an emergency patches for ASA Firewalls last year in emergency after the initial ShadowBrokers exploit releases if EPICBANANA and EXTRABACON.

Moreover, due to the analyses published last year of the malware which infected Bengladesh Bank — it is also public that SWIFT malwares require to intercept the messsage sent for printing if an attacker which to manipulate the transaction messages and see his orders succeeding.


Targets


Below we can see an example of target, Al Quds Bank for Development and Investment, a Bank based in Ramallah, Palestine as a target — its host was running Windows 2008 R2 which is vulnerable to the exploits catalog of the exploit framework FUZZBUNCH.

Vulnerable to FUZZBUNCHs exploit framework


Windows


Those exploits have been used on the above targets at EastNets.

Keep in mind that Windows Vista/2008 is out of support since Monday, and Windows XP/2003 has been unsupported for more than 3 years. This means that security vulnerabilities found on those systems will never be corrected. Exploits on Windows 8 and Server 2012 are 0days.

Including FUZZBUNCH an exploit framework containing the below exploits:

FUZZBUNCH


As confirmed by @hackerfantastic on Twitter, here are the following working exploits:

ETERNALROMANCE  - Remote privilege escalation (SYSTEM) exploit (Windows XP to Windows 2008 over TCP port 445).
ENTERNALCHAMPION, ETERNALSYNERGY - Remote exploit up to Windows 8 and 2012.
ETERNALBLUE - is Remote Exploit via SMB & NBT (Windows XP to Windows 2012)

Working remote exploit on Windows 2008 SP1 x64.
EXPLODINGCAN  - Remote IIS 6.0 exploit for Windows 2003
EWORKFRENZY  - Lotus Domino 6.5.4 and 7.0.2 exploit
ETERNALSYNERGY -  Windows 8 and Windows Server 2012


ODDJOB


TBA

ODDJOB

ODDJOB backend app


Alternative to SWIFTs?


China and Russia focused on SWIFT alternatives over the past few years such as China International Payments System (CIPS) ready since 2015 and last month Russia announced to have its alternative system for transfer of financial messages (SPFS) ready.

Although since as we just saw the exploitation of the SWIFT Service Bureau required Firewall and Windows remote exploits, having a SWIFT alternative would not be enough to stop attackers.

Unfortunately, as long as companies would not really understand the technical origins of cyber security issues  -  or worse deny them -  those issues will still exist and potentially put critical nation infrastructure at risks.


What to do?


If you are using a version of Windows equal or below Windows Vista, you are doomed forever because those version of Windows aren’t supported anymore.

If you are using Windows 7 and above, you can disable SMB as mentioned on the MSDN until Microsoft issues official patches:


PS C:WINDOWSsystem32> Get-SmbServerConfiguration | Select EnableSMB1Protocol, EnableSMB2Protocol
EnableSMB1Protocol EnableSMB2Protocol
------------------ ------------------
True True
PS C:WINDOWSsystem32> Set-SmbServerConfiguration -EnableSMB1Protocol $false
PS C:WINDOWSsystem32> Set-SmbServerConfiguration -EnableSMB2Protocol $false
PS C:WINDOWSsystem32> Get-SmbServerConfiguration | Select EnableSMB1Protocol, EnableSMB2Protocol
EnableSMB1Protocol EnableSMB2Protocol
------------------ ------------------
False False


Microsoft Official Answer states that all the bugs were already addressed in updated version of Windows.






Original article: https://medium.com/@msuiche/the-nsa-compromised-swift-network-50ec3000b195 @Matt Suiche