Safeguarding China Operation (Part 3)——Analysis and Judgment of Major Events and Response to High-Risk Vulnerabilities

The original report is in Chinese, and this version is an AI-translated edition.

On the occasion of the 75th anniversary of the National Day, Antiy CERT has gathered and sorted out the historical work in security event handling, major event analysis, advanced threat analysis, etc. In order to summarize experience, refine rules, and improve deficiencies, our subsequent analysis and response work can more effectively support the national security struggle.

Threat analysis and response is an important capability spectrum of Antiy. Antiy conducts a series of work such as threat perception, capture, analysis, disposal, tracing, reporting, and exposure for attack activities, attack equipment, and threat actors, continuously promotes iterative improvements in core engines and product and service capabilities, and effectively supports public security governance and national security struggles.

In 2004, Antiy established the Antiy Computer Emergency Response Team based on the virus analysis group, which was later renamed Antiy Security Research and Emergency Response Center, namely Antiy CERT. According to the working principle of “starting at the first time, responding to multiple threats at the same time, three systems linkage, and four operation planes coordination”, a working mechanism was established. For major security events and advanced threat response and disposal, an overall combat readiness mobilization mechanism was formed. Antiy has been elected as the national (class A) support unit of the National Internet Emergency Center for eight consecutive terms (sixteen years).

Today we bring you the third part of Antiy’s emergency response and threat analysis work track – analysis and judgment of major events and response to high-risk vulnerabilities.

Antiy has participated in and supported the verification, analysis and other work of many major network security-related events since 2005. Based on its own analytical capabilities and systems, it provides decision-making references for competent departments and strategic customers, and provides objective, rational and true event information to the public.

Among threats, Antiy’s earliest analysis work started with malicious code samples/executable bodies, and vulnerability analysis itself was not the main perspective of Antiy’s analysis work. In the early worm analysis process, only wormable (remotely executable) vulnerabilities were warned and judged as part of the worm propagation mechanism analysis. After 2008, as more serious vulnerabilities were targeted and exploited by attackers instead of being exposed with worm propagation, Antiy gradually decoupled the response analysis of serious vulnerabilities from the worm analysis process, forming a set of work methods mainly centered on vulnerability analysis -> vulnerability exploitation detection -> vulnerability mitigation. Gradually, the process including vulnerability intelligence collection, vulnerability verification, impact scope assessment, vulnerability exploitation technology analysis, repair suggestion formulation and emergency response strategy planning has been improved, which has improved the Antiy engine’s ability to detect vulnerability exploitation payloads and the product’s ability to mitigate and protect vulnerabilities.

In the above work, we will extract the publicly released parts and compile them into this index.

1.Analysis and Judgment of Major Events and Response to High-Risk Vulnerabilities

May 2007

EventSymantec accidentally killed Microsoft’s Windows XP Chinese patch, causing system blue screen incident
Contribution  By deeply comparing multiple language versions, differences between patches and original versions, and analyzing the causes of related antivirus software alarms, the cause of the incident was accurately determined.
For more information“Analysis of the event regarding Symantec’s killing of Chinese XP system files” Antiy Technical Articles Compilation (Volume 3)

October 2008

VulnerabilitiesWindows SMB Service Vulnerability (MS08-067)
Contribution  Analysis report, principle and detection method
For more informationWindows SMB Service (MS08-067) (Vulnerability Analysis and Response) Antiy Technical Articles Compilation (Volume 2)

July 2013

EventSnowden
Contribution  An analysis of the causes of the Snowden effect
图片
Figure 1 ‑1 Relationship diagram of information related to the Snowden incident
For more informationAn analysis of the causes of the Snowden effect (published in the Communications of the Chinese Computer Society)

April 2014

VulnerabilitiesHeartbleed CVE-2014-0160
Contribution  In-depth mechanism analysis, popularization of vulnerability mechanisms and mitigation methods, and provision of network detection methods
图片
Figure 1 ‑2 Image of the Heartbleed vulnerability
For more informationCVE-2014-0160 (TLS heartbeat reading remote information leakage) vulnerability brief description and network-side detection suggestions Heartbleed Vulnerability (CVE-2014-0160) FAQ “Antiy Technical Articles Compilation Hot Events Special Topic (Volume 1)”

April 2014

EventWinXP service stopped
Contribution  Inspiration from Microsoft’s security evolution, thinking about operating system security
For more informationImpact of XP shutdown on the security threat landscape (YOCSEF Special Forum Meeting Report) “Antiy Technical Articles Compilation Hot Events Special Topic (Volume 2)”

September 2014

Vulnerabilities“Shellshock” Vulnerability (CVE-2014-6271)
Contribution  Vulnerability mechanism analysis, malicious code association analysis, historical evolution analysis
图片
Figure 1 ‑3 Cover of the report on the “Shellshock” vulnerability (CVE-2014-6271)
For more informationAnalysis of Bash Remote Code Execution Vulnerability “Shellshock” (CVE-2014-6271) Analysis Report on Malicious Code Samples Related to the “Shellbreak” Vulnerability — Analysis Related to “Shellbreak” Part II Evolution of Threats Associated with the “Shellbreak” Vulnerability and the Current Status of Malicious Code in UNIX-like Systems — Analysis Related to “Shellbreak” Part III “Antiy Technical Articles Compilation Hot Events Special Topic (Volume 2)”

September 2014

VulnerabilitiesSandworm vulnerability (CVE-2014-4114)
Contribution  In-depth analysis of vulnerability mechanisms, fine-grained vulnerability configuration environment analysis, malicious code association analysis, and historical evolution analysis
图片
Figure 1 ‑4 Image of the Sandworm vulnerability (CVE-2014-4114)
For more informationComprehensive analysis report on threats related to Sandworm (CVE-2014-4114) “Antiy Technical Articles Compilation Hot Events Special Topic (Volume 2)”

September 2015

EventXcode Unofficial Supply Chain Pollution (XcodeGhost)
Contribution  In-depth event analysis report and fine-grained investigation of the scope of event impact
Figure 1 ‑5 Report cover of Xcode unofficial version malicious code pollution incident (XcodeGhost)
图片
Figure 1‑6 Xcode unofficial supply chain pollution incident
For more informationAnalysis and review of Xcode unofficial version malicious code pollution incident (XcodeGhost)

January 2016

EventAttack on Ukraine’s power system
Contribution  Complete review from early botnet propagation to final attack, accurately determine the mechanism of effectiveness, and make disposal suggestions

Figure 1‑7 Cover of the report on the attack on Ukraine’s power system
Video 1 ‑1Visual reproduction video of the attack on Ukraine’s power system
For more informationComprehensive analysis report on the attack on Ukraine’s power system

May 2017

EventA large-scale ransomware attack “WannaCry” broke out around the world
Contribution  First release of complete analysis, special detection, immunity tools, memory key extraction (recovery) tools, and traceability support
图片
Figure 1 ‑8 Cover of the WannaCry MS17-010 in-depth analysis report
For more informationAntiy’s in-depth analysis report on the ransomware worm “WannaCry”   
Antiy’s protection manual for dealing with the ransomware “WannaCry”
Antiy analyzes the payment and decryption process of the ransomware worm WannaCry
Antiy worm-like ransomware WannaCry immunity tool FAQ 4
In response to the ransomware “WannaCry”, Antiy released a boot guide

June 2017

EventAttacks on financial and other infrastructure disguised as ransomware attacks
Contribution  We immediately guessed that it was a destructive attack disguised as a ransomware virus and put forward prevention suggestions
Video1 ‑2 Visual reproduction of the Petya attack on a certain industry
For more informationAnalysis and response to the PETYA virus that attacks Ukraine and other countries

September 2017

EventBluetooth protocol vulnerability
Contribution  Release report, attack verification
图片
Figure 1‑9 Antiy ‘s research on security in peripherals, short-distance communications and other related fields
For more informationAntiy’s comprehensive analysis report on BlueBorne attacks based on Bluetooth protocol vulnerabilities

January 2018

EventMeltdown and Spectre
Contribution  Take the lead in early warning, vulnerability analysis, and vulnerability verification
图片
Figure 1 ‑10 Meltdown and Spectre analysis report home page
For more informationAnalysis report on the processor A-level vulnerabilities Meltdown and Spectre A brief FAQ about Meltdown attacks and CPU architecture FAQ about Meltdown and Spectre, the A-level vulnerabilities of processors Antiy Hot Events Special Topic (Volume 5)

March 2019

EventMassive power outage in Venezuela
Contribution  Jointly released the report with Guangdong Provincial Power System
图片
Figure 1‑11 Cover of the report on the large-scale power outage in Venezuela
For more informationPreliminary analysis and reflections on the massive power outage in Venezuela

March 2020

EventUS implants malicious code into Russian power grid
Contribution  Event summary and practical threat hunting
图片
Figure 1 ‑12Antiy Threat Hunting Process Overview
For more informationPractical threat hunting makes threats nowhere to hide – enlightenment from reports such as “US implants malicious code into Russian power grid”

March 2020

EventMicrosoft SMBv3 (CVE-2020-0796)
Contribution  Vulnerability principle analysis, immunity tools
图片
Figure 1 ‑13 CVE-2020-0796 SMBv3 vulnerability immunity tool
For more informationAntiy analyzes Microsoft SMBv3 high-risk vulnerability and releases immunity tool

December 2020

EventFireEye red team tools stolen
Contribution  Analysis report, troubleshooting methods and thinking
For more informationAnalysis and reflections on the theft of FireEye red team tools Follow-up analysis of the FireEye red team tool theft incident

December 2020

EventSolarWinds software used in supply chain attacks
Contribution  Analysis report
图片
Figure 1 ‑14 SolarWinds incident-related malicious code prefabrication + network management software turned into RAT threat framework map
For more informationSolarWinds software used to analyze supply chain attacks

May 2021

EventColonial Pipeline, the largest U.S. refined petroleum pipeline operator, suffered a cyberattack
Contribution  Analysis report, provide judgments and suggestions
图片
Figure 1‑15 Cover of a report on the ransomware attack on a US fuel pipeline company
For more informationPreliminary analysis and suggestions on the closure of a US fuel pipeline company due to a ransomware attack Sample and follow-up analysis of the ransomware attack on a US fuel pipeline company Summary of the Shutdown of US Fuel Pipeline Companies Due to Ransomware Attacks

December 2021

VulnerabilitiesApache Log4j 2 Remote Code Execution
Contribution  Provide troubleshooting methods, disposal suggestions and solutions
For more informationApache Log4j 2. Remote Code Execution Vulnerability Investigation and Treatment Suggestions Log4j security vulnerability response practice in cloud host scenario When will the Log4j vulnerability be resolved? Antiy RASP will solve the problem

October 2023

VulnerabilitiesCurl high-risk vulnerability (CVE-2023-38545)
Contribution  Analysis follow-up, multiple detection methods, reinforcement methods
For more informationCurl High-Risk Vulnerability (CVE-2023-38545) Analysis Report and Suggestions

December 2023

EventBoeing hit by ransomware attack
Contribution  This paper analyzes the most active LockBit ransomware attack organization and takes its attack on Boeing as a typical case. It summarizes the rules of RaaS+ targeted ransomware attacks and puts forward prevention suggestions.

Video 1 ‑3 Visual reproduction of the ransomware attack by the “LockBit Group” against Boeing
For more informationBoeing ransomware attack analysis and review: threat trend analysis and defense thinking of targeted ransomware

July 2024

EventCrowdStrike caused a massive system crash
Contribution  Complete mechanism analysis, emergency solutions and temporary disposal tools
图片
Figure 1 ‑16 Antiy temporary disposal tool CrowdStrike_Crash_Fix

图片
Figure 1 ‑17 Cover of the technical report on the CrowdStrike-caused large-scale system crash
For more informationA Technical Analysis of the CrowdStrike Global System Failure Contemplating Falcon’s Broken Wings Analysis notes on CrowdStrike’s library loading and rapid upgrade mechanism Analysis of Attack Activities Disguised as CrowdStrike Repair Files

August 2024

VulnerabilitiesWindows Server RDL Remote Execution Vulnerability (CVE-2024-38077)
ContributionEmergency tools to mitigate vulnerabilities 图片
Figure 1 ‑18 CVE-2024-38077 vulnerability emergency response tool

September 2024

EventAnalysis and Assessment of the Lebanese Pager (BP Machine) Incident
Contribution  Analyze relevant mechanisms and triggering processes, and provide in-depth analysis reports
图片
Figure 1‑19 Cover of the Analysis Report on the Lebanese Pager (BP Machine) Explosion Incident
For more informationAnalysis of the Lebanese Pager (BP Machine) Explosion Incident  

Early Antiy historical analysis reports and technical documents were published in the Antiy Technical Articles Compilation. All the ten volumes of history and the electronic version of the ten volumes of technical articles collection are now available on the Antiy Information Intelligence Platform. The Antiy Information Intelligence Platform also includes the PDF version of Antiy’s historical public analysis reports. Those who are interested in becoming users of the Antiy Intelligence Platform can contact iia_sales@antiy.cn .

Appendix: About Antiy

Antiy is committed to enhancing the network security defense capabilities of its customers and effectively responding to security threats. Through more than 20 years of independent research and development, Antiy has developed technological leadership in areas such as threat detection engines, advanced threat countermeasures, and large-scale threat automation analysis.

Antiy has developed IEP (Intelligent Endpoint Protection System) security product family for PC, server and other system environments, as well as UWP (Unified Workload Protect) security products for cloud hosts, container and other system environments, providing system security capabilities including endpoint antivirus, endpoint protection (EPP), endpoint detection and response (EDR), and Cloud Workload Protection Platform (CWPP) , etc. Antiy has established a closed-loop product system of threat countermeasures based on its threat intelligence and threat detection capabilities, achieving perception, retardation, blocking and presentation of the advanced threats through products such as the Persistent Threat Detection System (PTD), Persistent Threat Analysis System (PTA), Attack Capture System (ACS), and TDS. For web and business security scenarios, Antiy has launched the PTF Next-generation Web Application and API Protection System (WAAP) and SCS Code Security Detection System to help customers shift their security capabilities to the left in the DevOps process. At the same time, it has developed four major kinds of security service: network attack and defense logic deduction, in-depth threat hunting, security threat inspection, and regular security operations. Through the Threat Confrontation Operation Platform (XDR), multiple security products and services are integrated to effectively support the upgrade of comprehensive threat confrontation capabilities.

Antiy provides comprehensive security solutions for clients with high security requirements, including network and information authorities, military forces, ministries, confidential industries, and critical information infrastructure. Antiy has participated in the security work of major national political and social events since 2005 and has won honors such as the Outstanding Contribution Award and Advanced Security Group. Since 2015, Antiy’s products and services have provided security support for major spaceflight missions including manned spaceflight, lunar exploration, and space station docking, as well as significant missions such as the maiden flight of large aircraft, escort of main force ships, and Antarctic scientific research. We have received several thank-you letters from relevant departments.

Antiy is a core enabler of the global fundamental security supply chain. Nearly a hundred of the world’s leading security and IT enterprises have chosen Antiy as their partner of detection capability. At present, Antiy’s threat detection engine provides security detection capabilities for over 1.3 million network devices and over 3 billion smart terminal devices worldwide, which has become a “national-level” engine. As of now, Antiy has filed 1,877 patents in the field of cybersecurity and obtained 936 patents. It has been awarded the title of National Intellectual Property Advantage Enterprise and the 17th (2015) China Patent Excellence Award.

Antiy is an important enterprise node in China emergency response system and has provided early warning and comprehensive emergency response in major security threats and virus outbreaks such as “Code Red”, “Dvldr”, “Heartbleed”, “Bash Shellcode” and “WannaCry”. Antiy conducts continuous monitoring and in-depth analysis against dozens of advanced cyberspce threat actors (APT groups) such as “Equation”, “White Elephant”, “Lotus” and “Greenspot” and their attack actions, assisting customers to form effective protection when the enemy situation is accurately predicted.