The Second Release of T9 Data & Introduction of T9 Detection in Project T9 (Building an AI training dataset based on modelling the latest cyberattacks)

We released the first T9 Data of the T9 Project on July 17, 2024, and the second T9 Data (Attack/Data) on December 17 of this year. This post describe the second T9 Data (Attack/Data) and outline our plans to research AI detection models for countering cyber threats. [Go to the previous blog].

Pick the second T9 Data

The second T9 Data in the T9 Project mimics the latest attacks that have occurred over the past two years, as before. We selected three network attacks, three endpoint attacks, and three combination attacks, categorizing them by the areas where they can be detected, resulting in a total of nine attacks, as shown in Table 1.

Table 1. T9 Project 2024 Attack List (2024-02)

NoT9 Attack IDDomainName / Method
1T1-24–02–S–N–CIKMNetworkJenkins Args4j
2T2-24–02–S–N–CLNetworkJNDI Injection RCE
3T3-24–02–S–N–CLNetworkApache2 HTTP Path Traversal RCE
4T4-24-02-S-E-MEnd PointCl0p Ransomware
5T5-24-02-S-E-DLEnd PointBackdoor(with ARCANUS Tool)
6T6-24-02-S-E-DEGNEnd PointTedy Spyware
7T7-24-02-M-NE-CDEGLNNetwork
End Point
SMBGhost(T2-24–01–S–N–CL) +
Tedy Spyware(T6-24-02-S-E-DEGN)
8T8-24-02-M-NE-CDLNetwork
End Point
JNDI Injection RCE(T2-24–02–S–N–CL) +
Backdoor(with ARCANUS Tool)(T5-24-02-S-E-DL)
9T9-24-02-M-NE-CLHNetwork
End Point
Apache2 HTTP Path Traversal RCE(T3-24–02–S–N–CL) +
Cl0p Ransomware(T4-24-02-S-E-M)

In Table 1, T9 Data 1 to 3, which can be detected in the Network zone, are attacks that exploit the Jenkins Args4j vulnerability to browse files on the server for information exfiltration. The Apache2 HTTP Path Traversal RCE attack is a bit older, disclosed in 2021. An analysis of this attack’s logs may mislead one into thinking it’s simple directory access rather than remote command execution. Therefore, we selected it to validate using our attack detection model.

Attack data from 4 to 6 detectable in the End Point area were selected to collect and analyze the latest malware behavior. The Backdoor (using ARCANUS Tool) attack used malware generated by our team, which was designed to allow remote commands to be executed by the actual malware via a reverse shell connection to the attacker’s server. Tedy Spyware was also chosen because it will enable us to obtain meaningful behavior logs that collect system settings and information.

Attack data 7 to 9 is a combination attack that fuses attacks detected in both the network and endpoint domains into a single attack. Based on the single attacks implemented in the T9 Project, we automated linked attacks based on scenarios from infiltration to infection. In attack #7 (SMBGhost + Tedy Spyware), SMBGhost refers to an attack released in the first half of 2024 [T2-24-01-S-N-CL] and implemented a combination attack in conjunction with the Tedy Spyware malware, which was released in the second half of this year.

Demo T9 Data

Let’s take a closer look at the combination attack, T8-24-02-M-NE-CDL, from the T9 Data published in this post to understand how the T9 Project generates attack data.

The T8-24-02-M-NE-CDL attack is a scenario-based combination attack that exploits JNDI Injection RCE and Backdoor (using the ARCANUS Tool) attacks. The JNDI Injection RCE attack is a Remote Code Execution (RCE) vulnerability caused by a JNDI injection issue in the Apache Kafka software, a streaming platform, identified as CVE-2023-25194. The Backdoor (using the ARCANUS Tool) is malware in the form of an ELF (Executable and Linkable Format) file, which executes malicious behavior via a reverse shell connection when executed. The defined scenario links these two attacks by exploiting the JNDI Injection RCE vulnerability to download and execute additional malware from the command and control (C&C) server, thereby establishing a remote session. The overall behavioral architecture is illustrated in Figure 1.

Figure 1. T8-24-02-M-NE-CDL Behavioral Architecture

When running ‘run.py’ to execute the attack, the first step is automatically building the Victim and Attacker environments and sending ICMP packets before starting the attack. It then follows the defined scenario to exploit the vulnerability and perform malicious behavior. Finally, T8-24-02-M-NE-CDL downloads and executes an additional Backdoor (with ARCANUS Tool) on the Malware Hosting Server to establish a Reverse Shell connection with the Attacker. After completing the attack, ICMP packets are sent again to mark the start and end points of the attack data.

Figure 2. T8-24-02-M-NE-CDL Attack Execution

Figure 2 shows the tool executing. It prints out the attack execution procedure so you can see it in real-time and generates Network Packet (.pcap) and Sysmon Log (.xml) in the log directory as a result of the execution.

Figure 3. Network Packet (top), Sysmon Log (bottom) of T8-24-02-M-NE-CDL attack

Figure 3 presents a snippet of the T8-24-02-M-NE-CDL attack data, which allows us to analyze malicious behavior on the network and endpoints through network packets and Sysmon logs.

T9 Data can create composite and realistic threat scenarios using various single attacks. We expect this will serve as high-quality and adequate data for training AI cyber threats.

Cyber Threat Detection Model (T9 Detection)

The T9 Project is currently building an attack dataset utilizing vulnerability analysis and attack tools. We are developing an automated attack tool and building a dataset aiming to generate data similar to actual attack data through the latest attacks and known attacks. Subsequently, in the second half of 2025, we plan to develop an AI detection model specifically for cyber threats, as illustrated in Figure 4, by learning from the T9 data we have compiled to date and from normal data collected in the real world.

Figure 4. Development of AI detection models specialized for cyber threats

Conclusion

In this post, we briefly introduced the T9 Project’s second round of T9 Data and our plans to research AI detection models to defend against these attacks effectively. To date, we have released data from 18 automated attack tools, and we will continue to generate more attack data through continuous updates. We will also release various research results, including advanced threat scenarios, normal data, and AI detection models, so please stay tuned for more information.

References

[1] Jenkins 취약점 노출 국내 서버 현황 (CVE-2024-23897, CVE-2024-43044), https://asec.ahnlab.com/ko/82870/, 2024
[2] CVE-2023-25194 Detail, https://nvd.nist.gov/vuln/detail/CVE-2023-25194, 2023
[3] Medium – Victor Park [Apache Kafka 보안 업데이트 권고], https://medium.com/spitha-techblog/apache-kafka-%EB%B3%B4%EC%95%88-%EC%97%85%EB%8D%B0%EC%9D%B4%ED%8A%B8-%EA%B6%8C%EA%B3%A0-cve-2023-25194-23-02-08-a0cb5903c40e
[4] CVE-2021-42013 Detail, https://nvd.nist.gov/vuln/detail/cve-2021-42013, 2021
[5] Apache HTTP Server [CVE-2021-41773 / CVE-2021-42013 [Apache HTTP Server]], https://omoknooni.tistory.com/32
[6] Cl0p [Cl0p Ransomware: Active Threat Plaguing Businesses Worldwide], https://cyble.com/blog/cl0p-ransomware-active-threat-plaguing-businesses-worldwide/
[7] CTX [28AB56D70469C88E4DDE1241C1A2F742202757D4C7AC5259C4308DDD74337045], https://www.ctx.io/report/file/28AB56D70469C88E4DDE1241C1A2F742202757D4C7AC5259C4308DDD74337045
[8] Github – EgeBalci [ARCANUS], https://github.com/EgeBalci/ARCANUS

2 명이 이 글에 공감합니다.