Gabriel Cirlig

Security Researcher WhiteOps

BIOGRAPHY

Software developer turned rogue, went from developing apps for small businesses to 2M+ DAU Facebook games while keeping an eye for everything shiny and new. For about four years I’ve shifted gear sand started tinkering at Ixia’s threat intelligence system as a security researcher while speaking at various conferences (SAS, AVAR, PHDays) in my free time showcasing whatever random hardware I hacked. With a background in electronics engineering and various programming languages, I like to dismantle and hopefully put back whatever I get my hands on.

Rotten to the core: Android worms in the wild

Starting as a developer’s best friend, the Android Debug Bridge has turned into a security nightmare as time passed. While having an open port available for debugging over the internet sounds great, forgetting to turn off that service in production environment can spell big trouble for you or even your customers.

My analysis will be of the protocol, the worms abusing it and how I discovered it all after putting my freshly built honeypot up. The Android Debug Bridge protocol was initially designed for accessing various critical services of an Android device over USB. However, it also got encapsulated over TCP/IP recently, opening up port 5555 for a remote debugger to attach itself. From a security standpoint however, no improvements have been made, and a remote attacker can freely connect and exploit a device over the air. This is why I started developing a low interaction honeypot to catch this kind of attacks following a surge in hits on that specific port in our sensors. Shortly after, I opensourced the project on GitHub. This led in a huge surge of honeypots being open by fellow security researchers, and thus awareness about this vulnerability significantly increased. After also publishing a blogpost about one of the new threats that I found, Trinity (p2p bot that spread a miner), the amount of vulnerable devices dropped by 50%, from more than 44000 to around 22000.

In the first part of the presentation I’ll be discussing the development procedure for the honeypot from the ground up as well as dissecting the ADB protocol in order to enable researchers to more easily implement their own honeypots. The second part of the talk will be focused on exploring various strands of malware that have started hitting the honeypot in the last months, some that are even quite hilarious. From apologetic miners to aggressive peer to peer botnets, I’ll be showcasing the whole ecosystem of ADB worms that have circulated around the internet.

Are you the next cyber security superstar?

If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.

Other speakers joining this year

Filip Stojkovski

Threat Intelligence Manager Adobe

Bianca Lewis

CEO Girls Who Hack

Alex Matrosov

Offensive Security Research Lead NVIDIA

Ready for this year's presentations?

By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.

0
SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES

Sponsors & Partners

They help us make this conference possible.

POWERED BY

As an infrastructure operator, technology integrator and IT&C services provider, Orange Business Services supports businesses and public entities in their digital transformation. Collect, transport, protect, store and process and analyze: they orchestrate every phase of the data journey, for your business to create even more value.

WWW.ORANGE.RO

PLATINUM PARTNERS

Ixia provides testing, visibility, security solutions, network testing tools and virtual network security solutions to strengthen applications across physical and virtual networks.

WWW.IXIACOM.COM

Secureworks provides threat intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

WWW.SECUREWORKS.COM

GOLD PARTNERS
SILVER PARTNERS
GAMING PARTNERS
VIP & SPEAKER LOUNGE PARTNER
BRONZE PARTNERS
COMMUNITY & MEDIA PARTNERS