| "Wicked Rose" and the NCPH Hacking Group | |
| by Ken Dunham & Jim Melnick | |
| Zero-day attacks, where an attack occurs before public knowledge of a vulnerability is known, is | |
| a growing cause of concern for security professionals in the 21st century. An unprecedented | |
| number of zero-day attacks took place in 2006, largely involving Microsoft Office Files. Ken | |
| Dunham, Director of the Rapid Response Team, and Jim Melnick, Director of Threat Operations, | |
| led the VeriSign iDefense intelligence team to track down Chinese hackers for hire out of China, | |
| responsible for many of the attacks in 2006. Wicked Rose is the ring-leader of the NCPH | |
| hacking group and this is the story of their maturation into significant global threat by 2006. | |
| Introduction to N.C.P.H. | |
| N.C.P.H. (Network Crack Program Hacker) has about ten members or associates. Four core | |
| members exist as of 2006: | |
| (Wicked) Rose | |
| KuNgBiM | |
| Rodag | |
| Charles | |
| There are also some six other associates within NCPH and two other positions (possibly unfilled | |
| positions) whose purpose is unclear. However, | |
| Rose | |
| or | |
| Wicked Rose | |
| seems to be the | |
| primary leader. Membership rules, recruiting goals and standards are unknown. However, some | |
| members appear to be current or former students of Sichuan University of Science and | |
| Engineering.1 | |
| The group is responsible for development and deployment of exploit codes related vulnerabilities | |
| in Microsoft Word Malformed OLE Structure Code Execution and Microsoft Excel Malformed | |
| BIFF Structure Code Execution. | |
| Public Knowledge of a Zero-Day Word Exploit | |
| The story of NCPH zero-day attacks begins publicly on May 18, 2006. On this day the Internet | |
| Storm Center reports a new possible zero-day attack. iDefense worked closely with SANS and | |
| other organizations to analyze the threat landscape as it related to exploitation of this | |
| vulnerability. Within the next 36 hours, iDefense gained access to multiple codes and extracted a | |
| new rootkit called GinWui. Independent research proved the following: | |
| Exploitation targeted a new vulnerability that allowed attackers to successfully exploit | |
| computers running fully patched versions of Microsoft Word 2002 and others. | |
| Exploitation dated to May 12, 2006 and involved at least six unique hostile exploit files. | |
| iDefense confirmed that attacks targeted two organizations, one in the United States and | |
| one in Japan. | |
| Chinese-authored rootkits GinWui.A and GinWui.B exist in several attacks. iDefense | |
| identified the rootkits' source and authors as Chinese actor "Wicked Rose" and others | |
| profiled later in this report. | |
| www.suse.edu.cn & http://www.study-in-china.org/school/Sichuan/suse/ | |
| Successful installation of the rootkit requires Administrator or Debugger rights. Initial | |
| exploitation, however, does not require Administrator rights. | |
| iDefense identified unique malicious code attacks pointing to nease.net and authored | |
| several Snort signatures for this traffic. iDefense continues to monitor other domains | |
| related to the attack. | |
| The original attack upon a large DoD entity within the USA began on May 12, 2006. Targets of | |
| the attacker were apparently "Googled" by the attacker. Three variations of a Microsoft Word | |
| zero-day attack are involved in the attack. A few dozen attack files are first distributed to less | |
| than a dozen targets to identify which version works within the organization. | |
| Once attackers identify the vulnerable version of Microsoft Word used within the organization | |
| close to 200 messages sent out to multiple targets within the organization within 24 hours. This | |
| second wave of attack is distributed as "Planning document 5-16-2006.doc". This code is | |
| improved beyond the first variant sent out earlier to identify the vulnerable version of Word | |
| within the targeted network. | |
| A third attack commences on May 17, 2006. During this period, the Internet Storm Center and | |
| others get involved and the case becomes public. In the end, iDefense identified six unique | |
| samples, of which three are more prevalent than other variants. | |
| The GinWui Backdoor Rootkit Payload | |
| Zero day attacks commenced in May 2006 attempted to install a GinWui backdoor Trojan horse | |
| and Windows rootkit. A DLL file called winguis.dll and several SYS files install themselves | |
| when a computer is successfully attacked through an exploit. Two versions of the GinWui | |
| rootkit are installed during several attacks in May and June 2006. | |
| NCHP 5.0 Screenshot (GinWui Rootkit) | |
| Wicked Rose is the author of the GinWui malicious code. His code and support posts related to | |
| GinWui distributions exist on the Chinese NCPH and Evil Octal forums. Wicked Rose | |
| associates with WHG and others on this form. WHT hosted version "3.0beta.3" of the "NCPH | |
| remote control" rootkit code on May 2, 2006. This distribution of GinWui was largely unknown | |
| and undetected by anti-virus companies at the time of release. | |
| Versions of GinWui used in targeted attacks of May and June 2006 are private versions, not | |
| released to the public. This proves that Wicked Rose either constructed the zero day attacks or | |
| sold private code to users that performed the attack. | |
| Wicked Rose later documents additional updates to his rootkit code, version .50, at | |
| http://rodag.blogbus.com/index.html. By this time Wicked Rose was performing full-time | |
| development of this malicious code as a hacker for hire. | |
| June 21, 2007 | |
| Continued US Targeted Attacks | |
| Just over a month later, following initial GinWui based targeted attacks, another Microsoft Word | |
| exploit occurs on June 21, 2006. A spoofed e-mail is sent to a target containing a hostile | |
| Microsoft Word document. Analysis of the attack reveals that it's likely a test file used to | |
| identify what version of Word may be running within the targeted organization, rather than a | |
| refined targeted attack upon a known version of Microsoft Word. Chinese text within the Word | |
| document reveal Chinese characters discussing a systematic evaluation of offsets for Microsoft | |
| Word exploitation: | |
| RipGof attacks reveal a Chinese string related to systematic testing of offsets for exploitation. | |
| Backtracking Targeted Attacks: RipGof | |
| In June 2006 another targeted attack emerges, but it's not GinWui this time but a new code, | |
| RipGof.B. The attack attempts to exploit MS06-027 to install RipGof.B, a Trojan horse. This is | |
| the same exploit code used in the former Zero-Day attacks linked to Wicked Rose and the NCPH | |
| hacking group. The exploit code is still private at this time, proving that the author of both | |
| GinWui and RipGof attacks are the same individual or group or affiliated through underground | |
| criminal operations. | |
| RipGof.B is an improvement of the former exploit used in GinWui attacks. RipGof.B attacks | |
| included improvements to shellcode that attempts to fork to different locations based upon the | |
| address value of the stack to exploit multiple versions of Microsoft Word. Once installed, | |
| RipGof.B attempts to connect to enjoy.irdet.com and enjoy.bmwsee.com over TCP port 80. It | |
| runs as a rootkit and backdoor Trojan horse and phones home to a Chinese server with stolen | |
| data. | |
| RipGof malicious code does not exist as a distribution in the underground, leading investigators | |
| to look into the original RipGof.A malicious code. Over a year prior to the 2006 targeted attacks | |
| RipGof.A emerges in the wild. RipGof.A attempted to exploit the Jet Engine Database exploit in | |
| March 2005. This proves attempted exploitation and installation of code through RipGof for a | |
| year prior to more sophisticated codes and attacks. | |
| In summary, RipGof and GinWui attacks both use the same private exploit code against | |
| Microsoft Word and both install rootkit based codes to steal and send information back to | |
| Chinese sources. This circumstantial evidence reveals that Wicked Rose and the NCPH group | |
| likely began their exploitation efforts at least a year and a half to two years prior to sophisticated | |
| attacks that commenced in 2006. Once the group found a vulnerability within Microsoft Word | |
| they were able to improve upon it and their targeted attack techniques to distribute multiple | |
| targeted attacks and malicious codes for criminal gain as hackers for hire. | |
| Timeline of Events | |
| Wicked Rose and the NCPH hacking group are implicated in multiple Office based attacks over | |
| a two year period. An attack in 2006 used RipGof.B in the attack. RipGof.A first emerged a | |
| year earlier using an exploit that is relatively unsophisticated. Over the next year the Evil | |
| Security Team, also out of China, creates the Dasher worm and uses the PcShares Trojan in an | |
| attack. Wicked Rose gives a recommendation on the Trojan the day it is updated in the spring of | |
| 2006, showing a close affiliation between Wicked Rose and the Evil Security Team actors. | |
| Multiple attacks that take place in May and June and later 2006 are related to privately held | |
| exploit code for both Microsoft Word and Excel, proven to be developed by Wicked Rose. A | |
| timeline of proven associated events related to Wicked Rose attacks is below: | |
| April 22, 2005 - RipGof.A JetEngine DB Attack | |
| Dec. 19, 2005 | |
| Dasher worm and PcShare Trojan attack by Evil Security Team | |
| April 27, 2006 Update to windowsupdates.net attack site | |
| April 30, 2006 - Wicked Rose Drops out of School | |
| May 2, 2006 | |
| 3.0beta3 NCPH remote control (GinWui) public release | |
| May 12, 2006 - Initial probing and GinWui.A exploitation attempts against US target | |
| May 15, 2006 - PcShare Trojan update recommended by Wicked Rose on day of new release | |
| May 16, 2006 - Update to windowsupdates.net attack site | |
| May 16, 2006 - Multiple GinWui.A attacks against US target | |
| May 18, 2006 - SANS reports zero-day attack | |
| May 19, 2006 Update to windowsupdates.net attack site | |
| May 20, 2006 - GinWui.B Attack | |
| May 20, 2006 - WZT Kicked out of NCPH | |
| May 29, 2006 - GinWui.C Attack | |
| June 1, 2006 Update to windowsupdates.net attack site | |
| June 9, 2006 | |
| Mdropper.F Attack | |
| June 14, 2006 | |
| Daserf.A Attack | |
| June 15, 2006 | |
| Mdropper.G Attack | |
| June 15, 2006 | |
| Booli.A Trojan Attack | |
| June 16, 2006 - Flux.E Attack | |
| June 18, 2006 - RipGof.B Attack | |
| June 23, 2006 | |
| PPDropper.A | |
| June 23, 2006 | |
| Booli.B Trojan attack | |
| June 25, 2006 - GinWui.D Attack | |
| June 26, 2006 - GinWui.E Attack | |
| Sept. 27, 2006 | |
| PPDropper.F Attack | |
| Sept. 30, 2006 | |
| GinWui.G Attack | |
| Oct. 9, 2006 | |
| Wicked Rose reports pay increase; likely in September | |
| A Pictorial Introduction to Wicked Rose and NCPH | |
| Just who are Wicked Rose and the NCPH hacker group? As it turns out, a collection of college | |
| students in China who likely room with one another and regularly support their hacking interests. | |
| In-depth research implicates Wicked Rose as the ring-leader of the group, responsible for | |
| managing hacker for hire relationships and paying group members for their work as hackers. | |
| During the time of targeted attacks in 2006 their income increased significantly, to full-time | |
| wages for part time hacking. Wicked Rose, leader of the group, is pictured below: | |
| (MeiGui HeiKe) | |
| Rose Hacker | |
| QQ number is 5372453 www.mghacker.com | |
| Wicked Rose maintains a personal site at www.mghacker.com. | |
| Wicked Rose's Website: www.mghacker.com | |
| Rose is an approximate 20-year-old (2006) student at the Sichuan University of Science & | |
| Engineering. In the spring of 2006 Wicked Rose claims to have dropped out of school for full | |
| time hacking opportunities. Specifically, on April 30, 2006 his blog entry claims he did not | |
| register for his university exam. He performed significant updates to his rootkit code from | |
| March through June 2006. He later returned to school by September 2006. | |
| Wicked Rose claims responsibility on his blog for targeted e-mail based attacks containing | |
| Microsoft Word and CHM exploits from the spring of 2006. | |
| Other NCPH-member websites include: http://rodag.blogbus.com, | |
| http://www.cppblog.com/charles and http://kungbim.blogbus.com. The main NCPH website is | |
| www.ncph.net: | |
| NCPH Studio website www.ncph.net | |
| Registration information for ncph.net reveals a Chinese registrant: | |
| Registrant Contact: ncph studio ([email protected]) si chuan li gong xue yuan | |
| zigong, Sichuan, cn 643000 P: +86.13154663992 F: +86.13154663992 | |
| The main location of the NCPH group is in Zigong, Sichuan Province, in south-central China. | |
| Zigong, Sichuan Province, in south-central China | |
| The NCPH group (NCPH Studio) in Zigong, China, is shown here: | |
| NCPH hackers at work in the | |
| ncph studio | |
| Left to right: | |
| Wicked Rose, | |
| KuNgBiM, Charles and Rodag | |
| Additional photos featuring Wicked Rose and NCPH hackers are below, captured from their | |
| various websites and blog entries in 2006. Chinese translation for each photo are below: | |
| "Wicked Rose" | |
| From an ancient Chinese poem, | |
| expressing the devotion of his heart for | |
| hacking. | |
| "After you choose the technology you | |
| love, you have to research every system | |
| and code everyday!" | |
| Charles: "Silence belongs to our | |
| world..." | |
| Charles | |
| "Charles always laughs so brightly when | |
| searching for program problems!" | |
| KuNgBiM | |
| "Only we can feel this kind of happy..." | |
| Ronag | |
| "Behind every successful design, he | |
| always has a slight smile | |
| Wicked Rose and NCPH hacking photos | |
| WHG ( | |
| WHG is not a core member of NCPH but a close affiliate of Wicked Rose. WHG appears to be | |
| central to development of the NCPH rootkit, aka GinWui. WHG is credited by Wicked Rose as | |
| one of the authors of this malicious code. WHG is an experienced malicious code author with | |
| the following contact information: | |
| E-mail address: | |
| QQ Number: | |
| Website: | |
| Real Name: | |
| Location: | |
| [email protected] | |
| 312016 | |
| http://cnasm.com | |
| May be "Zhao Jibing", | |
| Believed to be employed in the Sichuan province of China. | |
| WZT is a former member of the NCPH group who was kicked out during the time of zero-day | |
| attacks in May 2006. WZT was removed on May 20, 2006. During this time period the zeroday attacks became publicly disclosed, increasing pressure upon the hacking group. It is feasible | |
| that WZT may have offended the group in some way related to zero-day attack techniques, strife | |
| over hacker for hire deals, or competition for hacker for hire deals. | |
| WZT is a former coding expert within the NCPH group and many years experience in hacking. | |
| He is responsible for creating multiple tools and regularly giving credit to the infamous Li0n | |
| Chinese hacker (founder of Honker Union (HUC) Chinese group. WZT maintains a website at | |
| tthacker.cublog.cn. | |
| The Jiangsu Connection? | |
| WHOIS registrant data for related domains used within attacks and hacker sites reveals a | |
| connection with the Jiangsu province of China. One domain, windowsupdates.net, is used in | |
| attacks and revolves to an IP address in the Sichuan province. Meanwhile, the registrant | |
| "zhaofeng network" is reportedly based out of Jiangsu, not Sichuan. Some of the WHOIS | |
| information clearly contains fraudulent information to presumably direct researchers away from | |
| the true identity and location of the attacker responsible for registering the hostile domain. The | |
| connection to the Jiangsu and Sichuan provinces remains unclear. | |
| Concluding Comments | |
| Prior to Wicked Rose and NCPH hacker for hire attacks in 2006, Chinese hackers are only | |
| known for their patriotic hacking. This disturbing development reveals two critical threats: 1) | |
| motives of Chinese hackers are changing 2) Chinese hackers are regularly associated with | |
| sophisticated attacks as of 2006. | |
| Wicked Rose implicates himself in his early blog entries and website posts in 2006 and prior. | |
| An unknown company or entity reportedly paid Wicked Rose for hacking at the rate of 2,000 | |
| RMB a month, about $250 USD. At this time Wicked Rose gave 200 RMB to NCPH hackers | |
| and kept the rest for himself. Once targeted attacks took place the payment increased five-fold to | |
| 5,000 RMB monthly with $1,000 a month going to NCPH hackers. This is a significant amount | |
| of money in China, effectively paying hackers a full-time wage for part-time hacking. | |
| Throughout the summer of 2006, while Wicked Rose was not in school, over 35 zero-day | |
| attacks, proof-of-concept codes, and attacks against un-patched Microsoft Office vulnerabilities | |
| are discovered in the wild. With Wicked Rose claiming responsibility for early attacks and the | |
| lead author of both GinWui and the NCPH hacking group, there is little doubt left as to his | |
| involvement in attacks to date. | |
| By the end of 2006 attacks become increasingly sophisticated. In one instance a popular | |
| PowerPoint file distributed during the Christmas holiday season for the last two years prior is | |
| used within a socially engineered attack upon one individual within an energy sector US based | |
| company. The PowerPoint file is modified to include an exploit that silently installs malicious | |
| code. This same individual receives another e-mail containing a Microsoft Word exploit. In this | |
| case only one individual within the company is targeted, and with just two messages socially | |
| engineered for maximum success. This is a much more targeted and stealthy approach for | |
| attacks compared to the earlier attacks performed by the group in the late spring of 2006. | |
| NCPH continues to be a significant threat going forth for several reasons. | |
| 1. Attacks continue to take place in the wild and are very difficult to identify on a targeted | |
| basis. Only the most sophisticated networks and system administrators are able to | |
| properly protect and capture hostile targeted attack files before an attack takes place. | |
| 2. NCPH is a serious dedicated hacking group that is methodical and disciplined in their | |
| development of new exploits and attacks. | |
| 3. NCPH is motivated by both the thrill and challenge of hacking and money as a motive. | |
| 4. Attacks by the group are highly targeted and stealthy, very difficult to detect and remove. | |