Advertisement
lfsoft

The amazing forensic work of Mr Andrew Kelly aka Spiney

Aug 25th, 2019
550
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.71 KB | None | 0 0
  1.  
  2. The amazing forensic work of Mr Andrew Kelly aka Spiney
  3. -------------------------------------------------------
  4.  
  5. The follows a brief analysis of the forensic work and open-source-intelligence of Mr Andrew Kelly, who deciphered a vast cache of child abuse material that, as well as being cleverly encrypted, contained huge amounts of "noisy" data, used to obscure the images contained in the cache.
  6.  
  7. Let first explain how the disks were encrypted.
  8.  
  9. The fist stage was a standard password-locked folder system, easy to exploit using known vulnerabilities in the windows XP kernel.
  10.  
  11. After this, they had used the "truecrypt" software to create sub-volumes, mounted as hidden files. The media were contained in folder/volume stacks several layers deep, but easy to unlock with the correct information.
  12.  
  13. Lastly, they deleted the files, but then subsequently, prevented write-access to protect the contents of the "deleted" files, which were simple to recover using the "undelete" command in DOS.
  14.  
  15. Luckily, spiney was able to locate an 0day in truecrypt, allowing the filesystems to be accessible without the secret key.
  16.  
  17. This took a week, from the beginning of the op, to the uncovering of the actual files. We were in a lock-up and had little access to facilities.
  18.  
  19. The discovery of the 0day occurred at this time, which meant that the previous weeks work, which involved a timing-based assault on the encryption, had been pointless - we had uncovered little more than a few bits from the key. However we now had full access to the drives.
  20.  
  21. Next, spiney went about decrypting the caches. There were 5 disks, three of which had content, resulting in several terabytes of raw data.
  22.  
  23. The folders were full of deliberate clutter, but software was used to locate the image caches. These were found to contain a vast amount of sexualised images of children. (more caches were found later which contained the most serious category, however these disks were lost and never found, presumed destroyed).
  24.  
  25. These were deliberately arranged so as not to break the precise legal limit for the amount of images of naked children set by law; however, our argument was that the arrangement and structure of the caches pointed to a potential distribution network.
  26.  
  27. And this should have been the focus of a further investigation, because in addition to an image cache, there were membership details of illegal websites, including client-side SSL keys (shell logins), and in-browser SSL keys, that would allow a user to access information completely inaccessible from the outside.
  28.  
  29. And these were partly hosted on the dark-web, and partly on obscure URLs hosted privately.
  30. Online caches were found on social media sites, as well as image sharing and file upload sites.
  31. The URLs were shortened and then concealed in encrypted form, often using stenographic techniques.
  32.  
  33. The fact that the image-cachess were concealed at all, and the manner of their concealment, namely, 1) the drives being hidden in a locked case behind a filing cabinet and 2) the encryption and obfuscation of the caches, should also point to the potential of a distribution network.
  34.  
  35. The obfuscation methods are also very interesting, and deserve further notes.
  36.  
  37. Most interesting is the fact that the images were secretly hashed, using base-pixel chroma-key insertion. That is similar to stenography, which had also been used to conceal shortened URLs, pointing to online folder caches on image sharing sites.
  38.  
  39. The online folders were so large that it was impossible to locate the indecent images, and many of these were found to be obscene. However, the images had been grouped by FFT and possibly a neural net, and were all of similar dimensions.
  40.  
  41. The folders contained many thousands of images which all looked very similar - the human eye cannot process these and there was no way, without the requisite key, either a text keyword-phrase to use as a search term, or a chroma-key (just an RGB triplet) obtained from a known pixel, to locate the illegal material.
  42.  
  43. Text keys were concealed using a known or pre-shared grid, comprising a transparent 1-bit image file.
  44. The image was overlaid against a text document, usually obtained via a URL, that reveled the location of the concealed document. The spaces in the grid revealed the letters of the final digest.
  45.  
  46. Also found were logins to a good many sites on "freedom hosting" (the notorious dark-web provider) as well as the "triforce" network hosted at ecatel.
  47.  
  48. No-one volunteered to perform the additional research, and the drives were eventually destroyed.
  49.  
  50. The gang continued to hound spiney, until his death in 2013 from an unknown cause.
  51.  
  52. ------------------------------------------------------------------------
  53.  
  54. https://www.youtube.com/watch?v=Md92-E7F2nc
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement