|
Volume 11, 2009 |
|
Baltic Security & Defence Review |
|
Impact of Alleged Russian Cyber Attacks |
|
By William C. Ashmore * |
|
During a two week period in April and May of 2007 Estonia was the |
|
victim of a sustained massive cyber attack on its information infrastructure. |
|
While the cyber attack was not the first nor was it the largest, it was the |
|
first cyber attack that was directed at the national security of a country. |
|
(Davis, 2009) |
|
The significance of a cyber attack on a small country can be difficult to |
|
measure for a casual observer. Estonia is a small country that can be seen |
|
as a model for the future. Estonians have developed and used internet |
|
technology for voting, education, security and banking (ninety-five percent |
|
of banking operations are done electronically) (Collier, 2007). It is not |
|
uncommon to see a sign for free Wi-Fi internet access at a pub, restaurant |
|
or on public transportation. 1 |
|
Imagine going to an Automated Teller Machine (ATM), while on a |
|
business trip, to get money for meals and lodging and the system is down. |
|
Restaurants and hotels are unable to process your credit card. You try to |
|
send a message to your bank, your work, and your family but the computer |
|
servers are all down. The government is unable to communicate with the |
|
public and its different departments. News agencies are having difficulties |
|
publishing information. The aftermath of a cyber attack can impact anyone |
|
that uses the internet, whether it is an individual, business, or government |
|
that has been affected. By investigating the attack, how it happened, and |
|
Estonia |
|
s reaction, states can decide whether their internet defences and |
|
strategies are adequate. 2 |
|
The cyber attacks on Estonia have implications for both its allies and |
|
adversaries. This article is not meant to establish a complete strategy for |
|
cyber defence but to create a better understanding of how a cyber attack |
|
can have far reaching consequences beyond the immediate aftermath of a |
|
targeted infrastructure. What are the implications for Estonia? Is the |
|
framework of the North Atlantic Treaty Organization (NATO) |
|
appropriate for cyber defence? Is an attack against one really an attack |
|
* William C. Ashmore is a Major in U.S. Army. |
|
Baltic Security & Defence Review |
|
Volume 11, 2009 |
|
against all? Does the Organization for Security and Co-operation in |
|
Europe (OSCE) have the ability to react to cyber attacks? Lastly, does the |
|
Russian Federation have a coherent cyber strategy that it is willing to use |
|
and what have been the consequences for Russia? |
|
Any country that uses the internet as part of its infrastructure needs to be |
|
aware of the vulnerabilities and consequences of a cyber attack on their |
|
system. A coherent strategy must include internet defences that are set-up |
|
in conjunction with technical defences. Currently, legal definitions for |
|
cyber crimes do not exist in all countries. The international community |
|
must examine treaties and update them to better define assistance and |
|
common defence in the event of a cyber attack. Russians have shown the |
|
ability and the desire to use cyber warfare. Cyber strategy by, in defence of, |
|
or against Russia affects more than computer networks. Although, attacks |
|
that originate in China, Japan or the United States may have similar |
|
implications they are outside of the scope of this article. |
|
Internet attacks occur on a daily basis throughout the world. How nations |
|
prepare themselves for an internet attack will determine the impact of a |
|
cyber attack on their infrastructure. The aim of this article is to achieve a |
|
greater understanding of the possible Russian cyber strategy and to |
|
understand the counter measures that can be used to prevent or mitigate |
|
cyber attacks. This awareness could possibly prevent a tactical defeat |
|
during conflict when a cyber attack targeting command and control and |
|
communications infrastructure is blocked. |
|
1. The media accounts |
|
Internet trade magazines and mass media reports were used to gather |
|
evidence on the events surrounding the cyber attack on Estonia. Internet |
|
sources were a major source of information on the subject of cyber |
|
security because of the amount of information that is new and has not yet |
|
been published in books. Several Estonian government officials have |
|
spoken on the issue of cyber attacks at great lengths. Estonian government |
|
documents were also used to analyze the Estonian response to the cyber |
|
attack. Media accounts along with documents from the North Atlantic |
|
Treaty Organization (NATO) and the Organization for Security and Cooperation in Europe (OSCE) were used to analyze the aftermath of the |
|
Estonian cyber attack on organizations and other states. Analysis of |
|
Russian involvement was conducted using western documents. |
|
Volume 11, 2009 |
|
Baltic Security & Defence Review |
|
In order to understand the reasons behind the Estonian cyber attack this |
|
article will explore the social tensions and the cyber attack itself. The |
|
impact that the attack had on the different actors will also be noted. The |
|
reality of the attacks indicates some important implications for Estonia and |
|
other former Soviet satellites to work with NATO to develop a coherent |
|
cyber strategy. Russia |
|
s cyber strategy also has considerable significance for |
|
the United States. This article will conclude with a summary of possible |
|
countermeasures to a cyber attack. |
|
2. Cyber attack on Estonia |
|
The social tensions between Estonians and Estonia |
|
s Russian minority are |
|
key to understanding why there was a cyber attack. Estonia is made up of |
|
1.3 million people where 25.6 percent of the population is Russian (Central |
|
Intelligence Agency, 2008). In 1918, the Estonians gained their |
|
independence from Russia, and in 1940 they were forced into the Soviet |
|
Union. From 1940 until they regained their independence in 1991 Estonia |
|
viewed Russia |
|
s presence as an illegal occupation. Mass deportations were |
|
made, people were summarily executed, and the population was resettled |
|
by ethnic Russians. Russians on the other hand view the Estonians as |
|
ungrateful because they were saved by Russians from the Nazi German |
|
fascists. Today there exists significant animosity between the Russians and |
|
the Estonians that permeate personal relationships and political |
|
interactions within the country and between the two nations. (Vesilind, |
|
2008) 3 |
|
The actual events that occurred in Estonia centred on the Soviet Bronze |
|
Soldier monument. The Bronze Soldier monument is a World War II |
|
Soviet War memorial which memorialized the graves of Soviet Soldiers |
|
who died during World War II. However, over time ethnic Russians had |
|
used the memorial as a rallying site for demonstrations and other forms of |
|
protest against the Estonian government. This led to a decision by the |
|
Estonian government to move the monument to an area that was less |
|
public. (Davis, 2009) |
|
The decision to move the statue led to actual riots in the capital city of |
|
Tallinn on April 27th, 2007. The demonstrations degraded into criminal |
|
activities involving looting and the destruction of private and public |
|
property. Hundreds of demonstrators were arrested, most of whom were |
|
Baltic Security & Defence Review |
|
Volume 11, 2009 |
|
ethnic Russians. The civil unrest was contained, order was restored to the |
|
streets by the Estonian government, and most of the physical damage was |
|
repaired by the next morning. (Davis, 2009) |
|
During this period of civil unrest computers in the Estonian government |
|
and the Estonian national media were hacked into with significant affect. |
|
Some of the attacks on the system were vandalism of sites and some were |
|
distributed denial of service attacks (a cyber attack that disrupts internet |
|
service so that a user cannot access a given computer service). The attacks |
|
started small with a major attack culminating on the Estonian internet |
|
system on May 9th, 2007. This date coincidentally corresponded to the day |
|
the Russians celebrate their victory over the Germans in World War II. |
|
During this time a Russian youth-group conducted protests against the |
|
Estonian ambassador to Russia and against the Estonian Embassy in |
|
Moscow. The protests against the ambassador and the embassy did not |
|
end until the ambassador left the country as part of a deal that was |
|
negotiated by Germany. The Russian government even suspended |
|
passenger rail services between Tallinn and St. Petersburg. The riots, the |
|
protests, the stopping of rail service, and the cyber attacks led to an |
|
increasingly tense relationship between Estonia and Russia. (Davis, 2009; |
|
Kampmark, 2003: 288-293) |
|
The Estonians were able to respond to the cyber attacks in a very |
|
proficient manner, as they were able to coordinate responses that only |
|
caused relatively short term outages instead of any permanent damage to |
|
their IT infrastructure. The Estonian government was able to employ its |
|
Computer Emergency Response Team (CERT) which coordinated IT |
|
responses among government and civilian specialists. However, due to the |
|
ambiguous nature of the internet and the use of fake internet protocol (IP) |
|
addresses the Estonian |
|
s were unable to conclusively prove who initiated |
|
the cyber attacks. (Collier, 2007) |
|
The cyber attacks themselves were not very sophisticated as the attackers |
|
used techniques that had been in existence for several years. The focus of |
|
the cyber attack was to completely shut down the IT structure of Estonia. |
|
The cyber attackers used botnet attacks to perform a distributed denial of |
|
service rendering systems that use the internet useless. Botnets are hijacked |
|
computers that send out mass amounts of information which overwhelm |
|
an internet server. The increase in internet traffic will cause a server to |
|
exceed its bandwidth capabilities and cause it to shut down. The botnets |
|
Volume 11, 2009 |
|
Baltic Security & Defence Review |
|
can be installed well in advance of a planned cyber attack, and they can be |
|
placed in any computer anywhere in the world. If the computer user has |
|
not installed appropriate protective software on their computer they will |
|
not even know that they have been hijacked and that they are participating |
|
in a cyber attack. The botnet attacks on the Estonian IT structure ended as |
|
abruptly as they began leading Estonian officials to conclude that the |
|
attack was a planned and coordinated. (Davis, 2009) |
|
The cyber attacks on Estonia illustrates the vulnerability of IT structures |
|
that rely on the internet. The use of technology can improve personal, |
|
business, and government interactions but it is still vulnerable to attacks |
|
and interruptions. The next section of this article will concentrate on the |
|
implications for Estonia in the aftermath of the cyber attacks. |
|
3. Implications for Estonia |
|
After the cyber attacks in 2007, there were several implications for Estonia |
|
as the country recovered from the cyber wake-up call. Some implications |
|
had an immediate impact on the people and the government of Estonia, |
|
while others were more long term and required a deliberate strategy. The |
|
immediate implication for Estonia was the loss of services for government, |
|
communication, and banking. What emerged from the attack was Estonia |
|
ability to counter and minimize the effects of the attack. There was no |
|
permanent damage to the information technology (IT) structure and |
|
financial losses were minimal, but the significance was frightening. (Collier, |
|
2007) |
|
One of the long term implications is the continued strain on Estonia |
|
relationship with Russia. Members of the Estonian government and |
|
outside observers believe that the attacks originated in Russia, but that fact |
|
remains unproven. The finger pointing between Estonia and Russia began |
|
immediately after the attacks and continues today. Dmitry Peskov, Deputy |
|
Press Secretary for the Russian President said, |
|
Russia can no way be |
|
involved in cyber terrorism and all claims to the contrary are an absolute |
|
(The Baltic Times, 2007a). Andrus Ansip, the Estonian Prime Minister, |
|
and others have accused the Russian government because of the |
|
identification of Russian internet protocol (IP) addresses used in the attack. |
|
To date, Russian involvement has never been proven, but the implications |
|
and belief that they were involved continues to influence and affect the |
|
relationship between Russia and Estonia. (The Baltic Times, 2007b) |
|
Baltic Security & Defence Review |
|
Volume 11, 2009 |
|
After the attacks and recovery, Estonia has been heralded as a leader in |
|
technological security. According to Alexander Ntok, head of Corporate |
|
Strategy at the International Telecommunication Union, |
|
it was |
|
imaginative responses that allowed Estonia to emerge from the spring |
|
cyber attack relatively unscathed |
|
(Collier, 2007). As a result Estonia has |
|
capitalized on the internet security market. They are called upon to assist |
|
during attacks and to speak to different business and IT groups on internet |
|
security issues. Estonian government leaders have spoken to allies, regional |
|
organizations and international organizations to improve IT security and |
|
cooperation. (Ibid.) |
|
When Georgia |
|
s IT infrastructure was attacked in August 2008 specialists |
|
from Estonia |
|
s Computer Emergency Response Team (CERT) travelled to |
|
Georgia and assisted response efforts to counter the attacks (DPA, 2008). |
|
This example demonstrates how Estonia has established itself as a major |
|
player in an emerging field, as they are too small to make a large impact on |
|
the international scene through the use of economic or military power. |
|
Estonia has been able to establish itself as a major player in Europe and |
|
among NATO members as an expert in cyber security and cyber war. |
|
Their expertise has allowed them to lobby for increased IT awareness and |
|
for increased cooperation to defeat or deter future cyber attacks. |
|
(Nikiforov, 2008) |
|
In 2003 Estonia proposed a cyber excellence centre in Tallinn even before |
|
it became a member of NATO. In light of Estonia |
|
s expertise in IT the |
|
NATO Cyber Defence Centre was approved. In May 2008 the centre |
|
opened in Tallinn with Estonia providing the leadership and personnel to |
|
man the centre. Estonia emerged as a leader within NATO and leads the |
|
effort to protect the IT structure of NATO. (Socor, 2008) |
|
The continuous threat of cyber attacks against its IT structure, and the |
|
dedication of public officials to improve IT security resulted in a |
|
comprehensive national cyber security strategy. This strategy, developed by |
|
the Ministry of Defence, was adopted by the Estonian government in May |
|
of 2008, just over a year after the attack on its IT systems. The main |
|
measures of its strategy included IT security measures that strengthened |
|
their defensive posture, as well as developed their expertise and awareness |
|
in the IT field. Estonia now looks to strengthen the international legal |
|
framework to ensure that the IT system is protected by laws, and that |
|
Volume 11, 2009 |
|
Baltic Security & Defence Review |
|
violators of the law will be prosecuted. Estonia has also taken the charge |
|
of increasing international co-operation not just to protect their systems |
|
but to protect the global cyber system. (Estonian Ministry of Defence, |
|
2008) |
|
4. Cyber concerns for former Soviet satellites |
|
What do the countries of Estonia, Georgia, Lithuania and Kyrgyzstan have |
|
in common? They are all former Soviet satellites and have all been allegedly |
|
cyber attacked by Russia. |
|
4.1. Georgian cyber attack |
|
On July 20th, 2008 the website of the Georgian president came under a |
|
denial of service cyber attack. The attack shut the website down for 24 |
|
hours and was a precursor to a larger cyber attack that would come less |
|
than a month later (Melikishvili, 2008/2009). On August 8th, 2008 a |
|
coordinated distributed denial of service attack was made against the |
|
Georgian government websites at the same time that Russian forces were |
|
engaged in combat with Georgian forces. As the ground attacks increased |
|
so did the cyber attacks. This was the first time that a cyber attack was |
|
done in conjunction with armed conflict. (Ibid) |
|
The cyber war between Georgia and Russia focused on shaping public |
|
opinion on the internet. Georgian and Russian supporters used a variety of |
|
cyber techniques including distributed denial of service attacks and the |
|
creation of fake web sites to control how their version of the |
|
truth |
|
was |
|
delivered to the public. (Thomas, 2009:55-59) |
|
Georgia |
|
s IT infrastructure was not very advanced so the disruption of |
|
service was not as complicated as it was in Estonia. Banking, media and |
|
government websites were blocked disrupting the flow of information |
|
throughout Georgia and to the outside world. The websites of the Ministry |
|
of Foreign Affairs and the National Bank were vandalized by adding |
|
pictures of the Georgian President and Adolf Hitler (Melikishvili, |
|
2008/2009). The cyber attacks against Georgia were different from the |
|
cyber attacks on Estonia, as these attacks included distributed denial of |
|
services using botnets, but they also included SQL injection attacks that are |
|
harder to identify than a botnet attack because they require less computers |
|
than a botnet attack. The SQL injection attack shows a greater expertise in |
|
Baltic Security & Defence Review |
|
Volume 11, 2009 |
|
the ability to conduct a cyber attack than the cyber attacks on Estonia |
|
s IT |
|
infrastructure. (Secure Works Press Release, 2008) |
|
Georgia received considerable assistance in countering the cyber attacks |
|
and in communicating internally and internationally. Google provided |
|
domain space to protect the websites of the Ministry of Foreign Affairs |
|
and Civil.ge, a Georgian Daily online news service. A private American |
|
internet service provider (the head of the company is an ethnic Georgian) |
|
assisted the Georgian government by hosting the Georgian President |
|
website. The President of Poland also assisted the Georgian government |
|
by placing official press releases on his website. Estonia even sent two |
|
information security specialists from its Computer Emergency Response |
|
Team to assist Georgia in countering the cyber attacks. According to |
|
outside investigators there is no direct proof of any Russian government |
|
involvement in the cyber attacks. But what is undeniable is that even |
|
without proven Russian government involvement it remains clear that the |
|
Russian government benefited from the cyber attacks. (Melikishvili, |
|
2008/2009) |
|
4.2. Lithuanian cyber attack |
|
Lithuania faced its own attacks in June 2008 three days after it passed a law |
|
outlawing the use of Soviet and communist symbols; over 300 websites |
|
were attacked. Some were denial of service attacks while other sites were |
|
vandalized with the Soviet hammer and sickle. Prior to the attacks and the |
|
passage of the law, Russian and Lithuanian ties had deteriorated because of |
|
Russia |
|
s refusal to compensate Lithuanian victims of Soviet labour camps, |
|
and Russia |
|
s leveraging of energy resources for political gain. Lithuania also |
|
blocked talks on an EU-Russia partnership. The animosities between the |
|
two countries have provided observers with a clear motive that the attacks |
|
were by the Russians. The reason for the cyber attacks against Lithuania |
|
was similar to the cyber attacks against Estonia, both attacks were in |
|
response to a government action that was unpopular to the Russian |
|
people. (McLaughlin, 2008) |
|
4.3. Kyrgyzstan cyber attack |
|
The latest country that has come under a cyber attack from computers in |
|
Russia is Kyrgyzstan. On January 18th, 2009 Kyrgyzstan |
|
s two main |
|
internet servers came under a denial of service attacks shutting down |
|
Volume 11, 2009 |
|
Baltic Security & Defence Review |
|
websites and email within the country. The originators of the attacks were |
|
traced back to Russia (Rhoads, 2009). The attacks occurred on the same |
|
day that the Russian government was pressuring Kyrgyzstan to stop U.S. |
|
access to the airbase at Bishkek at Manas. The airbase is a key logistics |
|
centre that supports the U.S. war efforts in Afghanistan. According to Don |
|
Jackson, a senior security researcher at SecureWorks 4, the distributed denial |
|
of service attacks are believed to be directed towards any opposition that is |
|
not in favour of the closure of the airbase. While it is unproven whether |
|
the government was behind the attacks the implication is that cyber attacks |
|
will be used against any opposition to the Russian government (Bradbury, |
|
2009). |
|
The cyber attacks on Georgia, Lithuania and Kyrgyzstan have two |
|
characteristics in common. The first characteristic is that the cyber attacks |
|
were initiated because of opposition to the Russian government and |
|
secondly that there is no proof that the Russian government was involved |
|
in the cyber attacks. Regardless of who is initiating the attack it is clear that |
|
opposition to the Russian government could result in a cyber attack which |
|
could disrupt critical government infrastructure. |
|
5. Compelling realities for the North Atlantic Treaty Organization |
|
Cyber defence is a critical issue for NATO. U.S. General James Mattis, |
|
NATO |
|
s Supreme Allied Commander for Transformation, articulates the |
|
importance of cyber defence for NATO by stating, |
|
We cannot say that |
|
we are not going to defend the Web that everybody needs |
|
(Tanner & |
|
Peach, 2008). Nations that are party to the North Atlantic Treaty agree on |
|
Article 5 |
|
that an armed attack against one or more of them in Europe or |
|
North America shall be considered an attack against them all |
|
(The |
|
North Atlantic Treaty, 1949). Does a cyber attack fit the requirement of an |
|
armed attack? A senior NATO official asked, |
|
If a member state |
|
communications centre is attacked with a missile, you call it an act of war. |
|
So what do you call it if the same installation is disabled with a cyberattack? |
|
(The Economist, 2007). However, the current political reality is |
|
that they are not the same. Prior to the cyber attacks on Estonia, NATO |
|
cyber strategy was focused on NATO |
|
s ability to protect its own IT |
|
infrastructure. Now, the current reality is, is that the NATO |
|
s strategy |
|
must focus on assisting allies as they protect their own IT infrastructure |
|
during an attack (North Atlantic Treaty Organization, undated a). |
|
Baltic Security & Defence Review |
|
Volume 11, 2009 |
|
Members of NATO have taken several steps in defining a cyber strategy |
|
and implementing a cyber defence. As early as 2002, at the Prague Summit, |
|
cyber defence appeared on NATO |
|
s agenda. At the Prague Summit |
|
NATO leaders agreed to the implementation of a NATO Cyber Defence |
|
Program. The program consisted of a NATO Computer Incident |
|
Response Capability and for NATO to use the latest cyber defence |
|
measures (North Atlantic Treaty Organization, undated a). In the spring of |
|
2006 cyber defence was made a priority for NATO during the Riga |
|
Summit. The issue of cyber security gained even more attention when |
|
Estonia, a NATO member, was cyber attacked in 2007 (EU News, Policy |
|
Positions & EU Actors online, 2008). |
|
NATO conducted a thorough assessment of its IT structure and how it |
|
would defend itself against a cyber attack. This assessment led to an |
|
October 2007 report on cyber defence that was issued to the Allied |
|
Defence Ministers. The report recommended measures to improve |
|
protection against cyber attacks (North Atlantic Treaty Organization, |
|
undated a). What followed was a cyber defence policy in early 2008 and the |
|
creation of a NATO Centre of Excellence for cyber defence in May 2008 |
|
(North Atlantic Treaty Organization, 2008a). In April 2008, during the |
|
Bucharest Summit, cyber defence was part of the summit declaration. The |
|
declaration emphasizes the need to protect key information systems, the |
|
sharing of best practices, and for Allied nations to provide assistance to |
|
counter a cyber attack (North Atlantic Treaty Organization, 2008b). |
|
Even though not all NATO nations are part of the Cyber Defence Centre |
|
the centre works to enhance the cyber defence capabilities of all NATO |
|
members. The centre itself is not even funded by NATO but by the |
|
nations that participate in the running of the centre of excellence. The |
|
centre has been charged with doctrine and concept development, |
|
awareness and training, research, development, analysis, and lessons |
|
learned. The experts at the centre also serve as cyber defence consultants |
|
for NATO members North Atlantic Treaty Organization, undated b). |
|
The compelling reality for NATO is that cyber warfare has affected |
|
member nations and continuous to be a realistic threat for the organization |
|
and for its members. NATO members are continuing to develop ways to |
|
counter future threats by sharing best practice information, information on |
|
technical cyber defences, and by agreeing to assist member nations in |
|
countering a cyber attack. |
|
Volume 11, 2009 |
|
Baltic Security & Defence Review |
|
6. Multilateral initiatives |
|
Only a few international treaties on cyber security exist making |
|
international cooperation to prevent cyber attacks extremely difficult. Even |
|
finding and then holding accountable a person that commits a cyber crime |
|
is almost impossible without some international cooperation (Organization |
|
for Security and Co-Operation in Europe, 2008). In the aftermath of the |
|
cyber attacks on Estonia the European Union commissioned a study to |
|
examine the issues concerning cyber security facing members of the |
|
European Union. This section will examine the European Union study and |
|
other multinational initiatives that have an impact on the cyber security of |
|
former Soviet satellites and Russia. (Cornish, 2009) |
|
6.1. Convention on Cybercrime |
|
The Council of Europe has established a treaty on cyber crime that entered |
|
into force 5 in 2004. Twenty-two Council of Europe member nations, along |
|
with the United States, have ratified the treaty agreeing to international |
|
cooperation concerning cybercrime issues. The Russian Federation has not |
|
agreed to the treaty making it difficult for states to resolve issues with |
|
Russia concerning cyber crimes in an international forum (Council of |
|
Europe, undated a). This treaty is still significant because it is the first |
|
international treaty on crimes committed on the internet (Council of |
|
Europe, undated b). |
|
The main goal of the convention, as stated in the preamble, is to protect |
|
nations against cybercrime, by adopting laws and regulations, and fostering |
|
co-operation internationally. The states that become a party to the |
|
Convention on Cybercrime agree to adopt laws that create criminal |
|
penalties for committing crimes on the internet. The convention outlines |
|
several areas that states have agreed to make criminal statutes on issues |
|
such as illegal access of computer systems, system and data interference, |
|
and other computer related fraud. Nations that are party to the convention |
|
also agree to cooperate with investigations, to provide mutual assistance |
|
concerning cyber crimes, and to pursue the collection of evidence. The |
|
extradition of alleged cybercriminals is also agreed to by parties to the |
|
treaty. Disagreements between states that have ratified the treaty include |
|
direct negotiations, settlement in front of the European Committee on |
|
Crime Problems (CDPC), a tribunal for arbitration or adjudication in front |
|
Baltic Security & Defence Review |
|
Volume 11, 2009 |
|
of the International Court of Justice. The Convention on Cybercrime gave |
|
a framework for cooperation among member states for the prosecution of |
|
cyber criminals by removing safe havens for the cyber criminals. (Council |
|
of Europe, 2001) |
|
However, Russia does agree to the convention and it protects citizens who |
|
engage in cyber misconduct by preventing their extradition out of Russia. |
|
Failing to sign the convention agreement also prevents Russia from having |
|
any legal standing to prosecute trans-national cyber criminals who attack |
|
Russia |
|
s IT infrastructure. |
|
6.2. Organization for Security and Co-operation in Europe |
|
The Organization for Security and Co-operation in Europe (OSCE) has a |
|
tradition of promoting the security and stability of Europe. This tradition |
|
of promoting security and stability since 2004 has included cyber security. |
|
The OSCE |
|
s initial focus on cyber security concerned the use of the |
|
internet for recruiting, fundraising, and communication by terrorist |
|
organizations. In 2006 the OSCE |
|
s efforts began to focus on protecting |
|
vital information infrastructures against cyber attacks. Debate in the OSCE |
|
has not led to great change but has been a forum for further cooperation |
|
in cyber security in Europe. In June 2008, the Estonian Defence Minister, |
|
Jaak Aaviksoo, in an address to members of the OSCE, said there is |
|
immense amount of work to be done [concerning cyber security]. |
|
Minister Aaviksoo used the forum of the OSCE to use his nation |
|
experience in defending against cyber crime to increase international |
|
cooperation in Europe. This statement by the Estonian Defence Minister |
|
sums up OSCE |
|
s efforts concerning cyber defence, they are still in the |
|
talking phase and have at least recognized the importance of cyber defence |
|
(Cornish, 2009:20-21). The OSCE will continue to be a forum to publicize |
|
grievances for European nations that have had their IT infrastructures |
|
attacked by Russian hackers. European nations will judge Russia on its |
|
cooperation with the OSCE in finding and prosecuting individuals who |
|
engage in cyber attacks. |
|
6.3. The European Union |
|
Estonia continues to lobby for improved international cooperation in |
|
cyber security as it calls on the European Union (EU) to pass legislation |
|
concerning crimes committed on the internet. While addressing the |
|
Volume 11, 2009 |
|
Baltic Security & Defence Review |
|
European Parliament, Toomas Hendrik, the Estonian President, called |
|
upon the EU to pass legislation that make cyber attacks against public and |
|
private web sites a criminal act (Jones, 2008). The EU has several initiatives |
|
involving different agencies but lacks an overall cyber security strategy. The |
|
European Commission has the Information Society and Media Directorate |
|
General, the European Network and Information Security Agency |
|
(ENISA), and the Contact Network of Spam Authorities that deal with |
|
different aspects of cyber security. The Information Society and Media |
|
Directorate has a program to improve the content of the internet by |
|
protecting people from child pornography, racism, and other harmful |
|
online content. The ENISA is an agency that was created in 2004 to raise |
|
awareness of cyber security issues and to promote best practices by |
|
member nations with the EU. The Contact Network of SPAM authorities |
|
is an initiative to counter SPAM and share information on best practices |
|
between EU member nations. (Cornish, 2009:24-27) |
|
The European Parliament has established several standing committees |
|
concerned with cyber security issues. The Committee on Industry, |
|
Research, and Technology (ITRE) is concerned with establishing |
|
information technology networks within the EU. The Committee on Civil |
|
Liberties, Justice, and Home Affairs (LIBE) is responsible of the |
|
protection of personal information on the internet for members of the |
|
EU. The Committee on Foreign Affairs is responsible for the Security and |
|
Security policies of the EU which includes internet security policies. |
|
(Cornish, 2009:26) |
|
The European Police Office (EUROPOL) is an agency of the Police and |
|
Judicial Co-operation (PJC) that has more of a direct role in EU cyber |
|
security in the context of combating terrorism, organized crime, and |
|
financial crime (Cornish, 2009:25). Although cyber security is addressed by |
|
the EU there is no organization within the EU to ensure that there are no |
|
contradictions in cyber security policy among all of the various EU |
|
agencies, commissions, and co-operations. The European Parliament |
|
commissioned a study on cyber security published February 2009 that |
|
examined security challenges concerning the internet for the EU. The |
|
study recommended that clear roles should be defined for cyber security |
|
responses with the many EU organizations, including the establishment of |
|
the post of cyber security coordinator and the establishment of a common |
|
operating vision for cyber security in order to achieve operational |
|
consistency across the EU (Cornish, 2009:31). The EU and Russia work |
|
Baltic Security & Defence Review |
|
Volume 11, 2009 |
|
together on different challenges including drug and human trafficking, |
|
organized crime, and counter-terrorism. Russia is also the EU |
|
s third |
|
largest trading partner (European Commission, 2009). The EU |
|
s cyber |
|
security organizations can offer a framework for increased cooperation to |
|
defeat cyber attacks that originate from or are directed at Russia. |
|
6.4. The United Nations |
|
The main purpose of the United Nations (UN) is to maintain international |
|
peace and security among the different nations of the world (United |
|
Nations, 1945). The focus for cyber security for the UN, through the UN |
|
Security Council, has been on countering terrorism. Debates among the |
|
UN General Assembly started in 2002 highlighted the growing dependence |
|
on IT use. Out of discussions came a warning that law enforcement |
|
activities would not be sufficient but that more efforts in cyber security |
|
need to be made on prevention. (Cornish, 2009:17) |
|
The International Telecommunication Union (ITU) is the main |
|
organization that is responsible for cyber security within the UN |
|
framework. The ITU |
|
s goal is to enhance cyber security in order for |
|
individuals, businesses and nations to have confidence in the use of |
|
cyberspace. The ITU uses its Global Cyber Security Agenda, which began |
|
in 2007, to promote its goals of increased cyber security. The ITU has not |
|
been an agency for the enforcement of legislation and international |
|
agreements concerning cyber security but has focused on assisting in |
|
building nation |
|
s capabilities for cyber security (Cornish, 2009:17-18). |
|
Former Soviet satellites can cooperate with the ITU to improve their cyber |
|
defences against cyber criminals from Russia or any other nation. The UN |
|
will continue to be a forum for Russia to voice grievances or defend |
|
themselves against world opinion in matters involving international peace |
|
and security including cyber security. |
|
6.5. Relevance of multilateral initiatives |
|
Although the Russian government cooperates with Europe and other |
|
nations on a variety of economic and security issues, individuals, |
|
organizations, and governments are able to exploit the weaknesses of the |
|
international system in order to use the internet for criminal activities |
|
without fear of any major reprisals. Significant effort has been made |
|
towards cyber security since the cyber attack on Estonia in 2007, but much |
|
Volume 11, 2009 |
|
Baltic Security & Defence Review |
|
more needs to be done among national and international organizations to |
|
ensure genuine cyber security. The framework for increasing cyber security |
|
exists, but it will take the cooperation of many nations, including Russia, to |
|
make a difference in cyber security. |
|
7. Implications for the United States |
|
The cyber attack on Estonia should be considered a significant wake-up |
|
call for the United States. Even though the attacks had no direct impact on |
|
the U.S., Estonia is a NATO ally and the attack clearly showed aggressive |
|
intent seeking advantage. When the attacks occurred the U.S. sent experts |
|
to assist and help Estonia with its cyber defences. Jaak Aaviksoo, the |
|
Estonian Defence Minister, was told by U.S. officials that Estonia coped |
|
better than the U.S. is likely could in responding to a cyber attack. The |
|
Estonian Computer Emergency Response Team (CERT) was able to |
|
concentrate on protecting vital sites by coordinating government and |
|
public efforts. They were also able to create diversions which caused |
|
hackers to attack sites which were already disabled or not very important. |
|
(Collier, 2007) |
|
The cyber attack on Estonia demonstrated the importance of legal |
|
obligations for the U.S. in rendering support to its allies during a cyber |
|
attack (Gee, 2008). The cyber attack also showed the vulnerability of an IT |
|
system, raising the question, if it could happen to Estonia could another |
|
trans-national cyber attack of this magnitude happen in the U.S. (Griggs, |
|
2008)? The convention on cybercrime, which the U.S. is a party to, |
|
outlines principles for providing mutual assistance regarding cybercrime |
|
(Council of Europe, 2001). The convention does not mention cyber |
|
attacks or cyber war but treats such activities as crimes (Korns & |
|
Kastenberg, 2008/2009). Because only 23 countries have agreed to this |
|
treaty, its force in the international community is limited (Gee, 2008). |
|
Several members of NATO are participating in the Cyber Defence Centre |
|
of Excellence that was established in Estonia, but the U.S. only agreed to |
|
the creation of the cyber defence centre as an observer. The cyber defence |
|
centre is working on issues of cyber security that affect NATO along with |
|
the U.S (The Associated Press, 2008). What will the U.S. |
|
s response be if a |
|
cyber attack destroys infrastructure and kills citizens in an allied country, |
|
and then that ally declares war because of the attack? The plausibility of |
|
such an attack was demonstrated in 2007 when scientists from the Idaho |
|
Baltic Security & Defence Review |
|
Volume 11, 2009 |
|
National Laboratory demonstrated how a cyber attack could cause a power |
|
plant to overload its system, begin to smoke, and then break down which |
|
caused physical damage to equipment. Currently, both international law |
|
and NATO |
|
s framework lack coherent responses that are legal in the event |
|
of such an attack. The cyber attackers could limit options for the U.S. |
|
under such a scenario by routing their cyber attack through countries |
|
which do not have laws or agreements to cooperate with the U.S. The |
|
cyber attacker could remain completely anonymous if the country where |
|
the attack was routed through refused to hand over information identifying |
|
the cyber attackers. (Gee, 2008) |
|
Cyber attacks on the U.S. government IT infrastructure are not new. In |
|
March 1998 a cyber attack was launched against computer systems of the |
|
U.S. government, private universities and research labs computer systems |
|
that lasted for over three years. Government investigators named the |
|
attacks |
|
Moonlight Maze. |
|
The cyber attacks targeted gaining access to |
|
sensitive but unclassified information (Abreu, 2001). John Adams, a |
|
National Security Agency (NSA) consultant says that government |
|
investigators have identified seven internet addresses involved in the cyber |
|
attacks that originated in Russia. Dion Stempfley, a former Pentagon |
|
computer analyst, believes that the U.S. prove that the Russian Federation |
|
government is sponsoring the attacks but there is evidence that they are |
|
allowing or otherwise permitting the cyber attacks. The cyber attacks |
|
which resulted in the theft of technical defence information were serious |
|
enough that the U.S. State Department issued a formal complaint to the |
|
Russian Federation. (Loeb, 2001) |
|
In Global Trends 2025, a study conducted by the National Intelligence |
|
Council, states over the next two decades non-military aspects of warfare, |
|
including cyber, will be prominent (National Intelligence Council, 2008). |
|
According to Secure Works, a cyber security company, in 2008 over 20 |
|
million attacks originated from computers within the United States (Secure |
|
Works Press Release, 2008). In 2008 the U.S. Department of Homeland |
|
Security created the National Cybersecurity Centre to counter these threats |
|
(Griggs, 2008). The threats to the U.S. infrastructure and technology are |
|
moving at a much faster pace than the creation of government structures |
|
to counter the threat. |
|
Even a casual observer can see that there is a cyber threat to the U.S., but |
|
how is that connected to any Russian involvement in cyber attacks? There |
|
Volume 11, 2009 |
|
Baltic Security & Defence Review |
|
are three recent examples of how cyber attacks, that may have allegedly |
|
originated in Russia, that demonstrate danger for U.S. and Russian |
|
relations. These examples show how attacks against an IT structure were |
|
used as cyber pressure to influence nations or organizations. |
|
The first example is when Radio Free Europe |
|
s internet sites in April 2008 |
|
in Eastern Europe were shut down because of a denial of service attack. |
|
The attack lasted two days and coincided with the planned coverage of the |
|
anniversary of the 1986 Chernobyl disaster. The attacks effectively shut |
|
down the websites which stopped the flow of information from Radio |
|
Free Europe, a U.S. sponsored program (America.gov, 2008). |
|
Another example is the malware (malware is a term used to identify illegal |
|
computer access including computer viruses) attack on U.S. Department of |
|
Defence computer systems in November 2008. According to WMD |
|
Insights 6 the computer attacks are thought to have originated from Russia. |
|
The attacks seemed to target military computer systems and affected the |
|
U.S. central command along with computers in Iraq and Afghanistan. The |
|
attacks led to a ban on the use of external computer flash drives on |
|
military computers throughout the world. (Melikishvili, 2008/2009) |
|
The latest example of an attack that may have originated in Russia is the |
|
January 2009 denial of service attack that was directed at the government |
|
websites of the Republic of Kyrgyzstan. One theory on why the attack was |
|
started was because of Kyrgyzstan |
|
s support of the U.S. in its war on terror |
|
in Afghanistan. This shows the significance of a cyber attack not directed |
|
against the U.S. but against one of its allies. (Rhoads, 2009) |
|
One senior fellow at the Centre for Strategic and International Studies in |
|
Washington, D.C. believes there is no adversary that can defeat the U.S. in |
|
cyber space. A spokesman for the U.S. Department of Homeland Security |
|
commented that the U.S. government is able to protect itself from cyber |
|
attacks, but the U.S. IT system is not completely impenetrable. The |
|
director of a non-profit research institute, the United States Cyber |
|
Consequences Unit, stated that because the U.S. controls so much internet |
|
bandwidth that most of the people that want to harm the U.S. lack the |
|
capabilities to shut down U.S. servers. (Griggs, 2008) |
|
The U.S. faces a wide variety of challenges in protecting its own IT |
|
structure along with facing the reality of the challenges of its allies |
|
cyber |
|
Baltic Security & Defence Review |
|
Volume 11, 2009 |
|
defences. In the future the U.S. may face cyber attacks that could cause the |
|
deaths of its or its allies |
|
citizens due to the effects of a cyber attack on an |
|
electrical system. The U.S. |
|
s bilateral agreements with countries that hold a |
|
strategic U.S. interest could be affected by the use of a cyber attack to |
|
influence leaders. The cyber threats to the U.S. are real and continued |
|
attention by the leaders must focus on this threat. |
|
8. The weakest link |
|
the computer user |
|
As you read this article you could be an accomplice to a cyber criminal |
|
without even knowing that your computer is conducting a worldwide |
|
distributed denial of service attack. The actions or lack of action of |
|
computer users have contributed to the ability of hackers in Russia and |
|
elsewhere to conduct their attacks in relative anonymity. 7 The internet has |
|
vulnerabilities and the individual computer user contributes to the |
|
vulnerabilities of private and government IT systems. |
|
In 1997 the National Security Agency (NSA) conducted an exercise to find |
|
out how vulnerable government IT systems were to external cyber attacks. |
|
They named the exercise |
|
Eligible Receiver. |
|
Thirty-five IT specialists |
|
were given the mission to hack into government systems. They could use |
|
any software programs that were available on the internet and they were |
|
only given a few limitations. The IT specialists couldn |
|
t use any classified |
|
hacking software that belonged to the NSA and they could not violate U.S. |
|
law. The IT specialists were also confined to U.S. government computer |
|
systems. (Verton, 2003:32-33) |
|
What they discovered was how easy it was to hack into government |
|
systems, into both classified and unclassified networks. With the free |
|
software that they downloaded from the internet, the NSA specialists were |
|
able to conduct distributed denial of service attacks, delete or modify |
|
sensitive information and shut down or reformat systems. Along with the |
|
software they used, personal contact methods were also used to gain access |
|
into the systems. The NSA computer specialists would use telephone calls |
|
or emails to gain passwords or entry into a system by posing as a |
|
supervisor or technician. The IT specialists were surprised at how easily |
|
government and military members delivered their passwords without |
|
question. Even though the exercise was conducted in 1997, and may seem |
|
dated, it gives us a great example of how a dedicated effort can disrupt any |
|
IT system. (Verton, 2003:32-33) |
|
Volume 11, 2009 |
|
Baltic Security & Defence Review |
|
As noted earlier, external flash drives were banned from use with military |
|
computer systems. Authorized users unknowingly passed intrusive |
|
malware files from computer to computer infecting IT systems throughout |
|
the U.S. Central Command. The ban on flash drives complicated the |
|
sharing of information throughout the theatre. The malware file was even |
|
found on a classified network. This is one more example of how an |
|
individual can spread malicious software infecting multiple computer |
|
systems because of a lack of computer security protocols. (Melikishvili, |
|
2008/2009) |
|
One vulnerability that is associated with computer users is that some |
|
people who become hackers are former employees with a grievance against |
|
their former employer. Such people may be motivated by a personal |
|
grudge against the U.S. government because they were fired or lost their |
|
job due to a reorganization or downsizing. Their actions as hackers are |
|
usually malicious in nature as such people steal or corrupt data, deface |
|
websites, or shut down systems. (Conway, 2007:82) |
|
Even more dangerous than an angry former employee is a case of cyber |
|
espionage. This is where an individual who is motivated by money or |
|
ideology sells highly sensitive IT security information. One such case |
|
involves Herman Simm and his wife, Heete Simm, from Estonia |
|
(Melikishvili, 2008/2009). Mr. Simm was arrested in September 2008 for |
|
allegedly passing highly classified information on cyber security and missile |
|
defence to members of the Russian foreign Intelligence Service (SVR). Mr. |
|
Simm was the head of the State Secret Protection Office where he was |
|
responsible for protecting Estonia |
|
s classified information. Mrs. Simm was |
|
a lawyer who was previously employed at the Estonian national police |
|
headquarters. Mr. Simm had access to classified information concerning |
|
NATO and allies of Estonia including the operational information of the |
|
NATO Cooperative Cyber Defence Centre based in Tallinn. If the |
|
Estonian government had access to a secret so did Mr. Simm. The amount |
|
of classified information that was compromised is unknown, but may be |
|
quite large. Mr. Simms allegedly became a Russian spy in the mid-1990 |
|
and was paid millions of dollars from the Russian Government. Regardless |
|
of how secure a country |
|
s IT structure is, it is still vulnerable because some |
|
people will compromise sensitive cyber security information for personal |
|
gain. (Melikishvili, 2008/2009) |
|
Baltic Security & Defence Review |
|
Volume 11, 2009 |
|
Along with the vulnerabilities already mentioned there are always problems |
|
with software products. Some software is easy for hackers to take |
|
advantage of because of security deficiencies. Computers may be infected |
|
before the user or software company has identified the problem. Then it |
|
will take time for the software company to produce a security patch. It will |
|
take even more time to get the patch to the computer program user and |
|
for the security patch to be installed. During this time the infected |
|
computer program may have already infected other computers in a system |
|
or throughout the internet. (Wilson, 2006:15-16) |
|
A major vulnerability for any IT system is the computer user. Whether the |
|
computer user is a military member, a government employee, or just a |
|
computer user sitting in front of his computer at home, their practices can |
|
cause serious damage to a computer system. Normal computer users |
|
receive little or no training in the best security practices. (Wilson, 2006:14) |
|
The cost of poor security practices can be high. Along with the loss of data |
|
or the disruption of service there is also the physical cost associated with |
|
malware and viruses. For example, in 2007 the Federal Bureau of |
|
Investigation (FBI) uncovered a botnet campaign that caused losses of |
|
over 20 million dollars (Cornish, 2009:9). One of the botnet hackers that |
|
was caught by the FBI and sentenced to prison used botnets to steal |
|
peoples |
|
identities and bank account information. After gaining access to |
|
personal information and passwords he made on-line purchases and |
|
transferred money from the bank accounts. Another cyber attacker used a |
|
phishing scheme where he collected information through infected emails |
|
(Wired Staff, 2009). This section highlighted how the computer user has |
|
made IT structures even more vulnerable and the Simm affair |
|
demonstrates how cyber espionage adds to that vulnerability. If countries |
|
like the U.S. and Estonia that have highly developed IT infrastructure can |
|
be attacked, it is not hard to imagine the vulnerabilities less developed |
|
former Soviet satellites have in their IT development phase. |
|
9. The Russian Federation |
|
In this article study several cyber attacks have been attributed to Russia. |
|
Regardless of whether the government of Russia is responsible for the |
|
attacks, or merely sanctioned them, for many the perception remains that |
|
Russia was behind the cyber attacks. I will examine Russia |
|
s use of cyber |
|
warfare against former Soviet satellite states. (Davis, 2009) |
|
Volume 11, 2009 |
|
Baltic Security & Defence Review |
|
The Russian government views itself as the victim in the case of the cyber |
|
attacks on Estonia in 2007. According to sources in the Kremlin the |
|
website of the President of Russia came under a cyber attack. This was |
|
supposedly the largest attack the Russians have faced and it appeared that |
|
the servers used to originate the attack were located in the Baltic States. |
|
The Deputy Press Secretary of the Russian President, Dmitry Peskov, |
|
countered accusations from Estonia with the fact that Russian government |
|
websites are under attack every day from all over the world. (The Baltic |
|
Times, 2007a) |
|
Even as cyber attacks occurred against Georgia, Russians said that they |
|
were also the victims of cyber attacks. Russia Today 8, a major media source |
|
in Russia, was shut down because of a denial of service attacks directed |
|
towards its websites. IT security specialists that work for Russia Today |
|
believe that the denial of service attacks originated from Tbilisi, the capital |
|
of Georgia. (Watson, 2008) |
|
In the aftermath of the cyber attacks on Estonia, Georgia, and other |
|
attacks mentioned in this article, the Russian response was to deny any |
|
involvement in any cyber attack. When confronted with evidence that |
|
some of the attacks originated from Russian government computers |
|
members of the Russian government countered with the fact that |
|
computers from all over the world were hijacked and used to attack |
|
different computer systems. (The Baltic Times, 2007a) |
|
Another fact that Russian officials are quick to point out is that the only |
|
person arrested for the 2007 cyber attacks on Estonia was an Estonian. |
|
Dmitri Galushkevich, a 20 year old ethnic Russian, who was convicted for |
|
the cyber attacks. Some members of the Estonian government have issued |
|
statements doubting the involvement of the Russian government in the |
|
cyber attacks. (Greenberg, 2008) |
|
With the finger pointing that ensues after a cyber attack it is still unclear |
|
who was behind the attacks. The actions of cyber activist groups, or |
|
hactivists, will be examined in the case of the cyber attacks on Estonia and |
|
Georgia. Hactivists are individuals that use cyber attacks to take a patriotic |
|
or political stand on a political or international issue. (Melikishvili, |
|
2008/2009) |
|
Baltic Security & Defence Review |
|
Volume 11, 2009 |
|
During the protests in Estonia, increased chatter and postings on how to |
|
conduct and participate in denial of service attacks were found on Russian |
|
internet chat sites (Melikishvili, 2008/2009). Along with the denial of |
|
service attacks, some of the Estonian government websites were hacked in |
|
order to deface the site. The sayings on the websites were very pro Russian |
|
and very anti Estonian. Joshua Davis in Wired Magazine supports the view |
|
that the reason behind the attacks was nothing more than Russian pride. |
|
(Davis, 2009) |
|
In March of 2009 a member of a Russian pro-Kremlin youth group, |
|
Konstantin Goloskokov, publicly took responsibility for creating the 2007 |
|
cyber attacks on Estonia. Goloskokov is a leader of the youth movement |
|
Nashi that has routinely conducted cyber attacks and intimidation |
|
campaigns on behalf of the Russian government. The government of the |
|
Russian Federation is able to maintain separation from the youth group |
|
because it does not directly fund their activities. The youth groups are |
|
funded by pro-government business owners who are trying to gain favour |
|
from the Russian government (Shachtman, 2009). Goloskokov believes |
|
that his actions were not illegal but were, |
|
an act of civil disobedience |
|
organized within the confines of virtual space |
|
(Buranov, Vodo & |
|
Yegikyan, 2009). The cultural aspects or belief that actions in the cyber |
|
world are beyond the law is a consequence for the Russian government |
|
and how cyber attacks affect their international relationships. |
|
An assistant to Sergei Markov, a member of Russia |
|
s State Duma lower |
|
house, has also admitted to using his own initiative to conduct cyber |
|
attacks against Estonia (Baltic News Service, 2009). Rein Lang, the |
|
Estonian Justice Minister, is contemplating issuing a European arrest |
|
warrant for individuals who have admitted to taking part in the attack. The |
|
idea for the warrant is not to send law enforcement officials into Russia, |
|
but to have the alleged perpetrators arrested whenever they leave the |
|
country (Baltic News Service, 2009). Aleksandr Gostev, director of the |
|
Kaspersky Lab |
|
s Global Research and Analysis Team, explains that hackers |
|
who participate in a distributed denial of service attack violate the Russian |
|
Criminal Code (Article 274, Violation of the Rules Governing the Use of |
|
Computers, Computer Systems, or Networks Thereof) and can be imprisoned for |
|
four years for violating the code. But he also states that the article is rarely |
|
used (Buranov, Vodo & Yegikyan, 2009). The examples of Russian citizens |
|
admitting to participating in the Estonian cyber attacks are grounds for |
|
Volume 11, 2009 |
|
Baltic Security & Defence Review |
|
Russian citizens to be arrested in other parts of Europe if Russia fails to |
|
uphold its own laws. |
|
Similar actions occurred in the Georgian cyber attacks. Messages were |
|
posted on Russian hacker forums on how to participate in shutting down |
|
Georgian websites. The website StopGeorgia.ru was also established as a |
|
private forum to coordinate the denial of service attacks. Jeff Carr, a |
|
network security expert and cyber analyst, established an all volunteer |
|
group to investigate the cyber attacks. Throughout the course of the |
|
investigation, which they named Project Grey Goose, no evidence was found |
|
to implicate the Russian government. This was just another example of a |
|
hactivist movement which had the collective power to conduct a cyber |
|
attack against a government. (Melikishvili, 2008/2009) |
|
The Project Grey Goose investigation has looked at hactivists and how they |
|
can independently conduct cyber attacks. It also focused on a criminal |
|
gang known as the Russian Business Network (R.B.N.). The R.B.N. is based |
|
in St. Petersburg and engages in criminal cyber activities. According to |
|
Don Jackson, the director of threat intelligence at Secure Works, some of |
|
the cyber attacks used against Georgian websites originated from |
|
computers under the control of the R.B.N. As is the case with any cyber |
|
attacks it is very difficult to establish who is completely responsible or if |
|
there is any Russian government sanctioned involvement. (Markoff, 2008a) |
|
This article has already noted that there are other groups involved with |
|
cyber attacks against former Soviet satellites. The evidence of Russian |
|
government involvement will now be investigated (Davis, 2009). Indeed, |
|
some statements made by Russian government officials suggest Russian |
|
government involvement in cyber attacks. Prior to the cyber attacks in |
|
Estonia the Russian government protested the movement of the Russian |
|
memorial, the Bronze Soldier, to the Estonian government. The Russian |
|
government warned how disastrous the move would be to Estonia. What |
|
followed were the protests and the cyber attacks. (Davis, 2009) |
|
The head of the Russian Army Centre for Military Forecast, Colonel |
|
Anatoly Tsyganok, made comments to the Russian news outlet, Gazeta, |
|
about the cyber attacks on Estonia. He believes that there was nothing |
|
wrong with the attacks because there are no international agreements |
|
established. Colonel Tsyganok also believes that NATO couldn |
|
t do |
|
Baltic Security & Defence Review |
|
Volume 11, 2009 |
|
anything to stop the attacks, and that they were highly successful. |
|
(prygi.blogspot.com 9, 2008) |
|
The most telling example of Russian government involvement in cyber |
|
warfare was with Herman Simm selling IT secrets to the Russian Foreign |
|
Intelligence Service that was discussed earlier in this article. This examples |
|
shows that the government of the Russian Federation is actively seeking |
|
information on cyber defences and is willing to pay large sums of money |
|
(Mr. Simm is accused of selling cyber security secrets for millions of |
|
dollars) to receive information on cyber security. (Melikishvili, 2008/2009) |
|
There are also cases where cyber attacks were used against people who are |
|
in opposition to the Russian government. One such example is with Gary |
|
Kasparov, Russian opposition party leader, had his website shut down for |
|
two weeks due to denial of service attacks during the Russian presidential |
|
campaign. John Palfrey, a researcher at Harvard Law School, believes that |
|
several organizations in Russia who plan to protest, or act in opposition to |
|
the Russian government, are subjected to cyber attacks in an attempt to |
|
control the information that is getting to the public. (Greenberg, 2008) |
|
Another example of Russian government complicity is the lack of |
|
assistance or interest in tracking down those responsible for the cyber |
|
attacks against governments of former Soviet satellites (Davis, 2009). The |
|
evidence of government involvement remains circumstantial, but certain |
|
facts are clear concerning cyber security and former Soviet satellites. If |
|
there is opposition to Russian Federation policy than that country that is in |
|
opposition is likely to be subject to a cyber attack and it has been shown |
|
that the Russian Federation actively collects information on other |
|
countries cyber defences. |
|
10. The future of Russian cyber warfare |
|
The perception exists among different nations (some of those nations have |
|
been discussed earlier in this study) that the government of the Russian |
|
Federation has been involved in cyber attacks. This section will examine |
|
future trends concerning the use of cyber attacks by, or sanctioned by, the |
|
Russian Federation government. The cyber attacks against Estonia and |
|
Georgia have forced Russia to evaluate its future cyber strategy. In |
|
examining the Russian focus on improving its cyber strategy some |
|
Volume 11, 2009 |
|
Baltic Security & Defence Review |
|
conclusions can be drawn about the future of Russian cyber warfare. |
|
(Panarin, 2008) |
|
As with many countries that have an advanced IT system, a sub-culture of |
|
hacking has developed. Even though the state sponsored university in St. |
|
Petersburg produces computer programmers that are highly regarded it is |
|
believed that most of the hackers are young and not educated at the |
|
university level. The reason behind the growth of Russian computer |
|
hackers is the prestige and monetary reward that hacking garners in a |
|
growing IT infrastructure. (Varoli, 2000) |
|
The criminal organization, R.B.N., has been able to conduct its cyber |
|
activities with little interference from the Russian Federation government. |
|
The R.B.N. is very difficult to track on the internet as they are able to |
|
locate their activities from several different locations. The group has been |
|
involved in several different types of criminal cyber activities such as the |
|
use of malware, identity theft, and child pornography. Without any |
|
concerted effort to stop the R.B.N., and their ability to operate anywhere, |
|
R.B.N. is an organization that is positioned in Russian cyber activities now |
|
and in the future. (Markoff, 2008a) |
|
One example of latitude and scope created by Russian indifference, a |
|
group identified by a computer security firm as a Russian gang conducted a |
|
botnet based computer operation operating in Wisconsin. The Russian |
|
gang was controlling as many as 100000 computers in an effort to steal |
|
passwords and information. As soon as the system was shut down the |
|
Russian gang moved its host computer system to a site in the Ukraine. This |
|
shows how resilient these gangs are when they can relocate their operating |
|
systems to countries that are out of reach of law enforcement of the |
|
country that they are targeting. (Markoff, 2008b) |
|
The Russian responses to the recent cyber attacks are a guide to how they |
|
will react in the future. Valery Yashenko, vice director of the Institute of |
|
Information Security Issues at Lomonosov Moscow State University, |
|
advises the Russian government on the issues of cyber terrorism. |
|
Yashenko believes that there should be greater international cooperation |
|
concerning cyber security but does not think that the cyber attack on |
|
Estonia was of any real consequence. Yashenko indicates that the Russian |
|
Federation government is only concerned with cyber security matters that |
|
affect his own government. (Davis, 2009) |
|
Baltic Security & Defence Review |
|
Volume 11, 2009 |
|
Not surprisingly, the Russian Federal Security Service (F.S.B.) is believed |
|
to employ its own hackers (Varoli, 2000). The manner of recruiting is a |
|
little different than normal ways of looking for employees. When an IT |
|
specialist or hacker is caught committing a cyber crime they may receive an |
|
offer to work for the F.S.B., or face criminal charges. According to a |
|
Russian computer security specialist hackers that were working for the |
|
F.S.B. attacked pro-Chechen web sites. According to the same computer |
|
security specialist the F.S.B. hackers have hacked into opposition |
|
newspapers in order to control information about the Russian Federation |
|
government and its leaders. The recruitment of hackers for offensive cyber |
|
attacks vice cyber defences is an indication of the future Russian |
|
Federation government cyber strategy. (Varoli, 2000) |
|
The Russian Federation government has shown the capability for law |
|
enforcement in cyber space. Laws exist in Russia that make crimes |
|
committed on the internet punishable under the law. Russia has even |
|
established a computer crime unit, which it called Department |
|
which |
|
operates under the Ministry of Internal Affairs of the Russian Federation |
|
(MVD). Department |
|
is responsible for the detection, prevention, |
|
suppression, and solving crimes involving information technology. In |
|
2008, Department |
|
was able to identify 158 computer crimes and shut |
|
down seven illegal internet operations. The MVD is currently conducting |
|
Project |
|
Clean Network |
|
aimed a combating illegal uses of the internet |
|
(Ministry of Internal Affairs of the Russian Federation, undated). It |
|
remains to be seen whether the efforts of Department |
|
will have any |
|
negative impact on the R.B.N. or the cyber gangs that support the Russian |
|
government. |
|
The Russian Federation Public Chamber 10 organized a discussion on |
|
Russian information warfare in September 2008 and Just Russia 11 political |
|
party hosted an international conference on information warfare in |
|
October 2008. The conclusions of the meeting were that Russia has grossly |
|
underestimated the role of information warfare and failed to |
|
champion |
|
their goals and interests in the world media. (Panarin, 2008) |
|
Dr. Igor Panarin, the Dean of the Faculty of International Relations of the |
|
Ministry of Foreign Affairs Diplomatic Academy in Moscow, used the |
|
information warfare discussions to make several recommendations to the |
|
Russian government concerning information and cyber warfare. Dr. |
|
Volume 11, 2009 |
|
Baltic Security & Defence Review |
|
Panarin proposes that Russia develop specialized management and |
|
analytical structures to counter information threats. Dr. Panarin proposes a |
|
system that has eight key components. (Panarin, 2008) |
|
The first component is the creation of a Council for Public Diplomacy that |
|
will develop a single point of view for both the Russian government and |
|
Russian businesses. Government and business leaders are to be included |
|
on the council in order to ensure that all activities concerning foreign |
|
political media are coordinated. The second component is to create an |
|
advisor to the President of Russia for Information and Propaganda |
|
Activities in order to coordinate the foreign political information activities |
|
of the administration of the President, the government, different |
|
ministries, and the Russian Security Council. (Panarin, 2008) |
|
The third and fourth components are to create state holding companies, |
|
one for foreign media affairs and one for the internet. The holding |
|
companies would be combined between business and government to see |
|
that Russian political positions were broadcast to the world. The |
|
information would not just be focused towards ethnic Russians but would |
|
be focused globally towards economic partners, future partners, |
|
adversaries, and overall world opinion. (Panarin, 2008) |
|
The fifth component would be the creation of an information crisis action |
|
centre in order to ensure that Russia maintains the initiative when |
|
delivering the state message to the world. The information crisis action |
|
centre would be responsible for developing talking points and themes that |
|
would support the government in any crisis. (Panarin, 2008) |
|
The sixth component would create an information countermeasures |
|
system that would counter enemy information operations. The information |
|
countermeasures system would include assets from business and the |
|
government. The seventh component focuses on a system on |
|
nongovernmental organizations that would operate throughout the world. |
|
(Panarin, 2008) |
|
The final component would consist of a system for training information |
|
warfare specialists. This system would use existing educational institutions |
|
and academies to train specialists that would be able to operate at the |
|
diplomatic, management, or individual level. The training system would |
|
Baltic Security & Defence Review |
|
Volume 11, 2009 |
|
also include the creation of an Information Special Forces that are highly |
|
trained to for conducting information operations in a crisis. (Panarin, 2008) |
|
Along with the creation of the information warfare system Dr. Panarin |
|
believes that financing for information warfare needs to be increased by |
|
both the Russian government and by Russian businesses. The increased |
|
attention on information warfare is designed to increase Russia |
|
s image |
|
throughout the world and ensure that Russia is prepared for future conflict |
|
in the cyber and information arenas. (Panarin, 2008) |
|
Statements by Russian government officials have been very similar to Dr. |
|
Panarin |
|
s position which makes the future of cyber warfare in Russia |
|
offensively poised. Colonel Aleksandr Drobyshevskiy, head of the Russian |
|
Federation Ministry of Defence Directorate for Press Service and |
|
Information, stated that Georgia won the information war during the |
|
conflict in South Ossetia and there is a need for the development of |
|
information and telecommunications technologies within the Ministry of |
|
Defence. Colonel Drobyshevskiy further advocates the creation of an |
|
information warfare system. (Svobodnaya Pressa, 2009) |
|
Another clue to the future of Russian cyber warfare is the development of |
|
a new information warfare defensive strategy by the Russian Armed Forces |
|
General Staff. Colonel-General Anatoliy Nogovitsyn, Deputy Chief of the |
|
General Staff, stated that leading world powers will be able to conduct fullscale information warfare and that Russia must be prepared (Usov, 2009). |
|
General Nogovitsyn believes that Russia will be involved in a large-scale |
|
information war within two to three years that will be fought in the cyber |
|
world (Litovkin, 2009). |
|
The existence of hackers that support the Russian government and |
|
information specialists within the Russian government have created an |
|
asset that will be used during future cyber conflicts. The Russian |
|
government |
|
s emphasis on developing cyber strategies will enable Russia to |
|
be prepared for future cyber conflict. |
|
11. Countermeasures |
|
We need to examine what can be done to counter cyber crimes and protect |
|
a nation |
|
s IT structure. Cyber countermeasures can be taken at the |
|
international level, followed by cyber defences at the national level, and |
|
Volume 11, 2009 |
|
Baltic Security & Defence Review |
|
ending with actions that an individual computer user can make to improve |
|
cyber defence. |
|
The International Telecommunication Union (ITU), the organization |
|
within the UN that is responsible for the international oversight of the |
|
world |
|
s telephone system, is developing a system for oversight of the |
|
internet. The ITU is working towards a convention against cybercrime that |
|
will provide international cooperation on issues concerning internet |
|
communications (Schrank, 2007). Members of the international |
|
community will need to work together in order to track and prosecute |
|
cyber criminals that operate outside of the country that is being attacked. |
|
Nations will also have to work together to share technical data to maintain |
|
cyber defences to keep up with the newest and ever changing cyber |
|
attacks. Hackers routinely share information on new techniques that can |
|
penetrate IT defence structures. Nations need to do the same to protect |
|
their own IT infrastructure, the same IT structure that affects the entire |
|
globe (Lipson, 2002:47-48). |
|
Individual countries can improve their cyber defences within their own |
|
boundaries which would also improve the cyber security of the |
|
international IT system. Countries can make laws making cyber crimes |
|
illegal with punishments and programs that will deter potential cyber |
|
criminals. Governments can create a system that increases co-operation |
|
between the government, businesses, and academic institutions in order to |
|
improve their cyber defences. This co-operation could lead to an IT |
|
infrastructure that is resilient and able to withstand and recover from a |
|
cyber attack with little or no permanent damage to a country |
|
s IT structure. |
|
(Schrank, 2007) |
|
In 8th section the computer user was identified as the weakest link in an IT |
|
system. Some individual countermeasures are easy to accomplish for any |
|
computer user. Actions like keeping antivirus and anti-spyware software up |
|
to date along with updating your web browser and operating system can |
|
greatly enhance your own computer security. Even following safe |
|
computer practices of not opening unknown attachments on emails that |
|
may carry viruses or malware are very instrumental in making the cyber |
|
environment more secure (Secure Works Press Release, 2008). The U.S. |
|
Department of Homeland Security (DHS) has tips for computer users |
|
posted on their website to increase internet security. The main points of |
|
the DHS website are to promote personal responsibility for increasing |
|
Baltic Security & Defence Review |
|
Volume 11, 2009 |
|
cyber security and to promote best practices for safe computer usage. The |
|
best practices that DHS advertises are to make cyber security a habit by |
|
following three core practices. The three core practices are to |
|
install antivirus and anti-spyware programs and keep them up to date, install a |
|
firewall and keep it properly configured, and to regularly install updates on |
|
your computer |
|
s operating system |
|
(Homeland Security, 2008). Computer |
|
users are the first line of defence in cyber security and their actions can |
|
help protect the cyber infrastructure that is used by all. |
|
Conclusion |
|
The international system is lacking in its ability to effectively manage issues |
|
of cyber security. The Russian Federation is perceived by the international |
|
community as a country that engages in or supports groups that are |
|
involved in cyber crime. International and regional organizations along |
|
with countries that interact with the Russian Federation have to deal with a |
|
reality that they may be the target of a cyber attack if they are in opposition |
|
to the government of the Russian Federation. |
|
The issue of cyber security is ongoing. As more of the former Soviet |
|
satellites become more developed with an advanced IT structure they will |
|
have to face the realities of cyber attacks. Regardless of whether the |
|
government of the Russia Federation has been involved in any cyber |
|
attacks, or will be in the future, the reality remains that nations, groups, or |
|
individuals that are in opposition to Russia may face a cyber attack. The |
|
cyber attacks will be used to influence public opinion or to influence |
|
government leaders through the use of cyber pressure. Future conflicts |
|
that involve the use of force will also see cyber attacks in conjunction with |
|
combat operations. Currently international agreements and laws are |
|
inadequate which allows cyber attackers to take advantage of the lack of |
|
such laws and can conduct acts of civil disobedience on the internet. |
|
The conflict in Georgia has been a motivator for military reform which |
|
includes reform in the cyber arena. The Russian government and the |
|
Russian military will continue to develop systems to improve both their |
|
offensive and defensive cyber capabilities. Russia will continue to capitalize |
|
on their diaspora present throughout the world to support their political |
|
positions but will have to realize that some of that diaspora will be in |
|
opposition to them and provide private support to organizations and |
|
nations that have received cyber attacks. Russia |
|
s active collection of cyber |
|
Volume 11, 2009 |
|
Baltic Security & Defence Review |
|
defence secrets will also be a combat multiplier for them in future conflicts |
|
either alone in the cyber world or as part of a ground conflict. |
|
Organizations and nations will be best served by creating a resilient |
|
defence in depth while educating users and managers of IT systems in best |
|
practices to counter the threat of a cyber attack. This defence in depth |
|
includes technical responses to counter the threats while ensuring that their |
|
IT systems are resilient and become effective after an attack. President |
|
Bush remarked in 2001 that, |
|
s time to work together to address the new |
|
security threats that we all face. And those threats are not simply missiles |
|
or weapons of mass destruction in the hands of untrustworthy countries. |
|
Cyber-terrorism is a threat, and we need to work on that together |
|
(Verton, 2003:248). |
|
References: |
|
Aaviksoo, Jaak, 2007 (Nov. 28th). Address by the Minister of Defence of the Republic of |
|
Estonia, at The Centre for Strategic & International Studies, Washington, D.C. |
|
Abdullaev, Nabi, 2006 (Oct 31st). New |
|
Just Russia |
|
Party Says Putin Knows Best. |
|
Petersburg |
|
Times. |
|
http://www.times.spb.ru/index.php?action_id=2&story_id=19303; |
|
(accessed |
|
April 10th, 2009). |
|
Abreu, Elinor, 2001 (May 10th). Epic cyberattack reveals cracks in U.S. defense, |
|
(CNN.com, |
|
2001) |
|
http://archives.cnn.com/2001/TECH/internet/05/10/3.year.cyberattack.idg/ |
|
(accessed April 10th, 2009). |
|
Anon. 2007 (May 12th). A Cyber-Riot. The Economist. p. 55. |
|
http://lumen.cgsccarl.com/login?url= |
|
http://search.ebscohost.com/login.aspx?direct=true |
|
&db=a9h&AN=25048355&site=ehost-live; (accessed December 19th, 2008). |
|
Baltic News Service, 2009 (March 12th). Estonian Minister Lang Says European |
|
Arrest Warrant Possible for Cyber Attackers. Baltic News Service. |
|
https://www.opensource.gov, Document ID EUP20090312010002; (assessed |
|
April 10th, 2009). |
|
Bradbury, Danny, 2009 (Feb. 5th). The Fog of Cyberwar. The Guardian. |
|
http://www.guardian.co.uk/technology/2009/feb/05/kyrgyzstan-cyberattackinternet-acess; (accessed March 22nd, 2009). |
|
Buranov, Ivan; Vodo, Vladimir and Yegikyan, Seda. 2009 (March 12th). ProKremlin Activist Admits Attack on Estonian Websites, Denies Criminal |
|
Wrongdoing, Translated by Open Source Centre. Moscow: Konmersant Online. |
|
Baltic Security & Defence Review |
|
Volume 11, 2009 |
|
https://www.opensource.gov, Document ID CEP20090312021013; (accessed |
|
April 10th, 2009). |
|
Central Intelligence Agency, page updated as of Dec. 4th, 2008. The World Fact |
|
Book, |
|
Estonia. |
|
https://www.cia.gov/library/publications/the-worldfactbook/geos/ en.html; (accessed December 13th, 2008). |
|
Collier, Mike, 2007 (Dec. 17th). Estonia: Cyber Superpower. Business Week. |
|
http://www.businessweek.com/globalbiz/ |
|
content/dec2007/gb20071217_535635.htm; (accessed August 27th, 2008). |
|
Collier, Mike, 2007. Estonia: Cyber Superpower. Business Week. |
|
http://www.businessweek.com/ |
|
globalbiz/content/dec2007/gb20071217_535635. |
|
htm?chan=globalbiz_europe+index+page_top+stories. (accessed August 27th, |
|
2008). |
|
Conway, Maura, 2007. Information Warfare: Separating Hype from Reality, ed. |
|
Armistead, Leigh. Washington, D.C.: Potomac Books, Inc. p. 82. |
|
Cornish, Paul, 2009 (Feb. 2nd). Cyber Security and Politically, Socially and Religiously |
|
Motivated Cyber Attacks. Brussels: European Parliament. pp. 24-27. |
|
http://www.europarl.europa.eu/activities/committees/ studies.do?language=EN; |
|
(accessed February 19th, 2009). |
|
Council of Europe, Convention on Cybercrime (Budapest, November 23rd, 2001) |
|
http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm; |
|
(accessed |
|
February 19th, 2009). |
|
Council of Europe, Convention on Cybercrime, Chart of signatures and ratifications, |
|
http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&CM=& |
|
DF=&CL=ENG; (accessed February 19th, 2009). |
|
Council of Europe, Convention on Cybercrime: Summary of the treaty, |
|
http://conventions.coe.int/Treaty/en/Summaries/Html/185.htm; |
|
(accessed |
|
February 19th, 2009). |
|
Davis, Joshua, 2009. Hackers Take Down the Most Wired Country in Europe. |
|
Wired Magazine, Issue 15. |
|
Davis, Joshua, 2009. Hackers Take Down the Most Wired Country in Europe. |
|
Wired Magazine. Issue 15. |
|
DPA, 2008 (Aug. 11th). Estonia sends experts to Georgia to help combat cyber |
|
attacks. |
|
Earth |
|
Times. |
|
http://www.earthtimes.org/articles/show/224942,Estonia-sends-experts-togeorgia-to-help-combat-cyber-attacks.html ; (accessed August 27th, 2008). |
|
Estonian Ministry of Defence, 2008 (May). Cyber Security Strategy. Tallinn. p. 3. |
|
EU News, Policy Positions & EU Actors online, 2008 (April 4th). NATO agrees |
|
common |
|
approach |
|
cyber |
|
defence. |
|
EurActiv.com. |
|
http://www.euractiv.com/en/infosociety/nato-agrees-common-approach-cyberdefence/article-171377; (accessed February 18th, 2009). |
|
Volume 11, 2009 |
|
Baltic Security & Defence Review |
|
European |
|
Commission. |
|
External |
|
Relations: |
|
Russia. |
|
http://ec.europa.eu/external_relations/russia/ index_en.htm (accessed April 8th, |
|
2009). |
|
From wire reports, 2007 (June 8th). Estonian PM, justice minister insist that cyber |
|
attacks |
|
came |
|
from |
|
Kremlin |
|
computers, |
|
Baltic |
|
Times. |
|
http://www.baltictimes.com/news/articles/18038/; (accessed December 19th, |
|
2008). |
|
From wire reports, 2007 (May 18th). Kremlin denies involvement in cyber attacks |
|
on Estonia, The Baltic Times. http://www.baltictimes.com /news/articles/17908/; |
|
(accessed December 19th, 2008). |
|
From wire reports, 2007 (May 18th). The Kremlin denies involvement in cyber |
|
attacks on Estonia. The Baltic Times. http://www.baltictimes.com |
|
/news/articles/17908/; (accessed December 19th, 2008). |
|
Gee, Alastair, 2008 (Nov.). The Dark Art of Cyberwar. Foreign Policy. |
|
http://www.foreignpolicy.com/story/cms.php?story_id=4553; |
|
(accessed |
|
December 19th, 2008). |
|
Greenberg, Andy, 2008 (May 14th). The State of Cyber Security: When Cyber |
|
Terrorism |
|
Becomes |
|
State |
|
Censorship. |
|
Forbes.com. |
|
http://www.forbes.com/2008/05/14/cyberattacks-terrorism-estonia-techsecurity08-cx_ag_0514attacks.html; (accessed December 19th, 2008). |
|
Griggs, Brandon, 2008 (Sept. 12th). U.S. at risk of cyberattacks, experts say. |
|
CNN.com. http://www.cnn.com/2008/TECH/08/18/cyber.warfare/index.html; |
|
(accessed Oct. 24th, 2008 and Feb. 14th, 2009). |
|
Homeland |
|
Security. |
|
Cybersecurity: |
|
Make |
|
Habit. |
|
http://www.dhs.gov/zxprevprot/programs/ gc_1202746448575.shtm (accessed |
|
March 11th, 2009). |
|
Jones, Huw, 2008 (March 12th). Estonia calls for EU law to combat cyber attacks. |
|
Reuters. http://www.reuters.com/articlePrint?articleId=USL 1164404620080312; |
|
(accessed February 19th, 2009). |
|
Kampmark, Binoy, 2003 (Autumn). Cyber Warfare Between Estonia and Russia. |
|
Contemporary Review. pp. 288-293. |
|
Korns, Stephen and Kastenberg, Joshua, 2008/2009 (Winter). Georgia |
|
s Left |
|
Hook. Parameters. Vol. XXXVIII, No. 4. p. 64. |
|
Lipson, Howard, 2002. Tracking and Tracing Cyber-Attacks: Technical Challenges and |
|
Global Policy Issues. Pittsburgh, PA. pp. 47-48. |
|
Litovkin, Dmitriy, 2009 (Feb. 27th). The General Staff is Preparing for a Cyber |
|
War, |
|
Translated |
|
Open |
|
Source |
|
Centre. |
|
Moscow: |
|
Izvestiya. |
|
https://www.opensource.gov, Document ID CEP20090302358005; (accessed |
|
March 7th, 2009). |
|
Loeb, Vernon, 2001 (May 7th). Pentagon Computers Under Assault. Washington |
|
Post. A02. |
|
Baltic Security & Defence Review |
|
Volume 11, 2009 |
|
Markoff, John, 2008a (Aug. 13th). Before The Gunfire, Cyberattacks. New York |
|
Times. A1. |
|
Markoff, John, 2008b (Aug. 6th). Russian Gang Hijacking PCs in Vast Scheme. |
|
New York Times. C6. |
|
McLaughlin, Daniel, 2008 (July 2nd). Lithuania accuses Russian hackers of cyber |
|
assault after collapse of over 300 websites. Irish Times. p. 10. |
|
http://lumen.cgsccarl.com/login?url=http://proquest.umi.com/pqdweb?did=150 |
|
3762091&sid=2&Fmt=3&clientld=5094&RQT=309&VName=PQD; (accessed |
|
February 20th, 2009). |
|
Melikishvili, Alexander, 2008 (Dec.)/2009 (Jan.). Recent Events Suggest Cyber |
|
Warfare |
|
Become |
|
Threat. |
|
Insights. |
|
http://www.wmdinsights.com/I29/I29_G3_RecentEvents.htm; |
|
(accessed |
|
February 19-20th, 2009). |
|
Ministry of Internal Affairs of the Russian Federation, undated. Clean Network, |
|
Translated by Open Source Centre. Moscow: Ministry of Internal affairs of the |
|
Russian |
|
Federation. |
|
https://www.opensource.gov, |
|
Document |
|
CEP20090406546003 (accessed April 9th, 2009). |
|
National Intelligence Council, 2008 (Nov.). Global Trends 2025: A Transformed |
|
World. |
|
U.S. |
|
Government |
|
Printing |
|
Office. |
|
http://www.dni.gov/nic/NIC_2025_project.html; (accessed February 20th, 2009). |
|
Nikiforov, IIya, 2008 (Sept. 29th). Hot Fellows in Saakashvili |
|
s Service. Tallinn |
|
Exports Specialists in Intelligence and Democracy. Trans. Open Source Centre. |
|
Moscow Nezavisimaya Gazeta. https://www.opensource.gov, Document ID |
|
CEP20080929021009; (accessed December 18th, 2008). |
|
North Atlantic Treaty Organization, 1949 (April). The North Atlantic Treaty. |
|
Washington D.C. http://www.nato.int/docu/basictxt/treaty.htm; (accessed |
|
February 17th, 2009). |
|
North Atlantic Treaty Organization, 2008 (April 3rd). Bucharest Summit Declaration. |
|
Item 47. http://www.nato.int/docu/pr/2008/p08-049e.html (accessed February |
|
18th, 2009). |
|
North Atlantic Treaty Organization, 2008 (May 14th). NATO opens new centre of |
|
excellence |
|
cyber |
|
defence. |
|
NATO |
|
News. |
|
http://www. |
|
nato.int/docu/update/2008/05-may/e0514a.html; (accessed February 18th, 2009). |
|
North Atlantic Treaty Organization, undated. Defending against cyber attacks. NATO |
|
Topics. http://www.nato.int/issues/cyber_defence/ practice.html; (accessed |
|
February 18th, 2009). |
|
North Atlantic Treaty Organization. Official website of the Cooperative Cyber |
|
Defence Centre of Excellence. http://transnet.act.nato.int/WISE/TNCC/ |
|
CentresofE/CCD; (accessed February 18th, 2009). |
|
Volume 11, 2009 |
|
Baltic Security & Defence Review |
|
Organization for Security and Co-Operation in Europe, 2008 (June 4th). OSCE can |
|
play important role in cyber security, says Estonian Defence Minister [on-line press release] |
|
http://www.osce.org/ pc/item_1_31483.html; (accessed February 19th, 2009). |
|
Panarin, Igor, 2008 (Oct. 15th). The Information Warfare System: The Mechanism |
|
for Foreign Propaganda Requires Renewal, Translated by Open Source Centre. |
|
Moscow: Voyenno-Promyshlennyy Kuryer. https://www.opensource.gov, Document |
|
ID CEP20081016548020; (accessed October 22nd, 2008). |
|
Prygi.blogspot.com, 2008 (Feb. 8th). Ivan vs. Jaan. Russian Army Analyst to the World: |
|
You are defenceless against a cyber attack. http://prygi.blogspot.com/; (accessed |
|
December 20th, 2008). |
|
Rhoads, Christopher, 2009. Kyrgyzstan Knocked Offline. Wall Street Journal. p. 10. |
|
Schrank, Peter, 2007 (May 24th). Cyberwarfare: Newly nasty. Economist.com. |
|
http://www.economist.com/ |
|
world/international/PrinterFriendly.cfm?story_id=9228757; (accessed August 8th, |
|
2008). |
|
Secure Works Press Release, 2008 (Sept. 22nd). Compromised US and Chinese |
|
Computers Launch Greatest Number of Cyber Attacks, according to SecureWorks |
|
Data. |
|
http://www.secureworks.com/media/ |
|
press_releases/20080922-attacks/; |
|
(accessed February 19th, 2009). |
|
Shachtman, Noah, 2009 (March 11th). Kremlin Kids: We Launched the Estonian |
|
Cyber War. Wired Magazine. Blog. http://blog.wired.com/defence/2009/03/prokremlin-gro.html (accessed March 14th, 2009). |
|
Socor, Vladimir, 2008 (May 15th). NATO Creates Cyber Defence Centre In |
|
Estonia. |
|
Eurasia |
|
Daily |
|
Monitor. |
|
http://www.jamestown.org/single/ |
|
?no_cache=1&tx_ttnews[tt_news]=33636; (accessed December 18th, 2008). |
|
Statement by Ambassador of the U.S. Mission to the OSCE, Julie Finley, 2008 |
|
(May 8th). Statement on Cyber-attacks Against Radio Free Europe in Belarus: OSCE will |
|
defend information-sharing efforts from criminal attacks, says Finley [transcript on-line]. |
|
Vienna. |
|
http://www.america.gov/st/texttrans-english/2008/May |
|
/20080508115033eaifas0.3709833.html; (accessed February 20th, 2009). |
|
Svobodnaya Pressa, 2009 (March 17th). Ministry of Defence Planning Information |
|
Warfare, Translated by Open Source Centre. Moscow: Svobodnaya Pressa. |
|
https://www.opensource.gov, Document ID CEP20090318358009; (accessed |
|
April 5th, 2009). |
|
Tanner, Jari and Peach, Gary. 2008 (May 14th). NATO allies sign agreement on |
|
cyber |
|
defense |
|
centre. |
|
International |
|
Herald |
|
Tribune. |
|
www.iht.com/articles/ap/2008/05/14/europe/EU-GEN-NATO-CyberDefences.php; (accessed February 24th, 2009). |
|
The Associated Press, 2008 (May 14th). NATO allies sign agreement on cyber |
|
defense |
|
centre. |
|
International |
|
Herald |
|
Tribune. |
|
http://www.iht.com |
|
Baltic Security & Defence Review |
|
Volume 11, 2009 |
|
/articles/ap/2008/05/14/europe/EU-GEN-NATO-Cyber-Defences.php; |
|
(accessed February 24th, 2009). |
|
The Russian Federation Public Chamber Website, undated. About the House: On the |
|
Public |
|
Chamber |
|
Russian |
|
Federation. |
|
http://translate.google.ru/translate?hl=en&langpair=ru|en&u=http://www.oprf. |
|
ru/, (accessed April 10th, 2009). |
|
Thomas, Timothy, 2009. The Bear Went Through the Mountain: Russia Appraises |
|
its Five-Day War in South Ossetia. Journal of Slavic Military Studies. pp. 55-59. |
|
United Nations, 1945 (June 26th). Charter of the United Nations: Article 1. San |
|
Francisco. |
|
http://www.un.org/aboutun/charter/chapter1.shtml; |
|
(accessed |
|
February 19th, 2009). |
|
Usov, Dmitriy, 2009 (Feb. 25th). Russia is Preparing for the Wars of the Future, |
|
Translated |
|
Open |
|
Source |
|
Centre. |
|
Moscow: |
|
Vzglyad. |
|
https://www.opensource.gov, Document ID CEP2090227358005; (accessed |
|
March 7th, 2009). |
|
Varoli, John, 2000 (June 29th). In Bleak Russia, a Young Man |
|
s thoughts turn to |
|
Hacking. The New York Times on the web. http://www.ssl |
|
.stu.neva.ru/psw/misc/29hack.html; (accessed December 20th, 2008). |
|
Verton, Dan, 2003. Black Ice: The Invisible Threat of Cyber-Terrorism. Emeryville, CA: |
|
McGraw-Hill/Osborne. 32-33; 248. |
|
Vesilind, Priit, 2008. The Singing Revolution. Tallinn: Varrak Publishers Ltd. p. 15, 78, |
|
172. |
|
Watson, Steve, 2008 (Aug. 12th). Russia Today Website Targeted In Cyber Attacks. |
|
Infopass.net. http://www.inforwars.net/articles/august 2008/120808Attacked.htm; |
|
(accessed December 19th, 2008). |
|
Wilson, Clay, 2006. Cyberterrorism and Computer Attacks, ed. Brown, Lawrence. New |
|
York: Novinka Books. pp. 15-16. |
|
Wired Staff, 2009 (March 5th). Botnet Hacker Gets Four Years. Wired Magazine. |
|
http://blog.wired.com/27bstroke6/2009/03/botnet-hacker-g.html; |
|
(accessed |
|
March 24th, 2009). |
|
1 Personal recollection of the author who lived in Estonia from July 2007 to June |
|
2008. |
|
2 Multiple sources were used along with the author |
|
s personal recollections of |
|
living in Estonia. Three of the main sources that describe the attack are: Davis, |
|
Joshua, 2009. Hackers Take Down the Most Wired Country in Europe. Wired |
|
Magazine. Issue 15; Kampmark, Binoy, Autumn 2003. Cyber Warfare Between |
|
Estonia And Russia. Contemporary Review. pp. 288-293; Aaviksoo, Jaak, 2007 (Nov. |
|
28th) Address by the Minister of Defence of the Republic of Estonia at The Centre |
|
for Strategic & International Studies, Washington, D.C. |
|
Volume 11, 2009 |
|
Baltic Security & Defence Review |
|
3 This reference offers an Estonian view of its history and underlines the reasons |
|
behind the friction between Russia and Estonia. |
|
4 SecureWorks is an internet security firm based out of Atlanta. The company |
|
tracks suspicious activities throughout the internet. |
|
5 Entered into force refers to the date that the treaty becomes enforceable |
|
according to the provisions of the treaty by the members that have agreed to the |
|
treaty. |
|
6 WMD Insights is a journal sponsored by the U.S. Defence Threat Reduction |
|
Agency. |
|
7 Idea based on comments used by Jaak Aaviksoo in 2007. Minister Aaviksoo used |
|
this technique to show that some members of the audience may unknowingly be |
|
helping cyber-terrorists. Jaak Aaviksoo, Address by the Minister of Defence of the |
|
Republic of Estonia delivered to the Centre for Strategic & International Studies, |
|
Washington, D.C., November 28, 2007. |
|
8 Russia Today is a globally broadcast news channel broadcast in the English |
|
language and owned by the Russian government news agency RIA-Novosti. |
|
Similar in programming to CNN and BBC but with a Russian perspective on |
|
events in the world news. |
|
9 Information from a Russian and English language blog that discusses issues |
|
concerning Russia. |
|
10 The Russian Federation Public Chamber is an organization created in 2005 to |
|
oversee all aspects of government and to act as a consultant to the heads of the |
|
Russian government. The Russian Federation Public Chamber Website, About the |
|
House: |
|
Public |
|
Chamber |
|
Russian |
|
Federation, |
|
http://translate.google.ru/translate?hl=en&langpair=ru|en&u=http://www.oprf. |
|
ru/. (accessed April 10th, 2009). |
|
11 A Just Russia is a Russian political party created as an opposition party but still |
|
supports the power of the Russian executive branch (Abdullaev, 2006). |
|
JR02-2009 |
|
Tracking GhostNet: |
|
Investigating a Cyber Espionage Network |
|
Information Warfare Monitor |
|
March 29, 2009 |
|
http://www.infowar-monitor.net/ghostnet |
|
http://www.tracking-ghost.net t |
|
JR02-2009 Tracking GhostNet - FOREWORD |
|
March 29, 2009 |
|
Foreword |
|
Cyber espionage is an issue whose time has come. In this second report from the Information Warfare |
|
Monitor, we lay out the findings of a 10-month investigation of alleged Chinese cyber spying against |
|
Tibetan institutions. |
|
The investigation, consisting of fieldwork, technical scouting, and laboratory analysis, discovered a lot more. |
|
The investigation ultimately uncovered a network of over 1,295 infected hosts in 103 countries. |
|
Up to 30% of the infected hosts are considered high-value targets and include computers located |
|
at ministries of foreign affairs, embassies, international organizations, news media, and NGOs. The |
|
Tibetan computer systems we manually investigated, and from which our investigations began, |
|
were conclusively compromised by multiple infections that gave attackers unprecedented access to |
|
potentially sensitive information. |
|
But the study clearly raises more questions than it answers. |
|
From the evidence at hand, it is not clear whether the attacker(s) really knew what they had |
|
penetrated, or if the information was ever exploited for commercial or intelligence value. |
|
Some may conclude that what we lay out here points definitively to China as the culprit. Certainly |
|
Chinese cyber-espionage is a major global concern. Chinese authorities have made it clear that they |
|
consider cyberspace a strategic domain, one which helps redress the military imbalance between |
|
China and the rest of the world (particularly the United States). They have correctly identified |
|
cyberspace as the strategic fulcrum upon which U.S. military and economic dominance depends. |
|
But attributing all Chinese malware to deliberate or targeted intelligence gathering operations by |
|
the Chinese state is wrong and misleading. Numbers can tell a different story. China is presently |
|
the world |
|
s largest Internet population. The sheer number of young digital natives online can more |
|
than account for the increase in Chinese malware. With more creative people using computers, it |
|
expected that China (and Chinese individuals) will account for a larger proportion of cybercrime. |
|
Likewise, the threshold for engaging in cyber espionage is falling. Cybercrime kits are now available |
|
online, and their use is clearly on the rise, in some cases by organized crime and other private actors. |
|
Socially engineered malware is the most common and potent; it introduces Trojans onto a system, |
|
and then exploits social contacts and files to propagate infections further. |
|
Furthermore, the Internet was never built with security in mind. As institutions ranging from |
|
governments through to businesses and individuals depend on 24-hour Internet connectivity, the |
|
opportunities for exploiting these systems increases. |
|
JR02-2009 Tracking GhostNet - FOREWORD |
|
This report serves as a wake-up call. At the very least, a large percentage of high-value targets |
|
compromised by this network demonstrate the relative ease with which a technically unsophisticated |
|
approach can quickly be harnessed to create a very effective spynet |
|
These are major disruptive |
|
capabilities that the professional information security community, as well as policymakers, need to |
|
come to terms with rapidly. |
|
These are major disruptive capabilities that the professional information security community, as well |
|
as policymakers, need to come to terms with rapidly. |
|
Ron Deibert, Director, the Citizen Lab, |
|
Munk Centre for International Studies, |
|
University of Toronto. |
|
Rafal Rohozinski, Principal and CEO, |
|
The SecDev Group, |
|
Ottawa, Canada. |
|
JR02-2009 Tracking GhostNet - ACKNOWLEDGEMENTS |
|
Acknowledgements |
|
This investigation was prepared by a dedicated team of professionals. |
|
Greg Walton conducted and coordinated the primary field-based research in India, Tibetan Missions |
|
abroad, and Europe. Greg is a SecDev Group associate and editor of the Information Warfare Monitor |
|
website. He is currently a SecDev Fellow at the Citizen Lab. The Indian portion of the field work |
|
benefited from the expertise of Dr. Shishir Nagaraja, Security Laboratory, Cambridge University. |
|
Dr. Nagaraga visited Dharamsala for a period of five days in September to assist on aspects of the |
|
technical data collection.1 |
|
The technical scouting and computer network interrogation was carried out by Nart Villenueve. Nart |
|
is the CTO of Psiphon Inc, and the Psiphon Fellow at the Citizen Lab. His investigations included the |
|
discovery and exploration of the GhostNet control servers. He led the data analysis research, which |
|
included log files gathered in the field, as well as data obtained through technical scouting of the |
|
GhostNet control servers. |
|
This report represents a collective effort. The drafting team consisted of the following individuals |
|
(listed in alphabetical order). Ronald Deibert (Citizen Lab), Arnav Manchanda (SecDev Group), |
|
Rafal Rohozinski (SecDev Group and Psiphon Inc.), Nart Villeneuve (Psiphon Fellow, Citizen Lab) |
|
and Greg Walton (SecDev Fellow, Citizen Lab). Layout and design was led by Jane Gowan (Psiphon |
|
Inc. and Citizen Lab). Belinda Bruce (Blurb Media) and James Tay (Citizen Lab), provided additional |
|
support to the team. |
|
Countless others also contributed to the research effort. This includes individuals in India and Tibet, |
|
who for security reasons we cannot name. We are also grateful to the Private Office of his Holiness |
|
the Dalai Lama, the Tibetan Government-in-Exile, the missions of Tibet in London, Brussels, and New |
|
York, and Drewla (a Tibetan NGO). |
|
Aspects of the research carried out by Dr. Nagaraga focusing on socially engineered malware are published in a separate study. |
|
See, The snooping dragon: social-malware surveillance of the Tibetan movement, Shishir Nagaraja, Ross Anderson, Cambridge |
|
University Computer Laboratory Technical Report, Mar 29 2009 |
|
JR02-2009 Tracking GhostNet - TABLE OF CONTENTS |
|
Summary |
|
p. 5 |
|
Introduction |
|
p. 7 |
|
Rise of the cyber spies |
|
A focus on China |
|
Outline of Report |
|
Part One: Context and background |
|
Alleged Chinese operations in cyberspace |
|
Applying the evidence-based approach to cyber attacks: the challenge of attribution |
|
Targeting Tibet |
|
Conduct of the investigation |
|
Phase 1: Field investigation |
|
Phase 2: Identifying command and control servers |
|
Part Two: Tracking Ghostnet |
|
p. 7 |
|
p. 9 |
|
p. 9 |
|
p. 10 |
|
p. 11 |
|
p. 12 |
|
p. 13 |
|
p. 14 |
|
p. 14 |
|
p. 14 |
|
p. 16 |
|
Phase I: Field investigation |
|
Targeted malware |
|
previous research |
|
Information Warfare Monitor field research |
|
Office of His Holiness the Dalai Lama |
|
Tibetan Government-in-Exile |
|
Offices of Tibet |
|
Drewla |
|
Phase 2: Identifying command and control servers |
|
List of infected computers |
|
Sending commands |
|
Command results |
|
Methods and capabilities |
|
Analysis of list of infected computers |
|
Methodology |
|
Selected infections |
|
Infection timeline |
|
p. 17 |
|
p. 17 |
|
p. 22 |
|
p. 22 |
|
p. 27 |
|
p. 27 |
|
p. 27 |
|
p. 30 |
|
p. 32 |
|
p. 34 |
|
p. 37 |
|
p. 39 |
|
p. 40 |
|
p. 40 |
|
p. 42 |
|
p. 44 |
|
Part Three: Investigating GhostNet: Conclusions |
|
p. 46 |
|
Alternative explanations |
|
Attribution |
|
The significance of GhostNet |
|
Part Four: About the Information Warfare Monitor |
|
p. 47 |
|
p. 48 |
|
p. 49 |
|
p. 51 |
|
Boxes |
|
Box 1: Chinese Internet SIGINT in practice |
|
p. 28 |
|
Tables |
|
Table 1: Domain name registration information |
|
Table 2: List of selected infections |
|
p. 32 |
|
p. 42 |
|
Figures |
|
Fig. 1: A |
|
Social Engineering |
|
attack connects to GhostNet |
|
Fig. 2: A |
|
Socially Engineered |
|
email sent to the International Tibet Support Network |
|
Fig. 3: A Virus Total Screen Capture of a malware infected email attachment |
|
Fig. 4: Field researchers discovered malware at five Tibetan locations |
|
Fig. 5: Malware retrieving a sensitive document |
|
Fig. 6: The OHHDL and Drewla were infected by the same malware |
|
Fig. 7: The GhostNet control servers |
|
Fig. 8: The GhostNet |
|
Server List |
|
interface |
|
Fig. 9: The GhostNet |
|
Send Command |
|
interface |
|
Fig. 10: The gh0st RAT interface |
|
Fig. 11: The GhostNet |
|
List Command |
|
interface |
|
Fig. 12: The geographic location of infected hosts |
|
Fig. 13. GhostNet infection timeline |
|
p. 19 |
|
p. 20 |
|
p. 21 |
|
p. 23 |
|
p. 26 |
|
p. 29 |
|
p. 31 |
|
p. 33 |
|
p. 35 |
|
p. 36 |
|
p. 38 |
|
p. 41 |
|
p. 45 |
|
JR02-2009 Tracking GhostNet - SUMMARY |
|
Summary |
|
Trojan horse programmes and other associated malware are often cited as vectors for conducting |
|
sophisticated computer-based espionage. Allegations of cyber espionage (computer network |
|
exploitation) are increasingly common, but there are few case studies in the unclassified realm that |
|
expose the inner workings of such networks. |
|
This study reveals the existence and operational reach of a malware-based cyber espionage network |
|
that we call GhostNet. |
|
Between June 2008 and March 2009 the Information Warfare Monitor conducted an extensive and |
|
exhaustive two-phase investigation focused on allegations of Chinese cyber espionage against the |
|
Tibetan community. |
|
We conducted field-based investigations in India, Europe and North America. In India we worked |
|
directly with affected Tibetan organizations, including the Private Office of the Dalai Lama, the |
|
Tibetan Government-in-Exile, and several Tibetan NGOs. In Europe and North America we worked with |
|
Tibetan missions in London, Brussels, and New York. The fieldwork generated extensive data that |
|
allowed us to examine Tibetan information security practices, as well as capture real-time evidence |
|
of malware that had penetrated Tibetan computer systems. |
|
During the second phase of our investigation, the data was analyzed, and led to the discovery of |
|
insecure, web-based interfaces to four control servers. These interfaces allow attacker(s) to send |
|
instructions to, and receive data from, compromised computers. Our research team successfully |
|
scouted these servers, revealing a wide-ranging network of compromised computers. This extensive |
|
network consists of at least 1,295 infected computers in 103 countries. |
|
Significantly, close to 30% of the infected computers can be considered high-value and include the |
|
ministries of foreign affairs of Iran, Bangladesh, Latvia, Indonesia, Philippines, Brunei, Barbados |
|
and Bhutan; embassies of India, South Korea, Indonesia, Romania, Cyprus, Malta, Thailand, Taiwan, |
|
Portugal, Germany and Pakistan; the ASEAN (Association of Southeast Asian Nations) Secretariat, |
|
SAARC (South Asian Association for Regional Cooperation), and the Asian Development Bank; news |
|
organizations; and an unclassified computer located at NATO headquarters. |
|
The GhostNet system directs infected computers to download a Trojan known as gh0st RAT that allows |
|
attackers to gain complete, real-time control. These instances of gh0st RAT are consistently controlled |
|
from commercial Internet access accounts located on the island of Hainan, People |
|
s Republic of China. |
|
Our investigation reveals that GhostNet is capable of taking full control of infected computers, |
|
including searching and downloading specific files, and covertly operating attached devices, including |
|
microphones and web cameras. |
|
The vector for spreading the GhostNet infection leverages social means. Contextually relevant emails |
|
are sent to specific targets with attached documents that are packed with exploit code and Trojan |
|
JR02-2009 Tracking GhostNet - SUMMARY |
|
horse programmes designed to take advantage of vulnerabilities in software installed on the target |
|
computer. |
|
Once compromised, files located on infected computers may be mined for contact information, |
|
and used to spread malware through e-mail and document attachments that appear to come from |
|
legitimate sources, and contain legitimate documents and messages. It is therefore possible that the |
|
large percentage of high value targets identified in our analysis of the GhostNet are coincidental, |
|
spread by contact between individuals who previously communicated through e-mail. |
|
Nonetheless the existence of the GhostNet network is a significant fact in and of itself. At the very |
|
least, it demonstrates the ease by which computer-based malware can be used to build a robust, lowcost intelligence capability and infect a network of potentially high-value targets. |
|
Key findings: |
|
Documented evidence of a cyber espionage network |
|
GhostNet |
|
infecting at least 1,295 |
|
computers in 103 countries, of which close to 30% can be considered as high-value |
|
diplomatic, political, economic, and military targets. |
|
Documented evidence of GhostNet penetration of computer systems containing sensitive |
|
and secret information at the private offices of the Dalai Lama and other Tibetan |
|
targets. |
|
Documentation and reverse engineering of the modus operandi of the GhostNet |
|
system |
|
including vectors, targeting, delivery mechanisms, data retrieval and control |
|
systems |
|
reveals a covert, difficult-to-detect and elaborate cyber-espionage system |
|
capable of taking full control of affected systems. |
|
JR02-2009 Tracking GhostNet - INTRODUCTION |
|
Introduction |
|
Computer network exploitation represents the leading edge of signals intelligence in the information |
|
age. The proliferation of computer systems throughout governments, businesses, and civic |
|
organizations represents a boon for would-be cyber spies. |
|
Awareness of cyber vulnerabilities, and even basic information security practices, is in its infancy, and |
|
largely absent in most organizations outside of the classified realm. Commercial computer systems, which |
|
represent most of the world |
|
s installed base, are insecure. This lack of security consciousness is reflective |
|
of the infancy of the information age. The Internet was never designed for security and, for the most part, |
|
there has been little incentive for software manufacturers to make security a first priority in the design |
|
and development of products, many of which are destined for consumer and/or small business use. |
|
These challenges are present in advanced industrial societies, but are amplified many times over |
|
in developing countries. Ownership of computers is a relative rarity among many government |
|
departments. Where they exist, they often use grey market or pirated software. Resources are lacking |
|
to employ properly trained computer professionals, and many staff are barely computer literate. In |
|
this context, information security is often a distant priority. |
|
And yet, computers in the hands of individuals or at government offices, ministries, embassies, and |
|
civic and non-governmental organizations contain information that can be valuable. Files and e-mails |
|
with contact information, lists of meetings and attendees, draft position papers, internal PowerPoint |
|
presentations, organizational budgets, and lists of visitors can represent items of strategic value |
|
to rivals and enemies. Organizations, like individuals, can be subject to identity theft, leading to |
|
potentially serious breaches of security. |
|
Rise of the cyber spies |
|
Little is known of the sophistication of state-based cyber espionage capabilities, such as those of the |
|
United States, Israel, and the United Kingdom, all considered leaders in this field. They are assumed |
|
to be considerable as the security doctrines of these countries treat cyberspace as a strategic domain |
|
equivalent to that of land, air, sea, and space.2 |
|
Other powers including China have made cyberspace a key pillar of their national security strategies. |
|
China is actively developing an operational capacity in cyberspace, correctly identifying it as the |
|
domain in which it can achieve strategic parity, if not superiority, over the military establishments |
|
of the United States and its allies. Chinese cyber warfare doctrine is well developed, and significant |
|
resources have been invested by the People |
|
s Liberation Army and security services in developing |
|
defensive and offensive capabilities.3 |
|
http://www.dod.mil/pubs/foi/ojcs/07-F-2105doc1.pdf ; http://www.afa.org/media/reports/victorycyberspace.pdf |
|
http://findarticles.com/p/articles/mi_m0PBZ/is_6_88/ai_n31140190 ; http://www.infowar-monitor.net/modules.php?op=modload& |
|
name=Archive&file=index&req=viewarticle&artid=2&page=1 |
|
JR02-2009 Tracking GhostNet - INTRODUCTION |
|
But the most significant actors in cyberspace are not states. The online engagements that |
|
accompanied the recent Russia-Georgia conflict in August 20084 and Israel |
|
s January 2009 offensive |
|
in Gaza5 were carried out by independent attackers. The May 2007 denial of service attacks against |
|
Estonia6 resulted in a single conviction of a Russian living in Estonia. Likewise, previous high-profile |
|
investigations of hacking against strategic U.S. targets were never positively attributed to foreign |
|
intelligence services7, and in many cases were the work of individuals.8 |
|
The contest in the shadows currently underway in cyberspace appears to rely largely on third parties. |
|
In numerous instances, including case studies conducted by the Information Warfare Monitor |
|
s sister |
|
project, the OpenNet Initiative, third party attackers were responsible for triggering national-level |
|
cyber events. In Kyrgyzstan (2005)9, Belarus (2006)10, during the Russia Georgia war (2008), and |
|
Kyrgyzstan (2009), individuals and/or loose coalitions were responsible for publishing target lists |
|
and attack tools on semi-private websites. The ensuing |
|
cyclones in cyberspace |
|
were sufficient to |
|
precipitate events outside of cyberspace.11 |
|
International cooperation has for the most part focused on establishing capabilities for counteracting |
|
the criminal use of cyberspace, and with good reason. In 2009, the FBI estimated that cybercrime is |
|
responsible for over $10 billion worth of losses each year.12 Cybercrime is a relatively low cost, low |
|
threshold activity. Techniques such as phishing and targeted malware are easy to construct, and the |
|
chances of prosecution are minimal given a general lack of international coordination. |
|
This is slowly changing as national and international authorities become more aware of the threat. |
|
The attacks on Estonia, for example, led to the establishment of NATO |
|
s Cooperative Cyber Defence |
|
Centre of Excellence in Tallinn, Estonia.13 The International Telecommunication Union has also |
|
established its own specialized agency, IMPACT, designed to aid intelligence sharing and tracking of |
|
http://blog.wired.com/defense/2008/10/government-and.html ; http://www.slate.com/id/2197514 |
|
http://www.csmonitor.com/2009/0123/p04s03-wome.html |
|
http://www.webpronews.com/topnews/2008/01/24/man-convicted-in-estonia-cyber-attack |
|
For example, a US government investigation of systematic hacking of Department of Defense networks and defence laboratories |
|
dubbed |
|
Titan Rain |
|
never provided conclusive evidence to substantiate allegations that the hacking was conducted at the behest of |
|
the Chinese government. http://www.time.com/time/magazine/article/0,9171,1098961,00.html |
|
A good example is the 1998 |
|
Solar Sunrise |
|
investigation. The evidence gathered by US authorities eventually led to the conviction |
|
of an Israeli citizen, Ehud Tenebaum, although the involvement of Israeli security services was never proven. http://www.sans.org/ |
|
resources/idfaq/solar_sunrise.php |
|
http://opennet.net/special/kg/ |
|
http://opennet.net/sites/opennet.net/files/ONI_Belarus_Country_Study.pdf |
|
http://www.infowar-monitor.net/modules.php?op=modload&name=News&file=article&sid=2146 |
|
http://kn.theiet.org/magazine/issues/0903/hacking-goes-pro-0903.cfm |
|
http://www.nato.int/docu/update/2008/05-may/e0514a.html |
|
JR02-2009 Tracking GhostNet - INTRODUCTION |
|
malicious criminal activity in cyberspace.14 Countries such as the United States, Russia and China |
|
have also entered into bilateral agreements with allied countries and partners. |
|
A focus on China |
|
Recent allegations of Chinese cyber espionage largely rely on anecdotal evidence. The most common |
|
proof provided by victims of these attacks consists of log files or malware that shows connections |
|
being made by infected computers to IP addresses assigned to the People |
|
s Republic of China. |
|
This kind of evidence is circumstantial at best. Internet usage statistics suggest that focusing on |
|
Chinese instances of information warfare is misleading.15 With 41% of the world |
|
s Internet users |
|
located in Asia, China alone accounts for the largest national population of Internet users |
|
some 300 |
|
million, nearly one-fifth of the global number of users. Coupled with the rapid growth in Chinese use |
|
of the Internet |
|
a 1,200% increase in the period 2000-2008 |
|
this would more than account for the |
|
rise in instances of Chinese-oriented malware.16 |
|
At the same time, however, allegations of Chinese hacking and exploitation of private and |
|
government computer systems are persistent enough to warrant an evidence-based investigation. |
|
This report provides such an investigation. |
|
Outline of report |
|
This report is divided into three parts: |
|
Part one provides a brief introduction to the context and background to this report. We examine past |
|
allegations of cyber espionage by China-based actors and the challenge of evidence-based research |
|
in this field. Part one concludes with a brief description of the methods used in our two-phase |
|
investigation. |
|
Part two provides a detailed account of the conduct of our investigation. The findings of each phase |
|
are presented sequentially. |
|
Part three analyses the overall findings of the investigation, suggests alternative explanations and |
|
assesses the implications. |
|
http://www.itu.int/osg/csd/cybersecurity/gca/impact/index.html |
|
For global Internet usage statistics please see http://www.internetworldstats.com |
|
http://blog.stopbadware.org/2009/03/03/wheres-the-badware |
|
PART ONE: |
|
Context and background |
|
JR02-2009 Tracking GhostNet - PART ONE |
|
Context and background: Alleged Chinese operations |
|
in cyberspace |
|
China has been developing its cyberspace doctrine and capabilities since the late 1990s as part of its military |
|
modernization programme. The Chinese doctrine of |
|
active defence, |
|
which is the belief that China must be ready |
|
to respond to aggression immediately, places an emphasis on the development of cyber warfare capabilities. |
|
The Chinese focus on cyber capabilities as part of its strategy of national asymmetric warfare involves |
|
deliberately developing capabilities that circumvent U.S. superiority in command-and-control warfare. |
|
The strategy recognizes the critical importance of the cyber domain to American military and economic |
|
power and the importance of offensive cyber operations to victory in a modern conflict with the United |
|
States. Chinese doctrine also emphasizes the contiguity between military and non-military realms.17 |
|
In recent years, there has been an increase in allegations that China-based hackers are responsible for |
|
high-level penetrations of computer systems in Europe, North America and Asia. Attackers originating |
|
in China have been accused of infiltrating government computers in the United States, Britain, France, |
|
Germany, South Korea, and Taiwan. China-based hackers have been accused of data theft from foreign |
|
government computers and commercial and financial institutions. The U.S. Department of Defense |
|
reports it is continuously targeted by Chinese attackers, most notably in the series of attacks since 2003 |
|
known as |
|
Titan Rain, |
|
which targeted the Department of Defense and numerous defence companies.18 |
|
There are also allegations of attacks originating from China directed against non-governmental |
|
organizations active in regions where China has a national interest. This includes organizations |
|
advocating on the conflict in the Darfur region of Sudan,19 Tibetan groups active in India, and the |
|
Falun Gong. The majority of attacks involve website defacements, denial of service attacks, or virus |
|
writing campaigns. Nationalistic and patriotic cyber-activity by Chinese nationals intensifies during |
|
crises, such as during Sino-American or Sino-Taiwanese tensions (see below). To date none of these |
|
attacks have been traced back to Chinese state authorities or specific individuals, although many |
|
have benefited official Chinese policy and interests. |
|
http://findarticles.com/p/articles/mi_m0PBZ/is_6_88/ai_n31140190 ; http://www.infowar-monitor.net/modules.php?op=modload&na |
|
me=Archive&file=index&req=viewarticle&artid=2&page=1 ; http://www.heritage.org/Research/asiaandthepacific/upload/bg_2106.pdf |
|
http://www.time.com/time/magazine/article/0,9171,1098961,00.html ; http://findarticles.com/p/articles/mi_m0PBZ/is_6_88/ |
|
ai_n31140190 ; http://www.afa.org/media/reports/victorycyberspace.pdf |
|
http://www.insidetech.com/news/articles/1630-mysterious-forces-hack-pro-tibet-save-darfur-sites ; http://www.washingtonpost. |
|
com/wp-dyn/content/article/2008/03/20/AR2008032003193.html |
|
JR02-2009 Tracking GhostNet - PART ONE |
|
Applying the evidence-based approach to cyber attacks: |
|
the challenge of attribution |
|
Determining those responsible for cyber attacks, commonly known as the attribution problem, is |
|
a major challenge. The Internet was never built with security as a priority. The current version of |
|
the Internet |
|
s address assignment system, IP V4, provides a wealth of loopholes and methods by |
|
which a perpetrator can mask his or her real identity and location. Online identities and servers |
|
can be cleverly hidden. Packet flows and connections can be masked and redirected through |
|
multiple servers. A clever attacker can often hijack a machine belonging to an otherwise innocent |
|
organization and use it as a base for launching attacks. |
|
Hand-in-hand with the problem of attribution is the difficulty of identifying motivating factors |
|
behind a cyber attack. Many perpetrators of Internet-based attacks and exploits are individuals whose |
|
motivation can vary from a simple profit motive through to fear of prosecution or strong emotional |
|
feelings, including religious belief and nationalism. Many cyber attacks and exploits which seem to |
|
benefit states may be the work of third-party actors operating under a variety of motivations. This |
|
makes it difficult to separate the motivation of the individual from the potential motives of the |
|
party on whose behalf the attacks have occurred, or a prospective client to which the perpetrator |
|
is trying to market his or her wares. In either case, the challenge of identifying perpetrators and |
|
understanding their motives gives state actors convenient plausible deniability and the ability to |
|
officially distance themselves from attacks. |
|
Cyber campaigns can also take on a life of their own. Even though a state might |
|
seed |
|
a particular |
|
campaign through tacit encouragement or the absence of sanctions or prosecutions, these campaigns |
|
are inherently chaotic and unpredictable in scope and outcome.20 Phenomena such as spontaneous |
|
cyber rioting |
|
can surpass the initial purposes of the cyber campaign. Low barriers to entry to this |
|
sort of activity enable anyone with a computer and Internet connection to take part in a cyberattack.21 For the most part, governments appear to passively benefit from online manifestations of |
|
nationalistic and patriotic fervour, although outcomes are inherently unpredictable.22 |
|
In China, the authorities most likely perceive individual attackers and their online activities as |
|
convenient instruments of national power.23 A favourite target of Chinese hackers is Taiwanese |
|
computer systems, especially during times of Sino-Taiwanese tensions, such as elections and |
|
http://www.yorku.ca/robarts/projects/canada-watch/obama/pdfs/Deibert.pdf |
|
http://worldanalysis.net/modules/news/article.php?storyid=343 |
|
For instance, during the Russia-Georgia conflict in August 2008, tools were made available online for those who wished to |
|
participate in the ongoing |
|
cyber-war |
|
against Georgian websites. http://blog.wired.com/defense/2008/10/government-and.html ; |
|
http://www.slate.com/id/2197514 |
|
http://findarticles.com/p/articles/mi_m0PBZ/is_6_88/ai_n31140190 ; http://fmso.leavenworth.army.mil/documents/Beijingsrising-hackers.pdf |
|
JR02-2009 Tracking GhostNet - PART ONE |
|
referendums.24 In April 2001, following the death of a Chinese fighter pilot after a collision with an |
|
American spy plane near the Chinese island of Hainan, Chinese hackers began a sustained campaign |
|
to target American computer networks. No link was made with elements of the Chinese government.25 |
|
However, governments cannot always preserve direct control over such activities; groups can maintain |
|
their freelance and autonomous status and undertake their own cyber initiatives that may not always |
|
attain official sanction or serve state interests.26 |
|
Targeting Tibet |
|
Accusations of Chinese cyber war being waged against the Tibetan community have been |
|
commonplace for the past several years. The Chinese government has been accused of orchestrating |
|
and encouraging such activity as part of a wider strategy to crack down on dissident groups and |
|
subversive activity.27 Earlier research has traced these attacks against Tibetan groups to IP addresses |
|
registered in the People |
|
s Republic of China. The attacks used malware hidden in legitimate-looking |
|
email messages, infecting unsuspecting users |
|
computers and exploiting the data on it by sending it |
|
to control servers.28 |
|
The identity of the attackers has never been attributed in a conclusive manner to any specific group |
|
or individual.29 The motivation of those behind the attacks, despite conjecture, is also unproven. |
|
In earlier studies, researchers focused on attacks specifically targeting the Tibetan community. |
|
But a wide variety of other victims of computer penetrations have reported infections similar to |
|
those used against Tibetan organizations, following a similar modus operandi and also reporting |
|
to control servers usually located in China. These additional targets include the Falun Gong30, the |
|
U.S. Government, and multinational corporations.31 While reports of these targeted attacks have |
|
circulated, the extent to which attackers successfully exploited the affected computers is unknown. |
|
http://fmso.leavenworth.army.mil/documents/Beijings-rising-hackers.pdf |
|
http://news.bbc.co.uk/2/hi/americas/1305755.stm |
|
http://fmso.leavenworth.army.mil/documents/Beijings-rising-hackers.pdf |
|
http://www.washingtonpost.com/wp-dyn/content/article/2008/03/21/AR2008032102605.html |
|
See, http://isc.sans.org/diary.html?storyid=4177 ; http://isc.sans.org/diary.html?storyid=4176 and http://archive.cert.uni-stuttgart. |
|
de/isn/2002/09/msg00086.html for background information on these attacks. |
|
Attribution for previous penetrations of Tibetan groups has never been publicly attributed and is not available from open sources. |
|
Classified studies may reveal a finer grained detail, as many of the attacks are relatively unsophisticated, and given proper assets, |
|
could be traced back to specific locations and presumably individuals. |
|
Research by Maarten Van Horenbeeck shows that similar attacks have targeted the Falun Gong. http://www.daemon.be/ |
|
maarten/Crouching_Powerpoint_Hidden_Trojan_24C3.pdf and http://isc.sans.org/presentations/SANSFIRE2008-Is_Troy_Burning_ |
|
Vanhorenbeeck.pdf |
|
See http://www.businessweek.com/print/magazine/content/08_16/b4080032218430.htm |
|
JR02-2009 Tracking GhostNet - PART ONE |
|
Conduct of the investigation |
|
From June 2008 to March 2009 the Information Warfare Monitor conducted an in-depth investigation |
|
of alleged cyber espionage against the Tibetan community. We chose this case study because of the |
|
unprecedented access that we were granted to Tibetan institutions through one of our researchers, and |
|
persistent allegations that confidential information on secure computers was somehow being compromised. |
|
Our lead field investigator had a long history of working with the Tibetan community, and was able |
|
to work with the private office of the Dalai Lama, the Tibetan Government-in-Exile, and a number of |
|
Tibetan non-governmental organizations. |
|
The investigation consisted of two distinct phases. |
|
Phase 1: Field-based investigations in India, Europe, and North America (June-November 2008) |
|
Field research was carried out in Dharamsala, India, the location of the Tibetan Government-in-Exile. |
|
Follow-up research was conducted at Tibetan missions abroad in London, Brussels and New York. During |
|
this phase we had unprecedented access to the Tibetan government and other Tibetan organizations. |
|
This allowed us to establish a baseline understanding of information security practices at these |
|
locations and to design an evidence-based approach to the investigation. |
|
We also conducted extensive on-site interviews with officials in the Tibetan Government-in-Exile, the |
|
private office of the Dalai Lama, and Tibetan non-governmental organizations. The interviews focused on |
|
the allegations of cyber espionage. We also sought alternative explanations for leakage of confidential |
|
documents and information and examined basic information security practices at these locations. |
|
Network monitoring software was installed on various computers so as to collect forensic technical |
|
data from affected computer systems, and initial results were analysed in situ.32 This initial analysis |
|
confirmed the existence of malware and the transfer of information between infected computers and |
|
a number of control servers.33 |
|
Phase 2: Computer-based scouting, target selection, and data analysis (December 2008-March 2009) |
|
During the second phase of the investigation, researchers based at the Citizen Lab analysed the data |
|
collected by the field team. |
|
The data collected in Dharamsala and at Tibetan missions abroad led to the discovery of four control |
|
servers and six command servers. These control servers were identified and geo-located from the captured |
|
A portion of the fieldwork was carried out in conjunction with Dr. Shishir Nagaraja who spent five days in Dharamsala at the request |
|
of IWM researchers and assisted in conducting technical tests. |
|
A packet capturing program, Wireshark, was installed at each test location. All traffic from each of the affected systems was |
|
captured in real-time, and recorded for further analysis. Compromised systems try to connect to control servers in order check-in and |
|
report an infection. Once a connection is made, infected computers may receive instructions or additional locations from where they |
|
are to download instructions. The Wireshark data is sufficient to analyse these connections, determine the behaviour of the attack |
|
vector, and identify the location of control servers. |
|
JR02-2009 Tracking GhostNet - PART ONE |
|
traffic using a simple IP lookup.34 The control servers were then probed and web-based control interfaces |
|
were identified on four control servers, which allowed us to view and control the network. The system was |
|
actively monitored for two weeks, which allowed us to derive an extensive list of infected systems, and to |
|
also monitor the systems operator(s) as the operator(s) specifically instructed target computers. |
|
The data collected during both phases was integrated in Palantir, a data visualization and analysis |
|
tool. The Palantir platform provides a data fusion and visualization environment that enhances |
|
analytical capabilities. |
|
We looked up the associated Internet Protocol (IP) address in all five Regional Internet Registries in order to identify the country |
|
and network to which the IP address is assigned. We then performed a reverse Domain Name System (DNS) look-up on each IP |
|
address. DNS is the system that translates domain names into IP addresses; reverse DNS is a system that translates an IP address |
|
into a domain name. This can potentially provide additional information about the entity that has been assigned a particular IP |
|
address. If we discovered a domain name, we then looked up its registration in WHOIS, which is a public database of all domain |
|
name registrations and provides information about who registered the domain name. |
|
PART TWO: |
|
Tracking GhostNet |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
Phase 1: Field investigation |
|
We conducted our investigation in Dharamsala between July and September 2008. The initial purpose |
|
was to gather targeted malware samples from Tibetan NGOs based in the area and to brief the Tibetan |
|
Government-in-Exile (TGIE) on the basics of information security. This included raising end-user |
|
awareness about social engineering and its policy implications for the secure use of information systems. |
|
The investigator met with the Dalai Lama |
|
s representative in Geneva, Tseten Samdup. During the |
|
meeting, Samdup inquired about the potential threat to computer security at the Office of His |
|
Holiness the Dalai Lama (OHHDL) in light of the targeted malware threat. Samdup requested that |
|
the investigator perform a preliminary security review of OHHDL systems, including Dalailama.com |
|
and the office computer network. A five day mission was scheduled in early September. Malware |
|
was discovered on computers located in the OHHDL. |
|
Following the discovery of malware in the OHHDL, our investigator shifted focus to the campus |
|
network of the Tibetan Government-in-Exile. We approached Thubten Samphel, a senior civil |
|
servant in the Department for Information and International Relations, and sought permission |
|
to run Wireshark on several key computer systems, and to access the firewall logs at the Tibetan |
|
Computing Resource Centre. This access was readily granted. |
|
Additional testing was carried out at a Tibetan NGO. This was done at the suggestion of Phuntsok |
|
Dorjee, the director of a local NGO, TibTec. Dorjee suggested that we conduct testing and monitoring at |
|
the offices of Drewla.35 As was the case at other sitesthe investigator conducted a series of interviews |
|
with the NGO staff. |
|
Targeted malware |
|
previous research |
|
In September 2002, Tibetan groups reported that they were targeted with malware originating |
|
from servers in mainland China. They claimed that this was a coordinated attempt to disrupt their |
|
operations and spy on their computer networks. Similar attacks have occurred since then against a |
|
range of Tibetan non-state actors, including exile groups, human rights organizations, trade unions |
|
and labour organizers, writers, scholars and intellectuals. |
|
In 2005, a member of our investigating team convened a working group that coordinated the |
|
collection and archiving of the malware, including the payloads and associated examples of social |
|
engineering employed. Since early 2008, we have analysed every sample available to us, and |
|
identified control servers for at least fifty incidents. |
|
During an analysis of attacks which occurred during the 2008 Beijing Olympics we discovered |
|
the location of a control server that was later identified as part of the network which infected a |
|
computer in the private office of the Dalai Lama. |
|
The Drewla Initiative Project is an outreach model that seeks new ways to communicate directly with citizens of the People |
|
Republic of China. It relies heavily on the Internet. |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
We were able to gain access to the command interface of this control server and identify the |
|
infected computers which reported back to this server. While were are unable to prove exactly how |
|
the computer in the Dalai Lama |
|
s office became infected, this case demonstrates one of the attack |
|
vectors used by the attacker(s) behind the network of infected computers we later uncovered.36 |
|
The following steps illustrate the attack vector using the malicious document we collected, which was |
|
configured to connect to a control server to which we later acquired access. (See Fig. 1 - p.19) |
|
An email message arrives in the target |
|
s inbox carrying the malware in an attachment or web link. |
|
The attackers(s) |
|
objective is to get the target to open the attachment or malicious link so that the |
|
malicious code can execute. In this case, the attacker(s) sent a carefully crafted email message which |
|
was configured to appear as if it was sent from [email protected] with an attached infected |
|
Word document named |
|
Translation of Freedom Movement ID Book for Tibetans in Exile.doc |
|
to entice |
|
the recipient to open the file.37 (See Fig. 2 - p. 20) |
|
Over time, it has been observed that the carrier emails have become more sophisticated in their |
|
targeting and content in order to trick their recipients into believing that they are receiving |
|
legitimate messages. This is also known as |
|
social engineering. |
|
It is common to see legitimate |
|
documents recycled for such attacks or the attacker injecting their message into an ongoing group |
|
conversation. There are also cases where it appears that content stolen from previously-infected |
|
machines was recycled to enhance the appearance of legitimacy. |
|
The targeted user proceeds to opens the attachment or malicious link. Once opened, the infected |
|
file or link exploits a vulnerability on the user |
|
s machine and installs the malware on the user |
|
computer, along with a seemingly benign file. From the user |
|
s perspective, the infected document |
|
will often open normally, leaving the user unaware of the infection that just took place. |
|
Only 11 of the 34 anti-virus programs provided by Virus Total38 recognized the malware embedded in |
|
the document. Attackers often use executable packers to obfuscate their malicious code in order to |
|
avoid detection by anti-virus software. (See Fig. 3 - p. 21) |
|
Researchers monitoring the use of socially engineered malware attacks against the Tibetan |
|
community have identified over eight different Trojan families in use.39 Control over some targeted |
|
machines is maintained using the Chinese gh0st RAT (Remote Access Tool). These Trojans generally |
|
allow for near-unrestricted access to the infected systems. |
|
A detailed technical investigation of a similar case of a targeted attack which connected to the same control server is available |
|
here: http://xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx; another investigation of targeted attacks connecting to the same control |
|
server is available here: http://www.xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx |
|
For a detailed list of malicious files and control servers see xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx |
|
xxxxxxxxxxxxxxxxxxx |
|
VirusTotal.com is a free, web-based service that allows users to upload malicious files that are scanned with 34 leading anti-virus products. |
|
http://isc.sans.org/diary.html?storyid=4177 |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
Fig. 1 |
|
Social Engineering |
|
attack connects to GhostNet. |
|
This Palantir screen capture summarizes the relationships between an |
|
unknown sender |
|
pretending to be |
|
[email protected] |
|
, the email |
|
sent to the International Tibet Support Network , and the attachment ( |
|
Translation of Freedom Movement ID Book for Tibetans in Exile.doc |
|
that contained malware that connected to a GhostNet control server. |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
Fig. 2 |
|
Socially Engineered |
|
email sent to the International Tibet Support |
|
Network. |
|
This email was sent on July 25, 2008 by an unknown attacker pretending to be |
|
[email protected] |
|
to the International Tibet Support |
|
Network. Attached to the message was a Microsoft Word document named |
|
Translation of Freedom Movement ID Book for Tibetans in Exile.doc |
|
that exploits a vulnerability in Word to install malware on the target |
|
s computer system. |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
Fig. 3 |
|
A Virus Total screen capture of a malware infected email attachment. |
|
This is a screen capture from VirusTotal.com, a free, web-based service that allows users to upload malicious files that are scanned with |
|
anti-virus products. It shows that only 11 of 34 anti-virus products detected the malicious file ( |
|
Translation of Freedom Movement ID Book |
|
for Tibetans in Exile.doc |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
After infecting the target, the Trojan packed in the Word document performed a DNS look-up to |
|
find its control server and then connected to that server. This Trojan attempted to connect to |
|
xxxxxxxxxxxxxxxx. This is one of the control servers that we later scouted and was in the same |
|
Trojan family that infected computers in the Dalai Lama |
|
s private office. |
|
About 70% of the control servers behind the attacks on Tibetan organizations are located on IP |
|
addresses assigned to China. However, servers have also been identified in the United States, |
|
Sweden, South Korea and Taiwan. The host names pointing to these servers are quite often |
|
configured on dynamic DNS services, such as 3322.org. While these services in and of themselves |
|
are not malicious, they are heavily used in these specific attacks.40 |
|
Information Warfare Monitor field research |
|
In September and October 2008 the Information Warfare Monitor investigated information security |
|
practices and alleged cyber espionage activities on the computer systems in various offices related |
|
to the work of the Dalai Lama and other Tibetan groups. The offices that we investigated were: |
|
the Office of His Holiness the Dalai Lama (OHHDL), based in Dharamsala, India; the Tibetan |
|
Government-in-Exile (TGIE); various Offices of Tibet (OOT) in New York City, London, Paris, Brussels, |
|
and Geneva; and the Tibetan activist NGO, Drewla. (See Fig. 4 - p. 23) |
|
Office of His Holiness the Dalai Lama |
|
The OHHDL is the personal office of the Dalai Lama. The OHHDL provides secretarial assistance and |
|
is responsible for all matters related to the Dalai Lama and acts on his behalf. It is worth noting |
|
that the OHHDL |
|
s primary responsibilities include organization of the Dalai Lama |
|
s international |
|
schedule, handling all diplomatic, governmental and personal correspondence, and acting as |
|
the liaison between the Dalai Lama and officials of the Tibetan Government-in-Exile (TGIE) and |
|
the Offices of Tibet (OOT) worldwide. Therefore the OHHDL |
|
s computer network is continuously |
|
transmitting and receiving extremely sensitive data. |
|
While the Office does not have any secrets, it is essentially the hub of the Tibetan movement and |
|
thus handles strategic, time-sensitive communications. Examples of these communications include |
|
scheduling meetings with world leaders, and, since 2002, coordinating the negotiations between |
|
the People |
|
s Republic of China and Dharamsala. |
|
On September 10, 2008, we used Wireshark to capture packets from an OHHDL computer named |
|
xxxxxx. We chose xxxxxxx from among 23 computers on the OHHDL internal network due to |
|
time constraints and consultations with office staff to identify the computers most likely to be |
|
infected, such as those operated by relatively inexperienced users vulnerable to social engineering |
|
techniques, or those handling particularly sensitive data. |
|
An analysis of the data collected reveals that this computer was compromised by malware that was |
|
in interactive communication with identified control servers. The infected computer connected to |
|
http://www.businessweek.com/print/magazine/content/08_16/b4080032218430.htm |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
Fig. 4 |
|
Field researchers discovered malware at five Tibetan locations. |
|
A Palantir screen capture showing the Tibetan organizations at which we conducted field research and the connections from infected |
|
computers at these locations and various control servers located in China. The locations at which we found evidence of infection are: |
|
the Office of His Holiness the Dalai Lama, the Tibetan Government-in-Exile, the Offices of Tibet in New York City and London and the Tibetan |
|
activist NGO, Drewla. |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
four different IP addresses, each with a somewhat different method. While there are four groupings |
|
of communications between the infected computer and the control servers, they are related such |
|
that there appear to be two distinct families of malware. In both cases, the malware uses the |
|
protocol for standard web traffic, HTTP, in order make the network activity appear as if it were |
|
normal Internet browsing. |
|
The first family of malware used HTTP connections to connect to PHP files.41 Despite connecting |
|
to different IP addresses and requesting different files, both used the same unique key when |
|
communicating, indicating that they are part of the same family of malware. |
|
1) The malware made connections to a control server on IP address xxxxxxxxxxxx |
|
using two host names, xxxxxxxxxxxxxxxx and xxxxxxxxxxxxxxxxxx. The IP address |
|
xxxxxxxxx is in a range assigned to Hainan-TELECOM (xxxxxxxxxxxxxxxxxxxxxxxx |
|
xxxxxxxxxxxxxxxxx) in China. The malware used HTTP to connect to various PHP files |
|
on the control server in order to update its status and receive instructions about where |
|
to download commands. The commands are embedded in what appear to be image files |
|
(e.g. JPEG). |
|
2) The malware made connections to a control server on IP address xxxxxxxxxxx, port |
|
8000. This IP address reverse resolved to xxxxxxxxxxx.broad.hk.hi.dynamic.163data. |
|
com.cn and is in an IP range assigned to Hainan-TELECOM (HAIFU node adsl dialup |
|
ports) in China. The malware used HTTP POST to upload content to the control server.42 |
|
The investigation carried out in Phase 2 identified the network of control servers used in this |
|
particular attack. The control servers we discovered include the control server used in the welldocumented instances of social malware used frequently against Tibetan targets during the 2008 |
|
Olympics in Beijing. |
|
The second family of malware used HTTP POST to connect to a CGI43 script to communicate between |
|
the infected computer and the control server. While their functions appear to be different, with one |
|
malware focusing on reporting and commands and the other on document retrieval, they are likely part |
|
of the same family of malware. In addition, the domain names used, www.lookbytheway.net and www. |
|
macfeeresponse.org, are registered to the same person, |
|
zhou zhaojun |
|
([email protected]). |
|
1) The malware made connections to a control server on IP address 221.5.250.98 using |
|
the host name www.lookbytheway.net. The IP address 221.5.250.98 is assigned to |
|
CNCGROUP-CQ (CNC Group CHINA169 Chongqing Province Network) in China. The |
|
malware on the infected computer used HTTP to connect to a file in an attempt to |
|
inform the control server of the infected computer |
|
s status and to download commands. |
|
PHP is a popular scripting language often used in web applications. |
|
HTTP POST is a method often used to upload content to a web server. |
|
CGI scripts are often written in the Perl programming language. |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
In one case, the file the infected computer was requesting was not present and the |
|
infected computer received a 404 error. However, successful connections were made |
|
via HTTP to CGI scripts. The infected computer used HTTP POST to submit data to CGI |
|
scripts hosted on the control server. |
|
2) The malware made connections to a control server on 218.241.153.61 using the host name |
|
www.macfeeresponse.org. The IP address 218.241.153.61 is assigned to BITNET (Beijing |
|
Bitone United Networks) in Beijing, China. The malware on the infected computer used |
|
HTTP to connect to a file to inform the control server of the infected computer |
|
s status |
|
and download commands. In addition, connections were made via HTTP to CGI scripts. The |
|
infected computer used HTTP POST to submit data to CGI scripts hosted on the control |
|
server. Connections to one CGI script appear to inform the control server of the presence of |
|
particular documents, while connections to a second CGI script appear to cause the infected |
|
computer to upload documents to the control server using HTTP POST. |
|
Instances of malware that connect to control server locations www.lookbytheway.net and www. |
|
macfeeresponse.org have been analysed by security companies.44 This network extends to a variety |
|
of domain names including: |
|
www.lookbytheway.com |
|
210.51.7.155 |
|
www.macfeeresponse.com - 210.51.7.155 |
|
www.msnppt.net - 221.5.250.98 |
|
www.msnxy.net - 210.51.7.155 |
|
www.msnyf.com - 221.5.250.98 |
|
www.networkcia.com - 210.51.7.155 |
|
www.indexnews.org - 61.188.87.58 |
|
www.indexindian.com - 210.51.7.155 |
|
During the in situ investigation at the Dalai Lama |
|
s private office we observed several documents |
|
being exfiltrated from the computer network and uploaded to www.macfeeresponse.org, including |
|
a document containing thousands of email addresses and one detailing and discussing the Dalai |
|
Lama |
|
s envoy |
|
s negotiating position. (see Fig. 5 - p. 26) |
|
Our investigators did not have access to the stolen documents for reasons of confidentiality. |
|
However, we can assume their significance to Sino-Tibetan negotiations. One example is the fact |
|
that GhostNet penetrated computers of organizations involved in China-TGIE negotiations.45 |
|
See, http://www.threatexpert.com/report.aspx?md5=79f7f4695b8878cf1760e8626129ca88 and http://www.threatexpert.com/report. |
|
aspx?md5=ea03a7359505e19146994ad77b2a1e46 |
|
Lodi Gyari is the lead person designated by the Dalai Lama to coordinate negotiations with the Chinese government. Our invesigator |
|
interviewed him in December 2008 in Delhi. We briefed him on our ongoing investigation and offered advice on information security |
|
while engaged in negotiations in Beijing. Lodi Gyari is also the Executive Chairman of the Board of the International Campaign for |
|
Tibet (ICT), an independent Washington-based human rights advocacy group. (Note that our investigation uncovered that seven of |
|
s computers were compromised by GhostNet). |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
Fig. 5 |
|
Malware retrieving a sensitive document. |
|
This screen capture of the Wireshark network analysis tool shows an infected computer at the Office of His Holiness the Dalai Lama uploading a |
|
sensitive document to one of the CGI network |
|
s control servers. |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
Tibetan Government-in-Exile (TGIE) |
|
On September 11, 2008, Wireshark was used to capture packets from a TGIE computer xxxxxxx. An |
|
analysis revealed that this computer was compromised by malware which sent communication to, and |
|
received communication from, control servers. |
|
The malware made connections to a control server on 221.10.254.248 using the host name 927. |
|
bigwww.com. The IP address 221.10.254.248 is assigned to CNCGROUP-SC (CNC Group CHINA169 |
|
Sichuan Province Network) in China. The malware on the infected computer used HTTP to connect |
|
to a JPEG file, which was not an image file but instead contains an IP address and port number |
|
(124.135.97.21:8005). This IP address, 124.135.97.21, is assigned to CNCGROUP-SD (CNC Group |
|
CHINA169 Shandong Province Network) in China. |
|
Offices of Tibet |
|
London |
|
On October 1, 2008 Wireshark was used to capture packets from a computer in the London OOT. An |
|
analysis revealed that this computer was compromised by malware which sent communication to, and |
|
received communication from, control servers. |
|
The malware made connections to a control server on 58.141.132.66 using the hostname oyd.3322. |
|
org on port 4501. The IP address 58.141.132.66 is assigned to NamBu TV in Seoul, South Korea. 3322. |
|
org is a Chinese dynamic domain service. |
|
New York |
|
On March 3, 2008, Wireshark was used to capture packets from a computer in the New York OOT. |
|
An analysis revealed that this computer was compromised by malware which attempted to send |
|
communication to a control server. |
|
The malware attempted to make a connection to what appears to be a control server at |
|
125.108.172.81 but there was not an active server at that location. The IP address 125.108.172.81 is |
|
assigned to CHINANET-ZJ-WZ (CHINANET-ZJ Wenzhou node network) in China. |
|
Drewla |
|
Following the discovery of targeted malware on the OHHDL, TGIE and OOT networks, we performed |
|
similar analysis on Tibetan NGOs to see if we could identify more infected machines communicating |
|
with control servers in China. While we carried out such analysis on a number of NGOs, in this report |
|
we focus on Drewla |
|
s network. |
|
The Drewla ( |
|
connection |
|
in Tibetan) is an online outreach project was set up in 2005 that employs |
|
Tibetan youth with Chinese language skills to chat with people in mainland China and in the |
|
diaspora, raising awareness about the Tibetan situation, sharing the Dalai Lama |
|
s teachings, and |
|
supplying information on how to circumvent Chinese government censorship on the Internet. |
|
On September 12, 2008 Wireshark was used to capture packets from a Drewla computer. An analysis |
|
revealed that this computer was compromised by malware which sent communication to, and |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
received communication from, control servers. |
|
The malware made connections to a control server on 221.5.250.98 using the host name www. |
|
lookbytheway.net. The IP address 221.5.250.98 is assigned to CNCGROUP-CQ (CNC Group CHINA169 |
|
Chongqing Province Network) in China. The malware on the infected computer used HTTP to connect |
|
to a file in an attempt to inform the control server of the infected computer |
|
s status and download |
|
commands. The infected computer used HTTP POST to submit data to CGI scripts hosted on the |
|
control server. (see Fig. 6 - p. 29) |
|
Box 1. |
|
Chinese Internet SIGINT in practice |
|
During the course of our research, we were informed of the following incident. A member of |
|
Drewla, a young woman, decided to return to her family village in Tibet after working for two |
|
years for Drewla. She was arrested at the Nepalese-Tibetan border and taken to a detention |
|
facility, where she was held incommunicado for two months. She was interrogated by Chinese |
|
intelligence personnel about her employment in Dharamsala. She denied having been politically |
|
active and insisted that she had gone to Dharamsala for studies. In response to this, the |
|
intelligence officers pulled out a dossier on her activities and presented her with full transcripts |
|
of her Internet chats over the years. They indicated that they were fully aware of, and were |
|
monitoring, the Drewla outreach initiative and that her colleagues were not welcome to return |
|
to Tibet. They then released her and she returned to her village. |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
Fig. 6 |
|
The OHHDL and Drewla were infected by the same malware. |
|
This Palantir screen capture shows the relationship between an infected computer at the Office of His Holiness the Dalai Lama (OHHDL) and the |
|
Tibetan NGO Drewla. Both attempted to connect to the same control server in the CGI network. |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
Phase 2: Identifying command and control servers |
|
This phase of the investigation focused on the discovery of the command and control servers. We |
|
were able to identify and connect to the control servers used by the GhostNet by analysing the data |
|
from the OHHDL obtained during the field investigations carried out in Phase 1. During this process |
|
we were able to find and access web-based administration interfaces on the control server identified |
|
from the OHHDL data. These servers contain links to other control servers as well as command |
|
servers, and so therefore we were able to enumerate additional command and control servers. |
|
After discovering several instances of malware on these servers, we set up a honey pot computer and |
|
were able to identify additional malicious servers by monitoring the traffic generated by our infected |
|
honey pot. Using the attacker(s) |
|
web-based administration interface, we were able to command our |
|
honey pot computer to download gh0st RAT, one of the Trojans used by GhostNet. Eventually, our |
|
honey pot computer established a connection to the attacker(s) |
|
gh0st RAT client. The attacker(s) |
|
proceeded to execute commands on our honey pot. We were able to discover several IP addresses |
|
within a DSL range in Hainan Island (PRC) that the attacker(s) used to communicate with computers |
|
infected with gh0st RAT. |
|
Finally, we were able to map out the methods and capabilities of the GhostNet by a triangulated |
|
analysis of three sources: 1) data obtained from our collection of socially engineered emails with |
|
backdoor attachments, 2) the captured network traffic from Tibetan targets; and, 3) data obtained by |
|
gaining access to the command and control interface. (see Fig. 7 - p. 31) |
|
While analysing the data collected from the infected OHHDL computer (xxxxxxx), we discovered |
|
web-based administration interfaces to four control servers. Through some strategic guessing |
|
concerning file paths and file names, we were able to access web interfaces to multiple control |
|
servers. In total, we found 26 instances of the administration interface across the four servers. It |
|
remains unclear why the attacker(s) did not secure access to the control interface. Perhaps the |
|
attacker(s) concluded that the file paths and file names could not be easily guessed. |
|
The control servers |
|
web interface contains three main components: 1) a listing of all the infected computers |
|
that have reported to the control server; 2) an interface to issue commands to the infected computers; and |
|
3) an interface to monitor pending commands to infected computers and their results when completed. |
|
The commands issued to the infected computers direct the infected computer to download files |
|
from additional command servers under the attacker(s) |
|
control. In some cases, these servers act as |
|
control servers themselves; however, some appear to be used exclusively to host malicious files that |
|
infected computers are meant to download. The attacker(s) set commands on the control servers |
|
that instruct infected computers to download additional remote administration Trojans, such as |
|
gh0st RAT, in order to take complete real-time control of the infected computers. |
|
Three of the four control servers are located in three different locations in China: Hainan, |
|
Guangdong and Sichuan. One of the control servers is located at a web-hosting company in the |
|
United States. Five of the six command servers are located in mainland China (Hainan, Guangdong, |
|
Sichuan and Jiangsu) and one in Hong Kong. |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
Fig. 7 |
|
The GhostNet control servers. |
|
This Palantir screen capture shows the GhostNet servers we uncovered and their relationship with the malicious email sent to, 1) the |
|
International Tibet Support Network, 2) the infected computer at the Office of His Holiness the Dalai Lama; and, 3) the honey pot network set |
|
up at the Citizen Lab. |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
The four control servers are: |
|
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, Hainan-TELECOM, CN |
|
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, US |
|
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, CHINANET-GD, CN |
|
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx CHINANET-SC, CN |
|
The six control/command servers are: |
|
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, CHINANET-HI, CN |
|
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, CUHKNET, HK |
|
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, CHINANET-GD, CN |
|
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, CHINANET-SC, CN |
|
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, CHINANET-JS, CN |
|
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, CHINANET-SC, CN |
|
The data obtained from WHOIS records concerning domain name registration reveals that most |
|
of the domains are traceable to the same individual. However, the attacker(s) could have simply |
|
stolen the domains from someone else, or compromised the servers hosting these domains. |
|
Table 1: Domain name registration information |
|
xxxxxxxxxxxxx |
|
xxxxxxxxxxxxx |
|
xxxxxxxxxxxxx |
|
xxxxxxxxxxxxxxxxxxxxxxxxxxxx |
|
25/04/06 |
|
xxxxxxxxxxxxx |
|
xxxxxxxxxxxxx |
|
xxxxxxxxxxxxx |
|
xxxxxxxxxxxxx |
|
26/11/07 |
|
xxxxxxxxxxxxx |
|
xxxxxxxxxxxxxxxxxx |
|
xxxxxxxxxxxxxxxxxx |
|
xxxxxxxxxxxxxxxxx |
|
xxxxxxxxxxxxxxxxxxx |
|
20/06/08 |
|
xxxxxxxxxxxxxxxxxx |
|
xxxxxxxxx |
|
xxxxxxxxxxxxxxxxxx |
|
03/09/08 |
|
List of infected computers (see Fig. 8 - p. 33) |
|
The Server List interface provides information on each computer infected by the attacker(s) |
|
malware, indicating the name given to the computer (by its owner/operator), its IP address, when |
|
it was first infected, when it last called home (i.e. the control server), and how many times it |
|
has called home. Each infected computer is assigned a unique identification number so that the |
|
infected computer can be tracked even when its IP address changes. The page also features a link |
|
to the Send Command interface, through which the attacker(s) sends instructions to the infected |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
Fig. 8 |
|
The GhostNet |
|
Server List |
|
interface. |
|
This screen capture of the GhostNet interface shows all infected computers that have |
|
checked in |
|
with the control server. It has been obscured |
|
to protect the identity of the victims. |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
computers. There is also a button at the top of the page that links to a Command Result page that |
|
shows the status of the commands sent to the host and their results. |
|
To corroborate our findings, there was an entry in the Server List page of the infected OHHDL |
|
computer that we analysed during our field investigations outlined in Part One. It contained the |
|
unique ID, the IP address, computer name, and a link to issue commands to the infected computer. |
|
Sending commands |
|
The Send Command link provided for each entry yields an interface that allows an attacker(s) to |
|
send specific commands to the selected infected computer. In addition to a custom command, the |
|
attacker(s) may choose from a menu of commands, which includes options to download binaries that |
|
provide additional functionality (such as keystroke logging or remote administration), acquire system |
|
information (list computer information, software and documents on the computer), or cause the |
|
malware to become dormant. (See Fig. 9 - p. 35) |
|
Using the Send Command interface, the attacker(s) issues instructions to the infected computers to |
|
download malicious files that are disguised as standard image files. As mentioned above, the files |
|
are most often hosted on additional command servers that appear to be dedicated to hosting these |
|
infected files.46 These command servers contain a variety of files. While the exact function of each |
|
file is not known, the file names given to them by the attacker(s) provide some indication of their |
|
functionality. There are file names associated with the retrieval of files as well as keystroke logging. |
|
One of the commands available to the attacker(s) instructs infected computers to download the |
|
gh0st RAT remote administration tool, which gives the attacker(s) full, real-time control of the infected |
|
computer. Gh0st RAT is an open source Trojan that is widely available online. It was developed by |
|
Chinese programmers but has now been translated into English. The program allows an attacker to |
|
create an executable file that can be repacked and disguised and used to infect and compromise a target |
|
computer. This file can be configured to directly connect to the gh0st RAT owner or to a third location, a |
|
control server, when it retrieves the current IP address of the gh0st RAT owner. (See Fig. 10 - p. 36) |
|
Once the infected computer connects to the gh0st RAT owner, an entry appears in the Connection |
|
window with some information about the infected computer. The gh0st RAT owner may then |
|
issue commands to the infected computer. These commands include file manager, screen capture, |
|
keylogger, remote shell, system, webcam view, audio capture, as well as the ability to force the |
|
infected host to download and execute additional malware, such as a gh0st RAT update. |
|
During the course of the investigation, we infected a honey pot computer with the attacker(s) |
|
malware. We instructed our infected computer to download the attacker(s) |
|
version of gh0st RAT |
|
using the malicious network |
|
s web-based administration interface. The gh0st RAT attempted to |
|
connect to several *.broad.hk.hi.dynamic.163data.com.cn IP addresses before finally successfully |
|
connecting to xxxxxxxxxxxxxxxxxxxxxxxxx.broad.hk.hi.dynamic.163data.com.cn). |
|
In some cases the malicious image files are hosted on the control servers themselves. |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
Fig. 9 |
|
The GhostNet |
|
Send Command |
|
interface. |
|
This screen capture of the GhostNet interface shows how the attacker(s) can send specific commands to infected computers. It has been |
|
obscured to protect the identity of the victims. |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
Fig. 10 |
|
The gh0st RAT interface. |
|
This screen capture of the English language version of the gh0st RAT software shows the commands that an attacker is able to execute on the |
|
compromised computer. |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
The gh0st RAT tool attempts to connect to IP addresses of a DSL provider in Hainan, China: |
|
xxxxxxxxxxxx.broad.hk.hi.dynamic.163data.com.cn |
|
xxxxxxxxxxxx.broad.hk.hi.dynamic.163data.com.cn |
|
xxxxxxxxxxxx.broad.hk.hi.dynamic.163data.com.cn |
|
xxxxxxxxxxxx.broad.hk.hi.dynamic.163data.com.cn |
|
xxxxxxxxxxxx.broad.hk.hi.dynamic.163data.com.cn |
|
xxxxxxxxxxxx.broad.hk.hi.dynamic.163data.com.cn |
|
After a successful connection, the attacker(s) proceed to issue commands on our infected |
|
computer in real-time. |
|
We found similar but unsuccessful connections to the same IP address range from some of the |
|
infected computers we analysed and discovered that a rudimentary version of the web-based |
|
administration interface contained only one infection from the same IP address range in Hainan. |
|
In addition, one of the servers used to host the attacker(s) |
|
malicious files is a Government of |
|
Hainan web server located in Hainan, and one of the control server interfaces we gained access |
|
to is also located in Hainan. However, one should not rush to judgement concerning the identity |
|
of the attacker(s) based on this location. The gh0st RAT software can be configured with a proxy |
|
server; therefore it is possible that the attacker(s) were using a compromised system as a proxy to |
|
hide their true location. |
|
Command results |
|
The Command Result page lists the commands issued through the Send Command page and the |
|
status of those commands. Each entry in this interface shows what command was sent to the |
|
infected computer, including the URL to the command server and the command file (the malicious |
|
file disguised as an image). Upon the successful completion of a command, the relevant date, time, |
|
and result are recorded. (See Fig. 11 - p. 38) |
|
The Command Result page contains a column that displays the content sent back to the control |
|
server from the infected computer. The command issued to retrieve this content in the Send |
|
Command interface is labelled |
|
Acquire System Information. |
|
Even though we have been unable |
|
to properly decode the content,47 the plain text values in the binary content indicate that these |
|
entries contain information about the infected computer (CPU, memory, operating system, |
|
programmes installed) as well as file names of documents on the computer, presumably for later |
|
retrieval. This information is likely used to determine which targets the attacker(s) will further |
|
exploit and control using remote administration tools such as gh0st RAT. |
|
The content is base64 encoded and XORed with values we have yet to identify. |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
Fig. 11 |
|
The GhostNet |
|
List Command |
|
interface. |
|
This screen capture of the GhostNet interface lists the commands issued to infected computers. It has been obscured to protect the identity of |
|
the victims. |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
Methods and capabilities |
|
The attacker(s) are able to exploit several infection vectors. First, they create web pages that |
|
contain |
|
drive by |
|
exploit code that infects the computers of those who visit the page. Second, the |
|
attacker(s) have also shown that they engage in spear phishing in which contextually relevant emails |
|
are sent to targets with PDF and DOC attachments which, when executed, create back doors that |
|
cause the infected computer to connect to a control server and await further instructions. |
|
With each successful infection the attacker(s) may use any contextually relevant data to further |
|
exploit the targeted community and may also impersonate the initial target in order to infect all the |
|
targets |
|
contacts. Finally, the targets themselves may infect others by forwarding infected documents |
|
to their contacts. In this way, the network of infected computers grows organically. |
|
The first stage of infection focuses on getting targets to execute malicious code. Once infected, the target |
|
computer routinely checks in with a control server in order to receive further instructions. At this stage, |
|
the attacker(s) acquires some initial information regarding the identity of the infected computer. |
|
Newer versions of the administration interface contain a direct link to a web service that looks up |
|
the relevant WHOIS information about the IP address of the infected computer along with a simple |
|
port scan. This version also does a geoIP lookup on the infected computer |
|
s IP address and lists the |
|
country in which the computer is located, indicating that the attacker(s) has an interest in the |
|
geographical location of the infected computers. |
|
The attack may also issue an acquire system information command that causes the infected computer to upload |
|
its hardware statistics, list of programs installed, list of recent documents, and current network connections. |
|
The attacker(s) may use this information to target the infected computer for further exploitation. |
|
The attacker(s) directs the infected computers to download and install a remote administration |
|
Trojan. The attacker(s) have demonstrated a preference for gh0st RAT but may choose from a variety |
|
of Trojans. The attacker(s) simply browses to the |
|
send command |
|
interface and pastes in a link to |
|
a version of gh0st RAT on a |
|
command |
|
server under his or her control. The next time the infected |
|
computer checks in to the control server, it will be instructed to download and execute gh0st RAT. |
|
Upon completion, the infected computer notifies the control server and the result appears in the |
|
attacker(s) |
|
web interface. |
|
Once gh0st RAT is installed on the target, the infected computer will periodically check a specific |
|
location and retrieve the IP address to which it is supposed to connect. When the attacker(s) |
|
is not available, he or she will often change this IP to 127.0.0.1 (localhost) so that the amount |
|
of potentially suspicious external traffic is limited. When the attacker(s) is ready to receive |
|
connections, the IP address is changed to a valid external IP address. |
|
When the attacker(s) turns on gh0st RAT, he or she is able to see all the infected machines that have |
|
established connections to him or her. The attacker(s) may then execute a wide variety of commands, |
|
including file manager, screen capture, keylogger, remote shell, system, webcam view, audio capture, |
|
as well as the ability to force the infected host to download and execute additional malware, such as |
|
a gh0st RAT update. The attacker(s) may also secretly execute programs on the target computer. |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
Analysis of list of infected computers |
|
A detailed analysis of the list of infected computers revealed an overwhelming number of unique |
|
infections in many countries. The same malware that infected computers at the Dalai Lama |
|
s office |
|
and other Tibetan organizations had a much more extensive set of targets. The list of entities and |
|
locations of those targeted was quite varied. |
|
In total, we found 1,295 infected computers located in 103 countries. We found that we were able to |
|
confidently |
|
on a scale of low, medium, high |
|
identify 397 of the 1,295 infected computers (26.7%), |
|
and labelled each one as a high-value target. We did so because they were either significant to the |
|
relationship between China and Tibet, Taiwan or India, or were identified as computers at foreign |
|
embassies, diplomatic missions, government ministries, or international organizations. |
|
Of the remaining infected computers, 536 appear to be computers on private broadband Internet |
|
providers. The remaining IP addresses do not reverse resolve and available information on these |
|
hosts does not allow us to make judgements regarding the identity or purpose of these computers. |
|
Methodology |
|
We compiled a unified and comprehensive list of infected computers from all the control servers, |
|
as there was considerable duplication across them. There were several duplicate entries in the list |
|
of infected computers |
|
in some cases, the same infected computer was logged multiple times as it |
|
was connecting from a different IP address. In other instances, multiple infected computers were |
|
assigned different internal IP addresses and had different computer names but shared the same |
|
external IP address. This signifies that there were multiple infected computers sharing Internet |
|
access. Where possible, we filtered the results by unique computer name, and if no computer name |
|
was present, we filtered by unique external IP address.48 (See Fig. 12 - p. 41) |
|
On the surface, the names of the infected computers in the sample are provocative. There are references |
|
to ministries of foreign affairs, foreign embassies, and other government entities. Some contains names of |
|
officials or their positions/titles. However, we recognize that a computer name can be anything its owner |
|
wishes, and may be completely unrelated to the location, function, or owner of that particular computer. |
|
Therefore, in order to be more confident as to the true identity or purpose of the infected computer, |
|
we relied on reverse DNS look-ups and each IP address |
|
record from the Regional Internet Registries. |
|
Using these two pieces of information we were able to confirm the validity of the identity of several |
|
infected computers with a high (H) degree of confidence. |
|
In some cases the computer name associated with the infected computer is actually a domain |
|
name or an acronym for a recognizable institution or organization. In these cases we classified our |
|
identification of the target with either a medium (M) or low (L) level of confidence. Medium |
|
confidence refers to instances where we have otherwise identified a related high confidence target, |
|
In one case we removed 117 unique IP addresses from Mexico that appeared to belong to the same computer connecting in to the |
|
control server from a DSL provider. |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
Fig. 12 |
|
The geographic location of infected hosts. |
|
This graphic illustrates the global reach of the GhostNet. There were 1,295 infected computers that reported to the control server. The |
|
infections were spread across 103 countries. Taiwan reported the most infections followed by the United States, Vietnam and India. |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
but for which we rely on the computer name for identification. Low confidence refers to instances |
|
in which we rely solely on the computer name for identification. |
|
Table 2: Selected infections |
|
Organization |
|
Confidence |
|
Location |
|
Infections |
|
ASEAN |
|
ID, MY |
|
Asian Development Bank |
|
PH, IN |
|
Associated Press, UK |
|
GB, HK |
|
Bureau of International Trade Relations |
|
CanTV, Venezuela |
|
Ceger, Portugal |
|
Consulate General of Malaysia, Hong Kong |
|
Deloitte & Touche, New York |
|
Department of Commerce, Solomon Islands |
|
Department of Foreign Affairs, Indonesia |
|
Department of Foreign Affairs, Philippines |
|
Department of Science and Technology, Philippines |
|
Embassy of China, US (see footnote 50) |
|
Embassy of Cyprus, Germany |
|
Embassy of Germany, Australia |
|
Embassy of India, Belgium |
|
Embassy of India, Serbia |
|
Embassy of India, Germany |
|
Embassy of India, Italy |
|
Embassy Of India, Kuwait |
|
Embassy of India, USA |
|
Embassy of India, Zimbabwe |
|
Embassy of Indonesia, China |
|
Embassy of Malaysia, Cuba |
|
Embassy of Malaysia, Italy |
|
Embassy of Malta |
|
Embassy of Malta, Australia |
|
Embassy of Malta, Belgium |
|
Embassy of Malta, Libya |
|
Embassy of Pakistan, Bahrain |
|
Embassy of Papua New Guinea, China |
|
Embassy of Portugal, Finland |
|
Embassy of Portugal, Germany |
|
Embassy of The Republic Of China (Taiwan), Swaziland |
|
Embassy of Romania, Finland |
|
Embassy of Romania, France |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
Table 2: Selected infections (cont |
|
Organization |
|
Confidence |
|
Location |
|
Infections |
|
Embassy of Romania, Norway |
|
Embassy of Romania, PRC |
|
Embassy of Thailand, Philippines |
|
Embassy of the Republic of Korea, China |
|
Government Integrated Telecommunication Network, Malaysia |
|
High Commission of India, Cyprus |
|
High Commission Of India, United Kingdom |
|
Institute for Information Industry, Taiwan |
|
International Campaign for Tibet |
|
International Chamber of Shipping, United Kingdom |
|
Lanka Education and Research Network, Sri Lanka |
|
Malta External Trade Corporation Ltd. |
|
Maritime Police, Solomon Islands |
|
Ministry of Communications, Brunei |
|
Ministry of Education, Solomon Islands |
|
Ministry of Foreign Affairs, Bangladesh |
|
Ministry of Foreign Affairs, Barbados |
|
Ministry of Foreign Affairs, Bhutan |
|
Ministry of Foreign Affairs, Brunei |
|
Ministry Of Foreign Affairs, Iran |
|
Ministry of Foreign Affairs, Latvia |
|
Ministry of Industry and Trade, Vietnam |
|
Ministry of Labour and Human Resources, Bhutan |
|
National Informatics Centre, India |
|
NATO, (SHAPE HQ) |
|
Net Trade, Taiwan |
|
New Tang Dynasty Television, United States |
|
Office of the Dalai Lama, India |
|
Pakistan Mission to The United Nations |
|
US, JP |
|
Permanent Delegation of Cyprus to the European Union |
|
Permanent Mission of Cuba to the United Nations |
|
PetroVietnam |
|
Prime Minister |
|
s Office, Laos |
|
Public Service Division, Solomon Islands |
|
Russian Federal University Network, Russian Federation |
|
Software Technology Parks of India, India |
|
South Asian Association for Regional Cooperation |
|
BD, US |
|
Students for a Free Tibet, United States |
|
TAITRA, Taiwan |
|
TW, NG |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
Table 2: Selected infections (cont |
|
Organization |
|
Confidence |
|
Location |
|
Infections |
|
Taiwan Government Service Network, Taiwan |
|
Tibetan Government in Exile, India |
|
IN, US |
|
Trade and Industry Department, Government of Hong Kong |
|
Infection timeline |
|
The earliest infected computer called home to the control server on May 22, 2007. The most recent |
|
entry in our sample is March 12, 2009. On average, the amount of time that a host was actively |
|
infected was 145 days.49 While 90 infected computers were only infected for one day, 145 were |
|
infected for over 400 days. The longest infection span was 660 days. In total, 422 hosts checked in |
|
March 1-12, 2009; 373 of these computers were infected in 2008. The data indicates that despite a |
|
reduction in new infections, the network continues to be operational. (See Fig. 13 - p. 45) |
|
There are significant spikes in infection rates in December 2007 and August 2008. |
|
There were 320 infections in December 2007 spread across 56 countries. However, 113 were located |
|
within Taiwan and the majority of these infections occurred within a single organization: the |
|
Taiwan External Trade Development Council. During this same period, computers at the Embassies |
|
of India in Belgium and Zimbabwe were infected as were the Embassies of Indonesia and the |
|
Republic of Korea in the People |
|
s Republic of China. In addition, computers at the Ministry of |
|
Foreign Affairs in Iran were infected as were several computers at the Tibetan Government-in-Exile. |
|
The spike in August 2008 totalled 258 infections spread across 46 countries. The OHHDL computer |
|
was infected during one of these spikes in August 2008 (It last checked in to the control server |
|
in September 2008). This spike included the Chinese Embassy in the United States,50 3 computers |
|
at the Embassy of India in the Unites States, and the High Commission of India in the United |
|
Kingdom and in Cyprus. It also included the Embassy of Cyprus in Germany, the Embassy of |
|
Malaysia in Cuba, the Embassy of Thailand in the Philippines and the Ministry of Industry in |
|
Vietnam. Several companies were also compromised, including Net Trade in Taiwan, the New York |
|
Office of Deloitte & Touche, and PetroVietnam, the government-owned oil and gas Company. |
|
The average number of days from the initial infection to the last time an infected computer |
|
checked in |
|
with a control server. |
|
It is unclear whether the affected embassy is the Republic of China (Taiwan) or People |
|
s Republic of China. |
|
JR02-2009 Tracking GhostNet - PART TWO |
|
Fig. 13 |
|
GhostNet infection timeline. |
|
This screen capture of a timeline generated with Palantir illustrates when and how many computers were infected by the GhostNet. |
|
It shows that there are significant spikes in infection rates in December 2007 and August 2008. |
|
PART THREE: |
|
Investigating GhostNet: Conclusions |
|
JR02-2009 Tracking GhostNet - PART THREE |
|
The evidence presented in this report |
|
through a combination of field investigations, |
|
interviews, technical scouting, data analysis, mining and visualization |
|
paints a |
|
disturbing picture. |
|
GhostNet represents a network of compromised computers resident in high-value political, |
|
economic, and media locations spread across numerous countries worldwide. At the time of writing, |
|
these organizations are almost certainly oblivious to the compromised situation in which they find |
|
themselves. The computers of diplomats, military attach |
|
s, private assistants, secretaries to Prime |
|
Ministers, journalists and others are under the concealed control of unknown assailant(s). |
|
In Dharamsala and elsewhere, we have witnessed machines being profiled and sensitive documents |
|
being removed. At our Laboratory, we have analysed our own infected |
|
honey pot |
|
computer |
|
and discovered that the capabilities of GhostNet are potent and wide ranging. Almost certainly, |
|
documents are being removed without the targets |
|
knowledge, keystrokes logged, web cameras are |
|
being silently triggered, and audio inputs surreptitiously activated. |
|
This raises the question, how many sensitive activities have been preemptively anticipated by |
|
intelligence gathered through this network? How many illegal transactions have been facilitated by |
|
information harvested through GhostNet? Worst of all, how many people may have been put at risk? |
|
While these questions are compelling, it would be imprudent to read these findings as an indictment, |
|
or to attribute to the owners of GhostNet motivations and intentions for which there is no evidence. |
|
Alternative explanations |
|
The list of computers controlled by the GhostNet is significant, and certainly atypical for a cybercrime |
|
network. The size of the network is small, and the concentration of high-value systems is significant. |
|
At the same time, penetrations of this type are not uncommon. Recently, several large-scale spy |
|
nets have been discovered, including ones containing lists of affected computers of a magnitude |
|
higher than that harvested by GhostNet. |
|
This trend is predictable, converging with accumulating incidents of cyber-attacks facilitated by |
|
lower entry-thresholds for computer exploitation methods and technologies. The tools we profile in |
|
our investigation, though apparently amassed in a complex way to achieve a definite purpose, are |
|
not restricted to an exclusive guild of experts with specialized and confidential knowledge. |
|
Today, pirated cyber-crime kits circulate extensively on the Internet and can be downloaded by |
|
anyone about as easily as the latest pirated DVD.51 Cyberspace has empowered individuals and small |
|
groups of non-state actors to do many things, including executing sophisticated computer network |
|
operations that were previously only the domain of state intelligence agencies. We have entered |
|
the era of do-it-yourself (DIY) signals intelligence. |
|
http://ddanchev.blogspot.com/2008/11/zeus-crimeware-kit-gets-carding-layout.html |
|
JR02-2009 Tracking GhostNet - PART THREE |
|
Attribution |
|
Who is ultimately in control of the GhostNet system? While our analysis reveals that numerous |
|
politically sensitive and high-value computer systems were compromised, we do not know the |
|
motivation or the identity of the attacker(s) or how to accurately characterize this network of |
|
infections as a whole. We have not been able to ascertain the type of data that has been obtained |
|
by the attacker(s), apart from the basic system information and file listings of the documents |
|
located on the target computers. Without this data we are unable to deduce with any certainty |
|
what kind of data the attacker(s) were after. There are thus several possibilities for attribution. |
|
The most obvious explanation, and certainly the one in which the circumstantial evidence tilts the |
|
strongest, would be that this set of high profile targets has been exploited by the Chinese state for |
|
military and strategic-intelligence purposes. Indeed, as described above, many of the high confidence, |
|
high-value targets that we identified are clearly linked to Chinese foreign and defence policy, |
|
particularly in South and South East Asia. Like radar sweeping around the southern border of China, |
|
there is an arc of infected nodes from India, Bhutan, Bangladesh and Vietnam, through Laos, Brunei, |
|
Philippines, Hong Kong, and Taiwan. Many of the high profile targets reflect some of China |
|
s most |
|
vexing foreign and security policy issues, including Tibet and Taiwan. Moreover, the attacker(s) |
|
addresses examined here trace back in at least several instances to Hainan Island, home of the Lingshui |
|
signals intelligence facility and the Third Technical Department of the People |
|
s Liberation Army.52 |
|
However, we must be cautious to rush to judgement in spite of circumstantial and other evidence, |
|
as alternative explanations are certainly possible and charges against a government of this nature |
|
are gravely serious. On the other end of the spectrum is the explanation that this is a random set |
|
of infected computers that just happens to include high profile targets of strategic significance |
|
to China, collected by an individual or group with no political agenda per se. Similarly one can |
|
postulate that the targets gathered together happened less by concerted effort than by sheer |
|
coincidence. Given the groupings of various entities in the infected computer list (by country |
|
and organization), internal email communications and sloppy security practices could have led to |
|
cross-infection and subsequent listing on the control servers. |
|
Another possible explanation is that there is a single individual or set of individuals (criminal networks, |
|
for example) who are targeting these high-value targets for profit. This can be in the form of stealing |
|
financial information or critical data that can be sold to clients, be they states or private entities. There |
|
are countless examples of large-scale fraud and data theft worldwide and numerous apparent instances |
|
of outsourcing to third parties of cyber-attacks and espionage, some of which the Information Warfare |
|
Monitor and its related research project, the OpenNet Initiative, have documented. GhostNet could very |
|
well be a for-profit, non-state venture. Even |
|
patriotic hackers |
|
could be acting on their own volition, |
|
or with the tacit approval of their government, as operators of the GhostNet. |
|
Finally, it is not inconceivable that this network of infected computers could have been targeted |
|
by a state other than China, but operated physically within China (and at least one node in |
|
http://www.globalsecurity.org/military/world/china/lingshui.htm |
|
JR02-2009 Tracking GhostNet - PART THREE |
|
the United States) for strategic purposes. Compromised proxy computers on Hainan Island, for |
|
example, could have been deployed as staging posts, perhaps in an effort to deliberately mislead |
|
observers as to the true operator(s) and purpose of the GhostNet system. |
|
The Significance of GhostNet |
|
GhostNet is significant, as it does not appear to be a typical cybercrime network. The potential |
|
political fallout is enormous. But ultimately, the question of who is behind the GhostNet may |
|
matter less than the strategic significance of the collection of affected targets. What this study |
|
discovered is serious evidence that information security is an item requiring urgent attention at |
|
the highest levels. It demonstrates that the subterranean layers of cyberspace, about which most |
|
users are unaware, are domains of active reconnaissance, surveillance, and exploitation. |
|
Regardless of who or what is ultimately in control of GhostNet, its capabilities of exploitation and |
|
the strategic intelligence that can be harvested from it matter most. Indeed, although the Achilles |
|
heel of the GhostNet system allowed us to monitor and document its far-reaching network of |
|
infiltration, we can safely hypothesize that it is neither the first nor the only one of its kind. |
|
PART FOUR: |
|
About Information Warfare Monitor |
|
About the Information Warfare Monitor |
|
http://infowar-monitor.net/ |
|
The Information Warfare Monitor is an advanced research activity tracking the emergence of cyberspace |
|
as a strategic domain. We are an independent research effort. Our mission is to build and broaden the |
|
evidence base available to scholars, policymakers, and others. We aim to educate and inform. |
|
The Information Warfare Monitor is a public-private venture between two Canadian institutions: The |
|
SecDev Group, an operational think tank based in Ottawa (Canada), and the Citizen Lab at the Munk |
|
Centre for International Studies, University of Toronto. The Principal Investigators and |
|
co-founders of the Information Warfare Monitor are Rafal Rohozinski (The SecDev Group) and |
|
Ronald Deibert (Citizen Lab). |
|
The Information Warfare Monitor is supported by The SecDev Group which conducts field-based |
|
investigations and data gathering. Our advanced research and analysis facilities are located at the |
|
Citizen Lab. IWM is part of the Citizen Lab |
|
s network of advanced research projects, which include the |
|
OpenNet Initiative and ONI Asia. |
|
The Information Warfare Monitor also benefits from donations from a variety of sponsors including |
|
Psiphon Inc, and Palantir Technologies. |
|
The Information Warfare Monitor engages in three primary activities: |
|
1. Case Studies. We design and carry out active case study research. These are self-generated |
|
activities consistent with our mission. |
|
We employ a rigorous and multidisciplinary approach to all our case studies blending qualitative, technical, |
|
and quantitative methods. As a general rule, our investigations consist of at least two components: |
|
Field-based investigations. We engage in qualitative research among affected |
|
target audiences and employ techniques that include interviews, long-term in situ |
|
interaction with our partners, and extensive technical data collection involving |
|
system monitoring, network reconnaissance, and interrogation. Our field-based teams |
|
are supported by senior analysts and regional specialists, including social scientists, |
|
computer security professionals, policy experts, and linguists, who provide additional |
|
contextual support and substantive back-up. |
|
Technical scouting and laboratory analysis. Data collected in the field is rigorously |
|
analysed using a variety of advanced data fusion and visualization methods. Leads |
|
developed on the basis of infield activities are pursued through |
|
technical scouting, |
|
including computer network investigations, and the resulting data and analysis |
|
is shared with our infield teams and partners for verification and for generating |
|
additional entry points for follow-on investigations. |
|
2. Open Source Trend Analysis. We collect open-source information from the press and other |
|
sources tracking global trends in cyberspace. These are published on our public website. |
|
3. Analytical Workshops and Outreach. We work closely with academia, human rights |
|
organizations, and the defense and intelligence community. We publish reports, and occasionally |
|
conduct joint workshops. Our work is independent, and not subject to government classification. Our |
|
goal is to encourage vigorous debate around critical policy issues. This includes engaging in ethical |
|
and legal considerations of information operations, computer network attacks, and computer network |
|
exploitation, including the targeted use of Trojans and malware, denial of service attacks, and |
|
content filtering. |
|
About The SecDev Group |
|
http://www.secdev.ca |
|
The SecDev Group is a Canadian-based operational consultancy focused on countries and regions at |
|
risk from violence and insecurity. We deliver to our clients insights and access to a diverse range |
|
of cultures, audiences, challenging environments and ungoverned spaces. Our approach combines |
|
a field research capability with advanced techniques and methods for generating policy-relevant |
|
analysis and solutions. As a think tank, we identify and communicate realistic options to enhance |
|
effectiveness through evidence-based research on the causes, consequences and trajectories of |
|
insecurity and violence. We are operational because we design and conduct activities in complex and |
|
insecure environments. |
|
About The Citizen Lab |
|
http://www.citzenlab.org |
|
The Citizen Lab is an interdisciplinary laboratory based at the Munk Centre for International Studies at |
|
the University of Toronto, Canada focusing on advanced research and development at the intersection |
|
of digital media and world politics. We are a hothouse that combines the disciplines of political |
|
science, sociology, computer science, engineering, and graphic design. Our mission is to undertake |
|
advanced research and engage in development that monitors, analyses, and impacts the exercise of |
|
political power in cyberspace. The Citizen Lab |
|
s ongoing research network includes the Information |
|
Warfare Monitor and the OpenNet Initiative, ONI Asia, and benefits from collaborative partnerships |
|
with academic institutions, NGOs, and other partners in all regions of the world. |
|
|