diff --git "a/2009.clean.txt" "b/2009.clean.txt" new file mode 100644--- /dev/null +++ "b/2009.clean.txt" @@ -0,0 +1,3029 @@ +Volume 11, 2009 +Baltic Security & Defence Review +Impact of Alleged Russian Cyber Attacks +By William C. Ashmore * +During a two week period in April and May of 2007 Estonia was the +victim of a sustained massive cyber attack on its information infrastructure. +While the cyber attack was not the first nor was it the largest, it was the +first cyber attack that was directed at the national security of a country. +(Davis, 2009) +The significance of a cyber attack on a small country can be difficult to +measure for a casual observer. Estonia is a small country that can be seen +as a model for the future. Estonians have developed and used internet +technology for voting, education, security and banking (ninety-five percent +of banking operations are done electronically) (Collier, 2007). It is not +uncommon to see a sign for free Wi-Fi internet access at a pub, restaurant +or on public transportation. 1 +Imagine going to an Automated Teller Machine (ATM), while on a +business trip, to get money for meals and lodging and the system is down. +Restaurants and hotels are unable to process your credit card. You try to +send a message to your bank, your work, and your family but the computer +servers are all down. The government is unable to communicate with the +public and its different departments. News agencies are having difficulties +publishing information. The aftermath of a cyber attack can impact anyone +that uses the internet, whether it is an individual, business, or government +that has been affected. By investigating the attack, how it happened, and +Estonia +s reaction, states can decide whether their internet defences and +strategies are adequate. 2 +The cyber attacks on Estonia have implications for both its allies and +adversaries. This article is not meant to establish a complete strategy for +cyber defence but to create a better understanding of how a cyber attack +can have far reaching consequences beyond the immediate aftermath of a +targeted infrastructure. What are the implications for Estonia? Is the +framework of the North Atlantic Treaty Organization (NATO) +appropriate for cyber defence? Is an attack against one really an attack +* William C. Ashmore is a Major in U.S. Army. +Baltic Security & Defence Review +Volume 11, 2009 +against all? Does the Organization for Security and Co-operation in +Europe (OSCE) have the ability to react to cyber attacks? Lastly, does the +Russian Federation have a coherent cyber strategy that it is willing to use +and what have been the consequences for Russia? +Any country that uses the internet as part of its infrastructure needs to be +aware of the vulnerabilities and consequences of a cyber attack on their +system. A coherent strategy must include internet defences that are set-up +in conjunction with technical defences. Currently, legal definitions for +cyber crimes do not exist in all countries. The international community +must examine treaties and update them to better define assistance and +common defence in the event of a cyber attack. Russians have shown the +ability and the desire to use cyber warfare. Cyber strategy by, in defence of, +or against Russia affects more than computer networks. Although, attacks +that originate in China, Japan or the United States may have similar +implications they are outside of the scope of this article. +Internet attacks occur on a daily basis throughout the world. How nations +prepare themselves for an internet attack will determine the impact of a +cyber attack on their infrastructure. The aim of this article is to achieve a +greater understanding of the possible Russian cyber strategy and to +understand the counter measures that can be used to prevent or mitigate +cyber attacks. This awareness could possibly prevent a tactical defeat +during conflict when a cyber attack targeting command and control and +communications infrastructure is blocked. +1. The media accounts +Internet trade magazines and mass media reports were used to gather +evidence on the events surrounding the cyber attack on Estonia. Internet +sources were a major source of information on the subject of cyber +security because of the amount of information that is new and has not yet +been published in books. Several Estonian government officials have +spoken on the issue of cyber attacks at great lengths. Estonian government +documents were also used to analyze the Estonian response to the cyber +attack. Media accounts along with documents from the North Atlantic +Treaty Organization (NATO) and the Organization for Security and Cooperation in Europe (OSCE) were used to analyze the aftermath of the +Estonian cyber attack on organizations and other states. Analysis of +Russian involvement was conducted using western documents. +Volume 11, 2009 +Baltic Security & Defence Review +In order to understand the reasons behind the Estonian cyber attack this +article will explore the social tensions and the cyber attack itself. The +impact that the attack had on the different actors will also be noted. The +reality of the attacks indicates some important implications for Estonia and +other former Soviet satellites to work with NATO to develop a coherent +cyber strategy. Russia +s cyber strategy also has considerable significance for +the United States. This article will conclude with a summary of possible +countermeasures to a cyber attack. +2. Cyber attack on Estonia +The social tensions between Estonians and Estonia +s Russian minority are +key to understanding why there was a cyber attack. Estonia is made up of +1.3 million people where 25.6 percent of the population is Russian (Central +Intelligence Agency, 2008). In 1918, the Estonians gained their +independence from Russia, and in 1940 they were forced into the Soviet +Union. From 1940 until they regained their independence in 1991 Estonia +viewed Russia +s presence as an illegal occupation. Mass deportations were +made, people were summarily executed, and the population was resettled +by ethnic Russians. Russians on the other hand view the Estonians as +ungrateful because they were saved by Russians from the Nazi German +fascists. Today there exists significant animosity between the Russians and +the Estonians that permeate personal relationships and political +interactions within the country and between the two nations. (Vesilind, +2008) 3 +The actual events that occurred in Estonia centred on the Soviet Bronze +Soldier monument. The Bronze Soldier monument is a World War II +Soviet War memorial which memorialized the graves of Soviet Soldiers +who died during World War II. However, over time ethnic Russians had +used the memorial as a rallying site for demonstrations and other forms of +protest against the Estonian government. This led to a decision by the +Estonian government to move the monument to an area that was less +public. (Davis, 2009) +The decision to move the statue led to actual riots in the capital city of +Tallinn on April 27th, 2007. The demonstrations degraded into criminal +activities involving looting and the destruction of private and public +property. Hundreds of demonstrators were arrested, most of whom were +Baltic Security & Defence Review +Volume 11, 2009 +ethnic Russians. The civil unrest was contained, order was restored to the +streets by the Estonian government, and most of the physical damage was +repaired by the next morning. (Davis, 2009) +During this period of civil unrest computers in the Estonian government +and the Estonian national media were hacked into with significant affect. +Some of the attacks on the system were vandalism of sites and some were +distributed denial of service attacks (a cyber attack that disrupts internet +service so that a user cannot access a given computer service). The attacks +started small with a major attack culminating on the Estonian internet +system on May 9th, 2007. This date coincidentally corresponded to the day +the Russians celebrate their victory over the Germans in World War II. +During this time a Russian youth-group conducted protests against the +Estonian ambassador to Russia and against the Estonian Embassy in +Moscow. The protests against the ambassador and the embassy did not +end until the ambassador left the country as part of a deal that was +negotiated by Germany. The Russian government even suspended +passenger rail services between Tallinn and St. Petersburg. The riots, the +protests, the stopping of rail service, and the cyber attacks led to an +increasingly tense relationship between Estonia and Russia. (Davis, 2009; +Kampmark, 2003: 288-293) +The Estonians were able to respond to the cyber attacks in a very +proficient manner, as they were able to coordinate responses that only +caused relatively short term outages instead of any permanent damage to +their IT infrastructure. The Estonian government was able to employ its +Computer Emergency Response Team (CERT) which coordinated IT +responses among government and civilian specialists. However, due to the +ambiguous nature of the internet and the use of fake internet protocol (IP) +addresses the Estonian +s were unable to conclusively prove who initiated +the cyber attacks. (Collier, 2007) +The cyber attacks themselves were not very sophisticated as the attackers +used techniques that had been in existence for several years. The focus of +the cyber attack was to completely shut down the IT structure of Estonia. +The cyber attackers used botnet attacks to perform a distributed denial of +service rendering systems that use the internet useless. Botnets are hijacked +computers that send out mass amounts of information which overwhelm +an internet server. The increase in internet traffic will cause a server to +exceed its bandwidth capabilities and cause it to shut down. The botnets +Volume 11, 2009 +Baltic Security & Defence Review +can be installed well in advance of a planned cyber attack, and they can be +placed in any computer anywhere in the world. If the computer user has +not installed appropriate protective software on their computer they will +not even know that they have been hijacked and that they are participating +in a cyber attack. The botnet attacks on the Estonian IT structure ended as +abruptly as they began leading Estonian officials to conclude that the +attack was a planned and coordinated. (Davis, 2009) +The cyber attacks on Estonia illustrates the vulnerability of IT structures +that rely on the internet. The use of technology can improve personal, +business, and government interactions but it is still vulnerable to attacks +and interruptions. The next section of this article will concentrate on the +implications for Estonia in the aftermath of the cyber attacks. +3. Implications for Estonia +After the cyber attacks in 2007, there were several implications for Estonia +as the country recovered from the cyber wake-up call. Some implications +had an immediate impact on the people and the government of Estonia, +while others were more long term and required a deliberate strategy. The +immediate implication for Estonia was the loss of services for government, +communication, and banking. What emerged from the attack was Estonia +ability to counter and minimize the effects of the attack. There was no +permanent damage to the information technology (IT) structure and +financial losses were minimal, but the significance was frightening. (Collier, +2007) +One of the long term implications is the continued strain on Estonia +relationship with Russia. Members of the Estonian government and +outside observers believe that the attacks originated in Russia, but that fact +remains unproven. The finger pointing between Estonia and Russia began +immediately after the attacks and continues today. Dmitry Peskov, Deputy +Press Secretary for the Russian President said, +Russia can no way be +involved in cyber terrorism and all claims to the contrary are an absolute + (The Baltic Times, 2007a). Andrus Ansip, the Estonian Prime Minister, +and others have accused the Russian government because of the +identification of Russian internet protocol (IP) addresses used in the attack. +To date, Russian involvement has never been proven, but the implications +and belief that they were involved continues to influence and affect the +relationship between Russia and Estonia. (The Baltic Times, 2007b) +Baltic Security & Defence Review +Volume 11, 2009 +After the attacks and recovery, Estonia has been heralded as a leader in +technological security. According to Alexander Ntok, head of Corporate +Strategy at the International Telecommunication Union, +it was +imaginative responses that allowed Estonia to emerge from the spring +cyber attack relatively unscathed + (Collier, 2007). As a result Estonia has +capitalized on the internet security market. They are called upon to assist +during attacks and to speak to different business and IT groups on internet +security issues. Estonian government leaders have spoken to allies, regional +organizations and international organizations to improve IT security and +cooperation. (Ibid.) +When Georgia +s IT infrastructure was attacked in August 2008 specialists +from Estonia +s Computer Emergency Response Team (CERT) travelled to +Georgia and assisted response efforts to counter the attacks (DPA, 2008). +This example demonstrates how Estonia has established itself as a major +player in an emerging field, as they are too small to make a large impact on +the international scene through the use of economic or military power. +Estonia has been able to establish itself as a major player in Europe and +among NATO members as an expert in cyber security and cyber war. +Their expertise has allowed them to lobby for increased IT awareness and +for increased cooperation to defeat or deter future cyber attacks. +(Nikiforov, 2008) +In 2003 Estonia proposed a cyber excellence centre in Tallinn even before +it became a member of NATO. In light of Estonia +s expertise in IT the +NATO Cyber Defence Centre was approved. In May 2008 the centre +opened in Tallinn with Estonia providing the leadership and personnel to +man the centre. Estonia emerged as a leader within NATO and leads the +effort to protect the IT structure of NATO. (Socor, 2008) +The continuous threat of cyber attacks against its IT structure, and the +dedication of public officials to improve IT security resulted in a +comprehensive national cyber security strategy. This strategy, developed by +the Ministry of Defence, was adopted by the Estonian government in May +of 2008, just over a year after the attack on its IT systems. The main +measures of its strategy included IT security measures that strengthened +their defensive posture, as well as developed their expertise and awareness +in the IT field. Estonia now looks to strengthen the international legal +framework to ensure that the IT system is protected by laws, and that +Volume 11, 2009 +Baltic Security & Defence Review +violators of the law will be prosecuted. Estonia has also taken the charge +of increasing international co-operation not just to protect their systems +but to protect the global cyber system. (Estonian Ministry of Defence, +2008) +4. Cyber concerns for former Soviet satellites +What do the countries of Estonia, Georgia, Lithuania and Kyrgyzstan have +in common? They are all former Soviet satellites and have all been allegedly +cyber attacked by Russia. +4.1. Georgian cyber attack +On July 20th, 2008 the website of the Georgian president came under a +denial of service cyber attack. The attack shut the website down for 24 +hours and was a precursor to a larger cyber attack that would come less +than a month later (Melikishvili, 2008/2009). On August 8th, 2008 a +coordinated distributed denial of service attack was made against the +Georgian government websites at the same time that Russian forces were +engaged in combat with Georgian forces. As the ground attacks increased +so did the cyber attacks. This was the first time that a cyber attack was +done in conjunction with armed conflict. (Ibid) +The cyber war between Georgia and Russia focused on shaping public +opinion on the internet. Georgian and Russian supporters used a variety of +cyber techniques including distributed denial of service attacks and the +creation of fake web sites to control how their version of the +truth + was +delivered to the public. (Thomas, 2009:55-59) +Georgia +s IT infrastructure was not very advanced so the disruption of +service was not as complicated as it was in Estonia. Banking, media and +government websites were blocked disrupting the flow of information +throughout Georgia and to the outside world. The websites of the Ministry +of Foreign Affairs and the National Bank were vandalized by adding +pictures of the Georgian President and Adolf Hitler (Melikishvili, +2008/2009). The cyber attacks against Georgia were different from the +cyber attacks on Estonia, as these attacks included distributed denial of +services using botnets, but they also included SQL injection attacks that are +harder to identify than a botnet attack because they require less computers +than a botnet attack. The SQL injection attack shows a greater expertise in +Baltic Security & Defence Review +Volume 11, 2009 +the ability to conduct a cyber attack than the cyber attacks on Estonia +s IT +infrastructure. (Secure Works Press Release, 2008) +Georgia received considerable assistance in countering the cyber attacks +and in communicating internally and internationally. Google provided +domain space to protect the websites of the Ministry of Foreign Affairs +and Civil.ge, a Georgian Daily online news service. A private American +internet service provider (the head of the company is an ethnic Georgian) +assisted the Georgian government by hosting the Georgian President +website. The President of Poland also assisted the Georgian government +by placing official press releases on his website. Estonia even sent two +information security specialists from its Computer Emergency Response +Team to assist Georgia in countering the cyber attacks. According to +outside investigators there is no direct proof of any Russian government +involvement in the cyber attacks. But what is undeniable is that even +without proven Russian government involvement it remains clear that the +Russian government benefited from the cyber attacks. (Melikishvili, +2008/2009) +4.2. Lithuanian cyber attack +Lithuania faced its own attacks in June 2008 three days after it passed a law +outlawing the use of Soviet and communist symbols; over 300 websites +were attacked. Some were denial of service attacks while other sites were +vandalized with the Soviet hammer and sickle. Prior to the attacks and the +passage of the law, Russian and Lithuanian ties had deteriorated because of +Russia +s refusal to compensate Lithuanian victims of Soviet labour camps, +and Russia +s leveraging of energy resources for political gain. Lithuania also +blocked talks on an EU-Russia partnership. The animosities between the +two countries have provided observers with a clear motive that the attacks +were by the Russians. The reason for the cyber attacks against Lithuania +was similar to the cyber attacks against Estonia, both attacks were in +response to a government action that was unpopular to the Russian +people. (McLaughlin, 2008) +4.3. Kyrgyzstan cyber attack +The latest country that has come under a cyber attack from computers in +Russia is Kyrgyzstan. On January 18th, 2009 Kyrgyzstan +s two main +internet servers came under a denial of service attacks shutting down +Volume 11, 2009 +Baltic Security & Defence Review +websites and email within the country. The originators of the attacks were +traced back to Russia (Rhoads, 2009). The attacks occurred on the same +day that the Russian government was pressuring Kyrgyzstan to stop U.S. +access to the airbase at Bishkek at Manas. The airbase is a key logistics +centre that supports the U.S. war efforts in Afghanistan. According to Don +Jackson, a senior security researcher at SecureWorks 4, the distributed denial +of service attacks are believed to be directed towards any opposition that is +not in favour of the closure of the airbase. While it is unproven whether +the government was behind the attacks the implication is that cyber attacks +will be used against any opposition to the Russian government (Bradbury, +2009). +The cyber attacks on Georgia, Lithuania and Kyrgyzstan have two +characteristics in common. The first characteristic is that the cyber attacks +were initiated because of opposition to the Russian government and +secondly that there is no proof that the Russian government was involved +in the cyber attacks. Regardless of who is initiating the attack it is clear that +opposition to the Russian government could result in a cyber attack which +could disrupt critical government infrastructure. +5. Compelling realities for the North Atlantic Treaty Organization +Cyber defence is a critical issue for NATO. U.S. General James Mattis, +NATO +s Supreme Allied Commander for Transformation, articulates the +importance of cyber defence for NATO by stating, +We cannot say that +we are not going to defend the Web that everybody needs + (Tanner & +Peach, 2008). Nations that are party to the North Atlantic Treaty agree on +Article 5 +that an armed attack against one or more of them in Europe or +North America shall be considered an attack against them all + (The +North Atlantic Treaty, 1949). Does a cyber attack fit the requirement of an +armed attack? A senior NATO official asked, +If a member state +communications centre is attacked with a missile, you call it an act of war. +So what do you call it if the same installation is disabled with a cyberattack? + (The Economist, 2007). However, the current political reality is +that they are not the same. Prior to the cyber attacks on Estonia, NATO +cyber strategy was focused on NATO +s ability to protect its own IT +infrastructure. Now, the current reality is, is that the NATO +s strategy +must focus on assisting allies as they protect their own IT infrastructure +during an attack (North Atlantic Treaty Organization, undated a). +Baltic Security & Defence Review +Volume 11, 2009 +Members of NATO have taken several steps in defining a cyber strategy +and implementing a cyber defence. As early as 2002, at the Prague Summit, +cyber defence appeared on NATO +s agenda. At the Prague Summit +NATO leaders agreed to the implementation of a NATO Cyber Defence +Program. The program consisted of a NATO Computer Incident +Response Capability and for NATO to use the latest cyber defence +measures (North Atlantic Treaty Organization, undated a). In the spring of +2006 cyber defence was made a priority for NATO during the Riga +Summit. The issue of cyber security gained even more attention when +Estonia, a NATO member, was cyber attacked in 2007 (EU News, Policy +Positions & EU Actors online, 2008). +NATO conducted a thorough assessment of its IT structure and how it +would defend itself against a cyber attack. This assessment led to an +October 2007 report on cyber defence that was issued to the Allied +Defence Ministers. The report recommended measures to improve +protection against cyber attacks (North Atlantic Treaty Organization, +undated a). What followed was a cyber defence policy in early 2008 and the +creation of a NATO Centre of Excellence for cyber defence in May 2008 +(North Atlantic Treaty Organization, 2008a). In April 2008, during the +Bucharest Summit, cyber defence was part of the summit declaration. The +declaration emphasizes the need to protect key information systems, the +sharing of best practices, and for Allied nations to provide assistance to +counter a cyber attack (North Atlantic Treaty Organization, 2008b). +Even though not all NATO nations are part of the Cyber Defence Centre +the centre works to enhance the cyber defence capabilities of all NATO +members. The centre itself is not even funded by NATO but by the +nations that participate in the running of the centre of excellence. The +centre has been charged with doctrine and concept development, +awareness and training, research, development, analysis, and lessons +learned. The experts at the centre also serve as cyber defence consultants +for NATO members North Atlantic Treaty Organization, undated b). +The compelling reality for NATO is that cyber warfare has affected +member nations and continuous to be a realistic threat for the organization +and for its members. NATO members are continuing to develop ways to +counter future threats by sharing best practice information, information on +technical cyber defences, and by agreeing to assist member nations in +countering a cyber attack. +Volume 11, 2009 +Baltic Security & Defence Review +6. Multilateral initiatives +Only a few international treaties on cyber security exist making +international cooperation to prevent cyber attacks extremely difficult. Even +finding and then holding accountable a person that commits a cyber crime +is almost impossible without some international cooperation (Organization +for Security and Co-Operation in Europe, 2008). In the aftermath of the +cyber attacks on Estonia the European Union commissioned a study to +examine the issues concerning cyber security facing members of the +European Union. This section will examine the European Union study and +other multinational initiatives that have an impact on the cyber security of +former Soviet satellites and Russia. (Cornish, 2009) +6.1. Convention on Cybercrime +The Council of Europe has established a treaty on cyber crime that entered +into force 5 in 2004. Twenty-two Council of Europe member nations, along +with the United States, have ratified the treaty agreeing to international +cooperation concerning cybercrime issues. The Russian Federation has not +agreed to the treaty making it difficult for states to resolve issues with +Russia concerning cyber crimes in an international forum (Council of +Europe, undated a). This treaty is still significant because it is the first +international treaty on crimes committed on the internet (Council of +Europe, undated b). +The main goal of the convention, as stated in the preamble, is to protect +nations against cybercrime, by adopting laws and regulations, and fostering +co-operation internationally. The states that become a party to the +Convention on Cybercrime agree to adopt laws that create criminal +penalties for committing crimes on the internet. The convention outlines +several areas that states have agreed to make criminal statutes on issues +such as illegal access of computer systems, system and data interference, +and other computer related fraud. Nations that are party to the convention +also agree to cooperate with investigations, to provide mutual assistance +concerning cyber crimes, and to pursue the collection of evidence. The +extradition of alleged cybercriminals is also agreed to by parties to the +treaty. Disagreements between states that have ratified the treaty include +direct negotiations, settlement in front of the European Committee on +Crime Problems (CDPC), a tribunal for arbitration or adjudication in front +Baltic Security & Defence Review +Volume 11, 2009 +of the International Court of Justice. The Convention on Cybercrime gave +a framework for cooperation among member states for the prosecution of +cyber criminals by removing safe havens for the cyber criminals. (Council +of Europe, 2001) +However, Russia does agree to the convention and it protects citizens who +engage in cyber misconduct by preventing their extradition out of Russia. +Failing to sign the convention agreement also prevents Russia from having +any legal standing to prosecute trans-national cyber criminals who attack +Russia +s IT infrastructure. +6.2. Organization for Security and Co-operation in Europe +The Organization for Security and Co-operation in Europe (OSCE) has a +tradition of promoting the security and stability of Europe. This tradition +of promoting security and stability since 2004 has included cyber security. +The OSCE +s initial focus on cyber security concerned the use of the +internet for recruiting, fundraising, and communication by terrorist +organizations. In 2006 the OSCE +s efforts began to focus on protecting +vital information infrastructures against cyber attacks. Debate in the OSCE +has not led to great change but has been a forum for further cooperation +in cyber security in Europe. In June 2008, the Estonian Defence Minister, +Jaak Aaviksoo, in an address to members of the OSCE, said there is +immense amount of work to be done [concerning cyber security]. +Minister Aaviksoo used the forum of the OSCE to use his nation +experience in defending against cyber crime to increase international +cooperation in Europe. This statement by the Estonian Defence Minister +sums up OSCE +s efforts concerning cyber defence, they are still in the +talking phase and have at least recognized the importance of cyber defence +(Cornish, 2009:20-21). The OSCE will continue to be a forum to publicize +grievances for European nations that have had their IT infrastructures +attacked by Russian hackers. European nations will judge Russia on its +cooperation with the OSCE in finding and prosecuting individuals who +engage in cyber attacks. +6.3. The European Union +Estonia continues to lobby for improved international cooperation in +cyber security as it calls on the European Union (EU) to pass legislation +concerning crimes committed on the internet. While addressing the +Volume 11, 2009 +Baltic Security & Defence Review +European Parliament, Toomas Hendrik, the Estonian President, called +upon the EU to pass legislation that make cyber attacks against public and +private web sites a criminal act (Jones, 2008). The EU has several initiatives +involving different agencies but lacks an overall cyber security strategy. The +European Commission has the Information Society and Media Directorate +General, the European Network and Information Security Agency +(ENISA), and the Contact Network of Spam Authorities that deal with +different aspects of cyber security. The Information Society and Media +Directorate has a program to improve the content of the internet by +protecting people from child pornography, racism, and other harmful +online content. The ENISA is an agency that was created in 2004 to raise +awareness of cyber security issues and to promote best practices by +member nations with the EU. The Contact Network of SPAM authorities +is an initiative to counter SPAM and share information on best practices +between EU member nations. (Cornish, 2009:24-27) +The European Parliament has established several standing committees +concerned with cyber security issues. The Committee on Industry, +Research, and Technology (ITRE) is concerned with establishing +information technology networks within the EU. The Committee on Civil +Liberties, Justice, and Home Affairs (LIBE) is responsible of the +protection of personal information on the internet for members of the +EU. The Committee on Foreign Affairs is responsible for the Security and +Security policies of the EU which includes internet security policies. +(Cornish, 2009:26) +The European Police Office (EUROPOL) is an agency of the Police and +Judicial Co-operation (PJC) that has more of a direct role in EU cyber +security in the context of combating terrorism, organized crime, and +financial crime (Cornish, 2009:25). Although cyber security is addressed by +the EU there is no organization within the EU to ensure that there are no +contradictions in cyber security policy among all of the various EU +agencies, commissions, and co-operations. The European Parliament +commissioned a study on cyber security published February 2009 that +examined security challenges concerning the internet for the EU. The +study recommended that clear roles should be defined for cyber security +responses with the many EU organizations, including the establishment of +the post of cyber security coordinator and the establishment of a common +operating vision for cyber security in order to achieve operational +consistency across the EU (Cornish, 2009:31). The EU and Russia work +Baltic Security & Defence Review +Volume 11, 2009 +together on different challenges including drug and human trafficking, +organized crime, and counter-terrorism. Russia is also the EU +s third +largest trading partner (European Commission, 2009). The EU +s cyber +security organizations can offer a framework for increased cooperation to +defeat cyber attacks that originate from or are directed at Russia. +6.4. The United Nations +The main purpose of the United Nations (UN) is to maintain international +peace and security among the different nations of the world (United +Nations, 1945). The focus for cyber security for the UN, through the UN +Security Council, has been on countering terrorism. Debates among the +UN General Assembly started in 2002 highlighted the growing dependence +on IT use. Out of discussions came a warning that law enforcement +activities would not be sufficient but that more efforts in cyber security +need to be made on prevention. (Cornish, 2009:17) +The International Telecommunication Union (ITU) is the main +organization that is responsible for cyber security within the UN +framework. The ITU +s goal is to enhance cyber security in order for +individuals, businesses and nations to have confidence in the use of +cyberspace. The ITU uses its Global Cyber Security Agenda, which began +in 2007, to promote its goals of increased cyber security. The ITU has not +been an agency for the enforcement of legislation and international +agreements concerning cyber security but has focused on assisting in +building nation +s capabilities for cyber security (Cornish, 2009:17-18). +Former Soviet satellites can cooperate with the ITU to improve their cyber +defences against cyber criminals from Russia or any other nation. The UN +will continue to be a forum for Russia to voice grievances or defend +themselves against world opinion in matters involving international peace +and security including cyber security. +6.5. Relevance of multilateral initiatives +Although the Russian government cooperates with Europe and other +nations on a variety of economic and security issues, individuals, +organizations, and governments are able to exploit the weaknesses of the +international system in order to use the internet for criminal activities +without fear of any major reprisals. Significant effort has been made +towards cyber security since the cyber attack on Estonia in 2007, but much +Volume 11, 2009 +Baltic Security & Defence Review +more needs to be done among national and international organizations to +ensure genuine cyber security. The framework for increasing cyber security +exists, but it will take the cooperation of many nations, including Russia, to +make a difference in cyber security. +7. Implications for the United States +The cyber attack on Estonia should be considered a significant wake-up +call for the United States. Even though the attacks had no direct impact on +the U.S., Estonia is a NATO ally and the attack clearly showed aggressive +intent seeking advantage. When the attacks occurred the U.S. sent experts +to assist and help Estonia with its cyber defences. Jaak Aaviksoo, the +Estonian Defence Minister, was told by U.S. officials that Estonia coped +better than the U.S. is likely could in responding to a cyber attack. The +Estonian Computer Emergency Response Team (CERT) was able to +concentrate on protecting vital sites by coordinating government and +public efforts. They were also able to create diversions which caused +hackers to attack sites which were already disabled or not very important. +(Collier, 2007) +The cyber attack on Estonia demonstrated the importance of legal +obligations for the U.S. in rendering support to its allies during a cyber +attack (Gee, 2008). The cyber attack also showed the vulnerability of an IT +system, raising the question, if it could happen to Estonia could another +trans-national cyber attack of this magnitude happen in the U.S. (Griggs, +2008)? The convention on cybercrime, which the U.S. is a party to, +outlines principles for providing mutual assistance regarding cybercrime +(Council of Europe, 2001). The convention does not mention cyber +attacks or cyber war but treats such activities as crimes (Korns & +Kastenberg, 2008/2009). Because only 23 countries have agreed to this +treaty, its force in the international community is limited (Gee, 2008). +Several members of NATO are participating in the Cyber Defence Centre +of Excellence that was established in Estonia, but the U.S. only agreed to +the creation of the cyber defence centre as an observer. The cyber defence +centre is working on issues of cyber security that affect NATO along with +the U.S (The Associated Press, 2008). What will the U.S. +s response be if a +cyber attack destroys infrastructure and kills citizens in an allied country, +and then that ally declares war because of the attack? The plausibility of +such an attack was demonstrated in 2007 when scientists from the Idaho +Baltic Security & Defence Review +Volume 11, 2009 +National Laboratory demonstrated how a cyber attack could cause a power +plant to overload its system, begin to smoke, and then break down which +caused physical damage to equipment. Currently, both international law +and NATO +s framework lack coherent responses that are legal in the event +of such an attack. The cyber attackers could limit options for the U.S. +under such a scenario by routing their cyber attack through countries +which do not have laws or agreements to cooperate with the U.S. The +cyber attacker could remain completely anonymous if the country where +the attack was routed through refused to hand over information identifying +the cyber attackers. (Gee, 2008) +Cyber attacks on the U.S. government IT infrastructure are not new. In +March 1998 a cyber attack was launched against computer systems of the +U.S. government, private universities and research labs computer systems +that lasted for over three years. Government investigators named the +attacks +Moonlight Maze. + The cyber attacks targeted gaining access to +sensitive but unclassified information (Abreu, 2001). John Adams, a +National Security Agency (NSA) consultant says that government +investigators have identified seven internet addresses involved in the cyber +attacks that originated in Russia. Dion Stempfley, a former Pentagon +computer analyst, believes that the U.S. prove that the Russian Federation +government is sponsoring the attacks but there is evidence that they are +allowing or otherwise permitting the cyber attacks. The cyber attacks +which resulted in the theft of technical defence information were serious +enough that the U.S. State Department issued a formal complaint to the +Russian Federation. (Loeb, 2001) +In Global Trends 2025, a study conducted by the National Intelligence +Council, states over the next two decades non-military aspects of warfare, +including cyber, will be prominent (National Intelligence Council, 2008). +According to Secure Works, a cyber security company, in 2008 over 20 +million attacks originated from computers within the United States (Secure +Works Press Release, 2008). In 2008 the U.S. Department of Homeland +Security created the National Cybersecurity Centre to counter these threats +(Griggs, 2008). The threats to the U.S. infrastructure and technology are +moving at a much faster pace than the creation of government structures +to counter the threat. +Even a casual observer can see that there is a cyber threat to the U.S., but +how is that connected to any Russian involvement in cyber attacks? There +Volume 11, 2009 +Baltic Security & Defence Review +are three recent examples of how cyber attacks, that may have allegedly +originated in Russia, that demonstrate danger for U.S. and Russian +relations. These examples show how attacks against an IT structure were +used as cyber pressure to influence nations or organizations. +The first example is when Radio Free Europe +s internet sites in April 2008 +in Eastern Europe were shut down because of a denial of service attack. +The attack lasted two days and coincided with the planned coverage of the +anniversary of the 1986 Chernobyl disaster. The attacks effectively shut +down the websites which stopped the flow of information from Radio +Free Europe, a U.S. sponsored program (America.gov, 2008). +Another example is the malware (malware is a term used to identify illegal +computer access including computer viruses) attack on U.S. Department of +Defence computer systems in November 2008. According to WMD +Insights 6 the computer attacks are thought to have originated from Russia. +The attacks seemed to target military computer systems and affected the +U.S. central command along with computers in Iraq and Afghanistan. The +attacks led to a ban on the use of external computer flash drives on +military computers throughout the world. (Melikishvili, 2008/2009) +The latest example of an attack that may have originated in Russia is the +January 2009 denial of service attack that was directed at the government +websites of the Republic of Kyrgyzstan. One theory on why the attack was +started was because of Kyrgyzstan +s support of the U.S. in its war on terror +in Afghanistan. This shows the significance of a cyber attack not directed +against the U.S. but against one of its allies. (Rhoads, 2009) +One senior fellow at the Centre for Strategic and International Studies in +Washington, D.C. believes there is no adversary that can defeat the U.S. in +cyber space. A spokesman for the U.S. Department of Homeland Security +commented that the U.S. government is able to protect itself from cyber +attacks, but the U.S. IT system is not completely impenetrable. The +director of a non-profit research institute, the United States Cyber +Consequences Unit, stated that because the U.S. controls so much internet +bandwidth that most of the people that want to harm the U.S. lack the +capabilities to shut down U.S. servers. (Griggs, 2008) +The U.S. faces a wide variety of challenges in protecting its own IT +structure along with facing the reality of the challenges of its allies + cyber +Baltic Security & Defence Review +Volume 11, 2009 +defences. In the future the U.S. may face cyber attacks that could cause the +deaths of its or its allies + citizens due to the effects of a cyber attack on an +electrical system. The U.S. +s bilateral agreements with countries that hold a +strategic U.S. interest could be affected by the use of a cyber attack to +influence leaders. The cyber threats to the U.S. are real and continued +attention by the leaders must focus on this threat. +8. The weakest link + the computer user +As you read this article you could be an accomplice to a cyber criminal +without even knowing that your computer is conducting a worldwide +distributed denial of service attack. The actions or lack of action of +computer users have contributed to the ability of hackers in Russia and +elsewhere to conduct their attacks in relative anonymity. 7 The internet has +vulnerabilities and the individual computer user contributes to the +vulnerabilities of private and government IT systems. +In 1997 the National Security Agency (NSA) conducted an exercise to find +out how vulnerable government IT systems were to external cyber attacks. +They named the exercise +Eligible Receiver. + Thirty-five IT specialists +were given the mission to hack into government systems. They could use +any software programs that were available on the internet and they were +only given a few limitations. The IT specialists couldn +t use any classified +hacking software that belonged to the NSA and they could not violate U.S. +law. The IT specialists were also confined to U.S. government computer +systems. (Verton, 2003:32-33) +What they discovered was how easy it was to hack into government +systems, into both classified and unclassified networks. With the free +software that they downloaded from the internet, the NSA specialists were +able to conduct distributed denial of service attacks, delete or modify +sensitive information and shut down or reformat systems. Along with the +software they used, personal contact methods were also used to gain access +into the systems. The NSA computer specialists would use telephone calls +or emails to gain passwords or entry into a system by posing as a +supervisor or technician. The IT specialists were surprised at how easily +government and military members delivered their passwords without +question. Even though the exercise was conducted in 1997, and may seem +dated, it gives us a great example of how a dedicated effort can disrupt any +IT system. (Verton, 2003:32-33) +Volume 11, 2009 +Baltic Security & Defence Review +As noted earlier, external flash drives were banned from use with military +computer systems. Authorized users unknowingly passed intrusive +malware files from computer to computer infecting IT systems throughout +the U.S. Central Command. The ban on flash drives complicated the +sharing of information throughout the theatre. The malware file was even +found on a classified network. This is one more example of how an +individual can spread malicious software infecting multiple computer +systems because of a lack of computer security protocols. (Melikishvili, +2008/2009) +One vulnerability that is associated with computer users is that some +people who become hackers are former employees with a grievance against +their former employer. Such people may be motivated by a personal +grudge against the U.S. government because they were fired or lost their +job due to a reorganization or downsizing. Their actions as hackers are +usually malicious in nature as such people steal or corrupt data, deface +websites, or shut down systems. (Conway, 2007:82) +Even more dangerous than an angry former employee is a case of cyber +espionage. This is where an individual who is motivated by money or +ideology sells highly sensitive IT security information. One such case +involves Herman Simm and his wife, Heete Simm, from Estonia +(Melikishvili, 2008/2009). Mr. Simm was arrested in September 2008 for +allegedly passing highly classified information on cyber security and missile +defence to members of the Russian foreign Intelligence Service (SVR). Mr. +Simm was the head of the State Secret Protection Office where he was +responsible for protecting Estonia +s classified information. Mrs. Simm was +a lawyer who was previously employed at the Estonian national police +headquarters. Mr. Simm had access to classified information concerning +NATO and allies of Estonia including the operational information of the +NATO Cooperative Cyber Defence Centre based in Tallinn. If the +Estonian government had access to a secret so did Mr. Simm. The amount +of classified information that was compromised is unknown, but may be +quite large. Mr. Simms allegedly became a Russian spy in the mid-1990 +and was paid millions of dollars from the Russian Government. Regardless +of how secure a country +s IT structure is, it is still vulnerable because some +people will compromise sensitive cyber security information for personal +gain. (Melikishvili, 2008/2009) +Baltic Security & Defence Review +Volume 11, 2009 +Along with the vulnerabilities already mentioned there are always problems +with software products. Some software is easy for hackers to take +advantage of because of security deficiencies. Computers may be infected +before the user or software company has identified the problem. Then it +will take time for the software company to produce a security patch. It will +take even more time to get the patch to the computer program user and +for the security patch to be installed. During this time the infected +computer program may have already infected other computers in a system +or throughout the internet. (Wilson, 2006:15-16) +A major vulnerability for any IT system is the computer user. Whether the +computer user is a military member, a government employee, or just a +computer user sitting in front of his computer at home, their practices can +cause serious damage to a computer system. Normal computer users +receive little or no training in the best security practices. (Wilson, 2006:14) +The cost of poor security practices can be high. Along with the loss of data +or the disruption of service there is also the physical cost associated with +malware and viruses. For example, in 2007 the Federal Bureau of +Investigation (FBI) uncovered a botnet campaign that caused losses of +over 20 million dollars (Cornish, 2009:9). One of the botnet hackers that +was caught by the FBI and sentenced to prison used botnets to steal +peoples + identities and bank account information. After gaining access to +personal information and passwords he made on-line purchases and +transferred money from the bank accounts. Another cyber attacker used a +phishing scheme where he collected information through infected emails +(Wired Staff, 2009). This section highlighted how the computer user has +made IT structures even more vulnerable and the Simm affair +demonstrates how cyber espionage adds to that vulnerability. If countries +like the U.S. and Estonia that have highly developed IT infrastructure can +be attacked, it is not hard to imagine the vulnerabilities less developed +former Soviet satellites have in their IT development phase. +9. The Russian Federation +In this article study several cyber attacks have been attributed to Russia. +Regardless of whether the government of Russia is responsible for the +attacks, or merely sanctioned them, for many the perception remains that +Russia was behind the cyber attacks. I will examine Russia +s use of cyber +warfare against former Soviet satellite states. (Davis, 2009) +Volume 11, 2009 +Baltic Security & Defence Review +The Russian government views itself as the victim in the case of the cyber +attacks on Estonia in 2007. According to sources in the Kremlin the +website of the President of Russia came under a cyber attack. This was +supposedly the largest attack the Russians have faced and it appeared that +the servers used to originate the attack were located in the Baltic States. +The Deputy Press Secretary of the Russian President, Dmitry Peskov, +countered accusations from Estonia with the fact that Russian government +websites are under attack every day from all over the world. (The Baltic +Times, 2007a) +Even as cyber attacks occurred against Georgia, Russians said that they +were also the victims of cyber attacks. Russia Today 8, a major media source +in Russia, was shut down because of a denial of service attacks directed +towards its websites. IT security specialists that work for Russia Today +believe that the denial of service attacks originated from Tbilisi, the capital +of Georgia. (Watson, 2008) +In the aftermath of the cyber attacks on Estonia, Georgia, and other +attacks mentioned in this article, the Russian response was to deny any +involvement in any cyber attack. When confronted with evidence that +some of the attacks originated from Russian government computers +members of the Russian government countered with the fact that +computers from all over the world were hijacked and used to attack +different computer systems. (The Baltic Times, 2007a) +Another fact that Russian officials are quick to point out is that the only +person arrested for the 2007 cyber attacks on Estonia was an Estonian. +Dmitri Galushkevich, a 20 year old ethnic Russian, who was convicted for +the cyber attacks. Some members of the Estonian government have issued +statements doubting the involvement of the Russian government in the +cyber attacks. (Greenberg, 2008) +With the finger pointing that ensues after a cyber attack it is still unclear +who was behind the attacks. The actions of cyber activist groups, or +hactivists, will be examined in the case of the cyber attacks on Estonia and +Georgia. Hactivists are individuals that use cyber attacks to take a patriotic +or political stand on a political or international issue. (Melikishvili, +2008/2009) +Baltic Security & Defence Review +Volume 11, 2009 +During the protests in Estonia, increased chatter and postings on how to +conduct and participate in denial of service attacks were found on Russian +internet chat sites (Melikishvili, 2008/2009). Along with the denial of +service attacks, some of the Estonian government websites were hacked in +order to deface the site. The sayings on the websites were very pro Russian +and very anti Estonian. Joshua Davis in Wired Magazine supports the view +that the reason behind the attacks was nothing more than Russian pride. +(Davis, 2009) +In March of 2009 a member of a Russian pro-Kremlin youth group, +Konstantin Goloskokov, publicly took responsibility for creating the 2007 +cyber attacks on Estonia. Goloskokov is a leader of the youth movement +Nashi that has routinely conducted cyber attacks and intimidation +campaigns on behalf of the Russian government. The government of the +Russian Federation is able to maintain separation from the youth group +because it does not directly fund their activities. The youth groups are +funded by pro-government business owners who are trying to gain favour +from the Russian government (Shachtman, 2009). Goloskokov believes +that his actions were not illegal but were, +an act of civil disobedience +organized within the confines of virtual space + (Buranov, Vodo & +Yegikyan, 2009). The cultural aspects or belief that actions in the cyber +world are beyond the law is a consequence for the Russian government +and how cyber attacks affect their international relationships. +An assistant to Sergei Markov, a member of Russia +s State Duma lower +house, has also admitted to using his own initiative to conduct cyber +attacks against Estonia (Baltic News Service, 2009). Rein Lang, the +Estonian Justice Minister, is contemplating issuing a European arrest +warrant for individuals who have admitted to taking part in the attack. The +idea for the warrant is not to send law enforcement officials into Russia, +but to have the alleged perpetrators arrested whenever they leave the +country (Baltic News Service, 2009). Aleksandr Gostev, director of the +Kaspersky Lab +s Global Research and Analysis Team, explains that hackers +who participate in a distributed denial of service attack violate the Russian +Criminal Code (Article 274, Violation of the Rules Governing the Use of +Computers, Computer Systems, or Networks Thereof) and can be imprisoned for +four years for violating the code. But he also states that the article is rarely +used (Buranov, Vodo & Yegikyan, 2009). The examples of Russian citizens +admitting to participating in the Estonian cyber attacks are grounds for +Volume 11, 2009 +Baltic Security & Defence Review +Russian citizens to be arrested in other parts of Europe if Russia fails to +uphold its own laws. +Similar actions occurred in the Georgian cyber attacks. Messages were +posted on Russian hacker forums on how to participate in shutting down +Georgian websites. The website StopGeorgia.ru was also established as a +private forum to coordinate the denial of service attacks. Jeff Carr, a +network security expert and cyber analyst, established an all volunteer +group to investigate the cyber attacks. Throughout the course of the +investigation, which they named Project Grey Goose, no evidence was found +to implicate the Russian government. This was just another example of a +hactivist movement which had the collective power to conduct a cyber +attack against a government. (Melikishvili, 2008/2009) +The Project Grey Goose investigation has looked at hactivists and how they +can independently conduct cyber attacks. It also focused on a criminal +gang known as the Russian Business Network (R.B.N.). The R.B.N. is based +in St. Petersburg and engages in criminal cyber activities. According to +Don Jackson, the director of threat intelligence at Secure Works, some of +the cyber attacks used against Georgian websites originated from +computers under the control of the R.B.N. As is the case with any cyber +attacks it is very difficult to establish who is completely responsible or if +there is any Russian government sanctioned involvement. (Markoff, 2008a) +This article has already noted that there are other groups involved with +cyber attacks against former Soviet satellites. The evidence of Russian +government involvement will now be investigated (Davis, 2009). Indeed, +some statements made by Russian government officials suggest Russian +government involvement in cyber attacks. Prior to the cyber attacks in +Estonia the Russian government protested the movement of the Russian +memorial, the Bronze Soldier, to the Estonian government. The Russian +government warned how disastrous the move would be to Estonia. What +followed were the protests and the cyber attacks. (Davis, 2009) +The head of the Russian Army Centre for Military Forecast, Colonel +Anatoly Tsyganok, made comments to the Russian news outlet, Gazeta, +about the cyber attacks on Estonia. He believes that there was nothing +wrong with the attacks because there are no international agreements +established. Colonel Tsyganok also believes that NATO couldn +t do +Baltic Security & Defence Review +Volume 11, 2009 +anything to stop the attacks, and that they were highly successful. +(prygi.blogspot.com 9, 2008) +The most telling example of Russian government involvement in cyber +warfare was with Herman Simm selling IT secrets to the Russian Foreign +Intelligence Service that was discussed earlier in this article. This examples +shows that the government of the Russian Federation is actively seeking +information on cyber defences and is willing to pay large sums of money +(Mr. Simm is accused of selling cyber security secrets for millions of +dollars) to receive information on cyber security. (Melikishvili, 2008/2009) +There are also cases where cyber attacks were used against people who are +in opposition to the Russian government. One such example is with Gary +Kasparov, Russian opposition party leader, had his website shut down for +two weeks due to denial of service attacks during the Russian presidential +campaign. John Palfrey, a researcher at Harvard Law School, believes that +several organizations in Russia who plan to protest, or act in opposition to +the Russian government, are subjected to cyber attacks in an attempt to +control the information that is getting to the public. (Greenberg, 2008) +Another example of Russian government complicity is the lack of +assistance or interest in tracking down those responsible for the cyber +attacks against governments of former Soviet satellites (Davis, 2009). The +evidence of government involvement remains circumstantial, but certain +facts are clear concerning cyber security and former Soviet satellites. If +there is opposition to Russian Federation policy than that country that is in +opposition is likely to be subject to a cyber attack and it has been shown +that the Russian Federation actively collects information on other +countries cyber defences. +10. The future of Russian cyber warfare +The perception exists among different nations (some of those nations have +been discussed earlier in this study) that the government of the Russian +Federation has been involved in cyber attacks. This section will examine +future trends concerning the use of cyber attacks by, or sanctioned by, the +Russian Federation government. The cyber attacks against Estonia and +Georgia have forced Russia to evaluate its future cyber strategy. In +examining the Russian focus on improving its cyber strategy some +Volume 11, 2009 +Baltic Security & Defence Review +conclusions can be drawn about the future of Russian cyber warfare. +(Panarin, 2008) +As with many countries that have an advanced IT system, a sub-culture of +hacking has developed. Even though the state sponsored university in St. +Petersburg produces computer programmers that are highly regarded it is +believed that most of the hackers are young and not educated at the +university level. The reason behind the growth of Russian computer +hackers is the prestige and monetary reward that hacking garners in a +growing IT infrastructure. (Varoli, 2000) +The criminal organization, R.B.N., has been able to conduct its cyber +activities with little interference from the Russian Federation government. +The R.B.N. is very difficult to track on the internet as they are able to +locate their activities from several different locations. The group has been +involved in several different types of criminal cyber activities such as the +use of malware, identity theft, and child pornography. Without any +concerted effort to stop the R.B.N., and their ability to operate anywhere, +R.B.N. is an organization that is positioned in Russian cyber activities now +and in the future. (Markoff, 2008a) +One example of latitude and scope created by Russian indifference, a +group identified by a computer security firm as a Russian gang conducted a +botnet based computer operation operating in Wisconsin. The Russian +gang was controlling as many as 100000 computers in an effort to steal +passwords and information. As soon as the system was shut down the +Russian gang moved its host computer system to a site in the Ukraine. This +shows how resilient these gangs are when they can relocate their operating +systems to countries that are out of reach of law enforcement of the +country that they are targeting. (Markoff, 2008b) +The Russian responses to the recent cyber attacks are a guide to how they +will react in the future. Valery Yashenko, vice director of the Institute of +Information Security Issues at Lomonosov Moscow State University, +advises the Russian government on the issues of cyber terrorism. +Yashenko believes that there should be greater international cooperation +concerning cyber security but does not think that the cyber attack on +Estonia was of any real consequence. Yashenko indicates that the Russian +Federation government is only concerned with cyber security matters that +affect his own government. (Davis, 2009) +Baltic Security & Defence Review +Volume 11, 2009 +Not surprisingly, the Russian Federal Security Service (F.S.B.) is believed +to employ its own hackers (Varoli, 2000). The manner of recruiting is a +little different than normal ways of looking for employees. When an IT +specialist or hacker is caught committing a cyber crime they may receive an +offer to work for the F.S.B., or face criminal charges. According to a +Russian computer security specialist hackers that were working for the +F.S.B. attacked pro-Chechen web sites. According to the same computer +security specialist the F.S.B. hackers have hacked into opposition +newspapers in order to control information about the Russian Federation +government and its leaders. The recruitment of hackers for offensive cyber +attacks vice cyber defences is an indication of the future Russian +Federation government cyber strategy. (Varoli, 2000) +The Russian Federation government has shown the capability for law +enforcement in cyber space. Laws exist in Russia that make crimes +committed on the internet punishable under the law. Russia has even +established a computer crime unit, which it called Department + which +operates under the Ministry of Internal Affairs of the Russian Federation +(MVD). Department + is responsible for the detection, prevention, +suppression, and solving crimes involving information technology. In +2008, Department + was able to identify 158 computer crimes and shut +down seven illegal internet operations. The MVD is currently conducting +Project +Clean Network + aimed a combating illegal uses of the internet +(Ministry of Internal Affairs of the Russian Federation, undated). It +remains to be seen whether the efforts of Department + will have any +negative impact on the R.B.N. or the cyber gangs that support the Russian +government. +The Russian Federation Public Chamber 10 organized a discussion on +Russian information warfare in September 2008 and Just Russia 11 political +party hosted an international conference on information warfare in +October 2008. The conclusions of the meeting were that Russia has grossly +underestimated the role of information warfare and failed to +champion +their goals and interests in the world media. (Panarin, 2008) +Dr. Igor Panarin, the Dean of the Faculty of International Relations of the +Ministry of Foreign Affairs Diplomatic Academy in Moscow, used the +information warfare discussions to make several recommendations to the +Russian government concerning information and cyber warfare. Dr. +Volume 11, 2009 +Baltic Security & Defence Review +Panarin proposes that Russia develop specialized management and +analytical structures to counter information threats. Dr. Panarin proposes a +system that has eight key components. (Panarin, 2008) +The first component is the creation of a Council for Public Diplomacy that +will develop a single point of view for both the Russian government and +Russian businesses. Government and business leaders are to be included +on the council in order to ensure that all activities concerning foreign +political media are coordinated. The second component is to create an +advisor to the President of Russia for Information and Propaganda +Activities in order to coordinate the foreign political information activities +of the administration of the President, the government, different +ministries, and the Russian Security Council. (Panarin, 2008) +The third and fourth components are to create state holding companies, +one for foreign media affairs and one for the internet. The holding +companies would be combined between business and government to see +that Russian political positions were broadcast to the world. The +information would not just be focused towards ethnic Russians but would +be focused globally towards economic partners, future partners, +adversaries, and overall world opinion. (Panarin, 2008) +The fifth component would be the creation of an information crisis action +centre in order to ensure that Russia maintains the initiative when +delivering the state message to the world. The information crisis action +centre would be responsible for developing talking points and themes that +would support the government in any crisis. (Panarin, 2008) +The sixth component would create an information countermeasures +system that would counter enemy information operations. The information +countermeasures system would include assets from business and the +government. The seventh component focuses on a system on +nongovernmental organizations that would operate throughout the world. +(Panarin, 2008) +The final component would consist of a system for training information +warfare specialists. This system would use existing educational institutions +and academies to train specialists that would be able to operate at the +diplomatic, management, or individual level. The training system would +Baltic Security & Defence Review +Volume 11, 2009 +also include the creation of an Information Special Forces that are highly +trained to for conducting information operations in a crisis. (Panarin, 2008) +Along with the creation of the information warfare system Dr. Panarin +believes that financing for information warfare needs to be increased by +both the Russian government and by Russian businesses. The increased +attention on information warfare is designed to increase Russia +s image +throughout the world and ensure that Russia is prepared for future conflict +in the cyber and information arenas. (Panarin, 2008) +Statements by Russian government officials have been very similar to Dr. +Panarin +s position which makes the future of cyber warfare in Russia +offensively poised. Colonel Aleksandr Drobyshevskiy, head of the Russian +Federation Ministry of Defence Directorate for Press Service and +Information, stated that Georgia won the information war during the +conflict in South Ossetia and there is a need for the development of +information and telecommunications technologies within the Ministry of +Defence. Colonel Drobyshevskiy further advocates the creation of an +information warfare system. (Svobodnaya Pressa, 2009) +Another clue to the future of Russian cyber warfare is the development of +a new information warfare defensive strategy by the Russian Armed Forces +General Staff. Colonel-General Anatoliy Nogovitsyn, Deputy Chief of the +General Staff, stated that leading world powers will be able to conduct fullscale information warfare and that Russia must be prepared (Usov, 2009). +General Nogovitsyn believes that Russia will be involved in a large-scale +information war within two to three years that will be fought in the cyber +world (Litovkin, 2009). +The existence of hackers that support the Russian government and +information specialists within the Russian government have created an +asset that will be used during future cyber conflicts. The Russian +government +s emphasis on developing cyber strategies will enable Russia to +be prepared for future cyber conflict. +11. Countermeasures +We need to examine what can be done to counter cyber crimes and protect +a nation +s IT structure. Cyber countermeasures can be taken at the +international level, followed by cyber defences at the national level, and +Volume 11, 2009 +Baltic Security & Defence Review +ending with actions that an individual computer user can make to improve +cyber defence. +The International Telecommunication Union (ITU), the organization +within the UN that is responsible for the international oversight of the +world +s telephone system, is developing a system for oversight of the +internet. The ITU is working towards a convention against cybercrime that +will provide international cooperation on issues concerning internet +communications (Schrank, 2007). Members of the international +community will need to work together in order to track and prosecute +cyber criminals that operate outside of the country that is being attacked. +Nations will also have to work together to share technical data to maintain +cyber defences to keep up with the newest and ever changing cyber +attacks. Hackers routinely share information on new techniques that can +penetrate IT defence structures. Nations need to do the same to protect +their own IT infrastructure, the same IT structure that affects the entire +globe (Lipson, 2002:47-48). +Individual countries can improve their cyber defences within their own +boundaries which would also improve the cyber security of the +international IT system. Countries can make laws making cyber crimes +illegal with punishments and programs that will deter potential cyber +criminals. Governments can create a system that increases co-operation +between the government, businesses, and academic institutions in order to +improve their cyber defences. This co-operation could lead to an IT +infrastructure that is resilient and able to withstand and recover from a +cyber attack with little or no permanent damage to a country +s IT structure. +(Schrank, 2007) +In 8th section the computer user was identified as the weakest link in an IT +system. Some individual countermeasures are easy to accomplish for any +computer user. Actions like keeping antivirus and anti-spyware software up +to date along with updating your web browser and operating system can +greatly enhance your own computer security. Even following safe +computer practices of not opening unknown attachments on emails that +may carry viruses or malware are very instrumental in making the cyber +environment more secure (Secure Works Press Release, 2008). The U.S. +Department of Homeland Security (DHS) has tips for computer users +posted on their website to increase internet security. The main points of +the DHS website are to promote personal responsibility for increasing +Baltic Security & Defence Review +Volume 11, 2009 +cyber security and to promote best practices for safe computer usage. The +best practices that DHS advertises are to make cyber security a habit by +following three core practices. The three core practices are to +install antivirus and anti-spyware programs and keep them up to date, install a +firewall and keep it properly configured, and to regularly install updates on +your computer +s operating system + (Homeland Security, 2008). Computer +users are the first line of defence in cyber security and their actions can +help protect the cyber infrastructure that is used by all. +Conclusion +The international system is lacking in its ability to effectively manage issues +of cyber security. The Russian Federation is perceived by the international +community as a country that engages in or supports groups that are +involved in cyber crime. International and regional organizations along +with countries that interact with the Russian Federation have to deal with a +reality that they may be the target of a cyber attack if they are in opposition +to the government of the Russian Federation. +The issue of cyber security is ongoing. As more of the former Soviet +satellites become more developed with an advanced IT structure they will +have to face the realities of cyber attacks. Regardless of whether the +government of the Russia Federation has been involved in any cyber +attacks, or will be in the future, the reality remains that nations, groups, or +individuals that are in opposition to Russia may face a cyber attack. The +cyber attacks will be used to influence public opinion or to influence +government leaders through the use of cyber pressure. Future conflicts +that involve the use of force will also see cyber attacks in conjunction with +combat operations. Currently international agreements and laws are +inadequate which allows cyber attackers to take advantage of the lack of +such laws and can conduct acts of civil disobedience on the internet. +The conflict in Georgia has been a motivator for military reform which +includes reform in the cyber arena. The Russian government and the +Russian military will continue to develop systems to improve both their +offensive and defensive cyber capabilities. Russia will continue to capitalize +on their diaspora present throughout the world to support their political +positions but will have to realize that some of that diaspora will be in +opposition to them and provide private support to organizations and +nations that have received cyber attacks. Russia +s active collection of cyber +Volume 11, 2009 +Baltic Security & Defence Review +defence secrets will also be a combat multiplier for them in future conflicts +either alone in the cyber world or as part of a ground conflict. +Organizations and nations will be best served by creating a resilient +defence in depth while educating users and managers of IT systems in best +practices to counter the threat of a cyber attack. This defence in depth +includes technical responses to counter the threats while ensuring that their +IT systems are resilient and become effective after an attack. President +Bush remarked in 2001 that, +s time to work together to address the new +security threats that we all face. And those threats are not simply missiles +or weapons of mass destruction in the hands of untrustworthy countries. +Cyber-terrorism is a threat, and we need to work on that together +(Verton, 2003:248). +References: +Aaviksoo, Jaak, 2007 (Nov. 28th). Address by the Minister of Defence of the Republic of +Estonia, at The Centre for Strategic & International Studies, Washington, D.C. +Abdullaev, Nabi, 2006 (Oct 31st). New +Just Russia + Party Says Putin Knows Best. +Petersburg +Times. +http://www.times.spb.ru/index.php?action_id=2&story_id=19303; +(accessed +April 10th, 2009). +Abreu, Elinor, 2001 (May 10th). Epic cyberattack reveals cracks in U.S. defense, +(CNN.com, +2001) +http://archives.cnn.com/2001/TECH/internet/05/10/3.year.cyberattack.idg/ +(accessed April 10th, 2009). +Anon. 2007 (May 12th). A Cyber-Riot. The Economist. p. 55. +http://lumen.cgsccarl.com/login?url= +http://search.ebscohost.com/login.aspx?direct=true +&db=a9h&AN=25048355&site=ehost-live; (accessed December 19th, 2008). +Baltic News Service, 2009 (March 12th). Estonian Minister Lang Says European +Arrest Warrant Possible for Cyber Attackers. Baltic News Service. +https://www.opensource.gov, Document ID EUP20090312010002; (assessed +April 10th, 2009). +Bradbury, Danny, 2009 (Feb. 5th). The Fog of Cyberwar. The Guardian. +http://www.guardian.co.uk/technology/2009/feb/05/kyrgyzstan-cyberattackinternet-acess; (accessed March 22nd, 2009). +Buranov, Ivan; Vodo, Vladimir and Yegikyan, Seda. 2009 (March 12th). ProKremlin Activist Admits Attack on Estonian Websites, Denies Criminal +Wrongdoing, Translated by Open Source Centre. Moscow: Konmersant Online. +Baltic Security & Defence Review +Volume 11, 2009 +https://www.opensource.gov, Document ID CEP20090312021013; (accessed +April 10th, 2009). +Central Intelligence Agency, page updated as of Dec. 4th, 2008. The World Fact +Book, +Estonia. +https://www.cia.gov/library/publications/the-worldfactbook/geos/ en.html; (accessed December 13th, 2008). +Collier, Mike, 2007 (Dec. 17th). Estonia: Cyber Superpower. Business Week. +http://www.businessweek.com/globalbiz/ +content/dec2007/gb20071217_535635.htm; (accessed August 27th, 2008). +Collier, Mike, 2007. Estonia: Cyber Superpower. Business Week. +http://www.businessweek.com/ +globalbiz/content/dec2007/gb20071217_535635. +htm?chan=globalbiz_europe+index+page_top+stories. (accessed August 27th, +2008). +Conway, Maura, 2007. Information Warfare: Separating Hype from Reality, ed. +Armistead, Leigh. Washington, D.C.: Potomac Books, Inc. p. 82. +Cornish, Paul, 2009 (Feb. 2nd). Cyber Security and Politically, Socially and Religiously +Motivated Cyber Attacks. Brussels: European Parliament. pp. 24-27. +http://www.europarl.europa.eu/activities/committees/ studies.do?language=EN; +(accessed February 19th, 2009). +Council of Europe, Convention on Cybercrime (Budapest, November 23rd, 2001) +http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm; +(accessed +February 19th, 2009). +Council of Europe, Convention on Cybercrime, Chart of signatures and ratifications, +http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&CM=& +DF=&CL=ENG; (accessed February 19th, 2009). +Council of Europe, Convention on Cybercrime: Summary of the treaty, +http://conventions.coe.int/Treaty/en/Summaries/Html/185.htm; +(accessed +February 19th, 2009). +Davis, Joshua, 2009. Hackers Take Down the Most Wired Country in Europe. +Wired Magazine, Issue 15. +Davis, Joshua, 2009. Hackers Take Down the Most Wired Country in Europe. +Wired Magazine. Issue 15. +DPA, 2008 (Aug. 11th). Estonia sends experts to Georgia to help combat cyber +attacks. +Earth +Times. +http://www.earthtimes.org/articles/show/224942,Estonia-sends-experts-togeorgia-to-help-combat-cyber-attacks.html ; (accessed August 27th, 2008). +Estonian Ministry of Defence, 2008 (May). Cyber Security Strategy. Tallinn. p. 3. +EU News, Policy Positions & EU Actors online, 2008 (April 4th). NATO agrees +common +approach +cyber +defence. +EurActiv.com. +http://www.euractiv.com/en/infosociety/nato-agrees-common-approach-cyberdefence/article-171377; (accessed February 18th, 2009). +Volume 11, 2009 +Baltic Security & Defence Review +European +Commission. +External +Relations: +Russia. +http://ec.europa.eu/external_relations/russia/ index_en.htm (accessed April 8th, +2009). +From wire reports, 2007 (June 8th). Estonian PM, justice minister insist that cyber +attacks +came +from +Kremlin +computers, +Baltic +Times. +http://www.baltictimes.com/news/articles/18038/; (accessed December 19th, +2008). +From wire reports, 2007 (May 18th). Kremlin denies involvement in cyber attacks +on Estonia, The Baltic Times. http://www.baltictimes.com /news/articles/17908/; +(accessed December 19th, 2008). +From wire reports, 2007 (May 18th). The Kremlin denies involvement in cyber +attacks on Estonia. The Baltic Times. http://www.baltictimes.com +/news/articles/17908/; (accessed December 19th, 2008). +Gee, Alastair, 2008 (Nov.). The Dark Art of Cyberwar. Foreign Policy. +http://www.foreignpolicy.com/story/cms.php?story_id=4553; +(accessed +December 19th, 2008). +Greenberg, Andy, 2008 (May 14th). The State of Cyber Security: When Cyber +Terrorism +Becomes +State +Censorship. +Forbes.com. +http://www.forbes.com/2008/05/14/cyberattacks-terrorism-estonia-techsecurity08-cx_ag_0514attacks.html; (accessed December 19th, 2008). +Griggs, Brandon, 2008 (Sept. 12th). U.S. at risk of cyberattacks, experts say. +CNN.com. http://www.cnn.com/2008/TECH/08/18/cyber.warfare/index.html; +(accessed Oct. 24th, 2008 and Feb. 14th, 2009). +Homeland +Security. +Cybersecurity: +Make +Habit. +http://www.dhs.gov/zxprevprot/programs/ gc_1202746448575.shtm (accessed +March 11th, 2009). +Jones, Huw, 2008 (March 12th). Estonia calls for EU law to combat cyber attacks. +Reuters. http://www.reuters.com/articlePrint?articleId=USL 1164404620080312; +(accessed February 19th, 2009). +Kampmark, Binoy, 2003 (Autumn). Cyber Warfare Between Estonia and Russia. +Contemporary Review. pp. 288-293. +Korns, Stephen and Kastenberg, Joshua, 2008/2009 (Winter). Georgia +s Left +Hook. Parameters. Vol. XXXVIII, No. 4. p. 64. +Lipson, Howard, 2002. Tracking and Tracing Cyber-Attacks: Technical Challenges and +Global Policy Issues. Pittsburgh, PA. pp. 47-48. +Litovkin, Dmitriy, 2009 (Feb. 27th). The General Staff is Preparing for a Cyber +War, +Translated +Open +Source +Centre. +Moscow: +Izvestiya. +https://www.opensource.gov, Document ID CEP20090302358005; (accessed +March 7th, 2009). +Loeb, Vernon, 2001 (May 7th). Pentagon Computers Under Assault. Washington +Post. A02. +Baltic Security & Defence Review +Volume 11, 2009 +Markoff, John, 2008a (Aug. 13th). Before The Gunfire, Cyberattacks. New York +Times. A1. +Markoff, John, 2008b (Aug. 6th). Russian Gang Hijacking PCs in Vast Scheme. +New York Times. C6. +McLaughlin, Daniel, 2008 (July 2nd). Lithuania accuses Russian hackers of cyber +assault after collapse of over 300 websites. Irish Times. p. 10. +http://lumen.cgsccarl.com/login?url=http://proquest.umi.com/pqdweb?did=150 +3762091&sid=2&Fmt=3&clientld=5094&RQT=309&VName=PQD; (accessed +February 20th, 2009). +Melikishvili, Alexander, 2008 (Dec.)/2009 (Jan.). Recent Events Suggest Cyber +Warfare +Become +Threat. +Insights. +http://www.wmdinsights.com/I29/I29_G3_RecentEvents.htm; +(accessed +February 19-20th, 2009). +Ministry of Internal Affairs of the Russian Federation, undated. Clean Network, +Translated by Open Source Centre. Moscow: Ministry of Internal affairs of the +Russian +Federation. +https://www.opensource.gov, +Document +CEP20090406546003 (accessed April 9th, 2009). +National Intelligence Council, 2008 (Nov.). Global Trends 2025: A Transformed +World. +U.S. +Government +Printing +Office. +http://www.dni.gov/nic/NIC_2025_project.html; (accessed February 20th, 2009). +Nikiforov, IIya, 2008 (Sept. 29th). Hot Fellows in Saakashvili +s Service. Tallinn +Exports Specialists in Intelligence and Democracy. Trans. Open Source Centre. +Moscow Nezavisimaya Gazeta. https://www.opensource.gov, Document ID +CEP20080929021009; (accessed December 18th, 2008). +North Atlantic Treaty Organization, 1949 (April). The North Atlantic Treaty. +Washington D.C. http://www.nato.int/docu/basictxt/treaty.htm; (accessed +February 17th, 2009). +North Atlantic Treaty Organization, 2008 (April 3rd). Bucharest Summit Declaration. +Item 47. http://www.nato.int/docu/pr/2008/p08-049e.html (accessed February +18th, 2009). +North Atlantic Treaty Organization, 2008 (May 14th). NATO opens new centre of +excellence +cyber +defence. +NATO +News. +http://www. +nato.int/docu/update/2008/05-may/e0514a.html; (accessed February 18th, 2009). +North Atlantic Treaty Organization, undated. Defending against cyber attacks. NATO +Topics. http://www.nato.int/issues/cyber_defence/ practice.html; (accessed +February 18th, 2009). +North Atlantic Treaty Organization. Official website of the Cooperative Cyber +Defence Centre of Excellence. http://transnet.act.nato.int/WISE/TNCC/ +CentresofE/CCD; (accessed February 18th, 2009). +Volume 11, 2009 +Baltic Security & Defence Review +Organization for Security and Co-Operation in Europe, 2008 (June 4th). OSCE can +play important role in cyber security, says Estonian Defence Minister [on-line press release] +http://www.osce.org/ pc/item_1_31483.html; (accessed February 19th, 2009). +Panarin, Igor, 2008 (Oct. 15th). The Information Warfare System: The Mechanism +for Foreign Propaganda Requires Renewal, Translated by Open Source Centre. +Moscow: Voyenno-Promyshlennyy Kuryer. https://www.opensource.gov, Document +ID CEP20081016548020; (accessed October 22nd, 2008). +Prygi.blogspot.com, 2008 (Feb. 8th). Ivan vs. Jaan. Russian Army Analyst to the World: +You are defenceless against a cyber attack. http://prygi.blogspot.com/; (accessed +December 20th, 2008). +Rhoads, Christopher, 2009. Kyrgyzstan Knocked Offline. Wall Street Journal. p. 10. +Schrank, Peter, 2007 (May 24th). Cyberwarfare: Newly nasty. Economist.com. +http://www.economist.com/ +world/international/PrinterFriendly.cfm?story_id=9228757; (accessed August 8th, +2008). +Secure Works Press Release, 2008 (Sept. 22nd). Compromised US and Chinese +Computers Launch Greatest Number of Cyber Attacks, according to SecureWorks + Data. +http://www.secureworks.com/media/ +press_releases/20080922-attacks/; +(accessed February 19th, 2009). +Shachtman, Noah, 2009 (March 11th). Kremlin Kids: We Launched the Estonian +Cyber War. Wired Magazine. Blog. http://blog.wired.com/defence/2009/03/prokremlin-gro.html (accessed March 14th, 2009). +Socor, Vladimir, 2008 (May 15th). NATO Creates Cyber Defence Centre In +Estonia. +Eurasia +Daily +Monitor. +http://www.jamestown.org/single/ +?no_cache=1&tx_ttnews[tt_news]=33636; (accessed December 18th, 2008). +Statement by Ambassador of the U.S. Mission to the OSCE, Julie Finley, 2008 +(May 8th). Statement on Cyber-attacks Against Radio Free Europe in Belarus: OSCE will +defend information-sharing efforts from criminal attacks, says Finley [transcript on-line]. +Vienna. +http://www.america.gov/st/texttrans-english/2008/May +/20080508115033eaifas0.3709833.html; (accessed February 20th, 2009). +Svobodnaya Pressa, 2009 (March 17th). Ministry of Defence Planning Information +Warfare, Translated by Open Source Centre. Moscow: Svobodnaya Pressa. +https://www.opensource.gov, Document ID CEP20090318358009; (accessed +April 5th, 2009). +Tanner, Jari and Peach, Gary. 2008 (May 14th). NATO allies sign agreement on +cyber +defense +centre. +International +Herald +Tribune. +www.iht.com/articles/ap/2008/05/14/europe/EU-GEN-NATO-CyberDefences.php; (accessed February 24th, 2009). +The Associated Press, 2008 (May 14th). NATO allies sign agreement on cyber +defense +centre. +International +Herald +Tribune. +http://www.iht.com +Baltic Security & Defence Review +Volume 11, 2009 +/articles/ap/2008/05/14/europe/EU-GEN-NATO-Cyber-Defences.php; +(accessed February 24th, 2009). +The Russian Federation Public Chamber Website, undated. About the House: On the +Public +Chamber +Russian +Federation. +http://translate.google.ru/translate?hl=en&langpair=ru|en&u=http://www.oprf. +ru/, (accessed April 10th, 2009). +Thomas, Timothy, 2009. The Bear Went Through the Mountain: Russia Appraises +its Five-Day War in South Ossetia. Journal of Slavic Military Studies. pp. 55-59. +United Nations, 1945 (June 26th). Charter of the United Nations: Article 1. San +Francisco. +http://www.un.org/aboutun/charter/chapter1.shtml; +(accessed +February 19th, 2009). +Usov, Dmitriy, 2009 (Feb. 25th). Russia is Preparing for the Wars of the Future, +Translated +Open +Source +Centre. +Moscow: +Vzglyad. +https://www.opensource.gov, Document ID CEP2090227358005; (accessed +March 7th, 2009). +Varoli, John, 2000 (June 29th). In Bleak Russia, a Young Man +s thoughts turn to +Hacking. The New York Times on the web. http://www.ssl +.stu.neva.ru/psw/misc/29hack.html; (accessed December 20th, 2008). +Verton, Dan, 2003. Black Ice: The Invisible Threat of Cyber-Terrorism. Emeryville, CA: +McGraw-Hill/Osborne. 32-33; 248. +Vesilind, Priit, 2008. The Singing Revolution. Tallinn: Varrak Publishers Ltd. p. 15, 78, +172. +Watson, Steve, 2008 (Aug. 12th). Russia Today Website Targeted In Cyber Attacks. +Infopass.net. http://www.inforwars.net/articles/august 2008/120808Attacked.htm; +(accessed December 19th, 2008). +Wilson, Clay, 2006. Cyberterrorism and Computer Attacks, ed. Brown, Lawrence. New +York: Novinka Books. pp. 15-16. +Wired Staff, 2009 (March 5th). Botnet Hacker Gets Four Years. Wired Magazine. +http://blog.wired.com/27bstroke6/2009/03/botnet-hacker-g.html; +(accessed +March 24th, 2009). +1 Personal recollection of the author who lived in Estonia from July 2007 to June +2008. +2 Multiple sources were used along with the author +s personal recollections of +living in Estonia. Three of the main sources that describe the attack are: Davis, +Joshua, 2009. Hackers Take Down the Most Wired Country in Europe. Wired +Magazine. Issue 15; Kampmark, Binoy, Autumn 2003. Cyber Warfare Between +Estonia And Russia. Contemporary Review. pp. 288-293; Aaviksoo, Jaak, 2007 (Nov. +28th) Address by the Minister of Defence of the Republic of Estonia at The Centre +for Strategic & International Studies, Washington, D.C. +Volume 11, 2009 +Baltic Security & Defence Review +3 This reference offers an Estonian view of its history and underlines the reasons +behind the friction between Russia and Estonia. +4 SecureWorks is an internet security firm based out of Atlanta. The company +tracks suspicious activities throughout the internet. +5 Entered into force refers to the date that the treaty becomes enforceable +according to the provisions of the treaty by the members that have agreed to the +treaty. +6 WMD Insights is a journal sponsored by the U.S. Defence Threat Reduction +Agency. +7 Idea based on comments used by Jaak Aaviksoo in 2007. Minister Aaviksoo used +this technique to show that some members of the audience may unknowingly be +helping cyber-terrorists. Jaak Aaviksoo, Address by the Minister of Defence of the +Republic of Estonia delivered to the Centre for Strategic & International Studies, +Washington, D.C., November 28, 2007. +8 Russia Today is a globally broadcast news channel broadcast in the English +language and owned by the Russian government news agency RIA-Novosti. +Similar in programming to CNN and BBC but with a Russian perspective on +events in the world news. +9 Information from a Russian and English language blog that discusses issues +concerning Russia. +10 The Russian Federation Public Chamber is an organization created in 2005 to +oversee all aspects of government and to act as a consultant to the heads of the +Russian government. The Russian Federation Public Chamber Website, About the +House: +Public +Chamber +Russian +Federation, +http://translate.google.ru/translate?hl=en&langpair=ru|en&u=http://www.oprf. +ru/. (accessed April 10th, 2009). +11 A Just Russia is a Russian political party created as an opposition party but still +supports the power of the Russian executive branch (Abdullaev, 2006). +JR02-2009 +Tracking GhostNet: +Investigating a Cyber Espionage Network +Information Warfare Monitor +March 29, 2009 +http://www.infowar-monitor.net/ghostnet +http://www.tracking-ghost.net t +JR02-2009 Tracking GhostNet - FOREWORD +March 29, 2009 +Foreword +Cyber espionage is an issue whose time has come. In this second report from the Information Warfare +Monitor, we lay out the findings of a 10-month investigation of alleged Chinese cyber spying against +Tibetan institutions. +The investigation, consisting of fieldwork, technical scouting, and laboratory analysis, discovered a lot more. +The investigation ultimately uncovered a network of over 1,295 infected hosts in 103 countries. +Up to 30% of the infected hosts are considered high-value targets and include computers located +at ministries of foreign affairs, embassies, international organizations, news media, and NGOs. The +Tibetan computer systems we manually investigated, and from which our investigations began, +were conclusively compromised by multiple infections that gave attackers unprecedented access to +potentially sensitive information. +But the study clearly raises more questions than it answers. +From the evidence at hand, it is not clear whether the attacker(s) really knew what they had +penetrated, or if the information was ever exploited for commercial or intelligence value. +Some may conclude that what we lay out here points definitively to China as the culprit. Certainly +Chinese cyber-espionage is a major global concern. Chinese authorities have made it clear that they +consider cyberspace a strategic domain, one which helps redress the military imbalance between +China and the rest of the world (particularly the United States). They have correctly identified +cyberspace as the strategic fulcrum upon which U.S. military and economic dominance depends. +But attributing all Chinese malware to deliberate or targeted intelligence gathering operations by +the Chinese state is wrong and misleading. Numbers can tell a different story. China is presently +the world +s largest Internet population. The sheer number of young digital natives online can more +than account for the increase in Chinese malware. With more creative people using computers, it +expected that China (and Chinese individuals) will account for a larger proportion of cybercrime. +Likewise, the threshold for engaging in cyber espionage is falling. Cybercrime kits are now available +online, and their use is clearly on the rise, in some cases by organized crime and other private actors. +Socially engineered malware is the most common and potent; it introduces Trojans onto a system, +and then exploits social contacts and files to propagate infections further. +Furthermore, the Internet was never built with security in mind. As institutions ranging from +governments through to businesses and individuals depend on 24-hour Internet connectivity, the +opportunities for exploiting these systems increases. +JR02-2009 Tracking GhostNet - FOREWORD +This report serves as a wake-up call. At the very least, a large percentage of high-value targets +compromised by this network demonstrate the relative ease with which a technically unsophisticated +approach can quickly be harnessed to create a very effective spynet +These are major disruptive +capabilities that the professional information security community, as well as policymakers, need to +come to terms with rapidly. +These are major disruptive capabilities that the professional information security community, as well +as policymakers, need to come to terms with rapidly. +Ron Deibert, Director, the Citizen Lab, +Munk Centre for International Studies, +University of Toronto. +Rafal Rohozinski, Principal and CEO, +The SecDev Group, +Ottawa, Canada. +JR02-2009 Tracking GhostNet - ACKNOWLEDGEMENTS +Acknowledgements +This investigation was prepared by a dedicated team of professionals. +Greg Walton conducted and coordinated the primary field-based research in India, Tibetan Missions +abroad, and Europe. Greg is a SecDev Group associate and editor of the Information Warfare Monitor +website. He is currently a SecDev Fellow at the Citizen Lab. The Indian portion of the field work +benefited from the expertise of Dr. Shishir Nagaraja, Security Laboratory, Cambridge University. +Dr. Nagaraga visited Dharamsala for a period of five days in September to assist on aspects of the +technical data collection.1 +The technical scouting and computer network interrogation was carried out by Nart Villenueve. Nart +is the CTO of Psiphon Inc, and the Psiphon Fellow at the Citizen Lab. His investigations included the +discovery and exploration of the GhostNet control servers. He led the data analysis research, which +included log files gathered in the field, as well as data obtained through technical scouting of the +GhostNet control servers. +This report represents a collective effort. The drafting team consisted of the following individuals +(listed in alphabetical order). Ronald Deibert (Citizen Lab), Arnav Manchanda (SecDev Group), +Rafal Rohozinski (SecDev Group and Psiphon Inc.), Nart Villeneuve (Psiphon Fellow, Citizen Lab) +and Greg Walton (SecDev Fellow, Citizen Lab). Layout and design was led by Jane Gowan (Psiphon +Inc. and Citizen Lab). Belinda Bruce (Blurb Media) and James Tay (Citizen Lab), provided additional +support to the team. +Countless others also contributed to the research effort. This includes individuals in India and Tibet, +who for security reasons we cannot name. We are also grateful to the Private Office of his Holiness +the Dalai Lama, the Tibetan Government-in-Exile, the missions of Tibet in London, Brussels, and New +York, and Drewla (a Tibetan NGO). +Aspects of the research carried out by Dr. Nagaraga focusing on socially engineered malware are published in a separate study. +See, The snooping dragon: social-malware surveillance of the Tibetan movement, Shishir Nagaraja, Ross Anderson, Cambridge +University Computer Laboratory Technical Report, Mar 29 2009 +JR02-2009 Tracking GhostNet - TABLE OF CONTENTS +Summary +p. 5 +Introduction +p. 7 +Rise of the cyber spies +A focus on China +Outline of Report +Part One: Context and background +Alleged Chinese operations in cyberspace +Applying the evidence-based approach to cyber attacks: the challenge of attribution +Targeting Tibet +Conduct of the investigation +Phase 1: Field investigation +Phase 2: Identifying command and control servers +Part Two: Tracking Ghostnet +p. 7 +p. 9 +p. 9 +p. 10 +p. 11 +p. 12 +p. 13 +p. 14 +p. 14 +p. 14 +p. 16 +Phase I: Field investigation +Targeted malware + previous research +Information Warfare Monitor field research +Office of His Holiness the Dalai Lama +Tibetan Government-in-Exile +Offices of Tibet +Drewla +Phase 2: Identifying command and control servers +List of infected computers +Sending commands +Command results +Methods and capabilities +Analysis of list of infected computers +Methodology +Selected infections +Infection timeline +p. 17 +p. 17 +p. 22 +p. 22 +p. 27 +p. 27 +p. 27 +p. 30 +p. 32 +p. 34 +p. 37 +p. 39 +p. 40 +p. 40 +p. 42 +p. 44 +Part Three: Investigating GhostNet: Conclusions +p. 46 +Alternative explanations +Attribution +The significance of GhostNet +Part Four: About the Information Warfare Monitor +p. 47 +p. 48 +p. 49 +p. 51 +Boxes +Box 1: Chinese Internet SIGINT in practice +p. 28 +Tables +Table 1: Domain name registration information +Table 2: List of selected infections +p. 32 +p. 42 +Figures +Fig. 1: A +Social Engineering + attack connects to GhostNet +Fig. 2: A +Socially Engineered + email sent to the International Tibet Support Network +Fig. 3: A Virus Total Screen Capture of a malware infected email attachment +Fig. 4: Field researchers discovered malware at five Tibetan locations +Fig. 5: Malware retrieving a sensitive document +Fig. 6: The OHHDL and Drewla were infected by the same malware +Fig. 7: The GhostNet control servers +Fig. 8: The GhostNet +Server List + interface +Fig. 9: The GhostNet +Send Command + interface +Fig. 10: The gh0st RAT interface +Fig. 11: The GhostNet +List Command + interface +Fig. 12: The geographic location of infected hosts +Fig. 13. GhostNet infection timeline +p. 19 +p. 20 +p. 21 +p. 23 +p. 26 +p. 29 +p. 31 +p. 33 +p. 35 +p. 36 +p. 38 +p. 41 +p. 45 +JR02-2009 Tracking GhostNet - SUMMARY +Summary +Trojan horse programmes and other associated malware are often cited as vectors for conducting +sophisticated computer-based espionage. Allegations of cyber espionage (computer network +exploitation) are increasingly common, but there are few case studies in the unclassified realm that +expose the inner workings of such networks. +This study reveals the existence and operational reach of a malware-based cyber espionage network +that we call GhostNet. +Between June 2008 and March 2009 the Information Warfare Monitor conducted an extensive and +exhaustive two-phase investigation focused on allegations of Chinese cyber espionage against the +Tibetan community. +We conducted field-based investigations in India, Europe and North America. In India we worked +directly with affected Tibetan organizations, including the Private Office of the Dalai Lama, the +Tibetan Government-in-Exile, and several Tibetan NGOs. In Europe and North America we worked with +Tibetan missions in London, Brussels, and New York. The fieldwork generated extensive data that +allowed us to examine Tibetan information security practices, as well as capture real-time evidence +of malware that had penetrated Tibetan computer systems. +During the second phase of our investigation, the data was analyzed, and led to the discovery of +insecure, web-based interfaces to four control servers. These interfaces allow attacker(s) to send +instructions to, and receive data from, compromised computers. Our research team successfully +scouted these servers, revealing a wide-ranging network of compromised computers. This extensive +network consists of at least 1,295 infected computers in 103 countries. +Significantly, close to 30% of the infected computers can be considered high-value and include the +ministries of foreign affairs of Iran, Bangladesh, Latvia, Indonesia, Philippines, Brunei, Barbados +and Bhutan; embassies of India, South Korea, Indonesia, Romania, Cyprus, Malta, Thailand, Taiwan, +Portugal, Germany and Pakistan; the ASEAN (Association of Southeast Asian Nations) Secretariat, +SAARC (South Asian Association for Regional Cooperation), and the Asian Development Bank; news +organizations; and an unclassified computer located at NATO headquarters. +The GhostNet system directs infected computers to download a Trojan known as gh0st RAT that allows +attackers to gain complete, real-time control. These instances of gh0st RAT are consistently controlled +from commercial Internet access accounts located on the island of Hainan, People +s Republic of China. +Our investigation reveals that GhostNet is capable of taking full control of infected computers, +including searching and downloading specific files, and covertly operating attached devices, including +microphones and web cameras. +The vector for spreading the GhostNet infection leverages social means. Contextually relevant emails +are sent to specific targets with attached documents that are packed with exploit code and Trojan +JR02-2009 Tracking GhostNet - SUMMARY +horse programmes designed to take advantage of vulnerabilities in software installed on the target +computer. +Once compromised, files located on infected computers may be mined for contact information, +and used to spread malware through e-mail and document attachments that appear to come from +legitimate sources, and contain legitimate documents and messages. It is therefore possible that the +large percentage of high value targets identified in our analysis of the GhostNet are coincidental, +spread by contact between individuals who previously communicated through e-mail. +Nonetheless the existence of the GhostNet network is a significant fact in and of itself. At the very +least, it demonstrates the ease by which computer-based malware can be used to build a robust, lowcost intelligence capability and infect a network of potentially high-value targets. +Key findings: +Documented evidence of a cyber espionage network +GhostNet +infecting at least 1,295 +computers in 103 countries, of which close to 30% can be considered as high-value +diplomatic, political, economic, and military targets. +Documented evidence of GhostNet penetration of computer systems containing sensitive +and secret information at the private offices of the Dalai Lama and other Tibetan +targets. +Documentation and reverse engineering of the modus operandi of the GhostNet +system +including vectors, targeting, delivery mechanisms, data retrieval and control +systems +reveals a covert, difficult-to-detect and elaborate cyber-espionage system +capable of taking full control of affected systems. +JR02-2009 Tracking GhostNet - INTRODUCTION +Introduction +Computer network exploitation represents the leading edge of signals intelligence in the information +age. The proliferation of computer systems throughout governments, businesses, and civic +organizations represents a boon for would-be cyber spies. +Awareness of cyber vulnerabilities, and even basic information security practices, is in its infancy, and +largely absent in most organizations outside of the classified realm. Commercial computer systems, which +represent most of the world +s installed base, are insecure. This lack of security consciousness is reflective +of the infancy of the information age. The Internet was never designed for security and, for the most part, +there has been little incentive for software manufacturers to make security a first priority in the design +and development of products, many of which are destined for consumer and/or small business use. +These challenges are present in advanced industrial societies, but are amplified many times over +in developing countries. Ownership of computers is a relative rarity among many government +departments. Where they exist, they often use grey market or pirated software. Resources are lacking +to employ properly trained computer professionals, and many staff are barely computer literate. In +this context, information security is often a distant priority. +And yet, computers in the hands of individuals or at government offices, ministries, embassies, and +civic and non-governmental organizations contain information that can be valuable. Files and e-mails +with contact information, lists of meetings and attendees, draft position papers, internal PowerPoint +presentations, organizational budgets, and lists of visitors can represent items of strategic value +to rivals and enemies. Organizations, like individuals, can be subject to identity theft, leading to +potentially serious breaches of security. +Rise of the cyber spies +Little is known of the sophistication of state-based cyber espionage capabilities, such as those of the +United States, Israel, and the United Kingdom, all considered leaders in this field. They are assumed +to be considerable as the security doctrines of these countries treat cyberspace as a strategic domain +equivalent to that of land, air, sea, and space.2 +Other powers including China have made cyberspace a key pillar of their national security strategies. +China is actively developing an operational capacity in cyberspace, correctly identifying it as the +domain in which it can achieve strategic parity, if not superiority, over the military establishments +of the United States and its allies. Chinese cyber warfare doctrine is well developed, and significant +resources have been invested by the People +s Liberation Army and security services in developing +defensive and offensive capabilities.3 +http://www.dod.mil/pubs/foi/ojcs/07-F-2105doc1.pdf ; http://www.afa.org/media/reports/victorycyberspace.pdf +http://findarticles.com/p/articles/mi_m0PBZ/is_6_88/ai_n31140190 ; http://www.infowar-monitor.net/modules.php?op=modload& +name=Archive&file=index&req=viewarticle&artid=2&page=1 +JR02-2009 Tracking GhostNet - INTRODUCTION +But the most significant actors in cyberspace are not states. The online engagements that +accompanied the recent Russia-Georgia conflict in August 20084 and Israel +s January 2009 offensive +in Gaza5 were carried out by independent attackers. The May 2007 denial of service attacks against +Estonia6 resulted in a single conviction of a Russian living in Estonia. Likewise, previous high-profile +investigations of hacking against strategic U.S. targets were never positively attributed to foreign +intelligence services7, and in many cases were the work of individuals.8 +The contest in the shadows currently underway in cyberspace appears to rely largely on third parties. +In numerous instances, including case studies conducted by the Information Warfare Monitor +s sister +project, the OpenNet Initiative, third party attackers were responsible for triggering national-level +cyber events. In Kyrgyzstan (2005)9, Belarus (2006)10, during the Russia Georgia war (2008), and +Kyrgyzstan (2009), individuals and/or loose coalitions were responsible for publishing target lists +and attack tools on semi-private websites. The ensuing +cyclones in cyberspace + were sufficient to +precipitate events outside of cyberspace.11 +International cooperation has for the most part focused on establishing capabilities for counteracting +the criminal use of cyberspace, and with good reason. In 2009, the FBI estimated that cybercrime is +responsible for over $10 billion worth of losses each year.12 Cybercrime is a relatively low cost, low +threshold activity. Techniques such as phishing and targeted malware are easy to construct, and the +chances of prosecution are minimal given a general lack of international coordination. +This is slowly changing as national and international authorities become more aware of the threat. +The attacks on Estonia, for example, led to the establishment of NATO +s Cooperative Cyber Defence +Centre of Excellence in Tallinn, Estonia.13 The International Telecommunication Union has also +established its own specialized agency, IMPACT, designed to aid intelligence sharing and tracking of +http://blog.wired.com/defense/2008/10/government-and.html ; http://www.slate.com/id/2197514 +http://www.csmonitor.com/2009/0123/p04s03-wome.html +http://www.webpronews.com/topnews/2008/01/24/man-convicted-in-estonia-cyber-attack +For example, a US government investigation of systematic hacking of Department of Defense networks and defence laboratories +dubbed +Titan Rain + never provided conclusive evidence to substantiate allegations that the hacking was conducted at the behest of +the Chinese government. http://www.time.com/time/magazine/article/0,9171,1098961,00.html +A good example is the 1998 +Solar Sunrise + investigation. The evidence gathered by US authorities eventually led to the conviction +of an Israeli citizen, Ehud Tenebaum, although the involvement of Israeli security services was never proven. http://www.sans.org/ +resources/idfaq/solar_sunrise.php +http://opennet.net/special/kg/ +http://opennet.net/sites/opennet.net/files/ONI_Belarus_Country_Study.pdf +http://www.infowar-monitor.net/modules.php?op=modload&name=News&file=article&sid=2146 +http://kn.theiet.org/magazine/issues/0903/hacking-goes-pro-0903.cfm +http://www.nato.int/docu/update/2008/05-may/e0514a.html +JR02-2009 Tracking GhostNet - INTRODUCTION +malicious criminal activity in cyberspace.14 Countries such as the United States, Russia and China +have also entered into bilateral agreements with allied countries and partners. +A focus on China +Recent allegations of Chinese cyber espionage largely rely on anecdotal evidence. The most common +proof provided by victims of these attacks consists of log files or malware that shows connections +being made by infected computers to IP addresses assigned to the People +s Republic of China. +This kind of evidence is circumstantial at best. Internet usage statistics suggest that focusing on +Chinese instances of information warfare is misleading.15 With 41% of the world +s Internet users +located in Asia, China alone accounts for the largest national population of Internet users +some 300 +million, nearly one-fifth of the global number of users. Coupled with the rapid growth in Chinese use +of the Internet +a 1,200% increase in the period 2000-2008 +this would more than account for the +rise in instances of Chinese-oriented malware.16 +At the same time, however, allegations of Chinese hacking and exploitation of private and +government computer systems are persistent enough to warrant an evidence-based investigation. +This report provides such an investigation. +Outline of report +This report is divided into three parts: +Part one provides a brief introduction to the context and background to this report. We examine past +allegations of cyber espionage by China-based actors and the challenge of evidence-based research +in this field. Part one concludes with a brief description of the methods used in our two-phase +investigation. +Part two provides a detailed account of the conduct of our investigation. The findings of each phase +are presented sequentially. +Part three analyses the overall findings of the investigation, suggests alternative explanations and +assesses the implications. +http://www.itu.int/osg/csd/cybersecurity/gca/impact/index.html +For global Internet usage statistics please see http://www.internetworldstats.com +http://blog.stopbadware.org/2009/03/03/wheres-the-badware +PART ONE: +Context and background +JR02-2009 Tracking GhostNet - PART ONE +Context and background: Alleged Chinese operations +in cyberspace +China has been developing its cyberspace doctrine and capabilities since the late 1990s as part of its military +modernization programme. The Chinese doctrine of +active defence, + which is the belief that China must be ready +to respond to aggression immediately, places an emphasis on the development of cyber warfare capabilities. +The Chinese focus on cyber capabilities as part of its strategy of national asymmetric warfare involves +deliberately developing capabilities that circumvent U.S. superiority in command-and-control warfare. +The strategy recognizes the critical importance of the cyber domain to American military and economic +power and the importance of offensive cyber operations to victory in a modern conflict with the United +States. Chinese doctrine also emphasizes the contiguity between military and non-military realms.17 +In recent years, there has been an increase in allegations that China-based hackers are responsible for +high-level penetrations of computer systems in Europe, North America and Asia. Attackers originating +in China have been accused of infiltrating government computers in the United States, Britain, France, +Germany, South Korea, and Taiwan. China-based hackers have been accused of data theft from foreign +government computers and commercial and financial institutions. The U.S. Department of Defense +reports it is continuously targeted by Chinese attackers, most notably in the series of attacks since 2003 +known as +Titan Rain, + which targeted the Department of Defense and numerous defence companies.18 +There are also allegations of attacks originating from China directed against non-governmental +organizations active in regions where China has a national interest. This includes organizations +advocating on the conflict in the Darfur region of Sudan,19 Tibetan groups active in India, and the +Falun Gong. The majority of attacks involve website defacements, denial of service attacks, or virus +writing campaigns. Nationalistic and patriotic cyber-activity by Chinese nationals intensifies during +crises, such as during Sino-American or Sino-Taiwanese tensions (see below). To date none of these +attacks have been traced back to Chinese state authorities or specific individuals, although many +have benefited official Chinese policy and interests. +http://findarticles.com/p/articles/mi_m0PBZ/is_6_88/ai_n31140190 ; http://www.infowar-monitor.net/modules.php?op=modload&na +me=Archive&file=index&req=viewarticle&artid=2&page=1 ; http://www.heritage.org/Research/asiaandthepacific/upload/bg_2106.pdf +http://www.time.com/time/magazine/article/0,9171,1098961,00.html ; http://findarticles.com/p/articles/mi_m0PBZ/is_6_88/ +ai_n31140190 ; http://www.afa.org/media/reports/victorycyberspace.pdf +http://www.insidetech.com/news/articles/1630-mysterious-forces-hack-pro-tibet-save-darfur-sites ; http://www.washingtonpost. +com/wp-dyn/content/article/2008/03/20/AR2008032003193.html +JR02-2009 Tracking GhostNet - PART ONE +Applying the evidence-based approach to cyber attacks: +the challenge of attribution +Determining those responsible for cyber attacks, commonly known as the attribution problem, is +a major challenge. The Internet was never built with security as a priority. The current version of +the Internet +s address assignment system, IP V4, provides a wealth of loopholes and methods by +which a perpetrator can mask his or her real identity and location. Online identities and servers +can be cleverly hidden. Packet flows and connections can be masked and redirected through +multiple servers. A clever attacker can often hijack a machine belonging to an otherwise innocent +organization and use it as a base for launching attacks. +Hand-in-hand with the problem of attribution is the difficulty of identifying motivating factors +behind a cyber attack. Many perpetrators of Internet-based attacks and exploits are individuals whose +motivation can vary from a simple profit motive through to fear of prosecution or strong emotional +feelings, including religious belief and nationalism. Many cyber attacks and exploits which seem to +benefit states may be the work of third-party actors operating under a variety of motivations. This +makes it difficult to separate the motivation of the individual from the potential motives of the +party on whose behalf the attacks have occurred, or a prospective client to which the perpetrator +is trying to market his or her wares. In either case, the challenge of identifying perpetrators and +understanding their motives gives state actors convenient plausible deniability and the ability to +officially distance themselves from attacks. +Cyber campaigns can also take on a life of their own. Even though a state might +seed + a particular +campaign through tacit encouragement or the absence of sanctions or prosecutions, these campaigns +are inherently chaotic and unpredictable in scope and outcome.20 Phenomena such as spontaneous +cyber rioting + can surpass the initial purposes of the cyber campaign. Low barriers to entry to this +sort of activity enable anyone with a computer and Internet connection to take part in a cyberattack.21 For the most part, governments appear to passively benefit from online manifestations of +nationalistic and patriotic fervour, although outcomes are inherently unpredictable.22 +In China, the authorities most likely perceive individual attackers and their online activities as +convenient instruments of national power.23 A favourite target of Chinese hackers is Taiwanese +computer systems, especially during times of Sino-Taiwanese tensions, such as elections and +http://www.yorku.ca/robarts/projects/canada-watch/obama/pdfs/Deibert.pdf +http://worldanalysis.net/modules/news/article.php?storyid=343 +For instance, during the Russia-Georgia conflict in August 2008, tools were made available online for those who wished to +participate in the ongoing +cyber-war + against Georgian websites. http://blog.wired.com/defense/2008/10/government-and.html ; +http://www.slate.com/id/2197514 +http://findarticles.com/p/articles/mi_m0PBZ/is_6_88/ai_n31140190 ; http://fmso.leavenworth.army.mil/documents/Beijingsrising-hackers.pdf +JR02-2009 Tracking GhostNet - PART ONE +referendums.24 In April 2001, following the death of a Chinese fighter pilot after a collision with an +American spy plane near the Chinese island of Hainan, Chinese hackers began a sustained campaign +to target American computer networks. No link was made with elements of the Chinese government.25 +However, governments cannot always preserve direct control over such activities; groups can maintain +their freelance and autonomous status and undertake their own cyber initiatives that may not always +attain official sanction or serve state interests.26 +Targeting Tibet +Accusations of Chinese cyber war being waged against the Tibetan community have been +commonplace for the past several years. The Chinese government has been accused of orchestrating +and encouraging such activity as part of a wider strategy to crack down on dissident groups and +subversive activity.27 Earlier research has traced these attacks against Tibetan groups to IP addresses +registered in the People +s Republic of China. The attacks used malware hidden in legitimate-looking +email messages, infecting unsuspecting users + computers and exploiting the data on it by sending it +to control servers.28 +The identity of the attackers has never been attributed in a conclusive manner to any specific group +or individual.29 The motivation of those behind the attacks, despite conjecture, is also unproven. +In earlier studies, researchers focused on attacks specifically targeting the Tibetan community. +But a wide variety of other victims of computer penetrations have reported infections similar to +those used against Tibetan organizations, following a similar modus operandi and also reporting +to control servers usually located in China. These additional targets include the Falun Gong30, the +U.S. Government, and multinational corporations.31 While reports of these targeted attacks have +circulated, the extent to which attackers successfully exploited the affected computers is unknown. +http://fmso.leavenworth.army.mil/documents/Beijings-rising-hackers.pdf +http://news.bbc.co.uk/2/hi/americas/1305755.stm +http://fmso.leavenworth.army.mil/documents/Beijings-rising-hackers.pdf +http://www.washingtonpost.com/wp-dyn/content/article/2008/03/21/AR2008032102605.html +See, http://isc.sans.org/diary.html?storyid=4177 ; http://isc.sans.org/diary.html?storyid=4176 and http://archive.cert.uni-stuttgart. +de/isn/2002/09/msg00086.html for background information on these attacks. +Attribution for previous penetrations of Tibetan groups has never been publicly attributed and is not available from open sources. +Classified studies may reveal a finer grained detail, as many of the attacks are relatively unsophisticated, and given proper assets, +could be traced back to specific locations and presumably individuals. +Research by Maarten Van Horenbeeck shows that similar attacks have targeted the Falun Gong. http://www.daemon.be/ +maarten/Crouching_Powerpoint_Hidden_Trojan_24C3.pdf and http://isc.sans.org/presentations/SANSFIRE2008-Is_Troy_Burning_ +Vanhorenbeeck.pdf +See http://www.businessweek.com/print/magazine/content/08_16/b4080032218430.htm +JR02-2009 Tracking GhostNet - PART ONE +Conduct of the investigation +From June 2008 to March 2009 the Information Warfare Monitor conducted an in-depth investigation +of alleged cyber espionage against the Tibetan community. We chose this case study because of the +unprecedented access that we were granted to Tibetan institutions through one of our researchers, and +persistent allegations that confidential information on secure computers was somehow being compromised. +Our lead field investigator had a long history of working with the Tibetan community, and was able +to work with the private office of the Dalai Lama, the Tibetan Government-in-Exile, and a number of +Tibetan non-governmental organizations. +The investigation consisted of two distinct phases. +Phase 1: Field-based investigations in India, Europe, and North America (June-November 2008) +Field research was carried out in Dharamsala, India, the location of the Tibetan Government-in-Exile. +Follow-up research was conducted at Tibetan missions abroad in London, Brussels and New York. During +this phase we had unprecedented access to the Tibetan government and other Tibetan organizations. +This allowed us to establish a baseline understanding of information security practices at these +locations and to design an evidence-based approach to the investigation. +We also conducted extensive on-site interviews with officials in the Tibetan Government-in-Exile, the +private office of the Dalai Lama, and Tibetan non-governmental organizations. The interviews focused on +the allegations of cyber espionage. We also sought alternative explanations for leakage of confidential +documents and information and examined basic information security practices at these locations. +Network monitoring software was installed on various computers so as to collect forensic technical +data from affected computer systems, and initial results were analysed in situ.32 This initial analysis +confirmed the existence of malware and the transfer of information between infected computers and +a number of control servers.33 +Phase 2: Computer-based scouting, target selection, and data analysis (December 2008-March 2009) +During the second phase of the investigation, researchers based at the Citizen Lab analysed the data +collected by the field team. +The data collected in Dharamsala and at Tibetan missions abroad led to the discovery of four control +servers and six command servers. These control servers were identified and geo-located from the captured +A portion of the fieldwork was carried out in conjunction with Dr. Shishir Nagaraja who spent five days in Dharamsala at the request +of IWM researchers and assisted in conducting technical tests. +A packet capturing program, Wireshark, was installed at each test location. All traffic from each of the affected systems was +captured in real-time, and recorded for further analysis. Compromised systems try to connect to control servers in order check-in and +report an infection. Once a connection is made, infected computers may receive instructions or additional locations from where they +are to download instructions. The Wireshark data is sufficient to analyse these connections, determine the behaviour of the attack +vector, and identify the location of control servers. +JR02-2009 Tracking GhostNet - PART ONE +traffic using a simple IP lookup.34 The control servers were then probed and web-based control interfaces +were identified on four control servers, which allowed us to view and control the network. The system was +actively monitored for two weeks, which allowed us to derive an extensive list of infected systems, and to +also monitor the systems operator(s) as the operator(s) specifically instructed target computers. +The data collected during both phases was integrated in Palantir, a data visualization and analysis +tool. The Palantir platform provides a data fusion and visualization environment that enhances +analytical capabilities. +We looked up the associated Internet Protocol (IP) address in all five Regional Internet Registries in order to identify the country +and network to which the IP address is assigned. We then performed a reverse Domain Name System (DNS) look-up on each IP +address. DNS is the system that translates domain names into IP addresses; reverse DNS is a system that translates an IP address +into a domain name. This can potentially provide additional information about the entity that has been assigned a particular IP +address. If we discovered a domain name, we then looked up its registration in WHOIS, which is a public database of all domain +name registrations and provides information about who registered the domain name. +PART TWO: +Tracking GhostNet +JR02-2009 Tracking GhostNet - PART TWO +Phase 1: Field investigation +We conducted our investigation in Dharamsala between July and September 2008. The initial purpose +was to gather targeted malware samples from Tibetan NGOs based in the area and to brief the Tibetan +Government-in-Exile (TGIE) on the basics of information security. This included raising end-user +awareness about social engineering and its policy implications for the secure use of information systems. +The investigator met with the Dalai Lama +s representative in Geneva, Tseten Samdup. During the +meeting, Samdup inquired about the potential threat to computer security at the Office of His +Holiness the Dalai Lama (OHHDL) in light of the targeted malware threat. Samdup requested that +the investigator perform a preliminary security review of OHHDL systems, including Dalailama.com +and the office computer network. A five day mission was scheduled in early September. Malware +was discovered on computers located in the OHHDL. +Following the discovery of malware in the OHHDL, our investigator shifted focus to the campus +network of the Tibetan Government-in-Exile. We approached Thubten Samphel, a senior civil +servant in the Department for Information and International Relations, and sought permission +to run Wireshark on several key computer systems, and to access the firewall logs at the Tibetan +Computing Resource Centre. This access was readily granted. +Additional testing was carried out at a Tibetan NGO. This was done at the suggestion of Phuntsok +Dorjee, the director of a local NGO, TibTec. Dorjee suggested that we conduct testing and monitoring at +the offices of Drewla.35 As was the case at other sitesthe investigator conducted a series of interviews +with the NGO staff. +Targeted malware + previous research +In September 2002, Tibetan groups reported that they were targeted with malware originating +from servers in mainland China. They claimed that this was a coordinated attempt to disrupt their +operations and spy on their computer networks. Similar attacks have occurred since then against a +range of Tibetan non-state actors, including exile groups, human rights organizations, trade unions +and labour organizers, writers, scholars and intellectuals. +In 2005, a member of our investigating team convened a working group that coordinated the +collection and archiving of the malware, including the payloads and associated examples of social +engineering employed. Since early 2008, we have analysed every sample available to us, and +identified control servers for at least fifty incidents. +During an analysis of attacks which occurred during the 2008 Beijing Olympics we discovered +the location of a control server that was later identified as part of the network which infected a +computer in the private office of the Dalai Lama. +The Drewla Initiative Project is an outreach model that seeks new ways to communicate directly with citizens of the People +Republic of China. It relies heavily on the Internet. +JR02-2009 Tracking GhostNet - PART TWO +We were able to gain access to the command interface of this control server and identify the +infected computers which reported back to this server. While were are unable to prove exactly how +the computer in the Dalai Lama +s office became infected, this case demonstrates one of the attack +vectors used by the attacker(s) behind the network of infected computers we later uncovered.36 +The following steps illustrate the attack vector using the malicious document we collected, which was +configured to connect to a control server to which we later acquired access. (See Fig. 1 - p.19) +An email message arrives in the target +s inbox carrying the malware in an attachment or web link. +The attackers(s) + objective is to get the target to open the attachment or malicious link so that the +malicious code can execute. In this case, the attacker(s) sent a carefully crafted email message which +was configured to appear as if it was sent from campaigns@freetibet.org with an attached infected +Word document named +Translation of Freedom Movement ID Book for Tibetans in Exile.doc + to entice +the recipient to open the file.37 (See Fig. 2 - p. 20) +Over time, it has been observed that the carrier emails have become more sophisticated in their +targeting and content in order to trick their recipients into believing that they are receiving +legitimate messages. This is also known as +social engineering. + It is common to see legitimate +documents recycled for such attacks or the attacker injecting their message into an ongoing group +conversation. There are also cases where it appears that content stolen from previously-infected +machines was recycled to enhance the appearance of legitimacy. +The targeted user proceeds to opens the attachment or malicious link. Once opened, the infected +file or link exploits a vulnerability on the user +s machine and installs the malware on the user +computer, along with a seemingly benign file. From the user +s perspective, the infected document +will often open normally, leaving the user unaware of the infection that just took place. +Only 11 of the 34 anti-virus programs provided by Virus Total38 recognized the malware embedded in +the document. Attackers often use executable packers to obfuscate their malicious code in order to +avoid detection by anti-virus software. (See Fig. 3 - p. 21) +Researchers monitoring the use of socially engineered malware attacks against the Tibetan +community have identified over eight different Trojan families in use.39 Control over some targeted +machines is maintained using the Chinese gh0st RAT (Remote Access Tool). These Trojans generally +allow for near-unrestricted access to the infected systems. +A detailed technical investigation of a similar case of a targeted attack which connected to the same control server is available +here: http://xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx; another investigation of targeted attacks connecting to the same control +server is available here: http://www.xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx +For a detailed list of malicious files and control servers see xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx +xxxxxxxxxxxxxxxxxxx +VirusTotal.com is a free, web-based service that allows users to upload malicious files that are scanned with 34 leading anti-virus products. +http://isc.sans.org/diary.html?storyid=4177 +JR02-2009 Tracking GhostNet - PART TWO +Fig. 1 +Social Engineering + attack connects to GhostNet. +This Palantir screen capture summarizes the relationships between an +unknown sender + pretending to be +campaigns@freetibet.org +, the email +sent to the International Tibet Support Network , and the attachment ( +Translation of Freedom Movement ID Book for Tibetans in Exile.doc +that contained malware that connected to a GhostNet control server. +JR02-2009 Tracking GhostNet - PART TWO +Fig. 2 +Socially Engineered + email sent to the International Tibet Support +Network. +This email was sent on July 25, 2008 by an unknown attacker pretending to be +campaigns@freetibet.org + to the International Tibet Support +Network. Attached to the message was a Microsoft Word document named +Translation of Freedom Movement ID Book for Tibetans in Exile.doc +that exploits a vulnerability in Word to install malware on the target +s computer system. +JR02-2009 Tracking GhostNet - PART TWO +Fig. 3 +A Virus Total screen capture of a malware infected email attachment. +This is a screen capture from VirusTotal.com, a free, web-based service that allows users to upload malicious files that are scanned with +anti-virus products. It shows that only 11 of 34 anti-virus products detected the malicious file ( +Translation of Freedom Movement ID Book +for Tibetans in Exile.doc +JR02-2009 Tracking GhostNet - PART TWO +After infecting the target, the Trojan packed in the Word document performed a DNS look-up to +find its control server and then connected to that server. This Trojan attempted to connect to +xxxxxxxxxxxxxxxx. This is one of the control servers that we later scouted and was in the same +Trojan family that infected computers in the Dalai Lama +s private office. +About 70% of the control servers behind the attacks on Tibetan organizations are located on IP +addresses assigned to China. However, servers have also been identified in the United States, +Sweden, South Korea and Taiwan. The host names pointing to these servers are quite often +configured on dynamic DNS services, such as 3322.org. While these services in and of themselves +are not malicious, they are heavily used in these specific attacks.40 +Information Warfare Monitor field research +In September and October 2008 the Information Warfare Monitor investigated information security +practices and alleged cyber espionage activities on the computer systems in various offices related +to the work of the Dalai Lama and other Tibetan groups. The offices that we investigated were: +the Office of His Holiness the Dalai Lama (OHHDL), based in Dharamsala, India; the Tibetan +Government-in-Exile (TGIE); various Offices of Tibet (OOT) in New York City, London, Paris, Brussels, +and Geneva; and the Tibetan activist NGO, Drewla. (See Fig. 4 - p. 23) +Office of His Holiness the Dalai Lama +The OHHDL is the personal office of the Dalai Lama. The OHHDL provides secretarial assistance and +is responsible for all matters related to the Dalai Lama and acts on his behalf. It is worth noting +that the OHHDL +s primary responsibilities include organization of the Dalai Lama +s international +schedule, handling all diplomatic, governmental and personal correspondence, and acting as +the liaison between the Dalai Lama and officials of the Tibetan Government-in-Exile (TGIE) and +the Offices of Tibet (OOT) worldwide. Therefore the OHHDL +s computer network is continuously +transmitting and receiving extremely sensitive data. +While the Office does not have any secrets, it is essentially the hub of the Tibetan movement and +thus handles strategic, time-sensitive communications. Examples of these communications include +scheduling meetings with world leaders, and, since 2002, coordinating the negotiations between +the People +s Republic of China and Dharamsala. +On September 10, 2008, we used Wireshark to capture packets from an OHHDL computer named +xxxxxx. We chose xxxxxxx from among 23 computers on the OHHDL internal network due to +time constraints and consultations with office staff to identify the computers most likely to be +infected, such as those operated by relatively inexperienced users vulnerable to social engineering +techniques, or those handling particularly sensitive data. +An analysis of the data collected reveals that this computer was compromised by malware that was +in interactive communication with identified control servers. The infected computer connected to +http://www.businessweek.com/print/magazine/content/08_16/b4080032218430.htm +JR02-2009 Tracking GhostNet - PART TWO +Fig. 4 +Field researchers discovered malware at five Tibetan locations. +A Palantir screen capture showing the Tibetan organizations at which we conducted field research and the connections from infected +computers at these locations and various control servers located in China. The locations at which we found evidence of infection are: +the Office of His Holiness the Dalai Lama, the Tibetan Government-in-Exile, the Offices of Tibet in New York City and London and the Tibetan +activist NGO, Drewla. +JR02-2009 Tracking GhostNet - PART TWO +four different IP addresses, each with a somewhat different method. While there are four groupings +of communications between the infected computer and the control servers, they are related such +that there appear to be two distinct families of malware. In both cases, the malware uses the +protocol for standard web traffic, HTTP, in order make the network activity appear as if it were +normal Internet browsing. +The first family of malware used HTTP connections to connect to PHP files.41 Despite connecting +to different IP addresses and requesting different files, both used the same unique key when +communicating, indicating that they are part of the same family of malware. +1) The malware made connections to a control server on IP address xxxxxxxxxxxx +using two host names, xxxxxxxxxxxxxxxx and xxxxxxxxxxxxxxxxxx. The IP address +xxxxxxxxx is in a range assigned to Hainan-TELECOM (xxxxxxxxxxxxxxxxxxxxxxxx +xxxxxxxxxxxxxxxxx) in China. The malware used HTTP to connect to various PHP files +on the control server in order to update its status and receive instructions about where +to download commands. The commands are embedded in what appear to be image files +(e.g. JPEG). +2) The malware made connections to a control server on IP address xxxxxxxxxxx, port +8000. This IP address reverse resolved to xxxxxxxxxxx.broad.hk.hi.dynamic.163data. +com.cn and is in an IP range assigned to Hainan-TELECOM (HAIFU node adsl dialup +ports) in China. The malware used HTTP POST to upload content to the control server.42 +The investigation carried out in Phase 2 identified the network of control servers used in this +particular attack. The control servers we discovered include the control server used in the welldocumented instances of social malware used frequently against Tibetan targets during the 2008 +Olympics in Beijing. +The second family of malware used HTTP POST to connect to a CGI43 script to communicate between +the infected computer and the control server. While their functions appear to be different, with one +malware focusing on reporting and commands and the other on document retrieval, they are likely part +of the same family of malware. In addition, the domain names used, www.lookbytheway.net and www. +macfeeresponse.org, are registered to the same person, +zhou zhaojun + (losttemp33@hotmail.com). +1) The malware made connections to a control server on IP address 221.5.250.98 using +the host name www.lookbytheway.net. The IP address 221.5.250.98 is assigned to +CNCGROUP-CQ (CNC Group CHINA169 Chongqing Province Network) in China. The +malware on the infected computer used HTTP to connect to a file in an attempt to +inform the control server of the infected computer +s status and to download commands. +PHP is a popular scripting language often used in web applications. +HTTP POST is a method often used to upload content to a web server. +CGI scripts are often written in the Perl programming language. +JR02-2009 Tracking GhostNet - PART TWO +In one case, the file the infected computer was requesting was not present and the +infected computer received a 404 error. However, successful connections were made +via HTTP to CGI scripts. The infected computer used HTTP POST to submit data to CGI +scripts hosted on the control server. +2) The malware made connections to a control server on 218.241.153.61 using the host name +www.macfeeresponse.org. The IP address 218.241.153.61 is assigned to BITNET (Beijing +Bitone United Networks) in Beijing, China. The malware on the infected computer used +HTTP to connect to a file to inform the control server of the infected computer +s status +and download commands. In addition, connections were made via HTTP to CGI scripts. The +infected computer used HTTP POST to submit data to CGI scripts hosted on the control +server. Connections to one CGI script appear to inform the control server of the presence of +particular documents, while connections to a second CGI script appear to cause the infected +computer to upload documents to the control server using HTTP POST. +Instances of malware that connect to control server locations www.lookbytheway.net and www. +macfeeresponse.org have been analysed by security companies.44 This network extends to a variety +of domain names including: +www.lookbytheway.com + 210.51.7.155 +www.macfeeresponse.com - 210.51.7.155 +www.msnppt.net - 221.5.250.98 +www.msnxy.net - 210.51.7.155 +www.msnyf.com - 221.5.250.98 +www.networkcia.com - 210.51.7.155 +www.indexnews.org - 61.188.87.58 +www.indexindian.com - 210.51.7.155 +During the in situ investigation at the Dalai Lama +s private office we observed several documents +being exfiltrated from the computer network and uploaded to www.macfeeresponse.org, including +a document containing thousands of email addresses and one detailing and discussing the Dalai +Lama +s envoy +s negotiating position. (see Fig. 5 - p. 26) +Our investigators did not have access to the stolen documents for reasons of confidentiality. +However, we can assume their significance to Sino-Tibetan negotiations. One example is the fact +that GhostNet penetrated computers of organizations involved in China-TGIE negotiations.45 +See, http://www.threatexpert.com/report.aspx?md5=79f7f4695b8878cf1760e8626129ca88 and http://www.threatexpert.com/report. +aspx?md5=ea03a7359505e19146994ad77b2a1e46 +Lodi Gyari is the lead person designated by the Dalai Lama to coordinate negotiations with the Chinese government. Our invesigator +interviewed him in December 2008 in Delhi. We briefed him on our ongoing investigation and offered advice on information security +while engaged in negotiations in Beijing. Lodi Gyari is also the Executive Chairman of the Board of the International Campaign for +Tibet (ICT), an independent Washington-based human rights advocacy group. (Note that our investigation uncovered that seven of +s computers were compromised by GhostNet). +JR02-2009 Tracking GhostNet - PART TWO +Fig. 5 +Malware retrieving a sensitive document. +This screen capture of the Wireshark network analysis tool shows an infected computer at the Office of His Holiness the Dalai Lama uploading a +sensitive document to one of the CGI network +s control servers. +JR02-2009 Tracking GhostNet - PART TWO +Tibetan Government-in-Exile (TGIE) +On September 11, 2008, Wireshark was used to capture packets from a TGIE computer xxxxxxx. An +analysis revealed that this computer was compromised by malware which sent communication to, and +received communication from, control servers. +The malware made connections to a control server on 221.10.254.248 using the host name 927. +bigwww.com. The IP address 221.10.254.248 is assigned to CNCGROUP-SC (CNC Group CHINA169 +Sichuan Province Network) in China. The malware on the infected computer used HTTP to connect +to a JPEG file, which was not an image file but instead contains an IP address and port number +(124.135.97.21:8005). This IP address, 124.135.97.21, is assigned to CNCGROUP-SD (CNC Group +CHINA169 Shandong Province Network) in China. +Offices of Tibet +London +On October 1, 2008 Wireshark was used to capture packets from a computer in the London OOT. An +analysis revealed that this computer was compromised by malware which sent communication to, and +received communication from, control servers. +The malware made connections to a control server on 58.141.132.66 using the hostname oyd.3322. +org on port 4501. The IP address 58.141.132.66 is assigned to NamBu TV in Seoul, South Korea. 3322. +org is a Chinese dynamic domain service. +New York +On March 3, 2008, Wireshark was used to capture packets from a computer in the New York OOT. +An analysis revealed that this computer was compromised by malware which attempted to send +communication to a control server. +The malware attempted to make a connection to what appears to be a control server at +125.108.172.81 but there was not an active server at that location. The IP address 125.108.172.81 is +assigned to CHINANET-ZJ-WZ (CHINANET-ZJ Wenzhou node network) in China. +Drewla +Following the discovery of targeted malware on the OHHDL, TGIE and OOT networks, we performed +similar analysis on Tibetan NGOs to see if we could identify more infected machines communicating +with control servers in China. While we carried out such analysis on a number of NGOs, in this report +we focus on Drewla +s network. +The Drewla ( +connection + in Tibetan) is an online outreach project was set up in 2005 that employs +Tibetan youth with Chinese language skills to chat with people in mainland China and in the +diaspora, raising awareness about the Tibetan situation, sharing the Dalai Lama +s teachings, and +supplying information on how to circumvent Chinese government censorship on the Internet. +On September 12, 2008 Wireshark was used to capture packets from a Drewla computer. An analysis +revealed that this computer was compromised by malware which sent communication to, and +JR02-2009 Tracking GhostNet - PART TWO +received communication from, control servers. +The malware made connections to a control server on 221.5.250.98 using the host name www. +lookbytheway.net. The IP address 221.5.250.98 is assigned to CNCGROUP-CQ (CNC Group CHINA169 +Chongqing Province Network) in China. The malware on the infected computer used HTTP to connect +to a file in an attempt to inform the control server of the infected computer +s status and download +commands. The infected computer used HTTP POST to submit data to CGI scripts hosted on the +control server. (see Fig. 6 - p. 29) +Box 1. +Chinese Internet SIGINT in practice +During the course of our research, we were informed of the following incident. A member of +Drewla, a young woman, decided to return to her family village in Tibet after working for two +years for Drewla. She was arrested at the Nepalese-Tibetan border and taken to a detention +facility, where she was held incommunicado for two months. She was interrogated by Chinese +intelligence personnel about her employment in Dharamsala. She denied having been politically +active and insisted that she had gone to Dharamsala for studies. In response to this, the +intelligence officers pulled out a dossier on her activities and presented her with full transcripts +of her Internet chats over the years. They indicated that they were fully aware of, and were +monitoring, the Drewla outreach initiative and that her colleagues were not welcome to return +to Tibet. They then released her and she returned to her village. +JR02-2009 Tracking GhostNet - PART TWO +Fig. 6 +The OHHDL and Drewla were infected by the same malware. +This Palantir screen capture shows the relationship between an infected computer at the Office of His Holiness the Dalai Lama (OHHDL) and the +Tibetan NGO Drewla. Both attempted to connect to the same control server in the CGI network. +JR02-2009 Tracking GhostNet - PART TWO +Phase 2: Identifying command and control servers +This phase of the investigation focused on the discovery of the command and control servers. We +were able to identify and connect to the control servers used by the GhostNet by analysing the data +from the OHHDL obtained during the field investigations carried out in Phase 1. During this process +we were able to find and access web-based administration interfaces on the control server identified +from the OHHDL data. These servers contain links to other control servers as well as command +servers, and so therefore we were able to enumerate additional command and control servers. +After discovering several instances of malware on these servers, we set up a honey pot computer and +were able to identify additional malicious servers by monitoring the traffic generated by our infected +honey pot. Using the attacker(s) + web-based administration interface, we were able to command our +honey pot computer to download gh0st RAT, one of the Trojans used by GhostNet. Eventually, our +honey pot computer established a connection to the attacker(s) + gh0st RAT client. The attacker(s) +proceeded to execute commands on our honey pot. We were able to discover several IP addresses +within a DSL range in Hainan Island (PRC) that the attacker(s) used to communicate with computers +infected with gh0st RAT. +Finally, we were able to map out the methods and capabilities of the GhostNet by a triangulated +analysis of three sources: 1) data obtained from our collection of socially engineered emails with +backdoor attachments, 2) the captured network traffic from Tibetan targets; and, 3) data obtained by +gaining access to the command and control interface. (see Fig. 7 - p. 31) +While analysing the data collected from the infected OHHDL computer (xxxxxxx), we discovered +web-based administration interfaces to four control servers. Through some strategic guessing +concerning file paths and file names, we were able to access web interfaces to multiple control +servers. In total, we found 26 instances of the administration interface across the four servers. It +remains unclear why the attacker(s) did not secure access to the control interface. Perhaps the +attacker(s) concluded that the file paths and file names could not be easily guessed. +The control servers + web interface contains three main components: 1) a listing of all the infected computers +that have reported to the control server; 2) an interface to issue commands to the infected computers; and +3) an interface to monitor pending commands to infected computers and their results when completed. +The commands issued to the infected computers direct the infected computer to download files +from additional command servers under the attacker(s) + control. In some cases, these servers act as +control servers themselves; however, some appear to be used exclusively to host malicious files that +infected computers are meant to download. The attacker(s) set commands on the control servers +that instruct infected computers to download additional remote administration Trojans, such as +gh0st RAT, in order to take complete real-time control of the infected computers. +Three of the four control servers are located in three different locations in China: Hainan, +Guangdong and Sichuan. One of the control servers is located at a web-hosting company in the +United States. Five of the six command servers are located in mainland China (Hainan, Guangdong, +Sichuan and Jiangsu) and one in Hong Kong. +JR02-2009 Tracking GhostNet - PART TWO +Fig. 7 +The GhostNet control servers. +This Palantir screen capture shows the GhostNet servers we uncovered and their relationship with the malicious email sent to, 1) the +International Tibet Support Network, 2) the infected computer at the Office of His Holiness the Dalai Lama; and, 3) the honey pot network set +up at the Citizen Lab. +JR02-2009 Tracking GhostNet - PART TWO +The four control servers are: + xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, Hainan-TELECOM, CN + xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, US + xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, CHINANET-GD, CN + xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx CHINANET-SC, CN +The six control/command servers are: + xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, CHINANET-HI, CN + xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, CUHKNET, HK + xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, CHINANET-GD, CN + xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, CHINANET-SC, CN + xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, CHINANET-JS, CN + xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, CHINANET-SC, CN +The data obtained from WHOIS records concerning domain name registration reveals that most +of the domains are traceable to the same individual. However, the attacker(s) could have simply +stolen the domains from someone else, or compromised the servers hosting these domains. +Table 1: Domain name registration information +xxxxxxxxxxxxx +xxxxxxxxxxxxx +xxxxxxxxxxxxx +xxxxxxxxxxxxxxxxxxxxxxxxxxxx +25/04/06 +xxxxxxxxxxxxx +xxxxxxxxxxxxx +xxxxxxxxxxxxx +xxxxxxxxxxxxx +26/11/07 +xxxxxxxxxxxxx +xxxxxxxxxxxxxxxxxx +xxxxxxxxxxxxxxxxxx +xxxxxxxxxxxxxxxxx +xxxxxxxxxxxxxxxxxxx +20/06/08 +xxxxxxxxxxxxxxxxxx +xxxxxxxxx +xxxxxxxxxxxxxxxxxx +03/09/08 +List of infected computers (see Fig. 8 - p. 33) +The Server List interface provides information on each computer infected by the attacker(s) +malware, indicating the name given to the computer (by its owner/operator), its IP address, when +it was first infected, when it last called home (i.e. the control server), and how many times it +has called home. Each infected computer is assigned a unique identification number so that the +infected computer can be tracked even when its IP address changes. The page also features a link +to the Send Command interface, through which the attacker(s) sends instructions to the infected +JR02-2009 Tracking GhostNet - PART TWO +Fig. 8 +The GhostNet +Server List + interface. +This screen capture of the GhostNet interface shows all infected computers that have +checked in + with the control server. It has been obscured +to protect the identity of the victims. +JR02-2009 Tracking GhostNet - PART TWO +computers. There is also a button at the top of the page that links to a Command Result page that +shows the status of the commands sent to the host and their results. +To corroborate our findings, there was an entry in the Server List page of the infected OHHDL +computer that we analysed during our field investigations outlined in Part One. It contained the +unique ID, the IP address, computer name, and a link to issue commands to the infected computer. +Sending commands +The Send Command link provided for each entry yields an interface that allows an attacker(s) to +send specific commands to the selected infected computer. In addition to a custom command, the +attacker(s) may choose from a menu of commands, which includes options to download binaries that +provide additional functionality (such as keystroke logging or remote administration), acquire system +information (list computer information, software and documents on the computer), or cause the +malware to become dormant. (See Fig. 9 - p. 35) +Using the Send Command interface, the attacker(s) issues instructions to the infected computers to +download malicious files that are disguised as standard image files. As mentioned above, the files +are most often hosted on additional command servers that appear to be dedicated to hosting these +infected files.46 These command servers contain a variety of files. While the exact function of each +file is not known, the file names given to them by the attacker(s) provide some indication of their +functionality. There are file names associated with the retrieval of files as well as keystroke logging. +One of the commands available to the attacker(s) instructs infected computers to download the +gh0st RAT remote administration tool, which gives the attacker(s) full, real-time control of the infected +computer. Gh0st RAT is an open source Trojan that is widely available online. It was developed by +Chinese programmers but has now been translated into English. The program allows an attacker to +create an executable file that can be repacked and disguised and used to infect and compromise a target +computer. This file can be configured to directly connect to the gh0st RAT owner or to a third location, a +control server, when it retrieves the current IP address of the gh0st RAT owner. (See Fig. 10 - p. 36) +Once the infected computer connects to the gh0st RAT owner, an entry appears in the Connection +window with some information about the infected computer. The gh0st RAT owner may then +issue commands to the infected computer. These commands include file manager, screen capture, +keylogger, remote shell, system, webcam view, audio capture, as well as the ability to force the +infected host to download and execute additional malware, such as a gh0st RAT update. +During the course of the investigation, we infected a honey pot computer with the attacker(s) +malware. We instructed our infected computer to download the attacker(s) + version of gh0st RAT +using the malicious network +s web-based administration interface. The gh0st RAT attempted to +connect to several *.broad.hk.hi.dynamic.163data.com.cn IP addresses before finally successfully +connecting to xxxxxxxxxxxxxxxxxxxxxxxxx.broad.hk.hi.dynamic.163data.com.cn). +In some cases the malicious image files are hosted on the control servers themselves. +JR02-2009 Tracking GhostNet - PART TWO +Fig. 9 +The GhostNet +Send Command + interface. +This screen capture of the GhostNet interface shows how the attacker(s) can send specific commands to infected computers. It has been +obscured to protect the identity of the victims. +JR02-2009 Tracking GhostNet - PART TWO +Fig. 10 +The gh0st RAT interface. +This screen capture of the English language version of the gh0st RAT software shows the commands that an attacker is able to execute on the +compromised computer. +JR02-2009 Tracking GhostNet - PART TWO +The gh0st RAT tool attempts to connect to IP addresses of a DSL provider in Hainan, China: + xxxxxxxxxxxx.broad.hk.hi.dynamic.163data.com.cn + xxxxxxxxxxxx.broad.hk.hi.dynamic.163data.com.cn + xxxxxxxxxxxx.broad.hk.hi.dynamic.163data.com.cn + xxxxxxxxxxxx.broad.hk.hi.dynamic.163data.com.cn + xxxxxxxxxxxx.broad.hk.hi.dynamic.163data.com.cn + xxxxxxxxxxxx.broad.hk.hi.dynamic.163data.com.cn +After a successful connection, the attacker(s) proceed to issue commands on our infected +computer in real-time. +We found similar but unsuccessful connections to the same IP address range from some of the +infected computers we analysed and discovered that a rudimentary version of the web-based +administration interface contained only one infection from the same IP address range in Hainan. +In addition, one of the servers used to host the attacker(s) + malicious files is a Government of +Hainan web server located in Hainan, and one of the control server interfaces we gained access +to is also located in Hainan. However, one should not rush to judgement concerning the identity +of the attacker(s) based on this location. The gh0st RAT software can be configured with a proxy +server; therefore it is possible that the attacker(s) were using a compromised system as a proxy to +hide their true location. +Command results +The Command Result page lists the commands issued through the Send Command page and the +status of those commands. Each entry in this interface shows what command was sent to the +infected computer, including the URL to the command server and the command file (the malicious +file disguised as an image). Upon the successful completion of a command, the relevant date, time, +and result are recorded. (See Fig. 11 - p. 38) +The Command Result page contains a column that displays the content sent back to the control +server from the infected computer. The command issued to retrieve this content in the Send +Command interface is labelled +Acquire System Information. + Even though we have been unable +to properly decode the content,47 the plain text values in the binary content indicate that these +entries contain information about the infected computer (CPU, memory, operating system, +programmes installed) as well as file names of documents on the computer, presumably for later +retrieval. This information is likely used to determine which targets the attacker(s) will further +exploit and control using remote administration tools such as gh0st RAT. +The content is base64 encoded and XORed with values we have yet to identify. +JR02-2009 Tracking GhostNet - PART TWO +Fig. 11 +The GhostNet +List Command + interface. +This screen capture of the GhostNet interface lists the commands issued to infected computers. It has been obscured to protect the identity of +the victims. +JR02-2009 Tracking GhostNet - PART TWO +Methods and capabilities +The attacker(s) are able to exploit several infection vectors. First, they create web pages that +contain +drive by + exploit code that infects the computers of those who visit the page. Second, the +attacker(s) have also shown that they engage in spear phishing in which contextually relevant emails +are sent to targets with PDF and DOC attachments which, when executed, create back doors that +cause the infected computer to connect to a control server and await further instructions. +With each successful infection the attacker(s) may use any contextually relevant data to further +exploit the targeted community and may also impersonate the initial target in order to infect all the +targets + contacts. Finally, the targets themselves may infect others by forwarding infected documents +to their contacts. In this way, the network of infected computers grows organically. +The first stage of infection focuses on getting targets to execute malicious code. Once infected, the target +computer routinely checks in with a control server in order to receive further instructions. At this stage, +the attacker(s) acquires some initial information regarding the identity of the infected computer. +Newer versions of the administration interface contain a direct link to a web service that looks up +the relevant WHOIS information about the IP address of the infected computer along with a simple +port scan. This version also does a geoIP lookup on the infected computer +s IP address and lists the +country in which the computer is located, indicating that the attacker(s) has an interest in the +geographical location of the infected computers. +The attack may also issue an acquire system information command that causes the infected computer to upload +its hardware statistics, list of programs installed, list of recent documents, and current network connections. +The attacker(s) may use this information to target the infected computer for further exploitation. +The attacker(s) directs the infected computers to download and install a remote administration +Trojan. The attacker(s) have demonstrated a preference for gh0st RAT but may choose from a variety +of Trojans. The attacker(s) simply browses to the +send command + interface and pastes in a link to +a version of gh0st RAT on a +command + server under his or her control. The next time the infected +computer checks in to the control server, it will be instructed to download and execute gh0st RAT. +Upon completion, the infected computer notifies the control server and the result appears in the +attacker(s) + web interface. +Once gh0st RAT is installed on the target, the infected computer will periodically check a specific +location and retrieve the IP address to which it is supposed to connect. When the attacker(s) +is not available, he or she will often change this IP to 127.0.0.1 (localhost) so that the amount +of potentially suspicious external traffic is limited. When the attacker(s) is ready to receive +connections, the IP address is changed to a valid external IP address. +When the attacker(s) turns on gh0st RAT, he or she is able to see all the infected machines that have +established connections to him or her. The attacker(s) may then execute a wide variety of commands, +including file manager, screen capture, keylogger, remote shell, system, webcam view, audio capture, +as well as the ability to force the infected host to download and execute additional malware, such as +a gh0st RAT update. The attacker(s) may also secretly execute programs on the target computer. +JR02-2009 Tracking GhostNet - PART TWO +Analysis of list of infected computers +A detailed analysis of the list of infected computers revealed an overwhelming number of unique +infections in many countries. The same malware that infected computers at the Dalai Lama +s office +and other Tibetan organizations had a much more extensive set of targets. The list of entities and +locations of those targeted was quite varied. +In total, we found 1,295 infected computers located in 103 countries. We found that we were able to +confidently +on a scale of low, medium, high +identify 397 of the 1,295 infected computers (26.7%), +and labelled each one as a high-value target. We did so because they were either significant to the +relationship between China and Tibet, Taiwan or India, or were identified as computers at foreign +embassies, diplomatic missions, government ministries, or international organizations. +Of the remaining infected computers, 536 appear to be computers on private broadband Internet +providers. The remaining IP addresses do not reverse resolve and available information on these +hosts does not allow us to make judgements regarding the identity or purpose of these computers. +Methodology +We compiled a unified and comprehensive list of infected computers from all the control servers, +as there was considerable duplication across them. There were several duplicate entries in the list +of infected computers +in some cases, the same infected computer was logged multiple times as it +was connecting from a different IP address. In other instances, multiple infected computers were +assigned different internal IP addresses and had different computer names but shared the same +external IP address. This signifies that there were multiple infected computers sharing Internet +access. Where possible, we filtered the results by unique computer name, and if no computer name +was present, we filtered by unique external IP address.48 (See Fig. 12 - p. 41) +On the surface, the names of the infected computers in the sample are provocative. There are references +to ministries of foreign affairs, foreign embassies, and other government entities. Some contains names of +officials or their positions/titles. However, we recognize that a computer name can be anything its owner +wishes, and may be completely unrelated to the location, function, or owner of that particular computer. +Therefore, in order to be more confident as to the true identity or purpose of the infected computer, +we relied on reverse DNS look-ups and each IP address + record from the Regional Internet Registries. +Using these two pieces of information we were able to confirm the validity of the identity of several +infected computers with a high (H) degree of confidence. +In some cases the computer name associated with the infected computer is actually a domain +name or an acronym for a recognizable institution or organization. In these cases we classified our +identification of the target with either a medium (M) or low (L) level of confidence. Medium +confidence refers to instances where we have otherwise identified a related high confidence target, +In one case we removed 117 unique IP addresses from Mexico that appeared to belong to the same computer connecting in to the +control server from a DSL provider. +JR02-2009 Tracking GhostNet - PART TWO +Fig. 12 +The geographic location of infected hosts. +This graphic illustrates the global reach of the GhostNet. There were 1,295 infected computers that reported to the control server. The +infections were spread across 103 countries. Taiwan reported the most infections followed by the United States, Vietnam and India. +JR02-2009 Tracking GhostNet - PART TWO +but for which we rely on the computer name for identification. Low confidence refers to instances +in which we rely solely on the computer name for identification. +Table 2: Selected infections +Organization +Confidence +Location +Infections +ASEAN +ID, MY +Asian Development Bank +PH, IN +Associated Press, UK +GB, HK +Bureau of International Trade Relations +CanTV, Venezuela +Ceger, Portugal +Consulate General of Malaysia, Hong Kong +Deloitte & Touche, New York +Department of Commerce, Solomon Islands +Department of Foreign Affairs, Indonesia +Department of Foreign Affairs, Philippines +Department of Science and Technology, Philippines +Embassy of China, US (see footnote 50) +Embassy of Cyprus, Germany +Embassy of Germany, Australia +Embassy of India, Belgium +Embassy of India, Serbia +Embassy of India, Germany +Embassy of India, Italy +Embassy Of India, Kuwait +Embassy of India, USA +Embassy of India, Zimbabwe +Embassy of Indonesia, China +Embassy of Malaysia, Cuba +Embassy of Malaysia, Italy +Embassy of Malta +Embassy of Malta, Australia +Embassy of Malta, Belgium +Embassy of Malta, Libya +Embassy of Pakistan, Bahrain +Embassy of Papua New Guinea, China +Embassy of Portugal, Finland +Embassy of Portugal, Germany +Embassy of The Republic Of China (Taiwan), Swaziland +Embassy of Romania, Finland +Embassy of Romania, France +JR02-2009 Tracking GhostNet - PART TWO +Table 2: Selected infections (cont +Organization +Confidence +Location +Infections +Embassy of Romania, Norway +Embassy of Romania, PRC +Embassy of Thailand, Philippines +Embassy of the Republic of Korea, China +Government Integrated Telecommunication Network, Malaysia +High Commission of India, Cyprus +High Commission Of India, United Kingdom +Institute for Information Industry, Taiwan +International Campaign for Tibet +International Chamber of Shipping, United Kingdom +Lanka Education and Research Network, Sri Lanka +Malta External Trade Corporation Ltd. +Maritime Police, Solomon Islands +Ministry of Communications, Brunei +Ministry of Education, Solomon Islands +Ministry of Foreign Affairs, Bangladesh +Ministry of Foreign Affairs, Barbados +Ministry of Foreign Affairs, Bhutan +Ministry of Foreign Affairs, Brunei +Ministry Of Foreign Affairs, Iran +Ministry of Foreign Affairs, Latvia +Ministry of Industry and Trade, Vietnam +Ministry of Labour and Human Resources, Bhutan +National Informatics Centre, India +NATO, (SHAPE HQ) +Net Trade, Taiwan +New Tang Dynasty Television, United States +Office of the Dalai Lama, India +Pakistan Mission to The United Nations +US, JP +Permanent Delegation of Cyprus to the European Union +Permanent Mission of Cuba to the United Nations +PetroVietnam +Prime Minister +s Office, Laos +Public Service Division, Solomon Islands +Russian Federal University Network, Russian Federation +Software Technology Parks of India, India +South Asian Association for Regional Cooperation +BD, US +Students for a Free Tibet, United States +TAITRA, Taiwan +TW, NG +JR02-2009 Tracking GhostNet - PART TWO +Table 2: Selected infections (cont +Organization +Confidence +Location +Infections +Taiwan Government Service Network, Taiwan +Tibetan Government in Exile, India +IN, US +Trade and Industry Department, Government of Hong Kong +Infection timeline +The earliest infected computer called home to the control server on May 22, 2007. The most recent +entry in our sample is March 12, 2009. On average, the amount of time that a host was actively +infected was 145 days.49 While 90 infected computers were only infected for one day, 145 were +infected for over 400 days. The longest infection span was 660 days. In total, 422 hosts checked in +March 1-12, 2009; 373 of these computers were infected in 2008. The data indicates that despite a +reduction in new infections, the network continues to be operational. (See Fig. 13 - p. 45) +There are significant spikes in infection rates in December 2007 and August 2008. +There were 320 infections in December 2007 spread across 56 countries. However, 113 were located +within Taiwan and the majority of these infections occurred within a single organization: the +Taiwan External Trade Development Council. During this same period, computers at the Embassies +of India in Belgium and Zimbabwe were infected as were the Embassies of Indonesia and the +Republic of Korea in the People +s Republic of China. In addition, computers at the Ministry of +Foreign Affairs in Iran were infected as were several computers at the Tibetan Government-in-Exile. +The spike in August 2008 totalled 258 infections spread across 46 countries. The OHHDL computer +was infected during one of these spikes in August 2008 (It last checked in to the control server +in September 2008). This spike included the Chinese Embassy in the United States,50 3 computers +at the Embassy of India in the Unites States, and the High Commission of India in the United +Kingdom and in Cyprus. It also included the Embassy of Cyprus in Germany, the Embassy of +Malaysia in Cuba, the Embassy of Thailand in the Philippines and the Ministry of Industry in +Vietnam. Several companies were also compromised, including Net Trade in Taiwan, the New York +Office of Deloitte & Touche, and PetroVietnam, the government-owned oil and gas Company. +The average number of days from the initial infection to the last time an infected computer +checked in + with a control server. +It is unclear whether the affected embassy is the Republic of China (Taiwan) or People +s Republic of China. +JR02-2009 Tracking GhostNet - PART TWO +Fig. 13 +GhostNet infection timeline. +This screen capture of a timeline generated with Palantir illustrates when and how many computers were infected by the GhostNet. +It shows that there are significant spikes in infection rates in December 2007 and August 2008. +PART THREE: +Investigating GhostNet: Conclusions +JR02-2009 Tracking GhostNet - PART THREE +The evidence presented in this report +through a combination of field investigations, +interviews, technical scouting, data analysis, mining and visualization +paints a +disturbing picture. +GhostNet represents a network of compromised computers resident in high-value political, +economic, and media locations spread across numerous countries worldwide. At the time of writing, +these organizations are almost certainly oblivious to the compromised situation in which they find +themselves. The computers of diplomats, military attach +s, private assistants, secretaries to Prime +Ministers, journalists and others are under the concealed control of unknown assailant(s). +In Dharamsala and elsewhere, we have witnessed machines being profiled and sensitive documents +being removed. At our Laboratory, we have analysed our own infected +honey pot + computer +and discovered that the capabilities of GhostNet are potent and wide ranging. Almost certainly, +documents are being removed without the targets + knowledge, keystrokes logged, web cameras are +being silently triggered, and audio inputs surreptitiously activated. +This raises the question, how many sensitive activities have been preemptively anticipated by +intelligence gathered through this network? How many illegal transactions have been facilitated by +information harvested through GhostNet? Worst of all, how many people may have been put at risk? +While these questions are compelling, it would be imprudent to read these findings as an indictment, +or to attribute to the owners of GhostNet motivations and intentions for which there is no evidence. +Alternative explanations +The list of computers controlled by the GhostNet is significant, and certainly atypical for a cybercrime +network. The size of the network is small, and the concentration of high-value systems is significant. +At the same time, penetrations of this type are not uncommon. Recently, several large-scale spy +nets have been discovered, including ones containing lists of affected computers of a magnitude +higher than that harvested by GhostNet. +This trend is predictable, converging with accumulating incidents of cyber-attacks facilitated by +lower entry-thresholds for computer exploitation methods and technologies. The tools we profile in +our investigation, though apparently amassed in a complex way to achieve a definite purpose, are +not restricted to an exclusive guild of experts with specialized and confidential knowledge. +Today, pirated cyber-crime kits circulate extensively on the Internet and can be downloaded by +anyone about as easily as the latest pirated DVD.51 Cyberspace has empowered individuals and small +groups of non-state actors to do many things, including executing sophisticated computer network +operations that were previously only the domain of state intelligence agencies. We have entered +the era of do-it-yourself (DIY) signals intelligence. +http://ddanchev.blogspot.com/2008/11/zeus-crimeware-kit-gets-carding-layout.html +JR02-2009 Tracking GhostNet - PART THREE +Attribution +Who is ultimately in control of the GhostNet system? While our analysis reveals that numerous +politically sensitive and high-value computer systems were compromised, we do not know the +motivation or the identity of the attacker(s) or how to accurately characterize this network of +infections as a whole. We have not been able to ascertain the type of data that has been obtained +by the attacker(s), apart from the basic system information and file listings of the documents +located on the target computers. Without this data we are unable to deduce with any certainty +what kind of data the attacker(s) were after. There are thus several possibilities for attribution. +The most obvious explanation, and certainly the one in which the circumstantial evidence tilts the +strongest, would be that this set of high profile targets has been exploited by the Chinese state for +military and strategic-intelligence purposes. Indeed, as described above, many of the high confidence, +high-value targets that we identified are clearly linked to Chinese foreign and defence policy, +particularly in South and South East Asia. Like radar sweeping around the southern border of China, +there is an arc of infected nodes from India, Bhutan, Bangladesh and Vietnam, through Laos, Brunei, +Philippines, Hong Kong, and Taiwan. Many of the high profile targets reflect some of China +s most +vexing foreign and security policy issues, including Tibet and Taiwan. Moreover, the attacker(s) +addresses examined here trace back in at least several instances to Hainan Island, home of the Lingshui +signals intelligence facility and the Third Technical Department of the People +s Liberation Army.52 +However, we must be cautious to rush to judgement in spite of circumstantial and other evidence, +as alternative explanations are certainly possible and charges against a government of this nature +are gravely serious. On the other end of the spectrum is the explanation that this is a random set +of infected computers that just happens to include high profile targets of strategic significance +to China, collected by an individual or group with no political agenda per se. Similarly one can +postulate that the targets gathered together happened less by concerted effort than by sheer +coincidence. Given the groupings of various entities in the infected computer list (by country +and organization), internal email communications and sloppy security practices could have led to +cross-infection and subsequent listing on the control servers. +Another possible explanation is that there is a single individual or set of individuals (criminal networks, +for example) who are targeting these high-value targets for profit. This can be in the form of stealing +financial information or critical data that can be sold to clients, be they states or private entities. There +are countless examples of large-scale fraud and data theft worldwide and numerous apparent instances +of outsourcing to third parties of cyber-attacks and espionage, some of which the Information Warfare +Monitor and its related research project, the OpenNet Initiative, have documented. GhostNet could very +well be a for-profit, non-state venture. Even +patriotic hackers + could be acting on their own volition, +or with the tacit approval of their government, as operators of the GhostNet. +Finally, it is not inconceivable that this network of infected computers could have been targeted +by a state other than China, but operated physically within China (and at least one node in +http://www.globalsecurity.org/military/world/china/lingshui.htm +JR02-2009 Tracking GhostNet - PART THREE +the United States) for strategic purposes. Compromised proxy computers on Hainan Island, for +example, could have been deployed as staging posts, perhaps in an effort to deliberately mislead +observers as to the true operator(s) and purpose of the GhostNet system. +The Significance of GhostNet +GhostNet is significant, as it does not appear to be a typical cybercrime network. The potential +political fallout is enormous. But ultimately, the question of who is behind the GhostNet may +matter less than the strategic significance of the collection of affected targets. What this study +discovered is serious evidence that information security is an item requiring urgent attention at +the highest levels. It demonstrates that the subterranean layers of cyberspace, about which most +users are unaware, are domains of active reconnaissance, surveillance, and exploitation. +Regardless of who or what is ultimately in control of GhostNet, its capabilities of exploitation and +the strategic intelligence that can be harvested from it matter most. Indeed, although the Achilles +heel of the GhostNet system allowed us to monitor and document its far-reaching network of +infiltration, we can safely hypothesize that it is neither the first nor the only one of its kind. +PART FOUR: +About Information Warfare Monitor +About the Information Warfare Monitor +http://infowar-monitor.net/ +The Information Warfare Monitor is an advanced research activity tracking the emergence of cyberspace +as a strategic domain. We are an independent research effort. Our mission is to build and broaden the +evidence base available to scholars, policymakers, and others. We aim to educate and inform. +The Information Warfare Monitor is a public-private venture between two Canadian institutions: The +SecDev Group, an operational think tank based in Ottawa (Canada), and the Citizen Lab at the Munk +Centre for International Studies, University of Toronto. The Principal Investigators and +co-founders of the Information Warfare Monitor are Rafal Rohozinski (The SecDev Group) and +Ronald Deibert (Citizen Lab). +The Information Warfare Monitor is supported by The SecDev Group which conducts field-based +investigations and data gathering. Our advanced research and analysis facilities are located at the +Citizen Lab. IWM is part of the Citizen Lab +s network of advanced research projects, which include the +OpenNet Initiative and ONI Asia. +The Information Warfare Monitor also benefits from donations from a variety of sponsors including +Psiphon Inc, and Palantir Technologies. +The Information Warfare Monitor engages in three primary activities: +1. Case Studies. We design and carry out active case study research. These are self-generated +activities consistent with our mission. +We employ a rigorous and multidisciplinary approach to all our case studies blending qualitative, technical, +and quantitative methods. As a general rule, our investigations consist of at least two components: +Field-based investigations. We engage in qualitative research among affected +target audiences and employ techniques that include interviews, long-term in situ +interaction with our partners, and extensive technical data collection involving +system monitoring, network reconnaissance, and interrogation. Our field-based teams +are supported by senior analysts and regional specialists, including social scientists, +computer security professionals, policy experts, and linguists, who provide additional +contextual support and substantive back-up. +Technical scouting and laboratory analysis. Data collected in the field is rigorously +analysed using a variety of advanced data fusion and visualization methods. Leads +developed on the basis of infield activities are pursued through +technical scouting, +including computer network investigations, and the resulting data and analysis +is shared with our infield teams and partners for verification and for generating +additional entry points for follow-on investigations. +2. Open Source Trend Analysis. We collect open-source information from the press and other +sources tracking global trends in cyberspace. These are published on our public website. +3. Analytical Workshops and Outreach. We work closely with academia, human rights +organizations, and the defense and intelligence community. We publish reports, and occasionally +conduct joint workshops. Our work is independent, and not subject to government classification. Our +goal is to encourage vigorous debate around critical policy issues. This includes engaging in ethical +and legal considerations of information operations, computer network attacks, and computer network +exploitation, including the targeted use of Trojans and malware, denial of service attacks, and +content filtering. +About The SecDev Group +http://www.secdev.ca +The SecDev Group is a Canadian-based operational consultancy focused on countries and regions at +risk from violence and insecurity. We deliver to our clients insights and access to a diverse range +of cultures, audiences, challenging environments and ungoverned spaces. Our approach combines +a field research capability with advanced techniques and methods for generating policy-relevant +analysis and solutions. As a think tank, we identify and communicate realistic options to enhance +effectiveness through evidence-based research on the causes, consequences and trajectories of +insecurity and violence. We are operational because we design and conduct activities in complex and +insecure environments. +About The Citizen Lab +http://www.citzenlab.org +The Citizen Lab is an interdisciplinary laboratory based at the Munk Centre for International Studies at +the University of Toronto, Canada focusing on advanced research and development at the intersection +of digital media and world politics. We are a hothouse that combines the disciplines of political +science, sociology, computer science, engineering, and graphic design. Our mission is to undertake +advanced research and engage in development that monitors, analyses, and impacts the exercise of +political power in cyberspace. The Citizen Lab +s ongoing research network includes the Information +Warfare Monitor and the OpenNet Initiative, ONI Asia, and benefits from collaborative partnerships +with academic institutions, NGOs, and other partners in all regions of the world.