text
stringlengths 4
429
|
---|
possibility of a perfect storm that may result from a lack of international consensus, ill-developed and implemented security practices, a paucity of notification mechanisms, and the growing confluence of cyber crime,
|
traditional espionage, and the militarization of cyberspace.
|
About the Shadows in the Cloud Investigation:
|
Beyond GhostNet
|
The Tracking GhostNet report revealed a small piece of the underground cyber espionage world. After the
|
report was published, several of the command and control servers listed in the report and part of the network
|
went offline. However, targeted cyber attacks against Tibetan interests and various governments did not suddenly cease. The Shadowserver Foundation had also been looking into several similar cyber attacks both prior
|
to and after the GhostNet report was published. Approximately six months after the report
|
s publication, the
|
Shadowserver Foundation and the Information Warfare Monitor began a collaborative effort to further investigate new and related attacks, as well as any remaining parts of GhostNet.
|
Shadows in the Cloud thus departs from Tracking GhostNet in several ways. Research on cyber security is
|
rapidly developing, and several groups with widely differing skill sets and experience are working on related areas.
|
Information sharing, generally speaking, is immature and underdeveloped, often hampered by proprietary
|
concerns surrounding the commercial market for cyber security services. Progress on research in this area will
|
only stand to benefit from greater dialogue and information sharing among security researchers. Shadows in the
|
Cloud was thus undertaken jointly by the Information Warfare Monitor, which itself is a collaborative engagement between a public and private institution, and the Shadowserver Foundation, which is an all-volunteer
|
watchdog group of security professionals who gather, track and report on malware, botnet activity, and electronic fraud. The Information Warfare Monitor and the Shadowserver Foundation have several complementary
|
resources and data sets. Combining efforts in this way contributed to a much greater pool of knowledge and
|
expertise from which to draw strategic choices along each step of the investigation, and for overall analysis.
|
Lastly, the information sharing that went into Shadows in the Cloud extended to the Office of His Holiness the
|
Dalai Lama (OHHDL), the Tibetan Government in Exile (TGIE) and Tibetan non-governmental organizations.
|
Information sharing among victims of network intrusions and espionage is rare. The Tibetan organizations were
|
willing to provide access and share information with our investigation that proved to be invaluable.
|
Shadows in the Cloud is also distinct from Tracking GhostNet in terms of the type of data unearthed during the
|
course of the investigation. With GhostNet, while we were able to monitor the exfiltration of sensitive documents
|
from computers to which we had field access, we were unable to otherwise determine which documents were
|
stolen from victims that we had identified, and thus could only infer intentionality on the part of the attackers. In
|
Shadows, we were able to recover a significant volume of stolen documents, some of which are highly sensitive,
|
from a drop zone connected to one of the malware networks under observation. Although not unprecedented
|
among cyber security research, access to stolen documents such as those which are analysed here offers a
|
unique but partial insight into the type of information that can be leaked out of compromised computers. It may
|
even help answer some lingering questions about the intentionality and attribution of the attackers, although
|
that is not clear by any means. We pick up both of these threads in detail in our report below.
|
JR03-2010 Shadows in the Cloud - PART 1: BACKGROUND & CONTEXT
|
Research Framework
|
Although the research that we engage in is investigatory, it is not simply a report of the facts per se. Our aim is
|
to engage the cyber security research community by building upon prior research in a structured, focused manner
|
through a systematic research framework. Several overarching research questions structure the Shadow investigation and our analysis. We outline these here, and pick up on them throughout our report.
|
Observation and Characterization of the Ecosystem of Malware
|
One of the aims of cyber security research is to observe and characterize the evolving nature and complex
|
ecosystem of today
|
s malware, botnets, cyber espionage and cyber crime networks. This is not a simple task,
|
as the ecosystem of malware is very much like a complex adaptive system, only one that is dispersed across
|
multiple ecosystems, operated by clandestine actors with potential criminal and/or espionage motivations who
|
have shown a propensity to adapt their techniques to new software tools, social networking platforms and other
|
technologies. Crimeware networks, which to some extent are the oldest and most widespread malware networks, target generalized population sets in a mostly undiscriminating fashion. Alongside crimeware networks,
|
however, there are other networks that are more discriminating, often characterized by the use of custom-made
|
software attacks, and which seek to exploit and infiltrate not random pools of victims but rather deliberately
|
selected targets. Within each of these two major types of malware networks are likely many sub-types, including networks that specialize in distributed denial of service (DDoS) attacks. Confusing matters further is that
|
toolkits and techniques used in one instance are borrowed from another, making classification difficult and
|
increasingly questionable. Being able to map the ecosystem of malware, however, is critical for research, policy
|
and operational matters, and so is one of the primary aims of our research in Shadows in the Cloud (Adair 2010).
|
From Criminal Exploitation to Political Espionage?
|
Cyber crime is as old as cyberspace itself, and criminal networks, as alluded to above, are longstanding characteristics of the dark side of the Internet. What is more novel is the use of criminal exploitation kits, techniques
|
and networks for purposes of political espionage (Villeneuve 2010). Debates about whether or not governments
|
are actively involved in cyber espionage and computer network exploitation, either through agencies they
|
control directly or through some kind of privateering, now dominate the headlines and have become part of a
|
growing politicization of the cyber security arena. One of the aims of our research is to discern to what extent
|
we can impute motivations behind the attacks we document, to help understand whether in fact the networks
|
under our observation are part of a criminal network, a political espionage network, an industrial espionage
|
network, an opportunistic network, or some combination of these. Such questions, it should be pointed out, are
|
entirely distinct (though not unrelated) to the question of attribution (i.e., who is responsible?).
|
We hypothesize that political espionage networks may be deliberately exploiting criminal kits, techniques and
|
networks both to distance themselves from attribution and strategically cultivate a climate of uncertainty. To
|
answer these questions requires a high degree of nuance, as the information we have been able to obtain is
|
incomplete, and so a great deal of our analysis rests on inferences made on the basis of multiple data sources
|
and our fusion methodology (See Box 2, page 3).
|
Collateral Compromise
|
Organizations from around the world have moved swiftly to adopt new information and communication
|
technologies, and have become part of electronically linked communities in the commercial, government, and
|
JR03-2010 Shadows in the Cloud - PART 1: BACKGROUND & CONTEXT
|
military sectors. They exchange information as a matter of routine, across social networking and cloud computing platforms, using flash drives and other portable devices, and thus become co-dependent on each others
|
information and computer and network security practices. The vulnerabilities of one actor can quickly and
|
unintentionally compromise unwitting third parties, which in turn can become the basis for actionable intelligence against those third parties. We hypothesize that there is a high probability for collateral compromise
|
in any malware network because of this mutual dependence. A key consideration, of course, is how to discern
|
intended from unintended victims, a problem that is difficult to solve.
|
Actionable Intelligence around Exfiltrated Data
|
Related to collateral compromise is the issue of the strategic value of exfiltrated data. Access to this data can
|
offer important clues about the motivation and attribution of the attackers. It can also provide insight about
|
the strategic value of the type of data that can be accessed through malware networks. In the course of our
|
investigation, we assumed that we would get, at best, only a partial picture of the exfiltrated data, but even that
|
partial picture would provide some potentially meaningful information for those who acquire it. While each individual data point may be of little value, when combined with other data acquired through other means (e.g.,
|
open source searching) a very detailed operational picture can be assembled. We try to assess and evaluate the
|
exfiltrated data we were able to access with these issues in mind.
|
Attribution
|
Examining attribution is an arduous but important component of any cyber security investigation and has
|
become a major political issue at the highest levels around several recent cyber attacks. In order to characterise
|
the attackers, a variety of technical indicators as well as behavioural indicators need to be analysed (Parker et
|
al. 2004; Parker et al. 2003). These characteristics are interpreted in the context of the nature of the targets and
|
the objective of the attack. The nature and timing of the attack, the exploit, the malware, and the command and
|
control infrastructure, are just some of the components that go into determining attribution. Knowing the methods and behaviour of the attackers as well as the character of the tools the attackers use once inside the target
|
network, the data that the attackers exfiltrate and where that data goes, are also crucial parts of the overall assessment (Bejtlich 2010; Cloppert 2009; Mandiant 2010).
|
Moreover, historical information and ongoing intelligence collection are crucial when trying to understand the
|
scope of the threat (Deloitte & Touche LLP, 2010). It is difficult to assess attribution when examining an isolated
|
attack; it is the broader patterns, connections and contextual information that inform the process. However, it is
|
uncommon to have a complete data set covering all aspects of the attackers
|
operations. Some may have access
|
to data regarding the attackers
|
activities once inside a particular network. Others may have extensive collections of malware samples and historical data on command and control infrastructure. Others may have information on how the attackers use various exploits, or craft targeted spear phishing emails and other methods focused
|
on compromising particular targets. Others may have data retrieved from the attackers that indicate the identity
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.