text
stringlengths 4
429
|
---|
of those who have been compromised. And finally still others may have the necessary geopolitical knowledge to
|
interpret the attacks within a broader context.
|
Often, investigations do not have the luxury of such a full data set and must rely on incomplete information and
|
partial observations. Further complicating matters is that any of this information is often dependent on mistakes
|
made by the attackers, which typically lead to slices of an overall network instead of a comprehensive view.
|
Any questions concerning attribution must therefore always be set against a context of a complete consideration
|
of alternative explanations and qualified observations.
|
PART 2:
|
Methodology and
|
Investigative Techniques
|
JR03-2010 Shadows in the Cloud - PART 2: METHODOLOGY & INVESTIGATIVE TECHNIQUES
|
Methodology
|
The core of the methodology employed in the Shadows in the Cloud investigation rests at the nexus of technical
|
interrogation, field investigation, data analysis, and geopolitical, contextual research (See Box 2, page 3). No one
|
method alone is capable of providing a comprehensive understanding of malware networks; it is through their
|
combination that a complete picture is derived. For example, a technical analysis of exploits and malware used
|
by attackers alone can provide a great deal of insight into capabilities and targets. The command and control
|
servers used by the malware can be enumerated, and can sometimes reveal additional information that can be
|
used to identify those who have been compromised and data that may have been exfiltrated from these targets.
|
However, the technical analysis of exploits and malware samples alone only provides one crucial data set.
|
Field research is a critical, although sometimes neglected, component of malware research. While much of the
|
emphasis in existing malware research is focused on technical analysis of malware samples, this purely technical approach is unlikely to yield a complete picture. For example, through field research we have found compromised computers checking in with command and control servers that we have not seen in malware samples
|
distributed by the attackers. There is some evidence to suggest that attackers may migrate compromised hosts
|
to new command and control servers and/or command compromised computers to install new malware that is
|
not publicly disseminated through spear phishing and other targeted malware attacks. The field research component can thus provide an equally important insight into the attackers
|
capabilities once the target
|
s network
|
is compromised, as well as updated command and control locations. Moreover, it allows for the investigation
|
of the context surrounding the the target and why the victims may have been targeted in the first place. Finally,
|
the wider geopolitical considerations, derived from both field investigations and contextual research, place the
|
collection of information in a broader context that supplies details around issues such as the timing of the attacks, the nature of the exploitation, including the use of any social engineering techniques, and potentially the
|
identity and motivation of the attackers.
|
We present our methodology in the following sequence
|
field investigation first, followed by technical investigations. However, in practice the two are iterative processes. In some circumstances, field investigations begin
|
first, followed by technical investigations, while in other cases the opposite is true. In this case, a technicalbased investigative technique (sinkhole analysis) is probably the closest to an actual starting point, although
|
even that method was informed by prior knowledge derived from field and contextual research reaching back
|
to the Tracking GhostNet report. In almost all circumstances, geopolitical and contextual research informs both
|
the technical and field research components. In practice, therefore, fusion methodology is a holistic, non-linear
|
approach, but one that takes place in a very structured and focused fashion.
|
Field Investigation
|
Our objective is to ultimately understand the capabilities and motivations of those engaged in targeted malware
|
attacks. Field research provides critical insight into the methods and operations of the attackers. By analyzing
|
computers at locations that are routinely targeted by (similar) attackers, we aim to identify portions of command and control infrastructure that the attackers use for particular targets as well as document the type of
|
data that the attackers exfiltrate from the targets. However, our research aims to be more than just extracting
|
information from those who have been compromised.
|
JR03-2010 Shadows in the Cloud - PART 2: METHODOLOGY & INVESTIGATIVE TECHNIQUES
|
The Tracking GhostNet investigation revealed significant compromises at Tibetan-exile and Indian targets. It
|
was also found that Indian government related entities, both in India proper and throughout the world, had
|
been thoroughly compromised. These included computers at Indian embassies in Belgium, Serbia, Germany,
|
Italy, Kuwait, the United States, Zimbabwe, and the High Commissions of India in Cyprus and the United
|
Kingdom. During the GhostNet investigation we had discovered evidence of multiple infections for which the
|
information available was incomplete, and to which we wanted to return for follow up. In particular, we found
|
one piece of malware uploading sensitive documents. Another report published soon after Tracking GhostNet,
|
entitled
|
The Gh0st in the Shell: Network Security in the Himalayas,
|
analysed the network traffic of Air Jaldi,
|
a community WiFi network in Dharamsala, India. It found that computers in Dharamsala were connecting with
|
two of the control servers documented in our report (Vallentin et al. 2009).
|
With the aim of focusing on both these wider pattern of compromises, and the hanging threads from the previous investigation, we worked with our existing approach, informed by the view that collecting data as close
|
to the intended target as possible was likely to yield actionable evidence of breaches that could be followed
|
through to their source, lead to wider pools of target sets, and yield information on the attackers.
|
In conducting the field research we were influenced by the Action Research (AR) literature (Lewin 1946; Curle
|
1947) that has evolved since the 1940s, as well as other field-based investigation and research techniques. The
|
AR field-based approach feeds into the fusion methodology that guides our overall investigatory process. It
|
employs ethical and participatory observations and structured focused interviews. We combined this grounded
|
research with technical interrogation, including network monitoring activities. As with GhostNet, we were
|
fortunate to have the cooperation of Tibetan organizations, and benefited tremendously from the willingness of
|
His Holiness the Dalai Lama and other Tibetans to share information with our investigators. As a result, for the
|
Shadow investigation we conducted primary field research in Dharamsala, India from August until December
|
2009. (Dharamsala is the location of the OHHDL as well as the TGIE).
|
The primary objectives of the field investigations were to research the wider patterns of compromised Indian
|
and Tibetan related targets, investigate the reports of targeted malware attacks that have emerged from the
|
Tibetan community, and raise information and computer security awareness within the Tibetan community
|
and assist in their security planning and implementation. Throughout the field investigation process, we also
|
investigated the broader social, political, military, and intelligence context. We conducted extensive on-site
|
interviews with officials in the Tibetan Government-in-Exile, the Office of the Dalai Lama and Tibetan NGOs.
|
These interviews allowed us to gain an understanding of the security practices and network infrastructure of
|
compromised locations. We also used network monitoring software during field investigations in order to collect
|
technical data from compromised computer systems and perform an initial analysis to confirm the existence
|
of malware and the transfer of information between compromised computers and command and control servers. The network monitoring tools allowed us to collect samples from compromised computers and identify
|
command and control servers used by the attackers. The network monitoring was undertaken with the explicit
|
consent of the Tibetan organizations.
|
While monitoring the network traffic of a local NGO, Common Ground, as part of an Internet security audit,
|
traffic from a local WiFi mesh network, TennorNet was also captured, revealing malicious activity. An anomaly
|
was detected when analyzing this traffic: computers in Dharamsala were beaconing or checking in with a command and control server (jdusnemsaz.com/119.84.4.43) located in Chongqing, PRC. The location of Chongqing
|
is contextually interesting as it has a high concentration of Triads
|
well known Asian-based organized criminal networks
|
who have significant connections to the Chinese government and the Chinese Communist Party
|
(Lam 2009). The Triads have extended their traditional criminal activities to include technology-enabled crime
|
JR03-2010 Shadows in the Cloud - PART 2: METHODOLOGY & INVESTIGATIVE TECHNIQUES
|
such as
|
computer software piracy and credit card forgery and fraud
|
(Choo 2008).
|
An investigation revealed that the computer on TennorNet generating the malicious traffic belonged to Mr. Serta
|
Tsultrim, a Tibetan Member of Parliament, editor of of the weekly Tibetan language newspaper Tibet Express
|
and the director of the Khawa Karpo Tibet Culture Centre. Tsultrim is also the coordinator of the Association of
|
Tibetan Journalists (ATJ). We probed for his threat perception, and who he felt might be targeting him and why.
|
We sought to establish his perception of what documents and correspondence might be particularly sensitive.
|
Tsultrim was particularly concerned about this network being compromised.
|
Following the discovery of this compromise, we approached the OHHDL and formally requested permission
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.