text
stringlengths 4
429
|
---|
with one, www.assam2008.net, which we believe to be yet another separate, but possibly affiliated, network.
|
www.assam2008.net
|
www.msnxy.net
|
www.sysroots.net
|
www.womanld.com
|
www.womannana.com
|
www.lookbyturns.com
|
www.macfeeresponse.com
|
www.macfeeresponse.org
|
We were able to observe the file paths associated with malware that were requested by compromised computers. In total, we found that during this period 6,902 unique IPs requested paths associated with the malware
|
that used these hosts as command and control servers. However, counting the number of infected hosts purely
|
by IP addresses is problematic. In fact, botnets are generally much smaller than the total sum of unique IP
|
addresses would suggest (Stone-Gross et al. 2009; Rajab et al. 2007). This network, which is focused on stealing
|
documents from specific targets, is expected to be small in size.
|
Figure 5:
|
Relationship between the DNS Sinkhole and Live Command and Control Servers
|
This Palantir screen shot captures the relationship between the domain names in our sinkhole (green), the web servers they were formerly hosted on (red) and
|
the Shadow network
|
s active domain names (blue).
|
JR03-2010 Shadows in the Cloud - PART 4: TARGETS & EFFECTS
|
What is more notable is the distribution of compromised computers across countries.
|
Figure 6:
|
Locations of Compromised Computers in our Sinkhole
|
From the recovered IP addresses we were able to identify the following entities of interest:
|
Honeywell, United States
|
New York University, United States
|
University of Western Ontario, Canada
|
High Commission of India, United Kingdom
|
Vytautas Magnus University, Lithuania
|
Kaunas University of Technology, Lithuania
|
National Informatics Centre, India
|
New Delhi Railway station (*railnet.gov.in), India
|
Times of India, India
|
Petro IT, (reserved123.petroitg.com), India
|
Federation of Indian Chambers of Commerce and Industry, India
|
Commission for Science and Technology for Sustainable Development in the South, Pakistan
|
JR03-2010 Shadows in the Cloud - PART 4: TARGETS & EFFECTS
|
Victim Analysis on the Basis of
|
Recovered Documents
|
In total we recovered data from 44 compromised computers. The documents recovered from the OHHDL were
|
reconstructed from captured network traffic, while the remainder were retrieved from an open directory on
|
one command and control server. Only seven of the remaining 43 compromised computers (not counting the
|
OHHDL computer) for which we were able to recover exfiltrated data also checked in with the same control
|
server. Therefore we can only identify the IP addresses of these seven computers. Five of these seven computers
|
have IP addresses that are assigned to India, while the remaining two are assigned to Thailand and the PRC. As
|
noted below, the Chinese IP address represents the attacks on IP addresses along with two test (junk) text files
|
that appear to have been used for testing the malware.
|
We determined the country and entity from which the documents were exfiltrated based on the content of the
|
documents themselves in cases where we did not obtain an IP address. In addition, we assigned two country
|
codes to the compromised computers: one country code indicates the physical (IP) country in which the computer is located, and the second country code indicates the country of ownership. Thus a compromised computer at a foreign embassy would be assigned a country code based on its geographical region, and a second
|
based on the home country to which the foreign mission belongs.
|
Based on geographic location, the vast majority are in India.
|
Figure 7:
|
Locations of Compromised Computers from which Documents were Exfiltrated
|
JR03-2010 Shadows in the Cloud - PART 4: TARGETS & EFFECTS
|
Based on the country of ownership, the results show an even higher number for India.
|
Figure 8:
|
Locations of Ownership of Exfiltrated Documents
|
JR03-2010 Shadows in the Cloud - PART 4: TARGETS & EFFECTS
|
Geographic Victim Distribution
|
Figure 9:
|
Geographic distribution of compromised hosts
|
This screen capture of Palantir
|
s heatmap application demonstrates the concentrations of (non-unique) IP addresses of compromised hosts. The largest
|
concentration (red) is in India.
|
4.3.1 Targets
|
Diplomatic Missions and Government Entities
|
Diplomatic missions and government entities exchange sensitive information, which sometimes finds its
|
way onto unclassified systems. During our investigation, we recovered documents that are extremely sensitive from a national security perspective as well as documents that contain sensitive information that could
|
be exploited by an adversary for intelligence purposes. We recovered one document that appears to be an
|
encrypted diplomatic correspondence, two documents classified as
|
SECRET
|
, six as
|
RESTRICTED
|
, and five
|
CONFIDENTIAL
|
. These documents contain sensitive information taken from a member of the National
|
Security Council Secretariat concerning secret assessments of India
|
s security situation in the states of Assam,
|
Manipur, Nagaland and Tripura, as well as concerning the Naxalites and Maoists. In addition, they contain
|
confidential information taken from Indian embassies regarding India
|
s international relations with and assessments of activities in West Africa, Russia/Commonwealth of Independent States and the Middle East, as well as
|
visa applications, passport office circulars and diplomatic correspondence. The attackers also exfiltrated detailed
|
JR03-2010 Shadows in the Cloud - PART 4: TARGETS & EFFECTS
|
personal information regarding a member of the Directorate General of Military Intelligence. These compromises
|
and the character of the data exfiltrated extends to non-governmental targets as well. Some of the academics
|
and journalists that were compromised were interested in and regularly reporting on sensitive topics such as
|
Jammu and Kashmir.
|
National Security and Defence
|
During our investigations we suspected that a variety of military computers had been compromised as well as
|
the computers of defence-oriented academics and journals. While none of the information obtained was classified, the documents we recovered reveal information regarding sensitive topics. Although there is public information available on these miltary projects, it indicates that the attackers managed to compromise the right set
|
of individuals that may have knowledge of these systems that is not publicly known. We recovered documents
|
and presentations relating to the following projects:
|
Pechora Missile System - an anti-aircraft surface-to-air missile system.
|
Iron Dome Missile System - a mobile missile defence system (Ratzlav-Katz 2010).
|
Project Shakti - an artillery combat command and control system (Frontier India 2009).
|
We also found that documents relating to network centricity (SP
|
s Land Forces 2008) and network-centric
|
warfare had been exfiltrated, along with documents detailing plans for intelligence fusion and technologies for
|
monitoring and analysing network data (Defence Research and Development Organisation 2009).
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.