text
stringlengths 4
429
|
---|
All of these issues were grappled with in the aftermath of the Tracking GhostNet report, and throughout the
|
course of the Shadow investigation. Our experiences in the aftermath of GhostNet, where notification was left
|
incomplete, prompted a more deliberate and self-conscious approach with the Shadow investigation. We were
|
also fortunate to have within our collaboration the experiences of the Shadowserver Foundation, whose counsel
|
on notification helped in making decisions about timing and contacts.
|
By the end of November 2009, we were confident in our access to the basic command and control infrastructure
|
and identification of some of the key documents at hand. Upon the realization that some information about
|
individual Canadians was compromised, we notified Canadian authorities in December 2009 about the investigation, the compromise of Canadian-related information, and requested assistance on outreach with one of the
|
victims, namely the Indian government. At the same time, we independently explored whom we might contact
|
in the Indian government, including making inquiries with Canada
|
s Department of Foreign Affairs. By February
|
2010, we were able to find on our own what we thought was an appropriate contact in the Indian government, and
|
gave a detailed notification to the National Technology Research Organization. Our notification for takedown of
|
the command and control infrastructure came later in the investigation, after we had collected and analyzed all
|
of the information related to this report, but prior to its release.
|
Our experiences illustrate the intricate, nuanced and often confusing landscape of global cyber security notification practices. The notification process will continue after the publication of this report.
|
PART 6:
|
Conclusions
|
JR03-2010 Shadows in the Cloud - PART 6: CONCLUSIONS
|
Shadows in the Cloud points to a disturbing complex ecosystem of malware. Although malware networks,
|
cyber crime and espionage have been around for years, the evidence presented here shows how these networks
|
can be aggressively adaptive systems, multipying and regenerating across multiple vectors and platforms, and
|
exploting the vulnerabilties within the latest Web 2.0 technologies to expand their reach and impact. Although
|
there is rich detail to what is uncovered in the Shadow investigation, so much of the origins, architecture and
|
aims of these networks ultimately remain a mystery and await further investigation and analysis. However, even
|
with the partial insights and fleeting glimpses acquired here, we can draw some conclusions and implications
|
for further research, policy and operations.
|
First, the research here shows, as with Tracking GhostNet, how even a relatively small research sample
|
this case Tibetan organizations
|
can expand, upon investigation and analysis, into an astonishingly large pool
|
of victims. The connections drawn out here beg the question of what would emerge if the research began with a
|
different group, from a different region of the world, with a different target set of compromised actors? Clearly,
|
an area of methodological advantage for both the Tracking GhostNet and the Shadows in the Cloud investigations was to have access in the field to compromised computers and be able to work outwards in a structured
|
and systematic fashion, using a combination of technical investigations and data analysis. An area of further
|
research is to extend such efforts to other locations in other regions of the world. Such investigations may reveal
|
other malware networks, or entirely new and unanticipated modes of crime and espionage.
|
Second, Shadows in the Cloud underscores the extent to which the global networked society into which we
|
have evolved socially, politically, economically, and militarily carries with it an underground ecoystem that is
|
equally networked, though far less visible to those whom it compromises. Governments, organizations and
|
other actors around the world have been quick to adopt computerized public and administration systems,
|
including state security actors. Their investments into these technologies have developed at a much faster rate
|
than the appropriate security policies and practices (Deibert and Rohozinski 2010).
|
Although the Government of India was the most victimized according to what we uncovered in Shadows in the
|
Cloud
|
and that certainly should yield a major consideration of public policy and security for that country
|
observations about India in this respect need to be qualified in at least two ways. First, Shadows in the Cloud
|
reports only on observations and existing evidence, which by definition remain partial. There could be other
|
countries victimized, involving these very same malware networks attackers, but of which we are unaware
|
because of our limited samples. Second, and most importantly, there are numerous other countries and international organizations that are targeted here, perhaps not to the same extent, but targeted and infiltrated nonetheless. We can only infer what type of data was exfiltrated from these other actors that is of strategic value.
|
Overall, however, the key point to draw is that networked societies can be compromised through networks in
|
which they are invariably linked and mutually dependent.
|
Third, and related, Shadows in the Cloud demonstrates clearly the potential for collateral compromise, one
|
of the key hypotheses informing our research framework. This investigation indicates that data leakage from
|
malware networks can compromise unwitting third parties who are not initially targeted by the attackers. Data
|
contained on compromised machines can also contain valuable information on third parties that while on
|
its own may not be significant, but when pieced together with other information can provide actionable and
|
operational intelligence. The policy and operational implications of collateral compromise are serious and wideranging, and reinforce that security is only as strong as the weakest link in a chain. In today
|
s networked world,
|
such chains are complex, overlapping and dispersed across numerous technological platforms crossing multiple
|
JR03-2010 Shadows in the Cloud - PART 6: CONCLUSIONS
|
national jurisdictions. Paying attention to domestic cyber security is therefore only a partial solution to a much
|
wider problem. Today, no country or organization is a secure island in the global sea of information.
|
Fourth, another implication raised by Shadows in the Cloud is for criminal networks to be repurposed for political
|
espionage as part of an evolution in signals intelligence. Although our conclusions are necessarily circumscribed
|
by our lack of complete information in this respect, we may be seeing a blurring of the lines in malware genotypes among crimeware and more politically-motivated attacks. Part of that blurring may be deliberate on the
|
part of actors wishing to obscure attribution, but part of it may also be a newly emerging and largely organic
|
market for espionage products that was either contained or nonexistent in the past, and which now supplements the market for industrial espionage. This market may present opportunities for actors that, in turn, produce a refinement in their approach or methodology. Criminal actors may troll for targets widely as a first cut,
|
triaging among the available sources of information to zero-in on those that yield commercial value on both the
|
industrial and political espionage markets. Such a development would pose major policy and operational issues,
|
and accelerate existing trends down the road of cyber privateering.
|
Finally, a major implication of the findings of Shadows in the Cloud relates to the evolution towards cloud
|
computing, social networking and peer-to-peer networking technologies that characterize much of the global
|
networked society today. These new modes of information storage and communication carry with them many
|
conveniences and so now are fully integrated into personal life, business, government and social organization.
|
But as shown in the Shadow investigation, these new platforms are also being used as vectors of malware
|
propagation and command and control (Office of Privacy Commissioner of Canada 2010).
|
It is often said that dark clouds carry with them silver linings, but in this case the clouds contain within them
|
a dark hidden core. As we document above, blog hosting sites, social networking forums and mail groups were
|
turned into support structures and command and control systems for a malignant enterprise. The very same
|
characteristics of those social networking and cloud platforms which make them so attractive to the legitimate
|
user
|
reliability, distribution, redundancy and so forth
|
were what attracted our attackers to them in setting
|
up their network. Clouds provide criminals and espionage networks with convenient cover, tiered defences,
|
redundancy, cheap hosting and conveniently distributed command and control architectures. They also provide
|
a stealthy and very powerful mode of infiltrating targets who have become accustomed to clicking on links and
|
opening PDFs and other documents as naturally as opening an office door. What is required now is a much
|
greater reflection on what it will take, in terms of personal computing, corporate responsibility and government
|
policy, to acculturate a greater sensibility around cloud security.
|
JR03-2010 Shadows in the Cloud - BIBLIOGRAPHY & SUGGESTED READINGS
|
Bibliography
|
Adair, Steven. January 19, 2010.
|
Cyber Espionage: Death by 1000 Cuts,
|
Shadowserver Foundation,
|
http://www.shadowserver.org/wiki/pmwiki.php/Calendar/20100119 (accessed April 1, 2010).
|
Bakken, B
|
rge, ed. 2005. Crime, Punishment, and Policing in China. Lanham, MD: Rowman & Littlefield.
|
Bejtlich, Richard. January 22, 2010.
|
Attribution Using 20 Characteristics,
|
TaoSecurity,
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.