text
stringlengths 4
429
|
---|
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80 |
Copyright |
2008 Jason Fritz |
and widespread network intrusions suggest China is developing a cyber warfare capability. |
Cyber warfare fits with China |
s established patterns of asymmetry and technology transfer. |
In order to grasp why Beijing would pursue cyber warfare as a means of leapfrogging, it is |
essential to acknowledge the skills of hacking. Hackers utilize a wide range of tools with |
highly sophisticated techniques, the scope of which is beyond this article; however some |
basic understanding is necessary. Hacking is capable of causing massive damage with little |
funding, it is difficult to detect and defend against, it provides a high level of deniability, and |
it eliminates the problem of geographical distance. |
Security Hacking |
A common method used in cyber reconnaissance and attack is the security exploit. A |
security exploit is a prepared application that takes advantage of a known weakness. It is a |
piece of software, data, or commands that utilize a bug, glitch, or vulnerability to cause an |
unintended or unanticipated behaviour to occur on computer software, hardware, or |
electronic devices. This can allow the attacker to take control of the computer, permitting its |
use for other tactics, such as DDoS discussed below. An exploit may be used to gain lowlevel entrance to a computer, after which a hacker can search for further exploits to attain |
high-level access such as system administrator (root). This tactic is known as privilege |
escalation. Once exploit vulnerability has been identified by security experts, a patch will be |
issued. For this reason hackers try to keep known exploits secret. These are known as zero |
day exploits, and hackers may catalogue large numbers of them for their own use or to be |
sold on the black market (Hines 2008). In 2006, Taiwan was hit with |
13 PLA zero-day |
attacks |
, for which it took Microsoft 178 days to develop patches (Tkacik 2007). |
Vulnerability scanners may be used to identify exploits. One such scanner known as a port |
scanner automates the process of finding weaknesses of computers on a network. These |
check to see which ports on a specified computer are |
open |
, available to access, and |
sometimes will detect what program or service is listening on that port. Turning from |
reconnaissance to attack, once an open port is found, large quantities of data can be sent in an |
attempt to cause a buffer overflow. This can cause exposure of data, memory loss, and/or a |
crash within the compromised system. |
The primary means to identify computers used in cyber warfare is the IP address. An IP |
address is a numerical identification that network management assigns to devices |
participating in a computer network utilizing the Internet Protocol (TCP/IP) for |
communication between nodes. In essence, each computer has its own unique IP address. |
The Internet Corporation for Assigned Names and Numbers (ICANN) is responsible for |
global IP address allocation. ICANN, a non-profit organisation operating in the US, is under |
contract with US Department of Commerce and previously with US Department of Defense. |
Despite this identification tool, hackers can mask their identity by using proxy servers. |
Information is routed through multiple computers, only showing each computer |
s identity to |
the next in line. For example, a Chinese hacker could route his or her activity through a |
computer in Brazil, which routes its activity through Russia. The computer in Russia could |
be used to attack a computer in the US, and the US would see it as an attack from Russia. |
Perhaps through painstaking effort the American investigators can identify that the Russian |
computer was a proxy, but then they are led to Brazil. If they manage to go from Brazil to |
China, they are still unsure whether China was the originator or simply another link in the |
chain. Proxy servers can be rented or obtained through compromised systems. Additionally, |
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80 |
Copyright |
2008 Jason Fritz |
free software such as Tor (The Onion Router), encryption, tunnelling protocol, and wireless |
access points (hotspots) add additional anonymity. |
A spoofing attack is when a person or program fools another into thinking it is someone or |
something else. One example is the man-in-the-middle attack, in which person C gets person |
A to believe they are person B, and they get person B to believe they are person A, thus |
gaining access to information sent in both directions. This is accomplished by monitoring |
packets sent from A to B (often involving a packet sniffer), guessing their sequence and |
number, knocking them out with a SYN attack, and injecting packets from C. Firewalls may |
defend against these attacks, if they have been configured to only accept IP addresses from |
the intended correspondent. |
Webpage spoofing, known as phishing, imitates a webpage such as a bank |
s website. When |
the user enters their data, such as passwords and usernames, the fake website catalogues their |
information. Webpage spoofing is often used in conjunction with URL spoofing, using an |
exploit to display a false URL, and DNS cache poisoning to direct the user away from their |
intended site and then back again when the data has been collected. As a precaution some |
websites require a user to arrive at their login page from a specified referrer page, but these |
referrer pages may also be spoofed. During the 2008 Olympics net users in China received a |
high volume of email spam offering video highlights of the games. Clicking on the links |
brought users to spoofed CNN pages which asked them to download a codec to watch the |
videos; once installed the computer was compromised and become a part of the Rustock |
botnet, i.e. an automated |
robot |
running on the web to generate false headlines that entice |
people to load harmful code (Miller 2008; Hi-tech Thieves Target Olympics 2008). |
Spoofing may also be used defensively. For example, the Recording Industry Association of |
America (RIAA) has practised spoofing on peer to peer networks. The RIAA floods these |
communities with fake files of sought-after material. This deters down loaders by means of |
fear and by wasting their time and bandwidth. This could be employed in the same manner |
by militaries, or as a source of disinformation. A similar defensive tactic, known as a honey |
pot, lures criminals in by offering sought-after data or what appears to be a compromised |
network. The honey pot is designed to collect data on the intruder, while giving away |
nothing, or giving away something that is perceived as an acceptable loss to gain something |
greater in return. |
Attackers may also compromise a computer or network by using a Trojan horse, often known |
simply as a Trojan. A Trojan appears to perform a desirable function, while secretly |
performing malicious functions. Trojans can be used to gain remote access, destroy data, |
download data, serve as a proxy, falsify records, or shut down the target computer at will. |
The Pentagon, defence-related think tanks, and defence-related contractors were the target of |
a combined spoofing and Trojan attack in 2008. Trojans were hidden in email attachments |
designed to look as if they were sent from a reliable source. The Trojan was designed to bury |
itself into the system, covertly gather data, and send it to an internet address in China. Due to |
the ability of hackers to route their activity through foreign computers, security experts were |
unable to determine if China was the final destination, if it was an attempt at framing China, |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.