text
stringlengths 4
429
|
---|
or if it was a state-sponsored activity (Waterman 2008). |
This was not the first time US research facilities received spoofed emails with Trojans |
purportedly from China. In 2005 the Oak Ridge National Laboratory and Los Alamos |
National Laboratory became infected. No classified information was believed to have been |
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80 |
Copyright |
2008 Jason Fritz |
obtained; however personal information of visitors from the years 1990 to 2004 was |
compromised. This included names, date of birth, and social security numbers. These two |
research facilities were originally constructed for sensitive nuclear weapons research during |
WWII. Today they are used |
for research in numerous areas including national security, |
nanotechnology, advanced materials, and energy |
(Lasker 2005). In general, Cyber |
reconnaissance may be an attempt to attain victory conditions before battle. These intrusions, |
if undetected, allow intruders to identify vulnerabilities for future cyber attack. The cost of |
probing computer networks is low, given the lack of attribution, requiring as few as one |
hacker, and the ability to work from remote locations using off-the-shelf hardware. |
A rootkit is a toolkit hidden on a compromised computer. The rootkit can be a diverse set of |
programs, but invariably is designed to hide the fact that the computer has been compromised |
and defending itself once detected. These rootkits often hide themselves as seemingly |
innocuous drivers or kernel modules, depending on the details of the operating system and its |
mechanisms. In addition to covering the tracks of an intruder, they can allow easier access in |
the future by opening backdoors. They may also include an arsenal of sniffers, key loggers, |
and tools that relay email chat conversations. Rootkits may also serve as a staging ground for |
email spam distribution and DDoS attacks as a part of a larger botnet. In 2005, it was |
revealed that Sony BMG included rootkit software on their CDs. This software altered the |
Windows OS to allow access to the computer by anyone aware of the rootkits existence, |
presumably to enforce copyright protection. This example shows that corporations, too, can |
be a part of cyber attack or reconnaissance, furthering China |
s desire to create its own |
software and establish market dominance as opposed to being subjected to the US |
Numerous source codes for ready-made rootkits can be found on the internet. In 2006, |
alleged Chinese hackers infiltrated |
the Department of Commerce |
s Bureau of Industry and |
Security, which manages export licensing of military-use products and information |
using |
rootkits to allow privilege escalation. The agency spent millions of dollars on new, clean, |
hardware and software, because they could not restore the integrity of the compromised |
network (Tkacik 2007). |
A virus is a self-replicating program that spreads by inserting copies of itself into other |
executable code or documents. The original virus may modify the copies, known as a |
metamorphic virus, making its destruction more difficult (similar to genetic diversity). A |
virus can spread from one computer to another through the internet, email, the network file |
system, or removable medium such as a USB drive. Damage caused by viruses include |
deleting files, damaging programs, reformatting the hard drive, and disrupting or debilitating |
the system completely. Viruses may also be used as PSYOPs or demoralizers by presenting |
text, video, or audio messages to the computer user. In order to replicate, a virus must be |
allowed to execute code and write to memory. For this reason, many viruses attach |
themselves to executable files, such as Word and pdf documents, or html links. Some viruses |
try to avoid detection by killing the tasks associated with antivirus software before it can |
detect them. The Panda Burning Incense Virus is an example of cyber warfare posing an |
internal security threat to China, and it set a legal precedent for pursuing and prosecuting |
hackers (Lemon 2007). |
Like a virus, a worm is also a self-replicating program. A worm is a program or suite of |
programs that attempts to scan a network for vulnerable systems and automatically exploit |
those vulnerabilities. Some worms work passively, sniffing for usernames and passwords and |
using those to compromise accounts, installing copies of themselves into each such account, |
and typically relaying the compromised account information back to the intruder through a |
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80 |
Copyright |
2008 Jason Fritz |
covert channel. Many worms have been designed only to spread, and do not attempt to alter |
the systems through which they pass. However, the Morris worm and Mydoom showed that |
network traffic and other unintended effects can cause major disruption. A |
payload |
is code |
designed to do more than spread the worm - it might delete files on a host system, encrypt |
files for extortion, send documents via email, or destroy the target computer by rendering it |
unusable. |
The Code Red and Code Red II worms were the most successful worms in internet history, |
causing nearly $2 billion in damages and infecting over 600,000 computers. The worms, |
which may have originated from a university in Guangdong, China (United States General |
Accounting Office 2001), attacked computers running Microsoft |
s IIS web server and |
exploited a buffer overflow. Home computers were largely unaffected; however any attempt |
at infection caused them to crash. The worms created slow downs in internet speed, knocked |
websites and networks offline, and defaced websites with the phrase |
Hacked by Chinese! |
although Chinese involvement was never confirmed. The attacks may have been statesponsored, they may have been underground hackers and script kiddies, or they may have |
been a combination of the two. A script kiddie is not an expert in computer security. They |
use pre-packaged automated tools written by others and found online, such as WinNuke |
applications, Back Orifice, NetBus, Sub7, Metasploit, and ProRat. Even though script |
kiddies lack sophistication, and they are looked down on by the hacker culture, they still pose |
a significant security risk. When media attention is drawn to internet incidents, it is often |
followed by individuals seeking to participate without any coordinated effort or instructions |
to do so. Code Red II had a slightly different payload that could open a backdoor, leaving the |
computers vulnerable to further exploitation (Schwartz 2007; Cost of 'Code Red' Rising |
2001). |
The Code Red worms coincided with the collision of a US reconnaissance plane and a |
Chinese fighter jet, in which the Chinese pilot died, and known as the Hainan or EP-3 |
Incident. Patriotic Chinese hackers defaced dozens of US military and computer industry |
websites. Patriotic US hackers responded with inflammatory web page defacements, |
comment spamming, posting of photoshopped derogatory pictures, and probably were the |
source of the Code Blue Worm (Delio 2001). Code Blue sought out systems infected by |
Code Red and reprogrammed them to launch attacks against targets based in mainland China. |
In particular, it launched DDoS attacks against the Chinese security firm NS Focus. These |
type of attacks could be used clandestinely against one |
s own country to spur nationalism. Or |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.