text
stringlengths 4
429
|
---|
cyber attacks could be used by a third party state, or organization, to create conflict between |
external states to further some masked goal. For example, Iran could benefit by creating |
tension between the US and China through an attack prior to a US proposed UN resolution, in |
which China has veto power (Onley and Wait 2006; Delio 2001). |
In 2004, the Myfip worm probably originated from IP addresses in the Chinese municipality |
of Tianjin (Brenner 2005). This worm stole pdf files, with later variants targeting Microsoft |
Word documents, schematics, and circuit board layouts. Among the victims were Bank of |
America, BJ |
s Wholesale Club, and Lexis-Nexis. The worm not only stole intellectual |
property, such as product designs, but also took customer lists and databases. Identifying the |
number of companies affected poses difficulties as they do not wish to further damage their |
business by coming forward. To do so can damage consumer confidence and require the |
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80 |
Copyright |
2008 Jason Fritz |
implementation of costly security measures. Businesses may also be oblivious to the number |
of previous infections and potential data loss as they simply update their patches and move on |
(Brenner 2005). |
A denial-of-service (DoS) attack or distributed denial-of-service (DDoS) attack is an attempt |
to make a computer resource unavailable to its intended users. This is accomplished by |
flooding the target with data requests, so that it cannot respond to legitimate traffic, or so that |
it responds so slowly that it is rendered useless. DDoS attacks may be conducted by a |
collective of individuals, often co-ordinating their efforts, or by a network of computers |
under the control of a single attacker. Such networks are called botnets, with each computer |
in the botnet being known as a bot, or a zombie. These computers have been taken control of |
by malicious users without the knowledge of the owner, usually through a rootkit, Trojan, or |
virus. Sobig and Mydoom are examples of worms which created zombies. A botnet's |
originator, known as a bot herder, can control the group remotely, usually through a means |
such as IRC, and usually for nefarious purposes. Infected zombie computers are used to send |
email spam, to host contraband data such as child pornography, or to engage in distributed |
denial-of-service attacks as a form of extortion. The services of a bot herder can be rented on |
the black market. One estimate suggested that Chinese hackers have 750,000 zombie |
computers in the US alone (Waterman 2007). A similar, but non-malicious, phenomenon |
involving the banding together of excess computer power can be seen in the Search for ExtraTerrestrial Intelligence (SETI@home), or Stanford University |
s protein folding simulations |
(Folding@home). |
DoS and DDoS attacks can prevent an internet site or service from functioning temporarily or |
indefinitely. DOS attacks can also lead to problems in the network branches around the |
actual computer being attacked. For example, the bandwidth of a router between the internet |
and a local area network may be consumed by an attack, compromising not only the intended |
computer, but also the entire network. If the attack is conducted on a sufficiently large scale, |
entire geographical regions of internet connectivity can be compromised without the |
attacker's knowledge or intent by incorrectly configured or flimsy network infrastructure |
equipment. Scripts can be set up to automate the process, and subtle variations of these |
attacks, such as smurf attacks, fraggle attacks, teardrop attack, ping flood, SYN flood, IRC |
floods, banana attack, Fork bomb, pulsing zombie, and nuke exemplify their sophistication. |
Various DoS-causing exploits such as buffer overflow can confuse server-running software |
and fill the disk space or consume all available memory or CPU time. A permanent denialof-service (PDoS), also known loosely as phlashing, is an attack that damages a system so |
badly that it requires replacement or reinstallation of hardware. Unlike the DDoS, a PDoS |
attack exploits security flaws in the remote management interfaces of the victim's hardware, |
be it routers, printers, or other networking hardware. These flaws leave the door open for an |
attacker to remotely |
update |
the hardware firmware to a modified, corrupt or defective |
firmware image, therefore bricking the device and making it permanently unusable for its |
original purpose. The PDoS is a hardware-targeted attack which can be much faster and |
requires fewer resources than using a botnet in a DDoS attack. |
It is important to note the difference between a DDoS and DoS attack. If an attacker mounts |
a smurf attack from a single host it would be classified as a DoS attack. In fact, any attack |
directed against computer availability would be classified as a DoS attack. On the other |
hand, if an attacker uses a thousand zombie systems to simultaneously launch smurf attacks |
against a remote host, this would be classified as a DDoS attack. Several botnets have been |
found and removed from the internet. Dutch police located and disbanded a 1.5 million node |
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80 |
Copyright |
2008 Jason Fritz |
botnet, and the Norwegian ISP Telenor disbanded a 10,000 node botnet (Keizer 2005; |
Leyden 2004). Large, coordinated international efforts to shut down botnets have also been |
initiated, such as Operation Spam Zombies, which included agencies from 25 different states |
(Operation Spam Zombies 2005). It has been estimated that up to one quarter of all personal |
computers connected to the internet may become part of a botnet. And an estimated 50% of |
all pirated Windows programs contain pre-installed Trojans. China is renowned for its use of |
pirated Windows programs. This is a cause for concern for China as it bogs down internet |
and computer efficiency. It also could make Chinese computers susceptible to international |
condemnation, if their computers are used via proxy. Further, it demonstrates to China the |
value of developing its own operating systems for domestic and world markets, either to |
avoid such problems, or to create them for others (Weber 2007). |
There are also hybrids. A worm can install a rootkit, and a rootkit might include copies of one |
or more worms, packet sniffers, or port scanners. A rootkit or virus may be used to conduct a |
DoS attack, and compromising the system may include some traditional social engineering |
(HUMINT). So all of these terms have somewhat overlapping usage and they are often |
misused by mainstream media. The depth of security hacking goes far beyond the examples |
given here. These examples serve as an introduction to the level of sophistication with which |
computers can be compromised, illustrating the difficulty in providing defence. They also |
demonstrate the high level of damage that can be caused by a small group of individuals who |
work with little funding. This adds to the lack of attribution as it does not require the funding |
and support of a military, making state-sponsored hacking easy to deny. In combination with |
anonymity tools and the ability to hide intrusions, security hacking provides a high level of |
stealth and asymmetry. |
Military Applications of Hacking |
The USA |
s paramount position and its heavy reliance on computers have made it a prime |
target. For this reason it has some of the most extensive information on cyber attacks. The |
United States has had millions of computers infected at a cost in the billions of dollars. |
Hackers may be lone teenagers searching for fun or curiosity or state-sponsored intelligence |
gathering and technology transfer, the determination of which is highly problematic. |
Frequently hit targets include the US Department of Defense, the Pentagon, NASA, Los |
Alamos Laboratories, Boeing, Lockheed Martin, Northrop Grumman, Raytheon, Harvard |
University, California Institute of Technology, and a wide range of think tanks, defence |
contractors, military installations, and high profile commercial corporations. The attacks |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.