text
stringlengths 4
429
|
---|
the allegations of cyber espionage. We also sought alternative explanations for leakage of confidential |
documents and information and examined basic information security practices at these locations. |
Network monitoring software was installed on various computers so as to collect forensic technical |
data from affected computer systems, and initial results were analysed in situ.32 This initial analysis |
confirmed the existence of malware and the transfer of information between infected computers and |
a number of control servers.33 |
Phase 2: Computer-based scouting, target selection, and data analysis (December 2008-March 2009) |
During the second phase of the investigation, researchers based at the Citizen Lab analysed the data |
collected by the field team. |
The data collected in Dharamsala and at Tibetan missions abroad led to the discovery of four control |
servers and six command servers. These control servers were identified and geo-located from the captured |
A portion of the fieldwork was carried out in conjunction with Dr. Shishir Nagaraja who spent five days in Dharamsala at the request |
of IWM researchers and assisted in conducting technical tests. |
A packet capturing program, Wireshark, was installed at each test location. All traffic from each of the affected systems was |
captured in real-time, and recorded for further analysis. Compromised systems try to connect to control servers in order check-in and |
report an infection. Once a connection is made, infected computers may receive instructions or additional locations from where they |
are to download instructions. The Wireshark data is sufficient to analyse these connections, determine the behaviour of the attack |
vector, and identify the location of control servers. |
JR02-2009 Tracking GhostNet - PART ONE |
traffic using a simple IP lookup.34 The control servers were then probed and web-based control interfaces |
were identified on four control servers, which allowed us to view and control the network. The system was |
actively monitored for two weeks, which allowed us to derive an extensive list of infected systems, and to |
also monitor the systems operator(s) as the operator(s) specifically instructed target computers. |
The data collected during both phases was integrated in Palantir, a data visualization and analysis |
tool. The Palantir platform provides a data fusion and visualization environment that enhances |
analytical capabilities. |
We looked up the associated Internet Protocol (IP) address in all five Regional Internet Registries in order to identify the country |
and network to which the IP address is assigned. We then performed a reverse Domain Name System (DNS) look-up on each IP |
address. DNS is the system that translates domain names into IP addresses; reverse DNS is a system that translates an IP address |
into a domain name. This can potentially provide additional information about the entity that has been assigned a particular IP |
address. If we discovered a domain name, we then looked up its registration in WHOIS, which is a public database of all domain |
name registrations and provides information about who registered the domain name. |
PART TWO: |
Tracking GhostNet |
JR02-2009 Tracking GhostNet - PART TWO |
Phase 1: Field investigation |
We conducted our investigation in Dharamsala between July and September 2008. The initial purpose |
was to gather targeted malware samples from Tibetan NGOs based in the area and to brief the Tibetan |
Government-in-Exile (TGIE) on the basics of information security. This included raising end-user |
awareness about social engineering and its policy implications for the secure use of information systems. |
The investigator met with the Dalai Lama |
s representative in Geneva, Tseten Samdup. During the |
meeting, Samdup inquired about the potential threat to computer security at the Office of His |
Holiness the Dalai Lama (OHHDL) in light of the targeted malware threat. Samdup requested that |
the investigator perform a preliminary security review of OHHDL systems, including Dalailama.com |
and the office computer network. A five day mission was scheduled in early September. Malware |
was discovered on computers located in the OHHDL. |
Following the discovery of malware in the OHHDL, our investigator shifted focus to the campus |
network of the Tibetan Government-in-Exile. We approached Thubten Samphel, a senior civil |
servant in the Department for Information and International Relations, and sought permission |
to run Wireshark on several key computer systems, and to access the firewall logs at the Tibetan |
Computing Resource Centre. This access was readily granted. |
Additional testing was carried out at a Tibetan NGO. This was done at the suggestion of Phuntsok |
Dorjee, the director of a local NGO, TibTec. Dorjee suggested that we conduct testing and monitoring at |
the offices of Drewla.35 As was the case at other sitesthe investigator conducted a series of interviews |
with the NGO staff. |
Targeted malware |
previous research |
In September 2002, Tibetan groups reported that they were targeted with malware originating |
from servers in mainland China. They claimed that this was a coordinated attempt to disrupt their |
operations and spy on their computer networks. Similar attacks have occurred since then against a |
range of Tibetan non-state actors, including exile groups, human rights organizations, trade unions |
and labour organizers, writers, scholars and intellectuals. |
In 2005, a member of our investigating team convened a working group that coordinated the |
collection and archiving of the malware, including the payloads and associated examples of social |
engineering employed. Since early 2008, we have analysed every sample available to us, and |
identified control servers for at least fifty incidents. |
During an analysis of attacks which occurred during the 2008 Beijing Olympics we discovered |
the location of a control server that was later identified as part of the network which infected a |
computer in the private office of the Dalai Lama. |
The Drewla Initiative Project is an outreach model that seeks new ways to communicate directly with citizens of the People |
Republic of China. It relies heavily on the Internet. |
JR02-2009 Tracking GhostNet - PART TWO |
We were able to gain access to the command interface of this control server and identify the |
infected computers which reported back to this server. While were are unable to prove exactly how |
the computer in the Dalai Lama |
s office became infected, this case demonstrates one of the attack |
vectors used by the attacker(s) behind the network of infected computers we later uncovered.36 |
The following steps illustrate the attack vector using the malicious document we collected, which was |
configured to connect to a control server to which we later acquired access. (See Fig. 1 - p.19) |
An email message arrives in the target |
s inbox carrying the malware in an attachment or web link. |
The attackers(s) |
objective is to get the target to open the attachment or malicious link so that the |
malicious code can execute. In this case, the attacker(s) sent a carefully crafted email message which |
was configured to appear as if it was sent from [email protected] with an attached infected |
Word document named |
Translation of Freedom Movement ID Book for Tibetans in Exile.doc |
to entice |
the recipient to open the file.37 (See Fig. 2 - p. 20) |
Over time, it has been observed that the carrier emails have become more sophisticated in their |
targeting and content in order to trick their recipients into believing that they are receiving |
legitimate messages. This is also known as |
social engineering. |
It is common to see legitimate |
documents recycled for such attacks or the attacker injecting their message into an ongoing group |
conversation. There are also cases where it appears that content stolen from previously-infected |
machines was recycled to enhance the appearance of legitimacy. |
The targeted user proceeds to opens the attachment or malicious link. Once opened, the infected |
file or link exploits a vulnerability on the user |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.