SlideShare a Scribd company logo
1 of 66
Download to read offline
Iftach Ian Amit | November 2010
www.security-art.comAll rights reserved to Security Art ltd. 2002-2010
Cyber[Crime|War]
Connecting the Dots
Iftach Ian Amit
VP Business Development, Security Art
Board Member - CSA Israel
IL-CERT Dreamer
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
disclaimer
This is “hacker” me, and my own personal opinion only.This has got nothing to do with work
stuff.The “work” me is often suited and talks in acronyms and industry best practices stuff.
2
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
Agenda
• Who am I?
• CyberWar [Attack | Defense]
• CyberCrime [Attack | Defense]
• History revisited
• Connecting the dots...
• Future
3
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
Who Am I
4
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
This is NOT going to be
5
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010 6
Picking up where we left off
At least as far as last year’s research is concerned...
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010 7
Boss, is this
supposed to
be on the
internet?
I think thisis from mypowerpoint!
We probably
need to call
someone...
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010 8
Finally de-
classified...
(public
domain)
The initial“trace” or lo-jack used (seerabbithole talk
from 09)
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010 9
Hungry yet?
That was just the appetizer...
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010
Question 1:What is this?
10
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010
Perceptions may be deceiving...
War Crime
11
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010
War Crime
12
• Government / state
• Official backing
• Official resources
• Financing
• Expertise?
• Exploits/Vulns?
• Private
• Semi-official backing (org.
crime)
• Official resources
• Self financing?
• Established expertise (in-
house + outsourced)
• Market for exploits
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
CyberWar
13
“Cyberwarfare, (also known as
cyberwar and Cyber Warfare), is the
use of computers and the Internet in
conducting warfare in cyberspace.”
Wikipedia
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010
It did not happen yet
being an exception?
“There is no Cyberwar”
14
Estonia
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010
This is not the only way! Neither is this...
But civilian are
always at stake!15
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010
Many faces of how CyberWar is perceived...
From McAfee’s “Virtual Criminology Report 2009”
Image caption:
“countries developing advanced offensive cyber capabilities”
16
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010
We’ll focus on current players:
And no, here size does NOT matter...
17
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
USA
• Thoroughly documented activity around cyberwar
preparedness as well as military/government agencies
with readily available offensive capabilities
• Massive recruiting of professional in attack/defense for
different departments:
• USCC (United States Cyber Command - includes
AirForce, Marines, Navy and Army service
components)
• NSA
• Other TLA’s...
18
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
Russia
• GRU (Main Intelligence Directorate of the
Russian Armed Forces)
• SVR (Foreign Intelligence Service)
• FSB (Federal Security Services)
• Center for Research of Military Strength of
Foreign Countries
• Several “NationalYouth Associations” (Nashi)
19
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
China
• PLA (People’s Liberation Army)
• Homework: read the Northrop Grumman
report...
• General Staff Department 4th Department -
Electronic Countermeasures == Offense
• GSD 3rd Department - Signals Intelligence
== Defense
• Yes...Titan Rain...
20
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
Iran
• Telecommunications Infrastructure
co.
• Government telecom monopoly
• Iranian Armed Forces
21
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
Israel
• This is going to be very boring... Google data only :-(
• IDF (Israel Defense Forces) add cyber-attack
capabilities.
• C4I (Command, Control, Communications, Computers
and Intelligence) branches in Intelligence and Air-Force
commands
• Staffing is mostly homegrown - trained in the army and
other government agencies.
• Mossad? (check out the jobs section on mossad.gov.il...)
22
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010
CyberWar - Attack
Highly selective targeting of
military (and critical)
resources
In conjunction with a
kinetic attack
OR
Massive DDOS in order to
“black-out” a region,
disrupt services, and/or
push political agenda
(propaganda)
23
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
CyberWar - Defense
• Never just military
• Targets will be civilian
• Physical and logical protections = last
survival act
• Availability and Integrity of
services
• Can manifest in the cost of making
services unavailable for most
civilians
24
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010
CyberCrime
25
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010
Criminal Boss
Under Boss Trojan
Provider and Manager
Trojan Command and
Control
Campaign Manager Campaign Manager Campaign Manager
Attackers Crimeware
Toolkit Owners
Trojan distribution in
legitimate website
Affiliation
Network
Affiliation
Network
Affiliation
Network
Stolen Data Reseller Stolen Data Reseller Stolen Data Reseller
Figure 2: Organizational chart of a Cybercrime organization
You want
money, you
gotta play like
the big boys
do...
26
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
CyberCrime - Attack
• Channels: web, mail, open services
• Targeted attacks on premium resources
• Commissioned, or for extortion purposes
• Carpet bombing for most attacks
• Segmenting geographical regions and market
segments
• Secondary infections through controlled outposts
• Bots, infected sites
27
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010
CyberCrime - target locations
28
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010
CyberCrime - Locations
Major Cybercrime group locations
29
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010
CyberCrime - Ammunition
=≈ APT
30
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010 31
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
CyberCrime - Defense
• Anti [Virus | Malware | Spyware | Rootkit | Trojan ]
• Seriously?
• Firewalls / IDS / IPS
• Seriously?
• Brought to you by the numbers 80, 443, 53...
• SSL...
32
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010
How do these connect?
Claim: CyberCrime is being used to
conduct CyberWar
Proof: Let’s start with some history...
33
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010
History - Revisited...
Estonia
You read all about it.
Bottom line: civilian infrastructure was targeted
Attacks originated mostly from civilian networks
34
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010
History - Revisited...
Israel
September 6th, 2007
Source: http://en.wikipedia.org/wiki/
Operation_Orchard
Source: Der Spiegel
Operation Orchard
35
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010
Cast-Led, 2nd Lebanon war
(Israel and mid-east)
All attacks on targets
are Attributed to
Hacktivists
Israeli
Arabic
36
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010
Mid-east crime-war links
ARHack
Hacker forum by day
Cybercrime operations by night
37
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010
Political post
Buying/Selling cards for 1/2 their balance
Selling 1600
visa cards
38
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010
History - Revisited...
Georgia
More interesting...
Highly synchronized Kinetic and Cyber attacks
Targets still mostly civilian
Launched from civilian networks
39
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010
Russian Crime/State Dillema
McColo
ESTDomains
Atrivo
RBN
RealHost
Micronnet
Eexhost
40
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010
Russian
Governmen
Crime
ESTDom RBN
HostFresh
UkrTeleGroup
ESTDomains
McColo
Atrivo
Hosted by
Customer
Network provider
41
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
Remember Georgia?
• Started by picking on the president...
• Then the C&C used to control the botnet
was shut down as:
• Troops cross the border towards Georgia
• A few days of silence...
flood http www.president.gov.ge
flood tcp www.president.gov.ge
flood icmp www.president.gov.ge
42
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
Georgia - cont.
• Six (6) new C&C servers came up and drove attacks
at additional Georgian sites
• BUT - the same C&C’s were also used for attacks on
commercial sites in order to extort them (botnet-
for-hire)
www.president.gov.ge
www.parliament.ge
apsny.ge
news.ge
tbilisiweb.info
newsgeorgia.ru
os-inform.com
www.kasparov.ru
hacking.ge mk.ru
newstula.info
skandaly.ru
Additional sites attacked:
•Porn sites
•Adult escort services
•Nazi/Racist sites
•Carder forums
•Gambling sites
•Webmoney/Webgold/etc…
43
Homework: Look up
the city of Gori in
Georgia.
DDoS on media and
local sites ran RIGHT
BEFORE the russian
attack on the city.
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010
History - Revisited...
Iran
2009 Twitter DNS hack attributed to Iranian
activity.
Political connections are too obvious to ignore
(elections)
UN Council
Decisions
Protests by
leadership opposition
in Tehran
Timing was right on:
44
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010 45
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
Iran-Twitter connecting dots
• Twitter taken down December 18th 2009
• Attack attributed eventually to cyber-crime/
vigilante group named “Iranian Cyber Army”
• Until December 2009 there was no group
known as “Iranian Cyber Army”...
• BUT - “Ashiyane” (Shiite group) is from the
same place as the “Iranian Cyber Army”
46
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010 47
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
Iran-Twitter - Ashiyane
• Ashiyane was using the same pro-Hezbolla
messages that were used on the Twitter
attack with their own attacks for some
time...
• AND the “Iranian Cyber Army” seems to
be a pretty active group on the Ashiyane
forums www.ashiyane.com/forum
Let’s take a look at how Ashiyane operates...
48
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010
On [Crime|War] training
Ashiyane forums
WarGames
49
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
50
Wargames targets includes:
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010
Back to [Crime|War] Links:
What else happened on the 18th?
More recently - Baidu taken down
with the same MO (credentials)
51
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010
Ashiyane
Iranian
Cyber Army
DDoS
Botnet
Herding
Site
Defacement
Credit
Card Theft
Strategic
Attacks
Mapping Iran’s [Crime|War]
Iran
Iraq
US
$$ UK
US CN
Crime
War
52
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
Iran - the unspoken
53
• Stuxnet
• There, I’ve said it
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010 54
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
History - Revisited...
• Great Chinese Firewall doing an OK job in
keeping information out.
• Proving grounds for many cyber-attackers
• Bulletpfoof hosting (after RBN temporary
closure in 2008 China provided an alternative
that stayed...)
China
55
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
China ...connecting the dots
January 12th - Google announces it was hacked
by China
Not as in the “we lost a few minutes of DNS”
hacked...
“In mid-December we detected a highly
sophisticated and targeted attack on our
corporate infrastructure originating from China that
resulted in the theft of intellectual property from
Google” (David Drummond, SVP @Google)
56
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
China ...connecting the dots.
January 12th - Adobe gets hacked. By China.
“Adobe became aware on January 2, 2010 of a
computer security incident involving a
sophisticated coordinated attack
against corporate network systems managed by
Adobe and other companies” (Adobe official
blog)
Same MO: 0-day in Internet Explorer to get
into Google,Adobe and more than 40
additional companies
57
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
China ...connecting the dots..
The only problem so far - the attacks all have
the sign of a CyberCrime attack.All the
evidence points to known crime groups so far.
“It was an attack on the technology
infrastructure of major corporations in sectors
as diverse as finance, technology, media,
and chemical” (Google enterprise blog)
58
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
China ...connecting the dots...
Criminal groups attack companies in order to
get to their data so they can sell it (whether it
was commercial or government data!)
US Response: “We look to the Chinese
government for an explanation. The ability to
operate with confidence in cyberspace is critical in
a modern society and economy.” (Hillary Clinton,
Secretary of State)
59
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
China ...connecting the dots....
The China move:
Use of criminal groups to carry out the
attacks provides the perfect deniability on
espionage connections (just like in the past,
and a perfect response to clinton).
Targets are major US companies with strategic
poise to enable state interest espionage
Information sharing at its best:
Win - Win
State Crime
60
Anecdote - a
professor in one of the
universities linked to the attack
admitted that the school network
is often used to anonymously
relay attacks
Thursday, November 25, 2010
Iftach Ian Amit | November 2010
All rights reserved to Security Art ltd. 2002-2010
The Future (Ilustrated)
CLOUDS
61
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
62
Deterrence
Think: Article 5 for the Cyber Commons!
An attack agains one or more states, shall be
considered an attack against all member states,
who agree, to exercise their right to assist the
attacked party, including the right to use armed
forces.
NATO Article 5 - abridged
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
Attribution?
• Technical - not feasible
• Political - should be obvious
• Defending state?
• Should have the responsibility to “clean
up” its portion of the Cyber Commons
in order to enable a sustainable
economic and civil environment.
63
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
Summary
Good Bad
Formal training on
cybersecurity by
nations
Commercial
development of
malware still reigns
Ugly
Good meet Bad: money changes hands, less
tracks to cover, criminal ops already creating
the weapons...
64
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
Summary
The Future
Lack of legislation and cooperation on multi-
national level is creating de-facto “safe
haven” for cybercrime. <- FIx this!
Treaties and anti-crime activities may prove to
be beneficial. <- nukes will help us?
65
Thursday, November 25, 2010
All rights reserved to Security Art ltd. 2002-2010
Iftach Ian Amit | November 2010
Thanks!
Q & A
iamit@iamit.org
pro: iamit@security-art.com
twitter: twitter.com/iiamit
blog: iamit.org/blog
66
Thursday, November 25, 2010

More Related Content

Similar to Cyber [crime|war deepsec

Cyber Terror ICT Conference
Cyber Terror ICT ConferenceCyber Terror ICT Conference
Cyber Terror ICT ConferenceIftach Ian Amit
 
Cybercrime|Cyberwar - connecting the dots
Cybercrime|Cyberwar - connecting the dotsCybercrime|Cyberwar - connecting the dots
Cybercrime|Cyberwar - connecting the dotsYoram Golandsky
 
Cyber[Crime|War] - Brucon
Cyber[Crime|War] - BruconCyber[Crime|War] - Brucon
Cyber[Crime|War] - BruconIftach Ian Amit
 
Pushing in, leaving a present, and pulling out slowly without anyone noticing
Pushing in, leaving a present, and pulling out slowly without anyone noticingPushing in, leaving a present, and pulling out slowly without anyone noticing
Pushing in, leaving a present, and pulling out slowly without anyone noticingIftach Ian Amit
 
Cyber [Crime|War] - SourceBoston 2011
Cyber [Crime|War] - SourceBoston 2011Cyber [Crime|War] - SourceBoston 2011
Cyber [Crime|War] - SourceBoston 2011Iftach Ian Amit
 
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...Cyber Security Alliance
 
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...ClubHack
 
Technologies and Trends that are Changing the World
Technologies and Trends that are Changing the WorldTechnologies and Trends that are Changing the World
Technologies and Trends that are Changing the WorldCarlos Dominguez
 

Similar to Cyber [crime|war deepsec (8)

Cyber Terror ICT Conference
Cyber Terror ICT ConferenceCyber Terror ICT Conference
Cyber Terror ICT Conference
 
Cybercrime|Cyberwar - connecting the dots
Cybercrime|Cyberwar - connecting the dotsCybercrime|Cyberwar - connecting the dots
Cybercrime|Cyberwar - connecting the dots
 
Cyber[Crime|War] - Brucon
Cyber[Crime|War] - BruconCyber[Crime|War] - Brucon
Cyber[Crime|War] - Brucon
 
Pushing in, leaving a present, and pulling out slowly without anyone noticing
Pushing in, leaving a present, and pulling out slowly without anyone noticingPushing in, leaving a present, and pulling out slowly without anyone noticing
Pushing in, leaving a present, and pulling out slowly without anyone noticing
 
Cyber [Crime|War] - SourceBoston 2011
Cyber [Crime|War] - SourceBoston 2011Cyber [Crime|War] - SourceBoston 2011
Cyber [Crime|War] - SourceBoston 2011
 
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
 
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
 
Technologies and Trends that are Changing the World
Technologies and Trends that are Changing the WorldTechnologies and Trends that are Changing the World
Technologies and Trends that are Changing the World
 

More from Iftach Ian Amit

Cyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLVCyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLVIftach Ian Amit
 
BSidesTLV Closing Keynote
BSidesTLV Closing KeynoteBSidesTLV Closing Keynote
BSidesTLV Closing KeynoteIftach Ian Amit
 
Social Media Risk Metrics
Social Media Risk MetricsSocial Media Risk Metrics
Social Media Risk MetricsIftach Ian Amit
 
From your Pocket to your Heart and Back
From your Pocket to your Heart and BackFrom your Pocket to your Heart and Back
From your Pocket to your Heart and BackIftach Ian Amit
 
Painting a Company Red and Blue
Painting a Company Red and BluePainting a Company Red and Blue
Painting a Company Red and BlueIftach Ian Amit
 
"Cyber" security - all good, no need to worry?
"Cyber" security - all good, no need to worry?"Cyber" security - all good, no need to worry?
"Cyber" security - all good, no need to worry?Iftach Ian Amit
 
Seeing Red In Your Future?
Seeing Red In Your Future?Seeing Red In Your Future?
Seeing Red In Your Future?Iftach Ian Amit
 
Passwords good badugly181212-2
Passwords good badugly181212-2Passwords good badugly181212-2
Passwords good badugly181212-2Iftach Ian Amit
 
Advanced Data Exfiltration - the way Q would have done it
Advanced Data Exfiltration - the way Q would have done itAdvanced Data Exfiltration - the way Q would have done it
Advanced Data Exfiltration - the way Q would have done itIftach Ian Amit
 
Infecting Python Bytecode
Infecting Python BytecodeInfecting Python Bytecode
Infecting Python BytecodeIftach Ian Amit
 
Cheating in Computer Games
Cheating in Computer GamesCheating in Computer Games
Cheating in Computer GamesIftach Ian Amit
 

More from Iftach Ian Amit (20)

Cyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLVCyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLV
 
Devsecops at Cimpress
Devsecops at CimpressDevsecops at Cimpress
Devsecops at Cimpress
 
BSidesTLV Closing Keynote
BSidesTLV Closing KeynoteBSidesTLV Closing Keynote
BSidesTLV Closing Keynote
 
Social Media Risk Metrics
Social Media Risk MetricsSocial Media Risk Metrics
Social Media Risk Metrics
 
ISTS12 Keynote
ISTS12 KeynoteISTS12 Keynote
ISTS12 Keynote
 
From your Pocket to your Heart and Back
From your Pocket to your Heart and BackFrom your Pocket to your Heart and Back
From your Pocket to your Heart and Back
 
Painting a Company Red and Blue
Painting a Company Red and BluePainting a Company Red and Blue
Painting a Company Red and Blue
 
"Cyber" security - all good, no need to worry?
"Cyber" security - all good, no need to worry?"Cyber" security - all good, no need to worry?
"Cyber" security - all good, no need to worry?
 
Armorizing applications
Armorizing applicationsArmorizing applications
Armorizing applications
 
Seeing Red In Your Future?
Seeing Red In Your Future?Seeing Red In Your Future?
Seeing Red In Your Future?
 
Hacking cyber-iamit
Hacking cyber-iamitHacking cyber-iamit
Hacking cyber-iamit
 
Passwords good badugly181212-2
Passwords good badugly181212-2Passwords good badugly181212-2
Passwords good badugly181212-2
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Sexy defense
Sexy defenseSexy defense
Sexy defense
 
Cyber state
Cyber stateCyber state
Cyber state
 
Advanced Data Exfiltration - the way Q would have done it
Advanced Data Exfiltration - the way Q would have done itAdvanced Data Exfiltration - the way Q would have done it
Advanced Data Exfiltration - the way Q would have done it
 
Infecting Python Bytecode
Infecting Python BytecodeInfecting Python Bytecode
Infecting Python Bytecode
 
Exploiting Second life
Exploiting Second lifeExploiting Second life
Exploiting Second life
 
Dtmf phreaking
Dtmf phreakingDtmf phreaking
Dtmf phreaking
 
Cheating in Computer Games
Cheating in Computer GamesCheating in Computer Games
Cheating in Computer Games
 

Cyber [crime|war deepsec

  • 1. Iftach Ian Amit | November 2010 www.security-art.comAll rights reserved to Security Art ltd. 2002-2010 Cyber[Crime|War] Connecting the Dots Iftach Ian Amit VP Business Development, Security Art Board Member - CSA Israel IL-CERT Dreamer Thursday, November 25, 2010
  • 2. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 disclaimer This is “hacker” me, and my own personal opinion only.This has got nothing to do with work stuff.The “work” me is often suited and talks in acronyms and industry best practices stuff. 2 Thursday, November 25, 2010
  • 3. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 Agenda • Who am I? • CyberWar [Attack | Defense] • CyberCrime [Attack | Defense] • History revisited • Connecting the dots... • Future 3 Thursday, November 25, 2010
  • 4. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 Who Am I 4 Thursday, November 25, 2010
  • 5. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 This is NOT going to be 5 Thursday, November 25, 2010
  • 6. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 6 Picking up where we left off At least as far as last year’s research is concerned... Thursday, November 25, 2010
  • 7. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 7 Boss, is this supposed to be on the internet? I think thisis from mypowerpoint! We probably need to call someone... Thursday, November 25, 2010
  • 8. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 8 Finally de- classified... (public domain) The initial“trace” or lo-jack used (seerabbithole talk from 09) Thursday, November 25, 2010
  • 9. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 9 Hungry yet? That was just the appetizer... Thursday, November 25, 2010
  • 10. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 Question 1:What is this? 10 Thursday, November 25, 2010
  • 11. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 Perceptions may be deceiving... War Crime 11 Thursday, November 25, 2010
  • 12. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 War Crime 12 • Government / state • Official backing • Official resources • Financing • Expertise? • Exploits/Vulns? • Private • Semi-official backing (org. crime) • Official resources • Self financing? • Established expertise (in- house + outsourced) • Market for exploits Thursday, November 25, 2010
  • 13. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 CyberWar 13 “Cyberwarfare, (also known as cyberwar and Cyber Warfare), is the use of computers and the Internet in conducting warfare in cyberspace.” Wikipedia Thursday, November 25, 2010
  • 14. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 It did not happen yet being an exception? “There is no Cyberwar” 14 Estonia Thursday, November 25, 2010
  • 15. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 This is not the only way! Neither is this... But civilian are always at stake!15 Thursday, November 25, 2010
  • 16. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 Many faces of how CyberWar is perceived... From McAfee’s “Virtual Criminology Report 2009” Image caption: “countries developing advanced offensive cyber capabilities” 16 Thursday, November 25, 2010
  • 17. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 We’ll focus on current players: And no, here size does NOT matter... 17 Thursday, November 25, 2010
  • 18. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 USA • Thoroughly documented activity around cyberwar preparedness as well as military/government agencies with readily available offensive capabilities • Massive recruiting of professional in attack/defense for different departments: • USCC (United States Cyber Command - includes AirForce, Marines, Navy and Army service components) • NSA • Other TLA’s... 18 Thursday, November 25, 2010
  • 19. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 Russia • GRU (Main Intelligence Directorate of the Russian Armed Forces) • SVR (Foreign Intelligence Service) • FSB (Federal Security Services) • Center for Research of Military Strength of Foreign Countries • Several “NationalYouth Associations” (Nashi) 19 Thursday, November 25, 2010
  • 20. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 China • PLA (People’s Liberation Army) • Homework: read the Northrop Grumman report... • General Staff Department 4th Department - Electronic Countermeasures == Offense • GSD 3rd Department - Signals Intelligence == Defense • Yes...Titan Rain... 20 Thursday, November 25, 2010
  • 21. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 Iran • Telecommunications Infrastructure co. • Government telecom monopoly • Iranian Armed Forces 21 Thursday, November 25, 2010
  • 22. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 Israel • This is going to be very boring... Google data only :-( • IDF (Israel Defense Forces) add cyber-attack capabilities. • C4I (Command, Control, Communications, Computers and Intelligence) branches in Intelligence and Air-Force commands • Staffing is mostly homegrown - trained in the army and other government agencies. • Mossad? (check out the jobs section on mossad.gov.il...) 22 Thursday, November 25, 2010
  • 23. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 CyberWar - Attack Highly selective targeting of military (and critical) resources In conjunction with a kinetic attack OR Massive DDOS in order to “black-out” a region, disrupt services, and/or push political agenda (propaganda) 23 Thursday, November 25, 2010
  • 24. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 CyberWar - Defense • Never just military • Targets will be civilian • Physical and logical protections = last survival act • Availability and Integrity of services • Can manifest in the cost of making services unavailable for most civilians 24 Thursday, November 25, 2010
  • 25. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 CyberCrime 25 Thursday, November 25, 2010
  • 26. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 Criminal Boss Under Boss Trojan Provider and Manager Trojan Command and Control Campaign Manager Campaign Manager Campaign Manager Attackers Crimeware Toolkit Owners Trojan distribution in legitimate website Affiliation Network Affiliation Network Affiliation Network Stolen Data Reseller Stolen Data Reseller Stolen Data Reseller Figure 2: Organizational chart of a Cybercrime organization You want money, you gotta play like the big boys do... 26 Thursday, November 25, 2010
  • 27. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 CyberCrime - Attack • Channels: web, mail, open services • Targeted attacks on premium resources • Commissioned, or for extortion purposes • Carpet bombing for most attacks • Segmenting geographical regions and market segments • Secondary infections through controlled outposts • Bots, infected sites 27 Thursday, November 25, 2010
  • 28. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 CyberCrime - target locations 28 Thursday, November 25, 2010
  • 29. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 CyberCrime - Locations Major Cybercrime group locations 29 Thursday, November 25, 2010
  • 30. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 CyberCrime - Ammunition =≈ APT 30 Thursday, November 25, 2010
  • 31. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 31 Thursday, November 25, 2010
  • 32. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 CyberCrime - Defense • Anti [Virus | Malware | Spyware | Rootkit | Trojan ] • Seriously? • Firewalls / IDS / IPS • Seriously? • Brought to you by the numbers 80, 443, 53... • SSL... 32 Thursday, November 25, 2010
  • 33. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 How do these connect? Claim: CyberCrime is being used to conduct CyberWar Proof: Let’s start with some history... 33 Thursday, November 25, 2010
  • 34. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 History - Revisited... Estonia You read all about it. Bottom line: civilian infrastructure was targeted Attacks originated mostly from civilian networks 34 Thursday, November 25, 2010
  • 35. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 History - Revisited... Israel September 6th, 2007 Source: http://en.wikipedia.org/wiki/ Operation_Orchard Source: Der Spiegel Operation Orchard 35 Thursday, November 25, 2010
  • 36. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 Cast-Led, 2nd Lebanon war (Israel and mid-east) All attacks on targets are Attributed to Hacktivists Israeli Arabic 36 Thursday, November 25, 2010
  • 37. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 Mid-east crime-war links ARHack Hacker forum by day Cybercrime operations by night 37 Thursday, November 25, 2010
  • 38. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 Political post Buying/Selling cards for 1/2 their balance Selling 1600 visa cards 38 Thursday, November 25, 2010
  • 39. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 History - Revisited... Georgia More interesting... Highly synchronized Kinetic and Cyber attacks Targets still mostly civilian Launched from civilian networks 39 Thursday, November 25, 2010
  • 40. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 Russian Crime/State Dillema McColo ESTDomains Atrivo RBN RealHost Micronnet Eexhost 40 Thursday, November 25, 2010
  • 41. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 Russian Governmen Crime ESTDom RBN HostFresh UkrTeleGroup ESTDomains McColo Atrivo Hosted by Customer Network provider 41 Thursday, November 25, 2010
  • 42. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 Remember Georgia? • Started by picking on the president... • Then the C&C used to control the botnet was shut down as: • Troops cross the border towards Georgia • A few days of silence... flood http www.president.gov.ge flood tcp www.president.gov.ge flood icmp www.president.gov.ge 42 Thursday, November 25, 2010
  • 43. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 Georgia - cont. • Six (6) new C&C servers came up and drove attacks at additional Georgian sites • BUT - the same C&C’s were also used for attacks on commercial sites in order to extort them (botnet- for-hire) www.president.gov.ge www.parliament.ge apsny.ge news.ge tbilisiweb.info newsgeorgia.ru os-inform.com www.kasparov.ru hacking.ge mk.ru newstula.info skandaly.ru Additional sites attacked: •Porn sites •Adult escort services •Nazi/Racist sites •Carder forums •Gambling sites •Webmoney/Webgold/etc… 43 Homework: Look up the city of Gori in Georgia. DDoS on media and local sites ran RIGHT BEFORE the russian attack on the city. Thursday, November 25, 2010
  • 44. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 History - Revisited... Iran 2009 Twitter DNS hack attributed to Iranian activity. Political connections are too obvious to ignore (elections) UN Council Decisions Protests by leadership opposition in Tehran Timing was right on: 44 Thursday, November 25, 2010
  • 45. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 45 Thursday, November 25, 2010
  • 46. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 Iran-Twitter connecting dots • Twitter taken down December 18th 2009 • Attack attributed eventually to cyber-crime/ vigilante group named “Iranian Cyber Army” • Until December 2009 there was no group known as “Iranian Cyber Army”... • BUT - “Ashiyane” (Shiite group) is from the same place as the “Iranian Cyber Army” 46 Thursday, November 25, 2010
  • 47. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 47 Thursday, November 25, 2010
  • 48. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 Iran-Twitter - Ashiyane • Ashiyane was using the same pro-Hezbolla messages that were used on the Twitter attack with their own attacks for some time... • AND the “Iranian Cyber Army” seems to be a pretty active group on the Ashiyane forums www.ashiyane.com/forum Let’s take a look at how Ashiyane operates... 48 Thursday, November 25, 2010
  • 49. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 On [Crime|War] training Ashiyane forums WarGames 49 Thursday, November 25, 2010
  • 50. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 50 Wargames targets includes: Thursday, November 25, 2010
  • 51. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 Back to [Crime|War] Links: What else happened on the 18th? More recently - Baidu taken down with the same MO (credentials) 51 Thursday, November 25, 2010
  • 52. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 Ashiyane Iranian Cyber Army DDoS Botnet Herding Site Defacement Credit Card Theft Strategic Attacks Mapping Iran’s [Crime|War] Iran Iraq US $$ UK US CN Crime War 52 Thursday, November 25, 2010
  • 53. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 Iran - the unspoken 53 • Stuxnet • There, I’ve said it Thursday, November 25, 2010
  • 54. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 54 Thursday, November 25, 2010
  • 55. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 History - Revisited... • Great Chinese Firewall doing an OK job in keeping information out. • Proving grounds for many cyber-attackers • Bulletpfoof hosting (after RBN temporary closure in 2008 China provided an alternative that stayed...) China 55 Thursday, November 25, 2010
  • 56. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 China ...connecting the dots January 12th - Google announces it was hacked by China Not as in the “we lost a few minutes of DNS” hacked... “In mid-December we detected a highly sophisticated and targeted attack on our corporate infrastructure originating from China that resulted in the theft of intellectual property from Google” (David Drummond, SVP @Google) 56 Thursday, November 25, 2010
  • 57. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 China ...connecting the dots. January 12th - Adobe gets hacked. By China. “Adobe became aware on January 2, 2010 of a computer security incident involving a sophisticated coordinated attack against corporate network systems managed by Adobe and other companies” (Adobe official blog) Same MO: 0-day in Internet Explorer to get into Google,Adobe and more than 40 additional companies 57 Thursday, November 25, 2010
  • 58. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 China ...connecting the dots.. The only problem so far - the attacks all have the sign of a CyberCrime attack.All the evidence points to known crime groups so far. “It was an attack on the technology infrastructure of major corporations in sectors as diverse as finance, technology, media, and chemical” (Google enterprise blog) 58 Thursday, November 25, 2010
  • 59. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 China ...connecting the dots... Criminal groups attack companies in order to get to their data so they can sell it (whether it was commercial or government data!) US Response: “We look to the Chinese government for an explanation. The ability to operate with confidence in cyberspace is critical in a modern society and economy.” (Hillary Clinton, Secretary of State) 59 Thursday, November 25, 2010
  • 60. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 China ...connecting the dots.... The China move: Use of criminal groups to carry out the attacks provides the perfect deniability on espionage connections (just like in the past, and a perfect response to clinton). Targets are major US companies with strategic poise to enable state interest espionage Information sharing at its best: Win - Win State Crime 60 Anecdote - a professor in one of the universities linked to the attack admitted that the school network is often used to anonymously relay attacks Thursday, November 25, 2010
  • 61. Iftach Ian Amit | November 2010 All rights reserved to Security Art ltd. 2002-2010 The Future (Ilustrated) CLOUDS 61 Thursday, November 25, 2010
  • 62. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 62 Deterrence Think: Article 5 for the Cyber Commons! An attack agains one or more states, shall be considered an attack against all member states, who agree, to exercise their right to assist the attacked party, including the right to use armed forces. NATO Article 5 - abridged Thursday, November 25, 2010
  • 63. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 Attribution? • Technical - not feasible • Political - should be obvious • Defending state? • Should have the responsibility to “clean up” its portion of the Cyber Commons in order to enable a sustainable economic and civil environment. 63 Thursday, November 25, 2010
  • 64. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 Summary Good Bad Formal training on cybersecurity by nations Commercial development of malware still reigns Ugly Good meet Bad: money changes hands, less tracks to cover, criminal ops already creating the weapons... 64 Thursday, November 25, 2010
  • 65. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 Summary The Future Lack of legislation and cooperation on multi- national level is creating de-facto “safe haven” for cybercrime. <- FIx this! Treaties and anti-crime activities may prove to be beneficial. <- nukes will help us? 65 Thursday, November 25, 2010
  • 66. All rights reserved to Security Art ltd. 2002-2010 Iftach Ian Amit | November 2010 Thanks! Q & A iamit@iamit.org pro: iamit@security-art.com twitter: twitter.com/iiamit blog: iamit.org/blog 66 Thursday, November 25, 2010