Wednesday, December 31, 2014

Let's try this again! My 2015 predictions!


2015 Predictions Paper
Jeff Stutzman, Co-Founder, Red Sky Alliance and Wapack Labs
December 31, 2014


I started writing the papers in 2011. My earlier papers are all available on this blog. Surprisingly enough, even with some being a total stretch, many came true. This year is a little different. Where I'd looked at tech exploitation in previous years,  my fear is that this year, technical exploitation will take a backseat to "we're already in and this is what we want". So watch out for objectives on target. This, in my opinion, is what's going to be the big message for 2015.

2015 will bring massive change. 

Ransomware will become highly targeted, significantly more efficient and far more damaging

In October, Wapack Labs responded to a call from help from a local company. The company had fallen victim to ransomware.  While Wapack Labs doesn’t normally undertake incident response, the request came in from a friend, and we felt compelled to assist.  In this case, the CEO paid the ransom (about $800 in Bitcoin) to retrieve the files that were encrypted on his personal computer.  The corporate drives however, were a different story.  The company’s IT staff had been forced to restore the entire company from backup taken 24 hours earlier.  Our analysis resulted in sink-holing the command and control channels, revealing nearly 1500 other victims - within the first hour!

Ransomware is a type of malware that restricts access to the computer system that it infects, and demands a ransom paid to the creator(s) of the malware in order for the restriction to be removed.[2] Ransomware often times uses scare tactics to coerce the owner of the victim computer into paying money to unlock or unencrypt files or the computer that will be held until the ransom is paid. In many cases, users are even walked through the process of paying the ransom.  It is a non-discriminating attack.  Nearly anyone can fall victim.  Figure 2 shows the screen presented to an earlier victim at Scotland Yard.[3]



The idea that ransomware has become a big deal should come as no surprise. But when you combine it with underground currency (thereby removing controls imposed by the banking and finance system) and couple it with highly efficient delivery mechanisms (see the next prediction), the use of ransomeware could, and likely will, become a very real and significant threat. 


Malware delivery will become highly efficient, utilizing traffic delivery systems to increase the probability of successful intrusions.

Imagine walking into a massive grocery store to buy a carton of milk.  You’ve never been to this store before.  You can run through every isle looking for the dairy case, or you ask a clerk to walk you to it.  Now imagine that the clerk knows the exact kind of milk you like, and hands it to you before you even ask him/her for directions to the dairy case.  Traffic distribution systems (TDS) work the same way in cyber space.  They know the configuration of the computers, and push specific legitimate content only to computers who actually want it, or in the case of malware delivery, the TDS knows the configuration of specific computer systems, and delivers malware only to those computers who will actually be able to execute the payload.  By knowing which computers have specific vulnerabilities, and delivering malware only to those computers, the likelihood of a successful exploitation increases dramatically, thereby increasing the attacker’s return on his hacking investment with very little additional effort.

For example, Wapack Labs witnessed and reported on (November 2014) hackers abusing a Traffic Distribution Service (TDS) called Sutra.

The Sutra TDS is designed with the intention of managing (and capturing) legitimate analytic data from a web server’s traffic.  In design, Sutra systems are designed to manage affiliate advertisements and maximize referral monetization through advanced management.   However, malicious actors have found a way to abuse this technology.[4]




This occurs by the system understanding not only the IP or MAC address of the system to which content should be delivered, but also the operating system, patch status, vulnerabilities and port openings.  The system acts as a traffic cop delivering malware to only those systems vulnerable to a specific attack.

We believe this will only grow in 2015.

OEM trojaning activities will become the norm.

In August 2014, Wapack Labs received malware specimens that were reported as targeting a Russian commercial bank.  Analysis of the malware uncovered a wide criminal infrastructure as well as a targeted malware component designed for attacking a specific application used in many financial institutions.  While the activity appeared to be targeted in nature, the associated infrastructure had also been linked to a number of other generic cybercrime activities.  The interesting thing was that all of the malware, after triggered remotely, communicated back to the software developer that built and sold the application to the banks.  While this may suggest the OEM wrote the backdoor into the code, it may also suggest that the OEM had been exploited.  We are not clear on which option may have been true, but the fact that the command and control channels called home to the developer suggested at a minimum, some involvement.

We’ve heard of other cases of suspected OEM poisoning, but this, although unproven, suggests, at least to us, a leading indicator.  OEM poisoning through companies with distribution channels for software, hardware, and services should consider themselves prime targets for exploitation for hackers who look for the early foothold.

Companies will (if  not already) will grow tired of being victimized.  Top companies (the “one-percenters”) will begin to shoot back.  The Sony case is famous. 

According to one media report, Sony Pictures is alleged to have conducted a retaliatory DDoS attack against websites currently holding its leaked information for public download.  The unconfirmed strike-back follows the two weeks of relentless attacks on Sony networks, punctuated by extortion demands, and the theft and release of personal information, emails and other business documents, all supposedly by the hacker collective the "Guardians of Peace".[5]  I’ve heard this before. Sony isn’t the only one.  .  Over ten years ago while working onsite at a bank, the CISO talked openly about hiring an offshore company to attack servers that were used to spam bank customers and the servers hosting the fake banking sites they linked to.

During our first year with Red Sky Alliance, we visited a non-member defense contractor who’d fallen victim several times to determined adversaries who were believed to be state sponsored, and who were stealing intellectual property being developed by them for the US Department of Defense.  The company spoke openly about having taken the offensive during attacks where sensitive technologies were believed targeted and being stolen. 

So is this real? Absolutely. Is it likely? Absolutely. Widespread? Probably not yet but it should come as no surprise that cyber activities are popping up in some unlikely locations around the world –possibly those locations that do not yet have strict cyber laws –and my belief is they will be used for proactive offensive, retaliatory, and active defensive operations.

The continued growth of government-sponsored operations will dramatically alter the cyber landscape.

In 2013 Wapack Labs analysts began tracking the growth in numbers of countries building their own ‘Cyber Command’. At the time, we found evidence of six versions of government sponsored cyber organizations.  In February ’14 when we mapped it out, there were 22, and today, not even a year later, there are believed to be over 100 in various stages of maturity.

What does this mean?  I use a term that I heard David Awksmith use at a conference in Colorado a few years ago.  He used an economics term –disintermediation, to describe removing the middleman (middleman being the military) in cyber space. Why?  Old-school military leaders won’t give up their bullets, but the younger generation of officers are believers that cyber is a viable weapon, and non-kinetic, non-blood yielding options can have as good or better effects on many fronts than kinetic weapons.   We’ve seen the removal of the military middleman play out already in several cases, and even in those countries with strong national level computer emergency response teams, non-governmental victims who are attacked can suffer significant damage.  

According to one source, Smart TVs were hacked during the Ukrainian parliamentary election.  Local channels were blocked and ‘aggressor’ (according to our source, Russian) messaging was played instead.   The Ukrainian military was not targeted, rather the population in an attempt to sway voting.

In another, Privatbank, Ukraine’s largest commercial bank was hacked repeatedly because the owner of the bank spoke out against Putin and personally funded much of the Ukrainian resistance.

Voter election, tampering and monitoring of the telephone systems, use of traffic cameras and security webcams to collect intelligence, the ability manipulate through cyber connections to just about any controller, media outlet, and telephone system offer significant advantages.  Cyber activities do not carry the same “Washington Post effect” --generate public outcry and influence US leadership through media reporting, as physical bombings and killings of people, are far less expensive to carry out by an adversary, and offer significant plausible deniability -but on the targeted victim(s), can be devastating.

So yes, future cyber, in my opinion, will remove the middleman and companies will be targeted directly by state sponsored (or at a minimum, state condoned) activities.  This will become the norm.  Need other examples?

The leader of the Syrian Electronic Army is actually President Assad’s cousin. The SEA was created in as a result of, and for retribution for the assets of the Assad regime being frozen.  We’ve seen heavy SEA activity over the last twelve months, and from our perspective, we should expect to see more.

North Korea’s unit 121 is reported by the FBI to be the actor behind the Sony breaches.  Regardless of heavy public speculation on attribution, the activity certainly cost Sony –both hard and soft dollars, and the fight, if the FBI is correct, was military-on-private corporation, not military-on-military.

China has long believed to be using government sponsored cyber espionage units to target and exploit intellectual property residing in corporations outside of China.  State sponsorship (or, at a minimum, state countenance) of activities against global corporations suggests governments are targeting non-government victims when that non-government entity has something in their collection requirements.

The US Cyber Command nearly doubled its budget heading into 2015.   There should be no doubt that others will follow, if only to protect themselves against future cyber, SIGINT, and espionage activities.


Life in cyber is not all that bad

There are some very strong positives.

First, the intelligence space is maturing nicely.  Not only are CISO’s becoming aware of the need for intelligence (even though risk models called for it years ago!), the idea that effort and spend can be prioritized by having great intelligence is a good thing. In fact, not only is it maturing, verticals are forming! 

Second, nearly every company that I wander into today either has a CISO or understands the need. That’s not to say they’ll all run out and hire one, but the awareness is there. I see this as a positive.
The ISO 27001 business is booming.  ISO isn’t going to stop determined adversaries, but it marks progress.  Again, I see this as a strong positive.




[1] Henrybasset.blogspot.com
[2] http://en.wikipedia.org/wiki/Ransomware
[3] http://en.wikipedia.org/wiki/Ransomware#mediaviewer/File:Metropolitan_Police_ransomware_scam.jpg
[4] https://www.usenix.org/sites/default/files/conference/protected-files/leet_ferguson_threats_preso.pdf
[5] http://www.theregister.co.uk/2014/12/12/sony_allegedly_targets_file_sharers_following_guardians_of_peace_hack/





Table 1: Stutzman’s 2015 Predictions
Stutzman's 2015 Predictions
Type of risk
To whom
Risk
Probability
Impact if successful
Stage of maturation
Leading indicators present?
Overall risk score
Ransomware will become highly targeted and significantly more efficient
Tech exploitation and ransom
All
5
5
5
3
Yes
4.5
Malware delivery will move from broad phishing delivery through content aware (traffic cop) systems
Tech exploitation
All
5
5
3
3
Yes
4
Previously unpublished activities surrounding OEM integrated trojaning activities will become more public
OEM exploitation
All
4
3
5
3
Yes
3.75
Companies will grow tired, and begin shooting back
Policy and Legal
Top 1 percenters
5
5
1
1
Yes
3
The continued growth of government sponsored cyber operations will drastically alter the landscape.
GEOPOL
Targeted companies
4
5
3
2
Yes
3.5


Jeff Stutzman, Co-Founder, Red Sky Alliance and Wapack Labs
December 29, 2014

I started writing these prediction papers in 2011, and while many people author prediction papers, one of the differences in the way I write mine is that I like to look back and see how many of mine actually came true. The old ones are published earlier in this blog. Please feel free to check them out.

2015 will bring massive change. 

In October, Wapack Labs responded to a call from help from a local company. The company had fallen victim to ransomware.  While Wapack Labs doesn’t normally undertake incident response, the request came in from a friend, and we felt compelled to assist.  In this case, the CEO paid the ransom (about $800 in Bitcoin) to retrieve the files that were encrypted on his personal computer.  The corporate drives however, were a different story.  The company’s IT staff had been forced to restore the entire company from backup taken 24 hours earlier.  Our analysis resulted in sink-holing the command and control channels, revealing nearly 1500 other victims - within the first hour!

Ransomware is a type of malware that restricts access to the computer system that it infects, and demands a ransom paid to the creator(s) of the malware in order for the restriction to be removed.[2] Ransomware often times uses scare tactics to coerce the owner of the victim computer into paying money to unlock or unencrypt files or the computer that will be held until the ransom is paid. In many cases, users are even walked through the process of paying the ransom.  It is a non-discriminating attack.  Nearly anyone can fall victim.  

The idea that ransomware has become a big deal should come as no surprise, but when you combine it with underground currency; thereby removing security controls imposed by the banking/finance system; and couple it with a highly efficient delivery mechanism (see the next prediction), the use of ransomware could, and likely will, become a very real, and significant threat.

Imagine walking into a massive grocery store to buy a carton of milk.  You’ve never been to this store before.  You can run through every isle looking for the dairy case, or you ask a clerk to walk you to it.  Now imagine that the clerk knows the exact kind of milk you like, and hands it to you before you even ask him/her for directions to the dairy case.  Traffic distribution systems (TDS) work the same way in cyber space.  They know the configuration of the computers, and push specific legitimate content only to computers who actually want it, or in the case of malware delivery, the TDS knows the configuration of specific computer systems, and delivers malware only to those computers who will actually be able to execute the payload.  By knowing which computers have specific vulnerabilities, and delivering malware only to those computers, the likelihood of a successful exploitation increases dramatically, thereby increasing the attacker’s return on his hacking investment with very little additional effort.

For example, Wapack Labs witnessed and reported on (November 2014) hackers abusing a Traffic Distribution Service (TDS) called Sutra.   The Sutra TDS is designed with the intention of managing (and capturing) legitimate analytic data from a web server’s traffic.  In design, Sutra systems are designed to manage affiliate advertisements and maximize referral monetization through advanced management.   However, malicious actors have found a way to abuse this technology.  This occurs by the system understanding not only the IP or MAC address of the system to which content should be delivered, but also the operating system, patch status, vulnerabilities and port openings.  The system acts as a traffic cop delivering malware to only those systems vulnerable to a specific attack.

We believe this will only grow in 2015.
In August 2014, Wapack Labs received malware specimens that were reported as targeting a Russian commercial bank.  Analysis of the malware uncovered a wide criminal infrastructure as well as a targeted malware component designed for attacking a specific application used in many financial institutions.  While the activity appeared to be targeted in nature, the associated infrastructure had also been linked to a number of other generic cybercrime activities.  The interesting thing was that all of the malware, after triggered remotely, communicated back to the software developer that built and sold the application to the banks.  While this may suggest the OEM wrote the backdoor into the code, it may also suggest that the OEM had been exploited.  We are not clear on which option may have been true, but the fact that the command and control channels called home to the developer suggested at a minimum, some involvement. 

We’ve heard of other cases of suspected OEM poisoning, but this, although unproven, suggests, at least to us, a leading indicator.  OEM poisoning through companies with distribution channels for software, hardware, and services should consider themselves prime targets for exploitation for hackers who look for the early foothold.



During our first year with Red Sky Alliance, we visited a non-member defense contractor who’d fallen victim several times to determined adversaries who were believed to be state sponsored, and who were stealing intellectual property being developed by them for the US Department of Defense.  The company spoke openly about having taken the offensive during attacks where sensitive technologies were believed targeted and being stolen. 

So is this real? Absolutely. Is it likely? Absolutely. Widespread? Probably not yet but it should come as no surprise that cyber activities are popping up in some unlikely locations around the world –possibly those locations that do not yet have strict cyber laws –and my belief is they will be used for proactive offensive, retaliatory, and active defensive operations.


What does this mean?  I use a term that I heard David Awksmith use at a conference in Colorado a few years ago.  He used an economics term –disintermediation, to describe removing the middleman (middleman being the military) in cyber space. Why?  Old-school military leaders won’t give up their bullets, but the younger generation of officers are believers that cyber is a viable weapon, and non-kinetic, non-blood yielding options can have as good or better effects on many fronts than kinetic weapons.   We’ve seen the removal of the military middleman play out already in several cases, and even in those countries with strong national level computer emergency response teams, non-governmental victims who are attacked can suffer significant damage.  

·       In another, Privatbank, Ukraine’s largest commercial bank was hacked repeatedly because the owner of the bank spoke out against Putin and personally funded much of the Ukrainian resistance.
·       Voter election, tampering and monitoring of the telephone systems, use of traffic cameras and security webcams to collect intelligence, the ability manipulate through cyber connections to just about any controller, media outlet, and telephone system offer significant advantages.  


·       The leader of the Syrian Electronic Army is actually President Assad’s cousin. The SEA was created in as a result of, and for retribution for the assets of the Assad regime being frozen.  We’ve seen heavy SEA activity over the last twelve months, and from our perspective, we should expect to see more.
·       North Korea’s unit 121 is reported by the FBI to be the actor behind the Sony breaches.  Regardless of heavy public speculation on attribution, the activity certainly cost Sony –both hard and soft dollars, and the fight, if the FBI is correct, was military-on-private corporation, not military-on-military.
·       China has long believed to be using government sponsored cyber espionage units to target and exploit intellectual property residing in corporations outside of China.  State sponsorship (or, at a minimum, state countenance) of activities against global corporations suggests governments are targeting non-government victims when that non-government entity has something in their collection requirements.
·       The US Cyber Command nearly doubled its budget heading into 2015.   There should be no doubt that others will follow, if only to protect themselves against future cyber, SIGINT, and espionage activities.
There are some very strong positives.

First, the intelligence space is maturing nicely.  Not only are CISO’s becoming aware of the need for intelligence (even though risk models called for it years ago!), the idea that effort and spend can be prioritized by having great intelligence is a good thing. In fact, not only is it maturing, verticals are forming! 

Second, nearly every company that I wander into today either has a CISO or understands the need. That’s not to say they’ll all run out and hire one, but the awareness is there. I see this as a positive.  The ISO 27001 business is booming.  ISO isn’t going to stop determined adversaries, but it marks progress.  Again, I see this as a strong positive.


Risk scoring is qualitative, from 1-5 with one being low and 5 high. The model is simple. Overall risk scores are a simple un-weighted average of Risk, Probability, Impact, and Estimated Stage of Maturity. Leading indicators are Yes or No.



[1] Henrybasset.blogspot.com
[2] http://en.wikipedia.org/wiki/Ransomware
[3] http://en.wikipedia.org/wiki/Ransomware#mediaviewer/File:Metropolitan_Police_ransomware_scam.jpg
[4] https://www.usenix.org/sites/default/files/conference/protected-files/leet_ferguson_threats_preso.pdf
[5] http://www.theregister.co.uk/2014/12/12/sony_allegedly_targets_file_sharers_following_guardians_of_peace_hack/

Sunday, December 07, 2014

Netwitness Integration! AWESOME!!

We had our last Threat Day of the year the other day, and after the day ended, we were invited to see how a local group uses intelligence pulled from Red Sky Alliance and ThreatRecon.  They integrated it into Netwitness and it was VERY cool!

Apparently they parse everything that needs parsing, and pull from Threat Recon, drop it into Netwitness, and away they go.  When they pulled up the analysis screen, the proof was in the pudding. We had our share of hits for the day, and we started pulling.

We've heard stories - Maltego transforms, CRITS, Splunk, ThreatConnect and now Netwitness. To see it running operationally in someone's environment... This makes me really happy!

BT BT

On Friday we had the opportunity to speak with someone directly involved in Ukraine.  We'll definitely be updating our deck.  The guy definitely filled in some holes!

  • One of the things I heard was a story about how smart televisions were hacked to block channels and broadcast "aggressor" television.  
  • And the idea that webcams were hacked and used for intelligence doesn't surprise me, but to hear that someone non-military knew about it shocked me.  
In the US, we don't think about the fake fire hydrant with the we web cam built in or the unmarked traffic cams, but the idea that a civilian knows that someone uses these cameras to have up to the minute intelligence, correlating it with full monitoring in the telephone systems (landline and GSM)... wow.

BT BT

So we're heading into the end of the year.. Roughly three weeks left. As we head into the remainder of the year, we're putting on the push for final memberships and new Wapack Labs subscribers.
If you've been thinking about joining us, now's the time. We've been talking with a ton of folks who seemingly are anxious to get some last minute security spend before the years end, and we're happy to offer really good terms.

If you've been thinking about calling us, do it now.

Have a great weekend!
Jeff


Tuesday, November 25, 2014

13 strategies Ukrainian hacktivists use in their cyber war. Legal or tolerated.


Several Ukrainian hacktivist groups were (are) active on the Ukrainian side of the battle this year in their ongoing conflict with Russia. As Eugene Dokukin and his "Ukranian Cyber Forces" are pretty open on what they are doing, let's look at their 13 stragegies, as there appear to be striking similarities to what CyberBerkut is doing on the Russian side. Also interesting to consider is how these groups manage to keep doing things that are more than likely illegal in their countries, and how the military can use them when needed.

Background: “Ukrainian cyber forces and individual pro-Ukrainian hackers have maintained online attacks on all Internet resources linked to insurgents in the eastern part of the country, whom the Kyiv (Kiev) government deems as terrorists. As of early November, the cyber forces claimed to have downed 46 sites belonging to the breakaway pro-Russian states of the Lugansk People’s Republic (LNR) and the Donetsk People’s Republic (DNR) via multiple denial-of-service (DDoS) attacks. The cyber warfare operation, titled “Retribution,” has been ongoing since mid-2014. Last month, pro-Ukrainian hackers leaked secret documents from the DNR, representatives of Russian nationalist organizations in Crimea, and representatives of government agencies from the Russian Federation. http://uadn.net/2014/11/17/pro-ukrainian-cyber-forces-take-down-46-separatist-sites-and-target-online-money-accounts/

Pro-Ukraine hackers target e-currency accounts. The anti-insurgency cyber campaign has also moved beyond site attacks, with hackers targeting the financial networks of the DNR and LNR. A hacker at the forefront of pro-Ukraine cyber warfare efforts, Yevgeny Dokukin, has announced on his Facebook page that he managed to convince Russian online payment service Yandex Money to block the e-wallet of a notable group of DNR and LNR supporters last month. “Via my actions, I managed to stop the financing of terrorism through the Yandex Money system,” noted Dokukin via social media. However, fellow Russian electronic currency service WebMoney refused to cooperate with his blocking request. http://uadn.net/2014/11/17/pro-ukrainian-cyber-forces-take-down-46-separatist-sites-and-target-online-money-accounts/
UkrCyberForces.png
- screenshot with Ukrainian Cyber Forces logo from their Youtube channel.


In the article on uapress[.]info/ru/news/show/48475 Ukrainian Cyber Force leader Eugene Dokukin post 13 strategies his group was using in this cyber war during last 6 months.
  1. Hacking separatists and terrorists sites.
  2. Operation Retribution - blocking terrorists sites with DDoS attacks.
  3. Locking the accounts of terrorists in electronic payment systems.
  4. Operation CyberStorm – locking phones with short messages flood.
  5. Operation CyberHurricane - locking phones with calls flood.
  6. Operation “Restore the Truth” - editing Wikipedia to counter Russian propaganda.
  7. Operation “Blocked Freaks” - blocking blogs (particularly in livejournal) and sites of terrorists through support requests to livejournal and hosters.
  8. Operation Bender - calling terrorists with threats and misinformation.
  9. Operation “CyberStorm 2” - sending short messages with threats, disinformation and propaganda.
  10. Operation “Bond, James Bond” - espionage operation, which involves listening to and recording audio and video information from the various headquarters of terrorists and webcams in Donbass and Crimea.
  11. Operation “Turn off the Propaganda” - opposition to videos from terrorists on YouTube and other video hosting sites.
  12. Operation “Crimea is Ukraine” - the return of control over all the Crimean government sites (preferably all Crimean sites in the domain zone ua). And spreading propaganda in Crimea through these sites.
  13. Operation “Hunting for Trolls” - blocking accounts, pages and groups of terrorists and trolls in social networks.

As we can see some of these methods are copied from what (pro)Russian cyber forces were using earlier these year against Ukrainians. Like CyberShtorm, CyberStorm 2 and CyberHurricane are similar in effect to Telephony Denial of Service (TDoS) attacks that we reported earlier... Only this time it's the Ukrainian side which using it.

Eugene Dokukin is now open about his identity and gives interviews. When asked how they do things which are illegal according Ukrainian law he smiles: “Most of our work is legal. Closing accounts, websites and other resources of terrorists through complaints to electronic payment system, domain and hosting providers, etc. - it's all legal. The only question may arise about hacking: hacking sites, email and social network accounts, as well as DDoS attacks on websites terrorists. But officially, I don't know who of all of the fighters does it.” (http://uapress.info/ru/news/show/48475 - in Russian)

In general Eugene Dokukin says that there're three levels in his forces: those volunteers who do legal things like Wikipedia editing and writing complains to providers, those who do illegal but simple things like DDoS attacks and other flooding, and the highest level on his group are people who do real hacking.

Speaking about his enemies Eugene Dukinin cites SBU head Valentin Nalivaychenko information that in Russian
FSP 18th Special Center there are 1500 personnel working full day use automatic systems for social networks to send messages and texts spreading panic. (http://uapress.info/ru/news/show/48475 - in Russian)

  UkrCyberForces_MustLive_Dokunin.png
Eugene Dokukin (Yevgeny Dokukin, Rus. Евгений Докукин) aka MastLive

He has a “white hacker” background (http://www.interpretermag.com/hackers-join-in-the-struggle-for-crimea/). Before creating Ukrainian Cyber Forces Eugene Dokukin was active in March fighting Russian invasion. He hacked Crimean Parliament site and posted  "The referendum is canceled. Crimea continues to be a part of Ukraine. Everyone can go home, and Russian troops can return to their country." A few days later Dokukin also “dismissed” pro-Russian Crimean leaders Aksenov (prime-minister) and Konstantinov (speaker). Ukrainian Cyber Forces recent efforts to block pro-Russian financing claim to close 128 terrorists accounts with over 1 Million $. (http://uapress.info/ru/news/show/48475 - in Russian)

Ukrainian law enforcers know Eugene Dokukin and his group. They don't give him visible troubles for his activities which are not according to law. Neither they confirm he is working for the government. But speaking anonymously one of the law enforcers said to Focus.UA: “Intelligence agencies often use the services of hackers in exchange for a guarantee of immunity. This does not mean that it's how things are in the Dokukin's case. But one can easily frame him: the bank will order a security audit - "network vulnerability pentesting" and the contract is made. But one security officer in the bank is told about it, others - no. The latter, seeing the external interference, scanning and active attempts to crack, report to authorities about unauthorized access to the system. And then the hacker will be "proving long and tedious that he is white and innocent." ( http://focus.ua/country/319358/ - in Russian)

Posted by Wapack Labs EURASIA desk

Nov 25, 2014 9:35:58 PM

Monday, November 24, 2014

NATO cyber exercises & regional tensions

Wapack Labs tracks cyber activities between Ukraine and Russia with the idea that that there will be lessons that we can all learn from, taking those lessons to our defenses. This piece was published by an analyst in Wapack Lab's EURASIA analysis effort. The analyst, a non-English speaker has a rough writing style but the content always offers amazing insights. 


Enjoy.
Jeff

NATO cyber exercises & regional tensions

Published 11/24/14

Annual NATO cyber exercises "Cyber Coalition 2014" attracted a lot of attention: NATO estimates global cyber crime makes a profit of $1 TRN a year - equivalent to the narcotics trade. NATO's computer servers are detecting 200 million suspicious cyber events every single day, the alliance has revealed. On average the military organisation is the victim of five major cyber attacks each week and that has increased "significantly" since Russian aggression in Ukraine started. https://uk.news.yahoo.com/natos-cyber-war-games-amid-surge-attacks-020403587.html

http://img.rt.com/files/news/21/49/80/00/8.si.jpg
NATO carried out its biggest ever cyber security exercise involving hundreds of computer analysts. The three-day event, taking in 28 nations, was held on a former Soviet base in the city of Tartu, close to the Russian border. Estonia, the host nation, was attacked by Russian hackers in 2007. Banking systems, newspaper production and national websites were all affected. Since then the country has invested heavily in cyber capability and is now one of the leading nations in NATO. Estonia's president Toomas Hendrik told Sky News his country had notice a surge in attacks since Russian aggression increased in Ukraine. He also revealed there had been a recent major attack on the country, but declined to reveal specifics. https://uk.news.yahoo.com/natos-cyber-war-games-amid-surge-attacks-020403587.html

The three-day cyber defence exercise Cyber Coalition 2014 tested the Alliance’s ability to defend its networks from the various challenges. It involved over 670 technical, government and cyber experts operating from dozens of locations from across the Alliance and partner nations. For the first time, representatives from academia and industry had been invited as observers. https://ccdcoe.org/centre-contributes-natos-largest-ever-multinational-cyber-defence-exercise.html


Financial Times in the article “Nato holds largest cyber war games” gives the idea of exercises and connection to Russian-Ukrainian military conflict:


From barracks in Tartu, a team of around 100 soldiers and intelligence officials on Monday began throwing sophisticated technical attacks at NATO teams across Europe and North America: Troops’ android phones were hacked after a downloadable app turned out be hiding sophisticated malware; an imaginary supplier of military equipment was found to have had its own manufacturing process compromised, with security loopholes built into its computer chips; a Nato emergency response team was flown to Greece after one scenario in which the attackers succeeded in seizing control of the systems running Nato’s Awacs surveillance aircraft – one of the alliance’s most prized possessions.

In a particularly lurid cyber storyline, a senior NATO officer had his family kidnapped and was then blackmailed into stealing huge amounts of classified data from the alliance’s secure military networks.

“Eventually,” said Luc Dandurand, deputy director of the exercise, “[the participants] work out that all these attacks are coming from a single entity – it’s all from one nation state.”  Officially, the attacker was meant to be disrupting a Nato mission in a fictitious, war-torn state in the Horn of Africa. In reality, the scenario was a thinly disguised version of the threats confronting the alliance as a result of the crisis in Ukraine. Russia, though never mentioned, loomed large.  In one simulated attack, for example, the classified communications of the general in charge of the fictitious Nato deployment were hacked. The hackers then leaked the information to a global newspaper, which promptly published the Nato military chief’s private declaration that the war was unwinnable.

That was eerily reminiscent of an episode in Kiev in February when a candid conversation between US assistant secretary of state Victoria Nuland and Washington’s ambassador to Ukraine, Geoffrey Pyatt, was secretly recorded and leaked to the press.
http://www.ft.com/intl/cms/s/0/9c46a600-70c5-11e4-8113-00144feabdc0.html

Monday, November 17, 2014

Why Manufacturing?

I spent a day over the weekend with a good friend.  I told him that we'd done an incident response on
http://www.exelisinc.com/
a small manufacturing company.  He asked what they did, and I told him that they work with aluminum, and they manufacture all kinds of things, including heat sinks for various components.

Why do you ask? I asked him.

And then he explained something in a way, with a new perspective that I hadn't thought of.  My (simple) assumption was that the intellectual property was the target, but this guy, a technologist presiding over a large manufacturing company assured me that my assumption was flawed. Here it is...

So this company manufactures heat sinks. My assumption was that attackers wanted the heat sinks. NOOOO!

Think complex.  Heat sinks are manufactured to run coolant through channels that are cut into the metal. They may be really small, but at electrically significant spacing. This precision is incredibly hard to do.  Attackers don't want the fish, they want to learn how to fish! They want to learn how to do this type of precision machining so they can pump them out themselves.

The same holds true with optics --lasers, scopes, and any kind of high precision optic grinding. They want the process.

I feel like I've been whacked in the head to make the lightbulb come on!

Friday, November 14, 2014

Introducing Rod Castillo, Managing Director for OEM and Integration

It's been a heck of the week, and I'm happy as a hatter knowing we brought on a new Managing Director in the Lab this week.

Rod Castillo is handling our OEM Integration projects for Threat Recon.  We've had an enormous amount of interest in companies hitting the Threat Recon API, and with nearly a dozen integrations in the works, it seemed like the right time to bring someone in to assist.

Rod comes at this from an application security background. We worked together years ago at PwC.. my stint was much shorter than his.  Since then, he's been the CISO for Wyndham Hotels, and a consultant for Level 9, and now takes on a new role with us as Managing Director for OEM Integration, Wapack Labs.

We're bringing him up to speed, but he's a heck of a nice guy, smart as hell, and ready to jump in and assist in getting Threat Recon integrated into your environment. Check him out on Linkedin. Rod can be reached at rcastillo@wapacklab.com.


Thursday, November 13, 2014

What's old is new again! Pay no attention to the Russian spyplanes!

I never did receive my Cold War medal, but heck, these days it's pretty much an afterthought for me anyway. I've got to laugh however. I'm preparing to do a talk next week in Pittsburgh. It's going to focus on the Ivanof doctrine and show up to date timing on how Putin does "new generation" warfare... and phase two of this plan calls for a deception plan --a rouse --to take the focus off of his real objective. Today, that objective is regaining control over pipelines in Eastern Ukraine.

They've been buzzing Sweden. Lost a sub on a fiber node off the coast of Stockholm, and today announced we'll start seeing Bears flying off the east coast.

NATO has upset Putin with their anti-Russian sentiment? Imagine that.


Tuesday, November 11, 2014

What is Movember?

I've been asked several times in the last week or so "Why are you growing that ugly beard?"

I've been asked if I was homeless, so I finally got a good haircut (manscaping?) to make sure that even with the spotty facial hair that comes from what my grandmother used to tell us was the American Indian side, I still look gooooooooooooddddddd.

So on that... what is Movember, and why is Stutzman going with the homeless look? Because it sparks conversation around men's health. And if you want to contribute money and be involved, check out the official Movember website. It's the real deal. And when you've got family members (like I do) who currently have prostrate cancer, and you think about it every day because the guy is eight months older than me, and you wonder what it must be like to be 52 years old and going through this, the idea of growing facial hair (mine really is bad) for a month to generate conversation is a small price to pay, and maybe, just maybe, it'll help someone.

So when you see me in MD/DC this week, or in Pittsburgh next --I'll be on the podium at a the NIST conference at Pitt --and chuckle at my feeble attempt to show support, know this.. it's for a really good reason... stop me and ask me about it.

Thursday, November 06, 2014

Automating Victim Notifications - 1800 unique victims notified today

Wapack Labs has been running sinkholes since early April of this year. Up until recently we have been performing manual victim notifications however recent activity forced us to automate. Two recently sink-holed domains started generating a large quantity of traffic. One was from an old worm that has been around since 2010 but is apparently still
propagating.

http://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=Worm:Win32/Esfury

The second is from a malware variant detected as Troj/Neurevt-K

http://www.sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/Troj~Neurevt-K/detailed-analysis.aspx

In less than a week of monitoring, a total of 19561 victims checked into our sinkhole. Amongthe total victims, there were approximately 1800 unique networks and/or ISPs. As part of the notifications, we are providing the victim data, destination domains and timestamps of activity. If you received one of these notifications and need more clarification, shoot us a note at notifications[at]wapacklabs.com.

Jeff

The sh*t heading toward the fan? North Korea and nuke weps?

It should come as no surprise that North Korea is building nuclear weapons, and, it should come as no surprise that they'd probably like to use them on American targets and local neighbors (although the fallout would probably head north with the wind... I'm not sure they're ready for mass radiation poisoning.).. so I'll assume they're being made for American targets.

Im curious... were the PLCs made by Siemens?



Wirelurker?

For all of you Mac users (like me) and IOS users (not like me, but there are a ton of you), Wirelurker is new interesting in the threat category.  Palo Alto published a great tech piece on the new malware, but didn't do a great job of telling what it does and why it's bad, so here you go...

It's bad. It's another class of malware that opens your system up for access by outsiders. For the non-geeks reading this, know this... you need to check for it, and if you've got it, get rid of it.

The Palo Alto report can be found here.

They've also published a script that can be used to check your system. It's easy to use. Copy and paste the commands into Terminal and hit enter. I've copied the Palo Alto's instructions from their GitHub below.

Usage
  1. Open the Terminal application in your OS X system;
  2. Execute this command to download the script:
  3. Run the script in the Terminal:
    python WireLurkerDetectorOSX.py
  4. Read the output messages and detection result.
For any issue on the code and its result, please create a issue here:https://github.com/PaloAltoNetworks-BD/WireLurkerDetector/issues

Wednesday, November 05, 2014

This is AWESOME!! AirHopper - Hacking via FM Radio signals!

THIS IS AWESOME! Do you have any idea how many times I've fired up my shortwave radio and
listened to some far away place (from a really secure place --if course it was an approved device --I'm just sayin!) just for some entertaining white noise while I focused on something else?  And no, I don't trust internet radio to not place something on my machine --intentionally or unintentionally!

I'm a huge fan, and a long time amateur radio operator.  This really takes me back.  I remember (ahem, hypothetically of course) clipping the band pass filters on my 2 and 6 meter rigs to listen in on other frequency ranges (I won't say which ranges); screwing with a Sun Sparq 20 generating packet radio in early experiments between routers and repeaters (some even worked!), but the idea of hacking a computer via frequency modulation (FM radio signals) is AWESOME! In my minds eye I can see some ways this would be logical, but never thought I'd see the day.  Pay attention folks! The game changes yet again, and neither air gapping or disabling internet connections is going to help! Ah yes, radio frequency. Gotta love it!

Where do they come up with this stuff??

You've got to check out the video! (of course, at your own risk!)


Monday, November 03, 2014

SCHWEEEEETTT

You've heard me say it before. I'm a believer that if someone breaks into my home in the middle of the night and threatens me or my family, I should have the right to defend myself, my family, and my
property. And I'm a believer that my second amendment rights should extend to cyber space as well.  If someone breaks into my computer in the middle of the night, not only should I have the ability to defend myself, but also fight back. There will be consequences for sure, and when hitting someone bigger, faster, or smarter, I may just get my clock cleaned. And if I shoot and hit the wrong guy, well, again, consequences...

So why the heck are we sitting back taking it? Well, at least one country believes enough is enough. The Netherlands says that they will start hacking back in 2015. Good, bad, right, wrong, or indifferent as you might think, my feeling is this opens up a whole new can of worms. I think it's a game changer.