11.07.2015 Views

W7y8w3

W7y8w3

W7y8w3

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

LebanonSurveilling the banking sector in LebanonMireille RaadIntroductionMany argue that online privacy is a human right,while others insist that it is a negotiated contractbetween the state and its citizens – a contract inwhich citizens exchange some of their data in returnfor national security. So in theory – and in an ‘‘idealstate’’ – citizens could rely on the protection of theirhome governments to ensure their physical safetywhile also preserving their online privacy of communications,transactions, identities and speech.But to what extent can states really uphold thiscontract?In Lebanon, there is an odd “ideal law” onbanking secrecy dating back to 1956. This law didnot create secrecy as a privilege to be enjoyed bybanks, but as a duty that banks operating in thecountry must observe. Violation of banking secrecyis a criminal offence. However, in June 2012, KasperskyLab announced the discovery of “Gauss”, acomplex state-sponsored cyber-espionage toolkittargeting major banks in Lebanon and parts of theMiddle East. Gauss is designed to steal sensitivedata, with a specific focus on browser passwordsand online banking account credentials.This cyber violation violates the Lebanese bankingsecrecy law and is a direct attack on a nation’ssensitive financial transactions and a critical economicorgan: the banking sector is one of the fewstable sectors in Lebanon and, as many argue, oneof the sectors stabilising the economy. If the bankingsector collapsed, the country might fall intochaos, experts say. 1Due to the complexity and similarities betweenGauss and malware like Stuxnet, Flame, Duqu andothers, fingers pointed at the United States (US)and Israel, accusing them of being behind Gauss.1 Dockery, S. (2012, August 11). Virus plunges Lebanon intocyber war. The Daily Star. www.dailystar.com.lb/News/Local-News/2012/Aug-11/184234-virus-plunges-lebanon-into-cyber-war.ashx#ixzz33c7Yh200BackgroundLebanon is a very small country. [...] Not much you cando. It is up to major international bodies, like the UN[United Nations], Human Rights Commission or the EU[European Union] or the American people themselvesto ask for a change in this behavior. 2 –Lebanese TelecomMinister Nicolas Sehnaoui commenting on theEdward Snowden/National Security Agency (NSA)leaks in June 2013.This blunt quote illustrates the simple reality thatmany developing countries face in a digital agewhen large-scale mass surveillance and spying ondetailed data and sensitive transactions become anact of daily nation bullying. This problem is only accentuatedby a digital divide, where most servicesand servers reside in developed countries; not tomention that only rich countries can actually “afford”to own and operate systems that allow themto perform such acts of mass privacy violation fromthe comfort of their “homeland”.Sehnaoui’s quote comes as no surprise sinceLebanon, like much of the Middle East, has a difficultrecent history – it is a small diverse countryamid big regional powers. Frequent invasions ofthis country date back to the Assyrians, Persians,Greeks, Romans, Arabs, Fatimids, Crusaders, OttomanTurks and most recently the French and Israelis.Recently, Lebanon has also been a focal pointof larger geopolitical rivalries in the region betweenIran, Saudi Arabia, Syria, Palestine, the GulfStates and of course Israel and the US. So it standsto reason that there is a long history of strugglingagainst external spying on telecommunications andinternet servers, with more than a hundred peoplearrested for collaborating with and spying for foreignstates since April 2009. 3Tracking the malwareIn June 2012, Kaspersky Lab 4 announced the discoveryof a malware toolkit spreading in Lebanon and2 Al Saadi, Y. (2013, June 13). The NSA Global Surveillance andLebanon: ‘Not Much We Can Do’. Al-Akhbar. english.al-akhbar.com/node/161073 Ibid.4 Kaspersky Lab is a Russian multinational computer securitycompany and the world’s largest privately held vendor of softwaresecurity products. https://en.wikipedia.org/wiki/Kaspersky_Labparts of the Middle East. This discovery was madepossible only after knowledge gained by in-depthanalysis and research conducted on the Flame 5malware.The toolkit had different modules named afterfamous mathematicians and philosophers likeGodel, Lagrange and Gauss. The module named“Gauss” implements the data-stealing capabilities.The Kaspersky investigation estimated that Gaussbegan operations in mid-2011. Its infiltration intosystems is conducted in a controlled and targetedfashion, ensuring stealth and secrecy.The main functionality of the malware includes:• Intercepting browser history, cookies andpasswords.• Harvesting and sending detailed system configurationsof infected machines, includingspecifics of network interfaces, computer drivesand BIOS. 6• Infecting USB sticks (flashdrives) with adata-stealing module using the same LNK vulnerabilitythat was previously used in Stuxnetand Flame, but in a more “intelligent” way thatunder certain circumstances is capable of “disinfecting”the drive.• Listing the content of the system drives andfolders.• Stealing credentials for various banking systemsin the Middle East (Bank of Beirut, EBLF,BLOM Bank, Byblos Bank, Fransabank and CreditLibanais). It also targets users of Citibank andPayPal. The online banking Trojan functionalityfound in Gauss is a unique characteristic thatwas not found in any previously known cyberweapons.• Hijacking account information for social networks,email and instant messaging accounts.• Installing a font called “Palida” with an unknownobjective, but speculations suggest it isused to remotely detect infected machines.• Using advanced techniques for handling hightraffic load balancing, load distribution andfault tolerance known as Round-robin DNS 7 –which suggests that the makers of the malwarewere expecting high traffic volumes.5 Flame is arguably the most complex malware ever found, and isused for targeted cyber espionage in Middle Eastern countries.https://en.wikipedia.org/wiki/Flame_(malware)6 The fundamental purposes of the BIOS are to initialise and test thesystem hardware components and to load the operating system.https://en.wikipedia.org/wiki/BIOS7 https://en.wikipedia.org/wiki/Round-robin_DNS• An encrypted code with an unknown objective.• Communication with command and controlservers.The above technical specifications clearly connectGauss to Flame – Flame is connected to Stuxnet– which prompted Kaspersky Lab to call it a “nationstatesponsored cyber-espionage toolkit” 8 ratherthan a tool for criminal theft – something that givesGauss a geopolitical dimension.Once the news of the malware broke, the LebaneseCentral Bank 9 issued a note to all commercialbanks to take the necessary measures to protectcomputer systems. Some bankers confidently saidthat they are not concerned about any virus, insistingthat they had nothing to hide. “Let them [theAmericans] browse our accounts. They won’t findanything suspicious because all our clients arewell-known,” one banker told The Daily Star, 10 whileanother denied the existence of the virus altogether.The head of the IT department in the CentralBank of Lebanon said that the Lebanese banks hadupgraded their software security systems to blockany virus designed to spy on transactions and operations:“The anti-virus program blocks all knownviruses and this has been going on for a long time.But the Gauss virus did not have time to inflict harmon the systems,” he said. 11However, a group of independent security professionalswho claim having first-hand experiencedealing with the Gauss malware in Lebanese banksissued a statement 12 that was published on severalLebanese blogs. It stated that banks are still vulnerable,and raised the concern that by conveyingsimplistic views about Gauss, the banking sector isnot truly willing to fight back.ConclusionTechnology trumps all. In a borderless interconnectedcyberspace, states – even the most tech-savvy ones –are seldom able to uphold contracts they make withtheir citizens on digital rights, even if they want to.This claim is backed by stories from across the globe,8 Kaspersky Lab. (2012, August 9). Kaspersky Lab discovers ‘Gauss’– a new complex cyber threat designed to monitor online bankingaccounts. Kaspersky Lab. www.kaspersky.com/about/news/virus/2012/Kaspersky_Lab_and_ITU_Discover_Gauss_A_New_Complex_Cyber_Threat_Designed_to_Monitor_Online_Banking_Accounts9 https://en.wikipedia.org/wiki/Banque_du_Liban10 Habib, O. (2012, September 14). Lebanese banks develop antivirussystem. The Daily Star. www.dailystar.com.lb/Business/Lebanon/2012/Sep-14/187818-lebanese-banks-develop-anti-virussystem.ashx#axzz3AFd4RS4h11 Ibid.12 www.plus961.com/2012/10/no-our-banks-are-still-vulnerable-tocyber-attacks166 / Global Information Society Watch lebanon / 167

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!