12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CYBER WAR AGAINST THE CORPORATE WORLD: A CASE STUDY OF CYBER INTRUSION131AccessData movedData downloadedControlsCompromised workstationStaging server(e-mail)Data copiedExfiltration hostExternal Webserver (underhacker control)C2 ComputerControlsCompany Y filerserverData copiedAccess Data moved Data downloadedCompromised workstationStaging server(e-mail)Exfiltration hostExternal Webserver (underhacker control)Perimeter of Company Y’s networkFIGURE 7.3 Diagram of the exfiltration route from the case study of Operation X on Company Y.success of the operation. After several of the files were exfiltrated outside the perimeter ofCompany Y’s network, security professionals detected the operation and s<strong>to</strong>pped itmidsession. For 5 h after the security personnel s<strong>to</strong>pped the exfiltration, Company Y’s networkstill received attempts from the hackers <strong>to</strong> return. Although it seems as if the hackersfelt they had not met their objectives, the security professionals were unable <strong>to</strong> determine theintended scope of Operation X. Further, as previously discussed, there was no way <strong>to</strong> identifywhat data were actually s<strong>to</strong>len (Figure 7.3).Evidence of Chinese InvolvementAs with Titan Rain, the evidence of Chinese involvement is circumstantial at best—thereare only indica<strong>to</strong>rs, but no direct proof. The main indica<strong>to</strong>rs of their involvement are someperceived slip ups of the cyber spies. For instance, due <strong>to</strong> the specific <strong>to</strong>ols and techniquesused, certain activities on Company Y’s network attributed <strong>to</strong> the reconnaissance phase ofOperation X originated from PRC IP addresses. During exfiltration, one of the external machinesthat compromised a workstation in Company Y used as a “C2” machine was located inHong Kong.In addition <strong>to</strong> these blunders, the techniques, <strong>to</strong>ols, and operational profile of the attackwere consistent with other attacks believed <strong>to</strong> originate from China during this time period(most likely attacks associated with Titan Rain). Further, the fact that the data were s<strong>to</strong>len

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!