12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

142 7. WHY CYBER ESPIONAGE IS A KEY COMPONENT OF CHINESE STRATEGYLeveraging Legitimate Web Sites for Data ExfiltrationThe investiga<strong>to</strong>rs assess that, as with Gh0stNet, the hackers behind the Shadow Networkrelied on spear phishing in order <strong>to</strong> gain access <strong>to</strong> targeted systems. They observed that thehackers used files such as Adobe Acrobat (PDF), Microsoft PowerPoint (PPT), and MicrosoftWord (DOC) that contained Trojans that exploited one of several vulnerabilities. Althoughthe vulnerabilities used by PPT and DOC files were older and hence better known, thePDF files used weaknesses that had been addressed by Adobe only several weeks prior <strong>to</strong>the infection. Hence, though a counter measure was available, it clearly was not in placein the Tibetan information systems due <strong>to</strong> its (then) very recent development.When the researchers examined the actual malware installed by the Trojans, they noticed asignificant departure from what they found in Gh0stNet. In several of the infected systems,the investiga<strong>to</strong>rs found that the Shadow Network hackers were not relying on a simplecommand-and-control server or even a proxy there<strong>to</strong>, but were rather using popular Web sitessuch as Yahoo! Mail and Twitter <strong>to</strong> add a layer of communication <strong>to</strong> the target system. For instance,several computers were found <strong>to</strong> connect <strong>to</strong> Yahoo! Mail. The hackers interfaced directlywith a Yahoo!’s e-mail inbox using the associated application program interface (API)—the set ofsoftware libraries intended for the development of legitimate applications <strong>to</strong> access Yahoo!Mail. Using this communication with Yahoo! Mail, the infected computer periodically used aparticular e-mail account <strong>to</strong> send and receive messages. In a scheme of direct communication,the hackers would send e-mails <strong>to</strong> the target machine, which contained executable code (computercode that is capable of actually running a piece of software) directing the computer <strong>to</strong> dofurther actions. These actions functioned similarly <strong>to</strong> the capabilities provided <strong>to</strong> the Gh0stNethackers in the administrative interface of their command-and-control (C&C) servers. The investiga<strong>to</strong>rsanalyzed this executable code and found that it directs the target <strong>to</strong> download anotherpiece of malware from a Web site publically hosted on a Google server. This malware, in turn,connected <strong>to</strong> another C&C server in order <strong>to</strong> download several files disguised as digital images,which allowed it <strong>to</strong> connect <strong>to</strong> the Tor anonymity network. 68 This network is used by individualsdesiring anonymity such as journalists, law enforcement, and human rights activists. Tor is ananonymity system that uses a special pro<strong>to</strong>col known as Onion Routing <strong>to</strong> hide the origin ofthe sender. A message sent on the Tor network relies on a series of servers <strong>to</strong> route the message<strong>to</strong> its destination. A given message travels from an “entrance node” <strong>to</strong> an “exit node.” Thesender’slocationisonlyknown<strong>to</strong> the“entrancenode” and thedataareencrypteduntiltheyreachthe “exit node” (full details of this pro<strong>to</strong>col can be found in Goldschlag et al. 69 ). Although the exitnode has no memory of the original sender, it passes on the original, unencrypted message. Theresearchers from Information <strong>Warfare</strong> Moni<strong>to</strong>r referred <strong>to</strong> a study by Dan Egerstad 70 where heexamined network traffic leaving an exit node in the Tor network. He identified information,apparently from embassies belonging <strong>to</strong> countries such as Australia, Japan, Iran, and India.Based on his conversations with some embassy personnel, Egerstad suspected that someonehacked the accounts of the embassy personnel, sent data through Tor, and then eavesdroppedon the exit nodes. In this way, he could capture the data in a stealthy manner, as the locationof the eavesdropper would not be in the Tor network path. It is possible that members of theShadow Network were using Tor in a similar manner <strong>to</strong> exfiltrate data from their targets.Yahoo! Mail was not the only legitimate Web site being misused by members of theShadow Network for data exfiltration. The Information <strong>Warfare</strong> Moni<strong>to</strong>r investiga<strong>to</strong>rs found

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!