12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

166 8. DUQU, FLAME, GAUSS, THE NEXT GENERATION OF CYBER EXPLOITATIONAdditionally, the client software, which would be installed on desk<strong>to</strong>p computers containinginformation that the controllers wished <strong>to</strong> extract, was focused in specific geographic areas.Where Duqu is deployed is also a choice wholly left up <strong>to</strong> its controllers, so where it is found isindicative of, <strong>to</strong> a least a broad degree, the type of information that its opera<strong>to</strong>rs are looking <strong>to</strong>steal. Kaspersky reported finding Duqu only in Iran and in Sudan. 17Kaspersky, while researching the command and control structure for Duqu, discoveredthat at least 12 command and control servers had been used by the controllers of Duqu overthe past 3 years. On every server that Kaspersky examined, large portions of informationrelevant <strong>to</strong> Duqu’s activities had been erased days prior. This action does communicatea signal—the controllers of the operation were cognizant of their exposure and were willingand capable <strong>to</strong> take actions <strong>to</strong> mitigate the compromise. 18TDL3 AND OTHER MALWAREThere are other pieces of malicious software that are multistage and perform injection. TheTDL3 rootkit (ca. 2009) included many of the features that Stuxnet and Duqu possess. TDL3used a nonpublic exploit in Windows <strong>to</strong> elevate its privilege <strong>to</strong> kernel-mode in a way thatbypassed antivirus software. TDL3 would also make changes <strong>to</strong> existing device drivers presen<strong>to</strong>n the operating system that would cause TDL3 <strong>to</strong> load and start every time the operatingsystem loaded. TDL3 is a generic rootkit framework that allows cus<strong>to</strong>mers who purchase theTDL3 software from its authors <strong>to</strong> assemble malware that can be installed on<strong>to</strong> compromisedcomputers for a variety of reasons. Some pieces of malware that are built using TDL3 are informationstealers, while others send spam or attempt <strong>to</strong> entice the user of the compromisedcomputer <strong>to</strong> purchase fake antivirus software.TDL3 evaded detection by exploiting a weakness in the algorithm that antirootkit technologiesuse. TDL3’s successful evasion of detection was the result of studying antivirussoftware’s responses <strong>to</strong> previous rootkits and exploiting weaknesses in those responses. 19The media has emphasized these and other advanced techniques that are employed byDuqu, but when viewed alongside other pieces of malware, the techniques used by Duqudo not seem particularly advanced, while many other successful pieces of malware incorporatesimilar effective techniques.OBJECT-ORIENTED MALWARE: STUXNET, DUQU, FLAME,AND GAUSSOne aspect about Duqu and Stuxnet that has led some researchers <strong>to</strong> consider the twopieces of malware as “cousins” is that both pieces of software were written with the extensiveuse of a paradigm known as object-oriented programming (OOP). In more traditional methodsof computer programming, software is designed <strong>to</strong> resemble a series of tasks that the computermust accomplish <strong>to</strong> achieve a desired outcome. In object-oriented programming, onthe other hand, the programmer creates objects that manipulate data in various ways <strong>to</strong> reacha desired end state. One of the main advantages <strong>to</strong> using the object-oriented approach is that itis easier for a developer <strong>to</strong> create and maintain a large and complex piece of software. The use

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!