12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

58 5. CYBER ATTACK AGAINST INTERNAL DISSIDENTSare usually visited by dissidents. Most botnets allow the botmaster not only <strong>to</strong> control the botsfor a DDoS but also access <strong>to</strong> their systems. Hence, the ICA might as well gather informationon dissident systems.Who Controls the ICA?All that is currently known for sure about the ICA is that they are a pro-Iranian hackergroup, which has performed the aforementioned attacks. Though there has been no real evidenceshowing them <strong>to</strong> be subordinate <strong>to</strong> the Iranian government, an Iranian dissident Website known as “The Green Voice of Freedom” claims that the ICA was created in 2005 as par<strong>to</strong>f the Iranian Revolutionary Guard Corps (IRGC). The “Green Voice” also asserts that theIranian government forced hackers in<strong>to</strong> the ICA by threatening with imprisonment. 123 Analternate hypothesis ponders that the ICA is actually a Russian group—not Iranian. The Centerfor Strategic and International Studies (CSIS) rejects this notion, stating that the domainname hijacking efforts are a lower skill-level attack—as opposed <strong>to</strong> the technical prowess heldby Russian hackers. 124 However, the CSIS analysis does not take in<strong>to</strong> account that the organizationlikely used the domain name hijacking efforts <strong>to</strong> create a botnet.Alleged Iranian Botnet StrikesWhether or not the ICA is affiliated with the Iranian government, one thing is clear:the hacking group launches cyber attacks that align well with the politics of the currentIranian regime. Therefore, if the ICA or other pro-government Iranian hackers were working<strong>to</strong> build a botnet, we would suspect the targets <strong>to</strong> be political in nature. In the fall of 2012,botnet DDoS attacks occurred against several major U.S. banks including Bank of AmericaCorp., JPMorgan Chase & Co, Wells Fargo & Co, U.S. Bancorp and PNC Financial Services. 125Security researchers concluded that the attacks were the work of a botnet.In late September, a group identifying itself as “The Izz ad-Din al-Qassam <strong>Cyber</strong> Fighters”posted a declaration on Pastebin. j They stated that the DDoS attacks against the banks werepart of what they called “Operation Ababil” (“Swallow”). The “<strong>Cyber</strong> Fighters” claimed thatthe attacks were in response <strong>to</strong> the low-budget anti-Islamic video “Innocence of Muslims”that s<strong>to</strong>ked the ire of the Muslim world. 126 However, U.S. Sena<strong>to</strong>r Joseph Lieberman publicallydisagreed with this motivation, stating that he believed the attacks <strong>to</strong> be sponsored bythe Iranian government and executed in response <strong>to</strong> increased economic sanctions against theIslamic Republic. 127The attack on the American banks was not the only cyber operation in the fall of 2012 thatwere claimed by hackers on Pastebin and attributed <strong>to</strong> Iran. In August, the Saudi Arabian oilfirm Saudi Aramco revealed that it was a victim of a cyber attack that led <strong>to</strong> 30,000 of its workstationsbecoming disabled. The attack was the result of a piece of malware that erased themaster boot record (MBR) of the target systems which would cause them <strong>to</strong> be unable <strong>to</strong> startup. 128 The Master Boot Record is the first part of the hard drive that is accessed when aj Pastebin is a site used by hacker groups <strong>to</strong> post unattributed communication. Hackers from the groupAnonymous often use this site. We discuss this more in Chapter 6.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!