25.07.2019 Views

International Cyber Terrorism

International Cyber Terrorism

International Cyber Terrorism

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

include Endgame, Inc. and Netragard of the United States and Vupen from<br />

France. State intelligence agencies often have their own teams to develop cybercollection<br />

tools, such as Stuxnet, but require a constant source of zero-day exploits in<br />

order to insert their tools into newly targeted systems. Specific technical details of these<br />

attack methods often sells for six figure sums.<br />

Common functionality of cyber-collection systems include:<br />

• Data scan: local and network storage are scanned to find and copy files of<br />

interest, these are often documents, spreadsheets, design files such as Autocad<br />

files and system files such as the passwd file.<br />

• Capture location: GPS, WiFi, network information and other attached sensors are<br />

used to determine the location and movement of the infiltrated device<br />

• Bug: the device microphone can be activated in order to record audio. Likewise,<br />

audio streams intended for the local speakers can be intercepted at the device<br />

level and recorded.<br />

• Hidden Private Networks that bypass the corporate network security. A compute<br />

that is being spied upon can be plugged into a legitimate corporate network that<br />

is heavy monitored for malware activity and at same time belongs to a private wifi<br />

network outside of the company network that is leaking confidential information<br />

off of an employee's computer. A computer like this is easily set up by a doubleagent<br />

working in the IT department by install a second Wireless card in a<br />

computer and special software to remotely monitor an employee's computer<br />

through this second interface card without them being aware of a side-band<br />

communication channel pulling information off of his computer.<br />

• Camera: the device cameras can be activated in order to covertly capture images<br />

or video.<br />

• Keylogger and Mouse Logger: the malware agent can capture each keystroke,<br />

mouse movement and click that the target user makes. Combined with screen<br />

grabs, this can be used to obtain passwords that are entered using a virtual onscreen<br />

keyboard.<br />

• Screen Grabber: the malware agent can take periodic screen capture images. In<br />

addition to showing sensitive information that may not be stored on the machine,<br />

such as e-banking balances and encrypted web mail, these can be used in<br />

combination with the key and mouse logger data to determine access credentials<br />

for other Internet resources.<br />

• Encryption: Collected data is usually encrypted at the time of capture and may be<br />

transmitted live or stored for later exfiltration. Likewise, it is common practice for<br />

each specific operation to use specific encryption and poly-morphic capabilities<br />

Page 68 of 174

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!