36
Iftach Ian Amit | November 2010 www.security-art. com All rights reserved to Security Art ltd. 2002-2010 Cyber[Crime|Terror] Links between crime and terror on the cyber front: analysis and mitigation strategies Iftach Ian Amit VP Business Development, Security Art Board Member - CSA Israel IL-CERT Dreamer

Cyber Terror ICT Conference

Embed Size (px)

DESCRIPTION

Mapping connections between CyberCrime and CyberTerrorism groups.Reviewing mitigation factors on the nation-state level and international treaties and strategies that will thwart terrorism and state sponsored cyber offense.

Citation preview

Page 1: Cyber Terror ICT Conference

Iftach Ian Amit | November 2010

www.security-art.com

All rights reserved to Security Art ltd. 2002-2010

Cyber[Crime|Terror]Links between crime and terror on the cyber front: analysis and mitigation strategies

Iftach Ian AmitVP Business Development, Security ArtBoard Member - CSA IsraelIL-CERT Dreamer

Page 2: Cyber Terror ICT Conference

Iftach Ian Amit | November 2010

All rights reserved to Security Art ltd. 2002-2010 2

So, I heard that crime has something to do

with state?You heard right...

Page 3: Cyber Terror ICT Conference

Iftach Ian Amit | November 2010

All rights reserved to Security Art ltd. 2002-2010 3

Page 4: Cyber Terror ICT Conference

Iftach Ian Amit | November 2010

All rights reserved to Security Art ltd. 2002-2010 4

Page 5: Cyber Terror ICT Conference

Iftach Ian Amit | November 2010

All rights reserved to Security Art ltd. 2002-2010 5

Hungry yet?That was just the appetizer...

Page 6: Cyber Terror ICT Conference

All rights reserved to Security Art ltd. 2002-2010

Iftach Ian Amit | November 2010

6

CyberWar

“Cyberwarfare, is the use of computers and the Internet in conducting warfare in cyberspace.”

Wikipedia

Page 7: Cyber Terror ICT Conference

All rights reserved to Security Art ltd. 2002-2010

Iftach Ian Amit | November 2010

7

It did not happen yetBeing an exceptionEstoniaGeorgiaTitan RainIndiaGoogleAdobe

Page 8: Cyber Terror ICT Conference

Iftach Ian Amit | November 2010

All rights reserved to Security Art ltd. 2002-2010 8

Many faces of how CyberWar is perceived...

From McAfee’s “Virtual Criminology Report 2009”Image caption:

“countries developing advanced offensive cyber capabilities”

Page 9: Cyber Terror ICT Conference

Iftach Ian Amit | November 2010

All rights reserved to Security Art ltd. 2002-2010 9

CyberWar - AttackHighly selective targeting of military (and critical) resourcesIn conjunction with

a kinetic attackOR

Massive DDOS in order to “black-out” a region,

disrupt services, and/or push political

agenda (propaganda)

Page 10: Cyber Terror ICT Conference

All rights reserved to Security Art ltd. 2002-2010

Iftach Ian Amit | November 2010

10

CyberWar - Defense

•Never just military

• Targets will be civilian

• Physical and logical protections = last survival act

•Availability and Integrity of services

•Can manifest in the cost of making services unavailable for most civilians

Page 11: Cyber Terror ICT Conference

Iftach Ian Amit | November 2010

All rights reserved to Security Art ltd. 2002-2010 1

1

CyberCrime

11

Page 12: Cyber Terror ICT Conference

Iftach Ian Amit | November 2010

All rights reserved to Security Art ltd. 2002-2010 1

2

You want money, you gotta play like the big boys do...

Page 13: Cyber Terror ICT Conference

Iftach Ian Amit | November 2010

All rights reserved to Security Art ltd. 2002-2010 1

3

CyberCrime - Ammunition

=≈ APT

Page 14: Cyber Terror ICT Conference

Iftach Ian Amit | November 2010

All rights reserved to Security Art ltd. 2002-2010 1

4

Page 15: Cyber Terror ICT Conference

All rights reserved to Security Art ltd. 2002-2010

Iftach Ian Amit | November 2010

15

CyberCrime - Defense•Anti [ Virus | Malware | Spyware | Rootkit |

Trojan ]

•Seriously?

•Firewalls / IDS / IPS

•Seriously?

•Brought to you by the numbers 80, 443, 53...

•SSL...

Page 16: Cyber Terror ICT Conference

Iftach Ian Amit | November 2010

All rights reserved to Security Art ltd. 2002-2010 1

6

How do these connect?

Claim: CyberCrime is being used to conduct

CyberWar/Terror

Proof: Let’s start with some history...

Page 17: Cyber Terror ICT Conference

Iftach Ian Amit | November 2010

All rights reserved to Security Art ltd. 2002-2010 1

7

History - Revisited...

Israel

September 6th, 2007Source:

http://en.wikipedia.org/wiki/Operation_Orchard

Source: Der Spiegel

Operation Orchard

Page 18: Cyber Terror ICT Conference

Iftach Ian Amit | November 2010

All rights reserved to Security Art ltd. 2002-2010 1

8

All attacks on targets

are Attributed to

Hacktivists

Israeli

Arabic

18

Cast-Led, 2nd Lebanon war

Page 19: Cyber Terror ICT Conference

Iftach Ian Amit | November 2010

All rights reserved to Security Art ltd. 2002-2010 1

9

Mid-east crime-war links

ARHack

Hacker/Political forum by day

Cybercrime operations by night

Page 20: Cyber Terror ICT Conference

Iftach Ian Amit | November 2010

All rights reserved to Security Art ltd. 2002-2010 2

0

Political post

Buying/Selling cards for 1/2 their balanceSelling

1600 visa cards

Page 21: Cyber Terror ICT Conference

Iftach Ian Amit | November 2010

All rights reserved to Security Art ltd. 2002-2010 2

1

History - Revisited...

Iran

2009 Twitter DNS hack attributed to Iranian activity.Political connections are too obvious to ignore (elections)

UN Council Decisions

Protests by leadership

opposition in Tehran

Timing was right on:

Page 22: Cyber Terror ICT Conference

Iftach Ian Amit | November 2010

All rights reserved to Security Art ltd. 2002-2010 2

2

Page 23: Cyber Terror ICT Conference

All rights reserved to Security Art ltd. 2002-2010

Iftach Ian Amit | November 2010

23

Iran-Twitter connecting dots•Twitter taken down December 18th

2009

•Attack attributed eventually to a group named “Iranian Cyber Army”

•Until December 2009 there was no group known as “Iranian Cyber Army”...

•BUT - “Ashiyane” (Shiite group) is from the same place as the “Iranian Cyber Army”

Page 24: Cyber Terror ICT Conference

Iftach Ian Amit | November 2010

All rights reserved to Security Art ltd. 2002-2010 2

4

Page 25: Cyber Terror ICT Conference

All rights reserved to Security Art ltd. 2002-2010

Iftach Ian Amit | November 2010

25

Iran-Twitter - Ashiyane

•Ashiyane was using the same pro-Hezbolla messages that were used on the Twitter attack with their own attacks for some time...

•AND the “Iranian Cyber Army” is an active group on the Ashiyane forums www.ashiyane.com/forum

Let’s take a look at how Ashiyane operates...

Page 26: Cyber Terror ICT Conference

Iftach Ian Amit | November 2010

All rights reserved to Security Art ltd. 2002-2010 2

6

On [Crime|Terror] trainingAshiyane forums

WarGames

26

Page 27: Cyber Terror ICT Conference

All rights reserved to Security Art ltd. 2002-2010

Iftach Ian Amit | November 2010

2727

Wargames targets includes:

Page 28: Cyber Terror ICT Conference

Iftach Ian Amit | November 2010

All rights reserved to Security Art ltd. 2002-2010 2

8

Back to [Crime|Terror] Links:

What else happened on the 18th?

Additional targets - Baidu taken down

with the same MO (credentials)

Page 29: Cyber Terror ICT Conference

Iftach Ian Amit | November 2010

All rights reserved to Security Art ltd. 2002-2010 2

9

Mapping Iran’s [Crime|Terror]

More recently:Iranian Cyber Army expanding

into the “Crime” business

Along with the cybercrime“honeypot” tactics…

Page 30: Cyber Terror ICT Conference

Iftach Ian Amit | November 2010

All rights reserved to Security Art ltd. 2002-2010 3

0

Ashiyane

Iranian Cyber Army

DDoS

Botnet Herding

Site Defaceme

ntCredit Card Theft

Strategic Attacks

Mapping Iran’s [Crime|Terror]Iran Iraq

US

$$ UK

US CN

Crime

War

Page 31: Cyber Terror ICT Conference

Iftach Ian Amit | November 2010

All rights reserved to Security Art ltd. 2002-2010 3

1

The Future (Ilustrated)

CLOUDS

Page 32: Cyber Terror ICT Conference

All rights reserved to Security Art ltd. 2002-2010

Iftach Ian Amit | November 2010

32

Deterrence

Think: Article 5 for the Cyber Commons!

An attack agains one or more states, shall be considered an attack against all member states, who agree, to exercise their right to assist the attacked party, including the right to use armed forces.

NATO Article 5 - abridged

Page 33: Cyber Terror ICT Conference

All rights reserved to Security Art ltd. 2002-2010

Iftach Ian Amit | November 2010

33

Attribution?•Technical - not feasible

•Political - should be obvious

•Defending state?

•Should have the responsibility to “clean up” its portion of the Cyber Commons in order to enable a sustainable economic and civil environment.

Page 34: Cyber Terror ICT Conference

All rights reserved to Security Art ltd. 2002-2010

Iftach Ian Amit | November 2010

34

SummaryGood Bad

Formal training on cybersecurity by nations

Commercial development of

malware still reignsUglyGood meet Bad: money changes

hands, less tracks to cover, criminal ops already creating the weapons

and are linked to terrorist organizations...

Page 35: Cyber Terror ICT Conference

All rights reserved to Security Art ltd. 2002-2010

Iftach Ian Amit | November 2010

35

SummaryThe Future

Lack of legislation and cooperation on multi-national level is creating de-facto “safe haven” for cybercrime. <- FIx this! (see article 5 suggestions)

Treaties and anti-crime activities may prove to be beneficial. <- nukes? (i.e. treaties...)

Page 36: Cyber Terror ICT Conference

All rights reserved to Security Art ltd. 2002-2010

Iftach Ian Amit | November 2010

36

Thanks!

www.security-art.com

[email protected]

twitter.com/iiamit

blog.security-art.com