54
Yoram Golandsky | November 2010 www.security-art. com All rights reserved to Security Art ltd. 2002-2010 Cyber[Crime|War] Connecting the Dots Yoram Golandsky CEO, Security Art

Cybercrime|Cyberwar - connecting the dots

Embed Size (px)

DESCRIPTION

Cybercrime, Cyberwar, and Cyberespionage are dengerously overlapping, see how they connect.

Citation preview

Page 1: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

www.security-art.com

All rights reserved to Security Art ltd. 2002-2010

Cyber[Crime|War]Connecting the DotsYoram GolandskyCEO, Security Art

Page 2: Cybercrime|Cyberwar - connecting the dots

All rights reserved to Security Art ltd. 2002-2010

Yoram Golandsky | November 2010

2

Agenda

•CyberWar [Attack | Defense]

•CyberCrime [Attack | Defense]

•History revisited

•Connecting the dots...

•Future

Page 3: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 3

Picking up where we left offAt least as far as last years research is concerned...

Page 4: Cybercrime|Cyberwar - connecting the dots

All rights reserved to Security Art ltd. 2002-2010

Yoram Golandsky | November 2010

4

We took a trip down the rabbit hole

Only to find that we are facing a business as organized as a Fortune 500 one

Page 5: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 5

With markets for each aspect of the

business to cater for tools, services and even bringing in

leads

Page 6: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 6

BUT!

Something didn't make too much sense in the data

Page 7: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 7

Boss, is Boss, is this this

supposed supposed to be on to be on

the the internet?internet?

I think this

I think this is from is from my my powerpoin

powerpoint!t!

We We probably probably

need to call need to call

someone...someone...

Page 8: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 8

Finally de-Finally de-

classified..classified..

..

(public (public

domain)domain)

The initial The initial ““tracetrace”” or lo- or lo-jack used jack used

(see (see rabbithole rabbithole talk from 09)

talk from 09)

Page 9: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 9

Hungry yet?That was just the appetizer...

Page 10: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 10

Question 1: What is this?

Page 11: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 11

Perceptions may be deceiving...

War Crime

Page 12: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 12

War Crime

Page 13: Cybercrime|Cyberwar - connecting the dots

All rights reserved to Security Art ltd. 2002-2010

Yoram Golandsky | November 2010

13

CyberWar

“Cyberwarfare, (also known as cyberwar and Cyber Warfare), is the use of computers and the Internet in conducting warfare in cyberspace.”

Wikipedia

Page 14: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 14

It did not happen yetEstonia\Georgia being an

exception?

“There is no Cyberwar”

Page 15: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 15

This is not the only way! Neither is this...

But civilian are always at stake!

Page 16: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 16

Many faces of how CyberWar is perceived...

From McAfee’s “Virtual Criminology Report 2009”Image caption:

“countries developing advanced offensive cyber capabilities”

Page 17: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 17

We’ll focus on current players:

And no, here size does NOT matter...

Page 18: Cybercrime|Cyberwar - connecting the dots

All rights reserved to Security Art ltd. 2002-2010

Yoram Golandsky | November 2010

18

USA

• Thoroughly documented activity around cyberwar preparedness as well as military/government agencies with readily available offensive capabilities

• Massive recruiting of professional in attack/defense for different departments:

• USCC (United States Cyber Command - includes AirForce, Marines, Navy and Army service components)

• NSA

• Other TLA’s...

Page 19: Cybercrime|Cyberwar - connecting the dots

All rights reserved to Security Art ltd. 2002-2010

Yoram Golandsky | November 2010

19

Russia

• GRU (Main Intelligence Directorate of the Russian Armed Forces)

• SVR (Foreign Intelligence Service)

• FSB (Federal Security Services)

• Center for Research of Military Strength of Foreign Countries

• Several “National Youth Associations” (Nashi)

Page 20: Cybercrime|Cyberwar - connecting the dots

All rights reserved to Security Art ltd. 2002-2010

Yoram Golandsky | November 2010

20

China

• PLA (People’s Liberation Army)

• Homework: read the Northrop Grumman report...

• General Staff Department 4th Department - Electronic Countermeasures == Offense

• GSD 3rd Department - Signals Intelligence == Defense

• Yes... Titan Rain...

Page 21: Cybercrime|Cyberwar - connecting the dots

All rights reserved to Security Art ltd. 2002-2010

Yoram Golandsky | November 2010

21

Iran

• Telecommunications Infrastructure co.

• Government telecom monopoly

• Iranian Armed Forces

Page 22: Cybercrime|Cyberwar - connecting the dots

All rights reserved to Security Art ltd. 2002-2010

Yoram Golandsky | November 2010

22

Israel

• This is going to be very boring... Google data only :-(

• IDF (Israel Defense Forces) add cyber-attack capabilities.

• C4I (Command, Control, Communications, Computers and Intelligence) branches in Intelligence and Air-Force commands

• Staffing is mostly homegrown - trained in the army and other government agencies.

• Mossad? (check out the jobs section on mossad.gov.il...)

Page 23: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 23

CyberWar - AttackHighly selective targeting of military (and critical) resources

In conjunction with a kinetic attack

OR

Massive DDOS in order to “black-out” a region, disrupt services, and/or push political agenda (propaganda)

Page 24: Cybercrime|Cyberwar - connecting the dots

All rights reserved to Security Art ltd. 2002-2010

Yoram Golandsky | November 2010

24

CyberWar - Defense

• Never just Government\military

• Targets are likely to be civilian

• Physical and logical protections = last survival act

• Availability and Integrity of services – Survivability

• Can manifest in the cost of making services unavailable for most civilians

Page 25: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 25

CyberCrime

25

Page 26: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 26

You want money, you gotta play like the big boys do...

Page 27: Cybercrime|Cyberwar - connecting the dots

All rights reserved to Security Art ltd. 2002-2010

Yoram Golandsky | November 2010

27

CyberCrime - Attack

• Channels: web, mail, open services

• Targeted attacks on premium resources (corporate)

• Commissioned, or for extortion purposes

• Carpet bombing for most attacks (consumer)

• Segmenting geographical regions and market segments

• Secondary infections through controlled outposts

• Bots, infected sites

Page 28: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 28

CyberCrime - target locations

Page 29: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 29

CyberCrime - Locations

Major Cybercrime group locations

Page 30: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 30

CyberCrime - Ammunition

~APT

Page 31: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 31

Page 32: Cybercrime|Cyberwar - connecting the dots

All rights reserved to Security Art ltd. 2002-2010

Yoram Golandsky | November 2010

32

CyberCrime - Defense

•Anti [ Virus | Malware | Spyware | Rootkit | Trojan ]

•Seriously?

•Firewalls / IDS / IPS

•Seriously?

•Brought to you by the numbers 80, 443, 53...

•SSL...

Page 33: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 33

How do these connect?

Claim: CyberCrime is being used to conduct CyberWar

Is it?: Let’s start with some history...

Page 34: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 34

History - Revisited...

Estonia

You read all about it.

Bottom line: civilian infrastructure was targetedAttacks originated mostly from civilian networks

Page 35: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 35

History - Revisited...

Israel

September 6th, 2007Source:

http://en.wikipedia.org/wiki/Operation_Orchard

Source: Der Spiegel

Operation Orchard

Page 36: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 36

History - Revisited...

Georgia

More interesting, specially in our case...

Highly synchronized Kinetic and Cyber attacksTargets still mostly civilianLaunched from civilian networks

Page 37: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 37

Russian Crime/State Dilemma

McColo

ESTDomainsAtrivo

RBNRealHost

Micronnet

Eexhost

Page 38: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 38

Russian Russian GovernmentGovernmentCrimeCrime

ESTDomESTDom RBNRBN

HostFreshHostFresh

UkrTeleGrouUkrTeleGroupp

ESTDomainsESTDomains

McColoMcColo

AtrivoAtrivo

Hosted byCustomer

Network provider

Page 39: Cybercrime|Cyberwar - connecting the dots

All rights reserved to Security Art ltd. 2002-2010

Yoram Golandsky | November 2010

39

Remember Georgia?

• Started by picking on the president...

• Then the C&C used to control the botnet was shut down as:

• Troops cross the border towards Georgia

• A few days of silence...

flood http www.president.gov.ge flood tcp www.president.gov.ge flood icmp www.president.gov.ge

Page 40: Cybercrime|Cyberwar - connecting the dots

All rights reserved to Security Art ltd. 2002-2010

Yoram Golandsky | November 2010

40

Georgia - cont.• Six (6) new C&C servers came up and drove

attacks at additional Georgian sites

• BUT - the same C&C’s were also used for attacks on commercial sites in order to extort them (botnet-for-hire)

Page 41: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 41

History - Revisited...

Iran

2009 Twitter DNS hack attributed to Iranian activity.Political connections are too obvious to ignore (elections)

UN Council Decisions

Protests by leadership

opposition in Tehran

Timing was right on:

Page 42: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 42

Page 43: Cybercrime|Cyberwar - connecting the dots

All rights reserved to Security Art ltd. 2002-2010

Yoram Golandsky | November 2010

43

Iran-Twitter connecting dots

• Twitter taken down December 18th 2009

• Attack attributed eventually to cyber-crime/vigilante group named “Iranian Cyber Army”

• Until December 2009 there was no group known as “Iranian Cyber Army”...

• BUT - “Ashiyane” (Shiite group) is from the same place as the “Iranian Cyber Army”

Page 44: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 44

Page 45: Cybercrime|Cyberwar - connecting the dots

All rights reserved to Security Art ltd. 2002-2010

Yoram Golandsky | November 2010

45

Iran-Twitter - Ashiyane•Ashiyane was using the same pro-

Hezbolla messages that were used on the Twitter attack with their own attacks for some time...

•AND the “Iranian Cyber Army” seems to be a pretty active group on the Ashiyane forums www.ashiyane.com/forum

Let’s take a quick look at how Ashiyane operates...

Page 46: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 46

On [Crime|War] trainingAshiyane forums

WarGames

46

Page 47: Cybercrime|Cyberwar - connecting the dots

All rights reserved to Security Art ltd. 2002-2010

Yoram Golandsky | November 2010

4747

Wargames targets includes:

Page 48: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 48

Back to linking [Crime|War]

What else happened on the 18th?

More recently - Baidu taken down with the same MO

(credentials)

Page 49: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 49

AshiyaneAshiyane

Iranian Iranian Cyber ArmyCyber Army

DDoSDDoS

Botnet Botnet HerdingHerding

Site Site DefacementDefacement

Credit Card Credit Card TheftTheft

Strategic Strategic AttacksAttacks

Mapping Iran’s [Crime|War]

Iran Iran IraqIraq USUS

$$$$ UKUK

USUS CNCN

Crime

War

Page 50: Cybercrime|Cyberwar - connecting the dots

All rights reserved to Security Art ltd. 2002-2010

Yoram Golandsky | November 2010

50

Iran - the unspoken

•Stuxnet

•There, I’ve said it

Page 51: Cybercrime|Cyberwar - connecting the dots

Yoram Golandsky | November 2010

All rights reserved to Security Art ltd. 2002-2010 51

The Future (Ilustrated)

CLOUDS

Page 52: Cybercrime|Cyberwar - connecting the dots

All rights reserved to Security Art ltd. 2002-2010

Yoram Golandsky | November 2010

52

SummaryGood Bad

Ugly

Good meet Bad: money changes hands, less tracks to cover, criminal ops already creating the weapons...

Page 53: Cybercrime|Cyberwar - connecting the dots

All rights reserved to Security Art ltd. 2002-2010

Yoram Golandsky | November 2010

53

SummaryThe Future

Lack of legislation and cooperation on multi-national level is creating de-facto “safe haven” for cybercrime. <- FIx this!

Treaties and anti-crime activities may prove to be beneficial. <- nukes? (i.e. treaties...)

Page 54: Cybercrime|Cyberwar - connecting the dots

All rights reserved to Security Art ltd. 2002-2010

Yoram Golandsky | November 2010

54

Thanks!

www.security-art.com

[email protected]

twitter.com/securityart

blog.security-art.com