We're all human, you know? That's roughly the trick that the hackers most likely relied on when, earlier this year, they managed to steal over 24,000 files from a defense contractor.
The Pentagon won't say what files went astray, or the level of secrecy associated with the contents of the stolen data. But we can assume that at least some of it was highly secret--secret enough that Deputy Defense Secretary William J. Lynn III felt compelled to admit to the attack during a speech about the future of cyber policy yesterday. Lynn said it concerned some of the U.S.'s "most sensitive systems, including aircraft avionics, surveillance technologies" and more, before hinting that foreign powers were behind the attack and using it to declare cyberspace the next battleground.
What went down? We spoke to Nick Percoco, digital security expert and SVP at Trustwave's SpiderLabs, and familiar with exactly this sort of cyberattack, to get some insight.
How The Hack May Have Begun: Email Scams
The fact that the 24,000 stolen files came from a defense contractor is significant, Percoco notes. It's likely easier to get this sort of data from a contractor than launching an all-out attack on Pentagon servers themselves, because companies are full of people--people who are used to doing business in our digitally connected world. And even though an employee of a defense contractor is probably way more switched on to digital security than you or I, it's still not impossible to cheat someone with access to secret files into placing malware on their work laptop.
All it would take for a dedicated hacker is some basic research. If you wanted to steal data like this, you could start by targeting a particular employee via email--"We've seen this happen to defense contractors," Percoco notes. "Using technology like Google, and LinkedIn and other social networks" hackers could find out who best to target. Say they pick a particular EVP, and work out their email address is "JohnSmith@defencecontractorX.com." Then they work out who their colleagues or bosses may be all the way up to CEO level.
Then it's as simple as going to a source of hacking code using your underworld contacts (or using some of your own) and getting access to a "zero day exploit"--a new loophole in a computer or software system's security that hasn't been publicly discovered yet, and hence is still open for hacking use.
This is where the hack escalates. "In this case, they'd been looking for a zero-day exploit in, say, the Adobe PDF reader. And then they'd take a nice creative pen out and draft up a document that looks like it should be something important," Percoco said. After this, the hacker would set up something like a disposable Gmail account and make the screen name the same as one of the target's peers or the CEO of the company. Then they'd "craft up an email that says 'Here's an important document, some new announcement we're working on. Please review it and be ready for a call at 10 a.m. today.'" The trick is to send this to the target at around 7:30 a.m. local time, because the "best time to send those types of things is right before someone's had their coffee."
Typically the sleep-addled victim would trust the email as it's supposedly from a colleague, then launch the embedded PDF (or other faked document). Usually it causes the newly launched program--Adobe Reader in this example--to crash. But as it crashed, it would actually be installing malicious code on the machine. The virus is injected.
How The Attack Began: Website Sting
A similar attack is possible using a faked-up website that looks like it's actually related to the target company--one of those odd-looking, badly maintained websites that kinda looks official that we've all surfed to at some point and been confused by.
Some of these are actually storage pens for targeted malicious code, carefully honed to appear high on Google searches with SEO tricks. And when, say, a marketing official from the target company Googles to find out how their brand is being referenced around the web, they may stumble across one of these fake sites and trigger the release of malware onto their machine.
What Happened Next: Access Is King
Once the malicious code has been installed on the machine, the "sky's the limit," particularly via the email exploit. A well-coded virus code can evade detection and hide on the computer, doing various wicked things.
Often the "sole purpose of the executable is to go and find files on the person's computer and archive those in a zip file or RAR file, and then attempt to extract them from the system," Percoco said, based on his experience. The code could try lots of different routes, using FTP or HTTP or other protocols to get those files off the system. It's something he's seen in "many environments" and, worryingly, they're often "highly successful in getting those files." The code is typically designed to work on Windows machines, with almost no such exploits targeted at Macs--but Percoco agrees that this is at least partly due to the assumption by a hacker that a business user will be using a PC, not a Mac.
The success would be based on the fact no one's seen this particular kind of attack before (a zero-day exploit payoff) and it would easily circumvent any protective anti-virus software installed on the machine--because the protection doesn't know to look out for this type of virus. The only real way to avoid this sort of attack for the target to "avoid clicking on documents," which is clearly unlikely in the case of a business computer user.
A smarter hacker would select a network administrator at the target company, because they're human, too. Their machine likely has even more interesting files that have data on network security, what kind of code is let in and let out of company firewalls, and so on.
Getting access to this sort of data (via the same email hack as described above) could let a persistent hacker penetrate a company's network and install a backdoor onto it--totally circumventing security because then "the attacker doesn't have to come in from the outside, they have code running on that system that will basically open up a connection back to the attacker"--not something network security is expecting. Then you can gain access to passwords and credentials to worm your way in further, eventually finding whatever sensitive data you're looking for.
The result could be a grim violation of company security. "We've seen those for a number of years, in all sorts of companies including government-type companies as well," Percoco says.
Who Did This?
It's easy to see how a hacker could gain access to a machine and even a company network, and how easy it can be to transfer stolen files from infected computers to the hacker. But who is the hacker? The Deputy Secretary of Defense was careful to link it to "foreign" attackers--and considering this year's hacking news, we're instantly imagining China is to blame.
Percoco says his company does hundreds of investigations every year on attacks like these, and it's "very, very difficult to trace an attack to a specific person and specific political motivation." That's unless it's a hacktivist attack, when a group like Anonymous posts the data online and admits it was to blame--and even then "you don't know where these people are actually located."
A hacker could take his laptop down to a coffee shop, buy a cup of joe and "get on their free Wi-Fi system. And now they go and start looking around the world to find a computer that has a security weakness." Once they find it, they can use the hacked computer for a targeting scenario like the one described above, where they send a tainted email. Anyone tracing the code back after the attack was detected may find it sourced on a corporate computer in, say, China. And then they're stuck--because no one's "going to let the U.S. government come in and do a forensic investigation on some business located in China."
Furthermore, it's rare that even this first Net address is where the attack is coming from--"they're always jumping through one or many systems" Percoco says, which could be in numerous nations and thus completely confound any attempts to track them. Which means the attacker actually could be located anywhere.
The Cold Cyberwar?
Suddenly, there's a much more sinister angle to the Pentagon hack. Forget "The Chinese Way of Hacking." More like "Even More Malicious Hackers Looking Like They're Using The Chinese Way Of Hacking."
Wi-Fi hacker gets 18 years, highlights danger of unsecured networks
FierceCIO
FierceCIO:TechWatch is a twice weekly IT news update, with news covering IT
security, hardware and storage news, networking, IT storage, and more. Join
29500+ IT management professionals who get FierceCIO:TechWatch via email.
Sign up today! ...
<http://www.google.com/url?sa=X&q=http://www.fiercecio.com/techwatch/story/wi-fi-hacker-gets-18-years-highlights-danger-unsecured-networks/2011-07-15&ct=ga&cad=CAcQAhgAIAAoATACOAJAkIuF8QRIAVAAWABiBWVuLVVT&cd=1XqFEOzz2R0&usg=AFQjCNHCdzvLqkJSiNq6ktC3igu6wLu2_Q>
See all stories on this topic:
<http://www.google.com/url?sa=X&q=http://news.google.com/news/story%3Fncl%3Dhttp://www.fiercecio.com/techwatch/story/wi-fi-hacker-gets-18-years-highlights-danger-unsecured-networks/2011-07-15%26hl%3Den%26geo%3Dus&ct=ga&cad=CAcQAhgAIAAoBjACOAJAkIuF8QRIAVAAWABiBWVuLVVT&cd=1XqFEOzz2R0&usg=AFQjCNFOZvI_iJRim-mPMopWZKZ4TWmhcQ>
8 Movies that Crack the Hacker Code
TheStreet.com
Writers and directors these days have seized upon the ongoing Internet
revolution/evolution to use hackers as both a storyline catalyst and escape
hatch for when a convoluted plot needs to be rescued with hasty exposition
or resolution. ...
<http://www.google.com/url?sa=X&q=http://www.thestreet.com/story/11186133/1/8-movies-that-crack-the-hacker-code.html%3Fcm_ven%3DGOOGLEN&ct=ga&cad=CAcQAhgAIAAoATADOANAkIuF8QRIAVAAWABiBWVuLVVT&cd=1XqFEOzz2R0&usg=AFQjCNF1rHdKMucejjkqHDe41iMaBb8BDA>
See all stories on this topic:
<http://www.google.com/url?sa=X&q=http://news.google.com/news/story%3Fncl%3Dhttp://www.thestreet.com/story/11186133/1/8-movies-that-crack-the-hacker-code.html%253Fcm_ven%253DGOOGLEN%26hl%3Den%26geo%3Dus&ct=ga&cad=CAcQAhgAIAAoBjADOANAkIuF8QRIAVAAWABiBWVuLVVT&cd=1XqFEOzz2R0&usg=AFQjCNF2uNfkbeH8VNmDSCFenmwjWfEZ4A>
Cablegate Soldier Bradley Manning's Chat Logs With Hated Hacker Published
In Full
ITProPortal
Logs of online conversations between Bradly Manning, - the soldier accused
of leaking thousands of governement cables to whistle-blowing web site
Wikileaks, and Adrian Lamo, the reviled hacker who handed him over to the
authorities, have been published ...
<http://www.google.com/url?sa=X&q=http://www.itproportal.com/2011/07/15/cablegate-soldier-bradley-mannings-chat-logs-hated-hacker-published-full/&ct=ga&cad=CAcQAhgAIAAoATAEOARAkIuF8QRIAVAAWABiBWVuLVVT&cd=1XqFEOzz2R0&usg=AFQjCNG1tWNyHyfmSyjSx9eEth3zEL4-RA>
See all stories on this topic:
<http://www.google.com/url?sa=X&q=http://news.google.com/news/story%3Fncl%3Dhttp://www.itproportal.com/2011/07/15/cablegate-soldier-bradley-mannings-chat-logs-hated-hacker-published-full/%26hl%3Den%26geo%3Dus&ct=ga&cad=CAcQAhgAIAAoBjAEOARAkIuF8QRIAVAAWABiBWVuLVVT&cd=1XqFEOzz2R0&usg=AFQjCNF6nN5flyRYmKoezmUF1WwiXnUv6Q>
Indian Hackers Target Pakistani Website to Protest Mumbai Blasts
Tech2
After three blasts rocked Mumbai a couple of days ago a hacker group who go
by the alias Indishell are protesting in an unconventional sort of way.
They have taken down songs.pk, a popular Pakistani website notorious for
sharing pirated Bollywood music ...
<http://www.google.com/url?sa=X&q=http://tech2.in.com/news/general/indian-hackers-target-pakistani-website-to-protest-mumbai-blasts/230732&ct=ga&cad=CAcQAhgAIAAoATAFOAVAkIuF8QRIAVAAWABiBWVuLVVT&cd=1XqFEOzz2R0&usg=AFQjCNG3gfMMO5y8aa1HSzPkrVv8hg6dtQ>
See all stories on this topic:
<http://www.google.com/url?sa=X&q=http://news.google.com/news/story%3Fncl%3Dhttp://tech2.in.com/news/general/indian-hackers-target-pakistani-website-to-protest-mumbai-blasts/230732%26hl%3Den%26geo%3Dus&ct=ga&cad=CAcQAhgAIAAoBjAFOAVAkIuF8QRIAVAAWABiBWVuLVVT&cd=1XqFEOzz2R0&usg=AFQjCNFcUsoFDCWRbZbz2RMvWksrcfe5EA>
Hacking for Dummies: New Breed Learns Skills From Web
TechNewsDaily
But there is new breed of hacker out there. Like Cleary, these hackers are
young, said Alan Wlasuk, managing partner of Indianapolis-based 403 Web
Security. Yet this group's computer skills are more limited. Instead of
spending weeks in dark rooms ...
<http://www.google.com/url?sa=X&q=http://www.technewsdaily.com/hacking-new-breed-2981/&ct=ga&cad=CAcQAhgAIAAoATAGOAZAkIuF8QRIAVAAWABiBWVuLVVT&cd=1XqFEOzz2R0&usg=AFQjCNFMzq26IEngWnz7od3QE0XGWXZBxw>
See all stories on this topic:
<http://www.google.com/url?sa=X&q=http://news.google.com/news/story%3Fncl%3Dhttp://www.technewsdaily.com/hacking-new-breed-2981/%26hl%3Den%26geo%3Dus&ct=ga&cad=CAcQAhgAIAAoBjAGOAZAkIuF8QRIAVAAWABiBWVuLVVT&cd=1XqFEOzz2R0&usg=AFQjCNGb4F_dbEtqU4iKLkS0m8eQPmDt9g>
Hacker group claims Vodafone femtocell still vulnerable
Total Telecom
By Lewis Dowling, Total Telecom A hacker group that claimed earlier this
week to have successfully gained access to Vodafone's Sure Signal femtocell
has insisted that the device is still vulnerable to attack, despite the
operator's assurances it has ...
<http://www.google.com/url?sa=X&q=http://www.totaltele.com/view.aspx%3FID%3D466312&ct=ga&cad=CAcQAhgAIAAoATAHOAdAkIuF8QRIAVAAWABiBWVuLVVT&cd=1XqFEOzz2R0&usg=AFQjCNE5C0v_E9WnWe4qAq4B9C3X-maLng>
See all stories on this topic:
<http://www.google.com/url?sa=X&q=http://news.google.com/news/story%3Fncl%3Dhttp://www.totaltele.com/view.aspx%253FID%253D466312%26hl%3Den%26geo%3Dus&ct=ga&cad=CAcQAhgAIAAoBjAHOAdAkIuF8QRIAVAAWABiBWVuLVVT&cd=1XqFEOzz2R0&usg=AFQjCNEvWCc9ZRkt8pe3fg8noFaqmDJZ4A>
Gilbert libraries to get security guards
East Valley Tribune
[Tim Hacker, Tribune] Inside the Maricopa County Southeast Regional Library
in Gilbert, shown Thursday, June 23, 2011. [Tim Hacker, Tribune] Acting
with approval of the Maricopa County Board of Library Directors, the
Maricopa County Library District ...
<http://www.google.com/url?sa=X&q=http://www.eastvalleytribune.com/local/gilbert/article_97912ea8-af28-11e0-b09c-001cc4c03286.html&ct=ga&cad=CAcQAhgAIAAoATAIOAhAkIuF8QRIAVAAWABiBWVuLVVT&cd=1XqFEOzz2R0&usg=AFQjCNFBoZeMEzkM6s42ooQC9SzMSfGWlg>
See all stories on this topic:
<http://www.google.com/url?sa=X&q=http://news.google.com/news/story%3Fncl%3Dhttp://www.eastvalleytribune.com/local/gilbert/article_97912ea8-af28-11e0-b09c-001cc4c03286.html%26hl%3Den%26geo%3Dus&ct=ga&cad=CAcQAhgAIAAoBjAIOAhAkIuF8QRIAVAAWABiBWVuLVVT&cd=1XqFEOzz2R0&usg=AFQjCNHFe2YdQIVz3KySbRPk7GrgKIyclw>
Burn Notice Episode 5.4 Review: Hacking Away at Michael's Problems
BuzzFocus.com
Griffin was hired out by bitter and enraged hacker named Eve (Aviva
Farber). Fiona: That's the first real redhead I've seen since I left
Ireland. Michael used the cover of one of Griffin's lowlife friends,
Baxter, a slimy runner who's into young girls. ...
<http://www.google.com/url?sa=X&q=http://www.buzzfocus.com/2011/07/15/burn-notice-episode-5-4-review-hacker-no-good-deed/&ct=ga&cad=CAcQAhgAIAAoATAJOAlAkIuF8QRIAVAAWABiBWVuLVVT&cd=1XqFEOzz2R0&usg=AFQjCNEMAtmJbL-PO67Ljjg8DAaAdr090Q>
See all stories on this topic:
<http://www.google.com/url?sa=X&q=http://news.google.com/news/story%3Fncl%3Dhttp://www.buzzfocus.com/2011/07/15/burn-notice-episode-5-4-review-hacker-no-good-deed/%26hl%3Den%26geo%3Dus&ct=ga&cad=CAcQAhgAIAAoBjAJOAlAkIuF8QRIAVAAWABiBWVuLVVT&cd=1XqFEOzz2R0&usg=AFQjCNFtpyYqyZAhjkjcyJUhJY0ilAPCzQ>
=== Blogs - 1 new result for [hacker] ===
WiFi hacker lands 18-year prison sentence, sex offender status for ...
By Terrence O'Brien
Look, we understand that being accused of pedophilia is horrible but, if
you're not keen on spending time in the pokey, it's probably not best.
<http://www.google.com/url?sa=X&q=http://www.engadget.com/2011/07/15/wifi-hacker-lands-18-year-prison-sentence-sex-offender-status-f/&ct=ga&cad=CAcQAhgAIAIoATAKOABAkIuF8QRIAVgAYgVlbi1VUw&cd=1XqFEOzz2R0&usg=AFQjCNFpIjhh7_njXHLPCHhTUccY4o6x3w>
Engadget
<http://www.google.com/url?sa=X&q=http://www.engadget.com/&ct=ga&cad=CAcQAhgAIAIoBzAKOABAkIuF8QRIAVgAYgVlbi1VUw&cd=1XqFEOzz2R0&usg=AFQjCNG2DhPxwiIGhY8UfYfaZWP79E4H7g>
This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Remove this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4iOmerK-luIN5nEhzGQKiNlsHsHBshU8Nk&cd=1XqFEOzz2R0&cad=CAcQAhgAQJCLhfEESAE
Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail&cd=1XqFEOzz2R0&cad=CAcQAhgAQJCLhfEESAE
Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail&cd=1XqFEOzz2R0&cad=CAcQAhgAQJCLhfEESAE
0 komentar:
Post a Comment