25 November 2008

Cyberwarfare

During the disastrous crisis in South Ossetia1, we received a glimpse on the state of cyberwarfare. I've occasionally heard breathless references to this, but so far the "main weapon" seems to consist of distributed denial of service attacks:
NY Times Blog: Besides the bloody shooting war going on between Georgia and Russia, there’s another, quieter battle going on in cyberspace. The Georgian government is accusing Russia of disabling Georgian Web sites, including the site for the Ministry of Foreign Affairs.

[...]

The attacks are structured as massive requests for data from Georgian computers and appear to be controlled from a server based at a telecommunications firm, he said. This kind of attack, known as a distributed denial of service attack, is aimed at making a Web site unreachable. It was first used on a large scale in 2001 to attack Microsoft and has been refined in terms of power and sophistication since then. The attacks are usually performed by hundreds or thousands of commandeered personal computers, making a positive determination of who is behind a particular attack either difficult or impossible.
It's been noted (in comments to the above post) that "mere" DDoS attacks probably were the work of enthusiastic supporters of the Russian war effort, and not the Russian military itself. Such attacks were not significant to the Georgian war effort, partly because internet penetration in that country is very limited.

According to the PBS documentary on cyberwarfare (see below), a much more alarming prospect is something like the Slammer (or "Sapphire") worm.
SearchSecurity.com: While Slammer choked many Internet service providers and networks over the weekend, it didn't have a destructive payload, said David Litchfield, a well-known vulnerability-finder and co-founder of Next Generation Security Software, which is based in Sutton, England. "It could have been so much more nasty," he said. "It appears they wrote it to prove a point."

Slammer exploits the six-month-old SQL Server Resolution Service buffer overflow flaw that Litchfield discovered. While the worm isn't destructive and only attacks Windows 2000 systems, it can gum up networks by generating massive amounts of traffic. It then scans random IP addresses looking for other vulnerable servers.
One of the more vulnerable targets of cyberwarfare is a class of machines known as systems control and data acquisition (SCADA). These are computer systems used for monitoring real-time industrial or communications processes, such as oil refineries or telecom switching. Because of the complexity and integration of such systems, they are usually connected to the internet, and often through cellular communications. Hence, there is a risk that a future terrorist attack could avoid bombs entirely and attack a SCADA that was critical to, say, the functioning of a subway system.

This is discussed in a few interviews at the PBS page on SCADA vulnerabilities. The general tenor of the interviews is that there seems to be little evidence that a technology exists for penetrating SCADA systems en masse.



Notes
1 [UPDATED] Impartial information on the South Ossetian War of August 2008 is quite difficult to come by, but one trustworthy source is "All Parties in August/South Ossetia Conflict Violated Laws of War," Human Rights Watch (23 Jan 2009)



Additional Sources
(From How Stuff Works)

Labels: , , ,

15 April 2007

[Virtual] World Wide War

Fast-Moving Zombies: Botnets Stay a Step Ahead of the Fixes, Greg Goth, IEEE
Over the winter I and my contacts at the company's ISP noticed a distinct surge in "malware." In communication with my company's ISP, they occasionally mentioned the desperation and frustration of warfare. Mostly the malware was spam, which has been roughly doubling every year since at least 2000.

Much of the increase has been as the result of "botware," or malicious computer programs installed against the user's will and knowledge. Botware floods the internet with literally trillions of e-mails each year, and utilizes the latest spam-thwarting technology.
Users who might be truly interested in discovering whether their computers have been turned into bots can do a fairly simple check from the command prompt. Typing netstat -an reveals both local and foreign IP addresses and the port numbers via which they’ve communicated during the computer’s current session. Users who don’t use Internet Relay Chat (IRC) and see port 6667 displayed on the list of addresses in the command prompt can almost guarantee that their machines have been hijacked.
IRC's are easily installed and activated on Windows machines since the OS was designed to automatically load patches and other programs from the web.
Trend Micro’s Moriarty says IRC is still a bot boulevard, but other protocols are now being exploited as well. “IRC is still predominantly the main source of communication,” Moriarty says. “However, starting around April and May of last year, we started noticing bots starting to use port 80. So now they’re blending in with the normal mix of Web traffic, and it gets a little more difficult to separate the wheat from the chaff.”

Another industry veteran also says he sees a trend away from IRC bots. Andre M. DiMino, cofounder of the Shadowserver Foundation, a volunteer-run resource center focusing on malware, botnets, and electronic fraud activity, says P2P botnets are making a strong appearance. “It’s definitely shifting,” DiMino says. “There’s a lot of P2P bot traffic now. For instance, the Nugache worm ... was a real classic P2P worm. We now believe it was originally released as a proof-of concept on [the normally unassigned] port 8 because we’re seeing more variants. Originally, it was really easy to find — it had a hard-coded list of IPs and was kind of dumb when we first saw it, but now appears to be proof-of-concept. I kind of look at it as IRC botnets could be the bad guys’ honeypots — we’ll all be looking for IRC bots,but the real bad stuff will start happening on other vectors.”
What are some things that Windows users can do to reduce the risk of malware? Basically the problem is that most Windows boxes are configured so that users can log in only as an administrator. I've noticed that this is not the case in Windows XP, where computer users must chose among a variety of possible identities. Still, a lot of users do tend to log on as an administrator all the time. In this mode, Windows has standing permission to install pretty much anything on the hard drive. Another countermeasure implemented by ISP's is to configure customer machines so they prevent outgoing IRC transmissions:
For example, whereas XP Service Pack 2 has no easily discernible way for users to configure their machines to avoid outgoing IRC communications, some ISP home network equipment does. AT&T’s broadband wireless router manufactured by 2Wire, for instance, lets users disable outgoing IRC traffic, but it’s not the default setting. And some users have been frustrated by system crashes caused by downloading other free firewalls that are incompatible with their ISP-supplied software, XP firewall, or both.
What puzzles me, though, is not merely the invasion of the bots--it's the deluge of spam, spam replete with alarm words that one could reasonably expect an automated spam filter to detect. Is the proliferation of spambots and botnets just maxing out the filters?
________________________________________________________
ADDITIONAL READING: "A Taxonomy of Botnets" (PDF), by Dagon, Gu, Zou, Grizzard, & Dwivedi;

Labels: ,

30 March 2007

Malware

Malware includes all of the various nasty programs and code that internet security is designed to resist. Specifically, it includes viruses, trojan horses, spambots, spyware, and worms. I've included a brief list of malware varieties and added to it when possible. The superscript "T" links to the TechEncyclopedia entry on the subject; "W" links to the related Wikipedia entry.

AdwareT W: any program that runs advertising from the user's browser, whether installed with the user's permission or not.

BotT W: from "robot"; a computer program that does the same then endlessly, such as send spam e-mails (spambots). Bots are a common type of virus or worm payload.

DNS hijackingT: an especially advanced form of malicious internet crime in which the perpetrator creates a website that resembles another, legitimate business website (or pharm), and then causes browsers directed to that site to mimic the URL of the legitimate site. This is an especially frightening technology because it's very difficult for even a savvy computer user to notice the scam.

Mark: the target of a scam, ex ante; a mark has not necessarily been victimized, and may possess the combination of luck, specialized knowledge, mistrust, and common sense to escape the scam. See definition 2.e.2 of the Merriam-Webster dictionary.

PayloadT W: the thing carried by a virus, trojan horse, or a worm. In addition to replicating itself, the malware tends to carry some code that does something destructive once it has infected a host.

Pharm[ing]T W: a website designed to mimic or duplicate as much as possible a legitimate website. Fairly easy to do; one can merely copy the source of a page, plus its stylesheet, and create pseudo-domains like "http://10.8.160.81/washingtonmutual/1526", so that a visitor is suitably impressed. Pharms are used to "harvest" identity data about victims who visit and are deceived into thinking that it's the legitimate site. Especially sophisticated pharming schemes incorporate DNS hacking, in which the URL displayed is that of the legitimate site.

Phish[ing]T W: this works a lot like fishing; the perpetrator sets a trap, like a fishing lure, whose purpose is to retrieve the victim's identity information. The most familiar phishing campaign involves the "Spanish Prisoner" or "419 Hoax." The great majority of phishing scams appear to warn the mark of some account irregularity, such as with her Washington Mutual checking account, or eBay account, PayPal account, Amazon, etc. There is a high probability that the mark doesn't have any such account, but the phisher sends an immense number of e-mails so that someone is likely to be deceived ("Only Washington Mutual would know I have a checking account with Washington Mutual").

SpambotsT W: a very common form of virus or worm payload. As the name suggests, it's a program that transmits spam using the infected computer. It may also leave spam "comments" on blogs.

Spanish PrisonerW: also known as the "Advanced fee scam" or "419 Scam" (so-called from a section of the Nigerian criminal code that pertains to such scams). The 419 Hoax appears as an e-mail purporting to be from the relative of some terrible person, such as General Sani Abacha or Jean-Bidel Bokassa, who is trying to smuggle a vast sum of money out of the country illegally. For this reason, the mark is urged to be discreet and trusting towards one he imagines to be a partner in the scam. He is told he must supply a fee to help carry out the job, in return for which he will be awarded with a large share of the spoils. Oddly, the 419 scams of today are distinuguished for the historical sophistication of their backstories.

SpywareT W: records the keystrokes and mouse clicks of a computer user, then transmits these to the perpetrator in order to steal the victim's identity. Sometimes spyware "announces" that it is spyware. The license agreement that everyone accepts without reading may actually state that the browser is installing spyware. For example, it might say that the program performs anonymous profiling, which means that the user's habits are being recorded. Such software is used to create marketing profiles.

Trojan horsesT W: this is a form of malware that is designed to defeat computer security by posing as a legitimate site. One strategy involves a hoax, in which victims log into a bogus site cleverly disguised to resemble a legitimate e-commerce site. These are very frequently abetted by a concomitant phishing campaign. A common scheme is to send the intended victim ("mark") an e-mail announcing that she has a problem with her eBay account, and a hotlink to a website where she can log in and correct the problem. Needless to say, the link goes to a domain controlled by the perpetrator, and when the user logs into what she thinks is her eBay account, the website collects the username and password.

Another approach is for the perpetrator to write code that provides access to the harddrive of a victim's computer whenever the victim's computer accesses the internet (a "backdoor"). This allows the perpetrator to use the infected computer as a "bot," or malware host, that attacks other computers. In this way, the perpetrator can easily protect his identity. The computer user installs the code thinking it is freeware; or, else, the OS may be prompted to automatically install the program before the user knows what is happening.

As a general rule, trojan horses of this variety are attacked when visiting porn sites because the latter require bandwidth, and the webmaster uses the porn to lure visitors. Pornography is a seedy business, of course, and visitors are ashamed of their vice. So they are easy targets.

VirusT W: a virus is a malicious piece of code transmitted either through a circulating disk or else through downloaded files from the internet. Initially, computer viruses were similar to biological viruses; the malicious code had to upload itself from the perpetrator's disk to a public computer, like those at a library or copy shop; and it had to copy itself from the infected computer to any disk unfortunate enough to be inserted into that computer's floppy disk drive.

In order to replicate itself (and do whatever damage the virus was intended to do, beyond replicating itself), the virus has to be attached to an executable file; as such it must be camouflaged as a legitimate program. Because of program uploading rules for different operating systems, the Windows and DOS variants are massively more vulnerable to all forms of malware than Mac OS and others.

Viruses occasionally were formed with criminal or vandalizing intent. The Stoned Virus, which I recall suffering in 1995, was a fairly inoffensive virus that merely urged me to legalize marijuana whenever I booted up my ancient PC. More recently, the Samy Virus was the fastest-spreading virus to date; it infected MySpace profiles. The Michaelangelo Virus was fairly nasty, but that was in 1992. For the most part, viruses are relatively minor threats and greatly outclassed by other forms of malware.

WormsT W: often confused with viruses; worms, like viruses, are self-replicating computer programs. Originally, viruses were likely to be spread by swapping disks, while worms were spread by networks.

ZombieT W: typically, the "payload" of a worm or other form of malware.. A zombie is designed to provide access to the hard drive of an infected computer by transmitting network access information to the perpetrator's computer. This turns the victim's computer into a captive server, and unwilling accomplice to the perpetrator. The linked Wikipedia entry refers to such a computer.

SOURCES & ADDITIONAL READING: the superscript "T" links to the TechEncyclopedia entry on the subject; "W" links to the related Wikipedia entry. Internet Fraud Watch; Data Wales, "The Internet Fraud Advisory"—list of common internet frauds; FBI site on online scams;

Symantec, "What is the difference between viruses, worms, and Trojans?"; ComputerWorld, "Spam, Malware, and Vulnerabilities Top Stories";

Labels: ,