Operation Pawn Storm Using Decoys to Evade Detection

Total Page:16

File Type:pdf, Size:1020Kb

Operation Pawn Storm Using Decoys to Evade Detection A Trend Micro Research Paper Operation Pawn Storm Using Decoys to Evade Detection Loucif Kharouni Feike Hacquebord Numaan Huq Jim Gogolinski Fernando Mercês Alfred Remorin Douglas Otis Forward-Looking Threat Research Team Trend Micro | Operation Pawn Storm CONTENTS Introduction ....................................................................................................................................1 Ties That Bind the Operation Pawn Storm Attacks Together .........................................................2 SEDNIT....................................................................................................................................2 Attack Timeline ........................................................................................................................2 Attack Details ...........................................................................................................................4 Attack Evolution .......................................................................................................................5 Next-Level Phishing Targets ..................................................................................................11 Case 1: Ministry of Defense, Hungary .............................................................................11 Case 2: OSCE, Austria ....................................................................................................13 Case 3: SAIC, United States ...........................................................................................13 Case 4: Academi ..............................................................................................................13 Other Webmail Services ........................................................................................................14 Conclusion ...................................................................................................................................16 References ..................................................................................................................................17 TREND MICRO LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all situations and may not reflect the most current situation. Nothing contained herein should be relied on or acted upon without the benefit of legal advice based on the particular facts and circumstances presented and nothing herein should be construed otherwise. Trend Micro reserves the right to modify the contents of this document at any time without prior notice. Translations of any material into other languages are intended solely as a convenience. Translation accuracy is not guaranteed nor implied. If any questions arise related to the accuracy of a translation, please refer to the original language official version of the document. Any discrepancies or differences created in the translation are not binding and have no legal effect for compliance or enforcement purposes. Although Trend Micro uses reasonable efforts to include accurate and up-to-date information herein, Trend Micro makes no warranties or representations of any kind as to its accuracy, currency, or completeness. You agree that access to and use of and reliance on this document and the content thereof is at your own risk. Trend Micro disclaims all warranties of any kind, express or implied. Neither Trend Micro nor any party involved in creating, producing, or delivering this document shall be liable for any consequence, loss, or damage, including direct, indirect, special, consequential, loss of business profits, or special damages, whatsoever arising out of access to, use of, or inability to use, or in connection with the use of this document, or any errors or omissions in the content thereof. Use of this information constitutes acceptance for use in an “as is” condition. Trend Micro | Operation Pawn Storm INTRODUCTION Operation Pawn Storm refers to economic particularly dangerous to any organization and political espionage attacks instigated by that allows employees to use OWA. a group of threat actors primarily targeting military, embassy, and defense contractor An in-depth look at six multistage attacks personnel from the United States and its revealed one thing in common―the use of allies. Opposing factions to and dissidents SEDNIT/Sofacy malware [1], [2]. The use of the Russian government, international of such multistage downloaders provided media, and even the national security attackers additional protection against department of a U.S. ally were also targeted. detection. We believe the threat actors aimed The threat actors used three attack vectors― to confuse their targets’ IT administrators spear-phishing emails with malicious by making it hard for them to string attack attachments, an advanced network of components together, thus evading detection. phishing websites, and exploits injected into legitimate conference and media websites. This research paper details when certain They used a nonmalicious JavaScript to attacks occurred, what tools were used in victimize Microsoft™ Outlook® Web Access attempts to get in to target networks, and (OWA) users from carefully selected target target profiles to form a general picture of organizations. The OWA phishing attacks Operation Pawn Storm. proved extremely effective and could be 1 Trend Micro | Operation Pawn Storm TIES THAT BIND THE OPERATION PAWN STORM ATTACKS TOGETHER SEDNIT Attack Timeline SEDNIT malware are mostly backdoors [3], [4] The investigation focused on a group of and information stealers [5] that log affected attacks that has been dubbed “Operation users’ keystrokes, steal system information, Pawn Storm” [6] due to the attackers’ use of and send stolen information to remote two or more connected tools/tactics to attack command-and-control (C&C) servers. a specific target similar to the chess strategy it was named after. This paper illustrates how Analyses of the SEDNIT infectors that arrived the Pawn Storm attacks were carried out with as email attachments in the attacks featured the aid of five spear-phishing emails, which in this paper revealed six distinct chains [see used contextually relevant subjects to get diagram on page 3]. specific targets from different countries to open weaponized attachments designed to compromise their systems. Timeline of spear-phishing emails sent to specific targets The attackers sent emails to potential victims, “International Military.rtf.” Trend Micro including military, embassy, and defense received a sample of this on October contractor personnel. The following emails 17, 2011 and has been detecting it as were among those that were found related to TROJ_ARTIEF.AP [8] since then. this operation: • An email sent to a potential victim • An email sent to a potential victim working from the Vatican Embassy from the Ministry of Defense in France in Iraq used reports of a bombing had an exploit for CVE-2010-3333 incident [9] that occurred on January [7] disguised as a document named 9, 2012 as social engineering lure. 2 Trend Micro | Operation Pawn Storm SEDNIT infectors attached to targeted attack campaign emails Sent a day after the incident, the email had a Microsoft Word® file attachment named “IDF_Spokesperson_Terror_ Attack_011012.doc,” which exploited CVE-2012-0158 [10]. Exploit for CVE-2012-0158 disguised as a Word (.DOC) file Sample email sent to recipients from the Vatican Embassy in Iraq 3 Trend Micro | Operation Pawn Storm • An email sent on September 20, doc,” which exploited CVE-2012- 2013 to military officials from several 0158. countries used the then-upcoming “Asia-Pacific Economic Cooperation (APEC) Indonesia 2013” conference as bait. The email had two Microsoft Excel® file attachments named “APEC Media list 2013 Part1.xls,” which exploited CVE-2012-0158, and “APEC Media list 2013 Part2.xls,” which was nonmalicious. Sample email sent to military officials from Pakistan using the “Homeland Security Summit Middle East” conference as bait • An email sent to Polish government employees [12] on August 11, 2014 had a MIME HTML (.MHT) file attachment named “MH17.doc,” which exploited CVE-2012-0158. Sample email sent to military officials across countries using the “APEC Indonesia 2013” conference as bait Exploit for CVE-2012-0158 disguised as a MIME HTML (.MHT) file Attack Details All of the observed Operation Pawn Storm attacks comprised several stages. Each attack had at least two phases: Exploit for CVE-2012-0158 disguised as an Excel • In phase 1, opening the email (.XLS) file(APEC Media list 2013 Part1.xls) attachment displays a decoy document while the exploit runs in • An email sent to Pakistani military the background. The exploit drops officials on January 23, 2014 used the a downloader component (.DLL file) “Homeland Security Summit Middle named “netids.dll,” “netidt.dll,” or East” [11] conference as bait. It had a “coreshell.dll.” Word file attachment named “Details. 4 Trend Micro | Operation Pawn Storm • In phase 2, the downloader capturing information from infected component communicates with a C&C systems, the keylogger sends data server and downloads a dropper that back to the C&C server. ultimately installs a keylogger. After Phases 1 and 2 in an Operation Pawn Storm attack We only managed to collect latter- Although some of the C&C servers were still stage payloads for two out of the six
Recommended publications
  • Chess Horizons
    FREE ENTRY FOR GMs & IMs 78th New England Open September 1 – 3, 2018 Location: Crowne Plaza Boston - Newton 20 USCF 320 Washington St. Grand Prix 3‐day and 2‐day options available! Newton, MA 02458 Points Prizes: $4,000 b/120 paid entries, 75% guaranteed Championship $650 – 300 – 250, top U2400 $225, top U2200 $225 U2000 $400 – 200 – 150 U1800 $400 – 200 – 150 U1600 $300 – 150 – 100, top U1400 $150, top U1200 $150 Time Control: 40/100, SD/30 d10 (2‐day rounds 1‐3 are G/45 d5) Sections: Championship Section (rated 1800+) – 3‐day only – FIDE Rated U2000 Section – 3‐day or 2‐day U1800 Section – 3‐day or 2‐day U1600 Section – 3‐day or 2‐day Round Times: 3‐day section – Saturday 11 AM & 5 PM, Sunday 11 AM & 5 PM, Monday 10 AM & 3: 5 PM 2‐day section – Sunday 1 : 0 AM, 1: 0 PM, : 0 PM, & 5 PM; Monday 10 AM & 3: 5 PM :00 :30 :00 :30 :30 4 Byes: Limit 2 byes, rounds 1‐5 in1 0 Championship Section, rounds 1‐6 in0 3 0 :30 U2000:30 to U16004 sections. Players must commit to byes in rounds 4‐6 before round 2. Entry Fee: Byes in rounds 4-6 are irrevocable. 3‐day section ‐ $75 online by 11:59 PM on 8/3 , $85 onsite 2‐day section ‐ $74 online by 11:59 PM on 8/3 , $85 onsite 0 Onsite Registration: 3‐day – Saturday 9/ from 8:0 30 to 9:30 AM; 2‐day – Sunday 9/ from 8:30 to 9:30 AM Other Information: 1 2 ‐ There is no 2‐day schedule for the Championship Section.
    [Show full text]
  • I Make This Pledge to You Alone, the Castle Walls Protect Our Back That I Shall Serve Your Royal Throne
    AMERA M. ANDERSEN Battlefield of Life “I make this pledge to you alone, The castle walls protect our back that I shall serve your royal throne. and Bishops plan for their attack; My silver sword, I gladly wield. a master plan that is concealed. Squares eight times eight the battlefield. Squares eight times eight the battlefield. With knights upon their mighty steed For chess is but a game of life the front line pawns have vowed to bleed and I your Queen, a loving wife and neither Queen shall ever yield. shall guard my liege and raise my shield Squares eight times eight the battlefield. Squares eight time eight the battlefield.” Apathy Checkmate I set my moves up strategically, enemy kings are taken easily Knights move four spaces, in place of bishops east of me Communicate with pawns on a telepathic frequency Smash knights with mics in militant mental fights, it seems to be An everlasting battle on the 64-block geometric metal battlefield The sword of my rook, will shatter your feeble battle shield I witness a bishop that’ll wield his mystic sword And slaughter every player who inhabits my chessboard Knight to Queen’s three, I slice through MCs Seize the rook’s towers and the bishop’s ministries VISWANATHAN ANAND “Confidence is very important—even pretending to be confident. If you make a mistake but do not let your opponent see what you are thinking, then he may overlook the mistake.” Public Enemy Rebel Without A Pause No matter what the name we’re all the same Pieces in one big chess game GERALD ABRAHAMS “One way of looking at chess development is to regard it as a fight for freedom.
    [Show full text]
  • Positional Attacks
    Positional Attacks Joel Johnson Edited by: Patrick Hammond © Joel Johnson, January 2014 All rights reserved. No part of this book may be reproduced, transmitted in any form by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission from Joel Johnson. Edited by: Patrick Hammond Cover Photography: Barry M. Evans Cover Design and Proofreading: Joel Johnson Game Searching: Joel Johnson, Richard J. Cowan, William Parker, Nick Desmarais Game Contributors: Brian Wall, Jack Young, Clyde Nakamura, James Rizzitano, Keith Hayward, Hal Terrie, Richard Cowan, Jesús Seoane, William Parker, Domingos Perego, Danielle Rice Linares Diagram and Linares Figurine fonts ©1993-2003 by Alpine Electronics, Steve Smith Alpine Electronics 703 Ivinson Ave. Laramie, WY 82070 Email: Alpine Chess Fonts ([email protected]) Website: http://www.partae.com/fonts/ Pressure Gauge graphic Image Copyright Araminta, 2012 Used under license from Shutterstock.com In Memoriam to my step dad and World War II Navy, Purple Heart Recipient, Theodore Kosiavelon, 12/22/1921 – 11/09/2012 CONTENTS Preface 7 Kudos 7 Brian Wall 8 Young Rising Stars 27 Daniil Dubov 27 Wei Yi 30 Section A – Pawn Roles 36 Pawn Structure 37 Ugliest Pawn Structure Ever? 38 Anchoring 41 Alien Pawn 48 Pawn Lever 63 Pawn Break 72 Center Pawn Mass 75 Isolated Pawn 94 Black Strategy 95 White Strategy 96 Eliminate the Isolated Pawn Weakness with d4-d5 96 Sacrifices on e6 & f7 , Often with f2-f4-f5 Played 99 Rook Lift Attack 104 Queenside Play 111 This Is Not Just
    [Show full text]
  • The PENNSWOODPUSHER September 2008 a Quarterly Publication of the Pennsylvania State Chess Federation
    The PENNSWOODPUSHER September 2008 A Quarterly Publication of the Pennsylvania State Chess Federation Push Us and We’ll Topalover Of course 16...Bxf6 would lose, but it would have been the only way by Bruce W. Leverett of attempting a liberation. 17.c3 That was the name of our team in the US Amateur Team East last White’s only defensive move in the game. There’s not much to be February. Jeff Quirke and Bryan Norman organized the team, and afraid of, but there’s also plenty of time to prepare a timely transfer of then recruited me, and I then recruited Federico Garcia. Our team the Queen to the kingside without allowing the Black Knight to d4. average rating was 2191, close to the legal limit of 2199.75. The name 17...d4 was chosen, according to Jeff, because “I like ridiculous puns”. This is actually good: White has to be prevented from replacing the e- The USATE is like the Pittsburgh Chess League, but about 6 or 7 pawn by a bishop, which would (and will) be deadly. times as large - 291 teams, 1251 players - and all jammed in to one 18.Qxh5 Qd6?! 19.Nf5 Bxf5 20.exf5 e4 long weekend. It was held at the Parsippany Hilton, in New Jersey. And e4 is free for the Bishop. We all climbed into Bryan’s minivan and rode there on Friday after- 21.Bxe4! Qg3+ noon and evening, and returned late Monday night. There is no follow up to this enthusiastic check, and the Queen on the g-file is actually good for White.
    [Show full text]
  • Glossary of Chess
    Glossary of chess See also: Glossary of chess problems, Index of chess • X articles and Outline of chess • This page explains commonly used terms in chess in al- • Z phabetical order. Some of these have their own pages, • References like fork and pin. For a list of unorthodox chess pieces, see Fairy chess piece; for a list of terms specific to chess problems, see Glossary of chess problems; for a list of chess-related games, see Chess variants. 1 A Contents : absolute pin A pin against the king is called absolute since the pinned piece cannot legally move (as mov- ing it would expose the king to check). Cf. relative • A pin. • B active 1. Describes a piece that controls a number of • C squares, or a piece that has a number of squares available for its next move. • D 2. An “active defense” is a defense employing threat(s) • E or counterattack(s). Antonym: passive. • F • G • H • I • J • K • L • M • N • O • P Envelope used for the adjournment of a match game Efim Geller • Q vs. Bent Larsen, Copenhagen 1966 • R adjournment Suspension of a chess game with the in- • S tention to finish it later. It was once very common in high-level competition, often occurring soon af- • T ter the first time control, but the practice has been • U abandoned due to the advent of computer analysis. See sealed move. • V adjudication Decision by a strong chess player (the ad- • W judicator) on the outcome of an unfinished game. 1 2 2 B This practice is now uncommon in over-the-board are often pawn moves; since pawns cannot move events, but does happen in online chess when one backwards to return to squares they have left, their player refuses to continue after an adjournment.
    [Show full text]
  • Chess Books! in Addition to All Else, This Book Contains 439 Complete Games- a Golden Treasury in Itself!
    JUNE 1967 PAUSE TO REfLECT 6S CENTS Subscription Rat~ ONE YEAR $7.50 e UJI 789 PAGES: 7'/2 by 9 inches, clothbound 221 diagrams 493 idea variations 1704 practical variations 463 supplementary variations 3894 notes to aU variations and 439 COMPLETE GAMES! BY I. A. HOROWITZ in colla boration with Former World Champion, Dr. Max Euwe, Ernest Gruen/eld, Hans Kmoch, and many ot her noted authorities This latest and immense work, the most exhaustive of its kind, ex· plains in encyclopedic detail the fine points of all openings. It carries the reader well into the middle game, evaluates the prospects there and often gives complete exemplary games so that he is not left hanging in mid-position with the query : What happens now? A logical sequence binds the continuity in each opening. First come the moves with footnotes leading to the key position. Then fol­ BIBLIOPHILES! low pertinent observations, illustrated by " Idea Variations. " Finally, Glossy paper, handsome print. Practical and Supplementary Variations, well annotated, exemplify the spacious paging and all the effective possibilities. Each line is appraised: +, - or =. The large format- 71!2 x 9 inches- is designed for ease of read· other appurtenances of exquis­ ing and playing. It eliminates much tiresome shuffling of pages ite book-making combine to between the principal lines and the respective comments. Clear, make this the handsomest of legible type, a wide margin for inserting notes and variation-identify. ing diagrams are other plus features. chess books! In addition to all else, this book contains 439 complete games- a golden treasury in itself! 1------------------ - - - -- --- - -- - I I Please send me ehas Openings: Theory and Practice at 812.50 I I Name ..
    [Show full text]
  • CR1958 07.Pdf
    JULY 1958 , • .0 704 : S ee P ~ G C 1 9 ~) SO CENTS Swbsc,.iption Rote ONE YEAR 55.50 1 White is following tra­ 2 Black strikes for (· on­ dition but it is doubtful trol of the cent"l", one of t hat he realizes he is of­ the Morphy principles. a nd THE DAWN OF OPENING THEORY fering Ii Pawn for quick de­ [or quick development (by ADOLF ANDBRSSElN incurred a severe lesson in his games velopment, BhICk replies 2 clearIng way for his Queen with Paul Marphy; but, in this game with Rosanes (White) . P- Q4 and answers 3 Bishop) , the other principle, at Breslau in 1862, it is aDpal'ent that he profited from the PxQP with 3 . .. P- K5 in The games goes: 4 B- X5t . lesson. By careful attention to two :L'.lorphy principles. he the Falkbeer Counter Ga m· P-QB3 ~ PxP: fol' Whire sets up the basis for a brilliant victory. The true dawn of bit. Preferellees fo r \Jal·tlcu­ materialistically seeks to opening theory came with Morphy, but the rays were sus­ lar I-ariations eome and go. trade off his potentially tained by Andel'ssen. The game begins as a King's Cam bit: The Falkbeer is not the weal, Pawn. Black replies 1 P- K.f, P-K4 2 P-KB4 (see diagram 1). present y ogue but is solld. with;) . NxP. 3 Black Is continuing his 4 Black figures that, the :; White fo resees da ngers 6 Now, indeed. Black is aim for Quick development more Pawns gone, the more in atu'mpllng to 5e[ up threatening to regain rna· and works now with the aid his advantage in pieces de· King·sitle l"a ~ l li n g and 80 terial, too, and a( least or his Pawn on K5 which reo veloped wlU count as liues plays 11 B-Q.2, to elea r the fully.
    [Show full text]
  • Mastering Positional Sacrifices
    Merijn van Delft Mastering Positional Sacrifices A Practical Guide to a Vital Skill in Chess New In Chess 2020 Contents Explanation of symbols..............................................6 Introduction .......................................................7 Part I Fundamental themes . 15 Chapter 1 Piece play...........................................16 1.1 Opening files.............................................16 1.2 Opening closed positions ................................ 24 1.3 Opening diagonals ......................................34 Chapter 2 Pawn structure ..................................... 40 2.1 Perfect pawn centre .....................................40 2.2 Pawn steamroller........................................49 2.3 Mighty pawn chain...................................... 59 Chapter 3 Colour complex .....................................67 3.1 Dark squares ............................................ 67 3.2 Light squares ........................................... 75 Chapter 4 Domination........................................ 84 4.1 Total domination ........................................84 4.2 Domination in the endgame.............................. 93 Part II Typical positional sacrifices . 103 Chapter 5 Typical pawn sacrifices ..............................104 5.1 Benko Gambit..........................................104 5.2 Marshall Gambit . .112 5.3 Powerplay with white....................................122 5.4 Counterplay with black ................................. 134 Chapter 6 Typical exchange sacrifices
    [Show full text]
  • Destroying the Defensive Barrier
    Institute of Chess Revision Guide to LEVEL 4 The contents were written and arranged by GM Chris Ward FM Desmond Tan. This revision guide is dedicated to the memory of IM Bob Wade OBE (1921 ~ 2008), who devoted his life to chess. (Revised) October 2010 1 Institute of Chess Level 4 Coaching Course by GM Chris Ward and FM Desmond Tan Index of Contents Page Endgame Techniques 1) Zugswang and Mutual Zugswang 2 2) Triangulation 3 3) Knights and Rook’s Pawns 5 4) Decoys and Deflections 7 5) Rook vs. Two Connected Pawns 9 6) Rook vs. More Pawns 13 7) Rook and Pawn vs. Rook 16 Tactical and Positional Concepts 8) Destroying the Defensive Barrier 24 9) Building a Combination 26 10) An Arabian Knight 29 11) Sacrifices on f7 and e6 32 12) Eliminating the Fianchettoed Bishop 35 13) Exploiting the Restricted King 37 14) The Development of a Combination: An Illustrative Game 39 15) The Outpost 44 16) Utilising a Space Advantage 46 17) The Maroczy Bind and the Hedgehog 52 Some Opening Study 18) A Practical 1 e4 e5 Lecture 55 19) The Queen’s Gambit Accepted: 3 e4 62 20) The French Defence: Advanced Variation 72 21) The Sicilian Dragadorf 77 2 Endgame Techniques Zugswang and Mutual Zugswang The term ‘zugswang’ refers to the compulsion to move. Basically then it is when a player would rather maintain the current position, but in accordance with the rules is forced to move. XABCDEFGHY 8-+-+-+-+( 7+-+-+-+-' 6-+-+kzp-+& 5+-+-+-+-% 4-+-+KzP-+$ 3+-+-+-+-# 2-+-+-zP-+" 1+-+-+-+-! xabcdefghy Above Black to play above offers the following variations: a) 1...Kd6 2 Kf5 Ke7 3 Kg6 Ke6 4 f5+ Ke5 5 f3 Kf4 6 Kxf6 and the most advanced f-pawn will promote; b) 1...Kf7 2 Kf5 Kg7 3 Ke6 Kg6 4 f5+ Kg5 5 f3 with the same outcome.
    [Show full text]
  • The Application of Chess Theory PERGAMON RUSSIAN CHESS SERIES
    The Application of ChessT eory PERGAMON RUSSIAN CHESS SERIES The Application of Chess Theory PERGAMON RUSSIAN CHESS SERIES General Editor: Kenneth P. Neat Executive Editor: Martin J. Richardson AVERBAKH, Y. Chess Endings: Essential Knowledge Comprehensive Chess Endings Volume 1 : Bishop Endings & Knight Endings BOTVINNIK, M. M. Achieving the Aim Anatoly Karpov: His Road to the World Championship Half a Century of Chess Selected Games 1967-1970 BRONSTEIN, D. & SMOLYAN, Y. Chess in the Eighties ESTRIN, Y. & PANOV, V. N. Comprehensive Chess Openings GELLER, Y. P. 100 Selected Games KARPOV, A. & GIK, Y. Chess Kaleidoscope KARPOV, A. & ROSHAL, A. Anatoly Karpov: Chess is My Life LIVSHITZ, A. Test Your Chess IQ, Books 1 & 2 NEISHTADT, Y. Catastrophe in the Opening Paul Keres Chess Master Class POLUGAYEVSKY, L. Grandmaster Preparation SMYSLOV, V. 125 Selected Games SUETIN, A. S. I Modem Chess Opening Theory ' Three Steps to Chess Mastery TAL, M., CHEPTZHNY, V. & ROSHAL, A. Montreal1979: Tournament of Stars The Application of Chess Theory By Y. P. GELLER InternationalGrandmaster Translated by KENNETH P. NEAT PERGAMON PRESS OXFORD • NEW YORK • TORONTO • SYDNEY • PARIS • FRANKFURT U.K. Pergamon Press Ltd., Headington Hill Hall, Oxford OX3 OBW, England U.S.A. Pergamon Press Inc., Maxwell House, Fairview Park, Elmsford, New York 10523, U.S.A. CANADA Pergamon Press Canada Ltd., Suite 104, ISO Consumers Rd., Willowdale, Ontario M2J IP9, Canada AUSTRALIA Pergamon Press (Aust.) Pty. Ltd., P.O. Box 544, Potts Point, N.S.W. 2011, Australia FRANCE Pergamon Press SARL, 24 rue desEcoles, 75240 Paris, Cedex 05, France FEDERAL REPUBUC Pergamon Press GmbH, Hammerweg 6, OF GERMANY D-6242 Kronberg-Taunus, Federal Republic of Germany English translation copyright© 1984 K.P.
    [Show full text]
  • 50 Guidelines to Winning Chess Games” Is a List of Errors Players Make Which Usually Lead to a Loss
    This watermark does not appear in the registered version - http://www.clicktoconvert.com 50 Guidelines to Winning Chess Games by Ralph E. Bowman Author of A Beginner’s Guide to Coaching Scholastic Chess available free at http://www.uschess.org/scholastic/ABeginnersGuidetoCoachingScholasticChess.pdf Copyright © 2007 This watermark does not appear in the registered version - http://www.clicktoconvert.com Introduction There can be four results of a Chess game: win, draw, getting beat, and losing. Getting beat means that your opponent was simply better than you were in this game. Losing means that you made an error. The “50 Guidelines to Winning Chess Games” is a list of errors players make which usually lead to a loss. This is not an all inclusive list, but a list of those mistakes which I have repeatedly found with the players I have coached. Each of the sixty-five games contained within this book are actual games played by students on my teams. The names have been omitted on purpose to save on embarrassment. After each tournament I have each student enter at least one game into Chessbase®. This game is either a game they lost or a game they felt had instructive merits for the team. I then enter commentary on the game and present it to the entire team. To make the most of the learning opportunities available in this book, the reader should have a Chess board in front of them and play through the games attempting to discover the mistakes and then turn the page over and repeat the process, but this time noting the comments.
    [Show full text]
  • 101 Tactical Tips
    0 | P a g e 101 Tactical Tips By Tim Brennan http://tacticstime.com Version 1.00 March, 2012 This material contains elements protected under International and Federal Copyright laws and treaties. Any unauthorized reprint or use of this material is prohibited 101 Tactical Tips Table of Contents Introduction ............................................................................................................................................................ 1 101 Tactical Tips Openings and Tactics ............................................................................................................. 2 Books and Tactics .................................................................................................................. 4 Computers and Tactics .......................................................................................................... 6 Quotes about Tactics ............................................................................................................. 9 Tactics Improvement ............................................................................................................ 12 Tactics and Psychology ........................................................................................................ 14 Tactics Problems .................................................................................................................. 16 Tactical Motifs ..................................................................................................................... 17 Tactics
    [Show full text]