Stuxnet, Flame, and Duqu
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Report for Congress Received Through the CRS Web
Order Code RL31339 Report for Congress Received through the CRS Web Iraq: U.S. Efforts to Change the Regime Updated August 16, 2002 Kenneth Katzman Specialist in Middle Eastern Affairs Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress Iraq: U.S. Efforts to Change the Regime Summary In his January 29, 2002 State of the Union message, President Bush characterized Iraq as part of an “axis of evil,” along with Iran and North Korea. The President identified the key threat from Iraq as its development of weapons of mass destruction (WMD), and the potential for Iraq to transfer WMD to the terrorist groups it sponsors. In recent statements, the President and other senior officials have said the United States needs to ensure that Saddam Husayn cannot be positioned to pose a major and imminent threat to U.S. national security. The President’s subsequent statements have left observers with the clear implication that the Administration is leaning toward military action to achieve the ouster of Iraq’s President Saddam Husayn and his Ba’th Party regime, although the President says no decision has been made on the means of achieving regime change. Regime change has been official U.S. policy since October 1998. Even before that, U.S. efforts to oust Saddam have been pursued, with varying degrees of intensity, since the end of the Gulf war in 1991. These efforts primarily involved U.S. backing for opposition groups inside and outside Iraq. According to several experts, past efforts to change the regime floundered because of limited U.S. -
2003 Iraq War: Intelligence Or Political Failure?
2003 IRAQ WAR: INTELLIGENCE OR POLITICAL FAILURE? A Thesis submitted to the Faculty of The School of Continuing Studies and of The Graduate School of Arts and Sciences in partial fulfillment of the requirements for the degree of Master of Arts in Liberal Studies By Dione Brunson, B.A. Georgetown University Washington, D.C. April, 2011 DISCLAIMER THE VIEWS EXPRESSED IN THIS ACADEMIC RESEARCH PAPER ARE THOSE OF THE AUTHOR AND DO NOT REFLECT THE OFFICIAL POLICIES OR POSITIONS OF THE U.S. GOVERNMENT, DEPARTMENT OF DEFENSE, OR THE U.S. INTELLIGENCE COMMUNITY. ALL INFORMATION AND SOURCES FOR THIS PAPER WERE DRAWN FROM OPEN SOURCE MATERIALS. ii 2003 IRAQ WAR: INTELLIGENCE OR POLITICAL FAILURE? Dione Brunson, B.A. MALS Mentor: Ralph Nurnberger, Ph.D. ABSTRACT The bold U.S. decision to invade Iraq in 2003 was anchored in intelligence justifications that would later challenge U.S. credibility. Policymakers exhibited unusual bureaucratic and public dependencies on intelligence analysis, so much so that efforts were made to create supporting information. To better understand the amplification of intelligence, the use of data to justify invading Iraq will be explored alongside events leading up to the U.S.-led invasion in 2003. This paper will examine the use of intelligence to invade Iraq as well as broader implications for politicization. It will not examine the justness or ethics of going to war with Iraq but, conclude with the implications of abusing intelligence. iii ACKNOWLEDGMENTS Thank you God for continued wisdom. Thank you Dr. Nurnberger for your patience. iv DEDICATION This work is dedicated to Mom and Dad for their continued support. -
The Middle East Under Malware Attack Dissecting Cyber Weapons
The Middle East under Malware Attack Dissecting Cyber Weapons Sami Zhioua Information and Computer Science Department King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia [email protected] Abstract—The Middle East is currently the target of an un- have been designed by the same unknown entity 1. The next precedented campaign of cyber attacks carried out by unknown malware of this lineage was Flame [7] which was discovered parties. The energy industry is praticularly targeted. The in May 2012 by Kaspersky Lab while investigating another attacks are carried out by deploying extremely sophisticated malware. The campaign opened by the Stuxnet malware in piece of malware called Wiper [8]. Flame features very 2010 and then continued through Duqu, Flame, Gauss, and unusual characteristics such as large size, large number of Shamoon malware. This paper is a technical survey of the modules, self adapting, etc. As Duqu, Flame’s objective is attacking vectors utilized by the three most famous malware, data collection and espionnage. Gauss [9] is another data namely, Stuxnet, Flame, and Shamoon. We describe their main stealing malware discovered in June 2012 by Kaspersky Lab modules, their sophisticated spreading capabilities, and we discuss what it sets them apart from typical malware. The focusing on banking information. Flame and Gauss exhibit main purpose of the paper is to point out the recent trends striking similarities and several technical evidences indicate infused by this new breed of malware into cyber attacks. that they come from the same “factories” that produced Stuxnet and Duqu [9]. The latest malware-based attack Keywords-Malwares; Information Security; Targeted At- tacks; Stuxnet; Duqu; Flame; Gauss; Shamoon targeting the middle east was the Shamoon attack on Saudi Aramco [10]. -
Iraq: Differing Views in the Domestic Policy Debate
Order Code RL31607 Report for Congress Received through the CRS Web Iraq: Differing Views in the Domestic Policy Debate October 16, 2002 name redacted, Meaghan Marshall, name redacted Research Associates Foreign Affairs, Defense, and Trade Division name redacted Specialist in National Defense Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress Iraq: Differing Views in the Domestic Policy Debate Summary The debate over whether, when, and how to prosecute a major U.S. military intervention in Iraq and depose Saddam Hussein is complex, despite a general consensus in Washington that the world would be much better off if Hussein were not in power. Although most U.S. observers, for a variety of reasons, would prefer some degree of allied or U.N. support for military intervention in Iraq, some observers believe that the United States should act unilaterally even without such multilateral support. Some commentators argue for a stronger, more committed version of the current policy approach toward Iraq and leave war as a decision to reach later, only after exhausting additional means of dealing with Hussein’s regime. A number of key questions are raised in this debate, such as: 1) is war on Iraq linked to the war on terrorism and to the Arab-Israeli dispute; 2) what effect will a war against Iraq have on the war against terrorism; 3) are there unintended consequences of warfare, especially in this region of the world; 4) what is the long- term political and financial commitment likely to accompany regime change and possible democratization in this highly divided, ethnically diverse country; 5) what are the international consequences (e.g., to European allies, Russia, and the world community) of any U.S. -
Duqu the Stuxnet Attackers Return
Uncovering Duqu The Stuxnet Attackers Return Nicolas Falliere 4/24/2012 Usenix Leet - San Jose, CA 1 Agenda 1 Revisiting Stuxnet 2 Discovering Duqu 3 Inside Duqu 4 Weird, Wacky, and Unknown 5 Summary 2 Revisiting Stuxnet 3 Key Facts Windows worm discovered in July 2010 Uses 7 different self-propagation methods Uses 4 Microsoft 0-day exploits + 1 known vulnerability Leverages 2 Siemens security issues Contains a Windows rootkit Used 2 stolen digital certificates Modified code on Programmable Logic Controllers (PLCs) First known PLC rootkit 4 Cyber Sabotage 5 Discovering Duqu 6 Boldi Bencsath Announce (CrySyS) emails: discovery and “important publish 25 page malware Duqu” paper on Duqu Boldi emails: Hours later the “DUQU DROPPER 7 C&C is wiped FOUND MSWORD 0DAY INSIDE” Inside Duqu 8 Key Facts Duqu uses the same code as Stuxnet except payload is different Payload isn‟t sabotage, but espionage Highly targeted Used to distribute infostealer components Dropper used a 0-day (Word DOC w/ TTF kernel exploit) Driver uses a stolen digital certificate (C-Media) No self-replication, but can be instructed to copy itself to remote machines Multiple command and control servers that are simply proxies Infections can serve as peers in a peer-to-peer C&C system 9 Countries Infected Six organizations, in 8 countries confirmed infected 10 Architecture Main component A large DLL with 8 or 6 exports and 1 main resource block Resource= Command & Control module Copies itself as %WINDIR%\inf\xxx.pnf Injected into several processes Controlled by a Configuration Data file Lots of similarities with Stuxnet Organization Code Usual lifespan: 30 days Can be extended 11 Installation 12 Signed Drivers Some signed (C-Media certificate) Revoked on October 14 13 Command & Control Module Communication over TCP/80 and TCP/443 Embeds protocol under HTTP, but not HTTPS Includes small blank JPEG in all communications Basic proxy support Complex protocol TCP-like with fragments, sequence and ack. -
Iraq and Yemen: the New Iranian Proxies? Visit WEB Receive Newsletter
Opinion Document 58/2018 May 17, 2018 Ana Belén Soage* Iraq and Yemen: The new Iranian proxies? Visit WEB Receive Newsletter Iraq and Yemen: The new Iranian proxies? Abstract: Iran projects its influence in the Middle East through what has come to be known as the Axis of Resistance, which includes the Syrian regime, Hizbullah in Lebanon, and Hamas and Islamic Jihad in the Palestinian Territories. Over the last decade, two new forces have often been added to the Iranian-led alliance: the Shiite militias in Iraq and the Yemeni Houthis. The two cases are rather different, however. While there is significant evidence that Iran has invested much in Iraq, its efforts in Yemen appear much more modest. Keywords: Iran; Iraq; Yemen; Hizbullah; Houthis; Hamas; Axis of Resistance; Gulf Cooperation Council; Saudi Arabia. * NOTE: The ideas contained in the Opinion Documents are the responsibility of their authors, without necessarily reflecting the thinking of the IEEE or the Ministry of Defense. Documento de Opinión 58/2018 1 Iraq and Yemen: The new Iranian proxies? Ana Belén Soage Introduction The Islamic Republic of Iran is a revisionist power, dissatisfied with the current regional order in the Middle East and seeking opportunities to alter it. It took advantage of the flawed US response to 9/11 to consolidate its narrative around the theme of the Axis of Resistance, and it continued to intervene in weak states through disgruntled actors with similar anti-Western and anti-Israel rhetoric, whatever their political and religious orientation. The outbreak of the Arab Spring gave a temporary boost to the Iranian narrative but prompted a reaction from the Saudi-led GCC which put the Axis of Resistance on the defensive, notably in Syria. -
The Flame: Questions and Answers 1.8
The Flame: Questions and Answers 1.8 Aleks Kaspersky Lab Expert Posted May 28, 13:00 GMT Tags: Targeted Attacks, Wiper, Cyber weapon, Cyber espionage, Flame Duqu and Stuxnet raised the stakes in the cyber battles being fought in the Middle East – but now we’ve found what might be the most sophisticated cyber weapon yet unleashed. The ‘Flame’ cyber espionage worm came to the attention of our experts at Kaspersky Lab after the UN’s International Telecommunication Union came to us for help in finding an unknown piece of malware which was deleting sensitive information across the Middle East. While searching for that code – nicknamed Wiper – we discovered a new malware codenamed Worm.Win32.Flame. Flame shares many characteristics with notorious cyber weapons Duqu and Stuxnet: while its features are different, the geography and careful targeting of attacks coupled with the usage of specific software vulnerabilities seems to put it alongside those familiar ‘superweapons’ currently deployed in the Middle East by unknown perpetrators. Flame can easily be described as one of the most complex threats ever discovered. It’s big and incredibly sophisticated. It pretty much redefines the notion of cyberwar and cyberespionage. For the full lowdown on this advanced threat, read on… General Questions What exactly is Flame? A worm? A backdoor? What does it do? Flame is a sophisticated attack toolkit, which is a lot more complex than Duqu. It is a backdoor, a Trojan, and it has wormlike features, allowing it to replicate in a local network and on removable media if it is commanded so by its master. -
Potential Human Cost of Cyber Operations
ICRC EXPERT MEETING 14–16 NOVEMBER 2018 – GENEVA THE POTENTIAL HUMAN COST OF CYBER OPERATIONS REPORT ICRC EXPERT MEETING 14–16 NOVEMBER 2018 – GENEVA THE POTENTIAL HUMAN COST OF CYBER OPERATIONS Report prepared and edited by Laurent Gisel, senior legal adviser, and Lukasz Olejnik, scientific adviser on cyber, ICRC THE POTENTIAL HUMAN COST OF CYBER OPERATIONS Table of Contents Foreword............................................................................................................................................. 3 Acknowledgements ............................................................................................................................. 4 Executive summary ............................................................................................................................. 5 Introduction....................................................................................................................................... 10 Session 1: Cyber operations in practice .………………………………………………………………………….….11 A. Understanding cyber operations with the cyber kill chain model ...................................................... 11 B. Operational purpose ................................................................................................................. 11 C. Trusted systems and software supply chain attacks ...................................................................... 13 D. Cyber capabilities and exploits .................................................................................................. -
No Random, No Ransom: a Key to Stop Cryptographic Ransomware
No Random, No Ransom: A Key to Stop Cryptographic Ransomware Ziya Alper Genç, Gabriele Lenzini, and Peter Y.A. Ryan Interdisciplinary Centre for Security Reliability and Trust (SnT) University of Luxembourg Abstract. To be effective, ransomware has to implement strong encryp- tion, and strong encryption in turn requires a good source of random numbers. Without access to true randomness, ransomware relies on the pseudo random number generators that modern Operating Systems make available to applications. With this insight, we propose a strategy to miti- gate ransomware attacks that considers pseudo random number generator functions as critical resources, controls accesses on their APIs and stops unauthorized applications that call them. Our strategy, tested against 524 active real-world ransomware samples, stops 94% of them, including WannaCry, Locky, CryptoLocker and CryptoWall. Remarkably, it also nullifies NotPetya, the latest offspring of the family which so far has eluded all defenses. Keywords: ransomware, cryptographic malware, randomness, mitigation. 1 Introduction Ransomware is a malware, a malicious software that blocks access to victim’s data. In contrast to traditional malware, whose break-down is permanent, ransomware’s damage is reversible: access to files can be restored on the payment of a ransom, usually a few hundreds US dollars in virtual coins. Despite being relatively new, this cyber-crime is spreading fast and it is believed to become soon a worldwide pandemic. According to [24], a US Govern- ment’s white paper dated June 2016, on average more than 4,000 ransomware attacks occurred daily in the USA. This is 300-percent increase from the previous year and such important increment is probably due to the cyber-crime’s solid business model: with a small investment there is a considerable pecuniary gain which, thanks to the virtual currency technology, can be collected reliably and in a way that is not traceable by the authorities. -
A PRACTICAL METHOD of IDENTIFYING CYBERATTACKS February 2018 INDEX
In Collaboration With A PRACTICAL METHOD OF IDENTIFYING CYBERATTACKS February 2018 INDEX TOPICS EXECUTIVE SUMMARY 4 OVERVIEW 5 THE RESPONSES TO A GROWING THREAT 7 DIFFERENT TYPES OF PERPETRATORS 10 THE SCOURGE OF CYBERCRIME 11 THE EVOLUTION OF CYBERWARFARE 12 CYBERACTIVISM: ACTIVE AS EVER 13 THE ATTRIBUTION PROBLEM 14 TRACKING THE ORIGINS OF CYBERATTACKS 17 CONCLUSION 20 APPENDIX: TIMELINE OF CYBERSECURITY 21 INCIDENTS 2 A Practical Method of Identifying Cyberattacks EXECUTIVE OVERVIEW SUMMARY The frequency and scope of cyberattacks Cyberattacks carried out by a range of entities are continue to grow, and yet despite the seriousness a growing threat to the security of governments of the problem, it remains extremely difficult to and their citizens. There are three main sources differentiate between the various sources of an of attacks; activists, criminals and governments, attack. This paper aims to shed light on the main and - based on the evidence - it is sometimes types of cyberattacks and provides examples hard to differentiate them. Indeed, they may of each. In particular, a high level framework sometimes work together when their interests for investigation is presented, aimed at helping are aligned. The increasing frequency and severity analysts in gaining a better understanding of the of the attacks makes it more important than ever origins of threats, the motive of the attacker, the to understand the source. Knowing who planned technical origin of the attack, the information an attack might make it easier to capture the contained in the coding of the malware and culprits or frame an appropriate response. the attacker’s modus operandi. -
Detecting Botnets Using File System Indicators
Detecting botnets using file system indicators Master's thesis University of Twente Author: Committee members: Peter Wagenaar Prof. Dr. Pieter H. Hartel Dr. Damiano Bolzoni Frank Bernaards LLM (NHTCU) December 12, 2012 Abstract Botnets, large groups of networked zombie computers under centralised control, are recognised as one of the major threats on the internet. There is a lot of research towards ways of detecting botnets, in particular towards detecting Command and Control servers. Most of the research is focused on trying to detect the commands that these servers send to the bots over the network. For this research, we have looked at botnets from a botmaster's perspective. First, we characterise several botnet enhancing techniques using three aspects: resilience, stealth and churn. We see that these enhancements are usually employed in the network communications between the C&C and the bots. This leads us to our second contribution: we propose a new botnet detection method based on the way C&C's are present on the file system. We define a set of file system based indicators and use them to search for C&C's in images of hard disks. We investigate how the aspects resilience, stealth and churn apply to each of the indicators and discuss countermeasures botmasters could take to evade detection. We validate our method by applying it to a test dataset of 94 disk images, 16 of which contain C&C installations, and show that low false positive and false negative ratio's can be achieved. Approaching the botnet detection problem from this angle is novel, which provides a basis for further research. -
The Bush Revolution: the Remaking of America's Foreign Policy
The Bush Revolution: The Remaking of America’s Foreign Policy Ivo H. Daalder and James M. Lindsay The Brookings Institution April 2003 George W. Bush campaigned for the presidency on the promise of a “humble” foreign policy that would avoid his predecessor’s mistake in “overcommitting our military around the world.”1 During his first seven months as president he focused his attention primarily on domestic affairs. That all changed over the succeeding twenty months. The United States waged wars in Afghanistan and Iraq. U.S. troops went to Georgia, the Philippines, and Yemen to help those governments defeat terrorist groups operating on their soil. Rather than cheering American humility, people and governments around the world denounced American arrogance. Critics complained that the motto of the United States had become oderint dum metuant—Let them hate as long as they fear. September 11 explains why foreign policy became the consuming passion of Bush’s presidency. Once commercial jetliners plowed into the World Trade Center and the Pentagon, it is unimaginable that foreign policy wouldn’t have become the overriding priority of any American president. Still, the terrorist attacks by themselves don’t explain why Bush chose to respond as he did. Few Americans and even fewer foreigners thought in the fall of 2001 that attacks organized by Islamic extremists seeking to restore the caliphate would culminate in a war to overthrow the secular tyrant Saddam Hussein in Iraq. Yet the path from the smoking ruins in New York City and Northern Virginia to the battle of Baghdad was not the case of a White House cynically manipulating a historic catastrophe to carry out a pre-planned agenda.