Quick viewing(Text Mode)

Hacking in a Foreign Language: a Network Security Guide to Russia

Hacking in a Foreign Language: a Network Security Guide to Russia

Hacking in a Foreign Language: A Network Security Guide to Russia

Kenneth Geers CISSP Briefing Outline

1. Russia as a Threat 2. Russia as a Resource 3. Crossing Borders: Methodology 4. The International Political Scene Russia as a Threat Hacking: A Russian Perspective

• Excellent technical education • Understanding of networks, programming • 1980’s: hacked American software in order to make programs work in USSR • Now: many skilled people, too few jobs • Russian police have higher priorities! Financial Incentive

access is expensive – Cheaper to steal access and services • Legit MS Office = 2 months’ salary • CD burner = two weeks’ salary • Russian outdoor markets: – MS Operating System a few dollars • Hacking: more social approval? – Communal sharing culture • Financial crimes: banks, , piracy • Russian citizen Igor Kovalyev: – “Hacking is … one of the few good jobs left.” • Vladimir Levin: – 1994-95 transferred $10 million from Citibank – FBI NYC and Russian Telecoms traced activity to Levin’s St Petersburg employer • Microsoft: Oct 2000: – Traced to IP in St. Petersburg, Russia • Coreflood and Joe Lopez – Keyloggers and Ebay Dmitry Sklyarov

• DefCon IX speaker • First Indictment under Digital Millennium Copyright Act (DMCA) – Advanced eBook Processor "AEBPR” – Five Adobe copyright violations • Dmitry: – Computer programmer and cryptanalyst • Long confession on FBI site – Cooperated in prosecuting Elcomsoft – Company acquitted • Victory for the EFF! ZDE = $ • Russian MVD: – Cyber crime doubled in year 2003 – 11,000 reported cases • New techniques equal new revenue • High profits bring more investment • FBI: – Millions of #'s stolen by hacker groups in Russia and Ukraine • Arrests in 2004: – International gambling ring – Russian student fined for IIS Annihilation

• Sophisticated HangUP Web attack – Exploits Microsoft IIS, Internet Explorer – Appends malicious JavaScript onto webpages of infected site • Web surfers viewing infected pages invisibly redirected to a Russian hacker site • Russian server at 217.107.218.147 – Loaded and key logger onto victim • Snatched authentication info: – eBay, PayPal, EarthLink, Juno, and Yahoo NCW 1.0, Backdoor.NCW [Kaspersky], BackDoor-FE [McAfee], Network Crack Wizard, [F-Prot], Trojan.PSW.HackPass, A-311 Death, Backdoor.Hackdoor.b, Backdoor.Haxdoor for pdx32.sys, Backdoor.Haxdoor.e, Backdoor.Haxdoor.g, FDar, TrojanDownloader.Win32.Fidar.10, BackDoor- Downloader-CF trojan, TrojanDownloader.Win32.Fidar.11.a, Secret Messenger, BolsheVIK's Sec v1, Secret Messager, AntiLamerRussian Light, Antilam, Backdoor.AJW, Backdoor.Antilam, Dialer.DQ [Pa Trojan.PSW.AlLight.10.a, Trojan.PSW.AlLight.10.b), Trojan.PSW.AlLight.11.d, Trojan.PSW.AlLig Trojan.PSW.AlLight.21, AntiLamer Backdoor, Backdoor.Antilam.11, Backdoor.Antilam.12.a, Back Antilam.12.b, Backdoor.Antilam.14.a, Backdoor.Antilam.14.c, Backdoor.Antilam.20.a, Backdoor.A Backdoor.Antilam.20.k, Backdoor.Antilam.20.m, Backdoor.Antilam.g1, BackDoor-AED trojan, PW rojan, Barrio, Barrio Trojan, Trojan.PSW.Barrio.305, Trojan.PSW.Barrio.306, Trojan.PSW.Barrio Trojan.PSW.Barrio.50, EPS E-Mail Password Sender, Trojan.PSW.Eps.109, Trojan.PSW.Eps.15 Trojan.PSW.Eps.161, Trojan.PSW.Eps.165, Trojan.PSW.Eps.166, M2 Trojan, jan.Win32.M2.147 PSW.Hooker.g, Trojan.PSW.M2.14, Trojan.PSW.M2.145, Trojan.PSW.M2.148, Trojan.PSW.M2. Trojan.PSW.M2.16, Zalivator, Backdoor.Zalivator.12, Backdoor.Zalivator.13, Backdoor.Zalivator. Backdoor.Zalivator.142, Naebi, AntiLamer Toolkit Pro 2.36, Trojan.PSW.Coced.236, Trojan.PSW Trojan.PSW.Coced.236.d, Trojan.PSW.Coced.238, Trojan.PSW.Coced.240, Trojan.PSW.Coced System 2.3, Backdoor.SpySystem.23, Backdoor.SpySystem.23 [Kaspersky], Win32.Lom, [Kaspe Win32.Lom for server, Backdoor.Agobot, Backdoor.Agobot [Kaspersky], Backdoor.Agobot.cr [Ka Backdoor.Agobot.gen [Kaspersky], Backdoor.Agobot.ik [Kaspersky], MS03-026 Exploit.Trojan [C Associates], W32.HLLW.Gaobot.gen [Symantec], W32/Gaobot.worm.gen [McAfee], Win32.Agob Computer Associates], Win32.Agobot.NO [Computer Associates], Win32/Agobot.3.GG trojan [E Win32/Agobot.3.LO trojan [Eset], Win32/Agobot.IK trojan [Eset], Win32/Agobot.NO.Worm [Comp Associates], Digital Hand, Backdoor.DigitalHand.10, DigitA1 hAnd, Lamers Death, Backdoor.Dea Death.22, Backdoor.Death.23, Backdoor.Death.24, Backdoor.Death.25.a, Backdoor.Death.25.b Backdoor.Death.25.e, Backdoor.Death.25.f, Backdoor.Death.25.g, Backdoor.Death.25.i, Backdo Death.25.k, Backdoor.Death.26, Backdoor.Death.26.c, Backdoor.Death.26.d, Backdoor.Death.26 Backdoor.Death.26.f, Backdoor.Death.27.a, Backdoor.Death.27.b, Backdoor.Death.27.c, Backdo Social Engineering Criminal Communication • Public Web forums – Many no registration for read access – Meeting place for beginners, fearless criminals – Information sharing and “career building” – Government agencies are watching • Closed forums – Registration required – Recommendations from senior members • Thereafter, secure communications – Peer-to-peer – Provided by forum software or ICQ Links

http://www.all-about-all.ru/forum/index.php http://thecc.su/index.php http://cardingworld.net/forum/index.php http://xsreal.ru/forum/ http://www.x-forum.ru/ Merchandise

• Announce your service… – Socks proxies – Hacked sites – Credit card numbers – – Telecommunications connections – Use your imagination • For respect, your nick must become known – Based on services you can deliver – And deals you can make Getting Paid

• Announcement of 'services' includes price • Your service will be immediately checked out – Usually by forum administrators • Not legit? – You get “ripper” status – This means banishment – forever! • Forum may use Webmoney system – WebMoney born in Russia • The international movement • DoD: SW piracy group – Founded in Russia 1993 – Expanded internationally in1990's • 1998-2001, over $50 million in warez • 20 “candy store” FTP sites ("Godcomplex”) •Sophisticated security includes encryption • Operation Buccaneer – “Bandido” and “thesaint” arrested Hacktivism • RAF (Russian Antifascist Frontier) • CHC (Chaos Hackers Crew) – Hit NATO in response to bombings in Yugoslavia with virus-infected email – “Protest actions" against White House and Department of Defense servers • United Kingdom – Lost database information • United States – No impact on war effort claimed • Hacking your political adversary’s sites: – Morally justifiable? Espionage • KGB, SVR, FSB, FAPSI • Robert Hanssen – Veteran FBI CI agent, C programmer – Created a FBI field office teletype system – Hacked FBI superior’s account – Mid-1980’s: encrypted BBS messages – Offered wireless encryption via Palm VII – Highly classified info for $ and diamonds – Internal searches: “hanssen dead drop washington” Information Warfare

• Revolution in Military Affairs (RMA) – Electronic Command and Control • Information weapons: “paramount” attention – Unconventional, asymmetric, force multiplier – Viruses, logic bombs, microbes, micro-chipping – Ultimate goal: digital Pearl Harbor • Russia second only to … United States? – Required “response” to US • National critical infrastructure protection – “Electronic Russia” project Cyber War in Practice

• Chechen conflict 1994-1996 – Cyber War: Chechens 1, Russia 0 • Chechen conflict 1997-Present – Cyber War: Russia 1, Chechens 0 • Websites involved: – www.qoqaz.net, www.kavkaz.org, www.chechenpress.com, www.infocentre.ru • Videos of attacks on Russians, Russian POWs • Cyber attacks concurrent with storming of Moscow theater • Kavkaz server located in US! – Domain registration changed, information erased Threat Summary • Post-Soviet Escape: – Hackers, crackers, and virus writers • Internet access in Russia growing – So is malicious code from Russia • Organized cyber crime: – Whole world impact • Novarg, MyDoom, Bagel, Mydoom, – Slows transformation to legitimate market • Money reinvested into other crime: – Smuggling, prostitution Russia as a Resource Hacker Sites Сайты Хакера: Hacker Sites http://thm.h1.ru/ http://www.hacker.dax.ru/ http://ahteam.org/ http://hscool.net/ http://cracklab.narod.ru/ http://www.xakepy.ru/ http://www.geekru.narod.ru/ http://www.cyberhack.ru/ http://hangup.da.ru/ http://www.mazafaka.ru/ http://www.xakep.ru/ http://madalf.ru/ http://www.xakepxp.by.ru/ http://tehnofil.ru/ http://www.kibus1.narod.ru/ http://forum.web-hack.ru/ http://hscool.net/ http://www.cyberhack.ru/ www.cyberhack.ru motto

“Хакеры, Взлом, Защита, Программирование, Исходники, Халява, Софт, Проги”

Хакеры: Hackers Взлом: Attack Защита: Defense Программирование: Programming Исходники: Beginners Халява Warez Софт: Software Проги: Programs Site Map Hacker Tools ƒ Port Scanner Main ƒ Anonymous ƒ Training Email ƒ DNS Informer News ƒ Archive Statistics ƒ Most Popular Resources Friends ƒ Download ƒ Resources… ƒ Articles ƒ Free Stuff… ƒ Search

Discussions ƒ Forum Articles by Topic

Хакерство: Hacking Халява: Warez Программирование: Programming Вирусология: Virology Защита: Defense Внедрение: Intrusion Системы: Systems Архив Статей: Archive of Articles Загрузки: Downloads

Безопасность: Security Пароли: Passwords Прочее: Miscellaneous Трояны: Trojans Защита: Defense Литература: Literature Нападение: Attack Программирование: Programming Сканеры: Scanners Top Ten Downloads

The only tool above (same name) found on the www.insecure.org Top 75 Network Security Tools was the Retina Scanner, at #21. Discussion Forums How to Hack?

How to Defend? Social Engineering Programming Operating Systems Off Topic Contact Info

People: White/Black Lists Trinkets: Buy and Sell Хакерские Утилиты

Port: 80 Open Results for Service: HTTP kremlin.ru:

Hacker Tools: TCP Port Scanner Anonymous E-mail DNS Informer

“Big brother is always watching over you, don’t forget ;)” Administrators and Contact

Administrators: [email protected] [email protected] Software Translation

• Natural Language Processing (NLP): the subfield of artificial intelligence and linguistics that studies the processing of NL (English, Dutch, Russian, etc) – Devoted to making computers "understand" human languages • Machine translation (MT): computer translation of texts from one natural language to another – Considers grammatical structure – Renders up to 80% accuracy – Draft-quality, not for literature or legal texts – Humans still need to pre- and post-edit (proof-read) – Ultimate goal is no human intervention Professional Translations

Hacker Attitude: Hackers solve problems and build things, and they believe in freedom and voluntary mutual help. To be accepted as a hacker, you have to behave as though you have this kind of attitude yourself. And to behave as though you have the attitude, you have to really believe the attitude. Хэкерский подход: Хэкеры решают проблемы и строят вещи, они верят в свободу и в добровольную взаимопомощь. Для того, чтобы вас воспринимали как хэкера, вы должны вести себя так, как если бы это была ваша собственная позиция. А для того, чтобы вести себя так, будто это ваша позиция, вы должны действительно верить в эту позицию.

From How To Become A Hacker, by Eric Steven Raymond Free Translation Services

• www.word2word.com • www.google.com/language_tools – non-Euro: Japanese, Korean, Chinese • www.babelfish.altavista.com – up to 150 words or a webpage • www.translate.ru (Russian site) • www.freetranslation.com • www.translation2.paralink.com • www.foreignword.com/Tools/transnow.htm – 1600 language pairs Commercial Translation Software

• www.lingvo.ru (Russian site) • www.worldlingo.com • www.tranexp.com • www.babylon.com – free trial version download • www.allvirtualware.com • www.systransoft.com • www.languageweaver.com – several prestigious awards Translation Software at Work 1

Smashing The Stack For Fun And Profit by Aleph One [email protected]

`smash the stack` [C programming] n. On many C implementations it is possible to corrupt the execution stack by writing past the end of an array declared auto in a routine. Code that does this is said to smash the stack, and can cause return from the routine to jump to a random address. This can produce some of the most insidious data-dependent bugs known to mankind. Variants include trash the stack, scribble the stack, mangle the stack; the term mung the stack is not used, as this is never done intentionally. See spam; see also alias bug, fandango on core, memory leak, precedence lossage, overrun screw. Translation Software at Work 2 Ломать Стог Для Потехи И Профита: Алепю одним, smash ` [email protected]. stack`

[ ч программируя ] н. На много вставк ч по возможности коррумпировать стог исполнения путем писание за концом автомобиля объявленного блоком в режиме. Закодируйте делает это сказаны, что ломает стог, и может причинить возвращение от режима к скачке к случайно адресу. Это может произвести некоторые из самых злокозненных данн-zavisimyx черепашок знанных к mankind. Варианты вклюают погань стог, scribble стог, мангль стог; термина mung стог не использована, как это никогда не сделано преднамеренно. См. spam; см. также alias черепашку, fandango на сердечнике, утечке памяти, lossage предшествования, винте заскока.

Babel Fish Translation Translation Software at Work 3

To break Stack For The fun I of the profit: To alepyu one, smash ` [email protected]. stack`

[ h programming ] n. na many vstavk h as far as possible to korrumpirovat' the stack of the performance by way writing after the end of the automobile of that declared by block in the regime. Code makes this they are said, which breaks stack, and it can cause return from the regime to the gallop to randomly the address. This can produce some of the most insidious it is given - .zavisimyx cherepashok znannykh to mankind. Versions vklyuayut trash stack, scribble stack, mangle stack; term mung stack it is not used, as this is never done prednamerenno. See spam; see also alias bug, fandango on the core, the leakage of memory, lossage precedence, the screw of overrun. Russified Software

www.web.ru/Resource/ www.russianeditor.com/ Crossing International Borders in Cyberspace Four T Plan • Tribes – Anthropological: history, culture, law • Terrain – Infrastructure: publications, traceroutes • Techniques – Hacker sites, groups, news, malware • Translation – Leveling the playing field Russia Rostelecom Russian Telecommunications

• Internet country codes: .ru, .su • Internet hosts: 600,000, Users: 6 million • Telephones: 35.5 mil, Cell: 17.5 mil – Digital trunk lines: Saint Petersburg to Khabarovsk, Moscow to Novorossiysk • International connections: – Three undersea fiber-optic cables – 50,000 digital call switches – Satellite: Intelsat, Intersputnik, Eutelsat, Inmarsat, Orbita – International Country Code: 7 РУНЕТ

• RUNET, or Russian Net • Russian cyberspace – Everything Russian AND Internet – All online content generated: •In Russian • For Russians – Aimed at Russian community worldwide • Includes the hackers and the ‘stupid users’ – чайник and олень • Parallel: CHINANET Internet Usage by Country Internet Usage in Russia Golden Telecom Rostelecom Learning to Fish: Traceroutes

• Maps the routes data travel across networks – Gives physical locations of Web servers and routers – Possible to plot these on a map • Determines connectivity and data flow efficiency • Possible to determine who owns the network – Can trace unwanted activity like scans and spam – Can help in finding contact information • Can report type of remote computer running Tracerouting Russia TraceReport.bat tracert 303.shkola.spb.ru >tracerpt.txt tracert acorn-sb.narod.ru >>tracerpt.txt tracert adcom.net.ru >>tracerpt.txt tracert admin.smolensk.ru >>tracerpt.txt tracert agentvolk.narod.ru >>tracerpt.txt tracert alfatelex.tver.ru >>tracerpt.txt tracert anarchy1.narod.ru >>tracerpt.txt Traceroute Map of Russia New York

Stockholm Arkhangelsk

Kaliningrad

Sakhalin

12.123.3.x att.net New York > 193.10.68.x nordu.net Stockholm, Sweden > 193.10.252.x RUN.net Moscow, Russia > 193.232.80.x spb-gw.runnet.ru Federal Center for University Network > 194.106.194.x univ.kern.ru Kaliningrad, Russia (Kaliningrad State University) 62.84.193.x Sweden SE-COLT-PROVIDER > 217.150.40.x transtelecom.net Russia > 213.24.60.x artelecom.ru Russia > 80.82.177.x dvinaland.atnet.ru Arkhangelsk, Russia > 80.82.178.x www.dvinaland.ru Arkhangelsk, Russia 213.248.101.x telia.net Telia International Carrier > 217.106.5.x RTComm.RU Russia > 195.72.224.x sakhalin.ru Sakhalin, Russia, UBTS, Yuzhno-Sakhalinsk > 195.72.226.x www.adm.sakhalin.ru Sakhalin, Russia (Regional Admin of Sakhalin Island and Kuril's) Major Russian IP ranges

• 193 .124 .0 .0 – 193 .124 .0 .255 EUnet/RELCOM; Moscow • 193 .125 .0 .0 – 193 .125 .0 .255 Novosibirsk State Tecnical University • 193 .233 .0 .0 – 193 .233 .0 .255 FREEnet Network Operations Center • 194 .67 .0 .0 – 194 .67 .0 .255 Sovam Teleport; Moscow, Russia • 195 .161 .0 .0 – 195 .161 .0 .255 Rostelecom/Internet Center • 195 .209 .0 .0 – 195 .209 .15 .255 Russian Backbone Net • 195 .54 .0 .0 – 195 .54 .0 .255 Chelyabinsk Ctr Scientific and Tech Info • 212 .122 .0 .0 – 212 .122 .1 .255 Vladivostok Long Dist and Int’l Telephone • 212 .16 .0 .0 – 212 .16 .1 .255 Moscow State University • 212 .41 .0 .48 – 212 .41 .0 .63 Siberian Institute of Information Tech • 212 .6 .0 .0 – 212 .6 .0 .255 WAN and Dial Up interfaces • 213 .158 .0 .0 – 213 .158 .0 .255 Saint Petersburg Telegraph • 213 .221 .0 .80 – 213 .221 .0 .83 SOVINTEL SHH NET, Moscow • 217 .114 .0 .0 – 217 .114 .1 .255 RU SKYNET Offensive IP Ranges • Bob’s Block List (BBL): http://www.unixhub.com/block.html – Spammers: mail.ru, ufanet.ru, hotmail.ru, nsc.ru, id.ru, all banner.relcom.ru • Spamcop.Net: www.spamcop.net – No Russian IPs listed! • The Spamhaus Project: http://www.spamhaus.org/ Russian Government Portal www.kremlin.ru Russian Cyber Crime Office

Understanding C. Crime Information Protection Laws Anthology Information Security in Russia Computer Criminals

C. Crime Units

SORM Send an E-mail Library Forum

“Cybernetic Police”: http://www.cyberpol.ru/ [email protected] Киберполиции: Cybernetic Police

Principles Objectives Goals

Types of Threats Challenges

Physical Threats Subjects Means Directions Official Russian Designations

кардеры (от английского слова "card") - лица, специализирующиеся на незаконной деятельности в сфере оборота пластиковых карт - документов на машинном носителе и их электронных реквизитов. фрэкеры (от английского слова "phreacker") - лица, специализирующиеся на совершении преступлений в области электросвязи с использованием конфиденциальной компьютерной информации и специальных технических средств разработанных (приспособленных, запрограммированных) для негласного получения информации с технических каналов крэкеры (от английского слова "cracker") - лица, занимающиеся "взломом" (модификацией, блокированием, уничтожением) программно - аппаратных средств защиты компьютерной информации, охраняемых законом Cybercrime Statistics to 1982! Киберполиции: Regional Offices http://ndki.narod.ru/links/MVD_online.html

Республики: Отдел "Р" МВД Республики Горный Алтай: Altay Отдел "Р" УВД Кировской области: Kirov Отдел "К" МВД Республики Мордовия: Mordoviya Отдел "К" УВД Костромской области: Kostroma МВД Республики Татарстан: Tatarstan Отдел "К" УВД Липецкой области: Lipetsk Отдел "К" МВД Республики Чувашия: Chuvashiya Отдел "К" ГУВД Нижегородской области: Nizhniy Края: Отдел "Р" УВД Новгородской области: Novgorod Отдел "К" УСТМ ГУВД Алтайского края: Altay Отдел "К" УВД Оренбургской области: Orenburg Отдел "К" ГУВД Красноярского края: Krasnoyarsk Отдел "К" ГУВД Самарской области: Samara Отдел "К" УВД Приморского края: Primorskiy Отдел "Р" УВД Тамбовской области: Tambov Отдел "К" УВД Ставропольского края: Stavropol' Отдел "Р" УВД Тульской области: Tula Области: Отдел "Р" УВД Ульяновской области: Ul'yanovsk Отдел "К" УВД Архангельской области: Arkhangel'sk Отдел "К" УВД Читинской области: Chita Отдел "Р" УВД Владимирской области: Vladimir Автономные округа: УФСБ России по Воронежской области: Voronezh Отдел "К" УВД Ханты-Мансийского АО: Khanty-Mansi Russian Cyber Crime Fighter

Ф.И.О.: Вехов Виталий Борисович Ученая степень и звание: кандидат юридических наук, доцент, подполковник милиции. Место работы: Волгоградская Академия МВД России, факультет повышения квалификации, кафедра организации следственной работы. Тема кандидатской диссертации: Криминалистическая характеристика и совершенствование практики расследования и предупреждения преступлений, совершаемых с использованием средств компьютерной техники. – Волгоград., 1995. Область научных интересов: методика выявления, раскрытия, расследования и предупреждения компьютерных преступлений; криминалистическое компьютероведение; использование компьютерных технологий в деятельности органов предварительного расследования; защита информации; техническая разведка; радио-электронная борьба. Научные труды: более 40 опубликованных работ. Втомчисле2 монографии, 2 учебно-практических и 4 учебно-методических пособия, 3 примерных методических программ для вузов МВД, главы в учебниках (список опубликованных работ). E-mail: [email protected] Web: www.cyberpol.ru - автор проекта Dialogue with Top Cyber Cop

Здравствуйте, уважаемый Kenneth Geers! Можем дать следующие ответы на Ваши вопросы. Вопрос: Получали ли вы в прошлом запросы об информации из-за рубежа? Ответ: Да. Каждый день 89 подразделений Национального центрального бюро Интерпола России (89 divisions of a National central bureau of Interpol of Russia) по E-mail получают и обрабатывают много поручений и запросов от правоохранительных организаций стран - членов Международной организации уголовной полиции Interpol. Вопрос: Что мешает улучшению международного сотрудичества? Ответ: Разные правовые нормы в действующих национальных законодательствах. Требуется их частичная унификация. Вопрос: Вы думаете было-бы трудно найти общую почву чтобы поделиться информацией? Ответ: По международным соглашениям мы без особых проблем обмениваемся разведывательной и иной информацией о преступлениях и правонарушениях со специальными службами зарубежных государств. В последнее время часто проходят совместные совещания, семинары и конференции наших сотрудников с сотрудниками FBI (USA). Вопрос: Вы думаете что боязнь утери национального суверенитета –непреодолимое препятствие? Ответ: Обмен информацией на основе двухстороннего или многостороннего Договора (юридического акта) не опасен для национального суверенитета. Спасибо за вопросы. Были рады Вам помочь. Кем (по какой специальности) Вы работаете? Суважением, Виталий Вехов Несколько Вопросов

К кому я могу обратиться по поводу гарантии информации? To whom should I direct questions on information assurance? Каким образом я должен доложить о подозрительных действиях в сети? How should I send you suspicious network information? Это представляет угрозу Windows/Linux/Solaris? Does this pose a threat to Windows/Linux/Solaris? Когда последний раз вы сделали дупликаты своих данных? When is the last time you backed up your data? Вы сможете нарисовать мне диаграмму/карту вашей сети? Can you draw me a diagram of your network? Выдумаетечтоэтаугрозабыланаправленаличнопротивменя? Do you think this threat was directed at me personally? English-Russian Cyber Lexicon English Pусский Pronunciation account аккаунт, акк account banner баннер banner blog блог blog browser браузер browser сash, cache кеш сash chat чат chat domain домен domain e-mail электронная почта elektronaya pochta flame флэйм, флейм flame host, hosting хост, хостинг host, hosting java, javascript жаба, жабаскрипт zhaba, zhabascript hacker хакер, хэкер hacker Internet интернет internet English-Russian Cyber Lexicon English Pусский Pronunciation login логин logeen nick ник neek patch патч patch programme программа, прога programa, proga screenshot скриншот screenshot server сервер server site сайт site spam спам spam tools тулза toolza user юзер user warez варез vaarez web веб veb zip зип zeep One Word English, German, Italian, Portuguese, and Norwegian: Hacker Russian: хакер Dutch: De computerkraker, hakker Arabic: El Qursan (‘Pirate’) האקר :Hebrew Chinese: 电脑黑客 Spanish: pirata informático Korean: 해커 Japanese: ハッカー Greek: χάκερ French: Fouineur, bidouilleur Local Cyber News

• Reading the local newspapers – http://www.gazeta.ru – http://www.lenta.ru – http://www.kommersant.ru – http://www.itogi.ru – http://www.izvestia.ru – http://www.mn.ru – http://www.mk.ru – “…Putin keen to set up IT park…efforts underway to identify site…potential for much cooperation with India…” www.antispam.ru Kaspersky Labs

• The most “hated” man by Russian hackers • Former Soviet military researcher • 15+ years anti-virus and R&D • Accuracy and frequency of updates well-regarded –Hourly! • “Criminal elements” now write 90% of malware • Says more cyber crime from Brazil than Russia • Alleged connections to law enforcement The International Political Scene International Law Enforcement Links at Cyber Criminals Most Wanted Links to UK websites include: Website (www.ccmostwanted.com) for 67 countries (* = cybercrime laws in place): Child Pornography Consumer Protection Andorra, Argentina*, Australia*, Austria*, Belgium*, Brazil*, Brunei, Canada*, Chile*, Cyber Rights & Civil Liberties China*, Czech Republic*, Denmark*, Fiji, Financial Services Authority Finland*, France*, Georgia, Germany*, Harmful or illegal website content Internet Police Greece*, Guam, Hong Kong, Hungary*, Internet Watch Foundation Iceland*, India*, Indonesia, Iran, Ireland*, Missing Kids Israel*, Italy*, Jamaica, Japan*, Jordan, Korea National Crime Squad - North*, Korea - South*, Latvia*, Lebanon, Specialist Crime OCU Fraud Squad Liechtenstein, Luxembourg*, Malaysia*, National Criminal Intelligence Service Malta*, Mexico*, Netherlands*, Nigeria, New National High-Tech Crime Unit Zealand*, Norway*, Pakistan, Peru, Nigerian Scams Philippines*, Poland*, Portugal*, Puerto Rico, Pedophile Activity - Newsgroup Russia*, Singapore*, Scotland, Slovenia, Pedophile Activity - Website South Africa*, Spain*, Sweden*, Switzerland*, Pyramid Schemes Taiwan, Thailand, Trinidad, Turkey*, Uganda, Serious Fraud Office Ukraine, United Kingdom*, United States*, Victim Support Uruguay, Yugoslavia International Law

• Currently ill-suited for cybercrime • Internet a borderless medium – Cannot apply nation-state style borders • Definitions of cybercrime vary – Likewise the punishments • Extradition of criminals – Difficult on many levels • Bounty hunting: Microsoft • Tapping fan-base: Half-Life 2 Extra-Territoriality and Investigations

• Impossible to examine all foreign packets • High level of anonymity on the Web • Scarcity of good log data (and expertise) • Digital information can be destroyed quickly • Evidence should be secured ASAP • Cultural, linguistic, and political barriers • Traceback involves time lags The FBI Sting

• 2000: FBI learns hackers cracking banks, ISPs, and other firms in U.S. • Activity traced to Russia • Failed to acquire Russian assistance • Took unilateral action with U.S. search warrant • Invited two Russians to Seattle for “interviews” • Sniffed keystrokes for usernames/passwords • FBI officials never left their offices in U.S. • First FBI extra-territorial seizure Remote Search and Seizure • Inconsistent with international law? • Reconnaissance often uses universal media for observation in other countries – Binoculars, telescopes, surveillance aircraft, commercial satellites – personal interviews, mass media • Network reconnaissance any different? – No physical entry • Invasion or picture taking? European Cybercrime Convention

• Global cybercrime task force like Interpol? • Opposition concerns: – Civil liberties (abuse of data sharing) – Poor relations between certain countries – Big obligations on ISPs – No cross-border searches, even in hot pursuit – Need to consult with local officials – Universal consent (safe havens) International Law: The Future Voluntary participants need three things: • Technological capability • Legal authority – Territorial Sovereignty • Willingness to Cooperate – Including ability: language, cultural political barriers • PRC CERT: One person, and he only speaks Chinese?!? Спасибо

Kenneth Geers CISSP ARTWORK by Len Gostinsky: [email protected] References

Aleph One. “Smashing The Stack For Fun And Profit.” Phrack 49, Volume Seven, Issue Forty-Nine, File 14 of 16. Available: http://www.insecure.org/stf/smashstack.txt. Banisar, David. “Cybercrime treaty still horrible.” SecurityFocus. December 14, 2000 8:00PM. Available: http://www.securityfocus.com/news/124. Billo, Charles and Welton Chang. Cyber Warfare: An Analysis of The Means And Motivations of Selected Nation States. Institute For Security Technology Studies, Dartmouth College. Revised. December 2004. Blau, John. “Viruses: From Russia, With Love?” IDG News Service, Friday, May 28, 2004. Available: http://www.pcworld.com/news/article/0,aid,116304,pg,2,00.asp Brunker, Mike. "FBI agent charged with hacking, Russia alleges agent broke law by downloading evidence." MSNBC. August 15, 2004. Available: http://www.msnbc.com/news/563379.asp?cp1=1. Delio, Michelle. “Inside Russia's Hacking Culture.” March 12, 2001. Available: http://www.wired.com/news/culture/0,1284,42346,00.html. Federal Bureau of Investigation. “FBI Says Web ‘Spoofing’ Scams are a Growing Problem.” Press Release. July 21, 2003. Available: http://www.fbi.gov/pressrel/pressrel03/spoofing072103.htm. Freeh, Louis J. "Before 9/11 -- and After." Op-Ed. Wall Street Journal. April 12, 2004. Available: http://ctstudies.com/Document/Freeh_WSJ_OPED_12APR04.html. Gebhardt, Bruce. Deputy Director, FBI . Speech to the International Security Management Association, Scottsdale, Arizona, January 12, 2004. Available: http://www.fbi.gov/pressrel/speeches/gebhardt011204.htm. Goldsmith, Jack. “The Internet and the Legitimacy of Remote Cross-Border Searches.” Public Law And Legal Theory Working Paper No. 16, The Law School, University of Chicago. Available: http://www.law.uchicago.edu/academics/publiclaw/resources/16.JG.Internet.pdf. Ilett, Dan: "Russia's cybercrime-fighting Bond villain," ZDNet UK. January 13, 2005. Available: http://www.zdnet.com.au/insight/security/0,39023764,39177092,00.htm. "Key-loggers rip off eBay users." ContractorUK. January 18, 2005. Available: http://www.contractoruk.com/news/001903.html. Kvarnström, Håkan. “Attitudes toward computer hacking in Russia.” Lecture notes in Information Warfare in CyberCrime, September 3, 2001. Available: http://www.cs.kau.se/~stefan/IW/CC_4-5.pdf. Legelis, Kim. “Combating Online Fraud: An Update.” Symantec Corporation. Available: http://information- integrity.com/article.cfm?articleid=100. Leyden, John. “Chinese puzzle hampers banks' fight.” The Register. November 3, 2004, 8:58AM. Available: http://www.securityfocus.com/news/9849. Leyden, John. “Four charged in landmark UK phishing case.” The Register. October 15, 2004 7:54AM. Available: http://www.securityfocus.com/news/9731. Leyden, John. “Gone Phishin',” The Register. October 30, 2003, 8:36AM. Available: http://www.securityfocus.com/news/7331. Leyden, John. “IE patch 'imminent'.” The Register. July 30, 2004, 7:41AM. Available: http://www.securityfocus.com/news/9245. Leyden, John. “US credit card firm fights DDoS attack.” The Register. September 23, 2004, 8:00AM. Available: http://www.securityfocus.com/news/9570. Mosnews. “Russian Anti-Virus Maker Kaspersky Lab Launches into U.S. Market.” (Feb 2, 2005) Available: http://www.mosnews.com/money/2005/02/08/kaspersky.shtml. “Most Web Users Safe As Major Net Attack Slows.” Available: Available: http://www.crn.com/sections/breakingnews/dailyarchives.jhtml?articleId=22102320. O'Flynn, Kevin. “Canadian Helps Bust .” March 5, 2005. Available: http://www.themoscowtimes.com/stories/2005/03/05/012.html Orlowski, Andrew. “Elcomsoft not guilty - DoJ retreats from Moscow.” The Register. December 18, 2002 6:51AM. Available: http://www.securityfocus.com/news/1867. Poulsen, Kevin. "Spy suspect had skillz.” SecurityFocus. February 22, 2001. Available: http://www.securityfocus.com/news/157. Rocich.ru. “Картирование Рунета.” Available: http://rocich.ru/article/5. "Rostelecom," Russia Today: Business and Economy. Available: http://www.russiatoday.ru/en/biz/business/lead_com/3181.html. Russian Apache. Available: http://www.web.ru/Resource/. Saytarly, Timofey. "Russia: cyber crime doubled in 2003." Computer Crime Research Center. January 30, 2004. Available: http://www.crime-research.org/news/2004/01/Mess3004.html. Sherriff, Lucy. “Spam villains: named and shamed.” The Register. February 27, 2004, 8:21AM. Available: http://www.securityfocus.com/news/8143. Srinivasan, Arun. “Combating Cyberterrorism: How to avoid the scourge of a denial-of-service (DOS) attack.” Line 56. February 01, 2005. Available: http://www.line56.com/articles/default.asp?ArticleID=6315. Srinivasan, Arun. “Combating Cyberterrorism: How to avoid the scourge of a denial-of-service (DOS) attack.” Line 56. February 01, 2005. Available: http://www.line56.com/articles/default.asp?ArticleID=6315. "The Internet in Russia." The Public Opinion Foundation Database. 7th Release, Spring 2004. Available: http://bd.english.fom.ru/report/map/eo040701. U.S. Congress. Senate Committee on Appropriations. “Cybercrime.” Testimony by Louis J. Freeh, Director, FBI. February 16, 2000. U.S. Congress. Senate Judiciary Committee and House Judiciary Committee. "Cybercrime." al Testimony by Michael A. Vatis, Director, National Infrastructure Protection Center, FBI. February 29, 2000. U.S. Congress. Senate Judiciary Committee. "Cybercrime." Testimony by Louis J. Freeh, Director, FBI. March 28, 2000. U.S. Congress. Senate Judiciary Committee. "NIPC Cyber Threat Assessment, October 1999." Testimony by Michael A. Vatis, Director, National Infrastructure Protection Center, FBI. October 6, 1999. U.S. Department of Justice. "Defendant Indicted in Connection with Operating Illegal Internet Software Piracy Group." Press Release. March 12, 2003. Available: http://www.cybercrime.gov/griffithsIndict.htm. U.S. Department of Justice. "Russian National Enters into Agreement with the United States on First Digital Millennium Copyright Act Case." Press Release. December 13, 2001. Available: http://www.cybercrime.gov/sklyarovAgree.htm. U.S. Department of Justice. “First Indictment Under Digital Millennium Copyright Act Returned Against Russian National, Company, in San Jose, California.” August 28, 2001. Available: http://www.cybercrime.gov/Sklyarovindictment.htm. U.S. Department of Justice. “Operation Buccaneer: Illegal ‘warez’ organizations and Internet piracy.” Last updated July 19, 2002. Available: http://www.cybercrime.gov/ob/OBorg&pr.htm. U.S. Department of Justice. “Valley Man Indicted in International Software Piracy Scheme.” Press Release. November 26, 2003. Available: http://www.cybercrime.gov/stjohnIndict.htm. "Volga to Ganga.” The Times of India. January 28, 2005. Available: http://timesofindia.indiatimes.com/articleshow/1002829.cms. Справочная служба русского языка. Available: http://www.rusyaz.ru/is/ns/.