The Russian Expat Leading the Fight to Protect America: in a War Against
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Hacking the Web
Hacking the Web (C) 2009-2020 Arun Viswanathan Ellis Horowitz Marco Papa 1 Table of Contents } General Introduction } Authentication Attacks } Client-Side Attacks } Injection Attacks } Recent Attacks } Privacy Tools 2 (C) 2009-2020 Arun Viswanathan Ellis Horowitz Marco Papa Why secure the Web? } The Web has evolved into an ubiquitous entity providing a rich and common platform for connecting people and doing business. } BUT, the Web also offers a cheap, effective, convenient and anonymous platform for crime. } To get an idea, the Web has been used for the following types of criminal activities (source: The Web Hacking Incidents Database (WHID) http://projects.webappsec.org/w/page/13246995/Web-Hacking-Incident-Database) } Chaos (Attack on Russian nuclear power websites amid accident rumors (5Jan09) } Deceit (SAMY XSS Worm – Nov 2005) } Extortion (David Aireys domain hijacked due to a CSRF (cross site request forgery) flaw in Gmail – 30Dec2007) } Identity Theft (XSS on Yahoo! Hot jobs – Oct 2008) } Information Warfare (Israeli Gaza War - Jan 2009 / Balkan Wars – Apr 2008 ) } Monetary Loss (eBay fraud using XSS) } Physical Pain (Hackers post on epilepsy forum causes migraines and seizures – May 2008) } Political Defacements (Hacker changes news release on Sheriffs website – Jul 2008) (Obama, Oreilly and Britneys Twitter accounts hacked and malicious comments posted – Jan 09) } Chinese Gaming sites hacked (Dec. 2011) 3 Copyright(C) 2009 (c) -20092020- 2019Arun Arun Viswanathan Viswanathan Ellis HorowitzEllis Horowitz Marco Marco Papa Papa -
Cyber-Conflict Between the United States of America and Russia CSS
CSS CYBER DEFENSE PROJECT Hotspot Analysis: Cyber-conflict between the United States of America and Russia Zürich, June 2017 Version 1 Risk and Resilience Team Center for Security Studies (CSS), ETH Zürich Cyber-conflict between the United States of America and Russia Authors: Marie Baezner, Patrice Robin © 2017 Center for Security Studies (CSS), ETH Zürich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zürich CH-8092 Zurich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zürich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group; Myriam Dunn Cavelty, Deputy Head for Research and Teaching; Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Baezner, Marie; Robin, Patrice (2017): Hotspot Analysis: Cyber-conflict between the United States of America and Russia, June 2017, Center for Security Studies (CSS), ETH Zürich. 2 Cyber-conflict between the United States of America and Russia Table of Contents 1 Introduction 5 2 Background and chronology 6 3 Description 9 3.1 Tools and techniques 9 3.2 Targets 10 3.3 Attribution and actors 10 4 Effects 11 4.1 Social and internal political effects 11 4.2 Economic effects 13 4.3 Technological effects 13 4.4 International effects 13 5 Consequences 14 5.1 Improvement of cybersecurity 14 5.2 Raising awareness of propaganda and misinformation 15 5.3 Observation of the evolution of relations between the USA and Russia 15 5.4 Promotion of Confidence Building Measures 16 6 Annex 1 17 7 Glossary 18 8 Abbreviations 19 9 Bibliography 19 3 Cyber-conflict between the United States of America and Russia Executive Summary Effects Targets: US State institutions and a political The analysis found that the tensions between the party. -
View Final Report (PDF)
TABLE OF CONTENTS TABLE OF CONTENTS I EXECUTIVE SUMMARY III INTRODUCTION 1 GENESIS OF THE PROJECT 1 RESEARCH QUESTIONS 1 INDUSTRY SITUATION 2 METHODOLOGY 3 GENERAL COMMENTS ON INTERVIEWS 5 APT1 (CHINA) 6 SUMMARY 7 THE GROUP 7 TIMELINE 7 TYPOLOGY OF ATTACKS 9 DISCLOSURE EVENTS 9 APT10 (CHINA) 13 INTRODUCTION 14 THE GROUP 14 TIMELINE 15 TYPOLOGY OF ATTACKS 16 DISCLOSURE EVENTS 18 COBALT (CRIMINAL GROUP) 22 INTRODUCTION 23 THE GROUP 23 TIMELINE 25 TYPOLOGY OF ATTACKS 27 DISCLOSURE EVENTS 30 APT33 (IRAN) 33 INTRODUCTION 34 THE GROUP 34 TIMELINE 35 TYPOLOGY OF ATTACKS 37 DISCLOSURE EVENTS 38 APT34 (IRAN) 41 INTRODUCTION 42 THE GROUP 42 SIPA Capstone 2020 i The Impact of Information Disclosures on APT Operations TIMELINE 43 TYPOLOGY OF ATTACKS 44 DISCLOSURE EVENTS 48 APT38 (NORTH KOREA) 52 INTRODUCTION 53 THE GROUP 53 TIMELINE 55 TYPOLOGY OF ATTACKS 59 DISCLOSURE EVENTS 61 APT28 (RUSSIA) 65 INTRODUCTION 66 THE GROUP 66 TIMELINE 66 TYPOLOGY OF ATTACKS 69 DISCLOSURE EVENTS 71 APT29 (RUSSIA) 74 INTRODUCTION 75 THE GROUP 75 TIMELINE 76 TYPOLOGY OF ATTACKS 79 DISCLOSURE EVENTS 81 COMPARISON AND ANALYSIS 84 DIFFERENCES BETWEEN ACTOR RESPONSE 84 CONTRIBUTING FACTORS TO SIMILARITIES AND DIFFERENCES 86 MEASURING THE SUCCESS OF DISCLOSURES 90 IMPLICATIONS OF OUR RESEARCH 92 FOR PERSISTENT ENGAGEMENT AND FORWARD DEFENSE 92 FOR PRIVATE CYBERSECURITY VENDORS 96 FOR THE FINANCIAL SECTOR 96 ROOM FOR FURTHER RESEARCH 97 ACKNOWLEDGEMENTS 98 ABOUT THE TEAM 99 SIPA Capstone 2020 ii The Impact of Information Disclosures on APT Operations EXECUTIVE SUMMARY This project was completed to fulfill the including the scope of the disclosure and capstone requirement for Columbia Uni- the disclosing actor. -
Distributed Attacks and the Healthcare Industry 01/14/2021
Distributed Attacks and the Healthcare Industry 01/14/2021 Report #: 202101141030 Agenda Image source: CBS News • Overview of distributed attacks • Supply chain attacks • Discussion of SolarWinds attack • Managed Service Provider attacks • Discussion of Blackbaud attack • How to think about distributed attacks • References • Questions Slides Key: Non-Technical: Managerial, strategic and high- level (general audience) Technical: Tactical / IOCs; requiring in-depth knowledge (sysadmins, IRT) 2 Overview: Distributed Attacks What is a distributed attack? Traditional attack = a single compromise impacts a single organization 3 Overview: Distributed Attacks (continued) What is a distributed attack? Distributed attack = a single compromise that impacts multiple organizations Image source: cyber.gc.ca 4 Overview: Distributed Attacks (continued) But what about DDoS (distributed denial of service) attacks? Not a distributed attack in the context of the presentation, since it only targets one organization! Image source: F5 Networks We will be discussing two types of distributed attacks in this presentation, both of which present a significant threat to healthcare: supply chain attacks and managed service provider attacks. We will be analyzing two cases: the SolarWinds attack (supply chain), as well as the Blackbaud breach (managed service provider). This presentation is based on the best information available at the time of delivery – new details will emerge. 5 Supply Chain Attacks Image source: Slidebazaar What is a supply chain? • A supply chain -
Interview Transcript of Andrew Brown
1 UNCLASSIFIED, COMMITTEE SENSITIVE EXECUTIVE SESSION PERMANENT SELECT COMMITTEE ON INTELLIGENCE, U.S. HOUSE OF REPRESENTATIVES, WASHINGTON, D.C. INTERVIEW OF: ANDREW BROWN Wednesday, August 30, 2017 Washington, D.C. The interview in the above matter was held in Room HVC-304, the Capitol, commencing at 10:04 a.m. UNCLASSIFIED, COMMITTEE SENSITIVE PROPERTY OF THE UNITED STATES HOUSE OF REPRESENTATIVES 2 UNCLASSIFIED, COMMITTEE SENSITIVE Appearances: For the PERMANENT SELECT COMMITTEE ON INTELLIGENCE: For ANDREW BROWN: MARK ELIAS, ESQ. GRAHAM M. WILSON, ESQ. PERKINS COIE POLITICAL LAW GROUP 700 13TH Street NW Suite 600 Washington, D.C. 20005 UNCLASSIFIED, COMMITTEE SENSITIVE PROPERTY OF THE UNITED STATES HOUSE OF REPRESENTATIVES 3 UNCLASSIFIED, COMMITTEE SENSITIVE Good morning. This is a transcribed interview of Mr. Andrew Brown. Thank you for coming in and speaking with us today. For the record, I'm a staff member with the House Permanent Select Committee on Intelligence for the majority. Also with me is -- from the majority staff. And -- with the minority staff. So before we begin, I just want to state a few things for the record. The questioning will be conducted by staff, as you see. During the course of this interview, members -- members will not -- staff will ask questions during their allotted time period. Some questions may seem basic, but that is because we need to clearly establish facts and understand the situation. Please do not assume we know any facts you have previously disclosed as part of any other investigation or review. During the course of this interview, we will take any breaks that you desire. -
Covert Networks a Comparative Study Of
COVERT NETWORKS A COMPARATIVE STUDY OF INTELLIGENCE TECHNIQUES USED BY FOREIGN INTELLIGENCE AGENCIES TO WEAPONIZE SOCIAL MEDIA by Sarah Ogar A thesis submitted to Johns Hopkins University in conformity with the requirements for the degree of Master of Arts Baltimore, Maryland December 2019 2019 Sarah Ogar All Rights Reserved Abstract From the Bolshevik Revolution to the Brexit Vote, the covert world of intelligence has attempted to influence global events with varying degrees of success. In 2016, one of the most brazen manifestations of Russian intelligence operations was directed against millions of Americans when they voted to elect a new president. Although this was not the first time that Russia attempted to influence an American presidential election, it was undoubtedly the largest attempt in terms of its scope and the most publicized to date. Although much discussion has followed the 2016 election, there have not been much concerted historical analysis which situates the events of 2016 within the global timeline of foreign intelligence collection. This paper argues that the onset of social media has altered intelligence collection in terms of its form, but not in terms of its essence. Using the case study method, this paper illustrates how three different nations apply classical intelligence techniques to the modern environment of social media. This paper examines how China has utilized classical agent recruitment techniques through sites like LinkedIn, how Iran has used classical honey trap techniques through a combination of social media sites, and how Russia has employed the classical tactics of kompromat, forgery, agents of influence and front groups in its modern covert influence campaigns. -
Hacks, Leaks and Disruptions | Russian Cyber Strategies
CHAILLOT PAPER Nº 148 — October 2018 Hacks, leaks and disruptions Russian cyber strategies EDITED BY Nicu Popescu and Stanislav Secrieru WITH CONTRIBUTIONS FROM Siim Alatalu, Irina Borogan, Elena Chernenko, Sven Herpig, Oscar Jonsson, Xymena Kurowska, Jarno Limnell, Patryk Pawlak, Piret Pernik, Thomas Reinhold, Anatoly Reshetnikov, Andrei Soldatov and Jean-Baptiste Jeangène Vilmer Chaillot Papers HACKS, LEAKS AND DISRUPTIONS RUSSIAN CYBER STRATEGIES Edited by Nicu Popescu and Stanislav Secrieru CHAILLOT PAPERS October 2018 148 Disclaimer The views expressed in this Chaillot Paper are solely those of the authors and do not necessarily reflect the views of the Institute or of the European Union. European Union Institute for Security Studies Paris Director: Gustav Lindstrom © EU Institute for Security Studies, 2018. Reproduction is authorised, provided prior permission is sought from the Institute and the source is acknowledged, save where otherwise stated. Contents Executive summary 5 Introduction: Russia’s cyber prowess – where, how and what for? 9 Nicu Popescu and Stanislav Secrieru Russia’s cyber posture Russia’s approach to cyber: the best defence is a good offence 15 1 Andrei Soldatov and Irina Borogan Russia’s trolling complex at home and abroad 25 2 Xymena Kurowska and Anatoly Reshetnikov Spotting the bear: credible attribution and Russian 3 operations in cyberspace 33 Sven Herpig and Thomas Reinhold Russia’s cyber diplomacy 43 4 Elena Chernenko Case studies of Russian cyberattacks The early days of cyberattacks: 5 the cases of Estonia, -
Security Threats and Trends
Foreword As our lives become more and more connected, cyber making responsibilities for cyber security, highlights the security has emerged as a top-of-mind issue for business emerging technologies that will help detect and counter the leaders and governments right across the globe. impact of current and new security threats in the year ahead. With cybercrime increasing, organisations of all kinds Encouragingly, this year’s report shows the majority of are regularly experiencing breaches that interrupt organisations are working on being better prepared for when, operations, compromise customer privacy and in the not if, an attack occurs, but being able to detect and respond very worst cases irretrievably damage reputations or to incidents in a timely manner is still the number one steal your intellectual property. challenge for security professionals for 2019. The introduction of new compliance regulations and The report also found that a majority of respondents in growing public interest in data privacy, means C-level countries with data privacy legislation have been fined for participation in cyber security management is now data breaches indicating companies still have a way to go to critical for all businesses. understand and comply with local legislation. Organisations must better understand the dynamic What is clear is that security has moved far beyond the and changing world of cyber security, to help reduce the maintenance of firewalls and is now a whole-of-business occurance and impact of cyber-attacks. concern for C-level executives and boards. The Telstra Security Report 2019 reviews the current We hope this report is a useful tool to help you better think security landscape and how security professionals are through your organisation’s cyber security risk and make managing risks around the world. -
The Blame Game Attribution in the 2016 Elections
The Blame Game Attribution in the 2016 Elections Norman Young December 15, 2016 Abstract From the Democratic National Convention email hack to password leaks of major online corporations, attacks on sensitive information of national security concern have become increasingly frequent in recent years. As a result, there is an ever-increasing pressure in political culture to improve the way we secure our data, as well as to locate and combat the source of these cyber attacks, as soon as possible. Election season especially is a time when people look to influential political figures for answers on who to blame when information is breached. The problem, however, is that attributing these malicious actions online to a single source has proven to be a difficult, and even impossible task at times. This topic of who to blame and how to fight back was recently brought up in a presidential debate during the US 2016 elections. This paper will attempt to look at the attribution problem in the light of the candidates’ responses. With a large portion of the population uninformed on security mat- ters, can public figures accurately give answers about cyber security concerns? Finally, we will propose action items and relevant applications to combat the attribution problem, and discuss whether or not it is a problem that can ever be completely solved. 1 Introduction On September 26th 2016, the topic of cybersecurity was finally brought into the national spotlight during the first of three presidential debates. Public debates have been essential in the election process for both informing voters about the candi- dates’ views, as well as educating voters about current issues. -
Aow 1617 09 Russian Hacking
1. Mark your confusion. 2. Show evidence of a close reading. 3. Write a 1+ page reflection. US Officially Accuses Russia of Hacking DNC and Interfering with Election Source: Spencer Ackerman and Sam Thielman, TheGuardian.com, October 8, 2016 Administration says ‘only Russia’s senior-most officials’ could have signed off on cyber-attacks and urges states to seek federal security aid for voting systems The US government has formally accused Russia of hacking the Democratic party’s computer networks and said that Moscow was attempting to “interfere” with the US presidential election. Hillary Clinton and US officials have blamed Russian hackers for stealing more than 19,000 emails from Democratic party officials, but Friday’s announcement marked the first time that the Obama administration has pointed the finger at Moscow. “We believe, based on the scope and sensitivity of these efforts, that only Russia’s senior- most officials could have authorized these activities,” said the office of the director of national intelligence and the Department of Homeland Security (DHS) in a joint statement. The accusation marked a new escalation of tensions with Russia and came shortly after the US secretary of state, John Kerry, called for Russia to be investigated for war crimes in Syria. Vladimir Putin’s spokesman dismissed the accusation as “rubbish.” “Every day Putin’s website gets attacked by several tens of thousand of hackers. A lot of these attacks are traced to the territory of the USA, but we do not blame the White House or Langley each time,” he told the Interfax news agency. -
Threat Landscape Report – 1St Quarter 2018
TLP-AMBER Threat Landscape Report – 1st Quarter 2018 (FINAL) V1.0 – 10/04/2018 This quarterly report summarises the most significant direct cyber threats to EU institutions, bodies, and agencies (EU-I or 'Constituents') in Part I, the development of cyber-threats on a broader scale in Part II, and recent technical trends in Part III. KEY FINDINGS Direct Threats • In Europe, APT28 / Sofacy threat actor (likely affiliated to Russia military intelligence GRU) targeted government institutions related to foreign affairs and attendees of a military conference. Another threat actor, Turla (likely affiliated to Russia’s security service FSB) executed a cyber-operation against foreign affairs entities in a European country. • A spear-phishing campaign that targeted European foreign ministries in the end of 2017 was attributed to a China-based threat actor (Ke3chang) which has a long track record of targeting EU institutions (since 2011). As regards cyber-criminality against EU institutions, attempts to deliver banking trojans are stable, ransomware activities are still in decline and cryptojacking on the rise. Phishing lures involve generic matters (’invoice’, ‘payment’, ‘purchase’, ‘wire transfer’, ‘personal banking’, ‘job application’) and more specific ones (foreign affairs issues, European think tanks matters, energy contracts, EU delegation, EU watch keeper). Almost all EU-I are affected by credential leaks (email address | password) on pastebin-like websites. Several credential- harvesting attempts have also been detected. Attackers keep attempting to lure EU-I staff by employing custom methods such as spoofed EU-I email addresses or weaponisation of EU-I documents. Broader Threats • Critical infrastructure. In the energy sector, the US authorities have accused Russian actors of targeting critical infrastructure (including nuclear) for several years and are expecting this to continue in 2018. -
In the United States District Court for the Southern District of New York
Case 1:18-cv-03501-JGK Document 216 Filed 01/17/19 Page 1 of 111 IN THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF NEW YORK DEMOCRATIC NATIONAL COMMITTEE, ) Civil Action No. 1:18-cv-03501 ) JURY DEMAND Plaintiff, ) ) SECOND AMENDED v. ) COMPLAINT ) COMPUTER FRAUD AND ABUSE THE RUSSIAN FEDERATION; ) ACT (18 U.S.C. § 1030(a)) ARAS ISKENEROVICH AGALAROV; ) RICO (18 U.S.C. § 1962(c)) EMIN ARAZ AGALAROV; ) ) RICO CONSPIRACY (18 U.S.C. JOSEPH MIFSUD; ) § 1962(d)) WIKILEAKS; ) WIRETAP ACT (18 U.S.C. JULIAN ASSANGE; ) §§ 2510-22) DONALD J. TRUMP FOR PRESIDENT, INC.; ) ) STORED COMMUNICATIONS DONALD J. TRUMP, JR.; ) ACT (18 U.S.C. §§ 2701-12) PAUL J. MANAFORT, JR.; ) DIGITAL MILLENNIUM ROGER J. STONE, JR.; ) COPYRIGHT ACT (17 U.S.C. ) JARED C. KUSHNER; § 1201 et seq.) GEORGE PAPADOPOULOS; ) ) MISAPPROPRIATION OF TRADE RICHARD W. GATES, III; ) SECRETS UNDER THE DEFEND ) TRADE SECRETS ACT (18 U.S.C. Defendants. ) § 1831 et seq.) ) INFLUENCING OR INJURING ) OFFICER OR JUROR GENERALLY ) (18 U.S.C. § 1503) ) ) TAMPERING WITH A WITNESS, ) VICTIM, OR AN INFORMANT (18 ) U.S.C. § 1512) ) WASHINGTON D.C. UNIFORM ) TRADE SECRETS ACT (D.C. Code ) Ann. §§ 36-401 – 46-410) ) ) TRESPASS (D.C. Common Law) ) CONVERSION (D.C. Common Law) ) TRESPASS TO CHATTELS ) (Virginia Common Law) ) ) ) Case 1:18-cv-03501-JGK Document 216 Filed 01/17/19 Page 2 of 111 CONSPIRACY TO COMMIT TRESPASS TO CHATTELS (Virginia Common Law) CONVERSION (Virginia Common Law) VIRGINIA COMPUTER CRIMES ACT (Va. Code Ann. § 18.2-152.5 et seq.) 2 Case 1:18-cv-03501-JGK Document 216 Filed 01/17/19 Page 3 of 111 TABLE OF CONTENTS Page NATURE OF ACTION .................................................................................................................