Mounting Targeted Attacks for Cyber Espionage with Trojans and Social Engineering
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Discussion Questions and Answers Related to Studies in Cyberwarfare 1
Discussion Questions and Answers Related to Studies in Cyberwarfare 1 Week 04 – Writing Assignment 01 William Slater DET 630 – Cyberwarfare and Cyberdeterrence Bellevue University Discussion Questions and Answers Related to Studies in Cyberwarfare Matthew Crosston, Ph.D. - Professor September 23, 2012 Discussion Questions and Answers Related to Studies in Cyberwarfare 2 1. Talk about the emergence of and belief system of the H.U.C. H.U.C. is the Honker Union of China. Their website, which contains forums and information about the organization is located at http://www.huc.me/ (Honkers Union of China, 2012). H.U.C. is a well-organized Chinese hacker organization that is based entirely in China. They are talented and apparently have extensive knowledge about hacking and computers and the Internet, as well how to conduct cyber attacks and cyber espionage. They seem to have emerged shortly after the Chinese Embassy was bombed during U.S. airstrike operations in Belgrade in the former Yugoslavia. The group’s primary motivations are reportedly patriotism and efforts to promote Chinese nationalism. These are the types of operations that make H.U.C. so dangerous in cyberspace: 1. Hacking 2. DDOS 3. Malware distribution 4. Espionage Discussion Questions and Answers Related to Studies in Cyberwarfare 3 In addition, a friend who returned to the U.S. after teaching in China for several years told me this evening as we were discussing Chinese hackers and Chinese Hacker Organizations: “They are not really ‘underground.’ In China if you have the $$$ and the right connections, you can hire a hacker team to attack the competitor of your choice. -
Inside Cyber Warfare
Inside Cyber Warfare Inside Cyber Warfare Jeffrey Carr foreword by Lewis Shepherd Beijing • Cambridge • Farnham • Köln • Sebastopol • Taipei • Tokyo Inside Cyber Warfare by Jeffrey Carr Copyright © 2010 Jeffrey Carr. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://my.safaribooksonline.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or [email protected]. Editor: Mike Loukides Indexer: John Bickelhaupt Production Editor: Loranah Dimant Cover Designer: Karen Montgomery Copyeditor: Genevieve d’Entremont Interior Designer: David Futato Proofreader: Loranah Dimant Illustrator: Robert Romano Printing History: December 2009: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. Inside Cyber Warfare, the image of light cavalry, and related trade dress are trade- marks of O’Reilly Media, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions, or for damages resulting from the use of the information con- tained herein. TM This book uses RepKover™, a durable and flexible lay-flat binding. ISBN: 978-0-596-80215-8 [M] 1259961702 Table of Contents Foreword . -
Tracking Ghostnet: Investigating a Cyber Espionage Network
JR02-2009 Tracking GhostNet: Investigating a Cyber Espionage Network Information Warfare Monitor March 29, 2009 http://www.infowar-monitor.net/ghostnet http://www.tracking-ghost.nett JR02-2009 Tracking GhostNet - FOREWORD March 29, 2009 Foreword Cyber espionage is an issue whose time has come. In this second report from the Information Warfare Monitor, we lay out the findings of a 10-month investigation of alleged Chinese cyber spying against Tibetan institutions. The investigation, consisting of fieldwork, technical scouting, and laboratory analysis, discovered a lot more. The investigation ultimately uncovered a network of over 1,295 infected hosts in 103 countries. Up to 30% of the infected hosts are considered high-value targets and include computers located at ministries of foreign affairs, embassies, international organizations, news media, and NGOs. The Tibetan computer systems we manually investigated, and from which our investigations began, were conclusively compromised by multiple infections that gave attackers unprecedented access to potentially sensitive information. But the study clearly raises more questions than it answers. From the evidence at hand, it is not clear whether the attacker(s) really knew what they had penetrated, or if the information was ever exploited for commercial or intelligence value. Some may conclude that what we lay out here points definitively to China as the culprit. Certainly Chinese cyber-espionage is a major global concern. Chinese authorities have made it clear that they consider cyberspace a strategic domain, one which helps redress the military imbalance between China and the rest of the world (particularly the United States). They have correctly identified cyberspace as the strategic fulcrum upon which U.S. -
Threat Group Cards: a Threat Actor Encyclopedia
THREAT GROUP CARDS: A THREAT ACTOR ENCYCLOPEDIA Compiled by ThaiCERT a member of the Electronic Transactions Development Agency TLP:WHITE Version 1.01 (19 June 2019) Threat Group Cards: A Threat Actor Encyclopedia Contents Introduction ............................................................................................................................................................................ 8 Approach ........................................................................................................................................................................... 8 Legal Notice ...................................................................................................................................................................... 9 Acknowledgements .......................................................................................................................................................... 9 Advanced Persistent Threat (APT) Groups .................................................................................................................... 10 Anchor Panda, APT 14 .................................................................................................................................................. 11 Allanite ............................................................................................................................................................................. 12 APT 3, Gothic Panda, Buckeye ...................................................................................................................................