An Analysis of Phineas Fisher and the 'Hacktivist'

An Analysis of Phineas Fisher and the 'Hacktivist'

Big Fish, Little Fish, Critical Infrastructure: An Analysis of Phineas Fisher and the ‘Hacktivist’ Threat to Critical Infrastructure Peter Maynard and Kieran McLaughlin Centre for Secure Information Technology Queen’s University Belfast, UK {p.maynard,kieran.mclaughlin}@qub.ac.uk Abstract—The hacktivist threat actor is listed in many risk supported by news reporting and academic literature. Subse- decision documents. Yet their tactics and techniques often remain quently, we derive a MITRE ATT&CK (ATT&CK) model of a mystery. We create a MITRE ATT&CK (ATT&CK) model their techniques, and identify ways that an equivalently capable of a well known hacktivist who goes under the pseudonym of Phineas Fisher, and map that threat to critical infrastructure. The hacktivist like Fisher might compromise critical infrastructure. analysis is derived from hacker manifestos, journalist reporting, Based on this research, we identify seven mitigations which and official government documentation. This analysis fills a gap in may be deployed within an industrial network. This work was current threat models, to better define what skills and methods motivated by a recent publication by Fisher in November 2019, a determined hacker might employ. This paper also identifies which stated ‘I will pay up to 100 thousand USD for each seven essential mitigations which can be deployed by critical infrastructure operations and asset owners, to prevent such filtration of this type, according to the public interest and intrusions by hacktivists. We are in the process of contributing impact of the material...’[5], where they advocate the intrusion this threat actor into the MITRE ATT&CK knowledge base. into oil, gas, mining, logging and livestock companies, and Index Terms—ATT&CK, Critical Infrastructure, hacktivist surveillance companies such as the NSO group, among others. While we do not intend to make judgements on the political I. INTRODUCTION aims of such ‘hacktivism’, based on this call to arms, and lack of insight into hacktivist methods, it is clear there is a need State actors are widely considered to be the default threat for further technical analysis. actors to critical infrastructure, since they are the threat most The remainder of the paper provides a discussion on often discussed in the media. For example, in 2017 the the related work (§II), followed by an introduction of the malware CrashOverride [1] was found to have been used in the ATT&CK model (§III) and the Hacktivist known as Phineas 2016 power outages in Ukraine, which saw the manipulation Fisher (or Phisher) (§IV). We then offer an analysis of Fisher’s of industrial control devices, resulting in a few hours of attacks (§V-A) and how this threat may be mapped to critical downtime in a localised area. A report published in 2019 infrastructure (§V-B), followed by proposed mitigations (§V-C) [2] suggests that their objective was to disable the whole and concluding remarks (§VI). country’s power grid for a much longer period. While it may make little practical difference to an operator who the II. RELATED WORK intruder is, it is good practice to have a solid comprehension To date, several studies have investigated threats to critical arXiv:2004.14360v1 [cs.CR] 29 Apr 2020 of what tactics and techniques an adversary may deploy. In infrastructure and industrial control systems. One such paper, this instance, the creators had time and money to devote to the by Rudner [6], identified several threat actors: international development of a sophisticated piece of malware, specifically terrorism, state-sponsored terrorism, espionage and sabotage, designed to compromise the target. The skills and techniques malevolent hacktivism, and insider threats. Rudner examines they deployed are well understood, and attacks like these are the declared intentions, strategies, objectives and demonstrated becoming more common. However, the techniques and tactics capabilities of those entities known to have threatened Critical used by less resourced actors often go undiscussed. National Infrastructure. These threats align with the NIST SP- State of the art literature [3], [4] does not detail the technical 800-82 Guide to industrial control system security [7] defi- threats which a hacktivist might employ, since it is hard to nitions, as four primary adversary actors: Individual; Group; attain such information without identifying and investigating Organisation; and Nation-State. Yet, neither of these publica- the intruder. We, therefore, perform an analysis of a well tions define what actions these actors may take against their known hacktivist who goes under the pseudonym of Phineas targets. Fihser (See section IV). The majority of this analysis is based The most interesting threat, regarding our investigation, is on their self-published manifestos, which break down the steps ‘malevolent hacktivism’, which Rudner cites the United States taken to compromise their targets. This analysis is further Department of Homeland Security warning that Anonymous may target critical infrastructure [8] ”as part of its green energy High-level Models agenda”, which specifically supports the environmentalist cam- High (Lockheed Martin KillChain, paign against the Alberta Oil Sands and the proposed Keystone Microsoft STRIDE) XL oil pipeline. Two other groups are listed (Deep Green Resistance and Fertile Ground), who in 2011/12 declared Mid-level Model an intention to target critical infrastructure. Fertile Ground (MITRE ATT&CK) propounded1 the view that critical infrastructure is highly vulnerable and poorly designed, so that cyber attacks striking Level of Abstraction Low Level Concepts Low at key nodes could have a significant impact. As of early 2020, (Exploit & Vulnerability databases) the authors have been unable to find any incidents that could be attributed to them. Fig. 1. Abstraction levels of models and threat knowledge databases [12] While a variety of incidents have been attributed to Anony- mous, none appear to (or have been publicly reported to) directly affect critical infrastructure. Meanwhile, Anonymous defenders to determine how secure their systems are. Tactics has claimed [9] they have access to the Stuxnet source serve as useful contextual categories for individual techniques code, but there has been no evidence that they have used it. and cover standard notations for things adversaries do during Moreover, Stuxnet was designed to run on a specific site and an operation, such as persist, discover information, move is not particularly useful on its own. laterally, execute files, and exfiltrate data. Techniques represent The human threat to critical infrastructure is discussed by how an adversary achieves a tactical objective by performing Ghafir [3], in which they propose a system to improve the an action. As detailed in [12], ATT&CK has multiple ap- security awareness of business environment employees. Of plications: Adversary Emulation; Red Teaming; Behavioural particular interest is Ghafir’s discussion of social engineering Analytics Development; Defensive Gap Assessment; SOC and the attack strategies, suggesting the use of Kevin Mitnick’s Maturity Assessment; Cyber Threat intelligence Enrichment. attack cycle, i.e. Research; Develop Trust; Exploit Trust, This paper will use the model to analyse the threat of Fisher and; Utilise Information. In emergencies where many disperse to critical infrastructure, in a sense a gap assessment will be departments and business partners all need to interoperate, performed based on the hacktivist threat. social engineering becomes a very valid threat to critical Unlike other models such as Microsoft’s STRIDE [13] and infrastructure. Indeed, as reported by [10], spear-phishing is Lockheed Martin’s Cyber Kill Chain [14], ATT&CK is not a common entry point. Nonetheless, the security awareness highly abstracted from the low level concepts, but at the same delivery method proposed by Ghafir does not appear partic- time ATT&CK does not include low level details such as ularly suited to application to SCADA/ICS systems, due to Indicators Of Compromise (IOCs), exploits, or vulnerabilities. the addition of ‘pop-ups’ to employees workflows along with Fig. 1 shows the level of abstraction between high, mid, additional network connections. and low level models. The knowledge base is grounded in Generally, the current body of research describes intrusions observed and plausible adversary behaviours, that are likely at a very abstract level, and primarily focus on motivation and to be encountered rather than theoretical techniques that are description of the different types of threat actors. There is a unlikely to be seen due to difficulty of use or low utility. The lack of detailed technical analysis of the skills a hacktivist behaviours described by the ATT&CK model can be encoded may employ when compromising critical infrastructure. One into IDS systems as signatures, and are also accompanied by might contemplate there is no difference between a hacktivist potential countermeasures. or state actor, and since there is no publicly attributed attack to critical infrastructure that has been performed by an individual IV. PHINEAS FISHER or group of hacktivists, one could assume they may follow the Phineas Fisher is a pseudonym [15], that identifies as female existing intrusion trends as reported by ICS-CERT. This paper [5], who has claimed and verified responsibility for many aims to explore these assumptions. high profile intrusions and data leaks. In 2014, Fisher targeted Gamma Group [16]. Gamma Group sells

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    7 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us