CONFIDENTIAL DHQ/COMMS/309/1/C BRIEF FOR SO1 IT CYBER ATTACK ON KDF TWITTER HANDLE INTRODUCTION REMARKS 1. The KDF twitter handle (@kdfinfo) and that of Defence Headquarters Protocol/Liaison Officer (@MajEChirchir) were hacked into in the morning of 22 Jul 14 by a group known as anonymous. Though the two accounts were recovered successfully later that evening, they were hacked into again almost immediately and still remain under the control of the attackers. TIMELINE 2. On the morning of 22 Jul 14, discussions from morning shows of media houses suggested that the KDF twitter handle had been hacked into and was under the control of an anonymous group. This was confirmed to be true by DHQ Public Affairs Office (PAO) which operates the account. 3. The response taken by DHQ Comms/IT was to immediately delink the twitter handle from the new MOD website. This was to avert possibilities of screen shots of the website displaying the attackers’ tweets being captured and used to cause further harm. 4. Having ascertained that the MOD mail and Web had not been compromised, the NetAdmin went through the access logs for the mail and Web servers to check for attempted attacks. The logs revealed that indeed a brute force attack on the web server had been attempted by IP addresses mostly with Chinese origin (See Table 1 and 2). Table 1 Failed logins from: 1.93.33.227: 714 times 23.97.214.90: 9 times 61.174.50.163 (163.50.174.61.dial.wz.zj.dynamic.163data.com.cn): 18 times 61.174.51.217 (217.51.174.61.dial.wz.zj.dynamic.163data.com.cn): 135 times 61.174.51.226 (226.51.174.61.dial.wz.zj.dynamic.163data.com.cn): 95 times 198.74.103.2 (2-103-74-198-dedicated.multacom.com): 13 times 202.170.136.247 (user.nova.net.cn): 25 times 203.81.22.35 (mail.ckgsb.edu.cn): 2 times 221.179.89.90: 2 times 222.163.192.149 (149.192.163.222.adsl-pool.jlccptt.net.cn): 284 times 1 CONFIDENTIAL CONFIDENTIAL Table 2 Authentication Failures: unknown (211.45.70.165): 1948 Time(s) root (222.163.192.149): 468 Time(s) root (125.65.245.146): 185 Time(s) root (server.hsproperty.net): 150 Time(s) root (61.174.51.202): 108 Time(s) root (211.45.70.165): 67 Time(s) unknown (server.hsproperty.net): 43 Time(s) bin (125.65.245.146): 36 Time(s) tomcat (211.45.70.165): 16 Time(s) unknown (125.65.245.146): 16 Time(s) webmaster (211.45.70.165): 15 Time(s) unknown (61.174.51.202): 4 Time(s) Invalid Users: Unknown Account: 2030 Time(s) Unknown Entries: service(sshd) ignoring max retries; 6 > 3: 97 Time(s) 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.174.51.202 : 3 Time(s) service(sshd) ignoring max retries; 5 > 3: 2 Time(s) 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.174.51.202 : 1 Time(s) 5. IP addresses of similar characteristics were blocked from accessing MOD network having been responsible for a denial of service attack a fortnight ago that led to a 6 hour outage of the new website. The outage was as a result of database overload from too many requests coming in at the same time. It is possible for these addresses to appear as coming from China but in real sense originate from Kenya through use of international proxy servers. POSSIBLE CAUSES 6. The following are possible causes of the successful twitter attack: a. Social engineering – whereby the attackers obtained the password from the personnel working at PAO either through friendship or retired solders. b. Weak Passwords – It is possible that the Passwords in use were not strong enough to withstand a brute force attack. c. Password Re-use. d. Autos save Programs available in web browsers – This can be compromising whenever one logs on in a public place living the credentials behind. 2 CONFIDENTIAL CONFIDENTIAL RECCOMMENDATIONS 7. The following is recommended: a. All log-in accounts related to MOD (mail, web, twitter, servers) be protected by strong passwords that should be frequently changed. b. Public accounts be accessed only from safe networks and managed centrally. c. Necessary cyber skills, equipment and infrastructure should be put in place to facilitate cyber warfare. 8. Sir, forwarded for your information and guidance. Jul 14 F O LAJAH Capt NetAdmin 3 CONFIDENTIAL