Attackers

advertisement
CSCD 434
Lecture 6
Spring 2014
Attackers
Profile, Motives, Skills
1
Topics
• Motivation for us
• Identification of Them
– Skills - Hierarchy
– Motives
– Notable Individuals and Groups - History
• Impact of Them on us
• Resources
Motivation
• We need to study attackers
– Why?
– Need to know our adversaries
– How else can we determine the risk to
ourselves and our systems
– And, devise defense strategies
Motivation
• Sun Tzu on The Art of War, oldest military treatise
“If you know the enemy
and know yourself, you need not fear the result
of a hundred battles.
If you know yourself but not the enemy, for every
victory gained you will also suffer a defeat.
If you know neither the enemy nor yourself, you will
succumb in every battle”
Identification of Attackers
• Questions
– Who are they?
– Why do they want to attack?
– What do they have to gain?
– What is our risk?
5
Level of Attacks
• Recall, point of Computer Security
– Protect assets from a defined threat
– So, detailed knowledge of threat helps to create
good protection
• Average Attacks
– You as individuals won't likely have top-level hackers
attacking you
• Someone has to pay them!!!!!
– But, you will have script kiddie level to moderate level
hackers trying to gain credit card or private data
Identification of Attackers
• Who are they?
• Many groups can threaten your systems
• Not easy to classify them
– Typical way ... by skill level or potential
for damage
– Can rank them from lowest to highest in
skill but doesn’t always correlate with damage
potential
– Good example, virus/worm writers
•
Do a lot of damage but not necessarily the
most skilled
7
Identification of Attackers
• Loosely classify them by skill level and
motive
Elite Hackers – White Hat
• Hackers in this group are skilled
• Often belong to a hacker group
– L0pht, Masters of Deception ( old groups …)
– Anonymous, Zeus Gangs
• Feel they have mission to improve security of
computer world
• Avoid damage to network and systems
• Inform and educate system administrators about fixes
to their security
8
Identification of Attackers
• Elite Hackers – White Hat
– Supposedly subscribe to “Hacker Code of Ethics”
http://courses.cs.vt.edu/cs3604/lib/WorldCodes/Hackers.Code.html
– It said ...
“ Ethical duty of the hacker to remove barriers,
liberate information, decentralize power, honor
people based on their ability, create things that
are good and life-enhancing through
computers.”
9
Identification of Attackers
• Elite Hackers – White Hat
– Another document, “Hacker Manifesto”
Provides insight into punk hacker mentality
Written after author's arrest, and first published in
hacker ezine Phrack
http://www.mithral.com/~beberg/manifesto.html
10
Identification of Attackers
• Elite Hackers - Black Hats
• Skilled but do damage
• Break-in and leave evidence of their presence
– Need to re-install software
– Don’t worry about loss of private information
– Don’t buy into a Code of Ethics
• Sell their services to highest bidder
– Corporate espionage, extortion, fraud
• Criminals ....
11
Identification of Attackers
• Psychological Profile of Elite Hackers
• Most elite hackers ...
• Different values and beliefs than society
• White hats believe they are performing a service
for society by exposing poor security practices
• Sometimes have a tenuous grasp on reality
because they live mostly in the cyber world
• Examples: Rob Morris, Kevin Mitnick
12
Hacker Timeline
http://besser.tsoa.nyu.edu/impact/f96/Projects/smistry/timeline.html
• 1970's - Age of phone phreaking
– Phone phreakers, John Drapper, goal - free phone
calls
• Early 1980's - Groups and zines formed, no laws yet
– Hacking groups like Legion of Doom in US and Chaos
Computer Club in Germany
– Los Alamos laboratory’s computers for developing
nuclear weapons were hacked by the 414 gang
– A gang that comprised of six teenagers who were later
apprehended
Hacker Timeline
• Late 1980's - Law formed, Exploits tested
– The Computer Fraud and Abuse Act was passed in
1986
– 1st self-replicating worm used on government's
ARPAnet to test effect on UNIX systems
• Robert T. Morris, Jr., graduate student at Cornell
University .. later spread to 6000 computers
• Fined 10,000 USD, Public Service
– German hackers arrested for breaking into United
States government and corporate computers and
sold operating-system source code to Russian KGB
Hacker Timeline
• 1990's - Gov'ment targets hackers, Internet beginsMafiaboy
– Kevin Mitnick was arrested for breaking into
computers
– Vladimir Levin and other Russian crackers siphoned
10 million USD from Citibank and transfer it to bank
accounts in Finland and Israel
• 2000 - Intenet worms and DDoS takes off
– Attacks launched on Yahoo, Amazon and eBay,
denial of service for users - Mafiaboy responsible
– Break-ins on Microsoft, for latest versions of their
products
• 2001 attack led to prevention of millions of users
Hacker Timeline
• 2010 - Internet worms and DDoS takes off
– Sophistication of attacks grows,
• Storm Botnet, Conficker, Stuxnet is latest
– Hacking for profit is the norm
– Spam, phishing, corporate blackmail is profitable
– Data breaches common
– Botnets are common too
Hacker History
• 1970's Phone Phreakers
– Learn as much as possible about telephone
system without getting caught
– Use knowledge to their advantage
• Free phone calls
– Most famous - John Draper - Captain Crunch
– Why was he called that?
Phone Phreakers
• Captain Crunch - 1971
– Discovered a toy whistle found in a box of Captain
Crunch cereal
• Emitted a tone, 2600 Hz tone
• Exact frequency need to tell phone system to hang
up the call, but used other tones then to call
numbers - result was free phone call
• Late 60's and Early 70's, all toll trunks were
sensitive to this tone,
• ATT did fatal cost cutting measure, designed
system so that signaling and voice used the same
circuit
Phone Phreakers
• Others Discovered Secret
• Made devices to emit signal, “blue boxes”
• Worked until phone companies replaced old
switches with newer electronic switching
systems
• History of the boxes and more
http://www.webcrunchers.com/
Famous Elite Hackers
Eric Corley
(also known as Emmanuel Goldstein)
• Long standing publisher of 2600: The Hacker Quarterly and
founder of the H.O.P.E. conferences.
• Been part of the hacker community since the late '70s.
Kevin Mitnick
• A former hacker who now speaks, consults,
and authors books about social engineering
and network security.
Robert Morris
• Now a professor at MIT
• The son of the chief scientist at the National Computer Security
Center — part of the National Security Agency (NSA)
• Cornell University graduate student accidentally unleashed an
Internet worm in 1988 (oops ….)
20
• Thousands of computers were infected and subsequently crashed.
Famous Hacker Groups
"Goolag - exporting censorship, one
search at a time"
• CULT OF THE DEAD COW, also known as cDc or cDc
Communications, computer hacker and DIY media organization
founded in 1984 in Lubbock, Texas
– Produce an ezine called, Cult of the Dead Cow
http://www.cultdeadcow.com/cms/textfile_index.php3
– Practiced Hacktivism
• Combined Hacking with Social justice
• Targeted Google in allowing China to filter Internet traffic
– Well Known Tools
• Back Orifice - Remote control of others computers
• Whisker - IDS evasion
Famous Hacker Groups
• L0pht Heavy Industries was famous hacker collective active
between 1992 and 2000, physically in Boston, Massachusetts
area
– 1998, all seven members of L0pht (Brian Oblivion, Kingpin,
Mudge, Space Rogue, Stefan Von Neumann, John Tan,
Weld Pond) testified before Congress that they could shut
down the entire Internet in 30 minutes
– 2000, L0pht Heavy Industries merged with startup @stake,
transitioned from an underground organization into
"whitehat" computer security company
• Symantec bought @stake in 2004
– L0pht produced L0phtcrack a password cracker program
Famous Hacker Groups
• Chaos Computer Club (CCC)
One of biggest and most influential hacker
organizations
– CCC based in Germany and currently has over 4,000
members, http://www.ccc.de/?language=en
– CCC more widely known for public demonstrations of
security risks
• In 2008, CCC published fingerprints of German Minister
of Interior Wolfgang Schäuble
• Also included fingerprint on film that readers could use
to fool fingerprint readers
Identification of Attackers
• Virus Writers
• Another group with some skilled and unskilled
members
• Been around a long time and have been studied
the longest
• This group has been evolving too
• Sarah Gordon gained fame for profiling this group
• She maintains archive of articles on the Web site
http://www.badguys.org
" Not all people who write computer viruses are
criminals because writing computer viruses is not
(necessarily) illegal.”
24
Attacker Groups
• Virus Writing – Easy?
– Searched with string, “How to write a virus”
– Got 8,200,000 hits
– Among them, the following …
25
Reasons for Writing Viruses
• “Virii are wondrous creations written for the sole purpose
of spreading and destroying the systems of unsuspecting
fools.
– This eliminates the systems of simpletons who can't tell that
there is a problem when a 100 byte file suddenly blossoms into a
1,000 byte file.
– Duh. These low-lifes do not deserve to exist, so it is our sacred
duty to wipe their hard drives off the face of the Earth.
– It is a simple matter of speeding along survival of the fittest.
• Why did I create this guide? After writing several virii, I
noticed that virus writers generally learn how to write virii
either on their own or by examining the disassembled
code of other virii
• This guide will show you what it takes to write a virus and
also will give you a plethora of source code to include in
your own virii.”
Dark Angel
http://vx.netlux.org/lib/static/vdat/tuda0001.htm
http://cyberwidycomunity.blogspot.com/2008/12/dark-angelsphunky-virus-writing-guide.html
26
Attacker Groups
• Hacktivism Groups
– Fusion of hacking and activism
– Hacking for a political cause
– A clinical definition of hacktivism is:
• Hacktivism: a policy of hacking, phreaking or
creating technology to achieve a political or social
goal
http://www.thehacktivist.com/
27
Attacker Groups
• Hacktivism Groups
• Examples
– In 1998, several targeted events in which
computer intrusion and defacement used to
protest injustice
– Milw0rm broke into computer systems at India's
Bhabha Atomic Research Centre, Bombay
(BARC) in protest against nuclear weapons tests
http://www.wired.com/news/technology/0,1282,12717,00.html
28
Attacker Groups
• Hacktavism continued
– 1998 LoU members Bronc Buster and Zyklon disabled
firewalls in order to allow China's Internet users
uncensored access to Internet
http://www.wired.com/news/print/0,1294,16545,00.html
– 1998 X-Ploit defaced the websites of Mexico's
Finance Ministry and Health Ministry to protest
government of President Ernesto Zedillo and show
solidarity with the Zapatista rebellion
http://thehacktivist.com/archive/news/1998/MexicanHackersReuters-1998.pdf
29
Hacktivism – Final Examples
• 1998, Electronic Disturbance Theater, experimented
with early forms of virtual sit-ins
– Group created software, FloodNet and has
invited mass participation in its virtual sit-ins
against Mexican government
• EDT members Carmin Karasic and Brett Stalbaum
created FloodNet to direct a "symbolic gesture"
against an opponent's web site
30
Hacktivism
• FloodNet, Java applet that repeatedly sends
browser reload commands
– In theory, when enough EDT participants are
simultaneously pointing the FloodNet URL
toward an opponent site, critical mass
prevents further entry
– Actually, this has been rarely attained
• FloodNet's power lies more in simulated threat!
31
32
Hacktivism
http://www.fraw.org.uk/ehippies/index.shtml
• Mission - to assist the process of change towards a
more fair and sustainable society using only electrons
• Actions being protested must be reprehensible to
many, not just small group
– Democratic accountability - people vote with
modems
• Event used to justify DoS attack must provide focus
for debate (e.g., World Trade Organization
conference)
Current Hacktivism
• Wikileaks
Julian Assange
• Publisher of leaked government documents about
wars, environmental crimes and other news “they”
don't want us to know
http://www.wikileaks.org
Where is Julian Assange?

Julian Assange has been given political asylum in
Ecuador … but he is holed up in the Ecuador
embassy in England
Some articles are here
http://thetruthisnow.com/headlines/ecuador-accepts-julian-assanges
-bid-for-asylum/
http://educate-yourself.org/cn/
julianassangecharacterassassintion20aug12.shtml
http://rense.com/general95/ecuad.html
Another Hacker/Activist
Who is this man?



Gary McKinnon
In 2002, Gary McKinnon was arrested by the UK's
national high-tech crime unit, after being accused of
hacking into Nasa and the US military computer
networks.
He says he spent two years looking for photographic
evidence of alien spacecraft and advanced power
technology
How He Did It ...



His Interview ...
GM: Unlike the press would have you believe, it
wasn't very clever. I searched for blank passwords, I
wrote a tiny Perl script that tied together other
people's programs that search for blank passwords,
so you could scan 65,000 machines in just over eight
minutes
SK: So you're saying that you found computers which
had a high-ranking status, administrator status, which
Current - Hackers and Climategate
• E-mails, cover decade of correspondence ... suggest
scientists colluded and manipulated data to support their
global warming viewpoints ... released about 2009
• Highlight one 1999 e-mail from Phil Jones, director of the research
center:
“I’ve just completed Mike’s Nature trick of adding in the real
temps to each series for the last 20 years (i.e., from 1981
onwards) and from 1961 for Keith’s to hide the decline”
• Climategate 2.0, 2011 - another 5000 emails leaked
showed evidence of deception of scientists
http://www.examiner.com/article/climategate-climate-center-s-serverhacked-revealing-documents-and-emails
http://newsbusters.org/blogs/noel-sheppard/2011/11/22/climategate-205000-new-emails-confirm-pattern-deception-and-collusio
Current Hacktivism
• Anonymous
http://en.wikipedia.org/wiki/
Timeline_of_events_involving_Anonymous
– Gained worldwide press for Project Chanology, protest
against the Church of Scientology
– 2008, a video produced by Church featuring an interview
with Tom Cruise was leaked to Internet and uploaded to
YouTube
– Church of Scientology issued a copyright violation claim
against YouTube requesting removal of video
– Anonymous formulated Project Chanology... said action was
Internet censorship
• DoS against Scientology websites, prank calls, etc
Anonymous

Extremely active in Occupy Wallstreet
events in 2011 and ongoing …
Links here
http://www.youtube.com/watch?v=HrXyLrTRXso
http://www.theinquirer.net/inquirer/news/2163685/hackersthreaten-youtube-anonymous-video
Impacts of Hacker Groups
41
Low-Skilled Attacker Groups
• Script Kiddies
• Skilled hackers put their tools on-line
• They appear to want others to use and
benefit from their experience
– Goes along with ethic of sharing information
– Allows people with limited technical knowledge
to do lots of damage since there are lots of
them
– Following quote from a 2002 article where Ed
Skoudis discusses damage from low-skilled
Kiddies
42
Low Skilled Attacker Groups
• Low-Skilled Script Kiddies = Low Damage?
• “Script Kiddie is typically young male, usually not by any
means computer expert, who exploits weaknesses in
security systems discovered by someone else
43
Higher Skilled Attacker Groups
• Hacking for Profit
• Famous examples
• 1999, Maxim broke into CD Universe and stole
300,000 credit card numbers
• 2001, FBI and NIPC warned that Russian and
Ukranian hackers had stolen ove
1,000,000 credit cards
• 2001, Playboy.com was cracked and cards stolen
• 2002, World Economic Forum had DB broken into
and
1400 cards were stolen among them Bill Clinton,
Bill Gates, Yassar Arafat and Shimon Perez!
Higher Skilled Attacker Groups
• Credit Card Theft – Growing problem
– 2007- TJX Cos. (NYSE:TJX) revealed that
information from least 45.7 million credit/ debit cards
was stolen over an 18-month period
– 2008 - Security breach East Coast supermarket
chain exposed more than 4 million card numbers
led to 1,800 cases of fraud, Hannaford Bros. Grocery
– 2013 – Security Breach of URM stores consisting of
Yokes, Rosaur's, Super 1 Foods, Huckleberries,
November 2013
Database of Credit Card Breaches
http://www.privacyrights.org/data-breach
45
Higher Skilled Attacker Groups
• Hacking for Profit
• Fraud in Credit Cards is 3 times rate online
than same purchases offline
• Seems to be growing worse with time
– Theft of Trade Secrets
• Worth great deal of money
• If sold to the right group
• Example: New Intel Chip design, what’s it worth?
Many examples of cyber related Trade secret theft
46
SecureWorks Uncovers $2 Million Russian
Hacker Scheme
• 2007 SecureWorks Security Research Group
– Discovered new trojan that searches for and captures
credentials used by several Internet banking and ecommerce websites
– Trojan, Gozi, forwards captured credentials to online
database where they being sold to the highest bidder
– Security Research Group uncovered a cache of stolen
information holding over 10,000 account records
containing everything from online banking user credentials
to patient healthcare information and even employee login
information for confidential government and law
enforcement applications
– Further investigation revealed data was being offered for
47
sale by Russian hackers for over $2 million.
Latest in Skill Levels
• How about controlling 100's of 1000's of computers?
What skill level does that take?
– For example, Jeanson Ancheta, a 21-year-old hacker and
member of a group called the “Botmaster Underground”,
reportedly made more than $100,000 from different Internet
Advertising companies who paid him to download speciallydesigned malicious adware code onto more than 400,000
vulnerable PCs he had secretly infected and taken over
– He made tens of thousands more dollars renting his
400,000-unit “botnet herd” to other companies that used
them to send out spam, viruses, and other malicious code
on the Internet
Bots are Highly Profitable
• Some botnet owners reportedly rent their huge networks for
$200 to $300 an hour, weapon of choice for fraud and
extortion
• Newer methods evolving for distributing “bot” software that
may make it even more difficult future for law enforcement to
identify and locate originating“botmaster”
– P2P architecture makes it very difficult to completely shut
down some botnets
Stuxnet Sophistication
at the Highest Level
• What is stuxnet?
– Computer virus/worm that can manipulate and
damage real-world physical equipment
– Target were nuclear plants in Iran
– Different from previous malware
• Authors had a specific facility or facilities in mind
and extensive knowledge of system they were
targeting.
• Who created it?
– Guesses. Israeli Mossad and USA
– Can't be proved (yet)
http://www.informit.com/articles/article.aspx?p=1686289
Conficker Family
• Conficker is a family of “worms” (malicious computer
software programs)
• Purpose infect computers and then spread itself to
other computers without any human interaction.
– Currently, there are at least three known variants of
Conficker: A, B and C/D.
• Conficker created as a two-stage threat
1. Conficker responsible for the infection of as many
computers as possible.
2. Second stage has yet to materialize
Conficker Family
• However, conficker infected machines
– Capable of becoming huge botnet if necessary
– Infected about 10 million computers
• Authors?
– Unknown ... speculation on China
– Microsoft has a $250,000 bounty out for author
Computer Crime
• One reason people break into computers for the
thrill of it
• Do people break into banks or homes in the
real world just to see if they can do it?
– Not too likely
• So, what deters criminals in the real world?
53
Computer Crime
• What deters real-world criminals?
– Likelihood of being caught
– And, prosecuted if caught
• How likely are you to be caught in the
cyber world?
– It depends …
54
Computer Crime
• Depends on …
• In cases where a lot of damage or
something valuable is stolen, more
incentive to catch you and prosecute
• Average break-in with little or no damage,
unlikely you will be caught or prosecuted
• Difficult to collect evidence and link your
activity to scene of the crime
55
What is Current Risk
• Given monetary incentives of cybercrime,
what does this say for risk from cyber
threats?
• Would the risk be different depending on who
you are?
– Government, Banks, Large Corporations
Books, Conferences and Movies
Hacker Conferences
• Reference Link
http://en.wikipedia.org/wiki/Timeline_of_computer_security_
hacker_history
– The hobby and network hacking subculture is
supported by regular gatherings, called cons
• These have drawn more and more people every year
including SummerCon (Summer), DEF CON, HoHoCon
(Christmas), PumpCon (Halloween), H.O.P.E. (Hackers
on Planet Earth) and HEU (Hacking at the End of the
Universe)
http://www.defcon.org Attracted 15,000 people in 2013
http://www.shmoocom.org
http://ww.summercon.org
http://www.2600.com/hopes.html
58
Hacker Books
• Books on Hackers
– Steven Levy
•Hackers: Heroes of the Computer Revolution
– Michelle Slatalla and Joshua Quittner
•Masters of Deception: The Gang That Ruled
Cyberspace, HarperPerennial, 1995
– Bruce Stirling
•The Hacker Crackdown, Bantam, 1992
– Paul Taylor
•Hackers, Routledge, 1999
http://www.amazon.com/Books-about-computer-hackershacking/lm/26UXHC7HABWSY
59
More Hacker Books
• Cuckoo's Egg - 1995
• Clifford Stoll
• Clifford Stoll becomes, almost unwillingly, a oneman security force … 75-cent accounting error in a
computer log is eventually revealed to be a ring of
industrial espionage
• The Art of Deception - 2003
• Kevin D. Mitnick, William L. Simon
• Takedown - 1996
–Tsutomu Shimomura and John Markoff
• Account of Kevin Mitnick’s arrest
60
Hacker Websites
• Hacker hall of Fame
http://www.francesfarmersrevenge.com/stuff/misc/hack/hall.htm
• Shmoo Group
http://www.shmoo.com
• Attrition
http://www.attrition.org
• Oldest hacker group - Chaos Computer Club
http://www.ccc.de
• Underground News
http://www.undergroundnews.com
Journals
• Phrack
– http://www.phrack.com/
• 2600
– http://www.2600.com/
• Hakin9
– http://hakin9.org/
• Hackbloc
– https://hackbloc.org/
Movies
• War Games - 1983
– Starring Matthew Broderick
• Link to 20 Recommended Movies
– http://www.linuxhaxor.net/?p=432
– The Net to Sneakers to Many others
• Takedown - 2000
– About Kevin Mitnick from Their point of view
• Freedom Downtime - 2001
– Movie about Kevin Mitnick by his friend Emmanuel
Goldstein ... its online
http://video.google.com/videoplay?docid=-6746139755329108302#
Conclusion
• Many hacker groups out there with a wide
range of skills and motives
– Lowest level – script kiddie will launch attacks
from others
• Motive – See if I can do it, thrill of it
– Medium level – can create own attacks,
customize other’s attacks
• Motive – Still see if I can do it, plus monetary
reward
– Highest Level – Both use and create own
attacks
• Motive – Economic espionage, theft, nation states64
infiltration activity
Conclusion
• Having knowledge about the potential
types of crimes and groups
– Leads to more effective defense!!!
65
The End
Stay tuned … New Assignment Will be up by end of today
Assignment 3
66
Download