‘SYSTEMIC ELECTRONIC ATTACK THE FUTURE IS NOW’. An Information & Communications Technology view of Information Operations Jurgen Opfer MIEEE, MAIPIO

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

Transfer Content to a Website What is FTP? File Transfer Protocol FTP is a protocol – a set of rules Designed to allow files to be transferred across.
James D. Brown Chief Engineer and Senior Fellow Information Resource Management L-3 Communications.
U.S.-CHINA RELATIONS Security Issues & China’s Role in the World.
Digital Investigations of Any Kind ONE COMPANY Cyber Intelligence Response Technology (CIRT)
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Penetration Testing & Countermeasures Paul Fong & Cai Yu CS691 5 May 2003.
CHINESE HACKERS. Where do they come from? In 2007 private security firm Mandiant was hired by the New York Times to trace cyber-attacks on their network.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
PEOPLE’S REPUBLIC OF HACKING By: Lani N, Ashley R, Michael R, Gregory R.
Computer Crime The Internet has opened the door to new kinds of crime and new ways of carrying out traditional crimes. Computer crime is any act that violates.
Cyber Capabilities Example IT 298 / Bohman January 6 th, 2014.
Emerging Trends: Cyber Threats Bryan Sheppard Cyber Security Defense Center.
System Security Scanning and Discovery Chapter 14.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
 Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM.
Trusted Internet Connections. Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Computer Security and Penetration Testing
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Anderson School of Management University of New Mexico.
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Introduction to Computer Ethics
COEN 252 Computer Forensics Collecting Network-based Evidence.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
CIS 450 – Network Security Chapter 3 – Information Gathering.
Information Warfare Playgrounds to Battlegrounds.
Lesson 5 Knowing the Threat. Unauthorized use of Computer Systems 2000 CSI/FBI Survey Trend.
Cyber Warfare Case Study: Estonia
Cyber Security Nevada Businesses Overview June, 2014.
Cyber Attacks Response of the Criminal Law Margus Kurm State Prosecutor Office of the Prosecutor General of Estonia.
In the Crossfire International Cooperation and Computer Crime Stewart Baker.
Chapter 2: Anatomy of the Problem Recent terrorist attacks and the raise in cyber attacks have raised concern about the need to protect the nation’s cyber.
Assessing a Target System Source: Chapter 3 Computer Security Fundamentals Chuck Easttom Prentice Hall, 2006.
Information Warfare Playgrounds to Battlegrounds.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
Footprinting and Scanning
Can North Korea Build More Nuclear Weapons?. A North Korean People’s Army naval unit tests a new type of anti-ship cruise missile in this undated photo.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
Cybersecurity Test Review Introduction to Digital Technology.
Regional Cyber Crime Unit
A presentation by John Rowley for IUP COSC 356 Dr. William Oblitey Faculty member in attendance.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Matt Jennings.  What is DDoS?  Recent DDoS attacks  History of DDoS  Prevention Techniques.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
The Current State of Cyber Security and How to Defend Your Data.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
The Cyber Wars BRIAN ABDO. Geopolitical Agendas  Upswing in hacking with governmental agendas.  Their purpose is to discover information from the targeted.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Direct Deposit Phishing Attack
Footprinting and Scanning
Wireless Network Security
Footprinting and Scanning
Lecture 3: Secure Network Architecture
How hackers do it Ron Woerner Security Administrator CSG Systems, Inc.
Cybersecurity Simplified: Phishing
Presentation transcript:

‘SYSTEMIC ELECTRONIC ATTACK THE FUTURE IS NOW’

An Information & Communications Technology view of Information Operations Jurgen Opfer MIEEE, MAIPIO

What is being attacked?

Who is doing the attacks?

How are they attacking?

What are the defences?

Extent of the problem

Severity of Consequences Area of most growth

Our Defense networks are constantly under attack. They are probed thousands of times per DAY and scanned millions of times per DAY. And the frequency and sophistication of attacks are increasing exponentially.” “Attackers range from teenage hackers to more than 100 foreign intelligence agencies” US Deputy Defense Secretary William Lynn October 2009

Many of the world’s conflicts are not wars at all. There is a fading of the borderline between “defence” and “security” as non-state actors adopt weapons and tactics, and act across borders, and nation-states hire cyber criminals to perform espionage and potentially sabotage as well Defense Technology International January 2010

“I fear that the western world’s defence and security forces are now so focused on counter-terrorism, that we’ve lost sight of the real, and lingering problems of espionage”.....Private conversation with senior Australian Intelligence Officer

Selected Terms

Hierarchy of attacks Strategic Tactical Operational

Some recent Attacks US Navy EP-3 forced down by China 2001 followed by cyber exchange Israel cyber attack before bombing Nuclear facilities in Syria 2007 Russian Mafiya vs Europe’s most wired country ‘Estonia’ 2007 Russia vs Georgia’s military & infrastructure 2008 Israel /Hamas Dec 08-Jan 2009 China /USA 2009 Hackers vs Australian Federal Police 2009 Anonymous group hacks federal parliament Feb 2010

Computer Trojan Helped Expose Secret Syrian Nuclear reactor “The Trojan was planted on a laptop of a Syrian official while he was staying in London” Operation Orchard Erich Follath & Holger Stark Der Spiegel

General Peter Pace USMC (Retired) addressing USCCU about Russia cyber attacking Georgia “Their ‘cyber special operations forces’ isolated the president by disabling all his cyber connectivity, then their ‘cyber air force’ carpet bombed the entire national network, and finally their ‘cyber Delta force’ infiltrated and rewrote code that kept their network from working correctly even after it was brought back up. It was a highly sophisticated attack”

US Army District of Washington web site was hacked from Turkey After Israel “Operation Cast Lead” started in Gaza Dec 2008

Google Likely Saying Goodbye To China In mid- December, Google said in a blog posting yesterday, the company discovered "a highly sophisticated and targeted attack on our corporate infrastructure originating from China that resulted in the theft of intellectual property from Google. However, it soon became clear that what at first appeared to be solely a security incident--albeit significant one--was something quite different." First, Google said, it found out that the attack on it apparently was part of a coordinated attack against at least 20 other large companies, many of which seem to be US- based. According to the Washington Post, it was more like 34 companies. Second, Google says it has evidence suggesting that "a primary goal of the attackers was accessing the Gmail accounts of Chinese human rights activists." Google also said that it didn't believe that more than two GMail accounts were successfully accessed, however. Third, Google did find that dozens of accounts of "US-, China- and Europe- based Gmail users who are advocates of human rights in China appear to have been routinely accessed by third parties" apparently through persistent phishing and other malware attacks. As a result, this and other problems with its operations in China has led Google "to conclude that we should review the feasibility of our business operations in China. We have decided we are no longer willing to continue censoring our results on Google.cn, and so over the next few weeks we will be discussing with the Chinese government the basis on which we could operate an unfiltered search engine within the law, if at all. We recognize that this may well mean having to shut down Google.cn, and potentially our offices in China." Needless to say, Google's announcement has set off a firestorm that more than one newspaper has said may impact US- China relations.

Google probing possible inside help on attack Mon Jan 18, 8:55 am ET SHANGHAI (Reuters) – Google is investigating whether one or more employees may have helped facilitate a cyber- attack that the U.S. search giant said it was a victim of in mid - December, two sources told Reuters on Monday. Google, the world's most popular search engine, said last week it may pull out of the world's biggest Internet market by users after reporting it had been hit by a "sophisticated" cyber- attack on its network that resulted in theft of its intellectual property. The sources, who are familiar with the situation, told Reuters that the attack, which targeted people who have access to specific parts of Google networks, may have been facilitated by people working in Google China's office.

Professor: “...what interesting problems she had found in her work.” Major X: “the press had concluded that these attacks were coming from Nth Korea. North Korea has expanded its ‘cyber combat’ unit in charge of intelligence gathering through the internet claimed a source in Asia.” “The General Staff of the Nth Korean Peoples Army has for years been running what it calls the ‘technology reconnaissance team’ which consists of about 100 hackers, mostly graduates of a leading military academy in Pyongyang.” Professor: “Do you think this is coming from Korea?” Major X: “No, I don’t think they’re that good” Professor: “Where are they from?” Major X: “A lot of things that we see are coming from a single IP address in China. They are making no effort to disguise the origin” Professor: “So either they’re being brazen, or someone is doing a good job of making you believe they’re being brazen” Professor Alan Grier speaking with a Major after she attended DEF CON IEEE Computer Dec 09

“...depicting China as a threat to space & cyber security is perhaps hasty when one contrast NASA’s budget of $17B with China’s stated $500M space budget. Its recent supercomputer, the 17 th most powerful in the world, made headlines but China still has leaps and bounds before..... matching the US in computer power....China possesses a mere 16 supercomputers in comparison to America’s 291” Captain Timothy Hsia, US Army December 09 US Naval Institute Proceedings

Some Attack Tools Ping target Tracert destination Pathping target Netsh diag (switches) Nmap Supershark Megapanzer BlackIce Pwdump Satan (Saint) Superscan Skypetrojan Patches & updates Insiders USB Ports Next Generation Jammer

Select Target Scan (ping) Enumeration Gain Access Escalate Privilege Pilfering Covering Tracks Select Target Scan Enumeration Gain Access Elevate Privileges Pilfering Covering Tracks Creating Back Doors Denial Of Service Research Ping, Nmap DumpACL, sid2user tcpDump, LOphtcrack John, LOphtcrack Rhosts, Registry Zap, event logs Cron, netcat Synk4, supernuke, pingofdeath

IP Packet

Some defence Tools Netstat (switches) Ipconfig (switches) Check Router Status AirSnare Honeypots P0f Superglue

What is p0f v2? P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on: - machines that connect to your box (SYN mode), - machines you connect to (SYN+ACK mode), - machine you cannot connect to (RST+ mode), - machines whose communications you can observe. P0f can also do many other tricks, and can detect or measure the following: - firewall presence, NAT use (useful for policy enforcement), - existence of a load balancer setup, - the distance to the remote system and its uptime, - other guy's network hoockup (DSL, OC3, avian carriers) and his ISP. All this even when the device in question is behind an overzealous packet firewall, when our favourite active scanner can't do much. P0f does not generate ANY additional network traffic, direct or indirect. No name lookups, no mysterious probes, no ARIN queries, nothing. Show me! : Linux 2.2 (1) [Bonet Sweden] (up: 9 hrs) - > :80 (distance 5, link: ethernet/modem) >> Masquerade at /ns1.mosaicsoftware.com: indicators at 43%. >> Masquerade at /ptcnat.era.pl: indicators at 60%. >> Masquerade at /crawlers.looksmart.com: indicators at 52%. >> Masquerade at /evil.tpi.pl: indicators at 86%. Why? P0f is quite useful for gathering all kinds of profiling information about your users, customers or attackers (IDS, honeypot, firewall), tech espionage (laugh...), active or passive policy enforcement (restricting access for certain systems or otherwise handling them differently; or detecting guys with illegal network hookups using masquerade detection), content optimization, pen -testing (especially with SYN+ACK and RST+ACK modes), thru -firewall fingerprinting... plus all the tasks active fingerprinting is suitable for. P0f v2 is lightweight, secure and fast enough to be run almost anywhere, hands -free for an extended period of time.

A Few Words about Web 2.0