SlideShare a Scribd company logo
Iftach Ian Amit | April 2011




               Cyber[Crime|War]
               Connecting the Dots
               Iftach Ian Amit
               VP Consulting, Security Art
               Board Member - CSA Israel
               IL-CERT Dreamer
               DC9723

All rights reserved to Security Art ltd. 2002-2010   www.security-art.com
Iftach Ian Amit | April 2011



                                          The Disclaimer


                       This is “hacker” me, and my own personal opinion only. This has got nothing to do with work
                       stuff. The “work” me is often suited and talks in acronyms and industry best practices stuff.




All rights reserved to Security Art ltd. 2002-2010                 2
Iftach Ian Amit | April 2011



                                                     Agenda
                   • Who am I?
                   • CyberWar [Attack | Defense]
                   • CyberCrime [Attack | Defense]
                   • History revisited
                    • Connecting the dots...
                   • Future
All rights reserved to Security Art ltd. 2002-2010     3
Iftach Ian Amit | April 2011



                                                     Who Am I




All rights reserved to Security Art ltd. 2002-2010      4
Iftach Ian Amit | April 2011



               This is NOT going to be




All rights reserved to Security Art ltd. 2002-2010   5
Iftach Ian Amit | April 2011



               This is NOT going to be




All rights reserved to Security Art ltd. 2002-2010   5
Iftach Ian Amit | April 2011




    Picking up where we left off
               At least as far as last year’s research is concerned...




All rights reserved to Security Art ltd. 2002-2010   6
Iftach Ian Amit | April 2011




All rights reserved to Security Art ltd. 2002-2010   7
Iftach Ian Amit | April 2011




                                                     Boss, is this
                                                     supposed to
                                                      be on the
                                                      internet?




All rights reserved to Security Art ltd. 2002-2010      7
Iftach Ian Amit | April 2011




                                                     Boss, is this
                                                     supposed to
                                                      be on the
                                                      internet?


                                                               I thi
                                                              is fr  nk t
                                                                          his
                                                            pow     om
                                                                 erpo  my
All rights reserved to Security Art ltd. 2002-2010      7
                                                                      int!
Iftach Ian Amit | April 2011




                                                       Boss, is this
                                                       supposed to
                                                        be on the
                                                        internet?
                                        We probably
                                        need to call
                                         someone...
                                                                 I thi
                                                                is fr  nk t
                                                                            his
                                                              pow     om
                                                                   erpo  my
All rights reserved to Security Art ltd. 2002-2010        7
                                                                        int!
Iftach Ian Amit | April 2011




All rights reserved to Security Art ltd. 2002-2010   8
Iftach Ian Amit | April 2011




All rights reserved to Security Art ltd. 2002-2010   8
Iftach Ian Amit | April 2011




All rights reserved to Security Art ltd. 2002-2010   8
Iftach Ian Amit | April 2011




       Final ly de-
       classif ied...
         (on p  ublic
          dom   ain)
                                                The initia
                                              “trace” o     l
                                                         r lo-
                                              jack used
                                            track dow     to
                                                       n the
                                                thief...


All rights reserved to Security Art ltd. 2002-2010               8
Iftach Ian Amit | April 2011




                         Hungry yet?
                                                     That was just the appetizer...




All rights reserved to Security Art ltd. 2002-2010               9
Iftach Ian Amit | April 2011



                Question 1: What is this?




All rights reserved to Security Art ltd. 2002-2010   10
Iftach Ian Amit | April 2011



               Question 1: What is this?




All rights reserved to Security Art ltd. 2002-2010   11
Iftach Ian Amit | April 2011



               Perceptions may be deceiving...




                                  War                     Crime
All rights reserved to Security Art ltd. 2002-2010   12
Iftach Ian Amit | April 2011

                                  War                              Crime
             •      Government / state                    •   Private

             •      Official backing                       •   Semi-official backing (org.
                                                              crime)
             •      Official resources

             •      Financing
                                                          •   Official resources

             •      Expertise?
                                                          •   Self financing?

             •      Exploits/Vulns?
                                                          •   Established expertise (in-
                                                              house + outsourced)

                                                          •   Market for exploits


All rights reserved to Security Art ltd. 2002-2010   13
Iftach Ian Amit | April 2011



                                                     CyberWar

               “Cyberwarfare, (also known as
               cyberwar and Cyber Warfare), is the
               use of computers and the Internet in
               conducting warfare in cyberspace.”
                                                                Wikipedia




All rights reserved to Security Art ltd. 2002-2010      14
Iftach Ian Amit | April 2011

        It did                 not happen yet
                               Estonia being an exception?



                                              “There is no Cyberwar”




All rights reserved to Security Art ltd. 2002-2010      15
Iftach Ian Amit | April 2011

        It did                  not happen yet
                                 RSA    being an exception?




                                              “There is no Cyberwar”




All rights reserved to Security Art ltd. 2002-2010      15
Iftach Ian Amit | April 2011

        It did                  not happen yet
                                 RSA    being an exception?




                                              “There is no Cyberwar”




All rights reserved to Security Art ltd. 2002-2010      15
Iftach Ian Amit | April 2011




This is not the only way!                                     Neither is this...




                                        But civilian are
                                        always at stake!
All rights reserved to Security Art ltd. 2002-2010       16
Iftach Ian Amit | April 2011

                 Many faces of how CyberWar is perceived...




                                               From McAfee’s “Virtual Criminology Report”
                                                                  Image caption:
                                    “countries       developing advanced offensive cyber capabilities”

All rights reserved to Security Art ltd. 2002-2010                     17
Iftach Ian Amit | April 2011

     We’ll focus on current players:




                                                     And no, here size does NOT matter...
All rights reserved to Security Art ltd. 2002-2010             18
Iftach Ian Amit | April 2011



                                                     USA
             •       Thoroughly documented activity around cyberwar
                     preparedness as well as military/government agencies
                     with readily available offensive capabilities
             •       Massive recruiting of professional in attack/defense for
                     different departments:
                   •       USCC (United States Cyber Command - includes
                           AirForce, Marines, Navy and Army service
                           components)
                   •       NSA
                   •       Other TLA’s...
All rights reserved to Security Art ltd. 2002-2010    19
Iftach Ian Amit | April 2011



                                                     Russia
                   •       GRU (Main Intelligence Directorate of the
                           Russian Armed Forces)
                   •       SVR (Foreign Intelligence Service)
                   •       FSB (Federal Security Services)
                   •       Center for Research of Military Strength of
                           Foreign Countries
                   •       Several “National Youth Associations” (Nashi)

All rights reserved to Security Art ltd. 2002-2010     20
Iftach Ian Amit | April 2011



                                                     China
                   •       PLA (People’s Liberation Army)
                          •       Homework: read the Northrop Grumman
                                  report...
                          •       General Staff Department 4th Department -
                                  Electronic Countermeasures == Offense
                          •       GSD 3rd Department - Signals Intelligence
                                  == Defense
                   •       Yes... Titan Rain...

All rights reserved to Security Art ltd. 2002-2010     21
Iftach Ian Amit | April 2011



                                                     Iran
                   • Telecommunications Infrastructure
                           co.
                          • Government telecom monopoly

                   • Iranian Armed Forces

All rights reserved to Security Art ltd. 2002-2010    22
Iftach Ian Amit | April 2011



                                                     Israel
                   •       This is going to be very boring... Google data only :-(
                   •       IDF (Israel Defense Forces) add cyber-attack
                           capabilities.
                   •       C4I (Command, Control, Communications, Computers
                           and Intelligence) branches in Intelligence and Air-Force
                           commands
                   •       Staffing is mostly homegrown - trained in the army and
                           other government agencies.
                   •       Mossad? (check out the jobs section on mossad.gov.il...)


All rights reserved to Security Art ltd. 2002-2010     23
Iftach Ian Amit | April 2011



                                                     Israel
                   •       This is going to be very boring... Google data only :-(
                   •       IDF (Israel Defense Forces) add cyber-attack
                           capabilities.
                   •       C4I (Command, Control, Communications, Computers
                           and Intelligence) branches in Intelligence and Air-Force
                           commands
                   •       Staffing is mostly homegrown - trained in the army and
                           other government agencies.
                   •       Mossad? (check out the jobs section on mossad.gov.il...)


All rights reserved to Security Art ltd. 2002-2010     23
Iftach Ian Amit | April 2011



                                                     Israel
                   •       This is going to be very boring... Google data only :-(
                   •       IDF (Israel Defense Forces) add cyber-attack
                           capabilities.
                   •       C4I (Command, Control, Communications, Computers
                           and Intelligence) branches in Intelligence and Air-Force
                           commands
                   •       Staffing is mostly homegrown - trained in the army and
                           other government agencies.
                   •       Mossad? (check out the jobs section on mossad.gov.il...)


All rights reserved to Security Art ltd. 2002-2010     23
Iftach Ian Amit | April 2011



                             CyberWar - Attack
Highly selective targeting of
military (and critical)
resources
     In conjunction with a
          kinetic attack




All rights reserved to Security Art ltd. 2002-2010   24
Iftach Ian Amit | April 2011



                             CyberWar - Attack
Highly selective targeting of
military (and critical)
resources
     In conjunction with a
          kinetic attack
                                                          OR




All rights reserved to Security Art ltd. 2002-2010   24
Iftach Ian Amit | April 2011



                             CyberWar - Attack
Highly selective targeting of
military (and critical)
resources
     In conjunction with a
          kinetic attack
                                                          OR
                                                           Massive DDOS in order to
                                                                  “black-out” a region,
                                                             disrupt services, and/or
                                                                  push political agenda
                                                                      (propaganda)
All rights reserved to Security Art ltd. 2002-2010   24
Iftach Ian Amit | April 2011



                        CyberWar - Defense
             •      Never just military

                   •      Targets will be civilian

             •      Physical and logical protections = last
                    survival act

             •      Availability and Integrity of
                    services

                   •      Can manifest in the cost of making
                          services unavailable for most
                          civilians
All rights reserved to Security Art ltd. 2002-2010   25
Iftach Ian Amit | April 2011



                                                     CyberCrime




All rights reserved to Security Art ltd. 2002-2010       26
Iftach Ian Amit | April 2011                                                                              Criminal Boss




                                                                                                               Under Boss Trojan
                                                                                                              Provider and Manager
                                                                                                              Trojan Command and
                                                                                                                     Control




                                                                                     Attackers Crimeware


     You want
                                                                                        Toolkit Owners
                                                                                     Trojan distribution in
                                                                                      legitimate website


     money, you                                      Campaign Manager                  Campaign Manager                        Campaign Manager

   gotta play like
    the big boys
        do...
                                                                  Affiliation                           Affiliation                          Affiliation
                                                                  Network                               Network                              Network




                                                            Stolen Data Reseller                  Stolen Data Reseller                   Stolen Data Reseller




All rights reserved to Security Art ltd. 2002-2010                              27
                                                                   Figure 2: Organizational chart of a Cybercrime organization
Iftach Ian Amit | April 2011



                        CyberCrime - Attack
             •       Channels: web, mail, open services
             •       Targeted attacks on premium resources
                   •       Commissioned, or for extortion purposes
             •       Carpet bombing for most attacks
                   •       Segmenting geographical regions and market
                           segments
             •       Secondary infections through controlled outposts
                   •       Bots, infected sites
All rights reserved to Security Art ltd. 2002-2010   28
Iftach Ian Amit | April 2011


         CyberCrime - target locations




All rights reserved to Security Art ltd. 2002-2010   29
Iftach Ian Amit | April 2011



               CyberCrime - Locations




                                                     Major Cybercrime group locations
All rights reserved to Security Art ltd. 2002-2010              30
Iftach Ian Amit | April 2011



                CyberCrime - Ammunition




All rights reserved to Security Art ltd. 2002-2010   31
Iftach Ian Amit | April 2011



                CyberCrime - Ammunition




                                                     =≈ APT
All rights reserved to Security Art ltd. 2002-2010     31
Iftach Ian Amit | April 2011



                CyberCrime - Ammunition




                                                     =≈ APT
All rights reserved to Security Art ltd. 2002-2010     31
Iftach Ian Amit | April 2011




All rights reserved to Security Art ltd. 2002-2010   32
Iftach Ian Amit | April 2011



                  CyberCrime - Defense




All rights reserved to Security Art ltd. 2002-2010   33
Iftach Ian Amit | April 2011



                  CyberCrime - Defense
             •       Anti [ Virus | Malware | Spyware | Rootkit | Trojan ]




All rights reserved to Security Art ltd. 2002-2010   33
Iftach Ian Amit | April 2011



                  CyberCrime - Defense
             •       Anti [ Virus | Malware | Spyware | Rootkit | Trojan ]
                   •       Seriously?




All rights reserved to Security Art ltd. 2002-2010   33
Iftach Ian Amit | April 2011



                  CyberCrime - Defense
             •       Anti [ Virus | Malware | Spyware | Rootkit | Trojan ]
                   •       Seriously?




All rights reserved to Security Art ltd. 2002-2010   33
Iftach Ian Amit | April 2011



                  CyberCrime - Defense
             •       Anti [ Virus | Malware | Spyware | Rootkit | Trojan ]
                   •       Seriously?




All rights reserved to Security Art ltd. 2002-2010   33
Iftach Ian Amit | April 2011



                  CyberCrime - Defense
             •       Anti [ Virus | Malware | Spyware | Rootkit | Trojan ]
                   •       Seriously?


             •       Firewalls / IDS / IPS




All rights reserved to Security Art ltd. 2002-2010   33
Iftach Ian Amit | April 2011



                  CyberCrime - Defense
             •       Anti [ Virus | Malware | Spyware | Rootkit | Trojan ]
                   •       Seriously?


             •       Firewalls / IDS / IPS
                   •       Seriously?




All rights reserved to Security Art ltd. 2002-2010   33
Iftach Ian Amit | April 2011



                  CyberCrime - Defense
             •       Anti [ Virus | Malware | Spyware | Rootkit | Trojan ]
                   •       Seriously?


             •       Firewalls / IDS / IPS
                   •       Seriously?
                         •       Brought to you by the numbers 80, 443, 53...


All rights reserved to Security Art ltd. 2002-2010   33
Iftach Ian Amit | April 2011



                  CyberCrime - Defense
             •       Anti [ Virus | Malware | Spyware | Rootkit | Trojan ]
                   •       Seriously?


             •       Firewalls / IDS / IPS
                   •       Seriously?
                         •       Brought to you by the numbers 80, 443, 53...
                         •       SSL...
All rights reserved to Security Art ltd. 2002-2010   33
Iftach Ian Amit | April 2011



               How do these connect?
                         Claim: CyberCrime is being used to
                                 conduct CyberWar



                                           Proof: Let’s start with some history...



All rights reserved to Security Art ltd. 2002-2010        34
Iftach Ian Amit | April 2011



                          History - Revisited...
       Estonia

        You read all about it.

        Bottom line: civilian infrastructure was targeted
        Attacks originated mostly from civilian networks



All rights reserved to Security Art ltd. 2002-2010   35
Iftach Ian Amit | April 2011



                          History - Revisited...
       Israel
                                                     Operation Orchard




                                September 6th, 2007                   Source: Der Spiegel
                         Source: http://en.wikipedia.org/wiki/
                                Operation_Orchard

All rights reserved to Security Art ltd. 2002-2010               36
Iftach Ian Amit | April 2011



                          History - Revisited...
       Israel
                                                     Operation Orchard




                                September 6th, 2007                   Source: Der Spiegel
                         Source: http://en.wikipedia.org/wiki/
                                Operation_Orchard

All rights reserved to Security Art ltd. 2002-2010               36
Iftach Ian Amit | April 2011



                Mid-east crime-war links
        ARHack




                Hacker forum by day
                                                     Cybercrime operations by night
All rights reserved to Security Art ltd. 2002-2010         37
Iftach Ian Amit | April 2011




All rights reserved to Security Art ltd. 2002-2010   38
Iftach Ian Amit | April 2011




   Political post




All rights reserved to Security Art ltd. 2002-2010   38
Iftach Ian Amit | April 2011




   Political post
                                                 Buying/Selling cards for 1/2 their balance


All rights reserved to Security Art ltd. 2002-2010           38
Iftach Ian Amit | April 2011




   Political post
                                                 Buying/Selling cards for 1/2 their balance
     Selling 1600
      visa cards
All rights reserved to Security Art ltd. 2002-2010           38
Iftach Ian Amit | April 2011



                          History - Revisited...
       Georgia


        More interesting...

        Highly synchronized Kinetic and Cyber attacks
        Targets still mostly civilian
        Launched from civilian networks

All rights reserved to Security Art ltd. 2002-2010   39
Iftach Ian Amit | April 2011



                Russian Crime/State Dillema
                                                                 Micronnet
                                            McColo
                                                                Atrivo
                                                                     Eexhost
                                ESTDomains
                                                                  RBN
                                                     RealHost

All rights reserved to Security Art ltd. 2002-2010         40
Iftach Ian Amit | April 2011

                                                                        Russian
                                                     Crime
                                                                      Government
                      ESTDomains                      ESTDom                  RBN

 Atrivo

                         McColo                                UkrTeleGroup
                                                                                    HostFresh




All rights reserved to Security Art ltd. 2002-2010               41
Iftach Ian Amit | April 2011

                                                                          Russian
                                                     Crime
                                                                        Government
                      ESTDomains                      ESTDom                      RBN

 Atrivo

                         McColo                                UkrTeleGroup
                                                                                        HostFresh




                                                                      Hosted by




All rights reserved to Security Art ltd. 2002-2010               41
Iftach Ian Amit | April 2011

                                                                          Russian
                                                     Crime
                                                                        Government
                      ESTDomains                      ESTDom                      RBN

 Atrivo

                         McColo                                UkrTeleGroup
                                                                                        HostFresh




                                                                      Hosted by
                                                                      Customer



All rights reserved to Security Art ltd. 2002-2010               41
Iftach Ian Amit | April 2011

                                                                          Russian
                                                     Crime
                                                                        Government
                      ESTDomains                      ESTDom                        RBN

 Atrivo

                         McColo                                UkrTeleGroup
                                                                                          HostFresh




                                                                      Hosted by
                                                                      Customer
                                                                      Network provider


All rights reserved to Security Art ltd. 2002-2010               41
Iftach Ian Amit | April 2011

                                                                          Russian
                                                     Crime
                                                                        Government
                      ESTDomains                      ESTDom                        RBN

 Atrivo

                         McColo                                UkrTeleGroup
                                                                                          HostFresh




                                                                      Hosted by
                                                                      Customer
                                                                      Network provider


All rights reserved to Security Art ltd. 2002-2010               41
Iftach Ian Amit | April 2011



                         Remember Georgia?
                   •       Started by picking on the president...
                          flood http www.president.gov.ge
                          flood tcp www.president.gov.ge
                          flood icmp www.president.gov.ge
                   •       Then the C&C used to control the botnet
                           was shut down as:
                          •       Troops cross the border towards Georgia
                          •       A few days of silence...

All rights reserved to Security Art ltd. 2002-2010   42
Iftach Ian Amit | April 2011



                                          Georgia - cont.




All rights reserved to Security Art ltd. 2002-2010   43
Iftach Ian Amit | April 2011



                                          Georgia - cont.
                   •       Six (6) new C&C servers came up and drove attacks
                           at additional Georgian sites
                                                     www.president.gov.ge
                                                                            os-inform.com
                                                     www.parliament.ge
                                                                            www.kasparov.ru
                                                     apsny.ge
                                                                            hacking.ge mk.ru
                                                     news.ge
                                                                            newstula.info
                                                     tbilisiweb.info
                                                                            skandaly.ru
                                                     newsgeorgia.ru




All rights reserved to Security Art ltd. 2002-2010                     43
Iftach Ian Amit | April 2011



                                          Georgia - cont.
                   •       Six (6) new C&C servers came up and drove attacks
                           at additional Georgian sites
                                                     www.president.gov.ge
                                                                              os-inform.com
                                                     www.parliament.ge
                                                                              www.kasparov.ru
                                                     apsny.ge
                                                                              hacking.ge mk.ru
                                                     news.ge
                                                                              newstula.info
                                                     tbilisiweb.info
                                                                              skandaly.ru
                                                     newsgeorgia.ru

                   •       BUT - the same C&C’s were also used for attacks on
                           commercial sites in order to extort them (botnet-
                           for-hire) Additional sites attacked:
                                                     •Porn sites                 •Carder forums
                                                     •Adult escort services      •Gambling sites
                                                     •Nazi/Racist sites          •Webmoney/Webgold/etc…


All rights reserved to Security Art ltd. 2002-2010                     43
Iftach Ian Amit | April 2011



                                          Georgia - cont.
                   •       Six (6) new C&C servers came up and drove attacks
                           at additional Georgian sites
                                                     www.president.gov.ge
                                                                              os-inform.com
                                                     www.parliament.ge
                                                                              www.kasparov.ru
                                                     apsny.ge
                                                                              hacking.ge mk.ru
                                                     news.ge
                                                                              newstula.info
                                                     tbilisiweb.info
                                                                              skandaly.ru
                                                     newsgeorgia.ru

                   •       BUT - the same C&C’s were also used for attacks on
                           commercial sites in order to extort them (botnet-
                           for-hire) Additional sites attacked:
                                                     •Porn sites                 •Carder forums
                                                     •Adult escort services      •Gambling sites
                                                     •Nazi/Racist sites          •Webmoney/Webgold/etc…


All rights reserved to Security Art ltd. 2002-2010                     43
Iftach Ian Amit | April 2011



                                          Georgia - cont.
                   •       Six (6) new C&C servers came up and drove attacks
                           at additional Georgian sites
                                                     www.president.gov.ge
                                                                              os-inform.com
                                                     www.parliament.ge
                                                                              www.kasparov.ru
                                                     apsny.ge
                                                                              hacking.ge mk.ru
                                                     news.ge
                                                                              newstula.info
                                                     tbilisiweb.info
                                                                              skandaly.ru
                                                     newsgeorgia.ru

                   •       BUT - the same C&C’s were also used for attacks on
                           commercial sites in order to extort them (botnet-
                           for-hire) Additional sites attacked:
                                                     •Porn sites                 •Carder forums
                                                     •Adult escort services      •Gambling sites
                                                     •Nazi/Racist sites          •Webmoney/Webgold/etc…
 BTW - Guess who
 were the owners of all the
 Georgian IPSs?(Russia)
All rights reserved to Security Art ltd. 2002-2010                     43
Iftach Ian Amit | April 2011



                                          Georgia - cont.




All rights reserved to Security Art ltd. 2002-2010   44
Iftach Ian Amit | April 2011



                                          Georgia - cont.
                   • Final nail in the coffin:




All rights reserved to Security Art ltd. 2002-2010   44
Iftach Ian Amit | April 2011



                                          Georgia - cont.
                   • Final nail in the coffin:
                   • The city of Gori




All rights reserved to Security Art ltd. 2002-2010   44
Iftach Ian Amit | April 2011



                                          Georgia - cont.
                   • Final nail in the coffin:
                   • The city of Gori
                    • DDoS hits all municipal sites August
                                  7th 2008 at 22:00




All rights reserved to Security Art ltd. 2002-2010   44
Iftach Ian Amit | April 2011



                                          Georgia - cont.
                   • Final nail in the coffin:
                   • The city of Gori
                    • DDoS hits all municipal sites August
                                  7th 2008 at 22:00
                          • Complete network disconnect of the
                                  district August 8th 06:00


All rights reserved to Security Art ltd. 2002-2010   44
Iftach Ian Amit | April 2011



                                          Georgia - cont.
                   • Final nail in the coffin:
                   • The city of Gori
                    • DDoS hits all municipal sites August
                                  7th 2008 at 22:00
                          • Complete network disconnect of the
                                  district August 8th 06:00
                          • First strike on city August 8th 07:30
All rights reserved to Security Art ltd. 2002-2010   44
Iftach Ian Amit | April 2011



                                          Georgia - cont.
                   • Final nail in the coffin:
                   • The city of Gori
                    • DDoS hits all municipal sites August
                                  7th 2008 at 22:00
                          • Complete network disconnect of the
                                  district August 8th 06:00
                          • First strike on city August 8th 07:30
All rights reserved to Security Art ltd. 2002-2010   44
Iftach Ian Amit | April 2011



                          History - Revisited...
       Iran
        2009 Twitter DNS hack attributed to Iranian
        activity.
        Political connections are too obvious to ignore
        (elections)
                     Timing was right on:
                                                                           Protests by
                                                     UN Council
                                                                       leadership opposition
                                                     Decisions
                                                                             in Tehran

All rights reserved to Security Art ltd. 2002-2010                45
Iftach Ian Amit | April 2011




All rights reserved to Security Art ltd. 2002-2010   46
Iftach Ian Amit | April 2011




All rights reserved to Security Art ltd. 2002-2010   46
Iftach Ian Amit | April 2011



               Iran-Twitter connecting dots
                   • Twitter taken down December 18th 2009
                   • Attack attributed eventually to cyber-crime/
                           vigilante group named “Iranian Cyber Army”
                   • Until December 2009 there was no group
                           known as “Iranian Cyber Army”...
                   • BUT - “Ashiyane” (Shiite group) is from the
                           same place as the “Iranian Cyber Army”

All rights reserved to Security Art ltd. 2002-2010   47
Iftach Ian Amit | April 2011




All rights reserved to Security Art ltd. 2002-2010   48
Iftach Ian Amit | April 2011




All rights reserved to Security Art ltd. 2002-2010   48
Iftach Ian Amit | April 2011



                   Iran-Twitter - Ashiyane
                   • Ashiyane was using the same pro-Hezbolla
                           messages that were used on the Twitter
                           attack with their own attacks for some
                           time...
                   • AND the “Iranian Cyber Army” seems to
                           be a pretty active group on the Ashiyane
                           forums www.ashiyane.com/forum
                     Let’s take a look at how Ashiyane operates...
All rights reserved to Security Art ltd. 2002-2010   49
Iftach Ian Amit | April 2011



               On [Crime|War] training
                                                     Ashiyane forums
                                                      WarGames




All rights reserved to Security Art ltd. 2002-2010      50
Iftach Ian Amit | April 2011



               On [Crime|War] training
                                                     Ashiyane forums
                                                      WarGames




All rights reserved to Security Art ltd. 2002-2010      50
Iftach Ian Amit | April 2011



               On [Crime|War] training
                                                     Ashiyane forums
                                                      WarGames




All rights reserved to Security Art ltd. 2002-2010      50
Iftach Ian Amit | April 2011



               Wargames targets includes:




All rights reserved to Security Art ltd. 2002-2010   51
Iftach Ian Amit | April 2011



               Back to [Crime|War] Links:
      What else happened on the 18th?




All rights reserved to Security Art ltd. 2002-2010   52
Iftach Ian Amit | April 2011



               Back to [Crime|War] Links:
      What else happened on the 18th?




All rights reserved to Security Art ltd. 2002-2010   52
Iftach Ian Amit | April 2011



               Back to [Crime|War] Links:
      What else happened on the 18th?




All rights reserved to Security Art ltd. 2002-2010   52
Iftach Ian Amit | April 2011



               Back to [Crime|War] Links:
      What else happened on the 18th?




All rights reserved to Security Art ltd. 2002-2010   52
Iftach Ian Amit | April 2011



               Back to [Crime|War] Links:
      What else happened on the 18th?




                                                      Later on - Baidu takedown
                                                     with the same MO (credentials)
All rights reserved to Security Art ltd. 2002-2010         52
Iftach Ian Amit | April 2011


         Mapping Iran’s [Crime|War]

                             Ashiyane




All rights reserved to Security Art ltd. 2002-2010   53
Iftach Ian Amit | April 2011


         Mapping Iran’s [Crime|War]
                                                                   Site
                                                      DDoS
                                                               Defacement
                             Ashiyane
                                                     Botnet     Credit
                                                     Herding   Card Theft




All rights reserved to Security Art ltd. 2002-2010   53
Iftach Ian Amit | April 2011


         Mapping Iran’s [Crime|War]
                                                     Iran
                                                                                   US
                                                     Iraq                 Site
                                                             DDoS
                                                                      Defacement
                             Ashiyane
                                                            Botnet     Credit
                                                            Herding   Card Theft
                                                     $$                            UK




All rights reserved to Security Art ltd. 2002-2010          53
Iftach Ian Amit | April 2011


         Mapping Iran’s [Crime|War]
                                                     Iran
                                                                                   US
                                                     Iraq                 Site
                                                             DDoS
                                                                      Defacement
                             Ashiyane
                                                            Botnet     Credit
                                                            Herding   Card Theft
                                                     $$                            UK



                                Iranian
                                Cyber

All rights reserved to Security Art ltd. 2002-2010          53
Iftach Ian Amit | April 2011


         Mapping Iran’s [Crime|War]
                                                     Iran
                                                                                    US
                                                     Iraq                 Site
                                                             DDoS
                                                                      Defacement
                             Ashiyane
                                                            Botnet      Credit
                                                            Herding    Card Theft
                                                     $$                             UK



                                Iranian                          Strategic
                                Cyber                            Attacks

All rights reserved to Security Art ltd. 2002-2010          53
Iftach Ian Amit | April 2011


         Mapping Iran’s [Crime|War]
                                                     Iran
                                                                                         US
                                                     Iraq                      Site
                                                             DDoS
                                                                           Defacement
                             Ashiyane
                                                            Botnet           Credit
                                                            Herding         Card Theft
                                                     $$                                  UK



                                Iranian                               Strategic
                                Cyber                                 Attacks
                                                                 US               CN

All rights reserved to Security Art ltd. 2002-2010          53
Iftach Ian Amit | April 2011


         Mapping Iran’s [Crime|War]
                                                     Iran
                                                                                         US
                                                     Iraq                      Site
                                                             DDoS
                                                                           Defacement
                             Ashiyane
                                                            Botnet           Credit
                                                            Herding         Card Theft
                                                     $$                                  UK
        Crime
        War
                                Iranian                               Strategic
                                Cyber                                 Attacks
                                                                 US               CN

All rights reserved to Security Art ltd. 2002-2010          53
Iftach Ian Amit | April 2011


         Mapping Iran’s [Crime|War]
                                                     Iran
                                                                                         US
                                                     Iraq                      Site
                                                             DDoS
                                                                           Defacement
                             Ashiyane
                                                            Botnet           Credit
                                                            Herding         Card Theft
                                                     $$                                  UK
        Crime
        War
                                Iranian                               Strategic
                                Cyber                                 Attacks
                                                                 US               CN

All rights reserved to Security Art ltd. 2002-2010          53
Iftach Ian Amit | April 2011



                             Iran - the unspoken




All rights reserved to Security Art ltd. 2002-2010   54
Iftach Ian Amit | April 2011



                             Iran - the unspoken

                   • Stuxnet




All rights reserved to Security Art ltd. 2002-2010   54
Iftach Ian Amit | April 2011



                             Iran - the unspoken

                   • Stuxnet


                   • There, I’ve said it

All rights reserved to Security Art ltd. 2002-2010   54
Iftach Ian Amit | April 2011



                          History - Revisited...
       China
                   • Great Chinese Firewall doing an OK job in
                           keeping information out.
                   • Proving grounds for many cyber-attackers
                   • Bulletpfoof hosting (after RBN temporary
                           closure in 2008 China provided an alternative
                           that stayed...)

All rights reserved to Security Art ltd. 2002-2010   55
Iftach Ian Amit | April 2011



                      China ...connecting the dots
                       January 12th - Google announces it was hacked
                       by China
                                    Not as in the “we lost a few minutes of DNS”
                                    hacked...
                              “In mid-December we detected a highly
                              sophisticated and targeted attack on our
                              corporate infrastructure originating from China that
                              resulted in the theft of intellectual property from
                              Google” (David Drummond, SVP @Google)

All rights reserved to Security Art ltd. 2002-2010   56
Iftach Ian Amit | April 2011



                     China ...connecting the dots.
                January 12th - Adobe gets hacked. By China.
                             “Adobe became aware on January 2, 2010 of a
                             computer secur ity incident involving a
                             sophisticated coordinated attack
                             against corporate network systems managed by
                             Adobe and other companies” (Adobe official
                             blog)
                                  Same MO: 0-day in Internet Explorer to get
                                    into Google, Adobe and more than 40
                                            additional companies
All rights reserved to Security Art ltd. 2002-2010   57
Iftach Ian Amit | April 2011



                   China ...connecting the dots...
                           Problem: Attacks all carry the signs of
                           Cybercrime...
                           Criminal groups attack companies in order to get
                           to their data so they can sell it (whether it was
                           commercial or government data!)
                           US Response: “We look to the Chinese government
                           for an explanation. The ability to operate with
                           confidence in cyberspace is critical in a modern society
                           and economy.” (Hillary Clinton, Secretary of State)

All rights reserved to Security Art ltd. 2002-2010   58
Iftach Ian Amit | April 2011



                  China ...connecting the dots....




All rights reserved to Security Art ltd. 2002-2010   59
Iftach Ian Amit | April 2011



                  China ...connecting the dots....
                       The China move:




All rights reserved to Security Art ltd. 2002-2010   59
Iftach Ian Amit | April 2011



                  China ...connecting the dots....
                       The China move:
                                    Use of criminal groups to carry out the
                                    attacks provides the perfect deniability on
                                    espionage connections (just like in the past,
                                    and a perfect response to clinton).




All rights reserved to Security Art ltd. 2002-2010     59
Iftach Ian Amit | April 2011                    Anecdote - a
                                             professor in one of the
                  China ...                universities linked to the attack
                                          connecting the dots....
                                           admitted that the school network
                                             is often used to anonymously
                       The China move:
                                                     relay attacks
                           Use of criminal groups to carry out the
                           attacks provides the perfect deniability on
                           espionage connections (just like in the past,
                           and a perfect response to clinton).




All rights reserved to Security Art ltd. 2002-2010   59
Iftach Ian Amit | April 2011                    Anecdote - a
                                             professor in one of the
                  China ...                universities linked to the attack
                                          connecting the dots....
                                           admitted that the school network
                                             is often used to anonymously
                       The China move:
                                                     relay attacks
                           Use of criminal groups to carry out the
                           attacks provides the perfect deniability on
                           espionage connections (just like in the past,
                           and a perfect response to clinton).
                                    Targets are major US companies with strategic
                                    poise to enable state interest espionage



All rights reserved to Security Art ltd. 2002-2010    59
Iftach Ian Amit | April 2011                    Anecdote - a
                                             professor in one of the
                  China ...                universities linked to the attack
                                          connecting the dots....
                                           admitted that the school network
                                             is often used to anonymously
                       The China move:
                                                     relay attacks
                           Use of criminal groups to carry out the
                           attacks provides the perfect deniability on
                           espionage connections (just like in the past,
                           and a perfect response to clinton).
                                    Targets are major US companies with strategic
                                    poise to enable state interest espionage
                       Information sharing at its best:
                                                     State        Crime
All rights reserved to Security Art ltd. 2002-2010           59
Iftach Ian Amit | April 2011                    Anecdote - a
                                             professor in one of the
                  China ...                universities linked to the attack
                                          connecting the dots....
                                           admitted that the school network
                                             is often used to anonymously
                       The China move:
                                                     relay attacks
                           Use of criminal groups to carry out the
                           attacks provides the perfect deniability on
                           espionage connections (just like in the past,
                           and a perfect response to clinton).
                                    Targets are major US companies with strategic
                                    poise to enable state interest espionage
                       Information sharing at its best:
                                                     State           Crime
All rights reserved to Security Art ltd. 2002-2010
                                                          Win59 - Win
Iftach Ian Amit | April 2011



                          History - Revisited...
        Spain
                   • You are on the map as well! - MARIPOSA
                   • Highly respected 12M bots run by Spanish
                           ringleaders
                   • Slovenian source (developer)
                   • Global distribution
                   • Surprise... very painful to some governments...
All rights reserved to Security Art ltd. 2002-2010   60
Iftach Ian Amit | April 2011



                        Spain ...connecting the dots
                       3 People arrested by the Spanish Civil Guard in
                       February 2010


                       Florencio Carro Ruiz (netkairo), Jonathan Pazos
                       Rivera (jonylolente), and Juan Jose Bellido Rios
                       (ostiator) == DDP (Dias de Pesadilla)


All rights reserved to Security Art ltd. 2002-2010   61
Iftach Ian Amit | April 2011



                        Spain ...connecting the dots
                       On July 2010, Slovenian police arrested their
                       “source” (iserdo) who sold the kit to hundreds
                       of additional individuals and governments


                       The FBI called the Slovenian operation
                       “excellent” and “unparalleled” ?!?!


All rights reserved to Security Art ltd. 2002-2010   62
Iftach Ian Amit | April 2011



                  Spain ...connecting the dots....?




All rights reserved to Security Art ltd. 2002-2010   63
Iftach Ian Amit | April 2011



                  Spain ...connecting the dots....?

                Closure is still far on this one :-(




All rights reserved to Security Art ltd. 2002-2010   63
Iftach Ian Amit | April 2011



                  Spain ...connecting the dots....?

                Closure is still far on this one :-(


                Several more governments are involved, and additional
                “clients” of Isedro (the savior in Slovenian when spelled
                backwards) are part of open intelligence cases.



All rights reserved to Security Art ltd. 2002-2010   63
Iftach Ian Amit | April 2011



               How does APT fit here?
           RSA

                   • Infection vector: Flash vulnerability exploited
                           through Excel file
                   • Persistence: Using Poison Ivy as the trojan
                   • Exfiltration: Pack data in password protected
                           RAR files and upload to FTP

All rights reserved to Security Art ltd. 2002-2010   64
Iftach Ian Amit | April 2011



                           APT ...connecting the dots

           Compared to what we just reviewed, that was a
           SIMPLE attack...


           Trojan is not even a “commercial” product (free
           download at http://www.poisonivy-rat.com/)


All rights reserved to Security Art ltd. 2002-2010   65
Iftach Ian Amit | April 2011



                     APT ...connecting the dots....?




All rights reserved to Security Art ltd. 2002-2010   66
Iftach Ian Amit | April 2011



                     APT ...connecting the dots....?
                                        Infiltration

                                        Social/
                                        physical


                                         Phishing



All rights reserved to Security Art ltd. 2002-2010    66
Iftach Ian Amit | April 2011



                     APT ...connecting the dots....?
                                                        Persistence,
                                        Infiltration
                                                           C&C

                                        Social/        Advanced C&C
                                                      (p2p, lateral move)
                                        physical


                                                      Simple C&C
                                         Phishing
                                                        (HTTP)


All rights reserved to Security Art ltd. 2002-2010        66
Iftach Ian Amit | April 2011



                     APT ...connecting the dots....?
                                                        Persistence,
                                        Infiltration                          Exfiltration
                                                           C&C

                                        Social/        Advanced C&C           Advanced
          APT                                         (p2p, lateral move)   exfil (dns,VoIP)
                                        physical


                                                      Simple C&C            Simple exfil
        APT?!                            Phishing
                                                        (HTTP)                 (FTP)


All rights reserved to Security Art ltd. 2002-2010        66
Iftach Ian Amit | April 2011



                     APT ...connecting the dots....?
                                                        Persistence,
                                        Infiltration                          Exfiltration
                                                           C&C

                                        Social/        Advanced C&C           Advanced
          APT                                         (p2p, lateral move)   exfil (dns,VoIP)
                                        physical


                                                      Simple C&C            Simple exfil
        APT?!                            Phishing
                                                        (HTTP)                 (FTP)

Bottom line: Not a direct state attack - Criminals again...
All rights reserved to Security Art ltd. 2002-2010        66
Iftach Ian Amit | April 2011

                                          The Future (Ilustrated)




All rights reserved to Security Art ltd. 2002-2010   67
Iftach Ian Amit | April 2011

                                          The Future (Ilustrated)




All rights reserved to Security Art ltd. 2002-2010   67
Iftach Ian Amit | April 2011

                                          The Future (Ilustrated)




All rights reserved to Security Art ltd. 2002-2010   67
Iftach Ian Amit | April 2011

                                          The Future (Ilustrated)




All rights reserved to Security Art ltd. 2002-2010   67
Iftach Ian Amit | April 2011

                                          The Future (Ilustrated)




All rights reserved to Security Art ltd. 2002-2010   67
Iftach Ian Amit | April 2011

                                          The Future (Ilustrated)




All rights reserved to Security Art ltd. 2002-2010   67
Iftach Ian Amit | April 2011

                                          The Future (Ilustrated)




All rights reserved to Security Art ltd. 2002-2010   67
Iftach Ian Amit | April 2011

                                          The Future (Ilustrated)




                                                CLOUDS

All rights reserved to Security Art ltd. 2002-2010   67
Iftach Ian Amit | April 2011



                                                     Summary
                                 Good                         Bad
                      Formal training on                           Commercial
                      cybersecurity by                          development of
                      nations                                malware still reigns




All rights reserved to Security Art ltd. 2002-2010      68
Iftach Ian Amit | April 2011



                                                     Summary
                                 Good                          Bad
                      Formal training on                            Commercial
                      cybersecurity by                           development of
                      nations                                 malware still reigns

                                                       Ugly
                        Good meet Bad: money changes hands, less
                       tracks to cover, criminal ops already creating
                                      the weapons...

All rights reserved to Security Art ltd. 2002-2010      68
Iftach Ian Amit | April 2011



                                                     Summary
                                                     The Future

           Lack of legislation and cooperation on multi-
           national level is creating de-facto “safe
           haven” for cybercrime. <- Fix this!


           Treaties and anti-crime activities may prove to
           be beneficial. <- Translate to politics/law!

All rights reserved to Security Art ltd. 2002-2010       69
Iftach Ian Amit | April 2011



                                                        Thanks!
                                                         Q&A

                                                      iamit@iamit.org
                                    pro: iamit@security-art.com
                                        twitter: twitter.com/iiamit
                                                     blog: iamit.org/blog
All rights reserved to Security Art ltd. 2002-2010            70

More Related Content

Viewers also liked

How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
Source Conference
 
Matthew Coles - Izar Tarandach - Security Toolbox
Matthew Coles - Izar Tarandach - Security ToolboxMatthew Coles - Izar Tarandach - Security Toolbox
Matthew Coles - Izar Tarandach - Security Toolbox
Source Conference
 
Wim Remes SOURCE Boston 2011
Wim Remes SOURCE Boston 2011 Wim Remes SOURCE Boston 2011
Wim Remes SOURCE Boston 2011
Source Conference
 
Paul Asadoorian - Bringing Sexy Back
Paul Asadoorian - Bringing Sexy BackPaul Asadoorian - Bringing Sexy Back
Paul Asadoorian - Bringing Sexy Back
Source Conference
 
Travis Goodspeed - Not Quite ZigBee
Travis Goodspeed - Not Quite ZigBeeTravis Goodspeed - Not Quite ZigBee
Travis Goodspeed - Not Quite ZigBee
Source Conference
 
Reputation Digital Vaccine: Reinventing Internet Blacklists
Reputation Digital Vaccine: Reinventing Internet BlacklistsReputation Digital Vaccine: Reinventing Internet Blacklists
Reputation Digital Vaccine: Reinventing Internet Blacklists
Source Conference
 
Adam Meyers - RCE: Obfuscation and Communications
Adam Meyers - RCE: Obfuscation and CommunicationsAdam Meyers - RCE: Obfuscation and Communications
Adam Meyers - RCE: Obfuscation and Communications
Source Conference
 
Andrew Jaquith SOURCE Boston 2011
Andrew Jaquith SOURCE Boston 2011Andrew Jaquith SOURCE Boston 2011
Andrew Jaquith SOURCE Boston 2011
Source Conference
 
JSF Security
JSF SecurityJSF Security
JSF Security
Source Conference
 
Everything you should already know about MS-SQL post-exploitation
Everything you should already know about MS-SQL post-exploitationEverything you should already know about MS-SQL post-exploitation
Everything you should already know about MS-SQL post-exploitation
Source Conference
 
PTES: PenTest Execution Standard
PTES: PenTest Execution StandardPTES: PenTest Execution Standard
PTES: PenTest Execution Standard
Source Conference
 
Wfuzz para Penetration Testers
Wfuzz para Penetration TestersWfuzz para Penetration Testers
Wfuzz para Penetration Testers
Source Conference
 
social media - the cyber reality [screen notes]
social media - the cyber reality [screen notes]social media - the cyber reality [screen notes]
social media - the cyber reality [screen notes]
jody wissing
 
USSTRATCOM Cyber & Space 2011 Mark Maybury
USSTRATCOM Cyber & Space 2011 Mark Maybury USSTRATCOM Cyber & Space 2011 Mark Maybury
USSTRATCOM Cyber & Space 2011 Mark Maybury
AFCEA International
 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber Security
Phil Agcaoili
 
Cyber security and Homeland security
Cyber security and Homeland securityCyber security and Homeland security
Cyber security and Homeland security
ADGP, Public Grivences, Bangalore
 
Lessons 5,18,21 Ofd, Air And Space Power Functions, Aef Doherty 27 Oct 09
Lessons 5,18,21   Ofd, Air And Space Power Functions, Aef   Doherty 27 Oct 09Lessons 5,18,21   Ofd, Air And Space Power Functions, Aef   Doherty 27 Oct 09
Lessons 5,18,21 Ofd, Air And Space Power Functions, Aef Doherty 27 Oct 09
runningman825
 
[Challenge:Future] Cyber war
[Challenge:Future] Cyber war[Challenge:Future] Cyber war
[Challenge:Future] Cyber war
Challenge:Future
 
Cyber war scenario what are the defenses
Cyber war scenario   what are the defenses Cyber war scenario   what are the defenses
Cyber war scenario what are the defenses
A. V. Rajabahadur
 
Cyber Crime & Cyber War
Cyber Crime & Cyber WarCyber Crime & Cyber War
Cyber Crime & Cyber War
n|u - The Open Security Community
 

Viewers also liked (20)

How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Matthew Coles - Izar Tarandach - Security Toolbox
Matthew Coles - Izar Tarandach - Security ToolboxMatthew Coles - Izar Tarandach - Security Toolbox
Matthew Coles - Izar Tarandach - Security Toolbox
 
Wim Remes SOURCE Boston 2011
Wim Remes SOURCE Boston 2011 Wim Remes SOURCE Boston 2011
Wim Remes SOURCE Boston 2011
 
Paul Asadoorian - Bringing Sexy Back
Paul Asadoorian - Bringing Sexy BackPaul Asadoorian - Bringing Sexy Back
Paul Asadoorian - Bringing Sexy Back
 
Travis Goodspeed - Not Quite ZigBee
Travis Goodspeed - Not Quite ZigBeeTravis Goodspeed - Not Quite ZigBee
Travis Goodspeed - Not Quite ZigBee
 
Reputation Digital Vaccine: Reinventing Internet Blacklists
Reputation Digital Vaccine: Reinventing Internet BlacklistsReputation Digital Vaccine: Reinventing Internet Blacklists
Reputation Digital Vaccine: Reinventing Internet Blacklists
 
Adam Meyers - RCE: Obfuscation and Communications
Adam Meyers - RCE: Obfuscation and CommunicationsAdam Meyers - RCE: Obfuscation and Communications
Adam Meyers - RCE: Obfuscation and Communications
 
Andrew Jaquith SOURCE Boston 2011
Andrew Jaquith SOURCE Boston 2011Andrew Jaquith SOURCE Boston 2011
Andrew Jaquith SOURCE Boston 2011
 
JSF Security
JSF SecurityJSF Security
JSF Security
 
Everything you should already know about MS-SQL post-exploitation
Everything you should already know about MS-SQL post-exploitationEverything you should already know about MS-SQL post-exploitation
Everything you should already know about MS-SQL post-exploitation
 
PTES: PenTest Execution Standard
PTES: PenTest Execution StandardPTES: PenTest Execution Standard
PTES: PenTest Execution Standard
 
Wfuzz para Penetration Testers
Wfuzz para Penetration TestersWfuzz para Penetration Testers
Wfuzz para Penetration Testers
 
social media - the cyber reality [screen notes]
social media - the cyber reality [screen notes]social media - the cyber reality [screen notes]
social media - the cyber reality [screen notes]
 
USSTRATCOM Cyber & Space 2011 Mark Maybury
USSTRATCOM Cyber & Space 2011 Mark Maybury USSTRATCOM Cyber & Space 2011 Mark Maybury
USSTRATCOM Cyber & Space 2011 Mark Maybury
 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber Security
 
Cyber security and Homeland security
Cyber security and Homeland securityCyber security and Homeland security
Cyber security and Homeland security
 
Lessons 5,18,21 Ofd, Air And Space Power Functions, Aef Doherty 27 Oct 09
Lessons 5,18,21   Ofd, Air And Space Power Functions, Aef   Doherty 27 Oct 09Lessons 5,18,21   Ofd, Air And Space Power Functions, Aef   Doherty 27 Oct 09
Lessons 5,18,21 Ofd, Air And Space Power Functions, Aef Doherty 27 Oct 09
 
[Challenge:Future] Cyber war
[Challenge:Future] Cyber war[Challenge:Future] Cyber war
[Challenge:Future] Cyber war
 
Cyber war scenario what are the defenses
Cyber war scenario   what are the defenses Cyber war scenario   what are the defenses
Cyber war scenario what are the defenses
 
Cyber Crime & Cyber War
Cyber Crime & Cyber WarCyber Crime & Cyber War
Cyber Crime & Cyber War
 

More from Source Conference

Million Browser Botnet
Million Browser BotnetMillion Browser Botnet
Million Browser Botnet
Source Conference
 
iBanking - a botnet on Android
iBanking - a botnet on AndroidiBanking - a botnet on Android
iBanking - a botnet on Android
Source Conference
 
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICI want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUIC
Source Conference
 
From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and BobsFrom DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and Bobs
Source Conference
 
Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus DerivativesExtracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus Derivatives
Source Conference
 
Security Goodness with Ruby on Rails
Security Goodness with Ruby on RailsSecurity Goodness with Ruby on Rails
Security Goodness with Ruby on Rails
Source Conference
 
Securty Testing For RESTful Applications
Securty Testing For RESTful ApplicationsSecurty Testing For RESTful Applications
Securty Testing For RESTful Applications
Source Conference
 
Esteganografia
EsteganografiaEsteganografia
Esteganografia
Source Conference
 
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserMen in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the Browser
Source Conference
 
Advanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done ItAdvanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done It
Source Conference
 
Adapting To The Age Of Anonymous
Adapting To The Age Of AnonymousAdapting To The Age Of Anonymous
Adapting To The Age Of Anonymous
Source Conference
 
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?
Source Conference
 
Advanced (persistent) binary planting
Advanced (persistent) binary plantingAdvanced (persistent) binary planting
Advanced (persistent) binary planting
Source Conference
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Source Conference
 
How To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security SpendHow To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security Spend
Source Conference
 
Keynote
KeynoteKeynote
Threat Modeling: Best Practices
Threat Modeling: Best PracticesThreat Modeling: Best Practices
Threat Modeling: Best Practices
Source Conference
 
Forensic Memory Analysis of Android's Dalvik Virtual Machine
Forensic Memory Analysis of Android's Dalvik Virtual MachineForensic Memory Analysis of Android's Dalvik Virtual Machine
Forensic Memory Analysis of Android's Dalvik Virtual Machine
Source Conference
 
Banking Fraud Evolution
Banking Fraud EvolutionBanking Fraud Evolution
Banking Fraud Evolution
Source Conference
 
Geer - Hutton - Shannon - A Pilot Project On The Use Of Prediction Markets I...
Geer -  Hutton - Shannon - A Pilot Project On The Use Of Prediction Markets I...Geer -  Hutton - Shannon - A Pilot Project On The Use Of Prediction Markets I...
Geer - Hutton - Shannon - A Pilot Project On The Use Of Prediction Markets I...
Source Conference
 

More from Source Conference (20)

Million Browser Botnet
Million Browser BotnetMillion Browser Botnet
Million Browser Botnet
 
iBanking - a botnet on Android
iBanking - a botnet on AndroidiBanking - a botnet on Android
iBanking - a botnet on Android
 
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICI want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUIC
 
From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and BobsFrom DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and Bobs
 
Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus DerivativesExtracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus Derivatives
 
Security Goodness with Ruby on Rails
Security Goodness with Ruby on RailsSecurity Goodness with Ruby on Rails
Security Goodness with Ruby on Rails
 
Securty Testing For RESTful Applications
Securty Testing For RESTful ApplicationsSecurty Testing For RESTful Applications
Securty Testing For RESTful Applications
 
Esteganografia
EsteganografiaEsteganografia
Esteganografia
 
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserMen in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the Browser
 
Advanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done ItAdvanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done It
 
Adapting To The Age Of Anonymous
Adapting To The Age Of AnonymousAdapting To The Age Of Anonymous
Adapting To The Age Of Anonymous
 
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?
 
Advanced (persistent) binary planting
Advanced (persistent) binary plantingAdvanced (persistent) binary planting
Advanced (persistent) binary planting
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
 
How To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security SpendHow To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security Spend
 
Keynote
KeynoteKeynote
Keynote
 
Threat Modeling: Best Practices
Threat Modeling: Best PracticesThreat Modeling: Best Practices
Threat Modeling: Best Practices
 
Forensic Memory Analysis of Android's Dalvik Virtual Machine
Forensic Memory Analysis of Android's Dalvik Virtual MachineForensic Memory Analysis of Android's Dalvik Virtual Machine
Forensic Memory Analysis of Android's Dalvik Virtual Machine
 
Banking Fraud Evolution
Banking Fraud EvolutionBanking Fraud Evolution
Banking Fraud Evolution
 
Geer - Hutton - Shannon - A Pilot Project On The Use Of Prediction Markets I...
Geer -  Hutton - Shannon - A Pilot Project On The Use Of Prediction Markets I...Geer -  Hutton - Shannon - A Pilot Project On The Use Of Prediction Markets I...
Geer - Hutton - Shannon - A Pilot Project On The Use Of Prediction Markets I...
 

Recently uploaded

Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 

Recently uploaded (20)

Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 

Ian Iftach Amit - Cyber[Crime|War] - Connecting The Dots

  • 1. Iftach Ian Amit | April 2011 Cyber[Crime|War] Connecting the Dots Iftach Ian Amit VP Consulting, Security Art Board Member - CSA Israel IL-CERT Dreamer DC9723 All rights reserved to Security Art ltd. 2002-2010 www.security-art.com
  • 2. Iftach Ian Amit | April 2011 The Disclaimer This is “hacker” me, and my own personal opinion only. This has got nothing to do with work stuff. The “work” me is often suited and talks in acronyms and industry best practices stuff. All rights reserved to Security Art ltd. 2002-2010 2
  • 3. Iftach Ian Amit | April 2011 Agenda • Who am I? • CyberWar [Attack | Defense] • CyberCrime [Attack | Defense] • History revisited • Connecting the dots... • Future All rights reserved to Security Art ltd. 2002-2010 3
  • 4. Iftach Ian Amit | April 2011 Who Am I All rights reserved to Security Art ltd. 2002-2010 4
  • 5. Iftach Ian Amit | April 2011 This is NOT going to be All rights reserved to Security Art ltd. 2002-2010 5
  • 6. Iftach Ian Amit | April 2011 This is NOT going to be All rights reserved to Security Art ltd. 2002-2010 5
  • 7. Iftach Ian Amit | April 2011 Picking up where we left off At least as far as last year’s research is concerned... All rights reserved to Security Art ltd. 2002-2010 6
  • 8. Iftach Ian Amit | April 2011 All rights reserved to Security Art ltd. 2002-2010 7
  • 9. Iftach Ian Amit | April 2011 Boss, is this supposed to be on the internet? All rights reserved to Security Art ltd. 2002-2010 7
  • 10. Iftach Ian Amit | April 2011 Boss, is this supposed to be on the internet? I thi is fr nk t his pow om erpo my All rights reserved to Security Art ltd. 2002-2010 7 int!
  • 11. Iftach Ian Amit | April 2011 Boss, is this supposed to be on the internet? We probably need to call someone... I thi is fr nk t his pow om erpo my All rights reserved to Security Art ltd. 2002-2010 7 int!
  • 12. Iftach Ian Amit | April 2011 All rights reserved to Security Art ltd. 2002-2010 8
  • 13. Iftach Ian Amit | April 2011 All rights reserved to Security Art ltd. 2002-2010 8
  • 14. Iftach Ian Amit | April 2011 All rights reserved to Security Art ltd. 2002-2010 8
  • 15. Iftach Ian Amit | April 2011 Final ly de- classif ied... (on p ublic dom ain) The initia “trace” o l r lo- jack used track dow to n the thief... All rights reserved to Security Art ltd. 2002-2010 8
  • 16. Iftach Ian Amit | April 2011 Hungry yet? That was just the appetizer... All rights reserved to Security Art ltd. 2002-2010 9
  • 17. Iftach Ian Amit | April 2011 Question 1: What is this? All rights reserved to Security Art ltd. 2002-2010 10
  • 18. Iftach Ian Amit | April 2011 Question 1: What is this? All rights reserved to Security Art ltd. 2002-2010 11
  • 19. Iftach Ian Amit | April 2011 Perceptions may be deceiving... War Crime All rights reserved to Security Art ltd. 2002-2010 12
  • 20. Iftach Ian Amit | April 2011 War Crime • Government / state • Private • Official backing • Semi-official backing (org. crime) • Official resources • Financing • Official resources • Expertise? • Self financing? • Exploits/Vulns? • Established expertise (in- house + outsourced) • Market for exploits All rights reserved to Security Art ltd. 2002-2010 13
  • 21. Iftach Ian Amit | April 2011 CyberWar “Cyberwarfare, (also known as cyberwar and Cyber Warfare), is the use of computers and the Internet in conducting warfare in cyberspace.” Wikipedia All rights reserved to Security Art ltd. 2002-2010 14
  • 22. Iftach Ian Amit | April 2011 It did not happen yet Estonia being an exception? “There is no Cyberwar” All rights reserved to Security Art ltd. 2002-2010 15
  • 23. Iftach Ian Amit | April 2011 It did not happen yet RSA being an exception? “There is no Cyberwar” All rights reserved to Security Art ltd. 2002-2010 15
  • 24. Iftach Ian Amit | April 2011 It did not happen yet RSA being an exception? “There is no Cyberwar” All rights reserved to Security Art ltd. 2002-2010 15
  • 25. Iftach Ian Amit | April 2011 This is not the only way! Neither is this... But civilian are always at stake! All rights reserved to Security Art ltd. 2002-2010 16
  • 26. Iftach Ian Amit | April 2011 Many faces of how CyberWar is perceived... From McAfee’s “Virtual Criminology Report” Image caption: “countries developing advanced offensive cyber capabilities” All rights reserved to Security Art ltd. 2002-2010 17
  • 27. Iftach Ian Amit | April 2011 We’ll focus on current players: And no, here size does NOT matter... All rights reserved to Security Art ltd. 2002-2010 18
  • 28. Iftach Ian Amit | April 2011 USA • Thoroughly documented activity around cyberwar preparedness as well as military/government agencies with readily available offensive capabilities • Massive recruiting of professional in attack/defense for different departments: • USCC (United States Cyber Command - includes AirForce, Marines, Navy and Army service components) • NSA • Other TLA’s... All rights reserved to Security Art ltd. 2002-2010 19
  • 29. Iftach Ian Amit | April 2011 Russia • GRU (Main Intelligence Directorate of the Russian Armed Forces) • SVR (Foreign Intelligence Service) • FSB (Federal Security Services) • Center for Research of Military Strength of Foreign Countries • Several “National Youth Associations” (Nashi) All rights reserved to Security Art ltd. 2002-2010 20
  • 30. Iftach Ian Amit | April 2011 China • PLA (People’s Liberation Army) • Homework: read the Northrop Grumman report... • General Staff Department 4th Department - Electronic Countermeasures == Offense • GSD 3rd Department - Signals Intelligence == Defense • Yes... Titan Rain... All rights reserved to Security Art ltd. 2002-2010 21
  • 31. Iftach Ian Amit | April 2011 Iran • Telecommunications Infrastructure co. • Government telecom monopoly • Iranian Armed Forces All rights reserved to Security Art ltd. 2002-2010 22
  • 32. Iftach Ian Amit | April 2011 Israel • This is going to be very boring... Google data only :-( • IDF (Israel Defense Forces) add cyber-attack capabilities. • C4I (Command, Control, Communications, Computers and Intelligence) branches in Intelligence and Air-Force commands • Staffing is mostly homegrown - trained in the army and other government agencies. • Mossad? (check out the jobs section on mossad.gov.il...) All rights reserved to Security Art ltd. 2002-2010 23
  • 33. Iftach Ian Amit | April 2011 Israel • This is going to be very boring... Google data only :-( • IDF (Israel Defense Forces) add cyber-attack capabilities. • C4I (Command, Control, Communications, Computers and Intelligence) branches in Intelligence and Air-Force commands • Staffing is mostly homegrown - trained in the army and other government agencies. • Mossad? (check out the jobs section on mossad.gov.il...) All rights reserved to Security Art ltd. 2002-2010 23
  • 34. Iftach Ian Amit | April 2011 Israel • This is going to be very boring... Google data only :-( • IDF (Israel Defense Forces) add cyber-attack capabilities. • C4I (Command, Control, Communications, Computers and Intelligence) branches in Intelligence and Air-Force commands • Staffing is mostly homegrown - trained in the army and other government agencies. • Mossad? (check out the jobs section on mossad.gov.il...) All rights reserved to Security Art ltd. 2002-2010 23
  • 35. Iftach Ian Amit | April 2011 CyberWar - Attack Highly selective targeting of military (and critical) resources In conjunction with a kinetic attack All rights reserved to Security Art ltd. 2002-2010 24
  • 36. Iftach Ian Amit | April 2011 CyberWar - Attack Highly selective targeting of military (and critical) resources In conjunction with a kinetic attack OR All rights reserved to Security Art ltd. 2002-2010 24
  • 37. Iftach Ian Amit | April 2011 CyberWar - Attack Highly selective targeting of military (and critical) resources In conjunction with a kinetic attack OR Massive DDOS in order to “black-out” a region, disrupt services, and/or push political agenda (propaganda) All rights reserved to Security Art ltd. 2002-2010 24
  • 38. Iftach Ian Amit | April 2011 CyberWar - Defense • Never just military • Targets will be civilian • Physical and logical protections = last survival act • Availability and Integrity of services • Can manifest in the cost of making services unavailable for most civilians All rights reserved to Security Art ltd. 2002-2010 25
  • 39. Iftach Ian Amit | April 2011 CyberCrime All rights reserved to Security Art ltd. 2002-2010 26
  • 40. Iftach Ian Amit | April 2011 Criminal Boss Under Boss Trojan Provider and Manager Trojan Command and Control Attackers Crimeware You want Toolkit Owners Trojan distribution in legitimate website money, you Campaign Manager Campaign Manager Campaign Manager gotta play like the big boys do... Affiliation Affiliation Affiliation Network Network Network Stolen Data Reseller Stolen Data Reseller Stolen Data Reseller All rights reserved to Security Art ltd. 2002-2010 27 Figure 2: Organizational chart of a Cybercrime organization
  • 41. Iftach Ian Amit | April 2011 CyberCrime - Attack • Channels: web, mail, open services • Targeted attacks on premium resources • Commissioned, or for extortion purposes • Carpet bombing for most attacks • Segmenting geographical regions and market segments • Secondary infections through controlled outposts • Bots, infected sites All rights reserved to Security Art ltd. 2002-2010 28
  • 42. Iftach Ian Amit | April 2011 CyberCrime - target locations All rights reserved to Security Art ltd. 2002-2010 29
  • 43. Iftach Ian Amit | April 2011 CyberCrime - Locations Major Cybercrime group locations All rights reserved to Security Art ltd. 2002-2010 30
  • 44. Iftach Ian Amit | April 2011 CyberCrime - Ammunition All rights reserved to Security Art ltd. 2002-2010 31
  • 45. Iftach Ian Amit | April 2011 CyberCrime - Ammunition =≈ APT All rights reserved to Security Art ltd. 2002-2010 31
  • 46. Iftach Ian Amit | April 2011 CyberCrime - Ammunition =≈ APT All rights reserved to Security Art ltd. 2002-2010 31
  • 47. Iftach Ian Amit | April 2011 All rights reserved to Security Art ltd. 2002-2010 32
  • 48. Iftach Ian Amit | April 2011 CyberCrime - Defense All rights reserved to Security Art ltd. 2002-2010 33
  • 49. Iftach Ian Amit | April 2011 CyberCrime - Defense • Anti [ Virus | Malware | Spyware | Rootkit | Trojan ] All rights reserved to Security Art ltd. 2002-2010 33
  • 50. Iftach Ian Amit | April 2011 CyberCrime - Defense • Anti [ Virus | Malware | Spyware | Rootkit | Trojan ] • Seriously? All rights reserved to Security Art ltd. 2002-2010 33
  • 51. Iftach Ian Amit | April 2011 CyberCrime - Defense • Anti [ Virus | Malware | Spyware | Rootkit | Trojan ] • Seriously? All rights reserved to Security Art ltd. 2002-2010 33
  • 52. Iftach Ian Amit | April 2011 CyberCrime - Defense • Anti [ Virus | Malware | Spyware | Rootkit | Trojan ] • Seriously? All rights reserved to Security Art ltd. 2002-2010 33
  • 53. Iftach Ian Amit | April 2011 CyberCrime - Defense • Anti [ Virus | Malware | Spyware | Rootkit | Trojan ] • Seriously? • Firewalls / IDS / IPS All rights reserved to Security Art ltd. 2002-2010 33
  • 54. Iftach Ian Amit | April 2011 CyberCrime - Defense • Anti [ Virus | Malware | Spyware | Rootkit | Trojan ] • Seriously? • Firewalls / IDS / IPS • Seriously? All rights reserved to Security Art ltd. 2002-2010 33
  • 55. Iftach Ian Amit | April 2011 CyberCrime - Defense • Anti [ Virus | Malware | Spyware | Rootkit | Trojan ] • Seriously? • Firewalls / IDS / IPS • Seriously? • Brought to you by the numbers 80, 443, 53... All rights reserved to Security Art ltd. 2002-2010 33
  • 56. Iftach Ian Amit | April 2011 CyberCrime - Defense • Anti [ Virus | Malware | Spyware | Rootkit | Trojan ] • Seriously? • Firewalls / IDS / IPS • Seriously? • Brought to you by the numbers 80, 443, 53... • SSL... All rights reserved to Security Art ltd. 2002-2010 33
  • 57. Iftach Ian Amit | April 2011 How do these connect? Claim: CyberCrime is being used to conduct CyberWar Proof: Let’s start with some history... All rights reserved to Security Art ltd. 2002-2010 34
  • 58. Iftach Ian Amit | April 2011 History - Revisited... Estonia You read all about it. Bottom line: civilian infrastructure was targeted Attacks originated mostly from civilian networks All rights reserved to Security Art ltd. 2002-2010 35
  • 59. Iftach Ian Amit | April 2011 History - Revisited... Israel Operation Orchard September 6th, 2007 Source: Der Spiegel Source: http://en.wikipedia.org/wiki/ Operation_Orchard All rights reserved to Security Art ltd. 2002-2010 36
  • 60. Iftach Ian Amit | April 2011 History - Revisited... Israel Operation Orchard September 6th, 2007 Source: Der Spiegel Source: http://en.wikipedia.org/wiki/ Operation_Orchard All rights reserved to Security Art ltd. 2002-2010 36
  • 61. Iftach Ian Amit | April 2011 Mid-east crime-war links ARHack Hacker forum by day Cybercrime operations by night All rights reserved to Security Art ltd. 2002-2010 37
  • 62. Iftach Ian Amit | April 2011 All rights reserved to Security Art ltd. 2002-2010 38
  • 63. Iftach Ian Amit | April 2011 Political post All rights reserved to Security Art ltd. 2002-2010 38
  • 64. Iftach Ian Amit | April 2011 Political post Buying/Selling cards for 1/2 their balance All rights reserved to Security Art ltd. 2002-2010 38
  • 65. Iftach Ian Amit | April 2011 Political post Buying/Selling cards for 1/2 their balance Selling 1600 visa cards All rights reserved to Security Art ltd. 2002-2010 38
  • 66. Iftach Ian Amit | April 2011 History - Revisited... Georgia More interesting... Highly synchronized Kinetic and Cyber attacks Targets still mostly civilian Launched from civilian networks All rights reserved to Security Art ltd. 2002-2010 39
  • 67. Iftach Ian Amit | April 2011 Russian Crime/State Dillema Micronnet McColo Atrivo Eexhost ESTDomains RBN RealHost All rights reserved to Security Art ltd. 2002-2010 40
  • 68. Iftach Ian Amit | April 2011 Russian Crime Government ESTDomains ESTDom RBN Atrivo McColo UkrTeleGroup HostFresh All rights reserved to Security Art ltd. 2002-2010 41
  • 69. Iftach Ian Amit | April 2011 Russian Crime Government ESTDomains ESTDom RBN Atrivo McColo UkrTeleGroup HostFresh Hosted by All rights reserved to Security Art ltd. 2002-2010 41
  • 70. Iftach Ian Amit | April 2011 Russian Crime Government ESTDomains ESTDom RBN Atrivo McColo UkrTeleGroup HostFresh Hosted by Customer All rights reserved to Security Art ltd. 2002-2010 41
  • 71. Iftach Ian Amit | April 2011 Russian Crime Government ESTDomains ESTDom RBN Atrivo McColo UkrTeleGroup HostFresh Hosted by Customer Network provider All rights reserved to Security Art ltd. 2002-2010 41
  • 72. Iftach Ian Amit | April 2011 Russian Crime Government ESTDomains ESTDom RBN Atrivo McColo UkrTeleGroup HostFresh Hosted by Customer Network provider All rights reserved to Security Art ltd. 2002-2010 41
  • 73. Iftach Ian Amit | April 2011 Remember Georgia? • Started by picking on the president... flood http www.president.gov.ge flood tcp www.president.gov.ge flood icmp www.president.gov.ge • Then the C&C used to control the botnet was shut down as: • Troops cross the border towards Georgia • A few days of silence... All rights reserved to Security Art ltd. 2002-2010 42
  • 74. Iftach Ian Amit | April 2011 Georgia - cont. All rights reserved to Security Art ltd. 2002-2010 43
  • 75. Iftach Ian Amit | April 2011 Georgia - cont. • Six (6) new C&C servers came up and drove attacks at additional Georgian sites www.president.gov.ge os-inform.com www.parliament.ge www.kasparov.ru apsny.ge hacking.ge mk.ru news.ge newstula.info tbilisiweb.info skandaly.ru newsgeorgia.ru All rights reserved to Security Art ltd. 2002-2010 43
  • 76. Iftach Ian Amit | April 2011 Georgia - cont. • Six (6) new C&C servers came up and drove attacks at additional Georgian sites www.president.gov.ge os-inform.com www.parliament.ge www.kasparov.ru apsny.ge hacking.ge mk.ru news.ge newstula.info tbilisiweb.info skandaly.ru newsgeorgia.ru • BUT - the same C&C’s were also used for attacks on commercial sites in order to extort them (botnet- for-hire) Additional sites attacked: •Porn sites •Carder forums •Adult escort services •Gambling sites •Nazi/Racist sites •Webmoney/Webgold/etc… All rights reserved to Security Art ltd. 2002-2010 43
  • 77. Iftach Ian Amit | April 2011 Georgia - cont. • Six (6) new C&C servers came up and drove attacks at additional Georgian sites www.president.gov.ge os-inform.com www.parliament.ge www.kasparov.ru apsny.ge hacking.ge mk.ru news.ge newstula.info tbilisiweb.info skandaly.ru newsgeorgia.ru • BUT - the same C&C’s were also used for attacks on commercial sites in order to extort them (botnet- for-hire) Additional sites attacked: •Porn sites •Carder forums •Adult escort services •Gambling sites •Nazi/Racist sites •Webmoney/Webgold/etc… All rights reserved to Security Art ltd. 2002-2010 43
  • 78. Iftach Ian Amit | April 2011 Georgia - cont. • Six (6) new C&C servers came up and drove attacks at additional Georgian sites www.president.gov.ge os-inform.com www.parliament.ge www.kasparov.ru apsny.ge hacking.ge mk.ru news.ge newstula.info tbilisiweb.info skandaly.ru newsgeorgia.ru • BUT - the same C&C’s were also used for attacks on commercial sites in order to extort them (botnet- for-hire) Additional sites attacked: •Porn sites •Carder forums •Adult escort services •Gambling sites •Nazi/Racist sites •Webmoney/Webgold/etc… BTW - Guess who were the owners of all the Georgian IPSs?(Russia) All rights reserved to Security Art ltd. 2002-2010 43
  • 79. Iftach Ian Amit | April 2011 Georgia - cont. All rights reserved to Security Art ltd. 2002-2010 44
  • 80. Iftach Ian Amit | April 2011 Georgia - cont. • Final nail in the coffin: All rights reserved to Security Art ltd. 2002-2010 44
  • 81. Iftach Ian Amit | April 2011 Georgia - cont. • Final nail in the coffin: • The city of Gori All rights reserved to Security Art ltd. 2002-2010 44
  • 82. Iftach Ian Amit | April 2011 Georgia - cont. • Final nail in the coffin: • The city of Gori • DDoS hits all municipal sites August 7th 2008 at 22:00 All rights reserved to Security Art ltd. 2002-2010 44
  • 83. Iftach Ian Amit | April 2011 Georgia - cont. • Final nail in the coffin: • The city of Gori • DDoS hits all municipal sites August 7th 2008 at 22:00 • Complete network disconnect of the district August 8th 06:00 All rights reserved to Security Art ltd. 2002-2010 44
  • 84. Iftach Ian Amit | April 2011 Georgia - cont. • Final nail in the coffin: • The city of Gori • DDoS hits all municipal sites August 7th 2008 at 22:00 • Complete network disconnect of the district August 8th 06:00 • First strike on city August 8th 07:30 All rights reserved to Security Art ltd. 2002-2010 44
  • 85. Iftach Ian Amit | April 2011 Georgia - cont. • Final nail in the coffin: • The city of Gori • DDoS hits all municipal sites August 7th 2008 at 22:00 • Complete network disconnect of the district August 8th 06:00 • First strike on city August 8th 07:30 All rights reserved to Security Art ltd. 2002-2010 44
  • 86. Iftach Ian Amit | April 2011 History - Revisited... Iran 2009 Twitter DNS hack attributed to Iranian activity. Political connections are too obvious to ignore (elections) Timing was right on: Protests by UN Council leadership opposition Decisions in Tehran All rights reserved to Security Art ltd. 2002-2010 45
  • 87. Iftach Ian Amit | April 2011 All rights reserved to Security Art ltd. 2002-2010 46
  • 88. Iftach Ian Amit | April 2011 All rights reserved to Security Art ltd. 2002-2010 46
  • 89. Iftach Ian Amit | April 2011 Iran-Twitter connecting dots • Twitter taken down December 18th 2009 • Attack attributed eventually to cyber-crime/ vigilante group named “Iranian Cyber Army” • Until December 2009 there was no group known as “Iranian Cyber Army”... • BUT - “Ashiyane” (Shiite group) is from the same place as the “Iranian Cyber Army” All rights reserved to Security Art ltd. 2002-2010 47
  • 90. Iftach Ian Amit | April 2011 All rights reserved to Security Art ltd. 2002-2010 48
  • 91. Iftach Ian Amit | April 2011 All rights reserved to Security Art ltd. 2002-2010 48
  • 92. Iftach Ian Amit | April 2011 Iran-Twitter - Ashiyane • Ashiyane was using the same pro-Hezbolla messages that were used on the Twitter attack with their own attacks for some time... • AND the “Iranian Cyber Army” seems to be a pretty active group on the Ashiyane forums www.ashiyane.com/forum Let’s take a look at how Ashiyane operates... All rights reserved to Security Art ltd. 2002-2010 49
  • 93. Iftach Ian Amit | April 2011 On [Crime|War] training Ashiyane forums WarGames All rights reserved to Security Art ltd. 2002-2010 50
  • 94. Iftach Ian Amit | April 2011 On [Crime|War] training Ashiyane forums WarGames All rights reserved to Security Art ltd. 2002-2010 50
  • 95. Iftach Ian Amit | April 2011 On [Crime|War] training Ashiyane forums WarGames All rights reserved to Security Art ltd. 2002-2010 50
  • 96. Iftach Ian Amit | April 2011 Wargames targets includes: All rights reserved to Security Art ltd. 2002-2010 51
  • 97. Iftach Ian Amit | April 2011 Back to [Crime|War] Links: What else happened on the 18th? All rights reserved to Security Art ltd. 2002-2010 52
  • 98. Iftach Ian Amit | April 2011 Back to [Crime|War] Links: What else happened on the 18th? All rights reserved to Security Art ltd. 2002-2010 52
  • 99. Iftach Ian Amit | April 2011 Back to [Crime|War] Links: What else happened on the 18th? All rights reserved to Security Art ltd. 2002-2010 52
  • 100. Iftach Ian Amit | April 2011 Back to [Crime|War] Links: What else happened on the 18th? All rights reserved to Security Art ltd. 2002-2010 52
  • 101. Iftach Ian Amit | April 2011 Back to [Crime|War] Links: What else happened on the 18th? Later on - Baidu takedown with the same MO (credentials) All rights reserved to Security Art ltd. 2002-2010 52
  • 102. Iftach Ian Amit | April 2011 Mapping Iran’s [Crime|War] Ashiyane All rights reserved to Security Art ltd. 2002-2010 53
  • 103. Iftach Ian Amit | April 2011 Mapping Iran’s [Crime|War] Site DDoS Defacement Ashiyane Botnet Credit Herding Card Theft All rights reserved to Security Art ltd. 2002-2010 53
  • 104. Iftach Ian Amit | April 2011 Mapping Iran’s [Crime|War] Iran US Iraq Site DDoS Defacement Ashiyane Botnet Credit Herding Card Theft $$ UK All rights reserved to Security Art ltd. 2002-2010 53
  • 105. Iftach Ian Amit | April 2011 Mapping Iran’s [Crime|War] Iran US Iraq Site DDoS Defacement Ashiyane Botnet Credit Herding Card Theft $$ UK Iranian Cyber All rights reserved to Security Art ltd. 2002-2010 53
  • 106. Iftach Ian Amit | April 2011 Mapping Iran’s [Crime|War] Iran US Iraq Site DDoS Defacement Ashiyane Botnet Credit Herding Card Theft $$ UK Iranian Strategic Cyber Attacks All rights reserved to Security Art ltd. 2002-2010 53
  • 107. Iftach Ian Amit | April 2011 Mapping Iran’s [Crime|War] Iran US Iraq Site DDoS Defacement Ashiyane Botnet Credit Herding Card Theft $$ UK Iranian Strategic Cyber Attacks US CN All rights reserved to Security Art ltd. 2002-2010 53
  • 108. Iftach Ian Amit | April 2011 Mapping Iran’s [Crime|War] Iran US Iraq Site DDoS Defacement Ashiyane Botnet Credit Herding Card Theft $$ UK Crime War Iranian Strategic Cyber Attacks US CN All rights reserved to Security Art ltd. 2002-2010 53
  • 109. Iftach Ian Amit | April 2011 Mapping Iran’s [Crime|War] Iran US Iraq Site DDoS Defacement Ashiyane Botnet Credit Herding Card Theft $$ UK Crime War Iranian Strategic Cyber Attacks US CN All rights reserved to Security Art ltd. 2002-2010 53
  • 110. Iftach Ian Amit | April 2011 Iran - the unspoken All rights reserved to Security Art ltd. 2002-2010 54
  • 111. Iftach Ian Amit | April 2011 Iran - the unspoken • Stuxnet All rights reserved to Security Art ltd. 2002-2010 54
  • 112. Iftach Ian Amit | April 2011 Iran - the unspoken • Stuxnet • There, I’ve said it All rights reserved to Security Art ltd. 2002-2010 54
  • 113. Iftach Ian Amit | April 2011 History - Revisited... China • Great Chinese Firewall doing an OK job in keeping information out. • Proving grounds for many cyber-attackers • Bulletpfoof hosting (after RBN temporary closure in 2008 China provided an alternative that stayed...) All rights reserved to Security Art ltd. 2002-2010 55
  • 114. Iftach Ian Amit | April 2011 China ...connecting the dots January 12th - Google announces it was hacked by China Not as in the “we lost a few minutes of DNS” hacked... “In mid-December we detected a highly sophisticated and targeted attack on our corporate infrastructure originating from China that resulted in the theft of intellectual property from Google” (David Drummond, SVP @Google) All rights reserved to Security Art ltd. 2002-2010 56
  • 115. Iftach Ian Amit | April 2011 China ...connecting the dots. January 12th - Adobe gets hacked. By China. “Adobe became aware on January 2, 2010 of a computer secur ity incident involving a sophisticated coordinated attack against corporate network systems managed by Adobe and other companies” (Adobe official blog) Same MO: 0-day in Internet Explorer to get into Google, Adobe and more than 40 additional companies All rights reserved to Security Art ltd. 2002-2010 57
  • 116. Iftach Ian Amit | April 2011 China ...connecting the dots... Problem: Attacks all carry the signs of Cybercrime... Criminal groups attack companies in order to get to their data so they can sell it (whether it was commercial or government data!) US Response: “We look to the Chinese government for an explanation. The ability to operate with confidence in cyberspace is critical in a modern society and economy.” (Hillary Clinton, Secretary of State) All rights reserved to Security Art ltd. 2002-2010 58
  • 117. Iftach Ian Amit | April 2011 China ...connecting the dots.... All rights reserved to Security Art ltd. 2002-2010 59
  • 118. Iftach Ian Amit | April 2011 China ...connecting the dots.... The China move: All rights reserved to Security Art ltd. 2002-2010 59
  • 119. Iftach Ian Amit | April 2011 China ...connecting the dots.... The China move: Use of criminal groups to carry out the attacks provides the perfect deniability on espionage connections (just like in the past, and a perfect response to clinton). All rights reserved to Security Art ltd. 2002-2010 59
  • 120. Iftach Ian Amit | April 2011 Anecdote - a professor in one of the China ... universities linked to the attack connecting the dots.... admitted that the school network is often used to anonymously The China move: relay attacks Use of criminal groups to carry out the attacks provides the perfect deniability on espionage connections (just like in the past, and a perfect response to clinton). All rights reserved to Security Art ltd. 2002-2010 59
  • 121. Iftach Ian Amit | April 2011 Anecdote - a professor in one of the China ... universities linked to the attack connecting the dots.... admitted that the school network is often used to anonymously The China move: relay attacks Use of criminal groups to carry out the attacks provides the perfect deniability on espionage connections (just like in the past, and a perfect response to clinton). Targets are major US companies with strategic poise to enable state interest espionage All rights reserved to Security Art ltd. 2002-2010 59
  • 122. Iftach Ian Amit | April 2011 Anecdote - a professor in one of the China ... universities linked to the attack connecting the dots.... admitted that the school network is often used to anonymously The China move: relay attacks Use of criminal groups to carry out the attacks provides the perfect deniability on espionage connections (just like in the past, and a perfect response to clinton). Targets are major US companies with strategic poise to enable state interest espionage Information sharing at its best: State Crime All rights reserved to Security Art ltd. 2002-2010 59
  • 123. Iftach Ian Amit | April 2011 Anecdote - a professor in one of the China ... universities linked to the attack connecting the dots.... admitted that the school network is often used to anonymously The China move: relay attacks Use of criminal groups to carry out the attacks provides the perfect deniability on espionage connections (just like in the past, and a perfect response to clinton). Targets are major US companies with strategic poise to enable state interest espionage Information sharing at its best: State Crime All rights reserved to Security Art ltd. 2002-2010 Win59 - Win
  • 124. Iftach Ian Amit | April 2011 History - Revisited... Spain • You are on the map as well! - MARIPOSA • Highly respected 12M bots run by Spanish ringleaders • Slovenian source (developer) • Global distribution • Surprise... very painful to some governments... All rights reserved to Security Art ltd. 2002-2010 60
  • 125. Iftach Ian Amit | April 2011 Spain ...connecting the dots 3 People arrested by the Spanish Civil Guard in February 2010 Florencio Carro Ruiz (netkairo), Jonathan Pazos Rivera (jonylolente), and Juan Jose Bellido Rios (ostiator) == DDP (Dias de Pesadilla) All rights reserved to Security Art ltd. 2002-2010 61
  • 126. Iftach Ian Amit | April 2011 Spain ...connecting the dots On July 2010, Slovenian police arrested their “source” (iserdo) who sold the kit to hundreds of additional individuals and governments The FBI called the Slovenian operation “excellent” and “unparalleled” ?!?! All rights reserved to Security Art ltd. 2002-2010 62
  • 127. Iftach Ian Amit | April 2011 Spain ...connecting the dots....? All rights reserved to Security Art ltd. 2002-2010 63
  • 128. Iftach Ian Amit | April 2011 Spain ...connecting the dots....? Closure is still far on this one :-( All rights reserved to Security Art ltd. 2002-2010 63
  • 129. Iftach Ian Amit | April 2011 Spain ...connecting the dots....? Closure is still far on this one :-( Several more governments are involved, and additional “clients” of Isedro (the savior in Slovenian when spelled backwards) are part of open intelligence cases. All rights reserved to Security Art ltd. 2002-2010 63
  • 130. Iftach Ian Amit | April 2011 How does APT fit here? RSA • Infection vector: Flash vulnerability exploited through Excel file • Persistence: Using Poison Ivy as the trojan • Exfiltration: Pack data in password protected RAR files and upload to FTP All rights reserved to Security Art ltd. 2002-2010 64
  • 131. Iftach Ian Amit | April 2011 APT ...connecting the dots Compared to what we just reviewed, that was a SIMPLE attack... Trojan is not even a “commercial” product (free download at http://www.poisonivy-rat.com/) All rights reserved to Security Art ltd. 2002-2010 65
  • 132. Iftach Ian Amit | April 2011 APT ...connecting the dots....? All rights reserved to Security Art ltd. 2002-2010 66
  • 133. Iftach Ian Amit | April 2011 APT ...connecting the dots....? Infiltration Social/ physical Phishing All rights reserved to Security Art ltd. 2002-2010 66
  • 134. Iftach Ian Amit | April 2011 APT ...connecting the dots....? Persistence, Infiltration C&C Social/ Advanced C&C (p2p, lateral move) physical Simple C&C Phishing (HTTP) All rights reserved to Security Art ltd. 2002-2010 66
  • 135. Iftach Ian Amit | April 2011 APT ...connecting the dots....? Persistence, Infiltration Exfiltration C&C Social/ Advanced C&C Advanced APT (p2p, lateral move) exfil (dns,VoIP) physical Simple C&C Simple exfil APT?! Phishing (HTTP) (FTP) All rights reserved to Security Art ltd. 2002-2010 66
  • 136. Iftach Ian Amit | April 2011 APT ...connecting the dots....? Persistence, Infiltration Exfiltration C&C Social/ Advanced C&C Advanced APT (p2p, lateral move) exfil (dns,VoIP) physical Simple C&C Simple exfil APT?! Phishing (HTTP) (FTP) Bottom line: Not a direct state attack - Criminals again... All rights reserved to Security Art ltd. 2002-2010 66
  • 137. Iftach Ian Amit | April 2011 The Future (Ilustrated) All rights reserved to Security Art ltd. 2002-2010 67
  • 138. Iftach Ian Amit | April 2011 The Future (Ilustrated) All rights reserved to Security Art ltd. 2002-2010 67
  • 139. Iftach Ian Amit | April 2011 The Future (Ilustrated) All rights reserved to Security Art ltd. 2002-2010 67
  • 140. Iftach Ian Amit | April 2011 The Future (Ilustrated) All rights reserved to Security Art ltd. 2002-2010 67
  • 141. Iftach Ian Amit | April 2011 The Future (Ilustrated) All rights reserved to Security Art ltd. 2002-2010 67
  • 142. Iftach Ian Amit | April 2011 The Future (Ilustrated) All rights reserved to Security Art ltd. 2002-2010 67
  • 143. Iftach Ian Amit | April 2011 The Future (Ilustrated) All rights reserved to Security Art ltd. 2002-2010 67
  • 144. Iftach Ian Amit | April 2011 The Future (Ilustrated) CLOUDS All rights reserved to Security Art ltd. 2002-2010 67
  • 145. Iftach Ian Amit | April 2011 Summary Good Bad Formal training on Commercial cybersecurity by development of nations malware still reigns All rights reserved to Security Art ltd. 2002-2010 68
  • 146. Iftach Ian Amit | April 2011 Summary Good Bad Formal training on Commercial cybersecurity by development of nations malware still reigns Ugly Good meet Bad: money changes hands, less tracks to cover, criminal ops already creating the weapons... All rights reserved to Security Art ltd. 2002-2010 68
  • 147. Iftach Ian Amit | April 2011 Summary The Future Lack of legislation and cooperation on multi- national level is creating de-facto “safe haven” for cybercrime. <- Fix this! Treaties and anti-crime activities may prove to be beneficial. <- Translate to politics/law! All rights reserved to Security Art ltd. 2002-2010 69
  • 148. Iftach Ian Amit | April 2011 Thanks! Q&A iamit@iamit.org pro: iamit@security-art.com twitter: twitter.com/iiamit blog: iamit.org/blog All rights reserved to Security Art ltd. 2002-2010 70