810 likes | 1.02k Vues
Geolocation In Cyberwar. Commander Mukesh Saini ( Retd .) Vice President –IT Security. Cyber wars are politico-military matter & its nature is similar to Naval warfare. TALLINN MANUAL ON THE INTERNATIONAL LAW APPLICABLE TO CYBERWARFARE.
E N D
Geolocation In Cyberwar Commander Mukesh Saini (Retd.) Vice President –IT Security
Cyber wars are politico-military matter & its nature is similar to Naval warfare
TALLINN MANUAL ON THE INTERNATIONAL LAW APPLICABLE TO CYBERWARFARE
Rule 11-Definition of Use of Force. A cyber operation constitutes a use of force when its scale and effects are comparable to non-cyber operations rising to the level of a use of force. Rule 30-Definition of Cyber Attack. A cyber attack is a cyber operation, whether offensive or defensive, that is reasonably expected to cause injury or death to persons or damage or destruction to objects.
Rule 2-Jurisdiction : Without prejudice to applicable international obligations a State may exercise its jurisdiction: • over persons engaged in cyber activities on its territory; • over cyber infrastructure located on its territory; and • Extraterritorially, in accordance with international law.
Rule 21-Geographical Limitations. Cyber operations are subject to geographical limitations imposed by the relevant provisions of international law applicable during an armed conflict.
Apps Apps
Agent communicate with Absolute Monitoring Centre at regular interval -or- -or- (from OS) MISSING MISSING MISSING Reinstalled Reinstalled Reinstalled Persistent Module installed in BIOS / Firmware (Non-removable part of BIOS) Self-healing capability repair the Persistent Module in case BIOS flashed!!
This is How actual Recovery process works: Once Computer Agent installed & Computer Stolen Owner contact Absolute Software Absolute Software coordinate with Law Enforcement Agency to recover Stolen Laptop Location of Stolen Laptop identified by (IP Address, Region) Absolute Theft Recovery Team remotely communicate with stolen Laptop once online
Computrace partners Computrace partnered with mentioned firm to embed Computrace-agent-module in firmware of their machines
Hardware backdoors are lethal, because: • They can be injected at manufacturing time • (without your knowledge) • They are small & stealth • (requires less than 200kb of disc space & bandwidth) • They can’t be removed by any known means • (formatting/OS reinstallation/AV/HDD replacement) • They can circumvent other types of security • (because of a trusted, small, stealthy & persistent module) Hardware backdoor is no more an imagination, its practical
Hardware backdoor is no more an imagination, it’s practical Schneier: possible backdoor in IPMI, iDRAC, IMM2, iLO Click image to read paper
Hardware backdoor is no more an imagination, it’s practical Click image to read main article Captured Intel Drone – An American Intelligence Disaster? “In the case of the stolen CIA drone, the hardware with the backdoor was most likely embedded within the telemetry system, which is the multi-function brain of the drone, in fact every system within the drone is routed through the telemetry system, every sensor, every control, everything” “Once that hardware is triggered it is programmed to change the all the other frequencies used to control the secret drone and allow the Iranians to take total and complete control.”
What if Computrace like technology misused? • Can become a perfect backdoor • Persistent • Stealthy • Portable (hardcoded in motherboard) • Remote Access & Remote update • No platform dependency • Non-detectable by AV consider the impact of a compromised device in a military environment, or in a massive distribution of technological systems of large diffusion.
Realistic Attack Scenario what if someone hardcoded this type of backdoor in a motherboard and put it up for sell
Realistic Attack Scenario or what if a nation state / government make use of this technology to access your private information
Source : Rayn Mayer http://www.youtube.com/watch?v=scNkLWV7jSw
State Sponsored Multi-disciplinary groups of work force Knowledge of deep internals of PLC Specific Target Knowledge of personnel behavior of target Use of score of zero-day vulnerability at one go Use of Authentic (stolen) Digital Signatures Against a specific state
Stuxnet Geographical Distribution Source : Symantec Security Response
Stuxnet & family Source : http://www.securelist.com/en/analysis/204792257/Kaspersky_Security_Bulletin_2012_Cyber_Weapons on 10 April 2013
Operation Orchard 6th September 2007 Israel's 2007 bombing of an alleged atomic reactor in Syria was preceded by a cyber attack which neutralized ground radars and anti-aircraft batteries.
255 Kms 145 Kms
Key Findings • APT1 is believed to be the 2nd Bureau of the People’s Liberation Army (PLA) General Staff Department’s (GSD) 3rd Department (总参三部二局), which is most commonly known by its Military Unit Cover Designator (MUCD) as Unit 61398 (61398部队). • APT1 has systematically stolen hundreds of terabytes of data from at least 141 organizations, and has demonstrated the capability and intent to steal from dozens of organizations simultaneously. • APT1 focuses on compromising organizations across a broad range of industries in English-speaking • Countries.
Key Findings • In over 97% of the 1,905 times Mandiant observed APT1 intruders connecting to their attack infrastructure, APT1 used IP addresses registered in Shanghai and systems set to use the Simplified Chinese language. • The size of APT1’s infrastructure implies a large organization with at least dozens, but potentially hundreds of human operators.
OPERATION HANGOVER The name, “Operation Hangover”, was derived from the name of one of the most frequently used malwares. The project debug path is often visible inside executable files belonging to this family.