Hans Lammerant (Vredesactie) on Fri, 18 Mar 2011 03:25:45 +0100 (CET)


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

<nettime> Lessons from Anonymous on cyberwar


Hello,

this piece on Al Jazeera will probably also interest this mailinglist.


http://english.aljazeera.net/indepth/opinion/2011/03/20113981026464808.html

Lessons from Anonymous on cyberwar

A cyberwar is brewing, and Anonymous reprisal attacks on HBGary Federal
shows how deep the war goes.

Haroon Meer


"Cyberwar" is a heavily loaded term, which conjures up Hollywood
inspired images of hackers causing oil refineries to explode.

Some security celebrities came out very strongly against the thought of
it, claiming that cyberwar was less science, and more science fiction.

Last year on May 21, the United States Cyber Command (USCYBERCOM)
reported reaching initial operational capability, and news stories
abound of US soldiers undergoing basic cyber training
<http://iclass.eccouncil.org/index.php?option=com_content&view=article&id=118&Itemid=144>,
which all point to the idea that traditional super powers are starting
to explore this arena.

Recent activities with one government contractor and Anonymous, however,
show clearly that cyber operations have been going on for a long while,
and that the private sector has been only too ready to fill the cyber
mercenary role for piles of cash.

*Anonymous vs. HBGary*

Early in 2011, Aaron Barr submitted a talk to a security conference in
which he planned to "focus on outing the major players of the anonymous
group".

Barr, the CEO of Washington-based HBGary Federal, had spent time
"infiltrating the group" using multiple identities on social networks
and Anonymous IRC channels.

He was confident enough of his analysis to publish parts of it through
the Financial Times
<http://www.ft.com/cms/s/0/87dc140e-3099-11e0-9de3-00144feabdc0.html#axzz1DWB0kKHq>.
Barr (and indeed the rest of the company) planned to milk the exposure,
lining up a string of meetings to profit from the research, from an
interview with /60 Minutes/ to multiple potential deals with federal
agencies.

The CEO of HBGary prepared a post explaining
<http://hbgary.anonleaks.ch/aaron_hbgary_com/4518.html> how they had
flexed their "muscle today by revealing the identities of all the top
management within the group Anonymous."

Anonymous were quick to respond.

Even while Barr was proclaiming victory and threatening to "take the
gloves off", Anonymous were burrowing deeper into his network
<http://arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars>.

By the end of the attack, Barr's iPad was reputedly erased, his LinkedIn
and Twitter accounts were hijacked, the HBGary Federal website was
defaced, proprietary HBGary source code was stolen and with over 71,000
private emails now published to the internet, HBGary was laid bare.

In this, was our first lesson: The asymmetry of cyber warfare.

HBGary, a well-funded, pedigreed security company with strong offensive
cyber capabilities was given a beating by a non-funded, loosely
organised hacker collective.

The incident holds a string of lessons for those wishing to secure their
networks from attack, but what's far more interesting is the leaked
emails that give us insight into the murky world of "cyber contractors"
and what???s being called "the military digital complex". 

*HBGary: cyberwar arms dealer*

HBGary was formed by security research veteran Greg Hoglund, who has
made a name for himself over the years doing research on rootkit technology.

A rootkit is a piece of software installed to ensure that an attacker is
able to maintain control of a compromised computer. Rootkits are
designed to avoid detection once installed.

Hoglund???s emails claim that his current products were built with "about
2 million in Uncle Sam's money", but this alone is no shocker.
Governments fund technology research all the time, and HBGary were also
building a commercial product.

What is shocking though, are some of the other details that came out in
the wash.

The emails make it clear that HBGary sold rootkits and keyloggers
<http://hbgary.anonleaks.ch/ted_hbgary_com/7838.html> (tools to record
and exfiltrate keystrokes surreptitiously) to government contractors for
prices between $60,000 and $200,000 each.

These pieces of "malware" would be tailored specifically to the clients
needs, which undoubtedly reflected the state of the ultimate targets
e.g.: "..test the tool against McAfee and Norton".

Some rootkits were fairly routine, while others clearly betrayed
specific needs: "Runs on MS Windows XP sp2 and Office 2003, finds MS
Office files using the XRK technique to exfiltrate files".

Even next generation rootkits were explored - to remain active despite
the removal of a hard drive or to persist on a machine through the video
card.

Make no mistake, these were offensive cyber tools, made to order.

*0day exploits*

Rootkits allow you to maintain control of a compromised machine, but one
would still need an initial compromise vector.

Once again, the mail archives deliver: HBGary sales personnel can be
seen making reference to "Juicy Fruit", their internal name for HBGary
supplied 0day exploits.

0day refers to exploits that are currently unknown to the software
vendor, making defence against 0day attacks sometimes impossible.

One email lists their 0day arsenal, which included attacks against Adobe
Flash, Windows 2003, Sun Java and a host of other products.

The emails even differentiate between exploits that have been sold to a
customer and those that are still exclusive.

Other emails include discussions on selling back-doored software to
foreign governments and plans to create
<http://hbgary.anonleaks.ch/aaron_hbgary_com/15656.html> "themes for
video games and movies appropriate for Middle East & Asia. These theme
packs would contain back doors."

Clearly cyber attacks against foreign nationals appear to be fair game.

If the ethical line on such matters was slightly blurry, the line was
completely obliterated with plans to combat WikiLeaks by targeting
supporters of the cause:


>From - Tue Feb 08 09:06:48 2011

Subject: Re: first cut
From: Aaron Barr <aaron@hbgary.com <mailto:aaron@hbgary.com>>
Date: Fri, 3 Dec 2010 08:32:12 -0500
Cc: Eli Bingham <ebingham@palantir.com <mailto:ebingham@palantir.com>>,
BERICO-Sam.Kremin <skremin@bericotechnologies.com
<mailto:skremin@bericotechnologies.com>>
To: Matthew Steckman <msteckman@palantir.com
<mailto:msteckman@palantir.com>>

One other thing.  I think we need to highlight people like Glenn
Greenwald.  Glenn was critical in the Amazon to OVH transition and
helped wikileaks provide access to information during the transition.
It is this level of support we need to attack.  These are established
proffessionals that have a liberal bent, but ultimately most of them if
pushed will choose professional preservation over cause, such is the
mentality of most business professionals.  Without the support of people
like Glenn wikileaks would fold.
Aaron

/(Subsequent emails show that the project to target WikiLeaks was to be
sold for $2 million dollars.)/

*Maybe HBGary was an outlier?*

At this point we could make the jump that HBGary was a single bad apple,
operating on the other side of the ethical line all on its own, but we
would be wrong.

The email above indicates that the project to discredit WikiLeaks (and
their supporters) was a joint operation by HBGary Federal, Palantir and
BericoTechnologies, although the other companies involved were quick to
distance themselves from HBGary after the Anonymous hack.

Endgame Systems, a company with almost no public footprint were also
thrust into the spotlight, when several of their previously well-guarded
reports and company presentations were shared amongst the emails.

In an early email to Aaron Barr
<http://hbgary.anonleaks.ch/aaron_hbgary_com/5686.html>, Endgame Systems
made it clear that they had "been very careful NOT to have public face
on our company". The CEO of Endgame Systems was clear: "Please let
HBgary know we don't ever want to see our name in a press release."

So what exactly do the secretive Endgame Systems do? The company started
by ex ISS and CIA executives promises (in private) "to provide our
customers with the highest quality offensive CNA/CNE (Computer Network
Attack/Computer Network Exploitation) software in the world".

Their overview makes it clear
<http://hbgary.anonleaks.ch/greg_hbgary_com/25501.html> that they serve
"the special requirements of the United States DoD and Intelligence
Community".

Their leaked PowerPoint deck advertises subscriptions of $2,500,000 per
year <http://hbgary.anonleaks.ch/greg_hbgary_com/attachments/629.pdf>
for access to 0day exploits, with slightly more affordable "intelligence
feeds" effectively selling information on vulnerable servers by
geographic region.

With a single report (and a big enough chequebook) you can find out all
the servers vulnerable to attack in the Venezuelan government, along
with the software required to exploit them. [Downloadable file
<http://cryptome.org/0003/hbg/HBG-VE-IR.zip>]

Even just the CV's sent to HBGary for job applications turned out to be
instructive, revealing details that are not often circulated in the
public arena.

One candidate had "managed team of 15 persons, responsible for
coordinating offensive computer network operations for the United States
Department of Defense and other federal agencies."

Clearly offensive cyber operations far predate the 2009 founding of
USCYBERCOM.

The email conversations make clear what many have known, that offensive
cyber operations against individuals and nation states have been going
on for a long, long time.

Experts who claim otherwise are misinformed at best, or actively
spreading misinformation at worst. When it comes to cyberwar, the matter
is best handled by William Gibson's famous quote: "The future is already
here - it's just not very evenly distributed."

*/Haroon Meer is the founder of Thinkst <http://thinkst.com>, an applied
research company with a deep focus on information security. He has
contributed to several books on information security and has presented
research at industry and academic conferences around the world./*


#  distributed via <nettime>: no commercial use without permission
#  <nettime>  is a moderated mailing list for net criticism,
#  collaborative text filtering and cultural politics of the nets
#  more info: http://mail.kein.org/mailman/listinfo/nettime-l
#  archive: http://www.nettime.org contact: nettime@kein.org