Raoul Chiesa CYBER
Raoul Chiesa CYBER
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 2
Agenda
Agenda
Introductions
The scenarios and the Actors
Profiling «Hackers»
Information Warfare
Cyber Espionage case study
Conclusions
References, Q&A
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 3
Introductions
The Speaker
President, Founder, Security Brokers
Principal, CyberDefcon Ltd.
Independent Senior Advisor on Cybercrime @ UNICRI (United Nations Interregional
Crime & Justice Research Institute)
Former PSG Member (2010-2012 / 2013.2015) @ ENISA (Permanent
Stakeholders Group @ European Union Network & Information Security
Agency)
Founder, Board of Directors and Technical Commitee Member @ CLUSIT
(Italian Information Security Association)
Steering Committee, AIP/OPSI, Privacy & Security Observatory
Former Member, Co-coordinator of the WG «Cyber World» @ Italian MoD
Cultural Attachè, APWG European Chapter (APWG.EU)
Board of Directors, ISECOM
Board of Directors, OWASP Italian Chapter
Supporter at various security communities
The Security Brokers
We deal with extremely interesting, niche topics, giving our strong know-hows gained from +20
years of field experience and from our +30 experts, very well known all over the world in
the’Information Security and Cyber Intelligence markets.
Our Key Areas of services can be resumed as:
Proactive Security
With a deep specialization on TLC & Mobile, SCADA & IA, ICN & Trasportation, Space &
Air, Social Networks, e-health, […]
Post-Incident
Attacker’s profiling, Digital Forensics (Host, Network, Mobile, GPS, etc..), Trainings
Cyber Security Strategic Consulting (Technical, Legal, Compliance, PR, Strategy)
On-demand «Ninja Teams»
Security Incident PR Handling & Management
Psychological, Social and Behavioural aspects (applied to cyber environments)
Cybercrime Intelligence
Botnet takeovers, takedowns, Cybercriminals bounting, Cyber Intelligence Reports,
Technical & Operational support towards CERTs and LEAs/LEOs,[…]
Information Warfare & Cyber War (only for MoDs & Intelligence Agencies)
Specialized Trainings, Attack&Defense Labs, more…
0-day and Exploits – Digital Weapons
OSINT
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 6
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 7
Terminologies!
This is not enough, tough: in the last years a new trend come out,
which is adding the prefix “cyber” to most of the terms.
Nevertheless, a lot of (huge) doubts still persist, even in your own
national language!
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 8
No common spelling…
„Cybersecurity, Cyber-security, Cyber Security ?”
No common definitions…
Cybercrime is…?
No clear actors…
Cyber – Crime/war/terrorism ?
No common components?…
In those non English-speaking countries, problems with correctly
understanding words and terms rise up.
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 9
The scenario(s) and the Actors
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 10
Crime -> Today
• Simply put, this happens because the “information” can be transformed at once
into “something else”:
1. Competitive advantage
2. Sensible/critical information (blackmailing)
3. Money
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 11
Cybercrime
Cybercrime:
“The use of IT tools and telecommunication networks
in order to commit crimes in different manners”.
The axiom of the whole model:
“acquiring different types of data (information),
which can be transformed into money.”
Key points:
Virtual (pyramidal approach, anonimity, C&C, flexible and scalable, moving quickly
and rebuilding fast, use of “cross” products and services in different scenarios and
different business models)
Transnational
Multi-market (buyers)
Differentiating products and services
Low “entry-fee”
ROI /Return of Investment (on each single operation, which means that,
exponentially, it can be industrialized)
Tax & (cyber) Law heaven
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 12
Why?
“2013 Cybercrime financial turnover apparently
scored up more than Drugs dealing, Human
Trafficking and Weapons Trafficking turnovers”
of the top
four economic
crimes»
PriceWaterhouseCoopers LLC
Global Economic Crime
Survey 2011
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 13
From Cybercrime to…
We are speaking about an ecosystem which is very often
underevaluated: most of times, Cybercrime is the starting or transit
point towards different ecosystems:
Information Warfare
Black Ops
Cyber Espionage
Hacktivism
(private) Cyber Armies
Underground Economy and Black/Grey Markets
Organized Crime
Carders
Botnet owners
0days
Malware factories (APTs, code writing outsourcing)
Lonely wolves
“cyber”-Mercenaries
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 14
Profiling Actors
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 15
New Actors joined in
• Cybercrime and Information Warfare have a very wide spectrum
of action and use intrusion techniques which are nowadays,
somehow, available to a growing amount of Actors, which use
them in order to accomplish different goals, with approaches and
intensity which may deeply vary.
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 16
The worldWorld
is changing… (?)
→ Geopolitical shift : 2013 - Map of ITU Dubai General Assembly December (red=not signed; black=signed)
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 18
HPP V1.0
• Back in 2004 we launched the Hacker’s
Profiling Project - HPP:
http://www.unicri.it/special_topics/cyber_threats/
• Since that year:
– +1.200 questionnaires collected & analyzed
– 9 Hackers profiles emerged
– Two books (one in English)
• Profilo Hacker, Apogeo, 2007
• Profiling Hackers: the Science of Criminal Profiling as
Applied to the World of Hacking, Taylor&Francis
Group, CRC Press (2009)
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 19
Evaluation & Correlation standards
Lone hacker or as a
member of a group Principles of the hacker's ethics
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 20
The scenario
• Everything «evolved», somehow…
• Here’s what the United Nations says (Hacker’s Profiling Project):
OFFENDER ID LONE / GROUP HACKER TARGET MOTIVATIONS /
PURPOSES
Wanna Be Lamer 9-16 years GROUP End-User For fashion, It’s “cool” => to
“I would like to be a hacker, boast and brag
but I can’t”
Script Kiddie 10-18 years GROUP: but they act alone SME / Specific security flaws To give vent of their anger /
The script boy attract mass-media attention
Ethical Hacker 15-50 years LONE / Vendor / Technology For curiosity (to learn) and
The “ethical” hacker’s world GROUP (only for fun) altruistic purposes
Quiet, Paranoid, Skilled 16-40 years LONE On necessity For curiosity (to learn) =>
Hacker The very specialized and egoistic purposes
paranoid attacker
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 21
HPP V2.0: what happened?
• VERY simple:
• Lack of funding: for phases 3&4 we need support!
– HW, SW, Analysts, Translators
• We started back in 2004: «romantic hackers», + we
foreseen those «new» actors tough: .GOV, .MIL,
Intelligence.
• We missed out:
– Hacktivism (!);
– Cybercriminals out of the «hobbystic» approach;
– OC;
– The financial aspects (Follow the Money!!);
– Cyberterrorists (do they really exist?)
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 22
Information Warfare (Cyberwar?)
and the evolution
of the 0-days market
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 23
WTF…
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 24
The DUMA knew it, long time ago….
"In the very near future many conflicts will not take place on the
open field of battle, but rather in spaces on the Internet, fought
with the aid of information soldiers, that is hackers.
This means that a small force of hackers is stronger than the
multi-thousand force of the current armed forces.“
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 25
Hackers as a National Resource?
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 26
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 27
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 28
Making “Cyber War”…
• „dummy list“ of „ID-10T“ for phishing
• equipment to mimic target network • background info on organisation (orgchart etc.)
• dummy run on similar network • Primer for sector-specific social-engineering
• sandbox zerodays • proxy servers
• banking arrangements
• purchase attack-kits
• rent botnets
• find (trade!) good C&C server
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 29
Mistyping may lead to (very) different
scenarios…
b) The attack is conducted by the proxy network itself without consent of Country A
(Cyberterrorism)
c) The attack is conducted by a Country C who has hijacked the proxy network? (False Flag
Cyberwar)
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 30
Back in 2005
Vodafone Greece 2004 (“The The illegally wiretapped cellphones in the Athens
Athens affair”) affair included those of the prime minister, his
defense and foreign affairs ministers, top military
Rootkit on MSC Ericsson AXE and law enforcement officials, the Greek EU
commissioner, activists, and journalists.
Inbound and Outbound Voice
calls, SMS in/out, forwarded to
14 “pay-as-you-go” SIM cards
(anonymous ones)
Olympic Games
14 DEC 2007: Vodafone GR
fined with 76M€
http://spectrum.ieee.org/telecom/sec
urity/the-athens-affair
http://en.wikipedia.org/wiki/Greek_tel
ephone_tapping_case_2004-2005
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 31
Ahhhhh…. now I get it!
PRISM and other secret project’s scandals
(“the Snowden case”)
NSA’s budgets for black operations revealed
http://rt.com/usa/snowden-leak-black-budget-176/
http://rt.com/usa/us-hacking-exploits-millions-104/
http://www.lemonde.fr/technologies/visuel/2013/08/27/plon
gee-dans-la-pieuvre-de-la-cybersurveillance-de-la-
nsa_3467057_651865.html
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 32
Will this ever end up?
Costas Tsalikidis,
Network Planning Manager,
Vodafone-Panafon
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 33
Budgets, Black Ops
NSA «black-ops Budget» exposed
NSA’s “black budget”: 652M$ (2011)
231 black operations known as of today (2011)
16 US agencies involved from the US Intelligence community (107.035
employees)
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 37
The «last» one
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 38
The on-going one…
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 39
And the Police, too!
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 40
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 41
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 42
Finfisher
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 43
Global, dirty business
• “Mass interception of entire populations is not
only a reality, it is a secret new industry
spanning 25 countries.”
• “It's estimated that the global computer
surveillance technology market is worth $5
billion a year.”
– ITALY: >300M/year
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 44
Who do you wanna sell (your 0days) to?
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 45
The pricing debate
• What about this? (CHEAP but LAME, India’s ones)
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 46
The pricing debate
http://www.theregister.co.uk/2014/11/11/german_spooks_want_millions_to_buy_0day_vulns/
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 47
The pricing debate
http://www.theregister.co.uk/2014/11/11/german_spooks_want_millions_to_buy_0day_vulns/
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 48
Black Market?
Grey Market?
White Market?
Prices ranging from thousands to millions?
WTH?!?!?!
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 49
→ 0-day Markets
Black Market
Grey Market (Cybercrime)
(underground)
Software Rel
x.y.z
White (?)
Market
0-day
Patch
Software
«Bug»
Vendors
CERT (ICS-CERT)
National Institutions
A different (more serious?) approach
Buyer’s typology
IS = IT Security companies
Public Knowledge INT = Intelligence Agencies 0-day Exploit code +
of the vulnerability for Governmental use PoC Cost: Min/Max
(National Security protection)
MIL = MoD/related actors
for warfare use
OC = Cybercrime
Y OC 5K – 80K USD
N ALL X2 – X10
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 51
A different (more serious?) approach
Vulnerability relays on: Buyer’s typology
Y OS OC 40K – 100K
Y MGA INT 100K – 300K
Y SCADA MIL 100K – 300K
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 52
Cyber Espionage:
a case study from India
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 53
Cyber Espionage
The complexity and the infrastructural and operating costs of espionage (in the
wide sense of the term) dramatically lowered down along the years, because of the IT
revolution and the so-called “Digital Society”.
In most of the cases, the information sits on (also, or “just”) on digital storages and
travels over the Net.
As a first effect, the concept of “stealing” doesn’t exist anymore (it’s virtual) and
we must speak about copying the information (espionage approach):
What is “still there”, is “safe”;
More time needed to realize the “theft”;
Less time needed to transfer or reselling the information -> cashing out.
(public) incidents do happen both in the private and public (even Military and
Governmental) business:
insiders (drivers: political, ethics, religious, fame and mass media, corruption, blackmail,
ignorance);
contractors (external suppliers, consultants, VPN and RAS access, etc);
“competitors” (civilian and military) both State-Sponsored and Independent.
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 54
Massive Cybercrime + Industrial Espionage
The case study
Our counter-cybercrime internal team works closely with different security communities (APWG, Host
Exploit, Global Security Map, Team Cymru, etc…) which run concrete actions such as information
sharing, botnets takedowns, international digital investigations, supporting and coordinating with
different Law Enforcement Agencies in those involved countries (since the crime is global).
+One year ago, some members of these communities alerted about suspicious activities, not public
known.
Weird aspects
The world-famous «Chinese espionage» wasn’t involved
Technical level and quality of the used tools: medium-low.
Serial industrialization of the whole operational chain of the APT attacks (Advanced Persistent
Threats).
Full outsourcing of the attack.
MO (Modus Operandi) organized by steps: Social Engineering based (phone calls, emails), then target
exploitation (spear phishing).
A very important and scaring sign of those synergies between Cybercrime and Cyber Espionage
worlds.
Something like a «prét à portér» of digital espionage.
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 55
Operation Hang Over
Repeated, targeted malicious activities, “targeted attack infrastructure” type.
New and different MO:
low-quality (.doc + .exe!!)
Very noisy;
persistant;
Not executed by a single person.
Attacks and actions (apparently) originated from India.
Operating infrastructure since at least 3 years (mostly 4).
We are speaking about a specific cybercrime service sold by an IT Security company based
in India (AppPin Security Group…ever heard about?).
“The op started with Telenor intrusion, we received md5s and cc info from TN via NorCert.
We were quickly able to connect the case with others, just googling the http request string
returned lots of hits, and we used our own databases to get a lot more.
Dns reqs in combination w malware behavior info was one of the main mapping methods,
but we also used other tricks, for example tracking bad guys through shodan.
They often tanked their vps images identically, meaning we could see identical esmtp
banners on different ip ranges.
Generally, the Hangover op was large-scale, over many arenas, but minimal complexity.
Snorre”
(Source: email exchange with Snorre Fagerland, Norman Shark, May-June 2013)
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 57
GUI pret-à-portèr
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 58
GUI pret-à-portèr
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 59
The «Big Picture»
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 61
Conclusions
You just cannot fight on your own this war anymore. You may
win a single battle, while it won’t be enough.
If you are insecure, I will be insecure too….
DOWNLOAD:
●
● www.FreedomFromFearMagazine.org
● Or, email me and I will send you the full PDF (10MB)
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 63
Spam Nation, Brian Krebs, 2014
●
●Fatal System Error: the Hunt for the new Crime Lords who are bringing down the Internet, Joseph Menn, Public Affairs,
2010
● Stealing the Network: How to 0wn a Continent, (an Identity), (a Shadow) (V.A.), Syngress Publishing, 2004, 2006, 2007
● Stealing the Network: How to 0wn the Box, (V.A.), Syngress Publishing, 2003
●Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier, Suelette Dreyfus, Random House
Australia, 1997
●The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage, Clifford Stoll, DoubleDay (1989), Pocket
(2000)
● Masters of Deception: the Gang that Ruled Cyberspace, Michelle Stalalla & Joshua Quinttner, Harpercollins, 1995
● Kevin Poulsen, Serial Hacker, Jonathan Littman, Little & Brown, 1997
● Takedown, John Markoff and Tsutomu Shimomura, Sperling & Kupfler, (Hyperion Books), 1996
● The Fugitive Game: online with Kevin Mitnick, Jonathan Littman, Little & Brown, 1997
● The Art of Deception, Kevin D. Mitnick & William L. Simon, Wiley, 2002
● The Art of Intrusion, Kevin D. Mitnick & William L. Simon, Wiley, 2004
● @ Large: the Strange Case of the World’s Biggest Internet Invasion, Charles Mann & David Freedman, Touchstone, 1998
Reading Room /2
● The Estonia attack: Battling Botnets and online Mobs, Gadi Evron, 2008 (white paper)
● Who is “n3td3v”?, by Hacker Factor Solutions, 2006 (white paper)
● Mafiaboy: How I cracked the Internet and Why it’s still broken, Michael Calce with Craig Silverman, 2008
● The Hacker Diaries: Confessions of Teenage Hackers, Dan Verton, McGraw-Hill Osborne Media, 2002
● Cyberpunk: Outlaws and Hackers on the Computer Frontier, Katie Hafner, Simon & Schuster, 1995
● Cyber Adversary Characterization: auditing the hacker mind, Tom Parker, Syngress, 2004
● Inside the SPAM Cartel: trade secrets from the Dark Side, by Spammer X, Syngress, 2004
● Hacker Cracker, Ejovu Nuwere with David Chanoff, Harper Collins, 2002
● Compendio di criminologia, Ponti G., Raffaello Cortina, 1991
●Criminalità da computer, Tiedemann K., in Trattato di criminologia, medicina criminologica e psichiatria forense,
vol.X, Il cambiamento delle forme di criminalità e devianza, Ferracuti F. (a cura di), Giuffrè, 1988
●United Nations Manual on the Prevention and Control of Computer-related Crime, in International Review of
Criminal Policy – Nos. 43 and 44
●Criminal Profiling: dall’analisi della scena del delitto al profilo psicologico del criminale, Massimo Picozzi, Angelo
Zappalà, McGraw Hill, 2001
●Deductive Criminal Profiling: Comparing Applied Methodologies Between Inductive and Deductive Criminal
Profiling Techniques, Turvey B., Knowledge Solutions Library, January, 1998
●Malicious Hackers: a framework for Analysis and Case Study, Laura J. Kleen, Captain, USAF, US Air Force Institute
of Technology
●Criminal Profiling Research Site. Scientific Offender Profiling Resource in Switzerland. Criminology, Law,
Psychology, Täterpro
International press on the case study
http://www.csoonline.com/article/733709/attack-on-telenor-was-part-of-large-cyberespionage-operation-with-indian-
origins-report-says?source=CSONLE_nlt_salted_hash_2013-05-21
http://www.cio.com/article/733712/Peculiar_Malware_Trail_Raises_Questions_About_Security_Firm_in_India?taxonomyId
=3089
http://www.eweek.com/security/cyber-spying-campaign-traced-back-to-india-researchers/
http://www.pcworld.com/article/2039257/attack-on-telenor-was-part-of-large-cyberespionage-operation-with-indian-
origins-report-says.html
http://www.scmagazine.com/espionage-hacking-campaign-operation-hangover-originates-in-india/article/294135/
http://www.zdnet.com/aggressive-espionage-for-hire-operation-behind-new-mac-spyware-7000015613/
http://www.techweekeurope.co.uk/news/india-pakistan-cyber-attack-norman-116749
http://www.all-about-security.de/wirtschaftsnachrichten/artikel/15218-der-erste-grosse-cyberspionageangriff-aus-indien/
http://www.com-magazin.de/news/sicherheit/cyberspionageangriff-indien-121848.html
http://www.globalsecuritymag.fr/Le-rapport-des-cyber-recherches-de,20130521,37378.html
http://www.pcadvisor.co.uk/news/security/3448255/attack-on-telenor-was-part-of-large-cyberespionage-operation-with-
indian-origins-report-says/
http://www.thedatachain.com/news/2013/5/norman_shark_cyber_research_report_uncovers_first_large_cyber_espionag
e_activity_emanating_from_india
http://www.indianexpress.com/news/sophisticated-indian-cyberattacks-targeted-pak-military-sites-report/1118547/1
http://www.net-security.org/secworld.php?id=14927
http://persberichten.com/persbericht/73650/Cyber-Research-rapport-van-Norman-Shark-onthult-eerste-grote-
cyberspionage-operatie-vanuit-India
http://www.toolinux.com/Un-cyber-espionnage-de-taille-venu
http://itrpress.com/communique/34785/rapport-cyber-recherches-norman-shark-revele-grand-jour-plus-grande-activite-
cyber-espionnage-jamais-connue-originaire-inde
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 66
Contacts, Q&A
• Need anything, got doubts, wanna ask me
smth?
– rc [at] security-brokers [dot] com
– Pub key: http://www.security-brokers.com/keys/rc_pub.asc
QUESTIONS?
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 67
EXTRA Material
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 68
HPPV1.0 - Zoom: correlation standards
Gender and age group Individual and group attacks
Background and place of residence The art of war: examples of attack techniques
How hackers view themselves Operating inside a target system
Family background The hacker’s signature
Socio-economic background Relationships with the System Administrators
Social relationships Motivations
Leisure activities The power trip
Education Lone hackers
Professional environment Hacker groups
Psychological traits Favourite targets and reasons
To be or to appear: the level of self-esteem Specializations
Presence of multiple personalities Principles of the Hacker Ethics
Psychophysical conditions Acceptance or refusal of the Hacker Ethics
Alcohol & drug abuse and dependencies Crashed systems
Definition or self-definition: what is a real hacker? Hacking/phreaking addiction
Relationship data Perception of the illegality of their actions
Handle and nickname Offences perpetrated with the aid of IT devices
Starting age Offences perpetrated without the use of IT devices
Learning and training modalities Fear of discovery, arrest and conviction
The mentor's role The law as deterrent
Technical capacities (know-how) Effect of convictions
Hacking, phreaking or carding: the reasons behind the choice Leaving the hacker scene
Networks, technologies and operating systems Beyond hacking
Techniques used to penetrate a system
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 69
CONVICTIONS
CONVICTIONS
DETERRENCE SUFFERED BY TECHNICAL
LAWS SUFFERED BY
EFFECT OF: OTHER DIFFICULTIES
THEM
HACKERS
Wanna Be Lamer NULL NULL ALMOST NULL HIGH
HIGH: they stop
Script Kiddie NULL NULL after the 1st HIGH
conviction
Cracker NULL NULL NULL MEDIUM
HIGH: they stop
Ethical Hacker NULL NULL after the 1st NULL
conviction
Quiet, Paranoid,
NULL NULL NULL NULL
Skilled Hacker
NULL: they do it
Cyber-Warrior NULL NULL NULL
as a job
NULL: they do it
Industrial Spy NULL NULL NULL
as a job
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 70
EXTRA MATERIAL
→ Lesson learned?
I. Information Sharing and PPP (Public, Private Partnerships) are “must-have” in the InfoSec
(and “Cybersecurity” ) world
Gov CERTs
Independent Security Communities
Investigation speed:
Knowing procedures
Direct, field experience
Network of contacts
Concrete and operative collaboration among victims, ISPs and ICT security experts
II. If this happed to a TLC operator in Northern Europe, possibly it happened also in other
countries?
Did we know it? Did we realized we have been attacked, breached, exfiltrated?
III. The Cyber Espionage world is moving towards the outsourcing of “APT-based” attacks…
… which was already there! The difference is that, now, is incredibly cheap and is coming from
India, a country with a hacking know-how which is average good, and has huge experiences with IT
outsourcing, very famous because of their prices, much lower than other markets;
Sold by a private company: did we investigated on a special, single, isolated case study? Are these
the first steps of something bigger?
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 71
→ Solu ons
Despite being or not APTs, over the last 3-4 years attacks evolved, focusing on the human
factor when dealing with targeted espionage, getting benefits from:
Ignorance of the victims (lack of education, basic training, security awareness, simulations);
Exposure and visibility on the Social Networks of the companies and its employees;
contractors and external suppliers;
BYOL (Bring your own device: smartphones, tablets;
“remote working”;
Lack of dialogue and information exchange with other market players (even competitors!);
Lack of procedures (approved, ready-to-go, tested) for Incident Handling, Digital Forensics e overall
the “PR Security Management”.
The “solution?”? There is not a panacea which “fixes everything”. But, good sense, personnel
education and being ready to manage such incidents.
Speaking with the management, getting the authorizations approved
Security Awareness to all of the company’s levels
Specific trainings (IT department, software developers, Security department, Blue Team) and
practical simulations (at least) yearly (2-3 /year=better)
The most important thing: work along with colleagues from different departments, such as Legal,
Human Resources, Marketing, Sales!!
October 26-27, Istanbul, Turkey Istanbul 2015 FIRST Technical Colloquium & TRANSITS Training 72