It’s 0247 local time in a nondescript government building. The young private sits attentively in front of her screen, watching the softly glowing display. A supervisor lazily smokes a cigarette and walks slowly behind the stations of dozens of cyber warriors. Suddenly, an alert appears on the monitor.
“Sir,” the private says excitedly, a bit too loudly.
“Report,” says the lieutenant.
“The objective has opened the attachment. We’re in!”
The officer glances down at his cigarette and smiles. “Americans,” he muses. “They make great cigarettes — and even better targets.”
The above scenario is played out by organized, sponsored antagonists who’ve become adept at breaking into U.S. federal systems and staying hidden for long periods of time without detection. All the while, they’re siphoning information.
In addition to protecting their intellectual property and secrets, many government agencies are entrusted with gathering, processing, and protecting sensitive information about citizens, patients and businesses. This information, along with the people and systems that process it, are increasingly becoming targets for exploitation through the emerging class of threat known as Advanced Persistent Threat (APT).
Why do attackers target federal systems? They seek intelligence, advantage and political gain. The possibilities are endless: intelligence about an opponent’s military capabilities, movement of high-value individuals or national economic strategies; advantage by disabling or crippling sensors and systems or prelaunching a cyber attack as a prelude to kinetic warfare; and political gain by embarrassing a rival, manipulating public perception prior to a key election, or suppressing suspected dissident citizen groups.
One example of such an attack is Operation Shady RAT, reported in August 2011, which uncovered a five-year cyberspying operation inside U.S government agencies and their contractors’ systems.1 Some of these intrusions lasted over two years! Remember, experts determined the systems were all victims of the same attackers.
An example of APTs as a prelude to warfare is the Russia–Georgia conflict. In August 2008, Russian cyber attacks against the nation of Georgia’s infrastructure preceded conventional warfare in which tanks rolled on South Ossetia and Abkhazia. Military campaigns require extensive planning; it is not unreasonable to presume Russian agents had been probing Georgian systems for months in advance, identifying weak points and vulnerabilities.
This paper describes advanced threats against federal and other governmental systems and provides advice on how to identify and protect the data at risk.
It’s 0247 local time in a nondescript government building. The young private sits attentively in front of her screen, watching the softly glowing display. A supervisor lazily smokes a cigarette and walks slowly behind the stations of dozens of cyber warriors. Suddenly, an alert appears on the monitor.
“Sir,” the private says excitedly, a bit too loudly.
“Report,” says the lieutenant.
“The objective has opened the attachment. We’re in!”
APTs are as much entities as techniques. Let’s look at each component:
Control of the remotely placed malware now rested with a young man who had recently been promoted to Sergeant after a series of successful penetrations against U.S. government targets.
Fluent in English, he quickly went to work, sending a series of commands to establish an untraceable path through more than a dozen compromised systems scattered throughout the globe. Once his tracks were certain to be obscured, he uploaded a custom rootkit designed to hide on the American server while quietly reporting back internal network configurations.
These trademarks of an APT are exactly why they are so hard to detect and protect against. APTs also enjoy many tactical advantages, including lack of attribution, vulnerabilities in applications, confusion in systems, human nature and use of previously unknown threats.
How does one defend against an attacker that lurks silently in the wire, waiting patiently for an opportune time to strike? Sun Tzu advised,“Know your enemy and know yourself.” Self-knowledge rarely is sufficient to achieve success; so gathering information about your enemy is critical. After all, adversaries are targeting us, so why not learn something about them? Yet, remarkably, we know little for certain about most APT attackers due to the problem of attribution.
Although an attack may be traced to a particular IP address, that machine might have been used as a relay from another, which, in turn, could be a part of a long chain of compromised systems. Besides, knowing what machine did the deed really isn’t the final goal. Without binding the identity of the human attacker to the exploit, most investigations become dead ends. No judge is going to sentence a computer to having half its memory chips removed or its clock speed reduced as punishment for a crime.
We can surmise the identity of an attacker based upon the information targeted, but proving it is difficult. For example, Operation Shady RAT also targeted the International Olympic Committee and three national Olympic Committees in the months prior to the 2008 Olympics, as well as the World Anti-Doping Agency. It is plausible to conclude that a certain government sponsored the attacks, but that government is certain to deny it. Plausible deniability is an important factor in any APT evolution. Thus, knowing what information or resources are entrusted to your agency and who can benefit by compromising them helps you predict who might come after your systems.
An allegedly leaked classified FBI report2 estimated that the Chinese Red Army has deployed 180,000 cyberspies. It’s also claimed that Microsoft was required to surrender its Microsoft Office source code as a precondition of doing business in China. With well over 90 percent of government PCs running Microsoft Windows and Office, this creates a perfect storm for the attacker. However, it is wrong to assume China is always the culprit. Such xenophobia or prejudices can lead to incorrect decisions about how and what to defend. Understanding the tools used in APT attacks allows defenders to choose countermeasures that can be effective against all foes.
There are many resources in the APT arsenal. Common hacking tools continue to work surprisingly well against average targets, so in most cases, fully patched and up-to-date registered software is the best defense. Many of the Windows systems compromised in Operation Shady RAT were months or even years behind in security patches.
Exploiting insecure code is a primary attack vector for advanced threats. Many websites are an amalgamation of software and tools from different vendors so common vulnerabilities can extend across a large number of systems. It’s nearly impossible for anyone to keep up with adjusting and patching the ever-increasing attack surface. In addition, auto updates of third-party components introduce changes without notice. These are not small patches. Microsoft’s September 2011 auto-update for Windows XP and Office was over 40 million bytes of code! Patches and fixes are often bundled for the convenience of the vendor and can affect multiple issues and open new vulnerabilities. Yet, unless a vendor makes detailed technical notes available, the recipient doesn’t know what other changes were introduced beyond the published reason for the patches — until they are installed and problems surface.
A common attack against web applications is Standard Query Language (SQL) injection. SQL injection involves embedding a SQL statement into an input field, where insecurely written code can execute that statement with the privileges of the web application. One technique of SQL injection is inserting an escape character (e.g., single quote) followed by a tautology (i.e., something that is always true) into an input field.
For example, typing:
or '1' = '1' /*
where a name input is expected could result in a SQL statement that is always true, and everything to the right of that input would be disregarded as a comment. However, simply stripping escape characters means names like O’Brien or contractions like can’t will not work. Developers must know and use secure programming techniques to guard against this type of attack.
Some attacks try to disable a target rather than steal its information. Denial-of-Service (DOS) and Distributed Denial-of-Service (DDOS) attacks attempt to overload a target’s system, causing it to become so preoccupied with responding to attacker-generated connection requests that the system can’t serve legitimate users. By compromising a large number of machines (think unattended home PCs with high-speed connections and expired antivirus), an attacker can build a botnet and program it to launch coordinated attacks at a single target. Conventional systems might succumb to this, but agility with DNS updates and specialized tools offer strong resistance.
One of the key entry points for APT, known as spearphishing, targets carbon-based network components (i.e., people) as compared to silicon-based attacks. Whereas phishing attempts to deceive unsuspecting victims into opening hostile attachments or revealing sensitive information, spearphishing targets specific individuals, luring them with information gathered through intelligence collection or clever guessing. For example, if an attacker knows a CIO has a young daughter at daycare, an e-mail that says,“Medical problem with your Daughter; Hospital Emergency Room report attached” might convince even the most wary executive to click on an infected link immediately in a moment of panic. Attackers gather this information about their targets in a variety of public venues, including social networking accounts, Internet postings, and subscription-based online groups and organizations.
The most powerful APT weapon is the zero-day (0-day) attack that can compromise a fully-patched system by exploiting a previously unknown vulnerability. This attack method gets its name from the amount of advance notice victims receive before being exploited. Zero-days are the Holy Grail of cyberweaponry. APT research teams that generate 0-days hold them very closely to keep the exploit going as long as possible. Clever hackers who discover them can find a black market for purchasers, some of whom are APT attackers. Once divulged or discovered, however, 0-day attacks can be recognized and patched; so, a 0-day can be used only once against a vigilant target.
“Hmm,” thought the sergeant. “Something’s wrong.”
The control channel for the remote software didn’t seem to be working properly. He shifted to an alternate channel, which tunneled back through a port 80 connection that the remote system had opened hours earlier. That, too, wasn’t working. The sergeant began to shift nervously in his seat. He had never heard of anyone failing so early in a reconnaissance mission against an American target. His superiors were not going to be pleased.
Government and contractor employees have a responsibility to protect American interests. Part of that responsibility involves fielding effective security measures to protect information. From a legal perspective, compliance ranks number one on most agencies’ priority lists. FISMA, SOX, PCI, HIPAA, HI-TECH, and NERC CIP4are more than acronyms; they represent legal or industry requirements that do not offer an opt-out for disinterested parties. Information security is a component of each requirement.
There is a danger in seeking mere compliance, though. Compliant systems can and do get compromised all the time. To field a robust defense, you must go beyond the minimums, particularly with the rise of telecommuting and remote access into what was once a tightly controlled network. Whereas internal systems can be tightly managed to enforce policy through automatic updates, remote systems may be noncompliant, through which APTs find their way to internal systems.
Because common entry points for APT include applications and humans operating them, place strong protection around the end points and access points into the network. These protections should include the following strategies:
In 1990, Bill Cheswick described early network security efforts as “a sort of crunchy shell around a soft, chewy center.”12Twenty years later, we wonder what progress has been made, especially when an Army private was allegedly able to download volumes of classified Department of Defense (DoD) information and pass it to WikiLeaks. That private described DoD security as an environment of “weak servers, weak logging, weak physical security, weak counter-intelligence, inattentive signal analysis … a perfect storm.”13
We are still poorly equipped to defend against internal attacks. Technology can do only so much; and government agencies cannot solve security issues by changing user behavior. A popular hacker t-shirt with “Social Engineer” on the front says,“Because there is no patch for human stupidity” on the back. It takes only one person to compromise a large network. The RSA breach was instigated by a single employee who opened an infected Excel spreadsheet.14 HBGary Federal was hacked with a SQL injection attack followed by social engineering of an employee.15 The thumb drive attack against the military that spawned Operation BUCKSHOT YANKEE succeeded because it exploited users’ desire for convenience.16
Technology and user education are necessary but not sufficient to counter the emerging threat. Government leaders need to address emerging threats with flexible policies that address internal human and technological risks. As well, security, compliance and defense teams need to understand their adversaries, who continue to advance their attack methodologies. New attack vectors are faster, more dangerous and omnipresent. Combating them requires newer, more sophisticated defenses that can automatically respond and adapt to threat vectors in real time.
G. Mark Hardy serves as President of National Security Corporation. He has been providing cybersecurity expertise to government, military and commercial clients for over 25 years and is the author of over 100 articles and presentations. He serves on the National Science Foundation’s CyberWATCH Advisory Board and is a recently retired Navy Captain. A graduate of Northwestern University, he holds a BS in computer science, a BA in mathematics, an MBA and a masters in strategic studies. Hardy is designated as a Certified Information Systems Security Professional (CISSP) and Certified Information Security Manager (CISM).
1Dmitri Alperovitch,“Revealed: Operation Shady RAT,”White Paper, McAfee , August 2011, http://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf
2Gerald Posner,“China’s Secret Cyberterrorism,”The Daily Beast, January 12, 2010, www.thedailybeast.com/articles/2010/01/13/chinas-secret-cyber-terrorism.html
3Theresa Lanowitz,“Now Is the Time for Security at the Application Level,” Gartner Group, December 2005, www.gartner.com/DisplayDocument?id=487227
4These acronyms stand for Federal Information Security Management Act, Sarbanes-Oxley, Payment Card Industry Data Security Stan-dard, Health Insurance Portability and Accountability Act, Health Information Technology for Economic and Clinical Health Act, and North American Electric Reliability Corporation Critical Infrastructure Protection standards, respectively.
5Dan Kaminsky,“DNS Filtering Threatens the Security and Stability of the Internet,” May 26, 2011 blog entry, http://dankaminsky.com
6Karen Evans, Memorandum for Chief Information Officers M-08-23, Executive Office of the President, August 22, 2008, http://www.whitehouse.gov/sites/default/files/omb/assets/omb/memoranda/fy2008/m08-23.pdf
7FOSE Conference and Exhibition Workshop,“The Deployment Diaries: DNSSEC in U.S. Federal Systems and Beyond,” July 20, 2011, http://fose.com/events/fose-2011/sessions/wednesday/the-deployment-diaries.aspx
8Kim Zetter,“Three Minutes With Security Expert Bruce Schneier,” PC World, September 28, 2001, www.schneier.com/news-038.html
10www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
11Vivek Kundra,“Federal Cloud Computing Strategy,”The White House, February 8, 2011, http://www.cio.gov/documents/Federal-Cloud-Computing-Strategy.pdf
12Bill Cheswick,“The Design of a Secure Internet Gateway,” AT&T Bell Laboratories, April 1990, http://www.cheswick.com/ches/papers/gateway.pdf
13Evan Hansen,“Manning-Lamo Chat Logs Revealed,”Wired.com, July 13, 2011, log entry at 02:17:56 PM, http://www.wired.com/threatlevel/2011/07/manning-lamo-logs
14Richard Adhikari,“RSA ‘Explanation’ Foggy About Breach Details,”TechNews World, April 4, 2011, http://www.technewsworld.com/story/72203.html
15Peter Bright,“Anonymous speaks: the inside story of the HBGary hack,” Ars Technica, February 15, 2011, http://arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars
16William J. Lynn,“Defending a New Domain: The Pentagon’s Cyberstrategy,” Foreign Affairs, September/October 2010, http://www.foreignaffairs.com/articles/66552/william-j-lynn-iii/defending-a-new-domain