Ramblings of an old Doc

 

 

Last week, McAfee reported attacks on our energy companies of a sophisticated nature.

They originated in China, however it could not be determined whether they came from a governmental, corporate or criminal entity.

Security researchers at McAfee have sounded an alarm for what is described as “coordinated covert and targeted cyberattacks” against global oil, energy, and petrochemical companies.
McAfee said the attacks began November 2009 and combined several techniques — social engineering, spear phishing and vulnerability exploits — to load custom RATs (remote administration tools) on hijacked machines.

As with the e-mail messages used in regular phishing expeditions, spear phishing messages appear to come from a trusted source. Phishing messages usually appear to come from a large and well-known company or Web site with a broad membership base, such as eBay or PayPal.

In the case of spear phishing, however, the apparent source of the e-mail is likely to be an individual within the recipient's own company and generally someone in a position of authority.

According to an article in the New York Times, spear phishing attempts are not typically initiated by "random hackers" but are more likely to be conducted by "sophisticated groups out for financial gain, trade secrets or military information."

This is a very brief summary of the (nineteen page) McAfee White Paper found HERE:

"1. Company extranet web servers compromised through SQL-injection techniques, allowing remote command execution.  
2. Commonly available hacker tools are uploaded on compromised web servers, allowing attackers to pivot into the company’s intranet and giving them access to sensitive desktops and servers internally.
3. Using password cracking and pass-the-hash tools, attackers gain additional usernames and passwords, allowing them to obtain further authenticated access to sensitive internal desktops and servers."

Initially using the company’s compromised web servers as command and control (C&C) servers, the attackers discovered that they needed only to disable Microsoft Internet Explorer (IE) proxy settings to allow direct communication from infected machines to the Internet.
Using the RAT malware, they proceeded to connect to other machines (targeting executives) and extracting email archives and other sensitive documents.

Source:  http://tinyurl.com/2v67fy7


Comments (Page 1)
5 Pages1 2 3  Last
on Feb 12, 2011

My guess? Industrial espionage. The fact that nothing has blown up or shut down makes me think "they" were after information, not breaking stuff.

on Feb 12, 2011

I came across this article a few days ago. Seems the PTB's in China aren't too concerned with it. They know of it but choose to do nothing about it so it stands to reason there is something to gain for them. Could be they, whoever they are, are testing our ability to detect and stop this sort of cyberattack. Know your enemy type thing. IMO

on Feb 12, 2011

I don't know who originated the attack, or the reasons behind it, however, it is clear that we all are vulnerable from within and without.

The motive could well be economic, but that doesn't tell us who initiated the attack nor at the behest of whom. I also believe the amount learned by the criminals to be larger than just economic, and could be peddled to terrorist groups and hostile national and corporate entities.

I do not believe we conceptualize how truly complex and multilayered our relationships with other countries, companies and yes, even criminals are.

The criminal economy is not a small one and probably is in the hundreds of trillions of dollars, and impacts us all on many levels of our lives.

on Feb 12, 2011

China is an up and coming economic and military power that could soon outstrip the US, UK and other western powers. The Chinese rulers have already admitted knowledge of the activities. Not disagreeing with you Doc but like I said they choose not to do anything about it. Uncle Sam would be wise to cultivate China as an ally.

on Feb 12, 2011

That's some great timing, considering the "off-switch" for the internet in the US being discussed. Almost smells like false flag operations to me.

on Feb 12, 2011

they choose not to do anything about it. Uncle Sam would be wise to cultivate China as an ally.

Yep... they own so much of our paper we better be good little boys and girls...

on Feb 12, 2011

That's some great timing, considering the "off-switch" for the internet in the US being discussed. Almost smells like false flag operations to me.
You're assuming the DoD (or NSA, or CIA) is better at cyberwarfare than my grandmother. I doubt that they are. It is also unlikely that they could keep a lid on something like this.

on Feb 12, 2011

I absolutely assume that they are just as capable as China, when it comes to "cyber warfare". Anything else would just be naive. US hackers are neither innocent nor incompetent.

Re: "keep a lid on something like this" - I have no idea how to determine if something is likely or unlikely when it comes to espionage, but I do know it's possible.

on Feb 12, 2011

Heavenfall
That's some great timing, considering the "off-switch" for the internet in the US being discussed. Almost smells like false flag operations to me.

Scoutdog

That's some great timing, considering the "off-switch" for the internet in the US being discussed. Almost smells like false flag operations to me.You're assuming the DoD (or NSA, or CIA) is better at cyberwarfare than my grandmother. I doubt that they are. It is also unlikely that they could keep a lid on something like this.

Fellas... wait for tomorrow's planned article.... I'll explain exactly how a cyber attack can shut down the net, and about the "off switch".

Same time, same station and as Warner Wolfe used to say, "Videotape at 11."

on Feb 12, 2011

on Feb 12, 2011

I absolutely assume that they are just as capable as China, when it comes to "cyber warfare". Anything else would just be naive. US hackers are neither innocent nor incompetent.
Hackers, sure. But the national-security structure does not (to my knowledge) have any system to recruit hackers, and I doubt many would go to work for them if they did.

on Feb 12, 2011

Hackers, sure. But the national-security structure does not (to my knowledge) have any system to recruit hackers, and I doubt many would go to work for them if they did.

They're called Red Teams. I think it's understandable that the NSA doesn't really push this on the 11'oclock news. They are apparently "recruited" with abandon.

on Feb 12, 2011

Source? That would be very interesting to learn more about...

on Feb 13, 2011

These attacks began in 2007, and the oil companies only knew about it when McAfee made a report?

Why are people worried about this connecting to an internet off switch?  It's all oil company related, which means it's either bullshit or the oil companies are fucking retarded, and either way it'll end up with higher gas prices.

on Feb 13, 2011

There was a fairly comprehensive study on our infrastructure vulnerability to 'cyberwars' done in Norway some years ago. It has probably been updated but back then the 'main points' were:

Power infrastructure:
Bad: Power companies has tended to convert from dedicated networks and proprietary platforms over to regular internet and windows-based systems in order to cut costs and increase profits. Result: Systems are more vulnerable.
Good: However, the power systems themselves operate perfectly well without the computers and there is no possibility of actual damage to the systems originating solely from the networks.
Bad: Load information is transmitted over the internet in order to reroute power traffic. A physical attack on a power junction combined with a DOS attack on the computers could lead to cascade failures similar to that on the US east coast a few years ago, but you'd need a well-timed combined attack.

Industry:
Bad: JIT distribution combined with increasing amounts of using the internet for distributing orders will cripple industry quickly. Without stockpiles, industry can operate only for a short time without shipments, and without the internet, logistics will become very difficult for a period of time.
Good: This would be somewhat temporary; the industry can to a large extent operate without the internet, but efficiency will take a nosedive for a few weeks. 

Internet vulnerability:
The internet itself is robust. However, 'cost efficiency' is a risk also here - it is more robust on paper than in reality. Internet traffic looks widely dispersed but there are a few major trunks and hubs that will cause major traffic congestions if they are taken out - looking at the atlantic lines it looks like there's a good number of trans-atlantic cables, for instance, but a lot of those fiber lines are actually in the same cable. You can't really isolate most countries' internet easily, but you can reduce quality of service a LOT.

The internet challenge is much more about getting and adjusting information than 'destructive terrorism'. As for the OP's post, I'd say this is not a case of the US being asleep... the US is one of the more paranoid states that wants to keep a tab on global (rather than domestic) oil companies, the same way that the recent cyberattack on Iran's nuclear programs were rather likely to originate from a certain western country than, say, China.

 

5 Pages1 2 3  Last