24 November 2014. Edward Snowden should publicly state that none of the material
he provided contained hidden spyware, nor that published was later implanted
with it.
23 November 2014
Do Snowden Files Have NSA Implants? Part 2
Part 1:
http://cryptome.org/2014/11/snowden-nsa-implants.htm
Did Snowden, wittingly or unwittingly, use USBs to transfer Stuxnet-like
programs in files he released to tag, track, infect, report their distribution?
#CountdownToZeroDay
-----
They only noticed the rogue code going into the PLC because the blocks of
code were slightly larger than they should have been. Before infecting their
Step 7 system with the malware, they had transferred blocks of code to the
PLC and captured them with the analysis tool to record their basic size and
characteristics. After infecting the machine with Stuxnet, they transferred
the same blocks of code again and saw that they had suddenly grown. They
couldnt yet see what the Stuxnet code was doing to the PLC, but the
injection itself was big news. It was way beyond anything theyd ever
warned customers about and way beyond anything they expected to see in the
first known attack against a PLC.
Zetter, Kim (2014-11-11).
Countdown
to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
(Kindle Locations 3067-3072).
-----
But, oddly, after making their startling announcement, the Symantec researchers
had gone quiet. Langner suspected the researchers had hit a wall, due to
their lack of expertise with PLCs and industrial control systems. But curiously,
Siemens had also gone silent. This was strange, Langner thought. It was,
after all, Siemens controllers that were being attacked; the company had
an obligation to analyze the malevolent code and tell customers what it might
be doing to their systems. But after a couple of brief announcements the
German company had made in July, it had gone mum.
Zetter, Kim (2014-11-11). Countdown to Zero Day: Stuxnet and the Launch of
the World's First Digital Weapon (Kindle Locations 3085-3088).
-----
The idea that someone had put so much money and effort into a weapon attacking
a single target left Langner dumbfounded. It could mean only one thing
the target had to be extraordinarily important.
Zetter, Kim (2014-11-11). Countdown to Zero Day: Stuxnet and the Launch of
the World's First Digital Weapon (Kindle Locations 3193-3194).
-----
On September 13, 2010, nearly a month after Symantecs revelation that
Stuxnet was sabotaging PLCs, Langner published a brief blog post under the
title Hack of the Century. In it, he asserted that Stuxnet was
a directed attack against a specific control-system installation,
and left it at that. But three days later he followed up with additional
information. With the forensics we now have it is evident and provable
that Stuxnet is a directed sabotage attack involving heavy insider
knowledge, he wrote. Here is what everybody needs to know right
now.
Zetter, Kim (2014-11-11). Countdown to Zero Day: Stuxnet and the Launch of
the World's First Digital Weapon (Kindle Locations 3229-3233).
-----
Oddly, the source of Stuxnet never came up, either during the call or on
the NCCIC watch floor. McGurk says that when the code first arrived, intelligence
analysts from various agencies on the floor searched their classified data
sources for any information or reports related to the worm, but came up with
nothing. He also says no one on the watch floor wondered out loud if the
worm had been spawned by the United States. An outsider might question why
no one on the watch floor turned to the CIA or NSA analysts sitting in the
room to ask with a wink , Is this one of yours? But McGurk insists
this never occurred to them because attribution wasnt the watch
floors concern. Their mission was to uncover an attack codes
capabilities and determine the best way for US networks to defend against
it. At first when you look at [malware ]
your assumption is that
its not friendly fire. You dont think the sniper on the roof
is one of your guys shooting at you, he says. It could turn out
to be
But in the heat of it, at the very beginning, youre not
overly concerned, nor do you naturally default to [that.]
Zetter, Kim (2014-11-11). Countdown to Zero Day: Stuxnet and the Launch of
the World's First Digital Weapon (Kindle Locations 3372-3380).
-----
McGurk maintains that never, either in classified briefings or in open testimony
with lawmakers, did anyone ask him the question that was on everyone elses
mind. I dont think, even jokingly, did someone say in a formal
briefing, Hey did we do this? Because thats just not the
way those interactions occur. Im sure there was speculation elsewhere,
but it wasnt done at our level. McGurk says he also never got
the impression from anyone he briefed that Stuxnet was a homemade job.
When I was in a room, regardless of who the audience was, whether it
was senior intelligence folks and I mean senior intelligence
folks I never got the impression that this was all smoke-and-mirrors
for them, he says. The same thing inside the Department of Homeland
Security, when I was briefing up to the secretariat level. Never did I get
the impression that, you know, they already knew this
and they were
just hoping that I would go away. Nor did anyone suggest to McGurk
that he should pull his team off of Stuxnet either. No one said hey,
cease and desist, leave it alone, dont go there, he says. We
were actually getting a lot of cooperation from all of those organizations
assisting with the analysis and assisting with the understanding of
what type of threat this actually posed. But even if officials in
Washington werent openly asking the obvious question, there was little
doubt among experts and observers that the United States was behind the
attack either alone or with Israeland it seemed only a matter
of time before the details behind the attack got out. Ralph Langners
assertion that Stuxnet was a precision weapon aimed at Irans nuclear
program must have caused a lot of consternation and panic in the halls of
the White House and the Pentagon, as a plot that had been meticulously planned
and executed over a number of years was slowly unraveling before their eyes.
Zetter, Kim (2014-11-11). Countdown to Zero Day: Stuxnet and the Launch of
the World's First Digital Weapon (Kindle Locations 3390-3405).
-----
The halls of the White House may have been troubled over Stuxnet in 2010
after it was discovered, but in May 2008, optimism reigned among those who
knew about the covert program, as the plot behind the digital weapon was
unfolding exactly as planned.
Zetter, Kim (2014-11-11). Countdown to Zero Day: Stuxnet and the Launch of
the World's First Digital Weapon (Kindle Locations 3493-3494).
-----
ITS NOT CLEAR exactly when the first planning and development on Stuxnet
began, but sometime in 2006, after Iran withdrew from its suspension agreement,
US military and intelligence officials reportedly brought the proposal for
the cyber operation, later dubbed Olympic Games, to the president.
Zetter, Kim (2014-11-11). Countdown to Zero Day: Stuxnet and the Launch of
the World's First Digital Weapon (Kindle Locations 3554-3556).
-----
The code was then developed by an elite team of programmers at the NSA, at
least initially. Later versions reportedly combined code from the NSA with
code from the Israeli Defense Forces Unit 8200 Israels
version of the NSA. Once the code was designed , however, it would have been
handed off to the CIA to oversee delivery to its destination, since only
the CIA has legal authority to conduct covert operations.
Zetter, Kim (2014-11-11). Countdown to Zero Day: Stuxnet and the Launch of
the World's First Digital Weapon (Kindle Locations 3664-3667).
-----
Its unclear how much advance research and work had already been done
by the time Bushs advisers proposed their plan in 2006. But once he
gave the go-ahead for the covert operation to advance, it reportedly took
just eight months to finalize the scheme.
Zetter, Kim (2014-11-11). Countdown to Zero Day: Stuxnet and the Launch of
the World's First Digital Weapon (Kindle Locations 3685-3687).
-----
But the following year [2005?], some say, is when the cult of
offense really began when Gen. Keith Alexander took over as director
of the NSA from Gen. Michael Hayden, and the focus on developing cyberweapons
for warfare ramped up. It was during this period that Operation Olympic Games
and Stuxnet were hatched.
Zetter, Kim (2014-11-11). Countdown to Zero Day: Stuxnet and the Launch of
the World's First Digital Weapon (Kindle Locations 3921-3923).
-----
More recently, leaks from former NSA systems administrator Edward Snowden
have provided some of the most extensive views yet of the governments
shadowy cyber operations in its asymmetric war on terror. The documents describe
NSA elite hacker forces at Fort Meade and at regional centers in Georgia,
Texas, Colorado, and Hawaii, who provide US Cyber Command with the attack
tools and techniques it needs for counterterrorism operations. But the government
cyberwarriors have also worked with the FBI and CIA on digital spy operations,
including assisting the CIA in tracking targets for its drone assassination
campaign.
Zetter, Kim (2014-11-11). Countdown to Zero Day: Stuxnet and the Launch of
the World's First Digital Weapon (Kindle Locations 3949-3954).
-----
According to the documents, three-fourths of which focused on
top-priority targets like Iran, Russia, China, and North Korea.
Under a $ 652-million clandestine program code named GENIE, the NSA, CIA,
and special military operatives have planted covert digital bugs in tens
of thousands of computers, routers, and firewalls around the world to conduct
computer network exploitation, or CNE. Some are planted remotely, but others
require physical access to install through so-called interdiction the
CIA or FBI intercepts shipments of hardware from manufacturers and retailers
in order to plant malware in them or install doctored chips before they reach
the customer. The bugs or implants operate as sleeper cells that
can then be turned on and off remotely to initiate spying at will.
Most of the implants are created by the NSAs Tailored Access Operations
Division (TAO) and given code names like UNITEDDRAKE and VALIDATOR. Theyre
designed to open a back door through which NSA hackers can remotely explore
the infected systems, and anything else connected to them, and install additional
tools to extract vast amounts of data from them. The implants are said to
be planted in such a way that they can survive on systems undetected for
years, lasting through software and equipment upgrades that normally would
eradicate them.
In 2008, the NSA had 22,252 implants installed on systems around the world.
By 2011, the number had ballooned to 68,975, and in 2013, the agency expected
to have 85,000 implants installed, with plans to expand this to millions.
But the embarrassment of riches provided by so many implants has created
a problem for the NSA. With so many implants lurking on systems around the
world, the spy agency has been unable in the past to take advantage of all
the machines under its control. In 2011, for example, NSA spies were only
able to make full use of 10 percent of the machines they had compromised,
according to one Snowden document. To remedy this, the agency planned to
automate the process with a new system code named TURBINE, said to be capable
of managing millions of implants simultaneously. All of these operations
, however from Kosovo to Syria to Libya, and the ones exposed in the
Snowden documents have focused on stealing or distorting data or using
cyber methods to help deliver physical bombs to a target. None involved a
digital attack as replacement for a conventional bomb. This is what made
Stuxnet so fundamentally different and new.
Zetter, Kim (2014-11-11). Countdown to Zero Day: Stuxnet and the Launch of
the World's First Digital Weapon (Kindle Locations 3961-3980).
-----
Others are more subtle about their intentions, such as a listing for Booz
Allen Hamilton, the contractor Snowden worked for while at the NSA, seeking
a Target Digital Network Analyst to develop exploits for
personal computer and mobile device operating systems, including Android,
BlackBerry, iPhone and iPad. Many of the job listings cite both CND
(computer network defense) and CNA (computer network attack) among the skills
and expertise sought, underscoring the double duty that vulnerability and
exploit research can perform in both making systems secure and attacking
them.
Zetter, Kim (2014-11-11). Countdown to Zero Day: Stuxnet and the Launch of
the World's First Digital Weapon (Kindle Locations 3995-3999).
-----
One of the first things that struck him about the attack was that it unfolded
in six stages that repeated over weeks and months. Once the attack was done,
it recycled itself and began again. This meant that rather than launching
a single blow that caused catastrophic failure, as the researchers originally
believed Stuxnet was designed to do, the attackers were going for subtle
sabotage that extended over time. This, combined with the man-in-the-middle
attack that concealed the sabotage from operators as it occurred, would have
made it hard for anyone to detect and pinpoint the source of problems. The
attackers, Falliere realized, had expected to go undetected for months, and
indeed they had.
Zetter, Kim (2014-11-11). Countdown to Zero Day: Stuxnet and the Launch of
the World's First Digital Weapon (Kindle Locations 4274-4278).
-----
Each time the sabotage commenced, the man-in-the-middle attack fed false
frequency readings back to the operators and safety system to keep them blind
to what was happening.
Zetter, Kim (2014-11-11). Countdown to Zero Day: Stuxnet and the Launch of
the World's First Digital Weapon (Kindle Locations 4339-4340).
-----
As for Duqus intent, it was pretty clear it wasnt a saboteur
like Stuxnet, but an espionage tool. Whereas Stuxnet was a black ops mission
bent on destruction, Duqu appeared to be the forward scout, sent out to collect
intelligence for future assaults. Symantec suspected it was the precursor
to another Stuxnet-like attack. Duqus life-span was limited, however;
a kill date in the code forced it to self-destruct after thirty-six days,
deleting all traces of itself from an infected machine.
Zetter, Kim (2014-11-11). Countdown to Zero Day: Stuxnet and the Launch of
the World's First Digital Weapon (Kindle Locations 4737-4740).
-----
When Duqus attackers sent their keylogger to infected machines, they
embedded it in a .JPEG file an ordinary image file to slip it
through firewalls unnoticed. The content of most of the image in that file
had been deleted so the keylogger code could be tucked inside. As a result,
only an inch or so of the image appeared on-screen when OMurchu opened
the file it consisted of just a few words of white text printed on
a dark background.
Zetter, Kim (2014-11-11). Countdown to Zero Day: Stuxnet and the Launch of
the World's First Digital Weapon (Kindle Locations 4753-4756).
-----
When Duqus self-destruct mechanism kicked in after thirty -six days,
it was supposed to erase all traces of itself from infected machines so a
victim would never know he had been hit. But the Kaspersky team discovered
that when Duqu removed itself , it forgot to delete some of the temporary
files it created on machines to store the data it stole. One of these files,
left behind on a machine in Iran, had been created on the machine on November
28, 2008. Kaspersky and Symantec had always suspected that prior to
Stuxnets assault on the centrifuges in Iran, the attackers had used
an espionage tool to collect intelligence about the configuration of the
Siemens PLCs. The information could have come from a mole, but now it seemed
more likely that a digital spy like Duqu had been used.
Zetter, Kim (2014-11-11). Countdown to Zero Day: Stuxnet and the Launch of
the World's First Digital Weapon (Kindle Locations 4922-4927).
-----
32 Multiple versions of the Duqu driver showed up on infected machines, each
time bearing a different name. Each version appeared to contain the same
code, however, and was compiled the same day. Notably, one variant of the
Duqu driver that was found on the machines in Hungary was unsigned and tried
to pass itself off as a product of JMicron the Taiwanese company whose
certificate was used to sign a driver that was found by ESET in July 2010
and was believed to have been associated with Stuxnet. In the
properties description of the driver, the attackers had indicated
that it was a JMicron Volume Snapshot Driver. It was yet another detail that
connected Duqu and Stuxnet.
33 The driver file name was jmidebs.sys.
34 The name of this driver was rndismpc.sys.
35 The name of this driver was rtniczw.sys.
Zetter, Kim (2014-11-11). Countdown to Zero Day: Stuxnet and the Launch of
the World's First Digital Weapon (Kindle Locations 5086-5093).
-----
The unnamed sources said Flame had been developed sometime around 2007
confirming the general timeframe Raiu and his team had established for it
to collect intelligence about Iranian officials and to map computer systems
that were part of Irans nuclear program. But the officials also suggested
that Flame had been an early-generation tool that had since been surpassed
by others.
Zetter, Kim (2014-11-11). Countdown to Zero Day: Stuxnet and the Launch of
the World's First Digital Weapon (Kindle Locations 5300-5303).
-----
|