Geolocation, Russian Hackers & False Flag Operations

Malicious actors can easily position their breach so that it can be attributed to Russian Government Hackers. 

It’s common knowledge among even script kiddies that all one needs to do is compromise a system geolocated in Russia (ideally in a government office) and use it as a beachhead for attack so that indicators of compromise lead back to Russia. 

For additional operational security, use publically available whitepapers and reports to determine the tool, techniques, and procedures of a well-known nation-state sponsored advanced persistent threat (APT), access Deep Web forums such as Alphabay to acquire a malware variant or exploit kit utilized in prolific attacks, and then employ the malware in new campaigns that will inevitably be attributed to foreign intelligence operations. 

Want to add another layer? Compromise a Chinese system, leap-frog onto a hacked Russian machine, and then run the attack from China to Russia to any country on the globe. Want to increase geopolitical tensions, distract the global news cycle, or cause a subtle, but exploitable shift in national positions? Hack a machine in North Korea and use it to hack the aforementioned machine in China, before compromising the Russian system and launching global attacks. 

This process is so common and simple that’s its virtually “Script Kiddie 101” among malicious cyber upstarts.

Western systems lack the security and resiliency to withstand foreign compromise. Moreover, Incident Response techniques and processes are not comprehensive or holistic enough to definitively attribute an incident to a specific threat actor from the multitude of script kiddies, hacktivists, lone-wolf threat actors, cyber-criminals, cyber-jihadists, Hail-Mary threats, and nation-state sponsored advanced persistent threats (APTs), who all possess the means, motive, and opportunity, to attack minimally secured, high profile targets. 

Organisations such as the DNC, RNC, Whitehall, and the German Bundestag have all been targeted in cyber-attacks launched with the possible intention of influencing global politics. 

These incidents aimed to influence voter confidence by hindering public opinion through leaked emails, social media hashtags, and disinformation. In particular, the DNC and RNC hacks demonstrated to the global community that the United States was not cyber-secure and adversaries capitalized on that exploitable vulnerability. 

It would be easy to baselessly declare that all of the attacks were launched by Russia based on the malware employed; however, other threat actors such as Anonymous, Comment Crew, Desert Falcon, etc. could easily emulate the tools, tactics, and procedures of a Russian nation-state APT attack.

Attribution Remains More Guesswork than Fact

The attribution of cyber-security incidents is a developing process that has not advanced as rapidly as the expansion of the next generation threat landscape, the explosive proliferation of sophisticated threat actors, or the increasing accessibility and availability of complex malware, exploit kits, and tools. 

Incidents, such as the DNC breach, are investigated based on presumptions of a threat actor profile and on the Incident Response process that preserves and analyzes any indicators of compromise that remain on the system (i.e. the digital crime scene). 

Threat actor profiles typically consist of a pool of actors with the means, motive, and opportunity to target the system. Incident Response includes data logs from perimeter security devices (firewall, IDS/IPS, etc.), full packet capture archives, and any other data that provide insight into the network and server/host level activities of the threat actor.

Attribution might be reliable if the target is well-protected, if the target operates in a niche field, or if the malware involved in the incident is unique because one or more of those characteristics can be deterministic of the sophistication and resources of the threat actor. 

Attribution is less exact in the case of the DNC breach because the mail servers compromised were not well-secured; the organisation of a few hundred personnel did not practice proper cyber-hygiene; the DNC has a global reputation and is a valuable target to script kiddies, hacktivists, lone-wolf cyber-threat actors, cyber-criminals, cyber-jihadists, Hail-Mary threats, and nation-state sponsored advanced persistent threats (APTs); and because the malware discovered on DNC systems were well-known, publically disclosed, and variants could be purchased on Deep Web markets and forums.

The DNC breach has been widely believed to be part of a misinformation campaign, possibly attributed to APT28 (aka Sofacy, Sednit, Fancy Bear) and APT29 (aka Cozy Duke, Cozy Bear) based on the operational security observed, the modular malware employed, and the command and control (C2) structure used to perform tasks and avoid detection. 

Sources close to the investigation believe that the threat actors involved in the incident were known entities, at least one step removed from the Russian government. Based on accounts of the classified briefing, the intelligence community has not collectively attributed the DNC breach and other recent incidents that weaponised information against the US electoral process, to Russia. 

This disagreement is likely due to the ease which an adversary could conduct a breach mimicking the documented and publically available tools, tactics, and procedures, of advanced persistent threat (APT) groups with known affiliations to the Russian government.

In their blogpost, CrowdStrike does not directly attribute the incident to Russia, China, or to any other nation-state entity, in part because it is possible that the threat actors operate as cyber-mercenaries or do not work exclusively for a nation-state, and in part because it is possible that attacks were launched by another threat actor emulating the publically disclosed tools, tactics, and procedures of the more infamous APT28 and APT29. APT28 is known to target Western Government, Media, Energy, and Defense organisations with malicious phishing domains that resemble that of the legitimate target and with malware and exploit kits including Sofacy, X-Agent, X-Tunnel, WinIDS, Foozer, and DownRange droppers. 

Breaches attributed to APT28 include the 2015 breaches of the German Bundestag and the French TV5 Monde. APT29 targets Western Defense, Energy, Extractive, Financial, Insurance, Legal, Manufacturing Media, Think Tanks, Pharmaceutical, Research and Technology industries, and Universities, with spear phishing campaigns, malicious droppers, and a Remote Access Trojan (RAT), such as AdobeARM, ATI-Agent, and MiniDionis. Both APT28 and APT29 are well-known sophisticated threat actors that have been extensively profiled by cyber-security firms such as FireEye. 

As a result, their profiles, operational behavior, tools, and malware could all be easily emulated by even an unsophisticated adversary in a campaign against an insecure target such as the DNC, that did not prioritize cyber-security, cyber-hygiene, or system cyber resiliency.  

For instance, the cyber-criminal group Patchwork Elephant, known for adopting malware from other campaigns, could easily have also conducted the DNC/ RNC attacks by emulating APT28 and APT29.

The Weaponisation of Social Media for Digital Information Warfare

Espionage and geopolitical manipulation can now be easily achieved through cyber and information warfare from any adversary ranging from script kiddie to nation state APT, with access to social media networks like Twitter, Reddit, Facebook and YouTube. 

Internet channels have always provided Intelligence to entities in Russia, China, the United States, and every major nation have and use the capability to distribute ideological propaganda. Now, at least China, Iran, Russia, and Venezuela, have funded political propaganda campaigns that digitally weaponized information by spreading disinformation and polarising content throughout Western nations. 

For instance, Russia had “The Agency”, in which internet trolls were hired to actively promote disinformation on Internet sites relevant to Western interests. The Chinese government has similar capabilities. 

Digital Information warfare weaponises social media to proliferate ideological variants and disinformation, in order to manipulate public perception in a manner that coincides with an adversarial desired outcome. 

Digital perception management is a subset of information warfare that focuses on the spread of misinformation, propaganda, and disruptive ideologies, through seemingly innocuous sources such as social media, online publications, etc. 

Information leaks, such as the DNC leaks, are dangerous because they provide a context-less release of information to the public that breeds distrust and resentment. While impactful, leaks are just one form of information warfare. Every threat actor ranging from script kiddie to, Anonymous, to the Duke APTs, has access to Twitter, Facebook, Reddit, 4chan, and other platforms that can be leveraged to impart national ideological variance into the public. 

Likewise, the Dabiq magazine published by the Cyber Caliphate and used to recruit lone wolf threat actors and militant jihadists demonstrates that even an unsophisticated threat actor can freely distribute propaganda online in order to reach and influence a certain portion of the Internet.

2016 has demonstrated that America is ill-prepared for any form of Information Warfare

American workforces deficient in cyber-hygiene are tasked with defending insecure networks lacking cybersecurity and cyber resiliency from potent cyber adversaries who are capable of obfuscating and adapting their activities to avoid detection and attribution. 

Regardless of attribution, the recent series of leaks, propaganda proliferation, and other information warfare attacks have demonstrated to the global community that the United States is susceptible to manipulation and ideological compromise through even basic tools like email, Twitter hashtags, and other, social media. 

In 2016, digital information warfare attacks from major adversarial nation-states (China, Iran, Russia, etc.) sowed seeds of doubt in the pillars of American government, which include the democratic process, the legitimacy of the elections, and the spreading of rumors to make the intelligence community see dis-unified and ill-informed. 

Still, the nation got away relatively scot-free if all we experienced was the limited weaponisation of social media for information warfare and some breaches with limited kinetic effect. 

All of these pseudo-anonymous attacks that occurred this year pale in comparison to the cyber and information warfare attacks that hyper-evolving threat actors ranging in sophistication from script kiddie to nation-state APT, will launch in the near future. 

Imagine the damage an unsophisticated script kiddie could have wrought if instead of simply breaching the DNC or RNC, they conducted a Mirai attack on election systems. Imagine if a sophisticated threat, like a Chinese APT, stole or altered data as Deep Panda may have done in the OPM breach. 

Even malicious adversaries lacking in cyber-capabilities, such as the cyber caliphate, Hail-Mary threat actors, or enemy nation-states, can launch cyber and cyber-kinetic attacks against critical infrastructure systems by outsourcing the attack to a cyber-mercenary or mercenary APT, for no purpose other than demonstrating a capability, declaring a geopolitical statement, or spreading discord. 

In 2016, the United States lacked readiness for digital information warfare from a multitude of so many known threat actors, possessing even modest technical capability and competing to proliferate their variant of reality to the American people. 

National prioritisation of cyber-security, cyber-hygiene, and cyber resiliency will be needed to deter and to combat adversarial theft and manipulation of data and digital information warfare campaigns.

ICIT

Russian Hackers Posed as ISIS to Hack French TV Channel:

Responding To Russia´s Cyber Aggression:

Russian Military Was Behind Hacking Clinton Campaign:

Meet The Fancy Bears:

 

« ENISA’s Threat Rankings: From Malware To Cyber Spies
Four Steps To Managing Cyber Security Better »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Radiant Logic

Radiant Logic

Radiant Logic is a market-leading provider of federated identity solutions based on virtualization, and delivers simple, logical, and standards-based access to all identities within an organization.

Alan Boswell Group

Alan Boswell Group

We are a Group of Companies providing specialist Insurance Broking and Risk Management advice and services including Cyber Risk cover.

StrongKey

StrongKey

StrongKey (formerly StrongAuth) is a leader in Enterprise Key Management Infrastructure, bringing new levels of capability and data security at a price point significantly lower than other solutions.

Secarma

Secarma

Secarma provides penetration testing, security assessments, consultancy, and training services to ensure your digital infrastructure is secure from cybersecurity threats.

Zen360Consult

Zen360Consult

Zen360Consult provides Advisory and Training services in the field of Cyber Resilience, which includes Cyber Security /ISMS and Business Continuity.

NinjaJobs

NinjaJobs

NinjaJobs is a community-run job platform developed by information security professionals. We focusing strictly on cybersecurity positions.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

Cycode

Cycode

Cycode is the industry’s first source code control, detection, and response platform.

ioXt Alliance

ioXt Alliance

The ioXt Alliance is a group of manufacturers, industry alliances and government organizations dedicated to harmonizing best security practices in a highly connected world.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Dcode

Dcode

Dcode connects the tech industry and government to drive commercial innovation in the federal market.

Stanley Reid & Company (SRC)

Stanley Reid & Company (SRC)

Stanley Reid & Co is an Executive and Technical Search Firm serving the commercial market and the US Intelligence & Defense community. Our areas of expertise include Cybersecurity.

Berezha Security Group (BSG)

Berezha Security Group (BSG)

BSG is a cybersecurity consulting firm specializing in all aspects of application security and penetration testing.

ramsac

ramsac

ramsac provide secure, resilient IT management, cybersecurity, 24 hour support and IT strategy to businesses in London and the South East.

Iron Mountain

Iron Mountain

Iron Mountain Incorporated is a global business dedicated to storing, protecting and managing, information and assets.

SplxAI

SplxAI

Our mission at SplxAI is to secure and safeguard GenAI-powered conversational apps by providing advanced security and pentesting solutions, so neither your organization nor your user base get harmed.