The Cellar

The Cellar (http://cellar.org/index.php)
-   Technology (http://cellar.org/forumdisplay.php?f=7)
-   -   Malware hits industrial equipment (http://cellar.org/showthread.php?t=23629)

Lamplighter 09-25-2010 07:25 PM

Malware hits industrial equipment
 
I'm posting this article about "malware" because experts are saying it was authored by a government, not some kid working in his basement.

BITS article

September 24, 2010, 8:41 pm
Malware Hits Computerized Industrial Equipment
By RIVA RICHMOND

Quote:

The technology industry is being rattled by a quiet and sophisticated
malicious software program that has infiltrated factory computers.
The malware, known as Stuxnet, was discovered by VirusBlokAda,
<snip>in mid July, at least several months after its creation.
Quote:

Security experts say Stuxnet attacked the software in specialized industrial control equipment
made by Siemens by exploiting a previously unknown hole in the Windows operating system.
The malware marks the first attack on critical industrial infrastructure
that sits at the foundation of modern economies.
Quote:

Eric Chien, the technical director of Symantec Security Response,
a security software maker that has studied Stuxnet, said it appears
that the malware was created to attack an Iranian industrial facility.
Security experts say that it was likely staged by a government or
government-backed group, in light of the significant expertise
and resources required to create it.
Quote:

“It’s impossible this was created by some teenager in his basement,”
Mr. Chien said. “The amount of resources and man hours to put this together,”
he said, show “it has to be something that was state originated.”

spudcon 09-25-2010 08:36 PM

Oh, now I feel bad. No wonder Iran's leader has to lie about everything. He's got a virus!

xoxoxoBruce 09-25-2010 08:36 PM

Their speculating it's a nation state. It's using several previously unknown holes in windows. It migrates to computers that don't connect to the web. It's not just Iran, India, Malaysia and eastern Europe too. It does no harm unless it finds specific industrial controls, like the unauthorized Siemens controls, Russia sold to Iran.

ZenGum 09-26-2010 12:40 AM

Quote:

Originally Posted by xoxoxoBruce (Post 684976)
Their speculating it's a nation state. It's using several previously unknown holes in windows. It migrates to computers that don't connect to the web. It's not just Iran, India, Malaysia and eastern Europe too. It does no harm unless it finds specific industrial controls, like the unauthorized Siemens controls, Russia sold to Iran.


So maybe it was made and released by Siemens? You hack us, we hack you back?

Or are the machines about to take over for real?

xoxoxoBruce 09-26-2010 12:59 AM

I'd bet on China.

Gravdigr 09-26-2010 01:10 AM

Quote:

Originally Posted by ZenGum (Post 685019)
Or are the machines about to take over for real?

Didn't that happen at 2:14am on August 29, 1997?

Flint 09-26-2010 01:46 AM

Very "Ghost in the Shell" . . . (btw, a 15 year-old film)

tw 09-26-2010 01:26 PM

Quote:

Originally Posted by xoxoxoBruce (Post 685023)
I'd bet on China.

Industry polls (professional estimations) put internet espionage and malware mostly from the US government (36%) and from the Chinese government (33% of the time).

tw 09-26-2010 01:30 PM

Quote:

Originally Posted by ZenGum (Post 685019)
So maybe it was made and released by Siemens? You hack us, we hack you back?

IEEE Spectrum reported on the (suspected) complete compromise of the entire Greek telephone system. Hacking was that widespread and that serious a national security issue. The article did not even try to suggest who might have done it. List all the usual suspects.

tw 09-26-2010 02:06 PM

From the NY Times of 25 Sept 2010:
Quote:

Iran Fights Malware Attacking Computers
Stuxnet, which computer experts say is a far cry from common computer malware that has affected the Internet for years. A worm is a self-replicating malware computer program. A virus is malware that infects its target by attaching itself to programs or documents.

Stuxnet, which was first publicly identified several months ago, is aimed solely at industrial equipment made by Siemens that controls oil pipelines, electric utilities, nuclear facilities and other large industrial sites. While it is not clear that Iran was the main target - the infection has also been reported in Indonesia, Pakistan, India and elsewhere - a disproportionate number of computers inside Iran appear to have been struck, according to reports by computer security monitors. ...

Based on what he knows of Stuxnet, Mr. Lewis said, the United States is "one of four or five places that could have done it - the Israelis, the British and the Americans are the prime suspects, then the French and Germans, and you can't rule out the Russians and the Chinese."

Griff 09-26-2010 04:53 PM

Quote:

Originally Posted by xoxoxoBruce (Post 685023)
I'd bet on China.

A quick glance at politics and the application of Occam's razor says US or Israel. If it really is a State.

xoxoxoBruce 09-26-2010 08:16 PM

Israel was my first thought, but energy hungry China has a big stake in keeping the middle east from blowing up, and an increasing investment in Africa, Greece and around the Mediterranean. It's a crap shoot at this point.

The thing that got me was other countries found it easy to remove with commercially available anti-virus programs. Does the UN embargo on Iran include Norton?

sexobon 09-27-2010 02:25 AM

Quote:

Originally Posted by tw (Post 685088)
From the NY Times of 25 Sept 2010:
Quote:

Stuxnet, which was first publicly identified several months ago, is aimed solely at industrial equipment made by Siemens that controls oil pipelines, electric utilities, nuclear facilities and other large industrial sites.

Quote:

Originally Posted by xoxoxoBruce (Post 685142)
The thing that got me was other countries found it easy to remove with commercially available anti-virus programs. Does the UN embargo on Iran include Norton?

A surgical strike of this nature can have reconnaissance value in that previously unknown facilities of interest may be revealed through monitoring of internal message traffic about the strike's impact. Disruption may simply be a cover for this activity, especially since it is readily recoverable.

tw 09-27-2010 09:07 PM

Quote:

Originally Posted by sexobon (Post 685169)
A surgical strike of this nature can have reconnaissance value in that previously unknown facilities of interest may be revealed through monitoring of internal message traffic about the strike's impact.

Surgical? Are you a disciple of pathetic myths constantly promoted by Air Force Generals?

We have two choices. First, negotiation now made so much more effective since America has restored relations with Russia, Turkey, some Caspian Sea nations, and other 'much more at risk' nations. That also means we have intelligence and covert options due to cooperation both inside and surrounding Iran.

Second, or we could attack. Since the number of sites are hundreds, many in virtually bomb proof locations, and maybe half remain secret, well, what are you going to bomb? An attack means troops on the ground. There is no other military option. That means virtually all intelligence and covert options are lost. A failed attack means things are far worse AND that America has no more options. That means American integrity - one of our greatest assets in the region - is lost. There is no military option without ground troops. In poker, it is called "all in".

You have listened to Turkey's Gul or Russian foreign diplomats discussing this problem? Now that Obama has restored relations with Russia, then Russia even canceled their air defense sale to Iran. And is rumored to have restored intelligence exchanges with America.

More important is Iran's problem getting materials and machines necessary to make parts to tolerances required to enrich uranium. And other problems implied by the above malware rumors.

How did we discover Qom? American intelligence was routinely reading e-mail from their scientists. These made possible because countries actually at risk (Jordan, Syria, Turkey, Russia, etc) are even more concerned. Why are they not complaining that America are not doing enough? Because we have little idea how successful the US government has been. Because countries at risk are in agreement with what the Obama administration has been doing.

Israel is a wild card due to a government (Likud) that is so extremist. Israeli actions could only make things worse unless their actions are done with the cooperation of Iranian neighbors and without American cooperation. Even the Israelis know they must also put troops (special forces) on the ground if using the military option.

Anyone promoting an American military option is their own fool. Not to be confused with something completely different - what in poker is called a "bluff". But again, that is why the only viable solution is found in negotiation (and covert operations made possible only if doing negotiation).

classicman 09-27-2010 09:33 PM

Depends on if we have help with that strike ...

Aliens have deactivated British and US nuclear missiles

xoxoxoBruce 09-28-2010 12:15 AM

Running off half cocked again.:rolleyes:

sexobon's "surgical strike was referring to using this dedicated worm/virus to ferret out how much Siemens' equipment they have, and how it's distributed. We already know what type of processes use which Siemens' gear and software.

sexobon 09-28-2010 06:42 AM

Exactly.

[T]w, xoB interpreted my post as I intended for it to be understood. When I said "A surgical strike of this nature", I was referring to the virtual attack using the narrow spectrum Stuxnet.

I gather from the following quote that you'd agree we have the ability to benefit from their internal communications "fallout."

Quote:

Originally Posted by tw (Post 685293)
...negotiation now made so much more effective since America has restored relations with Russia, Turkey, some Caspian Sea nations, and other 'much more at risk' nations. That also means we have intelligence and covert options due to cooperation both inside and surrounding Iran.

That's why I'm suggesting the primary reason for the attack may have been reconnaissance rather than disruption.

classicman 09-28-2010 08:29 AM

:gray: But, but but ... what about the Aliens? :gray:

tw 09-28-2010 11:49 AM

Quote:

Originally Posted by sexobon (Post 685341)
That's why I'm suggesting the primary reason for the attack may have been reconnaissance rather than disruption.

Reconnaissance makes more sense. It is harder to detect. Disruption would cause investigations that might discover the malware.

Disruptions must target the few parts that are difficult to obtain or manufacturer. Malware is unlikely to properly target such parts.

Consider how easy it can be accomplished. Take your own computer. The NIC or 'USB to ethernet' adaptor can contain malware that anti-virus software would never detect. Malware could be triggered when needed. Nobody would know it exists before hand. And no anti-virus software would find it before being triggered.

tw 10-01-2010 09:08 PM

From the NY Times of 25 Sept 2010:
Quote:

A Silent Attack, but Not a Subtle One
Security specialists contrast Stuxnet with an intrusion discovered in the Greek cellphone network in March 2005. It also displayed a level of skill that only the intelligence agency of some foreign power would have.
From the NY Times of 29 Sept 2010:
Quote:

In a Computer Worm, a Possible Biblical Clue
Deep inside the computer worm that some specialists suspect is aimed at slowing Iran's race for a nuclear weapon lies what could be a fleeting reference to the Book of Esther, the Old Testament tale in which the Jews pre-empt a Persian plot to destroy them. ...

The malicious code has appeared in many countries, notably China, India, Indonesia and Iran. But there are tantalizing hints that Iran's nuclear program was the primary target. Officials in both the United States and Israel have made no secret of the fact that undermining the computer systems that control Iran's huge enrichment plant at Natanz is a high priority. (The Iranians know it, too: They have never let international inspectors into the control room of the plant, the inspectors report, presumably to keep secret what kind of equipment they are using.) ...

The reports on Iran show a fairly steady drop in the number of centrifuges used to enrich uranium at the main Natanz plant. After reaching a peak of 4,920 machines in May 2009, the numbers declined to 3,772 centrifuges this past August, the most recent reporting period. That is a decline of 23 percent ...

Computer experts say the first versions of the worm appeared as early as 2009 and that the sophisticated version contained an internal time stamp from January of this year. ...
There are many reasons to suspect Israel’s involvement in Stuxnet. ...

Mr. Blitzblau noted that the worm hit India, Indonesia and Russia before it hit Iran, though the worm has been found disproportionately in Iranian computers. He also noted that the Stuxnet worm has no code that reports back the results of the infection it creates. Presumably, a good intelligence agency would like to trace its work.

wolf 10-02-2010 10:55 PM

it's pretty clear that what's going on here is that Colossus is displeased.

I heard a news radio report today that indicated that most of the transmission was accomplished using infected USB devices. Virus transmission via what we used to call sneakernet. How cool is that?

xoxoxoBruce 10-02-2010 11:38 PM

I read that was how it was moved from the Iranian Industrial plant computers that are connected to the net, to the ones that aren't. I didn't state however, who did the moving, or if they knew they were doing it.

tw 10-03-2010 01:26 PM

From the Washington Post of 2 Oct 2010:
Quote:

Spy chief says Iran able to fight computer worm
The destructive Stuxnet worm has surprised experts because it is the first one specifically created to take over industrial control systems, like those at power plants, rather than just steal or manipulate data.
Apparently, the reason why it can do this and remain undetected - it also reprograms itself.

Happy Monkey 10-04-2010 03:42 PM

It doesn't so much reprogram itself as check for updates from the programmers.

I wonder if it would be possible to send out an "update" with the biggest possible version number and a harmless payload, and let it spread its own antidote.

xoxoxoBruce 10-04-2010 05:58 PM

How can it check for updates when it's on a machine isolated from the net?

Happy Monkey 10-05-2010 12:41 PM

The same way it got there in the first place. It doesn't check a home server (that would make it too easy to track back to that home server), it checks any machines it can contact for newer infections, and grabs them. An isolated machine would have to wait for an infected USB drive, or whatever else gave it its initial infection.

classicman 10-05-2010 12:55 PM

How does the newer, updated infection get to the "other machines"?

Happy Monkey 10-05-2010 01:06 PM

The same way the older, non-updated infection got there. Over the internet, if they're connected; USB drives or other infected media if they're not.

classicman 10-05-2010 01:15 PM

I thought they weren't connected to the internet. Wasn't that part of the issue? How are these USB's getting there.
Oh forget it - I'll just wait for the movie to come out.

TheMercenary 10-05-2010 01:29 PM

Quote:

Originally Posted by wolf (Post 686225)
it's pretty clear that what's going on here is that Colossus is displeased.

I heard a news radio report today that indicated that most of the transmission was accomplished using infected USB devices. Virus transmission via what we used to call sneakernet. How cool is that?

I still don't see what the problem is. I guess it beats a tactical nuke.

Happy Monkey 10-05-2010 02:03 PM

Quote:

Originally Posted by classicman (Post 686697)
I thought they weren't connected to the internet. Wasn't that part of the issue? How are these USB's getting there.

It spreads to computers that are on the internet, in hopes of getting on CDs or USB drives that are transferred to the ones that aren't. Even computers that aren't on the internet generally need information transferred to or from them at some point, and there's always the vulnerability of some employee wanting to listen to their MP3s. Users are always the biggest potential vulnerability.

classicman 10-05-2010 02:08 PM

Gotcha. thanks.

tw 10-05-2010 03:54 PM

Quote:

Originally Posted by Happy Monkey (Post 686722)
It spreads to computers that are on the internet, in hopes of getting on CDs or USB drives that are transferred to the ones that aren't. Even computers that aren't on the internet generally need information transferred to or from them at some point, and there's always the vulnerability of some employee wanting to listen to their MP3s.

That was the point of independent analysis. This code was designed to be spread even without network connections. Sneakernet is one potential path. Some of the likely suspects include Russian salesmen. Flash drives are only one infection path.

But again, see that ethernet card, a 'USB to ethernet', or even a keyboard. All could be 'carriers' of malware. According to analysis, this malware could be undetected until it suddenly infects a machine. And then morphs into something different so as to be undetectable again. One reason why analysts suggest this was done by more than just hackers.

These Siemens controllers are routinely sold in third party markets. Iran would be purchasing many. More places where hackers could infect machines before hardware was delivered to Iran. We do not even know what hardware is infecting controllers. Most of what is published is only informed speculation. We do not even know if the malware purpose is reconnaissance or hardware destruction due to (according to independent analysts) malware complexity.

Remember, other nations are at greater risk and more concerned about Iran's nuclear program - including Russia.

xoxoxoBruce 10-05-2010 11:41 PM

Agreed, much of what we know, is from articles that are mostly speculation.

classicman 10-11-2010 01:28 PM

Iran may have executed nuclear staffers over Stuxnet
Quote:

Intelligence sources report information reaching the West in the past week that Iran has put to death a number of atomic scientists and technicians suspected of helping plant the Stuxnet virus in its nuclear program. The admission by Ali Akbar Salehi, head of the Atomic Energy Organization, on Friday, Oct. 8 - the frankest yet by any Iranian official - that Western espionage had successfully penetrated its nuclear program is seen as bearing out those reports.

The Atomic Energy Organization has published booklets which Salehi said will "alert personnel to Western techniques for luring them into espionage." They "spell out precautionary measures to protect information and the life of scientists," he said.

This phrase was taken by the personnel receiving the booklet as a death threat for any who defy its directives.
From here

Dunno how valid this is, but it does offer another aspect to this.

Happy Monkey 11-16-2010 03:11 PM

Some interesting updates.

Apparently it was targetted at facilities with over a certain number of components manufactured by particular vendors, and set to particular configurations. Very targetted.

TheMercenary 01-16-2011 09:46 AM

Another update....

Very interesting. So now it is pretty obvious where it came from.

http://www.nytimes.com/2011/01/16/wo...16stuxnet.html

xoxoxoBruce 01-16-2011 10:43 AM

That's an interesting scenario, no proof, but a lot of circumstantial evidence.

TheMercenary 01-16-2011 01:11 PM

A number of "un-named sources" most likely contributed to the article. I hope they stick it to the Iranians. And how about those targeted killings of the engineers, makes you wonder.

xoxoxoBruce 01-16-2011 01:13 PM

Mossad.

TheMercenary 01-16-2011 02:42 PM

My guess as well, if not them, their agents. More power to them. I hope we are giving them lots of intel support.

Lamplighter 05-28-2012 10:29 AM

SlashGear
Chris Davies
May 28th 2012

Flame cyber-espionage discovered in vast infection net
Quote:

A new and fast spreading malware tipped to already dwarf the notorious Stuxnet has been identified,
codenamed Flame and believed to be state-run cyberespionage affecting PCs in Iran and nearby countries.

Spotted by Kaspersky Lab, “Worm.Win32.Flame” blends features from backdoor, trojan and worm malware,
and once surreptitiously loaded onto a target machine can monitor network traffic, local use,
grab screenshots and record audio, sending all that data back to its home servers.
Believed to be active from at least March 2010, Flame is tipped to be 20x more prevalent than Stuxnet.

Iran is the most common place Kaspersky have discovered Flame,
but it’s also been discovered in Israel, Palestine, the Sudan, Syria, Lebanon, Saudi Arabia and Egypt;
there are “probably thousands of victims worldwide” the researchers estimate.
Interestingly, there’s a broad spread of targeted computers, across academia,
private companies, specific individuals and others; the operators appear to be cleaning up after themselves, too,
only leaving Flame active on the most interesting machines, and deleting it from those with little worth.
<snip>

What has researchers particularly concerned is the scale of Flame’s monitoring abilities.
Rather than merely recording VoIP calls, the malware can turn on the PC’s microphone and
surreptitiously begin its own recordings, for instance, while screenshots are taken
when “interesting” apps, such as instant messaging clients, are on-screen.
Meanwhile, if the computer has Bluetooth, it can scan for nearby devices and
then use the short-range wireless technology to create secret peer-to-peer connections
while embedding details on Flame’s status in the “discoverable device” information.
<snip>

Lamplighter 05-31-2012 09:29 AM

NY Times
By NICOLE PERLROTH
Published: May 30, 2012

Researchers Find Clues in Malware

Quote:

SAN FRANCISCO — Security experts have only begun examining the thousands of lines of code that make up Flame, an extensive, data-mining computer virus that has been designed to steal information from computers across the Middle East, but already digital clues point to its creators and capabilities.
<snip>

Flame, these researchers say, shares several notable features with two other major programs that targeted Iran in recent years. The first virus, Duqu, was a reconnaissance tool that researchers say was used to copy blueprints of Iran’s nuclear program. The second, Stuxnet, was designed to attack industrial control systems and specifically calibrated to spin Iranian centrifuges out of control.

Because Stuxnet and Duqu were written on the same platform and share many of the same fingerprints in their source code, researchers believe both were developed by the same group of programmers. Those developers have never been identified, but researchers have cited intriguing bits of digital evidence that point to a joint American-Israeli effort to undermine Iran’s efforts to build a nuclear bomb.

For example, researchers at Kaspersky Lab tracked the working hours of Duqu’s operators and found they coincided with Jerusalem local time. They also noted that Duqu’s programmers were not active between sundown on Fridays and sundown on Saturdays, a time that coincides with the Sabbath when observant Jews typically refrain from secular work.<snip>

Unlike Duqu and Stuxnet, security researchers say, Flame is remarkable in that it has been able to evade discovery for five years — which was impressive given its size. Most malware is a couple hundred kilobytes in size. Flame is 20 megabytes. “It was hiding in plain sight,” said Mr. Schouwenberg. “It was designed in such a way that it was nearly impossible to track down.”
Researchers noted that Flame spreads through more conservative means. Researchers say that while Stuxnet had the ability to replicate autonomously, Flame can spread from machine to machine only when prompted by the attacker.

Cyber Wolf 05-31-2012 02:55 PM

As much a pain as it can be, it's stuff like this that makes me glad I routinely unplug my webcam, mic and headset when I'm not actively using them.

Not that my computer has anything of interest on it... and anyone spying on me would get mostly me singing and good shots of my more lived-in T-shirts...

Lamplighter 08-10-2012 10:37 AM

And the beat goes on....

NY Times
NICOLE PERLROTH
8/19/12

Virus Seeking Bank Data Is Tied to Attack on Iran
Quote:

A security firm said Thursday that it had discovered what it believed
was the fourth state-sponsored computer virus to surface in the Middle East
in the last three years, apparently aimed at computers in Lebanon.

The firm, Kaspersky Lab, said that the virus appeared to have been written
by the same programmers who created Flame, the data-mining computer virus
that was found to be spying on computers in Iran in May,
and that it might be linked to Stuxnet, the virus that disrupted
uranium enrichment work in Iran in 2010.

The latest virus, nicknamed Gauss after a name found in its code,
has been detected on 2,500 computers, most in Lebanon, the firm said.
Its purpose appeared to be to acquire logins for e-mail and instant messaging accounts,
social networks and, notably, accounts at certain banks — a function more typically found
in malicious programs used by profit-seeking cybercriminals.
<snip>

Kaspersky researchers said Gauss contained a “warhead” that seeks
a very specific computer system with no Internet connection and installs itself only if it finds one.
“It’s done in such a clever way that security researchers cannot analyze it,
because they don’t know the decryption key that unlocks the true purpose of that program,”
Mr. Raiu said.

xoxoxoBruce 08-11-2012 02:15 AM

These new profesional viruses are from Kaspersky. They're spreading them around so they can find them and build street creds. :haha:

Lamplighter 09-17-2012 09:35 AM

Here is a fascinating l-o-n-g article about the reverse-engineering
of the malware known as Flame, which was designed to attack the Iranian nuclear site computers.

I won't spoil it for laymen/geeks that want to read it for themselves.
But this article is almost enough for someone to make a movie of the story
--- even though the denouement is not quite finished.

Wired
Kim Zetter
0/17/12
Coders Behind the Flame Malware Left Digital Clues on Control Servers

Quote:

The attackers behind the nation-state espionage tool known as Flame
accidentally left behind tantalizing clues that provide information about their identity
and that suggest the attack began earlier and was more widespread than previously believed.

Researchers have also uncovered evidence that the attackers may have produced
at least three other pieces of malware or variants of Flame that are still undiscovered.

The information comes from clues the attackers inadvertently left behind
on two command-and-control servers they used to communicate with infected machines
and steal gigabytes of data from them.

<snip>

Lamplighter 06-27-2013 08:53 PM

The "what" of Stuxnet has been widely described and discussed.
But the "who" was not known, even though many suspected Israel.

... Now the U.S. (NSA) and Israel are being publicly identified.


Washington Post
Greg Miller and Sari Horwitz
6/27/13

Justice Dept. targets general in leak probe
A retired four-star Marine Corps general who served as the nation’s second-ranking military officer
is a target of a Justice Department investigation into a leak of information about
a covert U.S.-Israeli cyberattack on Iran’s nuclear program, a senior Obama administration official said.

Retired Gen. James E. “Hoss” Cartwright served as deputy chairman of the Joint Chiefs of Staff
and was part of President Obama’s inner circle on a range of
critical national security issues before he retired in 2011.
<snip>

Stuxnet was part of a broader cyber campaign called Olympic Games that was disclosed
by the New York Times last year as one of the first major efforts by the United States
to use computer code as a destructive weapon against a key adversary.

The investigation into the Stuxnet leak was launched in June 2012
by Attorney General Eric H. Holder Jr. and gained momentum in recent months
amid indications that prosecutors were putting pressure on a range of
current and former senior officials suspected of involvement.

The leaks surrounding Stuxnet exposed details about what had been
one of the most closely held secrets in the U.S. intelligence community,
an ambitious effort by the National Security Agency in collaboration
with the Israeli government to devise computer code that could cripple
Iran’s alleged effort to pursue a nuclear bomb.

Lamplighter 09-01-2013 08:43 AM

I have been fascinated by the concept of the Stuxnet attacks
... "the malware programs thought to have been jointly developed by the U.S. and Israel
that targeted the Iranian nuclear program, but quickly made its way into the digital wild".

I've often thought this could become a great movie genre,
but so far there has not been a lot of public information.
That is changing.

This article in the Washington Post has links to all sorts of information,
starting at the U.S. group called "Technical Access Operations"

Washington Post
Andrea Peterson
8/29/13

The NSA has its own team of elite hackers
Quote:

Our Post colleagues have had a busy day.
First, they released documents revealing the U.S. intelligence budget
from National Security Agency (NSA) leaker Edward Snowden.
Then they recounted exactly how the hunt for Osama bin Laden went down.
In that second report, Craig Whitlock and Barton Gellman shared a few tidbits
about the role of the government’s hacking unit, Tailored Access Operations (TAO) in the hunt,
writing that TAO “enabled the NSA to collect intelligence from mobile phones
that were used by al-Qaeda operatives and other ‘persons of interest’ in the bin Laden hunt.”

So just what is Tailored Access Operations?
According to a profile by Matthew M. Aid for Foreign Policy, it’s a highly secret
but incredibly important NSA program that collects intelligence about foreign targets
by hacking into their computers, stealing data, and monitoring communications.
Aid claims TAO is also responsible for developing programs that could destroy
or damage foreign computers and networks via cyberattacks if commanded to do so by the president.
<snip>

Lamplighter 01-16-2014 08:26 AM

Stuxnet is now being attributed to the NSA.

And NSA doesn't need the internet ISP's because it's not just hacking the software.
This hardware works even when the computer is "turned off".

NY Times

DAVID E. SANGER and THOM SHANKER
JAN. 14, 2014

N.S.A. Devises Radio Pathway Into Computers

Quote:

WASHINGTON — The National Security Agency has implanted software in nearly
100,000 computers around the world that allows the United States to conduct
surveillance on those machines and can also create a digital highway for launching cyberattacks.

The technology, which the agency has used since at least 2008, relies on a covert channel of
radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously
into the computers.

In some cases, they are sent to a briefcase-size relay station
that intelligence agencies can set up miles away from the target.
<snip>
The N.S.A.'s efforts to reach computers unconnected to a network have relied
on a century-old technology updated for modern times: radio transmissions.

But the Iranians and others discovered some of those techniques years ago.

The hardware in the N.S.A.'s catalog was crucial in the cyberattacks on Iran’s nuclear facilities,
code-named Olympic Games, that began around 2008 and proceeded through the summer of 2010,
when a technical error revealed the attack software, later called Stuxnet.<snip>

The :tinfoil: :tinfoil: :tinfoil: people may have been right all along.

glatt 01-16-2014 09:29 AM

So how did they get those circuit boards into those computers?

At the manufacturer?

Or a cat burglar type black ops nerd rappelling down through a skylight and sneaking past all the laser beam alarm systems with his toolbox of torx wrenches and grounding wrist straps?

Lamplighter 01-16-2014 10:10 AM

1 Attachment(s)
Quote:

...So how did they get those circuit boards into those computers...
You may be using a similar USB devise in your own daily life...

Attachment 46592

As I understand these things, once you set up receiving on your tv,
you can turn off your (controlling) computer ... the tv-show continues.

Molasar 01-18-2014 06:43 AM

http://www.bbc.co.uk/news/technology-25780908

even domestic appliances are getting in on the act now.
fridges sending spam, FFS, what next?

xoxoxoBruce 01-18-2014 07:09 AM

This rush to be able to control everything you own/rent, car, thermostat, lights, appliances, baby monitor, security, from your phone, is 50% for convenience, 50% for look-what-I-got.

Stop, drop, roll, think. If you can do it, someone else can do it.
Do you want to trade your safety/security for the gee-whiz-factor, or the I-forgot-but-I-can-do-it-from-here?


All times are GMT -5. The time now is 07:33 PM.

Powered by: vBulletin Version 3.8.1
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.