[liberationtech] The untouchable hackers of St. Petersburg
Ronald Deibert
r.deibert at utoronto.ca
Fri Nov 12 14:04:56 PST 2010
November 12, 2010
http://www.theglobeandmail.com/news/national/time-to-lead/internet/the-untouchable-hackers-of-st-petersburg/article1795650/singlepage/#articlecontent
The untouchable hackers of St. Petersburg
By Ron Deibert and Rafal Rohozinski
Special to Globe and Mail Update
Committing seemingly victimless crimes, the exploits of the Koobface
Gang represent a huge and systematic security failure
There is an episode of Star Trek in which Captain Kirk and Spock are
confronted by their evil doppelgängers who are identical in every way
except for their more nefarious, diabolical character.
The social networking community Facebook has just such an evil
doppelgänger - and it is called Koobface.
Cybercrime thrives not just because of ingenuity and lawlessness, but
because of social media opportunities. Koobface (an anagram of
Facebook) succeeds by mimicking normal social networking behaviour. It
is like a digital amoeba, living parasitically on our sharing habits.
It leverages the most successful of all age-old criminal techniques -
our readiness to extend trust - with our eagerness to click on links.
We have become conditioned into a world of intense social interaction.
We click on website addresses and documents like mice clicking on
pellet dispensers. And it is that conditioned tendency that Koobface
exploits with precision.
We undertook this investigation as a continuation of our work on cyber
espionage that began with Tracking Ghostnet [http://www.theglobeandmail.com/news/technology/meet-the-canadians-who-busted-ghostnet/article732409
] and Shadows in the Cloud [http://www.theglobeandmail.com/news/technology/canadian-researchers-reveal-online-spy-ring-based-in-china/article1524228
]. In both cases, we found that the attackers' systems were built upon
off-the-shelf crimeware code and tradecraft, readily obtained and
applied either by state-based actors or commissioned from criminals
all too ready to serve as privateers to sell their wares to the
highest bidder.
We were intrigued: if the criminal merchants of code were ready to
engage in the high-end of the exploitation market - breaking into
government systems to obtain sensitive documents - then what was going
on in the streets, and the myriad globalized pathways of cyberspace
that now connect more than two-thirds of humanity?
As with those earlier cases, our lead technical researcher Nart
Villeneuve was able to take advantage of mistakes made on the part of
the attackers to secure their own infrastructure; our access was
almost comprehensive, allowing us insight into their inner workings
for a period of months.
What we found with Koobface gave us pause: clearly cybercrime is
profitable, but equally clearly, there is little incentive or even
basis for our existing institutions of policing to do much about it.
The entrée point for Koobface is almost irresistible: a link sent from
a fake "friend" prompting a visit to a video site that purportedly
reveals the recipient captured naked from a hidden web cam. Who
wouldn't follow that link? But for the hapless recipient, that one
click leads down a Kafka-esque rabbit hole of viruses and trojan
horses, and straight into the tentacles of the Koobface network.
The mechanisms put in place by Koobface operators to generate revenue
walk a very fine line, and are at times so subtle that it is
difficult, if not impossible to identify who, if anyone, is actually a
victim.
Although our investigation determined the Koobface gang drew revenues
of more than $2-million a year, the combined earnings were derived
from thousands of individual micro-transactions on the order of a
fraction of a penny each, spread across victims in dozens of national
jurisdictions. Each commandeered computer that clicked on an online ad
or downloaded a fake anti-virus package generated a cut for the gang.
So meticulous were the attackers that they created an automatic text
message alert to themselves each day summing up their spoils.
Without a victim, particularly a complainant, it is almost impossible
for a police force to justify the resources to investigate a case like
Koobface. Police officers ask: what's the crime? Prosecutors ask: what
or whom am I supposed to prosecute? In the case of Koobface, it is
almost as if the system were purposefully designed to fall between the
cracks of both questions.
Even more debilitating is the international character of Koobface.
Cybercrime networks succeed by hiding locally while leveraging a
global infrastructure. Electrons may move at speed of light, but legal
systems move at the speed of bureaucratic institutions, especially
across national borders. Living in St. Petersburg, Russia, the
Koobface gang might as well be living on Mars, so poorly developed are
the mechanisms of international law enforcement co-operation.
Although we turned over the entire Koobface database we acquired as
evidence to Canadian law enforcement, including evidence identifying
the individuals behind it, we were not surprised that there has been
no arrest or prosecution, for the reasons listed above.
We also worked with the broader security community who had studied
Koobface to notify the hosting companies and service providers upon
which Koobface had built its malignant enterprise: some 500,000
fraudulent Google blogger and Gmail accounts, and 20,000 Facebook
accounts. The action to disable these accounts will temporarily bring
the network to its knees, but not terminate it. Koobface will surely
live to see another day as long as the individuals behind it roam free.
Some may argue Koobface earned its operators a few million dollars on
a nearly victimless crime. Is that really something that warrants
concerted international policing and attention? Maybe not. But here it
is important to understand the broader ecosystem of which Koobface is
just one small example.
A recent study by Bell Canada suggested that $100-billion out of $174-
billion of revenue transiting Canada's telecommunications
infrastructure is "at risk." The same operator measured over 80,000
"zero day" attacks per day targeting computers on its network -
meaning, attacks that are so new the security companies have yet to
register them. These are staggering figures, which if translated into
physical terms - bank robberies and break-ins - would be prompting
politicians into immediate action.
There is another element of Koobface that should give us even more
pause. The Koobface gang had a certain charm and ethical restraint.
They communicated with security researchers about their intents and
their desire not to do major harm. They limited their crimes to petty
fraud, albeit massive in scale and scope. But the scary part is that
they could have easily done otherwise.
Thousands of compromised computers networked together with an
invisible tether controlled by a few individuals can be employed to
extract pennies from unsuspecting victims, as it was with Koobface, or
sensitive national security documents from government agencies, as it
was with Ghostnet and Shadows. It can be used to direct computers to
click on fake advertisements for Viagara, or marshal them together to
attack a meddlesome human rights website, as it is with increasing
frequency from Iran and Kazakhstan to Burma and Vietnam.
Criminal networks such as these are growing as fast as the social
networking platforms upon which they parasitically feed. Koobface is
just one example of an entire ecosystem that threatens to put at risk
the very entity on which it depends - a free and open cyberspace. How
to clean up and control it, without undermining the positive
characteristics of social networking we have all come to enjoy, is one
of the major challenges of global security policy today.
Ron Deibert is Director of the Canada Centre for Global Security
Studies and Citizen Lab, Munk School of Global Affairs, University of
Toronto. Rafal Rohozinski is CEO of the SecDev Group and Psiphon Inc,
and Senior Fellow, Munk School of Global Affairs, University of
Toronto. Together they are the principal investigators of the
Information Warfare Monitor.
Ronald J. Deibert
Director, The Citizen Lab
Munk School of Global Affairs
University of Toronto
r.deibert at utoronto.ca
http://deibert.citizenlab.org/
twitter.com/citizenlab
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.stanford.edu/pipermail/liberationtech/attachments/20101112/61f56f38/attachment.html>
More information about the liberationtech
mailing list