Welcome! These forums will be deactivated by the end of this year. The conversation continues in a new morph over on Discord! Please join us there for a more active conversation and the occasional opportunity to ask developers questions directly! Go to the PS+ Discord Server.

The TITANs cometh

18 posts / 0 new
Last post
root root's picture
The TITANs cometh
root@The TITANs cometh [hr] Maybe the TITANs did it, but I'm betting on a certain nation state that I won't name in the interest of not bringing automated hacking attention to a website I like.
[ @-rep +1 | c-rep +1 | g-rep +1 | r-rep +1 ]
Rhyx Rhyx's picture
Re: The TITANs cometh
"There are a lot of new, unknown techniques being used that we have never seen before," he said These include tricks to hide itself on PLCs and USB sticks as well as up to six different methods that allowed it to spread." Can you bet that now that they have that key they will soon discover other systems that seemed clean until now with worms on them? This does in a way tickle my inner conspiracy theorist that's always thought Microsoft and the world's intelligence agencies had a back door deal going on.
The Doctor The Doctor's picture
Re: The TITANs cometh
Rhyx wrote:
Can you bet that now that they have that key they will soon discover other systems that seemed clean until now with worms on them?
Word on the street has it that the rootkit deployed by Stuxnet was custom-built, so it would not surprise at all.
Rhyx wrote:
This does in a way tickle my inner conspiracy theorist that's always thought Microsoft and the world's intelligence agencies had a back door deal going on.
I have always leaned toward the hypothesis that the intelligence agencies have some people who are more on the ball than the software development companies are. Do you remember the situation regarding the NSA and the Lucifer algorithm in 1977? That said, I think some pundits are putting a little too much emphasis on the nation-state hypothesis. If any suspect the involvement of small, highly talented groups of computer hackers who care not for such things but have their own ideals and purposes, none have spoken of it.
root root's picture
Re: The TITANs cometh
root@The TITANs cometh [hr]
The Doctor wrote:
That said, I think some pundits are putting a little too much emphasis on the nation-state hypothesis. If any suspect the involvement of small, highly talented groups of computer hackers who care not for such things but have their own ideals and purposes, none have spoken of it.
There are two ways to hack a complex control system at the assembly level. Either you built it, or you have the resources to reverse engineer it. Complex industrial control systems are not a dime a dozen, so the reverse engineering team would have to find a way to get access to a few million dollars worth of equipment form Seimens, and enough equipment to go about the reverse engineering process. This stack of equipment is shipped out to few enough locations that the only groups with enough sway to make records of that purchase disappear are nation states. And that is not even including the question of how the hell they got access to Windows source code.
[ @-rep +1 | c-rep +1 | g-rep +1 | r-rep +1 ]
CodeBreaker CodeBreaker's picture
Re: The TITANs cometh
I think the current theory is that whichever nationstate (I wonder which group that could be) managed to create this little beaut of a virus somehow had access to the actual design articles for the hardware, and that they didn't reverse engineer them. So that means either they paid off a lot of people in Seimens, or Shadowrun is a lot more realistic than I once thought. Either way it is worrying. I hear it makes use of 3 separate Day 0 exploits. I haven't really been following virus design for a few years, but am I correct in saying that that is still quite extraordinary? Honestly this is great inspiration for games. These are the kinds of things that are flying about all over the place in Eclipse Phase. This is the quality of intrusions you might expect to see when you have
Spoiler: Highlight to view
a Seed AI running an organisation like Firewall
. Its kind of awesome.
-
root root's picture
Re: The TITANs cometh
root@The TITANs cometh [hr] I wouldn't jump too quickly on deciding which group made and released this first war program. There are a number of groups with the interest and the ability to set this up, and it might not even have been one of Iran's enemies. And this is totally the kinds of hacks I think exist in Eclipse Phase. Computer security might have gotten better by orders of magnitude, but the possible vectors of attack will have grown much faster.
[ @-rep +1 | c-rep +1 | g-rep +1 | r-rep +1 ]
nezumi.hebereke nezumi.hebereke's picture
Re: The TITANs cometh
root wrote:
There are two ways to hack a complex control system at the assembly level. Either you built it, or you have the resources to reverse engineer it.
That is not quite true. A lot of those SCADA programs are designed to run on a normal OS, like Windows, and the company that designed them often do not do a lot of post-deployment patches. That means that, if it's designed for say Windows 95, it may not run on Windows 98, and it definitely won't run on XP. So if you find an exploit in 95 (there are a lot), you can compromise the SCADA with little or no knowledge of how the SCADA system works. Okay, you're not hacking it at the SCADA system's assembly code, but you're hacking it low enough that it may as well be.
urdith urdith's picture
Re: The TITANs cometh
root wrote:
root@The TITANs cometh [hr] Maybe the TITANs did it, but I'm betting on a certain nation state that I won't name in the interest of not bringing automated hacking attention to a website I like.
Current rumors around this incident focus on the Israelis as the prime candidates. I think Seed AI's ranked 5th in the list of possible sources. ^_^

"The ruins of the unsustainable are the 21st century’s frontier."
— Bruce Sterling

CodeBreaker CodeBreaker's picture
Re: The TITANs cometh
Anyone interested in Stuxnet should have a read of Symantecs PDF breakdown, its a good read. http://www.symantec.com/content/en/us/enterprise/media/security_response...
-
The Doctor The Doctor's picture
Re: The TITANs cometh
root wrote:
There are two ways to hack a complex control system at the assembly level. Either you built it, or you have the resources to reverse engineer it. Complex industrial control systems are not a dime a dozen, so the reverse engineering team would have to find a way to get access to a few million dollars worth of equipment form Seimens, and enough equipment to go about the reverse engineering process.
There are some very talented SCADA hackers out there who simply work the night shift so that they can play around with and learn about what they work with. Or who probably work for contracting companies that set up SCADA systems. Just as, many years ago, some phone phreaks used to try to get jobs with AT&T so that they could learn more about the technologies that underlied telephony of the era. However, for a well funded organization, it would not surprise if the scenario you posit has happened.
root wrote:
This stack of equipment is shipped out to few enough locations that the only groups with enough sway to make records of that purchase disappear are nation states. And that is not even including the question of how the hell they got access to Windows source code.
They probably asked for it, just like the NSA did. For certain potentially highly sensitive applications, TLAs have asked for the source code for internal review under NDA before filing purchase orders. Some of their findings are very interesting, also - the NSA's Windows Security Guides make for fascinating reading.
The Doctor The Doctor's picture
Re: The TITANs cometh
CodeBreaker wrote:
I think the current theory is that whichever nationstate (I wonder which group that could be) managed to create this little beaut of a virus somehow had access to the actual design articles for the hardware, and that they didn't reverse engineer them. So that means either they paid off a lot of people in Seimens, or Shadowrun is a lot more realistic than I once thought. Either way it is worrying. I hear it makes use of 3 separate Day 0 exploits. I haven't really been following virus design for a few years, but am I correct in saying that that is still quite extraordinary?
They really needed copies of the firmware for the hardware and not the hardware itself. Dumping EPROMs is not difficult, nor is getting hold of flashable firmware images from an FTP server (say) or someone's e-mail (unlikely, but worse things for OPSEC have happened over e-mail). I heard four zero-days. I got my hands on a copy of Stuxnet that I plan on reversing soon, so hopefully I will have some harder information to work from. As for using so many weaponized exploits in its transmission vector.. so far as I know that is highly unusual. At least, none of my colleagues who are in a position to talk about such say they have found any malware which packages so many.
The Doctor The Doctor's picture
Re: The TITANs cometh
root wrote:
And this is totally the kinds of hacks I think exist in Eclipse Phase. Computer security might have gotten better by orders of magnitude, but the possible vectors of attack will have grown much faster.
To say nothing of smarter. It would not surprise if some of the malware in EP was itself an AI construct, with its own stats and skills. Or perhaps even a delta fork of a cracker, so heavily customized that it may as well be an AI.
The Doctor The Doctor's picture
Re: The TITANs cometh
nezumi.hebereke wrote:
That is not quite true. A lot of those SCADA programs are designed to run on a normal OS, like Windows, and the company that designed them often do not do a lot of post-deployment patches.
The command and control software does; some control systems for certain machinery require a Windows machine connected over an industrial interface like GPIB or somesuch. It should also be kept in mind that some software manufacturers will declare a customer out of license compliance and cut off support if the customer messes with the system too much. Sadly, this sometimes includes installing hotfixes or hardening the machines.
Decivre Decivre's picture
Re: The TITANs cometh
The Doctor wrote:
They really needed copies of the firmware for the hardware and not the hardware itself. Dumping EPROMs is not difficult, nor is getting hold of flashable firmware images from an FTP server (say) or someone's e-mail (unlikely, but worse things for OPSEC have happened over e-mail). I heard four zero-days. I got my hands on a copy of Stuxnet that I plan on reversing soon, so hopefully I will have some harder information to work from. As for using so many weaponized exploits in its transmission vector.. so far as I know that is highly unusual. At least, none of my colleagues who are in a position to talk about such say they have found any malware which packages so many.
It does have four zero-days acknowledged, but I've heard from many that it can be altered to have more as whomever created it decides to. It is p2p update-able and uses a unique handshake protocol for its own code (which is the element I'm most interested in checking out from my copy). It also contained 2 stolen certificates, which explains why it wasn't noticed right away. I think the big thing that people are talking about is the fact that this bad boy weighs in at half a megabyte. It's full capabilities haven't been cracked, not to mention that variants are cropping up everywhere. It leaves a lot of people wondering what else it might do, especially come the expiration date in 2012. Speaking of the stolen certificates, should anyone be suspicious that the 2 stolen certificates were from Taiwanese computer companies based in Hsinchu? Might that be a clue as to where this came from?
Transhumans will one day be the Luddites of the posthuman age. [url=http://bit.ly/2p3wk7c]Help me get my gaming fix, if you want.[/url]
The Doctor The Doctor's picture
Re: The TITANs cometh
Decivre wrote:
It does have four zero-days acknowledged, but I've heard from many that it can be altered to have more as whomever created it decides to. It is p2p update-able and uses a unique handshake protocol for its own code (which is the element I'm most interested in checking out from my copy).
Peer-to-peer update mechanisms in malware are becoming more common these days, and not all of them are using variants of BitTorrent. Updating modular malware has been around for a while.
Decivre wrote:
It also contained 2 stolen certificates, which explains why it wasn't noticed right away.
That right there is most impressive.
Decivre wrote:
Speaking of the stolen certificates, should anyone be suspicious that the 2 stolen certificates were from Taiwanese computer companies based in Hsinchu? Might that be a clue as to where this came from?
I think it is more likely that the certificates were stolen from them because their security was compromised; maybe they even know about it now. It does not make much sense to make use of a reasonably scarce resource (a code signing certificate) for one's own black op.
Decivre Decivre's picture
Re: The TITANs cometh
The Doctor wrote:
Peer-to-peer update mechanisms in malware are becoming more common these days, and not all of them are using variants of BitTorrent. Updating modular malware has been around for a while.
Well, yes and no. It's not uncommon for an updated version of a virus to be capable of updating older versions on the web through peer-to-peer software. It's far less common for a virus to be able to connect to a separate peer-to-peer network. I was under the belief that stuxnet uses the latter rather than the former.
The Doctor wrote:
I think it is more likely that the certificates were stolen from them because their security was compromised; maybe they even know about it now. It does not make much sense to make use of a reasonably scarce resource (a code signing certificate) for one's own black op.
I'm not assuming that they used it for their own dirty work, but rather that this might narrow down the search. The Chinese government would have every incentive to utilize Taiwanese certificates, as would any number of Taiwan's neighboring countries. Plus, I'm not fully convinced that this couldn't be the work of a serious hacktivism group that might have been incensed about the nuclear proliferation of Iran or any number of other current events... a group that is potentially based out of (or at least has members in) Taiwan.
Transhumans will one day be the Luddites of the posthuman age. [url=http://bit.ly/2p3wk7c]Help me get my gaming fix, if you want.[/url]
The Doctor The Doctor's picture
Re: The TITANs cometh
Decivre wrote:
Well, yes and no. It's not uncommon for an updated version of a virus to be capable of updating older versions on the web through peer-to-peer software. It's far less common for a virus to be able to connect to a separate peer-to-peer network. I was under the belief that stuxnet uses the latter rather than the former.
I think that I mis-phrased things slightly: malware implementing unique peer-to-peer networks to pass updates and orders between infected nodes, not piggybacking on existing peer-to-peer networks.
Decivre Decivre's picture
Re: The TITANs cometh
The Doctor wrote:
I think that I mis-phrased things slightly: malware implementing unique peer-to-peer networks to pass updates and orders between infected nodes, not piggybacking on existing peer-to-peer networks.
Only botnets generally have such capabilities, but stuxnet has not yet exhibited common properties of botnets. A botnet doesn't have an algorithm to search for a specific node for some yet unknown process; stuxnet does. Targeted viruses don't utilize p2p technology with other infected machines; stuxnet does. It combines the two normally separate types of malware in a way that I haven't seen before, yet IT security professionals have not yet classified stuxnet as a botnet client... hence why I find it interesting.
Transhumans will one day be the Luddites of the posthuman age. [url=http://bit.ly/2p3wk7c]Help me get my gaming fix, if you want.[/url]