Welcome! These forums will be deactivated by the end of this year. The conversation continues in a new morph over on Discord! Please join us there for a more active conversation and the occasional opportunity to ask developers questions directly! Go to the PS+ Discord Server.

Stuxnet, Duqu, Flame, oh my!

19 posts / 0 new
Last post
Phyrexus Phyrexus's picture
Stuxnet, Duqu, Flame, oh my!
Hello everyone, first post here, and boy is it a doozy. For the past couple of years there's been a few major virus attacks on networks in the Middle East: the Stuxnet, Duqu, and Flame malware. http://en.wikipedia.org/wiki/Stuxnet http://en.wikipedia.org/wiki/Duqu http://en.wikipedia.org/wiki/Flame_(malware) Looking further into these, a paranoid thought popped into my head. Though Stuxnet and Duqu seem to have been pinned down on the US or one of our allies, Flame is still being researched and some facts are coming to light, but no one has claimed responsibility yet. http://arstechnica.com/security/2012/06/flame-crypto-breakthrough/ I don't know if it's been because I've been getting ready to launch my own Eclipse Phase campaign or what, but when I saw this article and its talks on the new cryptographic collision attack they used, I started to think that maybe this really isn't us at all. That this might be our own real-life TITANs. Call me crazy, but maybe the Fall isn't as far off as we thought.
Arenamontanus Arenamontanus's picture
Re: Stuxnet, Duqu, Flame, oh my!
Phyrexus wrote:
Call me crazy, but maybe the Fall isn't as far off as we thought.
Well, at least the background for the Fall seems ever more plausible. See http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of... and http://www.technologyreview.com/view/428061/how-obama-was-dangerously-na... (or for that matter, http://www.theatlantic.com/technology/archive/2012/06/is-it-possible-to-... ) Basically, it looks like the government might have unleashed a weapon of which it did not fully understand the political, legal or security implications. "Permission to activate the TITAN system, Mr President?" "Sure. Why do you even ask? We have more important issues to deal with here."
Extropian
Decivre Decivre's picture
Re: Stuxnet, Duqu, Flame, oh my!
Why is it that every malware release makes me love my copy of Linux more and more? I just don't understand.... :P I do however think this is the start of something terrible for the world of Internet technologies. These administration have opened up a dangerous Pandora's box that they might regret down the line. I understand that the intent was to stop Iran, but the implications for us are far worse... the usage share of Microsoft Windows is anywhere from 76-92% worldwide, and these guys have unleashed code that could potentially violate this operating system with great ease. Should any decent hacker reverse engineer these worms, they would have access to tools that could potentially change the face of malware. I mean imagine it. Flame utilized an MD5 hole that allowed it to pose as an official Microsoft update. [i]An official Microsoft update[/i]. Access to that exploit could completely devastate any amount of the world's computers. Worse off, someone could use that exploit to put something else out there that isn't detectable as a variation of Flame. An ambitious ransomware distributor with some as-of-yet unseen virus could hit a vast amount of the infrastructure before Symantec and other antivirus companies could do anything about it, and even lock their software out (because it could pose as an [i]official Microsoft update[/i]), forcing drastic antivirus methods to clean the mess. I'm seeing less Eclipse Phase, and more of Shadowrun's Great Crash.
Transhumans will one day be the Luddites of the posthuman age. [url=http://bit.ly/2p3wk7c]Help me get my gaming fix, if you want.[/url]
Phyrexus Phyrexus's picture
Re: Stuxnet, Duqu, Flame, oh my!
Decivre wrote:
I'm seeing less Eclipse Phase, and more of Shadowrun's Great Crash.
That also popped into my head as well. Becoming much more plausible and scarier after this: http://it.slashdot.org/story/12/06/08/013204/flame-malware-authors-hit-s... I also am thankful I run Linux and have been successful in converting a few friends to it as well. :P
Phyrexus Phyrexus's picture
Oops, double post
Oops, double post
Decivre Decivre's picture
Re: Stuxnet, Duqu, Flame, oh my!
Phyrexus wrote:
That also popped into my head as well. Becoming much more plausible and scarier after this: http://it.slashdot.org/story/12/06/08/013204/flame-malware-authors-hit-s...
Imagine if they could have bricked firmware with a similar sort of self-destruct command... horrifying.
Phyrexus wrote:
I also am thankful I run Linux and have been successful in converting a few friends to it as well. :P
Me too! I've made it one of my life's goals to try and get people to change over. If they are gamers like me, I help them get VMware player set up on their systems... that way they can still game, but use Linux for everything else.
Transhumans will one day be the Luddites of the posthuman age. [url=http://bit.ly/2p3wk7c]Help me get my gaming fix, if you want.[/url]
Caretaker Caretaker's picture
Re: Stuxnet, Duqu, Flame, oh my!
Decivre wrote:
Me too! I've made it one of my life's goals to try and get people to change over. If they are gamers like me, I help them get VMware player set up on their systems... that way they can still game, but use Linux for everything else.
You can get allot of @-rep for that (but your c-Rep can take a hit, the Micro$oft hypercorp will not like it). :)
Arenamontanus Arenamontanus's picture
Re: Stuxnet, Duqu, Flame, oh my!
Interesting point here: http://www.thebulletin.org/web-edition/op-eds/cyberweapons-bold-steps-di... If a nation works on cyberwarfare, it will want to collect exploits. This means it will not tell them to the software manufacturers (since patches will make them useless), leaving all computers - including the ones of their own nation - unsecured. In fact, it might be rational for the cyber command to reduce the spread of patches since it makes them more able... at the price of making everybody else more vulnerable. Now imagine this logic automated and accelerated with AI and AGI support on a global scale.
Extropian
Smokeskin Smokeskin's picture
Re: Stuxnet, Duqu, Flame, oh my!
Arenamontanus wrote:
If a nation works on cyberwarfare, it will want to collect exploits. This means it will not tell them to the software manufacturers (since patches will make them useless), leaving all computers - including the ones of their own nation - unsecured. In fact, it might be rational for the cyber command to reduceT the spread of patches since it makes them more able... at the price of making everybody else more vulnerable.
Nations could even subsidize software producers to get them to add vulnerabilties, hopefully so bizarre no one else will notice. If nations don't want to pay directly they could easily find other ways to compensate the companies, like give them a break on monopoly restrictions. It's a sliiy idea I know, it's way too transparent. If a software company was allowed to grow to get market power it would express itself in objective measures like the Herfindahl index that antitrust institutions use as arguments to stop mergers or force divestitures in other industries. If they just let things slide or made ineffective rulings like banning a few software bundle combinations, and subsequently enemies of the state got hit with obscure zero day vulnerabilities, everyone would know that... Oh wait.
Caretaker Caretaker's picture
Re: Stuxnet, Duqu, Flame, oh my!
That's another point in favor of open-source software as in this example mentioned in the slashdot.org article:
Quote:
Ubuntu bug: Bug reported 22nd September and closed the same day [launchpad.net]. Microsoft bug: attacks on MD5 widely known and carried out since 2005, [schneier.com] but Microsoft still carry on using it in Windows Update until 2012.
When the source is open to the public it's hard to hide/ignore bugs and exploits.
Arenamontanus wrote:
Now imagine this logic automated and accelerated with AI and AGI support on a global scale.
Reminds me of the Jurassic Park quote: "If there is one thing the history of evolution has taught us it's that life will not be contained. Life breaks free, expands to new territories, and crashes through barriers, painfully, maybe even dangerously, but, ah, well, there it is."
The Doctor The Doctor's picture
Re: Stuxnet, Duqu, Flame, oh my!
Phyrexus wrote:
http://en.wikipedia.org/wiki/Stuxnet http://en.wikipedia.org/wiki/Duqu http://en.wikipedia.org/wiki/Flame_(malware)
Fun to take apart, interesting, and bloody difficult to get hold of samples right now (in that order).
Phyrexus wrote:
Looking further into these, a paranoid thought popped into my head. Though Stuxnet and Duqu seem to have been pinned down on the US or one of our allies, Flame is still being researched and some facts are coming to light, but no one has claimed responsibility yet.
Nobody has officially claimed responsibility for Flame yet, but the official announcement of Operation Olympic Games makes me wonder. That, and Flame appears to have taken a development path common to some centralizd styles of software development effort: A small skunkworks development effort succeeds beyond the wildest dreams of anyone in the organization, and then the next project is officially taken over, and the result is bloatware. In toto, Flame is approximately twenty times larger than Stuxnet, which is why I make this claim - a twenty-fold increase in the size of the finished is about right for this syndrome. The problem with malware is that, after it is deployed it is far more difficult to control after its spread in the wild.
Phyrexus wrote:
I don't know if it's been because I've been getting ready to launch my own Eclipse Phase campaign or what, but when I saw this article and its talks on the new cryptographic collision attack they used, I started to think that maybe this really isn't us at all. That this might be our own real-life TITANs.
Forcing collisions in a space of MD-5 hashes to generate signing certificates is not a new attack - here is [url=https://drwho.virtadpt.net/archive/2009/01/01/md5-considered-harmful-tod... article I wrote on a practical implementation[/url] a few years ago. This is, however, the first time anyone knows of someone carrying out the attack for cryptographically signing code. It is, all things considered, easier to purchase or steal a code signing certificate pair than it is to forge one. And... MD-5 has been deprecated for years for precisely this reason. Hence, the existence of SHA-1 and the SHA-2 series of message digest algorithms. When dealing with crypto, momentum is not easy to overcome.
Phyrexus wrote:
Call me crazy, but maybe the Fall isn't as far off as we thought.
Go, humans, go. *sigh*
The Doctor The Doctor's picture
Re: Stuxnet, Duqu, Flame, oh my!
Decivre wrote:
Why is it that every malware release makes me love my copy of Linux more and more? I just don't understand.... :P
F/OSS operating systems have their vulnerabilities too, make no mistake about it ([url=http://thehackernews.com/2012/06/cve-2012-2122-serious-mysql.html]MySQL, I glare in your general direction[/url]). Exploitable vulnerabilities in the v3.x Linux kernel series, for example, have been found and exploits are floating around some circles, but due to the #antisec meme (as well as the fact that one can make rather a lot of money selling exploits to companies like Vupen, the Zero Day Initiative, or Endgame) people are sitting on them and making use of them judiciously.
Decivre wrote:
I do however think this is the start of something terrible for the world of Internet technologies.
On this we agree. It seems that the powers that be finally got around to reading [url=https://projects.eff.org/~barlow/Declaration-Final.html]A Declaration of Independence of Cyberspace[/url] and are treating the Net the same way they'd treat any other entity that they really do not want to see independent: as a battlefield.
Decivre wrote:
These administration have opened up a dangerous Pandora's box that they might regret down the line. I understand that the intent was to stop Iran, but the implications for us are far worse... the usage share of Microsoft Windows is anywhere from 76-92% worldwide, and these guys have unleashed code that could potentially violate this operating system with great ease. Should any decent hacker reverse engineer these worms, they would have access to tools that could potentially change the face of malware.
In some ways the malware that crackers have been writing and deploying for years are light-years more advanced than any of the state-sponsored and deployed malware discovered thus far, at least in terms of how difficult they are to detect and eradicate. The underground has this sort of thing down to a fine art but has very different goals. At least, right now.
Decivre wrote:
I mean imagine it. Flame utilized an MD5 hole that allowed it to pose as an official Microsoft update. [i]An official Microsoft update[/i]. Access to that exploit could completely devastate any amount of the world's computers.
For at least two years now, a number of corporations have been selling surveillance malware to governments which poses as updates to Windows and iTunes.. and are signed with valid code signing certificates, so they pass muster with the OS' update installers. They even come with easy-to-use GUI injectors that practically any tier-one helpdesk tech could run. More's the point, we have been finding deployed samples in the wild for over a year; these are not hypothetical attacks, they are implemented attacks. Also, MD-5 collision attacks to generate fraudulent certificates are fairly well known and documented; if all of us on this message board really felt like it we could pull it off for not a lot of money and a couple of megabytes of Python code. Probably not rapidly, mind you, but it would be doable. I would be surprised if more than just two or three major world powers were not doing this sort of thing independently right now - it is too useful and practical an attack with too many potential applications.
Decivre wrote:
Worse off, someone could use that exploit to put something else out there that isn't detectable as a variation of Flame.
That would be most malware written by black hats for profit, I am afraid.
Decivre wrote:
An ambitious ransomware distributor with some as-of-yet unseen virus could hit a vast amount of the infrastructure before Symantec and other antivirus companies could do anything about it, and even lock their software out (because it could pose as an [i]official Microsoft update[/i]), forcing drastic antivirus methods to clean the mess.
Easily.
Decivre wrote:
I'm seeing less Eclipse Phase, and more of Shadowrun's Great Crash.
Good. It is not just me.
The Doctor The Doctor's picture
Re: Stuxnet, Duqu, Flame, oh my!
Decivre wrote:
Imagine if they could have bricked firmware with a similar sort of self-destruct command... horrifying.
[url=http://blog.webroot.com/2011/09/13/mebromi-the-first-bios-rootkit-in-the... is even worse[/url] than bricking devices. [url=https://www.net-security.org/malware_news.php?id=2143]So is this.[/url] [url=https://en.wikipedia.org/wiki/CIH_%28computer_virus%29]This was also quite irritating.[/url]
The Doctor The Doctor's picture
Re: Stuxnet, Duqu, Flame, oh my!
Caretaker wrote:
You can get allot of @-rep for that (but your c-Rep can take a hit, the Micro$oft hypercorp will not like it). :)
Microsoft may not like it, but other corporations use whatever works to accomplish their goals, so your c-rep may not take quite so much of a hit.
The Doctor The Doctor's picture
Re: Stuxnet, Duqu, Flame, oh my!
Arenamontanus wrote:
If a nation works on cyberwarfare, it will want to collect exploits.
They can research exploits on their own, but it is faster and cheaper to buy them in bulk from security companies. They [i]could[/i] hire one hacker for $40kus per year plus benefits (this is how much the NSA is offering for security analysts with reverse engineering experience these days) or they could potentially buy several dozen zero-day exploits (well more than their hacker-on-the-payroll could find and develop per year) for twice that, and continue to do so for as long as they wanted.
Arenamontanus wrote:
This means it will not tell them to the software manufacturers (since patches will make them useless), leaving all computers - including the ones of their own nation - unsecured. In fact, it might be rational for the cyber command to reduce the spread of patches since it makes them more able... at the price of making everybody else more vulnerable.
The #antisec meme did that for them, I fear. Some prominent white hats took pretty hard blows between 0 and 1 last year for their disclosure policies.
Arenamontanus wrote:
Now imagine this logic automated and accelerated with AI and AGI support on a global scale.
Self aware reverse engineering systems... remind me to keep backing myself up to offline storage in the future, please?
The Doctor The Doctor's picture
Re: Stuxnet, Duqu, Flame, oh my!
Smokeskin wrote:
Nations could even subsidize software producers to get them to add vulnerabilties, hopefully so bizarre no one else will notice.
[url=http://boingboing.net/2011/12/28/linguistics-turing-completene.html]They do not have to.[/url] Plus, a lot of code reviews are a joke.
Decivre Decivre's picture
Re: Stuxnet, Duqu, Flame, oh my!
The Doctor wrote:
F/OSS operating systems have their vulnerabilities too, make no mistake about it ([url=http://thehackernews.com/2012/06/cve-2012-2122-serious-mysql.html]MySQL, I glare in your general direction[/url]). Exploitable vulnerabilities in the v3.x Linux kernel series, for example, have been found and exploits are floating around some circles, but due to the #antisec meme (as well as the fact that one can make rather a lot of money selling exploits to companies like Vupen, the Zero Day Initiative, or Endgame) people are sitting on them and making use of them judiciously.
Don't I know it. Injections are one of the major reasons I'm not interested in making my own public website. Seems to risky. I'll stick to having a private network torrent server and a storage server... and that's it.
The Doctor wrote:
On this we agree. It seems that the powers that be finally got around to reading [url=https://projects.eff.org/~barlow/Declaration-Final.html]A Declaration of Independence of Cyberspace[/url] and are treating the Net the same way they'd treat any other entity that they really do not want to see independent: as a battlefield.
Which is problematic. The internet forms the backbone of most of human society today, [i]especially[/i] in the western world. I don't think these governments realize how devastating even localized shutdowns within the internet would be (imagine if bank networks or VISA got shut down by a government-made malware... the effects would be devastating to the market). Yet they don't seem to realize this. They pretend the internet is some building they all have to gain control of, when in reality the internet has become [i]a new layer of the world as a whole[/i].
The Doctor wrote:
In some ways the malware that crackers have been writing and deploying for years are light-years more advanced than any of the state-sponsored and deployed malware discovered thus far, at least in terms of how difficult they are to detect and eradicate. The underground has this sort of thing down to a fine art but has very different goals. At least, right now.
True in a sense. These viruses were more impressive in scope and autonomy, as well as ability to target specific systems, than anything. They clearly weren't very well stealthed, and had massive footprints. But they did have some interesting traits, and those traits have already hit the common malware scene. Stuff like using the torrent protocol to update every infected system. And I wonder how long it will be before we see some black hats throw a PLC disruptor of their own on the internet. Oh what fun that could cause. [/sarcasm]
The Doctor wrote:
For at least two years now, a number of corporations have been selling surveillance malware to governments which poses as updates to Windows and iTunes.. and are signed with valid code signing certificates, so they pass muster with the OS' update installers. They even come with easy-to-use GUI injectors that practically any tier-one helpdesk tech could run. More's the point, we have been finding deployed samples in the wild for over a year; these are not hypothetical attacks, they are implemented attacks. Also, MD-5 collision attacks to generate fraudulent certificates are fairly well known and documented; if all of us on this message board really felt like it we could pull it off for not a lot of money and a couple of megabytes of Python code. Probably not rapidly, mind you, but it would be doable. I would be surprised if more than just two or three major world powers were not doing this sort of thing independently right now - it is too useful and practical an attack with too many potential applications.
Scary. Makes you wonder if there's some reason that these companies still use MD5, despite the fact that it has so many glaring flaws for security purposes.
The Doctor wrote:
That would be most malware written by black hats for profit, I am afraid.
I know, but it will be more horrifying when they successfully implement the elements of these government programs into those elements. A botnet that uses the torrent network to be self-improving and autonomous? Chilling.
The Doctor wrote:
Good. It is not just me.
Now all we have left is to start placing bets on what dumbass government is going to accidentally invent the crash virus, and who is going to put together Echo Mirage. :P
Transhumans will one day be the Luddites of the posthuman age. [url=http://bit.ly/2p3wk7c]Help me get my gaming fix, if you want.[/url]
The Doctor The Doctor's picture
Re: Stuxnet, Duqu, Flame, oh my!
Decivre wrote:
Don't I know it. Injections are one of the major reasons I'm not interested in making my own public website. Seems to risky. I'll stick to having a private network torrent server and a storage server... and that's it.
I would much rather use an application that started its life a few years ago, is still being actively developed, and has a large enough userbase to warrant code audits. Also, JIT-virtual patching done by the hosting provider is good to buy time when it is necessary to do so.
Decivre wrote:
Which is problematic. The internet forms the backbone of most of human society today, [i]especially[/i] in the western world. I don't think these governments realize how devastating even localized shutdowns within the internet would be (imagine if bank networks or VISA got shut down by a government-made malware... the effects would be devastating to the market).
So much of the Internet is necessary for daily communication; an unknown number (but rather a lot) of long-distance links are, in fact, voice-over-IP gateways (for example). In places where radio repeaters are infeasible, VoIP is sometimes used to connect them. SCADA systems of some facilities are hooked into the Net so they can be remotely controlled... which is so bad an idea that perhaps only Denis Leary or Andrew Clay at the top of their respective games could properly elucidate its drawbacks. And what about stock and futures trading proto-AIs? What if they were infected?
Decivre wrote:
Yet they don't seem to realize this. They pretend the internet is some building they all have to gain control of, when in reality the internet has become [i]a new layer of the world as a whole[/i].
The going perception of offensive infosec seems to conflate exploits with bombs. If one does not work, get a bigger one... which is exactly how such things do not work.
Decivre wrote:
True in a sense. These viruses were more impressive in scope and autonomy, as well as ability to target specific systems, than anything. They clearly weren't very well stealthed, and had massive footprints.
The surveillance aspects of Flame rival some mobile device malware I have seen. That was slightly frightening. As for whether or not Flame was well stealthed, it was admitted that Flame had probably been in the wild for a couple of years before it was detected, so I suppose that says something about its stealth capabilties. However, I wonder if the developers really did write such lousy code, if they accidentally used some compiler flags that bloated the code, or some combination of the two. Or something else.
Decivre wrote:
But they did have some interesting traits, and those traits have already hit the common malware scene. Stuff like using the torrent protocol to update every infected system. And I wonder how long it will be before we see some black hats throw a PLC disruptor of their own on the internet. Oh what fun that could cause. [/sarcasm]
It is my understanding that there are a few hackers working on PLC disruption, but that they are white hats working for some of the larger security firms. The other side of the house is no doubt hard at work as well.
Decivre wrote:
Scary. Makes you wonder if there's some reason that these companies still use MD5, despite the fact that it has so many glaring flaws for security purposes.
Project managers are often not programmers, and were probably never cypherpunks. Developers tend to use what they know or what is in the spec. Sometimes, developers really are lousy, or come from the Mal Reynolds school of programming.
Decivre wrote:
I know, but it will be more horrifying when they successfully implement the elements of these government programs into those elements. A botnet that uses the torrent network to be self-improving and autonomous? Chilling.
The match on /autonomous/i chills my blood.
Decivre wrote:
Now all we have left is to start placing bets on what dumbass government is going to accidentally invent the crash virus, and who is going to put together Echo Mirage. :P
My guess would be that they would be the same side, shortly after they discover that their malware likes their networks just as much as the ones they want to take down. The internauts will no doubt form their own Echo Mirage teams, only with more biofeedback devices and LOLcats and fewer implanted jacks. At least, at first.
nezumi.hebereke nezumi.hebereke's picture
Re: Stuxnet, Duqu, Flame, oh my!
Decivre wrote:
Why is it that every malware release makes me love my copy of Linux more and more? I just don't understand.... :P
You and me both!
Quote:
I do however think this is the start of something terrible for the world of Internet technologies. These administration have opened up a dangerous Pandora's box that they might regret down the line.
The box was already there. If the US didn't do it, someone else would have -- and soon. The fact is, the US was (relatively) responsible. It had so many safeties to control it, the target is valid. And the thing the world needs MOST is examples of this technology, so we can start building defenses. Fire and Stuxnet have delivered. Already all the big AV and security companies are trying to figure out how to anticipate this sort of attack. Google now gives you an alert if they suspect you're the target of state-sponsored spying. People are thinking about it. (Consider if instead the first attack of this sort was done by Russia, Iran, or China.)
Quote:
I'm seeing less Eclipse Phase, and more of Shadowrun's Great Crash.
Definitely, including SR's paradigm of islands on the net.