TNO report TNO 2015 R10799 | Final report Radial drilling ...
Case Studie os f Integrate Cybed r Operation Techniques · 2015-02-06 · gl 73 6 5 A clien...
Transcript of Case Studie os f Integrate Cybed r Operation Techniques · 2015-02-06 · gl 73 6 5 A clien...
TOP SECRET//COMINT//REL USA, F VE Y
Case Studies of Integrated Cyber Operation Techniques
TOP SECRET//COMINT//REL USA, FVEY
(U//FOUO)
Inbound ThreatsNeutered Interactive Threatsontrolled Outbound ThreatCorrupted
V i c t i m
NIPRNET
Adversary Web Server
NSA Web Server
i » » » • _ _
Exfiltrate Data
Neuter
Corrupt
A d v e r s a r y
TOP SECRET//COMINT//REL USA, FVEY 18
TOP SECRET//COMINT//REL USA, F VE Y
(S//REL) Foreign Intelligence in Support of Dynamic Defe
Foreign Intelligence
• Access to their tools - so that we can
d'tf&H1 other U.S. victims
TOP SECRET//COMINT//REL USA, FVEY
5//REL) Use CNE to penetrate the operations of foreign cyber actors U) Two major classes of CNE techniques • (U) Man-in-the-middle • (U) Man-on-the-side
U//FOUO) Steal their tools, tradecraft, targets and take
Foreign Infrastructure Adversary Home M o t u u f t f l f
TOP SECRET//COMINT//REL USA, FVEY 18
(U) Man-in-the5MiiîfëHe//,tTa5'Multiple
Active Exploitation
Implant ed
Router
(U) Man-in-the5Mii^e//lTa5'Multiple
Active Exploitation Network Defense
Good Guys
CLOUDSHIE
PANDORASMAYH
Implant ed
AnySite .co
Router
S//REL) TUTELAGE is a man-in-the-middle technique
(U//FOUO) Using TUTELAGE to enable active exploitation is integrated cyber operations.
(S//REL) Q U A N T U M T R ? ^ T ^ ™ ^ h ^ i F ^ Y A c t i v e Exploitation ^
© SIGINT cue
O Insert hook in addition to requested d a t a ™
Concerted Use of both Passive + Active SIGINT
• Implant targets based on 'selectors' and/or behavior
- e.g. users of al-Mehrab ISP (Mosul) who visit al-Hezbah extremist website
• Requires target webserver responses be visible to passive SIGINT
• Requires sufficient delay in target web connection for the hook to "beat" the response back to the target (typically means at least one « satellite hop) * -
• Requires target 's client to be vulnerable U
» E
il •Target web connection/ request via SATCOM or Fiber
Cycle ©O must get to the target before © ,(<
occurs • to . . Once 'hooked,' the target is exploited with no t ime constraints Different QUANTUM effects have different t ime
O © Hook calls to Covert Listening Post (LP): _
upload robust implant for sustained access
TOP SECRET//COMINT//REL USA, FVEY 18
TOP SECRET//COMINT//REL USA, F VE Y
(U//FOUO) BOXINGRUMBLE Case Stud
NIPRNET
I C t B
(S//REL) DNS requests entering NIPRnet domain
- (S//REL) Destination IP not a NIPRnet DNS server
- (S//REL) Domain name not within NIPRnet
(S//REL) DNS behavior of host is suspicious but not dangerous (TS//SI//REL) TAO uses QUANTUMDNS to redirect the requesting host
NSA and TAO Covert Infrastructu re
TOP SECRET//COMINT//REL USA, FVEY
TOP SECRET//COMINT//REL USA, F VE Y
(S//REL) QUANTUMDNS: An Integrated Cyber Oper
DNS Serve Where's , ,
Anysite.mi I?
Root DNS
Serve
m
Where's 1 DNS qi i° i-Anysite.mJI
TARGET SPACE
j iVt icnow, 1 l 'Hack. "
Root DNS Server,
~ C o n n e â é f i / è P ' p t o this DN^ Talk to the root Server
DNS Server
1 know how to g e y to Anysi te.mi l
IP is 1.2.3.4
TAO Server mirrors Anysite.mil
query NIPRNET
Anysite.mil?
[ S í TAO Shooter
Blocked If DNS Server Found
NIPRNET
Anysite.mi y e r I g I Server Implant
Comman d &
Control
TOP SECRET//COMINT//REL USA, FVEY
TOP SECRET//COMINT//REL USA, F VE Y
(S//REL) QUANTUMDNS: As Used Against BOXING
IP is 1.2.3.4
TAO C2
m a l mirrors Anysite.mil C2
TAO Shooter
Command Sent
Implan
" I Implant _ Comman J d &
Control
TOP SECRET//COMINT//REL USA, FVEY 18
TOP SECRET//COMINT//REL USA, FVEY
(U//FOUO) BOXINGRUMBLE Case Stud
m m
Open W e b Proxies
Victims (Bots )
m - -
(TS//SI//REL) TAO establishes itself as a trusted C2 node (U//FOUO) Captured traffic indicates the existence of a bot net
- (S//REL) Command and control split into two layers (C2 and C4)
- (S//REL) C2 layer has a peer-to-peer mesh network topology with direct connection to a C4 node
(S//REL) C2 nodes connect directly to victims as well as through open web proxies
NSA and TAO Covert Infrastructu re
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL
TOP SECRET//COMINT//REL USA, F VE Y
(U//FOUO) BOXINGRUMBLE Case Stud
(TS//SI//REL)TAO C2 server can see all bot tasking (TS//SI//REL) TAO C2 server can push tasking (S//REL) BOXINGRUMBLE bots
- (S//REL) - 45% Vietnamese dissidents - (S//REL) -45% Chinese dissidents - (S//REL) -10% Other
(TS//SI//REL) Adding BOXINGRUMBLE bots to DEFIANTWARRIOR
NSA and TAO Covert Infrastructu re
TOP SECRET//COMINT//REL USA, FVEY
(U) There is MmfgETh«ifriO'ffëuWSiy to I
TS//SI//REL
Name Description Inceptio n
Date
Status Operat ional Success
CNE
QUANTUM INSERT • Man-on-the-Side technique • Briefly hi-jacks connections to a terrorist website • Re-directs the target to a TA0 server (F0XACID) for implantation
2005 Operatio nal
Highly Successful (In 2010, 300 TAO implants were deployed via QUANTUMINSERT to targets that were un-exploitable by any other means)
QUANTUMBOT • Takes control of idle IRC bots • Finds computers belonging to botnets, and hijacks the command and control channel
Aug 2007 Operatio nal
Highly Successful (over 140,000 bots co-opted)
QUANTUM BISCUIT • Enhances QUANTUMINSERT's man-on-the-side technique of exploitation • Motivated by the need to Ql targets that are behind large proxies, lack predictable source addresses, and have insufficient unique web activity.
Dec 2007 Operatio nal
Limited success at NSAW due to high latency on passive access (GCHQ uses technique for 80% of CNE accesses)
QUANTUMDNS • DNS injection/redirection based off of A Record queries. • Targets single hosts or caching name servers.
Dec 2008 Operatio nal
Successful (High pr ior i ty CCI target exploi ted)
QUANTUMHAND Exploits the computer of a target who uses Facebook
Oct 2010 Operatio nal
Successful
QUANTUMPHANTO M
Hijacks any IP on QUANTUMable passive coverage to use as covert infrastructure.
Oct 2010 Live Tested
N/A
CNA QUANTUMSKY Denies access to a webpage through RST packet
spoofing. 2004 Operatio
nal Successful
TS//SI//REL
I QUANTUMCOPPER File download/upload disruption and corruption. Dec 2008 Live N/A
TOP SECRET//COMINT//REL US
(U//FOUO) QUANTUMSMA In te rnet
NIPRNET TOP SECRET//COMINT//REL USA, FVEY 18
A, F VE Y
LCKDOW N S A S p a c e
TURBIN
0020h; 0030h: 0040h: OOSik:
0070A: 0080&: orsoi>:
OOCOh: OOMb: KXOfc; MrOü:
ClllOb: a s i a t i OlJOhi i l « t , OJSOh; 3160h: OnOhr
es « OD Oi 75 4r « 70 7 i "»S f?
t9 CT i 73 «s e sr ée t (£ <7 2
so s: t î ta n es
? ?3 i c « er
&r 77 73 1 75 72 51 1 4'-< 19 «3 1 0> OA »5 1
73 74 65 GS 7; 6F 61 oi> m in
78 73 «S
«S 7i 59 i3 « 5P 2E «
«5 6C 3B Ol. OJl «• 2t 41 i l 74
Î4 <S 78 71 î> 35 OJl 75 73 74 <5 SD SI S~> M St (¡4 il 73 3B OD 0(L 7S ?3 Ï9 iE 73 5r j « 74 ZZ 37 SS i t <4 M it 43 Sf St 6« 69 »7 3t OD QA 75 7) fi? SE i t ¡0 «< 74 -T 57 5Ü Äf 33 1? "B
fit iE 14 Of 0* 75 73 <9 •*r 3» at ça •'s iE 52 6! 73 «F
ÎO SÏ •>»
sir.o Systen.ColJ cet ions.Oerer i c i ..131DJ Si'JtBP, c oKDMntS>d( l : . .
4. , i U1B9 S y s t » .Dca i i n j : . .usine S*i-3:«a.Texc:..
aie.0 BÏIUS
v Si i iosuSt-Tim; öäil löBl le. COMIC
i "S ' 1 ' > ' i i l ( 1 Î! 15 1 4 ¿5 ÉP 2
i êt *r 4D : t : 70 S3 t £? 30 SÎ ?j 74 SS Ét> 2t Si i t iC 3B
S 73 J
F3 94 3S 65 23 39 30
31 23 5L 4E 31 23 49 « 52 53 44 53 CS 04 69 98 61 5F 53 72
7F. 63 SC 70 64 62 00 FF FF FF FF
60 eo F0 3F 00 00 00 £0 75 ct> m 3F M 86 2F
bJ
3© ee ee 99 FF FF 47 41 65 61 74 75 4B 45 52 4c. 41 4E 60 03 44 09 60 09 91 62 FE 94 10 00 00 09 53 5C I i 75 s? f s sr h* 9A 4D S3 10 30 B0 00 Bö
i 9 73 50 72 72 65 SO 72
4C 33 S2 31 23 ¿E 31 23 53 •£ 23 AB E5 <2 66 3fi 5C AI 72 6F TZ e i g l 73 65
A client requests connection to malicious server. Request is detected by TURMOIL CLOUDSHIELD terminates client-side connection.
L The malicious server's response is blocked by CLOUDSHIELD.
L TURMOIL tips TURBINE, which then tasks a shooter to send the acknowledgement to the malicious server.
. Malicious server assumes connection and forwards
A, FVEY
TOP SECRET//COMINT//REL USA, F VE Y
(U//FOUO) Future Capability: QUANTUMSANDJV
Take captured ma I w-are and OOZOlfi 65 «J 7+ S9 t r CE fi il «5 «E « H « 18 e c t i o w .
e x e c u t g | | S | r ! ì r ^ ^ l envi ronment.
«• 3 ! Cl 7 1 vsino STOMI». t-sr 6? CE 67 2 0 53 79 7: li « Î St> c; , .\izivf Syï'-çiD « 67 31 OD OA 75 7} 69 61 57 .D r ws n j : . ur ing tb 2t £4 ÌS ?S 74 35 09 DJ. ?S S7St«tp.lest: . . u 19 1) 7H i f if> SE S' S9 f t 54 « Iftg i t Ad •t éD 73 18 OD OA 75 71 69 SE v W . r u i u i . . U l u
* t i n i ô u à H : ^ Allow f $ r f f f & j p ë 8 1 î p t QUANTUM technique with outside world IHHk : 6E i ' 20 53 -"S 73 74 6S 6 1 ^
BJiflft: 7 ì <59 6t (.7 Ì0 SS ' aiiar.: 75 bj i s t j jB 0£> o * ^ Ûl40h! 7Î 05 6: :E £2 75 61 7hJJ OlSOh; 65 lm 6f 7C S3 {5 72 75 J OliOfc: fJ ir il ei :0 S3 7&
3& 03 Oi 75 i,a Srs t ia , SS tS lì if sing « ¡0 53 7S i i r re3 j . .vo inw Sy 2E 4? s i 74 jcca, Ruacite, In: SB DI' Oi 75 « g g S « m m ; , . ' j Spi«" 3B I l i a i ï H f mg, get
I : .:.> TE 0L 56 £F 55 b 65 73 65 BE
e+pss» - . " f l . . . a'T rfrtc« sur Fed tur ePr essi i t . . .KERMEL35.... I t Q h R M . i l i l H f . . . 3 i lK>, . . 18SNHN.. RSPS-
TOP SECRET//COMINT//REL USA, FVEY
TOP SECRET//COMINT//REL USA, FVEY
(U) Future Work
• (U//FOUO) Develop lower latency guards • (S//REL) Use TUTELAGE inline devices as our
"shooter" • (U//FOUO) Push decision logic to the edge
• (U//FOUO) Identify more mission opportunities • (U//FOUO) Continue developing and deploying
additional QUANTUM capabilities
(U) There is MmfgETh«ifriO'ffëuWSiy to I
TS//SI//REL
Name Description Inceptio n
Date
Status Operat ional Success
CNE
QUANTUM INSERT • Man-on-the-Side technique • Briefly hi-jacks connections to a terrorist website • Re-directs the target to a TA0 server (F0XACID) for implantation
2005 Operatio nal
Highly Successful (In 2010, 300 TAO implants were deployed via QUANTUMINSERT to targets that were un-exploitable by any other means)
QUANTUMBOT • Takes control of idle IRC bots • Finds computers belonging to botnets, and hijacks the command and control channel
Aug 2007 Operatio nal
Highly Successful (over 140,000 bots co-opted)
QUANTUM BISCUIT • Enhances QUANTUMINSERT's man-on-the-side technique of exploitation • Motivated by the need to Ql targets that are behind large proxies, lack predictable source addresses, and have insufficient unique web activity.
Dec 2007 Operatio nal
Limited success at NSAW due to high latency on passive access (GCHQ uses technique for 80% of CNE accesses)
QUANTUMDNS • DNS injection/redirection based off of A Record queries. • Targets single hosts or caching name servers.
Dec 2008 Operatio nal
Successful (High pr ior i ty CCI target exploi ted)
QUANTUMHAND Exploits the computer of a target who uses Facebook
Oct 2010 Operatio nal
Successful
QUANTUMPHANTO M
Hijacks any IP on QUANTUMable passive coverage to use as covert infrastructure.
Oct 2010 Live Tested
N/A
CNA QUANTUMSKY Denies access to a webpage through RST packet
spoofing. 2004 Operatio
nal Successful
TS//SI//REL
I QUANTUMCOPPER File download/upload disruption and corruption. Dec 2008 Live N/A
(U) QUESTIONS?
For more information, please contact:
TUTELAGE vs QUANTUM - ^ ^ m S32X TURBINE 1 T1412 BOXINGRUMBLE - | F22
TOP SECRET//COMINT//REL USA, FVEY 18