Supervisory Control And Data Acquisition aka SCADA Terminology: Useful Terminology, Acronyms and Links related to SCADA.
AC Alternate Current
CAN Control Area Networks
CIP Critical Infrastructure/Information Protection
CRC Cyclic Redundancy Check
DC Direct Current
DCS Distributed Control system
DNP Distributed Network Protocol
GOMSFE Generic Object Models for Substation and Feeder Equipment
GOOSE Generic Object Oriented Substation Event
HCI Human-Computer Interface
HMI Human-Machine Interface
HVAC High Voltage Alternate Current
ICCP Inter-Control Center Communications Protocol
ICPS International Communications Protocol Standard
ICS Indistrial Control System
IEC International Electrochemical Commission
LAN Local Area Network
MTU Master Terminal Unit
NERC North American Electric Reliability Corporation
OLE Object Linking and Embedding
OPC OLE for Process Control
PLC Programmable Logic Controllers
PAC Programmable Automation Controllers
RTU Remote Terminal/Telemetry Units
SONET Synchronous Optical Networking
SDH Synchronous Digital Hierarchy
SCADA Supervisory Control And Data Acquisition
T& D Transmission and Distribution
UCA Universal Communications Adapter/ Utility Communications Architecture
SCADA Protocols
RTU's communicate with central SCADA station, other RTU's and networked devices.
DNP3
ICCP
MODBUS(X)
Profibus
Fieldbus
BACnet
IEEE 60870 (IEC 60870-5-101 is an ICPS)
ASCII
Other vendors like Allen Bradley, GE Fanuc, Siemens Sinaut, Mitsubishi, Omron, Toshiba, Westinghouse etc have proprietary SCADA Protocols
Useful Web Sites
http://en.wikipedia.org/wiki/SCADA
http://www.wurldtech.com/
http://www.plcs.net/contents.shtml
http://www.modbus.org/
http://www.cpni.gov.uk/advice/infosec/business-systems/scada/
http://www.dnp3.org/
http://www.iccp.org/
http://www.digitalbound.com/
Please leave a comment if I missed out an important acronym, protocol, link/site etc.
Saturday, 28 April 2012
Certifications for IDS, IPS, FW, Web/Email Gateway Appliances and Endpoint Devices
Certifications for IDS, IPS, FW, Web/Email Gateway Appliances and Endpoint Devices:
Anti Virus Certifications
This post might be helpful for Administrators, persons who are actively involved in making decisions to buy Perimeter/Endpoint security devices, CSO's etc.
This article explains about different security certifications for devices like VPN, Firewalls, Intrusion Detection and Prevention Systems (IDS/IPS), Email/Web Gateways etc.
This article explains about different security certifications for devices like VPN, Firewalls, Intrusion Detection and Prevention Systems (IDS/IPS), Email/Web Gateways etc.
BITS
BITS initially stood for "Banking Industry Technology Secretariat" which is not acronym anymore. BITS addresses emerging threats releted to cybersecurity, fraud reduction and infrastructure protection related to financial services.
Common Criteria (CC)
Common Criteria for Information Technology Security Evaluation is a framework for Computer Security Certification. Evaluations are performed in the US, UK, Australia,Canada, France and Germany.
CESG CCTM
From CSEG website "CESG protects the vital interests of the UK by providing policy and assistance on the security of communications and electronic data, working in partnership with industry and academia.The CESG Claims Tested Mark (CCTM) scheme provides a government quality mark for the public and private sectors based on accredited independent testing, designed to prove the functionality claims made by Vendors. Testing is carried out by commercial Test Houses".
EAL
Evaluation Assurance Level is a rating given to complete development of a product. Common Criteria lists seven levels with EAL1 being most basic and cheap and EAL 7 most stringent and expensive.
FIPS
Federal Information Processing Standards are US government computer security standards for Cryptographic modules.
ICSA Labs
ICSA Labs is part of Verizon, ICSA has been providing independent third party product testing say FW, IPS etc.
IPv6 Certification
Certifies that a product includes IPv6 mandatory core protocols and interoperability with other IPv6 products.
http://www.ipv6forum.com/ipv6_education/
http://en.wikipedia.org/wiki/DoD_IPv6_Product_Certification
http://www.ipv6forum.com/ipv6_education/
http://en.wikipedia.org/wiki/DoD_IPv6_Product_Certification
ISO/IEC 27001
International Organization for Standardization/International Electrotechnical Commission 27000 family of standards is an Information Security Management Systems standards.
ITSEC
Information Security Technology Evaluation Criteria is used to evaluate Products and Systems for Security weaknesses. ITSEC is followed in Australia, France, Germany and the UK.
http://www.ssi.gouv.fr/
http://www.ssi.gouv.fr/
NSS
Leading independent security products testing organization evaluating performance, security effectiveness and usability of Endpoint and Network Security (firewall, AV, browser, UTM, IDS/IPS, WAF, SWG, VPN, encryption, SIEM, VA/VM, virtualization) appliances.
Section 508
Section 508 of the US Rehabilitation Act of 1973 mandates that Federal agencies acquire products which enable people with disabilities to have access to information and data in a way that is comparable to the access and use experienced by people without disabilities.
TIC
Technology Integration Center is US Army's formal certification program.
TCSEC or Orange Book
Trusted Computer System Evaluation Criteria is a US governments DoD standards for computer security controls. Performed in US only.
http://www.fas.org/irp/nsa/rainbow/std001.htm
http://csrc.nist.gov/
http://www.fas.org/irp/nsa/rainbow/std001.htm
http://csrc.nist.gov/
VPNC
Virtual Private Network Consortium is the international trade association for manufacturers in the VPN market. VPNC does not create standards, it strongly supports the current and future IETF standards.
VPNC interoperability testing: VPNC issues logos for interoperability to VPNC member products which have successfully completed the testing. This testing is available to our IPsec and SSL members.
Anti Virus Certifications
AV's are certified by AV Comparatives, AV Test, Virus Bulletin, West Coast Labs, ICSA Labs, NSS Labs etc. Also AV's are tested against Wildlist.
http://www.av-comparatives.org/index.php
http://www.av-test.org/en/home/
http://www.virusbtn.com/index
http://www.wildlist.org/
http://www.opswat.com/
http://www.av-comparatives.org/index.php
http://www.av-test.org/en/home/
http://www.virusbtn.com/index
http://www.wildlist.org/
http://www.opswat.com/
Tools
Below tools may be used for testing different Perimeter Appliances or Endpoint product.
Below tools may be used for testing different Perimeter Appliances or Endpoint product.
nmap http://nmap.org/
Exploit DB http://www.exploit-db.com/
tcpreplay http://tcpreplay.synfin.net/
Metasploit http://www.metasploit.com/
CoreImpact http://www.coresecurity.com/
Canvas http://immunityinc.com/
Breaking Point http://www.breakingpointsystems.com/
MuDynamics http://www.mudynamics.com/
Stonesoft Predator http://stoneblog.stonesoft.com/tag/ips/
Please comment if I had missed out important Certification or Tool.
Saturday, 21 April 2012
15 Years Old Student Arrested For Hacking into 259 Firms in 3 Months
15 Years Old Student Arrested For Hacking into 259 Firms in 3 Months:
15 Years Old Student Arrested For Hacking into 259 Firms across the span of 3 months
Austrian police have arrested a 15-year-old student suspected of hacking into 259 companies across the span of three months. In other words, during the last quarter he successfully attacked an average of three websites per day. Experts are saying that scanned the Internet for vulnerabilities and bugs in websites and databases that he could then exploit. According to a report of Zdnet - The boy allegedly stole data and published it publicly after breaching the security infrastructures of 259 firms. He also defaced many company websites and boasted about his accomplishments on Twitter, where he also posted links to his data dumps. The firms were attacked between January 2012 and March 2012, and they were not limited to just Austria. He didn’t seem to target specific types of industries: everything from sports companies, to tourism services, to adult entertainment, to search services were attacked.
The teenager used various hacking tools widely available on the Internet, including software that helped him remain anonymous. Now and then, he left messages in the systems he hacked, or simply signed them with the hacker name ACK!3STX. Eventually, however, ACK!3STX’s anonymizing software failed him and his IP address was visible to BMI’s C4 (Cyber Crime Competence Centre) unit. C4 had been receiving multiple complaints from companies since the beginning of the year, so they started monitoring the hacker. At the end of last month, the unit traced his location to a residence in Lower Austria, and then obtained a search warrant. What ever the investigation is still ongoing. Europol is trying to quantify his attacks both at home and abroad.
The teenager used various hacking tools widely available on the Internet, including software that helped him remain anonymous. Now and then, he left messages in the systems he hacked, or simply signed them with the hacker name ACK!3STX. Eventually, however, ACK!3STX’s anonymizing software failed him and his IP address was visible to BMI’s C4 (Cyber Crime Competence Centre) unit. C4 had been receiving multiple complaints from companies since the beginning of the year, so they started monitoring the hacker. At the end of last month, the unit traced his location to a residence in Lower Austria, and then obtained a search warrant. What ever the investigation is still ongoing. Europol is trying to quantify his attacks both at home and abroad.
The last six months saw an increase in password stealing, as malware levels dropped
The last six months saw an increase in password stealing, as malware levels dropped:
Predictions of an increase in attacks on social networks by password-stealing Trojans this year have been confirmed.
In McAfee’s 2010 Threat Predictions, it anticipated that attacks on social networks by password-stealing Trojans and other malware would increase in 2010, and during the current quarter it has seen several examples of that prediction in action. The most prominent of this is the Zeus family, which it usually observes as PWS-Zbot and Spy-Agent.bw, and is the pre-eminent password-stealing Trojan malware, according to its threat report for the first quarter of 2010.
The report said: “Zeus is just one of the key tools of cyber criminals, who often tie password stealers with other types of illegal online material. In this quarter we saw all kind of goodies being installed with Zeus. And whom do you imagine was the prime target for these attacks? Facebook users.”
The most common attack sees an attacker launch a large scam campaign, using a fake password-reset message to get their victims’ attention, in most of the cases. The attached document will usually contain a variant of the Bredolab or Pushdo Trojan, which works as an installer for the Zeus family and requires no user interaction.
The report said: “Facebook users suffered not only from Zeus and fake security attacks but also from new variants of the W32/Koobface worm. In March, more than 150 websites were discovered hosting malicious files in the folder .sys, which is hidden on Unix systems.”
It also claimed that the Zeus family was the cause of one of the biggest increases it had seen in malicious URLs and websites, given its ease of use for and prevalence among cyber criminals.
The report said: “We have seen distinct shifts during the quarter to truly malicious servers using automated domain registration practices and fast flux IPs. Once we find one Zeus machine it is easy to find dozens more. One Zeus command server we identified yielded another 160 malicious domains carrying on everything from social networking and media sharing infections to IRS and other credential phishing.”
Despite these attacks, McAfee also found that spam volumes remained relatively unchanged between the fourth quarter of 2009 and the current quarter, increasing only about five per cent. Between January and March, spam traffic averaged approximately 139 billion messages per day, or 89 per cent of all email traffic. In the prior quarter spam accounted for 133 billion email messages per day.
Mike Gallagher, senior vice president and chief technology officer of Global Threat Intelligence for McAfee, said: “Our latest threat report verifies that trends in malware and spam continue to grow at our predicted rates. Previously emerging trends, such as AutoRun malware, are now at the forefront. We were also surprised to find some of geographic difference in spam related topics, such as the volume of diploma spam coming out of China.”
Predictions of an increase in attacks on social networks by password-stealing Trojans this year have been confirmed.
In McAfee’s 2010 Threat Predictions, it anticipated that attacks on social networks by password-stealing Trojans and other malware would increase in 2010, and during the current quarter it has seen several examples of that prediction in action. The most prominent of this is the Zeus family, which it usually observes as PWS-Zbot and Spy-Agent.bw, and is the pre-eminent password-stealing Trojan malware, according to its threat report for the first quarter of 2010.
The report said: “Zeus is just one of the key tools of cyber criminals, who often tie password stealers with other types of illegal online material. In this quarter we saw all kind of goodies being installed with Zeus. And whom do you imagine was the prime target for these attacks? Facebook users.”
The most common attack sees an attacker launch a large scam campaign, using a fake password-reset message to get their victims’ attention, in most of the cases. The attached document will usually contain a variant of the Bredolab or Pushdo Trojan, which works as an installer for the Zeus family and requires no user interaction.
The report said: “Facebook users suffered not only from Zeus and fake security attacks but also from new variants of the W32/Koobface worm. In March, more than 150 websites were discovered hosting malicious files in the folder .sys, which is hidden on Unix systems.”
It also claimed that the Zeus family was the cause of one of the biggest increases it had seen in malicious URLs and websites, given its ease of use for and prevalence among cyber criminals.
The report said: “We have seen distinct shifts during the quarter to truly malicious servers using automated domain registration practices and fast flux IPs. Once we find one Zeus machine it is easy to find dozens more. One Zeus command server we identified yielded another 160 malicious domains carrying on everything from social networking and media sharing infections to IRS and other credential phishing.”
Despite these attacks, McAfee also found that spam volumes remained relatively unchanged between the fourth quarter of 2009 and the current quarter, increasing only about five per cent. Between January and March, spam traffic averaged approximately 139 billion messages per day, or 89 per cent of all email traffic. In the prior quarter spam accounted for 133 billion email messages per day.
Mike Gallagher, senior vice president and chief technology officer of Global Threat Intelligence for McAfee, said: “Our latest threat report verifies that trends in malware and spam continue to grow at our predicted rates. Previously emerging trends, such as AutoRun malware, are now at the forefront. We were also surprised to find some of geographic difference in spam related topics, such as the volume of diploma spam coming out of China.”
Ultimate guide to Windows 7 security
Ultimate guide to Windows 7 security:
Windows 7 has been warmly received and swiftly adopted by businesses, with the result that many IT admins are now struggling with the platform’s new security features. In addition to changes to User Account Control, BitLocker, and other features inherited from Windows Vista, Windows 7 introduces a slew of security capabilities that businesses will want to take advantage of.
Windows 7 improves on Vista with a friendlier UAC mechanism, the ability to encrypt removable media and hard drive volumes, broader support for strong cryptographic ciphers, hassle-free secure remote access, and sophisticated protection against Trojan malware in the form of AppLocker, to name just a few.
In this guide, I’ll run through these and other significant security enhancements in Windows 7, and provide my recommendations for configuring and using them. I’ll pay especially close attention to the new AppLocker application control feature, which may be a Windows shop’s most practical and affordable way to combat socially engineered Trojan malware.
New and improved
Windows 7 has literally hundreds of security changes and additions, far too many to cover in one fell swoop. While this guide focuses on the ones that most organizations will be interested in, keep in mind that plenty of others may deserve your attention. A few the biggies not discussed here are built-in support for smart cards and biometrics, the ability to force the use of Kerberos in a feature called Restrict NTLM, and support for the new DNSSec standards, which are becoming essential to prevent DNS exploitation attacks. Also noteworthy is a new feature called Extended Protection for Authentication, which prevents many sophisticated man-in-the-middle attacks that can strike at some of our most trusted security protocols (such as SSL and TLS).
User Account Control
A Windows Vista feature that users loved to hate, User Account Control has been significantly improved to be both less intrusive and smarter at distinguishing between legitimate and potentially malicious activities in Windows 7. However, depending on whether you are logged on as administrator or a standard user, some installs of Windows 7 may have a default UAC security setting that’s one level lower than some experts (including yours truly) recommend. Standard users have UAC security default to the most secure setting, while administrator accounts reside a notch below the highest setting, which is potentially riskier.
Note too that, although UAC provides a much-needed mechanism to prevent the misuse of administrator privileges, it can be bypassed. If you need high security, users should not log on with an elevated user account until they need it.
Your domain environment should already be at the highest and most secure level (“Always notify”). If it isn’t, make it so. That way, users will be prompted to input their passwords to perform high risk administrative actions. No matter what else, UAC should be enabled.
more on techworld.com
Windows 7 has been warmly received and swiftly adopted by businesses, with the result that many IT admins are now struggling with the platform’s new security features. In addition to changes to User Account Control, BitLocker, and other features inherited from Windows Vista, Windows 7 introduces a slew of security capabilities that businesses will want to take advantage of.
Windows 7 improves on Vista with a friendlier UAC mechanism, the ability to encrypt removable media and hard drive volumes, broader support for strong cryptographic ciphers, hassle-free secure remote access, and sophisticated protection against Trojan malware in the form of AppLocker, to name just a few.
In this guide, I’ll run through these and other significant security enhancements in Windows 7, and provide my recommendations for configuring and using them. I’ll pay especially close attention to the new AppLocker application control feature, which may be a Windows shop’s most practical and affordable way to combat socially engineered Trojan malware.
New and improved
Windows 7 has literally hundreds of security changes and additions, far too many to cover in one fell swoop. While this guide focuses on the ones that most organizations will be interested in, keep in mind that plenty of others may deserve your attention. A few the biggies not discussed here are built-in support for smart cards and biometrics, the ability to force the use of Kerberos in a feature called Restrict NTLM, and support for the new DNSSec standards, which are becoming essential to prevent DNS exploitation attacks. Also noteworthy is a new feature called Extended Protection for Authentication, which prevents many sophisticated man-in-the-middle attacks that can strike at some of our most trusted security protocols (such as SSL and TLS).
User Account Control
A Windows Vista feature that users loved to hate, User Account Control has been significantly improved to be both less intrusive and smarter at distinguishing between legitimate and potentially malicious activities in Windows 7. However, depending on whether you are logged on as administrator or a standard user, some installs of Windows 7 may have a default UAC security setting that’s one level lower than some experts (including yours truly) recommend. Standard users have UAC security default to the most secure setting, while administrator accounts reside a notch below the highest setting, which is potentially riskier.
Note too that, although UAC provides a much-needed mechanism to prevent the misuse of administrator privileges, it can be bypassed. If you need high security, users should not log on with an elevated user account until they need it.
Your domain environment should already be at the highest and most secure level (“Always notify”). If it isn’t, make it so. That way, users will be prompted to input their passwords to perform high risk administrative actions. No matter what else, UAC should be enabled.
more on techworld.com
Anonymous Hackers target F1 website in Bahrain GP protest
Anonymous Hackers target F1 website in Bahrain GP protest: Anonymous Hackers target F1 website in Bahrain GP protest
Anonymous a collective who have hacked or taken down websites for social comment purposes, have turned their attention to the official Formula 1 website Formula1.com, taking it offline on Friday.
The group also attacked F1-racers.net where it posted a message saying the "Formula 1 racing authority was well-aware of the Human Rights
Anonymous a collective who have hacked or taken down websites for social comment purposes, have turned their attention to the official Formula 1 website Formula1.com, taking it offline on Friday.
The group also attacked F1-racers.net where it posted a message saying the "Formula 1 racing authority was well-aware of the Human Rights
Stuxnet & Duqu, update on cyber weapons usage
Stuxnet & Duqu, update on cyber weapons usage:
In the continuing battle to hold off the Iranian nuclear program, Iranian proxies have also been active in assassinating Iran’s nuclear scientists, these sources said. Key figures of the operations seems to be groups of Iranian dissidents also involved the assassinating og Iran’s nuclear scientists. Of course the choice to use human vector to spread the malware is to reach a more efficient diffusion of the virus avoiding it was discovered before to attack the target.
The group is an exile-Iranian organization that advocates the overthrow of the Islamic Republic of Iran, founded in September 5, 1965 by a group of leftist Iranian university students as an Islamic and Marxist political mass movement. MEK was originally devoted to armed struggle against the Shah of Iran, capitalism, and Western imperialism, during the Iran-Iraq War, the group was given refuge by Saddam Hussein and mounted attacks on Iran from within Iraqi territory. MEK is considered as the military wing of the National Council of Resistance of Iran (NCRI) and has targeted Iranian officials and government facilities in Iran and abroad.
The United States, Canada, Iraq and Iran consider the MEK a terrorist organization. On January 26, 2009, the Council of the European Union removed the MEK from the EU list of organizations it designates as terrorist and United States have received support for intelligence operations against the Iran’s nuclear program in 2002 and 2008.
The report of from Isssource.com says:
Stuxnet was discovered for the first time by Ukrainian firms VirusBlokAda based in Minsk, that was contacted by Iranian dealer that was having problem with several computer of its clients. Apparently the computers were constantly turning off and restarting, but the antivirus were not able to detect the agents because Stuxned used knowledge on zero-day vulnerabilities. Let’s consided also the the source code of the agent was also signed using digital certificates by Realtek Semiconductor and JMicron Technology Corp giving appearance of legitimate software to Microsoft Windows.
Stuxnet was a perfect example of cyber weapon developed to surgical select its targets remaining uncovered and avoiding to infected not target machines. With Stuxnet was in fact introduced a new concept of malware, broad-spectrum deadly weapon capable of hitting in a silent and surgical mode an high number of objectives located anywhere on the planet.
The researchers of the major antivirus companies have identified Stuxnet as the progenitor of another malware, Duqu, it also classified as a cyber weapon developed by a government commitment. Duqu is quite different from its relative, it has a modular structure like Stuxnet but it isn’t equipped with modules for SCADA systems attack. It is only able to steal information from the host system.
On March 2012 a new instance of Duqu has been isolated in a variant designed to evade detection mechanism of antivirus products and other security systems, its the source code appears to be reshuffled and compiled with a different set of options and it also contains a different subroutine for decrypting the configuration block and loading the malware’s body. A similar operation has been already observed in October 2011. Of course also the references to C&C server are changed because all old structures were shut down on Oct. 20, 2011.
Duqu is so still operating, in the last week several instances are creating several in Philippines where Duqu malware is infecting several computers spreading hidden in documents such as Microsoft Word files. The emergency is high according Kaspersky Lab because the malware may begin to affect newly industrialized countries in Asia, including the Philippines that is one of the major IT outsourcing services provider.
Kaspersky’s director of global research & analysis, Costin Raiu with his team, gathered evidence that shows that behind the Stuxnet and Duqu there is the same development team that has used a common platform to build the malwares, but what is really interesting and new is that the researcher is convinced that the same framework has been also used to create at least three other pieces of malware.
We are dealing with an application that consists of several modules each responsible for a specific function to perform. The behavior of the malware to be produced is given by the way in which these modules are made to interact in the same agent. We are facing with a powerful a weapon for the following reasons:
Let’s also consider that in the past malware have been already used for sabotage purpose and intelligence purposes, in the 1980s, the United States had considerable success installing viruses inside Soviet military-industrial structure, a process still continuing with China.
“We put in bugs inside the Soviet computers to feedback satellite information that had been ‘leeched’ off hard drives, in the Soviet Defense Ministry and others,” said a former U.S. intelligence official.
Also during Desert Storm, the CIA and the British Government Communication Headquarters (GCHQ) have used malware agents to attack Iraq’s computers deploying a Command & Control server in the enemy infrastructures. CIA operatives, working in Jordan, infiltrated bugs into hardware smuggled across the border and into Baghdad. In that occasion the compromised devices weren’t used due the beginning US air strikes that destroyed Saddam’s command and control network, including the buildings where the infected computer hardware was deployed.
We will face with also the development of new malware based on the same platform and with the creation of new sophisticated platform used as malware factory.
The war is began!
Pierluigi Paganini
We all know about the malware Stuxnet and Duqu considered unanimously the first examples of cyber weapon developed by a government to silent attacks critical enemy infrastructures. We have wrote a lot on the topic, we have followed with attention the excellent analysis made by experts of the sector such as Ralph Langner and the researchers of the Kaspersky and Symantec security firms; during last days new updates have been published on the web regarding the two agents trying to explain their status and the mode used to spread them behind the enemy line.
Let’s start with the update on the Stuxnet virus that was implanted to damage Iran’s nuclear program. News of the days is that the operation was conducted by Israeli agents with the collaboration of Iranian spy, who used a corrupt “memory stick.32,” to sabotage the nuclear plant of Natanz infecting machines there according the declarations of a former and serving U.S. intelligence officials.In the continuing battle to hold off the Iranian nuclear program, Iranian proxies have also been active in assassinating Iran’s nuclear scientists, these sources said. Key figures of the operations seems to be groups of Iranian dissidents also involved the assassinating og Iran’s nuclear scientists. Of course the choice to use human vector to spread the malware is to reach a more efficient diffusion of the virus avoiding it was discovered before to attack the target.
“They said using a person on the ground would greatly increase the probability of computer infection, as opposed to passively waiting for the software to spread through the computer facility. ‘Iranian double agents’ would have helped to target the most vulnerable spots in the system.”Iran’s intelligence suspected the infiltration of spies inside their plants and arrested an unspecified number of person accused to have supported the operations related to the diffusion of the Stuxnet Virus.
Who are the Iranian spies that have supported the Israeli operations?Former and senior U.S. officials believe Iranian support belonged to the Mujahedeen-e-Khalq (People’s Mujahedin of Iran , alias MEK, also PMOI, MKO).
The group is an exile-Iranian organization that advocates the overthrow of the Islamic Republic of Iran, founded in September 5, 1965 by a group of leftist Iranian university students as an Islamic and Marxist political mass movement. MEK was originally devoted to armed struggle against the Shah of Iran, capitalism, and Western imperialism, during the Iran-Iraq War, the group was given refuge by Saddam Hussein and mounted attacks on Iran from within Iraqi territory. MEK is considered as the military wing of the National Council of Resistance of Iran (NCRI) and has targeted Iranian officials and government facilities in Iran and abroad.
The United States, Canada, Iraq and Iran consider the MEK a terrorist organization. On January 26, 2009, the Council of the European Union removed the MEK from the EU list of organizations it designates as terrorist and United States have received support for intelligence operations against the Iran’s nuclear program in 2002 and 2008.
The report of from Isssource.com says:
“Former and senior U.S. officials believe nuclear spies belonged to the Mujahedeen-e-Khalq (MEK), which Israel uses to do targeted killings of Iranian nationals, they said. “The MEK is being used as the assassination arm of Israel’s Mossad intelligence service,” said Vince Cannistraro, former head of the CIA’s Counterterrorism. He said the MEK is in charge of executing “the motor attacks on Iranian targets chosen by Israel. They go to Israel for training, and Israel pays them.” Other former agency officials confirmed this.”We have always sustained the Israeli has worked close to US government and this is true in the specific campaign against Iranian nuclear program at least for the development of the cyber weapons, but since 2007, five Iranian nuclear scientists have been killed in Iranian territory and the American forces seems to be extraneous to the facts, Israel has used as killer MEK spies well infiltrated in the foreign social context and with a deep knowledge of the activities performed inside the nuclear plants of Iran.
Stuxnet was discovered for the first time by Ukrainian firms VirusBlokAda based in Minsk, that was contacted by Iranian dealer that was having problem with several computer of its clients. Apparently the computers were constantly turning off and restarting, but the antivirus were not able to detect the agents because Stuxned used knowledge on zero-day vulnerabilities. Let’s consided also the the source code of the agent was also signed using digital certificates by Realtek Semiconductor and JMicron Technology Corp giving appearance of legitimate software to Microsoft Windows.
Stuxnet was a perfect example of cyber weapon developed to surgical select its targets remaining uncovered and avoiding to infected not target machines. With Stuxnet was in fact introduced a new concept of malware, broad-spectrum deadly weapon capable of hitting in a silent and surgical mode an high number of objectives located anywhere on the planet.
The researchers of the major antivirus companies have identified Stuxnet as the progenitor of another malware, Duqu, it also classified as a cyber weapon developed by a government commitment. Duqu is quite different from its relative, it has a modular structure like Stuxnet but it isn’t equipped with modules for SCADA systems attack. It is only able to steal information from the host system.
On March 2012 a new instance of Duqu has been isolated in a variant designed to evade detection mechanism of antivirus products and other security systems, its the source code appears to be reshuffled and compiled with a different set of options and it also contains a different subroutine for decrypting the configuration block and loading the malware’s body. A similar operation has been already observed in October 2011. Of course also the references to C&C server are changed because all old structures were shut down on Oct. 20, 2011.
Duqu is so still operating, in the last week several instances are creating several in Philippines where Duqu malware is infecting several computers spreading hidden in documents such as Microsoft Word files. The emergency is high according Kaspersky Lab because the malware may begin to affect newly industrialized countries in Asia, including the Philippines that is one of the major IT outsourcing services provider.
“The spread of Duqu in the Philippines could have dire effects on its multibillion-dollar outsourcing business,”Kaspersky Lab said in a statement.
Kaspersky’s director of global research & analysis, Costin Raiu with his team, gathered evidence that shows that behind the Stuxnet and Duqu there is the same development team that has used a common platform to build the malwares, but what is really interesting and new is that the researcher is convinced that the same framework has been also used to create at least three other pieces of malware.
We are dealing with an application that consists of several modules each responsible for a specific function to perform. The behavior of the malware to be produced is given by the way in which these modules are made to interact in the same agent. We are facing with a powerful a weapon for the following reasons:
- Mutable and non-deterministic behavior of the final agent resultant of the module used.
- Possibility of development of additional modules designed for specific categories of targets .
- Opportunities for collaboration of multiple groups of developer component of different organizations. Having a common platform it is possible in the future to create a real library of modules, functions that can be called like in any other program to infect specific objectives.
“It’s like a Lego set. You can assemble the components into anything: a robot or a house or a tank,”The statement is the perfect syntesis of the key concept behind the new cyber weapons, just as with Lego you can dial any “shape” of malware assembling the individual components in a manner to be able to attack a specific target. Researchers with Kaspersky have named the platform “Tilded” because many of the files in Duqu and Stuxnet have names beginning with the tilde symbol “~” and the letter “d.”
Let’s also consider that in the past malware have been already used for sabotage purpose and intelligence purposes, in the 1980s, the United States had considerable success installing viruses inside Soviet military-industrial structure, a process still continuing with China.
“We put in bugs inside the Soviet computers to feedback satellite information that had been ‘leeched’ off hard drives, in the Soviet Defense Ministry and others,” said a former U.S. intelligence official.
Also during Desert Storm, the CIA and the British Government Communication Headquarters (GCHQ) have used malware agents to attack Iraq’s computers deploying a Command & Control server in the enemy infrastructures. CIA operatives, working in Jordan, infiltrated bugs into hardware smuggled across the border and into Baghdad. In that occasion the compromised devices weren’t used due the beginning US air strikes that destroyed Saddam’s command and control network, including the buildings where the infected computer hardware was deployed.
What we expect from the future?For sure we will assist to the born of new version of the existing agents equipped with more sophisticated modules that include new features and that are also able to avoid antivirus detection.
We will face with also the development of new malware based on the same platform and with the creation of new sophisticated platform used as malware factory.
The war is began!
Pierluigi Paganini
Friday, 20 April 2012
How cybercriminals are infecting networks
How cybercriminals are infecting networks: Research by Websense reveals the trifecta that is driving epidemic levels of data theft:
1) extremely effective social media lures
2) evasive and hard-to-detect infiltration of malware
3) sophist...
1) extremely effective social media lures
2) evasive and hard-to-detect infiltration of malware
3) sophist...
Rootdabitch version 0.1 - Multithreaded Linux root password Bruteforcer
Rootdabitch version 0.1 - Multithreaded Linux root password Bruteforcer: Rootdabitch version 0.1 - Multithreaded Linux root password Bruteforcer
r00tw0rm hacker "th3breacher!" release Rootdabitch v0.1 ,which is a Multithreaded Linux/UNIX tool to brute-force cracking local root through su using sucrack.
<!-- adsense -->
sucrack is a multithreaded Linux/UNIX tool for brute-force cracking local user accounts via su. The main feature of the Rootdabitch is that It's local
r00tw0rm hacker "th3breacher!" release Rootdabitch v0.1 ,which is a Multithreaded Linux/UNIX tool to brute-force cracking local root through su using sucrack.
<!-- adsense -->
sucrack is a multithreaded Linux/UNIX tool for brute-force cracking local user accounts via su. The main feature of the Rootdabitch is that It's local
winAUTOPWN v3.0 Released - System vulnerability exploitation Framework
winAUTOPWN v3.0 Released - System vulnerability exploitation Framework: winAUTOPWN v3.0 Released - System vulnerability exploitation Framework
The improved GUI extension - WINAUTOPWN ACTIVE SYSTEMS TRANSGRESSOR GUI [ C4 - WAST ] is a Systems and Network Exploitation Framework built on the famous winAUTOPWN as a backend. C4 - WAST gives users the freedom to select individual exploits and use them.<!-- adsense -->
BSDAUTOPWN has been compiled, like always for various
The improved GUI extension - WINAUTOPWN ACTIVE SYSTEMS TRANSGRESSOR GUI [ C4 - WAST ] is a Systems and Network Exploitation Framework built on the famous winAUTOPWN as a backend. C4 - WAST gives users the freedom to select individual exploits and use them.<!-- adsense -->
BSDAUTOPWN has been compiled, like always for various
Metasploit Pro, SMB blank user?
Metasploit Pro, SMB blank user?:
Using Metasploit Pro, why would SMB come up as cracked for a blank user (I assume nonexistent) name with a blank password?
Thursday, 19 April 2012
DEFT 7.1 Computer Forensic Live CD can now be downloaded
DEFT 7.1 Computer Forensic Live CD can now be downloaded:
The DEFT Linux Team has officially announced that DEFT 7.1 can now be downloaded on their official website and has been there since March 30 but it is only now that they made a public announcement.
The DEFT Linux Team has officially announced that DEFT 7.1 can now be downloaded on their official website and has been there since March 30 but it is only now that they made a public announcement.
DEFT Linux is a forensic distribution that uses an LXDE as its desktop environment with integrated with recovery tools, forensic and analysis tools, information gathering tools, identity protection tools and many more which is ideal for Computer Forensics geeks.
Here are the complete and official updates for the 7.1 release:
Bug Fix:Updated packages:
Hb4most and xterm’s problem fixed
Gparted
libewf-20120304
bulk_extractor-1.2.0.tar.gz
guymager 0.6.5-1
iPhone Backup Analyzer 10/2012
Xplico 1.0
Computer Forensics side new tools:
UsnJrnl-parser
lslnk
New implementations
After the great work done by Emanuele Gentili and Sandro Rossetti, we are delighted to introduce you the Cyber Intelligence side implementations and we’d like to remember you today there is no other freely distributed system that allows you to perform Intelligence tasks:
OSINT
- “OSINT Chrome browser”: we customized Chrome with several plugins and resources to perform ‘Open Source Intelligence’ related activities,
Network Information Gathering
- Host
- Nslookup
- Dig
- Nmap
- Zenmap
- Netcat
- Snmpcheck
- Nbtscan
- Cadaver
- Traceroute
- Hping3
- Xprobe
- Scapy
- Netdiscover
Wireless Information Gathering
- Kismet
Web Application Information Gathering
- Whatweb
- Cmsident
- Dirbuster
- Burpsuite
- Customized Chrome Browser (at least 1gb ram required)
Social Information Gathering
- Creepy
- Snmpcheck
- PieSpy
- Irssi
Identity Protection Tools
- TOR-Browser
- Anonymouse (http://anonymouse.org/anonwww.html)
OSINT Global Framework
- Maltego
- Proactive Resources
Check out PenTBox – Security Suite!
Check out PenTBox – Security Suite!:
So are you guys familiar with PenTBox? Noo? Alright, here is the startup screenshot that I took for PenTBox:
Well if this is your first time hearing this security suite then lemme introduce it to you. It is a free package coded in ruby that is packed with tools used for pentesting and cracking. Here are the list of tools that are categorized into Cryptography, Network and Web Tools for this package:
So are you guys familiar with PenTBox? Noo? Alright, here is the startup screenshot that I took for PenTBox:
Well if this is your first time hearing this security suite then lemme introduce it to you. It is a free package coded in ruby that is packed with tools used for pentesting and cracking. Here are the list of tools that are categorized into Cryptography, Network and Web Tools for this package:
Cryptography toolsNet DoS Tester (under Network Tools) includes DoS exploits for:
Base64 Encoder & Decoder
Multi-Digest (MD5, SHA1, SHA256, SHA384, SHA512, RIPEMD-160)
Hash Password Cracker (MD5, SHA1, SHA256, SHA384, SHA512, RIPEMD-160)
Secure Password Generator
Network tools
Net DoS Tester
TCP port scanner
Honeypot
Fuzzer
DNS and host gathering
MAC address geolocation (samy.pl)
Web
HTTP directory bruteforce
HTTP common files bruteforce
[other/http] 3Com SuperStack Switch DoS
[other/http] 3Com OfficeConnect Routers DoS (Content-Type)
[windows/ftp] Windows 7 IIS7.5 FTPSVC UNAUTH’D DoS
[windows/ftp] Solar FTP Server 2.1 DoS
[windows/pptp] MS02-063 PPTP Malformed Control Data Kernel DoS
[windows/smb] Windows Vista/7 SMB2.0 Negotiate Protocol Request DoS BSOD
This tool is tested on Linux, Windows and Mac and that you can download this suit here. You can also update this tool by moving to its directory and type svn update or ./pb_update.rb to update PenTBox from the SVN repository, as of now the current version is 1.5.
Subscribe to:
Posts (Atom)