Cyber espionage

Cyber espionage, cyber spying, or cyber-collection is the act or practice of obtaining secrets and information without the permission and knowledge of the holder of the information using methods on the Internet, networks or individual computers through the use of proxy servers,[1] cracking techniques and malicious software including Trojan horses and spyware.[2][3] Cyber espionage can be used to target various actors- individuals, competitors, rivals, groups, governments, and others- in order to obtain personal, economic, political or military advantages. It may wholly be perpetrated online from computer desks of professionals on bases in far away countries or may involve infiltration at home by computer trained conventional spies and moles or in other cases may be the criminal handiwork of amateur malicious hackers and software programmers.[2]

History

Cyber spying started as far back as 1996, when widespread deployment of Internet connectivity to government and corporate systems gained momentum. Since that time, there have been numerous cases of such activities.[4][5][6]

Details

Cyber spying typically involves the use of such access to secrets and classified information or control of individual computers or whole networks for a strategic advantage and for psychological, political and physical subversion activities and sabotage.[7] More recently, cyber spying involves analysis of public activity on social networking sites like Facebook and Twitter.[8]

Such operations, like non-cyber espionage, are typically illegal in the victim country while fully supported by the highest level of government in the aggressor country. The ethical situation likewise depends on one's viewpoint, particularly one's opinion of the governments involved.[7]

Platforms and functionality

Cyber-collection tools have been developed by governments and private interests for nearly every computer and smart-phone operating system. Tools are known to exist for Microsoft, Apple, and Linux computers and iPhone, Android, Blackberry, and Windows phones.[9] Major manufacturers of Commercial off-the-shelf (COTS) cyber collection technology include Gamma Group from the UK[10] and Hacking Team from Italy.[11] Bespoke cyber-collection tool companies, many offering COTS packages of zero-day exploits, include Endgame, Inc. and Netragard of the United States and Vupen from France.[12] State intelligence agencies often have their own teams to develop cyber-collection tools, such as Stuxnet, but require a constant source of zero-day exploits in order to insert their tools into newly targeted systems. Specific technical details of these attack methods often sells for six figure sums.[13]

Common functionality of cyber-collection systems include:

  • Data scan: local and network storage are scanned to find and copy files of interest, these are often documents, spreadsheets, design files such as Autocad files and system files such as the passwd file.
  • Capture location: GPS, WiFi, network information and other attached sensors are used to determine the location and movement of the infiltrated device
  • Bug: the device microphone can be activated in order to record audio. Likewise, audio streams intended for the local speakers can be intercepted at the device level and recorded.
  • Hidden Private Networks that bypass the corporate network security. A compute that is being spied upon can be plugged into a legitimate corporate network that is heavy monitored for malware activity and at same time belongs to a private wifi network outside of the company network that is leaking confidential information off of an employee's computer. A computer like this is easily set up by a double-agent working in the IT department by install a second Wireless card in a computer and special software to remotely monitor an employee's computer through this second interface card without them being aware of a side-band communication channel pulling information off of his computer.
  • Camera: the device cameras can be activated in order to covertly capture images or video.
  • Keylogger and Mouse Logger: the malware agent can capture each keystroke, mouse movement and click that the target user makes. Combined with screen grabs, this can be used to obtain passwords that are entered using a virtual on-screen keyboard.
  • Screen Grabber: the malware agent can take periodic screen capture images. In addition to showing sensitive information that may not be stored on the machine, such as e-banking balances and encrypted web mail, these can be used in combination with the key and mouse logger data to determine access credentials for other Internet resources.
  • Encryption: Collected data is usually encrypted at the time of capture and may be transmitted live or stored for later exfiltration. Likewise, it is common practice for each specific operation to use specific encryption and poly-morphic capabilities of the cyber-collection agent in order to ensure that detection in one location will not compromise others.
  • Bypass Encryption: Because the malware agent operates on the target system with all the access and rights of the user account of the target or system administrator, encryption is bypassed. For example, interception of audio using the microphone and audio output devices enables the malware to capture to both sides of an encrypted Skype call.[14]
  • Exfiltration: Cyber-collection agents usually exfiltrate the captured data in a discrete manner, often waiting for high web traffic and disguising the transmission as secure web browsing. USB flash drives have been used to exfiltrate information from air gap protected systems. Exfiltration systems often involve the use of reverse proxy systems that anonymize the receiver of the data.[15]
  • Replicate: Agents may replicate themselves onto other media or systems, for example an agent may infect files on a writable network share or install themselves onto USB drives in order to infect computers protected by an air gap or otherwise not on the same network.
  • Manipulate Files and File Maintenance: Malware can be used to erase traces of itself from log files. It can also download and install modules or updates as well as data files. This function may also be used to place "evidence" on the target system, e.g. to insert child pornography onto the computer of a politician or to manipulate votes on an electronic vote counting machine.
  • Combination Rules: Some agents are very complex and are able to combine the above features in order to provide very targeted intelligence collection capabilities. For example, the use of GPS bounding boxes and microphone activity can be used to turn a smart phone into a smart bug that intercepts conversations only within the office of a target.
  • Compromised cellphones. Since, modern cellphones are increasingly similar to general purpose computer, these cellphones are vulnerable to the same cyber-collect attacks as computer systems, and are vulnerable to leak extremely sensitive conversational and location information to an attackers.[16] Leaking of cellphone GPS location and conversational information to an attacker has been reported in a number of recent cyber stalking cases where the attacker was able to use the victim's GPS location to call nearby businesses and police authorities to make false allegations against the victim depending on his location, this can range from telling the restaurant staff information to tease the victim, or making false witness against the victim. For instance if the victim were parked in large parking lot the attackers may call and state that they saw drug or violence activity going on with a description of the victim and directions to their GPS location.

Infiltration

There are several common ways to infect or access the target:

  • An Injection Proxy is a system that is placed upstream from the target individual or company, usually at the Internet service provider, that injects malware into the targets system. For example, an innocent download made by the user can be injected with the malware executable on the fly so that the target system then is accessible to the government agents.[17]
  • Spear Phishing: A carefully crafted e-mail is sent to the target in order to entice them to install the malware via a Trojan document or a drive by attack hosted on a web server compromised or controlled by the malware owner.[18]
  • Surreptitious Entry may be used to infect a system. In other words, the spies carefully break into the target's residence or office and install the malware on the target's system.[19]
  • An Upstream monitor or sniffer is a device that can intercept and view the data transmitted by a target system. Usually this device is placed at the Internet service provider. The Carnivore system developed by the U.S. FBI is a famous example of this type of system. Based on the same logic as a telephone intercept, this type of system is of limited use today due to the widespread use of encryption during data transmission.
  • A wireless infiltration system can be used in proximity of the target when the target is using wireless technology. This is usually a laptop based system that impersonates a WiFi or 3G base station to capture the target systems and relay requests upstream to the Internet. Once the target systems are on the network, the system then functions as an Injection Proxy or as an Upstream Monitor in order to infiltrate or monitor the target system.
  • A USB Key preloaded with the malware infector may be given to or dropped at the target site.

Cyber-collection agents are usually installed by payload delivery software constructed using zero-day attacks and delivered via infected USB drives, e-mail attachments or malicious web sites.[20][21] State sponsored cyber-collections efforts have used official operating system certificates in place of relying on security vulnerabilities. In the Flame operation, Microsoft states that the Microsoft certificate used to impersonate a Windows Update was forged;[22] however, some experts believe that it may have been acquired through HUMINT efforts.[23]

Examples of operations

See also

References

  1. ^ "Residential proxy network use cases". GeoSurf. Retrieved 28 September 2017.
  2. ^ a b "Cyber Espionage". PC Magazine.
  3. ^ "Cyberspying". Techopedia. 11 March 2024.
  4. ^ Pete Warren, State-sponsored cyber espionage projects now prevalent, say experts, The Guardian, August 30, 2012
  5. ^ Nicole Perlroth, Elusive FinSpy Spyware Pops Up in 10 Countries, New York Times, August 13, 2012
  6. ^ Kevin G. Coleman, Has Stuxnet, Duqu and Flame Ignited a Cyber Arms Race? Archived 2012-07-08 at the Wayback Machine, AOL Government, July 2, 2012
  7. ^ a b Messmer, Ellen. "Cyber Espionage: A Growing Threat to Business". Archived from the original on January 26, 2021. Retrieved Jan 21, 2008.
  8. ^ "Five Ways the Government Spies on You". The LockerGnome Daily Report. 7 November 2011. Archived from the original on 18 October 2019. Retrieved 9 February 2019.
  9. ^ Vernon Silver, Spyware Matching FinFisher Can Take Over IPhones,, Bloomberg, August 29, 2012
  10. ^ "FinFisher IT Intrusion". Archived from the original on 2012-07-31. Retrieved 2012-07-31.
  11. ^ "Hacking Team, Remote Control System". Archived from the original on 2016-12-15. Retrieved 2013-01-21.
  12. ^ Mathew J. Schwartz, Weaponized Bugs: Time For Digital Arms Control, Information Week, 9 October 2012
  13. ^ Ryan Gallagher, Cyberwar’s Gray Market, Slate, 16 Jan 2013
  14. ^ Daniele Milan, The Data Encryption Problem Archived 2022-04-08 at the Wayback Machine, Hacking Team
  15. ^ Robert Lemos, Flame stashes secrets in USB drives Archived 2014-03-15 at the Wayback Machine, InfoWorld, June 13, 2012
  16. ^ how to spy on a cell phone without having access
  17. ^ Pascal Gloor, (Un)lawful Interception Archived 2016-02-05 at the Wayback Machine, SwiNOG #25, 07 November 2012
  18. ^ Mathew J. Schwartz, Operation Red October Attackers Wielded Spear Phishing, Information Week, January 16, 2013
  19. ^ FBI Records: The Vault, Surreptitious Entries, Federal Bureau of Investigation
  20. ^ Kim Zetter, "Flame" spyware infiltrating Iranian computers, CNN - Wired, May 30, 2012
  21. ^ Anne Belle de Bruijn, Cybercriminelen doen poging tot spionage bij DSM, Elsevier, July 9, 2012
  22. ^ Mike Lennon, Microsoft Certificate Was Used to Sign "Flame" Malware Archived 2013-03-07 at the Wayback Machine, June 4, 2012
  23. ^ Paul Wagenseil, Flame Malware Uses Stolen Microsoft Digital Signature, NBC News, June 4, 2012
  24. ^ "Red October" Diplomatic Cyber Attacks Investigation, Securelist, January 14, 2013
  25. ^ Kaspersky Lab Identifies Operation Red October Archived 2016-03-04 at the Wayback Machine, Kaspersky Lab Press Release, January 14, 2013
  26. ^ Dave Marcus & Ryan Cherstobitoff, Dissecting Operation High Roller Archived 2013-03-08 at the Wayback Machine, McAfee Labs
  27. ^ "the Dukes, timeline". Archived from the original on 2015-10-13. Retrieved 2015-10-13.
  28. ^ "The Dukes Whitepaper" (PDF). Archived (PDF) from the original on 2015-12-09.
  29. ^ "F-Secure Press Room - Global".

Sources

Read other articles:

Artikel ini bukan mengenai bangsa Kazaki. Kazak қазақтар (kiri ke kanan) A. Qunanbayuli • Ablai Khan • Dinmukhamed Konayev A. Baitursynov • T. Aubakirov • Chokan Valikhanov • Alikhan Bokeikhanov • Mirjaqip DulatuliJumlah populasi16.000.000Daerah dengan populasi signifikan Kazakstan13.500.000[1] Tiongkok1.000.000[2] Uzbekistan800.000[3] Rusia647.000[4] Mongolia100.000[5] Turkmenistan20.000[6] ...

 

artikel ini perlu dirapikan agar memenuhi standar Wikipedia. Tidak ada alasan yang diberikan. Silakan kembangkan artikel ini semampu Anda. Merapikan artikel dapat dilakukan dengan wikifikasi atau membagi artikel ke paragraf-paragraf. Jika sudah dirapikan, silakan hapus templat ini. (Pelajari cara dan kapan saatnya untuk menghapus pesan templat ini) Medina Warda AuliaMedina Warda Aulia, World Junior Championship 2012 di AthenaNama lengkapMedina Warda AuliaAsal negaraIndonesiaLahir7 J...

 

Це стаття про невизнаний суб'єкт РФ. Про адмінодиницю у складі України — див. АР Крим. Про самопроголошену державу — див. Республіка Крим (невизнана держава) У Вікіпедії є статті про інші значення цього терміна: Крим (значення). Республіка Крим рос. Республика Крым кр�...

American pornographic actress Asa AkiraAkira in November 2016Born (1985-01-03) January 3, 1985 (age 39)[1]Height5 ft 2 in (1.57 m)[2]Spouse Toni Ribas ​ ​(m. 2012; div. 2017)​ Websiteasaakira.com Asa Akira (born January 3, 1985) is an American pornographic film actress, writer and adult film director. Akira has appeared in 689 adult films as of June 2023. In 2013, she became the third Asian performer (after As...

 

City in Nevada, United States City in Nevada, United StatesElko, Nevada NatakkoaCityDowntown Elko FlagMotto: The Heart of Northeast Nevada[1]Location of Elko, NevadaElko, NevadaLocation in NevadaShow map of NevadaElko, NevadaElko, Nevada (the United States)Show map of the United StatesCoordinates: 40°50′N 115°46′W / 40.833°N 115.767°W / 40.833; -115.767CountryUnited StatesStateNevadaCountyElkoFirst settled1868Designated county seat1869Incorporated...

 

Perang KroasiaBagian dari Perang YugoslaviaSearah jarum jam dari kiri atas: kerusakan akibat bombardir di Stradun, Dubrovnik, patroli Garda Sukarelawan Serbia di dekat Erdut, reruntuhan di Vukovar, petugas JNA memeriksa dokumen di dekat Dubrovnik, Tank T-34 yang hancur dekat KarlovacTanggal31 Maret 1991 – 12 November 1995(4 Tahun, 7 bulan, 1 Minggu, 5 hari)LokasiKroasiaHasil Kemenangan Kroasia Mundurnya Tentara Yugoslavia dari Kroasia Kemerdekaan Penuh Kroasia Pembubaran Republik Krajina Se...

This article is about the diacritic mark to indicate the vowel-fronting sound change. For other uses of the same or similar mark, see Two dots (diacritic). Diacritic mark to indicate sound shift ◌̈ UmlautU+0308 ◌̈ COMBINING DIAERESIS[a] The umlaut (/ˈʊmlaʊt/) is the diacritical mark (◌̈) used to indicate in writing (as part of the letters ⟨ä⟩, ⟨ö⟩, and ⟨ü⟩) the result of the historical sound shift due to which for...

 

Battle that occurred during the Greek War of Independence Battle of DolianaPart of the Greek War of IndependenceThe house which Nikitaras utilized as a fortification; nowadays transformed into a museum.Date30 May 1821 (18 May Julian)LocationDoliana, Morea Eyalet, Ottoman Empire (now Arcadia, Greece)37°23′16″N 22°29′55″E / 37.387643°N 22.498677°E / 37.387643; 22.498677Result Greek victoryBelligerents Greek revolutionaries Ottoman EmpireCommanders and leaders...

 

Sculpture in Washington, D.C., U.S. For other uses, see Victims of Communism Memorial (disambiguation). Victims of Communism MemorialGoddess of Democracy replica38°53′54″N 77°00′43″W / 38.8984°N 77.0120°W / 38.8984; -77.0120Location Washington, D.C.DesignerThomas MarshTypeStatueBeginning dateSeptember 27, 2006Opening dateJune 12, 2007Websitevictimsofcommunism.org/memorial The Victims of Communism Memorial is a memorial in Washington, D.C. located ...

This article is about the cathedral in St Andrews, Scotland. For cathedrals of St Andrew elsewhere, see St Andrew's Cathedral (disambiguation). This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: St Andrews Cathedral – news · newspapers · books · scholar · JSTOR (October 2015) (Learn how and when to remove this ...

 

National Hockey League season Sports season2017–18 NHL seasonLeagueNational Hockey LeagueSportIce hockeyDurationOctober 4, 2017 – June 7, 2018Number of games82Number of teams31TV partner(s)CBC, Sportsnet, TVA Sports (Canada)NBCSN, NBC, CNBC, USA (United States)DraftTop draft pickNico HischierPicked byNew Jersey DevilsRegular seasonPresidents' TrophyNashville PredatorsSeason MVPTaylor Hall (Devils)Top scorerConnor McDavid (Oilers)PlayoffsPlayoffs MVPAlexander Ovechkin (Capitals)Stanley Cup...

 

Un tavolo di legno. Il tavolo è un mobile formato da un piano, spesso rettangolare, quadrato o tondo, di legno, metallo, plastica, di cristallo o altro materiale rigido, sostenuto da una, due, tre, quattro o più gambe, e che ha forma e dimensioni diverse, a seconda dell'uso cui è adibito. Può anche essere sostenuto da una colonna centrale; in questo caso di solito ha un ripiano piccolo, spesso circolare. ll piano di appoggio è caratterizzato dall’essere piatto (da qui il detto “piatt...

Romance language of the West Iberian group Bable redirects here. Not to be confused with Babel or Babble. Not to be confused with Austrian German. AsturianasturianuNative toSpainRegionAsturiasEthnicityAsturiansNative speakersAround 1/3 of Asturians[1] (2000)62% of Asturians[2] (2017)Language familyIndo-European ItalicLatino-FaliscanLatinRomanceItalo-WesternWesternIberian RomanceWest IberianAsturleoneseAsturianDialects Western Asturian Writing systemLatinOfficial stat...

 

Metro station in Paris, France This article is about the Paris Métro (subway) station. For the mainline (national) railway station, see Paris-Gare de Lyon. Gare de LyonLine 1 platforms on left, right track currently serve for tests for five-car sets MP 89 prior their move to Line 6 for replacing MP 73, this track also serves with Line 5 connectionGeneral informationLocation20 bis, 25, 27, 28, Boul. Diderot167, 175, 191, 201, 203, Rue de BercyGare de Lyon (three)12th arrondissement of ParisÎ...

 

尊敬的拿督赛夫丁阿都拉Saifuddin bin Abdullah国会议员馬來西亞国会下议院英迪拉马哥打现任就任日期2018年7月16日 (2018-07-16)前任法兹阿都拉曼(希盟公正党)多数票10,950(2018) 马来西亚外交部长任期2021年8月30日—2022年11月24日君主最高元首苏丹阿都拉首相依斯迈沙比里副职卡玛鲁丁查化(国盟土团党)前任希山慕丁(国阵巫统)继任赞比里(国阵巫统)任期2018年7月2�...

بيض الفصحمعلومات عامةصنف فرعي من عمل فنيبيضةطعام الشَّركة المُصنِّعة Easter eggs decorator (en) وضع التراث الثقافي غير المادي Wiki-inventory for living heritage (en) [1] تعديل - تعديل مصدري - تعديل ويكي بيانات بيض الفصح مائدة تقليدية لعيد الفصح تحتوي على البيض المزركش من كرواتيا بيض الفصح هو البيض ا...

 

17th to 19th-century Catholic religious outposts Part of a series onSpanish missionsin the Americasof the Catholic Church Missions in North America Arizona Baja California California The Carolinas Chihuahua Florida Georgia Louisiana Mexico New Mexico Querétaro Sonoran Desert Texas Trinidad Virginia Missions in South America Chiloé Chiquitos Córdoba Itapúa Moxos Nahuel Huapi Mainas Eastern Missions Río Bueno Related topics Cargo system Mission Indians Reductions Andes Jesuit Catholicism&#...

 

Turks and Caicos Cricket Association is the official governing body of the sport of cricket in Turks and Caicos Islands. Its current headquarters is in Moores Alley Grand Turk, Turks and Caicos Islands. Turks and Caicos Cricket Association is Turks and Caicos Islands's representative at the International Cricket Council and is an associate member[1] and has been a member of that body since 2002. It is included in the ICC Americas region. References ^ Ireland and Afghanistan ICC newest...

Cet article est une ébauche concernant une localité vénézuélienne. Vous pouvez partager vos connaissances en l’améliorant (comment ?) selon les recommandations des projets correspondants. Puerto Ordaz Les paroisses civiles de Cachamay au premier plan, d'Universidad au second plan et le río Caroní. Administration Pays Venezuela État Bolívar Géographie Coordonnées 8° 16′ 30″ nord, 62° 45′ 21″ ouest Localisation Géolocalisation sur la ...

 

Amazon Alexa, juga dikenal sebagai Alexa, adalah sebuah teknologi bantuan virtual yang dikembangkan oleh Amazon. Alat tersebut mula-mula dipakai dalam Amazon Echo, Echo Dot, Echo Studio dan Amazon Tap yang dikembangkan oleh Amazon Lab126. Lihat pula Cortana Google Assistant Mycroft Siri Referensi Pranala luar Amazon Alexa Web Portal Alexa Skills Store on Amazon.com Alexa Compatible Devices on Amazon.com Alexa Supported Languages on Amazon.com Amazon Alexa for Developers on Amazon.com A Murde...