[Infowarrior] - Future of Cyber Security: Hackers Have Grown Up

Richard Forno rforno at infowarrior.org
Wed Jul 29 02:38:41 UTC 2009


(c/o St)

Future of Cyber Security: Hackers Have Grown Up
By Kevin Poulsen | 07.28.09

http://www.wired.com/dualperspectives/article/news/2009/07/dp_security_wired0728

Late last year, the software engineers developing a new Windows-based  
networking client confronted an all-too-common problem in today's  
hostile internet environment: How would they make their software  
resistant to the legions of enemies waiting to attack it? Particularly  
worrisome was a key feature of their code, a mechanism to accept  
updates online. If it were subverted, an attacker could slip his own  
program into an installed base of millions of machines.


The coders decided to fortify their software with MIT's brand-new,  
high-security cryptographic hashing algorithm called MD-6. It was an  
ambitious choice: MD-6 had been released just two months before, and  
hadn't yet faced the rigors of real-life deployment. Sure enough, the  
move seemed to backfire when a security hole was found in MD-6's  
reference implementation not long after the launch. But the coders  
rallied, and pushed out a corrected version in a new release of their  
software just weeks later.


It would be a model for secure software development, except for one  
detail: The "Windows-based networking client" in the example above is  
the B-variant of the spam-spewing Conficker worm; the corrected  
version is Conficker C, and the hard-working security-minded coders  
and software engineers? A criminal gang of anonymous malware writers,  
likely based in Ukraine. The very first real-world use of MD-6, an  
important new security algorithm, was by the bad guys.


This is the future of hacking: professional, smart, and above-all well- 
funded. In the old days, hackers were mostly kids and college-age  
acolytes sowing their wild oats before joining the establishment.  
Today, the best hackers have the skill and discipline of the best  
legitimate programmers and security gurus. They're using mind-bending  
obfuscation techniques to deliver malicious code from hacked websites  
undetected. They're writing malware for mobile phones and PDAs. The  
underground has even embraced the next-generation internet protocol  
IPv6, according to research by IBM -- setting up IPv6 chat rooms, file  
stores and websites, even as legitimate adoption lags. Ten years ago,  
an oft-repeated aphorism held that hackers were unskilled vandals:  
Just because they can break a window, doesn't mean they could build  
one. Today's bad guys could handcraft the stained glass in the Sainte- 
Chapelle.


Money is the catalyst for this change: Computer criminals are scooping  
in millions through various scams and attacks. The best hackers are  
growing up in Russia and former Soviet satellite states, where there  
are fewer legitimate opportunities for smart coders. "If you're a  
sophisticated team of software developers, but you happen to be in  
Eastern Europe, what's your way of raising a lot of money?" says  
Phillip Porras, the cyber threat expert at SRI International who  
dissected Conficker. "Maybe we're dealing with business models that  
work for countries where it's more difficult for them to sell  
mainstream software."


One result is hacking-as-a-service. Want your custom code installed in  
a botnet of hacked machines? It'll cost you $23 for a 1,000 computers,  
$130 if you want them exclusively, says Uri Rivner, head of new  
technologies at security company RSA. Or you can pay for a custom  
Trojan horse that will sneak past anti-virus software, or a toolkit  
that will let you craft your own. "They actually have a testing lab  
where they test their malicious code against the latest anti-virus  
companies," says Rivner, whose group closely monitors the underground.  
While most computer criminals are "thugs," the programmers and  
software entrepreneurs supplying them are scary-smart, he says.


Particularly disturbing to security experts is the speed with which  
the bad guys are jumping on newly disclosed vulnerabilities. "Even one  
year ago, a lot of these web exploit toolkits were using  
vulnerabilities that had been discovered one or two years prior," says  
Holly Stewart, Threat Response Manager at IBM's X-Force. "They were  
really, really old.... That has really changed, especially this year.  
We're seeing more and more current exploits go into these toolkits.  
And we're seeing exploits come out that are even just a couple days  
after the vulnerability announcement."


Even worse, hackers are finding or purchasing their own  
vulnerabilities, called "zero day" exploits, for which no security  
patch exists. With real money to be had, there's evidence that  
legitimate security workers are being tempted themselves. In April,  
federal prosecutors filed a misdemeanor conspiracy charge against  
security consultant Jeremy Jethro for allegedly selling a "zero day"  
Internet Explorer exploit to accused TJ Maxx hacker Albert Gonzales.  
The price tag: $60,000. It could take a lot of consulting gigs to make  
that kind of money performing penetration tests.


The change is being felt at every level of the cyber security world.  
When SRI's Porras dug into the Conficker worm -- which still controls  
an estimated 5 million machines, mostly in China and Brazil -- the  
update mechanism initially baffled him and his team. "I know a lot of  
people stared at that segment of code and couldn't figure out what it  
was," he says. It wasn't until crypto experts analyzed it that they  
realized it was MD-6, which at the time was available only from the  
websites of MIT and the U.S. National Institute of Standards and  
Technologies. Other portions of Conficker were equally impressive: the  
way it doggedly hunts for anti-virus software on a victim's machine,  
and disables it; or the peer-to-peer mechanism. "There were points  
where it was pretty clear that certain major threads inside Conficker  
C seemed to be written by different people," he says. "It left us  
feeling that we had a more organized team that brought different  
skills to bear.... They aren't people who have day jobs."


Looking back, the first 20 years in the war between hackers and  
security defenders was pretty laid back for both sides. The hackers  
were tricky, sometimes even ingenious, but rarely organized. A wealthy  
anti-virus industry rose on the simple counter-measure of checking  
computer files for signatures of known attacks. Hackers and security  
researchers mixed amiably at DefCon every year, seamlessly switching  
sides without anyone really caring. From now on, it's serious. In the  
future, there won't be many amateurs.





More information about the Infowarrior mailing list