Pages

Thursday, 21 February 2013

Anonymous in cyber wars

Anonymous thrown into China-US cyberwar scandal
RT,
20 February , 2013 16:04


AFP Photo / Aris Messinis


Members of the Anonymous movement including alleged ringleader-turned-informant Hector “Sabu” Monsegur may have played a crucial role in helping cybersecurity experts narrow in on the Chinese hackers profiled in a highly touted report released this week

In a report published Tuesday by Northern Virginia information security company Mandiant, an elusive cybersquadron of hackers hired by China’s People’s Liberation Army are linked to compromising as many as 141 companies across 20 major industries in recent years, including a corporation with access to Canada’s oil pipelines and entities of the United States government.


At around 70 pages, the report offers an introduction into the group, Unit 61398, and explains how computer experts at Mandiant were about to come close to pin-pointing three agents within the “Advanced Persistent Threat” group, or ATP1, that they believe have participated in a covert cyberwar against the US on behalf of the Chinese military.

Buried deep in the report, however, is evidence that Mandiant didn’t do all the work alone: the authors of “Exposing One of China’s Cyber Espionage Units” say that a 2011 hack perpetrated by the loose-knit Anonymous collective has been instrumental in making ground regarding the identity of the Far East hackers.

In the report, Mandiant offers a brief profile of three hackers believed to be involved with ATP1: “uglygorilla,” “DOTA” and “SuperHard.” But while the company admits that their investigation into the unit has been underway for several years already, Mandiant says information released by Anonymous in 2011 has only helped them come closer to catching accused cybercriminals.

In 2011, Anonymous retaliated against so-called security firm HBGary after hacktivists became aware that the company’s CEO, Aaron Barr, had infiltrated the movement and planned to rat out the identities of Anons to federal investigators. In response, Anonymous waged an all-out war on HBGary and its associates, hacking the company’s websites, stealing tens of thousands of emails and compromising the online accounts registered to most of the group’s staff. Among the sites targeted was rootkit.com, a coding website founded by HBGary associate Greg Hoglund. After Anons compromised accounts belonging to Barr, they used new-fangled access to get into Hoglund’s corporate email and from there they socially engineered a colleague of his in order to obtain access to rootkit.com

In her 2012 book We Are Anonymous, author Parmy Olson says Anon hackers “had complete control of rootkit.com” and quickly attempted to ravage the site in conjunction with other attacks waged at HBGary and Mr. Barr.
First they took the usernames and passwords of anyone who had ever registered on the site, then deleted its entire contents. Now it was just a blank page reading ‘Greg Hoglund = Owned,’” Olsen writes.

Next, Anonymous publically released a file that contained the usernames, passwords and other log-in credentials for every registered account on rootkit.com. Among those, says Mandiant, were log-ins for both “uglygorilla” and “SuperHard,” two identities security experts believe to be registered to Chinese hackers working in Unit 61398.

[T]he disclosure of all registered ‘rootkit.com’ accounts published by Anonymous included the user “uglygorilla” with the registered email address uglygorilla@163.com. This is the same email used to register for the 2004 PLA forum and the zone hugesoft.org,” claims Mandiant, referring to the Chinese military branch and another hacker-friendly website believed to be founded by the person using the “uglygorilla” name, respectively.

Mandiant says the trove of information didn’t run dry with just that one link, though. Also included in the rootkit.com leaked account information was the IP address uglygorilla used to sign up for the website, which matched a Shanghai-area address all but certainly tied to Unit 61398, as well as information about another alleged Chinese hacker.

Once again, in tracking [SuperHard] we are fortunate to have access to the accounts disclosed from rootkit.com. The rootkit.com account ‘SuperHard_M’ was originally registered from the IP address 58.247.237.4, within one of the known APT1 egress ranges,” Mandiant reports.

Olson says the hack against HBGary was spearheaded by Hector Xavier Monsegur, or “Sabu,” the alleged ring-leader of the Anon sect LulzSec who was arrested by the FBI several months later and has since become a federal informant for the agency. Monsegur is expected to be sentenced in a New York City courtroom on Friday for a laundry list of criminal activity linked to Anonymous, including hacking HBGary and gaining unauthorized access to Hoglund’s site. Meanwhile, Mandiant says that the infamous hugesoft.org zone website registered to uglygorilla has remained continuously active, at least up until the release of their report this week.


After his 2011 arrest, Monsegur allegedly aided authorities in swooping up other hackers internationally. He is believed to have been provided with a server by the FBI that was allegedly used by activist Jeremy Hammond to upload files confiscated in late 2011 from private intelligence firm Stratfor. Hammond himself will be in court this week for a hearing regarding that case.





White House to issue plan to combat cyber theft



21 February, 2013

President Barack Obama's administration is preparing a strategy to counter theft of US trade secrets, including by hackers in China and other countries, according to two former government officials briefed on a report to be released Wednesday US time. The report will outline a coordinated diplomatic effort to push back against other nations linked to theft of intellectual property and lay out best practices for companies to protect their material, according to the former officials, who asked not to be named before the official announcement.

The document will also outline a government program to share information on trade secret theft with companies, and highlight efforts by the Justice Department and FBI to pursue investigations and prosecutions, according to one of the former officials.

Attorney General Eric Holder will join Victoria A. Espinel, US Intellectual Property Enforcement Coordinator at the Office of Management and Budget, and officials from General Electric Co. and American Superconductor Corp., to release the document titled, "Strategy to Mitigate the Theft of US Trade Secrets," according to a statement on the OMB website.

The strategy "coordinates and improves US efforts to protect innovation" from thefts of intellectual property, Jay Carney, the White House spokesman, said at a briefing today. The effort is related to, though separate from, the administration's efforts to improve US cybersecurity, Mr Carney said.

A US-based security company, Mandiant Corp., released an analysis yesterday that said the Chinese army is probably the source of computer-hacking attacks against at least 141 companies worldwide since 2006.

Government Sponsored

The intrusions, mainly directed at US companies, were carried out by a group that is "likely government sponsored" and is similar "in its mission, capabilities, and resources" to a unit of the People's Liberation Army, according to the Mandiant report.

A spokesman for China's Foreign Ministry, Hong Lei, denied any military involvement and said his department is opposed to computer hacking and has been a victim of attacks itself.

Mr Obama issued an executive order February 12 that calls for sharing of secret government information on the operations of Chinese hackers and other cyber threats. It directs the government to develop voluntary cybersecurity standards for companies operating the nation's vital infrastructure, such as power grids and air traffic control systems.

In his State of the Union address, Mr Obama warned that hackers, including those who are state sponsored, are a national security threat as well as an economic one.

Swiping Secrets

"We know foreign countries and companies swipe our corporate secrets," Mr Obama said. "Now our enemies are also seeking the ability to sabotage our power grid, our financial institutions, and our air traffic control systems."

The news conference is scheduled for 3.15pm. Washington time and will be broadcast on the White House website.

"The administration is focused on protecting the innovation that drives the American economy and supports jobs in the United States," Espinel wrote on OMB's blog.



They're coming to get you!




.

No comments:

Post a Comment

Note: only a member of this blog may post a comment.