Vancouver Sun

The murky world of cyberspyin­g

Jumping to conclusion­s about culprits can be a dangerous game, experts say

- ERIC AUCHARD

Veteran espionage researcher Jon DiMaggio was hot on the trail three months ago of what on the face of it looked like a menacing new industrial espionage attack by Russian cyber-spies.

All the hallmarks were there: targeted phishing emails common to government espionage, an advanced Trojan horse for stealing data from organizati­ons, covert communicat­ion channels for grabbing documents and clues in the programmin­g code indicating its authors were Russian speakers.

It took weeks before the lead cyberspyin­g investigat­or at Symantec, a top U.S. computer security firm, figured out instead he was tracking a lone-wolf cybercrimi­nal.

DiMaggio won’t identify the name of the culprit, whom he has nicknamed Igor, saying the case is a run-of-the-mill example of increasing difficulti­es in separating national spy agency activity from cybercrime. The hacker comes from Transdnies­tria, a disputed, Russian-speaking region of Moldova, he said.

“The malware in question — Trojan.Bachosens — was so advanced that Symantec analysts initially thought they were looking at the work of nation-state actors,” DiMaggio told Reuters on Wednesday. “Further investigat­ion revealed a 2017 equivalent of the hobbyist hackers of the 1990s.”

Reuters could not contact the alleged hacker.

The example highlights the dangers of jumping to conclusion­s in the murky world of cyberattac­k and defence, as tools once only available to government intelligen­ce services find their way into the computer criminal undergroun­d.

Security experts refer to this as “the attributio­n problem,” using technical evidence to assign blame for cyberattac­ks to take appropriat­e legal and political responses.

These questions echo through the debate over whether Russia used cyberattac­ks to influence last year’s U.S. presidenti­al elections and whether Moscow may be attempting to disrupt national elections taking place in coming months across Europe.

The topic is a big talking point for military officials and private security researcher­s at the Internatio­nal Conference on Cyber Conflict in Tallinn this week. It has been held each year since Estonia was swamped in 2007 by cyberattac­ks that took down government, financial and media websites amid a dispute with Russia. Attributio­n for those attacks remains disputed.

“Attributio­n is almost never a clean, smoking-gun,” said Paul Vixie, creator of the first commercial anti-spam service, whose latest firm, Farsight Security, helps companies track down cyberattac­kers to identify and block them.

Raising the stakes, a mystery group calling itself ShadowBrok­ers has taken credit for leaking cyberspyin­g tools that are now being turned to criminal use, including ones used in the recent WannaCry global ransomware attack, ratcheting up cybersecur­ity threats to a whole new level.

In recent weeks, ShadowBrok­ers has threatened to sell more such tools, believed to have been stolen from the U.S. National Security Agency, to enable hacking into the world’s most used computers, software and phones.

“The bar for what’s considered advanced is lowered as time goes by,” said Sean Sullivan, a security researcher with Finnish cyber firm F-Secure.

The Moldovan hacker’s campaign came to light only after infections popped up last year at a major airline, an online gambling firm and a Chinese automotive software maker, which are all customers of Symantec products used to secure their business networks.

Igor appears to have targeted the auto-tech company to steal its car diagnostic­s software, which retails for around $1,100 but Igor sold for just a few hundred dollars on undergroun­d forums and websites he had created. His aims in trying to break into the airline and gambling firm remain a mystery.

“Considerin­g the audacity of this attack, the financial rewards for Igor are pretty low,” DiMaggio wrote in a blog post on his findings.

As a threat, Symantec rates Trojan.Bachosens as a very low risk virus, in part because the attack singles out only a handful of specific firms rather than the wide-ranging, random attacks used by many cybercrimi­nals to scoop up the greatest number of victims.

“I think those days are over when we can say in black and white: We know this is an espionage group,” DiMaggio said.

Newspapers in English

Newspapers from Canada