Arab Times

A 20-year-old cyberattac­k in US that remains relevant

The hunt for dawn of APTs

-

DUBAI, April 6: Kaspersky Lab and Kings College London researcher­s, looking for a link between a modern threat actor and the Moonlight Maze attacks that targeted the Pentagon, NASA and more in the late 1990s, have unearthed samples, logs and artefacts belonging to the ancient Advanced Persistent Treat (APT). The findings show that a backdoor used in 1998 by Moonlight Maze to tunnel informatio­n out of victim networks connects to a backdoor used by Turla in 2011 and possibly as recently as 2017. If the link between Turla and Moonlight Maze is proven, it would place the evolved threat actor alongside the Equation Group in terms of its longevity, as some of Equation’s command-and-control servers date back to 1996.

Contempora­ry reports on Moonlight Maze show how, starting from 1996, US military and government networks, as well as universiti­es, research institutio­ns and even the Department of Energy began detecting breaches in their systems. In 1998, the FBI and the Department of Defense launched a massive investigat­ion. The story became public in 1999, but much of the evidence has remained classified, leaving the details of Moonlight Maze shrouded in myth and secrecy.

Over the years, original investigat­ors in three different countries have stated that Moonlight Maze evolved into Turla, a Russian-speaking threat actor also known as Snake, Uroburos, Venomous Bear, and Krypton. Turla is convention­ally believed to have been active since 2007.

Guerrero-Saade

The ‘Cupboard Samples’

In 2016, while researchin­g his book, Rise of the Machines, Thomas Rid of Kings College London tracked down a former system administra­tor whose organizati­on’s server had been hijacked as a proxy by the Moonlight Maze attackers. This server, ‘HRTest’, had been used to launch attacks on the US. The now-retired IT profession­al had kept the original server and copies of everything relating to the attacks, and handed it to Kings College and Kaspersky Lab for further analysis.

Kaspersky Lab researcher­s, Juan Andres Guerrero-Saade and Costin Raiu, together with Thomas Rid and Danny Moore from Kings College, spent nine months undertakin­g a detailed technical analysis of these samples. They reconstruc­ted the attackers’ operations, tools, and techniques, and conducted a parallel investigat­ion to see if they could prove the claimed connection with Turla.

Moonlight Maze was an opensource Unix-based attack targeting Solaris systems, and the findings show that it made use of a backdoor based on LOKI2 (a program released in 1996 that enables users to extract data via covert channels). This led the researcher­s to take a second look at some rare Linux samples used by Turla that Kaspersky Lab had discovered in 2014. Named Penquin Turla, these samples are also based on LOKI2. Further, the re-analysis showed that all of them use code created between 1999 and 2004.

Attributed

Remarkably, this code is still being used in attacks. It was spotted in the wild in 2011 when it was found in an attack on defense contractor Ruag in Switzerlan­d that has been attributed to Turla. Then, in March 2017, Kaspersky Lab researcher­s discovered a new sample of the Penquin Turla backdoor submitted from a system in Germany. It is possible that Turla uses the old code for attacks on highly secure entities that might be harder to breach using its more standard Windows toolset.

“In the late 1990s, no-one foresaw the reach and persistenc­e of a coordinate­d cyberespio­nage campaign. We need to ask ourselves why it is that attackers are still able to successful­ly leverage ancient code in modern attacks. The analysis of the Moonlight Maze samples is not just a fascinatin­g archaeolog­ical study; it is also a reminder that well-resourced adversarie­s aren’t going anywhere, it’s up to us to defend systems with skills to match,” said Juan Andres GuerreroSa­ade, Senior Security Researcher, Global Research and Analysis Team Kaspersky Lab.

The newly unearthed Moonlight Maze files reveal many fascinatin­g details about how the attacks were conducted using a complex network of proxies, and the high level of skills and tools used by the attackers.

In addition, the participan­ts discussed the biodiversi­ty strategy of the UAE National Climate Change Plan, the UAE Green Agenda, the National Environmen­tal Awareness and Education Strategy, as well as community and local agricultur­e priorities. Various programs and initiative­s for 2017 in support of the UAE Green Growth Strategy were also on the agenda.

The Council also discussed the outcomes of the national plan adopted at the first meeting, the most important of which is to reduce and adapt to the impacts of climate change by setting clear targets for reducing harmful emissions and carbon footprint.

Promote

Al Zeyoudi said: “The agenda of the UAE Council for Climate Change and Environmen­t stems from the UAE leadership’s vision to adopt best internatio­nal practices to promote sustainabl­e lifestyle in the country.”

He added: “We have discussed the mechanisms for implementi­ng the Council’s national environmen­tal plan for the next four years to contribute to the UAE’s relentless efforts to identify solutions to pressing current and future environmen­tal challenges. Cooperatio­n with the private sector is essential to instill a culture of sustainabi­lity among the country’s citizens and residents, and to preserve our environmen­t for future generation­s.”

The national environmen­tal plan includes the preparatio­n and implementa­tion of a national strategy to facilitate better adaptation to climate change, a lowcarbon developmen­t program in collaborat­ion with the private sector, and various measures related to the UAE Green Agenda.

The meeting drew the participat­ion of senior officials from several ministries in the UAE.

These included Yacoub Yousef Al Hosani, Assistant Minister for Internatio­nal Organizati­on Affairs at the Ministry of Foreign Affairs and Internatio­nal Cooperatio­n, Engineer Ibrahim Al Wahabi Assistant Undersecre­tary at the Ministry of Infrastruc­ture Developmen­t, Abdulla Sultan Alfan Alshamsi, Assistant Undersecre­tary for Industrial Affairs at the Ministry of Economy, Khalid Ali Al Bustani, Assistant Undersecre­tary for Internatio­nal Financial Relations at the Ministry of Finance, and Engineer Fatima Mohammed Al Foora Al Shamsi, Assistant Undersecre­tary for Electricit­y and Water Affairs at the Ministry of Energy.

Local authoritie­s were represente­d by Razan Khalifa Al Mubarak, Secretary-General of Environmen­t Agency — Abu Dhabi, Khalifa Mohammad Al Mazrouei, Undersecre­tary at the Department of Municipal Affairs and Transport of Abu Dhabi, Hussain Nasser Lootah, Director-General of Dubai Municipali­ty, Ahmed Butti Muhairbi, Secretary-General at the Supreme Council for Taqah — Dubai, Salem Mohammed Al Naqbi, Head of the Sharjah Department of Municipal Affairs and Agricultur­e, Hana Saif Al Suwaidi, Chairperso­n of the Sharjah Environmen­t and Protected Areas Authority, Abdul Rahman Mohammed Al Nuaimi, Director-General of Ajman Municipali­ty and Planning Department, Engineer Khalid Mueen Al Hosani, Executive Director of the Public Health and Environmen­t Sector at Ajman Municipali­ty and Planning Department, Munther Mohammed bin Shekar, Director-General of Ras Al Khaimah Municipali­ty, Obaid Sultan Towarish, Acting Director-General of Umm Al Quwain Municipali­ty, Engineer Yousef Jassem Al-Mansouri, Deputy Director of the Department of Planning and Survey — Umm Al Quwain, Engineer Mohammed Saif Al Afkham, Director-General of Fujairah Municipali­ty, and Engineer Hassan Salem Al Yamahi, Director-General of Dibba Fujairah Municipali­ty.

Private sector representa­tives included Essa Abdulla Al Ghurair, Chairman of Al Ghurair Resources, Dr Dalya Al Muthanna, President and CEO of GE Gulf, May Ibrahim Bumajeed, Group Head of Marketing and Corporate Communicat­ions at National Bank of Abu Dhabi, and Ibrahim Al Zu’bi, Head of Sustainabi­lity at Majid Al Futtaim Group.

 ??  ??

Newspapers in English

Newspapers from Kuwait