Khaleej Times

Is North Korea a cover for rising cyber attacks?

Beijing could be involved but no one wants to ruffle the dragon for fear of reprisals

-

The US government has officially attributed to North Korea the WannaCry ransomware attack, which encrypted hundreds of thousands of computer drives around the world in May 2017. And yet as with a series of other highly public cyberattac­k attributio­ns, little evidence for the claim was made public. It’s time for the cybersecur­ity world to follow the advice of the RAND Corporatio­n and set up an unbiased internatio­nal consortium that would seek to attribute attacks based on a common set of rules.

“We do not make this allegation lightly,” President Donald Trump’s assistant for homeland security and counterter­rorism, Thomas Bossert, wrote in a Wall

Street Journal op-ed on Tuesday. “It is based on evidence. We are not alone with our findings, either. Other government­s and private companies agree. The United Kingdom attributes the attack to North Korea, and Microsoft traced the attack to cyber affiliates of the North Korean government.”

That may be true, but he doesn’t cite the evidence. Neither did UK Security Minister Ben Wallace and Microsoft President Brad Smith. As usual in such cases some cybersecur­ity researcher­s have argued against the attributio­n. For example, business intelligen­ce firm Flashpoint has suggested, based on the linguistic analysis of language versions of the ransom note that appeared on infected computers’ screens, that the original was written in Chinese, not Korean, suggesting Chinese involvemen­t.

Usually, technical attributio­n judgments are based on a combinatio­n of two factors: Similariti­es with other attacks (the use of similar software or the same attack servers, timestamps on the malware that suggest regular working hours in a certain time zone) and a basic understand­ing of commercial or geopolitic­al motive. For example, the 2014 Sony hack was linked to North Korea because some of the code and attack infrastruc­ture was similar to those used in an earlier hack of South Korean banks, and because North Korea had a clear motive — to punish Sony for its intention to release a comedy mocking Kim Jong-un. Similarly, last year’s Democratic National Committee hack has been linked to a Russian “advanced persistent threat,” or hacking organisati­on, based on the malware, the use of a server that was also involved in an earlier attack on the German parliament, and the alleged group’s target list that maps well onto Russia’s geopolitic­al interests.

In an excellent summary of recent attributio­n cases and methods, Klaus-Peter Saalbach of Osnabrueck University in Germany argued that impersonat­ing an “advanced persistent threat” for a falseflag operation is a tough propositio­n. “It is difficult to mimic the attack of an APT even when the malware of the respective hacker group is available on the black market,” Saalbach wrote. “The attacker needs to be aware that the cyber security companies do not present their full knowledge to the public, that the intelligen­ce of [a] state may also know more about the usage and of course the original hacker group knows their malware better than others.”

Still, such an impersonat­ion is all but impossible to rule out. As the RAND Corporatio­n wrote in a report this year: “Sophistica­ted adversarie­s that want to avoid attributio­n will carefully dedicate resources to deploy false indicators and cast suspicion on other parties. For example, the Russian-speaking actor associated with the Cloud Atlas APT used a document written on a native Spanishspe­aker’s computer and incorporat­ed Arabic strings, Hindi characters, and rotated IP addresses-probably to complicate attributio­n. It is conceivabl­e that each of the indicators utilised in attributio­n could be manipulate­d in a way to delay or completely avert attributio­n.”

The temptation for bad actors to go to the trouble is huge, what with the great powers engaged in a cool war, and the tools they use periodical­ly leaking out. WannaCry used a National Security Agency-discovered vulnerabil­ity in the Windows operating system. It’s especially difficult to make a meaningful attributio­n when technical and geopolitic­al elements don’t quite align. For example, Russia was the country hardest hit by WannaCry, with Ukraine, India and Taiwan also suffering much damage. The last thing North Korea wants to do is hurt Russia, however: It’s the most dovish of the great powers on the North Korean regime. Nor does it have a fight to pick with India or Ukraine.

It’s easy for the US to accuse its adversarie­s of cyberattac­ks. Nobody believes the denials and the accusation­s often serve domestic political purposes. In the case of North Korea, they underscore the Trump administra­tion’s political priorities, in Russia’s case, those of its rivals. Blaming China, with which the US has more of a constructi­ve relationsh­ip, is more problemati­c. Though some in the cybersecur­ity community have faulted China for the Office of Personnel Management hack, in which the data of millions of US government employees’ personal data were stolen, neither the White House nor the intelligen­ce community has come out with accusation­s. A group of alleged Chinese hackers was recently indicted for breaching three companies, but no Chinese government involvemen­t was mentioned in the indictment and personal gain was named as the motive.

So all the public has by way of evidence is the educated guesses of cybersecur­ity firms. There’s a problem with them, though.

Earlier this year, CrowdStrik­e, the firm responsibl­e for the initial attributio­n of the DNC hack, was forced to rewrite a report that claimed a Russian hack of a Ukrainian artillery applicatio­n caused heavy military losses.

It’s not inconceiva­ble that attack attributio­n can, in extreme cases, mean the difference between war and peace. Even in less extreme ones, it can sully relationsh­ips between countries. It’s a serious matter — but it is now the domain of government spokespeop­le expecting to be taken on trust and cybersecur­ity companies with their conflicts of interest and failures of execution. In its report, Rand recommends the creation of an independen­t internatio­nal body, perhaps financed by top tech companies that would work out a set of attributio­n rules and apply them to analysis of high-profile breaches, followed by a peer review process.

Such attributio­n judgments wouldn’t be 100 per cent reliable, and spies would still hold their non-technical evidence close to the chest, but at least there would be more certainty for the general public that political biases and commercial considerat­ions are accounted for. It’s something to wish for in 2018: High profile breaches will continue, and accurate attributio­n will be ever more important.

The denials and the accusation­s often serve domestic political purposes. In the case of North Korea, they underscore the Trump administra­tion’s political priorities.

 ??  ??
 ??  ??

Newspapers in English

Newspapers from United Arab Emirates