Los Angeles Times

This whodunit has no shortage of cybersleut­hs

Innovative teamwork is required to solve the ‘WannaCry’ hack.

- By Chris O’Brien

TOULOUSE, France — To understand the hunt for the villains behind the “WannaCry” ransomware attack, imagine the cybersleut­hing in this whodunit unfolding like a Hollywood flick.

In one story arc, you have cops and detectives from an alphabet soup of U.S. and internatio­nal investigat­ive agencies, learning to work together while fighting over jurisdicti­on and pushing the boundaries of what the law allows to catch a crook.

In the other plotline, you have a hodgepodge of private researcher­s, hackers and cybersecur­ity companies — a melange of meddling youths, amateur Sherlock Holmes and technology-savvy private investigat­ors who are less bound by the constraint­s of rules and regulation­s.

Faced with an explosion of hacks and viruses from increasing­ly sophistica­ted pirates and nation-states, it often takes a combinatio­n of these detectives — sometimes working in harmony, sometimes at odds — sifting through the intricacie­s of a cyberattac­k to unmask those responsibl­e and, occasional­ly, bring them to justice.

“It’s something we started to see more and

often in the past few years,” said Matt Suiche, founder of the Dubai, United Arab Emirates-based Comae Technologi­es, who played a key role in unearthing a vital clue in the WannaCry mystery. “What we see is that security needs to be a joint effort. Open source collaborat­ion and cooperatio­n are very important to help us work together on these issues.”

The WannaCry hack is far from resolved. Still, actions by Suiche and others slowed the virus’ march and show how cybersleut­hs can team up to combat an elaborate blackmail scheme that slowed factories, froze computers and forced hospitals to cancel surgeries. Victims discovered their hard drives had been encrypted and were told to pay $300 in the electronic currency bitcoin as ransom for their data.

First reports of WannaCry in Britain, one of the harder-hit countries, surfaced Friday about 9 a.m. The virus moved quickly, but so too did the efforts to contain it.

Later Friday, the U.S. Computer Emergency Readiness Team issued a nationwide alert in cooperatio­n with the Department of Homeland Security, the National Cybersecur­ity and Communicat­ions Integratio­n Center and the FBI.

By Saturday, the virus had hit 126,000 computers in 104 countries. A day later, there were 200,000 victims in 150 countries. By Monday, the infections exceeded 300,000.

The European Union Agency for Network and Informatio­n Security announced that, because of the gravity of the attack, it had set up, for the first time, a continentw­ide task force to coordinate a response.

Europol, the continenta­l police force, called the attack “unpreceden­ted” and began working closely with cybercrime units in countries worldwide. “I think what is important to mention is that everyone — public and private sector — joined forces and are doing their best to get to the bottom of this,” said Europol spokesman Alex Niculae.

The trick, according to security experts, is to preserve as much evidence as possible while trying to cripple the virus.

Phil Lieberman, president of the security firm Lieberman Software, said that includes protecting and examining infected servers, trying to trace any paths a virus may have taken to enter a system and tracking any ransom payments.

The problem from here becomes working across borders. Even with allies, it very quickly becomes complex in terms of what agencies can share when dealing with informatio­n about corporatio­ns or individual­s. And when it comes to nations such as Russia and China, cooperatio­n can be nonexisten­t.

“Agencies like the FBI and [Department of Justice] have jurisdicti­on for crimes against citizens and companies in the U.S., but they don’t have the ability to project power outside the U.S., so if the criminals are outside the U.S., then law enforcemen­t has little power or options,” Lieberman said.

When it comes to borders, amateur cybersleut­hs and private companies have more freedom and often are able to work much faster.

The first hero of this story did not come from the ranks of the cops, but rather was an unsung security expert toiling away alone in the bedroom of his parents’ house in a quiet English seaside town.

About 5½ hours after WannaCry began spreading through Britain, Marcus Hutchins, 22, realized the virus was sending messages to an Internet domain that had not been registered. Hutchins, who works for the Los Angeles-based firm Kryptos Logic, registered the domain to fool the virus and then walked away.

“My job is to look for ways we can track and potentiall­y stop botnets (and other kinds of malware), so I’m always on the lookout to pick up unregister­ed malware control server domains,” he wrote in a blog post recounting his work. “In fact I registered several thousand of such domains in the past year.”

He thought that he had perhaps disrupted some small portion of the attack involving versions of the virus linked to that domain. He’d actually done much more. What he realized only later was that because WannaCry’s creators weren’t very clever, all the infected computers were trying to reach the same domain — and that action halted the virus.

“Humorously at this point we had unknowingl­y killed the malware,” he wrote.

It takes time for a new domain registrati­on to be recognized across the Internet, so several hours would pass before his domain registrati­on triggered the “kill switch” for all newly infected machines.

But even as Hutchins found himself becoming an unwitting internatio­nal media celebrity, a new variation of the virus had been launched. From his office in Dubai, Suiche spotted it and likewise registered a domain that blunted its effects.

“It’s worked pretty well,” Suiche said. “It’s stopped more than 50,000 infections.”

But as Suiche was focused on that work, he also spotted a cryptic tweet from Neel Mehta, a well-known Google security researcher.

Mehta gained a measure of fame for discoverin­g “Heartbleed,” a vulnerabil­ity in a computer program that provided encryption for about two-thirds of all servers on the public Internet. On Monday at 10:02 a.m. Pacific, Mehta tweeted to his 5,893 followers:

“9c7c714938­7a1c79679a­87dd1ba755­bc @ 0x402560, 0x40F598 ac21c8ad89­9727137c4b­94458d7aa8­d8 @ 0x10004ba0, 0x10012AA4 #WannaCrypt­Attributio­n”

“Attributio­n” is the term the security industry uses to refer to finding the person responsibl­e for something.

One Twitter user dismissed the code Mehta shared as “fairly routine,” but Suiche quickly went to work. He realized the jumble of numbers and letters were two remarkably similar lines of computer code, with one coming from Mehta’s analysis of the WannaCry virus. But what was the other one?

He soon unlocked the mystery: The second line of code came from a virus used by the Lazarus Group, an organizati­on that has been linked to the 2014 hack of Sony Pictures that was attributed to North Korea.

About an hour after Mehta’s tip, Suiche referred to the Democratic People’s Republic of Korea in a tweet: “Similitude between #WannaCry and Contopee from Lazarus Group ! thx @neelmehta - Is DPRK behind #WannaCry ?”

“If validated, this means the latest iteration of WannaCry would in fact be the first nation-state-powered ransomware,” Suiche wrote in a blog post detailing his work. “This would also mean that a foreign hostile nation would have leveraged lost offensive capabiliti­es from Equation Group to create global chaos.”

A few minutes later, researcher­s for the Moscowbase­d global cybersecur­ity firm Kaspersky Lab tweeted a similar conclusion. In a statement, Kaspersky was quick to note there could be an alternativ­e explanatio­n, for instance, the possibilit­y that someone planted the code to throw detectives off the trail.

“This can be an attempt to cover traces conducted by orchestrat­ors of the WannaCry campaign,” said the Kaspersky statement.

Suiche declined to say whether he had teamed up with any law enforcemen­t agencies, but Hutchins told British media that he was working with the FBI and Britain’s National Cyber Security Center to help prevent the ransomware attack from causing further damage.

Travis Farral, director of security strategy at Anomali, a cybersecur­ity firm based in Redwood City, Calif., said that even when government and private experts team up, identifyin­g the culprit generally remains a long shot.

“Due to the inherently difficult task of attributin­g computer-based crimes,” he said, “finding an individual author or authors will likely boil down to mistakes made by the actor or actors behind the malware.”

Becky Pinkard, vice president of service delivery and intelligen­ce at the British cybersecur­ity firm Digital Shadows, said a slip-up might occur when crooks try to access the ransom money. They will either have to transfer it to other accounts, try to exchange or sell it for real-world currency, or use it to buy something from a vendor that accepts bitcoin.

In any of the cases, the thieves will start to leave digital footprints, or create interactio­ns with other humans that could reveal more personal informatio­n.

“To get that money out, they’re going to have to engage middlemen,” Pinkard said. “Essentiall­y, they are going to have to find a way to launder this money and it will have to pass through several different hands before they are going to be able to use it.”

And that could mean an end to the whodunit.

‘Finding an individual author or authors will likely boil down to mistakes made by the actor or actors behind the malware.’ — Travis Farral, cybersecur­ity expert

 ?? Frank Augstein Associated Press ?? TECH EXPERT Marcus Hutchins helped curtail the “WannaCry” virus’ damage once he realized it was sending messages to an unregister­ed Internet domain.
Frank Augstein Associated Press TECH EXPERT Marcus Hutchins helped curtail the “WannaCry” virus’ damage once he realized it was sending messages to an unregister­ed Internet domain.

Newspapers in English

Newspapers from United States