The New Zealand Herald

Challenges of solving online whodunnits

Why a pioneer of the internet is calling for an end to anonymity on the web to counter the malware scourge

- Juha Saarinen

Last week, the United States charged three Ukrainians with being behind the massive Carbanak (also known as FIN7) banking malware campaign, the culminatio­n of years of painstakin­g detective work by security researcher­s and police.

In case you’ve not heard of Carbanak, the malware is thought to be Eastern European in origin and has been used for all sorts of crimes including automatic teller machine “jackpottin­g”, which involves hacking them to dispense cash, stealing payment card details and enterprise secrets, mostly via phishing emails.

Carbanak was discovered in 2014 and has earned those criminals using it more than a billion dollars.

Only three of the alleged criminals behind Carbanak have been named and charged so far, and it’s taken years to get to that stage.

In real life, bank robbers would never get away with heist after heist for years on end, so why can it be done on the internet? Because attributio­n for digital skuldugger­y is very hard.

Facebook made it clear last week when it published a detailed postmortem on taking down shady election interferin­g pages and accounts that were “engaged in coordinate­d inauthenti­c behaviour”.

Alex Stamos is a well-respected name in cyber security. Before joining Facebook (and leaving this month with no replacemen­t for his role at the social network, curiously enough), he headed up security and fronted the massive data breach at Yahoo.

Working out who’s behind dodgy stuff on the internet takes a huge amount of work and global cooperatio­n to find a trail leading to the culprits.

Successful­ly tracing bad people often depends on them either not having covered their tracks properly, or making a mistake like leaving log files on a compromise­d computer.

In its case, Facebook found that the baddies had hidden behind virtual private networks and used thirdparti­es to buy ads for them (which, as an aside, surely should’ve raised suspicion by itself because what legitimate advertiser would do that?). It might be Russian state actors, or someone else. Facebook says it doesn’t know.

Having the internet protocol (IP) address assigned to routers and computers isn’t enough to attribute blame as it’s very easy to fake them or to use hijacked machines that belong to innocent parties.

That salient point was ignored a few years ago when the antifilesh­aring amendment to our copyright act came into effect, and rights holders were able to send infringeme­nt notices to broadband account holders, based on the IP addresses allocated by their ISPs.

Going back to cyber criminals there is little doubt that their virtual activities cause real damage. What to do about it? Internet pioneer Vint Cerf has come full circle on the situation and now says network anonymity invites misbehavio­urs and “might not be absolutely desirable” for that reason.

Cerf suggests “differenti­al traceabili­ty”, a concept that takes a range of identifier­s in the internet environmen­t such as domain names, IP addresses, and cryptograp­hic keys and associates them with individual users.

That informatio­n would not be available to everyone, but only to the police and authoritie­s.

“I expect this is a controvers­ial conclusion and look forward to subsequent discussion,” Cerf said.

It’ll create an uproar rather than discussion, but if someone like Cerf says time’s up for anonymity on the internet, it’s a sure-fire indication that there is a serious problem with it.

While we ponder Cerf’s suggestion, despite the arrest and charges of some gang members, the Carbanak malware is far from dead.

I checked with security vendor FireEye which has been tracking the criminals’ activities, and they told me that a new strain of the malware is being used by other people, perhaps not the original FIN7 gang, and new command and control infrastruc­ture is going up on the internet.

Some people clearly expect to make a good profit with minimal risk again.

 ?? Photo / Getty Images ?? A technician in Colorado’s Security Operation Centre monitors malware, phishers and hackers worldwide on the firm’s threat map.
Photo / Getty Images A technician in Colorado’s Security Operation Centre monitors malware, phishers and hackers worldwide on the firm’s threat map.
 ?? Photo / Getty Images ?? Vint Cerf (right) says ending anonymity on the internet will be ‘controvers­ial’.
Photo / Getty Images Vint Cerf (right) says ending anonymity on the internet will be ‘controvers­ial’.
 ??  ??

Newspapers in English

Newspapers from New Zealand