tech support 14

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 18 November 2013

The Internet Is Now Weaponized, And You Are The Target

Posted on 00:44 by Unknown
Kind of puts the world of communication into a perspective we all can understand.



Zero Hedge
By Tyler Durden
15 November 2013

By now, thanks to Edward Snowden, it is common knowledge and not just conspiracy theory, that every bit of information sent out into the wired or wireless ether is scanned, probed, intercepted and ultimately recorded by the NSA and subsequently all such information is and can be used against any US citizen without a court of law (because the president's pet secret NISA "court" is anything but). Sadly, in a country in which courtesy of peak social networking, exhibitionism has become an art form, the vast majority of Americans not only could not care less about Snowden's sacrificial revelations, but in fact are delighted the at least someone, somewhere cares about that photo of last night's dinner. However, it turns out that far from being a passive listener and recorder, the NSA is quite an active participant in using the internet. The weaponized internet.

 

Because as Wired reports, "The internet backbone — the infrastructure of networks upon which internet traffic travels — went from being a passive infrastructure for communication to an active weapon for attacks." And the primary benefactor: the NSA - General Keith Alexander massive secret army - which has now been unleashed against enemies foreign, but mostly domestic.

Enter the QUANTUM program....
 

According to revelations about the QUANTUM program, the NSA can “shoot” (their words) an exploit at any target it desires as his or her traffic passes across the backbone. It appears that the NSA and GCHQ were the first to turn the internet backbone into a weapon; absent Snowdens of their own, other countries may do the same and then say, “It wasn’t us. And even if it was, you started it.”

If the NSA can hack Petrobras, the Russians can justify attacking Exxon/Mobil. If GCHQ can hack Belgacom to enable covert wiretaps, France can do the same to AT&T. If the Canadians target the Brazilian Ministry of Mines and Energy, the Chinese can target the U.S. Department of the Interior. We now live in a world where, if we are lucky, our attackers may be every country our traffic passes through except our own.

Which means the rest of us — and especially any company or individual whose operations are economically or politically significant — are now targets. All cleartext traffic is not just information being sent from sender to receiver, but is a possible attack vector.

... which is basically packet injection:

The QUANTUM codename is deliciously apt for a technique known as “packet injection,” which spoofs or forges packets to intercept them. The NSA’s wiretaps don’t even need to be silent; they just need to send a message that arrives at the target first. It works by examining requests and injecting a forged reply that appears to come from the real recipient so the victim acts on it.

The technology itself is actually pretty basic. And the same techniques that work on on a Wi-Fi network can work on a backbone wiretap. I personally coded up a packet-injector from scratch in a matter of hours five years ago, and it’s long been a staple of DefCon pranks.

Traditionally, packet injections has been used mostly for censorship purposes:

The most infamous use of packet injection prior to the Snowden leaks was censorship, where both internet service providers (ISPs) and the Great Firewall of China injected TCP reset packets (RST) to block undesired traffic. When a computer receives one of these injected RST packets, it closes the connection, believing that all communication is complete.

Although public disclosure forced ISPs to stop this behavior, China continues to censor with injected resets. It also injects the Domain Name System (DNS) — the system all computers use to turn names such as “www.facebook.com” into IP addresses — by inserting a fake reply whenever it sees a forbidden name. (It’s a process that has caused collateral damage by censoring non-Chinese internet traffic).

And user identification, especially in making Tor obsolete. That's right: all users of Tor believing they hide behind the veil of anonymity - you aren't.

User cookies, those inserted by both advertising networks and services, also serve as great identifiers for NSA targeting. Yet a web browser only reveals these cookies when communicating with such sites. A solution lies in the NSA’s QUANTUMCOOKIE attack, which they’ve utilized to de-anonymize Tor users.

A packet injector can reveal these cookies by replying to an unnoticed web fetch (such as a small image) with a HTTP 302 redirect pointing to the target site (such as Hotmail). The browser now thinks “hey, should really go visit Hotmail and ask it for this image”. In connecting to Hotmail, it reveals all non-secure cookies to the wiretap. This both identifies the user to the wiretap, and also allows the wiretap to use these cookies.

So for any webmail service that doesn’t require HTTPS encryption, QUANTUMCOOKIE also allows the wiretap to log in as the target and read the target’s mail. QUANTUMCOOKIE could also tag users, as the same redirection that extracts a cookie could also set or modify a cookie, enabling the NSA to actively track users of interest as they move across the network — although there is no indication yet that the NSA utilizes this technique.

But all of the above are largely passive interception and surveillance strategies. Where it gets interesting is when the NSA's mission is...

User Attack

The NSA has a collection of FOXACID servers, designed to exploit visitors. Conceptually similar to Metasploit’s WebServer browser autopwn mode, these FOXACID servers probe any visiting browser for weaknesses to exploit.

All it takes is a single request from a victim passing a wiretap for exploitation to occur. Once the QUANTUM wiretap identifies the victim, it simply packet injects a 302 redirect to a FOXACID server. Now the victim’s browser starts talking to the FOXACID server, which quickly takes over the victim’s computer. The NSA calls this QUANTUMINSERT.

The NSA and GCHQ used this technique not only to target Tor users who read Inspire (reported to be an Al-Qaeda propaganda magazine in the English language) but also to gain a foothold within the Belgium telecommunication firm Belgacom, as a prelude to wiretapping Belgium phones.

One particular trick involved identifying the LinkedIn or Slashdot account of an intended target. Then when the QUANTUM system observed individuals visiting LinkedIn or Slashdot, it would examine the HTML returned to identify the user before shooting an exploit at the victim. Any page that identifies the users over HTTP would work equally well, as long as the NSA is willing to write a parser to extract user information from the contents of the page.

Other possible QUANTUM use cases include the following. These are speculative, as we have no evidence that the NSA, GCHQ, or others are utilizing these opportunities. Yet to security experts they are obvious extensions of the logic above.

HTTP cache poisoning. Web browsers often cache critical scripts, such as the ubiquitous Google Analytics script ‘ga.js’. The packet injector can see a request for one of these scripts and instead respond with a malicious version, which will now run on numerous web pages. Since such scripts rarely change, the victim will continue to use the attacker’s script until either the server changes the original script or the browser clears its cache.

Zero-Exploit Exploitation. The FinFly “remote monitoring” hacking tool sold to governments includes exploit-free exploitation, where it modifies software downloads and updates to contain a copy of the FinFisher Spyware. Although Gamma International’s tool operates as a full man-in-the-middle, packet injection can reproduce the effect. The injector simply waits for the victim to attempt a file download, and replies with a 302 redirect to a new server. This new server fetches the original file, modifies it, and passes it on to the victim. When the victim runs the executable, they are now exploited — without the need for any actual exploits.

Mobile Phone Applications. Numerous Android and iOS applications fetch data through simple HTTP. In particular, the “Vulna” Android advertisement library was an easy target, simply waiting for a request from the library and responding with an attack that can effectively completely control the victim’s phone. Although Google removed applications using this particular library, other advertisement libraries and applications can present similar vulnerabilities.

DNS-Derived Man-in-the-Middle. Some attacks, such as intercepting HTTPS traffic with a forged certificate, require a full man in the middle rather than a simple eavesdropper. Since every communication starts with a DNS request, and it is only a rare DNS resolver that cryptographically validates the reply with DNSSEC, a packet injector can simply see the DNS request and inject its own reply. This represents a capability upgrade, turning a man-on-the-side into a man-in-the-middle.

One possible use is to intercept HTTPS connections if the attacker has a certificate that the victim will accept, by simply redirecting the victim to the attacker’s server. Now the attacker’s server can complete the HTTPS connection. Another potential use involves intercepting and modifying email. The attacker simply packet-injects replies for the MX (Mailserver) entries corresponding to the target’s email. Now the target’s email will first pass through the attacker’s email server. This server could do more than just read the target’s incoming mail, it could also modify it to contain exploits.

Amplifying Reach. Large countries don’t need to worry about seeing an individual victim: odds are that a victim’s traffic will pass one wiretap in a short period of time. But smaller countries that wish to utilize the QUANTUMINSERT technique need to force victims traffic past their wiretaps. It’s simply a matter of buying the traffic: Simply ensure that local companies (such as the national airline) both advertise heavily and utilize in-country servers for hosting their ads. Then when a desired target views the advertisement, use packet injection to redirect them to the exploit server; just observe which IP a potential victim arrived from before deciding whether to attack. It’s like a watering hole attack where the attacker doesn’t need to corrupt the watering hole.

Can anything be done to prevent the NSA's internet army from running over a world that spends the bulk of its time in its reaches? Not much:
 

The only self defense from all of the above is universal encryption. Universal encryption is difficult and expensive, but unfortunately necessary. Encryption doesn’t just keep our traffic safe from eavesdroppers, it protects us from attack. DNSSEC validation protects DNS from tampering, while SSL armors both email and web traffic.

There are many engineering and logistic difficulties involved in encrypting all traffic on the internet, but its one we must overcome if we are to defend ourselves from the entities that have weaponized the backbone.

Alas, in the battle against the NSA, the biggest enemy is not the authoritarian state's Super Big Brother, but apathy itself. It is that war that is by far the most important one, and which America has already lost.


original article found here
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Mongol invasion: Inside the most powerful bikie gang in Australia
    American exports. Organized American Crime has gone to Australia. Mongols bikie gang. Picture: News Limited Source: NewsComAu T...
  • The Subversive Sayanim Amongst Us
    Israel continues to pollute the world. Just Wondering by Zen Gardner 28 October 2013 This is a very hot topic that gets taken down off the n...
  • New Xbox Can See Through Your Clothes Like TSA Scanners
    I wonder how sales will fare? Parents won't like it and I imagine many gamers will not want to see themselves either and of course there...
  • Quantum physics proves that there IS an afterlife, claims scientist
    For the unenlightened, and so mindless Doctrinaire God Botherers, an interesting article to read, with an Open Mind? Robert Lanza claims th...
  • Americans Are Finally Learning About False Flag Terror
    If only! The eyes of many parties are starting to open and people are starting to question and perhaps it will cause people to act indivi...
  • IMF Pushes Plan to Plunder Global Wealth
    Not content with having abused the wealth of nations, being riddled with corruption, a history of Gross Incompetence, the IMF now want to se...
  • Record Saudi Arabia oil output fills supply gap
    Record production and still cash is short. Financial Times 16 September 2013 The US might be drowning in oil, but the world is still depende...
  • 25 Fast Facts About The Federal Reserve – Please Share With Everyone You Know
    The reality of the Fed and Fiscal crisis becomes ever more gruesome.  The Economic Collapse By Michael Snyder 15 September 2013 As we approa...
  • New Snowden docs show U.S. spied during G20 in Toronto
    It never ends. CBC News By Greg Weston, Glenn Greenwald and Ryan Gallagher 27 November 2013 Top secret documents retrieved by U.S. whistlebl...
  • Warning - NSA To Oversee Individual Bank Accounts & Wealth
    This will become a a nightmare. They will sequestrate all you have at will. Exactly why Agencies need a 50% budget cut. King World News By E...

Categories

  • Books
  • Exclusive
  • Humor
  • Saturnalia
  • Video

Blog Archive

  • ▼  2013 (500)
    • ►  December (2)
    • ▼  November (184)
      • 3300 Missile Warheads Intercepted Close To Home: W...
      • Elizabeth Warren: The Contender
      • China to Provide Uzbekistan $350M for Crucial Rail...
      • EU banks are on the verge of liquidity crisis
      • Russia Plans to Launch 11 Military Satellites By 2015
      • Why China is fixated on the Moon
      • A substantial prehistoric European ancestry amongs...
      • Drummer Lee Rigby was 'hacked like a joint of meat...
      • Forget About Stashing Your Cash in the Cayman Islands
      • DRDO Planning to Test-fire High-altitude 'Killer' ...
      • The National-Security State’s Childishly Dangerous...
      • GSDF spies have secretly worked abroad without inf...
      • China Declares "Willing To Engage In A Protracted ...
      • The Jesuit Agenda
      • Detroit: The Conspirators Behind the Largest Munic...
      • Homeland Security's Latest Nuclear Defense System ...
      • New Snowden docs show U.S. spied during G20 in Tor...
      • China Is On A Debt Binge And A Buying Spree Unlike...
      • Expect Devastating Global Economic Changes In 2014
      • N.S.A. May Have Hit Internet Companies at a Weak Spot
      • America Lives to Fight Another Day
      • Take the Money and Run: China's Ill-Gotten Wealth ...
      • Bitcoin working with the US government?
      • Angola bans Islam and shuts down all mosques acros...
      • Iran Deal Nullifies Needs for Europe Missile Shiel...
      • Pope Francis, Putin Discuss Syria Solution in Vatican
      • Special Report: How China took control of an OPEC ...
      • You Think You Know Someone, and Then He Gets on a ...
      • Jerusalem, Riyadh stunned: Obama makes Iran 7th wo...
      • The Darkest Hour is Before the Dawn
      • Commentary: Li's visit to lift China's ties with R...
      • Map Shows The NSA's Massive Worldwide Malware Oper...
      • Americans Are Finally Learning About False Flag Te...
      • Banks Warn Fed They May Have To Start Charging Dep...
      • A Confused World Reacts To The Iran Nuclear Deal
      • Obama’s Fight With Israel: This Time It's Serious
      • Revealed: Arnon Milchan - the Hollywood producer b...
      • Google to create a fashionable, prescription lense...
      • China creates air defence zone over Japan-controll...
      • LIST OF NAMES — Military Purge High Officers — Ter...
      • 5 Terrifying Smartphone Hacks You Won’t Believe Ar...
      • Drones deployed to all seven PLA military regions:...
      • Russia forming rapid deployment force
      • ObamaCare: The Neutron Bomb That Will Decimate the...
      • Europe in shock as Ukraine kills integration plan,...
      • Exclusive: 'Dozens' of Terrorists May Be in US as ...
      • Pakistan’s Imran Khan to Block NATO Supplies After...
      • Fed Minutes Reveal a Dangerous Power Grab by New Y...
      • China Announces That It Is Going To Stop Stockpili...
      • Luxembourg, Cyprus, BVI, Seychelles fail tax trans...
      • The ticking time-bomb at the bottom of the Baltic Sea
      • Global Power Structures: Symbolism Report #1
      • NSA Locations
      • America Has Entered a New Level of Tyranny
      • Warning - NSA To Oversee Individual Bank Accounts ...
      • AIR FORCE ONE
      • Lord James gets mooned
      • Secret TPP Negotiations Resume in Salt Lake City
      • RPT-Yellen set to move closer to confirmation as n...
      • US and UK struck secret deal to collect innocent B...
      • US troops could stay in Afghanistan until 2024 - s...
      • Gary Locke receives kind parting words from old fo...
      • Xi thanks Clinton for furthering ties
      • The "Obamacare Shock" - One California Employer's ...
      • How Washington D.C. Is Sucking The Life Out Of Ame...
      • LG TV phones home with your viewing habits, names ...
      • Financially strained Venezuela reportedly cuts gol...
      • NHTSA May Mandate That New Cars Broadcast Location...
      • Longwave Group: Economic Winter Vol.57 Issue 1 - C...
      • China central bank suggests faster tempo for freei...
      • Yahoo to add encryption to all services in wake of...
      • NSA monitored 33m phone calls in Norway: Snowden
      • British Intelligence Operation to Kidnap Snowden? ...
      • Wal-Mart Asks Workers To Donate Food To Its Needy ...
      • DC official fired after criticizing Obama change
      • Corrupt Bank Officials Get Death Sentence in Vietnam
      • Behind the Pentagon’s doctored ledgers, a running ...
      • Dem Senator: 'We All Knew' Obama Was Lying
      • How Britain's Biggest Racists Created Zionism
      • Humor: Careful what you ask Grandma!
      • The Internet Is Now Weaponized, And You Are The Ta...
      • Countdown: US Hits Debt Ceiling in 84 Days
      • Senate Poised to Fund Programs the Military Doesn’...
      • Police departments have NSA like spying powers for...
      • Today Thousands March Against Mainstream Media
      • Security Expert: “Buy American Doesn’t Sell Well A...
      • BOMBSHELL! Diplomatic Agent Reveals That Benghazi ...
      • Meetings: Team Arpaio Put Congress On Obama ID Fra...
      • Humor: Sibbarpsrevyn
      • New Obamacare Tax: Sell Your Home, Help Fund Obama...
      • Articles of Impeachment Introduced to Oust Attorne...
      • Billions of Taxpayer Dollars Funding Insurgents in...
      • New Xbox Can See Through Your Clothes Like TSA Sca...
      • EU uses new budget powers to demand more austerity...
      • Quantum physics proves that there IS an afterlife,...
      • Humor: It rears it's truly ugly head
      • BREAKING: Democrats Give Obama 72 Hours To Fix Hea...
      • China to Ease 1-Child Policy and Abolish Labor Camps
      • Your Phone Number Is Going To Get A Reputation Score
      • Top Ten List of America's Stupidity.
    • ►  October (192)
    • ►  September (122)
Powered by Blogger.

About Me

Unknown
View my complete profile