First Stuxnet, now Flame

Author
Discussion

elster

17,517 posts

211 months

Sunday 10th June 2012
quotequote all
Marf said:
Looks like someone is trying to cover their tracks

http://www.bbc.co.uk/news/technology-18365844
I thought it had already been admitted to be a joint effort between US & Israeli called Olympic Games. Then lost it.

http://nakedsecurity.sophos.com/2012/06/01/stuxnet...


Marf

Original Poster:

22,907 posts

242 months

Sunday 10th June 2012
quotequote all
elster said:
Marf said:
Looks like someone is trying to cover their tracks

http://www.bbc.co.uk/news/technology-18365844
I thought it had already been admitted to be a joint effort between US & Israeli called Olympic Games. Then lost it.

http://nakedsecurity.sophos.com/2012/06/01/stuxnet...
Depends how you look at it, the author of the book that report is based on has apparently confirmed that they are state manufactured viruses after interviewing people involved, but the people involved have not directly confirmed to the media it was indeed them.

Personally I'm of the opinion that they are the product of western/israeli intelligence agencies and that we are going to see more and more of this kind of thing popping up. Though you'd think that the last thing they'd want is for their projects to spread outside their original scope and get caught in the open as it were. But then I guess so long as the intended targets keep providing anti-virus companies with things to investigate these viruses will keep popping up in the media.

I wonder how the anti-virus companies really view this type of stuff, i.e. are they ever worried that there'll be repercussions to investigating and even providing remedies and security against this kind of state sponsored malware?

rohrl

8,756 posts

146 months

Sunday 10th June 2012
quotequote all
NSA, Israel, maybe GCHQ? I wonder what Gareth Williams, seconded from GCHQ to SIS and described as a computer security expert, knew about these things before ending up dead in a sports bag.

Hope that's not too tin-foil hat.

Marf

Original Poster:

22,907 posts

242 months

Sunday 10th June 2012
quotequote all
Was he involved in cyber security?

rohrl

8,756 posts

146 months

Sunday 10th June 2012
quotequote all
Marf said:
Was he involved in cyber security?
I think that was his job wasn't it?

Marf

Original Poster:

22,907 posts

242 months

Sunday 10th June 2012
quotequote all
Cryptography was his area according to Wikispooks.

I guess anything's possible, but without any pointers I think it's a bit if a stretch to suggest he had knowledge of these viruses and that was the reason he was offed.

rohrl

8,756 posts

146 months

Sunday 10th June 2012
quotequote all
Marf said:
Cryptography was his area according to Wikispooks.

I guess anything's possible, but without any pointers I think it's a bit if a stretch to suggest he had knowledge of these viruses and that was the reason he was offed.
Cryptography and a secondment from GCHQ to SIS would make him likely to be the prime candidate to know the most about them out of anyone in the UK I'd have thought.

Whether or not you believe he might have been killed because of something to do with his work depends on whether or not you believe that the Israelis and Iranians have been going around bumping people off because of what they know about the Iranian nuclear project and efforts to thwart it.

I'm not saying it's open-and-shut by any means but it's maybe not quite as unlikely as you suggest.

Funk

26,338 posts

210 months

Sunday 10th June 2012
quotequote all
Didn't Kim Dotcom start out as a hacker..?

Marf

Original Poster:

22,907 posts

242 months

Sunday 10th June 2012
quotequote all
Funk said:
Didn't Kym Dotcom start out as a hacker..?
Yep.....?

Funk

26,338 posts

210 months

Sunday 10th June 2012
quotequote all
I wonder whether such individuals would be 'used' for plausible deniability. Someone like him would have the resources to develop something...

rohrl

8,756 posts

146 months

Sunday 10th June 2012
quotequote all
Funk said:
I wonder whether such individuals would be 'used' for plausible deniability. Someone like him would have the resources to develop something...
I think not. These have both been judged to be nation-state efforts by people who know about viruses and would be ultra secret in-house projects.

hairykrishna

13,185 posts

204 months

Sunday 10th June 2012
quotequote all
Marf said:
McHaggis said:
hairykrishna said:
It's the virus that could have (did?) buggered up centrifuges used for uranium enrichment in Iran. Possibly Israeli/Mossad but nobody really knows. Nothing to do with Fukishima...
On the contrary. Many people will know. They just aren't taking about it. But the scale of stuxnet and flame need nation state backing.
yes


http://arstechnica.com/security/2012/06/flame-cryp...

"The Flame espionage malware that infected computers in Iran achieved mathematic breakthroughs that could only have been accomplished by world-class cryptographers, two of the world's foremost cryptography experts said."
To a certain extent it's in the anti virus companies best interests to say that such sophisticated viruses, which stumped them for a good while, could only be made with the resources of a nation state black ops project. It lets them off the hook a bit.

The crypto in Flame and the coding in both suggest that they were built by a group of sophisticated, smart and experienced programmers who know the maths of cryptography very well. To me this doesn't mean that a nation state was required. It's not like massive sums of money and resources were needed and the computer security field has a proud history of small 'amateur' groups doing the best work. That said, some kind of US or Israeli backed effort does still seem the most likely.

eldar

21,872 posts

197 months

Sunday 10th June 2012
quotequote all
hairykrishna said:
To a certain extent it's in the anti virus companies best interests to say that such sophisticated viruses, which stumped them for a good while, could only be made with the resources of a nation state black ops project. It lets them off the hook a bit.

The crypto in Flame and the coding in both suggest that they were built by a group of sophisticated, smart and experienced programmers who know the maths of cryptography very well. To me this doesn't mean that a nation state was required. It's not like massive sums of money and resources were needed and the computer security field has a proud history of small 'amateur' groups doing the best work. That said, some kind of US or Israeli backed effort does still seem the most likely.
Its certainly possible that smart non-state people, like anonymous, have the expertise to write the code.

But follow the money. Stuxnet had two (or possibly 3) zero day exploits. Those zero day exploits have a value of between 500k and 1,500k dollars to the right buyers, so someone invested at least a million dollars before design & coding to stuff up some very specific centrifuges. That is unlikely to be a non-government entity.

Specifically US/Israel who would get a return on investment, buying time.

0000

13,812 posts

192 months

Sunday 10th June 2012
quotequote all
hairykrishna said:
The crypto in Flame and the coding in both suggest that they were built by a group of sophisticated, smart and experienced programmers who know the maths of cryptography very well. To me this doesn't mean that a nation state was required. It's not like massive sums of money and resources were needed and the computer security field has a proud history of small 'amateur' groups doing the best work.
Sure. But the crypto knowledge required is only a small part of this.

It was a nation state.

Marf

Original Poster:

22,907 posts

242 months

Sunday 10th June 2012
quotequote all
eldar said:
Its certainly possible that smart non-state people, like anonymous, have the expertise to write the code.

But follow the money. Stuxnet had two (or possibly 3) zero day exploits. Those zero day exploits have a value of between 500k and 1,500k dollars to the right buyers
How do ZDEs have a value and who sells them?

hairykrishna

13,185 posts

204 months

Sunday 10th June 2012
quotequote all
eldar said:
Its certainly possible that smart non-state people, like anonymous, have the expertise to write the code.

But follow the money. Stuxnet had two (or possibly 3) zero day exploits. Those zero day exploits have a value of between 500k and 1,500k dollars to the right buyers, so someone invested at least a million dollars before design & coding to stuff up some very specific centrifuges. That is unlikely to be a non-government entity.

Specifically US/Israel who would get a return on investment, buying time.
I think your estimate of the value of a zero day, even for Windows, is out by about a factor of ten but you still make a good point.

I'm just playing devils advocate I suppose - it probably was a government backed project.

eldar

21,872 posts

197 months

Sunday 10th June 2012
quotequote all
hairykrishna said:
I think your estimate of the value of a zero day, even for Windows, is out by about a factor of ten but you still make a good point.

I'm just playing devils advocate I suppose - it probably was a government backed project.
You may be right about the value, I don't have the Glass's ZDE guide to handsmile More than pocket change, at least.

Careless to let it escape, though...

eldar

21,872 posts

197 months

Sunday 10th June 2012
quotequote all
Marf said:
How do ZDEs have a value and who sells them?
People who run botnets need fresh blood. A ZDE allows a week or two of infecting machines before anti-virus and patching catches up. Often found by amateur code analysts who find the errors for a living, then auction or sell via specialist web sites.

thehappyotter

800 posts

203 months

Monday 11th June 2012
quotequote all
hornet said:
Does make you wonder if [insert secret agency of choice] has people inside Microsoft either a) looking for the exploits or b) making damn sure they exist for a period of time to provide the (ahem) window of opportunity.

Fascinating stuff.
It is indeed!

Lots of Microsoft software, or parts of software, happen to be developed at Microsoft Israel. It's one of their big research and development centres.

Coincidence? Not coincidence?

Sonic

4,007 posts

208 months

Monday 11th June 2012
quotequote all
hairykrishna said:
eldar said:
Its certainly possible that smart non-state people, like anonymous, have the expertise to write the code.

But follow the money. Stuxnet had two (or possibly 3) zero day exploits. Those zero day exploits have a value of between 500k and 1,500k dollars to the right buyers, so someone invested at least a million dollars before design & coding to stuff up some very specific centrifuges. That is unlikely to be a non-government entity.

Specifically US/Israel who would get a return on investment, buying time.
I think your estimate of the value of a zero day, even for Windows, is out by about a factor of ten but you still make a good point.

I'm just playing devils advocate I suppose - it probably was a government backed project.
Most of the cryptographic, security and IT experts that would need to be involved with developing a package like this work in the private sector - so i certainly wouldn't say it has to be state-backed, intact technologically speaking i'd say its more likely to have come from a private group... but motive points firmly to something state-sponsored IMO, who clearly have the resources to pull people in as required from all skill sets.