<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:webfeeds="http://webfeeds.org/rss/1.0" version="2.0">
  <channel>
    <atom:link href="http://pubsubhubbub.appspot.com/" rel="hub"/>
    <atom:link href="https://f43.me/grugq.xml" rel="self" type="application/rss+xml"/>
    <title>grugq</title>
    <description>Cyber is Deception</description>
    <link>http://gru.gq</link>
    <webfeeds:icon>https://s2.googleusercontent.com/s2/favicons?alt=feed&amp;domain=gru.gq</webfeeds:icon>
    <generator>f43.me</generator>
    <lastBuildDate>Fri, 13 Mar 2026 06:37:45 +0100</lastBuildDate>
    <item>
      <title><![CDATA[Albanian Cyber War]]></title>
      <description><![CDATA[<figure class="wp-block-image size-large is-style-default"><img src="https://i0.wp.com/substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F133cc27f-7d2c-45b9-9f85-113198b08022_800x450.jpeg?ssl=1" alt="" data-recalc-dims="1" /></figure><p>For all the disappointment over the lack of spectacular cyber warfare in Ukraine, there’s very little interest in the “textbook cyberwar” scenarios unfolding around Iran. Albania has just severed diplomatic ties with Iran over the cyber attacks of July 15th. The Prime Minister announced this in a dramatic fashion with strong language. Iran is embroiled in a cyber war, very much like the pundits envisioned.</p><figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><iframe class="youtube-player c1" width="640" height="360" src="https://www.youtube.com/embed/j2AJDaFDRro?version=3&amp;rel=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;fs=1&amp;hl=en-US&amp;autohide=2&amp;wmode=transparent" allowfullscreen="allowfullscreen" sandbox="allow-scripts allow-same-origin allow-popups allow-presentation"> </iframe>
</figure><p>For years, groups have been engaged in leak operations targeting Iranian hacking teams. But in late 2021, the cyber warfare escalated dramatically when the Predatory Sparrows degraded critical national infrastructure via cyber. They disrupted the rail system and displayed politically charged messages to passengers. The Predatory Sparrows changed the parameters of the conflict. </p><p>Since that initial attack against the rail network, the Predatory Sparrows have conducted multiple cyber-spectaculars against Iran. </p><ul><li><strong>Fuel riot remembrance</strong>: They cut off petrol distribution in a major city, timed to coincide with the anniversary of significant fuel riots just two years prior</li>
<li><strong>Prison exposure</strong>?: CCTV footage of the inside of a notorious Iranian prison leaked. (This has not been definitively linked to the Sparrows.)</li>
<li><strong>Molten steel beams</strong>: they destroyed steel plants that the US had sanctioned for …something related to the Iran regime (they don’t explain why they sanction specific entities)
<ul><li>Released vast amounts of data from the plants, including at least 78 gigs of emails.</li>
</ul></li>
</ul><p>The Predatory Sparrows have done the sorts of attacks which are supposed to be the hallmarks of CyberWar™:</p><ul><li>Physical damage</li>
<li>Critical national infrastructure </li>
<li>Complex international messaging</li>
<li>Cool videos</li>
</ul><p>The Predatory Sparrows attacks are lifted straight from the pages of cyber Pearl Harbor fanfic. Yet, given how little attention they have garnered, it seems like the cyber pundits believe “cyber war” is shorthand for “what Russia does.”</p><p>In mid-July, Albania was targeted by massive cyberattacks that caused significant damage to government systems. The attackers used wipers and malware based on known Iranian tooling.</p><p>Albania appears to have been chosen because <a target="_blank" rel="noreferrer noopener" href="https://en.wikipedia.org/wiki/People%27s_Mojahedin_Organization_of_Iran">the Iranian opposition group MEK</a> was sponsoring a conference scheduled for July 23rd. MEK is not a real threat to the Iranian regime. </p><p>The malware used in the attack contained the notional hacker group’s name and contact details, including their website. On the website was a logo referencing the Predatory Sparrows. </p><figure class="wp-block-image"><a href="https://i0.wp.com/substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb819525-46e5-4a5b-81c6-7ac0dc550403_738x400.jpeg?ssl=1" target="_blank" rel="noreferrer noopener"><img src="https://i0.wp.com/substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb819525-46e5-4a5b-81c6-7ac0dc550403_738x400.jpeg?ssl=1" alt="" data-recalc-dims="1" /></a></figure><p>On the left is the Predatory Sparrows logo, and on the right is the logo of the group that attacked Albania. The keen-eyed observer will notice that both have lines resembling the traces and pads of a PCB. And also an Angry Birds character.</p><p>In-depth <a rel="noreferrer noopener" href="https://www.mandiant.com/resources/blog/likely-iranian-threat-actor-conducts-politically-motivated-disruptive-activity-against" target="_blank">research by Mandiant</a> positively linked the group to Iran. Albania, and the US National Security Council, have confirmed the attribution. Albania has already severed diplomatic ties, and the US is promising to hold Iran accountable.</p><figure class="wp-block-image is-style-default"><a href="https://i0.wp.com/substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F40b8a930-123f-4aea-9db4-201571ba5a85_498x268.gif?ssl=1" target="_blank" rel="noreferrer noopener"><img src="https://i0.wp.com/substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F40b8a930-123f-4aea-9db4-201571ba5a85_498x268.gif?ssl=1" alt="" data-recalc-dims="1" /></a></figure><p>For the first time in history, a cyber warfare event has “crossed the line.” Albania has established a baseline for cyber warfare that is significant enough to warrant a state response. </p><p>For all the talk about strategic ambiguity, and “reserving the right to retaliate” for “cyber attacks that cross the line” there has never actually been an attack that crossed the line. Until now. </p><p>This is what a real actual genuine full-blown cyber conflict involving multiple states looks like.</p><p>The long-running war between Iran and Israel has been playing out in cyber for years now. The Iranians unsuccessfully attacked an Israeli water treatment plant (gets a lot of press) and have recently been conducting large-scale hack and leak attacks against Israeli organisations (doesn’t get any press.) The Israelis have, almost certainly, conducted impressive complex symbolic cyberattacks under the cover of the Predatory Sparrows. </p><p>One hypothesis is that the Iranians felt the need to respond to the Predatory Sparrows and chose the MEK conference as the focal point. They attacked the Albanian government in a show of force cyber campaign, ransomwaring and wiping critical government systems. The disruption was significant enough to impact the government’s ability to run the country. </p><p>The attack was not the work of a bunch of criminals operating independently. It was the deliberate offensive action of a state, using state agencies to enact the will of the government. </p><p>Iran appears to have overstepped in their calculations, and Albania is treating the attack as a serious international incident. </p><figure class="wp-block-image"><a href="https://i0.wp.com/substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F72081fc9-8cab-4ba4-8db9-cf6b04349b7e_800x450.jpeg?ssl=1" target="_blank" rel="noreferrer noopener"><img src="https://i0.wp.com/substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F72081fc9-8cab-4ba4-8db9-cf6b04349b7e_800x450.jpeg?ssl=1" alt="" data-recalc-dims="1" /></a></figure>]]></description>
      <link>https://grudotgq.wpcomstaging.com/2022/09/17/albanian-cyber-war/</link>
      <guid>https://grudotgq.wpcomstaging.com/2022/09/17/albanian-cyber-war/</guid>
      <pubDate>Sat, 17 Sep 2022 11:40:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[Albanian Cyber War]]></title>
      <description><![CDATA[<figure class="wp-block-image size-large is-style-default"><img data-lazy-fallback="1" src="https://i0.wp.com/substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F133cc27f-7d2c-45b9-9f85-113198b08022_800x450.jpeg?ssl=1" alt="" data-recalc-dims="1" /></figure><p>For all the disappointment over the lack of spectacular cyber warfare in Ukraine, there’s very little interest in the “textbook cyberwar” scenarios unfolding around Iran. Albania has just severed diplomatic ties with Iran over the cyber attacks of July 15th. The Prime Minister announced this in a dramatic fashion with strong language. Iran is embroiled in a cyber war, very much like the pundits envisioned.</p><figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><iframe class="youtube-player c2" width="640" height="360" src="https://www.youtube.com/embed/j2AJDaFDRro?version=3&amp;rel=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;fs=1&amp;hl=en-US&amp;autohide=2&amp;wmode=transparent" allowfullscreen="allowfullscreen" sandbox="allow-scripts allow-same-origin allow-popups allow-presentation"> </iframe>
</figure><h2>How did we get here?</h2><p>For years, groups have been engaged in leak operations targeting Iranian hacking teams. But in late 2021, the cyber warfare escalated dramatically when the Predatory Sparrows degraded critical national infrastructure via cyber. They disrupted the rail system and displayed politically charged messages to passengers. The Predatory Sparrows changed the parameters of the conflict. </p><p>Since that initial attack against the rail network, the Predatory Sparrows have conducted multiple cyber-spectaculars against Iran. </p><ul><li><strong>Fuel riot remembrance</strong>: They cut off petrol distribution in a major city, timed to coincide with the anniversary of significant fuel riots just two years prior</li>
<li><strong>Prison exposure</strong>?: CCTV footage of the inside of a notorious Iranian prison leaked. (This has not been definitively linked to the Sparrows.)</li>
<li><strong>Molten steel beams</strong>: they destroyed steel plants that the US had sanctioned for …something related to the Iran regime (they don’t explain why they sanction specific entities)
<ul><li>Released vast amounts of data from the plants, including at least 78 gigs of emails.</li>
</ul></li>
</ul><p>The Predatory Sparrows have done the sorts of attacks which are supposed to be the hallmarks of CyberWar™:</p><ul><li>Physical damage</li>
<li>Critical national infrastructure </li>
<li>Complex international messaging</li>
<li>Cool videos</li>
</ul><p>The Predatory Sparrows attacks are lifted straight from the pages of cyber Pearl Harbor fanfic. Yet, given how little attention they have garnered, it seems like the cyber pundits believe “cyber war” is shorthand for “what Russia does.”</p><h2>Iran attacks NATO over zombie party</h2><p>In mid-July, Albania was targeted by massive cyberattacks that caused significant damage to government systems. The attackers used wipers and malware based on known Iranian tooling.</p><p>Albania appears to have been chosen because <a target="_blank" rel="noreferrer noopener" href="https://en.wikipedia.org/wiki/People%27s_Mojahedin_Organization_of_Iran">the Iranian opposition group MEK</a> was sponsoring a conference scheduled for July 23rd. MEK is not a real threat to the Iranian regime. </p><p>The malware used in the attack contained the notional hacker group’s name and contact details, including their website. On the website was a logo referencing the Predatory Sparrows. </p><figure class="wp-block-image"><a href="https://i0.wp.com/substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb819525-46e5-4a5b-81c6-7ac0dc550403_738x400.jpeg?ssl=1" target="_blank" rel="noreferrer noopener"><img data-lazy-fallback="1" src="https://i0.wp.com/substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb819525-46e5-4a5b-81c6-7ac0dc550403_738x400.jpeg?ssl=1" alt="" data-recalc-dims="1" /></a></figure><p>On the left is the Predatory Sparrows logo, and on the right is the logo of the group that attacked Albania. The keen-eyed observer will notice that both have lines resembling the traces and pads of a PCB. And also an Angry Birds character.</p><p>In-depth <a rel="noreferrer noopener" href="https://www.mandiant.com/resources/blog/likely-iranian-threat-actor-conducts-politically-motivated-disruptive-activity-against" target="_blank">research by Mandiant</a> positively linked the group to Iran. Albania, and the US National Security Council, have confirmed the attribution. Albania has already severed diplomatic ties, and the US is promising to hold Iran accountable.</p><figure class="wp-block-image is-style-default"><a href="https://i0.wp.com/substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F40b8a930-123f-4aea-9db4-201571ba5a85_498x268.gif?ssl=1" target="_blank" rel="noreferrer noopener"><img data-lazy-fallback="1" src="https://i0.wp.com/substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F40b8a930-123f-4aea-9db4-201571ba5a85_498x268.gif?ssl=1" alt="" data-recalc-dims="1" /></a></figure><p>For the first time in history, a cyber warfare event has “crossed the line.” Albania has established a baseline for cyber warfare that is significant enough to warrant a state response. </p><p>For all the talk about strategic ambiguity, and “reserving the right to retaliate” for “cyber attacks that cross the line” there has never actually been an attack that crossed the line. Until now. </p><h2>WTF is going on? </h2><p>This is what a real actual genuine full-blown cyber conflict involving multiple states looks like.</p><p>The long-running war between Iran and Israel has been playing out in cyber for years now. The Iranians unsuccessfully attacked an Israeli water treatment plant (gets a lot of press) and have recently been conducting large-scale hack and leak attacks against Israeli organisations (doesn’t get any press.) The Israelis have, almost certainly, conducted impressive complex symbolic cyberattacks under the cover of the Predatory Sparrows. </p><p>One hypothesis is that the Iranians felt the need to respond to the Predatory Sparrows and chose the MEK conference as the focal point. They attacked the Albanian government in a show of force cyber campaign, ransomwaring and wiping critical government systems. The disruption was significant enough to impact the government’s ability to run the country. </p><p>The attack was not the work of a bunch of criminals operating independently. It was the deliberate offensive action of a state, using state agencies to enact the will of the government. </p><p>Iran appears to have overstepped in their calculations, and Albania is treating the attack as a serious international incident. </p><figure class="wp-block-image"><a href="https://i0.wp.com/substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F72081fc9-8cab-4ba4-8db9-cf6b04349b7e_800x450.jpeg?ssl=1" target="_blank" rel="noreferrer noopener"><img data-lazy-fallback="1" src="https://i0.wp.com/substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F72081fc9-8cab-4ba4-8db9-cf6b04349b7e_800x450.jpeg?ssl=1" alt="" data-recalc-dims="1" /></a></figure><div class="cb_p6_patreon_button c5"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity%5Bemail%5D&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIyXC8wOVwvMTdcL2FsYmFuaWFuLWN5YmVyLXdhclwvIn0%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2022%2F09%2F17%2Falbanian-cyber-war%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button"><img data-lazy-fallback="1" class="c4" src="https://i0.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></a></div>]]></description>
      <link>https://gru.gq/2022/09/17/albanian-cyber-war/</link>
      <guid>https://gru.gq/2022/09/17/albanian-cyber-war/</guid>
      <pubDate>Sat, 17 Sep 2022 11:40:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[Userland Rootkits are Lame]]></title>
      <description><![CDATA[<p><a>7</a></p><p>Many people may not know this, but fifteen…twenty years ago I knew a thing or two about rootkit development. I wrote detection software for a few years as well. Back then modifying the shared libraries on the disk was also vector for userland rootkits. </p><p>There is a nicely written analysis of a clever little userland rootkit for Linux.</p><figure class="wp-block-embed is-type-wp-embed is-provider-intezer wp-block-embed-intezer"><div class="wp-block-embed__wrapper"><blockquote class="wp-embedded-content" data-secret="SsaLi6ybFq"><a href="https://www.intezer.com/blog/research/new-linux-threat-symbiote/">Symbiote Deep-Dive: Analysis of a New, Nearly-Impossible-to-Detect Linux Threat</a></blockquote></div>
</figure><p>Userland rootkits are stable across systems and system upgrades. The downside for the attacker is that they run at the same privilege level as the defender. For the defender userland rootkits are a nuisance, easily handled and mitigated.</p><p>Lets explore the topic of userland rootkits and how to defeat them some more. </p><p>The first issue to address is that userland rootkits are terrible. They have their uses, but they’re just not robust against even minor investigation techniques. The details on this rootkit are quite impressive, clearly it is the result of a lot of development time. Maybe not so much research time though… </p><p>Let’s start with a summary of functionality, and then enumerate some simple techniques to detect and evade userland rootkits.</p><p>Inject a library via <code>LD_PRELOAD</code> into every process and use that to hide info from a user.</p><blockquote class="wp-block-quote">
<p>a shared object (SO) library that is loaded into all running processes using <code>LD_PRELOAD</code></p>
</blockquote><p><strong>Hiding processes</strong></p><p>The malware filters the process list read from /proc/ against an internal list of magic command names. </p><p><strong>Hiding files</strong></p><p>The malware filters the file system tree against an internal list of magic file names.</p><p><strong>Stealth Evasion </strong>(lol)</p><p>If the <code>ldd</code> command is run, the malware scrubs itself from the list of loaded libraries.</p><p><strong>Network Hiding</strong></p><p>A couple of techniques, including eBPF. They are all just some variant of hiding magic port numbers or magic domains. </p><p>All of this is really impressive and cool and not at all a complete and total waste of time.</p><p>This malware does a load of very clever complex and cool hiding tricks to make sure that network monitoring tools don’t capture the blessed packets. All of which is completely useless if someone thinks to statically compile <code>tcpdump</code>, or wireshark, or whatever the kids are using these days. </p><p>Simply using <code>busybox</code> built as a static binary would negate all of these clever userland techniques. To ensure that other tools work, just statically compile them. </p><blockquote class="wp-block-quote">
<p>You can’t get a library injected into your process if you never load any libraries.</p>
</blockquote><p>There are some easy ways to detect it. The simplest is to just use a staticky linked binary, like busybox, rather than the utilities on the compromised box. Honestly, I thought this was standard practise, so I’m a bit surprised that a userland rootkit causes problems for live forensics. </p><p>Use <code>busybox</code>. A statically linked binary like busybox is immune to infection via the dynamic linker, or via modified libraries on disk.</p><p><code>cat /proc/self/maps</code> will show the memory layout of <code>cat</code>, which will apparently be infected. If not, then just use the PID of your shell. </p><ul><li>The memory mappings will include the infecting library because apparently they don’t block this completely obvious method</li>
</ul><p>Examine the stack for the environment variables. The report doesn’t mention if it cleans up, so maybe just running <code>/usr/bin/env</code> will be enough to show <code>LD_PRELOAD</code>. </p><ul><li>If the malware does cleanup the environment variables, then use <code>dd</code> and the info from the <code>/proc/pid/maps</code> to dump the top of the stack. The strings will be there, unless the malware zeroes out the memory, of course.</li>
<li>If it *does* zero out the memory, then that overwriting will be visible in the memory dump. They can’t hide this because they would have to repack the string table, which would invalidate existing pointers to environment variables, causing system instability.</li>
</ul><p>Use <code>find</code> to create a file list. Read the disk directly and dump out a “raw” file list from the actual file system structures. Compare the two. For an ext4fs the e2fsprogs package has debuggers and other tools which will help. It is pretty straight forward. I believe the Sleuthkit tools would be capable in this role as well.</p><p>A statically compiled <code>busybox</code> will completely negate the entirety of a userland rootkit. They are pretty weak. </p>]]></description>
      <link>https://grudotgq.wpcomstaging.com/2022/09/17/userland-rootkits-are-lame/</link>
      <guid>https://grudotgq.wpcomstaging.com/2022/09/17/userland-rootkits-are-lame/</guid>
      <pubDate>Sat, 17 Sep 2022 11:32:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[Userland Rootkits are Lame]]></title>
      <description><![CDATA[<p><a>7</a></p><p>Many people may not know this, but fifteen…twenty years ago I knew a thing or two about rootkit development. I wrote detection software for a few years as well. Back then modifying the shared libraries on the disk was also vector for userland rootkits. </p><p>There is a nicely written analysis of a clever little userland rootkit for Linux.</p><figure class="wp-block-embed is-type-wp-embed is-provider-intezer wp-block-embed-intezer"><div class="wp-block-embed__wrapper"><blockquote class="wp-embedded-content" data-secret="SsaLi6ybFq"><a href="https://www.intezer.com/blog/research/new-linux-threat-symbiote/">Symbiote Deep-Dive: Analysis of a New, Nearly-Impossible-to-Detect Linux Threat</a></blockquote></div>
</figure><p>Userland rootkits are stable across systems and system upgrades. The downside for the attacker is that they run at the same privilege level as the defender. For the defender userland rootkits are a nuisance, easily handled and mitigated.</p><p>Lets explore the topic of userland rootkits and how to defeat them some more. </p><p>The first issue to address is that userland rootkits are terrible. They have their uses, but they’re just not robust against even minor investigation techniques. The details on this rootkit are quite impressive, clearly it is the result of a lot of development time. Maybe not so much research time though… </p><p>Let’s start with a summary of functionality, and then enumerate some simple techniques to detect and evade userland rootkits.</p><h2>What it does. Badly.</h2><p>Inject a library via <code>LD_PRELOAD</code> into every process and use that to hide info from a user.</p><blockquote class="wp-block-quote">
<p>a shared object (SO) library that is loaded into all running processes using <code>LD_PRELOAD</code></p>
</blockquote><p><strong>Hiding processes</strong></p><p>The malware filters the process list read from /proc/ against an internal list of magic command names. </p><p><strong>Hiding files</strong></p><p>The malware filters the file system tree against an internal list of magic file names.</p><p><strong>Stealth Evasion </strong>(lol)</p><p>If the <code>ldd</code> command is run, the malware scrubs itself from the list of loaded libraries.</p><p><strong>Network Hiding</strong></p><p>A couple of techniques, including eBPF. They are all just some variant of hiding magic port numbers or magic domains. </p><p>All of this is really impressive and cool and not at all a complete and total waste of time.</p><h2>Real Talk </h2><p>This malware does a load of very clever complex and cool hiding tricks to make sure that network monitoring tools don’t capture the blessed packets. All of which is completely useless if someone thinks to statically compile <code>tcpdump</code>, or wireshark, or whatever the kids are using these days. </p><p>Simply using <code>busybox</code> built as a static binary would negate all of these clever userland techniques. To ensure that other tools work, just statically compile them. </p><blockquote class="wp-block-quote">
<p>You can’t get a library injected into your process if you never load any libraries.</p>
</blockquote><h2>Simple tricks</h2><p>There are some easy ways to detect it. The simplest is to just use a staticky linked binary, like busybox, rather than the utilities on the compromised box. Honestly, I thought this was standard practise, so I’m a bit surprised that a userland rootkit causes problems for live forensics. </p><h2>More Tricks</h2><p>Use <code>busybox</code>. A statically linked binary like busybox is immune to infection via the dynamic linker, or via modified libraries on disk.</p><p><code>cat /proc/self/maps</code> will show the memory layout of <code>cat</code>, which will apparently be infected. If not, then just use the PID of your shell. </p><ul><li>The memory mappings will include the infecting library because apparently they don’t block this completely obvious method</li>
</ul><p>Examine the stack for the environment variables. The report doesn’t mention if it cleans up, so maybe just running <code>/usr/bin/env</code> will be enough to show <code>LD_PRELOAD</code>. </p><ul><li>If the malware does cleanup the environment variables, then use <code>dd</code> and the info from the <code>/proc/pid/maps</code> to dump the top of the stack. The strings will be there, unless the malware zeroes out the memory, of course.</li>
<li>If it *does* zero out the memory, then that overwriting will be visible in the memory dump. They can’t hide this because they would have to repack the string table, which would invalidate existing pointers to environment variables, causing system instability.</li>
</ul><p>Use <code>find</code> to create a file list. Read the disk directly and dump out a “raw” file list from the actual file system structures. Compare the two. For an ext4fs the e2fsprogs package has debuggers and other tools which will help. It is pretty straight forward. I believe the Sleuthkit tools would be capable in this role as well.</p><h2>Tired: userland rootkits</h2><p>A statically compiled <code>busybox</code> will completely negate the entirety of a userland rootkit. They are pretty weak. </p><div class="cb_p6_patreon_button c5"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity%5Bemail%5D&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIyXC8wOVwvMTdcL3VzZXJsYW5kLXJvb3RraXRzLWFyZS1sYW1lXC8ifQ%3D%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2022%2F09%2F17%2Fuserland-rootkits-are-lame%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button"><img data-lazy-fallback="1" class="c4" src="https://i0.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></a></div>]]></description>
      <link>https://gru.gq/2022/09/17/userland-rootkits-are-lame/</link>
      <guid>https://gru.gq/2022/09/17/userland-rootkits-are-lame/</guid>
      <pubDate>Sat, 17 Sep 2022 11:32:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[Quantified Failure]]></title>
      <description><![CDATA[<p>How the FSB got it wrong by getting it right</p><figure class="wp-block-image size-large"><img src="https://i0.wp.com/substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9cf5fdff-a00d-4a4e-9b3d-b423fc72e953_990x660.jpeg?ssl=1" alt="" data-recalc-dims="1" /></figure><p>hen planning regime change it is useful to know a bit about the target country’s population. How will they feel about the invasion force? What do they think about their leaders? Are they highly motivated extremists? To uncover the answers to these questions requires intelligence collection and analysis.</p><p>There is an approach which is entirely analytic, objective, and data driven. It doesnt rely on untrustworthy fickle humans that you’ve paid to tell you what you want to hear. It doesn’t assume truthfulness. It is purely data driven. Entirely scientific and quantifiable. And wrong. </p><p>There are a number of routes to pursue to collect data on, and assess the sentiment of, the Ukrainian population. An overt method would be to conduct polls and surveys. Clearly this can’t include questions like “on a scale from 1-5, how welcoming would you be to Russian invasion?” To get this more private information requires recruiting agents, talking to people, and gathering “atmospherics” (aka what the taxi driver says). And in the modern age of internet surveillance, there is a wealth of data online to interrogate for insights.</p><p>The FSB must have done all of these. They were talking to people, although apparently not as many as they claimed on their expense reports. Sadly for the FSB analysts, the intelligence reports from the field seem to be no more accurate than the expense claims. The FSB’s HUMINT sources weren’t particularly reliable. But while humans are untruthful, data never lies!</p><p>The Info Op is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p><p>The good news is that data, unlike people, doesn’t lie, dissemble or tell you what you want to hear. A data analytics team can get to the ground truth using quantifiable reproducible science. </p><p>In theory. </p><p>The data analytics team needs to learn the salient identity of the average Ukrainian. That is, what is the most important identity for someone in Kyiv? Do they see themselves as Ukrainian, or Russian? A simply proxy might be the language that they speak. After all, according to “official sources” Ukrainians are trying to kill the Russian language, so obviously language <em>is</em> identity. </p><p>The FSB collects statistics on the languages people use on the internet. What language do Ukrainians use when speaking only for themselves? That is, what do they type into Google or Yandex? Something like over 95% of the population use Russian to search the Internet. This is a good indicator.</p><p><strong>Finding</strong>: The average Ukrainian uses Russian when searching the internet. </p><p>But what about when they talk to each other? Fortunately, this is easy to answer. Just look at what language people use when posting on social media, or writing blogs, and so on. The most common language is Russian. Again, something in the high 90s %.</p><p>A pattern is starting to emerge. The FSB data analytics team can start to put together some findings and start reaching some early conclusions.</p><p><strong>Finding</strong>: overwhelming majority of Ukrainians use Russian on the Internet.</p><p><strong>Preliminary Conclusion</strong>: therefore, the overwhelming majority of Ukrainians see themselves as Russian first.</p><p>The next issue to address is the mood of “the Ukrainian street.” Lets look at what people are writing about in their social media accounts. What do they think about the current situation? Are they happy? Do they like the country, like the government? What do they think about the politicians? </p><p>Well, turns out they complain constantly about the government, the politicians, and so on. They’re always griping about their problems with the current regime. </p><p class="has-medium-font-size"><strong>Finding</strong>: Data indicates that Ukrainians don’t like their current government.</p><p>As an FSB officer with all this data, what are you going to report? Well, you know that there is political pressure to report that Russia is desirable, and given the quantifiable data collected, there is a very easy assessment to make. </p><p>Based on all the evidence, all indication is that the people of Ukraine are:</p><ul><li>Russian speakers</li>
<li>Not happy with their government </li>
<li>Not united behind Zelensky</li>
<li>Not hardcore ultra nationalists</li>
</ul><p>All the indicators from all the available data suggests that the people will accept a regime change and just carry on with their comfortable lives. Indeed, there is reason to believe they will actually welcome regime change, after all, look how much they complain!</p><p>Again we see cultural mirror imaging cause problems with the analysis. Russia does not have freedom of speech. Ukraine does. Russian analysts know how strong feelings have to be in Russia for someone to publicly speak against the police or the government. Therefore, logically, public complaints are a strong signal of dissatisfaction. Except, of course, that only holds true when complaints are costly. When it costs nothing, the value of a signal can be reduced to nothing. It is not at all clear the analysts understand that freedom of speech means public statements are essentially cost free.</p><p>With enough data an assessment can be made to match any desired result. Intelligence analysis requires more than data. It requires interpretation, and that requires experience. Deep knowledge on a subject. </p><p>All this data was worse than useless. It painted a false picture. Sure the Ukrainians are not hardcore ultra nationalists, but they are patriots with a strong desire for a free Ukraine. Yes they were unhappy with their government, but they are more unhappy with invaders and collaboration governments. Maybe they weren’t united behind a peacetime Zelensky, but they are united behind an eloquent and charismatic wartime leader. </p><p>Originally published in my newsletter. Subscribe at <a href="http://grugq.substack.com">grugq.substack.com</a></p>]]></description>
      <link>https://grudotgq.wpcomstaging.com/2022/09/17/quantified-failure/</link>
      <guid>https://grudotgq.wpcomstaging.com/2022/09/17/quantified-failure/</guid>
      <pubDate>Sat, 17 Sep 2022 11:22:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[Quantified Failure]]></title>
      <description><![CDATA[<p>How the FSB got it wrong by getting it right</p><figure class="wp-block-image size-large"><img data-lazy-fallback="1" src="https://i0.wp.com/substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9cf5fdff-a00d-4a4e-9b3d-b423fc72e953_990x660.jpeg?ssl=1" alt="" data-recalc-dims="1" /></figure><p>hen planning regime change it is useful to know a bit about the target country’s population. How will they feel about the invasion force? What do they think about their leaders? Are they highly motivated extremists? To uncover the answers to these questions requires intelligence collection and analysis.</p><p>There is an approach which is entirely analytic, objective, and data driven. It doesnt rely on untrustworthy fickle humans that you’ve paid to tell you what you want to hear. It doesn’t assume truthfulness. It is purely data driven. Entirely scientific and quantifiable. And wrong. </p><h2>What’s the mood of the “Ukrainian Street”?</h2><p>There are a number of routes to pursue to collect data on, and assess the sentiment of, the Ukrainian population. An overt method would be to conduct polls and surveys. Clearly this can’t include questions like “on a scale from 1-5, how welcoming would you be to Russian invasion?” To get this more private information requires recruiting agents, talking to people, and gathering “atmospherics” (aka what the taxi driver says). And in the modern age of internet surveillance, there is a wealth of data online to interrogate for insights.</p><p>The FSB must have done all of these. They were talking to people, although apparently not as many as they claimed on their expense reports. Sadly for the FSB analysts, the intelligence reports from the field seem to be no more accurate than the expense claims. The FSB’s HUMINT sources weren’t particularly reliable. But while humans are untruthful, data never lies!</p><p>The Info Op is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p><h2>The Oracle for Ground Truth</h2><p>The good news is that data, unlike people, doesn’t lie, dissemble or tell you what you want to hear. A data analytics team can get to the ground truth using quantifiable reproducible science. </p><p>In theory. </p><h2>Language and Identity</h2><p>The data analytics team needs to learn the salient identity of the average Ukrainian. That is, what is the most important identity for someone in Kyiv? Do they see themselves as Ukrainian, or Russian? A simply proxy might be the language that they speak. After all, according to “official sources” Ukrainians are trying to kill the Russian language, so obviously language <em>is</em> identity. </p><h3>What language do they use in private?</h3><p>The FSB collects statistics on the languages people use on the internet. What language do Ukrainians use when speaking only for themselves? That is, what do they type into Google or Yandex? Something like over 95% of the population use Russian to search the Internet. This is a good indicator.</p><p><strong>Finding</strong>: The average Ukrainian uses Russian when searching the internet. </p><h3>What do they speak to each other?</h3><p>But what about when they talk to each other? Fortunately, this is easy to answer. Just look at what language people use when posting on social media, or writing blogs, and so on. The most common language is Russian. Again, something in the high 90s %.</p><p>A pattern is starting to emerge. The FSB data analytics team can start to put together some findings and start reaching some early conclusions.</p><p><strong>Finding</strong>: overwhelming majority of Ukrainians use Russian on the Internet.</p><p><strong>Preliminary Conclusion</strong>: therefore, the overwhelming majority of Ukrainians see themselves as Russian first.</p><h2>Political Sentiment.</h2><p>The next issue to address is the mood of “the Ukrainian street.” Lets look at what people are writing about in their social media accounts. What do they think about the current situation? Are they happy? Do they like the country, like the government? What do they think about the politicians? </p><p>Well, turns out they complain constantly about the government, the politicians, and so on. They’re always griping about their problems with the current regime. </p><p class="has-medium-font-size"><strong>Finding</strong>: Data indicates that Ukrainians don’t like their current government.</p><h2>Solving for <em>x</em> </h2><p>As an FSB officer with all this data, what are you going to report? Well, you know that there is political pressure to report that Russia is desirable, and given the quantifiable data collected, there is a very easy assessment to make. </p><p>Based on all the evidence, all indication is that the people of Ukraine are:</p><ul><li>Russian speakers</li>
<li>Not happy with their government </li>
<li>Not united behind Zelensky</li>
<li>Not hardcore ultra nationalists</li>
</ul><p>All the indicators from all the available data suggests that the people will accept a regime change and just carry on with their comfortable lives. Indeed, there is reason to believe they will actually welcome regime change, after all, look how much they complain!</p><p>Again we see cultural mirror imaging cause problems with the analysis. Russia does not have freedom of speech. Ukraine does. Russian analysts know how strong feelings have to be in Russia for someone to publicly speak against the police or the government. Therefore, logically, public complaints are a strong signal of dissatisfaction. Except, of course, that only holds true when complaints are costly. When it costs nothing, the value of a signal can be reduced to nothing. It is not at all clear the analysts understand that freedom of speech means public statements are essentially cost free.</p><h2>The Sentiment Analysis is not the Sentiment</h2><p>With enough data an assessment can be made to match any desired result. Intelligence analysis requires more than data. It requires interpretation, and that requires experience. Deep knowledge on a subject. </p><p>All this data was worse than useless. It painted a false picture. Sure the Ukrainians are not hardcore ultra nationalists, but they are patriots with a strong desire for a free Ukraine. Yes they were unhappy with their government, but they are more unhappy with invaders and collaboration governments. Maybe they weren’t united behind a peacetime Zelensky, but they are united behind an eloquent and charismatic wartime leader. </p><p>Originally published in my newsletter. Subscribe at <a href="http://grugq.substack.com">grugq.substack.com</a></p><div class="cb_p6_patreon_button c4"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity%5Bemail%5D&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIyXC8wOVwvMTdcL3F1YW50aWZpZWQtZmFpbHVyZVwvIn0%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2022%2F09%2F17%2Fquantified-failure%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button"><img data-lazy-fallback="1" class="c3" src="https://i0.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></a></div>]]></description>
      <link>https://gru.gq/2022/09/17/quantified-failure/</link>
      <guid>https://gru.gq/2022/09/17/quantified-failure/</guid>
      <pubDate>Sat, 17 Sep 2022 11:22:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[Foghorn: Signals Through the Fog of War]]></title>
      <description><![CDATA[<figure class="wp-block-image is-style-default"><img src="https://i0.wp.com/substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F02576be3-7a05-4052-9e25-103b9dedeb95_1600x1120.jpeg?ssl=1" alt="" data-recalc-dims="1" /></figure><p>Russia’s first wave of destructive cyber effects operations against Ukraine were effective. They targeted and disabled Ukrainian air defense systems, government ministries, and the national command and control infrastructure built over VIASAT. These successful operations were accomplished even though Russia’s military intelligence, the GRU, had very little time to prepare. Lessons to take from this are (1) that the GRU had years of access operations with many prestaged backdoors they could use; (2) they had prepared many wipers and, the VIASAT operation beforehand; and, (3) the often repeated mantra that “cyber operations require long lead times” has important caveats. Russia was able to operate effectively on short notice and achieve tangible effects that were instrumental in some of their early successes during those initial three days.</p><p>So why didn’t Ukraine’s systems collapse? How was Ukraine able to resist this cyber juggernaut that could exploit years of preexisting compromises, years of tool development, years of active operations, and so on? </p><p>The secret behind Ukraine’s resilience is their ability to adapt and fallback to alternative systems. For over eight years Russian security services have attacked Ukraine’s computers and other cyber infrastructure. Frequent cyberattacks created the conditions for adversarial evolution, forcing the Ukrainians to learn how to live with that reality. Now Ukrainians take cyberattacks in stride, they no longer fear them. A government website gets defaced with some threatening message? Must be a Tuesday. </p><p>Constant Russian cyber has built up Ukrainian resilience. The population as a whole, and the defenders in particular, lived with a barrage of highly visible cyber effects operations, influence operations,  and near constant reports of successful cyber espionage campaigns. </p><p>Ukrainians have learned many Russian tricks. Android apps offered online for sideloading are not safe, so they use official channels. Websites get hacked, but they get restored. Sometimes Russian propaganda messages get sent to mobile phones, but they’re not important. And many more Russian attacks became just part of life, not an exceptional event. This is one pillar of Ukrainian resilience – acclimation to cyberattacks. No fear. </p><p>Besides losing their fear of cyber, Ukrainians became adept at switching to alternate systems. Many of these systems are provided by international providers, rather than local domestic companies, placing them beyond the reach of normal Russian offensive cyber operations. Facebook, Signal, Gmail, and so on are generally reliable and secure against Russian attacks. Even Telegram is generally fine to use as a public broadcast and messaging platform.</p><p>Of course, it is not only international systems that provide security against Russian attacks. Since the start of the war Ukrainians have adopted a number of completely new technologies for which Russia was not prepared. For example, using DJI drones as combat and reconnaissance platforms. As mentioned earlier, the VIASAT operation was almost certainly prepared well beforehand and taken off the shelf ready for use. Since then Ukraine has switched over to Starlink, against which Russia has not developed any operations. At least, nothing that has been successfully used so far (at time of writing, May 31 2022). </p><p>This is the other pillar of Ukraine’s resilience – the rapid adoption of alternative solutions. Satellite comms are down? Switch to another provider – over the weekend. Train system’s network vulnerable to cyber surveillance? Switch to the old analog Soviet system. Despite the success of Russian cyber effects operations, the Ukrainians have been able to work around the problems created. Helped by repeated exposure to cyber attacks they don’t panic, rather they adopt an alternative and keep going.</p><figure class="wp-block-image is-style-default"><img src="https://i0.wp.com/substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0b0b7e9-f537-4020-9141-eb3f1c0af6b3_990x707.jpeg?ssl=1" alt="" data-recalc-dims="1" /></figure><p>After the better part of a decade on the receiving end of Russian cyber, Ukraine has had years to learn how to deal with Russian cyber capacity. They’ve deployed (some) secure systems. More importantly they’ve learned to mitigate Russian advantages by limiting their dependence on cyber. For example Ukrainian organizations rapidly adapt to new replacement systems, including many commercial off the shelf solutions.</p><p>Using common public solutions can bring significant benefits. Often these international solutions aren’t as exposed to Russian attacks as domestic systems. An additional aid to cyber security is that many of these off the shelf solutions are new since the war. Russia hasn’t had time to develop countermeasures and capabilities yet. Plus, some are just tough problems, even the US has struggled against DJI drones.</p><p>Ukraine also has a home field advantage that has helped against the invasion. As has been documented extensively, the Russian army suffers from communications difficulties. Their technology doesn’t work that well, their troops aren’t familiar with its use, and they’re not used to working with its limitations. The result is many Russians have fallen back to using their mobile phones. On Ukraine’s mobile phone network. Controlled by Ukrainian companies. Ukrainians call these mobile phones “spring flowers,” because they suddenly appear on the network. Spring flowers bring artillery showers. </p><p>Russia’s invasion plan was a retread of <a href="https://en.wikipedia.org/wiki/Operation_Storm-333">Storm-333</a>. A very fast, very deep military strike that neutralizes the country’s leadership and immediately replaces them with a new regime. </p><p>Russia’s cyber capability was used to enable this operation. The backbone communications fabric of the Ukrainian military and civilian government was running over VIASAT. The GRU targeted VIASAT as a tier one priority and deployed wipers to destroy satellite modems connected to the network. Their targeting was a bit sloppy with some spillover into Germany and other European countries. (Note: this spillover is possibly the only reason we even know about this attack.)</p><p>This was a virtual decapitation strike, taking out major C2 infrastructure critical to managing the military and the country during wartime. A major coup for the GRU. </p><blockquote class="wp-block-quote">
<p>The attack caused a major loss in communications in Ukraine in the early hours of Russia’s invasion, top Ukrainian cybersecurity official Victor Zhora</p>
<p>[<a href="https://www.securityweek.com/viasat-satellite-modems-nexus-worst-cyberattack-ukraine-war">SecurityWeek</a>]</p>
</blockquote><p>Government services and capacity were further compromised by wiper attacks at multiple ministries. [<a href="https://threatpost.com/destructive-wiper-organizations-ukraine/178937/">ThreatPost</a>]</p><p>The GRU provided direct military assistance with destructive cyber attacks that disrupted  or destroyed Ukrainian air defense system command and control infrastructure. Cyber attacks against the C2 were combined with kinetic attacks against installations. However, poor Russian intelligence collection caused them to destroy many disused and abandoned locations.</p><p>The combined effects of these early cyber strikes was a severely reduced air defense capacity, and an isolated leadership. Against an extremely hierarchical top down military, such as Russia’s,  this might have been decisive. Ukraine has a more Western style command structure, following the “centralized decision, decentralized execution” model favored by NATO militaries. </p><figure class="wp-block-image is-style-rounded"><img src="https://i0.wp.com/substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F97fe353c-96d0-4c89-b52e-70ed80416062_990x989.jpeg?ssl=1" alt="" data-recalc-dims="1" /></figure><p>The cyber conflict was far from non-existent. It was probably the only part of the invasion that went according to plan. Russia’s cyber offense must be understood within the context of their broader strategy, which collapsed. Currently, whatever the new strategy is, cyber apparently plays a smaller role. There isn’t really all that much cyber can do to assist an artillery duel, or help with crossing a river. And, of course, some elements of the war are simply immune to cyber. For example, Javelins and Stingers.</p><p>Despite the success of the Russian cyber offensive, including the severing of Ukraine’s communication fabric in the hours before the invasion, the actual benefits have been less than impressive. The credit for this goes to the Ukrainians. They have had a lot of practice dealing with Russian cyber effects operations. They moved to less vulnerable systems, deployed new solutions, and fell back to less vulnerable alternatives. The story of Russia’s unimpressive results from their cyber offensive is as much a story of Ukraine resilience as any limitations of cyber power.</p><p>Note: This post first appeared on <a rel="noreferrer noopener" href="https://grugq.substack.com" target="_blank">my newsletter</a>. The <a rel="noreferrer noopener" href="https://grugq.substack.com/p/foghorn-signals-through-the-fog-of" target="_blank">canonical version: Foghorn</a></p>]]></description>
      <link>https://grudotgq.wpcomstaging.com/2022/06/02/foghorn-signals-through-the-fog-of-war-2/</link>
      <guid>https://grudotgq.wpcomstaging.com/2022/06/02/foghorn-signals-through-the-fog-of-war-2/</guid>
      <pubDate>Thu, 02 Jun 2022 16:51:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[Foghorn: Signals Through the Fog of War]]></title>
      <description><![CDATA[<h3>Some Lessons Learned, So Far </h3><figure class="wp-block-image is-style-default"><img data-lazy-fallback="1" src="https://i0.wp.com/substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F02576be3-7a05-4052-9e25-103b9dedeb95_1600x1120.jpeg?ssl=1" alt="" data-recalc-dims="1" /></figure><p>Russia’s first wave of destructive cyber effects operations against Ukraine were effective. They targeted and disabled Ukrainian air defense systems, government ministries, and the national command and control infrastructure built over VIASAT. These successful operations were accomplished even though Russia’s military intelligence, the GRU, had very little time to prepare. Lessons to take from this are (1) that the GRU had years of access operations with many prestaged backdoors they could use; (2) they had prepared many wipers and, the VIASAT operation beforehand; and, (3) the often repeated mantra that “cyber operations require long lead times” has important caveats. Russia was able to operate effectively on short notice and achieve tangible effects that were instrumental in some of their early successes during those initial three days.</p><p>So why didn’t Ukraine’s systems collapse? How was Ukraine able to resist this cyber juggernaut that could exploit years of preexisting compromises, years of tool development, years of active operations, and so on? </p><h2>Adaptation and Acclimation </h2><p>The secret behind Ukraine’s resilience is their ability to adapt and fallback to alternative systems. For over eight years Russian security services have attacked Ukraine’s computers and other cyber infrastructure. Frequent cyberattacks created the conditions for adversarial evolution, forcing the Ukrainians to learn how to live with that reality. Now Ukrainians take cyberattacks in stride, they no longer fear them. A government website gets defaced with some threatening message? Must be a Tuesday. </p><p>Constant Russian cyber has built up Ukrainian resilience. The population as a whole, and the defenders in particular, lived with a barrage of highly visible cyber effects operations, influence operations,  and near constant reports of successful cyber espionage campaigns. </p><p>Ukrainians have learned many Russian tricks. Android apps offered online for sideloading are not safe, so they use official channels. Websites get hacked, but they get restored. Sometimes Russian propaganda messages get sent to mobile phones, but they’re not important. And many more Russian attacks became just part of life, not an exceptional event. This is one pillar of Ukrainian resilience – acclimation to cyberattacks. No fear. </p><h2>Rapid Adoption</h2><p>Besides losing their fear of cyber, Ukrainians became adept at switching to alternate systems. Many of these systems are provided by international providers, rather than local domestic companies, placing them beyond the reach of normal Russian offensive cyber operations. Facebook, Signal, Gmail, and so on are generally reliable and secure against Russian attacks. Even Telegram is generally fine to use as a public broadcast and messaging platform.</p><p>Of course, it is not only international systems that provide security against Russian attacks. Since the start of the war Ukrainians have adopted a number of completely new technologies for which Russia was not prepared. For example, using DJI drones as combat and reconnaissance platforms. As mentioned earlier, the VIASAT operation was almost certainly prepared well beforehand and taken off the shelf ready for use. Since then Ukraine has switched over to Starlink, against which Russia has not developed any operations. At least, nothing that has been successfully used so far (at time of writing, May 31 2022). </p><p>This is the other pillar of Ukraine’s resilience – the rapid adoption of alternative solutions. Satellite comms are down? Switch to another provider – over the weekend. Train system’s network vulnerable to cyber surveillance? Switch to the old analog Soviet system. Despite the success of Russian cyber effects operations, the Ukrainians have been able to work around the problems created. Helped by repeated exposure to cyber attacks they don’t panic, rather they adopt an alternative and keep going.</p><figure class="wp-block-image is-style-default"><img data-lazy-fallback="1" src="https://i0.wp.com/substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0b0b7e9-f537-4020-9141-eb3f1c0af6b3_990x707.jpeg?ssl=1" alt="" data-recalc-dims="1" /></figure><p>After the better part of a decade on the receiving end of Russian cyber, Ukraine has had years to learn how to deal with Russian cyber capacity. They’ve deployed (some) secure systems. More importantly they’ve learned to mitigate Russian advantages by limiting their dependence on cyber. For example Ukrainian organizations rapidly adapt to new replacement systems, including many commercial off the shelf solutions.</p><p>Using common public solutions can bring significant benefits. Often these international solutions aren’t as exposed to Russian attacks as domestic systems. An additional aid to cyber security is that many of these off the shelf solutions are new since the war. Russia hasn’t had time to develop countermeasures and capabilities yet. Plus, some are just tough problems, even the US has struggled against DJI drones.</p><h2>Spring Flowers</h2><p>Ukraine also has a home field advantage that has helped against the invasion. As has been documented extensively, the Russian army suffers from communications difficulties. Their technology doesn’t work that well, their troops aren’t familiar with its use, and they’re not used to working with its limitations. The result is many Russians have fallen back to using their mobile phones. On Ukraine’s mobile phone network. Controlled by Ukrainian companies. Ukrainians call these mobile phones “spring flowers,” because they suddenly appear on the network. Spring flowers bring artillery showers. </p><p>Russia’s invasion plan was a retread of <a href="https://en.wikipedia.org/wiki/Operation_Storm-333">Storm-333</a>. A very fast, very deep military strike that neutralizes the country’s leadership and immediately replaces them with a new regime. </p><p>Russia’s cyber capability was used to enable this operation. The backbone communications fabric of the Ukrainian military and civilian government was running over VIASAT. The GRU targeted VIASAT as a tier one priority and deployed wipers to destroy satellite modems connected to the network. Their targeting was a bit sloppy with some spillover into Germany and other European countries. (Note: this spillover is possibly the only reason we even know about this attack.)</p><p>This was a virtual decapitation strike, taking out major C2 infrastructure critical to managing the military and the country during wartime. A major coup for the GRU. </p><blockquote class="wp-block-quote">
<p>The attack caused a major loss in communications in Ukraine in the early hours of Russia’s invasion, top Ukrainian cybersecurity official Victor Zhora</p><div>
[</div><a href="https://www.securityweek.com/viasat-satellite-modems-nexus-worst-cyberattack-ukraine-war">SecurityWeek</a><div>]</div></blockquote><p>Government services and capacity were further compromised by wiper attacks at multiple ministries. [<a href="https://threatpost.com/destructive-wiper-organizations-ukraine/178937/">ThreatPost</a>]</p><p>The GRU provided direct military assistance with destructive cyber attacks that disrupted  or destroyed Ukrainian air defense system command and control infrastructure. Cyber attacks against the C2 were combined with kinetic attacks against installations. However, poor Russian intelligence collection caused them to destroy many disused and abandoned locations.</p><p>The combined effects of these early cyber strikes was a severely reduced air defense capacity, and an isolated leadership. Against an extremely hierarchical top down military, such as Russia’s,  this might have been decisive. Ukraine has a more Western style command structure, following the “centralized decision, decentralized execution” model favored by NATO militaries. </p><figure class="wp-block-image is-style-rounded"><img data-lazy-fallback="1" src="https://i0.wp.com/substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F97fe353c-96d0-4c89-b52e-70ed80416062_990x989.jpeg?ssl=1" alt="" data-recalc-dims="1" /></figure><p>The cyber conflict was far from non-existent. It was probably the only part of the invasion that went according to plan. Russia’s cyber offense must be understood within the context of their broader strategy, which collapsed. Currently, whatever the new strategy is, cyber apparently plays a smaller role. There isn’t really all that much cyber can do to assist an artillery duel, or help with crossing a river. And, of course, some elements of the war are simply immune to cyber. For example, Javelins and Stingers.</p><p>Despite the success of the Russian cyber offensive, including the severing of Ukraine’s communication fabric in the hours before the invasion, the actual benefits have been less than impressive. The credit for this goes to the Ukrainians. They have had a lot of practice dealing with Russian cyber effects operations. They moved to less vulnerable systems, deployed new solutions, and fell back to less vulnerable alternatives. The story of Russia’s unimpressive results from their cyber offensive is as much a story of Ukraine resilience as any limitations of cyber power.</p><p>Note: This post first appeared on <a rel="noreferrer noopener" href="https://grugq.substack.com" target="_blank">my newsletter</a>. The <a rel="noreferrer noopener" href="https://grugq.substack.com/p/foghorn-signals-through-the-fog-of" target="_blank">canonical version: Foghorn</a></p><div class="cb_p6_patreon_button c4"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity%5Bemail%5D&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIyXC8wNlwvMDJcL2ZvZ2hvcm4tc2lnbmFscy10aHJvdWdoLXRoZS1mb2ctb2Ytd2FyLTJcLyJ9&amp;utm_source=https%3A%2F%2Fgru.gq%2F2022%2F06%2F02%2Ffoghorn-signals-through-the-fog-of-war-2%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button"><img data-lazy-fallback="1" class="c3" src="https://i0.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></a></div>]]></description>
      <link>https://gru.gq/2022/06/02/foghorn-signals-through-the-fog-of-war-2/</link>
      <guid>https://gru.gq/2022/06/02/foghorn-signals-through-the-fog-of-war-2/</guid>
      <pubDate>Thu, 02 Jun 2022 16:51:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[Foghorn: Signals Through the Fog of War]]></title>
      <description><![CDATA[<p>Some Lessons Learned, So Far</p><p><img data-media-id="155392805" src="https://i0.wp.com/gru.gq/wp-content/uploads/2022/06/441d6be531d9d083109c1335f6b9f54a.jpg?fit=820%2C574&amp;ssl=1" alt="image" /></p><h3>Ukraine Survives and Thrives</h3><p>Russia’s first wave of destructive cyber effects operations against Ukraine were effective. They targeted and disabled Ukrainian air defense systems, government ministries, and the national command and control infrastructure built over VIASAT. These successful operations were accomplished even though Russia’s military intelligence, the GRU, had very little time to prepare. Lessons to take from this are (1) that the GRU had years of access operations with many prestaged backdoors they could use; (2) they had prepared many wipers and, the VIASAT operation beforehand; and, (3) the often repeated mantra that “cyber operations require long lead times” has important caveats. Russia was able to operate effectively on short notice and achieve tangible effects that were instrumental in some of their early successes during those initial three days.</p><p>So why didn’t Ukraine’s systems collapse? How was Ukraine able to resist this cyber juggernaut that could exploit years of preexisting compromises, years of tool development, years of active operations, and so on?</p><h3>Adaptation and Acclimation</h3><p>The secret behind Ukraine’s resilience is their ability to adapt and fallback to alternative systems. For over eight years Russian security services have attacked Ukraine’s computers and other cyber infrastructure. Frequent cyberattacks created the conditions for adversarial evolution, forcing the Ukrainians to learn how to live with that reality. Now Ukrainians take cyberattacks in stride, they no longer fear them. A government website gets defaced with some threatening message? Must be a Tuesday.</p><p>Constant Russian cyber has built up Ukrainian resilience. The population as a whole, and the defenders in particular, lived with a barrage of highly visible cyber effects operations, influence operations, and near constant reports of successful cyber espionage campaigns.</p><p>Ukrainians have learned many Russian tricks. Android apps offered online for sideloading are not safe, so they use official channels. Websites get hacked, but they get restored. Sometimes Russian propaganda messages get sent to mobile phones, but they’re not important. And many more Russian attacks became just part of life, not an exceptional event. This is one pillar of Ukrainian resilience – acclimation to cyberattacks. No fear.</p><h3>Rapid Adoption</h3><p>Besides losing their fear of cyber, Ukrainians became adept at switching to alternate systems. Many of these systems are provided by international providers, rather than local domestic companies, placing them beyond the reach of normal Russian offensive cyber operations. Facebook, Signal, Gmail, and so on are generally reliable and secure against Russian attacks. Even Telegram is generally fine to use as a public broadcast and messaging platform.</p><p>Of course, it is not only international systems that provide security against Russian attacks. Since the start of the war Ukrainians have adopted a number of completely new technologies for which Russia was not prepared. For example, using DJI drones as combat and reconnaissance platforms. As mentioned earlier, the VIASAT operation was almost certainly prepared well beforehand and taken off the shelf ready for use. Since then Ukraine has switched over to Starlink, against which Russia has not developed any operations. At least, nothing that has been successfully used so far (at time of writing, May 31 2022).</p><p>This is the other pillar of Ukraine’s resilience – the rapid adoption of alternative solutions. Satellite comms are down? Switch to another provider – over the weekend. Train system’s network vulnerable to cyber surveillance? Switch to the old analog Soviet system. Despite the success of Russian cyber effects operations, the Ukrainians have been able to work around the problems created. Helped by repeated exposure to cyber attacks they don’t panic, rather they adopt an alternative and keep going.</p><p><img data-media-id="155392839" src="https://i0.wp.com/gru.gq/wp-content/uploads/2022/06/6af783120aba2d6aedaba74f86f5633f.jpg?fit=820%2C586&amp;ssl=1" alt="image" /></p><h3>Sources of Immunity</h3><p>After the better part of a decade on the receiving end of Russian cyber, Ukraine has had years to learn how to deal with Russian cyber capacity. They’ve deployed (some) secure systems. More importantly they’ve learned to mitigate Russian advantages by limiting their dependence on cyber. For example Ukrainian organizations rapidly adapt to new replacement systems, including many commercial off the shelf solutions.</p><p>Using common public solutions can bring significant benefits. Often these international solutions aren’t as exposed to Russian attacks as domestic systems. An additional aid to cyber security is that many of these off the shelf solutions are new since the war. Russia hasn’t had time to develop countermeasures and capabilities yet. Plus, some are just tough problems, even the US has struggled against DJI drones.</p><h3>Spring Flowers</h3><p>Ukraine also has a home field advantage that has helped against the invasion. As has been documented extensively, the Russian army suffers from communications difficulties. Their technology doesn’t work that well, their troops aren’t familiar with its use, and they’re not used to working with its limitations. The result is many Russians have fallen back to using their mobile phones. On Ukraine’s mobile phone network. Controlled by Ukrainian companies. Ukrainians call these mobile phones “spring flowers,” because they suddenly appear on the network. Spring flowers bring artillery showers.</p><h3>Russia’s Cyber Strategy</h3><p>Russia’s invasion plan was a retread of Storm-333. A very fast, very deep military strike that neutralizes the country’s leadership and immediately replaces them with a new regime.</p><p>Russia’s cyber capability was used to enable this operation. The backbone communications fabric of the Ukrainian military and civilian government was running over VIASAT. The GRU targeted VIASAT as a tier one priority and deployed wipers to destroy satellite modems connected to the network. Their targeting was a bit sloppy with some spillover into Germany and other European countries. (Note: this spillover is possibly the only reason we even know about this attack.)</p><p>This was a virtual decapitation strike, taking out major C2 infrastructure critical to managing the military and the country during wartime. A major coup for the GRU.</p><blockquote>
<p>The attack caused a major loss in communications in Ukraine in the early hours of Russia’s invasion, top Ukrainian cybersecurity official Victor Zhora</p>
</blockquote><p>[<a href="https://www.securityweek.com/viasat-satellite-modems-nexus-worst-cyberattack-ukraine-war" rel="nofollow noopener" target="_blank">SecurityWeek</a>]</p><p>Government services and capacity were further compromised by wiper attacks at multiple ministries. [<a href="https://threatpost.com/destructive-wiper-organizations-ukraine/178937/" rel="nofollow noopener" target="_blank">ThreatPost</a>]</p><p>The GRU provided direct military assistance with destructive cyber attacks that disrupted or destroyed Ukrainian air defense system command and control infrastructure. Cyber attacks against the C2 were combined with kinetic attacks against installations. However, poor Russian intelligence collection caused them to destroy many disused and abandoned locations.</p><p>The combined effects of these early cyber strikes was a severely reduced air defense capacity, and an isolated leadership. Against an extremely hierarchical top down military, such as Russia’s, this might have been decisive. Ukraine has a more Western style command structure, following the “centralized decision, decentralized execution” model favored by NATO militaries.</p><p><img data-media-id="155392768" src="https://i0.wp.com/gru.gq/wp-content/uploads/2022/06/9be0a8eed62a31cef91d589dca89d414.jpg?fit=820%2C819&amp;ssl=1" alt="image" /></p><h3>What does it all mean?</h3><p>The cyber conflict was far from non-existent. It was probably the only part of the invasion that went according to plan. Russia’s cyber offense must be understood within the context of their broader strategy, which collapsed. Currently, whatever the new strategy is, cyber apparently plays a smaller role. There isn’t really all that much cyber can do to assist an artillery duel, or help with crossing a river. And, of course, some elements of the war are simply immune to cyber. For example, Javelins and Stingers.</p><p>Despite the success of the Russian cyber offensive, including the severing of Ukraine’s communication fabric in the hours before the invasion, the actual benefits have been less than impressive. The credit for this goes to the Ukrainians. They have had a lot of practice dealing with Russian cyber effects operations. They moved to less vulnerable systems, deployed new solutions, and fell back to less vulnerable alternatives. The story of Russia’s unimpressive results from their cyber offensive is as much a story of Ukraine resilience as any limitations of cyber power</p>]]></description>
      <link>https://grudotgq.wpcomstaging.com/2022/06/02/foghorn-signals-through-the-fog-of-war/</link>
      <guid>https://grudotgq.wpcomstaging.com/2022/06/02/foghorn-signals-through-the-fog-of-war/</guid>
      <pubDate>Thu, 02 Jun 2022 14:05:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[Foghorn: Signals Through the Fog of War]]></title>
      <description><![CDATA[<main class="content"><article class="post-1447 post type-post status-publish format-standard has-post-thumbnail category-cyber entry"><header class="entry-header">
<p class="entry-meta"><time class="entry-time">2022-06-02</time> by <span class="entry-author"><a href="https://gru.gq/author/thegrugq/" class="entry-author-link"><span class="entry-author-name">grugq</span></a></span> <span class="entry-comments-link"><a href="https://gru.gq/2022/06/02/foghorn-signals-through-the-fog-of-war/#respond">Leave a Comment</a></span> </p></header><div class="entry-content">
</div><footer class="entry-footer"><p class="entry-meta"><span class="entry-categories">Filed Under: <a href="https://gru.gq/category/cyber/">cyber</a></span> </p></footer></article> <input type="hidden" id="comment_parent"> </main>]]></description>
      <link>https://gru.gq/2022/06/02/foghorn-signals-through-the-fog-of-war/</link>
      <guid>https://gru.gq/2022/06/02/foghorn-signals-through-the-fog-of-war/</guid>
      <pubDate>Thu, 02 Jun 2022 14:05:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[Putin’s cyber blind spot]]></title>
      <description><![CDATA[<p>A common question about the lacklustre Russian cyberwar so far is, why hasn’t Putin unleashed the ransomware gangs? Why isn’t there a massive wave of ransomware across Europe and America? There are two related issues here that need to be addressed on Putin and ransomware: (1) why would he? (2) why hasn’t he? This post will address the second “why he hasn’t” topic, leaving “why ransomware” for a more substantive write up.</p><p class="c1">So, why hasn’t Putin sent his ransomware hounds swarming over European and American networks in an unbridled orgy of encryption, chaos and crypto? An important first step to answering this question is to understand where ransomware fits within the Russian state’s cyber arsenal. And here is where I think we have collectively misjudged the dynamics of ransomware and the state. I am guilty of this myself. We have overestimated the control, underestimated the greed/financial motivation for the hackers, and we have misconstrued Putin’s understanding of his strategic cyber assets.</p><div class="captioned-image-container c2"><a class="image-link image2" target="_blank" rel="nofollow noopener" href="https://i0.wp.com/cdn.substack.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fc223f862-66d1-4615-9fab-1693a375e405_400x400.jpeg?ssl=1"><img data-attachment-id="1368" data-permalink="https://grudotgq.wpcomstaging.com/2022/04/14/putins-cyber-blind-spot/img_9951/" data-orig-file="https://i0.wp.com/grudotgq.wpcomstaging.com/wp-content/uploads/2022/04/img_9951.jpg?fit=400%2C400&amp;ssl=1" data-orig-size="400,400" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}" data-image-title="img_9951" data-image-description="" data-image-caption="" data-medium-file="https://i0.wp.com/grudotgq.wpcomstaging.com/wp-content/uploads/2022/04/img_9951.jpg?fit=300%2C300&amp;ssl=1" data-large-file="https://i0.wp.com/grudotgq.wpcomstaging.com/wp-content/uploads/2022/04/img_9951.jpg?fit=400%2C400&amp;ssl=1" src="https://i0.wp.com/grudotgq.wpcomstaging.com/wp-content/uploads/2022/04/img_9951.jpg?resize=400%2C400&amp;ssl=1" class="size-full wp-image-1368" width="400" height="400" srcset="https://i0.wp.com/grudotgq.wpcomstaging.com/wp-content/uploads/2022/04/img_9951.jpg?w=400&amp;ssl=1 400w, https://i0.wp.com/grudotgq.wpcomstaging.com/wp-content/uploads/2022/04/img_9951.jpg?resize=300%2C300&amp;ssl=1 300w, https://i0.wp.com/grudotgq.wpcomstaging.com/wp-content/uploads/2022/04/img_9951.jpg?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/grudotgq.wpcomstaging.com/wp-content/uploads/2022/04/img_9951.jpg?resize=200%2C200&amp;ssl=1 200w, https://i0.wp.com/grudotgq.wpcomstaging.com/wp-content/uploads/2022/04/img_9951.jpg?resize=100%2C100&amp;ssl=1 100w" data-recalc-dims="1" alt="image" /></a></div><h2 class="c3"><strong>How short the leash?</strong></h2><p class="c1">Ransomware gangs are loosely formed affinity groups united by a desire for money and a self identity as a cyber vory (thief-in-law, a sort of fraternity with rules and regulations). The language spoken by the Russian underground is heavy with Fenya, basically Russian thieves cant. The Russian cyber criminal underground style themselves as cyber-Vory. Quietly, of course, they wouldn’t want the real vory to hear them say that.</p><p class="c1">They aren’t really vory, but many do like to imagine they are. One of the core rules of the vory is to never do anything for the authorities. Now, I’m not suggesting these guys would actually follow the thieves code religiously. But they have no reason to meekly or voluntarily act as Russian government assets. Indeed, they have every reason to make performative shows of rejecting requests from the authorities.</p><h2 class="c3"><strong>How keen the dogs?</strong></h2><p class="c1">The groups will not do this spontaneously. There are several reasons, starting with—they want to make money. They are actually quite conservative about making money. They find something that works and do as much of it as they can. They don’t want to deviate and possible lose money (particularly to other ransomware groups!) And they do not want to give up their revenue flows for nationalism. So it is probably unreasonable to expect a significant spontaneous ransomware volunteer cyber militia anytime soon.</p><h2 class="c3"><strong>How aware the master?</strong></h2><p class="c1">Putin, and the Russian government in general, understand offensive cyber as a function of the security forces, particularly the intelligence services. Ransomware, they understand as (1) a means of getting kompromat on political rivals (in the style of “hack my girlfriend’s Facebook”), (2) a source of income, in particular for the FSB (which is very important in its own way but a topic for another time), and (3) something the West hates and is therefore a bargaining chip to be used in future diplomatic negotiations. Critically, they do not perceive the ransomware gangs as a strategic cyber asset that can be used within a larger grand strategy.</p><p class="c1">Their blind spot is by no means unusual, as far as I know there are no political leaders who perceive ransomware as a strategic capability. There is maybe a vague sense of “they could do more Colonial Pipeline attacks!” but no real concern that ransomware could be used to disable choke points in the global supply chain, introduce considerable friction into standard of living, or disrupt critical systems necessary for civil society to function.</p><p class="c1">Ransomware is not understood as the potential power it is. Consequently, there is a conceptual brake on them being unleashed on the world to raid and cause damage as part of Putin’s strategy.</p><h2 class="c3"><strong>Which way to bet</strong></h2><p class="c1">The cyber war is rapidly evolving, of course, and it is unclear what role ransomware gangs will play. But for now at least, it seems that maybe we have misunderstood the situation.</p><p class="c1">Of course, Russia’s use of ransomware gangs could change in an instant, for example if someone drafts a proposal and gets it approved. But it is important to avoid mirror imaging. We know that ransomware is an important strategic capability. That doesn’t mean the Russians do.</p>]]></description>
      <link>https://grudotgq.wpcomstaging.com/2022/04/14/putins-cyber-blind-spot/</link>
      <guid>https://grudotgq.wpcomstaging.com/2022/04/14/putins-cyber-blind-spot/</guid>
      <pubDate>Thu, 14 Apr 2022 12:59:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[Putin’s cyber blind spot]]></title>
      <description><![CDATA[<p>A common question about the lacklustre Russian cyberwar so far is, why hasn’t Putin unleashed the ransomware gangs? Why isn’t there a massive wave of ransomware across Europe and America? There are two related issues here that need to be addressed on Putin and ransomware: (1) why would he? (2) why hasn’t he? This post will address the second “why hasn’t he” question, leaving “why ransomware” for a more substantive write up.</p><p>So, why hasn’t Putin sent his ransomware hordes swarming over European and American networks in an unbridled orgy of encryption, chaos and crypto? An important first step to answering this question is to understand where ransomware fits within Russia’s cyber arsenal. And here is where I think we have collectively misjudged the dynamics of ransomware and the state. I am very guilty of this myself. We have overestimated the control, underestimated the greed/financial motivation for the hackers, and we have massively overestimated Putin’s understanding of his strategic cyber assets.</p><h2>How short the leash?</h2><p>Ransomware gangs are loosely formed affinity groups united by a desire for money and a self identity as a neo-thief. The language spoken by the Russian underground is heavy with Fenya, a sort of Russian thieves cant. The Russian cyber criminal underground style themselves as sort of cyber-Vory. This isn’t to say they are really mafia, but many do like to imagine they are. One of the core rules of the vory is to never do anything for the authorities. Now, I’m not suggesting these guys would actually follow the thieves code religiously. But they have no reason to meekly or voluntarily act as Russian government assets. Indeed, they’ve every reason to make performative shows of rejecting requests from the authorities.</p><h2>How keen the dogs?</h2><p>The groups will not do this spontaneously. There are several reasons, starting with—they want to make money. They are actually quite conservative about making money. They find something that works and do as much of it as they can. They don’t want to deviate and possible lose money (particularly to other ransomware groups!) And they do not want to give up their revenue flows for nationalism. So it is probably unreasonable to expect a significant spontaneous ransomware volunteer cyber militia anytime soon.</p><h2>How aware the master?</h2><p>Putin, and the Russian government in general, understand offensive cyber as a function of the security forces, particularly the intelligence services. Ransomware, they understand as (1) a means of getting kompromat on political rivals (in the style of “hack my girlfriend’s Facebook”), (2) a source of income, in particular for the FSB (which is very important in its own way but a topic for another time), and (3) something the West hates and is therefore a bargaining chip to be used in future diplomatic negotiations. Critically, they do not perceive the ransomware gangs as a strategic cyber asset that can be used within a larger grand strategy.</p><p>Their blind spot is by no means unusual, as far as I know there are no political leaders who perceive ransomware as a strategic capability. There is maybe a vague sense of “they could do more Colonial Pipeline attacks!” but no real concern that ransomware could be used to disable choke points in the global supply chain, introduce considerable friction into standard of living, or disrupt critical systems necessary for civil society to function.</p><p>Ransomware is not understood as the potential power it is. Consequently, there is a conceptual brake on them being unleashed on the world to raid and cause damage as part of Putin’s strategy.</p><p>The cyber war is rapidly evolving, of course, and it is unclear what role ransomware gangs will play. But for now at least, it seems that maybe we have misunderstood the situation.</p><p>Of course, Russia’s use of ransomware gangs could change in an instant, for example if someone drafts a proposal and gets it approved. But it is important to avoid mirror imaging. We know that ransomware is an important strategic capability. That doesn’t mean the Russians do.</p><div class="cb_p6_patreon_button c4"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity%5Bemail%5D&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIyXC8wNFwvMTRcL3B1dGlucy1jeWJlci1ibGluZC1zcG90XC8ifQ%3D%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2022%2F04%2F14%2Fputins-cyber-blind-spot%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button"><img class="c3" src="https://i0.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></a></div>]]></description>
      <link>https://gru.gq/2022/04/14/putins-cyber-blind-spot/</link>
      <guid>https://gru.gq/2022/04/14/putins-cyber-blind-spot/</guid>
      <pubDate>Thu, 14 Apr 2022 12:59:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[French election thoughts]]></title>
      <description><![CDATA[<p>I’ve had time only to make a brief outline of my thoughts on a Russia intervention in the French election. I think it is more likely than not.</p><p>I apologise for the extremely sparse nature of this post. I want to get something posted and simply don’t have the time to arrange my thoughts and write a longer piece.</p><ol><li>Macron v Le Pen</li>
<li>Russia does not want macron</li>
<li>Russia has back le pen before</li>
<li>Will Russia interfere in the election?
<ol><li>More likely than not</li>
</ol></li>
<li>Pros:
<ol><li>If they were going, to then preparations started long ago</li>
<li>Those preparations have been interrupted by the war, but still.. this is not a last minute thing</li>
<li>Last time they had only a few short months to work with. This time they had years.
<ol><li>Ukraine is an example of how they can rapidly exploit access they’ve developed over years.</li>
</ol></li>
<li>The resource requirement is not that expensive, so maybe run ops because they’re almost cost free and any payoff is massively useful.</li>
<li>This time Le pen has a serious chance to win
<ol><li>That would be an incalculable benefit to Putin. Le pen is:
<ol><li>Against war in Ukraine,</li>
<li>Pro Russia</li>
<li>Not strong on NATO
<ol><li>Combined with Germany waffling, that would make France/Germany lukewarm on helping Ukraine.</li>
</ol></li>
</ol></li>
</ol></li>
<li>The struggle is between democracy and authoritarianism. Putin and Le pen are authoritarians.</li>
<li>Theoretically, it would just be normal infowar, nothing special or exceptional… and no matter what Putin still has nukes. Plus. Russia can’t really get much more sanctioned.</li>
</ol></li>
<li>Cons:
<ol><li>Resource costs, but</li>
<li>Distraction in the middle of a war that really could use more TLC</li>
<li>Escalatory</li>
<li>Unknown what it would actually do to improve the odds of le Pen.</li>
</ol></li>
</ol>]]></description>
      <link>https://grudotgq.wpcomstaging.com/2022/04/13/french-election-thoughts/</link>
      <guid>https://grudotgq.wpcomstaging.com/2022/04/13/french-election-thoughts/</guid>
      <pubDate>Tue, 12 Apr 2022 22:07:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[French election thoughts]]></title>
      <description><![CDATA[<p>I’ve had time only to make a brief outline of my thoughts on a Russia intervention in the French election. I think it is more likely than not.</p><p>I apologise for the extremely sparse nature of this post. I want to get something posted and simply don’t have the time to arrange my thoughts and write a longer piece.</p><ol><li>Macron v Le Pen</li>
<li>Russia does not want macron</li>
<li>Russia has back le pen before</li>
<li>Will Russia interfere in the election?
<ol><li>More likely than not</li>
</ol></li>
<li>Pros:
<ol><li>If they were going, to then preparations started long ago</li>
<li>Those preparations have been interrupted by the war, but still.. this is not a last minute thing</li>
<li>Last time they had only a few short months to work with. This time they had years.
<ol><li>Ukraine is an example of how they can rapidly exploit access they’ve developed over years.</li>
</ol></li>
<li>The resource requirement is not that expensive, so maybe run ops because they’re almost cost free and any payoff is massively useful.</li>
<li>This time Le pen has a serious chance to win
<ol><li>That would be an incalculable benefit to Putin. Le pen is:
<ol><li>Against war in Ukraine,</li>
<li>Pro Russia</li>
<li>Not strong on NATO
<ol><li>Combined with Germany waffling, that would make France/Germany lukewarm on helping Ukraine.</li>
</ol></li>
</ol></li>
</ol></li>
<li>The struggle is between democracy and authoritarianism. Putin and Le pen are authoritarians.</li>
<li>Theoretically, it would just be normal infowar, nothing special or exceptional… and no matter what Putin still has nukes. Plus. Russia can’t really get much more sanctioned.</li>
</ol></li>
<li>Cons:
<ol><li>Resource costs, but</li>
<li>Distraction in the middle of a war that really could use more TLC</li>
<li>Escalatory</li>
<li>Unknown what it would actually do to improve the odds of le Pen.</li>
</ol></li>
</ol><div class="cb_p6_patreon_button c4"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity%5Bemail%5D&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIyXC8wNFwvMTNcL2ZyZW5jaC1lbGVjdGlvbi10aG91Z2h0c1wvIn0%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2022%2F04%2F13%2Ffrench-election-thoughts%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button"><img class="c3" src="https://i0.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></a></div>]]></description>
      <link>https://gru.gq/2022/04/13/french-election-thoughts/</link>
      <guid>https://gru.gq/2022/04/13/french-election-thoughts/</guid>
      <pubDate>Tue, 12 Apr 2022 22:07:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[I can’t believe its not cyberwar]]></title>
      <description><![CDATA[<h2>Russian cyber attack on UA electrical grid attack</h2><p>Latest update on the cyberwar that “is not taking place.”</p><p>Russia has been attacking the Ukrainian power grid, just like they were supposed to based on the preconceived models everyone had. So that’s good for the pundits, I guess. They can come out from under their rocks and get back in the policy and norms discussions again.</p><p>A threat actor linked to Sandworm attacked the Ukrainian energy sector no later than February 2022. This attack, based on how I read the report, established a foothold that was exploited later for a second wave attack.</p><p>At some time after March 23, 2022, the threat actor installed wipers across the entire network, multiple substations. These wipers were programmed to activate and destroy computers on April 8th.</p><p>The Ukrainian cyber defense forces, assisted by Microsoft and ESET, were able to disable the wipers before the launch date. The full report is linked below, along with the report connecting them to Sandworm.</p><p>These are the salient points, I believe.</p><ol><li>Russia is doing the cyberwar that was “supposed” to happen, but so far hasn’t. They are trying to replicate their attacks of 2016, only more destructive this time. They planned and prepared a coordinated shutdown of the electrical grid. This is exactly what everyone was expecting as an opening salvo.</li>
<li>It seems like planning for the electrical grid attack started after it became clear that the invasion plan had failed. This indicates that the reason the electrical grid was not part of the initial plan was a strategic decision, not because of Russian disregard for offensive cyber capacity.</li>
<li>The Ukrainian defenses are stronger than expected. In the cyber domain as well as the physical.</li>
</ol><p>The Russians targeted the power grid with cyber capabilities. Their attack failed due to swift coordinated remediation action by Ukrainian cyber defense forces.</p><pre>- This might indicate that the Russian initial access attack was known for some time. That the blue (and yellow) team was monitoring to see what would develop which allowed them to step in a prevent the destructive attack. - More likely is that the installation of the malware for the destructive attack was detected, leading to incident response. The analysis revealed what was going on and the defense forces took action to prevent the scheduled attack. </pre><p>Russian failure is likely due to a large delta between the installation of the malware and the date scheduled for the attack. This delta provided sufficient time for the defenders to coordinate and execute remediation action. After all these years the speed of cyber defense information dissemination must be very fast, having had plenty of time to be streamlined. Similarly, the ability to effectively remediate attacks is probably well developed. Again, from training and multiple opportunities to practice against real adversaries.</p><p>In a real sense, the Russians are trying to conduct a cyberwar and they are failing due to the ability of the Ukrainian defense forces. This mirrors the experience on the battlefield, where Ukrainian defense have exceeded expectations. It should not be surprising that the cyberwar is less impressive than many were expecting. The Russian offensive was less impressive than <em>everyone</em> was expecting.</p><h2>In other news</h2><p>Sandworm is linked to HermeticWiper and now this attempted attack on the electrical grid. It would appear that Sandworm is a key part of the Russian cyber order of battle.</p><pre>* CIP has linked UAC-0082 with HermeticWiper * CERT-UA linked Sandworm to UAC-0082 </pre><h3>Sources:</h3><p>ESET: <a href="https://www.welivesecurity.com/2022/04/12/industroyer2-industroyer-reloaded/" rel="nofollow">https://www.welivesecurity.com/2022/04/12/industroyer2-industroyer-reloaded/</a>CERT-UA: <a href="https://cert.gov.ua/article/39518" rel="nofollow">https://cert.gov.ua/article/39518</a>CIP-UA: <a href="https://cip.gov.ua/en/news/khto-stoyit-za-kiberatakami-na-ukrayinsku-kritichnu-informaciinu-infrastrukturu-statistika-15-22-bereznya" rel="nofollow">https://cip.gov.ua/en/news/khto-stoyit-za-kiberatakami-na-ukrayinsku-kritichnu-informaciinu-infrastrukturu-statistika-15-22-bereznya</a></p>]]></description>
      <link>https://grudotgq.wpcomstaging.com/2022/04/12/i-cant-believe-its-not-cyberwar/</link>
      <guid>https://grudotgq.wpcomstaging.com/2022/04/12/i-cant-believe-its-not-cyberwar/</guid>
      <pubDate>Tue, 12 Apr 2022 12:33:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[I can’t believe its not cyberwar]]></title>
      <description><![CDATA[<h2>Russian cyber attack on UA electrical grid attack</h2><p>Latest update on the cyberwar that “is not taking place.”</p><p>Russia has been attacking the Ukrainian power grid, just like they were supposed to based on the preconceived models everyone had. So that’s good for the pundits, I guess. They can come out from under their rocks and get back in the policy and norms discussions again.</p><p>A threat actor linked to Sandworm attacked the Ukrainian energy sector no later than February 2022. This attack, based on how I read the report, established a foothold that was exploited later for a second wave attack.</p><p>At some time after March 23, 2022, the threat actor installed wipers across the entire network, multiple substations. These wipers were programmed to activate and destroy computers on April 8th.</p><p>The Ukrainian cyber defense forces, assisted by Microsoft and ESET, were able to disable the wipers before the launch date. The full report is linked below, along with the report connecting them to Sandworm.</p><p>These are the salient points, I believe.</p><ol><li>Russia is doing the cyberwar that was “supposed” to happen, but so far hasn’t. They are trying to replicate their attacks of 2016, only more destructive this time. They planned and prepared a coordinated shutdown of the electrical grid. This is exactly what everyone was expecting as an opening salvo.</li>
<li>It seems like planning for the electrical grid attack started after it became clear that the invasion plan had failed. This indicates that the reason the electrical grid was not part of the initial plan was a strategic decision, not because of Russian disregard for offensive cyber capacity.</li>
<li>The Ukrainian defenses are stronger than expected. In the cyber domain as well as the physical.</li>
</ol><p>The Russians targeted the power grid with cyber capabilities. Their attack failed due to swift coordinated remediation action by Ukrainian cyber defense forces.</p><pre>- This might indicate that the Russian initial access attack was known for some time. That the blue (and yellow) team was monitoring to see what would develop which allowed them to step in a prevent the destructive attack. - More likely is that the installation of the malware for the destructive attack was detected, leading to incident response. The analysis revealed what was going on and the defense forces took action to prevent the scheduled attack. </pre><p>Russian failure is likely due to a large delta between the installation of the malware and the date scheduled for the attack. This delta provided sufficient time for the defenders to coordinate and execute remediation action. After all these years the speed of cyber defense information dissemination must be very fast, having had plenty of time to be streamlined. Similarly, the ability to effectively remediate attacks is probably well developed. Again, from training and multiple opportunities to practice against real adversaries.</p><p>In a real sense, the Russians are trying to conduct a cyberwar and they are failing due to the ability of the Ukrainian defense forces. This mirrors the experience on the battlefield, where Ukrainian defense have exceeded expectations. It should not be surprising that the cyberwar is less impressive than many were expecting. The Russian offensive was less impressive than <em>everyone</em> was expecting.</p><h2>In other news</h2><p>Sandworm is linked to HermeticWiper and now this attempted attack on the electrical grid. It would appear that Sandworm is a key part of the Russian cyber order of battle.</p><pre>* CIP has linked UAC-0082 with HermeticWiper * CERT-UA linked Sandworm to UAC-0082 </pre><h3>Sources:</h3><p>ESET: <a href="https://www.welivesecurity.com/2022/04/12/industroyer2-industroyer-reloaded/" rel="nofollow">https://www.welivesecurity.com/2022/04/12/industroyer2-industroyer-reloaded/</a><br />CERT-UA: <a href="https://cert.gov.ua/article/39518" rel="nofollow">https://cert.gov.ua/article/39518</a><br />CIP-UA: <a href="https://cip.gov.ua/en/news/khto-stoyit-za-kiberatakami-na-ukrayinsku-kritichnu-informaciinu-infrastrukturu-statistika-15-22-bereznya" rel="nofollow">https://cip.gov.ua/en/news/khto-stoyit-za-kiberatakami-na-ukrayinsku-kritichnu-informaciinu-infrastrukturu-statistika-15-22-bereznya</a></p><div class="cb_p6_patreon_button c4"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity%5Bemail%5D&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIyXC8wNFwvMTJcL2ktY2FudC1iZWxpZXZlLWl0cy1ub3QtY3liZXJ3YXJcLyJ9&amp;utm_source=https%3A%2F%2Fgru.gq%2F2022%2F04%2F12%2Fi-cant-believe-its-not-cyberwar%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button"><img class="c3" src="https://i0.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></a></div>]]></description>
      <link>https://gru.gq/2022/04/12/i-cant-believe-its-not-cyberwar/</link>
      <guid>https://gru.gq/2022/04/12/i-cant-believe-its-not-cyberwar/</guid>
      <pubDate>Tue, 12 Apr 2022 12:33:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[KGB Fail Belarus Rail, the tale.]]></title>
      <description><![CDATA[<p>On March 25th the Belarus railway system was sabotaged (again) as part of the ongoing campaign by partisans to hamper Putins war effort. These attacks have been ongoing since at least earlier this year, when the Cyber Partisans (BCP) hacked the railway’s network and began trashing it. First in a ransomware attack, and then in subsequent attacks by wiping critical hardware.</p><p>The attack on the 25th was not cyber, but physical. It was conducted by one of the partisan groups operating inside Belarus. What is particularly interesting about this action is that they used deception to send opposition security forces to the wrong location, clearing the way for a safer operation.</p><p>Details of the deception operation where posted in a Telegram chat, along with some pictures to illustrate the event.</p><p><img src="https://i0.wp.com/grudotgq.wpcomstaging.com/wp-content/uploads/2022/03/image_e078f77b-6eed-49a4-a0b5-46861033a874.jpeg?resize=2255%2C1157&amp;ssl=1" alt="" width="2255" height="1157" data-recalc-dims="1" /></p><blockquote>
<p>Let’s reveal some details of today’s night “accident”.</p>
<p>Last night, the State Security Committee of the Republic of Belarus had information about the upcoming “sabotage” at the Roshcha stop (Minsk-Sortirovochny – Pomysishche) stop.</p>
<p>As a result, forces were thrown there to protect the area.</p>
<p>But at this time, the guerillas were preparing to conduct a sabotage operation between the Berezina and Nemanitsa stops on the Novosady-Borisov stage, which was successfully carried out in the end.</p>
<p>(The photos are illustrative in nature, they were taken in winter).</p>
</blockquote><p>The original Telegram post about this action is available <a href="https://t.me/belzhd_live/1418">here</a>.</p><p>Safe operations are an important part of operational security. Clandestine resistance forces must balance security against action. Too much action and security suffers, leading to capture and no more actions. Too much security leads to paralysis, and no more actions. Deception can be a very effective solution.</p><p>The level of sophistication in arranging a deception operation, even one as simple as this, shows the professionalism of the partisan forces. They are thinking about not just how to conduct operations to maximum strategic effect, but how to ensure that operations are safe.</p>]]></description>
      <link>https://grudotgq.wpcomstaging.com/2022/03/29/kgb-fail-belarus-rail-the-tale/</link>
      <guid>https://grudotgq.wpcomstaging.com/2022/03/29/kgb-fail-belarus-rail-the-tale/</guid>
      <pubDate>Mon, 28 Mar 2022 21:12:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[KGB Fail Belarus Rail, the tale.]]></title>
      <description><![CDATA[<p>On March 25th the Belarus railway system was sabotaged (again) as part of the ongoing campaign by partisans to hamper Putins war effort. These attacks have been ongoing since at least earlier this year, when the Cyber Partisans (BCP) hacked the railway’s network and began trashing it. First in a ransomware attack, and then in subsequent attacks by wiping critical hardware.</p><p>The attack on the 25th was not cyber, but physical. It was conducted by one of the partisan groups operating inside Belarus. What is particularly interesting about this action is that they used deception to send opposition security forces to the wrong location, clearing the way for a safer operation.</p><p>Details of the deception operation where posted in a Telegram chat, along with some pictures to illustrate the event.</p><p><img src="https://i0.wp.com/gru.gq/wp-content/uploads/2022/03/image_e078f77b-6eed-49a4-a0b5-46861033a874.jpeg?resize=2255%2C1157&amp;ssl=1" alt="" width="2255" height="1157" data-recalc-dims="1" /></p><blockquote>
<p>Let’s reveal some details of today’s night “accident”.</p>
<p>Last night, the State Security Committee of the Republic of Belarus had information about the upcoming “sabotage” at the Roshcha stop (Minsk-Sortirovochny – Pomysishche) stop.</p>
<p>As a result, forces were thrown there to protect the area.</p>
<p>But at this time, the guerillas were preparing to conduct a sabotage operation between the Berezina and Nemanitsa stops on the Novosady-Borisov stage, which was successfully carried out in the end.</p>
<p>(The photos are illustrative in nature, they were taken in winter).</p>
</blockquote><p>The original Telegram post about this action is available <a href="https://t.me/belzhd_live/1418">here</a>.</p><p>Safe operations are an important part of operational security. Clandestine resistance forces must balance security against action. Too much action and security suffers, leading to capture and no more actions. Too much security leads to paralysis, and no more actions. Deception can be a very effective solution.</p><p>The level of sophistication in arranging a deception operation, even one as simple as this, shows the professionalism of the partisan forces. They are thinking about not just how to conduct operations to maximum strategic effect, but how to ensure that operations are safe.</p><div class="cb_p6_patreon_button c4"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity%5Bemail%5D&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIyXC8wM1wvMjlcL2tnYi1mYWlsLWJlbGFydXMtcmFpbC10aGUtdGFsZVwvIn0%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2022%2F03%2F29%2Fkgb-fail-belarus-rail-the-tale%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button"><img class="c3" src="https://i0.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></a></div>]]></description>
      <link>https://gru.gq/2022/03/29/kgb-fail-belarus-rail-the-tale/</link>
      <guid>https://gru.gq/2022/03/29/kgb-fail-belarus-rail-the-tale/</guid>
      <pubDate>Mon, 28 Mar 2022 21:12:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[Cyber in the raw]]></title>
      <description><![CDATA[<p>Russia’s opening cyber salvo was clearly tied to their war planning. They seem to have used wipers to go after gov, mil and comms systems to degrade Ukraine’s defense capacity. And <a href="https://www.spiegel.de/netzwelt/web/viasat-satellitennetzwerk-offenbar-gezielt-in-osteuropa-gehackt-a-afd98117-5c32-4946-ab8a-619f1e7af024">the attack on KA-SAT</a> was related to Ukrainian military capacity as well.</p><p>These sorts of attacks are very much in line with the traditional model of cyberwar. They were targeted, tactical strikes with immediate effect and exploitation. Ukraine’s cyber response has been …full spectrum. The most obvious is the call for a global civilian hacker army.</p><p>Ukraine’s most interesting cyber response has been their dominance of the information space. People keep denigrating it as “that’s just because the West is sympathetic” but that is a very shallow dismissive analysis. Ukraine is very savvy with their info ops.</p><p>Ukraine creates complex narratives that resonate with their target audiences. Internally their messaging is very very different from what they share with western audiences. They’ve managed to thread the needle: the underdog who could lose if our support falters.</p><p>Russia has failed in the information domain. They were unprepared for a war that didn’t have a swift conclusion. Now their available info op resources are greatly reduced and under stress to manage domestic and external messaging.</p><p>Russia has regrouped on the information warfare front and launched attacks using their usual “firehose of bullshit” strategy. There are at least three false narratives that Russia is promoting. These are:</p><ol><li>False claims that Ukraine wanted to create a nuke/dirty bomb. (Impossible to achieve because Ukraine’s reactors are the wrong kind.)</li>
<li>False claims that the US was assisting Ukraine in developing a nuclear weapon. (This is baffling.)</li>
<li>False claims of a Ukrainian bio weapons lab. (Bio weapons are a common theme in Russian disinformation.)</li>
</ol><p>Outside of the information domain, cyber has been sparse on the ground. Ukraine called for a hacker army. Who knows what they’re doing? Anonymous has been claiming the moon and delivering tuppence. That could change though, since cyber is nothing if not surprising.</p><p>Russia has their ransomware auxiliaries waiting on stand by. If/when Russia calls on their auxiliary cyber forces to go “make Europe howl” things will get interesting.</p><p>Russia has a lot of options to cause extreme pain in the West using vectors that don’t rise to the level of direct attack. Of course, what constitutes a direct attack is a political decision, not a technical issue. When will Russia cry havoc and let slip the dogs of cyberwar?</p><p>At least there is now a national intelligence agency that is keen to take the fight to the enemy. Australia will be doing their “that’s not an exploit… this is an exploit” routine on the ransomware scene, and it will be hilarious.</p><p>However, to come back to my main point. None of this activity, beyond the opening salvo, looks like traditional cyberwar. This is criminals, disinformation, TikTok and Twitter, but no critical national infrastructure attacks. No electrical grids committing cyber Pearl Harbor at all!</p><p>The traditional model of cyberwar has failed as a predictive, descriptive, and analytic framework. In it, cyberwar exists only to emulate kinetic war capabilities. The sheer cost of developing such capabilities makes them unattractive. Cyber does not conform to the traditional model, indeed it is inherently nonconformist.</p><p>The only rule in cyber is that you don’t play the same way twice.</p>]]></description>
      <link>https://grudotgq.wpcomstaging.com/2022/03/07/cyber-in-the-raw/</link>
      <guid>https://grudotgq.wpcomstaging.com/2022/03/07/cyber-in-the-raw/</guid>
      <pubDate>Mon, 07 Mar 2022 15:35:00 +0100</pubDate>
    </item>
    <item>
      <title><![CDATA[Cyber in the raw]]></title>
      <description><![CDATA[<p>Russia’s opening cyber salvo was clearly tied to their war planning. They seem to have used wipers to go after gov, mil and comms systems to degrade Ukraine’s defense capacity. And <a href="https://www.spiegel.de/netzwelt/web/viasat-satellitennetzwerk-offenbar-gezielt-in-osteuropa-gehackt-a-afd98117-5c32-4946-ab8a-619f1e7af024">the attack on KA-SAT</a> was related to Ukrainian military capacity as well.</p><p>These sorts of attacks are very much in line with the traditional model of cyberwar. They were targeted, tactical strikes with immediate effect and exploitation. Ukraine’s cyber response has been …full spectrum. The most obvious is the call for a global civilian hacker army.</p><p>Ukraine’s most interesting cyber response has been their dominance of the information space. People keep denigrating it as “that’s just because the West is sympathetic” but that is a very shallow dismissive analysis. Ukraine is very savvy with their info ops.</p><p>Ukraine creates complex narratives that resonate with their target audiences. Internally their messaging is very very different from what they share with western audiences. They’ve managed to thread the needle: the underdog who could lose if our support falters.</p><p>Russia has failed in the information domain. They were unprepared for a war that didn’t have a swift conclusion. Now their available info op resources are greatly reduced and under stress to manage domestic and external messaging.</p><p>Russia has regrouped on the information warfare front and launched attacks using their usual “firehose of bullshit” strategy. There are at least three false narratives that Russia is promoting. These are:</p><ol><li>False claims that Ukraine wanted to create a nuke/dirty bomb. (Impossible to achieve because Ukraine’s reactors are the wrong kind.)</li>
<li>False claims that the US was assisting Ukraine in developing a nuclear weapon. (This is baffling.)</li>
<li>False claims of a Ukrainian bio weapons lab. (Bio weapons are a common theme in Russian disinformation.)</li>
</ol><p>Outside of the information domain, cyber has been sparse on the ground. Ukraine called for a hacker army. Who knows what they’re doing? Anonymous has been claiming the moon and delivering tuppence. That could change though, since cyber is nothing if not surprising.</p><p>Russia has their ransomware auxiliaries waiting on stand by. If/when Russia calls on their auxiliary cyber forces to go “make Europe howl” things will get interesting.</p><p>Russia has a lot of options to cause extreme pain in the West using vectors that don’t rise to the level of direct attack. Of course, what constitutes a direct attack is a political decision, not a technical issue. When will Russia cry havoc and let slip the dogs of cyberwar?</p><p>At least there is now a national intelligence agency that is keen to take the fight to the enemy. Australia will be doing their “that’s not an exploit… this is an exploit” routine on the ransomware scene, and it will be hilarious.</p><p>However, to come back to my main point. None of this activity, beyond the opening salvo, looks like traditional cyberwar. This is criminals, disinformation, TikTok and Twitter, but no critical national infrastructure attacks. No electrical grids committing cyber Pearl Harbor at all!</p><p>The traditional model of cyberwar has failed as a predictive, descriptive, and analytic framework. In it, cyberwar exists only to emulate kinetic war capabilities. The sheer cost of developing such capabilities makes them unattractive. Cyber does not conform to the traditional model, indeed it is inherently nonconformist.</p><p>The only rule in cyber is that you don’t play the same way twice.</p><div class="cb_p6_patreon_button c4"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity%5Bemail%5D&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIyXC8wM1wvMDdcL2N5YmVyLWluLXRoZS1yYXdcLyJ9&amp;utm_source=https%3A%2F%2Fgru.gq%2F2022%2F03%2F07%2Fcyber-in-the-raw%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button"><img class="c3" src="https://i0.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></a></div>]]></description>
      <link>https://gru.gq/2022/03/07/cyber-in-the-raw/</link>
      <guid>https://gru.gq/2022/03/07/cyber-in-the-raw/</guid>
      <pubDate>Mon, 07 Mar 2022 15:35:00 +0100</pubDate>
    </item>
    <item>
      <title><![CDATA[Pharaoh is a total ass]]></title>
      <description><![CDATA[<p>This is extremely off topic, but I feel I have to put it somewhere. Besides cyber, war history, war studies, and fonts, one of my interests is Bronze Age history (also pre-history, but thats for later.)</p><p>I was reading about some correspondence between Pharaoh and the Hittite king Hattusili. There is this kinda famous exchange where Hattusili is asking for help. A royal princess, Matanazi, wants to conceive and has had no luck, so Hattusili asks pharaoh for Egyptian medicine. And, wow, what a reply!</p><blockquote class="wp-block-quote">
<p>Thus to [my] br[other: (Concerning) what my brother] has written [to] m[e] regarding his [sist]er Mata[n]az[i]: ‘May my brother send to me a man to prepare a medicine so that she may bear children.’ So has my brother written. And so (I say) to my brother: See Matanazi the sister of my brother, the king, your brother knows her. A fifty-year-old!! Never! Look, a woman of fifty is old, to say nothing of a sixty-year-old! One can’t produce medicine to enable her to bear children! Well, the Sun God and the Weather God may give a command and the order which they give will then be carried out continually for the sister of my brother. And I, the king your brother, will send a competent incantation-priest and a competent doctor to assist her to produce children.</p>
<div><cite>Bryce, Trevor R. (1998). How old was Matanazi?. The Journal of Egyptian Archaeology 84 212-215. <a rel="noreferrer noopener" class="citationDoiLink jss347" href="https://doi.org/10.2307/3822219" target="_blank">https://doi.org/10.2307/3822219</a></cite></div></blockquote><p>Based on what records we have, Pharaoh was pretty much correct about her age. She was at least 58, and very possibly older. I just love how rude he is about the whole thing.</p><div class="cb_p6_patreon_button c4"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity%5Bemail%5D&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIyXC8wMVwvMjdcL3BoYXJhb2gtaXMtYS10b3RhbC1hc3NcLyJ9&amp;utm_source=https%3A%2F%2Fgru.gq%2F2022%2F01%2F27%2Fpharaoh-is-a-total-ass%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button"><img class="c3" src="https://i0.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></a></div>]]></description>
      <link>https://gru.gq/2022/01/27/pharaoh-is-a-total-ass/</link>
      <guid>https://gru.gq/2022/01/27/pharaoh-is-a-total-ass/</guid>
      <pubDate>Wed, 26 Jan 2022 21:52:00 +0100</pubDate>
    </item>
    <item>
      <title><![CDATA[Ukraine my heart, cyber just for show?]]></title>
      <description><![CDATA[<p>The multiple coordinated attacks on Ukrainian government cyber infrastructure is a very interesting development in the field of cyber warfare. This may be the first public example of multiple types of attacks, not directly linked via the same penetration, being used in coordination to attempt an effects based operation.</p><p>The website defacements were used to message the Ukrainian population in a sort of cyber mimicry of the old strategic “terror bombing” theory. Collective punishment of a civilian population in order to apply political pressure against their leaders.</p><p>Historically, this type of pressure has only worked when the country is engaged in a limited war. When that is the case, the population does not accept the costs of the violence as an acceptable price for the war effort. In an existential or total war, the opposite happens — the population draws together against a common enemy. [Mack 1975]</p><p>Will cyber terrorism based on releasing PII work as a coercive measure against a population? Clearly it is well below the threshold of physical violence, death and destruction. But, importantly, it does have some negative impact on the victims. It is not without some capacity to coerce people.</p><p>Moving to analysis of the operation itself, it seems to me that the attackers failed in their coordination and that seriously impacted the operation. <a href="https://therecord.media/hackers-deface-ukrainian-government-websites/">The website defacements were known locally on January 13th, and internationally on the 14th</a>. <a href="https://www.theregister.com/2022/01/14/ukraine_cyberattack_gov_websites_defaced/">There was a day of ridicule</a> because, quite frankly, a website defacement does not demonstrate a credible cyber operation capacity.</p><p>Early reports from Ukraine emphasised that the attack’s warning about releasing data was an empty threat as no data was accessed. This analysis is completely in line with the impact and effects of a website defacement. Typically, there just isn’t anything to steal on a web server or CRM system.</p><p>It was not until <a href="https://www.microsoft.com/security/blog/2022/01/15/destructive-malware-targeting-ukrainian-organizations/">January 15th that it became apparent that the defacements were not isolated incidents</a>. Multiple systems and networks were also attacked with a datawiper malware that masquerades as ransomware. This has a superficial resemblance to NotPetya, but critically the malware is not part of an autonomous system. These attacks appear to have been manually installed, like typical ransomware.</p><p>It is too early to know what else happened during the malware incident. What is clear, though, is that there was not a data dump associated with the website defacement messages. The operation was less effective because the messaging was not linked to an action.</p><p>The failure to follow through on the threat detracted from the website defacement as a messaging channel. Defacements are common so there is no indication that <em>this</em> defacement is genuinely state sponsored, rather than a “patriotic hacker.” The sophistication level is too low to function as a signal of authenticity.</p><p>The most interesting feature of cyber warfare this attack demonstrates is the use of multiple types of attack (website defacement, data destruction, data leaks?, etc.) combined into a single operation. This is a superficial sort of “combined arms operation” where different weapon systems are used in combination to achieve an effect.</p><p>There is a lot of analysis to be done about the use of cyber to coerce a population as a means of indirectly applying political pressure. That will have to wait for another post.</p><p>The takeaway for this incident is that websites defacements are simply tactical options that a state sponsored threat actor can choose for an operation.</p><p>This doesn’t mean website defacements are now state level hacking. What it does mean is that state sponsored hacking can <strong>meaningfully</strong> include website defacements.</p><p>__<br />Mack, Andrew. “Why Big Nations Lose Small Wars: The Politics of Asymmetric Conflict.” World Politics 27, no. 2 (1975): 175–200. <a href="https://doi.org/10.2307/2009880" rel="nofollow">https://doi.org/10.2307/2009880</a>.</p><div class="cb_p6_patreon_button c4"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity%5Bemail%5D&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIyXC8wMVwvMTZcL3VrcmFpbmUtbXktaGVhcnQtY3liZXItanVzdC1mb3Itc2hvd1wvIn0%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2022%2F01%2F16%2Fukraine-my-heart-cyber-just-for-show%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button"><img class="c3" src="https://i0.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></a></div>]]></description>
      <link>https://gru.gq/2022/01/16/ukraine-my-heart-cyber-just-for-show/</link>
      <guid>https://gru.gq/2022/01/16/ukraine-my-heart-cyber-just-for-show/</guid>
      <pubDate>Sun, 16 Jan 2022 15:58:00 +0100</pubDate>
    </item>
    <item>
      <title><![CDATA[cyber is what threat actors make of it]]></title>
      <description><![CDATA[<p>Currently I’m reading “War from the ground up” which is about a lot of things, but one concept is that war is not a universal interpretive device on its own, rather a culturally constructed one. So basic concepts of war, such is “how long is a battle?” Or “what is honourable behaviour?” Are not things that we can agree on across cultural divides.</p><p>This is most obvious in how the Taliban fought the US in Afghanistan. It was not just an asymmetric war in how it was fought, in fact it was asymmetric from a cross-cultural mismatch to begin with. It was waged in-line with how each side perceived the conflict.</p><p>For example, the US might designate a hill as being a Taliban strong hold, then spend a few days clearing the hill of Taliban. Maybe they kill 100 fighters, and take only 1 dead and a dozen wounded. For the US this is a successful battle where they killed 100 Taliban for very few American casualties. Now, for the Taliban, this is a victorious battle where they successfully killed and wounded Americans and in the end they keep the hill when the Americans leave. Both sides experienced the same event, but they understood it completely differently because they aren’t fighting the same “war”.</p><p>And for a civilian caught in the fighting, who also experienced the same event, it wouldn’t even be perceived as a battle. It would be a calamity which destroyed their property and threaten them and their loved ones.</p><p>How is this relevant to cyber? Well, it is extremely relevant. Let’s talk about language and out ontological model of the world. In English we have the term “cyberspace,” which is used in American and British doctrinal writings about cyber. It is used by lay people and practitioners. It is not, importantly, a term used in Russian or Chinese cyber doctrine.</p><p>We have a problem with our understanding of cyber and it begins with cyberspace. It is literally in the word — cyberspace. The word itself gives the impression of cyber being a “space”, somewhere that is somewhere (see: all the legal discussions about cyber and sovereignty). It gives us the misconception that cyber is an area which we can manoeuvre within and around. That we start somewhere and end up somewhere. That you can go from A to B in cyber.</p><p>The very term cyberspace creates a distorted understanding of what is actually happening, making us think it must be happening <em>somewhere</em>.</p><p>But we know this is false. Cyber is not a space. There is no there, there.</p><p>This is recognised in a way by the Russians and Chinese who talk about the “information sphere” rather than “cyberspace.” To them, computers are information systems. To the West, computers are a location where the cyber resides. This is a profound difference of understanding that has led to strategic surprise when it turned out that their understanding is more valid than ours.</p><blockquote>
<p>A change of perspective is worth 10 IQ points.</p>
</blockquote><p>The 2016 US election and Brexit campaigns must be understood within this strategic context. The Russian understanding of cyber conflict includes using information to manipulate a target population. They don’t think of this as a siloed activity, they understand that it is part of the information sphere. But, of course, where exactly is a Facebook post in cyberspace? That isn’t even a sensical question to ask.</p><p>Here is how we see that cultural perspectives construct our understanding of cyber conflict. It is not an objective material object, but a mutually constructed idea that we create though our discourse.</p><p>And <em>our</em> discourse is not the same as <em>their</em> discourse. This is how you lose the cyberwar.</p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity%5Bemail%5D&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIxXC8xMVwvMTlcL2N5YmVyLWlzLXdoYXQtdGhyZWF0LWFjdG9ycy1tYWtlLW9mLWl0XC8ifQ%3D%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2021%2F11%2F19%2Fcyber-is-what-threat-actors-make-of-it%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button"><img class="c2" src="https://i2.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></a></div>]]></description>
      <link>https://gru.gq/2021/11/19/cyber-is-what-threat-actors-make-of-it/</link>
      <guid>https://gru.gq/2021/11/19/cyber-is-what-threat-actors-make-of-it/</guid>
      <pubDate>Thu, 18 Nov 2021 18:30:00 +0100</pubDate>
    </item>
    <item>
      <title><![CDATA[Iran’s Lame Cyber Aspirations Revealed]]></title>
      <description><![CDATA[<p>A brief discussion of this report from Sky News on some Iranian cyber research reports. <a href="https://news.sky.com/story/irans-secret-cyber-files-on-how-cargo-ships-and-petrol-stations-could-be-attacked-12364871" rel="nofollow">https://news.sky.com/story/irans-secret-cyber-files-on-how-cargo-ships-and-petrol-stations-could-be-attacked-12364871</a></p><p>This reports are clearly first stage fact-finding and brainstorming, the very earliest stage of capability development. They reveal only initial cursory preliminary analysis of potential vulnerabilities to exploit for cyber effects operations. Comprehensive actual hands-on testing of the target devices is necessary for real vulnerability research reports.</p><p>There are a number of things that stand out in this report that make me think this is not a particularly impressive cyber team. The main issue is that the research appears to be open source document analysis, without either domain expert interviews or hardware analysis.</p><p>The conclusions that are drawn depart from reality, speculating on what <em>could</em> be possible. For example they think they <em>could</em> sink a ship by manipulating it’s water ballast. However they do not actually test or discuss with experts whether a ship could be sunk via this route.</p><p>The line “damage to this system could cause the ship to sink” sounds like a warning from a manual that wants to emphasise the importance of a system. It does not sound like blueprint for cyber effects operations against naval targets.</p><p>When the journalist follows up a report suggesting that the gas station can be made to explode by manipulating the gasoline system the company states that redundant failsafes in place would prevent an explosion. This assertion is exactly what would need to be researched. What are these failsafes? How common are they? Can they be bypassed? Can they be defeated? What needs to happen to cause an explosion? Is there a path to that system state that can be achieved via cyber means?</p><p>These are systems that are undoubtably vulnerable to cyber attacks. However it does not follow that effect based operations are possible. This research Hass to be done with real systems. A literature review is the starting point for an actual contest and analysis of these systems.</p><p>If these reports are final they reveal a poor understanding of how to develop a cyber effects capability. If they are preliminary reports proposals for further research then their imagination is small and their vision is lacking.</p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity%5Bemail%5D&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIxXC8wN1wvMjhcL2lyYW5zLWxhbWUtY3liZXItYXNwaXJhdGlvbnMtcmV2ZWFsZWRcLyJ9&amp;utm_source=https%3A%2F%2Fgru.gq%2F2021%2F07%2F28%2Firans-lame-cyber-aspirations-revealed%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button"><img class="c2" src="https://i2.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></a></div>]]></description>
      <link>https://gru.gq/2021/07/28/irans-lame-cyber-aspirations-revealed/</link>
      <guid>https://gru.gq/2021/07/28/irans-lame-cyber-aspirations-revealed/</guid>
      <pubDate>Wed, 28 Jul 2021 13:23:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[Regarding the Kaseya Attack, Some Answers]]></title>
      <description><![CDATA[<p>Another spectacular raid by Russian ransom where gangs prompted a series of interesting questions by Catalin. I thought it would be worthwhile to address them.</p><p>Here is the thread with the questions. I have inlined them below with my responses.</p><blockquote>
<p>How did REvil learn of the VSA exploit?<br />Did they have access to Kaseya’s vulnerability disclosure systems?<br />Where they provided the exploit by a 3rd-party?<br />Was that 3rd-party an RU intelligence agency or exploit broker?</p>
</blockquote><p>Firstly, how did Revel learn about the VSA exploit? This zero day vulnerability was in the process of being patched. The <a href="https://csirt.divd.nl/2021/07/04/Kaseya-Case-Update-2/">coordinated vulnerability disclosure process</a> was being shepherded by Wietse Boonstra, the research at the Dutch Institute for Vulnerability Disclosure who discovered it. So how did it come to be used by a ransomware gang?</p><p>There are a lot of interesting possibilities, but given how little we know it’s all pure speculation. Here are some of mine: it could be anything from a duplicate discovery, or a compromised researcher, or using already existing access to Kaseya to read the vulnerability reports.</p><p>Catalin wants to know whether REvil got the exploit from a third-party. I would like to know as well. Obviously, it’s an open question that cannot be answered immediately. We simply don’t have enough information at this point. It is not clear if we ever will know.</p><p>Catalin goes further though, raising the question of whether REvil were given the exploit by a third-party that happens to be a Russian intelligence agency, or whether it was sold by an exploit broker. At a guess, I don’t believe it was either. Outside of the existing Russian exploit marketplaces there are no brokers who, I believe, would do business with REvil. You might wonder how a broker would know they were doing business with REvil? Well, for a start I don’t think anyone legitimate would sell to Russia simply because the most likely clients are the government or cyber criminals. Neither of those is acceptable. A broker who wishes to do business in the West (where the most money is) has to keep clear of “directly aiding the opposition.” If they don’t remain sufficiently clean, Western clients will cease doing business with them. Selling anything to Russia would be sufficiently dirty that the broker would be untouchable by Western clients. Effectively, they’d be out of business.</p><p>Therefore, at a minimum I don’t believe that there are a lot of brokers who actively work with Russians or Ukrainians Belarusians etc. if the exploit was purchased — which is entirely possible — I suspect it was sourced from a Russian exploit seller representing a Russian exploit developer.</p><p>Similarly I don’t believe an intelligence agency provided the exploits to the ransomware gang. There is no mechanism, that I am aware of, which allows the intelligence agencies to task and supply a criminal gang for a commercial criminal enterprise. If this happened it would be a side project not an official state sanctioned operation. If it was a side project, then it has gotten way out of hand and there will likely be repercussions. Intelligence agencies don’t like their exploits burned by criminals. It would also be a massive departure from normal behavior for Russia to do this operation.</p><blockquote>
<p>Was the timing of the attack on the July 4 weekend a decision made for political reasons or was it REvil’s typical modus operandi to hit over big western holiday breaks (which they have done many times before)?</p>
</blockquote><p>Let’s look at the timing. The attack started on Friday July 2nd, more commonly known as “the Fourth of July weekend.” A significant number of victims are in countries that don’t have a holiday on the 4th of July. To me it seems unlikely that the Fourth of July was a primary motivator for the attack. I have a hard time seeing this attack being a political statement or similar. The Fourth of July is more likely to be a convenient date than the focus of the attack.</p><p>If we look at the timing further we see for example that the VSA exploit was being patched. That means there’s a time limit, a deadline looming for the attackers. This is more likely to be the driver for a particular timeframe than political motivation for a symbolic attack. As Catalina himself points out, the modus operandi of REvil is to conduct attacks on big Western holiday weekends.</p><blockquote>
<p>Why are they asking a payment for an universal decrypter?<br />Did they realize that negotiating ransoms with thousands of companies at the same time is not worth the effort?</p>
</blockquote><p>The next issue that he raises is an interesting one about why they are negotiating for a universal decryptor rather than individually with each victim. Clearly one wholesale ransom is less profitable than retail ransoms with each individual victim. However the scale of the attack is prohibitive to doing individual retail level negotiations in a timely fashion.</p><p>There is simply no way to scale up 1000 victims with REvil’s existing victim management process. Their portfolio management infrastructure is simply insufficient to handle this sort of load. We can say this because no one has developed good portfolio management software and no one has successfully managed 1000 victims in one week.</p><p>Bear in mind that this attack will have been conducted by the core REvil team, a finite number of people. Alternatively, it was the work of an affiliate, which is an even smaller finite number of people. With only a small number of principals involved they would have to bring in temps to manually manage all the victims that they need to process.</p><p><em>“Hello, this is Alexei, how may I assist you today? Paying ransom or asking more time? Please confirm 24 digit identification number, I am looking account.”</em></p><p>From a purely economic point of view it is far simpler to make one single retail sale and collect a nice big payment and call it a day. Practically, it’s unlikely that they can effectively manage half of the victims they currently have. Even if they did retail level victim processing they would still have another problem: too much money in a dangerous part of the world.</p><p>REvil are definitely paying protection money to a “roof” who allows them to operate safely. This protection money becomes insufficient when REvil has $500 million US dollars on hand. Their roof could easily decide that it is simply easier to take all the money and terminate the relationship. This is an inherent problem with paying for protection.</p><blockquote>
<p>Will that universal decrytper even work, or are companies going to encounter bugs with large files?</p>
</blockquote><p>He has some follow-up questions regarding whether the encryptor will work. Although it may fail to work for technical reasons I don’t believe REvil would renege on their agreement. Ransomware is, to some degree, a trust-based business. Without trust that the criminal gang will honor their side of the deal there is no point in paying them.</p><blockquote>
<p>Why would REvil pull such a brash attack right after the Colonial and JBS attacks and the political mess/fallouts from those incidents?</p>
</blockquote><p>Now we turn to the political environment in which this attack takes place. Why would “REvil do something like this after the political fallout from the Colonial and JBS attacks?” This begs the question: was there political fallout felt by the ransomware gangs? Was there blowback inside Russia for Colonial and JBS? I don’t believe there was. My point is that financially motivated attackers are motivated by money. They will try to make money. There is no reason for them to cease operating just because someone on the other side of the world is upset. That is literally the core of their business. Unless they directly feel pain then they will continue to try to make money.</p><blockquote>
<p>Wouldn’t this attack confirm that REvil had some sort of approval from a RU agency before doing something this destructive?</p>
</blockquote><p>Although it appears that there is overt official sanction for ransomware gangs to operate, that is not the case. Rather the protection money that they pay to local security forces effectively ensures that they are safe from local prosecution. This creates a de facto situation where ransomware gangs are operating with a license. This license is closer to a letter of marque and privateering than anything proposed by Western pundits. This, though, is a discussion for another post.</p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity%5Bemail%5D&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIxXC8wN1wvMDVcL3JlZ2FyZGluZy10aGUta2FzZXlhLWF0dGFjay1zb21lLWFuc3dlcnNcLyJ9&amp;utm_source=https%3A%2F%2Fgru.gq%2F2021%2F07%2F05%2Fregarding-the-kaseya-attack-some-answers%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button"><img class="c2" src="https://i2.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></a></div>]]></description>
      <link>https://gru.gq/2021/07/05/regarding-the-kaseya-attack-some-answers/</link>
      <guid>https://gru.gq/2021/07/05/regarding-the-kaseya-attack-some-answers/</guid>
      <pubDate>Mon, 05 Jul 2021 18:36:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[Not all exploits are “grey in the dark”]]></title>
      <description><![CDATA[<p>Capabilities are not interchangeable, nor are they all equal. This seems obvious, and yet not everyone agrees (apparently).</p><p>In <a href="https://krebsonsecurity.com/2021/06/microsoft-patches-six-zero-day-security-holes/">this article about the six 0day exploits patched on June 7 2001</a>, we have the following line:</p><blockquote>
<p><strong>Kevin Breen</strong>, director of cyber threat research at <strong>Immersive Labs</strong>, said elevation of privilege flaws are just as valuable to attackers as remote code execution bugs</p>
</blockquote><p>This isn’t a direct quote, so I’ll assume that Khun BREEN said something less wrong. Because the fact of the matter is, that local privilege escalation (LPE) vulnerabilities (and the resulting capabilities) are more numerous than remote code execution (RCE) vulnerabilities for a given system. As a general rule of thumb this is true, although there are doubtless exceptions.</p><p>Even the list of vulnerabilities in this Microsoft patch show that the ration of RCE to LPE is unequal. There is only one (1) RCE to four (4) LPEs.</p><p>– <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-33742">CVE-2021-33742</a> , a remote code execution bug in a Windows HTML component.<br />– <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31955">CVE-2021-31955</a> , an information disclosure bug in the Windows Kernel<br />– <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31956">CVE-2021-31956</a> , an elevation of privilege flaw in Windows NTFS<br />– <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-33739">CVE-2021-33739</a> , an elevation of privilege flaw in the Microsoft Desktop Window Manager<br />– <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31201">CVE-2021-31201</a> , an elevation of privilege flaw in the Microsoft Enhanced Cryptographic Provider<br />– <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31199">CVE-2021-31199</a> , an elevation of privilege flaw in the Microsoft Enhanced Cryptographic Provider</p><p>Although the ratio of 1:4 (RCE:LPE) is probably not the true ratio, it doesn’t <em>feel</em> wrong. Just as the value of gold is generally higher than silver, yet both are precious metals, so to is RCE more valuable than an LPE. All things being equal, of course.</p><p>I suspect that Khun BREEN is thinking only about how ransomware hackers operate, and for them an RCE is unnecessary. They typically gain access by using misconfigured systems, known credentials, or other basic techniques. Access agents for ransomware do not need RCE exploits, they’re perfectly profitable just attacking weak networks.</p><p>But what is true for ransomware is not true for hackers, because ransomware is not a good model for hacker operations (nation state or other).</p><p>It is almost always the case that: RCE is more valuable than LPE.</p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity%5Bemail%5D&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIxXC8wNlwvMDlcL25vdC1hbGwtZXhwbG9pdHMtYXJlLWdyZXktaW4tdGhlLWRhcmtcLyJ9&amp;utm_source=https%3A%2F%2Fgru.gq%2F2021%2F06%2F09%2Fnot-all-exploits-are-grey-in-the-dark%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button"><img class="c2" src="https://i2.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></a></div>]]></description>
      <link>https://gru.gq/2021/06/09/not-all-exploits-are-grey-in-the-dark/</link>
      <guid>https://gru.gq/2021/06/09/not-all-exploits-are-grey-in-the-dark/</guid>
      <pubDate>Wed, 09 Jun 2021 13:50:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[ransomware, real resolutions]]></title>
      <description><![CDATA[<p>Some quick thoughts on ransomware as a tractable problem.</p><ol><li>Create a superfund to hire ransomware developers and support staff. Pay them to do something productive, or at least non criminal.</li>
<li>The only people with power over ransomware gangs are the protectors providing the safe havens they reside in. If you cannot make North Korea, China, Russia or even Ukraine, cooperate then there’s no way to eradicate them</li>
<li>Ransomware is a billion dollar industry with a few major players reaping the rewards. The ransomware10, R10 gangs are pulling in tens, or hundreds, of millions.
<ol><li>Those millions pay for “protection”</li>
<li>The money is mostly spent inside the safe haven.</li>
</ol></li>
<li>Ransomware is a problem for the West. This is a strategic alignment with Russian (and Chinese) interests.</li>
</ol><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity%5Bemail%5D&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIxXC8wNVwvMTZcL3JhbnNvbXdhcmUtcmVhbC1yZXNvbHV0aW9uc1wvIn0%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2021%2F05%2F16%2Fransomware-real-resolutions%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button"><img class="c2" src="https://i2.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></a></div>]]></description>
      <link>https://gru.gq/2021/05/16/ransomware-real-resolutions/</link>
      <guid>https://gru.gq/2021/05/16/ransomware-real-resolutions/</guid>
      <pubDate>Sun, 16 May 2021 17:23:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[SVR snaps back at Biden]]></title>
      <description><![CDATA[<p>On April 15th the US dropped a load of sanctions on Russia for election interference, and hacking, and generally being Russia. There is a lot of good info to unpack from the sanctions, but for now let’s look at the way Russia’s foreign intelligence service, the SVR, has responded to being called Cozy Bear. (Hint: They don’t like it)</p><p>The collection of statements from the US and NATO is here: <a href="https://grugq.tumblr.com/post/648536288464683009/us-sanctions-russia-for-cyber-roundup" rel="nofollow">https://grugq.tumblr.com/post/648536288464683009/us-sanctions-russia-for-cyber-roundup</a></p><p>Here is the original statement from the SVR:<br /><a href="http://svr.gov.ru/smi/2021/04/kino-da-i-tolko.htm" rel="nofollow">http://svr.gov.ru/smi/2021/04/kino-da-i-tolko.htm</a></p><p>To understand what they’re saying you should know the scene from the movie they’re talking about. This movie: <a href="https://en.wikipedia.org/wiki/Kidnapping,_Caucasian_Style" rel="nofollow">https://en.wikipedia.org/wiki/Kidnapping,_Caucasian_Style</a></p><iframe class="youtube-player c1" width="640" height="360" src="https://www.youtube.com/embed/PmaZ0SlyZ9E?version=3&amp;rel=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;fs=1&amp;hl=en-US&amp;autohide=2&amp;wmode=transparent" allowfullscreen="allowfullscreen" sandbox="allow-scripts allow-same-origin allow-popups allow-presentation"> </iframe><p>The scene the SVR quotes is when the police have arrested the protagonist for a drunken escapade.</p><p>The protagonist is a research student in the Caucuses collecting old customs and toasts (the phrases said before drinking.) The villagers made him drink for every toast they tell him, and he gets blackout drunk. We cut to him, hung over and recovering in a police station. The cop is reading the complainr.</p><pre> **Cop**:  </pre><p>…he disrupted the marriage ceremony. Then, on the ruins of the chapel…<br /><strong>Protagonist</strong>:<br />Did I ruin the chapel?<br /><strong>Cop</strong>:<br />No, that was before you. In the 14th century.</p><p>They’re saying that US’ claims about the cyber attacks are like the statement from the cop about the ruined chapel — completely unrelated.</p><p>After dismissing the entire release from the US Intelligence Community (IC) by comparing it to a joke from a 1967 Soviet comedy, things get real. The SVR is very incensed that the US IC is calling them names.</p><blockquote>
<p>Let’s just say that reading nonsense is not very interesting: “Today, the United States officially declares that the Russian Foreign Intelligence Service (SVR), also known as ART 29, Cozy Bear and The Dukes is the culprit in a large-scale espionage campaign … The US intelligence community fully trusts its assessment regarding the SVR, ”the release says. And then again, a quote from the film classics: “You have no right! The elder didn’t say that!”</p>
</blockquote><p>For an intelligence agency, not a very professional way of writing. But it is hilariously crude.<br />“Vasha, you see what the Americans are saying about us?”<br />“What?”<br />“They say we hacked SolarWinds, and we interfered with the election and we…”<br />“Ha! It’s like, ‘did I ruin the chapel?’ from that movie?”<br />“Hahaha. That’s good! Let’s use that”</p><blockquote>
<p>In all this verbiage, the most unpleasant thing is: “The SVR of Russia, also known as …”. Sorry, gentlemen, but the SVR of Russia has been known to the whole world since 1920 as the <strong>Foreign Department of the Cheka</strong>, <strong>the 5th Department of the First Directorate of the NKVD of the USSR</strong>. Since the middle of the last century – <strong>the First Chief Directorate of the KGB of the USSR</strong>, and now – the <strong>Foreign Intelligence Service of the Russian Federation</strong>.</p>
</blockquote><p>They are furious. They are not “APT 29”. They are not “The Dukes.” And they are absolutely not “Cozy Bear”!</p><p>The entire response is just five paragraphs.</p><ol><li>A reference to a joke from a 1960s soviet comedy film.</li>
<li>A summary of the President Biden’s statement, to wit: “he explained to mankind what a threat Russia poses to the World.”</li>
<li>The quote, above, in which the US IC calls SVR “Cozy Bear.”</li>
<li>Full throated statement of their lineage and their name.</li>
<li>They wax ecstatic about the glorious history of Russian secret police. Really.</li>
</ol><p>That is the entire statement. The response to the two press releases from the US Treasury department, a statement by President Biden, statements from France, NATO, and the EU is just these five paragraphs. The main points being that accusations of spying, against them, the intelligence service, is laughable. Furthermore they are the SVR, first of their name, from the proud lineage of Russian secret police, and not Cozy <strong>fucking</strong> Bear!</p><div class="cb_p6_patreon_button c4"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIxXC8wNFwvMTdcL3N2ci1zbmFwcy1iYWNrLWF0LWJpZGVuXC8ifQ%3D%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2021%2F04%2F17%2Fsvr-snaps-back-at-biden%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c3" src="https://i2.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2021/04/17/svr-snaps-back-at-biden/</link>
      <guid>https://gru.gq/2021/04/17/svr-snaps-back-at-biden/</guid>
      <pubDate>Sat, 17 Apr 2021 06:14:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[SolarWind, enough with the password already!]]></title>
      <description><![CDATA[<p>This is a much delayed discussion on the complexity and nuance of the SolarWind hack. The simplistic and wrong messaging from some quarters of the infosec community has resulted in an atrocious misunderstanding of the hack in the public sphere. This has extended into the policy world as these bad takes are treated as cogent analysis.</p><p><a href="https://twitter.com/thegrugq/status/1341439709487087618?s=21">I wrote this back in December</a>, but months later this <a href="https://edition.cnn.com/2021/02/26/politics/solarwinds123-password-intern/index.html">bad analysis is still brought up in the policy space.</a></p><h2>Espionage is the second oldest profession</h2><p>It is a truth universally acknowledged, that with spying, the ends justify the means. This is true for all espionage organisations, the opposition’s and your own. Why is that relevant? Because any standard which is used to hamper the opposition will also apply to, and hamper, yours.</p><p>Sometimes laying down blanket rules about acceptable espionage behaviour is not a problem. Almost always this is when a certain type of operation is out of character with the society that produces the espionage agency. China makes extensive use of their diaspora community for espionage. The US has thousands of trained professionals and doesn’t use their diaspora community for organic bottom up collection. The US sometimes coopts civilians (and China has professionals) but generally speaking the diaspora method is one that only China uses extensively.</p><p>Extending this a bit further: if an espionage rule was proposed that banned the use of professionals but allowed the use of amateur civilians, China would be able to easily adapt to the new espionage environment. The US would be severely constrained. For this reason, the US wouldn’t sign up to, or abide by, such a requirement. (This is complicated further by the nature of targets for espionage, and national policy, but we can explore that another day.)</p><p>This brings me to targeting civilian companies and supply chain attacks. The US uses these methods just as, if not more, frequently than the Russians. FLAME, a strain of malware that targeted entities in the Middle East, exploited a cryptologic bug in the way Microsoft signed their updates. The NSA was then able to inject malicious code into the updates of Microsoft software. And just like SolarWinds, it was specifically targeted to ensure only legitimate espionage targets were infected and collected.</p><p><strong>There is no rule that would prohibit the SolarWinds espionage campaign which the US would be willing to abide by itself.</strong></p><h2>Russian Intelligence aren’t script kiddies</h2><p><a href="https://twitter.com/fcdservicea_llc/status/1365642703330017288?s=21" rel="nofollow">https://twitter.com/fcdservicea_llc/status/1365642703330017288?s=21</a></p><p>Here’s the thing: the attackers are Russian foreign intelligence, the cream of the old KGB, and they will find a way to gain access to their target. Do they need to recruit a developer at the company and trick them into installing malware? They will do that.</p><p>They do not need to access the target via a weak password on the build servers. If that is what they use, then that is what they use, but it is not the make or break factor for the operation.</p><p>Intelligence agencies have targets and they will find the techniques to access them. The don’t start with a technique and look for targets that they can access.</p><p>The SolarWind backdoor was deeply integrated into the code, it was injected during their build process, and there is no way that the server having a weak password was the pivotal factor. As if Russian Intelligence would just give up if there were a strong password instead!</p><p>There is practically no chance that the server’s password was in anyway relevant to the hack overall. I can forgive the ignorance from the news media, but some infosec people are repeating this garbage as if it is important part of the SolarWind compromise.</p><blockquote>
<p>“The offense is routinely underestimated. When companies are hacked, they react as if they had only done this one thing or avoided this one mistake everything would have been okay. The adversary is treated as if they just got lucky.” — Network Attacks and Exploitation <a href="https://twitter.com/networkattack">@networkattack</a></p>
</blockquote><p>People suggesting that the weak password example is relevant because it illustrates the poor security practices overall. I would agree with you if that was the argument presented. It was not. You have to work with the words ppl said, not what you wish they’d said.</p><blockquote>
<p>‘’Security researcher Vinoth Kumar told Reuters that, last year, he alerted the company that anyone could access SolarWinds’ update server by using the password “solarwinds123”<br />“This could have been done by any attacker, easily,” Kumar said.’’</p>
</blockquote><p>I absolutely agree with the “it is illustrative of poor security practice” but… that isn’t what was said. They literally said that the weak password means that the attacker could be anyone. Anyone could do it. That is the dumbest take.</p><h2>The KGB vs a software vendor? Bet KGB.</h2><p>Here’s the thing.</p><p>I’m perfectly willing to believe that their build servers were using “admin:admin” and that’s how the Russians gained access to inject their code… but, this was a clandestine intelligence operation. They did not succeed merely because SolarWind had poor password hygiene.</p><p>The SVR was formed from the cream of the KGB — the first chief directorate (FCD). The most prestigious directorate in the KGB. As the SVR they are still formidable.</p><h2>Was SolarWind picked due to its poor security?</h2><p>No.</p><p>I suspect the primary motivation was the access that would be enabled by the attack, not the vulnerable nature of the company. This is the SVR, the cream of the KGB (first chief directorate). They are not going to be bothered by password policy.</p><p>That’s what kinda annoys me… however easy SolarWind may have been to hack, they were hacked by the fucking First Chief Directorate of the KGB. Quite possibly the people that are frying diplomats brains with microwaves in Havana. They’re pretty fucking metal.</p><p>Could SolarWind have been too difficult for the KGB to use them in an enablement operation? Yes, it is possible to achieve that level of security. Creating a strong fast detection capability with rapid remediation and incident response will make it hard for attackers to dwell for any length of time, or persist on the system after they gain access. It requires vigilance and some effort, but it can be done. Of course, SolarWind wasn’t close to reaching that level.</p><p>Part of the problem here might be that a superficial understanding of the cyber kill chain gives the impression that if you just stop The One Right technique then you will defeat the opposition. This is only true for an opposition that is inflexible and using just one technique. That description does not apply to the Russian intelligence services.</p><p>Close does not count in security. In offensive security you’re either successful or not. When you’re dealing with access then the only possible states are: did it work? Yes or no. Whether you need 5 minutes or 5 weeks to get a shell, once you have that shell, it is the same level of game over. That’s what we’re talking about here. The technique used to gain access is a minor issue.</p><p>As Thomas “Halvar Flake” Dullien says, “you can’t argue with a root shell.”</p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIxXC8wMlwvMjhcL3NvbGFyd2luZC1lbm91Z2gtd2l0aC10aGUtcGFzc3dvcmQtYWxyZWFkeVwvIn0%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2021%2F02%2F28%2Fsolarwind-enough-with-the-password-already%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i2.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2021/02/28/solarwind-enough-with-the-password-already/</link>
      <guid>https://gru.gq/2021/02/28/solarwind-enough-with-the-password-already/</guid>
      <pubDate>Sat, 27 Feb 2021 18:58:00 +0100</pubDate>
    </item>
    <item>
      <title><![CDATA[Why Backdoor the Golden Goose?]]></title>
      <description><![CDATA[<p>Why I don’t think Huawei will install back doors in 5G telco equipment — it would be a forced error when they are poised to achieve a win that will give them a strategic advantage for years and maybe decades to come.</p><p>I don’t think they want to backdoor everything. That’s a sort of crude short term move. I think they want to own the network infrastructure long term, at which point they will can do a lot more than just backdoor, and do it far easier. Huawei is being positioned for future benefit i.e. this is the Infiltration phase, not exploitation phase.</p><p>I think they’d get settled in and exploitation starts around 10yrs in. They’ll have crept into more of the network by then and their contractors will be permanently onsite for support etc. they could just backdoor by physical access.</p><p>The way I see it, adding back doors is a really really small short term win. Especially when compared against the long term strategic advantage of being <em>the</em> company on which most of the Internet runs. Add in the prestige of a CCP state company being financially successful…</p><blockquote>
<p>“Completely agree”</p>
</blockquote><p>I am sure even the US IC knows that “back doors” is a silly argument. The problem is that the real reason is too complex, “gentlemen, we cannot allow there to be a national telco manufacturing gap.”</p><p>The consequences of Huawei becoming the dominant global telco equipment manufacturer are bleak for the West:<br />* China will control a huge swathe of cyber terrain.<br />* It would provide China with a unique and exclusive data stream for training AI and ML models.<br />Generally speaking, it is strategically disadvantageous for your communications infrastructure to be entirely controlled by your opposition.</p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIxXC8wMVwvMjBcL3doeS1iYWNrZG9vci10aGUtZ29sZGVuLWdvb3NlXC8ifQ%3D%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2021%2F01%2F20%2Fwhy-backdoor-the-golden-goose%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i2.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2021/01/20/why-backdoor-the-golden-goose/</link>
      <guid>https://gru.gq/2021/01/20/why-backdoor-the-golden-goose/</guid>
      <pubDate>Wed, 20 Jan 2021 11:33:00 +0100</pubDate>
    </item>
    <item>
      <title><![CDATA[On Pre Op Hackers]]></title>
      <description><![CDATA[<p>I was asked for good references on pre-operation phases of hacking. I recommended Matt Monte’s “network attacks and exploitation: a framework”, and Bill McRaven’s “Spec Ops: Case Studies in Special Operations Warfare: Theory and Practice”.  The Monte book is the best book on cyber written so far. It covers a lot of theory and practice and first principles that few people really know or consider.  McRaven’s book is the best explanation of how successful hacker attacks achieve success. </p><p>The concepts that McRaven puts forward: relative superiority, and the six key factors of operations, are basically the core of good hacking:</p><p>– <strong>PLAN</strong>: simplicity</p><p>– <strong>PREPARE</strong>: security, repetition</p><p>– <strong>EXECUTE</strong>: surprise, speed, purpose</p><p><strong>Simplicity</strong>: A simple plan without a lot of complicated moving parts or dependencies on loads of other things all lining up just right at the right time. The recipe for success starts with a simple plan.</p><p><strong>Security</strong> means secrecy. The knowledge of the existence of the planned op will jeopardise the op. Literally OPSEC!</p><p><strong>Repetition</strong>: the actions to take during the op should be routine, like muscle memory. By the time actions are done live, they should be routine and practiced. This reduces the chance for delays and errors.</p><p><strong>Surprise</strong>: the adversary should not expect to be attacked in that area at that time, obviously. Surprise allows attackers to have relative superiority over defenders, increasing the chance of success and gaining more time on target before the defenders can respond. This time on target is the period of vulnerability, so as an attacker you want to minimise this.</p><p><strong>Speed</strong>, this comes back to the period of vulnerability. The operation is vulnerable from the moment the operators are committed (i.e. past the point of no return). From then until the objectives are complete, the operation is both vulnerable and at risk of failure. The best plans will seek to minimise this time as much as possible, in whatever manner makes the most sense. Going very slowly and keeping very stealthy to reduce risk of detection can be better than just going for speed. A long term espionage operation is an example of the former, and ransomware is an example of the latter.</p><p>Once the operators achieve <em>relative superiority</em> their likelihood of successfully achieving their objectives go way up. They are in the right place, they are the superior element in the area, and the defenders probably aren’t even aware that anything has happened. The operators then achieve their mission objective(s). They’re still in the period of vulnerability though, and they remain there until the operation is completed, or the goal for the operation has been achieved.</p><p>For example, the objective of the operation may be to steal the source code to Software Project A, but the goal of the campaign is to insert a backdoor to compromise the distributed program to infect specific targets via their supply chain. Thus if the attack is discovered before the backdoor has been added and the software pushed out to victims and the target infected… the campaign is a failure, so although the operation may be done, the campaign can still be in a period of vulnerability.</p><p>This extended period of vulnerability, due to the need for secrecy, is one unique aspect of cyber because so much is espionage-like. The campaign has to be secret, or it can be countered by the targets/victims.</p><p><strong>Purpose</strong>. This is an important one because it differentiates the hackers from the kidiots. An operation has a reason, it has objectives, goals, it fits into a broader plan. The operators, when they are on target, are not confused, or curious and wandering around. They are goal oriented and driven. They know what they need to do, how to do it, and where to do it. They are focussed on achieving their objectives and completing the mission.</p><p>Hackers who have purpose will know what they are doing. Literally, they will know what actions will get them closer to their objectives and what is a waste of time (and therefore increases their stay in the period of vulnerability, jeopardising the entire campaign). </p><p>A good example here is Phineas Phisher’s hacking team hack. They had a plan: find sensitive information and leak it, with the goal of damaging the company. This gave Phineas purpose. They didn’t go wandering around just to play around with new systems. They knew they had to find and exfiltrate sensitive data. Until the data was found and exfiltrated, the operation was not done. The primary objective was to find and exfiltrate sensitive data.</p><p><strong>Simple. Security, repetition. Surprise, speed, purpose</strong>. These are the key elements to ensuring a successful hack.</p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIwXC8xMlwvMjNcL29uLXByZS1vcC1oYWNrZXJzXC8ifQ%3D%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2020%2F12%2F23%2Fon-pre-op-hackers%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i2.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2020/12/23/on-pre-op-hackers/</link>
      <guid>https://gru.gq/2020/12/23/on-pre-op-hackers/</guid>
      <pubDate>Tue, 22 Dec 2020 20:46:00 +0100</pubDate>
    </item>
    <item>
      <title><![CDATA[The Network is not the Issue Dude]]></title>
      <description><![CDATA[<p>There is an argument that goes “the Internet is not secure because it was designed in the 60s (or 70s, or whenever) and back then security wasn’t part of the plan. Now we’ve inherited that legacy of no security, and it haunts us still.” For some reason this has never really sat right with me, but I’ve never really been able to articulate why. Until now…</p><p>I think my first intuition with not liking this theory is that the Internet was literally designed for security. They chose a packet switched network so that some parts could be obliterated in a nuclear war and the network itself would remain functional. That is a system designed for a security role.</p><p>The next big issue for me is that this theory of inherited insecurity made sense for a while, when TCP/IP was used “raw” even for sensitive data. This was rsh, rlogin, telnet, and the monster that outlived everything — HTTP. This was a legitimate complaint about the internet protocols: they don’t have encryption by default.</p><p>The lack of mandated encryption for TCP/IP et al. is actually probably really fortunate. These days we can use modern ciphers rather than everyone being stuck on 3DES because some vendors are so committed to their legacy install base.</p><p>The modularity of internet protocols is a good thing (they’re stackable!) and the historical lack of encryption for telnet and HTTP has long been rectified. We live in an age where toasters are perfectly capable of offering https and ssh access. Encryption at the network layer is a solved problem, not something we can blame on the original designers and their weak slow computers.</p><p>Which brings me to my real problem with the inherent inherited insecurity theory. The network has very little to do with Internet security, rather it is the software (and to some extent the hardware) on the end points. The software is what gets hacked. The software is where most of the vulnerabilities are. And the software is not from the 1960s. There is no way that Facebook has an account hijack bug, or whatever, because of some design decision made for the ARPAnet during some whacked out coding session in the Summer of Love.</p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIwXC8xMlwvMjNcL3RoZS1uZXR3b3JrLWlzLW5vdC10aGUtaXNzdWUtZHVkZVwvIn0%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2020%2F12%2F23%2Fthe-network-is-not-the-issue-dude%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i2.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2020/12/23/the-network-is-not-the-issue-dude/</link>
      <guid>https://gru.gq/2020/12/23/the-network-is-not-the-issue-dude/</guid>
      <pubDate>Tue, 22 Dec 2020 20:27:00 +0100</pubDate>
    </item>
    <item>
      <title><![CDATA[Cyber Events]]></title>
      <description><![CDATA[<p>There is a constant need to label cyber operations as “cyber ${battle from history}.” This is usually cyber Pearl Harbor, which is a poor example when used to suggest a sort of Kung Fu film “train hard and get revenge” strategy. Cyber Pearl Harbor can actually be a useful analogy if viewed from a certain perspective.</p><p><strong>Cyber Pearl Harbor</strong>: catches you totally off guard. Strategic surprise leading to scary and embarrassing losses. This event causes a resolute spur to action and the necessary resources are invested as best as possible until the underlying situation is resolved.</p><p><strong>Cyber Hill 814</strong>: just another day slogging through the usual cyber events. A traumatic and hectic time where everything is on fire and terrible. Eventually it is over and you realise that nothing has really changed, except now everyone has more scars and war stories. You’re reminded that this is unwinnable the way we’re fighting it and the metrics we use are stupid and perverse.</p><p><strong>Cyber Chosin Reservoir</strong>: you are understaffed, short on budget and tools, and there is no doubt that an attack is “when” not “if.” The best you can hope for from success is the opportunity to do the whole thing again, but in a worse situation with even less support. How you aren’t just wiped from existence makes no sense to you, but one day at a time and hope the cavalry arrives.</p><p><strong>Cyber Tet Offensive</strong>: a tactical and strategic victory. The opposition is crushed and ceases to exist as a coherent force in anything but name. Their every strategic objective a failure, and their theories and stratagems proven invalid in the face of reality. Despite this you lose at the grand strategy level, as the support for your side evaporates. Your conflict is over, it is just a matter of time.</p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIwXC8xMlwvMjBcL2N5YmVyLWV2ZW50c1wvIn0%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2020%2F12%2F20%2Fcyber-events%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i2.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2020/12/20/cyber-events/</link>
      <guid>https://gru.gq/2020/12/20/cyber-events/</guid>
      <pubDate>Sun, 20 Dec 2020 03:04:00 +0100</pubDate>
    </item>
    <item>
      <title><![CDATA[Cyber Writing Sucks]]></title>
      <description><![CDATA[<p>In the medieval era scribes and poets wrote about war and conflict for a class who participated actively in those activities. As a result, a great deal of the writing is actually very accurate in its depictions because the audience knew when it was inauthentic. This strikes me as an interesting point because the cyber writing is so so so bad in comparison. There is very little that chronicles cyber events that does so in a way that is authentic.</p><p>My point is, the chroniclers or 14th century Scottish birder wars were better historians than the majority of journalists and writers covering cyber security today.</p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIwXC8xMlwvMDFcL2N5YmVyLXdyaXRpbmctc3Vja3NcLyJ9&amp;utm_source=https%3A%2F%2Fgru.gq%2F2020%2F12%2F01%2Fcyber-writing-sucks%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i2.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2020/12/01/cyber-writing-sucks/</link>
      <guid>https://gru.gq/2020/12/01/cyber-writing-sucks/</guid>
      <pubDate>Mon, 30 Nov 2020 19:18:00 +0100</pubDate>
    </item>
    <item>
      <title><![CDATA[A Walkthrough of Biden’s Laptop with Rudy Giuliani]]></title>
      <description><![CDATA[<p>I have transcribed the audio from <a href="https://twitter.com/scottmstedman/status/1323461815989280769?s=21">this video clip</a> of Rudy Giuliani performing an examination of one of the alleged Hunter Biden laptops. We don’t see the screen so I’ve attempted to figure out, and explain, what he’s seeing and doing.</p><h3>Evidence stomping</h3><p>Giuliani’s investigation methodology violates every principle of digital forensic analysis. His clumsy digging around has hopelessly altered, tainted, and mangled the disk’s data and metadata. Verifying those laptops is probably impossible.</p><h3>What is going on with the Biden data?</h3><p>There is some confusion on my part. Originally the story was: the MacBook got water(?) damaged and the data was salvaged onto an external drive. Then it became about laptops and a hard drive. What is where?</p><h3>It’s a convoluted mess</h3><p>Regarding the water damaged MacBook. I don’t understand how Giuliani has working (alleged) Biden MacBook with the Biden data. Wasn’t that laptop busted because of the water? If so then how is Giuliani able to login to the MacBook and poke around?</p><blockquote>
<p>[Biden]s computer. Here’s the computer. I’m gonna open it now. For the first… This is the FBI opening it for the first time.</p>
</blockquote><p>{{ Giuliani is giving a little performance of “The FBI investigates the Hunter Biden Laptop.” He walks us through the clues and evidence we, as the FBI, discover. Needless to say, his imagined FBI examination is farcical. }}</p><blockquote>
<p>It says Robert Hunter. I know the password, of course. <em></em></p>
</blockquote><p>{{ Giuliani’s at the login prompt where he finds some evidence: the display name for the user — Robert Hunter. He pecks at one or two keys, hits enter and… he’s in! }}</p><blockquote>
<p>Now I’m gonna open the computer, and on the right hand side, you know, like the legends on the first page of the computer.</p>
</blockquote><p>{{ Giuliani seems to use “<em>the first page of the computer</em>” to mean the <strong>Desktop</strong>, and he says “<em>legends</em>” for <strong>icons</strong>. Cyber security expert. }}</p><blockquote>
<p>There’s one that says <strong>Hunter Burisma emails waiting to upload</strong>.</p>
</blockquote><p>{{ On the first page of the computer, Rudy Giuliani discovers a clue. One of the legends on the right hand side is labeled: “<strong>Hunter Burisma emails waiting to upload</strong>.” }}</p><p>Rudy Giuliani gets what is allegedly Hunter Biden’s laptop. Giuliani unlocks it using the two character long password, and there on the desktop staring him in the face is a folder — “Hunter Burisma emails ready for upload.”</p><p>That’s their story and they’re sticking to it.</p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIwXC8xMVwvMDNcL2Etd2Fsa3Rocm91Z2gtb2YtYmlkZW5zLWxhcHRvcC13aXRoLXJ1ZHktZ2l1bGlhbmlcLyJ9&amp;utm_source=https%3A%2F%2Fgru.gq%2F2020%2F11%2F03%2Fa-walkthrough-of-bidens-laptop-with-rudy-giuliani%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i2.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2020/11/03/a-walkthrough-of-bidens-laptop-with-rudy-giuliani/</link>
      <guid>https://gru.gq/2020/11/03/a-walkthrough-of-bidens-laptop-with-rudy-giuliani/</guid>
      <pubDate>Tue, 03 Nov 2020 12:50:00 +0100</pubDate>
    </item>
    <item>
      <title><![CDATA[How to hide money laundering on the blockchain]]></title>
      <description><![CDATA[<p>This is a summary of the key points from this article: <a href="https://arxiv.org/pdf/2010.15082.pdf">How to Not Get Caught When You Launder Money on Blockchain?</a></p><p>Seems like successfully laundering Bitcoins is fairly complicated, lots of pitfalls.</p><p>Secrecy is usually binary, it is all or nothing. If there is secrecy for 99 transactions and then a failure on the 100th. The previous 99 are all compromised as well. Assuming that the entity receiving the money is known (e.g. a darknet vendor, or ransomware address) then any transaction that deanonymises the entity will deanonymise the previous payments as well.</p><p>Successful evasion doesn’t carry forward to the future (although failures do), and failures propagate back to the past.</p><p>Maintaining secrecy for long periods of time is harder. Supporting a high operational tempo increases the difficulty with the tempo.</p><h2>Obfuscation for Coin Movements</h2><p><strong>Rule 1</strong>: Do not rely on transaction obfuscation to hide the origins of dark coins. Do not merge nor split coins by using elaborate chains. Avoid using an address to receive multiple payments.</p><p><strong>Rule 2</strong>: With multiple rounds in similar input-output amounts, coin-mixing allows enhanced security. However, exchanges will shun coins that exit coin-mixing rounds.</p><p><strong>Rule 3</strong>: Unless users make certain mistakes (e.g., returning to bitcoin immediately with very similar amounts (Yousaf, Kappos, and Meiklejohn 2019), shapeshifting can provide enhanced security for money laundering.</p><h2>Evasion for Traceability Analysis</h2><h3>Protocol Strategies</h3><p><strong>Rule 4:</strong> Do not query your address balance online.</p><p><strong>Rule 5</strong>: Leave an air gap between your address and the web</p><p><strong>Rule 6</strong>: Observe wallet behavior to detect obscure, un- intended behavior. Similarly, do not accept default wal- let behavior in transaction fee amounts. Wallet leaked data/metadata may facilitate linking your addresses.</p><h3>Blockchain Strategies</h3><p><strong>Rule 7</strong>: Do not use hierarchically created addresses, which may be recovered even if you have deleted them from your wallet.</p><p><strong>Rule 8</strong>: Avoid too specific bitcoin amounts, and use frequent denominations when receiving payments.</p><p><strong>Rule 9</strong>: Hinder traceability analysis by controlling the chainlet patterns used in preceding transactions.</p><p><strong>Rule 10</strong>: Payment transactions must consider chainlet fre- quencies to minimize traceability which is achieved by re- ceiving payments through transactions of ≤ 2 inputs and ≤ 2 output</p><h2>Conclusion</h2><blockquote>
<p>A second issue is related to within-exchange transaction activity, which remains hidden from the blockchain. In the same vein, second layer solutions, such as Lightning Net- work, leave most transactions off the main blockchain, and complicate traceability issues greatly. AI deployment efforts must develop and deploy models that combine on and off- the-chain transactions and produce probabilistic traceability models.</p>
</blockquote><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIwXC8xMFwvMjlcL2hvdy10by1oaWRlLW1vbmV5LWxhdW5kZXJpbmctb24tdGhlLWJsb2NrY2hhaW5cLyJ9&amp;utm_source=https%3A%2F%2Fgru.gq%2F2020%2F10%2F29%2Fhow-to-hide-money-laundering-on-the-blockchain%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i2.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2020/10/29/how-to-hide-money-laundering-on-the-blockchain/</link>
      <guid>https://gru.gq/2020/10/29/how-to-hide-money-laundering-on-the-blockchain/</guid>
      <pubDate>Thu, 29 Oct 2020 08:45:00 +0100</pubDate>
    </item>
    <item>
      <title><![CDATA[Ransomware prohibition]]></title>
      <description><![CDATA[<p>#blog/idea</p><p><a href="https://home.treasury.gov/policy-issues/financial-sanctions/recent-actions/20201001">The Treasury has moved to prohibit payment of ransomware ransoms</a>. They’ve said there will be some exceptions, and it is obvious that this won’t be an effective complete global ban on payment. The result, a partial ban on payment, is the worst possible ransomware environment for victims. The impact of different legal regimes governing ransom payments are well documented and understood, <a href="https://rusi.org/publication/occasional-papers/closing-gap-assessing-responses-terrorist-related-kidnap-ransom">see RUSI here</a>.</p><p>Banning ransomware payments seems like a means of removing the financial reward for the gangs. It makes intuitive sense that if the victims cannot pay, then the gangs will stop using ransomware. Unfortunately the counterintuitive truth is that an incomplete, ineffective, partial ban will actually make objectively ransomware worse for everyone.</p><p>If there is a complete universal global ban, then ransomware ceases to be a source of money and the ransomware gangs stop. Or at least migrate to something else that makes money. We know this scenario is not going to happen.</p><p>A partial ban creates significant unintended consequences. Firstly, the ransomware gangs still make money from ransomware, so they do <strong>not</strong> cease operations. Then, to encourage payment they become more drastic and extreme in their actions. They have to make a stronger incentive to encourage people who are dissuaded by the ban, but might pay if given sufficient “encouragement”. Then, because the prohibition on payment drives it underground – with all the limited transparency and brutal mechanisms for enforcing compliance — the ransom prices rise. This environment: higher prices, more aggressive ransomware gangs, fewer reputable companies negotiating and handling the ransom payments (and thereby managing the gangs); it is the worst possible situation for everyone.</p><p>The current situation, where there is no criminalisation of payment has created a market place where a number of companies working with insurers are handling the vast majority of ransomware incidents. There are crisis responders who help the companies recover, who arrange a minimal payment, and who get paid by the insurers. This is market governance and it keeps the prices down because there is a sort of gentlemen’s agreement between the gangs and the payment companies. Also, the lack of prohibition means these companies operate in the open and they can share information about pricing etc internally and with each other. (Transparency)</p><p>The status quo is not the ideal world, but it is far better than the nightmare of ineffective partial prohibition.</p><p>The only entity with power to control the behaviour of ransomware gangs is the one providing protection for them. The gangs need a place to operate and somewhere to convert their crypto currency into hard currency. They are cashing out hundreds of thousands of dollars in crypto, and there is no way that isn’t raising “know your customer” alerts for money laundering.</p><p>The only controlling entity is the one that allows the gangs to operate. The gangs are completely at the mercy of the whichever entity provides protection. This is the rule everywhere that kidnapping gangs operate, and ransomware gangs share some similarities in their operational requirements.</p><p>This can only possibly make matters worse. It was very poorly conceived, ill thought out, and is generally a terrible idea with no upside for anyone, least of all the victims. Well, I suppose the ransomware gangs will make more money, so there is that.</p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIwXC8xMFwvMThcL3JhbnNvbXdhcmUtcHJvaGliaXRpb25cLyJ9&amp;utm_source=https%3A%2F%2Fgru.gq%2F2020%2F10%2F18%2Fransomware-prohibition%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i2.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2020/10/18/ransomware-prohibition/</link>
      <guid>https://gru.gq/2020/10/18/ransomware-prohibition/</guid>
      <pubDate>Sun, 18 Oct 2020 17:18:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[The WeChat Ban and National Cyber Strategy]]></title>
      <description><![CDATA[<p><em>NOTE:</em> The <a href="https://www.bbc.co.uk/news/world-us-canada-54223980">ban on WeChat was blocked for violating freedom of speech</a>.</p><p>For the millions of Chinese in the diaspora Trump’s WeChat ban has created a problem only the software grey market can solve. WeChat is almost an existential requirement. It’s the only messaging app the Chinese Communist Party (CCP) allows, making it the only option to chat with relatives, friends and colleagues in China.</p><p>WeChat is the Chinese diaspora’s lifeline to home, and Trump just cut it.</p><p>Fortunately for the diaspora, evading Trump’s WeChat prohibition is fairly simple and easy. On a Huawei phone WeChat is available from Huawei’s AppStore. On other devices, just changing the App Store region should be enough. Otherwise WeChat can be manually installed (aka “sideloaded”) simply by downloading it and tapping the file.</p><p>The increased app acquisition friction will not interfere with WeChat usage, but friction isn’t free. Users downloading and running applications from the Internet is far riskier than using an App Stop. The simplest solution to avoiding friction is to use a Huawei phone (somewhat difficult to acquire due to Trump era sanctions.)</p><p>Strongly encouraging the diaspora to migrate to Chinese hardware and App Stores is bad for the intelligence services. The effect of the Trump admin’s anti-China policies seems likely to be the creation of a millions strong shadow mobile phone ecosystem. One that utilises US network infrastructure as a “dumb pipe” for internet access, but touches no US hardware, software or services.</p><p>All the data generated on Huawei phones is sent to China or Singapore (depending on jurisdiction). That data is not sent to Google, Apple, Microsoft, Amazon, etc. Search queries and user clicks get processed by Baidu’s ML to improve their search engine. Google gets nothing. Locations and other information is sent to Huawei where it improves their understanding of the spatial environment the user inhabits. Google gets nothing.</p><p>Facebook is one of the few Internet giants to survive this data stream amputation relatively unscathed. Facebook, of course, doesn’t need the OS to collect all the data, they already have an app for that.</p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIwXC8wOVwvMjJcL3RoZS13ZWNoYXQtYmFuLWFuZC1uYXRpb25hbC1jeWJlci1zdHJhdGVneVwvIn0%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2020%2F09%2F22%2Fthe-wechat-ban-and-national-cyber-strategy%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i2.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2020/09/22/the-wechat-ban-and-national-cyber-strategy/</link>
      <guid>https://gru.gq/2020/09/22/the-wechat-ban-and-national-cyber-strategy/</guid>
      <pubDate>Mon, 21 Sep 2020 21:36:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[Cybercraft: the short version]]></title>
      <description><![CDATA[<p>Cybercraft is the skillful management of cyber ways and means to achieve your ends.</p><p>We are living through a return to great power competition. Cyber has created a new means for contest between states and other entities, including organisations, companies, small groups and individuals.</p><p>Cyber has infiltrated every facet of modern life. It has become a critical for the load bearing infrastructure society. Existing critical national infrastructure is frequently hybrid cyber infrastructure, exposing even traditional infrastructure to the cyber domain.</p><p>Cyber truly permeates everywhere.</p><p>Cyber is a domain, a medium, a ways and a means. It is both vertical, a domain, and penetrates horizontally with all other domains. There is very little in Western society that doesn’t, at some point, rely on cyber.</p><p>Cybercraft encompasses all ways and means of advancing an entity’s interests using cyber, including: cyber warfare; information operations; theft; espionage; disruption; improvements introducing new efficiencies; and so on.</p><p>Interesting elements of cybercraft are: cyberspace collapses geographic locality, erasing natural barriers; cyber capabilities flatten the power differences between small and large entities, e.g. a small group of hackers can be more effective than a state’s military.</p><p>Cybercraft can have effects in DIME (diplomacy, information, military, economics) and PEST (politics, economics, socio-culture, technology).</p><p>Statecraft is not going anywhere, but cybercraft is joining it.</p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIwXC8wOVwvMTRcL2N5YmVyY3JhZnQtdGhlLXNob3J0LXZlcnNpb25cLyJ9&amp;utm_source=https%3A%2F%2Fgru.gq%2F2020%2F09%2F14%2Fcybercraft-the-short-version%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i2.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2020/09/14/cybercraft-the-short-version/</link>
      <guid>https://gru.gq/2020/09/14/cybercraft-the-short-version/</guid>
      <pubDate>Mon, 14 Sep 2020 06:25:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[Disclosure Keynote: Cybercraft]]></title>
      <description><![CDATA[<p>I presented the <a rel="noreferrer noopener" href="https://www.disclosureconference.com" target="_blank">opening keynote at Okta’s Disclosure conference</a> on Sept 2nd 2020. I used the opportunity to put forward a new term of art (cybercraft) and to outline some of my thinking on cyber conflict.</p><p>There is a <a href="https://www.zdnet.com/article/why-both-huawei-and-bts-share-the-cyber-stage-with-powerful-nations/">good write up on ZDNet here</a>.</p><p>The <a href="https://www.youtube.com/embed/_k0MkJMHPi0?start=536">video is on YouTube</a>:</p><p>&lt;iframe width=”560″ height=”315″ src=”<a href="https://www.youtube.com/embed/_k0MkJMHPi0?start=536">https://www.youtube.com/embed/_k0MkJMHPi0?start=536</a>” frameborder=”0″ allow=”accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture” allowfullscreen&gt;&lt;/iframe&gt;</p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIwXC8wOVwvMDRcL2Rpc2Nsb3N1cmUta2V5bm90ZS1jeWJlcmNyYWZ0XC8ifQ%3D%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2020%2F09%2F04%2Fdisclosure-keynote-cybercraft%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i2.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2020/09/04/disclosure-keynote-cybercraft/</link>
      <guid>https://gru.gq/2020/09/04/disclosure-keynote-cybercraft/</guid>
      <pubDate>Fri, 04 Sep 2020 10:17:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[Propaganda, harder than it looks]]></title>
      <description><![CDATA[<blockquote>
<p>The success or failure of black propaganda depends on the receiver’s willingness to accept the credibility of the source and the content of the message. Care has to be taken to place the sources and messages within a social, cultural, and political framework of the target audience.<br />If the sender misunderstands the audience and therefore designs a message that does not fit, black propaganda may appear suspicious and tends to fail.</p>
</blockquote><p><img src="https://i1.wp.com/gru.gq/wp-content/uploads/2020/07/image_871d4992-bd2f-4000-96c3-dccb48673fa9.jpg?resize=1443%2C2085&amp;is-pending-load=1#038;ssl=1" alt="" width="1443" height="2085" data-recalc-dims="1" srcset="" class="jetpack-lazy-image" /></p><noscript>
<p><img src="https://i1.wp.com/gru.gq/wp-content/uploads/2020/07/image_871d4992-bd2f-4000-96c3-dccb48673fa9.jpg?resize=1443%2C2085&amp;ssl=1" alt="" width="1443" height="2085" data-recalc-dims="1" /></p>
</noscript><br /><p><img src="https://i1.wp.com/gru.gq/wp-content/uploads/2020/07/image_f827d85b-6b26-4a27-b155-772a71b59694.jpg?resize=457%2C548&amp;ssl=1" alt="" width="457" height="548" data-recalc-dims="1" /></p>
<br />
<p><img src="https://i0.wp.com/gru.gq/wp-content/uploads/2020/07/image_e16f50d5-1f26-4169-80ad-e71b6f1ac051.jpg?resize=689%2C931&amp;ssl=1" alt="" width="689" height="931" data-recalc-dims="1" /></p>
<p>A complete and total failure of black propaganda. The most amusing thing is how the author(s) were unable enter the mindset of the target audience. The author projected the target’s thoughts as imagined by someone with the author’s own world view. It’s such a classic rookie failure. Love it!</p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIwXC8wN1wvMTdcL3Byb3BhZ2FuZGEtaGFyZGVyLXRoYW4taXQtbG9va3NcLyJ9&amp;utm_source=https%3A%2F%2Fgru.gq%2F2020%2F07%2F17%2Fpropaganda-harder-than-it-looks%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i2.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2020/07/17/propaganda-harder-than-it-looks/</link>
      <guid>https://gru.gq/2020/07/17/propaganda-harder-than-it-looks/</guid>
      <pubDate>Fri, 17 Jul 2020 09:02:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[Useful idiots indeed]]></title>
      <description><![CDATA[<p>#blog/disinformation</p><p>‪It was the media’s poor handling of the leaked documents that had the most impact. In late June ‘16 <a href="https://www.vice.com/en_us/article/wnxgwq/guccifer-20-is-likely-a-russian-government-attempt-to-cover-up-their-own-hack">@lorenzofb @pwnallthethings and I had proved</a> Guccifer 2.0 was <a href="https://www.vice.com/en_us/article/d7ydwy/why-does-dnc-hacker-guccifer-20-talk-like-this">not “a Romanian hacker”</a> but rather more than one Russian engaged in <a href="https://medium.com/@thegrugq/agent-of-influence-2-0-e1f20bed4aec">an information operation</a> to aid the Trump campaign.‬ <a href="https://medium.com/@thegrugq/evidence-guccifer-2-0-is-russian-intel-55f9f8b3f135">Collected contemporary evidence here.</a></p><p>‪There was no great secret about what was happening. It was all public, in the open, and meticulously documented. But the “real” story was emails and risotto recipes, not a foreign intelligence service actively engage in offensive info ops targeting and affecting the election.‬</p><p>‪Even after they blew the handling of the main Russian operation, the media refused to acknowledge their complicity. The steady drumbeat of emails emails emails from every news channel was a far greater driver of national discourse than all the Twitter bots combined. ‬</p><p>‪Instead of a soul searching examination on how to handle disinformation campaigns, news media embraced scapegoating social media. Facebook pages, trolls and bots were the culprit. Weak papers¹ “proved”² the impact of Twitter bots.‬</p><p>‪__‬<br />‪¹ <a href="https://michaelkreil.github.io/openbots/%E2%80%AC" rel="nofollow">https://michaelkreil.github.io/openbots/‬</a><br />‪² they did not‬</p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIwXC8wN1wvMTdcL3VzZWZ1bC1pZGlvdHMtaW5kZWVkXC8ifQ%3D%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2020%2F07%2F17%2Fuseful-idiots-indeed%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i2.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2020/07/17/useful-idiots-indeed/</link>
      <guid>https://gru.gq/2020/07/17/useful-idiots-indeed/</guid>
      <pubDate>Fri, 17 Jul 2020 08:57:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[Second Mover Advantage]]></title>
      <description><![CDATA[<p>Russian online disinformation has predominantly been focussed on amplifying existing narratives. It almost always uses “conspiracy theories,” or other fringe false narratives, invented by elements of the target audience. The reason is simple: it is cheap and effective.</p><p>Amplifying existing narratives developed by the members of the target audience is <strong>cheaper</strong> than paying for experts to develop them.</p><p>One of best sources for a narrative that resonates with the target audience is a member of the target audience. The narrative has proven itself <strong>effective</strong> with the target already, it simply needs a signal boost to reach a wider blast radius.</p><p><a href="https://www.nytimes.com/2020/06/15/technology/coronavirus-disinformation-russia-iowa-caucus.html">An American conspiracy theory promoted by Russian disinformation (maybe)</a></p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIwXC8wNlwvMTZcL3NlY29uZC1tb3Zlci1hZHZhbnRhZ2VcLyJ9&amp;utm_source=https%3A%2F%2Fgru.gq%2F2020%2F06%2F16%2Fsecond-mover-advantage%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i2.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2020/06/16/second-mover-advantage/</link>
      <guid>https://gru.gq/2020/06/16/second-mover-advantage/</guid>
      <pubDate>Tue, 16 Jun 2020 07:59:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[Modern Mass Media and Info War]]></title>
      <description><![CDATA[<p>This is fascinating… the 3rd largest media company, after Disney and Warner, is The Soul Publishing, and they’re pure online only. They produce dedicated content designed for Facebook and YouTube algorithms.</p><p>Why is that interesting? Well, for one, their content is lies (seriously, the debunking videos are hilarious: “wow, that cleaning solution made those sneakers perfectly white and go up a size!”) … but here’s where it gets interesting— it is owned by two Russians.</p><p>They produce in Cyprus and churn out 2700 videos a month to 65 million followers, including information topics, such as history, not just “harmless lying tutorials”. And they’re taking a pro Russian anti US editorial position.</p><p>Nothing wrong with that, of course, but if you want to talk about How To Do Disinformation these guys have solved: “ build an audience, gain credibility, have massive distribution”.</p><p>Here a debunking video, and it’s excellent.<br /><a href="https://www.youtube.com/watch?v=pvqa8dsBtno">Debunking The Soul Publishing Videos</a></p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIwXC8wNVwvMjlcL21vZGVybi1tYXNzLW1lZGlhLWFuZC1pbmZvLXdhclwvIn0%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2020%2F05%2F29%2Fmodern-mass-media-and-info-war%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i2.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2020/05/29/modern-mass-media-and-info-war/</link>
      <guid>https://gru.gq/2020/05/29/modern-mass-media-and-info-war/</guid>
      <pubDate>Fri, 29 May 2020 03:11:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[Zoom + Keybase]]></title>
      <description><![CDATA[<p>There is an opportunity here to signal that Zoom is not a Chinese asset.</p><p>Zoom can effectively remove itself from the board by completely mitigating passive surveillance. When no state’s intelligence agency benefits from a home field advantage with Zoom, then its value as a strategic cyber asset is massively reduced.</p><p>If Zoom eliminates the home field advantage it sends a powerful signal that they’re secure. This signal of commitment to user’s security is more important than the implementation. The implementation either works, or it doesn’t. And if it works it is invisible to the user.</p><p>The signal that is sent by destroying the home field advantage is a powerful declaration of intent. Such a bold public statement is described in the humanities as: an expensive signal.</p><p>The video conferencing terrain has become radically more important due to the coronavirus, but this criticality was inevitable. The coronavirus just accelerates the speed at which video conferencing’s strategic importance grows. Zoom is critical cyber social infrastructure.</p><p>The video conferencing terrain is strategically important for several reasons: business security and secrets; reporters and sources; privacy and safety for individuals; etc.</p><p>China has been collecting industrial espionage secrets for years now. Controlling a video conferencing system would be a huge boon to their passive surveillance collection efforts. Zoom can prevent this by taking itself off the board. This would signal to concerned potential users that Zoom is safe: it has no value as a Chinese intelligence asset.</p><p>If zoom creates a protocol that secures content and also limits the value of available metadata then regardless of where the physical servers and switches are, there is no passive surveillance benefit. The goal should be that NSA could run Zoom’s servers in their data centre and it would not alter the security and privacy guarantees of Zoom.</p><p>Remove the capacity to benefit from controlling Zoom’s infrastructure and it ceases to be an important strategic asset. Zoom will be more secure due to the strength of the protocol, but critically, also because it is no longer an attractive target.</p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIwXC8wNVwvMDhcL3pvb20ta2V5YmFzZVwvIn0%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2020%2F05%2F08%2Fzoom-keybase%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i2.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2020/05/08/zoom-keybase/</link>
      <guid>https://gru.gq/2020/05/08/zoom-keybase/</guid>
      <pubDate>Fri, 08 May 2020 12:44:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[A Map of 0day Deaths]]></title>
      <description><![CDATA[<h2>Collection Bias</h2><p><img src="https://i1.wp.com/gru.gq/wp-content/uploads/2020/04/image_bcb2fafe-6dc3-47a0-b04d-8b05a8bd6963.jpg?resize=2300%2C1533&amp;is-pending-load=1#038;ssl=1" alt="" width="2300" height="1533" data-recalc-dims="1" srcset="" class="jetpack-lazy-image" /></p><noscript>
<p><img src="https://i1.wp.com/gru.gq/wp-content/uploads/2020/04/image_bcb2fafe-6dc3-47a0-b04d-8b05a8bd6963.jpg?resize=2300%2C1533&amp;ssl=1" alt="" width="2300" height="1533" data-recalc-dims="1" /></p>
</noscript><p>This map does not show what FireEye claim it shows.</p><p>Israel, 1 0day? 8200 be slacking not hacking<br />Australia, 0 0days? ASD Aussie Slacker Directorate.</p><p>This is a map of 0day deaths where the death is attributed. Nothing more.</p><p>A map of attributed 0day deaths. It doesn’t even reflect operational methodology because Chinese and Russian operations face greater scrutiny than say, Australian operations. Indonesia isn’t dropping a lot of APT reports… Snugly Wombat is playing on safe ground.</p><p>Over the years covered by this dataset the detection capability of victims has changed. There is no consistency in the methodology of the collection, even with the same victims, year over year.</p><h2>Collection Bias</h2><p>A map of 0days caught in the wild and attributed back to threat actors seems like useful data. But it is not.</p><p>This data set is an example of a serious analytic error called “collection bias.” The data only reveals what was collected, not an accurate representation of the real world.</p><p>The distribution of 0days is a major indicator of how flawed this dataset is. Why does China have over three times more 0days than the US? The answer is immediately obvious: Chinese cyber operators are attacking environments that are monitored by multiple advanced threat detection companies. US cyber operators, typically, are not.</p><p>One way to think about collection bias is: a football game where statistics and goals are only kept for one side. Naturally the numbers won’t be useful for understanding the game. What they reveal is so distorted that only extremely careful analysis and cautious findings are possible. That is not the case with the FireEye report.</p><p>There is some merit to the theory that this map reveals operational methodology. Russia and China have different incentives regarding stealth than FVEY countries. But that is false.</p><p>The circumstances of the collection clearly reveal the problems with this interpretation. The Uzbekistan 0days were discovered only because of operator error. The Israeli 0day was from an attack that penetrated Kaspersky, only to later get detected by Kaspersky’s R&amp;D next generation product.</p><p>The lack of analytic rigour is transparent from just a plain reading of the text. The Israeli company NSO is cited as a reason for Uzbekistan having their 0day exploits. Yet the authors don’t consider the question of why Israel has only 1 0day but Uzbekistan has 3.</p><p>Surely NSO has provided exploits to their own government? Even if not, the exploit developers for NSO must have come from somewhere, or gone to work somewhere. After all, it is common knowledge that Unit 8200 creates and uses exploits.</p><h2>Errors from Analytic assumptions</h2><p>Uzbekistan’s use of 0days wouldn’t be known except for an operator error. Clearly countries that don’t get caught by similar mistakes aren’t included. Therefore Uzbekistan is a sort of “self selection” bias.</p><p>The inclusion of such poorly sourced data just raises further questions such as: what other 0day does Uzbekistan have that they haven’t exposed via mistakes?</p><h2>Detection Efficacy Bias</h2><p>Over the years covered by the research study the capability to detect 0days has improved significantly. The number of 0days detected would be expected to increase over the duration of the studied period.</p><p>Some 0days, such as Uzbekistan’s, were discovered due to user error. There is no way to quantify accidents.</p><h2>Conclusion</h2><p>This dataset is too flawed to be of any value whatsoever.</p><p>The assumptions behind this report, that the data reflects an accurate approximation of 0day use globally, or by each threat actor over time, are baseless. The data is thoroughly contaminated by biases.</p><p>Casualty bias — the opposite of survivor bias. Only failures are counted. Combined with selection bias, only sampling a subset of threat actors’ 0day capabilities — those that were detected by antivirus or threat intelligence companies. The result is an over emphasis on countries that conduct cyber operations in the US and Europe.</p><p><a href="https://www.wired.com/story/zero-day-hacking-map-countries/">This Map Shows the Global Spread of Zero-Day Hacking Techniques | WIRED</a></p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIwXC8wNFwvMThcL2EtbWFwLW9mLTBkYXktZGVhdGhzXC8ifQ%3D%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2020%2F04%2F18%2Fa-map-of-0day-deaths%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i2.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2020/04/18/a-map-of-0day-deaths/</link>
      <guid>https://gru.gq/2020/04/18/a-map-of-0day-deaths/</guid>
      <pubDate>Sat, 18 Apr 2020 13:03:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[Forgotten Tricks of Trench Warfare]]></title>
      <description><![CDATA[<p>The German sandbags were a variety of colors, black, pink, yellow, beige, green, etc. They were not arranged in orderly patterns, but scattered haphazardly throughout the parapet. The belief was that the cacophony of contrasting colors made it harder for the human visual processing system to make sense of what it saw. Optical illusions and confusion were the natural result of a chaotic visual display. It was effective.</p><p>The Germans were the first to deploy steel plates with loopholes for their snipers to shoot through. These bulletproof shields provided effective cover against small arms fire. In particular, the small loophole was a tiny target for a counter sniper to hit, making the Germans feel quite safe during the early phases of the sniping war.</p><p>The British adapted to counter the sniper shields by using large bore big game guns, which packed significantly more wallop than the standard issue army .303. Imagine, there’s some German sniper sitting snug behind his steel shield while an English big game hunter is taking aim with an elephant gun! Later custom sniper and game rifles were also capable of penetrating the single layer steel shield.</p><p>The ultimate form of the sniper shield was a sort of steel box, with a plate in front and another behind. The secondary plate was installed at an angle, so that any bullet penetrating the front plate would strike a glancing blow and be deflected away.</p><p>In addition to having the second plate, the loopholes of the two plates were slightly misaligned (as appropriate for the shot) thus making a countersniper shot far more difficult.</p><p>These strong armaments and fortifications were one of the big reasons that dealing with snipers was frequently left to artillery. Once the sniper nest was located, observers would monitor it for activity and call in a barrage when it was occupied.</p><p>Countersniping is either a fencing duel of supreme marksmanship and skill, or a millstone dropped on an egg.</p><p>A major mechanism of finding sniper nests was to map the trajectory of bullets back to their source. In principle the idea is simple: have a sniper shoot a three dimensional object, leave the object in situ, and sight down the holes created by the bullets passage. The sniper nest will be located somewhere along that trajectory.</p><p>The simplest implementation of this trick was leaving shiny tin cans, or other enticing targets for snipers to zero their sights on at the front. Germans would leave cans on the parapet for snipers to shoot at. Due to the high contrast and easy visibility of these targets, they were attractive for naive snipers to use while adjusting their sights. A grave and often fatal error.</p><p>The recommended target to use when adjusting sights was a puddle of water with a reflection on it. This would allow the sniper to adjust accurately, while providing no side channel metadata about the source of the bullet to any observers.</p><p>A more sophisticated and specialized counter sniper device was created by the British. The device consisted of a target lure and a wooden base with a groove for a rod holding the target. This allowed the elevation of the target to be marked and duplicated after the sniper took the bait. The target itself was a paper mache head that was painted in lifelike colors, and which was further enhanced with helmet or field cap, and other accessories to make it appear more genuine. One important addition was a cigarette adapter, literally a flexible tube that allowed the scout to smoke a cigarette stuck through the dummy’s mouth. A periscope could be affixed alongside the head to allow the scout to manipulate the dummy head and observe the environment.</p><p>The scout would raise the head above the trench and attempt to get shot by a German sniper. Apparently the sensation of a bullet slamming into a target held mere inches above your head while you were smoking through it was rather bracing.</p><p>Once the lure target had been shot, it was retracted below the parapet. A trajectory for the bullet was determined, and then a trench sniper rifle could be lined up, raised the appropriate hight (based on the elevation of the target as recorded by the support rod), and a counter sniper could attempt to shoot back, or more likely, once the sniper nest was located, call in an artillery strike.</p><p>The British created a sniper shield, a steel plate system, that was extremely highly regarded. Firstly, it was the box configuration, with two protective plates and two loop holes for firing. Secondly, the front plate was covered with the partially filled sides of sandbags so that it was indistinguishable from any other forward face of sandbags. During the night a hole would be created in the British parapet and the sniper shield substituted for a portion of the parapet. Once in place, it was perfectly concealed as just a part of the hundreds of thousands of sandbags on the front.</p><p>It was found that not only did a sniper have to be accurate, but that most opportunities for shots where only a couple of seconds. The target had to be acquired and shot in two seconds. This was a major challenge.</p><p>It was not enough to be good, you had to be fast.</p><p>The observer scouts located targets for the sniper, and confirmed whether there was a hit or a miss. It was an important lesson learned that a lethal shot would mostly cause the victim to pitch forwards, rather than backwards. Officers with binoculars were favorite targets, and so the general rule of thumb was that if the binoculars fell towards the British lines then the target was killed. If they fell backwards, then the target was alive, either ducking out of sight or wounded.</p><p>Scout observations of a cat appearing on the enemy parapet over a period of time led to speculation that there was a new dugout for officers. Officers would have a cat to deal with the rats in the trenches. Aerial reconnaissance was ordered over the suspected area and comparisons with previous photographs revealed that a new dugout had been constructed in that location. It was promptly shelled.</p><p>A WW2 anecdote, rather than WW1.</p><p>The Italian front.</p><p>Artillery fired PSYOPS pamphlets over the German positions at lunchtime everyday. As standard operating procedure, the artillery barrage was then postponed for 10-15 minutes so that, according to the propaganda theorists, the enemy could collect the pamphlets. The Germans would dutifully clamber out of their trenches, collect the pamphlets, have a cigarette and a shit, use the pamphlets as toilet paper, and then return to their fortifications. After this had gone on for a while, the American GIs got pretty pissed off about it, and so the artillery men decided to take advantage of the German behavior.</p><p>First a shower of pamphlets went over. The Germans hopped out and gathered their toilet paper, got their cigarettes, dropped their trousers and began their noon time ritual. A couple of minutes after the pamphlets, the artillery boys started up a barrage, catching the Germans literally with their pants down.</p><p>Apparently the Germans in that sector never quite forgave the Americans and it was unusually hot for a long time.</p><p>Takeaway: true deception is to control the enemy. This operation, although born out of frustration rather than stratagem, still enabled the Americans to control German actions and place them at an extreme disadvantage.</p><p>The approved method to clear a trench was to have two men with bayonets on their rifles, and a few men behind them. Throw a few grenades into the next section of the trench then have the lads with bayonets charge in. Of course the danger with this was that the enemy might decide to throw a few grenades at your lot first. So it would go back a forth over a few sections, each time either side losing two or three men until eventually you tire of the game.</p><p>The method that actually worked was to get a few boys with rifles up on the parapet and have them shoot down into the trenches, killing everyone they could. Faster, more efficient, and no silly buggers with grenades flying back and forth.</p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIwXC8wMlwvMTJcL2ZvcmdvdHRlbi10cmlja3Mtb2YtdHJlbmNoLXdhcmZhcmVcLyJ9&amp;utm_source=https%3A%2F%2Fgru.gq%2F2020%2F02%2F12%2Fforgotten-tricks-of-trench-warfare%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i2.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2020/02/12/forgotten-tricks-of-trench-warfare/</link>
      <guid>https://gru.gq/2020/02/12/forgotten-tricks-of-trench-warfare/</guid>
      <pubDate>Wed, 12 Feb 2020 16:27:00 +0100</pubDate>
    </item>
    <item>
      <title><![CDATA[Iran in the membrane]]></title>
      <description><![CDATA[<p>It is hard to see the assassination of Soleimani as anything but an act of war. Killing the second most important politician, and top military leader, of a foreign state outside of a war zone is essentially a de facto declaration of war. The saving grace here is that the US doesn’t actually want a war with Iran, and the Iranians are not prepared for a war.<br /><img src="https://i0.wp.com/gru.gq/wp-content/uploads/2020/01/image_a9651ba3-c77f-4d59-9ae5-d7a0551e0815.jpg?resize=500%2C500&amp;is-pending-load=1#038;ssl=1" alt="" width="500" height="500" data-recalc-dims="1" srcset="" class="jetpack-lazy-image" /></p><noscript>
<p><img src="https://i0.wp.com/gru.gq/wp-content/uploads/2020/01/image_a9651ba3-c77f-4d59-9ae5-d7a0551e0815.jpg?resize=500%2C500&amp;ssl=1" alt="" width="500" height="500" data-recalc-dims="1" /></p>
</noscript><br />(Everyone with clearance reading this)<p>The Iranians will retaliate. Everyone is worried about cyber retaliation, but cyber is not a proportional response to murdering a top political leader. The Iranians are in an elite club, they have successfully conducted major covert operations in the Americas. They can “reach out and touch someone” if they need too. It’s unlikely they will, but the capability of the Iranians shouldn’t be dismissed.</p><p>Iran is actively conducting cyber operations now, just as they have in the past, and just as they will in the future. Although I did predict the nature of an Iranian cyber attack would likely be destructive and targeted at key US economic sectors, that is just linear extrapolation of their previous activities. I don’t think any Iranians will view flicking the lights in the US as a proportionate response. Nothing short of kinetic retaliation will suffice.</p><p><a href="https://twitter.com/thegrugq/status/1213030922473197568?s=21">https://twitter.com/thegrugq/status/1213030922473197568?s=21</a></p><p>The first cyber operation by Iran that is detected after the assassination of Soleimani is going to be labeled by the media as a retaliatory cyber war attack. It is a self fulfilling prophecy, but while it might resonate with audiences in the West, it will almost certainly not be viewed the same way by Iran and her proxies.</p><p>Important events to look out for right now:</p><ul><li>The Iraq government is about to vote on allowing US troops to remain in Iraq. There is a very strong possibility that support for this is too toxic, and they US will be asked to leave</li>
<li>The Saudi oil facilities are essentially as resilient as moon bases. They’re artificial environments that need everything delivered to them in order to operate. A serious Iranian missile attack could make them untenable.</li>
<li>Syrian deployment of US troops is only possible with troop bases in Iraq and cooperation from Turkey. This could very well be the end of a US military presence in both Syria and Iraq. Poor Kurds.</li>
</ul><p>Cyber options leave a lot on the table. The US has been getting slammed with ransomware attacks against all sorts of civil infrastructure. That could easily be stepped up with a NotPetya style destructionware payload.</p><p>Another option for cyber that is very interesting is going after television news channels. In this case Fox News seems most likely. One option is using cyber intelligence collection to find blackmail leverage against key operators (eg hosts, editors, etc) at Fox News.</p><p>Actual pure cyber manipulation of Fox News could be done in a couple ways:</p><ol><li>insert a video clip for a segment, as was done in Spain. This seems like it would be noticed early and I can’t see it being 2-3m long… it would be cut quickly I think</li>
<li>access to the chyron. Sending messages via the chyron TBH, it is “easier” but I don’t think it would be that effective. No one reads anything.</li>
</ol><p>Attacking Fox News has the benefit of being high visibility but not very escalatory. A high reward low risk operation that is also easy to accomplish seems like a good response. The attack is trivial. Which is more likely to win, a news channel’s cyber security team, or a nation state’s intelligence forces?</p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDIwXC8wMVwvMDRcL2lyYW4taW4tdGhlLW1lbWJyYW5lXC8ifQ%3D%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2020%2F01%2F04%2Firan-in-the-membrane%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i0.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2020/01/04/iran-in-the-membrane/</link>
      <guid>https://gru.gq/2020/01/04/iran-in-the-membrane/</guid>
      <pubDate>Sat, 04 Jan 2020 06:17:00 +0100</pubDate>
    </item>
    <item>
      <title><![CDATA[Books I read and recommend. 2019]]></title>
      <description><![CDATA[<p>In no particular order, here are some of the books I read over the last year.</p><ul><li>Dope by Sara Gran</li>
<li>jade war</li>
<li>cry pilot</li>
<li>the first stone</li>
<li>the city in the middle of the night</li>
<li>every heart a doorway</li>
<li>a memory called empire</li>
<li>Goshawk squadron</li>
<li>The friends of Eddie coyle</li>
<li>Mole by William hood</li>
<li>Here be dragons</li>
<li>The last will and testament of Ernie politics</li>
<li>Someone owes me money</li>
<li>Shantarum</li>
<li>Beat the reaper</li>
</ul><ul><li>Outwitting the gestapo</li>
<li>Deciphering Sun Tzu.</li>
<li>The Wheel: invention and reinvention</li>
<li>Quartered safe out here</li>
<li>Say nothing: a true story of murder and memory in Northern Ireland</li>
<li>A force like no other</li>
<li>Circle of treason</li>
<li>The art of war – Sun Tzu</li>
<li>The art of war – Sun Bin</li>
<li>Willie and joe: the WWII years</li>
<li>One soldiers war</li>
<li>A rifleman went to war</li>
</ul><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDE5XC8xMlwvMjBcL2Jvb2tzLWktcmVhZC1hbmQtcmVjb21tZW5kLTIwMTlcLyJ9&amp;utm_source=https%3A%2F%2Fgru.gq%2F2019%2F12%2F20%2Fbooks-i-read-and-recommend-2019%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i0.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2019/12/20/books-i-read-and-recommend-2019/</link>
      <guid>https://gru.gq/2019/12/20/books-i-read-and-recommend-2019/</guid>
      <pubDate>Fri, 20 Dec 2019 06:22:00 +0100</pubDate>
    </item>
    <item>
      <title><![CDATA[DPRK 2020]]></title>
      <description><![CDATA[<p>https://abcnews.go.com/Politics/wireStory/iranian-official-denies-plans-interfere-us-election-65929393</p><p><a href="https://slate.com/news-and-politics/2019/10/republican-party-collusion.html">Republicans are fine with Trump’s Ukraine collusion.</a></p><p>Preventing foreign states from interfering with the 2020 US presidential election is a lost battle. There is no reason for any of them to stay out, and many are even incentivised to control the outcome regardless of the repercussions.</p><ul><li>2020, elections, open season, DPRK and let the fat kid play.</li>
<li>Incentives
<ul><li>KJU will never do better than Trump</li>
<li>Biden said a bad thing about DPRK, their analysis will be ?</li>
<li>KJU knows that anyone except Trump is a loss for KJU</li>
</ul></li>
<li>Outcomes
<ul><li>Trump wins — the Carrot
<ul><li>best: KJU gets even more,</li>
<li>worst: no change</li>
</ul></li>
<li>Trump loses — the stick
<ul><li>If KJU did nothing, he is going to get the stick</li>
<li>If KJU did something, he is going to get the stick</li>
</ul></li>
<li>Question: what is the stick?
<ul><li>More sanctions? Clearly not particularly motivational</li>
<li>Cyber retaliation? There’s nothing that is proportionate</li>
<li>Kinetic retaliation? Nothing is proportionate in that tinder box, and, oh yeah, nukes and icbms</li>
<li>Conclusion: there is no stick</li>
</ul></li>
</ul></li>
<li>The US possesses no deterrent to keep KJU from unleashing Lazarus group on the 2020 elections
<ul><li>Cyber as a domain intersects with the real world at several different layers:
<ul><li>physical ICS,</li>
<li>pragmatic work personal,</li>
<li>informational,</li>
<li>cultural and social.</li>
</ul></li>
<li>Vulnerability in the cyber domain is asymmetric, every one, every thing, every group, organization, nation, etc has a different vulnerability profile.</li>
<li>Capability in the cyber domain is roughly symmetrical, everyone gets the cyber they can afford</li>
<li>Capacity in cyber is also symmetrical, because scale is not coupled to headcount. One excellent hacker can write an exploit for a thousand mediocre hackers to use.</li>
<li>Proportional deterrence in the cyber domain is very unlikely, and ever so it is still a risk things will escalate to kinetic</li>
<li>Really, the only deterrent against operations in the cyber domain are operations outside the cyber domain
<ul><li>Diplomatic sanction don’t work against DPRK</li>
<li>Kinetic is right out,</li>
<li>Or, the US’s “defend forward”, aka preemptive attacks. Rise and kill first. Will CYBERCOM pull the plug on Lazarus? How will DPRK respond to that? That’s definitely escalatory
<ul><li>Broader point, the only deterrent against cyber in the cyber domain is preemption. Other deterrents are politics and politics by other means.</li>
</ul></li>
</ul></li>
<li>The decision to cyber 2020 is entirely up to DPRK decision makers. And China.
<ul><li>China, I suspect, wants a more stable president to deal with. It is hard enough making a 40 year plan without reality flipping about just because someone ate a shrimp cocktail after midnight and now has heart burn while watching Fox News at 2am.</li>
</ul></li>
<li>The US has zero influence against a hostile state that has the means, the motives and the opportunity to cause them harm.
<ul><li>The old war maxim “the enemy gets a vote” is, in this case, “only the enemy gets a vote”</li>
</ul></li>
</ul></li>
<li>The question is then, why wouldn’t KJU go full spectrum cyber on 2020? Follow up, what is the range of real capabilities the Lazarus group could bring to bare? They have history and they have had ample time to study Russian methods from Georgia, Ukraine, US, France, Britain, etc etc. Wide range of real campaigns to study, including very recent ones in their target country.
<ul><li>Known set of capabilities and established MOs</li>
<li>Does not appear to have an American whisperer, so they will probably misunderstand</li>
</ul></li>
</ul><ul><li>Lazarus has a particular style
<ul><li>“retro rm -rf chic”</li>
<li>Sony, dumping email spools</li>
<li>Manual, crude, determined and with mission.</li>
<li>Guess is they’ll be loud and simple.</li>
</ul></li>
<li>Russia was voluminous, attempted subtly, had a lot of resources involved, ran multiple concurrent independent operations.</li>
</ul><p>https://twitter.com/kevincollier/status/1138963156078870529?s=21</p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDE5XC8xMlwvMDhcL2RwcmstMjAyMFwvIn0%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2019%2F12%2F08%2Fdprk-2020%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i0.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2019/12/08/dprk-2020/</link>
      <guid>https://gru.gq/2019/12/08/dprk-2020/</guid>
      <pubDate>Sun, 08 Dec 2019 00:24:00 +0100</pubDate>
    </item>
    <item>
      <title><![CDATA[Baltic Counter Disinformation]]></title>
      <description><![CDATA[<p>Here is a slightly rearranged version of this defense one article. I’ve emphasized the main lines of Russian disinformation and how Lithuania deals with them.</p><p>As always the interesting thing is the techniques that are used to make false information appear legitimate. Here the Russians use a one-two-three approach:</p><p>1.</p><p>Source: https://www.defenseone.com/technology/2019/12/russian-trolls-are-hammering-away-natos-presence-lithuania/161654/</p><h2>Jewish New Year Spoiler</h2><blockquote>
<p>On Sept. 25, Russian operatives posted online a fake news story that claimed that German soldiers, operating as part of NATO, had desecrated Jewish gravestones with swastikas in Kaunas. The publication was timed to a meeting between Lithuanian President  <a href="https://www.google.com/search?rlz=1C5CHFA_enUS795US795&amp;sxsrf=ACYBGNS-phvL-bfwOG7e25OJRBB-eJGODg:1575403243238&amp;q=Gitanas+Naus%C4%97da&amp;stick=H4sIAAAAAAAAAONgVuLWT9c3NDIqyynJqnjE6M4t8PLHPWEpu0lrTl5jtODiCs7IL3fNK8ksqRTS4mKDshS4-KWQ9WkwSPFyIQvwLGIVcM8sScxLLFbwSywtPjI9JREAi-w3imwAAAA">Gitanas Nausėda</a> and members of the U.S. Jewish community, as well as a meeting between the Lithuanian foreign minister and members of the Lithuanian Jewish community (in anticipation of the Sept. 29 Jewish New Year).<br />The following day, the operatives emailed the fake story several English-language news sources, including <em>The Jewish Press, Jewish National News,</em> and<em>Infos Israel News</em>;and even contacted Nausėda’s office, pretending to be Lithuanian journalists*.*The former removed the material after it was contacted by the Lithuanian government but the damage was already done.<br />Finally, the operatives hacked into a genuine news organization, <a href="https://kasvyksta.lt/">kasvyksta.lt</a> , and posted about the fake story on Sept. 26 and 27, according to Eugenijus Lastauskas, who runs the Lithuanian military’s Strategic Communication Department. </p>
</blockquote><h2>Fear of nuclear retaliation</h2><blockquote>
<p>On Oct. 17, Russian operators again broke into kasvyksta.lt and posted a new story about purported U.S. plans to move nuclear weapons to Lithuania. They also sent fake emails purporting to be from known journalists to Nausėda’s office and other officials, looking for official comment on the fake story. Back in Russia, the story was circulated widely across social media channels. The next day, hackers again targeted legitimate media outlets to deface them in order to carry false news. Journalists well outside of Russia were targeted with emails made to look like they were from members of the Lithuanian government.<br />The attackers even drew up a fake tweet from U.S. Secretary of State Mike Pomepo “congratulating” the Lithuanian president on the news of the move of the nuclear weapons, despite U.S. policy not to disclose the location of nuclear weapons outside of the United States.</p>
</blockquote><h3>Objective</h3><blockquote>
<p>The objective, said Lastauskas, was the convince Lithuanians that they would be targets for Russian nuclear retaliation if hostilities break out. </p>
</blockquote><h2>Notes on Attacks</h2><p>Notice how every attack is conducted across multiple fronts on concert. Directly emailing major stakeholders, under a variety of pretexts: “I’m a major journalist, do you have any comments on this story?”; “have you seen this story?”.</p><p>Posting false stories beforehand provided a reference version. It was not expected to stand alone though.</p><p>Legitimate news websites were hacked and defaced with false news articles that corroborated the original fake news release.</p><h2>Narrative Themes</h2><h3>Line: State is failing</h3><blockquote>
<p>The Russian government pursues disinformation campaigns along several lines of effort.  “The first line is basically… to show that the state is failing, not delivering as the people would expect,” he said.</p>
<p>In terms of politics, “that gets inflated to an enormous level,” he said. It “goes as proof of state ineffectiveness…Your past is criminal, your present is miserable, no future.” The ultimate objective is “to show the state is not worth it.”</p>
</blockquote><h3>Line: nato is a threat</h3><blockquote>
<p>another line of effort is far more targeted directly at NATO. It “portrays NATO forces as a threat to society, a threat to civilians,” he said.</p>
<p>NATO itself is more limited in its ability to respond to Russian disinformation aimed at the alliance as a whole or at a single country such as Lithuania.</p>
</blockquote><blockquote>
<p>The Lithuanian government uses a variety of tools to spot Russian disinformation campaigns, Lastauskas said. “There are certain attacks where they are provoking a reaction,” he said, declining to go into detail out of operational concerns. </p>
</blockquote><blockquote>
<p>Once we’ve identified that there is fake information… that could potentially harm our interests, we deconstruct it. We try to kind of identify, is it really fake? How was it created? What is the target audience it is trying to connect [to], and then there is a discussion between the different ministries where we identify what needs to be done next,”</p>
</blockquote><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDE5XC8xMlwvMDdcL2JhbHRpYy1jb3VudGVyLWRpc2luZm9ybWF0aW9uLTJcLyJ9&amp;utm_source=https%3A%2F%2Fgru.gq%2F2019%2F12%2F07%2Fbaltic-counter-disinformation-2%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i0.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2019/12/07/baltic-counter-disinformation-2/</link>
      <guid>https://gru.gq/2019/12/07/baltic-counter-disinformation-2/</guid>
      <pubDate>Sat, 07 Dec 2019 08:58:00 +0100</pubDate>
    </item>
    <item>
      <title><![CDATA[Wilderness of Mirrors .co.uk]]></title>
      <description><![CDATA[<p>Barebones recap of the story so far: Jeremy Corbyn waved a copy of the publicly released redacted NHS documents during a debate with Boris Johnson. At a later date Corbyn held a press conference to wave around the unredacted version. The unredacted version has been available on Reddit for 5 weeks, and was pushed on Twitter (as well as 4chan’s /pol/) 4 weeks ago. No one cared about these leak events until they were discovered by journalists. Now these failed attempts are important.</p><h2>Info Ops and the NHS doc leak</h2><p>The origin of the NHS document leak that Corbyn has been waving around is starting to become the story. Who is behind the leak? Is it Russian disinformation? Are the GRU meddling in the election? Everyone is hunting for clues and publishing whatever they find. But raw data without rigorous analysis is not intelligence. Let’s do some analysis with what is known right now and try to produce some intelligence.</p><h2>Easy Answers to Easy Questions</h2><ul><li>Is the leak of the NHS document an information operation?
<ul><li>Yes. Releasing non public information in an attempt to influence politics is definitely an info op. That doesn’t mean it is a professional info op by a state backed intelligence agency</li>
</ul></li>
<li>Is the NHS leak Russian disinformation?
<ul><li>No. Emphatically not. The redacted version was released publicly, and the unredacted version has not been identified as fraudulent. There is no disinformation campaign around the document (yet.)</li>
</ul></li>
<li>Who is behind the leak?
<ul><li>I don’t know, and neither does anyone else writing about it in public. We’ll try to figure out what we can from the details available.</li>
</ul></li>
<li>Are the GRU meddling in the election?
<ul><li>I’d be surprised if they weren’t doing something. I’d be surprised if they were orchestrating this NHS leak. They have demonstrated superior tradecraft and the amateurishness of this leak would be a departure for them.</li>
</ul></li>
</ul><h2>The Right Questions</h2><p>There is only one question that really matters about the origin of the document leak:</p><blockquote class="wp-block-quote is-style-large">
<p><em>Is the leaker a private individual, or an organisation (in particular, a state intelligence agency)?</em></p>
</blockquote><p>Creating a matrix for an Alternate Competing Hypothesis analysis is pretty easy when there are only two options.</p><h2>The ACH Matrix</h2><figure class="wp-block-table is-style-stripes"><table class=""><tbody><tr><td><strong>DATA</strong></td>
<td class="has-text-align-left" data-align="left"><strong>INDIVIDUAL</strong></td>
<td class="has-text-align-left" data-align="left"><strong>PROFESSIONALS</strong></td>
</tr><tr><td>Targeting failures: Reddit</td>
<td class="has-text-align-left" data-align="left">?</td>
<td class="has-text-align-left" data-align="left">?</td>
</tr><tr><td>r/WikiLeaks [deleted]</td>
<td class="has-text-align-left" data-align="left">?</td>
<td class="has-text-align-left" data-align="left">?</td>
</tr><tr><td>r/worldnews</td>
<td class="has-text-align-left" data-align="left">?</td>
<td class="has-text-align-left" data-align="left">?</td>
</tr><tr><td>No r/UKpolitics</td>
<td class="has-text-align-left" data-align="left">?</td>
<td class="has-text-align-left" data-align="left">?</td>
</tr><tr><td>
</td></tr><tr><td>English grammar mistakes and such.</td>
<td class="has-text-align-left" data-align="left">?</td>
<td class="has-text-align-left" data-align="left">?</td>
</tr><tr><td>
</td></tr><tr><td>Packaging: 451 pages, no press pack, limited highlighting</td>
<td class="has-text-align-left" data-align="left">?</td>
<td class="has-text-align-left" data-align="left">?</td>
</tr><tr><td>
</td></tr><tr><td>Twitter: spamming the @’s of major accounts</td>
<td class="has-text-align-left" data-align="left">?</td>
<td class="has-text-align-left" data-align="left">?</td>
</tr><tr><td>
</td></tr><tr><td>No evidence of direct emails to stakeholders (journalists, political parties, professional leakers.)</td>
<td class="has-text-align-left" data-align="left">?‍♂️</td>
<td class="has-text-align-left" data-align="left">?‍♂️</td>
</tr></tbody></table></figure><h2>Analysis</h2><p>There is insufficient evidence available to rule out either hypothesis. There are glaring mistakes that indicate amateur hour:</p><ol><li><strong>Bad targeting</strong>:
<ol><li>posting to r/WikiLeaks (with bad Reddit Markdown) and then taking it down, is strange for an organisation. They usually prepare and have a plan, and don’t change things up on the fly (that is how mistakes are made.)</li>
<li>posting to a large subreddit, r/worldnews, that doesn’t care that much about UK politics is poor targeting. However, it could go either way.</li>
<li>not posting on the most relevant subreddit is a serious lapse in targeting. Failure to correct this oversight later, when it was clear that the leak attempt had failed, seems particularly bad for an agency.</li>
<li><em><strong>Gut Feel</strong></em>: There is no conclusive data to rule either way, but the general sense is “someone tries to leak on Reddit, fails, gives up.” That is not how professionals operate. This leaker doesn’t know how to leak.</li>
</ol></li>
<li><strong>English Mistakes</strong>:
<ol><li>Although some people are making a big deal of this, I don’t think it points either way. It definitely doesn’t falsify either hypothesis. The mistakes are suggestive of a Slavic language speaker, which is intriguing, but what can we draw from that?</li>
<li><strong><em>Gut Feel</em></strong>: Nothing of consequence.</li>
</ol></li>
<li><strong>Bad Leaking Technique</strong>:
<ol><li>The leaker seems to be operating on an “if you leak it, they will come” approach. They are unaware of the amount of leg work necessary for effective leaking. Firstly, the data must be packaged to make it easier for the receiver to process it rapidly and see why it is important. That means, essentially, there has to be a press pack — summary, why this matters, what this shows, who is liable.</li>
<li>The bad packaging is coupled with bad releasing. Successful leaks have either recruited an established stakeholder to champion the leak and guide it into the headlines, or they have flooded the input channels for the target stakeholders.</li>
<li>This leaker did not flood the input channels, they made only a few Reddit posts then vanished. They did not package the data for easy leak consumption. They apparently did not directly contact potential leak champions to drag the data into the headlines.</li>
<li><strong><em>Gut Feel</em></strong>: Amateur hour, again. Spamming the mentions of major Twitter accounts with a link to the Reddit post is basically a Hail Mary leak attempt. There are many more effective options that to resort to basically just begging should be unnecessary.</li>
</ol></li>
</ol><h2>Tentative Conclusion</h2><p>There is no hard evidence to support, or nullify, either hypothesis. As a result, no solid conclusion can be made. However, the poor leak technique and indications of poor planning, hesitation, second guessing, and nothing but Hail Mary attempts on Twitter “<em>feels</em>” like an amateur to me.</p><p>Intelligence agencies, indeed many organisations, are well versed in publicising data that they want to promote. They know to interact directly with journalists, or other stakeholders. They know how to package content to make it more palatable for the people that will have to consume it. This leaker appears to have done none of the things that would help to make the leak successful.</p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDE5XC8xMVwvMjlcL3dpbGRlcm5lc3Mtb2YtbWlycm9ycy1jby11a1wvIn0%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2019%2F11%2F29%2Fwilderness-of-mirrors-co-uk%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i0.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2019/11/29/wilderness-of-mirrors-co-uk/</link>
      <guid>https://gru.gq/2019/11/29/wilderness-of-mirrors-co-uk/</guid>
      <pubDate>Thu, 28 Nov 2019 19:23:00 +0100</pubDate>
    </item>
    <item>
      <title><![CDATA[This is Literally Propaganda]]></title>
      <description><![CDATA[<blockquote class="wp-block-quote is-style-large">
<p>Propaganda is a form of communication that attempts to achieve a response that furthers the desired intent of the propagandist.</p>
<div><cite>[1]</cite></div></blockquote><p>The recent publication of <em>This Is Not Propaganda</em> [2] has created a lot of buzz amongst aficionados of disinformation and digital propaganda. I haven’t read the book yet, and I’m sure this isn’t Pomerantsev’s fault, but I’m noticing a particular misconception getting tossed around in the hype. According to this bad take, the root of all our current problems with deception and information-ecosystem collapse is that the internet has given common people access to a lot of information. Supposedly in the good ol’ days of 1998, most people relaxed in the soothing prehistoric darkness just like they did in 10,000 BC, unburdened by the complexities of multiple competing sources of news and knowledge… when suddenly the Internet changed everything by giving them more channels and turning their brains into festering cesspools of Too Much Information. </p><blockquote class="wp-block-quote">
<p>“In the 1960s, there were great hopes that the computer would somehow solve the problem of this accelerated rate of change, especially because of its ability to handle the vast amounts of information becoming available, and that it would therefore simplify the increasing complexity of life. But a computer, like any other decision-making apparatus, is only as good as the <em>quality</em> of information it receives. Today, the speed at which information travels, whether in ‘cyberspace’ or on what is termed ‘real-time’ television, does not automatically produce a situation conducive to sensible, considered decisionmaking.”</p>
<div><cite>[3]</cite></div></blockquote><p>But this is wrong. News and information in general was never the purview of only the elites. Commoners have had good access to information at least since the 1500s when the first “real” newspaper was printed. Even before that, commoners were informed by couriers, travelers, town criers, family members, bartenders, barbers, preachers, etc. This venerable network of interpersonal news dissemination was so pervasive that it is partially preserved in language: in many European languages, “What news?” is still a recognizable, if archaic, form of greeting, because person-to-person social contact was such an important means of networking news. <br /></p><blockquote class="wp-block-quote">
<p>“The Reformation was Europe’s first mass-media news event. The quantity of books and pamphlets generated by interest in Luther’s teaching was quite phenomenal. It has been estimated that between 1518 and 1526 something approaching eight million copies of religious tracts were placed on the market. This was a very one-sided contest. Luther and his supporters were responsible for over 90 per cent of the works generated by the controversy.”</p>
<div><cite>[4]</cite></div></blockquote><p>I point to the 1500s (in Europe, at least) because the first media revolution, the first sharp increase in mass access to information, came from the invention of the printing press. At first, there was a heavy religious slant to the output of the presses—official edicts were basically the staple market for their services, and (then, as now) the economics of the business influenced all the content. And so with mass printing came hundreds of years of religious wars. Jan Hus was the original reformer, but Martin Luther is the one who took off. Mostly because of his publicity gained by his writing. He was a prolific writer of religious texts, and he was probably the most popular author of the time. The invention of the book cover is sometimes attributed to Martin Luther’s pamphlets. Printers started putting woodcut graphics on the front page so customers could rapidly identify his works. </p><figure class="wp-block-image">
<p><img src="https://lh6.googleusercontent.com/YMlipEcAxHWsa-uK7pCVJsZbqOr2h3Y-BygqeGi5Fi4qc4Rxl-hfkZgojCnemG9RwCESsd62SQjAXPk7kq6nBkXJifAqQGCNkorXZrHefBaWAhCe4b8-UBXNZj1HFoVY2lV2dZPU" alt="" /></p>

<figcaption>Front cover of a Martin Luther pamphlet [4]</figcaption></figure><p>In any case, even the recent media revolutions haven’t all revolved around the Internet. Remember Desktop Publishing? It’s hard to remember now, but it was a big enough deal in the 1980s that some of the companies it raised to prominence are still significant, to say the least (you’ve heard of “Apple”?) The rise of cable TV fragmented the news market into niche groups, and created the idea of “real-time news” (no, Twitter did not invent real-time news, sorry Jack.) This meant there was no longer time for analysis, just reporting “as-is”, sometimes practically even stream-of-consciousness, so the news ecosystem became a “release-and-patch-later” system. With all the problems that go with that model.<br /></p><blockquote class="wp-block-quote">
<p>‘Multichannel systems…have fragmented the audience into narrow niches based on taste, hobbies, avocations, race and ethnicity.’ 52 And this process is likely to continue as individuals become increasingly able to import the information and entertainment that meets their needs as individuals rather than as members of the mass.</p>
<div><cite>[3]</cite></div></blockquote><p>When the Internet finally did arrive, the truly disruptive revolution wasn’t access to information; it was the final unification of all the previous revolutions: the niche audiences and frenetic pace of cable TV news, coupled with the “desktop publishing” democratization of access to audiences, taken to the extreme, where broadcast platforms became essentially free.</p><p>The economic factors are one of the most important ways the Internet has impacted the news media: this lowering of the bar for broadcasting devastated advertising markets. Newspapers, the first news broadcast medium of the 1500s, remained relevant in the cable-news era by differentiating themselves as the last stronghold of thoughtful analysis. As a result, they became the gold standard for establishing credibility. Then the internet blew up advertising and made newspapers much less relevant for accessing advertising markets. They’ve lost significant revenue and have been drastically cutting staff. Many have shut down. But the crucial thing is that newspapers remain the major source of credibility. The news validates a story by covering it, and once a story is in mainstream newspapers, then it is more or less universally accepted as “true” and “important”. <br /></p><blockquote class="wp-block-quote">
<p>…the chroniclers also reveal a profound concern that the events they record should be credible and recognised as such. They offer repeated testimonials to the quality of their sources, the social status or number of the witnesses, and whether the writers were personally present. Even the recording of distant events reflects a clear concern to report only what was credible. Thus the chronicler of St Paul’s Cathedral in London recorded, of an exceptionally severe frost in Avignon in 1325 in which many froze to death, that ‘according to the testimony of those who were there and who saw it, for one day and night the ice covering the Rhône, which is an extremely fast-flowing river, was more than eight feet thick’. Note how the addition of a seemingly precise but unverifiable detail, the thickness of the ice, adds greatly to the credibility of the account.</p>
<div><cite>[4]</cite></div></blockquote><p>It’s interesting to note that credibility, not information, is the real currency. Newspapers were resisted at first because people naturally judge credibility of information based on the person delivering it. At first people thought, “How can I trust words on a page? I don’t know who said it!” Newspapers’ reputations for credibility were carefully cultivated over the centuries. The earliest papers took extreme pains to have multiple sources, preferably eye witnesses. The editor would articulate exactly who the witness was, how close they were to the event/how they came by the information, and so on. They essentially replicated a trusted personal account of events delivered by a person. While the internet allows anyone to broadcast, it certainly doesn’t grant everyone credibility. And information without credibility has little effect on the public.</p><p>So, this “access to information is the problem” thesis is wrong. The problem is that the Internet democratized access to the production and dissemination of information and simultaneously destroyed the economics of high-quality journalism while leaving in place the culture and custom of credibility and truth. The problem isn’t that people can see more information; the problem isn’t even just that more people have the power to shout their propaganda from the virtual rooftops. The problem is that we now have a credibility vacuum <em>and</em> the means for any sufficiently motivated entities to fill that vacuum, regardless of actual credibility <em>per se.</em> <br /></p><p>References:</p><ol><li>Pomerantsev, Peter. <em>This is not Propaganda.</em> PublicAffairs, 2019.</li>
<li>Jowett, Garth S. and O’Donnell, Victoria. <em>Propaganda and Persuasion.</em> 7th Edition. Sage Publications, 2019.</li>
<li>Taylor, Philip M. <em>Global Communications, International Affairs and the Media Since 1945 (The New International History)</em>. Routledge, 2002.</li>
<li>Pettegree, Andrew. <em>The Invention of News: How the World Came to Know About Itself.</em> Yale University Press, 2014.</li>
</ol><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDE5XC8xMVwvMDRcL25vcGUtdGhpcy1pcy1wcm9wYWdhbmRhXC8ifQ%3D%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2019%2F11%2F04%2Fnope-this-is-propaganda%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i0.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2019/11/04/nope-this-is-propaganda/</link>
      <guid>https://gru.gq/2019/11/04/nope-this-is-propaganda/</guid>
      <pubDate>Mon, 04 Nov 2019 09:02:00 +0100</pubDate>
    </item>
    <item>
      <title><![CDATA[Security thinking ruined secure messengers]]></title>
      <description><![CDATA[<h3>…I’m more of a “blog half full of COMSEC” kinda guy…</h3><p>Secure instant messengers are a miracle of the modern age. They enable literally anyone to communication with security and privacy guarantees that were the exclusive capability of nation states just a few decades ago. In real-time, regardless of geographic location.</p><blockquote class="wp-block-quote is-style-large">
<p>Telephones connect places, mobile phones connect people.<br />— Charles Stross</p>
</blockquote><p>Modern mobile phones are the safest and most secure computers available, anyone can get one. And secure instant messengers allow grandma video chat with her grandkids.</p><p>There are still problems of course, but some of them are COMSEC problems that detract from the security</p><h3>1 – Ephemeral messaging,</h3><p>Ephemeral messaging — it is a critical feature for ensuring the security of your own device, not the security of the message. Firstly, once a message has left your control you no control over that menage anymore. That is very literally the first principle of communications.</p><p>Without automated cleaning as a core first class citizen then people will walk around with logs stretching back years. Logs of secure messages that should have been deleted long ago, but no on ever gets around to basic housekeeping chores. Put a burn bag in your secure messenger and make it automatic so that my device never has more than a few days of logs.</p><p>Similarly, when creating messages in the database do not give them sequential IDs. Use primes, or uuids</p><h3>2 – Screenshots — a social problem easily addressed</h3><p>Screenshots. This has remained an extremely controversial topic despite having a simple solution. As with ephemeral messaging the security community is approaching the ideas completely backwards. Taking a screen shot of a private trusted conversation is not a technology problem that can be solved without involving people. The security of a message is moot after it leaves your control.</p><p>The solution is simple. Taking a screen shot of a secure trusted communication is a violation of social norms and expectations. Rather than attempting to prevent screenshots or do any thing else doomed to failure simply make the screen feature automatically send the screen capture to everyone in the chat. Do not attempt to enforce a technology solution for a social problem,</p><h3>3 – Exporting text</h3><p>This is the safest way to talk, but I can’t get access to anything I said. I have to use a file to transfer.</p><p>Sending text over Signal is infinitely safer than sending text over PGP. Once I enter text into Signal it is trapped forever, except that I can “eat soup with a fork” and copy and paste each sentence one by one.</p><p>What is the point of having a one of the safest text exchange systems ever if it is hermitically sealed? WhatsApp has a different problem of encouraging “cloud backups” of exported chats. This feature is one o the rasons I and very against that ho Threema.</p><h3>4 – Phone Numbers as identifiers instead email</h3><p>Phone numbers are names. Every major tech company has a database which matches phone numbers to the contacts they have scraped from everyone else.</p><p>There are cumbersome work arounds to obtain a VoIP phone number and then register a Signal account. There are a number of reasons that this is a bad</p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDE5XC8xMVwvMDJcL3NlY3VyaXR5LXRoaW5raW5nLXJ1aW5lZC1zZWN1cmUtbWVzc2VuZ2Vyc1wvIn0%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2019%2F11%2F02%2Fsecurity-thinking-ruined-secure-messengers%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i0.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2019/11/02/security-thinking-ruined-secure-messengers/</link>
      <guid>https://gru.gq/2019/11/02/security-thinking-ruined-secure-messengers/</guid>
      <pubDate>Sat, 02 Nov 2019 07:05:00 +0100</pubDate>
    </item>
    <item>
      <title><![CDATA[Thats just, like, your opinion, man]]></title>
      <description><![CDATA[<h2>Differing Perspectives on Cyber Threats</h2><p>Ransomware is a hot topic pretty much all the time in information security circles. It is (I believe) one of the stronger drivers for better security decisions at companies (“here is public proof on an existential threat for failure”). Ransomware is also pretty uninspiring as an attack, there is no flashy 0day or clever new technique. It’s turning on disk encryption and then charging $300 for the password. Wow. Cool story bro. Despite the importance of the ransomware threat, actual attacks have to be pretty novel to crack the jaded cynical shell and pique the interest on the infosec community. Just such an attack occured.</p><p>The city of Johannesburg (pronounced: Jo’burg, or Jozi) was hacked and a load of secret confidential data was exfiltrated (another day another shell, <em>yawn</em>.) The hackers are holding the city to ransom (its not likely they can sell the minutes from a municipal roadworks meeting on the black market.) Unless their demands for a ransom price of 4 BTC (worth between $29k and $36k USD in the last 24 hours) the hackers threaten that they will release the confidential data to the public.</p><p>The longest thread was Dr Green discussing ransomware theory.</p><p>The facts of the attack are not all that interesting. Ransoms against cities and organisations are nothing new. Yet somehow this story managed to kick off a long debate on Twitter about the future of ransomware and monetizing compromised computers. It’s worth having a read if you’re curious what infosec people think. But I’m actually more interested in what the discussion revealed about <em>how</em> we think about infosec.</p><p>The post that started the discussion. The longest (and most interesting) thread was Dr Green discussing ransomware theory.</p><p>Neither I nor Dr Green are speaking “off the cuff” here. Both of us have written about ransomware before:</p><ul><li><a href="https://blog.cryptographyengineering.com/2017/02/28/the-future-of-ransomware/">Dr Green: The Future of Ransomware</a></li>
<li><a href="https://medium.com/@thegrugq/why-ransomware-why-now-bd1395a147cb">the grugq: Why ransomware? Why now?</a></li>
</ul><h2>The question: why does ransomware work?</h2><blockquote class="wp-block-quote is-style-large">
<p>We ask two cyber security experts to waste their weekend on Twitter. Here are the results!</p>
</blockquote><h3>the grugq:</h3><p>Ransomware uses blackmail to recruit an agent to act in the interests of the hacker. Ransomware turns “hacking a bank account” from a cyber security problem into a human factor problem. The victim complies with the demands of the hacker. The agent acts on behalf of the principle, following their commands. No need to hack bank security, just tell the agent to send money.</p><p>Clearly, the interesting thing here is the shift to human factors, and the power dynamics of the relationship. Therefore the blackmail step is clearly just is an implementation detail.</p><p>I look at a situation and pare it down to power dynamics, and find parallel dynamics in other human endeavours (like espionage).</p><h3>Dr Matthew Green (but, <strong>like</strong>, not a <em>real</em> doctor.)</h3><p>Ransomware works because the mechanics of the situation allow for verification of both players cooperating or defecting. The integrity of the process is cryptographically ensured, and empirically verifiable. The risks of defection are known to both sides who can then make informed choices.</p><ol><li>Victim defects: lose data, save money</li>
<li>Victim cooperates:
<ol><li>Hacker defects: victim lose money, lose data</li>
<li>Hacker cooperates: victim loses money, save data<br />This is a unique property of the ransomware system based on the technical details of the implementation.</li>
</ol></li>
</ol><p>For the victim, in the worst case the hacker defecting just causes a single event loss of money. This makes ransomware a relatively risk free transaction because most of the downside is already locked in, there is a chance of another small downside or a complete success.</p><p>Other schemes would face different challenges and lack the simplicity of the ransomware solution.</p><ol><li>Easy to implement for an attacker against a generic target.</li>
<li>Easy to manage for a victim.</li>
</ol><p>These properties probably wouldn’t exist in other attacks.</p><p>That is the wrong question. (Although, obviously, I am.)</p><p>There is truth in both perspectives. But more interesting than either argument on its merits, is how different disciplines of information security analyze the problem. We both seek to determine what is important, but we use different metrics and toolkits to make that evaluation. I find <em>that</em> really fascinating.</p><p>The take away is that if you ask two infosec people the same question they will say: “it depends”, and then proceed to each provide multiple different answers. Cyber security is a bundle of very hard problems. It is the rare exception when there is just one comprehensive “Correct Solution.”</p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDE5XC8xMFwvMjdcL3RoYXRzLWp1c3QtbGlrZS15b3VyLW9waW5pb24tbWFuXC8ifQ%3D%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2019%2F10%2F27%2Fthats-just-like-your-opinion-man%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i0.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2019/10/27/thats-just-like-your-opinion-man/</link>
      <guid>https://gru.gq/2019/10/27/thats-just-like-your-opinion-man/</guid>
      <pubDate>Sun, 27 Oct 2019 10:00:00 +0100</pubDate>
    </item>
    <item>
      <title><![CDATA[FSB deploys cyber units inside Europe (for years)]]></title>
      <description><![CDATA[<h3>The cyber is coming from inside the EU</h3><p>Czech counterintelligence (BIS) rolled up forward deployed FSB controlled hackers. The hackers were ethnic Russians and ethnic Russians with Czech citizenship. They ran two companies selling IT supplies as covers for their offensive cyber espionage activities. BIS had them under surveillance for several years, during which they learned that the hackers used computer equipment specially delivered by Russian Federation diplomatic vehicles.</p><p>The cyber espionage network was rolled up at the beginning of 2018. BIS says that this is not an isolated incident, there are FSB cyber units operating throughout Europe.</p><p>Full story: <a href="https://www.respekt.cz/politika/bis-rozbila-sit-ruskych-zpravodajcu-skrytych-za-pocitacovou-firmou">Respekta</a> (<a href="https://translate.google.com/translate?hl=&amp;sl=auto&amp;tl=en&amp;u=https%3A%2F%2Fwww.respekt.cz%2Fpolitika%2Fbis-rozbila-sit-ruskych-zpravodajcu-skrytych-za-pocitacovou-firmou">Google translate</a>) (<a href="https://archive.is/zz8Hs">archive</a>)</p><h3>FSB running active cyber cells in the EU</h3><p>This is so cool! I have long suspected that forward deploying cyber forces is already (or should be soon), standard doctrine for many countries. Any country that can afford to station a couple people in another country, and who have the capacity to fill those roles, should be doing this already.</p><p>Russia is a bit unique in the composition of their cyber capacity which involves a complicated tangle of integrated public and private sector entities. The hackers arrested in Czech were not FSB officers operating under cover, but they were not recruited assets either. One clear demonstration of this is that they were all ethnic Russian. The best way to describe them is contractors. Contractors employed by FSB for offensive cyber espionage operations.</p><p>Using contractors for intelligence or military work is hardly new, and it should be no surprise that they are used for cyber as well. Indeed, all countries with cyber espionage capability employ some form of public private cooperation. Contractors are a major part of the USA’s cyber force.</p><h2>Geolocation is meaningless in cyber</h2><p>This group used equipment specially delivered by diplomatic pouch straight from Russia. I have two ideas on this (it could be one, or both, or neither): o</p><ol><li><strong>Security</strong>. The equipment started life in a known clean state and is protected against tampering to ensure the integrity of the system.</li>
<li><strong>Monitoring</strong>. The FSB was leaving these guys alone with a long leash in a foreign country. It is reasonable to assume they would want to keep an eye on their contractors work.</li>
</ol><p>Security is a bit weird because the hackers left their equipment in the shops, only operating from those premises. This was definitely a sound security tactic. Keeping illicit activity or incriminating evidence away from the house makes it a safe environment. Having the “work” equipment at a shared location also helps OPSEC, removing any highly visible direct links to any of the suspects. Not much good when the counterintelligence guys spend years on surveillance though.</p><p>An effective offensive cyber team has a very small footprint. An operator, or a team, can travel completely naked, acquiring everything they need from local stores. Conducting successful cyber operations does not dependent on heavy investments on infrastructure or whatever. Cyber capacity is:</p><blockquote class="wp-block-quote is-style-large">
<p>People. Ideas. Hardware. In that order.</p>
<div><cite>John Boyd</cite></div></blockquote><p>A nation state can distribute “second strike cyber capacity” throughout the world. Maintaining a resilient offensive cyber capacity is within the capability of any nation that has one. This is much easier because the logistical requirements for building a cyber threat group, and maintaining them are constant regardless of where they are in the world.</p><h2>Why this matters</h2><p>Several big takeaways from this one:</p><ul><li>Russia has FSB cyber cells operating across Europe. It is probably safe to assume that Europe is not the only place they have no official cover cyber espionage units.</li>
</ul><ul><li>Cyber units can be sent to where they are most effective, and they can operate as intelligence assets. They can be dispersed for resilience against kinetic attacks. They can be stationed anywhere, they don’t have to operate from the country that sponsors them.</li>
</ul><ul><li>The Internet makes geographical location (mostly) irrelevant. Because geolocation is irrelevant a GRU officer can attack a US target from a desk in Moscow. But, by the same notion, it means that a GRU officer can attack a US target from a bungalow in a tropical country. The targets are fixed in space, but there is no reason for the attackers to follow those rules.</li>
</ul><h4>Three short observations:</h4><ol><li>Operators can be contractors (TTPs don’t match sponsoring country).</li>
<li>Operators can move about the board freely.</li>
<li>Operators have no special logistical requirements.</li>
</ol><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDE5XC8xMFwvMjRcL2ZzYi1kZXBsb3lzLWN5YmVyLXVuaXRzLWluc2lkZS1ldXJvcGUtZm9yLXllYXJzXC8ifQ%3D%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2019%2F10%2F24%2Ffsb-deploys-cyber-units-inside-europe-for-years%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i0.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2019/10/24/fsb-deploys-cyber-units-inside-europe-for-years/</link>
      <guid>https://gru.gq/2019/10/24/fsb-deploys-cyber-units-inside-europe-for-years/</guid>
      <pubDate>Thu, 24 Oct 2019 03:17:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[Cyber Deterrence]]></title>
      <description><![CDATA[<p>I see deterrence against cyber is basically: cyber, diplomatic, kinetic</p><ul><li><strong>cyber</strong>: only works if both sides have similar exposures and vulnerabilities to a cyber attack. It is hard to do a proportionate Cyber response to Laos, for example.</li>
<li><strong>diplomatic</strong>: all of the usual international levers of coercion, like sanctions, and so on. For both Iran and DPRK, there really isn’t much room left there.</li>
<li><strong>kinetic</strong>: bombs and boots on the ground. Unlikely to be the initial response to a Cyber attack, most likely it’s an existing state of affairs. So for example if the US started bombing Iran, an Iranian Cyber response wouldn’t cause an escalation in kinetic conflict.</li>
</ul><p>So countries have symmetric cyber capabilities but have asymmetric exposure to deterrence. What does that mean for total cyber war? This is all hypothetical, but… what does cyber warfare look like during warfare? What are viable theories of “strategic cyber”? That is, how would cyber be used strategically (rather than tactically or operationally) to wage war?</p><p>I know, it is very stupid “cyber Pearl Harbor” bollocks, but honestly I find the concept of “total cyber warfare” very fascinating. For example, many of the actual impacts are going to be felt by US civilians. People who on the whole haven’t been exposed to consequences from war (not in a long long time)… how will people react when a war means more than just something on the TV, when maybe it means the TV stops working?</p><p>As one example, DPRK has a history of using cyber as a direct means of implementing policy (see: Sony.) DPRK has capability, and there is little to deter them, so what could they do?</p><p>I’m not proposing “the sky is falling, DPRK are going to Cyber the US into the Stone Age”. I’ve used the example of DPRK and the US, but I’m not interested in what exactly the US could do to deter DPRK – not unless it is a real credible deterrent for cyber in general, of course.</p><p>My interest is what wartime conflict in the cyber domain means for everyone. Cyber is very weird as a domain of conflict. Civilians are more exposed than the military, and much of civilian cyber infrastructure is better protected than “real” critical national infrastructure.</p><p>Instagram is more secure against cyber attack than hospitals, but is itself a cyber weapon for conflict in the cognitive domain. What does that mean, and how would that be incorporated into doctrine? I have some ideas.</p><p>I have an unorthodox view on cyber (frequently described as “wrong”). There are roughly three realms of conflict: kinetic, cyber, cognitive. The deep connection between cyber and cognitive leads me to blur them together as “information processing systems,” which fortunately includes organisations and groups as well as individuals and computers.</p><p>Having a flexible and broad view of cyber + cognitive is a vital part of thinking about total cyber warfare. Almost every player in the Great Cyber Game has a different way of clustering capabilities and thinking about cyber offence and defence. The One True view (CNO, IO, PSYOPS, EW, etc.) wasn’t particularly useful at defending against Facebook ads and email spools in 2016.</p><p>In my view a lot of the boundaries on Western cyber thought are the results of budgetary battles from decades ago, and various political legal authorities. Internal US politics from the Cold War era do not a relevant framework for comprehending cyber make. But that’s what they’re stuck with as we all enter a world where total cyber warfare is entirely possible.</p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDE5XC8xMFwvMTNcL2N5YmVyLWRldGVycmVuY2VcLyJ9&amp;utm_source=https%3A%2F%2Fgru.gq%2F2019%2F10%2F13%2Fcyber-deterrence%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i0.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2019/10/13/cyber-deterrence/</link>
      <guid>https://gru.gq/2019/10/13/cyber-deterrence/</guid>
      <pubDate>Sun, 13 Oct 2019 08:28:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[The Grid, but why tho?]]></title>
      <description><![CDATA[<h2>A realistic evaluation of cyber weapon concepts</h2><figure class="wp-block-image">
<p><img src="https://i0.wp.com/gru.gq/wp-content/uploads/2019/10/image_df3533f6-2127-45f6-bf56-1a6454ac2e5c.jpg?ssl=1" alt="" data-recalc-dims="1" /></p>
</figure><h3>Cyber attacks against the power grid have little strategic value</h3><ol><li>Cyber against the adversary’s power grid is worse than useless</li>
<li>It actually increases adversary’s cohesion and strengthens their resolve</li>
<li>Has little to no impact on the capability of the adversary to make war</li>
<li>Bolsters policy-maker’s reason to engage in war</li>
</ol><p>I’m going to talk about the <a href="https://en.m.wikipedia.org/wiki/Manhattan_blackout_of_July_2019" target="_blank" rel="noopener noreferrer">Manhattan blackout</a> and cyber. But I gotta make some things clear. I’m discussing the theory of conflict in the cyber domain, where the cyber attack “take out the power grid” is frequently used as an example of … worst case scenario, or terrible major attack, or whatever. Taking out the power grid is a big deal in cyber war discourse. I say, it’s about as brilliant as punching yourself in the face before a fight. I’ll use the event of the <a href="https://www.nytimes.com/2019/07/13/nyregion/nyc-power-outage.html" target="_blank" rel="noopener noreferrer">Manhattan blackout</a> as an example of the impotency of a power grid attack.</p><p>The July 13th 2019 blackout in Manhattan is a perfect example of why the power grid is a piss poor target in a cyber conflict. Again, this is not about the actual Manhattan blackout.m; it’s not about the root cause; the impact, or the effects on people. This is a piece on about cyber warfare strategy and why the power grid is terrible choice of target. The blackout in Manhattan is simply a relevant event to illustrate my point.</p><p>Cyberwar experts have a strong tendency to worry about critical national infrastructure’s vulnerability to cyber attack. In principle I completely agree, critical infrastructure should be secured against attack. I don’t think that attacking the power grid is the pinnacle of cyber warfare. In fact, I think taking down an adversary’s power grid is possibly one of the least effective cyber attacks a state could deploy.</p><p>The Manhattan blackout, I believe, proves my point that critical national infrastructure (such as the power grid) is not anywhere near as important a target as people claim. The impact is short term and localised.</p><p>Not only is the effect of a blackout limited, but using the Clausewitz paradoxical trinity reveals that it fails as a mechanism of state coercion.</p><ul><li>Enmity: people’s passion for war</li>
<li>Chance: military’s ability to effect events in war</li>
<li>Reason: policy makers reason for war</li>
</ul><p>A cyber weapon that disables the adversary’s power grid may have tactical or operational utility, or under the right circumstances, strategic value. But in the general case, at a strategic level, cyber attacks against the power grid are negligible at best and counter productive at worst.</p><p>the effect is localised, and therefore not good as a tool of imposing your will on another state. because it has such a low utility as a technique for coercion, it is not strategically useful.</p><p>it is tactically useful, operationally useful, and maybe in certain cases strategically useful, but fundamentally the “cyber the power grid” attack is just not a great capability. Not as a strategic tool for a state to impose its will, or effect its policy on other states.</p><p>An attack against the powergrid causes the people targeted to become more cohesive as a whole, it unites them against an external enemy. Generally speaking, a weapon that makes the other side more determined to fight you is not a good weapon.</p><p>a strategically useful cyber weapon would have some capabiltity to: “deny, destroy, degrade, deceive, disrupt” — the target at a strategic level, at a level that impacts the state: either the people, the economy, or the military.</p><p>the power grid as a target does not provide that capability. Against the economy, the ability of the target to continue to wage war, it has no impact. Against the people, it makes them more cohesive and hardens their resolve. No electricy can cause tragedy at a small scale, but fundamentally it is just a nuisance, not a huge deal.</p><p>Clausewitz created an analytic framework for appraising states at war. The paradoxical trinity is covered very well elsewhere, but I’ll provide a brief sketch of the concepts. If you don’t want to see spoilers for <em>On War</em>, feel free to skip this section.</p><h2>SPOILERS: now entering spoilers for “On War”</h2><h2>ENMITY</h2><h3>does a cyber attack blackout reduce <strong>people’s</strong> passion for war?</h3><p>No, definitely not. If anything it improves cohesion and strengthens resolve. People can unite against a common enemy who caused them tangible harm (“I didn’t have internet for hours!”). An attack so blatant that there is no doubt it was a hostile act by a foreign state will strengthen ingroup bonds.</p><h2>CHANCE</h2><h3>does a cyber attack blackout reduce the capacity and/or capability of the military to wage war?</h3><p>not at all. The military have a lot of slack, redundancy and buffer in their supply chains. The short duration of power outages would be easily absorbed.</p><h2>REASON</h2><h3>does a blackout change the reason policy makers chose war?</h3><p>I don’t see how. The people will be more passionate about supporting the war, demand retaliation. The short duration of the blackout and the limited scope of its negative effects mean there’s no real long lasting harm inflicted.</p><h2>Cyber von Clausewitz</h2><ol><li>war is the continuation of politics by other means</li>
<li>All politics is local</li>
<li>In cyber, everything is local</li>
</ol><p>There is another factor, which I will not address here, about norms. Attacking civilian critical national infrastructure signals that attacks again civilians are ok. This is generally frowned upon.</p><p>The effect of an attack against the power grid is localised and ephemeral, therefore it is not useful as a tool for imposing your will on another state. Because it has such low utility for coercion it is not strategically useful. In certain circumstances it could be tactically or operationally useful, but it is very unlikely it will ever be strategically useful.</p><p>The reason that cyber attacks against the power grid are not useful attacks is that they unite people, they create cohesion against an external threat, and they have no long term lasting impact on the target. Attacking the power grid encourages the adversary to fight with more resolve and determination than before.</p><p>Essentially, using cyber to cause blackouts not only has no impact on the adversary’s capability or decision to wage war, it actually makes them more cohesive and resolved to fight. As a strategic weapon, it literally makes the adversary more determined and willing to engage in conflict.</p><p>Making the enemy more aggressive and resolved to fight, without weakening their capability to do so, is <strong>not</strong> a good capability for a cyber weapon.</p><h3>Cyber against the power grid is not a deterrent, it is encouragement.</h3><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDE5XC8xMFwvMDdcL3RoZS1ncmlkLWJ1dC13aHktdGhvLTJcLyJ9&amp;utm_source=https%3A%2F%2Fgru.gq%2F2019%2F10%2F07%2Fthe-grid-but-why-tho-2%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i0.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2019/10/07/the-grid-but-why-tho-2/</link>
      <guid>https://gru.gq/2019/10/07/the-grid-but-why-tho-2/</guid>
      <pubDate>Mon, 07 Oct 2019 08:30:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[Sara-Jayne Terp on Misinfosec]]></title>
      <description><![CDATA[<p>I promised to walk someone through our Truth&amp;Trust Online <a class="entity-hashtag" href="https://threadreaderapp.com/hashtag/TTOCon">#TTOCon</a> (thanks <a class="entity-mention" href="https://twitter.com/TTOConference">@TTOConference</a>!) poster on “left-of-boom misinfosec” yesterday, but we missed the slot. I hate to disappoint, so here’s your online version…First, the people. It’s taken a lot of skills and specialisations to create misinfosec. <a class="entity-mention" href="https://twitter.com/grayspective">@grayspective</a> and myself are listed on this poster, but this is work from <a class="entity-mention" href="https://twitter.com/Ngree_H0bit">@Ngree_H0bit</a><a class="entity-mention" href="https://twitter.com/TheLoki47">@TheLoki47</a> and community across <a class="entity-mention" href="https://twitter.com/credcoalition">@credcoalition</a><a class="entity-mention" href="https://twitter.com/misinfosec">@misinfosec</a> and beyond.</p><figure class="wp-block-image"><a href="https://i2.wp.com/pbs.twimg.com/media/EGK3K5BXoAAU8Rj.jpg?ssl=1" target="_blank" rel="noreferrer noopener">
<p><img src="https://i2.wp.com/pbs.twimg.com/media/EGK3K5BXoAAU8Rj.jpg?ssl=1" alt="" data-recalc-dims="1" /></p>
</a></figure><p>Misinfosec hypotheses: infosec = physical, cyber + cognitive security; infosec principles &amp; tools work on misinformation; cognitive security can be part of existing infosec defences (ISAOs, CyberInterpol);<br />3Vs: has to work at scale, at speed, and adaptively across many platformsThe structure and propagation patterns of misinformation incidents have many similarities to those seen in information security. <a class="entity-mention" href="https://twitter.com/credcoalition">@credcoalition</a> MisinfoSec Working Group analysed these similarities and adapted information security standards (e.g. ATT&amp;CK) to create AMITT frameworkAMITT (Adversarial Misinformation and Influence Tactics and Techniques) includes the left-of-boom misinformation activities that are often missed by other analyses, where ”left of boom” covers activity before an incident is widely visible to the public. (purple in the diagram) </p><figure class="wp-block-image"><a href="https://i0.wp.com/pbs.twimg.com/media/EGK3MehWsAAZuCT.jpg?ssl=1" target="_blank" rel="noreferrer noopener">
<p><img src="https://i0.wp.com/pbs.twimg.com/media/EGK3MehWsAAZuCT.jpg?ssl=1" alt="" data-recalc-dims="1" /></p>
</a></figure><p>We open-sourced the AMITT misinfosec framework. You can find it, and the white papers we wrote on its creation, at </p><figure class="wp-block-image"><a class="img-cover b-lazy b-loaded" href="https://github.com/misinfosecproject/amitt_framework" target="_blank" rel="noreferrer noopener">
<p><img src="https://repository-images.githubusercontent.com/194927855/df0dca00-b435-11e9-93c4-2f4e42ad16c8" alt="" /></p>
</a></figure><p><a rel="noreferrer noopener" target="_blank" href="https://github.com/misinfosecproject/amitt_framework"><strong>misinfosecproject/amitt_framework</strong></a><a rel="noreferrer noopener" target="_blank" href="https://github.com/misinfosecproject/amitt_framework">AMITT (Adversarial Misinformation and Influence Tactics and Techniques) framework for describing disinformation incidents. AMITT is part of misinfosec – work on adapting information security practice…https://github.com/misinfosecproject/amitt_framework</a>– we’ll keep putting new work there tooTerminology.<br />* Campaign: longer, sustained attack (eg 2016 US elections)<br />* incident: shorter-duration attacks (eg Pizzagate), can be part of campaigns<br />* Narrative: mechanism to interpret why individuals/ groups choose to act in specific context<br />* Artifact: Image, text, site etcMisinformation pyramid. An attacker sees all of it; a defender works upwards from artifacts, maybe has some intel at campaign level. Most of the battle is at narrative level. Most visibility is at artifact level. Most analysis and defence planning should be at incident.</p><figure class="wp-block-image"><a href="https://i2.wp.com/pbs.twimg.com/media/EGK3NuaWsAAWT6Y.png?ssl=1" target="_blank" rel="noreferrer noopener">
<p><img data-attachment-id="263" data-permalink="https://gru.gq/2019/10/06/sara-hayne-terp-on-misinfosec/img_0817/" data-orig-file="https://i2.wp.com/gru.gq/wp-content/uploads/2019/10/img_0817.png?fit=682%2C472&amp;ssl=1" data-orig-size="682,472" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="img_0817" data-image-description="" data-medium-file="https://i2.wp.com/gru.gq/wp-content/uploads/2019/10/img_0817.png?fit=300%2C208&amp;ssl=1" data-large-file="https://i2.wp.com/gru.gq/wp-content/uploads/2019/10/img_0817.png?fit=682%2C472&amp;ssl=1" src="https://i2.wp.com/gru.gq/wp-content/uploads/2019/10/img_0817.png?ssl=1" alt="" class="wp-image-263" srcset="https://i2.wp.com/gru.gq/wp-content/uploads/2019/10/img_0817.png?w=682&amp;ssl=1 682w, https://i2.wp.com/gru.gq/wp-content/uploads/2019/10/img_0817.png?resize=300%2C208&amp;ssl=1 300w, https://i2.wp.com/gru.gq/wp-content/uploads/2019/10/img_0817.png?resize=600%2C415&amp;ssl=1 600w" data-recalc-dims="1" /></p>
</a></figure><p>AMITT is an “influence chain” model (based on the Cyber Kill Chain/ ATT&amp;CK): its columns are a list of steps required to successfully conduct an attack, where any “link” broken results in an attack failure (we’re still working on what to do with Microtargeting and Go Physical) </p><figure class="wp-block-image"><a href="https://i0.wp.com/pbs.twimg.com/media/EGK3OH1WoAEOgMR.jpg?ssl=1" target="_blank" rel="noreferrer noopener">
<p><img src="https://i0.wp.com/pbs.twimg.com/media/EGK3OH1WoAEOgMR.jpg?ssl=1" alt="" data-recalc-dims="1" /></p>
</a></figure><p>Terminology: TTPs<br />* Tactic: stage of a misinformation incident (blue boxes)<br />* (Task: thing that needs to be done during a stage)<br />* Technique: activity within a stage (grey boxes)<br />* Procedure: incident described as a group of techniques<br />We can disrupt any of thesementions’s notes: Attackers have advantages across the 4 big steps before misinformation is visible to the public (these are the 4 left-of-boom steps in the Cyber Killchain), which is when most analysis and defence starts </p><figure class="wp-block-image"><a href="https://i0.wp.com/pbs.twimg.com/media/EGK3PFUXUAAsqfK.png?ssl=1" target="_blank" rel="noreferrer noopener">
<p><img src="https://i0.wp.com/pbs.twimg.com/media/EGK3PFUXUAAsqfK.png?ssl=1" alt="" data-recalc-dims="1" /></p>
</a></figure><p>The point of building tools like AMITT is being able to talk about techniques, artefacts, counters etc across the *whole* disinformation production cycle, not just after the ‘boom’. It also lets us add disinformation to existing infosec alert feeds and coordinate responseWhat we’re doing next:</p><ul><li>Adding narrative and incident objects to STIX (infosec XML message formats)</li>
<li>Continuing to refine AMITT TTPs</li>
<li>Continuing to support the Cognitive Security ISAO</li>
<li>“Red Team” workshop on counters to common misinformation techniques</li>
</ul><figure class="wp-block-image"><a href="https://i0.wp.com/pbs.twimg.com/media/EGK3P2-XkAAI2OZ.png?ssl=1" target="_blank" rel="noreferrer noopener">
<p><img src="https://i0.wp.com/pbs.twimg.com/media/EGK3P2-XkAAI2OZ.png?ssl=1" alt="" data-recalc-dims="1" /></p>
</a></figure><p>Main takeaways from <a class="entity-mention" href="https://twitter.com/grayspective">@grayspective</a>. Thank you for coming to our online poster!</p><figure class="wp-block-image"><a href="https://i0.wp.com/pbs.twimg.com/media/EGK3Qb4XUAAZ0sQ.png?ssl=1" target="_blank" rel="noreferrer noopener">
<p><img data-attachment-id="262" data-permalink="https://gru.gq/2019/10/06/sara-hayne-terp-on-misinfosec/img_0814/" data-orig-file="https://i1.wp.com/gru.gq/wp-content/uploads/2019/10/img_0814.jpg?fit=574%2C290&amp;ssl=1" data-orig-size="574,290" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="img_0814" data-image-description="" data-medium-file="https://i1.wp.com/gru.gq/wp-content/uploads/2019/10/img_0814.jpg?fit=300%2C152&amp;ssl=1" data-large-file="https://i1.wp.com/gru.gq/wp-content/uploads/2019/10/img_0814.jpg?fit=574%2C290&amp;ssl=1" src="https://i1.wp.com/gru.gq/wp-content/uploads/2019/10/img_0814.jpg?ssl=1" alt="" class="wp-image-262" srcset="https://i1.wp.com/gru.gq/wp-content/uploads/2019/10/img_0814.jpg?w=574&amp;ssl=1 574w, https://i1.wp.com/gru.gq/wp-content/uploads/2019/10/img_0814.jpg?resize=300%2C152&amp;ssl=1 300w" data-recalc-dims="1" /></p>
</a></figure><p>See also this write up: <a rel="noreferrer noopener" aria-label="link (opens in a new tab)" href="https://pukhraj.me/2019/10/06/keep-an-eye-out-for-the-misinfosec-working-group/" target="_blank">link</a></p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDE5XC8xMFwvMDZcL3NhcmEtaGF5bmUtdGVycC1vbi1taXNpbmZvc2VjXC8ifQ%3D%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2019%2F10%2F06%2Fsara-hayne-terp-on-misinfosec%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i0.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2019/10/06/sara-hayne-terp-on-misinfosec/</link>
      <guid>https://gru.gq/2019/10/06/sara-hayne-terp-on-misinfosec/</guid>
      <pubDate>Sun, 06 Oct 2019 11:25:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[The Info War against ISIS]]></title>
      <description><![CDATA[<h2>Commentary: Islamic State militant group ran an info war ‘like a viral marketing campaign’ – CNACommentary: Islamic State militant group ran an info war ‘like a viral marketing campaign’ – CNA</h2><blockquote>
<p>The terrorist group is defeated because we have taken back all the land they controlled — said no one. ever.</p>
</blockquote><p>Insurgencies are clan wars, “<em>our clan demands the political right to self governance</em>.” That is every terrorist, insurgent, freedom fighter manifesto ever. “<em>The ingroup are the real ppl, and we are the true representatives of the ingroup.</em>” The ingroup is a clan identity, regardless of whatever it’s unique elements are, the critical part is what makes it distinct from the outgroup. These frontiers between ingroup/outgroup have a tendency towards conflict.</p><p>As long as there are people whose clan identity takes prominence over their other identities, where their salient identity is the clan, then they will inevitably be involved in the struggle against the outgroup. This is the foundation of insurgent strength. Individuals who choose ingroup identity, clan identity, over other identities. Clan identities are very strong, with deep emotional bonds, and a strong element of self esteem and <em>belonging</em>.</p><p>Terrorists know about clan identity and the utility it has for their objectives. Frequently the attacks they conduct are carried out with the goal of causing an overreaction by the authorities, and thus reinforcing the <strong>distinctive clan boundary</strong> between ingroup / outgroup. They want more people to adopt their clan identity as their prominent identity.</p><p>Part of how the terrorists achieve recruitment to the cause, the spreading of clan identity, is through propaganda. This article touches on a fallacy about the defeat of ISIS — that a battlefield defeat is meaningful in anyway (they’re insurgents, they win by enduring, not by occupying territory).</p><p>Information war plays a more prominent role in modern insurgencies because of the sea change provided by the Internet which enables insurgents to reach audiences far outside their geographic location. They also control the entire message, allowing them more effective perception management.</p><p>Publicity is the lifeblood of all terrorist groups, say Anne-Marie Slaughter and Asha C Castleberry.<br />— Read on <a href="https://www.channelnewsasia.com/news/commentary/how-islamic-state-info-war-like-a-viral-marketing-campaign-11956288">www.channelnewsasia.com/news/commentary/how-islamic-state-info-war-like-a-viral-marketing-campaign-11956288</a></p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDE5XC8xMFwvMDZcL2NvbW1lbnRhcnktaXNsYW1pYy1zdGF0ZS1taWxpdGFudC1ncm91cC1yYW4tYW4taW5mby13YXItbGlrZS1hLXZpcmFsLW1hcmtldGluZy1jYW1wYWlnbi1jbmFcLyJ9&amp;utm_source=https%3A%2F%2Fgru.gq%2F2019%2F10%2F06%2Fcommentary-islamic-state-militant-group-ran-an-info-war-like-a-viral-marketing-campaign-cna%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i0.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2019/10/06/commentary-islamic-state-militant-group-ran-an-info-war-like-a-viral-marketing-campaign-cna/</link>
      <guid>https://gru.gq/2019/10/06/commentary-islamic-state-militant-group-ran-an-info-war-like-a-viral-marketing-campaign-cna/</guid>
      <pubDate>Sun, 06 Oct 2019 10:55:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[James Harris, a fresh perspective on the crypto wars]]></title>
      <description><![CDATA[<p>James Harris is a former FBI agent who spent 8 years working to combat child sexual exploitation. He is also a computer guy, he codes, knows his tech, and isn’t ignorant on encryption.</p><p>Jim wrote an excellent Twitter thread about the “backdoor the encryption, because children” argument. Rather than engage it head on, he contextualises it within the framework of enabling law enforcement to do its job. His insight is great, and addresses the real issue — not the encryption — what does LE need to find and prosecute child abusers? That is the point after all, rescuing kids from horrific situations.</p><p>So… where to begin. At issue is not so much the volume of any individual child series, but the sheer number of child series being submitted for identification. Each series is a child (or set of children) being abused</p><p>So, what’s most distressing (and was already growing rapidly when I was an agent) is the private groups where you must share your own home-grown stuff. That’s the worst of the worst. Those guys (and gals) are so confident in their tech security that they can be that brazen</p><p>One of the opportunities there is to work the stuff the way counterterrorism internet operations are run, and that would not require so much as backdoored crypto as freedom to work with fewer restrictions. Right now, LE is severely compromised in what they are allowed to do UC operations in child exploitation can’t go very far, and informant ops are also hamstrung – because the victimization of the child is in part sharing the actual images, so you can’t continue to victimize the child as LE.</p><p>So, long story short, aggressive intelligence operations, combined with international cooperation and some technology investment would probably be the better solution than backdoored crypto – but as the articles have been saying, there’s no real will on the part of the government.</p><p>Child exploitation is “icky” and men in suits don’t feel comfortable discussing it. They don’t like planning ops against it. Everybody wants to “smash the perverts,” but doing it correctly would require actual time investment in a very dark world.</p><p>I’m not talking smack to those folks who don’t want to work this – I did it for around 8 years, and it wrecked me. But it has to be done. So the easier way is to talk about crypto as the issue – and it is an issue, and there are bunches of arguments I can make on both sides</p><p>And there are lots of reasons to distrust “unbreakable crypto,” and lots of issues around availability and the right of governments to conduct lawful searches under their own laws, but this particular problem isn’t the silver bullet against crypto because there are more things to try here.</p><p>If we gave LE a real mission (not just money and some congressional “go get ’em,” and invested in experts to use graph theory and work networks of informants in the same way we do with other issues – in short, if we agreed that protecting children is a national priority, and went after it the way we do terrorism and foreign intelligence operations, we could change the conversation. If we could define when it’s OK for the good guys to hack and what type of warrants are needed for it, and how to handle digital contraband and respect the rights of the victims, then it’s not about crypto breaking – it’s about running good intelligence operations.</p><p>But that requires men and women in suits and ties in very serious rooms to actually spend real time addressing a problem they’re way too squeamish to talk about.</p><p>So until the whole-of-government gets off its collective ass and starts putting real minds together to talk about this in a real way, the fallback will be “<strong>break the crypto.</strong>“</p><div class="cb_p6_patreon_button c3"><p>Liked it? Take a second to support grugq on Patreon!</p><a rel="nofollow" target="_blank" href="https://www.patreon.com/oauth2/become-patron?response_type=code&amp;min_cents=100&amp;client_id=XPz53m5BPTmu-cnihK1RXoEaRoNywCco8VIPCNbwnAexV5YWdi_YG5Asup2LeG9p&amp;scope=identity%20identity[email]&amp;redirect_uri=https://gru.gq/patreon-authorization/&amp;state=eyJmaW5hbF9yZWRpcmVjdF91cmkiOiJodHRwczpcL1wvZ3J1LmdxXC8yMDE5XC8xMFwvMDRcL2phbWVzLWhhcnJpcy1hLWZyZXNoLXBlcnNwZWN0aXZlLW9uLXRoZS1jcnlwdG8td2Fyc1wvIn0%3D&amp;utm_source=https%3A%2F%2Fgru.gq%2F2019%2F10%2F04%2Fjames-harris-a-fresh-perspective-on-the-crypto-wars%2F&amp;utm_medium=patreon_wordpress_plugin&amp;utm_campaign=457796&amp;utm_term=&amp;utm_content=post_unlock_button">
<p><img class="c2" src="https://i0.wp.com/gru.gq/wp-content/plugins/patron-button-and-widgets-by-codebard/images/become_a_patron_button.png?ssl=1" data-recalc-dims="1" alt="image" /></p>
</a></div>]]></description>
      <link>https://gru.gq/2019/10/04/james-harris-a-fresh-perspective-on-the-crypto-wars/</link>
      <guid>https://gru.gq/2019/10/04/james-harris-a-fresh-perspective-on-the-crypto-wars/</guid>
      <pubDate>Fri, 04 Oct 2019 15:25:00 +0200</pubDate>
    </item>
    <item>
      <title><![CDATA[Hong Kong Protests]]></title>
      <description><![CDATA[<main class="content"><article class="post-197 post type-post status-publish format-standard category-operational-security category-opsec category-terrorism tag-counter-narrative tag-human-factor tag-strategy entry"><header class="entry-header">
<p class="entry-meta"><time class="entry-time">2019-10-02</time> by <span class="entry-author"><a href="https://gru.gq/author/thegrugq/" class="entry-author-link"><span class="entry-author-name">grugq</span></a></span> <span class="entry-comments-link"><a href="https://gru.gq/2019/10/02/hong-kong-protests/#respond">Leave a Comment</a></span> </p></header><div class="entry-content">
</div><footer class="entry-footer"><p class="entry-meta"><span class="entry-categories">Filed Under: <a href="https://gru.gq/category/operational-security/">operational security</a>, <a href="https://gru.gq/category/operational-security/opsec/">OPSEC</a>, <a href="https://gru.gq/category/uncategorized/terrorism/">terrorism</a></span> <span class="entry-tags">Tagged With: <a href="https://gru.gq/tag/counter-narrative/">counter narrative</a>, <a href="https://gru.gq/tag/human-factor/">human factor</a>, <a href="https://gru.gq/tag/strategy/">strategy</a></span></p></footer></article> <input id="comment_parent"> </main>]]></description>
      <link>https://gru.gq/2019/10/02/hong-kong-protests/</link>
      <guid>https://gru.gq/2019/10/02/hong-kong-protests/</guid>
      <pubDate>Wed, 02 Oct 2019 07:51:00 +0200</pubDate>
    </item>
  </channel>
</rss>
