Malcolm Nance - The Plot to Hack America

Здесь есть возможность читать онлайн «Malcolm Nance - The Plot to Hack America» весь текст электронной книги совершенно бесплатно (целиком полную версию без сокращений). В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Город: New York, Год выпуска: 2016, ISBN: 2016, Издательство: Skyhorse Publishing, Жанр: Политика, Публицистика, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

The Plot to Hack America: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «The Plot to Hack America»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

In April 2016, computer technicians at the Democratic National Committee discovered that someone had accessed the organization’s computer servers and conducted a theft that is best described as Watergate 2.0. In the weeks that followed, the nation’s top computer security experts discovered that the cyber thieves had helped themselves to everything: sensitive documents, emails, donor information, even voice mails.
Soon after, the remainder of the Democratic Party machine, the congressional campaign, the Clinton campaign, and their friends and allies in the media were also hacked. Credit cards numbers, phone numbers, and contacts were stolen. In short order, the FBI found that more than twenty-five state election offices had their voter registration systems probed or attacked by the same hackers.
Western intelligence agencies tracked the hack to Russian spy agencies and dubbed them the CYBER BEARS. The media was soon flooded with the stolen information channeled through Julian Assange, the founder of WikiLeaks. It was a massive attack on America but the Russian hacks appeared to have a singular goal—elect Donald J. Trump as president of the United States.
New York Times The Plot to Hack America
Praise for Malcolm Nance’s
bestselling
:
ON RUSSIAN HACKING
RUSSIA’S RESPONSE “I really think the [2016 Presidential] candidates ought to read this…. You should buy this book.”
—RACHEL MADDOW, The Rachel Maddow Show, MSNBC “A comprehensive, authoritative, and detailed compendium on the Islamic State (ISIS).”

“In his detailed and informed study Nance argues that, in effect, America’s War on Terror created a new breed of vicious terrorists who wear the mask of Islam like actors in a Kabuki theatre while carrying out horrifically un-Islamic acts.”
—RICHARD ENGEL, Chief Foreign Correspondent, NBC News, from his foreword “Putin and the leaders throughout the world have no respect for our country anymore and they certainly have no respect for our leader.”
—DONALD TRUMP, Republican presidential candidate and president of the Trump Organization “We know that Russian intelligence services hacked into the DNC and we know that they arranged for a lot of those emails to be released…. But I think laying out the facts raises serious issues about Russian interference in our elections, in our democracy.”
—HILLARY CLINTON, Democratic presidential candidate and former Secretary of State “What we do know is that the Russians hack our systems. Not just government systems, but private systems.”
—PRESIDENT BARACK OBAMA “As an American double agent who worked against Russian intelligence in the US, this book shows how Putin’s spies stop at nothing.”
—NAVEED JAMALI, former double agent and author of
“I wouldn’t know anything about it. You know, there are so many hackers today and they work with such finesse, planting a trail where and when they need…. It’s difficult to trace, if even possible…. The important thing here is what the public was shown…. One shouldn’t draw the public attention from the core of the issue by replacing it with secondary details like who did it.”
—VLADIMIR PUTIN “Overall, we still see attempts to use—manically use—the Russian issue during the US electoral campaign…. The absurd claims were immediately refuted directly by a presidential candidate’s family.”
—DMITRY PESKOV, Russian government spokesman

The Plot to Hack America — читать онлайн бесплатно полную книгу (весь текст) целиком

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «The Plot to Hack America», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

The Bears Arrive

In April 2016 DNC chief executive officer Amy Dacey contacted DNC lawyer Michael Sussman. Dacey called him to let him know that the DNC’s IT department noticed strange behavior on their system. Sussman was a partner at Perkins Coie, a firm focused on cybercrimes. Sussman contacted Shawn Henry, president of cybersecurity firm CrowdStrike, to conduct an assessment and determine if there was a breach and how deep it went. 4CrowdStrike revealed that the DNC computers had been breached and that data on contributors, opposition research on candidates, and even the day-to-day inter-office chats and email had been stolen. The whole system had been professional compromised.

CrowdStrike assessed that COZY BEAR had breached the system in 2015 and had been engaged in gathering data for a year. They then found that a second group, FANCY BEAR had breached the server in April of 2016. They managed to penetrate through spear-phishing, the technique of sending a false email to a victim, who would subsequently click on a link in the email, connecting them to a hacker’s server. In this case, one of the spear-phishing attacks used a fraudulent site with the deliberately misspelled URL “misdepatrment.com.” The link was supposed to connect the target to the MIS Department. Instead sent the user to an identical, but fake site called a watering hole, that downloaded a malware kit on the victim’s computer. The malware contained additional modules to disseminate the computer virus widely throughout the DNC’s servers.

CrowdStrike discovered that COZY BEAR used a malware kit identified as “SeaDuke” (also called “SeaDaddy”), a backdoor module that was installed in the file “pagemgr.exe.” 5It was noted by F-Secure that SeaDuke was written in the Python coding language, which indicated that COZY BEAR knew the operating system might be based on Linux.

In order to evade the security systems, the attackers would update their modules or the location of their C2 servers. The report said the second attack group was APT28, FANCY BEAR. It used a module named “X-Agent” to enable it to send remote commands, watch every keystroke through keylogging, and transfer files via the C2 server. The group also used “X-Tunnel” malware to give them the ability to send even more remote commands to the servers. The X-Tunnel was set to 45.32.129.185, revealing that it was built specifically for this hack, giving it the ability to extract passwords and create its own encrypted private network to operate covertly.

Several cyber security firms have examined the related metadata to the ATP 28 FANCY BEAR infections. They have nearly unanimously found that several combinations of factors tie this group to a large group of similar infections since 2007. In particular, the Internet Protocol or IP address like 176.31.112.10, used for its command and control sever (C2) shows up repeatedly in other cyber warfare campaigns. 6This IP was linked to the breaches at the German Bundestag, the DNC, and the DCCC. Additionally, both IPs are associated with the watering hole attacks and the C2 servers on the DNC and DCCC hacks, revealing their past associations. Another key indicator is the time zone associated when compiling the malware. Russian threat actors like APT28 work most commonly at UTC+4 time zone. While compiling the data about the hack, several firms noted that the operating system used to develop the malware was set to Cyrillic, Russian language text, during some of the development, but not in all.

The firms also noted Russia’s association the ATP-29 COZY BEAR malware, also called “SeaDaddy” or “SeaDuke,” because it had already been extensively tracked by several cyber security firms and associated with Russian Intelligence. As with APT 28, indicators embedded within the metadata pointed to Russia as the source of this malware. This also included the C2 server IPs reused from past operations known to be Russian. The operational time of module compilation and the targets they struck were beneficial only to Russian interests.

Another indicator of professional intelligence agency involvement was the way they performed OpSec or Operational Security. OpSec was the methodology the operators used to evade detection and cover their tracks. CrowdStrike was impressed and called it “superb.” They noted that they demonstrated a “live off the land” approach to evading security. In fact, just one year before the DNC hack was revealed, the firm found COZY BEAR responsible for hacks of the White House, the State Department, and the U.S. Joint Chiefs of Staff.

“We have identified no collaboration between the two actors, or even an awareness of one by the other,” Dmitri Alperovitch wrote in a blog post. “Instead, we observed the two Russian espionage groups compromise the same systems and engage separately in the theft of identical credentials.” 7Alperovitch wrote this is “not an uncommon scenario” in Russia, where the primary domestic and foreign intelligence agencies—the FSB and SVR, respectively—have a competitive and even adversarial relationship.

The hackers frequently cleared out the logs that would reveal their activities or reset the timestamp of files so it appeared that they were never opened or tampered with. 8However, some additional breadcrumb trails lead many cyber security firms and intelligence agencies to conclude that this was the work of the CYBER BEARS or one of its hired hacker hit squads.

Another critical bit of evidence was the use of a specific Command and Control server in the attack. It was traced back to the IP address of 176.31.112.10 and it had been seen before. This same IP came up during the investigation on the German Bundestag spear-phishing. That attempt was believed to have been carried out by Russian intelligence. 9

By May 18, 2016, The Director of National Intelligence, James R. Clapper Jr. spoke at the Bipartisan-Policy Center in Washington and said there were “indications” of attempted cyberattacks in the 2016 presidential campaign without specifying either attempted intrusions or on suspected foreign or domestic hackers. 10Brian P. Hale, director of public affairs for the Office of the Director of National Intelligence, backed Clapper up stating, “we’re aware that campaigns and related organizations and individuals are targeted by actors with a variety of motivations, from philosophical differences to espionage, and capabilities, from defacements to intrusions,” and, “we defer to FBI for specific incidents.” 11

On June 15, 2016 a Wordpress page appeared with links to the stolen DNC Documents. It was posted by Guccifer 2.0 and came with a list of Frequently Asked Questions.

“Hello! I received lots of questions from journalists and other people who are interested in my doings. Many thanks to all of you, it’s a pleasure for me!

Unfortunately, I couldn’t reply to each of you personally, especially given that you often asked the same questions. That’s why I decided to answer the most frequently asked questions here.

I divided them into three groups:

1. About me

2. About my activities and publications

3. About my political views

As you can guess, all special services are doing their best trying to locate and catch me. And I have absolutely no desire to help them. So, if your curiosity isn’t satisfied after reading this post, you may have my apologies. It’s a matter of life and death. But I can assure you that everything I do corresponds to my beliefs.

Let’s get it started!

1. A glimpse of me

Many people ask me where I’m from, where I live and other personal information.

You see, I can’t show you my IDs, it would be stupid of me.

I can only tell you that I was born in Eastern Europe. I won’t answer where I am now. In fact, it’s better for me to change my location as often as possible. I have to hide.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «The Plot to Hack America»

Представляем Вашему вниманию похожие книги на «The Plot to Hack America» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «The Plot to Hack America»

Обсуждение, отзывы о книге «The Plot to Hack America» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x