Articles liés à Countdown to Zero Day: Stuxnet and the Launch of the...

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon. - Couverture rigide

 
9780770436179: Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon.
Afficher les exemplaires de cette édition ISBN
 
 
Extrait :
CHAPTER 1

EARLY WARNING

Sergey Ulasen is not the sort of person you’d expect to find at the center of an international incident. The thirty-one-year-old Belarusian has close-cropped blond hair, a lean boyish frame, and the open face and affable demeanor of someone who goes through life attracting few enemies and even fewer controversies. One of his favorite pastimes is spending the weekend at his grandmother’s country house outside Minsk, where he decompresses from weekday stresses, far from the reach of cell phones and the internet. But in June 2010, Ulasen encountered something unusual that soon propelled him into the international spotlight and into a world of new stress.1

It was a warm Thursday afternoon, and Ulasen, who headed the antivirus division of a small computer security firm in Belarus called Virus–BlokAda, was seated with his colleague Oleg Kupreev in their lab in downtown Minsk inside a drab, Soviet-era building about a block from the Svisloch River. They were sifting methodically through suspicious computer files they had recently found on a machine in Iran when something striking leapt out at Kupreev. He sat back in his chair and called Ulasen over to take a look. Ulasen scrolled through the code once, then again, to make sure he was seeing what he thought he saw. A tiny gasp escaped his throat. The code they had been inspecting the past few days, something they had until now considered a mildly interesting but nonetheless run-of-the-mill virus, had just revealed itself to be a work of quiet and diabolical genius.

Not only was it using a skillful rootkit to cloak itself and make it invisible to antivirus engines, it was using a shrewd zero-day exploit to propagate from machine to machine--an exploit that attacked a function so fundamental to the Windows operating system, it put millions of computers at risk of infection.

Exploits are attack code that hackers use to install viruses and other malicious tools onto machines. They take advantage of security vulnerabilities in browser software like Internet Explorer or applications like Adobe PDF Reader to slip a virus or Trojan horse onto a system, like a burglar using a crowbar to pry open a window and break into a house. If a victim visits a malicious website where the exploit lurks or clicks on a malicious e-mail attachment containing an exploit, the exploit uses the security hole in the software to drop a malicious file onto their system. When software makers learn about such holes in their products, they generally produce “patches” to close them up and seal the intruders out, while antivirus firms like Ulasen’s add signatures to their scanners to detect any exploits that try to attack the vulnerabilities.

Zero-day exploits, however, aren’t ordinary exploits but are the hacking world’s most prized possession because they attack holes that are still unknown to the software maker and to the antivirus vendors--which means there are no antivirus signatures yet to detect the exploits and no patches available to fix the holes they attack.

But zero-day exploits are rarely found in the wild. It takes time and skill for hackers to discover new holes and write workable exploits to attack them, so the vast majority of hackers simply rely on old vulnerabilities and exploits to spread their malware, counting on the fact that most computer users don’t often patch their machines or have up-to-date antivirus software installed, and that it can take vendors weeks or months to produce a patch for a known hole. Although more than 12 million viruses and other malicious files are captured each year, only about a dozen or so zero-days are found among them. Yet here the attackers were using an extremely valuable zero-day exploit, and a skillful rootkit, for a virus that, as far as Ulasen and Kupreev could tell, had only been found on machines in Iran so far. Something didn’t add up.
THE MYSTERY FILES had come to their attention a week earlier when a reseller of VirusBlokAda’s security software in Iran reported a persistent problem with a customer’s machine in that country. The computer was caught in a reboot loop, crashing and rebooting repeatedly while defying the efforts of technicians to control it.2 VirusBlokAda’s tech-support team had scanned the system remotely from Minsk to look for any malware their antivirus software might have missed, but came up with nothing. That’s when they called in Ulasen.

Ulasen had been hired by the antivirus firm while still in college. He was hired to be a programmer, but the staff at VirusBlokAda was so small, and Ulasen’s skills so keen, that within three years, at the age of twenty-six, he found himself leading the team that developed and maintained its antivirus engine. He also occasionally worked with the research team that deconstructed malicious threats. This was his favorite part of the job, though it was something he rarely got to do. So when the tech-support team asked him to weigh in on their mystery from Iran, he was happy to help.3

Ulasen assumed the problem must be a misconfiguration of software or an incompatibility between an application installed on the machine and the operating system. But then he learned it wasn’t just one machine in Iran that was crashing but multiple machines, including ones that administrators had wiped clean and rebuilt with a fresh installation of the operating system. So he suspected the culprit might be a worm lurking on the victim’s network, reinfecting scrubbed machines each time they were cleaned. He also suspected a rootkit was hiding the intruder from their antivirus engine. Ulasen had written anti-rootkit tools for his company in the past, so he was confident he’d be able to hunt this one down if it was there.

After getting permission to connect to one of the machines in Iran and remotely examine it, Ulasen and Kupreev zeroed in on six suspicious files--two modules and four other files--they thought were the source of the problem.4 Then with help from several colleagues in their lab, they spent the next several days picking at the files in fits and starts, hurling curses at times as they struggled to decipher what turned out to be surprisingly sophisticated code. As employees of a small firm that mostly developed antivirus products for government customers, they weren’t accustomed to taking on such complex challenges: they spent most of their days providing routine tech support to customers, not analyzing malicious threats. But they pressed forward nonetheless and eventually determined that one of the modules, a driver, was actually a “kernel-level” rootkit, as Ulasen had suspected.5

Rootkits come in several varieties, but the most difficult to detect are kernel-level rootkits, which burrow deep into the core of a machine to set up shop at the same privileged level where antivirus scanners work. If you think of a computer’s structure like the concentric circles of an archer’s target, the kernel is the bull’s eye, the part of the operating system that makes everything work. Most hackers write rootkits that operate at a machine’s outer layers--the user level, where applications run--because this is easier to do. But virus scanners can detect these--so a truly skilled hacker places his rootkit at the kernel level of the machine, where it can subvert the scanner. There, it serves as a kind of wingman for malicious files, running interference against scanners so the malware can do its dirty work unhindered and undetected. Kernel-level rootkits aren’t uncommon, but it takes sophisticated knowledge and a deft touch to build one that works well. And this one worked very well.6

Kupreev determined that the rootkit was designed to hide four malicious .LNK files--the four other suspicious files they’d found on the system in Iran. The malware appeared to be using an exploit composed of these malicious files to spread itself via infected USB flash drives, and the rootkit prevented the .LNK files from being seen on the flash drive. That’s when Kupreev called Ulasen over to have a look.

Exploits that spread malware via USB flash drives aren’t as common as those that spread them over the internet through websites and e-mail attachments, but they aren’t unheard of, either. All of the USB exploits the two researchers had seen before, however, used the Autorun feature of the Windows operating system, which allowed malicious programs on a USB flash drive to execute as soon as the drive was inserted in a machine. But this exploit was more clever.7

Windows .LNK files are responsible for rendering the icons for the contents of a USB flash drive or other portable media device when it’s plugged into a PC. Insert a USB flash drive into a PC, and Windows Explorer or a similar tool automatically scans it for .LNK files to display the icon for a music file, Word document, or program stored on the flash drive.8 But in this case, the attackers embedded an exploit in a specially crafted .LNK file so that as soon as Windows Explorer scanned the file, it triggered the exploit to spring into action to surreptitiously deposit the USB’s malicious cargo onto the machine, like a military transport plane dropping camouflaged paratroopers onto enemy territory.

The .LNK exploit attacked such a fundamental feature of the Windows system that Ulasen wondered why no one had thought of it before. It was much worse than Autorun exploits, because those could be easily thwarted by disabling the Autorun feature on machines--a step many network administrators take as a matter of course because of Autorun’s known security risk. But there is no way to easily disable the .LNK function without causing other problems for users.

Ulasen searched a registry of exploits for any others that had used .LNK files in the past, but came up with nothing. That was when he suspected he was looking at a zero-day.

He took a USB flash drive infected with the malicious files and plugged it into a test machine running Windows 7, the newest version of the Microsoft operating system. The machine was fully patched with all the latest security updates. If the .LNK exploit was already known to Microsoft, patches on the system would prevent it from dropping the malicious files onto the machine. But if the .LNK exploit was a zero-day, nothing would stop it. He waited a few minutes to examine the computer and, sure enough, the malicious files were there.

He couldn’t believe it. VirusBlokAda, a tiny security firm that few in the world had ever heard of, had just discovered that rarest of trophies for a virus hunter. But this wasn’t just any zero-day exploit; it was one that worked against every version of the Windows operating system released since Windows 2000: the attackers had bundled four versions of their exploit together--in four different .LNK files--to make sure their attack worked against every version of Windows it was likely to encounter.9

Ulasen tried to wrap his head around the number of machines that were at risk of infection from this. But then something equally troubling struck him. The malicious driver module, and another driver module that got dropped onto targeted machines as part of the malicious cargo, had installed themselves seamlessly on their test machine, without any warning notice popping up on-screen to indicate they were doing so. Windows 7 had a security feature that was supposed to tell users if an unsigned driver, or one signed with an untrusted certificate, was trying to install itself on their machine. But these two drivers had loaded with no problem. That was because, Ulasen realized with alarm, they were signed with what appeared to be a legitimate digital certificate from a company called RealTek Semiconductor.10

Digital certificates are trusted security documents, like digital passports, that software makers use to sign their programs to authenticate them as legitimate products of their company. Microsoft digitally signs its programs and software updates, as do antivirus firms. Computers assume that a file signed with a legitimate digital certificate is trustworthy. But if attackers steal a Microsoft certificate and the private cryptographic “key” that Microsoft uses with the certificate to sign its files, they can fool a computer into thinking their malicious code is Microsoft code.

Attackers had used digital certificates to sign malicious files before. But they had used fake, self-signed certificates masquerading as legitimate ones, or had obtained real certificates through fraudulent means, such as creating a shell company to trick a certificate authority into issuing them a certificate under the shell company’s name.11 In both scenarios, attackers ran the risk that machines would view their certificate as suspicious and reject their file. In this case, the attackers had used a valid certificate from RealTek--a trusted hardware maker in Taiwan--to fool computers into thinking the drivers were legitimate RealTek drivers.

It was a tactic Ulasen had never seen before and it raised a lot of questions about how the attackers had pulled it off. One possibility was that they had hijacked the computer of a RealTek software developer and used his machine and credentials to get their code secretly signed.12

But it was also possible the attackers had simply stolen the signing key and certificate, or cert. For security reasons, smart companies store their certs and keys on offline servers or in hardware security modules that offered extra protection. But not everyone did this, and there were possible clues to suggest that RealTek’s cert had indeed been nabbed. A timestamp on the certificates showed that both of the drivers had been signed on January 25, 2010. Although one of the drivers had been compiled a year earlier on January 1, 2009, the other one was compiled just six minutes before it was signed. The rapid signing suggested the attackers might have had the RealTek key and cert in their possession. There was something notable about the compilation date of this driver, however. When hackers ran their source code through a compiler to translate it into the binary code that a machine could read, the compiler often placed a timestamp in the binary file. Though attackers could manipulate the timestamp to throw researchers off, this one appeared to be legitimate. It indicated that the driver had been compiled on July 14, two days after VirusBlokAda had gone public with news of Stuxnet.

The implications were disturbing. The use of a legitimate digital certificate to authenticate malicious files undermined the trustworthiness of the computer world’s signing architecture and called into question the legitimacy of any file signed with digital certificates thereafter. It was only a matter of time before other attackers copied the tactic and began stealing certificates as well.13 Ulasen needed to get the word out.

Responsible disclosure dictated that researchers who find vulnerabilities in software notify the relevant vendors before going public with the news to give the vendors time to patch the holes, so Ulasen dashed off e-mails to both RealTek and Microsoft, notifying them of what his team had found.

But after two weeks passed with no response from either company, Ulasen and Kupreev decided they couldn’t keep quiet.14 The rest of the security community needed to know about the .LNK exploit. They had already added signatures to VirusBlokAda’s antivirus engine to detect the malicious files and were seeing infections pop up on machines all over the Middle East and beyond. The worm/virus was on the run and spreading quickly. They had to go public with the news.15

1 Ulasen and his team encountered the malware the week of June 24, 2010.

2 Ulasen has never disclosed the name of the reseller, but a link on VirusBlokAda’s website f...
Présentation de l'éditeur :
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.
 
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery—apparently as much to the technicians replacing the centrifuges as to the inspectors observing them.
 
Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly.
 
 At first, the firm’s programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity.
 
They had, they soon learned, stumbled upon the world’s first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility. 
 
In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet’s planning, execution, and discovery, covering its genesis in the corridors of Bush’s White House and its unleashing on systems in Iran—and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making.
 
But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today’s flourishing zero-day “grey markets,” in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike—and shows us just what might happen should our infrastructure be targeted by such an attack.
 
Propelled by Zetter’s unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a world at the edge of a new kind of war.

Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.

  • ÉditeurCrown Business
  • Date d'édition2014
  • ISBN 10 077043617X
  • ISBN 13 9780770436179
  • ReliureRelié
  • Nombre de pages304
  • Evaluation vendeur
EUR 35,24

Autre devise

Frais de port : EUR 2,80
Vers Etats-Unis

Destinations, frais et délais

Ajouter au panier

Autres éditions populaires du même titre

9780770436193: Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

Edition présentée

ISBN 10 :  0770436196 ISBN 13 :  9780770436193
Editeur : Crown, 2015
Couverture souple

Meilleurs résultats de recherche sur AbeBooks

Image d'archives

Zetter, Kim
Edité par Crown (2014)
ISBN 10 : 077043617X ISBN 13 : 9780770436179
Neuf Couverture rigide Quantité disponible : 1
Vendeur :
Big Bill's Books
(Wimberley, TX, Etats-Unis)
Evaluation vendeur

Description du livre Hardcover. Etat : new. Brand New Copy. N° de réf. du vendeur BBB_new077043617X

Plus d'informations sur ce vendeur | Contacter le vendeur

Acheter neuf
EUR 35,24
Autre devise

Ajouter au panier

Frais de port : EUR 2,80
Vers Etats-Unis
Destinations, frais et délais
Image d'archives

Zetter, Kim
Edité par Crown (2014)
ISBN 10 : 077043617X ISBN 13 : 9780770436179
Neuf Couverture rigide Quantité disponible : 1
Vendeur :
GoldenWavesOfBooks
(Fayetteville, TX, Etats-Unis)
Evaluation vendeur

Description du livre Hardcover. Etat : new. New. Fast Shipping and good customer service. N° de réf. du vendeur Holz_New_077043617X

Plus d'informations sur ce vendeur | Contacter le vendeur

Acheter neuf
EUR 35,14
Autre devise

Ajouter au panier

Frais de port : EUR 3,74
Vers Etats-Unis
Destinations, frais et délais
Image d'archives

Zetter, Kim
Edité par Crown (2014)
ISBN 10 : 077043617X ISBN 13 : 9780770436179
Neuf Couverture rigide Quantité disponible : 1
Vendeur :
LibraryMercantile
(Humble, TX, Etats-Unis)
Evaluation vendeur

Description du livre Etat : new. N° de réf. du vendeur newMercantile_077043617X

Plus d'informations sur ce vendeur | Contacter le vendeur

Acheter neuf
EUR 36,27
Autre devise

Ajouter au panier

Frais de port : EUR 2,80
Vers Etats-Unis
Destinations, frais et délais
Image d'archives

Zetter, Kim
Edité par Crown (2014)
ISBN 10 : 077043617X ISBN 13 : 9780770436179
Neuf Couverture rigide Quantité disponible : 1
Vendeur :
Wizard Books
(Long Beach, CA, Etats-Unis)
Evaluation vendeur

Description du livre Hardcover. Etat : new. New. N° de réf. du vendeur Wizard077043617X

Plus d'informations sur ce vendeur | Contacter le vendeur

Acheter neuf
EUR 37,24
Autre devise

Ajouter au panier

Frais de port : EUR 3,27
Vers Etats-Unis
Destinations, frais et délais
Image d'archives

Zetter, Kim
Edité par Crown (2014)
ISBN 10 : 077043617X ISBN 13 : 9780770436179
Neuf Couverture rigide Quantité disponible : 1
Vendeur :
Grumpys Fine Books
(Tijeras, NM, Etats-Unis)
Evaluation vendeur

Description du livre Hardcover. Etat : new. Prompt service guaranteed. N° de réf. du vendeur Clean077043617X

Plus d'informations sur ce vendeur | Contacter le vendeur

Acheter neuf
EUR 36,75
Autre devise

Ajouter au panier

Frais de port : EUR 3,97
Vers Etats-Unis
Destinations, frais et délais
Image d'archives

Zetter, Kim
Edité par imusti (2014)
ISBN 10 : 077043617X ISBN 13 : 9780770436179
Neuf Couverture rigide Quantité disponible : 1
Vendeur :
Front Cover Books
(Denver, CO, Etats-Unis)
Evaluation vendeur

Description du livre Etat : new. N° de réf. du vendeur FrontCover077043617X

Plus d'informations sur ce vendeur | Contacter le vendeur

Acheter neuf
EUR 36,73
Autre devise

Ajouter au panier

Frais de port : EUR 4,02
Vers Etats-Unis
Destinations, frais et délais
Image d'archives

Zetter, Kim
Edité par Crown (2014)
ISBN 10 : 077043617X ISBN 13 : 9780770436179
Neuf Couverture rigide Quantité disponible : 1
Vendeur :
GoldBooks
(Denver, CO, Etats-Unis)
Evaluation vendeur

Description du livre Hardcover. Etat : new. New Copy. Customer Service Guaranteed. N° de réf. du vendeur think077043617X

Plus d'informations sur ce vendeur | Contacter le vendeur

Acheter neuf
EUR 36,98
Autre devise

Ajouter au panier

Frais de port : EUR 3,97
Vers Etats-Unis
Destinations, frais et délais
Image d'archives

Zetter, Kim
Edité par Crown (2014)
ISBN 10 : 077043617X ISBN 13 : 9780770436179
Neuf Couverture rigide Quantité disponible : 1
Vendeur :
GoldenDragon
(Houston, TX, Etats-Unis)
Evaluation vendeur

Description du livre Hardcover. Etat : new. Buy for Great customer experience. N° de réf. du vendeur GoldenDragon077043617X

Plus d'informations sur ce vendeur | Contacter le vendeur

Acheter neuf
EUR 38,43
Autre devise

Ajouter au panier

Frais de port : EUR 3,04
Vers Etats-Unis
Destinations, frais et délais
Image d'archives

Zetter, Kim
Edité par imusti (2014)
ISBN 10 : 077043617X ISBN 13 : 9780770436179
Neuf Couverture rigide Quantité disponible : 1
Vendeur :
Hafa Adai Books
(Moncks Corner, SC, Etats-Unis)
Evaluation vendeur

Description du livre Etat : new. N° de réf. du vendeur Hafa_fresh_077043617X

Plus d'informations sur ce vendeur | Contacter le vendeur

Acheter neuf
EUR 46,09
Autre devise

Ajouter au panier

Frais de port : EUR 3,69
Vers Etats-Unis
Destinations, frais et délais
Image d'archives

Zetter, Kim
Edité par Crown (2014)
ISBN 10 : 077043617X ISBN 13 : 9780770436179
Neuf Couverture rigide Quantité disponible : 1
Vendeur :
The Book Spot
(Sioux Falls, SD, Etats-Unis)
Evaluation vendeur

Description du livre Hardcover. Etat : New. N° de réf. du vendeur Abebooks588575

Plus d'informations sur ce vendeur | Contacter le vendeur

Acheter neuf
EUR 61,57
Autre devise

Ajouter au panier

Frais de port : Gratuit
Vers Etats-Unis
Destinations, frais et délais