Hacker News new | past | comments | ask | show | jobs | submit login
CIA Email Hackers Return with Major Law Enforcement Breach (wired.com)
93 points by CPLX on Nov 7, 2015 | hide | past | favorite | 45 comments



>“Just to clear this up,” Cracka tweeted on Thursday about the breach of the JABS database. “CWA did, indeed, have access to everybody in USA’s private information, now imagine if we was Russia or China.”

If this is true, I'm a little surprised and disappointed. The U.S. can spend trillions on its military conflicts around the world, but can't do good cyber security? Even when handled with the highest precision, a massive cyber security team would be much less costly than building warships and the next space-age jet fighter, surely. How is it possible for a country with the resources of the U.S. to miss such important areas of technological security, such that a team of "crackas", as they call themselves, can come along and exploit it? Is awareness of the needs of the digital age really so far behind the technology itself?


As I mentioned in a recent thread[1], the government's approach to cybersecurity has been 100% offense. I suspect this may be a pre-network strategy being applied to a networked world, where concepts like border security and enumerating threats[2] actually worked.

In the late-80s/early-90s, I used to laugh at the common sci-fi trope of always having some convenient way to hack into anything. I originally assumed this was literary license[3]; surely nobody would actually be dumb enough to to put critical systems on a publicly-accessible network! Well... I guess I was wrong. Not only were we stupid enough to connect everything to a network, some people are trying to start an entire industry based on the idea of plugging things into the internet.

We've simply gotten lucky so far; we have barely scratched the surface of what can be done. I know rare problems are notoriously hard to model. Getting people to properly prepare for these events or even simply understand the actual cost of failure can be incredibly difficult, but that doesn't mean the problem can be ignored.

I almost see a similarity to the martingale[4] betting strategy. It works ok until you get your first rare set of consecutive losses and you bottom out your bankroll. The core problem in martingale is that it requires you to have an unbounded pool of cash to work with, so maybe the answer insecurity is related to only accepting risks if the risk has known bounds.

[1] https://news.ycombinator.com/item?id=10482498

[2] http://www.ranum.com/security/computer_security/editorials/d...

[3] JMS has talked about the need for license when he wrote Babylon 5, where he said that the ships always move "at the speed of plot".

[4] https://en.wikipedia.org/wiki/Martingale_%28betting_system%2...


>the government's approach to cybersecurity has been 100% offense.

I also read your other comment that you posted in the comment >This is a serious problem, not only from the problems intelligence angies with many powers and poor oversight; ignoring defense is going to bite a lot of people in bad ways. We are already seeing the beginnings of this with the escalating impact computer-based attacks are having on their victims.

I agree. Yes its embarrassing and they keep claiming "Do more Penetration Testing, more Vulnerability Scanning, more Risk assessment" Nobody even knows what the hell that even means and we're still getting breached! The biggest mistake we've made is to claim, "a great offense is always the best defense."

We should be doing Security Compliance aka Defense in Depth! But everybody seems to think Defense in Depth is somehow different from Security Compliance.

>Defense in Depth is when multiple layers of security controls are placed throughout a critical environment. It is a layering tactic, conceived by the National Security Agency (NSA) as a comprehensive approach to information and electronic security.

If they actually went through the diligence of conforming with the security controls (ISO 27002, FEDRAMP, NIST 800-53) that they defined (much like financial compliance conforms to policies, standards, or laws), they'd be in a much more comprehensive shape. Even PCI-DSS...just replace the word cardholder data with sensitive data and you have more defense than whatever snake-oil Security Risk Plan is out there.

I champion for compliance =).


"Defense in Depth" is always important. The article I linked to above[2] about how it's incredibly stupid to try an enumerate badness (aka "default permit") has in it's list other stupid excuses we hear all the time:

    "We don't need a firewall, we have good host security"
    "We don't need host security, we have a good firewall"
I bet the people that say that kind of nonsense have a lock on their server room door even after hiring a guard that watches the building's main entrance.

This kind of practical defense isn't the only thing we've been skipping. We need a lot more basic research into how to secure modern technology. We need a design culture that isn't building features that require insecurity.

It is limiting top think of this problem as a "cybesecurity" problem. These same technologies will create problems in all areas of life, so we need a lot more education about what capabilities exist how they can be used. We need to be teaching people - from a very young age - what happens to your {meta,}data in a world with permanent data storage and powerful machine learning analysis. We need this education "yesterday", as these problems are not theoretical anymore[5].

[5] http://www.nytimes.com/2012/02/19/magazine/shopping-habits.h...


You are right on.

We're working on something in this vein -- https://www.trycryptomove.com -- our technology does security via continuous concealment. Actively defends against insider attacks and catastrophic breaches, because the attacker can't even identify the data.

We've gotten two types of reactions: (1) we get it, layered security, defense in depth; (2) solution in search of a problem, we have good host security, we have a good firewall, legacy data-at-rest security is good enough. Thankfully far more of #1 than #2, but it's telling about an organization's approach to security.


>our technology does security via continuous concealment.

IMO, this isn't a castle approach. Its more like you've added a security control to help with Data Retention.


Who is saying this?

>We don't need a firewall, we have good host security >We don't need host security, we have a good firewall


Most businesses from the beginning of the internet to a few years ago? (I'm not sure how common it is now).

The "quote" (paraphrase of a very-common attitude) is from this link in my first post:

http://www.ranum.com/security/computer_security/editorials/d...


the government's approach to cybersecurity has been 100% offense

That is completely wrong. The CSS is largely devoted to IA and IP, not to mention many other defensive cyber support units. In fact DHS, FBI and FCC have heavily invested in Critical Infrastructure protection, NETSEC and related capabilities.

Is it sufficient? No, but saying that the USG strategy is 100% offensive is completely and totally untrue.

[1]https://www.nsa.gov/about/central_security_service/index.sht... [2]http://www.dhs.gov/topic/cybersecurity


I don't think it's a question of resources, it's a question of priorities. The US government spends tons of money on all sorts of things, but spending that money instead on security would mean they'd have to stop doing some of those other things that we actually pay them to do. The Navy could stop buying warships and spend all the extra money on security, but then they wouldn't have any warships, which is what the Navy is actually for.

This is by no means a government only issue. Multi-billion dollar companies keep getting hacked for basically the same reason. They too have lots of resources, but they are also spending those resources actually doing something. The BEST result you can get from spending on security is...nothing bad happens.

I completely understand the counter-argument that spending on security saves you the costs associated with getting owned, but that's clearly a hard argument to make to people who see all the other ways their money can be spent directly producing the results expected of them. It's the same basic problem IT has always faced ("it costs money, it doesn't MAKE money"), but it's worse with security since you don't even see it for the most part, except maybe as an annoyance.


>The BEST result you can get from spending on security is...nothing bad happens.

That's crap =]. A secret about security compliance (aka defense in depth) is that it actually reduces your technical debt, doesn't increase it. That's the best result in the world, low technical debt!


Right, and also good security solutions should have active defense features that fight breaches as they occur. Most breached organizations don't know they've been breached until months later...

We're working on this at https://www.trycryptomove.com


> “CWA did, indeed, have access to everybody in USA’s private information, now imagine if we was Russia or China.”

You can safely assume that many organisations and governments would have access to a database like that.


They probably figured out an individual's password. Maybe the system shouldn't allow outside access to individuals with just a password, but it isn't really that shocking that they got into it.

I like how grandiose that tweet is, as if Xi Jinping starts every meeting by making fun of a few felony mug shots, look at the mustache on this guy, hahaha.


>Maybe the system shouldn't allow outside access to individuals with just a password

Well that is exactly my point. If that is indeed possible, then why? Who is running the American government networks? Are they really so naive?


They are just like every IT worker in a large non-software industry: instructed by their boss that more important employees than you are currently unable to do their jobs because of your security restrictions, so remove them or be fired.


To be fair, as long as you are building systems on top of general purpose operating systems and exposing them to the internet, you're going to be vulnerable to one hack or another. No matter how much money you throw at the problem, this won't be the last time someone hacks someone's email account or figures out a password to a police computer.

I don't disagree that cyber-warfare is becoming a more important consideration in the context of modern military doctrine, but electronic warfare has been around since long before the internet. It's just one more evolution.

In defense of kinetic war-fighting, it's easier for us to turn off the internet than it is for the other guys to turn off an aircraft carrier.


>To be fair, as long as you are building systems on top of general purpose operating systems and exposing them to the internet, you're going to be vulnerable to one hack or another. No matter how much money you throw at the problem, this won't be the last time someone hacks someone's email account or figures out a password to a police computer.

This is crap =]. There's only 3 ways an attacker can get in.

1. Software Bug - 0-day exploits are only effective until the developer fixes the bad code (patch).

2. Configuration Drift - Attackers can only pop boxes that have drifted away from being updated or hardened. That's why they can only pop one of the boxes...not all the boxes. That's why you Recon more than Infiltrate.

3. Social Engineering - Why does the person who is easily susceptible to phishing have keys to the castle?

All-the-time diligence (not point-in-time diligence) implemented on security controls is what's needed. Not more cyber-offense (e.g. Penetration Testing, Vulnerability Scanning, Risk Assessments)


the real issue on this is you don't know what you don't know. the IT directors/management may even have a security dept which is doing "work", but doesnt have talented enough folks who recognize the real risk and address it. Im sure some project manager in the department has been producing vulnerability reports and defects closed to management, demonstrating how secure they are.


> How is it possible for a country with the resources of the U.S. to miss such important areas of technological security

The US is a democracy. Most of the voters are not very intelligent. That means, most of the politicians elected to run the government aren't very intelligent either. I mean, voters would have to be intelligent themselves in order to tell the difference between a dumbass political candidate and an intelligent one. And I think it's the politicians who usually hire the people who run intelligence agencies, law enforcement agencies etc.


It's probably a result of the early days of the internet. Nobody knows we have this network, and we have passwords after all so we're good. On top of that base, the contracts that built these systems probably didn't specify much in the way of security.

Even with the recent OPM breaches, probably nobody thinks it's their problem, and weak contracts are probably still being bid.


Boils down to the question - who wants to go work on security for the government?


> which is supposed to be available only to the FBI and other law enforcement agencies around the country.

I think that a group one million possibly armed users with access to a secret shared database and private IM client shouldn't be reduced by by the adverb "only".


"Only" in this context doesn't mean "few". If you take it out of the quoted sentence, then the portal could also be available to veterinarians, carnival barkers, and scuba instructors. But it's not supposed to be available to those people, only to the FBI and other law enforcement agencies.


>Sealed arrest records are also quite common in hacker investigations when law enforcement officials quietly arrest an individual, then flip him to work as a confidential informant with agents to capture others.

So I guess they'll be able to foresee when one of their crew gets turned al la lulzsec.


Yeah, I don't think this is going to turn out well for them. Granted lulzsec was broken up by having a mole so it might make it more difficult for law enforcement, but then again the FBI has been known to use blackhat means to track people across tor[0] and use malware to obtain information[1].

[0] http://www.wired.com/2013/09/freedom-hosting-fbi/

[1] http://www.wired.com/2014/08/operation_torpedo/


Two words: air gap

I remember when Lockheed got hacked, I thought, why the hell were their CAD workstations connected to the Internet at all? So the engineers could check Facebook? And with so-called "Internet of things" it's only going to get more ludicrous.


Have you ever seen an organization that secured valuable data effectively?

I don't mean one where they followed some standards or had the right policy, but where, as implemented by IT and as practiced by users and admins, the data was secured so well that attackers would not steal the data - where it was too difficult to be worthwhile. I mean an organization you know intimately, where you know how the sausage is made.

Generally, the reality I've seen is security through obscurity.


Classic and common modus tollens. That you don't know of one does not mean they don't exist.

But to your question yes, I have seen one. It all hinged on people actually internalizing security measures such that it was part of how they lived their lives.


I used to work for a major telco and any sensitive lines here monitored looking up C or Liz II's telephone details would ring a lot of alarms.

And then you and had better hope MI5 got to you before BT's internal security did.

The fact that the DCI's details where not secured is shocking the CEO, Chairman head of security should be fired.

Id probably fire the entre call centre shift to make the point as well.


Haven't the news media hacked into royal family phones, voicemail, etc. multiple times? Maybe that wasn't via BT.


That was mobile voicemail

And back in 92/93 there was an instance where a journalist got a tempory job in Edinburgh and looked up a private line at hollyrood.

After that they got very serious about security lead devlopers on some systems have to be DV Vetted now.

btw DV is the same roughly as TS clearance.


The news media don't have access to British Telecom's internal systems, so any hacking they do is outside of internal security controls. Here, BT != bluetooth (which may indeed be the attack vector for many hacks).


There are rumors that tabloids have physically hacked into CAB's (street boxes) to tap lines the old fashioned way - probably using bent linesmen.


I don't get what these hackers are after by pastebin'ing their attack.

It can't be money (as mentioned, by selling the data to gossip magazines they could earn more Bitcoins than MtGox), it can't be security (or else they'd have posted how they gained entry) and it can't really be fame as the feds will stop at nothing to hunt them down now...


It's pretty clear since they even wrote about the motive in the article.

>I'm the bad guy in the news that's targeting the US government for funding Israel.

> US government to stop funding Israel and for them to stop killing innocent people

> Did you know there was over 26,000 civilian deaths due to war-related violence in the Afghanistan war

> Did you know the US military bombed an Afghan hospital? [0]

So, basically it's about freedom from the US government suppressing other states.

[0] http://pastebin.com/KtN8FqPu that is linked in the article


>Free Palestine. The United States government funds Israel, and in Israel they kill innocent people. We're going to do it until they stop funding Israel or until we get raided.

>I'm below the age of 22 years old. I smoke pot. And I live in America

>I'm going to go to Russia and chill with Snowden because I know the government is pretty mad about this I'm probably going to get tortured. I'm actually a pretty fast runner.

>The government and the police. Like the White House people. They're losers.

Looks like they did it for the lulz to me.

http://money.cnn.com/2015/10/19/technology/cia-hack-john-bre...


Yes, Palestine sure is hilarious, isn't it?

I laud his reasons.


I laud his reasons as well, and I defend to the death his right to speak them.


It sounds less about the states the U.S. is suppressing and more the people the U.S. is oppressing, the states are just side effect of that.


Without any proof for or against, it is interesting to view this attack as a state-sponsored PSYOP.


> Enterprise File Transfer Service

> IDEAFX—a “web-based, file/folder sharing capabilities for cross-organizational teams”

> Justice Enterprise File Sharing

Can we talk for a bit about how much money is being spent to do the same thing three times?


Soon, someone is going to post a similar breach, where they gained access to anyone's browsing history in the UK! Brave new world...


Bragging about your exploits on Twitter and giving interviews to Wired is what informants do to fish for more hackers to snitch on.


It's a good default assumption that any database that more than 10k people have access to is compromised or trivially compromisable.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: