{"id":53306,"date":"2015-01-19T02:51:53","date_gmt":"2015-01-19T07:51:53","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-secretly-hijacked-existing-malware-to-spy-on-n-korea-others\/"},"modified":"2015-01-19T02:51:53","modified_gmt":"2015-01-19T07:51:53","slug":"nsa-secretly-hijacked-existing-malware-to-spy-on-n-korea-others","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/nsa-secretly-hijacked-existing-malware-to-spy-on-n-korea-others\/","title":{"rendered":"NSA secretly hijacked existing malware to spy on N. Korea, others"},"content":{"rendered":"<p><p>    When the NSA had limited access to North Korea's networks, the    agency secretly tapped into South Korea's surveillance malware.  <\/p>\n<p>    A new wave of documents from Edward Snowden's cache of National    Security Agency data published by Der Spiegel demonstrate how    the agency has used its network exploitation capabilities both    to defend military networks from attack and to co-opt other    organizations' hacks for intelligence collection and other    purposes. In one case, the NSA secretly tapped into South    Korean network espionage on North Korean networks to gather    intelligence.  <\/p>\n<p>    The documents were published as part of     an analysis by Jacob Appelbaum and others working for Der    Speigel of how the NSA has developed an offensive cyberwarfare    capability over the past decade. According to a report by    the New York Times, the access the NSA gained into    North Korea's networkswhich initially leveraged South Korean    \"implants\" on North Korean systems, but eventually consisted of    the NSA's own malwareplayed a role in attributing the attack    on Sony Pictures to North Korean state-sponsored actors.  <\/p>\n<p>    Included with the documents released by Der Spiegel are details    on how the NSA built up its Remote Operations Center to carry    out \"Tailored Access Operations\" on a variety of targets, while    also building the capability to do permanent damage to    adversaries' information systems, including internal NSA    newsletter interviews and training materials. Also included was    a malware sample for a keylogger, apparently developed for by    NSA and possibly other members of the \"Five Eyes\" intelligence    community, was also included in the dump. The code appears to    be from the Five Eyes joint program \"Warriorpride,\" a set of    tools shared by the NSA, the United Kingdom's GCHQ, The    Australian Signals Directorate, Canada's Communications    Security Establishment, and New Zealand's Government    Communications Security Bureau.  <\/p>\n<p>    It's not clear from the report whether the keylogger sample    came from the cache of documents provided by former NSA    contractor Edward Snowden, or from another source. As of now,    Appelbaum and Der Spiegel have not yet responded to a request    by Ars for clarification. However, Appelbaum has previously    published content from the NSA, including the     NSA's ANT catalog of espionage tools, that were apparently    not from the Snowden cache.  <\/p>\n<p>    The core of NSA's ability to detect, deceive, block and even    repurpose others' cyber-attacks, according to the documents,    are     Turbine and Turmoil, components of the Turbulence family of    Internet surveillance and exploitation systems. These systems    are also connected to Tutelage, an NSA system used to monitor    traffic to and from US military networks, to defend against    attacks on Department of Defense systems.  <\/p>\n<p>    When an attack on a DoD network is detected through passive    surveillance (either through live alerts from the Turmoil    surveillance filters or processing by the Xkeyscore database),    the NSA can identify the components involved in the attack and    take action to block it, redirect it to a false target to    analyze the malware used in the attack, or do other things to    disrupt or deceive the attacker. This all happens outside of    DOD's networks, on the public Internet, using \"Quantum\" attacks    injected into network traffic at a routing point.  <\/p>\n<p>    But NSA can also use others' cyberattacks for its own purposes,    including hijacking botnets operated by other actors to spread    NSA's own \"implant\" malware. Collection of intelligence of a    target using another actor's hack of that target is referred to    within the signals intelligence community as \"fourth party    collection.\" By discovering an active exploit by another    intelligence organization or other attacker on a target of    interest, the NSA can opportunistically ramp up collection on    that party as well, or even use it to distribute its own    malware to do surveillance.  <\/p>\n<p>    In a case study covered in one NSA presentation, the NSA's    Tailored Access Office hijacked a botnet known by the codename    \"Boxingrumble\" that had primarily targeted the computers of    Chinese and Vietnamese dissidents, and was being used to target    the DOD's unclassified NIPRNET network. The NSA was able to    deflect the attack and fool the botnet into treating one of    TAO's servers as a trusted command and control (C&C or C2)    server. TAO then used that position of trust, gained by    executing a DNS spoofing attack injected into the botnet's    traffic, to gather intelligence from the bots and distribute    NSA's own implant malware to the targets.<\/p>\n<p>    Things get even more interesting in the case of NSA's urgent    need to gather more intelligence from North Korea's networks.    In a question-and-answer posting to NSA's intranet, an NSA    employee recounted a \"fifth party\" collection that occurred    when the NSA hacked into South Korea's exploit of North Korean    computers--and ended up collecting data from North Korea's hack    of someone else:  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more:<br \/>\n<a target=\"_blank\" href=\"http:\/\/arstechnica.com\/information-technology\/2015\/01\/nsa-secretly-hijacked-existing-malware-to-spy-on-n-korea-others\" title=\"NSA secretly hijacked existing malware to spy on N. Korea, others\">NSA secretly hijacked existing malware to spy on N. Korea, others<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> When the NSA had limited access to North Korea's networks, the agency secretly tapped into South Korea's surveillance malware. A new wave of documents from Edward Snowden's cache of National Security Agency data published by Der Spiegel demonstrate how the agency has used its network exploitation capabilities both to defend military networks from attack and to co-opt other organizations' hacks for intelligence collection and other purposes. In one case, the NSA secretly tapped into South Korean network espionage on North Korean networks to gather intelligence.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/nsa-secretly-hijacked-existing-malware-to-spy-on-n-korea-others\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-53306","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/53306"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=53306"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/53306\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=53306"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=53306"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=53306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}