{"id":57537,"date":"2015-02-17T06:49:04","date_gmt":"2015-02-17T11:49:04","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/suite-of-sophisticated-nation-state-attack-tools-found-with-connection-to-stuxnet\/"},"modified":"2015-02-17T06:49:04","modified_gmt":"2015-02-17T11:49:04","slug":"suite-of-sophisticated-nation-state-attack-tools-found-with-connection-to-stuxnet","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/suite-of-sophisticated-nation-state-attack-tools-found-with-connection-to-stuxnet\/","title":{"rendered":"Suite of Sophisticated Nation-State Attack Tools Found With Connection to Stuxnet"},"content":{"rendered":"<p><p>    CANCUN, MexicoThe last two years    have been filled with revelations about NSA surveillance    activities and the sophisticated spy tools the agency uses to    take control of everything from individual systems to entire    networks. Now it looks like researchers at Kaspersky Lab may    have uncovered some of these NSA tools in the wild on customer    machines, providing an extensive new look at the spy agencys    technical capabilities. Among the tools uncovered is a worm    that appears to have direct connections to Stuxnet, the digital    weapon that was launched repeatedly against centrifuges in Iran    beginning in late 2007 in order to sabotage them. In fact,    researchers say the newly uncovered worm may have served as a    kind of test run for Stuxnet, allowing the attackers to map a    way to targeted machines in Iran that were air-gapped from the    internet.  <\/p>\n<p>    For nearly a year, the researchers    have been gradually collecting components that belong to    several highly sophisticated digital spy platforms that they    say have been in use and development since 2001, possibly even    as early as 1996, based on when some command servers for the    malware were registered. They say the suite of surveillance    platforms, which they call EquationLaser, EquationDrug and    GrayFish, make this the most complex and sophisticated spy    system uncovered to date, surpassing even the recently exposed    Regin    platform believed to have been created by Britains GCHQ    spy agency and used to infiltrate computers belonging to the    European Union and a Belgian telecom called Belgacom, among    others.  <\/p>\n<p>    The new platforms, which appear to    have been developed in succession with each one surpassing the    previous in sophistication, can give the attackers complete and    persistent control of infected systems for years, allowing them    to siphon data and monitor activities while using complex    encryption schemes and other sophisticated methods to avoid    detection. The platforms also include an innovative module, the    likes of which Kaspersky has never seen before, that re-flashes    or reprograms a hard drives firmware with malicious code to    turn the computer into a slave of the attackers. The    researchers, who gave WIRED an advance look at their findings    and spoke about them today at the Kaspersky Security Analyst    Summit in Mexico, have dubbed the attackers the Equation    Group and consider them the most advanced threat actor    theyve seen to date.  <\/p>\n<p>    The researchers have     published an initial paper on their findings and plan to    publish more technical details over the next few days, but    theres still a lot they dont know about the Equation Groups    activities.  <\/p>\n<p>    As we uncover more of these cyber    espionage operations we realize how little we understand about    the true capabilities of these threat actors, Costin Raiu,    head of Kasperskys Global Research and Analysis Team told    WIRED.  <\/p>\n<p>    Although the researchers have no    solid evidence that the NSA is behind the tools and decline to    make any attribution to that effect, there is circumstantial    evidence that points to this conclusion. A keywordGROKfound    in a keylogger component     appears in an NSA spy tool catalog leaked to journalists in    2013. The 53-page document detailswith pictures, diagrams    and secret codenamesan array of complex devices and    capabilities available to intelligence operatives. The    capabilities of several tools in the catalog identified by the    codenames UNITEDRAKE, STRAITBAZZARE, VALIDATOR and SLICKERVICAR    appear to match the tools Kaspersky found. These codenames    dont appear in the components from the Equation Group, but    Kaspersky did find UR in EquationDrug, suggesting a possible    connection to UNITEDRAKE (United Rake). Kaspersky also found    other codenames in the components that arent in the NSA    catalog but share the same naming conventionsthey include    SKYHOOKCHOW, STEALTHFIGHTER, DRINKPARSLEY, STRAITACID,    LUTEUSOBSTOS, STRAITSHOOTER, and DESERTWINTER.  <\/p>\n<p>    Other evidence possibly pointing    to the NSA is the fact that five victims in Iran who were    infected with Equation Group components were also key victims    of Stuxnet, which was reportedly created and launched by the    U.S. and Israel.  <\/p>\n<p>    Kaspersky wouldnt identify the    Iranian victims hit by the Equation tools, but the five key    Stuxnet victims have been previously    identified as five companies in Iran, all contractors in    the business of building and installing industrial control    systems for various clients. Stuxnet targeted industrial    control systems used to control centrifuges at a    uranium-enrichment plant near Natanz, Iran. The companiesNeda    Industrial Group, Kala Electric, Behpajooh, CGJ (believed to be    Control Gostar Jahed) and Foolad Technicwere infected with    Stuxnet in the hope that contractors would carry it into the    enrichment plant on an infected USB stick. This link between    the Equation Group and Stuxnet raises the possibility that the    Equation tools were part of the Stuxnet attack, perhaps to    gather intelligence for it.  <\/p>\n<p>    But the newly uncovered worm    created by the Equation Group, which the researchers are    calling Fanny after the name of one of its files, has an    equally intriguing connection to Stuxnet.  <\/p>\n<p>    It uses two of the same zero-day    exploits that Stuxnet used, including the infamous .LNK    zero-day exploit that helped Stuxnet spread to air-gapped    machines at Natanzmachines that arent connected to the    internet. The .LNK exploit in Fanny has a dual purposeit    allows attackers to send code to air-gapped machines via an    infected USB stick but also lets them surreptitiously collect    intelligence about these systems and transmit it back to the    attackers. Fanny does this by storing the intelligence in a    hidden file on the USB stick; when the stick is then inserted    into a machine connected to the internet, the data intelligence    gets transferred to the attackers. EquationDrug also makes use    of the .LNK exploit. A component called SF loads it onto USB    sticks along with a trojan to infect machines.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the rest here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/feeds.wired.com\/c\/35185\/f\/661370\/s\/4374a3ac\/sc\/4\/l\/0L0Swired0N0C20A150C0A20Ckapersky0Ediscovers0Eequation0Egroup0C\/story01.htm\/RK=0\/RS=VJJun725rltpF5qtKfmXtb8xYQQ-\" title=\"Suite of Sophisticated Nation-State Attack Tools Found With Connection to Stuxnet\">Suite of Sophisticated Nation-State Attack Tools Found With Connection to Stuxnet<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> CANCUN, MexicoThe last two years have been filled with revelations about NSA surveillance activities and the sophisticated spy tools the agency uses to take control of everything from individual systems to entire networks.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/suite-of-sophisticated-nation-state-attack-tools-found-with-connection-to-stuxnet\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-57537","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/57537"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=57537"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/57537\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=57537"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=57537"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=57537"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}