[iwar] [fc:Cyberterrorism.Scenarios.Scrutinized]

From: Fred Cohen (fc@all.net)
Date: 2002-08-24 08:13:19


Return-Path: <sentto-279987-5242-1030201984-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sat, 24 Aug 2002 08:14:07 -0700 (PDT)
Received: (qmail 17513 invoked by uid 510); 24 Aug 2002 15:11:20 -0000
Received: from n25.grp.scd.yahoo.com (66.218.66.81) by all.net with SMTP; 24 Aug 2002 15:11:20 -0000
X-eGroups-Return: sentto-279987-5242-1030201984-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.67.192] by n25.grp.scd.yahoo.com with NNFMP; 24 Aug 2002 15:13:04 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_1_0_1); 24 Aug 2002 15:13:03 -0000
Received: (qmail 39188 invoked from network); 24 Aug 2002 15:13:03 -0000
Received: from unknown (66.218.66.217) by m10.grp.scd.yahoo.com with QMQP; 24 Aug 2002 15:13:03 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta2.grp.scd.yahoo.com with SMTP; 24 Aug 2002 15:13:03 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g7OFDJY08531 for iwar@onelist.com; Sat, 24 Aug 2002 08:13:19 -0700
Message-Id: <200208241513.g7OFDJY08531@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Sat, 24 Aug 2002 08:13:19 -0700 (PDT)
Subject: [iwar] [fc:Cyberterrorism.Scenarios.Scrutinized]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, hits=0.0 required=5.0 tests=DIFFERENT_REPLY_TO version=2.20
X-Spam-Level: 

Cyberterrorism Scenarios Scrutinized
Date:  Friday, 23 August 2002
<a href="http://www.ds-osac.org/edb/cyber/news/story.cfm?KEY=8816">http://www.ds-osac.org/edb/cyber/news/story.cfm?KEY=8816>


Source:  PC World Communications

Story:  WASHINGTON--At the inaugural SECTOR5 conference that opened in
Washington, D.C., Wednesday, the talk of cyberterrorism is talk of an IT
doomsday. In it, weapons of mass disruption replace weapons of mass
destruction, and instead of a "dirty bomb" filled with radioactive
material hitting a city, terrorists pack "logic bombs" in their bag of
nasty tricks.

Conference officials kicked off the event with a dark scenario involving
the New York Stock Exchange and a group of terrorists who gain access to
the trading floor data center by taking temporary jobs there as IT
employees. In the scenario described, the terrorists plug into open
ports in the data center and use accounts issued to them as employees.

Doomsday Scenario

Their dirty work begins with the release of a fast-spreading worm that
takes over all servers associated with the trading floor. This worm
penetrates Windows, Linux, and other operating systems in a variety of
ways, burrowing into security holes in Web servers, browsers, e-mail,
and network applications. To avoid detection it changes its appearance
and behavior as it spreads. Anti-virus software is no help, according to
the scenario, because the worm travels so quickly and because it
exploits previously unknown vulnerabilities--known as zero-day
exploits--in various servers. The worm's spread consumes most of the
bandwidth on the trading floor network for several minutes, making it
appear that a mere temporary surge in bandwidth usage has occurred.
Things return to normal when the worm falls dormant on the servers, and
systems administrators breathe a sigh of relief.

Then the logic bomb is dropped. It initially dupes systems
administrators into thinking everything is okay, by allowing them to
check the integrity of the data and showing it to be valid. But it
destroys the data when they want to use it to restore their systems by
overwriting it seven times with alternating ones and zeroes.

These events are just the opening act of the simulation, which goes on
to employ a variety of techniques including denial of service attacks to
bring down servers on the trading floor and elsewhere. The end result is
the compromising of millions upon millions of computers worldwide and
the effective disabling of the Internet.

Jolted to Attention

Farfetched? Not in the post-September 11 world, where vendors and
government officials participating in SECTOR5 believe terrorists will do
anything to make their point.

"It sounded like the simulation really got people thinking," said Peggy
Weigle, chief executive officer of Sanctum, a software security vendor.
"From our experience doing audits or hacking demonstrations, it still
amazes people how easy it is to breach systems at the application level
or at the system level."

Sanctum broke into 98 percent of the 350 large corporate sites it has
audited, compromising the security in an average of two hours, Weigle
says. Often Sanctum accessed the directory structure containing things
like the master file for passwords. In the case of an unnamed airline
reservation site, Sanctum accessed back-up files of source code for Web
application interfaces.

"We did this sitting at a Web browser. People don't believe it until
they see it," Weigle said.

Charles Sander, vice president and managing principal of Unisys'
airports practice, referred to his work on a new security infrastructure
for airlines after the PanAm 103 explosion over Lockerbie, Scotland. One
of the best tools was that the U.K. government agreed to impose a
standard that essentially legislated how airlines handle security, he
said.

Practical Paranoia

Qinetiq is one of several co-sponsors of the SECTOR5 conference, which
derives its name from the title Summit Exploring Cyber Terrorism. The
company espouses the intrusion management model, which suggests viewing
cyberterrorism as inevitable. Consequently, the industry can reallocate
its efforts to be more effective and more precise in determining how it
might happen, said Michael Corby, president of Qinetiq.

But industry wants the government to guide minimum security standards
for all companies, Corby said. The U.S. government alone is expected to
spend billions of dollars on IT once the new Department of Homeland
Security is in place. But Corby said it will be at least six months
after that before vendors know what standards they will be expected to
follow in their products.

Many in the SECTOR5 audience of about 300 government and private sector
IT professionals, as well as vendors, appeared to support a government
plan for security certification. It would be similar to a recent
Congressional act requiring chief executive officers and chief financial
officers to certify under legal penalty that financial results are
accurate. The audience broke into applause at the certification
suggestion.

Some attendees also saw significance in the participation by
representatives of the three U.S. government agencies slated to be part
of the new Department of Homeland Security. They are the National
Infrastructure Protection Center, the Critical Infrastructure Assurance
Office, and the Secret Service.

"You are going to see a lot more coordinated effort among the CIAO,
NIPC, and the Secret Service," said John M. Frazzini, special agent in
the secret service. The result will be "a lot more synergy and a more
coordinated government approach," he added.

Vendors have requested a single contact to deal with the government on
critical infrastructure projects, Frazzini said.

------------------------ Yahoo! Groups Sponsor ---------------------~-->
4 DVDs Free +s&p Join Now
http://us.click.yahoo.com/pt6YBB/NXiEAA/mG3HAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:32 PDT