CaseStudies.docx

New York Organized Crime

Origin: US FBI
Tactics: Malware
Goal: Roving Bug

FBI covertly downloaded software onto the cell phones of two leading members of the 
Genovese crime family, turning the phones into “roving bugs.” The phones could be remotely activated to listen to conversations in a room, even when their owners had turned them off.

Greek Leadership

Origin: Unknown
Tactics: Malicious Software
Goal: Espionage

Sometime prior to the 2004 Olympics, someone illegally implanted software in at least four switches of the Greek cellular telephone network. This additional code routed audio from calls made by senior members of the Greek government to another unidentified mobile handset where they could be recorded.

https://www.greeka.com/greece-history/athens-2004/

The tap wasn’t discovered until March 2005 when the unauthorized code caused a new software build to crash. In an effort to clear the problem and get the system back up, the service provider cleared all old software and system logs, erasing any record of the problem. The perpetrators remain unidentified. (2)

Estonia

Origin: Russia
Tactics: Denial of Service
Goal: Political Statement

In 2007 after having realized independence from the former Soviet Union, Estonia moved monuments commemorating WWII Soviet soldiers from prominent positions in the capital to relatively obscure areas.
Shortly afterward, Estonian media, banking, and government web sites experienced a massive DDoS attack. Although the attack appeared to originate from Russia, that country denied official involvement in the attack. (3)

https://wwwnc.cdc.gov/travel/destinations/traveler/none/estonia

Syria

Origin: Israel
Tactics: Cyber and Kinetic
Goal: Destruction of Nuclear Facility

Pre and post strike imagery of the target

http://commons.wikimedia.org/wiki/File:Syrian_Reactor_Before_After.jpg
After getting wind of a nuclear program underway in Syria, Israel’s Mossad tailed a senior Syrian official to London. There they slipped into his hotel room during his absence, copied the hard drive on his laptop and installed spyware. Data recovered from this operation included photos and blueprints for what turned out to be a plutonium reactor near Dayraz Zawr built and operated with North Koran assistance. (8) Was Syria developing a nuclear weapon? On 6 September 2007 an Israeli airstrike destroyed the facility. Clever use of both electronic and cyber attack enabled the strike force to complete its mission unscathed. According to coverage in Aviation Week & Space Technology:

”…(analysts) contend that network penetration involved both remote air-to-ground electronic attack and penetration through computer-to-computer links. “There also were some higher-level, non-tactical penetrations, either direct or as diversions and spoofs of the Syrian command and control capability, done through network attack,” one U.S. intelligence specialist says…” (9)
Georgia

Origin: Russia
Tactics: Denial of Service, Web page defacement
Goal: Part of a coordinated military campaign

 
The Georgian Parliament web site was defaced with images of Hitler (credit The New York Times).

This may be the first recorded instance of a cyber attack being used as part of a coordinated military campaign. According to an Aug. 12, 2008, New York Times article:
Before the Gunfire, Cyberattacks:“…In addition to D.D.O.S. attacks that crippled Georgia’s limited Internet infrastructure, researchers said there was evidence of redirection of Internet traffic through Russian telecommunications firms beginning last weekend …”
“…malicious programs known as botnets, which were blasting streams of useless data at Georgian computers…”. (4)

U.S. and South Korea

Origin: North Korea (DPRK)
Tactics: Denial of Service
Goal: Political Statement

https://commons.wikimedia.org/wiki/File:2006_North_Korean_nuclear_test.svg

For several days during July 2009, web sites in both South Korea and the United States were hit by a massive distributed denial of service attack. Beginning around July 4th, the attacks hit the web sites of South Korea’s intelligence agency, biggest banks, and leading national newspaper. Similar attacks struck web sites at the Pentagon, and White House. (5)

South Korea Banking

Origin: North Korea (DPRK)
Tactics: Server Attack
Goal: Political Statement

http://commons.wikimedia.org/wiki/File:Currency_South_Korea.jpg

In April 2011 attackers gained access to servers belonging to South Korean bank Nonghyup, (National Agricultural Cooperative Federation) via the compromised laptop of an IT support contractor. Once inside the network, the malware deleted key files on over 100 servers, blocking access to accounts and ATMs for several million customers over a three day period. Backup disaster recovery files were also damaged. (6)

According to a Wall Street Journal report:
“The Seoul Central District Prosecutors’ Office said one of the IP addresses of an overseas server used for the attack matched one used in a previous cyberattack attributed to North Korea. The prosecutor’s office also noted similarities in methods for the attack, including how malicious codes were planted in the compromised laptop.” (7)

Iran

Origin: United States and Israel(?)
Tactics: Stuxnet worm
Goal: Damage or disrupt key portions of Iran’s nuclear processing effort

Stuxnet, which surfaced in mid-2010, represents a major development in the cyber war battleground. The size and complexity of its code along with its ability to take advantage of zero day Windows exploits almost certainly point to state sponsorship. While its authors haven’t been officially identified, a New York Times article (10) suggests that Stuxnet may have been a joint U.S. Israeli effort and part of a larger cyber war campaign known as Olympic Games.

Stuxnet represents the first piece of malware targeted against a specific infrastructure element – in this case the Siemens PLC (programmable logic controller) used in the uranium enrichment centrifuges of Iran’s nuclear processing effort. Its code was cleverly designed to derail or delay any attempt to process uranium into weapon grade material. It did so by taking control of the spinning centrifuges and causing them to spin erratically or even self-destruct while reporting normal operation to their control panel.
For more on Stuxnet, check out this wrap up video by F-Secure.
Iran

Origin: United States (?)
Tactics: Flame worm
Goal: Espionage

Initially reported by both Iran CERT and security firm Kaspersky in May 2012, Flame is a highly sophisticated spyware worm which infects Windows PCs via a spoofed Microsoft Windows update.

Although its originator has not been identified, Flame’s size (20 MB for some versions) and complexity indicate state sponsorship. A map of infections (left) suggests Iran and one or more Middle Eastern countries as its targets.
Flame’s tactics include: (11)
• Remote activation and monitoring of a PC’s web cam and microphone.
• Copying of selected files.
• Screenshots from applications of interest.
• Ability to evade detection by current security systems.
• A complex command and control network of proxy servers (which went dark shortly after Kaspersky publicly announced its discovery).

A map showing flame infections as of May 2012 as compiled by Kaspersky Lab (12)
Middle Eastern
Banking and Financial Networks

Origin: United States (?)
Tactics: Gauss Spyware
Goal: Espionage

Discovered by Kaspersky Lab in June 2012,
Gauss is estimated to have been active since late 2011. Its code and command and control architecture bear a number of similarities to Flame’s. However, unlike Flame, Gauss appears to be specifically targeted at several Lebanese financial institutions. Was it intended to track terrorist finances?
Its capabilities include:

“• Intercept browser cookies and passwords.
• Harvest and send system configuration data to attackers.
• Infect USB sticks with a data stealing module. List the content of the system drives and folders
• Steal credentials for various banking systems in the Middle East
• Hijack account information for social network, email and IM accounts.“ (13)

http://www.securelist.com/en/downloads/vlpdfs/kaspersky-lab-gauss.pdf(this link opens in a new window/tab)
 
Kaspersky Lab map of Gauss infections (14)
Saudi Arabia and Qatar

Origin: Iran
Tactics: Shamoon Virus
Goal: Damage or disrupt petroleum industries

In mid-August 2012 Saudi oil firm Aramco began experiencing problems with its workstations. Shortly afterward, several security firms reported the discovery of new malware dubbed “Shamoon” which appeared to be targeting the networks of both Aramco and a Qatari gas firm. It ultimately affected 30,000 computers on the companies’ networks before being identified and removed. Analysts suggest Iran as the attacker under the guise of a group calling itself the “Cutting Sword of Justice” (15).

http://commons.wikimedia.org/wiki/File:Oil_and_Gas_Infrastructure_
Persian_Gulf_(large).gif
According to U.S. CERT, Shamoon contains three modules:
(1) a dropper which does the initial installation
(2) a reporter which passes information about the infection and selected files to the attacker, and
(3) a wiper which erases files on the victim computer.  Once the reporter module has finished, the wiper overwrites the Master Boot Record and other key files on the victim computer, rendering it useless.  Fortunately, Shamoon was directed against business
networks and did not affect SCADA links associated with production. (16)

US Banks

Origin: Iran
Tactics: DDoS
Goal: Disrupt Customer Access

http://commons.wikimedia.org/wiki/File
:Botnet_edit.svg

    
 

References

 
1. Declan McCullagh and Anne Broache, “FBI taps cell phone mic as eavesdropping tool,” CNET News, December 1, 2006, http://news.cnet.com/FBI-taps-cell-phone-mic-as-eavesdropping-tool/2100-1029_3-6140191.html?tag=mncol

2. Prevelakis and Spinellis, “The Athens Affair,” IEEE Spectrum, July 2007, http://offnews.info/downloads/athensAffaire.pdf

3. Joshua Davis, “Hackers Take Down the Most Wired Country in Europe,” Wired, August 21, 2007, http://www.wired.com/print/politics/security/magazine/15-09/ff_estonia

4. Markoff (Aug. 12, 2008) Before the Gunfire, Cyberattacks The New York Times, Aug. 12, 2008 http://www.nytimes.com/2008/08/13/technology/13cyber.html?_r=2&hp

5. John Sudworth, “New ‘cyber attacks’ hit S Korea,” BBC News, July 9, 2009, http://news.bbc.co.uk/2/hi/asia-pacific/8142282.stm

6. Kim Tae-gyu, “NH blames IBM for network crash,” The Korea Times, April 14, 2011, http://www.koreatimes.co.kr/www/news/biz/2011/04/123_85196.html

7. Se Young Lee, “Seoul Blames North for Bank Hack,” The Wall Street Journal, May 4, 2011, http://online.wsj.com/article/SB10001424052748703922804576300562037789384.html

8.

9. David A. Fulghum and Robert Wall, “U.S. Electronic Surveillance Monitored Israeli Attack On Syria”, Aviation Week & Space Technology, November 21, 2007, https://www.worldsecuritynetwork.com/Israel-Palestine/David-A.-Fulghum-and-Robert-Wall-/U.S.-Electronic-Surveillance-Monitored-Israeli-Attack-On-Syria

10. Sanger, David. “Obama Order Sped Up Wave of Cyberattacks Against Iran.” The New York Times, June 1, 2012. http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all

11. Kaspersky Lab, “Kaspersky Lab and ITU Research Reveals New Advanced Cyber Threat,” Kaspersky Press Center, May 29, 2012, https://usa.kaspersky.com/about/press-releases/2012_kaspersky-lab-and-itu-research-reveals-new-advanced-cyber-threat

12. Kaspersky Lab, ”The Flame: Questions and Answers,” Kaspersky, May 28, 2012, https://www.pcworld.com/article/256508/the_flame_virus_your_faqs_answered.html

13. GReAT, “Gauss: Nation-state cyber-surveillance meets banking Trojan,” Securelist blog, August 9, 2012, http://www.securelist.com/en/blog?weblogid=208193767

14. Kaspersky Lab, ”Gauss: Abnormal Distribution,” Kaspersky Lab, August, 2012, https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/20134940/kaspersky-lab-gauss.pdf

15. Mills, Elinor. “Saudi Oil firm says 30,000 computers hit by virus.” CNET, August 27, 2012. http://news.cnet.com/8301-1009_3-57501066-83/saudi-oil-firm-says-30000-computers-hit-by-virus

16. ICS-CERT. “Shamoon.” ICS-CERT Monthly Monitor, September 2012, 1-2. https://www.us-cert.gov/sites/default/files/Monitors/ICS-CERT_Monitor_Sep2012.pdf

17. Egan, Matt. ”Lieberman: Blame Iran for Cyber Attacks on Bank of America, Chase” Fox, September 24, 2012. https://www.foxbusiness.com/features/lieberman-blame-iran-for-cyber-attacks-on-bank-of-america-chase

18. Lemos, Robert. “More Banks Come Under Denial-of-Service Attack”, eWeek, October 13, 2012, https://www.eweek.com/security/more-banks-come-under-denial-of-service-attack

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Open chat
1
You can contact our live agent via WhatsApp! Via + 1 929 473-0077

Feel free to ask questions, clarifications, or discounts available when placing an order.

Order your essay today and save 20% with the discount code GURUH