Sunday, June 3, 2012

Flame Virus and Blowback on the Digital Battlefield

Topher Morrison


The “Flame” virus is the atom bomb of 21st century espionage, to date the largest and most elaborate computer bug ever discovered.  It has lived in the deep recesses of Iranian government computers for years, spying on everyone and everything it comes into contact with.

It is more than a mere surveillance virus, it’s an “entire” self-contained “cyber espionage operation” according to Roel Schouwenberg, a senior security researcher with Russian based Kaspersky Labs, one of the first security networks to analyze the malware.  While mostly infecting Iranian computer systems the virus has also been detected throughout the Middle East in Saudi Arabia, United Arab Emirates, Egypt, Sudan and even as far as Europe under the name sKyWIper or “Wiper,” this according to Hungarian based CrySyS Lab.  By their estimates Flame may have been active “for as long as five to eight years.”

Iran’s National Computer Emergency Response Team (CERT) or MAHER Center, which initially discovered the worm working its way through their systems, reported it was undetectable by 43 known antivirus protocols and only discovered after several investigations.  The intruder has thus far been successful at not only remaining undetected until recently, but responsible for “mass data loss” according to MAHER officials.  Iranian agencies have since developed a removal tool to eliminate the threat.

At a whopping 20 megabytes Flame is 20 to 30 times larger than the infamous Stuxnet and Duqu viruses discovered in 2009 and 2010.  Stuxnet was used to attack Iran’s nuclear program, the ravenous bug caused centrifuges in a targeted facility to spin out of control, ultimately destroying it and setting back potential nuclear capability by years if new estimates by Israeli intelligence are correct.

Flame exceeds previous generations of malware.  It has the capability to collect lists of “vulnerable passwords”, “create series of user’s screen captures,” covertly send intelligence back to remote servers, link to discoverable Bluetooth devices and even act as a beacon for a Bluetooth device to link back.  It is quite versatile, capable of infecting Windows XP, Vista and 7 other common operating systems.

While Flame was created on a different platform than Duqu or Stuxnet, in fact utilizing a well known, easier to use “Lua” programming language, responsible for popular games like Angry Birds evidence seems to suggest that Flame is similar enough in that the previously “unassailable” Linux OS is also thought to be vulnerable.  The fact that Flame uses this unorthodox, albeit simpler code has been credited with its ability to outwit standard countermeasures even given its relatively colossal size.
One of the most interesting parts of Flame is its various permutations.  It has an ability to carry out very specific tasks each time it is recreated.  Besides the aforementioned it can also turn on microphones, potentially cameras and send back all relevant information through multiple domains to its command and control servers (C&C) located all over the world.  Moreover, as a veritable binary spy it has an exit strategy.  The controller can use the “browse32” function to create a digital LZ and pluck the virus out from behind enemy lines leaving not a trace.

The State-Sponsored Cyber War

There is little doubt in the cyber security realm that Flame is anything, but a state-sponsored operation.  The two other possible culprits – hacktivists and cybercriminals – don’t match Flame’s modus operandi.  Flame isn’t after bank accounts and it doesn’t resemble the rather simple tools known to be used by Anonymous, LulzSec and others.  Rather than targeting multilateral corporations or political institutions, the high concentration of attacks within Iran and throughout the Middle East suggests geopolitical objectives generally pursued by nation states.

Israel and the United States top the short list of likely culprits and for simplicity’s sake Israel has been more than happy to tacitly admit complicity – again.  According to Vice PM Moshe Yaalon Israel is “blessed as being a country rich with high-tech” and takes pride in the “opportunities” this has given them.  More specifically the likely source is Israel’s Unit 8200, equivalent to the United State’s National Security Agency (NSA) and in fact founded in 1952 off surplus American military equipment.  The unit has allegedly been responsible for using a secret “kill switch” to deactivate Syrian air defenses during Operation Orchard.  Moreover, alumni of the military intelligence branch have gone on to found leading Israeli IT companies.  Unit 8200 is shrouded in mystery including its commander a Brigadier-General whose identity remains classified.

Considering Israel and the U.S. have acknowledged conducting clandestine operations in Iran this is merely the next logical chapter after years of ongoing low intensity warfare.  No conventional troops, no sorties just faux color revolutions, Nevada trained proxy insurgencies a la Mujadahideen-e-Khalq (MEK), multi lateral sanctions and a cornucopia of sabotage or given recent events the newest tactic – cybertage.  The perfect strategy for the 21st century, after all it’s discrete and politically correct.
The responsibility for conducting these offensive cyber operations in the new digital battlefield is likely the newest player on the military industrial complex’s bench, the Pentagon’s Cyber Command (USCYBERCOM), which virtually ties together the strategic mosaic of American global hegemony.

According to the U.S. officials USCYBERCOM is responsible for merely “defense” of military telecommunications infrastructure (.mil etc.), but recent reinterpretations of what the best defense actually is and broad mission statements make vividly clear its hegemonic intent:
“USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.”
Domestic considerations are left to the Department of Homeland Security (DHS) and its brand new baby the National Cybersecurity Center, a mini Pentagon, recently completed and based in Salt Lake City, Utah.  Ring leading the cyber security circus is undoubtedly the now nearly century old ultra secretive NSA no stranger to flouting international or U.S. law.  A fact well documented by James Bamford in his works Puzzle Palace and Body of Secrets.

Digital attacks are nothing new to the U.S. strategy.  Preceding even Hollywood movies like War Games and Hackers the CIA was purportedly behind “the mother of all Scada attacks” 30 years ago when it used a “logic bomb” to blow up a Siberian gas pipeline.  The KGB was trying to steal pipeline control software and the CIA rigged the software to over pressurize the Soviet pipelines.  In a similar vein,  Flame has been found infecting the Iranian oil industry responsible for 80% of the country’s revenue.

Digital Blowback

Over and over again we hear from not only Iran’s leadership, but through our own intelligence services that Iran is demonstrably no closer to a nuclear weapon than they were almost 10 years ago.  That is precisely the need for an all encompassing super virus like Flame, a virus capable of telling us about literally every key stroke Iranian officials make.  Western nations have no evidence thus far of Iran’s nefarious intent merely hearsay, the opinion of “intelligence experts”, former “security chiefs” and crazy theocrats bent on Islamic empire.  Western and Israeli intelligence agencies are looking for a “smoking calutron,” thus far they have failed.

Nevertheless it is political gold to be tough on Persia with persistent little regard for how we arrived at this point of mistrust – meet our lingering Iranian war psychosis.  Probably the most disturbing part of it all is the obvious self-fulfilling prophecy and the clear opportunity for digital blowback and ultimately the validation of everything the government wishes to convince us is a real threat.

In March on “60 Minutes” retired U.S. Air Force General Michael Hayden, former director of the CIA and NSA, commented on the downside of the Stuxnet virus. “There are those out there who can take a look at this… and maybe even attempt to turn it to their own purposes,” Hayden said.  His opinion was backed up by Sean McGurk, a former cybersecurity official at DHS who noted the Stuxnet source code could be copied and used against new targets, possibly aimed back at the United States.  Whoever created Stuxnet or DuQu, “They opened the box. They demonstrated the capability… It’s not something that can be put back,” according to Mcgurk.

Flame opens the same Pandora’s Box.  As Thomas Friedman was famous for noting, the World is Flat – so is the digital battlefield.  “In warfare, when a bomb goes off it detonates; in cyberwarfare, malware keeps going and gets proliferated,” said Roger Cressey, senior vice president at security consultancy Booz Allen Hamilton, at a Bloomberg cybersecurity conference held in New York last month.  The idea that our own espionage malware will proliferate in our fruitless attempt the prevent the proliferation of other weapons of mass destruction (albeit physical in nature) will surely use up a life time supply of irony.

Alas, this is the sign of our times.  We end one war only to receive another in its stead.  The code wars of the future may be entirely of our own design and will make the asymmetrical warfare of the War on Terror seem like a brief and illequipping prologue as citizens and or terrorists with sophisticated knowledge of software coding could wreak crippling global havoc.  Perhaps if our own government’s malware doesn’t pervade every system on Earth an idealistic Luddite might send us all back to the Stone Age so that we might live history all over again.

Reset.

No comments:

Post a Comment