Security world ill-equipped to solve digital whodunnits

'Unqualified and pedestrian'


When anthrax-laced letters killed five people and sickened 17 others shortly after the September 11 terrorist attacks in 2001, investigators were able to pin point the precise lab where the deadly spores were manufactured. And when Confederate General Stonewall Jackson was shot on the battle field some 150 years ago, forensics showed only one of his own forces could have pulled the trigger.

While the physical world is chock full of methods for solving high-stakes whodunits, sleuths in the digital realm remain woefully ill-equipped at figuring out who is behind the increasing number of attacks hitting government, private industry and consumer networks, says Tom Parker, a security researcher who is scheduled to speak on the topic at next week's Black Hat security conference in Las Vegas. That hasn't stopped security researchers, often armed with little more than inferences, from pointing fingers at nation states, and that could have important consequences for geopolitical relations.

“A lot of those efforts are very unqualified and pedestrian,” said Parker, who is director of security consulting services at Washington, DC-based Securicon. “There's really not any science behind the efforts that many people have been making recently that have resulted in stories like China is attacking us, Russia is attacking us, Korea is attacking us.”

Parker holds out the so-called Aurora attacks that hit Google and dozens of other large companies late last year as a prominent example. Google has yet to offer any evidence for its contention that China was behind the attacks besides saying some of them targeted email accounts used by Chinese dissidents. Evidence that error-checking code used in the exploits had circulated for years on English-speaking sites later cast doubt on claims by a private researcher that the code could only have been written by someone fluent in simplified Chinese.

The dearth of commercial products and widespread methods for discovering who is behind online attacks is ironic, Parker says, because many of the raw materials needed have existed for years. A technique known as isomorphism – which quickly spots similarities between two or more pieces of code – is one possible solution. It could be used to identify the developers behind an unknown piece of malware if one or more of their previous works are already known.

Similar techniques – such as small prime product calculation, API structure analysis and Black Axon – could also bring more rigor to investigations.

“It's important to have these tools that non-technical people can use to try and dumb down that knee-jerk reaction to miss-point fingers” said Parker. “There's a lot of people that the second they see a big company get compromised we immediately think its a state-sponsored effort and likewise when we see a power company get some malware we immediately think that it's a targeted attack sponsored by a nation state when in actual fact it turns out to be someone viewing a Viagra commercial they shouldn't have looked at. There needs to be more focus, I think, on the threat rather than on what the malware does to the machine and what the attackers that we really need to be concerned about are doing.”

Parker's talk, titled Finger Pointing for Fun, Profit and War?, is scheduled for Day 1 of the conference. ®


Keep Reading

Don't pay the ransom, mate. Don't even fix a price, say Australia's cyber security bods

Better yet - do the basics and your systems won't get encrypted in the first place

In 2016 Australia's online census failed. Preparations for the 2021 edition have been rated 'partly effective'

Devs can make unauthorised changes, data integrity is a work in progress, security is not there yet ... and there's just nine months to go

Alarming news: ADT to flog Nest smart home kit after Google ploughs $450m into corporate security dinosaur

Resell agreement set up amid plans to build next gen of home automation and security gear

Another day, another Google cull: Chocolate Factory axes 49 malicious Chrome extensions from web store

Ongoing Chrome Web Store security saga deftly straddles tragedy and farce

Here's US Homeland Security collaring a suspected arsonist after asking Google for the IP addresses of folks who made a specific search

Don't worry, says the internet giant, this doesn't happen too often

Google Firebase Cloud Messaging offers spam tier for some – no account required, just knowledge of bad security

All that's necessary is willingness to abuse server keys exposed in apps and some technical know-how

Google's home security package flies the Nest, Chocolate Factory pledges software support – for now

In brief Plus: Immigration lawyers for Mountain View breached, SonarQube hack worse than thought, and more

Microsoft emits 112 security hole fixes – including the cure for a Google-disclosed kernel vuln exploited in the wild

Patch Tuesday Android, Adobe, SAP, Red Hat join the bug-busting party

Biting the hand that feeds IT © 1998–2020