How the NSA Plans to Infect ‘Millions’ of Computers with Malware
How the NSA Plans to Infect ‘Millions’ of Computers with
Malware
By Ryan Gallagher and Glenn Greenwald 12 Mar 2014, 9:19
AM EDT164
One presentation outlines how the NSA performs
“industrial-scale exploitation” of computer networks across the world.
Top-secret documents reveal that the National Security
Agency is dramatically expanding its ability to covertly hack into computers on
a mass scale by using automated systems that reduce the level of human
oversight in the process.
The classified files – provided previously by NSA
whistleblower Edward Snowden – contain new details about groundbreaking
surveillance technology the agency has developed to infect potentially millions
of computers worldwide with malware “implants.” The clandestine initiative
enables the NSA to break into targeted computers and to siphon out data from
foreign Internet and phone networks.
The covert infrastructure that supports the hacking
efforts operates from the agency’s headquarters in Fort Meade, Maryland, and
from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British
intelligence agency, appears to have played an integral role in helping to develop
the implants tactic.
In some cases the NSA has masqueraded as a fake Facebook
server, using the social media site as a launching pad to infect a target’s
computer and exfiltrate files from a hard drive. In others, it has sent out
spam emails laced with the malware, which can be tailored to covertly record
audio from a computer’s microphone and take snapshots with its webcam. The
hacking systems have also enabled the NSA to launch cyberattacks by corrupting
and disrupting file downloads or denying access to websites.
The implants being deployed were once reserved for a few
hundred hard-to-reach targets, whose communications could not be monitored
through traditional wiretaps. But the documents analyzed by The Intercept show
how the NSA has aggressively accelerated its hacking initiatives in the past
decade by computerizing some processes previously handled by humans. The
automated system – codenamed TURBINE – is designed to “allow the current
implant network to scale to large size (millions of implants) by creating a
system that does automated control implants by groups instead of individually.”
In a top-secret presentation, dated August 2009, the NSA
describes a pre-programmed part of the covert infrastructure called the “Expert
System,” which is designed to operate “like the brain.” The system manages the
applications and functions of the implants and “decides” what tools they need
to best extract data from infected machines.
Mikko Hypponen, an expert in malware who serves as chief
research officer at the Finnish security firm F-Secure, calls the revelations
“disturbing.” The NSA’s surveillance techniques, he warns, could inadvertently
be undermining the security of the Internet.
“When they deploy malware on systems,” Hypponen says,
“they potentially create new vulnerabilities in these systems, making them more
vulnerable for attacks by third parties.”
Hypponen believes that governments could arguably justify
using malware in a small number of targeted cases against adversaries. But
millions of malware implants being deployed by the NSA as part of an automated
process, he says, would be “out of control.”
“That would definitely not be proportionate,” Hypponen
says. “It couldn’t possibly be targeted and named. It sounds like wholesale
infection and wholesale surveillance.”
The NSA declined to answer questions about its deployment
of implants, pointing to a new presidential policy directive announced by
President Obama. “As the president made clear on 17 January,” the agency said
in a statement, “signals intelligence shall be collected exclusively where
there is a foreign intelligence or counterintelligence purpose to support
national and departmental missions, and not for any other purposes.”
“Owning the Net”
The NSA began rapidly escalating its hacking efforts a
decade ago. In 2004, according to secretinternal records, the agency was
managing a small network of only 100 to 150 implants. But over the next six to
eight years, as an elite unit called Tailored Access Operations (TAO) recruited
new hackers and developed new malware tools, the number of implants soared to
tens of thousands.
To penetrate foreign computer networks and monitor
communications that it did not have access to through other means, the NSA
wanted to go beyond the limits of traditional signals intelligence, or SIGINT,
the agency’s term for the interception of electronic communications. Instead,
it sought to broaden “active” surveillance methods – tactics designed to
directly infiltrate a target’s computers or network devices.
In the documents, the agency describes such techniques as
“a more aggressive approach to SIGINT” and says that the TAO unit’s mission is
to “aggressively scale” these operations.
But the NSA recognized that managing a massive network of
implants is too big a job for humans alone.
“One of the greatest challenges for active SIGINT/attack
is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’
limit ability for large-scale exploitation (humans tend to operate within their
own environment, not taking into account the bigger picture).”
The agency’s solution was TURBINE. Developed as part of
TAO unit, it is described in the leaked documents as an “intelligent command
and control capability” that enables “industrial-scale exploitation.”
TURBINE was designed to make deploying malware much
easier for the NSA’s hackers by reducing their role in overseeing its
functions. The system would “relieve the user from needing to know/care about
the details,” the NSA’s Technology Directorate notes in one secret document
from 2009. “For example, a user should be able to ask for ‘all details about
application X’ and not need to know how and where the application keeps files,
registry entries, user application data, etc.”
In practice, this meant that TURBINE would automate
crucial processes that previously had to be performed manually – including the
configuration of the implants as well as surveillance collection, or “tasking,”
of data from infected systems. But automating these processes was about much more
than a simple technicality. The move represented a major tactical shift within
the NSA that was expected to have a profound impact – allowing the agency to
push forward into a new frontier of surveillance operations.
The ramifications are starkly illustrated in one undated
top-secret NSA document, which describes how the agency planned for TURBINE to
“increase the current capability to deploy and manage hundreds of Computer
Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially
millions of implants.” (CNE mines intelligence from computers and networks; CNA
seeks to disrupt, damage or destroy them.)
Eventually, the secret files indicate, the NSA’s plans
for TURBINE came to fruition. The system has been operational in some capacity
since at least July 2010, and its role has become increasingly central to NSA
hacking operations.
Earlier reports based on the Snowden files indicate that
the NSA has already deployed between 85,000 and 100,000 of its implants against
computers and networks across the world, with plans to keep on scaling up those
numbers.
The intelligence community’s top-secret “Black Budget”
for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA
surveillance initiative named “Owning the Net.”
The agency sought $67.6 million in taxpayer funding for
its Owning the Net program last year. Some of the money was earmarked for
TURBINE, expanding the system to encompass “a wider variety” of networks and
“enabling greater automation of computer network exploitation.”
Circumventing Encryption
The NSA has a diverse arsenal of malware tools, each
highly sophisticated and customizable for different purposes.
One implant, codenamed UNITEDRAKE, can be used with a
variety of “plug-ins” that enable the agency to gain total control of an
infected computer.
An implant plug-in named CAPTIVATEDAUDIENCE, for example,
is used to take over a targeted computer’s microphone and record conversations
taking place near the device. Another, GUMFISH, can covertly take over a computer’s
webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing
histories and collects login details and passwords used to access websites and
email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates
data from removable flash drives that connect to an infected computer.
The implants can enable the NSA to circumvent
privacy-enhancing encryption tools that are used to browse the Internet
anonymously or scramble the contents of emails as they are being sent across
networks. That’s because the NSA’s malware gives the agency unfettered access
to a target’s computer before the user protects their communications with
encryption.
It is unclear how many of the implants are being deployed
on an annual basis or which variants of them are currently active in computer
systems across the world.
Previous reports have alleged that the NSA worked with
Israel to develop the Stuxnet malware, which was used to sabotage Iranian
nuclear facilities. The agency also reportedly worked with Israel to deploy
malware called Flame to infiltrate computers and spy on communications in
countries across the Middle East.
According to the Snowden files, the technology has been
used to seek out terror suspects as well as individuals regarded by the NSA as
“extremist.” But the mandate of the NSA’s hackers is not limited to invading
the systems of those who pose a threat to national security.
In one secret post on an internal message board, an
operative from the NSA’s Signals Intelligence Directorate describes using
malware attacks against systems administrators who work at foreign phone and
Internet service providers. By hacking an administrator’s computer, the agency
can gain covert access to communications that are processed by his company.
“Sys admins are a means to an end,” the NSA operative writes.
The internal post – titled “I hunt sys admins” – makes
clear that terrorists aren’t the only targets of such NSA attacks. Compromising
a systems administrator, the operative notes, makes it easier to get to other targets
of interest, including any “government official that happens to be using the
network some admin takes care of.”
Similar tactics have been adopted by Government
Communications Headquarters, the NSA’s British counterpart. As the German
newspaper Der Spiegel reported in September, GCHQ hacked computers belonging to
network engineers at Belgacom, the Belgian telecommunications provider.
The mission, codenamed “Operation Socialist,” was
designed to enable GCHQ to monitor mobile phones connected to Belgacom’s
network. The secret files deem the mission a “success,” and indicate that the
agency had the ability to covertly access Belgacom’s systems since at least
2010.
Infiltrating cellphone networks, however, is not all that
the malware can be used to accomplish. The NSA has specifically tailored some
of its implants to infect large-scale network routers used by Internet service
providers in foreign countries. By compromising routers – the devices that
connect computer networks and transport data packets across the Internet – the
agency can gain covert access to monitor Internet traffic, record the browsing
sessions of users, and intercept communications.
Two implants the NSA injects into network routers,
HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform
“exploitation attacks” against data that is sent through aVirtual Private
Network, a tool that uses encrypted “tunnels” to enhance the security and
privacy of an Internet session.
The implants also track phone calls sent across the
network via Skype and other Voice Over IP software, revealing the username of
the person making the call. If the audio of the VOIP conversation is sent over
the Internet using unencrypted “Real-time Transport Protocol” packets, the
implants can covertly record the audio data and then return it to the NSA for
analysis.
But not all of the NSA’s implants are used to gather
intelligence, the secret files show. Sometimes, the agency’s aim is disruption
rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004,
is used to block targets from accessing certain websites.
QUANTUMCOPPER, first tested in 2008, corrupts a target’s
file downloads. These two “attack” techniques are revealed on a classified list
that features nine NSA hacking tools, six of which are used for intelligence
gathering. Just one is used for “defensive” purposes – to protect U.S.
government networks against intrusions.
“Mass exploitation potential”
Before it can extract data from an implant or use it to
attack a system, the NSA must first install the malware on a targeted computer
or network.
According to one top-secret document from 2012, the
agency can deploy malware by sending out spam emails that trick targets into
clicking a malicious link. Once activated, a “back-door implant” infects their
computers within eight seconds.
There’s only one problem with this tactic, codenamed
WILLOWVIXEN: According to the documents, the spam method has become less
successful in recent years, as Internet users have become wary of unsolicited
emails and less likely to click on anything that looks suspicious.
Consequently, the NSA has turned to new and more advanced
hacking techniques. These include performing so-called “man-in-the-middle” and
“man-on-the-side” attacks, which covertly force a user’s internet browser to
route to NSA computer servers that try to infect them with an implant.
To perform a man-on-the-side attack, the NSA observes a
target’s Internet traffic using its global network of covert “accesses” to data
as it flows over fiber optic cables or satellites. When the target visits a
website that the NSA is able to exploit, the agency’s surveillance sensors
alert the TURBINE system, which then “shoots” data packets at the targeted
computer’s IP address within a fraction of a second.
In one man-on-the-side technique, codenamed QUANTUMHAND,
the agency disguises itself as a fake Facebook server. When a target attempts
to log in to the social media site, the NSA transmits malicious data packets
that trick the target’s computer into thinking they are being sent from the
real Facebook. By concealing its malware within what looks like an ordinary
Facebook page, the NSA is able to hack into the targeted computer and covertly
siphon out data from its hard drive. A top-secret animation demonstrates the
tactic in action.
The documents show that QUANTUMHAND became operational in
October 2010, after being successfully tested by the NSA against about a dozen
targets.
According to Matt Blaze, a surveillance and cryptography
expert at the University of Pennsylvania, it appears that the QUANTUMHAND
technique is aimed at targeting specific individuals. But he expresses concerns
about how it has been covertly integrated within Internet networks as part of
the NSA’s automated TURBINE system.
“As soon as you put this capability in the backbone
infrastructure, the software and security engineer in me says that’s
terrifying,” Blaze says.
“Forget about how the NSA is intending to use it. How do
we know it is working correctly and only targeting who the NSA wants? And even
if it does work correctly, which is itself a really dubious assumption, how is
it controlled?”
In an email statement to The Intercept, Facebook
spokesman Jay Nancarrow said the company had “no evidence of this alleged
activity.” He added that Facebook implemented HTTPS encryption for users last
year, making browsing sessions less vulnerable to malware attacks.
Nancarrow also pointed out that other services besides
Facebook could have been compromised by the NSA. “If government agencies indeed
have privileged access to network service providers,” he said, “any site
running only [unencrypted] HTTP could conceivably have its traffic
misdirected.”
A man-in-the-middle attack is a similar but slightly more
aggressive method that can be used by the NSA to deploy its malware. It refers
to a hacking technique in which the agency covertly places itself between
computers as they are communicating with each other.
This allows the NSA not only to observe and redirect
browsing sessions, but to modify the content of data packets that are passing
between computers.
The man-in-the-middle tactic can be used, for instance,
to covertly change the content of a message as it is being sent between two
people, without either knowing that any change has been made by a third party.
The same technique is sometimes used by criminal hackers to defraud people.
A top-secret NSA presentation from 2012 reveals that the
agency developed a man-in-the-middle capability called SECONDDATE to “influence
real-time communications between client and server” and to “quietly redirect
web-browsers” to NSA malware servers called FOXACID. In October, details about
the FOXACID system were reported by the Guardian, which revealed its links to
attacks against users of the Internet anonymity service Tor.
But SECONDDATE is tailored not only for “surgical”
surveillance attacks on individual suspects. It can also be used to launch bulk
malware attacks against computers.
According to the 2012 presentation, the tactic has “mass
exploitation potential for clients passing through network choke points.”
Blaze, the University of Pennsylvania surveillance
expert, says the potential use of man-in-the-middle attacks on such a scale
“seems very disturbing.” Such an approach would involve indiscriminately
monitoring entire networks as opposed to targeting individual suspects.
“The thing that raises a red flag for me is the reference
to ‘network choke points,’” he says. “That’s the last place that we should be
allowing intelligence agencies to compromise the infrastructure – because that
is by definition a mass surveillance technique.”
To deploy some of its malware implants, the NSA exploits
security vulnerabilities in commonly used Internet browsers such as Mozilla
Firefox and Internet Explorer.
The agency’s hackers also exploit security weaknesses in
network routers and in popular software plugins such as Flash and Java to
deliver malicious code onto targeted machines.
The implants can circumvent anti-virus programs, and the
NSA has gone to extreme lengths to ensure that its clandestine technology is
extremely difficult to detect. An implant named VALIDATOR, used by the NSA to
upload and download data to and from an infected machine, can be set to
self-destruct – deleting itself from an infected computer after a set time
expires.
In many cases, firewalls and other security measures do
not appear to pose much of an obstacle to the NSA. Indeed, the agency’s hackers
appear confident in their ability to circumvent any security mechanism that
stands between them and compromising a computer or network. “If we can get the
target to visit us in some sort of web browser, we can probably own them,” an
agency hacker boasts in one secret document. “The only limitation is the
‘how.’”
Covert Infrastructure
The TURBINE implants system does not operate in
isolation.
It is linked to, and relies upon, a large network of
clandestine surveillance “sensors” that the agency has installed at locations
across the world.
The NSA’s headquarters in Maryland are part of this
network, as are eavesdropping bases used by the agency in Misawa, Japan and
Menwith Hill, England.
The sensors, codenamed TURMOIL, operate as a sort of
high-tech surveillance dragnet, monitoring packets of data as they are sent
across the Internet.
When TURBINE implants exfiltrate data from infected
computer systems, the TURMOIL sensors automatically identify the data and
return it to the NSA for analysis. And when targets are communicating, the
TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the
initiation of a malware attack.
The NSA identifies surveillance targets based on a series
of data “selectors” as they flow across Internet cables. These selectors,
according to internal documents, can include email addresses, IP addresses, or
the unique “cookies” containing a username or other identifying information
that are sent to a user’s computer by websites such as Google, Facebook,
Hotmail, Yahoo, and Twitter.
Other selectors the NSA uses can be gleaned from unique
Google advertising cookies that track browsing habits, unique encryption key
fingerprints that can be traced to a specific user, and computer IDs that are
sent across the Internet when a Windows computer crashes or updates.
What’s more, the TURBINE system operates with the
knowledge and support of other governments, some of which have participated in
the malware attacks.
Classification markings on the Snowden documents indicate
that NSA has shared many of its files on the use of implants with its
counterparts in the so-called Five Eyes surveillance alliance – the United
Kingdom, Canada, New Zealand, and Australia.
GCHQ, the British agency, has taken on a particularly
important role in helping to develop the malware tactics. The Menwith Hill
satellite eavesdropping base that is part of the TURMOIL network, located in a
rural part of Northern England, is operated by the NSA in close cooperation
with GCHQ.
Top-secret documents show that the British base –
referred to by the NSA as “MHS” for Menwith Hill Station – is an integral
component of the TURBINE malware infrastructure and has been used to experiment
with implant “exploitation” attacks against users of Yahoo and Hotmail.
In one document dated 2010, at least five variants of the
QUANTUM hacking method were listed as being “operational” at Menwith Hill. The
same document also reveals that GCHQ helped integrate three of the QUANTUM
malware capabilities – and test two others – as part of a surveillance system
it operates codenamed INSENSER.
GCHQ cooperated with the hacking attacks despite having
reservations about their legality. One of the Snowden files, previously
disclosed by Swedish broadcaster SVT, revealed that as recently as April 2013,
GCHQ was apparently reluctant to get involved in deploying the QUANTUM malware
due to “legal/policy restrictions.” A representative from a unit of the British
surveillance agency, meeting with an obscure telecommunications standards
committee in 2010, separately voiced concerns that performing “active” hacking
attacks for surveillance “may be illegal” under British law.
In response to questions from The Intercept, GCHQ refused
to comment on its involvement in the covert hacking operations. Citing its
boilerplate response to inquiries, the agency said in a statement that “all of
GCHQ’s work is carried out in accordance with a strict legal and policy
framework which ensures that our activities are authorized, necessary and
proportionate, and that there is rigorous oversight.”
Whatever the legalities of the United Kingdom and United
States infiltrating computer networks, the Snowden files bring into sharp focus
the broader implications. Under cover of secrecy and without public debate,
there has been an unprecedented proliferation of aggressive surveillance
techniques. One of the NSA’s primary concerns, in fact, appears to be that its
clandestine tactics are now being adopted by foreign rivals, too.
“Hacking routers has been good business for us and our
5-eyes partners for some time,” notes one NSA analyst in a top-secret document
dated December 2012. “But it is becoming more apparent that other nation states
are honing their skillz [sic] and joining the scene.”
Comments
Post a Comment