Cyber Deception a Path Ahead for Cyber Defenders

hello

my name is dr stanley barr and i’m here

to tell you about some pathfinding work

that i have been a part of while this is

a story about

mitre work my part started a long time

ago

in the early 1990s i was a student at

the university of lowell in

massachusetts

i worked in a lab called the center for

productivity enhancement

and i worked for a seasoned professor

named dr patrick crolack

but to every student in the lab he was

just uncle pat

uncle pat was truly a visionary and i

could go on for hours about uncle pat

but let me just say that there was one

team project

that i worked on for him that set the

course of my career

and i dare say the course of my life in

that research we used expert systems

an early form of artificial intelligence

to protect computers from faults and

intruders

during the course of that work i learned

how vulnerable

computers could be i learned just how

easy

it was for intruders to access a

computer and how they could do

serious damage to our university and to

our world

without anyone knowing until it was far

too late

thirty years later i work at mitre a job

i got through working for uncle pat

and i have teamed with some of the

smartest most dedicated engineers and

scientists you will meet

anywhere know that while i’m presenting

this work

there are many people collaborating

together back at mitre

to make this type of research happen i’m

just the lucky one who gets to talk

about it on stage

i’ve been fascinated to see how both

cyber attacks

and cyber security has evolved and i

have observed some things along the way

that i want to share

i’ve observed how cheap it is for nation

states to mount

cyber campaigns where the tools can be

used again and again

often times even against the same

company

i’ve observed how cyber operations can

be covert

and how hard it can be to detect attacks

and

even after discovery how hard it can be

to attribute them back to an actor

i’ve observed that nation-state actors

feel

cyber is a safe place a place that

emboldens these actors to mount

sophisticated and crippling attacks

against their adversaries with little

fear of being held responsible

so sit back and let me tell you some

stories

as with all good stories this one starts

with an

ancient proverb and it rings as true

today

as it did when it was first uttered 2500

years ago the chinese military

strategist sun tzu is quoted as saying

if you know the enemy and you know

yourself

you need not fear the result of a

hundred battles

now i realize most of you probably don’t

move through your days

thinking about battles and defeating

enemies

but think about what that means just for

one minute

if you know your enemy and you know

yourself

you need not fear

the questions are what do these battles

look like

and how do we come to know elusive cyber

adversaries

let’s fast forward to the early 2000s

and i’ve taken

just a couple news clippings from the

headlines

and it seems like there’s an endless

list these highlight

events from those time period i start

here as this is broadly accepted as the

awakening

of the whole world to the threats posed

by cyber actors

in 2005 it’s revealed that chinese

actors repeatedly hacked numerous u.s

networks

in an operation called titan ring in

2006 it’s revealed that suspected

chinese attackers

breached the u.s navy war college in

2008

it’s revealed that foreign attackers

attacked the united states department of

defense

it’s claimed that this attack right here

led to a whole new approach

being taken by the department of defense

in 2008 it’s revealed that foreign

attackers collected emails from

both the two major campaigns officials

believe it was to understand

their evolving policy positions

and in 2009 it’s revealed that actors

got access to the program building the

united states most sophisticated plane

this is where we found ourselves when we

got some funding

and we’re asked to look at things

differently

the headlines are one thing but let me

tell you about how this looked

from the inside of a high-tech company

one that works for the united states

government

we spent lots of time on things learned

by others

with varying relevance to us and it was

difficult for us to find

badness on our network and yet we knew

the

absence of evidence wasn’t the evidence

of absence

with so little information on what bad

guys did

post-break-in there wasn’t

always a clear picture on how to prepare

for a possible event

so we put a lot of effort and a lot of

thinking into changing the game

we wanted to stop being concerned that

we would wind up being one of these

headlines

we wanted the ability to use anything we

learned from bad guys

as a thread to pull on and learn more

about them

we wanted the ability to impact and

impose cost

on their operations in some way

in any way before i tell you what we

learned

news from the last year tells me things

haven’t gotten any better

and this knowledge now is applicable to

everyone

in 2019 it’s revealed that the united

states navy and the partners

are under constant cyber siege from

hackers

in the spring of 2020 it’s revealed that

multiple

iranian actors were working together to

attack the us and israel

and in just in september we learned that

cyber crime actors hit a u.s healthcare

giant with ransomware

our national security and now our

medical data

our very lives are at stake

now we find ourselves here for all of

you who don’t know the story of this

iconic meme it comes from a movie called

the matrix

in one scene there comes a moment when

the hero

is offered a choice take the blue pill

and remain in blissful ignorance or take

the red pill

and have the truth revealed for us the

blue pill

is for us to just go about our business

and not worry about

cyber let this talk wash by

leave here go home and click on

everything

in every email no matter how sketchy

since we’re all at a ted event i’ll

assume that we are comfortable with

learning the truth

so let’s pretend like we have taken the

red pill

and now just like in the movie we go

down the rabbit hole

and come to terms with our new reality

at first glance it might seem like i’m

suggesting

in this new reality that we are left up

the creek with no paddle

but bear with me for a moment will i

introduce

standstand metaphor in this metaphor the

bad actors and their tools are like

drops of water

the dam is our cyber defenses that we

all rely on

and our private and sensitive data is

like the unseen

village lying downstream the first

truth in the new reality we must accept

is there is an endless

torrent of badness coming our way

luckily our defenses will stop most

things

the second truth in the new reality we

must accept is

like with heavy rains in our case

massive cyber attacks

some badness will always find its way

through

luckily for us the bad guys like water

will often try

the easiest path first and i’ll give you

some examples in a moment

and like with the overflowing dam

controlled spill

is the best way to release a surge of

water

we just have to give the water a course

a course that stares its path

away from our village now this might

seem a little esoteric right now

so let me tell you about how this very

approach

was used successfully and recently

by a real target in a real high-stakes

contest

our story starts in 2016 when the

hillary clinton campaign

suffered a massive data breach i

honestly believe

it caused her campaign a good amount of

tumult

in france the presidential candidate

emmanuel macron saw was happening

and election day was fast approaching he

feared he would be targeted in the same

way

and his campaign accepted they could not

stop

some amount of successful hacking

and in fact they were hacked attackers

stole the equivalent of about

900 thousand pages of printed emails

almost literally at the eleventh hour

the attackers dumped their damaging

trove of data

luckily macron in his campaign had taken

some proactive steps

they created fake email accounts and

filled them with realistic and

far-fetched content

they created fake emails among real

campaign workers

some of this data was so absurdly

hyperbolic

not even i will repeat the content they

spam their own users with emails

some claiming to provide user names and

passwords to both

fake and real accounts i’m assuming

there was some

legitimate sounding rules like hey can

you log in check for anything important

my phone is broken here’s my username

and password

now usually username and passwords are

the holy grail

for getting someone’s email so the

attackers use this as their path of

least resistance

this channeled the adversaries towards

the places the defenders wanted them to

go

when the credentials were used and the

accounts were accessed

the defenders were able to see exactly

what was going on

when it was happening and how it was

being done

when the email dumps dropped journalists

and citizens alike started pauling

through

many instantly recognized the face and

of course the campaign was quick to

point out the most absurd ones

even though only an estimated 20 percent

of the data was fake

it immediately cast out on all the

remaining

stuff that was stolen these simple steps

helped mitigate the attacker’s goals of

dumping

damaging materials and influencing the

french election

in that story you’re probably wondering

cool stan but how do they steal the

first email

honestly i don’t know

in my experience there are two very

effective approaches

first often times users have weak email

account passwords

cannot caution you against this enough

second bad guys frequently use something

called a spearfish

this is basically an email with a

malicious link or attachment

users click the thing something bad

happens and the bad guys are off to the

races

let me tell you a little bit about what

we do at mitre

when we find something interesting

suppose we find

a suspicious email or file

we put it on a special machine then we

double click on whatever it is

the thing does its thing then we watch

and we wait

and we hope the fun begins when it works

it closes gaps in our intelligence we

have learned about

adversary tools and tactics and

procedures

sometimes we learn what they’re after

and what better needs to be protected

however it’s not without risks let me

tell you the

story about mitre’s great thumb drive

debacle

we found this cool thing and in a moment

of haste the newest member of the team

was told to set everything up he was

told put the malware

on the usb put the usb in the computer

copy the malware to the desktop and

double-click the malware

what happened next is a story that will

never grow old

the adversary was waiting they instantly

started doing stuff

and we were watching the bad guys took

their time and they did some stuff

to see where they were and what this

computer was all about

then they listed the contents of the

user’s folder

and boy had we made sure there was some

good stuff there

we were so hoping that they would start

taking stuff

and exfiltrating it and then

then they decided to see if there were

any usb drives plugged in

and time stopped for us they had found

ours

we had forgotten to take it out they

listed the files and there it was plain

as day

malware.exe what happened

next was crazy they spent the next 30

minutes manually typing frantically

and doing all sorts of crazy things to

try and mask their tracks

finally they did something to make sure

the computer would not boot again

and vanished after we were finished

being stunned

we had never seen a bad guy so angry

over being caught

we popped out the drive and threw it in

the bin to be reformatted

we popped in a brand new one full of

good stuff

fresh stuff reset our trap and we were

up in a matter of minutes

we made him waste a lot of time on our

fake machine

he wasn’t attacking real victims instead

of just bugging out and calling it a day

he wasted all time creating a spectacle

we made some notes we archived our

findings and moved on we had in

fact imposed costs over the years we

have had a lot of these engagement we’ve

captured

hundreds of tools and hundreds of other

indicators of compromise

we’ve run long-term operations we know

by who

and how and when certain things are done

we can extrapolate

forwards and backwards about attacks we

have

confidence now not a confidence says it

says we’ll never be hacked

but a confidence that says we are now

better prepared

and we assert maybe

just maybe the data you steal from us

might not be worth using we’ve shared a

lot of data

both publicly and privately to protect

ourselves our partners and the cyber

community at large

in summary if you take one thing away

from this

talk let it be we can all

every one of us better prepare we can

make sure there is deceptive information

just lying around

so someone gets your data they get fake

stuff too

in addition this area needs a lot more

work

we need cyber people to make scalable

traps

social scientists who know how to fool

the human brain

policy experts to explain why this is

proper and needed

we need companies to mix it up with bad

guys

when they’re operating in deceptive

environments they aren’t

stealing real data

we need people to share what they learn

in fact

share with me i promise i will open

anything you send me

finally let’s make my uncle pat proud

and make the bad guys question

everything

they take thank you very much for

listening

您好,

我的名字是 stanley barr 博士,我在这里

向您介绍我参与的一些寻路工作

,而这是

一个关于

斜接工作的故事,我的工作很久以前就开始了

,在 1990 年代初我是

在马萨诸塞州的洛厄尔大学,

我在一个名为提高生产力中心的实验室

工作,我为一位名叫帕特里克·克罗拉克博士的经验丰富的教授工作,

但对于实验室里的每个学生来说,他

只是帕特

叔叔,帕特叔叔真的是一个有远见的人,我

可以去 关于帕特叔叔的几个小时,

但我只想说,

我为他工作的一个团队项目决定

了我的职业生涯

,我敢说我在

这项研究中的人生轨迹,我们使用专家系统

的早期形式 人工智能

在工作过程中保护计算机免受故障和入侵者 我了解

计算机是多么

容易受到攻击

在没有人知道的情况下对我们的大学和我们的世界造成了损害,

直到

为时已晚

30 年后我在 miter 工作,

我通过为帕特叔叔工作而获得了一份工作

,我与一些

最聪明、最敬业的工程师和

科学家合作,你会遇到

任何地方都知道,当我展示

这项工作时

,有很多人

在 miter 一起合作

以使这种类型的研究发生我

只是幸运的人能够

在舞台上谈论它

网络攻击

和网络安全已经发展,我

在此过程中观察到了一些

我想分享的

事情 同

一家公司,

我观察到网络操作

是如何隐蔽的

,检测攻击有多难

甚至在发现将它们归咎于一个演员有多难之后,

我观察到 民族国家的行为者

认为

网络是一个安全的地方,这个地方

鼓励这些行为者对他们的对手

发动复杂而致命的攻击,而不必

担心被追究责任

所以坐下来让我告诉你一些

故事,

就像这个开始的所有好故事一样

一句古老的谚语

,它在今天听起来和2500年前第一次说的

一样真实

现在我意识到你们中的大多数人可能

不会在一天中

思考战斗和击败

敌人,

而是想想这意味着什么,

如果你了解你的敌人并且你了解

你自己,

那么你不必担心

这些战斗是什么

看起来

,我们如何知道难以捉摸的网络

对手

让我们快进到 2000 年代初期

,我

只从头条新闻中摘录了几条新闻

剪报 es

,似乎有一个无穷无尽的

清单,这些

从我开始的那个时期开始的重要事件,

因为这被广泛接受

为整个世界对 2005 年网络攻击者构成的威胁的觉醒,

它显示中国

攻击者多次入侵美国

网络

在 2006 年的一次名为“泰坦环”的行动中,

据透露,疑似

中国袭击者

在 2008 年闯入了美国海军战争学院。

据透露,外国

袭击者袭击了美国国防部

国防部

在 2008 年透露,外国

攻击者从两大竞选官员那里收集了电子邮件,

他们

认为这是为了了解

他们不断变化的政策立场,

而在 2009 年,据透露,攻击者

可以访问

建造美国最先进飞机的计划,

这是 当我们获得一些资金并且我们被问到时,我们发现自己在哪里

ed 以不同的方式看待事物

头条新闻是一回事,但让我

告诉你

从一家为美国政府工作的高科技公司的内部来看,这是如何

看待的 对我们

来说,我们很难

在我们的网络上找到坏处,但我们知道

没有证据并不是

没有证据,

因为关于坏人在闯入后做了什么的信息很少,

所以并不

总是很清楚 关于如何

为可能发生的事件

做准备的图片所以我们付出了很多努力和很多

思考来改变游戏

我们不想担心

我们最终会成为这些

头条新闻

我们希望能够使用我们

学到的任何东西

在我告诉你我们

从去年的消息告诉我之前,我们希望能够以某种方式以任何方式影响他们的运营并对其运营施加成本 gs

并没有变得更好

,这些知识现在适用

于 2019 年的每个人 据透露,

美国海军及其合作

伙伴在 2020 年春季受到黑客的持续网络围攻

据透露,

多个

伊朗行动者正在共同努力

攻击 美国和以色列

,就在 9 月,我们了解到

网络犯罪分子用勒索软件袭击了一家美国医疗保健

巨头,

我们的国家安全,现在我们的

医疗数据,

我们的生命危在旦夕

这个

标志性模因的故事它来自一部名为矩阵的电影

在一个场景中有一个时刻,

英雄可以选择服用蓝色药丸

并保持幸福的无知或

服用红色药丸

并为我们揭示真相

蓝色药丸

是让我们只做我们的业务

而不用担心

网络让这个谈话洗掉

离开这里回家并点击

每封电子邮件中的所有内容,无论多么粗略

既然我们都参加了 ted 活动,我

假设我们对了解真相感到很自在,

所以让我们假装我们已经吃了

红色药丸

,现在就像电影中一样,我们走进

兔子洞

,接受我们的

乍一看,我似乎在

暗示,

在这个新现实中,我们被留

在小溪上,没有桨,

但请耐心等待我会

在这个比喻中引入站立比喻吗?

坏演员和他们的工具就像

水滴大坝是我们

所有人都依赖

的网络防御我们的私人和敏感数据

就像下游看不见的

村庄

我们必须接受的新现实中的第一个事实

是有无穷无尽

的邪恶洪流向我们走来

幸运的是我们的 防御将阻止大多数

事情

我们必须接受的新现实中的第二个事实

就像在我们的情况下下大雨

大规模的网络攻击

一些坏事总会找到方法

幸运的是我们坏人喜欢水

通常会先尝试

最简单的路径,稍后我会给你

一些例子

,就像溢出的大坝

控制溢出

是释放水涌的最佳方式,

我们只需要给水

一个路线,盯着它的路线

离开我们村的路 现在这

似乎有点深奥

所以让我告诉你这种

方法

是如何成功使用的,

最近一个真正的目标在一场真正的高风险

比赛中

我们的故事开始于 2016 年

希拉里·克林顿竞选

遭受了大规模的数据泄露,

老实说

,我相信这导致她的竞选活动在法国引起了很大的

骚动

,总统候选人

伊曼纽尔·马克龙看到正在发生

,选举日快到了,他

担心自己会以同样的方式成为目标

,他的竞选团队接受了他们不能

阻止

一些成功的黑客攻击

,事实上他们被

黑客攻击了

攻击者在最后一刻倾倒了他们

破坏性的数据,

幸运的是,马克龙在他的竞选活动中采取了

一些主动措施,

他们创建了虚假的电子邮件帐户,并在

其中填充了现实而

牵强的内容,

他们在真实的竞选工作人员中创建了虚假电子邮件,其中

一些数据是如此 荒谬的

夸张,

我什至不会重复他们

用电子邮件向自己的用户发送垃圾邮件的内容,

有些人声称向假帐户和真实帐户提供用户名和

密码

我的手机坏了 这里是我的用户名

和密码

现在通常用户名和密码是

获取某人电子邮件的圣杯,因此

攻击者将此作为他们的阻力最小的路径,

这将对手引导

到防御者希望他们去的地方

,而凭据是 使用并且

帐户被

访问 防御者能够确切地看到发生了

什么

关于它是什么时候发生的以及它是如何

完成的,

当电子邮件转储丢弃记者

和公民等开始

通过

许多立即认出的脸时

,竞选活动很快就

指出了最荒谬的人

,尽管估计只有 20

% 数据是假的,

它立即排除了所有被盗的

剩余

物品 这些简单的步骤

有助于减轻攻击者

倾倒

破坏性材料并影响该故事中的

法国大选

的目标,您可能想知道

酷斯坦,但他们如何窃取

第一个 电子邮件

老实说,我不

知道根据我的经验有两种非常

有效的方法,

首先,通常用户的电子邮件帐户密码很弱,

无法提醒您注意,

第二,坏人经常使用一种

叫做 spearfish 的东西,

这基本上是一封带有

恶意链接的电子邮件或 附件

用户点击坏事

发生的事情,坏人参加

比赛

让我

当我们发现一些有趣的东西时,告诉你我们在 miter 做了什么

假设我们发现

了一个可疑的电子邮件或文件

我们把它放在一个特殊的机器上然后我们

双击它是什么

东西做它的事情然后我们观察

然后我们 等等

,我们希望乐趣在它起作用时开始

它缩小我们的智力差距我们

已经了解了

对手的工具、战术和

程序

有时我们会了解他们想要

什么以及需要更好地保护什么

但是这并非没有风险让我

告诉你

关于 mitre 拇指驱动器大崩溃的故事

我们发现了这个很酷的东西,并且在

匆忙中团队的最新成员

被告知设置所有内容,他被

告知将恶意软件

放在 USB 上 将 USB 放在计算机中

将恶意软件复制到 桌面并

双击恶意软件

接下来发生的事情是一个

永远不会变老

的故事 对手正在等待 他们立即

开始做事

我们正在看着坏人

花时间 然后他们做了一些事情

来查看他们在哪里以及这

台计算机的全部

内容然后他们列出了

用户文件夹的内容

,男孩如果我们确定那里有一些

好东西,

我们非常希望他们会开始

拿东西

并泄露

然后他们决定看看是否有

任何 USB 驱动器插入

并且时间停止了我们他们找到了

我们的

我们忘记将它取出他们

列出了文件并且在那里很明显

恶意软件.exe 接下来发生的事情

是 疯了 他们在接下来的 30

分钟里疯狂地手动打字

并做各种疯狂的事情来

试图掩盖他们的踪迹

最后他们做了一些事情来

确保计算机不会再次启动

并在我们惊呆后消失了

我们从未见过坏的 那个人

被抓到很生气,

我们把驱动器拿出来

扔进垃圾箱里重新格式化,

我们扔进一个全新的,里面装满了

好东西

新鲜的东西重置了我们的陷阱,我们

起来了 仅仅几分钟,

我们就让他在我们的假机器上浪费了很多时间,

他没有攻击真正的受害者,而

不是只是偷偷溜走并称之为一天

他浪费了所有时间来创造一个奇观

我们做了一些笔记,我们存档了我们的

发现并搬家了 事实上,我们多年来一直在

施加成本 我们

已经进行了很多这样的参与 我们已经

捕获了

数百种工具和数百种其他

妥协指标

我们已经开展了长期运营 我们

知道谁

、如何以及何时某些事情 完成后,

我们可以

向前和向后推断我们

现在有信心的攻击,不是有信心说它

说我们永远不会被黑客入侵,

而是有信心表明我们现在

准备得更好

,我们断言

也许你从我们那里窃取的数据

可能不会 值得使用 我们已经

公开和私下共享了大量数据以保护

我们自己 我们的合作伙伴和整个网络

社区 总之,如果你

从这次

谈话中拿走一件事,让它成为我们都可以

我们中的一个人做好了充分的准备,我们可以

确保

周围存在欺骗性信息,

因此有人会获取您的数据,他们也会得到假的

东西此外,这个领域需要更多的

工作

我们需要网络人员来制造可扩展的

陷阱

社会科学家知道如何

愚弄人脑

政策专家来解释为什么这是

正确和需要的

我们需要公司将其与

坏人混为一谈

当他们在欺骗性

环境中运营时 他们不会

窃取真实数据

我们需要人们分享他们实际上学到的东西

分享 和我一起,我保证我会打开

你寄给我的任何东西

最后让我让帕特叔叔感到自豪

,让坏人质疑

他们所采取的一切非常感谢你的

聆听