SlideShare a Scribd company logo
We Could Be Heroes
Eva Galperin
Global Policy Analyst, Electronic Frontier Foundation
eva@eff.org
@evacide
No, really. Big damn heroes.
Ok, more like this
In the beginning, there were kittens
Activists are vulnerable
Meanwhile, in Syria…
The stakes are high
February 2011, Syria unbans Facebook
We couldbeheroes -recon2014
We couldbeheroes -recon2014
Anti-Dissident Campaign
Civil Unrest Begins
January 26, 2011
Anti-Dissident
Operations Discovered
Fake Youtube
[Deliver Malware]
[Phishing]
2012
CNN Reporting
Skype
[Deliver Malware]
Fake Facebook
Deliver Malware
Phish All The Things
Phish All The Things
Phish All The Things
Phish All The Things
Phish All The Things
Phish All The Things
Phish All The Things
Head of syrian opposition...
Fake Revolutionary Plans
Zero-Hour Plan for Aleppo
I’ve got a little list…
A message from Sheikh Adnan…
Encription... can haz?
Encription... can haz?
Anti Hacker
Anti Hacker
They’re ba-ack
Hijacked Facebook Group
A very bad day of malware analysis
False Flag
alosh66
Domains:
alosh66.no-ip.info
alosh66.myftp.org
alosh66.servecounterstrike.net
alosh66.linkpc.net
Distinguishing feature:
Predictable C2 domain naming convention.
Tools:
Dark Comet RAT
BlackShades RAT
Attacks
March 2012: Fake YouTube Website
YouTube credential phishing
DarkComet RAT
June/July 2012: Skype phishing
BlackShades RAT
August 2012: Facebook phishing
BlackShades RAT
dot28 Gang
Domain:
meroo.no-ip.org
Distinguishing feature:
Repeated use of 216.6.0.28 as C2.
Tools:
Dark Comet RAT
Xtreme RAT
Dot28 Gang
Operating from November 2012 to present
Campaigns:
Zero hour plan for the city of Aleppo
Plans for a revolutionary high council
Skype encryption program
Anti-Hacker application
Names of some militants in Syria and abroad who
are wanted by the Syrian regime
Dot28 Gang
30+ DarkComet RAT samples connecting to
216.6.0.28
1 Xtreme RAT sample connection to 216.6.0.28
C&C stayed up during Internet blackout in Syria
Syrian students getting savvy
DarkcoderSc
Tools & Actors
Good morning Vietnam
Le Quoc Quan
Dieu Cay
Ceiling cat sez u want free flights and
hotels nao?
Attacks on Vietnamese bloggers
Ethiopia: One Step Beyond
Thanks, Snowden
The game is afoot!
“"The current Ethiopian government has a well-
documented history of human rights violations
against anyone it sees as political opponents. Here,
it wiretapped a United States citizen on United
States soil in an apparent attempt to obtain
information about members of the Ethiopian
diaspora who have been critical of their former
government. U.S. laws protect Americans from this
type of unauthorized electronic spying, regardless
of who is responsible."
EFF Staff attorney Nate Cardozo
Meanwhile, in the UK…
We couldbeheroes -recon2014
Thanks!
Many thanks to: John Adams, Morgan Marquis-
Boire, Bill Marczak, Cooper Quintin, Cindy Cohn,
Nate Cardozo, Citizen Lab, and Privacy
International.
Heroes and rock stars.

More Related Content

We couldbeheroes -recon2014

Editor's Notes

  1. Ethiopia, by the way, is one of the NSA’s approved SIGINT partners. As you can see on this chart, taken from the Snowden documents published in Glenn Greenwald’s book “No Place to Hide,” Ethiopia received $450k from the NSA to build its surveillance capabilities, including those targeting “terrorists,” which is what the Ethiopian government calls political dissidents. Citizen Lab reports have found both FinFisher and HackingTeam command and control servers operating in Ethiopia. Given how relatively inexpensive these products are, $450k goes a long way towards covering those costs.
  2. Three months later, I was put in touch with a person in Washington DC who provided technical support for Ginbot 7, known by the pseudonym Kidane. I explained the researcher’s findings, described FinFisher’s capabilities, and he allowed an expert to examine his computer for malware. Forensic analysis revealed that his computer had been infected with FinFisher’s surveillance tool, FinSpy. It had been uninstalled, but the uninstallation process had left traces which enabled us to know some of what the software had recorded and possibly exfiltrated back to the Ethiopian government. This data included Skype calls and Google searches. Further analysis traced the infection back to an infected Word document attachment that had been sent by agents of the Ethiopian government and forwarded to him.
  3. Because the spying happened in the United States—in fact—Mr Kidane’s laptop never left the US, EFF is representing him in a lawsuit against the Ethiopian government. We are suing the Ethiopian government for violating the US wiretapping act and state privacy law. This case is important because it demonstrates that state-sponsored malware infections and can indeed are occurring in the U.S. against U.S. citizens. It seeks to demonstrate that warrantless wiretapping is illegal and can be the basis of a lawsuit in the United States, regardless of who engages in it.   
  4. Meanwhile, British privacy watchdogs Privacy International the findings on Mr. Kidane’s computer, as well as Citizen Lab’s extensive research into the use of UK-based Gamma International’s surveillance software to facilitate human rights violations to put pressure on Her Majesty’s Revenue and Customs to investigate these exports. We expect that EF’s law suit and PI’s legal action will take a long time to work their way through the courts. The fight against governments that abuse human rights through targeted surveillance and the companies that sell to them, facilitating that abuse, but is a long one, but it would not be possible at all without public research directly linking human rights abuses to the surveillance software.
  5. So, what do I want you to do with your next year of research? If you find malware targeting vulnerable groups, publish your research. Ideally, it should be written in a way that can be understood by journalists and activists and ordinary readers, who can turn it into advice for the targets and fodder for policy decisions—and if you can’t do that, partner with a journalist or activist from the affected community. If you are concerned about the possibly legal implications of publishing your research, contact me at the Electronic Frontier Foundation. We have an entire floor of lawyers who have been defending the rights of security researchers to publish their work for decades. If you are located outside of the United States, or you are concerned about legal action outside of the US, I can make a referral.