Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

11/10/2011
04:20 PM
50%
50%

Teaming Up To Take Down Threats

Security professionals are leery of one-way public-private partnerships, but Operation Ghost Click shows that the model is necessary to take on international threats

Policy makers and government officials have used the term "public-private partnerships" as a way to fight online threats so frequently that it has become code for doing nothing. Yet the recently announced Operation Ghost Click shows that such teamwork is necessary to take on cybercriminals and more advanced threats online.

On Wednesday, the FBI announced a massive investigation in conjunction with international law enforcement agencies, private industry, and nongovernment organizations, which led to the charging of seven Estonian and Russian citizens for a widespread click fraud scheme that had infected more than 4 million computers and netted the group more than $14 million.

The group, operating under various corporate names including Rove Digital, allegedly infected victims' computers with DNSChanger -- malware that changed the systems' domain-name servers, redirecting requests for Web site addresses through a network of criminal-controlled hosts. For four years, the group allegedly used the malware and servers to create false advertising clicks to businesses that paid affiliate fees, defrauding the firms. The Estonian police arrested the six Estonian nationals on Tuesday, while the sole Russian suspect remained at large.

"With the flip of a switch, the FBI and our partners dismantled the Rove criminal enterprise," said Janice K. Fedarcyk, the FBI's Assistant Director-in-Charge, in a statement. "Thanks to the collective effort across the U.S. and in Estonia, six leaders of the criminal enterprise have been arrested and numerous servers operated by the criminal organization have been disabled."

The scheme required massive cooperation to investigate and track the people perpetrating the fraud. The FBI worked with the Estonian Police and Border Guard, the Dutch National Police, and NASA's Office of the Inspector General. In the private sector, the law enforcement agency relied on resources at Georgia Tech University, the Internet Systems Consortium, security firm Mandiant, anti-spam group Spamhaus, security intelligence firm Team Cymru, antivirus company Trend Micro, the University of Alabama at Birmingham, and members of an ad hoc group of subject matter experts known as the DNS Changer Working Group.

The FBI even sought a partner to help manage the remediation efforts. Merely taking down the fraudulent DNS network's control servers would have likely resulted in the infected computers being cut off from the Internet until a knowledgeable person reset the computer's lists of DNS hosts. In this case, the rogue DNS servers were replaced by legitimate ones run by the Internet Systems Consortium, the nonprofit company that develops the widely used BIND domain-name system software.

Without such cooperation, the criminals and agents behind online crime and intellectual property attacks could not be investigated or prosecuted, says Phyllis Schneck, chief technology officer for public sector at McAfee.

"This is what happens when the good guys make it work," Schneck says. "This is what happens when several companies can get together with nonprofits and work together with law enforcement to go across corporate boundaries and across international boundaries. This was exceedingly well-orchestrated."

Without the limitation of legal and national boundaries, and frequently better at sharing information, online adversaries are typically much more agile than the defenders, and that's a key issue such partnerships need to address, says Schneck.

Without better cooperation and better information sharing, cybercriminals and espionage agents will continue to win, says Steve Santorelli, director of global outreach at Team Cymru and an ex-Scotland Yard detective. The FBI's successful cooperative effort is an excellent example of how to proceed, he says.

"It is a model for the future," Santorelli says. "Law enforcement has realized they can't do it on their own. And industry has realized that they can't do it on its own."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Virginia a Hot Spot For Cybersecurity Jobs
Jai Vijayan, Contributing Writer,  10/9/2019
How to Think Like a Hacker
Dr. Giovanni Vigna, Chief Technology Officer at Lastline,  10/10/2019
7 SMB Security Tips That Will Keep Your Company Safe
Steve Zurier, Contributing Writer,  10/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17660
PUBLISHED: 2019-10-16
A cross-site scripting (XSS) vulnerability in admin/translate/translateheader_view.php in LimeSurvey 3.19.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the tolang parameter, as demonstrated by the index.php/admin/translate/sa/index/surveyid/336819/lang/ PATH_INFO.
CVE-2019-11281
PUBLISHED: 2019-10-16
Pivotal RabbitMQ, versions prior to v3.7.18, and RabbitMQ for PCF, versions 1.15.x prior to 1.15.13, versions 1.16.x prior to 1.16.6, and versions 1.17.x prior to 1.17.3, contain two components, the virtual host limits page, and the federation management UI, which do not properly sanitize user input...
CVE-2019-16521
PUBLISHED: 2019-10-16
The broken-link-checker plugin through 1.11.8 for WordPress (aka Broken Link Checker) is susceptible to Reflected XSS due to improper encoding and insertion of an HTTP GET parameter into HTML. The filter function on the page listing all detected broken links can be exploited by providing an XSS payl...
CVE-2019-16522
PUBLISHED: 2019-10-16
The eu-cookie-law plugin through 3.0.6 for WordPress (aka EU Cookie Law (GDPR)) is susceptible to Stored XSS due to improper encoding of several configuration options in the admin area and the displayed cookie consent message. This affects Font Color, Background Color, and the Disable Cookie text. A...
CVE-2019-16523
PUBLISHED: 2019-10-16
The events-manager plugin through 5.9.5 for WordPress (aka Events Manager) is susceptible to Stored XSS due to improper encoding and insertion of data provided to the attribute map_style of shortcodes (locations_map and events_map) provided by the plugin.