Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

11/10/2011
04:20 PM
50%
50%

Teaming Up To Take Down Threats

Security professionals are leery of one-way public-private partnerships, but Operation Ghost Click shows that the model is necessary to take on international threats

Policy makers and government officials have used the term "public-private partnerships" as a way to fight online threats so frequently that it has become code for doing nothing. Yet the recently announced Operation Ghost Click shows that such teamwork is necessary to take on cybercriminals and more advanced threats online.

On Wednesday, the FBI announced a massive investigation in conjunction with international law enforcement agencies, private industry, and nongovernment organizations, which led to the charging of seven Estonian and Russian citizens for a widespread click fraud scheme that had infected more than 4 million computers and netted the group more than $14 million.

The group, operating under various corporate names including Rove Digital, allegedly infected victims' computers with DNSChanger -- malware that changed the systems' domain-name servers, redirecting requests for Web site addresses through a network of criminal-controlled hosts. For four years, the group allegedly used the malware and servers to create false advertising clicks to businesses that paid affiliate fees, defrauding the firms. The Estonian police arrested the six Estonian nationals on Tuesday, while the sole Russian suspect remained at large.

"With the flip of a switch, the FBI and our partners dismantled the Rove criminal enterprise," said Janice K. Fedarcyk, the FBI's Assistant Director-in-Charge, in a statement. "Thanks to the collective effort across the U.S. and in Estonia, six leaders of the criminal enterprise have been arrested and numerous servers operated by the criminal organization have been disabled."

The scheme required massive cooperation to investigate and track the people perpetrating the fraud. The FBI worked with the Estonian Police and Border Guard, the Dutch National Police, and NASA's Office of the Inspector General. In the private sector, the law enforcement agency relied on resources at Georgia Tech University, the Internet Systems Consortium, security firm Mandiant, anti-spam group Spamhaus, security intelligence firm Team Cymru, antivirus company Trend Micro, the University of Alabama at Birmingham, and members of an ad hoc group of subject matter experts known as the DNS Changer Working Group.

The FBI even sought a partner to help manage the remediation efforts. Merely taking down the fraudulent DNS network's control servers would have likely resulted in the infected computers being cut off from the Internet until a knowledgeable person reset the computer's lists of DNS hosts. In this case, the rogue DNS servers were replaced by legitimate ones run by the Internet Systems Consortium, the nonprofit company that develops the widely used BIND domain-name system software.

Without such cooperation, the criminals and agents behind online crime and intellectual property attacks could not be investigated or prosecuted, says Phyllis Schneck, chief technology officer for public sector at McAfee.

"This is what happens when the good guys make it work," Schneck says. "This is what happens when several companies can get together with nonprofits and work together with law enforcement to go across corporate boundaries and across international boundaries. This was exceedingly well-orchestrated."

Without the limitation of legal and national boundaries, and frequently better at sharing information, online adversaries are typically much more agile than the defenders, and that's a key issue such partnerships need to address, says Schneck.

Without better cooperation and better information sharing, cybercriminals and espionage agents will continue to win, says Steve Santorelli, director of global outreach at Team Cymru and an ex-Scotland Yard detective. The FBI's successful cooperative effort is an excellent example of how to proceed, he says.

"It is a model for the future," Santorelli says. "Law enforcement has realized they can't do it on their own. And industry has realized that they can't do it on its own."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Malicious USB Drive Hides Behind Gift Card Lure
Dark Reading Staff 3/27/2020
How Attackers Could Use Azure Apps to Sneak into Microsoft 365
Kelly Sheridan, Staff Editor, Dark Reading,  3/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "I feel safe, but I can't understand a word he's saying."
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-7755
PUBLISHED: 2020-03-30
In webERP 4.15, the Import Bank Transactions function fails to sanitize the content of imported MT940 bank statement files, resulting in the execution of arbitrary SQL queries, aka SQL Injection.
CVE-2020-10560
PUBLISHED: 2020-03-30
An issue was discovered in Open Source Social Network (OSSN) through 5.3. A user-controlled file path with a weak cryptographic rand() can be used to read any file with the permissions of the webserver. This can lead to further compromise. The attacker must conduct a brute-force attack against the S...
CVE-2020-5527
PUBLISHED: 2020-03-30
When MELSOFT transmission port (UDP/IP) of Mitsubishi Electric MELSEC iQ-R series (all versions), MELSEC iQ-F series (all versions), MELSEC Q series (all versions), MELSEC L series (all versions), and MELSEC F series (all versions) receives massive amount of data via unspecified vectors, resource co...
CVE-2020-5551
PUBLISHED: 2020-03-30
Toyota 2017 Model Year DCU (Display Control Unit) allows an unauthenticated attacker within Bluetooth range to cause a denial of service attack and/or execute an arbitrary command. The affected DCUs are installed in Lexus (LC, LS, NX, RC, RC F), TOYOTA CAMRY, and TOYOTA SIENNA manufactured in the re...
CVE-2020-10940
PUBLISHED: 2020-03-27
Local Privilege Escalation can occur in PHOENIX CONTACT PORTICO SERVER through 3.0.7 when installed to run as a service.