Hacking – Digital Citizenship and Surveillance Society https://dcssproject.net UK State-Media-Citizen Relations after the Snowden Leaks Wed, 28 Nov 2018 12:14:34 +0000 en-GB hourly 1 https://wordpress.org/?v=5.3.3 QUANTUM THEORY https://dcssproject.net/quantum-theory/ Wed, 22 Jul 2015 11:22:45 +0000 http://sites.cardiff.ac.uk/dcssproject/?p=698 Continue reading

]]>
QUANTUM THEORY, The Intercept, slide #3.

QUANTUM THEORY, The Intercept, slide #3.

Purpose:

QUANTUM THEORY is a programme that capitalises on vulnerabilities within applications and networks using a number of hacking techniques. It includes a variety of sub-programmes such as [ELE01, INT02]:

  • QUANTUMBOT – IRC botnet hijacking
  • QUANTUMBISQUIT – targets that are behind large proxies
  • QUANTUMCOOKIE – forces cookies onto target browsers
  • QUANTUMINSERT – HTML web page redirection to spy agency servers known as FOXACID.
  • QUANTUMSQUEEL – for injection of MySQL databases
  • QUANTUMSPIM – instant messaging hijacking
  • QUANTUMDNS – domain name server (DNS) injection and redirection
  • QUANTUMHAND – exploits the computer of a person who logs into Facebook
  • QUANTUMPHANTOM – hijacks an IP address to redirect to a covert infrastructure
  • QUANTUMSKY – denies access to a webpage using RST packet spoofing
  • QUANTUMCOPPER – file upload/download disruption and corruption
  • QUANTUMSMACKDOWN – prevents downloading implants to DoD computers

In the case of QUANTUMINSERT, for example, the programme relies upon the placement of secret servers across key areas of the Internet backbone [SCH01]. This is done so that requests to visit web sites can be intercepted before the legitimate server is contacted, which tricks a web browser into visiting a bogus web site on a government server. It uses a well known hacking technique called “man-in-the-middle” attacks. However, the government agencies have an added capacity of conducting “man-on-the-side” attacks that require access to the Internet backbone. Once a web browser is redirected, malware can be inserted directly into the users’ computer.

Capabilities:

  • HTTP injection
  • DNS injection allowing bogus certificates, breaking SSL and redirection of traffic to NSA servers
  • Packet-injection to block attacks on government servers by terminating a requested connection
  • Plug-in to inject into MySQL connections

Exploitation of:

  • Vulnerabilities in network standards
  • Vulnerabilities in software, e.g. persistent “push” connections from Facebook, where a user’s browser would leave an idle connection open, waiting for a command from the server [WIR01]

Data extraction sources:

  • IRC and other botnets
  • Web services (e.g. Yahoo, Facebook, Gmail, LinkedIn)
  • Peer-to-peer networks (e.g. TOR)

Combined with other state surveillance tools:

TURBINE – Internet traffic sifting that shifts data to a variety of databases.
FOXACID – Spy agency web servers used to redirect Internet traffic (e.g. TOR users) [GUA01].
XKEYSCORE – search engine for access to content, metadata and real-time tracking and monitoring of website traffic and user activities.
MUSCULAR – intercepts data going into and out of Google and Yahoo services.
MARINA – metadata repository for Internet traffic.

Layers of operation:

  • Network Layer
  • Application Layer

Background:

QUANTUM made headlines when it was uncovered that GCHQ was behind the Belgacom cyber attack conducted under the codename “Operation Socialist” [SPI01]. The company provides telecommunications access to the European Commission, the European Council and the European Parliament. GCHQ used QUANTUMINSERT to target Belgacom employees, redirecting them to websites that would implant malware onto their computers which could then be used to manipulate those machines. The technique was also used by GCHQ to compromise users of LinkedIn [SPI02].

Spy agencies maintain a library of exploits, each based on a different vulnerability in a system [GUA01].

Sources:

Electrospaces (ELE)
1) http://electrospaces.blogspot.co.uk/search?q=quantum

Guardian (GUA)
1) http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity

Intercept (INT)
1) https://firstlook.org/theintercept/document/2014/03/12/nsa-gchqs-quantumtheory-hacking-tactics
2) https://firstlook.org/theintercept/document/2014/03/12/one-way-quantum

Schneier (SCH)
1) https://www.schneier.com/blog/archives/2013/10/how_the_nsa_att.html

Spiegel (SPI)
1) http://www.spiegel.de/international/europe/british-spy-agency-gchq-hacked-belgian-telecoms-firm-a-923406.html
2)  http://www.spiegel.de/international/world/ghcq-targets-engineers-with-fake-linkedin-pages-a-932821.html

Wired (WIR)
1) http://www.wired.com/2014/03/quantum

]]>