[Dailydave] Late Friday thoughts on the Kevin Mandia RSAC keynote.

Val Smith mvalsmith at gmail.com
Tue Mar 25 15:00:07 EDT 2014


I tried to have this debate several years ago and here is how it ended
(note, I never once had any idea, discussion or desire to do business
with Mr. Bejtlich), draw your own conclusions:

---

From: Richard Bejtlich <richard at taosecurity.com>
Subject: Re: heya
To: Me <valsmith at attackresearch.com>

Hi Val,

That's fine, but in neither case did I start the exchange.  Craig
recommended your class, and I'm sure it is good.  However, it doesn't
make any sense for me to hire third parties who are so disconnected
from our operational realty that they choose to take multiple personal
shots at me via Twitter.  I'm not seeking a truce because I don't
consider there to be an ongoing conflict here, just a divergence of
views preventing any new business relationships.

Sincerely,

Richard

On 1/31/11, Val Smith <valsmith at attackresearch.com> wrote:

I think our latest twitter escapades got out of control. Just because
I disagree with most of what you say, doesn't mean we can't be civil
and not let it get personal. I think healthy debate can be useful to
the community. So, olive branch extended, whadya say?

V.
---

That said I have great respect for Mandiant, they have built a solid IR
business, some fantastic tools, and some of their staff are amazingly
talented, really some the best in the biz.

Lets be honest here, the real way attribution gets done is by hack back,
LE seizures, and humint/snitches, not so much by RE or IP source
tracing, but I have no idea how much access Mandiant has to that kind of
information so its all just speculation.

Those who actually know, know full well that there are amazing,
non-Chinese blackhats that exist, possibly publish Phrack articles or
whatever, and can easily look like Chinese, not to mention some of the
organized crime stuff out there. I personally know a guy who was
attributed as a nation state by a government that shall not be named,
when he was 14 working on his own for fun. These type of people have
owned * and its silly to pretend they don't exist or that they MUST BE
China.

The other thing often left out is that "nation state" is a fuzzy word.
Maybe you are a Chinese kid hacking around for your own enjoyment and
someone from the regional government shows up one day asks you out to
coffee/tea and suggests you pass anything interesting along to him (or
else). Your attack pattern is going to be pretty random looking to an
analyst because you are not being directly tasked on specific targets
but you might stumble upon something sensitive. Are you nation state at
that point?

Going back to my hermit cave now,

V.

On 03/25/2014 09:39 AM, xgermx wrote:
> From Saturday's NYT article on the NSA owning Huawei:
>
> "The N.S.A., for example, is tracking more than 20 Chinese hacking groups —
> more than half of them Chinese Army and Navy units — as they break into the
> networks of the United States government, companies including Google, and
> drone and nuclear-weapon part makers, according to a half-dozen current and
> former American officials."
> http://www.nytimes.com/2014/03/23/world/asia/nsa-breached-chinese-servers-seen-as-spy-peril.html?_r=0
>
>
> Is anyone on this list really shocked by this? If we can so readily accept
> this, why is so hard to accept the APT1 attribution? Being younger, I'm not
> nearly as experienced in all of these domains, but it seems to a be salient
> question. In my eyes, APT1 is just that, one out of MANY. And yes, lets not
> forget it works both ways, as evidenced by the NSA's sheer ownage of the
> Chinese non-mil/gov targets.
>
>
> On Tue, Mar 25, 2014 at 9:00 AM, Haroon Meer <haroon at thinkst.com> wrote:
>
>> Hiya(s)
>>
>> On Tue, Mar 25, 2014 at 4:27 AM, Dan Guido <dguido at gmail.com> wrote:
>>> This argument by Bejtlich really makes me angry and it's representative
>> of
>>> the way that we seem to deal with cyber attribution out in the open.
>> There
>>> are a lot of gaps in the APT1 report that make those not "in the know"
>>> question the results. In my opinion, that kind of questioning is
>> deserved.
>>
>> Fwiw.. Marco Slaviero (marco at thinkst.com) wrote up a snippet on our
>> blog (and for our ThinkstScapes service) at the time highlighting some
>> of those gaps and listed data that could have been used to help
>> support the argument
>>
>> http://blog.thinkst.com/2013/02/thinkstscapes-2013-ah1-on-china-report.html
>>
>> -snip-
>> The Mandiant APT1 report that was released a week ago has been causing
>> some consternation, which makes it a ripe topic for our ThinkstScapes
>> service. This morning, we issued an ad-hoc update to our customers
>> containing our views of the APT1 report. In short, the data is
>> interesting, but does not conclusively point to Unit 61938. There are
>> too many open questions to justify the finger pointing.
>>
>> Take, for example, the markers released for the APT1 group. The report
>> does not contain sufficient data to replicate the grouping of
>> attackers bearing those markers into a single cohesive unit. By
>> Mandiant's own admission the presence of a single marker is
>> insufficient to tag an attacker as APT1, but thresholds are not
>> provided for the number of markers required. In the end, it appears as
>> if the classification boils down to an analyst's opinion, metrics are
>> absent the public report. The entire report is founded on the notion
>> that APT1 exists and is definable; should this not be the case, the
>> report's raison d'être evaporates. Corroboration is needed in the form
>> of convincing evidence.
>>
>> In addition, the conclusion that blames hacks supposedly originating
>> from an area the size of Los Angeles on a military unit's building in
>> same area is weak. In this regard, the press' use of the word
>> "neighbourhood" to describe Pudong is misleading. Today's ad-hoc
>> update examines these and other issues in greater detail, and extracts
>> the bits we believe matter for corporates.
>>
>> To be clear, we do not defend China or absolve it from hacking or
>> espionage; we have little doubt that it conducts such operations as,
>> presumably, do the US and other sufficiently resourced nations. Permit
>> me to repeat this: we are not saying the Chinese government does not
>> hack the US. Our concern is with this specific report; it is the first
>> concrete public attribution of ongoing espionage against the US, and,
>> if the report sets the standard for attribution, future events will be
>> highly muddled as competing hypotheses all meet the low standard set
>> out in Mandiant’s APT1 report. Unfortunately it seems that contrary
>> opinions are being subjected to a level of diatribe usually reserved
>> for arguments of faith, not facts.
>>
>> Part of the problem is that there is appears to be an information
>> differential, in which a number of folks with apparent non-public
>> information are saying "it's totally legitimate", while those without
>> the information are saying "this does not follow". Mandiant can help
>> the APT1 debate by releasing more data to reduce this differential,
>> specifically:
>>
>> - Is there further evidence that ties the subset of observed IP ranges
>> to the Unit 61398 Pudong building apart from a WHOIS record? (Note
>> that the fibre infrastructure was provided by a different company than
>> the listed owner of the IP ranges.)
>> - The number of attacks that would be classified as APT1, except for
>> the fact that their sink address (e.g. HTRAN receiver) was NOT in
>> Shanghai. What is the method for arriving at this conclusion? Phrased
>> differently, how much weighting does a Shanghai IP address have in the
>> APT1 cluster?
>> - A timestamped listing of known APT1 connections with their
>> associated IP addresses, which would show us the activity levels of
>> APT1.
>> - Metrics showing how many of the APT1 markers are shared with other
>> groups under observation, and to what degree? (i.e. what is the
>> overlap of domains, address blocks and malware hashes across the
>> various groups?)
>> - How many more profiles of APT1 members were discovered, and what
>> confidence does Mandiant hold in them? It seems strange that such a
>> large group with such poor opsec has not leaked many more profiles.
>> - What is the mapping between APT1-associated domain names and IP
>> addresses at the time of observation?
>> - What confidence level is assigned to the APT1⇿Unit 61938 link claim?
>> - By what reasoning does Mandiant eliminate an explanation for the
>> attack pattern that argues for small non-government teams operating in
>> a loosely connected fashion rather than a cohesive and directed group
>> of operators with a common approach?
>>
>> These debates are important going forward. Putting aside patriotism
>> and pride, there are important questions which remain to be asked
>> about the attribution of online attacks, and the danger in jumping to
>> conclusions is that, when the shoe is on the other foot, equally weak
>> claims are possible by an opponent. Hopefully any forthcoming
>> additional data will settle these questions and we can get back to our
>> regularly scheduled navel-gazing.
>> -snip-
>>
>> /mh
>> --
>> Haroon Meer | Thinkst Applied Research
>> http://thinkst.com/pgp/haroon.txt
>> Tel: +27 83 786 6637
>> _______________________________________________
>> Dailydave mailing list
>> Dailydave at lists.immunityinc.com
>> https://lists.immunityinc.com/mailman/listinfo/dailydave
>>
>
>
> _______________________________________________
> Dailydave mailing list
> Dailydave at lists.immunityinc.com
> https://lists.immunityinc.com/mailman/listinfo/dailydave



More information about the Dailydave mailing list