The US Can't Stop China Copying Its Cyber Weapons

China is copying malware the NSA has used against them. Is this preventable or is it an inherent weakness of cyber warfare?

It is nothing new for adversaries to copy and steal each other’s weapons but recent revelations from Symantec and The New York Times suggest this problem is much bigger with cyber weapons. This is because in order to attack an enemy’s computer, the enemy have to copy their code onto it. It’s like bombing an enemy with munitions that scatter their own blueprints around the blast site.

US hacking tools have gone astray before, most notoriously when a mysterious group called Shadow Brokers repeatedly released National Security Agency code for hackers around the globe to use in attacks like WannaCry. Now cybersecurity analysts at Symantec have found evidence that hackers working for China’s Ministry of State Security were using NSA-built cyber weapons “at least a year prior to the Shadow Brokers leak.”

To avoid offending nation-states, the Symantec report only IDs the Chinese as “Buckeye” and NSA as “Equation Group”.

Symantec’s suggested explanation: “one possibility is that Buckeye may have engineered its own version of the tools from artifacts found in captured network traffic, possibly from observing an Equation Group attack.”

“This is a significant revelation,” one retired naval officer told us. “With Shadow Brokers, the assumption was that it was a group with significant insider knowledge …. who had somehow pilfered the software and released it. If correct, this would suggests that: 

  • the issue of loss of control of sensitive malware has gone on longer than understood.
  • if Symantec is correct that China likely captured the software while it was being used by NSA, [then] using cyber to collect intelligence is far riskier than generally acknowledged.

“The new element in the story is that an organisation has reverse-engineered a deployed US cyber tool and reused it; previous cases involved the theft or loss of a tool,” agreed Bryan Clark of the Center for Strategic & Budgetary Assessments.

“This would be similar to the Chinese finding a Tomahawk missile that had failed to detonate and using it to build their own.”

The difference, Clark continued, is that physical bombs and missiles automatically destroy themselves in the course of an attack, unless they’re duds. Cyber weapons don’t. 

During war games, the cyber teams often assume that a weapon will only be used once, for precisely this reason. “The solution is to make cyber weapons tamper resistant,” he said, “which means their code cannot be determined without proper encryption, or the code rewrites itself after use, ‘duding’ the weapon.” But even self-destructing code doesn’t guarantee a target of our cyber weapons can’t copy them, Clark warned: “They will still run the risk of being detected and characterised by a defensive system before the tamper resistant features activate.”

Clever techniques, like malware that encrypts and/or deletes itself, can reduce the risk that the target can copy weapons used against it. But part of the problem is inherent to the nature of cyber warfare, which may require the US to think very differently about this new form of conflict.

In his book Guns, Germs, & Steel, Jared Diamond traces how concepts like written language spread around the globe through a combination of direct “blueprint copying”, the way the Romans adopted the Greek alphabet, with minor changes, to write their own, very different language, and indirect “idea diffusion”, as when Cherokee picked up the concept of written language from European settlers, along with the shapes of some letters, but used them to represent entirely different sounds.

Copying is common in the military realm as well. The Soviet Union spied extensively on the American Manhattan project and used the stolen information to build their own atomic bomb years before the West expected it.

But to copy a cyber weapon, all you have to do is see it, because the weapon itself is made of information. China copying the code the NSA used to attack them is less like what the Soviets copying the A-bomb  and more like the Romans copying the Greek alphabet:

That makes copycat cyber weapons extremely hard to stop. Even if the code is encrypted, even if it erases itself after its attack, it has to be executed on the target’s computer in order to affect it.

BreakingDefense

You Might Also Read: 

‘Chinese Spies’ Had NSA Cyber Weapons Before The Shadow Brokers Leak:

 

 

« US Campaigners Get Trained About Cyber Threats
WannaCry Hero Deserves a Pardon, Not A Conviction »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Oppida

Oppida

Oppida provides tailored IT security services to help you identify security gaps and assist in finding the most effective remediation.

ECS

ECS

ECS is a leading information technology provider delivering cloud, cybersecurity, software development, IT modernization, and advanced science and engineering services.

New Zealand Internet Task Force (NZITF)

New Zealand Internet Task Force (NZITF)

The New Zealand Internet Task Force (NZITF) is a non-profit with the mission of improving the cyber security posture of New Zealand.

UNIDIR Cyber Policy Portal

UNIDIR Cyber Policy Portal

The UNIDIR Cyber Policy Portal is an online reference tool that maps the cybersecurity and cybersecurity-related policy landscape.

Global EPIC

Global EPIC

Global EPIC is an international cybersecurity initiative designed to combat growing world challenges by facilitating global collaboration in the field of cyber security.

Zeusmark

Zeusmark

Zeusmark are a digital brand security company. We enable companies to successfully defend their brands, revenue and consumers online.

Cyberport

Cyberport

Cyberport is focused on facilitating the growth of major technology trends such as FinTech and cybersecurity as well as the emerging technologies of AI, big data and blockchain.

Phoenix Cybersecurity

Phoenix Cybersecurity

Phoenix Cybersecurity Services and Managed Security Services help clients just like you take full advantage of leading cybersecurity technologies and industry best practices.

Octiga

Octiga

Octiga is an office 365 cloud security provider. It offers Office 365 monitoring, incident response and recovery tools.

ClassNK Consulting Service (NKCS)

ClassNK Consulting Service (NKCS)

ClassNK Consulting provides consulting services to the maritime industry with a focus on safety, security and compliance.

Intelligent Technical Solutions (ITS)

Intelligent Technical Solutions (ITS)

We help businesses manage their technology. Intelligent Technical Solutions provide you with the right technical solution, so you can get back to running your business.

G-71

G-71

G-71 LeaksID is a cutting-edge ITM technology aimed at safeguarding sensitive documents from insider threats.

Mondoo

Mondoo

Mondoo is a powerful security, compliance, and asset inventory tool that helps businesses identify vulnerabilities, track lost assets, and ensure policy compliance across their entire infrastructure.

FTI Consulting

FTI Consulting

FTI Consulting is a global business advisory firm dedicated to helping organizations manage change, mitigate risk and resolve disputes.

Box

Box

Box is the Cloud Content Management company that empowers enterprises to revolutionize how they work by securely connecting their people, information and applications.

CIS Secure

CIS Secure

CIS Secure is an innovator, integrator and expert advisor supporting the broadest portfolio of powerful, mission-specific C5ISR communications and cybersecurity solutions.