Module 3 - PRC Flashcards

(33 cards)

1
Q

PLA Roles:

A
  • Defend countries against foreign invasions
  • Maintain internal security and stability
  • Engage in economic development of the country
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name of formal information warfare strategy?

A

Integrated Network Electronic Warfare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Five Year Plan?

A

2011-2015

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Blue Army?

A

May 2011, small group with highly developed skills.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

China Goals

A

Political: economic and technological superiority
Political: Ensure there is one political voice
Military: Disable enemy communication; eliminate enemies’ ability to obtain, control, and use information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

China Doctrine

A

President Hu Jintao official proclamation that PLA is to conduct cyber warfare in name of Chinese self-preservation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Role of State

A

Largely considered to be state-sponsored hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Role of Universities

A

state-controlled universities “recruit” individuals and give training. Universities such as Science and Engineering University is tied to military.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

People’s Liberation Army (PLA)

A

Military Centers associated with cyber attacks:

  • General Staff Department
  • 4th Department
  • General Staff Department 3rd Department
  • Technical Reconnaissance Bureaus
  • Information Warfare Militia Units (2002)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

State Sponsored (actors in):

A
  • Universities
  • PLA
  • State-owned Enterprises
  • Hacktivists
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Role of State-owned Enterprises

A
  • Direct & indirect ties to PLA

- Cyber espionage used to gain economic advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Role of Hacktivists & 4 types of operations

A
  • not directly controlled by govn’t
  • motives orig. aligned with government’s
  • Orig targets: Taiwan & Japan
  • 4 types of operations
    • virtual sit-ins and blockades
    • automated e-mail bombs
    • web hacks and computer break-ins
    • viruses and worms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

China History: Earliest

A

date back as far as 2001; doctrine goes back into 1990s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

China History: 2002

A

global energy industry attacked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

China History: 2006

A

Air Force was tracking several individuals / groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

China History: 2010

A

Establishment of Chinese Cyber Command

17
Q

Titan Rain

A

Nov 1 2004 - Dec 14 2005
Source: Guangdong province of China
Targets: US government systems
- US DISA, Naval Ocean Systems Center, US Army Space and Strategic Defense, US Army Information Systems Engineering Command.

18
Q

State-owned Enterprises: the numbers

A
  • 150 corporations that report directly to central government
  • ~154,000 business where government has controlling interest through subsidiary relationships.
  • SOEs with links: Huawei Technologies Co Ltd & Zhongxing Telecom Ltd (ZTE)

Lenovo purchased by IBM in May 2005.

19
Q

PLA & Hactivists

A

PLA using hacker community for clandestine attacks

20
Q

Hactivist Toolsets

A
  • spam, phishing, spoofing
  • pharming
  • DoS, DDoS
  • Viruses, Trojans, Worms, Malware (other), Spyware
  • BotNets
21
Q

Advanced Persistent Threat

A
  • originally term used by US Air Force in 2006 to discuss specific actors in Asia-Pacific region
  • More publicly in 2008-2009 conferences
  • mainstream in 2010 with Operation Aurora.
  • Attacks from foreign < 2006.
  • Shift in meaning from specific atacker/actor to attack with specific characteristics with no attribution
22
Q

Cloppert’s Kill Chain

A
2009
Desire to break chain as far to the left as possible.
Defensive / protective measures vs clean-up costs
- Reconnaissance
- Weaponization
- Delivery
- Exploitation
- C2
- Exfiltration

-> not effective for all characteristics of life cycle. (btw C2 & exfil lots of activity)

23
Q

Modified Kill Chain

A
  • expands Cloppert’s Kill Chain to draw attention to lateral movement across network (iterative process).
    Same External (minus exfil + initial installation)
    Repeat internal
    Persistence
    Mission Fulfillment
24
Q

APT Group One

A

Tin Snake

  • since 2004
  • 2007 started malware (trojans, viruses)
  • 2008 selling electronics but not shipping
  • 2010 campaigns to penetrate US industries and defense contractors
  • Windows and Unix
  • keyloggers, domain parking, port relay tools
  • scam / hacking cycles
25
APT Group 15
Gold Crow - since 2005 - attacks since 2007 - sell knock-offs / low quality goods - hits energy sector and DoD companies, non-US based defense entities - domains registered to Canadian addresses
26
APT Group 12
NightDragon - since 2010 - unencrypted HTTP for C2 - break in 2011, resumed 2012 - highly targeted, no scams or other crimes - uses Sykipot malware (PDF exploits during phising attacks with relevant titles) - attacks against petroleum industry in 2010 and US DoD.
27
APT Group 20
Red Fly - since 2005 - high yield investment schemes and e-gold scams - targeted DoD contractors - hardcodes C2 servers and HTTP requests in malware, with no obfuscation attempt. - Windows\Fonts, PsExec, phishing, PDF exploits, Poison Ivy - uses HTTP for C2
28
Operation Shady RAT
infiltration of 72 networks Goal: exfiltration of data Objective: competetive advantage Targets: US government, U.N.
29
Chinese Exercises
2010, October 2011 | - joint effort testing of offensive and defensive capabilities
30
Name 4 APT Groups
1 (Tin Snake) 15 (Gold Crow) 12 (NightDragon) 20 (Red Fly)
31
Operation Aurora
Operation Aurora was a cyber attack which began in mid-2009 and continued through December 2009.[1] The attack was first publicly disclosed by Google on January 12, 2010, in a blog post.[2] In the blog post, Google said the attack originated in China. The attacks were both sophisticated and well resourced and consistent with an advanced persistent threat attack.
32
Relative strength of connections:
Strong to weak PRC and PLA PRC and SOE PRC and Hacktivists (weak) Medium Hacktivists and SOE Weak PLA and Hacktivists ( hard to control) PLA and SOE
33
Apt groups - name
1-Tin Snake 15 - Gold Crow 12 - NightDragon 20 - Red Fly