Featured Image Source: Cisco Telos
Cybersecurity Incident Case Study: IPFS for Phishing, Malware Campaigns
As reported by the Cisco Talos Intelligence Group:
- The InterPlanetary File System (IPFS) is an emerging Web3 technology that is currently seeing widespread abuse by threat actors.
- Cisco Talos has observed multiple ongoing campaigns that leverage the IPFS network to host their malware payloads and phishing kit infrastructure while facilitating other attacks.
- IPFS is often used for legitimate purposes, which makes it more difficult for security teams to differentiate between benign and malicious IPFS activity in their networks.
- Multiple malware families are currently being hosted within IPFS and retrieved during the initial stages of malware attacks. (1)
From our friends over at The Record:
“A new web3 technology is being abused widely by threat actors, according to security researchers from tech giant Cisco.
The InterPlanetary File System (IPFS) is a protocol and peer-to-peer network for storing and sharing data. It is designed to enable decentralized storage of resources on the internet. It was built to be resilient against content censorship, meaning that it is not possible to effectively remove content from within the IPFS network once it’s stored there.
‘IPFS is often used for legitimate purposes, which makes it more difficult for security teams to differentiate between benign and malicious IPFS activity in their networks,’ the researchers said. ‘Multiple malware families are currently being hosted within IPFS and retrieved during the initial stages of malware attacks.’ The team that runs IFPS did not respond to requests for comment. According to Cisco Talos, IPFS is currently being leveraged to host phishing kits, which are the websites that phishing campaigns typically use to collect and harvest credentials from unsuspecting victims.
Image Source: Cisco Telos
Hackers are also using the technology in their malware distribution campaigns because it provides low-cost storage for malicious payloads while offering resilience against content moderation, effectively acting as “bulletproof hosting” for adversaries. ‘We have observed various samples in the wild that are currently leveraging IPFS. Throughout 2022, we’ve observed the volume of samples in the wild continuing to increase as this becomes a more popular hosting method for adversaries,’ the researchers said. One campaign saw victims receive emails pretending to come from a Turkish financial institution that were actually part of an infection process for the Agent Tesla remote access trojan.
Several other information-stealing tools were also seen leveraging IFPS, according to Cisco Talos. The company said it expects this kind of activity to continue increasing as more threat actors recognize that IPFS can be used to facilitate bulletproof hosting, is resilient against content moderation and law enforcement activities, and introduces problems for organizations attempting to detect and defend against attacks that may leverage the IPFS network.’
‘Organizations should be aware of how these newly emerging technologies are being actively used across the threat landscape and evaluate how to best implement security controls to prevent or detect successful attacks in their environments. Organizations should become familiar with these new technologies and how they are being leveraged by threat actors to defend against new techniques that use them,” Cisco Talos said.” (3)
What Next?
The following is a review of concepts central to how we analyze a socio-technical system here at OODA Loop – core concepts we will return to often in the next couple of months as we provide a final analysis of certain research thematics (misinformation, AI innovation, etc.) and findings from our 2022 research agenda.
This IPFS/web3 cybersecurity incident was of interest to us because it contains all the elements necessary for this case study to introduce the following core concepts and recommendations, which apply to many of the cybersecurity and emerging technology thematics we have explored in 2022:
- Exponential Disruption: Decision-makers today are confronting unprecedented changes in technology, business processes, the geopolitical environment, and the threat landscape.
- Criminal Use Cases are a Feature Not A Bug of Emerging Technologies: The surprising convergence of technologies, people, platforms, and/or events for good and for ill, otherwise known as intended consequences, is a feature not a bug of this exponential technological disruption. In this specific case study, an emerging technology – IPFS, a protocol and peer-to-peer network for storing and sharing data – is implemented in a maleficent manner unintended by its developers. Mis- and Disinformation by way of social media platforms come to mind as another recent example of this concept. We should no longer be surprised by hackers’ use of emerging technologies like IPFS. Burn me once…..
- Don’t Believe the Hype: Many emerging technologies are allied to a branding moniker – in this case, web3 – which is at a place in its “hype cycle” akin to a blind techno-utopianism: “The emergence of new Web3 technologies in recent years has resulted in drastic changes to the way content is hosted and accessed on the internet. Many of these technologies are focused on circumventing censorship and decentralizing control of large portions of the content and infrastructure people use and access on a regular basis. While these technologies have legitimate uses in a variety of practical applications, they also create opportunities for adversaries to take advantage of them within their phishing and malware distribution campaigns. (3) Vet all emerging technologies and think critically about negative use cases and vulnerabilities. Are your deployments of certain “web3” technologies consistent with the business problem you are trying to solve and/or the strategic intent and risk tolerance of your organization – or are you deploying “web3” for “web3’s” sake?
- The Theory of Affordances: Tools, platforms, software, and systems all have innate, obvious affordances – as well as those that are revealed by the intent and final outcome achieved by a particular user: “Affordance theory asserts a number of things, but I’d focus on its claims that technologies produce fields of action (including unexpected actions), but that not all actions are possible. The programmer who recodes according to Unix philosophy is re-determining technologies for cultural reasons, the hacktivist who DDoS’s Mastercard to show support for Wikileaks tries to alter the information landscape for political reasons and so on, and crucially they do so in their everyday actions… the language of affordances and (constraints as scholars use it) leaves room for us to say something about the agency of technical actants in a meaningful way. there are times and virtual places when and where we are not fully in control of our machinescapes. It is time that we bring in concepts that let us describe and understand those moments, rather than continue to rely on an idealized view of the agency of users and producers.” (2)
- The Exponential Expansion of the Attack Surface: The size of an attack surface is no longer just the total sum of matrixed attack vectors. It is also no longer cumulative and linear, but, more often than not, exponential (at speed and scale) what OODA CEO Matt Devost characterizes as “a great leap in the attacker space has been enabled by the deployment of machine learning-based cyber attacks and the increased scale, frequency, and volume of automated attacks.”
- The Attacker Gets a Larger Vote: We are toying with a formative hypothesis that the attacker’s share of the vote on the outcome of a cybersecurity incident is directly proportional to the strategic advantage wrought by these expanded attack surfaces.
- Enough about Algorithms. It is all about Heuristics Moving Forward: The upside of these expanded attack surfaces is they are also the source of a large dataset with the potential to inform machine learning, attack simulation, and threat modeling, all heuristic by their very nature and central to mounting an adequate strategic threat assessment: “An algorithm is a step-wise procedure for solving a specific problem in a finite number of steps. The result (output) of an algorithm is predictable and reproducible given the same parameters (input). A heuristic is an educated guess which serves as a guide for subsequent explorations.” (4) Add an OODA Loop operational layer to review these heuristic ‘educated guesses’, keeping humans firmly in the decision-making loop.
- Threat Intelligence: Organizations need new ways of rapidly assessing and mitigating this next generation of exponentially disruptive cyber threats.
- Past is Prologue: Cyberthreat intelligence lessons learned from the past are still very relevant today. Tap the institutional knowledge of the broader cybersecurity community, including the OODA Network.
Organizational Change: Praxis and Intervention
Once a concrete case study or new threat vector (i.e, troubling, novel web3 cybersecurity vulnerabilities at scale) emerges from a larger idea we have been exploring at the level of a technology framework or business strategy – i.e. exponential disruption – what is the best way to make recommendations for organizational change? Or how best do we think about decision intelligence and risk awareness?
We offer the following frameworks.
PRAXIS
“Praxis is defined as an accepted practice or custom, or an idea translated into action, or something in reality rather than something in theory. Fasting as a result of your Christian faith and to atone for your sins is an example of praxis. Living the principles of communism instead of just theoretically discussing those principles and strategizing about whether they will work is an example of praxis.” (5)
Questions of Praxis include:
- Is the challenge before the cybersecurity community one of incremental change by way of a new generation of innovation that remains tethered to legacy systems architectures, practices, and customs?
- Conversely, how do we spring into action, communicating new practices or customs to internal and external stakeholders once a new threat vector and cybersecurity vulnerability has been birthed by emerging technology?
- How do we communicate that this specific threat vector is only one example of a persistent, ongoing exponential disruption of cybersecurity at lethal speed, scale, and volume which requires strategic, coordinated action?
- We also continue to explore a question we positioned in our 2021 Cybersecurity Year-End Review: “2021 also marks the year that a lack of innovation and a dearth of new solutions-driven platforms raised concerns that we may be in a “Cyber Winter” in terms of business model generation and value proposition design. What are the novel architectures, design metaphors, and design processes for innovation in cybersecurity moving forward? And will security need to go back to the drawing board in a really transformative way in 2022?”
We continue to formulate our final research conclusions on how these questions have been answered over the course of 2022.
INTERVENTION
Government Intervention, Market Intervention, and Military Intervention. Like adult content, you know an intervention when you see it.
We position “intervention” here in the manner academia uses the term – which is the strategic positioning of research insights and thought leadership in partnership with the private sector, inside a specific organization and/or an intervention directed at an entire industry sector, which is designed to enact change and/or communicate a strategic vision for restructuring (or market survival), identifying opportunities for advantage and enhancing strategic risk awareness.
For example, this website is a strategic intervention. OODAcon is also a strategic intervention.
Questions of Intervention include:
- How best do you position an intervention within your organization?
- Is an intervention optimized for success by partnering with a third-party organization that provides external validation and subject matter expertise, enhancing the credibility of the intervention?
Further OODA Loop Resources
In recent OODA Loop interviews, OODA Network Members Junaid Islam and Florian Wolf offer practitioners insights on everything from zero trust to the real-world challenges of developing machine learning systems, emerging AI-based Zero Trust cybersecurity, small data, and the challenges of security automation.
https://oodaloop.com/ooda-original/2022/10/10/ooda-network-member-junaid-islam-on-security-automation-and-automated-continuous-threat-testing/
https://oodaloop.com/archive/2022/09/22/mergeflow-ceo-and-ooda-network-member-florian-wolf-on-small-data-part-1-of-2/
Stay Informed
It should go without saying that tracking threats are critical to inform your actions. This includes reading our OODA Daily Pulse, which will give you insights into the nature of the threat and risks to business operations.
Related Reading:
Explore OODA Research and Analysis
Use OODA Loop to improve your decision-making in any competitive endeavor. Explore OODA Loop
Decision Intelligence
The greatest determinant of your success will be the quality of your decisions. We examine frameworks for understanding and reducing risk while enabling opportunities. Topics include Black Swans, Gray Rhinos, Foresight, Strategy, Strategies, Business Intelligence, and Intelligent Enterprises. Leadership in the modern age is also a key topic in this domain. Explore Decision Intelligence
Disruptive/Exponential Technology
We track the rapidly changing world of technology with a focus on what leaders need to know to improve decision-making. The future of tech is being created now and we provide insights that enable optimized action based on the future of tech. We provide deep insights into Artificial Intelligence, Machine Learning, Cloud Computing, Quantum Computing, Security Technology, and Space Technology. Explore Disruptive/Exponential Tech
Security and Resiliency
Security and resiliency topics include geopolitical and cyber risk, cyber conflict, cyber diplomacy, cybersecurity, nation-state conflict, non-nation-state conflict, global health, international crime, supply chain, and terrorism. Explore Security and Resiliency
Community
The OODA community includes a broad group of decision-makers, analysts, entrepreneurs, government leaders, and tech creators. Interact with and learn from your peers via online monthly meetings, OODA Salons, the OODAcast, in-person conferences, and an online forum. For the most sensitive discussions interact with executive leaders via a closed Wickr channel. The community also has access to a member-only video library. Explore The OODA Community.