Art10-阿拉丁斯灯,恶意代码的窃取和再武器化

ID:23707

阅读量:0

大小:2.44 MB

页数:16页

时间:2022-11-29

金币:15

上传者:战必胜
187
Aladdin’s Lamp: The Theft
and Re-weaponization of
Malicious Code
Abstract: Global superpowers do not have a monopoly on cyber warfare. Software
thieves can steal malware written by more advanced coders and hackers, modify it,
and reuse it for their own purposes. Smaller nations and even non-state actors can
bypass the most technically challenging aspects of a computer network operation
vulnerability discovery and exploit development to quickly acquire world-class
cyber weapons. This paper is in two parts. First, it describes the technical aspects of
malware re-weaponization, specically the replacement of an existing payload and/or
command-and-control (C2) architecture. Second, it explores the implications of this
phenomenon and its ramications for a range of strategic concerns including weapons
proliferation, attack attribution, the fog of war, false ag operations, international
diplomacy, and strategic miscalculation. And as with Aladdin’s magic lamp, many
malware thieves discover that obtaining a powerful new weapon carries with it risks
as well as rewards.
Keywords: malware, cyberwar, re-weaponization, false ag, attribution
Kārlis Podiņš
CERT Latvia
Riga, Latvia
Kenneth Geers
Comodo Group
Toronto, Canada
2018 10th International Conference on Cyber Conict
CyCon X: Maximising Eects
T. Minárik, R. Jakschis, L. Lindström (Eds.)
2018 © NATO CCD COE Publications, Tallinn
Permission to make digital or hard copies of this publication for internal
use within NATO and for personal or educational use when for non-prot or
non-commercial purposes is granted providing that copies bear this notice
and a full citation on the rst page. Any other reproduction or transmission
requires prior written permission by NATO CCD COE.
1. IntroductIon: stealIng cyber weaPons
In Arabian Nights, a poor but clever Aladdin nds a magic lamp offering power,
wealth, and love. However, the acquisition of these benets also carried a burden
of risk and responsibility. This parable offers lessons for aspiring cyber armies. The
theft of advanced malware facilitates a similar shortcut to increased power on digital
national security terrain. Computer code written by the Great Powers, including the
United States, Russia, China, and Israel, can be acquired, reverse-engineered, and re-
weaponized by small nations and even non-state actors.
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭