13.07.2015 Views

hp-security-research-cyber-risk-report-pdf-2-w-1408

hp-security-research-cyber-risk-report-pdf-2-w-1408

hp-security-research-cyber-risk-report-pdf-2-w-1408

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

HP Security Research | Cyber Risk Report 2015TurkeyTurkeyIn HP Security Briefing Episode 19, 41 we examined how a simple site defacement led us to theTurkish hacker underground, uncovering threat-actor activity that appears likely to be statecondoned.In stark contrast to Iran and North Korea, Turkey is considered to be an intelligenceally of the United States. However, Turkish threat actors have exhibited anti-Western <strong>cyber</strong>activity that could be considered hostile by targets and their allies, but are consideredpermissible under Turkish <strong>cyber</strong> law. Additionally, some of the threat actors have been trainedin conjunction with state-sponsored universities or have been commended for their activity. Our<strong>security</strong> <strong>research</strong> uncovered an interesting trail:• Turkey’s lenient <strong>cyber</strong> laws allow activity such as website defacements to go unpunished. 42• Threat actor b3yaz’s beyazakademi.org offers training in conjunction with severalstate-run universities. 43• Members of the hacker team Akincilar, part of the Cyber Warrior TIM threat actor group, werecommended by Turkish police for their attacks against RedHack and other entities perceivedto threaten Turkish or Islamic ideals. 44• Several actors in Akincilar are also on the management team of the Bilişim Güvenliği veBilişim Suçlarına Karşı Mücadele Derneği (Bilişim Güvenliği), 45 which has provided freeinformation <strong>security</strong> support to gov.tr and pol.tr, and has submitted sensitive informationto government entities.• Akincilar member Emrullah Akdemir, who engages in black-hat activities under the aliasf0rtys3v3n, has provided <strong>security</strong> for TUBiTAK, an advisory agency to the Turkish Governmenton science and <strong>research</strong> issues.• In April 2012, representatives from Bilişim Güvenliği, including the group’s manager GökhanŞanlı, participated in a meeting on “Stopping access to certain websites in Turkey andIntellectual Property Rights” at Çankaya Köşkü, Turkey’s equivalent of the White House. Şanlı,who uses the alias Doktoray, operates the Cyber Warrior forums. 46• The now deceased Halit Uygur, who used the alias Dogukan, 47 was a key figure in CyberWarrior TIM and was also a key figure in the Republic of Turkey Ministry of National Educationin Istanbul. 48These factors indicate Turkey’s approval of certain threat-actor activity, while creating plausibledeniability of operational involvement. While some of the threat actors profiled in the <strong>report</strong>engage in black-hat activity and cite political reasons as their motivation for attack, lack of clearevidence of state sponsorship means it is hard to determine whether their activity would trulyqualify as an act of <strong>cyber</strong> war.The Iranian <strong>cyber</strong> warfare program has had clear influence on the <strong>cyber</strong> underground.The actors were trained in conjunction with state-sponsored universities, and they werecommended for their activities. Ashiyane was utilized as an extension of the regime’s <strong>cyber</strong>police during the Green Movement, leading to EU sanctions against Ashiyane’s leader,Behrouz Kamalian.41http://h30499.www3.<strong>hp</strong>.com/t5/HP-Security-Research-Blog/HP-Security-Briefing-episode-19-Fifty-shades-of-black-hat-Turkey/bap/6677685.42http://www.<strong>cyber</strong>lawdb.com/gcld/category/europe/turkey/.43http://beyazakademi.org/hakkimizda.44http://www.agos.com.tr/en-makbul-milliyetcihacker-olan-milliyetci-1809.html.45http://www.agos.com.tr/en-makbul-milliyetcihacker-olan-milliyetci-1809.html.46http://www.agos.com.tr/en-makbul-milliyetcihacker-olan-milliyetci-1809.html.47http://www.<strong>cyber</strong>-warrior.org/17252.48http://istanbul.meb.gov.tr/www/aci-kaybimiz/icerik/646.In North Korea, the unique infrastructure and restrictions on Internet use mean the regimeis well aware of any activity originating from its networks and cannot deny responsibility foractivity originating therein. However, the regime’s propensity to use third-party networks tolaunch CNO can make definitive attribution a difficult task.Finally, in the case of Turkey, some of the actors profiled were trained via programs operatingin conjunction with state-run universities, and others were explicitly commended for theiractivity. In this situation, the lines are blurred between autonomous black-hat activity that ispolitically or ideologically motivated and attacks that are executed based on orders from anofficial government or military entity, giving the Turkish government plausible deniability ofoperational involvement.11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!