Hacker News new | past | comments | ask | show | jobs | submit login
Notifying Our Users of Attacks by Suspected State-Sponsored Actors (yahoo-security.tumblr.com)
114 points by _jomo on Dec 22, 2015 | hide | past | favorite | 43 comments



A big source of confusion on this kind of thing is that the HN crowd tends to see "state actor" and think "pervasive surveillance (by the NSA)".

In context, and in the security industry in general, "state actor" refers to active (although often broadly cast) penetration attempts by groups thought to be operated by foreign governments. These groups do not have significant surveillance capabilities, so they're trying to build it by doing things like getting access to the email of potentially interesting people, often via credential stealing malware or plain old phishing. Their methods are often not particularly sophisticated, but they're more persistent and better funded than most other threat actors. On the other hand, their methods sometimes are very sophisticated, so it's good to detect a problem as early as possible, as Yahoo is trying to help users do.


So, what you are saying is we should lose all hope of ever being notified about an NSA attack because they own the networks. Like that made it all-right... REALLY????


Consider this your notification.


Based upon the amount of spam I receive from Yahoo! mail systems, I'm not confident in their ability to detect "attacks by suspected state-sponsored actors" as they apparently don't even have the ability to detect phished/compromised accounts.


At the risk of stating the obvious, a From or Reply-To address of something@yahoo.com doesn't necessarily mean that Yahoo had anything to do with the message.


I've got more experience in hunting down spam than is healthy and can read headers.

Receiving SPF, DKIM validated spam from Yahoo's email systems, then discovering there's absolutely no way in hell to kick it back to them, sours one rather rapidly.

Trying to send mail to Yahoo has been roughly equally annoying for about as long.


You're not Google or Microsoft, so you don't matter as an email provider.

  -- The Yahoo! Mail Team


Can you clarify regarding no way to kick it back to them? My understanding was that they operate typical feedback loops per RFC 6449 (though I haven't personally verified this).

They also host a spam FAQ which has a link to a form to submit spam reports: https://help.yahoo.com/kb/SLN3402.html


Try self-hosted mail. The section on reporting spam from Yahoo conspicuously omits such options as submitting full headers to abuse or postmaster. Doing so in past (mutt, full headers) generates a "you're holding it wrong" messagee.

This goes back years, I've not tried recently, status may have changed. But again, the long, long term experience has been pretty sour.


The section on reporting spam from Yahoo has a link to a form where you can submit spam reports from Yahoo:

> Submit your report using our "Got Spam?" form if your email provider doesn't offer a spam reporting feature.

The "Got Spam?" link takes you to a form where you can supply the headers and content of the spam message sent from Yahoo.


What part of "mail to abuse@ or postmaster@ fails" don't you understand?

The web-form workflow breaks in many ways: console tools (which I use for email), mobile, and more.

The fact that I can simply "bounce" the whole message at Yahoo's spamtraps, if they had such a thing, and they can sort the message's legitimacy and structure themselves, but they don't allow this, speaks volumes.

And again, this shit for a decade or more.

Now, if Yahoo wanted to creat CLI tools to incorporate into mailflows for those of us who know what we're doing to slot into their systems, great.

But ultimately, their problems aren't mine, I've washed my hands.


I manage e-mail systems with thousands of users. I'm quite capable of looking at mail headers and figuring out where a message originates. Besides that, messages originating at Yahoo! are DKIM signed.


True, but Yahoo doesn't consider a properly DKIM or Domainkeys email something that should not just end up in the spam folder...

My experience with Yahoo mail is that there are tons of false positives on spam, and that none of the headers matter much... preference is given to a small number of whitelisted sending companies.


Sorry, I was referring to messages received at my mail system that originate on Yahoo!'s mail system; more specifically, messages that are signed by a yahoo.com key and coming from a yahoo.com mail host (according to DKIM and SPF).

Anyways...

> "Yahoo doesn't consider a properly DKIM or Domainkeys email something that should not just end up in the spam folder"

Nor should they. There's plenty of actual spam that passes SPF and DKIM checks -- which brings us back to my original point (the amount of spam that I receive from Yahoo!). A message should not be treated as non-spam just because it passes those checks -- they are merely one factor to consider.


> Nor should they

Of course not as the only criterion. But the messages in question were not spam, they were legitimate emails with DKIM, Domainkeys, SPF, long term non-spam IP address, etc.


The most obvious one was a persistent (and wild) XSS vuln on yahoo mail accounts that seemingly couldn't be fixed in 2012, 2013, and some argue it's still present in 2015.


Yep, I can't believe that they made John Langford and the team leave from YR, the best guys at scalable machine learning.


What the hell are you talking about?!


"State-sponsored actors" sounds like over-specification. If Yahoo detects a "sophisticated attack" from a lone jerk with a computer, do they not notify affected users of defensive actions to take?

It's no doubt interesting to know that your account is being targeted by your own or some other government, but identification seems secondary to detection and response.


Google has a state sponsored actors warning. I received it a few years ago, a red bar across the top of GMail.

So I turned on two factor auth and the warnings stopped.

I wish I knew which state and why my account was being attacked? I'm guessing it was not a specific attack but perhaps the attacker was trying credentials found in some other breach.

Considering that Google cooperates with the USG, I'd guess that it was some state other than the US, but who knows. I'm not aware of having done anything that would be of concern to any government.


How do Yahoo, Google, Facebook, or others distinguish between state-sponsored actors and non-state-sponsored actors?


They match up the activity they observe with tactics/techniques/procedures (TTPs, an awkward term but it's of old military origin) associated with various known state actor groups. These are widely published by various security firms, although the details are often kept in the industry and behind a paywall. You can find a lot of info just by googling the codenames firms assign to the groups, APT28 is one such group on my mind which has recently had some public reporting: https://www.fireeye.com/content/dam/fireeye-www/global/en/cu...

These TTPs may consist of known attack infrastructure, email payloads, even things as simple as an email subject line if the attacker leaves it fairly static. They may also be as complicated as artifacts of dynamic analysis of malware, software engineering techniques and tools, language use, etc.

Attribution to state actors comes via similar techniques, generally tying attacks back to infrastructure known to be owned by state agencies or companies operated by the same. The line between state actors and higher-end criminal groups can be very blurry, both in that attribution may be difficult and in that the groups actually overlap in many areas. But still, you can often make a pretty confident guess.

These attribution techniques are well-established in the security industry, and I'm not surprised to see these big providers starting to automate it where possible.


I want one of these companies to define state-sponsored actors?

It's great if one is a dissenter in Egypt and the authorities there go after their Yahoo! account but what about a US citizen's account being attacked by the FBI or NSA?


There's no attack from the FBI or NSA, there's a court order.


Secret court orders are an attack on democracy.


I don't disagree.


https://en.wikipedia.org/wiki/Cybersecurity_Information_Shar...

This passed along with the budget bill at the end of last week. It establishes a system whereby the US defense department shares with corporations their signals for detecting state-sponsored attacks, and companies are allowed to opt in to sharing anonymized attack information with the DoD


CISA is a terrible bill and not a solution to this problem. Security teams have been able to manage this data on their own for years without government intervention.

There have always been other methods for determining if an attacker is state sponsored. One example: Seeing your account, and a number of dissident or activists being attacked from a block of IPs or similar password attempts, probably means the attack is state sponsored.

That being said, in security, attribution is a very hard problem, and the methods used to determine state sponsored attacks are also quite hard to design.

There's a reason why companies won't elaborate on how they do this, but it is usually a combination of login/account intelligence and threat feeds.


>> Seeing your account, and a number of dissident or activists being attacked from a block of IPs or similar password attempts, probably means the attack is state sponsored.

Used to work at a fairly large global corporation. One day I was chatting up one of the senior sys admins. He was talking about the incredible traffic that bombards their server everyday. I was pretty naive back then and said, "Cmon man, it can't be that much!"

He opened his terminal and ran a simple monitoring tool, then opened one another terminal. In one was the constant traffic to several of their applications that were from a specific block of IP addresses he thought he had traced back to China. The other window was a running queue of mistyped password attempts. It was like clockwork. They'd try three, get kicked out of the system, then in an instant, you'd see a flurry of new IP addresses from the same block, then some more attempts to guess the password. Kicked out, rinse, repeat.

In the span of five minutes, I must have seen two dozen failed attempts to try and do a dictionary password attack on their login page. He guessed it was some kind of a bot that was running the tests considering how mechanical and orderly the attacks were.

It really opened my eyes as to how often and how many businesses these governments go after for intellectual property.


didn't say i agreed with it, just pointed out a likely reason why such a narrowly specific threat notification tool would be launched now.


I have long suspected that the overwhelming majority of any "sharing" that takes place will be one-sided, from corporations to government.

In previous jobs, I've been involved with various ISACs and while there was some sharing of information from the government, it was often "watered down", vague, and mostly unactionable.


Also, what kinds of attacks are they trying to catch here? The bullet points in the article seem like phishing scams. Phone verification doesn't seem like it would do much since a sophisticated adversary has probably also compromised the phone network as well.


By far the most common vector of state sponsored attacks is simple malicious email. Why waste your time and money when something simple works so well?


I would assume sophistication, intensity, and the fact that as long as it's not the NSA doing it they'll get tipped off that China, Russia, Insert-Evil-Country-Here is running a campaign against them.


non state sponsored are criminals who do it to get money. blackmail / hostage.

State sponsored don't do it for the money.


This looks to be very similar to the warning that Twitter was sending around a while ago. Here:

https://news.ycombinator.com/item?id=10722633

That contains the text in the discussion, and links to the text, etc.


Just what middle-America needs, notification that the russkies are coming for their baby pictures.


It's more likely to be the NSA nowadays.

It would be good if these notifications said where the attacks appeared to originate.


For US people in most industries, by volume, the Russians or Chinese are the most likely to compromise them. I suspect the NSA has a higher success rate, but with their pervasive surveillance and ability to legally compelling action, they're not the ones trying to bust into your email account all the time.


Why would the NSA need to attack? They can just ask Yahoo for the data.


Yep, or just intercept it themselves as it crosses the wire.


Perhaps because, instead of targeting the inbox of the victim, they may need to attack the victim him/herself?


If that's what's happening, then yes, notification is exactly what middle-America needs. Adults don't need to be protected from the truth.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: