Cyber espionage, cyber spying, or cyber-collection is the act or practice of obtaining secrets and information without the permission and
knowledge
Knowledge is an Declarative knowledge, awareness of facts, a Knowledge by acquaintance, familiarity with individuals and situations, or a Procedural knowledge, practical skill. Knowledge of facts, also called propositional knowledge, is oft ...
of the holder of the information using methods on the Internet, networks or individual computers through the use of
proxy servers,
cracking techniques and
malicious software
Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
including
Trojan horses and
spyware
Spyware (a portmanteau for spying software) is any malware that aims to gather information about a person or organization and send it to another entity in a way that harms the user by violating their privacy, endangering their device's securit ...
.
Cyber espionage can be used to target various actors – individuals, competitors, rivals, groups, governments, and others – in order to obtain personal, economic, political or military advantages. It may wholly be perpetrated online from computer desks of professionals on bases in far away countries or may involve infiltration at home by computer trained conventional
spies and
moles or in other cases may be the
criminal
In ordinary language, a crime is an unlawful act punishable by a State (polity), state or other authority. The term ''crime'' does not, in modern criminal law, have any simple and universally accepted definition,Farmer, Lindsay: "Crime, definiti ...
handiwork of
amateur
An amateur () is generally considered a person who pursues an avocation independent from their source of income. Amateurs and their pursuits are also described as popular, informal, autodidacticism, self-taught, user-generated, do it yourself, DI ...
malicious hackers and
software programmers.
History
Cyber spying started as far back as 1996, when widespread deployment of
Internet connectivity to government and corporate systems gained momentum. Since that time, there have been numerous cases of such activities.
[Pete Warren, ]
State-sponsored cyber espionage projects now prevalent, say experts
', The Guardian, August 30, 2012[Nicole Perlroth, ]
Elusive FinSpy Spyware Pops Up in 10 Countries
', New York Times, August 13, 2012[Kevin G. Coleman, ]
Has Stuxnet, Duqu and Flame Ignited a Cyber Arms Race?
'', AOL Government, July 2, 2012
Details
Cyber spying typically involves the use of such access to secrets and classified information or control of individual computers or whole networks for a
strategic advantage and for
psychological
Psychology is the scientific study of mind and behavior. Its subject matter includes the behavior of humans and nonhumans, both consciousness, conscious and Unconscious mind, unconscious phenomena, and mental processes such as thoughts, feel ...
,
political
Politics () is the set of activities that are associated with decision-making, making decisions in social group, groups, or other forms of power (social and political), power relations among individuals, such as the distribution of Social sta ...
and physical subversion activities and
sabotage
Sabotage is a deliberate action aimed at weakening a polity, government, effort, or organization through subversion, obstruction, demoralization (warfare), demoralization, destabilization, divide and rule, division, social disruption, disrupti ...
.
More recently, cyber spying involves analysis of public activity on
social networking sites
A social networking service (SNS), or social networking site, is a type of online social media platform which people use to build social networks or social relationships with other people who share similar personal or career content, interests ...
like
Facebook
Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
and
Twitter
Twitter, officially known as X since 2023, is an American microblogging and social networking service. It is one of the world's largest social media platforms and one of the most-visited websites. Users can share short text messages, image ...
.
Such operations, like non-cyber espionage, are typically illegal in the victim country while fully supported by the highest level of government in the aggressor country. The ethical situation likewise depends on one's viewpoint, particularly one's opinion of the governments involved.
[
]
Platforms and functionality
Cyber-collection tools have been developed by governments and private interests for nearly every computer and smart-phone operating system. Tools are known to exist for Microsoft, Apple, and Linux computers and iPhone, Android, Blackberry, and Windows phones.[Vernon Silver, ]
Spyware Matching FinFisher Can Take Over IPhones
',, Bloomberg, August 29, 2012 Major manufacturers of Commercial off-the-shelf
Commercial-off-the-shelf or commercially available off-the-shelf (COTS) products are packaged or canned (ready-made) hardware or software, which are adapted aftermarket to the needs of the purchasing organization, rather than the commissioning of ...
(COTS) cyber collection technology include Gamma Group from the UK and Hacking Team from Italy. Bespoke cyber-collection tool companies, many offering COTS packages of zero-day exploits, include Endgame, Inc. and Netragard of the United States and Vupen from France.[Mathew J. Schwartz, ]
Weaponized Bugs: Time For Digital Arms Control
', Information Week, 9 October 2012 State intelligence agencies often have their own teams to develop cyber-collection tools, such as Stuxnet
Stuxnet is a Malware, malicious computer worm first uncovered on June 17, 2010, and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsibl ...
, but require a constant source of ''zero-day exploits'' in order to insert their tools into newly targeted systems. Specific technical details of these attack methods often sell for six-figure sums.[Ryan Gallagher, ]
Cyberwar’s Gray Market
', Slate, 16 Jan 2013
Common functionality of cyber-collection systems include:
*''Data scan'': local and network storage are scanned to find and copy files of interest, these are often documents, spreadsheets, design files such as Autocad
AutoCAD is a 2D and
3D computer-aided design (CAD) software application developed by Autodesk. It was first released in December 1982 for the CP/M and IBM PC platforms as a desktop app running on microcomputers with internal graphics control ...
files and system files such as the passwd file.
*''Capture location'': GPS, WiFi
Wi-Fi () is a family of wireless network protocols based on the IEEE 802.11 family of standards, which are commonly used for Wireless LAN, local area networking of devices and Internet access, allowing nearby digital devices to exchange data by ...
, network information and other attached sensors are used to determine the location and movement of the infiltrated device
*'' Bug'': the device microphone can be activated in order to record audio. Likewise, audio streams intended for the local speakers can be intercepted at the device level and recorded.
* ''Hidden private networks'': they can bypass the corporate network security. A computer that is being spied upon can be plugged into a legitimate corporate network that is heavily monitored for malware activity and at the same time belongs to a private wifi network outside of the company network that is leaking confidential information off of an employee's computer. A computer like this is easily set up by a double-agent working in the IT department by installing a second Wireless card in a computer and special software to remotely monitor an employee's computer through this second interface card without them being aware of a side-band communication channel pulling information off of his computer.
*''Camera'': the device cameras can be activated in order to covertly capture images or video.
*'' Keylogger and Mouse Logger'': the malware agent can capture each keystroke, mouse movement and click that the target user makes. Combined with screen grabs, this can be used to obtain passwords that are entered using a virtual on-screen keyboard.
*''Screen Grabber'': the malware agent can take periodic screen capture images. In addition to showing sensitive information that may not be stored on the machine, such as e-banking balances and encrypted web mail, these can be used in combination with the key and mouse logger data to determine access credentials for other Internet resources.
*''Encryption'': Collected data is usually encrypted at the time of capture and may be transmitted live or stored for later exfiltration. Likewise, it is common practice for each specific operation to use specific encryption and poly-morphic capabilities of the cyber-collection agent in order to ensure that detection in one location will not compromise others.
*''Bypass Encryption'': Because the malware agent operates on the target system with all the access and rights of the user account of the target or system administrator, encryption is bypassed. For example, interception of audio using the microphone and audio output devices enables the malware to capture to both sides of an encrypted Skype call.[Daniele Milan]
The Data Encryption Problem
, Hacking Team
*''Exfiltration'': Cyber-collection agents usually exfiltrate the captured data in a discrete manner, often waiting for high web traffic and disguising the transmission as secure web browsing. USB flash drive
A flash drive (also thumb drive, memory stick, and pen drive/pendrive) is a data storage device that includes flash memory with an integrated USB interface. A typical USB drive is removable, rewritable, and smaller than an optical disc, and u ...
s have been used to exfiltrate information from air gap protected systems. Exfiltration systems often involve the use of reverse proxy systems that anonymize the receiver of the data.[Robert Lemos, ]
Flame stashes secrets in USB drives
'', InfoWorld, June 13, 2012
*''Replicate'': Agents may replicate themselves onto other media or systems, for example an agent may infect files on a writable network share or install themselves onto USB drives in order to infect computers protected by an air gap or otherwise not on the same network.
*''Manipulate Files and File Maintenance'': Malware can be used to erase traces of itself from log files. It can also download and install modules or updates as well as data files. This function may also be used to place "evidence" on the target system, e.g. to insert child pornography onto the computer of a politician or to manipulate votes on an electronic vote counting machine.
*''Combination Rules'': Some agents are very complex and are able to combine the above features in order to provide very targeted intelligence collection capabilities. For example, the use of GPS bounding boxes and microphone activity can be used to turn a smart phone into a smart bug that intercepts conversations only within the office of a target.
*''Compromised cellphones''. Since, modern cellphones are increasingly similar to general purpose computers, these cellphones are vulnerable to the same cyber-collect attacks as computer systems, and can leak extremely sensitive conversational and location information to an attacker. Leaking of cellphone GPS location and conversational information to an attacker has been reported in a number of recent cyber stalking cases where the attacker was able to use the victim's GPS location to call nearby businesses and police authorities to make false allegations against the victim depending on his location, this can range from telling the restaurant staff information to tease the victim, or making false witness against the victim. For instance if the victim were parked in a large parking lot the attackers may call and state that they saw drug or violence activity going on with a description of the victim and directions to their GPS location.
Infiltration
There are several common ways to infect or access the target:
*An '' Injection Proxy'' is a system that is placed upstream from the target individual or company, usually at the Internet service provider, that injects malware into the targets system. For example, an innocent download made by the user can be injected with the malware executable on the fly so that the target system then is accessible to the government agents.[Pascal Gloor, ]
(Un)lawful Interception
'', SwiNOG #25, 07 November 2012
*''Spear Phishing
Phishing is a form of Social engineering (security), social engineering and a scam where attackers deceive people into revealing Information sensitivity, sensitive information or installing malware such as Computer virus, viruses, Computer worm, ...
'': A carefully crafted e-mail is sent to the target in order to entice them to install the malware via a Trojan document or a drive by attack hosted on a web server compromised or controlled by the malware owner.[Mathew J. Schwartz, ]
Operation Red October Attackers Wielded Spear Phishing
', Information Week, January 16, 2013
*'' Surreptitious Entry'' may be used to infect a system. In other words, the spies carefully break into the target's residence or office and install the malware on the target's system.[FBI Records: The Vault, ]
Surreptitious Entries
', Federal Bureau of Investigation
*An ''Upstream monitor'' or '' sniffer'' is a device that can intercept and view the data transmitted by a target system. Usually this device is placed at the Internet service provider. The Carnivore
A carnivore , or meat-eater (Latin, ''caro'', genitive ''carnis'', meaning meat or "flesh" and ''vorare'' meaning "to devour"), is an animal or plant
Plants are the eukaryotes that form the Kingdom (biology), kingdom Plantae; they ar ...
system developed by the U.S. FBI
The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
is a famous example of this type of system. Based on the same logic as a telephone intercept, this type of system is of limited use today due to the widespread use of encryption during data transmission.
*A ''wireless infiltration'' system can be used in proximity of the target when the target is using wireless technology. This is usually a laptop based system that impersonates a WiFi or 3G base station to capture the target systems and relay requests upstream to the Internet. Once the target systems are on the network, the system then functions as an ''Injection Proxy'' or as an ''Upstream Monitor'' in order to infiltrate or monitor the target system.
*A '' USB Key'' preloaded with the malware infector may be given to or dropped at the target site.
Cyber-collection agents are usually installed by payload delivery software constructed using zero-day attacks and delivered via infected USB drives, e-mail attachments or malicious web sites.[Anne Belle de Bruijn, ]
Cybercriminelen doen poging tot spionage bij DSM
', Elsevier, July 9, 2012 State sponsored cyber-collections efforts have used official operating system certificates in place of relying on security vulnerabilities. In the Flame operation, Microsoft
Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
states that the Microsoft certificate used to impersonate a Windows Update
Windows Update is a Microsoft service for the Windows 9x and Windows NT families of the Microsoft Windows operating system, which automates downloading and installing Microsoft Windows software updates over the Internet. The service delivers sof ...
was forged;[Mike Lennon, ]
Microsoft Certificate Was Used to Sign "Flame" Malware
'', June 4, 2012 however, some experts believe that it may have been acquired through HUMINT
Human intelligence (HUMINT, pronounced ) is intelligence-gathering by means of human sources and interpersonal communication. It is distinct from more technical intelligence-gathering disciplines, such as signals intelligence (SIGINT), imager ...
efforts.[Paul Wagenseil, ]
Flame Malware Uses Stolen Microsoft Digital Signature
', NBC News, June 4, 2012
Examples of operations
* Stuxnet
Stuxnet is a Malware, malicious computer worm first uncovered on June 17, 2010, and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsibl ...
* Flame
A flame () is the visible, gaseous part of a fire. It is caused by a highly exothermic chemical reaction made in a thin zone. When flames are hot enough to have ionized gaseous components of sufficient density, they are then considered plasm ...
* Duqu
Duqu is a collection of computer malware discovered on 1 September 2011, thought by Kaspersky Labs to be related to the Stuxnet worm and to have been created by Unit 8200. The Laboratory of Cryptography and System Security ( CrySyS Lab) of the ...
* Bundestrojaner
* Rocra
"Red October" Diplomatic Cyber Attacks Investigation
', Securelist, January 14, 2013
Kaspersky Lab Identifies Operation Red October
'', Kaspersky Lab Press Release, January 14, 2013
* Operation High Roller[Dave Marcus & Ryan Cherstobitoff, ]
Dissecting Operation High Roller
'', McAfee Labs
* Cozy Bear: a well-resourced, highly dedicated and organized cyber espionage group that F-Secure believes has been working for the Russian Federation
Russia, or the Russian Federation, is a country spanning Eastern Europe and North Asia. It is the list of countries and dependencies by area, largest country in the world, and extends across Time in Russia, eleven time zones, sharing Borders ...
since at least 2008.
See also
* Chaos Computer Club
The Chaos Computer Club (CCC) is Europe's largest association of Hacker (computer security), hackers with 7,700 registered members. Founded in 1981, the association is incorporated as an ''eingetragener Verein'' in Germany, with local chapters ...
* Chinese intelligence operations in the United States
* Computer security
Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
* Computer surveillance
A computer is a machine that can be Computer programming, programmed to automatically Execution (computing), carry out sequences of arithmetic or logical operations (''computation''). Modern digital electronic computers can perform generic set ...
* Cyber-security regulation
A cybersecurity regulation comprises directives that safeguard information technology and computer systems with the purpose of forcing companies and organizations to protect their systems and information from cyberattacks like viruses, worms, Tr ...
* Cyber spying on universities
Cyber spying on universities is the practice of obtaining secrets and information without the permission and knowledge of the university through its information technology system. Universities in the United Kingdom, including Oxford and Cambridge ...
* Cyber threat intelligence
* Cyberwarfare
Cyberwarfare is the use of cyberattack, cyber attacks against an enemy State (polity), state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, ...
* Employee monitoring software
Employee monitoring software, also known as bossware or tattleware, is a means of employee monitoring, and allows company administrators to monitor and supervise all their employee computers from a central location. It is normally Software deploym ...
* GhostNet
* Industrial espionage
Industrial espionage, also known as economic espionage, corporate spying, or corporate espionage, is a form of espionage conducted for commercial purposes instead of purely national security.
While political espionage is conducted or orchestrat ...
* Proactive Cyber Defence
Proactive cyber defense means acting in anticipation to oppose an attack through cyber and cognitive domains. Proactive cyber defense can be understood as options between offensive and defensive measures. It includes interdicting, disrupting or d ...
* Stalkerware
* Surveillance
Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as ...
* Titan Rain
* Vulkan files leak
References
Sources
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
External links
Congress to Investigate Google Charges Of Chinese Internet Spying (AHN)
Archive of Information Warfare Monitor - Tracking Cyberpower (University of Toronto, Canada/Munk Centre)
{{Authority control
Cybercrime
Cyberwarfare
Spyware
Types of espionage
Military intelligence collection
Computer security procedures
Hacking (computer security)
Information sensitivity
Mass intelligence-gathering systems
National security
Sabotage
Security engineering
Social engineering (security)
Computing terminology