{"id":4677,"date":"2014-02-11T11:00:48","date_gmt":"2014-02-11T19:00:48","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=4677"},"modified":"2015-12-11T10:02:49","modified_gmt":"2015-12-11T18:02:49","slug":"cybersecurity-canon-kingpin","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2014\/02\/cybersecurity-canon-kingpin\/","title":{"rendered":"The Cybersecurity Canon: Kingpin"},"content":{"rendered":"<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:43.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-9648 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-500x218.png\" alt=\"cybersec canon red\" width=\"500\" height=\"218\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-500x218.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-230x100.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-510x223.png 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-91x40.png 91w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red.png 786w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p><i>For the past decade, I have had this notion that there must be a <\/i><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/cybersecurity-canon\/\" target=\"_blank\"><i>Cybersecurity Canon:<\/i><\/a><i> a list of must-read books where the content is timeless, genuinely represents an aspect of the community that is true and precise and that, if not read, leaves a hole in cybersecurity professional\u2019s education. I\u2019ll be presenting on this topic at RSA 2014, and between now and then, <\/i><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2013\/12\/introducing-cybersecurity-canon-books-read\/\" target=\"_blank\"><i>I\u2019d like to discuss a few of my early candidates for inclusion<\/i><\/a><i>. I love a good argument, so feel free to let me know what you think.<\/i><\/p>\n<p><b>Kingpin: How a Hacker Took Over the Billion-Dollar Cybercrime Underground (2011) <\/b>by Kevin Poulsen<\/p>\n<p>Kingpin tells the story of the rise and fall of a hacker legend: Max Butler. Butler is most famous for his epic, hostile hacking takeover in August 2006 of four of the criminal underground\u2019s prominent credit card forums. He is also tangentially associated with the TJX data breach of 2007.<!--more--><\/p>\n<p>Butler\u2019s downfall resulted from the famous FBI sting called Operation Firewall where agent Keith Mularski was able to infiltrate one of the four forums Butler had hacked: DarkMarket. But Butler\u2019s transition from pure white-hat hacker into something gray\u2014sometimes a white hat, sometimes a black hat\u2014is a treatise on the cyber criminal world. The author of Kingpin, Kevin Poulsen, imbues the story with amazing descriptions of how Butler hacked his way around the Internet and pulls the curtain back on how the cyber criminal world functions.<\/p>\n<p>In much the same way that Clifford Stoll\u2019s <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2013\/12\/cybersecurity-canon-cuckoos-egg\/\" target=\"_blank\">The Cuckoo's Egg<\/a> reads like a spy novel, Kingpin reads like a crime novel. Cybersecurity professionals might know the highlights of this cyber criminal underworld, but Poulsen is able to provide a lot of detail about how this world functions that is understood by mostly only the cyber criminals themselves and the law enforcement officials who stalk them.<\/p>\n<p><b>The Story<\/b><\/p>\n<p>Back when I first learned of the Max Butler story, I remember being fascinated at the time that this guy was linked to another strange and amazing story about the hackers behind the TJX breaches in 2007. I even <a href=\"http:\/\/www.youtube.com\/watch?v=61u1Odmqb9A\" rel=\"nofollow,noopener\"  target=\"_blank\">presented the story at RSA in 2010<\/a>. Poulsen, from Wired magazine, did some of the <a href=\"http:\/\/www.wired.com\/techbiz\/people\/magazine\/17-01\/ff_max_butler?currentPage=all\" rel=\"nofollow,noopener\"  target=\"_blank\">original reporting on the story in 2008<\/a> and then took the time to publish this book about it in 2011.<\/p>\n<p>Butler\u2014a.k.a. Iceman among other aliases\u2014happened to be one of its most notorious carders. For the uninitiated, a carder is a hacker who engages in the illicit collection (theft) and <a href=\"http:\/\/news.cnet.com\/8301-10789_3-10053523-57.html\" rel=\"nofollow,noopener\"  target=\"_blank\">underground-market selling of stolen credit card information<\/a>. Butler\u2019s infamy did not just come from his brilliant hacker prowess, however. The hacking community considers him to be a hacker god because of his unbelievable moxie. Poulsen fills the book with unbelievable stories of hacker derring-do, but in my humble opinion, Butler\u2019s most astonishing act came when he decided that he did not like the status quo of the current carding scene.<\/p>\n<p><b>After Shadowcrew<\/b><\/p>\n<p>Two years after the <a href=\"http:\/\/www.secretservice.gov\/press\/pub2304.pdf\" rel=\"nofollow,noopener\"  target=\"_blank\">feds shut down the Shadowcrew underground carding forum<\/a> in October 2004, the carding community was fractured. Multiple carding groups emerged to fill the space left by Shadowcrew, but there was mistrust in the air, and none of the hackers were sharing information. Butler had a naive view of the hacking world and believed that there should be a place for underground researchers to freely share and discuss this kind of credit card information without the worry of getting arrested. He thought there needed to be a place where people like him could meet and discuss tradecraft and business within a trusted environment. So, he decided to fix the situation.<\/p>\n<p>In a 48-hour marathon hacking session, Butler compromised the four leading carding forums of the day, which were run by criminal hackers; stole the user databases that resided there, which included user IDs and passwords; stole the forum transcripts that also resided there, which included everybody\u2019s chat sessions; reinstalled everything on his own forum called CardersMarket; destroyed the data that resided on those rival forums; and then sent an e-mail to every user on the four compromised servers saying that he was now the forum Kingpin. How awesome is that? What ego does it take to even think that you could get away with such an operation? But he did. The customers of the now-defunct servers\u2014the cyber criminals\u2014grumbled a bit. But because they could continue to operate, most stayed on Butler\u2019s new CardersMarket forum.<\/p>\n<p>One of the four forums that Butler compromised was called DarkMarket. This is the same forum that FBI agent <a href=\"http:\/\/www.npr.org\/blogs\/money\/2011\/06\/17\/137251254\/the-fbi-agent-who-ran-a-stolen-credit-card-ring\" rel=\"nofollow,noopener\"  target=\"_blank\">Keith Mularski was able to penetrate<\/a> as an undercover agent just months prior to Butler\u2019s takeover. Mularski convinced the owner of DarkMarket to let him be the forum administrator. Because of that, DarkMarket was the only forum to survive Butler\u2019s attacks. Mularski was scrupulous about making backups, and because of that, he had DarkMarket back online only days after Butler\u2019s blitzkrieg. He remained undercover as a forum administrator and monitored every conversation on the forum for the FBI for two years. Because of that effort, Mularski helped put the puzzle pieces together that ultimately resulted in Butler\u2019s arrest.<\/p>\n<p>Before Kingpin, I always assumed that Butler suspected Mularski as being a fed from the start. According to Poulsen, Butler had traced Mularski\u2019s IP address back to the National Cyber-Forensics &amp; Training Alliance (NCFTA) and knew he was a plant. Butler told anybody on the forums who would listen to him to stay away from Mularski, but nobody believed him.<\/p>\n<p>Poulsen describes how the \u201cnew\u201d CardersMarket forum was a cesspool of mistrust and politics, and Butler accused a lot of hackers of working for the feds as they accused him of doing likewise. Nobody got any traction. Butler\u2019s takeover did not instigate a new era of trust and cooperation among the carders; it had almost the opposite effect.<\/p>\n<p><b>The Tech<\/b><\/p>\n<p>Butler\u2019s gateway drug to hacking was probably the online phenomenon called TinyMUDs, the successors to multi-user dungeons (MUDs). MUDs were typically Dungeons &amp; Dragons (D&amp;D)-themed multi-user text-based games, the precursor to the three-dimensional and graphical massively multiplayer online role-playing games (MMORPGs) like World of Warcraft today. TinyMUDs discarded the D&amp;D game elements and allowed users to meet each other and build onto their environments as they saw fit, kind of like the precursor to the three-dimensional MMORPG called Second Life. I recently highlighted this MUD culture in a blog about another <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/01\/cybersecurity-canon-blue-nowhere\/\" target=\"_blank\">Cybersecurity Canon-worthy novel called The Blue Nowhere<\/a>. Just like both hacker characters in The Blue Nowhere, Butler was an avid TinyMUD player, and also just like the hacker characters, he stored the tools of his trade in unsuspecting compromised sites, tools likes NetXray, Laplink, and Symantec\u2019s pcAnywhere.<\/p>\n<p>Throughout Poulsen\u2019s book, it is clear that Butler never really understood where the <a href=\"http:\/\/www.howtogeek.com\/157460\/hacker-hat-colors-explained-black-hats-white-hats-and-gray-hats\/\" rel=\"nofollow,noopener\"  target=\"_blank\">line existed between white-hat and black-hat activity<\/a>. One of Butler\u2019s early epic hacks came about when the security community discovered a <a href=\"http:\/\/www.cert.org\/advisories\/CA-98.05.bind_problems.html\" rel=\"nofollow,noopener\"  target=\"_blank\">gigantic security vulnerability in the BIND implementation<\/a> of the domain name system (DNS).<\/p>\n<p>Thinking that it was his duty as a white-hat security researcher to fix the problem, Butler crafted a buffer overflow attack that leveraged the vulnerability, scanned the Internet for DNS systems that were vulnerable, compromised those machines with the buffer overflow attack, downloaded a rootkit to each of the machines that he now owned, and installed the patch that fixed the vulnerability. He thought he was doing a worthy community service to the world. The owners of all of those DNS boxes had a different opinion.<\/p>\n<p>As a white-hat researcher, he helped develop <a href=\"http:\/\/wiki.pauldotcom.com\/wiki\/index.php\/Episode336#History\" rel=\"nofollow,noopener\"  target=\"_blank\">BRO, one of the first experiments in intrusion detection systems<\/a>. While assisting the <a href=\"http:\/\/www.honeynet.org\/about\" rel=\"nofollow,noopener\"  target=\"_blank\">Honeynet Project<\/a>, he developed a program called Privmsg that allowed him to reconstruct hacker chat messages by listening to network traffic. The guts of Privmsg became a part of BRO.<\/p>\n<p>Wearing his black hat, Butler became an expert at wardriving to find <a href=\"http:\/\/www.thesecurityadvocate.com\/2013\/03\/25\/what-is-wardriving-and-how-can-it-affect-your-companys-computer-network\/\" rel=\"nofollow,noopener\"  target=\"_blank\">unprotected WiFi sites that he could use to hide his hacking activity<\/a>. He used the Bifrost Trojan to gain entry into unsuspecting victim computers but modified it to bypass anti-virus engines. He tested his modifications on multiple VMware instances running different versions of anti-virus engines. Then he delivered his creation to other black-hat hackers in order to see what they were doing and to steal their credit card dumps for his own profit. He took advantage of a serious vulnerability in a software program called RealVNC. VNC stands for virtual network console, and the RealVNC software ran on point-of-sale devices on many small businesses\u2019 computers. Like he did with the DNS vulnerability, Butler scanned the Internet looking for vulnerable instances in order to compromise the machines and steal the credit card information that the business owners collected daily. To say the least, he was a little conflicted.<\/p>\n<p>Butler\u2019s business partner, Chris Aragon, was responsible for the money-laundering piece of their illicit carding enterprise. After reading Poulsen\u2019s description of the mechanics, you cannot help but think that being a cyber criminal is really hard work. Most non-geeks never really think about the difficulty of converting stolen credit card numbers into real cash. There is a convoluted process involving specialized equipment and many small transactions involving multiple people. You essentially have to make credit cards, and the accompanying driver\u2019s licenses, by imprinting the credit card numbers and user information onto blank card material. You hand those cards to your mules\u2014in Aragon\u2019s case, four or five young and attractive women\u2014who would spend the day shopping for high-end luxury items. The mules return the merchandise back to Aragon, who in turn sells it on eBay at reduced prices. Poulsen goes into great detail about how Aragon, and later Butler on his own, went about this daily business.<\/p>\n<p>Poulsen also describes how the advent of distributed denial of service (DDoS) attacks originated in the hacking community as a way for black-hat hackers to mess with each other. But when Michael Calce\u2014a.k.a. MafiaBoy\u2014launched an experimental DDoS attack against some prominent public websites\u2014CNN, Yahoo!, Amazon, eBay, Dell, and E-Trade\u2014the cat was out of the bag, and the <a href=\"http:\/\/www.cnn.com\/2011\/TECH\/web\/08\/15\/mafiaboy.hacker\/\" rel=\"nofollow,noopener\"  target=\"_blank\">result was an emergency meeting of security experts at the White House<\/a>.<\/p>\n<p>Butler used hard drive encryption to protect his data and, by inference, his hacking activity. The thought was that this best practice in the hacker community would protect hackers in case law enforcement seized their equipment. Law enforcement officials could grab the hard drives, but because the drives were encrypted, officials would not be able to read any of the information. When the feds finally showed up on Butler\u2019s doorstep, accompanied by some forensics experts from Carnegie Mellon, Butler thought he was secure. Unfortunately, they showed up almost unannounced, and Butler did not have the time to power his systems down. What he did not realize is that while the systems are running, the key for the encryption is stored in RAM. It took them a while, but the forensics experts were able find the encryption key in RAM and unlock Butler\u2019s hard drives.<\/p>\n<p><b>Conclusion<\/b><\/p>\n<p>Poulsen nails this story. He recounts the transition of Max Butler from pure white-hat hacker into something gray: sometimes a white hat, sometimes a black hat. The technical hacking detail is fascinating, but more importantly, Poulsen is able to pull the curtain back on the cyber criminal world and describe how it functions with a lot of detail. You should have read this by now.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For the past decade, I have had this notion that there must be a Cybersecurity Canon: a list of must-read books where the content is timeless, genuinely represents an aspect of the &hellip;<\/p>\n","protected":false},"author":43,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155],"tags":[251,322,321],"coauthors":[791],"class_list":["post-4677","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","tag-cybersecurity-canon","tag-kevin-poulsen","tag-kingpin"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4677","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=4677"}],"version-history":[{"count":2,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4677\/revisions"}],"predecessor-version":[{"id":11425,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4677\/revisions\/11425"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=4677"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=4677"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=4677"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=4677"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}