E-BOMBS - The next phase of Cyber War
press release
London, UK, 20th May 1999 - Have trouble with junk mail every morning?
Now junk e-mail could cripple your computer network and land you in court.
Post the IBM Tivoli (www.tivoli.com) announcement, mi2g (www.mi2g.com)
world leader in secure knowledge management software, is going public with
its internal memorandum of 22nd April 1999 in the interest of security for
all businesses using e-mail. The memorandum warns of four main types of e-bombs
that together as a cocktail can precipitate unstoppable overwhelming linked
reactions and could be delivered as junk e-mail. These linked reactions could
not only affect businesses but also services and public utilities. The appropriate
authorities have already been informed of this risk.
E-mail bombs can significantly disrupt or collapse the normal functioning
of IT Networks especially in the less well-prepared civilian sector, where
there is a greater vulnerability. E-mail bombs can be launched in many different
attack scenarios, which easily flood and shut down chains of SMTP mail servers
with devastating consequences on the organisation's network. The heart of
an e-mail bomb lies in the simplicity of the "normal" e-mail (SMTP)
protocol which can be combined with the robustness of the "Sendmail"
Mail Transfer Agent (MTA) program and misused in numerous ways. E-mail bombs
are primarily of four types: Chain Bombs, Error Message Bombs, Covert Distribution
Channel (CDC) Bombs and Mail Exploder Bombs.
A few IT businesses, such as Tivoli, are already concerned that they could
receive such e-mail bombs and in order to protect their servers have designed
their systems to reject a suspect percentage of all incoming e-mails. Tivoli's
decision is significant because it anticipates the problem of "open relay"
spamming and how this can degrade server-processing capacity as well as give
the impression that the victim sent the junk mail (www.tivoli.com/spam.html).
The problem with the Tivoli approach is that it rejects some genuine business
enquiries as well. This combined scenario has been outlined in the mi2g
internal memorandum of April under the description of "CDC Bombs"
and "Chain Bombs".
"The IBM Tivoli e-mail restriction strategy
is being perceived to be too drastic by the Internet Mail Consortium (IMC).
But from a business survival point of view, this approach is increasingly
realistic as there is a growing and repetitive occurrence of Cyber Warfare
incidents since the start of the year. The total number of unbudgeted human
hours spent dealing with such incidents is escalating monthly since January
1999", said D K Matai, Managing Director of mi2g.
Notes for the Editor
1. An exact replica of the mi2g internal memorandum of 22nd
April titled "The Threat from Electronic Weaponry
- Unstoppable Overwhelming Linked Reactions" is attached.
______________________________________________________________________
mi2g internal memorandum of 22nd April 1999
"The Threat from Electronic Weaponry"
Unstoppable Overwhelming Linked Reactions
E-mail bombs can significantly disrupt or collapse the normal functioning
of IT Networks especially in the less well prepared civilian sector, where
there is a greater vulnerability. E-mail bombs can be launched in many different
attack scenarios, which easily flood and shut down chains of SMTP mail servers
with devastating consequences on the organisation's network. The heart of
an e-mail bomb lies in the simplicity of the "normal" e-mail (SMTP)
protocol which can be combined with the robustness of the "Sendmail"
Mail Tranfer Agent (MTA) program and misused in numerous ways. E-mail bombs
are primarily of four types:
1. Chain Bombs exploit the route address functionality of MTAs to create
a very powerful e-mail bomb, which executes an automated script with a chain
of source routed e-mail messages. The e-mail bombs are delivered and queued
on the first MTA in the chain. If the attack volume of the e-mail bomb is
sufficient to deny service to the first MTA, the remaining messages in the
outbound queue of the bombing host, are automatically routed to the second
MTA. This process continues for all the MTAs. This floods MTAs in the chain,
one after the other. Sorting out malicious e-mail from business e-mail becomes
very difficult and very resource intensive. If the system administrator simply
reboots the mail server without clearing the malicious messages from the MTA
queue, the Sendmail process re-initiates and attempts to deliver the Chain
Bomb to the next MTA in the route address chain.
2. Error Message Bombs exploit the feedback paths of mail systems
by using legitimate error messages generated by MTAs. In this attack, the
bomber inserts the e-mail address of the victim's e-mail server as the origin
of the message and send the e-mail bomb to another MTA, configured to generate
feedback messages to the originator, when any error condition conditions are
generated. This causes large volumes of error messages to be generated, which
are forwarded to the victim's MTA. Two alternative scenarios are exhibited
- Either the victim's MTA is taken out of service or the end-user's mailbox
is completely flooded.
3. Covert Distribution Channel (CDC) Bombs anonymously distribute
covert files and illicit mail via a neutral intermediate MTA. The recipient
of the illicit mail can be easily fooled to believe that the e-mail originated
from an innocent victim's host machine. This poses a very real and dangerous
method for terrorists to victimise the internet community. For example, an
MTA of a victim could be used as a relay by propaganda distributors. The recipient
of the e-mail would more-than-likely (falsely) believe that the victim was
the originator of the illicit mail.
4. Mail Exploder Bombs are sent to automated mailing lists to redistribute
to all subscribers of the list. Automated list servers provide many opportunities
for the e-mail bomber to exploit the SMTP infrastructure. This attack scenario
can be combined with other bombing techniques to create a very complex cocktail
of electronic bombing that becomes an unstoppable overwhelming linked reaction
with systemic risks.
Conclusion
Civilian target sectors for E-mail bomb cocktails that precipitate unstoppable
overwhelming linked reactions could include power generation and distribution;
financial markets; large businesses; communication facilities; health services;
public utilities and emergency services.