Incident: Cyberattack in India using AI-driven malware testing ground.

Published Date: 2017-07-02

Postmortem Analysis
Timeline 1. The software failure incident mentioned in the article happened in February 2016 [61296].
System unknown
Responsible Organization 1. Hackers linked to North Korea were responsible for causing the software failure incident mentioned in the article [61296].
Impacted Organization 1. The central bank of Bangladesh [61296] 2. Banks in Vietnam and Ecuador [61296]
Software Causes 1. The failure incident was caused by malicious software using artificial intelligence, which could learn as it spread and alter its methods to stay in the system for as long as possible [61296]. 2. The malware discovered by Darktrace researchers utilized A.I. techniques to learn the behaviors of employees on the network in order to remain undetected for as long as possible [61296].
Non-software Causes 1. Lack of advanced cybersecurity defenses in developing economies like India, making them vulnerable to cyberattacks [61296]. 2. Limited security infrastructure in countries like Taiwan and South Korea, allowing advanced hacking groups to test and improve their techniques before launching attacks [61296]. 3. Increase in spear-phishing attacks in English- and French-speaking African countries due to hackers testing their skills in these regions [61296]. 4. Tempting targets for hackers in countries across Southeast Asia and the Middle East due to lower defenses compared to more developed regions [61296].
Impacts 1. The software failure incident in India involved malware that could learn as it spread and altered its methods to stay in the system for as long as possible, showcasing early indicators of A.I. in cyberattacks [61296]. 2. The attack on the central bank of Bangladesh, believed to have been carried out by hackers linked to North Korea, resulted in the theft of $81 million, highlighting the financial impact of the cyberattack [61296]. 3. The malware discovered by Darktrace researchers, although not a full-fledged A.I.-driven software, used A.I. techniques to learn the behaviors of employees on the network in order to remain undetected for as long as possible, indicating the sophistication and evolving nature of cyber threats [61296]. 4. The method used against banks in 31 countries, similar to the attack on the Bangladesh Bank, exploited a previously unexplored weakness in the bank's computers by undermining its accounts on the Swift international money transfer system, potentially leading to financial losses and reputational damage for the affected banks [61296].
Preventions 1. Implementing multi-layered security defenses: Companies should employ multiple security products from different vendors to create a layered defense system against cyberattacks [61296]. 2. Enhancing cybersecurity infrastructure: Developing countries and regions coming online should invest in robust cybersecurity infrastructure to detect and prevent advanced cyber threats [61296]. 3. Increasing awareness and training: Conducting regular cybersecurity awareness programs and training for employees to recognize and respond to phishing attacks can help prevent successful cyber intrusions [61296].
Fixes 1. Enhancing cybersecurity measures by implementing multi-layered defense systems, as companies in the United States often employ multiple security firms' products for defensive measures [Article 61296]. 2. Strengthening international cooperation and information sharing among countries to provide warnings and assistance in case of cyberattacks carried out by nation-states [Article 61296]. 3. Developing and deploying advanced algorithms to detect and counter A.I.-driven malware that can learn and mimic behaviors within a network [Article 61296]. 4. Increasing awareness and training on cybersecurity best practices to prevent spear-phishing attacks, which are popular forms of cyberattacks [Article 61296].
References 1. Darktrace cybersecurity company [61296] 2. Symantec cybersecurity firm [61296] 3. Recorded Future cybersecurity firm [61296] 4. Kustodian cybersecurity firm [61296]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident having happened again at one_organization: - The article mentions that the cybersecurity firm Symantec found the method used against banks in 31 countries, indicating a recurrence of the software failure incident at multiple organizations [61296]. (b) The software failure incident having happened again at multiple_organization: - The cybersecurity firm Symantec found the method used against banks in 31 countries, suggesting that the software failure incident has occurred at multiple organizations [61296].
Phase (Design/Operation) design, operation (a) The article mentions a cyberattack in India that used malware capable of learning as it spread and altering its methods to stay in the system for as long as possible. This malware was considered an early indicator of A.I. and could mimic the behavior of the system's users [61296]. This incident highlights a failure in the design phase, where the malware was able to exploit weaknesses in the system's design and behavior to evade detection and remain undetected for an extended period. (b) The article also discusses how cyberattacks, such as spear-phishing attacks, are being tested in English- and French-speaking African countries to hone the attackers' skills. These attacks involve sending messages containing dangerous malware that appear innocuous to trick victims into opening links or attachments [61296]. This scenario points to a failure in the operation phase, where the misuse of the system by unsuspecting users can lead to successful cyberattacks.
Boundary (Internal/External) within_system, outside_system (a) within_system: The software failure incident described in the articles is primarily due to contributing factors that originate from within the system. The malware discovered in India was able to learn and adapt within the system, mimicking the behavior of the system's users to remain undetected for as long as possible [61296]. Additionally, the cyberattack on the central bank of Bangladesh involved attackers exploiting a weakness in the bank's computers by undermining its accounts on the Swift international money transfer system, which was an unprecedented form of cyberattack [61296]. (b) outside_system: The articles also mention that developing economies like India provide a fertile testing ground for hackers to try out new cyberattacks before deploying them against entities with more advanced defenses [61296]. This indicates that external factors, such as the cybersecurity landscape and defenses in different countries, play a role in shaping the nature and impact of software failure incidents.
Nature (Human/Non-human) non-human_actions (a) The software failure incident occurring due to non-human actions: - The article mentions a cyberattack in India that used malware capable of learning as it spread and altering its methods to stay in the system for as long as possible. This malware had early indicators of artificial intelligence (A.I.) as it could figure out its surroundings and mimic the behavior of the system's users [61296]. - The malware discovered by Darktrace researchers in India was able to learn while in the system, trying to copy the actions of the network to blend in. This attack used A.I. techniques to remain undetected for as long as possible [61296]. (b) The software failure incident occurring due to human actions: - The article discusses how cybersecurity experts speculate that the cyberattack on the
Dimension (Hardware/Software) software (a) The articles do not provide information about a software failure incident occurring due to contributing factors originating in hardware. (b) The articles discuss software failure incidents related to cybersecurity attacks using malicious software, such as malware that could learn as it spread and altered its methods to stay undetected in the system [61296]. The malware discovered by Darktrace researchers used AI techniques to learn the behaviors of employees on the network to remain undetected for as long as possible. Additionally, the attack on the central bank of Bangladesh involved attackers exploiting a weakness in the bank's computers by undermining its accounts on the Swift international money transfer system, showcasing a software failure incident related to cyberattacks [61296].
Objective (Malicious/Non-malicious) malicious, non-malicious (a) The objective of the software failure incident was malicious, as it involved a cyberattack in India using malware that could learn as it spread and altered its methods to stay undetected in the system [61296]. The attack was described as having the hallmarks of something researchers had dreaded for years, with malicious software using artificial intelligence that could lead to a new digital arms race [61296]. (b) The articles also mention non-malicious software failures, such as the cyberattack on the central bank of Bangladesh in February 2016, believed to have been carried out by hackers linked to North Korea. This attack exploited a previously unexplored weakness in the bank's computers by undermining its accounts on the Swift international money transfer system [61296].
Intent (Poor/Accidental Decisions) unknown The articles do not provide information about a software failure incident related to poor_decisions or accidental_decisions.
Capability (Incompetence/Accidental) accidental (a) The articles do not provide information about a software failure incident occurring due to development incompetence. (b) The articles mention incidents where cyberattacks were carried out by hackers testing their skills in countries with potentially weaker defenses, such as in developing economies like India, Southeast Asia, Africa, and other parts of the world. These incidents can be considered accidental failures as they are not intentional system failures but rather the result of hackers exploiting vulnerabilities in systems that may not have advanced defenses in place [61296].
Duration unknown The articles do not provide information about a specific software failure incident being permanent or temporary.
Behaviour other (a) crash: The articles do not specifically mention a software failure incident related to a crash where the system loses state and does not perform any of its intended functions. (b) omission: The articles do not specifically mention a software failure incident related to omission where the system omits to perform its intended functions at an instance(s). (c) timing: The articles do not specifically mention a software failure incident related to timing where the system performs its intended functions correctly, but too late or too early. (d) value: The articles do not specifically mention a software failure incident related to value where the system performs its intended functions incorrectly. (e) byzantine: The articles do not specifically mention a software failure incident related to a byzantine failure where the system behaves erroneously with inconsistent responses and interactions. (f) other: The behavior of the software failure incident described in the articles is related to a sophisticated cyberattack using artificial intelligence (A.I.) that could learn as it was spreading, mimic the behavior of the system's users, and alter its methods to stay in the system for as long as possible. The malware discovered by Darktrace researchers used A.I. techniques to learn the behaviors of employees on the network to remain undetected. This behavior could be categorized as a form of sophisticated and adaptive attack strategy, which does not fit into the traditional failure categories mentioned above.

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property (a) unknown (b) unknown (c) unknown (d) [61296] The software failure incident mentioned in the article resulted in hackers managing to steal $81 million from the Bangladesh Bank by exploiting a weakness in the bank's computers and undermining its accounts on the Swift international money transfer system. (e) unknown (f) unknown (g) unknown (h) unknown (i) unknown
Domain finance (a) The failed system mentioned in the articles was related to the finance industry. The incident involved a cyberattack on the central bank of Bangladesh, which resulted in hackers stealing $81 million by exploiting a weakness in the bank's computers and undermining its accounts on the Swift international money transfer system [61296]. (h) The software failure incident was specifically related to the finance industry, as it targeted the central bank of Bangladesh and involved the theft of a significant amount of money through cyberattacks [61296].

Sources

Back to List